text
stringlengths
1k
23.6k
id
stringlengths
47
47
dump
stringclasses
3 values
url
stringlengths
16
1.34k
file_path
stringlengths
125
126
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
2.05k
4.1k
score
float64
2.52
4.91
int_score
int64
3
5
Judicial impartiality is a fundamental component of natural law. It is universally recognized that without judicial impartiality, justice cannot be done. Moreover, rule of law loses its potency and public confidence in the judiciary erodes for want of fairness and impartiality. As a safeguard measure against partiality, the common law countries, which include Bangladesh, have developed the concept of the rule against bias. This rule disqualifies judges from adjudicating a case where they may have an interest, or their impartiality might reasonably be questioned (as in the US federal law), or there is a real possibility of bias (as in the UK), or there is a reasonable apprehension of bias (as in most commonwealth countries). The term ‘bias’ encompasses appearances of bias because “the appearance is just as important as the reality” and “essential in protecting public confidence in the judiciary”, as stated by Lord Bingham in the case of Davidson v Scottish Ministers (2004). In the case of Porter v Magill (2001), Lord Hope stated that when the issue of bias is raised, the question that a court should ask itself is – whether or not a fair minded and informed observer, having considered the facts, would conclude that there was a real possibility that the tribunal was biased. If the answer is in the affirmative, the judge or judges in question must recuse themselves, and if the case has already been decided by then, the decision is to be set aside. Lord Hope’s formula has been cited by courts with approval in common law countries and beyond. The circumstances where the rule against bias could be invoked are wide and include – where a judge has a close relationship with a representative or a party to the proceedings, has interests in the outcome of the case, has made up their mind before hearing the evidence or arguments and has strong personal views on the subject matter of the case. The concept applies equally to all courts, whether sitting as a single magistrate at the lower court or sitting en banc as a collegial decision making body at the Apex Court. An aggrieved party usually makes an application for recusal of a judge on grounds of bias before the hearing. An application may also be made after the verdict if the information giving rise to the issue of bias was not known at the time of or prior to the hearing. An example of where the issue of bias became clear only after the judgment was perfected, is the Pinochet case (2000) in England. There, the House of Lords set aside, for the first time in its history, its own decision after it became known that one of the Law Lords, Lord Hoffman, had been an unpaid director of the Amnesty International, which had actively assisted one of the parties in the proceedings. The Irish Supreme Court also vacated its own decisions on grounds of apprehended bias in the case of Kenny v Trinity College (2008). The Supreme Court of New Zealand vacated its earlier judgement in the case of Saxmere v Wool Board Co Ltd (2009) where one of the judges belatedly disclosed their relationship with the counsel who had represented one of the parties in the case. The rule against bias is naturally an integral part of the judicial system in Bangladesh as elsewhere in the civilised world. Indeed, it is not uncommon for the judges of the High Court Division to recuse themselves of their own volition from dealing with a case on the basis that they are “embarrassed”. This is indeed admirable. However, there appears to be a tradition not to give detailed reasons for such decisions. It is suggested that allowing the parties to address the issue and giving full reasons for the decision to recuse would increase transparency, enhance public confidence in the judiciary and provide guidance for the lower judiciary to follow. This brings us to the subject of this article, the 16th Amendment Judgment, delivered by the Appellate Division of the Supreme Court of Bangladesh on 3rd July 2017. In this case, the Apex Court, sitting en banc, refused an appeal by the Government of Bangladesh, and unanimously held that the Constitution (Sixteenth Amendment) Act of 2014, which had bestowed the removal mechanism of Judges to the Parliament, was ultra-vires to the Constitution and therefore, void. Justice Surendra Kumar Sinha, who was the Chief Justice at the time and the author judge of the case, has recently written a book titled “A Broken Dream – Rule of Law, Human Rights, & Democracy”. In the book, he made some startling admissions of his own conduct which brings to focus the issue of judicial bias and impropriety while adjudicating this case. Incidentally, the book also alleges blatant interference in the case by those who embody the Executive branch of the state. If these allegations are found to be based on facts, then it would be extremely disturbing. However, it would be fair to say that the circumstances of Justice Sinha’s resignation would indicate that he would have a personal axe to grind against the executive. Being at a comfortable distance away from the scenes may also motivate him to defame people and institutions without restraint. Therefore, as things stand, it would be wholly inappropriate to comment on his allegations on others, until and unless such allegations are authenticated by an independent and reliable source. Meanwhile, it would be perfectly reasonable to accept Justice Sinha’s narrative of his own conduct in the 16th Amendment case and discuss the consequences thereof. In Justice Sinha’s book, the chapter that deals with the 16th Amendment is titled “Constitution: Sixteenth Amendment Case and its Aftermath”. At the beginning of the chapter, Justice Sinha makes an extraordinary revelation regarding his views on the 16th Amendment around the time the parliament passed the Act in 2014. He stated that he had found out that a former Chief Justice was “one of the architects of the idea of the 16th Amendment”, and on making that discovery, he (Justice Sinha), “cautioned” the former Chief Justice “not to give ill advice to the government pointing out that certainly he did not want to cripple the judiciary”. This clearly indicates that Justice Sinha, well before the case came before him, had such a firm and ensconced view of the 16th Amendment that he considered it to be a product of “ill advice” and that it would “cripple the judiciary”. He stated in his book that he wanted to hear the 16th Amendment case expeditiously. This is commendable, and should be done in every case to ensure proper justice. But his reasons for that indicate a different purpose. He stated that he needed to dispose of this case before his and two of his colleagues’ imminent retirement “if the judiciary is to survive”, and expressed concerns about the “attitude of the government”, one of the parties to the case. This could only mean that Justice Sinha, before hearing any arguments, had decided on a particular outcome, as he saw it, for the survival of the judiciary, and that he viewed the government as a rival, rather than a party to the proceedings. He also felt that he needed to engineer the time schedule so that the case was heard before the retirement of himself and two of his colleagues, as a part of his triumph against the government strategy. This attitude and approach of Justice Sinha towards the 16th Amendment case, by any standards, amount to flagrant breach of the rule against bias. The Apex Courts in all common law countries and elsewhere conduct their deliberations in private, with the exception of the Brazilian Supreme Court. Justice Sinha, taking an unprecedented step, has disclosed in his book the private deliberation process that he undertook with his six colleagues in the 16th Amendment case. Now that the private discussion has been placed in the public domain, the public has every right to scrutinise it, or at the very least the part played by the person who felt at liberty to make such disclosures. According to Justice Sinha’s narrative, on the morning of 3rd July 2017, approximately two hours before the court was due to sit to deliver the judgement, the seven judges sat for deliberation. Justice Sinha, as the presiding judge, made some opening remarks about how the case reached the highest court and the difficulties he was facing “in administering justice”. Following that he “wanted the opinion of the judges”. Justice Sinha then, by his own admission, breaking the tradition of asking the most junior judge first, decided to ask the senior-most judge, Justice Wahhab Miah first, who gave his opinion in favour of dismissing the appeal. The second most senior judge, Justice Nazmun Ara Sultana, also agreed to dismiss the appeal. He then turned to the next senior-most judge, Justice Mahmud Hossain, who said he would allow the appeal. Justice Sinha then asked Justice Imman Ali who was in favour of “disposal of the appeal with observations”. Next it was the turn of Justice Siddique who “expressed his opinion for allowing the appeal”. Finally the most junior judge, Justice Haider, was asked, and he readily “concurred with the senior-most judge”. Justice Sinha made no mention in his book of disclosing his own opinion to his fellow judges and surprisingly no one had questioned that omission. The likely explanation for this may be that his opinion on the matter was so well known, even long before the case came before the court, that he did not consider it necessary to formally express it during the deliberation with his colleagues. In any case, at this stage of the deliberation, the collegiate decision making process would suggest that Justice Sinha ask each of the judges to give brief reasons in support of their opinion, or “an oral mini judgment”, (as Lord Neuberger put it in his Blackstone Lecture 2014, while describing the deliberation process in the UK Supreme Court) which might or might not persuade others to change or modify their opinions. But Justice Sinha’s thoughts at the time, as he expressed in his book, was that if he could not change the minds of the four judges who decided against the dismissal of the appeal, then “all my efforts would be frustrated”. This indicates that he was on a personal mission in this case, and going through collegiality and a structured decision making process was the last thing on his mind. Justice Sinha instructed others “not to make any comments” and then addressed Justice Siddique because in his words, “I knew him (Justice Siddique) very well and I realised he would be a soft target for me.” After that, this is what Justice Sinha admitted to doing- “I reminded him how I mentored him, trained him, and kept my trust in him with the expectation that one day he would lead the judiciary….” He then gave a very subjective negative view of the current Executive and the Legislature and concluded by saying, “Now the judges are directly under our control and even at this stage we are unable to rein them (sic), and if they could remain under the present members of parliament what consequences would they face?” At this stage, Justice Sinha noticed “a bit of change in his body language”. He then started addressing Justice Siddique on matters which appear to be even more irrelevant to the case and so personal to Justice Siddique that even Justice Sinha did not feel comfortable disclosing it to the readers of his book. With this, Justices Siddique relented and Justice Sinha had his “soft target” under his control. Justice Sinha then turned to Justice Syed Mahmud Hossain whom he referred to as “a very soft target” once he had won over Justice Siddique. This time, Justice Sinha made no mention of the 16th Amendment issues at all (on which the Apex Court’s deliberation was supposed to be taking place). This is what he wrote in his book – “I also pointed out to him(Justice Hossain) that from the stage he was a practicing (sic) lawyer, how I treated him all the time and used to advise on matters……….. I had the firm conviction that he could not disown my contribution in him reaching his present position.” Justice Sinha admitted in his book to carrying on in that vein for 8 to 10 minutes when Justice Mahmud Hossain “simply moved his head expressing ‘yes’”. This is how Justice Sinha described his reaction when he won over his “very soft target” – “Then and there I stood up and hugged him and said softly, keeping my mouth close to his ear, he would be succeeding me”. The inappropriate nature of this kind of behaviour during the deliberation process is self-evident. Justice Sinha then, as he put it, “took on” Justice Imman Ali. Almost bragging, he wrote that it took him just 2 to 3 minutes to change Justice Imman Ali’s opinion. By then it was 10.30 am and Justice Sinha had achieved a unanimous decision to deliver to a court full of unsuspecting lawyers and the press. But at what cost? The fact that Justice Sinha was biased in the 16th Amendment case is so clear from his remarks and manoeuvring that even he would probably agree if he read his own book now. As we saw earlier, the Apex Courts of many countries have set aside their decisions on being satisfied of bias or appearance of bias on part of one or more of their colleagues. But this case goes one step further. Justice Sinha, driven by his biased views, seemingly fatally contaminated two, possibly four, of the judges in the 16th Amendment case. It is unheard of that a Chief Justice in a civilised country would use, not the force of his legal expertise to change the minds of his colleagues in a case of intense constitutional importance, but extra-judicial and personal issues, identify his learned colleagues as “targets” and create severe psychological pressure. Even if it turns out that his allegation of the executive interference in the 16th Amendment case is true, this would not mitigate his own egregious conduct in the deliberation process of the case. This case will not only in the sub-continent, but also in the common law world, remain as a textbook example of how not to reach a decision in a collegiate court. That the 16th Amendment verdict should be set aside for impropriety and the flagrant breach of the rule against bias, and the appeal should be heard anew, is evidently overwhelmingly made out. It is understood that a review petition on this case is awaiting hearing. The events have now overtaken that procedure – a case vitiated by bias and impropriety not capable of being reviewed. It is respectfully suggested that the Apex Court, in particular, the Honourable Chief Justice, could consider using the Court’s inherent powers to set aside the judgment and arrange a new hearing. In order to protect and enhance public confidence in the judiciary, a sense of immediacy is called for in this matter. Of course, after hearing the matter afresh, the Apex Court could come to the same conclusion as before, similar to what happened in the Pinochet case in the UK. Nevertheless, whatever decision is made after due consideration of the merits of the case by the best legal brains of the country sitting at the Apex Court, untainted by undue influence from within or without, would indeed be worthy of public respect. UKHL 34 UKHL 67 1 AC 61 IEHC 35 (2009) SC 64/2007 25 BLT (Spl) (AD) 01 Justice Surendra Kumar Sinha, A Broken Dream: Status of Rule of Law, Human Rights and Democracy (1st edn, Lalitmohan-Dhanabati Memorial Foundation 2018) 426 Ibid 429 Ibid 438 Ibid 439 Ibid 440 Ibid 441 Ibid 439, 440 Pinochet (n 3)
<urn:uuid:ebc58568-26a7-4e3b-a046-8109a5691135>
CC-MAIN-2022-33
https://bdlawdigest.org/justice-sinhas-broken-dream.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00406.warc.gz
en
0.982366
3,465
3.40625
3
Black Lives Won’t Matter, Until Black Life Matters The San Diego Monitor-News has been serving Black San Diego since 1986 Bias is a disproportionate weight in favor of or against an idea or thing, usually in a way that is closed-minded, prejudicial, or unfair. Biases can be innate or learned. People may develop biases for or against an individual, a group, or a belief system. The point behind this article comes in the form of many questions. The title alone is a mouth full. No matter if a White mouth or a Black-mouth utters Black Lives Matter, there’s a question that should be proposed, If Black Lives do Matter, then why doesn’t Black Life Matter? Historically, Black Life was perceived as Criminal and that’s an understatement. But why isn’t this considered, or worth intellectual thought? I started with the definition of bias because it is the biases that impede Black life from being valued in society. For Black Americans, the American dream comes with a badge of bravery and a warning that reads “Use at your own risk”. The American definitions of peace, comfort, high living standards, opportunities, benefits, and of course privilege; crisp White America, unfortunately, think Black Life is naturally in opposition to all of those. It doesn’t dawn on White America that Black Lives financed the original concept and maybe, just maybe, has versions of their own. There are many more questions that come to mind; like what purpose does it serve in incriminating Black LIFE in the first place? In a country that places collective (Class) power status above individual powers, rights, or liberties, then if Black Life as a collective were a collective that mattered, we would not need to say, Black Lives Matter. White Life Matters, Period! White Americans don’t need to turn the word from “LIFE” to “Lives” because the word “LIFE” covers their Lives, automatically. It goes without saying!… The point here is that “White Life” is completely in a protected vacuum and cannot be tainted. White culture or “White Life” (the collective class) cannot be tainted or tarnished by “White lives” as individuals. No matter what damage a white individual causes…a white individual can’t, I repeat, cannot stain “White Life!” Ever! This brings me to the overall point of this article; I recently watched our city government announce the “No Shots Fired” program. Strangely, nothing was different than before, but this time it hit me differently and I was disturbed. Within San Diego County with its flux of Hispanic immigrants along with the growth of the Latino population in this country, one would think the optics of crime would have shifted. The American crime stigma should no longer carry the face of Black Lives. The per capita math is used to justify police policy; so here’s a FactCheck perspective view here: https://www.reuters.com/article/uk-fact-check-bar-graph-black-white-homi/fact-check-misleading-bar-graph-presents-distorted-interpretation-of-black-and-white-murder-rates-idUSKBN23M2SX With the above intro in mind, African/Black American intellectuals and politicians need to rethink its solution bedfellows. Black leaders, who constantly use the “Black & Brown” phrase; for the sake of the community, should stop to ask what is this really about? Do they stop to study the implications of how “class” power works. We must ask ourselves how Hispanics and or Latino “Brownness” will affect the historical stain and biases toward “Black Life”; my guess it will be harmful to Black Lives. I was engaged in a conversation with one stakeholder of the “No Shots Fired” program and I asked him why was their press conference held in the “southeast” historical Black community? Without getting too detailed he of course defended the location. As I watched one of the many news reports, they span the camera for a wider shot of a park in the southeast community. They go on to mention, a recent shooting that happened there. Is it me or didn’t any other shootings happen in the city that day? I feel public servants don’t realize how the press machine works or do they even care? If you were to “Follow the Money” on Black life criminality it leads to a “Payoff”, the question then becomes why is it so profitable to tell stories this way? Why does it elude Black civic leaders to see why it’s important to pay attention to How and What things look like? The funding of programs that taint “Black Life” is how White America throws gasoline on the “Black Life” fire. Fires that continue to burn with fuel that solidify biases like “Black People are to be Watched and Controlled” this of course continues to ambush and haze our future generations, thus securing the clean “White Life” myth. Can Black civic leaders, Black program developers find another way to make money? Is there another way that doesn’t give energy and further soil our Black futures? Here’s the thing Black San Diego As a 54-year-old Black woman, who makes the bulk of her living with gifts from both patriarchal and matriarchal predecessors who I may add, financed my inheritance via sharecropping, cotton picking, and bootlegging, I am compelled to prepare the greatest generation that lives on this planet today (our youth) with the best set of circumstances and at the very least Truth. As a publisher, I can no longer accept the subliminal marketing tactics that lead to the “Make America Great Again” politics. It covertly stains Black Life! These so-called helpful programs and initiatives still carry stereotypical gasoline. We must dig deeper and examine community politics and community helper’s motives. I will continue to question their commitment by asking so-called change agents to ask themselves was it worth it? I can’t express enough how damaging 20th-century criminal acoustics and optics are to Black Lives living black life today! When I am in the presence of young people who want to become social activists, social entrepreneurs, or journalists, they ask me “why change agents of yesterday failed to create new futuristic perceptions in place of old corrective criminal messaging?” “Why haven’t they considered an alternative reality, one that could have rendered safety; a safer country to live a Black life and to live life while black, safely?” Simply said, Black Lives Will Never Matter Until Black Life Matters! Black change agents must re-examine not just the function of their programs, initiative, and lobbying but propose the question, do the program’s optics and acoustics fan the flames of historic criminality? How will it support and soothe white comfort in exchange? Are we maintaining marketing that increases endangerment, insensitivity, and unnecessary police encounters? Our beautiful young Black men and woman deserve a tarnish-proof American dream opportunity as the ultimate promissory note in lieu of their fore parent’s forty acres and the mule rubbish. I want marketing that commiserates with our ancestral contributions. If Black folk are the soul of America, then why wouldn’t our souls in this country be free of verbiage and rhetoric that leads to bias and endangerment. Our ancestors paid an incredible price for our souls to be here, and our value should NEVER trade below the exchange rate of other immigrant collectives for the sake of others’ comfort. To me, reparations begin with the Re-branding, Disruption, and Re-packaging of what Black Life means in the Americas. I recently saw a change agent’s Instagram post of the “No Shots Fired” crime-based program, he’s in a t-shirt motif with a Black hand on a gun with a red circle through it. It’s not that gang crime everywhere isn’t real but what needs to start becoming more important than the program itself; is the program’s messaging. We need to start confronting century-long social messaging like “Black on Black Crime” in a way that doesn’t stain every black person and subjugates us to disproportionate and inappropriate negative attention. This is about our future as Black people. If we refuse to understand the criminal price tag and how we’re presented within the eyes of White Life and White Comfort we are just being transactional, while “Black Life” continues to pay dividends due to a narrative being systematically harmful to Black lives. When a country needs to have Black people (or any class or race of people) as poster-child symbols and makes them become the epitome of that symbol, for policymaking, political campaigning, or political purposes in general, this sentences us to “Criminality” forever without sharing and distributing the American nightmare equitably. Again, Black Lives living today, should not finance others’ comfort. For Black Lives to matter, our Black change agents must require that our images are no longer the epicenter of what crime looks like in America. Here’s another great question, Where did the notion come from that young Black males are “Prone” to violence and criminal behavior? The word “Prone” is not by accident! Can it be, that we too as Black publishers are endangering our youth by printing news that fans the flames of criminality? Is it by exalting these notions, by allowing “White Life” to dictate what safer streets look like is the problem? A black-mouth or a white-mouth “Talking Tough” on crime has never led to Black America being free from the Criminality reputation. If parts of the police budget fund programs that increase the “Chances” of more terror, unearned attention, and experiences from Police; well isn’t that an oxymoron? Historical evidence has shown these experiences to be unconstitutional and unlawful. I hope that Black Life becomes important to all of us. But above all this, the African American median age is 27, most young Black males have never and will never see a gun. Interestingly enough, most black men have never been arrested. What is so uncomfortable to white America knowing that more Black Lives live like White Lives? Black lives are involved in great things just like their other American racial counterparts. The life and breath within our beautiful young people are precious assets to our culture and collective, they deserve to be unimpeded and certainly not grand-fathered into 19th and 20th-century marketing messages. There needs to be a disruption in marketing messages, developed by African American firms that could reverse the “Real Crime here and that’s unearned government-sanctioned defamation of “incrimination” by association.” AA firms could create progressive marketing for civic, and economic programming that doesn’t wreak “Correction” or “Quality Control” connotations. To keep nailing shut a door that was never intended to open, is the moral of this article. I was never told as a child I had to work twice as hard for a fraction of the US Dollar. In other words, White life’s beneficiaries have no right to define, reduce, subtract, or divide our children’s energy, and value rate. Bad media sets up a negative “Black Life” notion that community helpers just take for granted. Stereotypes are designed to function by limiting access by division, subtraction, reducing without due process. And finally, what makes people sick and tired of being sick and tired, is all the hidden pretense of programs we don’t see coming…like the thousand words of bad pictures or video backgrounds, recycled slave messages in the form of commercials, movies, propaganda, cartoons, and religious rhetoric… you name it. In the scheme of things how ridiculous is a Black hand on a gun as the poster child symbolism for crime in America? So here are my suggestions for the Black press to start disrupting the psyche of Americans to what crime also looks like in America. The San Diego Monitor-News has been serving Black San Diego since 1986
<urn:uuid:01ce6881-b9f1-4665-b83f-206dfc4ea00e>
CC-MAIN-2022-33
https://sdmonitornews.com/2021/03/19/12701/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00405.warc.gz
en
0.940767
2,613
2.609375
3
In spring and fall migrations, prairie falcons prefer open grassland habitats, although they are found in forested habitats in Canada during migrations as well. In winter, prairie falcons prefer open desert and grassland habitats. Prairie falcons breed in open, arid grasslands with cliffs and bluffs for nesting. Nesting sites are commonly shared with common ravens (Corvus corax), golden eagles (Aquila chrysaetos), and red-tailed hawks (Buteo jamaicensis). (Steenhof, 1998) Prairie falcons are large, pale brown falcons with squarish heads and large, dark eyes. Characteristic facial features include black malar streaks, a dark ear patch, and a distinctive white patch between the eyes and ear patch. About one year after birth, at full maturation, the bill horn is dark-bluish and yellow at the base. Yellow feet and a white throat also distinguish adults. When perched, the wings are shorter than the tail tip. Prairie falcons can be identified while in flight by their dark axillaries and a “trailing edge of underwing-coverts”. These stand out against the light colored underwing surface of the bird. Prairie falcons are distinguishable from similar looking falcons by dark, triangular patches on the undersurface of their pale wings. Females tend to be larger in size and have greater basal metabolic rates than males. Prairie falcons can be difficult to spot in their natural habitat, as plumage color blends in naturally with colors of the cliffs on which they nest. Prairie falcons are sometimes confused with Swainson's hawks (Buteo swainsoni), merlins (Falco columbarius), and peregrine falcons (Falco peregrinus). (Sibley, 2003; Steenhof, 1998; Terres, 1980) Prairie falcons are monogamous during the breeding season. Pairs are established upon arriving at the breeding grounds. The mating system is similar to that of peregrine falcons (Falco peregrinus) and gryfalcons (Falco rusticolus). Courtship behaviors include ledge displays, head-low bows, mutual soaring, and different vocalizations. Males use food and vocalizations to attract females to ledges. Copulation between prairie falcons lasts about 10 seconds. Copulation begins more than 51 days before the clutch is completed. Males during courtship tend to females by bringing food to the nesting site. (Steenhof, 1998) Prairie falcons don't construct nests, rather they create a scrape on a ledge. They breed from February to July, with a peak from April to May. They lay from 2 to 6 eggs at 2 day intervals. Incubation lasts about 29 to 31 days. Young are fledged at 29 to 47 days old and become independent a little more than 2 months after hatching. Prairie falcons become sexually mature within 2 years after hatching. (Steenhof, 1998; Steenhof, 1998) Females perform the majority of incubation and brooding. Males begin sharing incubation duties during the egg laying process but the amount of time a male incubates varies greatly. Young hatch with open ear holes and slightly open eyes. Parental attendance at the nest decreases 1 to 2 days after hatching, within 28 days of hatching the parents no longer brood the young. During the first three weeks after hatching, both parents feed the young. Usually, the male brings food to the female who passes it to the young. After 4 weeks, parents drop food at the ledge of the nest and chicks begin to feed themselves. (Steenhof, 1998) One calculation predicted Bubo virginianus) leads to deaths as well. In eggs and nestlings, ectoparasites, predation, human disturbance, and starvation are leading causes of mortality. The average post-fledgling mortality rate is 31%. (Steenhof, 1998)longevity to be 15.6 years. More common, however, is a 2.4 to 4.9 year life span in the wild. Shooting by humans is the number one cause of death for prairie falcons. Collisions with manmade objects, such as vehicles, wires, and fences, is the second leading cause of death in adult falcons. Some adults have been known to drown in stock tanks as well. Predation by great horned owls ( Prairie falcons are mainly solitary and are only found in pairs during the breeding season. Play-like behavior has been observed in prairie falcons, as well. Birds were observed tossing dried cow manure from their talons and attempting to catch it again in mid-air. (Steenhof, 1998) Prairie falcon flight is distinguished by shallow, stiff wing beats. They are able to soar 4 to 5 times longer distances by flattening their wings and fanning its tail. Adult prairie falcons spend 4 to 6 percent of their day preening. Dust bathing is the most common form of self-maintenance, but they do bathe in standing water where available. Prairie falcons stop flying about a half hour before sunset, however, nocturnal flight has been recorded. Most flight takes place throughout the middle of the day. (Steenhof, 1998) Prairie falcons are widely considered the most aggressive of all raptors. Nesting adults will attack other prairie falcons that enter their territory as well as other sympatric raptor species, including golden eagles (Aquila chrysaetos), red-tailed hawks (Buteo jamaicensis), California condors (Gymnogyps californianus), great horned owls (Bubo virginianus), and terrestrial predators. No aggresive responses have been noted towards American kestrels (Falco sparverius), northern harriers (Circus cyaneus), sharp-shinned hawks (Accipiter striatus), and turkey vultures (Cathartes aura). (Steenhof, 1998) The size of the home range varies geographically. Males tend to have larger home ranges than females. Home range size tends to decrease in the winter and increase throughout the breeding season. (Steenhof, 1998) Vocalization is the most common form of communication in prairie falcons, but vocalizations have not been well studied. Three types of calls have been documented: cacking calls are territorial and alarm vocalizations, eechup calls are used during courtship and ledge displays, and chitter calls are used in aggressive situations. The cacking call is a loud, shrill kik-kik-kik. (Steenhof, 1998) During the breeding season the most common prey for these falcons are ground squirrels (Spermophilus), including Townsend’s ground squirrels (Spermophilus townsendii), Belding’s ground squirrels (Spermophilus beldingi) and Richardson’s ground squirrels (Spermophilus richarsonii). These falcons also eat small birds, such as horned larks (Eremophila alestris), western meadowlarks (Sturnella neglecta), mourning doves (Zenaida macroura), brown-capped rosy finches (Leucosticte ausralis), and blackbirds (Icteridae). Reptiles and large insects may also be taken. (Steenhof, 1998; Terres, 1980) Nestlings and eggs are most susceptible to predation. Mammalian predators, especially coyotes and bobcats, prey on nestlings and eggs. Great horned owls prey on both adults and nestlings. Remains of prairie falcons have been found in golden eagle pellets as well. Prairie falcons are aggressive in defense of their territories and nests. They are agile in flight and may avoid predation through agility and aggression. Prairie falcons have been observed defending themselves against great horned owls, resulting in the death of the owl in some cases. (Steenhof, 1998) Prairie falcons help keep ground squirrel populations in check as their main source of prey. They are also predators of other bird species. Prairie falcons are top predators, but are sometimes preyed on by larger birds of prey, such as golden eagles and great horned owls. Prairie falcon eggs and fledglings are sometimes taken by coyotes and bobcats. (Steenhof, 1998) Prairie falcons have been and continue to be important birds for education and scientific research. Their abundance allow for easy studying. They are also the second most frequently harvested bird in the United States for falconry, with nineteen states allowing regulated captures of prairie falcons. Prairie falcons also help to regulate populations of ground squirrels and other rodents. (Steenhof, 1998) There are no known adverse effects ofon humans. Tanya Dewey (editor), Animal Diversity Web. Matthew Goulet (author), Kalamazoo College, Ann Fraser (editor, instructor), Kalamazoo College. living in the Nearctic biogeographic province, the northern part of the New World. This includes Greenland, the Canadian Arctic islands, and all of the North American as far south as the highlands of central Mexico. uses sound to communicate living in landscapes dominated by human agriculture. young are born in a relatively underdeveloped state; they are unable to feed or care for themselves or locomote independently for a period of time after birth/hatching. In birds, naked and helpless after hatching. having body symmetry such that the animal can be divided in one plane into two mirror-image halves. Animals with bilateral symmetry have dorsal and ventral sides, as well as anterior and posterior ends. Synapomorphy of the Bilateria. an animal that mainly eats meat Found in coastal areas between 30 and 40 degrees latitude, in areas with a Mediterranean climate. Vegetation is dominated by stands of dense, spiny shrubs with tough (hard or waxy) evergreen leaves. May be maintained by periodic fire. In South America it includes the scrub ecotone between forest and paramo. uses smells or other chemicals to communicate in deserts low (less than 30 cm per year) and unpredictable rainfall results in landscapes dominated by plants and animals adapted to aridity. Vegetation is typically sparse, though spectacular blooms may occur following rain. Deserts can be cold or warm and daily temperates typically fluctuate. In dune areas vegetation is also sparse and conditions are dry. This is because sand does not hold water well so little is available to plants. In dunes near seas and oceans this is compounded by the influence of salt in the air and soil. Salt limits the ability of plants to take up water through their roots. humans benefit economically by promoting tourism that focuses on the appreciation of natural areas or animals. Ecotourism implies that there are existing programs that profit from the appreciation of natural areas or animals. animals that use metabolically generated heat to regulate body temperature independently of ambient temperature. Endothermy is a synapomorphy of the Mammalia, although it may have arisen in a (now extinct) synapsid ancestor; the fossil record does not distinguish these possibilities. Convergent in birds. offspring are produced in more than one group (litters, clutches, etc.) and across multiple seasons (or other periods hospitable to reproduction). Iteroparous animals must, by definition, survive over multiple seasons (or periodic condition changes). a species whose presence or absence strongly affects populations of other species in that area such that the extirpation of the keystone species in an area will result in the ultimate extirpation of many more species in that area (Example: sea otter). makes seasonal movements between breeding and wintering grounds Having one mate at a time. having the capacity to move from one place to another. This terrestrial biome includes summits of high mountains, either without vegetation or covered by low, tundra-like vegetation. the area in which the animal is naturally found, the region in which it is endemic. reproduction in which eggs are released by the female; development of offspring occurs outside the mother's body. breeding is confined to a particular season reproduction that includes combining the genetic contribution of two individuals, a male and a female uses touch to communicate that region of the Earth between 23.5 degrees North and 60 degrees North (between the Tropic of Cancer and the Arctic Circle) and between 23.5 degrees South and 60 degrees South (between the Tropic of Capricorn and the Antarctic Circle). Living on the ground. defends an area within the home range, occupied by a single animals or group of animals of the same species and held through overt defense, display, or advertisement A terrestrial biome. Savannas are grasslands with scattered individual trees that do not form a closed canopy. Extensive savannas are found in parts of subtropical and tropical Africa and South America, and in Australia. A grassland with scattered trees or scattered clumps of trees, a type of community intermediate between grassland and forest. See also Tropical savanna and grassland biome. A terrestrial biome found in temperate latitudes (>23.5° N or S latitude). Vegetation is made up mostly of grasses, the height and species diversity of which depend largely on the amount of moisture available. Fire and grazing are important in the long-term maintenance of grasslands. uses sight to communicate Ekstrom, J., S. Butchart. 2006. "IUCN Red List of Threatened Species" (On-line). Falco mexicanus. Accessed November 14, 2006 at http://www.iucnredlist.org/search/details.php/49517/summ. Sibley, D. 2003. The Sibley Field Guide to Birds of Western North America. New York: Alfred A. Knopf, Inc.. Steenhof, K. 1998. Prairie Falcon (Falco Mexicanus). Pp. 1-28 in A Poole, F Gill, eds. The Birds of North America, No. 346, Vol. 9, 1 Edition. Philadelphia, PA: The Birds of North America, Inc.. Terres, J. 1980. Falcon, prairie. Pp. 273-274 in J Terres, ed. The Audubon Society Encyclopedia of North American Birds, Vol. 1, 1 Edition. New York: Alfred A. Knopf, Inc..
<urn:uuid:192e4151-d428-4c0c-81a6-9ba523a7b182>
CC-MAIN-2019-22
https://animaldiversity.org/site/accounts/information/Falco_mexicanus.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256797.20/warc/CC-MAIN-20190522103253-20190522125253-00182.warc.gz
en
0.929683
3,076
3.78125
4
Standard safety measures in nursing pdf The Australian Food Safety Standards, while encased in federal law through the Food Standards Australia New Zealand Act 1991, are implemented, governed and enforced by Australian state and territory governments through additional laws and regulations. Given the complex nature of nursing and/or midwifery practice, the NMBA standards for practice have been developed as broad holistic statements, interrelated as determined by the nursing … The occupational health nursing practice standards presented in this document were developed using an approach suggested by Donabedian (1966) based on a … NSQHS Standard 4 Medication Safety – How to use the audit tools – 2 – V3.0 8/12/2014 The suite of documents include the following: 1. A ‘how to’ guide on using the tools (this document) patient safety achieving a new standard for care quality chasm Education WorldBook Center WorldBook ID e16218 Education WorldBook Center of medical errors 3 things like yelp ratings and scorecards that are built using medicare data could have a chilling effect on doctors accepting patients with lower reimbursement rates at all provid ebook pdf patient safety achieving a new standard for care Nursing Interventions for Patient Safety Nursing Interventions for Patient Safety The evolution of nursing is one that is rich in history and clinical practices and has existed for hundreds of years for health care issues. Infection control principles and practices for local health agencies [accordion] Standard Precautions Standard precautions are a set of infection control practices used to prevent transmission of diseases that can be acquired by contact with blood, body fluids, non-intact skin (including rashes), and mucous membranes. These measures are to be CHCWHS312A Follow WHS safety procedures for direct care work Modification History CHC08 Version 3 CHC08 Version 4 Comments CHSOHS312B Follow safety procedures for direct care work CHCWHS312A Follow WHS safety procedures for direct care work New unit in V4 – Addition of new unit to address changes in national WHS legislation. Replaces CHCOHS312B Unit Descriptor … Essential fire safety measures are installed within a building or premises to perform a vital function in protecting life and preventing injury in the event of fire. They are prescribed by the Environmental Planning and Assessment Act and Regulations and may include: • automatic fire sprinkler systems • smoke detection and alarm systems • self-closing solid-core doors or fire doors It is the standard for an officer of the PCBU and means actively taking all reasonable steps to ensure compliance with the legislation. In exercising due diligence, an officer must take reasonable steps to: • acquire and keep up-to-date knowledge of work health and safety matters • know the industry, the hazards and risks associated with work • ensure application of appropriate resources Safety measures will be utilized by all personnel during transport. UNIT: RESPIRATORY PROGRESSIVE CARE UNIT/ RESPIRATORY STEP DOWN STANDARD #: PAGE: 126.492 Page 2 of 10 8.1. In the event of an internal disaster, the respiratory progressive care unit staff will evacuate patients as per Safety Plans. 8.2 When transferring patients out of the respiratory progressive care … infection control standard precautions in health care Healthcare Staff Wellbeing Burnout and Patient Safety A These measures are intended to illustrate both the quality of nursing care and the degree to which the working environment at an institution supports nurses in their patient safety efforts. an enhanced safety climate in health-care settings. important advice Promotion of a safety climate is a cornerstone of prevention of transmission of pathogens in health care. Standard precautions should be the minimum level of precautions used when providing care for all patients. Risk assessment is critical. Assess all health-care activities to determine the personal protection that is Control measures must be monitored and reviewed on a regular basis to ensure they remain effective. Refer to Department of Health Implementation Standard: Work health and safety risk management (PDF, 206kB) for details on this process. Workplace Safety and Health Management Policy Planning Implementation and operation Measuring performance Audit and review . WORKPLACE SAFETY AND HEALTH MANAGEMENT Practical Guidelines on the Implementation and Maintenance of an Occupational Safety, Health and Welfare Management System Published by the Health and Safety Authority. Published in January 2006 by the Health and Safety … The Hospital Compare website also contains data on a wide range of additional quality and safety measures. The Hospital Consumer Assessment of Healthcare Providers and Systems initiative or HCAHPS measures patients’ perspectives on hospital care. Patient Safety, developing a standard taxonomy, designing tools for research policy and assessment, identifying solutions for patient safety, and developing reporting and … National Safety and Quality Health Service Standards 3 Introduction Australian Commission on Safety and Quality in Health Care This document presents the ten National Safety and Quality Health Service (NSQHS) Standards. The NSQHS Standards were developed by the Australian Commission on Safety and Quality in Health Care (ACSQHC) in consultation and collaboration with jurisdictions, technical The purpose of Core Measures: The Nurse’s Role is to present information about Core Measures and define the role of the nurse in improving the healthcare organization’s performance on Core Measures. page 1 Standard 4: Medication Safety – SA Health Accreditation Resource to support Health Services Medication Safety Clinical leaders and senior managers of a health service organisation This guide is intended for nursing home owners, administrators, nurse managers, safety and health professionals, and workers who are interested in establishing a safe resident lifting program. 2019 QSEN Forum – Call for Abstracts Enhancing Systems Thinking for Undergraduate Nursing Students Using Friday Night at the ER Welcome Florida and QSEN Institute Regional Center at Jacksonville University. Outcome measures The following measures may be used to assist in clinical practice. Health professionals are expected to decide which measures are appropriate for their patient. of quality and safety metrics, accreditation standards and goals for quality and patient-safety performance, and clinical licensure that requires accountability for evidence-based care (Abelson, Accreditation Standards Care recipient lifestyle Principle: Care recipients retain their personal, civic, legal and consumer rights, and are assisted to achieve Compliance to Occupational Safety Measures among the Paramedical Workers in a Tertiary Hospital in Karnataka, South India Background: The guidelines for minimizing occupational health risk from exposure to highly infectious diseases is already established but little information exists on the compliance of these measures among paramedical workers in India. 15/02/2012 · Access the Endorsement Summary (PDF) There is also a recognized need to expand available patient safety measures beyond the hospital setting and harmonize safety measures across sites and settings of care. In order to fill these gaps and to develop a more robust set of safety measures, NQF will be soliciting patient safety measures to fill gap areas and to address … National practice standards for nurses in general practice for the benefit of all nurses, their colleagues working as part of the general practice team and, most importantly, the community for whom nurses provide care. Measures. The survey included a section that asked questions coming from the HSOPSC. It is difficult to find a universal culture instrument in the literature on current assessments of patient safety culture. 14 This is especially so in the case of nursing homes. 7 The NMBA website provides details of the regulatory standards, codes and guidelines for midwifery practice, including the Code of conduct for the midwife, Code of ethics for midwives, National framework for the development of decision-making tools for nursing and midwifery practice, Supervision guidelines for nursing and midwifery, Guidelines for mandatory notifications, and Safety and Use infection control measures during invasive clinical procedures. Cleaning and disinfecting shared patient care equipment Considerations when choosing a method of cleaning and/or disinfection for shared patient care equipment Page 2- State Survey Agency Directors . staffing measures are also used to calculate each nursing home’s star rating for the staffing domain as part of the Core Measures The Nurse’s Role RN.com Understand and utilize standard reliable safety processes. Commit to confronting and correcting unsafe acts, practices, methods, and conditions – and have the courage to intervene. Personally complete required safety training, inspections, housekeeping, and execution of basic safety systems. Executive Order. Executive Order WSDOT Safety Procedures and Guidelines Manual M 75-01.34 Page 5 The traditional approach to measuring health and safety performance If managing directors or CEOs were asked how they measured their companies’ performance, they would probably mention measures l ike Family Day Care Safety Guidelines 1/63 Kidsafe Family Day Care Safety Guidelines August 2014 Standards establish a common language so that consumers can buy products and services knowing that they have been assessed by experts and are safe and reliable. Furthermore, ‘around a third of all Australian Standards form some part of Territory, State or Federal law. They are at the heart of the Measures to control hazards and risks to health and safety are regularly monitored and evaluated. Workers are consulted and encouraged to contribute to the decision making australian nursing federation occupational health and safety1 It is the policy of the Australian Nursing Federation that: 1. All nurses, midwives and assistants in nursing (however titled) (employees) have the right to work in a safe and healthy workplace environment and to perform their work without risks to their physical and psychological health and safety. 2. Employees have rights … [ENGLISH VERSION] Patient Safety Achieving A New Standard Standard safety measures 1. STANDARD SAFETY MEASURESDEFINITIONS • Standards – A standard is a predetermined level of excellence that serves a guide for practice. Search terms included (safety culture* or safety climate* or culture of safety*) and (healthcare* or hosp* or long term care* or nursing home* or community*) and (patient safety* or public safety*). standardized method to evaluate patient safety in general acute care hospitals in the United States. scores interpreted in terms of standard deviations above or below the mean, with above reflecting better than average performance. Results: Twenty-six measures were included in the score. The mean composite score for 2,652 general acute care hospitals in the U.S. was 2.97 (range by hospital Occupational Health and Safety in Residential Aged Care First Steps October 1999 Department of Health and Aged Care . 2 OHS in Residential Aged Care First Steps Disclaimer OHS in Residential Aged Care: First Steps(First Steps) has been developed to provide information to assist small aged care facilities to develop their own occupational health and safety program. The material takes into 8/07/2016 · An additional six studies (22.2%) found some sort of relationship between wellbeing and patient safety, but with only some subscales of the wellbeing measures or safety measures correlating[27, 28, 41–44]. The home care setting is a challenging work environment in terms of patient safety for a number of reasons. First, residential settings may present household-related hazards (e.g., poor indoor air each standard: Generalist data, implement the nursing process, and enhance nursing practice. Standard of Practice when necessary for safety and quality improvement. Standard of Professional Performance –8 Education The HH registered nurse attains knowledge and 2 In June 2013, the CARE International Safety and Security Standards were adopted. The Safety & Security Standards are the operational realisation of the CI Safety and Security Principles (2008). For more information, please contact firstname.lastname@example.org. Fire Safety in Health Care Facilities organisations may choose to use the attached guide as their industry standard where no other industry specific policies apply. Roles and Responsibilities . Health Facility managers. are responsible for: Ensuring the routine maintenance, repair and testing of all fire safety measures installed in their buildings (section 3.3.4 ) Annual Fire Safety Safety and Quality Improvement Guide Standard 6 Clinical Nursing Interventions for Patient Safety Term Paper Table of Contents The National Safety and Quality Health Service Standards 2 Terms and definitions 5 Standard 6: Clinical Handover 7 Criterion: Governance and leadership for effective clinical handover 10 Center for Clinical Standards and Quality/ Quality Safety Defining and Assigning Accountability for Quality Care and Fire Safety in Health Care Facilities SARASOTA MEMORIAL HOSPITAL STANDARDS OF CARE STANDARDS Standard 4 Medication Safety sahealth.sa.gov.au QSEN Quality and Safety Education for Nurses Care International’s Personal Safety & Security Handbook Standard precautions Queensland Health
<urn:uuid:3fdc2f5f-5c43-4da9-b77e-220007a41001>
CC-MAIN-2022-33
https://grantmuir.com/2021/standard-safety-measures-in-nursing-pdf/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00606.warc.gz
en
0.920636
2,599
2.65625
3
(1) What is the purpose of the Tellus Satellite Challenge? Tellus is a satellite data platform business designed to utilize satellite data in industrial fields, aiming to “double the size of the space industry market by the early 2030s”, stated in Space Industry Vision 2030 by the Japanese Government. Tellus Satellite Challenge is a data analysis contest, held by Tellus, to promote utilization of Tellus by introducing examples of satellite data utilization, discovering excellent data scientists, and making satellite data known to the public. The theme of the first Challenge, held in October 2018, was the detection of landslides in the Kumamoto earthquakes using Synthetic Aperture Radar (SAR) data, and 544 participants from both home and abroad submitted a total of 3,400 models for this Challenge. As a result, it has developed exceptionally in depth educational models, spreading analytical knowledge to many experts, and a deeper understanding of actual satellite data analysis (especially special data known as SAR). Please refer to this previous article The First Satellite Data Analysis Contest Report -The answers and what to look forward in the 2nd Challenge to learn about the winners’ approaches. This article explains the 2nd Tellus Satellite Challenge; vessel detection in waters using high-resolution optical satellite data, focusing on the purpose of this Challenge and the approaches of winners. (2) Focus of the 2nd contest's theme The theme of the 2nd Challenge is to develop AI that detects vessels in waters. As an island surrounded by ocean, Japan actually has the 6th largest exclusive economic zone, including the waters surrounding this nation. Consequently, deep analysis of vessel activities is a significant theme of industrial activities including water transportation, fishery, safety, and national protection. However, it is easy to imagine that vessel monitoring is far from easy due to the geographical vastness of the surrounding waters. This is when (artificial) satellites can really comes into play. For the 2nd Challenge, we aimed to develop a high-accuracy vessel detection algorithm of the waters, utilizing data from satellites, which allows extremely good observation over a wide area. In addition, we tried to determine whether vessels were in motion or not and the actual types of vessels based on the high-resolution nature of satellite data used for this Challenge. How far can current AI technology detect objects using high-resolution optical satellite data? It is expected to be used in a variety of situations with the outcome of increased accuracy and precision of vessel identification, such as type and vessel registration. ASNARO-1, high-resolution optical satellite data from the Advanced Satellite with New system Architecture for Observation (ASNARO) series, was used for this contest. ASNARO-1 is an artificial satellite with a ground resolution of 0.5 meters or less developed by NEC Corporation entrusted by the Ministry of Economy, Trade and Industry (METI). This is a scene of the Tokyo Shinkansen Depot and its surroundings in Tabata, Tokyo. Various construction can be seen with the naked eye. The contest was held from January 18 to February 14, 2018, and 448 participants submitted 557 models. Although the duration of the contest was less than a month, many sophisticated AI models were gathered. The first and second places went to overseas participants, underlying how international this competition was. The competition required that 60 or more percent of pixels identified as vessel should overlap the actual vessel area and each model, to successfully determine the type of vessels (in motion, stationary, or barge). MAP was used as the evaluation indicator. This might be regarded as extremely complicated. For picture data, 20 scenes (for learning) and 21 scenes (for evaluation) from 6 different areas (Odaiba, Kawasaki, Yokosuka, Osaka, Kobe, and Fukuoka) were provided. There are two challenging aspects in this competition: 1) since the picture size of one scene is very large (10,000 pixels per side), it is difficult to directly deal it with deep learning, and 2) participants need to use creative skills as vessels to be detected are very small (about 100 pixels). Approaches taken by the winners were similar, and all winners have the following in common: – employed a strategy to detect vessels out of the whole scene by moving the deep learning in a small-sized window. – increased the amount of data to create clearer detection. – adopted a state-of-the-art (SOTA) deep learning model, and for area detection, increased the detection accuracy in post-data processing. Following are detailed explanations of each approach. (3) Detailed explanation on each winner's approach (preparation) All winners cut local images out of the scene of a specific size (1st place winner: 700 px., 2nd: 1,024 px., 3rd: 250 px. and 700 px.). This indicates that they employed a strategy to detect vessels by establishing a determining system for a local point and sliding it over the scene as it is difficult to constrict a model for the whole scene due to size of network. They also aimed to increase the learned data amount and improve the generalization capability by data augmentation. It includes data generation in different sizes/orientations such as random scaling, random rotation, random flip, and data augmentation by color jittering. Since the differences in cutout sizes and techniques used to increase data are not essential, we can learn their preparation use method from each winner’s common strategy. (4) Detailed explanation on each winner's approach (modeling) The model used by the first and second place winners was “Faster-RCNN,” while the third place winner employed “RetinaNet.” Faster-RCNN is a deep learning model proposed in 2015 and has an end-to-end network structure that extracts features of the picture through a convolutional layer and then detects and classifies the object areas by the region proposal network while exporting regression results. As Faster-RCNN has an independent area suggestion component, it employs a two-stage detector. While the conventional two-stage detector was more precise than one-stage detector (described later), it had certain drawbacks such as inefficiency and a slow inference speed. Faster-RCNN is a model that proposes a solution to the speed requirement. Although it is not applicable in such vessel detection, real-time object detection such as automated driving requires high inference speeds as well as high detection accuracy. RetinaNet, called one-stage detector, runs area detection and classification at the same time. This approach, on the other hand, had the ability to make inferences at a higher speed but faced lower detection accuracy than the two-stage detector. RetinaNet proposed Focal Loss, a loss function, to improve accuracy. Please refer to the following paper for more detail. In this Challenge, Faster-RNN model captured the title. In addition, the actual model has improved accuracy by combining multiple networks (such as multiple window sizes). Moreover, the second winning model also adopted the learned models by ImageNet and COCO. However, the effectiveness of the learned models is considered limited as it could not make any significant differences from the model without learned models. In either case, the winners learned advanced techniques and applied them to this Challenge. (5) Detailed explanation on each winner's approach (post-processing) As stated above, all winners combined multiple deep learning models to estimate their final result. To determine a distinctive predicted area and improve the accuracy of detection, the first and third place winners adopted Non-maximum suppression (NMS) treatment, while the second place winner applied Bounding box voting treatment. Both treatments are methods to obtain the most probable distinctive area when multiple area detection results are available for the same vessel. We are not going into details, but if you are interested, please refer to other resources. Now we are going to look at the accuracy of predicted areas of winning models. IoU (Intersection over Union) was used as an evaluation method. IoU is an indicator that evaluates the degree of overlap between the ground truth and predicted areas. The figure below shows the distribution of IoU for the top model. For this task, the threshold value for area detection is set at IoU 0.6 or over. 85.7% of vessel areas that were detected. The relationship between the size of vessels and the accuracy of area detection is as follows. Although it tends to be difficult to detect small vessels, there is no doubt that a set of SOTA modeling approaches have realized high detection accuracy. (6) General comment on this contest The detective accuracy was 0.567 in MAP for this task, which means the right types of vessels were made available in nearly 57% of areas detected by deep learning. It implies the difficulty of identifying types of vessels as detective accuracy is, as stated above, high at 85.7%. When the accuracy is examined closely by vessel types, the detection rate for moving vessels is relatively lower than that stationary vessels, which indicates that difficulties lie in the identification of motion including spray. Furthermore, it is hard to capture the features of barges, which makes the identification far more difficult. As for detection errors, we saw some cases where construction on land areas were detected as vessels. It is assumed that the accuracy could be improved if the detection accuracy of the water area is verified by utilizing map data to filter areas of land. All winners released comments that they enjoyed the contest, and the first and second place winners praised the high-resolving power of ASNARO, saying “the quality of data is high,” and hoped the outcome would benefit Tellus API. They also expressed their wish to participate in the next contest. From these comments, we think this contest has led to the strong presence of Tellus and its promotion. (7) Expectations toward the 3rd Tellus Satellite Challenge The theme of The 3rd Tellus Satellite Challenge, is “detection of sea ice areas,” and is being held from October 14, 2019. The goal of this Challenge is to find, what we call, “drift ice” in the Okhotsk Sea from a satellite. This is an important theme for fishermen and people in the shipping business. In fact, each day during winter, professionals from Japan Coast Guard engage in determining sea ice detection for our peace and safety. The outcome of this Challenge is expected to reduce labor required for such work and to support decision making. The Challenge, therefore, has a large social significance. As for the data, ScanSAR of PALSAR-2 will be used, and two kinds of polarized wave data are provided. This Challenge provides a great opportunity to demonstrate your ability in a specific theme while learning various things such as polarized waves and physics. We are open until November 30 and looking forward to your participation. The 3rd Tellus Satellite Challenge: detection of sea ice areas
<urn:uuid:63efc20a-a886-4878-b51a-2162480fafd9>
CC-MAIN-2022-33
https://sorabatake.jp/en/8550/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00205.warc.gz
en
0.955981
2,294
2.703125
3
How To Draw Stuffed Baby Guinea Pig With Easy Step By Step Drawing Tutorial We will show you today how to draw a cartoon baby guinea pig that happens to be a stuff animal. If you can draw basic shapes, letters and numbersthen you too can draw this adorable stuffed guinea pig. Learn how to draw this character with the following step by step tutorial. This cartoon is actually based on TYs Beanie Boo Guinea Pig, Named Nibbles. There is a picture below to show you what he really looks like. Make An Easy Pig Drawing Farm animals are so much fun, and learning how to draw them is a great combination for a nice afternoon activity. Thats why we created this easy pig drawing tutorial for your little ones! Just download the step by step instructions pdf, print it and get your pencil and colored pencils or crayons. This drawing tutorial is easier than you think! By Step Instructions For Drawing A Guinea Pig 1. Begin by drawing a circle. This will help you to shape the guinea pig’s head. 2. Using a long, curved line, enclose a large, irregular form to one side of the head. Notice the two bulges on the bottom side of the shape that will become the legs. 3. Contour and extend the shape of the head. Within the circle, sketch a more detailed form. Then, use two overlapping curved lines to enclose the shape of the snout and mouth. 4. Erase the guide lines, leaving a globular outline. MORE DRAWING TUTORIALS: 8. Detail the guinea pig’s face. Draw a circle within a circle to form the large, watery eye. Draw an oval and a tiny circle within the smaller circle, and shade around them to form the pupil. Use long, curved lines to enclose the ears. Draw a rounded shape on the snout to form the nose. Draw a small oval to indicate a shine, and shade the nose. 9. Add details of fur along the curves of the guinea pig’s body. Use series of short lines that connect in jagged points. Then, draw whiskers extending from the nose using long, curved lines. 10. Color your guinea pig. These small mammals come in a range of colors, including black, white, cream, grey, and brown. They may also display combinations of these colors, marked with spots, blotches, patches, and rosettes. Learn to draw more fun pets and amazing wildlife using our selection of animal drawing guides. Scroll down for a downloadable PDF of this tutorial. Recommended Reading: How To Draw Eyes From The Side How To Draw A Baby Pig Click HERE to save the tutorial to Pinterest! Pigs were domesticated by humans long ago. Domestic pigs may be referred to as hogs or swine, and wild pigs as boars. A baby pig is called a piglet. There are also many types of domestic pigs. The Hampshire has perhaps the most unique appearance. Its head, middle, and rear are black in color, while its shoulders and forelegs are white. Young pigs have held starring roles in many stories and films. The children’s story Charlotte’s Web features a piglet named Wilbur. The hero of the live-action film Babe was a young pig who wanted to be a sheepdog. Disney’s various adaptations of Winnie the Pooh feature Pooh’s shy friend, Piglet. Scroll down for a downloadable PDF of this tutorial. Would you like to draw a cute pink piglet? This easy, step-by-step baby animal drawing guide is here to show you how. You will only need a pencil, an eraser, and a sheet of paper. You may also wish to color your baby pig. Now We Will Draw In A Face For Your Pig Your pig drawing is almost finished now, and it needs a cute face! The reference image we provided has a happy face for your little pig, so you can try to replicate it using some ovals, circles and curved lines. For this step, you could also change some elements for a unique look to it. For example, you could change the facial expression of your pig by changing details such as the eyes, eyebrows and mouth. Theres definitely a lot of room for you to be creative with it! Also Check: How To Draw A Cartoon Wolf How To Draw A Pig This article was co-authored by our trained team of editors and researchers who validated it for accuracy and comprehensiveness. wikiHow’s Content Management Team carefully monitors the work from our editorial staff to ensure that each article is backed by trusted research and meets our high quality standards. This article has been viewed 226,096 times.Learn more… Pigs are adorable, intelligent animals that can be found on farms and in the wild. Whether you want to draw a realistic pig or a cartoon one, the key is to outline the general shapes before adding in the details. Fortunately, once you know where to start, drawing a pig is fairly simple. How To Draw A Cute Cartoon Baby Pig Before we start with the actual drawing here are some tips, that may help you drawing this piece. Keep your lines loose and draw from your shoulder and not from your wrist! Keep the forms of this drawing very round and avoid sharp corners, this will give the drawing a cute and cartoonish look. And have fun drawing! Don´t think too much about the drawing and don´t stress out about drawing the exact same way I do, just enjoy the process. Read Also: Line Tool In Gimp Learn To Draw Lessons With over a thousand simple drawing lessons for you and your kids to follow along with. We show you how to draw simply with basic geometric shapes, letters, and numbers. We strive to teach you to draw with the most basic learning techniques. Think you can’t learn to draw? Don’t give up until you try drawing with our easy lessons. 😀 Mobile WordPress Theme by themehall.com Next Draw In The Pigs Head Once you have your pencil shapes drawn in, you can start to draw the outline of your pig drawing. Using the ovals you drew previously as a guide, you can carefully draw in the head and ears. The ovals you drew will help to keep the pigs head in the correct shape. I would recommend not rubbing out the pencil lines until after the next step, as we will be using the other oval you drew as a guide for the body. Also Check: How To Draw A Ferrari Step By Step You Can Refer To The Simple Step Start by drawing an oval. This will form pig pig head. Overlapping the oval, draw an irregular shape, like a heart shape with a round bottom. This will form the pig pig nose. Draw a curve from the tip of the nose and a longer curve below it. Draw two U-shaped lines below the longer line to form an open mouth. Draw a short, curved line from the tip of the nose to the top of the oval and a curve from the mouth to the oval. Delete the remaining guides from the oval. Draw ears using a series of connected lines, rectangular. Draw another ear, using the same curves. Draw a partial oval above the nose, and a short curve next to it. Draw a second part oval on the curve. These ovals will form the eyes. Then draw a curved shape on each eye with two short curves. To form the body, draw a large oval that overlaps the back of the head. Draw a long, curved line from the top to the oval. Delete the remaining guides from the large oval. Outline the legs by drawing two sets of curves. In each line, the lines should be farther apart at the bottom. To form the distant leg, draw two sets of curves extending from the abdomen. Delete the guides from the foot. Connect each footpath using a curve, then use two U UNH-shaped lines to form the foundation. Draw a spiral, overlap to form the tail. Color your pig. Many animated pigs are pink, but they can also be black, brown, white or spotted. Paint A Pig With Adobe Fresco With live brushes, you can do just about anything in Adobe Fresco that you can do with real paint, watercolors, or markers. Once youve got one pig, keep going. Try drawing other animals, like a bird or a horse. Or draw three little pigs and a wolf for a fairy tale illustration. Whatever you try next, remember this last piece of advice from Whitlatch: Just relax and take your time. Put some music on, and remember that erasers are your friends and that you dont have to be perfect. Read Also: How To Draw Flower Field Now Draw In The Pigs Body For this step in our guide on how to draw a pig, we will be using the other oval that you draw in as a guide. You can trace over most of it with a pen, leaving a gap at the bottom where the legs will be going. Once youre happy with the head and body of your pig drawing, you can erase the ovals that you drew in step 1. If you drew over the pencil with a pen, make sure that the ink is dry before you start erasing! If you start erasing too early, you could smudge the ink if its a bit wet. Next We Will Draw In The Legs And Tail In the next step of our guide on how to draw a pig, we will be adding in some legs and a tail. This pig will have some cute, stubby little legs, so when you add them in they will be really short and stout. The reference image will show you how you could make them. Once the legs are drawn in, you can add a little corkscrew tail using some simple curved lines like the one in the picture. Also Check: How To Draw A Baby Sea Turtle Guineapigschristmas: Drawing Cavia Etsy Kerst Kaarten Cute guinea pig coloring page from guinea pig category. Baby Guinea Pig Drawing – Here are more drawing tutorials for beanie boos and other stuffed animals. Would you like to draw a cute and cuddly guinea pig. Step by step tutorial teach you how to draw this guinea pig out very simple. Here are more drawing tutorials for beanie boos and other stuffed animals. We provide care to several hundred small animals a year. Cute guinea pig coloring page from guinea pig category. How To Draw Peppa Pig Click HERE to save the tutorial to Pinterest! Peppa Pig is a British animated television cartoon aimed at children of the preschool age. The story centers around Peppa, her family, and her friends, each of whom is a different type of animal. Peppa likes to do the things that ordinary children do. Along with her brother George and their friends, she goes to the playground, rides her bike, goes swimming, and visits her grandparents. She eats dinner with her family and has conversations with them, often snorting in a piggy way as they talk. In addition to the television series, Peppa has also starred in a number of books, two films, a live stage show, video games, children’s toys, and Peppa Pig World, a theme park located in Hampshire, United Kingdom. The park features rides and a “muddy puddles water splash park.” Additional theme parks are planned in China. Scroll down for a downloadable PDF of this tutorial. Would you like to draw Peppa Pig? This easy, step-by-step cartoon character drawing tutorial is designed to show you how. All you will need is a pencil, a pen, or a marker, as well as a sheet of paper. Recommended Reading: How To Draw A Stormtrooper Helmet Creating A Clean Line Drawing Use your kneadable eraser and lighten up the underdrawing until you can barely see it. Then grab your marker and start tracing the underdrawing. Try to vary your line weight to give the drawing more character. In this step, it is important, that you don´t blindly trace your lines. The ear, for example, is in front of the body so dont trace the line of the body, that is behind the ear! When you traced all the lines with the marker you can erase the underdrawing completely as you don´t need them anymore. Now Finish It Off With Some Color At this point, you have successfully managed to draw a cute pig picture! This is an accomplishment already, but your pig drawing isnt quite finished yet. Theres still one more step you need to do, but its also the most fun of all the steps! Your pig drawing needs some beautiful colors, and the reason this is such a fun step is that here you get to show off your creativity. Weve shown one way that you can color in your pig in our reference image, but for this part you should feel free to let your imagination run wild! Will you stick to a similar color scheme as our image or do you think you would like to use your own favorite colors? You could even draw in a fun background for your pig that you can color in as well. Maybe your pig could be sitting on a pretty farm or maybe it could be ready to dig into a delicious dinner! You can also have some fun experimenting with different art mediums such as acrylics, watercolors, colored pens and pencils for some wonderful and unique color looks. The possibilities are endless, and we cant wait to see how you finish off your pig drawing! Also Check: How To Draw Female Body Types + Baby Guinea Pig Drawing Pictures 5 out of 5 stars. Many of us on the forums are owned by male guinea pigs boars if you will. This listing is for one approximately 3 inch magnet. If you like it follow the steps below to try it out. 5 out of 5 stars. Baby animals pictures animals and pets farm animals art for kids hub soft pastel art pig drawing pet guinea pigs pig art art inspiration drawing more information. Cute guinea pig coloring page | free printable coloring pages. Select from 35987 printable crafts of cartoons, nature, animals, bible and many more. Many of us on the forums are owned by male guinea pigs boars if you will. If you can draw basic shapes, letters and numbers.then you too can draw this adorable stuffed guinea pig. Cute guinea pig coloring page | free printable coloring pages. Guinea pig print, guinea pig poster, pet print, animal print, handmade, drawing, handmade, painting, room decor, watercolor, giclee print printmaxart1 4.5 out of 5 stars How To Draw Piglet Use the video and step-by-step drawing instructions below to learn how to draw Piglet from Walt Disney’s Winnie the Pooh. A new cartoon drawing tutorial is uploaded every week, so stay tooned! Intro: Start off with a pencil sketch. In the beginning stages, dont press down too hard. Use light, smooth strokes for sketching. Step 1: Start by drawing a small circle at the top half of the page. It doesnt have to be perfect. Its just a guide for Piglet’s head. Step 2: Inside the circle, draw two intersecting lines, one vertical and one horizontal. The vertical line should extend below the circle about the half the length of the circle. Bend the lines so they follow the contour of the shape. These are construction lines that will help you place Piglet’s facial features later on. Step 3: Below the main circle, draw a curved line similar to a letter C on its side. Use the length of the vertical construction line as a guide for the width of the curve. This is the lower part of Piglet’s head. Step 4: Inside the main circle, below the horizontal construction line and to the left of the vertical construction line, draw a small triangle as a guide for Piglet’s nose. Step 5: On top of Piglet’s head, draw two arcs that are similar to upside-down letter V’s as guides for his ears. Use the ends of the construction lines to help you with the placement of the ears. Don’t Miss: How To Draw A Harley Davidson Logo Paint Or Colored Markers For coloring, I mostly use Copic markers. But you can use watercolors or acrylic colors too, no problem. As long as your paper can take it you will be fine. You can test how your paper absorbs different paints by testing the paints on a spare piece of paper. If the paper curls up when getting wet or if the color runs off instead of staying on then your paper is not cut out for that kind of paint. How To Draw A Simple Pig wikiHow is a wiki, similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 11 people, some anonymous, worked to edit and improve it over time. This article has been viewed 83,267 times.Learn more… Are you looking for an easy drawing tutorial? Did you look for guides that are demonstrated step-by-step with easy-to-follow photos? Well, you’ve came to the right place! Continue reading this article to learn draw the easiest way to draw a simple pig! You May Like: Rabbit Sketch Easy How To Draw A Cute Baby Pig You can the base construction lines and start drawing on tracing paper or you can draw the grid layout yourself using the following stepsShow more 1) Draw a rectangle that will define the conditional proportions and boundaries of the chosen drawing.2) From the middle of the rectangle, draw one vertical and one horizontal line equally dividing the shape.3) Draw another horizontal line equally dividing the upper half of the rectangle. Similarly, draw a horizontal line equally dividing the bottom half of the rectangle.4) Draw a vertical line equally dividing the left half of the rectangle. Similarly, draw a vertical line equally dividing the right half of the rectangle. Step 1Step 2 Define the places for the snout and ears. Outline the neck and back. Draw the ears, mouth, leg and foreleg of the piglet. With light lines, add a birthday hat, tail, shoulder and the lower jaw. With an oval, delineate the piglets head base . Add an eye, the rest of the legs and a tail curl. Draw the eyes more carefully. Outline the hooves. Work on the whole figure, paying special attention to details. Contour the piglet, trying to vary the thickness and blackness of the line. Add more details and the floor. Erase all guidelines.
<urn:uuid:7e4e5934-d4b1-444a-89be-0d6568fea770>
CC-MAIN-2022-33
https://www.prodrawingclub.com/how-to-draw-a-baby-pig/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00202.warc.gz
en
0.92229
4,022
2.890625
3
Listed in this article are the common triggers of childhood allergy, and the symptoms of an allergy to HDM. Exposure to house dust mites (HDM) is recognised as a major cause of allergy, especially in children. Common allergic diseases in childhood are eczema, rhinitis (hayfever) and asthma. All three diseases can appear either separately or together. A newly discarded skin scale is not considered food for a hungry house dust mite. To become mite food the skin scale has to go through a process of decomposing change. It must become swollen with water, carry bacteria, microorganisms, yeasts and fats broken down by fungi. It's a proven fact - patient education plus effective allergen avoidance can improve asthma. This fact was demonstrated in a large study on inner city families in the USA. Here's how the doctors did it. Inner city asthmatic children were individually tested for allergy triggers. Once identified they were then taught how to reduce exposure and given various interventions to help avoid contact with their triggers. These step-by-step instructions will tell you how to eliminate or reduce allergy causing house dust mites (HDM) from a bed. Read carefully because beds are a favourite hiding place for mites. All doctors agree that the first step in managing allergy symptoms is the avoidance of triggers where possible. It is possible, and easy to keep mites from establishing a colony in a bed. Follow these simple instructions to protect the vulnerable from mite exposure. The most vulnerable are developing children who may think it's normal to always sneeze, wheeze or itch. Three most important functions to human life are heartbeat, breath and sleep. An active allergy to house dust mites (HDM) can interfere with breath and sleep. Wheezing, sneezing or itching, caused by an allergic reaction, is a known risk to sleep. In children, poor sleep can result in poor concentration at school. If chronic it can even threaten a child's self-esteem. Ozone is an unstable gas and health risk for patients with lung conditions because, like tobacco smoke, ozone can irritate sensitive or damaged lung tissue making symptoms worse. For house dust mite (HDM) allergic asthma patients avoidance of both mite and ozone exposure is recommended. Ozone can be a product of poorly maintained photocopiers or build up in offices with poor ventilation. Allergic dermatitis in dogs can be caused by allergens from house dust mites (HDM). The allergens are enzymes designed breakdown chitin, the hard material found in the outer shell of many animals and cell walls of fungi. What's the difference? Below is a short description of common mites that can be found indoors in many places around the world. They have different appetites and different needs. They all can cause allergy and environmental problems. The parasitic mange-like attributes of the scavenging house dust mite (HDM) were ‘unknowingly’ defined by scientists in 1998, but it wasn’t until 2013 that the link was made by doctors looking at the evolutionary profile of the HDM.[1,2]  They discovered that the mite made a shift from a mange or ectoparasite mite (living under the fur of animals) to a free-living, independent scavenger about 80 million years ago. Chronic perennial allergic rhinitis (hay fever) and chronic otitis media with effusion (OME) can be caused by an allergy to the house dust mites (HDM). Doctors have recognized that the risk exists and that children, suffering from allergy, can be vulnerable to symptoms of temporary deafness cause by this condition. Now, new research describes a pathway from HDM exposure towards OME. In order to tackle dust mite infestation and related disease, doctors say it is essential to understand mite biology, where they live, and why they cause allergy. To help this understanding, listed below are ten bite-size facts in each of these three categories ending with advice on how to kill mites. Doctors say; 'A diagnosis of an allergic disease is not complete until the trigger or triggers of the reaction are identified'. There are two common clinical ways to test for allergy triggers. Skin prick testing or blood tests often called laboratory RAST or specific-IgE testing. Patients can be confused about the difference. In this article we note what The Royal College of Physicians said about these tests. The chemical that makes house dust mites gather together in defense has been identified as neryl formate, a common scent used in foods and perfumes. As far back as 1993 clinical reports began to document cases of severe allergic reactions from baked food made with mite infested wheat flour. In 2009 the World Allergy Organisation recognised this phenomenon by publishing a paper on the subject, it is called 'Pancake Syndrome', or oral mite anaphylaxis (OMA). Now medical opinion leaders are calling for all physicians to be made aware of OMA, how to diagnose it and how to educate patients on dust mite reduction. The six different types of asthma are: allergic (most common); occupational (work associated); steroid resistant (severe asthma); drug related; exercise induced and asthma related to obesity. Although they are separate they can work together to make asthma worse. Exposure to dust mites can impact on all of these. Doctors and child psychiatrists looked at the harm from poor sleeping patterns in children and identified active allergies as a risk. They then coined the phrase, 'a need for good sleep hygiene'. Sleep hygiene includes, 'avoiding influences likely to make it difficult to get to sleep and sleep soundly'. Poor breathing, coughing or itching from dust mite exposure is a known risk to sound sleep - avoidance has been shown to be beneficial. Thirty-three years ago scientists investigated the contents of house dust mite droppings. They found two species of fungus along with an active digestive enzyme acting as a major mite allergen. By 2011 fourteen separate mite allergens had been identified along with DNA from bacteria and mites, chitin and quanine. This is a review of some of the investigations. The reason why so many people are allergic to house dust mites is now clear. One of the mite's major allergens (found it its droppings) is an aggressive digestive enzyme that can attack and melt the 'glue' that binds delicate cells together. These cells are in the nose, lungs, eyes or on vulnerable skin. The mite's enzyme is so powerful that it can actually kill cells causing a breach in the body's defences. In mite sensitive people the enzyme's attack results in an immune reaction that is so fierce it can damage adjacent healthy cells causing a chain reaction of harm known as an allergic reaction. This is how house dust mites can cause allergy. Below are photographs of allergy testing for common indoor allergens, including dust mites. The photographs are examples from case studies carried out by the late Dr Harry Morrow Brown and demonstrate the results of skin prick testing in allergy, a common clinical procedure used by doctors to identify triggers to avoid. Allergy testing, such as this, is used in conjunction with a detailed medical history of the patient, including family background. The photographs demonstrate the quality of care needed in diagnosing and treating an allergic condition. Ultra-fine diesel particles from traffic can carry toxic metals, grass pollen and house dust mite allergens deep into lungs. By cutting core sections from an old box-spring mattress a scientist found seven different species of mite infestations. Among the species identified were house dust mites, storage mites and one follicle mite, all of which are known to cause disease in humans. 95% of the mites found were within 1.5 cm of the top of the mattress. House dust is a complex mixture containing many different foreign proteins, as well as a variety of arthropods [i.e. mites], nematodes [worms], bacteria, fungi and human skin scales. Ventilation, combined with controlled humidity is key to controlling the levels of dust exposure to vulnerable lungs. In 1990 UK scientists designed a clinical study to identify 120 babies 'at risk from asthma' at birth. The infants came from parents with a history of asthma or allergic disease, or from families with a child already diagnosed with an allergic condition. To further identify the 'at risk' babies at birth, the scientists looked at the cord blood levels to measure total IgE antibodies. If you think house dust mite (HDM) allergies and food allergies are separate, think again! An allergen from the mite has been found in poorly stored wheat flour and in the human gut. Doctors know that infested flour can cause a rare form of severe allergic reaction, but are unsure of what effects the allergen has on the gut. World Allergy Organisation advice is to keep opened flour in the fridge or freezer to prevent HDM infestation. Although house dust mites can survive without eating skin scales they are their favourite food. The reason is because a decomposing scale offers the mite a ready-made plateful of nourishing foods including yeasts, bacteria, fungi and microorganisms. The scale itself can be hard for the mite to digest, as is evident by traces of scales found in the mite's dropping. Presented here are random Tweets posted on @housedustmite. They are part of a collection of over 2,652 tweets about dust mites, how they live and die and the diseases they cause. This collection of Tweets will change periodically to promote public interest in the mite and provide information on how to control infestation indoors. Presented here are five different photographs of adult house dust mites accompanied with facts of interest. They are here to encourage the study of mites in schools. Although the five mites have been seen through a scanning electronic micrograph, it is worth remembering that each mite in reality is approximately the size of this dot . in other words barely visible. Millions of years ago the house dust mite and the sheep scab mite lived together as parasites of warm-blooded animals. At some stage in time the house dust mite became a scavenger less dependent upon the health of its host for survival. By comparing the lives of the two mites living today echoes of past parasitic behaviour become apparent. The house dust mite is not as harmless as portrayed. The net or membrane that holds a house dust mite dropping together is a semi-permeable network of fibres that contains proteins and a tough protective material called chitin. It is created in the hind gut of the mite by a valve that binds several clumps of various matter together into one 'poop'. Within this mass are enzymes that hold an ancient secret. Allergic reactions to house dust mites can happen immediately or be delayed by several hours causing confusion in identifying the cause of a reaction. Allergy testing can help. To block house dust mites from entering a fabric researchers recommend that the customer looks for a product with a thread count greater than 246/in2 (threads per square inch) in a smooth fabric made from twisted cotton or synthetic fibres. Living in an old mattress doctors found several allergy causing mite colonies plus twenty-six different species of fungus. The extraordinary amount of fungi may have been helped by the fact that a house dust mite's (HDM) gut is not toxic enough to kill all fungi, instead selected species pass through unharmed and grow again in damp, dark, still environments. This event has been photographed using a sophisticated scanning electron microscope as seen below. A female house dust mite may lay 1 to 3 eggs a day. After 6 to 12 days the egg will hatch producing a six-legged larva which will feed then pass through 2 nymphal stages before emerging as an adult to join the colony. Like many animals a growing mite will shed its temporary outer shell-like covering. While a new covering is being formed an immature mite is vulnerable to attack from other mites.
<urn:uuid:c1f36faf-f341-4d2b-9f2f-4fdbf2632f5a>
CC-MAIN-2022-33
http://housedustmite.com/curious
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00406.warc.gz
en
0.943825
2,508
3.40625
3
Red spots on skin occur for different reasons. One morning you look yourself in the mirror. Then surprisingly, you see red spots on skin that you didn’t see yesterday. But, you cannot find out what is the reason for these red spots. Plus, you start to think about how you are going to get rid of these red spots. How are you going to go out with these red spots on skin? Many different questions will come into your mind. Well, there are some possible remedies for this. So, we are going to discuss ‘red spots on skin & causes.’ Causes of red spots on skin: There are no exact conditions for such a problem in the skin. There may be different possible causes for this. Due to an allergic reaction, the spots appear after taking medicines. Sometimes if any insect bites, then itching on the part can make the spots. Again, reactions from the bites of the insects can cause skin problems. Tumor rises on the skin that creates red bumps in the skin. For such reason, you may experience that blisters or rash. Sometimes, infections from any disease can be another cause. Red spots on skin can spread all over the body. Or can occur in just one part of the body and can stay for a long time. Fungal infections occur in the body that infects the body. You can see it usually occurs in the legs. It occurs in toenails and even in hand or fingers. They are also harmful to health. Plus, it increases the itching on the skin. This type of problem also leads to red color spots on the upper part. The bacterial infection is another cause of the spots. Viruses, microbes, and bacteria enter the body. Then it weakens the body. Plus, it starts to multiply. That causes infection, and the condition leads to a rash. Some say it spots on the body. The round like spots is the infection that causes the inflammation. It can happen to the environment, the weather. Some people for the weather change or environment the body cannot cope up. Other reasons are a ‘chronic condition,’ medicine reactions, etc. Such problems lead to red spots on skin that becomes intolerable. People need to know the causes of red dots. Proper steps are necessary to get rid of the spots in the skin. Symptoms of red spots on skin: - Blister: The blister is round that looks like some bubbles. These rise over the skin and can be of different sizes. From pinpoint to more than a diameter that is thicker. It itches a lot that you will want to pinch out them. Filled with pus, water molecules, or blood that, when squeezed, it peels off. - Irritation: They are allergic reactions to the skins. Irritation can occur from using medicines, soap, or woolen clothes. The chemicals of the drugs cause reactions. It develops rashes on the skin and creates irritation. So, patients who have irritation to these things should avoid them. - Itching: ‘Contact Dermatitis’ can be the reason for itching in the skin. Plus, it occurs when there are toxins in the skin. Besides, allergic reactions can cause itching. It is a symptom of red spots, and it increases in some cases. - Swelling: Swelling on the skin means when parts of the skin rise in round shape. The gathering of fluid in the part of the skin can cause swelling. It occurs internally in the skin. That is responsible for affecting the outer skin. - Pustules: When you can see round-like bumps over the skin, then they are pustules. They are painful when you touch them. It aches in the skin, and they are like white or red colors. You can call them pimples on the skin. Other symptoms of red spots on skin: Besides the above points, there are other symptoms of the spots on the skin. People should know these symptoms that can be useful for them. Though some people ignore or do not give importance. These are- - Rash: When the skin color turns into red plus changes the appearance, then it is rash. It can appear in different forms in the skin. These include moist, bumpy, dry, cracked, smooth, and even blistered. It pains when anyone tries to touch them. A rash can change the color, and it can occur due to several reasons. Viral infections and bacterial infection can cause it in the skin. - Scaling: Scaling on the skin is when the outer part of the skin starts to peel off. The outer layer is the epidermis that peels off. It is an autoimmune disorder that occurs in the skin. Itching many times after an inflammation over the skin can cause this. Besides, it is connected to the symptom of rash. If anyone faces itching and observes that skin is falling, then it’s the symptom. - Decreased appetite: People when suffers from the red spot skin problem will have less appetite. Red spots on skin decrease the interest, feeling, and appetite to eat. For this reason, people become weak, resulting in an attack of more viruses. Besides virus, there attacks bacteria, a fungus that enters the body. So, red spots occur that attacks the body and triggers that don’t go. The person with red spots must eat healthy food. Though a person may have less appetite, he or she should not decrease eating. - Sore throat, aches, and headaches: A person with red spots on skin may experience sore throat, body pain & headaches. These are the severe symptoms of the skin problem. Severe symptoms of the red spots on skin: The person should appoint and tell a doctor about the problems. Besides, it can develop acute conditions. Plus, the patient will have to face intolerant situations that can increase. Severe symptoms are a dangerous condition. That means a patient should take steps to get rid of this skin issue. The severe symptoms of red spots are the following. - Rapid heartbeat: Feeling rapid heartbeat means the condition is severe. Plus, it occurs when from typical symptoms, they turn to severe issues. Rheumatic fever creates a type of skin condition that may harm the body. When there is rash but no itchiness, then you are at risk of rapid heartbeat. Developing such a condition creates the problem of the heart. - High Fever: When there will be such a skin problem, high fever in the body may appear. The patient may experience high temperatures in the body. If a person suffers from a rash and signs are turning to severe conditions, fever is one. Fever may rise to 101 Fahrenheit on the thermometer. - Respiratory breathing problem: For patients who have asthma, this symptom can be a common one. But, a patient experiencing rash in the skin & suddenly facing breathing problems isn’t typical. The symptom is severe, and the patient should consult a doctor. Because when red color spots appear on the skin, a breathing problem is a sign of danger. - Spontaneous bleeding: It is a severe sign of this skin problem. In this case, a person may face or experience spontaneous bleeding. Bleeding can occur after the bumps on the skin will puncture. Plus, when the skin will peel off, then bleeding can occur. - The neck becomes stiff: The neck becomes stiff when the patient’s condition becomes serious. It is a severe symptom. When to see a doctor when there are red spots on skin: When red spots on skin appear, first see whether you have the above symptoms or not. If you have the above symptoms, then see if it is a normal or severe one. If the symptoms are normal, then you can apply anti-fungal creams. Apply the cream to the affected areas on the skin. Also, it is better to take a bath if you have rashes on the skin. An oatmeal bath is much better in such cases. If you have skin diseases like psoriasis or eczema, it is also useful. You just need warm water and need to sprinkle the oatmeal powder over the water. Besides these ways, you can apply hydrocortisone cream; it is better to take a doctor’s advice. If the situation does not turn good and you see the condition is severe, visit a doctor. Skin doctors are good plus talk about the conditions and problems you are facing. If you have too much itchiness, dry skin, fever, or anything else, then share them with him. Sometimes, ‘Contact Dermatitis’ can be the reason for itching in the skin. It is a type of irritation or rash that occurs after a foreign substance contact with the skin. Not only that, sometimes a few of the doctor’s prescribed medicines are responsible for rash. When you take those medicines, then from the reactions of the drug, it affects the skin. Some drugs may not suit you. So, it is better to tell your doctor which of the medicine don’t suit you. Thus, the doctor will change them for you. How to get rid of this problem on the skin at home? We know it is so annoying when you see red spots on your skin. You can get rid of red spots on skin at home by applying lotions. You can find such skin lotions in your nearby stores where you do not need any prescription. But our suggestion is to check out the ingredients, whether it is harmful or not. Besides, you can apply plant enzymes mashups on the skin. It will include potatoes, papaya, chickpeas, etc. Aloe vera is natural plus beneficial for skin health. It contains a gel-like substance in leaves that is good for the skin. So, you can apply it too. Plus, Vitamin E capsules are good for the skin, especially the liquid capsules. Break it and apply it on the spots so that they can soak it. These procedures and ways can help you to get rid of red spots on skin. Frequently Asked Questions: What happens when there is a rash on the skin during the red spot? Ans: When the skin color turns into red plus changes the appearance, then it is rash. It can appear in different forms in the skin. These include moist, bumpy, dry, cracked, smooth, and even blistered. It pains when anyone tries to touch them. What is the reason for itchiness during red spots, and what medicine can be helpful? Ans: ‘Contact Dermatitis’ can be the reason for itching in the skin. Plus, it occurs when there are toxins in the skin. Besides, allergic reactions can cause itching. It is a symptom of red spots, and it increases in some cases. It is better if you can apply anti-fungal creams or hydrocortisone cream. But it is better to take a doctor’s advice. How can we understand if the condition is serious or not? Ans: Symptoms like a high fever, neck stiffness, respiratory problems after the red spots appear on the skin. If you see these, then the condition is serious. You can check the above sections. How many days does it take for red spots to go away? Ans: It may take a few weeks for the rash or red spots on the skin to go away. But, it does not go away on its own. You need to take treatment and take care of yourself for this skin problem. ‘Red spots on skin’ can be visible suddenly. It can be harmless, and there is no danger. Again it can be dangerous. Plus, it can be an early symptom of any severe disease. As an example, ‘leukemia.’ It can develop and stay for a long time. Sometimes, it can appear due to allergic reactions to medicines, it can arise due to sunburn and various causes. Besides, insect bites and tumors that occur in blood vessels can be another cause. But most people don’t know about red spots on skin & causes. For this reason, our discussion was red spots on skin.
<urn:uuid:1b2a71e3-3cb0-4063-ad82-19aa1107991f>
CC-MAIN-2022-33
https://www.technewsera.com/red-spots-on-skin/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00404.warc.gz
en
0.937216
2,533
2.75
3
Learn to distinguish among the different types of beetles, only the largest group of insects found all over the world, and find out which ones can be a real nuisance to homeowners. While beetles are one of the most common insects in the world, they are often mistaken for other insects such as bugs. So, at this point, the question that arises is how can you identify beetles without getting confused at all? With the scientific name, Coleoptera, beetles come in a wide range of sizes, shapes, and colors. But a typical beetle comes with two-segmented antennae which work as a smelling organ and has significant chewing parts. Like many other insects, beetles also have two pair of wings. That being said, their wings are the most distinctive feature as their forewings (elytra) are shell-like hard and thick. These pairs of wings protect the pest from its enemies and potentially dangerous scenarios. The frontal wings of beetles are folded underneath them, which quite explains why these beetles are also referred to as “Coleoptera” since this Latin word essentially means “folded wings.” Beetles fold their front wings to protect their back wings. These wings are strong and durable. They guard the insect against environmental damage and dehydration. It is also important to note that bugs also feature wings just as beetles, but their wings aren’t as hard and thick as those of beetles. As hinted above, beetles have chewing mouthparts too. The two most common mouthparts found in pests are either chewing organs or piercing-sucking type. To identify chewing parts, look for two pairs of shears-like jaws with a flapping labium on the front and one underneath. These physical characteristics will prove that the insect you are observing is a beetle. In case there is no jaw, but a keel or ridge, then you’re probably looking at an insect that is not a beetle. Beetles can be a sheer nuisance for most homeowners because of their ability to damage items like clothes, furniture, crops, stored food, décor, etc. The first step in getting rid of them is by understanding what they look like, their habits, and other important characteristics. Therefore, we have prepared this blog to help you discover different types of beetles and everything you should know about them to ensure that you can keep them at bay. 1. Lady Beetles Also referred to as ladybugs or ladybird beetles, lady beetles are some of the most widely found beetles in the world. These species usually exhibit a red or orange body with black spots. Some of these beetles also boast a pink body with black markings. These beetles are small, round to oval in shape, and usually, have yellow forewings. Their pronotum, an area behind their back, may also exhibit a unique pattern. Most of the lady beetles, both larvae and adults, are found in North America and prefer to feed on small insects, mites, and eggs of other insects. Research shows that female lady beetles can lay 20 to more than 1000 eggs over just a period of three months. These eggs are deposited near aphids, in stems, and leaves to protect them from their enemies. 2. Rove Beetles Belonging to the Staphylinidae family, rove beetles are an extremely diverse group of beetles with over 25000 species. These pests can be found everywhere from decaying plants to insect nests to dung to fungi. However, rove beetles love moist areas so you can expect them to be near ponds, lakes, streams, damp leaves, stems as well. These beetles come out from their hiding late at night (when they are most active) to feast on tiny arthropods, pollen, fungal spores, and insects like ants. While these creatures are harmless in the sense that they don’t bite, if mishandled, they can give a nasty bite! Rove beetles have visible abdominal segments with a small wing structure. Although their frontal wings are small, these species can still fly; that’s because of their purposeful hindwings underneath. Adult rove beetles are supposed to be at least 25 mm in length but the majority of them are only 7mm long. 3. Ground Beetles These beetles are known to be the largest group of beetles occurring in North America, with over 2000 species there alone. Given that they come in innumerable varieties, the majority of these beetles appears and behaves in a similar manner. Ground beetles are usually black in color, growing up to only half an inch. Also referred to as black ground beetles, these beetles are intensely black, with dark brown marking on their legs and antennae. Most ground beetles are harmless to people as they don’t bite them. But some species like scarites or quadriceps can pinch your skin which may mildly hurt. Ground beetles prefer to stay outdoors in moist areas, under stones, leaves, and wood logs. In case they enter inside, they can wreak havoc. Therefore, cleaning and vacuuming their residential areas is a significant step to get rid of them. This is a variety of beetles that can’t fly but prefers to climb shrubbery or trees to find its prey. Some common types of ground beetles are as follows: 4· Tiger Beetle Belonging to the subfamily Cicidelinae, tiger beetles (both larvae and adults) are ravenous eaters. These beetles have a slender body and long legs, with a size of about 10 to 20mm. Their large, bulgy eyes help them see better than most other types of beetles. These beetles are exotic looking due to all the multiple colors they feature in such as orange, green, blue, and scarlet. They are also fast runners and can catch their prey in seconds. 5· Violin Beetles Belonging to the subfamily of Lebiinae, violin beetles possess unique violin-shaped elytra. These species prefer to live among the layers of bracket fungi (polypores). Harpalus is a type of ground beetle that consists of about 500 species and subspecies. Like many ground beetles, these creatures are widely found in North America. These species are native to regions like North America, North Africa, the Near East, and the Palearctic. Research shows that there are approximately 190 species of scarites. Generally, these pests can be found under rocks and wooden boards. 8. Solider Beetles While not all beetles are good for your garden, soldier beetles are exceptional as they are considered to be beneficial insects. Studies show that soldier beetle larvae eliminate predatory insects from the garden. Soldier beetles are often confused with fireflies as they both look similar. When flying, these pests are thought as wasps and hence brushed away. Trained gardeners are aware of the importance of soldier beetles and hence find ways to attract these species to their garden. But one thing that needs to be taken care of is to ensure that these pests can’t enter inside your house as they can damage your property. You can prevent them from entering by sealing your windows through weather-stripping etc. The best way to identify soldier beetles is by knowing that they are yellow or tan in color, with black markings on their both pair of wings. However, their coloring may vary depending on the region they are living in. Also known as glowworms and lightning bugs, fireflies produce a chemical reaction that releases light. All the species have an exclusive lightning pattern and the males use this pattern to let the females know that they will be the perfect match for them. These lights also serve as a defense mechanism, signaling a warning sign of the prey’s unappetizing taste. Fireflies are about the size of a paper clip, which means that they are hardly an inch long. They are also found in a wide range of hues such as light red, yellow, orange, and green. These insects function well in warm and moist areas and, therefore, are a common sight in summer evenings/nights of moist regions of Asia and America. 10. Leaf Beetle Belonging to the Chrysomelidae family, leaf beetles have their habitats in tropic regions. Research shows that there are about 35,000 species of leaf beetles that are concentrated in different parts of the world. Generally, these beetles have an oval shaped body, short legs, and the antennae half the size of their body length. Overall, these creatures are smaller than 12 mm in total length. As suggested by their name, leaf beetles prefer feeding on leaves as well as crops. In addition to leaves being their real source of food, these species prefer to reside in leaf-concentrated areas. Their habit of consuming leaves can adversely affect environmental conditions. These insects have the ability to produce poisonous chemicals that serve as their primary defense mechanism. These poisons are not only harmful to other predators, but to human beings as well. The toxin released from their mouths can instantly cause neuronal diseases among humans. 11. Click Beetles Also known as snapping beetle, spring beetle, and skipjack, click beetles widely range from 2.5 mm to 18 mm in length and appear in colors like reddish brown or plain black. Some species, especially tropical ones, exhibit more bright hues such as luminous red. One of their types – the eyed elator which is concentrated in North America—can grow up to 45 mm in length and have two big monochromatic spots on their prothorax. These species are named after the “clicking noise” they make when caught by a predator. These beetles prefer to feed on leaves at night. These types of beetles can also prove to be extremely destructive in nature, having the ability to destroy plant seeds, plant roots, and plant stems. Gardeners place sweet baits in fields to trap these pests as they are attracted to sweet liquids. Owing to their slender and elongated body, click beetles are often referred to as wireworms. They do not only pose a threat to crops but can destroy your property too. These species can be found in your house, around tube lights/bulbs or moist areas. These types of beetles usually enter into the house in the hope of escaping cold weather conditions. Their infestation can be treated using vacuums. It is important to vacuum areas like nook and crannies, gaps, and holes in your house where these pests can easily go into hiding. 12. Scarab Beetle Belonging to Scarabaeidae family, scarab beetles are heavy, oval-shaped insects, with distinctive antennae which are flattened to look like a club. Their front legs are toothed which help them in digging to hide from their predators and construct their habitat. Depending on the type, these pests vary from 5 mm to 12 cm. One of their types – African goliath beetle is known to be the heaviest beetle. Just as they differ in sizes, different species of scarab beetles vary in their habits as well. Some of these insects prefer to feed on dead insects and plants, or manure, while others prefer to feed on growing leaves, roots, and fungi. Following are some of the subfamilies of scarab beetles: 13· June Beetles Also called as June bug or May beetle, June beetles consist of nearly 300 species of beetles that are largely distributed among plant-eating subfamilies. June beetles possess luminous elytra and reddish brown body that varies from 12 to 25 mm. These beetles feed on flowers and foliage at nighttime; their eating habits often lead to damage in the garden as they can destroy many types of crops including potatoes, strawberries, grains, and corn. 14· Rose Beetles As the name implies, these are the species that attack roses as these flowers are their main source of food. In order to protect your garden roses, use insecticides that are specially designed to kill the pest without ruining the beauty of the lovely flower. 15· Japanese Beetle With the scientific name as Popillia japonica, the Japanese beetle is exceedingly destructive in nature. These small beetles can be found in gardens and in various types of landscapes of the United States. Research shows that these insects have a total of 300 species that prefer to feed on flowers, fruits, and foliage. However, the larvae, typically known as white grubs, consume roots of grasses in parks, lawns, and golf courses. These tiny creatures are a ½ inch in their overall size and can be identified from their metallic bluish green heads, copper-colored backs, and simple wings with tiny white hair on each side of their abdomen. Japanese beetles can be treated in multiple ways. For example, you can treat them by spraying neem oil onto plants, use insecticides, or trap them through fruit cocktail. 16. Checkered Beetle Belonging to the Cleridae family, checkered beetles are very hairy species of beetles. They have a deep, shiny blue body with a black and red wing casing. The abdomen, like their body, is deep red. Unfortunately, these beetles became endangered and have become extinct in the UK in the 1800s. However, they can still be found in many parts of the European countries where they are commonly referred to as “Clarion des Ruches” which means “Bugle of the Beehive.” These species feed on small insects and pollen while larvae consume bees’ grubs and wasps. They are typically seen in summers (May to August) in parks, gardens, woodlands, and hedgerows. 17. Dogbane Beetle With their bright green luminosity, dogbane beetles are one of the most attractive species of beetles. Due to their tiny size, it is easy to overlook them, but in an open field and right light, these shiny creatures can captivate the beholder. These species have a green head while their elytra are gold, copper, and emerald with tiny specks on them. The dogbane beetle feeds on the dogbane plant, also known as American hemp or Indian hemp. The plant is not only their main source of food but an ultimate spot to find their mating partner. The females lay eggs in their own feces and protect them by attaching them to the underside of a leaf. 18. Blister Beetle The blister beetle consists of approximately 2500 species of beetles. These pests are known to give off an instigating substance – cantharidin which is gathered from the European species – Spanish fly and Mylabris. Cantharidin is a popular remedy for skin problems like warts. In older times, it was an important ingredient in “love potions”. Adult blister beetles have long, slender bodies, ranging between 3 to 20 mm in length. Some of these species appear in an intense black color with a red head while others have their bodies covered with bright emerald or blue wings. 19. Tortoise Beetle Small, rounded or sometimes oval in shape, tortoise beetles are quite unique in their appearance. They feature in a number of colors ranging from yellow to red to blue with tiny black spots on their body. The larvae, on the other hand, consist of dull brown, yellow, or green heads. Adult tortoise beetles measure up to a ¼ inch in size with hard wing covers that keep them protected against their enemies. These sturdy wing covers also allow them to tightly stick to leaves and hide. All of these traits make it supremely hard for the predators to get a hold of these pests. The fundamental source of food for tortoise beetles is various kinds of plants such as corns, raspberries, cabbage, strawberries, milkweed, and eggplant. Some of these species also feed on sweet potato plants. These beetles can pose a great threat to your garden plants and therefore it is important that you look after them on a daily basis. Get rid of these pests by removing them with your hands and cleaning the area or spraying powerful insecticides to kill them for good. There are many diverse forms of beetles in this world, and each specie exhibits unique physical and non-physical attributes that make them amazing in every way.
<urn:uuid:d7683ad3-482a-43e0-b212-3fa6c2175a1e>
CC-MAIN-2022-33
https://www.homestratosphere.com/types-of-beetles/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00203.warc.gz
en
0.967931
3,369
3.515625
4
If you are a student looking to learn Arabic Number 1-10, say no more. We have got this, and we will help you not only understand the basics of the Arabic numeral system but also help you memorize the not so difficult counting in Arabic. Some might argue that there are so many types of Arabic in the world, how is one supposed to keep up? Yes, there are admittedly quite a number of different standard types of Arabic that can be found in different parts of the world where it is spoken as a first language. But, lucky for you, you do not need to learn every form of Arabic in order to be able to count up to nine in Arabic or even further. The Modern Standard Arabic (MSA) is the standardized version of Arabic that most people are required to learn and use. And it makes sense to learn only one form of it since it is the official national language of more than 20 countries across the world. Not just that, the Modern Standard Arabic (MSA) is also among the 6 official languages used in the United Nations. So, if you want to learn numbers and how to count them in Arabic, the words are going to be the same, standard, official, regardless of the form of the language. A fair warning, however, that if you want to move on to the bigger numbers, you will see some differences which might not be as easy to learn. Let’s not waste our time any further and dive into the world of Arabic numbers: Getting Started (Counting Arabic Number 1-10) Let’s start from the foundation of every numeral system AKA the counting from one to ten. Once you know how to count the first ten numbers in any language, you can learn to count further fairly easily and quickly. One to Five Start with the words for one to five to count up to ten in Arabic. Repeat all the words for instance 2 in Arabic or 5 in Arabic until you know them by heart. Here’s 1 to 5 in Arabic: - Four = Arba’a (أربع). - Five = Hamsa (خمسة). Note: In the number five, the letter h has a guttural pronunciation. It is like letting out a strong breath from the back of the throat as you pronounce it. If you have trouble pronouncing the words, we have added a table below in the article to help you with the pronunciation. Six to Ten Once you’ve nailed down the first five Arabic numbers, it is time to tackle the next 5. Practice them until you memorize them, for example, 6 in Arabic or 8 in Arabic, and then compile all 10 together: - Eight = Tamaniya (ثمانية). - Nine = Tis’a (تسعة). - Ten = Ashra (عشرة). Here is a table with all the numbers from one to ten with their numerals, Arabic spellings, romanized forms, and pronunciations: |Number||Numeral ||Arabic | Learning the Zero Zero is called Sifr (صفر) in Arabic and pronounced as “Say-fur”. The concept of zero started in the land of India and Arab and was brought to the world of Europe during the Crusades. Just like the English language, “zero” is not usually used in reading numbers until and unless you read cardinal numbers for example a debit card number or a phone number. Recognizing Arabic Numerals The Western numerals are commonly considered “Arabic” numerals but the numerals used in Arabic are actually known as Hindu-Arabic numerals, because of their origination from India. The Hindu-Arabic numbers consist of 10 digits that represent the numbers zero, and one to nine: ٩ ٨ ٧ ٦ ٥ ٤ ٣ ٢ ١ ٠ Just like the English language, these 10 numbers are combined to make other numbers. For instance, in English, 10 would be a combination of the numbers 1 and 0. The same is applicable to the number ten in Arabic: ١٠ Keep in mind that you write and read Arabic right to left. However, you write and read the numerals from left to right, just the way you read in English. A fun fact is that in countries like Syria, Palestine, Iraq, Jordan, and Lebanon, the Arabic numerals are often used in combination with Western numbers. Proceeding to Advanced Levels It is time to move on to the higher numbers: Learning the Tens To make the “tens” of the numbers from 1 to 10, you have to add the “un” suffix to the base digit. All the words for the even tens are made by substituting the last syllable of the first digit with the “un” (suffix). So, let’s see the tens of the Arabic language: - Eighty = Thamanun. - Ninety = Tis’un. Note: For the twenty, for example, take the Arabic word for two, which is Itnan, remove its last syllable, and substitute it with the un. The consonants that are present at the end of the first syllable do change, however, when writing the word with the Western alphabet. Learning 11 Through 19 Conjugate the number with a form of the Arabic word for 10 for the numbers 11 to 19. Start with the Arabic for the second digit and add the word Ashar (10). 13 = Thalatha ‘Ashar It translates to “three and ten.” Follow the same procedure for all other numbers from 11 to 19. Moving on to 21 to 99 For the numbers 21 to 99, use the tens Arabic word with the single digit for the numbers under consideration. To make the words for bigger numbers, write the Arabic word for the last digit and add the connector “wa-” and follow it with the proper Arabic word for the tens place. 53 = Thalatha wa-Khamsun It translates to “three and fifty.” What About the Hundreds? The Arabic word mi’a is used for hundreds. The Arabic words for even hundreds are made by adding the word mi’a, after the multiplier digit. So, for instance, 300 = Thalatha Mi’a” Use the same procedure to make the Arabic words for numbers 21 – 99 to create the words for the hundreds. How to Practice Arabic Numbers? Here are some ways with which you can practice your numbers: - Download counting songs and listen to them to get familiar with the words. You can find many videos on Youtube that are made for children and can help you learn the numbers in Arabic. Moreover, counting videos and songs can also improve your pronunciation of the numbers. Simply speak or sing along the words until you start to sound like the speaker or singer on the video. - You can also install a mobile application. Search for Arabic counting or multi-language counting apps on the App Store. Most of these apps are free to install. For example, one such app called Polynumial translates numbers to assist you in learning how to count. The app has an Arabic-specific version but it is only available for iOS. - Repeat the numbers you have learned in Arabic throughout the day as you come across them. As you go out and about your day, you are likely to come across the numbers and use them without thinking about it. So, whenever you see a number, pause, and translate it into Arabic. For instance, try saying your bank balance in Arabic. Or count the number of items in your grocery cart or the points in a sports game in Arabic. - Use flashcards to improve your Arabic vocabulary as you practice numbers. You can use the basic counting flashcards that are designed for kids to learn numbers and have a certain number of objects on one side and the number in Arabic on the other side. You can easily buy such flashcards at an educational store or online. Another way to access them is via websites that let you save printable flashcards. - Lastly, try good old trusty Google to search the Arabic word for the number online, and then say it out loud for the rest of the day. And that is it! That is how you can learn how to count the numbers 1 through 10 in Arabic and then use those numbers to learn higher numbers in the tens and hundreds. It is simple and easy, just like that. If you struggle with memorizing the numbers, just use the tips above to keep your memory fresh! Find Top Tutors in Your Area
<urn:uuid:a9592c2d-935c-4759-9b04-7308e1183c6c>
CC-MAIN-2022-33
https://ksa.mytutorsource.com/blog/learning-the-arabic-number-1-10-and-higher/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00405.warc.gz
en
0.914297
2,142
3.78125
4
For kids aged 9+ (and their parents) P r org r a m m ion g gramming Te a c heach s o e aos y a Pea r e nat sy a parent c a n dao i t !n do it! Yo u ro K i d s ur Kids Teach Your Kids to Code is a parent’s Create fun, playable games like War, and teacher’s guide to teaching kids basic Yahtzee, and Pong programming and problem solving using Add interactivity, animation, and sound Python, the powerful language used in to their aps Tto oC o d e Code c Goolloeggle caonudr sIeBsM a.nd by tech companies like Te ach Your Kids to Code is the perfect com- A Parent-friendly Guide to Python Programming panion to any introductory programming Step-by-step explanations will have kids class or after-school meet-up, or simply your learning computational thinking right away, educational efforts at home. Spend some fun, while visual and game-oriented examples B r y s o n P a y n e productive afternoons at the computer with hold their attention. Friendly introductions your kids—you can all learn something! to fundamental programming concepts such as variables, loops, and functions will help ABOUT THE AUTHOR even the youngest programmers build the Dr. Bryson Payne has taught computer skills they need to make their own cool science at the University of North Georgia games and applications. for more than 15 years. He has also taught Whether you’ve been coding for years middle school math and programming, and or have never programmed anything at all, continues to work with K–12 schools to Teach Your Kids to Code will help you show promote technology education. your young programmer how to: Explore geometry by drawing colorful shapes with Turtle graphics Write programs to encode and decode messages, play Rock-Paper-Scissors, and calculate how tall someone is in Ping-Pong balls $29.95 ($34.95 CDN) www.nostarch.com TH E F I N EST I N G E E K E NTE RTA I N M E NT™ TT e aec h Yao u r cK i d s ht o C o d e Your Kids to Code P A Y N E SHELVE IN: PROGRAMMING LANGUAGES/PYTHON Advance Praise for Teach Your Kids to Code “The text is clear, the graphics are engaging, and the apps are awesome. This is the programming guide for parents and kids to enjoy together.” —Aaron Walker, Cybersecurity Expert, NASA “The energy and excitement Bryson brings to teaching is captured perfectly in Teach Your Kids to Code, with colorful, captivating games and graphics that help develop real-world skills.” —Bindy Auvermann, Executive Director, Next Generation Youth Development, Inc. “Provides the building blocks of a great future in the rapidly changing world of technology.” —JoAnne Taylor, former Vice President, Global Telecommunications, IBM “The concepts in Teach Your Kids to Code can help any young person enhance their college prospects and expand their career opportunities, and Dr. Payne presents these skills through fun, challenging games and apps.” —Dr. Raj Sunderraman, Department Chair of Computer Science, Georgia State University “Every child on the planet should have this book, and so should every parent.” —James E. Daniel, Jr., Founder, App Studios, LLC “An innovative, motivating guide . . . Builds skills that can last a lifetime.” —Dr. Steven Burrell, Vice President for Information Technology & CIO, Georgia Southern University “The kind of book I wish I’d had as a kid.” —Scott Hand, Software Engineer, CareerBuilder “Dr. Bryson Payne is a computer scientist and professor of the highest caliber, and with Teach Your Kids to Code, he brings the power of computers within easy reach for readers young and old.” —Dr. Antonio Sanz Montemayor, Informatics Professor, Universidad Rey Juan Carlos, Spain “A brilliant combination of engaging, imaginative apps and valuable, lifelong skills.” —Ted Cunningham, author of The Power of Home “Teach Your Kids to Code and the logical thinking it introduces will help build the next generation of technology leaders.” —N. Dean Meyer, author and executive coach “This book can jump-start your child’s success in a high-tech world.” —Ken Coleman, leadership author and former radio host of The Ken Coleman Show “Dr. Payne set us on the path that led us to our dream jobs! With Teach Your Kids to Code, he’s providing parents and teachers everywhere the chance to do the same for the next generation of creative problem-solvers.” —Shah and Susan Rahman, Riot Games “Bryson helps people improve their lives with technology. His book does the same.” —Ash Mady, Technical Manager, RedHat, Inc. “Enjoyable and accessible to parents and children alike.” —Steve McLeod, Deputy CIO, University of North Georgia “Dr. Payne used robots, games, and fun programs to motivate me in college, and Teach Your Kids to Code extends that same passion for coding cool apps beyond the walls of the campus.” —Bobby Brown, Lead Developer, GetUWired Teach Your Kids to Code Teach Your Kids to Code A Parent-Friendly Guide to Python Programming By Bryson Payne San Francisco TeAch Your Kids To code. Copyright © 2015 by Bryson Payne. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. 19 18 17 16 15 1 2 3 4 5 6 7 8 9 ISBN-10: 1-59327-614-1 ISBN-13: 978-1-59327-614-0 Publisher: William Pollock Production Editor: Riley Hoffman Cover Illustration: Josh Ellingson Illustrator: Miran Lipovac� a Developmental Editors: Tyler Ortman and Leslie Shen Technical Reviewers: Michelle Friend and Ari Lacenski Copyeditor: Rachel Monaghan Compositor: Riley Hoffman Proofreader: Paula L. Fleming Indexer: BIM Indexing & Proofreading Services For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 245 8th Street, San Francisco, CA 94103 phone: 415.863.9900; [email protected] www.nostarch.com Library of Congress Cataloging-in-Publication Data Payne, Bryson. Teach your kids to code : a parent-friendly guide to Python programming / by Bryson Payne. -- 1st edition. pages cm Includes index. Summary: "A guide to teaching basic programming skills for parents and teachers, with step-by-step explanations, visual examples, and exercises. Covers programming concepts including loops, lists, functions, and variables, and how to build games and applications"-- Provided by publisher. ISBN 978-1-59327-614-0 -- ISBN 1-59327-614-1 1. Python (Computer program language)--Study and teaching (Elementary) 2. Computer programming--Study and teaching (Elementary) 3. Python (Computer program language)--Study and teaching (Middle school) 4. Computer programming--Study and teaching (Middle school) I. Title. QA76.73.P98P39 2015 005.13'3--dc23 2015006794 No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no inten- tion of infringement of the trademark. The information in this book is distributed on an “As Is” basis, without warranty. While every precau- tion has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it. To Alex and Max, my two favorite coders About the Author Dr. Bryson Payne is a tenured professor of computer science at the University of North Georgia, where he has taught aspiring coders for more than 15 years. His students have built successful careers at Blizzard Entertainment, Riot Games, Equifax, CareerBuilder, and more. He was the first department head of computer science at UNG, and he holds a PhD in computer science from Georgia State University. In addition, he works extensively with K–12 schools to promote technology education. Dr. Payne has been programming for more than 30 years. The first program he sold was to RUN magazine (Commodore 64) for their “Magic” column in 1985, for $10. Dr. Payne lives north of Atlanta, Georgia, with his wife, Bev, and two sons, Alex and Max. About the Illustrator Miran Lipovac� a is the author of Learn You a Haskell for Great Good!. He enjoys boxing, playing bass guitar, and, of course, d rawing. He has a fascination with dancing skeletons and the number 71, and when he walks through automatic doors he pre- tends that he’s actually opening them with his mind. About the Technical Reviewer Ari Lacenski is a developer of Android applications and Python software. She lives in San Francisco. She writes about Android programming at http://gradlewhy.ghost.io/, mentors with Women Who Code, and plays songs about space pirates on guitar.
<urn:uuid:e3180392-7be6-43ff-9cd4-fe9132e9fb34>
CC-MAIN-2022-33
https://pdfroom.com/books/teach-your-kids-to-code-a-parent-friendly-guide-to-python-programming/jE1d4Zx32Ob
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00405.warc.gz
en
0.897614
2,098
2.71875
3
Addiction Among Mentally Disabled Evaluating an Individual’s Treatment Needs Substance Abuse Among Mentally Disabled Individuals In the 2012 United States census, it was found that 1.2 million adults in the country are living with an intellectual disability. This number is on the rise, in part because of more research and understanding into the nature of these disabilities, which makes accurate diagnosis easier. Among the total population of those living with intellectual disabilities, 85 percent of them are considered to be only mildly disabled. These individuals can, for the most part, function in day-to-day life, integrate into the greater population, and blend in. They experience the same kind of successes and failures, strengths and weaknesses, and triumphs and pitfalls as anyone else. That includes the possibility of abusing substances and becoming dependent or addicted. What Is an Intellectual Disability? An intellectual disability is defined by the Diagnostic and Statistical Manual of Mental Disorders 5th Edition (DSM-5) as a condition that impairs the individual’s general mental abilities and impacts adaptive functioning. These people have significant trouble in intellectual domains like reading, math, and memory, have impaired social skills, and struggle with everyday self-care that is necessary to maintain an independent lifestyle. How Substance Abuse Factors In None of these factors make it impossible to abuse substances. People with intellectual disabilities have a lower rate of substance use in general, but there are special circumstances related to their impairments that can make them vulnerable to abuse and addiction that would not present in neurotypical (non-intellectually disabled) individuals. Part of the reason that the rates of substance use among this population are lower than average is that many of them live with family or are regularly seen by caretakers who can keep an eye out for destructive behaviors. Reviews of Medicaid healthcare billings suggest that the number of intellectually disabled people with substance use disorder is about 2.6 percent. However, among those who have access to and regularly use intoxicating substances, there’s a higher risk of abuse and addiction. When there are multiple diagnoses of intellectual disabilities or of comorbid mental illnesses, that risk increases substantially. Tragically, people with intellectual disabilities are disproportionately vulnerable to physical, emotional, and sexual abuse. Abusive people often target these individuals because they see them as vulnerable and easy to manipulate, and the disabled person may have trouble communicating what happened to them. Neurotypical people may also be less likely to take reports of abuse from intellectually disabled individuals seriously. Plus, young people with intellectual disabilities often don’t receive any education about abuse or what to do if someone is hurting them. There is a strong connection between a history of being abused, mental illness, and substance abuse. One of the biggest differences between substance abuse among people with intellectual disabilities and among those who are neurotypical is access to treatment. Research on the subject is lacking, and many medical professionals and treatment centers are not equipped with the education and mentality to handle intellectually disabled patients. They may even refuse to take such patients on in the mistaken belief that it would be unreasonably difficult to accommodate them. At the same time, standard 12-Step programs often include environments that could make people with intellectual disabilities uncomfortable and concepts that they often have trouble with. Substances Use among Specific Disability Populations Each intellectual disability is quite different, but people with these disabilities tend to share the same life problems. They disproportionately suffer from poverty in the US due to the high cost of medical care mixed with low employment rates due to discrimination and lack of accommodations in many workplaces. Widespread lack of education about these disabilities among the general population means that many neurotypical people don’t know how to properly socialize with those with intellectual disabilities in a way that won’t make them feel uncomfortable or left out, leading to a greater rate of social isolation. Poverty, lack of employment, and isolation all increase the chance that any individual will come to abuse drugs and become dependent or addicted. This is made worse by the fact that those with intellectual disabilities have a greater risk of mental illness. Research on substance abuse among those with autism is tricky due to the fact that each case of autism can look very different from another, depending on severity and environment. This has led researchers to begin discussing autism in terms of a spectrum, often referring to autism spectrum disorder, with those on the milder side of the spectrum typically being diagnosed with Asperger’s syndrome. Interestingly, one study conducted on Australian twins published in the Journal of Studies on Alcohol and Drugs found that among those who had symptoms of being on the autism spectrum but had not been diagnosed with the disorder, those surveyed were more likely to abuse nicotine, alcohol, and marijuana than the general population. At the same time, those who were diagnosed with autism – the ones on the more severe side of the spectrum – were less likely to abuse these substances. This may be, again, because those with milder symptoms are more likely to be able to live independently instead of needing caretakers, and they are able to go out, make friends, go to parties, and take part in what is often considered a normal part of life. However, once they begin to abuse a substance, it’s harder for them to stop. This is not only because of their issues with employment and socializing, but because one of the symptoms of autism is the tendency to repeat enjoyed behaviors over and over. They may also be more prone to impulsive behaviors. For those with learning disabilities, prescription medication abuse and addiction are special concerns. People with attention deficit hyperactivity disorder (ADHD) are often prescribed stimulants that help them focus, organize their thoughts, and accomplish tasks. When taken as prescribed, these medications can be very effective. However, drugs like Ritalin and Adderall have addictive properties and can lead to dependence if taken in a manner that is not recommended by a medical professional. Because of this, there has been a rise in an illegal market for these drugs, and rates of abuse have skyrocketed, especially among young people in school. This is made easier by the fact that the number of Adderall prescriptions given out by doctors more than doubled from 2007 to 2011. People with low-level fetal alcohol syndrome, also sometimes referred to as fetal alcohol spectrum disorders (FASD), are often misdiagnosed as merely having a mental illness. Fetal alcohol syndrome often co-occurs with a number of other disorders, including mental illnesses and other disabilities, increasing the risk of substance abuse. If misdiagnosed, the individual is very likely to be improperly treated by medical professionals, resulting in worsening issues, frustration, and despair. People who experience this may then turn to substance use to self-medicate or simply to deal with the pain of hopelessness. People with intellectual disabilities have a lot to worry about when it comes to substance abuse. Some of these disabilities are the result of or come along with developmental of physical issues that can make them more prone to certain illnesses, and many substances make the risk of health problems worse. For example, heavy alcohol consumption increases the chance of infection. They’re also more likely to be on medication to help them function, and many medications interact with intoxicating substances in ways that can damage the body and/or brain and even cause medical emergencies and death. People with ADHD and other disabilities who are medicated with stimulants and amphetamines should avoid any substance use due to the many dangers associated with mixing drugs. Using additional stimulants like cocaine increases the risk of severe side effects and overdose. There have been a few isolated cases of young people on medications like Adderall suffering sudden heart failure resulting in death. Though the likelihood of this happening is extremely low, adverse affects on the heart would be twice as likely with twice the stimulants in the body. When it comes to the use of alcohol, barbiturates, and other substances that depress the nervous system, stimulants can mask symptoms of overdose, cause other complications, and increase the risk of seizures. Many intoxicating substances also cause reduced inhibitions, impulsive or destructive behavior, and sudden mood changes, especially if the individual is dependent on the drug. These side effects can exacerbate existing issues that many people with intellectual disabilities have. People on the autism spectrum, for example, are often easily disturbed by certain kinds of noises and bodily sensations. The unpleasant sensations associated with “coming down” from a high or from withdrawal can be especially distressing for these individuals, making it much harder to stop using the drug. Difficulty communicating can cause frustration and the temptation to lash out. Confusion and poor coordination are also typically worsened by substances like alcohol, increasing the chance of injury. Increased social issues are also a concern when an intellectually disabled person is engaging in substance abuse. The results of this behavior can make it even more difficult to get to medical appointments, therapy and group counseling sessions, and social or family events. Drug abuse may strain relationships between individuals and caretakers, leading to a greater risk of isolation, depression, and anxiety. Treatment Options and Barriers Programs dedicated to treating substance abuse in people with intellectual disabilities are very hard to find, which is a massive problem due to the fact that many of the standard programs don’t work well for these individuals. According to a report published in the U.S. National Library of Medicine, there are only two known publications that provide medical professionals with information on how to assess and treat substance use disorders in intellectually disabled patients. Without this information, they are very likely to come up against a number of problems when trying to help these patients and will not know how to deal with them properly. They may even mistake a patient’s inability to do a certain kind of therapy or forgetting to take medications as noncompliance. Problems are also more likely to appear in group treatment settings. Twelve-Step programs have been found to have little success with intellectually disabled persons due to multiple factors. Having to sit quietly in one space and pay attention to others for long periods of time can be excessively difficult, and their inability to do so can create resentment among the neurotypical members of the group who are unlikely to be educated on the different needs that these disabilities create. Being required to speak on their own experiences can be difficult and create unnecessary stress, and being paired with a neurotypical sponsor is a problem since that sponsor will not be able to fully empathize with the disabled individual. Certain spiritual concepts also may not work for them, and the concept of accepting powerlessness is often ineffective. Addiction treatment professionals have found it more effective to stress with people with intellectual disabilities that they have the power to stop using a substance and recover. Inability to work and general poverty among people with intellectual disabilities go beyond the basic fact that they may not be able to afford treatment, medication, or transportation. Due to widespread unemployment among this group, most have Medicaid as their primary insurance provider, which often does not cover private substance abuse treatment. This is unfortunate, seeing as private treatment is much more likely to be successful with these individuals. Plus, public programs tend to have long waiting lists and are less likely to be successful even with neurotypical clients. This can leave these individuals in an impossible situation – they need money to pay for doctors and private programs that are trained to deal with intellectual disabilities so the treatment can be effective, but they’re much more likely to live in poverty because of their disabilities. This explains why so few of them receive or even seek out treatment. The need for free or low-cost government programs is clear, as is the need for more research and training among medical professionals. However, despite the fact that this was called for over three decades agoand the fact that studies continue to be published showing that the need still exists, little has been done. Do You Have a Loved One in Need of Treatment? Call Us | Let’s See If We Can Help According to a survey, 52 percent of medical school deans and 56 percent of students described graduates of their programs as “not competent” in terms of treating patients with intellectual disabilities. Due to the fact that so many medical professionals and addiction programs are woefully uneducated and unequipped to properly treat these individuals, it’s extremely helpful and necessary for those looking for substance abuse treatment to search for resources that will help them get the kind of care they need. There are a few organizations that are dedicated to the intersection of intellectual disability and substance use disorders. These include: Though finding the right kind of treatment may be a challenge, it’s not out of reach. Contacting organizations dedicated to helping people with disabilities is one of the most effective ways to find properly equipped medical professionals and programs, and it can be the first step toward recovery. - Addiction Resource Guide: Special Populations: This simple website provides inpatient treatment listings according to both the type of addiction and the type of disability. - Prevention through Alternative Learning Styles (PALS): This program is designed to give preventative resources and education to middle school youth, including those with disabilities, in terms of risky behavior like alcohol and drug abuse. - Substance Abuse Resources & Disability Issues (SARDI): This program focuses on both disability and how it interacts with behavioral health issues, including substance abuse. They conduct research and provide free information to anyone looking for help. - Resources for Human Development: A nonprofit organization serving 14 states that is devoted to helping people with disabilities lead more fulfilling lives. Their services include addiction recovery. - The Alliance of Community Service Providers: A professional society consisting of 90 specialized agencies, many of them nonprofit. They focus on providing support for people with intellectual disabilities, mental illnesses, and substance use disorders. - Addiction & Disabilities Education & Resource Guide: This is an in-depth introductory guide into substance abuse and how it impacts people with disabilities. It includes a self-assessment questionnaire, tips on how to interact with disabled persons for able-bodied and neurotypical individuals, and additional resources. - National Association on Alcohol, Drugs and Disability Inc. (NAADD): This organization promotes awareness and provides information about substance abuse, addiction, and dependence among those with disabilities. They support disabled individuals and connect them with necessary services for addiction treatment.
