text
stringlengths
1k
23.6k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
16
1.34k
file_path
stringlengths
125
126
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
2.05k
4.1k
score
float64
2.52
4.91
int_score
int64
3
5
What is Irritable Bowel Syndrome Diet? There is no known "diet" specifically related to irritable bowel syndrome. Irritable bowel syndrome diet can more be described as the process of eliminating certain foods from your eating regimen which can be considered culprits of bringing on symptoms that are associated with Irritable bowel syndrome itself. Some of these symptoms can include gas, bloating, and diarrhea. By eliminating culprit foods which can cause the symptoms specific to your irritable bowel syndrome, you can alleviate the unwanted pain and discomfort which is associated with irritable bowel syndrome or at least some of it. One important thing to remember, however, is that before eliminating an entire food group, one should check with a dietary professional for recommendations regarding replacement food alternatives beforehand. Click to read more about IBS causes and treatments » IBS has 3 kinds: - IBS-A - You'll suffer from both diarrhea and constipation - IBS-C - Dominant symptom is constipation - IBS-D - You will experience mostly diarrhea IBS already has happened to almost 15% of the individuals living in the USA. This condition starts mostly in teenagers. There is 50% more girls than men having this condition. A lot of people who have IBS are under stress. Stomach pain is an issue for those who have IBS but it does not cause organ damage or cancer. If left untreated, depression or hemorrhoids can develop. The Reasons Irritable Bowel Syndrome Occurs Medical doctors think that IBS may be caused by a neurological issue. Signals are sent between the brain and the guy. If the person is stressed, the brain's performance affects the movements of the intestines. With this issue, the intestines may move food too slowly or too fast. Due to the condition, diarrhea and painful cramps or constipation and bloating may occur. IBS is strongly associated with stress, anxiety, and sleeping disorders. IBS attacks are triggered by several aspects: - Taking meds with anti-biotics - Caffeinated drinks and alcohol - Pressure and stress at home, school, or work - Hormonal adjustments in women during their periods - Depressive disorders, anxiety, or panic disorder - Big meal consumption - The condition may be catalyzed by specific trigger foods - Stressful activities or changes in your life Can IBS be Treated? The first thing individuals commonly do is to get over-the-counter medicines for constipation or diarrhea. These medicines provide only short term relief. It does not fix the issue. Anxiety pills may be provided by the physician because of the connection of IBS to stress and anxiety attacks. There are people who become drug dependent on these drugs even after the IBS is gone. Make sure you know what synthetic materials are in the drug, so you know what down sides you get from taking them. Natural IBS Symptom Relief The key ingredient in Bavolex is a highly concentrated ginger extract. Recent studies confirmed what our grandparents already knew: Ginger has a calming effect on the intestines. Keep reading and discover more beneficial ingredients in Bavolex.* Bavolex IBS Relief Formula is a natural supplement made out of herbs, enzymes, and plants to help reduce Irritable Bowel Syndrome symptoms, reduce feelings of stress and support healthy digestion.* - Stop gas and painful cramps * - Reduce feelings of stress and anxiety * - Normalize contractions of intestines * - Improve digestion * - Stop diarrhea and constipation * - Calm down the nervous system * Read about important product limitations before ordering. Heather from Wisconsin "My name is Heather and Bavolex is my miracle cure for me. Three months ago I had extreme abdominal pain every day. My doctor wanted to prescribe antidepressants and steroids. I am not one for prescription drugs. I did not want to take either, so I did my research online and found Bavolex. I ordered it right away and within 2 days I felt great and still do. Bavolex is a miracle for me. I will be taking it for the rest of my life. I would recommend Bavolex to anyone who has any intestinal problems." DISCLAIMER: Repeat customer received a free bottle in exchange for an honest review. Important average results information. What Can You Realistically Expect? If you use Bavolex daily and follow the advice in our eBook, you'll notice a significant improvement in less than a week. We want to make our customers happy and healthy, and that's why we offer a 60-day money back guarantee . Our guarantee is simple: If you don't see a significant improvement, return the empty bottle for a full refund! Bavolex Side Effects Product safety is extremely important for us. Bavolex™ contains only natural herb and plant extracts that are considered safe. Although numerous customers use Bavolex each day since 2009, no adverse side effects have been reported. As is the case with other products you should not use Bavolex products while nursing or pregnant because the effects on fetus have not been studied. You should not take Bavolex if you are taking antidepressants or blood thinning medication. "Bavolex IBS Relief Formula is a dietary supplement made with natural extracts and enzymes to help reduce Irritable Bowel Syndrome symptoms.*" Order Today and Receieve 20 Proven Tips for Treating IBS e-book $19.99 value yours at No Cost Learn 20 useful tips to get rid of Irritable Bowel Syndrome attacks forever. These tips cover ways to prevent an IBS attack, diet, and stress reduction. This no-nonsense eBook comes as a bonus when you order Bavolex today. Valuable advice on - Get rid of stress and anxiety - Discover your IBS triggers - Prepare home remedies for IBS - Stop symptoms with diet and exercise - Small lifestyle changes that make a big difference - Know which foods to eat and avoid A must-read for those who want to put an end to this painful inconvenience. Order now and receive this free eBook INSTANTLY by email, so that you can begin applying the tips and START FEELING BETTER TODAY! Read about important product limitations before ordering. Ingredients in Bavolex IBS Relief Formula Bavolex combines plant extracts and enzymes into a unique proprietary blend to address Irritable Bowel Syndrome symptoms in five ways * - Reducing Stress, Anxiety, and Nervous stomach* - camomile, 5-HTP, and lemon balm - Controling Bloating, Gut functions, and Gas* - ginger, peppermint, and caraway seed - Improving Digestion with Enzymes* - bromelain, pancreatin, and papain This natural herb regulates and calms the digestive system, and helps with nervous digestive upsets and diarrhea. It also relieves anxiety and stress. Research shows that chamomile helps regulate smooth muscle contractions of the small intestine, which in turn regulate digestion speed. is found in pineapples. It breaks down proteins. Bromelain helps maintains and promotes proper digestion of meat and may relieve symptoms of stomach upset or heartburn. Bromelain helps counteract inflammation of the intestinal lining. This seed aids digestion and relieves the digestive tract's smooth muscle lining. It relieves dyspepsia, gas, indigestion, and colic, as well as reducing intestinal spasms. Fennel seed oil has been shown to increase motility of the small intestine and reduce intestinal spasms. Clinical trials showed fennel to be useful for reducing abdominal pain in infants. is a digestive enzyme that is made up of the enzymes trypsin, lipase, and amylase. Tripsin aids in the digestion of proteins. Lipase aids digest fats. Amylase aids digest carbohydrates. The Pancreatin enzyme mix therefore helps to digest many foods. The papaya plant contains this enzyme which aids digestion by converting proteins to amino-acids. It also helps against chronic diarrhea and heartburn. ||PEPPERMINT helps reduce discomfort from IBS, diarrhea, and stomach pain. Menthol and methyl salicylate are the main active ingredients in peppermint, and have a calming effect on the stomach and intestinal tract. Peppermint reduces soothes irritation, gut cramping, and gas. Peppermint has been reported to relieve symptoms of IBS in two controlled trials. Three double-blind clinical trials further confirmed peppermint is beneficial for IBS.* This minty herb is often taken after meals as it reduces gas and indigestion. In Europe, lemon balm is often used for insomnia and nervous tension, and as a mild sedative. The German Commission E recognizes lemon balm for treating nervous disturbances of sleep and functional gastrointestinal disorders. Studies suggest that lemon balm extract protects the gastrointestinal tract against ulcers. is a natural amino acid extracted from seeds of the African plant Griffonia Simplicifolia. This natural amino acid is converted by the body into the neurotransmitter serotonin. Serotonin is responsible for regulating the speed with which food travels through intestines and is also known for regulating mood. 5-HTP helps stop anxiety. It’s also used for premenstrual syndrome (PMS). Three clinical studies have shown that 5-HTP helps reduce depression.* This seed is mainly used in rye breads. Two clinical trials showed that combining it with peppermint has resulted in a great reduction of IBS symptoms. is an herb from Asia that has been used for medicinal purposes for more than 2,500 years. It contains compounds called oleoresins that have anti-inflammatory properties. These also have a positive effect on the digestive system muscles. Ginger is helpful in reducing painful cramps and stimulating digestion. The British Journal of Anesthesia reviewed six clinical trials and concluded that ginger is beneficial in preventing nausea and vomiting. Ginger also helps stop heartburn.* - Help Your IBS Although stress, poor diet, and abnormal muscle spasms in the colon aggravate the condition all that is known is that the muscles in the intestines and colon spasm irregularly and cause cramps, bloating, and indigestion. - How to Cure Spastic Colon Spastic colon specifically refers to the muscles in the small and large intestines and how they can contract uncontrollably, leading to cramps and diarrhea or constipation. - Irritable Bowel Syndrome (ibs) Symptoms Irritable Bowel Syndrome is a disease that is estimated to affect 15% of the population in the United States today. - What is Irritable Bowel Syndrome Diet? Irritable bowel syndrome diet can more be described as the process of eliminating certain foods from your eating regimen which can be considered culprits of bringing on symptoms that are associated with Irritable bowel syndrome itself. - When Does Irritable Bowel Syndrome go Away? Just about everything factor relating to the symptoms of Irritable bowel syndrome (IBS) is dependent on the individual patient. - What Causes Irritable Bowel Syndrome? Irritable bowel syndrome, or IBS, is a condition in which the colon becomes too sensitive. - Why Does Irritable Bowel Syndrome Happen? Irritable bowel syndrome refers to a collection of symptoms that include painful cramps, diarrhea, constipation and other intestinal disorders. - What Causes Irritable Bowel Syndrome to Flare Up? Irritable bowel syndrome, or IBS, is a chronic condition that results when the colon becomes overly sensitive. - How to Relieve Irritable Bowel Syndrome Symptoms? There is no known total cure for the disease, so treatment is aimed at alleviating the symptoms, which vary according to whether diarrhea is common (IBS-D), constipation is common (IBS-C), both are common (IBS-M), or neither occurs very often (IBS-U). - What Triggers Irritable Bowel Syndrome? Irritable Bowel Syndrome, commonly known as IBS, is triggered by certain foods and high stress. - How to Fix Irritable Bowel Syndrome? After that, treatment might involve changing one's diet to avoid sugary or fried foods, alcohol, and caffeine, and eating whole grain foods or fruits and vegetables. - Helping with Your IBS Although stress, poor diet, and abnormal muscle spasms in the colon aggravate the condition all that is known is that the muscles in the intestines and colon spasm irregularly and cause cramps, bloating, nausea, and indigestion. - Learn About Spastic Colon No matter the term, this condition causes painful cramps, bloating, fatigue, nausea and other related symptoms, and millions seek relief. - Natural ibs help However, when they go to their doctor hoping that this visit will yield an IBS relief, they usually receive a long drawn out dissertation on the history of the disease, a few over the counter stomach ache medicines that might help, and a prescription for an anti-anxiety medicine. - Natural ibs remedy Improve Digestion Bavolex supplement uses all-natural ingredients such as peppermint, chamomile, fennel, ginger and lemon balm, to name a few, for natural IBS relief. - What is Spastic Colon? No matter the term, this condition causes painful cramps, bloating, fatigue, nausea and other related symptoms, and millions across the world seek relief. - How to Help Ibs? IBS (Irritable Bowel Syndrome) is a colon condition which often results in constipation, diarrhea, both bloating and cramping. - What is IBS with Constipation? The causes of this condition are unknown but are believed to be due to sensitive nerves, a disconnect between the brain and bowel, or too much fluid absorption in the colon. - When Does IBS go Away? While IBS symptoms tend to fluctuate over a period of time about 50 percent of patients remain symptomatic five years after their initial diagnosis. - Why Does IBS Occur? One is that the brain is sending out signals to the colon, causing the intestines to either squeeze too quickly, causing diarrhea, or squeeze too slowly, causing constipation. - What Causes IBS to Flare Up? IBS, or IBS, is a chronic condition that results when the colon becomes overly sensitive. - Why Does IBS Cause Fatigue? IBS, or IBS, may not cause fatigue, or chronic fatigue syndrome (CFS), even though some patients have both. - What Triggers Ibs? IBS, commonly known as IBS, is triggered by certain foods and high stress. - How to Fix Ibs? After that, treatment might involve changing one's diet to avoid sugary or fried foods, alcohol, and caffeine, and eating whole grain foods or fruits and vegetables. - What Helps Ibs? IBS, or IBS, is a condition that leads to digestive problems such as constipation, diarrhea, or both on alternating occasions. 100% Satisfaction Guarantee We stand behind our products! All Bavolex products are manufactured in FDA registered facilities that exceed the highest standards for quality control, safety and ingredient purity. Try our product for 60 days. If you don't see a significant improvement, simply send us your unused portion and we'll promptly return EVERY PENNY, including original shipping costs. Money Back Guarantee Try our product for 60 days. If you don't see a significant improvement, simply send us your unused portion and we'll promptly return , including original shipping costs. - 60 Day Money Back Guarantee. - We refund both opened and unopened bottles. - Your order ships the same or next business day. - We never sell your personal information to anyone. Order Bavolex with Confidence with 60 Days Money Back Guarantee Choose Your Package
<urn:uuid:a8731daa-ae85-484a-bfd5-7317eb34cf72>
CC-MAIN-2020-16
http://bavolex.com/what-is-irritable-bowel-syndrome-diet.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371624083.66/warc/CC-MAIN-20200406102322-20200406132822-00115.warc.gz
en
0.923326
3,372
2.6875
3
Literature Studying Guides & Trainer Resources The 3MTS Shmoo Device is an important aide in test parametric sweeps and Shmoo plotting the take a look at outcomes at actual time. And she does so in writing so suffused with love and enthusiasm for storytelling, with sentences coiling around like the serpentine tail of a dragon itself, enshrouding the reader in a conspiracy which begins a millennium before and ends exactly where it should. Regular collaboration conferences may be helpful for achieving consensus on disagreements and in keeping examine investigators concerned in the PMA process. Replace as of Might 2018: The acceptance of Shmoop courses for credit at Thomas Edison State University is indefinitely suspended pending further review. Rollicking educating guides for literature, civics, history, economics, digital literacy, and math, every with exercise ideas, reading quizzes, and dialogue questions. The horrors of conflict and the selections and emotions it entails are offered with unflinching honesty by way of characters readers can feel for…. Once in a while, Shmoop may replace or revise this Settlement with out discover to Users. Shmoop also sells PDF versions for $5. Research guides for Superior Placement and college entrance exams are $10 to $25. Person agrees that Shmoop shall not be responsible or answerable for any loss or harm of any sort incurred as the result of any such dealings or on account of the presence of advertisers, third social gathering distributors, or product reviews in Shmoop Companies. A research workforce planning a PMA can play an active function in motivating different researchers to conduct similar research addressing the same analysis query. Our Social Research Studying Guides cover all the things from the origins of Western religion to the origins of our nation to the origins of some severely deformed demi-gods. Consumer additional acknowledges that your complete threat for use of Shmoop Services is borne by Consumer. Our teaching technique centers on the idea that college students can love learning, and humor could be the catalyst of engagement. Person has the best to decide out and not be certain by the arbitration- and sophistication-action-waiver provisions set forth on this section by sending written notice of Person’s choice to opt out to the following deal with: Shmoop College, Inc., PO Box 15550, Scottsdale, AZ 85267. As many observational research gather data on completely different outcomes, a meta-analysis could be labeled as a PMA if unrelated research questions have already been analysed before inclusion within the PMA. Back to Elwood’s time at Nickel, there’s four ways to get out: Serve the time (turn out to be an Ace or age out by turning 18), courtroom intervention (magic), loss of life and escape. Shmoop is basically a examine information, although the site’s founder Ellen Siminoff, stated that it aims to grow to be the first online textbook for prime colleges everywhere in the U.S. In both case, it supplies in-depth information on matters starting from the basics like what’s within the Bill of Rights to more obscure subjects just like the U.S. Gilded Age. I’ve read this some time ago and I initially rated it 4 stars (on GR) although I was not satisfied of that rating 100%, after a few weeks of thinking and after having to elucidate to my class what this guide is about (Extra on this later) I believe that I should not overthink my score and go together with 3.5 stars which I feel most comfy with. Consumer‘s correspondence or enterprise dealings with, or participation within the promotions of, advertisers or third celebration distributors found on or via Shmoop Services, together with payment and delivery of related items or merchandise, and any other phrases, circumstances, warranties, or representations related to such dealings, are solely between Person and such advertiser or third party vendor. The Bone Season, the first in a seven-book series, was a New York Occasions bestseller and the inaugural Right now Ebook Club selection. Online study information Shmoop has improved its providing for high-faculty students. Sooner or later, two boys from town that he’s known his entire life, Larry and Willie, steal some sweet from the store. Machines Like Me is closer in character to the darkish and subversive McEwan of his earlier books than to the stiff and self-conscious considered one of Saturday , who appeared burdened by the accountability of finding himself head boy of English letters. I started studying this e-book on Saturday morning and only stopped reading it to sleep. I grew more irritated with this type on daily basis, what with having to determine what all the (tldr, atm, fwiw, etc.) acronyms imply, and spending 10 minutes studying who Regina is just to understand the metaphorical relationship Shmoop is trying to explain. The processing of personal knowledge is ruled by the General Information Safety Regulation (the GDPR”). Literature guides and a few programs are included for free. And that is as a result of, with annually, recruiting is getting an increasing number of nationwide, with fewer gamers not getting scouted and falling via the cracks, and with fewer players unwilling to depart home to play for the easiest groups around the nation. You can configure and save the settings for multiple Shmoo plots per mission. In reality, the corporate hires Ph.D. and master’s college students to put in writing the content on the location. User agrees and acknowledges that Person mustn’t use Shmoop or Shmoop Companies for emergency purposes or to seek or present diagnosis or remedy of medical, psychological, or other problems or difficulties, or as an alternative to skilled psychological, medical, authorized, tax, investment, accounting, or other skilled advice. When the book begins, it lures you in with a vibrant and hopeful tone and just a few mentions at the edges in regards to the harsher realities of life for Elwood. Living systematic reviews tackle comparable research questions as PMAs (high priority questions with inconclusive evidence in an active analysis subject). And, perhaps most importantly, it matches with the experiences of San Francisco-based mostly ladies and non-male recognized folks of other genders who instructed their stories to the San Francisco Examiner on social media this week. He goes to eat at an area restaurant (which unbeknownst to him is the situation of the previous Richmond Hotel, where Elwood had as soon as hoped to sometime see a black individual consuming). Shmoop will be acquired by a school chief or instructor for all the school, the complete class, or individual understudy use. While I like epic fantasy, the reason I picked this guide up was the promise of LGBTQ characters. Studying Guides : These are satisfying, in-depth guides on a broad vary of subjects, including classic and contemporary literature, U.S. History, Math, Chemistry and Biology. Indeed, for many instances involving time collection, you will find that you have to be able to determine if the data was generated by a stationary course of, and probably to rework it so it has the properties of a sample generated by such a course of. The story will not be too apparent like other Indian mystery books. They normally reproduce asexually, by a process called budding, where a part of the cell is pinched off and becomes a new cell, identical to the original. Consumer acknowledges that Shmoop can not guarantee that the content material on the Shmoop Site is free of viruses, lure doors, and different digital menaces. If Person subscribes to Shmoop Premium Providers, User acknowledges and agrees that Person might not share his or her username and password with, or switch his or her subscription to the Premium Service, to another particular person or entity. Shmoop is a digital publishing firm that makes study guides, e book summaries, and different academic resources for college students. For some, the mere thought of hauling just a few books feels just so euphoric. And they are accessible in varied platforms right now like smartphones and tablets with the assistance of e-ebook reader apps Be it a hobby, a pastime, or even a profession, studying provides loads of benefits and the love for books would always stay basic. I CHERISHED the center section a lot, and I positively suppose I’ll come back to this to reread it someday. Please fill in the type below to add address to your personal address book. Take a look at Prep : Shmoop presents supplies to prepare for the SAT, ACT, dozens of AP Exams, some state highschool exit exams, and extra. Check Prep, Programs and Educating Guides. The book does not rewrite what they’ve written—the originals are there for us to read No philosophic writing is extra accessible. Andrews, Elmer, editor, The Poetry of Seamus Heaney: Essays, Articles, Critiques, Columbia University Press (New York, NY), 2000. We have now coated the membership prices for particular person college students earlier, and colleges can get a discount on the companies. We’re pretty confident that you’ll fall in love with our school paper writing service out of your very first order, identical to all these different completely satisfied prospects whose testimonials you can see on our Suggestions web page. Here, we’ll show you the way to run a sentiment evaluation on product reviews with MonkeyLearn , in a step-by-step information. It has interesting content, but its content material won’t attraction to many people exterior of high-college age. The Flooring Shmoo represents a plot where the circuit works at excessive frequency but not at a decrease frequency. After all the Shmoos proved too good for humanity’s sake and therein was the idea for Capp’s final (and tragic) satire. This e book is a thriller love story. Shmoop is an internet education provider that provides guides and on-line programs across a variety of subjects. Shmoop’s Math Learning Guides make algebra, geometry, and even calculus easier than a bit of pi. It is this line from Marcus Aurelius , written almost 2,000 years in the past in his non-public diary, that served as the inspiration for the worldwide bestseller The Obstacle Is The Method by Ryan Vacation It is a e-book that has become a cult traditional and required studying for athletes, entrepreneurs, artists or anybody who is on the lookout for a timeless framework for overcoming the obstacles and adversities life throws at us. Every time a personality died, even when it was one that I liked, I felt quite detached from it because it was sudden and it did not really feel prefer it brought loads to the story. Cell and localization of Bni1p to the ideas of shmoos, or mating projections. Shmoop Premium Services are companies which Users pay a price to make use of, including however not restricted to Shmoop’s Take a look at Prep content material (e.g., SAT Prep, PSAT Prep, AP Examination Prep), cell machine purposes, digital books (or “eBooks”), Educating Guides, and Courses. Compared with a retrospective meta-analysis, PMAs enable more information harmonisation and control. This useful resource has been used as a approach to help prepare my students for AP and school entrance exams. Students discover difficulties in writing and submitting top quality term papers, assignments, analysis papers and coursework. With out a formal definition for processes generating time series information (yet; they are referred to as stochastic processes and we will get to them in a second), it’s already clear that stationary processes are a sub-class of a wider family of possible models of actuality. Person‘s correspondence or business dealings with, or participation in the promotions of, advertisers or third occasion vendors discovered on or via Shmoop Providers, including fee and delivery of related goods or products, and every other phrases, circumstances, warranties, or representations associated with such dealings, are solely between Person and such advertiser or third celebration vendor. After getting recognized a used automobile you are taken with, examine the Carfax and Autocheck car history studies, learn supplier evaluations, and find out what different homeowners paid for the 2019 BMW X1. This e-book is certain to provoke strong reactions on each side of the fence, in large part owing to the difficult themes explored inside its pages, however it was a house-run for me. Vivid, atmospheric, and genuinely unsettling, UNSPEAKABLE THINGS is a coming-of-age story as you’ve by no means read it before. The New Shmoo is a 30-minute Saturday morning animated collection based on the character from the Li’l Abner caricature created by Al Capp , produced by Hanna-Barbera Productions and broadcast on NBC from September 22, 1979 to November 15, 1980. These embody specification of the research questions, eligibility standards for inclusion of research, hypotheses, outcomes, and the statistical analysis technique. Since college is not your closing destination, however a stop on the best way to a superb profession, Shmoop needs to arrange you for the possible challenges of labor life. I do enterprise to concur with the blurb As a huge Tolkien fan, and one who considers his writing to be the easiest fantasy has to supply, I don’t usually evaluate different books to his works (a minimum of not in a positive manner.) Just because there may be very hardly ever a great comparability to be made. Contemplate a state of affairs, when a device might fail at first, but it might get go while testing the second time. He receives corporations from his particular education teacher in the helpful useful resource room to deal with his desires in the space of reading for one hour a day, and he’s accompanied by an aide in any respect other times all through the varsity day. When the e book begins, it lures you in with a vibrant and hopeful tone and just a few mentions on the edges about the harsher realities of life for Elwood. Residing systematic reviews deal with comparable research questions as PMAs (excessive precedence questions with inconclusive evidence in an energetic research subject). And, maybe most importantly, it matches with the experiences of San Francisco-primarily based women and non-male recognized folks of different genders who advised their stories to the San Francisco Examiner on social media this week. In a prospective meta-evaluation (PMA), study selection criteria, hypotheses, and analyses are specified earlier than the results of the studies associated to the PMA research question are identified, decreasing lots of the problems related to a conventional (retrospective) meta-analysis. This cartoon got here into the image because it has a blob-like construction, which was very a lot just like the volume enclosed by the Shmoo plots drawn towards three unbiased variables, equivalent to frequency, voltage, and temperature. As a substitute of just educating students learn how to use expertise, let’s additionally train them how to consider it. I want Shmoop would ship a survey out to its customers to ask for their thoughts as a result of sometime after I obtain emails from them, the emails are nearly random things and not likely pertaining to me after which I delete the e-mail. For instance, for a PMA on the danger of lung cancer for people uncovered to air air pollution, observational research where the relation between heart problems and air pollution has already been analysed could be included in the PMA, however provided that the analyses on the affiliation between lung most cancers and air air pollution haven’t been carried out. An elongated, uneven cell formed earlier than mating, in response to mating pheromone, by Saccharomyces species and other fungi with related life cycles. I’ve shmoop.pro read quite a few fantasy books the place authors will discuss with religions that exist in our world, fairly than creating their own. Each guide listed on Shmoop’s site features a basic abstract, in-depth evaluation, themes, and other information that virtually each instructor is referencing once they ask students to jot down essays on those matters. Shmoop is an online supplier of information, sources, guides, tools, and different associated content about academic, social, and cultural topics. Our on-line courses, college readiness prep, award-successful take a look at prep, and free examine guides steadiness a teen-pleasant, approachable type with academically rigorous supplies. With the advancement of machine studying, artificial intelligence, and massive information, new horizons are seen for PMAs. Yup I used Shmoop for AP prep too (Euro, Psych self study) however mostly for the drills + follow checks. The NeOProM Collaboration met recurrently by teleconference, and no less than yearly face to face, to succeed in consensus on disagreements and to discuss the progress of particular person trials, funding, knowledge harmonisation, evaluation plans, and interpretation of the PMA findings. As a consequence of these properties, stationarity has turn out to be a common assumption for many practices and tools in time collection analysis. SAT Topic Assessments are an owned trademark of the School Board, which was not involved in the manufacturing of, and doesn’t endorse, this product. Shmoop specializes in education, publishing, consumerism, online content material, youth, teaching, studying, literature, historical past, and writing. Nonetheless, it’s soon found that Abner has secretly saved two shmoos, a “boy” and a “woman”. To learn the whole e-book, the utmost time one particular person can take is a day or 5 hours in a single stretch. Our Studying Guides, Online Programs, Faculty Readiness Prep, and Take a look at Prep mix a teen-friendly, approachable fashion with academically rigorous materials.
<urn:uuid:4f298bda-c379-4275-8981-483482c3d76a>
CC-MAIN-2020-16
http://sosiologi.fisip.unej.ac.id/category/shmoop-writing-paper-service/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371824409.86/warc/CC-MAIN-20200408202012-20200408232512-00036.warc.gz
en
0.943921
3,741
2.609375
3
Research labs are the most technically sophisticated architecture that our society creates. Architectural challenge in designing a laboratory is as demanding as the technical challenge associated with it. Labs today exemplify in function, style, structure, scientific capability as well as socio-cultural aspect of place. The most productive and successful scientists are intimately familiar with both the substance and style of each other’s work. They are quick in adapting to the new research approaches and tools that become available. Also experiences a scientist carries while working in different organizations and also across continents makes them believe in a new outlook and want for new, practical and more productive infrastructure. Exceptional facilities don’t just happen- they are planned to be functional, efficient, cost effective and compliant to all regulations. They are planned to meet: researchers’ requirements, complete adherence to safety norms, synergy with outside environment, right ambience for employees to flourish and also built to last with appealing architecture. 1.0 LAB FACILITIES- INTRODUCTION Labs are required mostly in following sectors: |Pharmaceutical based labs||Food processing||Animal Research labs| |Chemical Labs||Petroleum products||Clinical research labs| |Engineering labs||Material standards Bureau| 1.1 Types of labs (Pharma sector): - Formulation Development (FD) - Process Chemistry (PC) - Analytical Development - Analytical support labs for FD & PC - Kilo lab / Scale-up lab - Pilot plant 2.0 PROCESS OF LAB DESIGN & ENGINEERING: - Understanding User Requirement Specifications from Client - Identifying the appropriate design concerns for the particular project - Earmarking Design Approach - Finalising Lab module after discussing with client - Preparing conceptual co-relation diagrams - Planning Philosophy – Drawing preparation - Interface with engineering team for their inputs - Specifications for lab-furniture Final layouts are prepared subsequently, coordinated with various agencies. Tendering of various works is done simultaneously. Implementation & site works becomes quite simple once all the design and engineering aspects are well coordinated/engineered at desk level itself. Each process is briefly described below. 2.1 a General requirements for Process Chemistry - No. of labs - Fume hoods in each lab – bench type or walk-in - Work counters- island tables - Wet benches - Dry benches (the length of table depends on no. of people working in a lab and also the equipment identified for a particular lab.) - Equipment list / instruments - Scientist sitting capacities for each lab - Preferred segregation of equipment/instrument room wise - Storage requirements 2.1b General URS for Formulation Development Labs - Dosage form - Sterile LVP or SVP - High potent / ONCO - In terms of suites – no. of suites - Analytical support and pre-formulations - Pilot plant 2.2 Identifying the appropriate design concerns for the particular project - Architectural Layouts & Design concerns - Functional-Comfort and Convenience - Operational Convenience - Regulatory Requirements - Engineering, Utility & Services - Efficiency in Space planning - Modularity and expandability - Site Specific potentials and constraints - Energy Efficiency - GMP/GLP & Process Hygiene 2.3 Earmarking Design Approach Functionality, space, safety, and flexibility are the four most desired characteristics of a facility. These four characteristics are interconnected in laboratory design; changing one of these features affects the others. While functionality and safety are never compromised, space and flexibility may be sacrificed due to budget constraints. |SPACE PLANNING||SERVICES AND UTILITY MANAGEMENT AND INTEGRITY||WORK AMBIENCE| 2.4 Finalising Design Module This is the most important aspect of lab- finalising the lab module based on client interaction. Few of the lab modules are depicted in the following sketches: Type A is a typical process lab where scientist sitting area alongwith the group leader is assigned particularly for a lab. Here the scientist requirement is calculated based on the fumehood no. and space is allocated for the team and team leader along with the lab. Generally this type of labs are designed for contract manufacturing or dedicated work flow teams( in chemical industry they need specific labs for safety, effluent, characterisation, chlorination, etc) Type B is a lab where the scientist pool is allocated a common central space and all labs are located around it. There is generally a corridor in-between labs and scientist sitting area. These types of labs are particularly designed where all the labs are working on same product and there is no need of any secrecy in documentation area. The scientists however are given access cards for entering the labs. Type C is an open lab concept where all the fume hoods along with dry and wet benches are located together. Lab scientists are also located in the same vicinity near the external walls for light ventilation. These type of labs are generally seen in universities but are also popular as a typical standardised layout for many companies. 2.5 Conceptual Co-relation diagrams Once the module for process labs is finalised the co-relation diagram is worked by the Architect to understand the internal movements horizontally as well as vertically in the building. 2.6 Planning Philosophy Once the co-relation diagram is finalised, the overall planning philosophy is put in place the diagram gets developed into a working layout. The labs, corridors, stores, change rooms, technical areas, etc are integrated. The service and social corridor based on man-material flow is worked out and assimilated with the layout. Sections are also developed simultaneously to understand the man-material and utility lines routing through the designed space. 2.7 Interface with engineering team for design inputs Floor drawings and sections are further circulated to the respective Engineering disciplines for further integration of electrical, HVAC, mechanical layouts. Electrical aspects will consist of the following: - HT Breaker & Switch Yard - Switch gear panels, PCC, MCC - Power distribution - Lighting distribution - Cables & Cable racks Along with this special indoor/outdoor light fittings & fixtures would be selected to match the overall ambience of the lab building. HVAC aspects will consist of the following: - Condensed water - BMS for controlling the parameters Mechanical aspects will consist of the following: - Chilled water - Centralised Vacuum system - Industrial gases- Hydrogen, Helium, Argon, Oxygen, LPG, CO2 – Gas bank and distribution - Water treatment Plant - Process Air 2.8 Lab Furniture Specifications and overall Interior working space strategy Simultaneously lab furniture specification items are finalised and various tenders are floated for procurement process. Types of partition: 1200mm high brick work with plaster and paint + 100mm thick toughened glass fixed with fittings |More openness in the facility due to glass fixed with patch fittings||Painted surfaces need more maintenance.| Brick work/plaster/painting/granite sill/skirting works consumes more time. Pre-coated GI sheets with rock wool infill and vision panels and epoxy coving |Modular- most of the detailing done in office and ready to install panels are sent to site| Good and clean appearance due to precoated factory made panels. Easy to maintain Installation work is clean and fast at site. |Design has to be perfect and well developed in advance with complete coordination. Later changes are difficult.| 3.0 STRATEGIES TO BUILD FLEXIBLE, COLLABORATIVE RESEARCH ENVIRONMENTS INCLUDE: - The use of Furniture systems that are easily moveable - Limiting fixed elements in the laboratories - Containing hazards in the smallest workable area. - Movable and height-adjustable laboratory benches with only minimal services are the norm in the interior of laboratories. - Piped services (such as water, natural gas, and vacuum) serve perimeter benches only - Lab air requirements arise from the need to exhaust dangerous fumes, as well as the need to maintain safety and comfort, given general lab activity and heat-generating equipment like freezers, pumps, and spectrometers. - Occupancy sensors on fume hoods can reduce airflow when the laboratory is unoccupied - Isolating chemical fume hoods in alcoves reduces the overall volume of air required for safe operation. - Uses of air sensing technologies – either setting lower baseline air change rates or recirculate exhaust air. - Specifying only as many hoods as are absolutely necessary and educating workers to keep sashes closed whenever possible 4.0 SUSTAINABLE DESIGN OF LABS …a building “that meets the need of contemporary society without denying future generations of the ability to meet their needs…. (Definition of sustainable architecture offered by the UNCED Bruntland Commission) Research labs are some of the most resource-intensive. They use enormous amount of energy to cool, heat and power the lab equipment, most of which are sophisticated. Large volume of exhaust air is emitted. Finding ways to design and engineer research laboratories more efficiently, effectively and sustainably is the need of hour. Part of this concern is the ultimate awareness of the external environmental issues caused by the building and how it architecturally relates not only to the local but also to the global environment. The key to successful implementation of this concept again comes back to sustainable design. Improvements to building design will continue to evolve over time. Building and scientific equipment vendors must push current boundaries for energy efficient equipment; educational systems at all levels must continue to promote and expand environmental awareness. Now is the time to aggressively implement strategies to lessen future environmental impact and respond to new directions in research; we need to design tomorrow’s laboratories today. This article is an objective to generate continued discussion and document strategies to an organised way to build a lab with best practices and sustainable design approach. Courtsey – Ar. Monali S. Pednekar, DGM-Architecture, Knexir Consultants Pvt. Ltd.
<urn:uuid:b8f5214c-6683-44fe-a745-28e46fd1169e>
CC-MAIN-2020-16
https://www.delabcon.com/laboratory-architecture/building-a-lab-when-architecture-engineering-meet/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506988.10/warc/CC-MAIN-20200402143006-20200402173006-00355.warc.gz
en
0.922371
2,146
2.84375
3
The hectic, busy, stress-high lifestyles we lead contribute to the development of various serious physical, emotional, and mental health issues. While we all experience stress from time to time, it can become a serious problem as soon as it starts to interfere with daily life. Nowadays, the anxiety rates are on the rise, and the findings of a 2018 poll released by the American Psychiatric Association (APA) showed that 40% of respondents felt more anxious than a year ago. The national anxiety score this year is 51, which is 5 more than last year. Millennials were found to suffer from anxiety than Gen X or baby boomers. In America, anxiety was linked to all five tested areas, health, safety, finances, relationships, and politics. Overall, 39% of people admitted to being more anxious this year than last year. Therefore, it is of high importance to learn more about anxiety and understand it in order to be able to properly prevent and treat it. The Anxiety and Depression Association of America (ADAA) reports: - Anxiety disorders develop from a complex combination of factors, such as personality, genetics, brain chemistry, and life events. - These disorders are the most common mental illness in the U.S., with 40 million adults (18.1% of the population) age 18 and older suffering from them annually. - Anxiety disorders respond very well to treatment, but only 36.9% of patients seek and receive treatment. - People with an anxiety disorder are 3-5 times more likely to go to the doctor and six times more likely to be hospitalized for a psychiatric condition than those who do not suffer from it. Here are the types of anxiety: General anxiety disorder( GAD) It affects about 6.8 million Americans, and it involves excessive and persistent worry about various things. These people face difficulties to control their worries, and always think of the worst scenario in order to mentally prepare themselves. It is diagnosed when a person cannot control these worries for over 6 months. People with GAD often suffer from symptoms like stomachaches and headaches. GAD is believed to be caused by stress, family background, or genetics. Women are twice more likely to develop it, and it can begin at any age, usually between childhood and midlife. Social anxiety disorder/ Social phobia This disorder affects 15 million adults in the U.S. and is characterized by immense anxiety in social situations, hyperawareness of oneself, and fear of judgment and rejection. These people worry about their appearance, mannerisms, and ability to converse with others. The most common symptoms include stuttering, blushing, stumbling over words, or freezing during a conversation, as well as physical symptoms like sweating, panic attacks, an increased heart rate, and nausea. Most people develop social phobia by their teen ages, and it can seriously interfere with their life. They avid working with people, miss social engagements with friends, and in more severe cases, they avoid going to work, school, shopping, job interviews, fail to maintain their relationships and friendships. They have an increased risk of depression and substance abuse problems. Panic disorder (PD) Panic disorders affect about 6 million American adults and are diagnosed in people with frequent, spontaneous panic attacks, who live in fear of an upcoming attack. This disorder usually develops after age 20, but panic attacks can also be experienced by children too. Women are more susceptible to this disorder, and panic disorders disrupt the life of a person. If the patient suffers from agoraphobia as well, the symptoms increase. Many people are afraid or ashamed to talk about their panic attacks, and isolate themselves and avoid discussion about their problem. Post-traumatic stress disorder (PTSD) It affects about 3.5% of the American population, and it is developed by people after a traumatic event, that triggers flashbacks, nightmares, or intrusive memories. This disorder is severe and debilitating and usually lasts for months and years after the event. The tragic events usually include a sexual assault, death of a family member, a natural disaster, motor vehicle accident, terrorist attack, combat, sexual assault, or other near-death experiences. Women are twice as likely to suffer from it as men, and it often co-occurs with anxiety disorders, substance abuse, and depression. They affect 19 million adults, and the term covers the fear of various things, like heights, spiders, driving, flying, elevators, etc. Patients do their best to avoid the triggers of their irrational fears, which makes it hard to carry out their daily tasks. This lowers their self-esteem and productivity and puts a huge strain on their relationships. While some phobias are developed early in life, most of them happen unexpectedly, during teenage years or young adulthood. Obsessive-compulsive disorder (OCD) Obsessive-compulsive disorder (OCD) affects 2.2 people in the U.S. across the world. It is characterized by obsessions (intrusive thoughts or images that cause extreme anxiety) and compulsions (behaviors performed by the person in order to cope with their anxiety). In most common cases, these obsessions are linked to hygiene, impulses, the need for symmetry, and contamination. Yoga has been found to be of great help in the treatment of anxiety disorders, since it stimulates the release of feel-good hormones, and creates a state of harmony between the body and mind. It lowers stress, releases the build-up the tension, soothes the muscles, and relaxes. According to Katharina Star, Ph.D.: “Despite the challenges of panic attacks and other anxiety symptoms, there are many self-help strategies that can assist you in coping with anxiety. Numerous self-care activities and relaxation techniques are available to help you feel more calm, peaceful, and in control. Some of the most common relaxation strategies include breathing exercises, progressive muscle relaxation, and visualization. These techniques have been found to reduce anxiety and may even help you manage your panic symptoms. Yoga is an activity that actually encompasses all three of these common relaxation techniques. Additionally, yoga has been known to help ease stress, reduce feelings of nervousness, and enhance mindfulness. For these reasons, yoga has been considered to be potentially beneficial for people with anxiety disorders, including panic disorder.” “Yoga is believed to have originated in India over 5,000 years ago. Derived from the ancient Indian language of Sanskrit, the term yoga means “to yoke” or “unite.” Yoga practice involves a joining of the body, mind, and spirit. Through breath work, meditation, movements, and relaxation, yoga can help restore a sense of personal balance. Yoga has become a popular way to renew the body by increasing strength, improving balance, and enhancing flexibility. Many people are devoted to the yoga lifestyle that includes a practice beyond physical exercise. Numerous non-exercise aspects of yoga, such as breathing exercises and meditation, can help calm a busy mind and assist in letting go of stress. Given the many stress reductions benefits of yoga, it is not surprising that yoga can also be helpful in managing fears, panic, and anxiety.” Moreover, Timothy Burgin, a Kripalu & Pranakriya trained yoga instructor, explains: “Besides the calming effects of a general yoga practice, restorative poses, inversions and forward bends are especially calming to the body and mind, helping to reduce and prevent excessive anxiety. The following poses are known to be especially calming: child, shavasana, crocodile, supine bound angle pose, seated forward bend, and seated head to knee. Simple inversions such as downward dog, standing forward fold, standing yoga mudra, shoulderstand, plow and supine staff pose create a temporary rise in blood pressure in the head which triggers the body’s natural calming mechanisms, dilating the blood vessels and lowering heart and breathing rates. If symptoms of fatigue, depression, and heart palpitations are present, the qi or energy of the heart center may be weak, and heart opening poses such as Cobra, Pigeon, Fish, Boat, Bow, and Bridge would both strengthen and calm the heart chakra. Emotions play a large role in anxiety disorders. An excessive feeling of fear, worry, irritability, anger, and depression can all add and exasperate our level of anxiety. Twists, hip opening poses, and sidebends will all help to balance the emotions, and thus help reduce feelings of anxiety. Twisting and hip opening poses harmonize the nervous and endocrine systems, the two primary systems that regulate our emotional health, and side bending poses activate the Liver meridian, the energy channel known in Chinese medicine to regulate the emotions.” Here are some beginner yoga poses that can help you relieve anxiety: 1. Baddha konasana (Butterfly Pose) Sit up straight, stretch out the legs, bend the knees while pulling the heels toward the pelvic area, and press the soles of the feet together. Allow the knees to drop to the sides. Place the thumbs on the arches of the feet, while the shoulders are back and the chest up. Hold for five minutes. 2. Paschimottanasana (Seated forward bend) To perform this anxiety-relieving pose, sit up straight with the legs out in front of you. Flex the toes and elevate the hands over the head. Stretch, breathe in, and bring the arms slowly forward. Breathe in, elongate the spine, and lean forward a bit. Breathe out, move the navel toward the knees and slightly raise the head. Repeat a few times, place the head on the legs, and hold. Inhale and return to the starting position. Exhale and lower the arms. 3. Dandasana (Staff Pose) Sit straight up with the legs stretched out in front of you, the back straight, and the feet pointed upwards. Press the buttocks to the floor, stretch the spine, and place the palms next to the hips. Press the entire lower half of the body to the floor, breathe deeply, and hold for half a minute. 4. Utthita trikonasana (Triangle Pose) While standing, place the legs about four feet apart, and the right foot outside at 90 degrees and the left foot in at 15 degrees. You should align the center of your right heel with the center of the arch of the left foot. Breathe in, and while breathing out, bend the body to the right from below the hips. With the waist straight, raise the left hand, while touching the floor with the right hand. Bend the body sideways, breathe deeply, and hold for as much as possible. Return to the starting position on the exhale, and repeat on the other side. 5. Marjariasana (Cow & Cat Pose) To perform the cow pose, start on all fours, and with the gaze straight ahead. Breathe in, and raise the tailbone. Push the navel down and hold the pose for a few breaths. The cat pose is the opposite pose. Exhale, drop the chin down to the chest, arch the back, and relax the buttocks. Hold for a few breaths. 6. Balasana (Child’s Pose) Kneel down on the floor with the big toes touching each other. Stretch the arms out in front and lean forward, spreading the knees hip-width apart. Lay the torso between the thighs and try to rest the crown of the head on the floor. Hold for as much as possible. 7. Ustrasana (Camel Pose) This pose boosts the flexibility and strength accelerates blood flow, and regulates your blood pressure and heart rate, relieving stress. Start kneeling on the mat, with the hands on the hips, the knees and shoulders aligned, and the soles of the feet facing the ceiling. Breathe in, push the hips and tailbone out, and arch the back. Slide the palms over the feet and straighten the arms. Hold for a minute. 8. Setu bandhasana (Bridge Pose) Lie on the back, with the knees bent and the feet on the floor hip-width apart. Inhale, elevate the back off the ground, roll the shoulders in, and keep the chin resting on the chest. Then, tighten the buttocks, and with the thighs parallel to the floor, lift the torso off the floor, and hold for a minute. 9. Dhanurasana (Bow Pose) This can be a difficult pose, so don’t perform it at the very beginning. Lie flat on the stomach with the legs hip-width apart, fold the knees and reach the hands toward the ankles. Then, raise the chest and legs and pull the legs back. Hold for 20 seconds. 10. Shavasana (Corpse Pose) This pose is for the end of the workout since it is basically a meditation. Breathe deeply, close the eyes, and with the palms facing up, relax the body and mind. Do this for 10-12 minutes. Try these yoga poses and you will immediately feel better! You will be confident in knowing exactly what is in the products your family uses and happy with the money you will save every month. In addition, they offer you three more bonuses + 75% discount only this month! - 105+ NATURAL HOME REMEDIES – Treat almost any illness with natural ingredients you probably already have in your kitchen. - 75+ NATURAL BEAUTY RECIPES -Get the best hair and skin you’ve ever had and look younger with these insanely clever natural beauty recipes. - 35+ DYI HOUSEHOLD PRODUCTS & CLEANERS – Never Buy Toxic Cleaning products again! Save a fortune and your families health with these super simple homemade cleaning products that work better than the chemical ones.
<urn:uuid:3e299e0a-c39f-4fb1-81bc-50b87de2a9b2>
CC-MAIN-2020-16
https://healthyrecipeshome.com/10-stretches-that-relieve-anxiety-and-stop-overthinking/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494064.21/warc/CC-MAIN-20200329074745-20200329104745-00275.warc.gz
en
0.940318
2,924
3.03125
3
IX,X,XI,XII CRANIAL NERVES Glossopharyngeal nerve (IX cranial nerve) Special visceral efferent (SVE), general visceral efferent (GVE), general visceral afferent (GVA) and special visceral afferent (SVA) The glossopharyngeal nerve leaves the brain stem at the level of the medulla oblongata, caudally to the trapezoid body. The parasympathetic preganglionic fibers of the glossopharyngeal nerve form the tympanic nerve (GVE). This nerve enters the middle ear to form the tympanic plexus. Fibers from this plexus form the minor petrosal nerve that leaves the skull through a small foramen (located dorsocaudally to the oval foramen) to reach the otic ganglion. The parasympathetic postganglionic fibers join the auriculotemporal and buccal nerves (both are branches of the mandibular nerve) to innervate the parotid and zygomatic salivary glands respectively. The remaining fibers of the glossopharyngeal nerve exit the cranial cavity through the jugular foramen and, then, through the tympano-occipital fissure along with the vagus and accessory nerves. The glossopharyngeal nerve sends a sensory branch (GVA) to the carotid sinus and carotid body. Subsequently, it divides into lingual and pharyngeal branches. The lingual branch (GVE, GVA and SVA) innervates the tonsils and the root of the tongue. The pharyngeal branch and the vagus nerve form the pharyngeal plexus, which innervates the muscles and mucosa of the pharynx. This plexus is composed of motor fibers (SVE and GVE) and sensory fibers (GVA), and is joined by sympathetic postganglionic fibers from the cranial cervical ganglion. In the dog, the soma of the sensory neurons is located in a ganglion at the level of the jugular foramen. Vagus nerve (X cranial nerve) Special visceral efferent (SVE), general visceral efferent (GVE), general visceral afferent (GVA), special visceral afferent (SVA) and general somatic afferent (GSA) The vagus nerve leaves the brain stem at the level of the medulla oblongata, caudal to the glossopharyngeal nerve. Most of the vagal fibers are visceral sensory (GVA). The rest are made up of visceral motor (GVE), special visceral motor (SVE), sensory to the taste buds of the epiglottis (SVA) and somatic sensory (GSA) to the ear canal. The vagus nerve leaves the cranial cavity through the jugular foramen and, then, through the tympano-occipital fissure. At the level of the jugular foramen it sends a sensory auricular branch (GSA) to join the facial nerve in order to reach the skin of the ear canal through the lateral internal auricular nerve. The proximal vagal ganglion (also named jugular ganglion) is located at the level of the jugular foramen. It is formed by the soma of the somatic afferent neurons (GSA). The soma of the GVA and SVA neurons is located at the distal vagal ganglion (also named nodose ganglion). This is situated outside the tympano-occipital fissure and topographically related with the glossopharyngeal, accessory and hypoglossal nerves, and the cranial cervical ganglion. The pharyngeal ramus (SVE, GVE and GVA) leaves the vagus nerve at the level of the distal vagal ganglion. It is joined by fibers from the glossopharyngeal ramus and sympathetic postganglionic fibers (from the cranial cervical ganglion) to form the pharyngeal plexus. This innervates the pharyngeal muscles and the cranial part of the esophagus. The cranial laryngeal nerve branches off from the vagus nerve also at the level of the distal vagal ganglion. It divides into an external ramus and an internal ramus. The external ramus (SVE) innervates the cricothyroideus muscle. The internal ramus (GVE and GVA) innervates the mucosa of the larynx, rostral to the vocal folds, and the taste buds of the epiglottis (SVA). The vagus nerve descends into the thoracic cavity together with ascending sympathetic fibers, forming the vagosympathetic trunk. At the level of the middle cervical ganglion, the vagus nerve leaves the sympathetic fibers and sends out cardiac branches formed by parasympathetic preganglionic fibers (GVE) and sensory fibers (GVA). On the left side, the nerve forms the left recurrent laryngeal nerve that passes around the aortic arch. On the right side, the right recurrent laryngeal nerve turns around the right subclavian artery. Both recurrent laryngeal nerves run cranially becoming the left and the right caudal laryngeal nerves. They innervate the trachea (GVE and GVA), the esophagus (SVE, GVE and GVA), and the laryngeal muscles (SVE), except for the cricothyroid muscle that is innervated by the external ramus of the cranial laryngeal nerve. The caudal laryngeal nerves also innervate the mucosa of the larynx caudal to the vocal folds (GVE and GVA). In its course the recurrent laryngeal nerve runs parallel to an smaller dorsally located nerve, the pararecurrent laryngeal nerve. This nerve sends branches to the trachea and esophagus. At the middle mediastinum, the vagus nerve sends branches to the bronchi, esophagus and heart. Just caudal to the bronchi, each left and right vagus nerves form a dorsal and a ventral branch. The dorsal branches (left and right) unite, as do the ventral ones, to form the dorsal and ventral vagal trunks respectively. In the abdominal cavity, the dorsal vagal trunk joins the aortico-abdominalis plexus so the fibers may follow the vessels to reach the viscera. The ventral vagal trunk innervates the lesser curvature of the stomach and the liver. These fibers are made of preganglionic parasympathetic (GVE) and visceral sensory (GVA) neurons. Although the pharyngeal and laryngeal muscles were considered lacking of spindles, spindle-like receptors to stretch have been found indicating the possibility of GSA fibers for proprioception in the glossopharyngeal and vagus nerves. The meningeal ramus enter through the jugular foramen together with sympathetic fibres coming from the cranial cervical ganglion. Accessory nerve (XI cranial nerve) General somatic efferent (GSE) and special visceral efferent (SVE) The accessory nerve consists of cranial and spinal roots. The neurons that form the cranial roots have their bodies in the nucleus ambiguus in the medulla oblongata. The neurons of the spinal roots have their bodies in the motor nucleus of the accessory nerve, located in the dorsolateral portion of the ventral horn of the cervical spinal cord segments (from C1 to C7). The spinal roots leave the spinal cord between the dorsal and ventral roots of the cervical spinal nerves, and lie dorsal to the denticulate ligament (under the dorsal spinal roots). They run rostrally to enter the cranial cavity, through the foramen magnum, and join the cranial roots. These leave the medulla oblongata vetrolaterally. Cranial and spinal accessory nerve roots unite to become the external branch of the accessory nerve (GSE). Some fibers from the cranial roots join the vagus nerve to form the internal branch of the accessory nerve. This branch becomes part of the recurrent laryngeal nerve (SVE). Upon exiting the cranial cavity through the jugular foramen and, then, through the tympano-occipital fissure, the external branch of the accessory nerve descends to innervate the trapezius, omotransversarius, sternocephalicus and cleidocephalicus muscles. The latter two muscles are also innervated by ventral branches of the cervical spinal nerves. As there are communications between the accessory nerve and the cervical spinal nerves, it has been proposed that the soma of sensory cells (GSA) for proprioception may be located in the dorsal root ganglia. Hypoglossal nerve (XII cranial nerve) General Somatic efferent (GSE) The hypoglossal nerve is motor to muscles of the tongue (intrinsic and extrinsic) and to the genihyoideus and thyrohyoideus muscles. It leaves the medulla oblongata laterally to the pyramids by means of several rootlets. The nerve exits the skull through the hypoglossal canal and goes ventrorostrally, lateral to the external carotid artery, to run parallel to the lingual artery. In its course, the hypoglossal nerve communicates with the ventral branch of the first cervical spinal nerve forming, the cervical loop (ansa cervicalis). Although the hypoglossal nerve is considered a motor nerve, there are afferents that respond to stretch. As this nerve has no sensory ganglion, it has been proposed that the soma of the afferent neurons may be located at the dorsal root ganglion of C1 (the connection will be through the ansa cervicalis).
<urn:uuid:85435e70-b9df-4e2d-a786-e8b7d057e799>
CC-MAIN-2020-16
https://www.neuroanatomyofthedog.com/ixxxixii-cranial-nerves
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371807538.83/warc/CC-MAIN-20200408010207-20200408040707-00394.warc.gz
en
0.862136
2,160
3.359375
3
15 Second Summary The Squatty Potty is a simple device that claims to help people defecate more easily and more fully. It’s creators also allude to health benefits from it’s use, such as a “healthier colon”. Unfortunately, in reviewing scientific research done on body position during defecation we found only poor quality, highly limited studies, and one study of a slightly higher quality which demonstrated no link between body position and ease of defecation. Despite it’s claims, there is no evidence to suggest that a Squatty Potty will help you “poop better”. The Sitting Vs Squatting Debate Table of Contents - 1 15 Second Summary - 2 The Sitting Vs Squatting Debate - 3 What Does Squatty Potty Claim? - 4 Reviewing The Claims of The Squatty Potty - 5 Inconsistent Information - 6 The “Empirical Evidence” For Squatty Potty Benefits? - 7 Reviewing Study #1: 6 Volunteers In Japan: - 8 Reviewing Study #2: 30 Iranian Patients - 9 Reviewing Study #3: The “Fourth Stage” Mystery - 10 One More Study (not listed on the website) - 11 Conclusion: Is The Squatty Potty To Be Taken Seriously? Squatting and sitting are the most common positions for defecation, but is one better than the other? The pooping jury is still out on this as the debate has crossed over different cultures for many years. The squatting position (e.g. sitting over a hole in the floor) is commonly preferred in the Arabic, Chinese, Indian, and Asian cultures. Whereas, in the westernized cultures there has been the advent of the raised toilet. The creators of the Squatty Potty believe there is no debate. Squatty Potty is a small stool that you place under your feet in front of your toilet in order to raise your legs to the pretend position of squatting, because apparently defecation is more easily achieved by squatting than by sitting. They would say you can poop better, and that their device that will help you do it.. What Does Squatty Potty Claim? According to the Squatty Potty website, squatting is the better option because sitting on your toilet gives you the following 5 problems. - Colon disease - Urinary difficulty/Infections - Pelvic floor issues Who would have thought that sitting on your toilet causes all of those problems? Am I to believe that if I use Squatty Potty I will have less likelihood of ever developing these health problems? Let’s take a look… Reviewing The Claims of The Squatty Potty For this review I will focus purely on the health claims stated only by the Squatty Potty website (http://www.squattypotty.com). After reading the website for about 30 seconds the first thing I noticed (which is my absolute pet hate), is that the website often makes claims without citing the source of the study or health statistics. Let me show you what I mean with these few examples. “A 2008 study by Kaiser Permanente published in Obstetrics & Gynecology found that one-third of women suffer from one or more pelvic floor disorders.” – no reference! “Many studies point to fecal buildup in the colon as a cause of diseases including colon cancer.” – no reference! “Squatting can help reduce episodes of urinary tract infections in both frequency and intensity.” – no reference! But let’s forgive them that poor practice and keep listening. What are Squatty Potty implying here? Let’s ask some relevant questions… First, what do pelvic floor disorders among women have to do with squatting during defecation? Could it be that they are wanting me to make a psychological link between squatting and the fact that one-third of women suffer from pelvic floor disorders? Then making me think that pelvic floor disorders can be avoided by squatting during defecation? Maybe. Second, if fecal buildup is supposedly associated with diseases such as colon cancer, what does that have to do with Squatty Potty? Are they wanting me to make the psychological link that using the Squatty Potty will reduce my risk of having colon cancer? Maybe. But it would be more responsible to please show me the statistics on colon cancer across the world and whether this changes according to the cultural differences in the preferred defecation positions… but I don’t imagine that data exists. Third, if you make a claim such as “squatting can reduce episodes of urinary tract infections” then at least provide a cited reference to support it. I reviewed the three studies the website directed us to in order to support their claims, but none of them investigated urinary tract infections, nor any of the other 4 problems they suggested were caused by sitting on a toilet to defecate. But it’s not just about citing/referencing your claims, it’s also about providing consistent information. For example, have a look at these two non-cited excerpts from the website. “The National Institutes of Health (NIH) defines constipation as having fewer than three bowel movements per seven days. According to the NIH about four million Americans suffer from constipation.” – no reference! “The National Institutes of Health estimates that 4-10 million Americans have chronic constipation (defined as having a bowel movement less than three times per week), and as many as 63 million people are suffering at any time from occasional constipation.” – no reference! At one point they are telling me that NIH states that about 4 million Americans suffer from constipation, then in another paragraph they are telling me that 4-10 millions have chronic constipation… First, these numbers are inconsistent; and second, I would have thought that ‘chronic constipation’ is a sub-category of constipation, so how can only 4 million suffer from constipation, but then 4-10 million suffer from ‘chronic’ constipation. If you’re going to quote these numbers then at least get it right, and cite the source. The “Empirical Evidence” For Squatty Potty Benefits? Let’s now look at where the website provides us with the ‘empirical evidence’ (sounds fancy doesn’t it!) that squatting is better for you. The Squatty Potty authors list three studies (and provide the links to the studies – which is good) to prove their claim that defecation could be more easily achieved by squatting than by sitting. These three studies however, are of extremely poor quality, and do not provide any sufficient evidence to suggest that squatting (versus sitting) improves defecation. Furthermore, they provide no evidence that using a product such as Squatty Potty improves defecation. Quickly before looking at these studies. As you continue reading, think about this… The website shows pictures of a series of figurines in three different defecation positions. The first figurine is sitting on the toilet with the caption “Too unnatural”, the second is sitting on the toilet, but this time using the Squatty Potty stool with the caption “Just right”, and then the third figurine is shown squatting under a tree (no toilet) with the caption “Too natural”. So the squatting position commonly preferred in the Arabic, Chinese, Indian, and Asian cultures for thousands of years is considered “Too natural” (whatever that means!). Ok, keep that in mind and let’s continue. Reviewing Study #1: 6 Volunteers In Japan: The first study listed on the website, which happens to be the most recently published study (Sakakibara et al., 2010), was conducted among six healthy volunteers (5 female/1 male) in Japan and the researchers compared abdominal pressure and anorectal angle (the angle between the rectum and the anal canal) during defecation across three positions while sitting on the toilet (legs at 90 degrees [normal sitting position], 60 degrees [legs slightly raised], and 22.5 degrees [squatting position]). Based on the average measures across each of the 3 sitting positions, they report that anorectal angle was larger and abdominal pressure was lower during defecation in the squatting position, and these factors assist in defecation being easier. However, there are some major flaws to this study. Before I discuss these limitations, I will first explain what the six volunteers had to do. They filled the volunteers’ anorectum with a ‘contrast medium’ and asked them to defecate it out whilst in the normal sitting position as various measurements were being recorded. They then repeated this procedure two more times with the legs at 60 degrees (slightly raised), and 22.5 degrees (squatting position) respectively. These 3 defecation positions were performed all during the same morning one after another. - Small sample size – 6 people (we all know this is way too small to demonstrate any meaningful conclusion.) - Almost all volunteers were female - The authors state “The volunteers were instructed to have evacuated their rectum in the morning before the study, and all had eaten their usual breakfast.” How much variation was in a ‘usual’ breakfast and would have that influenced their defecation efforts? - The volunteers went through the defecation procedure 3 times in a row. This order should have been randomized across the volunteers, because performing the 2 defecations prior to the squatting defecation may have biased the result in that the anal muscles may have become more ‘relaxed’ or ‘loosened up’ after defecating twice. (e.g. just like when you stretch your muscles before exercising and they loosen up). Bottom Line: This study does not provide credible evidence that defecation position has an effect on anorectal angle size or abdominal pressure during defecation. Reviewing Study #2: 30 Iranian Patients The second study was among 30 Iranian patients (21 male/9 female) referred for a barium enema (Rad, 2002). The patients were asked to defecate using two different types of toilets, 1) an unraised, ground-level style toilet which is common in Iran, and 2) a toilet bowl with an attached tank style, which is common in European/Western countries. The outcomes compared across these two methods of defecation were the anorectal angle, distance between perineum and the pelvic floor, and ease and completeness of evacuation. The 2 bowel movements from each patient were performed on the same day at the clinic. Results showed that when using the Iranian-style toilet (e.g. squatting) the anorectal angle was wider, and there was a larger distance between the perineum and the horizontal plane of the pelvic floor, which are both meant to help improve defecation. But wait – remember I told you earlier about the images of the defecating figurines? Well based on that image, the website says that the position tested in this study for defecating (e.g. using the Iranian-style toilet) is “Too Natural”. Not what Squatty Potty recommends. But put that aside too while we look at the extensive limitations of this study… Study limitations (where do I begin – this study should not have been published) - The order of defecation positions should have been randomized, but were not. The defecation using the European/Western-style toilet was performed after using the Iranian-style toilet. Was the second defecation after the enema – would this bias the results? - What was eaten between the two defecation sessions? - There were no statistical analyses performed or any results reported in Tables – just a reporting the average anorectal angle and how many patients completed their bowel evacuation using the two different methods. - The main limitation to this study stated by the authors was that the volunteers were not accustomed to using the European/Western style toilet, and changing their habits may have put stress on the person’s bowels and caused an unsatisfactory evacuation. Furthermore, the anatomic structures associated with bowel movements adapt to particular habits overtime. This is what the author states “In our target population, there were no subjects who were accustomed to the European-style toilets, which would limit the generalizations drawn from this study.” Bottom Line: This study contributes the equivalent of nothing to the discussion of body position and the ease or effectiveness of defecation. Reviewing Study #3: The “Fourth Stage” Mystery The last study listed on the website compared the straining forces applied when sitting or squatting during defecation (Sikirov, 2003). The study was among 28 volunteers (14 female/14 male) with ‘normal bowel function’. They recorded and analyzed, 1) the time needed for sensation of satisfactory emptying, and 2) subjective impression of the intensity of the defecation effort. Comparisons were made across 3 different defecating positions (sitting on a standard-sized toilet seat (41–42 cm high), sitting on a toilet seat with a 10cm foot stool – which reduces the height of the toilet seat to 31–32 cm), and squatting. As part of their everyday lives, the volunteers were asked to record 6 bowel movements in each of the 3 positions (18 bowel movements in total – that’s a lot of bowel movements!). The study concluded that the time needed for sensation of satisfactory emptying, and degree of subjectively assessed straining was much lower when squatting, suggesting that the squatting position is better. - Once again, small sample size. But at least this sample was divided evenly by gender! - There is no information provided about the environment in which the ‘everyday’ defecations took place. Were these ‘at home’ using their private toilet, in a designated study location, or was it at the work environment? Would the environment have biased the results? - No information was provided about the volunteers’ adherence to the study protocol. For example, over what period of time did the volunteers record their 18 bowel movements? Did this vary across volunteers? The study does mention however, that the dietary habits were broadly different among the volunteers, so how would have this impacted on the results? - Interestingly, the author reports the age, height, and weight of the volunteers, but does not adjust for those factors in the analyses. It would have been interesting to know if these factors influence defecation patterns. For example, would larger/taller people find it more difficult to squat, and therefore impacting on their “subjective impression of the intensity of the defecation effort”? Or maybe older people find it difficult to squat? - The main objective of this study is how defecation patterns are different while sitting in 3 different positions. The results focus on how squatting makes defecation easier, however the authors’ definition of the squatting position was not made clear. Here is what it says “In the fourth stage, the subject defecated while in a squatting posture (a flat container was supplied).” What is a “flat container”? Was this on the toilet seat, or on the floor using a potty-type container? What are the measurements of how low this position is compared to the ‘on the toilet seat’ positions? - This one is my favorite. Did you notice that it says “In the fourth stage”, but we only have data on 3 defecation positions? Why is that? Because there was originally 4 defecation postures to be carried out but one was abandoned because 4 volunteers refused to complete the required number of defecations due to the extreme discomfort of defecating in this position. And guess what defecation posture was? It was when using a 15cm high footstool while sitting on the toilet (reducing the height of the toilet to 26-27cm). I would like to know how similar this uncomfortable position is to the Squatty Potty position! Bottom Line: This study has not been carefully carried out, and given it’s flawed methodology and incomplete reporting, it can’t be said to provide evidence supporting the claim that defecation position has an effect on ease or effectiveness of defecation. One More Study (not listed on the website) We have to remember that there wouldn’t be much research published on this topic for the simple fact that it is difficult to recruit volunteers for such studies, and because society is not too concerned about the type of toilet they use on a daily basis. However, I did find one other study that is not listed on the website, and we know why – because it reports no association between squatting and less straining during defecation. Fecal incontinence may be the result of a stretch-induced injury to the pelvic nerves from chronic straining during defecation (ref), and it suggested that this condition occurs less frequently in societies which prefer the squatting position. Therefore an Australian study (Lam et al., 1993) investigated the position of the pelvic floor during defecation straining in 52 patients. The study measured the position of the perineum at rest and during maximal defecation straining when the patient was in three different defecation positions (left lateral, sitting and squatting). Results showed that “there was no significant difference at rest or on straining between the sitting and squatting positions. These results show that squatting does not reduce pelvic floor descent during defaecation straining, and imply that squatting would not help reverse stretch-induced pudendal nerve damage.” Conclusion: Is The Squatty Potty To Be Taken Seriously? I understand that some people may prefer to squat versus sit while pooping, and that is totally ok as no one is arguing about peoples’ preferences in something that is very personal. While there are cultural differences across the world in the preferred defecation positions, there is very little evidence to suggest that these differences (e.g. sitting or squatting) influence the ease or effectiveness of defecation or influences the particular adverse health outcomes that Squatty Potty alludes to.
<urn:uuid:d21aa30c-999e-49ca-99ab-1bbfe4ed39aa>
CC-MAIN-2020-16
https://healthybutsmart.com/squatty-potty/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505359.23/warc/CC-MAIN-20200401003422-20200401033422-00074.warc.gz
en
0.960738
3,938
2.515625
3
We’re dependent upon and affected by other people, things, and events. Some help us directly and some indirectly by teaching us valuable lessons. We should be grateful to them. Research tells us that gratitude makes us happy and healthy. It also helps bond with other people and spread happiness and a positive atmosphere. Here’s how you can be grateful in your daily life in this re-published post. ~ Ed. How can you be grateful every day? Do you find it easy to be grateful or express your gratitude? I think being grateful is an attitude that we need to cultivate daily. You can learn to be grateful for just about anything that comes your way. Begin with the small things first, or things that happen every day that you appreciate. Such things to be grateful for can be like waking up to a new day. Or being grateful for your health, kids, home, parents, job, phone, nature, birds, comfy bed, laughter, and having each other. Being grateful helps us grow, evolve, and feel better. Even research reveals that gratitude improves well-being, mental and physical health, and helps you get on in life. “Let us be grateful to people who make us happy; they are the charming gardeners who make our souls blossom.” ~ Marcel Proust An Overview of Contents Why Do We Need to Be Grateful and Give Thanks We give thanks to acknowledging someone else’s goodness and express our gratefulness. We thank others when they do good things for us, though even the bad ones teach us lessons in return. Hey! It’s Thanksgiving! Just as the word indicates – “Thanksgiving” has two words, ‘thanks’ and ‘giving’, and that’s what we need to do – thank others and learn to be giving. Thanksgiving is a time when family and friends gather together to enjoy. They share a meal and take time to reflect on the things they are thankful for. I love the spirit in which it is celebrated, and I wish all my friends who celebrate it – a very Happy Thanksgiving. I personally like every day to be full of gratitude and giving. Not to mention that you need to instill gratitude in your kid’s too! “Feeling gratitude and not expressing it is like wrapping a present and not giving it.” ~ William Arthur Ward 10 Ways to Be Grateful Daily You too can cultivate the habit of gratitude every day by learning to be grateful and make it a part of your daily life and routine. Try the following ways: Keep a Gratitude Journal I know many of my friends keep a gratitude journal, though some write it daily, while others maintain a weekly one. Just write down what you feel thankful for. Also, mention the benefits that come from writing things you appreciate. It’s kind of a visual reminder that you can reflect back on often. Some of you might prefer writing a gratitude letter to a person. It might be to someone who has had a positive influence in your life, but whom you’ve not thanked properly. Have a Grateful Attitude There are times when you come across problems or issues in your life. You need to re-frame them by keeping an affirmative attitude. Just remain grateful and positive even for such times. Take such problems as challenges and opportunities to make you better. Don’t fear your failures; instead, be grateful that you are given the chance to make them stepping stones to your success. Sometime you might tend to compare your life to others and feel you aren’t lucky or you don’t have the LUCK factor in your life. You need to make positive comparisons instead. Think about what you have in your life that others don’t have, and be grateful for those things. You should be grateful to each and everything in life. It’s not that you’ve to be grateful for only the big things in life. In fact, there’s nothing too small to be grateful for. Develop a habit to appreciate anything and everything that you’ve in life. Don’t compare but just value them. Take nothing for granted. Initially, you would need small reminders to start cultivating an attitude of gratitude. Things like alarms in your phone, post-its on your mirror, or family and friends can remind you what is it that you want to be thankful for. Learn to be grateful daily and make it part of your life. You need to integrate it into your daily schedule till it becomes natural or second nature to you. If you’re grateful, then let the people know about it, if you can. By expressing yourself you not only increase your level of happiness but also make the person at the receiving end happy. Make it a habit to say thank you, as many times and as often as you can. Care for your loved ones whom you’re grateful to and spend time with them. Appreciate and praise whomever you’re thankful for and you’ll feel the happiness within and all around you. A way to express gratitude is to volunteer and give back to the community. Volunteering is known to increase the well-being quotient within us. It has been researched that those people who frequently take part in volunteering activities are at the least risk of depression in life. You help yourself by helping others. But that’s not why you’re helping; it’s just because you feel like and you get happiness as a return gift! Humility and modesty make you more compassionate. Needless to say, if you’re humble you’ll be more grateful. Live with an attitude of gratitude towards all big and small things or people in life. Life is filled with seemingly ordinary and small moments that if you reflect upon help you immensely directly or indirectly. Humbly accept and appreciate them and feel grateful for them in your life. Practice Gratitude Before Meals The meal that you eat is facilitated by many people and animals. If it weren’t for them, you would be left hungry and weak. It’s a good thing to thank them all the first thing when you sit down for a meal. You can even make the mealtime as an opportunity for all to express their gratitude to whatever and whomever they feel grateful to. Reflect On Your Day at Bedtime Last but not least, recall the events of the day just before going to sleep and be thankful to all who helped you. Be thankful to all the good and bad events for helping you learn valuable lessons. Researches prove that if you come to a truce and be peace with yourself and others before sleeping, you sleep with a light heart and that would help in falling asleep and have a sound sleep. Make Gratefulness a Part of Yourself Besides these, just learn to relax and make your life easy. That’s because you cannot be grateful when you are angry, anxious, or frustrated. Take each day as it comes by living in the moment, without going back to your past or thinking about the future. Be grateful for such life’s moments, and learn to treasure and value them because such moments will never return. Value your relationships, and bring in more of affection, laughter, and joy into your daily lives. These are the things to be grateful for every single day. “Let us rise up and be thankful; for if we didn’t learn a lot today, at least we learned a little, and if we didn’t learn a little, at least we didn’t get sick, and if we got sick, at least we didn’t die; so, let us all be thankful.” ~ Buddha What Am I Grateful For Ah…my list is quite endless though I will try to keep it short. When you want to be grateful, you can – for anything, whether it’s big or small, good or bad. I am grateful to the Almighty for everything. I need to express my gratitude to my family and friends who have always been supportive and there for me – all the time. Most of all for being healthy, having a roof over my head, and being financially stable. Besides, I remain grateful for having food to eat and to be able to help others. I am also grateful to everyone I’ve come across because I’ve learned more about life and being a better person myself. And it’s often the rough or tough ones that teach you the best – isn’t it? We tend to be grateful for things that make us feel good, but we need to also learn to be grateful for those that don’t. “There is always, always, always something to be thankful for.” ~ Author Unknown So, I am also grateful for: - Pain – because that has taught me to love life more. - People or things that hurt me – because then I am able to learn more about patience, tolerance, and compassion. - All the obstacles that come my way – because they are opportunities for me to get better. - People who make me angry – because that gives me a chance to grow. I learn to accept others and myself better. It reminds me to find peace within myself. It also reminds me that I am the only one who can put out that anger, and I learn more about forgiving. - Tears – for they bring out my emotions. And when that part of me is touched, I evolve into a better person. Being grateful every day isn’t tough, but it requires effort on your part. If you learn to look at what you have in your life, instead of what you don’t, you will learn to be grateful and not complain. “Be thankful for what you have and you will end up having more. But if you concentrate on what you don’t have, you’ll never, ever have enough.” ~ Oprah Winfrey Over to you – What are you grateful for? How do you express your gratitude? What suggestions would you give to be grateful every day? Share in the comments below. Join our list Subscribe to our mailing list and get interesting stuff and updates to your email inbox.
<urn:uuid:ca953457-0980-4b3c-a9ba-01781a721df7>
CC-MAIN-2020-16
https://www.aha-now.com/how-to-be-grateful-every-single-day/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370511408.40/warc/CC-MAIN-20200410173109-20200410203609-00436.warc.gz
en
0.945168
2,168
2.828125
3
Katie Sell, Ph.D. Assistant Professor, Department of Physical Education and Sport Sciences Brian Clocksin, Ph.D. Assistant Professor, Department of Physical Education and Sport Sciences In 2007 the American College of Sports Medicine (ACSM) and the American Heart Association (AHA) released physical activity recommendations that expanded on those initially endorsed by the U.S. surgeon general in 1996. Specifically, these updated recommendations state, “… all healthy adults aged 18-65 years need moderate intensity aerobic physical activity for a minimum of 30 minutes on five days each week or vigorous-intensity aerobic physical activity for a minimum or 20 minutes on three days each week” (Haskell et al., 2007, p. 1425). For children and adolescents, the current recommendations are 60 minutes of moderate intensity physical activity on a daily, or near daily basis (USDHHSUSDA, 2005). It is well understood that regular participation in physical activity can reduce the risk for numerous chronic disease conditions such as obesity, cardiovascular disease, type-2 diabetes, hypertension, and several forms of cancer (ACSM, 2005). However, obesity rates are still climbing among adults and children in the United States, despite one of the national health objectives of Healthy People 2010 to reduce adult obesity to below 15 percent nationwide (USDHHS, 2000). Recent estimates suggest that 73 percent of children and 50 percent of adults in the United States do not perform regular physical activity (CDC, 2007), and that close to 365,000 deaths each year in the United States can be ascribed to a lack of physical activity and poor nutritional balance (Mokdad, Marks, Stroup & Gerberding, 2004). For many years health professionals from physical educators and sports coaches, to physicians and exercise physiologists, have implemented all manner of programs to improve physical activity levels among both the general and specific target populations. Few of these efforts have achieved long-term success for large numbers of individuals needing improvement in their physical activity commitments and overall health. The seemingly omnipresent need for more innovative motivational tools and better intervention approaches to increase physical activity thus continues to be advocated from a governmental and institutional perspective on a national level. Last year within our own academic and surrounding communities, we expanded on and added several initiatives, laboratory and field-based, to promote physical activity through a combination of both nontraditional pursuits and “lifetime” activities in both children and young adults. Addressing Obesity Through Video Game Play The first of our research endeavors examines the utility of what some might consider a rather unorthodox mode of physical activity to serve as a viable means to meet the current physical activity recommendations outlines by the ACSM and AHA – a physically interactive video game, the Nintendo Wii Sports program (Nintendo of America Inc., Redmond, WA). Specifically, the project involves examining the average energy expenditure generated when playing 30 minutes of the Nintendo Wii Sports tennis game, which will allow for further in-depth assessment of exercise intensity, an important yet often understated component of physical fitness programming. Understandably, many people may have reservations about encouraging video game use among children and young adults, given the commonly held belief that video gaming, computer use, and television watching are positively related to physical inactivity and higher obesity levels. Indeed, research has suggested a strong negative correlation between physical activity and obesity with television watching among children (Salmon, Timperio, Telford, Carver, & Crawford, 2005), but surprising to some, a similar relationship has not been observed for physical activity and video gaming among children (Marshall, Biddle, Goreley, Cameron, & Murdey, 2004). For college students, the relationship between television watching, video gaming, and computer use is even less well established. Buckworth and Nigg (2004) suggested that as computer use, not television watching, increased among college students, the amount of moderate and vigorous physical activity decreased. The popularity of video games among children and adults, however, is clear – in 2007 alone, the U.S. video game industry pocketed approximately $18 billion, with the Nintendo Wii system becoming one of the top-selling console systems (NPD, 2008). This system represents a growing trend in video gaming, that of physically interactive video games (PIVGs) – programming that requires the player to stand and move around to bring about a desired effect on the video screen (via a handheld motion controller). Scientific and anecdotal reports support the utility of PIVGs to encourage, albeit indirectly, participation in physically active pursuits. Greater levels of enjoyment and adherence to a physical activity program have also been expressed in interventions incorporating an interactive video game (Warburton et al., 2007). Energy expenditure levels associated with playing several popular PIVGs currently on the market, such as Dance, Dance Revolution (DDR; Konami of America, Inc., Redwood City, CA) and Eye Toy (Sony Computer Entertainment of America, Foster City, CA), have matched or exceeded minimal recommendations over a 30-minute game play period (Luke et al., 2005). Results from the 2003 National College Health Assessment suggest that 32 to 47 percent of college students are physically inactive (ACHA, 2005). Although activities such as walking and cycling can be used as common models of physical activity, many college students do not report enjoyment of these traditional physical activities (Leenders, Sherman, & Ward, 2003). Identifying more enjoyable and nontraditional ways of acquiring recommended levels of physical activity has been suggested as a means to overcome the reluctance of young adults to participate in physical activity, and video game manufacturers seem to be tapping into this market with increasing fervor. Therefore, it makes sense to appeal to current trends and the interests of a given population. Even though popularity is not in question, our project will provide some initial insight into whether the Nintendo Wii Sports games can serve as a viable alternative to walking or cycling in meeting current physical activity recommendations, a claim that, despite anecdotal support, is still largely undetermined. PIVG as a Pedagogical Tool A major objective of physical education programs is to teach children a variety of motor skills that will promote future involvement in sport and physical activity. Current physical activity and obesity trends in children are disturbing – approximately 30 percent of 6-11 year olds are thought to be overweight and 15 percent obese (AOA, 2005). According to the Kaiser Family Foundation (2005), children between the ages of 8 and 18 years spend approximately 44.5 hours per week watching television or occupied on a computer or video gaming system. While these statistics are frightening, electronic media do offer a potentially viable learning medium for the presentation of skill practice, development, and reinforcement. The process of skill acquisition is limited without adequate practice opportunities in a developmentally appropriate setting that provides progression and application of skills. The Nintendo Wii Sports tennis game, when combined with physical education instruction, provides a medium through which to practice tennis-specific skills while receiving feedback from a teacher. As a PIVG, the Nintendo Wii Sports tennis game has the capability to simulate competitive tennis play and to practice a wide variety of strokes (forehand, backhand, overhand, and lob) in a training/non-competitive situation. Other PIVGs, such as DDR, have shown the potential to link integrative technology and physical activity in physical education curricula with enthusiastic responses from students. If the Nintendo Wii system can be used as a tool to aid in skill acquisition, then it may help facilitate learning in physical education settings and encourage participation in lifetime physical activity. Our second line of inquiry targets the potential application of PIVGs as a teaching tool to promote leisure time physical activity and enhance physical education instruction. Beginner college aged tennis players will be randomly assigned to one of four conditions (Wii + court practice, Wii practice only, court practice only, control) to explore the efficacy of the Nintendo Wii Sports tennis game to elicit improvements in backhand groundstroke performance. From the Laboratory to the Field Transferring research to practice is essential if we are going to have a meaningful impact on the physical activity and adiposity levels of children and young adults. With many schools reducing the amount of time students participate in physical education, it is becoming increasingly important to provide additional physical activity opportunities in after-school programming. The transition from laboratory to field-based intervention is not without challenges, as schools adapt to the outcome-based requirements mandated by No Child Left Behind. It has become increasingly more difficult to gain access to schools for interventions targeting physical activityrelated, non-academic endeavors. Club Hofstra: Academic, Athletic, and Mentoring Programs (CHAAMPs) is a grant-funded (United States Tennis Association’s Tennis and Education Foundation) collaborative project between Hofstra University and Uniondale’s Walnut Street Elementary School designed to promote academic, athletic, and social development of third- through fifth-grade students. The CHAAMPs program expanded on a successful after-school math academy that has been in place at Walnut Street Elementary for the last five years and a “Moving With Math” integrated physical activity and math program piloted in spring 2007. CHAAMPs provides 150 third- to fifth-grade students with opportunities to find success in being physically active, learn about personal and social responsibility, and receive tutoring for preparation for the New York state exams in mathematics and reading. As part of the program, 25 high school and college students serve as mentors in the reading and after-school programs. The purpose of CHAAMPs is threefold: 1) To provide an innovative academic mentoring program for low performing third-, fourth- and fifth grade students. 2) To provide an integrated youth development and athletic skills program. 3) To develop mentoring skills in high school and college students. The program has five goals: 1) To improve students’ math and reading performances on New York state examinations. 2) To improve students’ self-efficacy toward math and reading. 3) To improve personal and social responsibility. 4) To increase physical activity and motor skills while decreasing obesity levels. 5) To develop mentoring skills in high school and college students. Using Physical Activity to Develop Math Skills Our partnership with Walnut Street Elementary School began as an experiment to combine math skills with physical activities. Moving With Math utilized physical activity to reinforce math concepts in third- though fifth grade students. In partnership with the Math Learning Academy, physical activities were developed that focused on math concepts such as developing and interpreting graphs. Students learned how to apply concepts in their daily lives while being physically active. For example, third graders learned to interpret (perform warm-up activities that match the graph) and create (take results from physical activities) bar graphs. The fifth graders wore pedometers (small mechanical devices that record the number of steps taken), determined their stride length, and calculated distance traveled to determine perimeters and areas of shapes created in the gymnasium. Using Physical Activity to Develop Personal and Social Responsibility Our programs at Walnut Street Elementary School are grounded in a personal and social responsibility model developed by Hellison (1995). The model has routinely been used in physical activity settings (Hellison, 2000; Shilling, 2001; Watson, Poczwardowski, & Eisenman, 2000) to encourage responsibility in children and young adults. The model identifies five levels of responsibility (irresponsibility, self-control, participation, selfdirection, and caring) that students can exhibit (Hellison & Templin, 1991). Students in our programs are routinely asked to self-evaluate their level of responsibility and are provided with opportunities to exhibit responsibility for themselves and others. The activities we select and the discussions we have with participants focus on respecting themselves and others. Developing Mentoring Skills in Adolescents and Young Adults The final component of our program is the development of mentoring skills in young adults. Using a service learning framework, mentors are provided with opportunities to collaboratively work with students in academic and physical activities. Our goal is to develop a commitment to service in young adults while providing authentic learning experiences. A partnership with the Mentoring Partnerships of Long Island has been established to provide additional training to mentors. American College Health Association (ACHA) (2005). American College Health Association National College Health Assessment (ACHA-NCHA): Spring 2003 reference group report. Journal of American College Health, 53, 199-210. American College of Sports Medicine (ACSM). (2005). ACSM’s Guidelines for Exercise Testing and Prescription (7th ed.). Philadelphia, PA: Lippincott Williams & Wilkins. American Obesity Association (AOA) (2005). Fact sheet: Obesity in youth. Accessed on March 11, 2008, from http://www.obesity.org/subs/fastfacts/ obesity_youth.shtml. Buckworth, J., and Nigg, C. (2004). Physical activity, exercise, and sedentary behavior in college students. Journal of American College Health, 53, 28-34. Centers for Disease Control and Prevention (CDC) (2007). Morbidity and Mortality Weekly Report, 56, 1209-1212. Haskell, W.L., Lee, L-M., Pate, R.R., Powell, K.E., Blair, S.N., and Franklin, B.A. (2007). Physical activity and public health: Updated recommendation for adults from the American College of Sports Medicine and the American Heart Association. Medicine and Science in Sport and Exercise, 39, 1423-1434. Hellison, D. (1995). Teaching Responsibility Through Physical Activity. Champaign, IL: Human Kinetics. Hellison, D. (2000). Physical activity programs for under served youth. Journal of Science and Medicine in Sport, 3, 238-242. Hellison, D., and Templin, T.J. (1991). A Reflective Approach to Teaching Physical Education. Champaign, IL: Human Kinetics. Kaiser Family Foundation (2005). Generation M: Media in the lives of eight to eighteen year olds. Accessed on March 11, 2008, from http://www.kff.org/entmedia/entmedia0 30905pkg.cfm. Leenders, N.Y.J.M., Sherman, W.M., and Ward, P. (2003). College physical activity courses: Why do students enroll, and what are their health behaviors? Research Quarterly in Exercise and Sports, 74, 313-318. Luke, R.C., Coles, M.G., Anderson, T.A., and Gilbert, J.N. (2005). Oxygen cost and heart rate response during interactive whole body video gaming. Medicine and Science in Sports and Exercise, 37, S239. Marshall, S.J., Biddle, S.J.H., Goreley, T., Cameron, N., and Murdey, I. (2004). Relationship between media use, body fatness and physical activity in children and youth: A meta-analysis. International Journal of Obesity, 28, 1238-1246. Mokdad, A.H., Marks, J.S., Stroup, D.F., and Gerberding, J.L. (2004). Actual causes of death in the United States, 2000. JAMA, 291, 1238-1245. NPD Group, Inc. (NPD) (2008). 2007 U.S. video game and PC game sales exceed $18.8 billion marking third consecutive year of recordbreaking sales. Accessed on March 11, 2008, from http://www.npd.com/ press/releases/press_080131b.html. Salmon, J., Timperio, A., Telford, A., Carver, A., and Crawford, D. (2005). Association of family environment with children’s television viewing and with low level of physical activity. Obesity Research, 13, 1939-1951. Shilling, T.A. (2001). An investigation of commitment among participants in an extended day physical activity program. Research Quarterly for Exercise and Sport, 72, 355-366. Trout, J., and Zamora, K. (2005). Using Dance Dance Revolution in physical education. Teaching Elementary Physical Education, 16, 22-25. U.S. Department of Health & Human Services (USDHHS) (1999). Promoting Physical Activity: A Guide for Community Action. Champaign, IL: Human Kinetics. U.S. Department of Health & Human Services. (2000). Healthy People 2010: Understanding and Improving Health (2nd ed.). Washington, DC: U.S. Government Printing Office. U.S. Department of Health & Human Services and U.S. Department of Agriculture (USDHHS-USDA) (2005). Dietary Guidelines for Americans, 2005 (6th ed.). Washington, DC: U.S. Government Printing Office. Warburton, D.E.R., Bredin, S.S.D., Horita, L.T.L., Zbogar, D., Scott, J.M., Esch, B.T.A., and Rhodes, R.E. (2007). The health benefits of interactive video game exercise. Applied Physiology, Nutrition, and Metabolism, 32, 655- 663. Watson, D.L., Poczwardowski, A., and Eisenman, P. (2000). After-school physical activity programs for adolescent girls. Journal of Physical Education, Recreation and Dance, 71(8):17-21.
<urn:uuid:bf5e6cf3-137e-4ca2-bc1e-b3ea602ca31b>
CC-MAIN-2020-16
https://news.hofstra.edu/2007/11/09/promoting-physical-activity-and-learning-in-laboratory-and-field-based-research/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497042.33/warc/CC-MAIN-20200330120036-20200330150036-00236.warc.gz
en
0.914135
3,636
2.828125
3
Categories of Students with Disabilities A disability is a condition that affects individual’s normal functioning, either physically or mentally. Disability can also affect senses of a person. However, disability should not be considered as an inability or a sickness. Most children with disabilities can do work, learn, play, and enjoy their lives. Moreover, they can feel themselves well and remain in good conditions. With mobility aids and functioning assistance, children with disability can also become greater people in the society. Types of disabilities exhibited by children include ADD, Autism AND Cognitive or Intellectual disabilities. Children also exhibit emotional or behavioural disorders. Furthermore, they may also experience learning disabilities and communication disorders. Attention deficit hyperactivity disorder (ADHD) commonly known as attention deficit disorder (ADD) appears during early childhood. ADD makes it difficult for a child to inhibit his or her spontaneous responses. It may be normal for a regular child to forget to do classroom assignment, daydream in class or act without thinking. However, such actions can also be signs of ADD. Myths and Facts about ADD Myth 1: All children with ADD are hyperactive. Fact: Some kids with ADD are hyperactive. However, they are not overly active hence, tend to be unmotivated and distanced from their fellows. Myth2: Children with ADD can never pay attention in class. Fact: Kids with ADD often pay attention to activities that they enjoy. However, they have difficulties in maintaining focus, especially when the matter at hand is repetitive or boring. Myth 3: Children with ADD can behave better if they want. Fact: Children with ADD may try as much as possible to be good. However, they cannot manage to stay quiet, sit still or even pay attention. They may appear disrespectful but it does not mean that they act interdentally. Myth 4: Children will eventually grow out of ADD. Fact: ADD can continue into adulthood. However, treatment can help children with ADD learn how to minimise or manage their symptoms. Myth 5: The best treatment option for ADD is medication. Fact: Often, medication is prescribed for ADD. However, it is not the best option. Education, home, and school support, behaviour therapy, proper nutrition, and exercises are also effective treatments for ADD. Characteristics for ADD Virtually all individuals with ADD have challenges and portray the following traits in a non-ADD community: - Motor activity. - Structure problem. Such characteristics may be expressed in adults in three ways. Often, individual suffering from ADD periodically fall into at least one of the three categories. However, they can combine three of the following forms. Form I: Outwardly Expressed ADD- The Active Entertainer ADD feelings are shown openly and actively. Activity and impulsivity are expressed. People with such type of ADD usually succeed in entertainment, sales, entrepreneurship or any other field that requires energy and quickness. They experience difficulty with high risk taking, long time projects, over-achievement, mood swings, temper control, putting too much blame on others, acting own way, reactivity, frustrations, disruptiveness, and maintaining relationships. Form II: Inwardly Directed ADD- the Restless Dreamer Under such form, people with ADD display their behaviours and feelings actively. They subtly express impulsivity and impatience. People with ADD can succeed in utilising creativity, mechanical, service-oriented, and technical jobs. However, they have difficulties with under-achievements, under-activities, over-commitments, dreaming, too much empathy, excess self-blame, depression, indecision, distractibility, task completion, ending bad relationships and failure to follow dreams. Form III: Highly Structured ADD – The Conscientious Controller People with ADD tend to work strictly within the structure. Change of structure makes them feel out of control. They are always demanding and anxious. Children with the given type of ADD usually succeed in accounting, military, and any other field that utilises computers. However, they have difficulty with an unstructured setting, talking, recovering from interactions, over-organization, demanding own way, negotiating, cooperation, over focusing, temper control, rigidity, being judgmental, and need to control. Autism is a lifelong development disorder that influences on how a person communicates or relates to other individuals. It also tampers the word formation of people. Autism is a spectrum condition. The condition means that even though individuals with autism share difficulties, impacts of the situations are always expressed differently from person to person. While other people with the disorder may live independently, others have accompanying learning disabilities and hence, they require a lifetime of specialist support. People with autism may also experience over- or under-sensitivity to taste, touch, sounds, light or colours. One of the forms of autism is asperger syndrome. People with such type of syndrome are always average or slightly above average in class work. They have few difficulties in talking. However, they experience difficulties in understanding and interpreting a spoken language. Students with autism respond to the nature of the world as a mass of people, events, and places. They struggle to make senses about the structure of the world. Such efforts can make them anxious. In particular, they find it difficult to understand and socialize with other people in family, cultural or social life. Autism constitutes part of the autism spectrum. For this reason, it has been referred to in some cases as an ASD disorder. Individuals with autism share three main difficulties referred to as ‘triad of impairments’. They include difficulty with social communication, difficulty with social interaction, and difficulties with social imaginations. Characteristics of Autism It is important to note that no one can exhibit all of the characteristics of autism because each condition has its peculiarities. People with autism have to struggle with many issues in most categories. Observable characteristics include: - Little or no eye contact. - Distance from touch. - Do not share experiences and observations with others. - Difficulty in utilising group discussions. - Making inappropriate but honest judgements. Use of inappropriate pronunciations in communications, high vocabularies, difficulty in talking in a low tone or whispering are also characteristics of intellectual disabilities (Taylor & DeQuinzio, 2012). Others include repetitive play, verbal outbursts, and difficulty with sudden or loud sounds. People suffering from autism can become overwhelmed with numerous verbal directions and express short attention span during class lessons. Cognitive (Intellectual) Disabilities A person’s cognitive ability may be affected by various conditions. It is a broad concept that comprises of various cognitive deficits, such as intellectual disabilities, specific conditions and problems that may be acquired later in life due to brain injuries of neurodegenerative diseases, such as the dementia. The disability can appear at any age of a person’s life. Intellectual disabilities or mental retardation as being referred to by some people is a group of disabilities that is defined by diminishing adaptive and cognitive developments. Many intellectual disabilities are based on biological processes within the person, such as traumatic brain injury or genetic disorder. Other intellectual disabilities may be located within the brain. People with more profound intellectual disabilities often require assistance with aspects of daily living. On the other hand, people with minor learning difficulties may function adequately despite their condition. However, they may reduce their functionality if the problem is not diagnosed. Types of Cognitive Disabilities Dyslexia is the most common type of language-based disabilities. Primarily, it is a reading disability. It is related to generic problems and is believed to be inherited. It is a condition that makes a person experience difficulties in single word decoding and often reflects inadequate phonological processing ability. An individual suffering from dyslexia may have difficulties in different forms of reading, language, word spelling, and writing. Attention Deficit Hyperactive Disorder (ADHD). ADHD is a medication condition that tampers with a person’s ability to focus or pay attention to the event. People who are suffering from ADHD often experience troubles. Such type of autism starts in childhood and may not be diagnosed until an individual reaches the adolescent stage. People suffering from it do not complete tasks, and tend to jump from one activity to another. Their forgetting power is very high and they are poor in following instructions. People suffering from the condition fell restless and are poor in organising or arranging substances. Brain injury can result from a number of factors, including illness, stroke, brain tumors, TBI, and meningitis. Brain injuries are unique and it is difficult to notice how a particular brain injury can impact the person’s memory. Following a brain injury, medical experts and psychologists perform a variety of tests to determine the part of the brain that is suffering. The extent of damage to a person’s brain determines how subsequent information is processing. Such type of disorder affects people individually. They include Down syndrome, Autism, and Dementia. For instance, a person with Dawn syndrome may struggle to the point of being independent in life. However, individuals with other syndromes must be assisted. Characteristics of Intellectual Disabilities All intellectual impaired individuals have one thing in common and that it the disability. The physical characteristics include physical underdevelopment, physical deformation, irregular locomotion, and poor balance, as well as low weight and height compared to intellectually upright individuals. Additional features include: - Mental features include below average I.Q. - Underdeveloped language skills and poor memory. - Thinking and perception. - They also have social characteristics, such as low self-esteem. - Aloofness and irresponsibility. Intellectual disorders are also characterised by emotional traits, i.e., emotional imbalance, excess movements, and late or premature reactions. Emotional/ Behavioural Disorders (EBD) Emotional and behavioural disorders are the reasons that lead to taking children into mental health facilities. There are various types of emotional disorders. They include anxiety, dissociative, disruptive behaviour, pervasive development, and emotional disorders. EBD affects an individual’s ability to have fun, pay attention at school, and control emotions. Symptoms of EBD are, having emotions under normal situations, learning difficulties that are not caused by any other health factor, general feeling of depression, difficulty with interpersonal relationships, including relationships with peers and teachers, and feeling of anxiety and fear. Characteristics of Emotional / Behavioural Disorders Emotional / Behavioural Disorders are characterised by: inability to create and maintain interpersonal relationship, inability to learn. They may also be characterized by the following features: - Sensory factors cannot explain such disability. - Consistence sad mood. - The tendency to develop physical symptoms. - Unconditional fear due to personal or school problems. Specific Learning Disabilities Specific leading disability (SLD) is a disorder in either one or more basic psychological processes involved in using or understanding language, as well as written or spoken activities. The disability may manifest in the poor thinking ability, writing, reading, speaking, spelling or calculating mathematical expressions. It includes conditions such as brain injury, dyslexia, minimal brain dysfunctions, and development emphasis. Characteristics of Specific Learning Disabilities Students with learning disabilities are heterogeneous, meaning that two children cannot possess the same strengths and weaknesses. A child may have a deficit in one area, while others may experience the impairment in many areas. Over time, professionals and teachers have developed listings of characteristics of specific learning disabilities. They include: - Academic challenge. - Attention disability. - Poor motor capabilities. - Oral language disorders. - Shortage of cognitive strategies required for efficient learning. They may also express mathematical disorders, social deficit, reading and writing problems, and psychological process deficit. Speech and Language Disorders Speech and language disorders refer to challenges in communication and related areas i.e. oral motor function. The delays and disabilities start from basic sound to the real problem of using language for functional speaking. Some causes of language impairments are hearing loss, brain injury, drug abuse, mental retardation and physical challenges, such as palate or vocal problems. A student’s language is considered delayed if he or she is behind other children in the acquisition of communication skills. Characteristics of language and speech impairments are: - Having a difficulty with expressive and receptive vocabularies. - Use of improper order of words in sentences. - Absolute different language skills compared to peers of the same sex, ethnicity origin or age. - Off-topic during class discussions and difficulty in responding to ‘wh’ questions. - Children with language and speech impairment are also poor in word pronunciations. - Difficulty or immature sentences constructing. Effects of Various Medications There are many types of medications used by students to respond to their disabilities. The most common used are strattera, aripiprazole, risperidone, acetylcholinesterase inhibitors and concerta. Strattera, also referred to as atomoxetine, is a non-stimulant medication. It is also approved by the FDA as a drug that can be used to treat ADD. Strattera is different from other stimulants in that it boosts the norepiphrine level in the body. It also has longer medical effect than other stimulants, lasting for over 24 hours. Its long lasting effect is the main reason as to why it is considered a good option, especially with people who have difficulties in going in the morning. It is also preferred by students who are suffering from depression because it contains some antidepressant traits (Bender, 2010). However, it is not the best medicine for treating symptoms of hyperactivity. Effects of Strattera include sleepiness, mood swings, dizziness, nausea and vomiting, and headache. It can also cause appetite suppression and insomnia. Aripiprazole is an anti-psychotic medication, commonly used by students to treat symptoms of autism. It can also be combined with other drugs and used to treat serious depressions in adults. The main action of ariiprazole is not known. However, just like other antipsychotics, it has the ability to block receptors of the brain nerves for several neurotransmitters. Most common effects of aripiprazole include drooling, difficulty with speaking, lack of body balance, shuffling walk, restlessness, and stiff limp (Rosa et al., 2015). Risperidone is a type of medication mainly used to treat schizophridone, such as adolescent schizophrenia. It can also be used to treat the manic and mixed states of bipolar disorder, and irritability in students with autism. It can be represented in as a solution, tablet, and as an orally disintegrated tablet. It can be taken with or without food once or twice a day. It is always advisable to take it at the same interval of time. There are many effects of risperidone. The most impacts include nausea, diarrhoea, dry mouth, drowsiness, dizziness, too much saliva, heartburn, and constipation. Acetylcholinesterase inhibitor is a type of drug that is used to prevent an acetyl-cholinesterase enzyme from braking down acetylcholine. Therefore, it increases the level and duration of the neurotransmitter acetylcholine action. As a medicine, it is used to treat glaucoma, while as an antidote it used to cure toanticholinergic poisoning. Additionally, it may be used in treating other mental disorders (Glover, 2014). Side effects of the medication are hypotension, decrease intraocular pressure, Gi tract hyper-motility, bronchoconstriction, and rapid eye movement sleep. Concerta, also known as methylphenidate, is a stimulant for a central nervous system. It impacts chemicals in the nerves and brain that lead to hyperactive and impulse control. There are numerous effects of concerta that occur when an under-dose or overdose of it has taken place. However, there are other side effects that come irrespective of any of the cases. Some of them include lack of appetite, a sense of anxiety, sleepy problem, abdominal pain, headache, and nausea (Ashcroft et al., 2015).
<urn:uuid:0bd91dc2-3629-4ab3-9828-fb78f45dd3d6>
CC-MAIN-2020-16
https://custom-writing-expert.com/free-essay/learning-disabilities/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371824409.86/warc/CC-MAIN-20200408202012-20200408232512-00036.warc.gz
en
0.951694
3,375
3.96875
4
BLM Lesson Series Part 1: It’s been almost two years since Black Lives Matter, the social protest movement against "the disproportionate impact of state violence on Black lives" emerged to develop into an influential social and political force. (The quote from the Black Lives Matter website.) From its inception, the movement has been a prominent force on social media, disseminating information that had previously been deemed un-newsworthy by traditional news outlets. It has since found inroads in the traditional mainstream media and has even become a force to be reckoned with in the 2016 presidential race, as candidates have been adjusting to a changing political landscape that has to take into account the needs and demands of minority communities in unprecedented ways. In the lesson below, and two others to follow, we’ll take a close look at the Black Lives Matter movement, why and how it came into being, and what it has evolved into. We’ll also look at some of the criticism it has received and the movement’s next steps. Before beginning these lessons, you may want to review these guidelines for teaching about difficult or controversial issues. - Lesson 1: Black Lives Matter: Introduction - Lesson 2: "All Lives Matter" versus "Black Lives Matter" - Lesson 3: What Is "Black Lives Matter" Working Towards? Background for the Teacher: The hashtag #BlackLivesMatter was created around the time of George Zimmerman’s acquittal in the shooting death of Trayvon Martin in July 2013. It lay somewhat dormant until the shooting death of Michael Brown in early August of 2014—a young man of color, shot and killed by a white police officer Darren Wilson in Ferguson, MO. But it wasn’t till November 25, 2014, when the news not to indict Darren Wilson came out, that the hashtag gained real traction and went mainstream. In the first 20 hours of that day, #BlackLivesMatter was used to send around 10,000 tweets. But in the four hours that followed the verdict, the twittersphere lit up: 92,784 tweets were sent using the hashtag. #BlackLivesMatter was to become a force to be reckoned with. (See this NPR Codeswitch article for more.) Since those early days of online activism, Black Lives Matter has evolved into a movement that is now as much physical as it is digital. It is not a traditional movement with a centralized system of leaders, headquarters or appointed spokespeople. It sees itself more as a diffuse ideological and political intervention in a world where systemic racism and structural inequality fail to be sufficiently acknowledged or addressed. The vast inequalities left by a legacy of slavery are once again brought into the public eye by a social movement that is fighting inequality and injustice while also affirming "Black folks’ humanity, our contributions to this society, and our resilience in the face of deadly oppression." (https://blacklivesmatter.com/herstory/) Though the hashtag is separate from the Black Lives Matter organization and movement, it is often used in in the organizing, mobilizing, momentum building and reporting of events and interventions. On August 1, 2016, a coalition or organizations with affiliations to Black Lives Matter called the Movement for Black Lives released a detailed platform of demands. These were soon tweeted on social media using the #BlackLivesMatter hashtag. #BlackLivesMatter has connected people from around the U.S. (and beyond) with the goal of ending various forms of racial injustice, while also seeking to celebrate and humanize Black lives. This lesson uses tweets to introduce students to the origin and motivations behind Black Lives Matter. Print out several copies of these tweets (#BLM tweets pdf here) - enough for several small groups in your classroom to consider. Also print out the quotes that follow the tweets, which students will read out loud. An additional activity has students consider the movement’s core principles by posting them around the room, with explanations of each principle hidden underneath. This requires preparation. The principles and descriptions are reproduced in this pdf. Print out the pdf and cut the pages to separate the different principles. When the time comes, you’ll post these around the room with the heading on top and in view, with the corresponding description folded underneath. Gathering: Black Lives Matter web Invite students to share any associations they have with the phrase "Black Lives Matter." Chart their associations in a web (or other visual representation). Elicit associations while interest remains high, then invite students to look over the web and discuss it using some or all of the following questions: - What do you notice about what’s written on the chart? - Are there any similarities? Differences? - Is there anything on here that surprises you? - Is there anything on here that you have questions about? Explain that in today’s lesson you’ll be looking more closely at the hashtag #BlackLivesMatter and the movement that sprang from it. Elicit and explain that over the past few years, police violence against mostly young men of color has entered the mainstream news cycle with great immediacy. Video footage, shot mostly on private cellphones and broadcast on social media, has helped bring to light what communities of color have long been trying to expose - what Black Lives Matter calls "the virulent anti-Black racism that permeates our society" (http://blacklivesmatter.com/about/). Through Twitter and the hashtag #BlackLivesMatter, activists were able to disseminate information directly to millions of people, bypassing the traditional mainstream media, which, until Black Lives Matter, had mostly ignored police violence in black communities. #BlackLivesMatter turned names like Mike Brown, Eric Garner, Tamir Rice, Walter Scott, and Philando Castile into household names while raising awareness beyond communities of color about the systemic racism and structural inequality that black and brown Americans experience on a daily basis. As the #BlackLivesMatter hashtag gained momentum, it soon turned into a movement that continues to grow and evolve to face and address real world needs, beyond the digital world it sprang from. What is Black Lives Matter? Why was it created? Break students into small groups and give each group a copy of the these #BLM tweets. Ask them to discuss these questions in their groups: - What are your thoughts and feelings about these tweets? - What do you think they are in reference to? - What do you know about #BlackLivesMatter and why it was created? The following quotes about the background and goals of #BlackLivesMatter are taken from the Black Lives Matter website. Print out the following quotes and invite volunteers to read them loud. - #BlackLivesMatter was created in 2012 after Trayvon Martin’s murderer, George Zimmerman, was acquitted for his crime, and dead 17-year old Trayvon was ... placed on trial for his own murder. http://blacklivesmatter.com/about/ - #BlackLivesMatter is a call to action and a response to the ... anti-Black racism that permeates our society. http://blacklivesmatter.com/about/ - #BlackLivesMatter is working for a world where Black lives are no longer systematically and intentionally targeted [and killed] .... http://blacklivesmatter.com/about/ - [#BlackLivesMatter] affirm[s Black] contributions to this society, our humanity, and our resilience in the face of deadly oppression. http://blacklivesmatter.com/about/ - [Beyond the hashtag, founders of #BlackLivesMatter] created the infrastructure for this movement ...—moving the hashtag from social media to the streets. http://blacklivesmatter.com/herstory/ - [Black Lives Matter, is trying to] broaden... the conversation around state violence to include all of the ways in which Black people are intentionally left powerless at the hands of the state. We are talking about the ways in which Black lives are deprived of our basic human rights and dignity. http://blacklivesmatter.com/about/ - The call for Black lives to matter is a rallying cry for ALL Black lives striving for liberation. http://blacklivesmatter.com/about/ - #BlackLivesMatter has connected people across the country working to end the various forms of injustice impacting our people. We’ve created space for the celebration and humanization of Black lives. http://www.thefeministwire.com/2014/10/blacklivesmatter-2/ Divide students into small groups to discuss the following questions: - What are your thoughts and feelings about Black Lives Matter, based on this information? - What did you learn about Black Lives Matter that you didn’t know before? - What questions do you have about #BlackLivesMatter, the hashtag, and Black Lives Matter, the movement? Back in the large group invite students to share out some of the points that were made in their small groups and facilitate a large group discussion around the issues raised. Invite students to come up with any questions they have about Black Lives Matter. Additional activity if time allows Black Lives Matter guiding principles Note: Depending on the work you’ve done with your group, you may consider reviewing the meaning of the words used in the principles (or only use the principles you think students will already understand.) Alternatively, let students experience the activity without this advance preparation, but encourage them to share their questions (as the activity suggests). Make sure you return to these questions as the group continues to convene. Print out a copy of these Black Lives Matter principles. Post the principles around the room, with the descriptions folded underneath so that students will only see the principles at first, not the descriptions. Explain that these principles are at the core of the BLM movement. Ask students to define what a principle is. Elicit and explain that a principle, according to Merriam-Webster, is - a moral rule or belief that helps you know what is right and wrong and that influences your actions - a basic truth or theory : an idea that forms the basis of something Ask students to think about a particular community, whether it’s their own school community, the neighborhood or city they live in or the U.S. at large. In this context, ask them what principle are they most drawn to, for whatever reason. It could be because they have questions about it, because they feel this is the most important principle in the given context, or because they think that the school, neighborhood, city or country should do a better job upholding this principle. Invite students to stand by the principle they feel most drawn to. In the small groups now standing by different principles, invite students to open up the description of the principle posted below, read it, then discuss among themselves some or all of the following questions: - Why were they drawn to this principle? - What is it about this principle that spoke to them? - What questions do they have about this principle? - How do they see it relating to other principles around the room? - Why do they think Black Lives Matter felt the need to explicitly create a page on their website that outlines these principles? Invite each small group to share out, in no more than a minute, the key points of what they discussed. Then convene the whole group to discuss the principles as a set, going back to the last two questions on the list above. Link the discussion back to the community you had students relate these principles to. Ask students to share one thing that stood out for them today - one thing that if they were to forget everything else they discussed today, they’d want to hold on to.
<urn:uuid:38cc37f0-dba7-47ef-a02d-1ddc6f8161f1>
CC-MAIN-2020-16
https://www.morningsidecenter.org/teachable-moment/lessons/black-lives-matter-lesson-series-part-1
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371803248.90/warc/CC-MAIN-20200407152449-20200407182949-00075.warc.gz
en
0.944083
2,459
3.28125
3
|Cryptography and Information Security Group Research Project: Threshold Cryptology| CIS members involved: Professor: Shafi GoldwasserIdea: The idea of theshold cryptography is to protect information (or computation) by fault-tolerantly distributing it among a cluster of cooperating computers. First consider the fundamental problem of threshold cryptography, a problem of secure sharing of a secret. A secret sharing scheme allows one to distribute a piece of secret information among several servers in a way that meets the following requirements: (1) no group of corrupt servers (smaller than a given threshold) can figure out what the secret is, even if they cooperate; (2) when it becomes necessary that the secret information be reconstructed, a large enough number of servers (a number larger than the above threshold) can always do it. Students: Stanislaw Jarecki, Anna Lysyanskaya A very useful extension of secret sharing is function sharing. Its main idea is that a highly sensitive operation, such as decryption or signing, can be performed by a group of cooperating servers in such a way that no minority of servers is able to perform this operation by themselves, nor would they be able to prevent the other servers from performing the operation when it is required. Motivation: In many real-life situations, we don't believe that any given person can be trusted, and we may even suspect that a big fraction of all people are dishonest, yet it is reasonable to assume that the majority of people are trustworthy. Similarly, in on-line transactions, we may doubt that a given server can be trusted, but we hope that the majority of servers are working properly. Based on this assumption, we can create trusted entities. A good example of an application whose security could be greatly improved with a threshold solution is a network Certification Authority, a trusted entity that certifies that a given public key corresponds to a given user. If we trust one server to perform this operation, then it is possible that as a result of just one break-in, no certificate can any longer be trusted. Thus it is a good idea to distribute the functionality of the certification authority between many servers, so that an adversary would need to corrupt half of them before he can forge a certificate on some public key. A certification authority is really a signature service: The public-key certificates it produces are signatures on messages that contain a description of some entity and its public key. Therefore, to implement such certification authority in a fault-tolerant threshold manner described above we need secure threshold signature schemes. There are many other function-sharing applications, including applications for distributed decryption. Threshold decryption schemes enable such operations as key recovery, organization's keys, fair sale of digital content in exchange for digital receipts; secure bidding, and secret election protocols. Goals: In the threshold setting, we would like to implement, via efficient protocols, the most secure cryptosystems and signature schemes. We would also like to make our protocols secure in the strongest possible model of faults. The following are some of the various considerations we make when modeling computer faults: [LP01] Anna Lysyanskaya, Chris Peikert. "Adaptive security in the threshold setting: From cryptosystems to signature schemes." ASIACRYPT 2001. (.ps) Threshold cryptosystems and signature schemes give ways to distribute trust throughout a group and increase the availability of cryptographic systems. A standard approach in designing these protocols is to base them upon existing single-server systems having the desired properties. Two recent (single-server) signature schemes, one due to Gennaro et al., the other to Cramer and Shoup, have been developed which are provably secure using only standard number-theoretic hardness assumptions. Catalano et al. proposed a statically secure threshold implementation of these schemes. We improve their protocol to make it secure against an adaptive adversary, thus providing a threshold signature scheme with stronger security properties than any previously known. As a tool, we also develop an adaptively secure, erasure-free threshold version of the Paillier cryptosystem. [JL99] Stanislaw Jarecki, Anna Lysyanskaya. "Adaptively secure threshold cryptosystems without erasures." Manuscript, 1999. This paper provides solutions for efficient threshold cryptosystems which are secure against adaptive adversaries even when the players cannot erase their local data. Specifically, it presents erasure-free adaptively-secure protocols for distributed key generation in discrete-log based schemes, for DSS and RSA signature generation, and for ElGamal decryption. Recently, [CGJKR99] introduced efficient adaptively-secure threshold cryptosystems whose security relies on the ability of the uncorrupted players to safely erase most of the secret data they produce during the protocol execution. However, secure erasure of data is hard to implement in practice: It requires specialized hardware and operating systems, and even then it would remain a costly operation.[L99] Anna Lysyanskaya. "Efficient threshold and proactive cryptography secure against the adaptive adversary." Manuscript, 1999. This work builds directly on the protocols of [CGJKR99] for distributed generation of keys in discrete-log based cryptosystems, and for distributed generation of DSS and RSA signatures. By introducing a few subtle but crucial modifications to these protocols, and using novel techniques in the analysis of their security, thee need to recourse to erasures in these protocols is removed. These modifications actually reduce the complexity of the adaptively-secure RSA signature generation. However, in the key generation and DSS signature generation protocols, an increase in communication and computation complexity over the efficient [CGJKR99] protocols which is sublinear in the security parameter is incurred. The sublinear increase in complexity is wholly due to the implementation of secure channels we use to make our protocols secure in the adaptive model. In contrast, the best currently known implementation of secure channels for general adaptively-secure erasure-free multiparty computation based on the DDH assumption, due to Beaver, creates an overhead which is linear in the security parameter. The contributions of [CGJKR99] are extended in two main directions: (1) for the first time in threshold cryptography, practical distributed cryptographic systems that are secure against the adaptive adversary in the concurrent setting are proposed; and (2) simple and clean methods for achieving security against the adaptive adversary are presented. The new techniques presented in this paper make it possible to extend the contribution of [CG99] and implement the threshold version of the Cramer-Shoup cryptosystem such that it withstands active attacks from the adaptive adversary. This is the most secure known practical threshold cryptosystem, since the underlying Cramer-Shoup cryptosystem is secure against adaptive chosen ciphertext attack. Note that these techniques are of independent interest because they apply to transforming virtually any discrete-logarithm-based cryptosystem into its threshold counterpart secure against the adaptive adversary.[CGJKR99] Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin. "Adaptive Security for Threshold Cryptosystems." Appeared in CRYPTO'99. This paper presents adaptively secure efficient solutions to several central problems in the area of threshold cryptography. The solutions withstand adaptive attackers taht choose parties for corruption at any time during the run of the protocol. In contrast, all previously known efficient protocols for these problems were proven secure only a less realistic static adversaries that choose and fix the subset of corrupted parties before the start of the protocol run.[CG99] Ran Canetti, Shafi Goldwasser. "An efficient threshold public-key cryptosystem secure against adaptive chosen ciphertext attack." Appeared in EUROCRYPT'99, pp.90-106 Specifically, adaptively secure solutions for distributed key generation in discrete-log based cryptosystems are provided, and for the problem of distributed generation of DSS signatures (threshold DSS). It is also shown how to transform existent static solutions for threshold and proactive RSA to withstand the stronger adaptive attackers. To solve these problems we introduce several techniques for the design and analysis of adaptively secure protocols that may find further applications. Our work directly improves on the previous results on threshold generation of keys for DLog-based systems [GJKR99], threshold DSS [GJKR96a] and threshold RSA [GJKR96b], which were all provably secure in only the non-adaptive adversarial model. This paper proposes a simple threshold Public-Key Cryptosystem (PKC) which is secure against adaptive chosen ciphertext attack, under the Decisional Diffie-Hellman (DDH) intractability assumption.[GJKR99] Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin. "Secure Distributed Key Generation for Discrete-Log Based Cryptosystems." Appeared in EUROCRYPT'99, pp.295-310. Previously, it was shown how to design non-interactive threshold PKC secure under chosen ciphertext attack (CCA), in the random oracle model and under the DDH intractability assumption. The random oracle was used both in the proof of security and to eliminate interaction. General completeness results for multi-party computation enable in principle to convert any single-server PKC secure against adaptive CCA into a threshold one, but the conversions are inefficient and require much interaction among the servers for each ciphertext decrypted. The recent work of Cramer and Shoup on single server PKC secure against adaptive CCA is the starting point for the new proposal. Distributed key generation is a main component of threshold cryptosystems and distributed cryptographic computing in general. Solutions to the distributed generation of private keys for discrete-log based cryptosystems have been known for several years and used in a variety of protocols and in many research papers. However, these solutions fail to provide the full security claimed and required by these works. This paper shows how an active attacker controlling a small number of parties can bias the values of the generated keys, thus violating basic correctness and secrecy requirements of a key generation protocol. In particular, these attacks point to the places where the proofs of security fail.Results from years 1995-1998: Based on these findings a distributed key generation protocol presented here is designed and together a rigorous proof of its security is provided. This protocol, which achieves optimal resiliency, can be used as a drop-in replacement for key generation modules as well as other components of threshold or proactive discrete-log based cryptosystems, including [HJJKY97], [GJKR96a], and in [HJKY95]. [HJJKY97] Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung. "Proactive Public Key and Signature Systems"; Appeared in ACM Security'97. We propose a proactive approach for the protection of sensitive private key operations, e.g. signatures and decryption, that are at the heart of the security of public key systems and the applications they protect (like secure communications and electronic commerce). This approach combines threshold cryptosystems (where the ability to perform these private key operations requires the cooperation of several parties, as in [GJKR96a] or [GJKR96b]) with the periodic refreshment and integrity protection of local shares (as in Proactive Secret Sharing of [HJKY95]). As a result, the only way that an attacker can get access to these sensitive operations is by breaking simultaneously into several locations during a short period of time, say a day or a week, even though the protected key may live unchanged for long terms (like few years). We present such proactive solutions for a variety of discrete log based cryptosystems including DSS and Schnorr signatures, ElGamal-like signatures and encryption, undeniable signatures, and more. We build on previous work on proactive secret sharing and threshold schemes, and develop a general methodology for the combination of many of these systems into secure proactive public key solutions.[GJKR96b] Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. "Robust and Efficient Sharing of RSA Functions "; Appeared in CRYPTO'96. We present two efficient protocols which implement robust threshold RSA signature schemes, where the power to sign is shared by N players such that any subset of T+1 or more signers can collaborate to produce a valid RSA signature on any given message, but no subset of T or less corrupted players can forge a signature. Our protocols are robust in the sense that the correct signature is computed even if up to T players behave in arbitrarily malicious way during the signature protocol. This, in particular, includes the cases of players that refuse to participate or that introduce erroneous values into the computation. Our robust protocols achieve optimal resiliency as they can tolerate up to (N-1)/2 faults, and their efficiency is comparable to the efficiency of the underlying threshold RSA signature scheme. Our protocols require RSA moduli which are the product of two safe primes, and that the underlying (centralized) RSA signature scheme is unforgeable. Our techniques also apply to the secure sharing of the RSA decryption function.[GJKR96a] Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. "Robust Threshold DSS Signature "; Appeared in EUROCRYPT'96. We show that adding robustness to the existing threshold RSA schemes reduces to solving the problem of how to verify an RSA signature without a public verification exponent. Our technical contribution focuses on solving this problem. Once a solution to this problem exists it can be applied to any existing threshold RSA signature scheme in order to achieve a robust threshold safe prime RSA signature scheme. Our solutions to the above problem are based on some interesting extensions that we devised for the information checking protocol of T. Rabin and Ben-Or, and the undeniable signature work initiated by Chaum and van Antwerpen. These extensions have some attractive properties, and hence are of independent interest. We present threshold DSS (Digital Signature Standard) signatures where the power to sign is shared by n players such that for a given parameter t, where t is less than n/2, any subset of 2t+1 signers can collaborate to produce a valid DSS signature on any given message, but no subset of t corrupted players can forge a signature (in particular, cannot learn the signature key). In addition, we present a robust threshold DSS scheme that can also tolerate n/3 players who refuse to participate in the signature protocol. We can also endure n/4 maliciously faulty players that generate incorrect partial signatures at the time of signature computation. This results in a highly secure and resilient DSS signature system applicable to the protection of the secret signature key, the prevention of forgery, and increased system availability.[HJKY95] Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. "Proactive Secret Sharing, or How to Cope with Perpetual Leakage"; Appeared in CRYPTO'95. Assuming that secret communication between the players is available, we prove the security of our protocols solely based on the hardness of forging a regular DSS signature. Secret sharing schemes protect secrets by distributing them over different locations (share holders). In particular, in k out of n threshold schemes, security is assured if throughout the entire life-time of the secret the adversary is restricted to compromise less than k of the n locations. For long-lived and sensitive secrets this protection may be insufficient. We propose an efficient proactive secret sharing scheme, where shares are periodically renewed ( without changing the secret) in such a way that information gained by the adversary in one time period is useless for attacking the secret after the shares are renewed. Hence, the adversary willing to learn the secret needs to break to all k locations during the same time period (e.g., one day, a week, etc.). Furthermore, in order to guarantee the availability and integrity of the secret, we provide mechanisms to detect maliciously (or accidentally) corrupted shares, as well as mechanisms to secretly recover the correct shares when modification is detected. Back to CIS Home Page
<urn:uuid:91df6689-6d49-435f-882a-d3650e80314e>
CC-MAIN-2020-16
http://groups.csail.mit.edu/cis/cis-threshold.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371624083.66/warc/CC-MAIN-20200406102322-20200406132822-00114.warc.gz
en
0.907455
3,413
2.765625
3
The European Union (EU) is the main humanitarian donor worldwide. The European Commission, through its Directorate General for European Civil Protection and Humanitarian Aid Operations (DG ECHO), has over the past 25 years provided funding and expertise to address needs caused by natural disasters and conflict. The Treaty of Lisbon underpins the EU’s commitment to provide assistance, relief and protection to victims of natural or man-made disasters around the world, and to support and coordinate the civil protection systems of its Member States. The humanitarian model established in the Treaty therefore identifies a clear role for European humanitarian aid to respond to needs outside of the EU. Today, however, the EU faces an unprecedented humanitarian emergency inside its own territory, raising new challenges for the European Commission. EU humanitarian assistance and refugee response Between January 2015 and February 2016, over 1.1 million people made their way to the EU, escaping conflict and poverty in their countries and seeking a better and safer life. The majority of these people used the Western Balkan route, reaching the Greek islands by boat from Turkey, continuing on to the mainland and the northern border of Greece and crossing into the Former Yugoslav Republic of Macedonia (FYROM) and then onwards to Central and Northern Europe. EU humanitarian aid has been active in countries of origin (Syria, Iraq, Afghanistan) and in countries of arrival and transit, including Jordan, Lebanon, Turkey, FYROM and Serbia. Globally in 2015, the European Commission allocated almost three-quarters of its annual humanitarian aid budget (over €1 billion) to projects helping refugees and internally displaced people. The Commission supports refugees in Turkey who have fled violence in both Syria and Iraq, with particular emphasis on vulnerable people living outside of camps. Since the beginning of the Syria crisis in 2011, the Commission has provided a total of €455 million in assistance in Turkey, including humanitarian aid and longer-term assistance. In November 2015, the EU set up the Refugee Facility for Turkey, through which EU institutions and Member States have committed to funding up to €3 billion. EU humanitarian funding in the non-EU countries along the Balkan route (FYROM and Serbia) assists refugees, asylum-seekers and migrants in need and contributes to the provision of emergency assistance in places with high concentrations of refugees, including borders and registration points. Funding of over €21m is enabling nine partners to provide people in need with key essentials such as temporary shelter, food, health services and protection, in particular child protection. Establishing a new humanitarian instrument Migration is not a new phenomenon in Europe, and European institutions have over many years developed a series of tools to address the needs faced by people on the move. To tackle the current migration crisis, the European Commission, through its Directorate-General for Migration and Home Affairs (DG HOME), mobilised two main instruments, the Asylum, Migration and Integration Fund (AMIF) and the Internal Security Fund (ISF) and the Fund for European Aid to the Most Deprived (FEAD) through its Regional Policy Directorate General (DG REGIO). When the borders along the Western Balkan route were closed in March 2016, more than 55,000 people were left stranded in Greece. To support the Greek authorities as well as international organisations and NGOs operating in Greece in managing the refugee crisis, the Commission has awarded over €345m under these instruments since the beginning of 2015. This emergency funding comes on top of the €509m already allocated to Greece under the national programmes for 2014–2020. Greece itself responded generously to the needs of refugees, both through informal private groups of volunteers and with a significant effort by the Greek government to coordinate relief efforts and provide direct assistance. In December 2015, when the situation in Greece stretched available resources beyond their limit, Greece appealed to other European civil protection agencies for help. Through the Union Civil Protection Mechanism (UCPM), coordinated by the Commission, in-kind support such as shelter, hygiene materials and medical supplies was provided to help Greece cope with the increasing number of arrivals. This request is still open, and some civil protection agencies continue to provide materials and expertise today. The magnitude of needs made it clear that an exclusive response by national authorities was not sufficient, despite the tremendous efforts made by the Greek authorities, assisted by local initiatives, to organise the reception of hundreds of thousands of refugees. The presence and engagement of humanitarian NGOs and international organisations provided national first responders with technical capacity, but lacked the necessary financial support. With their role becoming more and more important, funding and coordination became crucial requirements to ensure a more flexible and timely response. On 19 February 2016, the European Council called for urgent and concrete proposals from the Commission to ‘put in place the capacity for the EU to provide humanitarian assistance internally’. The Commission responded immediately with a proposal for a new Regulation to provide emergency financial support for humanitarian relief operations, to support Member States and complement their actions. The Council adopted the Regulation on 15 March. Following a needs assessment to determine funding priorities, on 19 April, just five weeks after the adoption of the Regulation, European Commissioner Christos Stylianides announced a first allocation of €83m to eight organisations: the UN High Commissioner for Refugees (UNHCR), the International Federation of Red Cross and Red Crescent Societies, Oxfam, the International Rescue Committee, the Danish Refugee Council, Arbeiter-Samariter-Bund Deutschland, Save the Children and Médecins du Monde (MDM). At the time of writing (August 2016), an additional allocation of up to €115m is under discussion to address four operational priorities: - Shelter: ‘winterising’ existing sites, potentially opening new sites and upgrading some sites in line with plans designed by the Greek authorities. - Multi-Purpose Cash Transfer: developing full coverage of needs including food and non-food items, transport and phone communication. - Education: supporting plans developed by the Greek Ministry of Education. - Unaccompanied Minors: providing residential options, including care, case management and psychosocial support. For an institution used to funding humanitarian aid outside the EU, providing emergency assistance within the Union was not without challenges. The Emergency Support Instrument (ESI) mirrors the practice of EU humanitarian aid provision outside the EU, which is provided based on needs and on the humanitarian principles of humanity, impartiality and neutrality. Impartiality requires that humanitarian aid must be provided solely on the basis of need, without discrimination between or within affected populations. Given that Greece has been suffering from a deep economic crisis, Greek nationals in need could also have been included in the target population. The general assessment of the Commission’s humanitarian aid partners, and of the Greek authorities, was that refugees, asylum-seekers and migrants lacking access to services and family networks were in most need. Services provided with this new funding would not cover the local population, which could be supported by other EU-funded instruments. In terms of operational priorities, the ESI would not be involved in relocation, resettlement and return schemes, which are funded by other Union instruments. Independence refers to the freedom of humanitarian objectives from political, economic, military or other objectives, and ensures that the sole purpose of humanitarian aid is to relieve and prevent the suffering of victims of humanitarian crises. In this sense, in order to preserve the independence of humanitarian partners it is important to distinguish between the support provided by the European Commission to the management of migration politics and the funding of emergency relief operations for the benefit of refugees, asylum-seekers and migrants. Humanitarian aid is not a crisis management tool. One illustration of this is the operational decision to exclude the so-called ‘hotspots’ from the funding provided through the ESI. After the EU–Turkey Statement of 20 March, these ‘hotspots’ became closed centres with a prominent function in the management of asylum processes, and hence instruments of a migration and asylum policy that is not the primary objective of the ESI. As such, despite being fully coordinated with the European Asylum Support Office (EASO), Frontex, the Greek Asylum Service and other actors operating inside the centres, the ESI does not fund operations in them, although should needs require the expertise of a humanitarian partner the ESI could be activated to support this. Another prerequisite was to find the additional financial resources required without having a detrimental effect on levels of humanitarian assistance provided outside the territory of the EU. This has been resolved by using funds exclusively earmarked for internal use. However, with €83m already contracted and up to €614m more budgeted in 2016–18, the response to the emergency in Europe might look high when compared to other humanitarian crises outside of the EU. Two points are worth making: first, a humanitarian crisis affecting a Member State of the EU is a whole new theatre of humanitarian operations, requiring a much higher initial investment in the development of infrastructure, partners’ capacities and coordination models; and second, such a crisis calls for a much higher commitment from the EU budget compared to crises where other donors are also actively involved. Funding humanitarian assistance in a Member State for the first time might have challenged the principle of impartiality. In fact, most EU-funded policies are implemented through Member States. However, mirroring the practice of humanitarian aid outside of the EU, the ESI preserved partners’ independence by excluding the national authorities as a potential operational partner. In doing so attention must be paid to the need to ensure good coordination between humanitarian partners and the authorities, which remain in charge of the overall response. In the case of Greece, a regular coordination meeting allows dialogue and the exchange of views between the humanitarian partners, DG ECHO, and the Greek authorities. Facing the largest refugee movement in Europe since the Second World War, the EU has succeeded in mobilising fresh resources to address the needs of these people, aiming to show solidarity, both towards refugees and towards the Member States that find themselves on the front line. Maintaining humanitarian principles as the common theme for its action, the Commission’s efforts have focused on its traditional role of addressing human suffering, with particular attention to the most vulnerable. The support provided so far has allowed more than 40,000 refugees and migrants to access basic medical services; 30,000 to benefit from psychosocial support; improved water and sanitation facilities, including gender-adapted facilities, for 37,000 people; and put in place child-friendly spaces. As needs evolve, the Commission and its partners will have to demonstrate flexibility and the capacity to intervene in a continuously changing context, which may include opening new operations in other Member States should the need arise. Laetitia de Radigues and Ludovico Gammarelli, European Commission, Directorate General for European Civil Protection and Humanitarian Aid Operations (ECHO). Responsibility for the information and views set out in this article lies entirely with the authors.
<urn:uuid:4f397edd-ae42-4d4f-96b3-af0e69e4ab71>
CC-MAIN-2020-16
https://odihpn.org/magazine/applying-european-commissions-humanitarian-expertise-respond-needs-inside-europe/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505366.8/warc/CC-MAIN-20200401034127-20200401064127-00514.warc.gz
en
0.946426
2,222
2.6875
3
A worker sanitises the square in front of the Hankou Railway Station, closed after the city of Wuhan was locked down following the outbreak of a new coronavirus, 2019-nCoV. Photo by Reuters IN a widely expected move, the World Health Organization (WHO) declared the Wuhan coronavirus a global health emergency early last Friday as the outbreak continued to spread outside China. At press time late Friday, the coronavirus 2019-nCoV, as it is technically known, had spread to 24 countries with 213 deaths — all within China — and 9,929 infected since it flared up in Wuhan a month ago. Over 9,700 of the infected people are in mainland China. In Malaysia, there are now eight confirmed cases, all of whom are Chinese nationals. Economists whom The Edge spoke to say it is too early to properly gauge the economic fallout from the outbreak, but if the 2002/03 spread of SARS — also a coronavirus — is any indication of how things might go, then the impact on Malaysia’s economic growth is likely to be small. But, they also point out that this time, there are risks of a larger negative impact on Asean, including Malaysia, as China has become a much larger economy and is way more connected to the region than it was during the SARS outbreak. China’s market share of Asean exports was 14% in 2018, compared with 6.5% in 2003, while its share of global gross domestic product has risen to 20% from just 9%. In addition, a boom in China’s outbound tourism has helped fuel growth for many Asean economies in recent years, particularly Thailand. Thus, China’s recent ban on outbound group tours will definitely have an impact on tourism. “Countries that are more open and dependent on China trade and tourism will likely be negatively impacted. Within Asean, we think Singapore and Thailand will probably be the most impacted and will likely see some growth downgrades. Malaysia and Vietnam will see a small impact while Indonesia and the Philippines will probably be the least impacted,” say Maybank Kim Eng Research economists in a Jan 29 report. The SARS crisis, which lasted for about nine months — from November 2002 to July 2003 — infected some 8,000 people and took about 800 lives globally. More than half of the fatalities were outside mainland China. Forecasts mostly maintained There is more concern this time also because China is Malaysia’s largest export destination. In the 11 months of 2019, our exports to China were valued at RM125.94 billion, or 14% of total exports. Lee Yu Je, an economist at Maybank Kim Eng , tells The Edge in a phone interview that while there are “definitely more downside risks” to growth, the research house is not looking to change its Malaysia GDP forecast for now, which at 4.4% for this year is already quite conservative and lower than market consensus. During SARS, Malaysia’s GDP growth slowed to 4.6% in 3Q2003 from 6.9% in 4Q2002 (when the outbreak began), before recovering to 6.5% in the final quarter of 2003. Lee expects the tourism, transport and retail sectors to be the hardest hit, as they were during the SARS crisis. Trade remained resilient during SARS. Visitor arrivals in Malaysia plunged at a steep pace of 52% year on year in 2Q2003, while hotel occupancy rates plummeted, albeit not as badly as in Singapore and Thailand. “But then, the rebound was pretty quick. China notified WHO about SARS only in February 2003, and by July that year there were no more [new] cases. Yes, Malaysia’s GDP growth was slower at 5.9% in 2Q2003, but it was not a decline like that seen in Singapore, Hong Kong and Taiwan, which were more affected by the SARS virus. So, [with the new virus], it is hard to tell, but if it is a short blip, then I do not think it will affect headline GDP growth,” Lee says. She believes the current outbreak will not drag out as long as SARS did, given the relatively faster response and drastic measures taken by China’s government to contain the outbreak. Apart from lockdown measures across Hubei province, of which Wuhan is the capital, China reported the virus to WHO just over a month after the first case emerged, as opposed to three months for the SARS virus. Other governments, too, are responding quickly. For instance, the US issued a travel warning to China, while Singapore has imposed a 14-day leave of absence for workers or students returning from China. “I suspect this outbreak will be short-lived and will be dealt with within the next three to six months. The market will eventually price this in, once the virus is brought under control,” says Bharat Joshi, an investment director who helps manage some US$600 billion in assets at Aberdeen Standard Investments in Indonesia. UOB Global Economics & Markets Research estimates that the new coronavirus outbreak could shave 0.5 to 1 percentage point off its base-case GDP growth forecast of 4.4% for Malaysia this year. UOB points out that China’s share of Malaysia’s tourism receipts more than tripled to RM12.3 billion in 2018, or 14% of total receipts (2003: RM904 million, or 4.2% of total receipts). China is the third largest source of tourism revenue for Malaysia, after Singapore and Indonesia. “Given that tourism revenue accounts for 5.8% of GDP, we can approximate that the potential first order impact will be 0.5 to 1ppt shaved off our base-case GDP growth forecast of 4.4% for 2020. This is measured based on the direct impact of a decline in tourism revenue over two quarters. The net effect could be smaller, depending on whether other sectors are able to ride out the turbulence,” its economists, including Julia Goh, writes in a Jan 31 report. “Should the uncertainty related to the virus widen and persist for a longer period, the overall impact could be larger as intra-regional and global demand softens and productivity declines, which will derail expectations for an export and investment recovery this year.” During the SARS epidemic, monthly tourist arrivals fell 60% from 1.3 million in December 2002 to a low of 456,000 in April 2003. Cumulatively, tourist arrivals fell 20% to 10.6 million in 2003 from 13.3 million in 2002. OCBC Bank economist Wellian Wiranto says the saving grace for Malaysia is that it attracts more tourists from Indonesia and Singapore than China. He also points out that tourism’s 5.8% contribution to Malaysia’s GDP, while sizable, is by no means “life-threatening”. In comparison, tourism for Thailand and Vietnam comprises 11% to 12% of GDP. Wellian is hopeful the new virus will be brought under control in the coming weeks and the “fear factor” affecting consumption will ebb in time. As such, he is not looking to downgrade his forecast of 4.2% growth this year for now. “In terms of potential scenarios, there are many, obviously, including a longer and more serious virus outbreak that affects China’s industrial production for an extended period. Given the larger trade linkages with Malaysia now, any sustained slowdown in China, including stoppages in its part of the global supply chain, will have repercussions in the near term. In that pessimistic out-turn, Malaysia’s growth may well dip substantially below 4% in 1H2020, although pent-up demand might see things snapping back up strongly in the second half once the situation stabilises,” he tells The Edge. Earlier, Malaysia’s manufacturing performance indicator for December 2019 had provided some hope that stronger economic growth could be in the offing. This expectation is now in doubt because of how quickly the Wuhan virus is spreading. The IHS Markit Malaysia Manufacturing Purchasing Managers’ Index (PMI) for December, released on Jan 2, increased to 50 points — its highest level in 15 months — from 49.5 points the previous month. A reading above 50 indicates expansion while one below 50 signals contraction. According to Socio-Economic Research Centre executive director and economist Lee Heng Guie, high-frequency global indicators, such as the OECD leading index, global PMI for manufacturing and services as well as global semiconductor sales, have shown early signs of bottoming out, lending credence to a gradual improvement in regional PMI readings for the manufacturing sector, including Malaysia. With Wuhan in lockdown and the lunar new year holidays extended to Feb 2 from Jan 30, there could be some impact on China’s manufacturing sector. Heng Guie says that while the services sector would be the hardest hit, manufacturing output could be dampened. The manufacturing contracts for technology and consumer goods that could be affected include those with Apple and Samsung. “For the first quarter, there will be some weak numbers, more so because this is happening at a time of weak global growth, so there will be some impact on earnings. The question is whether the outbreak will be protracted,” he says. Any slowdown in China, the world’s second largest economy, will weigh on global growth. Hubei accounted for about 4% of China’s GDP growth last year. UOB last Friday cut its GDP forecast for China to 5.7% from 5.9% before. Meanwhile, Finance Minister Lim Guan Eng said last Thursday that it was too early for the government to decide whether it needs to revise its 4.8% GDP growth forecast for the year. However, it will hasten a stimulus package to boost the economy if necessary. The government is maintaining its Visit Malaysia 2020 target of 30 million tourists. Credit Suisse believes there is a possibility that Bank Negara Malaysia, which surprised the market with an earlier-than-expected overnight policy rate cut of 25 basis points on Jan 22, may cut the key rate again to support growth. The central bank’s next monetary policy meeting is on March 3. It is worth noting that despite calling it a “public health emergency of international concern”, WHO does not suggest travel or trade restrictions to China. This marks the sixth time a health outbreak has been given that designation, the last one being the ebola outbreak in the Democratic Republic of Congo last July. Until the virus is brought under control, UOB expects the ringgit to stay defensive alongside the renminbi and other Asian currencies. Since the outbreak gathered pace last week, the ringgit has weakened, with the greenback/ringgit rate rising to 4.10 from 4.06. Brent crude has also fallen from US$65 to about US$58 per barrel over concerns about a global slowdown. Owing to the uncertainty, stock markets worldwide have also been hit. Bursa Malaysia’s benchmark stock index FBM KLCI shed 2.65% last week to end at 1,531.06 points, its lowest level in eight years. “While we are positive on the outlook for the market over the next 12 months, we believe investors should exercise caution over the next three to six months, as it appears that the current 2019-nCoV outbreak will not go away or taper off anytime soon, and it will probably get worse before it gets better,” analyst Joshua Ng with AmInvestment Bank Research says. He is maintaining his end-2020 target of 1,670 points. During the SARS epidemic, Bursa Malaysia’s benchmark FBM KLCI lost more than 20% at the worst point, slipping from 794 points (April 2002) prior to the outbreak to a low of 630 in April 2003. The index remained depressed for eight months, from October 2002 to May 2003, hovering at 630 to 671 points, says Ng.
<urn:uuid:a29171f8-0088-4078-b482-bd0fa97601f9>
CC-MAIN-2020-16
https://www.theedgemarkets.com/article/state-nation-new-virus-poses-higher-risks-malaysian-economy-sars
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505366.8/warc/CC-MAIN-20200401034127-20200401064127-00514.warc.gz
en
0.951398
2,537
2.515625
3
The obsequies of Homoeopathy have been published so often in the medical journals of the old school, that it seems to be time to refute them and prove that Homoeopathy is very much alive and will live to see the day in the no distant future when it will be the only legal system in the practice of medicine. Truth may be long suppressed, but can never perish. There can be but one right way, all others must be more or less wrong. Only one straight line can be drawn between two given points. The truth of anything lies in the practical application of it, with the following real good and lasting results and Homoeopathy will stand this test pre-eminently. Tests at the bedside of patients will give convincing proof of this. That Homoeopathy did not become at once and is not, even now the only recognized legal practice of medicine is due: 1. To the natural perversity of human nature, which is inclined to believe in follies much quicker than in actual truths. People in general require training in each direction so that they can see the truth in that line. They want to be fooled, as Barnum used to say, and it is the truth. Anti-toxine for diphtheria, anti-typhoid serum for typhoid fever, a special serum for each disease according to its name; this seems so plausible, so rational that it takes like wild fire. And yet, no greater folly could ever be imagined. The same suit of clothing in size and shape for all persons, young and old, lean or stout, with the name of Jones, the same for all the Millers, the same for all the Smiths; treating a phantom disease which has no exercise by itself, and is at first simply a dynamic derangement of the organism, widely different in each person and letting the patient linger or die. And to give medicine for the prevention of disease is as ridiculous as the building of a bridge for a river that has never been seen, nothing known of its width, depth, force of current, and condition of bottom and shores, which may never have to be crossed, never even seen. That highly educated people and even doctors in high government office believe in this nonsense, simply proves: That education is no bar to error or folly. Strict honesty, good common sense and sound judgement, all this with great kindness of heart, like the lamented Abraham Lincoln, tower high above education. Sanitation is the only preventive of disease; this alone prevented the rectum yellow fever in Havana, Cuba, in New Orleans and Memphis. 2. The great unheard of novelty of this doctrine. It was too much for the learned doctors and professors to comprehend: That a remedy which has caused the symptoms of a disease when taken in material doses by a person in normal health, could cure that same disease presenting those symptoms when of natural origin, if the same remedy were given in very minute, infinitesimal doses, that required the giant mind of Hahnemann to evolve and grasp. 3. The very small, infinitesimal doses of the remedy, recommended, by Hahnemann, as compared with the very large, complex and powerful doses of that time, made Homoeopathy seem foolish and ridiculous. Disease was then and is today, considered a powerful monster and to require massive doses to combat. Yet we all know that the air we inhale is more necessary to sustain life in us than food. We could not live many minutes without it. And yet it is colorless, tasteless, odorless, intangible and well nigh imponderable. This proves, at least, that quality is of vastly more importance than quantity. Roses and lilacs have caused hay fever and asthma in persons passing even at some disease. A growth of poison ivy had caused vesicles in cluster and erysipelas in persons passing at a long distance. The poison of the plant carried to them by the breeze blowing over the growth towards them, cannot be detected in the air in any other way. Both the latter show the power of infinitesimals in nature, as also the wonderful effect of sunlight on everything on this earth, 93,000,000 miles from its source. 4. The difficulty of the application of Homoeopathy in practice. The old school doctors who could descend so far from their lofty theories as to try Homoeopathy, gave the remedies as had been and still is their custom, for the arbitrary name of the disease, a phantom, all cases of disease of the same name were the same and identical to them, all were given the same remedy and in material doses as well. The identity and peculiarity of the patient were entirely ignored, hence he lingered or died and Homoeopathy was a failure. To get the patient’s symptoms, then find the remedy in the Homoeopathic Materia Medica, presenting a similar group of symptoms then give that remedy in a very small minute dose to the sufferer, that was not rational and withal too much trouble. Besides the Homoeopathic Materia Medica was filled with imaginary symptoms, which they had never seen produced or cured by it. That they could not see any such results, such symptoms, because they always jumbled a large number of remedies and large amounts of each drug in one prescription, this they failed to see. Not many years ago I had four cases of scarlet fever in quick succession. Case 1. The surface of the skin smooth, scarlet red and burning hot to the touch. Throbbing headache, dilated pupils, throat sore and red on inner right side and tender to touch externally on that side; very irritable. Temperature, 104 degrees worse swallowing liquids. Belladonna cured. Case 2. The discoloration of the skin was bluish, surface smooth. Body not hot to touch. Temperature, 103 1/2 degrees. Headache. Throat sore to touch on left side externally; worse swallowing saliva or empty swallowing; sensation of a lump in the throat, which goes down on swallowing but returns at once. Throat purplish internally, constricted, unable to swallow even a drop of water. A few minutes after falling asleep he awakes breathless; has to make special effort in order to breathe again; cannot bear anything tight about the neck. Lachesis cured. Case 3. Surface of the body was a bluish discoloration, the bluish parts are raised above the other parts of the skin, due to the swelling of the cellular tissue and lymphatics. Tongue coated slight brown with a red triangular tip, the apex of the triangle pointing backward; the more he swallows the easier it becomes; burning in the throat; great restlessness; must move to get relief from the pains. Rhus tox. cured. Case 4. A boy, aet. 10 years, presented all the symptoms of dysentery. Stools small, of mucus and blood with great tenesmus and straining continuing long after the evacuation, severe pain in abdomen. Mercurius cor. cured this in three days, when all the symptoms of the smooth scarlet-red variety of scarlet fever appeared, which was cured by Belladonna. These cases were cured in from five to eight days so perfectly that the parents would not believe they had been ill with scarlet fever; they had not been sick enough for that; had lost apparently no weight or strength, till desquamation set in, the skin peeling off in long strips. The remedies were given in the higher potencies. No other remedy or combination of remedies could have cured them in the same manner. Large and strong doses of the same remedies would have endangered the lives of these patients. But nothing convinces more or better than actual personal experience, and I know of no substance more suitable for this purpose than the table salt, sodium chloride, or Natrum Muriaticum. It has been in daily use all over the world since time immemorial, as an addition to the food, never produces any ill effects unless too much had been added to the food, when it might cause great thirst. It may, therefore, be said that in the crude state it is inert, has no medicinal virtue or effect, and for this reason as also for the ease wherewith it can be prepared as a homoeopathic remedy by anyone, thus preventing any error or trickery, to be eminently suitable for this test. Hahnemann was the first one to introduce it as a remedy, proving, testing it on himself while in good health and showing its great and wonderful power to heal the sick. A number of Austrian physicians, who could not believe what Hahnemann had published regarding the effect of common table salt on the human organism, in the 30th potency, on healthy persons and to cure the sick when these symptoms presented themselves in them, formed themselves into a proving society, tested salt on themselves in the 30th potency and were convinced. It had acted better even in the 30th potency than in the lower. To prepare it for medicinal use: One-half ounce of ordinary table salt is dissolved in an ounce and a half of boiling distilled water, filtered and allowed to crystallize by evaporating it at a temperature of 122 degree F. to free it from its associate salts. The crystals are allowed to dry on blotting paper. One part by weight of the dry crystals are dissolved in nine parts by weight of distilled water, enough to fill the bottle about one half full, cork the bottle firmly, take it in the right hand and give two or more strong blows against the left hand or some other yielding substance, so as not to injure the hand or break the bottle. Ten minute (drops) of this solution are added to ninety minims (drop) of distilled water giving two or more blows as directed above for the first solution; that is succussed twice or more times and this gives the first potency. One minim of the first potency added to 99 minims of distilled water (or alcohol if the potency is to be preserved for future use) enough to fill the potentizing bottle one-half full then succussed as before and this gives the 2nd potency. This may be continued till any desired potency is obtained and it will prove active and a wonderful remedy to heal the sick. Substances which are inert in the crude state, like salt, charcoal, silica, lycopodium, have been found most beneficial, most curative in the highest potencies. Any potency desired of any remedy may be obtained from Boericke and Tafel, homoeopathic pharmacy, and will be perfectly reliable and true to the label and mark on the cork as to potency, by those who do not care to prepare it for themselves. There is no power to heal the sick, no force in these potencies, which is not also contained in the crystals of salt, sodium chloride, or Natrum Muriaticum, but in the crystals it is like a strong man bound by chemical union. By the process of potentization, succussion (not simply shaking) and trituration the crude substances are too finely divided that they cannot be discovered by either microscope, or spectroscope, and thus its benign dynamic forces are set free and able to act on the human organism, beneficially and powerfully and its poisonous qualities are eliminated as in Arsenic, Belladonna, Phosphorus, etc., and these potencies are no longer subject to chemical laws as the crude original substance; Phosphorus for instance: sugar globules saturated with a high potency of Phosphorus and allowed to dry may be kept in a paper capsule in a drawer for a year and will then still be found to act as Phosphorus and not as Phosphoric Acid. Now if you are honestly desirous of learning the truth of Homoeopathy take this remedy, Natrum Muriaticum (ordinary table salt), potentized at least to the 30th potency, take it in small doses, frequently repeated and you will see and be surprised at the result. Or try your own preparation on a patient under direction of a good homoeopathic physician (for no one can paint a fine picture though he has all the colors, brushes, etc., of an artist, unless he has studied the art of painting) and you will see a rapid and perfect cure effected. If all doctors would only know and remember That the patients must be treated (and no the disease according to its name as when giving antitoxine to every person for diphtheria) and that every patient differs very much from every other one, hence each one may require a different remedy. That every patient is much more susceptible than a healthy person to the effect of medicine as well as to touch, motion, food or all other influences, and that the graver the disease the less medicine he can stand. That disease is only a dynamic disturbance of the normal functions of the organism (not a monster) and does not require large doses of powerful and poisonous drugs to combat, and that even after pathological changes have taken place, a very small dose of the proper, indicated remedy will cure the patient. In short, when all doctors have become strict and sincere homoeopaths then few persons will die except of old age or accidents. Thousands are now dying daily from serums so called, quinine, digitalis, etc., and mixture of drugs. “Homoeopathy is a law of nature, like gravitation, hence infallible; only the patient or the doctor can fail.” Miss T. M., about 30 years of age, and residing 365 miles from New York City, wrote to me for treatment. When young, 16 to 18 years of age, she had weighed about 135 pounds, but now her weight had been reduced to 90 pounds, from overwork in the household and in an office and a great disappointment. She was very despondent, cried when looked at but became angry if anyone tried to comfort her, the stools were difficult and in small balls like marbles and the menses were scanty and too late. She never had been treated by the old school doctors, but had been under the care of a homoeopath in her city without any marked improvement. Natrum Mur. in various potencies improved her at once so much that in about two months from the beginning of the treatment she had gained 35 pounds, feeling again in good spirits, and with the aid of a few other remedies like Phosphorus, Pulsatilla, Sulphur she soon was restored again to normal health. This patient had taken salt in her daily food during all the years of her illness, yet it did not cure her, but salt, Natrum Mur. 45m. did this quickly.
<urn:uuid:2e04170d-b75c-47aa-832f-058ccbe740ab>
CC-MAIN-2020-16
https://homeopathybooks.in/duration-action-antidotes-complementary-inimical-relations/notes/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371810807.81/warc/CC-MAIN-20200408072713-20200408103213-00274.warc.gz
en
0.967012
3,061
2.53125
3
Long before the arrival of Anglo-American settlers, the people of the Great Plains had evolved into a nomadic form of existence. Their pace of movement generally mirrored that of their primary food source, and because humans cannot exist without water, they never placed themselves too far from sources of water. Beginning in the early 1800s, white settlers began to establish settlements in areas that were previously the exclusive domain of indigenous peoples. They transformed the land into fields suitable for agriculture, hunted for meat, and set down roads connecting the various settlements. These circumstances set into motion a series of attacks and counter-attacks between human beings who looked upon one another in the same way: they were the enemy, they were dangerous, and they were untrustworthy. There could be no greater demonstration of a clash of cultures than interactions between westward-bound European-Americans and the American Indian. Prior to the American Civil War, the United States Army was only sporadically involved in keeping the peace between these natural enemies. Due to the size of the Army at that time, it could only man outlying fortifications in small numbers. Many of these forward-deployed soldiers were infantry. No matter how proficient these men were, they stood no chance at all in a major battle against the mounted Indian warrior. Western military expeditions were few in their frequency and small in their size. This meant that in terms of defense from Indian attack, for the most part, white settlements were on their own. During the Civil War, the regular army almost completely withdrew from western territories and settlers formed volunteer militias to confront hostile Indians. It wasn’t until after the Civil War that the U. S. Army began to reassert its control along the frontier. In 1867, the US government brokered an agreement with Indian leaders to establish two reservations in the so-called Indian territories (Oklahoma): one reservation for the Comanche and Kiowa, another for the Southern Cheyenne and Arapaho. The agreement, the Medicine Lodge Treaty (signed near Medicine Lodge, Kansas), provided that the US government would offer Indians housing, agricultural training, food, and other supplies. In return, the Indians agreed to stop raiding white settlements. Dozens of chiefs endorsed the treaty and a number of tribes moved onto the reservations. There were two problems with the treaty, however. First, several bands of Indians headed by influential war chiefs refused to attend the meeting at Medicine Lodge. Second, the treaty was never ratified by the US Senate. In 1870, a new technique for tanning buffalo hides increased the interest of hunters to engage in buffalo hunting commercially. This was the first time whites targeted the buffalo for its hide. It was also at this time that American politicians and army officers realized that by killing off the buffalo, they could also destroy the American Indian. In 1870, the American Bison numbered in the tens of millions; in eight years, herds were nearly extinct. The destruction of the buffalo was a disaster for the Plains Indians, both on and off the reservations. Without the Buffalo, there was no longer any point in maintaining a nomadic existence —other than as a tradition, but tradition doesn’t feed hungry women and children. It was in this way that the American Indian, with no means of self-support, became dependent upon the US government; they overwhelmingly remain so today. In any case, by 1874, the Plains Indians were facing a serious crisis: fewer buffalo to feed their families, increasing numbers of white settlers, and a more capable, more aggressive army. It was at this time when a spiritual leader named Isa-tai (White Eagle) emerged from among the Comanche. Claiming to have the power to render himself and others indestructible, he was able to rally a large number of Indians to participate in large raids. Concurrently, a Kiowa war chief arose to a position of prominence within that tribe. His name was Gui-Pah-Gho (also known as Lone Wolf, the elder). Both Lone Wolf and Isa-tai were disposed to warfare. War is never a good thing; even the Indians realized that, but it was better than sitting around, doing nothing, watching their loved ones starve to death. On 27 June 1874, Isa-tai and Comanche war chief Quanah Parker led 250-300 warriors in an attack on a small outpost of buffalo hunters at a place called Adobe Walls, the site of another battle in 1864 when Adobe Walls was little more than the ruins of an old trading post. When constructed in 1845, Adobe Walls served as a small military fort with a convenient whiskey hole. Following a number of Indian attacks in the late 1840s, traders destroyed these structures and moved on. In 1864, Adobe Walls became the site of one of the largest battles to take place on the Great Plains. Even then, Adobe Walls consisted of only a few ruins. In 1874, a group of businessmen (including one James Hanrahan) set up two stores near the old ruins in an attempt to rekindle the town of Adobe Walls. The complex quickly grew to include a general store, saloon, blacksmith shop, a trading store where buffalo hides could be bartered for hardware goods, and a corral. At various times, as many as 300 buffalo hunters visited Adobe Walls. In late June 1874, Indians killed two hunters twenty or so miles down the Canadian River. Two more were killed on the Salt Fork of Red River near present-day Clarendon, Texas. It was a signal to anyone with two brain cells that the Indian were on the warpath. From the perspective of the Comanche, Kiowa, and Southern Cheyenne, the post at Adobe Walls posed a major threat to their very existence. That spring, the Indians held a sun dance; to encourage the path to war, Isa-tai promised victory and immunity from bullets. Modern historians believe that as many as 300 warriors gathered to strike the white hunter, but some argue that the number of Indians could have exceeded 700 hostiles. At the time of the Indian attack, Adobe Walls was only occupied by 28 men and a single woman. Among the men were the saloon owner, James Hanrahan, the twenty-year-old Bat Masterson, and marksman William Dixon. The woman was Mrs. William Olds, wife of the camp cook. At 0200 on 27 June, the ridgepole holding up the sod-covered roof of the saloon suddenly made a loud crackling sound. Two men opined that it sounded like a rifle shot. Hanrahan awakened the camp by firing his pistols into the air. Once the men were awake, he set them to work inspecting and repairing the ridgepole. It was then that the Indians launched their assault. When it came, the Indian attack was sudden and swift; a combined force of Comanche, Cheyenne, and Kiowa swarmed across the plains. They fully intended to erase the entire population of Adobe Walls. Leading the raid were Isa-tai and Quanah Parker. The initial attack nearly succeeded because the Indians were close enough to smash the windows and bang the doors with their war clubs and the butts of their rifles. The fighting was intense, and the close-quarters battle rendered the hunter’s long guns useless. Four of the white hunters were killed in the first assault; the whites had to rely upon their pistols and Henry or Winchester lever action rifles. Eventually, the initial attack was repulsed and from that point on, the hunters were able to keep the Indians at bay with their long-range Sharps rifles. Nine men were stationed in Hanrahan’s Saloon (including Bat Masterson and William Dixon); eleven men were placed in the general store, and seven in the trading post. The men set up barricades. By noon, the hunters at Adobe Walls knew they were in a siege. Around 2 p.m., the Indians withdrew to surrounding hills. Two hours later the hunters ventured out to bury their dead. They discovered fifteen Indian bodies and buried those, as well. On the second day, hunters again ventured outside to bury or drag away the corpses of dead horses, lest the smell of decomposition should have a poor effect on the living. Hunters who were not dealing with dead animals used their long-distance rifles to keep the Indians beyond their range, which was more than a mile. Early on the third day, fifteen warriors rode to a bluff overlooking Adobe Walls to assess their situation. These Indians were about one mile away. William Dixon leveled his Sharps .50-90 he had borrowed from Hanrahan and shot a warrior from atop his horse . The death of that Indian had a demoralizing effect on the rest of the Indians, but so too did the wounding of Quanah Parker. The Indians decamped that night and returned to their usual campground. Later in the day, additional hunters began to straggle into Adobe Walls. On the fifth day of the siege, Mr. William Olds (the cook) accidentally shot himself in the head when his rifle discharged as he was descending a ladder. By the sixth day, there were more than 100 hunters, any of whom would welcome another Indian attack. Sometime in July, a white settler was killed while looking for wild plums along the bank of the Canadian River. President Grant, realizing that his peace policy with the American Indian was a complete failure, authorized the Army to subdue the southern plains Indians with whatever force was necessary. What would become necessary was a force that could effectively deal with 4,000 hostiles. By the first part of August, a troop of cavalry arrived at Adobe Walls. Masterson and Dixon signed on as army scouts. The cavalry departed the next day to join up with forces operating under Colonel Nelson Miles and the buffalo hunters drifted off to kill more animals. The Indians returned to Adobe Walls after the whites had abandoned it, but only to burn the buildings to the ground. They thought of their battle a victory, but its primary effect was to reinforce the U. S. Army’s earlier conclusions that the Plains Indians had to be crushed. That same month a second engagement was initiated by Kiowa near Lost Valley. Led by Lone Wolf, Kiowa attacked a patrol of Texas Rangers. Both sides experienced light casualties, but the incident did raise tensions along the frontier; Colonel Miles determined to put an end to Indians raids. General Phillip Sheridan ordered five columns of troops to converge on the area of the Texas Panhandle, and more specifically, upon the upper tributaries of the Red River. Sheridan intended to deny sanctuary to every Indian and attack him aggressively until either they agreed to surrender to reservation life, or all Indians were dead. Colonel Ranald S. McKenzie commanded three of these columns. He ordered the Tenth Cavalry, under Lieutenant Colonel John W. Davidson, to proceed west from Fort Sill. Lieutenant Colonel George P. Buell, commanding the 11thInfantry Regiment, marched north from Fort Griffin. McKenzie personally commanded the Fourth Cavalry, riding northward from Fort Concho. The fourth column involved the Sixth Cavalry and Fifth US Infantry under Colonel Nelson A. Miles, converging southward from Fort Dodge. The fifth column was the Eighth Cavalry, commanded by Major William R. Price, consisting of 225 officers and men, six Indian scouts, and two frontier guides from Fort Union, New Mexico. In total, there were more than twenty engagements across the Texas Panhandle. While the US Army searched for and intended to engage all hostiles, the Indians, who were traveling with women and children, attempted to avoid contact with the bluecoats. Logistically, the Army had a distinct advantage; they had plenty of supplies to sustain their forces. The Indians were starving. General Sheridan had no sympathy for the Indians; in his mind, all they had to do to end their suffering was surrender. As the Red River War continued throughout the fall of 1874, increasing numbers of Indians were forced to give up their freedom and head for Fort Sill, Oklahoma. As Indian scouts were advancing ahead of the Fourth Cavalry in early September, they were ambushed by a Comanche war party near the Staked Plains. The scouts sent a runner back to inform McKenzie of the presence of these Comanche. On 28 September, McKenzie’s scouts located a large village of Comanche, Kiowa, and Cheyenne in the upper Palo Duro Canyon. At dawn, McKenzie’s troops launched an attack down a steep canyon wall. The Indians were caught by surprise and did not have time to gather their horses or supplies before retreating. There were only four Indians killed, but the loss of their lodges, horses, and food stores was devastating. More than 450 lodges were destroyed. McKenzie ordered most of the 1,400 horses –a symbol of wealth to the Comanche– shot in order to keep them out of the hands of the Indians. The Battle of Palo Duro Canyon was typical of the Red River War. Most encounters produced only a few casualties, but the Indians could not afford the loss of food or their ponies. Without food or mobility, the Indians had little choice but to surrender. The Red River War came to an end in June 1875 when Quanah Parker led his band to Fort Sill and surrendered to the white eyes. These were the last band of southwestern Plains Indians. With the extermination of the buffalo and surrender of the Indians, the Texas Panhandle was open to settlement by farmers and ranchers. The Red River War was the final defeat of the once powerful Comanche, Kiowa, and Southern Cheyenne tribes. The Texas Indian Wars were finally concluded.
<urn:uuid:ab0bd742-3644-4aac-8b32-2b895685ad40>
CC-MAIN-2020-16
https://thoughtsfromafar.blog/2019/01/28/the-red-river-war/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506870.41/warc/CC-MAIN-20200402080824-20200402110824-00475.warc.gz
en
0.979007
2,813
4
4
One fun fact about broccoli is that its name comes from the Italian broccoli meaning, ‘the flowering crest of a cabbage,’ which makes complete sense being that what we eat is the flower and stem. Broccoli is not just healthy, but it’s a super food. It can be cooked in a variety of ways and is also super-beneficial for your health. Even though broccoli gets frequently overlooked, it possesses a plethora of benefits that might even shock you. Scroll through the gallery below to learn 11 reasons to enjoy broccoli and see the lasting effects it has on your body. Why Eat Broccoli? Broccoli is one of those miracle vegetables that once you’re aware of all the good it can do, it gets hard to overlook. Broccoli has a strong and positive impact on our body. Whether it’s concerning the body’s detoxification system, high cholesterol, or any vitamin deficiency you might have, broccoli should be your go-to vegetable. This green veggie is one of the cruciferous vegetables that if eaten on a regular basis, can help you reap fantastic health benefits. Benefit #1: Great For Weight Loss Eating vegetables has always been said to work wonders when it comes to shedding a couple of pounds or maintaining a healthy weight. According to Indiatimes, broccoli is high in fiber content, which can keep you satiated. Broccoli is definitely one of the best vegetables to remedy weight issues you may be facing. It makes it ideal for dieting being that it’s really low in calories. Working in broccoli to more of your meals can be very beneficial to getting rid of waste. Our bodies need to release contaminants, and being that it contains rare nutrients like glucoraphanin, gluconasturtiin, and glucobrassicin, this vegetable is truly effective in eliminating any toxins stored in your body. Benefit #2: Treats And Prevents Anemia Eating this delectable vegetable is also great for anyone battling anemia. Being that broccoli is rich in iron and folic acid, it makes for one of the best foods for treating it, as well as preventing it. According to FamilyDoctor.org, vitamin C, which broccoli has a lot of, is also important because it helps the body absorb iron. Broccoli can also improve levels of hemoglobin, which is very beneficial to those experiencing an iron deficiency. Benefit #3: Good For Your Bones Unfortunately, along with age comes weakened bones. However, look no further than broccoli to help your bones regain their strength. Broccoli actually contains a lot of calcium, along with magnesium, zinc, vitamin K, and phosphorous. All help prevent bone-related ailments and keep your bones strong. A diet that’s rich in vitamin K can be linked to a lower risk of fractures in some populations. Therefore, loading up on this healthy veggie may help slow bone loss and reduce the risk of fracture. Benefit #4: Good For Heart Health A vegetable that’s good for the heart can stay in my meal plan forever. According to WebMD, a 30-day study done by the University of Connecticut looked at how including broccoli in one’s daily diet could help with heart health. The study showed higher levels of heart-protective chemicals during deprivation, better blood-pumping ability, and less heart damage during heart attack-mimicking oxygen deprivation. If you’re looking to reap the most benefits out of this flowery green, the best way to eat it is raw or quickly steamed. Benefit #5: Helps Eyesight According to Live Healthy, broccoli may help your vision. Two antioxidants, in particular, that broccoli contains are lutein and carotenoid. Both help in deterring cataracts and macular degeneration. Vitamin A is known to better vision in low-light conditions and to aid in discerning colors. Various forms of this vitamin are actually referred to as “retinoids” due to how important they can be for your eyes’ retinas. Benefit #6: Helps Fight Cancer Foods that prevent cancer are always special in my book. According to WebMD, broccoli may help fight cancer growth. Gene p53 is known as a tumor suppressor gene and can play a critical role in healthy cells and protecting them against cancer. Researchers found that compounds in broccoli along with other cruciferous vegetables, such as cauliflower and watercress, appear to target and stop mutant p53 genes associated with cancer growth. This vegetable doesn’t just fight against one type of cancer, either. Indole-3-Carbinol helps reduce the risk of breast, cervical, and prostate cancer. Benefit #7: Helps Hair Glow Hair health is important. I never knew that eating broccoli affected my scalp or anything hair related. According to U.S. News, broccoli, along with other dark green veggies, are filled with vitamins A and C, both of which produce sebum, which is a natural scalp oil that helps in conditioning your hair. Both vitamins contribute to moisturizing your scalp while the erucic acids give your hair a beautiful, natural shine. The calcium found in broccoli can be helpful in strengthening hair follicles which can lead to long, volume-filled locks. Benefit #8: Improves Kidney Health According to KidneyServiceChina.com, there are a plenty of benefits to those who eat broccoli when battling a kidney disease. To patients with kidney disease, broccoli is especially helpful in preventing cardiovascular issues. Broccoli is filled with flavonoids, which are known for being the best cleaning agents of blood vessels. Eating broccoli is helpful in preventing infection being that it’s also abundant with vitamin C. It’s absolutely necessary for those suffering from any kidney issues to be wary of infection, and this super-vegetable can be one step closer to ensuring that. Benefit #9: Protects Skin From Aging Broccoli is filled with antioxidants, like vitamin C, which help reduce and prevent damage to your skin. Such damage includes pigmentation and wrinkling. According to Everyday Health, quercetin found in broccoli is a natural anti-inflammatory agent, able to fight against aging. Vitamins B and E are also found in this delicious vegetable, and both are proven to give your skin a healthy glow. Benefit #10: Prevents Arthritis According to the Arthritis Foundation, lab studies have found that sulforaphane, a chemical compound found in broccoli, may be able to stop enzymes linked to joint deterioration and hinder inflammation. High amounts of vitamin K, also found in broccoli, can slow down the progression of osteoarthritis. Benefit #11: Boosts Immunity In order to keep your body healthy and strong, your immune system needs to be in tip-top shape. According to UCLA Newsroom, studies find that broccoli may help boost the aging immune system. Broccoli has nutrients such as trace minerals, beta-Carotene, and zinc. These nutrients are a necessity for your immune system and can truly help in keeping you from catching a cold. Besides that, broccoli is also rich with ascorbic acid which helps detoxify the liver and is helpful for anyone in need of an immunity boost. Broccoli and Sausage Cavatelli In a skillet, fry sausage over medium heat until no longer pink; drain, and reserve. In the same skillet, cook garlic in olive oil until golden. Meanwhile, bring a large pot of lightly salted water to a boil. Cook pasta in boiling water for 8 to 10 minutes or until done; drain. Three minutes before the end of the cooking time, add broccoli; drain with pasta. In a large serving bowl, toss together the sausage, olive oil and garlic, cavatelli and broccoli, and Parmesan. Season with red pepper flakes. March 28, 2020Introduction The term diet, described by Wikipedia, is the sum of food consumed by a person or other organism. In today’s world its a buzz word that’s impossible to get away from. The diet industry is now such a huge part of our modern culture that we are constantly bombarded with marketing from businesses who […] December 21, 2019Many people believe that eating eggs may be bad for your health. Here are some excellent reasons to justify why eating eggs can make you healthier, brainier, leaner and stronger. 1. Eggs help to improve performance Eggs have a high satiety index, meaning they make you feel full for longer. One large egg supplies 6g […] December 1, 2019Omega 3 benefits are wide-ranging and proven by clinical studies. Understanding the best Omega 3 sources means you can include more of these healthy foods in your daily meal planning. From heart health to depression treatment to pregnancy health. Omega 3 benefits are too good to ignore if you are interested in health. What are […] December 1, 2019Where does the word “vitamin” come from? The words is derived from the Latin word vita (life) and the biochemical term amine (nitrogen-containing) because they are required for life and were originally thought to be amines. Vitamins are organic compounds required by humans in small amounts from the diet. What are vitamins? They are an […] November 12, 2019Glycemic Load You may have heard about the glycemic index and wondered what it is all about. The glycemic index is a ranking of carbohydrates based on their immediate effect on blood glucose (blood sugar) levels. It compares foods gram for gram of carbohydrate. Carbohydrates that breakdown quickly during digestion have the highest glycemic indexes. […] November 11, 2019Thousands of Brits and Americans There’s a good chance that you are one of the thousands of Brits and Americans who skipped breakfast today. There is also a good chance that you are overweight. This is a guess based on statistical data and the fact that you are reading this article. One set of statistics […] Hello, I'm Dan that’s me above, i have been dedicated to weight training in and out of gyms, also qualified diet nutritionist and certified PT, and i have a combined knowledge of over 10 years.
<urn:uuid:2b64efaa-e9f2-4347-bcab-1c87af6adfef>
CC-MAIN-2020-16
https://www.wolvesfitness.co.uk/11-health-benefits-broccoli/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500482.27/warc/CC-MAIN-20200331115844-20200331145844-00313.warc.gz
en
0.946934
2,175
2.765625
3
Gold Nanoparticles Surface Design and Modification Gold nanoparticles have many applications in biology and medicine. Gold nanoparticles are used as biosensors, cellular probes, drug delivery vehicles, or as optical contrast agents (1). To use gold nanoparticles for these specific applications, the ability to modify the surface is extremely important. A modification of the surface with polymers such as polyethylene glycol (PEG) and polyethylene oxides reduce non-specific binding, small molecules such as biotin and peptides and proteins can provide them specificity toward cellular targets in vitro and in vivo, and DNA enables them to be used for genetic detection. A key strategy to modifying the surface of the gold nanoparticles is with molecules that contain sulfur, nitrogen, or oxygen atoms as they have high binding affinity to gold atoms. As a result, thiolated-DNA and proteins adsorb onto the surface of the gold nanoparticles relatively easily. The design of Cytodiagnostics gold nanoparticles allows for the use of either adsorption to coat polymers or bio-recognition molecules on the surface, by covalent conjugation, or by using biological interactions (e.g., streptavidin-biotin). This provides greater versatility in the design of you gold nanoparticle system. This technical note provides a brief description of the current modification strategies and some of the emerging biomedical applications of these materials. Surface Modification Strategies PEGylated Gold Nanoparticles PEG is a polyether molecule and is typically described by the molecular weight and whether they are linear, branched, star, or combed-shaped. PEG molecules can also be functionalized with thiols, amines, carboxylic acids, or alcohols. PEG molecules are coated onto gold nanoparticles by a sulfur-gold atom bond. Interestingly, coating of a dense layer of PEG onto gold nanoparticles has shown to reduce non-specific binding of proteins (2). It was recently shown that gold nanoparticles with greater than 0.96 PEG/nm2 is required to reduce non-specific binding and to inhibit their uptake into macrophage cells. Using these results, we designed PEGylated gold nanoparticles with the lowest non-specific cellular uptake. This is very important when using gold nanoparticles in biology where the particles are programmed to target specific molecules or cellular receptors. Non-specific protein binding can affect the specificity. In addition, our gold nanoparticle-PEG system contains protruding carboxylic acids or amines that allows other molecules to be conjugated to the surface by using the coupling agent 1-Ethyl-3-(3-dimethylaminopropyl)carbodiimide, better known as EDC. In this reaction, the gold nanoparticles is incubated with EDC and the biological molecule of interest for 2 hrs and then purified by centrifugation to remove excess biological molecules (see Tech Note 105 - Covalent conjugation to Cytodiagnostics Carboxylated Gold Nanoparticles for detailed procedure). These gold nanoparticle conjugates are then ready to be used for biological purposes. Gold Nanoparticles Coated with Bio-Recognition Molecules Gold nanoparticles cannot recognize specific biological targets without surface modification. It is well known that single-stranded DNA’s called oligonucleotides can recognize a complementary sequence, antibodies recognize antigens, and peptides recognize antibodies. By coating the surface of gold nanoparticles with oligonucleotides, antibodies, peptides, or other bio-recognition molecules, one is then able to recognize specific targets in solution, lateral flow, vertical flow, western blots (see figure 1), on/in cells, or in tissues in animals. Basically, these molecules provide gold nanoparticle with a biological function. Typically these bio-recognition molecules are coated onto the surface via direct adsorption or by covalent conjugation to the gold nanoparticle surface containing NHS, carboxylic acid or amine functional groups. Figure 1. Immuno-dot blot assay for detection of human IgG antibodies using gold nanoparticles, silver nanoparticles and gold nanourchins ("spiky gold") coated with bio-recognition molecules. Note how the difference in appearance (color) of the dots can be achieved using different types of noble metal protein conjugates varying in either shape or composition. Heterogeneous Surface Design Engineering a gold nanoparticle surface that contains PEG and bio-recognition molecules is ideal for their application. The PEG molecule prevents non-specific binding while the bio-recognition molecule provides biological specificity. Cytodiagnostics gold nanoparticle products enables researchers to design their nanoparticles in this manner, for optimum biological use. Gold nanoparticles coated with PEG or/and bio-recognition molecules (BRM) has many applications, e.g. biosensors, cellular probes, drug delivery vehicles, or as optical contrast agents. Below, we provide some specific examples of how to use gold nanoparticle conjugates. Single stranded DNA-coated onto gold nanoparticles can be used for detection of genetic material (3). In this application, single stranded oligonucleotide-coated gold nanoparticles are incubated with a DNA fragment of interest. If the fragment is complementary to the oligonucleotide sequence on the gold nanoparticles, particles are assembled together. As a result of this "aggregation” the color of the solution changes from red to blue because the surface plasmon is coupled when particles are in the aggregated state. The color change thus indicates a positive detection. Mutations can be detected by heating the sample. DNA de-hybridizes when heated and when a mutation is present in the sequence, the melting temperature is lowered. By measuring and comparing the temperature of a mutated sequence to a perfectly complementary sequence, one is able to detect whether a mutation is present or not. More complex schemes can also be designed to identify the location of a mutation within the DNA fragment analyzed. Through years of experience, Cytodiagnostics has optimized protocols for conjugation of oligos to gold nanoparticles and we are proud to offer our OligoREADY™ conjugation kits for easy conjugation of thiolated oligonucleotides to gold nanoparticles with sizes in the range of 5-100nm. Applications in In Vivo Cancer Research The gold nanoparticle PEG/BRM system can be designed to selectively target tumors and bind to cancerous cells. Interestingly, PEGylated gold nanoparticles can target tumors by a passive mechanism alone. An advantage of the protective PEG-layer on the gold nanoparticles is that it has been shown to reduce macrophage uptake. Macrophages are part of the reticuloendothelial system that removes foreign materials from the blood. The PEGylated layer reduces the interaction of the gold surface with blood proteins thereby minimizing non-specific macrophage uptake. This allows the nanoparticles to reside in the blood for long-term, which allows for a greater chance of tumor extravasation. If coated with a drug or imaging agent (see our Fluorescent Gold Nanoparticles), the gold nanoparticles can be used as a visualization tool as well as a delivery vehicle to the tumor. Another method of targeting tumors is by coating the gold nanoparticles with a bio-recognition molecule that recognizes receptors on tumor cells, the extracellular matrix, or blood vessels, i.e. active targeting. The advantage of using gold nanoparticles is that one can control the delivery efficiency by the size, shape, or surface chemistry (4). One of the key questions facing researchers is to understand how the size, shape, and surface chemistry (known as the physico-chemical properties) affect how nanoparticles distribute in the cell and body, and whether specific nanomaterial designs cause toxicity. Gold nanoparticles are ideal platforms to perform these studies on because they can be synthesized and tuned with a narrow size distribution. Further, designs with different shapes and surface chemistries can be readily achieved. This allows one to systematically evaluate their behavior in biological systems. By performing such studies, one is then able to identify the designs with the lowest toxicity, which subsequently can be selected for the final application(s). Gold nanoparticles scatter light, and when using a dark field microscope to image them, they appear as bright spots (similar to fluorescence). A unique advantage is that the dark field signal does not photobleach like fluorescence from dyes. By labeling gold nanoparticles with bio-recognition molecules such as an antibody to a cell surface receptor etc. cells can thus conveniently be targeted and imaged. In addition, low-level target detection can be improved by using silver enhancement of bound gold nanoparticles. The surface is the interface of the nanoparticle with the environment and the ability to manipulate the surface of gold nanoparticles is essential for their use. Here, we present a product with a PEGylated surface that reduces non-specific binding to the gold surface and further functionalization with bio-recognition molecules provides an easy strategy to both target and visualize cellular targets and intracellular processes. - Sperling, R. A.; Gil, P. R.;Zhang, F.; Zanella, M.; Parak, W. J.. Biological Applications of Gold Nanoparticles, Chemical Society Reviews, 2008, 37, 1896-1908. - Walkey, C. D.; Olsen, J. B.; Guo, H.; Emili, A.; Chan, W. C. W. Nanoparticle Size and Surface Chemistry Determine Serum Protein Adsorption and Macrophage Uptake, Journal of the American Chemical Society, 2012, 134, 2139. - Elghanian, R; Storhoff, J. J.; Mucic, R. C.; Letsinger, R. L.,; Mirkin, C. A. Selective Colorimetric Detection of Polynucleotides Based on the Distance Dependent Optical Properties of Gold Nanoparticles, Science, 1997, 277, 1078. - Chou, L; Chan, W. C.W. Fluorescence-Tagged Gold Nanoparticles for Rapidly Characterizing the Size-Dependent Biodistribution in Tumor Models, Advanced Healthcare Materials, 2012, DOI: 10.1002/adhm.201200084.
<urn:uuid:7ffd8749-98a5-4006-9e11-06bca09e01c1>
CC-MAIN-2020-16
https://www.cytodiagnostics.com/pages/gold-nanoparticles-surface-design-and-modification
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370511408.40/warc/CC-MAIN-20200410173109-20200410203609-00435.warc.gz
en
0.872947
2,162
3
3
In September 2015, 193 world leaders agreed to 17 Global Goals for Sustainable Development. The UN’s Sustainable Development Goals (SDGs) are grounded in the global ambition of “leaving no one behind.” Published in The Lancet on September 12, 2017, the study, “Measuring progress and projecting attainment on the basis of past trends of the health-related Sustainable Development Goals in 188 countries: an analysis from the Global Burden of Disease Study 2016,” is the second annual report on health-related SDG indicators by the Institute for Health Metrics and Evaluation (IHME) and Global Burden of Disease collaborators. The publication of the scientific paper coincides with the release of a new report at the United Nations General Assembly (UNGA) by the Bill & Melinda Gates Foundation. Goalkeepers: The Stories Behind the Data is the foundation’s first annual progress report on the SDGs and was produced in partnership with IHME. This report will be presented at a separate event during the UNGA at 9 am ET on Wednesday, September 20. The event will bring together speakers from around the world – including former US President Barack Obama, Malala Yousafzai, Bill Gates, and Melinda Gates – and focus on ways we can drive more progress in health and development. In addition, IHME updated its Sustainable Development Goals visualization tool, which allows users to compare and contrast between countries and among indicators. Landing page of the Health-related SDGs Data Visualization Building on results from last year’s reports, these updated findings are important to understanding today’s gains and gaps for the health-related SDGs, and are essential for decision-makers as they aim to improve the health of populations. Below we have highlighted some uses and coverage of last year’s SDG report and paired them with particularly interesting or notable findings from GBD 2016, which include projections to 2030 based on past trends and projected attainment of SDG targets. Timor-Leste records remarkable progress on health-related SDGs Timor-Leste showed marked improvement on several health measures encompassed within the Sustainable Development Goals between 2000 and 2015, a potential sign that the country is well-positioned to achieve continued progress in the SDG era. Such gains were highlighted in the Global Burden of Disease Study 2015 (GBD 2015) baseline assessment of the health-related SDGs. Timor-Leste’s progress was primarily driven by improving performance on met need for family planning with modern contraception methods, skilled birth attendance, under-5 and neonatal mortality, child stunting, exposure to unsafe water and sanitation, and mortality from conflict. The country’s Government Spokesperson, Minister of State Agio Pereira noted that “to be recognized as making the most improvement in health reminds that we are moving well. We use this kind of encouragement to press on with even more vigor to improve the health and wellbeing of our people.” In addition to updating results for 1990 to 2016, the GBD 2016 SDG collaborators produced projections for each health-related SDG indicator through 2030; they accomplished this by using past trends (1990 to 2016) to inform these projections. Based on past rates of progress, Timor-Leste was projected to have among the most pronounced improvements on the health-related SDGs by 2030. The GBD 2016 SDG analysis also re-emphasized Timor-Leste’s substantial gains on the universal health coverage (UHC) index between 2000 and 2016. Global Burden of Disease study provides national baselines for the health-related SDGs As highlighted in a Nature commentary, the GBD 2015 baseline assessment of the health-related Sustainable Development Goals was recognized as the only effort “specifically designed to track a part of the SDG agenda.” Furthermore, the Sustainable Development Solutions Network (SDSN) used the GBD 2015 universal health coverage tracer measure as part of their 2017 SDG index update. SDSN aims to quantify the full range of SDG targets and indicators, while the GBD collaboration focuses on measuring the health-related SDGs. For the GBD 2016 SDG analysis, researchers substantially improved the assessment of UHC by incorporating measures of health care for non-communicable diseases. To do this, they used the Healthcare Access and Quality (HAQ) index, a summary measure of national levels of personal health care access and quality that originated from the GBD 2015 study. As emphasized by the World Health Organization’s Director-General and former IHME board member Dr. Tedros Ghebreyesus, achieving UHC is viewed as a cornerstone to attaining the health-related SDGs. This updated measure of UHC can provide the basis for monitoring national progress in expanding essential health services to all populations. India and the health-related SDGs – current challenges and prospects for progress As highlighted in the media and scientific literature, India’s baseline performance on the health-related SDGs showed much room for improvement in the post-2015 era. Based on the GBD 2015 assessment of the health-related SDGs, areas of particular priority included environmental risks (e.g., exposure to unsafe water and ambient air pollution), maternal mortality, and malaria. GBD 2016 results show that, based on past rates of progress, India is projected to meet the SDG target for under-5 mortality by 2030 (25 deaths per 1,000 live births or lower). Yet in the absence of accelerated progress between 2017 and 2030, several health challenges may persist in India, particularly those associated with child growth failure, ambient air pollution, and a subset of infectious diseases (e.g., malaria, hepatitis B). Singapore leads the world on the health-related SDGs Along with Sweden and Iceland, Singapore recorded the highest performance on the health-related Sustainable Development Goals in 2015. These findings were based on the GBD 2015 baseline assessment of the health-related SDGs. Singapore’s noteworthy performance was driven by scoring above 90 (out of 100) for 20 of the 33 health-related SDG indicators included in GBD 2015, ranging from skilled birth attendance to mortality due to interpersonal violence. For GBD 2016, Singapore recorded the highest overall performance on the health-related SDGs in 2016. However, based on trends observed from 1990 to 2016, projections to 2030 showed stalled progress for Singapore on many of the health-related SDGs. Child overweight emerged as one of the largest potential health challenges for Singapore in the SDG era, as well as for many others among the 188 countries included in the GBD 2016 SDG assessment. World Economic Forum points to the GBD study for measuring the health-related SDGs “How is your country doing?” was the World Economic Forum’s response to the GBD 2015 baseline assessment of the health-related SDGs. In their article, the World Economic Forum highlighted countries with the highest performance in 2015 (Iceland, Sweden, and Singapore), but also stressed the challenges ahead – for all countries – for building effective, sustainable health systems. Singapore, Iceland, and Sweden again recorded the best performances on the health-related SDG index in 2016, according to GBD 2016 SDG collaborators. Nonetheless, according to projections to 2030, which were informed by past trends, Norway and Finland edged out Iceland and Sweden for the second and third spots on the health-related SGD index in 2030. These findings were at least in part due to projected stagnation on improvements in some health areas, including child overweight and alcohol use. Vietnam’s past health gains signal further potential for progress in the SDG era From 2000 to 2015, Vietnam recorded substantial improvements on many health areas now represented in the Sustainable Development Goals (SDGs), a finding that may position Vietnam for further gains over the next 15 years. These results draw from the health-related SDG index, a summary measure of 37 health-related SDG indicators assessed by GBD 2015. “Behind these increasing numbers is an important human reality: higher scores mean healthier people,” said Dr. Justin Beardsley of the Oxford University Clinical Research Unit in Ho Chi Minh City. Results of the GBD 2016 SDG analysis show that, based on past trends, Vietnam could see continued gains in performance for several indicators, including child stunting and sanitation. Of the 24 measured indicators with defined SDG targets, Vietnam was projected to meet three – maternal mortality ratio, under-5 mortality, and neonatal mortality – in 2030 on the basis of past trends. Pakistan has much room for improving health in the SDG era The need to accelerate progress in health in Pakistan was emphasized after the country ranked 149th out of 188 countries for the health-related Sustainable Development Goal (SDG) index in 2015, according to the GBD 2015 baseline assessment of the health=related SDGs. Conflict mortality, unsafe water and hygiene, and neonatal mortality were among the SDG indicators on which Pakistan performed the worst in 2015. Conversely, in comparison with other countries, Pakistan scored fairly well on prevalence of neglected tropical diseases, harmful alcohol use, and child overweight. “These analyses are critically important for Pakistan, where limited data make the transition from MDGs to the SDGs even more challenging. These data allow the country to set a baseline based on recent performance and also set a trajectory for achieving the health and health-related SDGs,” said Professor Zulfiqar Bhutta, a GBD collaborator and Founding Director of the Aga Khan University’s Centre of Excellence in Women and Child Health. On the basis of past rates of progress, Pakistan was projected to see the largest gains in performance for skilled birth attendance, child stunting, sanitation, and household air pollution by 2030. Nonetheless, in the absence of accelerated gains, 2030 projections had Pakistan achieving none of the 24 currently measured SDG indicators with defined targets. Australia among the leading 10 countries on the health-related SDGs Australia’s performance on the health-related Sustainable Development Goals was heralded by the Brisbane Times, with the country scoring 81 out of 100 on the health-related SDG index for 2015. These results came from the GBD 2015 baseline assessment of the health-related SDGs. Australia recorded among the best performances on several SDG indicators in 2015, including conflict mortality, child stunting and wasting, and maternal mortality. The GBD 2016 update for the health-related SDGs showed similar levels of high performance in Australia one year later; however, projections based on past rates of progress showed few improvements for the country by 2030. Such stagnation in projected performance was mainly driven by child overweight, as well as relatively minimal gains on other SDG indicators. Ghana shows progress on priority health areas for the SDGs, but faster gains are needed From 2000 to 2015, Ghana achieved improvements on several health priorities now encompassed within the Sustainable Development Goals, particularly for infectious diseases like malaria. At the same time, accelerated advances are needed over the next 15 years, according to the GBD 2015 baseline assessment of the health-related SDGs. GBD Collaborator Dr. Tom Achoki said, “Ghana has shown promising health progress in the past 15 years, particularly by combating problems like childhood stunting and deadly diseases like HIV, malaria, and neglected tropical diseases. But Ghana needs to take action to further drive down these disease rates, and tackle major challenges like water and hygiene.” GBD 2016 results show that, based on past rates of progress, Ghana is projected to see substantial advances in its 2030 performance on skilled birth attendance, sanitation, met need for family planning with modern contraception methods, and household air pollution. Based on past trends, Ghana is projected to meet one – vaccine coverage – of the 24 currently measured health-related SDG indicators with defined targets in 2030. Global Burden of Disease study contributes to ‘new vital science’ of measuring SDG progress The Global Burden of Disease Study 2015 is a key contributor to the “new vital science” of measuring progress towards the Sustainable Development Goals, according to a special report published in The Lancet. Due to the SDGs’ broadened development agenda – 17 goals, 169 targets, and 232 indicators – many concerns have emerged regarding how, or if, tracking improvements and challenges on the SDGs would be possible. With the GBD 2015 baseline assessment of the health-related SDGs, the GBD collaboration provided a scientifically strong, independent platform for measuring gains on the health-related SDGs. For GBD 2016, researchers produced indicator-by-indicator projections through 2030 in an effort to better understand potential trajectories for the health-related SDGs. These projections were informed by past trends and rates of progress observed from 1990 to 2016. GBD 2016 results indicated that while some countries were well-positioned to achieve several of the health-related SDGs in 2030, many places face substantial challenges in the SDG era. Their findings “underscore the need for dramatic, if not unprecedented, acceleration of progress,” write the GBD 2016 SDG collaborators. “Such action is particularly crucial for countries already showing signs of being left behind.”
<urn:uuid:1e5c2b20-e393-4941-b6ac-4b9cfbc6880d>
CC-MAIN-2020-16
http://www.healthdata.org/acting-data/progress-and-prospects-health-related-sustainable-development-goals
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370526982.53/warc/CC-MAIN-20200404231315-20200405021315-00276.warc.gz
en
0.947228
2,740
2.921875
3
Copyright © 2003 the Brewery History Society Hodgson's Brewery, Bow and the Birth of IPA by Martyn Cornell Greed and luck were the parents of India Pale Ale. It was born from the desire of officers commanding the East Indiamen sailing ships to make a fortune supplying home comforts to nostalgic expatriate Britons in 18th century India working for the East India Company. The East India Company was founded in 1600, and grew in the 18th century to be the most powerful force, economic and political, in India. One small reason for its success was that it allowed the independent ship’s commanders who carried its goods back from India to conduct private trade on their own accounts, thus keeping rival independent traders out. This private trading could be hugely valuable: a ship’s commander might well make up to £12,000 a year from private business, selling English goods in India, generally to the company’s "civil servants" in the trading posts known as "factories", and bringing Indian goods back to Britain. By 1784 it was customary, although illegal, for an East Indiaman captain to sell his command to his successor for between 4,000 and 7,000 guineas. There were 70 ships in regular service in the East India trade, and the goods the commanders and officers of the East Indiamen bought out from London in the holds of those ships ranged from clothes, perfume, china and glass to hams, cheese, cider, wine and beer. It was everybody’s luck that one of the beers they shipped turned out to improve amazingly on the long journey from England to the East, creating a style that is still a world classic. Beer must have gone east with the first ships from England to sail to the Indies, even in the 16th century, since, because water went brackish, beer was the regular drink on sailing ships. There is mention in 1638 of a ship’s captain in the East Indies being "well provided with … English beer." The East India Company made sure its "factories" were well provided, too: in one month, July 1716, the "factors" and other servants at the Company’s base in Bencoolen, Sumatra, consumed 24 dozen bottles of beer, as well as 74 dozen bottles of wine, 42 gallons of Madeira, 164 gallons of toddy, and a considerable quantity of arrack. By 1750 almost 1,500 barrels of beer were being exported from England to "Asia" generally, a figure that had risen to 9,000 barrels by 1800. The East India Company’s docks were at Blackwall, down the Thames towards the sea from the City of London and just to the west of the mouth of the Lea. When the commanders and captains of the East Indiamen went to buy goods to sell out in India, they turned for the beer to a brewer close by, George Hodgson, just up the Lea at Bow. Hodgson, who had begun brewing near St Mary le Bow church in October 1752, was one of the smaller London brewers, making an average of just 11,200 barrels a year for the first 16 years of the brewery’s existence. But beer from the brewery could be got down to Blackwall easily by barge for loading onto the East Indiamen, and Hodgson gave the commanders and captains lengthy credit of up to 18 months. Thus they took their supplies from him rather than one of the bigger, better-known London brewers. The beers the East Indiamen officers bought from the Bow brewery included porter (Hodgson was still shipping porter out to India even in 1823) and October beer. This was the strong, pale, well-hopped autumn-brewed stock beer popular among 18th century country gentry, a class whose sons probably made up a good number of the East India Company’s staff. A brewer in the 1760s, George Watkins, said that October ale was brewed at a stonking 16 to 20 bushels to the hogshead, though "those with 20 bushels are too heady and some go as low as 10 to 12 bushels." Even at 10 bushels per hogshead, or 6 2/3rd bushels a barrel, this would still give an OG of 1140 or more. October beer would be ready for bottling after 12 months, Watkins said, and should be kept in bottle for a further year, making it two years old before it was fit to drink. However, the October beer the East Indiamen officers bought from Hodgson spent four to six months or more at sea on its long journey to India, passing through the warm equatorial waters of, first, the mid-Atlantic and then, after rounding the Cape of Good Hope, the Indian Ocean. The journeys were certainly rough: an East Indiaman would make only four or five round-trips before being broken up or sold off. But the slow, regular temperature changes and the rocking the beer received in its oak casks as the East Indiamen ploughed the waves had a magical maturing effect. By the time the beer arrived in Bombay, Madras or Calcutta, having gone via Madeira, Rio de Janeiro, St Helena, Cape Town and the stormy Mozambique Channel, it was as ripe as a brew six times its age that had slumbered unmoving in an English cellar. The expatriate British running the East India Company’s "factories" and commanding its three private armies loved it, and by the beginning of the 19th century, Hodgson’s was "the beer in almost universal use" in India. ("Beer" was what it was known as in India, rather than "pale ale".) There is no evidence at all that George Hodgson knew October beer would be particularly suited to the rigours of a journey out to the East by sailing ship, or that he brewed a special beer to sell to the East Indiamen officers. Instead, it seems, he simply sold them a selection of what he normally brewed, and hit lucky with one particular beer. He was not especially entrepreneurial: he just happened to be in the right place at the right time with the right product. Pale ale, "light and excellent" was being sold in India alongside cider and London porter by at least 1784, an advertisement in the Calcutta Gazette for April that year shows. Pale ale, porter, "small ale" and strong ale continue to be advertised in the Gazette, brewers still unnamed, for the next 15 or so years. In January 1801 the Gazette at last carried an advertisement for the arrival of "beer from Hodgson … just landed and now exposed for sale for ready money only." The Bow brewery’s reputation was established in India, its name now a guarantee of quality: in 1809 it was being described in the Gazette as "Hodgson’s select Pale Ale, warranted of superior excellence." The identification of India Pale Ale with an October-brewed seasonal or stock beer is confirmed from several sources. An advertisement in the Calcutta Gazette from January 20 1822 describing the "select investment of prime London goods just landed from the HC [Honorable Company] ship Sir David Scott", included "Hodgson’s warranted prime picked pale ale of the genuine October brewing, warranted fully equal, if not superior, to any ever before received in the settlement." Three decades later the beer was still an autumn speciality: in the Leeds Intelligencer of 18 October 1856, Tetley’s brewery announced to its customers: "East India Pale Ale – This Season’s Brewings are now being delivered." Even in 1898 Waltham Brothers’ brewery in Stockwell, South London could say of its own India Pale Ale: "This Ale is heavily hopped with the very best Kent hops, and nearly resembles the fine Farmhouse Stock-Beer of olden times." By 1811 George Hodgson’s son Mark was running the brewery. Within a couple of years, in 1813, some 4,000 barrels of Hodgson’s beer a year were being shipped to the East, four times the amount shipped in 1801. Four years later the operation had moved 230 yards east, to Bow Bridge, where a brewery tap was opened called the Bombay Grab: the pub first appears in Holden's Triennial Directory of London and County published in 1805. Much discussion has gone on over what a "Bombay Grab" is: the name almost certainly comes from the two-masted Eastern coasting-vessel known in Arabic as a gurab, or galley, and celebrates the brewery’s Indian trade. The brewery at Bow Bridge was rebuilt in 1821, when it was being run by Frederick Hodgson and Thomas Drane. With the brewery rebuilt, Hodgson and Drane were now ready for a coup. They would cut out the East Indiamen’s officers and ship their beer to India themselves, retailing it themselves once it arrived, and thus gathering all the profit of the Indian beer trade. The charge for shipping a barrel of beer to the East, even for an outside trader, was no more than the charge for shipping one to Edinburgh. The partners opened an office in Cornhill in the City of London and set up as shippers. At the same time they ended the long-standing arrangement of giving 12 or 18 months’ credit on the beer they sold to the Company’s employees, raised the price by 20 per cent and refused to sell on any terms but cash. Naturally, the East Indiaman captains and officers were furious: Hodgson’s beer had previously "formed one of the principle articles in their investments," as one commentator wrote. Hodgson and Drane also deeply upset the merchants in Calcutta and Madras, who found they too were now cut out from the most important brand in the local beer trade, Whenever the Indian merchants tried to import someone else’s beer, Hodgson and Drane dropped their prices so low, they frightened their competitors away. But even if the captains and commanders did find regular supplies of beer elsewhere, Hodgson and Drane were confident that their product had such a reputation in India, no one else could compete. They could not, however, have been more wrong. Powerful men in the shipping business were determined Hodgson and Drane should not be allowed to wreck with impunity a trading arrangement that had help make their ships’ officers wealthy. Early in 1822 Campbell Marjoriebanks, who represented the shipping interest on the East India Company’s court of directors, invited the Burton upon Trent brewer Samuel Allsopp to dinner at his house in Upper Wimpole Street, London. Allsopp was suffering, like the other Burton brewers, from the loss of trade to Russia, their main market, after the Russian government imposed a huge tariff on English ale imports. Marjoribanks persuaded Allsopp that the Indian market could easily replace the Russian one, telling him that 5,000 hogsheads (or 7,500 barrels) of English beer were exported to India every year, and "we are all now dependent upon Hodgson, who has given offence to most of our merchants in India." Allsopp went back to Burton to try to replicate "Hodgson’s India beer", which was paler and more bitter than the ales the Burton brewers were used to brewing. However, what Hodgson and Drane probably did not know, and even the Burton brewers were scarcely aware of, is that the well water of Burton, rich in calcium sulphate, naturally produces a much better pale, bitter ale than London water, rich in calcium carbonate, which is more suited to dark beers such as porter. Until London brewers learned how to treat, or "Burtonise" their water late in the 19th century, a Burton brewer was always going to make a superior pale beer, because his type of hard water made for better conversion of starch into sugar when pale malt was used in the mash tun. The beer could also be made paler, since the sulphate-rich water extracted less colour from the malt that London water did. The first consignments of Allsopp’s new pale ale went out to India in 1823, Within a year the Burton brewer was receiving letters from the sub-continent telling him that his beer "is almost universally preferred by all old Indians [that is, Europeans in India] to Hodgson’s." Allsopp’s success in finding a new market could not be kept a secret locally, and two other big Burton concerns, Bass and Salt began to brew pale ale in 1823. By 1832/3 Bass had 43 per cent of a yearly beer trade to India of 12,000 barrels, Hodgson and Drane just 28 per cent and Allsopp 12 per cent. Hodgson’s trade continued to decline until, by 1841/2 it was down to only 6 1/2 per cent of 18,300 barrels a year, against 29 per cent to Bass and 36 1/2 per cent to Allsopp. Slowly the firm that had once been synonymous with the Indian beer market faded into obscurity. From at least 1838 the Bow brewery partnership was known as Hodgson and Abbott. In 1842 it was only the 25th largest brewery in London by consumption of malt, at just under 5,000 quarters a year, equivalent to a production of around 20,000 barrels of beer. It was still Hodgson & Abbott in 1845, but by 1849 Edwin Abbott & Son, Pale Ale and Stout Brewers, were in business on their own at the Bow Bridge brewery. The operation was eulogised in 1861 by the comic writer Charles Stuart Calverley, who wrote a poem called Beer that began: - O Beer! O Hodgson, Guinness, Allsopp, Bass! - Names that should be on every infant's tongue! The puzzle is that while the last three were still huge names, the Hodgsons had been completely replaced at the Bow Brewery by the Abbotts at least 12 years before the poem appeared. Either Abbott & Son retained the brand name Hodgson for their India Pale Ale business, or Calverley knew of the fame Hodgson once had, and did not know the Hodgsons were no longer in business. In 1863 the concern became the Bow Brewery Co Ltd, and in 1869 it turned into Smith, Garrett & Co. In 1927 Smith Garrett was taken over by Taylor Walker of Limehouse. The Bow brewery was demolished in 1933 to make way for London County Council flats. This has been adapted from Beer: The Story of the Pint by Martyn Cornell, published in August 2003 and available from the Brewery History Society bookshop. In the next issue, Martyn probes further into the dark mysteries of Porter.
<urn:uuid:56836d24-54f7-437d-890b-1a433d65a915>
CC-MAIN-2020-16
http://www.breweryhistory.com/journal/archive/111/bh-111-063.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506673.7/warc/CC-MAIN-20200402045741-20200402075741-00034.warc.gz
en
0.978732
3,115
3.015625
3
History of Penzance Pen Sans was the original name for the town of Penzance. The name comes from the old Cornish language wherein ‘Pen’ meant point of land, or headland, and ‘Sans’ meant sacred or holy place to do with a church or religious site. If we translate the name Pen Sans into modern English it means ‘Holy Headland’ that part of the modern town now known as the Battery Rocks and Barbican lane. The religious site here was said to be an ancient Chapel named after St Anthony. In 1750 a famous Cornish Historian, Dr William Borlase, who wrote a very important book on Penzance says: “The ancient Chapel belonging to the town of Penzance may be seen in a fuel cellar near the quay: it is small and as I remember had the image of the Virgin Mary in it.” Another writer in 1880 said that this early chapel was: “a small oblong structure, pointing directly east and west, of about 30 feet in length and 15 feet in breadth… The entrance was from the south and towards the west.” A carved stone figure was set into the east wall but was badly damaged over the years. In 1850 it was removed to St Mary’s churchyard where it can still be seen. The St Anthony Gardens, opened in 1933, take their name from the old site. Lescudjack Castle: The Iron Age The earliest building on the site of the present town of Penzance that can still be seen today is the huge Iron Age castle or hill fort on the summit of the hillside where Castle Road now stands. This great fort was known as Lescudjack Castle and this part of the town now takes its name from the building. The castle is only one of many in West Cornwall but it was the largest, covering three acres of ground. When you look at the remains of this castle today, it seems difficult to believe that it was once a great building. But it was never like the Norman Castles with their towers, walls, drawbridges and dungeons. The Iron Age castles were much simpler but they were still very difficult to build and to attack. At Lescudjack Castle there was a single great wall of stones earth and grass shaped in an oval. Outside this there was a deep ditch for extra protection. The walls are known as ramparts and certainly would have had rows of wooden stakes set on top to give added height and strength for the defenders inside. The ditch running round the ramparts is known as the vallum and some writers describing the castle have said that until a hundred years ago Lescudjack had three great ditches. Inside the walls there would have been hut circles, stoves and workshops. Food supplies and water would be important. The Iron Age covered many centuries from approximately 500 BC to 400 AD, nearly 1,000 years and this is the time to which the castle belongs. Lescudjack as a name comes from the Celtic language: Lys Scosek, which means shielded stronghold. The castle was certainly built in a very important position above a steep valley (the Coombe) to the east, and at the top of the hill slope leading up from the sea on the south and west. Alwarton: Alverton Manor The present day district of Penzance known as Alverton has a history going back over a thousand years. Modern Alverton gets its name from a Saxon Lord called Alward, who held the manor, or ‘ton’ as it was known to the Saxons. Alward’s ton, Alwarton and, finally, Alverton gives us form of the name and its origin. Alwarton was certainly included in the Domesday Book, ordered by William the Conqueror in 1086. The king wanted a complete record or survey of the people, the lands and the wealth of his new kingdom in order that he could see to its government in the best possible way. Like all parts of the country the manors of West Cornwall were surveyed. This is the entry for Alwarton:- “The Count has manor which is called Alwarton which Alward held T.R.E. (Tempora Regis Edwardi; in the time of King Edward) Therein are 3 hides of land, and they rendered yeld for 2 hides. Sixty teams can plough these. Thereof the Count has in demesne half a hide and 3 ploughs and the villeins have 2½ hides and 12 ploughs. There the Count has 35 villeins and 2 bordars and 11 serfs and 1 rouncey and 17 unbroken mares and 9 beasts and 4 swine and 100 sheep and 3 acres of meadow and of pasture 2 leagues in length and in breadth. And it renders £20 yearly and when the Count received it, it was worth £8.” “The Count” mentioned here was Robert Count of Mortain, William’s half-brother, who was given the land when it was taken from Alward. Robert owned a great deal of land in Cornwall and was a powerful Norman Lord. There were several manors in West Cornwall all recorded in the Domesday Book. These were part of the ‘Hundred’ or district of Conarditon, which was the West Penwith area. Together with Alwarton, the others would include the manors of Bret-Brea (St Just), Chelenoc (Kelynack), Witestan (Whitesand, Sennen), Ecglosberria (St Buryan), Luduham/Ludeum (Ludgvan), Lordicla (Lanisley Gulval). Witestan, for example, was much poorer than Alwarton. The survey there said:- " The Count has 1 manor which Alward held T.R.E. now Ralf holds it for the Count. There is one ferling of land and it rendered geld for ½ a ferling. Therein is half a plough and 1 serf and 8 beasts and 8 swine and 40 sheep and 40 goats and 12 acres of woodland worth 15s. When the Count received it it was worth 20s." Witestan had only a small amount of land for crops and was mainly grazing land for animals. There were also very few people there unlike Ludeum (Ludgvan) which had 14 villeins, 40 borders and 9 serfs. Richard held the manor for Robert of Mortem and there was land to support numbers of animals and crops: 27 unbroken mares, 22 beasts, 17 swine, 140 sheep with 300 acres of pasture and land that 30 teams could plough. The exact site of the manor house at Alwarton is not known but it must have been somewhere not far from the river or the modern-day Alverton road, perhaps near Tredarvah Farm house, on ground above the wet, marshy valley that reaches down to the sea. Nobody can say exactly when the first quay was built at Penzance, but in Tudor times an important writer, John Leland, gave us a short mention of it:- “Pensants - standing fast in the shore of Mount Bay, ys the westert market town of al Cornwayle, and no socier for botes or shyppes, but a forced pere or key.” Marazion and Mousehole had each been more important than Penzance as ports, but in the eighteenth century Penzance harbour became busy with the tin trade. In 1745 the quay at Penzance was rebuilt and was lengthened again in 1782. Valuable tin bars called ingots were some of the most important cargoes leaving the harbour and these came from the smelting works built at Chyandour. The first lighthouse was set up in 1817 but the one that we see today was built in 1855 when the pier was made stronger and greater in length. Albert Pier was opened in 1847 and railway lines were laid along it for trains to reach the dock side. The inner harbour called ‘floating dock”, which is protected by large gates, was opened in 1884. Running along the harbour from the station was a new road opened in 1866 and was very important in helping trade. The following is a copy from the original document from Henry VIII to the people of Penzance, written in March 1512. It gave the people the right to collect for the town all money paid by ships using the harbour - payment for “ankerage, kylage and bussellage.” “We (Henry)… gyve and graunte unto our tennants of the seid towne of Pensanse... all manner of profits that unto us or oure heim Kyngs of England shoild growe by reason of the ankerage, kylage and bussellage of every shyppe that shall arrive... from the fest of Seynt Mighell Tharchaungell last pass as long as they do well and competentlye repayr and maynteyn the seid kaye and bulworks for the saufgard of alle such shyppes as shall lord at the same and for the saufgard and defence of our seid towns.” Wherrytown: Wherry Mine A short distance off-shore from Wherrytown at the western end of the promenade, there is an outcrop of rock that is uncovered at low tide: this was the site of an early and interesting tin mine which began working in 1778. This mine was always difficult to operate because of its unusual position below the shore-line and special arrangements were needed to make work possible. The mine was started by a man called Thomas Curtes who realised that the Wherry rocks held valuable tin, but this site was dangerous. Work to sink the shaft was very slow and could only be carried out during good weather and the times of low tide. Protection from the sea and constant flooding was arranged by constructing a heavy stone collar around the top of the shaft and by building a tall 20 foot wooden tower above this. The wooden defence was made as water-tight as possible and had to keep out the sea during the high tide which covered the rocks to a depth of 19 feet. This wooden structure also had winding equipment set at the top in order to draw out the tin and drain water in the workings. By 1790 the mine was 36 feet deep and before work began on each shift four men had to spend two hours in draining the mine. Once the tin was brought to the surface it was taken ashore in small flat-bottomed boats called ‘wherries’ or simply carried at lowest tides. During the summer of 1790 ten men worked the mine and sold tin worth £600. In 1792 the tin mined at Wherry was worth £3,000. As the mine became richer, better working facilities were introduced A steam engine was erected on the shore and was connected to pumps and machinery out at the shaft by means of a long trestle bridge reaching out over the sand and tidal waters. A horse was used to draw the tin ore from below ground and to do this it walked up and down the length of the bridge winding the rope on simple machinery. The buckets containing the ore were called ‘kibbies’. The steam engine gave much better drainage and helped the mine to develop more efficiently. In 1798 the mine was brought to a swift and unexpected end when the wooden tower over the shaft was destroyed by a ship which had broken its moorings at Newlyn and collided with the workings during a storm. The Wherry mine had been quite rich and had produced tin worth £70,000 over twenty years. Because it was known to be a valuable mine work began there again in 1836 using a steam engine and the trestle bridge to the shaft, but after four years the mine closed and all the equipment and machinery was sold.
<urn:uuid:de24bb7b-6045-420f-b3f2-c9b626ce97e1>
CC-MAIN-2020-16
https://www.cornwalls.co.uk/penzance/history.htm
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371876625.96/warc/CC-MAIN-20200409185507-20200409220007-00115.warc.gz
en
0.982776
2,536
3.1875
3
Severe drought in 2011 and 2012 in Texas raises questions about the present and future of the state’s water resources. Scientists expect groundwater supplies in Texas to fall by 30 percent by 2060. Scientist Michael Young of the Bureau of Economic Geology, Jackson School of Geosciences, University of Texas at Austin talked to EarthSky about what scientists know about water resources in Texas. In 2012 Texas continued to struggle to recover from water shortages from what’s been described as the Great Drought of 2011. What do scientists know about the water resources in Texas in the face of the drought? I think scientists and others in Texas recognize that water is a finite resource. Water is being used for a variety of purposes across Texas. Substantial amounts of water are being used for agriculture. When the drought hit in 2011 and our rainfall was about one third of normal, reservoir storage went way down, and groundwater levels decreased in areas of the state. The farming community suffered tremendous losses because of lack of water to irrigate crops. Typical rain-fed agriculture also suffered because the rain was not falling either. What do scientists understand about this big drought that hit Texas? The climatology community is studying questions such as ‘How did the drought occur?’ and ‘How does drought take hold in the state once it occurs?’ And then there’s the whole issue of water quantity, both related to stream flow and in the groundwater aquifers. We know that once the drought took hold in the state, that the soil water storage itself went down to extremely low values. The soils were about as dry as they’ve ever been recorded. That helps explains why the reservoirs have not really responded very well to the rainfall in 2012. It’s because the water in Texas soil was so dry from the recent drought that it has to be replenished by the rainfall from that year first – before rainfall can go into the reservoirs. The effect of the drought actually extends over multiple years. We’re seeing that now. The reservoir storage in central Texas was, as of late last year, at about 40 percent of normal. That’s in part because the soil water is absorbing most of the rainfall. We also know that, although surface water is relatively accessible, it tends to respond quickly to drought. In other words, surface water is easy to remove from the rivers, if we have the permit to do so, but it also depletes quickly during time periods when river recharge is low. So it’s accessible, but it’s also vulnerable to drought. Groundwater is less accessible, because we have to pump it up from the water table. But it’s also less vulnerable. The drought from 2011 caused a reduction in the water table in some areas of the State but not all areas. So, although groundwater resources are affected by drought, it doesn’t react as quickly in most cases as does the surface water. Texas is really fortunate to have a wide variety of climates. We have a very dry climate to the west, and a much wetter climate to the east. We have the coastal environment and the southern Great Plains up in the north. The water issues are different in different parts of the state. As of late last year, the eastern part of the state was no longer facing substantial drought. West Texas is still dry however, and south Texas is still in an exceptional drought. The water concerns in the west of the state are very different than the water concerns in the east. From the scientific side, we’re learning how to address questions of water shortages that are more local. What goes into water quality? Water quality is greatly affected by the material through which the water has been flowing. For example, water that percolates through the ground picks up nitrates, chloride, and other kinds of anions and cations that lead to higher salinity. If that water reaches the water table, then ground water salinity could increase. If the ground water recharges the streams, then the stream water will reflect, at least in part, characteristics of the groundwater. Further, water being released into the streams from waste water treatment plants generally also has higher salinity than might there may otherwise be expected. Surface run-off also carries constituents with it. This occurs after heavy rainfall events, when water doesn’t infiltrate fast enough. The water runs off and ends up in streams or rivers, picking up sediment from fields or parking lots or whatever the water is flowing over. In different parts of the state, the water quality can differ because the soils are different, as is the way the water is being used. For example, when a community discharges water back into a river or a stream, they have to meet certain water quality requirements. This is monitored by the communities and by the Texas Commission on Environmental Quality (TCEQ). The Federal EPA also sets some of these standards. Where are water resources of Texas right now, and where might they be in the future? Let’s break the water up into two categories, surface water and groundwater, and look at how the water is being used right now. I think that the amount of water being used today is somewhere on the order of about 16 million acre-feet per year. An acre-foot of water is the volume of water that’s 1 foot deep, spread out over an acre. It’s about 325,000 gallons. That’s enough water for a family of five for a year. About 60 percent of all water used in the state is groundwater, and the other 40 percent of the water is from surface water. Most of the groundwater – about 80 percent – is used for irrigation. Communities use perhaps 15 percent of all the groundwater in the state. So it’s relatively a small percent. One of the issues we’re trying to address across the state is what’s known as “environmental flows.” This is the minimum amount of water needed in the river to supply ecosystems, or to supply estuary systems down on the coast. Communities, groundwater conservation districts and others are looking at different approaches for maintaining environmental flows, while at the same time distributing how the water is being used across different regions of the state. What kinds of solutions are being studied? To make our water supply go further, scientists are studying solutions including desalination, water reuse, conservation, and a technique called aquifer storage and recovery – what’s known as ASR. Aquifer storage and recovery is a technique where excess water, either from the rivers during floods or where perhaps water is being pumped from one aquifer to another, is stored underground in one of the aquifers. These storage sites are valuable because this water doesn’t evaporate. San Antonio is putting a substantial amount of water underground, on the order of 150,000 acre feet a year. That water is being used in case of shortages elsewhere, for example, during the summertime when the reservoirs are low or when the water demand is high. Water managers can pump that water up from the aquifer and supplement existing water supplies for communities. Then, in the wintertime, when the demand goes down, the water can be returned back into the system. It essentially becomes a storage reservoir, only underground. Water reuse is also an important water strategy. Currently, about 450,000 acre feet per year of reuse water could be used for irrigation in golf courses and parks, for example, or for release in wetlands and rivers. That volume is expected to increase to about 850,000 acre feet, almost double, over the next 30 to 40 years. That’s a potentially large source of water that could supply upwards of 850,000 families per year. I believe that water conservation offers huge value as well. Right now, the average person in Austin uses about 135 to 140 gallons per day. People should know how much water they actually use, and the information is available on the water bill. That’s a very important number to know, because the less potable water we use, the less water treatment has to occur. That means more water in the reservoirs. But we can’t conserve our way to where we gain new water. So we need different sources of water. One example is brackish water; this is, salty water. Brackish water is found in deeper aquifers, generally below the potable supply. Brackish water is being studied as an alternative water supply for parts of the state, for different purposes. So for example, brackish water is pumped up from deep aquifers, then treated using desalination and is available as potable-grade water. That’s new water being introduced into Texas, water that previously was not really part of the active hydrologic cycle. So, this is the big science question of the future: How do we grow as a state, given growth in population, the needs in terms of power and energy, and the needs for water, and keep them all synced up, where we’re not running short of natural resources? That’s really the big question. Where the scientific community can help is to identify those projects and techniques that are most likely to yield the most amount of water. What’s the most important thing you want people to know about water resources in Texas? I would say the most important thing is for people to know where their water comes from and how much they use. Water plays a vital role in society, in everything from where we grow our food to cooling power plants to exploring for energy. And water is essentially a finite resource. When we grow in population, we need to be smarter about how we view water and about how the water is managed so that we don’t add stress in the water supply over the next 30 to 50 years. I think that is really is the main goal. The EarthSky team has a blast bringing you daily updates on your cosmos and world. We love your photos and welcome your news tips. Earth, Space, Human World, Tonight.
<urn:uuid:4eed62be-cc38-48e8-bfdd-6f9bea3ed62f>
CC-MAIN-2020-16
https://earthsky.org/earth/michael-young-on-water-resources-in-texas
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497042.33/warc/CC-MAIN-20200330120036-20200330150036-00235.warc.gz
en
0.965447
2,090
3.515625
4
Corneal opacification is a major cause of blindness in the developing and the developed world. In a sizeable portion of cases, associated age-related cataracts contribute to poor visual acuity. Although corneal transplantation with cataract extraction and IOL implantation has been the preferred method for treating cases with corneal scars and coexisting age-related cataract,1,2 some patients attain good vision with cataract surgery alone. For example, one-eyed patients who may be high-risk candidates for combined corneal transplantation and cataract extraction procedures may achieve adequate vision after cataract surgery alone. However, successful surgery may be difficult because the surgeon has only suboptimal visualization of the intraocular structures. Allograft corneal transplantation combined with extracapsular cataract extraction and IOL implantation has been the preferred method for treating cases of corneal opacification and coexisting cataract. However, the scarcity of donor corneas, risk of graft failure, graft infection, secondary glaucoma, and suture-related problems after this combined procedure necessitate the use of alternative surgical techniques to manage patients with partial corneal opacification and cataract. Various surgical phacoemulsification techniques have been described for use in patients with coexisting cataract and partial corneal opacification, including intraoperative use of trypan blue dye,3 creation of pupillary sphincterotomies,4 and use of endoillumination.5,6 This article gives a brief overview of these techniques. When corneal opacification is restricted to the anterior 100 µm of the cornea, a phototherapeutic keratectomy (PTK) may be attempted before cataract surgery. PTK is performed in a standard fashion, using the 193-nm excimer laser.7 The surgical technique comprises mechanical epithelial debridement followed by ablation in the central 5-mm zone. In cases with band keratopathy, a surgical blade may be used for mechanical removal of calcium plaques. Methylcellulose may then be used as a masking agent for irregular surfaces before ablation. Adequacy of the depth of ablation is assessed with regular intraoperative visualization of the cornea between laser bursts or by intraoperative slit-lamp examination. Refractive changes following PTK can be variable; significant myopic or hyperopic shifts may occur. Subsequent cataract surgery may be performed 6 weeks after PTK using a standard surgical technique. INTRAOPERATIVE USE OF TRYPAN BLUE Cases with deep or full-thickness corneal scars are not amenable to treatment with PTK. In such situations, the corneal opacity may impede visibility—even in the presence of an adequate fundus reflex. Intraoperative steps, such as capsulorrhexis, nuclear emulsification, residual cortex removal, and IOL implantation are dependent upon the ability to visualize the capsular bag anatomy. In these cases, trypan–blue-assisted cataract surgery is a viable option; however, at least part of the cornea must be clear to allow visualization of the stained capsule and nucleus after capsulorrhexis creation. Trypan blue 0.01% is safe when applied to the corneal endothelium,8,9 and capsular staining has been previously documented for management of mature white cataracts and cataracts with coexisting corneal opacities.3,10 The intraoperative use of trypan blue dye enhances visibility of the anterior capsule and delineation of the lenticular morphology. It also aids in visualization of the capsulorrhexis margin during phacoemulsification. Tables 1 and 2 describe the surgical technique for performing phacoemulsification in a case with partial corneal opacification with the help of trypan blue dye. In cases with cataract and coexisting partial corneal opacification, cataract surgery with pupillary enlargement helps to create an optical window. A sphincterotomy or an optical iridectomy may be used. In either treatment, the size of the pupil is enlarged in the direction of the nonopacified cornea. This may confer long-lasting ambulatory vision after cataract surgery in patients with a central corneal opacity. It is especially relevant in patients who are bilaterally blind or in eyes with severe deep corneal stromal vascularization. It may be used as an alternative to a corneal triple procedure. If commonly used capsular dyes, such as trypan blue and indocyanine green, are ineffective for staining the anterior capsule, endoillumination may be used for improving intraoperative visualization. Nishimura et al5 described a technique of inserting an endoillumination probe through a corneal paracentesis created at the limbus using a 19-gauge slit knife. Oshima et al6 reported the successful use of a transconjunctival chandelier illumination system for performing cataract surgery in patients with corneal opacification. In this technique, a self-retaining, 25- or 27-gauge chandelier illumination fiber (Synergetics, Inc., O'Fallon, Missouri) is inserted into the vitreous cavity transconjunctivally through the pars plana at the beginning of surgery. Patients with nebulomacular corneal opacities and visually debilitating cataract may become ambulatory with cataract surgery alone. Here, phacoemulsification is the preferred surgical technique because it allows early visual rehabilitation. However, a successful phacoemulsification may be difficult in cases of corneal opacity because the surgeon has suboptimal visualization of the lenticular morphology. Important surgical steps, such as capsulorrhexis, nuclear emulsification, removal of residual cortex, and foldable IOL implantation are dependent upon the ability to visualize the capsular bag anatomy. Capsular staining with trypan blue dye facilitates the delineation of the lenticular morphology and aids in performing the capsulorrhexis in cases with corneal opacities. Trypan–blue-assisted phacoemulsification in selected cases of corneal opacity with cataract is safe and feasible, both as a primary therapeutic option in cases where penetrating keratoplasty is not promising or possible and as an interim procedure if the patient is awaiting keratoplasty, conferring early visual rehabilitation. Other surgical techniques, such as the use of endoillumination and creation of pupillary sphincterotomy, have been described for the effective management of these cases. Vishal Jhanji, MD, is a clinical research fellow at the Centre for Eye Research Australia, University of Melbourne, Royal Victorian Eye and Ear Hospital, Victoria, Australia. Dr. Jhanji states that he has no financial interest in the products or companies mentioned. He may be reached at tel: +61 3 9929 8368; fax: +61 3 9662 3959. Rasik B. Vajpayee, MS, FRCS(Ed), FRANZCO, is a Professor of Ophthalmology and Head of the Corneal Unit at the Centre for Eye Research Australia, University of Melbourne, Royal Victorian Eye and Ear Hospital, Victoria, Australia. Dr. Vajpayee states that he has no financial interest in the products or companies mentioned. He may be reached at tel: +61 3 9929 8368; fax: +61 3 9662 3959. - Inoue Y. Corneal triple procedure. Semin Ophthalmol. 2001;16(3):113-118. - Shimmura S, Ohashi Y, Shiroma H, Shimazaki J, Tsubota K. Corneal opacity and cataract: triple procedure versus secondary approach. Cornea. 2003;22(3):234-238. - Bhartiya P, Sharma N, Ray M, Sinha R, Vajpayee RB. Trypan blue assisted phacoemulsification in corneal opacities. Br J Ophthalmol. 2002;86(8):857-859. - Sinha R, Sharma N, Vajpayee RB. Visual outcome of cataract surgery with pupillary sphincterotomy in eyes with coexisting corneal opacity. BMC Med. 2004;7(2):10. - Nishimura A, Kobayashi A, Segawa Y, Sugiyama K. Endoillumination-assisted cataract surgery in a patient with corneal opacity. J Cataract Refract Surg. 200;29(12):2277-2280. - Oshima Y, Shima C, Maeda N, Tano Y. Chandelier retroillumination-assisted torsional oscillation for cataract surgery in patients with severe corneal opacity. J Cataract Refract Surg. 2007;33(12):2018-2022. - Ayres BD, Rapuano CJ. Excimer laser phototherapeutic keratectomy. Ocul Surf. 2006;4(4):196-206. - Norn MS. Preoperative trypan blue vital staining of corneal endothelium; eight years' follow-up. Acta Ophthalmol. 1908;58:550-555. - Kothari K, Jain SS, Shah NJ. Anterior capsular staining with trypan blue in mature and hypermature cataract: a preliminary study. Indian J Ophthalmol. 2001;49:177-180. - Dada VK, Sharma N, Sudan R, Sethi H, Dada T, Pangtey MS. Anterior capsule staining for capsulorhexis in cases of white cataract: comparative clinical study. J Cataract Refract Surg. 2004;30(2):326-333. - Vajpayee RB, Sharma N, Dada T, Pushker N. Optical sector iridectomy in corneal opacities. Cornea. 1999;18(3):262-264.
<urn:uuid:046f38fc-39e1-4f22-a69d-6267c3918fc8>
CC-MAIN-2020-16
https://crstodayeurope.com/articles/2009-mar/0309_11-php/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371886991.92/warc/CC-MAIN-20200410043735-20200410074235-00435.warc.gz
en
0.836789
2,157
2.71875
3
Family TreeSKU: TDP1001-TREE-003 An average family of 3-5 earth protectors. This climate+ package assumes a family of 3: 2 parents and a baby, living in an average sized home, with 2 cars and a well-rounded diet. It assumes a baby’s diapers, books, toys, and food. NEUTRAL IS NOT ENOUGH. Climate+ is the action of going beyond net zero. It means doing more than just offsetting your carbon footprint - by creating an environmental benefit by removing additional carbon dioxide from the atmosphere. We know that one of the most sustainable and cost-effective ways to accomplish this is by planting trees. Climate+ is a community of tree planters, rehabilitating our Earth, and having fun while we’re at it. How can we do better? There’s no such thing as a perfect environmentalist, don’t be discouraged by your ability to make meaningful changes. Big change can start as as small as: - Turning your thermostat down by 2 degrees. - Wearing clothes more than once before washing them. - Bike, walk or ride the bus to work! - Switch over to LED bulbs and smart appliances. - Try buying local, seasonal fruits and vegetables. - Use waxed cloth instead of plastic wrap for food. - Remember your reusable bags, mugs and cutlery for all outings. The impact of trees Did you know that trees combat climate change? We have tonnes (literally) of excess carbon dioxide in our air. Trees do something called ‘sequestering carbon’, it’s their way of cleaning our air, and eliminating harmful elements from the earth. They do that by absorbing the C02, and storing the carbon. Not only do trees sequester carbon, they also produce oxygen. Next time you’re outside, take a nice deep breath of fresh air, and thank the nearest tree. As we work to fight global warming, we can also thank the trees for cooling our earth. They provide shade, and their leaves release water vapor, cooling the planet even more. Just ten trees can offset the impact of a weekend road trip, a lifetime of iphones or even your drunken 2am hamburger habit. Tree planting has a meaningful impact that reaches far beyond carbon sequestration. They provide homes for wildlife, and in areas like Madagascar, the crab and fish populations provide additional food sources and income for the locals. In addition to the environmental benefits, we employ people from local communities. This extends our impact far beyond environmentalism. These are the building blocks of a long lasting and sustainable restoration project. We recognize that there are lots of ways to offset carbon, but are confident that our tree planting initiatives provide the most meaningful, holistic and verified impact on our Earth. What does offsetting mean to tentree? To tentree, neutrality isn’t change, so ‘offsetting’ means going beyond neutral and doing something positive for our planet. We don’t agree with the idea that simply doing no harm will equate to change, we’re here on this beautiful earth, ready to do some good. We want to make offsetting easy, understandable, accessible, fun, and impactful. Our climate+ packages aim to do just that. Where do we plant your trees? Our Earth Day Climate+ packages will allow us to work with our partners to plant many species of trees including mangroves in the coastal regions of Madagascar and Indonesia. Mangrove trees are one of the most efficient carbon sequestering trees in the world and planting them provides much more than a carbon impact for our planet. We are incredibly grateful for our planting partners, like Eden Reforestation Projects who are on the ground making things happen. This climate+ package assumes a family of three, two parents and a baby, living in an average sized home, with 2 cars and an average diet. It assumes a baby’s diapers, books, toys, and food. |Cars||19.76 MT CO2| |Phones||11.2 MT CO2| |Food||5 MT CO2| |Baby Food||3.285 MT CO2| |Energy for housing||7.5 MT CO2| |Diapers||0.22 MT CO2| |Clothes||7.2 MT CO2| |Stroller||0.321 MT CO2| |Toys||0.0108 MT CO2| |Total||54.55 MT CO2| The average car emits 404 grams of CO2 per mile. To translate from miles to kilometres, we multiply miles by 1.609, and simultaneously multiply grams by 1.609. This means the average car uses about 650 grams of CO2 per kilometer. (multiply by 1.609) 1: 404grams (multiply by 1.609) 1.609: 650grams The average Canadian drives 15,200km per year, so we can multiply the amount of kilometres by the emission factor 650grams CO2 per kilometer. This gives us a total of 3,815,200 grams of CO2 per year. 650 grams of CO2 / kilometer x 15,200 km = 9,880,000 grams of CO2 per year In order to change grams to metric tons, we multiply grams by 0.0000001 which gives us 9.88 metric tons of CO2 per year. 9,880,000 grams CO2 per year x 0.000001 = 9.88 metric tons of CO2 per year If this couple has two cars this would be a total of 19.76 MT CO2 per year 9.88 MT x 2 people = 19.76 MT CO2 If a person uses their phone for one hour per day over a year they would emit 1.4 tons of CO2. The average person spends 4 hours per day on their phone. Which means over a year a couple would emit 11.2 tons of CO2 for phone usage. 1.4 tons CO2 x 4 hours x 2 people= 11.2 MT CO2 The average person, with a diet including meat, dairy, fruits and vegetables and cereals emits 2.5 tons of CO2 per year. For a couple this would mean 5 tons of CO2 emissions over a year . 2.5 tons CO2 per year x 2 people = 5 MT CO2 The average baby drinks 750ml of milk per day, in order to convert this number into kilograms we use the conversion factor 0.001 and get 0.75kg 750ml of milk x 0.001 = 0.75 kg of milk In order to calculate the total amount of milk over one year we multiple 0.75kg per day by 365 days. 0.75kg x 365days = 273.75 kg of milk per year Each kg of milk generates 12 kilograms of CO2, so when we multiply 273.75 kilograms of milk by 12 kg we get the total CO2 emissions from milk. 273.75 kg of milk x 12 kg CO2 =3,285 kg CO2 In order to convert kg CO2 into metric tons CO2 we will use the conversion factor 0.001 which gives us 3.285 MT CO2. 3,285 kg CO2 x 0.001 = 3.285 MT CO2 Energy for housing The average household emits 7.5 MT of CO2 per year including laundry, showers, heating and cooling and appliances. Over 2.5 years diapers emit 550kg of carbon emissions. This means over a year's time diapers would emit 220 kg CO2. 550 kg / 2.5 years =220 kg per year In order to convert kilograms of CO2 into metric tons CO2 we will use the conversion factor 0.001which gives us 0.22 MT CO2 over a year. 220kg CO2 x 0.001 = 0.22 MT CO2 Let’s assume all of your shopping for your children's clothing is done online and requires shipping. Let’s also assume your average shipment is coming from overseas 8000 kilometers. away We know planes emit 115g CO2 per kilometer. We use the conversion factor 0.000001 to get from grams to metric tons and we get 0.000115 MT of CO2 per kilometer of air travel. 115grams x 0.000001 = 0.000115 MT Carbon If your manufacturer is within 8000 kilometers and since your baby is growing a lot, you have new shipments of clothing every 2 months throughout the year. This means you get 6 shipments a year, from 8000 km away, and each kilometer of flight emmits 0.00015MT CO2. Clothing total emissions would equal 7.2 MT CO2 8000km x 0.000115grams x 6= 7.2 MT CO2 The carbon emissions of stroller is 321 kg , in order to convert kg CO2 into metric tons CO2 we will use the conversion factor 0.001which equals 0.321 MT CO2 321 kg CO2 x 0.001 = 0.321 MT CO2 The carbon footprint of an individual book is 2.7 kg CO2 per book. Let's assume the average baby has about 20 books at home. If we multiple 20 books by 2.7kg CO2 per book, we get 54kg CO2. 2.7kg x 20 books = 54 kg CO2 In order to convert kg CO2 into metric tons CO2 we will use the conversion factor 0.001which gives us 0.054 MT CO2 54kg CO2 x 0.001 = 0.054MT CO2 A stuffed animal would emit about 0.8kg CO2 and a stuffed dog animal with a battery would have a carbon footprint of about 1.4g kg CO2 Assuming a baby has 10 stuffed animals, and two stuffed animals with batteries, (0.8kg CO2 x 10) + (1.4kg CO2 x 2) = 10.8 kg of CO2 In order to convert kg CO2 into metric tons CO2 we will use the conversion factor 0.001which gives us 0.0108 MT CO2 10.8kg CO2 x 0.001 = 0.0108 MT CO2 In total a family of 3 would emit about 42.42 MT CO2 in one year. 19.76 MT + 11.2 MT + 5 MT + 3.285 MT + 7.5 MT + 0.22 MT + 7.2 MT + 0.321 MT + 0.054MT + 0.0108 MT = 54.55 MT CO2 Link - Phone Emissions - https://nypost.com/2019/05/01/a-year-of-cell-phone-use-emits-as-much-CO2-as-two-round-trip-flights/ Link - Average Phone Use - https://www.inc.com/melanie-curtin/are-you-on-your-phone-too-much-average-person-spends-this-many-hours-on-it-every-day.html Link - Food Emissions - https://www.greeneatz.com/foods-carbon-footprint.html Link - Household Emissions - https://www.ccfpd.org/Portals/0/Assets/PDF/Facts_Chart.pdf Link - Formula Emissions - https://internationalbreastfeedingjournal.biomedcentral.com/articles/10.1186/s13006-019-0243-8 Link - Amount Formula Per Day - https://www.momjunction.com/breast-milk-calculator/#gref Link - Household Emissions - https://www.ccfpd.org/Portals/0/Assets/PDF/Facts_Chart.pdf Link - Diaper Emissions - https://www.bbc.com/news/uk-45732371 Link - Stroller Emissions - https://www.tandfonline.com/doi/abs/10.1080/10042857.2012.10685103 Link - Book Emissions - https://www.researchgate.net/publication/255699164_Carbon_Footprint_Assessment_of_a_Paperback_Book Link - Amount of Books - https://curiosity.com/topics/having-books-in-the-home-is-as-important-to-your-child-as-your-own-education-curiosity/ Link - Stuffed Animal Emissions - https://via.library.depaul.edu/cgi/viewcontent.cgi?article=1141&context=depaul-disc Link - Shipping Emissions - https://www.carbonindependent.org/22.html
<urn:uuid:ca13f104-155e-4633-a756-65355099f6b8>
CC-MAIN-2020-16
https://www.tentree.com/products/family-tree
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371824409.86/warc/CC-MAIN-20200408202012-20200408232512-00036.warc.gz
en
0.865466
2,694
3.15625
3
The best of EcoWatch, right in your inbox. Sign up for our email newsletter! How Oil & Gas Drilling Impacts the Endangered Greater Sage Grouse and Lesser Prairie-Chicken By Ted Auch The New York Times' Diane Cardwell and Clifford Krauss recently published a piece on the interaction between the Greater Sage Grouse (GSG, Centrocercus urophasianus) and fracking in Big Sky country. We thought it might be helpful to dig a little deeper into the issue given the sensitivity of this species' as well as the Lesser Prairie-Chicken (Tympanuchus pallidicinctus) to habitat disturbance and the inevitable conflict between “energy independence" and the Endangered Species Act—the purpose of which “is to protect and recover imperiled species and the ecosystems upon which they depend." Gunnison Sage Grouse We looked at the GSG's range relative to hydrocarbon wells in Colorado and Wyoming keeping in mind the bird's range encompasses 11 states and “more than 165 million resource-rich acres." This analysis encompasses much of the bird's range accounting for 52 percent (134,149 square miles) of the aforementioned acreage (Figures 1 and 2) and 37 and 373 GSG habitat parcels in Wyoming and Colorado, respectively. The largest shaded areas on the map are the bird's “Current Distribution" (67,879 square miles) in Wyoming and “Historic Habitat" in Colorado (24,505 square miles). GSG's range in Colorado is far more spread out than in Wyoming with discrete north- and southwest concentrations. Important Birding Areas (IBAs) as defined by the Audubon Society often overlap with oil and gas extraction sites as well as endangered species habitat. Thanks to the Audubon Society's Connie Sanchez and Tom Auer we were able to determine how many hydrocarbon production wells exist within these states' IBA parcels. Wyoming is home to 39 IBAs, while Colorado contains 53 of these designated parcels. The average Wyoming IBA is 257 square miles, however, while Colorado's average 59 mi2. In total these two states are home to 13,154 mi2worth of IBAs. These figures account for 3.7 percent of U.S. IBAs and 2.2 percent of IBA acreage. 1. Wyoming: 51 unconventional hydrocarbon wells in IBAs, 2,238 in primary GSG habitat, and for some perspective 1,983 of the latter are in what EIA has designated primary shale plays. At the present time 97 percent of Wyoming's production wells lie within some segment of the GSG's habitat. 2. Colorado: 163 unconventional hydrocarbon wells in IBAs - Southwest: 7,838 wells in primary GSG habitat - Northwest: 16,609 wells in primary GSG habitat - EIA Shale Plays: 24,178 wells - 53 percent of Colorado's production wells lie within some segment of the state's GSG habitat. In Colorado, the GSG's historical habitat has already been overrun by hydrocarbon wells with 20,809 across the bird's north- and southwest range. The bird's production/brooding area in the northwest contains 1,142 wells while its winter range contains 662 wells. Figure 2. Wyoming hydrocarbon production laterals and Greater Sage Grouse Habitat. Table 2. Colorado hydrocarbon production wells in various sectors of the Greater Sage Grouse's range. Another way to look at the interaction between hydrocarbon production and GSG in the Great Plains and Pacific Northwest is to investigate the density of wells in the bird's historic range. That is precisely what we did for the 16 states where GSG once roamed. The bird's historic range is 2.21 times the size of its current range, while the acreage we analyzed is slightly more than the often-reported “165 million resource-rich acres" (Cardwell and Krauss, 2014). On average each of the 16 states was home to 35,580 square miles of GSG habitat and are now home to a mere 28 percent of that figure. While GSG habitat in these states has decreased, hydrocarbon production has skyrocketed. There are currently 153,358 hydrocarbon wells across the 16 states and an average of 12,780 wells per state—excluding the four states devoid of wells in GSG habitat. These wells and associated infrastructure occupy approximately 39,649 square miles which is a disturbing 7 percent of the species' historic range and nearly 15 percent of its current range. From an historic GSG range perspective, Kansas has the highest density of wells with 3.5 per square mile of habitat. Unsurprisingly North Dakota, has the highest density of wells in the bird's current range, with 6.1 wells per square mile of habitat. Colorado was second in both departments with 1.1 and 2.9 wells per square mile of historic and current GSG habitat, respectively. The Lesser Prairie-Chicken (LPC)—along with GSG—is hardly what anyone would call charismatic mega-fauna but it's habitat is coming under pressure in the name of drill baby drill “energy independence" across many of the same Great Plains states. The Prairie-Chicken's range once spread across 97,977 square miles in five states with 43 percent of that acreage in Kansas alone. The bird's range has declined by 68 percent and as much as 78-79 percent in Colorado and New Mexico. In terms of US hydrocarbon production the Prairie-Chicken's historic range is home to 58,152 wells, while its current extent contains 22,049 wells. On average the four states we investigated sans Texas contain 14,538 and 5,512 wells in this bird's historic and current range, respectively, with the largest values for both not surprisingly in the state that contains most of the bird's primary grassland habitat Kansas's southwest corner. Across these states the density of wells in Prairie-Chicken habitat is 0.603-0.682 hydrocarbon wells per square mile with as many as 1.06-1.25 wells per square mile of Prairie-Chicken habitat in New Mexico. These wells and related infrastructure have an approximate footprint of 22,378 square miles, which is 23 percent the LPC's historic range and 72 percent of its current range. The five states that contain LPC habitat are also home to 2,978 square miles worth of IBAs across ten parcels averaging 596 square miles, with Kansas home to the most IBA acreage (1,793,845 acres) and New Mexico the most parcels (4 parcels). These values equate to 0.40 percent of US IBAs and 0.99 percent of IBA acreage. What this analysis means for the GSG and LPC is hard to discern. It stands to reason, however, that their already sensitive mating behavior and plummeting/disconnected populations have not seen the last of energy independence's encroachment. In contrast to the well-noted battle in the Pacific Northwest between environmentalists, loggers, developers and cattle grazers over the much smaller range of the Spotted Owl—and the US Fish and Wildlife Service's “"God Committee"—the GSG's range includes much of the U.S.'s primary wind and mineral resource acreage. GSG's habitat requirements overlap with US shale resources in a significant way with 29 percent of its range in shale basins and 11 percent in currently active shale plays. For a more detailed legal perspective on this issue the reader is referred to our friends at the Center for Biological Diversity and their long-term commitment to protecting and increasing suitable GSG habitat. Meanwhile the historic and current range of the LPC is like the Spotted Owl in that it is quite small amounting to 97,978 and 31,237 square miles, respectively, which is approximately 11-17 percent of the GSG's range. Similar to GSG we found that 31 percent of LPC's historic range lies within shale basins while only percentage of its habitat is within currently active shale gas plays. Table 3. Historic and Current Range of Greater Sage Grouse along with the number of producing hydrocarbon wells in that range by state. Table 4. Historic and Current Range of Lesser Prairie-Chicken along with the number of producing hydrocarbon wells in that range by state (Note: Texas well location data is not available at the present time). Table 5. Square mileage and number of Important Birding Areas (IBAs) in the Lesser Prairie-Chicken's historic range. You Might Also Like EcoWatch Daily Newsletter By Charli Shield At unsettling times like the coronavirus outbreak, it might feel like things are very much out of your control. Most routines have been thrown into disarray and the future, as far as the experts tell us, is far from certain. By Elizabeth Henderson Farmworkers, farmers and their organizations around the country have been singing the same tune for years on the urgent need for immigration reform. That harmony turns to discord as soon as you get down to details on how to get it done, what to include and what compromises you are willing to make. Case in point: the Farm Workforce Modernization Act (H.R. 5038), which passed in the House of Representatives on Dec. 11, 2019, by a vote of 260-165. The Senate received the bill the next day and referred it to the Committee on the Judiciary, where it remains. Two hundred and fifty agriculture and labor groups signed on to the United Farm Workers' (UFW) call for support for H.R. 5038. UFW President Arturo Rodriguez rejoiced: By Julia Conley A council representing more than 800,000 doctors across the U.S. signed a letter Friday imploring President Donald Trump to reverse his call for businesses to reopen by April 12, warning that the president's flouting of the guidance of public health experts could jeopardize the health of millions of Americans and throw hospitals into even more chaos as they fight the coronavirus pandemic. By Melissa Kravitz Hoeffner Over six gallons of water are required to produce one gallon of wine. "Irrigation, sprays, and frost protection all [used in winemaking] require a lot of water," explained winemaker and sommelier Keith Wallace, who's also a professor and the founder of the Wine School of Philadelphia, the largest independent wine school in the U.S. And water waste is just the start of the climate-ruining inefficiencies commonplace in the wine industry. Sustainably speaking, climate change could be problematic for your favorite glass of wine.