<urn:uuid:de5fe536-1bec-4996-8df4-9dbda1838d1b>
CC-MAIN-2019-22
https://sunrisehouse.com/addiction-demographics/mentally-disabled/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257699.34/warc/CC-MAIN-20190524164533-20190524190533-00062.warc.gz
en
0.95939
2,937
3.140625
3
You are here History of the Library From Subscription to Tax Support For over 125 years, the St. Charles community has supported and benefited from a library. In 1888, a dozen citizens met to make plans for the first Library Association which was legally incorporated in 1889. This subscription library had an annual membership fee of $2.00. In 1906, the Association members decided that the Library should become a public institution to better serve the entire community. The township residents voted to form a tax-supported public township library, and the first Board of Directors met on April 18. The Library Board asked the voters in 1978 to convert from a township library to a district library that would operate independently from the township government. This change offered the ability to extend the library boundaries beyond the township limits and offer services to unserved neighboring communities and portions of the school district. Location and Building The library location and size has changed over the years. With its first location in rented rooms at 203 E. Main Street, the collection grew to 3,000 volumes by 1900 and circulated approximately 200 books per week. After becoming a township library, a letter was sent to philanthropist Andrew Carnegie requesting funds to build a new library. Mr. Carnegie’s personal secretary responded with a letter dated December 13, 1906 to inform the Library Board that “Mr. Carnegie will be glad to give Twelve Thousand Five Hundred Dollars to erect a Free Public Library Building for St. Charles.” The remainder of the total cost of $15,000 was funded by local donations. The site selected for the building was formerly a city refuse dump which later was used as an ice skating rink. Residents on the west side of St. Charles criticized the location due to the library’s “great distance” from their homes. Chicago architects Phillips, Rogers & Woodyat designed the building, which opened to the public in December, 1908. The St. Charles Library Association turned over its books to the new library at that time. In 1925, the first expansion, consisting of a mezzanine on the first floor, was completed. Men working for the Civil Works Administration program completed a children’s room in the basement in 1933. The growth of St. Charles Township from a population of approximately 5,000 in 1908 to 16,000 in 1960 made further expansion necessary. On November 10, 1962, a referendum for $255,000 in building bonds was passed for an addition to the building. Architects Frazier, Raftery, Orr & Fairbank, of Geneva, were chosen and ground was broken on December 1, 1963. The addition provided an additional 7,640 square feet on the main floor and a basement area of 3,950 square feet. The main floor housed all public services with shelving for approximately 50,000 volumes and seating for 90 people. The original Carnegie Library became office and storage space. In 1973, the Children’s Department was moved to the basement level making expansion of Adult Services possible. Remodeling of the basement was funded in large part by a donation from the Thomas Rossetter family in memory of their son Bob. The St. Charles Jaycees donated the circulation desk. As the building expanded, so did the need for parking. Walnut Avenue between Fifth and Sixth Avenues was closed in 1977 as part of a joint agreement between the Library and St. Mark’s Lutheran Church. By 1986, the District population was over 28,000, and the Library Board sought approval from voters for $2,925,000 in building bonds and an increase in the Library’s operating tax. The referendum was overwhelmingly approved and groundbreaking ceremonies were held on July 31, 1987. On December 17, 1988, the 35,000 square-foot addition was opened to the public. The expanded facility had a capacity of 225,000 volumes and seating for 300. A 5,200 square-foot mezzanine would provide expansion space for materials, reading and study. The project was funded by $2,925,000 in building bonds; a $250,000 federal construction grant administered by the Illinois State Library; and the Library’s special reserve fund. Secretary of State Jim Edgar and Library Board President Norman Huntley signed the grant contract on May 29, 1987. The architects were Wendt, Cedarholm & Tippens, Inc. of Winnetka. Remodeling of the 1908 and 1964 buildings was completed in 1989, with the former being opened once again to the public to house the business, local history and genealogy collections. A generous donation by the Dellora A. and Lester J. Norris Foundation financed the Carnegie building renovations. After acquiring additional properties through the use of the special reserve fund, the parking lot was again expanded in 1991. The mezzanine was opened in 1995 with funding from the Library special reserve fund and a $91,447 Illinois Secretary of State Live and Learn Grant. This added reading and study areas, and an art gallery. Three study/conference rooms were later added to meet patron need. Some of the original capacity of the 1988 project was lost with the addition of these rooms. The Helen Gale Story Room in Youth Services was constructed in the northeast corner in 1995. Named in memory of a former children’s librarian, the room was the first project of the St. Charles Public Library Foundation. Donations by individuals and major grants from the Dellora A. and Lester J. Norris Foundation, and the General Mills Foundation funded the project. Renovation of the Carnegie Community Room was completed in 1998. This was the second project of the Library Foundation. Originally known as Library Hall when the 1908 building was constructed, it held Library programs, meeting of community organizations, high school dances, and kindergarten and elementary school classes on a temporary basis. The room had been closed in the 1940s and later used for storage. The Foundation hoped to recreate as closely as possible the ambiance of the original room. The $175,000 project was funded with donations from the community, a generous grant from the Dellora A. and Lester J. Norris Foundation, the City of St. Charles Visitors Cultural Commission and a $65,000 Illinois Live and Learn construction grant. The Library purchased furnishings, and the Friends of St. Charles Public Library donated a custom-made display case. A teen section, The Loft, was created on the mezzanine in 2000, with a special collection of young adult materials. The Friends donated furnishings. Various other projects have followed, including: - 2000 – Carnegie Walk, a joint venture of the Foundation and Friends - 2002 – Youth Services workroom - 2002 – East parking lot expansion, making 107 total spaces - 2002 – Technology Center construction funded by $30,000 from the Foundation and an Illinois Live and Learn Grant of $63,028. - 2003 – ASK ME Desk donated by the Foundation - 2003 – Kitchen installed in the meeting room With an eye toward eventual expansion and the need for additional parking, properties were acquired on the block southeast of the Library. In 2013, construction was completed on half of the block to provide 47 additional temporary parking places. Landscaping of the parking lot was provided by the Foundation and individual donors. Renovations of all areas of the building were begun in February 2014 to refresh the interior, provide additional comfortable seating, and public computer access to all departments. Lighting fixtures were replaced throughout the building to improve light levels and energy efficiency. New carpeting was installed and the Reference Desk was relocated on the main level. Youth Services added an interactive early literacy center, more computers for kids and a family restroom. Art and Architecture in Illinois Libraries The St. Charles Public Library is home to a variety of original artwork including prints, sculptures, quilts, and rugs. The artwork is on display throughout the Library. In 1967, the Library joined the newly-formed DuPage Library System (DLS) which supported 132 local libraries including academic, public, school, and special libraries in DuPage, Kane, Kendall and Will counties. This was one of 18 regional library systems. In 2011, the systems merged to become three regional centers in Illinois. The library became part of RAILS Library System. In 1992, a consortium (Library Integrated Network Consortium–LINC) was formed to provide computer network services for libraries that have included Addison, Batavia, Bloomingdale, Franklin Park, Geneva, Glen Ellyn, Itasca, St. Charles, Villa Park and West Chicago Public Libraries. The Library card catalog was replaced the following year with an online version. Over the years, the Library has become more than just a repository for books. Since 1974, Outreach Services have delivered materials to patrons who are unable to come to the library due to illness or physical limitations and serves as a connection for Talking Book programs for the vision impaired. The Artist of the Month program began in 1979; and the first co-sponsored book discussion group met at Town House Books in 1980. Since 1981, the Library has offered a Sunday Afternoon Concert Series with musical talent and variety appealing to all ages and tastes. The tradition of educational and entertaining programs for kids, teens, and adults continues today. As technology has changed, the Library has evaluated and offered many different items. Long playing recordings and cassettes have been replaced by CDs and digital downloads. The typewriter desk has been replaced by multiple computer stations with free access to Microsoft Office programs and online services. Once popular VHS tapes have been replaced by DVDs, and now movies and TV episodes also are available online. The first St. Charles Public Library website was launched in 1996. A world of information was now opening to patrons. Today we assist users with downloading books, magazines, music, movies and more to their mobile devices. Computer classes are offered at the Library and online, and an extensive list of databases now are available from home. Library staff contribute to our social media presence by updating accounts on Facebook, Twitter and Pinterest. The Library will continue to evolve and adapt to current trends to provide services of interest to our diverse community. The St. Charles Public Library Foundation is a nonprofit corporation established in 1993 to provide support for the Library through tax-deductible contributions. The purpose of the Foundation is to provide funds to enhance and enrich Library programs and services. The Friends of St. Charles Public Library is an adult group that helps the Library by raising money to support special programs for patrons of all ages and to purchase equipment that is beyond the Library budget. Twice-yearly book sales and sales in the Library lobby are the primary fundraisers. St. Charles Library Association Librarians: Miss Jennie Lewis Mrs. Jennie Nichols Mrs. H. A. Hempstead Miss Frances Turner Mrs. R. B. Farson Mrs. Belle Ogden Constant Miss Mary Stewart St. Charles Public Library Librarians: Miss Mary Stewart; April, 1906–August, 1927 Miss Mary Effie King; August, 1927–April, 1928 Miss Mary Stewart; Reinstated May, 1928–Resigned October, 1929 Mrs. Otheo Frellsen Metcalf; November, 1929–July, 1937 Mrs. Olma B. Bowman; September, 1937–February, 1944 Miss Louise F. Keuck; March, 1944–July, 1956 Miss Lois V. Miller; August, 1956–December, 1977 Diana M. Brown; January, 1978–December, 2013 Pam Leffler; January, 2014-February, 2016 Edith G. Craig; November 2016-Present For more historic photos and notes from 1906-1930 Board Minutes see the Illinois Digital Archives.
<urn:uuid:8688305a-a1a9-4033-9d30-0d9cb560a997>
CC-MAIN-2022-33
https://www.scpld.org/history-library
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00602.warc.gz
en
0.959545
2,424
2.71875
3
To learn to read is to light a fire; every syllable that is spelled out is a spark. – Victor Hugo Reading readiness and reading advancement has little or nothing to do with educational toys, apps, or enrichment programs. It has much more to do with what kids naturally like to do: move their bodies, enjoy stories, take part in conversation, and play freely. Movement helps children develop sufficient brain-body maturation so they can successful decode abstract symbols into meaning. This includes complex neurological pathways as well as sufficient kinesthetic awareness and proprioceptive sense. (Find out what movements are essential in “Reading Readiness Has To Do With the Body.”) Reading aloud every day, starting in babyhood, helps children associate reading with closeness and pleasure. Even a board book builds vocabulary, demonstrates left to right sequencing, and promotes comprehension. We can fold reading time into daily rituals like story time before naps and again after dinner. We can also show how much we value reading by letting kids see us reading our own books and magazines. As kids get older it’s important to avoid offering rewards for reading or make reading a precondition for privileges. That’s because rewards, even for something kids already enjoy, significantly diminishes their own intrinsic motivation. Telling kids “20 minutes of reading before you can play games on the tablet”casts reading as an obligation, leading kids to devalue reading while enhancing the appeal of digital entertainment. (No wonder “eat your broccoli before you can have ice cream” makes broccoli the enemy and ice cream even more tempting.) Stories stretch the mind and imagination. They help us, at any age, develop empathy and give us a larger context for our own lives. That’s not limited to the page. There’s extraordinary power in telling family stories. When we share tales of our doubts, misdeeds, and triumphs we’re not only building family cohesiveness, we’re also (according to science) helping kids grow up with greater confidence and self-control. Daily conversations, including all those questions kids ask, helps them advance in reasoning and social skills while bringing us closer to each other. Let’s admit, a great deal of parent and child interaction isn’t true conversation so much as directives, complaints, and reminders (because, well, life) so it helps to create openings for conversation. Hold a space for kids to talk about what’s on their minds —- this often seems to happen on a walk, a drive, or at bedtime —- good times to avoid earbuds and screens. Make a practice of showing you’re listening by using eye contact and avoiding interruption. Talk about big issues and dilemmas in your lives, in your community, and in the news. Big topics have a way of stretching young minds. Free play is an essential part of childhood. It also helps kids develop the skills necessary for reading well. It may look like fun, but in ways deeper and more vital than we can imagine play is a process of learning. We don’t have to engineer their play. Play is, and always has been, a universal language. Give kids as much time for free play as possible. But when you want to play along, here are a few ideas. - Tell simple jokes (sorry, this includes Knock Knock jokes), attempt tongue twisters, call each other made-up names, say goodbye in rhymes like “Out of the door dinosaur!” and “See you later excavator!“ - Play Cherries & Pits to get conversations started. Very simply, each person takes turns telling the best things (Cherries) about their day and the worst things (Pits) about their day. - Tell round robin stories. One person starts a story with a character and setting (“The elf woke up to find a large bird staring at him.”). The next person adds a few sentences before passing it along to the next person. This works well with as little as two people and nearly always becomes amusingly improbable. - Turn socks into puppets for impromptu plays. Puppeteers can hide behind a couch or sheet-covered table to perform, although socks in my house tend to talk on their way to the laundry. - Make story stones (pictures on stones or tiles) and grab a few to prompt a story idea. Other stones can be added as the story goes on. - Ask off-the-wall questions. “Would you rather be a monkey or a lion?” “What would it be like if people had wings?” “If we could go on an adventure together what would we do?” - Write messages to each other. Scratch a few words in the sand, leave a message in magnetic letters, designate a place (under each other’s bed pillows, perhaps) where secret notes can be left, share a question and answer journal (taking turns asking and answering any and all questions), and leave little love letters for kids to find. - Sing songs with familiar tunes and invented lyrics. Those tend to be somewhat scatological in my family, a favorite faux opera here has to do with encouraging dogs to go out and get their elimination duties over with…. - Play impromptu memory games. For example, take turns tapping out a beat, seeing if the next person can repeat it. Or try imitating movements in sequence (first person jumps, the other person jumps and adds clapping, first person jumps and claps and adds a turkey gobble, and so on). Or take turns memorizing a sequence of unrelated words to repeat back in two minutes or ten minutes or the next day. Be prepared to lose to your kids! - Play hand-motion games like Wheels on the Bus, Itsy Bitsy Spider, and Cee Cee My Playmate. Show kids jump rope rhymes. (You might check out Anna Banana: 101 Jump Rope Rhymes by Joanna Cole.) And don’t forget hopscotch rhymes. Research shows these simple games help kids become better spellers, have neater handwriting, and better overall writing skills. - Encourage classic games like checkers, mancala, and chess. Games of all kinds typically help kids understand sequencing, grouping, and memory. No need to choose specifically educational games. - Make your own board games along with your child. - Set aside one evening a week as a family board game night or set up a kids’ game club with friends. (There are even great games for kids three and under like Roll & Play, First Orchard, and Feed the Woozle.) - Waiting in line with kids? Find objects that begin with each letter of the alphabet together, from avocados to zeros. Or play the classic Going on a Picnic game. Start by saying, “I’m going on a picnic and I’m bringing an aardvark (or any “A” word). The next person continues with “I’m going on a picnic and I’m bringing an aardvark and a basketball (or any word starting with a B) and so on. The last person to remember and repeat the list is the winner. - Encourage active games. Consult Great Games! 175 Games & Activities for Families, Groups, & Children! by Matthew Toone and Mom´s Handy Book of Backyard Games by Pete Cava. - Use the dictionary (print copy!) to play surprisingly addictive word games like Blackbird. - Encourage kids to draw maps of places they know well (your kitchen, your house, your street) and maps of imaginary places (alien planets, mythic kingdoms, ninja training camps). Draw a map of where you’ve hidden packed lunches for them to discover or the bedtime chapter book you’ll read. - Encourage children to set up obstacle courses. Indoors this may include three somersaults through the hall, chairs to wriggle under, a rope to hop over, and a bunk bed ladder to climb. Outdoors the course can be more ambitious. - Enjoy regular treasure hunts. First hide a prize or two. Then place clues through the house or yard. These can be simple words or sentences, symbols, or pictures. Each clue leads to the next. The prize doesn’t have to be a toy or candy (it could be a note saying “we’re going to the park!”) the fun is in the hunting. Encourage children to set up their up treasure hunts too. - Letterboxing combines walking, navigation, and solving riddles. Clues help seekers find “letterboxes” hidden outdoors. Seekers mark their logbooks with a rubber stamp found in this box, mark a logbook in the box with their own personal stamp, then leave the box for the next seeker. For more information and links to regional clues, check with organizations such as Letterboxing North America or Atlas Quest. Or use the guidebook, It’s a Treasure Hunt! Geocaching & Letterboxing. - Try orienteering. This sport combines navigation, map reading, and decision-making. Participants walk, run, bike, or ski using a map and compass to choose the best route on or off the trail. Consult Orienteering Made Simple And Gps Technology: An Instructional Handbook by Nancy Kelly. - Take turns playing Line Zombie. Draw a line on paper with a pencil or on the ground with chalk, using arrows to indicate direction. The other person must follow the line either by tracing on the paper with marker or walking on the chalk line. Zombie noises optional. Portions of this post adapted from Free Range Learning.
<urn:uuid:84c5701c-9d89-49e7-a02c-a844e0afccd1>
CC-MAIN-2019-22
https://lauragraceweldon.com/2016/07/07/reading-has-to-do-with-play/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258147.95/warc/CC-MAIN-20190525164959-20190525190959-00342.warc.gz
en
0.923064
2,048
3.578125
4
The diagnosis of normal pressure hydrocephalus (NPH) depends on symptom profile, presence of radiographic features, and the outcome of diagnostic tests. Although numerous techniques are used to identify patients who are likely to have NPH and various means are used to identify those patients most likely to respond to treatment, no definitive method exists to prove diagnosis. Cerebrospinal fluid (CSF) diversion accomplished via placement of a ventriculoperitoneal shunt is the most common treatment. The precise incidence of NPH is hard to determine, because the condition lacks a formal, consensus-based definition. Some physicians base the diagnosis strongly on radiographic evidence; another group of health care professionals relies more on clinical indications, and still others use a combination of signs and symptoms that they have found to be reliable. A rare cause of dementia, NPH primarily affects persons older than 60 years and is estimated to be the source of dementia in 5 percent or less of affected persons.1–3 Formed by specialized tufts of capillaries called choroid plexus at a rate of approximately 20 mL per hour, CSF circulates from dual paired lateral ventricles through paired foramina of Monro into a single midline third ventricle (Figure 1). From this midline cavity, CSF continues through the aqueduct of Sylvius into the fourth ventricle, situated within the posterior fossa. CSF exits the ventricular system via three small apertures to pass into the subarachnoid space. CSF contained within the subarachnoid space envelops and cushions the brain and spine. At any one time, 140 mL of CSF is contained within the neuroaxis; approximately 25 mL is contained within the ventricles while the majority is transiently sequestered within cisternae situated at the base of the brain or within spaces surrounding the cerebral convexities and the spinal cord. Within the subarachnoid space, CSF is absorbed by arachnoid granulations positioned near the top of the brain. These conduits of CSF outflow drain into the venous system via the superior sagittal sinus.2,4 NPH is a disorder of decreased CSF absorption, not excess formation.4 Whether from an established or unknown cause, the arachnoid granulations fail to maintain their baseline removal of CSF, often secondary to fibrosis and scarring that obscure absorptive interfaces. A pressure gradient develops between the fluid in the subarachnoid space surrounding the brain and the ventricular system. The differential pressures eventually lead to decreased CSF production and the setting of a higher, yet still normal, baseline pressure.1 This new pressure distends the ventricles, stretching surrounding nerve fibers and compressing the periventricular parenchyma. This encroachment on brain tissue by enlarged ventricles impinges on the caliber of arterioles and capillaries, often resulting in ischemia.2 The theory that implicates fibrosis as the pathophysiologic basis of NPH is not uncontested. Some sources believe that idiopathic NPH is a persistence of poor drainage of CSF originating in childhood as benign external hydrocephalus secondary to insufficient removal of CSF by immature arachnoid granulations.5,6 Additionally, agreement about whether NPH is an entity consisting of normal, or near normal, pressure remains far from unanimous because some physicians feel that symptoms may be the result of intermittent spikes of high pressure known as B waves.1,7–10 Regardless of the originating cause, a communicating hydrocephalus is produced. This type of hydrocephalus, in contrast to non-communicating hydrocephalus, indicates the absence of an obstructive mass, such as a tumor, abscess, or blood clot, infringing on the central pathway of CSF flow. The inciting etiology of NPH may be recognized or unknown. Subarachnoid hemorrhage, head injury, and meningitis are frequently implicated preceding events.3,4 Patients with established etiology of NPH tend to respond more favorably to shunting than patients with chronic idiopathic hydrocephalus.3,5,11–13 Signs and Symptoms The triad of gait instability, urinary incontinence, and dementia distinguishes NPH4,14–16 (Table 1). Elucidation of the presence of these three symptoms, as well as their predominance and pattern of presentation, is essential. One study2 reported a 65 percent positive predictive value of this classic constellation in selecting patients for ventriculoperitoneal shunting. |Difficulty or arrest in initiation of ambulation| |Feet appear “glued to the floor”| |Gait instability, multiple falls Wide-based stance, shuffling steps| |Generalized slow movement| |Lack of spontaneity in movement, verbal response, and emotion| |Latency in response to questions or reaction to situations| |Slowness in processing information| Although NPH commonly is referred to as a treatable form of dementia, cognitive deficits and memory loss are the symptoms least specifically indicative of this syndrome and the last to respond to shunting.15,17,18 Gait instability is most often the first presenting and most significant problem.7,12,16,19,20 In a review20 of 35 studies evaluating diagnostic studies and outcomes of patients with NPH, investigators arrived at a similar conclusion. The aberrant pattern of ambulation often is composed of a slow gait; short, shuffling steps; and a wide-based stance.4,15,21 The term “gait apraxia” is sometimes used to describe the problem with locomotion experienced in patients with NPH. This phrase entails difficulty in sequencing the individual components that constitute ambulation (i.e., strike, stance, and swing), as well as a struggle to coordinate alterations in course or fluid continuity of movement. Indeed, trouble with initiation of ambulation, imbalance during action and standing, as well as frequent falls, are observed.7 In one study,16 10 patients withNPH were compared with 12 healthy, age-matched control patients; the patients with NPH were found to have a slower gait, shorter stride, and imbalance offset by a wide stance. Urinary incontinence usually follows gait abnormalities and almost always includes urinary urgency.1,2,22 Deformation of periventricular corticospinal tract sacral nerve fibers seems to be the likely reason for incontinence.4 Ineffective contraction of the detrusor muscle is identified on urodynamic studies.4 Dementia usually is not the presenting or most overt symptom of NPH.18 It is often, although not invariably, evident.1,4 If present, cognitive impairment should be of the subcortical type. Inattention, latency in recall, and lack of spontaneity frequently are encountered indicators of subcortical dementia, the intellectual impairment observed in NPH.4 An answer provided by a patient suffering from NPH is frequently correct; a fact recalled is most often accurate.1 These features distinguish the dementia of NPH from the cognitive decline noted in patients with Alzheimer’s disease.12 NPH dementia should not include difficulty with word formation, trouble interpreting stimuli within appropriate context, or inability to sequentially carry out simple tasks, which characterize aphasia, agnosia, or apraxia and are more indicative of cortical dementias. The physiologic cause of the dementia intermittently associated with NPH remains to be determined positively, although deformation of limbic structures surrounding the enlarged ventricles has been suggested.4 Ultimately, identifying patients with NPH involves the careful weighing of likelihoods. The time to refer patients to a subspecialist (i.e., neurologist or neurosurgeon) for a more involved and specific work-up and confirmation or contradiction of suspicion is when even a slight chance of the diagnosis arises or when just a loose grouping of the triad is encountered. Early referral, when NPH is suspected, is optimal to identify the greatest number of patients actually experiencing this disorder and to offer timely treatment to those who are most likely to respond to intervention. Expedient differentiation of NPH from other diagnoses, some of which are life-threatening, as well as directly and conclusively treated, also is imperative (Table 2). |Combinations of conditions affecting gait (e.g., rheumatoid arthritis, cervical stenosis) coupled with conditions that impinge on mentation (e.g., Alzheimer’s disease, multi-infarct dementia) and those that have an effect on urination (e.g., prostate disease)| |Intracranial infection (e.g., abscess, subdural empyema, meningitis)| |Subcortical arteriosclerotic disease| |Systemic diseases (e.g., hypothyroidism, Addison’s disease) or malignancy| |Tumor (benign or malignant)| Imaging is essential in patients presenting with signs and symptoms of NPH to confirm the absence of subdural hematoma, infection, neoplasia, or other structural abnormality. Compared with studies of normal patients (Figure 2a), magnetic resonance imaging (MRI) of patients who have NPH demonstrates ventriculomegaly with maintained cerebral parenchyma (Figure 2b). This finding is in contrast to the ventricular dilation associated with significant loss of brain tissue evident in images of patients who have Alzheimer’s disease (Figure 2c). Additionally, MRIs of patients who have Alzheimer’s disease frequently reveal focal loss of tissue in the hippocampus.1 In patients with NPH, the volume of medial temporal lobe tissue should be maintained.1 Evidence of turbulent flow in the posterior third ventricle and within the aqueduct of Sylvius may increase the likelihood of shunt-responsive NPH.1,4,23–25 Magnetic resonance flow imaging—called cine MRI—helps to define and characterize this flow void. CSF flow studies may help differentiate NPH from atrophy.25 Radionuclide cisternography may suggest the presence of communicating hydrocephalus via stasis of isotope within the ventricles. Demonstration of a sluggish rate of isotope travel to the convexities in 48 hours may be used to confirm communicating hydrocephalus, but should not be used to exclude otherwise favorable patients from the shunting procedure.4 White matter disease is observed frequently in brain parenchyma adjacent to enlarged ventricles, coupled with diminished perfusion evident on flow studies. Perfusion to the periventricular region actually may increase following shunt surgery.5 Five diagnostic studies can be used to assess patients who may have NPH. These include routine spinal tap, high volume spinal tap, prolonged lumbar drainage, continuous intracranial monitoring, and CSF outflow evaluation. ROUTINE SPINAL TAP Routine spinal tap should be performed to rule out other conditions. A normal level of CSF protein and glucose, and a white blood cell count of five or fewer cells per mcL [or mm3] plus an opening pressure of less than200 mm H2O suggests that NPH may be thecause of the neurologic symptoms. INTERMITTENT HIGH VOLUME TAP In an intermittent high volume tap, 30 to 60 mL of CSF are removed with comparison of symptoms before and after the test. Improvement of symptoms with careful removal of 30 to 60 mL of CSF may indicate an eventual positive response to ventriculoperitoneal shunting.4,19,26 High volume tap coupled with symptom assessment can be repeated to confirm the reproducibility of positive or negative results. In one study26 of patients who underwent this test, 80 percent of patients who showed symptom improvement following a high volume tap had a positive response to shunting at three months, with 73 percent reporting benefit at three years. PROLONGED LUMBAR DRAINAGE Some authors find three to five days of lumbar drainage via interval or constant pump-controlled removal of CSF combined with ongoing assessment of the patient’s condition to be more indicative of eventual response to CSF diversion.27,28 Five to six days of CSF diversion via lumbar drain proved 100 percent effective in predicting positive outcome to shunting in two series of seven and 17 patients.27,28 Although “normal pressure” is inherent in the name of this syndrome, some evidence obtained from monitoring intracranial pressure over an extended period of time may reveal intermittent spikes of elevated pressure. Placement of an intracranial pressure monitor allows for a period of continuous recording of intracranial pressure, permitting identification of episodic waves of high pressure that are missed with isolated lumbar measurement yet are often characteristic of NPH.1,7–10 CSF OUTFLOW STUDIES CSF outflow studies examine the pressure response to outflow following infusion of a sterile solution at rates of 0.5 mL per minute to 5 mL per minute.7 This test requires access to the lumbar cistern via lumbar puncture for infusion of fluid and placement of a ventriculostomy for measurement of intracranial pressure monitoring during the test as well as the release of CSF once the intracranial pressure has reached a certain level.7 In some studies,29,30 elevated outflow resistance predicted which patients would be most likely to respond favorably to shunting. However, in reviewing the diagnostic methods and outcomes from a review20 of 35 studies of NPH cohorts, investigators report inconsistent results from measurements of CSF outflow pressure. Ultimately, there is a lack of consensus about which diagnostic test most reliably predicts which patients will respond favorably to shunting. No gold standard test is available to identify patients who will benefit from CSF diversion. In the absence of agreement among experts, the outcomes of various or multiple tests coupled with the sequence and significance of signs and symptoms together with results of radiographic studies identify patients who likely have NPH. Ventriculoperitoneal shunting remains the most common therapy for NPH. This procedure involves the use of general anesthesia. A catheter is placed into one lateral ventricle and attached to a cap and valve positioned below the scalp. Tubing is tunneled subcutaneously from the valve to the abdomen, where it is deposited into the sterile peritoneal cavity for continuous drainage. Examination of the results of multiple studies yields a wide variation in patient response to CSF diversion. According to one review,20 59 percent of patients with NPH reported improvement after shunting with a persistent improvement in only 29 percent. In another study,7 at one year following ventriculoperitoneal shunting in their cohort of 25 patients, 72 percent of patients had improvement in activities of daily living, a 58 percent improvement in urinary incontinence, and a 57 percent improvement in ambulation. Patients with a known cause of NPH are more likely to have improvement from ventriculoperitoneal shunting than those who lack a defined etiology. Signs or symptoms of short duration are more likely to be ameliorated with CSF diversion than longstanding impairment. Patients whose symptoms improve following a large volume lumbar puncture have a greater chance of responding to shunting than patients whose deficits remain unchanged following removal of CSF. A patient presenting primarily with gait instability, followed by incontinence and mild dementia of short duration, with imaging showing ventricular dilation but a preserved cortical mantle, has a reasonable likelihood of benefiting from ventriculoperitoneal shunting. A floridly demented patient whose ineffective ambulation and incontinence likely are secondary to cognitive decline accompanied by radiography demonstrating significant, generalized cortical atrophy will not likely respond to CSF diversion.17,18 The decision to shunt should not be taken lightly. Accurate patient selection is key to a successful outcome. If symptoms involving gait, incontinence, and/or dementia are present for a short period of time, patients have a higher chance of amelioration of these symptoms with shunting than patients who have had symptoms for a long time.1 However, improvement has been recognized in patients even after years of cognitive decline. Therefore, treatment should not be withheld, if otherwise indicated, solely on the basis of symptom duration. Yet, with NPH, no strict algorithm or definitive test provides an ironclad answer. In the absence of absolute proof remain practical indications and clinical likeliness to formulate decisions.
<urn:uuid:45297b11-b560-40c5-b234-bb7e05eeb34c>
CC-MAIN-2022-33
https://www.aafp.org/pubs/afp/issues/2004/0915/p1071.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572127.33/warc/CC-MAIN-20220815024523-20220815054523-00005.warc.gz
en
0.914283
3,563
2.828125
3
Table of Contents - 1 What Makes Blue Such a Meaningful Color? - 2 Two Broad Ways of Conceptualizing Color Theory - 3 How to Make Blue the Technical Way - 4 Frequently Asked Questions What Makes Blue Such a Meaningful Color? It is clear that blue means a lot to many people throughout the globe. Colors naturally carry an emotional imprint, and different shades of blue can elicit very different emotional reactions. Depending on the exact hue, blue has a wide range of associations and meanings, including trust, relaxation, misery, expansiveness, and loneliness. The meaning of the color blue not only differs by the shade, but also by the cultural climate in which you are viewing it. For example, Iranian people view the color blue as one of mourning, while many Western cultures associate “something blue” with joyous wedding occasions. Let us take a closer look at some of the positive and negative associations of different shades of blue. Blue Represents Calm, Trust, and Royalty One of the most common associations with blue shades is that of peace and tranquility. Throughout history, humans have been associating blue hues with positive and relaxed mental states. In fact, many scientific studies have shown that this association is wired into our brains. Scans show that simply looking at a cool blue shade can encourage the production of various chemicals that promote relaxation and rest. As part of this relaxation process, blue shades can also suppress the appetite and slow the metabolisms. Another strong positive association we have with shades of blue is that of self-expression and balance. Deeper blue shades can encourage feelings of confidence, and communicate significance and trust. As a result of the expense of early blue pigments, like cerulean, blue has long been associated with royalty. The saying that royals have “blue blood” has led to darker blue shades, in particular, is associated with power, intelligence, stability, unity, and trust. These associations also bleed into the corporate workspace, supported by blue suits. Blue Represents Sadness, Emptiness, and Loneliness While blue has several positive implications, it can also represent a range of negative emotions. Certain blue shades can make us feel a little melancholy, and this association is also a cultural phenomenon that has been passed down through generations through phrases like “feeling blue.” Typically, darker and cooler blue shades can enhance feelings of loneliness and depression, and the English language has several phrases that link these emotions to the color blue. Often, the symptoms of postpartum depression are referred to as “baby blues,” and if you are feeling a little depressed about the imminent return to work after the weekend, you could be dreading a “blue Monday.” The Blue’s music genre was born out of the struggle of Black Americans fighting for their freedom from the remnants of slavery. Now that you know a little more about the most common associations of blue hues, it is time to dive into what colors make blue, and how to make blue paint that is perfect for your unique project. Two Broad Ways of Conceptualizing Color Theory For many of us, there is only one model of color theory that we use to mix different colors. This basic color theory includes the three primary shades, three secondary hues, and a range of tertiary colors. If we are to use this foundational color theory to make blue, we are only going to be able to create different shades of blue. The reason behind this is that blue is one of the primary hues, and according to this color theory, cannot be made by combining other shades. There is, however, another way to conceptualize color. The Cyan, Magenta, Yellow, and Black (CMYK) model of color is based on the system used by printers, and if you use this model of color theory, it is possible to make blue by combining different percentages of these four foundational shades. We will begin by considering how to make blue with the most well-known foundational color theory, and then go on to explore what colors make blue with the CMYK model. How to Make Blue Shades with Basic Color Theory When it comes to mixing different shades of blue in traditional color theory, the most important thing to be aware of is color bias. In order to understand color bias, we need to quickly discuss the fundamentals of the color wheel. Undoubtedly you will be familiar with the basic color wheel, which places blue, red, and yellow as the primary shades. Two primary shades will make a secondary hue. For example, you can create orange from a combination of yellow and red shades. Combining all three primary hues is typically avoided because the result is often muddy and slightly brown. The second important aspect of the color wheel is color temperature. Temperature determines the warmth or coolness of your colors, with red being the warmest shade and blue being the coolest. Whether a color leans more towards red or blue, is referred to as color bias. For example, a light green shade includes blue as one of its primary hues, and as a result, it leans towards blue and is a cooler shade. A vibrant orange, on the other hand, includes red as one of the fundamental shades, and as a result, is a warmer shade. Color temperature does not only apply to secondary shades, as different blue hues can be either warm or cool. You can tell the relative temperature of a blue shade by whether it seems more purple or more green. Blues with a hint of purple are warmer because they contain a tiny amount of red, while greener blues contain a tiny splash of yellow. In the next section, we are going to tell you how to make blue paint shades that are warm, cool, dark, light, and muted with a variety of different shades. We recommend grabbing a page of your sketchbook and the colors we mention so that you can create a record of what colors make blue. What Colors Make Blue Cool? When it comes down to it, the trick to making a blue cooler is simply to add a splash of green. The particular shade of green you use will determine your final cool blue hue. The two best green shades for cooling down blues are Veronese green and cadmium green. Veronese green is a bright and cool green, making it the perfect color for making cool blue hues. Because Veronese green is already a cool shade, it already leans towards light blue. If you mix Veronese green with ultramarine blue, the result will be a very cool and slightly darker blue shade. In contrast, if you are looking for a light and bright cool blue, try mixing Veronese green with cobalt blue. Cadmium green is a little warmer than Veronese green because it contains a touch of red. The result of combining cadmium green with ultramarine blue will be a slightly muted and cool shade of blue. The red in the ultramarine blue and the red in the cadmium green result in the combination containing all three primary shades, which as we know, makes the mixture a little muddier. In contrast, mixing cadmium green with cobalt blue will create a much lighter and brighter blue shade. What Colors Make Blue Warm? There are two primary colors that you can mix with a blue shade to make it warmer. The first is alizarin crimson, and the second is burnt sienna. The effect of each of these shades will differ, depending on the base blue shade you choose. If you are wanting to make a warm blue, we recommend beginning with a blue shade that is already quite warm. For our examples, we are using ultramarine blue which is a warmer blue, and cobalt blue, which is slightly cooler. Alizarin crimson is a very warm and slightly purple shade of red. Because alizarin crimson is slightly purple already, it means that it contains a little blue. This fact is important because if it were a warmer red that leans towards orange, it would contain some yellow, and by mixing it with blue your final color will be muddy. When you combine ultramarine blue and alizarin crimson, you will create a very dark and quite purple-blue shade. For a more vibrant yet equally warm blue, you can mix alizarin crimson with cobalt blue. Burnt sienna is another shade of red, but it is much darker and warmer than alizarin. As a result, you will create a much darker warm blue shade with a combination of ultramarine blue and burnt sienna. Burnt sienna is also a little cooler than alizarin crimson, so this combination will be a little cooler than the other one. What Colors Make Light Blue? Now that we have covered how to make blue warmer and cooler, you may want to know what colors make light blue shades. Making light blue hues is very simple. Adding a touch of white is the easiest and most common way to make your blue colors a little lighter. The combination of ultramarine blue and white is a lovely vibrant shade of cornflower blue. The addition of the white paint highlights the warm undertones. For a much brighter light blue, combine cobalt blue with a touch of white. Another, less common way to lighten a blue shade is to add a little yellow or light green. So, what color do blue and green make? The answer is a lighter shade of blue! If you choose to use this method, you will see that not only are you lightening your blue hue, you are also making it slightly cooler. The method you choose to use depends entirely on your desired outcome. What Colors Make Dark Blue? So, we know what colors make light blue, but what colors make dark blue? While there are only two real options for lightening blue shades, there are three options for darkening them. Depending on whether you want a dark muted blue, a warm dark blue, or a cool dark blue, you can use different colors. One of the best ways to darken a blue shade is to add a touch of dioxazine purple. The addition of this dark purple hue to ultramarine blue creates a very rich dark blue. Because dioxazine purple contains red pigments, it is likely to create a slightly muted dark blue when combined with cobalt blue. Burnt umber is another fantastic option for creating dark blue shades with both cobalt and ultramarine blue. Burnt umber will create a much more muted, almost brown dark blue shade because it contains a fair amount of red. If you want a very dark blue, then burnt umber is your best option. The final option you have for creating a dark blue shade is to add a combination of phthalo green and alizarin crimson to your blue shade. The combination of these two additional colors mimics the effects of burnt umber, and as a result, you will get similar effects. What Colors Make Blue Muted? Bright blue shades are wonderful colors to use in your paintings, but they are not suitable all the time. There is a natural variation in color in the world around us, and to create realistic depth and dimension in your paintings, you will need to create some muted shades of your chosen blue color. Without muted shades, things are a little garish. Muting colors is actually a very simple process. All you need to do is add a little splash of your chosen color’s complement. This is the color that sits directly opposite your chosen shade on the color wheel. For blue, the complement color is orange. Each unique blue shade will have its own unique orange complement, and you can experiment with these technicalities to find your perfect shades. Cadmium orange is a great option for muting blue shades because it is vibrant and very warm. The combination of cadmium orange and ultramarine blue is a very warm, dull, and dark shade of blue. Cadmium orange is also a great choice for muting cobalt blue, making it far less vibrant. Burnt umber is the other fantastic muting option for blue shades. Burnt umber is simply a darker orange shade, so it will make your blues much darker and more muted. How to Make Blue Shades with the CMYK Color Model The information we have covered so far is all based on the most traditional and simple theory of color. There is, however, an entirely different way of conceptualizing color. The CMYK model is the method that printers use to create color by combining different percentages of magenta, yellow, cyan, and black. Making blue with this model is incredibly easy! You can combine cyan and another shade to make blue. So, what colors make cyan turn into blue? The answer is magenta. You can use a combination of magenta and cyan to make a range of blue hues. Your final blue shade will depend on the ratio of these two colors. This is the answer to the question of what two colors make blue! How to Make Blue the Technical Way In this article, we have covered how to make blue paint in a variety of ways with different combinations of shades. Here, we present a table that outlines the technical details for making some of the most popular shades of blue. |Type of Blue||Blue Shade||HEX Code||RBG||CMYK| |Navy Blue||#000080||(0,0,128)||100%, 100%, 0%, 50%| |Denim Blue||#1560bd||(21,96,189)||(61%, 33%, 0%, 33%| |Oxford Blue||#002147||(0,33,71)||100%, 53.5%, 0%, 72.2%| |Egyptian Blue||#1034a6||(16,52,166)||90.4%, 68.7%, 0%, 34.9%| |Columbia Blue||#9bddff||(155,221,255)||39.2%, 13.3%, 0%, 0%| |Azure Blue||#007FFF||(0,127,255)||100%, 50.2%, 0%, 0%| |Turquoise||#40e0d0||(64,224,208)||71%, 0%, 7%, 12%| |Cobalt Blue||#0047ab||(0,71,171)||60%, 60%, 0%, 0%| |Baby Blue||#89CFF0||(137,207,240)||42.9%, 13.8%, 0%, 5.9%| |Cerulean Blue||#2a52be||(42,82,190)||98%, 10%, 0%, 20%| |Prussian Blue||#003153||(0,49,83)||100%, 41%, 0%, 67.5%| |Navy Blue||Navy blue is a lovely dark blue color. Often, the navy blue color is used to represent integrity, authority, and responsibility. You can use navy blue to give your paintings or illustrations a sense of class and sophistication.| |Denim Blue||Everyone has a loved piece of denim clothing, and the color makes a great addition to any palette. This denim shade is a very cool blue color, and it is widely considered to be one of the most popular colors in the fashion industry.| |Oxford Blue||If you thought navy blue was a regal shade, then you are going to be wowed by this dark royal blue color. This amazing blue shade includes both warm and cool hues, and it works wonderfully in conjunction with lighter colors. Oxford blue has a slight grey tinge and also a hint of purple. It is the perfect middle ground between a bright and dark color.| |Egyptian Blue||Egyptian blue is a cooler shade of royal blue that is instantly recognizable. This slightly warmer royal blue shade adorns many artifacts from ancient Egypt. Egyptian blue works very well alongside other bright colors like yellow and red. It also works perfectly with lighter, more pastel shades.| |Columbia Blue||If you are looking for a color that works just as well for the sky and the sea, look no further than Columbia blue. This stunning and vibrant blue shade is a combination of royal and light blue and is perfect for anyone who wants a slightly brighter navy blue.| |Azure Blue||Of all the blue shades, azure blue is most commonly used to represent the sky. This is the color of the summer sky in the brilliant heat. Azure blue is inviting and invigorating, and works very well with white, greys, and lighter color palettes.| |Turquoise||Turquoise is one of the most well-known shades of blue globally. Named after the jewel, this lighter blue hue pairs well with almost every color. Turquoise is perfect for capturing the lightest part of a wave, just below the sea foam. It is a bright and vibrant blue shade with a very calming appearance.| |Cobalt Blue||Cobalt blue is another very popular shade of blue. In fact, it is one of the most popular shades of blue sold around the world. Cobalt blue is named after the material originally used to color tile porcelain, and it is used by artists throughout the globe. Cobalt blue is a slightly warmer blue shade with hints of purple, and it is quite a deep blue hue. Cobalt blue is often found at the lower altitudes of a crystal clear sky, and it creates a sense of calm.| |Baby Blue||Baby blue is the perfect pastel blue shade. First used in the 1800s, baby blue is commonly used as the shade for gendered items of clothing. Baby blue is a very gentle shade and works well with other lighter pastel shades. Baby blue is cooler than other blue shades, leaning a little more towards green than purple.| |Cerulean Blue||Cerulean blue is one of the oldest shades of blue in the world. The name of this stunning blue shade comes from the first blue pigment, and the discovery of this pigment was a momentous moment in the history of color. Historically, this particular dye has been very expensive and difficult to find, as a result, it is now associated with luxury and riches.| |Prussian Blue||Prussian blue is another one of the most commonly used shades of blue. Any good set of acrylic or oil paints will certainly contain Prussian blue as one of the staple shades. This very dark and very cool shade was first made famous as the color of the uniforms of the Prussian army during the 17th and 18th centuries. Prussian blue pairs very well with other dark colors like black, and also white.| Frequently Asked Questions What Colors Make Cyan? If you use the RGB system, you can use a combination of green and blue. If, however, you want to know what colors make cyan with the CMYK model, then you can create cyan by removing red from grey. What Color Does Blue and Green Make? The answer depends on the ratio of each color. If you add a little green to blue, you are going to make a cooler shade of blue. If you add a little blue to green, you will simply make a cooler shade of green.
<urn:uuid:91c320cb-835c-4e22-9a2a-2125721a8f9e>
CC-MAIN-2022-33
https://artincontext.org/what-colors-make-blue/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00204.warc.gz
en
0.916679
4,045
3.0625
3
Source: Report of His Majesty's Commissioners for inquiring into the Administration and Practical Operation of the Poor Laws (1834), pp. 294-357. Transcribed and added by Marjie Bloy Ph.D., Senior Research Fellow, National University of Singapore. Jeremy Bentham's ideas of utilitarianism were influential in shaping government policies in the 1830s. One major piece of legislation of this period changed the means of poor relief that had been established by the 1601 Elizabethan Poor Law. This legislation had been modified in the interim by such further legislation as the 1662 Settlement Laws, Gilbert's Act (1782) and the implementation of the Speenhamland System after 1795. The 1834 Poor Law Amendment Act is an excellent example of Benthamite Utilitarianism run mad, not least through the concept of some kind of central control for as much government administration as possible. This extract details the recommendations of the Royal Commission. It is interesting to note that the Central Board was seeking approval for executive powers without having to have recourse to parliament. Effectively, the Central Board was able to do much as it wished without any form of control from outside. itnesses, when speaking of the necessity of withdrawing all discretionary power from the distributors in their own parishes, usually express a hope that the relief may be fixed, and to the 'smallest detail unalterably prescribed by the legislature'. The evidence, however, proves that little more reliance can be placed on the voluntary execution by the present agency of any regulations, than on their correct execution of any general principle of management prescribed to them. It appears, too, that the actual condition of the pauperised districts does not admit of legislation in detail. The differences in administering the law in different districts have produced habits and conditions of the population equally different. The best-informed witnesses have represented that the measures applicable to adjacent districts are totally inapplicable to their own; and it appears to us, that measures which might be safely and beneficially introduced into the majority of parishes in a district might, if immediately introduced, be productive of suffering and disorder to the remainder. Even if the simultaneous and complete execution of so great a change of system throughout the country were practicable, we consider it desirable to avoid it. It must be remembered that the pauperised labourers were not the authors of the abusive system, and ought not to be made responsible for its consequences. We cannot, therefore recommend that they should be otherwise than gradually subjected to regulations which, though undoubtedly beneficial to themselves, may, by any sudden application, inflict unnecessary severity. The abuses have grown up in detail, and it appears from our evidence that the most safe course will be to remove them in detail. We deem uniformity essential; but, in the first instance, it is only an approximation to uniformity that can be expected, and it appears that it must be obtained by gradations in detail, according to local circumstances. And although uniformity in the amount of relief may be requisite, it may not be requisite that the relief should be invariably the same in kind. In Cumberland, and some others of the northern counties, milk is generally used where beer is used in the southern counties. The requisite equality in diet would probably be obtainable without forcing any class of the inmates of the workhouses in the northern counties to take beer, or those of the southern counties to take milk... By many it is considered that the only means by which the system can be effectually amended, is the management of the whole poor law administration as a branch of the general government. The advocates of a national rate, and those who are willing and desirous that the Government should take upon itself the whole distribution of the funds for the relief of the poor, do not appear to have considered the expense and difficulties in the way of obtaining such an agency throughout the country. We have received no definite plan for the purpose, and have prepared none. We trust that immediate measures for the correction of the evils in question may be carried into effect by a comparatively small and cheap agency, which may assist the parochial or district officers, wherever their management is in conformity to the intention of the legislature; and control them wherever their management is at variance with it. Subject also to this control, we propose that the management, the collection of the rates, and the entire supervision of the expenditure, under increased securities against profusion and malversation [corrupt practises by someone in a position of trust], shall continue in the officers appointed immediately by the rate payers. This course, we believe, will be the most easily practicable, and will best accord with the recommendations of the majority of the witnesses, and with the prevalent expectation of the country. The course of proceedings which we recommend for adoption, is in principle that which the legislature adopted for the management of the savings' banks, the friendly societies, and the annuity societies throughout the country. Having prescribed the outline and general principles on which those institutions should be conducted, a special agency was appointed to see that their rules and detailed regulations conformed to the intention of the law. This agency, we believe, has accomplished the object effectually. ... We recommend, therefore, the appointment of a Central Board to control the administration of the poor laws, with such Assistant Commissioners as may be found requisite; and that the Commissioners be empowered and directed to frame and enforce regulations for the government of workhouses, and as to the nature and amount of the relief to be given and the labour to be exacted in them, and that such regulations shall, as far as may be practicable, be uniform throughout the country. [The members of the Poor Law Commission then itemised their recommendations. Each item was prefaced by 'We recommend, therefore ...'. This has been omitted in the following transcript and individual recommendations have been bullet-pointed for ease of reading] We recommend, therefore, - that the Central Board by empowered and required to take measures for the general adoption of a complete, clear and, as far as may be practicable, uniform system of accounts - that the Central Board by empowered to incorporate parishes for the purpose of appointing and paying permanent officers, and for the execution of works of public labour - that the Central Board be directed to state the general qualifications which shall be necessary to candidates for paid offices connected with the relief of the poor, to recommend to parishes and incorporations proper persons to act as paid officers, and to remove any paid officers whom they shall think unfit for their situations - that the Central Board be empowered to direst the parochial consumption to be supplied by tender and contract, and to provide that the competition be perfectly free - that under regulations to be framed by the Central Board, parishes be empowered to treat any relief afforded to the able-bodied, or to their families, and any expenditure in the workhouses, or otherwise incurred on their account, as a loan, and recoverable not only by the means given by [the 1819 Act to Amend Laws for the relief of the Poor], but also be attachment of their subsequent wages... - that the Central Board be empowered to make such regulations as they shall think fit respecting the relief to be afforded by apprenticing children, and that at a future period, when the effect of the proposed alterations shall have been seen, the Central Board by required to make a special inquiry into the operation of the laws respecting the apprenticing children at the expense of parishes, and into the operation of the regulations in that respect which the Board shall have enforced - that the Central Board be empowered and directed to frame and enforce regulations as to the relief to be afforded to vagrants and discharged prisoners - that the Board be required to submit a Report annually, to one of Your Majesty's Principal Secretaries of State, containing - an account of their proceedings - any further amendments which they may think it advisable to suggest - the evidence on which the suggestions are founded - Bills carrying those amendments (if any) into effect, which Bills the Boards shall by empowered to prepare with professional assistance - that the Central Board be empowered to appoint and remove their Assistants and all their subordinate officers - that settlement by hiring and service, apprenticeship, purchasing or renting a tenement, estate, paying rates, or serving in an office, be abolished - that (subject to the obvious exceptions of persons born in prisons, hospitals, and workhouses) the settlement of every legitimate child born after the passing of the intended Act, follow that of the parents, or surviving parent: and that at the age of sixteen years, or the death of its surviving parent, such child shall be considered settled in the place in which it was born - that whenever there shall be any question regarding the settlement by birth of a person, whether legitimate or illegitimate, and whether born before or after the passing of the intended Act [there was no registration of births, marriages and deaths until 1837], the place where such person, by the register of his or her birth or baptism or otherwise, to have existed, shall be presumed to have been the place of his or her birth, until the contrary shall be proved - that the general rule shall be followed, as far i it is possible, and that every illegitimate child born after the passing of the Act, shall, until it attain the age of sixteen, follow its mother's settlement - that the mother of an illegitimate child born after the passing of the Act, be required to support it, and that any relief occasioned by the wants of the child be considered relief afforded to the parent - that the same liability be extended to her husband ... - that the vestry of each parish be empowered to order the payment out of the rates raised for the relief of the poor, of the expenses of the emigration of any persons having settlements within such parish, who may be willing to emigrate; provided, that the expense of each emigration be raised and paid, within a period to be mentioned in the Act Last modified 12 November 2002
<urn:uuid:b09053a6-43e9-48d5-b6e4-4ad65c0a233a>
CC-MAIN-2022-33
https://www.victorianweb.org/victorian/history/poorlaw/central.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00603.warc.gz
en
0.970773
2,060
2.765625
3
As the 2022 federal election creeps ever closer, we are reminded that the facts and the science often get trumped by political spin and well… complete crap. Our experts have laid out the leading furphies we’ve seen in this federal election campaign – and likely to encounter again – around climate. Use this tool to cut through the crap, and find the facts. What can I do if I come across dubious claims? There are several things you can do to counter misinformation or false claims: - If you see it in the comments section of a social media post, you can politely correct the original poster and link to an original source (linking back here would be helpful!). We’ve listed some handy points for commenting below. - Likewise if it’s a claim published in a news article, you can directly comment on the article online. It’s always good to cite a source. - If you hear it during a live media interview on radio or television, Twitter can be a good place to post a correction in a timely way that grabs the outlet’s attention – be sure to tag whomever made the claim and the media outlet that broadcast it. You might also like to tag a fact checking service (see below). - Write a letter to the editor. Most news websites have an email address or form to submit a letter to the editor in the ‘Contact Us’ section of their website. To maximise the chances of your letter being published: keep it below 200 words and make sure you include reliable source links for statements, your full name and address, and a subject line which clearly articulates your view. If you are responding to something you’ve read in their publication make sure you reference the article headline and the publication date. #1 – “Gas is cleaner than coal” “Our gas industry is incredibly important for mining and manufacturing. Queensland Premier Annastacia Palaszczuk. Gas is a polluting fossil fuel – just like coal and oil. In fact, the main component of gas, methane, is a greenhouse gas nearly 100 times more potent than carbon dioxide in the short term. Gas is extracted from deposits in the ground and then burned for energy by households and industry. Even before it is used by households or industry, gas causes climate harm. Along the entire gas supply chain large quantities of methane and carbon dioxide are added to the atmosphere, known as “fugitive emissions”. Hardly any of these fugitive emissions are officially counted, which hides just how polluting gas is. To make matters worse, gas is also directly harmful to our health. Cooking with gas is estimated to be responsible for up to 12% of the burden of childhood asthma in Australia. #2 – “All hydrogen is clean hydrogen” “Queensland has great potential to become a clean hydrogen-producing powerhouse, with its access to local low-cost gas, carbon capture opportunities and renewables potential,” The Honorable Angus Taylor MP, Minister for Industry, Energy and Emissions Reduction. “Clean hydrogen” is being bandied around in relation to all types of hydrogen – including the type produced from fossil fuels – which is misleading. Hydrogen can be a clean and viable solution, but be aware that not all hydrogen is produced the same way. Most hydrogen is still created using fossil fuels, and therefore is adding to the climate problem. Only renewable hydrogen (otherwise referred to as ‘green’ hydrogen) is a clean and viable solution because it is produced with renewable electricity. Any other type of hydrogen is still polluting. Find out more about hydrogen here. #3 – “Carbon Capture and Storage is a good climate solution” “If it is going to be a coal-fired power station that is much lower in emissions because we’re actually employing carbon capture and storage technology, then why wouldn’t we support that?” The Honorable Bridget McKenzie, Minister for Infrastructure, Transport and Regional Development When it’s paired with coal or gas production, Carbon Capture and Storage (CCS) only serves to prolong the life of polluting fossil fuels in our energy system. CCS isn’t a new concept and since that time it’s done very little good, and much evil. It was first used in 1972 to extract oil in a process known as ‘enhanced oil recovery’, which now accounts for almost three-quarters (72%) of all CCS projects (IEEFA 2022). Australia has thrown more than $4 billion in public money at this flawed technology, and plans to spend another $85 million on top of that despite two decades worth of failings in the Australian industry and nothing to show for it. Perhaps the greatest and most expensive failure of CCS is the largest project of its kind in the world – Gorgon in Western Australia. Gorgon was supposed to capture just over 12 million tonnes of emissions per year by 2021. However, the project only captured just under 5 million tonnes, or about 12 per cent of the project’s total emissions. Just like Gorgon, CCS more broadly has been a big, expensive failure. Find out more about Carbon Capture and Storage. Find the Australian Institute’s Carbon Capture Storage Report here. #4 – “Australia’s emissions have fallen more than those of other countries” Prime Minister Scott Morrison and other senior Ministers in the Liberal-National Government have repeatedly and misleadingly claimed that Australia’s emissions have fallen more than those of Canada, New Zealand, the United States and Japan since 2005. The Climate Council has meticulously researched this claim and found it to be untrue. The Government purposely chose data from 2005 to justify this statement because incredibly high rates of land clearing in Australia in that year meant that emissions were similarly high. The data used to justify this statement is from a year in which there were incredibly high rates of land clearing in Australia. This means the data in the base year is abnormally high and therefore becomes a flattering metric when compared against future years. If you take land clearing out of the measurement, it’s plain as day that Australia has actually increased its overall emissions by 4% and compares very poorly to all other developed countries. #5 – “We’re committed to Net Zero by 2050” “Our new official target, of reaching net zero emissions by 2050, our plan, gets the balance right – it is not a revolution, but a careful evolution” The Honourable Scott Morrison, Prime Minister of Australia. The Morrison Government’s own modelling fails to get Australia to net zero by 2050. In fact, when the Climate Council scrutinised the plan, it found deep flaws including the fact that emissions would only be cut by up to 85 per cent by 2050. On top of that, the Government does not have any effective policy mechanisms in place to actually reduce emissions, and explicitly relies on other actors (such as state and territory governments) to be doing so. Not to mention factoring in technologies that don’t yet exist, and may never exist. That’s one hell of a gamble. The central logic of the work – and its associated modelling – is that corporations will voluntarily, and with no pressure or incentives from the Federal Government, will magically begin to pay a carbon price. Read about how the net zero by 2050 modelling fails to meet the government’s own goals here. Find an in depth report about the years of potential action we’ve already lost here. #6 – “A sneaky carbon tax” The “tax” they’re referring to is known as ‘The Safeguard Mechanism’. This policy was introduced by the Coalition Government, and remains a policy of the Morrison Government. The Safeguard Mechanism was created by former Environment Minister Greg Hunt for the Liberal-National Party and was introduced under then-Prime Minister Tony Abbottt. It was legislated in 2014 as part of what was then known as the Coalition’s “direct action” policy. The policy was intended to set emission limits for some of the highest emitting facilities in Australia and the mechanism has long been criticised as ineffective. The main reason it has attracted criticism is because companies that have exceeded their baselines have never been penalised by the Clean Energy Regulator. Labor’s plan would set, enforce, and gradually reduce limits on Australia’s 215 biggest carbon polluters, which in total emit 140 million tonnes of greenhouse gas emissions – or 28 per cent of Australia’s total emissions. Find The Australian Conservation Federation’s breakdown of the safeguard mechanism here. #7 – “Coal and gas power keep prices low” “I’m putting my money where my mouth is by announcing this new [coal-fired power] station so we can power Queensland and help bring down energy costs which continue to escalate,” Clive Palmer, Leader of the United Australia Party. There has been a lot said about rising electricity prices this election campaign, and most of it is wrong. We cannot stress this enough: CSIRO’s GenCost report shows that renewable energy is the cheapest form of electricity generation, and will only continue to get cheaper. In 2021, electricity was the cheapest it had been in almost a decade nationally thanks to wind and solar. In Australia’s largest grid, the National Electricity Market (NEM), as more wind and solar comes online the price of electricity is declining. That makes sense because it means we need to rely less on fossil fuels like coal and gas, which are not only polluting but also have higher running costs. In fact, due to expensive and polluting fossil fuel generation, wholesale electricity prices in the NEM averaged $87 per megawatt-hour (MWh) for the first quarter of 2022, which is up a whopping 141% compared to the first quarter of 2021. Skyrocketing wholesale prices are being driven by increased demand, coal generator outages, and higher electricity-generation fuel costs. By far, gas is the most expensive form of power in Australia, and the more we rely on it the more it drives up costs for households, business and industry. Luckily the role of gas in our grid is dwindling due to the expensive and volatile nature of gas. In 2021, gas supply dropped to its lowest level in more than 15 years, providing less than 6 percent of the NEM’s power. In comparison, renewable energy supplied five times more power than gas in our largest grid last year. Read about how renewables are already providing more power than gas here. See the numbers in AEMO’s Quarterly Energy Dynamics reports detailing market dynamics, trends and outcomes in Australia’s electricity and gas markets. #8 – “Renewables will cost jobs” “Transition translates to unemployment.” The Honourable Barnaby Joyce, Deputy Prime Minister of Australia. This is patently untrue. A chorus of economic experts and leading business voices say the exact opposite is true: renewables create jobs and vast economic opportunities (with the facts and figures to back it up). The Business Council of Australia says a 46-50% emissions reduction by 2030 would add $890 billion to the economy and create 195,000 jobs over the next 50 years, particularly in regional areas (ABC 2021). Other experts agree: - The Climate Council and AlphaBeta have calculated that 76,000 new jobs could be created in under three years by policy changes addressing climate change and the recovery from the COVID-19 pandemic. - Accenture, a global consulting firm, found that a clean export industry could create 395,000 jobs and add $89 billion to the economy in 2040 – both numbers being higher than the current contribution of the fossil fuel industry. - Major consultant EY, in a report commissioned by the World Wildlife Fund, showed that a renewable led recovery post-COVID would create over 100,000 direct jobs. In fact, acting on climate change is crucial if we want to safeguard our economy. With a host of countries and regions, including the European Union, setting strong emissions reduction targets, there is a risk that Carbon Border Adjustment Mechanisms may be introduced against Australia if we do not take similar measures. This means other countries could very well decide to apply tariffs to our high-emitting products, which could shave $12.5 billion from the economy every year and risk tens of thousands of jobs, particularly in New South Wales and Queensland. When there is so much to gain economically from taking decisive climate action, why would we risk economic ruin? Read ABC’s article: Business Council of Australia calls for ambitious short-term carbon emissions reduction target Find the Climate Council’s Clean Jobs Plan The World Wildlife Foundation’s Renewable recovery plan. Our report on the economic costs of Australia’s Climate Inaction. #9 – “Renewables don’t work when sun doesn’t shine and wind doesn’t blow” “When the wind doesn’t blow and the sun doesn’t shine you need a gas-fired power plant to make up that difference to keep the lights on and prices down,” – Australia’s Prime Minister Scott Morrison. It also doesn’t rain all the time – but we’ve worked out how to ensure we have a constant supply of water. Engineers and scientists have worked out the answers to this. First, just because the wind isn’t blowing in your area, doesn’t mean it’s not blowing elsewhere. Australia is a big country after all! In fact, as more wind and solar power is added to an electricity grid, and spread out over a wider geographic area, wind and solar become more and more predictable, and reliable. This is because weather systems move across landscapes, bringing changing wind and cloud conditions that we are now very good at forecasting and monitoring. Two, there are plenty of storage technologies that can save electricity when supply is high and demand is low, and release it during periods of higher demand and lower supply. Like water storages and tanks do for rain. This is particularly true for grid-scale batteries, which have been doing an excellent good job in stabilising our changing grid. In fact, batteries are much better at doing this in a modern grid than outdated fossil fuel power stations because they can automatically respond to disturbances in the supply of energy in a matter of milliseconds. Find out more about battery storage here. #10 – “What Australia does on climate change won’t make any difference.” “There’s no action by Australia that’s going to change the temperature of the globe at all.”- Australia’s Leader of the National Party Barnaby Joyce This is a false claim. Australia is actually a fossil fuel heavyweight, so what we do makes a world of difference. Last year, Australia was the world’s largest liquefied gas exporter (21% of international trade), the world’s largest steel-making coal exporter (55%) and the world’s second largest electricity-generating coal exporter (21%). That’s a bloody lot of climate pollution – none of which is counted in our national emissions, which are also very high. It’s no surprise that Australia has been rightly singled out by the United Nations Secretary General as a ‘holdout’ on global climate action. Instead, we could be playing a role in helping the entire world rapidly decarbonise. The Glasgow Climate Pact is clear in requiring the next Australian government to return to the negotiating table at the next United Nations climate talks with a stronger 2030 national emission reduction target. But why stop there? It’s in our national interests to see the world decarbonise as quickly as possible so that we avoid catastrophic levels of climate damage. Australia could be leading the way, and helping all other countries (particularly those still developing) follow suit by producing the technologies and clean exports that everyone needs. Find our Lost Years Report here. How to answer the argument that Australias emissions are too small to make a difference.
<urn:uuid:d8df58dc-d838-4b82-9375-73b693172e7a>
CC-MAIN-2022-33
https://www.climatecouncil.org.au/resources/2022-federal-election-climate-crap-checker/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570827.41/warc/CC-MAIN-20220808122331-20220808152331-00604.warc.gz
en
0.946436
3,404
2.578125
3
Part 1 By Ado Paglinawan The Americans got us so busy with their wars and the West Philippine Seas, we forgot about our territory south of the Sulu Archipelago. On January 2, 1930 the United States made sure North Borneo will not be in our consciousness when they signed with their cousins the British, the Convention Treaty. The Convention was an agreement between the governments of the United Kingdom and the United States to definitely delimit the boundary between North Borneo (then a British protectorate) and the Philippine archipelago (then a U.S. Territory). This is the third colonial treaty that defines the territorial boundaries of the Philippines: More familiar are first, the Treaty of Peace Between the United States of America and the Kingdom of Spain, on December 10, 1898, known as Treaty of Paris; and second, the Treaty Between the Kingdom of Spain and the United States of America for Cession of Outlying Islands of the Philippines on November 7, 1900, known as the Treaty of Washington. From the top of its pyramid, the United States knew very well what it should do so it doesn’t lose control of its former colonies. Those below only sees what the Americans want us to see rendering us blindsided to geopolitical implications, mostly the ones with long term effects. In an effective way, the Convention Treaty of 1930 drew a curtain so that there were almost no one besides the Americans, the British and the Sultanate who could have possibly weighed whatever disadvantages to the Philippines the colonials have prepositioned. I learned from the book Macapagal the Incorruptible by Quentin Reynolds and Geoffrey Bocca, that Vice President and Foreign Secretary Elpidio Quirino had just taken his oath of office succeeding President Manuel Roxas after the latter suffered a heart attack on April, 1948, when he summoned Diosdado Macapagal to represent the country in the transfer of the Turtle Islands from Great Britain to the Philippines. The book said “The Turtle Island had been (part of a lease) to the British North Borneo Company by the Sultan of Sulu in 1878 and had never been part of the British Empire… lack of British influence (in the Philippines) created a serious psychological hiatus…All the Philippines knows about the British have come from the United States in an image filtered from East Coast to West Coast. “Fearful tales of the diabolical cunning of the British at the conference table had been handed down to the Filipinos by the Americans for two generations. Quirino had personal reasons for distrusting the British.” Quirino had gone to London in 1947 to negotiate a treaty of mutual friendship. The British sent a minor official to deal with him. As vice-president, Quirino feeling this was an insult, walked out. But in Sandakan, North Borneo, the British negotiator received Macapagal with equity, and soon the Union Jack was lowered and the flag of the Philippine Republic was victoriously hoisted in its place in the Turtle Islands. In the ensuing discussions, however, Macapagal went deeply into the legal history involving the Turtle Islands and it was only then that the Philippine side became aware that the Sultan of Sulu has leased North Borneo to Baron de Overbeck and Alan Dect, who were British citizens, for a pittance of an annual rental then equivalent to five thousand three hundred US dollars, as padjak or lease. The British knew the heirs of the Sultan were Filipinos. But the British has precisely schemed earlier with the Americans on what to do with North Borneo as they conspired in the Convention Treaty as early as 1930, so sixteen years after in 1946, the British government annexed the territory despite the fact that it was a commercial transaction. Macapagal found the hard way that North Borneo, like the Turtle Islands, are historically and legally part of the Philippines but he could not do anything about it until after his election as president in 1961. So, in June 1962 he filed an Aide Memoire addressed to the United Kingdom as successor-in-interest of the Sultanate of Sulu. Initial diplomatic gains and upset Since then, there have been a lot of hemming and hawing. President Macapagal tasked his vice-president and concurrent foreign affairs secretary Emmanuel Pelaez to move diplomacy forward to pursue the claim. Ingeniously laid-out legal and historical bases were submitted to the United Nations General Assembly. A conference was held from June 7 to 11, 1963 in Manila among the foreign ministers of Indonesia, Malaysia and the Philippines that came out with the Manila Accord of 1963. The Accord provided that the inclusion of North Borneo and the “State” of Sabah in the Federation of Malaysian States was subject to and would not affect international law and the principle of peaceful settlement of disputes. The three countries also agreed to settle the claim in a just and expeditious manner through negotiation, conciliation, arbitration, judicial settlement, or any peaceful means the parties would choose in conformity with the UN Charter and the Bandung Declarations. Meanwhile Malaysia assumed the colonial lease obligations from the British but converted it to only 5,300 Malaysian ringgits. The next public milestone would be Senator Benigno Aquino’s hoax exposing an alleged “Jabidah massacre” concerning an alleged murder in Corregidor Island on March 18, 1968 of twenty-four Tausug recruits purportedly being trained by the Philippine military to infiltrate Sabah and foment an uprising there against the Malaysian government. Aquino would later discredit his own report in the floor of the Senate, but an unintended horrible consequence – this would unsettle the Malaysians giving them the casus belli to fund, train and support Nur Misuari’s Moro National Liberation Front, actually a secessionist uprising in Mindanao, whose ramifications are still unsolved to this day and age. For one, the Tripoli Agreement between the Philippine government and the MNLF, still has to be correctly enforced. But that is another matter altogether. Lahad Datu Reset a New Turn of Events The next important development occurred on February 11, 2013 when 235 Tausug militants, some of whom were armed, arrived by boats in Lahad Datu, Sabah, Malaysia from Simunul island, Tawi-Tawi in the southern Philippines. The group, calling themselves the “Royal Security Forces of the Sultanate of Sulu and North Borneo”, was sent by Jamalul Kiram III, one of the claimants to the throne of the Sultanate of Sulu. Kiram stated that their objective was to assert the unresolved territorial claim of the Philippines to eastern Sabah (the former North Borneo). Malaysian security forces surrounded the village of Tanduo in Lahad Datu where the group had gathered. Known as the “Lahad Datu standoff” it saw a total of 68 deaths – 56 from the Sulu sultanate, nine from the Malaysian authorities and six civilians. Piqued by the standoff, the Malaysia unilaterally terminated the colonial agreement it assumed from the British and stopped rental payments to the Sultanate of Sulu in 2013. On April 28, 2017, the Sulu claimants wrote to Malaysia to seek renegotiation of the 1878 deal, which they said was now “unbalanced” after rich natural resources were found in Sabah. The Sulu claimants said the “game-changing” discovery of petroleum gave Malaysia massive revenue which could not be foreseen when the 1878 deal was signed, and said such revenue for Sabah was about 20 million times more than the RM5,300 annual sum. Malaysia did not respond to this letter. On November 2, 2017, eight individuals — Nurhima Kiram Fornan, Fuad A. Kiram, Sheramar T. Kiram, Permaisuli Kiram-Guerzon, Taj-Mahal Kiram-Tarsum Nuqui, Ahmad Nazard Kiram Sampang, Jenny K.A. Sampang, Widz-Raunda Kiram Sampang — began their bid as heirs of the Sulu sultan to enforce the lease. They are the genuine descendants of the nine heirs to the Sultanate of Sulu that have been officially designated by Brigadier Charles Frederick Cunningham Macaskie CMG, the first Chief Justice of North Borneo in a 1939 decision by the British High Court in Sandakan. Basically, they wanted Malaysia to pay them more than the RM5,300 sum agreed back in 1878 and 1903 by the Sulu sultans for the lease of Sabah. They served official notice informing the Malaysian Embassy in Madrid, Spain of their intention to start an arbitration. They applied on February 1, 2018 for the Spanish courts to appoint an arbitrator. The High Court in Madrid on March 29, 2019 agreed to appoint an arbitrator, and on May 22, 2019 appointed Gonzalo Stampa as the sole arbitrator. On July 30, 2019, the eight claimants filed their notice of arbitration, seeking for the 1878 deal’s rebalancing and for compensation which would “more fairly” reflect its value. Alternatively, the eight claimants wanted the 1878 agreement to be terminated and for Malaysia to pay compensation, if the deal is not rebalanced. In a statement of claim filed on June 20, 2020, the eight claimants claimed as much as US$32.2 billion from Malaysia if the 1878 agreement was terminated. A Financial Times report while bullish that Malaysia would prevail, said the legal fight will require a lot of resources: “It’s a matter of how much Malaysia is willing to settle for or will they fight in every jurisdiction where [the Sulu heirs] could file a seizure of assets.”
<urn:uuid:02762f0a-069f-4b56-95db-3e00ff06d956>
CC-MAIN-2022-33
https://asiancenturyph.com/2022/08/03/bangsa-suluk-rising-colonials-deflecting-us-from-issues-of-national-urgency/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00004.warc.gz
en
0.959933
2,107
2.921875
3
In geometry, a coordinate system is a system that uses one or more numbers, or coordinates, to uniquely determine the position of the points or other geometric elements on a manifold such as Euclidean space. The order of the coordinates is significant, and they are sometimes identified by their position in an ordered tuple and sometimes by a letter, as in "the x-coordinate". The coordinates are taken to be real numbers in elementary mathematics, but may be complex numbers or elements of a more abstract system such as a commutative ring. The use of a coordinate system allows problems in geometry to be translated into problems about numbers and vice versa; this is the basis of analytic geometry. Common coordinate systems The simplest example of a coordinate system is the identification of points on a line with real numbers using the number line. In this system, an arbitrary point O (the origin) is chosen on a given line. The coordinate of a point P is defined as the signed distance from O to P, where the signed distance is the distance taken as positive or negative depending on which side of the line P lies. Each point is given a unique coordinate and each real number is the coordinate of a unique point. Cartesian coordinate system The prototypical example of a coordinate system is the Cartesian coordinate system. In the plane, two perpendicular lines are chosen and the coordinates of a point are taken to be the signed distances to the lines. In three dimensions, three mutually orthogonal planes are chosen and the three coordinates of a point are the signed distances to each of the planes. This can be generalized to create n coordinates for any point in n-dimensional Euclidean space. Depending on the direction and order of the coordinate axes, the three-dimensional system may be a right-handed or a left-handed system. This is one of many coordinate systems. Polar coordinate system Another common coordinate system for the plane is the polar coordinate system. A point is chosen as the pole and a ray from this point is taken as the polar axis. For a given angle θ, there is a single line through the pole whose angle with the polar axis is θ (measured counterclockwise from the axis to the line). Then there is a unique point on this line whose signed distance from the origin is r for given number r. For a given pair of coordinates (r, θ) there is a single point, but any point is represented by many pairs of coordinates. For example, (r, θ), (r, θ+2π) and (−r, θ+π) are all polar coordinates for the same point. The pole is represented by (0, θ) for any value of θ. Cylindrical and spherical coordinate systems There are two common methods for extending the polar coordinate system to three dimensions. In the cylindrical coordinate system, a z-coordinate with the same meaning as in Cartesian coordinates is added to the r and θ polar coordinates giving a triple (r, θ, z). Spherical coordinates take this a step further by converting the pair of cylindrical coordinates (r, z) to polar coordinates (ρ, φ) giving a triple (ρ, θ, φ). Homogeneous coordinate system A point in the plane may be represented in homogeneous coordinates by a triple (x, y, z) where x/z and y/z are the Cartesian coordinates of the point. This introduces an "extra" coordinate since only two are needed to specify a point on the plane, but this system is useful in that it represents any point on the projective plane without the use of infinity. In general, a homogeneous coordinate system is one where only the ratios of the coordinates are significant and not the actual values. Other commonly used systems Some other common coordinate systems are the following: - Curvilinear coordinates are a generalization of coordinate systems generally; the system is based on the intersection of curves. - The log-polar coordinate system represents a point in the plane by the logarithm of the distance from the origin and an angle measured from a reference line intersecting the origin. - Plücker coordinates are a way of representing lines in 3D Euclidean space using a six-tuple of numbers as homogeneous coordinates. - Generalized coordinates are used in the Lagrangian treatment of mechanics. - Canonical coordinates are used in the Hamiltonian treatment of mechanics. - Barycentric coordinate system as used for ternary plots and more generally in the analysis of triangles. - Trilinear coordinates are used in the context of triangles. - The Whewell equation relates arc length and the tangential angle. - The Cesàro equation relates arc length and curvature. Coordinates of geometric objects Coordinates systems are often used to specify the position of a point, but they may also be used to specify the position of more complex figures such as lines, planes, circles or spheres. For example, Plücker coordinates are used to determine the position of a line in space. When there is a need, the type of figure being described is used to distinguish the type of coordinate system, for example the term line coordinates is used for any coordinate system that specifies the position of a line. It may occur that systems of coordinates for two different sets of geometric figures are equivalent in terms of their analysis. An example of this is the systems of homogeneous coordinates for points and lines in the projective plane. The two systems in a case like this are said to be dualistic. Dualistic systems have the property that results from one system can be carried over to the other since these results are only different interpretations of the same analytical result; this is known as the principle of duality. There are often many different possible coordinate systems for describing geometrical figures. The relationship between different systems is described by coordinate transformations, which give formulas for the coordinates in one system in terms of the coordinates in another system. For example, in the plane, if Cartesian coordinates (x, y) and polar coordinates (r, θ) have the same origin, and the polar axis is the positive x axis, then the coordinate transformation from polar to Cartesian coordinates is given by x = r cosθ and y = r sinθ. With every bijection from the space to itself two coordinate transformations can be associated: - Such that the new coordinates of the image of each point are the same as the old coordinates of the original point (the formulas for the mapping are the inverse of those for the coordinate transformation) - Such that the old coordinates of the image of each point are the same as the new coordinates of the original point (the formulas for the mapping are the same as those for the coordinate transformation) For example, in 1D, if the mapping is a translation of 3 to the right, the first moves the origin from 0 to 3, so that the coordinate of each point becomes 3 less, while the second moves the origin from 0 to −3, so that the coordinate of each point becomes 3 more. Coordinate lines/curves and planes/surfaces In two dimensions, if one of the coordinates in a point coordinate system is held constant and the other coordinate is allowed to vary, then the resulting curve is called a coordinate curve. If the coordinate curves are, in fact, straight lines, they may be called coordinate lines. In Cartesian coordinate systems, coordinates lines are mutually orthogonal, and are known as coordinate axes. For other coordinate systems the coordinates curves may be general curves. For example, the coordinate curves in polar coordinates obtained by holding r constant are the circles with center at the origin. A coordinate system for which some coordinate curves are not lines is called a curvilinear coordinate system. This procedure does not always make sense, for example there are no coordinate curves in a homogeneous coordinate system. In three-dimensional space, if one coordinate is held constant and the other two are allowed to vary, then the resulting surface is called a coordinate surface. For example, the coordinate surfaces obtained by holding ρ constant in the spherical coordinate system are the spheres with center at the origin. In three-dimensional space the intersection of two coordinate surfaces is a coordinate curve. In the Cartesian coordinate system we may speak of coordinate planes. Similarly, coordinate hypersurfaces are the (n − 1)-dimensional spaces resulting from fixing a single coordinate of an n-dimensional coordinate system. The concept of a coordinate map, or coordinate chart is central to the theory of manifolds. A coordinate map is essentially a coordinate system for a subset of a given space with the property that each point has exactly one set of coordinates. More precisely, a coordinate map is a homeomorphism from an open subset of a space X to an open subset of Rn. It is often not possible to provide one consistent coordinate system for an entire space. In this case, a collection of coordinate maps are put together to form an atlas covering the space. A space equipped with such an atlas is called a manifold and additional structure can be defined on a manifold if the structure is consistent where the coordinate maps overlap. For example, a differentiable manifold is a manifold where the change of coordinates from one coordinate map to another is always a differentiable function. In geometry and kinematics, coordinate systems are used to describe the (linear) position of points and the angular position of axes, planes, and rigid bodies. In the latter case, the orientation of a second (typically referred to as "local") coordinate system, fixed to the node, is defined based on the first (typically referred to as "global" or "world" coordinate system). For instance, the orientation of a rigid body can be represented by an orientation matrix, which includes, in its three columns, the Cartesian coordinates of three points. These points are used to define the orientation of the axes of the local system; they are the tips of three unit vectors aligned with those axes. The Earth as a whole is one of the most common geometric spaces requiring the precise measurement of location, and thus coordinate systems. Starting with the Greeks of the Hellenistic period, a variety of coordinate systems have been developed based on the types above, including: - Geographic coordinate system, the spherical coordinates of latitude and longitude - Projected coordinate systems, including thousands of cartesian coordinate systems, each based on a map projection to create a planar surface of the world or a region. - Geocentric coordinate system, a three-dimensional cartesian coordinate system that models the earth as an object, and are most commonly used for modeling the orbits of Satellites, including the Global Positioning System and other Satellite navigation systems. - Absolute angular momentum - Alphanumeric grid - Axes conventions in engineering - Celestial coordinate system - Fractional coordinates - Frame of reference - Galilean transformation - Grid reference - Nomogram, graphical representations of different coordinate systems - Reference system - Rotation of axes - Translation of axes Relativistic coordinate systems - Woods p. 1 - Weisstein, Eric W. "Coordinate System". MathWorld. - Weisstein, Eric W. "Coordinates". MathWorld. - Stewart, James B.; Redlin, Lothar; Watson, Saleem (2008). College Algebra (5th ed.). Brooks Cole. pp. 13–19. ISBN 978-0-495-56521-5. - Moon P, Spencer DE (1988). "Rectangular Coordinates (x, y, z)". Field Theory Handbook, Including Coordinate Systems, Differential Equations, and Their Solutions (corrected 2nd, 3rd print ed.). New York: Springer-Verlag. pp. 9–11 (Table 1.01). ISBN 978-0-387-18430-2. - Finney, Ross; George Thomas; Franklin Demana; Bert Waits (June 1994). Calculus: Graphical, Numerical, Algebraic (Single Variable Version ed.). Addison-Wesley Publishing Co. ISBN 0-201-55478-X. - Margenau, Henry; Murphy, George M. (1956). The Mathematics of Physics and Chemistry. New York City: D. van Nostrand. p. 178. ISBN 978-0-88275-423-9. LCCN 55010911. OCLC 3017486. - Morse PM, Feshbach H (1953). Methods of Theoretical Physics, Part I. New York: McGraw-Hill. p. 658. ISBN 0-07-043316-X. LCCN 52011515. - Jones, Alfred Clement (1912). An Introduction to Algebraical Geometry. Clarendon. - Hodge, W.V.D.; D. Pedoe (1994) . Methods of Algebraic Geometry, Volume I (Book II). Cambridge University Press. ISBN 978-0-521-46900-5. - Woods p. 2 - Tang, K. T. (2006). Mathematical Methods for Engineers and Scientists. Vol. 2. Springer. p. 13. ISBN 3-540-30268-9. - Liseikin, Vladimir D. (2007). A Computational Differential Geometry Approach to Grid Generation. Springer. p. 38. ISBN 978-3-540-34235-9. - Munkres, James R. (2000) Topology. Prentice Hall. ISBN 0-13-181629-2. - Hanspeter Schaub; John L. Junkins (2003). "Rigid body kinematics". Analytical Mechanics of Space Systems. American Institute of Aeronautics and Astronautics. p. 71. ISBN 1-56347-563-4. - Voitsekhovskii, M.I.; Ivanov, A.B. (2001) , "Coordinates", Encyclopedia of Mathematics, EMS Press - Woods, Frederick S. (1922). Higher Geometry. Ginn and Co. pp. 1ff. - Shigeyuki Morita; Teruko Nagase; Katsumi Nomizu (2001). Geometry of Differential Forms. AMS Bookstore. p. 12. ISBN 0-8218-1045-6.
<urn:uuid:2761a928-e9e7-40fc-8208-d38050b1a682>
CC-MAIN-2022-33
https://en.wikipedia.org/wiki/Coordinate_system
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00206.warc.gz
en
0.820966
3,137
3.609375
4
Market Snapshot: Canada’s Pipeline System – Who Regulates What? Release date: 2022-07-20 Canada’s pipeline system is a network of pipelines regulated by federal, provincial, and territorial regulators. It includes more than 760 000 kilometers (km) of pipelines that transport crude oilDefinition*, natural gasDefinition*, natural gas liquidsDefinition*, and refined petroleum productsDefinition* across the country.Footnote1Footnote2 For perspective, you would need to drive from Vancouver, British Columbia to Halifax, Nova Scotia approximately 130 times to cover the same distance! Figure 1: Map of pipelines regulated by the Canada Energy Regulator (CER) Source and Description Source: CER created from GDM data. Description: This is a map of pipelines regulated by the CER. The CER regulates pipeline systems that cross provincial or international boundaries, among other roles. See the “Who regulates pipelines in Canada?” section below for more details on the CER’s responsibilities. Pipelines can carry commodities other than oil and gas, such as carbon dioxide, natural gas liquids, slurry, and water. There are more than 760 000 km of pipelines in Canada, of which over 10% or 76 000 km is regulated by the CER. Pipelines under provincial or territorial jurisdiction are not displayed in this map. Provincial and territorial regulators of pipelines and energy Description: This table presents a list of many of the provincial and territorial regulators of pipelines and energy in Canada. Regulators such as public utility boards can regulate utility rates or physical projects. The CER oversees both physical projects, including pipeline construction and operation, as well as financial and economic aspects. |Jurisdiction||Regulator||Economic Function||Operational Function||Description| |Yukon||Yukon Department of Energy, Mines and Resources||✔||✔|| The Department of Energy, Mines and Resources is responsible for regulating the exploration and development of Yukon’s oil and gas resources, including issuing oil and gas rights, administering royalty revenues and licences, and regulating industry activities. In 1993, the Canada Yukon Oil and Gas Accord was signed. It transferred responsibility for oil and gas resources from the NEB to the Government of Yukon. |Yukon||Yukon Utilities Board||✔| |Northwest Territories||The Office of the Regulator of Oil and Gas Operations (OROGO)||✔|| The OROGO regulates onshore oil and gas operations in the Northwest Territories, outside federal areas and the Inuvialuit Settlement Region. Their responsibilities include application reviews, regulating seismic and drilling operations, pipeline and well regulation, inspection and compliance, and emergency response and investigation. The OROGO was established in 2014 when the Northwest Territories’ Oil and Gas Operations Act came into force. |Northwest Territories||Northwest Territories Public Utilities Board (NWT PUB)||✔|| The NWT PUB is an independent agency of the Government of the Northwest Territories. It is responsible for the regulation of public utilities in the NWT, such as natural gas and electricity. There are currently six utility companies operating in the NWT that are regulated by the PUB. The NWT Power Corporation, Northland Utilities (Yellowknife) Limited, and Northland Utilities (NWT) Limited are fully regulated by the PUB. The remaining three companies are regulated by the PUB on a complaints-basis only. |Nunavut||Nunavut Utility Rates Review Council (URRC)||✔|| The URRC is an arms-length advisory council that assesses rates, policy development, and major project applications submitted by the Qulliq Energy Corporation. The Council also provides recommendations to the Government of Nunavut on power rates. |British Columbia||British Columbia Oil and Gas Commission (BCOGC)||✔|| The BCOGC is responsible for overseeing oil and gas operations, refineries, and geothermal development in British Columbia. It regulates 50 813 km of pipelines, 78% of which carry natural gas. The Commission was established in 1998. |British Columbia||British Columbia Utilities Commission (BCUC)||✔|| The BCUC is an independent regulatory agency that regulates energy utilities’ rate applications, and their construction plans for new facilities. The BCUC also regulates the financial side of common carrier pipelines located entirely within B.C., including tolls and the conditions for using the service of pipelines. |Alberta||Alberta Energy Regulator (AER)||✔|| The AER regulates energy development in Alberta, including the life cycle of oil, oil sands, natural gas, and coal projects. It regulates 433 000 km of pipelines, 146 000 operating wells, 21 000 gas facilities, and 30 000 oil facilities. The AER was established in 1938. |Alberta||Alberta Utilities Commission (AUC)||✔||✔|| The AUC approves new pipeline construction, issues licences for pipeline construction, operation, abandonment and removal, reviews and approves routing, approves rates to be paid to transport gas through the pipeline system, and establishes rules and regulations for the design, construction, operation and abandonment of gas utility pipelines in Alberta. |Saskatchewan||Saskatchewan Ministry of Energy and Resources||✔|| The Ministry operates as the primary regulatory authority for the oil and gas industry and ensures competitive royalty systems, regulations, and policies for all natural resource sectors. For example, the Ministry regulates the TransGas pipeline system. |Saskatchewan||Saskatchewan Rate Review Panel||✔|| The Saskatchewan Rate Review Panel advises the Government of Saskatchewan on rate applications proposed by SaskEnergy and SaskPower. The Panel reviews each application to determine the fairness and reasonableness of the rate request, and provides the government with an objective evaluation. |Manitoba||Manitoba Natural Resources and Northern Development Division||✔|| The Natural Resources and Northern Development Division regulates the exploration, development, production and transportation of oil and gas. |Manitoba||Manitoba Public Utilities Board (PUB)||✔||✔|| The PUB regulates natural gas, propane, and electricity rates, and monitors the construction and operation of gas pipelines that are subject to provincial jurisdiction. |Ontario||Ontario Energy Board (OEB)||✔||✔|| The OEB regulates electricity and natural gas rates. The OEB also reviews applications for new electricity transmission lines and natural gas pipelines. The OEB regulates Ontario’s main natural gas distribution company, Enbridge Gas Inc. The Board was established in 1960. |Ontario||Ministry of Northern Development, Mines, Natural Resources and Forestry||✔|| The Ministry regulates licenses for the exploration and extraction of oil, natural gas, and salt resources, as well as underground storage. They are also responsible for managing these resources where they occur on Crown lands. |Quebec||Régie de l’énergie du Québec||✔|| The Régie de l'énergie du Québec is the economic regulator of electricity and natural gas rates in Quebec. |Quebec||Régie du bâtiment du Québec||✔|| The Régie du bâtiment du Québec regulates the installation and exploitation of gas and refined petroleum product pipelines in Quebec. The Régie du bâtiment du Québec regulates the Pipeline Saint-Laurent, which transports refined petroleum products. |Quebec||Ministère de l’Énergie et des Ressources naturelles||✔|| The Ministère de l’Énergie regulates 16 km of crude oil pipelines in Quebec. It provides integrity oversight and performs inspections and audits on the companies it regulates. |New Brunswick||New Brunswick Energy & Utilities Board (EUB)||✔||✔|| The EUB regulates various aspects of the electricity and natural gas sectors. The EUB also sets weekly maximum prices for petroleum products sold within the province. The EUB promotes safety and ensures that companies design, construct, operate, and abandon pipelines safely. The EUB regulates Liberty Utilities, which distributes natural gas throughput southern New Brunswick. The Board was established in 1910. |Nova Scotia||Nova Scotia Utility & Review Board (NSUARB)||✔||✔|| The NSUARB sets petroleum product prices and sets rates for electricity, water, and natural gas utilities. In 1999, the Board assumed responsibility for the regulation of oil and gas pipeline construction, operations, and maintenance. NSUARB regulates Nova Scotia Power, which is responsible for electricity distribution in the province. The Board was established in 1992. |Newfoundland and Labrador||Newfoundland and Labrador Board of Commissioners of Public Utilities||✔|| The Board is responsible for the regulation of electricity rates in the province. In 2004, the Board assumed responsibility for regulation of maximum prices for petroleum products in the province. |Prince Edward Island||Prince Edward Island Regulatory & Appeals Commission||✔|| The Commission was established in 1991 and is responsible for regulating petroleum pricing, as well as electricity and water utilities. It regulates the operations of Maritime Electric Company Limited. |Newfoundland and Labrador Offshore||Canada Newfoundland and Labrador Offshore Petroleum Board (C-NLOPB)||✔|| The role of the C-NLOPB is to facilitate the exploration for and development of petroleum resources in the Canada-Newfoundland and Labrador Offshore Area. On 5 April 2022, NRCan announced that the Board’s mandate would be expanded to include the regulation of offshore renewable energy development, such as wind and clean hydrogen. The Board will be renamed to the Canada-Newfoundland and Labrador Offshore Energy Board (C-NLOEB) to reflect its new mandate. There are currently four production facilities in offshore Newfoundland and Labrador: Hebron, Hibernia, Terra Nova and White Rose. |Nova Scotia offshore||Canada Nova Scotia Offshore Petroleum Board (CNSOPB)||✔|| Since 1990, the CNSOPB has been overseeing all activities through the lifecycle of offshore oil and gas projects in the Canada-Nova Scotia offshore area, from exploration through development, and finally to abandonment. Who regulates pipelines in Canada? Pipeline transportation is highly regulated. Regulators such as public utility boards can regulate utility rates or physical projects. The CER oversees both physical projects, including pipeline construction and operation, as well as financial and economic aspects.Footnote3Footnote4 The federal regulator Pipelines that cross provincial, territorial, or international boundaries are regulated federally by the CER, primarily through the Canadian Energy Regulator Act. As of 2021, the CER is responsible for over 76 000 km of pipeline,Footnote5 which is about 10% of the Canadian total. The majority of these are transmission pipelines. The CER is a lifecycle regulator and monitors a project through the phases of pipeline application, construction, operation, decommissioning, and abandonment. The CER also has a mandate for financial and economic regulation, by regulating tolls and tariffs, and overseeing abandonment funding and financial resources. Visit the Pipeline Profiles for details on major CER-regulated pipelines. Pipelines that are located entirely within one province are regulated by the relevant provincial regulator. They typically regulate gathering, feeder, and distribution pipelines, as well as other energy-related activities such as exploration, petroleum product prices, and other utilities. See the table above for the list of provincial and territorial regulators and their roles. Establishing jurisdictional authority There are times when regulators must determine under which jurisdiction (provincial or federal) a pipeline or project will fall. In those instances, the regulator will consider jurisdiction by applying the relevant legal test. Examples of this include the TransCanada Alberta System [Folder 549124], the sale of Westcoast Gathering System assets [Folder 3817720], the Prince Rupert Gas Transmission Project [Folder 3335429], the Coastal GasLink Pipeline Project [Folder 3809973], and the Enbridge Frontier Project [Folder 3962346]. Pipeline regulation in Canada’s North There are a few active pipelines regulated by the CER in the Northwest Territories (NWT), including the Enbridge Norman Wells Pipeline and the Ikhil pipeline.Footnote6 Currently, there are no active pipelines in Nunavut or the Arctic Offshore. Other regulatory responsibilities of the CER in the North includes oil and gas exploration in the onshore Inuvialuit Settlement Region (ISR),Footnote7 under the NWT’s Oil and Gas Operations Act. Exploration and development in Nunavut, the Canadian Arctic offshore, and the Norman Wells Proven Area (NWT) is regulated under the Canada Oil and Gas Operations Act.Footnote8 Types of pipelines A pipeline system is made up of four different types of pipelines. Gathering, feeder, and distribution pipelines are typically regulated by the provincial regulators. Transmission pipelines are typically regulated by the CER. - Gathering pipelines are mid-sized pipes that deliver products from wells to storage or processing facilities. - Feeder pipelines move products from storage or processing facilities to transmission pipelines. - Transmission pipelines are large diameter pipes that deliver products over long distances, usually from storage facilities to end markets. - Distribution pipelines are used by local distribution companies to deliver natural gas to homes and businesses. Figure 2: Crude oil and natural gas pipeline system overview Source and Description Description: This figure shows the movement of crude oil and natural gas though the pipeline system. Transmission pipelines, emphasized in the figure, are typically regulated by the CER. The dotted line indicates the streams served by the transmission pipelines. Gathering, feeder, and distribution pipelines are typically regulated by the provincial regulator.Footnote9 - Date modified:
<urn:uuid:f162dbff-1544-4645-802a-1b2582db3023>
CC-MAIN-2022-33
https://www.cer-rec.gc.ca/en/data-analysis/energy-markets/market-snapshots/2022/market-snapshot-canadas-pipeline-system-who-regulates-what.html?fbclid=IwAR2ns4BSCY7r8Rghp9zp5lt-sreODSvjnwd_GFlEQndlYbhpSWglF-O3St8
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00405.warc.gz
en
0.897439
2,953
3.234375
3
Basque Americans Information This article has multiple issues. Please help improve it or discuss these issues on the talk page. ( Learn how and when to remove these template messages)( Learn how and when to remove this template message) |Regions with significant populations| |California, Idaho, Nevada, Washington, Oregon| |American English, Basque, Spanish, French| |Related ethnic groups| |Basque people and other groups of the Basque diaspora| Basque Americans ( Basque: euskal estatubatuarrak, Spanish: vasco estadounidenses, French: Basco-Américains) are Americans of Basque descent. According to the 2000 US census, there are 57,793 Americans of full or partial Basque descent, but the real number of Basque Americans could easily reach 100,000 people. Of them, 41,811 people claimed be simply Basque American, 9,296 claimed be originating from Spanish Basque Country, and the other 6,686 claimed be originating from the French Basque Country. Referring to the historical ties that existed between the Basque Country and the United States, some authors stress the admiration felt by John Adams, second president of the US, for the Basques' historical form of government. Adams, who on his tour of Europe visited Biscay, was impressed. He cited the Basques as an example in A defense of the Constitution of the United States, as he wrote in 1786: "In a research like this, after those people in Europe who have had the skill, courage, and fortune, to preserve a voice in the government, Biscay, in Spain, ought by no means to be omitted. While their neighbours have long since resigned all their pretensions into the hands of kings and priests, this extraordinary people have preserved their ancient language, genius, laws, government, and manners, without innovation, longer than any other nation of Europe. Of Celtic extraction, they once inhabited some of the finest parts of the ancient Boetica; but their love of liberty, and unconquerable aversion to a foreign servitude, made them retire, when invaded and overpowered in their ancient feats, into these mountainous countries, called by the ancients Cantabria…" "…It is a republic; and one of the privileges they have most insisted on, is not to have a king: another was, that every new lord, at his accession, should come into the country in person, with one of his legs bare, and take an oath to preserve the privileges of the lordship". Authors such as Navascues, and the Basque-American Pete T. Cenarrusa, former Secretary of the State of Idaho, agree in stressing the influence of the Foruak or Charters of Biscay [Code of Laws in Biscay] on some parts of the US Constitution. John Adams traveled in 1779 to Europe to study and compare the various forms of government then found on the Old Continent. The American Constitution was approved by the first thirteen states on 17 September 1787. Basque immigration peaked after the Spanish Carlist Wars in the 1830s—Ebro customs relocated to the Pyrenees—and in the 1860s following the discovery of gold in the foothills of the Sierra Nevada mountain range of California. The current day descendants of Basque immigrants remain most notably in this area and across the Sierras into the neighboring area of northern Nevada, then northward, into Idaho. When the present-day states of California, Arizona and New Mexico were annexed by the United States after the Mexican–American War (1848), there were reportedly thousands of Basques of Spanish or mixed Mexican origin living in the Pacific Northwest. By the 1850s, there were some Basque sheepherders working in Cahuenga Valley (today Los Angeles, California). In the 1870s, the Los Angeles and Inland Empire land rush reportedly attracted thousands of Basques from Spain, Mexico and Latin America, but such reports do not bear out in a current census of Basque persons in the Southern United States where Basque persons are exceptionally rare in US census reporting. By the 1880s Basque immigration had spread up into Oregon, Utah, Montana, Wyoming, with significantly lesser numbers reaching the Southern states of Arizona, New Mexico, and Texas in the Southern most region. By 1895 there were reportedly about ten thousand self reporting Basque-Americans in the United States. The current census figures demonstrated in the US map on this page are remarkably low in comparison to these reports and the overall increase in the US population since the 19th century. There has been a radical decrease in Basque immigration since that era which has resulted in the significant decline in persons of Basque national or Spanish origin throughout the US. Most of the self reporting Basque persons remaining in the US today are descendants of the original peak of Basque immigrants who arrived between 200 and 100 years ago, typically reporting as multi-generational or great great grandchildren (1860 immigrants) as opposed to native born persons of Basque ethnic identification and their subsequent immediate family, children, or grandchildren. The degree to which one self reports being "Basque" is a personal choice, often tied to an interest in one's heritage whether one is the grandchild of a native born Basque or of significantly mixed Native American (Mexican, S. American, etc.), Anglo European, or other racial admixture. There are significant numbers of Mexicans with Basque names, as many as 1 million self reporting Mexicans of Basque racial or surname heritage today. Thousands of Basques were recruited from Spain due to severe labor shortages during World War II. They came under contract with the Western Range Association between the 1940s until around 1970. The Spanish Right of Return extends Spanish citizenship only to the grandchildren of Basque immigrants who were born in Spain and forced to flee during the Francoist uprising in the mid-1930s. There are nearly fifty such clubs in the US, the oldest of which is the Central Vascoamericano (founded 1913), today New York's Euzko Etxea situated in Brooklyn. In the west, in 1907 there were efforts made to set up a club in Stockton, California. In 1914, the Basque Club of Utah was founded in Ogden, while in 1960 the first Zazpiak Bat Club was started in San Francisco. In 1938, the Basques in the Bakersfield area founded the Kern County Basque Club. Even though there are Basques in each of the fifty states, according to the most recent census, Basque clubs are only found in New York, Florida, California, Nevada, Idaho, Oregon, Utah, Washington, and Wyoming. However, there is a significant Basque population in Arizona, Colorado, Connecticut, Montana, New Jersey, New Mexico, and Texas. Basque-American clubs have connections with other Basques around the world (across Europe, Canada, Mexico, Bolivia, Peru, Puerto Rico, Chile, Argentina, Australia, South Africa and the Philippines) to unite and consolidate a sense of identity in the global Basque diaspora. No US state is more associated with Basque people and culture than Idaho. Basques today are an integral part of the state's social fabric, especially in Boise. Prominent Basque-American elected officials in Idaho include longtime Secretary of State Pete T. Cenarrusa, his successor Ben Ysursa, both Republicans, Democrat David H. Bieter, the current Boise mayor, as well as Republican, J. David Navarro, the current Clerk, Auditor and Recorder of Ada County, the most populated county in Idaho. Basques were initially drawn to Idaho by the discovery of silver, in settlements such as Silver City. Those that did not directly become involved in mining engaged in ranching, selling beef and lamb products to the miners. While some such immigrants returned to Basque Country, many remained, later to be joined by their families following them in immigration. Exact counts of Basque immigrants to Idaho are not practical to determine, as the United States Census did not distinguish between Basques from other Spanish immigrants, though a majority of Spanish immigrants to Idaho likely self-identified as Basque. Since 1990, Boise and Gernika have been sister cities. Idaho achieved statehood in 1890 along with the first Basques arriving there around the same time. By 1912, some of the pioneers, such as Jose Navarro, John Achabal, Jose Bengoechea, Benito Arregui, John Echebarria, and Juan Yribar, were already settled and had property in the state. In March 1973, a group of Basque-Americans met in Reno, Nevada with a questionable proposal, especially considering Basque history. The group hoped to forge a federation and create a network within the larger Basque community of the United States. The Basques had never been united in either the Old Country nor in the New World. The Basque Country, or Euskal Herria, had never been "Zazpiak Bat" (Seven Territories Make One) representing a unified, self-conscious political community, it rather showed a political structure of a confederate nature—separate autonomous districts with a similar national, institutional and legal make-up. Euskal Herria often referred to just the local region. This detachment of the Basques was reflected in the Basque communities of the United States. Basques of Biscayne descent in parts of Idaho and Nevada interacted little with the Basques of California, who were largely northern or "French Basques." When delegates from the Basque clubs of Los Banos, San Bernardino; and San Francisco, California; Boise and Emmett, Idaho; Elko, Ely and Reno, Nevada; Salt Lake City, Utah; and Ontario, Oregon gathered together, they were well aware that there was little if any communication between the various Basque clubs of the American West. They were attempting to cross the divide—real and imagined—between Basque-Americans. Seventeen years later "French" Basques and "Spanish" Basques joined a federation to work together. Individual clubs set aside competition in an effort to preserve and promote their shared heritage. The North American Basque Organizations, Inc., commonly referred to by its acronym N.A.B.O., is a service organization to member clubs that does not infringe on the autonomy of each. Its prime purpose is the preservation, protection, and promotion of the historical, cultural, and social interests of Basques in the United States. NABO's function is to sponsor activities and events beyond the scope of the individual clubs, and to promote exchanges between Basque-Americans and the Basque country. The new generations exhibit the natural process of Americanization. To be Basque or to be part of the Basque phenomenon is an option today that may or may not be exercised. Those who wish may strengthen their ties via cultural elements such as dances and customs, while in some there is also the desire to travel to Europe and study Basque, Spanish, or French. In recent years there has been the resurgence of Basque language classes, facilitated by new courses via the Internet. With succeeding generations the mode of being Basque has adapted to a new environment, and the concept of Basque-ness has altered. The states with the largest Basque communities are: - California: 17,598 - Idaho: 8,196 - Nevada: 5,056 - Oregon: 3,162 - Washington: 2,579 - Texas: 2,389 - Colorado: 2,216 - Florida: 1,653 - Utah: 1,579 - New York: 1,544 - Wyoming: 1,039 - Boise, ID: 3,573 - Los Angeles- Long Beach- Anaheim, CA: 3,432 - Reno, NV- CA: 2,216 - San Francisco- Oakland, CA: 1,930 - New York- Newark, NY- NJ- CT: 1,604 - Portland, OR- WA: 1,520 - Sacramento, CA: 1,155 - Seattle, WA: 1,082 - Bakersfield, CA: 1,078 - Nampa, Idaho, ID: 1,008 - Salt Lake City- West Valley City, UT: 978 - Denver- Aurora- Lakewood, CO: 957 - Phoenix- Mesa, AZ: 904 - San Diego, CA: 872 - Miami, FL: 841 - Las Vegas- Nevada, NV: 763 - Fresno, CA: 650 - San Jose, CA: 544 The top 25 U.S. communities with population claiming Basque ancestry - Winnemucca, NV 4.2% - Gooding, ID 4.1% - Battle Mountain, NV 4.1% - Elko, NV 3.7% - Shoshone, ID 3.4% - Cascade, ID 3.2% - Buffalo, WY 2.6% - Minden, NV 2.2% - Susanville, CA 2.1% - Hines, OR 1.8% - Gardnerville, NV 1.7% - Burns, OR 1.7% - Rupert, ID 1.6% - New Plymouth, ID 1.5% - Vale, OR 1.4% - Ontario, OR 1.4% - Fallon, NV 1.3% - Bellerose, NY 1.3% - Caldwell, ID 1.3% - Eagle, ID 1.2% - Homedale, ID 1.2% - Meridian, ID 1.2% - Oak Park, CA 1.2% - Palouse, WA 1.1% - Moss Beach, CA 1.1% |Lists of Americans| |By U.S. state| |By ethnicity or nationality| The following is a list of notable Basque-Americans of either full or partial Basque descent: - Dominique Amestoy, banker, founder of Farmers and Merchants Bank - Jeffrey Amestoy, longtime Attorney General of the State of Vermont and Chief Justice of the Vermont Supreme Court - Joe Ansolabehere, animation screenwriter and producer - David Archuleta, singer and American Idol contestant - John Arrillaga, real estate businessman, Silicon Valley - John Ascuaga, businessman, owner of John Ascuaga's Nugget Casino Resort - Earl W. Bascom, painter and sculptor, father of modern rodeo - Florence Bascom, first woman hired by USGS - Frank Bergon, author of four novels featuring Basque Americans - Eugene W. Biscailuz, Sheriff of Los Angeles County; founder of the California Highway Patrol - Frenchy Bordagaray, MLB player - Pete T. Cenarrusa, former Secretary of State of Idaho - Héctor Elizondo, film actor - Andy Etchebarren, MLB catcher with the Baltimore Orioles, California Angels and Milwaukee Brewers - John Etchemendy, Provost of Stanford University - John Garamendi, US Congressman and former Lieutenant Governor of California - Galen Gering, film actor - Pete Goicoiechea, Nevada State Senator and former Nevada Assemblyman - Shayne Gostisbehere, NHL defenseman for the Philadelphia Flyers - Jimmie Heuga, former ski racer, 1964 Olympic medalist - Jose Iturbi, composer, conductor, and pianist - Jim Larranaga, basketball coach - Adam Laxalt, Attorney General of Nevada - Paul Laxalt, former US Senator and former governor of Nevada - Robert Laxalt, writer - Ryan Lochte, former Olympic swimmer - Michel Moore, Chief of Police of the Los Angeles Police Department (LAPD) - Ramón Músquiz (1797–1867), governor of Texas from 1830 to 1831 - Gregorio Esparza, Tejano soldier that fought in the Battle of the Alamo and died in the Alamo with other fellow Tejanos fighting for Texas Independence. - Joseph A. Unanue, businessman, Goya Foods - Benny Urquidez, known as Benny the Jet, martial artist appearing in Jackie Chan films - Ted Williams, Baseball Hall of Fame - "Table 1. First, Second, and Total Responses to the Ancestry Question by Detailed Ancestry Code: 2000". U.S. Census Bureau. Retrieved 2010-12-02. - "John Adams: Defence of the Constitutions: Vol. I, Letter IV". Constitution.org. Retrieved 2015-09-19. - "Las Rocosa Australian Shepherds". Lasrocosa.com. Retrieved 2015-09-19. - "Basque Club History". Basqueclub.com. Retrieved 2015-09-19. - Totoricagüena, Gloria (2004). Boise Basques: Dreamers and Doers. Reno, NV: Center for Basque Studies, University of Nevada, Reno. pp. 32–33. ISBN 1877802379. OCLC 54536757. - Mercier, Laurie; Simon-Smolinski, Carole, eds. (1990). Idaho's Ethnic Heritage: Historical Overviews. Idaho: Idaho Ethnic Heritage Project. p. 17. OCLC 23178138. - "Basque Americans in the Columbia River Basin". Washington State University, Vancouver. Archived from the original on February 12, 2007. - "Urban Areas with Basque Communities". factfinder.census.gov. Retrieved 2018-04-05. - "Ancestry Map of Basque Communities". Epodunk.com. Retrieved 2018-04-04. - "Basque Studies Debut" (March/April 2007) Stanford Magazine. Retrieved 05 June 2010. - Monica Madinabeitia, "Getting to Know Frank Bergon: The Legacy of the Basque Indarra," Journal of the Society of Basque Studies in America, 28 (2008) - Andy Etchebarren (biography) – Society for American Baseball Research (SABR). - "Longmire: Season 2, Episode 3 : Death Came in Like Thunder (10 June 2013)". IMDb.com. Retrieved 2015-09-20. |Wikimedia Commons has media related to Basque American.| - Center for Basque Studies, University of Nevada, Reno - (Amerketako euskaldunei buruzko webgunea) - Buber's Basque Page - Epodunk, Basque Ancestry Map of the United States - Kaletarrak eta Baserritarrak: East Coast and West Coast Basques in the United States by Gloria P. Totoricagüena. - Interstitial Culture, Virtual Ethnicity, and Hyphenated Basque Identity in the New Millennium by William A. Douglass. - Euroamericans.net: The Basque in America - U.S. Census - Basque Library, University of Nevada, Reno - Basque Digital Collection University of Nevada, Reno Libraries - Voices from Basque America University of Nevada, Reno Libraries
<urn:uuid:192b6c0a-f996-4830-b0a4-442406aea592>
CC-MAIN-2019-22
http://webot.org/info/en/?search=Basque_American
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256797.20/warc/CC-MAIN-20190522103253-20190522125253-00182.warc.gz
en
0.9246
4,054
2.90625
3
On the morning of Tuesday, April 17, 2018, crews from United Launch Alliance raised the 170-foot tall Delta IV Heavy launch vehicle – the largest and most powerful rocket currently used by NASA – at Launch Complex 37 at Cape Canaveral Air Force Station in Florida. This Delta IV Heavy will carry Parker Solar Probe, humanity’s first mission to the Sun’s corona, on its journey to explore the Sun’s atmosphere and the solar wind. Launch is scheduled for approximately 4 a.m. EDT on July 31, 2018. The launch vehicle consists of three Common Booster Cores, with a second stage on the center core; the encapsulated spacecraft, is scheduled to arrive in early July for integration onto the rocket. The spacecraft is now at Astrotech Space Operations in nearby Titusville undergoing final integration and testing. Parker Solar Probe will be the fastest human-made object in the solar system, traveling at speeds of up to 430,000 miles per hour (700,000 kilometers per hour). The Thermal Protection System — also known as the heat shield — for NASA’s Parker Solar Probe arrived in Titusville, Florida, on April 18, 2018, bringing it one step closer to reuniting with the spacecraft that will be the first to “touch” the Sun. The Parker Solar Probe spacecraft arrived at Astrotech Space Operations two weeks prior, on April 3, to complete final testing. Though the spacecraft was flown by the Air Force’s 436th Airlift Wing, the Thermal Protection System, or TPS, traveled on a flatbed truck, securely encased in a metal shipping container during its road trip to the Sunshine State. After setting off on a rainy Monday morning from Maryland, it was greeted with Florida’s balmy heat on Wednesday afternoon at Astrotech, where it will eventually be reattached to the spacecraft before launch in late July. The innovative TPS will be the one barrier shielding the spacecraft and its instruments from the intense heat of the Sun. Made of carbon-carbon composite and stretching approximately eight feet wide, the TPS will withstand temperatures of up to 2,500 degrees Fahrenheit while keeping the spacecraft and instruments at a comparatively comfortable 85 degrees Fahrenheit. The heat shield has a plasma-sprayed white surface that will reflect the intense heat energy of the Sun’s corona away from the spacecraft. Parker Solar Probe has completed its space environment testing at NASA’s Goddard Space Flight Center in Greenbelt, Maryland, and was lifted out of the thermal vacuum chamber on March 24, 2018, after just over two months inside. Since January, Parker Solar Probe underwent a series of tests inside NASA Goddard’s large thermal vacuum chamber – officially called the Space Environment Simulator – that mimicked the conditions the spacecraft will face in space throughout its seven-year mission. After initially testing the spacecraft’s functions under hot and cold extremes, engineers have spent the past month slowly cycling the temperatures in the thermal vacuum chamber back and forth between hot and cold, making sure Parker Solar Probe’s systems and components operate properly. This thermal cycling is similar to the conditions the spacecraft will experience as it completes 24 close approaches to the Sun over its seven-year mission. “Successfully completing this final round of space environment testing is critical, and the team has created an exceptional spacecraft,” said Andy Driesman, Parker Solar Probe program manager from the Johns Hopkins Applied Physics Lab in Laurel, Maryland, which designed, built, and will manage the mission for NASA. “We now know the spacecraft and systems are able to operate in space, and that Parker Solar Probe is ready to embark on this historic mission.” After undergoing final preparations, the spacecraft will leave NASA Goddard and travel to Florida this spring. Once in Florida, Parker Solar Probe will go through its final integration and testing at Astrotech Space Operations in Titusville before launching from NASA’s Kennedy Space Center in Florida this summer. Parker Solar Probe’s launch window opens on July 31, 2018. On Saturday, Jan. 27, NASA’s Parker Solar Probe began space environment testing, starting with the air being pumped out of the 40-foot-tall thermal vacuum chamber at NASA’s Goddard Space Flight Center in Greenbelt, Maryland where the spacecraft is currently housed. The chamber – officially called the Space Environment Simulator – creates a nearly identical replication of the conditions the spacecraft will face during its mission to the Sun. After the air was slowly removed from the chamber over the course of five hours, cooling tubes behind the chamber walls were chilled to -320 degrees Fahrenheit (-196 Celsius). Engineers will cycle the chamber’s temperatures from hot to cold to ensure Parker Solar Probe will be prepared for operations around the Sun. During this cycling, the spacecraft’s systems will undergo testing that mimics critical events that occur during its planned seven-year mission in space. The tests are designed to make sure all the systems and components of Parker Solar Probe are operating as designed. This space environment testing will continue for about seven weeks. Parker Solar Probe will emerge from the vacuum chamber in mid-March for final tests before setting off for Florida, where it will launch from NASA’s Kennedy Space Center on July 31, 2018. On Wednesday, Jan. 17, NASA’s Parker Solar Probe was lowered into the 40-foot-tall thermal vacuum chamber at NASA’s Goddard Space Flight Center in Greenbelt, Maryland. The spacecraft will remain in the chamber for about seven weeks, coming out in mid-March for final tests and packing before heading to Florida. Parker Solar Probe is scheduled to launch from NASA’s Kennedy Space Center on July 31, 2018, on a Delta IV Heavy launch vehicle. The thermal vacuum chamber simulates the harsh conditions that Parker Solar Probe will experience on its journey through space, including near-vacuum conditions and severe hot and cold temperatures. “This is the final major environmental test for the spacecraft, and we’re looking forward to this milestone,” said Annette Dolbow, Parker Solar Probe’s integration and test lead from the Johns Hopkins Applied Physics Lab. “The results we’ll get from subjecting the probe to the extreme temperatures and conditions in the chamber, while operating our systems, will let us know that we’re ready for the next phase of our mission – and for launch.” During thermal balance testing, the spacecraft will be cooled to -292 degrees Fahrenheit. Engineers will then gradually raise the spacecraft’s temperature to test the thermal control of the probe at various set points and with various power configurations. Next, thermal cycling testing will transition the spacecraft from cold to hot and back again several times, simulating the conditions it will experience many times during its mission to the Sun. The Parker Solar Probe team will also test operation of the spacecraft’s hardware at both hot and cold plateaus, as well as perform a mission simulation. To protect NASA’s Parker Solar Probe from the intense heat of the Sun’s atmosphere, scientists and engineers developed a revolutionary Thermal Protection System. This heat shield, made of carbon-carbon composite material, will experience temperatures of almost 2,500 degrees Fahrenheit as the spacecraft hurtles through the solar atmosphere, while keeping the instruments on the spacecraft at approximately room temperature. The heat shield recently moved from the Johns Hopkins Applied Physics Lab, or APL, in Laurel, Maryland, to NASA’s Goddard Space Flight Center in Greenbelt to undergo testing in NASA Goddard’s large Thermal Vacuum Chamber. The Thermal Vacuum Chamber will simulate the harsh conditions that the heat shield must endure during the mission: This includes the airless vacuum of space along with huge temperature fluctuations between hot and cold as the spacecraft swings past the Sun and back out into space. The Thermal Protection System’s ability to withstand extreme temperatures has already been proven through testing at other facilities, as the Thermal Vacuum Chamber at NASA Goddard cannot simulate the very high temperatures of the Sun. By Geoff Brown Johns Hopkins University Applied Physics Lab NASA’s Parker Solar Probe passed laser illumination testing the week of Nov. 27, 2017. During this test, each segment of the spacecraft’s solar panels was illuminated with lasers to check that they were still electrically connected after the vigorous vibration and acoustic testing completed earlier this fall. NASA’s Parker Solar Probe is in the midst of intense environmental testing at NASA’s Goddard Space Flight Center in Greenbelt, Maryland, in preparation for its journey to the Sun. Parker Solar Probe’s integration and testing team must check over the spacecraft and systems to make sure everything is still in optimal working condition after these rigorous tests – including a check of the solar arrays, which will provide electrical power to the spacecraft. Credit: NASA’s Goddard Space Flight Center/Joy Ng Download this video in HD formats from NASA Goddard’s Scientific Visualization Studio Parker Solar Probe is in the midst of intense environmental testing at NASA’s Goddard Space Flight Center in Greenbelt, Maryland, in preparation for its journey to the Sun. These tests have simulated the noise and shaking the spacecraft will experience during its launch from Cape Canaveral, Florida, scheduled for July 31, 2018. Parker Solar Probe’s integration and testing team must check over the spacecraft and systems to make sure everything is still in optimal working condition after experiencing these rigorous conditions – including a check of the solar arrays, which will provide electrical power to the spacecraft. “This illumination testing verifies that each ‘string’ of solar cells on the array remains electrically connected to the spacecraft after vibration and acoustic testing,” said solar array lead engineer Ed Gaddy of the Johns Hopkins Applied Physics Lab, or APL, in Laurel, Maryland. APL is building and will operate the spacecraft. To make sure that the 44 strings — a series of connected solar cells — on each panel are still well-connected after environmental tests, each string was illuminated individually to ensure that they would still create electricity and transfer it to the spacecraft. Lasers are ideal for this kind of testing, because their narrow beam allows the team to illuminate just one string at a time. The strikingly colored lasers were selected because they were readily available and because the solar cells operate efficiently at that color. But by themselves, these visible lasers are insufficient to power the solar cells, so the team also used infrared lasers for this test. Infrared light is not visible to our eyes and wasn’t captured in these images.