<urn:uuid:c4ad8d6c-b199-49d0-8b80-a4aa8171b1e4>
CC-MAIN-2020-16
https://www.ecowatch.com/how-oil-gas-drilling-impacts-the-endangered-greater-sage-grouse-and-le-1881940381.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496669.0/warc/CC-MAIN-20200330054217-20200330084217-00355.warc.gz
en
0.932987
2,200
2.859375
3
Over the past couple of years, many people have become aware of cryptocurrency and its primary underlying technology: Blockchain. The other technologies are proof-of-work, P2P network, and cryptography. Like most people reading this, I didn’t understand the concept of blockchain right away. I found out about Bitcoin in 2011 when the digital coins were valued at $2 but didn’t think we were ready for digital money. Ironically, I remember thinking money would evolve into a digital, paperless form when I was a kid – maybe an implanted chip that tracked our bank balances as we shopped. The idea came from my 5th-grade teacher, but we thought of it as more of a futuristic fantasy that would occur after we were dead. We never imagined the foundation for this technology was already being laid by the Cypherpunks community in the late 1990s – a time when very few of us even used the internet. I first saw Bitcoin as digital coins stored on a hard-drive and not, more accurately, as The Internet of Money. Today, I understand it’s a code-based ledger where transactions are processed, validated, and recorded by various members of the network – all on the internet. Imagine a code-based excel spreadsheet that contains all your transaction history. Now imagine it is public and up on the internet, but only you can affect the balances because you’re the only person that has the password (i.e. the private key). With a better understanding of the basics regarding blockchain, I began to ponder the implications of this kind of technology: - Banking – international wire transfers (lower fees and quicker turnaround) - Music – royalty payments for downloads and streams (better deals for artists) - Pharmaceutical – supply chain (multi-level production tracking) - Elections – digital voting (real-time results) - Financial reporting – tax compliance (more transparency) And that’s just to name a few. Blockchain is still in its early stages, and further advancements in this field will pave the way to a decentralized future. It may take some time, but that’s a good thing. Think of artificial intelligence, the internet of things, robotics, 3D printing and so forth. All these technologies could intertwine with blockchain. Yet, cryptocurrency has just as many critics as it does proponents. Why? Let’s look at the three main objections to this new technology. The Top 3 Objections to Crypto Critique #1: No Intrinsic Value This essentially means Bitcoin is not backed by a valuable commodity such as gold or silver. However, the same could be said of the USD, considering we have not had a gold standard since 1933. Fiat money (USD) is created from the issuance of government bonds which are then purchased by central banks with newly printed money –nothing is backing this new currency. Crypto wasn’t created out of thin air; it was created out of technological innovation. Thousands of hours of coding went into the creation and mining of digital currencies. Don’t believe crypto mining takes time and resources? Try telling that to this guy. Critique #2: Scam and Fraud Potential Did you know that USDs are the primary currency used for illicit activity in the world right now? It has been that way for decades, with one study even claiming 90% of U.S. bills carry traces of cocaine. The majority of pump and dumps over the last century have been perpetrated via the stock market using U.S. fiat currency. Scams are an inevitable reality in our world, but we can’t blame that on blockchain and digital currencies. Critique #3: Not Issued by Government Dollars are not issued by our government, although they are indeed backed by the “full faith and credit of the U.S. government” – meaning Uncle Sam can tax you to come up with the money you’re owed. Our money is issued by the Federal Reserve, which is a consortium of private central banks. For a more in-depth understanding of the federal reserve, you can read The Creature from Jekyll Island by G. Edward Griffin. It is available here for free. The Truth About Crypto The truth is crypto is internet money for the internet age. I think that it is also the best investment you can make RIGHT NOW (not a financial advisor). Around the peak of the BTC boom in 2017, John McAfee famously predicted a price of $500,000 by 2020 and promised to eat his penis if he was wrong. Many Bitcoin purchases were made near $20,000 because of such claims. This is how the majority of pump and dump schemes work. Everyone and their grandmothers buy in a frenzy with the hopes of getting wealthy. But times like these are exactly when NOT to buy. Here we are in March of 2019, with the price of BTC down to ~ $4,000, which amounts to an 80% drop from its all-time high. “I will tell you how to become rich. Close the doors. Be fearful when others are greedy. Be greedy when others are fearful.” – Warren Buffet I do not advise you to be greedy. I will propose another approach that is less risk-averse. I suspect many solid coins have reached (or will soon reach) support levels. Many will see this as the end for crypto and proof that it is worthless. On the contrary, now is the time to get in the game (again I’m not a financial advisor – please proceed with caution ;). A Useful Stock Market Example ONVO is the stock ticker for Organovo; a 3D printing company focused on bio-printing human tissues. It has decreased from its $14 high to a support level at about $1. The company is not profitable right now. And an investment in ONVO is essentially a bet that its technology, if completed one day, will revolutionize the medical field. Many jumped in during the 3D printing mania a few years ago but bailed soon after. The tried and true refuse to sell their stock even at $1, and there are additional buyers at prices below $1 which keep the price hovering around this level. The $1 price support makes for a risk-averse entry point. I am not suggesting you invest in Organovo – this is just an example. 3D printing is a promising technology that could be revolutionary, but there will be no use for it until it is perfected. Crypto and blockchain are different because they are viable solutions for many applications right now. Looming Bubbles in the Global Economy A bubble by economic definition is an artificially inflated asset class that will pop at some point, losing half or more of its value at a shocking pace. In 2000, we had the dot-com bubble; then came the mortgage bubble in 2008. Which bubble is next? It could be: - Real estate - Stock market - Student loans - Credit (bonds) Perhaps all the above? Dr. Ron Paul – a proponent of competing currencies – has called this bubble the biggest in the history of mankind. In 2008, we kicked the can down the road with trillions of dollars’ worth of bailouts and money printing. A Rolling Stone article from January of 2013 states, “The only reason investors haven’t run screaming from an obviously corrupt financial marketplace is because the government has gone to such extraordinary lengths to sell the narrative that the problems of 2008 have been fixed.” What all of this means is that we will soon be faced with severe economic stagnation – that’s on the optimistic side. Don’t take my economic outlook the wrong way. I am an optimist, and I see a bright future ahead. But growth is sometimes uncomfortable and chaotic. During the next recession, you will see alternative stores of value such as gold, silver, and platinum rise in price. This is all but guaranteed. Precious metals rise in price during times of economic turmoil because they are difficult and expensive to produce. More importantly, they are limited in availability. So, they are commonly used as a hedge, or insurance against economic uncertainty. Many believe that Bitcoin and other cryptos will be used in a similar fashion. Crypto is still a tiny asset class, second only to silver. Let’s look at some of the numbers: Total Stock Market Value – 73 Trillion USD Total Silver – 17 Billion USD Total Crypto – 100 – 200 Billion USD World Gold Supply (above ground) – 7.7 Trillion USD You can view a complete breakdown of global assets here. Cryptocurrency’s total market cap comes in at .25% of the stock market and silver is at a measly .02%. We have reached the last stages of the most epic of stock market bull runs and have not had an economic recession since the ‘great recession’ in 2008. Do you think big money investors would pass on a hedge for their wealth during the next recession? Where will the money flow? Elementary my dear Watson – crypto and precious metals. All that is needed for crypto prices to skyrocket are a few trillion dollars to be dumped into the market. “But what about the decline in value of Bitcoin and crypto?” “Bitcoin has lost 80% of its total value since December 17, 2017.” The Amazon Example Remember: severe drops in market value do not always correlate with declines in real value. Amazon went public in 1997 and was valued at $18 per share for its IPO. During the buildup of the tech bubble, it reached an all-time high of $89.38, before crashing all the way down to $5.97 in 2001 for a 93.32% loss. As of August 2018, Amazon was valued at $2,000, a 33,400% increase from its low in 2001. Bubbles create excellent opportunities to purchase valuable assets at steep discounts. Many internet-based companies evaporated during the early 2000s, but there were also massive gains to be had for those who were able to identify the best projects. I remember a time when my mom rented DVDs from Netflix – we thought it was the coolest because we no longer had to drive to the movie rental business in town. Now Is the Time to Act If you can think independently and go against the grain, then you have a chance to be an early adopter of this futuristic technology. Crypto is still in the beginning stages of the adoption cycle. Mass adoption usually starts with individuals, followed by wealthy investors, and is capped-off by institutional investors. Once institutional investors arrive, the bulk of the opportunity is gone. Now is the time to do your research. Stay tuned for further discussion on market cycles and a few promising crypto projects. Check out the resources below and I’ll see you back here for part two. Reading and Viewing Suggestions:
<urn:uuid:51ae1c00-3168-4e04-940d-8e81e22f6d44>
CC-MAIN-2020-16
https://www.menprovement.com/crypto-market-1/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505826.39/warc/CC-MAIN-20200401161832-20200401191832-00276.warc.gz
en
0.963127
2,320
2.96875
3
Washout is a characteristic of aircraft wing design which deliberately reduces the lift distribution across the span of an aircraft’s wing. The wing is designed so that the angle of incidence is greater at the wing roots and decreases across the span, becoming lowest at the wing tip; this is to ensure that at stall speed the wing root stalls before the wing tips, providing the aircraft with continued aileron control and some resistance to spinning. Washout may be used to modify the spanwise lift distribution to reduce lift-induced drag. Washout is achieved by designing the wing with a slight twist, reducing the angle of incidence from root to tip, therefore causing a lower angle of attack at the tips than at the roots; this feature is sometimes referred to as structural washout, to distinguish it from aerodynamic washout. Wingtip stall is unlikely to occur symmetrically if the aircraft is maneuvering; as an aircraft turns, the wing tip on the inside of the turn is moving more and is most to stall. As an aircraft rolls, the descending wing tip is at higher angle of attack and is most to stall. When one wing tip stalls it leads to a rapid rolling motion. Roll control may be reduced if the airflow over the ailerons is disrupted by the stall, reducing their effectiveness. On aircraft with swept wings, wing tip stall produces an undesirable nose-up pitching moment which hampers recovery from the stall. Washout may be accomplished by other means e.g. modified aerofoil section, vortex generators, leading edge wing fences, notches, or stall strips. This is referred to as aerodynamic washout, its purpose is to reduce the probability of wing tip stall. Winglets have the opposite effect to washout. Winglets allow a greater proportion of lift to be generated near the wing tips. Winglets promote a greater bending moment at the wing root necessitating a heavier wing structure. Installation of winglets may necessitate greater aerodynamic washout in order to provide the required resistance to spinning, or to optimise the spanwise lift distribution. The reverse twist, wash-in, can be found in some designs though less common. Wing twist Stall Spin http://www.allstar.fiu.edu/aero/Wing32.htm http://www.fly-imaa.org/imaa/hfarticles/const/v1-4-10.html http://www.propdesigner.co.uk/html/washout_and_washin.html Meera Kosambi was a prominent Indian sociologist. She was the youngest daughter of eminent historian and mathematician, D. D. Kosambi, granddaughter of Acharya Dharmananda Damodar Kosambi, a Buddhist scholar and a Pāli language expert, she received a Ph. D. in sociology from the University of Stockholm. She is the author of women's studies in India, she served for nearly a decade as the director of the Research Centre for Women's Studies at the SNDT University for Women, Mumbai. Her much acclaimed work is on the 19th century Indian feminist Pandita Ramabai, whose writings she compiled and translated from Marathi, she has translated and edited the autobiography and scholarly writings of her grandfather Dharmananda Damodar Kosambi. Kosambi died in Pune on 26 February 2015 after a brief illness aged 75. 1986 Bombay in Transition: The Growth and Social Ecology of a Colonial City, 1880-1980, Sweden: Almqvist & Wiksell International 1994 Women's Oppression in the Public Gaze: an Analysis of Newspaper Coverage, State Action and Activist Response, Bombay: Research Centre for Women’s Studies, S. N. D. T. Women’s University 1994 Urbanization and Urban Development in India, New Delhi: Indian Council of Social Science Research 1995 Pandita Ramabai’s Feminist and Christian Conversions: Focus on Stree Dharma-neeti, Bombay: Research Centre for Women’s Studies, S. N. D. T. Women’s University 1996 Women in Decision-Making in the Private Sector in India, Mumbai: Research Centre for Women’s Studies, S. N. D. T. Women’s University 2000 Intersections: Socio-Cultural Trends in Maharashtra, New Delhi: Orient Longman, New Delhi 2000 Pandita Ramabai Through Her Own Words: Selected Works New Delhi. 2007 Crossing Thresholds: Feminist Essays in Social History, Ranikhet: Permanent Black 2011 Nivedan: The Autobiography of Dharmanand Kosambi, trans. by Meera Kosambi. Ranikhet: Permanent Black. 2012 Women Writing Gender, Ranikhet: Permanent Black, ISBN 978-8178243368 2013 Dharmanand Kosambi: The Essential Writings, ed. by Meera Kosambi. Orient Blackswan. * Video. Meera Kosambi speaks at the release of Dharmananda Kosambi: The Essential Writings Admiral Zafar Mahmood Abbasi, NI, HI, SI, is a four-star rank admiral in the Pakistan Navy, serving as the Chief of the Naval Staff of Pakistan Navy since 7 October 2017. Abbasi joined the Pakistan Navy in 1979 after graduating from Cadet College Hasanabdal, he was educated at the Pakistan Naval Academy and did his initial training at the Britannia Royal Naval College in Dartmouth in the United Kingdom. He was commissioned in the Navy as a Lieutenant in 1981 upon graduating from the Naval Academy and was conferred with the Sword of Honour, he served as an executive officer in a Tariq-class destroyer. He joined the Submarine Branch, specialised in underwater warfare in Pakistan as well as qualified for the surface warfare from the United States, he is a graduate of the Royal Australian Naval College, attending it in 1989, attained a B. S. and a MSc from the National Defence University. His command assignment included his role as commandant of the Naval Academy, as well as Director-General of the Maritime Security Agency, which he commanded from 2010 until 2011. From 2001–2003, he was the commanding officer of the PNS Khaiber. From 2005 until 2007, he commanded 25th Destroyer Squadron. In 2008, he was promoted to one-star rank and was the Assistant Chief of the Naval Staff and the Assistant Chief of the Naval Staff, until he was promoted to two-star rank in 2010. Rear-Admiral Abbasi took over the command of the Combined Task Force 150 which he led from April 2010 until October 2010. In 2013, Rear-Admiral Abbasi took over the command as Commander Logistics but this was a short-lived appointment. In 2013, Rear-Admiral Abbasi was appointed as the Commander of the Karachi Coast, becoming Flag officer commanding of the Pakistan Marines. In 2014, Rear-Admiral Abbasi was appointed as fleet commander of the Pakistan Navy as Commander Pakistan Fleet with three-star rank promotion. In 2014, Vice-Admiral Abbasi was a contender to be appointed as a four-star admiral and take over the command of the Navy as its Chief of Naval Staff, alongside with Vice-Admiral Khan Hasham bin Saddique and Vice-Admiral S. A. Hussaini. However, the most senior admiral in the Navy, Admiral Mohammad Zakaullah was promoted to the four-star appointment, He continued serving as the Deputy Chief of the Naval Staff at the Naval Headquarters. Upon the retirement of Vice-Admiral Khan Hasham bin Saddique, Vice-Admiral Abbasi took over as the vice chief of naval staff in June 2017. On 3 October 2017, Vice-Admiral Abbasi was promoted to four-star admiral in the Navy, was announced by the MoD of his appointment to take over the command of the Navy as Chief of Naval Staff, he was the senior most-ranking admiral in the Navy. On 7 October 2017, Admiral Abbasi took over the command of the Navy as Chief of Naval Staff from outgoing Admiral Muhammad Zakaullah at the PNS Zafar in Islamabad. On 30 October 2017, Admiral Abbasi was conferred and honored with Nishan-i-Imtiaz by the President Mamnoon Hussain for "recognition of his long meritorious services, exceptionally commendable performance and inspirational devotion to duty."On 13 March 2018, Abbasi was awarded with Saudi Arabia's Order of King Abdulaziz by the Chief of General Staff of the Royal Saudi Armed Forces Fayyadh Al Ruwaili. On 2 February 2020, Abbasi was awarded Indonesia's highest military award. Pakistan Marines Syed Arifullah Hussaini Momčilo Gavrić was the youngest known soldier in the First World War, accepted into his unit at the age of seven, promoted to the rank of corporal at the age of eight. He was born in Trbušnica, near Loznica, on the slopes of the mountain Gučevo, as the eighth child of eleven, in the family of Alimpije and Jelena Gavrić. In the beginning of August 1914, Austro-Hungarian soldiers of 42nd Croatian Home Guard Infantry Division maimed and hanged his father, grandmother, his three sisters, four of his brothers, his house was set on fire. Momčilo survived because he was not at home when it happened—his father had sent him to his uncle earlier. Left without family and without a home, Momčilo went to find the 6th Artillery Division of the Serbian army, near Gučevo at the time. Major Stevan Tucović, brother of Dimitrije Tucović, accepted Gavrić into his unit after hearing about what had happened, assigned Miloš Mišović, a soldier in the unit, to be Gavrić's caretaker; the same evening, he took revenge by showing his unit the location of the Austro-Hungarian soldiers, participated in the bombardment, as told by his son Branislav Gavrić in an interview. At the age of 8, after the Battle of Cer, he was promoted to the rank of Corporal by the commander of his unit, given a military uniform. When his unit was sent to Thessaloniki, Major Tucović sent him to Sorovits where he hastily went through the equivalent of four grades of elementary education. In Kajmakčalan, Field Marshal Mišić was stunned when he saw a uniformed ten-year-old boy in the trenches. Major Tucović explained the situation to him. Mišić promoted Gavrić to Lance Sergeant, the order was read out to the whole division. After the liberation of Belgrade, Major Tucović made sure that Gavrić would receive aid from a British mission, helping war orphans in Serbia, he was sent to England, finished his education at the Henry Wreight School in Faversham, graduating in 1921. He returned to Serbia the same year, after Serbian Prime Minister Nikola Pašić ordered the return of all children to Serbia. In Trbušnica, he was reunited with his three brothers who had survived the murders in 1914. According to his son Branislav, Momčilo Gavrić had an incident with the law in 1929. He was working in Šabac and Belgrade when he reached the age of conscription, at the military barracks in Slavonska Požega, he reported that he had been in the army during the war. He said that he had been wounded, had received the Albanian Commemorative Medal. However, an ethnic Croat in the Royal Yugoslav Army tried to push Gavrić into signing a confession that he had told a lie, he refused, was sent to prison, spending two months there. After another period of military service, he returned to Belgrade, where he learnt graphic design and took his driver's license. There, he married his wife Kosara, with whom he worked in the Vapa paper mill. Branislav Gavrić further told that during the Second World War, Momčilo was imprisoned twice by the German occupying forces. After the war, in 1947, OZNA arrested him for claiming that the Albanians were no brothers to Serbs and saying how he "felt that brotherhood of theirs in 1915, when they were killing us", during a time when the presidents of Yugoslavia and Albania were great friends. In 1987, he participated in a Yugoslav documentary about his experiences during the First World War. Momčilo Gavrić died in Belgrade in 1993. There are memorials dedicated to him in the Jadar Museum in Loznica. In 2014, a street in Loznica was named after him. On 2 April 2015, the Serbian government decided to raise a monument in Belgrade dedicated to Gavrić. Sin drinske divizije by Dragiša Penjin, 1986. Sa Gučeva u legendu by Milisav Sekulić, 2009. Momčilo Gavrić - najmlađi kaplar na svetu by Branislav Goldner, 2013. ISBN 978-86-7157-622-2 Sudbina najmlađeg kaplara by Svetlana Milovanović, 2014. ISBN 978-86-7594-034-0 Serbian Campaign Dragoljub Jeličić, Serbian soldier Boško Buha, Yugoslav soldier Spomenko Gostić, Bosnian Serb soldier Military use of children Interview/documentary from 1987, featuring Momčilo Gavrić himself on YouTube Documentary about Momčilo Gavrić, including interviews with his relatives on YouTube Super Puzzle Fighter II Turbo, released in Japan as Super Puzzle Fighter II X, is a one or two player tile-matching puzzle video game first released in 1996 by the Capcom Coin-Op division of Capcom on the CPS II arcade system. The game's title is a parody of Super Street Fighter II Turbo, as there were no other Puzzle Fighter games at the time, the game includes music and interface elements spoofing the Street Fighter Alpha and Darkstalkers games, it was a response to Sega's Puyo Puyo 2, sweeping the Japanese arcade scene. A HD-remake version titled Super Puzzle Fighter II Turbo HD Remix, is available on Microsoft's Xbox Live Arcade and Sony's PlayStation Network. A successor, Puzzle Fighter, was released for mobile devices in 2017. Super Puzzle Fighter II Turbo HD Remix was made backwards compatible on Xbox One in June 2019. Puzzle Fighter is a puzzle game, similar to the Sega arcade game Baku Baku Animal; as in the Capcom arcade game Pnickies, the player controls pairs of blocks that drop into a pit-like playfield. In Puzzle Fighter, gems can only be eliminated by coming into contact with a Crash Gem of the same color, which eliminates all adjacent gems of that color, setting up the potential for huge chain reactions. When gems are eliminated, "garbage blocks" called Counter Gems drop into the opponent's playfield. Most Counter Gems start at "5" and are reduced by one each time a new pair of gems is dropped on that board; the only way to eliminate Counter Gems before they become normal gems is to place a Crash Gem of that color nearby so it eliminates at least one normal gem. If this is done, all Counter Gems adjacent to the Crash Gem will be taken out as well. Additionally, gems of the same color that form squares or rectangles in the pit become a giant Power Gem of that size and color; the only other type of piece to appear is a diamond, which eliminates all the gems—normal, Power and Crash alike—of whichever color gem it lands on. The diamond piece appears every 25 pieces. Puzzle Fighter borrowed rules found in Puyo Puyo 2 called Sousai. This will allow a player to counter and negate garbage being sent by the opponent with chains of their own. Sousai can be used to send garbage back to the opponent, known as Garbage overflow. During the game, super deformed versions of various characters from Capcom's two main fighting game series act out a comical battle based on how the game is going; every time one player sends Counter Gems to their opponent, their character will perform a typical fighting-game action, anything from a taunt to a special move. The more Counter Gems the player sends over, the "bigger" the move the character will perform; these animations, are purely cosmetic and have no actual bearing on the gameplay other than to indicate the magnitude of the counters. The game continues; that player is the loser. The Dreamcast version of the game adds three separate modes: X-Mode, Y-Mode, Z-Mode. Whereas X-mode is the original version of the core game, Y-Mode and Z-Mode have more drastic gameplay changes. Y-Mode makes the gems break as soon as three or more are aligned in a row, column, or diagonally, like in Columns, whereas Z-mode makes lines of gems rise up from the bottom of the screen, the player controls a 2x2 square cursor, with which they rotate already-placed pieces to Tetris Attack. The story takes place in United States and China. The 8+ characters are borrowed from Capcom's two major fighting game sequels, Street Fighter Alpha 2 and Night Warriors: Darkstalkers' Revenge. A spin-off that uses most of these character sprites called Pocket Fighter was released in 1997. Ryu from Street Fighter Ken from Street Fighter Chun-Li from Street Fighter II Sakura from Street Fighter Alpha 2 Morrigan from Darkstalkers Donovan from Night Warriors Hsien-Ko from Night Warriors Felicia from Darkstalkers Akuma from Super Street Fighter II Turbo· The arch rival and enemy of both Ryu and Ken, as well as the final boss and playable character. Dan from Street Fighter Alpha· The game's instructor and frustratingly playable "master", the exact opposite of Akuma. Devilotte from Cyberbots: Full Metal Madness· A hidden boss and playable character, a tyrannical princess assisated by two lackies named Xavier & Jigokū Daishi, she traveled back in time from the future of 2099 to challenge the strongest Puzzle Fighter besides Akuma. Mei-Ling from Night Warriors· Hsien-Ko's twin sister, the talisman on her hat and is playable in consoles only. Anita from Night Warriors · A young girl. Super Puzzle Fighter II Turbo HD Remix is a downloadable game in the Puzzle Fighter franchise for PlayStation 3 and Xbox 360. HD Remix was announced to include several graphical upgrades in the interface, character sprites, levels. Super Puzzle Fighter II Turbo: HD Remix has updated high-definition Thuso Phala is a South African football midfielder who plays for Premier Soccer League club Black Leopards. He is the inventor of Thuso Phala dance moves that are becoming popular to South African soccer fans and dancers at large, the moves he makes after he scores a goal. Phala was featured in a BBC documentary in 2004 entitled'Football and Freedom' which followed the paths of two 13-year-old South Africans aiming to become professional footballers. Since making his debut for the South Africa national football team in 2010, Phala has appeared at both the 2013 and 2015 Africa Cup of Nations, he scored Bafana Bafana's opening goal of the 2015 tournament in a 3–1 loss to Algeria. Thuso Phala at National-Football-Teams.com Thuso Phala at Soccerway
<urn:uuid:d4cafacf-1b00-41e2-bb06-4c6a42dc1955>
CC-MAIN-2020-16
https://wikivisually.com/wiki/Washout_(aeronautics)
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00075.warc.gz
en
0.967026
4,088
3.59375
4
- What is a Special Library? - What do Special Librarians do? - Special Libraries and Knowledge Management - How do Special Librarians market their products and services? - How do you build a Special Library strategy? - How are solo Special Librarians different? - What does success look like for Special Librarians? - What software do Special Librarians use? - How do Special Librarians leverage library software? - How do you evaluate and select an Integrated Library System/Library Automation System? - Request a Demo What is a Special Library? Special libraries, sometimes referred to as “information centers”, are libraries that provide specialized information resources on a particular subject, serve a specialized and limited clientele, and deliver specialized services to that clientele. Special libraries include corporate libraries, government libraries, law libraries, medical libraries, museum libraries, news libraries, and nonprofit libraries. (Wikipedia) What do Special Librarians do? Librarians in special libraries deliver research, technical services and administrative roles—solo librarians perform all three. They acquire and manage an organization’s information resources, which are focused on topics of special interest. Per library expert and consultant Stephen Abram, “More and more, information professionals are embedded in their organization’s operating units and thus are familiar with the knowledge needs of their customers. Special libraries range in size from small operations administered by one person within an organization to large institutions within their own buildings and with hundreds of staff members. Information professionals who work in special libraries wear many hats. They work with specialized types of information, provide specialized information services, manage internal resources, and offer programs (e.g., competitive intelligence programs) that benefit their organizations.” (Abram, Stephen. Succeeding in the World of Special Librarianship. Vancouver, Lucidea Press. 2018. Print, eBook, PDF.) Special Libraries and Knowledge Management Increasingly, special librarians are asked to become “knowledge managers” and develop a strategy for capturing, describing and sharing institutional knowledge. Per Stephen Abram, “Organizations have a hard time keeping track of, sharing, and finding certain types of knowledge…this is the practice of Knowledge Management, which leverages information that is tacit rather than explicit. Tacit knowledge, which typically lives only in people’s heads, is difficult to transfer to another person. Often, tacit knowledge is what employees of an organization need in order to - perform core job requirements - start a new project - launch a new product However, tacit knowledge is difficult to share, and frequently this valuable form of knowledge is lost when someone leaves an organization to retire or pursue other career opportunities. Special Librarians and Information professionals are well positioned to become managers of tacit knowledge. The emergence of the institutional or corporate intranet as a private, employees-only virtual space via the desktop and mobile devices has increased the trend towards fuller information being made available in an integrated fashion to key employees and professionals. The ability to access corporate “memory” is a critical advantage [for] organizations that operate in a competitive framework or where efficient access to knowledge is a key success factor.” (Abram, Stephen. Succeeding in the World of Special Librarianship. Vancouver, Lucidea Press. 2018. Print, eBook, PDF.) Although knowledge management is about much more than software, a robust KM program does require enabling technology. Lucidea offers unified ILS and KM functionality in SydneyEnterprise and GeniePlus, and a powerful corporate intelligence and KM solution with Inmagic Presto. How do Special Librarians market their products and services? It’s easy to think you don’t have to market your library—your organization has invested in you, the rest of the library staff, and in all your content and resources, so they must value it…right? But sadly, we all know stories (or have been in a story) about budget cuts, outsourcing, layoffs and that amazing piece of in-house technology that can be repurposed as your ILS or KM platform. Getting and keeping resources, and becoming integral to your organization’s success require ongoing marketing—it has to be part of your departmental strategy. We’ve written a few blog posts that can help: Marketing Your Library: The Benefits for Special Libraries, and Library Marketing Methods. You can also learn a lot about marketing your special library from our Client Success Stories. And by the way, the power of metrics as a tool for promoting special libraries should not be forgotten. Statistics on database and online subscription usage, trends in budgetary management, and examples of practice and departmental support are invaluable. Even metrics related to specific users can lead to more effective training on using expensive resources wisely. Run reports from an electronic resource management application like Lucidea’s LookUp Precision, and embed them in your quarterly or annual reports to your management. How do you build a Special Library strategy? (Q) What do special libraries have in common with sharks? (A) They have to keep moving forward! A well-utilized, well-resourced, well-loved and sustainable special library doesn’t happen by accident. Library leaders have to develop a strategy that covers products, services, specializations (perhaps the “embedded librarian”) and technology. It also must align very closely with the mission and strategy of the organization. You will find some thought starters here, here, and here. How are solo Special Librarians different? Many organizations recognize the need for a special library, to provide specialized information resources and deliver specialized services—but don’t have the resources to devote to a large library and library staff. Enter the solo librarian—who must perform all the required activities involved in research, technical services and administration regardless of being just one person. Solo special librarians need to hone their project management and time management skills, and focus on networking to stay up with developments in the profession. Read our blog post on 8 Critical Skills for solo librarians. What does success look like for Special Librarians? Special librarians know that to ensure sustainability they must build into their strategy the principles of access, discovery, integration, independence, security, and partnership with other key functions. Today’s librarians embrace change, and even create it. They know that the path to success includes doing more with the tools they have, and the skills they’ve built. But do special librarians truly recognize success when they achieve it? Equally important, do they focus on communicating the value of their success to leadership and peers? In an SLA Hot Topics session (part of our series on special library sustainability), we posed the question: “What Does Success Look Like?” covering topics such as: - What are the characteristics of a successful special library? - How do you know when you are successful? - How do you make sure others know you are successful? - How do you communicate the value of success? - What are the benefits of success? Download our whitepaper presenting information shared during the event, combined with additional valuable insights gained from panelist interviews conducted in preparation for the discussion. We routinely interview our clients and publish their Success Stories; you’ll be impressed and inspired when you see real world examples of the impact a great Integrated Library System delivers, and read about the many successes celebrated by special librarians in a variety of sectors and organizational types. SydneyEnterprise Success Story: Law firm Duane Morris uses SydneyEnterprise ILS to improve library efficiency and expand access to digital content. They rely on our SydneyEnterprise ILS to support all aspects of their work—per Library Operations Manager Russell Rokicki, “Leveraging technology is the driving force to even have an ILS; SydneyEnterprise is really our single problem-solving venue and streamlines all our back-end administration and technical services procedures—it’s an efficiency engine.” What software do Special Librarians use? Special librarians support activities all along the services and deliverables spectrum with software systems designed to help acquire, organize, and share internal and external information and resources. Called “integrated library systems”, (ILS), or “library automation systems” (LAS), these are ideally Web-based and vendor-hosted (“software-as-a-service, also known as SaaS) and offer traditional library functions like cataloging, acquisitions, serials along with Knowledge Management (KM) capabilities that go way beyond classic library automation capabilities. Special librarians also leverage online resource management applications to make evidence-based decisions on purchases, training, department or practice support, and marketing of underutilized yet valuable resources. Lucidea delivers best-in-class software with our flagship products, SydneyEnterprise and GeniePlus. How do Special Librarians leverage library software? For examples of the many ways Lucidea’s clients leverage our ILS products, please read our Client Success Stories; you’ll be impressed and inspired when you see real world examples of the impact a great Integrated Library System delivers. SydneyEnterprise Success Story: The Educational Testing Service (ETS) team have achieved their goal of leveraging leading edge technology to help ETS staff listen, learn and lead. ETS was among the first to see SydneyEnterprise, and among the first clients to migrate. Key decision makers chose SydneyEnterprise for several reasons, including: - Enhanced information discovery - Single venue for administration, searching the collection, and all other library functions - Integration with key IT systems such as SharePoint - Efficiency: with minimal training, the ability to leverage logical, intuitive and sensible workflows - Purpose built design that follows library best practices - Web based reporting and other powerful tools - An appealing and functional interface that staff and patrons enjoy using How do you evaluate and select an Integrated Library System/Library Automation System? Finding the perfect ILS for your organization involves doing a lot of due diligence, and should be based on much more than a canned software demo. At Lucidea we love to work with educated clients, and we believe that long term professional relationships with mutual benefit are the best kind! We’ve put together some materials on vendor and product selection, including this blog post: 5 Ways You Can Get the Most from a Software Demo, this webinar: “Selecting an ILS: How to Find Your Perfect Match” and this eBook: Find the Perfect ILS: How to Evaluate Your Options.
<urn:uuid:40c57bed-92a3-45f9-8658-946641dcc1dd>
CC-MAIN-2020-16
https://lucidea.com/special-libraries/what-is-a-special-library/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371824409.86/warc/CC-MAIN-20200408202012-20200408232512-00035.warc.gz
en
0.93004
2,239
2.609375
3
Brief Summary of Legal Issues Surrounding the Trade in Wild-Caught Reptiles James M. Green (2005) Wildlife smuggling is certainly on the rise. The wildlife trade business is the second-largest illegal trade in the world after drugs. The World Wildlife Fund states that the global trade, both legal and illegal, is estimated to be around US$159 billion per year in declared import values. Reptiles play largely in the realm of exotic trade and illegal trade, but the reptiles that appear to be affected the most are the wild-caught reptiles. While a total ban may neither be feasible nor warranted, certainly the trade in wild-caught reptiles is too prevalent in our global economy. Reptiles are animals. Moreover, under most legal definitions, reptiles are considered to be animals as well. Poor capture techniques, compounded by poor shipping methods or inadequate care, kill many reptiles before they reach the pet store. An estimated 90% of wild-caught reptiles die in their first year of captivity because of physical trauma prior to purchase or because their owners cannot meet their complex dietary and habitat needs. Reptiles are among the most inhumanely treated animals in the pet trade. Because they are cheap and easily replaceable, dealers, captive breeders, and retailers factor huge mortality into their operating costs. The trade of wild-caught amphibians and reptiles is largely unregulated, with only a small minority of species monitored by an international convention. Congress has enacted the Endangered Species Act (ESA) as an effort to help wildlife and the Lacey Act (a federal law that makes criminal the illegal trade in wildlife). Concerns over public welfare have factored heavily into restrictions and ordinances enacted by states and localities. Further, as situations become more problematic, the federal government has not been reluctant to intervene. Reptiles and public safety can intersect in a variety of ways. Reptiles can not only inflict harm or death themselves, but they can also carry diseases , which can contracted by humans (zoonoses). Further, non-indigenous, or non-native species can become established in our environments, upsetting delicate ecosystems and may even lead to the extinction of our native species. Reptiles may even carry disease that could potentially affect us as an agent, either through a natural “terrorism” or bioterrorism, carrying a disease that could affect humans or have a significant affect on our supply of beef. The current system, permitting several legal avenues for prosecutors to pursue when charging those involved in the illegal trade of reptiles appears to be in place, at least structurally. Through more local regulation and education, the current legal net could be significantly tightened to drastically reduce the number of reptiles entering and exiting our borders. More severe punishments and fines, i.e. making examples of those who break the law, on all levels - from the importer/exporter, to the courier, to the ultimate owner, should further decrease the number of illegal reptiles to pass through our borders. Sadly, the fact remains that as long as the demand is high and buyers are willing to purchase a wild-caught reptile, the trade will surely continue. Educating the public on laws and ecology may stifle some of this demand. By attacking both ends of the trade, the supply and demand, with a simultaneous attack on the middle through stricter regulation at the state or locality level regarding keeping and selling reptiles, the goal might more readily be reached. Overview of Legal Issues Surrounding the Trade in Wild-Caught Reptiles James M. Green Reptiles Are Animals Reptiles are animals, as are amphibians. Physiologically, they are similar and are sometimes collectively called “herpetofauna.” All of the excepted scientific classification systems regard reptiles as such. Under the two most common classification systems, reptiles are either grouped as the Class Reptilia or the Class Diapsida under the Kingdom Animalia, meaning “animals”. Moreover, under most legal definitions, reptiles are considered to be animals as well. For example, Connecticut defines an animal as including “birds, quadrupeds, reptiles and amphibians.” Con. Gen. Stat. §26-1(1) (2004). Wisconsin is equally specific: "’Animal’ includes every living: (a) Warm-blooded creature, except a human being; (b) Reptile; or (c) Amphibian.” Wis. Stat. §951.01 (2004). Florida, albeit in an unflattering way, also defines “animal” to include reptiles as “the word ‘animal’ shall be held to include every living dumb creature.” Fla. Stat. §828.02 (2005). An unsettling discrepancy lies in the Federal Government’s Animal Welfare Act. 7 U.S.C. §§2131 et seq. There, the “term ‘animal’ means any live or dead dog, cat, monkey (nonhuman primate mammal), guinea pig, hamster, rabbit, or such other warm-blooded animal, as the Secretary may determine is being used, or is intended for use, for research, testing, experimentation, or exhibition purposes, or as a pet;” but excludes birds, mice, rats, horses and farm animals. 7 U.S.C. §2132(g). Conspicuously absent from the list are fish, amphibians and reptiles. Id. Unfortunately, many people, unaware of the backings from science and the law, do not consider reptiles to be animals. In his article entitled “Herpetofauna Keeping By Secondary School Students: Causes For Concern”, David Bride complied the results of some alarming graduate studies that currently remain unpublished. See http://www.psyeta.org/sa/sa6.1/bride.html . His compilation refers to a study by Martin and Nicholls (Martin, D. & Nicholls, M. (1993). The importance of children's provenance in the understanding of "animal" - a comparison of town and village primary school children in Kent. Christ Church College, Canterbury: Ecology Research Group) of 400 five- to eleven-year-olds found between 10-40% of those surveyed did not recognize either snakes or frogs as animals. Similarly, Tinkler (Tinkler, D. (1993) Zoo visitors' perceptions of animals - and the short-term effect of a zoo visit upon them. Unpublished M.S. dissertation. University of Kent at Canterbury, DICE) recorded 60% of 150 adult zoo visitors failed to classify a lizard as an animal. From his investigation into unpublished studies, Bride hypothesized that this may be due to a confusion of term "mammal" with "animal." He recently found that of 228 respondents to a questionnaire about wildlife, at least 25% appeared to confuse the two. Bride found this view, that "animal" equals "mammal," to be interesting as it gives an entirely new perspective to what many people's interpretations of such concepts as "animal protection," "animal welfare," and "animal rights" may entail. See http://www.psyeta.org/sa/sa6.1/bride.html. Knowledge of what a reptile actually is may go far in soliciting the sympathy of the public. A very common myth is that reptiles are “cold-blooded.” In addition to describing a general temperature of reptilian blood, the term also entails the negative connotations of evil and lifelessness. To be sure, in the Biblical story of Adam and Eve, it was a serpent that deceived mankind. However, reptiles are not “cold-blooded.” On occasion, they are quite the contrary and can even be “hot-blooded.” This gradation results in reptiles being “poikilothermic.” Poikilotherms have a body temperature that is variable with environmental conditions. If the ambient temperature is warm or even hot, that leads to a reptile having warm or hot blood. Another physiological term that accurately depicts reptiles is “ectothemy.” Ectotherms control the uptake of heat from the environment as a way to control internal body temperature. Reptiles are both poikilothermic and ectothemic, but are not cold-blooded. Moreover, some larger reptiles, such as large crocodilians, sea turtles and large monitor lizards approach a level of homeothermy. That is, their temperature does not fluctuate as much based upon the environment. This results from a physiology process known as gigantothermy, where a very large animal will maintain a constant body temperature with little input from the environment. Another popular assumption is that since reptiles are “cold-blooded,” they therefore feel little or no pain. In fact, they have little physiological control over their internal body temperature and are instead almost completely reliant on external heat sources to provide them with enough warmth for their natural activities and for metabolic processes to operate. This makes these animals extremely sensitive even to subtle changes in temperature and humidity in their captive environment. Added to the problems arising from their “cold-blooded” reputation, reptiles lack the repertoire of facial expressions and vocalizations that would alert keepers to their pain and distress. A sick, hurt, or chronically stressed reptile will typically suffer in silence. The suffering will often be far more prolonged than that experienced by mammals, due to reptiles' slow metabolic rate. Blood loss and the healing of injuries are both relatively slow, as are the consequent risk of infection and further complications. Most reptiles have a preferred optimum temperature zone, a zone of temperature that they try to maintain while performing daily activities. Their entire physiology, including their immune defense mechanism, is temperature dependent and operates optimally at this optimal zone. Reptiles in captivity often are maintained at suboptimal temperatures, which results in a compromised immune system. Such animals are subject to infection by a great variety of secondary invaders, including the gram-negative microorganisms commonly isolated from their oral cavity. A reptile that is kept at its preferred optimum temperature (with all other environmental conditions being ideal) and receives proper nutrition is often a healthy reptile. For a more complete discussion of reptile physiology, see 18 Carl Gans & David Crews, Biology of the Reptilia, Physiology E, (1991). The cumulative effect of these common misconceptions may play a large factor in the cruel treatment and neglect of reptiles in captivity.
<urn:uuid:46a68ce0-23bc-4d1e-987a-f6540f529168>
CC-MAIN-2020-16
https://www.animallaw.info/intro/trade-wild-caught-reptiles
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505826.39/warc/CC-MAIN-20200401161832-20200401191832-00276.warc.gz
en
0.949571
2,164
3.09375
3
This post authored by Alan King, the blog founder and curator. Contact Alan via the comments or on twitter (Previously a twitter persona Prez Shulz, now by name) @akabilky Sovereignty or Independence? Thank you for visiting the EUandEurope blog. In this blog post, I will be exploring the practical difference between the much misunderstood word Sovereignty and the much better but still misused term Independence and why both are important but one has much greater importance on a day by day basis. Some of my thoughts were initially prompted when I read a blog post by Roland Smith on his blog, giving an Analogy of the EU referendum, prompting thoughts on what specifically the relationship between UK and Europe is analogous to. There have been many analogies about the EU and the UK relationship to it. At the time of joining, it was seen that the European (EEC) train was leaving the station and the UK had to get on board or miss out. This one never seems to lose currency, e.g.: - The Common Market (European Economic Community) train is leaving.. - The ERM (Exchange Rate Mechanism) train is leaving - The Euro Train is leaving Depending on your level of knowledge about the above events, you may possibly be thinking ‘better we had missed the train!‘ Of course we have the benefit of hindsight now and a different analogy may be appropriate for the position we find ourselves in. Daniel Hannan writing in the Telegraph used a bus analogy in a different way to the above train ones. When you’re on a bus, heading somewhere you don’t want to go, the status quo doesn’t mean remaining in your seat. It means stepping off. You won’t get another chance. So train or possibly a bus, maybe a tram: Both good maybe but both wrong in my opinion. The Good Ship Britannia Politically speaking UK would be a seaworthy ship, large and very capable but, unfortunately being towed by a supertanker. No ordinary Supertanker, this one has 27 ‘Captains’ (actually more when the Commission, Parliament and Council are accounted for) each of which doesn’t control the direction of the EU Supertanker. Let’s analyse why the Ship tethered to a tanker is a good analogy for a number of reasons. Although, left to her own devices, the UK can quite successfully navigate the high seas and endure the roughest storms; whilst tethered to the EU her ability to navigate is severely restricted by the pull of the EU tow line. Tethered to the EU supertanker, we have little control over destination, though we can use our engines to alter course a little, we burn a lot of fuel (political capital) doing so and after a while the tanker returns to its original course, the one it has always been on. We saw this most recently when David Cameron ‘annoyed’ other member states with his ‘Renegotiation’. some of that down to Cameron’s tactics of course. If you believe that David Cameron delivered a ‘Reformed’ EU then you need to appraise yourself of some basic facts about who made the agreement and what force it has in law. I penned an article on this recently that drew on eureferendum.com‘s ‘Dave’s Dodgy Deal‘ articles. Continuing with the analogy: If we throw over an anchor in desperation at the course being set, we could temporarily slow the larger craft but then we don’t move anywhere meaningful and neither do they. An unsatisfactory situation. So, while there’s a tow rope to the larger craft and without wishing to use either of the above options, what can we do? If we want to influence events, we need to talk to the crew of the larger vessel. We have a radio but communications rely on the other end responding. They will do that of course in calm waters with no other preoccupations. We have some of our own crew seconded to the main vessel, although in any ‘community’ roles they are sworn not to represent us directly. In stormy seas though the crew of the tanker are too busy keeping the ship on an even keel to be able to listen to us. There is always a ready solution offered for us to have more say/influence in events on the larger vessel and that is to be pulled in and boarded to the larger vessel, the more tightly integrated core EU. You know what the analogy for Brexit is by now of course. We need to cut the tow lines and set our own course. There’s a reason we need to do this sooner rather than later. The longer we stay tethered and find it ineffective to try to control our course, the less we (our politicians) will try. Why expend effort to no good effect? The ‘renegotiation’ showed that we have to reserve our limited political capital for only those things we find most important (to have a small chance of influencing). Whilst being towed, our political captains (houses of Parliament) lie idle, the crew (civil service) fall out of practice, or busy themselves with more minor tasks. The great machinery of state is effectively running on idle. Here we come to the crucial difference between sovereignty and independence. In the above analogy, we had sovereignty all along. By the powers vested in the crown in Parliament (arcane wording I know and for someone with a deal of antipathy toward royalty they don’t fall easy for me to write), we always retain the sovereign ability to cut the ropes. Always. However, it is easy to see from the chosen analogy that we cannot act independently whilst tethered. So, we do retain sovereignty, at all times in our free will to take actions. We do need to cut the rope however for it to be meaningful. Whilst still in the EU we are subject to the treaties and would be taken to the ECJ (European Court of Justice*) if we cut the ropes without first going through the correct procedure. *the ECJ by the way should more correctly be called the EU Court of Justice but the EU has appropriated the term Europe. On cutting the ropes/leaving the EU, we regain the full utility of engines, navigation equipment and communication equipment that a state of our size naturally has in the world. A twitter contact made the analogy that President Obama wants us to stay ‘in formation’ (remain a member of) the EU and that we are betraying our allies if we leave. We can of course mostly stay in formation.. leaving the formality of the EU does not mean we drift away permanently. We can divert to go around obstacles, some of which affect the crew of ourselves and the tanker, some are uniquely our own problems to solve. In the analogy above, sovereignty is clearly the ability at any time of our choosing to notify the tanker that we will be cutting the rope and then to do so. Independence is the ability to set our own course. Not inevitable that we move far away from the EU ‘fleet’ but we have the ability to head in a different direction to deal with issues, or take advantage of opportunities. But to regain our independence we must assert our sovereign right to exercise independence. A problem we face is that the longer the Captain and crew spend without having to control the direction of the ship, the more difficult it is for them to do so if and when they are handed back full control. There will be those who read the above and, not being convinced will inevitably think, so what? We give away/share our sovereignty as part of NATO, UN, other global bodies, why does it matter that we do with the EU? The issue with loss of sovereignty in the EU is that it is so encompassing. NATO is specifically for defence for example and doesn’t come into play unless by agreement or in extremis if one of the members is attacked. The very fact that there is an EU home affairs committee says it all. Who’s home? Purely domestic issues have no right to be decided from Finland to France to Portugal to Bulgaria. People, quite rightly live different lives in each of the countries. Maybe it’s the libertarian streak in the author that believes I actually don’t have a right to tell others how to live their lives and I actually see it as authoritarian to do so on the scale of the EU28. Actually, if you look at the Home Affairs web page you’ll see some rather grand things that they claim to do. I leave it to you to decide if they do but some certainly believe they dont: But let us look at some simple examples where the UK has taken a different course to the majority of EU members. The first example if a sensitive subject but please see it simply as a case where the UK had a different approach. A Different Course On security particularly, if we don’t cut the rope, what happens if the tanker is holed irreparably (internal strife). There is a current example of this in action. The UK is one of the highest foreign aid spenders in the EU: However, we had a different approach to helping Syrian refugees. Those given asylum in Britain were to come directly from the refugee camps and be based on need. This was not an approach that other EU countries seemed to support. Comments about the number of Iphones taking selfies on the shoreline of Greece are valid because those arriving in boats are the ones who can afford to. You are not seeing the poor and destitute of Syria arriving because they simply can’t afford it. Those most desperate are very likely to be stuck in Syria or a neighbouring country, with little or no means to move far from the conflict zone. Those most in need of assistance yet now Mainland Europe will struggle to help them. Did you see ‘British Influence’ in action? I didn’t. I saw the UK castigated for lack of action. We can argue about numbers of refugees taken but this isn’t the point of this post. UK had/has a fundamentally different approach. There is not (yet) a full common asylum policy though Lisbon made Asylum and Immigration a shared competence, see the following: ..the Court of Justice now has full competence in the field of immigration and asylum. It is likely that the UK might still want a different policy to the other EU member states when it comes time to change this to a Full Competence. The U.K., superb ocean-going vessel that she is, cannot support all the people on the tanker with the best will in the world. Ultimately, we may have to cut the rope to prevent the tanker taking us down with it. UK has already distanced itself from the Euro and its bailout mechanism. If you know the mechanics of that bailout mechanism, you’ll know that it has the potential to sink the Eurozone, as bailed out countries have responsibilities to contribute to the bailout itself: Indeed, I had forgotten that Spain itself received money from the ESM fund (though I thought from its predecessor the EFSF, it appears not): As an aside, the disaster in the Eurozone might have roots outside the poorer southern nations: Also note the ‘broke the rules’ reference. This refers to the famous ‘no bailout clause‘ originally in the Maastricht Treaty. The EU is a rules based organisation of course, until it’s not convenient for *certain members* to obey them? (UK is not in that particularly cozy club btw). Once the UK became separate from the Eurozone, We moved away from the course being set by what should be seen as the ‘core’ EU. The ropes are strained and for valid reasons, the crew of the Eurozone cannot spend too much time listening to the UK. The key point to remember is that the UK, in or out of the EU will bring what influence it can to bear but ultimately the direction of the EU is not our choice anymore. Indeed, history has proved that it never was and it is arrogance to think it ever will be. As leaving the EU is not ‘throwing everything up in the air’ as Stephanie Flaunders stated on the Andrew Marr show this morning, if you have a plan, in my opinion it is the right thing to do for very valid and practical reasons.
<urn:uuid:e20fb95a-dc1f-489f-9213-9f00c9044fee>
CC-MAIN-2020-16
https://euandeurope.com/2016/04/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370526982.53/warc/CC-MAIN-20200404231315-20200405021315-00274.warc.gz
en
0.958483
2,616
2.5625
3
What you’ll learn to do: explain the process of selecting a positioning and differentiation strategy Positioning and differentiation are powerful tools to help you establish the market position you want for your product or service. In this section you’ll learn how various positioning approaches work for different target segments and how to choose an effective positioning and differentiation strategy. The specific things you’ll learn in this section include: - Explain the concept of competitive advantage and how it relates to positioning strategy - Differentiate between product features and benefits - Explain positioning (perceptual) maps - Identify common positioning strategies The Positioning Process Arriving at the best positioning and differentiation strategy involves a process. The goal of the process is to design an identity that both confirms the value of the product, service, or brand in the customer’s mind and explains why and how the offering is better than the competition. To reach that goal, marketers typically follow a positioning process comprised of the following five steps: Steps of the Positioning Process - Confirm your understanding of market dynamics - Identify your competitive advantages - Choose competitive advantages that define your market “niche” - Define your positioning strategy - Communicate and deliver on the positioning strategy Step 1: Confirm Your Understanding of Market Dynamics At the start of the positioning process, you need a firm understanding of your target market and answers to the following questions: - In which product, service, or market category (also called the “frame of reference”) do you plan to use this positioning? - Which target segment is your focus for the positioning you are developing? - What factors do these buyers evaluate when they make a purchasing decision? - How do these buyers view your competitors in the category? If you don’t have answers to these questions, you should consider conducting formal or informal marketing research to reach a better understanding of your target market and the market dynamics around it. Some marketers may have the time and resources to conduct extensive research, while others may need to rely on their own experience and anecdotal conversations with target customers. Either way, you’ll remember that the customer is at the center of the marketing mix, so knowing whom you’re targeting is the only place to start. Step 2: Identify Your Competitive Advantages A competitive advantage is some trait, quality, or capability that allows you to outperform the competition. It gives your product, service, or brand an advantage over others in purchasing decisions. Competitive advantage may come from any or all of the following: - Price: Something in your production process or supply chain may make it possible for you to provide comparable value at a lower cost than competitors. - Features: You may provide tangible or intangible features that your competitors do not: for example, more colors, better taste, a more elegant design, quicker delivery, personalized service, etc. - Benefits: You may provide unique benefits to customers that your competitors cannot match. Benefits are intangible strengths or outcomes your customer gets when they use your offering. For example, time savings, convenience, increased control, enjoyment, relaxation, more choices, feeling better about oneself, being more attractive, etc. Create a list of the things that make you different from competitors in positive ways. Then identify which of these factors are also competitive advantages: the influential factors that help you perform better in the marketplace and cause customers to choose your product, service, or brand over other options. As a rule, it is relatively easy for competitors to undercut your pricing or match your features, so it is difficult to maintain a consistent competitive advantage in either of these areas. Market-leading products, services, and brands are most likely to differentiate based on benefits—the intangible strengths and outcomes that are harder for competitors to match. For example, many car companies achieve strong ratings in safety tests, but driving a Volvo provides an extra, intangible benefit for the driver of feeling safer because of Volvo’s longstanding record and reputation for safety. A variety of theme parks in Southern California offer exciting rides and family fun, but only Disneyland’s Magic Kingdom makes people feel like they’re in the happiest place on earth. You don’t necessarily need a long list of competitive advantages, but your list should be substantive: it should include the things that truly create distance between your offering and competitors. Dig deep to identify the intangible benefits your customers experience–or intangible benefits they could experience—from your offering that make it different and better than the alternatives. Step 3: Choose Competitive Advantages That Define Your Niche Your list of competitive advantages represents a set of possible positioning strategies you could pursue for your product, service, or brand. The next step is to examine how these factors fit into customer perceptions of your broader competitive set. Your goal is to pick a positioning approach that gives you a unique and valued position in the market that competitors are not addressing. A perceptual map is a great tool for this step. Perceptual maps create a picture of how different competitors are positioned in the market, based on the key criteria that strongly influence customer decisions. Examples of two different perceptual maps are included below. The first one maps automobile brands based on customer perceptions of price and quality. The second one maps lifestyle programming on cable TV channels, according to whether it is younger/edgier vs. older/mainstream and educational vs. entertainment. Marketers use these sorts of perceptual maps to identify gaps in the market; these, in turn, represent opportunities to to fill a niche in the market that isn’t being addressed. For example, the lifestyle programming map suggests that there are not a lot of choices in the area of younger/edgier AND educational space. This might be a good place to position a new cable channel or programming direction. On the other hand, there are already lots of established players in the younger/edgier/entertaining space, so new entrants would have to beat out more competition to make an impact. You can create a perceptual map similar to these by identifying the key criteria customers use when deciding what to buy and setting these as the horizontal and vertical axes. Then you can overlay competitors in the perceptual space where they seem to fit. You can even create multiple maps of the same market with different criteria on the horizontal and vertical axes to get a different view of how competitors are positioned. Perceptual maps are most robust when they are based on actual marketing research data, but marketers can also create directional maps based on their experience and anecdotal understanding of market dynamics. With your maps in hand, look for areas where there are fewer competitors: these are the spaces where you are most likely to be successful creating your own niche. Consider where your competitive advantages would help you fit well into these gaps; this will direct you to the strongest positioning opportunities for your product, service, or brand. Give this approach a try: Suppose you are exploring whether to introduce your homemade, artisan-style ice cream to a wider audience, which will mean competing with national brands carried in local and regional grocery stores. Looking at the following perceptual map, where are the gaps in which you could create a niche for your product? Who would be your closest competitors? Your competitive advantage around a homemade, artisan-style product puts you on the upper half of the map. You would have to choose between more classic versus interesting and innovative ice cream choices. Based on your strengths and preferences, you can choose where to claim your positioning niche: Perhaps you stake your future on the classical side by introducing the most marvelous, pure, premium vanilla and chocolate ice creams your customers have ever tasted. Alternatively, you might choose to introduce an ice cream line that capitalizes on interesting flavor combinations using local and seasonal ingredients, which would position you squarely in the innovative quadrant. Either approach could be a winning combination in a unique market niche. If you choose not to create a perceptual map, an alternate approach is to list competitors and their competitive advantages. Then, add your own own offering and competitive advantages to the list. Based on the alternatives available to customers, think about where there are gaps between what customers want and value most and what they can get from the choices available today. Identify where your competitive advantages can help you fit into these gaps, since they will be the most promising positioning approaches for you. Remember to think creatively as you are defining your competitive advantages and choosing those that will define your positioning and market niche. You have a greater likelihood of success if you are also the first in the market to claim your positioning. You won’t have to displace anyone else, and you can generate excitement by fulfilling a previously unmet need. Step 4: Define Your Positioning Strategy With your competitive advantages identified and information about how key competitors are positioned, you’re ready to evaluate and select your positioning strategy. This is the decision you make about how, exactly, you plan to position your offering relative to the rest of the field. How will you be different and better? There are several common positioning strategies you should consider, shown in the following table: |Common Positioning Strategies| |Category Benefit||Position yourself as “owning” an important benefit and delivering it better than anyone else||Volvo = Safety | Hallmark = Caring shared Hawaii = Aloha spirit |Best fit for the Customer||Position yourself as an ideal fit for the customer’s personality, style, and approach||Red Bull = Extreme | Guess Jeans = Sexy chic Virgin Atlantic = Ultra cool fun |Business Approach||Position yourself with a distinctive approach to doing business||Jimmy John’s = Unbelievably fast | TurboTax = Easy DIY |Anti-Competition||Position yourself as a preferred alternative to the competition||Apple = Think different | Seven-Up = The Uncola |Price||Position yourself according to pricing: lowest cost, best value for the money, luxury or premium offering, etc.||Wal-Mart = Lowest prices | RyanAir = Cheap flights Old Navy = Affordable fashion |Quality||Position yourself according to a quality standard: high quality, best-in-class, or else reliably good quality at a reasonable price||Hearts on Fire = Perfect cut | Ritz Carlton = Ultimate luxury Strong positioning is simple: it focuses on a single, powerful concept that is important to the customer. It uses your most promising competitive advantage to carve out the niche you will fill better than anyone else. Your positioning strategy puts this competitive advantage into the context of your competitive set: it explains what distinguishes you from the competition. Perhaps you deliver an emotional benefit that your target audience doesn’t get anywhere else (escape? balance?) Perhaps you are hands down the best choice for a geeky, gear-head audience (bikers, coders). Perhaps you provide great customer service in a category where customer service is unheard of (cable TV, contractors). Your positioning will become the “special sauce” that sets you apart. Concoct it well. Step 5: Communicate and Deliver on Your Positioning Strategy The next sections of this module will delve deeper into this step, but don’t underestimate its importance. Communicating your positioning strategy begins with creating a positioning statement and sharing it internally across the organization to make sure that everyone understands how and where your offering will fit in the market. Your positioning builds on a competitive advantage, and it is essential for you to deliver on the expectations your positioning sets in customers’ minds. You should design your positioning strategy to endure over time, while recognizing that it can and should be adjusted from time to time to reflect changes in the competitive set, your target segment, market trends, and so forth. If your positioning is based on being an ideal “lifestyle” fit for your target audience, for example, you need to demonstrate how your offering is attuned to the needs and experiences of this audience. This includes evolving as your target segment evolves. If your positioning is based on “owning” an important benefit like security or reliability or delight, then you should explore all the ways you can deliver that benefit better than any competitor who might try to imitate you. The marketing mix provides the set of coordinated tools you use to execute on your positioning strategy. You might think of your positioning strategy as the tune you want your target segment to hear. The marketing mix is how you orchestrate and harmonize that tune, making it a memorable, preferred choice for your target customers. Video: Starbucks Delivers Community and Connection What business is Starbucks really in? “We wanted to build a third place between home and work,” says Starbucks’ CEO Howard Schultz, as he sits in one of his cafés, “at a time in America when people are hungry for human connection.” Watch the following video to learn how, from the beginning, Starbucks has positioned itself to be much more than just a seller of gourmet coffee. It has built its entire brand experience around a core positioning that offers “a sense of community” as much as coffee. An interactive or media element has been excluded from this version of the text. You can view it online here: http://pb.libretexts.org/marketing1/?p=190 - The Positioning Process. Provided by: Lumen Learning. License: CC BY: Attribution - Consumer Perception of Automotive Brands. Provided by: Lumen Learning. License: CC BY: Attribution - Consumer Perception of Automotive Brands. Provided by: Lumen Learning. License: CC BY: Attribution - Multi-Dimensional Perceptual Map. Authored by: Ste.kaleta. Provided by: Wikimedia Commons. Located at: https://commons.wikimedia.org/wiki/File:Multi-Dimensional_Perceptual_Map.gif. License: CC BY-SA: Attribution-ShareAlike - Musical Crane. Authored by: Sodanie Chea. Located at: https://www.flickr.com/photos/sodaniechea/7106905103/. License: CC BY: Attribution - Starbucks the Brand. Provided by: BBC. Located at: https://youtu.be/tnHuGN3umTA. License: CC BY-NC-ND: Attribution-NonCommercial-NoDerivatives
<urn:uuid:b79eef8d-e33b-4301-a6e2-d83f2c401f34>
CC-MAIN-2020-16
https://biz.libretexts.org/Bookshelves/Marketing/Book%3A_Principles_of_Marketing_(Lumen)/08%3A_Positioning/8.03%3A_The_Positioning_Process
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00074.warc.gz
en
0.92304
2,980
2.609375
3
This post is the 200th to be posted on this blog. It's been a wonderful journey of sharing. 🙂 Mrs Jordan and Year 4, take a look at the "Post 201: About Bilbies and 200 Posts" post for a surprise. A class posed the question, "What technology did you use when you were younger?" To see their original post, click on their question. What technology did I use? Let's take a journey back to the 1950s. When I was born, radio and going to the cinema, drive in or live performances were the normal entertainment. Computers were around but they were big, heavy and very expensive yet your mobile phone of today is far more powerful. These computers were only found in big companies or universities, not in homes. Let's see some of the changes I saw. Telephone - Telephones had been around for a long time before I was nborn but my family was the first in our street to have a telephone so neighbours would make and receive calls to our house. I still remember our phone number. It was UY 5734. That's right, we had letters and numbers and the phone had a rotary dial. It could be very awkward if it was a cold, rainy night when someone called for a neighbour and my father had to go and get them.Television - They started to appear in Australia in 1956. We, like the phone, were the only home with television in our area. It was black and white and not a very big screen. My father would arrive home from work to find people everywhere in our loungeroom trying to look at the TV screen. At first, they were just looking at photos such as of the Sydney Harbour Bridge until one night on 16th September, 1956 a man named Bruce Gyngell appeared to welcome us to television. Television had started so we could watch the 1956 Melbourne Olympic Games. For us in Sydney, our first TV station was TCN-9. Record players - My parents owned a radio/record player for music and news. My mother had 78rpm* as well as 33 1/3rpm LP* records. Games - They weren't electronic. We had board games such as Monopoly, checkers, chess and Ludo. Cameras - We had film cameras we would use to take photos. Once taken, we would send the rolls of film away to be processed and printed. There were no video cameras but we did have movie cameras. The home movie cameras used 8mm film (see below). However, some people used 16mm film in cameras. They gave better pictures but were much more expensive. My first photo camera looked more like a black box and didn't take very good photos but my father had a better camera. 8mm movie camera and film Here is a scan of some 8mm film frames. It's from a Popeye cartoon. Movie film shows 1 frame (picture) at a time. When chaning quickly, the pictures seem to be moving. Here is a video clip showing how 8 frames from above can seem to move. We would watch the 8mm movies projected on a screen. *rpm - revolutions per minute - the number of times it turns in one minute. * LP - long playing There were no computers, iPads, and mobile phones in homes back then. I was in primary and high school in the 1960s. Classes could have 40 children. Pens and ink wells - At first, we had pencils but no ball point pens in class. In Year 3, I was an ink well monitor. My job was to fill the inkwells so students could dip their pens in to write. It was late 1963 when the school allowed students to use ball point pens. The only other way of writing was if we had a typewriter. Computers - It was in the late 60s I saw my first computer at a science fair at high school. It was huge and could only play noughts and crosses. By the late 60s I had an interest in electronics so the big machine with valves in it reminded me of inside TVs of the day. Transistor radio - The 60s was also the time I bought my first transistor radio. Imagine being able to hold a radio in your hand and listen to music. This was when technology started to take off for me. TV Games - I bought an electronic kit and was able to make a very simple game I could play on a TV. A small, very simple motorbike would move across the screen as you twisted a knob on the control box I built. You had to jump small "buses" that looked like white blobs. The game looked a little like this on the screen. Computers - In 1971, I visited the Atomic Energy Commission at Lucas Heights south of Sydney. I saw my first nuclear reactor and serious computer while there, a computer no one could afford to have in the home. The programs were on a series of cards. Programmers punched out holes in them. Hundreds might be needed for a big project so they would be left to run overnight. If one card had a mistake, the whole computer stopped and waited until the car was fixed. This is what a programming card looked like. Computers and me - It was in the 70s I first had the chance to use a computer while studying science at Sydney University. We didn't have floppy disks, hard drives, CDs, DVDs, USB devices or computer screens. There was a very large typing machine where you would type in your program. To have a copy of the program, a long strip of thick paper tape was fed through the printer and holes were punched in it. Graduates had something special, they had cassette drive but I was an undergraduate and had to stick to the tape. The first computer I used at university (college) looked a little like this. Teaching technology - When I started teaching in the 70s, I was a high tech type of teacher. Back then it meant I used a cassette player/recorder, a slide projector, and 8mm movie projector and an overhead projector in class. I wasn't able to use computers in class in the 70s but I did build some simple electronic kits for the children to use. 35mm Slide Projector. It still works. 8mm Movie Projector. It still works. Overhead Projector. It still works. Television - Colour TV started in the mid 70s. Calculators - I was able to buy my first calculator in the 1970s. It could only add, subtract, multiply and divide. Around 1975, I bought my first scientific calculator. It could do much more. It's old and very worn but I still have it. Before calculators, I used a slide rule and logarithm tables. My old calculator is 40 years old but still works. Good one Sharp! Cameras - I have a few cameras to take still photos in the 70s. All used rolls of film. Floppy Disks - Cassettes had been used to store program for computers since the early 70s but, by the late 70s, we had floppy disks to store programs. They came first in 8 inch, 5.25 inch and 3.5 inch sizes. 5 1/4 inch (13cm) Floppy Disk Now we were starting to get really serious. An Apple II computer.Computers in class In 1981 - I was in a small country school in western N.S.W. We had one Apple II computer we shared with five other small schools. There was still no internet, our class TV only had one channel if the weather was good, and the phone was oen where you would wind a handle and ask the operator for a number. It was in this year I wrote a couple simple programs for the children to use on the computer. One was a treasure hunt game and I always managed to beat the class members. Remember, I was the programmer so I programme d the computer to give me hints only I understood. Did that make me a cheat? 🙂 Video camera - It was in 1982 I bought my first video camera. It was large and had a heavy side pack you carried over your shoulder. Batteries were large and had lead inside so they were heavy. Back then, people thought I was with a televison station because video camera were very rare. I was visitng the town of Bathurst with my school that year when Queen Elizabeth II visited. Seeing the camera, police let me through the barrier so I could take a close up of the Queen. I'm sure they also thought I was from a TV station. This is part of the video clip taken in 1982 during the Queen's visit to Bathurst. It was converted from VHS to digital. Video Cassette Recorders (VCR) - These appeared in the early 80s and we could finally record programmes and watch movies. With my video camera and VCR, I was able to edit video I had taken. With my school Apple II computer and a small program I wrote, I could even add titles to the videos. Computers in Schools - I helped introduce computers to two schools in the 80s. I was called a computer coordinator back then. As well as teaching, it was my job to care for the computers in the schools. Because of my electronics hobby, I was often able to fix computers with problems. Computers and me - It was in the late 80s I bought my first computer. It was an Apple IIGS. With a printer (black and white only), I was able to print worksheets and dislpays for my class and other teachers . With only one computer in the school for classes to share in my first year there in 1988, I bought an Apple IIC computer for my class to use. I was really hooked on how they could be used in class. An Applie IIGS computer just like the one I owned. Computers in schools - In the 90s, the number of computers I owned grew as I bought or was given computers needing repair. The computer room I ran for a few years had 16 computers but only one was owned by the school. It was also in the early 90s I first used the internet with classes. I would roll my Apple IIc computer and modem down to an office and connect to a phone line. It was slow and could only show text. There was no graphics, music or video and I paid $5 an hour for access. By the end of the 90s, I had installed the first network room in the school and we then had a whole school network installed with internet access. Computers and me - By the end of the 90s, I owned about 45 computers. I would have some of them in my classroom and lend others to the students in my class to use at home. The computers included Apple II, Apple Macintosh, Atari, Commodore, Acorn and a few other types as well as Sega and Gameboy handheld game devices. At home, I was using Apple Macintosh and Windows computers. Handheld Gameboy Advance games machine.Cameras - In the 90s, I ran after school computer classes for students, the money I raised bought the schools first digital photo camera. The camera wasn't of great quality but the Apple Quicktake 100 meant I could load photos straight into a computer. In the late 90s, I also bought my first digital video camera. The photo quality was much better than the old video camera. Phones - In the 1990s, I bought my first mobile phone. You had to carry it like a small bag as it was large and weighed around 1kg but it was mobile and it worked. Scanners and printers - In the 90s, I bought my first scanners and colour printers and had fun scanning photos and making changed photos for the student newspaper. Scanners were able to read printed writing so I didn't need to type everything. CDs - Music CDs appeared and we were able to use these instead of vinyl LP records. We were even able to burn our own CDs . DVDs - DVDs appeared in the late 90s and we were able to record movies from TV or add videos we made to them. in these years I was retired from teaching by the end of 2005. Computers in schools - Whole school networks, internet, You Tube, editing video on computers, digital cameras, small mobile phonesetc... The growth has been amazing. I moved to a new school and allowed children in my old school who had borrowed my computers to keep them. I had way too many for moving house and made a rule I should own no more than 10 for use in home and school. Computers and me - I added my first laptop computer in this era. Cameras - I bought my first digital SLR* camera and could simply plug it into the computer to load and edit photos and started buying extra video cameras for making DVDs and CDs for schools and community groups. I have only just replaced this camera with a new digital SLR camera able to record HD video as well as photos. Internet - was a part of everyday life. Mobile phone - Mobiles were now much smarter and started to access the internet. * SLR - Single Lens Reflex - It meant a type of camera where so look through the camera lens when taking a photo. We're up to the current era. I started blogging in 2012 and still am a keen techie type of person but no longer need all of the equipment I used while teaching but still have enough for producing filming and photographing performances as well as making CDs and DVDs for school and community groups.
<urn:uuid:a6a09a19-efff-4fb5-abb6-ba61e6377104>
CC-MAIN-2020-16
https://rossmannellcomments.edublogs.org/category/technology/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370524604.46/warc/CC-MAIN-20200404165658-20200404195658-00394.warc.gz
en
0.987659
2,830
2.671875
3
Redwoods Reading List Learn more about the redwood forest with one of these redwoods-themed books for children and adults. Learn more about the redwood forest with one of these redwoods-themed books for children and adults. The Moses tree is a real tree. Its age is estimated at 2,500 years, it is located near Sequoia National Forest, and it is one of the largest of the spectacular giant redwoods. On the basis of the scars and form of the tree, the author has predicted the course of its life development from the day its seed was planted, and of the surrounding wildlife. From sapling to adult the author gives us the sense of time that it takes to grow a redwood. We meet Native Americans, from generation to generation, then loggers and contemporary man as the tree continues its long life span. Written by scientists, science educators and writers, these action-packed books discuss the work of scientists and their research, and deal with environmental problems and some of their solutions. A giant five-thousand-year-old Sequoia, called Wa-No-Na by the Indians, tells its life story. The children of the forest live deep in the roots of an old pine tree. This book invites children to follow their engaging adventures through each season as they play hide-and-seek with the squirrels and throw snowballs in winter. An illustrated introduction to trees and woodlands with information on how to identify the bark and the leaves, the many ways that animals use trees, and how to read the individual history that shapes every tree. From hurricanes to caves to the crowns of towering redwoods, these scientists battle some of the earth’s most intense conditions in order to save lives, preserve species, and help us to better understand the way our planet works. Beautiful color photographs and a simple text describe for young readers the life cycle of the amazing giant sequoia trees of California, as special notes for adults help build an interactive experience perfect for classrooms. Describes twelve of the world’s tallest trees, such as the redwood, mountain ash, kauri, and Douglas fir. Hannah was born with very big ears. One day she goes into the forest and find a lonely tree – a tree that can talk. She shares her stories with him, and decides to help the lonely tree. She goes into town, tells the tree’s story and asks the people for help to plant new trees. This collection of twenty wild-animal stories will delight readers of all ages. Each tale shows the point of view of one particular wild animal, describing his natural environment, the characteristics of his species, and recounting his daily pursuits and adventures. In the Company of Redwoods is a book that everyone will love, for it makes it easy to learn the names, facts and faces of the understory plants most commonly associated with the Coast Redwood. It is designed to be carried on walks in each of the more than 60 Redwood State Parks and Preserves in coastal California from Big Sur to the Oregon border. Peanut is a young Knookerdoodle and like all the little Knookerdoodles, he loves books, has a merry twinkle in his eye, and lives a happy life tucked away in the nooks of the tall trees of the Redwood Forest. Peanut has never gone on any adventures, entered the deep dark woods, or met any pirates. However, on this bright sunny morning when Chubby the chipmunk talks to a human, things will change for Peanut. Discover this tale of friendship and courage as Peanut and his friends jump to and fro and fall into their first adventure. This touching story of a boy and his friendship with a tree gives remarkable pictures of the cycles of life, and of death. All ages will find satisfaction in this tale of life’s changes and challenges and the power of a good friendship to encourage and sooth these changes and challenges. Readers will learn that Julia’s whimsical nickname doesn’t quite cover her lofty accomplishments. She is world-known as the young woman who climbed into a tree in 1997, to save it from being destroyed. She lived in that tree, named Luna, for over 700 days, ultimately succeeding in protecting Luna, and the trees within 200 feet of it. A Modern Tale about Bigfoot, a Legendary Animal of the Redwood Wilderness. A curious little bigfoot who believes people exist and a curious young littlefoot, who is a bigfoot believer, meet on a trail in the shadows of the redwood forest. The true story of a girl who lived in a tree to save the forest. Even super-heroes need a vacation, so where better than one of the world’s natural wonders, the great Redwood Forest But disaster has struck and the forest is under threat… can Michael Recycle and his new friends, the Tree Top Cops, save the day? This fantastic debut novel, full of clever stunts and pranks, shows the power of determined individuals, no matter what their age, to stand up to wrongdoing. And it introduces readers to a memorable cast of characters—smart kids who care about the world around them. A park ranger explains via a question and answer dialogue with two children how a sequoia tree grows, and it’s not because of the soil. She covers the science with help from the periodic table and some bright clear full page illustrations opposite the text. Describes the history of the California national park known for its large redwood trees. Natural Wonder series. Provides basic information about the redwood, including its structure, economic uses, and the pests and diseases that affect it. A subway trip is transformed when a young boy happens upon a book about redwood forests. As he reads the information unfolds, and with each new bit of knowledge, he travels–all the way to California to climb into the Redwood canopy. When fifteen-year-old Francie finds a note hidden in the stump of an old sequoia, she immediately recognizes her sister’s handwriting. But Carrie died in an accident six years ago. Could Carrie’s secret still be important? Focusing on one pair of murrelets and their newborn chick, the author reveals the hidden nest in the canopy of the old-growth forests and the secret life of these birds before their fledgling sets off for the sea. Creative Education’s “Images series invites readers to explore science in a whole new way. Fill your library with “Images that leave a lasting impression. The tallest known tree on earth is located in Redwood National Park in northern California. More than twelve hundred years old, it is approximately 380 feet tall–and still climbing! There’s a magical, wild world happening in the tallest of tall trees – a world teeming with life that very few people ever see! Come take a peek at the animals that make their home in a tall, tall redwood tree. Children will love the rhymes and count the critters from one to ten. Look out for the hidden animals, too! Lots of fun and lots of interesting science – including STEM activity suggestions. In this powerful tale, the contemporary struggle between loggers and environmentalists in the Pacific Northwest is interwoven with a fantastic story of an ancient and magical world discovered by a 13-year-old girl. “Fantasy mavens will find plenty here to enthrall them Follow the long life a redwood tree as this book takes you on a journey through history. When Bernie the bear and his other animal cohorts make a practice of extinguishing every fire that starts in the forest, they realize that the trees are choking out open meadows and not allowing berry bushes and other foods they depend on to grow. One day, an uncontrollable fire devastates the forest, and the animals mistakenly believe their world has ended. Soon, however, new growth provides them with a bounty of food, and they realize how important fire is to the health of the forest. The Giving Tree, a story of unforgettable perception, beautifully written and illustrated by the gifted and versatile Shel Silverstein, has been a classic favorite for generations. The elementary tale of the life cycle of a tree, from its beginnings as a sapling to its demise on the forest floor, where it decomposes and becomes “a home for rabbits, and food for flowers”, is also a life lesson for people. A wonderful fantasy written by Ethel Cook Eliot, first published in 1921. The illustrations include line drawings along with 5 color plates from Anne Anderson. Have you ever seen a tree as wide as a house? What about one taller than a skyscraper? Get ready to explore the gigantic trees in the Redwood Forests These amazing forests are located along the West Coast of the United States, from California to Oregon. With faeries, nymphs, a Forest Goddess, an Ancient Magician, and other colorful characters, we learn through the eyes of a young girl, why these last remaining forests should be saved, and about the senseless destruction already wrought upon them. In a little house, in a big city, there lived a very old man. He had watched the city grow up around him, seen towering skyscrapers and miles of asphalt swallow the woods and fields, parks and gardens, of his youth. The people who lived in the skyscrapers knew nothing of the old man — most didn’t even know each other. The world’s tallest trees come to life in a delightfully illustrated story that will enchant and teach children about life in the forest. This book helps explain the largest and most remarkable trees on earth, the California redwoods. The remarkable web of plants and animals living around a single old fir tree takes on a life of its own in this stunningly illustrated story. Carol Reed-Jones’ repetitive, cumulative verse–a poetic technique that children universally love–aptly portrays the amazing ways in which the inhabitants depend upon one another for survival. This colorful volume is a wonderful introduction to the story of the giant sequoia, the world’s largest tree. Tracing the life of one special sequoia that lived for over 2,000 years, it shows the stages of development of the tree in relation to important events in world history In Walk in the Woods students “accompany” a soil scientist named Asmeret as she walks through the woods. Students see the world through a soil scientist’s eyes as Asmeret searches for evidence of decomposition. A tour through California’s Redwood National Park, (complete with maps, legends, and detailed captions and factoids) introduces the park’s flora, fauna, topography, history, weather, and attractions. This is a story of the power of nature to transform every child. -Scientific research now confirms what we already know: We become more relaxed, more open and friendly, and more creative, with better memory and concentration, after being in nature. Traces the growth, from seed to maturity, of a 3500-year-old giant sequoia juxtaposing its development with a chronology of world events from the Trojan War to the present day Watch where you step! Sometimes the animals in Sequoia and Kings Canyon national parks are hard to find, but you can almost always find their poop! Come along with Michael, Emily, and their family as they find poop (scat) and footprints (tracks) and discover which animal made them! Get the scoop on poop! Sometimes the animals that live in the Redwoods are hard to find – but you can almost always find their poop! Come along with Emily, Michael, and their parents as they find poop (scat) and footprints (tracks) and discover which animal made them! Find out Who Pooped! Includes Field Identification Guide to common scat and tracks. Does Bigfoot exist? Join two teenage boys whose strange encounter with the mythical creature sends their entire family on a journey to solve the mystery. While a group of Bigfoot researchers probe the wilderness to prove the creature existence, others use the legend to protect thousands of privately owned forests. Could the legendary Bigfoot exist among the ancient redwoods and rugged terrain of California s Eel River Valley? Acclaimed photographer James Balog captures immense portraits of sequoias and redwoods as no human has ever viewed them-in thousands of tiny frames taken at eye-level as the photographer rappelled down neighboring trees. This handsome volume describes the origins, distribution, life history, ecology, and wildlife associated with coast redwood. Several generations of botanist and amateurs in China and America have recorded the three most famous species of Cupressaceae: Dawn Redwood, Giant Sequoia, and Coast Redwood in both languages with plenty of pictures. Beautifully written, beautifully illustrated, entertaining, and informative, Secrets of the Nest will captivate anyone with an interest in the natural world. The oldest trees of the Headwaters Forest pre-date Jesus Christ. For generations they have provided refuge, inspiration, and livelihood for creatures large and small. Enduring Giants is the epic story of the Giant Sequoia and the Big Trees of Calaveras. Text by Joseph H. Engbeck, Jr. ; color photography by Philip Hyde An account of two men and their lifelong quest to seek out and record, in all their majesty, contenders for the title of the earth’s largest living thing. The Last Stand is a compelling American saga of greed gone wild and a small town divided over a precious natural resource. What follows is a synthesis of the writings of others together with the results obtained from our field studies, begun in 1956. On December 18, 1999, Julia Butterfly Hill’s feet touched the ground for the first time in over two years, as she descended from “Luna,” a thousand-year-old redwood. This highly illustrated literary anthology provides a unique and complete view of the tree’s place in history and the imagination. The environmental “tipping point” we approach is more palpable each day, and people are seeing it in ways they can no longer ignore—we need only turn on the news to hear the litany of what is wrong around us. Conifers of California is the first book entirely devoted to the state’s native cone-bearing trees and shrubs. This book is a field guide to plants commonly found in the coast redwood forests. Part naturalist detective story, part environmental inquiry, this vibrant narrative celebrates the fascinating world of an endangered seabird that depends on the contested old-growth forests of the Pacific Northwest for its survival. The book contains outstanding photographs from 40 collections, ranging from family albums to institutional archives. Evidence is mounting that redwood forests, like many other ecosystems, cannot survive as small, isolated fragments in human-altered landscapes. Hidden away in foggy, uncharted rain forest valleys in Northern California are the largest and tallest organisms the world has ever sustained–the coast redwood trees, Sequoia sempervirens. A guide to the 20 largest species of conifers in North America – from the southern Sierras to Vancouver Island, and from the coast to northwestern Montana. This comprehensive guide is the first to focus on all the giant sequoia groves in the state of California, not just those that are well-known.
<urn:uuid:8ec5852b-0777-4156-8143-01147809e51d>
CC-MAIN-2020-16
https://www.savetheredwoods.org/learning-center/learn/reading-list/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371611051.77/warc/CC-MAIN-20200405213008-20200406003508-00355.warc.gz
en
0.94231
3,216
3.484375
3
What is biodiversity? The concept of biodiversity refers to the variety of life on three different levels: genetic diversity; species diversity; and ecosystem diversity. Genetic diversity refers to the amount of genetic variability between individuals of a given species. Genetic variability may cause differences in behaviour, appearance or physiology that make some individuals of a species less susceptible to a disturbance. Therefore, high levels of genetic variability buffer species against environmental change by increasing the likelihood that at least some individuals will survive. Different populations of species must be protected to conserve genetic diversity. Species diversityp takes into account the number of different species (e.g. the species richness) and the ‘evenness’ (or equitability) with which the different species are distributed. For example, in two hypothetical communities, each with 100 individuals made up of two species (A and B), a community with 50 individuals of species A and 50 individuals of species B is more diverse than a community with 99 individuals of species A and 1 individual of species B. Ecosystem diversity refers to the variety of different ecosystems. An ecosystem consists of communities of organisms interacting with each other, and with the physical and chemical features of the environment. The biodiversity of estuaries may be affected by a variety of factors including size of the estuary, nutrient supply and retention, the complexity of water circulation, the variety and extent of sediment types on the bottom, the range of habitats available and tidal range. As estuaries receive freshwater inflows from land as well as saline waters from the sea, there are few species that are well adapted to cope with all the habitats present in an estuary. The minimum number of species occurs wherever the variation in water salinity is greatest. Species which inhabit the seafloor (benthic forms) are largely controlled by the nature of sea floor sediment present (mud, silt, sand, gravel, rock) and the dissolved oxygen status of bottom waters. As estuaries receive nutrients from land drainage they may have high levels of productivity and hence increased biodiversity. Where nutrient loads are periodically increased or remain excessive, an increase in biomass and reduction in biodiversity may take place. This results in proliferation in lower levels of the food chain and a reduction in higher levels, thus decreasing overall species diversity while some lower forms proliferate in number. Biodiversity levels in estuaries are a sensitive measure of their health and balance. Their proximity to human settlements make them particularly vulnerable to the impacts of vegetation clearing in adjacent catchments, urban runoff and the influx of stormwater and wastewater. Each of these flows may contain excessive nutrient loadings that may trigger changes in the distribution and structure of estuarine communities, usually by reducing their complexity. The densities of animals may be very high in some parts of an estuary e.g. oysters and other encrusting animals at the intertidal zone. This reflects the adaptation of these creatures to a specific habitat and not necessarily the overall level of biodiversity. If weed growth proliferated in place of the oysters or other growths it may be indicative of excessive nutrient levels unsuited to oyster habitation and hence a reduction in biodiversity. Why is it important to conserve Australia’s biodiversity? There are several arguments for conserving biodiversity and they involve one of more ethical, aesthetic, utilitarian and economic reasons, including maintenance of fundamental biological processes. Significant reasons for conserving estuarine biodiversity in Australia include: - maintaining the health and wellbeing of our waterways; - ensuring that valuable nutrients are retained an recycled for maximum biological use; and - improving the level of natural biological filtration at the land/sea interface. - Biodiversity can also enhance the value of international tourism to Australia’s economy. Our unique and fascinating native plants and animals and the natural Australian landscape play a central role in attracting tourist dollars from other countries. Another economic argument is the potential for plants and animals to provide us with useful compounds and chemicals for medicinal purposes, commercial sources of food and fibre. It has also been suggested that the conservation of biodiversity need no justification or human benefit, and that humans have no right to cause the extinction of any other species. Another argument is that we don’t know what the environmental repercussions are of losing elements of biodiversity. What happens if we change biodiversity? Biodiversity reflects both the variety of species as well as their interactions between them. Hence, any impacts upon some part of the connected web of species will impact upon the remainder. In estuaries, such impacts may comprise loss of habitat due to the spread of human settlement or activities, excessive exploitation of some species for food or recreation and the flow of high nutrient loads as a direct, or indirect, consequence of human activities. As a simple analogy, imagine a large pyramid shaped pile of oranges just like you see at the fruit markets. Each orange represents a species. The one on top relies on all the other oranges below in order to stay in place (or, for the purposes of our analogy, in order to survive). If you were able to magically remove a particular orange from the middle of the pile what effect would it have? Which other oranges would topple down? It’s very hard to know – until after you remove the orange, after the species has gone and the effects have been felt. You can’t put the orange back after the pyramid has been destroyed. The take home message is the importance of any one species is very hard to know until it is lost. Human actives that can change biodiversity Any disturbance that changes critical habitat areas or species numbers has the potential to alter biodiversity. Such disturbances may include or be associated with habitat modification or destruction, excessive use and predation for recreation or food, habitat destruction and fragmentation, wastewater disposal, oxygen depletion and accumulation of human wastes and compounds. It is worth mentioning however, that the Intermediate Disturbance Hypothesis proposes that biodiversity is highest when disturbance is neither too frequent nor too rare1, implying that low levels of diversity can be a natural state. This is true for example, in the near-pristine estuaries located on the west coast of Tasmania23. These estuaries have low numbers of species due to a paucity of food23. The concept of surrogacy There is no practical way of measuring Australia’s actual biodiversity. To do this would mean classifying and counting every single organism. This is simply impossible with current resources. Australia’s biodiversity can only be estimated using easily measurable factors that have known and predicable associations with the biota. Such surrogates can be other organisms (biotic) or part of the physical environment (abiotic). Because many abiotic factors are relatively easy to measure (especially spatially), there have been many studies that have linked the spatial abundance and distribution of organisms to these factors, and a distinct set of surrogates is beginning to emerge. For example, in terrestrial ecology latitude, altitude, rainfall, slope and rock type can be used to reliably predict which of 20-30 vegetation types (i.e., grassland, tundra, etc) is likely to occur at any site4. From this we can then predict other organisms that are expected to occur at these sites based on their known associations with that environment. Much less is known about Australia’s marine environment (especially the deep ocean) and a simple set of surrogates does not yet exist. Although the influence of several abiotic variables (e.g., latitude, depth, current speed, substrate type, seabed hardness, rugosity) on seabed marine biodiversity is clear and well documented567. Further research is being undertaken to derive a simple set of surrogates that can be used to estimate Australia’s marine biodiversity8. A comprehensive suite of indicators (pressures on biodiversity, condition of biodiversity and responses to pressures on biodiversity and condition of biodiversity) were developed as part of biodiversity theme for national State of the Environment reporting. - a reduction in the areas of seagrasses, mangroves, salt marshes, intertidal mudflat/sand flats and beaches and dunes. Table 1 in the Habitat Variability Index fact sheet shows that mangroves and saltmarshes should occur in tide-dominated coastal waterways ( e.g. tide-dominated deltas, tide-dominated estuaries, and tidal creeks). The absence of mangroves and salt marshes from these waterway types signifies a major disturbance and a probable loss of biodiversity; - increased frequency of fish kills, algal blooms, or anoxic & hypoxic events; - a reduction in the diversity of benthic invertebrates, intertidal invertebrates or fish assemblages; - water column pH values <6 or >~9; - water column turbidity, chlorophyll a, toxicant or heavy metal levels in excess of ANZECC/ARMCANZ trigger values; - sediment heavy metal or toxicant levels in excess of ANZECC/ARMCANZ trigger values; - widely fluctuating diurnal ranges of pH or dissolved oxygen; - widely fluctuating seasonal ranges of pH, dissolved oxygen and salinity; and - denitrification efficiencies lower then 57%, benthic carbon dioxide fluxes in excess of 12 mmol m -2 d -1 or sediment TOC:TS ratios < 5. For more information of biodiversity consult the Biodiversity website at the Department of Environment, Water, Heritage and the Arts. Some important links with biodiversity content can also be found at the BiologyBrowser web site. More information on biota removal/disturbance Donna Hazell, Center for Resource and Environmental Studies, Australian National University Ian Lavering, Geoscience Australia Andrew Heap, Geoscience Australia - Connell, J.H. 1978. Diversity in tropical rain forests and coral reefs. Science 199, 1302-1310. - Edgar, G.J., Barrett, N.S., and Last, P.R. 1999b. The distribution of macroinvertebrates and fishes in Tasmanian estuaries. Journal of Biogeography 26, 1169-1189. - Edgar, G.J. and Barrett, N.S. 2002. Benthic macrofauna in Tasmanian estuaries: scales of distribution and relationships with environmental variables. Journal of Experimental Biology and Ecology 270, 1-24. - Longhurst, A.R. 1998. Ecological Geography of the Sea. Elsevier, NY. 398pp. - Anderson, T.J. and Yoklavich, M.M. 2007. Multiscale habitat associations of deepwater demersal fishes off central California. Fisheries Bulletin 105, 168-179. - Snelgrove, P.V.R. and Butman, C.A.. 1994. Animal-sediment relationships revisited: cause versus effect. Oceanography and Marine Biology: An annual review 32, 111-177. - Williams, A. and Bax, N. 2001. Delineating fish-habitat associations for spatially-based management: and example from the south-eastern Australian continental shelf. Marine and Freshwater Research 52, 513-536. - Post, A.L., Wassenberg, T.J. and Passlow, V. 2006. Physical surrogates for macrofaunal distributions and abundance in a tropical gulf. Marine and Freshwater Research 57, 469-483.
<urn:uuid:2c046131-67f9-4ebd-853d-17f24e5e939b>
CC-MAIN-2020-16
https://ozcoasts.org.au/indicators/coastal-issues/declining_biodiversity/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371896913.98/warc/CC-MAIN-20200410110538-20200410141038-00313.warc.gz
en
0.896967
2,383
4.21875
4
Reading Time: 10 minutes Pink eye is the common term given for the condition, conjunctivitis. It is the infection or inflammation affecting the conjunctiva. When the conjunctiva becomes inflamed, the small blood vessels in your eyes become more visible. So, it causes your whites of the eyes to appear pinkish or reddish in color. Some form of the disease is contagious. So, the condition can spread from one person to another. The infection affects people of all ages. But, it is more prevalent among children of the school. Read ahead to know more about the condition in detail. It will help you take the necessary precautions and other remedies to deal with the problem. What Is Pink Eye? Pink eye causes the inflammation of the thin, transparent membrane of your eye known as the conjunctiva. It lines your eyelid as well as covers the entire white part of your eyeball. So, the inflammation can make the small blood vessels in the region more pronounced. It makes the eyes look pink or red in color. Conjunctivitis does not affect your vision, but it can cause irritation. You can opt for some steps to ease the discomfort associated with the eye problem. Diagnosing the problem early can help you get treatments to limit its spread. Causes Of Pink Eye Several issues can trigger conjunctivitis. The different reasons leading to the inflammation of the conjunctiva are: - Allergic reaction to dust, pollen or smoke - Foreign objects in your eye causing irritation - A blocked tear duct in newborns Types Of Pink Eye Depending on the underlying cause, you can distinguish the problem into three different types. The contagious nature of the problem depends on the root cause of the pink eye. So, the different types are: Viral And Bacterial Conjunctivitis The virus or bacteria attacking your body can cause conjunctivitis. You can suffer from a common cold or respiratory infection. It can lead to the inflammation of the conjunctiva. At times, using an uncleaned contact lens can also result in bacterial conjunctivitis. Both forms of conjunctivitis can spread easily from one person to another. It can spread with direct or indirect contact of the liquid coming from the infected person’s eyes. The highly contagious problem can affect one or both eyes. As the name suggests, any allergic reaction in your body can trigger the inflammation. It affects both the eyes. It is your body’s response to the allergens that attacks your body. In most cases, pollen, smoke, dust, etc. can trigger such reactions. To counteract the allergens, your body produces an antibody. The antibody known as immunoglobulin E (IgE) can trigger mast cells. The mast cells are the special cells in the airways as well as the lining of the eyes. So, the mast cells can release inflammatory substances, which also includes histamines. When the body produces histamines, you can see different signs or symptoms associated with it. The problem can result in intense itching, pink eye, sneezing, nasal discharge, etc. Conjunctivitis Due To Irritation The irritation from a foreign object or chemical splash in your eyes can cause conjunctivitis. You need to flush out the foreign object or chemical completely from the eyes to get rid of it. So, you can reduce the redness and irritation due to the problem by just flushing your eyes. The problem accompanies with other symptoms like mucus discharge and watery eyes. It can clear up after some hours or within a day. In some cases, the flushing may not remove the chemical or foreign objects. Then, it can cause permanent damage to your eyes. So, you need to see your doctor as soon as possible. The presence of the foreign object in your eyes can make you scratch your eyes. So, it can cause damage to the eyes as the foreign object can scratch the cornea. Symptoms Of Pink Eye The symptoms of the pink eye depend on the type of inflammation. So, you can suffer from the following issue: - Redness in one eye or sometimes both eyes - Swollen conjunctiva - More Tears - Itchiness in eyes - Thick yellow discharge in one or both eyes that crusts over the eyelashes during the night. It makes the eyelids closed when you try to open your eyes in the morning. - Burning sensation in your eyes - White/green discharge of eyes - Gritty feeling in your eyes - Sensitivity to light - Swollen lymph nodes occurring due to viral infection - Blurred vision When Should You See A Doctor For Pink Eye The mild cases of the problem need no medical attention. It mostly goes away on its own after some time. But, some serious conditions can alter the color of your eyes. You will also experience severe discomfort associated with the problem. So, go to a doctor immediately when you observe the following conditions: The signs indicate that the underlying cause triggering the pink eye is more serious. So, you need medical attention, it is also necessary for people who wear contacts to maintain caution. It is better to stop wearing the contact lens when you first notice the signs of conjunctivitis. If it does not get better within 12 to 24 hours, then you need to make an appointment with your eye doctor. With the expert suggestions and treatment, you can prevent the problem from escalating. Risk Factors Associated With Pink Eye Not everyone gets affected by conjunctivitis. Only people who get exposed to the following can suffer from the issue more compared to others: - Your exposure to something that can trigger an allergic reaction in your body - Exposing yourself to people who are infected with the bacterial or viral form of conjunctivitis - Use contact lens regularly, especially those who use extended wear contact lens Complications Due To Pink Eye Pink eye that has serious signs and symptoms needs immediate care attention. In both adults as well as children, conjunctivitis can cause inflammation of the cornea. If left untreated, then the problem can affect your vision adversely. Therefore, when you experience the following signs, get help immediately: - Severe eye pain - Foreign body sensation in your eyes - Problems with vision - Becoming sensitive to light The above-mentioned issues indicate something more serious. Therefore, getting medical help immediately can avoid any further complications. Diagnosis Of Pink Eye When you feel severe discomfort or trouble keeping up with the normal day-to-day activities due to conjunctivitis, you need to see a doctor. The doctor can use the following diagnostic approaches to detect the issue precisely. In most cases, the doctor can detect the problem with the physical assessment. The doctor asks you questions regarding your health history and the symptoms you suffer. In most cases, it helps your doctor determine the cause of conjunctivitis. The root issue of the problem is necessary to cure the problem. Therefore, the doctor collects the information to determine the type of conjunctivitis you suffer. Generally, the issue can cause eye redness and/or swelling. But, depending on the cause, you can also see other signs. It helps your doctor come to a proper conclusion. Eye Discharge Culture In some rare cases, your doctor may find it difficult to detect the type of conjunctivitis. It is due to the similarity of the symptoms. In such cases, your doctor can take the sample of your eye discharge for testing. The liquid that drains from your eye is collected on a cotton swab. It is then sent to a lab for further analysis. The doctor orders a culture to detect the actual cause of the problem. So, the test can reveal the actual cause of triggering the pink eye. Treatment For Pink Eye Depending on the type of problem triggering the pink eye, you need treatment. Therefore, your doctor first determines the actual cause of your conjunctivitis. So, the doctor can suggest the following treatment. Conjunctivitis Due To Viruses It is the type of conjunctivitis caused by the common cold. So, just like the common cold, the redness in the eyes can go away after it runs its course. You have to suffer the problem for four to seven days. But, during the time, you need to take necessary precaution to stop its spreading. The problem is contagious in nature. Therefore, your doctor can suggest some home remedies to reduce the discomfort. Try to maintain good hygiene to prevent the escalation of the problem. Bacteria Triggered Conjunctivitis If bacteria are the culprit behind the pink eye, then your doctor can suggest antibiotics for relief. The antibiotic medication is available in different forms like: Apply the eye drops at least three to four times a day for a minimum of five to seven days to see results, It works just like the eye drops. But, you need to apply it to the inside of the eyelid. Try to apply it for 3 to 4 times daily. The normal course of the medication ranges from 5 to 7 days. You need to take the pills as suggested by the doctor. The infection may subside after seven days. Remember to continue using the medication even after you see improvement. You need to complete the course of medication as suggested by your doctor. Irritants Causing Conjunctivitis You need to clear the irritant out of your eyes to avoid pink eye. Use water for at least five minutes to clear the substance from your eyes. If properly removed, you can get back to normal after four hours. But, for serious irritants like acid or other alkaline materials you need to visit the emergency room right away. You can flush the chemical irritant only with medical help right away. Therefore, get medical attention as quickly as possible. Conjunctivitis Caused By Allergies Some allergens can trigger reactions in your body, including pink eye. In such cases, you can overcome the problem by getting treatment for the allergies. Your doctor can prescribe antihistamines in drops or pill form to overcome the allergic reaction. It is better to take eye drops if you have dry eyes as the pills can make your eyes drier. Try to understand the allergies you have and keep away from them. It is always better to seek a doctor immediately when you suspect conjunctivitis occurs due to allergies. Your doctor suggests frequent monitoring of your eyes. It ensures you conjunctivitis is improving with the medication provided. Therefore, return to your doctor for follow-up checkups to evaluate your progress. Home Remedies To Cure Pink Eye Apart from the suggestion offered by your doctor, you can also adopt some home remedies. It can help you cope with the symptoms until the pink or red color goes away from your eyes. Therefore, follow the methods suggested below to get relief from the discomfort associated with the problem: You can apply a warm compress to your eyes. You can make the compress at home by soaking a lint-free cloth in warm or cold water. Make sure it is clean before using it. You can wring the water before applying on your closed eyelids. The cold compress can offer you relief from the itching or other signs associated with the problem. But, a warm compress can also prove effective in offering your relief. If you have conjunctivitis on just one eye, then never touch the other eye with the same cloth. Avoiding such actions can prevent the infection from spreading. Use Eye Drops If you severe itching or feeling of some foreign object in your eyes, then you can use eye drops knows as artificial tears. The over-the-counter eye drops can relieve the symptoms associated with the pink eye. The eye drops contain antihistamines or other medications to offer relief to people suffering from allergic conjunctivitis. It also lubricated the eyes and promotes healing of the inflammation. Avoid Wearing Contact Lenses Do you wear contact lens? Then, try to avoid it until your eyes heal completely. The contact lens use while having conjunctivitis can worsen the condition as the bacteria remains in your lens. Therefore, your eyes may not heal properly. Try to go without contact lens till your inflammation subsides. Talk to your doctor about the type of conjunctivitis you suffer. You also need to ask about using the contact lens again. If you do not use the disposable lens, then clean them thoroughly before using it again. Preventing Pink Eye The problem also referred to as conjunctivitis can spread from one person to another easily. Therefore, you need to take steps to avoid getting and spreading the highly contagious disease. The following steps can help you in the quest: Keep Your Hands Clean You need to keep your hands clean. The virus or bacteria can spread to other parts of the body through your hands. Therefore, wash your hands often. Never touch your eyes with your hands as it can spread the infection. So, keep your hands off the infected eye. Wash Clothes And Towels The virus or bacteria can enter your body through the nose and mouth. Therefore, you need to use a clean towel or washcloth every day. Change the pillowcases, bath towels, and handkerchief. You must never share your cosmetics, especially your eye cosmetics. It can spread the infection from one person to another. Therefore, do not part with your mascara, eyeliner, or eye pencil. You must also avoid sharing your contact lens as it can spread the bacteria or virus. Using the eye drops of others can also spread the problem. Try not to use the drops applied to your infected eye in the uninfected eye. The pink eye is more contagious compared to the common cold. Therefore, it can spread to others easily. It is better to take time off from school or work to prevent the spreading of the infection. You need to maintain good hygiene while recuperating. Protect Your Eyes When you go outside, protect your eyes. Therefore, use a sunglass to keep away the dirt, pollutant, and foreign particles from entering your eyes. Preventing Conjunctivitis In Newborns While giving birth, a mother’s birth canal exposes the newborn to bacteria. So, a child becomes susceptible to pink eye. But, the bacteria may cause no issue to the mother. The bacteria affects only the child. It can escalate into a serious form of conjunctivitis. The problem also referred to as ophthalmia neonatorum needs immediate medical treatment. Else, the child can suffer from vision loss. To avoid such issues, an antibiotic ointment is applied to the eyes of the newborn. Therefore, the ointment prevents the infection. The pink eye with mild symptoms can clear on its own with just the home remedies. You can find relief within a few days with good care. Remember to maintain good hygiene to clear the issue easily. But, you need to see a doctor if you have severe symptoms or the problem lasts for weeks. It requires immediate treatment to prevent long-lasting problems. It can scar your cornea or result in loss of vision. Therefore, seek medical advice to get proper treatment and prevent adverse effects. With prompt action and good care, you can handle the problem well.View Article Sources
<urn:uuid:38039409-3fa3-4428-bb44-701754096384>
CC-MAIN-2020-16
https://www.healthadvicer.com/pink-eye.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371818008.97/warc/CC-MAIN-20200408135412-20200408165912-00154.warc.gz
en
0.922342
3,162
4.28125
4
Episode 12: Everyone knows that Jesus had twelve disciples but many would be surprised to find out that the institution of discipleship existed centuries before the time of the apostles. In episode twelve viewers will gain a better understanding of what it means to be a disciple from the understanding of Judaism in the days of Messiah. Jesus tells us that “Every disciple fully trained will become like his teacher.” Indeed, to be a Christian means to be a disciple of Jesus, a student responsible for learning and becoming like one’s rabbi. The Lesson: The Mystery of the Meaning of Discipleship Whenever we consider being disciples of Christ, most of us in the church probably think that means being believers in Jesus. However, according to First Fruits of Zion (FFOZ) teacher and author Toby Janicki, it’s really much more. But how much more? What does it really mean to be a disciple of Jesus? Toby first spends a lot of time in this episode showing the audience what discipleship meant in Judaism in the late Second Temple period; during the earthly lifetime of Jesus: The disciples of Yochanan and the disciples of the Prushim would often fast, and they came and said to him, “Why do the disciples of Yochanan and the disciples of the Prushim fast, but your disciples do not fast?” –Mark 2:18 (DHE Gospels) Here we see that not only did Jesus have disciples but that John the Baptist and the Pharisees had disciples. In fact, all of the teachers or Rabbis in all of the streams of Judaism in that day had disciples. But we still need to understand what it is to be a disciple in general and a disciple of Jesus of Nazareth in particular. To me, a lot of the information presented about discipleship wasn’t a great revelation since I’ve been exposed to it before, but it may be that some Christians believe only Jesus had disciples and that he only had twelve of them. This, of course, is not correct: After this the Lord appointed seventy-two others and sent them on ahead of him, two by two, into every town and place where he himself was about to go. –Luke 1:10 (ESV) While some translations say that seventy were sent out and others say seventy-two, Toby says that from the context in the rest of this chapter, those sent out were also disciples of Jesus. This illustrates how common disciples were in that day and age. He also cites Acts 9:36 to illustrate that women were disciples, Acts 6:1 and 6:7 to illustrate how there were many, many disciples, and Acts 11:26 to show that there were both Jewish and Gentile disciples of Jesus. According to Toby, the word “Christian” is used only three times in the Bible, but the words “disciple” and “disciples” relating to followers and students of Jesus were used many times. Perhaps it’s more accurate to call ourselves disciples of Christ rather than Christians. But then again, that would depend on the meaning of disciples and discipleship. Which brings us to our first clue: Clue 1: All early believers of Jesus were called disciples. But going back to the question I just asked and the question Toby repeatedly asks, we need to understand how Christ’s original Jewish audience and the first Jewish readers of the Gospels would have understood discipleship. To get the answer, we turn to FFOZ teacher and translator Aaron Eby in Israel. Aaron provides a great deal of background information on early Jewish discipleship including the fact that discipleship predates Jesus by quite a bit. Discipleship was considered the primary method of higher Jewish education, but it wasn’t just a matter of going to school and studying different subjects. A disciple was a student but specifically, a student of a Torah teacher. In the days of Jesus and before, when a young man thought he wanted a life of Torah learning, he would apprentice himself to a Torah master, however, this apprenticeship might not be what you imagine. A disciple was to be a learner/imitator. He would memorize all of his Master’s teachings, learn to imitate his Master’s style of dress, mannerisms, inflections of speech. The disciple in some ways considered himself a servant or even a slave to his Rabbi, his “great one.” In some ways, he thought of himself as a son to a Father, but the Rabbi was considered greater than the disciple’s biological Father. Disciples were tremendously devoted to their Masters, more so than to their own families or even their own lives. And so it was with the disciples of Jesus, their Master and ours. Back in the studio, Toby describes the concept of discipleship as a job description. A pupil is not above his teacher; but everyone, after he has been fully trained, will be like his teacher. –Luke 6:40 (NASB) That the disciples of Jesus were imitators of their Master and memorized his teachings is the reason why we have the Gospels today. Be imitators of me, just as I also am of Christ. –1 Corinthians 11:1 (NASB) Here we see that Paul considered himself a disciple of Christ as his imitator, and he suggests to the readers of his letter that they should imitate Paul. Were they then Paul’s disciples? I’ll answer that in a bit, but we have arrived at our second clue: Clue 2: The primary job of a disciple was to be like his teacher. Even the Pirkei Avot or “Ethics of our Fathers,” a set of Jewish teachings that predated Jesus says, “Raise many disciples.” A Rabbi’s job was to create a new generation of disciples who would learn everything from the Rabbi and about the Rabbi and then, when they were fully trained, the disciples would become Rabbi’s themselves, raising up their own generation of disciples in order to preserve the Torah teaching and wisdom of their own Master. This process would be repeated from one generation to the next with the goal of creating an unbroken line of discipleship, generation by generation, that would preserve the teachings of Torah for each Teacher, often by establishing great schools such as the Houses of Study of Shammai and Hillel. This maps well to Matthew 28:19-20 where Rabbi Yeshua instructed his Jewish disciples to raise up a generation of disciples from the people of the nations, which the Church often refers to as “the great commission.” However, as we’ve seen, the idea of “the great commission” hardly does justice to what Jesus was actually commanding. Now we have arrived at the third and final clue: Clue 3: The job of a disciple was to raise up more disciples. But here Toby introduces a strong caveat: But do not be called Rabbi; for One is your Teacher, and you are all brothers. Do not call anyone on earth your father; for One is your Father, He who is in heaven. Do not be called leaders; for One is your Leader, that is, Christ. But the greatest among you shall be your servant. Whoever exalts himself shall be humbled; and whoever humbles himself shall be exalted. –Matthew 23:8-12 (NASB) This set of verses has often been misunderstood or just not understood at all. Does this mean we shouldn’t have respect for our Bible teachers and Pastors? Here’s where having a Jewish perspective on the New Testament comes in especially handy. According to Toby, this is Jesus defining the difference between the relationship of Jewish disciples to the Sages and disciples of Jesus, our Master, to himself. Remember, the purpose of discipleship was to learn all there was to learn from your Master and then to establish your own House of Study in your name passing on what you originally learned. Your disciples would be taught in your name, not in the name of your own Master, and your disciples would teach in their own names, not in yours (actually it was more like, “I teach you in the name of my Master, who taught in the name of his Master,” and so on). Jesus said his disciples would be different. Each Torah Master would eventually age and die, but his teachings would be preserved in his disciples and in each generation of disciples that followed. Jesus is alive! We hear this enthusiastically declared every Easter or Resurrection Day in Church. James, Peter, and Paul were not to set up their own houses of study and teach in their own names by making their own disciples (in spite of what we saw relative to Paul in 1 Corinthians 11:1). They were not to raise up disciples for themselves but instead, they were and we are to raise up disciples for our Master, our one and only Master, Jesus the Messiah, Yeshua HaMashiach. What Did I Learn? I learned the meaning behind Matthew 23:8-12 which I tended to ignore in the past because I couldn’t figure it out. It makes a lot of sense now. I used to think that we inherited a broken system of discipleship since the teachings of Jesus were never transmitted generation to generation in the manner we have seen described in this FFOZ TV episode. Now I realize that it was by design, since we were never intended to be the students of any Master except Jesus. He is our only teacher, our only Torah Master. This does not mean we shouldn’t respect any Bible teacher or Pastor in our Church, but we must always remember that none of them take the place of Jesus. If we see a group of believers who esteem their Pastor or spiritual leader as anything approaching our true Master, then there is something wrong (and sadly, such situations make an appearance the news media from time to time, usually as scandals involving some highly public and popular religious leader). I also thought of some questions as I was watching this episode and in fact, I was reminded of some of the narratives of Toby from other episodes that involve how he commonly introduces himself. He says that he isn’t Jewish but rather a Gentile who practices Messianic Judaism. It isn’t always apparent, but he usually wears a kippah while on camera (A kippah is a head covering typically worn by religious Jews either just in synagogue or during their waking hours, depending on their level of observance). What is the difference between being a Gentile who practices Messianic Judaism and a Gentile who practices Christianity? More importantly, how do these two “states” relate to being a disciple of Christ, our Master? Since this television show was created to present the Gospels and Jesus Christ to a more traditional Christian audience by introducing a more Jewish perspective and interpretation, what does that say about the level of discipleship and imitation of our Master relative to “Messianic Gentiles” and Christians? This question is especially important to me, since it factors into how I think of myself as a disciple of the Master by calling myself a Christian and attending Church. One of the motivations for me to return to Church after an absence of many years was the book Tent of David: Healing the Vision of the Messianic Gentile written by FFOZ president and founder Boaz Michael. Have I become a better imitator of my Master by following this template of church attendance and Christian affiliation or a worse one? At some point in the near future, as the one year anniversary of my returning to Church comes near, I plan to write one or more “meditations” on the application of Boaz’s Tent of David in my life and the results I see so far. Closely related to this situation, Toby also didn’t drill down into something that I think it’s vital to know. When we say that a disciple of Christ is an imitator or Christ, just exactly what are we imitating? This isn’t an idle question. Many in the Hebrew Roots movement insist that discipleship means imitating the Jewish Jesus in every aspect of his Judaism, including wearing kippot (plural of kippah) and tallitot (plural of tallit) and to otherwise look and act in a manner identical to modern religious Jews (in spite of the fact that Jesus isn’t a “modern religious Jew,” but rather, he was an ancient Jewish Rabbi and he is the Jewish Messiah King). The clue that may lead to an answer was provided at the end of this episode by Boaz Michael who appeared on camera and said that next week (episode 13), the topic would be how the Torah is the foundation of Messiah Yeshua’s instructions to his disciples. How can the Torah be applied to both the Jewish and Gentile disciples of our Master? I’m hoping my review next week will help answer these questions.
<urn:uuid:f5f90561-5e89-4b47-80dd-98e60306ea3a>
CC-MAIN-2020-16
https://mymorningmeditations.com/2013/09/25/ffoz-tv-review-raising-disciples/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00075.warc.gz
en
0.981724
2,723
2.75
3
One can earn money in two ways; one is agriculture and the other companies. If the company is not made in accordance with ethics will always be inflation and shortages of goods. As it can be seen in the case of many commodities like wheat, sugar etc. It is because of the stocking, speculation and selfishness of some businessmen. The government has also become a trader itself, but has stopped Sharia Islamic government out of business. As it can be seen that the business is an important part of life, the Prophet Muhammad (PBUH) said: “People get 9/10 bread for their business.” Islam explains the concept of just trade by saying ethics. If business or other thing is done against morality and religion, this will lead to bad on the day of resurrection. Also by law, the guilty of illegal business would not end anywhere. Islam emphasizes the importance of business ethics lot. Allah says in the Qur’an, “they say to buy is also interested but Allah has described the purchase as permissible and interest as forbidden.” And “When you buy or sell then do some witnesses of it.” The Holy Prophet Muhammad (PBUH) said, “If the store was not there it would become a burden to others.” He also said that “A trader is the patron of average daily bread and fed the dignity of oneself and others.” The Holy Prophet Muhammad (PBUH) urged trust worthy merchants in these words, “A reliable and honest merchant should be with the prophets and truthful and the martyrs and the righteous.” “God shows mercy to a person who is well when he sells, when he buys and when he makes a claim” The Prophet emphasized truthfulness and justice businessman lot. He said, “Truly, traders rise sinners on the day of resurrection, but he who fears God and is good, and speaks the truth.” Business and ethics As Muslims, we must follow the Code of Conduct, not only in business but also in all aspects of life. Both business and ethics are interrelated. There is reference to this in the Qur’an, “for you in the Messenger of Allah is a fine example to follow.” Allah Almighty says: “For Mady people (we sent) Shu’aib, one of their brothers, he said:” My people Worship Allah, you have no other God but God and do not give short measure or weight! … I see you in prosperity, but I fear for you the punishment today as a compass (you) all the rounds and my people give just measure and weight, nor keep from people, which must:.! do not commit evil in the land with intent to do mischief. It is made up Allah is best for you, if you (but) believed! But I am not set over you to keep watch! “ Prophet Muhammad was chosen by God to be the last prophet and his messenger at the age of 40. Before that he was very much involved in the business. He and his wife Khadija were both traders. It is reported that he traveled to Syria, Yemen, Bahrain, and many other places in Arabia for business. Some historians have also pointed out that he traveled probably to Iraq and Ethiopia. From a young age he was involved in business. He had a good reputation as a hardworking, honest, truthful, and a very successful businessman. Fair business relations Holy Quran and Prophet Mohammad (PBUH) have made it clear that a Muslim must be honest and upright in his business and policy deal. Also true Muslim should keep their word and fulfill their promises, avoid fraud and avoid fraud and perfidy, not encroach on the rights of others, nor engage in unlawful proceedings. Also good Muslim not bear false witness, and abstains from illegally received funds from usury and graft. According to Islam who is not free from these vices, is not a true believer but Renegade worthless transgressor. And the Quran is rich with verses that confirm this. Allah says in the Quran, “Eat not up assets unjustly and dishonestly each other.” Allah forbids all unclean and corrupt means of making money, such as unfair trade, gambling and bribery. And the Holy Quran has explained and described the practice in many verses of his. He says, “Woe to those that deal in fraud, – those who, when they have to receive Measure from men, exact full measure, but when they have to give by measure or weight to men, give less than due, they do. do not think they will be asked Mighty day when (all) mankind stand before the Lord of lords. “ Another example can be found in the coming verse, where Allah urges Muslims to be very specific about trust their rights and the rights of others. “Allah invites you to make back your confidence, that they are due.” Major principles of fair activity According to Islam, the following points must be avoided to start fair trade. 1. No fraud or deceit, the Prophet (PBUH) is reported to have said, “When the sale is held, say, there’s no cheat” 2. Sellers must avoid making too many oaths when selling products. The Prophet (PBUH) is reported to have said, “Be careful of excessive oaths in a sale. Though it finds markets, it reduces a lot.” 3. Agreement is needed. The Prophet (PBUH) is reported to have said, “The sale is completed when the two involved depart with mutual agreement.” 4. Be strict in terms of weight and dimensions. The Prophet (PBUH) said: “When people cheat in weight and measures, provision of cut off from them.” He said the owners of measures and weights, “You have been entrusted with the affairs over which some nations before you did.” 5. The Prophet (PBUH) forbade monopoly. “He monopolizes is a sinner.” 6. Free enterprise, the price of commodities should not be fixed unless there is a situation of crisis or extreme necessity. 7. Hoarding merchandise to increase prices is prohibited. 8. Trading in the forbidden (Haram) items, such as intoxicants is prohibited. Fraud and dishonesty in business Prophet Muhammad (PBUH) has stressed the importance of honesty in most of his sermons and said, “Remember, there is no faith in him is not reliable ,. there is no place for him in the belief that cares not pledged his word or promise He (PBUH) also said, “The signs of a hypocrite are three, when he speaks, he is false, as he promises, not him; and when he is trusted, he plays false. “ condemn those who cheat in business Prophet Mohammad (PBUH) has said:” Whoever cheats is not of us. Speaking and fraud are things that lead one to hell. “ When Muhammad (PBUH) was the heap of grain on the market Madinah and put her hand. His fingers felt damp. On being asked, the trader said that rain had fallen on it. The Prophet (PBUH) observed:” Why did not you then keep (wet section) it on dry grain, so that people can see it? He who deceives is not one of us. “ Thus, traders who deceive by showing customers a false sample or by concealing the defects in the products they are selling are not true Muslims in the court of Allah the Prophet (PBUH) and they are going to end in hell. Prophet Muhammad (PBUH) said, “The seller must provide the buyer defects, if any, in the quality of the article offered for sale. Should this not be, the seller will be permanently caught in the wrath of Allah. “ In short, all kinds of fraud and dishonesty in business is prohibited in Islam. The Holy Prophet has expressed strong dislike him for those who do. Bribery in business Fines and usury, however, could be pursued by mutual consent and agreement, are absolutely prohibited and forbidden. Those who are guilty of them have been condemned Allah and Prophet (PBUH). Prophet Muhammad (PBUH) said, “The curse of Allah upon him, that offers loans at usurious terms, and him who receives, and those who are witness to it, and the writer who wrote the piece in place. “ Prophet Muhammad (PBUH) said,” If you made a suggestion for all the just way and happy party gave him something as a gift (in return for it) and he took it, he committed a serious mistake ( which means that it, too, is a form of bribery). “ usurpation of another’s property by force or fraud or dishonest litigation is even worse. Prophet Muhammad (PBUH) made it clear, as he says,” Who occupies the land of another unjustly will be sunk into the ground with plot the Doomsday until he reaches the lowest layer of the earth. “And” He who buys property Muslim unjustly by taking a false oath (formerly officer) is debarred Allah from entering Paradise and hell fire is made inevitable for him. “Prophet Muhammad ( PBUH) again, is said to have warned a man who was very fond of entering into litigation with one of these strong words, “Remember, the person who will get another person’s property by swearing a false oath appears that leprosy before Allah (on the Day of Judgment). “ And again he (PBUH) said:” He who laid claim to anything that was not is not of us. “
<urn:uuid:857bbc39-6dad-4ec2-aaac-06770038f97f>
CC-MAIN-2020-16
http://refusonslamisere.org/business-ethics-in-islam/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494349.3/warc/CC-MAIN-20200329140021-20200329170021-00154.warc.gz
en
0.977359
2,065
2.828125
3
One of the most difficult skills to learn as a software developer is understanding code. Almost all of our education, training and experience involves solving complex or interesting problems, understanding and meeting customer needs, and architecting good solutions, but nobody teaches you how to pick up where someone left off. Sooner or later, you're going to be faced with undocumented code, which may have been written by someone that in your opinion should reside in an asylum. This could be a long-departed colleague, or it could have been yourself six months ago. The study of existing code is often referred to as Software Archaeology, and as analogies go, it's a pretty good one. There's no magic formula, but as with material archaeology, there are methods and tools that can help. Why is this even necessary? Best practise when developing software involves solid design, using appropriate building blocks, writing tests, and of course a mixture of both technical and user-facing documentation. Code should be well-factored, appropriately commented and self-documenting as far as possible. There should be a knowledge-base of problems and solutions to help support customers. Even if your company tries (and maybe even succeeds) at all of these things, there are lots of ways you might end up inheriting someone else's code: - Your company could take over a competitor's contract. - A customer might report a bug in an otherwise perfectly functioning system that hasn't been touched for 10 years and pre-dates current working practice. - You end up supporting someone's hobby project or training project as a real product. - You rely on an open source library and it stops being maintained, so you have to step up and do it yourself. In all of these situations, there's a non-trivial chance that the original developers won't have been as diligent as you hopefully are. You may find missing (or worse, poor quality) comments, documentation and tests. You may not fully understand how the code works, or even what it's supposed to do. Sorry to break it to you, fledgling developers of the world… this is the reality that we live in. Software development hasn't been a discipline long enough for all of this awfulness to be stamped out. You can help to fix this problem when writing new code, but for now you'll almost certainly have to delve into the dark underworld of legacy code. Small bug fixes and changes may be possible without having a deep understanding of the code, assuming that the problems are well defined, but anything else will require some digging. If you're in any way like every other software developer I've ever met, you'll soon be fighting the rewrite urge. Rewrites don't happen A recent Dilbert comic nicely illustrates the familiar knee-jerk reaction of basically all developers to inheriting someone else's code: It's certainly something I've witnessed on many occasions. Unfortunately for most developers… rewrites almost never happen. There are many reasons why this is the case. Joel Spolsky's Things You Should Never Do blog post from April 2000 sums up the situation quite nicely and is still highly relevant today. Paraphrasing his mini-essay into bullet-point form: - Weird things in code are probably bug fixes - throwing away code is throwing away the knowledge of problems encountered and fixed. - Rewriting code is investing time in getting back to exactly where you already were, while everyone else moves ahead. - It's entirely possible that you'll just make the same mistakes again. Of course, individual pieces of code can be rewritten, but it's expensive and risky to rewrite entire projects. Sometimes products are superseded or replaced with new ones when technology evolves or requirements drastically change, but that's an entirely different thing. Even in the rare situation where a rewrite is feasible, you still can't necessarily get away from reading and understanding the original code for anything other than the most trivial systems. "Begin at the beginning" "…and go on till you come to the end: then stop". Directly quoting Alice in Wonderland seems appropriate, as the experience can be very much like falling down a rabbit hole, but the best place to begin is at the beginning, and by that I mean start with the requirements and documentation. If no documentation is available, then you should write some - even if they're just notes to help you get your immediate job done, it's going to be an improvement on nothing and will benefit the next person. Reverse engineering specific requirements (or edge-cases) can be quite tricky for older or larger systems, but most websites, web applications and certainly almost all phone/tablet applications are pretty self-explanatory, so you should be able to get the basics. It's also incredibly rare to be in a situation where there isn't at least one person to talk you through the basics of a system - someone must be using it, reporting a problem or requesting a change. Most of the time you'll at least be able to discern the purpose and major use-cases from just playing around with the features. It's worth always noting these down just for the sake of clarity, as it's easy to get lost in the minutia and lose sight of the bigger picture. Personally, I would always aim to take one or more use-cases through end-to-end on a system that I am going to work on - and would try out as many as possible. If you're working on an online application form, make an application. What are the validation rules and why are they like that? What are the constraints - minimum and maximum number of data items you can put in? Once you've completed an application, find out what happens to it once it has been submitted. Is there an internal process or does it just fire off an email? Consider the system outputs. For most systems developed at Fivium where I currently work, consent documents or licences are the ultimate result, generated as digitally signed PDFs. What should they look like? What data items make it through to the final documents and reports? What pre-processing or formatting steps do they go through? These are the kinds of things worth knowing before you make any changes to any system. There's a lot of cross-over here with exploratory testing. Talk to your testing team (if you have one) to get some ideas. Discuss with some friendly testers online if you don't have any within your company. This leads us nicely on to… Perform some tests Most legacy code won't come with a test suite. Even the most diligent developers these days will likely not achieve 100% test coverage, and unit/integration tests in and of themselves don't get you that far. They protect the code against basic regression impact, but don't necessarily prove conformance to requirements or teach you anything new. If there are few, or no tests, you should consider writing some. At the very minimum, if you're trying to fix a bug, then I would suggest writing a test that covers that scenario. At least then you have a (code) documented record of a problem that has been identified and you can use that to prove your fix. If you have time, or are simply picking up a project as a new owner, it's definitely worth writing tests to explore the limits and assess the functionality. This can help act as useful documentation going forward. Luckily, unlike with material archaeology, we can perform as many tests as like and the code won't degrade or fall apart, so there's really no excuse. Read and map out the code This might seem obvious, but it's always tempting to read only the bits and pieces of code that are required to perform a change or fix. In my experience, this is one of the best ways to make a mess. Look for code units that you'd expect to see. Has someone already solved a problem that you need to solve? Can you reuse that code? It's incredibly easy to duplicate functionality in any non-trivial sized system, which will only make it worse to work on in the long run. I always try to at least understand the core code units and how they fit together. Depending on the complexity, this may be worth drawing out in diagram form. If you're lucky, there may be tools out there that do this for you, such as Class Visualizer for Java. At the very least you should perform an Impact Analysis - trace through what the effects of your change could be, and what other areas of code they affect. Your test coverage should be targeted at those areas as well as proving your intended change or fix. This often takes the form of a simple grep to establish where a function is called, but IDEs usually can do a better job and identify actual dependencies rather than just string matches. It is thankfully very rare these days to encounter any software project that hasn't been stored in version control of some kind. At the worst end of the spectrum, you may encounter poor practise such as: - No version control whatsoever. - A different folder for development and production. - Copying and date-stamping source folders for backup purposes. - Use of backup tools or file-sync tools such as Dropbox that provide versioning. - History stored only in IDE metadata. If you're dealing with one of these, then you're frankly going to struggle to make any sense of what's there. If viable, you may want to migrate the source code and any version metadata into a version control tool. As long as you have the required metadata available, this isn't difficult, but may require significant effort. In the worst-case scenario, you can at least commit the current code into version control without any history, so that you're doing things properly going forward. "Properly" means using a tool designed for the job, like Git, Mercurial, SVN or Perforce. Learn from the past The more common experience is that your software will be in version control and you can inspect the history of it. You're still dependent on whether previous developers have written good commit messages and committed code in sensible chunks, but any version control is better than none, and this is coming from someone who once had to use PVCS (shudder). Looking at a raw commit log won't get you very far, unless you need only understand a few files or a few specific changes. There are a couple of great tools that can help (and are available for almost any version control system). The blame tool This is my favourite tool for code archaeology, by far. It gives you the immediate ability to view a file (at a given revision) and see how old each line is, who wrote it and what their commit message was, in-line with the file contents. This maximises the amount of context you have for understanding a piece of code and gives you a very useful overview of how a piece of code has changed over time. You can see an example of GitHub's blame tool here: https://github.com/Fivium/jquery-tagger/blame/master/src/jquery.tagger.js I deliberately chose a file that I've contributed to on another project, as most of my own projects have few contributors and revisions, so they're not a great example. While most version control systems use the terminology "blame", Perforce's variant is much more charitably referred referred to as the time lapse view. It also takes the feature to its logical conclusion and makes it a full blown archaeology implement. Perforce Time Lapse gives you: - a little slider at the of the screen so you can easily switch to any revision of the file. - code-age visualisations. - the ability to see changes across branches (i.e. if a change was merged from another branch you can trace the "blame" back to its origin). - you can show differences between any two revisions, at the same time as viewing the contextual "blame" information. So, what can you learn from this tool? Although the name implies that we're seeking to blame a particular developer (or find out that the crappy code you're investigating was actually written by yourself), it's there to help you find out when and why changes were introduced, and where those changes fit in the overall history of the code's evolution. This is very useful when you find a bug that has been around for a long time, as it helps you understand what has been built on top of the offending change. Perforce have a great demo video of the time lapse view in action, which I recommend having a look at. Hopefully as I'm promoting awareness of their features, they won't mind that I shamelessly stole the screenshots from their website! The revision graph Revision graphs will give you a high-level picture of how individual files have changed over time. Hopefully this isn't news to anyone, as I think every popular version control tool supplies this kind of visualisation out of the box. The true value is found in being able to see which branch changes were committed to and where commits have been merged subsequently. Why is this useful? It gives you oversight of where code is. It's all well and good trying to reproduce a bug in order to fix it, but what if it has already been fixed by another developer and not released to production? You can make an argument for searching bug trackers for duplicate issues, but these are often easy to overlook and this sort of thing happens all the time. The revision graph will easily highlight this kind of situation; if you can see that your production branch hasn't yet received the latest commits, you can find out what they are and if it affects your work at all. Another benefit of this tool is that you can understand how code came to exist in its current state. Did a change come from a feature branch? Was it an emergency bug fix? Has it been merged back from maintenance on a release build? Finding out this information becomes simple when version control is visualised. Perforce comes with a great tool for this, which as per the heading above, it calls the Revision Graph: For comparison, this is the one bundled as part of the commit "Log" viewer in SmartGit: If your company uses tools such as Crucible or Review Board for code reviews, then you may find a wealth of information in there. At Fivium, we use Crucible as our code review tool with the primary aim of improving quality, but it has a secondary benefit of being automatic documentation of questions and decisions. We'll often ask each other questions such as "Why is this line of code like that?", "Have you considered these edge-cases?"… There's no perfect place for this type of commentary to exist, but the dialogue that naturally occurs during a peer code review is extremely helpful narrative, and if you tie together revisions of a file with the reviews that it's been involved in, you can glean some very useful information that may have otherwise been a verbal discussion or stuck in a text file on someone's computer. Of course, code reviews can go beyond changes that are occurring now, it can be well worth kicking off a code review to retrospectively examine a piece of code, and collaborate on understanding it. Crucible lets you do this at any time, and you can easily annotate on a line-by-line basis, raise new issues in your bug tracker and so on. Being able to review a cross-section of the code, alongside other developers and stakeholders, and ask questions on a line-by-line, method-by-method or class-by-class basis is very helpful. I hope this has given you some insight into the challenges that you'll face sooner or later as a programmer in the real world, and the tools that can assist you. Always remember that whatever fresh, new idea your company is working on today is next year's legacy code, and once you've experienced Software Archaeology, you'll hopefully try to stop it being a necessary practise for future developers!
<urn:uuid:b8cd366e-2ff0-4da2-9fa0-60cb0215c87e>
CC-MAIN-2020-16
https://basson.at/blog/softwarearchaeology
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370491857.4/warc/CC-MAIN-20200328104722-20200328134722-00194.warc.gz
en
0.961369
3,331
2.578125
3
This is perhaps the most difficult and misunderstood part of Judaism for most people. Of course prayer is not only a huge mitzvah, it is part of most organized religions. Prayer has been practiced by pagan cults and idol worshippers long before Abraham, Isaac, and Jacob were born. The Egyptians worshipped animals, and believed that Pharaoh was a God. Abraham’s father Terach was a maker of idols, and throughout history human beings have prayed to all sorts of things. God specifically explained to us in the Ten Commandments that He is a jealous God, and He despises idolatry. Today we still have a large segment of the world’s population praying to the dollar bill. This is foolish thinking, and is what the Ten Commandments warns us not to do. These are the idols of silver and gold that we must not worship. Of course we need money in order to live, however we must not lose sight of what HaShem wants us to do. A tremendous number of sins are caused when we forget about God, and place too much emphasis on money. Take a good look at the Second Commandment, and you will realize why so many negative mitzvahs have to do with idol worship. Most of the problems in the world today come from abusing money, instead of using it properly to help other people. Prayer is a Jewish person’s secret weapon in life. It moves a person to take a good look at their life, and return to doing what is right in the eyes of God and their fellow human being. God knows what is in our minds, it is up to us to get our own feelings and actions straight. Jewish People are asked by HaShem to pray to Him alone. We do not need anyone or anything to intervene on our behalf. We are not allowed to pray to anything else, nor is it necessary. It is not necessary for anyone else for that matter, however for someone who is not Jewish it is acceptable to pray through an intermediary. Please refer to the section regarding the Seven Noachide Laws, and what it means to be a “Righteous Gentile”. In Hebrew the word for prayer is tefillah. The root of this word means to judge, differentiate, clarify, and decide. We recommend that you read the introduction found in the ArtScroll siddur (prayer book) about prayer. The explanation is excellent, and too involved to completely explain here. The Psalms are known in Hebrew as Tehillim, which is similar to the word tefillah. The Psalms were written by various people throughout time including Moses, King David, King Solomon, and the sons of Korach. They were collected and compiled together by King David. The Psalms have been a source of comfort and relief for people for thousands of years. In the days of the First and Second Temples the Levites would sing the Psalms every day in the courtyard areas. Today in some synagogues a certain Psalm is read for each day, and of course on Shabbos we read and sing many of them. Please read each Song of the Day for yourselves. Psalm 81 is read on Thursdays, and we want to share part of it with you here. Verses 9-17 are as follows: Listen My nation and I will attest to you; O Israel if you would but listen to Me. There shall be no strange god within you, nor shall you bow to an alien god. I am HaShem your God, who elevated you from the land of Egypt, open wide your mouth and I will fill it. But My people did not heed My voice, and Israel did not desire Me. So I let them follow their heart’s fantasies, they follow their own counsels. If only My people would heed Me, if Israel would walk in my ways. In an instant I would subdue their foes, and against their tormentors turn My hand. Those who hate HaShem lie to Him – so their destiny is eternal. But He would feed him (Israel) with the cream of the wheat, and with honey sate you. At the part of the Psalm where it says “open wide your mouth and I will fill it”, a person is to ask God for everything that they need. According to the great Rabbi Ibn Ezra, God urges us to ask for all that our heart desires. By asking for everything that we need, a person shows that their trust and faith in God’s power and generosity knows no bounds whatsoever. (Taanis 3:6) Prayer is our secret weapon against our enemies. While we want World Peace, we acknowledge there are people who want to destroy Israel, and the righteous people of every nation, including the United States. We cannot include every prayer or every way to pray on this web site, however we will include a few. We ask you to purchase the ArtScroll prayer book, and there are various types. You should buy the complete siddur, which has the Sabbath and Holiday prayers, as well as the weekday services in it. The Ashkenazic and Sephardic siddurs are almost exactly alike, buy the one you like best. The main difference is that the Kaddish prayer is a little different in the Sephardic book, and a few other very minor changes. We prefer the Ashkenazic book known as Siddur Kol Yaakov. If you are not aware of this, there is something in Judaism known as a minhag. A minhag is an accepted tradition that certain communities and synagogues follow. Your minhag will vary depending on your Rabbi, or the customs of your family tradition. Because Judaism varies from country to country, and from tradition to tradition, Jewish people are different. Please remember that these minhagim (minhags) are about customs and traditions. They are not about the 613 Mitzvot, which cannot be changed, added to, or subtracted from. A minhag has to do with things like whether you eat beans, rice, or lamb on Passover as some Sephardic Jews do, or potatoes and chicken as most Askenazic Jews do. Some songs are sung in a different melody, certain Torah and HafTorah passages are read on different holidays, and other customs are observed according to various minhags. As we have mentioned in other sections of The Mitzvah Project, every Jew and every non-Jew is different. Each tribe of Israel has its own specialty, and each person has their own certain thing to add to achieving World Peace. Our job is to serve God as best we can. We must not lose sight of HaShem, and we are to subjugate our will to His. We have to rise above our animal instincts and be holy. This is why the tribes camped around the Sanctuary in the Wilderness, and why the Temples were established on Mount Moriah. On Succos or Sukkot we bring the four species together, and wave them in every direction. This represents all types of Jews, those who are religiously observant and those who are not. We wave them to show that God is everywhere. Even though we cannot see Him, He controls everything in nature, on Earth, and in the Heavens. We have free will, and it is up to us to use our free will to do what is right. God gave us the Commandments and the Torah, and we accepted it and agreed to follow it. Psalm 104 verses 1 and 2 are as follows: “The beginning of wisdom is the fear of HaShem – good understanding to all their practitioners; his praise endures forever.” This is to teach us to stay away from sin, and to be a good person in all we do. We will share a prayer with you, and it is especially helpful for those of you who are not accustomed to pray. We know you may feel strange talking to yourselves, just remember that God hears you and knows your innermost thoughts before you speak. He enjoys your prayer, and He will answer you. There is an old saying that the Gates of Heaven are sometimes open and sometimes closed, but the Gates of Repentance are always open. Our prayers can change things, this you can be sure of. On three separate occasions in the Wilderness, God Himself wanted to destroy the Children of Israel for their sins. Moses prayed with the Thirteen Attributes of Mercy and similar prayers, and HaShem changed His mind and spared the people. Throughout history many people great and small have prayed and their requests were fulfilled. Let’s all come together and pray for World Peace, and don’t forget to ask for it now and forever. Sometimes our prayers are answered when we don’t need them to be, so be careful what you ask for and when. The following is an acceptable prayer for any occasion, and if possible you should ask every day. Please add any prayers of your own, for goodness, righteousness, and mercy. We will use the name HaShem in these prayers, feel free to substitute “O Lord” if you wish. HaShem, our God, and the God of our forefathers, please grant us peace and all the blessings in the Universe now and forever. Please remember on our behalf the greatness of the Patriarchs, Abraham, Isaac, and Jacob, and the Matriarchs, Sarah, Rebecca, Leah, and Rachel, for our good and benefit. Please bless me, my family, my friends, my neighbors, my city, my state, the United States of America, the State of Israel, and the righteous of every nation, now and forever with all the blessings in the Universe. Please bless us with peace, true peace, with each person showing love towards each other. Please bless us with perfect health, free from all disease and suffering, whether it be spiritual, mental, or physical. Please bless us with prosperity, and an overabundance of money, food, clothing, and shelter. Please bless us with wisdom, understanding, knowledge, and intelligence so that we may fulfill your Torah and all 613 mitzvot. Please bless us with happiness, love, joy, and grace in your eyes and in the eyes of all who see us. Please bless us with righteous children who will constantly observe Your Torah and obey Your mitzvot. Please bless us with all these blessings and more, now and forever. HaShem, my God, and the God of my forefathers, Almighty Father, please turn the hearts of the wicked toward you now and forever. May you cause them to repent and return to you and obey Your mitzvot immediately now and for all eternity. HaShem, my God, and the God of my forefathers, please destroy all those wicked ones who will not turn to you, now and forever. We know you don’t want to harm any of your creatures that you have made, however their cup is overflowing with evil. Please destroy those who will not turn to you before they harm me, my family, my friends, my neighbors, anyone from the House of Israel, or any of the righteous people of the Earth, now and forever. Thank you for joining us here at our web site, you have just done many big mitzvahs. Please tell your friends and family about us, and do your best to study and perform or refrain from the 613 mitzvot. We will make the world a better place, and we will achieve World Peace with the help of HaShem and with the participation each other. Thank you again and Shalom!
<urn:uuid:f9c585ad-8687-45c9-abc2-b325460b9059>
CC-MAIN-2020-16
http://themitzvahproject.org/what-is-prayer/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496669.0/warc/CC-MAIN-20200330054217-20200330084217-00355.warc.gz
en
0.96793
2,412
2.53125
3
ITER ("The Way" in Latin) is one of the most ambitious energy projects in the world today. In southern France, 35 nations* are collaborating to build the world's largest tokamak, a magnetic fusion device that has been designed to prove the feasibility of fusion as a large-scale and carbon-free source of energy based on the same principle that powers our Sun and stars. The experimental campaign that will be carried out at ITER is crucial to advancing fusion science and preparing the way for the fusion power plants of tomorrow. ITER will be the first fusion device to produce net energy. ITER will be the first fusion device to maintain fusion for long periods of time. And ITER will be the first fusion device to test the integrated technologies, materials, and physics regimes necessary for the commercial production of fusion-based electricity. Thousands of engineers and scientists have contributed to the design of ITER since the idea for an international joint experiment in fusion was first launched in 1985. The ITER Members—China, the European Union, India, Japan, Korea, Russia and the United States—are now engaged in a 35-year collaboration to build and operate the ITER experimental device, and together bring fusion to the point where a demonstration fusion reactor can be designed. We invite you to explore the ITER website for more information on the science of ITER, the ITER international collaboration and the large-scale building project that is underway in Saint Paul-lez-Durance, southern France. *Update 31 January 2020: The United Kingdom has formally withdrawn from the European Union and Euratom but has expressed strong interest in continuing to participate in the ITER Project. The terms of this new relationship will be negotiated during the transition period. Until a new arrangement is reached, the ITER Council has agreed that existing contracts, both with personnel and suppliers, will be honoured. What will ITER do? The amount of fusion energy a tokamak is capable of producing is a direct result of the number of fusion reactions taking place in its core. Scientists know that the larger the vessel, the larger the volume of the plasma ... and therefore the greater the potential for fusion energy. With ten times the plasma volume of the largest machine operating today, the ITER Tokamak will be a unique experimental tool, capable of longer plasmas and better confinement. The machine has been designed specifically to: 1) Produce 500 MW of fusion power The world record for fusion power is held by the European tokamak JET. In 1997, JET produced 16 MW of fusion power from a total input heating power of 24 MW (Q=0.67). ITER is designed to produce a ten-fold return on energy (Q=10), or 500 MW of fusion power from 50 MW of input heating power. ITER will not capture the energy it produces as electricity, but—as first of all fusion experiments in history to produce net energy gain—it will prepare the way for the machine that can. 2) Demonstrate the integrated operation of technologies for a fusion power plant ITER will bridge the gap between today's smaller-scale experimental fusion devices and the demonstration fusion power plants of the future. Scientists will be able to study plasmas under conditions similar to those expected in a future power plant and test technologies such as heating, control, diagnostics, cryogenics and remote maintenance. 3) Achieve a deuterium-tritium plasma in which the reaction is sustained through internal heating Fusion research today is at the threshold of exploring a "burning plasma"—one in which the heat from the fusion reaction is confined within the plasma efficiently enough for the reaction to be sustained for a long duration. Scientists are confident that the plasmas in ITER will not only produce much more fusion energy, but will remain stable for longer periods of time. 4) Test tritium breeding One of the missions for the later stages of ITER operation is to demonstrate the feasibility of producing tritium within the vacuum vessel. The world supply of tritium (used with deuterium to fuel the fusion reaction) is not sufficient to cover the needs of future power plants. ITER will provide a unique opportunity to test mockup in-vessel tritium breeding blankets in a real fusion environment. 5) Demonstrate the safety characteristics of a fusion device ITER achieved an important landmark in fusion history when, in 2012, the ITER Organization was licensed as a nuclear operator in France based on the rigorous and impartial examination of its safety files. One of the primary goals of ITER operation is to demonstrate the control of the plasma and the fusion reactions with negligible consequences to the environment. What is fusion? Fusion is the energy source of the Sun and stars. In the tremendous heat and gravity at the core of these stellar bodies, hydrogen nuclei collide, fuse into heavier helium atoms and release tremendous amounts of energy in the process. Twentieth-century fusion science identified the most efficient fusion reaction in the laboratory setting to be the reaction between two hydrogen isotopes, deuterium (D) and tritium (T). The DT fusion reaction produces the highest energy gain at the "lowest" temperatures. Three conditions must be fulfilled to achieve fusion in a laboratory: very high temperature (on the order of 150,000,000° Celsius); sufficient plasma particle density (to increase the likelihood that collisions do occur); and sufficient confinement time (to hold the plasma, which has a propensity to expand, within a defined volume). At extreme temperatures, electrons are separated from nuclei and a gas becomes a plasma—often referred to as the fourth state of matter. Fusion plasmas provide the environment in which light elements can fuse and yield energy. In a tokamak device, powerful magnetic fields are used to confine and control the plasma. Visualization courtesy of Jamison Daniel, Oak Ridge Leadership Computing Facility Power plants today rely either on fossil fuels, nuclear fission, or renewable sources like wind or water. Whatever the energy source, the plants generate electricity by converting mechanical power, such as the rotation of a turbine, into electrical power. In a coal-fired steam station, the combustion of coal turns water into steam and the steam in turn drives turbine generators to produce electricity. The tokamak is an experimental machine designed to harness the energy of fusion. Inside a tokamak, the energy produced through the fusion of atoms is absorbed as heat in the walls of the vessel. Just like a conventional power plant, a fusion power plant will use this heat to produce steam and then electricity by way of turbines and generators. The heart of a tokamak is its doughnut-shaped vacuum chamber. Inside, under the influence of extreme heat and pressure, gaseous hydrogen fuel becomes a plasma—the very environment in which hydrogen atoms can be brought to fuse and yield energy. (You can read more on this particular state of matter here.) The charged particles of the plasma can be shaped and controlled by the massive magnetic coils placed around the vessel; physicists use this important property to confine the hot plasma away from the vessel walls. The term "tokamak" comes to us from a Russian acronym that stands for "toroidal chamber with magnetic coils." First developed by Soviet research in the late 1960s, the tokamak has been adopted around the world as the most promising configuration of magnetic fusion device. ITER will be the world's largest tokamak—twice the size of the largest machine currently in operation, with ten times the plasma chamber volume. See the Machine section for more on the Tokamak and its components. Who is participating? The ITER Project is a globe-spanning collaboration of 35 nations. The ITER Members China, the European Union, India, Japan, Korea, Russia and the United States have combined resources to conquer one of the greatest frontiers in science—reproducing on Earth the boundless energy that fuels the Sun and the stars. As signatories to the ITER Agreement, concluded in 2006, the seven Members will share of the cost of project construction, operation and decommissioning. They also share the experimental results and any intellectual property generated by the fabrication, construction and operation phases. Europe is responsible for the largest portion of construction costs (45.6 percent); the remainder is shared equally by China, India, Japan, Korea, Russia and the US (9.1 percent each). The Members deliver very little monetary contribution to the project: instead, nine-tenths of contributions will be delivered to the ITER Organization in the form of completed components, systems or buildings. Taken together, the ITER Members represent three continents, over 40 languages, half of the world's population and 85 percent of global gross domestic product. In the offices of the ITER Organization and those of the seven Domestic Agencies, in laboratories and in industry, literally thousands of people are working toward the success of ITER. The ITER Organization has also concluded non-Member technical cooperation agreements with Australia (through the Australian Nuclear Science and Technology Organisation, ANSTO, in 2016) and Kazakhstan (through Kazakhstan's National Nuclear Centre in 2017); a Memorandum of Understanding with Canada agreeing to explore the possibility of future cooperation and a Cooperation Agreement with the Thailand Institute of Nuclear Technology (2018); as well as over 70 Cooperation Agreements with international organizations, national laboratories, universities and schools. See the Members page for links to the seven Domestic Agencies. When will experiments begin? ITER's First Plasma is scheduled for December 2025. That will be the first time the machine is powered on, and the first act of ITER's multi-decade operational program. On a cleared, 42-hectare site in the south of France, building has been underway since 2010. The central Tokamak Building, currently in its sixth year of construction, is nearly completed and machine assembly is scheduled to start in 2020. The first major installation event of this new phase is programmed for March 2020: the installation of the 1,250-tonne cryostat base. In the ITER offices around the world, the exact sequence of assembly events has been carefully orchestrated and coordinated. The successful integration and assembly of over one million components (ten million parts), built in the ITER Members' factories around the world and delivered to the ITER site constitutes a tremendous logistics and engineering challenge. The ITER Organization will be carrying out the work supported by a number of assembly contractors (nine contracts in all). In November 2017, the project passed the halfway mark to First Plasma. (More here.) Today, project execution to First Plasma stands at 68.7 percent (February 2020 data). Decision to site the project in France Signature of the ITER Agreement Formal creation of the ITER Organization Land clearing and levelling Ground support structure and seismic foundations for the Tokamak Nuclear licensing milestone: ITER becomes a Basic Nuclear Installation under French law Construction of the Tokamak Building (access for assembly activities in 2019) Construction of the ITER plant and auxiliary buildings for First Plasma Manufacturing of principal First Plasma components Largest components are transported along the ITER Itinerary Main assembly phase I Integrated commissioning phase (commissioning by system starts several years earlier) Progressive ramp-up of the machine Deuterium-Tritium Operation begins Throughout the ITER construction phase, the Council will closely monitor the performance of the ITER Organization and the Domestic Agencies through a series of high-level project milestones. See the Milestones page for a series of incremental milestones on the way to First Plasma. See the Building ITER page for more information on ITER construction and assembly.
<urn:uuid:7eb71c8b-515f-469e-a9f4-ed25be7bf01b>
CC-MAIN-2020-16
https://www.iter.org/proj/inafewlines
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371880945.85/warc/CC-MAIN-20200409220932-20200410011432-00555.warc.gz
en
0.906861
2,433
3.59375
4
The Mediterranean countries include France, Spain, Italy, Greece and Portugal along the north; Turkey, Syria, Lebanon, and Israel on the east; the African countries of Egypt, Libya, Tunisia, Algeria, Morocco on the south and the Mediterranean Island Countries of Cyprus and Malta. The Mediterranean countries utilize many of the same healthy ingredients but each country has a unique way of creating recipes with those same ingredients. So far in this series, I have written about Mediterranean cuisine in general and about the cuisine in the countries of Portugal, Spain, France, Italy, Greece, Turkey, Syria, Lebanon, Israel, Egypt, Libya, and Tunisia. This series continues with the country of Algeria. Algeria is located in North Africa on the Mediterranean Sea and this fertile northern region is home to the olive and cork trees. Fig, agave, and various palm trees grow in the warmer areas. Central Algeria consists of the High Plateaus that contain salt marshes and shallow salt lakes. The land becomes more arid the farther south one travels, eventually becoming the Sahara Desert. Roughly 80 percent of the country is desert and camels are widely used for transportation. The coastal region has a typical Mediterranean climate—pleasant nearly year round, with winter temperatures rarely falling below freezing (32°F). Rainfall is also abundant along the coast. Farther inland, higher altitudes receive considerable frost and occasional snow. Little or no rainfall occurs throughout the summer months in this region. In the Sahara Desert, rainfall is unpredictable and unevenly distributed. Algerian food is a mix of various influences, from Berber to Arabic to French to Jewish. Most cooking is centered around spicy couscous which is served with long-simmered meats and stews. Algerian meals are often finished with dates and fresh fruit. Algerian ingredients are essentially Mediterranean, including lamb, chicken, tomatoes, olives, peppers, eggplant, lentils, oranges and lemons. Spicy Algerian merguez sausage is famous around the world. Algerian cuisine traces its roots to various countries and ancient cultures that once ruled, visited, or traded with the country. Berber tribesmen were one of the country’s earliest inhabitants. Their arrival, which extends as far back as 30,000 B.C., marked the beginning of wheat cultivation, smen (aged, cooked butter), and fruit consumption, such as dates. The introduction of semolina wheat by the Carthaginians (who occupied much of northern Africa) led the Algeria Berbers to first create couscous, Algeria’s national dish. The Romans, who eventually took over Algeria, also grew various grains. Muslim Arabs invaded Algeria in the 600s, bringing exotic spices such as saffron, nutmeg, ginger, cloves, and cinnamon from the Spice Islands of eastern Indonesia. They also introduced the Islamic religion to the Berbers. Islam continues to influence almost every aspect of an Algerian life, including the diet. Olives (and olive oil) and fruits such as oranges, plums, and peaches were brought across the Mediterranean from Spain during an invasion in the 1500s. Sweet pastries from the Turkish Ottomans and tea from European traders also made their way into Algerian cuisine. In the early 1800s, Algerians were forced to surrender their farmland to the French. The French introduced their diet and culture to the Algerians, including bread and sidewalk cafés. This French legacy remains evident in Algerian with the French language being the country’s second language. Tomatoes, potatoes, zucchini, and chilies were brought over from the New World. Sources: WHATS4EATS INTERNATIONAL RECIPES AND COOKING AROUND THE WORLD and Food in Every Country Chakchouka is a traditional Algerian dish that’s mainly eaten for breakfast. Traditionally, the main ingredients in Chakchouka include sautéed onions, tomatoes and various spices topped with a few eggs. This meal is served with a side of bread, pita or rice. NORTH AFRICAN EGGS POACHED IN A PEPPER RAGOUT 4 to 6 servings Olive oil — 3 tablespoons Paprika — 1 to 2 tablespoons Onion, thinly sliced — 1 Garlic, minced — 2 to 3 cloves Tomatoes, peeled, seeded and diced — 3 Green and red bell peppers, diced — 2 to 3 Water — 1 cup Salt and pepper — to taste Eggs (optional) — 4 Heat the oil in a deep skillet over medium flame. Stir in the paprika and cook slightly to color the oil, about 10 to 15 seconds. Add the onions and garlic and sauté until the onions are translucent and wilted but not browned, about 5 minutes. Add the tomatoes and cook for 3 to 4 minutes to reduce down a little bit. Add the peppers, water and salt and pepper and bring to a boil. Reduce the heat to low, cover and simmer for about 10 minutes. Add more water as needed to keep it from drying out. Using a spoon, form four small indentations in the simmering peppers to hold the eggs. One by one, crack the eggs into a small bowl and slip each from the bowl into an indentation. Cover and simmer for another 10 minutes or so until eggs are cooked through. Serve with crusty bread, pita or rice. Add 1 teaspoon of cumin seed to the hot oil for about 15 seconds before you add the paprika. Add 2 to 3 teaspoons of ground coriander along with the onions. For a little spice, sauté 1 tablespoon of harissa paste or a minced chile pepper with the onions. Sometimes fresh shrimp or a spicy lamb sausage called merguez is added to the simmering peppers along with the eggs. Add 1 small, diced eggplant along with the peppers. Add 1 potato, cut in a small dice, along with the peppers. Sprinkle the top of the cooked dish with chopped parsley or cilantro. Add a few olives and capers and eliminate the eggs. Chill and serve garnished with hard-boiled eggs or tuna. Couscous is considered the national dish of Algeria, This dish is composed of small pellets of steamed semolina pasta topped with meat, vegetables, and various spices. In Algeria, the most popular meat and vegetable accompaniments for this meal include chicken, carrots, and chickpeas. Although a rather simple dish, Couscous offers considerable freedom in its selection of ingredients. NORTH AFRICAN STEAMED PASTA GRAINS 4 to 6 servings Couscous — 2 cups Salt — 1/2 teaspoon Boiling water or stock — 2 cups Mix the couscous and salt together in a large bowl. Pour the boiling water or stock over into the bowl all at once and stir in well. Cover the bowl with a tight-fitting lid or with plastic wrap and set aside for about 10 to 15 minutes to steam. Remove the cover and fluff the couscous with a fork. Stir in 1 tablespoon of butter or olive oil if you like. Harira is a traditional North African soup and recipes for this dish vary from region to region but in Algeria, Harira is often composed of lamb simmered with vegetables, spices, and herbs. NORTH AFRICAN LAMB AND CHICKPEA STEW 6 to 8 servings Olive oil or butter — 1/4 cup Lamb, cubed for stews — 1 pound Onion, chopped — 1 large Celery, chopped — 2 stalks Turmeric — 1 teaspoon Cinnamon — 1 teaspoon Ground ginger — 1/2 teaspoon Nutmeg — 1/4 teaspoon Saffron — big pinch Tomatoes, chopped — 2 cups Water or stock — 2 quarts Chickpeas, cooked and drained — 2 cups Lentils — 1/2 cup Salt and pepper — to taste Cilantro, chopped — 1/2 cup Parsley, chopped — 1/2 cup Lemons, cut into wedges — 2 Heat the oil or butter in a large pot over medium-high flame. Add the lamb and brown on all sides. Remove the meat to a plate and set aside. Reduce heat to medium and add the onions and celery. Sauté until the onions are translucent, 4-5 minutes. Add the spices and sauté for another 1-2 minutes. Stir in the tomatoes and cook for 3-4 minutes. Pour in the stock and return the meat to the pot. Bring to a boil, then reduce heat to medium-low and simmer for about 45 minutes. Add the chickpeas, lentils, salt, and pepper and simmer for another 20 minutes, or until the lentils cooked through and tender. Adjust seasoning, stir in the cilantro and parsley and serve with lemon wedges for each diner to squeeze into their stew as desired. Meats: Substitute cubed chicken or beef for the lamb. Or eliminate the meat altogether for a vegetarian version. Sometimes 2 or 3 beaten eggs are stirred into the stew at the end to make ribbons of egg in the broth. Add 1 cup soup pasta toward the end. Or add 1 cup of rice along with the lentils. You may need to add a little more water. Mechoui comes from an Arabic word meaning “roast on a fire,” and like its namesake, the meal is prepared in much the same way. This dish is composed of meat spiced and roasted over a fire that is usually served at large gatherings. In the Algerian variation, the meat is roasted on a spit giving the meat a crispy, grilled flavor. NORTH AFRICAN SPIT-ROASTED LAMB 6 to 8 servings Leg of lamb — 1 whole Olive oil — 1/3 cup Garlic, minced — 8 cloves Paprika — 2 tablespoons Coriander — 2 tablespoons Cumin — 1 tablespoon Salt and pepper — to season Unsalted butter, melted — 6 tablespoons Trim any excess fat from the lamb, but leave enough to protect and moisten the meat. Mix the olive oil with the garlic, cumin, turmeric, salt and pepper and rub this mixture all over the meat. Cover and refrigerate for up to 24 hours. Set up the rotisserie (in front of the fire, not over it) and rotate the spit slowly for 4 to 5 hours, or until all the meat is cooked through, moist and tender. Salt the meat from time to time and baste it periodically with melted butter to encourage a crispy skin. Remove the spit from the fire and let the meat rest. Then use clean hands to remove the meat from the bones and onto serving platters. Preheat the oven to 300°F. Place the leg of lamb on a rack in a roasting pan big enough to fit it. Add 1/2 cup of water to the pan and cover the pan with aluminum foil. Set the pan in the oven and roast for 4 to 5 hours, or until the meat is cooked through and starting to fall off the bone. Increase oven temperature to 450°F. Remove foil and return pan to oven. Roast for another 15 to 30 minutes, basting every 5 minutes or so with the melted butter until the surface of the lamb is browned and crisp. Remove from oven, cover loosely with foil and set aside to rest for around 30 minutes. Remove the lamb to a serving platter. Strain any pan juices into a bowl or gravy boat and serve on the side. Serve with bread or couscous and a simple salad. Diners can help themselves to the meat by pinching off portions from the platter. North African Spice Blend: For a more complex flavor, add a spoonful of ras el hanout spice blend to the paprika, coriander, and cumin listed above. Makroud is a traditional Algerian dessert. This pastry is composed of a date or almond stuffing and dipped in a sugar syrup or honey. Makroud are also eaten with coffee for breakfast. They will keep for over a month stored in a well-sealed container. ALGERIAN ALMOND COOKIES Makes 20 to 24 cookies Almonds, whole, blanched — 1 1/4 pound Sugar — 1 cup Eggs, beaten lightly — 2 Water — 2 cups Sugar — 1/2 cup Orange flower water — 1 tablespoon Powdered (confectioners) sugar — 3 cups Preheat the oven to 350°F. Place the almonds and sugar in a food processor and process until the almonds are finely pulverized. Remove to a bowl. Make a well in the center of the almonds and stir in the eggs with a wooden spoon until the dough starts to come together. Then knead the dough with clean hands until smooth. Cut the dough into 4 equal portions and remove to a floured work surface. Roll one portion out into a rope about 3/4 inch in diameter. Press down with your palm to flatten the rope to about 1/2-inch thickness. Cut the rope on a diagonal into 1-inch pieces and place them on an ungreased cookie sheet. Repeat with the remaining dough. Bake cookies for about 12 to 15 minutes, or until they are lightly browned on top. Remove to racks and cool completely. While the cookies bake, bring the water and 1/2 cup sugar to a rapid boil in a saucepan over high heat. Stir to dissolve sugar and let boil for 10 to 15 minutes. Remove and cool to room temperature. Stir in the orange flower water. Put powdered sugar in a large bowl. To finish, dip each cookie first in the sugar syrup to moisten. Then toss each cookie in the confectioner’s sugar to coat well. Shake off the extra sugar, place on a rack to dry and repeat with the rest of the cookies. Add 1 tablespoon lemon zest to the almond dough. If you are unable to find orange flower water to flavor the syrup, try using 1 teaspoon of lemon extract.
<urn:uuid:4f516af9-26c7-4805-833b-27934796cc93>
CC-MAIN-2020-16
https://jovinacooksitalian.com/2018/05/25/cooking-the-mediterranean-countries-algeria/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00076.warc.gz
en
0.921291
2,989
2.765625
3
Robotic Cell Assembles Power Trains In industry, many repetitive operations—such as pick-and-place, spot welding and spray-painting—have been assumed by robotics. Even though the operations are diverse, a common thread runs through nearly all of them. The common thread is that the robot performing the task is permitted only limited physical contact with its environment. From a control perspective, this means the robot follows a desired trajectory precisely and reliably, ignoring interactive forces with the environment. The common robot is a pick-and-place device. The robot and its end-of-arm tooling have to be flexible, in the sense that their design will readily accommodate modification. Frequently, the product or parts being handled in the workcell must also be flexible, in that same sense. However, this type of robotic cell is not adaptable. Implementing cycle-to-cycle variations in part geometry or position, changeovers and design changes, and new part introductions pose significant cost issues. This adds significantly to the amount of money and time it takes to implement a robotic workcell. It also makes tooling a primary source of downtime, and adds to life cycle cell costs. In contrast to pick-and-place operations, assembly tasks are fundamentally different in nature. Successful assembly requires precisely and delicately controlling the forces of interaction with the environment. This control is needed in such assembly operations as gear and spline meshing, threading fasteners and joining snap fittings. Humans currently perform such tactile tasks, because we naturally control our interactive forces. Typical industrial robots do not possess such compliance, so they generally fail—often miserably—at these tasks. Current technologies used in robotic workcell applications don’t provide: - Actively compliant and highly dexterous manipulator mechanical designs capable of enabling force control strategies and algorithms. - Sophisticated and robust force control algorithms and strategies. - Sufficient processor speed for on-line production use of advanced vision and force control algorithms. - Sufficient algorithmic translations of industrial application spatial location and object orientation (pose estimation) to enable on-line 3D vision. - A highly dexterous robotic manipulator with significantly less inertia and friction than commonly used manipulators. - Robotic force control algorithms that react to contact forces to achieve reliable part assembly. - Parallel processing techniques for robotic control. - 3D pose estimation algorithms for robots that locate and pick randomly oriented parts from dunnage, and present the parts for assembly within factory floor cycle-time constraints. Manipulator and Force ControlA novel parallel dexterous, hexapod-type manipulator, called ParaDex, performs the assembly tasks in the cell. ParaDex uses parallel mechanical architecture, with the motors fixed to the support structure. Therefore, large direct drive motors can be used without greatly increasing the moving mass of the robot. Using direct drive motors minimizes friction and reflected inertia. In any robot, actuator forces overcome internal friction, accelerate and decelerate internal masses and payloads, and generate interactive forces with the environment. By minimizing friction and internal inertia, more of the actuator force is available to control manipulation forces. The fully parallel architecture also provides high mechanical stiffness for quick and precise position control. Typically, fully parallel manipulators have limited workspace, in relation to the size of the manipulator. To alleviate this problem, ParaDex incorporates some important design concepts. A seventh rotary actuator drives the tool roll degree-of-freedom (DOF) independently of the other six linear actuators. This rotary actuator is fixed to the support structure and drives the tool roll through a prismatic joint and two universal joints separated by a shaft. While the six linear actuators are capable of providing six DOF motion, this redundant axis allows for unlimited range of motion of the tool roll. It also allows the six linear motors to effectively control the remaining five DOF with a larger workspace. The entire manipulator can be mounted in any configuration, but it is most often mounted inverted on an overhead support structure. In a typical assembly line, this puts the manipulator overhead so that it does not take up space on the factory floor. Each of the ParaDex linear actuators is connected to the moving platform via a universal joint, a fixed length passive link and a spherical joint. Force sensors are embedded in the passive links. This mechanical arrangement ensures that the passive links remain in tension and compression with no bending loads. This provides high mechanical stiffness, with smaller, more compact links and bearings than would typically be required for a manipulator with equivalent payload. The joints are arranged in a configuration that improves the workspace and the dexterity of the manipulator. The robot (ParaDex manipulator) is controlled by a personal computer (PC) with a real-time operating system, and a PMAC motion control board from Delta Tau Data Systems Inc. (Chatsworth, CA). Control switches seamlessly between precise position control and compliance control, based on whether the system is moving in free space or is in proximal contact with the environment. The position control mode uses built-in trajectory planning and smoothing algorithms on the PMAC. In this mode, the PC performs forward kinematics algorithm and workspace validation to avoid collisions. The PMAC plans and executes trajectories through and to commanded positions, including servo control. The compliant motion control mode uses position and force feedback information to develop programmable behavior for the end effector. The end effector is made to behave like a programmable inertial object connected to a desired programmable trajectory by a set of programmable springs and dampers. The resulting motion is as if the entire robot were to be pulled along the path by the programmable springs and dampers. In free space, the robot follows the path fairly closely, as in the position control mode. But if an object is encountered, the robot complies with the constraint imposed by the obstacle and pushes softly against the obstacle, trying to follow the path. If the obstacle is removed, or if the robot works its way past the obstacle, the robot will catch up with the desired path, and the programmable damping prevents overshoot or oscillation. The PMAC puts each actuator in a straight velocity control mode with force "feedforward." All force and position signals are fed back to the PC at a servo rate of 2.2 kilohertz. The PC performs the computations to determine a desired acceleration for each actuator based on the sensed force and desired inertia, stiffness and damping. The desired accelerations are integrated to obtain desired velocities, which are downloaded to the PMAC for servo control. Methods for teaching robots position-based tasks are well developed. But the same cannot be said for assembly operations. ParaDex includes a user interface and automated learning algorithms for assembly operations. The user interface incorporates standard teach pendant functions for programming the position-control-based portions of an assembly operation, such as part pickup, move to assembly start, return to pickup and return to home, as well as end effector control. The interface adds functions for teaching, and either manually inputting assembly search parameters or selecting them from a library of previously stored values. It also defines assembly completion criteria. This allows unskilled persons to program an assembly operation in about the same amount of time that it takes to program a standard robot to perform position-based operations. While standard default assembly search parameters can be selected from a library, the resulting assembly Arial are not optimal. The number of search parameters used (typically eight or more) makes it difficult to manually adjust these parameters to improve assembly Arial. These parameters have no equivalent in position-control-type operations. ParaDex has a learning algorithm that allows the robot to automatically search for an improved set of parameters within an allowable range for each parameter to minimize assembly time. Once a given assembly is successfully programmed, the robot is put in "learn" mode. During this time, the robot performs the operations repetitively without human intervention. Each time it changes the values for the search parameters and records the assembly time. This iterative process typically reduces assembly time by 50 percent or more. 3D VisionFRAPA 3D vision differs from other vision guidance systems for robots in both the type of imaging sensor and the data interpretation methodology that are used. Traditional robot guidance systems use various imaging technologies. These include standard 2D intensity-based gray scale imaging cameras, stereo systems, structured light sensors and Moir?ensors. Image analysis methodology includes feature-finding methods, along with camera calibration, sensor rectification and robot-to-sensor calibration techniques. But these are greatly complicated by the weaknesses of intensity-based camera systems. These sensors are 2D devices operating in a 3D world. Unfortunately, 3D information has to be gathered from 2D data. However, there is no superlative way to do this, thus the proliferation of techniques. FRAPA 3D vision incorporates a range sensor, which is commonly called lidar or optical radar, instead of the traditional camera. The proprietary range sensor, named LASAR, produces two images concurrently. The first is intensity-based. The second is a range map, which is also a gray scale image. However, the gray scale value represents distance from the sensor rather than intensity response. This range map provides information that can be directly related to scene surface height. With this information, 3D representations can be generated. Also, better geometric descriptions of the objects of interest can be created than with projection-based 2D imaging systems. Standard image processing techniques deal with regions and edges. Range images produce 3D equivalents called surfaces and boundaries that are not well-suited for standard image processing methods. A technique called tripod operators, which was developed at the Naval Research Laboratory in Washington, was adapted for FRAPA. Think of tripod operators as a structuring element, upon which a local coordinate frame that is part centric instead of sensor centric can be defined. Probes can be specified on this coordinate frame to create a feature vector that characterizes the local geometry. Because the feature vector is generated in the part coordinate frame, this object representation is invariant to part position. This feature vector can be used to recognize patterns in range images. By associating reference position vectors with the feature vector, it is possible to recognize the object and establish its full six DOF position estimate. This position estimate, called part pose, includes the X-Y-Z position, and roll, pitch, yaw orientation information. A tripod operator can be loosely thought of as a 3D correlation. The key advantages of the range sensor-tripod operator approach are: - The cell requires no teaching of points. Once the sensor and robot coordinate frames are synchronized, the vision system finds part locations and gives position information to the robot in robot coordinates. - The cell can be prebuilt up to the gripper. Only general knowledge of the parts to be handled is necessary. Only the size of the part and size of the dunnage are required to configure and price the cell. - New part models can be created on a teach-by-showing basis in a matter of minutes. This means that the time to introduce a new product is only determined by the time required to build a new gripper, not the time to build a cell. - The plan provides a generic vision approach to locating parts in random orientations. FRAPA at WorkThe integrated robotic workcell was installed at Comau PICO in Southfield, MI. One 3D vision-guided robot picks randomly oriented power train parts from dunnage and hands the parts directly to the ParaDex. It assembles the part or parts into the mating power train components, using its force control and compliance capabilities. The FRAPA demonstrates that future flexible manufacturing and assembly technology will: - Handle heavy payloads reliably, smoothly and delicately without damage and with little human intervention. - Adapt to assembly tasks through human teaching and machine self-learning. - Focus on smart machines with inexpensive end-of-arm tooling. This will allow economic recovery of capital investment. Capital equipment will be long-lived, flexible and adaptable assets. - Perform complex, delicate, force-controlled, highly precise assembly tasks without human intervention in X-Y-Z axes, with high reliability and repeatability, and without precise position material delivery requirements. - Eliminate part-specific delivery automation. - Interact compliantly with a human. - Simplify product adaptability and changeover. - Assemble automatically a product designed for manual assembly. - Perform quality control tasks simultaneously with assembly operations.
<urn:uuid:76468bc8-df29-4c8f-aee9-82f435cdf946>
CC-MAIN-2020-16
https://www.assemblymag.com/articles/83733-robotic-cell-assembles-power-trains
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370491857.4/warc/CC-MAIN-20200328104722-20200328134722-00196.warc.gz
en
0.895547
2,615
3.125
3
Should we encourage babies and toddlers in individual play or should we always try to play with them? Are they even capable of entertaining themselves? Is it possible to teach them? Every child is different. Sometimes, when a toddler age child is out of sight and you don’t know where he is, you can expect trouble. Children are very creative – pulling out wet wipes or unwinding toiler paper, smearing anything on anything – toothpaste on tiles, dried dirt on walls, the content of a diaper or potty over on bed or floor…A toddler can entertain himself, but he doesn’t know how not to be destructive while doing it. A different child may surprise us by entertaining himself while not destroying half of the house. He plays with his plastic animal toys and cubes for a half an hour and then looks at a book for another fifteen minutes, without destroying it. That fact is, that there are children that can entertain themselves from an early age, and then there are others who, without TV, would be pulling your leg up until puberty. Why can’t they entertain themselves? Some can’t, because quite simply, no one has ever taught them. But toddlers can still be taught. Mainly due to underdeveloped attention, they concentrate with difficulties and can do so only for a short amount of time. Many parents make it even harder for them – when they try to entertain their child for a while, they bring him toys as diverse as possible and when their child starts playing with them, they quietly leave. This is not the best solution. Children today are not threatened by stimulus deprivation; in fact the have too much of it. Their immature brain has trouble dealing with many stimuli at once and it can distract them, making it harder for them to concentrate. If you want to help your child to have on his own and help him increase his concentration abilities, limit the amount of his toys. More specifically, offer him toys gradually. Even a baby should know, that he could do something interesting with any item. For this he needs enough time to touch, taste and take apart the items (watch out for small pieces). If he doesn’t have enough ideas, inspire him. But wait for when he wants to put away a toy. Don’t be too quick in trying to show him what it can do. If you interrupt him when he’s interested in something, you aren’t really helping his independency and attention development. The key is the feeling of security Another thing that prevents babies and toddlers from individual play is a missing feeling of security. Recently, my friend Ema asked me how come her nine-month-old son Jacob can stay in bed for so long and play with just one stuffed animal and a blanket. And anytime later during the day he can’t stay entertained by any toy and what Ema doesn’t do in the morning, she does not have a chance of doing later in the day. Paradoxically, many mothers have an opposite experience – their children can play on their own during the day without problems, but they can’t stay in bed in the morning even for a minute. The key to this problem is the previously mentioned feeling of security. In order for a baby or a toddler to play alone, he has to feel safe. Some children feel safe in their crib. Others only feel safe it they are close to their mothers. But they definitely won’t be able to play alone, if you will frequently apply the strategy described in the previous paragraph. That is if once your child is interested in a toy, you slowly leave which he will probably figure out and his sense of security will be disrupted. Then, he will have trouble concentration on his toys, if he’ll constantly have to make sure his mother is not leaving. A missing sense of security is also the reason why when we need our child to give us some rest (whether it’s because we need to get something done, or just because our nerves are about to explode), he is hanging onto our leg and demands our attention. A thirty-year-old mom Sabina describes what we probably all know well: “Elisabeth is a pretty independent child, that can play alone without my company with no problems. That’s why I was able to work from home. I usually have enough time, but when I have unexpected extra work to do, it’s like Elisabeth has a radar for it and starts demanding my attention and the time, that I so desperately need.” If your child has a radar – he can sense his mother’s uncertainty and stress, but is unable to recognize the reason. Children don’t know that the only source of their mother’s uncertainty are them and their behavior and they do what’s typical for all children – they resort to safety, which is their mother, and demand attention and comfort. Fun. Is it even necessary? Most mothers dream about a toddler that can stand being alone without her assistance, but there are also those that are convinced a mother on a maternity leave should always be with her child. Is it even necessary for a child this young to be able to entertain himself? Can it harm him? As I wrote earlier, the ability to concentrate is very small – but training helps it and that’s good to remember in terms of child development. With independence, self-confidence increases and a child can then discover the world independently of his mother. He learns to solve problems on his own, to manipulate with items and to be creative. So yes, you should definitely support a child’s individual play. I don’t have to point out that individual play does not equal freedom without supervision; safety is something you should always keep in mind. Mothers often ask how long a toddler should be able to play alone. That is very individual. Even though theories indicate certain times during which a newborn or other children can pay attention and play themselves, with older toddlers my experience tells me it’s so variable that it’s unreasonable to follow recommendations. It’s not possible anyway, because play can’t be forced and if a child is not capable of playing alone than every parent soon finds out that giving him toys leads to nowhere. The recipe for „play alone“ … … unfortunately doesn’t exist. You have to adapt to your conditions and the personality characteristics of your child. Don’t try to teach your child independent play just when you really need it, because that usually doesn’t work. On the contrary, take advantage of situations when your child feels good and is doing something he’s enjoying. That is the perfect time to leave him alone for a while. However, if you haven’t tried to see yet if he minds it or not, don’t leave. Stay quietly beside him and just watch him or – if needed – encourage him verbally. Imitation works well for children that can’t entertain themselves. Just about every toddler wants to do what his mother is doing. Is your child pulling you away from the stove when you’re cooking? Give him a small pot with a lid and a spoon and show him how you stir; and if he’s in a good mood, he’ll surely catch on. Besides that, another good technique is „forbidden food“. The cabinet from which you are constantly trying to push him away, the toilet paper that you always put out of his reach, the package of tissues that you never let him investigate. Sometimes we tend to be overly careful and stress over little things. “My older daughter liked to take paper napkins and tissues off my kitchen counter and destroy them. I used to get mad at her a lot, but then I put them out of her reach, ” a 35-year old Magdalena remembers. “Now I have a one- year-old son and he’s the prototype of a child that constantly needs to be entertained. Once I had to take care of something, so I let my daughter play with him. I went into the other room for a while and when I got back, half of the kitchen was covered in torn pieces of napkin. I almost fell down at the doorstep, but I bit my tongue to avoid yelling at them. When I watched my son for a while (my daughter was already drawing) and I saw how passionately he was taking the napkins apart and was fine being alone, I though – maybe it’s worth it. Since then, I changed my mind a little bit about what I should let my son do, because taking anything apart is the most fun for him. Even though I have a little more cleaning up to do now, it’s worth knowing that I can relax once in a while”. Instead of “forbidden food” you can also use a different strategy. No matter how carefully we protect our children, they end up having way more toys then they need or then appropriate. Sabina advises: “After every Christmas or birthday I leave Julia just a few toys that she’ll have time to play with. I put away the rest. I also put up some older toys that she is no longer interested in. I gradually switch them around and sometimes we exchange toys with her friends. Thanks to this, Julia always has just enough toys and I always have something new in stock. Besides this, I also have a “last resort box”. There, I have a few toys that Elisabeth doesn’t know and it’s a type she likes – right now it’s a puzzle, a children’s telephone and a magazine. When I desperately need to entertain my daughter, I reach for this box.” It’s good to find out what works on your child. Some like colored picture books, other puzzles, building blocks or toys that make sound. Old colored magazines, a pack of paper tissues, cleaning out the kitchen cabinets or playing with water are fun for about every toddler. Jana adds: “My younger daughter is quiet and can play alone. Even she can surprise me though. Like yesterday she slept in her room. Well, after being completely quiet for two hours, we though she was sleeping. When I decided I had to check and looked into her room, a child ran to me saying she “slept like a pink pwincess” and she actually was pink. Somehow, she managed to find a children’s pink lipstick that belongs to my older daughter (who is very messy by the way) and she completely covered herself. Yes, a quiet child…” A predator in a school of fish Did you ever think about why fish or small birds gather together when threatened by a predator? You would think that for a hunter it must be much easier catching a fish when there are hundreds of them, then if they’re is just one. But that’s not true. The movement of a school and the presence of many fish distract the predator and makes catching a prey more difficult. If the predator doesn’t manage to separate one fish, he usually leaves without dinner. It’s similar with a toddler who is surrounded by many interesting toys. He can’t look at one at a time and give it attention. He either (a better option) takes one that’s closest and plays with it, or he’ll wander from one to another and then to the first one and he will never actually stop and play with once, because of all the other ones are so interesting. And unlike the predator who knows exactly what to do with the prey (eat it), a child often doesn’t even know what fun to do with a certain toy.
<urn:uuid:303f5571-4daa-421b-85aa-5f4a2ffe9923>
CC-MAIN-2020-16
http://www.friendlybabies.com/category/baby-care/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370491857.4/warc/CC-MAIN-20200328104722-20200328134722-00195.warc.gz
en
0.97724
2,456
2.796875
3
The relationship between Africa and India has a long and largely unexplored historical trajectory. Some trace the history of the two regions and their interactions back to the first century, whilst most evidence points to at least the fourth century. Their relationship can be seen in art, architecture, music, cloth and trade. Some suggest that it was East Africans who introduced Sufism into India, whilst there is more solid evidence that between the 14th and 17th century Africans rose to prominence in Indian society as artists, architects and reformers. European incursions into the African continent in the 15th century coupled with the colonization of Southeast Asia, and rapid capitalist exploitation and expansion in the following century, resulted in almost 20 million slaves being taken from Africa to the Americas alone. This international slave trade changed the social, economic and political landscape of these three continents markedly. When the Dutch East India Company, which previously used Cape Town as a refreshment port, established a trading port and introduced permanent settlers in 1652 to supply the Europe-East Indies trading route, they began to import political exiles from the East Indies. This meant that those who had opposed colonization and occupation of their homelands by the Dutch elsewhere were captured and brought into slavery at the Cape. The first “shipment” of such slaves arrived from West Africa through the interception of a Portuguese ship. The majority of the slaves who continued to supply the Cape, however, were Muslims brought from Dutch East Indies colonies, such as Madagascar, Ceylon, Indonesia and India. Thousands of people from disparate lands would further mix with Europeans, immigrants from Japan, Brazil, Malacca and the Philippines, over time forming what the Apartheid state termed the Coloured population. The Dutch settlers in the Cape, an unstable grouping of slavers, waged openly genocidal war campaigns against their San neighbours, and had antagonistic relations with Xhosa-speaking people on the eastern frontier. They were soon overcome by the British, who took over the Cape in 1806. The disgruntled Boers, unwilling to be subjected to the rule of the British began their great trek into the “interior” to set up their own “Boer republics.” By 1837, further north along the east coast of what would soon become part of the Union of South Africa, 4000 Voortrekker (Dutch) boers, accompanied by 4000 of their Coloured servants arrived to an area undergoing rapid change. The death of Shaka, various outwards, and later inward migrations, and the resettlement of people in KwaZulu meant that the arrival of the Voortrekkers was unwelcome. In 1843, the British, under the pretext of disapproving of Boer slavery in the area, annexed it and declared it a British colony. The coastal region with its semi-tropical climate provided the ideal conditions for the settlers to begin experimenting with tea, coffee and sugar plantations, although only the latter proved successful. The problem they faced was how to ensure a steady supply of labor in order to reap the profits they so greatly desired. The idea was to institute a “gate of misery” for the local African population, in the form of hut taxes, marriage fees, long labor contracts, and a system of low wage payments; to squeeze Africans through it and onto the labor market. At the time African peasantry proved arduous to stimulate into the work conditions and subordination white colonialists desired. The abolition of official slavery in 1806 in England, meant that a new form of “indenture” or what was derogatorily referred to as the “coolie trade” rose to fill the gap in the 1820s. “Coolies” were cheap Asian labor imported to work in the cotton, sugar and mining industries. An appeal was made on behalf of the “Natal Planters” to Sir George Grey, Governor of Cape Colony and High Commissioner over British Territories in South Africa when he visited Natal in 1855. The Natal settlers asked for the importation of “Coolies or other labourers from the East,” and when he returned to Cape Town Grey made such a recommendation. In 1906 captains of mining industry would appeal for importation of “Coolies” from China to work in the gold mines under horrific conditions. Many would die. The government of India under British Rule, reluctant at first, was soon persuaded by the Natal planters to export labor and on November 16, 1860, a group of 342 people, mainly South Indian Hindus, with a small number of Christians and Muslims, arrived in Natal on a ship called the SS Truro. Ten days later the SS Belvedere brought 351 more indentured laborers from Calcutta. These regular shipments of people continued at random, and according to the needs of white colonists, until 1866 when a world depression temporarily stopped the flow of Indians to Natal until 1872. Indentured labor continued to be imported until 1911. A new wave of migration also began at this time in Durban, with the arrival of predominantly Muslim merchant Indians, mostly from Gujarat. They arrived in South Africa as passenger Indians, at their own cost and under the protections of British citizenship (which was later rescinded), seeking to explore business opportunities because of the laboring Indian community. Whites soon began to feel increasingly uncomfortable with the number of “free” (post-indenture) and “passenger” Indians who had become traders and farmers, and presented a threat to their monopoly on agriculture and trade. They sought to have them sent back to India and this was the beginning of a growing anti-Indian sentiment in Natal. In 1893 Natal was granted responsible government and with it came the imposition of new laws which deprived Natal Indians of many rights, including the franchise (following the Glen Grey Act at the Cape), restrictions on further entry of Indians into the country and a new tax which was meant to compel them to return to India. It was at this time that Mohandas Gandhi arrived in South Africa to fight a legal case and remained for 20 years building a program of passive resistance to the colonial state and setting up the Natal Indian Congress to oppose restrictions set on Indians. Gandhi also purchased a small farm at Phoenix, outside Durban, where he instituted a communal settlement and set up a printing press. The settlement became the center of the strikes on the North Coast and the passive resistance of 1913 where a group of 500 resisters were whiplashed and fired at for refusing to work during the struggle. In 1914, without the unanimous support of the Indian community Gandhi concluded an agreement with General Jan Smuts to suspend the passive resistance campaign in order for some gains in the rights of Indians. These rights included Indian marriage rites, the abolishment of the imposed tax, and the admission of wives and children into the country. What remained however was that Indians were denied the right of free movement from one province to another, especially the Orange Free State, and only those Indians born before 1913 could enter the Cape Colony, under extremely stringent regulations. Thus, the concentration of Indians in Natal was by design rather than volition. It is also interesting to note that of all 107,529 Indians who arrived in Natal as indentured laborers between 1860 and 1911, only 25% were women. By 1960, 94.6% of all Indians in the country were South African-born and almost all Indians in the country lived in Natal, making it the largest Indian city outside of India. Once Indians were out of indenture they began working mainly in manufacturing, coal mining, railway, commerce and the service industries. As such, in a period of just 30 years, from 1951 to 1980, the South African Indian population went from 6.33% of the population using English at home to 73.31% who used it as their home language. So developed then a very specific Durban Indian identity. In places like Cato Manor, near the city center, land was leased to Indian market gardeners who had just finished their indenture and having nowhere to go moved to the city. These first occupants of Cato Manor in turn leased plots to African families, who were prohibited from owning land at the time. For a while Cato Manor became a space of hybridity and mixing, a kind of Sophiatown or District Six, where a particularly Durban culture was able to ferment. In 1949 the outbreak of the Durban Riots brought an abrupt end to this period when an incident on the commercial Grey Street fuelled anti-Indian sentiment and led to massive violence, looting, the destruction of houses and shops and 137 deaths, mostly of poor Indians. Thereafter, people were forcibly removed from Cato Manor, under the Group Areas Act, although people continued to mix despite restrictive laws. The majority of this population, were concentrated in the Durban, Inanda, Pinetown (DIP) region, and lived in sprawling townships. More than 100,000 Indians were forcibly moved to the township of Chatsworth, a farmland 20km outside the city without access to drainage electricity and water, whilst many of their previous spaces of residence were rezoned as white areas. The Indian population although consisting of various religions, castes and cultural backgrounds, sometimes constituted themselves as a community around conservative family values and a community of self help. Through hand-to-hand collections they built the first and only high school for Indians, Sastri College in Durban, raised funds for the RK Khan Hospital, considerable capital for the University of Durban Westville—today part of the University of KwaZulu Natal—and places of religious worship such as temples and mosques. Yet, they remained a politically and religiously disparate group of people with differing class interests. From the time of the arrival of Gandhi the factions within the Natal Indian Congress were clear. There were tensions between the radicals and the reformers: those who supported an alliance with the ANC and later joined when membership was open to members of all race groups, as well as those who joined the UDF, were starkly opposed to politics of Indians who participated in the Tricameral parliamentary system or Apartheid reforms. Furthermore, the class tensions between the largely working-class and poor populations of Indians, descendants of indenture and merchant Indians, continued to be a fault line in everyday relationships. While continuously circumscribed by the Apartheid state as a community and viewed as homogenous because of this classification, religious, caste conversations and class continued to stratify the population, an open secret amongst South African Indians, even today. The arrival of large number of merchant Indians in earlier decades meant that the importation of food, clothing, music and art sustained itself in the Durban area, and this influenced the nuances of the largely working-class population visible in the street foods like Bunny Chow, Samoosa, Vedahs, curry sandwiches and Roti-rolls that became a feature of the Durban takeaways that fed working-class populations; the Rickshaw pullers of the Durban beach front; and various vegetable and food markets. One such market was the Casbah where the documentary Legends of the Casbah is set. It is narrated by curator Riason Naidoo (he doubles as the film’s co-director), with writer Aziz Hassim who together take the viewer on a journey to revisit historic spaces in Durban city and through them to tell a forgotten narrative of its everyday history. Legends of the Casbah essentially explores the history of the Durban Indian Community in the 1950s from the vantage point of 2012. Through the historic Indian market, the Casbah which still exists today, we get a different perspective of life in the 1950s. Far from Casbah as marketplace which induces worn histories of South African Indians as business savvy, with cultures rich in flavorful food and spirituality, it becomes a foundational and creative space, “where a person who is running from the police and knows his way around can disappear for two weeks.” Through a recasting of masculinity, the effeminate, superstitious deal-maker is set aside through images of young Indian footballers, gangsters, life-savers, sportsmen and community builders. For many, including myself, these are exceptional stories that are relatively unknown and have not received attention. Many are the stories of young, poor Indians, excelling beyond the boundaries that were set for black people by the Apartheid state. Out of the Casbah, the Crimson League and the Salot Gangs controlled Durban’s underworld and football teams like the Manning Rangers or Aces United. Far from the batsmen wielding gentleboy perhaps celebrated in the figure of South African cricket, Hashim Amla, is the famous boxer who works carrying 200kg bags of rice in and out of the Casbah. The idiom and grammar of the film too is decidedly Durban Indian, in as far as humor, accent and moral code is concerned, which many will find familiar. It is very much a story about exceptional people making it in the worst of times, building community, developing interracial cultural spaces against Apartheid segregation and hungry for broader citizenship and non-racialism. The development of the country’s first interracial soccer federation after Indians, Africans and Coloureds refused to play each other in segregated leagues sits alongside the triumph of “Papwa” Sewgolum, the self-taught golfer who held his club the wrong way, and beat notorious racist Gary Player in the Natal Open, but had to receive his trophy in the rain because he wasn’t allowed in the whites only clubhouse. (Sewgolum also won the Dutch Open three times.) The narratives of everyday characters like these sportspeople and the underworld gangsters are mixed with that of the anti-Apartheid Doctors Monty Naicker and Yusuf Daddoo (they respectively led the Natal and Transvaal Indian Congress against colonial and Apartheid “reforms” which adversely affected Indians and made common cause with Africans). The inclusion of ANC activist and former government minister Pallo Jordan’s commentary is meant to affirm Naicker and Daddoo’s political impacts. Women too are presented through two examples, one of them Dr Kesaveloo Goonam (a well- known medical doctor and activist who later went into exile), as exceptions to the stereotypical sari-clad Indian woman relegated to the home and overburdened by culture. (The other is the motorcycle stunt rider, Amaranee Naidoo.) This comes as ready relief, since stylistically interspersed between men speaking about footballers and gangsters are often images of women in fashion shows, and beauty competitions in a variety of dress. There are other stylistic choices too. The documentary is made in a film style most probably inspired by “The Godfather” trilogy or the films about underworld figures like Al Capone, as is evidenced by the Little Chicago reference and seen in the representations of Sheriff Khan, a local tough who was known as “South Africa’s Al Capone” and who died a violent death. Yet, if the film is decidedly about a certain slice of history, the interviews with the people who survived this history and are still alive today seem frozen in the spaces and time in which they appear and are supposed to represent. We do not see them in their current lives, where or how they live; or what they do. It is a film then, that addresses the important work of breaking down worn stereotypes by telling an everyday history of extraordinary people and cultural life under Apartheid. It also reaffirms the idea of a “dream deferred” by constant references to “the old days;” a community that appears to be mourning the loss of its community-ness, the helping hand of neighbors, the creation of new spaces, the defying of legal tyranny, the kind of gangsters that would carry groceries for old women and donate bail money to jailed activists… “the good old days.” The very idea of community refuses to deal with the antecedents of Indian slavery at the Cape and the unexplored history of sexual mixing in Natal. Religion, caste, class, race are all left unexplored in this narrative and perhaps the reliance on exceptional stories is meant to affirm a transcendence that is quite non-existent in an extremely fractious group of people. If the end of the movie proclaims the way in which the Indian as descendent of indenture, becomes the South African Indian struggling against Apartheid to become an equal and unracialized citizen, that citizenship remains unseen and unrelatable. The Casbah as an existing space that has changed, shifted and evolved over the years, as has the city around it, is used as metaphor rather than a way to bring this conversation into the post-Apartheid present. A present where politics continue to change and unfold against a backdrop of history that is constantly being retold and repurposed. The film leaves one with a sense that there is a South African Indian, an imagined subject I have no hesitation to reject.
<urn:uuid:fd455c12-d503-40f0-98a5-52fd5114889a>
CC-MAIN-2020-16
https://africasacountry.com/2018/06/imagining-the-south-african-indian
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505366.8/warc/CC-MAIN-20200401034127-20200401064127-00515.warc.gz
en
0.972709
3,524
4.09375
4
When visiting southern latitudes nothing disorients a northern hemisphere astronomer more than seeing our familiar Moon turned “the wrong way!” With the Moon now dominating the night sky, my photo attention in Australia turns to it as my celestial subject. It’s wonderful to see the Moon as a crescent phase in the evening sky, but now flipped around so it looks like the Moon we see from home up north when it is a waning crescent in the morning. However, the lead image above actually shows the waxing crescent in the evening. It shines above the volcanic hills near Warrumbungles National Park, with the added silhouette of the dome of the Australian Astronomical Telescope, the largest optical telescope in Australia. After a lifetime of seeing the Moon in its northerly orientation, seeing the austral Moon throws off your sense of time and direction. Are we looking west in the evening? Or east in the morning? The Moon just doesn’t make sense! Then there’s the Full Moon. It rises in the east, as does the Sun. But like the Sun, the “down under Moon” moves from right to left across the northern, not southern sky. And the familiar “Man in the Moon” figure is upside down, as seen above. The photo above is from Friday night, and shows the Full Moon rising in the northeast over the Pacific Ocean. This “HDR” image above from earlier in the evening captures the golden glitter path of moonlight on the ocean waves. I photographed these Full Moon scenes from the Headlands viewpoint at Woolgoolga, a great spot for panoramic seascapes. The Full Moon this night was the apogee Full Moon of 2016 – the smallest and most distant Full Moon of the year, the opposite of a “supermoon.” Earlier in the week I was inland, high on the New England Tablelands in New South Wales. This image shows the waxing gibbous Moon in the evening twilight over Ebor Falls on the Guy Fawkes River, one of the few waterfalls on the famed Waterfall Way in New Soith Wales that has water flowing year round. From southern latitudes the most amazing region of the sky shines overhead late on austral autumn nights. There is no more spectacular part of the Milky Way than the regions around its galactic centre. Or at least in the direction of the galaxy’s core. We can’t see the actual centre of the Galaxy, at least not with the cameras and telescopes at the disposal of amateur photographers such as myself. It takes large observatory telescopes equipped with infrared cameras to see the stars orbiting the actual centre of the Milky Way. Doing so over many years reveals stars whipping around an invisible object with an estimated 4 million solar masses packed into the volume no larger than the solar system. It’s a black hole. By comparison, looking in that direction with our eyes and everyday cameras, we see a mass of stars in glowing clouds intersected by lanes of dark interstellar dust. The top image shows a wide view of the Milky Way toward the galactic centre, taking in most of Sagittarius and Scorpius and their incredible array of nebulas, star clusters and rivers of dark dust, all located in the dense spiral arms between us and the galactic core. Zooming into that scene reveals a panoramic close-up of the Milky Way around the galactic centre, from the Eagle Nebula in Serpens, at left, to the Cat’s Paw Nebula in Scorpius, at right. This is the richest hunting ground for stargazers looking for deep-sky wonders. It’s all here, with field after field of telescopic and binocular sights in an area of sky just a few binocular fields wide. The actual galactic core area is just right of the centre of the frame, above the bright Sagittarius StarCloud. Zooming in again shows just that region of sky in an even closer view. The contrast between the bright star fields at left and the dark intervening dust at right is striking even in binoculars – perhaps especially in binoculars. The visual impression is of looking into dark canyons of space plunging off bright plateaus of stars. In fact, it is just the opposite. The dark areas are created by dust much closer to us, hiding more distant stars. It is where the stars are most abundant, in the dust-free starclouds, that we see farthest into the galaxy. In the image above the galactic centre is at right, just above the small diffuse red nebula. In that direction, some 28,000 light years away, lurks the Milky Way’s monster black hole. To conclude my tour of the galactic centre, I back out all the way to see the entire sky and the Milky Way stretching from horizon to horizon, with the galactic centre nearly overhead in this view from 3 a.m. earlier this week. Only from a latitude of about 30° South can you get this impressive view, what I consider one of the top “bucket-list” sights the sky has to offer. Mars outshines his rival red star Antares in the heart of the Scorpion. This was the view last night from my observing site in Australia, of red Mars shining near the red star Antares, whose very name means “rival of Mars.” But as Mars nears its closest approach to Earth next month it is already far brighter than Antares, easily winning the rivalry now. The view takes in the head of Scorpius, one of the most colourful areas of the night sky when photographed in long exposures. Uniquely, Antares illuminates a nearby dust cloud with its light which is more yellow than red. Other dust clouds reflect the blue light of hot young stars in this section of the Milky Way. Red nebulas are emitting their own light from glowing hydrogen. The area around Antares is also streaked with lanes of dark dust that absorb light and at best appear a dull brown. Mars reaches its closest point to Earth since 2005 on May 30. All through May and June Mars will shine as a brilliant red star near Antares. A telescope will provide the best view of the red planet we’ve had in a decade. While you are in the area aim your telescope a little to the east to catch Saturn, also in the area, though technically over the border in the constellation of Ophiuchus the Serpent Bearer. In the view above, Saturn is the bright “star” to the left of Mars. Saturn reaches its closest to Earth in early June. Its rings are now wide open and a spectacular picture postcard sight in any telescope. This final view shows Mars and Saturn rising with Scorpius in the moonlight from two nights ago. From my current latitude of 32° south, Scorpius comes up on his side. Last week, northerners marvelled at the splendours of the southern hemisphere sky from a dark site in Australia. I’ve attended the OzSky Sky Safari several times and have always come away with memories of fantastic views of deep-sky wonders visible only from the southern hemisphere. This year was no exception, as skies stayed mostly clear for the seven nights of the annual star party near Coonabarabran, New South Wales. About 35 people from the U.S., Canada and the U.K. attended, to take in views through large telescopes supplied by the Australian branch of the Texas-based Three Rivers Foundation. The telescopes come with the best accessory of all: knowledgeable Aussies who know the southern sky and are delighted to present its splendours to us visiting sky tourists. Here are a few of the night scenes from last week. The lead image above shows a 360° panorama of the observing field and sky from early in the evening, as Orion sets in the west to the right, while Scorpius rises in the east to the left. The Large Magellanic Cloud is at centre, while the Southern Cross shines to the upper left in the Milky Way. This panorama, presented here looking south in a fish-eye scene, is from later in the night as the galactic core rises in the east. Bright Jupiter and the faint glow of the Gegenschein are visible at top to the north. Each night observers used the big telescopes to gaze at familiar sights seen better than ever under Australian skies, and new objects never seen before. The Dark Emu of aboriginal sky lore rises above some of the 3RF telescopes. Carole Benoit from Calgary looks at the Orion Nebula as an upside-down Orion sets into the west. John Bambury hunts down an open cluster in the rich southern Milky Way near Carina and Crux. David Batagol peers at a faint galaxy below the Large Magellanic Cloud, a satellite galaxy to our Milky Way. The Southern Cross, the iconic constellation of the southern sky, shines high in the south on austral autumn nights. I’m in one of my favourite places, Australia, in particular at its self-proclaimed “astronomy capital,” Coonabarabran in New South Wales. Down the road from me is the Siding Spring Observatory. But for 3 weeks I’m using my own telescope gear to observe and photograph the fabulous southern skies. For part of my time here I’m attending the annual OzSky Star Party, a small and rather exclusive event for observers from around the world who come here to revel in celestial wonders visible only from southern latitudes. The lead image at top is a 7-panel panorama of the star party in action, on the grounds of the Warrumbungles Mountain Motel, with a dozen or more large and premium telescopes set up for our use. Overhead is the arch of the southern Milky Way, with the Southern Cross here at its highest about local midnight now in early April at the start of autumn. Below the Milky Way is the Large Magellanic Cloud, a companion galaxy to the Milky Way, itself a superb target for telescopes. To the far right in the Milky Way is Sirius amid the gum trees, and the stars of Canis Major diving into the west. To the far left are the bright star clouds of Scorpius and Sagittarius rising in the east, bringing the glowing core of our Galaxy high into the austral sky. Bright Mars and Saturn shine in and around Scorpius. This is a view of the Milky Way everyone should see – it is should be one of the top items on any amateur astronomer’s bucket list. Here, above, I’ve stacked images from a time-lapse to create a star trail scene with the stars of the southern sky rotating about the blank South Celestial Pole. Again, the Southern Cross is at top. This view, above, focuses on the Milky Way of the deep south, from Vela to Centaurus, passing through Carina and Crux, with the bright Carina Nebula, the Southern Cross, and the dark Coal Sack front and centre. Here I zoom into the Southern Cross itself, in a mosaic of 3 panels to cover the smallest constellation using a high-resolution astrograph, a 300mm f/4 lens. The Coal Sack is at lower left while numerous star clusters lie embedded within and around the Cross, including the famous “Jewel Box” at left, next to Beta Cruxis, aka Becrux. I shot the Crux mosaic from my cottage site at Tibuc Gardens, a superb dark sky site and home to a new cottage built after the devastating bush fires of 2013 which destroyed all the other cottages I had stayed at in previous years. There’s much more to come, as I rapidly fill up my hard drive with time-lapses and deep-sky images of the southern sky. I already have several blogs worth of images processed or about to be. In the meantime, check my Flickr site for the latest images hot off the hard drive and uploaded as best my Oz internet connectivity allows.
<urn:uuid:aa275ba8-2757-48ab-865f-611a0b9393e2>
CC-MAIN-2020-16
https://amazingsky.net/2016/04/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371896913.98/warc/CC-MAIN-20200410110538-20200410141038-00315.warc.gz
en
0.919347
2,536
2.796875
3
An almost golden brown colour, sweet, oozy or chewy, runny or firm, caramel can be found in all shapes and sizes. You can make a runny caramel sauce to poor over an ice cream, make some chewy caramel bites or swirled some into ice cream. Caramel can upgrade your creation to something even more special. All made with just a few basic ingredients and a pretty similar preparation method. That said, caramel can be finicky, crystallizing when you don’t want it to do. Or it turns out too thick or thin. About time to dive into the science of caramel in order to help you make a perfect caramel and fix one when it all goes haywire. Caramel is super flexibly, hard to mess up completely, but it helps knowing what goes on to fix it up again. What is caramel? Even though there are a lot of caramel types, the basis is always sugar.* Caramel is brown, but it can vary from a light brown/orange colour to a very dark brown, closer to being black. This brown colour is formed during caramelization of the sugar. This caramelization also contributes to the flavour of caramel. Therefore, even though caramel is sweet, it has more depth of flavour. Caramel can actually be quite bitter and have a far more complex flavour profile. Apart from sugar there are a lot of other ingredients that can be a part of caramel. The most common are milk, butter, cream, salt and water. These contribute to the richness of a caramel and the flavour profile, as we will come back to later. *There are plenty recipes for caramel without any sugar, look-a-likes. But, since caramelization (the basis of any caramel, we’ll come back to it later) can only occur with sugars, the definition we’ll use here is that a caramel requires sugar. How to make caramel When making a caramel you are trying to achieve two things: - Creating a nice brown colour (from uncoloured ingredients) through chemical reactions - Creating the desired caramel consistency (whether it’s runny or firm) Browning a caramel – caramelization The nice brown colour of a caramel can be formed through the caramelization of sugar. By heating sugar to very high temperatures (regular sugar caramlizes at 160°C (320°F)) caramelization sets in. Caramelization is a series of chemical reactions in which the sugar participates. As a result of these chemical reactions larger molecules will form which have a brown colour. Caramelization of sugar is done by heating the sugar without any other ingredients (except for water) to the correct temperature. At this temperature caramelization will set in and occur by itself, only cooling down the sugars will stop the caramelization again. Browning a caramel – Maillard reaction There is another way to form a brown caramel, without heating the sugar to these high temperatures. It is another very common chemical browning reaction in food: the Maillard reaction. During this reaction molecules with a brown colour are formed as well. However, instead of just sugar, this reaction also requires proteins to occur. Since butter, milk and cream contain these proteins, they can be added to sugar to initiate the Maillard reaction. Since this browning reaction will start to occur at far lower temperatures than caramelization, it is also used quite often in recipes. Caramelizing sugar for caramel You can caramelize sugar by heating it to temperatures well above the boiling point of water (160°C). As mentioned before, regular sugar (sucrose) will only caramelize at a temperature of 160°C. When making caramel at home there are two different ways to bring the sugar to this high temperature: - The dry method: using only sugar, nothing else - The wet method: using sugar and water, this one is a little more fool proof and my go to method The dry method In this method you place sugar in a pot and heat it gently until it starts to melt and subsequently start to brown, the caramelization. It is very important that all sugar it heated up evenly, else some might already brown, whereas other parts are still solid sugar crystals. This method tends to be more tricky than the wet method. However, it is quicker (you don’t have to evaporate all that water again) and it does give the same quality product. The wet method This more fool-proof method uses sugar and water. Instead of pouring the sugar in a pan by itself, you mix it with some water. The advantage is that the sugar will dissolve in the water. Since it is dissolved in the water it is easier to heat it evenly. While heating the sugar now, you’ll boil of the water. The more water that is boiled of, the warmer it becomes. Once the water has all evaporated the sugar is warm enough and caramelization will start. It doesn’t matter how much water you add. Adding more water will result in a longer boiling time. If you don’t add enough water though, not all the sugar will dissolve. It is no problem to add extra water during boiling. It will just take more time. Crystallization of sugar during caramelization Regular sugar (sucrose), is quite special. When you buy a pack of sugar all the sugar will be crystalline, they are crystals. When making a caramel you do not want these crystals. Instead, you want to create a smooth consistency and crystals don’t belong there. This is why the wet method helps you in making a smooth caramel. It helps to melt the crystals by first dissolving them. That said, with both methods it is still possible to create those unwanted sugar crystals. Fortunately, they can be cleared away again quite easily. So how do those sugar crystals form? Sugar molecules strongly prefer to sit in this crystalline structure. They only need a little help to recrystallize again when they are dissolved or melted. The higher the concentration of sugar, the higher the chance they will form these crystals again. This is why especially close to the caramelization temperature, when with both preparation methods there’s barely any moisture left, crystallization has a higher chance to occur. There are a few tips and tricks to prevent crystallization of sucrose. The first is to add a crystallization inhibitor. This is an additional substance that can prevent sucrose from crystallizing. One of the most common inhibitors is glucose syrup. Glucose syrup isn’t only glucose. Instead, it also contains longer molecules. These molecules can interfer with the crystallization of the sugar, they will be in the way of the sugar molecules when trying to build a new crystal. Sugar crystals tend to build up onto something. As soon as you have a crystal in your mixture, it will spread out very rapidly. These crystals will form more easily in a drier area (e.g. if some sugar sits on the wall of a pan where most moisture has evaporated) or on loose bits and pieces in your pan. A stirrer can also be an area where crystals start to grow. This is why most recipes will warn you to not stir the sugar while caramelizing, only do so at the start when the crystallization is not that likely to occur! Solving crystallization in caramel The easiest way to solve the crystallization (and the most effective) is to add more water. In other words, start over again. By adding the water, the sugar crystals can again dissolve. Simply re-heat the sugar, evaporate the water and try again! Once you’ve succeeded to caramelize your sugar without having any sugar crystals, you will need to stop the caramelization again! Since the sugar is super warm at this point (remember, it’s about as hot as an oven!), the reaction will continue going for a while. The caramelization won’t stop immediately, even if you turn off the heat. As a result, the caramel may become way too brown or it might even burn. That’s why most recipes will tell you to add something to the caramel to cool it down again. It can be as simple as adding some water. Often though you will see that you have to add some milk, cream or butter. The advantage of adding these into the hot sugar is that they will also participate in chemical reactions. This will improve the flavour of your caramel even further. Always keep in mind that the sugar is very hot at this point. It is way easiest to add something liquid, this will mix in most easily. However, take care that it will boil almost immediately and it might therefore splash. If you add something with plenty proteins (e.g. milk or cream) take care that it will bubble up a lot. Controlling caramel consistency Caramels can be sauces, syrups or thick gooey bites. In most recipes you will first try to get the colour of the caramel right, before you focus on the consistency itself. When you’ve just carmelized your sugar at 160°C to the right colour, the caramel contains <1% water. If you leave this to cool down it will become a rock hard piece of caramel. It might looks fancy, but there’s no way you’d be able to eat this without breaking off some teeth. The sugar has formed a glassy structure. You can make it softer again by adding moisture. This can be water, but also milk or cream for instance, as long as water is added. Adding a lot of moisture will result in a sauce or syrup. Adding only a little bit of water will result in a thicker less runny caramel. The good thing about sugar and water though is that these are all reversible processes. If you’ve added too much water, simply bring the mixture to the boil and wait until the consistency is correct again. If you haven’t added enough, just add some more to make it thinner. Caramel science troubleshooting When a caramel has become grainy, the sugar has started to crystallize. If this always happens for your recipe, you might have to add some inhibitors as we discussed in the article. Adding inclusions into the caramel, for example peanuts, makes it more prone to crystallization and thus graininess. In those cases, you might want to take some extra measures. A caramel can split if there’s fat in the caramel (e.g. from butter or cream). Often, a split caramel can be saved by gently reheating the caramel and stirring continuously. Adding some extra water can also help here to mix everything again before boiling off that extra water one more time. Last but not least, do not heat or cool down the caramel too rapidly. The fat might melt or solidify at a different rate than the caramel, causing the split. Why caramel becomes (too) hard No worries here! Just add some extra moisture, reheat and you will turn out with a thinner and softer caramel. Can you freeze caramel? Yes, you can, no problem. Take care to pack it airtight though. When you want to use or eat it take care to defrost it will in time. The caramel will have become pretty hard, so be patient before eating. Read more here on freezing caramel and its freezing point. Applying caramel science – Recipes After all that theory it’s time to get to work and make some caramel. Or try these recipes! One uses the wet method to crystallize sugar, the other uses the Maillard reaction to create a nice brown sauce. Recipe 1 - A smooth thick caramel, e.g. for caramel bars - 200g regular sugar - 60 ml water - 80 ml cream - high fat content - 4 drops of vanilla - 50g unsalted butter - 1/8 tsp salt - 200g cream - 280g sugar - 120g butter - Put the sugar and water in a pan, place on a medium/high heat. Take it from the fire once it has turned a nice brown colour. Do not stir, read below why. - Add the cream immediately, take care, it will bubble a lot and it will be very hot. - At the vanilla, salt and butter. Stir until all the butter has melted. - Mix the cream, sugar and 80g of butter in a pan. Take quite a large pan, when the cream starts boiling it will rise quite a bit. - Place on a medium/high heat and keep on heating until the caramel has turned the right colour. Stir regularly to prevent the cream from sticking on the bottom. - Once you've reached your desired colour, turn off the heat and add the remaining butter. Stir until all the butter has melted. - The reason for keeping back some butter here is to cool down the mixture and prevent further browning. You could add all at the start but then there's no way to stop it if it's just gone a little too far.
<urn:uuid:2aa5edec-04f8-41c0-90f5-e211b11c551f>
CC-MAIN-2020-16
https://foodcrumbles.com/making-caramel-recipe-science/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370503664.38/warc/CC-MAIN-20200331181930-20200331211930-00193.warc.gz
en
0.925264
2,706
2.84375
3
Depth of field (DoF) is one of the most important concepts in photography. Understanding what DoF is, and knowing what factors affect it, are things all photographers should master. Many photographers know that you can control DoF by adjusting aperture. But did you know that DoF is influenced by other factors too? In this article, I want to explain in simple terms what depth of field is and talk about the ways you can control it. Depth of Field 1) What is Depth of Field? Depth of field is the distance between the closest and farthest objects in a photo that appears acceptably sharp. Now your camera can only focus sharply at one point. But the transition from sharp to unsharp is gradual, and the term ‘acceptably sharp’ is a loose one! Without getting too technical, how you will be viewing the image, and at what size you will be looking at it are factors which contribute to how acceptably sharp an image is. It also depends on how good your vision is! Scientifically, it is based on something called the circle of confusion. This involves more physics than I’m going to get into here! Spencer talks about it in his article “Hyperfocal Distance Explained.” So check that out for more of the technical details if you are so inclined. In these two sketches, I have tried to illustrate what is meant by a narrow and large DoF. In a photograph with a narrow DoF, only a small slice of the image is in focus. Conversely, with a large DoF, much more of the scene is sharp. Before I dive into the things that affect depth of field, I wanted to show you the setup I used to take the sample images in this article. Hopefully, this will give you a bit more insight into the photos and a better feel for the distances between the objects I was shooting. To change the camera-subject distance, I moved my tripod closer/farther away from the props. All of the test images were shot with the same camera, a Nikon D500. Aperture is the opening in your lens that lets light pass through to the sensor. Think of it as a pupil for your lens. It dilates to let more light in, and contracts to restrict light when it is bright. Aperture is probably the first thing most photographers think of when they want to adjust the depth of field. Large apertures, which correlate to small f-stop numbers, produce a very shallow depth of field. On the other hand, small apertures, or large f-stop numbers, produce images with a large depth of field. 3) Camera-Subject Distance Another important factor affecting depth of field is the distance between the camera and the subject. The shorter that distance, the smaller the depth of field. Have you ever tried to take a close-up shot of a flower or insect, but can’t get the entire subject in focus, even with a small aperture? This is because the closer you are to your subject, the shallower the DoF. Look at these two sets of images. The camera-subject distance in the first group of pictures is 1.5m. After each shot I stopped down the aperture. The second set has a focus distance of just under a half a meter. Notice two things. In each set of pictures, as the aperture narrows, the DoF increases. In addition, for each pair of photos shot at the same aperture, there is more depth of field when the camera-subject distance is greater. Just a quick note. A variety of depth of field calculators are available online. You can also download DoF apps to your phone. All the DoF values mentioned in this article were calculated using the application Simple DoF Calculator for my iPhone. If you are interested in the actual formulas for calculating depth of field, you can find them here. 4) Focal Length of the Lens Wide-angle lenses (short focal lengths) have a deeper depth of field than telephoto lenses (long focal lengths). Well, not exactly! It isn’t quite as cut and dry as that. If you take an image and do not change the camera-subject distance, this is true. You can see this illustrated in these two sets of images below. The top set is shot at a focal length of 70mm. The bottom set at 105mm. Both sets were taken at a distance of 2m from the subject. Notice how for each pair of images shot at the same aperture, the DoF is larger for the narrower focal length lens. However, it isn’t fair to compare these two sets of images. The field of view in each collection is very different. The top group of images has taken in much more of the surroundings, and the reindeer are much smaller in the frame. To make the comparison fair, I took two more shots. The first was taken at a focal length of 35mm and approximately 0.6m away from my focus point (still the eye of the nearest reindeer). For the second image, I moved the camera back, so it was 1.2m away from the subject. Then I zoomed into 70mm and framed the shot so that the head of the deer was approximately the same size and location as in the first shot. It turns out the DoF in both these images is the same. You can see this looking at the acorn in front of the deer’s nose and the snowflake and acorn just behind the nose. In both images, they are equally sharp. So why do the two shots look different? Well, two reasons. The first has nothing to do with depth of field. I’m afraid that while I was composing and shooting, the sun went down! So, you must ignore the fact that the background is darker in the second photo. I do apologize for this! Apart from that, the difference lies in the fact that the longer focal length has a narrow angle of view. Thus, a smaller portion of the background fills the frame. The apparent magnification of the background gives the sense that the blur is larger in the photo shot with the longer lens. My article “What is Lens Compression and How to Use It In Your Photos” talks about this in more detail. So focal length does not actually influence DoF if you adjust the camera-subject distance so that the magnification of your subject is the same. 5) Sensor Size Sensor size also affects depth of field. The article “Sensor Size, Perspective and Depth of Field” goes into quite a bit of detail on this topic. So for more of an explanation follow the link. In a nutshell, cameras with smaller sensors have larger depths of field. However, you have to be careful how you make the comparison. You must look at cameras with lenses that have the same effective focal length so that the fields of view are the same. If you shoot at the same camera-subject distance, with the same apertures, you will find that the larger sensors have a shallower DoF. That is why many professional portrait photographers like to use full frame cameras. Here is an example. A full frame camera with a 120mm lens, an APS-C camera with an 80mm lens, and a Micro 4/3 camera with a 60mm lens (all the same field of view) are each set to an aperture of f/9 and a camera-subject distance of 5.0m. This table summarizes how the DoF will look in each image. |Camera||Crop Factor||Physical Focal Length||Effective Focal Length*||Aperture||DoF| |*Effective Focal Length = Physical Focal Length x Crop Factor| A common question though is can you take similar images, with the same DoF’s, using cameras with different sensor sizes? The answer is yes. However, you must divide the apertures by the crop factor in order to get the same depth of field. Using the same cameras and lenses in the above example, but setting an aperture of f/18 on the full frame camera, f/12** on the APS-C sized sensor and f/9 on the Micro 4/3 camera, you will end up with images that not only take in the same field of view but have approximately the same DoF. |Camera||Crop Factor||Physical Focal Length||Effective Focal Length*||Physical Aperture||Effective Aperture**||DoF| |*Effective Focal Length = Physical Focal Length x Crop Factor| **Effective Aperture = Aperture x Crop Factor *** although f/12 would be the mathematically correct physical aperture, you would have to select either f/11 or f/13 on your camera. 6) Determining Depth of Field Many DSLR’s have a depth of field preview button. If you press this button while you look through the viewfinder, the camera will stop down the lens, and you will see how the actual image will look. However, at small apertures, the viewfinder will get very dark, and it will be hard to see the preview! Live view can also be used on some camera models to preview how the DoF will look. Check your instruction manual to see if your DSLR can do this. Mirrorless shooters potentially have an advantage over DSLR shooters because what they see through the digital viewfinder, or on the LCD is how the photo will typically look. In my opinion, it is not worth getting hung up over how many inches the DoF is in a picture. That would completely take away from the enjoyment of photography. It is much more important to know when you need a small DoF and how to create it. And the same is true when you need a large DoF. The beauty of digital is that you can take a shot, and then review it on the LCD. Quickly reviewing your image is much easier than pulling out your phone and calculating DoF! If you don’t get the result you are looking for, change your camera-subject distance or the lens aperture to get the desired effect. To achieve a shallower DoF you can either move closer to your subject or open up your aperture. For greater DoF, move away from your subject or close down your aperture. You can also use a longer focal length to achieve a ‘perceived’ shallower depth of field. Understanding what factors affect the depth of field in a photograph will give you the artistic freedom to make the images you want to create. You will learn the most from practicing. Take time to experiment with your camera; get to know it better. Try different focal length lenses, change apertures, move your feet to change your perspective. Analyze your photographs so you know how your gear performs. Then when it comes time to take pictures that really count, you will be ready.
<urn:uuid:f2592587-dd43-4fe0-98ad-f8cf2514012f>
CC-MAIN-2020-16
https://photographylife.com/what-is-depth-of-field
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370521574.59/warc/CC-MAIN-20200404073139-20200404103139-00075.warc.gz
en
0.940716
2,271
3.125
3
This chapter examines how scientific knowledge about carbon cycle dynamics is currently used, and can be more effectively used, to inform different types of decision making needs. The chapter is focused mainly on decision-making in agriculture, forestry and other land use (AFOLU); it does not consider decisions made in many other sectors and activities that affect the carbon cycle. The chapter would be strengthened by more coverage of ways that AFOLU components of the carbon cycle are integrated into broader considerations, such as models and analysis of national GHG mitigation policy that balance AFOLU measures with other types of mitigation measures. Statement of Task Questions - Are the goals, objectives and intended audience of the product clearly described in the document? Does the report meet its stated goals? The chapter would best open with a clear statement about the decision domain it addresses (drawing from P740, lines 39-41), followed by a statement about the goals of this chapter (drawing on P741, lines 6-9). The reader should be informed that the discussion mainly concerns AFOLU. And it should be made clearer at the outset what attention is given to issues such as climate change impacts, vulnerability and adaptation, in addition to the focus on carbon fluxes, stocks, and emissions mitigation. It would be helpful in the examples used to provide some sort of explicit framework that clarifies questions such as: What information, how is it presented, and to whom? Who are the decision makers? What aspects of the carbon cycle do these decisions affect (sinks, sources, stocks, flows)? What information do decision-makers get, need, act upon? - Does the report accurately reflect the scientific literature? Are there any critical areas missing from the report? Noted below are some particular areas where additional discussion would be helpful: Full Carbon Cycle. The text does not devote sufficient attention to ways that AFOLU (the main focus of the chapter) is integrated into carbon-cycle decisions, particularly those concerning mitigation of CO2 emissions. For example: - Section 18.2.1 (Science Support for Decision Making) reads as if only the natural sciences are relevant to the carbon cycle–not economics and other social sciences. - Sections 18.3.1, 18.3.2 and 18.3.3 focus on data, models and accounting for the land use components of decision—even for decisions about land use that involve the energy sector and its emissions. The long list of tools (P748-749) ignores the integration of AFOLU into the overall carbon cycle, even for the decisions mentioned (e.g., P748, line 23) - It is not sufficient to say that decision tools with cycle-wide coverage are dealt with in other reports (see P747, lines 12-20). The text should give the reader some insight into the ways that integrated assessment methods and models are used to explore the interaction of land use with other components of the carbon cycle. These issues could be addressed by adding text/references that point to the mention of integrated assessment models in Box 18.2. Biofuels. The discussion of biofuels (P745)—a key U.S. national decision area—could do a much better job of explaining the interactions and feedbacks in biofuels development, and the multiple disciplines that are relevant to decision support. For example, this could include: - more explicit mention of biofuels production effects on agriculture, grasslands and forestry, and influence on food prices; - technology issues (e.g., cost of cellulosic ethanol; non-AFOLU fuels such as algae; use of direct air capture to produce synthetic hydrocarbon fuels) - consideration of the fossil fuels used in biofuel conversion, and their emissions - international trade in biofuel products (e.g., forest products, Brazilian ethanol) which are integrated into national models of energy and emissions (see comment above). Also, given that this section (18.2.3) is on “Examples . . . for Decision Making”, the discussion could be cast in the context of decisions about U.S. ethanol policy. Ozone Damage. Mention should be made of feedbacks of carbon emissions (i.e., the resulting air pollution and climate effects) on ozone damage to agriculture and natural vegetation. Detailed discussion is not needed, but the effect deserves to be mentioned. Communication. Section 18.2.2 (Science of Communicating Science) is incomplete in that it fails to call attention to the challenge posed by intentional dissemination of misinformation about climate change and efforts to undermine the public’s trust in scientific institutions. Examples of appropriate references for such a discussion might include, for instance, Anderegg et al. (2010); Farrell (2016); Supran and Oreskes (2017). The authors might also want to consider that the challenge is not only understanding how the public interprets available science, but also understanding how carbon-cycle (and climate) science can be more accessible and relevant to individual and collective decision making. If it is not possible to deal with these important issues in this report, it might be worth considering dropping this “communication” section from the chapter altogether. Culture. The discussion of knowledge co-production could be better linked to the discussions in Chapter 7 (Tribal Lands) about different forms of decision making, and different information and communication needs, in different communities. The chapter should also acknowledge the importance of factors such as cultural and economic diversity in decision making. An example is the South Florida Regional Climate Change Compact (P743, L26-38), which works because the counties “are tightly linked socially and economically”. This aspect of the chapter could be enhanced by links to the earlier chapters on Tribal Lands and on Social Science. - Are the findings documented in a consistent, transparent and credible way? Because this chapter does not present new learning from research or empirical results, it does not lend itself well to findings akin to those of other chapters. Presumably however, the authors were required to come up with at least 4 or 5 key findings, and as a result, some of these findings seem forced or weak. Some specific notes below. Key Finding 1 (Co-produced Knowledge). This finding should be edited to provide a more coherent message. (e.g., More relevant than what?) It is not the case that all information relevant to decisions must be co-produced by the scientific community and stakeholders. The language in P743, lines 20-21 is more helpful: “continued communication among different shareholder communities and the scientific community . . .” Perhaps also state that collaboration can help ensure the science is relevant to decision-maker needs. The confidence statement seems odd, given that the “finding” is just a sensible proposition, not a finding based on empirical evidence of decisions made with and without co-production of the science inputs. Key Finding 2 (Integrating Human Knowledge). The obvious point that human drivers are the main reason for study of the carbon cycle does not merit elevation to a key finding. Key Finding 3 (Attribution, Accounting & Projection). The point is also obvious and does not seem to merit elevation to a key finding. Without information on carbon-cycle fluxes and their origin, there is no carbon-cycle science, much less science to support decision making. Key Finding 4 (Strong Links among Research). Reasonable, but it is not clear what “medium likelihood” means in this context. Key Finding 5 (Improved Understanding). This finding should take account of the problem of intentional programs of misinformation (see above). Also, the evidence base refers to improving communications, whereas the finding involves understanding the public: these two different parts of the problem are not clearly explained. - Are the report’s Key messages and graphics clear and appropriate? Specifically, to they reflect supporting evidence, include an assessment of likelihood, and communicate effectively? Messages and graphics are generally clear. The terminology in Figure 18.2 (Mode 1 and Postnormal) needs explanation, either in the text at P741 line 31 or in the caption. - Are the Research needs identified in the report appropriate? Yes, but many “needs” are listed with no sense of priority. Some rough ranking in importance would be useful. Additional effort is needed to provide guidance on research related to decision making. The main references to research needs are in short phrases in Boxes 18.2 and 18.3. The authors’ view of research tasks should be elaborated in the text, with discussion of how the work would contribute to particular decision-making challenges. - What other significant improvements, if any, might be made in the document? The chapter would be improved by illustrating the use of carbon-cycle data and analysis for support of one or more specific decisions at the national level. It would be useful for the text to give more attention to issues that are particularly important in informing decision making; for instance, discussion of the “fat” upper tail of climate response and threatened damage, and the implied urgency for action. P739, Line 36 This should state “different from, although complementary to.” P740, Line 13-15 To say “optimal is most effective” is a tautology. Rewording is suggested. P740, Line 5-12 The point being made in this paragraph is not clear. How is it that definitions enable eliminating gaps between science and decision making? What are the gaps? And why are the Management and Technology Drivers in Figure 18.1 mostly about agriculture, when something more general is called for? Why is renewable energy or nuclear energy not mentioned (and energy transition)? P741, Line 12 Explain what, in particular, has changed over the last decade. Is it the items on P752, lines 32-40? P741, Line 13 Explain what is meant by “traditional science supply paradigm.” P741, Line 23 Does this mean communication with economics and the other social sciences, as well as among natural sciences? If so, specify. P742, Line 22 Add a phrase to explain “attitudinal inoculation.” P743, Line 14-15 There is repetition of a citation. P743, Line 4-18 For this section, need to add an example of a decision where NACP was involved or relevant. P748, Line 12-13 It is not true that a robust process to develop projections is “relatively new”. The work goes back a quarter century or more in the climate arena alone. If the authors believe this statement, the text should define “robust” and “new”. P755, Line 2-3 Fluxes not useful for decision making? Why not? This statement is inconsistent with the finding. P755, Line 20-21 Statement about emissions estimates is not true. P755, Line 12 Statement implies that carbon accounting is not done for forestry, agriculture, and fossil fuels, which is not true. P757, Line 2-3 A good deal is known about this. What is needed is an understanding of how portions of the public are misled and what can be done to persuade those individuals and groups to trust scientists and scientific institutions. This page intentionally left blank.
<urn:uuid:d7f9e3ba-029c-4c12-aaf9-83e724b02fad>
CC-MAIN-2020-16
https://www.nap.edu/read/25045/chapter/23
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370529375.49/warc/CC-MAIN-20200405053120-20200405083120-00156.warc.gz
en
0.93191
2,370
3.21875
3
BIOLOGICAL OBSTACLES AGAINST INTER-SPECIES EVOLUTION Professor Dr. İsmail KOCAÇALIŞKAN Yıldız Technical University, Department of Molecular Biology and Genetics, Istanbul. If we accept the word evolution as a change, it covers a very broad framework. On this basis, the debate about change is not about whether change exists or not, but how it happens. Because it is a known fact that there is a change in the living and inanimate universe. Three main views have emerged from the past to the present in the answer to the question of how change occurs. One is the view of chance evolution, the other is the view of creationist evolution, and the third is the independent creation of species but thatonly covers intra-species change. Changes in lifeless worlds earthquakes, rains, winds, etc. such as the transformation of rocks into soil, changes in ecological balance, climate change, shift of continents, underground formations, death of some stars in space and swallowed by black holes and the expansion of the universe. Examples of such changes. When we look at the world of living things, living beings are born, grow, multiply and die. Newborns lead lives instead of dead ones. Each species has a life span within certain limits. In some species, for example, insects have a life change and transformation in the form of eggs, larvae, pupae and butterflies called metamorphosis. There are various examples of change in living things like these. There is no discussion. Because it is the events that take place in front of the law in front of us. Such changes are not evolution. But often these concepts are used interchangeably, causing confusion. Every change and transformation has been called evolution in literature. Whereas, evolution is the name of the view that claims that one species emerged by transforming from another. a) Evolution Discussion There are millions of living species on earth from one-celled bacteria to plant, animal and human species. The main discussion is about how the first members of these species emerged at the beginning, which is the source of the evolutionary debate. Escherichia coli is a species of bacteria, Pseudomonas putida is another species. Plants include tomatoes, sunflowers, poplar, apples, pine species. Animals include dog, cat, frog, fish, bird, snake, monkey and human species. Thousands or even millions of individuals of each species live in the world. Of course, a species, for example, a human species or bean species, of course, will have a beginning. How did the first individual of a living species emerge? The discussion is the answer to this question. Three main views have emerged in this question from the past to the present: 1. The Coincidental View of Inter-species Evolution Thus, as the environment and the environment changed, one species transformed into another to adapt to the environment, and millions of living species emerged as the work of nature. For example, first, a cell, such as bacteria, was formed by chance. From one cell, one arm evolved from the side of the plants to one side of the animals. The plants evolved by chance in the form of seedless plants and then seeded plants. The arm of the animals evolved from one cell to invertebrates, fish, frogs, reptiles, birds, mammals and humans. According to this view, the end of speciation is open and unlimited. New species may also occur in the future. For example, in the future, human beings can coincidentally turn into another new species. 2. The Creationist View of Inter-species Evolution This view, like the previous view, assumes that living things take the form of the transformation of one species into another, but that this transformation is driven by a Deity, that is to say, it is not a random evolution, but a divine evolution. While these two views converge that species evolve from one into another, they differ in terms of coincidence and a Creator plays a role in the evolution. 3. The view of Independent Creation of Species Including Intra-species Change The knowledge that each species has a gene source in the world and that spreads from there to the world supports this view. In this view, living things do not change at all. There have been some changes since the time they were first created and they continue to be. However, these changes are limited to intra-species. Although some call these intra-species changes as micro-evolution, in fact these changes are not any evolution, but are intra-species variations whose existence is based on experimentation. Within the species there are categories such as subspecies, variety and race. A living species, plant or animal, is under the influence of the environment in which it lives. According to this, it is possible that there are some changes in the living thing and it is necessary to adapt to the environment and to continue its life and generation. However, these changes are the changes in the secondary characteristics and not the basic characteristics, ie the changes is not in the characteristics of the species in which the living thing is involved. If the basic characteristics of the species change, then one species becomes another species, that is to say, inter-species evolution. No such species has evolved and it has not been scientifically proven. It is a logical idea that each living species is created and multiplied according to the law of reproduction in a time period in which the environment conditions suitable for its life are created and spread throughout the world. In the meantime, in order to adapt to the new environment, in-species variations such as sub-species, varieties and breeds may occur by subjecting to intra-species changes to the extent permitted by the genetic potential. However, these changes are not sufficient to go beyond the gene pool of the species. Not all living species were created at once. There is a gradual sequence of creation, that is, a time stream of species appearing on the earth. We can tell this from fossils. In this ranking, we can say that bacteria are among the first creatures. The reason for this is not because bacteria are simple, but because they are responsible for providing suitable environmental conditions for the species that will be created after them. For example, plants could not survive if plants were created before the nitrogen bacteria in soil that fix nitrogen gas in the air. Because there was no available nitrogen such nitrate or ammonium in the soil, the plants would starve to death. However, nitrogen bacteria were given a task that plants can not do. The task of capturing the nitrogen of the air and giving it to the ground. Thus, the soil was enriched with nitrogen and became suitable for the survival of plants. According to this ranking, we can say that the last created species in the world is human. Because a complete ecosystem of other living species is needed for human survival. Without humans, other living things can survive. However, human beings cannot live without other creatures. Roughly we can say that after bacteria, plants, then grass-eating animals and then meat-eating animals were created. The food chain in the world requires such a sequence of creation. In addition to the food chain, there are situations in which some plant and animal species have to be created together. For example, some plants are pollinated by birds and insects. Which plant species are pollinated by which bird or insect, these two species must exist in the same time period. Otherwise, those plants cannot continue their generation. Those insects can't live without food. For example, bees pollinate many fruit trees and pollens of flowering plants. Therefore, some plants need bees to multiply. On the contrary, bees would not survive without these plants. Because they feed on their nectar. Thus, Allah created the plants and bees in such a way that they will be in need of each other. Therefore, we can say that bees and these plant species were created in the same time period. Another example is the Mucunagigantea plant. This plant is pollinated by bats. Because the flowers open at night and not at day. Flower structure is suitable for bat structure. Bats fly at night to absorb the nectar of the plant because they feed on the night. Such plants and bats must have been created in the same time frame. Because one needs another. There is of course a change in nature and living things. But this change is not in the form of the transformation of one species into another. Change can be within certain limits. We can't talk about unlimited change. There is intra-species change and this is necessary for living species to live in nature and adapt to different environments. For example, when we plant the seeds of a plant living at sea level on a high mountain, it becomes shorter, dwarf and small-leaved. This is necessary to protect from the sun's harmful rays at day and cold at night. The species is again the same species. As another example, while the animal species living in the desert are short-haired, some individuals go to the cold regions to the north to find nutrients and become used to live here and become long-haired to protect from the cold. But the species does not change. Only different breeds of the same species occur. b) Biological Barriers to Inter-species Evolution The biological evidences that inter-species evolution is not possible can be listed as follows: 1. Limitation Law As a general law, everything is limited in the material world. Infinity is an adjective of the Creator. Creations have the freedom of change and life within the limits set by the creator. As the universe is limited, the world is limited, living things are limited, and their characteristics are limited. Our vision, our hearing, our strength, etc. It is limited. Every living species is also limited to its genotypic, morphological, anatomical and physiological characteristics. The reproductive potential of some living things is very high. For example, one fish lays thousands of eggs at a time. But most of them are limited by other fish. Without this law of restraint, the seas would be filled with fish and life would end. However, within the boundaries within the species, such a wide range of motion is given by the Creator that there is a large, but not unlimited, genotypic range of change. Each species can live comfortable within the species boundaries drawn to it. New breeds and varieties have emerged within a species, both as a result of environmental conditions and as a result of human-made breeding. Still new ones are obtained. For example, potatoes (Solanum tuberosum) have more than 300 varieties. It is possible to make this number thousands by means of improvement works. So the kind of movement within the species has been left that wide. However, it is not possible to turn the potato into another species or to obtain a new species. Within the genotypic boundaries there are intra-species variations and can be made. So there is change, but each species is within its genetic limits. Not interspecies. 2. Sex Mismatch Law Inter-species fertilization is inhibited by numerous different genes located at different loci of chromosomes. Such genetic conflicts result in tissue mismatch and prevent inter-species fertilization. The blocking event may be at different steps depending on the species. Let us give an example from plant; when the pollen of one species (male reproductive cell) is placed on the stigma of another species in plants, the germination of the pollen in the stigma respectively, the progression of the pollen tube in the stylet, the inhibition of the introduction of the pollen tube into the embryo sac, the inhibition of fertilization of the seed, is blocked on one of the different digits. Efficient fertilization between species is not possible. Although fertilization is possible among some species, generation does not continue as fertilization is inefficient. Since the cultivated plants are resistant to diseases and adverse environmental conditions, the breeding studies (ie. Artificial selection) are carried out to transfer the resistance genes in the wild to the culture plants. For this purpose, the crossing of the wild plant and the culture is carried out. For example, the seeds in small tomato fruits obtained when crossing the wild type Lycoprsicon peruvianum and tomato Lycopersicon esculentum, a tomato, become degenerate and become inefficient after one stage of development. It is not possible to continue the generation of such inefficient seeds. However, in tissue culture it is possible to propagate plants (asexually) with embryo culture. Similarly, the law of sex mismatch applies to animal species. In general, different species do not mate. As exception, although some possible to mate, either no fertilization or new generation does not continue. The mule is born as a result of the horse and the donkey mating, but its generation as sexual does not continue. This is a known famous example. 3. Recombinant DNA Technology Nowadays, the science of genetics is so developed that genes are mapped. Genetic characteristics can be changed by transferring genes from one species to another. So the genes are engineered. Thus, a new field of technology was born. However, it is not possible to carry out inter-species evolution in the laboratory by transforming one species into another. However, intra-species variants such as a new breed or variety can be obtained. It is not logical to admit that this phenomenon occurred spontaneously in nature, even though the most specialized and experienced human beings have failed to achieve inter-species evolution. Because the DNA of the bacteria is naked, there is no protein sheath and nucleus to protect it, they are easy mutated by many external factors such as cold, hot, harmful rays and chemicals. The fact that bacteria are given this feature is very wise. This makes it to manipulate the genes of bacteria, so they are used in biotechnological studies, for example in the production of some drugs. Gene transfer between species with cold resistance, salt resistance, such as properties can be gained. Nevertheless, no other species of bacteria or a different species of plant or an animal could be obtained by mutation or gene transfer. Only by making small changes in genes, new variants called strain (line) in the same species can be obtained in bacteria and new varieties within plants can be obtained for biotechnological purposes. Excessive changes in genes cause death of organism(s). Therefore, mutations in the genes of one species cannot be transformed into another species either in nature (namely natural selection) or in the laboratory (namely artificial selection). Only intra-species changes may occur by the way. Even prokaryotic organisms with naked DNA, such as bacteria, have not been successful in obtaining a new species by mutation. This also seems impossible to achieve in eukaryotic organisms such as plants and animals. Because in eucaryots, DNA is preserved in the nucleus and surrounded by a protein sheath. For the formation of inter-species evolution as an argument, a new species with the common genetic characteristics of the two must be formed by mating two different species. We explained above under the title of sex mismatch law that this would not be occurred because of a sex mismatch. The other argument is the formation of mutations in the genes as a result of the pressure of the new environment due to the change of the environment on a species, and as a result of this change, this species undergoes transformation and emerges as a new species. We explained that this would not be possible under the title of recombinant DNA technology. Contrary to these two major biological barriers and the principle of limitation, the possibility of inter-species evolution does not seem possible. On a logical basis, if there are, for example, three possibilities in the occurrence of something, two of these are not shown to be possible, the third possibility automatically turns out to be correct. When we look at this principle; as mentioned above, there are three views on how living species came into being, and it is explained above that the first two views, called inter-species evolution, are not possible.Therefore, the plausibility of the view of “the independent creation of species including intra-species change” arises. Ünal, M., Plant Embriology (In Turkish). Nobel Press, 2006. Kocaçalışkan, İ., Tissue and Cell Culture Technics (In Turkish). Nobel Press, 2017. Akyürek, A., 1000 Dead End of Darwin (In English), Liman Press, Ankara, 2019. Klug, WS., Cummings, MR., Genetics (Translated to Turkish). Palme Press, 2002. Özcan, S., Gürel, E., Babaoğlu, M., Plant Biotechnology-II (In Turkish). Selçuk University Press, 2001. Nursi, B.S., Lem’alar(In Turk). It translated to Engas the name of “The Flashes Collection”. - CREATION THROUGH THE LANGUAGE OF SCIENCES SERIES - EVOLUTION: IS IT GRADUAL IN CREATION? - BASIC FALLACIES IN THE VIEW OF EVOLUTION: 2 CONFUSION OF CONCEPTS - CONTINUITY OF INTRASPECIES CHANGE AND IMPOSSIBILITY OF TRANSITION BETWEEN SPECIES - SCIENCE AND EVOLUTION THAT ARE IMPOSED ON THE COMMUNITY AS IDEOLOGY - Are changes in viruses evidence for evolution? Is the theory of evolution true? - DILEMMAS OF THE THEORY OF EVOLUTION - Could mutations be the reason for a new species? - Are Living Beings Changing Under Natural Selection? - THE FORMATION OF COLOR IN LIVING BEINGS AND THE EFFECTS OF MUTATIONS
<urn:uuid:6be0d2eb-9878-4505-85d9-15561b290976>
CC-MAIN-2020-16
https://questionsonislam.com/article/biological-obstacles-against-inter-species-evolution
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506870.41/warc/CC-MAIN-20200402080824-20200402110824-00475.warc.gz
en
0.939689
3,682
3.3125
3
The idea that artistic geniuses were generally men was a hard one to shake in the 1970s, especially in Mexico. Enter a generation of Mexican women who helped bust those preconceptions wide open with work that pushed the boundaries of both materials and subject matter. Those women — along with women from across Latin America — are the focus of the exhibition “Radical Women: Latin American Art, 1960-85,” which opens at the Hammer Museum in Los Angeles on Sept. 15. Early this spring, The Times gathered a group of the show’s Mexican artists at the home and studio of artist Mónica Mayer in Mexico City for a wide-ranging discussion. The lineup included Mayer, a key Mexican feminist artist, as well as printmaker Carla Rippey, and photographers Lourdes Grobet and Ana Victoria Jiménez. Joining the discussion were historians Karen Cordero and Julia Antivilo Peña, who have contributed essays to the exhibition catalog. Separately, I interviewed artists Maris Bustamante (who, with Mayer, established the iconic feminist collective Polvo de Gallina Negra) and Magali Lara, an artist known for her intimate assemblages exploring aspects of female sexuality. In this edited oral history, they discuss what the Mexican art scene was like when they first emerged, the controversial nature of identifying as feminist, and the ways in which their works helped evolve the art of the time. Plus, there’s that one fiery anecdote about a dozen bored university students and a handful of firecrackers. A political tradition Mónica Mayer: I think you have to understand that Mexican art has a long tradition of political art — a very long tradition. [In the 1970s] art was collective and it was political — at a time when practices such as performance, installation, ephemeral art, all of those things — became more prominent. Mexico, not Europe, first Magali Lara: In school, it was all about technique, about formal qualities, about the connection to Western ideas about the universal. But it was my generation that said, “We live here. Why talk about Mexico if everything we have to do focuses on European thinking?” It was a period in Mexico in which anthropological studies were very strong, and there was this whole recuperation of indigenous culture — not as something of the past, but of the present. The male mindset Carla Rippey: Among los grupos [the collectives that became popular in Mexican art in the ’70s], I think they did function as collectives. But the men were generally thought of as the leaders. I was in the grupo Peyote y la Compañia, and it was always seen as being led by Adolfo Patiño — even though I organized as many things as he did. But people saw him as the leader and the rest of us as the group. It was very typical. Yes, women paint Magali Lara: I was at the Academy of San Carlos [now part of the National Autonomous University, known as UNAM]. We used to have these discussions which today would be considered absolutely ridiculous, but back then were very serious. We’d talk about whether women could or couldn’t be painters because of our maternal qualities, and how women were good students but not good creators. This idea that we were very docile and easily influenced — that’s how they treated us. Breaking the feminist stigma Maris Bustamante: I remember Mónica and I decided to establish a feminist art group. So we organized a meeting. We invited like 50 or 60 women: curators, writers, sculptors, illustrators — everyone! We had coffee and cookies. And everyone told us they didn’t want to be in the group. They gave several reasons. One was, “I don’t have a problem being a woman artist.” Some said, “I don’t want to have any problems exhibiting because as it is, it’s hard enough.” The galleries were run principally by men. The word “feminist,” it created this conflict. The ‘libber’ label Carla Rippey: In the 1970s, nobody liked to say “feminist” — even in the United States. They would say “women’s libbers,” which sounds terrible. Not even “women’s liberation.” It was “women’s libbers.” Lourdes Grobet: I always questioned the whole concept of feminism because I always felt as if it was imported from Europe or the United States. It’s a word that struck me as very middle class. And this issue of the influence of European culture, I’ve always been wary of that. Mexican women are different, and especially Mexican rural women. So it’s another context. That’s why I’ve been dedicated to things like lucha libre [Mexican wrestling] instead of keeping my eye on what’s happening in Paris. All of my colleagues were always in Paris. White and bourgeois? Mónica Mayer: Since the ’70s people have repeated the idea that “feminism is white and bourgeois” — even feminists themselves. And that overlooks a whole other struggle, which is the struggle between women and the left. Julia Antivilo Peña: That’s what the left used to say, that it was bourgeois, in order to delegitimize the movement. … But in the ’70s, and even before then, there was a feminist movement here. Karen Cordero: Mexico has had a feminist movement since the 19th century — and a very visible one. The first feminist congress in Mexico took place in 1916, in Yucatán, and since then, there has been visibility for feminism in Mexico. Ana Victoria Jiménez: It’s very complicated. We’ve always gotten into this discussion. Whether it was good feminism because it came from England in the 1800s or bad feminism because it came out of U.S. imperialism in the 1900s. And that has separated us a lot. There were things about the leftist movements of the 1970s that I was not in agreement with. They were not in favor of abortion, because they wanted children for the revolution: the concept of “a parir madres Latinas” [a 20th century leftist hymn that encouraged women to give birth to future revolutionaries]. “A parir madres,” frankly, used to make my hair stand on end. You are fighting for independence, for the liberation of women, for a dignified life — and someone comes along to tell us that if we’re not good at making babies, then you don’t count. Those concepts from the ’70s, to me, were really problematic. Diego 50, Frida 20 Magali Lara: In ’76 or ’77, I showed these drawings that showed objects like scissors and cameras having these somewhat sexual interactions with bits of text. And it was chaos because it was made by a woman. They also weren’t paintings, they were drawings. In the gallery, they would erase my name and write “whore” and “dirty” in place of the wall text. It was a huge surprise. My generation was a big fan of Frida Kahlo because she was using herself as a subject, commenting on the subjectivity of the body. She used paint in a European way but painted indigenous forms. She had this aspect that was very high culture but also very populist. It was a real mix of things. This was when nobody went to Frida’s museum. We were the only ones who went. And there was one book about Frida Kahlo, which was 20 pages about Frida and 50 about Diego [Rivera]. The taco patent Mónica Mayer: From ’75 on we were making works of feminist art. And in 1977, the exhibition “Collage Íntimo” [Intimate Collage] was held, which was the first self-described show of feminist art. In ’83, Maris and I formed the collective Polvo de Gallina Negra, and our idea was that we would make a public art, and that it should be public in the most massive way possible. We had an opportunity to present on television because Guillermo Ochoa [who hosted a television talk show] approached Maris after hearing that she had patented the taco. She had done a conceptual piece where she patented the taco — she was listed as its intellectual author. It caught his eye, and so we did a performance. Maris Bustamante: The lectures that Mónica and I gave, we talked about the work of women artists and recuperating the work of women artists who had died. And we always appeared wearing an apron — because people always said, “Women in the kitchen.” So we would come from the proverbial kitchen to the stage. There was one event, when the students found out what the theme of the talk was, like 12 of them got up to leave. I was always prepared. In my apron, I carried all kinds of things: pingpong balls and water pistols. I had these little firecrackers. You throw them, and they make a “pop.” So these 12 or 15 young people stand up, and I grab the firecrackers, and I throw them on the table, and they explode perfectly. And I say, “From a lecture on feminist art, nobody leaves!” It was a joke. But the students sat back down. We laughed so hard. A striptease scandal Lourdes Grobet: I remember a piece that I did on a tour with other women artists. I organized a striptease. I do a striptease, but I don’t take off my clothes. I had photographed myself doing a striptease, and I go removing the photos, and I end up nude in the photos. You don’t even know how much that irritated people. In San Cristobal, it was a scandal. Afterwards, I was invited to a colloquium on photography in Pachuca, and I presented the striptease. My photographer colleagues were horrified. Someone asked me, “Do you have children?” And I said, “Yes! Four.” [Laughs.] They were horrified that I had shown myself nude like that. Turning the tables on soft-core Carla Rippey: I worked a lot with the female nude. I would take images of Victorian soft-core porn but try to re-imagine them from the point of view of the woman — of the pleasure they felt. I made other types of works, too. Some of the feminists had problems with my work. They would say things like, “What are you trying to do?” “Is this feminism or not?” Karen Cordero: Feminism in Mexico hasn’t gotten very close to art. At the feminist study program at the Colegio de México at UNAM, the thing that has least been internalized is art. Magali Lara: I think what “Radical Women” is doing is very important. It will eliminate a lot of myths about contemporary Latin American art. In the European view of art, the Latin Americans who were there, who were part of some of these very important movements, are often missing. Well, in the Latin American view of art, the women who were also there — from the beginning — are also missing. It’s important to show it. The post-35 drop-off Carla Rippey: There has been change. The current minister of culture is a woman. The head of the Palace of Fine Arts is a woman. But you still see some of the same problems. The women’s portfolios are excellent — as good or better than the men. But once everyone reaches 35 years of age, when careers are taking shape and artists are being considered for fellowships and grants, the women fall off. That’s something that we still need to understand. “Radical Women: Latin American Art, 1960-1985” Where: Hammer Museum, 10899 Wilshire Blvd., Westwood, Los Angeles When: Sept. 15 to Dec. 31 Please consider subscribing today to support stories like this one. Already a subscriber? Your support makes our work possible. Thank you. Get full access to our signature journalism for just 99 cents for the first four weeks.
<urn:uuid:bcf361e3-8990-4d95-a2fe-d76b57bffe9e>
CC-MAIN-2020-16
https://www.latimes.com/entertainment/arts/la-et-cam-radical-women-mexico-oral-history-20170901-htmlstory.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370511408.40/warc/CC-MAIN-20200410173109-20200410203609-00434.warc.gz
en
0.980629
2,699
2.609375
3
Education reform, the process of improving public education through changes in public policy, has been slow and often ineffective in Arkansas. All aspects of public education are open to reform, including school finance, teacher quality, curriculum, transportation, and school facilities. Modern education reforms in Arkansas include school choice initiatives, alternative teacher pay, and standards-based accountability and testing. Arkansas has historically been one of the lowest-performing states academically, and even today, despite major improvements in funding and student achievement during the last decade, Arkansas still ranks below the national average on many objective measures. Arkansas also has one of the most undereducated populations in the nation in terms of the percentage of adults with college degrees and the percentage of high school graduates; Arkansas ranks in the bottom five nationally in both categories. In addition to the low levels of academic achievement, the state’s historically poor education has been due to its reluctance to integrate, its low teacher salaries and per pupil expenditures, its efforts to outlaw the teaching of evolution, and its general lack of legislative support to fund education. Early Statehood Era, 1836–1880 School reform was not a priority as the state was just beginning to establish a public education system. Governor Archibald Yell (1840–1844) led the early efforts in education reform by advocating a program of state aid for public schools, and Governor Thomas Drew (1844–1849) attempted unsuccessfully to convince the legislature to establish a state college. Public education faced similar difficulties under the next governor, John Roane (1849–1852). Despite the fact that the federal government had set aside land to be sold to raise revenue for new educational institutions, Roane was unsuccessful in persuading the Eighth General Assembly to ensure that localities would dedicate the proceeds of these sales to education. In general, the antebellum era in Arkansas was marked by repeated governmental budgetary shortfalls, and supporting public education at any level was not a high priority for the state. Although the pre–Civil War Arkansas state constitution had a general clause about supporting public education, it was not until after the war that the constitution required a system of free schools in the state. The Gilded Age through the Progressive Era, 1880–1921 In 1885, Governor Simon Hughes (1885–1889) instituted the first round of special education reform in Arkansas by establishing the Deaf Mute Institute (now the Arkansas School for the Deaf) and the Institute for the Blind (now the Arkansas School for the Blind) at state expense. Hughes and other governors during the late nineteenth century continued to struggle to bring the state into financial solvency, and most education reforms lacked financial support. During the governorship of Xenaphon Pindall (1907–1909), the first major reform to professionalize teaching occurred with the founding of the Arkansas State Normal School (ASNS) in Conway. This institution for teacher training became the Arkansas State Teachers College (ASTC) in 1925 and ultimately the University of Central Arkansas (UCA). One influential education reform governor was George Donaghey (1909–1913). Donaghey invited the Southern Education Board, an organization dedicated to reforming public education in the region, into Arkansas. During Donaghey’s tenure, secondary and higher education made important steps forward, as four agricultural high schools were established that later became Arkansas Tech University (ATU), Southern Arkansas University (SAU), the University of Arkansas at Monticello (UAM), and Arkansas State University (ASU). Donaghey’s governorship also saw a state law that made consolidation of rural schools less complicated. The early twentieth century is often referred to as the progressive era of education reform, and in Arkansas, former professor Charles Brough was a supporter of progressive education as governor from 1917 to 1921. Brough was one of the first governors to get the General Assembly to pass a law that would allow for property taxes, or millage, to be used for the funding of state educational institutions. Brough also established a compulsory attendance law, an illiteracy commission, and support both for vocational education and special education. The Early Twentieth-Century Era, 1921–1953 Thomas McRae (1921–1925) was another influential education reform governor in Arkansas history. The post–World War I climate in Arkansas was turbulent, and the state was in financial distress. During this time, the average school year was only 131 days, with twenty-five percent of students in school less than 100 days. Rural areas lacked high schools, and over 100,000 Arkansas adults were illiterate. During McRae’s first term, the General Assembly adjusted the state property tax in order to supply a stable revenue source for the support of educational institutions, including the University of Arkansas (UA) in Fayetteville (Washington County). However, it was difficult for McRae to pass other tax measures for the support of education. At this time, the state government was only supplying $2.60 of the average local per student expenditure per year, which was a mere $23.63 as compared to approximately $60 in Oklahoma and Missouri. Nonetheless, the General Assembly would not support an income tax to finance education. The legislature did, however, pass a tobacco tax, which helped enrich the education fund. By the time he left office, McRae had doubled the state’s per pupil contribution. Between the governorships of McRae and Harvey Parnell, the only major reform was that the public voted in 1926 to allow local districts to raise their property tax from twelve to eighteen mills. Governor Parnell (1928–1933) finally got an income tax through the General Assembly in 1929 as a way to support public education. Shifting a portion of the tax burden from rural Arkansans whose wealth lay in property assets to urban dwellers dramatically improved the amount of revenue available for education. An advocate of consolidation as a way to help rural education, Parnell worked with interest groups and legislators to close hundreds of one-room school houses across the state. His reforms led to widespread school bus use, a twenty-percent increase in high school enrollment, and a lengthening of the school year. Parnell also supported teacher training through the establishment of Henderson State Teachers College (now Henderson State University) in Arkadelphia (Clark County) in 1929. Curriculum reform also occurred during this time. In addition to a 1930 state law that required public school teachers in Arkansas to read Bible verses, Arkansas was one of only four states to pass a law prohibiting the teaching of evolution. Additionally, the Arkansas Education Association (AEA), the state’s most prominent educator advocacy group, became very active during this time as a reform organization. Two aspects of the AEA’s agenda were for the state to focus revenue on primary education rather than higher education and to use urban wealth to fund rural schools. In addition, the State Teachers Association of Arkansas, the state’s African-American educator organization, attempted to improve the quality of education for black students during the 1920s. The association tried to address the inequities resulting from the local autonomy in spending state education money. For example, in Chicot County during the 1929–30 school year, the per-pupil expenditure was only $6.36 for black students, compared to $54.11 for white students. The reforms of this era did little to persuade Governor Junius Futrell (1933–1937) that education should be a state priority. Futrell did not believe that the state should fund education beyond the eighth grade. Moreover, he wanted the federal government to bear the costs of education, and only when the federal government threatened to withdraw support did Futrell assent to the legislature’s two percent retail sales tax to support public education. Although the federal government did not support Futrell’s education policy, it did contribute considerable resources through New Deal programs of the 1930s for the construction of school facilities. These building programs, along with the reforms of consolidation and statewide district reorganization during the 1940s, contributed further to the desertion of many one-room schoolhouses across the state. The Desegregation Era, 1954–1971 The tenure of Orval Faubus (1955–1967) was an eventful period of education reform for Arkansas, as the state became a central figure in the anti-integration movement of the 1950s and 1960s. In the landmark desegregation case of 1954, Brown v. Board of Education of Topeka, Kansas, the U.S. Supreme Court ruled that racial segregation of public schools was unconstitutional. White supremacy groups in Arkansas did not accept the Brown ruling and attempted to delay integration as long as possible through intimidation and boycotts. The first battle over integration occurred in Hoxie (Lawrence County). Ultimately, the school board at Hoxie ended up suing the segregationists for their efforts at obstruction, and through federal judicial intervention, integration in Arkansas took a slow step forward. The segregationists were not defeated, however. With Governor Faubus as their political ally, segregationists next tried to delay the integration of Central High School in Little Rock (Pulaski County). On the grounds that he was preserving order, Faubus called in the National Guard to prevent black students from entering Central High on September 4, 1957. In the end, the federal courts ordered Faubus to allow the integration to take place, and President Dwight D. Eisenhower sent federal troops to ensure that black students could attend school safely. Although teacher salaries grew by 125 percent between 1954 and 1966, Faubus’s failure to support the school board in Hoxie and his response at Central High did little to promote support for integration or to improve the image of the state’s public education system. The Modern Era, 1971 to the Present Education reform progressed after Faubus left office. In cooperation with the legislature, Governor Dale Bumpers (1971–1975) passed multiple reforms. Some of the more prominent legislation during Bumpers’s tenure consisted of state-funded kindergarten, free high school textbooks, and special education funding reform. During the administration of David Pryor (1975–1979), the AEA was prominent in opposing tax reform that would shift the responsibility for funding education to the localities. In 1977, the General Assembly did, however, pass legislation to establish the minimum foundation funding level for state aid to public schools. Governors Bill Clinton (1979–1981, 1983–1992) and Mike Huckabee (1996–2007) were perhaps the most education reform–oriented governors in the history of the state. The major contribution of Governor Frank White (1981–1983) to education was his support of a bill that put creationism on par with evolution; in doing so, White contributed to the negative reputation of Arkansas education. In his first term, Clinton stated that education was his top legislative priority, and his agenda promoted new teacher competency examinations, standardized student achievement testing, widespread consolidation, and a “fair dismissal” law to protect teacher tenure. Clinton was unsuccessful, however, in getting legislative support to raise taxes to support these reforms. In 1983, the state Supreme Court ruled in Dupree v. Alma School District that the state’s funding formula was unconstitutional. This ruling and the federal A Nation at Risk report gave momentum to Clinton’s education agenda during his second term. The Education Standards Committee, which was headed by state first lady Hillary Rodham Clinton, concentrated on bringing higher teacher quality, a more rigorous curriculum, a longer school year, and smaller class sizes to the state. Governor Clinton connected school consolidation to these new standards, and this time, he was able to raise the state sales tax by one percent to fund his reforms. The AEA stridently opposed his teacher testing initiative but ultimately benefited during this period by gaining large increases to teacher salaries. In 2001, education reform during Governor Huckabee’s administration was also affected by a school funding lawsuit, Lake View v. Huckabee, and a federal education reform initiative, the No Child Left Behind Act. In Lake View, the court again found the state’s funding system unconstitutional. As a result, the legislature enacted comprehensive legislation to modify the funding formula, increase teacher pay, improve facilities, and impose an extensive standardized testing program. The reforms enacted during Huckabee’s administration significantly improved the condition of public education in the state and the reputation of the education system. The focus of state policymakers on reforming public education continued under the administration of Governor Mike Beebe (2007–2015). For example, during the Eighty-sixth General Assembly, the state approved the largest single capital expenditure for education in Arkansas history by committing $456 million to improve school facilities. Though much progress has been made in Arkansas to improve public education in recent years, education reform in Arkansas has historically been a slow and contentious process. All three branches of government have been involved in changing education policy, but the state’s governors have perhaps been most instrumental, for better or worse, in these reforms. For additional information: Clement, R. Davis, II. “Education Reform as Moral Disengagement: The Racist Subtext of the State Takeover of the Little Rock School District.” PhD diss., College of William and Mary, 2018. Donovan, Timothy P., Willard B. Gatewood, and Jeannie M. Whayne, eds. The Governors of Arkansas: Essays in Political Biography. 2nd ed. Fayetteville: University of Arkansas Press, 1995. Johnson, Ben F. “‘All Thoughtful Citizens’: The Arkansas School Reform Movement, 1921–1930.” Arkansas Historical Quarterly 46 (Summer 1987): 105–132. Klotz, Daniel. “State Power and School Reform in Faulkner County, 1873–1931.” MA thesis, University of Central Arkansas, 2016. Ledbetter, Calvin R., Jr. “The Fight for School Consolidation in Arkansas, 1946–1948.” Arkansas Historical Quarterly 65 (Spring 2006): 45–57. McAndrews, Lawrence J. The Era of Education: The Presidents and the Schools, 1965–2001. Chicago: University of Illinois Press, 2006. Tyack, D., Thomas James, and Aaron Benavot. Law and the Shaping of Public Education, 1785–1954. Madison: University of Wisconsin Press, 1987. Marc J. Holley University of Arkansas, Fayetteville Last Updated: 10/25/2018
<urn:uuid:be1c815d-ebb5-4adf-8399-c39105025f66>
CC-MAIN-2020-16
https://encyclopediaofarkansas.net/entries/education-reform-2164/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371618784.58/warc/CC-MAIN-20200406035448-20200406065948-00235.warc.gz
en
0.964531
3,016
3.328125
3
So far, we have used Ansible to execute individual commands on all hosts in the inventory, one by one. Today, we will learn how to use playbooks to orchestrate the command execution. As a side note, we will also learn how to set up a local test environment using Vagrant. Setting up a local test environment To develop and debug Ansible playbooks, it can be very useful to have a local test environment. If you have a reasonably powerful machine (RAM will be the bottleneck), this can be easily done by spinning up virtual machines using Vagrant. Essentially, Vagrant is a tool to orchestrate virtual machines, based on configuration files which can be put under version control. We will not go into details on Vagrant in this post, but only describe briefly how the setup works. First, we need to install Vagrant and VirtualBox. On Ubuntu, this is done using sudo apt-get install virtualbox vagrant Next, create a folder vagrant in your home directory, switch to it and create a SSH key pair that we will later use to access our virtual machines. ssh-keygen -b 2048 -t rsa -f vagrant_key -P "" This will create two files, the private key vagrant_key and the corresponding public key vagrant_key.pub. Next, we need a configuration file for the virtual machines we want to bring up. This file is traditionally called Vagrantfile. In our case, the file looks as follows. Vagrant.configure("2") do |config| config.ssh.private_key_path = ['~/.vagrant.d/insecure_private_key', '~/.keys/ansible_key'] config.vm.provision "file", source: "~/vagrant/vagrant_key.pub", destination: "~/.ssh/authorized_keys" config.vm.define "boxA" do |boxA| boxA.vm.box = "ubuntu/bionic64" boxA.vm.network "private_network", ip: "192.168.33.10" end config.vm.define "boxB" do |boxB| boxB.vm.box = "ubuntu/bionic64" boxB.vm.network "private_network", ip: "192.168.33.11" end end We will not go into the details, but essentially this file instructs Vagrant to provision two machines, called boxA and boxB (the file, including some comments, can also be downloaded here). Both machines will be connected to a virtual network device and will be reachable from the host and from each other using the IP addresses 192.168.33.10 and 192.168.33.11 (using the VirtualBox networking machinery in the background, which I have described in a bit more detail in this post). On both files, we will install the public key just created, and we ask Vagrant to use the corresponding private key. Now place this file in the newly created directory ~/vagrant and, from there, run Vagrant will now start to spin up the two virtual machines. When you run this command for the first time, it needs to download the machine image which will take some time, but once the image is present locally, this usually only takes one or two minutes. Our first playbook Without further ado, here is our first playbook that we will use to explain the basic structure of an Ansible playbook. --- # Our first play. We create an Ansible user on the host - name: Initial setup hosts: all become: yes tasks: - name: Create a user ansible_user on the host user: name: ansible_user state: present - name: Create a directory /home/ansible_user/.ssh file: path: /home/ansible_user/.ssh group: ansible_user owner: ansible_user mode: 0700 state: directory - name: Distribute ssh key copy: src: ~/.keys/ansible_key.pub dest: /home/ansible_user/.ssh/authorized_keys mode: 0700 owner: ansible_user group: ansible_user - name: Add newly created user to sudoers file lineinfile: path: /etc/sudoers state: present line: "ansible_user ALL = NOPASSWD: ALL" Let us go through this line by line. First, recall from our previous posts that an Ansible playbook is a sequence of plays. Each play in turn refers to a group of hosts in the inventory. A playbook is written in YAML-syntax that you probably know well if you have followed my series on Kubernetes (if not, you might want to take a look at the summary page on Wikipedia). Being a sequence of plays, it is a list. Our example contains only one play. The first attribute of our play is called name. This is simply a human-readable name that ideally briefly summarizes what the play is doing. The next attribute hosts refers to a set of hosts in our inventory. In our case, we want to run the play for all nodes in the inventory. More precisely, this is a pattern which can specify individual hosts, groups of hosts or various combinations. The second attribute is the become flag that we have already seen several times. We need this, as our vagrant user is not root and we need to do a sudo to execute most of our commands. The next attribute, tasks, is itself a list and contains all tasks that make up the playbook. When Ansible executes a playbook, it will execute the plays in the order in which they are present in the playbook. For each play, it will go through the tasks and, for each task, it will loop through the corresponding hosts and execute this task on each host. So a task will have to be completed for each host before the next task starts. If an error occurs, this host will be removed from the rotation and the execution of the play will continue. We have learned in an earlier post that a task is basically the execution of a module. Each task usually starts with a name. The next line specifies the module to execute, followed by a list of parameters for this module. Our first task executes the user module, passing the name of the user to be created as an argument, similar to what we did when executing commands ad-hoc. Our second task executes the file module, the third task the copy module and the last task the lineinfile module. If you have followed my previous posts, you will easily recognize what these tasks are doing – we create a new user, distribute the SSH key in ~/.keys/ansible_key.pub and add the user to the sudoers file on each host (of course, we could as well continue to use the vagrant user, but we perform the switch to a different user for the sake of demonstration). To run this example, you will have to create a SSH key pair called ansible_key and store it in the subdirectory .keys of your home directory, as in my last post. Executing our playbook How do we actually execute a playbook? The community edition of Ansible contains a command-line tool called ansible-playbook that accepts one or more playbooks as arguments and executes them. So assuming that you have saved the above playbook in a file called myFirstPlaybook, you can run it as follows. export ANSIBLE_HOST_KEY_CHECKING=False ansible-playbook -i hosts.ini -u vagrant --private-key ~/vagrant/vagrant_key myFirstPlaybook.yaml The parameters are quite similar to the parameters of the ansible command. We use -i to specify the location of an inventory file, -u to specify the user to use for the SSH connections and –private-key to specify the location of the private key file of this user. When we run this playbook, Ansible will log a summary of the actions to the console. We will see that it starts to work on our play, and then, for each task, executes the respective action once for each host. When the script completes, we can verify that everything worked by using SSH to connect to the machines using our newly created user, for instance ssh -i ~/.keys/ansible_key -o StrictHostKeyChecking=no firstname.lastname@example.org Instead of executing our playbook manually after Vagrant has completed the setup of the machines, it is also possible to integrate Ansible with Vagrant. In fact, Ansible can be used in Vagrant as a Provisioner, meaning that we can specify an Ansible playbook that Vagrant will execute for each host immediately after is has been provisioned. To see this in action, copy the playbook to the Vagrant directory ~/vagrant and, in the Vagrantfile, add the three lines config.vm.provision "ansible" do |ansible| ansible.playbook = "myFirstPlaybook.yaml" end immediately after the line starting with config.vm.provision "file". When you now shut down the machines again using from within the vagrant directory and then re-start using you will see that the playbook gets executed once for each machine that is being provisioned. Behind the scenes, Vagrant will create an inventory in ~/vagrant/.vagrant/provisioners/ansible/inventory and will add the hosts there (when inspecting this file, you will find that Vagrant incorrectly adds the insecure default SSH key as a parameter to each host, but apparently this overridden by the settings in our Vagrantfile and does not cause any problems). Of course there is much more that you can do with playbooks. As a first more complex example, I have created a playbook that - Creates a new user ansible_user and adds it to the sudoer file - Distributes a corresponding public SSH key - Installs Docker - Installs pip3 and the Python Docker library - Pulls an NGINX container from the Docker hub - Creates a HTML file and dynamically add the primary IP address of the host - Starts the container and maps the HTTP port To run this playbook, copy it to the vagrant directory as well along with the HTML file template, change the name of the playbook in the Vagrantfile to nginx.yaml and run vagrant as before. Once this script completes, you can point your browser to 192.168.33.10 or 192.168.33.11 and see a custom NGINX welcome screen. This playbook uses some additional features that we will discuss in the next post, most notably variables and facts.