<urn:uuid:7dd49e43-9de6-4758-ada7-1d1611eddd3e>
CC-MAIN-2022-33
https://blogs.nasa.gov/parkersolarprobe/author/sfrazie2/page/6/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00004.warc.gz
en
0.922734
2,167
3.109375
3
The findings, published in Nature Immunology on June 23, 2022, describe how immune cells called regulatory T cells interact with skin cells using a hormone as a messenger to generate new hair follicles and hair growth. “For the longest time, regulatory T cells have been studied for how they decrease excessive immune reactions in autoimmune diseases,” says corresponding author Ye Zheng, associate professor in Salk’s NOMIS Center for Immunobiology and Microbial Pathogenesis. “Now we’ve identified the upstream hormonal signal and downstream growth factor that actually promote hair growth and regeneration completely separate from suppressing immune response.” The scientists didn’t begin by studying hair loss. They were interested in researching the roles of regulatory T cells and glucocorticoid hormones in autoimmune diseases. (Glucocorticoid hormones are cholesterol-derived steroid hormones produced by the adrenal gland and other tissues.) They first investigated how these immune components functioned in multiple sclerosis, Crohn’s disease and asthma. They found that glucocorticoids and regulatory T cells did not function together to play a significant role in any of these conditions. So, they thought they’d have more luck looking at environments where regulatory T cells expressed particularly high levels of glucocorticoid receptors (which respond to glucocorticoid hormones), such as in skin tissue. The scientists induced hair loss in normal mice and mice lacking glucocorticoid receptors in their regulatory T cells. “After two weeks, we saw a noticeable difference between the mice – the normal mice grew back their hair, but the mice without glucocorticoid receptors barely could,” says first author Zhi Liu, a postdoctoral fellow in the Zheng lab. “It was very striking, and it showed us the right direction for moving forward.” The findings suggested that some sort of communication must be occurring between regulatory T cells and hair follicle stem cells to allow for hair regeneration. Using a variety of techniques for monitoring multicellular communication, the scientists then investigated how the regulatory T cells and glucocorticoid receptors behaved in skin tissue samples. This crosstalk between the T cells and the stem cells depends on a mechanism whereby glucocorticoid receptors induce production of the protein TGF-beta3, all within the regulatory T cells. TGF-beta3 then activates the hair follicle stem cells to differentiate into new hair follicles, promoting hair growth. Additional analysis confirmed that this pathway was completely independent of regulatory T cells’ ability to maintain immune balance. However, regulatory T cells don’t normally produce TGF-beta3, as they did here. When the scientists scanned databases, they found that this phenomenon occurs in injured muscle and heart tissue, similar to how hair removal simulated a skin tissue injury in this study. “In acute cases of alopecia, immune cells attack the skin tissue, causing hair loss. The usual remedy is to use glucocorticoids to inhibit the immune reaction in the skin, so they don’t keep attacking the hair follicles,” says Zheng. “Applying glucocorticoids has the double benefit of triggering the regulatory T cells in the skin to produce TGF-beta3, stimulating the activation of the hair follicle stem cells.” This study revealed that regulatory T cells and glucocorticoid hormones are not just immunosuppressants but also have a regenerative function. Next, the scientists will look at other injury models and isolate regulatory T cells from injured tissues to monitor increased levels of TGF-beta3 and other growth factors. Hair follicles (HFs) consist of the infundibulum, isthmus, and hair bulb. The hair bulb is located in the thickened base of the hair root and consists of an epithelium-derived matrix wrapped around a mesenchymal cell-derived dermal papilla (DP), which contains DP cells, endothelial vascular cells, and extracellular matrix (ECM). Cell–cell contacts, cell–matrix interactions, and tissue–neural interplay are all controlled by epithelial–mesenchymal interactions (EMIs), which also incorporate morphogens, cell adhesion factors (proteoglycans, etc.), growth factors, ECM molecules, hormones, cytokines, enzymes, and specific pharmacologically relevant molecules (retinoid, etc.) and their receptors (1). Sonic hedgehog (SHH), wingless (Wnt), bone morphogenetic protein (BMP), fibroblast growth factor (FGF), their receptors, and other pathways are linked to embryonic HF development, the hair cycle, and skin wound healing (2). Other underlying molecular families associated with HF morphogenesis are the transforming growth factor-beta (TGF-β) family and neurotrophic proteins (3, 4). In HFs, DPs can secrete components that act on the peripheral matrix, such as epidermal growth factor (EGF), FGF, hepatocyte growth factor (HGF), insulin-like growth factor-I (IGF-I), keratinocyte growth factor (KGF or FGF-7), TGF-β, basic FGF (bFGF or FGF-2), and interleukins (IL-1, etc.) (5). DP ensures and regulates the hair growth and hair cycle in order. Through EMI between DPs and epithelial cells, HFs participate in postinjury skin wound healing. In patients with extensive skin burns, transplanting HF progenitor cells enhances angiogenesis, regulates the inflammatory response, speeds wound healing, and improves the physiological function of skin regeneration. HF progenitor cell transplantation is an innovative technique and could be a new therapeutic option for long-term unhealed wounds (6). EMI in HF Morphogenesis and Cyclic Regeneration Hair follicle morphogenesis is the climax of a series of EMI through coordinated epidermal–mesenchymal signaling and gradual tissue remodeling, with stem cell populations evolving into a complete HF structure (7, 8). Due to the availability of mouse specimens, mouse models play a key role in EMI research during HF morphogenesis and cycle (9). Initially, the dermis emits the first dermal signal, which stimulates the production of epidermal placodes. The placode is the initial hair structure, a concavity of the epidermis descending into the dermis. Subsequently, the placode delivers epidermal impulses to the dermal cells beneath the epidermis, leading to the formation of dermal condensate (DC) (7, 8). Following the DC’s second dermal signal, proliferative epithelial cells shape pegs and downwards (Figure 1A). HF stem cells (HFSCs) stimulate the subsequent downward expansion of hair pegs, eventually forming an integral HF. HF Cyclic Regeneration Bulge HFSCs and mesenchymal DPs act as progenitor cells for the HF epidermal and dermal layers, respectively (7). In the late telogen phase of humans and mice, DP activates bulge HFSCs, creating germ cells that continue to build the hair matrix, resulting in the production of the inner root sheath and the hair sheath (10). Dermal papilla numbers are stable during HF cycles but drastically decrease in patients with androgenetic alopecia (11). Maintenance of the quantity and function of DP cells is required for healthy hair. In normal conditions, HF dermal stem cell (hfDSC) progeny supply lower DP cells and diverge toward the dermal sheath, but with injury, cell loss, senescence, and HF hypertrophy, they are transported to the upper DP, which initiates significant HF regeneration (12). During the anagen phase, hfDSCs replenish the DP and dermal sheath and exit the DP into the dermal cup during the catagen phase. Then, they enter a quiescent state or undergo apoptosis. Accordingly, to maintain the HF cycle, a balance between hfDSC reduction (differentiation and withdrawal from the hfDSC niche) and increase is critical (13). The dermal papilla is dependent on EMI to induce HF regeneration, and the function of DP is inextricably tied to the progenitors of the epithelial matrix that surrounds it (14). The hair matrix is located in the proliferative zone of the hair bulb and consists of epithelial stem cells and transient amplifying cells. DP awakens the transient amplifying cells in anagen, enabling hair germs to migrate down with the DP, similar to how epithelial stem cells behave during embryonic HF development (Figure 1C) (8). In late anagen and catagen, DP loses contact with the hair matrix and ascends below the lower bulge as the hair sheath shortens. Moreover, the hair matrix transforms into secondary hair germs. In the next cycle, the secondary hair germ encloses the DP to form the newly generated hair matrix (15, 16). Epidermal growth factor influences the lungs, mammary glands, small sweat glands, and skin, which is expressed in the HF outer root sheath and differentiated sebaceous glands (10). The EGF family impedes HF morphogenesis, generally manifesting as placode and DC deficits (7). The EGF family also controls hair sheath differentiation and morphology, with TGF-α mutations and deletions producing wavy hairs owing to distortions in the outer and inner root sheaths (2, 8). The fibroblast growth factor is located in the epidermis and DC and is involved in placode formation in most circumstances. Similar to embryonic development, FGFR2b ablation results in abnormalities in the granular layer and skin appendages (2, 35, 36). In signal networks, FGF20 is secreted after Wnt signaling activation in epithelial placodes and promotes DC formation (37). Identifying the function of the FGF family is important due to the various mechanisms that they modulate in the hair cycle and related disorders. FGF5/18, as catagen-promoting factors, can inhibit stem cell growth, accelerating the anagen–catagen transition and adjusting the hair sheath length (3, 15, 38, 39). Similar to FGF7/10, more FGFs operate as transient amplifying cell-activating signals, catalyzing the telogen–anagen transition and HF renewal (8). Transforming growth factor-beta has anti-proliferation potential for most epithelial cells, including follicular keratinocytes. When HF enters catagen, the epithelial TGF-β/activin signal induces apoptosis (3, 8, 38, 40). As a typical human hair disease-related gene, TGF-β deletion in HFSCs impairs the differentiation of adjacent pigmented stem cells in human follicular keratinocyte cells (41, 42). Platelet-derived growth factor (PDGF) regulates cell growth and mesenchymal cell division, which remains the first epithelial signal in the placode (43). As a downstream target of SHH, PDGF is secreted by the epidermis, with receptors in the dermal sheath and DP, functioning in an adipose-stimulating manner to enhance HF regeneration (8). In addition, PDGF is secreted by the HF matrix during anagen and has a facilitative effect on the hair germ (8, 44). Secreted by DP, vascular endothelial growth factor (VEGF) stimulates the expression of VEGFR-2 in human epidermal cells, hence promoting their proliferation, differentiation, and migration (45). Interestingly, VEGF can directly act on DP and promote human HF growth by stimulating local blood vessels during anagen, with bFGF promoting VEGF angiogenesis (8, 46, 47). reference link : https://www.frontiersin.org/articles/10.3389/fmed.2022.863786/full Original Research: Closed access. “Glucocorticoid signaling and regulatory T cells collaborate to maintain the hair follicle stem cell niche” by Ye Zheng et al. Nature Immunology
<urn:uuid:9798149f-9c30-41b4-a77e-9cb134c059ec>
CC-MAIN-2022-33
https://debuglies.com/2022/06/24/regulatory-t-cells-interact-with-skin-cells-using-glucocorticoid-hormones-to-generate-new-hair-follicles-and-promote-hair-growth/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00405.warc.gz
en
0.906566
2,584
2.796875
3
The Kanawha River (// kə-NAW-ə) is a tributary of the Ohio River, approximately 97 mi (156 km) long, in the U.S. state of West Virginia. The largest inland waterway in West Virginia, its valley has been a significant industrial region of the state since early in the 19th century. |Counties||Fayette, Kanawha, Putnam, Mason| |• location||Ashe County, NC| |• elevation||2,546 ft (776 m)| |2nd source||Gauley River| |• location||Three Forks of Gauley, Pocahontas County, WV| |• elevation||2,917 ft (889 m)| |• location||Gauley Bridge, WV| |• elevation||653 ft (199 m)| |Point Pleasant, WV| |538 ft (164 m)| |Length||97 mi (156 km)| |Basin size||12,236 sq mi (31,690 km2)| |• location||Charleston, 56.8 mi (91.4 km) from the mouth| |• average||15,240 cu ft/s (432 m3/s)| |• minimum||1,100 cu ft/s (31 m3/s)| |• maximum||216,000 cu ft/s (6,100 m3/s)| |Progression||Kanawha River → Ohio River → Mississippi River → Gulf of Mexico| |• left||Coal River| |• right||Elk River, Pocatalico River| It is formed at the town of Gauley Bridge in northwestern Fayette County, approximately 35 mi (56 km) SE of Charleston, by the confluence of the New and Gauley rivers. It flows generally northwest, in a winding course on the unglaciated Allegheny Plateau, through Fayette, Kanawha, Putnam, and Mason counties, past the cities of Charleston and St. Albans, and numerous smaller communities. It joins the Ohio at Point Pleasant. Paleo-Indians, the earliest indigenous peoples, lived in the valley and the heights by 10,000 BC as evidenced by archaeological artifacts such as Clovis points. A succession of prehistoric cultures developed, with the Adena culture beginning the construction of numerous skilled earthwork mounds and enclosures more than 2000 years ago. Some of the villages of the Fort Ancient culture survived into the times of European contact. The area was a place of competition among historical American Indian nations. Invading from their base in present-day New York, the Iroquois drove out or conquered Fort Ancient culture peoples, as well as such tribes as the Huron and Conoy. By right of conquest, the Iroquois, Lenape (Delaware), and Shawnee reserved the area as a hunting ground. They resisted European-American settlement during the colonial years. Eventually the settlers took over by right of conquest. The river valley contains significant deposits of coal and natural gas. In colonial times, the wildly fluctuating level of the river prevented its use for transportation. The removal of boulders and snags on the lower river in the 1840s allowed navigation, which was extended upriver after the construction of locks and dams starting in 1875. The river is now navigable to Deepwater, an unincorporated community about 20 miles (32 km) upriver from Charleston. A thriving chemical industry along its banks provides a significant part of the local economy. "Ka(ih)nawha" derives from the region's Iroquoian dialects meaning "water way" or "canoe way" implying the metaphor, "transport way", in the local language. The glottal consonant of the "ih" (stream or river, local Iroquois) dropped out as settlers and homesteaders arrived. The river has also had historical alternate names, alternate spellings and misspellings including Wood's River for Colonel Abraham Wood, an English explorer from Virginia, the first European known to have explored the river in the mid 17th century. Archaeological artifacts, such as Clovis points and later projectiles, indicate prehistoric indigenous peoples living in the area from the 12,500 BC era. Peoples of later cultures continued to live along the valley and heights. Those of the Adena culture built at least 50 earthwork mounds and 10 enclosures in the area between Charleston and Dunbar, as identified by an 1882 to 1884 survey by the Bureau of Ethnology (later part of the Smithsonian Institution). Three of their mounds survive in the valley, including Criel Mound at present-day South Charleston, West Virginia. Evidence has been found of the Fort Ancient culture peoples, who had villages that survived to the time of European contact, such as Buffalo and Marmet. They were driven out by Iroquois from present-day New York. According to French missionary reports, by the late 16th century, several thousand Huron, originally of the Great Lakes region, lived in central West Virginia. They were partially exterminated and their remnant driven out in the 17th century by the Iroquois' invading from western present-day New York. Other accounts note that the tribe known as Conois, Conoy, Canawesee, or Kanawha were conquered or driven out by the large Seneca tribe, one of the Iroquois Confederacy, as the Seneca boasted to Virginia colonial officials in 1744. The Iroquois and other tribes, such as the Shawnee and Delaware, maintained central West Virginia as a hunting ground. It was essentially unpopulated when the English and Europeans began to move into the area. The first white person to travel through Virginia all the way to the Ohio River (other than as a prisoner of the Indians) was Matthew Arbuckle, Sr., who traversed the length of the Kanawha River valley arriving at (what would later be called) Point Pleasant around 1764. In April 1774, Captain Hanson was one of an expedition: "18th. We surveyed 2,000 acres (8.1 km2) of Land for Col. Washington, bordered by Coal River & the Canawagh..." This area is the lower area of today's St. Albans, West Virginia. After the Treaty of Fort Stanwix, "The Kanawhas had gone from the upper tributaries of the river which bears their name, to join their kinsmen, the Iroquois in New York; the Shawnee had abandoned the Indian Old Fields of the valley of the South Branch of the Potomac; the Delaware were gone from the Monongahela; the Cherokee who claimed all the region between the Great Kanawha and Big Sandy, had never occupied it." quoting Virgil A. Lewis (1887), corresponding member of the Virginia Historical Society. The river's name changes to the Kanawha River at the Kanawha Falls. The Treaty of Big Tree between the Seneca nation and the United States established ten reservations. This formal treaty was signed on September 15, 1797. Lewis was granted a large tract of land near the mouth of the Great Kanawha River in the late 18th century. The Little Kanawha and the Great Kanawha rivers, the two largest in the state, were named for the American Indian tribe that lived in the area prior to European settlement in the 18th century. Under pressure from the Iroquois, most of the Conoy/Kanawha had migrated to present-day Virginia by 1634, where they had settled on the west side of the Chesapeake Bay and below the Potomac River. They were also known to the colonists there as the Piscataway. They later migrated north to Pennsylvania, to submit and seek protection with the Susquehannock and Iroquois. The spelling of the Indian tribe varied at the time, from Conoys to Conois to Kanawha. The latter spelling was used and has gained acceptance over time. List of cities and towns along the Kanawha RiverEdit - Kanawha Valley people - Adena culture - List of West Virginia rivers - Little Kanawha River, an unrelated Ohio River tributary also in West Virginia - Kanawha River Valley AVA, an American Viticultural Area - USS Kanawha (AO-1)—a fleet oiler built in 1914. - Kanawha a steam-powered luxury yacht built in 1899 and owned by Henry Huttleston Rogers, developer of coal and railroad properties in southern West Virginia, including the Virginian Railway - The USAT General Frank M. Coxe built in Charleston, served as an Army transport vessel and now preserved as a floating restaurant. - West Virginia Waterways - Charleston, West Virginia metropolitan area, often called the "Kanawha Valley" by locals - Port of Huntington Tri-State - U.S. Geological Survey Geographic Names Information System: Kanawha River - accessed 2011-06-16 - United States Geological Survey; USGS 03193000 KANAWHA RIVER AT KANAWHA FALLS, WV; retrieved April 19, 2008. - layer= - Google Maps. Maps.google.com (1970-01-01). Retrieved on 2013-08-09. - Kanien’kehá:ka Onkwawén:na Raotitióhkwa Language, Kawhinawha'kae montreal, "Kentá:ke had been a Jesuit residence that receive Mohawk from the south, the newly established settlement of Kahnawà:ke was from its beginning an Iroquois community." for more information on the Kanien’kehá:ka www.kahnawakelonghouse.com/index.php?mid=2 - Kahnawáʼkye in Tuscarora (Iroquois) means "waterway", "kye" is augmentive suffix. Kaniatarowanenneh means "big waterway" in Mohawk (Iroquois). Lachler, McElwain, and Burke http://www.mingolanguage.org/ Mingo (Iroquois) etymology about boating: kaháwa' noun means boat. kényua'. This switch-interactive verb means to row a boat or more to ferry someone across a stretch of water. It belongs to the semantic fields the sea and transportation. Etymology kényua' -NYU- Verb Root. Grammatical Info Base -nyu-.Stem Class LX. Conjugation Class XX. kényua' "I row boats". kaháwa', (boat) grammatical info base -haw- Stem Class C, Prefix Class Agent, Linker Vowel ö. Note that the -h- at the beginning of this base is strong, and so does not drop out when it would come between two vowels. Varies with kahôwö'. Possessed Form akháwa' my boat. Plural Form kahawa'shö'ö boats. káhu' means "this way" or in this direction. See also Mohawk language (Dialects) According to the Geographic Names Information System, the Kanawha River has also been known as: - Big Connawas River - Big Kanawha River - Canhawa River - Chinodahichetha River - Great Canawha River - Great Kanawha River - Great Kanhawa River - Great Kanhaway River - Great Kehhawa River - Great Kenhawa River - Great Kenhaway River - Great Konhaway River - Great Konhawayriver - Kanahaway River - Kanawa River - Kanawah River - Kanaway River - Kanawhy River - Kanhaway River - Kannawha River - Keanawha River - Kenhaway River - Kinhaway River - Kunhaway River - New River - Woods River - Dilger, Robert J.; Marshall, James (21 Feb 2002). "Kanawha County History". Institute for Public Affairs, West Virginia University. Archived from the original on 2010-06-16. Retrieved 31 Oct 2009. - From Documentary History of Dunmore's War, edited by Reuben Gold Thwaites and Louise Phelps Kellogg, Madison, Wisconsin Historical Society, 1905 pp. 110-17. For text of the Journal see www.wvculture.org/HISTORY/dunmore/hanson.html - History of West Virginia In Two Parts, Philadelphia. Hubbard Brothers, Publishers. 1889. West Virginia State Historian/Archivist, Virgil A. Lewis, 1905 - 1912 (died while in the position) from Mason County – see WV Bluebook reference MC descriptions 1916–1920. (11/1/09) - "A History of the Treaty of Big Tree, and Robert Morris" by Livingston County Historical Society, O. Burnell Print, 1897 - Arthur Benke & Colbert Cushing, Rivers of North America, Elsevier Academic Press, 2005 ISBN 0-12-088253-1 - Atkinson, George W. 1876. History of Kanawha County, From. . . 1789 Until the Present Time, Charleston: West Virginia Journal Office. - Braley, Dean (1993). The Shaman's Story, West Virginia Petroglyphs. St. Albans. ISBN 0-9638377-0-2. - Dayton, Ruth Woods. 1947. Pioneers and Their Homes on Upper Kanawha, Charleston: West Virginia Publishing Company. - Dickens, Roy S., Jr.; Mckinley, James L. (1979). Frontiers in the Soil: The Archaeology of Georgia. LaGrange, Georgia: Frontiers Publishing Company. - Laidley, W. S. 1911. History of Charleston and Kanawha County, West Virginia, Chicago: Richmond-Arnold Publishing Company - Lewis, Thomas M. N. and Madeline Kneberg. 1958. Tribes That Slumber, Knoxville, TN: The University of Tennessee Press - McMichael, Edward V. 1968. Introduction to West Virginia Archeology, Morgantown, WVA: West Virginia Geological and Economic Survey - Nabokov, Peter; Easton, Robert (1989). Native American Architecture. New York: Oxford University Press. ISBN 0-19-503781-2. - Potter, Eloise F.; Funderburg, John B. (1986). Native Americans: The People and How They Lived. Raleigh, North Carolina: North Carolina State Museum of Natural Sciences. ISBN 0-917134-10-9. - Rhodes, Captain Rick, The Ohio River in American History and Voyaging on Today's River. Heron Island Guides, 2007, ISBN 978-0-9665866-3-3 - Thomas, Cyrus. 1894. Report on the Mound Explorations of the Bureau of Ethnology. Smithsonian Institution Press - Wavra, Grace (1990). The First Families of West Virginia. Huntington: University Editions, Inc. ISBN 1-56002-007-5. - Weatherford, Jack M. (1988). Indian Givers. New York: Crown Publishers, Inc. ISBN 0-449-90496-2.
<urn:uuid:cc1a72d8-1f9d-40ca-a24a-b178773d4211>
CC-MAIN-2022-33
https://en.m.wikipedia.org/wiki/Kanawha_River
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571911.5/warc/CC-MAIN-20220813081639-20220813111639-00205.warc.gz
en
0.886444
3,494
3.3125
3
Did you know that Belgium became an independent state on October 4th 1830? A country located in Western Europe famous for its chocolate, waffles and beer production, as well as its medieval architecture and rich culture, has so many more interesting facts. In this article we will cover our top 10 interesting facts about Belgium (that you may not know). - Etymology of the name - Celtic Warriors the Gauls - Official language of Belgium - World’s Smallest City - World Record Breaker - Nouveau Art in Belgium - Founding Members of the EU and NATO - Belgian Culture and Cuisine - Famous People You Didn’t Know Were From Belgium - The Longest Bar in the Europe - Bonus Fact! Facts about Belgium: #1 Etymology of the name To kick offour list of facts about Belgium, we thought it best to start from the beginning; the origin of the country’s name. Belgium’s name originates from one of the earliest known tribes that settled in modern day Belgium and parts of Northern France, The Galliga Belgica. The Romans recognised the cultural differences of the Belgica Gauls – their unique language, laws and customs- and so they called the province ‘Belgae’. The origins of the name of Belgium can further be explained, Belgae is believed to have derived from the Celtic words Belg and Bolg which means to swell with anger. The Romans recognised that the Gallia Belgica tribe were the most difficult to conquer; they were fierce and brave and even after being conquered, resisted and revolted the Roman empire. Facts about Belgium #2: The Gauls/Galliga Belgica Continuing on our list of facts about Belgium, we are discussing one of Belgium’s most ancient tribes; the Gallia Belgica. The Gauls were Celtic people who lived during the Iron and Roman Age. They called themselves Celts, it was actually Jullius Caeser who called them the Gaili or Gaul tribe. Much of what we know about the Gaul comes from the Ancient Roman Empire, who sought to take over the land. Julius Caeser, leader of the Roman empire came to conquer the larger tribe of the Gauls. The Gaul region was comprised of three distinct tribes, the Gallia Belgica, Gallica Celtica and Aquitania. The Gallia Belgica was the most northern Region and was comprised of Modern day Belgium as well as Northern France and parts of Luxembourg, The Netherlands and Germany. The Gallia Celtica occupied what is now known as parts of France, Switzerland, Luxembourg and parts of Western Germany, while Aquitania was part of present day South-West France. This Celtic-Germanic influence made the Belgica tribe notably distinct from others in the Gaul region. Caeser noted they were distinct in their language, laws and customs. Facts about Belgium #3: The Official language of Belgium Belgium (fittingly the third item in our list of facts about Belgium,) has three official languages, French Dutch and German. Belgium is called ‘de Belgique’ in French, ‘Belgien’ in German, and ‘België’ in Dutch or Flemish. English is also widely spoken throughout the country, especially in tourist areas and the capital city Brussels where many EU workers are based. You may be wondering exactly why Belgium has 3 official languages. Geographically, Belgium is located beside France, Germany and The Netherlands and before its independence, it was controlled and influenced by these countries at different times. Simply put some parts of modern day Belgium speak Flemish or Dutch (60% of population) such as the Flemish community found mostly in northern regions of Belgium such as Flanders. Other locations such as the southern Wallonia region speak French (40%) while some in the Eastern province of Liege speak German (less than 1% of population). This is a oversimplification of course, as many people are multi-lingual and cities such Brussels are multicultural and diverse, however it is interesting to examine how neighbouring countries have influenced the primary language in a region. Facts about Belgium #4: The World’s Smallest City Durbuy in Belgium is a fine contender for the smallest city in the World and is one of our favourite facts about Belgium. A prosperous medieval town, Durbuy was elevated to city status in 1331 by John I, Count of Luxembourg. In the Low Countries -Belgium, Luxembourg and the Netherlands- towns were granted city status during the medieval period, which allowed certain privileges. The reason for this is that feudal landlords had financial problems, so they decided to allow towns to buy back ‘freedoms’ to ease their financial woes. Durbuy was one of these towns and enjoyed the benefits of being a city, such as a defensive barrier constructed around them, the ability to trade and other personal freedoms. Today Durbuy is proud of its city status, and with only 400 inhabitants in the small town, they claim to be the smallest city in the world! Apart from this interesting fact, Durbuy is a popular destination, for its charming medieval architecture; stepping into the town feels like you are in fairy tale. Beautiful nature surrounds the town adding to its charm. Facts about Belgium #5: World Record Breaker Definitely one of the most absurd facts about Belgium on our list is the country’s unusual world record. In 2011 Belgium made history as the longest period of time in which a country has went without an elected government after 589 days. If you think that’s Interesting, Belgium broke their own record again in 2020; this time it took 644 days for a federal government to be formed! Facts about Belgium #6: Art Nouveau in Belgium As we have passed the halfway point on our list our facts about Belgium, we decided to look at why Belgian architecture is so unique. Belgium has arguably the best display of the Art Nouveau style in the world. Art Nouveau is a French term that means New Art in English. Art Nouveau was implemented in everything from fine art, to architecture and even applied art. Its aim was to modernize art and bridge the gap between fine art and everyday or applied art, such as furniture, product design and interior decoration. The style encompasses natural floral and stem motifs to create flowing tendrils or a curved line effect, that frames pieces of art and buildings in an abstract yet satisfying way. Art Nouveau was all about implementing elements of the natural world to creative cohesive, ‘flowing’ styles. It was also distinct in its willingness to embrace modernity, by using untraditional means and materials to create the art. Art Nouveau became an established style from 1890-1910. During the two World Wars many Art Nouveau styled buildings were destroyed and lost forever. Even before the first World War, Art Nouveau had been replaced by Art Décor. The result of these two factors is that the style of Art Nouveau is a scarce. Fortunately many Art Nouveau architectural styles can be found in Belgium, particularly in Brussels. Hôtel Tassel and Hôtel Slovay, designed by Victor Horta and are considered to be prime examples of the Art Nouveau architectural style. The two hotels have become UNESCO world heritage sites, ensuring their preservation. Facts about Belgium #7: Founding Members of the EU and NATO Many of us know that Belgium are members of the EU and NATO, but did you that they were founding members of both organisations? Another worthy contender in our top historical facts about Belgium, the role the small country has played on a global scale is indisputable. Belgium is one of 6 founding members of the EU, and is often called the ‘heart of Europe’. Belgium’s capital Brussels is considered the de facto capital of the European Union by many as it is home to many important European Union buildings, such as The European Parliament, The Council of the European Union and the European Commission to name a few NATO was founded in 1949, Belgium being one of 12 of the founding members. Facts about Belgium #8: Culture and Cuisine You can’t talk about facts about Belgium without mentioning food, but did you know that one of the most popular fried foods in the world originated in Belgium? When American soldiers stationed in a French-speaking part of Belgium tasted fries (or frites/chips as they’re also known) for the first time, they believed themselves to be situated in France. They nicknamed the dish ‘French fries’, and so one of Belgium’s most iconic foods would forever be thought of as a French creation. Legend has it that the original idea for frites came from locals in Liège. People would catch fish by the river and fry them, however during the Winter the lake would freeze over, and the absence of fish led to potatoes being fried instead. Would you like to try Belgian fries? You can see the recipe in the video below! Belgian fries are distinctly crispy, fried twice for even more flavour and traditionally served with mayo. Frites are held so dearly in Belgium that they have been declared as part of the UNESCO cultural heritage! Facts about Belgium #9: Famous Belgian People You Should Know About Any list of facts about Belgium is incomplete without mentioning some of the people who were born or lived there. In this list we have included famous and highly influential people, you may be familiar with their work but may not know of their Belgian roots. Did you know that Audrey Hepburn, Hollywood icon was born in Belgium? The international movie star, fashion icon and humanitarian was born in Brussels in 1929. Hepburn was fluent in six languages; English, Dutch, French, Spanish, German and Italian. She lived in many places around the world and survived WWII. After starring in movies such as Breakfast at Tiffany’s and My Fair Lady, Hepburn went on to devote her life to humanitarian work, working closely with UNICEF. She received the United States’ highest civilian award, the Presidential Medal of Freedom, in 1992 One of the most intriguing facts about Belgium is about the life of the saxophone inventor Adolphe Sax. Born in Belgium, Adolphe invented the saxophone in Brussels and patented his invention. His skill in making the saxophone was unparalleled, even when the patent was up, people spent years failing to achieve the same quality that Adolphe had achieved; even his children could not replicate it to the same standard. Adolphe had an interesting life, avoiding many close calls with death, from childhood illnesses to his workshop being burnt down and even surviving an attempted assassination. Sax survived many life threatening events and would eventually die of old age. bonus fact: His saxophone was banned in churches by the Vatican! Georges Lemaître is credited with discovering the modern Big Bang Theory in 1931. Not only a brilliant scientist Lemaître was also a devout Catholic priest who deeply believed in both science and religion. He did not try to make the sense of the two together, instead he kept his convictions entirely separate, respecting the importance of each to him. Considering the importance of his work, there is no doubt in our minds that George Lemaître and his scientific theory deserves a place in our list of facts about Belgium. Wouter André “Wally” De Backer was born 21 May 1980 in Brussels, before the family moved to Australia 2 years later. One of his most famous songs ‘Somebody That I Used To Know‘ has been certified 14x Multi-Platinum. The song won 2 Grammys for best pop duo/group performance and Record of the Year as well as the album Making Mirrors, winning best Alternative Music Album in 2013. At the time of writing, The official music video for ‘Somebody That I Used To Know’ has over 1.9 BILLION views on YouTube alone! Facts about Belgium #10: The Longest Bar in Europe One of the most exciting facts about Belgium that made the list is that the largest bar in Europe is found in Leuven, just outside of Brussels! The Old Market Square or Oude Markt is famous for being the longest bar in Europe. The bar is comprised of multiple pubs, restaurants and cafés side by side of each other. As Leuven is a university town, the Oude Markt has a lively atmosphere, with many Belgian and International students going there to relax at the weekend. Why not take a 360 degree tour of the Oude Markt? Inbev’s Stella Artois brewery is also located in the city guaranteeing that most of your favourite beers will be available on tap. With nearly 50 different bars on one street, you may need longer than a weekend to visit them all! There were so many interesting facts about Belgium that we just had to include one more! Our Bonus fact is all about Belgium’s love of comics. Statue of a Smurf in Belgium. From the Adventures of Tintin to the Smurfs, some of our most favourite characters were created in Belgium. Brussels in particular has a longstanding history of creating comic strips and characters, so much so that large murals of iconic characters can be seen all around the city; a memoir of sorts to the city’s famous illustrations and the artists who created them. Pictured above is a mural of Tintin, his faithful companion Snowy and Captain Haddock, no doubt on some wild adventure! During WWII, American comics were banned in German occupied France and Belgium, giving rise to a surge in Franco-Belgium comic creations, such as Belgian magazine Spirou. The Comic Strip Route recognises the achievements of Belgian artists. It is a great way to spend time in Belgium, taking in the culture of the city for free of charge. Iconic characters such as Tintin and the Smurfs were created by Belgian artists George Remi (under the pen name Hergé) and Piere Culliford respectively. Has this article peaked your interest in Belgium? If so, why not check out our article on the best things to do in Belgium, broken down city by city for the perfect trip! We’ve also recommended the cities you have to visit if you’re on a tight schedule. Did you know all of the facts about Belgium that we listed? Have we missed any other interesting facts about Belgium (There were so many that it was hard to choose just 10!), if so please let us know in the comments!
<urn:uuid:9f4897ef-0cd9-41ae-a43c-1ce8d43e7e28>
CC-MAIN-2022-33
https://www.connollycove.com/top-10-interesting-facts-about-belgium/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00601.warc.gz
en
0.970776
3,090
2.625
3
Mr. VanEngen, a member of the Protestant Reformed Church of Hull, Iowa, is a practicing attorney. In December of 2005, the Federal District Court for the Middle District of Pennsylvania issued its decision in the case of Kitzmiller v. Dover Area School District.¹ The case received national attention as one of the first challenges to the teaching of “Intelligent Design” as an alternative to the theory of Evolution. The district court’s opinion was not appealed, and therefore the decision is not binding precedent for other districts. However, the decision and the rationale behind it have already been relied on by others in making challenges to perceived intrusions of religion into the public sector. This article will first examine the facts of the Kitzmillercase, and then the history of the struggle between teaching of evolution and creation in the public schools. Finally, we will look at the implications of the decision and the reasoning behind it for Christians. The facts of the case are as follows. On October 18, 2004, the Board of the Dover Area School District (DASD) passed a resolution stating: Students will be made aware of gaps/problems in Darwin’s theory and of other theories of evolution including, but not limited to, intelligent design. Note: Origins of Life is not taught. The Board later announced that students in ninth grade biology class would be read a statement stating: The Pennsylvania Academic Standards require students to learn about Darwin’s Theory of Evolution and eventually to take a standardized test of which evolution is a part. Because Darwin’s Theory is a theory, it continues to be tested as new evidence is discovered. The Theory is not a fact. Gaps in the Theory exist for which there is no evidence. A theory is defined as a well-tested explanation that unifies a broad range of observations. Intelligent Design is an explanation of the origin of life that differs from Darwin’s view. The reference book, Of Pandas and People, is available for students who might be interested in gaining an understanding of what Intelligent Design actually involves. With respect to any theory, students are encouraged to keep an open mind. The school leaves the discussion of the Origins of Life to individual students and their families. As a Standards-driven district, class instruction focuses upon preparing students to achieve proficiency on Standards-based assessments. The theory of Intelligent Design (ID) is a theory that the world was made by some intelligent being who created all things. Some of the parents of children in the school district filed suit to stop the teaching of ID. They argued that it was actually thinly veiled creationism, was not actually science, and was unconstitutional under the Establishment Clause. The Legal History of Evolution in the Classroom To understand the current legal landscape surrounding the issue of the public teaching of creation or evolution, one must look at the history and development of Supreme Court jurisprudence in this area. The court’s 139-page decision in Kitzmiller discusses this history in some detail. A brief review of this history reveals a changing trend from a time when teaching creation was accepted and teaching evolution was illegal, to the point that the opposite is true. The court noted that “[t]he religious movement known as Fundamentalism began in nineteenth century America as a response to social changes, new religious thought, and Darwinism.”² The court attributed laws prohibiting the teaching of evolution to this rise of fundamentalism. In 1925, this culminated in the famous Scopes “monkey trial,” in which a public school teacher was tried and convicted for teaching evolution.³ In 1968, the legal landscape changed dramatically when the United States Supreme Court struck down Arkansas statutes prohibiting the teaching of evolution.4 Proponents of creation sought at least to counterbalance the teaching of evolution by introducing creation as an alternative, but the courts rejected this as violating the Establishment Clause.5 Opponents of evolution then sought to introduce creation as a form of science, but the United States Supreme Court ruled in 1987 that this too violated the Establishment Clause.6 The prohibition against teaching evolution had come full circle to a prohibition against teaching creation. The Court’s Decision The court in Kitzmiller ruled that the DASD Board’s policy regarding ID violated the Establishment Clause as well. The court found that the resolution and statement, as quoted above, promoted biblical Christianity over other religions. In reaching this conclusion, the court applied both the Endorsement Test, which has been used in some First Amendment cases, and the three-part test set out in the Lemoncase.7 The court looked at the context in which the policy arose. The court considered evidence of Board members’ statements in newspapers, board minutes, and other sources to find that there had been statements that certain board members wanted to get Christianity back into the public school classroom. The court also considered the traditional battle of fundamentalism against the teachings of evolution. Based on this evidence, the court found that the “objective observer” under the Endorsement Test would know of the opposition to evolution and interpret the board’s actions as an endorsement of Christianity. The court then spent a considerable amount of time addressing the “purpose” of the board’s actions under the Lemon test. The court looked at the actions and statements of individual board members, such as an offering collected by the church of one board member for the alternative textbook, Of Pandas and People. The court found that all of this evidence demonstrated that the policy had a religious, rather than secular, purpose. The court also ruled that the effect upon the children of the school district was to advance Christianity over other religions, in violation of the “effect” prong of the Lemon test. Analysis of the Court’s Decision The court’s decision has the effect of keeping the teaching of ID out of the classroom, but the public school classroom has never been the best place to teach children about the origins of the universe. Instead, the most troubling aspect of this decision is that it is part of a continuing line of case law in which the courts fail to see or acknowledge that the state endorsement of evolution impinges on the religious freedom of Christians, which is also a violation of the First Amendment. Under the court’s analysis, any public action supported by “fundamentalist” Christians is somewhat suspect, because fundamentalism is by nature a reaction against modern philosophies. Case law, as interpreted by theKitzmiller court, demonstrates a presumption that fundamentalist Christians seek to oppose evolution and replace it with biblical teachings. This places Christians at a disadvantage because, when the “objective observer” element of the Endorsement Test, or the “purpose” prong of the Lemon test are applied, there is almost a presumption that action by Christians is taken to promote biblical Christianity over other religions. In this case, the DASD policy was strikingly neutral on its face, merely indicating that other theories were possible and that evidence does not exist to support every part of the theory of evolution. The statement certainly does not advance a belief in biblical creation as we know it. But the court looked at the prior case law prohibiting any teaching of creation and the intentions of Board members as gleaned from newspaper articles, board minutes, and testimony of others, and ruled the policy unconstitutional. Even more disturbing is the establishment of evolution as official state teaching, regardless of its incompatibility with biblical Christianity or any other religion. The DASD policy as stated merely allowed room for ID, Creation, or other theories. The court in Kitzmiller purported to analyze the criticisms of evolution and ID, and proceeded to rule that while ID was unscientific, evolution had no real “gaps” that could generate doubt about its truth. The court took great pains to explain that it was not taking a position on whether outside forces produce changes in the world,8 but then proceeded to confirm the theory of evolution as the only theory that could legally be taught. This logic is striking in that it is the equivalent of saying “It is possible that God created all things, but the schools will only teach that He did not.” No alternative to evolution could even be suggested. The Kitzmiller case is unique in that some of the DASD board made very strong statements about getting Christianity into the public schools. It is possible that a policy of suggesting an alternative to evolution could be upheld if such strong language were not present. But under the reasoning of the Kitzmiller case, any available information will be searched to determine whether the policy could possibly be motivated by fundamentalist thinking or opposition to evolution. This leaves Christians in the position of having to hide their true motives in desiring that an alternative to evolution be allowed. Although this reasoning has been limited thus far to public school teaching about evolution, the rationale could apply just as easily to other areas of public life. Current case law in this area is extremely one-sided in its allowing the promotion of evolution at the expense of the free exercise of Christianity or other religions. This is illustrated by a quote from the Kitzmiller court in describing the effect of the DASD policy on the families protesting the policy. The court stated: Plaintiffs believe that ID is an inherently religious concept and that its inclusion in the District’s science curriculum interferes with their rights to teach their children about religion. (Citations omitted). Plaintiffs additionally testified that their children confront challenges to their religious beliefs at school because of the Board’s actions, that the Board’s actions have caused conflict within the family unit, and that there is discord in the community.9 The exact same argument could be made about the effects of the teaching of evolution on Christian families. If parents wish to teach their children that a triune God created all things by merely calling them into being, that instruction is undercut by the teaching of the public school. The children are confronting challenges to their religious beliefs unless the children believe the instruction they are given in school, in which case there would be conflict within the family unit. The Kitzmiller court quotes Phillip Johnson, the founder of the ID movement, as saying that the “Darwinian theory of evolution contradicts not just the Book of Genesis, but every word in the Bible from beginning to end. It contradicts the idea that we are here because a creator brought about our existence for a purpose.” 10 However, in the court’s view, this statement only proves that Christianity is incompatible with evolution, and therefore must not be allowed in the classroom. The Kitzmiller court’s concern for parental instruction seems also to conflict with the ruling in the case of Fields v. Palmdale School District,11 discussed in this rubric in the March 1, 2006 issue of the Standard Bearer. In that case, the Ninth Circuit Court of Appeals dismissed parents’ complaints that their children were given information of a sexual nature because the right to control their instruction “does not extend beyond the threshold of the school door.” The court’s decision in Kitzmiller illustrates a trend in American jurisprudence in which courts fail to see intrusions on Christians’ free exercise of religion by theories such as evolution. When Christians seek to leave room at least for the exercise of Christianity, courts suspect that this is an attempt to force Christian teachings in place of the supposedly “neutral” teachings of the world. The dominance of Judeo-Christian thought in public life seems to be steadily being replaced with philosophies and worldviews which are incompatible with Christianity. ¹ Kitzmiller v. Dover Area School Dist., No. 04cv2688 (M.D.Penn. filed Dec. 20, 2006). ² Kitzmiller, at 7-9. ³ Scopes v. State, 154 Tenn. 105 (1927). 4 Epperson v. Arkansas, 393 U.S. 97 (1968). 5 Daniel v. Waters, 515 F.2d 485 (6th Cir. 1975). 6 Edwards v. Arkansas, 482 U.S. 578 (1987). 7 Lemon v. Kurtzman, 403 U.S. 602 (1970). 8 Kitzmiller, at 82. 9 Kitzmiller, at 129. 10 Kitzmiller, at 27. 11 Fields v. Palmdale School District, No. 03-56499 (Ninth Cir. filed Nov. 2, 2005).
<urn:uuid:178a972f-4919-4251-b11d-72e4139ecab2>
CC-MAIN-2022-33
https://sb.rfpa.org/evolution-the-only-religion-allowed-in-public/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00401.warc.gz
en
0.960608
2,600
3.0625
3
15 Words and Phrases That Perfectly Defined 2020 It has been a year unlike any other—and that has spurred the use of new words and resurrected old ones to place them in our everyday vernacular. Every editorial product is independently selected, though we may be compensated or receive an affiliate commission if you buy something through our links. Ratings and prices are accurate and items are in stock as of time of publication. A year in words One year ago, if someone were to tell you even just a handful of the events that would take place in 2020, it would have been very hard to believe. But between constant natural disasters on both coasts (and basically every other part of the country), one of the most bizarre elections in American history, massive civil rights demonstrations nationwide, murder hornets, international travel halted—and yes, the pandemic—we don’t have the time to process one piece of news before the next thing happens. There’s really no way to adequately wrap up the year, but here are 15 words and phrases that perfectly define 2020. And while you’re here, read about some other reasons why 2020 might have been the wake-up call we needed. What else could we have started this list with? Since the novel coronavirus first started making the rounds in China back in December, it has dictated almost every aspect of our lives. Technically, the last pandemic that hit the United States was the H1N1 pandemic of 2009. And while it was certainly serious—claiming the lives of an estimated 12,500 people in America, according to the Centers for Disease Control and Prevention—it didn’t affect our lives the way COVID-19 has. To find a pandemic of this magnitude, you have to go back more than a century, to the 1918 flu pandemic, which also involved large-scale closures and mask-wearing. The concept of public health has been around much longer than 2020, but for a lot of people, this year was the first time they really had to think in terms of how their own behaviors can impact other people’s health. The CDC Foundation defines “public health” as “the science of protecting and improving the health of people and their communities.” And according to Amelia Burke-Garcia, PhD, program area director at NORC at the University of Chicago’s Public Health Department, the advent of the COVID-19 pandemic has brought the role of public health to the forefront—perhaps in a way that we have not experienced before. “The country is responding to the pandemic with mitigation efforts, such as mask-wearing, social distancing and contact tracing, efforts to develop an effective vaccine, and by providing mental and emotional health support,” she tells Reader’s Digest. Burke-Garcia is also the project director for How Right Now, an initiative supported by the CDC Foundation which aims to address mental health, coping, and resilience during COVID-19—all important components of public health. “Today, there is a critical role for the field of public health to play,” she explains. “To stop the spread of COVID-19 and move toward greater health equity, everyone can play a role. We must work together to ensure resources are readily available to maintain and manage physical and mental health.” Remember when most people didn’t know what PPE stood for? It may only have been a few months ago, but it felt like another lifetime. In the unlikely event that you don’t know, PPE stands for “personal protective equipment,” and includes clothing, masks, goggles, and other equipment that is designed to protect the wearer from injury or infection, such as COVID-19. According to Karen Stollznow, PhD, a linguist and author of On the Offensive: Prejudice in Language Past & Present, PPE is one of several examples of technical terminology that has been incorporated into the everyday language of the general public, as a necessity. Others include “intubate” and “asymptomatic.” Meanwhile, get used to seeing people wearing masks and gloves, including food service workers. Back in March 2020, at the beginning of the COVID-19 outbreak in the United States, public health officials, including those at the CDC, issued guidelines to help slow the spread of the virus. This was the period when we were told not to wear face masks because they didn’t help (which isn’t true), and we should save them for essential workers. At that point, we were instructed to do two things: frequently wash our hands for at least 20 seconds, and practice social distancing. Basically, social distancing involves keeping a safe distance from other people (other than those you live with), which is usually considered around six feet. Over the course of the next few months, the term “physical distancing” began to replace “social distancing.” Though both phrases refer to the idea of keeping physical space between yourself and other people, some public health experts were concerned that “social distancing” might suggest that any type of socializing is discouraged. Clearly, that’s not the case, and in fact, spending time with friends and family is a crucial part of our mental and emotional health—we just have to make sure to socialize virtually, or from at least six feet away from others. Social distancing is also important when you travel. Black Lives Matter The organization and phrase “Black Lives Matter” has been around since 2013, when the movement was founded in response to the acquittal of the person who murdered Trayvon Martin, a 17-year-old Black teenager fatally shot in Florida in 2012. According to the Black Lives Matter Foundation, Inc’s website, their “mission is to eradicate White supremacy and build local power to intervene in violence inflicted on Black communities by the state and vigilantes.” Following the murder of George Floyd by Minneapolis police officers on May 25, 2020, demonstrations against police killings and racial injustice sprung up in cities around the United States, as well as the rest of the world—many of which used “Black Lives Matter” as a rallying cry against white supremacy. This upset many people who insisted that “all lives matter,” clearly missing the entire point. “But the point of Black Lives Matter isn’t to suggest that Black lives should be or are more important than all other lives,” German Lopez wrote for Vox in 2016. “Instead, it’s simply pointing out that Black people’s lives are relatively undervalued in the United States—and more likely to be ended by police—and the country needs to recognize that inequity to bring an end to it.” Here are some of the most powerful signs seen at Black Lives Matter protests. Living during a pandemic means getting used to thinking in terms of germ exposure, whether it’s at work, a family gathering, or in a public restroom. Without even realizing what we’re doing, a lot of us now instinctually scan our environments for “high-touch” surfaces— and then avoid them. As a result, there has been a lot of interest in “contactless” products and services. “‘Contactless’ is a buzzword that refers to technology or procedures that are designed to reduce physical contact, like payment methods such as Apple Pay, or curbside pick up for shopping,” Stollznow tells Reader’s Digest. Even though contactless payment options in some stores and touchless faucets in some restrooms have been around for a few years, they went from a “nice-to-have” to “mandatory equipment” in many places—especially cities. Here are 12 other ways coronavirus changed the way we shopped forever. Between the major loss of life resulting from the pandemic and increased awareness of systemic racism and police violence, some people have tried really hard to make it seem like they’re a good person—while putting in very little effort. This is called “virtue signaling,” and is most closely associated with posts on social media by individuals, companies, or organizations, essentially co-opting social-justice-related events. When a person or entity is called out for virtual signally, Stollznow says, it suggests they are only backing an idea or cause to look good in the eyes of others. “The term implies that they don’t truly believe in the cause they publicly support,” she wrote in a recent article in The Conversation. “They are acting out of bad faith, because they have an ulterior motive.” To get a better idea of some of the ongoing social issues around the world, check out this article on 13 human rights that still aren’t universal, but should be. After having our lives disrupted for more than six months, it makes sense that we’d try to find joy anywhere we can. And as it turns out, that includes other people’s misfortunes. Yes, we’re talking about everyone’s favorite non-translatable word from another language: schadenfreude. It comes to us from the German language, which excels at hyper-specific terms. In this case, it’s a combination of the words “schaden,” meaning damage or harm, and “freude,” meaning joy or pleasure. So what does schadenfreude have to do with 2020? This one’s fairly recent: according to Merriam-Webster, searches for the word “schadenfreude” went up by a staggering 30,500 percent on October 2nd, following the announcement that President Donal Trump and first lady, Melania, both tested positive for COVID-19. Who better to address the stereotype of a “Karen” than a linguist named Karen? As (Karen) Stollznow explains, it went from being a name to being a stereotype, an insult, and a meme. “The term typically refers to a middle-class, middle-aged White woman who is obnoxious and entitled in her behavior, and she is often racist,” Stollznow wrote in a July 2020 post on the Cambridge Core blog. A Karen’s signature move is asking to “speak with the manager” over a relatively petty (or in some cases nonexistent) grievance. And though calling someone a “Karen” has been around for a few years, it really took off in 2020, thanks to a combination of the nationwide movement against racial injustice (and therefore, many opportunities for someone to be racist) and, of course, the COVID-19 pandemic. As Stollznow notes, a “Karen” may not have a good understanding of public health, and therefore may oppose mask-wearing and social distancing, or be an anti-vaxxer. Ultimately, though, Stollznow says that “Karen” has become a gender stereotype, “and as a preconception about attributes or characteristics of women, it can be harmful.” Here are 12 other expressions you didn’t realize were sexist. When the pandemic and lockdown first started, people tended to fall into one of two categories: those who were adjusting to working from home and the rest of their responsibilities, and those who (for whatever reason) found themselves bored and with a lot of extra time on their hands. With nowhere to go and nothing to do, it seemed like the ideal time to tackle the cleaning, organizing, and other home improvement projects we’ve been putting off (sometimes for years). This is now referred to as “quarancleaning.” Up until 2020, when most people thought of a quarantine, it was usually in a historical context, like isolating people who had the plague, tuberculosis, or Hansen’s disease (formerly known as leprosy) from the rest of the population. Now, the word “quarantine” is applied much more loosely, incorporating everything from self-isolating when you’re sick, to referencing all the time you’ve been spending at home over the past seven months. But not everyone has spent the past several months at home: here are 13 of the strangest places people quarantined during the pandemic. No, a “superspreader” is not someone who is particularly talented at making peanut butter and jelly sandwiches (unfortunately). According to Stollznow, “a ‘superspreader’ is an event or individual to which outbreaks of COVID-19 can be traced.” Examples include college parties, conferences, religious gatherings, and White House events. “Looking at this through a modern lens, Typhoid Mary could be considered a ‘superspreader’ of her day,” Stollznow explains. Terms like “superspreader” define 2020 because of their connection to the novel coronavirus. “In these times of the pandemic—the major theme of this year—our health, safety, and very survival rely upon being able to talk about these concepts,” she adds. “As a society, these terms represent our considerations, concerns, and fears.” Ideally, if/when we make it past the COVID-19 pandemic, we’ll be more aware of our ability to spread other infectious diseases to others. Here are 13 other everyday habits that could (and should) change forever after coronavirus. Along with “Karen,” calling someone a “covidiot” is one of the most prominent insults of 2020. A combination of “COVID” and “idiot,” a “covidiot” is a person who ignores public health advice related to the COVID-19 pandemic. Even though public health is now a more prominent part of our collective consciousness than any previous point in our lifetime, the concept isn’t clicking with everyone. The idea of potentially limiting our own freedom and autonomy—in the form of wearing uncomfortable masks and giving up many aspects of our social lives for several months—for the good of our fellow humans, isn’t something that those considered “covidiots” are taking seriously. Early on, the term was also used to describe the people hoarding toilet paper, hand sanitizer, and cleaning supplies creating shortages for everyone else. And though it’s still not clear when things will go back to normal, here’s what a post-coronavirus life could look like. This has been the year of everything “going virtual.” From doctor’s appointments to meetings with attorneys and accountants to real estate viewings, things we’d always have to do in-person have now moved online. And while there were several video conferencing services used before the pandemic, one rose to the top: Zoom. “Zoom” is an example of a brand—like Xerox and Hoover—that not only replaces the actual term for something (in this case, video conferencing), but has become so ubiquitous that it has achieved verb status. In other words, you can attend a meeting via Zoom, or you could set up a time to Zoom with your aunt. For more examples of our shift to living online, here are 14 things that could stay virtual forever. Flatten the curve Even though most of us don’t have formal public health training, we have been getting more familiar with the discipline’s lingo in 2020. This includes the term “flatten the curve,” which refers to slowing the spread of an illness causing a pandemic so as not to overwhelm the hospital system. According to Global Language Monitor, a data research company that documents, analyzes, and tracks trends in language usage worldwide, “flatten the curve” ranked eleventh on their list of the top English words of 2020. When talking about flattening the curve, public health officials and politicians—most notably New York Governor Andrew Cuomo, who loves a good chart—usually broke out a graph showing the rise in cases in a particular area, alongside its hospital capacity. The idea behind flattening the curve is to keep the infection rate slow and steady, rather than a steep incline where everyone gets sick at the same time, and there aren’t enough hospital beds, staff, or resources to care for everyone at once. In addition to mental and emotional health, we’ve been hearing a lot about “resilience” in 2020. In short, resilience describes our ability to bounce back, cope with adversity, and endure during difficult situations, Burke-Garcia explains. “People across the United States and around the world are experiencing something that many have not had to live through in their lifetimes,” she says. “The onset of the pandemic has brought people’s ability to be resilient into focus. According to [data from] How Right Now, people need to ensure their basic needs are met (food and housing security), social interaction and support, and online mental health support in order for them to be resilient amid the COVID-19 pandemic.” - Karen Stollznow, PhD, a linguist and author of the forthcoming book, On the Offensive: Prejudice in Language Past & Present. - Amelia Burke-Garcia, PhD, program area director at NORC at the University of Chicago and project director for How Right Now. - Vox: “Why you should stop saying “all lives matter,” explained in 9 different ways” - The Conversation: ‘Virtue signalling’, a slur meant to imply moral grandstanding that might not be all bad
<urn:uuid:882b5c43-4340-44b8-a633-12bab38b0dc5>
CC-MAIN-2022-33
https://preprod.rd.com/list/words-and-phrases-that-defined-2020/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00001.warc.gz
en
0.963525
3,827
2.625
3
Delivery in day(s): 5 Diploma in Business Unit Number and Title Unit 23 Human Resource Training and Development Human resource department is responsible for the success of the organization by providing training and development opportunities to improve to skills of an individual or a team. Training and development plays a vital role in an organization for every level of employees including junior staffs and senior executives. Learners need to understand the importance of training and development practices done by the staff for developing their skills and knowledge. Training creates costs for the organization and managers need to conduct training and development programs within the budgets. Training helps an individual to convert the theoretical knowledge into practical aspect that can be applied at workplace. The result of trainings needs to be evaluated. Managers have adopted some suitable ways for measuring the impact of training and development programmes. It is important to manage the training cycle in the organization so as to provide correct up- to- date skills and knowledge to the employees that helps them in doing their job in an effective way. Every person has its own learning style. It is not necessary for everyone to have same learning style. It differs from each other. People are classified according to their learning style. A single person can have more than one learning style. They use different learning style according to different situation. Some of them are used for a specific circumstance, so it becomes difficult to use another learning style at that situation. Learning styles are influences by the behavior that separates two individuals from each other.(Mankin, 2009) There are different learning styles- It has four learning styles- Learning curve refers to a graphical representation that reflects the pace of improvement of an individual in reference to the performance of a task.(Nathan, 2006) It also shows the time involved in learning process. It is used to measure the capacity of an employee to complete a specific task successfully within the given time period. An organization can plan effective training and development programs to understand the several learning styles of the employees. It shows an ascending or descending order on the basis of worker’s performance in relation to acquiring skills.(Glautier, 2013) Learning transfer- Learning transfer refers to transfer the learning from a learning setting so that it can be used in a particular activity. Administration of these techniques has been done at the time of training. For using a technique in an effective way, it is necessary to transfer learning work according to an individual’s ability. Learning transfer is to apply the school knowledge in office work to gain appreciation from the superiors. A learner should focus on it as the program is conducted for promoting learning process.(Kim, 2014) The main objective behind training is to make workers work in a more effective way. Induction programs are not considered that important until and unless they facilitate learning’s. These situations include feedbacks given to the workers that help them in successful accomplishment of activities. It also focuses on the needs of the workers and gives them a chance to experience new things to facilitate the learning practices. The training instructor note downs the tasks to be learnt by the training programs and results of the same to ensure that it must be relevant according to the job. Learning outcomes-(Bhattacharyya, 2009) It means to execute a physical task with timing. Hitting a moving object continuously with a crossbow. It defines the existing stored information. (Reid, 2005) Define reasons in order to follow measures in an organization. It refers to a personal act. Response to a mail within the given time. It refers to the application of general rules and regulation to solve problems.(McConnell, 2003) To set applications in computer to meet demands of customers. It includes managing thinking and learning process. Using different strategies for evaluation of malfunctions in engines. There are different factors in context of different learning theories. Most of them are related to employee’s motivation. Theory of reinforcement describes the effect of individual’s behavior that has been experienced in past. Negative behavior results in an undesired outcome whereas positive behavior results in desired outcome. (Salas and Bowers, 2003) Every organization has different training needs. It is important to provide training to the staff of every level in accordance with their needs and requirements as it help them in enhancing their skills to do the job in a better way. There are different roles and responsibilities of different staff members, so their training requirements are also different.For determining the training requirement, it is important to conduct training evaluation so that an organization can judge the skills and knowledge of the employees. It defines the desired output, desired information knowledge and desired skills of the employees that Green and company wants its employees to acquire.(Paige, 2008) Green and company use this technique to evaluate the training that is given to the employees. It classifies the needs of staff into a criterion- Analyse training needs Creating specification of training Knowing l styles of learning Evaluation and training Methods, design and training There should be a proper assessment of training needs. This can be done in process that is known as appraisal. People should participate in the suitable training activities. Break down of training requirements into different factors.(McLaughlin, 2006) There should be an attachment with every factor related to the standards. It is important to identify right tool to be used for training. Training procedure has been influenced by different learning style of individuals. It refers to finding out a relevant method of understanding. While carrying out this process, it is important to consider the group. It includes calculation of training effectiveness after the completion of training procedures. It refers to identification of a theory that helps in understanding techniques. Internet should be used in order to gain more knowledge. Presentation plays a vital role in delivery. Communication should be meaningful. Use of templates is beneficial for training. Green and Company knows about the limitations comes in creating confidence, resourcefulness in staff and conflict resolution. Due to this, the staffs of Green and company focus on increasing competition and efficiency of the organization. Various strategies are used by Green and company for the training of the employees. Counselling has been conducted so as to create a successful career path for the employees. It also uses performance appraisal for improving the performance of the employees. Management has provided the best training tools so it can enhance the skills of the employees for achieving the objectives of the organisation. But sometimes it results in some disadvantages when it results in negative outcomes. The advantages and disadvantages of training methods used in Green and company are as follows: Playing a role Proper assistance is provided to employees so that they can realize the secrets for being successful. It can result in nervousness depends upon the role which leads to decrease in performance level.(Werner, 2014) Helps an employee to assess performance level and the required competencies to achieve the desired level of performance. It may lead to demoralization for the employees who don’t perform well. Discussion increases skills of the employees. Sometimes the supportive role plays a crucial part. It plays a relevant role in providing practice to the workers that can improve their performance. It is an expensive process and its benefits only depend on how employees perceive it.(Myftiu, 2015) Coaching for performance It includes assessment of employee’s performance to know about the required improvements. Sometimes this assessment gives negative results. A training event must consist of all the elements necessary to provide training and development. I will accept a problem solving approach for providing training to workers and execute a decision making process. In this process employees are given different realistic situations and asked to provide solutions to it. (Nathan, 2006)Because of this, problem solving skills can be developed within the employees in reference to employee relation, customer service, proper management etc. If employees are considered in decision making process, then it leads to increase in motivation.(Bhattacharyya, 2009) The event training process- There will be an introduction between the team and the managers in training event and afterwards the real challenge has been solved. Q&A activities are carried out among the employees to ensure that the workers are oriented in a proper way. On the following day, set of instructions are provided to the employee to whom the task was allotted to find out the results. (Reid, 2005) Afterwards, the staff will be divided into three groups where they will calculate and evaluate solutions in a specific time period. Then, the results have been studied by the managers so that they can give suggestions for improvements. Q&A activities help the groups to provide a suitable solution to deal with different problems.(Clark, 2010) There are different methods that are used by managers to analyse the results of the trainings. These methods examine the efficiency and effectiveness of a task. It is the responsibility of top level management to conduct investigation about various activities by analysing different elements, costs and benefit decisions related to the activity. I prefer Five Tiered Approach for this. There are five steps in this approach that determines difference between expected results and actual results. The main objective behind this is to ensure that the activity fulfils the need of the organization or not.(McConnell, 2003) Evaluation refers to evaluate or to measure the effects of training and learning on the performance of an individual and his contribution towards organizational goals. Training evaluations helps an organisation to ensure that the training provided is beneficial to the organization or not. It evaluates the return on investment, level of competence and social/economic benefits of an organization. Kirkpatrick has defined four levels of evaluation techniques- The success due to training is identifiable because it creates a motivation among employees. First activity consists of formulation of a problem that is related to customer service. Proper solutions are proposed by the team of staff. Discussions have been done to find out relevant conclusion. The benefits of this activity are related to enhancement of customer service that is discovered by the employees.(Nathan, 2006) It is very important to review the success of the evaluation methods used so that an organization can ensure a positive return on investment. Margaret Anne Reid et al define some questions that need to be asked to review the success of evaluation methods. These questions are- The framework of five tiered appraisal is helpfulto judge real life situations in a planned activity. All the issues are resolved by comparing the standard and actual benefits of training activity. During the worker’s evaluation process, important activities were provided so that can create an impact on development process. For achieving better results and outputs, an improvement in logical factors is also carried out. An organization should understand the importance of training and development and take an appropriate action according to that. Government of UK plays a vital role in training and development. It has taken an initiative to fulfil the objective of removing barriers of unemployment of society. Government used the initiative in order to create opportunities to broad communities or backgrounds. According to them, lifelong learning provides helps in removing social exclusions.(Paige, 2008) The objective behind lifelong learning is to provide opportunities to people so that they can re develop their skills and add on updated knowledge without pursue continuous long courses. It focuses on creating a demand for learning by providing vocational learning that consists of fun element as well as learning. It aims on creating a world class training that can meet the skills set of European and UK market. It is the responsibility of minister to provide further education, employability skills and lifelong learning and this role has been shared between four departments i.e. the department of business, innovation, skills and local education. There is an improvement in National curriculum tests that has become one of the most important campaigns in all levels. More than 800 colleges have been shut down to improve immigration and standards. (Reid, 2005) Government responsibilities are- There are some special training areas that play an important role- Competency movements results in making firms concern about the performance gap related to firms. It has been notices that private sectors firms are performing in the best way by giving high quality products and services. Learning is a process that can never end and it is important to learn new things to gain more confidence. The growth in the private sectors affects the economy so public sector firms are also need to increase their level of performance. There are some public companies in UK that are putting their 100% effort in improving the performance and standard. One of them is ‘East coast trains’.(Nathan, 2006)Competency movements results in an effective and improved performance. It influences productivity of the firms. Employees receive best motivational assets and rewards in reference to evaluation and change of their fields. Institutions are facing some issues like low productivity, bad service quality and less initiatives. Different learning patterns have been introduced so that productivity can be increased and it contributes in development. There are different initiatives taken by UK government for skills, training and development. One of them is Government labour market policies. They act as both active as well as passive policies. Training, development and learning are the essential requirements for the growth of an organization. Green and company provides training and development to its employees in an effective manner. Different training programs have been conducted for different staff levels because of different roles and responsibilities delegated to them. There are many advantages as well as some disadvantages of trainings. It is important to plan a suitable training program for the welfare of the employees. Green and company have created an impact on the economy in UK. The business management of the organization has introduced some effective resources that possess the capability to enhance employee’s performance. Because of this, the company has attained a leading position in the market. There are many challenges faced by company only for understanding the different learning requirements. Green and company provide support to its workers to get their best results. Bhattacharyya, D. (2009). Human resource development. Mumbai: Himalaya Pub. House. Clark, R. (2010). Evidence-based training methods. Alexandria, Va.: ASTD Press. Mankin, D. (2009). Human resource development. New York: Oxford University Press. McConnell, J. (2003). How to identify your organization's training needs. New York: AMACOM. McLaughlin, T. (2006). Learning curve. Toronto: Harlequin. Nathan, M. (2006). The learning curve. London: Arrow Glautier, S. (2013). Revisiting the learning curve (once again).Frontiers in Psychology, 4. Kim, J. (2014). Residency training: training program renewal and evaluation of training. J Korean Med Assoc, 57(11), p.896. Myftiu, J. (2015). Individual Differences Considering Students’ Learning Styles. MJSS Werner, J. (2014). Human Resource Development ≠ Human Resource Management: So What Is It? Human Resource Development Quarterly, 25(2), pp.127-139. Malaher.org, 2016, pet peeve learning curve misuse, (online) Available at: http://malaher.org/2007/03/pet-peeve-learning-curve-misuse/ Accessed on: 3rd August, 2016
<urn:uuid:973a6f9e-a8ba-44c2-88fb-1ae3bc0f4c0d>
CC-MAIN-2022-33
https://www.locusassignments.com/solution/unit-23-human-resource-training-and-development-assignment
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00405.warc.gz
en
0.95055
3,200
3.140625
3
450+ experts on 30 subjects ready to help you just now Starting from 3 hours delivery Remember! This is just a sample. You can get your custom paper by one of our expert writers.Get custom essay 121 writers online Big data often refers simply to the use of predictive analytics, user behavior analytics, or certain other advanced data analysis methods that extract value from data, and seldom to a particular size of data set. The amount of data that’s being created and stored on a global level is almost unimaginable, and it just keeps growing. That means there’s even more potential to collect key insights from business information – yet only a small percentage of data is actually analyzed. What does that mean for businesses? How can they make better use of the raw information that flows into their organizations every day? Analysis of data sets can find new correlations to “”spot business trends, prevent diseases, combat crime and so on””. If a data satisfies these 4 characteristics (Volume, Variety, Velocity, and Veracity) is called as big data which needs real-time distributed processing. To process this enormous amount of flowing data they devised these techniques Hadoop. Hadoop is an open-source software framework for storing data and running applications on clusters of commodity hardware. It provides massive storage for any kind of data, enormous processing power and the ability to handle virtually limitless concurrent tasks or jobs. Hadoop has two main systems: the Hadoop Distributed File System (HDFS) and MapReduce engine. The best advantage which HDFS provides is a support to non-structural data like shopping pattern which where RDBMS breaks down on higher amount even though we have supports like BLOB data types. So, whenever we have a small amount of structured or semi-structured data and regular DML operations are required its better to use traditional RDBMS and when the amount of data is large and requires only storage of data it is better to use HDFS e.g. search engine. This paper focuses on the comparison of Hadoop and Traditional Relational Database. It also focuses on characteristics and advantages of Hadoop. Big Data is a very familiar term that describes voluminous amount of data that is structural, semi-structural and sub-structural data that has potential to be mined for information. Although big data does not refer to any specific quantity, then this term is often used when speaking about the pet bytes and Exabyte of data. In the Big data world the sheer volume, velocity, and variety of data render most ordinary technologies ineffective. Thus in order to overcome their helplessness companies like Google and Yahoo! needed to find solutions to manage all the data that their servers were gathering in an efficient, cost-effective way. Hadoop was originally created by a Yahoo! Engineer, Doug Cutting, as a counter-weight to Google’s BigTable. Hadoop was Yahoo!’s attempt to break down the big data problem into small pieces that could be processed in parallel. Hadoop is now an open source project available under Apache License 2.0 and is now widely used to manage large chunks of data successfully by many companies. In the early 2000s, to locate relevant information and the text-based content, search engines were created. In the early years, search results were handled by humans. But as the web grew from dozens to millions of pages, automation was needed. So search engines like Yahoo, AltaVista were introduced. They started one such project that was an open-source web search engine called Nutch – the brainchild of Doug Cutting and Mike Cafarella. They wanted to return web search results faster by distributing data and calculations across different computers, so multiple tasks could be able to perform simultaneously. During this time, another search engine project called Google was in progress. It was based on the same concept – storing and processing data in a distributed, automated way so that relevant web search results could be returned faster. In 2006, Cutting joined Yahoo and took with him the Nutch project as well as ideas based on Google’s early work with automating distributed data storage and processing. The Nutch project was divided – the web crawler portion remained as Nutch and the distributed computing and processing portion became Hadoop (named after Cutting’s son’s toy elephant). In 2008, Yahoo released Hadoop as an open-source project. Today, Hadoop’s framework and ecosystem of technologies are managed and maintained by the non-profit Apache Software Foundation (ASF), a global community of software developers and contributors. Like Hadoop, traditional RDBMS cannot be used when it comes to process and store a large amount of data or simply big data. Following are some differences between Hadoop and traditional RDBMS. For example, if you want to write code to transfer money from one bank account to another one, you have to code all the scenarios like what happens if money is withdrawn from one account, but a failure occurs before it is deposited to another account. Hadoop has two main systems: Once the data is written on the server with the Hadoop Distributed Filesystem and can be subsequently read and re-used many times. When compared with the read/write actions of other file systems, it explains the speed with which Hadoop operates ie it is very fast. This is the reason why HDFS is an excellent choice to deal with the high volumes and velocity of data required today. Each HDFS cluster contains the following: NameNode: Runs on a “master node” that tracks and directs the storage of the cluster.DataNode: Runs on “slave nodes,” which make up the majority of the machines within a cluster. The NameNode instructs data files to be split into blocks, each of which is replicated three times and stored on machines across the cluster. These replicas ensure the entire system won’t go down if one server fails or is taken offline—known as “fault tolerance.”Client machine: neither a NameNode or a DataNode, Client machines have Hadoop installed on them. They’re responsible for loading data into the cluster, submitting MapReduce jobs and viewing the results of the job once complete. In HDFS, it is having a main « NameNode » and multiple « data nodes » on a commodity hardware cluster. All the nodes are usually organized within the same physical rack in the data center. Data is then broken down into separate « blocks » that are distributed among the various data nodes for storage. Blocks are also replicated across nodes to reduce the failure. The NameNode is the «smart» node in the cluster. It knows exactly which blocks are located within which data node and where the data nodes are located within the machine cluster. The NameNode also manages access to the files, including reads, writes, creates, deletes and replication of data blocks across different data nodes. To complete a certain task, the data nodes constantly communicate with the NameNode. The constant communication ensures that the NameNode is aware of each data node’s status at all times. Since the NameNode assigns tasks to the individual data nodes, should it realize that a data node is not functioning properly it is able to immediately re-assign that node’s task to a different node containing that same data block? Data nodes also communicate with each other so they can cooperate during normal file operations. Clearly, the NameNode is critical to the whole system and should be replicated to prevent system failure. Again, data blocks are replicated across multiple data nodes and access is managed by the NameNode. This means when a data node no longer sends a “life signal” to the NameNode, the NameNode unmaps the data note from the cluster and keeps operating with the other data nodes as if nothing had happened. When this data node comes back to life or a different (new) data node is detected, that new data node is (re-)added to the system. That is what makes HDFS resilient and self-healing. Since data blocks are replicated across several data nodes, the failure of one server will not corrupt a file. The degree of replication and the number of data nodes are adjusted when the cluster is implemented and they can be dynamically adjusted while the cluster is operating. Data integrity is also carefully monitored by HDFS’s many capabilities. HDFS uses transaction logs and validations to ensure integrity across the cluster. Usually, there is one NameNode and possibly a data node running on a physical server in the rack, while all other servers run data nodes only. Hadoop MapReduce is an implementation of the MapReduce algorithm developed and maintained by the Apache Hadoop project. The general idea of the MapReduce algorithm is to break down the data into smaller manageable pieces, process the data in parallel on your distributed cluster, and subsequently combine it into the desired result or output. Hadoop MapReduce includes several stages, each with an important set of operations designed to handle big data. The first step is for the program to locate and read the « input file » containing the raw data. Since the file format is arbitrary, the data must be converted to something the program can process. This is the function of « InputFormat » and « RecordReader » (RR). InputFormat decides how to split the file into smaller pieces (using a function called InputSplit). Then the RecordReader transforms the raw data for processing by the map. The result is a sequence of « key » and « value » pairs. Once the data is in a form acceptable to map, each key-value pair of data is processed by the mapping function. To keep track of and collect the output data, the program uses an « OutputCollector ». Another function called « Reporter » provides information that lets you know when the individual mapping tasks are complete. Once all the mapping is done, the Reduce function performs its task on each output key-value pair. Finally, an OutputFormat feature takes those key-value pairs and organizes the output for writing to HDFS, which is the last step of the program. Hadoop MapReduce is the heart of the Hadoop system. It is able to process the data in a highly resilient, fault-tolerant manner. Obviously, this is just an overview of a larger and growing ecosystem with tools and technologies adapted to manage modern big data problems. Other software components that can run on top of or alongside Hadoop and have achieved top-level Apache project status include: Future scope of Hadoop Technology:- Hadoop is among the major big data technologies and has a vast scope in the future. Being cost-effective, scalable and reliable, most of the organizations in the world are employing Hadoop technology. It includes storing data on a cluster without any machine or hardware failure, adding a new hardware to the nodes etc. As the size of data increases, the demand for Hadoop technology will also be increased. There will be a need for more Hadoop developers to deal with the big data challenges. Following are the different profiles of Hadoop developers according to their expertise and experience in Hadoop technology. Nowadays, with the rapid growth of the data volume, the storage and processing of Big Data have become the most pressing needs of the enterprises. Hadoop as the open source distributed computing platform has become a brilliant choice for the business. Due to the high performance of Hadoop, it has been widely used in many companies. 1. Hadoop in Yahoo!:- Yahoo! is the leader in Hadoop technology research and applications. It applies Hadoop on various products, which include the data analysis, content optimization, anti-spam email system, and advertising optimization. Hadoop has also been fully used in user interests’ prediction, searching ranking, and advertising location. In the Yahoo! homepage personalization, the real-time service system will read the data from the database to the interest mapping through the Apache. Every 5 minutes, the system will rearrange the contents based on the Hadoop cluster and update the contents every 7 minutes. Concerning span emails, Yahoo! uses the Hadoop cluster to score the emails. Every couple of hours, the Yahoo! will improve the anti-spam email model in the Hadoop clusters and the clusters will push 5 billion times of emails’ delivery every day At present, the largest application of the Hadoop is the Search Web map of Yahoo!. It has been run on more than 10 000 Linux cluster machines. It is known that Facebook is the largest social network in the world. From 2004 to 2009, Facebook has over 800 million active users. The data created every day is huge. This means that Facebook is facing the problem with big data processing which contains content maintenance, photos sharing, comments, and users access histories. These data are not easy to process so Facebook has adopted the Hadoop and HBase to handle it. The availability of Big Data, low-cost hardware, and new information management and analytic software have produced a unique moment in the history of the data analysis. Generally, a variety of data can be processed. It may be structured, semi-structured and unstructured. Traditional RDBMS is used only to manage structured and semi-structured data but not to manage unstructured data. Hadoop has the ability to process and store all variety of data whether it is structured, semi-structured or unstructured. Also, it is mostly used to process a large amount of unstructured data. So we can say Hadoop is way better than the traditional Relational Database Management System. We provide you with original essay samples, perfect formatting and styling To export a reference to this article please select a referencing style below: Where do you want us to send this sample? Be careful. This essay is not unique This essay was donated by a student and is likely to have been used and submitted before Download this Sample Free samples may contain mistakes and not unique parts Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper. Please check your inbox. We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together! Are you interested in getting a customized paper?Check it out!
<urn:uuid:4168456d-6318-4af8-a2b7-5626344aae98>
CC-MAIN-2022-33
https://gradesfixer.com/free-essay-examples/comparative-study-of-hadoop-and-traditional-relational-database/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00003.warc.gz
en
0.934685
3,020
3.265625
3
The Society of Folk Dance Historians (SFDH) Biblical Roots in Jewish Dance CLICK AN IMAGE TO ENLARGE The Jews have always been a dance-oriented people. Even during their long and arduous confinement in the ghettos of medieval times, the Jews developed "dance houses" and had "dance leaders." These two developments greatly influenced the growth of court and parlor dancing during the Renaissance Era. The oriental Jewish communities also have had a rich dance tradition throughout their history. Insights into the roots of Jewish dance can be found in the Biblical and later Talmudic narratives. In Biblical and Talmudic Hebrew, thirty different words for dance and dancing exist; indicating the importance of dance in ancient Jewish religious and secular life. Although actual detailed description of dances are lacking, the Bible contains scores of references to dance. One possible explanation is that dance descriptions were purged from the text because of the similarities that existed between Hebrew and Pagan dance forms. Another probability was that dance was so commonplace in Biblical society that it was taken for granted, and the framers of the Bible saw little religious or literary merit to including dance descriptions. The large number of terms for ritual dance used in the Bible (eleven), when contrasted with the one word found for secular dance, indicates the essential role of dance in religious practice. The words themselves give some indication of the general styles of the dances done.1 One word used frequently is "hul" ("to whirl"). (Sendry, 1949:446) When used in reference to dance, "hul" connotes a whirling, writhing, twisting motion and a fairly brisk tempo. Dance is usually synonymous to "make merry" and "sahak" in Hebrew; thus, any Biblical reference to making merry, to making sport, or play, usually refers ot a very joyous form of dance. (Sendry, 69:446) This form is often used in reference to ecstatic worship of G-d, as in "and David and Israel played (danced) before G-d with all their might" (II Samuel 6:5) or "Before the Lord I will make merry (dance)" (II Samual 6:21). Many more such descriptive synonyms exist. One particular important synonim is "chagog," which generally means to celebrate a "hag," or joyous festival or feast. These "hags" usually include solemn processionals in the ritual, thus, festivals came to imply dancing in its colloquial usage, and the word "chagog" came to mean dancing. Another particularly interesting synonim for dance is "pasah," which means "to pass over" (as in the Festival or Pesach or Passover), but also has a secondary meaning, "to limp or to dance in a limping fashion." (Sendry, 1969:447) A possibility exists that a ritual dance done in a limping style was associated with the celebration of Passover. Early Jewish dance was profoundly influenced by the dances of the surrounding cultures. Certainly, a great impact was made by Egyptian dance and ritual, to which the Jews were exposed for four centuries. Much Egyptian artwork depicts dancers in processionals honoring the various gods. These processionals were very common in Egyptian rituals. Often they were accompanied by sacrificial dances, generally of ecstatic quality and danced during sacrificial sacrifices by the Pharaoh only, who at that moment represented all of Egypt. These sacrificial dances were very similar in form to dances done before the ark of the covenant.2 The Egyptians also had acrobatic dances and harvest dances of thanksgiving, found subsequently in Jewish repertoire. The Jews tended to assimilate the more refined and dignified dance styles of the Egyptians and shunned those dances which were unrestrained or orgiastic. Influences also filtered into Jewish dance from their neighbors to the north the Phoenicians. Phoenician ritual included highly developed religious dancing, again with many different processional forms. Also present in Phoenician ritual were the bacchantic dances in honor of Ba'al Markod, the god of dance. This particular style of dance was frowned upon by the Israelite priests and was considered a pagan form. Babylonian and Hittite rituals also included ritual dance processionals which were similar to Jewish dance. In ancient Jewish tradition, dancing, singing, and playing of musical instruments were all intimately related and usually appeared together. Thus, mention of singers or musicians in the Bible would usually imply dancers as well, and vice versa. All three forms sprang from the same original sources and exhibited many of the same outside influences; and all three forms have the common aim of glorification of G-od. Miriam's dance by the Red Sea is one of the Bible's earliest accounts of dances done in thanksgiving to G-d ". . . and Miriam the prophetess, the sister of Aaron, took a timbrel in her hand; and all the women went out after her with timbrels and dances. And Miriam sang unto them: 'sing ye to the Lord, for He is highly exalted; The horse and rider hath He thrown into the sea'." The dance here was accompanied by singing and the playing of timbrels ("hand drums") and reflects its roots in similar sacred thanksgiving rituals of the Egyptians. Three major forms of dance could be found in Biblical Jewish practice. Most common was the ritual dances done in conjunction with temple observances. These sacred dances were always performed in a solemn, dignified manner. Processionals generally were ritual in nature as were dances encircling sacred objects.3 These round dances evolved from earlier magical rites of enclosing the sacred objects in a magic circle to ensure its protection.4 These round dances became very popular, not only in ritual practice but as secular dances as well. Any form of unrestrained dance in a ritual context was considered pagan. The second form was ecstatic dance. The most famous example of religious ecstacy is the account of David's dance before the ark when it is brought to Jerusalem. "Thus, all Israel brought up the ark of the covenant of the Lord with shouting, and with the sound of trumpets and with cymbals, sounding aloud with psalteries and harps. And it came to pass, as the ark of the covenant of the Lord came to the city of David, that Michal, the daughter of Saul looked out at the window, and saw the king David dancing and making merry; and she despised him in her heart." (I Chronicles: 15:28-29) This dance is mentioned three different times in the Bible, and each time King David leads the Jewish people in joyous dancing to honor and exalt the name of G-d. One description of David dancing "with all his might" is indicative of a state of religious ecstacy. His is a transcendental state of sublime adoration of G-d, as expressed through his movements. Other forms of ecstatic dance were common among the prophets of Israel. Biblical accounts of bands of prophets always include reference to musical instruments, which implies dancing. The prophets would whirl themselves (as taken from the word "hul") into a state of frenzy, possibly using these ecstatic bodily movements to induce a state of trance (as Jews were not allowed to use any artificial means of inducing a trance state other than music and dance), at which time they would begin to prophesize. Often these ecstatic states were infectious, and even onlookers would be carried away emotionally and would join in the dance. "And when they came thither to the hill, behold, a band of prophets came to meet him; and the spirit of G-d came mightily upon him, and he prophesied among them." (I Samuel: 10:10) Lyric dances comprised a third area of Biblical Jewish dance. These dances combined the elements of poetry, mime, and music. The lyric form most probably derived from (or at least was influenced by) analogous dance form in Egypt which had codified dance symbols called "dance tours" (much like Indian "mudras"). Other similar dance forms were found in Sumer and Babylonia. These lyric dance forms were possibly part of the ritual complex involving the Psalms. References found in early 6th century BCE documents, such as the Codex Kosmos, state that the Psalms were danced, with accompanying music and song. The Psalms themselves contain numerous references to ritual dance. "Praise Him with the blast of the Horn; Praise Him with the psaltery and the harp. Praise Him with the timbrel and the dance; Praise Him with stringed instruments and pipe. . ." (Psalm: 150:3-4) "Let them praise His name in the dance; Let them sing praises unto Him with the timbrel and harp." (Psalm: 149:3) The Song of Songs may also have had accompanying dances; however, those dances were probably more secularly oriented, dealing with courtship and romance. Although lyric dance seemed to have died out during the Babylonian exile (600 BCE), most ritual dance continued to play a major role in Jewish observance until the destruction of the second temple (approximately 100 BCE). During the diaspora, most dances became secularized, although certain customs, such as sexes dancing separately and the association of dance with festivals, weddings, etc. survived. Dance as ritual has survived only in remnants such as processions carrying the Torah and in the custom of "davening," swaying back and forth in rhythm to the chanting of prayers. Dance was found on almost any festive occasion. The primary dancing festivals were the "Hags," usually the seasonal agricultural festivals: Hag-Ha-matzot (Hag-Hapesach) Passover; Hag-Sukkoth (feast of Tabernacles); Hag-Shvuot (feast of weeks). An essential feature of all these holidays was a ritual dance, often a processional around the sanctuary. For example, the 7th Day of Sukkoth was characterized by processionals around the ark (7 times around 7 being a magic number in Jewish tradition). Sukkoth celebrated the ingathering of the crops and was a very joyous holiday. Many of the practices and rites during Sukkoth, such as the water libations which occurred on each of the seven days of the festival, had roots in earlier Canaanite rites of sympathetic magic to produce rain. These rites included many processional dances which were very ecstatic in sentiment. "The water parade was another genuine folk spectacle. It began with a procession from Mount Moriah to Lake Shileah. At its head marched a priest holding a golden pitcher with which he drew water to pour on the altar. On the return journey, he stopped at the water-gate where the people met him to the accompaniment of silver trumpets and the song "And Ye Shall Draw Water of Joy from the Wells of Salvation."5 "Another group of priests went to Motza and brought back willow rods. The branches were placed on the altar and the priest sprinkled them with water from the golden pitcher, after which the procession carried the branches around the altar. The Levites used to sing "Hallel" and the people accompanied them and shook their palm branches to the rhythm of the music." (Bemach, 1972:5-6) Before Yom Kippur and the 15 of Ab became days of mourning for the destroyed Temple, these days were associated with ritual courtship dances known as the "dance of the young maidens." (Judges: 21:19) Rabbi Simeon ben Gamaliel offered this description in "Miohna Ta'anit" ("the Rabbinic writings): "There were no happier days for Israel than the 15 of Ab and the Day of Atonement, for on them, the daughters of Jerusalem used to go forth in white raiments; and these were borrowed, that none should be abashed which had them not . . . And the daughters of Jerusalem went forth to dance in the vineyards. And what did they say? 'Young man, lift uip thine eyes and see what thou wouldst choose for thyself; set not thine eyes on beauty, but set thine eyes on family'." (Sendrey, 1969:457) Hag-Purim, the feast of Esther, was originally a Babylonian festival, brought back by the Jews returning from exile. Purim was a day when "anything goes" and became a day when, through revelling, dancing, masquerading, and drinking, the population had a chance to release psychic tensions built up during the year. One prevalent rite associated with Purim, the fire dance (in which the effigy of Haman was burned and young men would jump through a hoop over the fire) survived well into the Middle-ages. Just as courtship dances were common, all weddings were celebrated with dance. Aside from the aspect of celebrating at weddings, was the more important ritual motivation of honoring the bride. Some scholars have postulated that the Song of Songs originally stems from traditional verses recited and danced (lyric dances) befor the couple, who were seated on thrones, to prepare the bride and groom for the sensual aspects of marriage. (Song of Songs: 7:1-6) (7:1-2 follows:) "What will ye see in the Shulamite? As it were a dance of two companies. How beautiful are thy steps in sandals, O prince's daughter! The rounding of thy thighs are like the links of a chain, the work of a skilled workman." Important individuals were often honored through dance as well. Dancing was also found during funerals. The custom arose from the more primitive beliefs about the need to appease the spirits. The original dances have evolved over the generations to the simple foot-stomping found even today at many orthodox funerals. Dances of thanksgiving, besides being done as part of holiday rituals, were done during personal rites, such as the welcoming home of victorious soldiers. (I Samual: 18:6-7) "And it came to pass as they came, when David returned from the slaughter of the Philistine, that the women came out of all the cities of Israel, singing and dancing ot meet King Saul with timbrels, with joy, and with three-stringed instruments." Metaphorical use of dance in Jewish literature was also very common. Some of the most beautiful verses in Biblical literature include dance metaphors. Although ritual Jewish dance died with the second destruction of the Temple and the diaspora which followed, dancing was by then too ingrained in Jewish soul and psyche that the urge to dance could not die. Certain attitudes towards dance fluctuated with external pressures (during Greek and Roman times, the Rabbis looked with disfavor upon the foreign incursions into the Israelite dance-styles), but dance itself survived. In modern times, the Jews still dance, and nowhere is the influence of the Biblical roots stronger than in Israel where new dances, whose inspiration and meaning are drawn from the Bible, are being created daily. Used with permission of the author. Printed in Folk Dance Scene, April 1977. This page © 2018 by Ron Houston. Please do not copy any part of this page without including this copyright notice. Please do not copy small portions out of context. Please do not copy large portions without permission from Ron Houston.
<urn:uuid:dadd17b0-5b71-4094-b1b9-805aa794c26f>
CC-MAIN-2022-33
https://sfdh.us/encyclopedia/biblical_roots_in_jewish_dance_codman.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00406.warc.gz
en
0.975199
3,238
3.578125
4
Lessons from 1920s Germany and today's Iran... MANY PEOPLE today, and increasingly those who manage or invest money professionally, are asking one question, writes Chris Martenson at Peak Prosperity. How do I preserve wealth during a period of intense official intervention in and manipulation of money supply, price, and asset markets? As every effort to re-inflate and perpetuate the credit bubble is made, the words of Austrian economist Ludwig Von Mises lurk ominously nearby: There is no means of avoiding the final collapse of a boom brought about by credit expansion. The alternative is only whether the crisis should come sooner, as the result of a voluntary abandonment of further credit expansion, or later, as a final and total catastrophe of the currency system involved. Because every effort is being made to avoid abandoning the credit expansion process – with central banks and governments lending and borrowing furiously to make up for private shortfalls – we are left with the growing prospect that the outcome will involve some form of "final catastrophe of the currency system"(s). This report explores what the dimensions of that risk are. It draws upon both historical and modern examples to try to shed some light on how the currency collapse process will likely unfold this time around. Plus, we'll address how best to avoid its pernicious wealth destroying effects. In the book When Money Dies by Adam Fergusson, which details Weimar Germany's inflation over the period from 1918 to 1923, the most riveting parts for me were the first-hand accounts from the people caught in the storm. So many people left their wealth in the system only to watch it get eroded and utterly destroyed over time. The reasons were many: patriotism, inertia, disbelief, and denial cruelly fed by hope every time prices moderated or even retreated momentarily. The simple observation is that many people had a blind belief in the money system. They lost their wealth because they were unable or unwilling to allow reality to challenge their beliefs. It's not that there weren't numerous warning signs to heed – in fact, they could be seen everywhere – but most willfully ignored them. Most mysterious is the fact that in Austria and Germany, where the inflation struck most severely, there were numerous borders and currencies into which people could have dodged to protect their wealth. That is, protecting one's wealth was a relatively straightforward and simple manner. And yet...it did not happen. As always, the landscape of inflation needs to be carefully mapped before we can begin to hope to have a conversation with a destination. Where the symptom of inflation is rising prices – in fact, rising prices are the only things tracked by the Consumer Price Index, or CPI – the causes of rising prices are many, but they always boil down to the overexpansion of money and/or credit. Knowing the cause is essential to knowing what to do next. Here are the main flavors of rising prices that we need to keep in mind: Non-inflationary price increases – These are caused by demand exceeding supply. It happens all the time. A poor harvest driving up the price of corn is not inflationary, but it will show up in the Consumer Price Index (CPI). These sorts of price movements reverse themselves as markets respond by chasing the price and delivering more of whatever was in short supply. The only exception is when there is some essential, non-renewable natural resource in sustained depletion – which means that demand will always exceed supply and prices will rise and then rise some more. Excessive speculation can also lead to price rises and, as long as the speculation centers on the item(s) involved and not on excessive money/credit expansion, it, too, can be (and eventually will be) reversed. Simple inflation – This is the 'textbook' case of inflation where too much money and/or credit is created relative to goods and services. Print too much money or make credit too cheap/easy and prices will rise roughly in proportion to the excess. Simple inflation operates in the low single digit percentages. Central banks openly target simple inflation in the 2%-3% range as that level of expansion allows banks to have healthy profits, prevents past loan errors from swamping the system, and generally keeps the exponential money system operating well. Loss of confidence in money – A more severe stage of simple inflation takes over when enough people lose faith in the money and seek to actively spend their money on something, anything, before that money loses value. This type of inflation operates in the high single digits to low double digits, somewhere between 8% and 15%. This is just simple inflation on steroids. Not everybody participates in this game yet, as the loss of confidence has not yet reached criticality, but enough people do to keep this process locked in a self-reinforcing spiral that requires aggressive money tightening to halt. Think 'Paul Volcker' and '21% interest rates' and you get the picture. Hyperinflation – Further along the inflationary spectrum is what happens when a critical mass of people within a society lose faith in their money and the monetary authorities are incapable of reducing the money/credit supply, either because there's already too much of it out there to 'call in,' or because they lack the political will to do anything but print more money in response (i.e., there are no Volckers around). Once this critical mass is reached, every corner of society is participating, and it is no longer socially taboo to talk about the hyperinflation or how to escape its effects. Everyone is wheeling and dealing, speculation runs rampant in everything from stocks to pineapples, and you cannot possibly spend your money fast enough to avoid the ravages of inflation. The annual percentage rates for hyperinflation range from medium double-digits into the hundreds of millions. Currency destruction – There is another type of inflation that happens when your state currency is shunned by the rest of the world. While there may be no additional money creation and credit may even be dropping, inflation is still a very serious problem as everything imported goes up in price. There are many reasons that a currency may be shunned. It could be that other countries lose faith in the currency due to mismanagement and overprinting. It could be due to acts of war. Or it could happen at the end of a very long period of excessive credit and money expansion, when that bubble finally bursts and confidence in the associated currency unit(s) is lost. There is really very little that local authorities can do to fix things unless the country imports nothing, a condition that applies to exactly nobody. Prime candidates to experience this form of inflation are the US and Japan; the former because of massive imbalances fostered by its several decades of reserve currency status, and the latter because of persistent and massive over-printing enabled by domestic savings and a once-robust export surplus. The dynamic of currency destruction is for imported items to rise sharply in price first, with everything else soon following in upward price spirals. Policy responses are quite limited and are usually ineffectual at preventing a massive amount of economic destruction and wealth loss for the holders of the stricken currency. It is this last type of inflation – currency destruction – that we'll explore here, because it represents a severe risk and is very rarely talked about or analyzed. A modern case study of a shunned currency is Iran. For a variety of reasons, Iran finds itself the subject of a sustained effort by the US to subjugate its nuclear program to international inspection and curtailment. Already the target of many overt and covert efforts to bring it to heel – ranging from two highly destructive and invasive computer worms (Stuxnet and Flame), to stealth drone overflights, to an international ban on oil exports – Iran now finds that its currency is being internationally shunned. The impacts are obvious and the lessons instructive. Already Plagued by Inflation, Iran Is Bracing for Worse Jul 1, 2012 TEHRAN — Bedeviled by government mismanagement of the economy and international sanctions over its nuclear program, Iran is in the grip of spiraling inflation. Just ask Ali, a fruit vendor in the capital whose business has been slow for months. People hurried by his lavish displays of red grapes, dark blue figs and ginger last week, with few stopping to make a purchase. "Who in Iran can afford to buy a pineapple costing $15?" he asked. "Nobody." But Ali is not complaining, because he is making a killing in his other line of work: currency speculation. "At least the Dollars I bought are making a profit for me," he said. The imposition on Sunday of new international measures aimed at cutting Iran's oil exports, its main source of income, threatens to make the distortion in the economy even worse. With the local currency, the rial, having lost 50 percent of its value in the last year against other currencies, consumer prices here are rising fast — officially by 25 percent annually, but even more than that, economists say. There are several factors feeding into the current Iranian currency crisis, including mismanagement of the economy that has left Iran even more exposed to imports than it otherwise could or should be, and Iran's currency is on the cusp of tipping over into outright hyperinflation. Ever since the Revolutionary War, when the British printed and distributed cartloads of Continental scrip, currency debasement has been a useful tool of war. All is fair in love and war, and whatever corrodes your opponent's strength is a potentially useful tool. Note that in the above quotes, we find that both the speculation already in evidence plus the 25%+ price increases support the idea that Iran has already tipped past simple inflation. Whether it can prevent a worsening condition is unclear at this point, regardless of whether or not international sanctions are soon lifted. More from the same article: Increasingly, the economy centers on speculation. In this evolving casino, the winners seize opportunities to make quick money on currency plays, while the losers watch their wealth and savings evaporate almost overnight. At first glance, Tehran, the political and economic engine of Iran, is the same thriving metropolis it has long been, the city where Porsche sold more cars in 2011 than anywhere else in the Middle East. City parks are immaculately maintained, and streetlights are rarely broken. Supermarkets and stores brim with imported products, and homeless people are a rare sight on its streets. But Iran's diminishing ability to sell oil under sanctions, falling foreign currency reserves and President Mahmoud Ahmadinejad's erratic economic policies have combined to create an atmosphere in which citizens, banks, businesses and state institutions have started fending for themselves. "The fact that all those Porsches are sold here is an indicator that some people are profiting from the bad economy," said Hossein Raghfar, an economist at Al Zahra University here. "Everybody has started hustling on the side, in order to generate extra income," he said. "Everybody is speculating." Some, like Ali the fruit seller, who would not give his full name, exchange their Rials for Dollars and other foreign currencies as fast as they can. More sophisticated investors invest their cash in land, apartments, art, cars and other assets that will rise in value as the Rial plunges. For those on the losing end, however, every day brings more bad news. The steep price rises are turning visits by Tehran homemakers to their neighborhood supermarkets into nerve-racking experiences, with the price of bread, for example, increasing 16-fold since the withdrawal of state subsidies in 2010. "My life feels like I'm trying to swim up a waterfall," said Dariush Namazi, 50, the manager of a bookstore. Having saved for years to buy a small apartment, he has found the value of his savings cut in half by the inflation, and still falling. "I had moved some strokes up the waterfall, but now I fell down and am spinning in the water." All of the important lessons you need to avoid a currency destruction are contained in those passages above. - Savings are for losers. - The more exposure you have to food and fuel price hikes, the worse off you are. - First movers have the advantage. Get your wealth out of the afflicted currency as fast as possible and then trade back in when needed to make purchases. - Paralysis is a wealth destroyer. - Fending for oneself is a wealth saver, so faith in authority is best shucked as fast as possible. Be prepared to follow those rules and you will do better than most. Barter, speculation, and prices that gyrate wildly as formerly expensive things are traded for basic necessities are all typical features of the end stages of a currency. Crime, social unrest, and sometimes war are handmaidens that accompany the death throes of money. The basic strategies to protect one's wealth are deceptively simple. As soon as the process of money destruction has begun, if not before, all savings have to be moved out of the afflicted currency and into things, especially things that others with wealth or barter items are most likely to want. Turning our attention back to the Weimar episode for a moment, the Amazon summary for When Money Dies reads: When Money Dies is the classic history of what happens when a nation's currency depreciates beyond recovery. In 1923, with its currency effectively worthless (the exchange rate in December of that year was one Dollar to 4,200,000,000,000 marks), the German republic was all but reduced to a barter economy. Expensive cigars, artworks, and jewels were routinely exchanged for staples such as bread; a cinema ticket could be bought for a lump of coal; and a bottle of paraffin for a silk shirt. People watched helplessly as their life savings disappeared and their loved ones starved. Germany's finances descended into chaos, with severe social unrest in its wake. The parallels to the Iranian situation are obvious. Those without the gift of foresight to identify what is coming, coupled with an inability to take decisive action that cuts against the social grain (at least early on), will simply lose their wealth and not be in a position to buy or exchange anything but their own time and labor in the future. This leads to the assessment that owning or producing things that people need or want is a good strategy. Food is always a good play. In the early stages, we'd also lean towards highly socially desirable real estate and away from middle- and lower-income housing, as ability to pay always get shredded from the bottom up. Gold performs well in terms of protecting purchasing power. According to the article above, Porsches work too. In other words, owning things that wealthy people will desire is a very good idea. I know this sounds harsh, elitist, and not terribly egalitarian, but it also happens to be how things tend to work out. Since I have a desire to be in a position to be helpful and of assistance in the future, protecting my wealth is a matter of both self and selfless interest. So I study what works and begin there, while also seeking a better future. The cruelest part of a currency destruction is that it will sneak up on most people, their baselines will shift, and they will be confused by false hopes along the way. This is completely understandable and to be expected. There's a good chance you're well acquainted with the chart of the value of German Marks against gold during the Weimar hyperinflation. I want to take a closer look at it by focusing on the wiggles instead of the rise: Imagine yourself there at that time, getting all of your information from the newspapers and your personal rumor network. Note that from the early part of 1920, prices fell by a lot over the next six months (note that this is a log chart, so even a little downward movement in the line represents a big price drop). Headlines reported that the corner had been turned and that the government programs had been successful in bringing inflation under control. People wanted to believe that story and so they did. It wasn't until the end of 1921 that prices began to rise again, spiking into early 1922 before stabilizing again for approximately eight months. Again people were calmed by the apparent success of the authorities in controlling the inflation. Because there were three pauses and rescues along the way, the price spike from late 1922 and into 1923 caught many off guard. It was truly shocking. This is when the critical loss of faith finally happened. Yet far too many remained paralyzed, certain the government would again get things under control soon. After all, three times before there had been a recovery, why not this time too? One must have hope, after all... In the middle of 1923, with very aggressive government intervention, there was a three-month dip in prices and a pause in the hyper-inflationary process. Again, another hopeful moment, but it was the final trap for the unwary. To put this in context, imagine if next month (August) gasoline prices shot up by 300% to roughly $10/gal. But then, between August 2012 and May of 2013 the price of gasoline fell back to $5/gal. I'd be willing to wager that many of your friends would be telling you that everything was fine and that "they" have everything under control. Perhaps your continued concern would be ridiculed or dismissed. Then, when prices finally did again breach the old $10/gal highs, some 19 months after the first price spike (in February 2014, in this example), many would have been habituated to the new prices, routines would have been altered, and many would have already inserted a rationalization process into their thinking that would have all of this make perfect sense, albeit uncomfortably. While not tracking the percentages closely, this example tracks the time frame. An important insight here is that baselines will shift, rationalizations will be formed, and explanations adopted, principally by those unable to accept that their money is in the process of dying. Avoiding this yourself will require tuning those people out and trusting yourself. Time to put some money into safely-stored Gold Bullion? BullionVault offers secure, low cost vaulting at a choice of three international locations...