<urn:uuid:97dc54ff-2fe8-42b4-a65f-0d55ef7eeda3>
CC-MAIN-2020-16
https://leftasexercise.com/2019/11/22/automating-provisioning-with-ansible-playbooks/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371824409.86/warc/CC-MAIN-20200408202012-20200408232512-00035.warc.gz
en
0.893517
2,264
2.640625
3
According to one survey from the U.K., women change their hairstyles about 150 times over the course of a lifetime. However many times you make the change, it’s likely that coloring is a part of the process. It’s not required, of course. These days, white hair is in vogue, with celebrities like Helen Mirren, Jamie Lee Curtis, and Meryl Streep all embracing their natural silver. Still, about 65 percent of women alter their natural hair color, about a 7 percent increase from the 1950s. We like playing with color. It makes us feel good…until we open the bottle and smell all the fumes. Traditional hair dyes are full of potentially harmful chemicals that at high exposures, have been linked with skin and respiratory irritation, a suppressed immune system, and even cancer. Is there a way to cover the gray—or just enjoy a nice color—without exposing ourselves to these toxic chemicals? The concern about regular hair dyes The National Cancer Institute (NCI) states that over 5,000 different chemicals are used in hair dye products, some of which are reported to be carcinogenic in animals. Though manufacturers have improved beauty products to eliminate some of the more dangerous chemicals that were used in the 1970s, most still contain less-than-savory ingredients. Chemicals found in hair dyes: - Quaternium-15, which can release formaldehyde, a known carcinogen - Alkylphenol ethoxylates (APEs), which may be hormone disruptors - Phenylenediamine (PPD), which is a skin and respiratory irritant and has been classified in the European Union as toxic and dangerous to the environment The NCI notes that some studies have found that hairdressers and barbers are at an increased risk of bladder cancer, potentially because of coloring chemicals. Other studies have found personal use of chemical dyes could potentially increase the risk of leukemia and non-Hodgkin lymphoma, but results have been mixed. We aren’t risking it When we review the research, we can see that we don’t have enough studies yet to know how coloring our hair maybe 6-10 times a year really affects our health. Most likely—unless we’re hairdressers who deal with high exposures or we color more frequently than usual—the effects will be negligible. Still, it’s not comforting to imagine all those chemicals seeping into our scalps from dyed hair (not to mention the toll that the creation and disposal of these chemicals takes on the environment). Fortunately, there are other natural hair color alternatives. Coloring your hair naturally You natural beauty deserves natural products and it turns out we can use a lot of natural ingredients for hair care—some of which we can find in our kitchens—to create new hair color. It depends on what color you’re looking for, how intense you want it, and how much time you want to spend. Keep in mind that natural color products are not the same as chemical color products. They don’t usually last as long, you won’t be able to completely change your natural color, and the color may be slightly different than you imagined. (Of course, that often happens in the salon, too!) It may take some time and experimentation to get the color you’re looking for, but meanwhile you’ll actually be doing something good for your hair. A few helpful beauty tips First, if you’re not sure you’re brave enough to try the following home remedies on your entire head of hair, save some from your next trim or cut off a few locks and test a small amount of natural dye first. Next, always rinse out your color with apple cider vinegar to help the color last longer. Try rinsing with a vinegar/water solution, or mix one-tablespoon apple cider vinegar with about a cup of water in a spray bottle and apply after coloring hair—don’t rinse. 7 ingredients to color your hair naturally Coffee works great if you’re looking to go darker, cover gray hairs, or add dimension to dark tresses. Simply brew a strong coffee (espresso works well), let it cool, and then mix one cup with a couple cups of leave-in conditioner and 2 tablespoons of coffee grounds. Apply on clean hair and allow to sit for about an hour. If you use apple cider vinegar to rinse, it will help the color last longer. You may need to repeat the process a couple times to see noticeable results. Like coffee, black tea can help you go darker, and can also help cover gray hairs. If you have lighter hair, though, there are other types of tea you can use. Chamomile, for example, is recommended for blondes, while rooibos may work for redheads. Do keep in mind that tea works best with your natural color. You won’t be able to turn blonde hair to brunette or black hair. But black tea can darken blonde hair and chamomile can lighten it—especially if you sit in the sun while you have it in. The longer you leave the tea on the hair, the more noticeable the color will be. You can also try repeated applications. The key is to make the tea highly concentrated. Use 3-5 teabags (or about the same amount in loose-leaf tea) for two cups of water. You can apply the cooled tea to hair alone, or mix with conditioner (as noted in the coffee recipe). If you’re seeking to cover grays, mix with some fresh or dried sage, which helps open up the hair follicles. Leave on hair for at least an hour—more if you want more color. Some even put on a cap and wear the tea overnight, then rinse the following morning. Check your color to determine what intensity you need. Depending on what color you’re going for, you can use a variety of herbs to achieve it. Here are some suggestions, depending on what your natural color is: Red hair: Try calendula, marigold, rosehips, and hibiscus to deepen the red shade or add a few red highlights. The effects are cumulative—if you keep using the dye regularly, you will notice more color. Simmer the flowers in water for about 30 minutes, strain, cool, and then spray or pour on hair and allow to dry in the sun if possible. Brunette/dark hair: Rosemary, nettle, and sage are all great herbs for dark hair. Simmer all three with water for 30 minutes, cool, strain, and spray or brush through hair. Allow to sit about an hour. You can also use the rinse daily after your shower. Be patient—it may take several days to notice a difference. Blonde hair: As mentioned above, chamomile tea works, but you can also try calendula, marigold, saffron, and sunflower petals. To hide grays, try rhubarb root in two cups of water, simmer, strain, and pour over hair. Add black tea to the darker colors above to help the color last longer. Catnip works for lighter colors. 4. Beet and Carrot Juice These two juices can add natural red tints to your current color. Depending on what shade you want, you can use each alone, or mix them together. For a more reddish tinge, use more beet juice (strawberry blonde, deeper red, or auburn). Carrot will produce a quieter reddish orange. This one is easy—simply apply about a cup of the juice to your hair. You can also mix in some coconut oil or olive oil to condition dry hair at the same time. Work it through, wrap hair, throw on a shower cap and leave on for at least an hour. (These juices stain—wear something to protect your skin and clothes.) Rinse the juice out, and seal with an apple cider vinegar spray. If the color isn’t dark enough, repeat the next day. One of the most popular natural hair dye ingredients, henna is a powdered form of the leaves that come from the henna plant. These leaves have a natural and effective coloring pigment that has been used for thousands of years to dye hair, nails, and skin. Natural henna, on its own, creates a red-orange color, so if you see products offering other colors produced with henna, realize the manufacturers have mixed the henna with other ingredients to achieve those colors. Redheads and brunettes (looking for a bit of auburn) are the best candidates for henna hair color. Be careful with this one—the results can be more orange than you’d like, so you may want to mix a little chamomile in with the paste to tame the color. To make your own henna hair dye, mix about one cup of henna powder with 2 cups lemon juice. You can also add in a tablespoon of vinegar to help release the color. Allow to sit about 4-6 hours until it thickens. Apply to hair and comb through. (This is messy so be prepared!) Wrap your hair in plastic wrap and allow to sit 2-3 hours before rinsing. 6. Lemon juice Looking for a few highlights? Try fresh-squeezed lemon juice sprayed and brushed through hair. Leave on for several hours. If you sit in the sun, you’ll notice more lightening. Blondes can enjoy even more lightening by mixing with chamomile tea. Lemon juice works slowly, so expect to repeat applications several times before seeing results. 7. Walnut shells If you want to secure a dark brown color, this is the natural way to go for dyeing. Crush the walnut shells and boil for about half an hour. Cool, strain, and apply to hair. If you’re wanting to cover grays, you can use a cotton ball to apply only to those areas where it’s needed. Again, be careful as this dye will stain everything, so take precautions. To create a more intense dye, return the strained juice to the heat and boil until it’s simmered down to about a quarter of the original volume. Allow to cool in the refrigerator, strain if needed, and pour through hair. To save time, use walnut powder instead of the shells. Let sit for at least an hour (more if you want more color), and rinse. Try to avoid really hot water as it can take the color away. Wash in lukewarm to make the color last longer. Share this postnatural hair care
<urn:uuid:5464a29e-e278-4b5c-baf9-6029e258eeb2>
CC-MAIN-2020-16
https://dutchhealthstore.com/color-your-hair/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00556.warc.gz
en
0.924878
2,255
2.75
3
Horsemanship Level 4: Conformation & Unsoundness pt I Beauty may be in the eye of the beholder, but good conformation is a matter of physics. A horse that is well-built for his job will stay sound and perform better than one that has poor conformation. For Level 4 we want you to be able to identify: 6. Positive & negative aspects of own horse; type; bone. Lameness: which leg and where. Once more this is a huge topic that I’ll break into three parts, considering type and bone this week, overall conformation next post, and finally how to identify lameness. Just as a marathon runner, sprinter, and weightlifter all have vary different body types, so too do horses who are bred for different jobs. All modern horses and ponies are descended from four types of ponies: the European type (eg Exmoor), Asian type (eg Mongolian Horse), Desert type (eg Ahkal-Teke), and Proto-Arabian. Centuries of selective breeding have created horses that are taller, lighter, heavier, shorter or more refined than their ancestors, but they can be categorized into three groups: Heavy Horses, Light or Riding Horses, and Ponies. The technical definition of a pony is any horse 14.2 hands high (a hand is 4″ or 10cm) or under. However, the pony type tends to be stocky, with good bone (see below), and is generally hardier than its more refined cousins. Thus an Arabian or Quarter Horse who is 14 hh may be considered a pony for competition purposes, but is not likely to be a pony type. With their sturdy build, ponies can often carry much larger loads in relation to their size than light horses can: hence the Icelandic and Fjord horses that carried Vikings into battle, or the even smaller Highland ponies that carried Scottish warriors and their gear over mountains and dales. Bred for heavy labour, draught horses are the weightlifters of the equine world. They have excellent bone, heavy muscling, wide chests, long shoulders to fit a collar, broad backs, and powerful hindquarters. They tend to be built ‘uphill’: that is the point of hip is lower than the point of the scapula (not the croup to withers line, which can be deceptive). This allows them to lean into their collars and drop the hindquarters for more power in the pull. Light horses are all the rest, who are neither ponies nor heavy horses. However, within the category of riding horses, there are sub-types. - Arabian type. Almost all modern breeds have been improved with the addition of Arabian blood, and there are several different strains of the Arabian breed. In addition to the characteristic dished face, flat croup and high-set tail, Arabic type horses are small, tend to the lean side, have thin legs but denser bone than most warmbloods, and have short backs (some, but not all, purebred Arabians have one fewer vertebra and rib pair). They are known for their speed and stamina, making them the top choice for endurance riders. They are the marathon runners of the horse world. - Racehorses. Thoroughbreds and Quarter Horses are bred for maxium speed, the latter being descended from the former. With its long legs and laid-back shoulder, the Thoroughbred is a distance runner, while the Quarter Horse, with its powerful hind end, is a sprinter. Both breeds are built ‘downhill’ which allows the hind end to come farther forward in relation to the front during the gallop. A downhill build is not ideal for a riding or dressage horse — it makes it more difficult for the horse to transfer weight to the hindquarters for collection and lateral movement — but nonetheless both breeds are extremely capable pleasure and sport horses. - Hunter type. A hunter is any horse suitable for carrying a rider across varied terrain over fences and natural obstacles. Hunters tend to heavier bone and a more level build than racehorses. They need a long, well-set neck for balance when jumping, moderate hip angles, and long forearms to short cannons for a longer, smoother stride. The type is not breed-specific, though Warmbloods with a good proportion of Thoroughbred blood tend to excel, and some purebred Thoroughbreds are built more like hunters than racehorses. In human terms, a Hunter type resembles a high-jumper. - Sport Horse. This relatively new designation has its own registry. It is similar to the Hunter type, but with more of an emphasis on all-round performance for disciplines like eventing. Think of them as decathletes. Pleasure horse. A pleasure horse is just what it sounds like: a horse that is comfortable and pleasurable to ride. It can be any breed, though smooth gaits, a level build, and a steady temperament are all desirable. Gaited horses — that is, horses that can amble, tolt, fox-trot, etc. — make excellent pleasure horses because of their comfortable gaits. They are not Olympic athletes: in human terms they are your moderately fit non-competetive adult. - Baroque type. These horses are most similar to the mediaeval destrier. They are moderate in size, with a level or uphill build, high-set and cresty neck, and round, compact body. Lippizaners, Knapstruppers, Andalusians (PRE) and Canadians are all considered Baroque Horses. The gymnasts and dancers of the horse world, they are ideally built for dressage and mounted combat. ‘Bone’ is measure of the thickness of a horse’s cannon bones. It is also a way of describing the animal’s carrying capacity and sturdiness. A horse with good bone will theoretically be able to carry a larger load and stay sound longer than a horse that is ‘light of bone’. A circumference of 8″ or more just below the knee is considered adequate bone for a horse that weighs 1000 lbs. Other factors affect the weight a horse can bear: short, wide loins can carry more than long flexible backs; native ponies tend to have a greater carrying capacity than the average 20% of body weight; and Arabians have denser bones, and thus can get away with smaller circumference legs. Choosing a horse that is built for the job you want to do will certainly lend success to your equine endeavours. However, bear in mind that horses are naturally athletic and very trainable, which means that almost any horse can be schooled for any discipline. Correct riding and training go a long way to make up for shortcomings in type. However, good structural conformation — the topic we will examine next week — is the most important consideration for long term soundness and performance. Current & Upcoming Classes This six-week series will teach you to groom, tack up, and handle your horses as well as getting you started in the saddle. By the end of six weeks you should be ready to test for Horsemanship Level 1, and a second run through the course will get most people to Riding Level 1. Choose between Saturday or Sunday classes — or take both to get you to your goal twice as fast! The Level 2 course covers the same topic areas as Level 1 but in greater depth. You will progress through the Horsemanship Level 2 curriculum while continuing to work on achieving your Riding Levels 1 or 2. If you are unsure whether you should sign up for Level 2 or Beginner, just pick the class which has space. The courses run simultaneously and riders are informally assessed during the first class, with placements shuffled to make sure everyone is riding with a group of the appropriate level. This six-week course is intended to get you through either Level 3 or Level 4 Horsemanship, but there are no prerequisites. That means anyone who wants to learn about saddlery, vet & first aid, grooming, foot & shoeing and other stable management topics can take the course. A great way to learn about horse care, taught by certified Pony Club alumni. Welcome to the Open class! Here you will further hone your riding skills, adding jumping, cross country, quadrille and mounted games work as you work towards your next riding level. Mounted Combat Fundamentals Prepare to take this course more than once if you are just starting out with the longsword. While the five-week course does cover all the areas of Mounted Combat Skills for the Green Spur, most people will require further longsword and/or grappling work either through additional iterations of the course, or by supplementing with Longsword Fundamentals or Mastery classes. Even if you have signed off all the points in your Green Spur checklist, there are more skills to develop through working from the ground. Students who have been through the course before will be given more advanced drills to work on, and may be able to join the ground sections of the Intermediate class during clinic time. Sundays 13 Mar – 17 Apr, 1:30 – 3:00pm cost: $120 for 5 classes Intermediate Mounted Combat Students in this five-week class will spend approximately an hour and a quarter each week working from horseback on longsword, spear, and grappling skills, as well as mounted games and general riding exercises. The remainder of the class is taken on the ground and from the falsemount, working on more advanced weapon and unarmed skills. Students should have their horses tacked up and warmed up ahead of class to maximize training time. Sundays 13 Mar – 17 Apr, 1:00 – 3:00pm cost: $140 for 5 classes Mounted Combat Playday If you have a minimum of Riding Level 1 you can participate in our upcoming Mounted Combat Playday on April 2nd. If you don’t, come out and lend a hand setting up games, keeping time, and cheering on our riders! Sunday 3 April, 1:30 – 4:30pm cost: $15 + $15 for use of school horse Spectators free, and volunteers welcome!
<urn:uuid:5c70b0a1-e3be-4b4b-a9ff-6d1f36211157>
CC-MAIN-2020-16
https://www.academieduello.com/news-blog/an-eye-for-conformation/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505366.8/warc/CC-MAIN-20200401034127-20200401064127-00516.warc.gz
en
0.945399
2,123
2.890625
3
voir la définition de Wikipedia |Oklahoma Supreme Court| The Supreme Court used to meet in the Oklahoma State Capitol |Location||Oklahoma City, Oklahoma| |Composition method||Gubernatorial appointment with non-partisan statewide retention| |Authorized by||Oklahoma Constitution| |Decisions are appealed to||Supreme Court of the United States| |Judge term length||Life, renewable every 6 years| |Number of positions||9| |Currently||Steven W. Taylor| |Lead position ends||2013| |Jurist term ends||2016| This article is part of the series: Other countries · Atlas The court consists of the Chief Justice of Oklahoma, a Vice-Chief Justice, and seven Associate Justices, who are nominated by the Oklahoma Judicial Nominating Commission and are appointed by the Governor. After appointment, the justices serve until the next general state election. At that time, they must face a retention election. If retained, they begin a six-year term. After their first term, justices must file for direct election from the people of Oklahoma to retain their position. Unlike the Supreme Court of the United States, the Oklahoma Constitution specifies the size of the Supreme Court. However, the legislature maintains the power to fix the number of justices. According to Article VII, section 2 of the Oklahoma Constitution, the Supreme Court shall consist of nine justices, one justice from each of the nine judicial districts of the State. Each justice, at the time of his or her election or appointment, must be at least thirty years old, a registered voter in the Supreme Court judicial district they represent for at least one year before filing for the position, and a licensed practicing attorney or judge (or both) in Oklahoma for five years before appointment. The potential justice must maintain certification as an attorney or judge during his or her tenure in office in order to main their position. Potential justices who meet these requirements must submit their names to the Oklahoma Judicial Nominating Commission (JNC) to verify that they will serve if appointed. In the event of a vacancy on the Supreme Court, after reviewing potential justices, the JNC shall submit three names to the Governor, of whom the governor appoints one to the Supreme Court to serve until the next general state election. However, if the governor fails to appoint a justice within sixty days, the Chief Justice of Oklahoma may appoint one of the nominees, who must certify their appointment to Secretary of State of Oklahoma. Each time a Justice of the Supreme Court is elected to retain his or her position in the general state elections, he or she continues to serve for another six years in office with a term beginning on the second Monday in January following the general election. Justices appointed to fill vacancies take office immediately and continue to serve in their appointed posts until the next general election. To be eligible to stand for reelection, justices must, within sixty days before the general election, submit their desire to stand for reelection to the Secretary of State. The justice is then put to election by the people of Oklahoma. If the majority votes to maintain the justice, the justice will serve for another six-year term. However, if the justice declines reelection or the voters vote the justice down, the seat on the Supreme Court shall be considered vacant at the end of the current term and the Judicial Nominating Committee must search for a potential replacement. Justices who have failed to file for reelection or were not retained by the people in the general election are not eligible to immediately succeed themselves. Retention in office may be sought for successive terms without limit as to number of years or terms served in office. Section 4 of Article VII of the Oklahoma Constitution outlines the jurisdiction of the Supreme Court of Oklahoma. The appellate jurisdiction of the Supreme Court is co-extensive with that of the state's borders. The Court's jurisdiction applies to all cases "at law and in equity," except criminal cases, in which the Court of Criminal Appeals has exclusive appellate jurisdiction. If in any event there is any conflict in determining which court has jurisdiction, the Supreme Court is granted the power to determine which court has jurisdiction, with no appeal from the Court’s determination. Along with Texas, Oklahoma is one of two states to have two courts of last resort; the Oklahoma Supreme Court decides only civil cases, and the Oklahoma Court of Criminal Appeals decides criminal cases. The Oklahoma Supreme Court has only immediate jurisdiction with respect to new first-impression issues, important legal issues, and cases of great public interest. In addition to appeals from the trial courts, the Oklahoma Supreme Court has jurisdiction over all lower courts, excluding the Oklahoma Court on the Judiciary, and the Oklahoma Senate, when that body is sitting as a Court of Impeachment. Judgments of the Oklahoma Supreme Court with respect to the Oklahoma Constitution are considered final. This authority includes the power to temporarily assign any judge to a court other than that for which he was selected. The Supreme Court also maintains the power to appoint an administrative director and staff. This director serves at the pleasure of the Court to assist the Chief Justice in his administrative duties and to assist the Court on the Judiciary when the Court on the Judiciary calls upon the office’s administrative powers. The Supreme Court has power to issue, hear and determine writs of habeas corpus, mandamus, quo warranto, certiorari, prohibition and such other remedial writs as may be provided by law and may exercise such other and further jurisdiction as may be conferred by statute. Any justice on the Court make issue the writ of habeas corpus to any person held in custody upon petition by or on behalf of that person. Such writs can be made to appear before the justice who wrote it, the Oklahoma Supreme Court (or other Appellate Courts), any District Court, or any judge in the State. Aside from hearing cases, the Supreme Court is also responsible for administering the state's entire judicial system, establishing rules of operation for all other courts in the state. The Supreme Court formulates the rules for the practice of law, which govern the conduct of all attorneys, and it administers discipline in appropriate cases. Additionally, many of the justices make personal appearances to speak to members of the bar, civic clubs, and educational groups. These appearances are made to help citizens understand the Court's workings and decision-making process. Justices are also called upon to administer official oaths of office to public officials. Judicial officers are charged with maintaining the integrity and independence of the judiciary. All justices and judges are required to be nonpartisan and are forbidden from using their office or powers to promote or assist any private interest. To maintain their non-partisanship, justices and judges may not hold offices in political parties; make speeches for candidates; or make, directly or indirectly, contributions to campaigns of any candidate for any elected or appointed office. Justices and judges are also forbidden from campaigning for their own reelection unless there is an active opposition to their retention of office. Even if a justices or judges are actively campaigning for retention, they can not personally raise funds for their campaign. The Justices of the Oklahoma Supreme Court are: |Justice||District||Appointed||Governor||Law School||Birth City| |Chief Justice Steven Taylor||2nd||2004||Brad Henry||University of Oklahoma||Henyretta, OK| |Vice-Chief Justice Tom Colbert||6th||2004||Brad Henry||University of Oklahoma||Oklahoma City, OK| |Yvonne Kauger||4th||1984||George Nigh||Oklahoma City University||Colony, OK| |Joseph Watt||9th||1992||David Walters||University of Texas||Austin, Texas| |James Winchester||5th||2000||Frank Keating||Oklahoma City University||Clinton, OK| |James Edmondson||7th||2003||Brad Henry||Georgetown University||Kansas City, MO| |John Reif||1st||2007||Brad Henry||University of Tulsa||Skiatook, OK| |Doug Combs||8th||2010||Brad Henry||Oklahoma City University||Shawnee, OK| |Noma Gurich||3rd||2011||Brad Henry||University of Oklahoma||South Bend, IN| Contenu de sensagent dictionnaire et traducteur pour sites web Une fenêtre (pop-into) d'information (contenu principal de Sensagent) est invoquée un double-clic sur n'importe quel mot de votre page web. LA fenêtre fournit des explications et des traductions contextuelles, c'est-à-dire sans obliger votre visiteur à quitter votre page web ! Solution commerce électronique Augmenter le contenu de votre site Ajouter de nouveaux contenus Add à votre site depuis Sensagent par XML. Parcourir les produits et les annonces Obtenir des informations en XML pour filtrer le meilleur contenu. Indexer des images et définir des méta-données Fixer la signification de chaque méta-donnée (multilingue). Renseignements suite à un email de description de votre projet. Jeux de lettres Lettris est un jeu de lettres gravitationnelles proche de Tetris. Chaque lettre qui apparaît descend ; il faut placer les lettres de telle manière que des mots se forment (gauche, droit, haut et bas) et que de la place soit libérée. Il s'agit en 3 minutes de trouver le plus grand nombre de mots possibles de trois lettres et plus dans une grille de 16 lettres. Il est aussi possible de jouer avec la grille de 25 cases. Les lettres doivent être adjacentes et les mots les plus longs sont les meilleurs. Participer au concours et enregistrer votre nom dans la liste de meilleurs joueurs ! Jouer Dictionnaire de la langue française La plupart des définitions du français sont proposées par SenseGates et comportent un approfondissement avec Littré et plusieurs auteurs techniques spécialisés. Le dictionnaire des synonymes est surtout dérivé du dictionnaire intégral (TID). L'encyclopédie française bénéficie de la licence Wikipedia (GNU). Changer la langue cible pour obtenir des traductions. Astuce: parcourir les champs sémantiques du dictionnaire analogique en plusieurs langues pour mieux apprendre avec sensagent. calculé en 0,110s
<urn:uuid:b3046c3b-4374-4d46-b0dc-7be24d91a5bb>
CC-MAIN-2020-16
http://dictionnaire.sensagent.leparisien.fr/Oklahoma%20Supreme%20Court/en-en/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497042.33/warc/CC-MAIN-20200330120036-20200330150036-00236.warc.gz
en
0.782732
2,325
3.3125
3
Drones Used By Conservation To Track The Japanese Whale Killing Ships The Sea Shepherds, the sea conservationists, have now been given two wonderful tools, eyes that can see from huge distances. These wonderful eyes are called Drones and one of these drones, have picked up from the skys, the evil Japanese whale butcher ship, the Nisshin Maru heading for the whale sanctuary. This year, the Japanese have sent out to the Antarctic Southern Ocean Whale Sanctuary seven ships, these ships are going to kill and slice up our innocent family loving whales. Conservationists all voluntary are going to try and stop the Japanese from doing this, guided by probably the worlds most experienced Antarctic whale protector, Captain Paul Watson, whom I'm pleased to say is a friend of mine and always finds time to talk to everyone. Japanese Security Guards on the Shonan Maru no 2 making it's way to the Antarctic Southern Ocean Whale Sanctuary. Japan is going ahead with the whale killing expedition, despite the disastrous falling demand for whale meat, which is also heavily contaminated with mercury and is a severe health risk. The Australian - Japanese Whaling Season Slammed The United States, Australia, New Zealand and the Netherlands say they are "disappointed" over the start of Japan's annual whale hunt off Antarctica and warned against violent clashes. Japanese ships operating in the icy waters of the Southern Ocean have in recent years faced interference from the US-based militant environmentalist group Sea Shepherd, with repeated confrontations on the open seas. The United States and its partners said while they supported the right to peaceful protest, any violence between whalers and demonstrators was unacceptable. "The Governments of Australia, the Netherlands, New Zealand, and the United States jointly condemn any actions that imperil human life in the Southern Ocean, "they said in a joint statement released by the US State Department. "We are deeply concerned that confrontations in the Southern Ocean will eventually lead to injury or loss of life among protesters, many of whom are nationals of our countries, and whaling crews," they said. "We remain resolute in our opposition to commercial whaling, including so-called 'scientific' whaling, in particular in the Southern Ocean Whale Sanctuary...and are disappointed about the recent departure of the Japanese whaling fleet for the Southern Ocean." Commercial whaling is banned under an international treaty but Japan has since 1987 used a loophole to carry out "lethal research" on the creature in the name of science. Japan has claimed it is necessary to substantiate its view that there is a robust whale population in the world. It makes no secret of the fact that whale meat from this research ends up on dinner tables and in restaurants. Anti-whaling nations and environmentalist groups routinely condemn the activity as a cover for commercial whaling. Japanese ships cut short their 2010-2011 hunt in February, blaming interference from protesters. The four nations hit out at Japan's claim it is carrying out research, saying they "wish to emphasize that lethal techniques are not required in modern whale conservation and management." "We will continue to engage on this matter," the four nations pledged, reaffirming their commitment to the "global moratorium on commercial whaling." The Japanese fleet aims to catch around 900 minke and fin whales this season, according to a plan submitted by the government to the International Whaling Commission. Email to Mr Jim Paice MP Dear Mr Paice, I wrote to you on 24th October 2010. I want to know what measures have been taken to label food in shops and supermarkets showing that meat has been slaughtered in the no-stunning Halal and Jewish way, ie. On labels, This animal (or bird) has been slaughtered by having it's throat cut and without being stunned. Would you please be so kind, as to forward me a copy of the Regulations, 1099,2009. You advised me over 12 months ago, that these regulations would come into force in about 12 months time. I understand 1st January 2013 is the date, that they will come into effect. Now back to ethics again. Muslims and Jews slaughter by the knife without stunning. This type of slaughter is barbaric and has no place in the 21st Century and you know this Mr Paice. We don't hurt animals and cause them unnecessary pain in this country. We cannot allow people to continue their cruel ways, religion or no religion. The average UK public is hoffied that this is going on and others don't know that it is going on and when you tell them about the religious slaughter and the meat that they may be eating, they are horrified. Mr Paice you cannot make any exemptions when cruelty is involved. The Muslims want Sharia law, but we don't give in to them, it's UK law only. I strongly recommend, that you follow the paragraph in your letter to me which goes as follows:- "the laws governing animal welfare at slaughter in both EU and UK require animals to be stunned before slaughter", I also like what you say in the following paragraph of your letter, "we would prefer to see all animals stunned before slaughter". Now Mr Paice make a law enforcing this. You cannot make an exception, when it comes to cruelty, for barbaric rituals, which go back years and years, in fact, over a thousand years. You are a dog lover Jim, cut your dogs throat and watch him die, could you do it? I'll leave you to answer that question. When people come into this country, or practice religions, they should comply with our UK no cruelty to animals laws. Just before I close, I am given to understand that individual member states can impose stricter rules, or prohibit religious slaughter, from 1st January 2013, regulation 1002/2009, from this date is your chance to stop this barbaric cruelty. Thank you for taking the time to read this letter and I await your reply Green Leader Bob Brown Defends Whales Bob Brown, the Australian Green's leader says, "Japanese whaling action in the USA Federal Court could back fire and help to bring an end to whaling in the Antarctic Southern Ocean Whale Sanctuary." Japanese whalers are seeking an injunction against the Sea Shepherds and Paul Watson in the US Federal Court in Seatle. The Greens in Australia are taking this court case seriously. Senator Bob Brown say's, "the US legal action could compliment legal action brought by Australia against Japan in the International court of Justice", Bob Brown goes on to say, "that the Australian Government should take this opportunity to intervene", "Japan has gone to an International court - effectively the US - and Australia should use this opportunity to bring forward a case, which may have otherwise taken years, to have Japan found guilty of its breach of international law, by killing whales in the first place". Bob Brown also said, "here now is a great opportunity to have the whaling fleet stopped in its tracks, through this action (the US case) rebounding on Japan, when it goes to the court in Seatle". A spokesman for the Japanese Institute for Cetacean Research, Gavin Carter say's, "The US court action is designed to improve safety". GreenEcoPeace say's, "the only danger to safety in the Antarctic Southern Ocean Whale Sanctuary is the ferosity of the Japanese whale killers, determined to kill at any cost, 1000 of our innocent whales. They don't want the conservationists to stand in the way of them doing this, as the death of a whale means money to them, approximately $100,000 per whale. 200 million years of prehistoric whales, slaughtered for a mere $100,000 and never to be replaced. Such a valuable loss to our eco system and our children of the future. Japan Suing Conservationists In USA From Tokyo. Japanese whaling authorities said on Friday 9th December 2011 that they are suing the conservation Sea Shepherds and its head in the United States, in a bid to stop the conservationists interfering with their whale killing hunt. GreenEcoPeace say's, at last the Japanese are admitting that they are hunting whales to kill. It is illegal to kill whales for commercial use and thats exactly what the Japanese do. Friday 9th December 2011, Kyodo Senpaku Kaisha and the Institute of Cetacean Research, along with research vessels, masters, filed a lawsuit against the Sea Shepherds and their head, Captain Paul Watson. GreenEcoPeace say's the Cetacean Research is Fake Research, whale meat coming back in kilo packs is not research. Kyodo Senpaku owns ships, while the Cetacean Institute operates the whaling programme under the authority of the Japanese Government. Paul Watson say's that the United States Government and courts have no authority over these conservation ships as they are not USA flagged. Japan Shameful & Blackmail. Greenpeace The Environment group Greenpeace say's that 18 non-governmental organizations have signed an open letter protesting Japans move to use nearly $30 million in Earthquake and Tsunami Relief Funding to boost security measures for its Antarctic Whale Harvest. As news of the letter spread on Wednesday 7th December 2011, an official of Japans Fisheries said, "the funding for extra whaling fleet security is aimed at ensuring safer hunts", he told the French news agency "the expenditure will also help coastal towns dependant on the whale harvest to recover from the March 2011 twin disasters. GreenEcoPeace say's, we thought that the whale killings, according to the Japanese was for research and not as a harvest. Greenpeace accused the Government of Prime Minister Yoshihiko Noda of syphoning money from the disaster victims at a time such funding is needed the most. Greenpeace called the whaling programme "Shameful" and a "Blackmail" on Japans international reputation. The Japanese coast guard said earlier, that it would deploy an unspecified number of guards and a patrol vessel to protect this years whaling. Good News The conservation ships will now be leaving in a few days time, as helipcopter pilot Chris Aultman, has now received his visa. The Green Party Australia, GreenEcoPeace, the public and conservationists successfully lobbied the Australian Government, to get them to change their minds, in favour of giving Mr Chis Aultman his visa. The three Sea Shepherds, conservation ships, will be shortly heading towards the Antarctic Southern Ocean Whale Sanctuary, to defend our precious prehistoric sentient whales. Japanese Whale Killing Ships Leave Japanese whale killing ships leave Shimonoseki Japan for the Antarctic Southern Ocean Whale Sanctuary to kill at least 1000 of our wonderful sentient whales, for their commercial market which is illegal. The Japanese coast guard has deployed an unspecified number of guards along with a patrol ship to heavily protect the Japanese whale killing ships from the conservationists. The Japanese Government has given 30 million Australian Dollars for this protection. In the past the Japanese whalers have rammed, used water cannon, shot at and have used concussion grenades and bamboo spears against the conservationists. Japan Uses Earthquake Money for Whaling The Japanese Government has confirmed that it is using some of the public funds earmarked for reconstruction after the massive March earthquake and tsunami to boost the security for the whale killing slaughter, GreenEcoPeace say's, these funds were for the suffering people and not to fund a disgusting whale hunt. We are a non-profit organisation and welcome any kind of support. If you would like to support us, please check out the support us page for more information. Tel: +44 7951117828 Or use our contact form.
<urn:uuid:5da028dd-331d-4b11-ba5e-771764b7e0c1>
CC-MAIN-2020-16
http://www.greenecopeace.co.uk/news/archive-news/december-2011/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00075.warc.gz
en
0.954035
2,407
2.703125
3
Influenza is a major cause of morbidity and mortality each year in the UK. Vaccination has been available since the late 1960s. It is offered annually to patients aged over 65 years, and to all those aged between 6 months and 65 years in clinical at-risk groups identified by the Department of Health (DH). In the 2018/19 flu season, flu vaccine should also be offered to all children who are aged 2 and 3 years on August 31 2018, as well as all those in primary school reception and years 1-5, in addition to all primary school-aged children in former primary school pilot areas. The World Health Organization (WHO) monitors influenza viruses throughout the world and recommends which strains are to be included in the current year's vaccine. It is recommended that quadrivalent vaccines (QIVs) for use in the 2018-2019 northern hemisphere influenza season contain the following: - An A/Michigan/45/2015 (H1N1)pdm09-like virus. - An A/Singapore/INFIMH-16-0019/2016 (H3N2)-like virus. - An B/Colorado/06/2017-like virus (B/Victoria/2/87 lineage). - A B/Phuket/3073/2013-like virus (B/Yamagata/16/88 lineage). It is recommended that the influenza B virus component of trivalent vaccines for use in the 2018-2019 northern hemisphere influenza season be a B/Colorado/06/2017-like virus of the B/Victoria/2/87-lineage. In the UK for the 2018-19 season: The adjuvanted trivalent vaccine (aTIV) should be given to all aged 65 and over. Since aTIV was only licensed for use in the UK in August 2017, this was not an option for the 2017/18 season. However the Joint Committee on Vaccination and Immunisation (JCVI) advice is that this is now the best option for 2018/19 for the 65+ age group. The rationale given by Public Health England (PHE) for this choice is that the adjuvanted vaccine has been shown to be significantly more effective in adults aged 65 and over, with those over 75 benefiting the most. The quadrivalent vaccine (QIV) should be given to 18- to 65-year-olds at increased clinical risk (including pregnant women). In light of an independent cost-effectiveness study into QIV undertaken by PHE and considered by JCVI, the Green Book was updated in October 2017 to provide the advice that QIV is the best option for 18-65 at-risk groups in the 2018/19 season. It is also used for the childhood programme. Method of administration - Vaccines are normally given intramuscularly (IM) into the upper arm or anterolateral thigh. - The live attenuated influenza vaccine (LAIV), Fluenz Tetra®, is a nasal spray used for children aged 2-18 years. - If patients have a bleeding disorder (eg, haemophilia), deep subcutaneous injection is appropriate. - Influenza vaccine can be given with other vaccines, preferably in different limbs. If both vaccines have to be given in the same limb, the sites should be at least 2.5 cm apart. - The batch numbers and sites of the vaccines should be recorded in the patient's notes. - If the vaccine is given for employment purposes, the employer should also keep a record. Influenza vaccine uptake in primary care patients from 1 September 2017 to 31 January 2018 in England was: 72.6% for patients aged 65 years and over, compared to 70.5% in 2016 to 2017. 48.9% for younger patients in one or more clinical at-risk group, compared to 48.6% in 2016 to 2017. 47.2% in all pregnant women, compared to 44.9% in 2016 to 2017. 42.8% for all 2-year-olds, compared to 38.9% in 2016 to 2017. 44.2% for all 3-year-olds, compared to 41.5% in 2016 to 2017. 39.9% for carers, compared to 44.9% in 2016 to 2017. A considerable regional variation in uptake was observed for patients aged 65 and over, ranging from 66.9% in London to 75.5% in Cheshire and Merseyside. There was also regional variation observed for patients in risk groups, with vaccine uptake ranging from 45.4% in London to 52.4% in Greater Manchester. Vaccination rates for pregnant women ranged from 41.1% in London to 52.1% in Greater Manchester. The 2017 to 2018 season saw 68.7% of all frontline healthcare workers reported to have received the vaccine in England. This is a significant increase in uptake compared with 63.2% who received the vaccine in the 2016-2017 season. The effectiveness of influenza vaccine depends upon the composition of the vaccine, the circulating strains, the type of vaccine and the age of the individual being vaccinated. Apart from 2014/15, the vaccines of recent years have closely matched the influenza A viruses circulating during the season. Studies have suggested an overall effectiveness against confirmed disease of around 59% in adults aged 18-65 years. The lower effectiveness against A(H3N2) from 2016 has been attributed to the vaccine strains acquiring egg adaptive changes. LAIV has been shown to provide a higher level of protection for children than trivalent inactivated influenza vaccine; a recent meta-analysis suggested an efficacy against confirmed disease of 83%. Storage, presentation and disposal - Store at 2-8°C and protect from light. - Discard if frozen. - Extremes of temperature can reduce potency. Freezing can cause hairline cracks in the container. - All vaccines are supplied in the inactive form in pre-filled syringes (or a nasal applicator) which should be shaken before use. Dispose of the vaccination equipment in a sealable, puncture-proof sharps box (UN-approved BN7390). Types of vaccine Most of the currently available vaccines are grown in embryonic hens' eggs and then chemically inactivated and purified, but cell-based production is likely to become more important in future years. There are three types available: - 'Split virion, inactivated' or 'disrupted virus' vaccines - the whole virus is inactivated by exposing it to organic solvents or detergents. - 'Surface antigen, inactivated' vaccines - these contain haemagglutinin and neuraminidase antigens prepared from disrupted viruses. - A live attenuated vaccine - eg, Fluenz Tetra® - which is preferred for children aged 2-18 years because it provides a higher level of protection. In August 2017 an adjuvanted trivalent inactivated vaccine (aTIV), Fluad®, licensed for use in those aged 65 years and older, gained marketing authorisation in the UK. PHE estimates that, even with conservative estimates of improved effectiveness, the adjuvanted vaccine will be highly cost-effective in both the 65-74 and 75-year and over age groups. Dosage and schedule - Immunocompetent adults, including pregnant women, and children aged 13 years and over, should be given a single dose of trivalent vaccine. - Children not in a clinical risk group only require one dose of the vaccine. The patient information leaflet provided with LAIV states that children should be given two doses of this vaccine if they have not had flu vaccine before. However, JCVI considers that a second dose of the vaccine provides only modest additional protection. On this basis, JCVI has advised that most children should be offered a single dose of LAIV. - Children in clinical risk groups, aged 2 years or older but under 9 years and who have not received influenza vaccine before, should receive a second dose of vaccine at least four weeks later. - Vaccinated children should avoid contact with severely immunocompromised individuals for two weeks after vaccination. Immunocompromised patients (including HIV infection, regardless of CD4 count) should be given influenza vaccine in accordance with the recommendations below. They may not make a full antibody response, so protection may not be as high as for immunocompetent patients. Consideration should also be given to vaccinating household contacts of immunocompromised patients, ie those sharing living accommodation on most days over the winter. Immunocompromised children, and those living in close contact with those who are immunocompromised, should be offered inactivated vaccine and not live vaccine. Recommendations for use People at risk of influenza The national policy is that influenza vaccine should be offered to the following groups: - All those aged 65 years and over. - Residents of nursing or residential homes for the elderly and other long-stay facilities. - Carers of persons whose welfare may be at risk if the carer falls ill. - All those aged 6 months or over in a clinical risk group (listed below). - Health and social care workers. In 2012, JCVI recommended that the programme should be extended to all children aged 2-16 years. The phased introduction of this extension began in 2013 with the inclusion of children aged 2 and 3 years in the routine programme. |Clinical risk groups||Examples (decision based on clinical judgement)| |Chronic respiratory disease| |Chronic heart disease| |Chronic liver disease| |Chronic neurological disease| All pregnant women should receive the trivalent seasonal influenza vaccine. The target groups for a one-off pneumococcal vaccination are very similar (see the separate Pneumococcal Vaccination article), so often both are given together in 'flu clinics'. - Those living in long-stay residential care homes or other long-stay care facilities, where rapid spread is likely to follow introduction of infection and cause high morbidity and mortality (this does not include prisons, young offender institutions, university halls of residence, etc). - Those who are in receipt of a carer's allowance, or those who are the main carer for an elderly or disabled person whose welfare may be at risk if the carer falls ill. This should be given on an individual basis, at the GP's discretion, in the context of other clinical risk groups in their practice. GPs should take into account the risk of influenza infection exacerbating any underlying disease that a patient may have, as well as the risk of serious illness from influenza itself. GPs should consider on an individual basis the clinical needs of their patients, including individuals with: - Multiple sclerosis and related conditions. - Hereditary and degenerative diseases of the central nervous system. NB: Individuals working closely with poultry are no longer thought to be high-risk. Employers - eg, healthcare trusts and nursing and care homes - should offer influenza vaccination to staff directly involved in patient care as an adjunct to good infection control procedures: - Clinicians, midwives and nurses, paramedics and ambulance drivers. - Occupational therapists, physiotherapists and radiographers. - Primary care providers such as GPs, practice nurses and district nurses. - Staff who look after older people in nursing and care homes. Vaccination of healthy children In the 2018/19 flu season, flu vaccine should also be offered to all children who are aged 2-9 years old (but not 10 years or older) on 31 August 2018 and to all primary school-aged children in former primary school pilot areas. This is different from previous years because: Reception Year children (aged 4-5 years) will now be offered flu vaccination in their reception class, rather than at their general practice surgery. Children in School Year 5 will be included in the programme this year as part of the phased roll-out of the children's programme. Contra-indications to all influenza vaccinations There are few contra-indications. When in doubt, seek the guidance of a local communicable disease consultant, paediatrician or immunisation co-ordinator. Vaccine should not be given to patients with: - A confirmed anaphylactic reaction to a previous dose of the vaccine. - A confirmed anaphylactic reaction to any component of the vaccine. Egg allergy: routine vaccine should not be given where there is a confirmed severe anaphylactic hypersensitivity to egg products, as the vaccines are prepared in hens' eggs. It has now been advised that, except for those with severe anaphylaxis to egg, which has previously required intensive care, children with an egg allergy can be safely vaccinated with Fluenz Tetra®. An egg-free vaccine is available and can be given. Inactivated influenza vaccines that are egg-free or have a very low ovalbumin content (<0.12 μg/ml) are available and it has been shown that they may be used safely in individuals with egg allergy. Since 2016 the ovalbumin content of LAIV has been reduced to ≤0.12 micrograms/ml. The ovalbumin content of influenza vaccines will be published prior to the influenza season. A careful history should rule out previous non-life-threatening reactions (eg, rash, or reactions which were not truly anaphylactic). Seek the advice of a specialist when in doubt. In addition, live attenuated vaccines are contra-indicated for those who: - Are clinically severely immunodeficient secondary to a condition or immunosuppressive therapy - eg, leukaemias, HIV (not on active antiretroviral therapy - ART) and high-dose corticosteroids. - Are receiving salicylate therapy. - Are severely asthmatic (level 4 or above) or actively wheezing at the time of vaccination. - Intercurrent illness - vaccination may be postponed in the event of an acute illness, but minor illness without pyrexia or systemic upset should not be a reason for delay. - Premature infants - at-risk premature infants should have vaccination at the appropriate chronological age, preferably with thiomersal-free vaccine. - HIV infection - immunosuppressed patients should be given the vaccine, irrespective of CD4 count. A full antibody response may not be produced. See above also for Fluenz Tetra®. NB: side-effects may be more pronounced if both seasonal influenza and swine influenza vaccinations are co-administered. - Angio-oedema, urticaria, bronchospasm and anaphylaxis can occur. This is an immediate reaction, usually due to hypersensitivity to residual egg protein. - Neuralgia, paraesthesiae, convulsions and transient thrombocytopenia have been reported rarely. - Guillain-Barré syndrome has (very rarely) been reported (1-2 cases per million vaccinated people). - Encephalomyelitis, neuritis (mainly optic) and vasculitis have also (very rarely) been reported but a definite causal relationship with influenza vaccine has not been established. - All suspected reactions in children and severe suspected reactions in adults should be reported using the Yellow Card Scheme to the Commission on Human Medicines. NB: the National Institute for Health and Care Excellence (NICE) has stated that zanamivir and oseltamivir can be used for the prevention and treatment of influenza - but are not a substitute for vaccination. Further reading and references Flu vaccination: increasing uptake; NICE Guideline (Aug 2018) Immunizations - seasonal influenza; NICE CKS, May 2018 (UK access only) Turner PJ, Southern J, Andrews NJ, et al; Safety of live attenuated influenza vaccine in atopic children with egg allergy. J Allergy Clin Immunol. 2015 Aug136(2):376-81. doi: 10.1016/j.jaci.2014.12.1925. Epub 2015 Feb 13. Influenza: the Green Book, Chapter 19; Public Health England (August 2015) Seasonal influenza vaccine uptake in GP patients: winter season 2017 to 2018; Final data for 1 September 2017 to 31 January 2018, Public Health England (2018) Seasonal influenza vaccine uptake in healthcare workers (HCWs) in England - winter season 2017 to 2018; Final data for 1 September 2017 to 28 February 2018, Public Health England (2018) Rondy M, Larrauri A, Casado I, et al; 2015/16 seasonal vaccine effectiveness against hospitalisation with influenza A(H1N1)pdm09 and B among elderly people in Europe: results from the I-MOVE+ project. Euro Surveill. 2017 Jul 2722(30). pii: 30580. doi: 10.2807/1560-7917.ES.2017.22.30.30580. Osterholm MT, Kelley NS, Sommer A, et al; Efficacy and effectiveness of influenza vaccines: a systematic review and meta-analysis. Lancet Infect Dis. 2012 Jan12(1):36-44. doi: 10.1016/S1473-3099(11)70295-X. Epub 2011 Oct 25. Influenza vaccine: ovalbumin content; Public Health England, 2018 Fiore AE, Bridges CB, Cox NJ; Seasonal influenza vaccines. Curr Top Microbiol Immunol. 2009333:43-82. doi: 10.1007/978-3-540-92165-3_3. Online reporting site for the Yellow Card Scheme; Medicines and Healthcare products Regulatory Agency (MHRA) Amantadine, oseltamivir and zanamivir for the treatment of influenza; NICE Technology Appraisal Guidance, February 2009
<urn:uuid:d27a778e-da73-4973-b77d-e2193b25a3bb>
CC-MAIN-2020-16
https://patient.info/doctor/influenza-vaccination
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371803248.90/warc/CC-MAIN-20200407152449-20200407182949-00074.warc.gz
en
0.913416
3,761
3.0625
3
ERO's 2015 report Educationally powerful connections with parents and whānau identified that some schools had limited expectations that all parents could contribute to learning-centred relationships. In schools with low quality learning-centred relationships with parents of children at risk of underachievement, teachers and leaders believed they could only reach a certain proportion of parents, and that the lack of involvement of hard-to-reach parents was justified. Leaders and teachers at PAPATOETOE NORTH SCHOOL were able to successfully reach and fully involve a high proportion of parents of their children. Because leaders and teachers valued parents as children's first teachers and as partners, parents were strongly committed to supporting their children's learning. This narrative shares how genuine learning partnerships benefited children and teachers in a school where the majority of children enrolled were Pacific, Māori or Indian. Parents supported children's learning before and during children's new termly topic studies that they called inquiry topics. An outstanding feature of the school was the deliberate and successful focus on teachers and parents working together to improve children's learning. Leaders and teachers used many approaches to build and maintain such a successful partnership with parents: > Listening to parents, to confirm for everyone involved in teaching the children, that parents hold high aspirations for their education and future. > Providing home learning during the holidays that leveraged children's strengths, interests and rich culture. This built children's academic vocabulary to increase their knowledge before beginning each term. > Providing parents with information and resources and teaching them strategies so they could help their children with their home learning. > Making sure parents knew how their efforts were benefiting their children, as well as benefiting the children who hadn't done the holiday work, through the increased richness of each class's oral language environment at the start of each term. Leaders stressed the importance of building on children's existing content knowledge by using the rich cultural contexts children were already familiar with (as shown in the school's diagram below that leaders shared with families). Parents played a key role working with the ‘knowing the learner team', which represented the major cultural groups at the school. The team led hui, fono and other meetings, where they discussed the focus with the parents. The knowing the learner team was then responsible for making sure the children's cultural perspectives were included in each term's inquiry plan. Consequently, each plan leveraged children's prior knowledge and they began learning about each topic with what they already knew. Parents of Pacific children worked in groups to discuss questions such as: > how can you as Pacific parents raise the attainment levels of your children? > what aspirations do you have as Pacific parents for your children? > what values and perspectives about ‘environment' have been taught to your children? Usually about 40 to 50 parents came to each fono. Sometimes they discussed their views with people from the same culture and sometimes they chose to work with parents of children from similar year groups. At the end of this fono: > parents told leaders they felt they had been heard, and were confident in their ability to help children with home learning > the teachers' relationships with parents were enhanced, and teachers' appreciation of parents' high expectations for their children were confirmed > a deep partnership to accelerate the start of each term's inquiry learning, through holiday home learning, was established with the majority of the parents > parents understood that if their children were one of the more than two-thirds of the class that undertook home learning, they were promoting the learning of the children who had not participated, through increasing the richness of the oral language in each class at the start of each term > parents felt more confident to come back to classroom teachers to clarify their knowledge or strategies. The knowing the learner leaders shared parents' ideas with staff to use for planning the children's inquiry topics. They also led staff meetings to make sure teachers understood cultural perspectives, and were empowered to include these in learning experiences. On one occasion, teachers completely changed their planned science experiments to take account of parents' suggestions. They had initially intended to investigate the different states or properties of water (ice, water and steam) with Years 5 and 6 children. However, parents suggested they should use cocoa instead as it was something every family used. Subsequently, the children enjoyed making Koko rice as part of their investigation. In another example, when the knowing the learner team planned a topic on sustainability, Tongan families shared with them their experiences of cyclones and Samoan families shared their experiences with cyclones and tsunamis. They also looked at the rising sea levels in Levuka. We capture parents' perspectives and play them to the staff to keep the perspectives and background of the children to the forefront. We want teachers to use what children know already, let them teach you and don't be afraid of their culture. Knowing the learner team leader Some of the information parents shared with teachers before the sustainability topic is shown here. Cultural competencies - Tangawhenuatanga, Ako, Wananga Shared information about the following: > Hauora - a holistic approach to wellbeing - seeing sustainability in the same way where it is difficult to separate the land, sea, waterways, air. Everything is linked. > Kumara history from migration and uses for food and medicine. Harakeke versatility, sustainability and medicinal. > Department of Conservation internet sites. > History of Papatoetoe internet sites. There are many stories of communities and small villages that are experiencing economic growth as the people are recognising the ’treasures of the land' and being supported by international groups to create sustainable businesses that enable them to earn wages and be able to live, work and create traditionally organic products in their homeland. They listed internet links about: > Pacific products > business launches > vanilla beans > Nonu Plant > building climate resilient and food-secure communities. > The hand-loom industry of India has a legacy of craftsmanship that gives self-employment to thousands of villages in India. > Ayurvedic medicine is sustainable in India as it is plant-based and mostly herbal. It has historic roots from more than 5000 years ago. > Provided internet links to these for teachers. A mathematics workshop for parents was one of the requests leaders responded to that came from the hui, fono and other meetings. Leaders and teachers subsequently set up different mathematics activity stations in the hall and in classrooms where parents could try some of the activities with their children. Teachers were available to support those parents who needed to clarify their ideas. Other staff looked after younger children so parents were free to focus on the mathematics. The fono, hui and other meetings gave teachers some general information about children's cultures and interests at home. However leaders recognised that they needed to extend the partnership to learn more about individual learners and their families. Leaders and teachers wanted more information to accurately build on individual children's content knowledge and to increase their achievement and progress. Home learning was completed in the holidays (including the summer holidays). Children were encouraged to "have fun during the holidays but don't stop learning.” Three teaching teams created meaningful home learning activities. In Years 3 to 6, for example, the focus was on the children exploring with parents what they already knew (including necessary vocabulary), and what they wanted to discover more about. As far as academic vocabulary was concerned, the emphasis was on hearing and valuing the family's perspectives, not on looking up the dictionary or searching the internet for word meanings. The information given to parents in the home learning books also included advice about how they were helping their child's teacher as well as their child. For Years 5 and 6 children, some of the holiday home learning activities completed before the sustainability homework included: > a brainstorming activity to show what the children knew about sustainability and what they would like to know > finding and sorting man-made and natural resources > drawing things in your environment that you see or wonder about whether they are sustainable - I observe, I think, I wonder > vocabulary activity for eight new words > a graphing and statistics activity. Each term, leaders and teachers invited parents to the school to collect the home learning pack. Parents wanting extra support could participate in workshops about motivating strategies, or meet with teachers to go through the activities while their children would be supervised in the school hall. Parents were welcome to take home any resources they required. When teachers talked to parents, they shared what they would do at school for the child and then heard or discussed what the parent would do at home. ERO met with a small group of parents to get their perspectives of the home learning and looked at many children's home learning books. Although the parents we spoke with all told us they hadn't done well at school, they confidently shared highly effective teaching practices they had used with their children. In most cases, they had worked individually with their children, using different approaches for their different age levels. The work in children's books showed many parents had helped their children extend well beyond the original tasks. Some parents took photographs of their children participating in activities in the community, church or home that clearly shared their interests and strengths. The high quality work seen in the home learning books reflected the high expectations parents had for their children. Part of one child’s home learning activity is shown here. Children also showed a high level of commitment to completing the home learning with their parents. In one Year 3 class, we asked a child to show us her home learning book. Other children scrambled to show their books and some of the work around the room they had completed at home. One boy proudly showed that he had done two terms' holiday home learning in the previous holidays. When asked why, he said he had gone home to Fiji in the previous holiday and couldn't do it then so he did it to catch up. Another Year 3 child told us "Mum writes the words down and talks about them and I have to write a sentence about words like communities, enrich, inspire. Mum also gets me to learn how to spell the words but we don't have to do that. This term our topic is creativity. At school, the teacher asks us what the meanings are. I made a new game with Mum this holidays to show my creativity." We asked a Year 6 child if he preferred to do the home learning independently now, but he said that he didn't as his parents still had some good ideas. Another Year 6 child said, "the holiday homework not only helps us but gives us a heads-up of what we will be learning the next term and helps us understand the topic or concept." One child talked about how his older sibling at intermediate helped him. He proudly showed us the page in his book where his brother had helped him solve a problem. A lot of the children's home learning relating to the inquiry topics was displayed in classrooms. Teachers were able to learn about the child's interests and culture and included these where relevant, in lesson plans and everyday conversations. At the end of each term, parents came to an assembly where children from each of the teaching teams shared learning from that term. Leaders and teachers saw presentations as ways for children to share their learning, celebrate what they have learnt at school and home, and to use much of their new vocabulary. ERO attended an assembly where children shared highlights from the previous term. Children confidently used the academic language introduced as part of the previous home learning. They also acknowledged the help they had received from their parents. Years 1 and 2 children talked about innovations they'd worked on at home to solve a problem they'd identified.
<urn:uuid:30fc7ddd-6216-4353-8a28-39dbdb0a2f3f>
CC-MAIN-2020-16
https://www.ero.govt.nz/publications/building-genuine-learning-partnerships-with-parents/03-genuine-learning-partnerships-with-parents-to-help-both-children-and-the-teachers/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371824409.86/warc/CC-MAIN-20200408202012-20200408232512-00035.warc.gz
en
0.982012
2,406
3.234375
3
We are going to cover the following topics: - Overview of the library - Downloading and loading all the necessary modules - Providing translations in JSON files - Documenting your translations - Performing translations and using placeholders - Utilizing gender information and employing pluralization - Using “magic words” - Switching locale So, jQuery.I18n is an internationalization library developed by Wikimedia language engineering team. Wikimedia, in turn, is a company behind Wikipedia, a popular free online encyclopedia. What’s important, Wikimedia team utilizes jQuery.I18n internally for their resources which are accessed by people from all over the world. These projects, of course, require proper localization. It means that the library is being quite actively maintained and well-documented which is very important for us, developers. Here are the main features of jQuery.I18n: - Support for pluralization with the help of Unicode CLDR - Support for grammar forms - Ability to specify gender information - Ability to provide meta information inside translation files and document your messages - Fallback chains - Customizable message parser that support so-called “magic words” - Support for HTML5 data-*attributes that allow to provide translations right inside your markup - Modular code On the other hand, jQuery.i18n, does have some downsides: - Translations are not updated dynamically once the current locale changes. This may or may not be a big problem for you, but sill, this is quite an annoying thing. Some other popular solutions (like I18next) can update your texts nearly instantly as soon as the user has switched the current language - jQuery.I18n team is not actively participating in discussions on GitHub. There are a handful of open issues, and some of them are quite old. Still, jQuery.I18n does not have any serious bugs, and it is production-ready Creating a Demo App For the purposes of this demo, I’ll create a single index.html file inside the root folder of my local web server. Next, we have to download the latest version of jQuery.i18n, therefore run the following commands (you will need Git installed on your PC): These commands will clone the library’s code into the jquery.i18n folder and also initialize a sub-module with CLDR rule parser. Copy the contents of the jquery.i18n/src to the js folder of your demo project. src folder contains the library’s modules and you can choose which ones to load in your app. There’s also a nested languages folder with basic support for some common locales. Also, navigate to jquery.i18n\libs\CLDRPluralRuleParser\src and copy CLDRPluralRuleParser.js into the js folder. This file will enable support for pluralization. At this point we may define a skeleton for our HTML page inside the First of all I’m loading jQuery 3 which our I18n library relies on, then CLDR rule parser, all the modules, and ru.js file that enables support for the Russian language. Of course, you may further tweak this code and pick only the necessary modules. Translations for jQuery.i18n are stored inside simple JSON files or can be loaded directly inside your code. I would recommend sticking to the first option (especially for larger sites), therefore create an i18n folder inside your project. It possible to store translations for all languages in a single file or separate them into different files. If you prefer to utilize a single file, next your translation keys under the locale codes: In this example we have translations for English and Russian locale stored under the Interestingly, it is possible to provide path to the language file instead of listing translations: As your website grows you will have more and more translation keys resulting in a very long JSON file. Therefore, let’s divide translations into separate files. I’ll create the following directory structure: Here is the contents for the Note that I am also providing metadata under the @metadata key. Here you may list the authors of this translation, specify locale, and provide message documentation (which we’ll discuss in a moment). Here is the contents for the Now we can load our translation files! In the previous section we have specified a message-documentation meta key with a bizarre-looking qqq value. Basically, qqq is a special locale which contains description for every translation key of your application. These descriptions may include information on where exactly this key is being used, what is the translation context (this info is especially important for translators), what tone the translator should use (formal, informal, friendly) etc. For example, here is a qqq.json file used in a real Wikimedia project. So, now let’s create our very own message documentation inside Now our future translators will have all the necessary info on the As long as our translation files are ready, we may load them inside the demo app. Create a new file js/global.js with the following contents: $.i18n().load() is a function that accepts either paths to your translation files or JSON with translation data. It means, that you may also load translations in the following way: global.js file on the main page of the site: In order to fetch translation by its key, you may utilize $.i18n() function. Remember, however, that we are loading our translation files asynchronously, and therefore have to wait until they are ready. Luckily, the load() function returns a promise, so we may chain done() function like this: welcome here is a translation key. Now add a #welcome element to the Now you may navigate to the main page of the site and make sure that the “Welcome!” phrase is being displayed in a h1 tag. It means that you have configured jQuery.i18n properly! In some cases you may want to dynamically provide data for your translations. For example, our welcoming message may greet a currently logged in user by his or her name. Of course, we won’t code authentication system in this article, and rather store user’s information in a plain object: Now pass the current user’s name to the $.i18n() function as the second argument: Now all you need to do is fetch this data inside your translations. Tweak i18n/en.json file (I’m skipping metadata for brevity): $1 is a placeholder that will be dynamically replaced with the second argument passed to the $.i18n() function (which is “Alex” in our case). You may define as many placeholders as needed in your translations, for example $1 says "$2" to $3 which will result in something like “Alex says “Hi” to Ann”. Note, however, that if a placeholder doesn’t have any value, it will be displayed as-is: One very common task when performing internationalization is displaying slightly different messages based on the given gender. Suppose we would like to show some consulting information on the page, and the consultant may be either male or female. Based on the consultant’s gender we would like to display a message like “Your today’s consultant is SOME NAME. He (She) says: …”. How do we achieve that? First of all, add a new consulting_info translation key to the GENDER is a special switch that displays one of the given options (“He” or “She”) based on the given argument represented as a placeholder. Now let’s add a Russian translation: Now simply define a new consultant object and pass interpolation data to the $.i18n() function as we already did in the previous section: Lastly add a new tag to the Reload the page and observe the result! Another common task is displaying pluralized messages based on the given count. For instance, we may want to say how many unread messages the current user has. To achieve that, we will use a PLURAL switch. Tweak As you see, it is very similar to what we did with the GENDER switch a minute ago. For Russian language, however, more options has to be provided: Various languages have different pluralization rules but luckily you don’t need to bother about it thanks to Unicode CLDR pluralization info that jQuery.I18n relies on. All you need to do is open the following page and use the given table to determine how many options should be provided for the language you wish to support. Now tweak your JS file again: And add yet another tag to the HTML page: Reload the page once again and make sure the text has proper pluralization! It’s Pure Magic! We have discussed two switches: PLURAL but it appears they are actually so-called “magic words” that jQuery.I18n supports. A “magic word” is just a special construct that the parser processes and replaces with some content. You may further extend the parser and provide your own constructs as needed. For instance, let’s construct a magic word to display abbreviations: abbr is the name of our “magic word”. The anonymous function may optionally accept an array of nodes which are simply arguments passed to the magic word. This function then returns the content that you wish to display. Use this magic word in the following way: Note that magic words may be nested as shown in this example. Translating With HTML5 Data Attributes Another interesting feature that jQuery.I18n provides is the support for HTML5 data-* attributes that may be used to provide translations right inside your markup. To see it in action, add yet another tag into your markup with glad_to_see is just a translation key. We're glad to see you! basically acts as a fallback text that will be shown if translation for the specified key cannot be found. Next add English translation for this key: Also add Russian translation: And lastly tweak your JS code: This will search for a translation under the key provided in the data-i18n attribute. If the translation is found, it will be placed inside the What’s more, the i18n() function may be applied to the whole HTML page: Now every tag containing the data-i18n attribute will be properly translated! Our next task is providing functionality to switch the currently set language. Let’s provide a language switcher component on our HTML page: When a user clicks on one of these links, we should change the language accordingly. Bind a click event and provide an event handler inside the I’ve added this event handler inside the done() function because, once again, we should wait until the translation files are loaded. There is one problem however: translation messages won’t update automatically once the user has changed locale. To fix that, I’ll extract all translation-related logic to a separate do_translate() function, and call it once the click event fires. Here is the complete version of the code: do_translate() fires once translation files are loaded, as well as after the click event happens. In order to provide a default locale, you may use two possible options: - Provide it using the langattribute of the - Set it using the Let me demonstrate you these two approaches. lang attribute is defined in the following way: This way we are saying that the language of this page is English. jQuery.I18n will read it and assign the default locale properly. To set a default locale programmatically, use the following code: These two options are equal, and you are free to choose any of them. Make Your Life Easier With Lokalise Supporting multiple languages on a big website may become a serious pain. You must make sure that all the keys have translations for each and every locale. Luckily, there is a solution to this problem: the Lokalise platform that makes working with the localization files much simpler. Let me guide you through the initial setup which is nothing complex really. - To get started, grab your free trial - Create a new project, give it some name, and set English as a base language - Click “Upload Language Files” - Upload translation files for all your languages - Proceed to the project, and edit your translations as needed - You may also contact a professional translator to do the job for you - Next simply download your files back If you wish to upload QQQ files with message documentation, that’s possible as well. Perform the following steps: - Open your project and press the “Add Language” button on the top - Choose any language from the dropdown - Press on the new language’s flag and select “Language Settings” - Set “Custom Language Code” to “On” and enter - Set “Custom Language Name” to “On” and enter something like “Message documentation” - Save the changes and proceed to the “Upload” page - Choose your .qqqfile. Your custom locale should be detected automatically Here is the result: Lokalise has many more features including support for dozens of platforms and formats, and even the possibility to upload screenshots in order to read texts from them. So, stick with Lokalise and make your life easier!
<urn:uuid:04bddbc9-00a5-4e21-8146-6372f1c26750>
CC-MAIN-2020-16
https://lokalise.com/blog/localizing-apps-jquery/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496669.0/warc/CC-MAIN-20200330054217-20200330084217-00356.warc.gz
en
0.869039
2,930
2.578125
3
To sign up for Meridian’s Free Newsletter, please CLICK HERE. Therefore, according to justice, the plan of redemption could not be brought about, only on conditions of repentance of men in this probationary state… Alma 42 concludes Alma the Younger’s powerful, four-chapter exhortation to his son Corianton. After explaining the consequences of sin and expounding upon the resurrection (Alma 39–41), Alma perceived that Corianton was still troubled and confused concerning the justice of God. In particular, Alma noted that Corianton tried “to suppose that it is injustice that the sinner should be consigned to a state of misery” (Alma 42:1). In order to help his son reconcile himself to God’s justice, Alma explained how the balance of justice and mercy is integral to “the great plan of salvation” (Alma 42:5). A feature of Alma’s discourse that may be easy to overlook is the symbolic use of the number ten. In many ancient civilizations, including the Israelites, certain numbers were considered to hold sacred meaning or importance. For example, John Welch explained that the number ten “conveyed a tight cluster of symbolic messages associated with the divine realms, namely, completeness, perfection, worthiness, consecration, testing, justice, reverence, atonement, supplication, and holiness (to mention ten).” It seems likely that this sacred use of numbers was preserved in the plates of brass and perpetuated by Nephite prophets as part of their literary tradition. Evidence from the earliest Book of Mormon manuscripts indicates that its original chapter units were divinely revealed to Joseph Smith, and according to the 1830 edition of the Book of Mormon, Alma 39–42 comprised a single, cohesive chapter. It may well be significant, therefore, that within these chapters Alma referred to the plan of redemption (or its variants, such as plan of salvation or plan of happiness) precisely ten times. During this period, Alma was the high priest over the church and likely fulfilled temple responsibilities similar to those found in the Old Testament (Alma 5:3). This is notable because the number ten features prominently in temple architecture and ritual formula: When the temple of Solomon was built, it also contained many features that came in tens. The height and width of the cherubim in Solomon’s temple were both ten cubits … [the] diameter of the brazen sea was ten cubits … the brass altar was ten cubits high; ten candlesticks were made of gold; and ten tables were placed, five on each side. We know that Nephi’s temple, which was probably a model for later Nephite temple worship, was itself constructed “after the manner of the temple of Solomon” (2 Nephi 5:16). Thus, it makes sense that Alma, being the high priest in charge of temple worship, would have been aware of this number’s sacred meaning and purposefully utilized it to help his son comprehend the plan of salvation. Alma’s tenfold invocation of the plan of salvation could also be connected to his high priestly role to determine worthiness in relation to the Ten Commandments. Welch proposed that “the Ten Commandments may have functioned somewhat like a list of modern temple recommend requirements to determine who might ascend into the mountain of the Lord, or the temple (see Psalm 24).” In this way, Alma’s exhortation could be seen as symbolically bringing Corianton to stand trial before God for violating one of those sacred Commandments. Alma desired that Corianton would take advantage of the time for repentance that is mercifully allowed under God’s overarching plan of happiness. Furthermore, Alma’s exhortation to Corianton doesn’t contain the only discernable example of sacred numerals found in the Book of Mormon. Of particular relevance is another tenfold repetition of the word “plan” found in Alma 12. In that case, the first three uses of the term are in reference to Zeezrom’s “subtle plan” to deceive the people and turn them against Alma and Amulek (Alma 12:32–33). In contrast, the last seven uses (seven itself being a sacred priestly number) all refer to the “plan of redemption” (see Alma 12:25–33). The occurrence of negative examples or contexts of a repeated item being supplanted or overpowered by a greater number of positive usages is not an isolated phenomenon and can be found elsewhere in the Book of Mormon. It therefore seems more than coincidental that both Alma 12 and Alma 39–42 use the same pattern of tenfold repetition to expound upon the same sacred topic—the plan of redemption. Corianton had bought into the wrong “plan” (as had Zeezrom in Alma 12), and thus Alma’s sermon, in order to turn his son back onto the true path, needed to state the totality of the true plan. Even if someone isn’t aware of this tenfold thread, the subconscious effect of its tenfold repetition allows the spirit to gather momentum to a very satisfying conclusion and convincing admonition. Alma’s words had a very salutary effect on Corianton. This emphatic element may be one of the reasons why these words left such an indelible impression on his son and still leave such a powerful impact on readers today. Understanding the numeric symbolism that underlays parts of the Book of Mormon can also deepen comprehension of the scriptures and the prophets who wrote them. For example, identifying Alma’s symbolic repetition of “the plan of redemption” helps readers recognize how significant this concept might have been to him. He likely saw God’s plan as a perfect or complete solution to his son’s moral confusion and wayward behavior. Not only does Alma repeat the concept exactly ten times, but in Alma 39–42 he uses five connotative variations to describe it: plan of redemption, restoration, salvation, mercy, and happiness. Readers should be cautious to not assume that every instance of a sacred number, whether explicitly mentioned or implied through repetition, is symbolically significant. Yet many of the text’s attestations of symbolic numbers are so distinctive and cogent that it is difficult to see them as anything other than intentional. The fact that specific words, phases, or concepts are repeated a sacred number of times in a meaningful context is evidence that the authors were familiar with ancient numeric symbolism. Exploring the sacred significance of numbers, therefore, reveals an insightful layer of subtle complexity in the Book of Mormon. John W. Welch, “Counting to Ten,” Journal of Book of Mormon Studies 12, no. 2 (2003): 42–57, 113–14. Corbin Volluz, “A Study in Seven: Hebrew Numerology in the Book of Mormon,” BYU Studies Quarterly 53, no. 2 (2014): 57-83. John W. Welch, “Number 24,” Reexploring the Book of Mormon: A Decade of New Research, ed. John W. Welch (Provo, UT: FARMS, 1992), 272–274. See Book of Mormon Central, “When Does the Book of Mormon First Talk About the Plan of Salvation? (2 Nephi 9:6)” KnoWhy 33 (Feb. 15, 2016). See Royal Skousen, “How Joseph Smith Translated the Book of Mormon: Evidence from the Original Manuscript,” Journal of Book of Mormon Studies 7, no. 1 (1998): 27–28. See Thomas W. Mackay, “Mormon as Editor: A Study in Colophons, Headers, and Source Indicators,” Journal of Book of Mormon Studies 2, no. 2 (1993): 107.Mormon as Editor: A Study in Colophons, Headers, and Source Indicators For general information concerning priesthood responsibilities and temple worship in the Old Testament, see Lawrence H. Schiffman, “Priests,” in Harper’s Bible Dictionary, ed. Paul J. Achtemeier (San Fransico, CA: Harper and Row, Publishers, 1985 ), 821—823. See also, Old Testament Student Manual Genesis–2 Samuel (Salt Lake City, UT: The Church of Jesus Christ of Latter-day Saints, 1980–1981), 159–192. See Mark Alan Wright, “Axes Mundi: Ritual Complexes in Mesoamerica and the Book of Mormon,” Interpreter: A Journal of Mormon Scripture 12 (2014): 79–96. See also John W. Welch, “The Temple in the Book of Mormon: The Temples at the Cities of Nephi, Zarahemla, and Bountiful,” in Temples of the Ancient World, ed. Donald W. Parry (Salt Lake and Provo, UT: Deseret Book and FARMS, 1994), 297—387. Several studies have demonstrated that ten, seven, twenty-four, and fifty are all symbolically significant throughout the text. See Corbin Volluz, “A Study in Seven: Hebrew Numerology in the Book of Mormon,” BYU Studies Quarterly 53, no. 2 (2014): 57–83; John W. Welch, “Number 24,” in Reexploring the Book of Mormon: A Decade of New Research, ed. John W. Welch (Salt Lake City and Provo, UT: FARMS, 1992), 272–274; Book of Mormon Central, “Why Did Alma Ask Church Members Fifty Probing Questions (Alma 5:14–15)” KnoWhy 112 (June 1, 2016); Book of Mormon Central, “Why Did Alma Wish to Speak with the ‘Trump of God’ (Alma 29:1),” KnoWhy 136 (July 5, 2016). Volluz, “A Study in Seven,” 74: “Perhaps most interestingly, the book of Alma appears to be structured around the number seven and, more specifically, around double the number of seven. This may be particularly appropriate in the book named for Alma, the high priest in the land of Zarahemla, for seven is featured prominently in aspects of the law of Moses with which Alma would have been intimately acquainted (see Alma 30:3). The priestly manual contained in the book of Leviticus is replete with instances of the number seven and its multiples, calling for seven sprinklings or anointings (Lev. 4:6, 17; 8:11; 14:51) and marking off heptadic periods of times of impurity (Lev. 12:2; 13:5, 31), of purification or consecration (Lev. 8:33; 15:19; 16:14, 19), or of sacred time.” Because of their different form and negative context, it may seem tempting to rule out the first three instances of “plan” in Alma 12 as having anything to do with the later seven repetitions of “plan of redemption.” However, it seems that the ancient literary “rules” concerning repetition were not so rigid or inflexible. Antithetical parallelism, for instance, was common in ancient literature. In this example, all instances have at least one word in common, and in total there are ten instances that conceptually deal with an overarching plan. The fact that early usage of the term “plan” is directly antithetical to the later usage of “plan of redemption” suggests that an intentional dichotomy may be at play. Although such an assertion is certainly not provable, the attestation of similar instances and variations within the text supports its viability (see footnote 12). Alma 49:30 implies that Corianton took Alma’s teachings to heart, repented of his transgressions, and returned to the ministry: “Yea, and there was continual peace among them, and exceedingly great prosperity in the church because of their heed and diligence which they gave unto the word of God, which was declared unto them by Helaman, and Shiblon, and Corianton, and Ammon and his brethren, yea, and by all those who had been ordained by the holy order of God, being baptized unto repentance, and sent forth to preach among the people.”
<urn:uuid:e34772f1-595e-42f7-9e17-ec6b6a96dc31>
CC-MAIN-2020-16
https://latterdaysaintmag.com/why-does-alma-mention-the-plan-ten-times-in-his-words-to-corianton/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371660550.75/warc/CC-MAIN-20200406200320-20200406230820-00436.warc.gz
en
0.94012
2,618
3.140625
3
Ancient Guam’s Environment IN THIS ENTRY Natural surroundings shape culture In addition to analyzing artifacts, archeologists often study ancient environments to understand how prehistoric societies both shaped, and were shaped by, their natural surroundings. For example, an archeologist might be interested in learning how an ancient population managed to live in a particular environment, such as a desert. They might ask, how did people use available natural resources? What strategies were humans using to face the challenges of their natural environment, such as protection from intense heat, or finding access to fresh water? How did they modify the environment to suit their needs for growing or acquiring food? By analyzing recovered artifacts as well as the environmental landscape, archeologists can determine specific ways in which culture and environment relate to each other, especially regarding change. When an environment changes, the ways in which a population interacts with that environment may change as well. Activities may be altered; new tools and technology may develop; or different rituals and customs may be established. In the Marianas, archeologists have tried to examine how environmental changes may have impacted the early ancestral Chamorros, who began occupying these islands 4,000 years ago. These ancient people adapted to a tropical environment while facing frequent typhoons, periods of drought and occasional earthquakes and tsunamis. Based on research of the climate and geology of the region, the Marianas archipelago also experienced significant changes in sea level and landscape topography that affected not only the kinds of plants and animals that thrived there, but also human settlement patterns. Guam’s position on planet Earth near the equator ensures that there is no winter period and a consistent length of day. Guam’s tropical climate is almost uniformly warm and humid throughout the year. The seasonality of rainfall is influenced by Guam’s isolation from continental masses, seasonal shifts of the Inter-tropical Convergence Zone from north to south, and sea-currents. In general the Marianas experiences two primary seasons and two secondary seasons. Between the months of January through April Guam’s climate is relatively dry, though it receives about 35 cm (nearly 14 inches) of rainfall during this four month period. From mid-July through mid-October Guam’s climate is wet with approximately 120 cm (just over 47 inches) of rainfall during this four month rainy season. The other months of the year are transition periods, which may be either wet or dry. The equatorial western Pacific is also subject to the periodic effects of El Niño and La Niña (ENSO) weather patterns. Changing sea surface water temperature, in addition, greatly influences the amount and intensity of rainfall. Tropical typhoons are generally more frequent and intense when sea surface water temperatures are warmer. This tropical pattern greatly affects the weathering of the soil, decomposition of organic material, and leaching of nutrients. Prior to the arrival of humans, the dominant vegetation on Guam was tropical forest, with a strong affinity with the Malaysian tropics. Floristics, or the distribution of plant species, of Guam’s tropical forest was influenced by the parent material of the soil. Soils derived from volcanic parent materials are generally acid and are found largely in southern Guam, while soils derived from limestone are generally found in northern Guam. Central Guam has soils in varying mixtures of the two types of parent material. Limestone soils are well drained and not very deep. The northern elevated hard limestone soils supported a more diverse community of the forest species, including Artocarpus mariannensis (breadfruit), Pandanus fragrans, Elaeocarpus joga (yoga or blue marble tree), Intsia bijuga (ifit or ifil), Ficus prolix (banyan) with Neisosperma oppositifolia (fagot), Guamia mariannae (paipai) dominated along with other species as understory. Less is known about the original composition of plant communities on the upland volcanic soils in southern Guam since the remaining forested areas are limited to lower valleys. These forests are often referred to as ravine forests. The ravine forests are generally lower in stature and are dominated by Hibiscus tiliaceus, Pandanus species, and Ficus prolix. Barringtonia racemosa (langasat) is a common native species found in riparian (or riverbank) forests along rivers and streams. Along the coastal strands and sandy beaches, where salt spray affects the species composition Mammea odorata (chopak), pago, and Casuarina can be found, among others, and in marshy or brackish water mangroves and wetland shrubs, sedges, and grasses such as phragmites are found. Climate change effects Climate change throughout the last several thousand years has played a role in changing vegetation in the Marianas, but it has also had other impacts. Sea level was about 375 feet below the present sea level 22,000 years ago during the last full glacial climate cycle. Over the next 16,000 years the sea level gradually rose and then rapidly climbed until about 5,500 years ago when it topped out about 2.0 meters (6.6 feet) higher than it is now. Some climatologists argue that about 8,000 years ago climate kicked into a warming cycle caused by the emergence of rice paddy agriculture and forest clearing in Southeast Asia and China. These practices led to increased methane and carbon dioxide, respectively, in the atmosphere. Otherwise the Earth was in a cooling trend that by this time would have been pronounced and distinctly arctic. The warming trend peaked again about AD 1000 to 1200 during a period known globally as the Little Climatic Optimum (LCO), but then cooled dramatically over the next 500-600 years during a period called the Little Ice Age (LIA). Since 1850, however, carbon dioxide from industrial pollution has contributed dramatically once again to global warming and increasing average temperature. The sea level remained 2.0 meters above modern shorelines until about 3,000 years ago, then dropped one meter. By 2,000 years ago the sea level dropped again dramatically by another meter to present levels. Scientists know this on Guam by measuring the elevation of wave-cut notches that formed about 2.0 meters above the present beaches. Other, higher notches were formed more than 130,000 years ago about 6.0 meters above today when climate was warmer by more than 1.0 degree centigrade as compared to today; lower notches would have formed during periods of shoreline stability that are presently underwater. Archeologists can also document these changes in the landscape from examining sandy beach terrain and the types of sand that are found. Coarse, unbroken coralline and foraminiferal sands would have formed in calm lagoons within ancient reefs. If covered over and undisturbed they provide carbonate tests from which radiocarbon ages can be obtained that can date the period of formation and burial. Climate change is a very complex and interactive process that is poorly understood, but recent data from ice cores, lakebed cores, isotopic studies of ancient coral reefs, and other proxy data sources have contributed major new data toward modeling climate change over the last 160,000 years. Cycles of orbital wobble, for example, are on cycles of 22,000 years with the size of the cycles varying every 100,000 years. These account for glacial and interglacial periods on a grand scale. Smaller cycles may be caused by changes in solar flares or other changes in solar radiation; they may also be occasioned by earth process like major episodes of volcanism such as the eruption of Krakatoa in Indonesia that led to the “year without a summer” following the eruption in 1883. Global temperature dropped by 1.2 degrees Celsius and remained cooler until 1888. This range of warming is expected within the next few decades. Decadal scale shifts in climate like the ENSO patterns, where warm water pools in the eastern Pacific and farther northward toward North America, influence Pacific Ocean climate and the distribution of marine life. Conditions in the Pacific may be more arid and droughty. La Nina conditions emerge as water is pushed to the west by prevailing winds, leading to a warm pool in the western Pacific. Warmer areas of the Pacific spawn typhoons and wetter than normal conditions. These climatic patterns are interactive and synergistic, and can lead to rapid climate change once threshold states are crossed. For example, the melting of glacial ice in Greenland floods the North Sea with fresh water that eventually disrupts the conveyor belt of warm salty water from the Gulf Stream and the North Atlantic current. Climate theorists think that this could have actually induced rapid cooling and glaciation. Current trends toward increasing CO2 and other greenhouse gases appear to be driving climate increasingly warmer, and it is feared that this could lead to another sea level rise of as much as 2.0 meters by the year 2100. Furthermore, increasing aridity in the northern hemisphere in areas with continental climate patterns could be massively disruptive to agricultural production. The rise in sea level would impact as much as one-third of the world population that currently lives near coasts. Contrary to these calamitous predictions, oceanic islands may be refuges from extreme climate change. Small islands are buffered by oceanic weather, perhaps promoting sustained rainfall and less extreme temperatures. Islands in the northern hemisphere like Taiwan and in the far south like New Zealand could become climate havens. The scars in the landscape like wave-cut notches and the paleo-evidence of previous and changing vegetation communities demonstrate that climate is dynamic and that islands in the western Pacific are constantly adjusting and adapting. The human impacts of new vegetation, forest clearing, habitation and farming, along with later effects of urban development interleave with these natural cycles, and ultimately introduce human-induced climate change from increasing greenhouse gases. The earth has buffered many of these cyclical adjustments for millennia and longer periods. Whether humans can adjust as well remains to be seen. Since the arrival of humans, native plant communities have been greatly altered by introduced species (both plant and animals), forest clearing and logging, burning, grazing, and loss of native wildlife. Forests in southern Guam are limited to lower valleys where higher humidity prevents the encroachment of wildland fire. Much of the volcanic soils in southern Guam supports only grasses on sloped hillsides. Now that most of the natural environment of Guam has been degraded from centuries of grazing; bombed and burned by warfare; and graded and developed for both military and civilian expansion, there are very few areas of pristine forest on Guam. In fact, much of the south of Guam is now covered with swordgrass savannah with casuarina in protected areas. This was not the natural vegetation, however. Pollen and phytolith identification from coring studies show that before people came to Guam around 3,500 years ago the island was uniformly forested, with possibly small savannah clearings caused by natural disturbances. Human settlement brought new plants that now appear to be natural. Coconut palms, seedless breadfruit, mango, bananas, yams, and sweet potatoes required human agency to invade Guam. In the earliest periods of settlement these were useful plants that were part of a “transported landscape” that ensured productive year-round food resources. Some inadvertent species hitched a ride, and even some creatures like rats and mosquitoes were probably introduced by people to Guam. In recent years notable invasive species have become pests, including the brown treesnake, many savannah grasses, false rattan, limonchina, and other species that are often mistakenly considered native. For further reading “Archaeological Studies of the Latte Period,” edited by Mike T. Carson, PhD, Micronesica, Volume 42 (1/2), University of Guam, March 2012. Athens, J. Stephen and Jerome V. Ward. “Holocene Vegetation, Savanna Origins and Human Settlement of Guam.” Records of the Australian Museum, Supplement 29, 2004. Hunter-Anderson, Rosalind. “Savanna anthropogenesis in the Mariana Islands, Micronesia: Re-interpreting the Palaeoenvironmental Data.” Archaeol. Oceania 44, 2009. Fagan, Brian. The Little Ice Age: How Climate Made History 1300-1850. New York, NY: Basic Books, 2010. _____. The Great Warming: Climate Change and the Rise and Fall of Civilizations. New York, NY: Bloomsbury Group, 2008. Ruddiman, William F. Plows, Plagues, and Petroleum: How humans took control of climate. New Jersey: Princeton University Press, 2005. Peterson, John A. and Mike T. Carson. “Mid- to Late Holocene Climate Change and Shoreline Evolution in Tumon Bay, Guam.” Proceedings, Pacific Science Intersession, Tahiti, June 2009. Accessed 24 July 2012.
<urn:uuid:2c96f087-d68a-4fa7-b223-4dc64f4ad59e>
CC-MAIN-2020-16
https://www.guampedia.com/ancient-guams-environment/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370508367.57/warc/CC-MAIN-20200402204908-20200402234908-00235.warc.gz
en
0.948985
2,701
3.859375
4
The truth is all of these behaviors are very aggressive or adequately defined as passive aggressive. I want to give you the top 10 communication tips for dealing with aggressive communication. There is a lot of confusion out there about the differences between outright aggression and passive aggression. Outright aggression can be defined as a spontaneous actions that aim to hurt or destroy someone or something (Long, Long and Whitson, 2009). Passive aggression, a far more deliberate, yet covert way of expressing anger in a way that subtly but surely “gets back at” someone. There are four ways to respond to anger. You can fight, flight, appease or sabotage. The aggressive person fights and often acts on impulse and regrets his behavior in short order, the passive aggressive person typically derives genuine pleasure out of frustrating others. The 4 ways we respond to anger… Passive aggressive examples… Behavior in passive aggressive men and passive aggressive women manifests itself differently but there underlying similarities. A hallmark of the passive aggressive person is that he or she believes life will only get worse if other people know of his anger, so he or she expresses his thoughts and feelings indirectly, through characteristic behaviors as withdrawing from conversations (often with last words such as “fine” or “whatever”), sulking, procrastinating, carrying out tasks at sub-standard levels, sabotaging group efforts, and spreading rumors or discontent behind the scenes. Passive aggressive behaviors are used to avoid confrontation of short-term conflict, but in the long-term, these dynamics can be even more destructive and result in feeling of resentment and anger. Ultimately, resentment and anger often then turns into aggression. Have you ever heard the old saying misery loves company? Well if someone is being driven by insecurities, bitterness and immaturity, aggressive behaviors can rear their ugly head. What is passive aggressive communication? Here is a list of communication techniques that passive aggressive people use. Here are 8 examples of being passive aggressive… - Sabotaging the efforts of others. - Blaming others for personal failures and is always the victim. - Exaggerating misfortunes. - Complaining of feeling unappreciated or misunderstood. - Takes hidden action to get back at someone. - Goes to self-destructive lengths to seek vengeance. - Avoiding work and social obligations, often making excuses. - Says they will do something, but carries it out in an unacceptable manner. Examples of aggressive communication… Now, here are some tips to consider when dealing with aggressive people. Someone that is behaving aggressively is not afraid of confrontation. An aggressive communication definition is as follows. They are ready to fight, ready for war. Aggressive communication is a form of expression that does not take into account the needs of others. They are ready to win at all costs. They are generally perceived as selfish and unwilling to compromise. We all communicate aggressively at times. However, it is important not to allow this to become your dominate communication style. Here are some examples of aggressive communication… - Feelings. Those that communicate aggressively are demanding, angry and expressive in an inappropriate way. - Needs. Typically their own needs are seen as being more important than others. The needs of others may be ignored or dismissed. Aggressive communication behavior is evident. - Rights. We all have rights, however those that communicate aggressively typically do so in such a way that violates the rights of other people. - Opinions. They see themselves as having something to contribute and see other people as having little or nothing to contribute. - Verbal Communication. Individuals that communicate aggressively use strident, firm, cold, harsh, fluent, abrupt, sarcastic, or condescending language. Another characteristic of aggressive communication includes the use of blaming words, threats, and put downs such as “you’d better watch out”, “don’t be stupid”, “you should”, and “I haven’t gotten problems like yours”. - Short-term Effects. People who communicate aggressively usually get their way, are less vulnerable, in control, release tension, and gain power. - Long-term Effects. In the long-term, communicating aggressively results in the creation of enemies and resentment in those around you. In addition they develop a sense of paranoia and fear. 10 keys to effective communication… So how do you deal aggressive people? - Identify the behavior for what it is: Aggression. Be one step ahead of your enemy. Recognize when someone is being aggressive. When you have developed this emotional intelligence skill you can maintain and regain your composure. - Get to Know the aggressors History. Understanding that person, will help you understand their behavior. Insights linking past suffering to present demeanor can also put you ahead of the curve. Be calm and pleasant. Ask open-ended, none-judgmental questions about their background, to ascertain whether there may be hidden pain, bitterness or resentment. Aggressive behavior often arises when an individual feels powerless and lacks the skill necessary to voice their opinion. If your presence of actions make that person feel threatened, this is what is at the root of their hostility towards you. Their aggressive behavior is a survival strategy to avoid being victimized again. - Do not feel guilty. Remember that you’re not to blame for someone else’s behavior. - Refuse to play their game.Because a passive-aggressive personality doesn’t know how to respond appropriately to conflict, he or she will most likely deny everything. It’s important to express your concerns and anger, but stick to the facts at hand and how his or her actions make you feel. Don not let them get away with treating you poorly. Not confronting the passive-aggressive behavior will only reinforce it. Confront the person immediately and let him or her know you are confused by the behavior. If they value the relationship, he or she has to stop the behavior. Try to create an atmosphere in which he or she might feel more comfortable sharing feelings of anger, resentment, fear, etc. - Allow for natural consequences. Denial, excuse making, and finger pointing are inevitable. The only way to deal with this behavior is to take a step back. Take yourself out of the argument and allow for natural consequences. You take yourself out of the argument but not fueling the negativity with name calling, aggression, or by bringing up the past. Regardless of what they say, declare what you’re willing to do going forward. Importantly, offer one or more strong consequences to compel the passive-aggressive to reconsider his or her behavior. A strong consequence may be limiting your time with that person and not enabling or picking up their pieces. - Be Assertive. Be straightforward and honest but not rude so that you can make your point effectively. Focus on how to be assertive not aggressive. Don’t apologize and give elaborate reasons for saying “no”. It is your right to say no if you don’t want to do things. Remember that it is better in the long run to be truthful than to harbor resentment and bitterness within yourself. You need to tell them what you need. Otherwise people cannot fulfill your needs and this can lead to resentment and misunderstanding. Tell the person that if they fulfill your needs, there will be a positive consequence for both of you. Be specific about the positive consequences. Seek out additional assertive communication tips and skills. - Use Humor. Interrupt their passive aggressive behavior with a joke. Tell them something complete funny or talk about your day and make light of the situation. By doing this you take the power out of their actions. They are trying to frustrate you. If they can see your frustration they have completed their task. Therefore showing them that you are not bothered by their actions ruins their plan of getting under your skin. - Keep Your Distance and Keep Your Options Open. When you feel your temperature rising. Anchor your self with a code word. Walk away from the situation. I have a lot of clients whom chase their significant other around the house until they feel the problem is resolved. This often adds fuel to the fire. When your emotions are high this will only make things worst. If the person is causing you a lot of stress maintain your distance and keep you escape options open. - Do Your Best to Not Take Things Personally. What other say and do, is them projecting their own reality onto you. Know what triggers or fuels your anger, download this free tool here! It takes work and skill building, but by becoming immune to the opinions and actions of other you take back control, power, and peace over your life. - Uphold Your Rights. When dealing with a difficult person is to know your rights, and recognize when they’re being violated. It your right to stand up for your rights. Upholding your rights is how you develop a assertive vs aggressive communication style. - You have the right to be treated with respect. - You have the right to say “no” without feeling guilty. - You have the right to have opinions different than others. - You have the right to make mistakes. - You have the right to ask for what you want, rather then hope someone will automatically know what you want. - You have the right to take care of and protect yourself from being threatened physically, mentally or emotionally. - You have the right to create your own happy and healthy life. Aggression is bad for the aggressors as well as the recipients of the aggression. Emotional or physical force is often used so that the rights of others are not even allowed to surface. Others feel victimized and relationships suffer. As a result, aggressive individuals tend to cause others stress and experience increased levels of stress themselves, as their relationships tend to be conflicted and their personal goals not as often achieved. Consider these communication tips for the workplace, your relationships with family and friends and with your children.Need help dealing with someone that communicates aggressively all the time? Download our free Anger Management Tool Here!
<urn:uuid:e4a91a4e-86fd-4e35-84be-8b0e064d1c83>
CC-MAIN-2020-16
https://myerslifecoachingllc.com/aggressive-communication-behavior/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370491857.4/warc/CC-MAIN-20200328104722-20200328134722-00196.warc.gz
en
0.953427
2,080
2.90625
3
Build a Colonial Schooner - by Charles A. Hand, Jr. Two masts, each rigged with gaff sails, come to mind when I hear the word schooner. But a client had prefixed that with "colonial:” and advised that he desired all sails to be set, including studding sails. He specifically mentioned Sultana, Chaleur, Halifax, and Marble Head, which set me on a stint of looking and reading. I already had The History of American Sailing Ships by Howard 1. Chapelle, but it soon became dog-eared from my rereading of the portions dealing with colonial schooners. From the Nautical Research Journal, I learned of and acquired The Colonial Schooner 1763-1775, by Harold M. Hahn, which proved to be exceptionally well researched and helpful. Colonial schooners proved different from my initial image, as they usually carried two or more sizeable square sails on each mast, as well as the gaff sails. Such clouds of sail must have been an impressive sight. But Mr. Hahn's research related that they frequently experienced loss of masts from being so overburdened with sails. He kindly replied to a personal letter, confirming that they were highly unlikely to have ever carried studding sails. Both books contain good plans of several colonial schooners, and both pointed out that only the Admiralty plans for the Chaleur provided specifics on the sizes of masts and yards. Both included hull lines for Marble Head, but Mr. Hahn revealed that this was actually a class or type designation for two schooners which ultimately bore other names. From Abe Taubman's commercial plan service, I obtained 114" = l' plans for the Sultana by Portia Takakjian and the Halifax by Dr. Franco Gay. The former provides good rigging details, but no sail plans. Dr. Gay's plans are exceptionally well done and include sail plans. Labeling on Dr. Gay's plan is in Italian, but I did not find that troublesome. What I did find troublesome was the wide variation of boom and yard sizes among the books and plans. As suggested in one book, I attempted percentages of the Chaleur figures based on the ratio of the hull lengths. That resulted in the foremast mains'l boom being too long to pass between the masts, which seemed unlikely. (The book did wisely follow the suggestion with a statement that such figures should not be regarded as absolute.) I adjusted the figures to what seemed reasonable and omitted the studdingsails, although I had included those on my first draft plans. The bottle I selected was 1.75 liters. The best scale to fit the bottle worked out to 1:210 (1" = 17.5'), so I prepared plans to that scale. Although it seemed fictional, I also opted to usethe Marble Head name. The client desired a fancily carved base for the bottle and I tried that, but found my talents and abilities did not lie in that area. Instead, I fabricated a base from four interlocking strips rip sawed from a slab of finely cured walnut. The walnut was so attractive that I decided to use much of that in the model. The name and particulars were carved into the side strips of the stand, the strips assembled with carpenters' glue, and the stand affixed to the bottle with silicone glue. My slab of walnut happened to be 1.2" (3 cm) thick. A square piece sawed from that was used for carving the hull to slightly below the waterline. Several thin pieces were also sawed from the walnut for carving other items such as the masts, spars, etc. A few strips were so thin as to be translucent. As many details as possible were carved into the hull, including the main deck bulwarks. Gunports were first drilled, then squared to shape using the sharpened tang of a small file. The same method was used to form the window openings in the stern, which were then filled with thinned white glue to simulate glass. Separate details shaped from the thinner pieces of walnut included the rudder, tiller, binnacle cabinet, quarterdeck .rails, quarterdeck, booby hatch, pumps, gun carriages, catheads, windlass, forward bitt, booms, yards, masts, bowsprit, and chain wales. Topmasts were carved integrally with the lowermasts and with necked sections at their bases to match angled holes drilled into the hull. Many bottled models use hinged masts, but I elected to use stepped masts. Masts, yards, and bowsprits on bottled models must be thicker than scale to withstand the rigors of bottling. (There are some exceptions made by modelers who I regard as having truly infinite patience). It is also not usual for bottled models to have actual ratlines, but the methods used on this model facilitated their inclusion, as well as the yard braces. A helmsman was carved from a birch dowel and affixed to a hole on the quarterdeck and to the tiller. I neglected to factor his posture into his height so he came out about 20 percent over scale. Slivers of ebony were glued into each of eight gun carriages to simulate the four-pound guns. Although the ship has ten gunports, one source indicated that they rarely had more than eight guns. The bowsprit and jib boom carving incorporated a small section of the foredeck, including the forward hatches, bitt, and windlass. A hole in this foredeck accepted the heel of the foremast, which then passed into a matching hole in the hull. Each chain wale slipped snugly into slots made in the side of the hull, permitting removal and reinstallation with their attached ratlines and shrouds. A #71 drill (0.026” or 0.6 mm diameter) was used in a pin vise to drill holes in the masts, bowsprit, yards, booms, chain plates and foreward keel for the rigging threads. Black sewing thread was used for standing rigging and tan thread for the running rigging. Central holes in each yard and holes in the end of each boom were attached with black thread to form hinged joints with related holes in each mast. The tan thread was attached to holes in the yards and booms, reeved through suited holes in the masts, and tied through other holes in the yards and booms to simulate lifts and braces. This still permit- ted cockbi11ing of the yards. The hull was then screwed, on the underside, to a temporary rigging stand. Pins were driven into the sides of the stand at points which matched the holes in each chain wale. Three black threads were reeved through holes in each mast and the individual holes in each chain wale, then knotted and glued to the pins in the rigging stand. Glue-stiffened threads were next cut to length and glued to the shrouds with white glue to simulate the ratlines. Short lengths of thread were also glued inboard on each chain wale at the junction of the shrouds, along the tops and bottoms. Measurements of the yards and booms were taken and used to make paper templates of each sail. When a good fit was achieved, the template was marked and later used to layout a tracing master on a sheet of white paper which included the seam lines. A homemade light table was used to trace the master template lines onto both sides of a piece of parchment-like calligraphy paper. The two jibs were made to fold over the forestay lines, and a pennant to fold over the top of the mainmast. The pennant is also fictional, but developed from a couple of books on flags for ship models, which seems to be a field in itself. The tracing master was also used to develop the final plan accompanying this article (figure 1). The sails were cut out, curled slight1y around a dowel, and glued into place with white glue. Tan thread "sheets" were inserted in each jib before gluing their inboard corners. The squaresails were only glued along the upper yards, and the mainsails only along the gaffs. When all had dried, the shroud lines were cut from the rigging stand just below each chain wale, leaving short lengths to be glued later to the hull during bottling. The chain wales were pulled out of their slots in the hull and the masts and bowsprit lifted off as an entire assembly. The hull was unscrewed from the rigging stand. A second hull was carved from pine to use for casting an impression in the sea material. Artists' acrylic gel was mixed with acrylic paint and troweled onto a piece of paper. The waxed pine hull was pressed into this. As the gel began to harden, waves and wakes were sculptured in the surface using toothpicks. After this set, white acrylic paint was applied along the wavetops and wake. The hull was removed from the rubber-like gel. Acrylic gloss medium was applied after all had dried. This was my second experience with using acrylic gel for a sea material. The prior time involved a bottle with a nice flat surface upon which to glue the sea. Theoretically, the gel can be rolled up, inserted into the bottle, and then unrolled into the white glue (which I'd applied by using a sipping straw as a pipette). In this case, the side edges of the gel kept curling away from the bottle and glue, defying my efforts to press it into place. Annoyed by this development, I used a bamboo skewer to pry the material loose and large forceps to roll it up and pull it out of the bottle, resulting in the need to reclean the bottle. After removing the glue, I scissored the gel-sea into an oval shape in hopes that it would cure the problem. It did relieve the problem some, but not as much as I wanted it to. On a subsequent model, I tried something which did seem to solve the problem of the gel-sea curling along the sides. I rolled a piece of aluminum flashing to match the curve of the inside diameter of the bottle and troweled the gel upon that. After the gel-sea had again been glued inside the bottle, white glue was applied to the depression and the hull glued in place. The rigged masts and bowsprit were next passed through the neck of the bottle, using care to only curl the sails. The mainmast was stepped, the bowsprit and foredeck placed into position, and the foremast coaxed into the holes in the foredeck and hull. Each channel wale was next glued into the slots on each side of the hull, working from stern to bow. Bent wire tools were used to arrange each sail, boom, and yard. The lower portions of each sail were glued to the lower booms and yards, followed by the sheets and braces. The martingale or bobstay was glued to the bowsprit. It takes much less time in the telling than in the doing. After each item is glued into place, it's best to wait until the glue dries before proceeding to the next item. And there always seems to be some unanticipated problem to sort out and correct. The anchor on the gunwale is an example. Three times I attempted to carve that from ebony, but each was a failure. I finally made one from bits of styrene and painted it flat black. This was the last item to be glued into place. A Turk's-head knot was woven about the neck of the bottle and the threaded plastic cap was replaced with a cork. Per my log, this model required about 100 hours to make in forty days.
<urn:uuid:02a68c2c-5922-4450-bacb-5ed6855191b2>
CC-MAIN-2020-16
https://folkartinbottles.com/workshop/building-instructions/117-build-a-colonial-schooner-by-charles-hand-jr
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505366.8/warc/CC-MAIN-20200401034127-20200401064127-00516.warc.gz
en
0.981504
2,468
2.6875
3
- Describe matter and elements - Describe the interrelationship between protons, neutrons, and electrons, and the ways in which electrons can be donated or shared between atoms At its most fundamental level, life is made up of matter. Matter occupies space and has mass. All matter is composed of elements, substances that cannot be broken down or transformed chemically into other substances. Each element is made of atoms, each with a constant number of protons and unique properties. A total of 118 elements have been defined; however, only 92 occur naturally, and fewer than 30 are found in living cells. The remaining 26 elements are unstable and, therefore, do not exist for very long or are theoretical and have yet to be detected. Each element is designated by its chemical symbol (such as H, N, O, C, and Na), and possesses unique properties. These unique properties allow elements to combine and to bond with each other in specific ways. An atom is the smallest component of an element that retains all of the chemical properties of that element. For example, one hydrogen atom has all of the properties of the element hydrogen, such as it exists as a gas at room temperature, and it bonds with oxygen to create a water molecule. Hydrogen atoms cannot be broken down into anything smaller while still retaining the properties of hydrogen. If a hydrogen atom were broken down into subatomic particles, it would no longer have the properties of hydrogen. At the most basic level, all organisms are made of a combination of elements. They contain atoms that combine together to form molecules. In multicellular organisms, such as animals, molecules can interact to form cells that combine to form tissues, which make up organs. These combinations continue until entire multicellular organisms are formed. All atoms contain protons, electrons, and neutrons (Figure 2.2). The only exception is hydrogen (H), which is made of one proton and one electron. A proton is a positively charged particle that resides in the nucleus (the core of the atom) of an atom and has a mass of 1 and a charge of +1. An electron is a negatively charged particle that travels in the space around the nucleus. In other words, it resides outside of the nucleus. It has a negligible mass and has a charge of –1. Neutrons, like protons, reside in the nucleus of an atom. They have a mass of 1 and no charge. The positive (protons) and negative (electrons) charges balance each other in a neutral atom, which has a net zero charge. Because protons and neutrons each have a mass of 1, the mass of an atom is equal to the number of protons and neutrons of that atom. The number of electrons does not factor into the overall mass, because their mass is so small. As stated earlier, each element has its own unique properties. Each contains a different number of protons and neutrons, giving it its own atomic number and mass number. The atomic number of an element is equal to the number of protons that element contains. The mass number, or atomic mass, is the number of protons plus the number of neutrons of that element. Therefore, it is possible to determine the number of neutrons by subtracting the atomic number from the mass number. These numbers provide information about the elements and how they will react when combined. Different elements have different melting and boiling points, and are in different states (liquid, solid, or gas) at room temperature. They also combine in different ways. Some form specific types of bonds, whereas others do not. How they combine is based on the number of electrons present. Because of these characteristics, the elements are arranged into the periodic table of elements, a chart of the elements that includes the atomic number and relative atomic mass of each element. The periodic table also provides key information about the properties of elements (Figure 2.2)—often indicated by color-coding. The arrangement of the table also shows how the electrons in each element are organized and provides important details about how atoms will react with each other to form molecules. Isotopes are different forms of the same element that have the same number of protons, but a different number of neutrons. Some elements, such as carbon, potassium, and uranium, have naturally occurring isotopes. Carbon-12, the most common isotope of carbon, contains six protons and six neutrons. Therefore, it has a mass number of 12 (six protons and six neutrons) and an atomic number of 6 (which makes it carbon). Carbon-14 contains six protons and eight neutrons. Therefore, it has a mass number of 14 (six protons and eight neutrons) and an atomic number of 6, meaning it is still the element carbon. These two alternate forms of carbon are isotopes. Some isotopes are unstable and will lose protons, other subatomic particles, or energy to form more stable elements. These are called radioactive isotopes or radioisotopes. How many neutrons do (K) potassium-39 and potassium-40 have, respectively? Carbon-14 (14C) is a naturally occurring radioisotope that is created in the atmosphere by cosmic rays. This is a continuous process, so more 14C is always being created. As a living organism develops, the relative level of 14C in its body is equal to the concentration of 14C in the atmosphere. When an organism dies, it is no longer ingesting 14C, so the ratio will decline. 14C decays to 14N by a process called beta decay; it gives off energy in this slow process. After approximately 5,730 years, only one-half of the starting concentration of 14C will have been converted to 14N. The time it takes for half of the original concentration of an isotope to decay to its more stable form is called its half-life. Because the half-life of 14C is long, it is used to age formerly living objects, such as fossils. Using the ratio of the 14C concentration found in an object to the amount of 14C detected in the atmosphere, the amount of the isotope that has not yet decayed can be determined. Based on this amount, the age of the fossil can be calculated to about 50,000 years (Figure 2.4). Isotopes with longer half-lives, such as potassium-40, are used to calculate the ages of older fossils. Through the use of carbon dating, scientists can reconstruct the ecology and biogeography of organisms living within the past 50,000 years. To learn more about atoms and isotopes, and how you can tell one isotope from another, visit this site and run the simulation. How elements interact with one another depends on how their electrons are arranged and how many openings for electrons exist at the outermost region where electrons are present in an atom. Electrons exist at energy levels that form shells around the nucleus. The closest shell can hold up to two electrons. The closest shell to the nucleus is always filled first, before any other shell can be filled. Hydrogen has one electron; therefore, it has only one spot occupied within the lowest shell. Helium has two electrons; therefore, it can completely fill the lowest shell with its two electrons. If you look at the periodic table, you will see that hydrogen and helium are the only two elements in the first row. This is because they only have electrons in their first shell. Hydrogen and helium are the only two elements that have the lowest shell and no other shells. The second and third energy levels can hold up to eight electrons. The eight electrons are arranged in four pairs and one position in each pair is filled with an electron before any pairs are completed. Looking at the periodic table again (Figure 2.3), you will notice that there are seven rows. These rows correspond to the number of shells that the elements within that row have. The elements within a particular row have increasing numbers of electrons as the columns proceed from left to right. Although each element has the same number of shells, not all of the shells are completely filled with electrons. If you look at the second row of the periodic table, you will find lithium (Li), beryllium (Be), boron (B), carbon (C), nitrogen (N), oxygen (O), fluorine (F), and neon (Ne). These all have electrons that occupy only the first and second shells. Lithium has only one electron in its outermost shell, beryllium has two electrons, boron has three, and so on, until the entire shell is filled with eight electrons, as is the case with neon. Not all elements have enough electrons to fill their outermost shells, but an atom is at its most stable when all of the electron positions in the outermost shell are filled. Because of these vacancies in the outermost shells, we see the formation of chemical bonds, or interactions between two or more of the same or different elements that result in the formation of molecules. To achieve greater stability, atoms will tend to completely fill their outer shells and will bond with other elements to accomplish this goal by sharing electrons, accepting electrons from another atom, or donating electrons to another atom. Because the outermost shells of the elements with low atomic numbers (up to calcium, with atomic number 20) can hold eight electrons, this is referred to as the octet rule. An element can donate, accept, or share electrons with other elements to fill its outer shell and satisfy the octet rule. When an atom does not contain equal numbers of protons and electrons, it is called an ion. Because the number of electrons does not equal the number of protons, each ion has a net charge. Positive ions are formed by losing electrons and are called cations. Negative ions are formed by gaining electrons and are called anions. For example, sodium only has one electron in its outermost shell. It takes less energy for sodium to donate that one electron than it does to accept seven more electrons to fill the outer shell. If sodium loses an electron, it now has 11 protons and only 10 electrons, leaving it with an overall charge of +1. It is now called a sodium ion. The chlorine atom has seven electrons in its outer shell. Again, it is more energy-efficient for chlorine to gain one electron than to lose seven. Therefore, it tends to gain an electron to create an ion with 17 protons and 18 electrons, giving it a net negative (–1) charge. It is now called a chloride ion. This movement of electrons from one element to another is referred to as electron transfer. As Figure 2.5 illustrates, a sodium atom (Na) only has one electron in its outermost shell, whereas a chlorine atom (Cl) has seven electrons in its outermost shell. A sodium atom will donate its one electron to empty its shell, and a chlorine atom will accept that electron to fill its shell, becoming chloride. Both ions now satisfy the octet rule and have complete outermost shells. Because the number of electrons is no longer equal to the number of protons, each is now an ion and has a +1 (sodium) or –1 (chloride) charge. There are four types of bonds or interactions: ionic, covalent, hydrogen bonds, and van der Waals interactions. Ionic and covalent bonds are strong interactions that require a larger energy input to break apart. When an element donates an electron from its outer shell, as in the sodium atom example above, a positive ion is formed. The element accepting the electron is now negatively charged. Because positive and negative charges attract, these ions stay together and form an ionic bond, or a bond between ions. The elements bond together with the electron from one element staying predominantly with the other element. When Na+ and Cl– ions combine to produce NaCl, an electron from a sodium atom stays with the other seven from the chlorine atom, and the sodium and chloride ions attract each other in a lattice of ions with a net zero charge. Another type of strong chemical bond between two or more atoms is a covalent bond. These bonds form when an electron is shared between two elements and are the strongest and most common form of chemical bond in living organisms. Covalent bonds form between the elements that make up the biological molecules in our cells. Unlike ionic bonds, covalent bonds do not dissociate in water. The hydrogen and oxygen atoms that combine to form water molecules are bound together by covalent bonds. The electron from the hydrogen atom divides its time between the outer shell of the hydrogen atom and the incomplete outer shell of the oxygen atom. To completely fill the outer shell of an oxygen atom, two electrons from two hydrogen atoms are needed, hence the subscript “2” in H2O. The electrons are shared between the atoms, dividing their time between them to “fill” the outer shell of each. This sharing is a lower energy state for all of the atoms involved than if they existed without their outer shells filled. There are two types of covalent bonds: polar and nonpolar. Nonpolar covalent bonds form between two atoms of the same element or between different elements that share the electrons equally. For example, an oxygen atom can bond with another oxygen atom to fill their outer shells. This association is nonpolar because the electrons will be equally distributed between each oxygen atom. Two covalent bonds form between the two oxygen atoms because oxygen requires two shared electrons to fill its outermost shell. Nitrogen atoms will form three covalent bonds (also called triple covalent) between two atoms of nitrogen because each nitrogen atom needs three electrons to fill its outermost shell. Another example of a nonpolar covalent bond is found in the methane (CH4) molecule. The carbon atom has four electrons in its outermost shell and needs four more to fill it. It gets these four from four hydrogen atoms, each atom providing one. These elements all share the electrons equally, creating four nonpolar covalent bonds (Figure 2.6). In a polar covalent bond, the electrons shared by the atoms spend more time closer to one nucleus than to the other nucleus. Because of the unequal distribution of electrons between the different nuclei, a slightly positive (δ+) or slightly negative (δ–) charge develops. The covalent bonds between hydrogen and oxygen atoms in water are polar covalent bonds. The shared electrons spend more time near the oxygen nucleus, giving it a small negative charge, than they spend near the hydrogen nuclei, giving these molecules a small positive charge. Ionic and covalent bonds are strong bonds that require considerable energy to break. However, not all bonds between elements are ionic or covalent bonds. Weaker bonds can also form. These are attractions that occur between positive and negative charges that do not require much energy to break. Two weak bonds that occur frequently are hydrogen bonds and van der Waals interactions. These bonds give rise to the unique properties of water and the unique structures of DNA and proteins. When polar covalent bonds containing a hydrogen atom form, the hydrogen atom in that bond has a slightly positive charge. This is because the shared electron is pulled more strongly toward the other element and away from the hydrogen nucleus. Because the hydrogen atom is slightly positive (δ+), it will be attracted to neighboring negative partial charges (δ–). When this happens, a weak interaction occurs between the δ+ charge of the hydrogen atom of one molecule and the δ– charge of the other molecule. This interaction is called a hydrogen bond. This type of bond is common; for example, the liquid nature of water is caused by the hydrogen bonds between water molecules (Figure 2.7). Hydrogen bonds give water the unique properties that sustain life. If it were not for hydrogen bonding, water would be a gas rather than a liquid at room temperature. Hydrogen bonds can form between different molecules and they do not always have to include a water molecule. Hydrogen atoms in polar bonds within any molecule can form bonds with other adjacent molecules. For example, hydrogen bonds hold together two long strands of DNA to give the DNA molecule its characteristic double-stranded structure. Hydrogen bonds are also responsible for some of the three-dimensional structure of proteins. van der Waals Interactions Like hydrogen bonds, van der Waals interactions are weak attractions or interactions between molecules. They occur between polar, covalently bound, atoms in different molecules. Some of these weak attractions are caused by temporary partial charges formed when electrons move around a nucleus. These weak interactions between molecules are important in biological systems. Have you or anyone you know ever had a magnetic resonance imaging (MRI) scan, a mammogram, or an X-ray? These tests produce images of your soft tissues and organs (as with an MRI or mammogram) or your bones (as happens in an X-ray) by using either radiowaves or special isotopes (radiolabeled or fluorescently labeled) that are ingested or injected into the body. These tests provide data for disease diagnoses by creating images of your organs or skeletal system. MRI imaging works by subjecting hydrogen nuclei, which are abundant in the water in soft tissues, to fluctuating magnetic fields, which cause them to emit their own magnetic field. This signal is then read by sensors in the machine and interpreted by a computer to form a detailed image. Some radiography technologists and technicians specialize in computed tomography, MRI, and mammography. They produce films or images of the body that help medical professionals examine and diagnose. Radiologists work directly with patients, explaining machinery, preparing them for exams, and ensuring that their body or body parts are positioned correctly to produce the needed images. Physicians or radiologists then analyze the test results. Radiography technicians can work in hospitals, doctors’ offices, or specialized imaging centers. Training to become a radiography technician happens at hospitals, colleges, and universities that offer certificates, associate’s degrees, or bachelor’s degrees in radiography.
<urn:uuid:e30d00f2-095f-4360-a9cc-7bff7b2c4c6f>
CC-MAIN-2020-16
https://openstax.org/books/concepts-biology/pages/2-1-the-building-blocks-of-molecules
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370521574.59/warc/CC-MAIN-20200404073139-20200404103139-00075.warc.gz
en
0.931688
3,749
3.75
4
Medical Lifestyle Assessment How Much Does Lifestyle Dictate Health? Table of Contents - How Does Lifestyle Impact Health? - Non-Communicable Disorders - Lifestyle Habits - What is a Medical Lifestyle Assessment? - Benefits of a Medical Lifestyle Assessment - How is a Lifestyle Assessment Performed? - Information for the Patient - Information for the Doctor - How do Lifestyle Assessments Help the Public? How Does Lifestyle Impact Health? Why is a lifestyle assessment important for your medical care? In current society, it is more popular to take medication than to make lifestyle changes, even when those changes could improve overall health. The reality is that many diseases and disorders today are preventable and can be managed with the right lifestyle choices. Lifestyle assessments give your medical professional detailed information to help properly decide what care you need. Globally, non-communicable disorders (NCDs) account for 71% (41 million) of all annual deaths.1 This makes them the leading cause of death and disability worldwide, with more than 3 in 5 people dying from NCDs.2 Non-communicable disorders are non-infections and non-transmissible diseases that can be caused by genetics or lifestyle and behavioral factors. They include cardiovascular diseases, cancer, chronic respiratory diseases, diabetes, obesity, hypertension, stress, and anxiety.2 Such diseases typically progress slowly and have a long time span. Most importantly, most non-communicable disorders are preventable, as they are often caused by negative lifestyle habits. Chronic respiratory diseases In the U.S., more than 88% of annual deaths can be attributed to NCDs.3 30% of these are due to cardiovascular diseases, 22% due to cancers, 9% due to chronic respiratory diseases, 3% due to diabetes, 24% due to other NCDs, 5% due to communicable, maternal, perinatal and nutritional conditions, and 7% are due to injuries.3 Cardiovascular diseases (CVDs), and specifically coronary heart disease and strokes, are the leading cause of death globally and in the United States. CVDs can be largely prevented by addressing the following risk factors and lifestyle habits: tobacco use, unhealthy diet, obesity, physical inactivity, and diabetes. The cancers that cause the greatest number of deaths are lung cancer, stomach cancer, liver cancer, colon cancer, and breast cancer. The behavioral and dietary risk factors for these types of cancers include high body mass index, lack of physical activity, low fruit and vegetable intake, tobacco use, alcohol use, and viral infections (such as Hepatitis B and C). Chronic Respiratory Diseases Chronic respiratory diseases are diseases of the airways and other structures of the lungs, such as asthma and chronic obstructive pulmonary disease (COPD). COPD is caused mainly by tobacco smoke (firsthand or secondhand smoke). Diabetes is a chronic disease that occurs when the body cannot effectively regulate blood sugar. It can cause death when untreated but can also be prevented and delayed when addressing the following risk factors: diet, physical activity, and body weight. Habits and behaviors that impact health generally include physical activity, diet, sleep patterns, smoking, drinking, and drug consumption. For this reason, in recent years, there has been a greater shift in healthcare towards addressing lifestyle habits that may negatively impact a person’s health and put them at risk of developing diseases, particularly NCDs, which can be largely avoided and prevented. Most of the modern-day healthcare system is reactive, meaning that people typically go to the doctor once they have a problem that they need to address. Preventative health care focuses more on adopting healthy lifestyle habits in order to prevent and avoid certain diseases that cause premature death. Additionally, with the development of more effective drugs, improved healthcare, and better nutritional and hygienic conditions, the average human life expectancy has almost doubled in many developed countries. This means that people are living much longer, but not necessarily living healthier lifestyles. Therefore, it is important to address lifestyle habits that might cause the deterioration of life earlier than necessary. What is a Medical Lifestyle Assessment? A medical lifestyle assessment involves the collection and analysis of health-related information that is then used by clinicians and health care teams to support healthy behaviors and change harmful behaviors. This process is completed with a healthcare provider where a patient provides an overview of lifestyle habits, such as dietary habits, physical exercise, drinking or smoking habits, drug use, sleep patterns, stress levels, and more. This assessment gives primary care teams the opportunity to examine a patient’s health status for potential health risks in order to help prevent NCDs. Lifestyle assessments are not intended to be used as diagnostic tools, and they do not include complete medical histories, medical testing, or complete medical information. Instead, they look specifically at how lifestyle factors influence a person’s health. In other words, lifestyle assessments focus more on preventative measures rather than physical health examinations, which may evaluate current health status. Lifestyle assessments focus on long-term health and making positive changes to health to improve longevity. What Health Concerns are Typically Discussed in a Lifestyle Assessment? Although medical lifestyle assessments will vary from one healthcare provider to the next, the following issues are typically discussed: Social support/social isolation Ability to manage your own health Quality of life Any other health behaviors, risks, or concerns Who Performs a Lifestyle Assessment? A lifestyle assessment will typically be performed by a primary healthcare provider but might also be performed by a team of staff. For instance, specialist doctors who are already seeing the patient might be involved in the lifestyle assessment. In a typical lifestyle assessment, a lifestyle assessment form will be completed that involves a list of questions, which will then be discussed with a doctor. Any changes to health or health care plans that are implemented as a result of a lifestyle assessment may involve other health care providers, such as specialists, psychologists or psychiatrists, nutritionists, personal trainers, social workers, and more. After completing a lifestyle assessment, the patient and their healthcare provider will make a plan of action in order to address any problems or concerns. What are the Benefits of Medical Lifestyle Assessments? Many people go to the doctor only when they have a problem or for a routine checkup. It is less common that people go to the doctor as a preventative measure to discuss lifestyle habits. Many people have habits that they know aren’t healthy, such as going to sleep late or drinking alcohol; however, not everyone knows how to change those routines. There are benefits to having a medical lifestyle assessment done, particularly in preventing diseases. There are also benefits to the healthcare system in collecting data and information on people’s lifestyles. This data helps determine the health status of citizens and to implement policies or changes in healthcare. Medical lifestyle assessments improve people’s health by: Improving the patient-healthcare provider relationship by creating rapport and having a dialogue surrounding current health. Giving patients the opportunity to talk about issues that might be sensitive to some people, such as mental health issues, alcohol or drug use, and sexual activity. Helping healthcare providers identify and prioritize patient health issues and goals. Providing patients with information and education surrounding how lifestyle habits can impact health. Helping patients understand their health status and step to improve their health. Reminding patients to be aware of behaviors and habits that affect health or are risk factors for chronic conditions. Tracking patient health behavior over time and improving patient follow up. Measuring and monitoring patient data at the population level for proactive care. Identifying issues that might require referrals, specialist help or additional resources. How is a Lifestyle Assessment Performed? A medical lifestyle assessment is usually presented as a questionnaire that includes a variety of questions. Some questions require yes or no answers, others require a rating on some type of scale, others require selecting the applicable answers, or some might be open-ended questions that the patient will fill out the answers for. Here is an example of the type of questions that a person would be asked to fill out and discuss with their doctor. While this is a fairly long list, there might be other questions that a healthcare provider might ask.4 Date of birth Number of children What are your main health concerns? How are you feeling? What are you doing for your health presently? - Healthy diet - Medical doctor - Prescription medications - Relaxation techniques What do you believe might be the causes or underlying factors of your current health concerns? Have you experienced any trauma or loss in the past? What level of stress are you experiencing during this time of your life? What are the major causes of stress in your life? - Mental Health - Physical Health - Unfulfilled expectations What does your stress look like? Do you have any coping mechanisms for your stress? How many hours do you sleep daily on average? What time do you go to sleep? What time do you wake up? What time do you wake up? Do you wake up feeling rested? What is your typical energy level? Daily Life & Exercise What is your occupation? How many hours do you work every day? What time do you start and end work? Do you enjoy your work? Do you smoke cigarettes? - If yes, how many? - If no, are you ever exposed to second-hand smoke? How many hours do you spend daily, on average: - Watching TV - On social media - Using your computer What do you do for exercise? How frequently do you exercise? What are your interests and hobbies? Do you take vacations regularly? When was your last vacation? Do you actively participate in a church or spiritual group? Do you wish to gain or lose weight? Do you have high blood pressure or low blood pressure? How much weight would you like to gain or lose? Are you currently taking any medications? - If yes, list the medications and reasons for taking them List any vitamins, minerals, herbal, and homeopathic remedies you are currently taking and the amounts/dosages you are taking Do you have any allergies or sensitivities? How often do you have a bowel movement? Have you ever been hospitalized? - If yes, for what reason? Have you ever been diagnosed with an illness, mental or physical? - If yes, explain what and when you were diagnosed Do you have trouble having a bowel movement? - If yes, is it related to a particular food or circumstance? Do you have loose bowel movements? - If yes, is it related to a particular food or circumstance? Have you ever been treated for alcohol or substance abuse? Are you or could you be pregnant? Are you pre-menopausal or post-menopausal? Are you experiencing menopausal symptoms? - If yes, specify what symptoms Have you had a bone density test? - If yes, what were the results? Has your father, mother, sibling, grandparent, sibling, or another relative ever had: - Heart disease - Mental illness - Intestinal disease How many times a day do you eat? - How many main meals do you eat? What times of the day? - How many snacks do you eat? What times of the day? Do you eat meals: - With family - At home - In a restaurant - On the run Do you feel like there are restrictions on your diet due to the preference of others? (Family, roommates) - If yes, explain On a typical day, what do you eat for At what time do you have your last meal or snack of the day? How many ½ cup servings of each do you typically eat in a day? - Whole Grains - Dairy Products Things You Use Do you eat or use: - aluminum pans - fried foods - refined/processed foods - luncheon meats - artificial sweetener - fast foods - air fresheners - scented body products Things You Drink Please indicate how many cups of the following you drink per day: - Fruit juice - Vegetable juice - Soft drinks - A meat-eater How often do you eat meat? How often do you consume dairy products? What are your favorite foods? How often do you eat them? What foods do you crave? Do you experience any symptoms if you miss a meal? Are there any foods that you avoid? - If yes, why? Do you experience any symptoms after eating? Is there anything else health or lifestyle-related that you would like to share? What Information Does a Lifestyle Assessment Give? A lifestyle assessment test can offer valuable information to patients. For starters, many people have unhealthy habits that they may not realize are affecting their lives. For example, they might not get enough sleep, be under severe stress, smoke cigarettes, or drink alcohol, and not realize that it is affecting their health. In reality, these activities can compromise long-term health and increases the risk of developing a non-communicable disorder. Another effect of smoking cigarettes, drinking alcohol, or using other substances is the possibility of developing a substance use disorder. While mental health issues and substance abuse issues have not typically been categorized as non-communicable diseases, they exhibit the same criteria in that they are non-infectious and non-transmissible disorders caused by lifestyle habits (e.g., drinking and abusing substances). Therefore, a lifestyle assessment can bring awareness to health problems or lifestyle habits that put a person at risk for certain diseases. For example, a person might discover that their dietary habits have put them at risk of diabetes. Essentially, a lifestyle assessment helps a person be informed and proactive with their health. It teaches how lifestyle choices impact health outcomes. It also helps the doctor be more informed about their patients’ health and gives them the opportunity to create an action plan. How Do Lifestyle Assessments Help Doctors? A doctor will most likely use the results of a lifestyle assessment for two purposes. The first is to give the patient a better understanding of health. The assessment also helps doctors recommend what changes might help people avoid certain diseases or disorders. A lifestyle assessment also gives a healthcare provider a better understanding of what has caused certain disorders or diseases. Oftentimes, laboratory tests may not cover all possible health issues, and lifestyle choices might have a larger impact on the patient’s issues that may not be detected during a routine exam. A lifestyle assessment tool is also a way for doctors to foster better relationships with their patients, making them feel more comfortable discussing sensitive issues. The second way that a doctor might use the results of a lifestyle assessment is to collect data for public health issues. While the results of a lifestyle assessment are confidential, the information might be used anonymously in order for healthcare professionals to determine what types of unhealthy lifestyle choices or habits may cause certain diseases or disorders. This helps healthcare professionals to learn about the effects and outcomes of different medications patients take or health interventions that have been implemented. It helps healthcare professionals to understand how certain lifestyles might relate to specific populations, age groups, genders and more, and how such lifestyles have effects on health outcomes. Providers are then able to compare and contrast different lifestyles and measure how these affect health outcomes. How Do Medical Lifestyle Assessments Help the Public? Gathering such information can help healthcare professionals to implement public health policies that address the prevention of NCDs. This information can help professionals understand public health trends. Empowered with this data, health professionals can implement strategies that improve the overall health of the public and promote healthier lifestyles and choices. By doing this, the aim is to improve the health and longevity of peoples’ lives and to decrease the number of deaths caused by NCDs. The leading cause of death should not be preventable diseases and disorders.
<urn:uuid:528c61a2-1e25-409c-8ba8-4b2873ae346e>
CC-MAIN-2020-16
https://jflowershealth.com/lifestyle-assessment/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505826.39/warc/CC-MAIN-20200401161832-20200401191832-00275.warc.gz
en
0.929196
3,348
3.140625
3
Henry Morris explains in his book The Biblical Basis for Modern Science that the Bible’s approach to worldview issues is comprehensive and includes science, technology, the humanities, commerce, law, civil government, and education, in short, every facet of human culture: [L]ong before [the Great Commission] another great commission was given to all men, whether saved or unsaved, merely by virtue of being men created by God in His image. It also had worldwide scope, and has never been rescinded. It had to do with implementing God’s purpose in His work of creation, just as Christ’s commission was for implementing His work of salvation and reconciliation. Morris says that the command to subdue the earth means “bringing all earth’s systems and processes into a state of optimum productivity and utility, offering the greatest glory to God and benefit to mankind.” The church has a long history of applying all the Bible to all of life. “Throughout American history, the moral principles of Judeo-Christian ethics have been used as one of many effective tools to evaluate and reform a wide variety of social structures, and have continued to be invoked in political debates.” This perspective is best exemplified in the life and work of the Puritans who applied the Bible to work, marriage, economics, family, education, politics, social ethics, social action, as well as personal piety, devotion, worship, and theological study. “Puritanism was a movement in which the Bible was central to everything.” They found these principles in the Bible and applied them to their current and unique circumstances. The history of Western civilization is the history of the development and implementation of the Bible to all of life. While a book like James A. Haught’s 2000 Years of Disbelief tries to counter this assertion by claiming that for two millennia no one of any significance believed the truths of the Christian religion, especially in the realm of science, the facts of history demonstrate that Christian scientists, explorers, philosophers, artists, inventors, and writers have dominated their fields. Rodney Stark argues there is “no inherent conflict between religion and science” and “Christian theology was essential for the rise of science.” After a thorough study of the Scholastic period, he shows “that the leading scientific figures in the sixteenth and seventeenth centuries overwhelmingly were devout Christians who believed it their duty to comprehend God’s handiwork.” Haught makes no mention of Bible-believing scientists Isaac Newton, Lord Kelvin, Joseph Lister, Johann Kepler, Robert Boyle, and Gregor Mendel; patriot and governor of Virginia Patrick Henry; artist and inventor Samuel F. B. Morse who, on May 24, 1844, chose the biblical verse “What hath God wrought?” (Num. 23:23) as the first telegraphic message transmitted over a long distance (160 miles); airplane inventors Wilbur and Orville Wright; Supreme Court Justice David J. Brewer who, after a thorough study of the historical record, declared that America was a “Christian nation”; scholar, Christian apologist, social commentator, and fiction writer C. S. Lewis; social reformer and anti-slavery advocate William Wilberforce; lexicographer Noah Webster, developer of America’s first comprehensive dictionary, An American Dictionary of the English Language (1828). The list could go on. In the book 1,000 Years, 1000 People: Ranking the Men and Women Who Shaped the Millennium, we find a picture quite different from the one painted by Haught. Of the first ten entries, six of the rankings were Christians. Johannes Gutenberg (1394?–1468), inventor of the printing press, is first on the list. The first book that came off his press was the Bible. Christopher Columbus (1451–1506) fills the number two spot. It was Columbus who saw in the Bible a directive to take the gospel— “the Holy Christian Faith”—around the world. He is followed by Martin Luther (1483–1546) who set the Protestant Reformation in motion and whose translation of the Bible into German brought uniformity to the German language. Following him is Galileo Galilei (1564–1642) who systematically attacked the church’s reliance on Aristotle’s cosmology over against the Bible and changed the way we view the cosmos. Isaac Newton (1642–1727), in addition to his scientific discoveries and laying the foundations for differential and integral calculus, wrote numerous works on Christian theology. One of his most noted works is Observations Upon Prophecies of Daniel, and the Apocalypse of He read the Bible daily throughout his life and wrote over a million words of notes regarding his study of it. Isaac Newton believed the Bible is literally true in every respect. Throughout his life, he continually tested Biblical truth against the physical truths of experimental and theoretical science. He never observed a contradiction. In fact, he viewed his own scientific work as a method by which to reinforce belief in Biblical truth. Thomas Aquinas (1225–1274), who wrote extensively on the proofs for God’s existence, is ranked eighth. He argued that the mind, using reason to think through the reality of God’s existence (Isa. 1:18), is a gift given to us by God, an attribute that separates us from the animal creation. We know very little about William Shakespeare’s religious beliefs. He is fifth on the list. We do know that he was a member of the Church of England where he and his children were baptized. While Peter J. Leithart correctly notes that there is a “deeply Christian worldview embodied in his plays,” and Louise Cowan maintains that “his perspective was not simply spiritual, but overtly Christian,” we must be careful not to read Shakespeare as a symbolic literary course on the Bible. Even so, “it is seen that Shakespeare drank so deeply from the wells of Scripture that one may say, without any straining of the evidence, without the Bible Shakespeare could not be.” Like Shakespeare, little is known of the specifics of Leonardo Da Vinci’s religious commitment. We do know, however, that his most memorable art subjects came from the Bible (Adoration of the Magi, The Baptism of Christ, The Last Supper, The Resurrection of Christ). Leonardo, ninth on the list, also applied his talents to mathematics, music, anatomy, botany, and engineering. He was the epitome of what it meant to be a Renaissance Man. Ludwig van Beethoven, who holds the tenth spot, was a Roman Catholic who mistrusted the clergy. While little is known of his religious convictions, “many of his musical works reveal definite Christian imprints. These are plainly evident in Missa Solemnis [Solemn Mass] and in Christ on the Mount of Olives as well as in other religious compositions.” As these and many other historical examples would show, western civilization cannot be explained without reference to a biblical worldview. Modern biographers of scientists seem oblivious to the fact that up to the end of the eighteenth century “most intelligent men, and thus most scientists, held that divine revelation could tell them what had happened in the beginning, how the Creator had so to speak, set the stage of the world which their science was now newly investigating. Charles Darwin, seventh on the 1,000 Years, 1000 People list, is the exception that proves the rule. From helping the poor, widows, and orphans to the development of science, the abolition of slavery, and the development of art and music, and so much more, the Christian worldview has been the instrumental document. With changed hearts through the redemptive work of Jesus Christ and the life transforming power of the Holy Spirit in renewing the mind, the world has changed. Humanists, secularists, and materialists are seeking credit for these great achievements, but neither the Bible nor history is on their side. Henry M. Morris, The Biblical Basis for Modern Science (Grand Rapids, MI: Baker Book House, 1984), 41. Morris, The Biblical Basis for Modern Science, 41. Susan Pace Hamill, “An Argument for Tax Reform Based on Judeo-Christian Ethics,” Alabama Law Review 54:1 (Fall 2002), 3–4. I do not agree with all of Hamill’s conclusions or application of a Judeo-Christian ethic, but her underlying historic claims are correct. Leland Ryken, Worldly Saints: The Puritans As They Really Were (Grand Rapids, MI: Zondervan/Academie, 1986), 13. James A. Haught, 2000 Years of Disbelief: Famous People with the Courage to Doubt (Amherst, NY: Prometheus Books, 1996). Rodney Stark, For the Glory of God: How Monotheism Led to Reformations, Science, Witch-Hunts, and the End of Slavery (Princeton, NJ: Princeton University Press, 2003), 123. See the “Roster of Scientific Stars” on pages 198–199. After a successful demonstration of flight while in France, Wilbur was asked if he would fly the machine tomorrow. “Wilbur told him no. Tomorrow was a Sunday and he would not break the Sabbath.” (Barry Combs, with Martin Caidin, Kill Devil Hill: Discovering the Secret of the Wright Brothers [Boston: Houghton Mifflin Co., 1979], 281). David J. Brewer, The United States: A Christian Nation (Philadelphia, PA: John D. Winston, 1905). Reprinted by American Vision (Powder Springs, Georgia) in 1996. John Pollock, Wilberforce (Belleville, MI: Lion Publishing Co., 1977) and Kevin Belmonte, Hero for Humanity: A Biography of William Wilberforce (Colorado Springs, CO: NavPress, 2002). Harlow Giles Unger, The Life and Times of Noah Webster: An American Portrait (New York: John Wiley & Sons, 1998). Agnes Hooper Gottlieb, Henry Gottlieb, Barbara Bowers, and Brent Bowers, 1,000 Years, 1000 People: Ranking the Men and Women Who Shaped the Millennium (New York: Kodansha International, 1998). Christopher Columbus, “The Log of Christopher Columbus,” in The Log of Christopher Columbus, trans. Robert H. Fuson (Camden, ME: International Marine Publishing Co., 1987), 51. Nancy R. Pearcey and Charles B. Thaxton, The Soul of Science: Christian Faith and Natural Philosophy (Wheaton, IL: Crossway Books, 1994), 38–39 and Philip J. Sampson, 6 Modern Myths About Christianity and Western Civilization (Downers Grove, IL: InterVarsity Press, 2001), chap. 1. Stark, For the Glory of God, 167-172. Arthur B. Robinson, “Introduction,” in Isaac Newton, Observations Upon Prophecies of Daniel, and the Apocalypse of St. John (Cave Junction, OR: Oregon Institute of Science and Medicine, 1991), viii–ix. Ronald Mushat Frye, Shakespeare and Christian Doctrine (Princeton, NJ: Princeton University Press, 1963), 3. Peter J. Leithart, Brightest Heaven of Invention: A Christian Guide to Six Shakespeare Plays (Moscow, ID: Canon Press, 1996), 7. Louise Cowan, “The Importance of the Classics,” in Louise Cowan and Os Guinness, eds., Invitation to the Classics: A Guide to Books You’ve Always Wanted to Read (Grand Rapids, MI: Baker Books, 1998), 19. William Burgess, The Bible in Shakespeare: A Study of the Relation of the Works of William Shakespeare to the Bible (Chicago, IL: The Winona Publishing Co., 1903), xiii. Alvin J. Schmidt, Under the Influence: How Christianity Transformed Civilization (Grand Rapids, MI: Zondervan, 2001), 329. Schmidt, Under the Influence, 243. Charles Hodge, What is Darwinism? And Other Writings on Science and Religion, eds. Mark A. Knoll and David N. Livingstone (Grand Rapids, MI: Baker, 1994).
<urn:uuid:0d90f6ca-12cc-43d8-b42a-19311f2fa24a>
CC-MAIN-2020-16
https://americanvision.org/1403/impact-of-christianity-on-world/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497042.33/warc/CC-MAIN-20200330120036-20200330150036-00234.warc.gz
en
0.923668
2,595
2.71875
3
What is the difference between knowledge and wisdom? There are multiple methods for examining differences between disparate concepts. The word difference itself may have several connotations, based on their source. They can stem from mathematical, cultural, perceptual or other ways of thinking. One way of comparing the two concepts is to examine their source or origin. There are multiple types of knowledge, each of which has a different source. Inductive, deductive, logical and mathematic knowledge are based on reasoning, a priori knowledge on rational intuition, experiential knowledge on perception, semantic knowledge on inherent ability and moral knowledge on a combination of perception, intuition and reason or as the supporters of emotivism (Ayer), prescriptivism (Hare) and expressivism (Gibbard) argue, on some completely noncognitive source. In general, “among the basic sources of knowledge and justification are perception, testimony, reason and inference” (Bernecker 326). On the other hand, the sources of wisdom are difficult to identify. Difficulties arise because of two reasons. The first reason relates to the lack of an established and widely accepted epistemic definition. It would be quite unwise to pursue the origin of an indeterminate concept. The second reason concerns the following question: Is wisdom an active innate ability with varying rates of activity in different minds, a latent innate ability that can be discovered in each individual and developed or an ability that can be acquired externally and taught? One may always refer to the traditional model presented by R. Ackoff – the DIKW pyramid. This model arranges data, information, knowledge and wisdom into a systematic hierarchy that tends upwards according to their level of abstraction. Ackoff’s model states that wisdom is obtained from knowledge, knowledge is obtained from information and information is obtained from data. On the other hand, an opposing model constructed by Illka Tuomi says that wisdom and knowledge encourage us look for information and data, which sets the flow of the pyramid in the opposite direction. Revisionists question both models and have constructed a revised model of the pyramid, which flows in both directions and strives to be context specific, incorporating sensory learning, insight, analysis, intelligence and organisational learning. In accordance with the revised model, Jennex describes knowledge as: “information that has been culturally understood such that it explains the how and the why about something or provides insight and understanding into something” and wisdom as “placing knowledge into a framework or nomological net that allows the knowledge to be applied to different and not necessarily intuitive situations” (6). In other words, these definitions suggest that knowledge comes hand in hand with understanding while wisdom comes hand in hand with judgement. The DIKW model represents the existence of hierarchy and correlation between wisdom and knowledge. Examining the sources of wisdom becomes easier if we adopt the definition of interrelation that the DIKW model stands for. In essence, since wisdom and knowledge are interrelated, wisdom becomes a type of knowledge, or in fact, a meta-combination of theoretical and practical knowledge, which express themselves in the form of judgement. This corresponds with the definition put forward by Socrates, the twofold virtue theory of sophia (theoretical wisdom) and phronesis (practical wisdom). The theory holds the word virtue, which we shall examine later. In the meanwhile, the DIKW model and twofold theory do not answer whether wisdom is inherent or acquired. If we consider the two-direction revised model, then knowledge is either acquired from information or somehow inferred from existing wisdom. On the other hand, wisdom is not marginalized by two concepts in the pyramid (being on the peak) but only by one. The pyramid merely suggests its interrelation with knowledge. The differences between the sources of wisdom and knowledge can be discerned upon closer inspection of the human brain and its mechanisms. Surprisingly and quite opposite to philosophical thought, definition and categorization, when studying brain mechanisms, knowledge becomes complex and unfathomable while the explanation of wisdom comes within reach. The neural mechanisms of knowledge are complex and diverse mostly owing to the diversity of knowledge itself. Some forms of knowledge accumulate and are stored by the brain. Episodic memories which contribute to perceptual knowledge are stored in the hippocampus while motor knowledge necessary for movement and coordination is stored in the cerebellum. Knowledge retrieval mechanisms are complex and are believed to involve primary sensory regions in relation with multimodal convergence areas. Other types of knowledge involve reasoning rather than memory (for example inductive, deductive, logical and mathematic knowledge). These are far more difficult to describe in terms of brain activity. For example, inductive knowledge is believed to be the result of yet unspecified spatiotemporal centric thinking mechanisms. In other words, research and experiments suggest that it involves the co-dependency of multiple brain regions. Wisdom combines both memory retrieval and reason. (It should be noted that memory does not equal just long term memory. A person suffering from long-term memory loss can still retain their wisdom.) Goldberg writes that: “As we age, we accumulate generic memories, which allow us increasingly to employ shortcut problem-solving skills to escape the grinding mental work required to crack new mental challenges, and to condense it into pattern recognition” (25). (It is then no coincidence that old people have been named wise rather than children.) Unlike with knowledge, memory and reasoning required for wisdom stem from neural activity in the frontal lobes of the brain. Each frontal lobe functions according to the activity ratio of the its respective cerebral hemisphere. Wisdom (and incidentally, creativity as well) emerge from the unified work of both the right and left hemisphere. The question has now been answered because it is apparent that wisdom is a latent inherent quality, which can be developed as the brain trains itself in pattern-recognition and improves its intuition and judgement over time. Whether the potency of this quality is equal in all individuals is a different question altogether. So neurologically, knowledge is quite different from wisdom because it is stored or inferred in the brain through multiple centric neural pathways while wisdom is obtained from neural processing in the frontal lobes. We can now return to the word virtue and its significance in comparing knowledge and wisdom. Socrates, Sharon Ryan, Robert Nozick and Richard Garrett stand by the definition that wisdom is the “knowledge of how to lead a good life”. Wise people should be able to give advice for the benefit of the greater good. Knowledgeable people are endowed with expertise in specific subjects but they do not have the ability of holistic, wise judgement. This theory suggests that wisdom and knowledge differ in regard to some sort of moral, context-specific cultural connotation. Speaking of cultural connotation, definitions of wisdom and knowledge may differ in different contexts simply because of language. The biologist Lewis Thomas writes that: “Separate languages can exist side by side for centuries without touching each other, maintaining their integrity with the vigour of incompatible tissues” (106). This statement points out the irregularity of our definitions in a culturally based global framework. Is it wise to compare concepts, which form the underlying matrix of our very ability to conceptualize if their differences differ in different cultures? Perhaps this question has no answer. It certainly refutes the aim of this essay. In conclusion, wisdom and knowledge differ in regard to their position in the hierarchy of concepts in the DIKW pyramid, in regard to their source, since knowledge is acquired and wisdom is inherent (and the knowledge, which is inherent is neurologically incompatible with the source of wisdom), in their moral connotation and in their cultural basis and context-specific application in different perspectives. Bernecker, Sven, and Duncan Pritchard, editors. The Routledge Companion to Epistemology. Routledge, 2011. Goldberg, Elkhonon. The Wisdom Paradox: How Your Mind Can Grow Stronger as Your Brain Grows Older. Penguin, 2006, books.google.sk/books?id=9NEN80chkT8C&pg=PT160&lpg=PT160&dq=wisdom+from+the+frontal+lobe&source=bl&ots=Xt-h1tg9Kl&sig=3yL5JntEglGHyqqauVGEuZyMAJw&hl=en&sa=X&ved=0ahUKEwioh5ubzKXQAhVaF8AKHbpnAxsQ6AEILTAD#v=onepage&q=wisdom%20from%20the%20frontal%20lobe&f=false. Accessed 14 Nov. 2016. Goldberg, Robert F., et al. „Perceptual Knowledge Retrieval Activates Sensory Brain Regions.“ Journal of Neuroscience, vol. 26, no. 18, 3 May 2006, pp. 4917-4921, www.jneurosci.org/content/26/18/4917.full. Accessed 14 Nov. 2016. Hines, Tonya. „Brain Anatomy, Anatomy of the Human Brain.“ Mayfield Brain & Spine, Neurosurgeons, Neurosurgery, Minimally Invasive Spine Surgery, Brain Surgery, Neurovascular Surgery, Spine Specialists, Brain Specialists, Back Pain Doctors, Physiatrists, Neurosurgery Clinic, Apr. 2016, www.mayfieldclinic.com/PE-AnatBrain.htm. Accessed 14 Nov. 2016. Lee, Ka Hung, et al. „Circuit Mechanisms Underlying Motor Memory Formation in the Cerebellum.“ PubMed Central (PMC), National Center for Biotechnology Information, www.ncbi.nlm.nih.gov/pmc/articles/PMC4417109/. Accessed 14 Nov. 2016. MacDonald, Graham. „Alfred Jules Ayer (Stanford Encyclopedia of Philosophy).“ Stanford Encyclopedia of Philosophy, 22 Oct. 2010, plato.stanford.edu/entries/ayer/#2. Accessed 14 Nov. 2016. „Revisiting the Knowledge Pyramid.“ Proceedings of the 42nd Hawaii International Conference on System Sciences, Jan. 2009, San Diego State University. ResearchGate, 2009, pp. 1-7, www.researchgate.net/profile/Murray_Jennex/publication/221178453_Re-Visiting_the_Knowledge_Pyramid/links/02e7e52a839e4d20d8000000.pdf. Accessed 14 Nov. 2016. Ryan, Sharon. „Wisdom (Stanford Encyclopedia of Philosophy).“ Stanford Encyclopedia of Philosophy, 4 Feb. 2014, plato.stanford.edu/entries/wisdom/. Accessed 14 Nov. 2016. Thomas, Lewis. „Social Talk.“ The Lives of a Cell: Notes of a Biology Watcher, Bantam Books Inc., 1974, pp. 102-107. Woodruff, Alan. „How Does Memory Work? – The University of Queensland, Australia.“ Queensland Brain Institute, www.qbi.uq.edu.au/brain-facts/how-does-memory-work. Zhong, Ning, et al. „The Cognitive Neural Mechanism of Human Inductive Reasoning: A Brain Informatics Perspective.“ Asia Pacific Biotech News, www.asiabiotech.com/13/1309/0017_0019.pdf. Accessed 14 Nov. 2016.
<urn:uuid:71375840-7c7d-4a8f-9c82-339c4b95de12>
CC-MAIN-2020-16
https://golemrevue.sk/wisdom-and-knowledge/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371700247.99/warc/CC-MAIN-20200407085717-20200407120217-00195.warc.gz
en
0.893248
2,406
3.375
3
Ancient remains and springs are located in the Zanoah valley. They are named after Noah and the great flood. Ancient remains and springs are located in the Zanoah valley, in the low hills of Judea, southwest of Jerusalem. These sites are named after Noah of the Great flood: Kh. Matta (once called Kh. Nuh – the ruins of Noah), Ein Matat (once called Ain Bin Nuh – the spring of the daughter of Noah), Ein Tannur (the spring of the oven, which is named after the source of the flood according to the Quran), and ‘Allar es Sifleh (the ruins where the tomb of the daughter of Noah). The name of the valley – Zanoah – is a new modern Hebrew name, based on several verses in the Bible. Joshua 15, 33-34: “And in the valley… Zanoah”. It is probably why the name Za-Noah was selected, preserving the tradition of Noah and the Flood. The site is located in the valley of Zanoah brook, between the the low hills west of Jerusalem – an area called Shephelah (the “low land”) of Judah. It is accessible by foot from the parking place of Horvat Hanut. The following aerial view shows the points of interest. Crusader (12-13th century AD) The ruined village near Ein Tut was called ‘Allar al-Sifla (lower ‘Allar). The 12th century Crusader village had about 5 residential and farm houses, and included a Church. It was managed by monks of the Cistercian order, who emphasized manual labor and self-sufficiency. The order was founded in 1098 in France by a Benedictine Abbot. They supported their community through agriculture activities, and this was a perfect place – a fertile valley with sources of water, and close to the Holy sites. The small Crusader monastery was probably called Salvatio. Mameluke (15th-17th century) After the Crusaders retreated from the Holy Land, the village was inhabited by Arabs. The village grew around the Crusaders houses and the center of the village relocated tn the foothills 1km north-west of the springs. The area around Matta was examined in the PEF survey (1866-1877) by Wilson, Conder and Kitchener. This area appears in the center of the section of this map of 1878. Part of Map Sheet 17 of Survey of Western Palestine, by Conder and Kitchener, 1872-1877. (Published 1880, reprinted by LifeintheHolyLand.com) Lieutenant Conder wrote a short report on his trip from Jerusalem to Adullam, that passed through these sites (p. 362; excerpt from his report of Jan 30, 1871): “Starting from Jerusalem on the 30th January, in a pelting rain, we pass (my companion being Frere Lievin) by Bettir, Houbin, and Ella el Foka … then Khurbet Hanna, Khurbet Harik csh Shekhaleb, with the tomb of Noah’s daughter, Khurbet Jairieh, the Spring of Tannur (legend of the Deluge), Ellar es Sifla, or Bawaij (mediaeval ruin)”. Another PEF report describes the ruins near Ein Tannur (Quartly Statement, Jan 1873, p23): “Among the ruins are three small churches with very thick though roughly built walls, occurring at El Kubua, Kh. Ain el Keniseh, and ‘Allar el Sifleh”. The latter Church is located at this site, once named ‘Allar. Legend of the Deluge While reading this report, we were curious about the “legend of the Deluge” and the tomb of the daughter of Noah. So we tried to find out more about the relationship of the places to Noah. There are many folklore stories in the Holy Land, and many sites hold tradition to Biblical stories and figures. The area of the sites featured in this web page are related, according to Muslim tradition, to the story of the great flood (the Deluge) and Noah. Noah (“Nuh” in Arabic) is an important figure in the Muslim Quran, since he was one of the earliest prophets sent by God to the evil mankind. The sites in the map above relate to Noah: Ein Tannur – the “Spring of the Oven”. According to the Muslim book of Quran, the great flood was caused by rain and water gushing forth from springs. (54, 12-13): “So we opened the gates of the cloud with water pouring down, and we made water flow forth in the land in springs, so the water gathered together …”. Ain Bint Nuh the Spring is named after the daughter of Noah. It is now called in Hebrew Ein Matta. Khirbet Nuh – the ruins of the village, named after Noah. This ruined village is located near the spring named after the daughter of Noah, and was a part of ‘Allar es Sifleh. Bir Al Malak – the well of the angel, named after Noah who saved mankind. ‘Allar es Sifleh – Arabic – the “lower” ‘Allar. Ruins of the village, where according to the tradition was the tomb of the daughter of Noah. In Arabic el Sifleh means “lower”, since an upper ‘Allar existed until the 19th C (“‘Allar el Fawqa”). ‘Allar el Busl – Arabic – the ‘Allar who grew onion (Arabic: Busl, Hebrew: Bazal). The other name of ‘Allar Upper. “The story of the Deluge” – by Gustav Dore (French artist, 1832-1883) Why have these places named after Noah? tradition… In 1948 the residents of the villages of ‘Allar (lower and upper) moved to the Jordanian area, following the establishment of Israel. The Moshav (cooperative agriculture community) of Matt’a was established in 1950, 600m north-east of the spring of Matta. Its first residents were Jews from Yemen. It was named for the Hebrew word of grove, as in the Bible – translated in KJV to ‘plant’ (Ezekiel 34, 29): “And I will raise up for them a plant of renown, and they shall be no more consumed with hunger in the land, neither bear the shame of the heathen any more”. The area of Khirbet Matta and Ein-Tannur is now part of the “United States Independence Park”, a large (30000 Dunams = 3000 Hectares) nature park in the south-west hills of Judea. The park was established by the KKL in 1976 to commemorate the 200 years of US Independence. It is open to the public without charge, and has great places to hike – such as the sites featured in this web page. (a) Ein Matta (Ain Bint Nuh): Ein Matt’a – the spring of the grove – is located in the valley of Zanoah (named “Wady er Rummaneh” in the PEF map). The ruins of the ancient structures are spread along the valley and on the northern foothills. This photo was captured at the end of winter 2019. However, at the end of the summer, the valley is drier, as seen in the next photo (captured October 2011). The “spring of the grove” is beneath a group of Eucalyptus trees. A path leads from Horvat Hanut to the valley. On the foothills on both sides of the valley are remains of the Arab village of lower ‘Allar (‘Allar es Sifleh), which existed here until 1948. The spring is now called (in Hebrew) Ein Matta – the spring of the grove or orchid, and is named after the nearby Moshav Matta. It was once called Ain Bint-Nuh, named after the daughter of Noah. The area around the spring is a great place to open the bag with the sandwiches, and enjoy the shade. The pond is too small to dip into it, but has a refreshing look. Around the spring are large fig trees, who enjoy the year round supply of water. Another corner of the natural pond… (b) Palm tree orchid: Near the spring, on its east side, is an impressive orchid of a Washington palm trees. It is very densely planted, but when you enter into its shade it seems you enter into an enchanted forest. The tree trunks are black and red, perhaps the result of a fire that burnt all the dry lower leaves. The top of the trees, very high, are bright green in a total juxtaposition to the lower part. The kids immediately found this forest an interesting hide & seek place to play. Their parents were also admiring this cool, magical forest, and tried to guess why it was planted like this and when. Layers of Raffia fibers are extracted from the leaves, and a collection of such fibers is seen between the trees. They can be woven together, creating ropes. Tuvia demonstrates how the fibers can be woven together into a rope: (c) Kh. Matta (Nuh): Near the spring of Kh. Matta ( Ain Bint Nuh) are the ruins of one of the houses, called Kh. Matta or Kh. Nuh (named after Noah). This seems to be one of the Crusaders structures, which was then reused during the Mameluke and Ottoman periods. The blessing “Home Sweet Home” seems to be a little out of line… Other exterior views of the house are seen in the photos below: More photos of the interior: (d) Ein Tanur: The ruins of ‘Allar es-Sifleh (lower ‘Allar) are spread along the valley. Some of the ruins are from the Crusader period, others are from later periods (Mameluke and Ottoman) until 1948 when the village was deserted. The large structure with an impressive wall are the remains of the Crusader church. It is located 250m to the west of Ein Matta. A number of ruined houses were left from the Crusader village. Ein-Tannur flows out of a tunnel, on the south (lower) part of the ruined village. The name of the spring of Ein Tannur (Arabic- “the spring of the oven”) is based on the Muslim Quran, which holds that the Great Flood of Noah burst forth from underground out of a “Tannur”, or oven. The underground tunnel was built in order to dig closer to the source of the spring. You can walk towards the edge of the tunnel – into the “oven”. Some large twisted fig and lemon trees grow out wildly from the outlet of the spring. They provide a cool shaded place to rest before turning back to the parking lot on the top of the hill. (e) Horse Riding: On the way to Kh. Matta, this father and his kids passed by, horseback riding. This is a great way to explore the countryside. There are many horse ranches in Israel, and you can rent horses thru one of the local operators. * Webmaster Rotem: I myself am active in horse riding (Dressage – competitive horse training), and so I truly recommend this sport. What a great way to travel through the sites… * On the Springs: - Ein, Ain – spring (Hebrew, Arabic). - Tannur – Hebrew, Arabic: oven. - Ein-Tannur – According to the Muslim book of Quran, the great flood was caused by rain and water gushing forth from springs. (54, 12-13): “So we opened the gates of the cloud with water pouring down, and we made water flow forth in the land in springs, so the water gathered together …”. - el-Sifleh – Arabic – the “lower” Source of the name of Zanoah valley: - Judea region (Joshua 15, 33-34): “And in the valley, Eshtaol, and Zoreah, and Ashnah, And Zanoah, and Engannim, Tappuah, and Enam,… “ - The residents of Zanoah helped to build the 2nd temple (Nehemiah 3, 13):”The valley gate repaired Hanun, and the inhabitants of Zanoah; they built it, and set up the doors thereof, the locks thereof, and the bars thereof, and a thousand cubits on the wall unto the dung gate”. - Noah in the Islam (pdf) Explains the word Ein Tannur - US Independence park – KKL (Hebrew) ; Map of the park (Hebrew) - Horvat Hanut – nearby site BibleWalks.com – All the Holy Roads lead to Jerusalem This page was last updated on Oct 24, 2011
<urn:uuid:888e84ad-271d-44ed-a9fd-6a78a8ca8ac1>
CC-MAIN-2020-16
https://www.biblewalks.com/khirbetmatta
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496227.25/warc/CC-MAIN-20200329201741-20200329231741-00033.warc.gz
en
0.953385
2,872
3.046875
3
The Issue: Whether during the collapse of the Ottoman Empire genocide was perpetrated against Ottoman Armenian citizens in Eastern Anatolia. The Ottoman Empire ruled over all of Anatolia and significant parts of Europe, North Africa, the Caucasus and Middle East for over 700 years. Lands once Ottoman dominions today comprise more than 30 independent nations. A century of ever-increasing conflict, beginning roughly in 1820 and culminating with the founding of the Republic of Turkey in 1923, characterized the disintegration of the Ottoman Empire. The imperiled empire contracted against an onslaught of external invaders and internal nationalist independence movements. In this context must the tragic experience of the Ottoman Armenians of Eastern Anatolia be understood. For during these waning days of the Ottoman Empire did millions die Muslim, Jew and Christian alike. Yet Armenian Americans have attempted to extricate and isolate their history from the complex circumstances in which their ancestors were embroiled. In so doing, they describe a world populated only by white-hatted heroes and black-hatted villains. Infusing history with myth, Armenian Americans vilify the Republic of Turkey, Turkish Americans, and ethnic Turks worldwide. Bent on this prosecution, Armenian Americans choose their evidence carefully, omitting facts that tend to exonerate those whom they presume guilty, ignoring important events and verifiable accounts, and sometimes relying on dubious or prejudiced sources and even falsified documents. Any attempt to challenge the credibility of witnesses, or the authenticity of documents is either wholly squelched or met with accusations of genocide denial. Moreover, attempts to expose the suffering and needless death of millions of innocent non-Christians enmeshed in the same events as the Anatolian Armenians are greeted with sneers, as if to say that some lives are inherently more valuable than others and that one faith is more deserving than another. The lack of real debate ensures that any consideration of what genuinely occurred nearly a century ago in Eastern Anatolia will utterly fail as a search for the truth. Ultimately, whether to blindly accept the Armenian American portrayal is an issue of fundamental fairness and the most cherished of American rights – free speech. Simply put, in America every person has the opportunity to tell his or her story. However, Armenian Americans seek to deny this very right to others by branding anyone who disagrees with their portrayal a “genocide denier.” The complete story of the vast suffering of this period has not yet been written. When that story is told, the following facts must not be forgotten. FACT 1: Demographic studies prove that prior to World War I fewer than 1.5 million Armenians lived in the entire Ottoman Empire. Thus, allegations that more than 1.5 million Armenians from eastern Anatolia died must be false. Figures reporting the pre-World War I Armenian population vary widely, with Armenian sources claiming far more than others. British, French and Ottoman sources give total figures of 1.05-1.50 million. Only certain Armenian sources claim a pre-war population larger than 1.50 million. Comparing these to post-war figures yields a rough estimate of losses. Boghos Nubar, head of the Armenian delegation at the Paris Peace Conference in 1920, noted that significant numbers survived the war. He declared that after the war 280,000 Armenians remained in the Anatolian portion of the occupied Ottoman Empire while 700,000 Armenians had emigrated to other countries. Historian and demographer, Dr. Justin McCarthy of the University of Louisville, calculates the actual losses as slightly less than 600,000. This figure agrees with those provided by British historian Arnold Toynbee, French missionary, Monseigneur Touchet, and others. FACT 2: Over 2.5 million Muslims died during the same period from similar causes. Armenians suffered a high mortality. But one must likewise consider the number of non-Christian dead. The statistics tell us that more than 2.5 million Anatolian Muslims also perished. Thus, the years 1912-1922 constitute a horrible period for humanity, not just for Armenians. Documents of the time describe intercommunal violence, forced migration of all ethnic groups, disease, and famine as causes of death. FACT 3: Armenian American evidence of genocide is derived from dubious and prejudicial sources. Armenian Americans purport that the wartime propaganda of the enemies of the Ottoman Empire constitutes objective evidence. Oft-quoted Ambassador Henry Morgenthau stated in correspondence with President Wilson that he intended to uncover or manufacture news that would goad the U.S. into joining the war, and thus he sought to malign the Ottoman Empire, an enemy of the Triple Entente. Moreover, Morgenthau relied on politically motivated Armenians; his primary aid, translator and confidant was Arshag Schmavonian, his secretary was Hagop Andonian. Morgenthau professed that the Turks were an inferior race. Thus, his accounts can hardly be considered objective. Compare the wartime writings of Morgenthau and the oft-cited J.G. Harbord to the post-war writings of Admiral Mark L. Bristol, U.S. Ambassador to the Republic of Turkey 1920-1926. In a March 28,1921 letter he wrote, “[R]eports are being freely circulated in the [U.S.] that the Turks massacred thousands of Armenians in the Caucasus. Such reports are repeated so many times it makes my blood boil. The Near East Relief have the reports from Yarrow and our own American people which show absolutely that such Armenian reports are absolutely false. The circulation of such false reports in the United States, without refutation, is an outrage and is certainly doing the Armenians more harm than good…. Why not tell the truth about the Armenians in every way?” FACT 4: The Armenian deaths do not constitute genocide. A. Boghos Nubar addressed a letter to the Times of London on January 30,1919 confirming that the Armenians were indeed belligerents in World War I. He stated with pride, “In the Caucasus, without mentioning the 150,000 Armenians in the Russian armies, about 50,000 Armenian volunteers under Andranik, Mazarbekoff, and others not only fought for four years for the cause of the Entente, but after the breakdown of Russia they were the only forces in the Caucasus to resist the advance of the Turks….” Between 1893 and 1915 Ottoman Armenians in eastern Anatolia rebelled against their government -the Ottoman government — and joined Armenian revolutionary groups, such as the notorious Dashnaks and Hunchaks. They spearheaded a massive Russian invasion of Eastern Anatolia. On November 5, 1914, the President of the Armenian National Bureau in Tblisi declared to Czar Nicholas II, “From all countries Armenians are hurrying to enter the ranks for the glorious Russian Army, with their blood to serve the victory of Russian arms.” In the service of the Russians, traitorous Armenians massacred over 60,000 Muslims in the city of Van alone. B. The allegation of genocide is illogical. In the words of eminent historian Bernard Lewis, speaking to the Israeli daily Ha’aretz on January 23,1998, “The Armenians want to benefit from both worlds. On the one hand, they speak with pride of their struggle against Ottoman despotism, while on the other hand they compare their tragedy to the Jewish Holocaust. I do not accept this. I do not say that the Armenians did not suffer terribly. But I find enough cause for me to contain their attempts to use the Armenian massacres to diminish the worth of the Jewish Holocaust and to relate to it instead as an ethnic dispute.” (translation) C. None of the Ottoman orders commanding the relocation of Armenians, which have been reviewed by historians to date, orders killings. To the contrary, they order Ottoman officials to protect relocated Armenians. Unfortunately, where Ottoman control was weak, Armenian relocatees suffered most. The stories of the time give examples of columns of hundreds of Armenians guarded by as few as two Ottoman gendarmes. When local Muslims attacked the columns, Armenians were robbed and killed. These Muslims had themselves suffered greatly at the hands of Armenians and Russians. Conversely,where Ottoman control was strong, Armenians went unharmed. In Istanbul and other major Western Anatolian cities, large populations of Armenians remained throughout the war, their churches open. D. The term “genocide” did not exist prior to 1944. It was later defined quite specifically by the 1948 U.N. Convention on the Prevention of the Crime of Genocide. The standard of proof in establishing the crime of genocide is formidable given the severity of the crime, the opportunity for overlap with other crimes, and the stigma of being charged with or found guilty of the crime. While presenting the Convention for ratification, the Secretary General of the U.N. emphasized that genocide is a crime of “specific intent,” requiring conclusive proof that members of a group were targeted simply because they were members of that group. The Secretary General further cautioned that those merely sharing political aims are not protected by the convention. Under this standard of proof, the Armenian American claim of genocide fails. First, no direct evidence has been discovered demonstrating that any Ottoman official sought the destruction of the Ottoman Armenians as such. Second, Ottoman Armenian revolutionaries confessedly waged war against their own government. Under these circumstances, it was the Ottoman Armenians’ violent political alliance with the Russian forces, not their ethnic or religious identity, which rendered them subject to the relocation. FACT 5: The British convened the Malta Tribunal to try Ottoman officials for crimes against Armenians. All of the accused were acquitted. In 1919 The British High Commission in Istanbul, utilizing Armenian informants, arrested 144 high Ottoman officials and deported them to the island of Malta for trial on charges of harming Armenians. While the deportees were interned in Malta, the British appointed an Armenian scholar, Mr. Haig Khazarian, to conduct a thorough examination of the Ottoman, British, and U.S. archives to substantiate the charges. Though granted complete access to all records, Khazarian’s corps of investigators discovered an utter lack of evidence demonstrating that the Ottoman officials either sanctioned or encouraged killings of Armenians. The British Procurator General exonerated and released all 144 detainees – – after two years and four months of detention without trial. No compensation was ever paid to the detainees. FACT 6: Despite the acquittals by the Malta Tribunal, Armenian terrorists have engaged in a vigilante war that continues today. In 1921, a secret Armenian network, named Nemesis, took the law into its own hands and hunted down and assassinated several former Ottoman Ministers, among them Talat Pasha and Jemal Pasha. Following in Nemesis’ footsteps, during the 1970’s and 1980’s the Armenian terrorist groups ASALA (Armenian Secret Army for the Liberation of Armenia) and JCAG (Justice Commandos of the Armenian Genocide) committed over 230 armed attacks, killing 71 innocent people, including 31 Turkish diplomats, and seriously wounding over 520 people in a campaign of blood revenge. FACT 7: The Holocaust bears no meaningful relation to the Ottoman Armenian experience. 1. Jews neither demanded the dismemberment of the nations in which they had lived nor did they kill their fellow citizens. By contrast, Ottoman Armenians openly agitated for a separate state in lands in which they were numerically inferior. With determination they committed mass treason, and took up arms against their government. They also massacred local Muslim and Jewish civilians. 2. The guilt of the perpetrators of the Holocaust was proven at Nuremberg. By contrast, those alleged to have been responsible for the maladministration of the relocation policies were exonerated at Malta by the World War I victors. 3. Hitler did not refer to the Armenians in plotting the Final Solution; the infamous quote is fraudulent. For this reason it was rejected as evidence by the Nuremberg tribunal. 4. Armenians collaborated with the Nazis, forming the 812th Battalion of the [Nazi] Wehrmacht, and its successor, the Armenian legion. Armenians published Anti-Jewish, pro-Nazi propaganda in the Armenian-language Hairenik daily and the Armenian weekly journal. The depth and volume of scholarship on the Holocaust is tremendous. By contrast, much about the late Ottoman Empire has yet to be learned and many conclusions have yet to be drawn. - Armenian Atrocities and Terrorism, ed. by the Assembly of Turkish American Associations (Assembly of Turkish American Associations, Washington, DC, 1997); - Death and Exile: the Ethnic Cleansing of Ottoman Muslims, 1821-1922, by Justin McCarthy (Darwin Press, Princeton, New Jersey. 1995); - Muslims and Minorities, The Population of Ottoman Anatolia and the End of the Empire, by Justin McCarthy (New York University Press, New York, 1983); - Pursuing the Just Cause of Their People, by Michael Gunter (Greenwood Press, New York, 1986); - The Armenian File: The Myth of Innocence Exposed, by Kamuran Guriin (K. Riistem & Bro. and Weidenfeld & Nicolson Ltd., London, 1985); - The Armenian Question 1914-1923, by Mim Kemal Oke (K. Rustem & Bro. London, 1988); - The Story Behind Ambassador Morgenthau’s Story, by Heath W. Lowry (Isis Press, Istanbul, 1990); - The Talat Pasha Telegrams: Historical Fact or Armenian Fiction, by Sinasi Orel and SQreyyaYuca (K. Rustem & Bro., London, 1986); - The U.S. Congress and Adolf Hitler on the Armenians, by Heath W. Lowry (Vol. 3, No. 2, Political Communication and Persuasion, 1985); - Proceedings of Symposium on Armenians in the Ottoman Empire and Turkey (1912-1926), (Bogazigi University Publications, Istanbul, 1984) and - History of the Ottoman Empire and Modern Turkey, by Stanford and Ezel Shaw (Cambridge University Press, Cambridge, U.K., 1977).
<urn:uuid:9a409031-125c-482e-9b67-9a24444be20f>
CC-MAIN-2020-16
https://www.ataa.org/armenian-issue-revisited/the-armenian-allegation-of-genocide-facts
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371624083.66/warc/CC-MAIN-20200406102322-20200406132822-00114.warc.gz
en
0.94458
2,952
3.203125
3
Kepler's View on Biblical Exegesis in "Astronomia Nova" There are, however, many more people who are moved by piety to withhold assent from Copernicus, fearing that falsehood might be charged against the Holy Spirit speaking in the scriptures if we say that the earth is moved and the sun stands still. But let them consider that since we acquire most of our information, both in quality and quantity, through the sense of sight, it is impossible for us to abstract our speech from this ocular sense. Thus, many times each day we speak in accordance with the sense of sight, although we are quite certain that the truth of the matter is otherwise. This verse of Virgil furnishes an example: We are carried from the port, and the land and cities recede. (Aeneid III.72.) Thus, when we emerge from the narrow part of some valley, we say that a great plain is opening itself out before us. Thus Christ said to Peter, "Lead forth on high," (Lk 5:4) as if the sea were higher than the shores. It does seem so to the eyes, but optics shows the cause of this fallacy. Christ was only making use of the common idiom, which nonetheless arose from this visual deception. Thus, we call the rising and setting of the stars "ascent" and "descent," though at the same time that we say the sun ascends, others say it descends. See the Astronomiae pars optica (Ch. 10, 327). Thus the Ptolemaic astronomers even now say that the planets are stationary when they are seen to stay near the same fixed stars for several days, even though they think the planets are then really moving downwards in a straight line, or upwards away from the earth. Thus writers of all nations use the word "solstice," even though they in fact deny that the sun stands still. Thus there has not yet been anyone so doggedly Copernican as to avoid saying that the sun is entering Cancer or Leo, even though he wishes to signify that the earth is entering Capricorn or Aquarius. And there are other like examples. Now the holy scriptures, too, when treating common things (concerning which it is not their purpose to instruct humanity), speak with humans in the human manner, in order to be understood by them. They make use of what is generally acknowledged, in order to weave in other things more lofty and divine. No wonder, then, if scripture also speaks in accordance with human perception when the truth of things is at odds with the senses, whether or not human s are aware of this. Who is unaware that the allusion in Psalm 19 is poetical? Here, under the image of the sun, are sung the spreading of the Gospel and even the sojourn of Christ the Lord in this world on our behalf, and in the singing the sun is said to emerge from the tabernacle of the horizon like a bridegroom from his marriage bed, exuberant as a strong man for the race. Which Virgil imitates thus: Aurora leaving Tithonus's saffron-coloured bed (Aeneid IV.585) The psalmodist was aware that the sun does not go forth from the horizon as from a tabernacle (even though it may appear so to the eyes). On the other hand, he considered the sun to move for the precise reason that it appears so to the eyes. In either case, he expressed it so because in either case it appeared so to the eyes. He should not be judged to have spoken falsely in either case, for the perception of the eyes also has its truth, well suited to the psalmodist's more hidden aim, the adumbration of the Gospel and also of the Son of God. Likewise, Joshua makes mention of the valleys against which the sun and moon moved (Jos 10:12ff), because when he was at the Jordan it appeared so to him. Yet each writer was in perfect control of his meaning. David was describing the magnificence of God made manifest (and Syracides with him), which he expressed so as to exhibit them to the eyes, and possibly also for the sake of a mystical sense spelled out through these visible things. Joshua meant that the sun should be held back in its place in the middle of the sky for an entire day with respect to the sense of his eyes, since for other people during the same interval of time it would remain beneath the earth . But thoughtless persons pay attention only to the verbal contradiction, "the sun stood still" versus "the earth stood still," not considering that this contradiction can only arise in an optical and astronomical context, and does not carry over into common usage. Nor are these thoughtless ones willing to see that Joshua was simply praying that the mountains not remove the sunlight from him, which prayer he expressed in words conforming to the sense of sight, as it would be quite inappropriate to think, at that moment, of astronomy and of visual errors. For if someone had admonished him that the sun doesn't really move against the valley of Ajalon, but only appears to do so, wouldn't Joshua have exclaimed that be only asked for the day to be lengthened, however that might be done? He would therefore have replied in the same way if anyone had begun to present him with arguments for the sun's perpetual rest and the earth's motion. Now God easily understood from Joshua's words what he meant, and responded by stopping the motion of the earth, so that the sun might appear to him to stop. For the gist of Joshua's petition comes to this, that it might appear so to him, whatever the reality might meanwhile be. Indeed, that this appearance should come about was not vain and purposeless, but quite conjoined with the desired effect. But see Chapter 10 of the Astronomiae pars optica, where you will find reasons why, to absolutely all men, the sun appears to move and not the earth: it is because the sun appears small and the earth large, and also because, owing to its apparent slowness, the sun's motion is perceived, not by sight, but by reasoning alone, through its change of distance from the mountains over a period of time. It is therefore impossible for a previously uninformed reason to imagine anything but that the earth, along with the arch of heaven set over it, is like a great house, immobile, in which the sun, so small in stature, travels from one side to the other like a bird flying in the air. What absolutely all men imagine, the first line of holy scripture presents. "In the beginning," says Moses, "God created the heaven and the earth," because it is these two parts that chiefly present themselves to the sense of sight. It is as though Moses were to say to man, "This whole worldly edifice that you see, light above dark and widely spread out below, upon which you are standing and by which you are roofed over, has been created by God." In another passage, Man is asked whether he has learned how to seek out the height of heaven above, or the depths of the earth below (Jer 31:37), because to the ordinary man both appear to extend through equally infinite spaces. Nevertheless, there is no one in his right mind who, upon hearing these words, would use them to limit astronomers' diligence either in showing the contemptible smallness of the earth in comparison with the heavens, or in investigating astronomical distances. For these words do not concern measurements arrived at by reasoning. Rather, they concern real exploration, which is utterly impossible for the human body, fixed upon the land and drawing upon the free air. Read all of Chapter 38 of Job, and compare it with matters discussed in astronomy and in physics. Suppose someone were to assert, from Psalm 24, that the earth is founded upon rivers, in order to support the novel and absurd philosophical conclusion that the earth floats upon rivers. Would it not be correct to say to him that he should regard the Holy Spirit as a divine messenger, and refrain from wantonly dragging Him into physics class? For in that passage the psalmodist intends nothing but what men already know and experience daily, namely, that the land, raised on high after the separation of the waters, has great rivers flowing through it and seas surrounding it. Not surprisingly, the same figure of speech is adopted in another passage, where the Israelites sing that they were seated upon the waters of Babylon (Ps 137), that is, by the riverside, or on the banks of the Euphrates and Tigris. If this is easily accepted, why can it not also be accepted that in other passages usually cited in opposition to the earth's motion we should likewise turn our eyes from physics to the aims of scripture? A generation passes away says Ecclesiastes (Eccl 1:4), and a generation comes, but the earth stands forever. Does it seem here as if Solomon wanted to argue with the astronomers? No; rather, he wanted to warn men of their own mutability, while the earth, home of the human race, remains always the same, the motion of the sun perpetually returns to the same place, the wind blows in a circle and returns to its starting point, rivers flow from their sources into the sea, and from the sea return to the sources, and finally, as these men perish, others are born. Life's tale is ever the same; there is nothing new under the sun. You do not hear any physical dogma here. The message is a moral one, concerning something self-evident and seen by all eyes but seldom pondered. Solomon therefore urges us to ponder. Who is unaware that the earth is always the same? Who does not see the sun return daily to its place of rising, rivers perennially flowing towards the sea, the winds returning in regular alternation, and men succeeding one another? But who really considers that the same drama of life is always being played, only with different characters, and that not a single thing in human affairs is new? So Solomon, by mentioning what is evident to all, warns of that which almost everyone wrongly neglects. It is said, however, that Psalm 104, in its entirety, is a physical discussion, since the whole of it is concerned with physical matters, and in it, God is said to have "founded the earth upon its stability, that it not be laid low unto the ages of ages." But in fact, nothing could be farther from the psalmodist's intention than speculation about physical causes. For the whole thing is an exultation upon the greatness of God, who made all these things: the author has composed a hymn to God the Creator, in which he treats the world in order, as it appears to the eyes. If you consider carefully, you will see that it is a commentary upon the six days of creation in Genesis. For in the latter, the first three days are given to the separation of the regions: first, the region of light from the exterior darkness; second, the waters from the waters by the interposition of an extended region; and third, the land from the seas, where the earth is clothed with plants and shrubs. The last three days, on the other hand, are devoted to the filling of the regions so distinguished; the fourth, of the heavens; the fifth, of the seas and the air; and the sixth, of the land. And in this psalm there are likewise the same number of distinct parts, analogous to the works of the six days. In the second verse, be enfolds the Creator with the vestment of light, first of created things, and the work of the first day. The second part begins with the third verse, and concerns the water above the heavens, the extended region of the heavens, and atmospheric phenomena that the psalmodist ascribes to the waters above the heavens, namely, clouds, winds, tornadoes, and lightening. The third part begins with the sixth verse, and celebrates the earth as the foundation of the things being considered. The psalmodist relates everything to the earth and to the things that live on it, because, in the judgment of six, the chief parts of the world are two: heaven and earth. He therefore considers that for so many ages now the earth has neither sunk nor cracked apart nor tumbled down, yet no one has certain knowledge of what it is founded upon. He does not wish to teach things of which men are ignorant, but to recall to mind something they neglect, namely, God's greatness and potency in a creation of such magnitude, so solid and stable. If an astronomer teaches that the earth is carried through the heavens, he is not spurning what the psalmodist says here, nor does he contradict human experience. For it is still true that the land, the work of God the architect, has not toppled as our buildings usually do, consumed by age and rot; that it has not slumped to one side; that the dwelling places of living things have not been set in disarray; that the mountains and coasts have stood firm, unmoved against the blast of wind and wave, as they were from the beginning. And then the psalmodist adds a beautiful sketch of the separation of the waters by the continents, and adorns his account by adding springs and the amenities that springs and crags provide for bird and beast. He also does not fail to mention the adorning of the earth's surface, included by Moses among the works of the third day, although the psalmodist derives it from its prior cause, namely, a humidification arising in the heavens, and embellishes his account by bringing to mind the benefits accruing from that adornment for the nurture and pleasure of humans and for the lairs of the beasts. The fourth part begins with verse 20, and celebrates the work of the fourth day, the sun and the moon, but chiefly the benefit that the division of times brings to humans and other living things. It is this benefit that is his subject matter: it is clear that he is not writing as an astronomer here. If he were, he would not fail to mention the five planets, than whose motion nothing is more admirable, nothing more beautiful, and nothing a better witness to the Creator's wisdom, for those who take note of it. The fifth part, in verse 26, concerns the work of the fifth day, where He fills the sea with fish and ornaments it with sea voyages. The sixth is added, though obscurely, in verse 28, and concerns the animals living on land, created on the sixth day. At the end in conclusion, he declares the general goodness of God in sustaining all things and creating new things. So everything the psalmodist said of the world relates to living things. He tells nothing that is not generally acknowledged, because his purpose was to praise things that are known, not to seek out the unknown. It was his wish to invite men to consider the benefits accruing to them from each of these works of the six days. I, too, implore my reader, when he departs from the temple and enters astronomical studies, not to forget the divine goodness conferred upon men, to the consideration of which the psalmodist chiefly invites. I hope that, with me, he will praise and celebrate the Creator's wisdom and greatness, which I unfold for him in the more perspicacious explanation of the world's form, the investigation of causes, and the detection of errors of vision. Let him not only extol the Creator's divine beneficence in His concern for the well being of all living things, expressed in the firmness and stability of the earth, but also acknowledge His wisdom expressed in its motion, at once so well hidden and so admirable. But whoever is too stupid to understand astronomical science, or too weak to believe Copernicus without affecting his faith, I would advise him that, having dismissed astronomical studies and having damned whatever philosophical opinions he pleases, he mind his own business and betake himself home to scratch in his own dirt patch, abandoning this wandering about the world. He should raise his eyes (his only means of vision) to this visible heaven and with his whole heart burst forth in giving thanks and praising God the Creator. He can be sure that he worships God no less than the astronomer, to whom God has granted the more penetrating vision of the mind's eye, and an ability and desire to celebrate his God above those things he has discovered. So much for the authority of holy scripture. As for the opinions of the pious on these matters of nature, I have just one thing to say: while in theology it is authority that carries the most weight, in philosophy it is reason. Therefore, Lactantius is pious, who denied that the earth is round, Augustine is pious, who, though admitting the roundness, denied the antipodes, and the Inquisition nowadays is pious, which, though allowing the earth's smallness, denies its motion. To me, however, the truth is more pious still, and (with all due respect for the Doctors of the Church) I prove philosophically not only that the earth is round, not only that it is inhabited all the way around at the antipodes, not only that it is contemptibly small, but also that it is carried along among the stars.
<urn:uuid:b849c2f7-3a5f-4fe3-95ba-8986bb60616b>
CC-MAIN-2020-16
http://www.inters.org/kepler-biblical-exegesis-astronomia-nova
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371880945.85/warc/CC-MAIN-20200409220932-20200410011432-00555.warc.gz
en
0.970377
3,614
2.984375
3
The decades before the Great Famine witnessed a growing interest, in both Ireland and Britain, in the problem of Ireland’s endemic poverty. The sheer extent of poverty in the country and the very nature of that impoverishment – the relative lack of capital investment; an over-reliance on small agricultural holdings and a single staple crop; the complex and pervasive culture of mendicancy (begging) – were among the most striking characteristics of pre-Famine Irish society highlighted by foreign travellers and social inquirers. As outlined in a previous post on this blog(https://offalyhistoryblog.wordpress.com/2019/01/05/poverty-in-pre-famine-offaly-kings-county-by-ciaran-mccabe), a Royal Commission for Inquiring into the Condition of the Poorer Classes in Ireland (aka the Poor Inquiry) sat between 1833 and 1836, and examined in considerable detail, the social condition of the poorer classes throughout the island. The resulting published reports, totalling more than 5,000 pages (much of it seemingly-verbatim testimony taken at public inquiries) illuminates more than any other source the experiences of the lower sections of Irish society on the eve of the Famine; fortunately for us, the Poor Inquiry collected evidence from witnesses in King’s County. The Poor Inquiry investigated poverty and social conditions through two primary methods – firstly, by distributing a printed questionnaire to local elites in parishes throughout the country, and second, as Niall Ó Ciosáin writes, ‘the adoption of a novel methodology, the communal oral hearing’. In the latter case, two Poor Law Commissioners, attached to the central commission office in Dublin, travelled to towns throughout Ireland and held public hearings, to which locals were invited to attend and give evidence as to the social condition of the people in their locality. In the subsequently published reports of the Poor Inquiry, the questionnaires take up 409 pages, while the oral evidence presented at public hearings (much of it, apparently verbatim), totalled 793 pages. Crucially, while the information provided in the questionnaires was limited to the elites, the public hearings, held at hotels and courthouses, recorded evidence and testimonies from all social classes, from landlords to beggars. While we have few accounts of the dynamics of individual public hearings, a first-hand account of the Poor Inquiry’s hearing in Daingean in County Offaly (then called Philipstown in King’s County) was recorded in the travel account of Poor Law Commissioner Jonathan Binns. Binns (1785-1871) was an English Quaker who served as an assistant agricultural commissioner on the Whately Poor Inquiry in the mid-1830s and travelled across Ireland in this capacity, carrying out investigations into the social conditions of the poor. Among the locations he visited in the course of his work was Philipstown (which we know today as Daingean); his description of the town in the mid-1830s makes for grim reading, and paints a picture of a town decimated by long-term decay, and the removal of its social, economic and political significance: ‘The town is well built, and was formerly a place of note. It contains a capital Court-house and Prison, a large Catholic chapel, and a small Protestant church. The Grand Canal, on which two passage-boats ply daily between Dublin and the Shannon harbour, adjoins the town. Previously to the [1800 Act of] Union, Philipstown returned two members to parliament, and was a place of considerable trade. Lamentably, however, are things changed now. It is robbed of its representatives – the assizes are removed to Tullamoore[sic] – its trade has disappeared – many of its houses are in ruins – its shops are falling into decay – and its population, as these signs sufficiently indicate, are poor and wretched. Although surrounded by miles of unreclaimed bog land, its inhabitants wander about the streets in search of employment, and find none.’ Binns’s account resembles the description of Philipstown in Samuel Lewis’s contemporaneous Topographical Dictionary of Ireland (1837): “The town has little to recommend it. In size and population it is small, and its situation, being nearly surrounded by bog, is extremely uninteresting.” Among the factors which contributed to the demise of Philipstown was the growing importance of Tullamore in the early- to mid-nineteenth century, as demonstrated in the construction of new civic buildings in the latter town, such as the county gaol and courthouse in the 1820s and 1830s. In 1833 Tullamore effectively replaced Philipstown as the county town when the county assizes, which had been held in Philipstown since the mid-sixteenth century, were transferred to Tullamore. The Poor Inquiry examination at the courthouse at Philipstown commenced on 16 November 1835. A particular strength of Binns’s own personal account of the Poor Inquiry was the detailed outline of the work of the commissioners: where they held sessions and who addressed them. In many locations throughout Ireland, commissioners did not limit their work to holding sedentary sittings, but, rather, ventured out into the local community and inspected local social conditions for themselves; for instance, in Dublin city, commissioners personally visited some of the most notorious slum areas in the Liberties. The commissioners in Philipstown were no different. Binns tells us: “In walking over the bog [just outside the town] we came to a cabin occupied by Barney Mangin, the walls of which were cut out of the solid moss. The roof slopes from the front towards the back, which is level with the surface of the moss, as shewn in the end-view annexed. Barney was a miserable, half-starved creature, and lived with his wife and two children in this cabin, paying for it, however, no rent. Window or chimney it had none, and the smoke found its way out at the door, and through the imperfect roof, which consisted of sods and turf. Mangain paid, last year, 20s. for one cwt. of meal on trust, when the market price was only twelve shillings.” Among the most ubiquitous figures in pre-Famine Irish society, both in urban and rural areas, were wandering beggars (mendicants). Attitudes and responses to soliciting beggars were varied, complex and framed by interweaving influences of social class, religion, gender and a natural sense of empathy. On the one hand, beggars could be seen as deviant, work-shy, suspicious characters who spread gossip, sedition and infectious disease throughout the country; on the other hand, they could also be seen as sympathetic figures, whose poverty may not have been self-inflicted, thus marking them as ‘God’s poor’ and deserving of assistance. In Philipstown, Binns appears to have encountered beggars of both, in his view, moral and immoral character. For instance, he reflected on the practical complexities inherent in doling out alms to street beggars, and rightly identified most beggars as being women and children: ‘… the windows were frequently crowded with miserable women, carrying children upon their backs, and soliciting charity with pitiful lamentations. To relieve all was impossible – and to relieve only a few increased the number of those who begged.’ However, seemingly malevolent beggars did not escape his attention, with Binns noting: “The beggars in this district are very numerous; they sometimes pass through Philipstown, to the number of three or four hundred a day, are often tipsy, and circulate stories of malicious tendency.” Binns presented a regular trope of beggars who “occasionally amass[ed], by one means or another, considerable wealth”. A Mr Odlum, a wealthy businessman, relayed to Binns his awareness of a beggar who gave his own daughter £100. Nonetheless, Binns drew comfort from the significance of the work in which he was engaged and the long-term consequences of the Poor Inquiry’s investigations: ‘Under such distressing circumstances, my consolation was, that I was engaged in preparing a full and honest statement of their wretched condition, with a view to the introduction of legislative measures of relief.’ The inquiry was told that many of the local labourers were underemployed, although in some instances this underemployment was seen as being self-inflicted; some witnesses noted the work-shy nature and lack of motivation amongst many of the (largely Catholic) lower classes. According to a Rev Hamilton, presumably a Protestant clergyman, although not explicitly stated, “if it were advertised that a cricket was to walk across the street, crowds would collect to see it”. Binns, however, spoke about the people of Philipstown with great empathy. He stressed the dire impoverishment of the locality and its people, who would work for as little as four pence per day “if they could get it”. Their diet was of “the poorest description” and was barely sufficient to sustain life: “To use their own words, uttered with great pathos and feeling, – “We are only just breathing” – “Our eyes are only just kept open”. • Jonathan Binns, The miseries and beauties of Ireland. Vol II (2 vols, London, 1837); • Peter Gray, The making of the Irish poor law, 1815–43 (Manchester, 2009); • Niall Ó Ciosáin, Ireland in official print culture, 1800-1850: a new reading of the Poor Inquiry (Oxford, 2014); • Ciarán Reilly, The Irish land agent, 1830-60: the case of King’s County (Dublin, 2014); • Chapters by Michael Byrne and Timothy P. O’Neill in William Nolan & Timothy P. O’Neill (eds), Offaly history and society (Dublin, 1998). Dr Ciarán McCabe is an Irish Research Council postdoctoral research fellow at University College Dublin. His book, Begging, Charity and Religion in Pre-Famine Ireland, was published by Liverpool University Press in 2018. Ciaran serves on the committee of the Offaly Historical and Archaeological Society, and will deliver a paper to the society on Monday 23 September 2019 on the topic of ‘Poverty and Poor Relief in pre-Famine King’s County’ in the Offaly Heritage Centre, Tullamore at 8pm. Ciarán’s lecture will be followed by the Offaly launch of his book (launch by OHAS Honorary Secretary, Michael Byrne) and refreshments.
<urn:uuid:c52c7d87-11f6-43b0-b374-b41b37955096>
CC-MAIN-2020-16
https://offalyhistoryblog.wordpress.com/2019/09/21/jonathan-binns-and-the-poor-inquiry-in-philipstown-daingean-kings-county-november-1835-by-ciaran-mccabe/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500482.27/warc/CC-MAIN-20200331115844-20200331145844-00315.warc.gz
en
0.969651
2,276
3.484375
3
The Federal Reserve Bank was founded in an act of Congress in 1913, with its primary directive to “furnish an elastic currency.” Its mission was expanded in the aftermath of the Great Depression to include responsibility for operating monetary policy in a manner to help stabilize the economy. After World War II, Congress directed the Fed to pursue a dual mandate, long interpreted to mean full employment and reasonable price stability. The Fed has been left to decide how to implement policy to achieve these objectives and has over time experimented with a variety of methods including interest rates, reserves, and money aggregate targets. While some central banks have adopted explicit inflation targets, the Fed has argued that this would reduce its ability to respond in a flexible manner to disruptions, and would not be consistent with its dual mandate. Note also that none of the subsequent amendments to the original 1913 Act have supplanted the Fed's directive to act as lender of last resort or manager of the national payments system, providing an “elastic currency.” Finally, the Fed has always been responsible for regulating and supervising member banks—a responsibility it shares with Treasury. When the global financial crisis began in 2007, the Fed reacted by providing liquidity through its discount window and open market operations, later supplemented by a number of extraordinary facilities created to provide reserves as well as guarantees. Some estimates place the total amount of government loans, purchases, spending, and guarantees provided during the crisis at more than $20 trillion—much greater than the value of the total annual production of the nation. Only a very small portion of this was explicitly approved by Congress, and much of the detail surrounding commitments made—especially those made by the Fed—was clouded in secrecy. A few days ago the Fed finally released on its website some data on its behind-closed-doors deal-making. In coming weeks I will provide more comments on what has been revealed. In this column I will only raise questions concerning the appropriateness of secret bail-outs that were provided to financial institutions, nonfinancial firms, and even individuals. Fed critics from both the right and the left have been arguing it is time to reign-in the Fed and it is certain that the next Congress will return to this issue. Democratic Accountability and Transparency of the Fed In this crisis, the Fed's role has dominated, with the Treasury taking a back seat. While the Fed committed many trillions of dollars to its rescue of Wall Street, the Treasury's total fiscal stimulus packages for Main Street amounted to about one trillion. Yet unlike the Treasury—whose purse strings are directly controlled by Congress--those in charge of monetary policy are not subject to the same degree of democratic accountability. Further, while the Fed's actions have become more transparent since 1994 (when Representative Gonzalez caught Chairman Greenspan in a subterfuge, leading to substantial reduction of its secrecy to comply with Congressional demands), most of its deliberation remains behind closed doors. At best, it informs Congress of its decisions after the fact. Fed officials are not elected, and by design are not subject to the will of the voters. While the Fed is a creature of Congress, current law does not provide substantive control. Since 2007 the Fed has mounted an unprecedented effort to stabilize the financial system and the national economy. Faced with the worst crisis since the Great Depression, the Fed found that traditional monetary policy—lowering interest rates and standing by as lender of last resort to the regulated banking system—was impotent in the face of collapsing asset prices and frozen financial markets. The Fed created an “alphabet soup” of new facilities to provide liquidity to markets. It worked behind the scenes to bail-out troubled institutions. It provided guarantees for private liabilities. It extended loans to foreign institutions including central banks. The Fed's on-balance sheet liabilities grew to $2 trillion, while its off-balance sheet contingent promises amounted to many trillions more. Congress and the public at large have become increasingly concerned not only about the size of these commitments but also about the shroud of secrecy. For the most part, the Fed simply refused requests for greater transparency. Ironically, when the crisis first hit, Treasury Secretary Paulson submitted to Congress a vague request for rescue funds that was rejected precisely because it lacked details and a mechanism to give Congress oversight on the spending. Eventually a detailed program of about $800 billion was approved. Yet, the Fed has spent, lent, or promised untold trillions of dollars--far more dollars than Congress provided to the Treasury. Most of this was negotiated behind closed doors, often at the New York Fed. The Fed's defense is that such secrecy is needed to prevent a run on troubled institutions, which would only increase the government's costs of resolution. There is, of course, a legitimate reason to fear sparking a panic. Yet, when relative calm returned to financial markets, the Fed still resisted requests to explain its actions even ex post. This finally led Congress to call for an audit of the Fed in a nearly unanimous vote. Some in Congress are now questioning the legitimacy of the Fed's independence. In particular, given the importance of the NYFed some are worried that it is too close to the Wall Street banks it is supposed to oversee and that it has in many cases been forced to rescue. The President of the NYFed met frequently with top management of Wall Street institutions throughout the crisis, and reportedly pushed deals that favored one institution over another. However, like the other presidents of district banks, the President of the NY Fed is selected by the regulated banks. This led critics to call for a change to allow appointment by the President of the nation. Critics note that while the Fed has become much more open since the early 1990s, the crisis has highlighted how little oversight the congressional and executive branches have over the Fed, and how little transparency there is even today. There is an inherent conflict between the need for transparency and oversight when public spending is involved and the need for independence and secrecy in formulating monetary policy and in supervising regulated financial institutions. A democratic government cannot formulate its budget in secrecy. Except when it comes to national defense, budgetary policy must be openly debated and all spending must be subject to open audits. That is exactly what was done in the case of the fiscal stimulus package. However, it is argued that monetary policy cannot be formulated in the open—a long and drawn out and open debate by the Federal Open Market Committee about when and by how much interest rates ought to be raised would generate chaos in financial markets. Similarly, an open discussion by regulators about which financial institutions might be insolvent would guarantee a run out of their liabilities and force a government take-over. Even if these arguments are overstated and even if a bit more transparency could be allowed in such deliberations by the Fed, it is clear that the normal operations of a central bank will involve more deliberation behind closed doors than is expected of the budgetary process for government spending. Further, even if the governance of the Fed were to be substantially reformed to allow for Presidential appointments of all top officials, this would not reduce the need for closed deliberations. The question is whether the Fed should be able to commit the public purse in times of national crisis. Was it appropriate for the Fed to commit Uncle Sam to trillions of dollars of funds to bail out US financial institutions and nonfinancial firms, as well as foreign institutions and governments (through repo operations with foreign central banks that lent dollars to them, exposing the Fed to default risk)? Some will object that there is a fundamental difference between spending by the Fed and spending by the Treasury. The Fed's actions are limited to purchasing financial assets, lending against collateral, and guaranteeing private liabilities. While the Treasury also operates some lending programs and guarantees private liabilities (for example, through the FDIC and Sallie Mae programs), and while it has purchased private equities in recent bail-outs (of GM, for example), most of its spending takes the form of transfer payments and purchases of real output. Yet, when Treasury engages in lending or guarantees, its funds must be approved by Congress. The Fed does not face such a budgetary constraint—it can commit Uncle Sam to trillions of dollars of commitments without going to Congress. Bail-outs necessarily result in winners and losers, and socialization of losses. At the end of the 1980s when it became necessary to resolve the thrift industry, Congress created an authority (the Resolution Trust Corporation) and budgeted funds for the resolution. It was recognized that losses would be socialized—with a final accounting in the neighborhood of $200 billion. Government officials involved in the resolution were held accountable for their actions, and more than one thousand top management officers of thrifts went to prison. While undoubtedly imperfect, the resolution was properly funded, implemented, and managed to completion. By contrast, the bail-outs so far in this much more serious crisis have been uncoordinated, mostly off-budget, and done largely in secret—and mostly by the Fed. There were exceptions, of course. There was a spirited public debate about whether government ought to rescue the auto industry. In the end, funds were budgeted, government took an equity share and an active role in decision-making, and openly picked winners and losers. Again, the rescue was imperfect but today it seems to have been successful. Whether it will still look successful a decade from now we cannot know, but at least we do know that Congress decided the industry was worth saving as a matter of public policy. No such public debate occurred in the case of, say, Goldman Sachs—which was apparently saved by a series of indirect measures (for example, providing funds to AIG that were immediately and secretly passed-through to Goldman). There was never any public discussion of the need to rescue Goldman through the back-door means of providing funds to AIG—indeed, those actions were only discovered after the fact. The main public justification for rescuing financial institutions has been the supposed need to “get credit flowing again”, but if so, the bail-outs have been largely unsuccessful (and given debt loads in the private sector, encouraging lending is probably unwise in any case). Alternative methods of stimulating credit, or—better—of stimulating private spending, have hardly been discussed. Indeed, the massive sums already provided to Wall Street (again, mostly off-budget) prove to be a tremendous barrier to formulating another stimulus package for Main Street. Even as labor markets remain moribund, as homeowners continue to face foreclosures, and as retailers face bankruptcy, Congress fears voter backlash about additional government commitments. While economists make a fine distinction between commitments made by the Fed versus those made by Treasury, voters do not. Uncle Sam is on the hook, no matter who put him there. Voters want to know what good has been accomplished by expanding the Fed's balance sheet liabilities to two trillion dollars, and by extension of Uncle Sam's commitments by perhaps $20 trillion through loans, guarantees, and bail-outs. In coming weeks and months I will revisit this topic—it is one of the most important issues facing this country as we try as we try to reform the financial system and policy-making so that we can recover from the crisis created by Wall Street. L. Randall Wray is a Professor of Economics, University of Missouri—Kansas City. A student of Hyman Minsky, his research focuses on monetary and fiscal policy as well as unemployment and job creation. He writes a weekly column for Benzinga every Thursday. He also blogs at New Economic Perspectives, and is a BrainTruster at New Deal 2.0. He is a senior scholar at the Levy Economics Institute, and has been a visiting professor at the University of Rome (La Sapienza), UNAM (Mexico City), University of Paris (South), and the University of Bologna (Italy).
<urn:uuid:ba7a478c-77b0-4fc9-b2ba-5e45304af68b>
CC-MAIN-2020-16
https://www.businessinsider.com/time-for-accountability-and-transparency-at-the-fed-2010-12
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371880945.85/warc/CC-MAIN-20200409220932-20200410011432-00553.warc.gz
en
0.971089
2,407
2.640625
3
voir la définition de Wikipedia A stack interchange (also known as a spaghetti road or a butterfly junction from its bird's-eye profile) is a free-flowing grade separated junction between two roads. It is referred to as a "Directional" interchange in AASHTO Policy on Geometric Design of Highways and Streets. In countries where one drives on the right, left turns are handled by semi-directional flyover/under ramps. Vehicles first exit the main carriageway to the right, then complete the turn via a ramp which crosses both highways, eventually merging with the traffic turning right from the opposite side of the interchange. A stack interchange, then, has two pairs of left-turning ramps, which can be "stacked" in various configurations above or below the two interchanging highways. In countries where one drives on the left, the appearance of the junction is topologically identical, but traffic flows are reversed. Stacks eliminate the problems of weaving and have the highest vehicle capacity among different types of four-way interchanges. However, they require considerable and expensive construction work for their flyover ramps. Stack interchanges are also widely considered to be an eyesore among residents of homes near existing or proposed interchanges, leading to considerable NIMBY opposition. The four-level stack (or simply four-stack) has one major road crossing another on a bridge, with connector roads crossing on two further levels. This type of interchange does not usually permit U-turns. Interestingly, the four-level stack creates two "inverse" dual-carriageways—the turn ramps crossing the middle section have traffic driving on the opposite side of oncoming traffic to usual (see diagram for clarity). The first stack interchange was the Four Level Interchange (renamed the Bill Keene Memorial Interchange), built in Los Angeles, California and completed in 1949, at the junction of U.S. Route 101 and State Route 110. Since then, Caltrans has built eight more four-level stacks throughout the state of California, as well as a larger number of three-level stack/cloverleaf hybrids (where the least-used left-turning ramp is built as a cloverleaf-like 270-degree loop to save money). One of the first four-level stack interchanges in the northeastern U.S. was constructed in the late 1960s over Interstate 84 in Farmington, Connecticut, for the controversial Interstate 291 beltway around the city of Hartford. Most of the I-291 beltway was later cancelled, and the sprawling stack lay dormant for almost twenty-five years. In 1992, the extension of Connecticut Route 9 to Interstate 84 utilized the I-291 right-of-way and some sections of the abandoned interchange. Several ramps still remain unused, including abandoned roadbed for Interstate 291 both north and south of the complex. Four-level stacks are used for the interchanges between Interstate 90 and Interstate 405 in Bellevue, Washington, I-110 and US 61/US 190 in Louisiana, and Interstate 75 and Interstate 696 near Detroit, Michigan. In addition, I-270/Mo-370, I-70/I-270, I-270/Mo-364, I-270/I-64, I-270/I-44, I-270/I-255/I-55 and I-55/I-44/I-64/I-70 in Missouri are all stack interchanges. Another well-known stack interchange lies west of Baltimore, Maryland, serving as the junction between Interstate 695 and Interstate 70. It was originally built for a planned extension of I-70 into the city, but because of heavy opposition, I-70 now ends at a park and ride three miles east of here. As a result, the road east of I-695 sees very little traffic, compared to the high volumes to and from the west. Though it planned to build many four-level stack interchanges, Canada has only one true four-level stack interchange—the interchange between Highway 400 and Highway 407. Planned four-level stacks at Highway 407 and Highway 410, and Highway 407 and Highway 404 were reduced to three-level interchanges, with loop ramps in lieu of a fourth level of ramps. The interchange between Highway 401, 403, and 410 is almost a full four level stack, with a loop ramp planned to be added in the northeast quadrant. In the United Kingdom there are three four-level stacks: at the junction of the M4 and M25 near Heathrow Airport in London, at the junction of the M23 and M25 to the south of London, and at the junction of the M4 and M5 near Bristol (the Almondsbury Interchange). The M4/M25 junction is particularly unusual as it also has a railway line bisecting it at its lowest level. The M4/M25 junction is slightly offset so there is no point where all four levels are directly above each other. M25 (north-south road in this junction) is offset to the east by approximately 60 metres (200 feet). The junction of the A19 and A66 in Teesside uses a three-level variant, with a 270-degree loop allowing southbound A19 traffic to exit to the westbound A66. The EB Cloete Interchange just outside of Durban, South Africa is another example of a four-level stack interchange. The N3 is the busiest highway in South Africa and is a very busy truck route. Since Johannesburg is not located near a body of water, most of the city's exports travel through the Port of Durban. The N2 connects Cape Town with Durban, and it serves the South African cities of Port Elizabeth, Plettenberg Bay, Margate, and Greater St. Lucia Wetland Park. Two busy roads intersect at the junction. A four-level stack interchange was chosen to serve the high volumes of traffic. Stacks are often five levels in Texas. They have the same configuration as four-level stacks, with frontage roads adding a fifth level. The frontage roads usually intersect with traffic lights, and are similar to a grid of nearby one-way streets. A common setup is for one mainline to go below grade and another mainline to go above grade. The intersection of the frontage roads is typically at-grade (or close to it). Then two pairs of "left turn" connectors are built above these. The Houston, Texas, area has 7 five-level stack interchanges along Beltway 8: at Interstate 10 east and west of downtown, U.S. Highway 59 northeast and southwest of downtown, Interstate 45 north and south of downtown, and U.S. Highway 290 in the beltway's northwest quadrant. The newly-reconstructed interchange of Interstate 610 and U.S. 59, with the new I-610 northbound feeder road built underground and the new I-610 southbound feeder road overpass, is also a five-level stack interchange. In Dallas, the award-winning High Five Interchange was completed in 2005 and features some ramps which are more than 12 stories above the ground. Similarly, more than 40 bridges make up the 5-level stack interchange known as the Big I between Interstates 40 and 25 in Albuquerque, New Mexico. Though not a "Texas-style stack" in the above sense, an unusual stack is nonetheless found in Houston which features more than four levels of traffic, but whose fifth level exists in only one direction. In 2011, the previously 4-level stack interchange between I-610 and I-10 on the city's east side gained a new (though long-planned) level of complexity with the opening of four ramps connecting the new US 90 Crosby Freeway to the east, featuring direct movements for the new freeway to and from the southeast quadrant of I-610, to westbound I-10, and from eastbound I-10. It is the latter ramp which gives the interchange the fifth level, as US 90 to I-10 West merges onto I-10 before crossing I-610. (None of the frontage roads for these highways cross the interchange itself, and thus do not factor in the complexity of the stack.) Sometimes a fifth level is added for HOV connectors. An example of this exists in Los Angeles, California at the Judge Harry Pregerson Interchange. The connector from HOV SB 110 to HOV WB 105 can be at the same level as the connector from mixed EB 105 to mixed NB 110, but the connector from HOV SB 110 to HOV EB 105 needs to be higher level, since it crosses over the latter connector. Another case is where connection to nearby arterials suggests that another level may be useful, thus making the interchange more complicated, but easier to use. In the Atlanta area, a side ramp forms the fifth level of the Tom Moreland Interchange found in DeKalb County, Georgia. Contenu de sensagent dictionnaire et traducteur pour sites web Une fenêtre (pop-into) d'information (contenu principal de Sensagent) est invoquée un double-clic sur n'importe quel mot de votre page web. LA fenêtre fournit des explications et des traductions contextuelles, c'est-à-dire sans obliger votre visiteur à quitter votre page web ! Solution commerce électronique Augmenter le contenu de votre site Ajouter de nouveaux contenus Add à votre site depuis Sensagent par XML. Parcourir les produits et les annonces Obtenir des informations en XML pour filtrer le meilleur contenu. Indexer des images et définir des méta-données Fixer la signification de chaque méta-donnée (multilingue). Renseignements suite à un email de description de votre projet. Jeux de lettres Lettris est un jeu de lettres gravitationnelles proche de Tetris. Chaque lettre qui apparaît descend ; il faut placer les lettres de telle manière que des mots se forment (gauche, droit, haut et bas) et que de la place soit libérée. Il s'agit en 3 minutes de trouver le plus grand nombre de mots possibles de trois lettres et plus dans une grille de 16 lettres. Il est aussi possible de jouer avec la grille de 25 cases. Les lettres doivent être adjacentes et les mots les plus longs sont les meilleurs. Participer au concours et enregistrer votre nom dans la liste de meilleurs joueurs ! Jouer Dictionnaire de la langue française La plupart des définitions du français sont proposées par SenseGates et comportent un approfondissement avec Littré et plusieurs auteurs techniques spécialisés. Le dictionnaire des synonymes est surtout dérivé du dictionnaire intégral (TID). L'encyclopédie française bénéficie de la licence Wikipedia (GNU). Changer la langue cible pour obtenir des traductions. Astuce: parcourir les champs sémantiques du dictionnaire analogique en plusieurs langues pour mieux apprendre avec sensagent. calculé en 0,063s
<urn:uuid:1de33669-dcda-418b-abfa-86dfa539acf6>
CC-MAIN-2020-16
http://dictionnaire.sensagent.leparisien.fr/Stack%20interchange/en-en/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371826355.84/warc/CC-MAIN-20200408233313-20200409023813-00475.warc.gz
en
0.796596
2,468
2.984375
3
In 1626 Daniel Van Crieckenbeeck, a captain at Fort Orange on the Hudson River, disobeyed orders to stay out of the conflict between the Mohicans and their longtime enemies – the Mohawk tribe of the mighty Iroquois Confederation. The Dutch West India Company had ordered him to keep out of the affairs of the natives for the sake of the lucrative fur trade. Instead, Crieckenbeeck and some of his men set out with their new Mohican allies on a raid against the Mohawks. This proved disastrous as the Mohawks, already having gotten wind of the attack, ambushed the raiders in a forest west of modern Albany, New York. Crieckenbeeck and his men were all slaughtered, with some sources claiming that they were roasted and eaten by the victorious Mohawks. With the peace broken, the fur trade between the Dutch and Iroquois suffered greatly. The next few years saw the Iroquois semi-isolated from European powers as they themselves engaged in what would become known as the “Beaver Wars” against their neighboring tribes. But by the early 1630s reports were coming into Fort Orange that “The French Indians,” as those tribes aligned with French Canada were called, were trading in the Iroquois Confederacy. Wanting to monopolize trade in the region and prevent further French incursion, the Dutch West India Company went to work on a course of action. This is where the story of Harmen Meyndertsz Van Den Bogaert comes in. He was born somewhere in the Low Countries around 1612. Not much is known about his early life but he came to the New Netherland colony in 1630 where he made a living as a barber-surgeon. He would find himself living around Fort Orange, where in 1634, he would volunteer to embark on an expedition in “Mohawk Country” with two other men – Jeromus le Croex and Willem Tomassen. Their mission was simple; to reopen trade with the Iroquois and confirm the presence of French traders in the region. The journal he kept during this journey would serve as one of the earliest firsthand account of Iroquois society and culture. The three set off on December 1634, guided by five Mohawks. They carried with them not only provisions for the journey but an array of European wares such as knives and scissors to trade and give as gifts, as was Iroquois custom. They traveled westward by land, as the rivers were flooded and filled with ice this time of the year. This trip would prove to a difficult one. On the first night, Bogaert noted that the Mohawk would have abandoned his group had they not taken notice. To make matters worse, the Mohawk’s dogs had eaten all the meat and cheese provisions, leaving them with only bread to eat. Nonetheless, despite this rude start, the journey continued and they would soon come upon native towns, which the Dutch would call “castles” due to their fortified construction. The first ‘castle’ the Dutch encountered comprised around 36 houses. Some were as long as 100 steps, arranged in multiple rows. Bogaert would go on to say that many of the houses had ironwork inside them such as chains and hinges for doors. He reasoned that the Mohawks stole these items. Another European import he would report on was the infamous smallpox, which had killed enough of the townsfolk there to prompt one of their chefs to live in a cabin outside the town. Bogaert also reported that some people kept idols of animals, namely snakes, pigeons, cranes, turtles, swans, and a “martens head with protruding teeth.” Journeying onwards, the three men met a hunter named Sickaris who took them to his town. As they entered Bogaert wrote “I could see nothing else but graves,” a reminder of the extent of devastation caused by European diseases. The town had few men as the chiefs were out hunting. They stayed at Sickaris’ house for a few days before receiving word and supplies from Fort Orange, prompting them to move on with a new guide. On December 20th while on their way to the next town, they come across a fast running stream riddled with ice chunks. Managing to cross, the party now soaked in cold water from the waist down forced itself to walk another half mile in order to reach the town before nightfall. Here the Dutchmen found a cluster of about 32 houses. Here they exchanged goods and Bogaert himself was given a mountain lion skin to use as a blanket, only to discover “at least 100 lice” on himself the next morning. On their way to the next town, they encountered two villages. In the first, they found reports of French presence among the Oneida and of an Englishman in the region trying to learn their language. Bogaert was also asked to heal a sick man. Their time in the second village was spent smoking a pipe with an old man and trying, in vain, to buy the village’s tamed bear. The next ‘castle’ they arrived at was to be the largest yet, comprising of 55 houses although many of them were storage for foodstuffs. It was here that they witnessed a fight between twenty men in wood and reed armor, which was commonly worn in battle before European contact and the introduction of firearms. On Christmas Eve, Bogaert also saw a healing ritual where a home would be sealed off from drafts and two men would put a stick down their throats to throw up on the patient, afterward they would shout and clap their hands. Bogaert and his companions spent the rest of the month traveling through the snow-covered forest of New York, trying to reach the next settlement. At one point, while crossing over a large hill, Bogaert fell and injured himself so badly he thought he had broken some of his ribs, the last thing one needs when roughing it in a winter forest. Luckily, he quickly discovered that he had instead fallen on, and broken, his sword handle; painful, but preferable to broken ribs. The next town they encountered had previously traded with the French and Bogart’s party reported that many French-made goods were present in this town. The Dutch and Iroquois also managed to discuss the prospects of an exclusive trade agreement. Bogaert gave his word that he would bring this trade deal to his superiors and return in the spring with their approval. They also managed to get the Chief to construct a map of the towns in the region by arranging corn kernels and rocks on the ground. It was here that they were also told of some nearby highlands where there were not only many beaver, but apparently people with horns. The town, meanwhile, also managed to conclude a peace treaty with the “French Indians” with whom the Iroquois had been sporadically at war throughout their history. Apparently though, relations were not perfect between the Dutch and their Iroquois hosts. Bogaert reported multiple times in his journal of certain Iroquois who would insult them or call them “scoundrels”. At one point making one of Bogaert’s companions “so angry that tears ran down his eye.” At another point, an older chief put his hand on Bogaert’s heart in order to see if he was afraid of them or not. Because of the lack of details, we will never know the whole story behind these events. The incident with the chief points that maybe some of these were just the Dutchmen being tested by these hosts. The Dutchmen would stay at this last town for about two weeks before they received word from Fort Orange inquiring about their status. With this revelation, it was time for the expedition to return home. They would revisit many of the towns they encountered on the expedition on their way back. They returned to Fort Orange on January 21, 1635. Having explored a great deal of what would become New York, negotiating trade deals with the Iroquois, and providing much information on Iroquois culture, Harmen Meyndetz Van Der Bogaert became somewhat of a pillar in early New Netherland society. He would go on to marry and have multiple children, whose descendants litter the United States today. He would start up a homestead in Manhattan and become an investor in a privateer ship, La Garce. But his interesting story does not end here. While many people receive their fifteen minutes of fame, Bogaert would receive another fifteen, although whether it is fame or infamy is debatable. In January of 1648, over a decade after his journey into Mohawk country, Bogaert was caught in the act of sodomy with a slave owned by the West India Company named Tobias. It is not known if the act was consensual. One letter by a New Netherland resident describes that Bogaert was caught with two slaves but this letter is the only telling of this version of the story and may just be gossip. Either way, it was deemed a serious offense and Bogaert was arrested. Director-General of the colony, Peter Styvesant, gave the order to hold Bogaert until spring when the Director-General could make his way up the river from New Amsterdam to give Bogaert a trial. Having different ideas about how this story should unfold, Bogaert escaped and fled back into Mohawk country. The council in Beverwijck (modern-day Albany) dispatched a man named Hans Vos to bring Bogaert back into custody. Bogaert would find himself hiding in the cabin of some Mohawk allies. Yet, it was here that Hans Vos would find him. After a long standoff, the cabin was lit on fire, probably by Bogaert as a distraction so he could make his escape. He made his escape and it proved to be a fatal one. While fleeing across a frozen river Bogaert slipped and fell into the river, disappearing under the ice. The unorthodox life of Harmen Meyndertsz Van Den Bogaert had come to a tragic and chilling end. While this was the end of his life, this was not the end of Bogaert’s story. The Mohawks with whom Bogaert had sought refuge with would later go to court, seeking reparations for the loss of their home and property. They would win too, with Bogaert’s property being sold off to the highest bidder as compensation. The fate of the slave Tobias is unknown and Hans Vos, who was supposed to bring Bogaert back to jail, would be paid eight guilders for his efforts. As for the journal Bogaert kept, it would be lost to history years until being found in a private collection in the 19th century. Once found, the journal would become precious primary source of early Iroquois language, culture, and history. While many stories of early America contain adventure, exploration, and unorthodoxy, Bogaert’s story stands out for he was one of the early pioneers who helped make the path later adventurers would take. It would be his dealings with the Iroquois that helped stop French incursion into New York and setting the stage for the colonial politics of the eighteenth century. To say Harmen Meyndertsz Van Den Bogaert lived an interesting life almost does him an injustice.
<urn:uuid:0d6b1342-e9aa-426c-9da5-c9bcaf2c6787>
CC-MAIN-2020-16
https://www.oddhistorian.com/the-interesting-tale-of-harmen-meyndertsz-van-den-bogaert/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371660550.75/warc/CC-MAIN-20200406200320-20200406230820-00434.warc.gz
en
0.988027
2,378
3.53125
4
This is a very serious and life threatening condition. Please visit this website and read Dr. Henry de Boer's article on Heat Stroke. http://www.workingdogs.com/deboer_heatstroke.htm Heatstroke occurs when normal body mechanisms cannot keep the body's temperature in a safe range. Animals do not have efficient cooling systems (like humans who sweat) and get overheated easily. A dog with moderate heatstroke (body temperature from 104º to 106ºF - 40C - 41C) can recover within an hour if given PROMPT first aid and veterinary care (normal body temperature is 100-102.5°F = 38C - 39C). Severe heatstroke (body temperature over 106ºF,) can be deadly and immediate veterinary assistance is needed. Signs: A dog suffering from heatstroke will display several signs: * Rapid panting * Bright red tongue * Red or pale gums * Thick, sticky saliva * May be standing four square, posting or spreading out, trying to maintain balance * Going "off it's legs" * "Wild" look in eyes * Vomiting - sometimes with blood What you should do Remove the dog from the hot area immediately. Prior to taking him to your vet, lower his temperature by wetting him thoroughly with cool water NOT VERY COLD WATER (for very small dogs, use lukewarm water), then increase air movement around him with a fan. CAUTION: Using very cold, iced water can actually be counterproductive. Cooling too quickly and especially allowing his body temperature to become too low can cause other life-threatening medical conditions. The rectal temperature should be checked every 5 minutes. Once the body temperature is 103ºF (39.4 Celcius) the cooling measures should be stopped and the dog should be dried thoroughly and covered so he does not continue to lose heat. Even if the dog appears to be recovering, take him to your vet as soon as possible. He should still be examined since he may be dehydrated or have other complications. Allow free access to water or a children's rehydrating solution if the dog can drink on his own. DO NOT try to force-feed cold water; the dog may inhale it or choke. What your vet will do Your vet will lower your dog's body temperature to a safe range (if you have not already) and continually monitor his temperature. Your dog will be given fluids, and possibly oxygen. He will be monitored for shock, respiratory distress, kidney failure, heart abnormalities, and other complications, and treated accordingly. Blood samples may be taken before and during the treatment. The clotting time of the blood will be monitored, since clotting problems are a common complication. Dogs with moderate heatstroke often recover without complicating health problems. Severe heatstroke can cause organ damage that might need ongoing care such as a special diet prescribed by your vet. Dogs who suffer from heatstroke once increase their risk for getting it again and steps must be taken to prevent it on hot, humid days. Any pet that cannot cool himself off is at risk for heatstroke. Following these guidelines can help prevent serious problems. * Keep pets with predisposing conditions like heart disease, obesity, older age, or breathing problems cool and in the shade. Even normal activity for these pets can be harmful. * Provide access to water at all times. * Do not leave your pet in a hot parked car even if you're in the shade or will only be gone a short time. The temperature inside a parked car can quickly reach up to 140 degrees. * Make sure outside dogs have access to shade. * On a hot day, restrict exercise and don't take your dog jogging with you. Too much exercise when the weather is very hot can be dangerous. * Do not muzzle your dog. * Avoid places like the beach and especially concrete or asphalt areas where heat is reflected and there is no access to shade. * Wetting down your dog with cool water or allowing him to swim can help maintain a normal body temperature. * Move your dog to a cool area of the house. Air conditioning is one of the best ways to keep a dog cool, but is not always dependable. To provide a cooler environment, freeze water in soda bottles, or place ice and a small amount of water in several resealable food storage bags, then wrap them in a towel or tube sock. Place them on the floor for the dog to lay on. Pump and spray garden bottles are an excellent way to wet your dog. They can hold about two gallons. You can mist or soak them down. Some dogs are stress drinkers and some dogs drink less when under stress. If your dog drinks less or doesn't eat well when stressed (dogs with decreased appetites often do not drink well), try some of these things: * Gatorade, not so much for the electrolytes as for the taste, and/or beef or chicken broth with you to encourage your dog to drink. Some dogs like the broth even if it's watered down. * You can also try adding baby food to water to encourage drinking. * You can place cold packs under the armpits and in the groin regions of overheated dogs to help cool them down. (DON'T ice the paws -- the dog will just shut down the blood supply to them!) * Keep rubbing alcohol in your emergency kit. At a pinch, you can soak a dog's paws in it for the evaporative cooling effect! * Add ice cubes or hard sided ice packs to water dishes. Some dogs will eat ice cubes even when they don't want to drink! * Keep your dog in the shade as much as possible. If you are keeping him in a cage, make sure it is entirely shaded. * Consider carrying a battery operated fan. DOGS THAT DO DOG SPORTS CAN, AND HAVE DIED WITH HEATSTROKE. MAKE SURE YOURS DOESN'T!!!! Between racing, keep your dogs quiet and cool. A child's sandpit filled with water is ideal for a dog to lie down in to cool itself. If you have room in your vehicle, take one with you to competitions where no paddle pools are available. There are Doggy Pools that can be folded: no air pump or endless blowing up: just unfold it and put water in, from zooplus.co.uk Prevention is better than cure. Border Collie Collapse The Syndrome and How to tell BCC from heat exhaustion/heatstroke Border Collie collapse (BCC) is an episodic nervous system disorder that is triggered by strenuous exercise. BCC is recognized throughout North America, Europe, and Australia and is observed in dogs used for working stock, as well as dogs participating in agility or fly-ball competitions or repeatedly retrieving a ball. This disorder has also been called exercise induced collapse (EIC), exercise induced hyperthermia, stress seizures and "the wobbles". Affected dogs are normal at rest and seem healthy. Typical collapse episodes begin 5 – 15 min after onset of exercise and include disorientation, dull mentation or loss of focus; swaying, staggering and falling to the side; exaggerated lifting of each limb while walking and a choppy gait; scuffing of the rear and/or forelegs, and crossing of the legs when turning. All of the factors contributing to the tendency for an affected dog to collapse on a given day (excitement, heat, intensity of exercise) have not been determined. Some dogs seem relatively normal while they are exercising but only show symptoms about 5 minutes after exercise is halted. Dogs are abnormal for 5 to 30 minutes, but then recover completely with no residual lameness or muscle stiffness or discomfort. Affected dogs are often unable to exercise and must be retired from competition and work. Investigators at the the University of Minnesota (Drs. Ned Patterson and Jim Mickelson, and Katie Minor), University of Saskatchewan (Drs. Susan Taylor and Cindy Shmon), and the University of California, San Diego (Dr. Diane Shelton) are involved in a large-scale project to investigate this disorder. The objectives of the project are to (1) establish clinical, hematologic and biochemical parameters for normal Border Collies participating in a standardized exercise protocol, (2) to evaluate dogs with BCC participating in a standardized exercise protocol to determine clinical or clinicopathologic markers for BCC at rest or after exercise that will help veterinarians diagnose BCC and help us understand the cause of collapse, (3) to fully describe the clinical features of BCC to facilitate recognition by dog owners and veterinarians, (4) to evaluate the heritability of BCC, (5) to determine the genetic cause of BCC, and (6) to develop a genetic test for BCC to aid diagnosis and to allow breeding decisions to be made to avoid producing affected pups. Dr. Sue Taylor (University of Saskatchewan - Western College of Veterinary Medicine) is currently performing strenuous exercise studies (sheep herding and ball-chasing) with normal Border collies and dogs with BCC. Dogs with BCC have normal physical, orthopedic and neurologic examinations at rest. Dogs with BCC and normal Border collies develop alterations in rectal temperature, hematologic, biochemical, blood gas and acid base parameters that are very similar to those previously described in normal exercising Labrador retrievers. No abnormalities have been detected in serum electrolytes (sodium and potassium), blood sugar, blood cortisol, ability to ventilate, or heart rhythm that can explain the collapse in dogs with BCC. Dogs with BCC and normal Border collies all develop very high body temperatures (often >41.7C, >107F) after 10 minutes of strenuous exercise, but they cool down quickly when exercise is halted. Normal and BCC affected dogs are negative for the dynamin 1 mutation causing EIC in Labrador Retrievers. Thus far no differences between the normal dogs and the dogs with BCC have been identified except that the dogs with BCC exhibit gait and mentation abnormalities as described above. Dogs with BCC remain abnormal for 5 to 30 minutes, but then recover completely with no residual lameness or muscle stiffness or discomfort. **Free Exercise Study Opportunity** How can I tell Border Collie Collapse from heat exhaustion / heat stroke? A commonly asked question is how to differentiate BCC episodes from recurrent heat exhaustion or heat stroke. For years, dogs with episodes of BCC have been labeled as “heat intolerant” because collapse is most likely to occur in hot weather. Dogs with BCC certainly are hot after exercise but their body temperatures are not higher than normal dogs performing the same exercise so it is not simply overheating causing collapse. Also it is important to recognize that the collapse episodes we see in dogs with BCC are very different from those associated with actual heat stroke. Heat stroke severe enough to cause mentation changes, gait abnormalities and collapse in a dog will be life-threatening and often fatal. Recovery, if it does occur, is slow and prolonged (hours to days) even with intensive treatment. Laboratory evaluation reveals a dramatic increase in the muscle enzyme CK and many affected dogs develop acute kidney failure. More than 80% of dogs collapsed due to heat stroke exhibit mentation changes that are severe, progressive and persistent (for hours to days). Damage to blood vessel walls leads to widespread clot formation, damage to multiple organs, low platelet numbers and often widespread bleeding. In contrast, dogs with BCC-related collapse episodes show no laboratory abnormalities and recover quickly – returning to normal within 5 to 30 minutes. Besides the severity of collapse episodes, the recurrent nature of BCC-related episodes and the fact that collapse can occur even on days with moderate or cool ambient temperatures helps to distinguish BCC from heat-related illness. GRAPE AND RAISIN TOXICITY IN DOGS Contributors Mr Alexander Campbell BSc Dr Patricia Talcott MS DVM PhD DipABVT Synonyms Vitis Vinifera, Grape, Raisin, Sultana, Currant, Introduction All fruit products of Vitis vinifera(a perennial woody climbing vine (grapes) should be considered potentially toxic to dogs. Anecdotal evidence of poisoning exists in cats, but this has not been well documented. Signs: gastrointestinal effects, anorexia, and lethargy. In many cases renal failure characterized by oliguria or anuria, and accompanying elevation in levels of calcium, phosphorus, urea and creatinine. Diagnosis : signs and case history. Treatment : no antidote. Gastric decontamination, aggressive fluid therapy and supportive management. Prognosis : fatal cases are common, particularly in animals that develop oliguria or anuria. Diagnosis Clinical signs Severe, protracted vomiting. Presence of partially digested raisins/grapes/sultanas/currants in vomitus or stools. Severe abdominal tenderness/cramping and anorexia. Pale mucous membranes. Oliguria or anuria. Acute renal failure Prognosis is extremely poor for late-presenting animals with oliguria, anuria and confirmed renal failure. Cognitive Dysfunction Syndrome in Dogs Dementia (Geriatric) in Dogs Cognitive dysfunction syndrome is a condition related to the ageing of a dog's brain, which ultimately leads to changes in awareness, deficits in learning and memory, and decreased responsiveness to stimuli. Although the initial symptoms of the disorder are mild, they gradually worsen over time, also known as “cognitive decline.” In fact, clinical signs of cognitive dysfunction syndrome are found in 50 percent of dogs over the age of 11, and by the age of 15, 68 percent of dogs display at least one sign. Symptoms and Types Decreased desire to play Seeming disregard for previously learned training or house rules Slow to learn new tasks Inability to follow familiar routes Lack of self-grooming Faecal and urinary incontinence Loss of appetite (anorexia) Changes in sleep cycle (i.e, night waking, sleeping during the day) Causes Although the exact cause of cognitive dysfunction syndrome is currently unknown, genetic factors may predispose an animal to develop the condition. Diagnosis You will need to give a thorough history of your dog’s health to your veterinarian, including the onset and nature of the symptoms and possible incidents that might have precipitated the unusual behaviors or complications. He or she will then perform a complete physical examination to evaluate the overall health status and cognitive functions of the dog. Routine blood tests, ultrasounds, and X-rays are also employed to rule out other diseases that may lead to behavioral changes associated with cognitive dysfunction syndrome. Kennel cough is not a serious disease in most otherwise healthy dogs. However, it is very contagious and will spread rapidly around the dog population. As its name suggests, it causes coughing that can go on for a month in some cases. Just as in people with a cold, coughing is brought on by exercise, excitement and exposure to cold air. If your dog has kennel cough you should keep them in a warm environment (where possible) and try not to exercise them too much. Avoid situations where your dog is likely to bark, as this is highly likely to cause coughing. If your dog normally wears a collar, take this off, to stop it irritating his throat, and exercise him/her outside with a harness or halter and lead. You may also want to soften their hard food with warm water to make it easier for them to swallow. Above all be responsible - remember that other dogs are at risk of catching the cough from your dog. Do not take him to places where he is likely to meet other dogs (particularly in closed spaces like dog training classes) while he is still coughing and for a few days after. LINKS TO DOG HEALTH ARTICLES Important Border Collie Health Databases This website contains results of DNA testing for: CEA/CH (Collie Eye Anomaly / Choroidal Hypoplasia), CL (NCL - Neuronal Ceroid Lipofuscinosis), and TNS (Trapped Neutrophil Syndrome) genes in Border Collies. IMPORTANT BORDER COLLIE HEALTH DATABASES http://bc-glaucomadatabase.synthasite.com (Border Collie Goniodysgenesis Database) This site is to record all Border Collies who have been opthalmically tested by an eye specialist for the predisposition to develop NARROW ANGLED glaucoma Health Tests available for Border Collies Information on all these tests can be found on the Pastoral Breeds Health Foundation Website - www.pbhf-dog.com DNA testing for CEA/CH - Collie Eye Anomaly/Choridal Hypoplasia DNA testing for CL - Neuronal Ceroid Lipofuscinosis DNA testing for TNS - Trapped Neutrophil Syndrome Eye Testing for PRA - Progressive Retinal Atrophy Eye Testing - BVA/KC/ISDS Hip Scoring - BVA/KC Hearing Test - BAER Website created and maintained by Valerie Rothlisberger-Jones. All photographs are copyright
<urn:uuid:366a2882-5291-49b4-9793-5161750da43f>
CC-MAIN-2020-16
https://www.primedflyball.com/dog-health-and-links-to-dog-health-articles.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371803248.90/warc/CC-MAIN-20200407152449-20200407182949-00074.warc.gz
en
0.931204
3,617
2.96875
3
How Does the eLearning Course Work? Push the play icon below to learn how the eLearning Biology works. How Does the eLearning Course Work? Push the play icon below to learn how the eLearning Biology works. TEACHER'S GUIDEClick the link above to read the complete Teacher's Guide with detailed instructions for each component, a scope and sequence, and much more!BASED ON A BIBLICAL FOUNDATIONConnecting Scripture to science, Dr. Shormann teaches from a 6-Day Creation Worldview. He inspires students to DIVE deeper into science and Scripture by teaching that science is a tool for understanding God and the purpose and pattern evident in Creation. VIDEO SOLUTIONS ENSURE UNDERSTANDINGVideo solutions are provided for the digital worksheets and lab activites. Teaching how and why, each complex concept is taught step by step on the digital blackboard. These solutions ensure your child understands each concept.QUARTERLY EXAMS PREPARE FOR COLLEGE COURSESEvery 8 weeks there is an exam. Quarterly exams promote study habits similar to what a student should expect in college, where exams are given infrequently and cover a large amount of material. On the week of the exam, no other work is assigned. If you would like an AP course, we recommend giving the exams traditionally with a one hour time limit. If you prefer a regular high school course, give the exams open book, open note, or with a "cheat sheet". Of these, we like the "cheat sheet" method because it best teaches students how to prioritize and organize the information, providing an easier transition from weekly to quarterly exams. Q & A EMAIL SUPPORT PROVIDES A LIFELINEWhile our program is very comprehensive, occasionally a little extra help is needed. Students and parents can email Dr. Shormann directly anytime they have a question concerning the course. Emails are answered within one business day or less. AUTOMATED ONLINE GRADEBOOK All the grades from the digital worksheets, quarterly exams, and facts practice are automatically recorded in an online grade book. Parents use the student login to view assignments and scores. After each assignment is completed a results page displays the questions, correct answers, missed problems, and the grade. This results page can be printed and/or emailed to the parent each time an assignment is completed. FREE INTERNET TEXTBOOK FOR ASSIGNED READING There is a reading assignment for every lesson. The reading assignment can be completed using our Internet Textbook, which is embedded in the eLearning course for quick and easy access. If you prefer a traditional textbook, we recommend Bob Jones Biology, Apologia's Exploring Creation with Biology, or Abeka Biology. However, since we have a reading syllabus for just about every publisher, you can choose any textbook you like. SEE READING SYLLABI on the pages 13-15 of the Teacher Guide. EARN UP TO 8 HOURS OF COLLEGE CREDIT BY EXAMUpon completion, we recommend our CLEP Professor for CLEP and AP Biologypurchased separately,a three week course that specifically prepares students for CLEP and AP Biology exams. Not only do these exams award up to 8 college credits, a passing score can significantly boost your college admissions and scholarship applications in the selection process. Click on the link above to learn more about this program. How Do I Access the Course? Within 1-2 business days after purchase, you will receive an email titled "Login Credentials" with a link to the eLearning campus, the student's user name, and password. If you don't receive it, please check your spam, updates, and trash folders, then contact us here. Start Date: The start date of your subscription is your purchase date. We no longer offer an option to select a future start date. If you are not ready to start your course now, please wait and purchase when you are ready to start or want to access the course for planning, etc. Which Email Address Should I List? Student Email Address Please provide a different email address for each child enrolled in an eLearning course. For example if, Joe is enrolled in eLearning Biology and his sibling, John, is enrolled in eLearning ICP, they must have different email addresses for each of their accounts. This email address is only used to re-set the password to the eLearning account, if needed. Therefore, any working email address can be listed in the Student Email field, as long as it has not being used by another child you have enrolled. Parent Email Address The email address listed during check out, should be the parent’s email. This is the address the the eLearning course login credentials will be sent. This is also the email address used to contact the parent, if needed. Parents use the student's login credentials to view assignments, grades, results, etc. After each assignment is completed, the student can email the results page that displays all the questions, the correct answer and your student's answer. The results for each assignment can also be viewed by clicking on the grade in the grade book. Can a parent take the course along with the student? If the parent would like to complete assignments, a sibling subscription can be purchased for the parent. Sample Weekly ScheduleThis self-paced course is set up on a 32 week schedule with an average of two video lectures, two worksheets, 20 definitions, and one lab to complete each week. Every 8 weeks there is a quarterly exam. The lecture and lab videos average 30 minutes each, but don't forget to add time for pausing, rewinding, and note-taking. While this is a flexible self-paced course, a typical week could look like this: DAY 1: DEFINITIONS AND READING ASSIGNMENT DAY 2: LECTURE 1, DIGITAL WORKSHEET 1 DAY 3: LECTURE 2, DIGITAL WORKSHEET 2 DAY 4: WATCH VIDEO LAB (HANDS-ON NOT REQUIRED), LAB WORKSHEET, GRADE LAB WITH VIDEO SOLUTIONS EVERY 8 WEEKS : QUARTERLY EXAM 1. Because they contain downloadable files, accessed courses can't be refunded or exchanged. 2. Try it before you buy it! A sample course with the first two weeks of lessons are available at DIVEintoMath.com/samples 3. Login emails are sent within two business days. Posted by Unknown on 17th Oct 2019 We love Dr. Shormann's classes! This is a great biology course and we have been learning so much! The videos, lectures and reading have been so helpful in getting a grasp of all the information being taught! Wonderful biology course! Posted by Dietz Family on 31st Mar 2019 This year our 5th daughter used D.I.V.E. Biology Curriculum by Dr. David E. Shormann. Four of our other daughters have also used this same curriculum with great results. After researching many curriculums, we purchased this curriculum due to the lecture format, labs, and the ability to choose the resource text (we chose Apologia). We wanted our children to learn to take lecture notes and study and test taking skills. The curriculum prepared each of our four older daughters for college level science and lab work. Dr. Shormann delivers what is stated on the front of the curriculum, "A digital video curriculum that teaches college preparatory biology from a Christian worldview." This curriculum is challenging, as it gives the student an upper grade education that some may find intimidating, if they do not keep in mind that that this is preparing the student for college level work and can even be used in preparation for CLEP testing. Our daughter who just finished this course told me that this class was "challenging me to think more vividly about how intricate God's Creation is. Though it took time and application, this course was definitely worth the energy. D.I.V.E Biology was a hearty course, and I fully enjoyed it as it gave me a better appreciation for science, the world around me, and my Creator." Even though I received a copy of the lab book to review, I believe that this curriculum is priced competitively and is a great value. I would highly recommend this curriculum for students who are preparing for college level work. Posted by Emma on 31st Mar 2019 I just wanted to take a moment to thank you for the DIVE courses. I am finishing up Biology this week and I am quite sad. I have enjoyed this course so much! Thank you for teaching things from a Biblical perspective. I know it isn't the popular thing to do, but it is so important to have good courses out there. I love how you showed us the world's theories and thoughts, but then showed the Biblical arguments against them. Even though I have been through apologetics before, the way you presented the arguments gave me an even greater understanding of how to have an intelligent discussion with someone who opposes creationism. I have grown so much as a student through this course, but I have also grown as a Christian. As I see how His creation works and how marvelously it has all been designed, it only causes me to grow closer to Him. What a wonderful Creator we serve!I praise God for the DIVE courses and how He has allowed them to work in me. I have been so blessed by this great curriculum. Thank you for making Biology fun. I look forward to learning every day. I can't wait until sophomore year so I can get back to DIVE!Keep up the good work :) Posted by Kristie on 16th Feb 2017 Dear Dr. Shormann, On behalf of my kids, we want to thank you for creating the CLEP Professor and other videos. My oldest daughter has taken the College Algebra and received college credit. She took it along side her first semester of precalculus and mentioned that it also helped her with the class. Now she is excited to take the Precalc CLEP after she finished the class this spring. She would have loved to have DIVE prep for College Mathematics, but she took the CLEP and passed gaining more credit. We have also used the DIVE Biology and loved it. Thanks so much. Posted by Unknown on 23rd Mar 2016 My daughter was struggling with Apologia Biology last year, so I decided to purchase DIVE Biology to go along with the Apologia Textbook. She is very happy because she finally understands much better the subject and she is starting to love Science again. We will continue to use DIVE with Science High School for Physics and Chemistry too. Posted by Cathy W. on 10th Dec 2015 Today was one of those spectacular, praise God for home education moments, as I listened in on the above Biology lecture. My daughter loves this course, and I am wholly unequipped to teach high school sciences. I cannot adequately express my gratitude for the truthful expression of Christian truth and ideals presented in this unit. In addition, the acknowledgment and "warning" that students will not encounter these truths in secular science studies and tests, empowers students with these truths. I cannot begin to express how grateful I am for your work, and that we were able to connect with D.I.V.E. Science. Truly, a grace and a blessing to my daughter's academic journey. God bless you!
<urn:uuid:5a2876d9-7448-48fa-8957-96587fc1c0ec>
CC-MAIN-2020-16
https://diveintomath.com/self-paced-elearning-course-for-dive-biology/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506477.26/warc/CC-MAIN-20200401223807-20200402013807-00156.warc.gz
en
0.94845
2,379
3
3
First in a series by William Cellini Jr. One hundred years ago this June, the United States sent its first soldiers to fight on the bloody battlefields of France and instituted its first nationwide military draft. Among the several thousand Central Illinois men who served in the World War I American Expeditionary Force, I have identified some 40 Lithuanian-born (and Lithuanian-American) soldiers, five of whom lost their lives. The war had already been going on for three years by April 1917, when the U.S. joined the battle in Europe on the side of the U.K. and Ireland, France and Imperial Russia (the Triple Entente) against Germany, the Austro-Hungarian Empire, the Ottoman Empire and Bulgaria (the Central Powers). At the time President Woodrow Wilson asked the U.S. Congress for a declaration of war, the nation’s military preparedness was low. The U.S. government had downsized the military after the Spanish-American War, public anti-war sentiment was strong, and the nation had a political mindset of isolationism. To get around public resistance to the war and to raise the necessary manpower to fight on a global scale, Wilson initiated the nation’s first Selective Service System, whereby males of a certain age—both immigrants and native-born– were universally required to register for a military draft. Non-Citizen Immigrants & Selective Service There were three (plus one extra) national registrations during the war: June 5, 1917 for men ages 21 to 31; then, June 5, 1918 for men who had reached age 21 after June 5, 1917. Next came a supplemental registration in August 1918 for men reaching 21 after June 5, 1918 (due to Congressional adjustment of the draft age). A third and final national registration was held September 12, 1918 for men ages 18 to 45. This final registration took in all men born between 1872 and September 1900 who’d not been in active military service as of June 1917. (Most Lithuanian-American soldiers mentioned in this blog series were already in service by mid-1918.) Due to a massive wave of European immigration that had started around 1890, the immigrant population of the U.S. in 1917 stood at 14,500,000. This meant large numbers of “aliens” –immigrants who were not yet citizens–were nevertheless required to register for the draft. Local Lithuanian aliens fell into one of two government classifications: alien “declarant” or alien “non-declarant.” Alien declarants had filed their declaration of intent to become citizens and thus had “first papers” prior to registering for selective service. These men were categorized as “draft eligible.” Non-declarants not in the citizenship process were aliens with “no papers” and were classified as “exempt from the draft.” (Lithuanian aliens never fell into the draft-exempt category of “enemy alien” because they had been born in an allied state, the Russian Empire, which included Lithuania at the time.) Going from Draft-Exempt to Draft-Eligible Those men who were non-declarant could remain exempt from the draft as long as they did not file for their first papers, and many did remain on the sidelines for the course of the war. This became a cause of public resentment as non-declarants with close family living in danger in Europe remained in safety in the U.S. while millions of American-born boys were sent off to fight. Provost Marshal General Enoch Crowder of the Office of Selective Service noted that this was “the one notable cause of dissatisfaction with the scheme of military service…in the Selective Service Act.” Yet in the midst of war, several in this series of bios deliberately and patriotically entered the citizenship process knowing it would cancel their military exemption and permit them to be called up. To reward the patriotism of immigrants who filed their intent to become citizens to make themselves eligible for military service—as well as aliens already in service when the U.S. declared war–in May 1918, the U.S. opened an expedited path to citizenship for all its non-citizen soldiers. Expedited Citizenship for ‘Alien’ Soldiers The U.S. citizenship process typically involved a five-year U.S. residency requirement and then a two-year waiting period between the declaration of intent and the petition for citizenship. In its May 1918 Act, Congress allowed immigrant soldiers without “first papers” to skip the residency requirement and be naturalized at U.S. military camps or in courts near the camps. For those with first papers, the waiting period between their declaration of intent and petition for citizenship was abolished, as were the fees for their citizenship processing. All of these perks were offered only if the soldier remained in service and if he swore a loyalty oath. Conversely, by 1918, declarant aliens who requested conscription exemption or discharge from the army were disqualified from the citizenship process. The timing of the 1918 Act caught many immigrant soldiers already in the trenches overseas. These were men who’d registered for the draft in June 1917 and who subsequently had been called up and shipped to France by mid-1918. Taking advantage of their new expedited path to U.S. citizenship required them to obtain battlefield signatures from their commanders and comrades-in-arms acting as witnesses. Out of all Lithuanian immigrant soldiers from Central Illinois who served during WWI, research indicates five died during their service to the country: Stephen Shvagzdis [Švagždys]; Walter A. Rauktis [Raukitas]; Tony Pranchewicz [Pranckevičius], Joseph Kowlowsky, and John Kedis. One may see a tragic irony in their deaths as these young Lithuanians were shipped off to fight in Europe, only to perish overseas so soon after they had emigrated to the U.S. Their deaths, and the deaths of all WWI soldiers, carry a special poignancy on this 100th anniversary of the U.S. entry into the “War to End all Wars.” The following are the first seven thumbnail biographies of local Lithuanian-American doughboys. There will be more to follow as our WWI centennial continues. Special thanks to Tom Mann and Tim Race for their initial research on many of these soldiers: Mike Bubnis—Great Uncle of Diane Rutledge, former Superintendent of Springfield Public Schools Born in 1879 in Suvalkai Region, Lithuania, the son of Josef and Rosalia Schercnik [Szerkus] Bubnis. Along with his brother, Augustus, Bubnis worked as a coal miner for a time at the “Old West mine” in Springfield. He married a woman named Anna whose maiden name is unknown, and they lived at 1007 North Osborn Street in Springfield during WWI. Bubnis was called-up for the draft after he’d become a naturalized citizen, according to his application. Instead of being sent overseas, Bubnis is listed as a “Private in the 6th Company, 22d “Development Battalion.” In Bubnis’ case, being sent to a development battalion could have meant he either was not fluent in English or needed instruction, or that he may have been previously injured but did not qualify for immediate discharge. Further research indicates Bubnis was discharged at Camp Taylor, Kentucky, on December 20, 1918. He and his wife left Springfield in the 1920s and he died January 7, 1956 at the Danville Illinois Veterans Hospital. The burial card for his cemetery plot lists him having served in the “14th Company, 4 Tribn. [sic], 159th Development Battalion,” contradictory to his published service record. The whereabouts of his wife as well as her death date are unknown. Bubnis’ brother, Augustus “Gus” died in Springfield in 1941 and his sister, Mrs. Frances Jurkins [Jurkonis] died in Springfield in August 1974. (Mrs. Jurkins was the paternal grandmother of former District 186 Superintendent Diane (Jurkins) Rutledge, making WWI veteran Mike Bubnis Diane’s great uncle.) John F. Casper—Received WWI Victory Medal in 1921 Born August 24, 1893 in Wilkes-Barre, Pennsylvania, he was the son of James [Džeimsas] Kasper [Kasparaitis or Kaspariūnas] and Marcella Tonila of Springfield. He served as a member of Company K in the 21st Infantry Regiment. According to a regimental history published on an infantry website, in March 1916, the 21st served on the border of Arizona and California countering Mexican insurgency. In April 1917, the regiment was transferred to Camp Kearny in California, where it was assigned to the 16th Division. Its mission was to train U.S. Army units for deployment to France. While it is not known if John Casper went overseas, he was issued a WWI Victory Medal in March 1921 for his time in the service. The Illinois State Register noted that medals were being awarded to men who had “any service with the U.S. Army with honorable discharge between April 6, 1917 and November 11, 1918.” John married Celia Patterson in 1919. He died November 24, 1963 in Springfield, and his obituary confirms that he was a “WWI veteran.” Celia passed away in 1974 in Menard County. John [Jonas] Levonas Gabalis Born April 1, 1896 in “Sedix, Russian Empire.” He listed himself as a coal miner at the Tuxhorn Coal Company in Springfield at the time of registering for the draft in on June 5, 1917. He was a declarant U.S. citizen at the time of registration, and so he was in the process of being naturalized. Although he listed a dependent (his mother) at the time he registered, he was sent to training on April 29, 1918 at Camp Dix, New Jersey, and was assigned to the 78th Infantry Division. According to U.S. Army transport lists, Gabalis departed for Europe in May 1918 on the HMS Kashmir from Brooklyn, New York. He sailed as part of Company E in the 303rd Engineer Battalion, 78th Division and served in France. He returned to the U.S. from Bordeaux on May 24, 1919. Gabalis eventually moved to Detroit, where he worked as a machinist. He married Stephanie Paleckis, but was a widower by 1929. John Levonas Gabalis died on February 15, 1974 in Detroit. Tony C. Gaygus—Shipped Out from C&A Depot with Other Lithuanians Born in Illinois c. 1892 to Lithuanian-born parents, Anton and Anna Gaygus of Virden. Tony registered for the draft in Sangamon County in June 1917 and left for Camp Zachary Taylor, Kentucky, on February 24, 1918 with a group of recruits from Springfield. Among them were Lithuanians Joseph Petrushunas, Frank Petrowich and Charles Raczaitis. According to news accounts from the period in Springfield newspapers, “…the C. & A. Depot was literally packed with parents, relatives and friends of the 149 departing men. Tears filled the eyes of some of the mothers, sisters and sweethearts of the boys, and even a few of the men present had a hazy look.” Gaygus was subsequently sent overseas (with a stop in Quebec, Canada) and he returned from Saint-Nazaire, France, on the transport ship USS Edward Luckenbach on April 3, 1919. At the time of his return home he was a Corporal in the 362nd Infantry. William [Viljamas] Gibas Born March 15, 1887 in Lazdijai, Alytus County, Lithuania. He emigrated to the U.S. via Bremen, Germany, in 1902 and worked as a coal miner at the Peabody Mine in Sherman, Illinois. Gibas made his declaration of intent to become a U.S. citizen in 1910 and by 1915, he had been naturalized. At the time he registered for the draft in June 1917, he was listed as single. In January 1918, his name and address (North Fifteenth Street) were among those listed for men called-up by the Sangamon County Draft Board. He subsequently entered into service on April 28, 1918 as a Private in Company B, 14th Battalion, United States Guards. He was trained at Camp Dix, New Jersey, with at least two other Lithuanian-born local soldiers. It is not known whether he was subsequently sent overseas, since no return passage for him from France could be found. Gibas was discharged January 31, 1919 at Camp Grant near Rockford and went back into coal mining. For a time, he was living with other Lithuanian boarders on the North End of Springfield. William Gibas died on December 13, 1954 in Springfield with no apparent heirs, per the information supplied in his obituary. Anthony [Antanas] Glemza [Glemža]—Church Organist, Political Activist Born October 10, 1889 in Viešintos in the Anykščiai district, Utena County (named for the Viešinta river). Glemza emigrated to the U.S. in 1912, arriving in Philadelphia. He quickly became active in St. Vincent De Paul Church by organizing the choir and serving as the full-time organist and church maintenance man. Glemza was also very active in supporting international recognition of Lithuania prior to the U.S. entry into WWI, and is mentioned in an October 1916 Springfield newspaper article as serving on a committee at St. Vincent de Paul Church organized at the time U.S. President Woodrow Wilson publicly recognized the plight of the Lithuanian people as war refugees. As quoted in the Illinois State Register at the time, “…divided between Germany and Russia, the Lithuanians serving in two opposing armies are compelled to slay each other. Since the very start of the war, Lithuania became the scene of the most horrible struggle ever enacted on the face of the earth.” In March 1918, only a month after Lithuania’s formal declaration of independent statehood, Glemza was a delegate to the New York Lithuanian General Assembly formed on behalf of a free Lithuania. He had registered for the draft in June 1917 in Springfield, and May 1918, amid his pro-Lithuania political activism, he was called to U.S. military service. He had first applied for citizenship in 1913 and he re-applied on July 17th while in training at Camp Zachary Taylor, Ky. After training he was sent to France with Company B, 5th Battalion, 22nd Engineers. In a November 6, 1918 news article in the Register, Glemza wrote from France saying, “Everyone here thinks the war will be over soon…The four friends of mine who I left with are still with me, and I am mighty glad, for it would be pretty lonesome without them.” Glemza returned to the U.S. as a Private First Class in Company P, 22nd Engineers, via Saint-Nazaire, France, on June 12, 1919 aboard the USS Princess Matoika. Also on board were Stanley Petrokas and Joseph Muchakites [Marciukaitis]. On the ship manifest, he lists his closest contact in the U.S. as “friend, John Czuberkis,” then-pastor of St. Vincent de Paul’s. In 1922, Glemza left Springfield to take a position as an organist at a church in Rochester, New York, and in 1938, he was affiliated with St. Francis Lithuanian Catholic Church in East Chicago, according to newspaper archives. Charles J. Grigas—Saved from the Battlefield by his Trombone? Born March 4, 1896 in Pennsylvania to Mr. and Mrs. George and Petronele “Petrol” Grigas, both born in Lithuania. In addition to Charles they had a son, Stanley (b. 1898, Penn.) and a daughter, Helen (b. 1901). The family is recorded on the 1910 U.S. Census as living in Fancy Creek, Sangamon County. Charles is listed as a “street newsboy” and his father as a coal miner. In their home were three Lithuanian-born boarders, each listed as working coal miners. Then just prior to WWI, the family moved to Springfield, with Charles entering military service on June 25, 1918. He trained at Camp Taylor and Camp Knox (both in Kentucky) and served as a Private in the Headquarters Company of the 69th Field Artillery, 170th Field Artillery Brigade. The 69th Field Artillery was assigned to the 95th Infantry Division during the war. Although both Charles and his brother Stanley both had registered for the draft, it appears only Charles was called up. The brothers were also musicians—and that seems to have saved Charles from being sent to fight overseas. He is listed as a bandsman in the Army playing “slide trombone,” per information in the Sangamon County Honor Book of WWI. He was discharged in December 1919 at Camp Knox. In 1920, the Grigas family was living on North 15th Street in a predominately Lithuanian- section of town. In 1921, Grigas married Della Pelton at St. Vincent de Paul Church and they made their home in Springfield. They had one daughter. Well-known in local Lithuanian social circles for their “Grigas Orchestra,” Charles and his brother performed at weddings and accompanied the Knights of Lithuania’s renowned choir at St. Vincent de Paul Church and other venues throughout the 1920s, according to newspaper reports. The Grigas brothers also ran a grocery store and were members of the Springfield Musicians Union Local. Later in life, Charles worked for the State of Illinois. He died in May 1973 in Springfield and his siblings, Stanley and Helen, both passed away in 1986.