<urn:uuid:0a93f45a-f305-4248-b3a6-82466ef5486f>
CC-MAIN-2022-33
https://www.bullionvault.com/gold-news/hyperinflation-currency-how-to-prepare-071120122
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00005.warc.gz
en
0.965557
3,793
2.53125
3
The great nineteenth-century mythologist Angelo de Gubernatis reports that mixing nettle seed with the bran given to the chickens was the guarantee to get lots of eggs. But what seems to be only a propitiatory ritual has turned out to be quite correct, since it is today recognized that the nettle seed activates the laying of hens . In the Scandinavian countries, it offers an excellent fodder providing three cuts per year. In cows, nettle increases lactation as well as the level of lipids in the cream, which makes it possible to obtain better quality butter. Nettle therefore significantly improves the health of animals as well as that of humans . A little history The proximity of man and nettle for centuries could only result in the gradual discovery of its medicinal properties , knowing that this plant was a “vegetable” from prehistoric times, regularly consumed until the sixteenth century. less. Nettle therefore takes up residence in all these places full of nitrates and ammonia, areas that provide this nutritional wealth of which nettle knows how to make much of. She is also very fond of scrap metal and it helps rid the soil of its excess iron because it produces iron oxide, the same iron that it itself contains in large quantities and which benefits the anemic . At the beginning of the 19th century, the medicinal use of nettle declines, but, unlike other plants, nettle will come out of this unfortunate impasse, in the middle of the century, under the leadership of Ginestet (1845), by Menicucci (1846) and by Cazin (1850), all three of which recall the haemostatic and anti-haemorrhagic properties of nettle. Then, in the twentieth century, research did not weaken, quite the contrary. In 1924, Mr. Dobreff demonstrated the presence in nettle of secretin , similar to that of spinach. Ten years later, the work of H. Cremer shows the fabulous capacity of nettle to enrich the organism with red blood cells , which, from the outset, places it on an equal footing with spinach. Between 1929 and 1932, Wasicky observed that nettle, taken regularly, was capable of lowering blood glucose levels, so it deserved to be qualified as anti-diabetic . Finally, in 1935, W. Ripperger attests to its role in the treatment of skin conditions, in particular thanks to its purifying properties. What are the main pharmacological properties of Stinging Nettle leaves? Extracts of urtica dioica leaves inhibit the biosynthesis of enzymes of the arachidonic cascade, in particular the cyclooxygenases COX-1 and COX-2, and thus block the biosynthesis of prostaglandins and thromboxane. One of the mechanisms involved in the development of joint pain is in fact the overexpression of metalloproteinases (MMPs) present on the surface of human chondrocytes. In vitro studies have shown in particular that nettle is capable of reducing the expression of the metalloproteinases MMP1, MMP3 and MMP9 on these chondrocytes. Another clinical study has shown that the combination of a nonsteroidal anti-inflammatory drug (NSAID) with nettle extract would potentiate the effect of NSAIDs in patients with rheumatism . The compounds of nettle would thus reinforce the action of inhibition of the synthesis of prostaglandins observed with the NSAIDs. This anti-inflammatory action of nettle would go through the inhibition of the transcription of nuclear factor kappa B (NF-kB). The anti-inflammatory effects of nettle leaves suggest that the plant may be useful not only in acute inflammatory pathologies , but also in chronic rheumatic diseases , in this case rheumatoid arthritis . In addition to the anti-inflammatory action of the plant, it has been shown in vivo that the aqueous and hydroalcoholic extracts of nettle leaf also significantly and dose-dependently reduce the nociceptive response . The nettle would be able to induce a depressant effect on the central nervous system, and to involve a greater resistance to the pain . Flavonoids, caffeoyl-malic acid and caffeic acid could be responsible for these analgesic properties . Immunomodulating and anticancer properties: Nettle leaves exhibit inhibitory activity on T cell activation . The development of rheumatoid arthritis is thus linked to the activation of this type of lymphocytes by mature dendritic cells (antigen presenting cells). In vitro studies have shown that nettle is able to maintain an immature dendritic cell phenotype , and a decrease in the expression of costimulatory molecules responsible for T cell activation. A 2016 in vitro study showed that caffeic acid and caffeoyl-malic acid , phenolic compounds found in nettle leaves, therefore exert antiproliferative and apoptotic effects on cerebral glioblastoma cell lines in a related fashion. at the dose and at the time. In vitro , studies have shown that the stinging nettle also has an important antioxidant power which can be attributed to its capacity to donate hydrogen ions, to chelate iron and to capture hydrogen peroxides. In vivo , another study showed that nettle decreases lipid peroxidation, and increases the activity of the antioxidant defense system, thus playing a protective role against hepatotoxicity . These effects would be linked to the presence of phenolic compounds. In allergic rhinitis , a randomized, double-blind, placebo-controlled clinical study has shown that administration of stinging nettle improves symptoms after one week of treatment. An in vitro study indicates that the anti-inflammatory effect of stinging nettle goes through the inactivation of histamine H1 receptors , as well as through the inhibition of tryptase (mast cell degranulation enzyme). U. dioica is also able to inhibit enzymes involved in the formation of prostaglandins such as COX-1, COX-2, and prostaglandin D2 hematopoietic synthase (HPGDS). A 2009 study confirms the insulinomimetic effect of nettle in vitro , confirming in particular its hypoglycemic effect which is linked to the reduction in intestinal glucose absorption. This has been demonstrated with the aqueous extract of Urtica dioica in vivo . Another work has also shown that the lowering of blood sugar induced by extracts from the leaf is due to the increased secretion of insulin by the islets of Langerhans in the pancreas. - Gastro protection - Anti-infectious activity Are there any precautions for use with Nettle leaves? - Contraindicated in medical situations requiring a reduction in fluid intake (example: severe heart or kidney disease). - According to the EMA, the use of stinging nettle is not recommended in pregnant or breastfeeding women - Contraindicated in subjects under 12 years of age How to take Nettle leaves and in what dosage? - Standardized fluid extract of fresh plant : 5 to 10 ml per day in a glass of water. - Full suspension of fresh plant : 5 to 15 ml per day in water. - Hydroalcoholic extract , mother tincture: 20 to 30 drops, 2 to 3 times a day in water or fruit juice, depending on the pain. - Herbal teas : infuse 1 tbsp. tablespoons of dried leaves, in 150 ml of boiling water for 10 minutes, 2 to 3 cups per day. Association with blackcurrant 1/3 for 2/3 nettle PA: To fight against demineralization and asthenia, especially in a context of low ferritin. In mineralization disorders (fractures, osteopenia, osteoporosis, etc.), in particular in patients with a history of hormone-dependent cancer , more particularly in the case of hormone therapy after breast cancer; growth dystrophy in children and adolescents; post-infectious convalescence (especially in children), post-partum, post-traumatic. Against asthenia and arthritis pain in the context of overweight, obesity , insulin resistance, metabolic syndrome or diabetes. For the prevention of rheumatoid arthritis, painful arthritis, especially in a context of demineralization or autoimmunity. Medical bibliographic sources and clinical trials : - Broer J. et al .; Immunosuppressant effect of IDS 30, a stinging nettle leaf extract, on myeloid dendritic cells in vitro, J. Rheumatol, 2002 - Schulze-Tanzil G. et al., Effects of the antirheumatic remedy hox alpha. A new stinging nettle leaf extract on matrix metalloproteinases in human chondrocytes in vitro, Histol. Histopathol., 2002 - Chrubasik S. et al., Evidence for antirheumatic effectiveness of Herba Urticae dioicae in acute arthritis a pilot study. Phytomedicine, 1997 - Riehemann K. et al .; Plant extracts from stinging nettle (Urtica dioica), an antirheumatic remedy, inhibit the proinflammatory transcription factor NF-kappaB, FEBS Lett., 1999 - Gülçin I. et al., Antioxidant, antimicrobial, anti-ulcer and analgesic activities of nettle (Urtica dioica L.), J. Ethnopharmacol., 2004 - Mittman P., Randomized, double-blind study of freeze-dried Urtica dioica in the treatment of allergic rhinitis, Planta Med, 1990 - Roschek B. et al .; Nettle extract (Urtica dioica) affects key receptors and enzymes affects key receptors and enzymes associated with allergic rhinitis, Phytother. Res., 2009 - Domola MS et al., Insulin mimetics in Urtica dioica: structural and computational analyzes of Urtica dioica extracts, Phytother. Res., 2009 - Farahpour MR et al., Antinociceptive and anti-inflammatory activities of hydroethanolic extract of Urtica dioica. Int J Biol Pharm Allied Sci, 2015 - Bnouham M. et al., Antihyperglycemic activity of the aqueous extract of Urtica dioica, Fitoterapia, 2003 - Degirmenci NS car et al., Cytotoxic and Apoptotic Effects of Caffeic Acid and Caffeoyl Malic Acid on Brain Glioblastoma (U87 Mg); Bulletin of Pharmaceutical Research, 2016
<urn:uuid:0f78e2a6-c079-4d19-9f3e-b28d998d194d>
CC-MAIN-2022-33
https://blog.soin-et-nature.com/en/the-great-nettle-a-vegetable-from-prehistoric-times/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571597.73/warc/CC-MAIN-20220812075544-20220812105544-00605.warc.gz
en
0.89578
2,320
2.8125
3
Casement, Sir Roger David (1864–1916), humanitarian and Irish nationalist, was born 1 September 1864 in Sandycove, near Dublin, youngest child among one daughter and three sons of Roger Casement, retired army officer, and Anne Casement (née Jephson). His elder brother was Thomas Hugh Casement (qv). He was brought up as a member of the Church of Ireland, although his catholic mother arranged for her children to be baptised secretly in her own faith. After her death (1873) the family moved to Co. Antrim, where Roger was educated in the Ballymena diocesan school. When his father died (1877) the children were left in straitened circumstances and became wards in chancery. Roger was cared for by relatives in Antrim and Liverpool. As an adolescent he admired and identified with Irish rebels of the past, and he remained a romantic idealist all his life. At the age of fifteen Casement began work as a clerk in the Elder Dempster shipping company, and four years later this led to a post as purser on one of the company's ships bound for West Africa. From 1884 to 1891 he lived in the Congo, which became a personal colony of the Belgian king, Leopold II. His occupations included those of surveyor, explorer, and (briefly) assistant in a Baptist missionary station. From 1892 to 1895 he was employed as a surveyor and customs official in the Niger Coast protectorate, after which – because of his extensive African experience – he was absorbed into the British consular service. Joseph Conrad was impressed by him when they met in the Congo, remarking that ‘he could tell you things! Things I have tried to forget, things I never did know’ (Reid, 14). Casement was a tall, handsome man of considerable charm. During his time in Africa he was efficient and energetic, he was ‘brave, diplomatic and usefully observant’ (Sawyer, 26), but he was also frequently bored, irritable, and depressed. He suffered from malaria, jaundice, and other illnesses, and throughout adult life was often debilitated. He veered rapidly from enthusiasm to anger and despair, showing signs of bipolar disorder. He hated routine and disliked most of the places where he lived. Early in his career he was an imperialist, believing that colonialism was a force for enlightenment and that it eliminated abuses such as slavery. He supported the British war in South Africa at least partly because of the Boers’ maltreatment of the black population. (In later years he became a harsh critic of British policy towards the Boers.) He could be snobbish, and at times displayed some of the racist views characteristic of the period, but he liked Africans and they reciprocated his affection. He was a warm-hearted man who sided psychologically with the underdog or the oppressed. On two separate occasions the consular service provided him, improbably, with a challenging role in which he could display his initiative, independence, and courage. After serving in Luanda and Lourenço Marques (later Maputo), Casement went back to the Congo as British consul. The turning point in his career came in 1903 when he was ordered to investigate reports of atrocities carried out by Leopold's agents. He rented a steamboat and travelled to remote areas of the Upper Congo, remarking that he was ceasing to be a consul; he had become a criminal investigator (Ó Siocháin & O'Sullivan, 37). In the course of his journey he encountered plentiful evidence that the collection of rubber was associated with forced labour, extortionate taxes, mutilation, murder and depopulation; he observed colonialism in its most brutal form. In February 1904 Casement's report on the Congo was published as a sixty-page government white paper. It was well structured, solidly factual, and detached in tone – in contrast to the intemperate and emotional style that characterised much of his correspondence. It was a formidable indictment of a system based on oppression and cruelty. He was aggrieved when the Foreign Office watered down his original version, describing the final result as ‘cooked and garbled’ (Inglis, 86), and felt that he was inadequately supported against Leopold's counter-attack. Nonetheless his findings were confirmed by an international commission appointed by the king, and his report was one of several pressures that led the Belgian government to take over the administration of the Congo in 1908. His achievements were recognised by his inclusion as CMG in Edward VII's 1905 birthday honours list, but this gave him no satisfaction; he never opened the parcel containing the insignia of his award. More significantly, they also led him to establish a close working relationship with E. D. Morel and other critics of colonial abuses. Partly for reasons of ill health Casement interrupted his consular career in 1904–6 to spend eighteen months in Ireland and Britain, and for most of this time he was seconded without pay. In Ireland, as abroad, he was peripatetic; he had no home or base, and he stayed in lodgings, hotels, and the houses of friends. He became a committed Irish nationalist who supported the ideals of ‘Irish Ireland’, and in particular the revival of the Irish language. He excused his continuing membership of the consular service, which he loathed, by the fact that he could (and often did) give away much of his salary. While he was parsimonious in small matters he was always extravagantly generous in his financial assistance to individuals or groups that won his sympathy – such as wayward members of his family, Morel's Congo Reform Association, and an Irish-speaking community in Co. Galway. He was a difficult subordinate and the Foreign Office was reluctant to reemploy him, but in 1906 he rejoined the consular service and took up the first of a series of postings in Brazil. These culminated in his appointment as consul-general in Rio de Janeiro. Although he continued to be efficient in the conduct of his duties, he became increasingly frustrated, and disliked the Brazilian people. During this ‘exile’ his commitment to Irish causes deepened. But he was aroused by a new challenge: he was directed to investigate reports of atrocities in the region of the Putumayo, a remote tributary of the Amazon. In its collection of rubber the Peruvian Amazon Co. was accused of exploiting not only local Amerindians, but also some British subjects from Barbados. This new task seemed to replicate his experiences in the Congo. In August 1910 Casement joined a commission of inquiry established by the company. Once more he was a diligent and persevering investigator, interviewing victims and witnesses, keeping detailed records, and taking photographs. He discovered that many of the indigenous population of the Putumayo were treated as slaves, and that practices such as flogging, rape, starvation, mutilation, and murder were commonplace. He wrote a second report for the Foreign Office, which he completed in March 1911, and then returned for another visit to the Amazon. His report attracted widespread publicity and praise when it was eventually published, but in practice it did little to improve the conditions of the inhabitants of the Putumayo. Ultimately they were saved not by the intervention of foreign consuls and governments but by the collapse of the market for wild rubber. Casement had become a dissident within the consular service and (despite his graceful acknowledgment) was embarrassed by the award of a knighthood in 1911. He became even more committed to Irish causes and advocated a fully independent Ireland – which he believed could be achieved with German assistance. In August 1913 he retired at last from the Foreign Office. Until then he was better known abroad than at home, having spent more than thirty years in Britain, Africa, and South America; only now, aged almost 49, did he begin to play a significant role in Irish affairs. Nationalist and rebel At first Casement tried to win over Ulster protestants to Irish nationalism, and his predictable failure threw him into one of his many fits of depression (although to the end of his life he persisted in his belief that unionists and nationalists could join forces). But the formation of the Irish Volunteers in November 1913 provided him with a new role and a new crusade. He became a member of their provisional committee and travelled around the country, organised paramilitary units, made speeches, and relished what he described as intrigue and gross sedition. He believed that not merely would the creation of a Volunteer force strengthen the hand of Irish nationalists, but it would also provide the Irish people with much-needed discipline. Casement took the initiative in the Volunteers’ most spectacular exploit, the Howth gun-running of July 1914. In contrast to the inactivity displayed by most members of the IRB, he and a small number of friends decided to follow the example of the Ulster Volunteers and to import guns from Continental Europe. Together with Erskine Childers (qv), Alice Stopford Green (qv), Bulmer Hobson (qv), and a few others, he organised the purchase of 1,500 rifles and ammunition in Belgium and their transportation to Ireland. Some of these weapons were used two years later in the Easter rising. Casement was always impatient and impetuous, and by the time that the arms were delivered to Howth he had already arrived in the US with the aim of raising funds for the Volunteers. The success of the gun-running made him a hero among Irish-Americans, but the outbreak of the first world war a week later soon distracted attention from Irish affairs. The results of his campaign were disappointing. He wrote an incautious letter to the Irish Independent in which he claimed that Ireland's real enemy was Britain and not Germany, thereby ruling out his return to Ireland. Instead he travelled to Berlin in October 1914 as the envoy of Irish-American leaders. He persuaded the German government to declare that if its forces landed in Ireland they would do so as liberators. Later he had a friendly interview with Chancellor Bethmann Hollweg – but he was already accustomed to the company of the powerful, having met King Leopold in Brussels and President Taft in Washington. His actions disconcerted the British authorities, and he was flattered by reports that a substantial sum of money would be paid in return for information leading to his capture. Otherwise the eighteen months he spent in Germany were a failure. He tried to induce captured Irish prisoners of war to change sides and to join an ‘Irish brigade’ which would support the central powers by liberating Ireland – or, alternatively, Egypt. His methods were clumsy and the response was disillusioning: he secured only fifty-six recruits from a total of about 2,300 prisoners. Casement's communications with friends and allies in Ireland, Britain, and the US were equally inept. He encouraged the Germans to assist an Irish rebellion but he became dismayed by what he saw as their inadequate commitment, describing their plans (prophetically) as ‘practically three men in a boat to invade a kingdom’ (Reid, 335). He denounced them with the same fervour with which he had earlier abused Belgians, Brazilians, Americans, Irish unionists, home rulers, and various others. His health was wretched, and he was often lonely and depressed. Casement believed that an Irish insurrection would be crushed unless it received substantial assistance from Germany, and when it became clear that adequate help would not be forthcoming he decided to travel to Ireland and try to prevent the planned rebellion from taking place. The Germans obligingly sent him there by submarine, and it was intended that he would arrive on Good Friday, at the same time as a ship carrying a modest supply of arms. The two vessels failed to rendezvous in Tralee Bay, but Casement, accompanied by Robert Monteith (qv) and Daniel Bailey, set off for the shore in a dinghy. It capsized, and Casement landed on Banna Strand ill, drenched, and exhausted. He hid and waited for his companions to return with assistance, but was soon captured. He persevered with his original intentions, and while under arrest he tried to send a message to Dublin, warning that the rebellion should be aborted. He was brought to London, and during his interrogation in Scotland Yard on Easter Sunday asked to be allowed to communicate with the rebel leaders to persuade them to call off the insurrection. This was not permitted. After the suppression of the Easter rising Casement was tried for treason in the Old Bailey in June 1916. The case against him was based on a statute of 1351 which, in translation from the original Norman French, defined treason as ‘levying war against the king or being adherent to the king's enemies in his realm, giving them aid and comfort in the realm or elsewhere’. He was accused of having tried to recruit Irish prisoners of war to form an Irish brigade which would fight the British, and of having participated in a German expedition to Ireland. His counsel, A. M. Sullivan (qv), argued that any treason of which he was guilty had taken place outside the realm, but this plea was not allowed. Sullivan also failed in his more reasonable effort to link Casement's actions with the plans for rebellion made by the Ulster Volunteers – in which they had been supported by F. E. Smith, who was now attorney general and counsel for the prosecution. Neither side mentioned the fact that Casement had landed in Ireland in an effort to prevent the rising. The prosecution remained silent because such evidence would complicate its case for treason, and the defence because Casement did not wish to repudiate the rebels. In any case, he was obviously guilty of treason while in Germany. Among the witnesses were some of the prisoners of war whose loyalty he had tried to subvert and who had foolishly (or more likely, cynically) been returned by the Germans as part of a prisoner-exchange. It was in their interest that the British should execute an internationally-famous humanitarian. After a trial lasting four days the jury took less than an hour on 29 June to declare Casement guilty. Following an old Irish tradition he made an eloquent speech from the dock. He ridiculed the 1351 statute, claimed that he should be judged only by an Irish jury (particularly since he had landed in Ireland rather than in Britain), praised the Ulster Volunteers, and argued that Irishmen should fight for their freedom at home rather than abroad. His knighthood was cancelled after his conviction. An appeal against his sentence was rejected on 24 July, and Casement was hanged on 3 August 1916, a day after he had been received into the catholic church. He was buried in Pentonville jail, and his remains were returned to Ireland only in February 1965. After an elaborate state funeral they were reburied in Glasnevin cemetery. Even before Casement's trial British officials divulged official copies of diary extracts, supposedly written by him, in which the author described sexual encounters with young men and adolescents. They contained numerous accounts of partners’ physical details and of payments made. Their display to journalists and to influential figures in Ireland, Britain, and the US was designed to blacken his reputation and to undermine any movement for clemency. In the probable event of his execution they would also help to prevent his being viewed as a martyr. The tactic succeeded in the first of these objectives. At a time when homosexual practices were widely loathed, several among those who were shown these documents chose not to involve themselves in the appeal for a reprieve. Over many decades some of Casement's supporters claimed that the diaries were forged. There were strong arguments in favour of such a view: none of his friends and acquaintances suspected he was homosexual; accounts of the diaries’ discovery were inconsistent; the ‘black’ or compromising diaries related to the years in which he made his two river journeys, when his movements were uniquely well recorded; and some of the entries for 1911 indicate rash behaviour at a time when Casement was under constant surveillance by his enemies. On the other hand it was argued that the diaries were preserved carefully by the British government (although access to them was denied until 1959), and that this would have been self-defeating if they were forgeries; F. E. Smith clearly believed they were genuine and invited Casement's counsel to inspect the official copies – an offer which was wisely declined; the diaries contained inconsistencies (such as criticism of homosexuality) which seemed to weaken their impact, and which a forger might sensibly have avoided; the sheer volume of material was superfluous, increasing the risk of incriminating errors; and any forgery needed to be carried out in a hurry, since there had been no need to produce the diaries until Casement was captured a mere five weeks before his trial. Eventually in 2002 forensic examination confirmed their authenticity to general (although not universal) satisfaction. But in contrast to the long-standing disagreement over whether the diaries were genuine, the unscrupulous use that was made of them in 1916 – to smear the reputation of a condemned man and thereby help ensure the failure of his appeal against his death sentence – has met with nothing but embarrassment and distaste. The diaries have provoked understandable controversy, but this cannot obscure Casement's importance. He was a humanitarian who fought with bravery and determination against the enslavement of indigenous peoples in the Congo and Amazonia. He was the principal organiser of the Howth gun-running, without which the Easter rising might not have taken place. Despite his attempts to prevent what he believed would be a doomed insurrection, he was also the last victim of the executions that followed the Easter rising, and thereby became a nationalist martyr.
<urn:uuid:8f7795b1-4940-4bb8-a2f2-38e9a1a93c12>
CC-MAIN-2022-33
https://www.dib.ie/biography/casement-sir-roger-david-a1532
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573242.55/warc/CC-MAIN-20220818154820-20220818184820-00604.warc.gz
en
0.989665
3,680
2.640625
3
Reading British newspapers’ commentary on the Ukraine war gives a sense of deja vue. We have a return of the ‘West’, of the ‘Free World’, of the exreme demonisation of the opponent. Commentators are urging NATO to send troops to Ukraine, to institute a no-fly zone, to become militarily actively. Ukraine needs NATO’s ‘humanitarian’ intervention, the postmodern version of the old concept of just war. This short article discusses the history of just war. Throughout history, people have gone to wars and sacrificed themselves for religion, empire, nation or ideology. Religious and secular leaders know well the importance of adding high principle to low ends. This is equally evident in Homer’s Iliad, in Thucidides’ chilling description of the Athenian atrocities at Melos and Mytilene, in the chronicles of the crusades and in the films about the Iraq and Afghanistan wars. Stalin’s use of religious themes in the defence of the Soviet Union against the Nazis in 1941, despite decades of religious persecution, is a typical of the cynical moral turn often taken by rulers. Such cynicism has been treated with wry smiles by writers and poets. Shakespeare as much as Brecht were fascinated by the way in which the hawks of war put on the fleece of moralist and preacher, better to persuade soldiers and citizens about the value of killing and dying for the cause. As the poet Wyndam Lewis put it ‘but what war that was ever fought, was an unjust war, except of course that waged by the enemy’. This moralisation of war is relatively easy when the moralisers are victims of aggression. But empire builders, colonialists, the Αmericans in Iraq and the Russians in Ukraine are not devoid of moral rhetoric. Putin claims that he invaded Ukraine to save the Russian speakers from ‘genocide’, the accusation that the Ukranian leadership levels agains the Russians. The hawks of war have always put on the fleece of moralist and preacher, to persuade soldiers and citizens about the value of killing and dying for the cause. The lack of a moral arbiter has made just war one of the hardest moral mazes. For the warring parties, there is nothing more certain than the morality of their cause. For third parties, there is nothing more uncertain than the rightness of the combatants’ conflicting moral claims. War is always morally ambiguous. This ambiguity becomes evident in the history of the morally justified or ‘just’ war. In premodern societies, no law of war existed. Their customs determined the correct way for starting the war, the conduct of war and the treatment of hostages and the dead. It is against this background of moral undecidability that we must examine the history of the morally justified or ‘just’ war. In premodern societies, war was a natural and undisputed part of political organisation. No formal law of war existed, but the customs of tribe or polis determined the correct way for starting the war, the conduct of war and the treatment of opponents, hostages and the dead. The Iliad, the Trojan Women or Antigone offer ample evidence of such customs. It is not true therefore that legally unregulated warfare is unlimited warfare. Every community develops its own rules and customs for conducting this ultimate test of life. The formal concept of the bellum justum appeared in Rome. Before the beginning of hostilities, the fetials, a college of priests, determined whether the conditions for going to war existed, and then performed certain legal and religious practices: A jus fetiale, a legal demand for just satisfaction, was issued and was followed by auguries taken before battle. Gods decided the outcome of battles and wars. The scrupulous observance of rituals was a good insurance policy. The ancient practices of war brought together sacral functions, religious rituals and legal regulation. All three are still with us today. The early Church developed first a consistent theory of just war in an attempt to serve Caesar without abandoning totally its pledges to God. The Church father Augustine argued that a just war redresses a moral wrong and restores the violated moral order. It has three characetristics 1. It must be declared by legitimate authority as a last resort. 2. it must have justa causa. Wars were just if conducted in self-defence or for restitution and retribution after unjust acts or conquests. 3. the it should have a reasonable prospect of success. Medieval theology became preoccupied with the definition of the justice of the cause, the lawful initititation of war known as jus ad bellum. It neglected the jus in bello (the lawful conduct of war). The divine duty to punish infidel and evil-doers made the prosecution of war limitless. We had the unremitting violence of the Crusades, the genocidal attacks on Indians and indigenous people of the New World All this came to an end in the 17th and 18th centuries with the emergence of early international law, the Jus Publicum Europaeum. The law secularised the idea of the just cause and started developing a legal regulation of war. The theologians had assumed that only one of the warring parties could be just, as it would be contradictory for both to pursue a just cause. They determined the justice of the cause from God’s perspective. Lawyers, fancy themselves as a priesthood, but they could not claim god’s onniscience. International law abandoned the search for universal standards of justice. The sovereign states were the only judges of their cause. Both parties could believe unreasonably but validly that their cause is just. Emphasis shifted from the cause of war to the development of a detailed jus in bello, legal rules to regulate the conduct of war without overburdening the parties with excessive concern for the collateral damage of their action. The principle of discrimination distinguishes between military staff and civilian populations and prohibits attacking, targeting or otherwise harming non-combatants except when absolutely necessary. The principle of proportionality, attempts to adjust the means and scope of military action to its legitimate objectives. The undermining of the theological conceptions of just war, replaced morality with sovereignty. The judgement that a war is just belongs exclusively to the sovereign. By declaring and waging war, the sovereign accomplishes its nature. Similarly, the jus in bello, the law of war, is a sovereign concession and implicit contract amongst princes, an exception to the Roman maxim has it inter armes silent leges in war the law is silent. Immanuel Kant, who wanted war abolished despised this laywerly pragmatism, attacked Grotius, the father of international law, as a ‘miserable comforter’ of Kings. For Kant reason condemns war; the ideal should be not just war but just peace. Force can be used morally in very few instances. The aim of cosmopolitan society, first evangelised by Kant, was defined negatively: it is the abolition of war. The European legal regulation depended on two crucial exceptions: in the colonial wars against savages and heathen, the constraints of the law of war, premised on a society of homogeneous christian sovereigns, did not apply. The so-called European ‘amity line’ dictated a certain civility in metropolitan wars. The new world on the other hand became the space of release of European barbarity. In a related development, the idea of the ‘enemies within’ emerged and was strengthened by the rise of nationalist and racist ideologies. For the modern ideological state, radical political and social opposition is seen as a challenge the internal ordre publique. Indeed, while Plato had stated that it is an abominable outrage for the parties in civil war to ravage the lands or burn the houses of the other, something acceptable in a war against strangers, modernity has reversed the situation. War is partly regulated while civil war has no limits. Dissidents and rebels are treated as as bandits, terrorists, subhuman subject to annihilation. The early modern theory of just war was the clearest sign of the emergence of a new system of law and international relations based on state sovereignty. Beyond its immediate aims, war’s purpose is to accomplish the essence of the sovereign. A war between sovereigns is just because the combatants are formally equal actors (hostes aequalitur justi). Just War in the Twentieth Century The twentieth century changed somewhat this picture. After the world wars, the desire not just to control but to prevent war returned. The first count in the Nuremberg indictment was for crimes against peace, in other words, the crime of waging unjust war. Under Chapter 7 of the UN charter, war became unlawful unless it is in self-defence or on the authorisation of the Security Council acting on its obligation to prevent and stop violations of peace. In this sense, just war theory returned, partly masked in the distinction between aggressive and defensive wars. But the picture was complicated by the fact that the post-WWII legal order was based on two contradictory principles. A claim to universal human rights, was schizophrenically accompanied by the principle of non intervention in the internal affairs of states, in other words the inviolability of sovereignty. In the long Cold War period, most wars involved either the two superpowers or their satelites. As a result, the UN Security Council (“SC”) was unable to attract the unanimous view of the permanent members for military intervention. The attempt to codify in law crimes against peace failed. A legal definition of just war would be a double-edged sword for the Major Powers. But after the fall of communism an extensive moral order emerged with a weak legal gloss, human rights and humanitarianism. The aim is to moralise domestic and international politics. According to international lawyer Ruti Teitel a new ‘humanity’s law’ has emerged. It brings together the law of war and human rights law. The most obvious sign of this new moralism is the emergence of humanitarian wars, where military force has been placed in the service of humanity. Bosnia Kosovo and Libya were early examples of this new military humanitarianism. Let me discuss briefly two examples about attitudes to saving populations. When Vietnam invaded Cambodia in 1978 and overthrew the Khmer Rouge regime, today accepted as the worst case of genocide in the second part of the twentieth century. with the 2 million dead of the Killing Fields, it was universally condemned. The French said that “[t]he notion that because a régime is detestable foreign intervention is justified and forcible overthrow is legitimate is extremely dangerous. That could ultimately jeopardize the very maintenance of international law and order” A Soviet veto prevented a SC resolution ordering the Vietnamese to withdraw. Look at Rwanda in 1994: despite evidence was presented to the SC about an imminent genocide, the council withdrew the existing UN peacekeepers except for 270 French soldiers. When a resolution was proposed to the effect that a genocide was taking place, putting into effect emergency measures under the Genocide convention, the British representative said that calling what was happening a genocide would make the SC a laughing stock. In the same year 1994, NATO forces started bombing Serbian positions in Bosnia. The Responsibility to Protect (r2p) The UN intervention in Bosnia-Herzegovina was carried out under SC mandate. The NATO bombing of Kosovo and Yugoslavia in 1999 was different. Milocevic and the government of Serbia were attacking and ethnically cleansing Albanians from the southern province of Kosovo. To stop that, NATO systematically bombed for the first time since WWI Belgrade, a major European capital. Kosovo was an extensive use of military force for humanitarian purposes without SC authorisation. Morality was reintroduced into war unilaterally. After the end a major effort was launched to develop a new theory of just war. The debate is whether morality can inform law’s role of regulating the most extreme form of politics, war. The great achievement of modern law is precisely the proclaimed exclusion of morality from its operations. The experience of the murderous religious wars, of the relativism of values in a multicultural sociaity and the fear of nihilism meant that modern law sees itself as a neutral mechanism. Morals, ideology or politics should be kept out of it, to allow law to turn social conflict into technical questions about the meaning of rules and entrust it for resolution to rule experts, lawyers and judges. But then as we know you can never keep the buggers out. The contortions of the relationship between politics, law and morality bedevilled the attempt to define humanitarian war after Kosovo. The first to try a comprehensive definition was Tony Blair. Following his championing of ethical foreign policy, he formulated five criteria of postmodern just wars In a Chicago speech: Are we sure of our case? Have we exhausted all diplomatic options? Are there military operations we can sensibly and prudently undertake? Are we prepared for the long term? Do we have national interests involved? The most interesting omission is international law; the most striking innovation, the insertion of national interest. International law would come back and torment Blair when the legality of the imminent Iraq war became a political issue. The addition of national interest was more revealing. National interest, a palpable contradiction if not refutation of moral principle, reveals the postmodern just war logic. It allows cases to be distinguished from pressing precedents, while insisting that the moral motives for (in)action are fully adhered. Human rights and humanitarianism offer the gloss of moral universalism without the discipline of moral consistency. This combination of moral stringency and utilitarian laxity makes the millenarian ambitions of humanitarianism the perfect cover for empire and, national interest, the perfect imperial opt-out clause. Senior Western international lawyers agreed that the Kosovo war that the use of force was a grave illegality but had a moral justification. The war was illegal but legitimate. But this was an one off unrepeatable case, it did not create a precedent. Jurgen Habermas, the putative heir to Kant, and our own muscular liberals disgreed. Kosovo showed the way forward by pushing international law towards its cosmopolitan phase and upholding universal citizenship rights. For the lawyers, moral considerations must be introduced because international law in its amorality declares the war illegal. The law on its own is inadequate to the task of saving humanity. Habermas poses the problem and its answer in reverse terms. The law of human rights properly extended can save the day. For the lawyers, morality saves politics from (inadequate) law. For Habermas, the law saves politics from (potentially problematic) moralisation. Following this stalemate, an International Commission on Intervention and State Sovereignty concluded in 2001 that states have a responsibility to protect their population and the international community must assist them. International lawyers agreed that the Kosovo use of force was a grave illegality but had a moral justification. The war was illegal but legitimate. But this was an one off unrepeatable case, it did not create a precedent. The International Commission on Intervention and State Sovereignty concluded in 2001 that states have a responsibility to protect their population and the international community must assist them. The r2p, as it became known, was eventually adopted by World Summit of the UN in 2005. The international community may use sanctions and military intervention as a last resort if a state fails to protect its population from genocide, crimes against humanity, war crimes and ethnic cleansing. However the use of force must be authorised by the SC as has always been the case. It is the Security Council with the inbuilt veto power of the 5 permanent members that must authorise intervention. In 2011 the UN Security Council authorized for the first time a military intervention in Libya using r2p terminology. It authorized Member States to take “all necessary measures” to protect civilians but it explicitly rejected regime change. The three permanent states driving the intervention (the US, UK and France, or “P3”) quickly moved to support the anti-Gaddafi forces however. It soon led to chaos and heavy civilian casualties. The BRICS—Brazil, Russia, India, China and South Africa, all then represented on the Council—argued that the protection mandate was exceeded. When we came to Syria, President Obama insisted in 2013 that the goal of any intervention would be to protect citizens and not “regime change or harm unarmed citizens. Russia and China vetoed the resolution to use violence in Syria. They stated that R2P had been abused by the U.S. as a pretext for ‘regime change’ in Libya. India, Brazil and South Africa agreed and even the British Parliament voted against the use of force. We are returning to the intimate connection between strategic priorities and moral concerns. A few months before the Iraq war, while on a lecture tour of China, I asked a high ranking Chinese official if China would exercise its veto. He replied that his country has no interests in Iraq and by supporting the US expects to be rewarded in trade relations and its own human rights difficulties. A few days later China abstained and immediatley afterwards joined the WTO, a long ambition. Morality and human rights are wheeled out when they supports state interests and are easily discarded if they create real or imaginary constraints. I don’t want to deny that the arguments from international law have value. But from a wider perspective, they miss the point: in our wars against terrorists and barbarians, the role of international law is not to decide its initiation but to help its legitimacy. Morality exists if it is effective and military action is moral if it succeeds. Let me conclude. War and just war theories have been important strategies for the emergence of state sovereignty. War brings states to life, literally as most states have been the outcome of war or revolution, metaphorically by energising nations and metaphysically by raising people to the universal through their confrontation with death. War has always acted as the litmus test for man and nation. ‘War is to men as maternity to women’ stated Mussolini. A ‘humanitarian’ war is a contradiction in terms. War and its consequences, bombing and maiming people can never be moral. Bombing does not protect people and does not prevent atrocities. A destructive war, by definition a devastating negation of human rights, can be seen as humanitarian only because human rights are often hijacked by governments and politicians, those against whom they were invented.
<urn:uuid:b48138a7-af2e-4ce5-b7b2-ebc1af310257>
CC-MAIN-2022-33
https://criticallegalthinking.com/2022/03/15/a-short-history-of-just-war/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00406.warc.gz
en
0.952343
3,831
2.625
3
Many senior educational administrators are disappointed with technology's adoption in the education sector. The common refrain is that EdTech should have 'Ed' before 'Tech' and 'Tech' should not overshadow 'Ed' as is happening right now. The educational industry is currently heavily digitalised, and schools must ensure that this change is inclusive. Such results would go a long way toward ensuring the sustained growth of the digital economy and its ability to improve numerous people's lives by teaching digital skills. In the K12 educational system, I think online learning will become more and more significant. The global economy is seeing more considerable developments, including the education sector's digitalisation. Online and offline options are no longer mutually exclusive; as the digital world permeates more and more aspects of our everyday lives, schools must make a determined effort to guarantee that all students receive the digital education and training necessary to succeed in the modern digital world.Read more It is fascinating that kids have the ability to be very creative and learn new things. Kids have minds designed to learn, and adults have minds designed to perform. Adults experience functional fixedness, which causes them to perceive everything precisely as it is due to the brain's maturation. An adult, for instance, will view a tennis racquet exactly as it is. A child, however, will interpret a broomstick as a javelin stick. Children often act in ways that adults find humiliating when learning. Children will feel uncomfortable in the future when they reflect on an incident, but they don't feel humiliated right now. They would not have done those things or grown as they did if they had been terrified of appearing silly.Read more Self-confidence enables students to handle setbacks, mistakes and failures with ease. Instead of being crippled by it, resilient children get up quickly, learn from their mistakes, and try again. They accept that the said failure is a part of life and growth and take more chances as a result, which promotes internal growth, making them even more successful later in life. All learning is a discovery or a journey of exploration. By its nature, any exploration may have successful or unsuccessful outcomes. That is a part of life, the uncertainty of outcomes. But it leads to learning.Read more Results of the National Achievement Survey (NAS 2021) were recently released. Grade-wise subject-specific Learning Outcomes were identified by the NCERT, and the learning achievement of students of Classes 3, 5, 8 and 10 studying in both Government and Private schools were tested. The subjects involved were Language, Maths, Science, Social Science, EVS and English.Read more After independence, India launched The Sarva Shiksha Abhiyan (SSA), which helped ensure near-universal access to primary schools. However, this also led to the development of numerous small schools. According to 2016–17 data, nearly 28% of India's public primary schools have less than 30 students. There were 1,08,017 single-teacher schools. Teachers in such schools often teach multiple grades at a time and teach multiple subjects. And physical resources, such as laboratory and sports equipment and library books, are simply not available. This also has a negative result on the teaching-learning process as students learn and perform best in communities and teams.Read more District Institute of Education and Training (DIET, Pune) is a nodal agency for providing academic and resource support to the over 7,000 schools and over 30 thousand teachers in the Pune district.Read more Open Links Foundation launched the pilot for Acharya Vinoba Bhave Sikshak Sahayak Kryakarm at Zilla Parishad government school, Wagholi, on the outskirts of Pune. This is also the cluster head for 12 schools in the region. The school was buzzing with children - happy and frolicking – naturally. Most children appeared from the lower-income bracket. The school was beautifully painted. It was well maintained in many parts yet looked astray in others. The school looked lively with children running around outside the classes, some very happy and smiley to see us, some hiding behind trees shyly. We learnt more about the school proceedings and how it undertakes its educational disciplines as the day went on.Read more Traditional education's paradigm has shifted considerably in the last few years. With the development of the internet and new technologies, being physically present in a classroom is no longer the sole method to learn. Now, as long as you have access to the internet, you can acquire a good education anytime and wherever you choose. We are presently in the middle of an online education revolution.Read more What exactly is a lesson plan? Lesson plans are a detailed guideline or a guide-map for teachers to plan their lessons according to what students should learn, how they will be taught, etc. A lesson plan basically includes learning objectives, resources like worksheets, videos, etc.., lesson procedure, assessment methods, and related resources. Regardless of their skill, experience, or subject of study, all teachers must produce a lesson plan that is well-thought-out. Lesson plans are essential for assisting students in achieving their short- and long-term goals in a learning setting. Studies reveal how important it is to visualize success in order to achieve it. In a classroom context, neglecting to have a lesson plan in place reduces your chances of imagining certain outcomes and meeting your goals.Read more Transformation is also known as reform. It's a sign of progress. The same is true in India's educational system. It is gradually and slowly reforming. In the last decade, India's educational system has seen significant modifications. Blended learning, online classrooms, and experiential learning have all revolutionized the way students interact with educational content.Read more The country's school education system has changed dramatically over the years. The growing use of technology has prompted child-centered methods and prompted the government to focus on building a system that is in line with the global evolution of school education. Education Quality and delivery are important aspects in the development of factors that lead to a country's overall economic consolidation. It also shapes the factors that influence human development and contributes to modernity.Read more As the world transforms to embrace the technological future, how and what we teach in our educational system will be changed to meet the expanding demands of the twenty-first century. Even though humanity is confronting one of the greatest catastrophes in history, or at least one of the longest, Covid-19 – the growth and development in many sectors have not slowed. On the contrary, it appears that technical equipment and device construction are just progressing. With that in mind, it is not difficult to conclude that the future of teaching and learning has a good chance of becoming more advanced and beneficial to students. Students and young people who are still in school have a lot of opportunities ahead of them. As technology becomes more integrated into school systems, the future of education appears brighter than ever.Read more tickLinks is a free and easy to use platform and app which has the availability of resources and lesson plans for many different State Education Boards, to help teachers find the relevant resources they need for the lesson planning of different boards. Not only tickLinks has amazing resources - but also lesson plans with clear learning outcomes, including activities, worksheets, videos, stories, cases etc.. which not only help to reduce the class time preparation but also improves class effectiveness with greater engagement. Till date tickLinks has covered school lesson plans for CBSE and various state boards curriculum- Punjab, Assam, Jharkhand, Meghalaya, etc..Read more Micro-learning is ideal for today's students, who have shorter attention spans. It's critical to present information at a rate that matches pupils' ability to focus to assist them absorbs knowledge more efficiently. This will raise development speed while also improving learning transfer and engagement.Read more DAV Group of Schools in Chennai has formed a strategic partnership with Open Links Foundation to support 'tickLinks,' a free online library of educational resources for teachers. tickLinks is similar to Wikipedia. By combining the power of technology and community, tickLinks enables teachers to significantly cut class preparation time and improve class effectiveness. This offering drives equitable education through easy access to all teachers, regardless of their location, income level, or language proficiency.Read more Contests serve an important role in pushing kids to succeed and perform. They provide far more benefits than just the award for the winner. Contests allow participants to get valuable experience, benchmark and analyze results, demonstrate abilities, and discover personal aptitude. Students are also encouraged to improve their ideas and talents, as well as to use new tactics.Read more Contests serve an important role in pushing kids to succeed and perform. They provide far more benefits than just the award for the winner. Contests provide participants with the opportunity to, get valuable experience, benchmark and analyze results, demonstrate abilities and discover personal aptitude. Students are also encouraged to improve their ideas and talents, as well as to use new tactics.Read more The epidemic of Covid19 had a significant impact on our educational system and learning processes, resulting in the closure of physical spaces in schools, colleges, and educational institutions. This closure ushered in online methods, giving rise to e-learning, or online learning, in which students are taught using a variety of online platforms.Read more The lesson plan is a handbook that assists teachers to ensure that the class does not stray from the topic – and ensuring that all the students learn in an engaging and fun way. It also includes learning outcomes, questions, resources, and activities for teachers.Read more The learning experience of over 90% of school students are influenced by teachers. NEP 2020 expects - arts integrated learning, values-integrated learning, science integrated learning, integrating to the current context, etc. This requires that teachers are well equipped with various ideas before they conduct a class.Read more The Central Board of Secondary Education (CBSE) is a national board of education in India practiced by all public and private schools, controlled and managed by the Union Government of India. All the schools in India associated with Central Board of Secondary Education (CBSE) follow an NCERT curriculum. It may be regarded as the sum total of a planned set of educational experiences provided to a learner by a school.Read more One of the important tasks of Maharashtra State Board is to conduct the SSC for the 10th and HSC for the 12th examinations. The syllabus and lesson plans of Maharashtra State Board are provided on TickLink websites. tickLinks provides resources for Maharashtra State Board teachers. It acts like Wikipedia, an open-source for any learning resources.Read more Andhra Pradesh Board of Secondary Education (BSEAP) is an autonomous body under the education department of Andhra Pradesh. Its main responsibility is to manage and supervise Secondary education in the state. The board sets their syllabus and conduct examinations. tickLinks has high-quality teachers lesson plans and resources available for teachers of the Andhra Pradesh Board.Read more Punjab School Education Board (PSEB) is a school board based in Mohali, Punjab. The board was founded to administer the curriculum taught in public schools and it publishes its own textbooks. Punjab School Education Board (PSEB) conducts a matriculation exam at the end of the secondary schools. Punjab Board is mainly responsible for preparing curriculum and syllabus for all affiliated schools that come under Punjab School Education Board (PSEB).Read more Covid19 pandemic has impacted our education system and learning methods dramatically leading to the closure of physical spaces in schools, colleges, and universities. This closing led to a sudden shift from offline to online methods, giving rise to e-learning or online learning whereby teaching is done through various online platforms.Read more In recent years, there has been a drastic shift in the awareness about the learning and teaching process. NEP 2020 advocates holistic learning, arts integrated education, value integrated education, story integrated education, etc, Teachers have to be prepared with good material and ideas – as they enter the classroom. Only then can they engage the students for holistic education.Read more Good lesson plans with clear learning outcomes and aligned learning material are essential. To achieve the NEP 2020 dream of holistic learning, of arts integrated education, value integrated education, story integrated education etc,, Teachers have to be prepared with good material and ideas – as they enter the classroom. Only then can they engage the students for holistic education.Read more A lesson plans for teachers is the road map of what students need to learn and how it will be performed effectively during class time. As a first step, you will need to outline the learning objectives for the class.Read more Teachers lesson plans are the best method to deliver an effective and engaging lesson. Teachers lesson plans also help to keep you on track and ensures that your students hit their goals and objectives, in line with their subject curriculum. Sometimes in the high-pressure system of education, it can be hard to find the time to create exciting lesson plans for outcome-based learning.Read more With a growing need to promote Outcome-based learning, needs an application or platform where teachers can access and create an effective teacher’s lesson plan. tickLinks is an application that can help teachers find and create lesson plans, track the performance of students, manage records and offer constant support.Read more Contests play a big role in motivating students to excel, perform and offer a lot more rewards than just the winning prize. Contests offer a chance for participants to gain showcase skills, substantial experience, evaluate and analyze outcomes and uncover personal aptitude. Contests also encourage students to develop their ideas and skills and adopt innovative techniques.Read more Just like in any classroom, the real solution to keep students involved in online learning platforms is to discover what excites them and give them a purpose to be involved in the classroom. Whether you're teaching online or offline, use the same tools you would use in a real-life classroom. Set up the fun by playing music or just go with the drawing tool, reading aloud, emoting, quiz and so on!Read more A lesson plan is generally prepared by the teacher for one period (or class) to ensure the happenings in classroom meets its purpose and learning takes place constructively. A unit (or a chapter) takes a longer time period and involves many lessons.Read more In many schools, teachers must convince parents to allow their children to participate in such activities. Co-curricular activities are foremost, just as academics. When a child participates in academics and co-curricular activities, only then well-rounded student development happens.Read more Every teacher needs a lesson plan for the students for better preparation, experience, or class competency. A teachers lesson plan is required to help the students achieve the learning objectives in the given time period.Read more tickLinks – helps. It provides lesson planning books, Library of Education, activities, worksheets, videos. These are aligned with the curriculum. This content helps the teachers to make the class relevant and exciting with activities, worksheets, etc., and helps differentiated learning. It reduces class preparation time and helps effective classrooms.Read more There are many videos and worksheets on the internet. We have to somehow figure out – who needs them and for what purpose? For which class? Is it for primary learning or is it for support material? for a teacher or a student? Understanding the purpose is important and defines our upstream processes.Read more WhatsApp is a great idea as they help the child to revise whatever they have learned to date. It does not require students to sit in front of a screen for a long time. You just check the questions provided by the teacher and solve them in their notebooks. Free Online Learning Platform.Read more Well, let us take a step back. How do students learn these skills? Many of these skills and traits are acquired through early childhood experiences. These experiences could be a mix of positive reinforcements or dealing in tough situations. We yet do not have the formula to deliver the right set of conditions for the positive development of these traits.Read more A learning objective is a statement that provides a detailed description of what students will be able to do upon completing a course. The statement should be simple and to the point. It is the teacher's role to help students understand how to use the information they will learn during the lesson in a practical way.Read more The idea behind the school lesson plans is the learning outcome of the pupil grasps the concept. If it is as a private tutor or a class of 40+ students, measuring the learning outcome is more important.Read more ‘What the hell am I going to do with two hundred teenagers tomorrow?’ I would hope for a lightning bolt of creativity to strike. During my BEd, I was told to regard each lesson as a polished stone - logically sequenced, caters to all learning types, provides enough wait time, is engaging, and flows seamlessly with the rest of the curriculum.Read more The online learning platform permits students to partake in courses using the web. They don't have to visit auditoriums or study halls, and they can decide to take in anything they desire from the comfort of their own homes.Read more Individuals who take an online learning platform course can emerge out of anyplace on the planet, communicate in various dialects, and have various purposes behind learning the subject you are advertising. Thusly, setting aside that additional effort to analyse who your crowd is, can help you plan a course that will offer a genuine incentive to them.Read more A learning platform is an integrated set of interactive online services that provide teachers, learners, parents and others involved in education with information, tools and resources to support and enhance educational delivery and management.Read more
<urn:uuid:f5af428b-d424-443e-9fe0-a60e45de41f1>
CC-MAIN-2022-33
https://www.ticklinks.com/Login/blogs.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00405.warc.gz
en
0.959952
3,671
3.3125
3
Now You See Him, Now You Don’t – title of a 1972 Disney film about someone who becomes invisible It’s easy to gloss over the story at the very end of Parashat Ki Tisa, since the Golden Calf overshadows the entire parashah. In just a few verses, the Torah tells about Moshe starting to wear a masveh, which has been translated as mask, veil, or hood: Moses came down from Mount Sinai with the two Tablets of the Testimony in his hand. As Moses descended from the mountain, he did not realize that the skin of his face had become luminous when [God] had spoken to him. When Aaron and all the Israelites saw that the skin of Moses’ face was shining with a brilliant light, they were afraid to come close to him. Moses summoned them, and when Aaron and all the community leaders returned to him, Moses spoke to them. After that, all the Israelites approached, and [Moses] gave them instructions regarding all that God had told him on Mount Sinai. When Moses finished speaking with them, he placed a hood over his face. Whenever Moses came before God to speak with Him, he would remove the hood until he was ready to leave. He would then go out and speak to the Israelites, [telling them] what he had been commanded. The Israelites would see that the skin of Moses’ face was glowing brilliantly. Moses would then replace the hood over his face until he would [once again] speak with God.<1> There are many interpretations of the masveh story. I’d like to present one approach, from a little-known article.<2> After appearing in a journal in 1995 it was never reprinted, and it is not currently available on the internet. The author is Professor David Gelernter of Yale University. While he’s best-known as a visionary computer scientist, he’s interested in the intersection of technology, art, politics, and religion.<3> I first heard of Gelernter in 1996, when he wrote a powerful defense of traditional Judaism as part of a symposium of prominent American rabbis and thinkers.<4> Several years later, he published a fascinating series of articles on visual themes in Judaism.<5> Thinking as an artist, he was able to connect the dots in ways that nobody ever had before. When he expanded the articles into a book, I made sure to buy it.<6> Though Gelernter hasn’t published much more about the Torah, everything I’ve seen of his is original and out of the box. In his article about Moshe’s masveh, Gelernter points out a theme that runs in the background all throughout the Chumash, namely the concealment of Moshe: In the very first verse in which we hear of Moses, we learn that he is hidden. “The woman conceived and bore a son; she looked at him and saw that he was good, and she hid him for three months” (Exodus 2:2). In the last verses in which we hear of Moses, we learn that the whereabouts of his grave are hidden: “no man knows the location of his grave to this very day” (Deut. 34:6). In the second Moses story in Exodus, Moses kills the marauding Egyptian taskmaster, and then “he hid him in the sand” (2:12). . . . The third Moses story introduces the priest of Midian and his daughters. It sounds a concealment note also, to which I will return. . . . The fourth Moses story in Exodus tells of the burning bush. Moses was frightened, and “hid his face” (3:6). At Sinai, we are told not merely that Moses climbed the mountain and that a cloud covered it (24:15), but explicitly (although we might have inferred it) that “Moses went into the midst of the cloud” (24:18). A natural response is to picture Moses disappearing. [In Parashat Ki Tisa, t]he rebellion of the Golden Calf is triggered not by anything Moses says or does, but by his continued disappearance: “we do not know what has become of him” (32:1). After Moses has dealt with this rebellion brought on by his disappearance, God hides Moses with His own hand from the devastating power of His presence: “I will place you in a cleft of the rock, and cover you with my hand until I have passed by” (33:22). And then (34:4), Moses disappears again onto the summit of Sinai. These outcroppings of the sub-theme all have to do with real, physical concealment. But metaphoric concealment – concealment in the sense of inscrutability, hiding the truth, hiding from oneself (highly significant in the case of Moses) – is crucial as well. After Moses’ chivalrous rescue of Jethro’s daughters at the well, they describe him to their father as “an Egyptian” (2:19). He was raised in the Egyptian court and must obviously have been Egyptian in dress and speech and manners. I have argued elsewhere<7> that there are reasons to doubt whether Moses ever corrected his future in-laws’ misconception. In any case, the story leaves us with the impression that in Midian, Moses’ identity is at best a blur. Then, before setting out on his mission, he tells his father-in-law that he must return to Egypt to find out whether his brothers there “are still alive” (4:18) – concealing his real purpose. On the way comes the weird encounter of the bloody bridegroom (4:24-26), which centers on Moses’ unaccountable failure to have his son circumcised, culminates in his wife’s near-incomprehensible nightmarish shriek, and revolves ultimately, I have argued, around a fact that Moses has concealed from his wife: merely who he is. . . . The Bible has us imagine, in short, a Moses who is hidden on the day he is born, to be buried at last in an unknown place, hiding the Egyptian’s body, hiding his face at the burning bush, hiding his life’s mission from his wife’s family, disappearing into an impenetrable mountain-top cloud, hidden in a cleft as God passes before him. Hiding from himself?<8> In light of Moshe’s physical and psychological concealment,<9> hiding his face with a masveh makes sense – it’s the culmination of all this hiding. Gelernter elaborates: The plain sense [of the masveh story] is so unsettling that commentators implicitly reject it. Moses, having come close to God and spent much time near Him, has at last been signed by the divine radiance and transfigured; so he hides beneath a veil for the rest of his life. Except under special and limited circumstances, his face is henceforth hidden. Are we really intended to understand that Moses continues veiled for the rest of his career? I don’t know; but that is what the story says. The more important point, for our purposes, is that this last variation on the deep image is a natural culmination of the [concealment] series.<10> What is the significance of all this hiding? It may well tie into another story in Ki Tisa. Not long after God is described as speaking with Moshe face to face (33:11), Moshe asks for a vision of God’s glory (33:18). God responds that a mortal (even Moshe) cannot see Him and remain alive (33:20). Nevertheless, He agrees to provide a partial vision. As Gelernter cited above, God tells Moshe, “I will put you in a cleft of the rock and shield you with My hand until I have passed by. Then I will take My hand away and you will see My back; but My face must not be seen” (33:22-23, new JPS translation). What Moshe does “see” is the yod-gimmel middot (34:6-7), the thirteen principles of God’s mercy that have become a major part of our prayers on fast days and Yom Kippur. When we read this story, it’s easy to miss that it contradicts itself on whether or not a person can “see” God. Gelernter ties this back into Moshe’s hiding: Why does the concealment sub-theme exist? We are directed inescapably towards a key question in Exodus; [the scholar J. P.] Fokkelman calls it “the main issue of the book.” Can man see God? The Bible will not be pinned down. Sometimes the answer is yes (“God spoke to Moses face-to-face, as a man speaks to his neighbor” 33:11), and sometimes plainly no (“You shall not see My face, for no man can see me and live” 33:20). . . . We expect God’s personality to be a linear melody, where in fact it is harmony, a superposition of separate elements. . . . The ambiguity that is fundamental to God’s character – do we know Him or not? – is transmitted also to Moses. Do we know Moses or not? . . . The Bible means for us to conceive Moses as a well-known and well-loved public figure and as an inscrutable mystery at the same time. . . . The Bible’s conception has a foreground and a background; biblical thinking is harmonic.<11> In other words, there are two parallel questions. First, can we “see” and know God? That is addressed once in the Chumash, in the foreground of the cleft-of-the-rock story in Ki Tisa. Second, can we know Moshe? That is addressed throughout the Chumash, in the background of multiple stories about him, and culminates in the masveh story in Ki Tisa. Moshe’s constant concealment contains a subtle message. We may think we know Moshe and we may think we know God, but it’s not that simple. 1. Sh’mot 34:29-35. Translation from Rabbi Aryeh Kaplan, The Living Torah (Maznaim, 1981). https://bible.ort.org/books/pentd2.asp?ACTION=displaypage&BOOK=2&CHAPTER=34 2. David Gelernter, “Who Is the Man Beneath the Veil?” Conservative Judaism 47:3 (Spring 1995), pp. 13-23. 3. Evan R. Goldstein, “The Images Dancing in David Gelernter’s Head,” The Chronicle [of Higher Education] Review, November 29, 2009. http://chronicle.com/article/The-Images-Dancing-in-David/49252/ 4. David Gelernter, symposium entry in “What Do American Jews Believe? A Symposium,” Commentary Magazine, August 1996. https://www.commentarymagazine.com/articles/what-do-american-jews-believe/ 5. David Gelernter, “Judaism Beyond Words,” Commentary Magazine, May 2002, pp. 31-40. https://www.commentarymagazine.com/articles/judaism-beyond-words/ ————, “Judaism Beyond Words: Part 2,” Commentary Magazine, September 2002, pp. 39-45. https://www.commentarymagazine.com/articles/judaism-beyond-words-part-2/ ————, “Judaism Beyond Words: Part 3,” Commentary Magazine, November 2002, pp. 31-37. https://www.commentarymagazine.com/articles/judaism-beyond-words-part-3/ ————, “Judaism Beyond Words: Part 4,” Commentary Magazine, March 2003, pp. 53-61. https://www.commentarymagazine.com/articles/judaism-beyond-words-part-4/ ————, “Judaism Beyond Words: Conclusion,” Commentary Magazine, July-August, 2003, pp. 43-49. https://www.commentarymagazine.com/articles/judaism-beyond-words-conclusion/ 6. David Gelernter, Judaism: A Way of Being (Yale University Press, 2009). 7. David Gelernter, “Tsipporah’s Bloodgroom: A Biblical Breaking Point,” Orim: A Jewish Journal at Yale 3:2 (1988), pp. 46-57. 8. Note 2 above (Gelernter’s veil article), pp. 16-17. 9. Some commentators think the masveh was not physical but psychological. For an overview of these opinions, see Rabbi Menachem Kasher, Torah Shlemah, Vol. 22 (Jerusalem, 1967), pp. 179-183. In the online version, the essay starts here: www.hebrewbooks.org/pdfpager.aspx?req=51491&st=&pgnum=185 10. Note 2 above (Gelernter’s veil article), pp. 18-19. 11. Note 2 above (Gelernter’s veil article), pp. 19, 20, 22, and 21. I found the source of the Fokkelman quote: J.P. Fokkelman, “Exodus,” in The Literary Guide to the Bible, edited by Robert Alter and Frank Kermode (Belknap Press, 1987), p. 61.
<urn:uuid:1754048c-bd86-4997-a2b1-6542100d4ea2>
CC-MAIN-2022-33
https://en.harova.org/online_torah_books/playing-hide-and-seek-with-moshe-and-god/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00205.warc.gz
en
0.948161
2,971
2.890625
3
Many people know what vandalism is. We hear about it, and see it, all of the time. Vandalism is taken very seriously in California. Getting caught vandalizing someone’s property can land a person in jail with hefty fines. While many people think they know what constitutes as vandalism, there are a few acts which fall into that category that people are unaware of. Vandalism is the classified as the act of maliciously destroying or damaging someone else’s property. Here is a quick list of acts that qualify as vandalism in the state of California: - Writing or painting on something that does not belong to you. This can even include writing your name in the wet cement of a city sidewalk. - Damaging a piece of property such as a window on a house or car. This can include breaking something of your significant other’s while fighting. - Destroying something beyond the point of repair. If a person does one of these 3 things, he or she has committed an act of vandalism. If caught by law enforcement, this person can face a fine and possible jail time. The severity of the punishment often depends on how much damage was caused by the act. If the damage amounts to less than $400, than the crime is considered a misdemeanor. The accused person could face, at max, 1 year in jail and a fine of no more than $1,000. If the damage total is greater than $400, the accused could face anywhere from 1 to 3 years in prison. On top of that, they could face a fine of $10,000, or more. The size of the fine will vary based on how bad the damage is. Public defenders and hired lawyers serve the same purpose: to defend and fight for their client in court. Their goal is to persuade the jury and the judge that their client is innocent of the charges against them. Although they serve the same purpose, both have pros and cons when defending a client. If a person cannot afford to hire a private attorney, the court will appoint a public defender to them. Therefore, the client does not have to pay for their public defender. The client cannot pick from a selection of public defenders; one is assigned to them. Public defenders are versed in a variety of cases and will be able to take on your case just fine. However, public defenders do not make as much money as private attorneys, and they often have multiple cases to work on at the same time. Due to this, a public defender may have less time to meet with each client and go through materials. They must split their time across however many cases they have at once. For many people, the main problem with hiring a private lawyer rather than a public defender is the cost. Private lawyers can be expensive, and they can be more expensive for serious or prolonged cases than short ones. Nonetheless, the services of a private lawyer are more beneficial than a public defender since the private lawyer will have more time to dedicate to their client. They will have more resources such as extra help from associates, and will likely be able to build a stronger case. Additionally, lawyers may specialize in certain criminal cases, such as domestic abuse. This means that someone who is in the middle of a domestic abuse case can hire a lawyer who specializes in this, rather than a lawyer who specializes in an unrelated criminal matter. Since clients pay for a private lawyer they selected, the private lawyer is more inclined to perform at their best because their practice and reputation relies on satisfied clients. If a family can afford a private lawyer, that is the best way to go. If not, hope is not lost. A public defender is ready and willing to take on the case and they will do as much as they can to help the family win. If you are trying to get hired, you will dress neatly and offer respectable, mature mannerisms. How you present yourself is equally as important as how technically skilled you are for the position. Similarly, how you present yourself to the jury and the judge in court is very important. After all, these are the people who will be deciding your case. It is not just the evidence and arguments that your lawyer makes on the case. Your appearance is important too. Unless you are obligated to appear in an orange jumpsuit because you are being brought in directly from jail, you will want to dress neatly and professionally. Men should wear a collared, buttoned shirt tucked into their long pants. They should have a belt on, and a tie is a plus. Men should wear socks with their shoes, and they may or may not have a jacket on. Women may wear a skirt that should not be more than 2 inches above the knee. Their sleeved blouse should be tucked in, and they should have on flats, or low-heel shoes. Women may also choose to wear long pants with her blouse tucked in. She should wear a sweater, but she can take it off if she gets warm. Across the board, clothing should be clean and free of distracting items like embellishments, wording, rips, and stains. Any defendant must closely follow certain courtroom etiquette, and they will be advised by their lawyer ahead of time. They should only speak when they are asked to, and they must speak clearly. Remaining calm and polite is important, because growing irritated, angry, and argumentative is not going to help their case. They should sit and stand straight. The judge should be acknowledged as “Your Honor.” Looking eye-to-eye with the court shows maturity and seriousness from the defendant, which is a plus. So much can be said about a person based on their appearance and their in-court demeanor. This is essentially the defendant’s chance to give the jury and the judge a good impression, and hopefully the evidence and facts about the case itself will back the defendant up. Large outdoor music festivals and concerts invite attendees to bring their friends, enjoy some music, and have a whole lot of fun. Many outdoor festivals also offer food booths, carnival rides, and other attractions. They are advertised as a whole experience, where some even run for multiple days and offer overnight camping. While the festivals provide a whole lot of fun for attendees, they also cause issues that call law enforcement to break up the fun. One of the biggest recurring problems with music festivals is the usage and possession of illegal drugs. While alcohol may be served at the event for those who are 21 and older, smuggling in and using drugs of any kind is illegal. Illegal drugs are illegal for a reason. They are harmful to the body, and people react differently to the drugs. Some can “handle” more than others, but any amount is unsafe. The more drugs a body has in the system, the more dangerous they are to themselves and others. When alcohol and drugs are mixed, the person is even more dangerous. Remember that summertime concerts mean that attendees are burning through their energy under a scorching sun. Staying hydrated with water is imperative in order to avoid exhaustion, dehydration, and fainting. When this happens, paramedics come in, and that is also when they may discover the patient is under the influence. If the police find someone under the influence of illegal drugs or in possession of them, they will take that person away in handcuffs. The person faces fines and some time in jail. If they are found with an excessive amount of drugs, they can face a few years in prison. For a person to have a lot of excitement about a concert, only to have it end abruptly because of health complications or because they were caught with drugs is really unfortunate. That is money wasted, lasting memories never had, and time lost. Getting arrested is a lot of stress for a person and it may make them think again before taking drugs at a festival. Hopefully they realize they do not need drugs. Music festivals are no strangers to some drug abuse and arrests, but it needs to stop before it gets out of control and ruins the fun for everyone. In the age of modern technology, it is important to be wary of scams used to gain private information from one of your accounts or devices. This sensitive information can be used to take money from the victim without him or her even knowing. There are several different ways someone can gain access to a person’s account or device. Some of the more common ways are: - Sending malicious emails. A favorite tactic among scammers is to send an email that disguises itself as being from someone in the target’s contact list. The email will usually say something along the lines of “Hey, check this out” followed by a link. Upon clinking the link, the victim grants the virus access to the computer. The virus can then grab whatever it wants, and will also send itself to everyone on the victim’s contact list. - Sending malicious texts. The victim will receive a text message, making some claim that a balance is overdue on some account, and may request that the person open a link to a website to pay the balance. The text could also ask for account information to verify that the victim is who they claim to be. Upon doing so, the victim grants the scammer access to the account. - Phone scam. For phone scams, the scammer calls an unsuspecting person and claims to be a representative from some company or law enforcement agency. They will tell the intended victim that money is owed, and it needs to be paid right away or a warrant will be issued for the victim’s arrest. It is a common scare tactic. The idea is to get the victim so freaked out that they no longer think straight. If a person receives a call like this, they should hang up right away. If they are truly concerned that there may be an issue, contact the company or law enforcement agency that supposedly called. This ensures that the real company or agency is actually reached, not someone claiming to be from them. The best thing to do in all of these cases, is to stop and think. You should never click on a link unless you are completely sure that you can trust the source of the link. The case of emails, check to see the actual email address that sent the message. You may find that even though it says it came from someone you know, it actually came from a random address. If you are unsure if something came from a friend or not, simply ask the friend through some other means, not replying to the email or text that sent the questionable link. Your friend may have no idea what you are talking about, which tells you the message was a scam. Another important note, is that no government or law enforcement agency will require people to pay fines or debts with money transfers or store bought cards. Scammers prefer these methods of payment since it is harder for the victim to get the money back once it is sent away. Whenever you receive a message that seems strange, or a phone call that you can’t quite believe, question it. Take a step back and think your next move out carefully. It can save you a lot of trouble and headaches later on. It is a crime to falsely report a crime. That is, you can and will get in trouble with the law if you report a crime but know that it really is not a crime. This is exactly what happened to a Los Angeles woman who, just a few weeks ago, was charged for her false report. Now she will have to pay her consequences by spending 2 months in jail. 26-year-old Charline Gatson filed a report with the police, reporting that an acquaintance approached her in her car and pulled out a gun. The acquaintance let Gatson go, but took her car. Gatson’s teenage son was still in the car, and the acquaintance drove off. The vehicle was found later in San Bernardino. After investigators completed their work, they determined that Gatson’s carjacking and kidnapping report was false. In fact, Gatson had lent her vehicle to the acquaintance, and the acquaintance refused to return it. The stepson was not involved with the incident. Because of Gatson’s false report, which effectively wasted resources, time, and money from police officers and investigators, Gatson was charged and ordered to spend 2 months in jail. In addition, she will be on probation for 36 months, and will pay a fine of $220. Consequences for filing false reports are taken seriously because it takes officers away when they should be devoted to focusing on real, serious crimes. All in all, filing false reports is irresponsible and reckless. It is, however, a different story when the person filing a report genuinely believes it to be true crime, but it is later determined that they are just mistaken. An example of that would be if someone witnessed a person whom they have never seen before, entering their neighbor’s apartment. Believing it to be an intruder, they alert the police. After investigating, the police learn that the neighbor had given this “intruder” their key because they are staying with them; this is an out-of-town friend, which is why the person had never seen them before. Car enthusiasts view their vehicle like an extension of themselves, or like a best friend, pet, or child. They take great care of the vehicle. They give it a name, and customize it to their liking so that it is not like the rest of the same makes and models. Car enthusiasts truly prize their vehicles and make modifications that cost quite a bit. There is quite a bit of freedom when it comes to car modifications, yet there are also certain regulations and laws the car owner must stay within in California. Anyone who modifies their car illegally will not only be given a ticket, but they will also be required to remove the illegal modification parts. These modification laws help ensure a few things: - That there is less disturbance to other drivers, pedestrians on the street, and people in their homes or workplace. - That the environment is taking in the least amount of toxins. - That people are alert and aware of when emergency vehicles need to pass by. While La Mirada Bail Bond Store is one of the best bail bond companies in California, they cannot help you if you or a loved one is arrested outside of the state. La Mirada Bail Bond Store can only operate within California, so you would need to find a local out-of-state bail bond company to assist you for your bail bond needs. This can take more time and produce more stress since it is not close to home. No matter what state someone is in, getting arrested is never a good thing, though getting arrested within your home state is slightly better. Dealing with an out-of-state arrest is more troublesome and will require more from the defendant. As mentioned, the defendant will have to work and communicate with a local bail bond company, but in addition to that, the defendant will need to seriously rework their schedule to prioritize the situation. The defendant will have a court date, but it will not occur in California. It will occur where the defendant was arrested. In some cases, the court will allow the defendant to return home and have only their lawyer present at the court hearing. However, for most people and situations, this is not the case. This means that the defendant will need to make arrangements to stay in the area for the duration of their trial, or they will need to travel back and forth if they are allowed to travel while out on bail. In order for the defendant to allow this to happen, they will need to communicate with their family and employer to work out some solution or schedule. There will be serious consequences here. A wife may have to handle work and the children on her own at home, for example. As for the workforce, the defendant would not be receiving paychecks for some time, or the employer may decide they have to let this employee go altogether. This adjustment will be very strenuous not only on the defendant, but for friends, family, and other acquaintances who are affected by this sudden schedule and lifestyle change. If you are doing any traveling, whether it is for business or for pleasure, be mindful of your words and actions. You do not want something to go terribly wrong for you.
<urn:uuid:3420b02d-fde5-4a0b-9087-28da433c26cf>
CC-MAIN-2019-22
https://fastbail.net/tag/no-payment-for-one-month/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232261326.78/warc/CC-MAIN-20190527045622-20190527071622-00262.warc.gz
en
0.975381
3,364
2.546875
3
The Provenance Research Project on the Nazi/World War II era Research on provenance (the history of an artwork’s ownership) is an ongoing function of curatorial research at the Cleveland Museum of Art. In short, we try to trace the history of a work of art from the moment it was made until it comes into our collection. Frequently, it is impossible to document a complete provenance, as there are many reasons we may not be able to account for every episode in the history of a work of art. A common challenge is that, traditionally, provenance records have often reflected an owner or former owner's wish for anonymity. Additionally, the ephemeral nature of historical records, which are often lost or destroyed over time, can further confound research. Despite these challenges, we have tried to provide complete information based on the resources available. A number of historical factors affect the nature of this research, and a number of varied sources, including correspondence, invoices, and shipping documents, drawn from a wide range of reference materials, assist the researcher in determining provenance. We consult all these materials in order to create the most complete provenance we can. In response to the Association of Art Museum Directors (AAMD) guidelines issued in June 1998, the paintings department of the Cleveland Museum of Art embarked upon a major research project to investigate in depth the provenance of paintings that might relate to Nazi-era art looting during the period 1933–1945. Research of museum materials including curatorial and registrarial files, as well as national and international libraries and archives, began almost immediately, and remains an ongoing priority of the paintings department. Subsequent to that effort, the museum reviewed its holdings of European sculpture in a similar manner. We have no reason to believe any of these works have serious provenance problems. Provenance research findings posted here are limited to the 373 works of art in our European paintings collection and the 86 in our European sculpture collection that either have gaps in their provenance or that were known to have been confiscated by the Nazis during their time of power. Gaps in provenance reflect the current state of research and do not indicate that a work of art was involved in the Nazis’ systematic art plunder. Rather, in any instance where fully documented information is not available for this period (thus creating a gap in provenance), the work of art has been included on the list. Color images of works are provided as available. Due to the nature of this research, it is a continuous and ongoing task. This list will be updated on a regular basis to reflect our findings. Should you have any questions or information relating to these provenances, please contact the museum at ProvenanceResearch [at] clevelandart.org. The Cleveland Museum of Art continues to research works in its collection that could have been in Continental Europe between 1933 and 1945 and that either have gaps in their provenance or that were known to have been confiscated by the Nazis during their time of power. To date, the museum has posted works on its Nazi-Era Provenance page from its European paintings and sculpture collections and a limited group of its drawing collection that meet this criteria. With the advent of the museum’s open access program, works may be displayed that meet the above criteria, but have not yet been added to the Nazi-Era Provenance page. Phase one of the research was limited to European paintings. To maximize the capabilities of the research staff, and to focus on areas most likely to be problematic, selection was limited to European paintings produced before 1945. From these 615 European paintings, 260 were excluded because they were found to meet one of the following criteria: a) acquired by the museum before 1933 or b) geographically located in the United States, Canada, or the United Kingdom, without exception, during the period 1933–1945. Phase two examined the European sculpture collection produced before 1945. Of the 268 objects, 182 were excluded because they were either acquired by the museum before 1933 or were geographically located in the United States, Canada, or the United Kingdom, without exception, during the period 1933–1945. Accession numbers reflect the year an object was acquired by the Cleveland Museum of Art. In most cases, the year is indicated by the four digits before the decimal point (example: 1942.641). In a few exceptions, the date comes after the decimal (example: 194.1939). Included on the list are works of art from the museum’s collection known to have been confiscated by the Nazis. The record of their confiscation was uncovered after research of the Munich Collecting Point Archives (the Allied postwar art clearinghouse depot). Photographs and microfiche of the Munich Collecting Point records are stored at the National Gallery of Art, Photographic Archives, Washington, D.C. The Period 1933-1945, the Nazi/World War II era The period of provenance research, in keeping with current standards, is 1933-1945, the complete period of Nazi rule. This defined period of time is somewhat misleading, however, as art confiscations did not begin immediately with Hitler’s ascension to power. The more programmatic confiscations began later than 1933, with the establishment of the ERR (Einsatzstab Reichsleiter Rosenberg), Hitler’s official art-looting agency. Settlement Related to Allegory of the Christian Faith by Johann Liss In April 2013, The Cleveland Museum of Art entered into a settlement with the heirs of Dr. Arthur Feldmann with respect to a drawing by Johann Liss entitled Allegory of the Christian Faith. The drawing remains at the Museum. Dr. Feldmann, an attorney in Brno, Czech Republic, accumulated a significant collection of drawings. In 1939, shortly after the invasion of Czechoslovakia by Germany, the contents of Dr. Feldmann’s home, including his drawings collection, were seized. Dr. Feldmann was arrested, tortured and died in 1941. Mrs. Feldmann was deported to Theresienstadt and later perished at Auschwitz. The drawing is known to be in Dr. Feldmann’s collection as early as 1929, when it was seen by Dr. Otto Benesch and noted as in the collection of Dr. Arthur Feldmann. Dr. Benesch published the work in a 1933 article, Beschreibender Katalog, Die Zeichnungen der Deutschen Schulen, indicating its provenance as “Feldmann Collection.” The drawing was published again in 1940 by Kurt Steinbart in Johann Liss der Maler aus Holstein (and in a subsequent revised edition under the same title published in 1946), but the ownership, in both additions, was attributed to Dr. O. Feldmann (one of Dr. Arthur Feldmann’s two sons). Dr. Benesch again published the work in 1951 in an article Liss’s ‘Temptation of St Anthony’, indicating its provenance as formerly in the collection of Dr. A. Feldmann. The Museum acquired the drawing in 1953 from a London dealer, Herbert Bier, whose records indicate he acquired the work that same year from R.A. Newton. Mr. Uri Peled, Dr. Feldmann’s grandson, said on behalf of Dr Feldmann's heirs, “I would like to express our delight that this drawing is remaining in the collection of the Cleveland Museum of Art. We are sure that our grandfather would have wanted the drawing to be available to the public and for future research”. The following books are available at the Ingalls Library: Alford, Kenneth D. The Spoils of World War II: The American Military’s Role in the Stealing of Europe’s Treasures. New York: Birch Lane Press, 1994. D810/A7 A37 1994 Farmer, Walter I. The Safekeepers: A Memoir of the Arts at the End of World War II; revised and prefaced by Klaus Goldmann; with an introduction by Margaret Farmer Planton. Berlin; New York: W. de Gruyter, 2000. N9165 .G3 F37 2000 Feliciano, Hector. The Lost Museum: The Nazi Conspiracy to Steal the World’s Greatest Works of Art. New York: Harper Collins Publishers, Inc., 1997. N8795.3 /F8 F4613 1997 Grimsted, Patricia Kennedy, ed. Returned from Russia: Nazi Archival Plunder in Western Europe and Recent Restitution Issues. Builth Wells, Great Britain: Institute of Art and Law, 2007. D810 .C8 U56 2000 Howe Jr., Thomas Carr. Salt Mines and Castles: The Discovery and Restitution of Looted European Art. New York: The Bobbs-Merrill Company, 1946. D810 .A7 H6 1946 Müller, Melissa. Lost Lives, Lost Art: Jewish Collectors, Nazi Art Theft, and the Quest for Justice. New York: Vendome Press, 2010. N8795.3 .E85 M8513 2010 Nicholas, Lynn. The Rape of Europa: The Fate of Europe's Treasures in the Third Reich and the Second World War. New York: Vintage Books, 1995. N8795.3 .E85 N53 1994 Yeide, Nancy H. Beyond the Dreams of Avarice: The Hermann Goering Collection. Dallas, TX: Laurel Publishing, 2009. N5267 .G67 Y45 2009 Complete cataloguing information on the museum’s 19th-century European painting collection can be found in European Paintings of the 19th Century in the Collection of the Cleveland Museum of Art, vol. I and II. Louise d'Argencourt (ed.) with Roger Diederen. Cleveland: The Cleveland Museum of Art, 1999. CMA REF N552 .A556 1974 pt. 4, v.1-2 Association of Art Museum Directors website and press releases. The American Association of Museums website contains their guidelines concerning the unlawful appropriation of objects during the Nazi era. Designed and managed by AAM on behalf of the U.S. museum community, the Nazi-Era Provenance Internet Portal provides a searchable registry of objects in U.S. museum collections that were created before 1946 and changed hands in Continental Europe during the Nazi era (1933-1945). The Project for the Documentation of Wartime Cultural Losses reproduces many important documents and photographs, including installation shots of the Jeu de Paume (where looted art was gathered and exhibited) and the Art Looting Investigation Unit Final Report. The official website of the United States Holocaust Memorial Museum includes a special Holocaust-Era Assets section. The Provenance Research Project of the Art Institute of Chicago. The Metropolitan Museum of Art’s website, which includes a provenance gap list. The German government’s list of more than 2,200 looted artworks. Website of the National Archives of the United States. Website of the Presidential Advisory Commission on Holocaust Assets in the United States. Website of the International Foundation of Art Research (IFAR), a not-for-profit educational and research organization. A major component of their work concerns itself with art theft and ownership.
<urn:uuid:2ff4a241-f62e-425b-9fbe-467cbcd2d037>
CC-MAIN-2022-33
https://m.clevelandart.org/art/collections/nazi-era-provenance
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00004.warc.gz
en
0.927214
2,600
3.203125
3
As always, consult the official Gospel Doctrine Manual in your preparation. Below are a few ideas I use when I teach my Religion 121 class. 2 – “not touch, save it were lightly, concerning the history” Would we describe the Book of Mormon as a history? Probably not. The history is “upon other plates” (see verse 3). 4 – “preaching which was sacred or revelation which was great” Engraven the “heads” or, footnote 4b, the “dominant important items” upon these plates. 8 – “suffer his cross” Elder Bruce R. McConkie taught: “Any great affliction or trial that comes upon the saints does in itself constitute a cross they must bear as part of their obligation to overcome the world….Saints are to carry the cross of service and consecration, the cross of devotion and obedience” (Mormon Doctrine, 173). 13-14 – “I, Jacob, shall not hereafter distinguish them by these names” Jacob calls them Nephites and Lamanites. The further we progress through the Book of Mormon, the more the designations Nephites and Lamanites are an indication of affiliation and belief rather than lineage and birth. Jacob says he will call those who are seeking to destroy the Nephites, “Lamanites,” and those who are friendly to the people of Nephi, “Nephites.” Hugh Nibley taught: The Book of Mormon is careful to specify that the terms Lamanite and Nephite are used in a loose and general sense to designate not racial but political (e.g., Mormon 1:9), military (Alma 43:4), religious (4 Nephi 1:38), and cultural (Alma 53:10, 15; 3:10-11) divisions and groupings of people. The Lamanite and Nephite division was tribal rather than racial, each of the main groups representing an amalgamation of tribes that retained their identity (Alma 43:13; 4 Nephi 1:36-37). (Hugh Nibley, Since Cumorah, 2nd ed. [Deseret Book, FARMS, 1988], 215.) 15 – “indulge … in wicked practices” Concubines: “David and Solomon are mentioned in the Book of Mormon but not in positive terms. Jacob warned the Nephites against attempting to justify their immoralities via reference to the practices of David and Solomon, each of whom eventually displeased the Lord through taking unauthorized plural wives (Jacob 1:15; 2:23-24).” – Robert L. Millet, The Power of The Word, p. 22 . 16 – “lifted up somewhat in pride” Wealth is often a red flag in the Book of Mormon, indicating an upcoming downturn in the “pride cycle.” Sadly, wealth often brings comparisons, then pride. 3 – “weighed down with much more desire and anxiety” This was not a talk that Jacob was excited to give – it was a burden to him. 5 – “I can tell you concerning your thoughts…” Sins begin in our thoughts; Proverbs 23:7, As he thinketh in his heart, so is he. Someone once said, “a man becomes what he thinks about all day long.” To illustrate, when Alma the Younger talked to his son Corianton, he did not begin by condemning him for breaking the law of chastity – He began by explaining where the sin started, in Corianton’s mind and heart (see Alma 39:2-3): Alma began, “This is what I have against thee:” - You boasted in thy strength and thy wisdom (You thought, “I can handle it”) - You forsook the ministry (You weren’t where you were supposed to be) - You went after the harlot Isabel (You were with the wrong crowd – Elder Robert D. Hales taught, “A friend is someone who makes it easier to live the gospel of Jesus Christ.” 8-9 – “the pleasing word of God” Jacob laments that some have come to hear the word which “healeth the wounded soul,” but instead his words may “enlarge the wounds of those who are already wounded.” The word of God can range from that truth which encourages and heals, to that truth which hurts, and calls to repentance. Elder Dallin H. Oaks began one of his General Conference addresses with this introduction: My fellow holders of the Melchizedek Priesthood, and also our young men, I wish to speak to you today about pornography. I know that many of you are exposed to this and that many of you are being stained by it. In concentrating my talk on this subject I feel like the prophet Jacob, who told the men of his day that it grieved him to speak so boldly in front of their sensitive wives and children. But notwithstanding the difficulty of the task, he said he had to speak to the men about this subject because God had commanded him (see Jacob 2:7 -11). I do so for the same reason. In the second chapter of the book that bears his name, Jacob condemns men for their whoredoms (Jacob 2:23, 28). He told them they had broken the hearts of [their] tender wives, and lost the confidence of [their] children, because of [their] bad examples before them (Jacob 2:35). What were these grossly wicked whoredoms? No doubt some men were already guilty of evil acts. But the main focus of Jacob’s great sermon was not with evil acts completed, but with evil acts contemplated (“Pornography,” Ensign, May 2005, 87). 13 – “because some of you have obtained more abundantly” C.S. Lewis has written: “Pride gets no pleasure out of having something, only out of having more of it than the next man….It is the comparison that makes you proud: the pleasure of being above the rest. Once the element of competition has gone, pride has gone.” — Mere Christianity, (New York: Macmillan, 1952), pp. 109-110. 16 – “let not this pride of your hearts destroy your souls!” Pride destroyed the Jaredites, pride destroyed the Nephites, and it will destroy us too if we do not heed this warning (See D&C 38:39). 17 – “be familiar with all” The word “familiar” means, “like family” 18-19 – “the intent to do good” Jacob lists four ways to use wealth: clothe the naked, feed the hungry, liberate the captive, and administer relief to the sick and afflicted. It is interesting to note that this exact same list, in the exact same order, appears in King Benjamin’s speech: “I would that ye should impart of your substance to the poor, every man according to that which he hath, such as feeding the hungry, clothing the naked, visiting the sick and administering to their relief, both spiritually and temporally, according to their wants” (Mosiah 4:26). 22 – “a grosser crime” President Ezra Taft Benson taught: The plaguing sin of this generation is sexual immorality. This, the Prophet Joseph said, would be the source of more temptations, more buffetings, and more difficulties for elders of Israel than any other. (See Journal of Discourses, 8:55). (Teachings of Ezra Taft Benson, 277). 27 – “one wife; and concubines he shall have none” From modern revelation we understand why Jacob condemned David and Solomon for having married many wives and concubines without the Lord’s approval. It is a sin to take plural wives when God has not specifically commanded it. Abraham, for example, had plural wives and was not condemned because God commanded it (see D&C 132:37-39). – Book of Mormon for Latter-day Saint Families, 156 28 – “I, the Lord God, delight in … chastity…” Elder Mark E. Petersen taught: “Humanity will rise or fall through its attitude toward the law of chastity.” (Conference Report, April 1969) 30 – “If I will … raise up seed unto me…” A scriptural explanation behind authorized plural marriage. Bruce R. McConkie: Plural marriage is not essential to salvation or exaltation. Nephi and his people were denied the power to have more than one wife and yet they could gain every blessing in eternity that the Lord ever offered to any people. In our day, the Lord summarized by revelation the whole doctrine of exaltation and predicated it upon the marriage of one man to one woman (D&C 132:1-28). Mormon Doctrine, 578. 35 – “Broken the hearts of your tender wives, and lost the confidence of your children.” Since families are important to God, we know that Satan will attack the family. President Thomas S. Monson: Men should take care not to make women weep, for God counts their tears. (Favorite Quotations from the Collection of Thomas S. Monson [Deseret Book, 1985], 209.) Elder Neal A. Maxwell: Consider this sobering forecast: “About 40 percent of U.S. children will go to sleep in homes in which their fathers do not live.” (USA Weekend, 2/26/95, 6-7) Some estimate this will rise to 60 percent. This same commentator has written, “Fatherlessness is the engine driving our most urgent social problems, from crime to adolescent pregnancy to domestic violence (Elder Neal A. Maxwell, Ensign, May 1995, 67.) 1-2 – “I would speak unto you that are pure in heart” Jacob takes a break from talking to those who were in trouble, and spoke to the pure in heart – they only got two verses, but what verses! Pray unto God, and receive the pleasing word of God, and feast upon his love, forever! Sometimes teachers have to spend more time talking to those on the edge than to those securely in the fold. For example, Alma’s counsel to his righteous son Helaman comprises Alma 36 and 37. Alma to his righteous son Shiblon, Alma 38. Alma to his son Corianton, who is in big trouble, Alma 39, 40, 41 and 42. 5 – “the Lamanites … are more righteous than you” they have kept the commandment to have one wife. Interesting…even if they’re not converted, they’re blessed for the commandments they keep. 12-13 – “I … spake many more things” Jacob gives us only a fraction of his words…why would he preserve this message on pride and immorality for the latter-days? 12 – “Telling them the awful consequences” Elder Neal A. Maxwell: A person’s individual will thus remains uniquely his. God will not override it or overwhelm it. Hence we’d better want the consequences of what we want! (If Thou Endure It Well [Bookcraft, 1996], 51.) 1-2 – “things which we write upon plates must remain” Why the Nephites kept records on plates. 3-4 – “learn with joy … concerning their first parents” Yet another reason for scriptures 7 – “God showeth us our weakness” Notice the word is “weakness” not “weaknesses,” also notice the footnote to Ether 12:27. 10 – “Seek not to counsel the Lord, but to take counsel from his hand” Elder Lynn G. Robbins expressed a similar idea in October 2014 General Conference: “Which way do you face?” President Boyd K. Packer surprised me with this puzzling question while we were traveling together on my very first assignment as a new Seventy. Without an explanation to put the question in context, I was baffled. “A Seventy,” he continued, “does not represent the people to the prophet but the prophet to the people. Never forget which way you face!” It was a powerful lesson. (Elder Lynn G. Robbins, “Which Way do You Face?”) In addition, President Harold B. Lee taught: A man came in to see me and said that he had heard that some man appeared mysteriously to a group of temple workers and told them, “You had better hurry up and store for a year, or two, or three, because there will come a season when there won’t be any production.” He asked me what I thought about it, and I said, “Well, were you in the April conference of 1936?” He replied, “No, I couldn’t be there.” And I said, “Well, you surely read the report of what was said by the Brethren in that conference?” No, he hadn’t. “Well,” I said, “at that conference the Lord did give a revelation about the storage of food. How in the world is the Lord going to get over to you what He wants you to do if you are not there when He says it, and you do not take the time to read it after it has been said?” The Lord is going to keep His people informed, if they will listen. As President J. Reuben Clark, Jr., said in a classic talk, “What we need today is not more prophets. We have the prophets. But what we need is more people with listening ears. That is the great need of our generation.” (Stand Ye In Holy Places, p.159-160). 13 – “The Spirit … speaketh of things as they really are” Footnote 13c takes you to the Doctrine and Covenant’s definition of truth: Doctrine and Covenants 93:24: “And truth is knowledge of things as they are, and as they were, and as they are to come;” Elder David A. Bednar gave a classic talk about confusing the “virtual world” of the internet with things “as they really are” – here’s the link. 14 – “looking beyond the mark” Elder Bruce R. McConkie taught: “That is to say, they took the plain and simple things of pure religion and added to them a host of their own interpretations; they embellished them with added rites and performances; and they took a happy, joyous way of worship and turned it into a restrictive, curtailing, depressive system of rituals and performances. The living spirit of the Lord’s law became in their hands the dead letter of Jewish ritualism.” (Mortal Messiah 1:238; see also 2:392.) 17 – “How … can [they] ever build upon it?” This verse, and Jacob’s rhetorical question at the close of Jacob 4 is very important, because it is the “Q” of a “Q and A,” and the “A,” is Jacob 5, the longest chapter in the Book of Mormon – Zenos’ allegory of the Tame and Wild Olive Trees. The short answer is Jacob 5:63, and long answer is next week’s lesson 🙂
<urn:uuid:83f7a648-cedb-4ffd-b095-bc33f6b4305f>
CC-MAIN-2019-22
https://johnbytheway.com/gospel-doctrine-prep-jacob-1-4-seek-ye-kingdom-god/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257197.14/warc/CC-MAIN-20190523083722-20190523105722-00022.warc.gz
en
0.961151
3,325
2.65625
3
The Dore Lectures on Mental Science, by Thomas Troward, , at sacred-texts.com THE STORY OF EDEN. The whole Bible and the whole history of the world, past, present and future, are contained in embryo in the story of Eden, for they are nothing else than the continuous unfolding of certain great principles which are there allegorically stated. That this is by no means a new notion is shown by the following quotation from Origen:—"Who is there so foolish and without common-sense as to believe that God planted trees in the Garden of Eden like a husbandman; and planted therein the tree of life perceptible to the eyes and to the senses, which gave life to the eater; and another tree which gave to the eater a knowledge of good and evil? I believe that everybody must regard these as figures under which a recondite sense is concealed." Let us, then, follow up the suggestion of this early Father of the Church, and enquire what may be the "recondite sense" concealed under this figure of the two trees. On the face of the story there are two roots, one of Life and the other of Death, two fundamental principles bringing about diametrically opposite results. The distinctive mark of the latter is that it is the knowledge of good and evil, that is to say, the recognition of two antagonistic principles, and so requiring a knowledge of the relations between them to enable us to continually make the needful adjustments to keep ourselves going. Now, in appearance this is exceedingly specious. It looks so entirely reasonable that we do not see its ultimate destructiveness; and so we are told that Eve ate the fruit because she "saw that the tree was pleasant to the eyes." But careful consideration will show us in what the destructive nature of this principle consists. It is based on the fallacy that good is limited by evil, and that you cannot receive any good except through eliminating the corresponding evil by realizing it and beating it back. In this view life becomes a continual combat against every imaginable form of evil, and after we have racked our brains to devise precautions against all possible evil happenings, there remains the chance, and much more than the chance, that we have by no means exhausted the category of negative possibilities, and that others may arise which no amount of foresight on our part could have imagined. The more we see into this position the more intolerable it becomes, because from this stand-point we can never attain any certain basis of action, and the forces of possible evil multiply as we contemplate them. To set forth to out-wit all evil by our own knowledge of its nature is to attempt a task the hopelessness of which becomes apparent when we see it in its true light. The mistake is in supposing that Life can be generated in ourselves by an intellectual process; but, as we have seen in the preceding lectures, Life is the primary movement of the Spirit, whether in the cosmos or in the individual. In its proper order intellectual knowledge is exceedingly important and useful, but its place in the order of the whole is not that of the Originator. It is not Life in itself, but is a function of life; it is an effect and not the cause. The reason why this is so is because intellectual study is always the study of the various laws which arise from the different RELATIONS of things to one another; and it therefore presupposes that these things together with their laws are already in existence. Consequently it does not start from the truly creative stand-point, that of creating something entirely new, creation ex nihilo as distinguished from CONSTRUCTION, or the laying-together of existing materials, which is what the word literally means. To recognize evil as a force to be reckoned with is therefore to give up the creative stand-point altogether. It is to quit the plane of First Cause and descend into the realm of secondary causation and lose ourselves amid the confusion of a multiplicity of relative causes and effects without grasping any unifying principle behind them. Now the only thing that can release us from the inextricable confusion of an infinite multiplicity is the realization of an underlying unity, and at the back of all things we find the presence of one Great Affirmative principle without which nothing could have existence. This, then, is the Root of Life; and if we credit it with being able, not only to supply the power, but also the form for its manifestation we shall see that we need not go beyond this SINGLE Power for the production of anything. It is Spirit producing Substance out of its own essence, and the Substance taking Form in accordance with the movement of the Spirit. What we have to realize is, not only that this is the way in which the cosmos is brought into existence, but also that, because the Spirit finds a new centre in ourselves, the same process is repeated in our own mentality, and therefore we are continually creating ex nihilo whether we know it or not. Consequently, if we look upon evil as a force to be reckoned with, and therefore requiring to be studied, we are in effect creating it; while on the other hand if we realize that there is only ONE force to be considered, and that absolutely good, we are by the law of the creative process bringing that good into manifestation. No doubt for this affirmative use of our creative power it is necessary that we start from the basic conception of a SINGLE originating power which is absolutely good and life-giving; but if there were a self-originating power which was destructive then no creation could ever have come into existence at all, for the positive and negative self-originating powers would cancel each other and the result would be zero. The fact, therefore, of our own existence is a sufficient proof of the singleness and goodness of the Originating Power, and from this starting-point there is no second power to be taken into consideration, and consequently we do not have to study the evil that may arise out of existing or future circumstances, but require to keep our minds fixed only upon the good which we intend to create. There is a very simple reason for this. It is that every new creation necessarily carries its own law with it and by that law produces new conditions of its own. A balloon affords a familiar illustration of my meaning. The balloon with its freight weighs several hundredweight, yet the introduction of a new factor, the gas, brings with it a law of its own which entirely alters the conditions, and the force of gravity is so completely overcome that the whole mass rises into the air. The Law itself is never altered, but we have previously known it only under limiting conditions. These conditions, however, are no part of the Law itself; and a clearer realization of the Law shows us that it contains in itself the power of transcending them. The law which every new creation carries with it is therefore not a contradiction of the old law but its specialization into a higher mode of action. Now the ultimate Law is that of production ex nihilo by the movement of the Spirit within itself, and all subordinate laws are merely the measurements of the relations which spontaneously arise between different things when they are brought into manifestation, arid therefore, if an entirely new thing is created it must necessarily establish entirely new relations and so produce entirely new laws. This is the reason why, if we take the action of pure unmanifested Spirit as our starting-point, we may confidently trust it to produce manifestations of law which, though perfectly new from the stand-point of our past experience, are quite as natural in their own way as any that have gone before. It is on this account that in these addresses I lay so much stress on the fact that Spirit creates ex nihilo, that is, out of no pre-existing forms, but simply by its own movement within itself. If, then, this idea is clearly grasped, it logically follows from it that the Root of Life is not to be found in the comparison of good and evil, but in the simple affirmation of the Spirit as the All-creating power of Good. And since, as we have already seen, this same all-creating Spirit finds a centre and fresh starting-point of operation in our own minds, we can trust it to follow the Law of its own being there as much as in the creation of the cosmos. Only we must not forget that it is working through our own minds. It thinks through our mind, and our mind must be made a suitable channel for this mode of its operation by conforming itself to the broad generic lines of the Spirit's thinking. The reason for this is one which I have sought to impress throughout these lectures, namely, that the specialization of a law is never the denial of it, but on the contrary the fuller recognition of its basic principles; and if this is the case in ordinary physical science it must be equally so when we come to specialize the great Law of Life itself. The Spirit can never change its essential nature as the essence of Life, Love, and Beauty; and if we adopt these characteristics, which constitute the Law of the Spirit, as the basis of our own thinking, and reject all that is contrary to them, then we afford the broad generic conditions for the specialized thinking of the Spirit through our own minds: and the thinking of the Spirit is that INVOLUTION, or passing of spirit into form, which is the whole being of the creative process. The mind which is all the time being thus formed is our own. It is not a case of control by an external individuality, but the fuller expression of the Universal through an organized mentality which has all along been a less perfect expression of the Universal; and therefore the process is one of growth. We are not losing our individuality, but are coming into fuller possession of ourselves by the conscious recognition of our personal share in the great work of creation. We begin in some slight measure to understand what the Bible means when it speaks of our-being "partakers of the Divine nature" (II. Peter i. 4) and we realize the significance of the "unity of the Spirit" (Ephesians iv. 3). Doubtless this will imply changes in our old mode of thinking; but these changes are not forced upon us, they are brought about naturally by the new stand-point from which we now see things. Almost imperceptibly to ourselves we grow into a New Order of Thought which proceeds, not from a knowledge of good and evil, but from the Principle of Life itself. That is what makes the difference between our old thought and our new thought. Our old thought was based upon a comparison of limited facts: our new thought is based upon a comprehension of principles. The difference is like that between the mathematics of the infant, who cannot count beyond the number of apples or marbles put before him, and that of the senior wrangler who is not dependent upon visible objects for his calculations, but plunges boldly into the unknown because he knows that he is working by indubitable principles. In like manner when we realize the infallible Principle of the Creative Law we no longer find we need to see everything cut and dried beforehand, for if so, we could never get beyond the range of our old experiences; but we can move steadily forward because we know the certainty of the creative principle by which we are working, or rather, which is working through us, and that our life, in all its minutes" details, is its harmonious expression. Thus the Spirit thinks through our thought only its thought is greater than ours. It is the paradox of the less containing the greater. Our thought will not be objectless or unintelligible to ourselves. It will be quite clear as far as it goes. We shall know exactly what we want to do and why we want to do it, and so will act in a reasonable and intelligent manner. But what we do not know is the greater thought that is all the time giving rise to our smaller thought, and which will open out from it as our lesser thought progresses into form. Then we gradually see the greater thought which prompted our smaller one and we find ourselves working along its lines, guided by the invisible hand of the Creative Spirit into continually increasing degrees of livingness to which we need assign no limits, for it is the expansion of the Infinite within ourselves. This, as it appears to me, is the hidden meaning of the two trees in Eden, the Garden of the Soul. It is the distinction between a knowledge which is merely that of comparisons between different sorts of conditions, and a knowledge which is that of the Life which gives rise to and therefore controls conditions. Only we must remember that the control of conditions is not to be attained by violent self-assertion which is only recognizing them as substantive entities to be battled with, but by conscious unity with that All-creating Spirit which works silently, but surely, on its own lines of Life, Love, and Beauty. "Not by might, nor by power, but by My Spirit, saith the Lord of Hosts."
<urn:uuid:26e25c2f-be98-40af-b5bf-885cfa4693fd>
CC-MAIN-2019-22
http://www.sacred-texts.com/nth/dlms/dlms11.htm
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257624.9/warc/CC-MAIN-20190524124534-20190524150534-00182.warc.gz
en
0.970112
2,661
3.125
3
Europe’s Largest Peace Conference—What Did It Mean? HUNDREDS of millions of people are barely aware that it took place. Of those who heard of it, few understand what it was about or what it all means. Yet, from July 30 to August 1, in Helsinki, Finland, there took place the largest gathering of heads of government in European history. Presidents, prime ministers and other top leaders were there from thirty-three European countries and from Canada and the United States. Tiny “vest-pocket” states like Monaco, Liechtenstein and San Marino (total population about 20,000) were gathered with the world’s superpowers, enjoying equal voice. Even the Vatican had its delegate there, representing it as one of Europe’s independent, sovereign states (accorded this status in 1929 during dictator Mussolini’s regime). From all Europe only Red China–oriented Albania was absent. “This is a day of joy and hope for Europe,” exclaimed Finland’s President Urho Kekkonen in addressing what he called an “unprecedented” gathering. “We have all the reason to believe that . . . through the process of détente we are advancing in the direction of stable and enduring peace.” United Nations Secretary-General Kurt Waldheim declared: “This conference will be historically noteworthy, not for Europe alone, but also for the whole of mankind.” And, in the religious services of Finland’s Lutheran state church, a prayer was offered on the preceding Sunday, saying in part: “You God of peace and hope, we thank You for Your guidance in that You have allowed the nations of our continent to turn to the way of peace and conciliation. . . . Safeguard the nations of Europe and of the whole world against new wars and acts of violence.” What brought about this “Conference on Security and Cooperation in Europe”? After so many thousands of years of European wars, culminating in two conflicts that went on to engulf the whole world, would this unusual meeting now produce a “continent of peace,” as so many of the speakers expressed the hope? What, really, was accomplished? Thirty Years of Unfinished Business World War II ended thirty years ago on September 2, 1945. But did you know that a general peace treaty has never been signed between the major participants in that war? Did you know that this is why neither Eastern Germany nor Western Germany has yet been able to join the United Nations? Yes, the end of World War II left many things unresolved. As historian Theodore Ropp says: “An uneasy peace, more like a cease-fire, returned to a war-weary world.” Much of this uneasiness involved the Soviet Union’s new borders. Early in the war, the Soviet Union had annexed Lithuania, Latvia and Estonia. Later it took over portions of Romania, Finland, East Prussia, Czechoslovakia and almost half of Poland. And the war’s end found Communist troops occupying six eastern European countries: Poland, Czechoslovakia, Hungary, Romania, Bulgaria and the eastern half of Germany. Within a short time all of these were converted into Communist nations as “satellites” of the Soviet Union. But the Soviet’s new boundaries were not officially recognized by the Western nations. So, since 1954 the Soviet Union has been pushing for a European security conference that would ratify its borders, formally acknowledging Soviet dominance over eastern Europe. The declaration that was to be produced by this conference would, in effect, be viewed as a substitute for a German peace treaty, still unsigned after thirty years. Greater stability was part of the Soviet aim in advocating the conference. Several East European areas—Hungary, Poland and Czechoslovakia—had been scenes of attempted uprisings against Communist rule in the 1950’s and 1960’s. With the Soviet’s political sphere of control acknowledged in all Europe, things would hopefully remain quiet. Another probable motivation was the Soviet Union’s concern over the rising power of Red China. Surprisingly, the enmity between these two great powers of the world of Communist “comrades” is often more intense than the enmity that either of them shows toward the “capitalist” nations, including the United States. The Chinese-Soviet frontier is continually manned by thousands of troops on both sides. The Soviet Union could face its giant Asian opponent with far greater confidence if it could feel measurably secure about its frontiers back in the West. The European security conference was expected to make this possible. Why, then, should the western European nations and the United States and Canada join in on such a Soviet-inspired meeting? The answer: Détente—that French word meaning “an easing of strained relations,” especially in a political situation. The Western powers, although basically the wealthiest in the world, nevertheless must now cope with serious problems. If improved relations with the Soviet Union ‘would somehow ease the crushing financial burden that the present arms race and the maintenance of large foreign-based military forces now require, these nations would feel that it was worth it. None of them want to see the world again walking a political tightrope, precariously balanced between peace and the threat of a nuclear war, as was the case during the “cold war” period that followed World War II. Besides this, as a price for their participation in the conference, the Western nations pressured the Soviet Union to include in the new East-West declaration various principles that would supposedly lead to greater freedom in several vital areas of life. What, then, did the “unprecedented” gathering actually produce? Peace and Security in Four “Baskets” of Agreements The Declaration, called the “Final Act,” was signed in Helsinki on August 1, 1975, by the thirty-five participating nations. Its introduction declared that all the participating nations recognized “the close link between peace and security in Europe and in the world.” Also, that they were conscious of the need for each to make “its contribution to the strengthening of world peace and security and to the promotion of fundamental rights, economic and social progress and well-being for all peoples.” They pledged to support the United Nations in achieving this goal. The rest of the Declaration was divided into four categories, called “baskets.” The first renounced the use of force for settling disputes. It declared the inviolability of existing frontiers and promised advance notice of major military maneuvers. The second called for expanded cooperation in industrial, scientific and environmental problems, and for expanded tourism. The third expressed the promise of freer exchange of people, publications and information between all participating countries. The fourth called for follow-up action to put the provisions of the Declaration to work, with future meetings to review this. Two of the “baskets” had some remarkable provisions. “Basket” one, for example, said: “The participating states will respect human rights and fundamental freedoms, including the freedom of thought, conscience, religion or belief, for all without distinction as to race, sex, language or religion. “Within this framework the participating states will recognize and respect the freedom of the individual to profess and practice, alone or in community with others, religion or belief acting in accordance with the dictates of his own conscience.” “Basket” three represents the thirty-five nations as saying: “They confirm that religious faiths, institutions and organizations, practicing within the constitutional framework of the participating states, and their representatives can, in the field of their activities, have contacts and meetings among themselves and exchange information.” Does this mean that genuine freedom of worship will now be allowed throughout the realm of European Communism? Will individuals be allowed to meet freely without fear of retaliatory actions? Could even a minority like Jehovah’s witnesses do that in Russia? On their face, the provisions would indicate that. But how much force do these declarations and all the others actually have? How Firm a Foundation for Peace and Security? In speaking to the assembly body, U.S. President Ford warned: “The people of all Europe and, I assure you, the people of North America are thoroughly tired of having their hopes raised and then shattered by empty words and unfulfilled pledges. We had better say what we mean and mean what we say, or we will have the anger of our citizens to answer.” He added that every nation signing “should know that if these are to be more than the latest chapter in a long and sorry volume of unfulfilled declarations, every party must be dedicated to make them come true.” Yet even before leaving the United States to attend the conference, the president stated: “I would emphasize that the document I will sign is neither a treaty nor is it legally binding on any participating state.” The so-called “Final Act” is thus merely a declaration of intent. There are no provisions for enforcing its terms or penalizing those violating them. At best, it can have no more strength than the Declaration of Human Rights produced long ago by the United Nations, which declaration many nations, including the Soviet Union, signed and then proceeded to ignore. The Swiss delegate referred to the document as ‘broth from 35 cooks.’ Of its 30,000 words, many expressions are vague and ambiguous, often deliberately so. When a reporter told a delegate who had shared in the document’s wording that he could not understand a certain long sentence, the delegate replied: “You are not supposed to understand it. Neither do we, and, what’s more, we meant it that way.” Ambiguity was often the only way to agreement. Many leaders stressed that the conference was just one more step, perhaps a modest one, toward an ultimate goal. Soviet leader Brezhnev stressed that ultimate goal in saying of the conference results: “There are neither victors nor vanquished . . . It is a gain for all who cherish peace and security on our planet.” “Peace and security”—those words were spoken very often at this gathering. And why? For one reason, it is because rule of the earth by human political governments has never brought true peace and security to the people. U.N. Secretary-General Waldheim, in fact, pointed out that the very nations participating in the conference were responsible for 80 percent of the entire world’s military spending. But the greatest significance of this conference is that it is one more evidence of the truthfulness of Jehovah God’s prophetic Word, the Bible. Nineteen hundred years ago God inspired the apostle Paul to write that the day would come when the nations would, not only talk of their dire need for “peace and security,” but reach the point where they could claim that they had attained it for all the earth. When that day does arrive, what then? The Bible’s prophecy says: “Whenever it is that they are saying: ‘Peace and security!’ then sudden destruction is to be instantly upon them just as the pang of distress upon a pregnant woman; and they will by no means escape.”—1 Thess. 5:3. That destruction will not result from an all-out nuclear conflict. It will result from God’s own war, a war fought on behalf of his own sovereignty over this planet, which is his own creation, and on behalf of all peace-loving persons who want to live under the righteous rule of his Son’s kingdom. Learn now why that kingdom is the government meriting your full trust as the one means to attain true peace and security—not for a few years—but everlastingly. [Map on page 4] (For fully formatted text, see publication) THE SOVIET UNION’S CHANGED FRONTIERS IN EUROPE RUSSIA BEFORE WORLD WAR II EAST EUROPEAN NATIONS THAT HAVE COME UNDER RUSSIAN DOMINATION Since 1954 the Soviet Union has sought recognition of its post-World War II frontiers. The European summit granted this. [Picture on page 5] FOUR “BASKETS” FULL OF AGREEMENTS Peaceful settling of disputes. Frontiers inviolable. Freedom of thought, religion. Industrial, scientific and environmental cooperation. Expanded tourism. Freer exchange of people, publications and information, including that by religions. Follow-up action to implement provisions. Future meetings for review of fulfillment.