<urn:uuid:a1fbf5fc-55a9-46c1-a81b-5a2cb2a42ea5>
CC-MAIN-2020-16
https://lithspringfield.com/2017/05/23/100th-anniversary-tribute-local-lithuanian-soldiers-of-world-war-i/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371830894.88/warc/CC-MAIN-20200409055849-20200409090349-00356.warc.gz
en
0.982331
3,836
3.265625
3
NATIONAL GALLERY OF DENMARK - Henrik Holm looks at the making of the Danish painting canon and its relation to the construction of a national identity. September 3, 2013 The selection of Danish artworks that the Statens Museum for Kunst, the National Gallery of Denmark, has released for free download in high resolution (under a CCBY-license) offers a good case for taking a critical look at how national identity is constructed. One of the images in this collection is the painting often claimed by Danish art historians to represent the birth of a truly Danish kind of art - A View through Three of the Northwestern Arches of the Third Storey of the Colosseum in Rome. It was created by Christopher Wilhelm Eckersberg, the artist known as “The Father of Danish Painting”, inspiring as he did the so-called Golden Age of Danish painting. At the heart of Eckersberg’s work, and this Golden Age he inspired, was the practise of making sketches out in the open, en plein air, a practice made popular by the Parisian school of painter and revolutionary Jacques-Louis David, of which Eckersberg was a pupil, and later taken to extremes by the Impressionists. The Danish School that grew from Eckersberg’s work, with its grounding in the practise of en plein air, is said to contain within it the very essence of Danishness - the realistic rendering of the gentle landscape and fair climate is seen to echo the inner nature of the Dane, that is, as fair and bright as the sky, and grounded in the real world. The more far-flung romantic sentiments of the time were considered “German” and so unwanted. This movement which followed from Eckersberg was held in high esteem at the Royal Academy of Arts for many decades, until after 1900, thus keeping the artistic revolutions taking place in the rest of Europe, such as that provided by the Impressionists, at bay. One of the many strange things about this particular iconic “Danish image” of Eckerbserg’s is that it is not actually painted in Denmark, but in Rome. As the title describes, the painting shows “A View through Three of the Northwestern Arches of the Third Storey of the Colosseum in Rome”. It is small, a masterpiece of control of the visual field, painted in 1815 at the dawn of a new era, when new ideas of democracy, freedom, and capitalism were being tested, and new thoughts of the arts as a qualified domain in itself, from which to develop knowledge of the world and history, were growing. Considering the realism generally seen in paintings from this period and the strict use of traditional schemes of composition - such as linear perspective and the principles of mathematical composition provided by the Golden Section - this painting of Eckersberg’s exists as somewhat of an anomaly. Following the rules of linear perspective, the curved shape of the Colosseum should either lay flat on the surface, or draw a half-circle around the viewer. But the Colosseum is not curved as it should be. It is instead made to look as if it is bulging inwards, not outwards. Eckersberg was normally an obsessive practitioner of the rules of perspective, so this strangeness is almost certainly not down to error. But why then this distortion? Did he perhaps feel this anomaly fitting for the new sense of freedom rife after Napoleon had been defeated at Waterloo earlier that year? And why the decision to condense the city’s skyline in order to show buildings through the arches in positions which cannot be seen in reality? This constructed nature of the image has mostly been ignored in the literature surrounding the painter and in the promotion of his particular Danish qualities. One of the most influential theories on national identity creation is found in Benedict Anderson’s Imagined Communities (1983). In the work Anderson talks of the constructed nature of nations, what he terms “imagined communities”: unities created over and above the disparate nature of events and times, enabled through the emphasis, and over-emphasis, of certain events and qualities. The national art museum can be seen as a key arena in which such a nation making is played out, based as it is in the assumption that it’s here in which one can grasp a certain essence of a nation - its people, their culture and their history - all by walking through a selection of its visual remains. However, this imagination of sameness, shared identity and history comes at a price which Anderson does not address - to allow this construction one must also do a whole lot of forgetting. Homi K. Bhabha, in his essay “Dissemination” (in The Location of Culture, 1994), emphasises how, to build a nation or a unity of any kind, you must forget most of what you know about differences, be it individual or socio-economic. It is a forgetting we often see played out in museums. All the events, traumas and differences that do not fit well into the uniform and often overly heroic and glamorous picture of the whole, are often left out in silence. As it offers you the opportunity to remember, to learn, to get closer to the culture, the museum also simultaneously obscures. Indeed, if forgetting were not necessary, no museums and curators would be needed to select and revise the canon of the arts, through including formerly forgotten artists and in the process facilitating the forgetting of others. Abildgaard was appointed professor at the Royal Academy of Art in 1778, before Eckersberg would take up the role in 1818. However, Abildgaard’s taste for violent rebellion, tragic disasters, mythology and a general historical focus did not suit the ideas of Danish national identity as it developed through the 19th century. As such, he was eradicated from the canon, even though he could easily have been, as Eckersberg was, bestowed with the name and fame of being the "Father of Danish painting". Indeed, his painting Philoctetes Wounded, pictured above, achieved a fair bit of international attention at the time of its painting in Rome, something which did not happen to the paintings of Eckersberg. Philoctetes has some peculiarities to it, which are not as easy to hide as those of Eckersberg’s. Abildgaard’s painting is a violent rendering of a helpless hero in pain, not quite the stuff with which national icons are made. Furthermore, it shows off some overtly homoerotic elements. Remembering Eckersberg and forgetting Abildgaard had been a necessary move in order for Denmark to sustain the image of a bright and rational nation. It was not until around the 1980's that the painting came out of storage and graced the wall of a museum. Since then it has occasionally been sent on loan to other museums such as the Louvre, and is now considered an important European work of its time. Although Eckersberg has been hailed as the Father of Danish painting, recently his place at the head of the family tree has been contested. A pupil of his, Christen Købke, who was almost completely forgotten after his death in 1848, has come to fame in recent years and has been talked about as the most Danish of all Danish painters. Købke is now being credited as bearer of the most naturalistic, free and uncomplicated spirit in Danish art. But he has his strangeness as well. There is nothing left of Abildgaard’s historical pathos which can also be seen also in parts of Eckersberg’s works. Neither is there much left of Eckersberg’s masterful control of form. It is, in fact, as though Købke deliberately works against such order. In his View of a Street in Østerbro outside Copenhagen. Morning Light (1836), cows wander the streets and there seems to be no real focus of attention in the painting. If there is a focus, it vanishes as the eye is led along the lines of perspective which shoot from right to left, lines which travel against the familiar direction of reading. At an exhibition of Købke’s work at the National Gallery in London he was hailed as the “Danish Master of Light.” For Købke it took a long time of forgetting to become remembered again. When he did eventually take his place in the limelight of history, he was, through this new accolade, propelled from the cow-filled streets of Copenhagen into the higher, light-filled spheres of religious and philosophical discourse. The emptiness and casualness of his work, which was almost unbearable to his contemporaries, was forgotten, and the reasons as to why the nation left behind one of it’s best men were not addressed. Non-Danish experts on Danish art have encouraged us to leave behind these old Danish masters of the early 19th century and hand over the title of a Golden Age in Danish painting to the breakthrough of Modernism in the 1880's - a period when realism and symbolism fused together in the works of a group of Danish painters which included the likes of Vilhelm Hammershøi and Laurits Andersen Ring. The latter, L.A. Ring, had a preference for placing his figures on thresholds such as the one occupied by his wife in the image below, between the interior of the home and the garden outside. There is something in Ring's rendering which invites us to see the garden as something more than just a garden, the woman as more than just his wife, and her attitude more than merely casual. On the other hand, of course, it could be nothing more than a painting of his wife in the doorway to a garden. This ambiguity of betweenness, in fact, might better fit the truth of Danish identity, as the nation stands at the threshold of the globalised world, somewhere between wanting and not wanting to be involved. Henrik Holm, MA. and Ph.D. in Art History from the University of Copenhagen, Denmark. Former head of education at Louisiana Museum of Modern Art, currently curator at Statens Museum for Kunst, Denmark, in charge of The Royal Cast Collection. Henrik Holm is co-author of the book Nature Strikes Back. Man and Nature in Western Art (SMK, Copenhagen 2010).
<urn:uuid:13583bed-0b74-4adb-9f11-30d62f4771b3>
CC-MAIN-2020-16
https://publicdomainreview.org/essay/visual-nation-making-and-forgetting/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370508367.57/warc/CC-MAIN-20200402204908-20200402234908-00235.warc.gz
en
0.977157
2,153
2.765625
3
Posted by admin | Mar 06, 2020 | Nodules: Causes, Symptoms, Diagnosis & Treatment What are nodules? Abnormal Swelling or Aggregation of Cells in the Body A Nodule is an abnormal growth in tissue that creates for a skin distinct from its surroundings. Nodules can form just beneath the surface of the skin and can further move down deeper in skin tissues or internal organs. The thyroid gland is most likely to form nodules. Nodules are also often used to refer mushroomed lymph nodes (lymphadenopathy). The fact is that doctors use nodules as a generic term to illustrate any lump below skin that’s at least 1cm in size. Though, it’s not an absolute identification. Rather, it’s used to convey across other skin specialists what they see. Areas where nodules are most likely to develop include: - Head and neck - Lungs on either side of the chest What Causes the Most Common type of Nodule: Thyroid Nodule Causes of Nodule: unsure but shed load It’s not always quite clear as to why an individual gets thyroid nodules. Certain clinical conditions can cause them to develop which includes: - Thyroiditis: It is a chronic inflammatory condition of the thyroid. One kind of thyroiditis is called Hashimoto’s disease. It’s linked with low thyroid activity medically known as hypothyroidism. - Thyroid adenoma: An indeterminate growth of thyroid tissue overtly. Most adenomas are free of danger, but some produce thyroid hormone which causes an overactive thyroid medically known as hyperthyroidism. - Thyroid cancer: Not all thyroid nodules are cancerous, but some can be. - Thyroid cyst: This is generally incited by a thyroid adenoma that’s “degenerating”. - Lack of Iodine: A diet that is deficient of iodine can lead to thyroid nodules. This is quite common in Asian countries like India, since iodine is not much added to many foods. Who’s high At Risk to Develop Nodule? Thyroid nodules frequently materialize in people due to many reasons. Unfortunately, by the time we cross 60, half of all of us have them. They’re usually very small. You might only get to know you have a thyroid nodule when your doctor realizes one during a diagnosis or if you have an imaging study of your thyroid. Still, few elements can stir up your chances of forming a thyroid nodule which includes: - Having a family history (immediate family) of thyroid nodules - Being younger than 30 years or older than 60years - Living in a part of the world where the diet lacks iodine Do I Have a Thyroid Nodule? Spot it right to treat it upright About 70% of the general population comes into assault of nodule. Though you may instantly be able to spot a nodule just by looking in the mirror. Face the mirror with the chin lifted a little. Gulp down and look for a lump on either side of your windpipe located near your Adam’s apple. Put your fingers compassionately on your neck in that location and feel for a bump. If you notice one, consult your specialist about it and have him/her check it. Your doctor might perform a physical examination and prescribe one of the following tests to identify if it’s predictive of cancer or not: - Blood test for thyroid hormones - Fine-needle biopsy Non-cancerous thyroid nodules though can be an issue as annoying if they grow too large and make it difficult for you to inhale or exhale. Do Nodules Bear the Risk of Cancer? Reasoning & Relevance Almost 90% of thyroid nodules are benign i.e., not cancer. A diagnostic approach that incorporates imaging studies, ultrasound and, when signaled, molecular testing, and fine-needle aspiration biopsy equips a personalized, risk-merit based convention that encourages high-quality care and reduces cost and irrelevant testing. While examining a bump or nodule in your neck, one of the main motives of your doctor will be to rule out the likeliness of cancer. Though, your doctor will also want to learn if your thyroid is working accurately. Diagnosis of Nodule to distinguish between benign and malignant Nodules - Physical exam: In the process, the doctor will check for signs and symptoms of hypothyroidism, such as a dry skin, facial swelling and slow heartbeat, and signs and symptoms of hyperthyroidism, such as tremor, excessively active reflexes, and erratic or rapid heartbeat. - Ultrasonography: This imaging method executes high-frequency sound waves instead of radiation to produce images. It renders the most relevant information about the structure, size and shape of nodules. It may also be used to differentiate cysts from solid nodules or to identify if multiple nodules exist. It may also lead the way if there is a need to carry out a fine-needle aspiration biopsy. - Fine-needle aspiration (FNA) biopsy: Nodules most commonly undergo biopsy to ensure no cancer is present. FNA biopsy allows differentiating between benign and malignant thyroid nodules. In the process, your doctor inserts a fine needle in the nodule and takes off a specimen of cells. The procedure, which is performed in your doctor’s office, takes about half n hour and has minimal risks. Often, your doctor will utilize ultrasound to pilot the placement of the needle. The specimen are then sent to a lab and examined under a microscope. - Thyroid scan: In some cases, doctor may suggest a thyroid scan to assess thyroid nodules. During the test, an isotope of radioactive iodine is dosed through injection into a vein in your arm to reach your thyroid gland. You then lie on a bench, exposed to a small amount of radiation while a specialized camera that generates an image of your thyroid on a computer screen. Nodules that produce too much thyroid hormone — called hot nodules— almost always noncancerous — appear on the scan since they absorb more of the isotope than ordinary thyroid tissue does. Nonfunctioning— called Cold nodules—show up as holes or deformity on the scan. The drawback of a thyroid scan is that it is unable to differentiate between benign and malignant cold nodules. Nodule Treatment & Management: How are thyroid nodules treated Treatment of Nodule—Therapy as per Type The most favorable Treatment option for nodule depends on the type of nodule you have. Following are the most appropriate plan of treatment for varied types of nodule and thyroid nodule:- Benign nodules Treatment: Non-cancerous Nodule Watchful waiting: No treatment type is the nodules are not cancerous. Identifying the magnitude of the nodule you and your doctor may mutually decide that there is no need for the breakout to be treated at this time. However, you will need to visit your doctor frequently in order to get checked for any changes in the nodules. If a nodule isn’t cancerous but is bothering, there are a number of treatment options available i.e.: - Thyroid hormone suppression therapy: The therapy entails treating a benign nodule with levothyroxine (Levoxyl, Synthroid, others), a fabricated form of thyroxine that you take orally in the form of pill. The concept is that delivering supplementary thyroid hormone will indicate the pituitary to produce less TSH, a hormone that triggers the growth of thyroid tissue. Though levothyroxine therapy sounds good as an idea but still is a matter of question. There are up till now clear scientific evidence that the therapy consistently contracts nodules. - Surgery: Sometimes, a nodule that’s evidently benign may need surgery, particularly if it’s so large that it makes it difficult to breathe or swallow. Surgery is also taken into account for people with enlarged multi-nodular goiters, especially when the goiters shrink airways, blood vessels or the esophagus. Nodules diagnosed as suspicious or nebulous by a biopsy also require surgical removal, so they can be assessed for signs of cancer. Surgical techniques to remove pulmonary nodules include: - Thoracotomy: The surgical method is considered open lung surgery. An incision with a scalpel is made in the chest wall for the purpose to take off pieces of ailing/septic lung tissue. Patients generally have to stay in the hospital for a few days after the surgery. The mortality risk is low to lowest. When feasible, a mini-thoracotomy that is less invasive may be conducted. - Video-Assisted Thoracoscopy: This technique utilizes a thorascope, a malleable tube with a miniature camera on its end. The thorascope is inserted into the chest wall through a small cut. The camera enables the doctor to view an image of the nodule on a portable screen. This procedure needs a smaller cut and a shorter recovery time than a thoracotomy does. - Malignant Thyroid Nodules (Cancer) Treatment Almost all thyroid nodules that are malignant or cancerous are treated by surgical procedure. Depending upon magnitude of malignancy of the nodule, the option is considered as per the expanse of thyroid surgery including complete elimination of the thyroid gland (total thyroidectomy) vs. elimination of half of the thyroid gland (thyroid lobectomy). Surgical techniques to remove cancerous nodules nodules include usually involves: - Thyroidectomy: A frequently performed treatment for malignant nodules is surgical elimination, often accompanied with the majority of thyroid tissue — a procedure medically termed as near-total thyroidectomy. Danger associate with thyroid surgery include vandalism to the nerve that regulates your laryngeal nerve (vocal cords) and damage your parathyroid glands — four tiny glands situated on the back of your thyroid gland that help monitor the calcium levels in your blood stream. Therefore, only expert surgeons should be conducting thyroid surgery since the risk to the patients involves the nerves to the glands and voice boxes that regulate calcium are crucially higher in those that do not perform these kinds of surgery routinely. However, you need to know that after a thyroidectomy, you would necessitate lifelong treatment with levothyroxine to supplement your body with adequate amounts of thyroid hormone. - Alcohol ablation: Another viable option for care and control of certain small cancerous nodules is alcohol ablation. This procedure is beneficial to treat cancer that arises in areas that aren’t easily approachable during surgery. This treatment involves injecting a nominal amount of alcohol into the cancer contaminated thyroid nodule. Multiple treatment sessions may be needed. Treating nodules that cause Hyperthyroidism If a thyroid nodule is producing thyroid hormones, overburdening your thyroid glands usual levels of hormone production, your doctor may advise treating you for hyperthyroidism. This may consists of: - Anti-thyroid medications: Occasionally, your healthcare provider may recommend an anti-thyroid drug such as methimazole (Tapazole) to subside signs of hyperthyroidism. Treatment is usually long term and can have adverse side effects on your liver, so it’s essential to discuss the treatment’s threats and merits with your doctor in advance. - Radioactive iodine: Doctors most commonly use radioactive iodine therapy to treat multinodular goiters or hyperfunctioning adenomas. Taken in liquid form or a pill/capsule, radioactive iodine is sucked up by your thyroid gland which further causes the nodules to contract and symptoms of hyperthyroidism to weaken down, generally within 60 to 90 days. - Surgery: If treatment with anti-thyroid medications or radioactive iodine isn’t an option or has disappointed to render results in favor, you may clearly be a candidate for surgery to take off the overactive thyroid nodule. Surgery also bears conclusive risks that must be meticulously discussed with your doctor. Prevention of Nodule- foresee to forbid If you have see or feel a bumpy skin disorder, you can do the following to avert the development such as: - Quit smoking, and refrain from being in smoke-stacked spaces for long - Get treatment if you have hypothyroidism, hyperthyroidism, reflux, allergies, or sinusitis - Avoid excess consumption of alcohol - limit the caffeine intake - Avoid speaking loudly without ample vocal rest - Avoid too much talking if you have an upper respiratory infection. - Drink plenty of water and keep hydrated - Get a sound night’s sleep - Use a microphone and a humidifier in your home. - Warm up your voice before stretched speaking or singing - Wash your hands frequently - Follow stress alleviation techniques, or meditation to reduce muscle tension. Preparing for your appointment— mutual consultation on best medication If you sense a thyroid nodule yourself — generally in the centre of your lower neck—see your health care provider for an appointment to assess the lump. Once a thyroid nodule has been diagnosed— in a doctor’s examination or imaging such as MRI, CT scan or ultrasound, you will possibly be referred to an endocrinologist — a doctor who specializes in endocrine ailments. To get the best from your appointment, try below suggestions: - Make sure to ask if you need to undergo diagnostic tests in advance - Note down all signs and symptoms and alteration you’re experiencing, even if they seem separated to your present problem. - Create a list of relevant medical information, including family history, all medications you’re taking, recent surgeries, and any other conditions for which you’ve been treated. - Make note of your personal medical history, including any history of thyroid disorders. Inform your doc of any exposure you have had to radiation, whether as a child or an adult. - Make note of questions to ask your doctor what treatment options are available for successful treatment of Nodule. To get resolve all your queries and have a best treatment plan for your disorder, meet the best in profession Dr.Rohit Batra @ DermaWorld, Delhi.
<urn:uuid:a894cd28-4d56-446d-99b7-2962a62bb86a>
CC-MAIN-2020-16
https://www.skinspecialistindelhi.com/blog/nodules/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00314.warc.gz
en
0.919347
3,004
3.75
4
Net Metering FAQs What is Net Metering? Net Metering allows customers to interconnect approved renewable generation systems to the electric grid and provide electricity to their residence or facility. The electricity provided by the renewable generation system offsets electricity that would have been delivered to the customer by Dominion Energy. Net Metering rules in Virginia are administered by the Virginia State Corporation Commission and published in the Virginia Administrative Code under 20VAC5-315. Dominion Energy Virginia’s Net Metering Terms and Conditions are published in Section XXV of the “Terms and Conditions for the Provision of Electric Service.” What is a renewable energy generation system? The Virginia Administrative Code Section 56-576 defines renewable energy as “… energy derived from sunlight, wind, falling water, biomass, sustainable or otherwise, (the definitions of which shall be liberally construed), energy from waste, landfill gas, municipal solid waste, wave motion, tides, and geothermal power, and does not include energy derived from coal, oil, natural gas, or nuclear power…” Batteries may be included as part of a renewable generation system, but do not qualify as a renewable generation source by themselves. How does Net Metering work? Once a Net Metering Notification Form has been approved, a special billing meter is installed that can measure both the quantity of and the direction that the electricity is flowing. The energy your system generates is first used by your home or business. When your renewable generation system is making more electricity than you are using at the time, the excess electricity is recorded by the meter as it flows back into the grid which will be used to offset future electric use. When you are using more energy than your renewable generation system is producing at the time, the electricity from the grid is recorded as it is delivered to your home or business. What does Meter Aggregation mean and what is Agricultural Net Metering? Aggregating multiple meters under a single account is a separate process from establishing Net Metering. Meter aggregation is coordinated through Dominion Energy’s design and contracts departments. It can take several months to develop the associated monthly charges. Meter aggregation is handled as a request for excess facilities which is covered in Section IV.E.4 of Dominion Energy’s filed Terms and Conditions. The customer is charged monthly for a percentage of the cost difference in the installed value of the facilities required to serve the customer at multiple metering points versus the same load at a single metering point. The greater the distance between the metering points and/or the more electrical distribution separating the meter points, the higher the monthly facilities charge. All the facilities involved must physically be located on the same contiguous property. Virginia Agricultural Net Metering allows an alternate definition of “contiguous property” and meter aggregation for qualifying agricultural businesses. To participate, customers must first qualify as an “Agricultural Business” which is defined as “any sole proprietorship, corporation, partnership, electing small business (Subchapter S) corporation, or limited liability company engaged primarily in the production and sale of plants and animals, products collected from plants and animals, or plants and animal services useful to the public” in Section 56-576 of the Virginia Administrative Code. What is the Virginia Third Party PPA (“Renewable Energy”) Pilot Program? Who is eligible for Net Metering? Any residential, commercial, or governmental customer who is served on a standard rate schedule, or a demand based time of use rate schedule, which allows a parallel generator interconnection may participate in Net Metering. Jurisdictional Customers served on the rate schedules below are eligible to net meter. Please consult Dominion Energy for other rates that may qualify. Net Metering Compatible Rate Schedules - VA Schedule 1 - NC Schedule 1 - VA Schedule 1S - NC Schedule 1P - VA Schedule GS-1 - NC Schedule IT - VA Schedule GS-2 and GS-2T - NC Schedule 5C - VA Schedule GS-3 and CS-3T - NC Schedule 5P - VA Schedule 10 Net Metering is not compatible with Dominion Energy Virginia’s Electric Vehicle Pilot Schedule 1EV. Who installs and owns the renewable generation system? Dominion Energy does not sell or install renewable generation systems. Interested customers should contact a qualified electrical contractor or renewable energy contractor. These contractors can provide the necessary structural engineering analysis, equipment specifications, installation costs, and energy production estimates. Customers should keep in mind that they are solely responsible for compliance with all applicable zoning requirements, building codes, electrical codes, and any other codes or restrictions applicable to the installation, operation and maintenance of a renewable generation system including, but not limited to, any real property restrictions affecting the use of the property on which the generation system is located. Dominion Energy does not review or approve the suitability of the generation system’s capacity, equipment specifications, installation method, or installation location. How much electricity can a system produce? Net Metering is intended to allow a customer to offset a portion or all of the electrical energy requirements of their home or business. The system must be sized so that it does not reasonably produce more energy than the expected annual electrical consumption. How large can my system be? Maximum renewable generator sizes (AC capacity): - Virginia Residential - 20 kW - Virginia Non-residential - 1000 kW - North Carolina All Customer Classes - 1000 kW These system sizes are based on the maximum expected AC output of the system after all losses have been applied including panel orientation, shading, and inverter losses. How much does Dominion Energy charge to interconnect a generating facility? Often there are no charges for interconnection of small residential systems. Interconnection charges for larger systems can vary substantially depending on the amount of equipment and construction work necessary to complete the interconnection. Dominion Energy will review the existing service capacity to the premise to determine if existing facilities are adequate to support the proposed generation load, and if additional protective equipment is required. Are there specific requirements for the generation system? An interconnected generation system will operate in parallel with the utility system and must have “grid tie” capability. The system and associated inverters must be certified by a national testing laboratory, conforming to UL1741/IEEE 1547 specifications for grid tied systems. Where is the generating facility interconnected? The renewable generation system is interconnected at a point on the customer’s side of the Dominion Energy metering equipment. The system may not be interconnected anywhere within the metering equipment cabinet (typically a meter base or current transformer compartment) without prior approval from Dominion Energy. How do I apply for Net Metering? Prior to installation: Step 1: Complete Sections 1 through 4 of the Notification form, and sign the Notification form at the bottom. Step 2: Submit the Notification form to Dominion Energy either by scanning and emailing Or, by US mail to: Dominion Energy Virginia 600 Canal Place, 11th Floor P.O. Box 26666 Richmond, VA 23261 We will send return confirmation that the Notification form was received. Step 3: We will review the specifications of the proposed generating system and determine if the system is compatible with the electric distribution grid and the existing electric distribution facilities serving the interconnection point. When the review is completed, we will return a signed copy of the Notification form along with any additional system protection requirements and/or required upgrades to the existing electric distribution facilities serving the interconnection point to enable completion of the interconnection. After system installation: Step 4: Complete Section 5 of the Notification form and resubmit to Dominion Energy. Section 5 of the Notification Form requires that a licensed electrician certify that “the system has been installed in accordance with the manufacturer’s specifications as well as all applicable provisions of the National Electrical Code.” In certain situations, a licensed electrician may not have installed the electrical portion of the system; rather, one of the following two situations may have occurred: - A homeowner installs the system and applies for an electrical permit and inspection in their name; - A licensed Virginia Class A or B general contractor with electrical and/or alternative energy certification installs the system and applies for the electrical permit and inspection. In these situations, where a licensed electrician has not installed the system, a copy of the final electrical inspection which is signed by the electrical inspector is acceptable in lieu of a licensed electrician’s certification. In the case involving the homeowner installation, the homeowner would fill in Section 5 as the installer. In the case of the general contractor installation, the general contractor would complete Section 5 as the installer. In either case, the individual completing Section 5 as the installer must be the same individual listed on the electrical permit. Step 5: We will complete the required metering work and return a separate written authorization to energize and operate the system. Dominion Energy requires 30 days for residential systems, and 60 days for commercial or governmental systems to complete the metering installation process. What if I am building a new house or business and electric service has not been established yet? A net metering interconnection request can still be submitted for the new location as long as a Dominion Energy Work Request number has been established. In this case, the Work Request Number should be used in lieu of the account number on the interconnection request form. How much do I get for the energy my system produces? Generally speaking there is no direct cash payment for the energy produced. The energy you produce and consume offsets the energy you would normally purchase from Dominion Energy and can be valued at the amount you would pay for your next kilowatt-hour. The value will vary with individual usage patterns and you should refer to your previous electric bills to determine the appropriate value. Any excess energy returned to the grid is recorded and used to offset future electric energy delivered to the home or business. How is Net Metering billed? You will receive a bill that is similar to your normal electric bill. The difference is that the bill will be lower than your bill would have been without Net Metering because all or a portion of your electricity needs will be provided by your renewable energy generation system and not provided or billed by Dominion Energy. If you generate more electricity than is needed for your home or business in a given month, the amount will be used to offset future electricity you would receive from Dominion Energy. Do I need a Power Purchase agreement? A Power Purchase Agreement (PPA) is an agreement for Dominion Energy to purchase any net excess energy production which is remaining at the end of each 12 month net metering period. If you have a smaller renewable generator, and you expect to use most if not all of the renewable energy you generate throughout the year, a Power Purchase Agreement is not necessary. If you have a large generator with consistent excess renewable energy, you may want to consider a Power Purchase Agreement. Refer to Section F of the Terms and Conditions for additional information about a Power Purchase Agreement with Dominion Energy. I have a Power Purchase Agreement, how much will I be paid for excess energy I return to the grid? The amount is based on the number of kilowatt hours (kWh) of energy you exported and the PJM Interconnection, L.L.C. (PJM) DOMZONE day-ahead annual simple average locational marginal price (LMP) as published by the PJM Market Monitoring Unit for the most recent calendar year. The price changes annually. Here are the historical values. Where on my bill does it show all the energy my system produced? Your electric bill does not show all of the energy your system produced. The energy you produce that is consumed by your home does not pass through the Dominion Energy meter. The net meter measures electricity that is delivered from Dominion Energy to you, and any electricity that is produced by you and returned to the electric grid. The net meter cannot measure the total amount of electricity produced by your system because your home or business uses the electricity produced by the system first, and that electricity does not go through the meter. What is the Standby charge? The standby charge only applies to Net Metering customers served on Virginia Residential Schedule 1 with a generation system size in excess of 10 kW AC. Residential customers served under Virginia Schedule 1 normally pay for electric system capacity (or electric system demand) through their kilowatt hour rate. This is different from other rate schedules that have a separate demand charge component in the rate. The standby charge is based on the customer’s generation system size and the customer’s net energy consumption. The standby charge consists of a distribution standby charge, an electricity supply service (transmission) standby charge, and a Rider T1 standby charge. Refer to Virginia Residential Schedule 1 for more details. Can I sell power instead of Net Metering? Yes. There are a number of entities that will buy your power output. If you want to sell your power, you can explore the options available to you. The options include, but are not limited to, selling power into the PJM Market and selling it to Dominion Energy. However, selling power requires additional metering and interconnection equipment which is an additional cost you will want to consider. What if I sell my house? We will continue to Net Meter and transfer the Net Meter to the next owner. Until advised that the system has been removed, the premise is considered a Net Metering premise. Can I cancel my Net Metering participation? You can cancel at any time by calling 866-366-4357. This will require disconnecting the renewable generation and removing the interconnection from Dominion Energy’s system. I received a letter in September 2019 about changes to net metering regulations. Why? The State Corporation Commission (SCC) is establishing a proceeding on changes to the Virginia Net Energy Metering Rules. As part of this proceeding, the SCC required Dominion Energy Virginia to send this notification to all current Net Metering customers. The rule changes largely impact Cooperative customers. Rule changes allow Dominion Energy to provide an online notification form option, in addition to the paper form, for new Net Metering customers. The changes do not impact current Net Metering participants.
<urn:uuid:7066611a-bd4f-465f-9e25-20a3f5498a64>
CC-MAIN-2020-16
https://www.dominionenergy.com/large-business/renewable-energy-programs/traditional-net-metering/net-metering-faqs
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496227.25/warc/CC-MAIN-20200329201741-20200329231741-00035.warc.gz
en
0.916441
2,946
2.609375
3
By Anja Anđelković & Dunja Stojkovic “Stay positive” and “cheer up” are among the most common phrases of our time, as if it’s now socially unacceptable and “wrong” to feel any other emotions but joy, happiness, and gratitude for what we already have. Showing up for work a bit cranky these days for whatever reason can instantly give you the reputation for being a grumpy, demotivating person, and being in a bad mood for a couple of days can have even more serious effects. The pressure isn’t only to hide certain emotions, but not to feel them at all. We have planners, posters, and even pillowcases with messages such “smile and the world will smile back at you” or “think positive!”, and as if this weren’t enough, there are people reminding us that some feelings are just not worth paying attention to or, for that matter, not feeling at all. This attitude isn’t only annoying to those of us tired of hearing such things, but it can be frustrating and dangerous. Bottling up emotions isn’t necessarily the greatest thing to do for our mental health. ALL EMOTIONS ARE CREATED EQUAL To find out why we even have these feelings that are now deemed inappropriate, let’s look into why we have them and how they have survived over time. It is thought that there is only a limited number of basic, universally recognized human emotions and scholars still argue about the exact number, but the most common classification identifies six: anger, disgust, fear, happiness, sadness, and surprise . If you examine these closely, you will notice that only one of them, happiness, is exclusively pleasant, while surprise can go both ways. So when we try to ignore unpleasant feelings, we’re basically trying to ignore a whole bunch of our basic emotions and we deprive ourselves of a common human experience. These emotions don’t exist just to aggravate us; they were essential to our evolutionary development and helped ensure our survival as a species. They have purpose and meaning. Emotions help us adapt to problems instinctively, and they serve as instant motivators for our behavior. For example, without the emotion of disgust, we would constantly drink spoiled milk or eat rotten food. Other than that, they color our memories and make them easier to access and serve as a driving force for our future behavior: we try to maintain pleasant emotions and avoid unpleasant ones. This doesn’t mean bottling them up and pretending they don’t exist, but rather trying not to get into too many situations that might give rise to them: we felt disgusted while tasting spoiled milk, so we try very hard to avoid feeling that emotion ever again . Of course, it is impossible to avoid all unpleasant emotions as life is full of loss, problems, downfalls, and missed opportunities, so the key is to understand the reason why we’re feeling a certain way and learn how to deal with those feelings. Other than their function in aiding our survival as species and helping us adapt to new situations, emotions play a huge role in our communication with others. As we interact with other people, emotions serve as signals for how we are feeling, what our intentions are, the relationship we have with the person we’re talking to, and so on. By being this signal, they evoke reactions from others which, in turn, serve as triggers for behavior . Culture, of course, has always played a huge part in how these functions of emotions are manifested . We still hear people saying how boys shouldn’t cry or how girls should never show anger. These tired old sayings are perfect examples of stereotyping but they also show us how our culture influences our emotional expression and decides which emotions are ideal to have and which aren’t. It might sound as if we are slaves to our cultural background and that isn’t far from the truth but this isn’t necessarily a bad thing. We couldn’t live in groups without any norms and expectations; the problem is when those expectations become extreme and harmful. For instance, it wouldn’t be possible to live in harmony in a world where everyone expressed their anger in destructive ways, going around vandalizing their neighborhoods but expecting people never to express or even feel anger at all is also harmful and has serious consequences for each one of us. NEGATIVE CAN BE POSITIVE When learning mathematics, children find the “two negatives make a positive” concept useful. With emotions, you don’t even need two negatives to make something useful. Just as negative numbers are also real numbers, “negative” emotions are real emotions and it is not only acceptable but natural, to feel them . Therefore, we need to learn how to embrace these unpleasant emotions as a natural and vital part of human experience. In fact, the classification of emotions as positive and negative is completely unnecessary and misleading. Emotions can be useful or not, but there is no reason to divide them into those “good to have” and those we should avoid at all cost. How exactly are unpleasant emotions natural and useful when they not only make us feel bad but also make others look at us in a different light? Firstly, if we stripped our lives of any unpleasant emotion, we would be basically canceling out a big part of our emotional spectrum. If you think: “Oh well, I don’t mind canceling something out as long as it makes me feel good”, think again. It is practically impossible to live without any distress, so when we think we’re canceling emotions out we are more likely just suppressing them, and it has been proven that when we conceal distress we feel emotionally worse in the long run and end up being less effective and productive . Conversely, accepting and acknowledging the intricacy and complexity of our emotions can prove to be a path to good mental health . So far we’ve established that unpleasant emotions are a natural part of human experience and had an important evolutionary function, but you may still be wondering how useful they are now. It is important to understand that unpleasant emotions coexist with pleasant ones, and both serve as signals of where we are in life and where we should be headed . They are also the principal motivators for change. If we work hard enough to suppress these emotions, we’ll never do anything to rectify the very situation that is causing our dissatisfaction, because we rationalize “why to mess with a winning formula?” or we are actually too scared to change the status quo . This doesn’t only apply to individuals – emotions can be incentives for much bigger changes. Just think of all the people protesting around the world because of various injustices and how they probably felt before they decided to take action. There are also more specific ways in which unpleasant emotions can be useful. For instance, anxiety can make us problem-solve more quickly in situations where there is a risk of danger and guilt can make us more responsible and help build our moral values . Of course, the key is not to get too carried away with these emotions, since that is when they can become unhealthy. The same goes for sadness: it is natural to feel sad about all sorts of things or to grieve after a loss, but it is when sadness becomes a permanent state of mind without any apparent cause, that it can become harmful. WHAT TO DO WITH ALL THESE FEELINGS Instead of always bottling up and trying to ignore unpleasant feelings, it would be smart to first try to acknowledge how you feel without trying to rectify things instantly and stay positive. This isn’t only a useful way to evaluate where you are emotionally, but it will prevent those unpleasant emotions from intensifying. Trying to suppress emotions forcefully can exacerbate and complicate them in the long run . While working on this step, keep in mind that these feelings are natural and nothing to be ashamed of. While being aware of unpleasant emotions is a great start and it is sometimes enough to acknowledge it and let it pass, it is also important not to fall into the trap of dwelling on these feelings and drowning in those thoughts without trying to solve the cause of the problem . In order to detangle your emotions, it can be helpful to start journaling. It’s a great way to self-reflect and gain some insight into your problem from a different perspective, as things often seem different when they are put down on paper . Another way to shift your perspective is by confiding in someone else, whether it be your partner or a close friend. If you still feel down and aren’t sure how to deal with your emotions or the circumstances that are causing them, keep in mind that there is no shame in asking for professional help and that by doing so you are actually helping yourself and making a huge step in the right direction. Talking with someone we trust can help us learn how to acknowledge and express all of our emotions without feeling like the world around us is crumbling and it can be a great way to learn how to cope with all our emotions, as we’ve learned it is impossible to avoid them altogether. - Burton, N. (January 7, 2016). What Are Basic Emotions. - Costa, D. (September 28, 2017). The Benefits of Negative Emotions: 3 Keys to Wellbeing. - David, S. (September 6, 2016). Why You Should Embrace Your Darker Emotions. - Gregoire, C. (November 11, 2014). The Importance of Negative Emotions. - Hwang, H. & Matsumoto, D. (2017). Functions of Emotions. In R. Biswas-Diener & E. Diener (Eds), Noba textbook series: Psychology. Champaign, IL: DEF publishers. DOI:nobaproject.com - Newcomer, L. (March 27, 2015). Why Positive Thinking Doesn’t Always Work. - Rodriguez, T. (May 1, 2013). Negative Emotions Are Key to Well-Being. If you need any kind of advice related to the emotional development of your children, you’ve come to the right place! Schedule a FREE CONSULTATION with one of our Coaches:
<urn:uuid:09167411-c565-4bdb-8d71-8203187c465b>
CC-MAIN-2020-16
https://nobelcoaching.com/emotions/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00555.warc.gz
en
0.948836
2,143
3.296875
3
April 2018, the Reserve Bank of India (RBI) issued a “Statement on Developmental and Regulatory Policies” (‘Circular’) dated 06.04.2018, thereby prohibiting RBI regulated entities from dealing in/ providing any services w.r.t. virtual currencies, with a 3-month ultimatum to those already engaged in such services. Cut to 4th March, 2020- The Supreme Court of India strikes down RBI’s circular and upheld crypto-trading as valid under the Constitution of India. Amidst apprehensions of crypto-trading being a highly-volatile and risk-concentric venture, the Apex Court, in its order dated 04.03.2020 observed that RBI, an otherwise staunch critic of cryptocurrencies, failed to present any empirical evidence substantiating cryptocurrency’s negative impact on the banking and credit sector in India; and on the basis of this singular fact, the Hon’ble SC stated RBI’s circular to have failed the test of proportionality. In this article, the author has made a humble attempt to discuss this landmark judgment and its (dis)advantages to the Indian economy. Before we delve into the legalities of trading in cryptocurrency, let us first briefly understand its meaning, and what made the Central Bank so wary of this technological innovation, despite its simultaneous attempts at digitalizing the Indian monetary system. Bitcoin- the face of cryptocurrency While there are several examples of cryptocurrency like Etherum, Ripple, Litecoins; “Bitcoins” undoubtedly have gained the maximum attention; and infact to such an extent that masses now identify the concept of cryptocurrency with “Bitcoins”. So we may too, perhaps understand cryptocurrency with the help of bitcoins. Bitcoin, or cryptocurrency, isn’t your regular fiat money- it is digital currency that runs on block-chain technology, independent of any government or bank. Created digitally using algorithms, cryptocurrencies have no underlying asset, and exist only virtually. Further, unlike the present monetary system, rather than relying on a central body for its issuance and operation, the Bitcoin software is designed in manner such that every Bitcoin transaction and the holdings of every user, would be tracked and recorded by the computers of all the people using the digital money (‘nodes’), on a communally maintained database that would come to be known as the blockchain. The synchronised function of a private and public key associated to each node, further makes this system transparent in the sense that all participants on the network can access the information, yet private enough to not let out substantive information about a particular transaction to anyone other than the parties. Hence, cryptocurrencies made possible a financial network that would create and move money without a central authority. Hence, the following can be enlisted as the defining elements of cryptocurrency- - Absence of any centralized control; - No underlying asset- value solely dependent on market sentiments. - Provides an unalterable record of all transactions ever done on the network; with 24*7 accessibility to all participants in the network - Anonymity of transactions- hence, “crypto”- Transactions take between public keys (uniquely assigned to every participant) and hence, identities of the parties to the transaction remains cryptic. RBI’s apprehension and warning bells Of the elements discussed above, it was the anonymity of transactions that bothered RBI the most. Ever since cryptocurrency set its first steps in the Indian economy, RBI raised concerns of consumer protection, market integrity, money-laundering and terror-financing among others. However, one must note that the 6th April circular was not the first time that such concerns were raised by the RBI. Apprehensions that cryptocurrencies pose challenges in form of regulatory, legal as well as operational risks was observed in its Financial Stability Report, dating back to 2013. And owing to its massively growing popularity and reach, regulatory bodies across the globe took note of virtual currency and hence made available a rich literature on what virtual currency is all about. The Courtroom Battle What followed the RBI Circular was a flood of writ petitions filed before the Hon’ble Supreme Court and High Courts, praying for annulment of the Circular. First of such petitions was that filed by the Internet & Mobile Association of India in January 2018, and two years hence, the Hon’ble Supreme Court has given its landmark judgement, based on two main questions- whether cryptocurrency is money or a commodity; and lastly, whether the Circular was an appropriate exercise of its power. Cryptocurrency- Money or commodity? The first question for adjudication was regarding the classification of cryptocurrency as money or commodity- This distinction is important as it forms the basis of determining the validity of the Circular. In order to be classified as money, it was important to check whether cryptocurrencies satisfied the four functions of money, that is, - A unit of account; - A medium of exchange; - A store of value; and - A standard of deferred payment. Hence, the Apex Court tried to superimpose the definition of virtual currencies, as accorded by various international bodies, statutory enactments and non-statutory directives of governmental bodies across the globe, to the four functions of money to determine if at all virtual currency could be called money. A study of various legal frameworks, makes it clear that there are several economies have accepted cryptocurrencies as an accepted mode of payment and identified it as another form of currency, while on the contrary, economies like China have imposed a complete ban on the same. On the basis of an exhaustive analysis of the legal framework and judicial precedents in this regard, the Apex Court reached to a simple conclusion that “if an intangible property can act under certain circumstances as money (even without faking a currency) then RBI can definitely take note of it and deal with it”. However, the author respectfully submits that the aforesaid conclusion of the Apex Court does not clarify the true nature of cryptocurrencies, and again leaves room for interpretation. Having said so, the author has made a humble attempt to analyse the nature of cryptocurrencies, as follows: As a unit of account A unit of account is something than can be used to value goods and services, record debts, and make calculations. In other words, it’s a measurement for value. However, considering that the value of cryptocurrencies is solely based on demand-supply factors, and not an actual underlying asset, it may be difficult to definitively say that cryptocurrencies are a standard unit of account. Further, its high volatility and extreme-ranging prices also makes it difficult to identify cryptocurrencies as a standard unit. Medium of exchange For a mode of payment to be identified as a medium of exchange, the same has to be widely accepted by masses for making payment. A global level macro approach gives an idea that cryptocurrencies like bitcoin, have been increasingly used to enter into transactions; however, are not prevalent enough to buy good/ services. Similarly, in India too, while the presence of cryptocurrencies has infact been acknowledged, the same cannot be said to a “medium of exchange”, atleast at this point of time. Store of value Another feature of money is that it acts as “store of value”, in essence, maintains its value without depreciating over time. Considering that the fiat currency derives its value from an underlying asset (gold), it fulfils the criteria of being a “store of value”. The question here is that can cryptocurrencies, having no underlying asset be said to be having a store of value. While a literal interpretation would suggest otherwise, the value that cryptocurrencies, especially bitcoins have obtained in the current market makes it prudential to consider the same as having a store of value. Hence, according to the author at the present juncture, cryptocurrencies may not fit into the conventional definition of money. So, does categorisation of cryptocurrencies as goods tenable? Understanding cryptocurrencies as goods Section 2 (7) of the Sale of Goods Act, 1939, “goods means every kind of movable property other than actionable claims and money; and includes stock and shares, growing crops, grass, and things attached to or forming part of the land which are agreed to be severed before sale or under the contract of sale” Hence, to answer whether crypto-currencies can be categorised as goods or not, we must note the following- - As per the General Clauses Act, 1897, a movable property shall mean property of every description, except immovable propertye. which can be moved freely without damage. As such, cryptocurrencies are movable. - Considering that cryptocurrency does not impose a claim on anybody, it does not tantamount to an “actionable claim” While there may be sufficient reason to classify cryptocurrencies as goods, in light of the fact that the cryptocurrencies do not have an “intrinsic value” or “speculative value” of its own, it does not completely fit into the definition of goods either. However, in the said pretext, the author is of the opinion that nature of cryptocurrencies is more inclined towards goods rather than money. Issuance of ‘Circular’- an appropriate exercise of power? The second question for adjudication was w.r.t. tenability of the Circular. It must be noted that the Circular issued by RBI did not impose an explicit ban on virtual currencies as a whole; rather, it twisted the arm by imposing a restriction on all entities regulated by RBI-thereby implying that cryptocurrency could not be converted into fiat currency. However, the pertinent question is whether RBI at all had the power to issue the Circular? Power of RBI to regulate virtual currency Attention may be drawn to section 18 of the Payment and Settlement Act, which indicates that RBI has the power to lay down policies relating to the regulation of payment systems including electronic, non-electronic, domestic and international payment systems affecting domestic transactions and (ii) to give such directions as it may consider necessary. Having said so, even if it does not completely classify as “money”, the fact that it is indeed being used as a payment system cannot be ruled out. Hence, as observed by the Apex Court, “it is impossible to say that RBI does not have the power to frame policies and issue directions to banks who are system participants, with respect to transactions that will fall under the category of payment obligation or payment instruction, if not a payment system.” Tenability of the Circular As discussed above, the Circular was not the first time when RBI expressed its concerns about the risks that cryptocurrency brings along with it. As such, the Central Bank stood its ground that the Circular was issued after a long drawn research and analysis- and hence, in no way was the Circular arbitrary. Further, the fact that other regulatory authorities viz. Enforcement Directorate, SEBI, CBDT etc. did not consider the Circular as a knee-jerk, and that their roles come into picture of actual commission of offence, RBI cannot be faulted on the grounds on issuing a preventive circular. Hence, despite the Circular being tenable in all other aspects, the Apex Court annulled the same on the grounds on principle of proportionality- which is discussed hereunder. The Circular vis-à-vis Doctrine of Proportionality The final checkbox for the Circular to be held has valid was its adherence to Article 19 (1) (g) of the Constitution of India on the basis of test of proportionality. Before delving into the same, let us first understand what the principle of proportionality means. The doctrine of proportionality The doctrine of proportionality is a principle that is used as a ground for reviewing administrative actions. The doctrine essentially signifies that any measure taken by a constituted body should not be disproportionate to its purpose. As was held in Coimbatore District Central Coop. Bank v Employees Assn. (2007) 4 SCC 669, “Proportionality is a principle where the Court is concerned with the process, method or manner in which the decision-maker has ordered his priorities, reached a conclusion or arrived at a decision.” It is basically dependent on four main factors- - that the measure is designated for a proper purpose; - that the measures are rationally connected to the fulfilment of the purpose; - that there are no alternative less invasive measures; and - that there is a proper relation between the importance of achieving the aim and the importance of limiting the right. Article 19 (1) (g)- Freedom of occupation It was contended that the ‘Circular’ was in breach of the right of freedom of carrying out an occupation not prohibited by law. Further contending that the restriction was not ‘reasonable’ as per Article 19 (6) of the Constitution and that irrespective of its object, the impact of the Circular was a direct restriction on Virtual Currency Exchanges (VCEs) and not the actual trading- hence, a restriction from carrying an otherwise legal activity. As such, by the very reason that the Circular effectively wipes off all VCEs, it must pass the test of proportionality. The Apex Court observed that, while the RBI indeed has powers to issue the Circular, it’s validity shall be subject to the test of proportionality according to which, though the measures taken by RBI were for a designated purpose, it cannot be accepted that there were no other alternatives which were less invasive. Reference was drawn to the recommendations made by the European Parliament, and in the Crypto-Regulation Bill, 2018, as per which, a generalised or total ban of virtual currencies is not a favourable/ advisable approach. Rather, working and operation of virtual currencies should be brought within the scope of regulation- RegTech for FinTech. Hence, the Circular was adjudged to have failed the test of proportionality. While the Order of the Apex Court has set the stage free for VC and VCEs to flourish, we cannot turn a blind eye towards the lingering risk of consumer/ investor protection, anonymity, money laundering, as identified by RBI. It must be kept in mind that the Hon’ble SC rejected the RBI circular on the singular ground of proportionality, and as such does not rule out the presence of the risk that comes as a collateral of this Order. The author is of the view that with cryptocurrencies having been held valid, it is now time to introduce a sound regulatory framework for dealing with the same. Reviving from the quasi-ban that led to the shutting down of many companies acting as VCEs, a distinct legal set up shall be a pre-requisite for instilling confidence amongst investors as well as service providers. Section 3 (26) of General Clauses Act, 1897 provides that “Immovable property” shall include land, benefits to arise out of land, and things attached to the earth, or permanently fastened to anything attached to the earth.” Refer: General Clauses Act, 1987 Readers may also see:
<urn:uuid:46a7c3d6-5a1b-4523-b528-b7c599511a1b>
CC-MAIN-2020-16
http://vinodkothari.com/2020/03/supreme-court-order-on-cryptocurrencies/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371858664.82/warc/CC-MAIN-20200409122719-20200409153219-00234.warc.gz
en
0.95592
3,133
2.515625
3
People argue about carbs, fats, and everything in between. However, almost everyone agrees that protein is important. Eating plenty of protein has numerous benefits. The recommended daily intake (RDI) is 46 grams for women, and 56 grams for men (3). However, many health and fitness experts believe that we need much more than that. Here is a list of 20 delicious foods that are high in protein. Whole eggs are among the healthiest and most nutritious foods on the planet. They are loaded with vitamins, minerals, healthy fats, eye-protecting antioxidants and brain nutrients that most people don’t get enough of. Whole eggs are high in protein, but egg whites are almost pure protein. Protein content: 35% of calories in a whole egg. 1 large egg contains 6 grams of protein, with 78 calories (4). Almonds are a popular type of tree nut. They are loaded with important nutrients, including fiber, vitamin E, manganese and magnesium. Protein content: 13% of calories. 6 grams per 1 ounce (28 g) serving, with 161 calories (5). Other High-Protein Nuts Pistachios (13% of calories) and cashews (11% of calories). 3. Chicken Breast If you eat it without the skin, the majority of the calories in it come from protein. Chicken breast is also very easy to cook, and tastes delicious if you do it right. Protein content: 80% of calories. 1 roasted chicken breast without skin contains 53 grams, with only 284 calories (6). Oats are among the healthiest grains on the planet. They are loaded with healthy fibers, magnesium, manganese, thiamin (vitamin B1) and several other nutrients. Protein content: 15% of calories. Half a cup of raw oats contains 13 grams, with 303 calories (7). 5. Cottage Cheese It is loaded with calcium, phosphorus, selenium, vitamin B12, riboflavin (vitamin B2) and various other nutrients. Protein content: 59% of calories. A cup (226 g) of cottage cheese with 2% fat contains 27 grams of protein, with 194 calories (8). Other Types of Cheese That Are High in Protein Parmesan cheese (38% of calories), swiss cheese (30%), mozzarella (29%) and cheddar (26%). 6. Greek Yogurt Greek yogurt, also called strained yogurt, is a very thick type of yogurt. Protein content: Non-fat greek yogurt has protein at 48% of calories. One 170 gram (6 ounce) container has 17 grams of protein, with only 100 calories (9).It tastes delicious, has a creamy texture, and is high in many nutrients. Just make sure to choose one without added sugar. Full-fat Greek yogurt is also very high in protein, but contains more calories. Regular full-fat yogurt (24% of calories) and kefir (40%). Milk is highly nutritious, but the problem is that a huge percentage of the world’s adults are intolerant to it. However, if you tolerate milk and enjoy drinking it, then milk can be an excellent source of high-quality protein. Milk contains a little bit of almost every single nutrient needed by the human body. It is particularly high in calcium, phosphorus and riboflavin (vitamin B2). Protein content: 21% of calories. 1 cup of whole milk contains 8 grams of protein, with 149 calories (10). Broccoli is also loaded with various bioactive nutrients believed to help protect against cancer. Calorie for calorie, it is high in protein compared to most vegetables. Protein content: 20% of calories. 1 cup of chopped broccoli (96 grams) contains 3 grams of protein, with only 31 calories (11). 9. Lean Beef Lean beef is very high in protein, and also tastes delicious. It is loaded with highly bioavailable iron, vitamin B12 and numerous other nutrients. Protein content: 53% of calories. One 3 ounce (85 g) serving of cooked beef with 10% fat contains 22 grams of protein, with 184 calories (12). If you’re on a low-carb diet, feel free to eat fatty cuts of beef instead of lean beef. Tuna is a very popular type of fish. It is low in both fat and calories, so what we’re left with is mostly just protein. Like other fish, tuna is also very high in various nutrients and contains a decent amount of omega-3 fatty acids. Protein content: 94% of calories, in tuna canned in water. A cup (154) contains 39 grams of protein, with only 179 calories (13). It is high in many vitamins, minerals and fiber, and is loaded with antioxidants. Quinoa has numerous health benefits. 12. Whey Protein Supplements When you’re pressed for time and unable to cook, a whey protein supplement can come in handy. Protein content: Varies between brands, can go over 90% of calories, with 20-50 grams of protein per serving.Whey is a type of high-quality protein from dairy foods, shown to be very effective at building muscle mass, and may help with weight loss. Lentils are a type of legume. They are high in fiber, magnesium, potassium, iron, folate, copper, manganese and various other nutrients. Lentils are among the world’s best sources of plant-based protein, and are an excellent food for vegetarians. Protein content: 27% of calories. 1 cup (198 g) of boiled lentils contains 18 grams, with 230 calories (15). Other High-Protein Legumes 14. Ezekiel Bread Ezekiel bread is different from most other breads. It is made of organic and sprouted whole grains and legumes, including millet, barley, spelt, wheat, soybeans and lentils. Compared to most breads, ezekiel bread is very high in protein, fiber and various nutrients. Protein content: 20% of calories. 1 slice contains 4 grams, with 80 calories (16). 15. Pumpkin Seeds They are incredibly high in many nutrients, including iron, magnesium and zinc.Pumpkins contain edible seeds called pumpkin seeds. Protein content: 14% of calories. 1 ounce (28 g) contains 5 grams of protein, with 125 calories (17). Other High-Protein Seeds 16. Turkey Breast It consists mostly of protein, with very little fat and calories. It also tastes delicious.Turkey breast is similar to chicken breast in many ways. Protein content: 70% of calories. One 3 ounce (85 g) serving contains 24 grams, with 146 calories (18). 17. Fish (All Types) Fish is incredibly healthy, for various reasons. It is loaded with various important nutrients, and tends to be very high in heart-healthy omega-3 fatty acids. Shrimp is a type of seafood. It is low in calories, but loaded with various nutrients, including selenium and vitamin B12. Like fish, shrimp also contains plenty of omega-3 fatty acids. Protein content: 90% of calories. A 3 ounce (85 g) serving contains 18 grams, with only 84 calories (20). 19. Brussels Sprouts The Brussels sprout is another high-protein vegetable, related to broccoli. It is very high in fiber, vitamin C and other nutrients. Protein content: 17% of calories. Half a cup (78 g) contains 2 grams of protein, with 28 calories (21). Peanuts are incredibly delicious. They are high in protein, fiber, magnesium and many studies show that they can help you lose weight. Peanut butter is also high in protein, just make sure not to eat too much as it is quite “more-ish.” Protein content: 16% of calories. One ounce (28 g) contains 7 grams, with 159 calories (22). Take Home Message The importance of eating enough protein can not be overstated. It is the simplest, easiest and most delicious way to lose weight and have a better looking body. Period. Editors note: Click here to Find a Local Farmer FREE BOOK DOWNLOAD (Limited Offer) Do You Know Your Body’s Most Important Weight Loss Secret? By J. Davis III Tags: HEALING | HEALTHY FATS | REMEDIES Recently, Doctor of Naturopathy, weight-loss expert and best-selling Amazon author Liz Swann Miller, creator of the Red Smoothie Detox Factor, revealed 2 of the secrets to easy, steady weight loss. Secrets the big food corporations do their best to hide from us. Secret #1: Enjoy real food. Don’t fall for the lie that you have to deprive yourself to lose weight. Secret #2: stop eating out. You will automatically eat less without even noticing. Then start detoxing your body with tasty, nourishing smoothies that are just as easy on your wallet as they are easy to make. Because a single day of enjoying Liz’ smoothies demonstrated the radical power of her superfood-packed red smoothies to make me feel incredibly good. Now prepare yourself for one of the biggest weight loss secrets there is. A secret that, when you use it properly, can transform your body and your health. You probably know most of us eat too much processed food. What you may not know is that it’s full of toxic chemicals and substandard, dirt-cheap ingredients designed to make you eat more…and force you to gain weight. Here’s how it works... “That stuff is just a lot of calories your body can’t use,” Liz told me, “Some are poison. And all these foods are stripped of the anti-oxidants and anti-inflammatories that help your body detox. The result? Your body expends huge amounts of calories to eliminate some toxins—the rest, it stores in your fat to protect you. This is why most people are hungry all the time. They’re not getting energy they need.” “So… what’s going on with me? Why am I losing weight but not going hungry?” Liz paused, then dropped the bombshell. Your body is designed to burn fat. You just have to let it. “What? I thought we were designed to store fat?!?” We were Skyping and I was practically shouting. Then I heard Liz say… What good is a fat reserve if you can’t burn it? Liz continued: “You’re drinking smoothies packed with phytonutrients, anti-oxidants and anti-inflammatories that pull toxins out of you like a tractor beam. Allowing your body to burn those toxin-filled fat stores… and releasing tremendous amounts of stored energy.” So that’s why I’m losing weight without going hungry. Watch Liz’ free presentation. It’s packed with revolutionary weight loss information—information that works. Because it’s based on how nature works. Click the button below only if you want to wear smaller clothes, breathe easier, move more freely and just plain feel better. Because when you click here to watch Liz’ life-changing presentation, you’ll learn - Which calories help you lose weight…and which ones help you gain it… - The “diet” foods…some of them vegetables…that lead to weight gain and diabetes… - The “low-fat” foods that can dramatically increase your risk of cancer. - And the superfoods that rescue your body from this assault by detoxing you… Revitalizing your metabolism so you can Shed pounds as well as toxins, renew your body and reset your internal clock by up to 7 years. Because until now, the Red Smoothie Detox Factor has been available only to Liz’ private clients. But now that she’s perfected it to work for almost everyone, almost every time, Liz is sharing it with rest of us so we can feel better and look better. Get Red Smoothie Detox Factor before the price goes back up. Because Liz offers a ridiculously good guarantee. You have 60 days to decide you love the Red Smoothie Detox Factor. If you don’t love it—for any reason, or even no reason at all —Liz will refund your money. 100%. No questions asked. Natural Diabetes Treatment Works Better Than Prescription Drugs *PROOF* By Richard Neal Tags: HEALING | REMEDIES | PREVENTION According the latest statistics, diagnosed and undiagnosed diabetes in the United States is reaching epidemic levels: Total: 29.1 million people or 9.3% of the population have diabetes. Diagnosed: 21.0 million people. Undiagnosed: 8.1 million people (27.8% of people with diabetes are undiagnosed). Source: CDC Website Drugs Treat Symptoms, Not Disease Pharmaceutical companies have been trying to shut these doctors down simply for revealing the truth about diabetes. Scientific studies have proven that type 2 diabetes can be reversed naturally - but this information has been hidden and suppressed for decades. Diabetics can normalize blood sugar, and be taken off all medication and insulin injections completely naturally. Doctors at the International Council for Truth in Medicine are revealing the truth about diabetes in a shocking new online presentation. In 3 Weeks, 71% Type 2 Diabetics Were Taken off ALL Medication 96% of patients were able to stop all insulin injections and 81% achieved complete relief of painful neuropathy. Groundbreaking research published by the University of Kentucky, University of California and Newscastle University prove that type 2 diabetes CAN be reversed. Blood sugar normalizes... neuropathy pain goes away... Doctors at the International Council for Truth in Medicine have perfected these techniques and helped tens of thousands of their patients end the need for medication and insulin injections 100% naturally. You don't have to suffer anymore, Learn the truth about your diabetes and stop this disease dead in its tracks right now. Groundbreaking New Research Doctors at the International Council for Truth in Medicine are revealing the truth about diabetes that has been suppressed for over 21 years. Last year they helped over 17,542 type 2 diabetics end the need for prescription drugs, insulin injections and blood sugar monitoring. This year they're on track to help over 30,000. In just a few weeks, 96% of their patients are able to stop ALL diabetes medication and insulin injections. No more neuropathy pain, pricking your finger, or the need for expensive medication. Learn about this groundbreaking new research here: #1 muscle that eliminates joint and back pain, anxiety and looking fat By J. Davis III Tags: HEALING | PREVENTION I bet you can’t guess which muscle in your body is the #1 muscle that eliminates joint and back pain, anxiety and looking fat. This “hidden survival muscle” in your body will boost your energy levels, immune system, sexual function, strength and athletic performance when unlocked. If this “hidden” most powerful primal muscle is healthy, we are healthy. d) Hip Flexors Take the quiz above and see if you got the correct answer! P.S. Make sure you check out the next page to get to know the 10 simple moves that will bring vitality back into your life! ==> Click here to discover which “hidden survival muscle” will help you boost your energy levels, immune system, sexual function, strength and athletic performance permanently! More Health Resources: - "Red" Smoothie Helps Alabama Girl Shed 80lbs! - Thе Fastest Wау Tо Lose Weight In 4 Weeks - #1 muscle that eliminates joint and back pain, anxiety and looking fat - Your Birth Date + Name - Free Report - The "Instant Switch" Law Of Attraction - The 3 reasons you should NEVER eat wheat -- Yes, even "whole wheat" - [PROOF] Reverse Diabetes with a “Pancreas Jumpstart” - Why Some People LOOK Fat that Aren't - Diabetes Destroyer System - His wife REFUSED to let them amputate his legs! - Unlock Your Hip Flexors - Doctors Reversed Diabetes in Three Weeks
<urn:uuid:27a67a5d-ba88-49fd-90ea-b43f2175ba1d>
CC-MAIN-2020-16
http://eatlocalgrown.com/index.php?option=com_content&view=article&id=14285:delicious-high-protein-foods&catid=35:articles&Itemid=148
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370519111.47/warc/CC-MAIN-20200404011558-20200404041558-00194.warc.gz
en
0.917382
3,542
2.703125
3
Importance of Water Quality to NAE Production Water has always been the most critical, but also the most neglected, nutrient in terms of flock performance in the poultry industry. For many years, as long as water was available, we really didn’t worry much about what was in it, how it might be affecting the health of our flocks, or even whether it was a safe drinking water supply. We drilled our wells, plumbed everything in, hooked it all up, and voilà—water for our chickens. We didn’t think about it after that. However, “no antibiotics ever” (NAE) programs are changing our thought processes. NAE programs are forcing us to realize that the quality of poultry drinking water is much more important than we previously realized. Most integrators today are growing at least some percentage of their birds under the NAE banner without the use of antibiotics. How is that affecting the way we look at the water quality of our flocks? NAE Changes Everything In the new NAE world where many integrators and growers work today, the absence of antibiotics has revealed several underlying issues. Many of these issues have likely been present for some time but were being masked by antibiotic use and were either unknown or thought to be unimportant. Several ways that underlying issues with water can affect our flocks include: - Disease issues flock after flock - Poor flock performance (low weight gain; high feed conversion ratios) - Enteric issues (feed passage, gut sloughing, loose droppings) - Low water consumption - High mortality Were antibiotics our “fix” for poor water quality? Did we medicate our way out of poor water quality in the past? On many poultry farms today, the answer to these questions is most likely yes. You may wonder, “What does removal of antibiotics at the hatchery and in the feed have to do with my well water? It’s the same water I’ve always used.” The answer is, “More than you might think.” Antibiotics at the hatchery and in the feed have been a powerful tool to help protect flock health for many years. However, mounting consumer concern regarding antibiotic resistance and increasing demands for chicken raised without antibiotics are changing the poultry production landscape. As a result, there is a flood of new products coming on the market with hopes of filling up that empty space. In addition, integrators and growers are searching for additives/supplements that can enhance bird performance and recapture some of what was lost with the removal of antibiotics. The drinker system is often the easiest delivery method for many of these supplements. Consequently, we are seeing a tremendous increase in water line issues. NAE production is changing the way chickens are grown. It’s as big a change as going from curtain-sided, naturally ventilated houses to solid-walled, tunnel-ventilated houses. We have to rethink everything and learn how to grow chickens all over again. NAE programs are not very forgiving and do not allow mistakes without paying the consequences. NAE production is still fairly new for many integrators and growers, and it’s still a learning process. Because it’s new, we don’t yet have all the answers. Not every new thing that comes along is going to work. Some new things fail. It’s a fact of life and we are still learning what to keep and what to toss in order to make NAE work. Good growers want to do what is best for their birds and are open to trying new things. However, don’t overdo it. Try one new thing at a time. That’s all you can possibly hope to manage at once. If you try two or three new things on the same flock and something works, you won’t be able to determine which one worked and which ones didn’t. Or, if you try two or three new things at once and nothing happens, could it be that none of them work, or could it be that all of them work well individually but not in combination? You can only successfully track one thing at a time, so don’t get carried away. Again, growers are trying a multitude of supplements, including essential oils, probiotics, prebiotics, vitamins, minerals, electrolytes, and organic acids, to take the place of antibiotics. Even though many of these supplements have shown promise in terms of flock health programs, there is a down side to running them through the water system. For example, probiotics are live bacterial microorganisms intended to provide health benefits, but adding them to the water line is a bad idea. Granted, these are good bacteria, but all bacteria can clog your drinker system. Prebiotics are carbohydrates or plant-source nutrients used to enhance growth of bacteria in the gut. However, when given in the water, prebiotics will enhance bacterial growth in your water lines, as well. Many companies are using essential oils as a natural alternative to antibiotics. There are hundreds of essential oils and combinations of essential oils being tested and used in the poultry industry today. While their performance may vary from location to location or flock to flock, one thing is always true: they are all slimy, sticky oils and, if delivered through the water system, are some of the most difficult supplements to remove. If essential oils are given through the water system, you must have a thorough water line cleaning program between flocks. Vitamins, minerals, and electrolytes are often given to encourage and improve bird health. However, these products also improve bacterial health in the water lines and worsen clogging. First, there is no such thing as pure drinking water. There is always something in the water, and it’s important to know what it is. If you don’t know what’s in the water your birds are drinking, have it tested and find out. You can’t fix something until you know it’s broken. Your poultry drinking water has a mineral profile that may or may not be harmful to your chickens. Minerals occur naturally in most water sources and are necessary nutrients for life. However, particular minerals can affect bird health and water line performance. Minerals are often overlooked, but they can have a huge effect on many areas of water quality. For example, iron itself does not necessarily cause bird health issues, but it can be a source of food for bacteria—particularly E. coli. In addition, most iron-reducing bacteria produce slime that can build up in pressure regulators, reducing screens, filters, pressure tanks, water lines, and nipple drinkers. Sulfur can be yellow (natural color) or black (indicates breakdown by bacteria; look for precipitate in the water filter canister) in the water. It can damage a bird’s intestines, causing “flushing,” feed passage, and a lack of nutrient absorption. Bacteria break sulfur down, creating hydrogen sulfide gas. Hydrogen sulfide gas is extremely corrosive. This can happen in the well, in the water lines, or in the bird. Iron and sulfur both support bacteria that thrive as the water gets warmer. In addition, the less disturbed the water environment is, the more established the bacterial population becomes. The first few weeks of the flock, when the chicks are small and the water is at its slowest and warmest, are the most critical. Monitor 7-day mortality and weight gain. Birds behind on weight at 7 days will never catch up later in the flock. Other minerals that can affect performance include: - Sodium + chloride: flushing and diarrhea - Nickel: damage to heart and liver - Lead: developmental issues; long-term performance loss in broiler breeders - Arsenic: carcinogen; developmental issues - Magnesium: laxative effect; feed passage - Zinc: astringent taste Zinc is likely in the coating on the sheet iron of the chicken house to prevent rusting. How close is your well to the side of the chicken house? Is there a possibility that rainwater off the roof can move down the wellhead and reach the aquifer, particularly if the aquifer is shallow—let’s say 150 feet or less? If minerals (particularly Ca and Mg) are an issue in poultry drinking water supplies, it is important to descale water lines once per year. Use an acidic solution that will get the pH in the water line to 5 or below to dissolve scale. Allow it to sit for 24 hours, then flush all lines thoroughly with fresh water, and trigger the drinkers. A note about acids: Growers use acids for a variety of different issues on the farm, including: - “Tightening up the gut” - Improving feed/water intake during a feed change - Lowering the pH of the water - Descaling the water lines However, long-term use of acids with no water treatment program promotes the growth of acid-loving algae, fungus, molds, and yeasts. It is critical to follow acid use with some type of water treatment program. If necessary, consider installing or increasing filtration of the incoming water supply (cotton, carbon, sand, or media filters; or reverse osmosis, which is expensive). Also, depending on the condition of your water source, consider a daily water treatment program with hydrogen peroxide or chlorine. Second, poultry houses (Figure 1) can grow other things besides chickens, particularly inside the water lines, such as: - E. coli - enteric bacteria Algae and fungi can build up in the drinker lines and restrict the flow of water and clog the nipples. Bacteria can make the flock sick. Bacteria in the water line can come from a variety of sources in the chicken house, including: - Disturbed litter - Ventilation system - The chickens themselves - Other living creatures in the environment (litter beetles, flies, rodents, etc.) - The previous flock With the focus on removal of antibiotics, additive/supplement use has increased as integrators and growers look to solve health and management issues in other ways. As a grower, do not run any additive/supplement on your flock without first clearing its use with your service technician. The key to the successful use of any additive/supplement is to make sure water lines are clean before, during, and after its use. Understand the products you are using: What are they? Why are they being used? Are they really needed? What are potential side effects for the birds or to the drinker system? Water Treatment Options The two most common water treatment options are chlorine and hydrogen peroxide. Understanding the various forms of chlorine is important: - Liquid chlorine: Often misused because of the pH issue. If pH of the water is too low (<6.0), chlorine will escape as a gas, decreasing effectiveness and increasing equipment corrosion. If pH is too high (>8.5), the amount of hypochlorous acid formed will be greatly reduced, and the water will not be disinfected. - Chlorine dioxide: More effective than liquid chlorine but requires mixing time and special handling. - Gas chlorine: Most effective, but chlorine gas is dangerous and requires special handling. If liquid chlorine is used, be aware that it can damage rubber components of the drinker system, particularly the rubber seals on nipple drinkers. Try to maintain a chlorine level of around 3 ppm at the end of the drinker line. Also, bacteria can build a resistance to liquid chlorine products over time. If you determine that chlorine is not doing as good a job as it used to, switch to an alternative product (i.e., hydrogen peroxide) for a couple of flocks to correct the problem. Hydrogen peroxide products are on the market in several different percentage strengths, ranging from 20 percent to 50 percent. Check with your service technician to find out what is recommended by your integrator. Certain products have additives that significantly enhance the active stability of hydrogen peroxide. In most cases, generic, technical-grade, and most food-grade hydrogen peroxides do not contain these added ingredients and may not be as effective. One thing NAE production is teaching us is that we must be proactive, rather than reactive, with water treatment programs. However, understand that simpler is often better. If you don’t need to run something through your water system, don’t do it. Safe, clean water (minus any additives/supplements) is often the best drinking water for the birds. Also be aware that any program that provides clean, safe water is actually two programs: - A set, specific method for cleaning water lines when the houses are empty. - A set, specific method for treating water when there are birds on the farm. Water quality on poultry farms has been taken for granted for far too long. NAE production is focusing increased attention on drinking water quality on many poultry farms today. A water sample analysis is a necessity in today’s NAE environment. We must know what’s in the water our chickens are drinking and what we can do to help our birds perform at their best. Pay particular attention to mineral content, bacterial load, and pH. At a minimum, thoroughly clean water lines between flocks, and have a treatment program in place with birds on the farm that will ensure a clean, safe water supply for them. Ask yourself this question: “Would I drink the water my chickens are drinking?” If not, you’ve got work to do. Publication 3400 (POD-11-19) By Tom Tabler, Extension Professor, Poultry Science; Yi Liang, Associate Professor, Biological and Agricultural Engineering, University of Arkansas; Jonathan Moon, Poultry Operation Coordinator, Poultry Science; and Jessica Wells, Assistant Clinical/Extension Professor, Poultry Science. Copyright 2019 by Mississippi State University. All rights reserved. This publication may be copied and distributed without alteration for nonprofit educational purposes provided that credit is given to the Mississippi State University Extension Service. Produced by Agricultural Communications. Mississippi State University is an equal opportunity institution. Discrimination in university employment, programs, or activities based on race, color, ethnicity, sex, pregnancy, religion, national origin, disability, age, sexual orientation, genetic information, status as a U.S. veteran, or any other status protected by applicable law is prohibited. Questions about equal opportunity programs or compliance should be directed to the Office of Compliance and Integrity, 56 Morgan Avenue, P.O. 6044, Mississippi State, MS 39762, (662) 325-5839. Extension Service of Mississippi State University, cooperating with U.S. Department of Agriculture. Published in furtherance of Acts of Congress, May 8 and June 30, 1914. GARY B. JACKSON, Director The Mississippi State University Extension Service is working to ensure all web content is accessible to all users. If you need assistance accessing any of our content, please email the webteam or call 662-325-2262.
<urn:uuid:443e9609-6805-4b33-8d89-92194391dac7>
CC-MAIN-2020-16
https://msucares.com/publications/importance-water-quality-nae-production
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505826.39/warc/CC-MAIN-20200401161832-20200401191832-00274.warc.gz
en
0.943406
3,153
2.9375
3
Seneca is controversial even within Stoic circles, because of his association with the emperor Nero, which has been marred by alleged complicity in some of Nero’s most egregious crimes, chiefly the murder of his mother, Agrippina. As I have written in the past, Seneca was no Sage, and indeed he himself pointed that out several times, but that shouldn’t diminish his stature as a Stoic writer. Indeed, he is by far the ancient Stoic from whom we have most extant writings, which constitute an invaluable resource for Stoic practitioners and anyone else interested in Roman culture and philosophy. Still, it is also important to inquire as much as the historical record makes it possible into what roles Seneca played during Nero’s reign, something that is explored in two recent biographies of the philosopher (Dying Every Day, by James Romm; and The Greatest Empire, by Emily Wilson. Check out also the earlier, and more sympathetic, The Stoic, by Francis Caldwell Holland.) In this essay I will highlight portions of Seneca’s On Clemency, which he wrote in 55-56 CE and addressed to the young emperor, in order to influence the tone of the latter’s principate from the beginning. On Clemency is basically a study contrasting the good ruler with the tyrant, aiming to encourage Nero to practice virtue as the mark of an enlightened sovereign. Before we get started, it may be helpful to recall the major events in the Seneca-Nero timeline: 54 CE: Nero ascends to the throne after the death of Claudius, who was possibly poisoned by Agrippina. 55 CE: poisoning of Britannicus (son of Claudius and the empress Messalina), almost certainly on Nero’s order; the death eliminates a possible future competitor for Nero, and was probably triggered by Agrippina’s threat to him to switch her allegiance to Britannicus. 55 CE: Seneca is accused of having sex with Agrippina but is acquitted; as a result, though, his influence on Nero is reduced (Burrus, the commander of the Praetorian Guard, and an ally of Seneca who helped control Nero, is also accused of conspiracy, but acquitted). 58 CE: murder of Agrippina on Nero’s orders, possibly in response to her participation in a conspiracy, certainly because of her repeated attempts to assert influence and power. 55-60 CE: Nero was consul four times in this period, and several ancient historians — as well as the emperor Trajan — speak well of his principate at this point, in contrast with his later rule. And now, on to On Clemency. It begins with Seneca openly stating the purpose of the treatise: “I have determined to write a book upon clemency, Nero Caesar, in order that I may as it were serve as a mirror to you, and let you see yourself … it is worth your while to consider and investigate a good conscience from every point of view, and afterwards to cast your eyes upon this enormous mass of mankind — quarrelsome, factious, and passionate as they are.” (I.1) Shortly afterwards, Seneca both flatters Nero and subtly reminds him of his good character, lest should he forget it now that he is in power: “The Roman people were in a state of great hazard as long as it was uncertain how your generous disposition would turn out; now, however, the prayers of the community are sure of an answer, for there is no fear that you should suddenly forget your own character.” (I.1) The second section of the first book then explains what clemency is, and why it is a good thing to practice: “There are some who imagine that clemency only saves the life of every villain, because clemency is useless except after conviction, and alone of all the virtues has no function among the innocent. …[yet] clemency not only succours the innocent, but often the virtuous, since in the course of time it happens that men are punished for actions which deserve praise.” (I.2) That said, clemency cannot be handed out indiscriminately, but only if there is hope to reform the person who receives it: “It is not right to pardon indiscriminately … we must therefore take care to distinguish those characters which admit of reform from those which are hopelessly depraved.” (I.2) While clemency is something that not just the emperor should practice, it “becomes no one more than a king or a prince; for great power is glorious and admirable only when it is beneficent; since to be powerful only for mischief is the power of a pestilence.” (I.3) Indeed, in the same section Seneca reminds Nero that the people are willing to subject themselves to great sacrifices, for instance in war, if they can expect their sovereign to be just. This appears to me to be another not so subtle warning to Nero, with several others scattered throughout the text. Seneca introduces a metaphor of the head of state as the “soul” to the “body” represented by the people, from which he derives this: “if, as we may infer from what has been said, you are the soul of the state, and the state is your body, you will perceive, I imagine, how necessary clemency is; for when you appear to spare another, you are really sparing yourself.” (I.5) Clemency, that is, happens to be in the interest of the ruler himself. Another warning comes at I.7: “A cruel reign is disordered and hidden in darkness, and while all shake with terror at the sudden explosions, not even he who caused all this disturbance escapes unharmed.” Here, “he who caused all this disturbance” is none other than the emperor himself, of course. And again at I.8: “the safety of kings on the other hand is more surely founded on kindness, because frequent punishment may crush the hatred of a few, but excites that of all.” From there Seneca begins to talk about Octavian Augustus as a model of benign sovereign, one that Nero would do well to take to heart and follow. And after the carrot comes the stick: “Clemency, then, makes princes safer as well as more respected, and is a glory to empires besides being their most trustworthy means of preservation. … What is the difference between the tyrant and the king — for their outward symbols of authority and their powers are the same — except it be that tyrants take delight in cruelty, whereas kings are only cruel for good reasons and because they cannot help it.” (I.11) And just in case Nero didn’t get the message: “No courage is so great as that which is born of utter desperation. In order to keep people down by terror, you must grant them a certain amount of security, and let them see that they have far more to hope for than to fear: for otherwise, if a man is in equal peril whether he sits still or takes action, he will feel actual pleasure in risking his life, and will fling it away as lightly as though it were not his own.” (I.12) Two more along the same lines: “Cruel punishments do a king no honour: for who doubts that he is able to inflict them? But, on the other hand, it does him great honour to restrain his powers, to save many from the wrath of others, and sacrifice no one to his own.” (I.17) And: “There is no more noble spectacle than that of a sovereign who has received an injury without avenging it.” (I.20) Why shouldn’t a sovereign effect vengeance on his enemies? Seneca explains at I.21: “Vengeance effects two purposes: it either affords compensation to the person to whom the wrong was done, or it ensures him against molestation for the future. A prince is too rich to need compensation, and his power is too evident for him to require to gain a reputation for power by causing anyone to suffer.” At I.22 the philosopher reminds Nero what the purpose of punishment actually is: “Let us now pass on to the consideration of wrongs done to others, in avenging which the law has aimed at three ends, which the prince will do well to aim at also: they are, either that it may correct him whom it punishes, or that his punishment may render other men better, or that, by bad men being put out of the way, the rest may live without fear.” Nowhere there there is room for personal vengeance by the emperor, or for cruelty towards his enemies. Indeed, cruelty is a disease: “This accursed disease of the mind reaches its highest pitch of madness when cruelty itself turns into pleasure, and the act of killing a man becomes enjoyment. Such a ruler is soon cast down from his throne; his life is attempted by poison one day and by the sword the next; he is exposed to as many dangers as there are men to whom he is dangerous.” (I.25) Seneca then turns almost prophetical: “Sometimes their own guards have risen in revolt, and have used against their master all the deceit, disloyalty, and ferocity which they have learned from him. What, indeed, can he expect from those whom he has taught to be wicked?” (I.26) The young emperor is treated to a discussion of mercy, which Seneca says is the virtue that is opposite to the vice of cruelty: “Mercy is a restraining of the mind from vengeance when it is in its power to avenge itself, or it is gentleness shown by a powerful man in fixing the punishment of a weaker one.” (II.3) Interestingly, he tells Nero that if there is a danger of erring on one side or the other, then it is better to err by being too merciful, even though that too is a mistake: “Lest under the name of strictness we be led into cruelty, and under the name of mercy into pity. It is less dangerous to make the latter mistake, but both lead us equally far away from the truth.” (II.4) Seneca also explicitly defends the Stoic philosophy. After stating that some think of it as too strict to be practiced, he says instead that “no school of philosophy is more gentle and benignant, none is more full of love towards man or more anxious to promote the happiness of all, seeing that its maxims are, to be of service and assistance to others, and to consult the interests of each and all, not of itself, alone.” (II.5) Finally, at II.6 we find more defense of Stoicism, with the implicit suggestion that Nero should regard the practice as an inspiration for his own conduct: “Thus the wise man will not pity men, but will help them and be of service to them, seeing that he is born to be a help to all men and a public benefit, of which he will bestow a share upon every one. … Whenever he is able he will interpose between Fortune and her victims: for what better employment can he find for his wealth or his strength than in setting up again what chance has overthrown?” All of the above seems to me to reinforce the idea commonly held by historians that Seneca did try (and succeeded, with the help of Burrus, for about five years) to guide Nero and reign in what must have been even then clear signs of his unstable character. Even Seneca’s speech to justify Agrippina’s murder may be seen as the last attempt at managing a situation that was rapidly getting out of control. (And let’s not forget that Agrippina did conspire against Nero, repeatedly. She was no innocent soul caught in the storm, and likely had in fact murdered her husband, Claudius.) Very soon Seneca will begin to ask Nero to be allowed to retire, a privilege he will be denied on a number of occasions. The philosopher eventually managed to spend more and more time in one of his villas outside of Rome, where he was however reached by Nero’s emissaries and ordered to commit suicide for having allegedly taken part in the failed Pisonian conspiracy. As I said before, most certainly not a Sage, but a complicated and fascinating man.
<urn:uuid:9ce13cd6-2a88-4927-8ff9-0ffa2bb64e76>
CC-MAIN-2020-16
https://howtobeastoic.wordpress.com/2017/04/06/seneca-to-nero-on-clemency/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371624083.66/warc/CC-MAIN-20200406102322-20200406132822-00113.warc.gz
en
0.978833
2,645
2.796875
3
Australia has just been through its worst fire season with respect to areas burnt and although we had 34 deaths (including a number of firefighters) it could have been worse considering the size and length of the fire season. I see the relatively small death toll as a mark of pride for the Australian fire services. However, the size, intensity and disruption to the community is something not seen before in Australia. This article is being penned in late February in order to meet the publication deadline for the April edition. There may be further fires this season. Nevertheless, I hope to give you a sense of what occurred in these large, unprecedented and protracted fires. The usual fire season moves down from the tropics in northern Australia, starting in October and burning with low intensity through the wet tropics. Then the fires move down the western and eastern sides of Australia. I will concentrate on the east coast of Australia at this point because this is where the main fires occurred, and Australia’s main population density is located. One of the factors leading into this fire season is a drought across most of Australia, it has been dry in Australia for two to three years depending on where you live. These particular fires really started in 2017 when drought reduced the moisture content of the land and undergrowth significantly, the pre-fire conditioning of the Australian Bush extended to the rainforests and this lack of rain (which in the past contained fires) resulted in fires going unimpeded. These fires created huge damage across all states and territories in Australia: 34 people were killed, 2,779 homes were destroyed and 19 million hectares of forest and 1 billion animals have been destroyed in these fires from the driest ever 2018/19 drought to this year’s raging fires. The first thing we should recognize is that we were warned. The Garnaut Climate Change Review of 2008 stated, ‘recent projections of fire weather suggest that fire seasons will start earlier, end slightly later, and generally be more intense. This effect increases over time but should be directly observable by 2020’. (Professor Ross Garnaut, is a distinguished professor of economics at the Australian National University and both a vice-chancellor’s fellow and professorial fellow of economics at the University of Melbourne.) To describe emerging fire trends, a study by Dr Chris Lucas and others defined two new fire weather categories: ‘very extreme’ and ‘catastrophic’. The analysis by the Bushfire and Natural Hazards Cooperative Research Centre (CRC), the Australian Bureau of Meteorology (BoM) and CSIRO Marine and Atmospheric Research (as it was then) found that the number of ‘very high’ fire danger days generally increases 2–13% by 2020 for the lower estimates and 10–30% for the higher estimates. The number of ‘extreme’ fire danger days generally increases 5–25% by 2020 for the lower estimates and 15–65% for the higher estimates. In April 2019 a group of former Australian fire-service chiefs warned that Australia was not prepared for the upcoming fire season. They called on the Prime Minister to meet the former emergency service leaders ‘who will outline, unconstrained by their former employers, how climate change risks are rapidly escalating’. In August 2019 the Bushfire and Natural Hazards CRC published a seasonal outlook report which advised of ‘above normal fire potential’ for southern and southeast Queensland, the east coast areas of New South Wales and Victoria, parts of Western Australia and South Australia. In December 2019, the Bushfire and Natural Hazards CRC updated their advice of ‘above normal fire potential’. I have only quoted a few, but there were others sending a clear warning that 2019/20 will be a bad year. In September 2019 the BoM predicted at least three more months of drought as fires began in the north. September, October and November ended up being the driest spring on record. October was the official beginning of the Australian Fire season, but well before that Queensland was experiencing abnormal fire conditions. On 7 September 2019 multiple out-of-control blazes threatened townships across south-eastern and northern Queensland, destroying 19 homes. A large fire impacted the Peregian Beach area on the Sunshine Coast, on 9 September, severely damaging ten houses. In December 2019 Peregian Springs and the surrounding areas came under threat from bushfires for the second time in a couple of months. These fires were to continue across the state until mid-December. On 13 November a water-bombing helicopter crashed while fighting the blazes threatening the small community of Pechey. While the Bell 214 helicopter was completely destroyed, the pilot walked away with minor injuries One of the incredible features of the Queensland fires was the burning of rainforest, an ecosystem that does not see fire regularly and finds it hard to recover from burning. These Queensland fires also saw the beginning of resource sharing across state boundaries. Many interstate volunteer firefighters assisted the tired Qld volunteers get through their horrendous start to Australian fire season. It should be pointed out that no sooner will the Qld fires finish than the northern cyclone season will begin, adding a burden to already tired volunteers. New South Wales (NSW) The State that took the brunt of this year’s extraordinary fire season was NSW. The NSW statutory Bush Fire Danger Period normally begins on 1 October and continues through until 31 March. In 2019–20, the fire season started early with drought affecting 95% of the state. Twelve local government areas started the Bush Fire Danger Period two months early, on 1 August 2019, and nine more started on 17 August 2019. While Qld was coping with its fires the NSW fire season started with the first fire reported in July 2019, and as of 28 January 2020 this peat fire was still burning in a controlled manner, having been contained within a 592-hectare area near the Port Macquarie Airport. From that July start, fires, mainly caused by dry lightning, continued causing death and destruction across the state. There are too many to list them all, but I will highlight some. A large fire in November at Gospers Mountain in the Wollemi National Park burnt over 496,976 ha and threatened homes in the Hawkesbury and Lithgow areas. The fire burned towards the Central Coast and potentially threatened properties in Wisemans Ferry and other townships. By 27 December 2019, the Gospers Mountain fire had grown to 512,000 ha, making it the biggest forest fire in Australian history. On 10 February 2020, NSW Rural Fire Service announced that the past week’s torrential rain event had extinguished the Gospers Mountain fire, which had burnt for over four months. The fires around Sydney highlighted what the NSW regional centres had been living with for months. - Because of bushfires occurring in the surrounding regions, the Sydney metropolitan area suffered from dangerous smoke haze for several days throughout December and January, with the air quality being 11 times the hazardous level on some days, making it even worse than New Delhi’s. It was also compared to ‘smoking 32 cigarettes’ by Associate Professor Brian Oliver, a respiratory diseases scientist at the University of Technology Sydney. - During the fire crises residents continually monitored the ABC, Australia’s emergency broadcaster. They needed continual updates on which to make their decision to stay or evacuate. The three main sources of information were, TV, radio and the ‘fires near me’ app. Although all technologies were used heavily across the state, with an exceptional ability to give up-to-date information, the most reliable source was the old-fashioned radio. - Heat stress not only played a part in the rapid exhaustion of firefighters, Sydney Siders suffered through incredible heat. On 4 January 2020, Sydney’s western suburb Penrith recorded its hottest day on record at 48.9°C (120.0°F) making it the hottest place on earth at the time. In the snowy mountains, a fire known as the Dunns road fire was ignited from lightning on 28 December. Residents and visitors to the Kosciuszko National Park were evacuated and the park was closed. However, this fire grew and by 11 January three fires had merged – the Dunns Road fire, the East Ournie Creek fire and the Riverina’s Green Valley fire – and had created a 600,000-hectare (1,482,632-acre) ‘mega-fire’, one of a number of mega-fires created by the coming together of large fires. This fire also took the lives of three American air crew when on 23 January their Lockheed C-130 Hercules large air tanker crashed near Cooma while waterbombing a blaze. The Victorian fires commenced like many others from lightning strikes in east Gippsland on 21 November. The heat was so extreme in December that a two-day cricket tour match between a Victoria XI and New Zealand in Melbourne was cancelled due to the extreme conditions. At the end of 2019 there were three active fires in East Gippsland with a combined area of more than 130,000 hectares. Fires reached the popular holiday town of Mallacoota on New Year’s Eve. Despite the recommendation that large portions of East Gippsland be evacuated, approximately 30,000 holiday makers chose to remain in the region. Approximately 4,000 people, including 3,000 tourists, remained in Mallacoota as the fire began making its closest approach to the town, cutting off roads in the process. The management of the fire was compounded by having to manage thousands of trapped holiday makers. On 3 January, with food in short supply, approximately 1,160 people from Mallacoota were evacuated on naval vessels HMAS Choules and MV Sycamore. On 6 January 2020, bushfires had burnt through 1.2 million hectares (3 million acres) in Victoria’s east and north-east and 200 homes were confirmed lost; by 23 January there were 12 fires still burning. Heavy rain in the Melbourne region brought little relief to bushfire-affected regions. The rains could bring new dangers for firefighters, including landslides and falling trees. Not wishing to play down the fires in other states, the enormity of this year’s fire season has made it difficult to do justice to all. Tasmania’s bushfires commenced in late October and continued to burn in late January; 36,000 hectares were burnt out in total. In Western Australia 2,200,000 hectares of bush were burnt. Luckily much was in isolated areas, but on 13 December increased temperatures resulted in fires burning in excess of 5,000 hectares, with the fire front over 1.5km in length. In December fires in the region around Norseman blocked access to the Eyre Highway and the Nullarbor. This caused the highways of the region to be blocked, isolating the west, so as to prevent any recurrence of the 2007 death of truck drivers on the Great Eastern Highway. South Australia had 490,00 hectares destroyed, three fatalities and 151 homes engulfed in fire. On 20 December fires took hold in the Adelaide Hills. The fires killed one person and more than 70 houses were destroyed, as well as over 400 outbuildings and 200 cars. One of the South Australian Country Fire Service’s main problems was a fire on Kangaroo island in the Flinders Chase National Park, where a fire started in early January and engulfed one-third of the popular tourist island (170,000 hectares). The island is 150km long and 90km wide with a population of approximately 4,000 residents. This fire also destroyed critical wildlife habitat, which is the island’s main tourist attraction. Unfortunately, two people died in this fire. The Australian Capital Territory (ACT) was not spared this season; fires in NSW cut the main links between Canberra and Sydney as well as creating smoke pollution over Canberra. On New Year’s Day the air quality in the capital was the worst of any city in the world, at around 23 times the threshold to be considered hazardous. Fires in the ACT burnt out 56,700 hectares and resulted in one fatality. The Northern Territory went through a relatively average annual bushfire season with respect to area of land burnt, in comparison to the scale of bushfires experienced in other areas of Australia. Despite this, approximately 6.8 million hectares were burnt, an area which contributed significantly to the total area burnt by bushfires in the nation. Five homes were lost to bushfires in the Territory This was a truly national event with a truly national response, and the mixing of uniforms from all over Australia resulted in those with the most needs getting the resources no matter what agency they belonged to. These fires took on a life of their own internationally. Through the coordination of the Australasian Fire and Emergency Service Authorities Council (AFAC), 12 countries provided much-needed assistance to the exhausted Australian firefighters. The countries were Canada, USA, New Zealand, France, Fiji, Japan, Malaysia, Singapore, Papua New Guinea, The Philippines, United Arab Emirates and Indonesia. Many other nations offered assistance. These fires started in August and are in some cases still being extinguished in late February. They utilized the following resources at the height of the season 3,000 firefighters, 1,500 trucks, 1,000 support staff, 143 aircraft including, but not limited to, very large air tankers, large air tankers, heavy rotary, medium rotary, air tractors and support aircraft. This is without including the military support, which was invaluable to the fire effort. There are three main issues to address here: - Smoke: most of the east-coast population woke every day to the smell of smoke and on many occasions major and provincial cities had a smoke haze that became the worst recorded in the world. There is still much to be studied on the effects of smoke, but some predictions are that more people died as a result of the smoke pollution than as a direct result of the fires. In the smoke released as of 2 January 2020, NASA estimated that 306 million tonnes of CO2 had been emitted. While the carbon emitted by the fires would normally be reabsorbed by forest regrowth, this would take decades and might not happen at all if prolonged drought has damaged the ability of forests to fully regrow. - Animals: it was estimated on 8 January 2020 that more than one billion wild animals were killed by bushfires in Australia, along with thousands of heads of stock in the farming community. These figures did not include frogs, insects, or other invertebrates. Ecologists feared some endangered species could be driven to extinction by the fires. On Kangaroo Island, a large part of the island is designated as a protected area for animals such as sea lions, penguins, kangaroos, koalas, pygmy possums and various birds including glossy black cockatoos. NASA estimated that the number of dead koalas could be as high as 25,000 or about half the total population of the species on the island. - Water: most of these fires had direct and/or indirect interaction with the domestic water supply. After years of drought, all the water supplies were well below their danger levels. The best-case scenario was for strong summer rains in the catchment area to improve the dam level. The worst-case scenario has now come to fruition with heavy rain in mid-February washing debris and soot from the catchments into the dams. With the dams commencing at a very low level the normal process of dilution is not an option; authorities are monitoring the situation. In finishing I would like to pay tribute to the agency leaders; leading through a disaster like this is not an easy task. You must manage the disaster, politics, media and public while having long days and being ready for the inevitable issue coming out of left field. I would like to commend Commissioner Shane Fitzsimons NSW, acting Commissioner Mike Wassing Qld and Commissioner Andrew Crisp Vic. I also acknowledge the political support from the premiers of these states: Gladys Berejiklan NSW, Annastacia Palaszczuk Qld and Daniel Andrews Vic These fires were horrendous, unprecedented, unparalleled, extraordinary and whatever other adjective you care to use. Australia is not the only country in the world susceptible to wildfire. Unfortunately, with the globe’s temperature slowly increasing, this will become the norm until we get our climate back to an acceptable level and that means many decades of uncontrolled fires. On a sobering note, the second cyclone in two weeks is about to hit Australia and it will be the same volunteers that fought the fires that will be preparing for the cyclone season. For more information, email [email protected]
<urn:uuid:d8baf3af-c17c-4ba7-b51c-71e80295b48e>
CC-MAIN-2020-16
https://apfmag.mdmpublishing.com/2019-20-australias-worst-fire-season-on-record/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371810807.81/warc/CC-MAIN-20200408072713-20200408103213-00274.warc.gz
en
0.96969
3,459
3.328125
3
Leaf books are going to be a topic around here for the next few years, so I thought I’d do a short introduction to the genre because many people, even those who are interested in printing and press books, don’t know what they are. We’re in the early stages of producing a book that will present leaves from both Gabriel Rollenhagen’s book of emblems (1611) with copperplate engravings by Crispin de Passe, and George Wither’s A Collection of Emblemes (1635), which used the same de Passe plates. Emblem books are a field unto themselves - a black hole if you’re not careful - and Wither’s book in particular is notable for several reasons. For reasons that will become clear below, I’ll start by saying that the leaves we’ll be including with our publication came from broken, incomplete and poorly-treated copies. A leaf book is a book about another book, one usually published sufficiently long ago that copies are now rare, or at least scarce. Rarity alone, however, isn’t really justification enough for a leaf book: the source book must also be remarkable for some specific reason. The defining feature of a leaf book is that it contains a leaf from the source book. Ideally these are bound in, attached to a hinge to make viewing both sides convenient. Many publishers get lazy and tip the leaf to a page, making it awkward to view the verso. Some books include the leaf in a pouch at the back board (ugly and untidy - too easy for the leaf to become separated from the book), or in a companion folder (better than a pouch, but being bound into the book is always the best course). The content generally consists of some bibliographic details and a discussion of why the book is noteworthy. For example, the spread at top is from a recent score, the first edition of Nicolas Barker's Aldus Manutius and the Development of Greek Script & Type in the 15th Century, which includes leaves from four Aldine books. Many people, particularly those who are not book collectors or students of printing history, immediately react with horror at the idea of cutting up one book to make another. My usual response to comments like this is, You just don’t understand, it's never about cutting up a complete copy, go away. That, however, isn’t a useful response, especially in the case of leaf books because the criticism is a fair one, and the genre must be approached with sensitivity to its fundamental dichotomy: celebrating printing history while at the same time pulling a piece of it apart. The first thing to understand is that leaf books typically are a solution to a problem, the problem being what to do when one is presented with an already broken & incomplete copy of an important book. While I’m sure there have been some exceptions, the vast majority of leaf books get their leaves from an already broken copy. That’s one reason why leaf books typically are issued as a limited edition, and the editions are some strange number - the quantity is determined by the number of leaves available. The Caxton Club mounted an exhibition of leaf books in 2005, and published the excellent catalogue Disbound and Disbursed. It includes an introduction by Christopher de Hamel, which addresses the tricky status of leaf books, and also the fact that “leaf books, for the most part, have themselves been limited edition productions of private presses.” There’s a reason most leaf books have been published by private presses, beyond the fact that private presses typically have a fundamental interest in printing and its history: the edition of a leaf book is limited by the number of leaves available, and private presses exist to publish small (i.e. limited) editions of specialized interest, and in a manner that compliments the leaf being celebrated. Some of the ethical discomfort with leaf books is discussed in two blog posts by Adam Hooks, an associate professor at the University of Iowa’s Center for the Book. The posts, which are worth reading, have an underlying tone of disapproval, but they also suggest some subtle misunderstandings about book production, publishing, and collecting that are not uncommon among people for whom “book” primarily signifies the content, not the form. His lead for a post about the 1640 edition of Ben Jonson’s Works includes a comment about the owners of rare books “keen to sell off their copy bit by bit.” This kind of comment comes from someone who is not a collector of books, and does not understand people who are. No collector who owns a complete book is going to break it apart in the hope of selling the bits for more than the whole is worth. It is true that this detestable practise has happened, but usually by nefarious dealers cutting prints or maps out of books, not pages of text. Starting around the middle of the last century, the print and bookselling trades, along with private and institutional collectors, began to actively discourage the practise. Unfortunately, it went on for long enough that in some cases, complete copies of a title are now more valuable than the sum of the parts because so many have been cannibalized. In a subsequent post that is more specifically about leaf books, Hooks’ unfamiliarity with the genre, and private press publishing in general, are reflected in comments about the book Original Leaves from the First Four Folios of William Shakespeare (1935) like “Why did the Grabhorn Press decide to publish such a book?” and “There is also, alas, more work to do in order to explain how and why The Grabhorn Press got into the business of Breaking Shakespeare Apart.” To begin, the Grabhorn brothers did not decide to print such a book: they were commissioned to produce it by David Magee, a San Francisco bookseller with whom they had a long and interesting collaborative relationship. Just like the Second Folio was printed by Thomas Cotes for Robert Allot, a senior member of the Stationers’ Guild at the time (and one of the five publishers of Wither’s Collection of Emblemes - more on that in coming posts). It seems likely that Magee was the source of the leaves, and that he would have encountered them through his ongoing business. (Likewise the Grabhorns didn’t publish Leaves of Grass; they designed and printed the edition for Random House, and making 1930 the culmination of their careers is premature. I would argue that their magnum opus was the three-volume bibliography of their work, with many sample pages included - an extensive and glorious leaf book!) The fact that the edition consists of only 73 copies (not a nice round number, like 70 or 75) tells us that no books were broken for the leaves, but that Magee (or someone) saved the fragments of a copy from the scrap bin (look through the scrap paper box of any binder who specializes in restoration, you’ll be amazed what you’ll find). All of which is quibbling and not entirely on point. Hooks’ concern for protecting books from cannibalizing is right and just. But publishers of leaf books are not cannibals, they’re preservationists and geeks for printing history. Leaf books are a solution for what to do when you are presented with a damaged, incomplete copy of a rare book. If it’s in the category of an early Shakespeare folio, or just about any incunable, you probably have a box made and be happy for the parts you have. Depending how much is missing, you could potentially have facsimiles of the missing pages made, and have the book reconstituted. On one hand, digital printing makes this easier than ever, but on the other good facsimiles should be (relief) printed, like the original sheets, and on similar paper. Just having a leather spine rebacked will cost a few hundred dollars. If you start getting into complete rebinds, with paper repairs, by a binder knowledgeable of the period materials and techniques, you’ll be over a grand fast. There’s the rub: the cost of conservation or restoration (not the same things), versus the market value of the book. If a complete copy could be sourced for (say) $10,000, and any restoration work would cost even a quarter of that, you’re better off buying the original; a reconstituted copy will always be a distant second in terms of both reference and monetary values. So, what to do with a book like George Wither’s Collection of Emblemes, when the copy lacks the title page, frontis engraving and numerous other pages, is badly stained and edge-worn in places, with most of the remaining pages detached at the center fold? Strictly speaking it isn’t a rare book: at least one copy usually can be found on the market, probably in the range of $5,000 - $10,000 if complete. Even without replacing the lost pages with facsimiles, just repairing the pages remaining and having them put into some kind of appropriate binding would cost a few thousand dollars. Isn’t worth the outlay. But you can’t just bin the pages! Using them as the basis for a leaf book is much more interesting than selling them off piecemeal. It’s also more respectful to the work, especially when the pages offer an opportunity to explore aspects of the book beyond its content, such as when, how & why it was produced, and by whom. These are the kinds of details that appeal to people interested in printing history generally, plus all the others who will be interested in whatever specific topic the book discusses. It’s not about collecting relics, it’s about using the fragments to sustain a connection with the original work. In the next month or so I’ll post some of my favorite leaf books. AND ANOTHER THING! Speaking of leaf books and Whitman and grass leaves, I remembered this was tucked on one of my shelves. It's not really a leaf book, because the contents were printed specifically for this, but the contents also are pages from the Grabhorn's edition of Leaves of Grass. Does that pencil mark on the lower right corner look like it might be Valenti Angelo's signature?
<urn:uuid:651b3068-cea7-47c2-8360-78b257b595ff>
CC-MAIN-2020-16
http://heavenlymonkeybooks.blogspot.com/2017/03/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370508367.57/warc/CC-MAIN-20200402204908-20200402234908-00233.warc.gz
en
0.96074
2,159
2.78125
3
Geographers have combined interactive maps, multimedia content and text in Story Maps to tell stories about the world around us. Story Maps are now emerging as a powerful medium for data-driven journalism and storytelling. This article will help you to start writing your own. Esri Story Maps In An Introduction to Story Maps it is stated that “Story Maps are web applications that combine interactive maps with multimedia content and text to tell stories about the world”. They work on a variety of screen sizes and they incorporate interactive builders. Story Maps are hosted by Esri in the cloud, but they’re open source and can be downloaded and installed on your own web server. The Esri Story Map team was founded in 2010 by Andy Carroll. Read about his passion for Story Maps in Story Maps chapter in ‘The ArcGIS Book’. As he states, maps illuminate and contextualize words in storytelling and complement each other in Story Maps. I am fascinated by Story Maps because they combine maps with text, images, and multimedia content. They are excellent for data-driven storytelling because they combine scientific data, facts, and evidence with emotive and creative content to compel people towards a desired action. I believe that Story Maps can complement and reinforce the content marketing strategy of any organization, particularly those that operate in a wide geographic area. For that reason, let’s discuss them further. What Story Can I Tell? Think about your favorite fable, book, commercial, movie or song. There is a likelihood that it used storytelling to engage and captivate you in a unique and memorable way on a topic of interest. Likewise, a Story Map could tell a story on any topic that your audience cares about. One good place to find inspiration for your Story Map is the Esri Story Maps Gallery a curated selection of great Story Maps handpicked by the Esri Story Maps team. These Story Maps can be filtered by story map app, subject, industry, format, and author and selected by keyword search. Let’s review the Story Maps that were captured in the screenshot above: - Mapping Irish Surnames – this Story Map tells the story of Irish immigration to the US and locates the region of origin for Irish surnames. - Modeling Federally Protected Waters and Wetlands – this Story Map examines the effect of narrowing the definition of protected waters under the Clean Water Act on the protection of wetlands in the US. - The Grand Canyon in 100 Images – as the title indicates this Story Map tells the story of the Grand Canyon in a collection of 100 images. - Canine Surprises – there are no interactive maps in this Story Map, but it tells the story of a woman and her dog on photo excursions. - Building Our Capital – this Story Map presents milestones in the development of Ottawa, Canada’s capital city. - Protect Our Winters – this Story Map shows the impact of climate change on the US winter tourism industry and how it is changing a way of life. Note that Story Maps range from impressive research studies like ‘Modeling Federally Protected Waters and Wetlands’ to personal anecdotes like ‘Canine Surprises’. They create awareness about the impact of climate change (‘Protect Our Winters’) and help us to explore natural wonders like the Grand Canyon. Story Maps can also be used to document history as shown in the development of Ottawa and the origin of Irish surnames. Taking it closer home, a search on the keyword Kenya in the Story Map gallery yielded the following screenshot: Here’s what the 3 stories are about: - Askari Serpent – this Story Map documents a mission of healthcare delivery to remote populations in Kenya by the British army in minute detail. - Our Health, Our Future – this Story Map presents the HoPE-LVB project in the Lake Victoria Basin of Kenya and Uganda in an effective and engaging manner. - Kenya National Parks and Game Reserves – this Story Map presents key information and facts on Kenya’s protected areas. Health and environment are certainly important topics for Kenya and Africa in general, but there’s room for positive and enriching stories about culture, history, and socio-economic development. In Things You Didn’t Know You Could Do With Story Maps, Bern Szukalski gives lots of ideas on how you could get creative with Story Maps. Here are my suggestions for topics that can get you started: - News & Events – there’s a lot going on around us and Story Maps are a great tool for investigative journalism and reporting. A Story Map is easily crafted around a disaster (e.g. wildfire, accidents) or issues of national concern (e.g. health, crime, education). - Places – there are lots of places that we know little about, so use Story Maps to provide detailed information on your neighborhood, town, county, or a park that you visited. - Journeys – life has many journeys, like the road trip you made or the hike you took up the mountain. A Story Map is an excellent way of documenting them. - History – history is a treasure trove of wonderful stories that might easily be forgotten. Use a Story Map to narrate the building of the Kenya-Uganda railway or the Mau Mau wars. - Workflows – did you conduct an analytical workflow that resulted in a beautiful map and great insights? Present it in a Story Map so that others learn about it. Which Story Map Template? To help you tell your story Esri has developed several Story Map templates. They are listed on the Apps Templates page and grouped under categories like ‘A Rich Multimedia Narrative’ and ‘A Curated Set of Places’. Clicking on CREATE STORY at the top of the page opens up a wizard with a ‘Pick an App’ and ‘Ask the Pros’ tab. The latter guides you to the right app by asking questions about the story that you want to create. Here’s an overview of the different categories and their templates: - A Sequence of Place-enabled Photos or Videos – Story Map Tour is the only template in this category. It allows you to present a set of photos or videos with their location shown on a map. It’s ideal for illustrating a city bus tour or a tourism circuit in your county. You can also use it to document your latest holiday, a hike up Mt. Kenya or an interesting road trip. - A Rich Multimedia Narrative – Story Map Journal and Story Map Cascade are the two templates under this category. Both combine maps, 3D scenes, images and videos with narrative text. The Map Journal uses a panel with different sections for the narrative alongside its content. The Map Cascade provides a scrolling-experience that alternates the narrative with immersive content such as maps and 3D scenes. - A Series of Maps and Other Content – The Story Map Series template in this category makes it easy for people to browse through a series of maps. The maps can be presented in tabs, numbered bullets or an expandable ‘side accordion’. Apart from maps, you can include other multimedia content or even complete Story Maps. Story Map Series is a good choice when you want to display a large collection of maps, show the steps in an analysis workflow, or disseminate a collection of Story Maps. - A Curated Set of Places – The Story Maps Shortlist template under this category can be used to organize a large collection of places under different themes. The ordering of the places can be used to imply ranking. A classic use case for Story Maps Shortlist is a town directory with its hotels, restaurants and tourist attractions. - Two Maps – The Story Map Swipe and Spyglass template allow for the comparison of two maps. Use this template to compare changes over time (e.g. land use), imagery before and after an event (e.g. landslide), and the relationship between two variables (e.g. diabetes and obesity). - Just One Map – The Story Map Basic template make a single map the centerpiece of your narrative. This is a no-frills template that displays a map with a title bar and an optional legend. Think of it as an alternative for publishing a web map or a basic web app. How to Write a Story Map? Here are 3 key points that you should consider before writing your Story Map: - Purpose – Consider your goals and objectives. Are you seeking to inform, report, engage, entertain, interact, promote, persuade, teach or instruct? What’s the expected shelf-life of your Story Map and how often will it be updated if at all? - Audience – Try to picture your targeted audience(s), since this will inform the language that you will use, the content of your story map and how it will be presented (e.g. visual vs. textual). - Content – Have a look at the visual content that’s available. Are you publishing photos or videos, and can these be linked to a location on the map? Are you publishing raster or vector data and points, lines or polygons? What’s the accuracy and resolution of your data and will you publish content for different periods in time? Didn’t that just sound like a cartography class? That’s perhaps where I got it from. So, let’s get out of class and review the steps Hannah Wilber suggests in How to Make a Story Map. - Get Ideas and Get Inspired – Getting ideas is something we discussed. Once you have the idea, go to the Story Map Gallery and get inspired by other Story Maps on a similar topic. - Choose a Story Map template – Select a Story Map template that suits your story. My recommendation is that you have most of the content ready, especially the narrative. - Start Building – The hardest part of anything is to start, so get going with a complete draft that is reviewed and edited in subsequent steps. Don’t try to get things right in one go. - Publish and Promote – Publishing your Story Map consists of sharing it through the Esri cloud. Promote your Story Map to your audience via social media and your website. My Own Story Maps By now you must be wondering how many Story Maps I have written. Not too many really: - My first Story Map ’Our Common History’ intertwines my personal life journey with Esri software developments and Esri’s history in Eastern Africa. It was presented in 2015 at the 3rd Esri Eastern Africa Education User Conference. - ‘15 Exciting Eating Places in Westlands’ was developed for the members of my church. It still features on the gallery of Spatiality’s ArcGIS Online account but is probably due for a review. - ‘Nairobi CBD Business Directory’ was developed for a concept note to the Kenya National Chamber of Commerce and Industry. They are still sitting on it. - ‘Exploring Homa Bay County’ is still a work in progress, but it intends to promote 3 tourism circuits in the Kenyan county of Homa Bay. Creating a Story Map is not without challenges and here are a few that I have encountered with a few encouraging words: - Intimidation – there are many great Story Maps that can inspire you, but they can easily intimidate you. It takes time to become proficient but let that not stop you from starting. - Social Media – posting on Twitter or Facebook takes less effort and has a wider reach compared to making Story Maps. Don’t invest in vanity but in something worthwhile. - Narrative – creative writing is mostly an acquired rather than a natural talent, so many of us struggle to come up with a compelling narrative that flows. Just keep editing until you get it right! - Photography and Video – finding the right multimedia content which is licensed for reuse or creating your own is an arduous task. Collaboration and partnerships might be the answer. - Spatial data – getting authoritative spatial data is a challenge in Kenya, so lots of time could be spent on acquiring, correcting, completing and aligning spatial datasets. Story Maps are an effective medium for data-driven storytelling since they add location context and data to words to create an immersive and compelling narrative. Story Maps have been written on a wide variety of topics, but start with stories about the news, a place, a journey, history, or a GIS workflow. Esri has developed templates to get you started and there are lots of tips on you can build your own Story Maps and deal with the challenges along the way. Mastery comes with practice, so now it’s up to you to start building your own Story Maps. What will it be about? The drought in Northern Kenya, a favorite National Park, your hike up on Mt. Kenya, the building of the SGR railway, or your final GIS project at University? The choice is all yours but start building now!