<urn:uuid:ae21257b-634e-412a-b5b5-d8549addee61>
CC-MAIN-2019-22
https://wol.jw.org/en/wol/d/r1/lp-e/101975800
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255092.55/warc/CC-MAIN-20190519181530-20190519203530-00102.warc.gz
en
0.961624
2,679
3.03125
3
Fasting is old as the human race. Fasting was practiced by pagan religions, Judaism and Christianity, and it was generally considered an important element of religious life, although with different practices and understanding. In the ancient religions of the East fasting meant a complete abstention from good for a certain period of time — one day or more. The origin of fasting as a moral discipline, especially among the old pagan religions is very obscure, just as their understanding of God was inadequate and vague. The monotheistic, God revealed religion of the “Chosen People” knew about fasting. From the Old Testament we learn that God instituted fasting in Paradise when He said: “But of the tree of knowledge of good and evil, thou shalt not eat of it: for in the day that thou eatest thereof thou shalt surely die.” (Gen. 2:17) From this is clear that fasting existed before the “original sin” of Adam and Eve, and it was not ordered as a cure for their sin. The fasting in Paradise consisted of abstaining of certain food — namely of “the fruit of the tree.” The tree of knowledge of good and evil was created by God as well as all other trees in Paradise and, as such, preceded the Satan and his sinful machinations. God’s commandment to Adam and Even not to eat of the particular fruit was issued as a method of man’s discipline of self-control and spiritual growth. This means that the first man in Paradise was not perfect, but was good and capable to improve and develop his spiritual and moral personality. Fasting understood in this way was practiced both in the Old and New Testament and throughout the entire history of the Church. A noted Orthodox theologian Father Alexander Schmemann, speaking about fasting in the Old and New Testament, saw a great similarity and interdependence between two events in the Bible — one at the beginning of the Old Testament and the other at the beginning of the New Testament. He writes: “The first is the ‘breaking of the fast’ by Adam in Paradise. He ate of the forbidden fruit. This is how man’s original sin is revealed to us. Christ, the new Adam, — and this is the second event — begins by fasting. Adam was tempted and succumbed to temptation. The result of Adam’s failure is expulsion from Paradise and death. The fruit of Christ’s victory is the destruction of death and return to Paradise. It is clear, that in this perspective, fasting is revealed to us as something decisive and ultimate in importance. It is not mere ‘obligation’, a custom; it is connected with the very mystery of life and death, of salvation and damnation.” St. Basil the Great, confirms the above statement by saying: “Because we did not fast, we were chased out of Paradise; let us fast now, so that some day we return there. We have many shining examples of fasting in the Old and New Testament. Moses fasted forty days before receiving from God the Ten Commandments. The prophet Isaiah has written about fasting centuries before Christ’s coming: “Is not this the fast that I choose, to loose the bonds of wickedness, to undo the thongs of the yoke, to let the oppressed go free…? Is it not to share your bread with the hungry, to bring the homeless poor into your house; when you see the naked to cover him… then shall your light break forth like the dawn …” (Isaiah 58) In the Old Testament fasting is sometimes preparation for the Feast days, but more generally it is a sign of humility before God. Fasting accompanied mourning and repentance. In time of necessity of danger, it was appropriate for an individual or the whole community to fast. Fasting, so to speak, reinforced urgent prayer. How seriously it might be taken up, to the extent that an earnest man of prayer might become weak and think through lack of nourishment, is shown by Psalm 109:24: “My Knees are weak through fasting; and my flesh faileth of fatness.” Fasting in the New Testament was introduced by our Lord Jesus Christ Who gave us a great example of fasting. After His Baptism in the river of Jordan He withdrew into the wilderness where He spend forty days and forty nights in prayer and fasting in preparation for His sacred ministry. Jesus taught his disciples and followers to fast. He told them not to fast like the Pharisees, but when they fast bodily they should be completely natural in their behavior — humble and penitent. “And when ye fast, do not look dismal, like the hypocrites, for they disfigure their faces that their fasting may be seen by men. Truly, I say to you, they have their reward. But when you fast, anoint your head and wash your face, that your fasting may not be seen by men, but by your Father Who is in secret. And your Father Who sees in secret will reward you.” (Matt. 6:16-18) Here we should mention that fasting in the Orthodox Church has two aspects: physical and spiritual. The first one implies abstinence from rich food, such as dairy products, eggs and all kinds of meat. Spiritual fasting consists in abstinence from evil thoughts, desires, and deeds. The main purpose of fasting is to gain mastery over oneself and to conquer the passions of the flesh. It is to liberate oneself from dependence on the things of this world in order to concentrate on the things of the Kingdom of God. It is to give power to the soul so that it would not yield to temptation and sin. According to St. Seraphim, fasting is an “indispensable means” of gaining the fruit of the Holy Spirit in one’s life, and Jesus Himself taught that some forms of evil cannot be conquered without it. When the Apostles failed to heal a sick and suffering child, Christ explained that, “This kind (meaning devil) can come out only by prayer and fasting.” (Matt. 12:21) Commenting on this St. John Chrysostom said: “That these are like two wings that carry a person to the heights of God.” The Apostles of Christ continued in prayer and fasting, and commanded others to do the same. They fasted also as they accomplished their ministries by the power of the Holy Spirit and by prayer, as we reads in the Acts: “Now in the church at Antioch… while they were worshipping the Lord and fasting, the Holy Spirit said, ‘Set apart for me Barnabas and Saul (Paul) for the work to which I have called them.’ Then after fasting and praying they laid their hands on them and sent them off.” (Acts. 13:-13) Today, I think it is safe to say, the practice and idea of fasting is largely ignored. Some people say that God’s people need not fast since we are saved by grace and not by works, and that fasting can easily become hypocritical, done merely for show and for the condemnation of others. Many others generally dismiss fasting as something old-fashioned, simple and naïve. “This is the twentieth century; those rules were made for the past and simpler days.” Nonetheless, in spite of present practice of most people, we must take the practice of fasting seriously, if for no other reason, then out of respect for other people, throughout Christian history, who have taken it seriously. We all need to develop the habit of saying no to our carnal passions and desires. What we need is self-discipline and self-control. These are acquired only through regular spiritual exercise — namely through fasting. Fasting is not at all an act of mortification for mortification’s sake. It is not a “little suffering” which is somehow pleasing to God. It is not a punishment which is to be sorrowfully endured in payment for sins. On the contrary, fasting for a Christian, should be a joyful experience, because fasting is a self-discipline which we voluntarily impose upon ourselves in order to become better persons and better Christians. The sin of not fasting is the sin of failing to employ a practice which is absolutely necessary to a sinful person in his struggle to overcome his sins and to gain the love and communion of God. Fasting is an art fully mastered by the Saints. These holy men and women, who have taken their religion and fasting seriously, can be of great help to us. They offer a number of recommendations for fasting. 1. Fasting is essential for us to regain control over our bodies. We live in a pluralistic and secularistic society where the Biblical idea of fasting is completely ignored and forgotten. “Gluttony has become a way of life for a fallen man and, it affects every area of live, leaving us wide open to all types of temptation. We all eat too much, and fasting is the only way to end this unnatural obsession with food. Fasting puts food into its proper perspective. We must each in order to live, but we shouldn’t simply live to eat.” St. Isaac of Syria said: “The first commandment given to our nature in the beginning was the fasting from food and in this the head of our race (Adam) fell. Those who wish to attain the fear of God, therefore, should begin to build where the building was first fallen. They should begin with the commandment to fast.” 2. Fasting simplifies our lives. “By eating less, we can pay attention to more important matters, such as our relationship with God.” Fasting is part of the spiritual life without which the soul perishes, suffocated by the flesh and choked by carnal pleasures. A human being must fast. The effort enlightens the mind, strengthens the spirit, controls the emotions and tames the passions. Thus “a man who strives for salvation… must not allow himself to eat to fullness …” says St. Gregory of Sinai. St. Isaac of Syria says, “Meager food at the table of the pure cleanes the soul of those who partake from all passion … for the work of fasting and vigil is the beginning of every effort against sin and lust … almost all passionate drives decrease through fasting.” An old man in the desert was asked why he was so severe on his body. He answered simply, “If I don’t kill it, it kills me.” By this the holy fathers taught us to be killers of passions and not killers of the body. Partake of everything that is permissible with thanksgiving, to the glory of God and avoid boastful arrogance; but refrain from every excess. (The Monks Callistus and Ignatius, 14c., Directions to Hesychasts.) 3. Fasting “lightens our load” and makes it easier to pray. “For many people the refusal to fast is just one more excuse to cut themselves off from God. The person who wants to pray better should eat less. This makes the mind and the spirit less sluggish. We are then more capable of lifting our minds and hearts to God.” St. Isaac of Syria says: “As long as man’s moth is sealed by fasting his mind will meditate on the repentance of his soul.” Even the old Latins knew that “Plenus veter non studet libenter.” 4. Fasting restores discipline to our lives. “How many of us can honestly say that we disciplined in spiritual matters as we should be? Fasting may just be the beginning of our journey toward spiritual seriousness, but we all have to start somewhere. We can all see what the lack of real discipline has done to American moral life. The same happens to our own spiritual lives without discipline. Fasting is the beginning of this discipline.” That is why the Canons of the Church Councils — Trullo, Gangra and Laodicia as well as the rules and regulations of Sts. Dionisius, Peter and Timothy of Alexandria — order us to fast. According to Milas, “The Church has introduced fasting in a life of a Christian in order to enable man to live a life of piety and repentance. This regulation is based on the practice of the Church in the Old Testament and the examples of its Founder and the Apostles in the New Testament. The fast days which we must observe are ordered by the Church authorities and, therefore, are obligatory for all, except the sick; if a clergyman disobeys this rule he shall be deposed, and a layman excommunicated.” 5. Another aspect of fasting is abstinence “Not many parents enjoy the disobedience of their children. God is equally unhappy to see our disobedience in spiritual matters. Fasting encourages obedience to God’s moral commands by making us center our lives around His.” In other words, our fasting should not be self-willed but obedient. When we fast, says Kallistos Ware, “we should not try to invent special rules for ourselves, but we should follow as faithfully as possible the accepted pattern set before us by Holy Tradition.” We should always rely on the spiritual advice of our priest or Father Confessor, as it was practiced in the early centuries of Church life, as Abba Antony said: “I know of monks who fell after much labor and lapsed into madness, because they trusted in their own work and neglected the commandment that says: ‘Ask your father, and he will tell you.” (Deut. 32:7). 6. Fasting ultimately brings about purity of heart. “The saints teach that for us to purify our hearts we must begin with the control of our bodily desires through fasting. As long as the flesh rules purity of heart will not exist.” In the words of St. John Chrysostom fasting implies not only abstinence from food, but from sins also. “The fast,” he insists, “should be kept not by the mouth alone but also by the eye, the ear, the feet, the hands and all the members of the body: the eye must abstain from impure sights, the ear from malicious gossip, the hands from acts of injustice.” It is useless to fast from food, protests St. Basil, and yet to indulge in cruel criticism and slander: “You do not eat meat, but you devour your brother.” The same point is made in the Triodion, especially during the first week of Lent: As fast from food, let us abstain also from every passion… Let us observe a fast acceptable and pleasing to the Lord. True fasting is to put away all evil, to control the tongue, to forbear from anger, to abstain from lust, slander, falsehood and perjury. If we renounce these things, then is our fasting true and acceptable to God. Let us keep the Fast not only by refraining from food, but by becoming strangers to all the bodily passions. 7. Fasting returns us to a “Paradise-like” way of life. Our forefathers Adam and Eve ate only plants rather than meat or meat products. (Gen. 1:30, 9:3) “When we fast, we voluntarily return to Paradise. We do this not because it is sinful to eat meat, but because we recognize our true homeland, the Kingdom of God, and we want to reinforce this truth in our lives.” Our fasting and self-discipline, then, “signifies a rejection of the world, only in so far as it is corrupted by the fall; of the body, only in so far as it is dominated by sinful passions. Lust excludes love; so long as we lust after other persons or other things, we cannot truly love them. By delivering us form lust, the fast renders us capable of genuine love. No longer ruled by the selfish desire to grasp and to exploit, we begin to see the world with the eyes of Adam in Paradise. Our self-denial is the path that leads to our self-affirmation; it is our means of entry into the cosmic liturgy whereby all things visible and invisible ascribe glory to their Creator.” 8. Finally, fasting is the foundation of and preparation for every spiritual effort. “Spiritual effort presumes that we are in control of our bodies. Beyond this, fasting is the ideal preparation for spiritual celebration, such as a Easter, Christmas, and other Feasts, because when undertaken properly, fasting fills our hearts and minds with the task before us. It concentrates our spiritual energies and makes them more effective.” Thus, when Moses fasted on Mount Sinai (Exod. 34:28) and Elijah on Mount Horeb (Kings 19:8-12), the fast was in both cases linked with a Theophany. The same connection between fasting and the vision of God is evident in the case of St. Peter (Acts 10:9-17) He went up to the housetop to pray about the sixth hour, and he became very hungry and wanted to eat; and it was in this state that he fell into a trance and heard the divine voice. Such is always the purpose of ascetic fasting — to enable us, as the Triodion puts it, to “draw near to the mountain of prayer.” Prayer and fasting should in their turn be accompanied by almsgiving, by love for others expressed in practical form, by works of compassion and forgiveness. As written in the Triodion: Knowing the commandments of the Lord, let this be our way of life: Let us feed the hungry, let us give the thirsty drink, Let us clothe the naked, let us welcome strangers, Let us visit those in prison and the sick. Then the Judge of all earth will say even to us: Come, ye blessed of My Father, inherit the Kingdom prepared for you. Father Milan Savich
<urn:uuid:f568ce3b-6e72-49f4-846f-27bc8f036650>
CC-MAIN-2019-22
http://stjohnbellwood.org/our-voice/41-the-meaning-of-fasting-in-the-orthodox-church
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256163.40/warc/CC-MAIN-20190520222102-20190521004102-00262.warc.gz
en
0.965761
3,785
3.28125
3
|The following story is from People of the Deer, an out-of-print account by Canadian writer Farley Mowat of his time during the 1940s in the Arctic with the original Canadians, the Innuit. I would urge you to read it for several reasons. If you are a writer, read it as an excellent example of research, exposition and story-telling. If you are an entrepreneur, read it as a powerful lesson on the abundance of innovation in the natural world all around us, and think of how such innovations could be adapted to solve pressing human problems. And if you are an environmentalist or a philosopher, read it as a tale of how much has been lost since our ubiquitous and homeogeneous ‘taker’ culture crowded out the extraordinarily varied and remarkable hunter-gatherer tribes that once covered the planet and lived in harmony with it. For the People that Mowat describes in this story are no more. All that remains of them are stories like this one. As I grew to know the People, so my respect for their intelligence and ingenuity increased. Yet it was a long time before I could reconcile my feelings of respect with the poor, shoddy dwelling places that they constructed. As with most Eskimos, the winter homes of the Ihalmiut are the snow-built domes we call igloos. (Igloo in Eskimo means simply “house” and thus an igloo can be built of wood or stone, as well as of snow.) But unlike most other Innuit, the Ihalmiut make snow houses which are cramped, miserable shelters. I think the People acquired the art of igloo construction quite recently in their history and from the coast Eskimos. Certainly they have no love for their igloos, and prefer the skin tents. This preference is related to the problem of fuel. Any home in the arctic, in winter, requires some fuel if only for cooking. The coast peoples make use of fat lamps, for they have an abundance of fat from the sea mammals they kill, and so they are able to cook in the igloo, and to heat it as well. But the Ihalmiut can ill afford to squander the precious fat of the deer, and they dare to burn only one tiny lamp for light. Willow must serve as fuel, and while willow burns well enough in a tent open at the peak to allow the smoke to escape, when it is burned in a snow igloo, the choking smoke leaves no place for human occupants. So snow houses replace the skin tents of the Ihalmiut only when winter has already grown old and the cold has reached the seemingly unbearable extremes of sixty or even seventy degrees below zero. Then the tents are grudgingly abandoned and snow huts built. From that time until spring no fires may burn inside the homes of the People, and such cooking as is attempted must be done outside, in the face of the blizzards and gales. Yet though tents are preferred to igloos, it is still rather hard to understand why. Great, gaping slits outline each hide on the frame of a tent. Such a home offers hardly more shelter than a thicket of trees, for on the unbroken sweep of the plains the winds blow with such violence that they drive the hard snow through the tents as if the skin walls did not really exist. But the People spend many days and dark nights in these feeble excuses for houses, while the wind rises like a demon of hatred and the cold comes as if it meant to destroy all life in the land. In these tents there may be a fire; but consider this fire, this smouldering handful of green twigs, dug with infinite labour from under the drifts. It gives heat only for a few inches out from its sullen coals so that it barely suffices to boil a pot of water in an hour or two. The eternal winds pour into the tent and dissipate what little heat the fire can spare from the cook-pots. The fire gives comfort to the Ihalmiut only through its appeal to the eyes. However, the tent with its wan little fire is a more desirable place than the snow house with no fire at all. At least the man in the tent can have a hot bowl of soup once in a while, but after life in the igloos begins, almost all food must be eaten while it is frozen to the hardness of rocks. Men sometimes take skin bags full of ice into the beds so that they can have water to drink, melted by the heat of their bodies. It is true that some of the People build cook shelters outside the igloos but these snow hearths burn very badly, and then only when it is calm. For the most part the winds prevent any outside cooking at all, and anyway by late winter the willow supply is so deeply buried under the drifts, it is almost impossible for men to procure it. So you see that the homes of the Ihalmiut in winter are hardly models of comfort. Even when spring comes to the land the improvement in housing conditions is not great. After the tents go up in the spring, the rains begin. During daylight it rains with grey fury and the tents soak up the chill water until the hides hang slackly on their poles while rivulets pour through the tent to drench everything inside. At night, very likely, there will be frost and by dawn everything not under the robes with the sleepers will be frozen stiff. With the end of spring rains, the hot sun dries and shrinks the hides until they are drum-taut, but the ordeal is not yet over. Out of the steaming muskegs come the hordes of bloodsucking and flesh-eating flies and these find that the Ihalmiut tents offer no barrier to their invasion. The tents belong equally to the People and to the flies, until mid-summer brings an end to the plague, and the hordes vanish. My high opinion of the People was often clouded when I looked at their homes. I sometimes wondered if the Ihalmiut were as clever and as resourceful as I thought them to be. I had been too long conditioned to think of home as four walls and a roof, and so the obvious solution of the Ihalmiut housing problem escaped me for nearly a year. It took me that long to realize that the People not only have good homes, but that they have devised the one perfect house. The tent and the igloo are really only auxiliary shelters. The real home of the Ihalmio is much like that of the turtle, for it is what he carries about on his back. In truth it is the only house that can enable men to survive on the merciless plains of the Barrens. It has central heating from the fat furnace of the body, its walls are insulated to a degree of perfection that we white men have not been able to surpass, or even emulate. It is complete, light in weight, easy to make and easy to keep in repair. It costs nothing, for it is a gift of the land, through the deer. When I consider that house, my opinion of the astuteness of the Ihalmiut is no longer clouded. Primarily the house consists of two suits of fur, worn one over the other, and each carefully tailored to the owner’s dimensions. The inner suit is worn with the hair of the hides facing inward and touching the skin while the outer suit has its hair turned out to the weather. Each suit consists of a pullover parka with a hood, a pair of fur trousers, fur gloves and fur boots. The double motif is extended to the tips of the fingers, to the top of the head, and to the soles of the feet where soft slippers of harehide are worn next to the skin. The high winter boots may be tied just above the knee so that they leave no entry for the cold blasts of the wind. But full ventilation is provided by the design of the parka. Both inner and outer parkas hang slackly to at least the knees of the wearer, and they are not belted in winter. Cold air does not rise, so that no drafts can move up under the parkas to reach the bare flesh, but the heavy, moisture-laden air from close to the body sinks through the gap between parka and trousers and is carried away. Even in times of great physical exertion, when the Ihalmio sweats freely, he is never in any danger of soaking his clothing and so inviting quick death from frost afterwards. The hides are not in contact with the body at all but are held away from the flesh by the soft resiliency of the deer hairs that line them, and in the space between the tips of the hair and the hide of the parka there is a constantly moving layer of warm air which absorbs all the sweat and carries it off. Dressed for a day in the winter, the Ihalmio has this protection over all parts of his body, except for a narrow oval in front of his face – and even this is well protected by a long silken fringe of wolverine fur, the one fur to which the moisture of breathing will not adhere and freeze. In the summer rain, the hide may grow wet, but the layer of air between deerhide and skin does not conduct the water, and so it runs off and is lost while the body stays dry. Then there is the question of weight. Most white men trying to live in the winter arctic load their bodies with at least twenty-five pounds of clothing, while the complete deerskin home of the Innuit weighs about seven pounds. This, of course, makes a great difference in the mobility of the wearers. A man wearing tight-fitting and too bulky clothes is almost as helpless as a man in a diver’s suit. But besides their light weight, the Ihalmiut clothes are tailored so that they are slack wherever muscles must work freely beneath them. There is ample space in this house for the occupant to move and to breathe, for there are no partitions and walls to limit his motions, and the man is almost as free in his movements as if he were naked. If he must sleep out, without shelter, and it is fifty below, he has but to draw his arms into his parka, and he sleeps nearly as well as he would in a double-weight eiderdown bag. This is in winter, but what about summer? I have explained how the porous hide nevertheless acts as a raincoat. Well, it does much more than that. In summer the outer suit is discarded and all clothing pared down to one layer. The house then offers effective insulation against heat entry. It remains surprisingly cool, for it is efficiently ventilated. Also, and not least of its many advantages, it offers the nearest thing to perfect protection against the flies. The hood is pulled up so that it covers the neck and the ears, and the flies find it nearly impossible to get at the skin underneath. But of course the Ihalmiut have long since learned to live with the flies, and they feel none of the hysterical and frustrating rage against them so common with us. In the case of women’s clothing, home has two rooms. The back of the parka has an enlargement, as if it were made to fit a hunchback, and in this space, called the amaut, lives the unweaned child of the family. A bundle of remarkably absorbent sphagnum moss goes under his backside and the child sits stark naked, in unrestricted delight, where he can look out on the world and very early in life become familiar with the sights and the moods of his land. He needs no clothing of his own, and as for the moss – in that land there is an unlimited supply of soft sphagnum and it can be replaced in an instant. When the child is at length forced to vacate this pleasant apartment, probably by the arrival of competition, he is equipped with a one-piece suit of hides which looks not unlike the snow suits our children wear in the winter. Only it is much lighter, more efficient, and much less restricting. This first home of his own is a fine home for the Ihalmio child, and one that his white relatives would envy if they could appreciate its real worth. This then is the home of the People. It is the gift of the land. Other Writers About CollapseAlbert Bates (US) Carolyn Baker (US)* David Petraitis (US) Dean Spillane-Walker (US)* Derrick Jensen (US) Dmitry Orlov (US) Doing It Ourselves (AU) Dougald & Paul (UK)* Gail Tverberg (US) Guy McPherson (US) Ilargi & Nicole (CA)* Janaia & Robin (US)* Jim Kunstler (US) John Michael Greer (US) Kari McGregor (AU) Keith Farnish (UK) NTHE Love (UK) Paul Chefurka (CA) Paul Heft (US)* Post Carbon Inst. (US) Sam Rose (US)* Tim Bennett (US) Umair Haque (US) Archive by Category My Bio, Contact Info, Signature PostsAbout the Author (2016) --- My Best 80 Posts -- Preparing for Civilization's End: A Future Without Us Dean Walker Interview (video) The Mushroom at the End of the World What Would It Take To Live Sustainably? Community-Based Resilience Framework (Poster) The New Political Map (Poster) Complexity and Collapse Save the World Reading List What a Desolated Earth Looks Like Giving Up on Environmentalism What Happened When the Oil Ran Out The Dark & Gathering Sameness of the World The End of Philosophy The Boiling Frog Cultural Acedia: When We Can No Longer Care Several Short Sentences About Learning Why I Don't Want to Hear Your Story A Harvest of Myths The Qualities of a Great Story The Trouble With Stories A Model of Identity & Community If We Had a Better Story Not Ready to Do What's Needed A Culture of Dependence So What's Next Ten Things to Do When You're Feeling Hopeless No Use to the World Broken Living in Another World Does Language Restrict What We Can Think? The Value of Conversation Manifesto Nobody Knows Anything If I Only Had 37 Days The Only Life We Know A Long Way Down No Noble Savages Figments of Reality Too Far Ahead The Rogue Animal How the World Really Works: Ten Things I Wish I'd Learned Earlier The Problem With Systems Against Hope (Video) The Admission of Necessary Ignorance Systems Thinking & Complexity 101 Several Short Sentences About Jellyfish A Synopsis of 'Finding the Sweet Spot' Learning from Indigenous Cultures The Gift Economy The Job of the Media The Wal-Mart Dilemma The Illusion of the Separate Self: What Happens in Vagus We Have No Choice Never Comfortable in the Skin of Self Letting Go of the Story of Me All There Is, Is This A Theory of No Mind All the Things I Thought I Knew (Short Story) On the Shoulders of Giants (Short Story) Calling the Cage Freedom (Short Story) The Other Extinction (Short Story) Disruption (Short Story) A Thought-Less Experiment (Poem) Speaking Grosbeak (Short Story) The Only Way There (Short Story) The Wild Man (Short Story) Flywheel (Short Story) The Opposite of Presence (Satire) How to Make Love Last (Poem) The Horses' Bodies (Poem) Distracted (Short Story) Worse, Still (Poem) A Conversation (Short Story) Farewell to Albion (Poem) My Other Sites This work is licensed under a Creative Commons License.
<urn:uuid:025b879a-1846-4157-9495-9ee7343d01d5>
CC-MAIN-2019-22
http://howtosavetheworld.ca/the-perfect-house/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257259.71/warc/CC-MAIN-20190523143923-20190523165923-00342.warc.gz
en
0.952437
3,390
2.734375
3
In recent years, there has been a big push for Science, Technology, Engineering and Math (STEM) initiatives in education. Reports and recommendations focusing on equity, diversity and inclusion (EDI) have also gained popularity during this same period. However, few concrete measures have been created to unite STEM with EDI so that women and historically marginalized people can gain equal access to STEM. Educators have a responsibility to interrupt and interrogate existing paradigms and to help students (and ourselves) gain a deep understanding of equity, bias and systemic barriers to their (and our own) achievement. Conversely, we must also recognize our own privilege and how we may be unwittingly reinforcing the status quo. My journey toward taking concrete action to redress the gender imbalance in STEM started in my own classroom. As a secondary biology and chemistry teacher, I often begin lessons with a discussion of interesting new scientific discoveries or socially topical issues. Students are eager to engage and offer their thoughts. However, when the issues being discussed are gender based, there tends to be push back, especially from male students. Their most common refrain was that Canada does not have gender equity issues. I found this dumbfounding, and I still do. The confidence and comfort with which our students champion this falsehood is staggering. As an immigrant from a country that considers the rights of women to be half that of a man, I have a visceral gratitude for the Canadian Charter of Rights and Freedoms. However, even in a progressive country like Canada, we still have a long way to go to achieve the ideals of EDI. We cannot forget that women were not considered “persons” under Canadian law until 90 years ago, and much more recently for aboriginal or racialized women. It is foolish to think that the legacy of that misogyny is not resonating to this day. As a scientist, studies and the statistics they generate allow me to make rational decisions. I wanted to dissect the science of EDI data in STEM so that I could better articulate the problem to my students. I wanted to show them why there is a problem and, hopefully, how we can work together to fix it. With this in mind, I created STEMneutral, a program designed to empower students (and educators) to neutralize the STEM playing field. By examining the science of EDI, gender-role stereotyping and learning assertiveness strategies, participants can gain tools that will give them a better chance to navigate the “leaky pipeline” of their STEM careers. The STEMneutral workshop begins by looking at where the current numbers lay. Is STEM neutral? The UNESCO Science Report—Towards 2030 shows that across all STEM disciplines, globally, women have achieved parity right up to the Masters level. However, there is a leaky pipeline beyond the Masters level, with females accounting for only 28 per cent of researchers. (These numbers can be misleading since in specific STEM subjects such as math, physics, engineering, or computer science, the numbers for Bachelor’s graduates are much lower, hovering around the 20 per cent mark.) If the STEM playing field were truly “neutral,” would the numbers of women involved in STEM drop as drastically post-Masters? Why should we care? Statistics show that having more advanced degrees is correlated with greater financial security. The higher the position—such as researcher, for example—the greater the voice and choice one has in determining the focus of one’s labour. Our society faces an array of challenging problems: global warming, food shortages, antibacterial-resistance. The list of significant concerns goes on and on. If we fail to have as many diverse perspectives identifying the key problems and simultaneously working to innovate unique solutions, we will all lose out. What are the current trends? The current focus has been on girls-only programs for robotics, coding and engineering to tackle the EDI problem in STEM. Underlying this approach is the theory that if we “engage” girls, they will rise up and balance the numbers. Although engagement is a relevant strategy, it merely perpetuates the notion that something is deficient in females, that the lack of parity is a direct result of a lack of interest from females. These band-aid solutions fail to address the true source of the imbalance. The EDI problem in STEM is due not to biological differences or a lack of interest from females, but rather to a system of socio-cultural practices that create biases against, and barriers to, women’s progress throughout their careers. Looking at the UNESCO leaky pipeline, we can see that women are already engaged, they are capable and they are pursuing STEM. However, barriers are clearly present which hinder their progress beyond the Masters level. The systemic socio-cultural problem Society inculcates in us gender-role stereotypes from within the womb. Implicit biases are imprinted onto our psyches from day one, which then work to motivate and shape each of us in ways that limit female and marginalized peoples’ advancement. Think about the types of toys marketed to boys versus girls, the colouring of and messaging on girls versus boys clothing, the types of “role models” portrayed in pop culture. The influence of culture and media leaves an indelible thumbprint on our brains. This biased thumbprint is created as early as age six. One study showed that girls as young as six already have gendered beliefs about intelligence. At age five both girls and boys are equally likely to identify their own gender as being “really, really smart.” By age six there is a shift: gender stereotypes about intellectual ability emerge and girls are less likely to identify their own gender as being smart. Sadly, these gender stereotypes also influence children’s interests, as girls are also less likely to participate in activities said to be for “smart” children. Culture and media influence us all. We need to be conscious of how our implicit biases are formed and how they manipulate our perception of ourselves and others. Only then can we make real progress toward creating a neutral playing field for all students. [Bian et al. (Sept 2017). Gender stereotypes about intellectual ability emerge early and influence children’s interests. Science, 355(6323), 389-391.] So, why is the STEM pipeline leaky? The leaky STEM pipeline is a result of two broad categories of implicit bias converging to limit female progress: other people’s bias and our own bias. Imagine for a moment that you have your Masters degree in a STEM field and are now interested in pursuing a PhD. You send out an email to prospective faculty requesting a meeting. Depending on the name you sign at the bottom of that email, your chances of securing a meeting differ greatly. Women and minorities are collectively ignored at 2.2 to 1.4 times the rate of white males, according to a study conducted involving 6,500 professors across the U.S. [Source: Milkman et al. (2015). What Happens Before? A Field Experiment Exploring How Pay and Representation Differentially Shape Bias on the Pathway Into Organizations. The Journal of Applied Psychology, 100(6):1678-712.] Imagine further, that despite this barrier you were able to complete your PhD and would like to obtain a lab manager position at a university. You send out your well-crafted resume to prospective faculty. Again, depending on the name that appears on the resume, your chances are markedly varied. In one study, identical resumes were sent out to science faculties with randomly assigned either male or female names (John vs Jennifer). John was rated to be significantly more competent and hireable than the identical female applicant, Jennifer. Also, John was offered a higher starting salary. [Moss-Racusin et al. (2012). Science faculty’s subtle gender biases favor male students. Proceedings of the National Academy of Sciences, 109 (41) 16474-16479.] These are just two disheartening realities; the external biases that influence a person’s STEM career trajectory are numerous. Here are a few more: women’s publications are evaluated as less relevant even if they have the same impact factor. [Wenneras et al. (1997). Nepotism and Sexism in Peer-review. Science. Nature, 387, 341–343.] Female candidates face more interruptions in their job talks and often have less time to bring their talk to a compelling conclusion. [Blair-Loy et al. (2017). Gender in Engineering Departments: Are There Gender Differences in Interruptions of Academic Job Talks? Social Science, 6(1), 29.] Black women (76.9 per cent) were more likely than other women to report having to prove themselves over and over again. [Williams et al. (2014) Double Jeopardy: Gender Bias Against Women of Color in Science.] In all of these studies, the gender of the faculty participants did not affect the response; i.e. female and male faculty are equally likely to exhibit bias against females. These implicit biases, which both women and men have, result in barriers for women and historically marginalized people in STEM. Therefore, both women and men need to be part of the solution. Acknowledgement of our privileges and allyship are key factors in bringing neutrality to STEM. External forces are not the only factor at play in creating the leaky pipeline. We must consider internalized biases, as well. Female and historically marginalized people are affected by stereotype threat. A lifetime of exposure to society’s negative images of one’s own ability causes an individual to feel at risk of conforming to negative stereotypes. This reduces one’s performance in stressful situations because preoccupation with feeling of being at risk depletes one’s working memory. Studies show that when females and historically marginalized groups are administered high-stakes tests which are preceded by a pretest questionnaire asking them about their gender and race/ethnicity, their performance suffers in comparison to a second condition, where no such questionnaire appeared before the test. These internalized biases against the self result in a significant confidence gap which is due not to authentic assessment of one’s ability, but rather to the fear of conforming to a negative stereotype. For example, an internal report from Hewlett Packard showed that women apply to jobs if they meet 100 per cent of the listing criteria, while men will apply even when they meet just 60 per cent of the qualifications. This confidence gap created by internalized bias can limit progress down the pipeline. When the empirical evidence clearly illustrates and is showcased as to why the STEM pipeline is leaky, students (and teachers) have difficulty refuting the systemic socio-cultural barriers at the heart of the problem. On the other hand, an analysis of the science of EDI can be rather disheartening and immobilizing. There are a number of organizations and institutions pushing for systemic and cultural changes to improve EDI, but the result of their actions will necessarily be slow to materialize. Students need to understand that the biases and barriers in their path are not insurmountable, that they have some power over their circumstances. By offering some simple STEMneutrality tools that are easy to adopt, my intention is to foster their confidence so that they can better navigate their STEM career pathway. As previously noted, stereotype threat creates internalized barriers to success for certain students. Educators can significantly decrease its impact by explicitly teaching students about it. For example, women’s math performance on tests improved significantly when teachers discussed the concept of stereotype threat with their students and offered simple reminders such as, “It’s important to keep in mind that if you are feeling anxious while taking this test, this anxiety could be the result of these negative stereotypes that are widely known in society and have nothing to do with your actual ability to do well on the test.’’ [Johns et. al. (2005). Knowing Is Half the Battle Teaching Stereotype Threat as a Means of Improving Women’s Math Performance. Psychological Science, 16(3):175-9.] An additional way of combating stereotype threat is an immensely powerful tool called value affirmations. One study showed that a series of 15-minute value affirmation exercises not only closed the academic performance gaps for minority middle schoolers, but also improved post-secondary enrolment years later. Value affirmations have been used to improve students’ scores in physics and math, and even their performance in MBA programs. The process is simple. From a list of values (e.g. creativity, honesty, family, spirituality etc.), students select two or three that are most important to them, and then write a reflective piece about why, for them, these values are so critical. When one’s sense of self is threatened by negative stereotypes, value affirmations help boost identity by reaffirming individual self-worth. [Goyer, J.P. et al. (2017). Self-affirmation facilitates minority middle schoolers’ progress along college trajectories. Proceedings of the National Academy of Sciences, 114(29), 7594-7599.] Another very simple, yet highly effective way to boost one’s confidence is to adopt a power pose before stressful situations such as a test or an interview. Studies show that spending just two minutes in a power position (stances that allow one to occupy more space, e.g. a Wonder Woman stance) increases testosterone levels while simultaneously decreasing levels of the stress hormone cortisol. Adopting a power pose allowed participants in one study to be viewed by interviewers as more hirable compared to those who adopted low power poses in which they make their bodies smaller and occupy less space. (Although the data has come into question recently, even if a placebo effect is in play, why not try it?). Being mindful of how much space we occupy when we are communicating with other people and how this impacts their perception of us can be a minor adjustment with major dividends in personal confidence. [Carney, D.R. et al. (2010). Power Posing: Brief Nonverbal Displays Affect Neuroendocrine Levels and Risk Tolerance. Psychological Science, 21(10) 1363–1368.] When students are working in groups it is important for them to be aware of group dynamics which elevate some voices over others. Men interrupt more than women overall. Additionally men are almost three times as likely to interrupt women. By being mindful of their role in the group, they can either try to project their voice or check themselves and stop interrupting others. Another strategy focused on boosting voices that are usually suppressed comes from female staffers in the Obama administration. Because they wanted to change the unfair dynamics in meetings, they adopted a strategy they called “amplification”: when a woman makes a key point, other women repeat it, giving credit to its originator. This way men in the meeting are forced to acknowledge the source of the contribution and are unable to claim the idea as their own. When students are mindful of which voices need amplification, they can help bolster their own or check their own privilege. I created STEMneutral to take concrete action that redresses the gender imbalance in STEM. Exposing the true source of the leaky STEM pipeline—a broad systemic socio-cultural problem and the subsequent need to equip students with simple confidence boosting tools—will allow students to understand the EDI problem in STEM and improve their chances of navigating the barriers they will invariably face. My hope is to share this information with other educators so that they too can have the challenging and sometimes uncomfortable conversations about EDI with their students (and colleagues). The more we expose the root causes of gender imbalance in STEM, the better we can neutralize the playing field for all students.
<urn:uuid:9c49b0da-03be-422f-8d1a-a84233b96db5>
CC-MAIN-2019-22
https://education-forum.ca/2018/11/16/dissecting-the-science-of-equity-diversity-and-inclusion-in-stem/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257624.9/warc/CC-MAIN-20190524124534-20190524150534-00182.warc.gz
en
0.948531
3,240
3.0625
3
While many terms have more than one definition. The definitions presented here are in the context of managing data, especially in the S3Model context. An Abstract Model as defined in the field of software engineering and data modeling, an information model is usually an abstract, formal representation of entity types that may include their properties, relationships and the operations that can be performed on them. The entity types in the model may be kinds of real-world objects, such as devices in a network, or occurrences, or they may themselves be abstract, such as for the entities used in a billing system. Typically, they are used to model a constrained domain that can be described by a closed set of entity types, properties, relationships and operations. Artificial Intelligence (AI)¶ An area of computer science that deals with giving machines the ability to seem like they have human intelligence. Also, the power of a machine to copy intelligent human behavior. Business Decision Makers¶ Business Decision Makers often come with titles like CEO, COO, CFO, etc. However, anyone with budget control authority can be considered a decision maker. For more information click here. A Canonical Serialization is an instantiation of some information in a specific file format. Usually it is in a standardized format and adheres to a specification. The word canonical means it is considered the law for the subject at hand. In the context of S3Model, the XML Schema representing the reference model, means that any other implementation in any programming or data definition language must comply with the rules and constraints of the XML Schema implementation. Compliance is the practice of following regulations set forth by corporate governance, industry organizations, and governments. These regulations set forth protocols for how sensitive data is collected, used, stored, and managed, among other requirements. Computable models in this context, are data models that can be used to validate data and insure data compliance based on the structure and rules contained within the data model. A constraint is simply a limitation or restriction. In the context of S3Model, constraints are mapped to the XML Schema constraint model. These constraints are sometimes referred to as restrictions or facets. Contextual - Contextual means to view information as a whole- both the facts and where they came from. Collision-Resistant Unique Identifier (MCUID)¶ A CUID as used in S3Model provides a globally unique identifier for each model component and each data model. Data Model (DM)¶ This component is a domain concept data model that is created by expressing constraints on a generic reference model. In the S3Model reference implementation eco-system, these constraints are formed through the use of the XML Schema complexTypes using the restriction element with its base attribute set to the appropriate RM complexType. DMs are immutable, once published they are never edited because once data is released in conformance with a DM, this is where the sharable semantics are located. DMs are uniquely identified by the prefix ‘dm-’ followed by a CUID. They are valid against one version of the S3Model Reference Model XML Schema identified by the import element in the header. This design gives them temporal durability and prevents the requirement ever to migrate instance data. The result of this approach is that all data, for all time , in all contexts, can be maintained with complete syntactic integrity and full semantics. The semantics for a concept modeled as a DM is represented using Semantic Web technologies. The DM identifier is the subject in each of the Subject, Predicate, Object RDF statements. In the reference implementation this will be an XML Schema that imports the Refernce Model schema. In Python it is a Python file that imports the Python Reference Model. Data Model ID¶ The data model ID is a unique identifier for each and every data model created in the S3Model ecosystem. No identifier can be duplicated because of the construction method. All identifiers in S3Model uses a Collision Resistant Unique Identifier (CUID) preceeded by the characters dm-. There are ports to virtually all programming languages, you can also get them online here. A Data Instance is specific file or database entry that contains information based on some model. Examples include; an XML file, a JSON file, a row and its relations in a SQL database, a text file from an editor, or other concrete entity. Data Modeling is the process of conceptualizing a data model (or datamodel) as an abstract model that organizes elements of data and standardizes how they relate to one another and to the properties of real-world entities. Data analysts use machine learning and AI tools to answer business questions. Data scientists typically spend more time modeling data and building analytic tools. A domain expert is a person with special knowledge or skills in a particular area of endeavor. An accountant is an expert in the domain of accountancy, for example. The development of accounting software requires knowledge in two different domains, namely accounting and software. Esperanto is an artificial language devised in 1887 as an international medium of communication, based on roots from the chief European languages. Majority of the speakers are found in the United Kingdom, Belgium, Brazil, United States, Poland, Italy, Germany and France. Surprisingly, there are also many Esperanto speakers in China and Japan. Dr. Zamenhof created the language to fight nationalism and boost internationalism and mutual understanding. A graph database* stores nodes and relationships instead of tables, or documents. Data is stored just like you might sketch ideas on a whiteboard. Your data is stored without restricting it to a pre-defined model, allowing a very flexible way of thinking about and using it. It must be noted that not having a pre-defined model has many drawbacks, lack of data validation being a major one. S3Model provides a mechanism to have a strong model and still store your data as a knowledge graph. Model Component (MC)¶ The name comes from the fact that it is a complete XML Schema complexType that represents a simple concept and that it can be reused in any DM. This reuse is due to the use of CUIDs for the complexType name attribute. Since complexType names must begin with an alphabetic character, all S3Model RMC names start with the prefix ‘mc-’ followed by the CUID. This naming convention facilitates the association with public element names in instances since they reuse the CUID but have a prefix of ‘ms-’ (Model Symbol) in place of the ‘mc-.’ The use of a CUID allows the constraint on a reference model type to be reused many times in a DM with different parameters such as enumeration constraints. The semantics for a concept modeled as an MC is represented using Semantic Web technologies. The MC name is the subject in each of the Subject, Predicate, Object RDF statements. Multi-Level Healthcare Information Modeling (MLHIM)¶ The academic MLHIM project was hosted at Universidade do Estado do Rio de Janeiro (UERJ). The initial multi-level concepts were based on the openEHR specifications. The project members addressed many of the short-comings in openEHR during the interations of MLHIM. However, MLHIM like openEHR was healthcare domain specific. Once the MLHIM project ended, a few members took the successes and developed S3Model as a domain independent solution to semantic interoperability. An Ontology is a set of concepts and categories in a subject area or domain that shows their properties and the relations between them. One major advantage of using a domain ontology is its ability to define a semantic model of the data combined with the associated domain knowledge. Ontologies can also be used to define links between different types of semantic knowledge. Thus, ontologies can be used in formulating data analysis strategies. Web Ontology Language (OWL)¶ The W3C Web Ontology Language (OWL) is a Semantic Web language designed to represent rich and complex knowledge about things, groups of things, and relations between things. Predictive modeling is a commonly used statistical technique to predict future behavior. In predictive modeling, data is collected, a statistical model is formulated, predictions are made, and the model is validated (or revised) as additional data becomes available. Resource Description Framework (RDF)¶ RDF is a standard model for data interchange on the Web. Although frequently referred to as a language, RDF is mainly a data model. It is based on the idea that the things being described have properties, which have values, and that resources can be described by making statements. These statements consist of three components; a subject, a predicate, and an object. It should be noted that RDF is also a vocabulary that along with the RDFS vocabulary provides a set of terms that can be used for creating general/abstract descriptions of resources. OWL is a vocabulary built with RDF and RDFS vocabularies that provide new terms for creating more detailed descriptions of resources. Reference Model (RM)¶ The RM is a small set of structurally oriented concept definitions that allow for building arbitrarily complex models without introducing domain semantics into the structure. Domain concepts are modeled as restrictions on these RM concepts. The RM, therefore, defines a standard set of ideas that allow for query and knowledge discovery across data without prior knowledge of the actual content. Semantic interoperability denotes the ability of different applications and business partners to understand exchanged data in a similar way, implying a precise and unambiguous meaning of the exchanged information. The Semantic Web is a proposed development of the World Wide Web in which data in web pages is structured and tagged in such a way that it can be read directly by computers. The same technologies may be applied to any data. The W3C website has more details. Structured Query Language (SQL)¶ A data definition and manipulation language for relational databases. Also known as relational databases. A SQL database is a collection of tables that stores a specific set of structured data. An upper ontology (also known as a top-level ontology, upper model, or foundation ontology) is an ontology (in the sense used in information science) which consists of very general terms (such as “object”, “property”, “relation”) that are common across all domains. An important function of an upper ontology is to support broad semantic interoperability among a large number of domain-specific ontologies by providing a common starting point for the formulation of definitions. Terms in the domain ontology are ranked under the terms in the upper ontology, e.g., the upper ontology classes are superclasses or supersets of all the classes in the domain ontologies. Validation means checking the accuracy and quality of source data before using, importing or otherwise processing data. Different types of validation can be performed depending on destination constraints or objectives. For example, you could use data validation to make sure a value is a number between 1 and 6, make sure a date occurs in the next 30 days, or make sure a text entry is less than 25 characters. A validation chain is a series of complimentary components that serve to perform validation. eXtensible Markup Language (XML)¶ XML is a markup language expressed in a standard set of codes, or tags, that describes the text in a digital document. XML is a more flexible cousin of HTML, makes it possible to conduct complex business over the Internet. eXtensible Markup Language Database¶ An XML database is a database that stores data in XML format. This type of database is suited for businesses with data in XML format and for situations where XML storage is a practical way to archive data, metadata and other digital resources.
<urn:uuid:aac57484-90c0-4b46-86a0-bc5ac77a6787>
CC-MAIN-2022-33
http://s3model.com/specifications/docs/glossary.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00002.warc.gz
en
0.912388
2,627
2.65625
3
For those who know me, they will know that I am very passionate about the mental side of performance, and also how this can be applied in different aspects of life. I believe that the mental side of the game is something that we don’t train as much as any other aspects. 10,000 hours to become an expert, however, how many hours of that are mental skills training? How often do we hear elite athletes talking about the mental aspects of the game to make them either perform successfully or crumble under pressure? If you listen to athletes competing in the Olympics, Wimbledon etc, they will mention the things like “effort, dealing with pressure, motivation”, but how often do we actually consciously train those things? When I teach performance psychology skills, I aim to give athletes strategies to help them improve performance but also self-awareness, skills to self-evaluate and build confidence. Mental preparation is vital success, and I think sometimes the stigma attached to “psychology” stops people seeking help to be ready in the mind. I believe you can have all the skills and talent in the world, but if you are unable to manage the psychological demands of performance, then their skills and talents will suffer. For example, a performer who suffers extreme anxiety may not be able to reach peak performance due to the strain on their body from being constantly stressed. Therefore, the role of performance psychology is to assist this person in dealing with anxiety. Are there differences between male and female athletes? I believe so. According to research, women are more likely to attribute their success in sport to effort or luck, e.g. “I tried hard; I put in the effort; I was just lucky on the day!” Whereas men are more likely to attribute success to their talents, “I am talented, I won because I am good!” How can we teach women to be more confident about their ability. A study completed in the USA asked men and women to predict their exam results. Women predicted grades lower than they received, whereas men overestimated and said they would do better than they actually did. What can we do to make women more confident? First of all, by motivating females to stay in sport could be beneficial to overall confidence and self esteem. According to the Women’s Sport Foundation: High school girls who play sports are less likely to be involved in an unintended pregnancy; more likely to get better grades in school and more likely to graduate than girls who do not play sports.Girls and women who play sports have higher levels of confidence and self-esteem and lower levels of depression. Girls and women who play sports have a more positive body image and experience higher states of psychological well-being than girls and women who do not play sports. “Girls lose confidence, so they quit competing in sports, thereby depriving themselves of one of the best ways to regain it.”(Confidence Gap, 2014) Whilst continued involvement in sport has significant benefits to females confidence, I think by teaching women to be proud of their talents and their participation in sport we can further increase confidence. Just like learning how to catch a ball, or develop skills in sport, mental skills take time and training. To build confidence is a journey, and there will be situations in which an athlete’s confidence is high and others in which it is low, but how can we get athletes to have high confidence in more situations? I believe that it is important to teach females to be proud of being different, and being proud of who they are. In many cases, I feel like sports define athletes, and their self confidence is based on results or sports performance. My favourite quote is “sport is something you do, not who you are!”. It is important we make females aware of their positive personality traits, and not just have their self esteem built upon the things they are good at. Emphasising uniqueness, and be the best person you can be. Can we teach that it is okay to be different? And that in fact, more successful athletes are those who aren’t afraid to be different? To be brave and be the one to stay later at training, to skip parties, to choose healthy foods when friends aren’t. Can we teach that being different is something you should be proud of and be confident about? To have the confidence to be different? Lastly, the reason I love my job helping athletes in gaining psychological skills is because when we can instil confidence in young people and empower them to be “their own coach”, it is the most rewarding feeling to see them progress, not just in their sport but in their self acceptance. For me, this is the most rewarding part of my job. Even the smallest of changes, can bring around the biggest results, and that is why I love helping people to be more confident and gain psychological skills to help them in life and competition. I am running a series of workshops as part of the Festival of Sport in September. Culture of Club: Creating a Female-Friendly Climate It is important to understand the impact a club environment and climate can have on female coaches, female club leaders, female participants and those females outwith the club itself. This workshop will identify what makes a female – friendly climate and look at how the characteristics of different team and individual sports can, in turn, meet athletes’ needs and demands by working with coaches to develop young athletes. In order to maintain and increase females within our clubs at all levels, we must be able to create an optimal environment in which all females thrive upon and develop. Club personnel and Coaches can expect to leave the workshop with the ability to: Identify ways to increase female participation. Create a sporting culture where females feel confident and valued. Identify key principles in promoting a female friendly environment. Female Coaching: Challenges and Solutions By the end of this workshop, you will have an understanding of the following: The challenges faced as a female coach e.g. confidence, communication, stress Sport and gender differences for coach consideration. Solutions and strategies to overcome challenges. This workshop offers an interactive opportunity to share good coaching practice, and gain ideas that can be implemented in a coaching capacity. Understanding the Mental Barriers of Female Coaches Coaches can expect to leave the workshop with knowledge of: Factors and common problems that female coaches may face. Simple guidance on how to overcome the barriers. Why, what, when and how coaches can become more self aware. This workshop offers an interactive opportunity to share good coaching practice, and develop ways to become more self awareness, and reflective as coaches. Coaching Young Females – The Mental Tools This workshop will provide ideas for managing potential psychological issues that may arise when coaching young female athletes. Coaches can expect to leave the workshop with the knowledge and understanding of: The psychological differences between males and females and the implications for coaches. Basic psychological principles which are key for peak mental performance. Understanding ways to implement mental skills training within the coaching field. An important aim of the workshop is to provide an opportunity for exchange of ideas based on both the attendees’ and the presenters’ experiences. Feel free to sign up: Sport is not just about winning or losing, but sometimes coaches get lost in this trap. The trap of allowing results determine their self worth, just as players allow their performance to determine how they feel about themselves. Yesterday, I listened to Baroness Sue Campbell at the Global Coach House conference, and she emphasized "Good coaches make good athletes, whereas great coaches make great people". This is everything I believe, and is in line with my philosophy used within my applied psychology work. I had the privledge to listen to many inspiring leaders over the past couple of days who have reinforced my beliefs and also what I teach in my performance psychology practice. Self esteem is how you value yourself and your evaluation of self worth. I see it frequently, when a young person's self worth is based on their sporting ability. They feel good when they have played well, and feel bad when things haven't went their way. And for maladaptive perfectionists, they probably rarely feel good because of the unattainable expectations they put on themselves. Society often puts us into boxes, and even in the sports field. I have seen it many times, where an athlete is in a sport for a reason other than enjoyment. Whether it be that their parents like the sport, maybe the parent either succeeded or failed in the sport, or because they feel pressure to play that sport. By allowing young people to make their own choices on their sport, will enhance their intrinsic motivation, and in turn, keep more young people participating. This goes in line with teaching individuality. Teaching young people to be themselves. I continue to emphasise uniqueness and ways to feel good about being different. To embrace who you are, and be okay to stand out and go against the grain. As athletes, we do that and also as coaches. We may not always conform to the societal norm...work a 9-5 job, go home, make dinner, watch some tv. As athletes, and coaches, we put in time and effort, we miss social engagements, and family events. We get up early to train, we stay up late. We spend money and time trying to be the best we can be. We spend many hours training and competing. We are evaluated constantly and probably constantly evaluate self. So with all of this, the most important thing that will keep us striving for excellence, is to enjoy. To enjoy what we do. To love what we do. To have passion. To feel good as a person. To value self and have confidence, not only in ability, but in ourselves as people. As coaches and leaders, I feel it's our duty to promote good people and I am glad that this is also what the pioneers of sporting change believe too. What action can you take today to promote good people in sport? I recently attended the "Appearance Matters" Conference at the University of Bristol, which heightened my knowledge of the research behind self confidence and physical appearance. Within my role at Edinburgh Leisure, I feel we do a great job targeting teenage girls, and vulnerable young people to help them improve confidence within the realm of health and physical activity, but also to teach understanding of general confidence and build self esteem. The Health 4U Program targets third year girls and teaches various components of health and wellbeing as well as communication, dealing with stress, mental health, photoshopping, energy balance etc. I believe its a great tool for young people to have a better understanding of these components and learn in an interactive way. During the lessons, we use some videos created by the Dove Self Esteem Project. Thirteen million young people reached through the Dove Self Esteem program, with providing education to help build self esteem. I also use the videos for psychology particulary when working with coaches on building self confidence and helping them understand some of the issues that young people may face. The presenter from the Dove Project noted: Only 4% of women consider themselves beautiful. 9/10 would change something about themselves 6/10 opt out of activity because of body image These startling figures makes me even more keen to try to teach young people about self acceptance and feeling good about themselves. In a world were society defines what is beautiful, and what is normal, its even more important to teach young people to love themselves for being themselves. The thin ideal is hard to obtain and can lead to maladaptive perfectionism as these ideals are unrealistic, and when people cannot obtain them, and their self confidence comes from their appearance, then they will rarely have the feeling of self satisfaction. The Dove Project use fortune cookies with self esteem messages in them, and I received one of my favorite quotes.Check out their website for more information and great resources for working with young people about self esteem and body image. Most of the time, we think about negative body image, and how people feel negatively about themselves. How can we encourage a positive body image rather just eradicating the negative? When a person has positive body image, they have an appreciation for their body which led to health related behaviours. I find that with my psychology I try to promote individuals strengths, rather than just working on how we can improve their weaknesses. Therefore, by knowing what a positive body image, we can find ways to teach young people how to have confidence and have positive body image, rather than just helping those with severe negative body image. Promote a positive body image by: Also, in line with my approach to psychology, would be looking at body image in line with goal setting, One study examined the motivation and goals for body image, and compared the differences between those with health goals and those with appearance goals. Those who had appearance goals had a feeling of "have to" and a feeling of pressure to look a certain way. This promoted guilt and shame, and could become maladaptive. This is my fear for those purely wanting to lose weight to look a certain way. What happens when you weigh what you want to weigh? Will you feel good about yourself? Will that make you a better person? Will it be healthy? Those who have health goals feel like they 'want' to be healthy, and health is a personal importance to them rather than a need. They are motivated internally, and living a healthy life is just part of their every day. Having the 'want to' feeling is more adaptive and can result in more self satisfaction. Those with "health goals" were more likely to engage in healthy eating, and decreased binge-eating, whereas those with "appearance goals" were motivated by drive for thinness and engaged in binge eating. Tracy Donachie, MSc in Performance Psychology.
<urn:uuid:a3a4ecdf-6e60-49f8-b13b-2529773e7eed>
CC-MAIN-2019-22
https://believepositivepsychology.weebly.com/blog/category/motivation
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257197.14/warc/CC-MAIN-20190523083722-20190523105722-00022.warc.gz
en
0.968399
2,862
2.59375
3
In the GenRad Tradition...Special thanks to Henry P Hall for the pictures and content. GR was known for its complete line of resistance, capacitance and inductance standards and decade boxes. The 160-M Standard Toroidial inductor, is the predecessor to the GenRad 1482 Series of standard inductors that have been the standard for inductance over the decades. The 1482 Standard Inductors are manufactured by IET Labs today. Type 1404 Standard Capacitor GR was known for its complete line of resistance, capacitance and inductance standards and decade boxes. The 1404 precision standard capacitor, designed by J. F. Hersh and announced in 1963, was one of the most popular and used in standards labs around the world. It was an “air” capacitor (actually dry nitrogen) that used Invar steel plates to get a low temperature coefficient and get excellent stability. It came in values of 10, 100 and 1000pF. GR made other standards from .001 pF to 1 Farad, most of which are made by IET Labs today. Type 608 Oscillator The GR 608 was the world’s first R-C oscillator, announced in April of 1939. It was designed by H. H. Scott who worked for GR at that time. It used a separate twin-tee R-C network for each frequency which was selected by a push button. Hewlett-Packard licensed the GR patent even though their famous oscillator used a variable R-C Wien bridge instead of fixed twin-tees. The HP oscillator used a lamp to stabilize the signal level. The 608 had no similar device but instead had a “Harmonic Level” control that was adjusted to get the circuit to just barely oscillate to get low distortion. Type 1680 Automatic Capacitance Bridge The 1680, designed by R. G. Fulks, was the first automatic bridge balanced electronically. It was announced in 1965. Not only could it measure and sort capacitors rapidly, but perhaps more important, it could also be controlled by an external computer. This ability resulted in its use in many automatic systems which were among the first automatic test equipment (ATE) systems. It was often used with the DEC PDP-8 mini-computer. Type 650-A Impedance Bridge The 650 was the first instrument that could measure, resistors, capacitors and inductors. Before that, separate bridges were used. This famous long-lived bridge was designed by R. F. Field and announced in 1933. It wasn’t replaced in the GR line until 1959. Early versions used four large A cells for power and a vibrating, microphone “hummer” as a 1 kHz AC source. In 1941, an electronic R-C oscillator and selective detector unit designed by H. W. Lamson fitted in the battery compartment. Type 1650-A Impedance Bridge The 1650-A, designed by H. P. Hall, finally replaced the famous 650 in 1959. Like the 650, it was only 1% accurate, but never-the-less became a GR best seller. It used transistors in its oscillator and detector and as a result could be supplied by just four D cells, making it smaller and portable. It was the first GR instrument to use used the clever “flip-tilt” cabinet designed by H. C. Littlejohn. It was modified slightly by C. D. Havener in his 1650–B in 1968. 1650s were in the last general GR catalog in 1978. Type 631 Strobotac GR made earlier strobes designed by GR engineers with the help of MIT’s Harold Edgerton AKA “Papa Flash,” but the Type 631-A (1935), by H. H. Scott and H. Wilkens, was probably the most famous. Its rapid flash and calibrated frequency made it a good tachometer to measure the speed and to study the behavior of moving machinery. It was also used in high-speed photography. Examples of that are Edgerton’s famous photos of a bullet going through an apple and a balloon bursting. Later GR strobes that are faster and brighter are now sold by IET Labs. Type 403 Standard Signal Generator The 403 is believed to be the first signal generator, the first in a long line of such instruments made by GR and other companies. It was designed by Lewis Hull who was on loan from the Aircraft Radio Co. It was first mentioned in GR Catalog E (1928). It provided a calibrated low-level, modulated, wide-band, RF signal to test radio receivers. A critical part of these generators is their attenuator which needed to be carefully shielded to get microvolt level signals. The 403 provided signals as low as 2 microvolts. Type 1790 Logic Circuit Tester The 1790 was the first circuit board tester. It was designed by R. Cvitkovich and M. Fichtenbaum and announced in 1970. It was major step in the history of automatic test equipment (ATE). Several other GR circuit board testers followed including the GR2270 In-Circuit/Functional Test System, the first of its kind. GR was a leader in circuit board testing for many years, and when GR was sold to Teradyne, GR (by then GenRad) had the largest installed base of circuit board testers in the world. Type 1657 Digibridge® The 1657 Digibridge®, designed by Gipe, Henry Hall and Sullivan and announced in 1976, was the first digital impedance meter of its kind. It used a microprocessor to calculate the various impedance parameters from measured, quadrature AC voltages. This patented principle was widely copied and several companies paid to use the idea, including Hewlett Packard who paid GR a million dollars. IET labs makes several of the later GR designed Digibridges® which have many more features and improved accuracy. The newest, the 1693, is the most accurate such meter available. Type 426-A Thermionic Voltmeter The 426-A, introduced in 1928, was the world’s first commercial vacuum-tube voltmeter. Its main advantage was its extremely high input impedance. The 426 measured AC only and had an accuracy of 3% to 300 kHz. It used a single triode tube in a bridge circuit. The panel zeroing control adjusted the vacuum tube to cut off so that the meter responded to positive voltages only. Thus its reading was proportional to the positive average, but it was calibrated in the RMS of a sinusoidal signal. The meter was powered by a single 22.5 V battery and thus completely portable. Type 497 Tube Mount The 497 was part of the first GR oscilloscope, announced in 1931, it was among the first in the US. There were two other parts, the 496-AM a power supply and of course the CRT itself, the type 478. It could be used with the 506-A Bedell Sweep Circuit and with the Type 514 Amplifier. Since It had no amplifier itself, its bandwidth depended only on the tube response making it useful to 30 MHz.. The next GR ‘scope, the Type 635 (designed by J. D. Crawford and announced in 1933), put the tube and the power supply in the same wooden box, but still had no internal sweep circuit or amplifier. Type 687 Oscilloscope The 687 (announced in 1934 and designed by H.H. Scott and E. Karplus) was the last GR oscilloscope listed in a catalog. It contained a sweep circuit and power supply, but no internal amplifier. It was useful up to 130 MHz. GR decided not to make more oscilloscopes deciding that they were not precise enough for laboratory use and only useful in the radio service shop. Needless to say, that was a lost opportunity. However in 1938 they did make an advanced oscilloscope, the type 770, known as “Big Bertha”, but it was only used internally and never sold. Type 874-LBA Slotted Line GR was famous for its line of microwave equipment first that first used Type 874 connectors and later Type 900 precision connectors. Both connectors were “sexless” in that they could connect to a similar one. One of the basic instruments in that line was this slotted line which, with a voltmeter, could measure standing wave ratios. The slotted line could also be used with a motor drive and graphic recorder. This 50 ohm GR slotted line was useful from 300 MHz to 5 GHz. Type 338-L Oscillograph In this 1928 forerunner to the oscilloscope, a wire carrying the current to be observed was passed through a strong magnetic field. The wire moved proportionally to the current through it. The beam of a strong lamp was focused on the center of the wire and the wire’s shadow fell on a rotating mirror and the on a viewing screen. The rotating mirror provided the time axis and its speed could be adjusted to synchronize with the current waveform. This unit could also be used with the Type 408 Oscillograph Camera which would replace the mirror and viewing screen. Type 213 Oscillator Before R-C oscillators, one way go get an accurate low-frequency test signal was to use a tuning-fork oscillator like the GR 213. It used a feedback circuit in which the fork drove a microphone which in turn controlled the current that drove the fork. It provided a stable signal with reasonably low distortion. It came in two standard models, 400 Hz and 1000 Hz, but other frequencies were available on special order. The 1000 Hz version was announced in 1920. Type BC-14A Receiver The BC-14C receiver was a crystal receiver used in WWI by the allies artillery to get target locations from spotters on the ground and in the air. It was copied from the French A-1 receiver. It was first made in 1917 and by General Radio in 1918. It was also made by DeForest, Liberty Electric and Wireless Specialty. Its simple circuit used a variable air inductor, or “variometer”, two variable air capacitors and the crystal rectifier. GR also made the BC-15A Transmitter and in 1919 made the U.S. Army Signal Corps “S.C.R. 112 Battalion <>Regiment Set Box” which was both a transmitter and a receiver. Type 759 Sound- Level Meter GR was known for its line of sound measurements equipment including this classic, 1937, sound- level meter designed by L. E. Packard. The first in the line was the Type 559 Noise Meter by H. H. Scott (1933), and several such meters followed, including several modern sound-level meters still sold by IET Labs. GR also made a line of sound and vibration analyzers and both dynamic and condenser microphones as well as associated equipment. Type 1800 Vacuum-Tube Voltmeter While several popular General Radio VTVMs preceded and followed the Type 1800, this classic was probably the most famous. It was announced in 1946 and designed by C. E. Woodward with suggestions from D. B. Sinclair who later became a GR President. It measured both AC and DC voltages over wide voltage ranges and its rectifying probe allowed useful measurements to over 300 MHz. Type 1615 Capacitance Bridge GR was famous for its precision bridges, particularly for the transformer-ratio-arm bridges designed by J. F. Hersh. The Type 1615 and even more precise Type 1616 were used in electrical standards laboratories around the world. The 1615’s measured capacitance over a wide range with sensitivity and resolution to measure down to 10 aF (10-17F) and the 1616 down to 0.1 aF (10-19F). The 1615 made both 2-terminal and 3-terminal measurements
<urn:uuid:c0bfc366-a861-4eb4-8e7c-1f8f601581af>
CC-MAIN-2022-33
https://www.ietlabs.com/genrad_history/genrad_museum
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00604.warc.gz
en
0.97083
2,503
2.859375
3
Written by Jason Karp creator of the REVO₂LUTION RUNNING™ certification program “adaptation occurs when an organism is exposed to a stimulus to the quality or intensity of which it is not adapted.” If you spend time talking to evolutionary biologists, they’ll tell you that an organism’s structure evolves to cope with the stresses to which it is subjected. This idea has led to the theory of “symmorphosis,” that an organism’s structural design is regulated by its functional demand., As a preeminent anatomist, Ewald Weibel wrote, “…the quantity of structure incorporated into an animal’s functional system is matched to what is needed: enough but not too much.” While symmorphosis is a long process that occurs over millions of years of evolution, structural changes also occur in the short term in response to exercise: bones increase their density, muscle fibers increase their metabolic machinery, and cardiac muscle enlarges. If the quantity of structure incorporated into the runner’s system is matched to what is needed, it’s logical to assume that if you increase the need, you’ll ultimately increase the amount of change that takes place to match the increased need. That’s exactly what happens. General Adaptation Syndrome What happens if you give a mouse a toxic dose of a drug? That was the question posed by Hungarian endocrinologist Dr. Hans Selye in 1950, who discovered that laboratory animals were exposed to various stressors, like drugs, cold, or surgery, and individuals with various chronic illnesses, like tuberculosis and cancer, display a common set of symptoms and pattern of responses. From his observation of the stress response pattern, Selye developed the General Adaptation Syndrome, which represents the chronologic development of the response to stressors when their actions are prolonged. The response is characterized by three phases: (1) alarm, during which the organism recognizes the threat and begins to react to it; (2) resistance, during which the organism tries to cope with the threat; and (3) recovery or exhaustion, during which the organism has either eliminated or successfully overcome the effect of the stressor, or has failed to overcome the threat, depleting the organism’s physiological resources., Exhaustion, in contrast to recovery, occurs with chronic exposure to a particular stressor that results in lost adaptation. In Selye’s words: The keynote of this unification was the tenet that all living organisms can respond to stress as such and that in this respect the basic reaction pattern is always the same, irrespective of the agent used to produce stress. We called this response the general adaptation syndrome and its derailment of the diseases of adaptation. Selye further divided the alarm phase into two stages: shock, which represents the organism’s initial, sudden response to an exposed stimulus, and counter-shock, during which the physiological changes of shock are reversed, and the body’s adaptive mechanisms outweigh the destructive ones. At first glance, it would appear that Selye’s research on rodents is far removed from the world of a marathon runner trying to qualify for the Boston Marathon, or a high school runner trying to run a sub-five-minute mile. It is true that Selye’s original research on rodents subjected to involuntary toxic stressors has limitations when applied to the voluntary physical workouts of runners. However, for the first time in the history of science, Selye was able to elucidate the process of adaptation. That’s big-time Science with a capital S. For example, Selye discovered that giving a rodent a small dose (one-quarter) of an alarming/toxic stressor (e.g., drugs, cold, exercise) prior to a full, alarming dose of the same stressor protected the rodent from the alarming/toxic dose. Applied to a runner’s training, introducing a small dose of a specific type of workout is beneficial for adaptation before introducing a larger dose. Selye also discovered that an organism appears to possess a finite amount of “adaptation energy,” with adaptation to a specific stimulus decreasing resistance to other stimuli. As Selye described, “…anything to which adaptation is possible eventually results in exhaustion, that is, the loss of power to resist.” Using different types of workouts (e.g., aerobic, anaerobic, intervals, strength, power, etc.), training introduces a variety of unique stressors. How your body reacts and adapts to those stressors determines the amount of work that you can tolerate, how much you can adapt to other types of workouts at the same time, and, pure talent notwithstanding, how much you can progress. Following training stress, your body adapts and physiologically over(super)compensates, so that when the same stress is encountered again, it doesn’t cause the same degree of physiological disruption. In short, your body adapts to be able to handle the stress. Following the adaptation, you can do more physical work. The aim of the training is to introduce training stimuli in such a fashion that greater and greater levels of adaptation are achieved, while avoiding the exhaustion phase (and, ultimately, until your genetic potential is reached if so desired). A fundamental understanding of stress and adaptation is imperative to fully understand how and when to prescribe different exercises and workouts. Adaptation to Training In Selye’s paradigm of the General Adaptation Syndrome, adaptation is characterized by increased resistance to stress through previous exposure to stress. Thus, stress is at the core of adaptation. Like rubbing one stick against another over and over again to cause chemical changes to ignite a fire, running mile after mile—for weeks, for months, for years—also causes (bio)chemical changes. Each mile, each foot strike, is another rub of one stick against another. If you keep rubbing, positive changes occur. And that’s what adaptation to training is really all about—causing changes from the repeated rubbing of one stick against another. But because you will develop resistance to the rubbing with the previous rubbing, you must rub more to continue to cause positive changes. How much you adapt to that repeated rubbing ultimately depends on how responsive your cells are to signals. Muscle cells are able to detect all kinds of signals: mechanical, metabolic, neural, and hormonal, which are amplified and transmitted via signaling cascades and lead to the events involved in gene expression. This signaling is fast, occurring within minutes of completing a workout. Signaling results in the activation of transcription factors, which are proteins that bind to a specific part of DNA and control the transfer of genetic information from DNA to RNA. The physiological and biochemical adaptations to training begin with your DNA, with the copying of one of its double-helical strands (a process called replication). The replicated DNA strand, under the direction of transcription factors, is then transcribed into messenger RNA (a process called transcription), and the messenger RNA is then translated into a protein (a process called translation). Finally, the translated protein is transported from the nucleus of the cell where DNA transcription and RNA translation occur to the place where it will function. From a biological perspective, training is all about stimulating appropriate changes in gene expression and protein synthesis. Running presents small threats to your body’s survival, and, while you’re recovering after your runs, your body makes specific adjustments to assuage the threats. Each workout, especially if it’s new, causes a specific signal and activation of transcription factors that get busy making messenger RNAs. Big changes occur as a result of repeated runs and repeated threats, which lead to a concerted accumulation of messenger RNAs that are translated into a host of structural and functional proteins that make you fitter and faster. For example, repeatedly running for long periods of time (two hours or more) presents a threat to the muscles’ survival by depleting their storage of carbohydrates (glycogen), which is their preferred fuel. (Long endurance performance is closely linked to the amount of stored glycogen, with muscle glycogen depletion becoming the decisive factor limiting prolonged exercise.) When the muscle fibers run out of fuel, they say, “Hey, this person is running for so long that I don’t have any more fuel. I won’t be able to survive. If this activity is going to be a regular habit, I need to make more fuel.” When you consume carbohydrates following your long run, your body responds to the empty tank by synthesizing and storing more glycogen than usual in the skeletal muscles, which improves your endurance. Empty a full glass, and you get a refilled larger glass in its place. Imagine if your car adapted like that. Imagine if your car sensed when the car’s fuel tank gets very low from driving a long time and, during “recovery,” when your car is sitting on your driveway, it builds a larger gas tank so that next time you drive, you would have to drive for long to run out of gas. Pretty elegant. Another example of your body’s response to a threat is repeatedly running at fast speeds that cause acidosis, which presents a threat to your muscles’ survival by creating an environment that inhibits enzyme function, disrupts glycolysis, decreases muscle force production, and causes fatigue. When you cause acidosis, the muscle says, “Hey, Jason is running so fast that I’m becoming acidic. I won’t be able to survive. If this activity is going to be a regular habit, I need to create a better buffer to defend the acidosis and maintain my acid-base balance.” So guess what happens? You respond to the repeated acidosis by increasing the size of your muscles’ pool of bicarbonate ions, thus increasing your capacity to do more anaerobic work. When you begin a training program, you will experience many signaling responses and subsequent adaptations. However, continued training at the same level decreases the exercise-specific signaling responses involved in the adaptations to training. In other words, if the training stays the same for a while, you can expect your fitness and race performances to stay the same. For example, if you run 15 miles when you’re used to running only 12, you will send a strong signal to make specific adaptations (increased mitochondria and muscle glycogen, etc.). If you continue to run 15 miles every Sunday for months, you’ll continue to send signals to make adaptations until those adaptations are fully realized. After you have run 15 miles so many times that you have become habituated to it, a 15-mile run will no longer be enough of a stimulus to initiate further adaptations, and you may see a plateau in your race times. If you want to force more adaptations, you must run longer than 15 miles (or run those 15 miles faster). As Selye said in reference to his General Adaptation Syndrome, adaptation occurs “when an organism is exposed to a stimulus to the quality or intensity of which it is not adapted.” Thus, not only is training systematic, it must also be progressive. However, you need to balance the training stimulus with adequate recovery because, based on the General Adaptation Syndrome, chronic exposure to a particular stressor may lead to exhaustion, during which adaptation is lost. To become a faster runner, you need to gradually and systematically increase the amount of stress (with adequate recovery) so that you increase the signaling response. Read that sentence again. We will return to this concept many times throughout this book. As a runner, you may be a little addicted. Runners like to run. A lot. But runners don’t keep adapting to running once the amount of running becomes enough to stop adapting. Unfortunately, your ability to adapt to a training stimulus doesn’t keep occurring indefinitely. There will come a point, which is specific to each runner, when more training, at best, does not lead to better results and, at worst, causes injury. From an adaptation standpoint, the main difference between Olympic athletes and all other runners is that Olympic athletes continue to make physiological adaptations with more and more training, upwards of 100 miles (160 kilometers) per week, and do so while not getting injured. Most runners stop adapting far short of 100 miles per week, and many (most) would get injured with that amount of training. If you’re just beginning a training program, either as a beginner runner or after an extended hiatus, any time off during training is detrimental, as you are in the early stages of adapting to the training. If you have been training for years, a week off of training won’t hurt since your body has already created the structural and functional proteins and integrated them into your physiology and biochemistry to become a part of who you are. The longer the time off, the more of these adaptations you’ll lose, but the longer you have been training, the greater the residual effects. Although there is plenty of truth to the adage “use it or lose it,” many adaptations last for a while with reduced training, even up to 15 weeks. It takes a lot more work to get fit than it does to stay fit. Specificity of Training Functional changes take place only in the organs, cells, and intracellular structures that are stressed during physical activity. It seems obvious that if you want bigger biceps, doing squats won’t help. Muscles adapt to the specific demands placed on them. But the physical activity you train is not just specific to your muscles; it’s also specific to your brain. Although cycling for hours every day in the countryside can make more mitochondria in your muscles, you need to run to become a better runner, in large part because of the movement pattern of running (and thus the brain’s motor unit recruitment and application of muscle force) is different from cycling. For example, runners use their hip flexors and quadriceps muscles at long lengths due to their upright posture at the hip joint, while cyclists use their hip flexors and quadriceps muscles at short lengths due to their pronounced flexed posture at the hip. The chronic use of these muscles at different lengths by these athletes results in different relationships between muscle length and the forces they can produce at those lengths. The brain needs to “learn” to communicate with the muscles to perform the specific task of running and the muscles need to “learn” to produce force at specific joint angles. Therefore, you need to train the entire movement pattern (the physics) of running in addition to the physiology and biochemistry of running. Specificity of training also applies to running on different surfaces, like track, road, grass, and trail. A cross-country runner needs to train on cross-country courses that include grass and dirt. It’s not a good idea for cross-country runners to do workouts on the track while they are in cross-country season. A half-marathon or marathon runner needs to train on the road, especially long workouts, to get the muscles used to the muscle fiber damage they will experience in the race. Good runners will run well regardless of the terrain, but doing all of your workouts on a track to prepare for cross country or on trails to prepare for a road marathon is like a tennis player always practicing on a hard court and then playing a tournament on a clay court. The way a tennis player’s feet move and the way the ball bounces on a clay court is different from on a hard court, just like running on a track is different from running on grass fields and dirt trails or on the road. You need to train on the surface on which you plan to race. The specificity of the training principle dictates that, if you want to get faster for a specific race distance, like a mile or a half-marathon, you should train at that specific race pace as much as possible. After all, that would be the pace to train the physics (application of force, angular velocities of body segments, etc.), the physiology, and the biochemistry of the race. However, while training movement certainly needs to be specific to the racing environment, perhaps the great paradox of distance running is that the specificity of training principle does not hold when it comes to training intensity, as the majority of training is performed at a much slower than race pace. Indeed, there is a strong relationship between the time spent training at low intensities and race performances, despite the training speed being much slower than the race pace. Curiously, spending 100 percent or even 50 percent of one’s time training at a race pace is not the way to improve performance for a specific race distance. Why not? This is a fascinating question, one of many about training that this book explores. In general, training becomes more specific to the intensity and demands of the race as the date of the race approaches. Basic fitness adaptations should precede more complex training and performance adaptations. In other words, you must first work on basic fitness before training at a race pace. You must first be fit to train specifically. Becoming a Certified Running Coach When you earn the REVO₂LUTION RUNNING™ certification, you not only get the best running education in the world; you get a complete running experience, because what we do serves as proof of what we believe. Check out what it takes to start a career in personal fitness training. This is your most affordable and fastest way to become a highly qualified personal trainer. Is your recertification coming up? Learn more about earning your CEU credits. You can find the full list of CEU courses here. If you are ready to start your online personal training or coaching business, don’t forget to learn more about our online coaching course. You will also really enjoy this very comprehensive training course called Online Expert Empire. There is always something exciting about earning a new training or coaching certification and applying that new knowledge of how you train your clients. This also helps you hit the reset button. NESTA and Spencer Institute coaching programs are open to anyone with a desire to learn and help others. There are no prerequisites. That’s it for now.
<urn:uuid:92426aff-4d80-45b2-b327-e367800dd258>
CC-MAIN-2022-33
https://www.nestacertified.com/running-training-adaptation/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00206.warc.gz
en
0.953918
3,784
3.359375
3
|| Home | Resources | Schools Programme | Teachers | Site help | About us | Contact us || |You are here: Home > Resources > Scottish Wars of Independence > The Declaration of Arbroath, 1320| Unit 9: The Declaration of Arbroath, 1320 Skirmishes and cross-border raids continued between Scotland and England. Pope John XXII wanted peace so that both countries could help mount a crusade to the Holy Land. The Scots broke the peace in 1318 when Robert I recaptured Berwick. The Pope excommunicated the King along with four Scottish bishops. By 1320, Scotland's relations with the Pope were in crisis. In an effort to persuade the Pope to support their case, eight earls and thirty-eight barons of Scotland put their seals to a letter asking him to recognise Scotland's independence and acknowledge Robert I as Scotland's lawful king. This letter, probably written by the King's Chancellor, Bernard, Abbot of Arbroath, and delivered to the Pope in Avignon in France, has become known as the Declaration of Arbroath. The Declaration of Arbroath, 6 April 1320 (National Records of Scotland reference SP13/7) 1. The historic strength of the Scots (Translation compiled by Dr Alan Borthwick, National Records of Scotland, June 2005) How the Declaration of Arbroath survived The document in the National Records of Scotland is the only surviving copy of the Declaration. The Pope's copy in Avignon has not survived. The Declaration was kept with the rest of the national archives in Edinburgh Castle until the early 17th century. When repair work was being carried out on the castle, the Declaration was taken into safekeeping at Tyninghame, the home of the Earl of Haddington. At some time during the 18th century the document suffered serious damage from damp so that today it shows some ragged gaps in which portions of text have vanished. Luckily, the full text of the document has survived from an earlier engraving. In 1812, the 8th Earl of Haddington gave permission for copies of the seals to be made for an official publication. At this time, only 21 of the original 46 seals remained. Today only 19 survive. In August 1829, the 9th Earl of Haddington, following the wishes of his late father, passed the document to the national archives where it remains today. Full translation of the Declaration of Arbroath To the most Holy Father and Lord in Christ, the Lord John, by divine providence Supreme Pontiff of the Holy Roman and Universal Church, his humble and devout sons Duncan, Earl of Fife, Thomas Randolph, Earl of Moray, Lord of Man and of Annandale, Patrick Dunbar, Earl of March, Malise, Earl of Strathearn, Malcolm, Earl of Lennox, William, Earl of Ross, Magnus, Earl of Caithness and Orkney, and William, Earl of Sutherland; Walter, Steward of Scotland, William Soules, Butler of Scotland, James, Lord of Douglas, Roger Mowbray, David, Lord of Brechin, David Graham, Ingram Umfraville, John Menteith, guardian of the earldom of Menteith, Alexander Fraser, Gilbert Hay, Constable of Scotland, Robert Keith, Marischal of Scotland, Henry Sinclair, John Graham, David Lindsay, William Oliphant, Patrick Graham, John Fenton, William Abernethy, David Wemyss, William Mushet, Fergus of Ardrossan, Eustace Maxwell, William Ramsay, William Mowat, Alan Murray, Donald Campbell, John Cameron, Reginald Cheyne, Alexander Seton, Andrew Leslie and Alexander Straiton, and the other barons and freeholders and the whole community of the realm of Scotland send all manner of filial reverence, with devout kisses of his blessed feet. Most Holy Father, we know and from the chronicles and books of the ancients we find that among other famous nations our own, the Scots, has been graced with widespread renown. It journeyed from Greater Scythia by way of the Tyrrhenian Sea and the Pillars of Hercules, and dwelt for a long course of time in Spain among the most savage peoples, but nowhere could it be subdued by any people, however barbarous. Thence it came, twelve hundred years after the people of Israel crossed the Red Sea, to its home in the west where it still lives today. The Britons it first drove out, the Picts it utterly destroyed, and, even though very often assailed by the Norwegians, the Danes and the English, it took possession of that home with many victories and untold efforts; and, as the histories of old time bear witness, they have held it free of all servitude ever since. In their kingdom there have reigned one hundred and thirteen kings of their own royal stock, the line unbroken by a single foreigner. The high qualities and merits of these people, were they not otherwise manifest, shine forth clearly enough from this: that the King of kings and Lord of lords, our Lord Jesus Christ, after His Passion and Resurrection, called them, even though settled in the uttermost parts of the earth, almost the first to His most holy faith. Nor did He wish them to be confirmed in that faith by merely anyone but by the first of His Apostles - by calling, though second or third in rank - the most gentle Saint Andrew, the Blessed Peterís brother, and desired him to keep them under his protection as their patron for ever. The Most Holy Fathers your predecessors gave careful heed to these things and strengthened this same kingdom and people with many favours and numerous privileges, as being the special charge of the Blessed Peterís brother. Thus our people under their protection did indeed live in freedom and peace up to the time when that mighty prince the King of the English, Edward, the father of the one who reigns today, when our kingdom had no head and our people harboured no malice or treachery and were then unused to wars or invasions, came in a guise of a friend and ally to harass them as an enemy. The deeds of cruelty, massacre, violence, pillage, arson, imprisoning prelates, burning down monasteries, robbing and killing monks and nuns and yet other outrages without number which he committed against our people, sparing neither age nor sex, religion nor rank, no-one could describe nor fully imagine unless he had seen them with his own eyes. But from these countless evils we have been set free, by the help of Him who though He afflicts yet heals and restores, by our most tireless prince, King and lord, the lord Robert. He, that his people and his heritage might be delivered out of the hands of our enemies, bore cheerfully toil and fatigue, hunger and peril, like another Maccabaeus or Joshua. Him, too, divine providence, the succession to his right according to our laws and customs which we shall maintain to the death, and the due consent and assent of us all have made our prince and king. To him, as to the man by whom salvation has been wrought unto our people, we are bound both by his right and by his merits that our freedom may be still maintained, and by him, come what may, we mean to stand. Yet if he should give up what he has begun, seeking to make us or our kingdom subject to the King of England or the English, we should exert ourselves at once to drive him out as our enemy and a subverter of his own right and ours, and make some other man who was well able to defend us our King; for, as long as a hundred of us remain alive, never will we on any conditions be subjected to the lordship of the English. It is in truth not for glory, nor riches, nor honours that we are fighting, but for freedom alone, which no honest man gives up but with life itself. Therefore it is, Reverend Father and Lord, that we beseech your Holiness with our most earnest prayers and suppliant hearts, inasmuch as you will in your sincerity and goodness consider all this, that, since with Him Whose vice-gerent on earth you are there is neither weighing nor distinction of Jew and Greek, Scotsman or Englishman, you will look with the eyes of a father on the troubles and privations brought by the English upon us and upon the Church of God. May it please you to admonish and exhort the King of the English, who ought to be satisfied with what belongs to him since England used once to be enough for seven kings or more, to leave us Scots in peace, who live in this poor little Scotland, beyond which there is no dwelling-place at all, and covet nothing but our own. We are sincerely willing to do anything for him, having regard to our condition, that we can, to win peace for ourselves. This truly concerns you, Holy Father, since you see the savagery of the heathen raging against the Christians, as the sins of Christians have indeed deserved, and the frontiers of Christendom being pressed inward every day; and how much it will tarnish your Holinessís memory if (which God forbid) the Church suffers eclipse or scandal in any branch of it during your time, you must perceive. Then rouse the Christian princes who for false reasons pretend that they cannot go to the help of the Holy Land because of wars they have on hand with their neighbours. The real reason that prevents them is that in making war on their smaller neighbours they find a readier advantage and weaker resistance. But how cheerfully our lord the King and we too would go there if the King of the English would leave us in peace, He from Whom nothing is hidden well knows; and we profess and declare it to you as the Vicar of Christ and to all Christendom. But if your Holiness puts too much faith in the tales the English tell and will not give sincere belief to all this, nor refrain from favouring them to our undoing, then the slaughter of bodies, the perdition of souls, and all the other misfortunes that will follow, inflicted by them on us and by us on them, will, we believe, be surely laid by the Most High to your charge. To conclude, we are and shall ever be, as far as duty calls us, ready to do your will in all things, as obedient sons to you as His Vicar, and to Him as the Supreme King and Judge we commit the maintenance of our cause, casting our cares upon Him and firmly trusting that He will inspire us with courage and bring our enemies to nothing. May the Most High preserve you to His Holy Church in holiness and health for many days to come. Given at the monastery of Arbroath in Scotland on the sixth day of the month of April in the year of grace thirteen hundred and twenty and the fifteenth year of the reign of our King aforesaid. (Translation compiled by Dr Alan Borthwick, National Records of Scotland, June 2005)
<urn:uuid:fa209389-331f-4327-a3bf-7b172cfb0381>
CC-MAIN-2022-33
https://www.scottisharchivesforschools.org/WarsOfIndependence/Unit09DeclarationOfArbroath.asp
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00406.warc.gz
en
0.961516
2,325
3.71875
4
For detailed guides, see the main ArchWiki page, Security. See the main article: Firewalls. See also Wikipedia:Comparison of firewalls. - Arpwatch — Tool that monitors ethernet activity and keeps a database of Ethernet/IP address pairings. - Bro — Powerful network analysis framework that is much different from the typical IDS you may know. - EtherApe — Graphical network monitor for Unix modeled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic. Color coded protocols display. - Honeyd — Tool that allows the user to set up and run multiple virtual hosts on a computer network. - http://www.honeyd.org/ || AUR - IPTraf — Console-based network monitoring utility. - Kismet — 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. - Nemesis — Command-line network packet crafting and injection utility. - Nmap — Security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. - Ntop — Network probe that shows network usage in a way similar to what top does for processes. - https://www.ntop.org/ || AUR - Snort — Network intrusion prevention and detection system. - https://www.snort.org/ || AUR - Sshguard — Daemon that protects SSH and other services against brute-force attacts, similar to Fail2ban. - Suricata — High performance Network IDS, IPS and Network Security Monitoring engine. - https://suricata-ids.org/ || AUR - Tcpdump — Common console-based packet analyzer that allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network. - vnStat — Console-based network traffic monitor that keeps a log of network traffic for the selected interfaces. - Wireshark — Network protocol analyzer that lets you capture and interactively browse the traffic running on a computer network. - AFICK — Security tool that allows to monitor the changes on your files systems, and so can detect intrusions. - Lynis — Security and system auditing tool to harden Unix/Linux systems. - Metasploit Framework — An advanced open-source platform for developing, testing, and using exploit code. - Nessus — Comprehensive vulnerability scanning program. - OpenVAS — Framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. FOSS Nessus fork. - Osiris — Tool for monitoring system integrity and changes across a network. - https://launchpad.net/osiris || AUR - OSSEC — Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response. - Samhain — Host-based intrusion detection system (HIDS) provides file integrity checking and log file monitoring/analysis, as well as rootkit detection, port monitoring, detection of rogue SUID executables, and hidden processes. - Tiger — Security tool that can be use both as a security audit and intrusion detection system. - Tripwire — Intrusion detection system. - AIDE — File and directory integrity checker. - http://aide.sourceforge.net/ || AUR - Logcheck — Simple utility which is designed to allow a system administrator to view the logfiles which are produced upon hosts under their control. - https://web.archive.org/web/20180314152834/http://logcheck.alioth.debian.org/ || not packaged? search in AUR - Logwatch — Customizable log analysis system. - OpenDLP — OpenDLP is a free and open source, agent- and agentless-based, centrally-managed, massively distributable data loss prevention tool. - Swatch — Utility that can monitor just about any type of log. - chkrootkit — Locally checks for signs of a rootkit. - http://www.chkrootkit.org/ || AUR - ClamAV — Open source antivirus engine for detecting trojans, viruses, malware & other malicious threats. - Linux Malware Detect — Malware scanner designed around the threats faced in shared hosted environments. - Rootkit Hunter — Checks machines for the presence of rootkits and other unwanted tools. See the main article: Backup programs. See also Wikipedia:Comparison of backup software. 警告: Only sflock, physlock, Cinnamon Screensaver, MATE Screensaver and GNOME Screensaver are able to block tty access. - Cinnamon Screensaver — Screen locker for the Cinnamon desktop. - GNOME Screensaver — Screen locker for the GNOME Flashback desktop. - i3lock — A simple screen locker. Provides user feedback, uses PAM authentication, supports DPMS. The background can be set to an image or solid color. - i3lock-color — Improved i3lock with color customization. The most popular fork of i3lock - https://github.com/Raymo111/i3lock-color || AUR, AUR - i3lock-blur — Fork of i3lock which can use your desktop with the blur effect applied as a background. - i3lock-wrapper — A simple wrapper around i3lock which sets up a blurred screenshot of the desktop as a background image. - Light-locker — A simple locker (forked from gnome-screensaver) that aims to have simple, sane, secure defaults and be well integrated with the desktop while not carrying any desktop-specific dependencies. It relies on LightDM for locking and unlocking your session via ConsoleKit/UPower or logind/systemd - MATE Screensaver — Screensaver and locker for MATE Desktop Environment. - physlock — Screen and console locker. - sflock — Simple screen locker utility for X, based on slock. Provides a very basic user feedback. - slock — Very simple and lightweight X screen locker. Offers only a black background when locked, there are no animations or text fields. - sxlock — Fork of sflock with a few enhancements. Provides basic user feedback, uses PAM authentication, supports DPMS and RandR. Supports sxlock.serviceto lock the screen on suspend/hibernation. See the README for more information. - xlockmore — Simple X11 screen lock with PAM support. - XScreenSaver — Screen saver and locker for the X Window System. - XSecureLock — X11 screen lock utility designed with the primary goal of security. - GtkHash — 生成摘记,计算校验的 GTK+ 工具 - hashdeep — 可对多文件计算 Hash, 生成摘记,跨平台的工具。 - Parano — 用于生成、编辑和校验 MD5 和 SFV 文件的 GNOME 前端 - RHash — Hash 校验工具,支持 SFV, CRC 等等,支持众多算法 - Quick Hash GUI — 可在文本或硬盘递归地快速进行 Hash 的 GUI 工具 - RHash — Utility for verifying hash sums (SFV, CRC, etc). Supports lots of algorithms. - MassHash — A set of file hashing tools (both CLI and GTK+ GUI) written in Python. Supported algorithms include MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512. - ccrypt — A command-line utility for encrypting and decrypting files and streams. - GnuPG — The GNU project's complete and free implementation of the OpenPGP standard as defined by RFC4880. Free and Open Source replacement of PGP, mostly used for digital signing of packages. - gzsteg — A utiltiy that can hide data in gzip compressed files - silenteye — A steganography application written in C++, use Qt4 library. - snow — Steganography program for concealing messages in text files - steghide — A steganography utility that is able to hide data in various kinds of image and audio files. - stegparty — A steganography utility hides text by typoing text existing text files. - Console Password Manager — Curses based password manager using PGP-encryption. - Figaro's Password Manager 2 — GTK2 port of Figaro's Password Manager with some new enhancements. - https://als.regnet.cz/fpm2/ || AUR - GPass — Password manegement software for GNOME2 desktop. - GPassword Manager — Simple, lightweight and cross-platform utility for managing and accessing passwords. - Gtkpass — Gtkpass is a GTK and Libkpass-based password manager for KeePass 1.x databases. - Ked Password Manager — A password manager that helps to manage large numbers of passwords. - http://kedpm.sourceforge.net || AUR - KeePass Password Safe — Free open source Mono-based password manager, which helps you to manage your passwords in a secure way. - KeePassC — KeePassC is a curses-based password manager compatible to KeePass v.1.x and KeePassX. - KeePassX — Free and open source Qt-based password manager (uses KeePass 1.x databases for storage). - https://www.keepassx.org/ || AUR - MyPasswords — What you need for managing your passwords, including the passwords of your online accounts, bank accounts and ... with the corresponding URLs. - MyPasswordSafe — Easy-to-use QT based password manager, compatible with Password Safe files (and therefore pwsafe). - Pasaffe — Easy to use password manager for Gnome with a Password Safe 3.0 compatible database. - pass — Simple console based password manager - Password Gorilla — A cross-platform password manager. - Password Safe — Simple and secure password manager. - pwsafe — Unix commandline program that manages encrypted password databases. - QPass — Easy to use password manager with built-in password generator. - http://qpass.sourceforge.net || AUR - Revelation — Password manager for the GNOME desktop. - Seahorse — GNOME application for managing encryption keys and passwords in the GnomeKeyring. - Universal Password Manager — Allows you to store usernames, passwords, URLs and generic notes in an encrypted database protected by one master password.
<urn:uuid:62d0c5c3-7617-46e2-8972-a476965652ab>
CC-MAIN-2022-33
https://wiki.archlinux.org/title/List_of_Applications/Security_(%E7%AE%80%E4%BD%93%E4%B8%AD%E6%96%87)
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00003.warc.gz
en
0.767242
2,542
2.6875
3
In The Wild Blue Yonder, Werner Herzog’s 2005 film fantasia on space voyaging, viewers learn about the “Interplanetary Transport Network,” a set of winding pathways twisting invisibly through the solar system, sculpted by the shifting pushes, pulls, and resonances of gravitational forces among the planets. Martin Lo, a research scientist at NASA’s Jet Propulsion Laboratory and a mathematician who has mapped the network’s manifolds, calls this swerving web of ribbon-like gravity tubes a system of “chaotic transport.”1 Riffing on Madeleine L’Engle’s epic 1963 children’s tale of time travel, A Wrinkle in Time, we might describe this system as a suite of wrinkles in space. Each of the more-or-less anthropologically minded essays in this issue of Environmental Humanities offers the reader a novel wrinkle in space—where a wrinkle, following the Oxford English Dictionary, might be “a crease, fold, or ridge caused by the folding, puckering, or contraction of a . . . pliant substance,” “a minor difficulty or irregularity,” “a clever or adroit expedient or trick,” or “a piece or item of useful information, knowledge, or advice.” Taken together, all these wrinkles in space—tugging on one another, reshaping the path of the reader as she, he, or ze goes—offer a journey through this issue that is one-part cosmic transport and one-part chaotic transport, whirling the reader into zones that an anthropologist would call both familiar and strange. The wrinkles in space that the reader will encounter in this issue are made, in the main, by human cultural practice, rather than by anything like the bare cosmos “itself.” Given the anthropological starting points of most of the articles that follow, this may not be surprising—though some of the creases, folds, and puckers in the new sciences of the extraterrestrial surely are! So, prepare for wrinkles created by Cold War astronauts who enact an anxious sense of disconnection from Earth by blotting out the planet from their spacecraft views by holding up their thumbs, while their Earth-bound planetary scientist successors beckon new Earth-like homes by pointing index fingers to a sky peppered with promising exoplanets—astronaut thumbs and planetary scientist fingers here folding the fabric of the uninhabited and habitable cosmos into the shape of human nightmares and dreams. Or get ready to learn about the wrinkles binding microbial and multispecies life to astronaut well-being, as bioregenerative spaceship life-support systems employ algae to transmute urine and sweat into potable water; any fantasy that would have astronauts as free-floating autopoiets turns out to be wrinkled by the practices of maintenance and care that loop human and nonhuman cosmonauts together.2 Astronauts or cosmonauts cannot actually long survive solely within the sort of self-contained pods that one thinks of as the canonical spacesuit. Or consider the universe filtered through the wriggling waveforms of ultraviolet light, which reveals that the shine of Earth and the shine of animal eyes are not simple reflections of sunlight but, like sunlight, emanations that contain ultraviolet radiation (Earth’s geocorona shines in the ultraviolet, while the idioretinal apparatuses of animal eyes emit ultraweak light in this range), making planets and eyeballs into kindred kinds of shining forms, energetic and alive; as astrobiologists think across these forms, folding planetary science together with ophthalmology, they pucker common sense about which sciences go with which. Moving from eye to brain, consider the speculations of unconventional physical cosmologists who hold that, in a vastly expanded future universe dominated by dark matter and dark energy, “it is perfectly possible that a fluctuation with all the complexity and attributes of a thinking consciousness will occur”3—a thinking wrinkle in space that might be made of folds of dark, not grey matter. Whether the resulting “Boltzmann brains” constitute for cosmologists a theoretical wrinkle in the sense of “a piece or item of useful information,” “a minor difficulty or irregularity,” or “a clever or adroit expedient or trick” is an open question, though one that invites reflection about how readers might think of long-standing anthropological definitions of thinking, personhood, and embodiment (though also, perhaps, demands that we activate a sense of the absurd; why couldn’t a “fluctuation with all the complexity and attributes” of, say, a Dravidian kinship system [using a patrilineal modulo-2 reckoning system] or an MIT dorm-room refrigerator, emerge? At the very least, reflections on what we might mean by intelligence are demanded).4 Shift now from outer space to our home planet, with some of Earth’s territories imagined as analogous to those on other worlds.5 Such comparisons roll and unroll the making of a newly “de-extremed” Antarctica, rendered increasingly as a simple storehouse of microbial diversity for all-too-Earthly markets and as a zone now embedded in bureaucratic regulations that seek to make icy emergencies a thing of mundane management, bringing the outer limits into the fold of Earthly control—though never really: as Antarcticans toggle between the scale of everyday hazard and the scale of a planetary climate disaster cracking open beneath their feet, they confront “derangements of scale” that wrinkle and unwrinkle connections between the individual-experiential and the planetary.6 In his 1959 novel, The Sirens of Titan, Kurt Vonnegut Jr. imagined a space-faring character captured in a cosmic continuum that Vonnegut called a chrono-synclastic infundibulum, a space-place that had the effect of stretching the character (along with his companion dog) into a “wave” vibrating between the Sun and the star Betelgeuse. Whenever Earth would intersect the infundibulum, man and dog would materialize, for just a moment. The pair could also exist temporarily and simultaneously on other worlds; on Saturn’s moon, Titan, their presence was, for whatever reason of interstellar geometry, more or less permanent. Let’s imagine this issue’s conversation about anthropology off Earth as itself chrono-synclastically infundibulated. Think of anthropology as a planet that intersects occasionally with the stretched waveform of astronomical phenomena and discourse. What have its various chrono-synclastically infundibulated manifestations looked like over the years? We might recall—as the editors of the present collection usefully do—the 2012 appearance of Debbora Battaglia, David Valentine, and Valerie Olson’s “Extreme: Humans at Home in the Cosmos,” in Anthropological Quarterly. Or recall Alexander C. T. Geppert’s 2012 Imagining Outer Space: European Astroculture in the Twentieth Century. Or Douglas A. Vakoch and Albert A. Harrison’s 2011 Civilizations beyond Earth: Extraterrestrial Life and Society. Or, from an earlier orbit, Debbora Battaglia’s E. T. Culture: Anthropology in Outerspaces, from 2005. Still earlier intersections would call up Stacia Zabusky’s 1995 Launching Europe: An Ethnography of European Cooperation in Space Science or George E. Slusser and Erica Rabkin’s 1987 Aliens: The Anthropology of Science Fiction (which drew upon anthropology’s analytic of “the other” in a way few pieces in the present collection do; in this issue of Environmental Humanities, the “other” is mostly other worlds, other planets . . . a sign that space science has come to be interested in habitats, and not so much, as were its earlier incarnations, in unexpected intelligence). Or remember Ben Finney and Eric M. Jones’s 1985 Interstellar Migration and the Human Experience.7 Winding our calendars back further would land us on Magoroh Maruyama and Arthur Harkins’s 1975 Cultures beyond Earth: The Role of Anthropology in Outer Space. What have previous co-materializations of anthropology and astrosciences looked like? How have they differed from those convergences pointed to by the present collection? Well, to take Finney and Jones’s Interstellar Migration and the Human Experience as a touchstone for thinking about a previous generation’s anthropology of outer space, I would note that, in that enunciation, anthropology was not itself unsettled by the possibility of its application to cosmic contexts. Finney and Jones posed anthropology as durably about the evolutionarily tuned capacity for hominid exploration and adaptation, with space simply a new “frontier” (the word appears again and again in their text) for social organization and cultural meaning making. Authors in Interstellar Migration and the Human Experience universalized the relevance of anthropology in another way, too, speculating on the applicability of anthropology to studying the cultures of extraterrestrial life forms (indeed, action anthropologist Sol Tax had explored that angle in his afterword to Maruyama and Harkins’s 1975 Cultures beyond Earth. For still earlier data points on the convergence of anthropology and search for extraterrestrial intelligence (SETI), see Steven J. Dick’s 2012 “The Role of Anthropology in SETI: A Historical View,” which reports on early 1960s calls for anthropological insight by scientists interested in extraterrestrial intelligence and documents the participation of anthropologists Kent Flannery, Richard B. Lee, and Ashley Montagu in 1970s symposia on SETI).8 Much has changed since these traditional articulations of the spacey anthropological mandate—not least the arrival of self-critique into anthropology in the 1980s and the rise of feminist and postcolonial anthropology, to say nothing (though one should say everything) of the emergence of science and technology studies, which has made it possible to study the astrosciences themselves as cultural forms. In the sciences of extraterrestriality, meanwhile, astrobiology has in many quarters come to eclipse the search for extraterrestrial intelligence, which has folded interested anthropologists and their associates into conversation with the primary, secondary, and science studies literature on biology, geology, ecology, and environmental science.9 This said, SETI-styled interest in information theory still persists,10 something like a chrono-synclastically infundibulated phenomenon that keeps rematerializing.11 A continued interest in human life in space—now no longer so much about “colonizing”12 as about mundane travel—has also had anthropologists keeping an eye on space medicine and on research into habitation in the off-world.13 As near-future long-term space habitation recedes somewhat from the horizon of present possibility, some scholars have taken to thinking about remote presence14 or displaced, Earth-analogical presence.15 A looking and listening outward has thus been joined by treatments of space science as Earthly in its origin, in its analogical meshwork,16 and in its everyday practice—which last continues to animate analyses that tackle matters of space sex/gender and sexuality,17 indigeneity and space science,18 US race and space politics,19 and nation-state, intergovernmental, and private space projects.20 There is also an ongoing move toward space-themed examinations of other social domains, such as religion.21 These emphases might constitute less a looking out at frontiers than a folding and wrinkling inward that could be called a kind of extraterrestrial involution, where involution is “a rolling, curling, or turning inwards” (OED) (apologies to Geertz’s Agricultural Involution and Hustak and Myers’s “Involutionary Momentum”). The rolling and curling of the extraterrestrial into and through the terrestrial, mundane, and extreme22 has permitted scholarship to travel across thematic and topical distances that might have been otherwise far-flung and unlikely (anthropology and ultraviolet light? Anthropology and space junk? Anthropology and exo-planets? What?). Such wrinkles in space have also permitted anthropologists to robustly claim that they can conduct “anthropology off the Earth” on Earth23—where Earth itself is also always itself multiple, not at all a self-evident “place.” But perhaps what most distinguishes the newest anthropology of outer space from the old is the irreversible wrinkling of some of anthropology’s dearest analytics—the self-evidence of “being there,” the steadiness of “perspective,” what we mean by “sensing,” what counts as a “relation,” the difference between “small” and “large” scales, and the “ecology” in political ecology. The anthropology of outer space these days—as represented in this issue of Environmental Humanities—is a machine for chaotic and cosmic travel, chrono-synclastic infundibulation, and analogical involution, a wrinkle in the discipline and its companion fields that changes what can count as both the “environment” and the “humanities.” Lo, “Space Travel via Chaotic Transport.” See also Gaard, “Animals in (New) Space.” Walford and Kirk, this issue. Dunér, this issue. Compare Messeri, Placing Outer Space, on Mars-Earth analogies and see Jones, Magic’s Reason, on how anthropologists have often made analogies to other styles of reasoning in order to authorize their own comparisons and claims. Clark, “Scale”; see also O’Reilly, Technocratic Antarctic. And see Finney, “Anthropology and the Humanization of Space.” See also Aveni, Conversing with Planets, for the view from archeology. E.g., Anker, “Ecological Colonization of Space”; Helmreich, “Signature of Life”; Olson, “Political Ecology in the Extreme”; Praet, “Lune de Saturne”; Bertoni, “Resources (Un)Ltd.” The field of environmental history has joined in as well: see Rand, “Orbital Decay”; Degroot, “Catastrophe Happening in Front of Our Very Eyes”; Maher, Apollo in the Age of Aquarius; and Pritchard, “Trouble with Darkness.” See Denning, “Learning to Read”; and Capova, “Detection of Extraterrestrial Life.” And check out “Breakthrough Listen,” a massive new project to tune for communiqués from space: breakthroughinitiatives.org/Initiative/1; thanks to Claire Webb, poised to do fieldwork on Breakthrough, who alerted me to this endeavor. Though consult Dittmer, “Colonialism and Place Creation in Mars Pathfinder Media Coverage.” Olson, “Ecobiopolitics of Space Biomedicine”; Olson, American Extreme; and Valentine, “Atmosphere.” Mirmalek, “Working Time on Mars”; Clancey, “Becoming a Rover”; Vertesi, Seeing like a Rover. Messeri, “Resonant Worlds”; Salazar, “Speculative Fabulation”; and see authors in this issue. Cf. Battaglia, Valentine, and Olson, “Relational Space”; and Praet, “Lune de Saturne.” Casper and Moore, “Inscribing Bodies, Inscribing the Future”; Litfin, “Gendered Eye in the Sky”; Oman-Reagan, “Queering Outer Space.” Young, “Pity the Indians of Outer Space”; Lempert, “Decolonizing Encounters of the Third Kind”; Swanner, “Contested Spiritual Landscapes in Modern American Astronomy.” E.g., Womack, Afrofuturism; Shetterly, Hidden Figures. Zabusky, Launching Europe; Lewis, “Okudzhava and Scott-Heron”; Redfield, Space in the Tropics; Codignola and Schrogl, Humans in Outer Space; Lewis, “Red Stuff”; Siddiqi, Red Rockets’ Glare; Hopkins, “African Space Programs Aren’t Science Fiction”; Matthews, “Why Ghana Started a Space Program”; Bagla and Menon, “Reaching for the Stars”; Erickson, “China’s Space Development History”; Japan Aerospace Exploration Agency; Mitchell, “Countdown to an Impasse”; Stroikos, “China, India in Space and the Orbit of International Society”; and see “Towards an Anthropology of Space”; whether @RogueNASA is a sign of shifting US national investments in space will bear watching—see Weisberger, “‘Rogue’ Science Agencies.” See Launius, Bjørnvig, and Pop, “Space Flight and Religion”; Lewis, “Muslims in Space”; Swanner, “Contested Spiritual Landscapes.” See Lepselter, “From the Earth Native’s Point of View”; Launius, “Writing the History of Space’s Extreme Environment.” See Battaglia, “Life as We Don’t Yet Know It.”
<urn:uuid:38d37a18-f750-4787-b90f-a0bd599237c7>
CC-MAIN-2019-22
https://read.dukeupress.edu/environmental-humanities/article/9/2/300/133019/ForewordA-Wrinkle-in-Space
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258451.88/warc/CC-MAIN-20190525204936-20190525230936-00222.warc.gz
en
0.906794
3,800
2.609375
3
Americans and people around the globe have been forced to wear face masks in order to “protect public health,” without evidence that they actually work to reduce COVID-19 transmission, hospitalizations and deaths. You may remember, in fact, that in the early days of the pandemic, there was a rush on masks, causing supplies for health care practitioners to dwindle. At the time, health officials were adamant that people should NOT wear masks. In February 2020, Christine Francis, a consultant for infection prevention and control at the World Health Organization, said, “Medical masks … cannot protect against the new coronavirus when used alone … WHO only recommends the use of masks in specific cases.”1 Those specific cases include if you have a cough, fever or difficulty breathing. In other words, if you’re actively sick and showing symptoms. “If you do not have these symptoms, you do not have to wear masks because there is no evidence that they protect people who are not sick,” she continued. Also in February 2020, U.K. health authorities advised against the use of masks, even for people working in community or residential care facilities, stating, “During normal day-to-day activities facemasks do not provide protection from respiratory viruses, such as COVID-19 and do not need to be worn by staff.”2 In March 2020, U.S. Surgeon General Jerome Adams publicly agreed, tweeting a message stating, “Seriously people- STOP BUYING MASKS!” and going on to say that they are not effective in preventing the general public from catching coronavirus.3 As of March 31, WHO was still advising against the use of face masks for people without symptoms, stating that there is “no evidence” that such mask usage prevents COVID-19 transmission.4 How, then, did masks suddenly become a key strategy in the fight against COVID-19? A study involving two hairstylists. Beauty Salon Study Used to Cement US Mask Mandates The U.S. Centers for Disease Control and Prevention provides more than 15 studies as their basis for recommending face masks. All of them are observational in nature, not randomized controlled trials (RCTs), which are considered the gold standard of scientific research. “In general, observational studies are not only of lower quality than RCTs but also are more likely to be politicized, as they can inject the researcher’s judgment more prominently into the inquiry and lend themselves, far more than RCTs, to finding what one wants to find,” explained Jeffrey Anderson, former director of the Bureau of Justice Statistics, in a review published by City Journal.5 The CDC focused, in particular, on one of the studies — an observational cohort study of two hairstylists at a Missouri beauty salon who tested positive for COVID-19.6 The two stylists developed respiratory symptoms, but continued to see 139 clients for several days until they received positive COVID-19 tests. Both of the stylists wore masks during this time, as did most of the clients. Sixty-seven of the clients ended up getting tested for COVID-19, none of whom tested positive. The other 72 clients did not report any symptoms, which led the CDC to state, “Adherence to the community’s and company’s face-covering policy likely mitigated spread of SARS-CoV-2.”7 But were the masks really the pivotal factor in the seeming lack of transmission at the salon? Anderson wrote:8 “This study has major limitations. For starters, any number of the 72 untested customers could have had Covid-19 but been asymptomatic, or else had symptoms that they chose not to report to the Greene County Health Department, the entity doing the asking. The apparent lack of spread of Covid-19 could have been a result of good ventilation, good hand hygiene, minimal coughing by the stylists, or the fact that stylists generally, as the researchers note, ‘cut hair while clients are facing away from them.’” One of the most important factors limiting the study’s usefulness, however, is its lack of a control group. Would the results have been different if the stylists or clients weren’t wearing masks? Nobody knows. For comparison, Anderson mentioned a scenario at a gym in Virginia, where most people did not wear masks. A trainer tested positive for COVID-19, but none of the 50 gym members who had worked with the trainer got sick. “Clearly, this doesn’t prove that not wearing masks prevents transmission,” Anderson noted,9 yet this is precisely the logic that the CDC used in their support of the beauty salon study. RCTs Cast Doubt on Masks “It’s striking how much the CDC, in marshalling evidence to justify its revised mask guidance, studiously avoids mentioning randomized controlled trials,” Anderson continued. “Mask supporters often claim that we have no choice but to rely on observational studies instead of RCTs, because RCTs cannot tell us whether masks work or not. But what they really mean is that they don’t like what the RCTs show.” Anderson evaluated 14 RCTs conducted worldwide on the effectiveness of masks in reducing respiratory virus transmission. Eleven of them found that masks don’t work to reduce transmission or, worse, are counterproductive and may increase risks. Only three of the studies suggest masks might be useful:10 “… one found that the combination of surgical masks and hand hygiene was less effective than hand hygiene alone, one found that the combination of surgical masks and hand hygiene was less effective than nothing, and one found that cloth masks were less effective than surgical masks.” In one example,11 which claims to be the first RCT of cloth masks, conducted in 2015, 1,607 hospital health care workers were randomized to wear medical masks, cloth masks or a control group, which included mask wearing. The mask was used every shift for four consecutive weeks. Not only were rates of infection significantly higher in those wearing cloth masks compared to medical masks or controls, but both types of masks let particles through — “Penetration of cloth masks by particles was almost 97% and medical masks 44%,” the researchers wrote.12 It wasn’t only that cloth masks weren’t effective; the researchers cautioned against their use, as “moisture retention, reuse of cloth masks and poor filtration may result in increased risk of infection.” In another instance, a review of 13 of the 14 RCTs mentioned above, published in the Cochrane Database of Systematic Reviews, similarly found, “There is uncertainty about the effects of face masks” and “the pooled results of randomized trials did not show a clear reduction in respiratory viral infection with the use of medical/surgical masks during seasonal influenza.”13 The “Danmask-19 Trial,” published November 18, 2020, in the Annals of Internal Medicine,14 found that among mask wearers 1.8% (42 participants) ended up testing positive for SARS-CoV-2, compared to 2.1% (53) among controls. When they removed the people who reported not adhering to the recommendations for use, the results remained the same — 1.8% (40 people), which suggests adherence makes no significant difference. The authors had difficulty getting the study published, as its results question mandatory masking. Anderson added:15 “Meanwhile, the CDC website portrays the Danish RCT (with its 4,800 participants) as being far less relevant or important than the observational study of Missouri hairdressers with no control group, dismissing the former as ‘inconclusive’ and ‘too small’ while praising the latter, amazingly, as ‘showing that wearing a mask prevented the spread of infection’ — when it showed nothing of the sort.” Mask-Triggered Environmental Disaster Is Looming If masks don’t work, the extreme environmental toll they’re taking becomes even more tragic. Writing in BMJ Open, researchers used a model to estimate usage, costs and waste incurred by N95 respirator usage over the first six months of the pandemic in the U.S.16 They found that, for health care workers, using a new N95 respirator for each patient encounter would require 7.41 billion respirators, cost $6.38 billion and generate 84 million kilograms (kg) (92,594 tons) of waste — that’s just over a six-month period and in the U.S. alone. Even if this were cut down to one N95 mask per health care worker per day, it would still require 3.29 billion respirators, cost $2.83 billion and generate 37.22 million kg of waste. An MIT team has developed a reusable N95 mask made from silicone that contains a filter that can be sterilized and reused.17 Study author Giovanni Traverso told MIT News:18 “Our vision was that if we had a reusable system, we could reduce the cost. The majority of disposable masks also have a significant environmental impact, and they take a very long time to degrade. During a pandemic, there’s a priority to protect people from the virus, and certainly that remains a priority, but for the longer term, we have to catch up and do the right thing, and strongly consider and minimize the potential negative impact on the environment.” However, this doesn’t speak to the unfathomable number of disposable masks being discarded daily outside of health care settings. In a study, Swansea University researchers noted that 200 million disposable plastic facemasks are produced in China daily, and “improper and unregulated disposals” have led to a significant plastic pollution problem.19 Most disposable face masks contain three layers — a polyester outer layer, a polypropylene or polystyrene middle layer and an inner layer made of absorbent material such as cotton. Polypropylene is already one of the most problematic plastics, as it’s widely produced and responsible for large waste accumulation in the environment. It’s not only the plastic itself that’s the problem but also the chemicals it contains. When seven disposable facemask brands were submerged in water to simulate what happens with littering when masks end up in waterways, micro- and nanoscale fibers and particles and heavy metals, including lead, antimony and copper, were detected, raising significant environmental and public health concerns.20 Just how many masks are being used and discarded? One estimate suggests 129 billion facemasks are used each month worldwide, while another found that 3.4 million are disposed of daily.21 But once they’re thrown in the trash, they don’t just disappear. To put this into perspective, an Environmental Advances study calculated that one face mask can release 173,000 microfibers daily into the sea.22 The researchers also found that face masks alone may account for an additional 72 to 31,200 tons of microplastic waste ending up in the world’s oceans in 2020. “Action is therefore urgently needed to limit the amount of discarded surgical masks reaching the marine ecosystem,” they wrote.23 Widespread mask mandates are not simply a matter of “wearing one can’t hurt.” This public health policy needs to be immediately reevaluated based on its ineffectiveness and potential for immense harm, both for the people wearing them and the environment being exposed to them.
<urn:uuid:ab2260f2-20d2-4d9c-a557-507595ed1f18>
CC-MAIN-2022-33
https://peterlegyel.wordpress.com/2021/12/20/how-two-hairstylists-changed-our-mask-policy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00404.warc.gz
en
0.961621
2,445
3.265625
3
Looploop1 (lo̅o̅p),USA pronunciation n. - a portion of a cord, ribbon, etc., folded or doubled upon itself so as to leave an opening between the parts. - anything shaped more or less like a loop, as a line drawn on paper, a part of a letter, a part of a path, or a line of motion. - a curved piece or a ring of metal, wood, or the like, used for the insertion of something, as a handle, etc. - See intrauterine device. - a maneuver executed by an airplane in such a manner that the airplane describes a closed curve in a vertical plane. - a circular area at the end of a trolley line, railroad line, etc., where cars turn around. - an arm of a cloverleaf where traffic may turn off or onto a main road or highway. - the part of a vibrating string, column of air or other medium, etc., between two adjacent nodes. - a closed electric or magnetic circuit. - the reiteration of a set of instructions in a routine or program. - a wire, usually of platinum, one end of which is curved to form a loop, used for transferring microorganisms from one medium to another. - a sand bar that encloses or nearly encloses a body of water. - [Figure Skating.]a school figure in which a skater traces a large half circle, a small oval within its arc, and another large half circle to complete the figure while remaining on the same skating edge. - the loop, a group or network of insiders or influential people; inner circle: to be out of the loop on policy decisions. - the Loop, the main business district of Chicago. - throw or knock for a loop, to astonish or upset: Her quitting the project really threw me for a loop. - to form into a loop. - to make a loop in. - to enfold or encircle in or with something arranged in a loop. - to fasten by forming into a loop, or by means of something formed into a loop (often fol. by up): to loop up the new draperies. - to cause (a missile or projectile) to trace a looping or looplike trajectory through the air: to loop a grenade into the building. - to fly (an airplane) in a loop or series of loops. - to construct a closed electric or magnetic circuit. - [Motion Pictures.]to complete by means of looping: We still have to loop the final scenes. - to make or form a loop: The river loops around the two counties. - to move by forming loops, as a measuringworm. - to trace a looping or looplike path through the air: The fly ball looped high in the air. - to perform a loop or series of loops in an airplane. - [Motion Pictures.]to record dialogue, sound effects, etc., onto an existing film track or soundtrack. Inin (in),USA pronunciation prep., adv., adj., n., v., inned, in•ning. - (used to indicate inclusion within space, a place, or limits): walking in the park. - (used to indicate inclusion within something abstract or immaterial): in politics; in the autumn. - (used to indicate inclusion within or occurrence during a period or limit of time): in ancient times; a task done in ten minutes. - (used to indicate limitation or qualification, as of situation, condition, relation, manner, action, etc.): to speak in a whisper; to be similar in appearance. - (used to indicate means): sketched in ink; spoken in French. - (used to indicate motion or direction from outside to a point within) into: Let's go in the house. - (used to indicate transition from one state to another): to break in half. - (used to indicate object or purpose): speaking in honor of the event. - in that, because; inasmuch as: In that you won't have time for supper, let me give you something now. - in or into some place, position, state, relation, etc.: Please come in. - on the inside; - in one's house or office. - in office or power. - in possession or occupancy. - having the turn to play, as in a game. - [Baseball.](of an infielder or outfielder) in a position closer to home plate than usual; short: The third baseman played in, expecting a bunt. - on good terms; in favor: He's in with his boss, but he doubts it will last. - in vogue; in style: He says straw hats will be in this year. - in season: Watermelons will soon be in. - be in for, to be bound to undergo something, esp. a disagreeable experience: We are in for a long speech. - in for it, [Slang.]about to suffer chastisement or unpleasant consequences, esp. of one's own actions or omissions: I forgot our anniversary again, and I'll be in for it now.Also,[Brit.,] for it. - in with, on friendly terms with; familiar or associating with: They are in with all the important people. - located or situated within; internal: the in part of a mechanism. - in favor with advanced or sophisticated people; stylish: the in place to dine; Her new novel is the in book to read this summer. - comprehensible only to a special or ultrasophisticated group: an in joke. included in a favored group. inbound: an in train. - being in power, authority, control, etc.: a member of the in party. - playing the last nine holes of an eighteen-hole golf course (opposed to out): His in score on the second round was 34. - Usually, ins. persons in office or political power (distinguished from outs). - a member of the political party in power: The election made him an in. - pull or influence; a social advantage or connection: He's got an in with the senator. - (in tennis, squash, handball, etc.) a return or service that lands within the in-bounds limits of a court or section of a court (opposed to out). v.t. Brit. [Dial.] - to enclose. Ceilingceil•ing (sē′ling),USA pronunciation n. - the overhead interior surface of a room. - the top limit imposed by law on the amount of money that can be charged or spent or the quantity of goods that can be produced or sold. - the maximum altitude from which the earth can be seen on a particular day, usually equal to the distance between the earth and the base of the lowest cloud bank. - Also called absolute ceiling. the maximum altitude at which a particular aircraft can operate under specified conditions. - the height above ground level of the lowest layer of clouds that cover more than half of the sky. - a lining applied for structural reasons to a framework, esp. in the interior surfaces of a ship or boat. - Also called ceil′ing piece′. [Theat.]the ceiling or top of an interior set, made of cloth, a flat, or two or more flats hinged together. - the act or work of a person who makes or finishes a ceiling. - vaulting, as in a medieval church. - hit the ceiling, [Informal.]to become enraged: When he saw the amount of the bill, he hit the ceiling. Roserose1 (rōz),USA pronunciation n., adj., v., rosed, ros•ing. - any of the wild or cultivated, usually prickly-stemmed, pinnate-leaved, showy-flowered shrubs of the genus Rosa. Cf. rose family. - any of various related or similar plants. - the flower of any such shrub, of a red, pink, white, or yellow color. - the traditional reddish color of this flower, variously a purplish red, pinkish red, or light crimson. - an ornament shaped like or suggesting this flower. - a pink or pinkish-red color in the cheek. - See rose window. - a representation of a wild rose with five petals, usually seeded and barbed in a symmetrical design and used esp. as the cadency mark of a seventh son. - any of various diagrams showing directions radiating from a common center, as a compass card or wind rose. - an obsolete gem style or cut, flat on the bottom and having an upper side with from 12, or fewer, to 32 triangular facets. - a gem with this cut. - a perforated cap or plate, as at the end of a pipe or the spout of a watering pot, to break a flow of water into a spray. - an ornamental plate or socket surrounding the shaft of a doorknob at the face of a door. - a plane polar curve consisting of three or more equal loops that meet at the origin. Equation: r= a sinnθ or r = a cosnθ. - come up roses, [Informal.]to turn out all right; result in success, glory, or profit: Despite setbacks, things should come up roses in the long run. - of the color rose. - for, containing, or growing roses: a rose garden. - scented like a rose. - to make rose-colored. - to flush (the face, cheeks, etc.). Thethe1 (stressed ᵺē; unstressed before a consonant ᵺə; unstressed before a vowel ᵺē),USA pronunciation definite article. - (used, esp. before a noun, with a specifying or particularizing effect, as opposed to the indefinite or generalizing force of the indefinite article a or an): the book you gave me; Come into the house. - (used to mark a proper noun, natural phenomenon, ship, building, time, point of the compass, branch of endeavor, or field of study as something well-known or unique):the sun; the past; the West. - (used with or as part of a title): the Duke of Wellington; the Reverend John Smith. - (used to mark a noun as indicating the best-known, most approved, most important, most satisfying, etc.): the skiing center of the U.S.; If you're going to work hard, now is the time. - (used to mark a noun as being used generically): The dog is a quadruped. - (used in place of a possessive pronoun, to note a part of the body or a personal belonging): He won't be able to play football until the leg mends. - (used before adjectives that are used substantively, to note an individual, a class or number of individuals, or an abstract idea): to visit the sick; from the sublime to the ridiculous. - (used before a modifying adjective to specify or limit its modifying effect): He took the wrong road and drove miles out of his way. - (used to indicate one particular decade of a lifetime or of a century): the sixties; the gay nineties. - (one of many of a class or type, as of a manufactured item, as opposed to an individual one): Did you listen to the radio last night? - enough: He saved until he had the money for a new car. She didn't have the courage to leave. - (used distributively, to note any one separately) for, to, or in each; a or an: at one dollar the pound. Hello there, this photo is about Loop In Ceiling Rose #8 When The Circuit Has Been Isolat Ceiling-rose-old-colours. It is a image/jpeg and the resolution of this attachment is 792 x 594. It's file size is only 10 KB. If You desired to download This attachment to Your computer, you could Click here. You may too download more pictures by clicking the photo below or read more at here: Loop In Ceiling Rose. Is your Loop In Ceiling Rose? I understand first. Toiletries of the torpedo in the back. The medication cabinet was dirty with creams, irregular containers, and gels. The closet under the torpedo was filled in leaks with moves of toilet-paper and everything was not appropriate elsewhere. Begin by contemplating little if even that sounds like more work than you would like to handle. How will you optimize the area you curently have? Among the ideas will be to change the room. Everybody includes a wardrobe there, before chaos is not arranged, but factors only chuck in there. Rather, have you been marking them and considering getting some little storage bins? One of the finest Loop In Ceiling Rose #8 When The Circuit Has Been Isolat Ceiling-rose-old-colours I Have observed lately involves, not remodeling, but simply rethinking your toilet style. You can enter invisible cabinets that present and may store everything from your makeup to some decorative knickknacks when you have an area. Of course if you want to make your toiletries invisible, you're able to always place concealed cabinets and cabinets. Relevant Images of Loop In Ceiling Rose #8 When The Circuit Has Been Isolat Ceiling-rose-old-colours - Blue Light Acne Treatment - Next Chairs For Sale - Crystal Ball Floor Lamp - Desk Led - California Closets Natick - Cost To Hire An Interior Designer - Exterior Motion Sensor Light - How To Put Kitchen Tiles On The Wall - Bathroom Vanity Dimensions Cabinets - Anderson Engineered Hardwood Flooring - Camper Table - Dark Rug - Groups And Periods On The Periodic Table - Capitol Lighting Paramus Nj - Garage Sales Laredo Tx - Deer Feeder Bucket
<urn:uuid:836a19e3-d2ed-4c36-8302-d3fa75ceccbf>
CC-MAIN-2019-22
https://www.hammadsiddiquiblog.com/ceiling-att/2071/loop-in-ceiling-rose-8-when-the-circuit-has-been-isolat-ceiling-rose-old-colours.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259452.84/warc/CC-MAIN-20190526185417-20190526211417-00062.warc.gz
en
0.896427
3,025
2.625
3
Graduating from high school is an exciting time in a teen’s life—they’re getting ready for prom, getting their first car, and preparing to make some pretty big life decisions. And while your teen may be ready for the next step, their savings may not. Whether your kid dreams of going to college, university, or a trade school, post-secondary education is an invaluable learning experience. Getting the schooling they need to take on their future career requires some preparation—both mentally and financially. Luckily, there are a number of options available to both you and your teen that can help them pursue the school of their choice. We share some of the ways to pay for post-secondary education, such as using their RESP; applying for scholarships, government grants, and loans; and ways your kids can earn extra money while studying. - Starting a Registered Education Savings Plan (RESP) early can help you save for your child’s post-secondary education, and you can apply for government top-ups to your child’s fund. - Your teen may be eligible for entrance scholarships when they apply to certain programs, or they can apply for grants, most of which don’t need to be repaid. - The government has a variety of provincial and territorial loans and grants available to students based on financial need. - A student line of credit is an option to access money quickly, and your teen can defer big payments until they graduate. - Internships, co-op placements, and apprenticeships are great ways for teens to gain valuable experience in their field, while being paid. How much will post-secondary studies cost? The average price of tuition for the 2021–22 school year in Canada is between $2,500 and $11,400 a year, depending on the program and school. For an undergraduate degree at a Canadian university or a college, the price tag rings in at around $6,700 per year. But there’s more than just tuition to cover when it comes to going to school. There’s also the cost of living in a student residence or off-campus housing, a meal plan or buying groceries, transportation, textbooks, plus the fun stuff, like socializing with new friends. If you’re not sure how it will all add up, a budget calculator can help you and your teen see big-picture costs. How to pay for post-secondary education in Canada Here are three ways families can help fund post-secondary education in Canada: Maybe your teen has been working part-time or has had summer jobs and now has a decent nest egg in their student bank account. Or maybe you’ve been stashing away their birthday money in a kid’s savings account since they were little. Either way, it’s important to remind your teen that putting aside a little bit every month or year can make a big difference when they have big education goals in mind. Evaluate how much you’ve both put aside to see how much more you need to make your budget work. One way to give your child a head start is to save for their schooling through an RESP, which allows you to earn interest tax-free on up to $50,000 per beneficiary. (You can also apply for top-ups to your yearly contributions from the Canadian Education Savings Grant [CESG] up to a lifetime max of $7,200.) When your child enrolls part-time or full-time in an eligible post-secondary education program, you can start withdrawing money for expenses related to their education, for things such as tuition, transportation, and books, as determined by your RESP provider. Scholarships, grants, and bursaries If you and your teen haven’t saved as much as you’d both hoped, there are scholarships, grants, and bursaries that students can apply for to help cover the difference. The best part about these is that your teen won’t have to pay back the money. Here are a few options: University and college scholarships Your teen may be eligible for entrance scholarships based on merit simply by applying to the university or college of their choice. Even if they’re not eligible, there are many different types of school scholarships available to students Canada-wide, focused on things such as athletic ability, community leadership, or for Indigenous youth. There are many places to search for the best fit for your teen, such as Scholarships Canada. Some non-profits and businesses offer private grants to students. Some are based on academic interests, financial need, or grades, while others support communities such as Black or Indigenous youth. Some of these may require an essay or proof of community service, but it’s worth the effort—private grants can offer them access to the program they want, and the money won’t need to be paid back. How the government helps students pay for post-secondary education The government has a program to help students pay for school: the Canada Student Financial Assistance Program (CSFA Program), which works with the provinces and territories to provide grants and loans. Eligibility varies, but money is available to full- and part-time students, from low- and middle-income families who may have dependents, or who may have permanent disabilities. Provincial grants and loans The CSFA helps eligible students connect with financial options, such as grants and loans for full-time and part-time students. Each province and territory has its own government loan program. For example, the Ontario Student Assistance Program (OSAP) and British Columbia’s StudentAid BC have grants (which don’t need to be repaid) and student loans (which need to be paid back—with interest—once your kid is done school). You can also use the government’s Student Aid Estimator to figure out how much you could receive. Canada Student Grant The Canada Student Grant is an option for full- or part-time students in financial need who are attending a qualifying program, and who have a family income that is below a certain threshold. Full-time students could receive up to $6,000 per year, or $3,600 is available per year for part-time students, depending on their financial need. Canada Apprentice Loan If your kid dreams of becoming an industrial electrician or a carpenter, there are lots of avenues to get financial assistance while they learn the tricks of the trade. The Canada Apprentice Loan is available to cover the cost of technical training for $4,000 per training period, for up to five periods. There are caveats, though: their apprenticeship needs to be with a Red Seal Program. If a student meets all the qualifications and is accepted, the loan could also remain interest-free for up to six years. Apprenticeship Incentive Grant for Women The Apprenticeship Incentive Grant for Women, or AIG-W, is a grant that supports training women in trades where they are traditionally under-represented. If your daughter decides to apprentice under a qualifying Red Seal trade, they can be eligible for a (taxable) grant of $3,000 per level. (Keep in mind that this grant can be received twice throughout their training, but your child can’t apply until they’ve completed the second level of their skilled trade.) How financial institutions can help pay for post-secondary education If you’re considering borrowing to cover the costs of your teen’s schooling, talk to your bank or financial institution about the available options for both you and your teen. Student line of credit A line of credit for students is one way that your teen can borrow the money they need, when they need it, and pay it back when they are done post-secondary school. (Most financial institutions require students to start paying back the principal two years after graduation.) It also allows them the flexibility to use it on the things they need right away—like a new laptop or even a study trip abroad. Just make sure to remind your teen that unlike a student loan from the government that doesn’t accrue interest until they graduate, a student line of credit will have monthly interest payments to keep up with, and the interest rates can change. Plus, they’ll need someone (usually a parent or guardian) to co-sign the loan to guarantee that someone will make the payments if for some reason your teen can’t. Taking out a personal line of credit or bank loan is one way for parents to help pay for their child’s education without affecting their teen’s future financial situation. Plus, it should allow you to access more cash for big tuition payments, quickly. Depending on whether your loan is secured or unsecured, interest rates may vary. There can be additional fees and credit score repercussions, so before you borrow, ensure you can pay it back on the agreed-upon schedule. And don’t let your kids completely off the hook. If you’re taking on a loan for their financial future, they can chip in when they can through part-time work or a summer job. Home Equity Line of Credit (HELOC) A Home Equity Line of Credit (HELOC) is another option for parents who want to cover their kid’s education costs. A HELOC is based on the current value of your home minus your outstanding mortgage balance, so it could be a way to borrow at a lower interest rate. Also, more credit should become available to you again as soon as you pay it off. When borrowing against your home, though, you’ll want to take a good look at your financial situation to make sure it’s the right move, that you’ll be able to pay off the minimum, and how you’ll manage the accumulated debt. How students can pay for post-secondary education while attending school There are other ways for young adults to pay for school and related costs if they need additional cash flow. A part-time job can top up your teen’s bank account, provide flexibility around their class schedules, and be a source of valuable work experience. Some schools have opportunities for on-campus employment—just make sure your future student applies far in advance (when they accept a placement is a good time to look), as sometimes the jobs for the coming year open early (and fill up fast). A side hustle is another way to make money. From selling artwork on social media to tutoring in the evenings and/or on weekends, finding a gig that your teen enjoys (and can get paid for) is a great way to pad their bank account. Co-op work terms or internships Consider a co-op program, where students have a paid work term in an industry in their field. They get hands-on experience alongside an opportunity to network. Internships are another great option. These can take place in summers or during the academic year and may even lead to a future full-time gig. Internships used to have a bad rap for being unpaid (Remember?), but they’re now covered under the Canada Labour Code, so interns will at least be paid minimum wage. Becoming an apprentice, where your young adult can learn a trade, art, or job under the formal supervision of an experienced professional, is another way to get some paid experience and gain valuable networking contacts. Your provincial or territorial employment office will often have resources for applying for apprenticeship roles. Alternatively, check out the Canadian Apprenticeship Forum to see what qualifications will set up your child for success. Signing up for Mydoh is an easy way to help kids and teens learn how to save for school, or manage their money while they’re away from home learning. It’s a great resource for important skills that will help them excel in the real world. Download Mydoh and help build the foundation of financial literacy for your kids and teenagers. This article offers general information only and is not intended as legal, financial or other professional advice. A professional advisor should be consulted regarding your specific situation. While the information presented is believed to be factual and current, its accuracy is not guaranteed and it should not be regarded as a complete analysis of the subjects discussed. All expressions of opinion reflect the judgment of the author(s) as of the date of publication and are subject to change. No endorsement of any third parties or their advice, opinions, information, products or services is expressly given or implied by Royal Bank of Canada or its affiliates.
<urn:uuid:640d94b1-77e0-4f79-9a63-62c3f91b24f2>
CC-MAIN-2022-33
https://www.mydoh.ca/learn/blog/education/how-to-pay-for-university-or-college/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00005.warc.gz
en
0.959112
2,631
2.625
3
On September 4, the day the Allies captured the city of Antwerp, Hitler reinstated Rundstedt as commander in chief in the West. His steady hand would now compound Ramsay’s worst fears as Rundstedt immediately sought to deprive the Allies of port facilities in France and Belgium, thus swinging the tide of war in Germany’s favor. By securing the north and south shores of the Scheldt, while simultaneously defending the English Channel fortresses of Le Havre, Boulogne, Calais, and Dunkirk, Rundstedt would starve the Allies of the logistical support needed for the advance into Germany. This would give Rundstedt time to gather forces to reman the Siegfried Line and frustrate a rapid invasion of Germany. Rundstedt expected Montgomery on September 4 to advance immediately and seal off Walcheren Island and the South Beveland Peninsula from the mainland. If Monty had done so, the German Fifteenth Army would have been trapped and eliminated. The Allied halt enabled Rundstedt to rescue the remains of General Hans von Zangen’s encircled Fifteenth Army under the cover of darkness. A scratch fleet of two ancient Dutch freighters, Rhine river barges, small craft, and even rafts evacuated over 100,000 troops, artillery, vehicles, and even horses across the three-mile mouth of the Scheldt Estuary into the South Beveland Peninsula. The Germans were surprised that the convoy met with no Allied naval force interference. Stiffened by fresh troops, the Germans regrouped around strong positions along both sides of the river. The causeway on South Beveland connecting it to the mainland could be defended by a small number of troops. Across from Beveland, Walcheren Island was very heavily fortified with nearly thirty batteries of powerful coastal guns, from nine-inch to three-inch in caliber, as well as other strongholds. The German navy laid a variety of mines and put other deadly obstacles in place. The ship channel leading to the Port of Antwerp would have to be thoroughly cleared before freighters could use it. As the channel is seventy-three miles long and varies in width from 300 to 1,400 yards, this presented a clearance task of great magnitude and complexity. Port access between Antwerp and the sea was locked up tight. The initial Allied response to this German buildup was insufficient. It began on September 13, nine days after Antwerp’s capture, and included Crerar’s First Canadian Army and the First and Fourth Polish Armored Divisions. Their tanks were largely useless for canal attacks. Canadian infantry support was ineffective. This first attack met with disaster. The Canadians abandoned the initial bridgehead across the Leopold Canal due to heavy German fire. As it was decided that the Canadians needed additional forces, the Scheldt operation was abandoned in favor of clearing French ports. For three additional weeks no opposition was offered to the continued German additional fortification of the estuary. During these critical weeks the Allies’ attention was focused elsewhere. It was placed on the rushed planning, execution, and recovery from Montgomery’s “full-blooded thrust” to the northeast, Operation MARKET GARDEN. A BRIDGE TO NOWHERE Montgomery’s recent rapid advances culminating in the capture of Brussels and Antwerp had created considerable optimism in the Second Army. This lightning drive showed that British armor could match Patton’s tanks. Monty was fixated on bypassing what was left of the German Fifteenth Army and dashing nonstop over the Rhine to the Ruhr and beyond. If he had continued his push on September 4 for about thirty-six hours, the British armor could have raced through almost undefended country between Antwerp and the Rhine. Montgomery’s Operation MARKET GARDEN called for a quick thrust to the Reich through a sixty-mile corridor. The “MARKET” component of the operation would involve the use of the First Airborne Corps comprising the American Eighty-Second and 101st and the British First Airborne Divisions, commanded by the British lieutenant general Frederick Browning. These forces would land at three drop zones running from west to east: Eindhoven (101st US), Nijmegen (Eighty-Second US), and Arnhem (First British). This airborne operation was monumental in scope, deploying about five thousand fighters, bombers, transports, and over 2,500 gliders. This huge air army was deployed in an unprecedented daylight attack complete with their equipment and vehicles. Owing to a shortage of aircraft to carry paratroops, these landings would be conducted over a three-day period, thus giving German defenders advance warning that a major offensive was in progress. These divisions would then link up with the “GARDEN” component, the ground force, the British XXX Corps, and part of Montgomery’s Second Army, led by Lieutenant General Brian Horrocks, which would advance from their present positions into Holland. MARKET GARDEN had two major objectives. First, the British Twenty-First Army with the airborne army was to cross the two branches of the Rhine at Nijmegen and Arnhem. Second, Hodges’s American First Army was to drive on Aachen and reach the Rhine at Cologne. The aim of MARKET GARDEN was an advance beyond the Rhine to surround the Ruhr industrial region. This advance would clear the west bank of the Rhine and outflank the German forces on the Siegfried Line, rendering it useless. Finally, the British could advance from Arnhem and capture the port of Rotterdam. Due to recent Allied successes, optimism was running high. Eisenhower was both intrigued and impressed with Montgomery’s bold, imaginative plan. This was the kind of innovative mass attack he had been looking for. In a September 14 letter to Marshall, Eisenhower was extremely optimistic that MARKET GARDEN would carry the Allies up to and across the Rhine. The daring nature of the MARKET GARDEN operation was strangely out of character for Montgomery. Indeed he was later to admit that MARKET GARDEN was his greatest mistake as a commander. He was well-known for his detailed planning of future operations and was quite successful in staging set-piece battles. However, he had been criticized for unnecessary caution due to his failure to deploy armored divisions in situations where they had the potential to strike rapidly and effectively. Uncharacteristically Montgomery conceived and rushed through the planning of MARKET GARDEN in a matter of weeks. Critically, Montgomery ignored vital intelligence on the feasibility of this operation. Ultra decrypts and reports from the local Dutch resistance forces indicated that two SS panzer divisions had been sent to Arnhem to refit. Also the Fifteenth Panzer Army had been moved into Holland and was well positioned to attack the left of the advancing Allied land forces. The Ninth and Tenth SS Panzer Divisions were fanned out to the north, east, and south of Arnhem. Also deployed around Eindhoven were the thirty thousand paratroops and Luftwaffe troops that formed the core of General Kurt Student’s First Parachute Army. Montgomery’s plan produced a shock wave at his Twenty-First Army Group headquarters. After he received the go-ahead for MARKET GARDEN from Eisenhower on September 10, he outlined the operation on a map for one of Britain’s pioneer airborne experts, Lieutenant General Frederick Browning who would command the operation. The paratroops and glider-borne forces were to secure five major bridges along a sixty-four-mile invasion corridor. They would hold the corridor open until they were relieved by British armored forces. This unsettled Browning. Pointing to Arnhem, he asked Montgomery, “How long will it take the armor to reach us?” Monty answered, “Two days.” Still studying the map, Browning responded, “We can hold it for four. But sir, I think we might be going a bridge too far.” Montgomery did not want to hear it. Other objections followed. The Dutch underground information and Ultra intercepts so worried Major Brian Urquhart, the First Airborne Corps’ intelligence officer, that he called for the information to be confirmed again by British aerial photographs. The air reconnaissance pictures clearly identified numerous German panzers in the Arnhem air drop zones or nearby. Urquhart relayed all of this damaging information to both Eisenhower and Montgomery. Ike was so alarmed that he sent Smith to discuss this with Montgomery, but Monty lightly dismissed it all. Montgomery chose to ignore this potentially cataclysmic information and treated it as a peripheral matter rather than as a reason to cancel MARKET GARDEN. Moreover, he now took extraordinary steps to discredit Urquhart’s intelligence effort. Monty sent a senior staff medical officer, Colonel Arthur Eagger, to confirm reports that Urquhart had become “hysterical.” Urquhart told the medical officer that the intelligence reports made it clear that the proposed MARKET GARDEN operation was “madness.” Eagger immediately diagnosed Urquhart as suffering from exhaustion and sent him on medical leave, thus removing him far from the immediate scene. But the intelligence question would not go away. A distinguished air intelligence officer, Wing Commander Asher Lee, also deeply investigated the Ultra information. His findings were conclusive regarding the presence of substantial German armored units at Arnhem. He personally conveyed his report to Montgomery’s headquarters. But he only was seen by junior staff officers, thus again dismissing the importance of this vital intelligence. General Brian Horrocks, the commander of the XXX Corps in the MARKET GARDEN operation later lamented, “Why did I receive no information about the German formations which were being rushed daily to our front? For me, this has always been the sixty-four-thousand-dollar question.” Elizabeth Coble states, “It is unforgiveable for intelligence of this magnitude to be withheld from subordinate commanders. Without all available intelligence, subordinate commands could not plan and equip their forces properly.” Even before the operation began on September 9, General Dempsey, commander of the Second Army, had grave doubts, as he wrote in his diary, It is clear that the enemy is bringing up all the reinforcements he can get his hands on for the defense of the ALBERT Canal, and that he appreciates the importance of the area ARNHEM-NIJMEGAN. It looks as though he is going to do all he can to hold it. This being the case, any question of a rapid advance to the North-East seems unlikely…. Are we right to direct Second Army to ARNHEM? We do not know if Dempsey challenged Montgomery on the intelligence issue. However, it is important to note that this was the only diary entry from the onset of the Normandy invasion in which he questioned an order. Eisenhower also was receiving further information casting doubt on the soundness of this operation. Bradley warned him that the terrain for Montgomery’s drive was unsuitable for a rapid advance as the Netherlands had numerous canals and waterways that the Germans would defend. Bradley later stated, “My opposition…was not confined to the British diversion of effort. I feared also that Monty in his eagerness to get around Model’s flank might have underestimated German capabilities on the lower Rhine.” Eisenhower, however, did not exercise his authority to cancel MARKET GARDEN. Smith lamented, “Having authorized him [Montgomery] to proceed, Eisenhower did not feel he could now instruct him not to do so, even though the head of his intelligence staff predicted a defeat.” Brooke, the one man who might have convinced Montgomery to cancel MARKET GARDEN, had left London with Churchill and the other chiefs of staff on the morning of September 5 for the Quebec Conference, five days before Eisenhower authorized Monty to proceed with MARKET GARDEN. He did not return until September 23 by which time the operation was being wound down. It is interesting to note that MARKET GARDEN is not mentioned in his war diary. MARKET GARDEN is another example of Montgomery’s inflexibility in altering his plans. He also failed to provide subordinate commanders with relevant intelligence. On D-Day, invasion commanders did not know that the Twenty-First Panzer Division was deployed to oppose their seizure of Caen. The failure to seize Caen seriously impeded the progress of the Normandy campaign and cost lives. This time it would take even more lives. On September 17, MARKET GARDEN operations were launched with a massive airborne assault. German general Kurt Student, paratroop commander, and his chief of staff stood on the balcony of Student’s cottage in Holland as this massive air armada went past. Student remembered they “simply stared, stunned, like fools…everywhere we looked, we saw chain of planes—fighters, troop carriers and cargo planes—flying over us…. This mighty spectacle deeply impressed me.” Montgomery’s plan relied on the accelerated progress of Horrocks’s XXX Corps’ tank and infantry forces down one main highway to link up the invasion corridor and relieve the paratroop divisions. The progress of the Allied armies was slower than expected, as they encountered a fierce and well-conducted German resistance. As a result, it took longer than expected to capture their first objective, Eindhoven. The Germans fought stoutly for Nijmegen and its vitally important bridge, which eventually fell to a determined attack by infantry units of the Guards Armored Division. The road to MARKET GARDEN’s final objective, Arnhem, was theoretically open. A defect in the planning was the task given to the land forces to advance over the polders (fields lying close to or below sea level) that were too marshy to support the weight of tanks. Once the Nijmegen bridge was secured the tanks and infantry of the Guards Armored Division were forced to advance in single file on the road to Arnhem, meeting determined German resistance along the way. This check of the XXX Corps’ advance doomed the First Airborne Division at Arnhem. They valiantly defended their isolated position for ten days rather than the two that Montgomery had planned. On September 25, they were forced to surrender. About six thousand Allied soldiers were captured, half of them wounded; 1,174 died. At night 1,900 paratroopers were evacuated across the lower Rhine. The British First Airborne and Polish First Parachute Brigade were effectively destroyed as fighting units. Total Allied MARKET GARDEN killed, wounded, and missing exceeded seven thousand, five thousand more than on D-Day. Afterward, Montgomery insisted that the operation had been a justifiable risk. Although Montgomery described himself as “bitterly disappointed” by Arnhem and admitting mistakes were made for which he bore responsibility, he proclaimed in his memoirs, “I remain MARKET GARDEN’s unrepentant advocate,” noting, “In my—prejudiced—view, if the operation had been properly backed from its inception…it would have succeeded in spite of my mistakes.” Military historians, however, have roundly criticized many facets of the MARKET GARDEN operation. Nigel Hamilton, Montgomery’s chief biographer, stated that in every military dimension, “strategic, tactical, intelligence, logistical, personal…it was…a complete disaster…[a road] that led nowhere.” Arnhem was a completely avoidable disaster. Norman Davies concludes that “it was not an act of responsible generalship.” Alun Chalfont agrees that “Arnhem…showed a serious error of judgement on Montgomery’s part.” The lightly armed airborne troops were no match for the heavily equipped SS panzer corps. Funneling the British supporting armor down narrow roads through marshland was a disaster waiting to happen. David Bennett offers this summary judgment of MARKET GARDEN: “The truth was that the operation was too ambitious. In launching it with a tenuous supply line, no reserve build-up of supplies, a shortage of ground transport, and both VIII and XII Corps [support units to XXX Corps] unready at the start, Montgomery’s professionalism had deserted him.” At this juncture in the campaign, everyone on the Allied side was frustrated, angry, and depressed. The MARKET GARDEN debacle had cured the earlier “victory disease.” “There was a change of mood after Arnhem,” a British captain remembers. “One just didn’t feel the same. We were getting rather tired.” Prince Bernhard of the Netherlands lamented, “My country can never again afford the luxury of another Montgomery success.” Clearly Eisenhower had backed the wrong offensive. He had not backed Patton’s southern thrust to the Ruhr while forcing Montgomery to seize both banks of the Scheldt Estuary to open up the Port of Antwerp. Long after the war Eisenhower admitted, “I not only approved MARKET GARDEN, I insisted upon it. What we needed was a bridgehead over the Rhine. If that could be accomplished, I was quite willing to wait on all other operations. What this action proved was that the idea of ‘one full-blooded thrust’ to Berlin was silly.” For both Eisenhower and Montgomery, Arnhem was a major mistake that served to diminish them. For Eisenhower, it was a vain attempt to masterfully end the war in 1944 as the successful supreme commander of a difficult Allied coalition. As for Montgomery, it ended his dream of being the commander of a victorious British-led drive to Berlin, securing the restoration of British prestige, and marking the capstone of his military reputation. Only Montgomery’s unrestrained ego remained, which continued to plague Eisenhower to the war’s last act and even afterward. Alan Moorehead summed up the situation well when he wrote, “For the Allied army now no hopeful alternatives remained. There was only one way—the hard way. The immediate essential for all this was the opening up of Antwerp.”
<urn:uuid:6eee6254-9c9a-4781-b655-849a5e060f6f>
CC-MAIN-2019-22
https://weaponsandwarfare.com/2017/10/08/the-tide-of-war-shifts-i/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257731.70/warc/CC-MAIN-20190524184553-20190524210553-00502.warc.gz
en
0.972671
3,835
3.5625
4
If you don't remember your password, you can reset it by entering your email address and clicking the Reset Password button. You will then receive an email that contains a secure link for resetting your password If the address matches a valid account an email will be sent to __email__ with instructions for resetting your password ]. In addition, the “geographic mosaic” theory of coevolution proposes that structured populations of interacting species can produce selection mosaics manifested as coevolutionary “hot spots” and “cold spots” [ ]. Here, we tested whether a steep, habitat-specific cline in the frequency of sexual reproduction in a freshwater snail could be explained by the existence of hot spots and cold spots for coevolving parasites. We found that the shallow-water margins of lakes, where sexual reproduction is most common, are coevolutionary hot spots, and that deeper habitats are cold spots. These results are consistent with the geographic mosaic theory, in that the intensity of selection resulting from biological interactions can vary sharply in space. The results also support the Red Queen hypothesis, in that sex is associated with coevolutionary hot spots for virulent parasites. Because asexual lineages have higher per capita rates of reproduction than sexual lineages, asexual organisms should rapidly replace sexual conspecifics in mixed populations unless there are countervailing ecological or genetic factors that greatly erode the reproductive advantage of asexual reproduction [ ]. Presently, the reasons for the persistence of outcrossing in cases where sexual individuals face competition with asexual clones remain hotly debated. One possibility for the long-term maintenance of sexual individuals is that the genetically diverse offspring produced by sexual females are more difficult targets for coevolving parasites than common, genetically homogenous asexual genotypes [ ]. This leads to the expectation under the Red Queen hypothesis that sexual reproduction should be associated with coevolutionary “hot spots,” and asexual reproduction with coevolutionary “cold spots.” We tested this idea with the freshwater snail Potamopyrgus antipodarum. The prosobranch snail Potamopyrgus antipodarum is a valuable organism for scrutinizing the different ecological and genetic theories for the maintenance of sexual reproduction. This snail is common in freshwater habitats throughout New Zealand, wherein populations are composed of either obligately asexual females or a mixture of obligately sexual and obligately asexual forms [ ]. In a well-studied population of these snails (Lake Alexandrina, South Island, New Zealand), a common trematode parasite (Microphallus sp.) was found to have a higher infection rate in shallow-water snails, which are more likely to be sexual [ ]. One possible explanation, tested here, is that sex is favored in the shallow water because the shallow-water habitat is a coevolutionary hot spot. This hypothesis is based on the foraging behavior of waterfowl, which serve as the definitive host in the parasite's life cycle. Because the parasite larvae must be ingested by ducks to complete their life cycle and because ducks do not forage in deep habitats, parasite recycling and reciprocal selection (hot spots) might be confined to shallow-water habitats [ ]. Here, we contrast this explanation with the “coevolutionary hot-spot” hypothesis. The hot-spot hypothesis predicts that, although shallow- and deep-water snails might differ in susceptibility to sympatric parasites, they should not differ in their susceptibility to allopatric, noncoevolving parasites. In contrast, the inherent-susceptibility hypothesis predicts that shallow-water snails will be more susceptible to parasites, independent of whether the parasites are drawn from sympatric or allopatric populations. We exposed snails from shallow and deep habitats in two lakes (Lake Alexandrina and Lake Kaniere, South Island, New Zealand) to three sources of Microphallus sp. parasite (Lake Alexandrina, Lake Kaniere, and Lake Poerua, South Island, New Zealand) collected from the natural, definitive avian hosts in the field. Two parasite sources were allopatric and one sympatric to each snail population. We chose these populations because they have a shallow-deep cline in male frequency (Figure 2) and parasite infection. Male frequency is strongly positively correlated with the frequency of diploid, sexual individuals [ The results were consistent with the coevolutionary hot-spot hypothesis. Sympatric parasites were significantly more infectious to shallow-water snails than to deep-water snails (Table 1; Table 2; Figures 3A and 3B), suggesting that parasites are locally adapted to host subpopulations within a lake (i.e., at hot spots). In contrast, shallow- and deep-water snails within the same lake were equally susceptible to allopatric infection (Table 2; Figure 3), thereby falsifying the alternative explanation that the mixed population in shallow water is inherently more susceptible to infection. Interestingly, infection frequencies of sympatric parasites on deep-water snails and allopatric snails were comparable (Table 2). This result suggests that deep-water snails are just as “foreign” to sympatric parasites as allopatric snails and that snail resistance is structured among habitats, with little migration between habitats. Finally, by comparing the infection frequencies for shallow-water snails between lakes, we also found parasite local adaptation on a larger geographic scale (Table 2), consistent with previous results [ In summary, our results confirm that shallow-water habitats are coevolutionary hot spots in two different lake populations of a freshwater snail. The results also show that the transition from a hot spot in shallow water to a cold spot in deeper water can occur on the scale of meters in contiguous host populations. Ultimately, sexual reproduction in the snail is more common in the shallow-water hot spots, which is consistent with the Red Queen hypothesis. Potamopyrgus antipodarum is the first intermediate host for over a dozen species of digenetic trematodes, of which Microphallus sp. is the most common parasite in lake habitats. This parasite produces encysted larvae (i.e., metacercariae) in the snail host after three months under laboratory conditions, and the snails become sterile. The parasite develops to the hermaphroditic adult stage after ingestion by the definitive host (waterfowl and wading birds) and produces eggs within several days. These eggs are then passed into the environment with bird feces, and snails are exposed to infection after ingesting the eggs. Interpopulation genetic analysis of Microphallus has shown that populations of this parasite are from a single species [ We collected snails from two habitat types (shallow and deep water) at Lake Alexandrina and Lake Kaniere. Both lakes are mesotrophic, clear-water lakes in which Potamopyrgus populations are composed of sexual and asexual individuals. Shallow-water habitat type was sampled from two different sites in each lake primarily from willow roots, moss, and rocks (0–1 m depth). Deep-water habitat was sampled from seven sites at Lake Alexandrina and one site at Lake Kaniere from macrophytes (mainly Elodea canadensis) and fine sand (4–7 m depth). Parasites were collected directly from the feces of avian final hosts along the margin of Lake Alexandrina, Lake Kaniere, and Lake Poerua. A previous experimental test for a coevolutionary hot spot in Lake Alexandrina found that inherent susceptibility of mixed populations could not be excluded as an explanation for the relationship between male frequency and parasite infection [ ]. However, the previous experiment included snails from only one site and used a substitute final host (mice) to collect parasites. In the present experiment, we used parasites from the natural vector and collected snail sources from multiple sites within each habitat from two lakes. Thus, we were able to include a wider variety of host and parasite genotypes and eliminate any site-specific effects, capturing a more realistic picture of coevolutionary outcomes among natural habitats. Experimental exposure of Potamopyrgus snails to parasites was conducted at the Edward Percival Field Station (University of Canterbury) in Kaikoura, New Zealand in January 2009. For each parasite treatment, we set up five replicate containers (1 l water) of 70 snails from each host source. In addition to the three parasite treatments, we exposed snails (three replicates) to control bird feces from Lake Poerua, which were boiled to kill any parasites. Parasite eggs were obtained by repeatedly washing the feces with water for several days and then filtering the mixture through 1 mm mesh. Parasite eggs from each source population were divided equally among the replicate snail containers within each parasite treatment, and snails were exposed for 12 days; the water was changed daily. The snails were then transported to Indiana University, where they were fed on Spirulina, and the water was changed regularly. Ninety days postexposure, we dissected all snails and recorded their sex (male or female), infection status, and parasite developmental stage (early germinal balls develop into blastocercariae, which then develop into metacercariae). We limited our analyses to laboratory-infected snails (early-stage infections). We are able to discern laboratory infections from field infections in that the latter are generally mature metacercariae. Our statistical analysis regarding male frequency was conducted with SPSS 16.0 on untransformed data, where the dependent variable was male frequency for the 18 replicates of each host source. t tests were performed on male frequencies between shallow- and deep-water habitats within the same lake (Figure 2). Our statistical analyses regarding experimental infection were performed on arcsine-transformed infection frequencies to homogenize variances among replicates (Levene's test, F11,48 = 0.937, p = 0.514). The control treatments did not yield early-stage infections, and these data were thus omitted from analyses. Means and standard errors of the mean of experimental infection frequencies are presented in Table 1 and Figure 3. We used standard factorial analyses of variance (ANOVAs) to test for differences in infection frequency among treatment groups. Host and parasite source were treated as fixed factors (Table 2). Because we used natural parasite sources, we were unable to control for parasite dose. Thus, we could only statistically compare infection frequencies among host sources within parasite treatments. Orthogonal contrasts were used to compare the infection frequencies across habitats within each parasite source (Table 2; Figure 3). As an alternative analysis of the same data, we fitted a generalized linear mixed model (GLMM) with a logit link function and binomial errors applying the “glmer” function available in the R statistical package. In this model, the error degrees of freedom were defined by number of individual snails, and replicates where snails were held were included as a nested random term. Between these two alternative analyses, the main interaction term between the fixed factors remained statistically significant, and the GLMM analysis gave qualitatively the same results as the factorial ANOVA (χ2 = 56.02, df = 6, p < 0.001). We thank J. van Berkel (University of Canterbury) for providing laboratory facilities in New Zealand, M. Neiman and K. Theisen for field assistance, and A. Lahr for assistance in maintaining the experiment at Indiana University. We also thank J. Thompson for helpful comments on the manuscript. This study was supported by the US National Science Foundation (J.J. and C.M.L.), a Swiss National Science Foundation grant (J.J.), the Centre of Excellence in Evolution Research from the Academy of Finland (J.J.), and a Natural Science and Engineering Research Council of Canada graduate fellowship (K.C.K.).
<urn:uuid:ee73457d-6385-433b-8906-af2a22f4c766>
CC-MAIN-2022-33
https://www.cell.com/current-biology/fulltext/S0960-9822(09)01379-7
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00406.warc.gz
en
0.943809
2,502
2.84375
3
Breast cancer is one of the most common cancer diagnoses in the United States. The National Cancer Institute estimates that 252,710 American women will be diagnosed with breast cancer and 40,610 will die from the disease in 2017.1 For the majority (62%) of women with breast cancer, the disease is confined to the breast, and the 5-year survival approaches 100%.1 However, for women with metastatic disease, the likelihood of survival at 5 years drops to 27%.1 Approximately 2 of 3 women with breast cancer have tumor cells that express estrogen and progesterone receptors.2 Patients with these hormone receptor (HR)-positive cancers are most often treated with hormone therapy. Depending on whether they are pre- or postmenopausal, women with advanced breast cancer may receive aromatase inhibitors, such as letrozole, anastrozole, and exemestane, or other estrogen-blocking drugs, such as toremifene, fulvestrant, and tamoxifen.2 Because postmenopausal women with estrogen receptor–positive breast cancer can live with their disease for several years, treatments that maximize efficacy and minimize toxicity are crucial. Recent clinical trials of combination therapies for women with HR-positive breast cancer have included antiestrogens paired with aromatase inhibitors, as well as aromatase inhibitors paired with targeted agents.3 In 2015, palbociclib (Ibrance; Pfizer), the first inhibitor of cyclin-dependent kinase (CDK) 4 and 6 (CDK4/CDK6), received accelerated approval for advanced breast cancer in postmenopausal women.4,5 Among patients who received palbociclib plus letrozole (Femara; Novartis), progression-free survival (PFS) was extended to 20.2 months compared with 10.2 months with letrozole alone.4,5 Ribociclib Approved for Advanced Breast Cancer On March 13, 2017, the US Food and Drug Administration (FDA) approved ribociclib (Kisqali; Novartis), an oral CDK4/CDK6 inhibitor, in combination with letrozole for the treatment of postmenopausal women with HR-positive, HER2-negative advanced breast cancer.6,7 The FDA approval of ribociclib was based on results of a randomized study showing that ribociclib plus letrozole significantly improves PFS and overall response rate compared with letrozole plus placebo.6-8 In May 2017, the FDA approved the Kisqali Femara Co-Pack, a single package that includes ribociclib and letrozole.8 Mechanism of Action Ribociclib is an oral inhibitor of the CDK4/CDK6 pathway. Upon binding to D-cyclins, these kinases are activated to affect signaling pathways that lead to cell-cycle progression and cell proliferation.7 Dosing and Administration Ribociclib is taken orally in combination with letrozole. The recommended starting dose of ribociclib is 600 mg (three 200-mg oral tablets) for 21 days, followed by 7 days without treatment, resulting in a complete cycle of 28 days; letrozole 2.5 mg is taken once daily throughout this 28-day cycle. Ribociclib and letrozole should be administered at approximately the same time each day, preferably in the morning.7 Ribociclib can be taken with or without food; tablets should not be chewed, crushed, or split before swallowing.7 The MONALEESA-2 Pivotal Clinical Trial The efficacy and safety of ribociclib combined with letrozole were demonstrated in the randomized, double-blind, placebo-controlled clinical trial, MONALEESA-2.6,9 This multicenter study enrolled 668 postmenopausal women with HR-positive, HER2-negative advanced breast cancer.9 Patients were randomized in a 1:1 ratio to ribociclib (600 mg daily for 21 days in a 28-day cycle) plus letrozole 2.5 mg daily or to placebo plus letrozole 2.5 mg daily, and were stratified according to the presence of liver and/or lung metastases.9 The major efficacy outcome measure for the study was investigator-assessed PFS using Response Evaluation Criteria in Solid Tumors v1.1.9 All patients had an Eastern Cooperative Oncology Group performance status 0 or 1.9 At the interim analysis, PFS was not reached with ribociclib plus letrozole versus 14.7 months with placebo plus letrozole (Table).7,9 PFS and overall response rate results were consistent across patient subgroups. The median exposure to ribociclib plus letrozole was 13 months, and the median follow-up from randomization was 15.3 months.9 After 12 months, the PFS rate was 72.8% (95% confidence interval [CI], 67.3-77.6) in the ribociclib arm versus 60.9% (95% CI, 55.1-66.2) in the placebo arm. After 18 months, the PFS rate was 63.0% and 42.2%, respectively.9 Dose reductions because of adverse events were required in 45% of patients in the ribociclib arm. In addition, 7% of patients in the ribociclib arm discontinued treatment because of adverse events versus 2% of patients in the letrozole plus placebo arm.9 The most common events leading to treatment discontinuation were increased alanine aminotransferase (4%) or aspartate aminotransferase (3%), and vomiting (2%). Common adverse events (frequency ≥20%) were neutropenia, nausea, fatigue, diarrhea, leukopenia, alopecia, vomiting, constipation, headache, and back pain. The most common grade 3 or 4 adverse events were neutropenia, leukopenia, abnormal liver function tests, lymphopenia, and vomiting.9 Ribociclib has no contraindications.7 Use in Specific Populations Based on animal studies, ribociclib can cause fetal harm when administered to a pregnant woman; no data are available in humans. Because of the potential risk, pregnant women should avoid using ribociclib.7 Warnings and Precautions Neutropenia has been observed in clinical trials of ribociclib.7 Ribociclib can prolong the QT interval in a concentration-dependent manner.7 Electrocardiograms should be repeated at approximately day 14 of the first cycle, and at the beginning of the second cycle, and as clinically indicated. Serum electrolytes should be assessed before the initiation of treatment, at the beginning of the first 6 cycles, and as clinically indicated. Any abnormality should be corrected before initiating ribociclib. Use of ribociclib with drugs known to prolong the QTc (corrected QT) interval and/or strong cytochrome P3A inhibitors should be avoided.7 Liver function tests should be performed before initiation of ribociclib, every 2 weeks for the first 2 cycles, at the beginning of each of the subsequent 4 cycles, and as clinically indicated.7 Women of reproductive potential should use effective contraception during therapy with ribociclib, and for ≥3 weeks after the last dose.7 Ribociclib is the second CDK4/CDK6 inhibitor to receive FDA approval. In the clinical trial that led to its approval by the FDA, adding ribociclib to letrozole significantly extended the PFS duration and improved the overall response rate in women with HR-positive, HER2-negative advanced breast cancer. - National Cancer Institute SEER program. Cancer stat facts: female breast cancer. http://seer.cancer.gov/statfacts/html/breast.html. Accessed June 15, 2017. - American Cancer Society. Hormone therapy for breast cancer. Revised August 18, 2016. www.cancer.org/cancer/breastcancer/detailedguide/breast-cancer-treating-hormone-therapy. Accessed June 15, 2017. - Inman S. Three experts examine the ER-positive treatment landscape. OncLive. February 26, 2015. www.onclive.com/conference-coverage/mbcc-2015/three-experts-examine-the-er-positive-treatment-landscape. Accessed June 23, 2017. - US Food and Drug Administration. FDA approves Ibrance for postmenopausal women with advanced breast cancer. Press release. February 3, 2015. www.fda.gov/newsevents/newsroom/pressannouncements/ucm432871.htm. Accessed June 23, 2017. - Ibrance (palbociclib) capsules [prescribing information]. New York, NY: Pfizer; March 2017. - US Food and Drug Administration. Ribociclib (Kisqali). March 13, 2017. www.fda.gov/drugs/informationondrugs/approveddrugs/ucm546438.htm. Accessed June 15, 2017. - Kisqali (ribociclib) tablets [prescribing information]. East Hanover, NJ: Novartis; March 2017. - Toich L. Kisqali Femara co-packaging approved for breast cancer treatment. Pharmacy Times. May 9, 2017. www.pharmacytimes.com/news/kisqali-femara-copackaging-approved-for-breast-cancer-treatment. Accessed June 23, 2017. - Hortobagyi GN, Stemmer SM, Burris HA, et al. Ribociclib as first-line therapy for HR-positive, advanced breast cancer. N Engl J Med. 2016;375:1738-1748.
<urn:uuid:d7f71b14-f2bc-4330-ab02-3c489744cfbf>
CC-MAIN-2019-22
http://www.theoncologypharmacist.com/2018-third-annual-oncology-guide-to-new-fda-approvals/17451-kisqali-ribociclib-second-cdk4-cdk6-inhibitor-approved-for-postmenopausal-women-with-hr-positive-her2-negative-advanced-breast-cancer
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256797.20/warc/CC-MAIN-20190522103253-20190522125253-00182.warc.gz
en
0.906642
2,121
2.90625
3
Gold is an extraordinary precious metal that has been valued dating back to prehistoric times. It’s been mined for over 5,000 years and discovered on every continent. It carries different names, from “Excrements of Gods” by the Aztecs and “Sweat of the Sun” by the Inca. In Ancient Greece, the Golden Fleece of the gods captured the imaginations of citizens. But, what is gold? Where did it come from? And how did it evolve into the modern asset it is today? What Is Gold? The scientific definition of gold leads us to the periodic table of chemical elements. On the periodic table, gold is atomic number 79. Its symbol? Au, which stands for aurum in Latin. Gold is a very soft metal with a melting point of 1,948 degrees Fahrenheit (1,064 degrees Celsius). You are most familiar with it due to its yellow color and shine. There are other color variations of gold, such as white gold and rose gold, but the gold is mixed with other metals to obtain a different color. For example, white gold is a mixture of gold and silver or palladium, whereas rose gold contains copper. There are even silver coins with gold coating. Don’t be fooled by fools gold! Fools gold is a form of pyrite. It has similar features to gold, including the color, but it has a rough surface. It contains crystals too! Gold Purity and Fineness Purity and fineness determine gold’s value and the price of gold on the market. Both are typically stamped or hallmarked on the gold for awareness and credibility by the refiner. Ever heard of a karat? The karat represents how pure the gold is. It ranges on a scale from 0 - 24. The higher the level of purity, or karat, the more valuable, soft, and pure the gold is. If it's mint gold, it's likely going to be very high if not the highest number on the scale. As you move to the lower end of the scale, additional alloys, such as electrum, are mixed with the gold making it stronger and at risk of corrosion or tarnish. Whether purchasing gold bullion or gold dust, you want that magic 24 on the assay report. A system used to measure the fineness of gold is known as the Millesimal Fineness system. This system ranks gold in parts per thousand and is represented by the following numbers: 333, 375, 417, 583, 585, 625, 750, 833, 875, 916, 958, and 999. Numbers outside of those listed here assume that the metal is not gold but another alloy. Gold fineness is a huge determining factor in setting gold prices. Where Does Gold Come From? Gold is found beneath our feet, if you know where to look. Today, gold is found in Nevada and Alaska in United States, Russia, Australia, Canada, and South Africa. South Africa holds a record with gold, leading with 40% of it mined within its rocks over time. The first record of humans discovering gold dates to 4,000 B.C. in Eastern Europe. But Ancient Egypt was the first civilization to begin using gold as a medium of exchange with coinage. Great Britain and the U.S. followed suit. By 1792, the U.S. had passed the Coinage Act, enacting a bi-metal currency standard for the country (this was done away with during the 1970s in favor of fiat). In the 1700s, Brazil had the highest rate of gold production of any country in the world. In 1869, the largest gold nugget recorded was discovered in Victoria, Australia. It was named “Welcome Stranger,” weighing approximately 172 pounds in solid form. Later in 1980, another gold nugget was found weighing 60 pounds and is on display in Las Vegas. This one is known as Hand of Faith and is the largest known in existence today. The biggest holders of gold are the U.S., Germany, Italy, France, and Russia. China and Switzerland are close behind. Gold Mining and Refining Gold mining is a process. First, there is the exploration and discovery of gold. This is a time-consuming stage since you can’t mine something if it isn’t there. Once the gold is discovered, the development stage begins. Teams come together to determine a plan and prepare for construction. Just like any other type of construction site, permits and licenses permits and licenses are obtained before digging or drilling. This is another stage that requires patience and time. It can take several years to receive approval to move onto the next step, the operation. Ready to dig? Great! The operation stage is where the excavating takes place. As the ore gets removed from the mine, it is handled and processed from the rock into a metallic alloy, known as a doré. The operation takes approximately 10-30 years, representing the life cycle of the mine. The deepest gold mine known in the world is the Mponeng Mine, located in South Africa. Temperatures in the mine reach up to 140 degrees Fahrenheit. Ice is pumped into the mine to keep the temperature tolerable. As to its depth, imagine traveling on an elevator that takes more than an hour to reach the bottom of the mine? The mine has a vertical depth of two and a half miles below the Earth’s surface. For a visual, compare that to ten Empire State Buildings! What happens to the gold after it has been mined? The majority ends up at a refinery. The refinery is responsible for melting the gold and molding it to its future shape or form. Why Is Gold Rare? Gold is one of the rarest metals on Earth. It’s rarer than diamonds. To obtain commercial quantities, there is a tremendous commitment to digging. To understand its rarity, you need to have a perspective of its weight. The Weight of Gold Let’s put it into perspective. One ton of rock equals six grams of gold. Therefore, to obtain one ounce of gold, you need to dig approximately five tons of rock! Are you up for the challenge? Gold is rare because of its physical make-up. It is a descendant of the stars resting inside them. Through a process known as nuclear fusion, gold is created. Going back into history, nuclear fusion began with The Big Bang Theory. It is a process that would mature over many years when two neutron stars would collide. The collision created the solar system we know today, including Earth. Fun fact: Gold can be found at the Earth’s core, locked away under a few thousand miles of rock. What Is Gold Used For? One of the first uses of gold dates back to 4,000 B.C. It was used to fashion jewelry. Some jewelry was state of the art. Others varied in style. It served as a sign of grandeur and royalty. Gold is used as currency, taking the shape of gold coins or gold bars, but it has other functions. For example, jewelers use it to craft jewelry. Dentists use it to build crowns for teeth, and it is even edible. Did you know that gold is a conductor of heat and electricity? That’s right. Gold is not thought of as a novelty in today’s world. Because gold is pliable and soft enough to shape, it is easily flattened into sheets or converted into wires. It’s a reliable choice when it comes to electronics too. Look around you. If you have a computer, a microwave, or a phone, then you have a small quantity of gold as well. Gold reserves also play an important role in reserve management at central banks and keeping economies stable. Gold As Currency Gold progressively made its way from just a rock to form of currency. Around 1,500 BC, it embarked on its journey. It was recognized as a form of trade in the Middle East. A coin known as the Shekel was born. The Shekel was not pure gold but two-thirds gold and one-third silver. Fast forward to 1,091 BC, China legalizes gold as a form of money, shaping it into little squares. Later in 500 BC King Croesus of Lydia circulated gold coins throughout many countries, long before the introduction of paper money. By the late 19th century, countries were looking for ways to provide stable exchange rates and promotion of trade. They fixed the value of their paper currencies based on the quantity of gold they held, using a variable exchange rate. This system became known as The Gold Standard. The Gold Standard lasted for nearly 100 years. People were encouraged to turn in their paper currency for gold until the World Wars began and the Great Depression followed. In July of 1944, another system took flight. Forty-four nations came together, creating a new international monetary system known as the Bretton Woods System. Bretton Woods is a place, not a person. It is located in New Hampshire. This system implemented a fixed exchange rate where the value of gold would determine the basis for the dollar. This system was later converted to the World Bank Group and International Monetary Fund (IMF). In 1971, President Nixon announced that the US Government would end the fixed value. By 1976, the Gold Standard ended. Too many years of inflation isolated the value of the dollar from gold. The systems were replaced by fiat money, meaning money not backed by a commodity such as gold or silver. The Bottom Line Gold remains a popular, valuable, sought-out precious metal. It is found all over the world, buried deep under the Earth’s surface. Mining gold is a process that can take many years from start to finish. Because of this, gold holds its value. Its uses vary from being special and symbolic to being a form of financial investment. Gold remains on the rise and is a great investment. Have you had an interest in investing in gold but couldn’t upfront the cost? Options are available to you at Acre Gold. Visit our webpage today for more information.
<urn:uuid:64123cca-fc12-4561-8ef1-50f814354511>
CC-MAIN-2022-33
https://getacregold.com/fr/blogs/news/the-history-of-gold
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00005.warc.gz
en
0.960949
2,122
3.078125
3
EZRA-NEHEMIAH AND THE PROMISES The exiling of the Jews to Babylon by King Nebuchadnezzar led to a profound change and return to Yahwehism. This was due primarily to the instructions Jeremiah the prophet had sent in a letter. “This is what the Lord Almighty, the God of Israel, says to all those I carried into exile from Jerusalem to Babylon, ‘Built houses and settle down; plant gardens and eat what they produce. Marry and have sons and daughters; find wives for your sons and give your daughters in marriage, so that they may have sons and daughters. Increase in number there; do not decrease. Also, seek the peace and prosperity of the city to which I have carried you into exile. Pray to the Lord for it, because if it prospers, you too will prosper.’ Yes, this is what the Lord Almighty, the God of Israel says, ‘Do not let the prophets and diviners among you deceive you. Do not listen to the dreams they encourage you to have. They are prophesying lies to you in my name. I have not sent them,’ declares the Lord” (Jeremiah 29:4-9). Jeremiah’s Letter also impacted the Babylonians. The faithful listened to Jeremiah and became good and productive citizens. A Jewish girl by the name of Esther became a queen and her uncle Mordecai the king’s first minister and counselor. King Cyrus became familiar with the Hebrew prophets and saw himself as a servant of God fulfilling the Promises to the Jews. Ezra, a scribe and a trusted servant of Cyrus may have introduced the king to the prediction of Jeremiah, regarding the return and rebuilding of Jerusalem and the temple. “In the first year of Cyrus, king of Persia, in order to fulfill the word of the Lord spoken by Jeremiah, the Lord moved the heart of Cyrus the king of Persia to make this proclamation in writing throughout his realm.” It read, “The Lord, the God of heaven, has given me all the kingdoms of the earth and he has appointed me to build a temple for him at Jerusalem in Judah. Anyone of his people among you – may his God be with him, and let him go up to Jerusalem in Judah and build the temple of the Lord, the God of Israel, the God who is in Jerusalem. And the people of any place where survivors may now be living are to provide him with silver and gold, with goods and livestock, and with freewill offerings for the temple of God in Jerusalem” (Ezra 1:1-4). Jeremiah had no doubt what the Lord was promising He would do for his people that would obey His instructions. “When seventy years are completed for Babylon, I will come to you and fulfill my gracious promise to bring you back to this place. For I know the plans I have for you,” declares the Lord, “plans to prosper you and not to harm you, plans to give you hope and a future. Then you will call upon me and come and pray to me, and I will listen to you. You will seek me and you will find me when you seek me with all your heart. I will be found by you,” declares the Lord, “and will bring you back from captivity. I will gather you from all the nations and places where I have banished you,” declares the Lord, “and will bring you back to the place from which I carried you into exile” (Jeremiah 29:10-14). The exile was intended to free the Jews from their earthly entanglement with the world in a completely ungodly setting. It took three and one half generations to rebuild a people that would seek the God of their fathers and learn to live by His Laws. Not only did the new followers of God change, but they also became missionaries to their captors. They treated their captors as friends and trusted them with their sons and daughters. They shared their produce from their gardens. Imagine what an influence on faith in Yahweh Daniel, Shadrach, Meshach and Abednego had on the natives (Daniel 3:24-30; 6). These men taught their captors to respect their God. King Darius proclaimed publicly, “I issue this decree that in every part of my kingdom people must fear and revere the God of Daniel. For He is a living God and he endures forever; his kingdom will not be destroyed, his dominion will never end. He rescues and he saves; he performs signs and wonders in the heavens and on the earth. He rescued Daniel from the power of the lions” (Daniel 6:25-27). God did work in mysterious ways to keep His Promises to man and the world alive through strangers. Ezra and Nehemiah did not exactly do what they had promised to the kings that actually initiated the return of the exiles. The Persian kings gave no orders regarding the rebuilding of the wall and Jerusalem. King Cyrus’ decree was to rebuild the temple and not establish another independent nation. When the returning exiles began to rebuild the wall, the local residents complained to the Persian kings but by then they faced threats from the west and could not sent an army to stop the Jews from re-establishing themselves. Nehemiah gambled and succeeded. A third kind of a kingdom came into being that combined all three offices of king, prophet and priest into one. These leaders gave the impression that God was in charge, but in reality it was their interpretation of what God wanted. They completely rejected Jeremiah’s instructions of merging with their captives. God had sent them to Babylon, a world empire where they could expand his influence on humanity. But racist nationalists like Ezrah, Nehemiah, Mordecai, Zerubbabel, and many others brought God back to Judah. The Jews were not willing to share their God with the world. Jesus was the first to the break the ice and let a stream of water flood the world. These leaders lacked the understanding of a Gamaliel who advised the Sanhedrin, “Leave these men (disciples) alone! Let them go! For if their purpose or activity is of human origin, it will fail. But if it is from God, you will not be able to stop these men; you will only find yourselves fighting against God” (Acts 5:38-39). Of course, these returning missionaries from Babylon believed they were doing God’s bidding. Cyrus, Darius and Artaxerxes took Jeremiah serious and began to send those Jewish exiles that wanted to leave back to Judea after the seventy years. They were to return home and rebuilt the temple in Jerusalem to honor the God of the Jews that had shown himself superior to all the other gods. Those who returned under Jerubbabel, Joshua, Ezrah, and Nehemiah became rigid legalists and not a light to the nations. They became a separatist society. They dissolved all mixed marriages, broke up families and stranded children without support. The sacrifices and offerings were restored and no foreigners were allowed to join the new community. It became a strictly Levitical society headed by a high priest. No Davidic King or Messiah would even dare to raise his head, and when “One” finally appeared; namely, Jesus the Christ, He was crucified. For some five hundred years, the Promised Land was the object of contention among foreign invaders. And whenever the people of the Promises had some breathing room, they returned to a priestly kind of legalism that became known as Judaism. Divine approval for the rebuilding of the temple and the restoration of the Law and the sacrifices came from the prophets Haggai and Zechariah. These spokesmen for God also gave credence to the non-Davidic leadership of Zerubbabel and to the priestly head of Joshua. Their zeal for the temple services and sacrifices overshadowed the meager social reform attempted by Nehemiah. It also put a heavy additional tax-burden on the people who were already destitute due to foreign exploitation. Zechariah the prophet quickly realized that the entire restoration project was misdirected. The word of the Lord stated, “administer true justice; show mercy and compassion to one another. Do not oppress the widow or the fatherless, the alien or the poor. In your hearts do not think evil of each other” (Zechariah 7:9-10). “These are the things you are to do: speak the truth to each other, and render true and sound judgment in your courts; do not plot evil against your neighbor, and do not love to swear falsely. I hate all this,” declares the Lord (Zechariah 8:16-17). The “apple of his eye” was to be an influence to the nations and not an exclusionist society, “Shout and be glad, O Daughter of Zion. For I am coming, and I will live among you,” declares the Lord. “Many nations will be joined with the Lord in that day and will become my people. I will live among you and you know that the Lord Almighty has sent me to you. The Lord will inherit Judah as his portion in the holy land and will again choose Jerusalem. Be still before the Lord, all mankind, because he has roused himself from his holy dwelling” (Zechariah 2:10-13). “In those days ten men from all languages and nations will take firm hold of one Jew by the edge of his robe and say, ‘Let us go with you, because we have heard that God is with you'” (Zechariah 8:23). That day has yet to come. Not even Jesus the Christ could usher it in. The Romans did open up Jerusalem and Judea to the world. On Pentecost present were “Parthians, Medes and Elamites; residents of Mesopotamia, Judea and Capadocia, Pontus and Asia, Phrygia and Pamphylia, Egypt and the parts of Libya near Cyrene; visitors from Rome; Cretans and Arabs. They came to worship the Hebrew God in the great white temple Herod had built, but the Jewish leaders kept God locked up. He broke out and left the temple for good on the day Christ Jesus was crucified (Matthew 27:50-53).
<urn:uuid:9a8135f0-ad8a-4675-ae02-87f04d237d49>
CC-MAIN-2022-33
https://stopandthink.kolke.com/2013/11/10/gods-promises-to-man-and-the-world-22/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00401.warc.gz
en
0.975517
2,180
2.703125
3
Nowadays the home chef is faced with an ever-increasing array of choices when it comes to choosing a cooking oil when preparing fried foods. But to the healthy eating advocate, which types of oil are the most healthy — or at a minimum, which ones should we avoid? Oils all have the same purpose during cooking, that is to increase surface area of the food in contact with the heat, and to produce a crispy layer on the surface of the food by means of a reaction called the Maillard effect. This crispy layer enhances taste, texture, and is one of the many reasons we love fried foods. In addition, cooking oil provides a protective barrier to your foods, which will prevent them from drying out when exposed to the high temperatures in your air fryer. Criteria for a Healthy Cooking Oil Each type of oil comes from a different source, however, and can have vastly different nutritional properties. But what are the main criteria in determining which oils are healthy and which are not? It turns out that there are essentially four main criteria: |Oil Health Overview| |Monosaturated Fatty Acids (MUFAs)||considered to be healthy dietary fats unlike saturated or transfats. We should be striving to eat foods that contain unsaturated fat.| |Polyunsaturated Fatty Acids (PUFAs)||the "Omega" fats that are present in the oil. The health effects depend on the proportion of Omega-3 (good in moderate amounts) to Omega-6 (research generally showing it's bad for us). The downside of PUFAs is that they are sensitive to heat, so when used for cooking, many of the health benefits are lost.| |Calories||high in all types of oil; however, some are higher than others. High-calorie foods cause weight gain if eaten in excess.| |Other Benefits||can be found in various types of oil by virtue of the parent plant they are derived from and will be considered in the analysis of each.| Types of Cooking Oil We are going to look at three of the most popular cooking oils used by home chefs today. These oils are all readily available in urban markets and each has readily available information and/or studies documenting their health benefits. We are going to look at the following oils: - Olive Oil - Vegetable Oils (i.e. Canola, soybean, corn, sunflower, etc.) - Avocado Oil - Coconut Oil - Peanut Oil - Sesame Oil Next to vegetable oil, Olive oil is the most commonly used type of cooking oil used in Western countries. It is made by means of pressing the fruit of the olive tree (olives!). Qualitatively it’s believed that olive oil is quite healthy due to the general healthiness of mediterranean people, who are known to consume olive oil on a daily basis. Following are the health guidelines for olive oil: - Olive oil is very high in Omega fatty acids, however the highest percentage is Omega-9 (oleic acid). The more beneficial Omega-3 acid is present though in very small quantities however. - For maximum health-effect, only certified Extra-Virgin Olive Oil (EVOO) should be used. Non-extra-virgin oils have a higher oleic acid (Omega-9) content which has been shown to decrease the anti-inflammatory benefits of olive oil. Stay away from “refined” olive oils, as this oil has had most of the healthy benefits stripped away through the refining process. - Some components of olive oil such as oleocanthal, squalene, and lignin’s have promise in reducing the risk of cancer. - One tablespoon of Olive oil has a total fat composition of 13.5g: 9.8g MUFAs, 1.4g PUFAs (the majority being oleic acid), and 2.1g saturated fat. - One tablespoon of olive oil contains 119 calories. Vegetable Oil (Canola) Vegetable oil is the most common household cooking oil in use today. It’s somewhat of a generic term however and may actually consist of plant-based oils such as canola (the most common), corn, soybean, sunflower, etc. Due to its prevalence, vegetable oil is also among the least expensive. Following are the health guidelines for vegetable oil: - Vegetable oils are produced almost exclusively by chemical processes which use chemicals to extract the oil from the plant and then must be stripped out. A widely believed concern related to this fact is that chemical residue remains in the oil and actually causes detrimental health effects. - One tablespoon of canola oil has a total fat composition of 14g: 9g MUFAs, 4g PUFAs in a 3:1 ratio of Omega-6 vs. Omega-3, 1g of saturated fat. - One tablespoon of canola oil contains 124 calories. Avocado oil has surged in popularity over the past few years due in large part to its perceived health benefits. Avocado oil is produced by pressing the avocado fruit, which is a naturally fatty fruit native to Mexico but grown in other warm climates. Following are the health guidelines for avocado oil: - Avocado oil is very high in monounsaturated fats and vitamin E. It has also been shown to increase the absorption of beneficial carotenoids in the body. - Avocado oil has a PUFA content very similar to olive oil, where the majority is made up of oleic acid (>70%) and a poor MUFA ratio of 13:1 for Omega-6 vs. Omega-3 fats. - Avocado oil has been shown to have an extremely high ability to eliminate free radicals in the body. - It also carries many of the same nutritional characteristics of the fruit itself such as a high potassium content rivalling bananas, as well as other micronutrients such as lutein, magnesium, folate, choline, glutathione, and phytosterols. - One tablespoon of avocado oil has a total fat composition of 14g: 9.9g MUFAs, 1.9g PUFAs, and 1.6g saturated fat. - One tablespoon of avocado oil contains 124 calories. From claims of beauty enhancement to weightloss, the hype over coconut oil has spiked in recent years, making it a popular cooking oil used in conjunction with diets, like Keto, Paleo, and the Whole 30. However, the jury is still out on whether or not this oil, pressed from the white meat of the coconut, is really good for you. The following are the health guidelines for coconut oil: - Coconut oil increases healthy (HDL) cholesterol.However, it is also 90 percent saturated fat, which raises your level of unhealthy (LDL) cholesterol. - Other benefits include controlling blood sugar, improving skin tone and texture, preventing liver disease, and reducing stress. - While the majority of coconut oil’s calories are from saturated fat, research has determined that coconut oil’s saturated fat is made up of medium-chain tri-glycerides (MCTs) your body may handle better than other fat sources. - While coconut oil contains a higher level of saturated fat than other oils, it has fewer calories, which may be healthier. - Like most oils, coconut oil does have several health benefits when used sparingly. But it’s never a good idea to over-indulge in foods high in calories and saturated fat. This great-tasting oil has been a favorite in the restaurant industry for years due to its suitability for frying at high temperatures. In addition, peanut oil, like the legume it comes from, is high in monounsaturated fats and low in saturated fats and triglycerides. Naturally trans-fat free, peanut oil has many health benefits when used correctly. The following are the health guidelines for peanut oil: - High in monounsaturated fats that are beneficial to health, peanut oil is also low enough in saturated fats that it has not been found to impact heart health when consumed in moderation. - Peanut oil is packed full of vitamins an antioxidants, Vitamin E, and phytosterols, all of which are beneficial to cardiovascular health. - While peanut oil is similar to vegetable oil with its health benefits, it is important to note that many people avoid this oil due to the risk of allergic reactions. Most often used in Asian cooking, sesame oil has a mild nutty flavor perfect for stir frying. Often called the Queen of Oils, sesame oil has several health benefits and is low in cholesterol-raising polyunsaturated fats. Like all oils, despite its benefits, sesame oil should be used sparingly as a part of a balanced diet. The following are the health guidelines for sesame oil: - Sesame oil contains 120 calories, 13.6 grams of fat per tablespoon, which is comparable to olive oil. With only 1.9 grams of fat from the calories, Sesame oil is a healthy oil when consumed in moderation. - Sesame oil is also high in monounsaturated fats and low in polyunsaturated fats, which is good news for your cholesterol. - Other benefits of sesame oil include Omega-3 Fatty Acids, which benefit your heart, regulate blood pressure, and may prevent diabetes. - When it comes to vitamins and nutrients, while Sesame oil does contain small amounts of Vitamin K, other oils, like olive oil contain more nutrients. Which Oils are Best for my Air Fryer? While many of the above listed oils are good for your health, you must also consider which oils are best for use in your air fryer. Because your air fryer is most effective when using a high temperature setting, you must also use oils with a high burning point when cooking foods at temperatures above 325 degrees. When considering health benefits and burning point, Airfrying.net recommends using the following oils in your air fryer: Best Oils for your Air Fryer |Avocado Oil||Burning point of 520 degrees F| |Extra Light Olive Oil||Burning point of 468 degrees F| |Peanut Oil||Burning point of 440 degrees F| |Sesame Oil||Burning point of 450 degrees F| For a more comprehensive review of which oils are best for your air fryer, see our article. While much of the decision comes down to personal choice, both olive oil and avocado oil have very similar characteristics and have proven health benefits. Vegetable oil should potentially be avoided, as well as non-virgin olive oils due to the potential for unwanted trace chemicals. Avocado oil has slightly less saturated fat than olive oil as well as a host of other nutritional benefits and is my personal preference. With that said, it is also important to use the oils that are both best for your health and for your air fryer.
<urn:uuid:0a1650b1-63b5-43d9-9480-f95e427c5ff9>
CC-MAIN-2019-22
https://airfrying.net/what-type-of-cooking-oil-is-the-most-healthy/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256724.28/warc/CC-MAIN-20190522022933-20190522044933-00422.warc.gz
en
0.956584
2,290
2.953125
3
Balance training, so players move from technique to real situations, even if the technique isn’t perfect. Use challenges to see what they can achieve, not what they can’t. Greg Cooper, Utah Warriors head coach explains how he does this. MORE Breaking the rules to build better learning How do you build on the players’ understanding of what they already know without confusing them and losing what they’ve previously learned? By Sarah Cottingham, Educational Neuroscience MA with Dan Cottrell. Let’s say you start the season with a plan to improve passing from the base of a ruck. You might have players who’ve been doing that for a long time, but they have a weak hand, or you want to develop other players who can do this skill. Now, you want to develop that skill. How does learning science explain how to make those developments work effectively, and not confuse the players in the meantime? Confuse the players? You don’t want to blur their memories of the original skill, so, when that’s the best outcome, they’ve forgotten how to use it. Our question is, therefore: What are the best conditions for helping players build on what they know? We will look at updating “memory” through a process of reconsolidation and what this might mean for coaching your players. If our memories are going to serve us well (that is, make accurate predictions), they need to stay relevant. This means they need to update when the environment suggests updating is necessary. What are we talking about when we say updating memory? Updating is just another way of saying we are changing what we know, i.e., learning. For our purposes here: memory updating = learning. For example, with the pass from the base of the ruck, you have told the players to “sweep” the ball from the ground and towards the intended target. That’s a simple enough start. But we’ve been passing to a static target, probably around about the same distance away every time. Now the player needs to pass to a moving target and perhaps the ball is blocked by a foot or leg too. The initial “memory” is the first set-up. The memory now needs updating because the environment has changed. How do we do this effectively? CONSOLIDATION AND RECONSOLIDATION Let’s start with the initial memory – the sweeping motion. New information begins life as a fragile memory trace. Over time and with repeated access and usage, it becomes less fragile and more stable. The process of stabilising memory is called consolidation. Consolidation is storing memory in a more permanent form. Let’s say you introduce it in week one of training. In the next three training sessions, the players practise the sweeping motion of the pass from the ground. You consolidate the memory. After week three, you (and the players you hope) know they need to have more than one way to pass from the base of a ruck. How do we go about updating what we know? When you reactivate a memory, you may make it fragile again. This means (under some circumstances) you can alter it: strengthen, weaken, build upon, distort. In other words, you can change your knowledge and understanding. And with time, the memory restabilises again. This is why the process of updating memory is called re-consolidation. I like a plasticine analogy here: Imagine a piece of plasticine is a schema (network) of consolidated memories. When you roll the plasticine in your palms it becomes soft and malleable, capable of merging with another piece of plasticine. This is like memory when it’s reactivated. Reactivation may destabilise memory again, making it malleable and prone to changes such as adding related knowledge. When reactivation ceases, the memory restabilises – just like when plasticine is left alone, it hardens again. In our passing scenario, the original set-up was the network of consolidated memories where the players knew the feel of the skill: the sweeping motion of the pass. By challenging the players to think about the different ways the ball might be presented or that the receiver might be moving, we are reactivating and therefore destabilising the memory. They might adjust their set-up and find a new solution. If they now remember their original solution and their new solution, then we have a good outcome. It’s even stronger if they know how they found the solution. CONDITIONS FOR UPDATING MEMORY However, reactivating memories may not be the only necessary condition for reconsolidation. Reconsolidation is pretty labour intensive for the brain. If all it took to update memory was reactivation, our brains would update all the time. Logically, our brain only updates memories if the information it is experiencing in the environment is different from what is expected. Another way of saying this is that our current schema (networks of consolidated knowledge) lead us to make predictions about what will happen. If incoming information mismatches a prediction, we experience a prediction error. A prediction error tells our brain it needs to update. In training scenarios, we need to create variability in our exercises. For example, with the pass away from a ruck, where will the first receiver take the pass? Will they be moving, standing still, how far away, what angle? Initially, we have built a sweeping-motion pass from the ground, with the passer understanding the best foot positions, ways to hold the ball and the motion of the hands, arms and body. Once that memory has been consolidated, then we can mismatch a prediction. The receiver isn’t in the same place and the passer must adjust. As a general rule then, reactivation + mismatch may lead to reconsolidation and updating. You may wonder if there is a point at which memories cease to update. In other words, does reconsolidation ever end? The answer seems to be no. So long as the memories continue to be activated and the environment is not exactly the same as predicted, updating could happen. This is good news for coaches: the opportunity is always there to build upon what players know. TWO WAYS TO TRAIN (1) Reactivate and create mismatch The concept of reconsolidation appears to highlight two necessary criteria: reactivation and mismatch. First, reactivation. In simple terms, this can be done through building new skills onto previous skills, and understanding why each fits together. For example, “We have our basic passing set-up. Let’s adjust it for a moving receiver. Why do we need to do that?” The most obvious usage of this on the pitch is corrective feedback. Players need to see the gap between what they thought was right and what the answer actually is. This mismatch supports updating. This mismatch is especially pronounced for incorrect answers a player had a lot of confidence in. Why? Because high confidence = greater prediction error when they find out the right answer. Greater prediction error = better updating. In a sense, we might be setting up a training scenario in which the player might fail when they thought they might achieve success. We need to manage that carefully, but if you have an environment where failure is seen as part of a positive learning process, then this should work well. We may also be able to alert players to incoming mismatches when we introduce new material too: Show players that what they are about to learn is related to, but different to (i.e. extends upon) what they already know. “We normally set up like this for the pass, but we are going to change our set-up to match the conditions.” Van Kesteren and Meeter call this operating at an ‘optimal “distance” from the schema’. They relate this to the concept of desirable difficulties: Desirable difficulties describe learning conditions that make it harder for the learner to perform well initially, yet increase learning over the longer term (Bjork, 1994). Retrieval practice is a good example. Initially, it is harder for pupils to retrieve information than to re-read it. Retrieval often leads to decreased performance in the short term. But over the long term, retention is better for retrieved than restudied material (Roediger & Karpicke, 2006). What’s the desirable difficulty in creating mismatch? In pointing out the difference between what players know and the new material is introduced, players need to think to connect their prior knowledge to the new material. How might this be achieved? “We’ve worked on passing to a static receiver. How about if the receiver is moving? How do we change the pass? Let’s look at what we can do instead.” Supporting players to understand how what they are being taught relates to what they already know and yet differs, could help create a sense of mismatch. Furthermore, we tend to be more curious to learn new information if we think we already know something about it. And curiosity may provide a boost to learning. Therefore, communicating to players – a) you know something about the new information I’m about to coach you, but b) you don’t know everything about it… could be a good recipe for piquing curiosity. (2) BUILD ON STURDY FOUNDATIONS You can only reliably build upon study foundations. This means building on consolidated knowledge because this knowledge is stable. What does this mean for coaches? We can’t introduce too much in one lesson. For example, if we introduce new information AND try to get the players to understand a conflicting idea in the same session, this may result in confusion. The new knowledge may need to consolidate first before we introduce conflicting ideas. For example, teaching players a new skill AND how to do it differently in another situation might be too confusing. They need time to consolidate the skill first before learning how to use it flexibly. The sweeping pass works if there are no obstacles in the way of the pass. The power and pace of the pass needs to be adjusted if the receiver is moving. You can’t do both of those in the same session. You need to focus on one, consolidate it, and then the other. RULES AND BREAKING THEM This reminds us of the stages and characteristics of expertise: Novice learners need rules. Novices don’t have the cognitive capacity or knowledge to flex these rules. Think of the new coach who sticks rigidly to their session plan when they ought to change course in response to players’ answers. Only once you know the rules can you learn how to break them. Sequence learning to build on consolidated knowledge. Consolidation takes time and usually rest/sleep. Too much in one lesson is likely to lead to confusion. Memory: make accurate predictions. “I pass with a sweeping motion”. Memory updating: changing what we know, otherwise known as learning. “I need to pass differently if the path from the ground is blocked.” Consolidation: storing a memory in a more permanent form. “Through practice, I feel comfortable passing with a sweeping motion”. Reconsolidation: the process of updating the memory. Destabilising a previous memory, often to alter or strengthen it, before it undergoes consolidation again. “I can pass from the ground, with both a sweeping motion, and, additionally, by picking the ball up and moving towards the target with my body”. Mismatch: using variability in training to mess with the predictions. This can only be done once the original memory (prediction) is consolidated. Bjork, R.A. (1994). Memory and metamemory considerations in the training of humanbeings. In J. Metcalfe and A. Shimamura (Eds.), Metacognition: Knowing about knowing (pp.185-205). Cambridge, MA: MIT Press. Cited in Bjork, R. A., & Bjork, E. L. (2020). Desirable difficulties in theory and practice. Journal of Applied research in Memory and Cognition, 9 (4), 475-479. van Kesteren, M. T. R., & Meeter, M. (2020). How to optimize knowledge construction in the brain. npj Science of Learning, 5(1), 1-7. Thanks to Greg Mannion, Academy Coach with Leicester Tigers for reviewing this article. Find out more about Sarah’s learning adventures and for further references to this work in particular, visit overpractised.com.
<urn:uuid:39c2409d-7cb2-45c9-ba66-41db4b90ba6e>
CC-MAIN-2022-33
https://www.rugbycoachweekly.net/rugby-coaching/breaking-the-rules-to-build-better-learning/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00005.warc.gz
en
0.938152
2,715
3.34375
3
Below is a fairly comprehensive list of terms used in church collected over years for confirmation and other courses. If you cant find something e-mail us! ALB A white or off-white full length garment worn by clergy, readers and servers during the celebration of the Holy Communion. ABLUTIONS The ritual cleaning of the sacred vessels after distribution of Holy Communion. ABSOLUTION The words with which the Priest pronounces the forgiveness of sins. Only those ordained to the priesthood may pronounce an absolution. ADVENT. The season during which the church looks forward, in a spirit of penitence, to the coming of Christ the King in his Kingdom in power. During Advent, the church also prepares to keep the holy festival of the birth of Jesus at Christmas. The season includes four Sundays and extends from ADVENT SUNDAY (the Sunday nearest to the feast of St Andrew, 30 November) to CHRISTMAS EVE. AGNUS DEI The prayer, "Lamb of God who takes away the sin of the world etc" or the modem version "Jesus Lamb of God etc" said before the Communion. (from the Latin for Lamb of God). ALTAR A table of wood or stone at which the priest presides at the Holy Communion. It is called an altar because in the Holy Communion we remember the perfect sacrifice Jesus made by his death on the cross. ALTAR RAIL A rail separating the SANCTUARY from the rest of the church ANGLICAN COMMUNION The World-wide "Anglican Communion" (Churches deriving from the Church of England across the world) is divided into PROVINCES each of which has its own ARCHBISHOP. The Church of England is part of the Anglican Communion and has two Provinces, those of Canterbury and York. The Archbishop of Canterbury is considered to be the senior of the two Archbishops "Primate of All England". Each Province is divided into dioceses. There are forty-two dioceses in England. Each diocese is under the care of a BISHOP, who may have assistant Bishops known as SUFFRAGAN Bishops (from Latin, suffraganeus, assisting, supporting). Each diocese is divided into PARISHES, each under the care of a PARISH PRIEST, who may be known as a VICAR, RECTOR, or PRIEST-IN-CHARGE, depending on the particular history or current situation of that parish. A number of parishes may be linked together under the care of a priest . We are part of a team and so we have a Team Rector. APOCRYPHA Fourteen books of pre-New Testament writings not included in the Hebrew bible, but found in the Greek Old Testament, the bible used by the early church. Discarded by the Protestants at the Reformation, but present in some versions of the Bible. AUMBRY A recess or cupboard, for keeping the consecrated host and wine for use in house communions. A light is usually kept burning in front of the aumbry. All three of our churches have an Aumbry BAPTISM The ceremony in which a person is initiated into the Christian church, as a child or an adult. The baptised person is washed symbolically, usually with water poured on to the forehead as a sign that (s)he is accepted and sealed by God with the Holy Spirit to represent Christ to the world. BENEDICTION A blessing. Also called Benediction of the Blessed Sacrament, it is a service consisting of prayers, and a blessing of the congregation by moving in the form of a cross the ciborium or monstrance containing the Host. BENEDICTUS "Blessed is he who comes" sung after the Sanctus during Communion. Also a canticle of prophecy sung by Zechariah (Luke 1:68-79). BOOK OF COMMON PRAYER. The book of liturgical worship first issued in 1549, revised 1552, 1559 and finally in 1662 and still an important foundation for Church of England worship, belief and practice. There were further revisions in 1928. BURSE A square pocket or case, in which the corporal is kept when not in use. CASSOCK A full-length robe, black for clergy and readers, black or some other dark colour for servers, and choristers. A bishop's cassock is often purple, although it can be black. Some Cathedrals have special coloured cassocks (e.g Hereford) and Chaplains to the Queen wear red. CHRISTMASTIDE It lasts twelve days (the twelve days of Christmas!) and leads to the feast of the EPIPHANY. CASSOCK ALB The cassock alb is a relatively modern garment and is a combination of the traditional cassock and alb. It developedin the 1970s as a convenient undergarment worn by clergy and as an alternative to the alb for deacons and acolytes. CHASUBLE A priestly vestment worn by the President at the Holy Communion. It is an oval or oblong garment, without sleeves, which goes over the head of the wearer and is open at the sides. The stole and chasuble are usually made from the same fabric. COPE A type of cloak worn by the priest in processions and at solemn functions, including weddings. It is semi-circular when open, has no shaping to fit the shoulders and is fastened in the front by a clasp. A cope has a flat hood. Copes are frequently ornate. COTTA A short white garment reaching to just below the waist, with a square neck and full, short sleeves. It is worn over a cassock by some clergy and sometimes by servers. CHALICE A cup of silver, pottery for holding the wine consecrated at the Holy Communion. CHALICE ASSISTANTS (sometimes called EUCHARISTIC MINISTERS) are authorised by the bishop, after training, to assist the priest to administer the consecrated bread and wine at the Holy Communion and to take Holy Communion to the housebound. They are licensed to exercise their ministry in a specific parish for a specific period of time. CHANCEL (where there are often choir stalls); and a SANCTUARY containing the high altar, at the very top of the church. CHRISTMAS TO CANDLEMASS Commemorates the birth of Jesus and his revealing to the nations. During the season of Christmas to Candlemas, the colour used in church (see below) is WHITE. Christmas Day, of course, is on 25th December and CANDLEMASS (The Presentation of Christ in the Temple) falls on 2nd February. Within this five/ six week season there are two smaller seasons: epiphany and the baptism of Christ. CHURCH A building dedicated for public worship. Churches may be of different sizes, shapes and styles but thy often have a NAVE in which the people assemble; CHURCHWARDENS Each church usually has two churchwardens.Churchwardens are elected by residents of the parish together with non-residents who are on the church electoral roll. Church wardens are commissioned by the Bishop and responsible to him for the good order and running of the church and its property. CIBORIUM A vessel with a lid for holding consecrated Altar breads. COLLECT A short prayer, usually of one sentence, which collects or summarises the petitions of the day. There are set collects for every Sunday and festival of the year. COMMON WORSHIP The revised forms of liturgical worship for the Church of England introduced in 2000 as a supplement to the Book of Common Prayer. CONFIRMATION A strengthening of a Christian's spiritual life by the gift of the Holy Spirit, bestowed through the laying on of the hands of a bishop. Confirmation completes the Christian initiation begun at baptism. CREDENCE TABLE. A table at the side of the Altar on which the bread, wine and water to be used at the Holy Communion are placed. CREED (or an AFFIRMATION OF FAITH) A summary of the beliefs of Christians. There are two main creeds, the NICENE CREED, (drawn up at the Council of Nicea, 325A.D.), used at the Holy Communion, and the APOSTLES CREED not drawn up the by Apostles, but of earlier origin than the Nicene creed. The Apostles creed is said at Matins and Evensong. Other Affirmations of Faith, often based on Bible texts are now used during Common Worship Communions. CRUCIFER The processional cross is carried by the crucifer. CRUCIFIX A cross on which a figure of Jesus is hanging. When the figure of Jesus is portrayed as a triumphant king, It is called a CHRISTUS REX (Christ the King) CRUETS The flasks which contain the wine and water used at the Holy Communion. DOCTRINE The beliefs and ways of the Church of England is grounded in the Holy Scriptures, and in such teachings of the ancient Fathers and Councils of the Church as are "agreeable to the said Scriptures". In particular such doctrine is to be found in the "Book of Common Prayer" (1662), the "Thirty-nine Articles of Religion" (which are listed in the Book of Common Prayer), and the "Ordinal" (which is the order of service for the ordination (the 'making') of bishop's, priests and deacons (see below). EASTERTIDE commemorates Christ's joyful resurrection (Colour: WHITE). It begins after sunset on EASTER EVE and lasts for 50 days until PENTECOST (colour: RED; also called WHITSUN or WHITSUNDAY). On the fortieth day after EASTER the church celebrates THE ASCENSION of Jesus into heaven. ELECTORAL ROLL The list of the people eligible to vote at the annual church meeting. All parishioners may be on the roll, whether or not they attend church, and all non-parishioners who regularly attend the church. ELEMENTS The bread, wine and water used for the Holy Communion. EPISTLE All the books of the NEW TESTAMENT, except the four GOSPELS, the ACTS OF THE APOSTLES and REVELATION. Epistles are letters to and from members of the early church (Greek word for letter). EUCHARIST One of the names given to the sacrament of HOLY COMMUNION or THE LORD'S SUPPER or THE MASS. (Eucharist comes from the Greek word meaning thanksgiving). EVENSONG A service of praise and the proclamation of the word of God for the evening time. FONT the receptacle, traditionally of stone, for baptismal water. GENUFLECTION A temporary bending of one knee, usually in acknowledgement of respect for the Blessed Sacrament. GLORIA The hymn of praise, "Glory be to God on high" said or sung near the CORPORAL A white linen cloth spread on the Altar upon which the bread and wine are consecrated at the Holy Communion. GRADUAL The hymn sung before the Gospel in the Holy Communion. (From the Latin, gradus, step, as it was sung at the altar steps). HANGINGS The fabric coverings which may hang from the book rest in the pulpit and in front of the altar. The colours vary with the liturgical seasons. HOST The consecrated Altar breads and wafers. (from the Latin, hostia,, meaning a victim). IHS Three Greek capitals, equivalent to IES the first three letters of the Greek word for Jesus; said also to be the initials of Jesus hominum Salvator; "Jesus Saviour of Men". INRI Initials of the Latin version of the accusation over the head of Jesus on the cross, Jesus Nazarenus Rex Judaeorum, (Jesus of Nazareth King of the Jews). INTROIT The sentence of scripture said, at the entrance of the ministers at the Holy Communion (from the Latin for entrance). KYRIES (pronounced Kyri-es) The prayer "Lord have mercy, Christ have mercy, Lord have mercy" (from the Greek Kyrie eleison, Christe eleison, Kyrie eleison).
<urn:uuid:07a68cf7-4678-4305-b37f-466c33a9077d>
CC-MAIN-2022-33
https://www.kidderminsterwestteam.co.uk/Groups/296931/Glossary_A_K.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00005.warc.gz
en
0.948611
2,640
2.859375
3
This article was previously published August 9, 2019, and has been updated with new information. Research overwhelmingly supports the notion that ditching the three square meals a day approach in favor of time-restricted feeding — a form of intermittent fasting — can do wonders for your health. Contrary to modern belief, your body isn’t designed to be fed throughout the day, and the near-continuous grazing that most engage in can have serious health consequences. Research by Satchidananda Panda, Ph.D., suggests 90% of people eat for more than 12 hours a day, and over time this habit will wreak havoc on your metabolism and limit your ability to metabolize fat as a primary fuel. When you eat throughout the day and never skip a meal your body adapts to burning sugar as its primary fuel, resulting in the downregulation of enzymes that utilize and burn stored fat.1,2 As a result, you become progressively more insulin resistant and start gaining weight. Efforts to lose weight also become ineffective for this very reason, since to lose body fat, your body must first be able to actually burn fat. Many biological repair and rejuvenation processes also take place while you’re fasting, and this is another reason why all-day grazing triggers diseases while fasting prevents them. What Is Time-Restricted Eating (TRE)? Time-restricted eating is just what it sounds like. It’s a form of intermittent fasting where you eat all of your meals for the day within a restricted window of time, ranging from two to eight hours. That means you’re avoiding food (fasting) for 16 to 22 consecutive hours. Eating within a four- to six-hour window is likely close to metabolic ideal for most. As noted in the paper “A Time to Fast,” published in the November 2018 issue of Science:3 “Adjustment of meal size and frequency have emerged as powerful tools to ameliorate and postpone the onset of disease and delay aging, whereas periods of fasting, with or without energy intake, can have profound health benefits. The underlying physiological processes involve periodic shifts of metabolic fuel sources, promotion of repair mechanisms, and the optimization of energy utilization for cellular and organismal health … In general, both prolonged reduction in daily caloric intake and periodic fasting cycles have the power to delay the onset of disease and increase longevity.” Fat-Burning Capacity Is Required for Weight Loss As just mentioned, to shed body fat, your body must have the ability to burn fat for fuel. While it may seem like this ability should be inherent in everyone, all the time (since we know fat can be used as fuel), metabolic dysfunction triggered by an inappropriate diet and feeding schedule can prevent this. In a nutshell, to be an efficient fat-burner, you need to: Eat a diet with a higher fat-to-sugar ratio (i.e., more healthy fats and less net carbohydrates), and Restrict the timing of your meals so that you’re fasting for a greater number of hours than you’re eating This will (over time) teach your body to burn fat for fuel again, rather than relying on fast-burning carbs, and in addition to burning dietary fats, your body will also start accessing and burning stored body fat. While either of these strategies alone (fasting or eating a ketogenic diet) will shift your body from carb-burning to fat-burning, doing them together will yield the fastest results. To learn more about this, see “Why Intermittent Fasting Is More Effective Combined With Ketogenic Diet.” How Time-Restricted Feeding Promotes Weight Loss So, what’s the evidence that time-restricted eating actually promotes weight loss? Aside from a number of animal studies,4 consider the following research,5 published in the July 2019 issue of Obesity. This study was founded on the premise that by eating earlier in the daytime, you properly align with the natural fluctuations in the circadian rhythm that regulates your metabolism. As a result, weight loss is enhanced. The question it sought to answer was whether this benefit is mediated through increased energy expenditure or simply lower energy intake. To find out, 11 overweight participants first adhered to an early time-restricted eating schedule, eating all meals between 8 a.m. and 2 p.m. for four days. For the next four days, they ate all meals between 8 a.m. and 8 p.m. They were also required to maintain a regular sleep schedule throughout. On the last day of each trial, energy expenditure and substrate oxidation levels were measured. Results revealed meal-timing primarily facilitates weight loss by reducing appetite and increasing fat oxidation. Energy expenditure remained unaffected. As explained by lead author Courtney Peterson, Ph.D., associate professor of nutrition sciences at the University of Alabama at Birmingham:6 “We think the longer daily fast gives people’s bodies more time each day to dip into their fat reserves and burn fat. The body is typically maximally efficient at burning fat when people fast for at least 12-24 hours at a time.” Overall, eating all meals earlier in the day, between 8 a.m. and 2 p.m., resulted in greater metabolic flexibility, lower ghrelin (known as the hunger hormone) levels, reduced hunger and increased sense of fullness, and this is thought to drive the weight loss. TRE Improves Weight Loss in Obese Adults Another study7 published in the Nutrition and Healthy Aging journal in 2018 examined how TRE — without counting calories — affects weight in obese adults. Here, they used an eight-hour restricted eating window. Twenty-three overweight adults were instructed to eat however much food they wanted between 10 a.m. and 6 p.m. for 12 weeks. For the remainder of the day and night, they were only allowed water. Weight loss and metabolic parameters were compared to the historical records of a group of matched controls. At the end of 12 weeks, body weight decreased by an average of 2.6% and energy intake decreased by 341 calories per day compared to controls. Systolic blood pressure also decreased by an average of 7 mm Hg. According to the authors, their findings “suggest that 8-hour time restricted feeding produces mild caloric restriction and weight loss, without calorie counting. It may also offer clinical benefits by reducing blood pressure.” How Restricted Feeding Affects Fat and Muscle in Fit Adults Overweight individuals are not the only ones who stand to benefit from time-restricted feeding, as evidenced by a 2016 study8 in the Journal of Translational Medicine, which evaluated the effects of TRE on basal metabolism, strength, body composition, inflammation levels and cardiovascular risk factors in fit men. As explained by the authors:9 “Thirty-four resistance-trained males were randomly assigned to time-restricted feeding (TRF) or normal diet group (ND). TRF subjects consumed 100% of their energy needs in an 8-h period of time each day, with their caloric intake divided into three meals consumed at 1 p.m., 4 p.m., and 8 p.m. The remaining 16 h per 24-h period made up the fasting period. Subjects in the ND group consumed 100% of their energy needs divided into three meals consumed at 8 a.m., 1 p.m., and 8 p.m. Groups were matched for kilocalories consumed and macronutrient distribution.” Strength training consisted of a split routine with three weekly sessions on nonconsecutive days for eight weeks. All participants had engaged in continuous resistance training for at least five years before the study.10 Compared to controls, at the end of the eight-week study, the treatment group experienced a decrease in fat mass while maintaining muscle mass and maximal strength.11 Interestingly, while blood glucose and insulin decreased significantly, as expected, so did testosterone and insulin-like growth factor 1, two anabolic hormones.12 Unfortunately, no hypothesis is presented for these findings. They also found that, aside from a reduction in triglycerides, the time-restricted feeding protocol did “not confirm previous research suggesting a positive effect of [intermittent fasting] on blood lipid profiles.” The researchers address this in the discussion section of the study, postulating that this may be related to the fact that all of the subjects were “normolipemic athletes,” meaning their blood lipid profiles were normal to start with. Despite that, the authors conclude: “Our results suggest that an intermittent fasting program in which all calories are consumed in an 8-h window each day, in conjunction with resistance training, could improve some health-related biomarkers, decrease fat mass, and maintain muscle mass in resistance-trained males.” A similar study13 published in the European Journal of Sport Science found that men who performed resistance training for eight weeks while eating all meals within four hours on non-workout days (four days a week) lowered their calorie intake while still increasing strength and muscular endurance. The Many Health Benefits of Intermittent Fasting A large and growing body of medical research supports the use of time-restricted feeding (intermittent fasting), showing it has a wide range of biological benefits. Aside from facilitating fat loss while protecting and even promoting muscle strength, studies show various forms of fasting,14 including a variety of intermittent fasting protocols and time-restricted feeding, can: Promote insulin sensitivity,15,16 which is crucial for your health as insulin resistance or poor insulin sensitivity contributes to nearly all chronic diseases Improve leptin sensitivity17 Improve blood sugar management by increasing insulin-mediated glucose uptake rates18 Lower triglyceride levels19 Increase human growth hormone production (HGH) — Commonly referred to as “the fitness hormone,” HGH plays an important role in maintaining health, fitness and longevity, including promotion of muscle growth, and boosting fat loss by revving up your metabolism. Research20,21 shows fasting can raise HGH by as much as 1,300% in women and 2,000% in men. The fact that it helps build muscle while simultaneously promoting fat loss explains why HGH helps you lose weight without sacrificing muscle mass, and why even athletes can benefit from intermittent fasting Suppress inflammation and reduce oxidative damage Promote multisystem regeneration22 by upregulating autophagy and mitophagy,23 natural cleansing processes necessary for optimal cellular renewal and function, and promoting regeneration of stem cells24 Prevent or reverse Type 2 diabetes, as well as slow its progression Improve immune function by regenerating damaged stem cells25,26 Lower blood pressure27,28 Reduce your risk of heart disease29 Boost mitochondrial energy efficiency and biogenesis30 Reduce your risk of cancer, in part by optimizing autophagy31 Increase longevity32,33,34 — There are a number of mechanisms contributing to this effect. Normalizing insulin sensitivity is a major one, but fasting also inhibits the mTOR pathway,35 which plays an important part in driving the aging process Regenerate the pancreas36 and improve pancreatic function Improve cognitive function and protect against neurological diseases (such as dementia, Alzheimer’s disease37 and Parkinson’s disease38,39) thanks to the production of ketone bodies40 (byproducts of fatty acid breakdown, which are a healthy and preferred fuel for your brain) and brain-derived neurotrophic factor41 (BDNF, which activates brain stem cells to convert into new neurons, and triggers numerous other chemicals that promote neural health). Animal research42 also shows intermittent fasting increases neurons resistance to excitotoxic stress Eliminate sugar cravings as your body adapts to burning fat instead of sugar TRE Is Beneficial for Most Contrary to longer fasts and calorie restriction, TRE is a strategy that can work for most people. Remember, you’re not actually limiting or counting calories — you can (theoretically) eat whatever you want in any amount — you’re simply restricting the time in which you eat all this food, although you will get better results by eating healthy nonprocessed foods and not consuming excessive carbs. Weakness and lethargy, which are signs of undernourishment, should not occur. It’s a practice that should make you feel good and actually reduce your hunger over time. Your hunger and craving for sugar will slowly dissipate as your body starts burning fat as its primary fuel. Once your body has successfully shifted into fat burning mode, it will be easier for you to fast for as long as 22 hours and still feel satiated. I typically fast for at least 18 hours a day and sometimes as much as 22 hours. While time-restricted feeding and intermittent fasting will in theory work regardless of your diet, I do not recommend it if you’re eating a preponderance of processed foods. The quality of your diet is particularly important if you’re looking for more than mere weight loss. It’s critical to avoid refined carbohydrates, sugar/fructose and grains. Focus your diet on vegetable carbohydrates, healthy protein in moderate amounts, and healthy fats such as butter, eggs, avocado, coconut oil, olive oil and raw nuts.
<urn:uuid:26a69877-6e0e-499e-846b-6f8c6ac97a42>
CC-MAIN-2022-33
https://understandingdeeppolitics.org/the-science-behind-time-restricted-eating/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00605.warc.gz
en
0.948168
2,751
2.609375
3
Insights Daily Current Events: 15 November 2015 June 21 will be made the ‘International Day of Yoga’ In an overwhelming response to call by the Prime Minister of India for commemorating an International Day of Yoga, about 130 countries have joined as co-sponsors to an India-led U.N. General Assembly resolution recognising yoga’s benefits. The draft resolution for an ‘International Day of Yoga’ was prepared by India and informal consultations were convened last month by the Indian mission in the U.N. General Assembly where views on the topic were expressed by other delegations. The draft resolution, known as the ‘L Document,’ was finalised with 130 countries co-sponsoring it, an all-time record for a resolution of such kind. Expected to come up for adoption in the General Assembly on December 10, it would recognise that “yoga provides a holistic approach to health and well-being.” The resolution would also proclaim June 21 as the ‘International Day of Yoga.’ It would recognise that wider dissemination of information about the benefits of practising yoga would be beneficial for the health of the world population and invite all member and observer states, organisations of the United Nations system and other international and regional bodies to observe the International Day in order to raise awareness of the benefits of practising yoga. UN General Assembly Resolution: A United Nations General Assembly Resolution is voted on by all member states of the United Nations in the General Assembly. The resolutions are formal expressions of the opinion or will of United Nations organs. General Assembly resolutions usually require a simple majority (50percent of all votes plus one) to pass. However, if the General Assembly determines that the issue is an “important question” by a simple majority vote, then a two-thirds majority is required; “important questions” are those that deal significantly with maintenance of international peace and security, admission of new members to the United Nations, suspension of the rights and privileges of membership, expulsion of members, operation of the trusteeship system, or budgetary questions. Although General Assembly resolutions are generally non-binding towards member states, internal resolutions may be binding on the operation of the General Assembly itself, for example with regard to budgetary and procedural matters. Sources: The Hindu, Wiki. Lightning strikes may go up due to global warming New research says that lightning strikes are likely to increase by 50 per cent thanks to global warming. Studying predictions of precipitation and cloud buoyancy in 11 different climate models, researchers have concluded that their combined effect will generate more frequent electrical discharges to the ground. With warming, thunderstorms become more explosive. Lightning is caused by charge separation within clouds, and to maximise charge separation, you have to loft more water vapour and heavy ice particles into the atmosphere. Global warming is leading to more water vapour into our atmosphere which is the fuel for explosive deep convection in the atmosphere. Precipitation — total amount of water falling on ground in the form of rain, snow — is basically a measure of how convective the atmosphere is. It is convection that generates lightning. More lightning strikes mean more human injuries; estimates of people struck each year range from the hundreds to nearly a thousand, with scores of deaths, noted the study. Lightning is a powerful sudden flow of electricity (an electrostatic discharge) accompanied by thunder that occurs during an electric storm. The discharge will travel between the electrically charged regions within a thundercloud, or between a cloud and a cloud, or between a cloud and the surface of a planet. The charged regions within the atmosphere temporarily equalize themselves through a lightning flash, commonly referred to as a strike if it hits an object on the ground. There are three primary types of lightning; - from a cloud to itself (intra-cloud or IC); - from one cloud to another cloud (CC) and - between a cloud and the ground (CG). Although lightning is always accompanied by the sound of thunder, distant lightning may be seen but may be too far away for the thunder to be heard. In order for an electrostatic discharge to occur, two things are necessary: - a sufficiently high electric potential between two regions of space must exist; and - a high-resistance medium must obstruct the free, unimpeded equalization of the opposite charges. Lightning primarily occurs when warm air is mixed with colder air masses, resulting in atmospheric disturbances necessary for polarizing the atmosphere. However, it can also occur during dust storms, forest fires, tornadoes, volcanic eruptions, and even in the cold of winter, where the lightning is known as thundersnow. The science of lightning is called fulminology, and the fear of lightning is called astraphobia. About 70% of lightning occurs over land in the tropics where atmospheric convection is the greatest. This occurs from both the mixture of warmer and colder air masses, as well as differences in moisture concentrations, and it generally happens at the boundaries between them. Lightning is usually produced by cumulonimbus clouds. A video on how Lightning occurs: https://www.youtube.com/watch?v=pHV6u-RwroY. Sources: The Hindu, Wiki, Google. Question Hour shifted in RS to stop disruptions To preserve the sanctity of the Question Hour, Rajya Sabha Chairman has decided to move it from the customary 11 a.m. to noon in the Upper House starting this winter session. The new rules will have to be presented and ratified by the Rajya Sabha when it convenes on November 24. Question Hour: The first hour of every sitting of Parliament is generally reserved for the asking and answering of questions. Types of Parliamentary Questions A Question is one of the devices available to a Member of Parliament to seek information on matter of public importance concerning subjects detail with by the Ministries and Departments and to force on the omissions and commissions of the government. There are three types of Questions: Starred Questions: Starred questions are required to be answered orally by the concerned Minister. These Questions are distinguished by an asterisk mark. Members of Parliament have the option to raise the Supplementary Questions based on the replies to the starred Questions. These Questions for which a notice period of minimum 10 days and maximum 21 days has been prescribed are asked during the question Hour on the fixed days allotted to the Ministry/Department. Unstarred Questions: Unstarred Questions do not carry asterisk mark and are answered in a written form. The notice period is the same as that for the started Questions and these are also asked on the allotted days of the Department/Ministry during Question Hour. The replies to the Unstarred Questions are laid on the Table of the House. Short Notice Questions: Short Notice Questions relate to a matter of urgent public importance and can be asked with a notice shorter than 10 days. These Questions are answered orally by the Minister concerned and Supplementary Questions can also be asked. However, a Short Notice Question can be asked only with the concurrence of the Minister. Zero Hour: The time immediately following the Question Hour has come to be known as “Zero Hour”. Members can, with prior notice to the Speaker, raise issues of importance during this time. Sources: The Hindu, prsindia.org, parliamentofindia.nic.in. SC seeks Centre’s take on NRIs voting from abroad The Supreme Court has given the Centre a month’s time to work out a way to implement an Election Commission panel report recommending proxy voting and e-postal ballots as alternatives to do away with a legal provision insisting on physical presence of an NRI in his local constituency at the time of voting. The 12 member committee was headed by Vinod Zutshi. The Parliament of India approved the voting rights for the Non-Resident Indians in the Elections, with the Lok Sabha adopting the Representation of the People (Amendment) Bill, 2010. However, according to the Bill, the person will be able to exercise the franchise only if he or she is physically present in their constituency on the polling day at the polling station along with the original passport. This had created a problem. Sources: The Hindu, PIB. In T.N., sterilisation claims more lives than national average The fatality count in Tamil Nadu is the highest in the country, according to data released by the Ministry of Health and Family Welfare. The death in Chhattisgarh of more than a dozen women in a sterilisation camp has captured the nation’s attention. But the death of more than 130 women in Tamil Nadu between 2008 and 2012 alone has hardly received any scrutiny. Tamil Nadu claims to have one of the best public health systems in the country, but it records an overwhelming number of deaths post-sterilisation. One reason for Tamil Nadu’s poor performance is that the Union Ministry counts a death only after compensation is disbursed. Perhaps, a few States do not release any money or under-report deaths. Or, the death takes years to be recorded because of the delay in giving compensation to the family. This is why Tamil Nadu’s death count drops to 5 during 2012-13, as reported in 2014.Despite these shortfalls in data accuracy, Tamil Nadu consistently records more deaths due to sterilisation every year than the national average of 11.There is also a significant gender-divide in the State’s sterilisation campaign, with women accounting for 99.4 per cent of all procedures. The District Level Health Survey for 2012-13 shows that little more than half of the State’s population use family planning methods. An overwhelming proportion is attributed to female sterilisation. Sources: The Hindu. Farhan is U.N. Women’s first male Goodwill Ambassador Bollywood actor-director Farhan Akhtar has become the first man in U.N. Women’s history to be appointed its Goodwill Ambassador for South Asia. The actor will serve as an advocate for U.N. Women’s newly-launched HeForShe initiative for gender equality and women’s empowerment. The UN organisation, dedicated to gender equality and women’s empowerment, chose Farhan for raising voice against gender inequality and violence against women and girls in India through his Men against Rape and Discrimination (MARD) campaign. Since the early 1950s, the United Nations has enlisted the volunteer services and support of prominent personalities from the worlds of art, music, film, sport and literature to highlight key issues and to draw attention to its activities. Over the years, many persons of international stature have lent their names, talents and time to support UN programmes—a number of UN Secretariat units and separately funded and administered Funds and Programmes of the United Nations have designated such individuals as Goodwill Ambassadors or celebrity advocates, who are working on behalf of the United Nations worldwide. ‘HeForShe‘ is a global solidarity movement to end gender inequality by 2030. It is a campaign for gender equality initiated by UN Women. It aims to engage men and boys as agents of change for the achievement of gender equality and women’s rights, by encouraging them to take action against inequalities faced by women and girls. Grounded in the idea that gender equality is an issue that affects all people — socially, economically and politically — it seeks to actively involve men and boys in a movement that was originally conceived as “a struggle for women by women”. Sources: The Hindu, un.org. When brains shake hands In a major scientific advance, researchers at the University of Washington have established a ‘brain to brain communication’ link using the Internet. The finding provides scientific evidence of the human brain being able to send a signal to another person, leading to a motor action — such as a hand moving. The possibilities of effectively treating cognitive disorders such as autism or making a paralysed person communicate with others have brightened after this breakthrough. The “brain-to-brain” connection was established between two persons sitting in different buildings of the university. The signal from the sender’s brain, recorded using electroencephalography, was interpreted by a computer and transmitted over the Internet to a transcranial magnetic stimulation machine, which delivered a magnetic impulse to the receiver’s brain. How it works? One participant, the ‘sender,’ is hooked to an electroencephalography machine that reads his brain activity and sends electrical pulses via the Internet to the ‘receiver,’ who has a transcranial magnetic stimulation coil placed near the part of his brain that controls hand movements. With this technology, the sender can issue a command to move the hand of the receiver by simply thinking about the hand movement. The sender, who is playing a computer game in which he has to defend a city by firing cannons, thinks about firing the cannon at various intervals throughout the game. The “Fire!” brain signal is sent over the Internet directly to the brain of the receiver, whose hand hits a touchpad that allows him to fire the cannon. The accuracy among the pairs ranged from 25 to 83 percent, with errors attributed primarily to the sender’s failure to “accurately execute” the fire-command thought rather than the hardware. Although the applications for brain health are far in the future, the research could be a big step towards treating people with brain damage. For further reference: http://www.vox.com/2014/9/7/6115573/telepathy-brain-communication-EEG-TMS. Sources: The Hindu, vox.com, huffingtonpost.com.