<urn:uuid:1830b34a-c90a-4e09-bc75-5b6c6cae734d>
CC-MAIN-2020-16
https://spatiality.co.ke/story-maps-a-medium-for-data-driven-storytelling/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371700247.99/warc/CC-MAIN-20200407085717-20200407120217-00196.warc.gz
en
0.90274
2,707
2.859375
3
In J. K. Rowling's Harry Potter series, a Muggle is a person who lacks any sort of magical ability and was not born in a magical family. Muggles can be described as people who do not have any magical blood inside them, it differs from the term Squib, which refers to a person with one or more magical parents yet without any magical power/ability, from the term Muggle-born, which refers to a person with magical abilities but with non-magical parents. The equivalent term used by the in-universe magic community of America is No-Maj, short for No Magic; the neologism, No-Maj was popular in the 1920s but soon went out of fashion and the original term, muggle came back into use before World War II and has been muggle since. The term Muggle is sometimes used in a pejorative manner in the books. Since Muggle refers to a person, a member of the non-magical community, Muggles are ordinary human beings without any magical powers and always with no awareness of the existence of magic. Hogwarts School of Witchcraft and Wizardry students who have non-magical parents are called muggle-borns. There have been some children known to have been born to one magical and one non-magical parent. Children of this mixed parentage are called half-bloods; the most prominent Muggle-born in the Harry Potter series is Hermione Granger, who had two Muggles of unspecified names as parents. A witch or wizard with all magical heritage is called a pure-blood. In the Harry Potter books, non-magical people are portrayed as foolish, sometimes befuddled characters, who are ignorant of the Wizarding world that exists in their midst. If, by unfortunate means, non-magical people do happen to observe the working of magic, the Ministry of Magic sends Obliviators to cast Memory Charms upon them, causing them to forget the event; some Muggles, know of the wizarding world. These include Muggle parents of magical children, such as Hermione Granger's parents, the Muggle Prime Minister, the Dursley family, the non-magical spouses of some witches and wizards. Rowling has stated she created the word "Muggle" from "mug", an English term for someone, fooled. She added the "-gle" to make it sound less demeaning and more "cuddly". The Dursleys, Harry's maternal relatives with whom he lived for sixteen years; the Muggle Prime Minister Frank Bryce, the Riddle family gardener Tom Riddle Senior, Lord Voldemort's father Tobias Snape, Severus Snape's father Jacob Kowalski, Newt Scamander's No-Maj friend Mary Lou Barebone, leader of the New Salem Philanthropic Society The word muggle, or muggles, is now used in various contexts in which its meaning is similar to the sense in which it appears in the Harry Potter book series. Speaking, it is used by members of a group to describe those outside the group, comparable to civilian as used by military personnel. Whereas in the books muggle is capitalized, in other uses it is predominantly lowercase. Muggle is used in informal English by Mensa members to define non-members or any person with IQ lower than Mensa level. According to the BBC quiz show QI, in the episode "Hocus Pocus", muggle was a 1930s jazz slang word for someone who uses cannabis. "Muggles" is the title of a 1928 recording by His Orchestra. A muggle is, according to Abbott Walter Bower, the author of the Scotichronicon, "an Englishman's tail". In Alistair Moffat's book A History of the Borders from Early Times, it is stated that there was a held 13th-century belief amongst Scots that Englishmen had tails. Ernest Bramah referred to "the artful Muggles" in a detective story published decades before the Potter books. Muggles is the name of a female character in the children's book The Gammage Cup by Carol Kendall published in 1959 by Harcourt, Brace & World. Published in 1982, Roald Dahl's character the Big Friendly Giant uses the word “Muggled” while describing a good dream to the other main character, Sophie - “And the whole school is cheering like mad and shouting bravo well done, for after that when you is getting your sums all gungswizzled and muggled up, Mr. Figgins is always giving you ten out of ten and writing Good Work Sophie in your exercise book.” – The BFG. Roald Dahl names a family of monkeys “The Muggle-Wumps” in The Twits and other writings. Muggle was added to the Oxford English Dictionary in 2003, where it is said to refer to a person, lacking a skill. Muggle is used in informal English by members of small, specialised groups those that consider their activities to either be analogous to or directly involve magic to refer to those outside the group. In online forums for people with herpes, Muggle is used to describe someone who does not have HSV. Muggle is used by geocachers to refer to those aware of the sport of geocaching. A cache, tampered with by non-participants is said to be plundered or muggled. Nancy Stouffer, author of The Legend of Rah and the Muggles accused Rowling of a trademark violation for the use of the term "muggles", as well as copyright violations for some similarities to her book. Rowling and Scholastic, her publisher, sued for declaratory judgment and won on a summary judgment motion, based on a lack of likelihood of confusion. Blood purity in Harry Potter BBC:'Muggle' goes into Oxford English Dict A fairy chess piece, variant chess piece, unorthodox chess piece, or heterodox chess piece is a chess piece not used in conventional chess but incorporated into certain chess variants and some chess problems. Fairy pieces vary in the way; because of the distributed and uncoordinated nature of unorthodox chess development, the same piece can have different names, different pieces the same name in various contexts. All are symbolised as inverted or rotated icons of the standard pieces in diagrams, the meanings of these "wildcards" must be defined in each context separately. Pieces invented for use in chess variants rather than problems sometimes instead have special icons designed for them, but with some exceptions, many of these are not used beyond the individual games they were invented for. Today's chess exists because of variations someone made to the rules of an earlier version of the game. For example, the queen we use today was once able to move only a single square in a diagonal direction, the piece was referred to as a ferz. Today, this piece still starts next to the king, but has gained new movement and become today's queen. Thus, the ferz is now considered a non-standard chess piece. Chess enthusiasts still like to try variations of the rules and in the way pieces move. Pieces which move differently from today's standard rules are called "variant" or "fairy" chess pieces; the names of fairy pieces are not standardised, most do not have standard symbols associated with them. Most are represented in diagrams by rotated versions of the icons for normal pieces; the following text uses common names for the pieces described whenever possible, but these names sometimes differ between circles associated with chess problems and circles associated with chess variants. Many of the simplest fairy chess pieces do not appear in the orthodox game, but they fall into one of three classes. There are compound pieces that combine the movement powers of two or more different pieces. An -leaper is a piece that moves by a fixed type of vector between its starting and destination squares. One of the coordinates of the vector'start square – arrival square' must have an absolute value m and the other one an absolute value n. A leaper captures by occupying the square. For instance, the knight is the -leaper. Note that an -leaper is the same thing as an -leaper, so that the knight can be considered the -leaper; the table to the right shows common names for the leapers with 0 ≤ m, n ≤ 3, together with the letter used to represent them in Betza notation, a common notation for describing fairy pieces. Although moves to adjacent squares are not "leaps" by the normal use of the word, they are included for generality. Leapers that move only to adjacent squares are sometimes called step movers in the context of shogi variants; the leaper's move cannot be blocked. Leapers are effective forking pieces; the check of a leaper cannot be parried by interposing. In shatranj, a Persian forerunner to chess, the predecessors of the bishop and queen were leapers: the alfil is a -leaper, the ferz a -leaper. The wazir is a -leaper. The dabbaba is a -leaper. The'level-3' leapers are the threeleaper, camel and tripper; the giraffe is a level-4 leaper. Many of these basic leapers appear in Tamerlane chess. A rider, or ranging piece, is a piece that moves an unlimited distance in one direction, provided there are no pieces in the way; each basic rider corresponds to a basic leaper, can be thought of as repeating that leaper's move in one direction until an obstacle is reached. If the obstacle is a friendly piece, it blocks further movement. There are three riders in orthodox chess: the rook is a -rider. Sliders are a special case of riders. All of the riders in orthodox chess are examples of sliders. Riders can create both skewers. One popular fairy chess rider is the nightrider, which can make an unlimited number of knight moves in any direction; the names of riders are obtained by taking the name of its base leaper and adding the suffix "rider". For example, the zebrarider is a -rider. A nightrider can be blocked only on a square one of its component knight moves falls on: if a nightrider starts on a1, it can be blocked on b3 or c2, but not on a2, b2, or b1. It can only travel from a1 to c5. Some generalised riders do not follow a straight path; the gryphon from the historical game of Grande Acedrex is such a "bent rider": it takes its first step like a ferz and continues outward from that destination like a rook. The unicorn, from the same game, takes its first step like a knight and continues outward from that destination like a bishop; the rose from Chess on a Really Big Board traces out an octagonal path of knight moves: from e1, it can go to g2, h4, g6, e7, c6, b4, c2, back to e1. A limited ranging piece moves like a rider, but only up to a specific number of steps. An example is the short rook from Chess with different armies: it moves like a rook, but only up to a distance of 4 squares. From a1, it can travel in one move to b1, c1, d1, or e1, but not f1. A rider's corresponding leaper Saygus is an American developer of smartphones headquartered in South Jordan, Utah. Founded by Chad Sayers. Saygus developed two smartphone devices: VPhone and V², neither of which were released. Saygus' VPhone, featuring a 3.5 inch touchscreen and slide-out keyboard, was first revealed in 2009, but did not go to market. The VPhone was presented at the 2010 Consumer Electronics Show, winning the Best of Innovations Award in the Wireless Handsets category; the second device developed by Saygus was named V². The V² smartphone was announced at CES 2015 and was reported to ship in the first quarter of 2015; the device could be pre-ordered directly from Saygus during January 2015. In June 2015 a crowdfunding campaign was launched for the Saygus V² with the company citing manufacturing issues in delivering the finished product to pre-order customers. After several years of delays in delivering the device to backers, Saygus made a further plea for investment in November 2018. Saygus at CeBIT 2015 presents V² smartphone Saygus presents V² at CES 2015 Saygus presents V² at MWC 2015 Saygus presents last hardware update of V² at Los Angeles Saygus VIP Penthouse Lounge near E3 The Honourable Justice David Jackson is a Judge in the Supreme Court of Queensland, the highest ranking court in the Australian State of Queensland. He was appointed to the Supreme Court of Queensland on 8 October 2012. Jackson was called to the Queensland Bar in 1977 and appointed Queen’s Counsel in 1990. Jackson now sits on the Commercial List of the Supreme Court of Queensland. In August 2014 he was appointed as Chair of the Queensland Law Reform Commission; the appointment of Jackson as a judge was controversial as he was, is still being investigated over his role in the collapse of investment company Equititrust which raised hundreds of millions of dollars from members of the public and collapsed owing $260 million to the investors causing many to lose their homes and life savings. The offices of the company were raided by the Australian Federal Police in 2011 three days after Jackson resigned as a director. Jackson is expected to be examined over his conduct with this company in the Federal Court in 2018. Jackson caused controversy by a number of his judicial actions including by releasing a notorious female sex offender Jan-Maree Farrenkothen, by ordering that a woman, convicted of acts of bestiality be eligible for a "blue card" allowing her to work with children in Queensland, by ordering rapist Nigel Patrick Robinson be released from custody Marco Odermatt is a Swiss World Cup alpine ski racer. He races in all alpine specializes in Giant slalom. Odermatt competed for Switzerland at two Junior World Championships and the 2019 World Championships, he gained his first World Cup podium at Kranjska Gora in March 2019. At the 2016 Junior World Championships in Sochi, Odermatt was 11th in the Downhill, took bronze in the Super-G, failed to finish the Alpine combined, won gold in the Giant slalom, failed to finish the Slalom, he made his World Cup debut in March 2016 in a giant slalom at St. Moritz. At the 2018 Junior Worlds in Davos, Odermatt won an unprecedented five gold medals. Odermatt gained his first World Cup win in December 2019 in the Super-G at Colorado. Standings through 22 February 2020 Marco Odermatt at the International Ski Federation Marco Odermatt World Cup standings at the International Ski Federation Marco Odermatt at Ski-DB Alpine Ski Database Marco Odermatt at Swiss Ski Team Marco Odermatt at Stöckli Skis Aukra is municipality in Møre og Romsdal county, Norway. It is part of the region of Romsdalen; the administrative centre is the village of Falkhytta, part of the Aukrasanden urban area. The municipality is made up of the island of Gossa as well as many small surrounding islands, plus a small area around the village of Hollingen across the Julsundet strait on the mainland Romsdal peninsula; some of the main population centers include the villages of Hollingen, Varhaugvika, Røssøyvågen. Nyhamna is a major industrial area in Aukra; the 59-square-kilometre municipality is the 408th largest by area out of the 422 municipalities in Norway. Aukra is the 245th most populous municipality in Norway with a population of 3,557; the municipality's population density is 60.3 inhabitants per square kilometre and its population has increased by 12.1% over the last decade. The municipality of Akerø was established on 1 January 1838. In 1840, most of Akerø on the Romsdal peninsula was separated to form the municipality of Frænen. On 1 January 1867, the islands that are located to the west of Gossa were separated to become the new Sandøy Municipality. On 1 January 1924, the southern part of the municipality were separated to form the new municipality of Sør-Aukra, the remainder of the municipality was renamed Nord-Aukra. During the 1960s, there were many municipal mergers across Norway due to the work of the Schei Committee. On 1 January 1964, the Mordal area of Nord-Aukra was transferred to Molde Municipality. On 1 January 1965, Nord- was dropped from the name of the municipality, so it was just called Aukra. On 1 January 2020, the uninhabited islands of Lyngværet and the island of Orta were transferred from Sandøy Municipality to Aukra; the municipality is named after the old Aukra farm. The first element is akr which means "field" or "acre" and the last element is vin which means "meadow" or "pasture". Before 1918, the name was written Akerø or Agerø; the coat of arms was granted on 22 May 1987. The arms show two Bronze Age bracelets on a blue background. The bracelets are based on an archaeological finding in the area. The rings thus symbolize the long tradition of habitation in the area; the Church of Norway has one parish within the municipality of Aukra. It is part of the Molde domprosti in the Diocese of Møre. Aukra is the site of a shipwreck and rescue operation, when the cargo ship Rokta on 4 April 1938; the monument of Rokta is situated on Rindarøy island with a view of Galleskjæra where the Rokta sank. All municipalities in Norway, including Aukra, are responsible for primary education, outpatient health services, senior citizen services and other social services, economic development, municipal roads; the municipality is governed by a municipal council of elected representatives, which in turn elect a mayor. The municipality falls under the Frostating Court of Appeal; the municipal council of Aukra is made up of 21 representatives. The party breakdown of the council is as follows: The Nyhamna industrial area on the northeastern part of the island of Gossa in Aukra is the location from where the Langeled pipeline, transporting natural gas from the enormous Ormen Lange gas field to the United Kingdom, came onstream in 2007. Local politicians expect a lot from the land-based production facility. The taxes, which in their opinion, far exceeds the externalities put on the inhabitants of Gossa. Aukra Auto runs the bus service on the island of Gossa. Municipal fact sheet from Statistics Norway Møre og Romsdal travel guide from Wikivoyage
<urn:uuid:189fbea6-344e-477f-a25a-3f92da268b5b>
CC-MAIN-2020-16
https://wikivisually.com/wiki/Muggle
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370503664.38/warc/CC-MAIN-20200331181930-20200331211930-00193.warc.gz
en
0.960425
3,996
2.765625
3
cement production process flowchart Cement is so fine that 1 pound of cement contains 150 billion grains. The cement is now ready for transport to ready-mix concrete companies to be used in a variety of construction projects. Although the dry process is the most modern and popular way to manufacture cement, some kilns in the United States use a wet process. The production of cement has 5 stages, it commence with the mixing of two raw materials and completing in the packaging a new cement. Concrete production has a simpler process by mixing the four elements (Cement, water, sand and gravel) in the concrete mixer. It starts with Limestone and clay is crushed together, resulting in powder is then mixed. A process flow chart template example could be used for any kind of process- be it a service process or administrative process or some manufacturing process. The elements inside the Chart Templates could be series of actions, services or materials entering/leaving that process etc. Sep 19, 2019· Different manufacturing techniques will use either wet or dry grinding, but each cement manufacturing process will culminate in heating and fine grinding to finish the product. Preparing the raw materials is often the first step in the cement manufacturing process, and involves mining the limestone or obtaining safe industrial waste products. Manufacturing of cement involves various raw materials and processes. Each process is explained chemical reactions for manufacture of Portland Cement. Cement is a greenish grey colored powder, made of calcined mixtures of clay and limestone. When mixed with water becomes a … FLOWCHART 1. Convert the following flow chart into a paragraph of about 150 words. The process of making cement is described in this flow chart. The two raw materials used in theprocess are limestone and clay. Limestone is crushed, sized, dried and stored in storage silos. In the same way, Clay is washed, crushed, and dried in Mentioned cement production people will say "two grinding burn",that means cement production process mainly includes three stages: raw meal preparation, clinker burning and cement grinding. The cement manufacturing process flow chart is shown as follows: Cement Manufacturing Process. 1.Crushing And Preblending Jan 26, 2017· Cement Manufacturing Process Nael. Loading... Unsubscribe from Nael? ... LOESCHE Compact Cement Grinding Plant (CCG Plant) - Duration: 4:27. LoescheGroup 18,264 views. 4:27. May 11, 2013· Cement manufacturing process - components of a cement plant from quarry to kiln to cement mill. ... CivilDigital > Civil Engineering Articles > Civil Engineering Articles for Mobile > Cement Manufacturing Process Simplified Flow Chart. ... 1.1 Cement Manufacturing Process Simplified Flow Chart ©2019 CivilDigital.com · Built by CivilDigital ... Cement Manufacturing Process Simplified Flow Chart. Cement Manufacturing Process Simplified Flow Chart. Visit. Discover ideas about Process Flow Diagram. To produce cement, different types of raw materials and methods are required. Each method is briefly described along with chemical reactions for Portland Cement production. ... Process Flow Diagram for Portland Cement Manufacturing - Free download as Word Doc (.doc / .docx), PDF File (.pdf), Text File (.txt) or read online for free. Aug 30, 2012· The remaining cement is shipped in bulk quantities by mean of trucks, rails or ships. Cement Manufacturing Process Flow Chart. After explaining the complete process of cement making, flow chart would be like that. flow chart present the summary of whole process as shown below. googledrive.com | The cement manufacturing process flow chart is a process flow chart that gives a detailed description of the way cement is manufactured in a manufacturing plant. This detailed chart can be used by every company to manufacture cement. Methods of Manufacturing Process of Cement. At present Portland Cement is manufactured by two processes, Dry Process, and Wet Process. The main difference between these two methods of manufacturing of cement is that in the dry process, calcareous and argillaceous raw materials are fed into the burning kilns in a perfectly dry state. Cement production line flow . ... Fragmentation and pre-homogenization (1) Crushing: During the cement production process, most of the raw materials are broken, such as limestone, clay, iron ore and coal. Limestone is a raw material for producing large amount of cement. After mining, the particle size is larger and the hardness is higher. The clinker drops into coolers where it is cooled under control condition. Cooled clinker and 3 to 5 percent of gypsum are ground in ball mill to required fineness and then taken it to storage silos from where the cement is bagged. The equipments used in the dry process kiln are comparatively smaller. The process is quite economical. There are 18 cement manufacturing process flow chart suppliers, mainly located in Asia. The top supplying country or region is China, which supply of cement manufacturing process flow chart respectively. Cement manufacturing process flow chart products are most popular in Africa, South Asia, and Southeast Asia. Volume 3, Issue 5, November 2013 385 Abstract— formalized by French and British engineers in the 18th This paper analyzes an existing processing management system in a cement factory in India. During the last two decades (80's and 90's), major technological advancements took place in design of cement plant equipment/systems. The cement manufacturing process flow chart pdf portland production find your next flowcharts diagram ppt Nov 26, 2018· Cement manufacturing process.. °°°°°°°°°°°°°°°°′°°°°°°°°°°°°°°°°°°°°°°°°°°° Must watch this video and Share with your Friends..... °Mill, Hammer ... A cement is a binder, a substance used for construction that sets, hardens, and adheres to other materials to bind them together. Cement is seldom used on its own, but rather to bind sand and gravel together.Cement mixed with fine aggregate produces mortar for masonry, or with sand and gravel, produces concrete.Cement is the most widely used material in existence and is only behind water as ... Sep 08, 2018· The cement from silos is packed by machines in bags. Each bag of cement contains 50 kg or 0.035 m 3 of cement. Now let's know manufacturing of cement by the dry process. DRY PROCESS. When the available raw materials are quite hard, then this process is used . The cement by this process can be prepared by using the following operations:- Sep 17, 2015· 15 Cement Storage Silo The cement storage silo is used for storing the finished product – cement. 16 Packing and Dispatch The cement is packed with the help of a rotary packer and finally dispatched to the market. 15. 17 Central Control Room It is the nerve center of the cement plant since all equipment is controlled from this place. Cement production process flow chart planning and engineering data fish freezing layouts manufacturing ppt diagram View Cement manufacturing: components of a cement plant. This page and the linked pages below summarize the cement manufacturing process from the perspective of the individual components of a cement plant - the kiln, the cement mill etc.. For information on materials, including reactions in the kiln, see the ' Clinker ' pages. conveyor Next Raw mix kiln cooling Back preheating clinker storage at the plant Raw mill THE CEMENT MANUFACTURING PROCESS 1.GRINDING : The clinker and the gypsum are very finely ground giving a "pure cement". Other secondary additives and cementitious materials can also be added to make a blended cement. 1. Cement Production Process and Reactions. Each step of cement manufacturing, physical conditions and reactions occurred are explained here. Raw material transportation. Limestone is carried to the plant from mining place usually by a train. Some cement plants import clinker from other country or plant and add gypsum to produce cement. Cement Manufacturing Process Flow Chart; Cement manufacturing process is mainly divided into three stages, namely, raw meal preparation, clinker burning and cement grinding. Generally speaking, the cement industry production is Portland cement. Portland cement is a kind of delicate, usually gray powder, which consists of calcium (from limestone ... Cement Production Process Flow Chart Elegant Cement Plant #128879728635 – Cement Production Process Flow Chart, with 36 More files Cement manufacturing is a complex process that begins with mining and then grinding raw materials that include limestone and clay, to a fine powder, called raw meal, which is then heated to a sintering temperature as high as 1450 °C in a cement kiln. ... The Cement Manufacturing Process flow chart sums up where in the process each type of ... - report abut mills in cement factory indonesia - Pulverizer Machine Best Way Cement - filterbags for cement industry - new cement plant - cement making plant cement mill price cement rotary kiln - mini cement grinding plant - 2019 New type cement grinding mill for sale in inda - cement plants in hyderabad pdf - cement factory drawing amp design bing - dry and wet method of cement - coromandel cement rate of fly ash - Cost To Establish A Cement Plant In Indonesia - diaphragm design of cement ball mill - slag for producing cement in South Africa - function of limestone crushers for cement - cement mixer shot drink recipe - Cement Equipment Manufacturers Africa - What Kind Of Coal Is Used In Cement Plants - Fibre Cement Recycling In Process Ball Mill 120 Micrometer - grinding ball selection method for cement ball mill - portland cement manufacturers in india ppt - cement plant machinery manufacturers in germany - cement truck parts and motors - cement plant developers - crushers process in cement in belgium - 200 tpd cement grinding plant for sale in Indonesia - airswept coal mill coal mill in cement plant coal grinding - cement ball mill manufacturers in tanzania - how to calculate the power for a tph cement mill - Machine That Make Cement
<urn:uuid:67799afb-bfb8-4f19-9b84-e3822154f744>
CC-MAIN-2020-16
https://www.pandasfood.it/Jan/20/cement-production-process-flowchart.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510287.30/warc/CC-MAIN-20200403030659-20200403060659-00115.warc.gz
en
0.909321
2,135
3.390625
3
By Fr. Albert Nolan, O.P. We live today in a world of conflict: between governments and the peace movements, between trade unions and employers, between feminists and male dominated institutions. In El Salvador and Guatemala conflicts between the rich and the poor cost countless lives. In South Africa the situation has been described as a total conflict and military chiefs have called it total war. There may be differences of opinion about the nature of a particular conflict, whether it is a racial conflict or a class conflict, or whether the conflict might be resolved by peaceful negotiation rather than the use of force. But for many people in the world the fact of a conflict, which may encompass every aspect of their lives, can hardly, be doubted. This poses very important questions for us as Christians. What should be our attitude to the conflicts in which we find ourselves and which we see around us? Should we take sides or must we always remain neutral? It is as well to make it clear from the start that these questions are distinct from the question of using or not using violence. People in Northern Ireland, for example, may hope fervently for a united Ireland or for continued union with Britain - they may, in other words, 'take sides' -_while rejecting the use of violence to achieve it. We are not discussing the question of whether or not there are occasions when the use of violence in pursuit of justice is justified. In countries like El Salvador, Guatemala and South Africa it is often almost impossible to disentangle the question of taking sides and the question of violence, but it is nonetheless a separate question and one that has to be talked about quite separately in the light of the gospel. To many of us it is pretty obvious that there are some conflicts in which we ought to take sides. But what about the Christian belief in reconciliation, forgiveness and peace? How can you take sides if you love everybody, including your enemies? And how do we account for the widespread belief that in any conflict a Christian should be a peacemaker who avoids taking sides and tries to bring about reconciliation between the opposing forces? This belief rests on a mistaken understanding of reconciliation. We have all heard people say: We must be fair, we must listen to both sides of the story; there is always right and wrong on both sides. If we could only get people to talk to one another to sort out their misunderstandings and misconceptions of one another the conflict could be resolved. On the face of it this sounds very Christian. It sounds like a genuine concern for fairness and justice. Three Common Mistakes So what is wrong with this argument? In the first place it makes reconciliation an absolute principle that must be applied in all cases of conflict. The model or example that it envisages is that of what one might call the 'private quarrel' between two people who are being argumentative and not trying to understand one another and whose differences are based upon misunderstandings. But not all conflicts are like this. In some conflicts one side is right and the other wrong, one side is being unjust and oppressive and the other is suffering injustice and oppression. In such cases a policy of seeking consensus and not taking sides would be quite wrong. Christians are not supposed to try to reconcile good and evil, justice and injustice; we are supposed to do away with evil, injustice and sin. The first mistake, then, is the assumption that all conflicts are based upon misunderstandings and that there is always blamed on both sides. There is no evidence for believing that this is always the case, either in conflicts between individuals or in conflicts between groups in society. It is an unfounded assumption that has nothing whatsoever to do with Christianity. It is an assumption that could only be made by people who do not suffer under injustice and oppression or who do not really appreciate the sinfulness and evil of what is happening. The second mistake in this argument is that it assumes that a person can be neutral in all cases of conflict. In fact, neutrality is not always possible, and in cases of conflict due to injustice and oppression neutrality is totally impossible. If we do not take sides with the oppressed, then we are, albeit unintentionally, taking sides with the oppressor. 'Bringing the two sides together' in such cases is actually extremely beneficial to the oppressor, because it enables the status quo to be maintained; it hides the true nature of the conflict, keeps the oppressed quiet and passive and it brings about a kind of pseudo-reconciliation without justice. The injustice continues and everybody is made to feel that the injustice doesn’t matter because the tension and conflict have been reduced. This brings us to the third mistake. The commonly held view that Christians should always seek harmony and a 'middle way' in every dispute assumes that tension and conflict are worse evils than injustice and oppression. This again is a false supposition based upon a lack of compassion for those who suffer under oppression. Those who are afraid of conflict or confrontation, even when it is non-violent, are usually those who are not convinced of the need for change. Their caution hides an un-Christian pessimism about the future, a lack of hope. Or they use the Christian concern for reconciliation to justify a form of escapism from the realities of injustice and conflict. All in all, these mistakes about Christian reconciliation are not simply a matter of misunderstandings but come from a lack of real love and compassion for those who are suffering, or from a lack of appreciation of what is really happening in a grave conflict. In the final analysis, the insistent pursuit of illusory neutrality in every conflict is a way of siding with the oppressor. "In fact, neutrality is not always possible, and in cases of conflict due to injustice and oppression neutrality is totally impossible." What then is the true meaning of reconciliation? What does reconciliation mean in the Bible? The history of the Jewish people in the Bible is very much a history of conflict with the pagan nations. This conflict and confrontation is not merely encouraged by God; he actually commands the people again and again to oppose the tyranny and injustice and immorality of the pagan nations. One of the greatest sins of the Jewish nation was their attempt to be reconciled with the pagan nations who oppressed them. When the people shouted "Peace, peace," Jeremiah responds by saying there is no peace and never can be peace without change conversion. Some people today ignore this because they say that the New Testament is different and that Jesus brought a message of peace and reconciliation. It is of course true that one of the things that Jesus wished to hand on to his disciples was his peace, and that he said: "Blessed are the peacemakers," but this must be understood in the context of the much more remarkable saying we inherit from Jesus in the gospels of Matthew and Luke. "Do you suppose that I am here to bring peace on earth?" (The question is interesting. It seems to suggest that there were people who did "suppose" that Jesus had come to bring peace on earth.) "No, I tell you, but rather dissension. For from now on a household will be divided: three against two and two against three; the father divided against the son, son against father, mother against daughter, daughter against mother, mother-in-law against daughter-in-law, daughter in-law against mother-in-law" (Luke 12:51-53; Matthew 10:34-36). Most of this is a quotation from the prophet Micah (7:6), who was deploring the conflict between parents and children. Jesus used the quote to say that this is just the kind of conflict and dissension that he will bring. And of course this is exactly what he did do. Not because he wanted to bring dissension and conflict for their own sake, but because his uncompromising stance inevitably divided the people into those who were for him and those who were against him. Moreover, in the already existing conflict between Pharisees and the so-called 'sinners' he sided with the sinners; prostitutes and tax collectors against the Pharisees. And in the conflict between the rich and the poor he sided with the poor. Jesus did not treat each side as equally right or equally wrong, or only needing to overcome their misunderstandings about one another. He condemns the Pharisees and the rich in no uncertain terms, and he forgives the sinners and blesses the poor. In fact he enters right into the conflict with the Pharisees and the rich to such an extent that they set out to discredit him, arrest him; charge him and execute him. Jesus makes no attempt to compromise with the authorities for the sake of a false peace or reconciliation or unity. "Jesus makes no attempt to compromise with the authorities for the sake of a false peace or reconciliation or unity." On the other hand there are times when Jesus does try to reconcile people who have been in conflict with one another, e.g., Jews and - Samaritans, Zealots and tax collectors, some individual Pharisees and sinners or the poor, etc. And it was probably for this reason that he was known as a man of peace. But how is one to reconcile these two apparently contradictory approaches to conflict. Jesus made a distinction between the peace that God wants, and the peace that the world wants (John 14:27). The peace that God wants is a peace that is based on truth, justice and love. The peace that the world offers us is a superficial peace and unity that compromises the truth that covers over the injustices and that is usually settled on for thoroughly selfish purposes. Jesus destroys this false peace and even highlights the conflicts in order to promote a true and lasting peace. There is no question of preserving peace and unity at all costs, even at the cost of truth and justice. Rather it is a matter of promoting truth and justice at all costs, even at the cost of creating conflict and dissension along the way. Thomas Aquinas makes this same point by distinguishing between peace and concord, pointing out that concord is possible between thieves and murderers but that true peace is based upon genuine love. Different Kinds of Conflict We noted before that there are different kinds of conflict. We must analyse. each situation and respond accordingly. If one side is right we must recognize this and side with them. If the other side is wrong and in power, we must oppose them and dethrone them from power. Furthermore we must analyse: the reasons for the conflict, the interests that are at stake and the dynamics of change through conflict. The idea that all one has to do is talk nicely to both sides and they will be reconciled is simply not true in most cases of conflict, especially conflicts between groups or interests rather than individuals. There are often social forces at play that make change and conflict much more difficult and complicated than that. On the other hand we may discover that both sides are basically right, that both sides are working for justice. In such cases reconciliation is very important in order to create a co-operative solidarity in the struggle against injustice. And if we discover that both sides are wrong and that both are part of the oppression, then both must be confronted. And then, obviously, we don't try to reconcile them in their differences about the most effective way to oppress others. It is important to realise that to get to the real root of many conflicts we have to begin to think in structural terms-in other words, that not just individuals may be right or wrong, but the way societies are structured may itself be right or wrong. In some cases there is a structural conflict between the oppressor and the oppressed, between the rich and the poor. It is not a personal squabble. In these cases we cannot and should not impute guilt to the individuals concerned, nor should we treat everyone on the one side as blameless and everyone on the other side as guilty. Structurally, the cause of the poor and the oppressed is right .and just, no matter what individual poor people may be like in their personal and private lives. And the cause of the rich and oppressor is wrong no matter how honest and sincere and unaware they may be. Thus in the Magnificat or Song of Mary in the gospel of Luke, Mary says that it is God who "pulls down the mighty from their thrones and exalts the lowly, who fills the hungry with good things and sends the rich away. empty" (Luke 1:52-53). This does not mean that God hates the rich and the powerful and that he wants to destroy them as people. It simply means that he wants to pull the rich and powerful from their thrones, from their position in society, because the structures of that society are unjust and oppressive. This is the sense in which we must be on the side of the poor if we want to be on God's side. We must take an option for the poor, for the sake of both the poor and the rich as individual people. In fact, within this situation of structural conflict the only way lo love everyone is to side with the poor and the oppressed. Anything else is simply a way of siding with oppression and injustice. Loving Our Enemies This brings us to the question of loving our enemies. Here we must first point out that the commandment to love one's .enemies only makes sense once we recognize that we do have enemies, and that they are really and truly our enemies. When people-.hate you anal curse you and oppress- you Jesus-does not say that you must pretend that they are not. your enemies. They are. Andwhen he says you must love them despite this, he does not mean that you must -avoid any conflict or confrontation with them. "The peace that God wants is a peace that is based on truth, justice and love. The peace that the world offers us is a superficial peace and unity that compromises the truth, that covers over the injustices and that is usualy settled on for thoroughly selfish purposes." Confrontation and conflict does not, and need not necessarily, entail hatred. Class conflict and class struggle, which Christians have traditionally been reluctant to acknowledge, do not necessarily entail hatred. Such struggles may in fact be the only effective way of changing the situation; the only effective way of pulling down the mighty from their thrones. Those who maintain an unjust distribution of wealth and power and those who prop up their thrones are in fact our enemies. They are everybody's enemies; they are even the enemies of their own humanity. As a group or class they will never come down from their thrones willingly or voluntarily. A few individuals here and there may do so, but there will always be others to replace them. The ruling class as a whole cannot step down: we will have to pull them down from. their thrones. Not in order to sit on those thrones ourselves, or to put others on them,' but in order to 'destroy’ thrones. The temptation for a Christian is to think that the most loving thing to do is to convert one by one those who sit on the thrones of injustice and thus to destroy the system. But change does not happen that way, because as long as the throne remains it will always be filled by others and the oppression will remain. The only effective way of, loving our enemies is to engage in action that will destroy the system that makes them our enemies. In other words, for the sake of love and for the sake of true peace, we must side with the poor and the oppressed and confront the rich and powerful, and join the conflict or struggle against them, or rather against what they stand for and what they are defending. In countries marked by grave injustice, joining the conflict, not judging it from a distance, is the only effective way of bringing about the peace, that God wants: To take an example closer to home: in countries possessing nuclear weapons, there may be no short 'cut around conflict with governments if the world is to progress towards disarmament. It is not possible to 'balance' or 'reconcile' the needs of the 40 million people who die from starvation each year in the Third World with the needs of arms manufacturers and military strategists or the demands of a few wealthy nations to be able to destroy any potential attacker many times over. Decisions have to be made; one has to 'take sides.' Fr. Albert Nolan was until recently Provincial of the Dominicans in South Africa.-In 1983. he was elected Master General of the Dominican Order, but the General Chapter allowed him to decline the appointment in order to continue his work in South Africa. According to Gary Kenny who works at the Inter-Church Coalition on Africa (ICCAF) in Toronto, Canada, the situation of the black South Africans has, not radically changed. Changes in Apartheid thus far are relatively superficial and have given the appearance that real change is taking place. A propaganda victory for the South African government.
<urn:uuid:2c878b1f-ba7c-42ac-8867-7b41fcc5c8e7>
CC-MAIN-2020-16
https://scarboromissions.ca/Scarboro_missions_magazine/Issues/1990/February/taking_sides.php
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370524604.46/warc/CC-MAIN-20200404165658-20200404195658-00395.warc.gz
en
0.970204
3,483
2.71875
3
See what our readers had to say Bobby Halton and Bill Carey This month’s subject came from a reader curious about limiting damage during chimney fires. The February Roundtable question is: “How does your organization manage chimney fires? What tools and techniques do you employ?” Dr. Candice McDonald Chimney fires are not uncommon in rural Ohio, where many members of the community rely on wood to help heat their homes in an effort to save on heating costs. The first technique in combating a chimney fire is fire prevention education. Many home owners fail to have their chimney professionally inspected and cleaned annually. Many homeowners are unaware that the buildup of creosote can lead to a chimney fire that can warp metal and crack masonry. Homeowners are also unaware that a small crack or hole in the flue could be the perfect opening for fire to spread into their home. Responding to a potential chimney fire starts with an exterior size-up, that involves looking and listening for signs of a chimney fire. Can you hear a roaring noise, like a freight train? Can you visually see flames or dense smoke extending from the top of the chimney? Is there signs of a fire sneaking out of existing cracks in the masonry? It is important to note, fire may not be visible from the flue. It is key to identify the location as part of the size-up. It is also critical to ensure the fire has not extended into the attic or other hidden spaces within the home. This is where a thermal imagining camera can be beneficial. Although there are several ways to extinguish a chimney fire, the use of a chimney bomb from the top is one method commonly used in our area. The chimney bomb is made up of ABC dry chemical extinguishment agent in a sealed plastic bag. These bags are dropped from the top and as gravity pulls them down the bag melts and releases the powder into the flue for extinguishment. It is also important to remove the fire load and hot ashes from the firebox inside the home. After putting out the fire in the firebox, the fire load should be placed in a metal salvage bucket (which you should carry on your truck), and emptied outside where you can wet it down using a pre-staged attack line. It is critical to make sure that the fire load and ashes are completely extinguished before you leave. This can be a messy job, laying a tarp down during this salvage operation can protect the homeowner’s flooring from becoming soiled. Chimney fires are typically handled by carefully extinguishing the logs with a very light water can spray diffused with a finger. Logs are removed via salvage tub. A dry chemical extinguisher is discharged into the chimney above the damper and the damper is closed to stop the air flow. Simultaneously, crews go to the attic and roof and inspect with thermal imagers. If the first dry chemical extinguisher, does not extinguish, this process is repeated by opening the damper, discharging additional dry chem extinguishers and then closing the damper. Crews monitor or take additional actions as needed. After a good size-up of the chimney and we ensure the damper is closed we decide how to attack the fire. We have three methods for consideration; - Chimfex – This is device looks similar to a road flare that you throw into the fire box and It extinguishes the chimney fire by reducing the Oxygen in the flue. - Dry Powder Extinguisher – It basically involves using a dry powder from the bottom and involves opening the damper (which could intensify the fire) and placing the nozzle of the dry powder extinguisher into the chimney past the damper and discharge the dry powder. Keep damper open for minute then close and reassess the fire. This method tends to be a bit messy so it would be a good idea to consider tarping the floor and furnishings in the room as a public service to the occupants - Handline – This should be a last on your list to try due to the damage this will cause. It’s important to make sure the fire hasn’t spread from the chimney into attic or wall spaces, so inspecting this spaces may be needed. Depending on the circumstances, our department sends the truck crew to the roof to access the top of the chimney. Their job is to ensure there is no obstruction at the top of the chimney. From that point we would typically just use a hand line with a fog nozzle in the house and up the chimney. At times I’ve used a cellar nozzle as well. The first arriving engine officer will make entry to the house and will utilize a TIC to determine if the fire has breached through the chimney and is into the walls. If this is the case an additional engine company will make entry to assist. Remember when forcing into the walls around the chimney to be cautious of weakening chimneys and load bearing members. Other crews on scene may also be used to assist with salvage to be able to divert the water that’s coming down from the chimney. Depending on the size of the fire though it may be more beneficial to fight the fire from the top of the chimney. However, we attempt to steer clear of that due to the chances of pushing the heated gases and smoke down and back into the house, plus the chimney creates a natural ventilation area for the smoke to go. Of course building construction does come into your decision making process but to give a broad based answer (using water is always the last resort). - Life safety of homeowners - but the basic system is to keep the damper open - if fireplace has doors, shut them and then open them just enough to squeeze a small amount of a dry chemical extinguisher into the fireplace chimney area - close the doors, the natural air movement will draw will the dry chemical extinguishing agent up the chimney. - always have someone at the roof/chimney area to advise progress - may need to repeat step 2 more than one time - always check for fire extension - overhaul if needed - property conservation My department responded mostly in a suburban and rural area where wood stoves are predominant for heating and in some cases cooking so the department had their fair share of chimney fires. The fire service tends to respond casually as the thought process is the fire is generally contained within a brick lined or un-lined chimney or a metal flu that is screwed together at the joints. Many times these “simple responses” can turn into a full-fledged structure fire. Our crew instructions are to prepare to fight a house fire. One of the most serious issues is the identification of the fire spread into hidden spaces due to the sheer energy, thermal pressure and violence of the burning material consisting mostly of creosote that can shake connections or affect the integrity of a flu or chimney Firefighters have reported a “jet engine” sound at the bottom and top of the chimney or flu due to the rapidly combustion of the material and the pressure and vibration that is associated with that process. In any of these events, command needs to be established, removal of the occupants and simultaneous with extinguishment is checking for extension within the structure. Spread of the fire can be accomplished with visualization of the affected void spaces (if access is available) and/or using a TIC. Suppression techniques usually involve removal of the fuel source – removing the burning wood or turning off the gas: use a dry power bomb from the top of the chimney or a dry-chem extinguisher into the fire box and allow the updraft to suppress the fire and after the fire has cooled use a chimney chain to remove burned or unburned material allowing it to fall into the fire box, which is placed in a metal carrying box and removed from the structure. It is advised that water is the last suppression method of choice as it may crack an intact ceramic flu or loosen mortar or bricks in an unlined brick chimney or cause rapid cooling of a metal flu/chimney causing expansion or contraction of the joints possibly causing separation of the joints allowing fire spread into void spaces or into the attic. Safety of the firefighters is imperative as well. Standing on a slippery roof is dangerous to the firefighters and fire operations. Wear firefighters must wear PPE and anti-slip footwear. Our department had two sets of “corks” or “calks”, typically a logger boot with spikes and these can purchase as slip-on’s over bunker boot to ensure safe footing. As many of these events occur in the evening or night time, adequate lighting is a must either through the use of individual lights or scene lighting. Remember to use salvage covers on the floor surrounding the operational area and in the entrance and egress pathways for firefighters and deploy a CO monitor to measure the level of CO in the house and perform overhaul to prevent re-ignition. Inspection of the entire chimney or flu system to determine any breaches in the chimney structure must be made by a qualified inspector prior to continued use. I think the most important issue when responding to a chimney fire is not to take it too lightly. Company should not be returned unless the fire is definitely out or definitely under control and has no chance of spreading. The incident commander should be the first one to think of fire is burning the last one to think it’s out. Companies should be assigned to check all areas in the house where the chimney fire may spread to the house proper. This includes the basement and all floors especially the attic. Company should be sent to the roof but be very careful because old chimneys do not provide good handholds. Lines should be stretched everywhere that openings are made. I have seen or heard of departments using plastic bags filled with dry chem dropped into the chimney. When the bag melts the agent is disbursed. I always thought that was a good idea. Damage to the structure should be in line with the emergency at hand. Fear of creating too much damage has burned buildings down. Thermal imaging equipment is a must. Opening up is a necessity. As always, solid policy and solid recon should guide all activities When managing chimney fires my organization uses traditional tools and techniques depending on the severity of the fire. If the fire is primarily contained to the flu and fire box, interior operations include; a dry chem extinguisher, tarps to protect the floor, and metal bucket and shovel to clear out the firebox. Be sure to clear the entire box, and remove the contents from the structure. Utilize a trash or bumper line to soak everything down. Exterior operations include a 360 by command, laddering the roof, utilizing chimney bags (plastic baggies filled with dry chem), and a weighted chain to clear the built up creosote in the flu. Try to avoid using a can or line in the flu if at all possible as this can cause irreparable damage due to the rapid change in temperature. Obviously this is not a concern if the fire has extended outside the chimney. Once the fire has been contained, crews are sent to check for extension. It doesn’t take much to degrade the mortar and come out of the chimney between floors or in the walls. Don’t forget to check the attic or cockloft for extension as well, too easy to have hidden fire resulting in an embarrassing call back for a “rekindle.” Be aware opening the attic scuttle will allow air in feeding any fire. Always use your own ladder and not the attic fold down. Utilize TICs and feel the walls to check for heat or hidden fire. Be sure to check for CO during and after operations, and advise residents to have the chimney thoroughly examined by a professional before using it again. If the fire has extended out of the box or flu at all, it is treated like a traditional structure fire: lines are pulled, additional manpower is called for, and overhaul is completed. Priority 1 is not to become complacent. Understand that a “routine/nuisance chimney fire” has the potential to spread to combustible void spaces such as attics and in the space between ceilings and floors supported by parallel chord floor trusses. Consider a chase enclosure for a flue running up the side of a two story house. If there is no separation between the chase and the floor truss voids, fire can spread from a faulty flue vertically in the case and horizontally at each floor level; just at it would in balloon frame construction. Accordingly, operate at a chimney fire the same way you would for a fire in an old balloon-frame house: Although it may be apparent that there is a fire in the attic you must examine lower levels. Unsuspecting firefighters taking their hose line to the second floor to fight an attic fire may not realize that they have fire below them burning in the floor truss voids. Note: Responses are solely the opinion and views of the individual and have only been edited for grammatical reasons. Do you want to be part of the next Roundtable? Contact Bill Carey at [email protected]
<urn:uuid:0e6c0d94-dd6a-4e73-90a5-c75472937066>
CC-MAIN-2020-16
https://www.fireengineering.com/2020/02/09/483972/the-roundtable-chimney-fires/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371604800.52/warc/CC-MAIN-20200405115129-20200405145629-00035.warc.gz
en
0.942252
2,759
2.9375
3
© Therese Rodin Background: BOAS is short for the term “brachycephalic obstructive airway syndrome”. The term means that the syndrome applies to brachycephalic dogs and that it is manifested by the fact that there is an obstruction, i.e. a constriction, in the airways, which causes the airflow to be obstructed. A “syndrome” is “a condition in which there are deviations and injuries in several of the body’s organs and which have a common cause” (Definition from Karolinska University hospital, my translation from Swedish). On the web page of Universities Federation for Animal Welfare it says that most likely, all Pugs have BOAS to some degree, simply because of their brachycephalic shape of the head (ufaw 2016). This is confirmed by Dr. Ronja Mock, specialist in throat, nose and ears at the Klinik für Kleintiere at the University of Leipzig, who says that all Pugs to some degree have aberrations in their airways that is due to BOAS (Mock, private communication). Thus, a dog diagnosed with BOAS has some form of obstruction of the air flow in the airways, and depending on the degree of BOAS, there is a corresponding degree of respiratory distress. Professor Oechtering writes that there has been an excessive selection to produce snub nosed dogs with ever shorter noses in recent decades, which has led to that the “function has been drastically inhibited”, i.e. the syndrome has worsened, and it also occurs at an earlier age (Oechtering 2010: 2). In the past, three obstructions of the upper respiratory tract were seen in snub nosed dogs: stenotic (cramped) nostrils, an extended soft palate, and everted laryngeal saccules in the upper airways. More recently, a stenosis (narrowing) has also arisen in an inner, invisible part of the nostril. Another obstruction in the upper respiratory tract which is much more common today is that the concha, the folded mucous membrane that causes cooling, has been softened and can penetrate forward due to lack of space and clog the nasal cavity. It can penetrate backwards as well and clog the way down to the throat. It has been found that the mucous membranes have thickened in Pugs and that in a Pug of 10 kg they can be twice as thick as in a German Shepherd of 40 kg. Regarding the soft palate, it is not only prolonged, but in many cases it has thickened considerably as well (Oechtering 2010: 3f.). The larynx can also be affected by BOAS. In Pugs, it can collapse because the cartilage in the larynx lacks stability and resilience. The same problem can be found in the trachea of Pugs. The air tube body consists of cartilage, which can have a lack in stability and therefore collapse. The slackness can also continue in the bronchi, which can collapse as well. (Oechtering 2010: 5f.). BOAS is a progressive disease, i.e. it gets worse over time. This means that a young dog with BOAS has milder symptoms than it will probably have with increasing age (Bartels et al. 2015: 332). Packer et al. write that dogs that have serious BOAS exhibit little or no activity because they are fully occupied with getting enough oxygen (2015: 3). Stress, arousal, or exercise can cause these dogs severe respiratory distress and even death. BOAS thus to varying degrees, leads to difficulties in activity. Since the folded mucosa that cools the dog does not have enough room in the Pug’s nose, the Pug may not cool off its body like an ordinary dog, and thus it runs the risk of overheating during hot weather and during activity. Another symptom of BOAS is snoring and grunts. The limitations of the respiratory tract can also cause sleep disturbance. Furthermore, the incorrect pressure in the thorax not only leads to BOAS but also to damage in the gastrointestinal tract which is expressed, e.g. through regurgitation and vomiting (Packer et al. 2015: 2-3; Liu et al 2017: 2). In general, it can be said that the less brachycephalic, the better the conditions for good breathing. One aspect that recurs among the researchers is that the nose needs to be longer (Oechtering 2010: 9; Bartels et al. 2015: 332; Packer et al. 2015: 1, 8f.). Packer et al. concluded that the risk of BOAS increases sharply in pace with shorter noses in the dog. In their study, only dogs that had a nose length shorter than half the length of the skull were affected by BOAS. (Packer et al. call the relationship between nose length and skull length craniofacial ratio, CFR.) The Pugs that had the shortest nose, with a nose length that was 3% of the skull’s measure from the stop to the occipital protuberance (CFR = 0.03), had a 95% risk of being affected by BOAS . In dogs where the nose length was 21% of the length of the skull (CFR = 0.21) the risk of BOAS was 48% (Packer et al. 2015: 1, 9, 16). Liu et al. also found a covariation between stenotic nostrils and BOAS, where 65.3% of the Pugs had stenotic nostrils and 64.6% of them had clinically relevant BOAS (which they call BOAS (+)). The Pugs that had moderate or severe stenotic nostrils had 4.58 times increased risk of BOAS (+) (2017: 6). The researchers advocate that the assessment of the degree of stenosis of the nostrils is something that can be used in the breeding selection, but together with the assessment of the breathing in an exercise test (Liu et al. 2017: 11). In a previous study, they had produced an illustrated scale for assessing stenosis of the respective breed where open and mildly stenotic nostrils were considered non-clinically relevant, whereas moderately and severely stenotic nostrils had a clear connection to clinically relevant BOAS. Here is Liu et al:s illustrated scale: A large neck girth and a short and wide skull have shown correlation with BOAS as well. In addition, Liu et al. found that the sex affected BOAS since the Pug bitches in their study had 5.35 times higher risk for clinically relevant BOAS (Liu et al. 2017: 5). As we saw above, Oechtering diagnoses the degree of BOAS by entering the respiratory tract to see how it looks. This is done with an endoscope and by CT-scanning the dog’s airways. It is an extensive and expensive procedure to do such an examination, and as a rule this is only done on dogs that may need surgery. Various researchers have tried to develop other, simpler methods of measurement, and in general, exercise tests and identification of external characteristics that co-vary with BOAS are used. The research group in Cambridge (to which Liu et al. belong) has developed a so-called “whole-body barometric plethysmography (WBBP)”, with which they measure the degree of BOAS. WBBP is a box where you can change the air pressure to see how well the dog’s airways work (Cambridge BOAS group WBBP). It fulfills the same function as an exercise test. The dog is neither sedated nor anesthetized, and thus the method is gentle for the dog. The researchers in Cambridge have also developed an exercise test where the dog runs 6–7 km per hour for three minutes. Immediately after the exercise, respiratory patterns, respiratory sounds, etc. are examined. You can look at their form for the test here: (Cambridge Pug grading system 2018). This test is also used at the Tierklinik Hofheim in Germany, for examination of Pugs regarding BOAS. It is important to note that exercise tests, such as with the plethysmography or by walking or running, provide information about BOAS in terms of function. A dog that has good function can still have aberrations in the airways that are due to BOAS. As mentioned earlier, it is likely that more or less all Pugs have BOAS, and that applies to the findings found with endoscope and/or CT scan, while exercise tests can more often “clear” a Pug from BOAS. Goal: No Pug shall have more than mild BOAS at an exercise test designed by specialists and tested by certified testers. Strategy: Since extremely brachycephalic traits are a major risk factor for BOAS, the Pug should be bred towards a less brachycephalic type. As we saw above, Packer et al. write that BOAS only occurs in dogs with a CFR below 0.5. We do not believe that it is realistic, or even feasible, to breed Pugs that have a CFR above 0.5 in the near future since the Pug genes affect the length of the muzzle. In Packer et al:s study BOAS was reduced to 50% when the CFR was about 0.2. We suggest that as a first step, at the choice of breeding partner, the average measure of the CFR of both dogs should be 0.2–0.25. Thus, if one of the parties has a short nose this should be compensated through the choice of a partner with a much longer nose. We should assess the nose length of the progeny successively and strive for a CFR that is about 0.3. Although the Pug genes will affect the length of the muzzle and shorten it, we are optimistic about the possibility to lengthen the Pug’s nose. There are likely to be several, possibly many, genes involved in the shortening of the muzzle and we believe that through careful selection, including the addition of a donor breed, it is possible to gradually and safely lengthen the Pug’s skull and muzzle. We also need to consider the stenosis of the nostrils and preferably let the Pugs with open and mildly stenotic nostrils be used in breeding. A Pug with moderate stenosis should only bred with if it does not have clinically relevant BOAS. Also, the shape of the skull is important, and there we need to aim for a skull that is more long than wide. (See more about this in the longer version of BOAS.) If Liu et al:s observation is correct, that bitches run a much higher risk of developing BOAS, it is important to strive even more away from the brachycephalic form in the bitches. Pugs that are used in breeding may have at most BOAS I according to the table below. It is often possible to judge at the age of one year how the airways will look like in the adult Pug; at that age, the symptoms of BOAS are usually present which may become more severe due to air resistance. To have a margin, BOAS should first be measured at 18 to 24 months of age. Through a strategy that takes into account all parts of what has been mentioned above; CFR, nostrils, BOAS exercise test, skull shape and donor breed, we believe that we have great conditions for breeding healthy, sound Pugs with free airways. Sources and further reading: Bartels, A. et al. 2015. ”Brachycephalic problems of pugs relevant to animal welfare”. Animal Welfare 24, 327–333. Cambridge BOAS Research group. www.vet.cam.ac.uk/boas Liu, Nai-Chieh et al. 2017. ”Conformational risk factors of brachycephalic obstructive airway syndrome (BOAS) in pugs, French bulldogs, and bulldogs”. PLoS ONE 12, e0181928. doi: 10.1371/journal.pone.0181928. Oechtering, Gerhard. 2010. “Brachycephalic syndrome – new information on an old congenital disease”. Veterinary Focus 20, 2–9. Oechtering. Gerhard. 2016. Professor Oechterings lecture about BOAS at the Swedish Kennel Clubs conference in 2016 about brachycephalic dogs. Packer, Rowena M. A. et al. 2015. “Impact of Facial Conformation on Canine Health: Brachycephalic Obstructive Airway Syndrome”. PLoS ONE 10, e0137496. doi:10.1371/journal.pone.0137496. ufaw.org.uk. 2015. “Research shows high risk of breathing problems in dogs with short muzzles” http://www.ufaw.org.uk/ufaw-news/news/post/168-research-shows-high-risk-of-breathing-problems-in-dogs-with-short-muzzles ufaw.org.uk. 2016. “Brachycephalic Airway Obstruction Syndrome (BAOS)” www.ufaw.org.uk/dogs/pug-brachycephalic-airway-obstruction-syndrome Chapters in Strategies for the breeding of Healthy Pugs - Hips, Elbows and Patella - Hemivertebrae and other vertebral anomalies - Spinal Arachnoid Diverticulum (SAD) - Pug Myelopathy (PM) - Degenerative Myelopathy (DM) - PDE/NME and other non-viral induced encephalitides - Brachycephalic Obstructive Airway Syndrom (BOAS) - Dentition and mouth health in the Pug - Eyes (Brachycephalic Ocular Syndrome) - Mating and Fertility - Mentality (work in progress) - Genetic diversity
<urn:uuid:beffe215-1144-43dc-b2ad-f2b7bd709223>
CC-MAIN-2020-16
http://pugdogpassion.com/brachycephalic-obstructive-airway-syndrome-boas/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371604800.52/warc/CC-MAIN-20200405115129-20200405145629-00036.warc.gz
en
0.950134
2,966
2.75
3
In doing so, they not only broke international law by violating Belgian neutrality, 28 but also by conducting a war against Belgian civilians, they paved the way for German war crimes. To the great surprise of the German military commanders, the Belgian people did not accept the violation of their neutrality. From the outset rumours spread among German soldiers that Belgian civilians carried out cunning ambush attacks. Some German intellectuals tried at the time to legitimize this obsession with academic arguments. In addition to the legend of the Franc-tireurs , rumours of Belgian mutilating the wounded and desecrating fallen soldiers spread both among German soldiers and the general public in Germany. As early as the Belgian sociologist Fernand van Langenhove published a study, based on German sources, testimonial evidence of soldiers, newspaper coverage, and official documents, of the origin, logic, and dynamics of these rumours. He showed how they had arisen from military letters sent by ordinary German soldiers and from accounts given by wounded soldiers. Taken up by the newspapers and revised in their accounts, the rumours contributed widely to the shaping of German public opinion. Soldiers, in this situation, had repeated as truth the stories they had heard. And these rumours, Marc Bloch explained, in turn prompted German soldiers to exercise extreme violence and brutality against Belgian civilians. In the meantime, the northern line of the German army invaded the town of Leuven killing two hundred citizens and destroying a large part of the historical city centre. During this attack the library of Leuven was burned down. Within a period of only a few weeks German soldiers killed more than six thousand Belgian civilians. It was two German-Jewish officials who accused Bloch of insults, and he was imprisoned in May The later global historian and British citizen Arnold J. Some of these photographs are presented above. Because Toynbee was once a famous personality with international reputation a brief excursus should be inserted here. The British historian Arnold J. Toynbee, who would become renowned as a world historian owing to his twelve volume A Study of History , published from to , 51 an indisputable precursor of global history, 52 was in spring employed as a tutor in Oxford following his university education in Oxford and Athens in ancient history. At this momentous time, he found himself compelled to engage in current problems and global politics. Among his publications were comprehensive documentations of the Armenian genocide and of German warfare in Poland. In light of the German atrocities in Belgium in summer and autumn , the question remains: what was the perception of German Jews in Belgium, some of whom served as soldiers in the German army, others as rabbis for those same soldiers stationed there? How, that is, did German Jews perceive this violence against Belgian civilians and this new quality of war, which was now directed against the civilian population? And how did the German-Jewish public sphere, as well as Jewish intellectuals in Germany, become aware of the violation of Belgian neutrality and German atrocities there? Among the German-Jewish contemporary witnesses who served as soldiers in the occupation of Belgium were the young Werner H. The war letters of German and Austrian Jews collected and published in by the journalist Eugen Tannenbaum include one from Werner H. Werner H. Levy kept a diary of his wartime deployment. On the next day he left his town by railroad, crossed the Rhine on August 4 th , and by midday he entered Belgium together with his company. Already on this very first day in Belgium he made note of an attack by Franc-tireurs , which left five soldiers dead and fifteen wounded. On August 7 th , his troop moved to Liege, where he examined the coffins at the cemetery for hidden weapons. Soberly, Levy wrote of burning houses, fleeing citizens, and many dead Belgians. On August 25 th , he marched into France. After Werner H. Theilhaber, a Zionist physician and author of several social-science studies on Judaism. The Belgian people were quite haughty, he wrote, adding reproachfully that - in their own minds - they were envisioning the Belgian army returning to their own capital. Hate and emotion had suppressed every conversation. Germany will destroy us. And all for what? Entering the destroyed city of Leuven some days later, Theilhaber noted simply that the spooky collapsing ruins had made little impression on him. Arriving at the station of Liege he noticed German soldiers with machine-guns, but he remarked that the town is by and large quiet. In his report he then wrote about how he attended, together with several German-Jewish soldiers, the service in the Brussels main synagogue during a religious holiday. With approval he noted that the Jewish community of Brussels had offered seats in the front rows to the German Jews. The most heart-rending moment, Italiener wrote, came immediately after the prayer for the Belgian king, when the organ softly played the Belgian national anthem. There is no House of God in Belgium where sorrow for the poor country is felt more deeply. In conclusion, he maintained rather that Belgium had many reasons to criticize itself. To conclude, one can observe from these accounts that the German Jews serving in Belgium had no notion of the atrocities of German warfare in Belgium; indeed, many other documents provide accounts that substantiate this view. The German Jew Alice Fabian, for example, working for the German central purchasing company in Brussels, wrote soberly in a letter from November 6 th , , that the Belgians are extremely anti-German, so that one should be wary of them. He described his march through Belgium as a summer trip, during which he experienced a grand display of pyrotechnics, and before entering Liege he told of different kinds of amusements, for instance, with firecrackers. At the beginning of August , declaring that Germany is at war and still warning that Europe is on the eve of terrible and momentous events - on the eve of a global conflagration - the Allgemeine Zeitung des Judentums still pointed to Belgian neutrality. The paper noted as well that Belgian prisoners of war, captured near Liege, were on their way to Germany. In the very next issue, the Allgemeine Zeitung des Judentums assured its readers that its suspicions about the great suffering of German Jews fleeing Belgium were confirmed. The Germania , too, had picked up the rumours about the behaviour of Belgian Franc-tireurs , reporting that they had committed unspeakable cruelties against infants and old people alike. In the same issue, the Allgemeine Zeitung des Judentums informed its readers that German soldiers had entered Brussels. The soldiers, Geiger emphasized, were not to blame but rather the citizens who had fired with nefarious blindness at the German soldiers. The weekly war report of this issue made overt use of the term Franctireur , again accusing Belgian civilians of having taken part in the fighting, and the report in Allgemeine Zeitung des Judentums additionally declared that the advance into Belgium is one of those enormous and admirable acts that are very rare in world history. The reflections of the Orthodox newspaper Jeschurun were different. In October , the rabbi and journal editor Joseph Wohlgemuth wrote in a lead article that at a historical moment in which the vital interests of its people are in danger every nation will violate international law. Another German Jewish journal, the Israelitische Familienblatt from Hamburg even used biblical arguments to try and legitimize the violation of the Belgian neutrality, citing an episode from the Book of Moses. Therefore, the Israelitische Familienblatt wrote, Germany has the right to make its way through Belgium according to the spirit of the Bible. Even the journal Ost und West in the summer of added its voice to the chorus of enthusiasm for the war. Most surprising for its authors was the hatred toward Germany in the neutral countries and those countries that were like Germany. Here, the article proclaimed, the hatred appears masked but is nonetheless present, and hence the German-Jewish journalists decidedly condemned the Franc-tireurs. Furthermore this article from the journal Ost und West drew an analogy between the hatred directed toward Germany and hatred directed toward the Jews. Philippson was very familiar with public opinion in Belgium, thanks to his own longstanding activities at the University of Brussels. In , however, he returned to Germany for reasons that remain unclear, but the move was conceivably motivated by anti-German attitudes among Belgian students. Other voices speak of a democratic opposition on the part of students against authoritarian attitudes among the professoriate. Whatever his reasons, Martin Philippson must have been very aware of Belgian attitudes and that the violation of Belgian neutrality by German troops would trigger broad resistance within Belgian society. In his article, however, Philippson complained about the deep mendacity and immoral insidiousness with which the enemies of Germany had over the years prepared for this war. He also attacked the dreadful atrocities and murderous deeds that the Belgians now ostensibly carried out. Responding to the rumours about the Franc-tireurs , Philippson in a bizarre twist condemned the malicious attacks by civilians. The rumours of the Franctireur atrocities had exerted so great an influence on the German public sphere that even an author like Arnold Zweig, later known as a convinced pacifist, was unable at this historical moment to evade their mass psychological impact. In The Beast Zweig tells the story of the brutal and sadistic murder of three innocent German soldiers committed by a Belgian peasant. Shortly thereafter, the three German soldiers arrived, asking for quartering. The peasant offered them accommodation and gave them alcohol to drink. After having gotten them drunk he murdered them in bestial fashion. In the summer of the vast majority of German Jews believed these rumours, and Arnold Zweig was by no means the only one to harbour this kind of a belligerent attitude. Even Martin Buber succumbed to German war mania and internalized the rumours. Martin Buber shared his belief in these rumours with such a sensitive philosopher and sociologist as the baptized Georg Simmel. Even if Stefan Zweig was an Austrian and not a German Jewish writer, it might be helpful to reflect on his experiences here, too, first because of his former friendship with Belgian authors, second because his biography illustrates sharply the emotional confusion and personal discord caused by the German occupation of Belgium, and third because he contributed definitively to the German public sphere and to the German Jewish audience. Finally, he impressively described in retrospect the fundamental break brought about by the First World War, for both general European history and European Jewish history. Verhaeren was an intimate friend, whose poems Zweig had translated into German and whom he had portrayed sensitively in the German journal Das literarische Echo in Some days later Zweig must have read in Austrian newspapers about the legends of the Franc-tireurs , and he confessed in his diary to be shocked by the news from Belgium. On September 19 th , Zweig published an open letter in the German newspaper Berliner Tageblatt to his friend abroad. There he publicly broke with his Belgian friends. Verhaeren has published a poem that is nearly the most stupid and infamous thing that can be thought. A kind of intellectual confusion had overcome the German Jewish writer and journalist Heinrich Eduard Jacob. In September he travelled as war correspondent through Belgium and the following year published his diary "Travel through the Belgian war. Among the few German Jewish intellectuals who resisted the mass psychological suggestion of war fever in summer was the utopian messianic writer and political philosopher Ernst Bloch. Bloch went into exile in Switzerland during the conflict, publishing from there sharp critiques in the Bern newspaper Freie Zeitung. Victor Klemperer, by contrast, believed at the very outset of the war that Germany might be innocent, as he noted on August 5 th in his diary. And would one not, he continued, declare those actions as natural and brave that in the case of Belgium are seen as a symptom of lust for murder? In the entry of the same day Klemperer denounced the bombardment of the town of Antwerp by German Zeppelins. For this kind of cruelty there is still no paragraph in international law, he noted with resignation, but the international law in this case would in any event have been eluded. He also condemned the military forces for their cruel handling of Belgian civilians. Like Eisner, Eduard Bernstein also sharply criticized German belligerence. Hardcover; Language: German; ISBN ; ISBN Start reading Die Bestie von Weimar (German Edition) on your Kindle in under a minute. Download and Read Free Online Die Bestie von Weimar (German Edition) Michael Buttler. From reader reviews: Adam Rucks: Nowadays reading books are . In Bernstein published the book The Mission of the Jews in the World War , in which he called attention to the contradictory arguments in the pro-German attitudes of Russian Jewish delegates at a recent conference of socialists from neutral countries. In conclusion, it is worth noting that none of the evidence suggests that the German atrocities in Belgium were directed in any way against Jews or that the occupation policy had a specific anti-Semitic character. On the contrary, there is a document telling of a German soldier who saved a Belgian citizen because the person was Jewish. In August , the majority of German Jews shared the attitudes and opinions of the vast majority of other Germans. They did not criticize the German occupation of Belgium or the violation of the neutrality of this small country. They did not discern the new quality of warfare as a war against the civilian population, which it became during the German fighting in Belgium. The war, in this way, had rather created in its very first moment a complicated or peculiar kind of Christian-Jewish cohabitation in Germany. Even if this social coexistence ultimately broke down over the course of the war, it was so strong at the beginning that German patriotism even superseded the well-known intra-Jewish conflicts between liberal, orthodox, and Zionist Jews in Germany. They all shared, at the moment of the declaration of war, the same German patriotic attitude and the same belligerent dispositions. There were some German Jews who did not succumb to the militaristic view and did not support the German invasion of Belgium, but they were more the exception than the rule, and their attitude occasionally led to the end of old friendships like that between Ernst Bloch und Georg Simmel. Even friends like Albert Ballin and Theodor Wolff disagreed with respect to German policy towards Belgium as Wolff noted in his diaries. In contrast, Wolff, as editor of the most important liberal newspaper in Germany at the time, the Berliner Tageblatt , expressed serious reservations about this policy. Despite these exceptions and these individual atonements, the Great War in one sense unified German Jewry in the way it evoked an ambivalent unity of the previously contested German Jewish public sphere. On the other hand, the war seemed to have destroyed the former transnational bond that linked European Jewry and the intellectual exchange of Jews in Europe. Whereas Martin chose to support Germany after his stay in Belgium, taking part in German patriotism and promoting the militaristic line, his brother Franz, who had moved to Belgium just before Martin, remained strongly integrated into Belgian society as well as the Belgian Jewish establishment before He was a member of the Consistoire Israelite de Belgique and temporarily president of the Jewish community. He then lost his youngest son in the war, who died as a Belgian soldier in The situation was most problematic for those German Jews who had lived in Belgium and were expelled from the country in August , as happened to a young Jew named Wagner from Siegburg. His situation was exacerbated by the fact that he was conscripted to serve as a foot soldier near the Belgian border. As the German military rabbi serving in Rethel wrote to the association of German Jews, Wagner chose to defect when the opportunity arose. He came across a video of me playing his piece "Waves Dance" and he decided to write a new piece dedicated to me. When it was published he sent it to me and wrote me a handwritten letter, explaining how at 80 years old he did not own or care much for computers, but a friend of his showed him my recording and he decided to dedicate a new piece to me. I was very moved and happy when I received his kind letter! I always hated having to tune every 2 minutes af My first outdoors video is coming out next weekend! Something very cool is coming up! We recorded a video! We recorded this last weekend before a concert in Baden-Baden. To fully experience the 3D sound, watch the Changing strings is a serious business! New videos of the Weimar Guitar Quartet coming up soon! New video coming up soon! Late night practice of Divagazioni, a charming piece written for me by the Italian composer Claudio Decoti! Thanks again to everyone who supported us in this project. For all our preorders, we hope you have enjoyed listening to the CD! Here is a photo from our recent visit to Weimar to celebrate along with our sound engineer Leopold Stoffels! We also discussed all of our upcoming plans, concerts, and recordings for Will be a fun year! Visit us at weimarguitarquartet. Lots of times my mind wanders and it is all too easy to ignore the sound of the metronome. What helped me immensely with this is the Soundbrenner Pulse! I would love to hear from you guys.
<urn:uuid:ccafb4df-1c58-4055-bb03-a22346eb0d3b>
CC-MAIN-2020-16
http://dynipalo.tk/comedy/die-bestie-von-weimar-german-edition.php
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00314.warc.gz
en
0.975321
3,602
3.203125
3
Merriam Webster defines first aid as emergency care or treatment given to an ill or injured person before regular medical aid can be obtained (Merriam Webster, 2014). Obviously one of the problems you may encounter in an emergency is lack of timely medical care. If the country collapsed today would anyone be able to seek medical care other than what you or others could provide in the form of fist aid. It is important that you know how to treat some of the more serious conditions that could be fatal if not treated in a timely manner. 1.) CPR (Cardiopulmonary Resuscitation) The following is only a guide and should not be considered medical advice or a substitute for taking an accredited CPR training course All references to medical treatment are informational only; you should always seek medical help as soon as possible CPR combines mouth-to-mouth resuscitation with chest compressions. In other words, the person performing CPR is providing blood flow by compressing (pumping) the heart and providing the body with oxygen through mouth-to-mouth resuscitation. The heart compressions will pump blood to the organs and brain providing them with lifesaving oxygen. Do not let lack of training stop you from attempting to save a person’s life. Many people are not trained in CPR and/or are not willing to perform CPR because of legal considerations, and fear of contacting a disease when doing mouth to mouth. Professional first aid kits will have resuscitation masks that can protect you from an infectious disease. You can purchase resuscitation masks and carry them in your car, purse, satchel, briefcase, first aid kit, home emergency kit or survival/bug-out-bag. If you have no training at all you should still administer chest compressions and call for others that may be able or willing to administer mouth-to-mouth, with or without a protective mask. To Perform Chest Compressions - Place the heel of one hand on the lower half of the person’s breastbone. - Place the other hand on top of the first hand and interlock your fingers. - Press down in a firm manner, compressing to 1/3 of chest depth, compress 30 times. - Administer 2 breaths as described below in mouth-to-mouth - The ratio of 30 chest compressions followed by 2 breaths is the same, whether CPR is being performed alone or with the assistance of a second person. - Aim for a compression rate of 100 per minute. To Perform Mouth-To-Mouth Resuscitation - Clear the airway (Make sure there are no objects in the persons mouth) - Open the airway by tilting the head back and lifting the chin - Pinch the victims nostrils shut with your finger and thumb - Put your mouth over the person’s mouth and blow into their mouth. - Give 2 full breaths to the person, this is called “rescue breathing” - Ensure no air is leaking and the chest is rising and falling - If the chest does not rise and fall, check that you are pinching the nostrils tightly and sealing your mouth to theirs - If still no chest rise, check the airway again for obstructions - Continue CPR, repeating the cycle of 30 compressions then 2 breaths until professional help arrives and/or the person recovers 2.) Controlling Bleeding Wounds pumping or “spurting” blood means that an artery (arterial bleeding) carrying blood from the heart has been severed. This type of wound is fatal in minutes if you cannot stop the blood loss. Typically, you treat this type of bleeding wound before administering CPR unless you have extensive medical training and can make a determination otherwise. This type of wound requires direct and firm pressure by any means available. First aid kits will have “compression bandages” for this type of wound. “Pressure bandages” are used when the blood is not pumping from the wound. Place the bandage or other material directly over the wound and compress to staunch the flow. The bandage will become soaked with blood and if available add another bandage without removing the blood soaked one. Do not release the pressure until the blood flow stops. Once controlled secure the bandage to the wound and raise the wound above heart level if possible. The bandage needs to be tight enough to stop blood loss, but not so tight, it completely restricts blood flow to the surrounding tissue. When should you apply a tourniquet? If there is an amputation of a limb or the wound will not stop pumping blood. A tourniquet is a constricting band placed ONLY around an arm or leg to control bleeding. How to Apply a Tourniquet A tourniquet is a last resort measure to stop blood loss from a wound or to control bleeding resulting from an amputation. Ideally, you would use material designed for use as a tourniquet, but you can use a bandana, gauze or other material. Do not use wire or thin cordage. When using other than a rubber band type material you will need to use a stick or stick like object ridged enough to insert and twist the material tight. Place the tourniquet 2 to 4 inches above the wound (never directly over the wound) between the wound and heart. Tighten until the bleeding stops. It is important that you remove the pressure every 20 minutes to allow blood flow to the limb to reduce tissue damage this is to prevent gangrene. Place a large “T” on the person’s forehead and the time you applied the tourniquet on the victim’s forehead or otherwise mark the time it needs to be loosened somewhere where it can be seen by others. This is to alert rescue personnel or others to the fact the person has a tourniquet in place and the time applied. If you are, the victim and are alone do not loosen the tourniquet for fear of passing out and bleeding to death. 3.) Treat for Shock/Prevent Shock Assume shock is present or will occur and treat for it after a heart attack or any trauma to the body. The treatment for shock is also used to prevent shock. You should not waste time looking or waiting for symptoms unless you are a trained medical professional so once again assume the person has shock or will have shortly and treat for it. - If the victim is conscious keep them warm, and raise their legs up to 16 inches to increase and improve blood flow to the brain, lungs and heart. Do not raise the legs if you know or suspect a bone fracture of the leg and it has not been splintered or if the victim has an abdominal injury or bleeding head wound. - To treat yourself place your head lower than your feet by elevating feet, or lay the head downhill if the terrain permits, use a tree, rolled sleeping bag, or backpack to elevate feet - Loosen restrictive clothing - If unconscious turn the person’s head sideways to prevent them from choking on their vomit or other fluids in the throat or mouth - You want to control body temperature so this includes not letting them get overheated as well as not letting them get chilled 4.) Suture Wounds Control bleeding before attempting to suture a wound. Sutures used to close flesh are not necessarily used to stop bleeding unless a trained professional is attempting to suture a severed artery. Closing a wound helps prevent wound contamination and to help promote healing and to some extent for cosmetic purposes. How do you know if the wound needs stitching? Lacerations can be closed with stitches or staples. Puncture wounds or cuts caused by scrapes or where the flesh is literally flapping or ragged at the edges, are not sutured usually unless performed by a trained professional. First, can you see any yellow fat tissue or bone and is the laceration ¼ inches or more deep, if so stitches are likely needed? Ask yourself first however, if the wound could be closed using butterfly bandages or surgical tape. When closing the wound do not overlap or stitch too tight, because this can cause cross-hatching and cause ischemia of the wound edges, increasing the risk of infection. Stitching a wound to some people can be an invasive technique so attempt to close the wound with strips of surgical tape or bandages first if the patient is fearful of the process. If the wound will not scab over after a few days with bandages or tape then it will need to be held together with sutures or otherwise, the wound will not heal and will become infected easily. 5.) Treating a Broken Limb If you suspect or know a bone is broken in a limb immobilize immediately (treat as if broken until verified otherwise by a medical professional). If the bone is protruding from the skin, stop the bleeding first. Apply a splint if possible and secure above and below the break or suspected break area. Pad the splints and apply ice by wrapping in material first never apply ice directly to the skin. Treat for shock, regardless of symptoms. Do apply tape used to secure the splints such as duct tape directly to the skin. When rushing to aid someone ensure you do not become a victim yourself. Check the area first, such as for traffic, falling limbs, and rocks or to prevent a fall. If treating someone in an oxygen free environment and there is oxygen masks available treat yourself first so you are able to render aid. Obviously, no one article or even book can cover all of the possibilities so the more likely have been referenced. Cardiac arrest will be more common in a survival or crisis situation because of an increase in stress and physical activity. Mechanical injuries (broken bones) will also increase due to an increase in physical activity. Bleeding wounds can be caused by any number of things and if not treated quickly can be fatal. Shock is a byproduct of any trauma to the body and it can be present in all situations presented here and numerous other situations as well. Make sure your first aid kit is up to date, and that you know how to use the supplies it contains and it is capable of treating a variety of conditions.
<urn:uuid:00e6e172-9934-479a-aafa-3f086b3ca5af>
CC-MAIN-2020-16
http://prepforshtf.com/first-aid-skills-every-prepper-know/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371810807.81/warc/CC-MAIN-20200408072713-20200408103213-00274.warc.gz
en
0.92158
2,124
3.671875
4
Children’s Environmental Health in Michigan Respiratory Health and Asthma: Second Hand Smoke (Repiratory Health) Indoor air quality is an important indicator of children’s environmental health. Children spend approximately 80-90% of their time indoors. Exposure to indoor air contaminants including second hand smoke, mold spores, and volatile organic compounds may result in adverse health impacts (AAP 2003). The following two sections of this chapter will investigate these pollutants, provide analysis of the effectiveness of policy measures in Michigan and other states and recommend best practices for addressing indoor air quality issues in Michigan. Second Hand Smoke “Secondhand smoke (SHS) contains at least 250 toxic chemicals, including more than 50 that can cause cancer (Harris et al. 2009).” The U.S. Environmental Protection Agency and the International Agency for Research on cancer have both classified SHS as a known human carcinogen. Second hand smoke exposure has been associated with an increased risk of lung cancer development for nearly three decades (Asomaning et al. 2007). Nearly 60% (22 million) of children in American, aged 3-11 years, are exposed to second hand smoke (Harris et al. 2009). This section provides background information on the presence and potential health effects of second hand smoke and reviews existing Michigan policies related to environmental tobacco regulation. Best policy practices from other states are highlighted and recommendations are provided to further protect Michigan’s children from exposure to second hand smoke. Secondhand smoke (SHS) causes numerous negative health effects, including neurotoxicity, respiratory disease and cancer. According to the U.S. Surgeon General exposure to SHS can cause lung cancer, heart disease, and respiratory effects in nonsmokers, and increase the risk of Sudden Infant Death Syndrome (SIDS), acute respiratory infections, ear problems, and more severe asthma in children (USDHHS 2006) and therefore will be discussed in all chapters of this report. This section discusses the asthma and respiratory health effects of SHS exposure. Other sections detail the neurotoxic and respiratory effects of SHS exposure, present leading policy practices from other states (including laws and policies providing for smoke-free indoor air and tobacco prevention efforts), and provide policy recommendations on how to minimize childhood SHS exposure in Michigan. Sources of Second Hand Smoke Secondhand smoke (SHS) consists of both “mainstream smoke,” the smoke exhaled from the person smoking and “sidestream smoke,” the smoke emitted from the burning end of a tobacco product (NCI 2007). SHS is also commonly referred to as “environmental tobacco smoke” (NCI 2007). In the U.S., cigarettes are the predominant source of SHS, followed by pipes and cigars (NCI 2007). Cigarette smoking releases a complex mixture of toxicants including nicotine, carbon monoxide, and cyanide (GBPSR 2000). Over 4,000 different compounds have been identified in tobacco smoke, and at least 250 of these chemicals are known to be toxic or carcinogenic (USDHHS 2006) The composition of SHS is influenced by many factors including the type of tobacco, the extent of chemical additives to the tobacco, the type of paper used to wrap the tobacco, and the way the tobacco is smoked (NCI 2007). Asthma and Secondhand Smoke Children are more vulnerable to the effects of secondhand smoke (SHS) because their bodies are still developing. Additionally, children breathe in significantly more air per unit body weight than adults, meaning that they may have higher rates of exposure to SHS than adults (Landrigan 2004). Exposure to SHS can cause asthma in children who previously did not show symptoms, and can also trigger asthma attacks and create more severe symptoms in children with existing asthma (EPA 2011). A 1992 report by the U.S. Environmental Protection Agency estimated that between 200,000 and 1,000,000 asthmatic children have had their condition worsened by exposure to SHS (EPA1992). There are a number of mechanisms through which SHS exposure might contribute to asthma, including SHS-mediated effects on the immune system, changes to neural reflexes controlling the airway, and induction of bronchial hyper-reactivity (USDHHS 2006). One study found that asthma severity in asthmatic children increased with parental smoking, and that children exposed to tobacco smoke in the home also had more allergic manifestations than those who were not exposed (Radic et al. 2011). In addition to asthma, SHS exposure in infants and children under six has been linked to bronchitis and pneumonia (EPA 2011). Furthermore, babies whose mothers smoked during pregnancy or who are exposed to secondhand smoke after birth have weaker lungs than unexposed babies, increasing their risk for many respiratory health problems (USDHHS 2006). Children exposed prenatally may develop persistent respiratory problems due to morphologic and metabolic changes once SHS crosses the placenta, and also due to structural changes in the developing lung (USDHHS 2006). Moreover, SHS exposure has been causally associated with an increased risk of Sudden Infant Death Syndrome (SIDS) and evidence suggests an association between early-life SHS exposure and a variety of childhood cancers (USDHHS 2006). Childhood Exposure to SHS Please refer to Chapter I, Section VII (link to subsection here) Policy Summary and Analysis Please refer to Chapter I, Section VII (link to subsection here) Summary of Policy Recommendations for SHS in Michigan Please refer to Chapter I, Section VII, (link to subsection) American Lung Association (ALA). State of Tobacco Control 2009: National Grades. http://lungaction.org/reports/rank-states06.html. American Academy of Pediatrics (AAP). 2003. Pediatric Environmental Health, 2nd ed. American Academy of Pediatrics. ISBN: 1-58110-111-2. The Annie E. Casey Foundation. Kids Count Data Center. 2012. Retrieved from: http://datacenter.kidscount.org/data/bystate/Rankings.aspx?state=MI&ind=5383. Carpenter C, Cook PJ. 2008. Cigarette taxes and youth smoking: New evidence from national, state, and local youth risk behavior surveys. Journal of Health Economics 27(2):287-99. Campaign for Tobacco-Free Kids. (2006, July 27). Smoke-free laws encourage smokers to quit and discourage youth from starting (Fact sheet). Retrieved August 28, 2009, from http://www.tobaccofreekids.org/research/factsheets/pdf/0198.pdf Campaign for Tobacco-Free Kids (2008, July 14). Enforcing laws prohibiting cigarette sales to kids reduces youth smoking. Retrieved August 28, 2009, from http://www.tobaccofreekids.org/research/factsheets/pdf/0049.pdf Campaign for Tobacco-Free Kids. The Toll of Tobacco in Michigan. 2012. Retrieved from:http://www.tobaccofreekids.org/reports/settlements/toll.php?StateID=MI. (Campaign For Tobacco-Free Kids. 2009. Retrieved from: http://www.tobaccofreekids.org/research/factsheets/pdf/0097.pdf) Centers for Disease Control and Prevention (CDC). 2007. Best Practices for Comprehensive Tobacco Control Programs. http://www.cdc.gov/tobacco/stateandcommunity/best_practices/index.htm Centers for Disease Control and Prevention (CDC). 2012. Michigan Smoking & Tobacco Use Highlights. Retrieved from: http://www.cdc.gov/tobacco/data_statistics/state_data/state_highlights/2012/pdfs/states/michigan.pdf. DiFranza JR, Savageau JA, Fletcher KE. 2009. Enforcement of underage sales laws as a predictor of daily smoking among adolescents - A national study. BMC Public Health 9:107 Greater Boston Physicians for Social Responsibility (GBPSR). In Harm’s Way: Toxic Threats to Child Development. May 2000. Lai H, Hedley AJ, Repace J, So C, Lu Q, McGhee SM, et al. 2011. Lung function and exposure to workplace second-hand smoke during exemptions from smoking ban legislation: An exposure - response relationship based on indoor PM 2.5 and urinary cotinine levels. Thorax 66(7): 615-23. Landrigan PJ. 2004. Children as a vulnerable population. International Journal of Occupational Medicine and Environmental Health 17(1):175-177. Lexis Nexis. Legislative Database. Menzies D, Nair A, Williamson PA, Schembri S, Al-Khairalla MZH, Barnes M, et al. 2006 Respiratory symptoms, pulmonary function, and markers of inflammation among bar workers before and after a legislative ban on smoking in public places. Journal of the American Medical Association 296(14): 1742-1748. Michigan Department of Treasury. 2007. Tobacco Tax Information. http://www.michigan.gov/taxes/0,1607,7-238-43542_43547---,00.html. National Cancer Institute (NCI). 2007. Second Hand Smoke: Questions and Answers. Reviewed 8/1/07; accessed 11/15/08 at: http://www.cancer.gov/cancertopics/factsheet/Tobacco/ETS. Radic SD, Gvozdenovic BS, Pesic IM, Zivkovic ZM, Skodric-Trifunovic V. 2011. Exposure to tobacco smoke among asthmatic children: Parents' smoking habits and level of education. International Journal of Tuberculosis and Lung Disease 15(2):276-80. Repace JL, Jiang R, Acevedo-Bolton V, Cheng K, Klepeis NE, Ott WR, et al. 2011. Fine particle air pollution and secondhand smoke exposures and risks inside 66 US casinos. Environmental Research 111(4): 473-484. United States Department of Health and Human Services (USDHHS). 2006. The Health Consequences of Involuntary Exposure to Tobacco Smoke: A Report of the Surgeon General. U.S. Department of Health and Human Services, Centers for Disease Control and Prevention, National Center for Chronic Disease Prevention and Health Promotion, Office on Smoking and Health. United States Environmental Protection Agency (EPA). 1992. Respiratory Health Effects of Passive Smoking: Lung Cancer and Other Disorders. Retrieved from: http://oaspub.epa.gov/eims/eimscomm.getfile?p_download_id=36793. United States Environmental Protection Agency (EPA). 2008. Health Effects of Exposure to Secondhand Smoke. Retrieved from: http://www.epa.gov/smokefree/healtheffects.html. United States Environmental Protection Agency (EPA). 2011. Health Effects of Exposure to Secondhand Smoke. Retrieved from: www.epa.gov/smokefre/healtheffects.html. Wakefield M, Banham D, Martin J, Ruffin R, McCaul K, Badcock N. 2000. Restrictions on smoking at home and urinary cotinine levels among children with asthma. American Journal of Preventive Medicine 19(3): 188-192.
<urn:uuid:21fe9a1b-9732-407c-8de5-7e7ada2f9ea4>
CC-MAIN-2020-16
https://wiki.mnceh.org/index.php?title=Respiratory_Health_and_Asthma:_Second_Hand_Smoke_(Repiratory_Health)&oldid=297
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371810807.81/warc/CC-MAIN-20200408072713-20200408103213-00274.warc.gz
en
0.867943
2,390
3.375
3
Agriculture (a term which encompasses farming) is the process of producing food, feed, fiber, fuel, and other goods by the systematic raising of plants and animals. Agricultural products have been a main stay of the human diet for many thousands of years. The earliest known farming has been found to have derived from Southeast Asia almost 10,000 years ago. Prior to the development of plant cultivation, human beings were hunters and gatherers. The knowledge and skill of learning to care for the soil and growth of plants advanced the development of human society, allowing clans and tribes to stay in one location generation after generation. Because of agriculture, cities as well as trade relations between different regions and groups of people developed, further enabling the advancement of human societies and cultures. Agriculture has been an important aspect of economics throughout the centuries prior to and after the Industrial Revolution. Sustainable development of world food supplies impact the future of globalization and the long-term survival of the species, so care must be taken to ensure that agricultural methods remain in harmony with the environment. Agri is from Latin ager ("a field"), and culture is from Latin cultura, meaning "cultivation" in the strict sense of "tillage of the soil." A literal reading of the English word yields: "tillage of the soil of a field." In modern usage, the word "agriculture" covers all activities essential to food, feed, and fiber production, including all techniques for raising and processing livestock. The term agriculture may also refer to the study of the practice of agriculture, more formally known as agricultural science. The history of agriculture is closely linked to human history, and agricultural developments have been crucial factors in social change, including the specialization of human activity. Agriculture is by far the most common occupation, employing 42 percent of the world's laborers. However, agricultural production accounts for less than five percent of the gross world product (an aggregate of all gross domestic products). Farming refers to a wide range agricultural production work, covering a large spectrum of operation scales (acreage, output, and so forth), practices, and commercial inclination. At one end of this spectrum, the subsistence farmer tills a small area with limited resource inputs, and produces only enough food to meet the needs of his or her family. At the other end of the spectrum is commercial intensive agriculture, including industrial agriculture. Such farming involves large fields and/or numbers of animals, large resource inputs (pesticides and fertilizers), and a high level of mechanization. These operations generally attempt to maximize financial income from produce or livestock. Modern agriculture extends well beyond the traditional production of food for humans and animal feed. Other agricultural production goods include cut flowers, ornamental and nursery plants, timber, fertilizers, animal hides, leather, industrial chemicals (starch, sugar, ethanol, alcohols, and plastics), fibers (such as cotton, wool, hemp, and flax), and biofuels such as methanol and biodiesel. Animals, including horses, mules, oxen, camels, llamas, alpacas, and dogs, are often used to cultivate fields, harvest crops, and transport farm products to markets. Animal husbandry involves breeding and raising animals for meat or to harvest animal products (like milk, eggs, or wool) on a continual basis. Mechanization has enormously increased farm efficiency and productivity in Western agriculture. The twentieth century saw massive changes in agricultural practice, particularly in agricultural chemistry. Agricultural chemistry includes the application of chemical fertilizer, chemical insecticides, and chemical fungicides, soil makeup, analysis of agricultural products, and nutritional needs of farm animals. Beginning in the Western world, the "green revolution" spread many of these changes to farms throughout the world, with varying success. Engineers have developed plans for irrigation, drainage, and sanitary engineering, particularly important in normally arid areas that rely upon constant irrigation, and on large-scale farms. The packing, processing, and marketing of agricultural products are closely related activities also influenced by science. Methods of quick-freezing and dehydration have increased the markets for farm products. Airplanes, helicopters, trucks, and tractors are used in Western agriculture for seeding, spraying operations for insect and disease control, aerial topdressing, and transporting perishable products. Radio and television disseminate vital weather reports and other information such as market reports that concern farmers. Computers have become an essential tool for farm management. According to the National Academy of Engineering in the United States, agricultural mechanization is one of the 20 greatest engineering achievements of the twentieth century. Early in the twentieth century, it took one American farmer to produce food for 2.5 people. By the end of the century, due to advances in agricultural technology, a single farmer could feed over 130 people. This has come at a cost, however. A large energy input, often from fossil fuel, is required to maintain such high levels of output. Other developments in agriculture include hydroponics, plant breeding, hybridization, better management of soil nutrients, and improved weed control. Genetic engineering has yielded crops that have capabilities beyond those of naturally occurring plants, such as higher yields and disease resistance. Modified seeds germinate faster, and thus can be grown in an extended growing area. However, genetic engineering of plants has proven controversial, particularly in the case of herbicide-resistant plants. Certain aspects of intensive industrial agriculture have been the subject of growing disagreement. The widening sphere of influence held by large seed and chemical companies, meat packers, and food processors has been a source of concern both within the farming community and for the general public. There has been increased activity against certain farming practices like factory farms. Another issue is the type of feed given to some animals that can cause bovine spongiform encephalopathy (also known as Mad Cow Disease) in cattle. There has also been concern because of the disastrous effects that intensive agriculture has on the environment. In the United States, for example, fertilizer has been running off into the Mississippi River for years and has caused a dead spot in the Gulf of Mexico, where the Mississippi empties. Intensive agriculture also depletes the fertility of the land over time, potentially leading to desertification. The patent protection given to companies that develop new types of seed using genetic engineering has allowed seed to be licensed to farmers in much the same way that computer software is licensed to users. This has changed the balance of power in favor of the seed companies, allowing them to dictate previously unheard of terms and conditions. Soil conservation and nutrient management have been important concerns since the 1950s, with the best farmers taking a stewardship role with the land they operate. However, increasing contamination of waterways and wetlands by nutrients like nitrogen and phosphorus are of concern in many countries. Increasing consumer awareness of agricultural issues has led to the rise of community-supported agriculture, local food movement, "slow food," and commercial organic farming. Developed independently by geographically distant populations, evidence suggests that agriculture first appeared in Southwest Asia, in the Fertile Crescent. Around 9500 B.C.E., farmers first began to select and cultivate food plants with specific characteristics. Though there is evidence of earlier use of wild cereals, it was not until after 9500 B.C.E. that the eight so-called Neolithic founder crops of agriculture appeared: first emmer wheat and einkorn wheat, then hulled barley, peas, lentils, bitter vetch, chick peas, and flax. By 7000 B.C.E., sowing and harvesting reached Mesopotamia. By 6000 B.C.E., farming was entrenched on the banks of the Nile River. About this time, agriculture was developed independently in the Far East, with rice, rather than wheat, the primary crop. By 5000 B.C.E., Sumerians had developed core agricultural techniques including large-scale intensive cultivation of land, mono-cropping, organized irrigation, and use of a specialized labor force. Roman agriculture was built on techniques pioneered by the Sumerians, with a specific emphasis on the cultivation of crops for trade and export. Evidence suggests that maize was first domesticated in the Americas around 3000–2700 B.C.E. The potato, the tomato, the pepper, squash, several varieties of bean, and several other plants were also developed in the New World, as was extensive terracing of steep hillsides in much of Andean South America. During the Middle Ages, farmers in North Africa and the Near East developed and disseminated agricultural technologies including irrigation systems based on hydraulic and hydrostatic principles, the use of machines such as water wheels or norias, and the use of water-raising machines, dams, and reservoirs. Middle Eastern farmers wrote location-specific farming manuals, and were instrumental in the wider adoption of crops including sugar cane, rice, apricots, cotton, artichokes, aubergines, and saffron. They also brought lemons, oranges, cotton, almonds, figs, and sub-tropical crops such as bananas to Spain. By the early 1800s, agricultural practices, particularly careful selection of hardy strains and cultivars, had so improved that yield per land unit was many times greater than that seen in the Middle Ages. With the rapid rise of mechanized agriculture in the late nineteenth and twentieth centuries, particularly in the form of the tractor, farming tasks could be done with a speed and on a scale previously impossible. These advances have led to efficiencies enabling modern farms in several nations including the United States, Argentina, Israel, and Germany, to output volumes of high quality produce per land unit at what may be the practical limit. Specific crops are cultivated in distinct growing regions throughout the world. The following tables detail the major crops for the world in millions of metric tons, based on Food and Agriculture Organization (FAO) figures for 2004. |Top agricultural products, by crop types (million metric tons) 2004 data |Vegetables and melons||866| |Roots and Tubers||715| |Fish (2001 estimate)||130| UN Food & Agriculture Organization (FAO) |Top agricultural products, by individual crops (million metric tons) 2004 data |Oil Palm Fruit||162| UN Food & Agriculture Organization (FAO) Agricultural policy focuses on the goals and methods of agricultural production. At the policy level, common goals of agriculture include: There are various methods of agricultural production, including: Agriculture may cause environmental problems due to changes in natural environments and production of harmful by-products. Some potential negative effects are: Agriculture is cited as a significant adverse impact to biodiversity, due to reduction of forests and other habitats when new lands are converted to farming. Some critics have also included agriculture as a cause of global climate change or "global warming." Domestication of plants is done in order to increase yield, improve disease resistance and drought tolerance, ease harvest, and to improve the taste and nutritional value of plants. Centuries of careful selection and breeding have had enormous effects on the characteristics of crop plants. Plant breeders use greenhouses and other techniques to yield as many as three generations of plants per year so that they can make improvements all the more quickly. For example, average yields of corn (maize) in the U.S. increased from around 2.5 tons per hectare (40 bushels per acre) in 1900 to about 9.4 tons per hectare (150 bushels per acre) in 2001. Similarly, worldwide average wheat yields have increased from less than 1 in 1900 to more than 2.5 tons per hectare in 1990. South American average wheat yields are around 2 tons per hectare, Africa under 1 ton per hectare, Egypt and Arabia up to 3.5 to 4 tons per hectare with irrigation. By contrast, the average wheat yield in countries such as France is over 8 tons per hectare. In industrialized agriculture, crop "improvement" has often reduced nutritional and other qualities of food plants to serve the interests of producers. After mechanical tomato-harvesters were developed in the early 1960s, agricultural scientists bred tomatoes that were harder and less nutritious. In fact, a major longitudinal study of nutrient levels in numerous vegetables showed significant declines over the second half of the twentieth century—garden vegetables in the U.S. at the end of the century contain on average 38 percent less vitamin B2 and 15 percent less vitamin C than 50 years earlier. Genetic engineering has been employed in some parts of the world to speed up the selection and breeding process. The most widely used modification is an herbicide-resistance gene that allows plants to tolerate exposure to glyphosate, which is used to control weeds in the crop. A less frequently used, but more controversial modification causes the plant to produce a toxin to reduce damage from insects. There are also specialty producers who raise less common types of livestock or plants. Genetic modification (GM) has proved controversial. Proponents of current genetic engineering techniques believe it will lower pesticide usage and has brought higher yields and profitability to many farmers, including those in developing nations. A few genetic engineering licenses allow farmers in less economically developed countries to save seeds for next year's planting. Many opponents of current genetic engineering believe the increasing use of GM in major crops has caused a power shift in agriculture towards biotechnology companies, which are gaining excessive control over the production chain of crops and food, and over the farmers that use their products, as well. A number of countries banned the use of GM foods in the face of such controversy and over concerns for food safety and quality. During the 1920s, Rudolf Steiner initiated a philosophical movement in Germany that provided the foundation for a new interpretation of the relationship of human spiritual growth, physical well-being, and quality of food that is consumed. In the U.S., J. I. Rodale introduced organic farming and made it popular in the 1940s. The essence of organic farming is that only natural processes are utilized in the growth of food. The quality and care of the soil is of utmost importance to achieve good crop return. Pest control is based on natural pest life cycles. Increased concern in the public, especially in developed countries, began to grow through the last decades of the twentieth century as questions arose about the health effects of chemical pesticides and fertilizers. DDT, developed in World War II, was a very powerful insecticide that appeared to solve all "pest" problems of farmers. However, it was found to destroy healthy growth and reproduction of wildlife, resulting in the banning of DDT in the 1960s. The organic farm movement gained momentum through the 1970s and 1980s. By the 1990s, the retail market for organic farming in developed economies had grown about 20 percent due to increasing consumer demand. In 2002, The U.S. Department of Agriculture (USDA) established standards for the labeling of organic commercial produce. Interest in biofuels—fuel derived from living organisms including biomass or their metabolic byproducts, such as manure from cows—grew throughout the end of the twentieth century as these are renewable energy sources, unlike other natural resources such as petroleum, coal, and nuclear fuels. Demand escalated in the United States in the early twenty-first century, when dependency on foreign oil became a national issue following the September 11, 2001 attacks on the World Trade Center. Ethanol fuel is produced from sugar cane in Brazil and from the cellulose of a wide variety of plants, including cornstalks, poplar trees, and switch grass, as well as waste left over from the forest products industry, wheat, oat, and barley straw. Biodiesel has been created from a variety of agricultural products including rapeseed and soybean oils, waste vegetable oil, switch grass, and animal fats. The demand for such alternative energy sources significantly impacted farming priorities in the early twenty-first century. Responding to concerns that technological advances in agriculture have caused serious, but unavoidable, environmental problems, an alternative view has emerged. In this view, biodiversity and agriculture are regarded not as incompatible choices but as partners, and the restoration of ecological health to farming areas is a necessary and achievable goal. As conservationist Aldo Leopold stated, people should work toward achieving "harmony between men and land," a job which depends on the agricultural community. For does it not, he argues: …imply a certain interspersion of land-uses, a certain pepper-and-salt pattern in the warp and woof of the land-use fabric? If so, can government alone do the weaving? I think not. It is the individual farmer who must weave the greater part of the rug on which America stands." New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here: The history of this article since it was imported to New World Encyclopedia:
<urn:uuid:14b78bc8-ccea-464a-9115-ce25c5c77d95>
CC-MAIN-2020-16
https://www.newworldencyclopedia.org/entry/Agriculture
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370493120.15/warc/CC-MAIN-20200328194743-20200328224743-00516.warc.gz
en
0.947285
3,587
3.609375
4
On the heels of the recent Paris terrorist attacks, American lawmakers are battling over the American SAFE Act, while thousand of refugees wait expectantly on the sidelines. In March 6, 2011, a group of fifteen school boys gathered outside a grain silo in the ancient farming town of Daraa, Syria. In a moment that would launch Syria into chaos, the words “As-Shaab / Yoreed / Eskaat el nizam! (The people want to topple the regime!)” were spray-painted onto the walls of the silo. Soon after, the local secret police arrested the boys and placed them under brutal interrogation. Tortured like hardened criminals, the children were beaten, bruised, and mutilated. Protestors rose up across the country, condemning a regime callous enough to abuse children for the sake of its prestige. The eventual release of the battered boys only fueled national outrage, culminating in a devastating civil war between the people and the Assad regime. Since the war’s beginnings in 2011, more than 250,000 Syrians have been killed.1 According to the Syrian Observatory for Human Rights, approximately two million individuals have been wounded or permanently disabled, while eleven million have been displaced.1 4.1 million of these fled the country in hope of asylum.1 The overflow of refugees has become a point of contention among numerous nations. Nations that have housed the refugees are becoming increasingly wary, while Western nations struggle with the thought of opening their borders to a deluge of foreigners. In recent months, the United States has found itself at the center of the refugee crisis and is now debating the passage of the American Security Against Foreign Enemies Act (H.R. 4038), which seeks to greatly encumber the refugee acceptance process. Although the act has been hailed as a necessary security measure, it also has a number of consequences that could leave the US more vulnerable than it was before. An Overstayed Welcome In the wake of the Syrian civil war, the embattled country’s neighbors opened their borders to accept the inevitable wave of families seeking asylum. However, as the crisis stretched on, the humanitarian cost became overwhelming. Turkey currently hosts the majority with 1.6 million refugees, while Jordan and Lebanon have hosted 600,000 and 1.6 million respectively.2 A smaller number have taken refuge in Egypt and Iraq (140,000 and 200,00 respectively).2 However, records only reflect a fraction of the refugees as a number of them withhold information from fear of retribution. The constantly growing refugee population has substantially burdened the host countries’ economic, political, and social structures. From properly feeding and housing evacuees to calming rising social tensions and frustrations, host countries are watching all dimensions of their human security being directly undermined. Although each country’s response is dependent on their preexisting capabilities, the fact that even prosperous Turkey is succumbing to mounting internal pressures illustrates the dire situation. Because these countries have also failed to establish a long-term strategy for integration of the refugee communities, they also risk creating a class of marginalized and destitute persons throughout an already politically unstable area. As history has demonstrated, such disadvantaged communities tend to be breeding grounds for rebellion and violence. Refugees in the West As hospitality towards refugees in the Levant has waned, the West has attempted to enhance its humanitarian efforts while also balancing national security concerns. According to UNCHR’s annual asylum trends report, Germany, Sweden, the UK, and the US ranked among the top 5 industrialized states receiving asylum claims. 3 After earmarking over €2 billion in humanitarian aid, Europe opened its borders to refugees, with the majority being placed in Germany or Sweden. However, Europe’s refugee acceptance rate pales in comparison to the Middle East’s. Since the beginning of the Syrian conflict, Europe has only accepted 150,000 refugees, with member states pledging to resettle another 33,000.4 42,000 of these refugees ended up in Italy, while a comparable amount settled in Greece. Part of the reason for Europe’s smaller numbers is that fewer refugees seek asylum in Europe. According to a 2012 case study by the Migration Policy Center, a little over 11,500 refugees sought refuge in Europe – a relatively small number compared to the Middle East’s 3 million.4 Unlike the EU, the US has not specified the number of refugees it will admit. However, it is estimated that the US accepted a mere 2,000 during the 2014-2015 fiscal year. In September, President Obama stated his intention to increase acceptance to 10,000, which garnered widespread criticism.5 On the heels of the recent Paris terrorist attacks, 31 states have now closed their doors to incoming refugees, making the President’s goal harder to attain. The American Not-So-SAFE Act Further complicating the US’s response to the refugee crisis is the recent passage of H.R. 4038, The American Security Against Foreign Enemies Act (also known as the American SAFE Act). In a zealous desire to strengthen national security, the Act requires the FBI and DHS to heighten the screening process and tighten restrictions. The current screening process is the most robust of any that travelers or aliens go through. Refugees must be screened by the National Counter Terrorism Center, the FBI Terrorist Center, and DHS’s various biometric databases. Few applicants that are vetted through this process are allowed to resettle in the US. The even more stringent processes demanded by H.R. 4038 would effectively halt the refugee resettlement program for Iraqis and Syrians. The Act prohibits the entrance of any Iraqi or Syrian refugee unless the FBI Director certifies to the DHS Secretary and the DNI that the applicant has received a background investigation sufficient to determine whether he or she is a threat to national security. Once this has been accomplished, all three department heads must certify to Congress that the applicant poses no threat to national security. Once a refugee has gained admittance, the DHS Inspector General must conduct an annual risk-based review of all certifications of admission for Iraqi and Syrian refugees and provide a report to Congress. The DHS Secretary must also provide a monthly report to Congress detailing admission and non-admission statistics.6 The intent behind the Act is well-placed. As the global community continues to reel from the rogue Syrian refugee-fueled Paris attacks, lawmakers in numerous countries are seeking to heighten security. In the US, fears of letting a terrorist slip through the cracks of the current security process (an occurrence that has rocked America before) have intensified. In a hearing before the House Judiciary Committee, FBI Director James Comey admitted that he could not “offer anybody an absolute assurance that there’s no risk associated with admitting Syrian nationals as refugees.”6 A report released by the Homeland Security Committee confirmed Comey’s admission, stating, “[increasing refugee admittance] will have a limited impact on alleviating the overall crisis but could have serious ramifications for U.S. homeland security.”6 Besides letting in hardened terrorists, some policymakers have expressed concerns about refugees who, though not devoted to jihadism, may be vulnerable to such propaganda. However, the Act has the potential to complicate problems instead of solving them. As it stands, the Act poses a bevy of logistical obstacles. From increased paperwork to an inevitable increase in bureaucracy, the Act will increase red tape and slow the process for deserving refugees. It would also require hiring specialized translators, which diverts critical intelligence community resources. Because implementation of the Act would take anywhere from two months to two years, a vast amount of resources would be used and could cause political frustrations later on. From a processing standpoint, there would be propensity to err on the side of caution concerning refugee security. Due to false negatives and sloppy identification, a number of innocuous applicants would be denied admittance. Furthermore, the fact that many Syrian refugees do not have identification papers or references would make it extremely difficult to discern those who pose a security threat from those who do not. There is also no guarantee that terrorists would not slip through the cracks. Although the screening process would be intensified, the sheer amount of bureaucratic back-and-forth could easily allow a well-trained jihadist to creep in. Beyond these bureaucratic concerns, there are also practical security concerns as well. Denying asylum to Syrian refugees may fuel resentment within holding camps, very likely leading to their radicalization. This is especially a concern with the younger ones, who are statistically vulnerable to such propaganda. Withholding asylum could also make illegal entry a negative incentive for those who are desperate to get in. Finally, refusing to make a concerted effort to welcome refugees would reflect badly upon the US as a leader within the global community, weakening bonds with allies and further compromising the US’s good standing. ■ - “Syrian Civil War Fast Facts,” CNN Library, November 2015, http://www.cnn.com/2013/08/27/world/meast/syria-civil-war-fast-facts/index.html. - Benedetta Berti, “The Syrian Refugee Crisis: Regional and Human Security Implications,” Israeli Homeland Security, February 2015, http://i-hls.com/2015/02/the-syrian-refugee-crisis-regional-and-human-security-implications/. - Laura Mojonnier, “Human Security and the Syrian Refugee Crisis,” The SAIS Europe Journal, December 2013, http://www.saisjournal.org/posts/human-security-and-the-syrian-refugee-crisis. - Phillipe Fargues and Christine Fandrich, “The European Response to the Syrian Refugee Crisis,” Migration Policy Center, 2012, http://www.migrationpolicycentre.eu/docs/MPC%202012%2014.pdf. - Gardine Harris, David E. Sanger, and David M. Herzenhorn, “Obama Increases Number of Syrian Refugees for Resettlement to 10,000,” New York Times, September 2015, http://www.nytimes.com/2015/09/11/world/middleeast/obama-directs-administration-to-accept-10000-syrian-refugees.html?_r=0. - “H.R. 4038, American Security Against Foreign Enemies (SAFE) Act of 2015,” Republican Policy Committee, http://policy.house.gov/sites/republicanpolicy.house.gov/files/Legislative%20Digest%20-%20H.R.%204038%20American%20Security%20Against%20Foreign%20Enemies%20Act%20of%202015.pdf. - Hugh MacLeod, “How Schoolboys Began the Syrian Revolution,” CBS News, April 2011, http://www.cbsnews.com/news/how-schoolboys-began-the-syrian-revolution/. Volume 17, Issue 8
<urn:uuid:0d42ebf8-4698-4629-b5ea-9eacd94ccec2>
CC-MAIN-2020-16
https://www.phc.edu/intelligencer/us-and-the-syrian-refugee-crisis
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506477.26/warc/CC-MAIN-20200401223807-20200402013807-00156.warc.gz
en
0.943356
2,286
3.046875
3
Trans on Stage The Art and Politics of Cross-Gender Performance It’s one of the staples of trans fiction: boy gets enlisted into playing girl in school play, discovers he likes it, and has his life transformed. This convention, however, has a much longer and more colourful history than just a figment of some trans person’s imagination. Gender transgression and the theatre are intimately linked throughout human history and have served to illuminate and transform issues of transgenderism, same sex love, and the role of women in society. The appearance of crossdressed characters on stage offers to the audience gender alternatives to the limited possibilities in real life while simultaneously regulating the taboos against transgenderism and homosexuality. The tradition of males playing female roles on stage originated in part from the male obsession with female modesty. The attempt to control female sexuality by barring women from the stage had numerous consequences. It gave queer folk a venue for a small degree of self-expression; it put the theatre into the paradoxical position of being both popular culture and disreputable entertainment; and it created theatrical conventions that politicized gender roles in theatre. In many non-western cultures, however, it was more or less accepted that homosexuality and transgenderism were a part of theatrical performance and religious ritual. (Drama and dance are cultural forms whose roots are religious.) The first performing gender transgressors were the shamans. Shamanism by definition is the art of transformation. Their power comes from a dramatic invocation of the spirits. Although the spirituality behind shamanistic gender changing varies among different cultures, fundamentally the shaman will become possessed, for various reasons, of the spirit of the opposite sex. The shaman, who can be either male or female, enters a trance like state and uses various dramatic talents – impersonation, ventriloquy, dialogue, pantomime, and magical tricks – to create a powerful performance that has a therapeutic effect on the witnesses. Non-believers might think the performance is faked, but the shaman’s audience has complete faith in its effectiveness. This kind of inexplicable spirituality and gender changing lost its prestige and was demonized after the cultures in which it was practiced were colonized, mostly by European powers whose citizens advocated Christianity and rationalism. Nevertheless, as Laurence Senelick points out in his book The Changing Room: Sex, Drag and Theatre, gender variant performers have a long history and are taken for granted in many areas of the world. From the ancient Greeks to Brazil to numerous cultures in Polynesia, the breadth and variety of transgender performance appears limitless. There are, however, two primary and separate components to transgenderism on stage: the performer and the gender politics that are played out by the performance. Any social convention created by men that attempts to demarcate women’s place in society is inherently about gender politics. In the first few centuries of Christianity, women itinerant entertainers were common. As the Church assumed control of performances and attempted to present religious stories, it became improper for women to exhibit themselves. Although women participated in some religious plays, their role was to represent purity and virginity. To avoid the danger of inciting lust, their role was strictly allegorical. Men would play comic and shrewish women, while boys normally assumed other female parts. It is ironic that in attempting to control female sexuality, the male arbiters of morality were risking unleashing the devils of homosexuality and transgenderism. As early as the 16th century, a university don named John Rainoldes worried that prolonged exposure to the female role may convince the boy actor that he rather likes the part and is willing to stay in it long after the performance has finished. Since Senelick believes that the theatrical conventions of the time may have attracted gay and transgendered folk, perhaps this concern was not without foundation. Victorian critics of Shakespearean theatre had difficulty in reconciling Shakespeare’s greatness with the possibility of pederasty, They rationalized the convention of boys playing women by concluding that the boys on stage were simply masquerading, but this analysis ignored the rigorous training boy actors undertook to perform female roles. The truth is that in using transgenderism as a theatrical convention, the theatre offered a safe place to play out the social tensions between effeminacy, courtly love and the taboo against sodomy. While the dalliance with these issues gave theatre a dubious reputation, as long as cross-gendered entertainers remained on stage the public was willing, indeed happy, to tolerate them. When they moved offstage, however, the public was not so forgiving. The infamous case of Boulton and Park demonstrates clearly this tension between real life and the theatre. In 1871 Ernest Boulton and Frederick Park were arrested in London for wearing women’s clothing in public and soliciting. They were arraigned for conspiracy to commit the catchall crime of “buggery”. Their defence rested its case on the lack of evidence to prove the commission of sodomy and that the defendants frequently wore women’s clothes for theatrical purposes. This last defence was a thorough one indeed. Even the prosecution allowed, in its opening remarks, that the wearing of women’s clothes in a theatrical performance was no offence. Boulton and Park’s attorneys brought forth a string of witnesses, including Boulton’s mother, who confirmed that he performed in a wide range of amateur theatricals as a woman. The numerous photos of Boulton in female attire were explained as being simply made for distribution to his adoring public and that he wore these “costumes” on the street in mischief, to see if he could get away with it. This view was buttressed by testimony from a young man named Amos Gibbings, who explained that he wore his feminine clothes at a ball as an extension of his large repertory of female stage roles. Boulton’s performances as a woman were cheered, one journal suggesting he was a “really charming girl” even as it assured its readers that there was nothing “of the ‘social monster’ business connected with him”. In the end, Boulton and Park were acquitted of all charges, to loud cheers of “bravo” from the peanut gallery. As Laurence Senelick points out, however, in this jaded age it’s pretty clear Boulton and Park were guilty. Boulton clearly spent a lot of time in public in feminine clothes. Senelick observes that gay and trans performers like Boulton performed another function also: By transferring taboo behaviour to the stage, such gay deceivers did more than find sanctuary for it. They offered surrogate gender alternatives to the general public and exercised a potent effect on members of the audience with cross-dressing tendencies. In one of Havelock Ellis’ case-histories of what he called ‘Eonism’, his Edwardian informant tells him of going to see female impersonators in vaudeville or army concert parties to ‘await their entrance with a kind of tremor, sit and admire them, long enviously to be doing the same’. This individual was put off by vulgarity or comic dames, as well as the destruction of the illusion when the terminal de-wigging raised a cheap laugh. ‘But although the performance would leave me sad with a hungry desire and envy, yet I could never resist going.” The therapeutic effect of these kinds of performances is still evident today. So starved are trans people for trans entertainment that we’ll endure the worst movies to see it. There is an undesirable side effect to this freedom trans performers have on stage, and that is that trans people are often not taken seriously. This space between the theatre and the public has permitted some crossdressed individuals to play the fools of the modern age, capable of uttering the harshest truths with impunity. The most stunning example of this occurred in South Africa during the apartheid era. Playwright Pieter-Dirck Uys was considered one of South Africa’s most dynamic young playwrights during the 1970s but often ran afoul of the authorities for the frank nature of his plays. Undaunted, he created the personality of Evita Bexuidenhout and began writing columns for the South African Sunday Express. As the fictional wife of a South African Member of Parliament, Evita satirized the existing regime by expressing the most outlandish views. When she said that “democracy is too good to share with everyone”, the censors became somehow too dense to understand the irony. They continued to let Evita talk. Having attained this foothold, Uys pushed further and began making public appearances as Evita, (an especially dangerous move since public transvestism was illegal) and then created her entire family, who occasionally made appearances with her. These included her husband, who sported a Hitler moustache, and her ‘strong and mysterious’ son who belonged to a nationalist group. Uys’ performance engendered numerous death threats and was described as “dancing a tango in front of a firing squad”. In 1993, Evita took her show to Germany, where she observed that South Africans owed a great debt to that country: “In fact, you have set us Afrikaners a very high standard; it will take us a long time before we’ve killed six million blacks.” Having avoided prison and death in apartheid Africa, Uys continues to skewer post apartheid politicians for unkept promises. Recently, Enza Anderson performed a similar if lesser role when she took a run at the leadership of the Canadian Alliance party. The party, not known for its friendly attitude toward queer folk, was an easy target for Ms. Anderson; and while her schtick was entertaining and her barbs well placed, no one took her too seriously. Indeed, historically if cross-gender performers wanted to be taken seriously (or wanted their performance to be considered wholesome), they took great pains to ensure that people considered them “normal” off stage. When the famous Chinese cross-gender performer Mei Lanfang arrived in the United States in the 1920s, his performances were lauded for their distance from the “eccentricity” and “perversity” of the female impersonation of vaudeville or the Japanese theatre. (Eccentricity and perversity were common code words for queerness) Reporters covering his tour never failed to mention the presence of his wife and child, thus reassuring an anxious public that Mei was not “one of those”. But while Mei may have been one of the “normal” folk, it seems a number of performers who took great pains to appear so, were not quite so normal as they pretended. Julian Eltinge, the celebrated female impersonator of the early 20th century, flourished in his profession when many other impersonators did not largely because his publicity material relentlessly emphasized his virility. Coming from the respected tradition of college amateur theatricals, Eltinge maintained that he really didn’t enjoy dressing as a woman, but that he was in it for the money. This message went over well with journalists; who described Eltinge as a “typical college man, big, brawny, polished, vigorous and forcible” and a “quiet, sturdy young American dressed in neat tweeds.” This manly man seems, however, to have had no love life. Despite hints that he would share his Hollywood mansion with a wife, there was no wife forthcoming. He explained at the time that his career got in the way of matrimony, but recent information suggests that he had an intimate and longstanding relationship with a sportswriter that nearly erupted into scandal., Danny La Rue, the most famous British female impersonator of the 1950s and 60s, came from the Armed Forces tradition of cross-gender performers. His overblown glamorous appearance was designed to distance himself from any suggestion that he might actually be enjoying himself. Laurence Senelick described his performance as “a man impersonating a man impersonating a woman” and his jokes always “referred back to his primary gender”. La Rue himself said that he always let the audience know he was male, for which he claimed they were “relieved”. For years, La Rue performed when anti-gay sentiment was common and homosexuality was illegal, so perhaps it’s understandable that his act rejected any hint of homosexuality. But La Rue continued to deny his gayness even after the liberation movements of the 60s and 70s, a pose Senelick finds contemptible. …he scorns the drag artistes he first worked with as dishing mercenary queens. He claims to have proposed to a (nameless) girl who conveniently died in a plane crash, and he announced to the papers his imminent marriage to a rich Australian woman, though that was suddenly cancelled. He points out that he’s just a nice Irish boy who loved his mother, longs for children, and is at heart one of the fellas’. Yet his best friends have always been such professional androgynes as Liberace and Wayne Newton, and everyone in British show business is familiar with his sexual predilections. There is something sad about someone incapable of admitting to their true nature long after the horses have fled the barn. Yet even Senelick admits that so long as stage transvestism is regarded as play acting, and can be written off as something between “club house ritual and locker room exuberance”, it is safe and sanctioned. Indeed, as sex change surgery became more common and trans entertainers had surgery to become women, their respective reputations suffered. Senelick observes that the “public no longer saw drag as high-spirited masquerading, but associated it irredeemably with sexual perversion.” In short, at least Danny La Rue had an excuse. Perhaps he knew better than anyone the hypocrisy of a society that can only address its own gender hang ups through the theatre. For if nothing else, a tour through the history of cross-gender performance on stage lays bare male insecurities with female sexuality and roles, and society’s simultaneous fascination and fear for same sex love and transgenderism. This kind of hypocrisy, denial and compartmentalized thinking marginalizes queer people’s existence because it removes cross-gender behaviour from the realm of the normal, where it might be explored honestly, and dumps it in the realm of performance, where it remains at a comfortable distance. A marvelous example of this inability to accept the fascination people have with transgender behaviour occurred at A. L. Brown High School in Kannapolis, North Carolina. To pump up school spirit for a big game, the school held a Girls Dress as Boys, Boys Dress as Girls Day in November 1993. Everyone thought it would be great fun until an announcement over the intercom referred to it as Transvestite Day. Then all hell broke loose. Dressing up is a cute prank, but transvestites are perverts. While stage crossdressing may keep touchy gender issues at a distance, it is nevertheless riddled with controversy and ambiguity. How could it not be? A theatrical convention that explores and reflects the sexual and political territory between the sexes cannot help but be controversial. The Changing Room: Sex, Drag and Theatre, by Laurence Senelick Crossing the Stage: Controversies on Cross-Dressing, edited by Lesley Ferris
<urn:uuid:e40e96b1-2b8a-42a4-99c1-2ee90fe22b41>
CC-MAIN-2020-16
https://transottawa.ca/arts-2/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370521876.48/warc/CC-MAIN-20200404103932-20200404133932-00515.warc.gz
en
0.978472
3,231
3.03125
3
Perhaps the worst insult you can hurl at a politician these days is to give him the middle name of "Hoover". Such as George Hoover Bush and Barack Hoover Obama. 80 years later Herbert Hoover is still the standard for the "do-nothing" president in the face of economic collapse. Like most easy comparisons, these examples lack details. That's because the names are there for the purpose of accusation, rather than enlightenment. However, if you dig down into the individual economic policies of Hoover, Bush, and Obama, the story gets much more interesting. As Mark Twain once said, "History doesn't repeat itself, but it does rhyme." I'm not going to try and find direct connections in this essay, just broad picture comparisons. If the reader confuses the two, then that will only mean I was justified in writing this. Hoover the conservative Once the stock market crashed and the economy began dumping, Hoover looked for a scapegoat, and found it in the form of Mexican-Americans. The Mexican Repatriation ran from 1929 to 1937. Around 500,000 people were either forced, or convinced to leave America for Mexico. Hoover, hoping to appease the restrictionists, chose the less-permanent option of virtually eliminating visas for Mexican laborers and by bolstering the Immigration Service, which had grown from a minor government operation to a force that included a border patrol of nearly 800 officers... They raided union halls, dances, social clubs and other ethnic enclaves where people without papers might be found. Their tactics favored intimidation over legal procedure. Suspects were routinely arrested without warrants. Many were denied counsel, and their deportation 'hearings' were often conducted in the confines of a city or county jail. Frightened and ignorant of their rights, many suspects volunteered to leave rather than suffer through deportation. The problem was that 60% of them were legal American citizens. In many ways this was a precursor to the the Japanese-American Internment during WWII, but has been almost totally left out of the history books. The federal government has still not apologized for this travesty. Nothing like the Mexican Repatriation is currently happening, although Arizona's immigration law was a faint echo. The fact that the xenophobes are resorting to "terrorist babies" only shows how detached they are from the mainstream. After broad congressional victories by the Democrats in the November 1930 elections, Congressional attitudes towards relief began to soften. Congress approved a bill which would make available one-half of the adjusted compensation from the Soldier's Bonus Act of 1924. Hoover vetoed the bill in February 1931. This eventually led to the politically disastrous Bonus March of 1932. Hoover the progressive Until the summer of 1931 there was realistic hope that the Depression would end soon. Laissez-faire economic policies dominated all political circles, even in the Democratic Party. There had been no federal actions to the severe economic downturns in 1873, 1893, and 1920, and still the economy had bounced back in a couple years. Outside of socialists and communists, there was no serious proposals for direct federal aid to the unemployed. The failure of Creditanstalt in May of 1931 changed all that. Within a few months the Austrian government was broke. This led to a run on German credit, and finally a crash in British Sterling, which led to Britain leaving the gold standard. By September of 1931 the economic crisis had jumped from Wall Street to Europe and now back to Wall Street. America was rocked by the first severe banking crisis of the Great Depression that wasn't centered in farming states. In 1931, 2,294 banks in the U.S. failed. And so in October 1931, Hoover set out to rescue Wall Street. How was he going to do that? By using the Federal Reserve Banks to swap out illiquid mortgage-backed securities with sound Treasuries. Does that sound familiar? It should, because the Federal Reserve has been doing that non-stop since the spring of 2008. President Bush was just following Hoover's Plan. On January 15, 1932, Hoover signed into law the Reconstruction Finance Corporation. This was a continuation of the Wall Street bailout. In addition to bailing out banks, mortgage companies, and insurance companies, it also bailed out railroads. It did this through a combination of loans and buying equity in banks. The RFC continued to exist until the 1950's. Much like the 2008-2009 bailouts, Hoover's bailouts approached fixing the economy from the top-down, taking care of the wealthy and powerful first. the RFC was derided by populist critics as “bank relief” and “a millionaire’s dole”—criticisms echoed today by all those who see George W. Bush’s Troubled Asset Relief Program and Obama’s own Public-Private Investment Program as outrageous giveaways...Critics raised the same criticisms they would raise about Obama’s bailout plans seventy-eight years later. If the banks get a bailout, why not everyone else? Were bailouts only for the rich? Although Hoover had declared that the agency was “not created for the aid of big industries or big banks,” a record of its operations revealed that most of its money had indeed gone to a very few of the country’s biggest financial institutions... The recipients of some $642 million of the RFC’s loans—nearly half its total expenditures—were not revealed at all. Hoover, like Obama, had insisted on secrecy to keep the proceedings from being “politicized,” but, inevitably, this fear of politicization in the end only led to more politics.... The RFC’s deliberations were understood—with good reason—not as effective management but as insider dealing: common financial practice through the 1920s, but politically and morally insupportable at a time when millions of Americans were losing their jobs, their homes, and their savings, and when some were literally dying of starvation. Just like the RFC, the 2008-2009 Wall Street bailout was plagued with corrupt, insider dealing, ethics violations, and obvious conflicts of interest. Like during the RFC, Wall Street is hoarding the bailout money, thus failing to help out the economy. More than any other item, the failure of the RFC has been echoed into our present economic crisis. The 2008-2009 Wall Street bailout was nothing more than the RFC written large. A month later, Hoover signed into law the first Glass-Steagall reform law. This law was aimed at expanding credit. To accomplish this, rules regarding what the Federal Reserve could accept for rediscount purposes, such as commercial paper, was expanded. Expanding the range of acceptable assets is exactly what the Federal Reserve began doing in 2009 with its quantitative easing program. By no small coincidence, the Bank of Japan followed this route in 1999. Every time in history this method has been tried to expand credit it has failed, yet governments keep doing it. Finally, on July 21, 1932, with the Great Depression now three years old and the wealthy taken care of, Hoover enacted the first piece of legislation that helped working America, Emergency Relief and Construction Act. The money was to be dedicated to state and local public works projects, as well as state-level relief projects, much like Obama's 2009 stimulus bill. While a noble idea, Hoover didn't take it far enough (Obama made the same mistake 80 years later). The money was only allocated to states if the state could prove that its own resources were insufficient for legitimate relief needs. By March 1933, the money was exhausted. By the time Franklin D. Roosevelt was inaugurated, the federal government was financing over 60 percent of all relief nationally. In the end, the $300 million in relief loans to the states was never repaid, and the federal government had permanently entered the field of public assistance. The Hoover Dam broke ground in 1931, but Hoover could hardly take credit for it since it was Coolidge who authorized the project in 1928. Also in July 1932, Hoover signed into law the Federal Home Loan Bank Act. This was to be Hoover's most lasting legacy. Like Obama in 2009, Hoover felt compelled to address the foreclosure crisis sweeping America. The idea was to reduce foreclosures while encouraging home ownership and home construction by increasing the supply of money available to registered institutions in the form of home loans. Unfortunately, Hoover's efforts were overwhelmed by the size of the problem. Much to President Hoover's great disappointment, however, the credit program was a complete failure. While 41,000 homeowners applied for FHLB loans in the first two years after its enactment, the government agency administering the program approved just three applications. "We didn't admit it at the time, but practically the whole New Deal was extrapolated from programs that Hoover started." - Rexford Guy Tugwell As the economy contracted, government spending expanded, and to pay for it, Hoover went after the rich. Between 1930 and 1931, government spending increased from 16.4% to 21.5%. To pay for it, in 1932, Hoover raised taxes. Most Americans saw their tax rates double, with the top rate rising from 24% to 63%. Conservatives today are having a heart attack over a 3% tax hike on the rich when Bush's tax cuts expire. Can you imagine what they would do if Obama wanted to hike the tax rate on the rich by 2.5 fold while doubling the estate tax?!? I'll tell you what their reaction would be. It would be something like this: During the 1932 elections, Franklin Delano Roosevelt blasted the Republican incumbent for spending and taxing too much, increasing national debt, raising tariffs and blocking trade, as well as placing millions on the dole of the government. He attacked Herbert Hoover for "reckless and extravagant" spending, of thinking "that we ought to center control of everything in Washington as rapidly as possible," and of leading "the greatest spending administration in peacetime in all of history." Roosevelt's running mate, John Nance Garner, accused the Republican of "leading the country down the path of socialism." The Results of Half-Measures Hoover's Wall Street and credit market bailouts failed. Late in 1932 another wave of bank failures struck. Then just before FDR took office, on February 14, 1933, the state of Michigan announced an eight-day bank holiday. This set off a wave of panic through the rest of the nation's banking system. By Inauguration Day 32 states had closed their banks and the rest of the states were using deposit restrictions. America's financial system was in complete ruin. Obama is likely to avoid this outcome, but that doesn't mean he hasn't duplicated Hoover's mistakes. Every instinct the president has honed, every voice he hears in Washington, every inclination of our political culture urges incrementalism, urges deliberation, if any significant change is to be brought about. The trouble is that we are at one of those rare moments in history when the radical becomes pragmatic, when deliberation and compromise foster disaster. The question is not what can be done but what must be done... Much like Herbert Hoover, Barack Obama is a man attempting to realize a stirring new vision of his society without cutting himself free from the dogmas of the past—without accepting the inevitable conflict. America needs a bold, broad restructuring of our economic system. We need systemic financial reforms, as opposed to the token effort Congress has given us. We need a real Pecora Commission. Not the token effort we've seen so far. Until Washington gets serious about reforms, we will continue to lurch from crisis to crisis.
<urn:uuid:41c0fe43-57b9-44f8-8bc0-fb0ecc7487e2>
CC-MAIN-2020-16
http://economicpopulist.org/content/more-things-change-more-they-stay-same-0
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371818008.97/warc/CC-MAIN-20200408135412-20200408165912-00154.warc.gz
en
0.971083
2,407
3.234375
3
Screen time for kids is a hot topic among parents. Today, we have different kinds of screens to deal with, unlike in the ’80s where we only had television. And that’s a challenge for today’s parents. Technology has transformed so much of our lives. It is an integral part of our life and there’s no doubt that its significance will only increase in the future. So it is necessary that our kids learn how to use technology. But the question is where to draw the line? In this article, you will learn - The appropriate age for children to start using screens and how often should they have screen time - How can we raise children without screen addiction? - How to raise happy kids who care about the world and whose heads are not always bent down? Let’s dive right in. SCREEN TIME RECOMMENDATIONS FOR CHILDREN BY AGE Screen time means the amount of time a person spends looking at the screens of electronic devices like iPads, computers, TV, tablets, and smartphones. American Academy of Pediatrics recommends limiting the screen time for children according to their age. - For children younger than 18 months, pediatricians don’t recommend screen time at all except video chatting. - You can start introducing screens to kids aged between 18-24. But it should be high quality programs like Sesame Workshop and PBS. Parents should accompany children so that they understand what they are watching. - For children between the ages of 2 and 5 years, limit screen time to one hour per day. The program should be high quality and parents are recommended to watch with children to help them understand what they are watching. - For children above six years, parents can decide the appropriate screen time. You should make sure that they get enough sleep, exercise and time for other activities. THE ROLE OF A PARENT IN INTRODUCING ELECTRONIC DEVICES TO CHILDREN From the recommendations of AAP, we can understand that you can’t just hand over a tablet to kids and walk away. As a parent, we are responsible for teaching children about using electronic devices sensibly. We need to educate children on the good and bad effects of technology. I limit screen time for my kids to only two days per week. On specific days, I let them use my tablet to watch their favorite videos. They watch entertainment videos, but I ask them to watch videos that are beneficial for them in some way too. Like videos that help in learning a new language or learn new skills like arts and crafts. WHY LIMIT SCREEN TIME FOR CHILDREN? Years ago, I came across an article which talked about how successful people like Steve Jobs, Bill Gates, etc made restrictions on the use of electronic devices for their children. It caught my attention because these are people who are ultra-successful in the technology field. And then why would they do that? In my own research, I could see that there are many side effects in letting children have unlimited screen time. I decided to follow the same path for the well-being of my children and so far it’s been going good. So, what are the harmful effects of too much screen time for kids? - Children should grow by engaging all their senses and exploring their surroundings. Too much screen use leads to a sedentary lifestyle (true for adults too) and eventually leads to laziness and become couch potatoes. This leads to obesity too. - Affects their eyesight. Too much screen time can lead to eye dryness, fatigue, headaches, blurry vision, etc. Studies point out that the rapid increase of myopia (nearsightedness) could be due to increased visual activity (screens and books) and less time spent outdoors. - Affects sleep. The blue light emitted from the display screens interferes with the sleep cycle in the brain and causes insomnia. So, don’t let them watch TV or use other devices for at least one hour prior to sleep. - Leads to behavioral problems. Studies conducted on the relation between the behavior of preschoolers and their screen time shows significant attention and behavioral problems in them. Young children need to follow their curious minds and engage in messy play to develop their motor skills. - Leads to mental health issues. Another study shows that teenagers who spent more time on screens are more prone to depression and have suicidal tendency. The same study shows that children who spent more time on non-screen activities like social interaction, exercise, sports, etc, are less likely to develop mental health issues. As you can see, there are so many side effects in letting children have too much screen time. There is no doubt that parents have to take responsibility for instilling good habits around screen time early on. Let’s see how you can limit screen time in children and help develop healthy habits. 8 TIPS TO LIMIT SCREEN TIME FOR KIDS Kids always learn from what they see and not what they hear. We can’t be a good role model for kids if we ask them to reduce their screen time, but we are always scrolling on our smartphones. So set rules for yourself like you do for your kids and make sure you follow them. The side effects of having too much screen time are not only for kids but for adults too. On a different note, have you noticed how you become a better person by learning to control your own bad behaviors when kids are around? I always wonder how different I would be as a person if I didn’t have kids. I am sure I will be a lot worse, lol! Because they hold me accountable to a certain extent. Which takes me to the next point… ESTABLISH HOUSE RULES Establishing good rules and trying to reinforce them leads to the development of well-rounded children. If you let them use their screens without setting any limits, they never learn about the right way to use electronic devices as a child and this can continue into adulthood as well. I remember watching TV all day and every day when I was a kid during summers. I didn’t know how to spend my time wisely. Now I regret wasting my time which I could have used to learn some useful skills. And being glued to your screens turns you into a sloth who loves to procrastinate. It took me a lot of effort to change. Your kids will not always feel good about rules. They will sometimes whine and you might feel tempted to give in. But in those moments remind yourself of the reason you set those rules in the first place. As long as it remains valid, there is nothing wrong in being stern. Otherwise, they won’t value rules because they learn they can always get away with it. The rules you set depends upon your values and what works in your household. But to give a general idea regarding rules for screen time, you can set rules like, - No screens at mealtimes - No screens before bed - I give my tablet for kids to watch on Saturday and Monday. But they don’t get it unless they are done with showering and breakfast. And who is a happy mom on those days because you don’t have to nag???? So the rule would be “ No tab unless you’re done with your morning routines”. - No screens when eating out Please note that these must be applicable to parents too. You don’t want your child to feel disappointed because you are on your phone when you have taken them to a park or when you all are having a fun dinner. EDUCATE THEM ON THE SIDE EFFECTS OF TOO MUCH SCREEN TIME When you make a rule, kids with their typical curious minds might ask you why they can’t do it. Authoritarian parents might say, “Because I said so” or “Just do what I say, no questions”. This never helps and don’t create a genuine likeness in their minds to follow the rules. Explain the reason behind the rules in a language that they understand. When my kids ask about why I don’t let them watch certain videos, I explain the reason. And they know why they are not allowed to have screen time daily. They seem to understand it better when I explain the “why”, and are more easy going with the rules. Another benefit is if they know about the bad effects of too much screen use from a young age, it will help them to self-regulate when they enter adulthood. Because they would have acquired varied interests and skills to keep themselves engaged. HAVE A SPECIFIC SCHEDULE Set a daily duration or specific days in a week when they can use the iPad or watch TV. Having a schedule helps in limiting screen time because kids get used to the idea that they can have screen time only on those days. Having a routine for everything, for me as well as kids, is one of the secret weapons that help me face the daily challenges of motherhood. Having a routine means we all know what’s coming next and there are fewer negotiations and whining. I let my daughters watch YouTube twice in a week and right now that’s all the screen time they get. Rest of the days they fill their time with activities they love. ENCOURAGE INDEPENDENT PLAY Try to encourage kids to play on their own. It helps to develop a sense of independence in them. They learn how to use their free time by engaging in imaginative play or doing creative work. And that’s one of the reasons I limit screen time and don’t let them watch TV too. It makes them bored. And that motivates them to find something to do for themselves. They engage in imaginative play creating new scenarios every second. I love watching silently, smiling inside, how they use their imagination to create new games. I feel proud and I know this is not gonna happen frequently if they are used to watching TV every day. Because watching TV means to spend their time sitting idle. Children have never-ending curiosity and a wild imagination. But they need the time to make use of it. They can’t engage in creative pursuits if they are always watching mind-numbing shows. BUY THEM TOYS THAT SPARK CREATIVITY I have never seen my kids playing with toys that make a lot of noise by singing, dancing, and flashing lights. They easily get bored with such toys and they are forgotten usually on the second day when their initial excitement has worn down. Such toys only add to the clutter and are a waste of money. What they love and play long term are the toys that promote creativity and need their imagination to play such as LEGOs, building blocks, dolls, kitchen sets, etc. Playing with such toys help them to develop social skills as well. Playing with siblings or friends requires them to negotiate with each other for toys or roles and sometimes that leads to fights too. But in the end, they solve it by themselves or by adult intervention. These are all valuable lessons they get by limiting screen time. HELP THEM FIND OTHER FUN ACTIVITIES Recently I started teaching my older one crochet and she is loving it so far. There are many options if you want to get kids off-screen, but you have to lead them as a guide to different interests. Have craft supplies, puzzles, storybooks, etc. ready so that you can encourage them to play with those when they complain of boredom. Another option is to make them play outdoors. It has many benefits for kids and adults alike. It helps to refresh our minds, build immunity and get more exercise too. USE A SCREEN TIME TRACKING APP There are many apps for parents to control and track the screen time for kids. You install these apps on your device and your child’s device. Then you get the options to control their usage time, schedule blocked periods for sleep and homework and even instantly pause their screens while they are watching. And you can also keep an eye on their web history and be aware of what they are surfing. I don’t personally use these apps as my kids are small (4 and 7) and their screen use is much controlled now. But if you are a frustrated parent who finds it difficult to get kids engaged in other activities because of too much screen time, you can use such apps. I would do it with their consent because exerting too much control might not be a good idea to get co-operation. And also at the same time, let them know why you are doing this and how excessive screen time affects them. Our aim should be to teach them balance and moderation. Using scare tactics can only work so far. I did research on screen time tracking apps for you. Here are some apps that you can check out. When it comes to limiting screen time for kids, the earlier you start the better. What are your best tips on controlling screen time? Let me know in the comments below. You might also like: - 10 things every daughter needs from her mom - 12 smart tips to raise independent kids - How to get kids started on doing chores If you love what you are reading, please take a moment to PIN and SHARE!
<urn:uuid:53574016-f5fc-412c-913e-9e3ad94c7a4c>
CC-MAIN-2020-16
https://messyyetlovely.com/tips-limit-screen-time-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371700247.99/warc/CC-MAIN-20200407085717-20200407120217-00194.warc.gz
en
0.959473
2,803
3.28125
3