<urn:uuid:86e1cea5-3f8e-4acd-b0a9-fc54dd71046e>
CC-MAIN-2022-33
https://www.insightsonindia.com/2014/11/15/insights-daily-current-events-15-november-2015/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572515.15/warc/CC-MAIN-20220816181215-20220816211215-00605.warc.gz
en
0.950863
2,862
2.59375
3
Ion Propulsion -- 50 Years in the Making Space Science News home The engineering that makes this possible represents a journey that started more than half a century ago, when modern rocketry was invented. Looking back, Ernst Stuhlinger, a world expert on electric propulsion, said that the technology "owed its life-giving spark to Wernher von Braun." December 3: Mars Polar Lander nears touchdown December 2: What next, Leonids? November 30: Polar Lander Mission Overview November 30: Learning how to make a clean sweep in space Right: An artist's concept depicts the Deep Space 1 probe with its ion engine operating at full thrust. (Links to). In 1932, the German Army's Ordnance Department provided him with a research grant to test small liquid-fueled rocket engines at the Kummersdorf Proving Grounds near Berlin. During World War II, he and a team of German rocket experts developed the V-2 rocket, a14.4-meter (47-ft) high missile that burned liquid oxygen with alcohol (made from fermented potatoes). In 1948, the orginal "German Rocket Team" posed for a group portrait at Fort Bliss, Texas. Dr. Ernst Stuhlinger is circled to the left of center. Dr. Wernher von Braun is circled at right. Two years later, they relocated to Huntsville, Ala. At the end of WWII in 1945, von Braun and hundreds of other German rocket experts surrendered to the Americans. They were sent to Fort Bliss, Texas, to develop rocket technology for U.S. Army research. While von Braun and his team continued to work on the V-2 rocket at Fort Bliss, von Braun dreamed about developing a rocket that could travel to other planets. With that thought in mind, he approached Ernst Stuhlinger, a member of the original "Rocket Team" that had emigrated to Fort Bliss. Von Braun asked Stuhlinger to review the research by von Braun's mentor, Oberth. "Professor Oberth has been right with so many of his early proposals," von Braun told Stuhlinger in 1947, "I wouldn't be a bit surprised if we flew to Mars electrically." Stuhlinger immersed himself in electric propulsion theory. He found a copy of Oberth's book, "Possibilities of Space Flight." Published in 1939, Oberth devoted a chapter to the various problems of electric propulsion systems, envisioning one design that might carry a 150-ton payload. In studying the origins of interest in electric propulsion, Stuhlinger learned that the American rocket pioneer, Dr. Robert Goddard, had examined the subject as early as 1906. Goddard had mentioned the possibility of accelerating electrically charged particles to very high velocities without the need for high temperatures. Studies in electric propulsion became more frequent following WWII, and in 1955 Stuhlinger presented a paper at the International Astronautical Congress in Vienna entitled, "Possibilities of Electrical Space Ship Propulsion." During his presentation, Stuhlinger discussed a proposal made by von Braun two years earlier, to use chemical propulsion to send a spaceship to Mars. In von Braun's proposal, Stuhlinger noted that the ratio of take-off weight to final weight after propellant consumption was 25-to-1. Stuhlinger argued that lighter-weight electric propulsion systems would make such planetary trips more feasible than they were with chemical propulsion. Left: An engineer at NASA's Lewis Research Center prepares to test the DS1 ion engine. The fuel used by Deep Space 1's ion engine is xenon, a gas that is more than 4 times heavier than air. When the ion engine is running, electrons are emitted from a hollow tube called a cathode. These electrons enter a magnet-ringed chamber, where they strike the xenon atoms. The impact of an electron on a xenon atom knocks away one of xenon's 54 electrons. This results in a xenon atom with a positive charge, or what is known as an ion. At the rear of the chamber, a pair of metal grids is charged positively and negatively, respectively, with up to 1,280 volts of electricity. The force of this electric charge exerts a strong electrostatic pull on the xenon ions. The xenon ions shoot out the back of the engine at a speed of 100,000 km/h (60,000 mph). At full throttle, the ion engine will consume 2,500 watts of electrical power, and put out 1/50th of a pound of thrust. That's far less than the thrust of even small chemical rockets. But an ion engine can run for months or even years, and it's up to 10 times more efficient. Sign up for our EXPRESS SCIENCE NEWS delivery Dr. Wernher von Braun in a 1961 portrait. The painting behind him depicts an early lunar lander concept, Project Horizon, studied while he was with the Army. San Antonio -- April 6, 1999 -- Scientists and engineers from Southwest Research Institute (SwRI) and the Los Alamos National Laboratory have announced initial results from the novel PEPE instrument carried on the Deep Space 1 (DS1) spacecraft, part of NASA's New Millennium Program. According to Dr. David Young of SwRI, the principal investigator for the data analysis phase of the DS1 mission and spokesman for the PEPE team, the new instrument observed charged xenon particles returning to the spacecraft from the 1 ampere exhaust plume of the ion propulsion jet. At the same time, PEPE data have been used to place limits on electrical charging of the DS1 spacecraft. Taken together, these data suggest that the ion drive engine used to propel the spacecraft can indeed be used to power future scientific missions without interfering with the scientific payload. Before now, the use of such an engine in space had been unproved. PEPE incorporates a half-dozen new technologies that will make future space plasma instruments smaller and less expensive. Among these is a novel time-of- flight mass spectrometer that measures the composition of charged atomic particles (ions) coming from asteroid 1992 KD, the target of the DS1 mission. Other technologies include high performance power supplies operating at up to 15,000 volts but weighing just over 100 grams. PEPE also incorporates novel ion and electron optical systems that eliminate complex motors otherwise needed to steer a plasma instrument's line of sight. Young said that PEPE has achieved most of its technical goals: It weighs about 25 percent of the mass and uses 50 percent of the power of a comparably performing SwRI instrument on NASA's Cassini spacecraft, while costing about 75 percent less. During January, the PEPE team took advantage of favorable alignment of the DS1 and Cassini spacecraft to measure the solar wind at both locations while separated by a distance of nearly 40,000,000 miles. Young indicated that these initial PEPE measurements of the solar wind confirm that the instrument will be able to detect extremely low densities of ions and electrons during the planned DS1 encounters with the asteroid. For ions, the lowest detectable density is about 1 ion per 100 cubic centimeters, and for electrons it is ten times less. This means that PEPE has a good chance of providing the first plasma sensor detection of an asteroid and should give the first indication of the composition of asteroid surface materials that are constantly knocked off the asteroid surface by the solar wind. SwRI is an independent, nonprofit, applied research and development organization with more than 2,700 employees and an annual research volume of more than $300 million. Left: A Saturn 5 rocket launches Apollo 8 to the moon in 1968. The Saturn 5 still is the high point of large rockets, but it is far from the most efficient in a "miles per gallon" sense. James A. Downey, a NASA retiree who started with the Army rocket team, traced the Army's and NASA's development of electronic propulsion. He reported that the most imposing problem in the early development of ion engines was proving that injecting electrons could neutralize an ion beam. Continually spewing positively charged ions will leave a spacecraft with a negative charge so great that the ions are attracted back to the spacecraft. The solution is an electron gun that dumps the electrons into the ion stream, thus neutralizing both spacecraft and exhaust. But the beam's interaction with the walls of even a large vacuum chamber makes it very difficult to conduct meaningful beam neutralization experiments on Earth. According to Downey, these uncertainties led to considerations for flight testing electric engines. Downey said another challenge of electronic propulsion involved developing an efficient technique to produce ions. Working at NASA/Lewis, Harold Kaufman invented an electron-bombardment technique to ionize mercury atoms. At NASA/Marshall, they were developing a process where cesium atoms would become ionized upon contact with a hot tungsten or rhenium surface. Marshall's major development in electrical propulsion centered, however, on a 30-kilowatt ion engine development contract, initiated in September 1960 with Hughes Research Laboratory in Malibu, Calif. At first, Marshall directed Hughes to design a laboratory model of an ion engine. The 0.01 lb.-thrust model would be followed by the development of a 0.1 lb.-thrust engine. Marshall later modified the Hughes contract to include a flight test model ion engine, primarily to determine whether a beam neutralization problem existed in space. Right: A NASA engineer prepares an early ion engine for a vacuum chamber test in 1959. Lined up at right are the major electrical parts. Hughes demonstrated an ion engine on Sept. 27, 1961, at its research laboratories in Malibu. Stuhlinger was among those on hand to greet the scientific and technical writers who attended the event. The group gathered to watch the engine actually operate in a vacuum chamber intended to duplicate the conditions the engine would encounter in space. Less than two months after the demonstration, however, NASA announced the consolidation of its nuclear-electric propulsion programs at Lewis. Nuclear-electric propulsion work at the Marshall Center's Research Projects Division, directed by Stuhlinger, moved from Huntsville to Cleveland. Stuhlinger, though, stayed at NASA/Marshall and worked on other projects. "The urgency of Marshall's work on NASA's lunar and manned space flight programs prompted the decision to employ Stuhlinger's group exclusively on those projects," one agency report stated. The nation was focused on sending a man to the moon using chemically propelled rockets. |Other Propulsion Stories this week| |Apr 6: - The concept of ion propulsion, currently being demonstrated on the Deep Space 1 mission, goes back to the very beginning of NASA and beyond. April 6: Far Out Space Propulsion Conference Blasts Off - Atoms locked in snow, a teaspoon from the heart of the sun, and the stuff that drives a starship will be on the agenda of an advanced space propulsion conference that opens today in Huntsville. April 7: Darwinian Design - Survival of the Fittest Spacecraft April 7: Coach-class tickets for space? - Scientists discuss new ideas for high-performance, low-cost space transportation April 8: Setting Sail for the Stars - Cracking the whip and unfurling gray sails are among new techniques under discussion at the 1999 Advanced Propulsion Research Workshop April 12: Reaching for the stars - Scientists examine using antimatter and fusion to propel future spacecraft. April 16: Riding the Highways of Light - Science mimics science fiction as a Rensselaer Professor builds and tests a working model flying disc. The disc, or "Lightcraft," is an early prototype for Earth-friendly spacecraft of the future. In the early 1990s, the Jet Propulsion Laboratory and NASA/Lewis partnered on the NASA Solar Electric Power Technology Applications Readiness (NSTAR) project. The purpose of NSTAR was to develop xenon ion engines for deep space missions. In June 1996, a prototype engine built by NASA/Lewis began a long-duration test in a vacuum chamber at JPL simulating conditions of outer space. The test concluded in September 1997 after the engine successfully logged more than 8,000 hours of operation. Results of the NSTAR tests were used to define the design of flight hardware that was built for Deep Space 1. Although responsibility for electric propulsion research has moved from Marshall to Lewis, Stuhlinger still continues to promote the promises of electric propulsion. "Everyone who ever worked on electric propulsion during these past 50 years is now following the newest ion propulsion project, Jet Propulsion Laboratory's Deep Space 1 mission…with greatest interest, and with fervent wishes for success," Stuhlinger says. Deep Space 1 - Jet Propulsion Lab's Mission Page Solar Electric Propulsion on DS1 - JPL NASA Glenn Provides Critical Technologies for Deep Space 1 Mission - Jet Propulsion Lab's Mission Page Exotic Technologies Finish Road Test on Cosmic Highway - NASA Headquarters press release SwRI engineers activate Deep Space One instrument - Southwest Research Institute (SwRI) press release Ion propulsion now a practical reality - Story on Astra 2A Communications Satellite which uses ion propulsion Xenon Ion Propulsion - Hughes Space And Communications commercial ion propulsion for satellites. More Space Science Headlines - NASA research on the web NASA's Office of Space Science press releases and other news related to NASA and astrophysics return to Space Science News Home |For more information, please contact: Dr. John M. Horack , Director of Science Communications |Author: Mike Wright Curator: Bryan Walls NASA Official: John M. Horack
<urn:uuid:26d628bf-6df4-47c5-aa55-a005315b4d80>
CC-MAIN-2022-33
https://science.nasa.gov/science-news/science-at-nasa/1999/prop06apr99_2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573193.35/warc/CC-MAIN-20220818094131-20220818124131-00205.warc.gz
en
0.920482
2,819
3.984375
4
Linux offers a wide & well known array of options to do asynchronous I/O over sockets, pipes, fifos and other transport mechanisms that can be represented as a file descriptor. These options include select, poll and epoll. Sadly, these functions all do not work for actual file backed file descriptors. Because this would normally cause problems, as we like to make writes that are smaller than optimal for disks to handle, the kernel offers a huge cache that effectively allows us to do 'Asynchronous I/O' by buffering giant amounts of writes and previously read data. As long as processes do I/O on substantially less than the amount of system RAM, this works perfectly. If however we are doing reads and writes over a working set near or larger than can comfortably be kept in memory, we would often like to take full control over disk access since at that stage, I/O needs to be managed carefully, something that the kernel can not do for us automatically (although it tries real hard). In many senses, the page cache speeds up reads, but for writes it can be seen as a 'unique queue' that in case of duplicate writes only lets the last one actually happen, but that in the end still has to execute all the writes we've issued. In that sense, when doing sustained writes exceeding the amount of system RAM, the page cache merely postpones the eventual slowness of writes. Limitations of "synchronous" I/O Real synchronous I/O is so slow as to be unuseable for most purposes, and is relegated to the areas where it is truly required. To understand what synchronous I/O entails, consider that getting a byte to disk requires first reading (at least) the sector that contains the location where we want to write, modifying the sector with our byte, and then commanding the device to actually magnetically write out our in memory & modified copy of that sector. This last bit means moving the disk head to the proper position, and waiting for the correct sector to move under it in its entirety. As disks rotate at between 100 and 200 rotations per second, you can see that this process takes at least somewhere between 8 and 24 milliseconds - assuming no time is actually spent moving the arm! This means that in the best case we can do around 50-100 actual synchronous writes per second. If we want to store something directly in a data structure, this typically requires (at least) 2 write operations, bringing us down to 25-50 stores/second. If we are interested in stores with millions of entries, we'd need a day or more to actually fill one. This is rather depressing since the actual database we'd end up with would be maybe 100MB - in other words, our disk could've written all that within a second! To solve this without making life too hard, most operating systems, including Linux, default to not actually doing all your writes the moment you ask them to be performed. Instead, file I/O operates on the page cache (in Linux), and periodically, big batched writes are sent out to disk. Often these batches are large and contiguous, and so can be written out at high speed. Summarizing, even standard "synchronous" POSIX I/O is in fact not synchronous at all. However, if we want to make this standard I/O synchronous, we can do so by setting a few flags, and we end up with the atrociously slow performance described earlier. Linux "Asynchronous" File I/O using pagecache control If we want to achieve full control over I/O (and not be at the mercy of the page cache), we have multiple ways of achieving that. A cheap and fast way is to do I/O as normal, and instruct the kernel explicitly to remove things from the cache ('forget'), or in case things needed to be written out, make that happen more or less when we want it. Using posix_fadvise(2), madvise(2), plus setting parameters in /proc/vm just right, a remarkable amount of page cache control can be achieved. For many applications, this may be enough. The page cache can thus function as a way to make your calls to write() asynchronous, and your calls to read() be fast enough that you won't care. Bypassing the page cache with a non-asynchronous API By means of O_DIRECT, files can be opened to which one can read or write without going through the page cache. This comes with a lot of caveats, for example, data written must be an integral amount of pages, and the memory storing the data must be aligned to a page. O_DIRECT offers an interesting in between solution - it uses the normal POSIX file system calls, yet it allows for reads and writes to happen without filling the page cache. In this sense, O_DIRECT offers a lot of control. This comes at a significant performance cost however, because although there is no promise of writes being synchronous, the kernel does not have a lot of scope for buffering your write. Effectively, an O_DIRECT write inserts your data into the device queue, which often contains up to 128 requests. This may or may not be enough to keep your device streaming data at high speed. Full asynchronous IO The state of AIO in Linux is not overly pretty. POSIX standardized an API for asynchronous file AIO, and Linux in fact has a library that offers that API. In addition, Linux has a 'native' AIO interface too. For reasons which are unclear (at least to me), the POSIX standardized API in Linux is, in fact, not implemented on top of the native AIO interface, except on Red Hat systems. The 'mainline' POSIX standardized API appears to be built with helper threads, and according to what I hear, does not deliver the desired performance. In addition, the native AIO interface, which appears to work pretty well, is supplemented by an odd userspace library called libaio. Libaio is inconsistently documented, does not have a clear homepage, and I could not even find an authoritative location for its source code. Asynchronous file I/O is tricky at best, and the state of the Linux libraries makes this worse. However, in many cases, it is still worth it. On the reading side, the kernel offers no (reliable) other way to indicate a whole bunch of required stretches of data which can be delivered as they arrive. Readv(2) will, for example, only return when all data is available. If one process is serving the needs of multiple clients, this means that all clients have to wait until the last read is in. With AIO, each client can be served as its data comes in. When doing writes that need to happen at some point, but not necessarily synchronously, the kernel usually offers this via the page cache, but as explained above, when the actual write happens is hard to control, and very large amounts of memory may be consumed buffering data that the application knows could well be written out to disk already. Finally, when reading and writing from fast SSD devices (especially if they are striped), the page cache only gets in the way, and asynchronous IO is the only way to get top performance. The native Linux AIO API (Update: A lot of very good information on Linux native AIO can be found on http://code.google.com/p/kernel/wiki/AIOUserGuide as written by Daniel Ehrenberg of Google. I think he does a better job than I did, but you might want to compare!) The native API 'libaio' is a confusing mix built on top of five system calls. Everything starts with the creation of an AIO context using io_setup(2). To this context, we can submit requests using io_submit(2). It appears that while a request is with the kernel, we cannot reuse or free the memory holding the request, nor the data that is being written. In other words, the kernel does not make a private copy. To figure out what came of our requests, we can call io_getevents(2), to which we pass the minimum and maximum number of requests we are interested in. io_getevents() returns a vector of results, and these results each include a pointer to our original requests, which is useful both for freeing their memory, and to figure out exactly which request this result belongs to. In addition, the result includes the error code associated with our request, encoded negatively in the 'res' field. To cancel an outstanding request, we may use io_cancel(2), which might or might not succeed in preventing the request from happening. This can be useful when it is known that more recent data is available that supersedes a previously issued write request. Finally, to tear down an AIO context, use io_destroy(2). This concludes the five actual system calls. It should be noted that the system calls, as made available through libaio, do not adhere to common unix semantics of returning negative in case of an error and setting errno. Instead, these wrappers merely pass on the errno value returned from the kernel. So an error is still indicated by a negative number, but this negative number contains the error code. Errno is not set. To these five calls, libaio adds a confusing number of helpers, which are not actually distinguished from the system calls in their nomenclature. Two very useful and obvious helpers are io_prep_pread(3) and io_prep_pwrite(3) which help fill out the parameters of an AIO request to perform a pread(2) and a pwrite(2) respectively. io_prep_preadv(3) and io_prep_pwritev(3) perform analogous functions for the respective vector variants. In addition, libaio offers infrastructure for 'running' the queue, and doing callbacks for specific events. So, as an alternative to io_getevents(), one can call io_queue_run(), and this will do io_getevents() for you, but also call any callbacks that were attached to submitted requests. To attach a callback, use io_set_callback(). Libaio also contains io_queue_wait(3), io_queue_grow(3), io_queue_release(3), but it is unknown what these calls do. They've been commented out in the header file of more recent releases, but the manpages still refer to them, and the library includes some of them too. Given the confusion above, it might be better to elevate the native system calls to libc(), probably with a different name, and do without the confusing infrastructure of libaio. Alternatively, it is well possible that libaio might be cleaned up and documented to be less confusing. There is an io_context struct, which is opaque. Requests are submitted as a struct iocb to the io_context. Each request has an opcode, a file descriptor, and a 'key' which could be used by the caller to match up request results to the original request. In addition, there is an unused (so far?) priority field. Finally, there is a union 'u' containing one of four structs containing details that depend on the nature of the filedescriptor and the opcode. Except for pwritev and preadv requests, it appears that only the 'common' member called 'c' is used, and that this struct contains an offset, a length and a pointer where to put or get the data. So to set the length of an io request, modify iocb.u.c.nbytes (or use io_prep_pread/pwrite). When the results come back from io_getevents, they are in the form of an io_event struct. This struct contains an obj pointer back to the original iocb struct. It also contains the 'res' field which gives us the negative of the error code of the request. If it is positive, it tells us how many bytes were written. The io_event struct also has a 'res2' and a 'data' field, but it is unknown what these do. Linux native AIO semantics These are unclear. According to various sources, asynchronous IO should only function usefully on filedescriptors obtained in O_DIRECT mode, but this does not appear to be true anymore. The example code in the io(3) manpage does not use O_DIRECT. It also does not compile without help. In addition, it is said the Linux AIO does not do 'fsync' like operations, but there is a helper function called io_prep_fsync(3), and a manpage which claims this can be used to queue an fsync() request (through subsequent io_submit()). To confuse things further, there is also an undocumented request opcode called 'fdsync', but I've not yet reverse engineered what this does (fdatasync?). It is said that Linux native AIO really is a 'file-only' affair, but the include files do contain infrastructure for socket IO. It is unknown if this is hooked up. With the call to io_setup, we pass a number of io requests that this context should be able to handle. When we try to submit more, rumour has it that io_submit(2) might block the caller. In my experience, it returns EAGAIN, allowing us to do an io_getevents() run to make space. Some of the sample code appears to deal with partial writes or reads being indicated in the io_events returned by io_getevents. It is indeed possible to detect such partial writes by comparing the 'res' field of io_event to io_event.obj->u.c.nbytes. It is unknown if such partial writes or reads adhere to POSIX synchronous IO semantics - in which case they'd only happen in disk full sitations, or attempts to read beyond the end of a file or a device. Mixing Linux native AIO with other I/O multiplexers It is also said that native AIO does not mix with other I/O multiplexers, but within the kernel and Libaio, we find io_set_eventfd, which appears to associate an individual IO control block with an fd that can be added to epoll, poll or select. Things that are still synchronous It has been noted (correctly) that a big downside of the AIO interface is the parts that are not asynchronous. Fileservers and webservers for example don't just read from files, they stat() and open() them too, and these remain fully synchronous operations. In addition, even the Linux native AIO interface can drop back to being synchronous when asked to perform operations that the kernel is unable to do asynchronously. Examples include writing to certain filesystems, or extending the length of a file or writing to a file not opened in O_DIRECT mode. The AIO User Guide referenced above lists certain of these synchronous conditions. The POSIX AIO API This API is described on http://www.gnu.org/software/libc/manual/html_node/Asynchronous-I_002fO.html It appear that this API lacks the equivalent of io_getevents(). To get the status of a previously submitted IO request, one can pass an array of all known outstanding requests to aio_suspend() and it will return if any of them have completed already. The function can then be called again with all known outstanding requests etc. As noted previously, the version shipping as part of glibc is not based on the native interface but emulates AIO with threads. The exception appears to be Red Hat based systems, which do ship with a POSIX API based on the native API (although you need to edit your LD_LIBRARY_PATH to include the rtkaio path to get it). Joel Becker has also written such an adaptor, which is available on http://oss.oracle.com/projects/libaio-oracle/files/
<urn:uuid:2c29b546-a06c-4f04-bcd6-fe786f5ddf1c>
CC-MAIN-2019-22
https://bert-hubert.blogspot.com/2012/05/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256858.44/warc/CC-MAIN-20190522143218-20190522165218-00062.warc.gz
en
0.939195
3,421
2.84375
3
The American Academy of Pediatrics strongly endorses universal immunization. However, for childhood immunization programs to be successful, parents must comply with immunization recommendations. The problem of parental refusal of immunization for children is an important one for pediatricians. The goal of this report is to assist pediatricians in understanding the reasons parents may have for refusing to immunize their children, review the limited circumstances under which parental refusals should be referred to child protective services agencies or public health authorities, and provide practical guidance to assist the pediatrician faced with a parent who is reluctant to allow immunization of his or her child. OVERVIEW OF THE PROBLEM The immunization of children against a multitude of infectious agents has been hailed as one of the most important health interventions of the 20th century.1–3 Immunizations have eliminated smallpox infection worldwide, driven polio from North America, and made formerly common infections like diphtheria, tetanus, measles, and invasive Haemophilus influenzae infections rare occurrences. By one account, pediatric immunizations are responsible for preventing 3 million deaths in children each year worldwide.3 Despite this success, some parents continue to refuse immunizations for their children. The number of pertussis cases has increased steadily in the United States over the past 20 years, and Web sites critical of immunization are prominent on the Internet, a source that many parents rely on for health information.4 It is ironic that the remarkable success of vaccine programs has resulted in a situation in which most parents have no memory of the devastating effects of illnesses such as poliomyelitis, measles, and other vaccine-preventable diseases, making it more difficult for them to appreciate the benefits of immunization. According to a periodic survey of fellows of the American Academy of Pediatrics (AAP) on immunization-administration practices, 7 of 10 pediatricians reported that they had had a parent refuse an immunization on behalf of a child in the 12 months preceding the survey.5 Measles-mumps-rubella vaccine was refused most frequently, followed by varicella vaccine, pneumococcal conjugate vaccine, hepatitis B vaccine, and diphtheria and tetanus toxoids and pertussis vaccines. Four percent of pediatricians had refused permission for an immunization for their own children younger than 11 years. When faced with parents who refuse immunization, almost all pediatricians reported that they attempt to educate parents regarding the importance of immunization and document the refusal in the patient's medical record. A small number of pediatricians reported that they always (4.8%) or sometimes (18.1%) tell parents that they will no longer serve as the child's physician if, after educational efforts, the parents continue to refuse permission for an immunization.5 The AAP strongly endorses universal immunization. However, for universal childhood immunization programs to be successful, parents must comply with immunization recommendations. The problem of parental refusal of immunization for children is an important one for pediatricians. Parents may have many reasons for refusing immunization. Some parents may object to immunization on religious or philosophical grounds, some may object to what seems to be a painful assault on their child, and others may believe that the benefits of immunization do not justify the risks to their child. Many commonly held beliefs about the risks of immunization are not supported by available data, and they frequently originate from the unsupported claims of organizations that are critical of immunization. These antivaccine information sources not only propagate unproven claims regarding vaccines but also may undermine the physician-family relationship by challenging the parents' trust of the medical profession. What should the pediatrician do when faced with a parent who refuses to consent to immunizations for a child? The goal of this clinical report is to provide guidance to the pediatrician faced with this difficult situation. The physician faced with a parent who refuses to immunize a child faces 3 important and distinct issues that will be addressed in this report. First, are there situations in which parents who withhold immunizations from their children risk harming them sufficiently that their decision constitutes actionable medical neglect and should be reported to state child protective services agencies? Second, are there situations in which a parental decision to withhold immunization from a child puts other individuals at risk of harm sufficient to justify public health intervention? Finally, how should the pediatrician respond to a parent who refuses immunizations for his or her child? PARENTAL REFUSALS AND THE BEST INTERESTS OF CHILDREN Health care professionals and parents are bound by the duty to seek medical benefit for and minimize harm to children in their care. When faced with the decision to immunize a child, the welfare of the child should be the primary focus. However, parents and physicians may not always agree on what constitutes the best interest of an individual child. In those situations, physicians may need to tolerate decisions they disagree with if those decisions are not likely to be harmful to the child.6 Although decision-making involving the health care of children should be shared between physicians and parents, parental permission must be sought before children receive medical interventions, including immunizations.7 Parents are free to make choices regarding medical care unless those choices place their child at substantial risk of serious harm. Whether parents place their children at substantial risk of serious harm by refusing immunization will depend on several factors, including the probability of contracting the disease if unimmunized and the morbidity and mortality associated with infection. The results of such an analysis will also vary depending on the prevalence of disease in the community in which the child resides or the areas in which the child is likely to travel. The balance between the risks and benefits to a given individual favors immunization most strongly when rates of immunization in the community are low and disease prevalence is high. In most cases, however, as immunization rates increase and disease prevalence decreases, the balance may tip the other way.8,9 Although the benefits of a measles-vaccine program, for example, clearly outweigh the risks at a population level,10 an unimmunized child living in a well-immunized community derives significant indirect protection from herd immunity.11 Even in a community with high immunization rates, the risk assumed by an unimmunized child is likely to be greater than the risks associated with immunization. However, the risk remains low, and in most cases the parent who refuses immunizations on behalf of his or her child living in a well-immunized community does not place the child at substantial risk of serious harm. The role of the physician in these situations is to provide parents with the risk and benefit information necessary to make an informed decision and to attempt to correct any misinformation or misperceptions that may exist. For example, in a national survey of parents, 25% believed falsely that their child's immune system could become weakened as a result of too many immunizations.12 Exploring and addressing parental concerns may be an effective strategy with reluctant parents. Only in rare cases in which the decision of a parent places a child at substantial risk of serious harm may the health care professional be obligated to involve state agencies in seeking to provide the necessary immunization over the parents' objections. For example, for the situation in which a child has sustained a deep and contaminated puncture wound, it might be justifiable to challenge the decision of a child's parents to refuse treatment with tetanus vaccine. In these situations, the health care professional would involve the appropriate state child protective services agency because of the concern about medical neglect. It would be up to the state agency to decide whether immunization would be required. Although this role of the state has been recognized as constitutionally valid in the United States, courts have closely examined such actions, showing reluctance to require medical treatment over the objection of parents “except where immediate action is necessary or where the potential for harm is rather serious.”13 COMMUNITY INTERESTS AND PUBLIC HEALTH The benefits provided by most vaccines extend beyond benefit to the individual who is immunized. There is also a significant public health benefit. Parents who choose not to immunize their own children increase the potential for harm to other persons in 4 important ways.14 First, should an unimmunized child contract disease, that child poses a potential threat to other unimmunized children. Second, even in a fully immunized population, a small percentage of immunized individuals will either remain or become susceptible to disease. These individuals have done everything they can to protect themselves through immunization, yet they remain at risk. Third, some children cannot be immunized because of underlying medical conditions. These individuals derive important benefit from herd immunity and may be harmed by contracting disease from those who remain unimmunized. Finally, immunized individuals are harmed by the cost of medical care for those who choose not to immunize their children and whose children then contract vaccine-preventable disease. A parent's refusal to immunize his or her child also raises an important question of justice that has been described as the problem of “free riders.”14–16 Parents who refuse immunization on behalf of their children are, in a sense, free riders who take advantage of the benefit created by the participation and assumption of immunization risk or burden by others while refusing to participate in the program themselves. The decision to refuse to immunize a child is made less risky because others have created an environment in which herd immunity will likely keep the unimmunized child safe. These individuals place family interest ahead of civic responsibility. Although such parents do reject what many would consider to be a moral duty, coercive measures to require immunization of a child over parental objections are justified only in cases in which others are placed at substantial risk of serious harm by the parental decision. Compulsory immunization laws in the United States have been upheld repeatedly as a reasonable exercise of the state's police power in the absence of an epidemic or even a single case.17,18 They also have been found to be constitutional even for cases in which the laws conflict with the religious beliefs of individuals.19 When others are placed at substantial risk of serious harm, the range of choices of the individual may be restricted. With regard to immunization, the key question becomes whether the harms associated with unimmunized individuals are great enough to make restrictions permissible. In times of epidemic disease, when an effective vaccine can end the epidemic and protect those individuals who have not yet contracted the disease, the answer clearly is yes. In a highly immunized population in which disease prevalence is low, the risk of disease from the small number of children who remain unimmunized does not usually pose a significant-enough health risk to others to justify state action.20 Diseases with very high morbidity and mortality (such as smallpox), however, might create a situation in which even a single case of infection would justify mandatory immunization of the population. For most routine vaccines, less forcible alternatives can be used justifiably to encourage parents to immunize children because of the public health benefit. In the case of vaccines routinely recommended for children, the AAP supports the use of appropriate public health measures, education, and incentives for immunization.7 Because unimmunized children do pose a risk to other children who lack immunity to vaccine-preventable infections, the AAP also supports immunization requirements for school entry. RESPONDING TO PARENTS WHO REFUSE IMMUNIZATION FOR THEIR CHILDREN What is the pediatrician to do when faced with a parent who refuses immunization for his or her child? First and most important, the pediatrician should listen carefully and respectfully to the parent's concerns, recognizing that some parents may not use the same decision criteria as the physician and may weigh evidence very differently than the physician does.21 Vaccines are very safe, but they are not risk free; nor are they 100% effective.22 This poses a dilemma for many parents and should not be minimized. The pediatrician should share honestly what is and is not known about the risks and benefits of the vaccine in question, attempt to understand the parent's concerns about immunization, and attempt to correct any misperceptions and misinformation.23–25 Pediatricians should also assist parents in understanding that the risks of any vaccine should not be considered in isolation but in comparison to the risks of remaining unimmunized. For example, although the risk of encephalopathy related to the measles vaccine is 1 in 1 million, the risk of encephalopathy from measles illness is 1000 times greater.22 Parents can also be referred to one of several reputable and data-based Web sites for additional information on specific immunizations and the diseases they prevent (see pages 52 and 53 of the Red Book25 for a list of Internet resources related to immunization). Many parents have concerns related to 1 or 2 specific vaccines. A useful strategy in working with families who refuse immunization is to discuss each vaccine separately. The benefits and risks of vaccines differ, and a parent who is reluctant to accept the administration of 1 vaccine may be willing to allow others. Parents also may have concerns about administering multiple vaccines to a child in a single visit. In some cases, taking steps to reduce the pain of injection, such as those suggested in the Red Book,26 may be sufficient. In other cases, a parent may be willing to permit a schedule of immunization that does not require multiple injections at a single visit. Physicians should also explore the possibility that cost is a reason for refusing immunization. For a parent whose child does not have adequate preventive care insurance coverage, even the administrative costs and copayments associated with immunization can pose substantial barriers. In such cases, the physician should work with the family to help them obtain appropriate immunizations for the child. For all cases in which parents refuse vaccine administration, pediatricians should take advantage of their ongoing relationship with the family and revisit the immunization discussion on each subsequent visit. As respect, communication, and information build over time in a professional relationship, parents may be willing to reconsider previous vaccine refusals. Continued refusal after adequate discussion should be respected unless the child is put at significant risk of serious harm (as, for example, might be the case during an epidemic). Only then should state agencies be involved to override parental discretion on the basis of medical neglect. Physician concerns about liability should be addressed by good documentation of the discussion of the benefits of immunization and the risks associated with remaining unimmunized. Physicians also may wish to consider having the parents sign a refusal waiver (a sample refusal-to-immunize waiver can be found at www.cispimmunize.org/pro/pdf/RefusaltoVaccinate_2pageform.pdf). In general, pediatricians should avoid discharging patients from their practices solely because a parent refuses to immunize his or her child. However, when a substantial level of distrust develops, significant differences in the philosophy of care emerge, or poor quality of communication persists, the pediatrician may encourage the family to find another physician or practice. Although pediatricians have the option of terminating the physician-patient relationship, they cannot do so without giving sufficient advance notice to the patient or custodial parent or legal guardian to permit another health care professional to be secured.27 Such decisions should be unusual and generally made only after attempts have been made to work with the family. Families with doubts about immunization should still have access to good medical care, and maintaining the relationship in the face of disagreement conveys respect and at the same time allows the child access to medical care. Furthermore, a continuing relationship allows additional opportunity to discuss the issue of immunization over time. Committee on Bioethics, 2003–2004 Jeffrey R. Botkin, MD, MPH, Chairperson Douglas S. Diekema, MD, MPH G. Kevin Donovan, MD, MLA Mary E. Fallat, MD Eric D. Kodish, MD Steven R. Leuthner, MD, MA Marcia Levetown, MD Christine E. Harrison, MD Canadian Paediatric Society Marcia Levetown, MD American Board of Pediatrics Arlene Morales, MD American College of Obstetricians and Gynecologists Alison Baker, MS The guidance in this report does not indicate an exclusive course of treatment or serve as a standard of medical care. Variations, taking into account individual circumstances, may be appropriate. - ↵Bonanni P. Demographic impact of vaccination: a review. Vaccine.1999;17(suppl 3) :S120– S125 - ↵Davies P, Chapman S, Leask J. Antivaccination activists on the World Wide Web. Arch Dis Child.2002;87 :22– 25 - ↵American Academy of Pediatrics, Division of Health Policy Research. Periodic Survey of Fellows No. 48: Immunization Administration Practices. Elk Grove Village, IL: American Academy of Pediatrics; 2001 - ↵Buchanan AE, Brock DW. Deciding for Others: The Ethics of Surrogate Decision Making. New York, NY: Cambridge University Press; 1990 - ↵American Academy of Pediatrics, Committee on Bioethics. Informed consent, parental permission, and assent in pediatric practice. Pediatrics.1995;95 :314– 317 - ↵Pertussis vaccine. Br Med J (Clin Res Ed).1981;282 :1563– 1564 - ↵Fox JP, Elveback L, Scott W, Gatewood L, Ackerman E. Herd immunity: basic concept and relevance to public health immunization practices. Am J Epidemiol.1971;94 :179– 189 - ↵Gellin BG, Maibach EW, Marcuse EK. Do parents understand immunizations? A national telephone survey. Pediatrics.2000;106 :1097– 1102 - ↵Wing KR. The Law and the Public's Health. 3rd ed. Ann Arbor, MI: Health Administration Press; 1990 - ↵Ball LK, Evans G, Bostrom A. Risky business: challenges in vaccine risk communication. Pediatrics.1998;101 :453– 458 - ↵McMenamin JP, Tiller WB. Children as patients. In: American College of Legal Medicine. Legal Medicine: Legal Dynamics of Medical Encounters. 2nd ed. St Louis, MO: Mosby Year Book; 1991:282–317 - ↵Jacobson v Massachusetts, 197 US 11 (1905) - Pattison S. Ethical debate: vaccination against mumps, measles, and rubella: is there a case for deepening the debate? Dealing with uncertainty. BMJ.2001;323 :840 - ↵American Academy of Pediatrics. Parental misconceptions about immunization. In: Pickering LK, ed. Red Book: 2003 Report of the Committee on Infectious Diseases. 26th ed. Elk Grove Village, IL: American Academy of Pediatrics; 2003:50–53 - ↵American Academy of Pediatrics. Managing injection pain. In: Pickering LK, ed. Red Book: 2003 Report of the Committee on Infectious Diseases. 26th ed. Elk Grove Village, IL: American Academy of Pediatrics; 2003:20–21 - ↵American Medical Association, Council on Ethical and Judicial Affairs. Termination of the physician-patient relationship. In: Code of Medical Ethics: Current Opinions. 2002–2003 ed. Chicago, IL: American Medical Association; 2002:110 - Copyright © 2005 by the American Academy of Pediatrics
<urn:uuid:ced524b2-c733-4219-bd43-35cb0b85c845>
CC-MAIN-2019-22
https://pediatrics.aappublications.org/content/115/5/1428?ijkey=23498da073a5d581ad020a028c88a969361c9b38&keytype2=tf_ipsecsha
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257259.71/warc/CC-MAIN-20190523143923-20190523165923-00342.warc.gz
en
0.943081
4,015
2.703125
3
The California gold rush turned out to be a welcome gift to the Union cause in the 1860s. Gold was discovered at Sutter’s Mill in the foothills of the Sierra Nevadas in 1848 and silver and gold in the Comstock Lode on the other side of the Sierra Nevadas in 1859. And while Abraham Lincoln’s administration had its share of financial problems, precious metals from the West helped keep Northern banks solvent during a protracted, bloody—and expensive—Civil War and reassured an anxious public that the United States would be able to pay its debts. With the Transcontinental Railroad some years in the future, the Union faced the problem of getting the gold and silver to banks in the East. By stagecoach it went as far as San Francisco, where it was loaded onto Pacific steamers bound for Panama, carried by railroad across the isthmus, and loaded onto Atlantic steamers for the final leg of the journey. The Confederacy—considerably smaller, agrarian, and suffering a Union naval blockade—enjoyed no such windfall. While capable of stunning victories on the battlefield—at least in the early days of the war—the state of its treasury remained, to say the least, abysmal. The government had no choice but to try to shore up Confederate finances by printing money…and attempting to commandeer Union treasure whenever possible. In February 1862, a Confederate army invaded New Mexico Territory. The advance into New Mexico Territory (today’s New Mexico and Arizona) under Brig. Gen. Henry Sibley had several ambitious goals, among them claiming the New Mexico Territory and California for the Confederacy, annexing parts of Mexico, and establishing a presence on the Pacific coast to mitigate the Union blockade of Southern ports. Of particular importance was access to the gold and silver mines in the Western states, especially those of California, Colorado, and Nevada. Setting out from Fort Bliss, Texas, and moving up the Rio Grande, Sibley’s badly provisioned forces faced a dry and unforgiving environment and planned to rely on captured Union provisions. They were able to win the field against Union Colonel Edward Canby at the Battle of Valverde on February 20-21, but sustained considerable casualties and were unable to take Fort Craig with its storehouses of supplies. Continuing the advance—with a Union fort at their rear—the Confederates won another tactical victory at the Battle of Glorieta Pass against Union Colonel John Slough on March 26-28, but their supply train was destroyed and, again, casualties were unacceptably high. Having no choice, the now demoralized and starving troops retreated down the Rio Grande to Texas, pursued by the combined forces of Canby and Colonel Gabriel Paul (who had replaced Slough). Of an initial force of about 2,500 troops, only about 1,500 returned. Despite its tactical successes, the New Mexico Campaign was a dismal failure, effectively thwarting Southern ambitions in the West. With the rich gold and silver mines out of reach, the only course left was to try to confiscate Union treasure in transit. On December 7, 1862, the Confederate raider Alabama captured the Union steamer Ariel east of Cuba. Captain Raphael Semmes had been cruising the Caribbean, looking for the Champion, a ship bound from Panama to New York—and likely carrying a shipment of gold—but the expected ship had been delayed, so he settled for Ariel, which was sailing in the opposite direction. Ariel’s passengers included a number of ladies and a company of U.S. Marines bound for San Francisco. According to Semmes: But Fortune, after all, had played us a scurvy trick. The Ariel was indeed a California steamer, but instead of being a homeward-bound steamer, with a million of dollars in gold, in her safe, I had captured an outward-bound steamer, with five hundred women and children on board! This was an elephant I had not bargained for, and I was seriously embarrassed to know what to do with it. The soldiers were disarmed and paroled, and Ariel as released for a promise of $250,000 to be paid to the Confederate government in the form of a ransom-bond signed by Ariel’s Captain Jones on behalf of the owner, Commodore Cornelius Vanderbilt. Alabama made off with $8,000 in Treasury notes and $1,500 in silver, but the hoped-for millions of dollars in gold remained elusive. On March 15, 1863, an attempt was made to provision and launch a ship in San Francisco Bay as a Confederate privateer. Asbury Harpending, a young man from Kentucky and an avid Confederate sympathizer, having made his fortune in the gold fields of California and Mexico, turned his efforts to supporting the Confederate cause. In his words: The idea of interrupting the gold shipments by the Pacific Mail, very essential to the Government at Washington, again took form. This was to be effected by seizure on the high seas. A number of prominent men were interested and I was requested to become one. From California, Harpending traveled to Virginia via Mexico. Boarding a blockade runner in Vera Cruz and evading the Union blockade of Charleston, he made his way to Richmond, where he obtained an audience with President Jefferson Davis and Secretary Judah Benjamin. His plan approved, he received letters of marque—and claims to have been commissioned a captain in the Confederate Navy despite his lack of naval experience. Returning to California in July 1862, Harpending—along with Southern partisans Ridgley Greathouse and Alfred Rubery (the latter a wealthy young Englishman)—secretly purchased the ship J.M. Chapman and outfitted it with cannons and ammunition. They acquired small arms and hired a crew of 15–20 Confederate sympathizers. William Law was signed on as captain and Lorenzo Libby as mate. Harpending had misgivings that Law was hired: He was the possessor of a sinister, villainous mug, looked capable of any crime, and all in all was the most repulsive reptile in appearance that I ever set eyes on. Unknown to Harpending, the federal authorities in San Francisco had learned of the plot and Chapman was being watched. On the night of March 14, 1863, with plans to sail the next morning, all but Law boarded the ship. They woke up on the 15th to find themselves in the gunsights of the nearby U.S. man-of-war Cyane with several boats of officers and Marines approaching, along with a tugboat of San Francisco police. Rubery, Greathouse, and Harpending were arrested and tried in the U.S. Circuit Court and convicted of treason, with Law and Libby turning state’s evidence. Each of the three was sentenced to 10 years imprisonment and a fine of $10,000, although the sentences were never carried out. Rubery, a British citizen with an influential uncle, was pardoned by Abraham Lincoln. Harpending and Greathouse, benefitting from Lincoln’s amnesty of December 8, 1863, each took an oath of allegiance and were released. And Chapman never sailed for the Confederacy. With General Robert E. Lee’s defeat at the Battle of Gettysburg and the fall of Vicksburg in July 1863, the tide of war had turned in the Union’s favor. And the Confederacy’s continuing efforts to obtain Union gold were no more effective. On the night of June 30, 1864, Rufus Henry Ingram led a party of six Confederate guerrillas in a rogue operation to rob two stagecoaches carrying gold and silver from the Comstock Lode. Ingram had fought as a guerrilla under William Quantrill in Missouri and had participated in the infamous attack on Lawrence, Kan., on August 21, 1863, where the men and boys of the Union town were massacred. In California, he organized a group of Confederate sympathizers that came to be known as Captain Ingram’s Partisan Rangers. Included among them was Tom Poole, who had been one of the Confederate crew on Chapman. The robbery took place on the road from Virginia City, in Nevada Territory, to Placerville, Calif., at a bend in the road 14 miles east of Placerville—a location later dubbed Bullion Bend. The six partisans were masked and heavily armed. Two stagecoaches were stopped—the first driven by Ned Blair, the second by Charley Watson. Each carried 14 passengers and four bags of gold and silver bullion from the Comstock Lode worth about $26,000 and weighing about 250 pounds. The second coach carried an additional $700 in coin. As Blair’s coach was sent on its way, a parting shot from a passenger who turned out to be a Virginia City police officer did little more than scare the horses. The passengers were treated with the utmost courtesy. Shortly after the first coach had departed, Ingram addressed those on the second coach as follows: “Gentlemen, I will tell you who we are. We are not robbers, but a company of Confederate soldiers. Don’t act foolish. We don’t want anything of the passengers. All we want is Wells, Fargo and Co.’s treasure, to assist us to recruit for the Confederate Army.” Ingram presented the driver with the following receipt: This is to certify that I have received from Wells, Fargo, & Co, the sum of $_____ , cash, for the purpose of outfitting recruits enlisted in California for the Confederate States Army. R. HENRY INGRAM, Capt. Com’g Co., C. S. A. The blank sum was never filled in. The guerrillas allowed the second coach to proceed and buried the stolen bullion, taking for immediate expenses some gold dust, two silver bars, and the coin. When the stagecoaches arrived in Placerville with news of the holdup, El Dorado County Sheriff William Rogers organized a posse. Two of their number, Deputy Joseph Staples and Constable George Ranney, encountered the six robbers at the Somerset House, five miles from Pleasant Valley. An ill-advised attempt at arrest led to a shootout in which Staples was killed and Ranney injured. Tom Poole was injured as well. Leaving Poole, the rest of the gang escaped. Subsequently, Rogers arrived with the remainder of the posse and arrested Poole, who confessed and revealed where the bullion was buried. Ingram did not stop with the Bullion Bend robbery. On July 14, the remaining five guerrillas gathered at Edward Hill’s ranch outside San Jose, planning to ambush another stagecoach on its way to the New Almaden Mines with a sizable payroll. Telling Hill they were waiting for friends, they asked to stay the night. Hill learned of their plans and managed to get word to Captain John H. Adams, sheriff of Santa Clara County. Adams organized a posse and surrounded the house where the guerrillas were staying. In the ensuing shootout, Adams and another posse member were wounded, two of the outlaws were mortally wounded, and one, Alban H. Glasby, surrendered. Ingram and George Baker escaped. Poole and Glasby were tried in Placerville, along with several associates who had not actually participated in the robberies. Glasby, having turned state’s evidence, was freed. Poole was convicted for his part in the murder of Deputy Joseph Staples and, after an unsuccessful appeal to the California Supreme Court, hanged on September 29. Ingram and George Baker were never apprehended, but the gold and silver were recovered and never used to benefit the Confederate cause. On November 10, 1864, a company of Confederate adventurers attempted to seize the steamer Salvador in the Pacific Ocean off Panama. Stephen Mallory, Confederate Secretary of the Navy, had authorized Acting Master Thomas E. Hogg to lead an expedition to board a Union steamer in Panama as passengers, smuggle arms on board, and commandeer the ship in the name of the Confederate States of America with the intent of fitting it with arms and using it to attack Union shipping in the Pacific. Mallory instructed him: Having secured the steamer, organized your crew, and hoisted the flag of the Confederate States, you will adopt prompt measures to arm your vessel and proceed to cruise against the enemy of the Pacific. He went on to make it clear that one of the goals was the acquisition of Union gold: You will endeavor to strike a blow at the California trade and whalemen in the Pacific, and should you capture bullion, it is suggested that, if no better means for shipping it to Europe offers, you place it in the hands of a British merchant of established character at Valparaiso. A French man-of-war might receive it on board in freight for France. Hogg’s entire crew numbered 16–20 adventurers. The expedition set out from Wilmington, N.C. Some of the party joined from Havana and some from St. Thomas, intending to rendezvous in Aspinwall, Panama (today’s Colón). There appears to have been a leak in Havana, as the plot became known to Thomas Savage, U.S. Acting Consul-General, who raised the alarm. Union officials allowed the plan to proceed, intending to catch the conspirators in the act. When Hogg and six associates with hidden arms and incriminating documents boarded the steamer Salvador as passengers, they were summarily arrested off Panama by sailors from the nearby U.S. flagship Lancaster. Hogg and his crew were tried by a military commission in San Francisco, found guilty of “violation of the laws and usages of civilized war,” and sentenced to hang. Major General Irvin McDowell reduced the sentences to life imprisonment for Hogg and 10 years each for his six crew members. These sentences were later commuted by President Andrew Johnson and Hogg and his crew were all released. And, probably for the last time, Confederate efforts to obtain Union treasure were foiled. In the end, attempts to shore up the shaky finances of the Confederate States by preying on Union treasure were utterly unsuccessful. The New Mexico Campaign was probably the only effort that had had a serious chance of affecting outcome of the Civil War. After its failure, the Confederacy’s only recourse was to try to commandeer the Union gold by what amounted to individual acts of piracy and theft. All failed. Indeed, even had these efforts been successful, they would have been little more than pinpricks to the Union and not likely to make a critical difference to the Confederate Treasury. After the summer of 1863, Southern fortunes began to crumble, culminating in Lee’s surrender in the spring of 1865. And the sorry state of Confederate finances with the consequent inflation and waning confidence played no small part in its ultimate—some would say inevitable—defeat. Daniel Seligman is a retired engineer from Massachusetts with a lifelong interest in the American West. He teaches seminars on Western gunslingers and has authored a number of articles on Western history, including Wild West magazine. This article first appeared in America’s Civil War magazine Facebook @AmericasCivilWar | Twitter @ACWMag Daniel Seligman July 28, 2022 at 08:38PM
<urn:uuid:e355ffbc-1ca2-4140-b4bb-7ebbfd7ab9a7>
CC-MAIN-2022-33
https://goodhumanclub.com/going-for-gold-how-the-confederacy-hatched-an-audacious-plan-to-finance-their-war/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00405.warc.gz
en
0.977268
3,188
3.640625
4
By Pierre Kosmidis Text, photos and additional information by Dan Farnhham, used by permission An E14Y1 submarine-launched seaplane, code named “Glen” by the Allies, is the only enemy aircraft to have ever bombed the continental U.S., albeit with minimal damage caused. Researcher, author and scuba diver Dan Farnham has managed, after a painstaking process and after numerous dives, to identify two such aircraft wrecks, deep inside the cargo holds of the 4,600-ton Japanese freighter Akibasan Maru, which was at anchor just off Kwajalein Island on January 30, 1944 when U.S. carrier planes struck during Operation Flintlock. The ship took two bomb hits and sank within 15 minutes. Dan Farnham explains, via www.ww2wrecks.com, the story behind the seaplane that remained in history, as well as the identification of two E14Y1 “Glens” in a shipwreck off Kwajalein island. Before the invention of radar, the limited range of observation on the surface was one of the biggest problems for submarine captains. When cruising on the surface, the limit of sight was usually six miles, mostly because submarine hulls sat low in the water by design. Submarine captains needed a way to extend their range of observation, both to spot enemy ships sooner and also to give earlier warning of any pending attack on their own vessel. One of the more unique ideas was basing aircraft on submarines. In the years between World War I and World War II, several nations experimented with the concept of submarine-borne aircraft. The United States, Germany, Japan, Britain, and France all experimented with the idea, and several specialized aircraft were developed in the course of the tests. Several submarines were converted for aircraft operations, which included experiments on the best method to transport the aircraft. Most of the nations that conducted such tests, however, dropped the experiments and never progressed to the point of putting the concept into operational use. The exception was Japan. Naval leaders in Tokyo were quick to recognize the value of submarine-based reconnaissance aircraft that could be used over the vast expanses of the Pacific. The Japanese Navy tested two purpose-built planes to gain experience in operating aircraft from submarines, and to test various methods for transporting the planes. In 1938, a third design request was issued by the Japanese naval headquarters. Designed by the 1st Naval Aircraft Technology Arsenal (known in short as Kugisho) and the Watanabe Company and built at the Yokosuka Naval Arsenal, the new Navy Type 0 Small Reconnaissance Seaplane Model 11 was first completed in 1939, and given the designation E14Y1. The “E” was the project letter given by the Japanese Navy to reconnaissance seaplanes, the ‘14’ meant it was the 14th type of reconnaissance seaplane accepted into service by the Japanese Navy, the ‘Y’ indicated it was built at the Yokosuka Naval Arsenal, and the ‘1’ indicated it was the first major production version of the plane. Later, under the Allied codenaming system in use beginning in 1942, the plane was given a male name because it was a reconnaissance seaplane, and the name chosen for the E14Y1 was ‘Glen’. The Glen had a mixed construction of welded steel-tube fuselage with fabric, wood and light-alloy covering. The wings were fabric-covered with light metal spars and wooden ribs. It was powered by a Hitachi 340-horsepower radial engine, driving a two-blade fixed-pitch wooden propeller. The fuselage had a length of 28 feet, and it had a wingspan of just over 36 feet. The Glen could carry a 130-pound bomb under each wing, and it had a single 7.7mm machine gun on a flexible mount in the rear cockpit for defense. It had a top speed of 158mph and a range of 548 miles. The Glen carried a crew of two consisting of a pilot and an observer in tandem enclosed cockpits. Twelve prototypes were built for testing, and after improvements were made to the initial design, 352 production aircraft were ordered. But only 126 aircraft were completed, and the Glen would be the most numerous type of submarine-based aircraft ever manufactured by any nation. The Glens were carried aboard specially modified I-class submarines, in a watertight hangar in front of the conning tower. The planes were disassembled when stored in the hangar. When the submarine surfaced, the hangar was opened up, the plane was winched out and the floats and wings were attached to the fuselage, and the tail unfolded. The plane was then launched from the deck by a catapult. A well-trained and experienced deck crew could have the plane launched in just six and a half minutes after the submarine surfaced. At the conclusion of its mission, the Glen would land alongside the submarine and a collapsible deck crane would hoist the plane back on board. The plane would be disassembled and placed back into the hangar, and afterward the submarine would submerge. The Glen went into operational service in 1941. The first action was an over-flight of Pearl Harbor just 10 days after the devastating attack of Dec. 7, 1941. In early 1942, Glens performed reconnaissance over-flights of Hobart, Melbourne and Sydney in Australia. Glens also scouted Suva in Fiji, and Wellington and Auckland in New Zealand. But the actions that would assure the Glen’s place in history took place near the coast of Oregon State, in the United States. On September 9, 1942, a Glen piloted by Warrant Officer Nobuo Fujita flew from the submarine I-25 and dropped a pair of bombs near Mt. Emily, outside of Brookings in southern Oregon. The plane was spotted by U.S. Forest Service lookouts, who also spotted smoke where the bombs had impacted. Several men rushed to the scene and the small fire was quickly brought under control and extinguished. Fragments from the bomb casings were also found at the scene. On September 29th, just 20 days after the first attack, Fujita flew a second mission in his Glen and dropped bombs in the forest near Grassy Knob, east of Cape Blanco and about 45 miles northwest of Brookings. The intent for both attacks was to start a forest fire that would hopefully rage out of control and consume entire towns, and create panic in the population on the west coast. They were also intended as revenge for the ‘Doolittle Raid’ earlier that year in April when American B-25 ‘Mitchell’ bombers struck several targets in Japan. But the rains had come early that year, and the forest was wet. The incendiary bombs dropped by Fujita in both attacks failed to start any significant fires. Those two attacks remain the only time in U.S. history where an enemy airplane has dropped bombs on the continental United States. Nobuo Fujita survived the war, and later made three visits to Brookings. During his first visit, in May 1962, Fujita presented his family’s samurai sword to the City of Brookings as a gesture of international peace and goodwill, and also as a symbol of peacemaking between former enemies. The sword had been in his family for over 500 years. It is on display today in the Chetco Community Public Library in Brookings. The site of the first bombing near Mt. Emily was re-discovered in August 1972. Today it is possible to hike to the bomb site. A trail marker located outside Brookings indicates the way, and at the bomb site itself there is a memorial marker and information displays. The site of the second bombing has never been found. Among the World War II Japanese shipwrecks in the Kwajalein Atoll lagoon, is the 4,600-ton freighter Akibasan Maru. It was at anchor just off Kwajalein Island on January 30, 1944 when U.S. carrier planes struck during Operation Flintlock. The ship took two bomb hits and sank within 15 minutes. The wreck was discovered in 1965, not very long after scuba diving was introduced to Kwajalein. The identity of the ship was verified when the ship’s bell was recovered. Airplane parts were found in cargo holds 1, 2, and 5, but the exact identity of the plane parts would remain a mystery for another 43 years. A book published in 1992, called “World War II Wrecks of the Kwajalein and Truk Lagoons”, stated that the plane parts were likely spares for H6K ‘Mavis’ flying boats which were based at nearby Ebeye Island. A video produced in 2005, called “The Silent Wrecks of Kwajalein Atoll”, speculated that the plane parts belonged to a “Rufe” fighter seaplane. Both would turn out to be incorrect. In March 2008, I was talking to a couple of other Kwajalein divers, and they told me about the plane parts in the cargo holds of the ship. When I asked what type of planes they were, the answer was “Don’t know. There’s just frameworks remaining, so it’ll probably never be known for sure”. So, I decided to go have a look for myself, and at the end of March I made what would be the first of 29 dives on the Akibasan Maru wreck specifically to photograph the plane parts. First I took photos of the wings in cargo hold 1 of the shipwreck, and posted them to a website called j-aircraft.com, a website run by several experts on WWII Japanese aircraft. The wings were quickly identified as belonging to a Glen. Before this, I only had a vague recollection of reading once about a bombing attack carried out by a Japanese plane in Oregon during the war, and I had never read much about it. So I knew very little about the topic. That would change very quickly. The identification of the Glen wings caused quite a stir in several aviation history web sites, and within a week the Smithsonian Air & Space Museum in Washington, D.C. sent me photocopy of a Glen pilot manual which had been captured on Saipan during the war. The manual contains diagrams and drawings of all parts of the Glen. Throughout the next few months, I continued diving the shipwreck to photograph the plane parts. Using the manual to compare the diagrams to my dive photos, I determined that there are enough parts for two Glens in the Akibasan Maru. Besides the wings in cargo hold 1, there are four floats and two fuselages in cargo hold 2, and two more wings in cargo hold 5. These two Glens were scheduled for delivery to the Dai 6 Sensuikan Kichi tai (6th Submarine Base Unit) at Kwajalein. The plane parts had finally been identified for what they are. And the timing of the discovery was fortunate in another aspect as well- at the same time the identifications were being made, I found out that there was a book being written specifically about the Glen. The co-authors were Ryusuke Ishigiro from Japan, and Tadeusz Januszewski from Poland. Ryusuke contacted me and invited me to join the project, and I wrote the underwater wreck chapter for the book. The chapter includes 30 of the photos I shot of the Glen parts. The book is named Kugisho E14Y Glen: The aircraft that bombed America, and it was released by MMP Books in December 2012. At the same time I began working on the book project with Ryusuke and Tadeusz, I also became friends via email with Oregon resident Bill McCash. Bill had finished the third edition of his book, Bombs Over Brookings, not long before. His book is also essential reading for anyone interested in a full history of the attacks, and the events afterwards. Bill joined in to help with the Glen book project as well. It was an absolute thrill beyond words to make that discovery! Until those plane parts had been identified, the Glen had been thought to be a completely extinct type. Those two Glens are the only ones that have been found anywhere in the world since the end of World War II. Besides the thrill of the discovery, it was also a tremendous privilege to become friends with Ryusuke, Tadeusz and Bill and join with them to produce the definitive book of the Glen’s history. The book filled an important gap in the history of World War II aviation and submarine operations. And I also owe a big thanks to my friends who did all those dives with me on the Akibasan Maru wreck, while I was getting the photos needed for the identification of the aircraft parts- Mike Woundy (who did the most dives with me of anyone during that project), Nicki Hickmon, Al Christ, Marty Bazar, Valerie Bazar, Hal Parker, Jeff Timmerman, John Hadley, Chris LeBlanc, Melissa Haislip, Misty Shoemaker, Ryan Vahle, and Stewart Bell. It truly was a team effort. Today, the wrecks are showing the effect of 75+ years of immersion in warm saltwater. The Glen components, and the Akibasan Maru, are deteriorating. The Glen fuselage that was leaning up against the side of cargo hold #2 has fallen apart, and sections of the shipwreck are collapsing. Within perhaps the next 20 years, the shipwreck will be nothing more than a pile of rubble, and the Glens will be buried forever. Recommended additional reading: Kugisho E14Y Glen: The Aircraft That Bombed America, by Ryusuke Ishiguro and Tadeusz Januszewski, MMP Books, 2012 Bombs Over Brookings, Third Edition, by William McCash, Taxus Baccata Books, 2009 The Lookout Air Raid, Wreck Diving Magazine, issue #25, 2014 Japanese Submarine Aircraft, by Tadeusz Januszewski, MMP Books, 2002
<urn:uuid:9af17b78-7bbb-4203-818a-398a992a63e2>
CC-MAIN-2019-22
http://www.ww2wrecks.com/portfolio/the-ww2-pacific-treasures-of-kwajalein-lagoon-by-dan-farnham-part-2-warrant-officer-nobuo-fujita-the-only-man-who-has-bombed-the-continental-us-and-the-story-of-the-e14y1-floatplanes-found-in-a-shi/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256797.20/warc/CC-MAIN-20190522103253-20190522125253-00182.warc.gz
en
0.978255
2,955
3.28125
3
The selection of suitable specifications play an important role in controlling the cost of construction of the building. However, the choice of specifications should be such that the building remains structurally sound, functionally efficient and durable. Techniques for low cost housing construction is discussed in this article. Low Cost building Construction Techniques and Speedy Construction: Foundations for Low Cost Building Construction The factors which influence the choice of specifications for this item of work are 1. Nature of soil and its bearing capacity. 2. Depth of sub-soil water table. 3. The intensity of load on the main walls. 4. 15 to 20 cm thick lime concrete with 40 mm normal size stone over burnt brick aggregates and 40% mortar comprising of 1 lime : 2 sand/surkhi or 1 lime : 1 surkhi : 1 sand. 5. In case the region is infested with termites, it would be necessary to provide termite proofing treatment in accordance with the IS:6313. 6. In case the sub-soil at the site is moist with high sub-soil water table (1.5 m or less below foundation level). It is necessary to provided bed of cement concrete of richer proportion (to function as a lean concrete bed). 7. In case the building is to be cited on soils of filled up nature or on black cotton soil, it would be necessary to give special treatment to the foundation to ensure safe transfer of load from building to the supporting ground. However, in case of black cotton soil, under reamed pile foundation normally proves to be economical. 8. For single storeyed building the depth of foundation under normal conditions of soil should not be less than 60 cm below ground level. Masonry in Foundation and Plinth Load bearing wall type of construction can have walls made out of bricks or stones. Hence the specifications for this item of work comprise of brick masonry or random rubble masonry in cement mortar 1:8 (1 cement : 8 sand) or in lime mortar 1:2 (1 lime : 2 sand) or in cement lime mortar 1:1:8 (1 cement : 1 lime : 8 sand). Following aspects pertaining to this item need special attention:- 1. In case of multi-storeyed load bearing wall type of construction richer mix of mortar should be used to suit the loading conditions on the masonry. 2. In case the sub-soil at the site is moist with high sub-soil water table (1.5 m or less below foundation level), the masonry should be in cement mortar 1:6 or cement lime mortar 1:2:9. 3. In regions where building stone is available at reasonable cost it is desirable to adopt stone masonry is less effected by sub-soil water. 4. For single storeyed construction the width of the foundation under average soil conditions should not be less than 2 bricks. Damp Proof Coarse (D P C) Damp proof coarse is provided at plinth level of the building to check the rise of moisture from ground to superstructure. The specifications for this item of work depend upon the intensity of rainfall in the area, the depth of sub-soil water table, and the quality and nature of masonry used in the superstructure. Economical specifications for this item of work consist of providing 35 mm thick cement concrete (1:2:4) using 10 mm nominal size stone aggregate and painted on top with one coat of bitumen of penetration 80/100 using bitumen @ 1.7 kg/sqm. Masonry in Superstructure (Load Bearing Wall) Load bearing walls perform the function of carrying the load from roof and upper floors and transmit the same to the soil through foundations. The walls are also required to withstand the wind and seismic forces besides providing thermal comfort against outside temperature, resistance against rain penetration and insulation against noise. The thickness of the wall to be adopted in a particular situation depends upon the strength of the masonry units (bricks, stone, concrete block etc.) to be adopted, type and mix of mortar used, unsupported length and height of the wall (slenderness ratio), location and dimensions of the openings, location of longitudinal and cross wall, intensity of loading on the wall etc. The method of designing the thickness of the walls based on these parameters is given in the National Building Code. The strength of masonry depends on the crushing strength of the building blocks and the type of mortar used in the work. It is observed that under normal conditions and moderate spans (as in case of residences etc.) it is possible to provide one brick thick load bearing wall up-to four storeyed construction. Up-to three storeyed residential buildings one brick thick load bearing wall made out of good quality bricks having crushing strength of 75 kg/sq cm can normally be provided without special treatment. However, in case of 4 to 5 storeyed construction with single brick wall there is possibility that in some walls in ground and first floor the stress developed in masonry may be of the order 9 to 10 kg/sq cm. Such walls should be constructed with first class bricks having crushing strength of 105 kg/sq cm and in cement mortar 1:3 (1 cement : 3 sand). In case, good quality bricks are not available in the area, the thickness of the wall should be designed as per provisions in National Building Code. Under normal conditions brick masonry in superstructure can be constructed in lime mortar 1:2 (1 lime : 2 sand) or ( 1 lime : 1 surkhi : 1 sand) in cement lime mortar 1:1:8 (1 cement : 1 lime : 8 sand) or in cement mortar 1 : 8 (1 cement : 8 sand). In case the building is to be located in an earthquake zone special provision are required are to be made in the brick masonry in the form of lintel band, vertical steel bars at the jambs of openings, corners and junctions of walls. In case of stone masonry wall it is observed that 30 cm thick random rubble masonry wall can safely be provided up-to two storeyed residential quarters. Partition walls are non-load bearing walls which are provided to perform the function of space dividers and to cut off noise. In areas where bricks are easily available , half brick partition walls should be provided in cement mortar 1 :4 (1 cement : 4 sand) with reinforcement comprising of 2 Nos. of 6 mm dia bars at every 4th course and the reinforcement should be bounded and secured at each end adjoining walls. Depending up-on the climatic conditions, building can be have a sloping roof or a flat roof. The roof should be structurally safe, durable and should provide adequate protection against adverse effect of elements like rain, snow, sun and wind etc. It should provide desired insulation against heat and sound and should have efficient water proofing and drainage arrangements. In areas having rainfall or snowfall sloping roof is preferred to flat roof. In other areas flat roof is provided and it has the added advantage that the roof can be used as terrace for sleeping purposes. Sloping roof can be made by use of timber, structural steel or tubular trusses provided with covering of AC sheets or brick tiles etc. Flat roof can be in the form of cast in situ R.C.C slabs or precast units ( cored units, channel units, cellular units, Waffle units, funicular etc.). In case of sloped roof it is necessary to provided false ceiling made out of insulating materials like asbestos sheets, timber, fiber-boards etc., to meet the requirements of thermal comfort. In case of flat roof it is necessary to provide terracing required thermal insulation and for drainage of rain water. Doors and Windows Doors are provided to perform the function of access to a building and for inter-communication between different rooms. The normal height of door is taken as 2 m and its width varies from 80 cm (for bath room and WC,) to 90 cm for other rooms in residences. In case of public buildings the normal width of door can be up-to 12 m. Windows serve the purpose of providing light, ventilation and vision. The area of windows varies from 10 to 15% of the floor area for buildings in hot and arid regions. In case of humid climate it is necessary to provide excessive ventilation to meet requirements of comfort and as such the area of windows in such regions should vary from 15 to 20% of the floor area. Filling in Plinth The function of filling in plinth is to raise the height of the ground floor above the level of the outside ground with a view to prevent ingress of dampness in the ground floor. Under normal conditions the plinth in filled with excavated earth and finished with 15 cm thick layer or sand on top. This layer serves the base on which the layer of base concrete under ground floor is laid. A plinth height of 45 cm is considered adequate for normal construction. Flooring is provided to have hard, durable smooth, easy to clean, impervious and dust free surface and the materials used in flooring should be strong enough to resist its wear and tear that take place during use. The treatment to flooring for the ground floor is some what different to that for intermediate floor or structural floor. In case of ground floor the water from adjacent ground is liable to rise up by capillary action and make the floor damp. The specification for the floor should therefore be such that the flooring remains free from dampness. It is normal to provide a layer of base concrete under ground floor over 15 cm layer of sand over earth filling in plinth. Terracing treatment is given over flat roofs to perform the combined function of providing thermal insulation and water proofing simultaneously. It is necessary to provide the layer of terracing materials in slope varying from 1 : 48 to 1 : 60 so as to ensure quick disposal of the rain water. Prior to laying terracing the top of the roof slab is painted with layer of bitumen of penetration 80/100 using 17 kg bitumen for every sq.m. area and impregnated with a coat of coarse sand @ 60 dm³/10 sqm.
<urn:uuid:88b2d0af-c652-43aa-bfb9-f190d282a3c5>
CC-MAIN-2019-22
https://www.thepassionateseeker.com/specifications-for-low-cost-building-constructions/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256215.47/warc/CC-MAIN-20190521022141-20190521044141-00142.warc.gz
en
0.907347
2,108
2.703125
3
Patient Care - Gather data; order diagnostic tests; interpret data; make decisions; perform procedures; manage patient therapies; work with others to provide patient-focused care Medical Knowledge - Fund of knowledge; active use of knowledge to solve medical problems Practice-Based Learning & Improvement - Analyze practice performance and carry out needed improvements; locate and apply scientific evidence to the care of patients; critically appraise the scientific literature; use the computer to support learning and patient care; facilitate the learning of other health care professionals Interpersonal & Communication Skills - Develop a therapeutic relationship with patients and their families; use verbal and non-verbal skills to communicate effectively with patients and their families; work effectively as a team member or leader Professionalism - Demonstrate integrity and honesty; accept responsibility; act in the best interest of the patient; demonstrate sensitivity to patients' ethnicity, age, and disabilities Systems-Based Practice - Demonstrate awareness of interdependencies in the health care system that affect quality of care; provide cost-effective care; advocate for quality patient care; work with hospital management and interdisciplinary teams to improve patient care Anatomic or animal models - Form of low-tech simulation; performance of procedures using non-computerized 3-dimensional anatomic models that replicate properties of human anatomical structures is observed and assessed concurrently (direct observation). May be used to identify learning gaps and to provide evidence of improvement. Direct observation - Assessor watches a clinical encounter and assesses performance (same day) using a rating tool specific for the type of encounter (e.g., procedure, physical exam, patient interview, etc.). Direct observation is used as part of other assessment methods, e.g., simulations and OSCE’s. Examples of rating tools are communication checklists (e.g. SEGUE), technical/procedure skills forms (e.g. OSATS, DOPS), clinical encounter forms (e.g., mini CEX). Formal oral examination - Examiner asks a list of questions in a prepared format about what to do in a clinical scenario presented verbally or role played by the examiner; criteria for evaluation are preset in right/wrong format. High stakes oral exams may be videotaped for documentation purposes. Global assessment - Rating of overall functioning of resident during a specified time period on a continuum from low to high (specific rating anchors vary) across one or more performance domains; performance descriptors may vary from a single word to multiple sentences. Alternate name for this method is “clinical performance rating.” Global assessments are not specific enough to be used to provide specific feedback to improve resident performance. In-house written examination - Exam (usually multiple-choice) developed by local (program) faculty; may be administered in either paper or computer format. Since validity and reliability is usually low, these should not be used for high stakes decisions (pass-fail or promotion). In-training examination - Exam (usually multiple choice) developed by an external vendor; may be administered in either paper or computer format. Validity and reliability will vary depending on the vendor; most ITE’s are intended to be used only for self assessment, program evaluation, and to identify remediation needs. Multisource assessment - Rating of performance/development from multiple points of view, including two or more of the following: supervisor, peer, subordinate, patient, self. MSA is a limited form of 360-degree assessment. A 360-degree assessment must include all relevant raters, including self-assessment. Objective structured clinical examination - Consists of several short (5-10 minute) stations; each station is a carefully designed and replicated (standardized) clinical situation (may involve a simulated patient, anatomical models, data interpretation, or other clinical task) and standardized rating tools (standard questions and marking scheme) intended to enable a fairer comparison of peers and assessment of complex procedures without endangering a real patient’s health or safety. Oral Examination - May involve one or more examiners simultaneously; questions are less structured and evaluations are usually more subjective. Criteria for answers are often less exact and value is often added for problem solving analysis and method, as well as interpersonal communication and presentation. Since validity and reliability is usually low, informal oral exams should not be used for high-stakes decisions (pass-fail or promotion). Patient survey - Intended to record the patient perspective of a clinical encounter (could be one part of a multisource assessment). If used to assess resident performance, patient surveys must be carefully designed and administered so that aspects of the clinical encounter not under the resident’s control (e.g., parking, registration, billing, etc.) do not affect the rating scores and so that the patient is rating the correct care provider. Practice/billing audit - Review of billing data of an individual resident which is then compared with practice guidelines and/or peers in the office, hospital or managed care setting. Recommended practice is for one person to be responsible for all audits, review 5 or more records per payor using multiple methods for drawing a random sample, and use a claim analysis checklist to identify appropriateness of coding, documentation and completeness of claim. See Record/chart review (other). Project assessment - A project is assessed using a standardized rating tool that reflects the learning objectives established for the project. Examples of projects include targeted literature reviews (EBM), root cause analysis, quality improvement, and research. Record/chart view - Review of patient records to collect data on specified aspects of patient care; used to assess quality of care against pre-specified criteria (e.g., expectations for pain management, physical exam, patient history, use of laboratory tests, etc.). Record reviews may focus on a resident’s performance over time, over a range of circumstances, and/or types of patients. Record reviews are best used for formative assessment. (Also known as medical record audit; clinical care audit.) Resident experience narrative - Resident records their perspectives of a patient care experience (often a critical incident) and discusses with a faculty mentor. Method should be used only for formative feedback. Review of case or procedure log - Residents record cases or procedures following a preset protocol. Selected logs are assessed using standardized rating tools that incorporate pre-specified criteria. Batches of logs may be reviewed to determine if program expectations for number and type have been met. Batches of completed assessments may also be reviewed and subjected to global assessment. (See Global assessment.) Review of drug prescribing - Review of drugs prescribed by an individual resident which is then compared with practice guidelines and/or peers in the office, hospital or managed care setting. Reviews may target specific aspects of drug prescribing such as unnecessary prescribing, cost-effectiveness of prescribing, adequate documentation of information related to prescribing, patient education and counseling related to drug prescribing, etc. See Record/chart review (other). Review of patient outcomes - Review of patient outcome data which is then evaluated using a set of pre-specified criteria for measurable outcomes (e.g., readmission, relapse, postoperative pneumonia, catheter-associated UTI, etc.) which is then compared to practice guidelines and/or peers in the office, hospital or managed care setting. See Record/chart review (other). Role-play or simulations - Form of low-tech simulation usually carried out as part of a focused didactic teaching session; assessment is usually narrative, involving verbal self-assessment and feedback from observers of the role-play; used primarily to identify learning gaps. Simulations/models - Resident performance of procedures on a high-tech computerized simulator is evaluated; may also be used to evaluate individuals within a team and overall team performance during a predetermined clinical scenario. Evaluation data may be collected by the simulator (preprogrammed) or by trained observers via direct observation using standardized tools. Standardized patient examination - Form of low-tech simulation involving a simulated patient (trained actor) and standardized rating tools (standard questions and marking scheme) for formative assessment of focused or complete patient examination skills. May be used to identify learning gaps and to provide evidence of improvement. Structured case discussions - Form of informal mini-oral exam; may consist of a small set of pre-determined questions and is commonly conducted as part of a resident’s case presentation to the faculty supervisor or mentor. See Oral examination (informal). Video Recorded assessment - Resident performance of a clinical procedure or patient encounter is video recorded for later review and concurrent evaluation by a faculty supervisor or mentor; may also include self assessment by the resident and/or assessment by other clinical personnel involved in the procedure or patient encounter (e.g., nurses, peers, other clinicians) after review of the videotape/recording. Clinical Teaching - teaching that occurs in the clinic, EDs, ORs, laboratories, or other medical settings and addresses issues related to residents’ current patient cases or clinical responsibilities. Focused or Direct Observation and Evaluation - direct, hands-on clinical or patient care activities. This may include surgery, patient exams, the reading of radiographs and preparation of pathology assays. Performance Feedback - information provided to a resident that describes what (s)he has done well or poorly and provides specific guidance as to how performance might be improved. Departmental Conferences, Lectures or Discussions - formal, classroom instruction on a specific topic or method, led by one or more faculty, residents, or staff, etc. Institutional Conferences, Lectures, or Discussions - formal educational event involving institution-sponsored grand rounds, lectures, discussions, or workshops for residents and/or faculty from multiple specialties; may be part of an institutional core curriculum (i.e. a set or course of learning activities arranged to impart knowledge and skills in fundamental domains, for example, communication skills, legal issues, ethics). Individual or Group Projects - multi-step, multi-component tasks performed as vehicles for learning and applying knowledge and skills. Projects should result in a product. Examples are literature reviews, research, clinical quality improvement projects, and community health advocacy work. Computer Modules - computer-based instructional units that present medical knowledge or clinical tasks, etc, that residents work through independently. These modules are developed either by the institution/program or purchased from commercial vendors. Standardized Patients - professional actors or real patients trained to present realistically and reliably a medical condition and/or specific patient behaviors; the standardized patient provides instruction to the resident or feedback about his/her performance High-Tech Simulators/Simulations - 3-dimensional, high tech, computerized devices that represent human anatomy and physiological responses (simulators) are used by residents to learn procedures and operations. Or realistic patient care scenarios are generated using high tech/virtual reality devices (simulations). Residents engage in the scenario as in real life to learn or apply clinical or teamwork skills. Anatomic or Animal Models - non-computerized, 3-dimensional devices that replicate the properties of human anatomical structures are used by residents to learn procedures. Role Play or Simulations - staged replicas of potentially real situations are engaged in by residents to learn, practice or rehearse skills needed in those situations. This method is often used in difficult or high-risk situations, e.g. mobilization of a medical team in a multi-victim accident or confrontation of an “impaired “ colleague. Games - informal activities with goals, rules, rewards and penalties for various courses of action. Games may be computerized, played individually or in groups, facilitated or self-paced. Role Modeling - portrayal of desired professional behaviors, communication skills, or clinical skills, etc. by attending/supervising physician with the expectation that residents will learn these behaviors and skills by observing the role models.
<urn:uuid:8c171371-9c15-4d54-acd9-dcbca1c9317e>
CC-MAIN-2022-33
https://acgmehelp.acgme.org/hc/en-us/articles/360043596294-Where-can-I-find-a-Competency-and-Assessment-glossary-
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00404.warc.gz
en
0.906246
2,440
2.796875
3
Reviewed by Whitney White, MS CMHC, NCC., LPC Attention-deficit hyperactivity disorder is a mental health condition that causes major symptoms such as impulsive behavior, inattention, and hyperactivity. The condition can have substantial effects on adult life. For instance, someone with ADHD may struggle with a poor self-image and maintain a proper job or relationship. ADHD can affect your sex life in many ways. ADHD can have a substantial effect on the emotional and sexual lives of couples. It is common to see a partner with the condition among couples undergoing treatment. Those living with ADHD might be aware of hypersensitivity to sensory stimulation, causing sensual touch to feel irking or even upsetting. Sometimes, you might experience remarkably varying levels of sexual desire from one day to another. Individuals with ADHD are more prone to depression, leading to reduced desire and sexual dysfunction. On the other hand, some people with ADHD may have a significantly high sex drive and crave stimulation and novelty like pornography, leading to their relationship issues. Those with ADHD may also be more likely to indulge in risky sexual behaviors like having multiple sex partners or unprotected sex. The mental health condition is related to reducing neurotransmitters, which may cause these forms of impulsive behaviors. Sometimes, it could be another factor. Some of the sex and relationship issues faced by adults with ADHD often occur due to enduring excessive criticism as ADHD children. A parent may try their best to show empathy. Still, when everyone else is in a rush to arrive in time for an important family event – all but one child is completely lost in front of the TV, totally oblivious of what is happening around them – there may be some yelling. Most of such kids are naturally tough. They manage the constant criticism by simply blocking it out. However, this may cause issues later in adult relationships, as that may be their coping mechanism. The Effects Of ADHD On Sexuality It is often hard to determine the implication of ADHD on sexuality since sexual symptoms often vary from one person to another. Some sexual symptoms can cause sexual dysfunction and lead to remarkable stress in a relationship. Knowing the effects of ADHD on sexuality can help partners handle relationship stress. Some of the common ADHD symptoms include emotional instability, depression, and anxiety. All these conditions have negative consequences on sex drive. For example, someone with ADHD may find it stressful to stay orderly and organized. They may not have the drive or energy for sexual activities. Healthy relationships and good sex are only possible for partners who are confident and emotionally present. However, confidence may dwindle from years of experiencing stigma and other challenges of ADHD. Adults with ADHD may find it hard to sustain professional and personal stability and may appear distracted, forgetful, and inattentive to people close to them. Romantic partners may have to handle all the house tasks because they can rely on their partner with ADHD. These frustrations associated with ADHD can manifest in different forms of sexual behavior. If someone with ADHD is dealing with sexual symptoms, they may fall into the classifications. According to the American Psychiatric Association guidelines, it is necessary to note that sexual symptoms are not part of the recognized diagnostic criteria for ADHD. Hypersexuality And ADHD Hypersexuality means a strangely high sex drive. Sexual stimulation increases endorphin production and releases neurotransmitters in the brain, which tend to calm the person. When someone living with ADHD discovers any activity that stops their restlessness and induces calmness, they often tend to engage in it to an extreme level. However, promiscuity, problematic pornography, and constant need for sex can lead to relationships. It is necessary to note that promiscuity or pornography does not always mean someone has ADHD. Due to troubles with impulse control, people with ADHD may engage in risky sexual behaviors or substance abuse, which could further impair their decision-making ability. Hyposexuality And ADHD Hyposexuality is on the other end of the spectrum. The person loses their sex drive, as well as any interest in sexual activity. This may be caused by the disorder itself or a side effect of medication, especially antidepressants, which mental health professionals often prescribe for people with ADHD. If you think medication could be causing sexual disorder – they may replace the drug or reduce the dosage. People experiencing hyposexuality may be too distracted to engage in sexual activities. Sex is not different from other tasks that cause issues for someone living with ADHD. They may struggle to concentrate during sex, lose interest in the activity, or get distracted. Hypersensitivity And ADHD Some people with ADHD have a high sensitivity to physical sensations, making typically enjoyable sensual activities unpleasant or even painful. Touch is not the only sensation that may be a problem. Smell and taste that usually accompany intercourse can become more pronounced, causing the person with ADHD to become overwhelmed, distracted, and unable to enjoy the process. People experience ADHD in different ways, but women tend to experience extra hassle when relaxing or concentrating enough to reach orgasm. While some women can reach climax easily and regularly, many need to feel completely relaxed to get there, making things harder for those with ADHD. Some women report being able to climax multiple times and struggle to get an orgasm, despite prolonged stimulation. Overcoming Sexual Challenges Of ADHD If you are a partner to someone living with ADHD, you may discover that your partner gets distracted easily during intercourse, and their focus and interest drifts easily, which you might take as rejection. It is crucial to note that ADHD causes trouble with a concentration in different life aspects, and sex is usually not exempted – it is usually unrelated to the person's interest in their partner. Also, the heightened feelings experienced by someone with ADHD, such as frustration and anger, can cause conflict in any romantic relationship, and the conflict can affect sexual connection as well. Most importantly, patients need to use their ADHD medications according to prescription, and fortunately, many of these meds do not reduce sex drive or desire. In fact, since they boost your ability to concentrate, they may benefit your sexual life. However, SSRI antidepressants are often provided for depression and anxiety, which is common among people with ADHD and can lower one's sex drive. There are certain techniques and coping methods for people with ADHD to improve their sex life and relationships: Even when ADHD is not involved, sex is better when partners understand how to please each other. Do not be afraid to discuss the implications of the condition of intimacy and sexual expression. If your ADHD is the cause of sexual issues, inform your partner that the distraction or behavior caused by ADHD is not their fault and not an indication of a lack of desire or attraction. If your partner has ADHD, pay attention to their needs, and try not to judge. Inform your partner of your needs. For instance, keep the lights off and avoid using strong perfumes, lotions, or scented candles if your partner is highly sensitive to light or scent. Set up the environment in a comfortable way. If you do not like a certain position or form of sex, let your partner know what you prefer. Talking about any sexual issues ahead of time and letting your partner know what to do can help avoid confusion and hurt feelings. Be open to seeking the assistance of a qualified sex therapist or mental health professional. Many couples dealing with ADHD will find couples counseling and sex therapy remarkably beneficial for their sex lives. It helps open communications and clarify arguments and confusion, encouraging better intimacy and, consequently, a more fulfilling sex life. Spice Things Up Often, the best method to optimize your sexual life is to remove monotony and spice things up. If you are struggling to focus in the bedroom, talk to your partner about ways to make sex more interesting. Try new locations, positions, and techniques to reduce boredom during sex. Incorporate new things, but be sure that your partner is comfortable with the suggestions. Try to pay attention to. Eliminate distractions and practice calming exercises with your partners, such as meditation or yoga. Create time for sex and stay committed to it. Prioritizing sex can help ensure you do not get distracted. Mindfulness can be applied to any activity, including sex. It entails being mentally aware of your body and soul throughout the day to pay attention to negative behaviors, distractions, and underlying emotions. Get Rid Of Distractions Although some people calm down with mood music or background noise, someone with ADHD might get distracted. During sex, you can turn off the computer, television, or radio to avoid distractions. However, the distractions can come from the fan's sound in the bedroom or the presence of an uncompleted project lying around. Distractions can reduce some people's arousal. As mentioned earlier, communication is important. When people know the things that distract them and avoid them, they may be more present and attentive during romantic moments. You may be able to overcome your issue with sex by creating a schedule and adhering to it. Scheduling sex may seem unromantic, but it may help to calm you down. If spontaneity is the problem behind arousal and you need time to get yourself in the mood, allow mental preparation. Knowing you have a particular time to concentrate on sex may help reduce anxiety as well. Go Easy On Yourself People struggling with ADHD may have admitted that their symptoms are personal flaws, which can cause low self-esteem. Admit your limits and understand everyone has theirs. Remind yourself or your partner regularly that everyone deserves love, care, and sexual satisfaction, whether your house is disorganized always, or you have been on the same screen for several minutes because your mind will not stop drifting. A different perspective can be beneficial from time to time. A couple living with ADHD will have challenges that other couples may not, but this does not mean improvement is not possible. To enjoy your sex life, both partners may need to change the way they handle ADHD. If you are not sure whether to get therapy, it may be helpful if you’re experiencing a decrease in sexual activity, financial problems (caused in part by poor management and disorganization), constant fighting, or a messy house that disrupts other people's moods. The partner with ADHD may need to start seeing a specialist and start a treatment plan if they have not done so. Couples counseling with a therapist who focuses on ADHD can be incredibly beneficial. ADHD can lead to issues in romantic relationships and changes in sexual traits. While some may lose interest in sex completely, others may experience a high sex drive. Some people need to put extra effort into their sex life, while others quickly get overstimulated and require time or space. Regardless of the challenges, people with ADHD can have interesting and great sex lives. They only need to communicate, get therapy, and undergo the right treatment. You can start by taking an assessment test for ADHD.
<urn:uuid:c4b8c5e6-4ade-462c-847b-b4a52b539b1e>
CC-MAIN-2022-33
https://www.mind-diagnostics.org/blog/adhd/the-relationship-between-adhd-and-sex
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00604.warc.gz
en
0.953437
2,251
2.75
3
Juicy sugary fruits are everything. You must know how to say fruits in name in German if you want to order them. In this guide, we will share with you 15 major fruits in German and you can become fluent in German within no time. You will be requiring fruits no matter where you go. Fruits are literally a necessity of life. They are not only rich in nutrition but also have several benefits for physical and mental development. If you are in Germany or planning to be there, you must know the major fruits of the German language. So that, you can talk to natives about them easily and with confidence. You can learn German online to be fluent in the language and talk like natives. It is an interesting fact to know that in Germany, the first sugar refinery was built in 1573. Before 1573, Germans used to sweeten their foods using natural foods such as fruits. They still have a long list of desserts that are made primarily from fruits. From this, you can imagine how important it is for you to learn the fruit’s name in German. Eating out or making a grocery at German supermarkets will become extremely difficult for you if you do not know major fruits in German. In this post, you will learn the German words for fruits in the easiest and most interesting way. This guide will make you confident to speak about what you are eating and what you are planning to try next. 15 Fruits in German – The most popular ones In ancient times, German natives used to eat fruits that grew in the temperate climate of their country. Such fruits are still available in various local markets available in various parts of the country. They are still grown in the local farmer’s markets. As told earlier, these fruits are also available in grocery stores. In fact, in German grocery stores, you will find fruits from all over the world and that is what makes it important for you to know fruits in the German language. German countries important the well-known and sugary fruits from different regions of the world and these fruits have now become a part of German people’s daily diet plans. der Apfel (Apple) Apples grow in great numbers in the central part of Europe. In fact, it is said that the world’s best apples are grown on the tress of Kamenz, Saxony. They become ready usually in the early fall and that is the reason they become a major part of the dishes being made during the fun holiday seasons. There is a very mouth-watering apple drink named Apfelschorle, which is usually found in major German-speaking countries. This drink is extremely popular for its taste. It is a carbonated drink made from apples. Following is an example of using the word apple in the sentence: Die Äpfel sind reif – The apples are ripe. die Erdbeere (Strawberry) Well, everybody knows that strawberry grows across the ground. The name of this particular fruit signifies its origin i.e. Erdbeere which literally means “earth berry.” Following is an example of using the word strawberry in the sentence: Ich habe auf die Erdbeere getreten – I stepped on the strawberry. die Blaubeere (Blueberry) The plural of blueberry is die Blaubeeren i.e. blueberries. Both the domestic and wild blue berries are found in northern and central Europe. Following is the example of using the word blueberry in the sentence: Im Sommer können wir Blaubeeren pflücken – In the summer, we can pick blueberries. die Brombeere (Blackberry) The plural of black berry is die Brombeeren i.e. blackberries. They are mostly found in the German temperate climate just like strawberries. It is very important to take the right precautionary measures while picking them. They can cut off the skin and clothes through their prickles. Following is the example of using the word blackberry in the sentence: Iche habe ein paar Brombeeren in den Kuchen gelegt – I put some blackberries in the pie. die Himbeere (Raspberry) The plural of raspberry is die Himbeeren i.e. raspberries. This fruit naturally grows in Germany. It is considered one of the most important local fruits grown naturally in Germany. Following is the example of using the word raspberry in the sentence: Ich könnte ein Kilogramm Himbeeren essen – I could eat a kilogram of raspberries. die Moosbeere (Cranberry) The plural of canberry is die Moosbeeren i.e. cranberries. In technical terms, the word moosbeere refers to the cranberry that grows specifically in Europe. The production rate of this variety is very little. They are mostly imported from the United States of America. The technical name of cranberry is Großfrüchtige Moosbeere but natives mostly, call it “Moosbeeren.” Following is an example of using the word cranberry in the sentence: Moosbeeren sind mir zu sauer – Cranberries are too sour for me. die Kirsche (Cherry) The plural for cherry is die Kirschen i.e. cherries. Just like apples, this particular fruit is also considered to be among the most important fruits in Germany. The most common variety of cherries is sweet cherry. They are naturally grown in the south part of Germany, especially in Baden-Würtemberg. Following is an example of using the word cherry in a sentence: Ich hätte gerne eine Kirsche mit meinem Eis – I would like a cherry with my ice cream. die Traube (Grape) The plural of grape is die Trauben i.e. grapes. Germany’s neighboring countries such as Austria and Switzerland are well-known for their vineyards. Germany, itself, has a very fertile wine country in the west. The most popular German grape variety includes Gewürztraminer and Riesling. Following is an example of using the word grape in the sentence: Sie zerdrücken die Trauben – They are crushing the grapes. die Orange (Orange) The plural of orange is die Orangen i.e. oranges. The temperature of Germany is cold to grow oranges naturally. But German still eat the oranges while importing them. Oranges are widely used in various German dishes. Following is an example of using the word orange in the sentence: Diese Orange hat eine dicke Schale – This orange has a thick peel. die Pflaume (Plum) The plural of plum is die Pflaumen i.e. plums. They are grown in various parts of Germany. They are very popular for their sweet flavor and juicy texture. Following is an example of using the word plum in the sentence: Bitte nimm die Pflaumen aus dem Kühlschrank – Please take the plums out of the fridge. die Birne (Pear) The plural of pear is die Birnen i.e. pears. Just like apples, pears grow naturally in Germany and have an important role in German culture. Following is the example of using the word pear in the sentence: In dieser Birne steckt ein Wurm – There is a worm in this pear. die Banane (Banana) The plural of banana is die Bananen i.e. bananas. This fruit does not grow naturally in Germany. Bananas are one of the most popular fruits around the world. They are normally easy to store and are readily found in supermarkets. Following is an example of using the word banana in the sentence: Du kannst Bananen in Smoothies legen- You can put bananas in smoothies. Several German words used in these sentences can help you learn German. In addition to this, you can take assistance from songs to learn German. die Feige (Fig) The plural of fig is die Feigen i.e. figs. These fruits both are found throughout Germany in both dried and fresh forms. They are also found in Austria and Switzerland. Following is an example of using the word fig in the sentence: Mein Opa bevorzugt getrocknete Feigen – My grandpa prefers dried figs. die Ananas (Pineapple) The plural of the word pineapple is die Ananasse i.e. pineapples. It is a tropical fruit which is why it is not grown in German-speaking countries. But they are still found in supermarkets in entire Germany. Following is an example of using the word pineapple in the sentence: Du bist verrückt, wenn du Ananasse auf Pizza magst – You’re bananas if you like pineapple on pizza. der Pfirsich (Peach) The plural of peach is die Pfirsiche i.e. peaches. Peach trees require warmer weather which is why they do not grow in Germany. Rather, it imports the peaches from Italy and Spain. Following is an example of using the word peach in the sentence: Die Kerne der Pfirsichen sind giftig – Peach pits are poisonous. These fruits in German are easy to learn and remember. If you want to learn German, you can also seek assistance from a German teacher. These teachers can help you to be fluent in German in no time. Learning the German names of fruits will help you buy them at supermarkets easily. Some fruits are not naturally grown in Germany but they are imported from different countries. Germans include fruits in their diet. It is important for you to remember the fruits in German if you want them to get in your stomach.
<urn:uuid:47c14433-8bec-4119-8c5a-886594f5986c>
CC-MAIN-2022-33
https://learn.italki.com/fruits-in-german
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00206.warc.gz
en
0.925093
2,112
2.5625
3
Surprise! There are actually three definitions for truth to understand what truth really means and they are not simple definitions. There is general truth which includes judicial truth and scientific truth. The definitions are very complex and need a lot of logical reasoning ability but I will try to explain each truth in layman terms which hopefully you can understand better. Subset: n. a thing Truth (General): a subset(s) which existed with a large number of logical and accurate correspondences and/or which has a relatively large probability of existing in the future and will have a large number of logical accurate correspondences The key words here are a large number of logical and accurate correspondences. Let’s take three ways of defining or explaining what love is. Love is like music in your ears Love is a glorious feeling Love: v. to sense a very intense pleasure from a subset(s) one cares about and the behavior(s) which exist with it In the first phrase someone is trying to make a correspondence between love and music and ears. In the second phrase there is a correspondence of love to glorious and feeling. In the third definition love is connected or corresponded to sense, intensity, pleasure, subset(s), cares, behavior(s) and existence. The number of correspondences is 7 compared to only 2 for each of the two first phrases. Based on number of correspondences the definition of love has much more truth in it about love. Now let’s evaluate the accuracy of the three communications. Love is like music in your ears. This implies that love is loud or soft and the different sound intensities cause different emotional reactions in your brain. A logical conclusion is that love is loud and soft and varies in intensity but to most who don’t make logical connections it is music in the ears and the accuracy level of such a communication is zero. Love is a glorious feeling just communicates that love is a very pleasant feeling which is another way of saying that love is an emotion with intense feelings. The accuracy of this communication is very minimal and it just says that love feels very good. Similes are very inaccurate ways of comparing or corresponding two or more words. Saying that love is like music is probably more accurate than communicating that love is like the shinning sun but both are very inaccurate ways of expressing reality. Poets and many writers claim to be showing how beautiful language can be when in fact they are demonstrating how stupidly the language can be used. The more verbosity and the more the the number of inaccurate correspondences there are the stupider the communication is. Reading for pleasure or entertainment is an excursion into stupidity most of the time. “There is a tide in the affairs of men, Which taken at the flood, leads on to fortune. Omitted, all the voyage of their life is bound in shallows and in miseries. On such a full sea are we now afloat. And we must take the current when it serves, or lose our ventures.” This verbose communication with inaccurate correspondences is William Shakespeare and he is basically saying “take advantage of opportunity when it is offered to you or you will remain miserable.” Even a summary is not an accurate truth because not everyone without opportunity is miserable. Shakespeare is mostly a great BS artist and totally inappropriate for the 21st century technological age. I read about 300 pages of 881 pages by Ludwig Von Mises called Human Action: A Treatise on Economics. 99% of the book was boring repetitive BS propaganda about how great pure capitalism was for the economy. This man was one of the kings of verbosity with inaccurate word usage added on to obscure meaning. I didn’t read the whole book so I won’t summarize it in one paragraph but that is the total amount of factual information which he presented in the approximately 300 pages that I read. Love is like music in your ears and is a glorious feeling should evoke a truthful response. What in the world are you talking about? I don’t understand what you are trying to communicate!!!!!! I like some music and glorious feelings too but what does it have to do with love beyond an emotional agreement with nice words??? In the definition of love as a verb it says that love exists when you sense very intense pleasure and it is something you care about personally and it also includes the behaviors which exist with the emotion. The accuracy of the definition is definitely greater than the first two phrases put together and tells you much more about the truth of love. You may disagree that love is always very intense and pleasant but the truth is that if love is not as intense then it is a feeling called affection and not love. Affection: n. sensing medium intensity pleasure for a subset(s) one cares about and the behavior(s) which exists with it Many relationships between men and women start off with an infatuation period where there is much loving emotion but as time passes by there are many more times when affection is experienced and in fact for a long duration relationship or marriage the amount and frequency of affectionate behaviors is much greater than the amount and frequency of loving behaviors. Most realistic workable relationships start off with much and frequent love and end up with much and frequent affection if they last for a long duration. Yes, poets and writers don’t have a clue what love really is because they can’t define it and most of what they write about with verbosity is just pure BS or a lie or personal biased emotional opinion and not the truth. When they write about love there are a minimal number of correspondences with reality and they are greatly inaccurate. Writing about love needs a logical approach and not an emotional one if love is ever to have real meaning and not just be an exciting emotional word experience. I will anger some religious believers who believe that God is love or that Love is God. Logically this leads to a dead end in reasoning and the only conclusion that you can reach is that God is everything and love is also everything. This is a very inaccurate definition and is telling us that either God or Love must be eliminated from language because they both mean the same thing and only one word should survive. The fault in most human misunderstandings is that the language itself is very inaccurate and too emotional in the way it is structured and leads to billions of emotional arguments among humans because the language communications are not based on logical facts but are merely frequently untrue, biased, personal, emotionally charged opinions which are highly inaccurate with minimal numerical correspondence to reality. Language as it is currently structured is the reason humans argue emotionally and not logically with a necessary controlled discussion. SCIENTIFIC THESAURUS is my evergreen book which will cure this illogical overly emotional communications problem in world society. Since we are on the topic of love you can be further enlightened with the truth about love by reading my evergreen book LOVEALL. The number of logical correspondences is large and the accuracy I leave to your personal judgment. It is 73 questions and answers about love and you will become a love expert if you read it to the end and apply all the knowledge to your life. Become a love expert! Truth (Judicial) (Jtruth): n. a relevant fact(s) and/or concept(s) which may be used to prove beyond a reasonable doubt the (nondeceptive and/or nonfraudulent) and/or honest nature of something through evidence and/or testimony by hopefully (nondeceptive and/or nonfraudulent) and/or honest people and it may include scientific truth or testimony by hopefully (nondeceptive and/or nonfraudulent) and/or honest specialists in their field. Scientific truth may therefore be a subset of judicial truth during a trial. Judicial truth is directly proportional to the honesty and true facts presented by the humans in a court proceeding. The more honesty there is the greater is the judicial truth. This is why “do you promise to tell the truth, the whole truth, and nothing but the truth” is so important in court. If the humans are lying and being deceptive and present untrue facts in the case then there will be a miscarriage of justice and no just conviction will result. The modern court system is increasingly unreliable in the forensic evidence which is presented in court and the sworn testimony of the defendants and plaintiffs because we no longer have a very moral society since the average American lies about something almost on a daily basis and many don’t believe that lying is immoral if you somehow benefit from the lie. There will come a day when only audio visual evidence will be sufficient to prove beyond a reasonable doubt that someone is guilty of a crime because so many of the citizens will no longer be humans with an impeccable honest reputation on which they can rely in court. If you don’t have humans with impeccable honest reputations in court then the most talented lawyer earning the most money to manipulate the emotions of the court wins and true facts and evidence is secondary in importance and the court system becomes a dysfunctional unjust sham. Truth (Scientific) (Struth): n. a scientifically proven truth proven by using the scientific method Scientific truth is the most reliable truth because it is truth proven by measurements in the laboratory and the number of correspondences of the definitions and principles used is very large and the accuracy of the proof is very great because mathematics is used as the accurate tool to make measurements on real mater and/or energy which exist in the world. There are many statisticians in politics, sociology, and psychology who try to establish correspondences between words or variables and most of them are very suspect because the number of variables which affect statistical conclusions is almost infinite and makes logical correspondences between word variables which are inaccurately defined a tragic joke. No cause and effect relationship or correspondence can be made between statistical norms and individual human behavior. It is all a big lie and untruth and politics, sociology, and psychology are not a science by any stretch of the imagination. Political science and social science is not a science at all but very biased personal and group opinions and not scientific facts. Poverty is the reason why humans don’t succeed in life is an untrue statistical conclusion. The real reasons that poor humans don’t succeed is that they have immoral parents who can’t discipline, properly care for, and motivate their offspring to do well in school and life. The other important reason is that the education in ghetto schools is very bad because of discipline problems and peer pressure from offspring who come from dysfunctional families. Those who rise out of poor neighborhoods to become successful in life are frequently those who have been inspired by moral parents and role models who have motivated them to excel in their lives and have realistic ambitions and are drug free. Poverty does not cause failure in life but bad parenting and a bad educational system and a bad neighborhood are to blame!!!!!! Let’s see if statistics can prove that this is the truth. These facts put the blame on parents, role models, and the educational system and all are politically powerful and don’t want the statusquo to change because reeducating parents, role models, and teachers is considered mission impossible or taboo. If you liked this evergreen blog read more of them and read one or more of my evergreen books, especially COMMON SENSE.
<urn:uuid:7f9479df-f206-4081-a801-06d1c38458ce>
CC-MAIN-2022-33
https://uldissprogis.com/tag/literature/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00605.warc.gz
en
0.953975
2,334
3.328125
3
Generating awareness and demand, preventing and controlling women’s cancers By Indrani Kashyap When Salimar Valencia Lopez reached the busy, government-run Tondo Medical Center in Manila for a free cervical cancer screening, she had no idea that she could conduct part of the test herself. The health worker explained to Salimar that she could collect her sample in privacy by gently brushing her cervix with a swab, or the health worker could do the procedure in the examination room. Lopez happily chose self-collection. “Oh this is good, because I am embarrassed about exposing myself to a health worker,” said the 42-year-old mother of two. “Self-collection, I didn’t know that there was such a thing!” Using a process similar to the gold standard RT-PCR test for detecting COVID-19, Lopez’s cervical cells would then be tested for the high-risk human papillomavirus (HPV) strains that are most likely to cause cervical cancer, using a highly accurate process called HPV-DNA testing. If their samples are negative, women are asked to test again in three to five years. If they are positive, a provider treats any precancerous lesions using methods such as thermal ablation, a quick process of destroying the abnormal cervical tissue using a heated metal probe. With such a simple test, and available treatment options that could, together with HPV vaccination, completely eliminate cervical cancer and save the lives of more than 300,000 women each year, more than 80 percent of whom live in low- and middle-income countries (LMICs), the question arises—why are so many still dying from this disease? Dr. Veronica Reis, Jhpiego’s senior technical advisor for women’s cancers, explains, “We know what we can do to prevent it . . . ensure robust coverage of HPV vaccination, screen women of target age and provide the necessary treatment. It’s challenging for LMICs. In general, they prioritize other diseases, rather than cervical cancer. I believe that in Jhpiego, we have a very important role to support countries to increase awareness, advocate to mobilize resources and strengthen capacities for advancing women’s cancer prevention and control.” A simple test Jhpiego began its work in women’s cancer prevention more than two decades ago with the introduction of a simple, effective method to screen for cervical cancer known as visual inspection with acetic acid and treatment with cryotherapy and other procedures . Those efforts, in partnership with governments, advanced with the introduction of the HPV-DNA test and thermal ablation. Jhpiego also expanded its work to include breast health awareness initiatives in Botswana, India, Mozambique and Tanzania and strengthen capacities for provision of clinical breast exams as part of essential health services. In addition, Jhpiego supported efforts in Ethiopia, India, Pakistan and Tanzania to introduce HPV vaccines for young girls to prevent cervical cancer in the next generation. Today, Jhpiego is a partner in the multicountry, Unitaid-funded and Expertise France-led project called Scale Up Cervical Cancer Elimination with Secondary Prevention Strategy (SUCCESS). Secondary prevention refers to the screening and treatment of precancerous lesions, like what Lopez went through, allowing for early detection of potential cancers and, therefore, more effective treatment. SUCCESS is introducing an accessible, affordable and achievable screening and early treatment model for cervical cancer in Burkina Faso, Côte d’Ivoire, Guatemala and the Philippines. These four countries account for 12,999 new cases of cervical cancer and 8,410 related deaths annually and represent three-high burden regions—sub-Saharan Africa, Latin America and South East Asia. Along with the Union for International Cancer Control, Jhpiego is working to reach 185,000 women across the four countries with HPV-DNA screening within three years through this project. Among the goals of SUCCESS is to screen 75,600 women who are living with HIV. 2020 cervical cancer elimination strategy The project aligns with the World Health Organization’s 2020 cervical cancer elimination strategy. Reis explains, “Jhpiego has been supporting WHO efforts to develop the elimination strategy and update recommendations for cervical cancer screening and treatment. Based on existing evidence, we consider it really important to move to screen women with a high-performance test such as HPV-DNA especially because, for screening with visual inspection with acetic acid or pap smear, we needed the woman to come into a facility and undergo a speculum examination by a trained provider. We know that this is a challenge for LMICs. Self-collection for an HPV-DNA test makes this process simpler and has the potential to increase coverage. Also, we know that the quality of this method of screening is higher than the other methods.” Tracey Shissler, Jhpiego’s implementation director for SUCCESS, adds, “HPV-DNA testing is this great opportunity for efficiencies and empowerment that can have a real impact—reaching more women through self-collection of HPV samples and channeling provider time to only focus on women who are at risk—those who are HPV positive. It also puts women in more of a participatory position, of being able to collect the sample themselves.” The experience of women like Lopez holds great relevance. Despite having had a pap smear in 2012, it took Lopez almost a decade to return for a test. It can take several years for HPV infection to develop into cervical cancer, presenting no symptoms to the woman in the interim. “In LMICs, health seeking behavior really tends to be determined by when the person feels grave symptoms and this mindset deprioritizes HPV screening for them,” says Donna Miranda, Jhpiego’s awareness and demand generation officer in the Philippines, and adds, “Our project’s communication campaign uses the hook ‘you do not need symptoms to seek care’.” Women living with HIV are six times more likely to get cervical cancer Across the project, but especially in Burkina Faso and Côte D’Ivoire, women living with HIV are a priority because they are six times more likely to get cervical cancer. Of more than 7,000 women screened through SUCCESS in the two west African countries, almost 3,000 are living with HIV. This project is an invaluable addition to other Jhpiego projects supported by the President’s Emergency Plan for AIDS Relief and the U.S. Agency for International Development that focus on cervical cancer prevention and treatment for women living with HIV in Guinea, Mozambique, Namibia, Nigeria and Zambia. The objectives of SUCCESS couldn’t be closer to Jhpiego’s mission of saving lives and providing transformative health care solutions to the most vulnerable. One of the big goals of Jhpiego’s cancer strategy is to meet women where they are. But as simple as it sounds, achieving this requires concerted effort, as Maura McCarthy, Jhpiego’s senior technical lead for women’s cancers, highlights, “To meet women where they are, we are looking at decentralizing screening, diagnosis and treatment, developing innovative and integrated strategies for strengthening primary health care to include women’s cancers. Jhpiego is adding value across the entire system—in working with policymakers, facility managers and providers, community representatives and civil society, teaching hospitals and tertiary institutions—to bring people together and identify barriers in cancer care delivery, and develop coalitions and partnerships to address them. We work with private sector providers and industry to introduce new diagnostics and treatment to help bring them to scale.” Throughout all of Jhpiego’s efforts in women’s cancers is the core belief that where a woman and her family live shouldn’t determine if they live. Dr. Ingrid Magnata, Jhpiego’s country director in the Philippines, sums it up well, “We are passionate because this [addressing women’s cancers] is a direct prevention of mortality. It is a perfect fit with our mission of saving lives, improving health and transforming futures. We have a daunting task ahead but, together with our partners, we are determined to make it happen.” Jhpiego’s Breast Health Work in India In the past five years, Jhpiego has done substantial work to address breast cancer in India through a comprehensive Breast Health Initiative and other programs to demonstrate a scalable model to improve access to early diagnosis and treatment of breast cancer through the existing primary health care system in four large states in India. The initiative, in collaboration with the government of India, demonstrated that trained community health workers could deliver tailored breast cancer awareness messages to women aged 30 to 65, followed by quality clinical breast examination by frontline health workers at primary care clinics. A lean patient navigation system could lead to timely detection and treatment through an efficient referral pathway. Jhpiego also developed robust monitoring and evaluation systems and dashboards that helped capture key data needed for decision-making. More recently, commissioned by the World Health Organization, Jhpiego—along with the Rural Unit for Health and Social Affairs at Vellore Christian Medical College—produced a comprehensive assessment of prevention and management of common cancers in India in 16 selected districts across eight states. Some of the challenges and gaps identified through this analysis are inadequate human resources and lack of training of frontline health workers for screening and early detection of cancers. The analysis points to the importance of adopting newer modalities of screening and training, ensuring translation of skills into practice for a greater number of health workers, and incorporation of HPV vaccination as part of the country’s immunization program. Indrani Kashyap is Jhpiego’s Asia Regional Communications Manager, based in New Delhi.
<urn:uuid:fef2952d-bfa6-47fc-8244-2724468f6199>
CC-MAIN-2022-33
https://www.jhpiego.org/feature-story/meeting-women-where-they-are/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00606.warc.gz
en
0.944474
2,069
2.53125
3
Understanding the application of Zeolite for water filtration Technology is continually expanding and altering to satisfy humanity’s demands, one of which is clean water. The water treatment business is always studying, testing, and creating new and improved methods of treating wastewater & drinking water in an efficient & ecologically responsible manner. Zeolite for water filtration medium is a natural and sustainable treatment option. This zeolite method treats greywater, drinking water, & wastewater treatment. For thousands of years, mankind has used natural resources to better their quality of life. Sometimes we utilize them in the manner in which they are accessible in the environment, whereas in other scenarios, we create new and unique methods to use them. Sand & charcoal are two common examples of this. These media are used as filter mediums in water treatment. What is Zeolite? Zeolite can occur when volcanic rock, as well as ash, combines with alkaline fluids. Zeolite is indeed a mineral that may create a variety of structures called alumina silicates. These structures are made up of arrays of aluminum, silica, and oxygen. Clinoptilolite is the most frequent. Because of their shape and chemistry, they are microporous and have a high proclivity for cation exchange. Because of possible impurities, the degree of such exchange capabilities varies from type to type. This is also considerably lower in naturally occurring zeolites. Zeolites, on the other hand, maybe easily synthesized using a heated mixture of silica, alumina, & sodium hydroxide. What characteristics distinguish zeolite water filtration media as an excellent filter media? Whenever it comes to filtration, the more pores inside the treatment medium, the better the filtration effectiveness. Zeolite for water filtration as a medium has numerous holes in it. Due to this, it not only captures particles between grains but also absorbs them into its pores to catch them. This is accomplished in part by zeolite minerals’ capacity for ion exchange. In this context, Zeolite accepts positive ions from water & substitutes them with something else. Zeolite has a high effective surface area because of its significant pore density. This means it may catch significant quantities of pollutants before reverse washing is required. Adsorption can also be used by the medium to catch and remove particles. This is an active phenomenon in which particles stick to the surfaces of the medium rather than passively becoming trapped between grains. Zeolite for water filtration is significantly less prone to clogging. That results in a reduced pressure drop during treatment. This media is also much more chemically resistant than other mediums. And this might remove/reduce specific hardness minerals, enabling it to serve as a water softener. Substances removal by zeolites Removal of ammonia/ammonium The elimination of ammonia (NH3) & ammonium (NH4+) is an essential feature of Zeolite for water filtration. Ammonia is extremely hazardous to fish in aquaculture. At the same time, even low amounts can cause sickness and development suppression. Ammonia can be fatal to fish at greater concentrations. Ammonium ions are introduced into swimming pools by swimmers. It often interacts with free chlorine to produce chloramines. They irritate the eyes and the skin. Ion exchange and, at greater concentrations, adsorption is used by zeolites to remove ammonium ions. The wastewater’s ammonium ions are swapped for sodium ions. Zeolites have a dynamic capacity for ammonium of roughly 0.9 meq/g. Zeolites are used in swimming pool filtration. It is simple to switch to zeolites in the swimming pool: replace the old media & fill the filter to the stated height with Zeolite. There are no modifications required to the tank, valves, or pipework. The pH of the water should be kept between 7.2 and 7.6. Except for flocking agents, chemicals should be dosed after the filter. During operation, there will be a reduction in chemical use. Because zeolites have a high dirt holding capacity, the intensity of backwashing is lowered. This, in turn, results in water savings. The purity of Zeolite for water filtration is quite high. Zeolite is substantially less thick than sand due to its very porous structure. Hence less Zeolite is required by weight. The usage of zeolites reduces chlorine use and creates a better swimming experience in pools. The material used as a carrier in biological waste treatment The inner surface structure of zeolites makes them useful as a carrier system in both anaerobic & aerobic biological wastewater treatment plants. A benefit of employing them is that a variety of chemicals that are digested by bacteria are likewise adsorbed by zeolites. This causes ammonium to be eliminated from the start, eliminating the need to wait till a stable bacterium column has developed—furthermore, the Zeolite for water filtration functions as a barrier for ammonium ions. If there is a high ammonia production, Zeolite adsorbs some of the ammonia. And if the ammonia concentration seems low, bacteria metabolize some of the adsorbed ammonium. Removal of organic substances A variety of organic compounds can be absorbed by Zeolite for water filtration. The mineral has the greatest affinity for polar organic substances like chlorinated hydrocarbons. The molecules are either adsorbed in micro or mesopores, depending on their diameter. The capacity of adsorption is highly dependent on the conditions under which it is done. At the time, further research on this subject of interest is being conducted. Removal of solids Because zeolites are granular, solid & suspended particles become trapped between grains. The porous texture also causes organic and mineral colloid particles to be extracted from the water. The capability for solid particle removal is up to 45 percent more than that of sand with a comparable particle size distribution. Zeolite is an Excellent Water Filtrations Medium Zeolite is used for water filtrations purposes because it makes for an excellent medium. It is an efficient and reliable filtration medium for filtering out contaminants easily. Not just that, it can also help filter industrial wastewater. Industries looking for a reliable and low-risk method of water filtration can consider zeolite. What makes zeolite for water filtration work? Here are the reasons why it is a great option: Has the Ability to Filter Out Variety of Solvents One of the best things about zeolite is that it can remove a wide variety of contaminants. Industrial wastewater contains many harmful elements, such as heavy metals, hydrocarbons, ammonia, Nitrates and phosphates, Oils and organic substance too. If these things are not removed before releasing the water into the environment, it can cause huge damage. Which is why, it is important to find a filtration medium that can easily remove all the harmful elements from water. In this regard, zeolite is an excellent choice. As you know, it can easily remove multiple contaminants from wastewater. It Provides a Low-cost Solution Industries need efficient water filtration method that can easily fit into their budget. Unlike other methods, such as Reverse Osmosis, zeolite for water filtration method is a great option. In many ways, zeolite is very cost-effective. For instance, it doesn’t need complex set-up like other methods. This can considerably reduce the cost for companies that produced wastewater. It works perfectly for removing contaminants from water. A small amount of zeolite is enough to treat wastewater. It mostly comes in powder from and can be added to filtration tank. It is interesting to note that zeolite has high pore density. This enables it to capture high concentrations of contaminants without any hassle. The pores on the surface of zeolite can absorb and capture solvents very easily. The large surface area of zeolite is one of the reasons why it is a cost-effective method. Resistant to Abrasion Zeolite is not affected by the contaminants. It doesn’t get abrasion from it, which makes it a good water filtration medium. As you know, industrial wastewater can contain a wide range of contaminants. Some of these can be very abrasive like the heavy metals. Zeolite is strong and abrasion resistant. Meaning, it is highly unlikely that it will suffer damages from it. It also means that the quality of water filtration will not be affected. This feature is important consideration for industries that need a highly efficient water filtration medium. Zeolite can easily meet the quality and efficiency needs of many industries. Plus, it can save time and cost for a variety of industries that produce wastewater during their production processes. Eco-Friendly Water Filtration Method Industries are under lot of pressure these days to become eco-friendlier. Climate change has become a huge issue and everyone needs to do their part. People are now more conscious of brands they indulge with. They want to associate with brands that are eco-friendly. So, for industries looking for eco-friendly water filtration solution without compromising on quality, zeolite is the option. Zeolite for water filtration is an excellent choice for industries looking for a safer method. This is a substance that can easily remove contaminants without causing harm to the people or water or anything associated with it. It doesn’t contain any toxic elements like additives or dyes. It can be easily used for removing a wide range of contaminants without any difficulty. In many ways, zeolite for water filtration is an ideal choice for industrial wastewater treatment needs. Natural Zeolite is indeed a novel and extremely effective natural filter media for water filtration. Natural Zeolite outperforms sand & carbon filters. That provides purer water and better throughput ratios with less maintenance. It outperforms sand in many ways and may be used to effectively replace sand in a standard sand filter. Keiken Engineering is a young, energetic, and agile company that provides a wide range of products & cutting-edge services for desalination, industrial project management, energy efficiency, water treatment, & professional screening for key jobs. Furthermore, we provide all of these solutions at a very low rate. If you need to call us, please dial +34-91-057-7254. To reach us via mail, write to us at firstname.lastname@example.org.
<urn:uuid:27c67e13-099c-4213-a211-53d42cdf4f2c>
CC-MAIN-2022-33
https://www.keiken-engineering.com/news/zeolite-for-water-filtration
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00405.warc.gz
en
0.943095
2,224
2.59375
3
“Agriculture at the National Museum? No, we don’t have anything about that here.” The answer was definitive. I was visiting the museum in search of traces inscribed in stone or clay of the millennia-old relationship between Lebanon’s people and the land. As it turned out, there is not a single farmer represented in Lebanon’s National Museum. Thousands of years harnessing nature and all we have to show for it is an ancient section of cedar tree and a pre-Common Era terracotta figurine of a child carrying a goose. This very absence of agriculture at the center of the nation’s heritage is an apt signifier of the state of rural enterprise in Lebanon as a whole: overlooked, undervalued, and yet, fundamental to its history and social fabric. For millennia, people have worked Lebanon’s land in order to provide for themselves and their families. From the monumental staircases that the Phoenicians carved into the slopes of Mount Lebanon, to the Bekaa Valley, once the granary of Rome, local people have engaged in ecologically sustainable integrated farming. Economic and environmental imperatives have been broadly aligned, as farmers have harnessed Lebanon’s natural resources — difficult but prodigiously generous terrains of steep slopes and red earth — in the knowledge that safeguarding the land’s fertility for future generations is necessary to economic success. A century and a half of displacement and rural depopulation, changing trade relations, and economic instability have broken down this compact. Agriculture now needs to be environmentally unsustainable in order to be economically sustainable. The source of Lebanon’s sustenance and ubiquitous symbol of belonging to the land — the village — has been hollowed out, leaving communities struggling to support their families, let alone a disastrously deteriorating natural world. Since 1997, SEAL (Social & Economic Action for Lebanon) has revitalized these communities with small and strategic investments in ambitious and sustainable nature-based social enterprises. For 20 years, the Lebanese diaspora in the US has stood at the forefront of this mission; now it is time for those in Lebanon who have the means to join in. Hundreds of generations of Lebanese farmers have sustained flourishing rural economies by combining ancient techniques with the Lebanese flair for innovation. From fishing along the coast and banana groves lining the southern seafront to olives and citrus fruits in coastal areas, pear and apple orchards rising up steep mountainsides, and mixed cultivation in the Bekaa Valley and vineyards further east, a strikingly diverse mosaic of food production ecosystems are packed into 10,452 square kilometers of land. It took only a few decades of state underinvestment in rural development, rising land prices, and asymmetric trade terms to create the dire economic conditions faced by rural people today. Lebanon’s adoption of a market-based, services-oriented liberal economy came at a price: the demise of small and medium-sized enterprise farms that are unable to compete with food imports subsidized in their country of origin. These farmers form the vast majority of the agricultural production sector in Lebanon, and instead of being supported by the Lebanese government, agriculture comprises only 0.4 percent of national spending. To put this 0.4 percent into context: agriculture contributes 4.5 percent of GDP. Agriculture and food production are the primary source of income for 11 percent of the Lebanese. This has allowed environmental concerns to become unmoored from the economic. Lacking clean water for irrigation due to the absence of proper sewage networks, farmers are pushed to dig illegal wells. Lacking training and market access support, farmers flood their crops with unsuitable pesticides, leading to the proliferation of resistant strains of diseases and affecting the ability of Lebanese farmers to access international markets. And out of desperation linked to dwindling fish stocks, fishermen resort to using dynamite and illegal nets, despite the clear long-term unsustainability of this practice, which has already devastated coastal marine life . Add to this the closure of the final overland export route through Syria in 2013 (the closure of the Syria-Jordan border at Nasib threatened up to a third of Lebanese agricultural sales, leaving only the option of sea routes that are 10 times more expensive than overland ones), and the profits from agriculture are barely even covering the high input costs. The reality in 2017 is a country where most Lebanese farmers are only waiting to sell their land and live off the proceeds. It does not need to be this way. We all dream of seeing a revived Lebanon rising from the ashes of economic stagnation and soaring inequality. And a simple vote of confidence is enough to transform a frustrated would-be migrant into a committed rural entrepreneur, restoring their dignity along the way. Members of the Lebanese diaspora saw an opportunity to make this a reality. Twenty years ago, a group of highly motivated entrepreneurs from the Lebanese diaspora — themselves all too aware of the pressures compelling Lebanese to leave the country — began to join forces with entrepreneurs in Lebanon’s rural areas to create SEAL. SEAL was born from a dream, to replace a dystopian present with the prosperous and responsible stewardship of natural resources in order to ensure a dignified economic future for the Lebanese who choose to stay on their land. Supporting rural communities to stay on their lands is effective on at least three levels. First, agriculture is the main source of livelihood for 29 percent of those living below the poverty line. Rural development can ensure a more inclusive national economy that addresses the current crisis of rising poverty and inequality. This social impact is further amplified by the fact that farmers are an ageing demographic in Lebanon. In the absence of state pensions and a functioning hospice system, nature-based enterprise is a key way for older people to continue providing for themselves and their families into old age. Second, farmers’ movements are well documented in Lebanon’s history. The peasants of Mount Lebanon began to revolt in 1858 over economic hardship, exploitation of labor, and the decreased availability of land, which continued with the declaration of a republic in 1859 by the peasant leader (and, notably, artisan entrepreneur) Tanios Chahine, enforced by a 1,000-strong militia. The revolt ultimately led to the 1860 Mount Lebanon civil war, which stretched across the Bekaa to Damascus, cost an estimated 23,000 lives, and permanently changed Lebanon’s sectarian makeup. The protests in 1973 by tobacco farmers from the south — largely overshadowed by the war which broke out in 1975 — were equally important and the result of declining tobacco prices due in part to weak government regulation of import prices, within the context of peasants forced off their land and into cities or into rural wage labor. More recently, we have seen armed conflict between cannabis growers and the army in Baalbek-Hermel, and protests by apple farmers last year, who burnt their produce in the streets in response to the low demand for apples. Uneven development across the territory and rural-urban inequalities continue to form a basis for unrest, and pose a barrier to national stability and unity. Finally, rural communities are the best guarantors of the land. When properly supported, those working in nature-based social enterprise have the greatest incentives to protect the environment. In the absence of agricultural zoning regulations (restrictions on land use to protect farmlands) by the Lebanese government, rural entrepreneurs are forced to leave their lands, leaving them in the hands of property speculators, whose industrial and residential developments ensure neither the social fabric of our rural areas, nor a regard for the natural environment. Such a situation is a disaster for Lebanon’s poor, for Lebanon’s natural and social environment, and for Lebanon’s food security. SEAL matches rural entrepreneurs working for the benefit of their communities, and committed to producing good, clean, and fair products locally, with grant financing from private entrepreneurs. Acting in the same way as an investment manager — with an eye to the financial sustainability of the project, the social and environmental impact per dollar, and the viability of the business model — SEAL invests in the most ambitious and under-resourced nature-based enterprises across the country. Fouad Abdo, the 50 year-old founder of Le Bon Lait cooperative in Akkar (north Lebanon) is a typical SEAL grantee. Enthusiastic and committed to his region, (“something in the air here makes it impossible for me to leave,”) he founded the cooperative in 2007 and makes natural cheese and dairy products. Ten years on, and in one of the poorest areas of Lebanon (53 percent of the population in Akkar lives below the poverty line), Le Bon Lait now hires a mixed group of 13 women and men from different backgrounds. In 2015, SEAL purchased a refrigerated truck for the cooperative, allowing them to sell to supermarkets as far as Beirut, to confectioners such as Hallab, as well as door-to-door in the local area. This truck — a $34,000 investment — has allowed the cooperative to transport and sell a 50 percent increase in produce (from 20 to 30 tons). Staff have been able to double their earnings from $800 to $1600 per month, and seven new employees were hired as a direct result, including several women who are working for the first time. As Abdo says, “It’s important for women to be productive. Women didn’t used to have any work except helping their husbands with the land, and working in the house. Since the women have started working here, their personalities have changed — they feel they’re productive, they’re important. They’re helping their husbands with the costs of the house.” Abdo’s remarks shows how SEAL’s model of grassroots economic development not only helps people attain economic stability, it also produces a more equal society. As with all of SEAL’s factory projects, there is a second layer of impact in the form of income for the seven dairy farmers whose produce supplies for the Le Bon Lait factory. SEAL’s work stems from the belief that it takes only a nudge to move a group of women from net food consumers to net producers, and help them make money to send their children to school. Joumana al-Taki from Wadi el-Taym (Bekaa) is a case in point. At age 29, she decided to enter the workforce for the first time by training to grind zaatar bought from local farmers and setting up a cooperative to ensure that the benefits of the production spread throughout the community. Thirteen years on, 24 women across religious spectrum produce two tons per month of their special zaatar, walnut, and almond mix. SEAL purchased $23,000 worth of industrial equipment including mixers and roasters for the cooperative, and the impact of this investment has been revolutionary. Production has increased by a factor of 10 (from 200 kilograms before their grant), the cooperative regularly sells all of its natural produce at premium prices, and they are planning to start exporting in 2018. The incomes of the 24 women doubled purely as a result of SEAL’s funding, allowing them to contribute to the family purse, build their independence, and support local farmers. SEAL’s work also extends to Lebanon’s fishing communities (having distributed almost 9,000 nets to fishermen along the Lebanese coast), and to small-scale irrigation projects. The small town of Anjar in the Bekaa was settled in 1939 by several thousand Armenian refugees, and, according to local lore, there was said to have been a single fig tree amid what was a dry, desolate landscape at the time. Almost 80 years later, there are over a million trees in Anjar. However, severe water shortages have recently threatened agriculture in the area. This year, SEAL supported the installation of a drip irrigation system and the deepening of the local well to 120 meters with presidential permission. The new system will lead to water savings of 20 percent, and an increase in earnings for 35 farmers working on the irrigated lands. As Vartkes Khosian, the mayor of the municipality, says, “The situation all over Lebanon is the same; everybody is rushing to urban areas because in villages there is no opportunity. The government doesn’t create job opportunities for young people to stay in their villages.” Call to arms In 20 years, SEAL has implemented 125 projects, including almost 40 irrigation initiatives, a major program distributing 92,000 rootstocks to upgrade fruit tree supply chains, an innovative biocoal project creating energy-efficient blocks of fuel from olive pits in the south, and a factory producing orange blossom water that has farmers, who 10 years ago called the blossoms “the black flower,” now planting new orchards. The projects are non-religious, non-politically affiliated, and spread throughout the entire country. They are united by an approach that sees community-based enterprises as viable businesses that need nothing so much as careful incubation, and an injection of liquidity. Because you may need a doctor occasionally, but you need a farmer three times a day. During times of urgent need in Lebanon, SEAL has been ready to provide strategic and targeted support to those rural entrepreneurs best able to leverage the investment. Directly after the July War in 2006, SEAL acted quickly, raising its largest ever amount of funds, and investing in livelihood rehabilitation clinics across the country, helping rural people, and particularly women, rebuild their lives and empower themselves. Today, Lebanon is at a similar crisis point, with poverty at its highest level since the end of the war in 1990, and Oxfam, an international confederation of charitable organizations focused on alleviating global poverty, estimating an increase in poverty by 66 percent since 2011 alone. In response, SEAL has seen a significant increase in demand for its funds, and is scaling up its activities. There is enormous opportunity in nature-based enterprise, and in order to maximize its benefit to communities, farmers need the support of like-minded and entrepreneurial individuals across the globe. In this, SEAL’s 20th year, the organization is issuing a call to all entrepreneurial individuals in Lebanon: to join hands with rural entrepreneurs and be ready to participate in breathing new life into our countryside, rather than leaving it to property speculation and rural exodus. It is time for Lebanon to take advantage of its considerable human and territorial capital, and to bring a revived present to its mythological landscape.
<urn:uuid:289fd722-42e3-4fb7-a4c5-d2f8e6ee119f>
CC-MAIN-2019-22
https://www.executive-magazine.com/brandvoice/rural-entreprise
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256163.40/warc/CC-MAIN-20190520222102-20190521004102-00262.warc.gz
en
0.954556
2,975
2.890625
3
Hemorrhoids are a prevalent problem that most people are too embarrassed to discuss publicly. They usually afflict older people and are typically associated with bathroom dysfunction, hence the taboo. The truth is, they are effortless to treat and prevent right from the comfort of your home. What Is A Hemorrhoid? At their core, hemorrhoids are nothing more than inflamed veins in your anus and rectum, and they manifest themselves in swollen lumps that become more prominent when you have to defecate. Also known as “piles,” these unpleasant occurrences are also responsible for a lot of rectal bleeding. Although not dangerous, they can be unsightly and cause significant embarrassment for the person suffering from them. The bleeding associated with them can be alarming, so if your swollen veins are painful or get worse over time, consult your doctor for a hemorrhoid treatment. As the name suggests, these develop within your body and are often not distinguishable from the human eye. You might not even know that you have them. These types rarely require hemorrhoid treatment, and usually, they only make themselves known if they bleed slightly while you’re straining to go to the bathroom. They are also generally painless and do not require any severe type of intervention or surgery. These are the types you can see and feel when you are wiping yourself after using the toilet. They tend to flare up a little bit more and can often hurt if they get enlarged enough. These types also will bleed, sometimes copiously, when you wipe. Most hemorrhoid treatments are for those that form outside of the body, as they are most likely to prolapse and cause discomfort. Although this type of hemorrhoid is generally not dangerous, they are unattractive and usually disposed of with surgery or home remedies. What Causes This Condition? The chronically ill are also at greater risk for developing this condition. Bathroom troubles, like diarrhea and constipation, can cause this medical ailment, as can constant sneezing or coughing. Those who use the bathroom as a second reading room are also at greater risk of developing hemorrhoids. The continuous pushing creates plenty of irritation in the bowels and can lead to inflammation and problems down the road. Essentially, these enlarged veins are caused by straining or pushing. They are a delicate region of the body that is easily irritated by everyday activities, like going to the bathroom, so so many people develop them throughout their lives. Lifting Objects That Are Too Heavy For You Do you work at a job requiring you to lift heavy objects? The National Institute of Diabetes and Digestive and Kidney Diseases cites this as another cause of piles. Their report explains that the tissues that support your rectum weaken with age. One wrong lift and you could create this outcome. How Do Doctors Treat Hemorrhoids? A hemorrhoid is diagnosed and treated by a doctor through a series of exams. Essentially, the doctor will insert a finger in the rectum and feel around for any abnormalities. If the hemorrhoid in question is on the surface, your doctor might be able to see it. Still, internal ones will always need to be diagnosed with a thorough, and unfortunately, invasive exam. Depending on what they feel, your doctor might schedule additional exams to ensure that you’re completely healthy. Colonoscopies are a standard follow-up procedure if you have severe hemorrhoids, especially if you are over fifty. Keep in mind that mainly these procedures are prescribed to make one-hundred percent sure that there’s nothing wrong, not because the doctor is diagnosing you with cancer or any other serious illness. Treating A Hemorrhoid At Home Most people opt for a home-based hemorrhoid treatment, and since there are plenty of over-the-counter medications to help ease your discomfort, this is an excellent way to go! OTC creams can stop hemorrhoids in their tracks and shrink down the larger, external ones, so they are less noticeable. They work by tightening up your veins and compressing hemorrhoids. Witch hazel is also a common way to alleviate pain and shrink the size of the bulging vein. You can also soothe the area by taking warm baths and taking pain medication if the discomfort persists or hurts to sit down. Eating a kinder diet of fiber-rich foods is also an excellent way to rid your life of these unpleasant swollen veins. Alternating how you use the toilet is a great way to keep pressure off your anus and relieve yourself without further irritating your hemorrhoid. This is easy enough to accomplish by getting a small step stool and putting your feet up on it when you go to the bathroom. You might find that when you sit this way and use the toilet that your hemorrhoid goes away all on its own. Seeking Medical Treatment If you feel like your condition requires medical intervention, there are many different types of minimally invasive procedures that can rid you of your hemorrhoids. The most common type is called “rubber band ligation,” and you don’t even need to go under anesthesia to have it done. The doctor secures your hemorrhoid with a rubber band and cuts off the blood flow to it. With no source of sustenance, hemorrhoid dies and falls off in a matter of seven to ten days. Your doctor could also inject your hemorrhoid with a solution designed to shrink it. This is the more medically advanced version of those topical creams that you can apply on your own at home and is not painful, although somewhat less successful than rubber band ligation. Another hemorrhoid treatment employed by doctors is freezing or lasering the offending lump off. This is a fairly new procedure and has had decent results so far. Most people don’t even need anesthesia for lasering or freezing, and they return to normal immediately. If you require more serious care, your doctor could opt for a hemorrhoidectomy, an invasive surgery where your doctor removes the skin around your hemorrhoid to ensure that you are completely rid of it. You can also opt for hemorrhoid stapling, similar to rubber band ligation but exclusively for internal hemorrhoids. Most people will not need to go under the knife. There are only a few rare occurrences where hemorrhoids are anything other than a nuisance and occasionally painful when they go to the bathroom. The best way to avoid having to deal with a hemorrhoid is to avoid getting one in the first place. How do you do this? Know what irritates the veins of the anus and rectum and take steps to avoid compromising the area. Go To The Toilet When You Need To Do not try to hold it, especially when it comes to “number two.” Our bodies know when it’s time to go to the bathroom, and delaying that inevitable release will only cause feces to back up in our intestines and bowels and become dry and tough. These stools can tear the tissue on their way out, causing bleeding and irritation and setting the stage for you to get some terrible hemorrhoids. Don’t Go To The Toilet When You Don’t Need To The inverse is also true! Many people treat the bathroom as a refuge or a secondary reading room. They sit on the toilet and strain, causing damage to the sensitive veins around their rectum and anus. Only use the bathroom when you have to go and avoid sitting there for any longer than you need to. You won’t be putting any undue strain on your bowels, rectum, or anus this way. Drink A Lot Of Water Staying hydrated can prevent hemorrhoids. How? When your body is full of water, your stools are softer and easier to pass through your body. Water can do so many good things for your body anyway, so it’s a good idea to get your eight ounces of water every single day. Your overall health and anus and rectum will thank you in the long run. Get Enough Exercise Like water, exercise helps just about every area of our bodies function better. One of the primary places that cardio exercise targets are digestive issues. If you have fewer digestive issues, you will strain less when you have to go to the bathroom, and your stools will pass more easily through your body. Some fantastic exercises that you might want to try are yoga and light cardio, like walking, biking, or swimming. These exercises increase your flexibility and overall health. Avoid hefty activities like weightlifting, which can cause hemorrhoids to become worse. When you do a lot of weightlifting, you’re straining yourself and putting a lot of pressure on sensitive nerve endings in your anus and rectum. Even if you don’t already suffer from the condition, you could develop it through a weightlifting routine. Keep your cardio consistent but kind to your body. The other great thing about incorporating exercise into your routine is that it can inspire you to eat better, another way that you can avoid getting or worsening your hemorrhoids. Foods High In Fiber Fiber helps us clean out our insides and can do wonders for our overall health. These days, plenty of foods are fortified with fiber, but you can also find plenty of fiber in naturally occurring ways. Let’s talk about some foods that are fantastically full of fiber and can help you fight constipation like a total champ! Fiber-filled dietary options: - Leafy green vegetables are superstars in the fiber department. These antioxidant powerhouses are also potently high in fiber and can definitely ease your bowel movements. Add some leafy green vegetables to salads or stews, or combine them with citrus fruits and bananas for a superfood smoothie. - Most fruits are really high in sugar, so if you want to keep a hemorrhoid attack at bay, slice up some mangos, apples, bananas, oranges, and strawberries for a tasty fruit salad. Alternately, you could sprinkle some of these fruits on a green salad or make them into a delicious smoothie. - Beans and lentils are full of fiber and can pop right into any meal. Lentil soup with carrots and kale is one of the best ways to get your daily dose of fiber, as well as other nutrients. - Whole grains are high in fiber. If you eat a lot of white rice or bread, make the smart swap to whole grains, and you’ll definitely experience a whole new sense of health and vitality. Stay away from processed foods that can lead to dehydration, constipation, or diarrhea, all of which could irritate the anus and rectum. A healthy diet is one of the best ways to prevent inflammation in this region of your body. Fighting The Hemorrhoid Stigma Unfortunately, this common condition is often viewed with a sense of shame. It’s likely the fact that it’s a bathroom-related problem that causes discomfort and embarrassment. Despite the stigma, many people have had at least one hemorrhoid. Fortunately, some light is being shed on this subject, and people are becoming less and less embarrassed to talk about their conditions. This is a great thing because it means more information is out there, and people can swap stories about what has worked for them and what hasn’t. The other good thing about shedding light on the hemorrhoid epidemic and how many people it affects is that people who suffer from this condition are less likely to feel alone. There are now hemorrhoid support groups where you can ask questions and get answers about your condition. You can also go on social media and ask questions in safe spaces where others understand what you are going through. It’s very heartening that people look at this normal inflammation of the veins in the anus and rectum as something that people live with, not a horrible medical condition. Living With Chronic Hemorrhoids Even if you find that you can’t treat your hemorrhoid outbreak either medically or with at-home remedies, you can still live a full life with chronic hemorrhoids or several of them. Keep Creams Or Witch Hazel On Hand If you know that you are prone to suffering from flare-ups in your rectum or anus, keep a tube of cream specifically for this condition or some witch hazel in your medicine cupboard. These treatments rarely, if ever, expire and will do you a world of good if you find yourself in a situation where you have a surprise hemorrhoid. Knowing that you’re prone to getting them means that you should take steps to deal with them when they arrive. Always Go To The Bathroom With A Step Stool Even if you’re not experiencing a flare-up, you should still poop optimally by propping your feet up on a stool and putting less pressure on your anus and rectum. This will allow the veins there to relax, and you can relieve yourself without straining as much. Practice going to the bathroom like this all of the time, not only when experiencing a hemorrhoid-related issue. In public toilets, try to adjust your seating position to match your use at home more closely. Once your body gets used to relieving itself in this fashion, it should be easier to remember to keep the pressure off those sensitive veins inside your anus and rectum. Be An Advocate For Others Fight against the hemorrhoid stigma by being a great advocate for other people suffering from the same condition. Volunteer your time in digital spaces, like online messaging boards, and give fellow suffers insight into how to best deal with their conditions. You can also offer advice in a mentor/mentee type of setup and assure them that it improves over time. Try To Make Health A Lifestyle It’s easy to remember to eat your fiber when you’re having a hemorrhoid flare-up, but to ensure that you are staving off more inflammation, you need to consume a good amount of fiber every single day. Keep your diet primarily to whole foods, like fruits and vegetables, and remember to get a lot of water in your system. All of this will help keep your stools soft and let them pass through your body without further irritating your bowels. In addition to eating properly, you need to remember to incorporate moderate exercise into your daily life. Join a gym, running club, or a yoga studio to keep your body active and your digestive system happy. This will help keep any future hemorrhoids at bay and also give you the fringe benefit of having a healthier and happier lifestyle overall. Final Thoughts: Know When You Should Seek Serious Hemorrhoid Treatment Those who have had a hemorrhoid or two in the past are more likely to get them in the future. It’s important to know what type can be treated at home and which ones you’ll want to seek medical help for. Understanding the difference is one of the keys to being healthy while suffering from this chronic condition. If you experience an inflammation that causes severe pain or is bleeding copiously, go to your doctor. It’s possible that it’s just a normal occurrence and will go away on its own, but just in case, it is always good to seek medical treatment whenever you are unsure. Catching a problem earlier is always preferable to find it later on down the road when it might be more difficult to treat effectively. If you are suffering from this rectal and anal inflammation, it doesn’t need to be the end of the world or drastically change your life. Hemorrhoids are widespread and easy to treat and prevent with the right medication and lifestyle choices.
<urn:uuid:0705097a-fea4-49de-af39-2e6a4d2220fb>
CC-MAIN-2022-33
https://www.powerofpositivity.com/doctors-explain-hemorrhoids-treatment-options/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572408.31/warc/CC-MAIN-20220816151008-20220816181008-00405.warc.gz
en
0.952916
3,292
2.703125
3
One of the most common pieces of equipment in many industries is a heat exchanger. As its name implies, it is designed to move heat from a process fluid to another fluid — which might be liquid or air. The process fluid is heated or cooled as the application demands. The transfer fluid might be air or a liquid, also as the application demands. In a previous article, I looked at air-cooled heat exchangers, where a hot process fluid typically is cooled by ambient air. In this article, I’ll examine liquid-to-liquid designs, discuss how they work and explain how to monitor their performance to gain higher efficiency and reduce operating costs. Some may be liquid-to-gas (steam, for example), but they differ from air-cooled designs in that both sides are closed systems. For the balance of this article, I’ll simply call these heat exchangers. While there are many possible configurations, two of the most common are shell-and-tube and plate heat exchangers. Shell-and-tube designs send the process fluid (usually a liquid) through a group of parallel tubes that are enclosed by a shell (figure 1). The transfer fluid flows around inside the shell as directed by baffles, and heat is transferred through the tube walls. Plate heat exchangers use a stack of alternating-shaped plates that seal around the outside edges to form liquid passages (figure 2). There are additional passages in the corners that allow the process and transfer fluids to flow between alternate plates. This design provides a great deal of surface area for heat transfer and can support a large or small number of plates, depending on the application. Operators can open the frame and add or remove plates to the stack as needed. This also permits inspection for internal deposits and makes cleaning easier than with most shell-and-tube designs. Monitoring the critical temperature, flow and pressure variables in a heat exchanger with WirelessHART instruments provides the data required for analysis to optimize operation and maintenance. Using preconfigured apps to perform the analysis greatly simplifies this task. When combined, these two technologies substantially simplify the task of improving heat exchanger performance. Maintaining Effective Transfer Creating conditions for effective heat transfer with any equipment configuration depends on two things: fully distributed fluid flow and unimpeded heat transfer. Any heat exchanger has a theoretical maximum transfer capability based on the amount of surface area and the heat conductivity of the metal. These factors relate to the hardware itself, but operational effectiveness also depends on flow rate/residence time of the fluids and temperature differentials. These variables have to be considered in light of the limits of the equipment. Fluid flows must be continuous and spread out over the entire surface area. Movement creates turbulence, avoiding the formation of thermal barriers and boundary layers where much of the liquid is kept away from the actual transfer surface. Internal flows are determined by the equipment’s physical configuration, so there is no way to improve it without changing the structure. Internal obstructions can block off sections and cause dead areas, however, which reduces the available effective surface. These dead zones need to be avoided. The heat transfer surface must be free of any deposits that can serve as insulation. Sometimes, these are carried and deposited by the liquids, or they may be the result of corrosion. Any solids on the metal on either side can reduce the heat transfer effectiveness. If the deposits are thick enough, they also can impede flow, compounding the problem. FIGURE 1. Shell-and-tube heat exchangers typically have a large, open, free passage for the transfer of liquid, so changes in differential pressure can be difficult to capture. Efficiency considers how much effort it takes to get the temperature change desired. For example, if the application calls for raising the temperature of a feedstock from 212 to 302°F (100 to 150°C) at a flow of 20 gal/min, the transfer liquid temperature will have to be hotter than 302°F (150°C). But, how much hotter, and how high a flow rate is needed? This is determined by the efficiency of the heat exchanger. Because heating the transfer liquid costs money, less heat is better. No heat exchanger can achieve 100 percent of the theoretical maximum transfer. But, operators normally want to be as close as possible, and controlling these flows and temperatures has a major effect. A given heat exchanger will have a sweet spot: the ideal flow and temperature range where it performs best. Operating above or below this range will result in a loss of efficiency. Where the process calls for highly variable flows and temperature changes, the facility may have multiple heat exchangers of different capacities, often operable as trains. For example, a thermal power plant might have a conventional boiler feeding steam to turbines to generate electricity. Exhaust steam is fed to air-cooled heat exchangers to act as condensers, but then liquid condensate flows to shell-and-tube heat exchangers heated by steam and acting as feedwater heaters. Because electric power demands fluctuate, the amount of steam generated also fluctuates. Power plants typically have multiple heat exchangers for condensers and feedwater heaters. This allows the generating unit to operate with the amount of cooling and heating capacity needed at any moment, with every heat exchanger operating in its efficiency sweet spot. FIGURE 2. Plate heat exchangers can be configured with a different number of plates to optimize the unit for a specific flow rate or temperature change. Getting the most efficiency out of a common shell-and-tube or plate heat exchanger requires knowing much detail about what is happening inside. Because the main operating parameters relate to flow rate and temperature differential for the two respective fluids, it is important for them to be monitored. It is possible to calculate the maximum theoretical heat transfer for the installation at a specific set of temperature differentials and flow rates. The equipment manufacturer usually can provide some supporting data on its ideal operating range. Any deviation from the calculated maximum indicates a loss of efficiency, which raises the operating cost. Efficiency losses typically are caused by fouling or other material deposited on the surface of the tubes, which acts as insulation. Such deposits can be on either side of the tube or plate wall, or both, depending on the conditions. The challenge becomes determining how far below maximum efficiency the unit is running and where the fouling might be occurring. Data from instruments can help plant personnel make these critical determinations. Whether using a shell-and-tube, plate or other heat exchanger configuration, it is important to have a basic set of instruments to determine what is happening and what kind of efficiency performance the exchanger is delivering. Things to consider regarding basic instrumentation include (figure 3): - The process fluid inlet and outlet must have temperature sensors so any change can be measured. - The transfer fluid inlet and outlet also must have temperature sensors. - The process fluid flow is likely controlled by the automation system controlling the process unit, but such is not always the case. If the flow rate value is not already being measured or the data is impossible to access, a flowmeter should be added. - The transfer fluid flow may be measured somewhere in the system, but just in case it is not, or if the value may not be easily accessible, it is helpful to have a flowmeter on the outlet. - The pressure drop across the process fluid side should be measured using a differential pressure (DP) transmitter, with the high side tied to the inlet and the low side to the outlet. - The pressure drop across the transfer fluid side is a valuable measurement for plate heat exchangers, but it is not as critical for shell-and-tube units because the internal passages are usually wide open. FIGURE 3. Strategically placed WirelessHART instruments can measure all the operational variables for a heat exchanger. Where heat exchangers are arranged in a train, it is valuable to have temperature sensors on each to measure the performance of the intermediate units. This allows easier visibility to see which specific exchanger may be experiencing problems, which is not possible if only monitoring the temperature at the beginning and end of the train. If every instrument listed above is deployed, the result will be four temperature instruments, two differential pressure instruments and two flowmeters. It can be difficult to add the required wiring infrastructure for eight points of measurement for a single heat exchanger and incorporate each into the existing process automation system. The wiring and system integration costs alone decrease the overall savings potential. An easier way to capture these readings using a minimum amount of hardware is a wireless network using a protocol such as WirelessHART. Being wireless, it eliminates most wiring and I/O costs. Here is a typical setup using WirelessHART instrumentation: - The temperature readings can all be handled by a single WirelessHART temperature transmitter capable of sending data from four sensors on one wireless signal, reporting each reading in turn. The host system sorts out the data and updates each sensor reading individually. This setup also coordinates all temperature readings, eliminating the impact of reporting lag in the temperatures. - The differential pressure readings can be provided using a native WirelessHART differential pressure instrument. - The flowmeters for the transfer and process fluids can use self-contained WirelessHART differential pressure-based instruments. The cost and possible downtime required for installing WirelessHART instruments must be balanced against expected benefits. WirelessHART reduces installation costs and time, providing a quick return on investment from even smaller capacity heat exchangers. Understanding Performance from Data When a heat exchanger is fully instrumented, how can the data help improve performance and reduce costs? When the temperature change and flow rates of both fluids are known, it is possible to determine how close the heat exchanger is running to its theoretical limit. Naturally, in the real world, 100 percent efficiency is not practical, so a company must determine how much deviation it is willing to tolerate before it takes the heat exchanger out of service for cleaning. This practice allows for more predictive and proactive maintenance compared to reactive and preventive approaches common today. If there is degradation due to fouling, the instruments help determine where the deposits are forming. If there is a rise in the differential pressure reading of the process fluid without a corresponding change in flow and no change in the transfer fluid, the fouling is on the process side. Inexplicable changes in pressure or flows could indicate internal leakage where one liquid is mixing with the other. FIGURE 4. Preconfigured dashboards within modern process-monitoring apps make it easy to recognize abnormal situations. Analytical Mechanisms and Tools Efficiency calculations based on temperature differentials and flow rates can be performed in real time if the right tools are available. Historically, methods for performing such analysis had to be created via programming and unique user interfaces or manual calculations and spreadsheets. Today, pre-configured apps using drawn from the consumer electronics industry simplify user interactions. For instance, a heat exchanger app can perform complex analysis to determine and display the overall health of the heat exchangers using data from the instrumentation. When provided with some basic values related to the equipment configuration and data from the wireless (or sometimes wired) sensors, such apps can monitor, record and analyze how the heat exchanger is performing. App dashboards that operate independently from the larger distributed control system allow basic process control functions to be accessed independently. The necessary functionality and intelligence are built in, so the user needs only add basic configuration details. Apps like these often are dedicated to a specific type of plant asset or subsystem, so they are preprogrammed to perform whatever specialized analytics may be necessary. These analytics vary from failure-mode analysis to leveraging machine-learning techniques. They connect with the monitoring instrumentation directly through the WirelessHART network and do not have to work through the larger process automation system, although this may be an option. The ability to monitor and evaluate critical plant assets such as heat exchangers, pressure-relief valves, steam traps and centrifugal pumps helps an industrial plant or facility reduce operating costs and plan maintenance efforts more effectively. WirelessHART instruments combined with easy-to-use apps is one way instrumentation is creating new possibilities for improvements.
<urn:uuid:660a3ae6-e49d-4206-82bf-75759eabf05d>
CC-MAIN-2022-33
https://www.process-heating.com/articles/92957-improving-heat-exchanger-performance-via-wireless-technology
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00202.warc.gz
en
0.922715
2,529
3.125
3
“Lesson 41: Doctrine and Covenants 36–37,” Doctrine and Covenants and Church History Seminary Teacher Manual (2013) “Lesson 41,” Doctrine and Covenants and Church History Seminary Teacher Manual On December 9, 1830, two days before Edward Partridge was baptized, the Lord gave him a revelation through the Prophet Joseph Smith. In this revelation, which is now recorded in Doctrine and Covenants 36, the Lord forgave Edward Partridge of his sins and called him to preach the gospel. The Lord also issued a commandment for all priesthood holders to preach the gospel. Shortly after receiving this revelation, Joseph Smith received the revelation contained in Doctrine and Covenants 37, in which the Lord commanded the Saints to leave New York and gather to Ohio. Bring to class a suitcase (or backpack) containing items a missionary might need when serving a full-time mission. For example, you might include scriptures, white shirts, ties, dress shoes, and a copy of Preach My Gospel. Show students the closed suitcase and invite them to imagine it is packed for a missionary who is on his or her way to serve a full-time mission. Ask what they expect might be in the suitcase. Then open the suitcase and display its contents. (Or, you could invite students to work in pairs to make a list or draw pictures of items that missionaries may need on their missions.) Explain that there are other things that missionaries need that do not necessarily fit in a suitcase (or backpack). The Lord mentioned some of these things in a revelation addressed to Edward Partridge. That revelation is now found in Doctrine and Covenants 36. Invite students to look for what a missionary needs before he or she is prepared to serve a mission as they study this revelation. (As students identify truths during this lesson, you may want to write those truths on pieces of paper. Then tape or pin the pieces of paper to the outside of the suitcase or backpack for students to see. You could also simply list them on the board.) Invite a student to read aloud the following background information for Doctrine and Covenants 36. Ask the class to listen for what helped Edward Partridge make the decision to be baptized. Within a few weeks of the arrival of Elder Oliver Cowdery and his companions in northeastern Ohio, many people had been baptized into the restored Church of Jesus Christ. Although Edward Partridge’s wife, Lydia, had been among those who had been converted and baptized by the missionaries, Edward was still not fully convinced. He desired to visit the Prophet Joseph Smith before making up his mind. He and Sidney Rigdon arrived in Waterloo, New York, as Joseph Smith was in the middle of a sermon. When the Prophet had finished speaking, Edward stood to speak. He reported that on their way to Waterloo, he had spoken with the neighbors near the Smith family farm in Manchester about the character of the Smith family. Satisfied with what he had learned, Edward asked if Joseph would baptize him. (See Documents, Volume 1: July 1828–June 1831, vol. 1 of the Documents series of The Joseph Smith Papers , 197, 199, 224.) Invite students to read Doctrine and Covenants 36:1 silently, looking for what the Lord told Edward Partridge after he was baptized. What blessing did Edward Partridge receive as a result of his baptism? (The Lord forgave his sins.) What responsibility did Edward have after he was baptized? Why do you think it is important for those who are called to preach the gospel to repent and be forgiven of their sins? To help students understand why it is important for prospective missionaries to repent of their sins, invite a student to read aloud the following statement by Elder Jeffrey R. Holland of the Quorum of the Twelve Apostles. (You may want to point out that when Elder Holland uses the phrases “play for the adversary” and “suit up for the Savior,” he is likening the battle between good and evil to an athletic contest.) Consider preparing a copy of this statement for each student. “In this battle between good and evil, you cannot play for the adversary whenever temptation comes along and then expect to suit up for the Savior at temple and mission time as if nothing has happened. … God will not be mocked. … “… The Lord has drawn lines of worthiness for those called to labor with Him in this work. No missionary can be unrepentant of sexual transgression or profane language or pornographic indulgence and then expect to challenge others to repent of those very things! … The Spirit will not be with you, and the words will choke in your throat as you speak them. You cannot travel down what Lehi called ‘forbidden paths’ [1 Nephi 8:28] and expect to guide others to the ‘strait and narrow’ [2 Nephi 31:18] one—it can’t be done” (“We Are All Enlisted,” Ensign or Liahona, Nov. 2011, 45). To help students understand what they can do now to be clean for missionary service, invite a student to read aloud the following invitation to repent, also from Elder Holland: “Whoever you are and whatever you have done, you can be forgiven. Every one of you … can leave behind any transgression with which you may struggle. It is the miracle of forgiveness; it is the miracle of the Atonement of the Lord Jesus Christ. But you cannot do it without an active commitment to the gospel, and you cannot do it without repentance where it is needed. I am asking you … to be active and be clean. If required, I am asking you to get active and get clean” (“We Are All Enlisted,” 45). Explain that although Edward Partridge had been baptized prior to receiving this revelation, he had not yet received the gift of the Holy Ghost. Ask students to read Doctrine and Covenants 36:2–3 silently, looking for what the Lord told Edward about the gift of the Holy Ghost. Invite students to report what they find. Based on what the Lord told Edward Partridge, why do missionaries need the Holy Ghost as their companion? According to verse 2, what would the Holy Ghost teach Edward Partridge? What do you think it means to learn “the peaceable things of the kingdom”? (To help students answer this question, have them read Doctrine and Covenants 42:61.) You might invite students to share experiences they have had when the Holy Ghost has taught them the peaceable things of the kingdom. (Remind students that some experiences are too sacred or personal to share.) Invite a student to read Doctrine and Covenants 36:4–5, 7 aloud. Before the student reads, point out that in these verses, the Lord is speaking to “the elders of [His] church” (D&C 36:7). Ask the class to follow along, looking for a responsibility the Lord gave to priesthood holders. What responsibility did the Lord give to priesthood holders? (After students respond, write the following truth on the board: Priesthood holders are called to preach the gospel.) To help students understand the importance of this truth and how it applies in our day, invite a student to read aloud the following statement by President Thomas S. Monson. “I repeat what prophets have long taught—that every worthy, able young man should prepare to serve a mission. Missionary service is a priesthood duty—an obligation the Lord expects of us who have been given so very much” (“As We Meet Together Again,” Ensign or Liahona, Nov. 2010, 5–6). According to Doctrine and Covenants 36:5, what do priesthood holders need to do before they are ordained and sent forth to preach the gospel? How can a young man show the Lord that he embraces the commandment to preach the gospel? Who do you know who has embraced the commandment to preach the gospel? How has this person’s example influenced you? You may want to explain that although full-time missionary service is a priesthood duty, young women may also serve. President Thomas S. Monson said: “A word to you young sisters: while you do not have the same priesthood responsibility as do the young men to serve as full-time missionaries, you also make a valuable contribution as missionaries, and we welcome your service” (“As We Meet Together Again,” 6). Ask students to read Doctrine and Covenants 36:6 silently, looking for the basic message the Lord commands His missionaries to teach. To help students understand the phrase “garments spotted with the flesh,” explain that in ancient Israel, clothing that was contaminated with disease was burned to prevent the disease from spreading. In this verse, the Lord compares disease with sin and thus commands us to avoid anything associated with sin. (See Bruce R. McConkie, Doctrinal New Testament Commentary, 3 vols. [1965–73], 3:428.) Invite a student to read Doctrine and Covenants 36:7 aloud. Ask the class to follow along, looking for the manner in which priesthood holders should embrace their calling. How can a priesthood holder “embrace [his calling] with singleness of heart”? (Answers might include being committed to his calling and serving with sincerity and integrity.) If you have served a full-time mission, consider sharing your experience of embracing the call to preach the gospel. Explain that while Sidney Rigdon and Edward Partridge were investigating the Church in Ohio, persecution of the Saints in New York was increasing. In some cases, threats were made on the lives of Church leaders, and their enemies were meeting in secret to plot their destruction (see D&C 38:13, 28–29). Near the end of December 1830, a few weeks after Sidney Rigdon and Edward Partridge arrived in New York, Joseph Smith received a revelation in which the Lord commanded the Saints to escape their enemies and move to Ohio. Invite three students to take turns reading aloud from Doctrine and Covenants 37:2–4. Ask the class to follow along, looking for preparations the Lord wanted Joseph to make before he went to Ohio. Invite students to report what they find. Why did the Lord command Joseph Smith to go to the Saints in Colesville? What principles can we learn from these verses about prayer? (Students may use different words, but make sure they identify the following principles: If we pray in faith, the Lord will answer our prayers. The Lord often uses others to answer our prayers.) When has another person been an answer to your prayers? As prompted by the Spirit, share your testimony of the doctrines and principles discussed in this lesson. Invite students to act upon what they have felt as they studied these revelations.
<urn:uuid:c24efc76-560c-4bea-a07e-82774d49ec6d>
CC-MAIN-2022-33
https://www.churchofjesuschrist.org/study/manual/doctrine-and-covenants-and-church-history-seminary-teacher-manual-2014/section-02/lesson-41?lang=eng
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00004.warc.gz
en
0.962084
2,299
3.140625
3
The FDA hasn’t approved a new drug for Alzheimer’s disease in more than 17 years. It looks like that is about to change. Aducanumab isn’t a cure by any means, but it’s the first drug to get this far in an approval process that actually modifies the underlying pathology of Alzheimer’s, and helps delay cognitive decline in early stage Alzheimer’s. How does Aducanumab work? Amyloid-beta is a protein that is normally present in the brain. In the Alzheimer’s brain the abnormal levels of the protein clump together to form amyloid plaques. Researchers think that these clumps lead to brain cell death. Aducanumab is a monoclonal antibody that targets amyloid-beta. Researchers developed it using Neurimmune’s proprietary Reverse Translational Medicine Platform. Neurimmune scientists discovered Aducanumab with a team of researchers at the University of Zurich. The human antibody targets the aggregated amyloid-beta. Through this interaction, Aducanumab could reduce the number of amyloid plaques present in the brain. This ultimately may slow neurodegeneration and disease progression. Aducanumab in clinical trials In 2007, Neurimmune licensed the exclusive rights to Biogen, which sponsored several clinical trials investigating Aducanumab in humans. Together, Neurimmune’s and Biogen’s scientists published a study in Nature 2016 that described how one year of monthly intravenous infusions of Aducanumab reduces brain beta amyloid in a dose- and time-dependent manner in patients with pre-dementia or mild Alzheimer’s disease. 1https://www.nature.com/articles/nature19323 The history of the clinical trials of Aducanumab is confusing. If you want to read the details about the trials continue reading. If you want the bottom line , scroll down and read from *But Biogen reversed course and decided to continue the trials. On March 21, 2019, the manufacturer (Biogen) announced it had ended two Phase 3 clinical trials of Aducanumab for Alzheimer’s. The drug had failed a “futility analysis,” which means a clinical trial is stopped when the interim results suggest that it is unlikely to achieve statistical significance.1 But then just five months later, Biogen announced that they were applying for FDA marketing approval. They explained that data gathered in the three months between the start of the futility analysis and the decision to end the trial hadn’t been used in the original analysis. After adding the additional three months of data, they realized that a subset of patients who had been given higher doses saw significant benefits on measures of cognition and function, including memory, orientation and language. Those patients also saw benefits in daily living activities.2 The OptumRx Pipeline Surveillance team observed that despite the positive reported outcomes, Aducanumab has only demonstrated a statistically significant improvement in one of the two pivotal trials. Further, in the one positive trial, the reported improvements were small, and the true clinical relevance of the findings remain uncertain. Researchers have completed three Phase 1 trials. These were assessing Aducanumab in healthy volunteers (NCT02782975) and in Alzheimer’s disease patients in the U.S. (NCT01397539) and Japan (NCT02434718). A fourth, randomized, double-blind, and placebo-controlled Phase 1 trial (NCT01677572), PRIME, enrolled 192 pre-dementia and mild Alzheimer’s patients at 32 sites in the U.S. The goal was to assess the safety and effect of different aducanumab doses versus a placebo on amyloid plaques. Researchers measured this with positron emission tomography imaging. Interim results from the first 165 patients showed that all doses of Aducanumab (given as monthly infusions into the bloodstream) significantly reduced amyloid plaques in the brain in a time- and dose-dependent manner. During the first year, 40 patients from both groups discontinued treatment. Little to no change was apparent in the placebo group after one year. The greatest reduction was present at higher doses. Aducanumab also appeared to slow the rate of cognitive decline. Researchers measured this as a change in the clinical dementia rating sum of boxes (CDR-SB) and the mini-mental state examination (MMSE). They presented results from a long-term extension of the PRIME trial at the 2017 Clinical Trials on Alzheimer’s Disease meeting. In total, 143 patients from the initial trial opted to continue in the long-term extension study, where all patients received Aducanumab. This included data from patients who had been on Aducanumab for up to three years. During this time, patients who received Aducanumab continued to experience a time- and dose-dependent reduction in amyloid plaque levels. Biogen also began two large-scale randomized, double-blind, and placebo-controlled Phase 3 clinical trials in people with early-stage Alzheimer’s disease. The first trial, called ENGAGE (NCT02477800), aimed to enroll 1,350 patients at 187 sites in North America, Australia, Europe, and Asia. The second trial, called EMERGE (NCT02484547), also sought to enroll the same number of patients at 194 sites in North America, Europe, and Asia. The goal of both trials was to assess the efficacy of Aducanumab, given once a month at low and high doses by infusion into the bloodstream. Researchers measured the effectiveness of the treatment by changes from the start of the study in the CDR-SB, MMSE, Alzheimer’s disease assessment scale-cognitive subscale 13 items (ADAS-Cog 13), and Alzheimer’s disease cooperative study-activities of daily living inventory mild cognitive impairment version (ADCS-ADL-MCI) scores over a 78-week period. They had expected to complete the trials in 2022. The company halted the trials because an independent data monitoring committee found that they were unlikely to meet their primary objective. This was based on initial data from the trials and not on safety concerns. Follow-up visits and closing-out activities for both trials are now complete. The Phase 2 EVOLVE trial (NCT03639987) began in late 2018 to evaluate the safety of continued dosing of Aducanumab in participants with mild cognitive impairment due to Alzheimer’s disease or with mild Alzheimer’s disease dementia. This trial also was halted in March 2019 as a result of the committee’s findings. *But Biogen reversed course and decided to continue the trials. A later analysis based on additional follow-up data, showed that EMERGE met its primary goal. Patients receiving the highest dose of Aducanumab experienced a significant reduction in the progression of cognitive and functional impairments. Although ENGAGE failed to meet its primary goal, Biogen stated that data from the sub-group of patients who had sufficient exposure to the medication also showed significant benefits. These and other supportive findings formed the basis of the company’s BLA (Biologics License Application) submitted to the FDA requesting the approval of Aducanumab for the treatment of Alzheimer’s disease. In August 2020, Aducanumab was granted priority review by the FDA, meaning that the agency plans to expedite the review process to determine whether they will approve the medication. Are there any negative side effects from taking Aducanumab? Researchers said a majority of the test subjects taking Aducanumab showed no negative side effects. In some cases, however, patients experienced swelling in the brain called “amyloid-related imaging abnormalities” (ARIA) and headache. How is the drug administered? Intravenous doses of Aducanumab are given about 4 weeks apart over approximately 52 weeks for a total of 14 doses. Qualifying patients can continue into the long-term extension at a dose approximately 4 weeks apart for up to an additional 112 doses. When will Aducanumab become available? The FDA process for reviewing applications for approval, called New Drug Applications or NDAs, usually takes around 10 months. Biogen has said the Aducanumab application has about 4,500 files with more than 2.5 million pages of data and information. Biogen believes a decision will be made by June 7, 2021. Though the FDA would continue to monitor the effects of the drug, to ensure no unexpected side effects from prolonged usage, after approval the drug can be made available widely. People with Alzheimer’s disease may have a new medication to take soon. How much will it cost? Aducanumab is expensive, with the annual cost projected to be around $50,000 for the recommended dosage, based on one infusion per month. Even if the drug is approved by the FDA, the Centers for Medicaid and Medicare Services can determine for themselves how much Medicaid and Medicare will cover Aducanumab if the cost is high. PET brain scans to detect amyloid beta plaques would probably be necessary to determine aducanumab coverage, and those are expensive as well. Where can I buy it? I ordered Memantine for my husband from Europe before it was available in the U.S. India manufacturers provide many of the drugs sold in the U.S. I found this website for an Indian Pharmaceutical company which sells Aducanumab throughout the world. https://indianpharmanetwork.co.in/buy-aducanumab.php The problem, of course, with buying Aducanumab from an Indian pharmacy is that you’d have to find a doctor who is willing to administer it intravenously. Since it is expected to be approved this summer, it’s probably more prudent to wait until you can get it prescribed by your doctor. But keep in mind that you might be able to save money by ordering it from India even after it is approved by the FDA. Although Aducanumab isn’t a cure for Alzheimer’s, it is the first drug that is showing some promise for providing more time to individuals with this insidious disease. - The Lancet. A resurrection of aducanumab for Alzheimer’s disease. Published December 4, 2019. Accessed January 7, 2020. - Bio Space. Biogen Alzheimer’s Plans Met with Hope, Some Skepticism. Published: December 6, 2019. Accessed January 7, 2020.
<urn:uuid:05e017b6-e570-4432-a96b-55d89af6ad11>
CC-MAIN-2022-33
https://barbracohn.com/tag/cognitive-decline/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571153.86/warc/CC-MAIN-20220810100712-20220810130712-00605.warc.gz
en
0.945975
2,254
2.796875
3
The Federal Constitutional Court confirms basic right to future in its decision. 1. What did the Federal Constitutional Court decide? 1. What did the Federal Constitutional Court decide? On 29.04.2021, the German Federal Constitutional Court (BVerfG) announced its decision to set a new standard for climate action and the protection of fundamental rights. The Court states that today's insufficient climate policies affect tomorrow's freedoms and fundamental rights. It is a constitutional requirement to reduce greenhouse gas emissions and this must no longer be delayed at the expense of younger generations. The Federal Climate Protection Act of 2019 is declared unconstitutional in large parts and must be improved accordingly. The court calls on the legislature to follow scientific guidance and present a conclusive emissions reduction plan by the end of 2022 with the goal of greenhouse gas neutrality. In doing so, the freedoms and fundamental rights of young and future generations must be safeguarded and the CO2 budget must be distributed in a way that is fair to all generations. In its decision, the Constitutional Court also emphasizes Germany's international responsibility in the global climate crisis and notes that a state cannot evade its responsibility by referring to the greenhouse gas emissions of other states. The core statements of the decision are: - Climate protection is a human right - The constitution is interpreted in a way that is fair to all generations - Climate change is real and the legislature must counteract it - The legislature must be guided by the requirements of science and develop coherent an approach for greenhouse gas neutrality - Climate protection is justiciable, today and in the future - Climate protection is part of the protection of fundamental rights For more information on the decision, see the brief analysis by attorney Dr. Roda Verheyen The Federal Constitutional Court has ruled on four climate constitutional complaints. Germanwatch, Greenpeace and Protect the Planet supported one of the lawsuits. 2. Why is the decision historic?2. Why is the decision historic? The ruling is both ground-breaking and historic: The decision raises the temperature goals of the Paris Agreement and the achievement of climate neutrality to a constitutional status: Article 20a of the constitution, which protects "in responsibility for future generations, the natural foundations of life and animals," becomes enforceable (justiciable). With its decision, the Federal Constitutional Court provides a contemporary redefinition of the concept of freedom in the climate crisis. The state's obligation to protect the freedom of the young generation in the future results in an obligation to do more to protect the climate in the present. 3. What happens after the court decision?3. What happens after the court decision? The legislature must amend the Climate Protection Act of 2019 by the end of 2022. The new measures announced by the government shortly after the ruling - 65% reduction by 2030, 88% by 2040 and climate neutrality as early as 2045 - are major steps in the right direction. They had been politically unthinkable before the ruling. It is unclear how these targets will be achieved in concrete terms and transferred to the individual sectors. These goals are not yet in line with the Paris Agreement and a temperature reduction to 1.5 degrees. 4. What is the background of the lawsuit?4. What is the background of the lawsuit? In 2020, nine young people between the ages of 15 and 32 from different regions of Germany decided to go to the Federal Constitutional Court. In their eyes, the Federal Climate Protection Act (passed in 2019) is too weak to effectively contain the consequences of the climate crisis today and in the future. The plaintiffs' lives will extend into the second half of the 21st century, when the impacts of global warming will reach a much greater intensity than is already the case at present. Their families work in tourism or agriculture and live on islands like Pellworm or Langeoog. They are already feeling the climate crisis in the form of extreme weather events and sea level rise, and they are worried about their future. With its insufficiently ambitious climate policy, the German government is not fulfilling its mandate, anchored in the German constitution, to protect their basic rights to life and physical integrity, to property and to their occupation. The constitutional complaint is based on lawsuits filed in Germany and at the EU level: Some of the complainants, together with Greenpeace, had filed a lawsuit against the insufficiently ambitious national climate target 2020 before the Berlin Administrative Court. Lüke Recktenwald from Langeoog had gone to the European Court of Justice with his family for more ambitious 2030 EU climate targets. Like Luisa Neubauer from Fridays for Future, he joined the constitutional complaint in early 2020. Already in November 2018, before the climate protection law was passed, an alliance consisting of the German Solar Energy Promotion Association (SFV), the Friends of the Earth Germany (BUND) and other individual plaintiffs had filed a constitutional complaint. In addition, other young adults from Germany and people from Bangladesh and Nepal affected by climate change also filed constitutional complaints in early 2020. They are supported by the NGO Environmental Action Germany (DUH). More information here. 5. What exactly happened in the legal process?5. What exactly happened in the legal process? On February 12, 2020, nine young plaintiffs filed their constitutional complaint with the Federal Constitutional Court. (AZ: 1 BvR 288/20). On June 19, 2020, the Federal Constitutional Court sent the complaint to the Bundestag and the Bundestag Council, the Chancellor's Office, the Federal Ministry of the Interior and the Federal Ministry of Justice, and all state governments, requesting them to submit their comments. In October 2020, the Federal Government and the Bundestag submitted their comments. On February 11, 2021, the complainants responded to the comments of the Federal Government and the Bundestag with a reply. On April 29, 2021, the Federal Constitutional Court announced its decision. 6. Who are the plaintiffs and to what extent are they affected by the climate crisis?6. Who are the plaintiffs and to what extent are they affected by the climate crisis? Lüke Recktenwald (18 years old) is a student and lives on Langeoog. His family has been living on the North Sea island for four generations and they run a hotel and restaurant on the island. Lüke is already experiencing the effects of climate change: due to rising sea levels, storm tides and the resulting erosion of the dunes, the family's property and home are in danger. The island's drinking water supply is also threatened. Due to the rise of the sea level, salt water could enter to the only source of drinking water, the so-called freshwater lens, and make it unusable for decades - with serious consequences for life on the island. It is unclear how long Lüke can continue to live on Langeoog and whether he will be able to take over the family business in the future. Lüke is already a co-plaintiff in the European „People‘s Climate Case”, which calls for more ambitious European climate targets. The case was dismissed on March 25, 2021. Luisa Neubauer is Germany's best-known climate activist. At 23 years of age, the geography student belongs to the generation that will be confronted with dramatic effects of the climate crisis in the second half of the century. The co-founder of the German Fridays-for-Future movement has effectively "suspended" her education and private life in order to work together with hundreds of thousands of members of her generation for more climate action, both politically and in the media. She is now demanding effective protection for herself and future generations in court. She participates in the lawsuit as a private individual. The four siblings Sophie (21 years), Paul (20 years), Hannes (17 years) and Jakob (15 years) Backsen are from the North Sea island of Pellworm and wish to continue living there in the future. Their farm Edenswarf is a family business from the 17th century and will one day be taken over by the children. On their farm, the family grows crops and keeps livestock. The Backsens also keep sheep on the dike and rent out holiday apartments on the island. In September 2017, one third of Pellworm was completely under water. Most of Pellworm is located one meter below sea level. This means that with increasing storm tides the island could fill up like a bathtub after a dike burst. As a result of the climate crisis, extreme weather events such as heavy rain or drought are becoming more frequent. If the sea level rises, the existing dikes may soon no longer be sufficient to protect the island. Pellworm would become uninhabitable, even for the four children of the Backsen family. Lucas Lütke-Schwienhorst (32) has taken over the Ogrosen farm in Vetschau (Brandenburg), which has existed for more than 200 years, from his parents. The Lütke-Schwienhorsts keep about 120 dairy cows. The farm shop sells cheese, dairy products and other products from the Ogrosen farm community. Extreme weather events such as the hot summers with too little rainfall hit the farm hard: in the last two years, only about half of the usual hay and grain yield could be achieved. The unusually hot summer also impacted the animals - they suffered from heat stress. The forest belonging to the estate is extremely damaged. The ongoing climate crisis is thus endangering the income and property of Lucas and his family as well as the life of the next generations on the Ogrosen farm. Johannes und Franziska Blohm are to inherit their father's traditional fruit farm someday. However, whether the centuries-old farm will survive the coming generations is increasingly questionable. In the "Altes Land" near Hamburg, apples are the main crop grown on the organic farm alongside other types of fruit. The increase in extreme weather conditions, as well as plagues and fruit diseases that were previously unknown in these latitudes, are giving the organic farm a hard time - direct and indirect consequences of global warming. Without sufficiently ambitious climate protection, all plaintiffs face an uncertain and geopolitically unstable future that puts their lives at risk. In Germany, extreme weather events and new types of diseases also pose health risks which would not exist without climate change. For the plaintiffs' generation, climate change is a threat to their very existence. 7. What role did Germanwatch play in the lawsuit?7. What role did Germanwatch play in the lawsuit? Germanwatch and the environmental organizations Greenpeace and Protect the Planet supported the constitutional complaint of the nine young people, but are not acting as plaintiffs themselves. Germanwatch especially supports the plaintiff Lüke Recktenwald and his family on Langeoog and informs the German public about the proceedings. The accompaniment of climate lawsuits is an important part of the Germanwatch strategy to achieve a climate policy that appropriately addresses the global climate crisis. 8. Are there more legal actions around the world for more climate protection?8. Are there more legal actions around the world for more climate protection? The constitutional complaint is part of a worldwide trend of climate litigation: The decision of the The Federal Constitutional Court refers in various ways to previous (inter)national proceedings (e.g. the decision of the Berlin Administrative Court or the Dutch Hoge Raad in the so-called Urgenda case) and will in turn likely impact other ongoing proceedings, providing a new impetus for climate litigation. One lawsuit attracting significant attention regarding the question of intergenerational justice is the case of six Portuguese children and young people before the European Court of Human Rights (ECHR) in Strasbourg. The lawsuit is directed against all 27 EU member states as well as Great Britain, Switzerland, Norway, Russia, Turkey and Ukraine - in other words, all states party to the European Convention on Human Rights (ECHR). According to the young people, these states are violating their human rights because they are not reducing their greenhouse gases sufficiently to limit global warming to 1.5 degrees. In addition to the children from Portugal, Greta Thunberg and 15 other children have also filed a class action lawsuit with the UN Committee on the Rights of the Child in Geneva in September 2019. The committee is expected to find that Argentina, Brazil, Germany, France and Turkey share responsibility for the climate crisis and are therefore violating children's rights. The children invoke globally applicable children's rights and the third additional protocol of the UN Convention on the Rights of the Child through an individual complaint. In Colombia in 2018, 25 young people aged 7-25 filed a complaint against the Colombian government, several local governments and a number of companies. The young people argued that the government had failed on climate action. In particular, the ongoing massive deforestation of the Amazon threatens their fundamental rights to a healthy environment, life, health, food and water. In April 2018, the Supreme Court ruled in favour of the young people, recognizing the Colombian Amazon as a legal entity and calling on the government to implement measures against deforestation in the Amazon. In August 2019, the Bogota District Court scheduled a series of hearings to review the implementation of the Supreme Court's decision. 9. How should the decision of the European Court of Justice in the People's Climate Case be assessed in light of the Federal Constitutional Court ruling?9. How should the decision of the European Court of Justice in the People's Climate Case be assessed in light of the Federal Constitutional Court ruling? In March 2021, the European Court of Justice (ECJ) dismissed a lawsuit filed by ten families and a Sami youth association for more ambitious EU 2030 climate targets - on the grounds that climate change affects everyone and that the plaintiffs are therefore not uniquely and individually affected and accordingly do not have standing to sue. In contrast to the ECJ, the Federal Constitutional Court did not deny legal protection to those affected by climate change: according to the judge in Karlsruhe, the fact that many people are affected does not preclude that an individual can be affected in terms of their fundamental rights. Given the decision of the Federal Constitutional Court, a similar lawsuit at EU level could be judged differently in the future. In addition, the BVerfG's ruling and the German government's subsequent improvements to the German Climate Protection Act will also have a political impact at the EU level: In the context of the negotiations on the implementation of the new EU climate target for 2030 - the so-called Fit for 55 package - the question for every regulation and directive will be whether it is sufficiently ambitious to protect future generations. 10. Which other climate lawsuits does Germanwatch support?10. Which other climate lawsuits does Germanwatch support? In addition to the constitutional complaint and the People's Climate Case, Germanwatch supports two other proceedings: Since 2015, Germanwatch has been supporting the Peruvian farmer and mountain guide Saúl Luciano Lliuya in a civil climate lawsuit against the German energy company RWE. Due to climate change-induced glacier melt, a glacial lake above the Andean town of Huaraz, located at an altitude of 3,000 meters, has grown considerably. If the lake’s dam were to burst, Saúl Luciano Lliuya's house and a large part of the city of Huaraz, which lies below the glacial lake, would be threatened with catastrophic flooding. As Europe's largest CO2 emitter, RWE is responsible for around half a percent of all industrial greenhouse gas emissions worldwide since the beginning of industrialization. In this test case, Saúl Luciano Lliuya is demanding that RWE cover 0.5% of the cost for protective measures required at the glacial lake. The lawsuit is being heard by the Higher Regional Court of Hamm. At the end of 2021 or beginning of 2022, a visit Huaraz and the glacial lake is expected to take place with the German judges, lawyers and court-appointed experts. In addition, the court will examine scientific studies that establish a causal link between RWE's emissions and glacier retreat in Peru. A verdict in Hamm is expected in 2022 at the earliest, after which there could still be an appeal to the Federal Supreme Court. At the beginning of May 2021, Germanwatch also intervened through the European network CAN-Europe in the proceedings of the six Portuguese children and young people before the European Court of Human Rights in Strasbourg (see above), also presenting the legal considerations on which the recent decision of the Federal Constitutional Court was based. 11. How can I support Germanwatch?11. How can I support Germanwatch? Germanwatch's work in the field of climate action is based on donations. You are welcome to support us by making an earmarked donation. Thank you very much! In its decision today, the Federal Constitutional Court has largely accepted the constitutional complaint of nine young people for a humane future: Freedoms and fundamental rights are already being violated today by insufficient climate protection. The legislator must adapt the Federal Climate Protection Act by the end of 2022. Lawyer Dr. Roda Verheyen (Hamburg), who represents the young people, comments on the decision: "Today, the Federal Constitutional Court has set a globally remarkable new standard for climate protection as a human right. Against the background of the worsening climate crisis, the Climate Action Network (CAN) has launched the #WorldWeWant campaign. Through a series of short films, people from different regions of the world tell how climate change is affecting their lives and communities. Plaintiff Lüke Recktenwald is also involved with a video about his home island Langeoog. Lüke Recktenwald is a real "islander". His family has been living on the North Sea island of Langeoog for four generations and runs a hotel and restaurant. Whether Lüke will be able to live and work on the island in the future like his parents is uncertain, as Langeoog is increasingly threatened by the climate crisis. In this interview he tells how he experiences the climate and health crisis on the island and why he decided to go to court to demand climate protection. Anyone who violates another person’s fundamental rights by emitting greenhouse gases bears a double legal duty: First, to put a stop to this harm so that the (fundamental) rights of others are not undermined. Second, polluters have to account for the protection of those at risk as well as the damages that still occur. In order to enforce these legal obligations in Germany and internationally, Germanwatch supports three climate lawsuits. Deutsche Welle, 29.04.2021 German climate law is partly unconstitutional, top court rules The Guardian, 29.04.2021 ‘Historic’ German ruling says climate goals not tough enough The New York Times, 29.04.2021 German High Court Hands Youth a Victory in Climate Change Fight
<urn:uuid:fbc8e95b-d674-4474-a783-1b81fe0e83fe>
CC-MAIN-2022-33
https://www.germanwatch.org/en/constitutional-complaint
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00403.warc.gz
en
0.947582
3,877
3.5625
4
Chiropractic care, like any profession, uses many terms that may be unfamiliar to new patients at first. Here are Chiropractic terms along with their definitions to assist you. Acute (traumatic) Injuries An acute injury is one that comes from a event, such as a fall, sports, accident at work, or a motor vehicle accident. It is the most common type of injury and is short lived in nature. A form of chiropractic technique involving the application of gentle, yet firm pressure to a bone. Adjustments employ a high velocity, low amplitude thrust. The goal of any adjustment is to restore the bone to its natural, or original, position. A slow breakdown, or deterioration, of the joint spaces in your musculoskeletal system. Additional bone material, or over-growths, that have been attributed to a wide variety of ailments. Also called osteophytes, bone spurs are manufactured by your body in response to a breakdown in existing bony structures. Sometimes, bone spurs can exert pressure on nerves, and this leads to pain. A common contained disc disorder. Bulging discs may push into the canal causing symptoms such as pain going down leg or into the arm depending on location of the bulge. A condition in which the bursa, which is the fluid filled sack that cushions the joint, becomes swollen. Usually causing pin point tenderness. Carpal Tunnel Syndrome A progressive and sometimes painful joint disorder caused by a compression of the median nerve of your hand. The compression causes swelling, which exerts pressure on the nerve. The cervical spine in your neck. It is made up of seven vertebrae. Come from the Greek words, “chiro,” meaning hand, and “practic”, meaning practice, or treatment. Also known as a doctor of chiropractic (D.C.), diagnoses and treats a broad range of physical conditions in patients with muscular, nervous and skeletal problems, especially in the spine. Long-term, seemingly endless pain that could be a sign of a more serious problem or disease. Degenerative Disc Disease A condition in which the inner core of the vertebral discs leak proteins that can inflame the nerve roots. Application of scientific knowledge to the work place in a effort to improve the well being and efficiency of workers. Facet Joint Syndrome A condition in which the cartilage in the spinal joints wears thin. Your body begins producing material (called bone spurs) to shore up the cartilage. This material can calcify, or harden, causing stiffness in the joint. In some cases facet joint syndrome can contribute to joint inflammation, muscle spasms, and later osteoarthritis. The bony structures that allow your back and neck to easily move in different directions. Failed Back Surgery Syndrome A condition that refers to a host of problems that may be related to the after-effects of back surgery, but also other factors such as poor body mechanics or medication problems. A form of compressive neuropathy, or nerve impingement, in the lower back. Because lumbar stenosis almost always impinges the sciatic nerve, one or both legs can also be affected. Radiating pain or numbness in the legs, and sometimes the ankles, feet and toes, is common. A form of therapy often used in patients who have a chronic, or long-lasting pain. Heat therapy can involve many kinds of methods, from simple heating pads, wraps, and warm gel packs, to sophisticated techniques such as therapeutic ultrasound. While ice therapy is used to reduce swelling, heat therapy is used to relax the muscles and increase circulation. Both kids of therapy help reduce pain. A common non contained disc disorder in which a disc has ruptured, usually at its weakest point. The vast majority of herniated discs occur in the lower back or lumbar region. In a herniated disc, part of the disc shifts to a position that irritates the nearby nerve for that spinal area. Ice massage (cryotherapy) A form of therapy involving the application of ice to treat kinds of injuries, including those associated with back or neck pain. Ice causes the veins in the affected tissue area to constrict. This reduces the flow of blood while acting as kind of anesthetic to numb the pain. But when the ice is removed, the veins compensate by opening large, allowing a large volume of blood to rush to the affected area. The blood brings with it important chemicals that aid in the healing process. The lower back – made up of five vertebrae. A form of chiropractic treatment which involves the application of gentle yet firm pressure to muscles, joints and bones. The goal of manipulation is to restore normal joint motion and to eliminate pain. A type of headache that some people get repeatedly over time. Migraines occur when blood vessels of the head and neck spasm or constrict, which decreases blood flow to the brain. Minutes to hours later, the blood vessels dilate (enlarge), resulting in a severe headache. Inflammation around the blood vessels also occurs in some cases. A degenerative form of arthritis that mostly affects the elderly. In some, osteoarthritis may affect the spine’s facet joints, making it extremely painful to bend or twist. Osteoarthritis causes the cartilage to break down and away from the joints. Stripped of their protective material, the joints begin rubbing against each other, causing pain and impending movement. This action further irritates the surrounding nerves. Advanced forms of spinal osteoarthritis lead to disc collapse and other problems. A gradual disintegration of bone. Osteoporosis can have a devastating impact on the joints and vertebrae of your spine. Osteoporosis causes the loss of mass and density in bones, making them highly susceptible to fractures. Injuries that occur during the course of everyday activities, such as housework or exercise. Symptoms may include pain, muscle spasms, and stiffness. A condition caused by the sciatic nerve getting pinched as it exits the spinal column. (Sometimes, it can mimic the symptoms of sciatica.) The pinching is sometimes caused by muscles spasms. Piriformis syndrome sometimes causes pain along the back of the thigh to the knee, or loss of feeling in the soles of the feet. Radiation of pain in one or more spinal nerve roots. An advanced form of arthritis that causes inflammation of the joint tissues leading to pain, weakness, low red blood count (anemia) and loss of appetite. The spinal joint that links the bottom of the spine with the pelvic bone. Sacroiliac joint disorder A common joint disorder involving the sacroiliac joint, which links the spine with the pelvic bone. This joint endures a lot of pressure and absorbs the shocks form the upper body. While it is a very strong and mostly stationary joint, the sacroiliac joint can become damaged or impaired. Sacroiliac joint dysfunction can mimic many of the symptoms of herniated lumbar disc. The main nerve traveling down the leg. Pain associated with the sciatic nerve usually originates higher along the spinal cord when nerve roots become compressed or damaged from narrowing of the vertebral column or from a bulging disc. Symptoms can include tingling, numbness, or pain which radiates to the buttocks legs and feet. A condition in which the sciatic nerve is impaired. A bundle, or cable, of small nerves travels down the spine and into the pelvis area, where they come together to form the sciatic nerve. The sciatic nerve then branches off into each lower extremity, through the buttock and into the tops of the legs. People who have sciatica often complain of numbness or tingling in the feet or toes, or sharp, stabbing pain in the buttocks or shooting down the backs of their legs. A medical term that refers to spinal curvatures. Scoliosis is a condition that almost always begins in early childhood. And it is exceedingly rare. In fact, only about 5 out of 1,000 American children usually develop curved spines enough to warrant treatment. Scoliosis affects only 1% of the world’s population. A misnomer for a ruptured or herniated disc. Discs don’t actually slip. The collective term for the bones of your back. It acts as protection for the spinal cord and allows the body to flex and bend in various directions. A longitudinal structure of tissue, including nerves, that extends from the brain-stem to the tailbone. Infections of the spine, including spinal meningitis. While rare, spinal infections have been linked to nerve disorders. As in any infection, the affected area of the spine may become swollen, causing pressure on spinal nerves. In addition, the infection, left untreated, could lead to an abscess and permanently damage soft tissues and nerve cells. Osteoporosis, or gradual disintegration of bone, in the spine. Spinal osteoporosis is hard to spot in its early stages. In advanced stages, people complain of chronic pain, loss of mobility, and shorter or humped over stature. A condition in which the spinal openings, or bony canals, become blocked or narrowed, causing nerve impingement. Mis-alignments in the bony structures of the spine. Subluxations can create pressure or irritation on the various nerves in your spine, and can cause a wide variety of symptoms throughout your body, such as localized pain, soreness, irregularity, and weakness. When pressure is applied on a nerve in your spine, the nerve energy is interrupted, and sometimes this can profoundly affect the function of other systems or organs in your body. A form of chiropractic adjustment that entails lying on a specially designed table that drops when pressure is applied to a specific area. The dropping motion allows more gentle adjustments than some manual adjustments do. Temporomandibular joint (TMJ) The ball and socket joint on each side of your jaw. Temporomandibular joint disorder A condition caused by problems with the muscles of the jaw or the joint itself. A clicking or popping sound when opening the mouth wide, such as in yawning, may be a sign you have a problem with your TMJ. A condition in which a tendon becomes swollen or inflamed. The region of the mid-back made up of 12 vertebrae. A technique using sound waves that heat soft tissue. This decreases scar tissue formation, and increases healing time. The shock absorbers that are found between vertebral bodies. Each disc is essentially sandwiched between two vertebrae supported by ligaments. Composed of collagen, discs have a tough outer core and a soft inner core. When you are born, these discs are mostly water. As you age the disc become more dehydrated and thinner. Vertebral subluxation complex Medical terminology for the way chiropractors categorize the various locations, or “components,” where subluxations are known to occur. The five components of the vertebral subluxation complex are osseous (bone), muscle, soft tissue and chemical. The 24 large movable bony structures that form the support column of your back. Vertebral bodies are separated by small spaces containing discs. An injury to the cervical spine, or neck, and occurs when the muscle and other soft tissues are hyper-extended or hyper-flexed.
<urn:uuid:350fe770-2479-491c-8225-329989051108>
CC-MAIN-2019-22
https://northmiamibeachchiropractor.com/chiropractic-terms
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256281.35/warc/CC-MAIN-20190521062300-20190521084300-00022.warc.gz
en
0.927522
2,405
3.1875
3
They were on a tiny raft, bobbing down the aptly named River of Doubt in the tangled heart of the Amazon, when he suddenly heard his Cinta Larga guide shout, “Cobra! Cobra!” A heavy cloud of stingless “sweat bees” buzzed around his eyes and ears, but the warning came through loud and clear. Above, perched on an overhanging branch not four feet from his head, a 6-foot rattlesnake clattered its husky maraca in dire warning. Without snakebite antivenom — which would have curdled anyway in the cauldron-like jungle basin — he did the only thing that could save him. With nerves of steel, he reached for his paddle and delicately maneuvered out from under the viper and off toward the next hazard in a wilderness blooming with peril. If the tale sounds like an exploit ripped from the pages of Theodore Roosevelt’s diaries, you’re not far off — it’s just one of the many adventures his great-grandson Tweed Roosevelt encountered in retracing his legendary ancestor’s wilderness jaunts. “That could’ve fallen on us,” Tweed said of the deadly snake, marveling at his lucky escape during an interview with The Post. The 75-year-old head of the Theodore Roosevelt Association recounted his own adventures while walking a reporter through the Theodore Roosevelt Birthplace National Historic Site, on East 20th Street in Manhattan. Tweed spoke just weeks after the statue of his great-grandfather outside the American Museum of Natural History was vandalized amid an ongoing controversy over the honoring of some historic figures. “I know that some people think that the statue represents some kind of racism, but . . . people who knew TR recognized he was not a racist,” Tweed has said. He clearly reveres his late great-grandfather. In 1992, Tweed followed the route Teddy took down the Amazonian River of Doubt — later renamed the “Roosevelt River” — nearly 80 years before. Teddy had co-led a 1,000-mile expedition with Brazilian Gen. Cândido Rondon at the behest of the Museum of Natural History. “It was the Brazilian version of Lewis and Clark,” Tweed said of his great-grandfather’s journey. Teddy’s rainforest mission proved deadly for three men — and threatened the life of the Rough Rider former president at practically every turn. Historians believe that the stress from the two-month trip led to Teddy’s death in 1919. Tweed retraced his famous relative’s path on the river as part of a National Wildlife Federation-funded expedition honoring Teddy’s trailblazing 1913-1914 quest. He said he made plenty of his own discoveries while walking in the footsteps of his intrepid kin. “The birds, the monkeys — we saw tapirs, and pink dolphins, we caught and ate a lot of piranha, far more than ate us,” Tweed said with a chuckle. Then there was the time his expedition wandered into a ghost-town native village deep in the Amazonian wilderness. “We arrived at a village, it had maybe 10 to 15 huts and one major hut, which was the communal hut,” Tweed recalled. “We came in, and there was nobody there. They clearly had been recently — the fire was warm, and there was food on the tables. “Traditionally, in exploring days, they’d take to the woods and wait for us to pass. We thought that’s what they did. They didn’t want to meet us, so they retreated.” But his group soon discovered that the villagers were in an outlying hut — although he and his fellow explorers never could have imagined what they were doing. “[The hut] was full of Indians, and it was amazing. They had somehow acquired a television set, a small generator and some kerosene, and the TV was on, and they had a satellite dish which was picking up a signal, and they were watching ‘Star Trek’ dubbed in Portuguese, which, of course, they didn’t speak,” Tweed recalled. Tweed said memories of his larger-than-life great-grandfather still rippled through the Amazon peoples’ imagination all those decades after the former president hacked his way through the soggy basin in a dugout canoe. Some of Tweed’s guides recalled their grandparents’ tales about “TR coming with his group” — and the “debate whether or not they should kill them,” Tweed said. The natives “could have killed them at any time, but they decided to let them through — it was a conscious decision on the part of the Indians to not molest them,” he said. Indeed, the heralded 26th president ascended into local legend as he descended into the jungle. While camping out for the night, a guide pointed Tweed to a “sacred spot” where, according to local folklore, Teddy and his crew buried a “jeweled statue.” But Tweed knew the truth: That was where the party interred a jungle guide named José after one of the other expedition members murdered him for filching food from the group’s scarce reserves. “So that story got changed a little bit over the years,” Tweed said. José was one of three people in Teddy’s 19-man crew who didn’t make it out alive. Another guide was swallowed by the river, and Julio, the superior who shot José, ran off into the jungle and never emerged. Tweed’s crew had their own close calls. For instance, there was the guide whose raft was swept off in a rapid in a near-tragedy that echoed how Teddy lost one of his comrades. But Tweed’s guide survived. Another time, after cooling off in a swimming hole Teddy also had used, one of the hardiest of Tweed’s fellow adventurers was wracked with pain from a lone caterpillar sting. “When we came out of the water, one of the Brazilian scientists who we all thought was the toughest guy amongst us was suddenly doubled over in pain. He was clearly in major distress and getting worse by the minute,” Tweed said. “One of the Indians was there, and we asked what happened, and [he said], ‘Oh, he touched one of those caterpillars, and that’s a very painful thing to touch, but he’ll be all right in a week or two’ — which [was] really more discouraging,” Tweed continued. Then “that Indian said to us, ‘[But it’s] nothing like [the pain of] these stingrays where we’d just been swimming.’ ” Tweed laughed off the memory — exactly the kind of reaction you’d expect from an heir to the Rough Rider legacy. Tweed’s father was Archibald Bulloch Roosevelt Jr., the son of Teddy’s child by the same name. Archibald Roosevelt told his kids that he worked for the US State Department, but he secretly worked for the CIA. As the son of a spy, Tweed learned to walk and talk in Tehran, Beirut and Istanbul, and spent youthful summers living in a cabin in Scotland and winters camping with his granddad on Long Island. Amid the Roosevelt museum’s collection of his great-grandfather’s hunting trophies, Tweed sat at a century-old desk that Teddy used when he was assistant secretary of the Navy as he recalled the first time he smoked marijuana — a joint he puffed alongside a girl who enchanted him in Dakar. “There’s a girl at the bottom of every story,” he said, sitting beneath the gigantic mounted head of a moose. “She’s like, ‘Oh, try this,’ and I said, ‘OK!’ It didn’t do anything for me.” His globe-trotting upbringing inoculated Tweed to the hazards of travel in more ways than one — he credits an Iranian doctor with keeping him dysentery-free for the rest of his life after he contracted the disease as a toddler in Tehran. “They really thought I was going to die, and the British doctor couldn’t deal with it,” Tweed said. “So [the family cook] Esma called in a Persian doctor — they knew about this kind of stuff — [and] he gave me a bunch of different colored pills. “It cured me,’’ Tweed said. “I went to all these strange places and ate strange foods and did all this stuff and was totally adventurous about it, never got sick. I like to attribute that to the power of the local witch doctor of medicine, if you will.” When Tweed was about 8, his parents divorced, and mom Katherine Winthrop scooted off to Scotland with a new husband while his dad moved to Spain. Tweed split his time traveling to see his folks when he was on break from boarding school in Massachusetts. His Scottish summers were a lesson in roughing it with his mother and his “huge’’ Scotsman stepdad, a psychiatrist. There was “no room” for Tweed in the ancient, stone-walled shepherd’s cottage that Katherine and the doctor shared, so they built Tweed a hut about 100 yards away and across a stream from the main house. “There was no electricity, there was no telephone, running water,” he said. The cabin “must have been wood. It was big enough for a bed, maybe a chair. It wasn’t heated . . . At night, I’d take the Coleman [fuel-burning] lamp to go there.” But early on, his stepdad provided him with a valuable gift, he recalled. “That first night, he gave me a book to take down to my hut to read — this heavy book,” Tweed recalled. “When I got into the hut and got into bed, I looked at the book — I didn’t have anything else to read — there was no pictures in it, it was 1,000 pages long. “I opened it up and read the first words, which were from ‘Sherlock Holmes,’ and I was absolutely captivated, so I read the first [story] twice that night, and [have] read Sherlock Holmes ever since.” He still has the book, which he read to his son Winthrop during his childhood. Like his city slicker-turned-cowboy great-grandfather, Tweed boasts a biography that straddles the line between salt-of-the-earth everyman and high-society nobility. For example, while staying with his father in Madrid, the pair lived in luxury, especially compared to the Scottish digs. “We lived in a fancy apartment, several servants, a chauffeur who’d drive us around. There was a flag on the car. Police would salute — it was a totally different experience from one to the other,” Tweed said. The Roosevelt descendant settled in Bed-Stuy in Brooklyn in the late 1960s to work for the AmeriCorps VISTA program teaching middle-schoolers. “I was escaping the draft, of course,” he admitted. “We had a choice: You could go to Vietnam or you could do some exempt service.” Still, for all his adventures, Tweed conceded that he lives at least somewhat in the shadow of his great-grandfather. “When you’re young . . . people look at you as if everything you got in life is because you were a relative of TR,” he said. “What they do to me now is say, ‘Gee, you really look like TR, why don’t you grow a mustache?’ and I say, ‘I‘m not a re-enactor.’” But because he graduated from Teddy’s alma maters, Harvard and Columbia — and retraced his great-granddad’s steps in South America, Africa and the American West — one can’t shake the feeling he’s an heir to part of Teddy’s legacy. Teddy died two decades before Tweed was born, and Tweed said he “didn’t spend a lot of time with my parents,” but grandfather Archibald — Teddy’s fifth child — linked him to the Bull Moose by taking him on outdoor treks during winters spent at Archie’s Oyster Bay, LI, home. “I learned to sail and how to swim and all that,” he said, recalling camping trips to “remote parts of Fire Island” with granddad Archie. “So the things Grandfather did with me as kids were the things his father [Teddy] did. I did kind of know TR this way.” But Tweed said his sense of being a Roosevelt didn’t solidify until he was at Harvard, where a lunch lady taught the admittedly “ratty-looking” undergrad his “most important lesson.” “She pulled me aside and looked down at my somewhat shabby outfit and said, ‘Mr. Roosevelt, that’s all right for them to do — the other kids — but it’s not all right for you to do.’ “My first response to myself was typical: ‘How dare she.’ But then I got thinking about it — that’s when I understood that I had a responsibility, as well as some privilege, and she probably taught me my most important lesson.”
<urn:uuid:10b67dc0-9c54-486a-82f5-43dc22d0e3e5>
CC-MAIN-2022-33
https://nypost.com/2017/12/05/teddy-roosevelts-great-grandson-relives-trs-trip-through-the-amazon/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00205.warc.gz
en
0.980992
3,023
2.71875
3
Table of Contents As fur parents, we are always wary of what to feed our pets that must be safe, organic, and toxin-free. Pet foods get marketed as safe for animal consumption with various organic materials and ingredients for nutrition and development. However, there are likely chances that some of them slip from our caution; one of them is aflatoxin poisoning. When this happens, there’s a significant possibility that dogs or cats may suffer from food poisoning. Thus, to prevent this from happening, one must always double-check the ingredients within pet food products to avoid any potential poison risks. This article will tackle one of the significant factors of food poisoning, aflatoxin, and why it’s harmful. Aflatoxin Poisoning: Where It’s From And Why It’s Deadly To Our Pets Aflatoxins are toxic substances and carcinogens from certain agricultural products, such as corn, tree nuts, rice, and maize. This compound is the most carcinogenic substance known to its kind. The fungi responsible for the creation of this toxic substance are Aspergillus flavus and Aspergillus parasiticus. Both of them are abundant in warm, humid, and tropical regions. In addition, these fungi are common “weed” molds that mainly grow in decaying substances. If the environment is suitable for multiplying, it may cause an issue and potential plant contamination. Although Aflatoxins are not necessarily poisonous, except when taken in large amounts, they can be extremely dangerous because of their capability to contaminate crops and multiply naturally in plants. The substance’s poison content and how it deteriorates an organism is similar to how cigarettes work in our bodies. With this fact, when someone ingests aflatoxin gradually, they may suffer from problems in their bodies, leading to eventual death. What Happens If My Pet Is Affected From Aflatoxin Poisoning? Humans and animals alike are susceptible to Aflatoxin exposure by eating contaminated agricultural products daily. However, in your pet’s case, this may lead to their death. If unhealthy amounts of Aflatoxin come into their gastrointestinal system, there’s a big chance that they might acquire illnesses. Listed down below are the life-threatening diseases that one may get from Aflatoxin poisoning: - Aflatoxicosis – acute poisoning caused by ingesting unhealthy amounts of Aflatoxin - Acute Liver Failure - Intestinal Hemorrhage - Liver Fibrosis – Excessive extracellular matrix protein accumulation, including collagen - Liver Necrosis – Partial death of some parts of the liver - Hepatocellular Carcinoma – relatively known as liver cancer - Delayed Development - Death in Pets Most of the illnesses mentioned above are due to Aflatoxin poisoning and contamination in the liver. Aflatoxin Poisoning: FDA’s Warning to Midwestern Pet Foods, Inc. The FDA, also known as the Food and Drugs Administration, warns the public about a pet food company called Midwestern Pet Foods, Inc. because of the unfavorable traces of Aflatoxin in their products. According to the said agency, there are 220 illnesses linked to the company due to Aflatoxin. This occurrence resulted in 130 pet deaths, which earned them apparent violations of the Federal Food, Drug, and Cosmetic Act. An initial inspection of the Midwestern plant in Chickasha, Oklahoma, found large amounts of Aflatoxin in one of their products. Sportsmix dry dog food samples contained the carcinogen as high as 558 parts per billion (ppb). Bear in mind that at least 20 ppb of Aflatoxin can already cause your pets harm, injury, or death. Anything more than that is already a violation of FDA’s standards. Other inspections proved to violate the Current Good Manufacturing Practice, Hazard Analysis, and Risk-Based Preventive Controls for Food for Animals regulation. It happened during an assessment of the other three Midwestern plants after the Chickasha inspection. Although not all of the company’s products contain Aflatoxin, FDA informed the public that they have already sent a warning to the company after its initial studies last August 9, 2021. In addition, FDA also asked the said company to comply with regulations for pet food recall. These recalls happened within December to January and March of the same year, both voluntary. If you read the aforementioned corporate-wide warning letter, you may read it here. You may also want to take note of their recalled products with notable aflatoxin products here. What Safe Pet Foods Do You Recommend Consumers May Buy? If you are looking for pet food products that you may consider and deem safe, look no further. Listed below are ten safe and effective pet foods for both cats and dogs that we recommend, and you may trust. These products are the following that you may scan through and might want to purchase potentially: 1. Wellness Complete Health Dry Dog Food Wellness Complete Health Dry Dog Food mainly revolves around the chicken and chicken meals, their primary ingredients. Although this product can also be grain-inclusive, it only has a recommended level of Aflatoxin. Thus, it’s suitable for your dogs. Product reviews speculated that their canines suffered little to no digestive issues after feeding them this kibble. It’s also one of the most recommended grain-inclusive dog foods on the market. Its fat-to-protein ratio constitutes about 50%, with 27% protein, 13% fat, and 52% estimated carbohydrates. Experts recommend this pet food for all types of dog breeds of all ages. 2. Instinct Original Grain-Free Dry Dog Food Instinct Original Grain-Free Dry Dog Food mainly consists of beef and chicken meals as its main ingredients. With multiple flavors and options to choose from, this product is an excellent choice for any picky eater dog that you own. Its composition is grain-free, which means that you could feed your pet without worrying about toxic substances, especially aflatoxin. They’re guaranteed safe for any canine who may suffer from allergy issues, as well as indigestion, as the company’s on-staff professionals formulate each Instinct dog food carefully. Instinct overall has an excellent rating regarding the quality of the products and the nutrition rate they behold. 3. Canidae PURE Grain-Free Formula Dry Dog Food This limited ingredient dog food will make your canine feel the goodness and nutrition without the worry of any toxins. Canidae PURE Grain-Free Formula Dry Dog Food is grain-free, and its whole recipe’s main ingredient is meat. They offer various flavors to choose from, like chicken, beef, and salmon, which are 100% fresh upon food processing. The product also contains antioxidants that will help in ensuring that your dog has a functional and healthy digestive system. This pet food also contains fiber for good digestion and absorption of nutrients. Besides, it also contains protein that gives your canines a leaner built and healthier body. 4. Taste of the Wild Dry Dog Food Another grain-free option, Taste of the Wild Dry Dog Food, is a product that you would like to get for your canine’s diet. This pet food leading protein supplier is buffalo meat. Other than that, other significant ingredients of this product are chicken and lamb meals. Taste of the Wild Dry Dog Food comes in many flavors and options to choose from. Not only that, but they also have top-rated, nutrient-balanced formulas. It’s a highly recommended item due to its versatility and affordability. In addition, it’s a premium type of dog food; thus, once taken, you can assure that your dog will be in its top-health condition. 5. Rachael Ray Nutrish Dry Dog Food Rachael Ray Nutrish Dry Dog Food is also a brand that you might want to check. This Amazon Choice brand for peak dog food is made without any grain at all. The jam-packed and enriched nutrients within the recipe list of this item are a must-recommend type of food. It also has no by-product meal or fillers, so you can ensure that your canine gets its premium nutrients. Furthermore, it has various flavors for your dog’s picky taste buds. It’s also appropriate to feed for multiple types, breeds, and ages of your canines. 6. 9 Lives Daily Essentials Dry Cat Food If you’re on a tight budget but still want that extra goodness and nutrition for your feline, then this might be your best shot. Made in the United States, this product is an excellent choice since it provides complete and balanced nutrition. It also comes in multiple flavors to choose from, such as chicken, salmon, beef for your picky eater. They’re suitable for cats of all ages, so you don’t have to worry if it’s appropriate for your cat or not. 7. IAMS Proactive Health Adult Indoor Weight & Hairball Control Dry Cat Food Cats who mostly live indoors are overweight due to lack of activity, and you might want a suitable diet for them. IAMS Proactive Health Adult Indoor Weight & Hairball Control Dry Cat Food is specifically formulated for indoor cats to regulate their weight and hairball control. Unlike the regular IAMS Kibble formula, this product contains 10% less fat and a fiber blend for good digestion. They also have chicken and turkey as their primary sources of protein to be leaner. Like the others, this product also has agricultural produce, where they use beetroots and corn. However, we assure you that it is safe, and the Aflatoxin levels may be little to none. 8. Blue Buffalo Wilderness Grain-Free Dry Cat Food Packed with a high-protein recipe, you might find Blue Buffalo Wilderness Grain-Free Dry Cat Food suitable for cats of any age. Furthermore, this product contains omega fatty acids; thus, it’s suitable for any cat that might experience allergies and scratching issues. In addition, this product is a healthy source of carbohydrates, like potatoes and peas, with a blend of antioxidants that is good for their digestive system. It is a product you would like to feed your cat to maintain its overall health. We highly recommend you to try this product. 9. Meow Mix Dry Cat Food This dry cat food is specially made for adult cats to stay fit and strong throughout their life. Meow Mix Dry Cat Food is essentially a great product to maintain your feline’s overall health. The main ingredients of this product are essential fatty acids and protein to give them their lean build and healthy immune system. Plus, they come in meat and seafood flavors, fit for any adult cat’s type and breed. This food is perfect, especially for cats who are picky with what they eat. 10. SHEBA PERFECT PORTIONS Wet Cat Food Paté If you want grain-free wet food for your feline friend that’s locally sourced, there’s something that you both will love. Sheba Perfect Portions Wet Cat Food Paté is an ideal product for your sensitive and picky kitties. This multipack contains twelve roasted chicken trays, six gourmet salmon, and six tender turkeys that are easy to store. Whether you feed this food as is or mix them into some of their dry food, you’d always expect to see sparkling clean bowls after. It’s a terrific value worth your money and satisfaction for your cat. Large doses of Aflatoxin are poison to everyone, not just to us but also to our furry friends. Thus, in choosing the best pet food for their pets, one must always check its ingredients to avoid harmful ones. Although the FDA has health guidelines that all companies and factories must follow, some may still dismiss the risk and overlook the possible complications affecting consumers’ health. When this happens, pet food recall occurs. Although this can be worrisome for some consumers, recalled products help us determine which goods are safe for our pets or not. But to prevent yourself from getting worried all the time, always keep in mind to check the product reviews from your co-pet owners to help you decide which pet food is the best for your furry friends. You might also want to research the ingredients listed on the product you’re buying before checking it out from your cart. It’s also best to choose one pet food brand you’d trust the most in content and nutrition. But whichever brand comes to hand, always be mindful of the effects of each ingredient on your pet. If anything strange happens, proceed immediately to the nearest vet in town and schedule an appointment. READ NEXT: 7 Pet Food Toxins Causing Most Dog Food Recalls (Based on Science) Adblock test (Why?)
<urn:uuid:883cd374-e22e-4206-8471-813e27b25daf>
CC-MAIN-2022-33
https://www.mypetchannel.tv/aflatoxin-poisoning-linked-to-midwestern-pet-foods-inc-says-fda/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00005.warc.gz
en
0.94467
2,724
3.125
3
When analyzing any land transaction, all investors must start with the status of the land. There are six main types of land. Understanding its current use and the possibilities for the land will aid the investor to know the “real” future value of the land. Let’s begin this lesson with an overview of the seven types of land. There are seven main types of land that we will review in this lesson. The first is raw, un-entitled land. This land is typically farmland or agricultural land and is considered the most basic form of land. To be developed, the land must be entitled for the intended use. This is a growing type of land available as we see many farms “closing” and the land being sold off. This is where a variety of real estate developments are derived from. These lands are sold as individual lots to the buyers for a variety of new real estate options. The second land type is master-planned raw land. Municipalities generally have a master plan for their communities. These master plans state which type of development the municipality wants on certain parcels of land. The master plan is just a concept and does not provide the landowner with any rights. The third type of land is zoned raw land. Zoning defines the types of use that might be permitted on the land. If investors want to build a project for which the land is zoned, they have a much better chance of getting the development plan approved. However, zoning by itself does not give the owner the right to develop the land. The fourth type of land is preliminary-approved raw land. The land is zoned, has gone through the necessary public hearings for subdivision or a site plan, and is approved for the intended use. The subdivision or site plan goes through preliminary to final approval after the development details, (e.g., grading, improvements, fire and rescue, traffic, storm water management, etc.) are worked out with engineers and local land-planning staff. Agreements with neighboring property owners are often reached at this stage, to obtain their public support for proposed development. The fifth type of land is fully approved raw land. Approved land, or “paper lots,” provides real value to the owners. The land has been taken through the local approval process, which might consist of public hearings and meetings with local municipal land planners and neighboring property owners. After the land is approved, development can begin. The sixth land type is approved and finished “super pads.” These larger, finished tracts or pads are fully graded with all utilities functioning up to the site. There are no internal roads or improvements, but the pad is graded and ready for development. The final land type is approved and finished lots. These are the ultimate land commodities. Finished lots mean that the land has been graded and public utilities and roads are in place. The land is a finished pad, parcel, or lot that is ready for construction, which is also known as “shovel ready” land. This is the most liquid form of land. The following sample transaction is what an investor would consider for residential land. As you can see from the assumptions, the main costs associated with the land would be the purchase price and then the cost to develop the land. In the first section, we discussed the land types. This is when, as an investor, you need to know what type of land you are valuing because the development costs will be higher for the raw, and unentitled land versus the “shovel ready” land. Another key point is the price per acre. When an investor compares land, you want to try to compare “apples to apples” as much as possible. This means finding land in similar condition and location and determining the actual cost per acre. As an investor, you want to obtain the “most bang for your buck” and not over pay for the land. The following sample transaction is what an investor would consider for commercial land. Similar the residential land example, in this example, the greatest concerns are the purchase price and the development cost of the land. However, other considerations need to be evaluated as well. Unlike residential land that will likely be sold off to the individual consumers, commercial land will likely be leased to the tenants. You have likely seen the “build to suit” signs when commercial land is for sale. In many instances, the investor/developer will build for the potential tenant and then lease the property at a certain amount. This is usually determined in a lease rate of per square foot. Some of the considerations that are made for the pricing include location, competitors in the same area, and the need for the additional space. Below is an illustration of the land continuum. When considering investment land, there are several factors that you need to consider. One area that is often overlooked is the zoning. Before you purchase land, make sure you have a clear idea of what you want to do with the land and then make sure that you have the correct zoning! As was mentioned earlier, you are much more likely to have your project approved if it falls in with the existing zoning of the property. As was mentioned earlier in this lesson, there are seven main types of land. In this section, we will discuss the three broad types of land transactions. The first type is Residential. Residential land is approved for unit housing, including single family homes, townhomes, cooperatives, and condominiums. The common denominator among these various properties is that they are all “for sale” housing. In other words, this is land an investor would purchase and sell to individual buyers versus keeping and collecting rental income. The second land transaction type is Commercial. Commercial land is approved for income-producing property, such as retail, hotel, office, industrial, or condominiums. As we have mentioned before, understand the zoning before you purchase the land and make sure that it “fits” with your plans for the property. The third land transaction is Mixed-Use. Mixed-use land is approved for both residential and commercial. This land is the most difficult to analyze since there is not one clear path that could be taken. Regardless of the land type or land transaction, all land investments have similar investing characteristics. Let’s explore these characteristics. The first characteristic is Illiquid. Land is the most illiquid of all real estate investments and the market for land sales is significantly smaller when compared to retail, office, industrial, and multifamily investments. The second characteristic is No Cash Flow. Land investments provide little to no cash flow (e.g. parking lots, lots for temporary uses, such as Christmas tree sales). The third characteristic is Cash Requirements. Land investments typically require cash during the land-holding period to be used for the following purposes: - Property Taxes: The amount depends on zoning and the local tax authority. - Insurance: This expense will be low if no improvements have been made on the property. - Maintenance: Land must be kept free of weeds, debris, and dumped trash, per municipal ordinances. - Approvals: These include legal costs and third-party costs during the holding period. The fourth characteristic is Market-Dependent Value. Market conditions affect land values more than any other asset class. The final characteristic is Terminal Value Only. Unlike commercial real estate, land does not provide an income stream. The cash-on-cash return comes at the time of sale. There are two main strategies for land investing. The first strategy is buy land and change the approved use. This approach generally has a large positive impact on the land values. However, as was stated before, changing the zoning or use of the land is not always easy! This does come with some risk that the zoning might not be changed. The second strategy is acquire and subdivide large parcels. Subdivide larger parcels into smaller parcels. This strategy creates a zero basis in the remaining land and provides for instant equity in the remaining parcels. One of the most common forms of this is farmland that is purchased in bulk and then divided into individual lots for consumers to purchase. As in any real investment opportunity, it is important to understand the numbers and what to look at before making the decision to buy or pass. Land is financed, sold, and traded using many metrics. The first metric is Per Acre. There are 43,560 dirt square feet in each acre. The second metric is Dirt Square Feet. To determine this value, multiply 43,560 by the number of acres to calculate the dirt square feet (e.g., 5 acres * 43,560 – 217,800 dirt square feet). The third metric is Buildable Square Feet. This calculation pertains to the amount of dirt on a site where one can actually build. For example, a 1-acre site might have only 20,000 buildable square feet, also known as the buildable parcel or the building envelope. The fourth metric is Floor Area Ratio (FAR) Square Feet. The FAR pertains to the number of square feet to which a site can be built out (based on approvals), including the stories of a building. For example, a 600,000 dirt square feet with a FAR of .25 equals a building of 150,000 square feet. The higher the FAR, the more dense the project. The more density, the greater the potential value. In some cases, land trades on per-FAR square footage. The fifth metric is Lots. Residential land typically trades on a per-lot basis. Lots vary in size: - Common lot sizes include ¼ acre, 1/3 acre, and ½ acre. - Lots can also be described by width or linear feet (e.g., a standard suburban lot is 50 ft. * 200 ft. = 10,000-square feet lot, or approximately a ¼ acre. - Lot width is important because it dictates the street density. The smaller the width, the denser the product. The wider the width, the more “estate” the product has. The sixth metric is Land Conversion. In many cases, the investor will need to convert land from square feet, to acreage, to FAR square feet. The formula below is your tool for performing such conversions: Below are two examples using this formula: FAR to Buildable Square Feet Back to Dirt Square Feet There are seven main types of land that we will review in this lesson. For this assignment, list each of these seven types and provide an example of each. In addition, state which land types are considered the “better investment” and why.
<urn:uuid:f79b4a65-7ecf-4c69-bac8-1c0d5aa6c204>
CC-MAIN-2022-33
https://certifications.acpare.org/lessons/land-development-mastery-lesson-02/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00000.warc.gz
en
0.951527
2,198
3.015625
3
Although you work hard if you work by yourself, you can only complete a limited task amount. Because you only have twenty-four hours each day and not many friends are helping you forever. So, your success is limited. However, you have the ability at your job, people will want much more than this from you and you also want to work more. But this can lead to a real sense of pressure and work overload. You will feel disappointed and stressed because of letting people down. On the positive side, this is a tremendous chance for you to promote. Just find a way around this limitation, you will be remarkably successful. There is a simple way for you to overcome this limitation is learning how to delegate your work to other people. Effective delegation will help you build a strong team as well as improve yourself. This article will help give you tips on how to delegate effectively and focus on things that matter. What Is Effective Delegation? Delegation is an important skill that managers need to learn and apply. It is not only simply about handing over a task but also understanding the competence and commitment of the person you want to delegate to. Effective delegation is when a manager delegate tasks to employees who have an interest and ability to complete tasks in a short time. However, many managers do not delegate effectively, and this leads problems such as managers usually blames their team members, delegation does not happen or managers delegate to the same person all the time. Therefore, managers should take advantage of this skill’s strength not to reduce the working efficiency of the group. Why People Avoid Delegating? Before figuring out the benefits of delegation, it’s important to understand why people avoid it. Quite simply, because there is a lot of up-front effort such as spending more time to delegate the job effectively, train and answer questions, to check progress and rework if that is necessary. Many people believed it to be easier to do everything yourself than explain it to someone else. But in practice, by doing the work yourself, you’re failing to make the best use of your time. Maybe you haven’t comprehended clearly but we will show you benefits from the delegation. Benefits of Effective Delegation In The Workplace In the past, you might not have used this skill set in your work but after comprehending its benefits, there is no reason for you to deny it. - It frees you up because others work on tasks that only you can do. - It develops your team because there are many tasks completed in a short time. - Members of your team are motivated as each person is being challenged because working on tasks that gives them a sense of responsibility and recognition. - You are achieving results through your team. - You have time to think about new plans to develop your team in the future. 5 Levels of Effective Delegation That Managers Should Apply For Each Object Level #1: Assess and Report This is a level suiting most new or inexperienced employees. If they were excellent and able to jump to a higher level right away, it would be great. But if not, in this position, they can learn new skills and knowledge as well as steadily gain confidence. The heart of Level 1 delegation is collecting information and assessing an opportunity or reporting business issues. When delegating a task at Level 1, managers should follow the rules below: - Set expectations with your employees - Clearly define the task - Explain your employee’s role as well as your own - Discuss deadlines and check-in points - Make a realistic assessment and then decide on any additional actions when reports have been submitted - Explain your thought to employees to move them to the decision-making levels Level #2: Recommend When employees complete well at Level 1 delegation tasks, move them up to the next level. While employees are still responsible for Level 1 work but they can also develop and recommend possible solutions. As with Level 1, you should explain your decisions and how you came to those decisions. Level #3: Develop action plans The levels of delegation are progressive. When employees reach Level 3 meaning that they mastered the skills required in Levels 1 and 2. Level 3 delegation includes the previous requires and developing action plans to implement the recommended solution. When delegating at this level, managers need: - Clearly define the task - Explain their expected role as well as your own - Determine deadlines and check-in points - Review, approve as well as oversee the implementation of the plan when the plan has been submitted - Show your employees what you have decided and how you came to that decision as to the previous level Level #4: Make the decision Your employees will be in charge of deciding Level 4. Before moving them up this level, you must be completely satisfied with their results at Level 3. Not to undermine your good work in the delegation, you need to: - Make sure employees understand that they are still responsible for Level 3 work. - Give your trust to employees about their decisions. - Let them know they you are ready to coach and support them, but you expect them to act independently. - Follow their progress regularly by checking, reviewing the status of the projects, and warning employees when appearing problems. Level #5: Full delegation Full delegation means turning the task over to your employees completely. But you only delegate at Level 5 when employee decision-making must be consistently sound. To delegate effectively at this level, you must: - Let your employees understand that you trust them to decide, act and follow-through. - Request them to report back to you with exceptions. If they don’t do it, they will fully accountable for their completion. - Be ready to reward great gifts even promoting to employees who reach Level 5 with multiple tasks. - Help your employees learn from their mistakes because there is nobody can avoid mistakes. - For unable employees, you should consider making contributions at lower levels or terminate. Process of Performance to Get Effective Delegation Delegation is a process including 6 steps that managers need to pay attention to. However, most managers only do one or two steps and tasks aren’t completed to their satisfaction, they tend to complain that their employees aren’t good enough to get the job done. Therefore, if you are a manager, you should understand and perform enough by following 6 steps below when delegating: Step #1: Prepare The tasks that managers delegate to their employees must be fully thought out or expectations don’t keep changing. This helps employees to deliver quality results. In addition, managers should take the time and develop the discipline to map out exactly what employees are asked for. Step #2: Assign Managers must convey information that they spent the time mapping out exactly to their employees. That information includes time, budget, context and they should set expectations for communication and updates such as frequency, content, and format. Step #3: Confirm understanding If you are a manager, you may think that employees understand what you want, rather than making sure that they do. This is a common mistake that is hard to avoid for managers. Confirming understanding only takes longer than one minute but this decides success or failure. Let’s request your employees to paraphrase the assignment in their words or ask questions to make sure employees understand all aspects of what’s required. Step #4: Confirm commitment This an important part of the delegation process but it is usually skipped by managers. Employees not only accepted the tasks they’ve been given, but also commit to the expected results and the process that’s been set out (including the schedule, budget, and tools). A manager must make sure their employees being aware of any probable consequence if they don’t deliver on the desired outcomes. Step #5: Avoid “reverse delegating” Many managers must end up tasks which they had delegated to others. Because their employees delegate better than them, this leads managers overworking extremely. If this problem occurs meaning managers don’t spend enough time on the preparation stage. So factors, for example, resource and other constraints have led to problems that they did not foresee. When employees reach an impasse, this is a learning opportunity for them. As a manager role, you should provide resources and knowledge needed to help them complete the task. In that way, you’ll still be free to focus on your work and your employees also are equipped with more knowledge and skill to carry out similar tasks in the future. Step #6: Ensure accountability Two-way communication is a key part of delegating. Finding out at the completion date that a deliverable hasn’t been completed or has been done unsatisfactorily is the nightmare scenario of delegating. That’s why you need to make sure your employees are accountable for the task. If at the completion date, tasks have not finished yet or have been done unsatisfactorily, this will be the nightmare of both managers and employees. So let’s use two-way communication as a main part of the delegation and lay responsibility on your employees. When having pressure, they will communicate with you about the status of the tasks and there will be no surprises at the last minute. Some Special Attention to Delegate Effectively #1. Keeping control After performing steps of delegation, make sure you brief your team members appropriately. Spending the time to explain why they were chosen for the job, what you are expecting from them during the project, the goals must be got, resources are used for the project. Especially, you have to plan a schedule for checking-in with progress updates. On the other hand, your employees understand that you want to know all if any problems occur and you are ready to clear up any questions or guidance needed in progress. As managers, we shouldn’t control rigorously but this doesn’t mean we must abdicate control altogether. Effective delegation when there is a balance between giving enough space for people to use their abilities to best effect and monitoring as well as supporting closely enough to ensure that the job is done correctly and effectively. #2. The Importance of Full Acceptance When delegated tasks are delivered back to you, spending a period of time being enough to review them thoroughly. You only accept good quality, fully-complete work. If you don’t accept work you are not satisfied, your employees will learn to do the job properly and get more responsibility at work. If you accept easily, this overload you, that is you who always end tasks and don’t have the time to do your job properly. Of course, when good work is returned to you, make sure to both recognize and reward the effort of your employees. As a leader, complimenting employees is an indispensable job when they have done well. This makes employees feeling confident, respected and they will try their best to respected to contribute to the group. At first, sight, delegating may be more complicated than its benefits. Being a good manager, you should know how to delegate effectively and can deliver a considerable amount of work to others. Let’s choose the right tasks to delegate to the right people if so you will get effective delegation. This skill is not simple, but practice makes perfect. The more you can delegate effectively, the more you can focus on things that matter. You Might Also Like:
<urn:uuid:aa575244-ecba-4928-8c85-5e2cebc10f3b>
CC-MAIN-2022-33
https://envzone.com/essential-information-for-managers-to-make-effective-delegation/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00004.warc.gz
en
0.960887
2,370
2.515625
3
Chapter 9. Fast Evolution (Phase 2: Life/Biology) Evolution began with the instant of the big bang. It was all Energy, that and nothing more. Immediately the plasma energy began evolving into particles. Following soon came atoms and cosmic dust clouds, galaxies, stars and planets, comets, meteors and moons. After a while evolution directed some of the energy into a second phase—a repeating condition called life. It kept the life evolving from one first microscopic living thing into multi-celled living things, and then complex things with diverse organs, backbones, wings, thumbs and volition—and so here we are. It’s all quite a story. Our exploration of evolution continues with this second context, the one wherein life evolves. “Context” is not well understood in the subject of evolution, which is poorly understood to begin with. This telling accordingly emphasizes some background context, and its great significance, before proceeding into a brief history of life’s evolution per se. That’s the easy part—i.e., the simplistic image of a “tree of life” or, popularly, a long line of creatures from microbes and worms on the left end ascending to knuckle-dragging pseudo-apes and tall humans striding nobly to the right. The hard part is all context. Rocks don’t die Every plant and animal can die, and sooner or later does so regardless whether it has reproduced itself during its window of opportunity. This dying property distinguishes living plants and animals from non-living elements, minerals and rocks, which cannot die even though they may weather and chemically degrade away over time. In both cases, the constituent atoms are quite unaffected by life or death. When a material construct dies, rock or body, its component atoms meander on their way to eventually join up as part of some other temporary material construct—perhaps another body, or a rock, or a star. Though dying may terminate a particular line of living tissue that has been handed down through millions of generations from an unknown ancient first life, a particular dying does not terminate life itself. Many other living-tissue lines go right on. In evolution’s ceaseless continuum, the children of individual plants and animals go on, reproducing again and again in unending fullness everywhere on the earth. The late dinosaur kingdom is a large-scale example—the sudden extinction of these great beasts merely opened up a huge environmental empty space for mammals to move into and multiply fruitfully. Life itself (as found on planet earth) will not completely end until biosphere and earth itself perish in long evolution’s cosmic scheme of things. And that is what we’re concerned with here—life itself. The ongoing evolution of life is a continuation, a second phase, of the evolution of the universe before it which was the first phase. Both phases evidence comparable basic properties, but life evolution evidences additional properties above and beyond those found in the non-living first phase. Some properties of life - Like the universe out of which it arises, life evolves via a process of never-ending change, and all the natural changes in this process occur by sheer chance. - Like the rising complexity of the universe before it, life continues to build itself further upward with emerging, ever-increasing complexity, thereby evidencing directionality from less to more, lower to higher. - All life since the first life organizes according to templates inherited from and evolved since the first living thing. Through much of life’s history DNA has been the evolving template reflecting such inheritance. In contrast, that very first living thing organized itself, in the same manner as all other self-organizing aspects of the material universe at large, and then somehow emerged “alive” from the universe’s non-living atomic-molecular structures. Nobody knows how it did it. - All life displays progressive degrees of complexity, proceeding from simple first life to most-complex human life. All life ascended from that least-complex first life has evolved with steadily accumulating and increasing complexity, notwithstanding coincidental devolutions and extinctions along the way. - Life seeks to survive by avoiding danger and by extracting energy from food it processes through itself. Inasmuch as life can animate matter—a complex form of energy conjoined as atoms and molecules—life-energy thus consumes other-energy. New and unique variations of the seemingly endless manifestations of energy continue to be discovered in science’s slow progression toward maturity. - Life seeks to reproduce itself exponentially so that more life will continue. All plant and animal species tend to reproduce a surplus over and above the minimum needed for simple replacement, and most of the surplus does not survive for long. - The spectrum of all life displays correlations which are self evidently significant, even though we may not have discerned them or considered their significance, and these correlations array perfectly on an ascending gradient. Unlike non-life, all life is conscious in a degree which directly correlates with its degree of complexity, and consciousness across the kingdoms of life can be arrayed on a gradient showing a steadily rising continuum of consciousness over time. - All life evidences the property called instinct in inverse correlation with its consciousness and complexity. Where instinct is high in the lesser life forms, consciousness-complexity is low; and where consciousness-complexity is high in more highly evolved life forms, instinct is low. Instinct is lowest of all in humans. - All living things display built-in urges and yearning. Whereas urges drive survival and reproduction, yearning is distinctively “upward.” Unlike any other aspects of the non-living universe out of which life arose, evolution’s natural tendency to diversification and upward directionality are intensified in living things. The yearning is a felt something that pulls all life, including us, to strive upward. These are the context. All the rest is details. When did life first evolve on earth? Our current educated best guess is about 3.5 billion years ago (BYA), a little more than ten billion years after the big bang. Recalling that the earth is about 4.5 billion years old, recent chipping away at some very old rocks has raised speculation that life might even have been underway as early as four billion years ago—virtually as soon as earth’s crust solidified and cooled enough to hold some water. We won’t consider that older possibility just yet because so many scientists are of course all queued up to criticize the alleged finding and pontificate on why it couldn’t possibly be so—even though it actually could. Remember, the true odds on being right or wrong are always 50/50. So let’s say the story of life on earth began when the earth was a billion years old, more or less. In earth’s long history, a few time boundaries are convenient for understanding and remembering the story of evolving life on this planet. The first is the Precambrian-Cambrian boundary, some half a billion years ago—that is, four billion years after earth began and about three billion years after we think life-on-earth began. Before that boundary, species-years are measured in billions; after it they’re measured in millions. We surmise that the first self-organized life, with its capacity to reproduce exponentially, got underway and thrived during those three billion Precambrian years. Slowly creeping outward at the edges, it spread itself pretty much all over such oceans and land as then existed on the earth. Those trillions upon trillions of generations of tiny alive things—not-yet-plants and not-yet-animals—were the simple ancestors whose more complex descendants would eventually evolve into the first single-celled organisms. They were, all of them, direct descendants of that first-life molecule thingy. They were, moreover, the simple ancestors from whom we more complex thingies all are descended—as if by a miracle—as if adhering to the guiding parameters of, say, a Godly Algorithm. At about 2.4 BYA we find the first fossil evidence of bacteria written (unarguably) into the rocks. This represented “upward progress,” because bacteria were far more complex than the simple life forms that preceded them. From those ancient life forms on up to the early humans, most of what we know has been gained by digging up their fossilized bones and, occasionally, softer body parts. Since the remainder of this chapter relies mainly on fossil evidence, we should be clear on what is meant by the term “evidence.” A fossil is a remnant or trace of an organism, such as a bone, tooth, shell, footprint or leaf imprint, that is left embedded in rock long after the organism died. Hard teeth and shells may survive intact for millions of years without fossilizing, but most soft tissues decay very quickly unless special conditions are present. Fossils typically are created by a process of mineralization in which the soft parts decay, while water seeps into the remaining bones or cavity carrying in minerals that crystallize and harden in the shape of the remains. They aren’t remains, but they faithfully preserve the shape of the vanished remains. Dissolved minerals literally take the place of bones, and occasionally organs, as the water dissolves them while retaining a perfect reproduction of the original shape. Whole skeletons have been preserved in this manner, though bones more typically are found after having been scattered by scavengers. Other forms of preservation also turn up, as when an insect was trapped and became encased in amber or a mammoth was quick-frozen in ice (several have been found). Much is learned by studying such fossils, as well as imprints of feet, leaves, and worm tracks laid down in ancient mud and preserved by later overlayment of clay or silt. Some of the most intriguing finds of recent times are in northern China where ancient species in transition from flying dinosaurs to feathery birds became fossilized in such detail that the fine details of feathers can be clearly seen. Even ancient bacterial fossils have been found in good enough condition to yield information under a microscope. How and where did life evolve on earth? The story of long evolution, first a universe and then life within it, represents grandeur of incomparably vast scale worthy of nothing less than a god. The reality of evolution’s clever and mighty workings—accumulated one tiny action at a time, over zillions of times—exceeds by uncountable orders of magnitude any fictional story we puny mortals might try to invent to account for it all. Evolution’s work is wonderful beyond words. But there is another version, the Genesis version. It requires not fossils but faith—the unquestioning faith “as of a little child.” And it unavoidably requires belief that God went to the bother of creating all those trillions of suggestive fossils, large and small, then deliberately strew them around out there in the top kilometer of the earth’s crust for the sole purpose of deceiving us gullible small children into thinking the earth might be more than six thousand years old, as can be deduced from carefully reading The Book. Fossils misleadingly strewn by a deceitful god? But why not?—God can do anything, right? With a six-thousand-year time limit, Genesis leaves much to be ignored. Did God create moraines and great lakes so we would be misled into thinking they were left by the great continental glaciers as they melted a full 12,000 years ago? Did God, ever deceptive, take the time during His seven over busy earth-length days to bury a large meteoroid on the coast of Yucatan so that we, childish minds that we are, would think its impact killed the mythical dinosaurs whose fake bones He created and buried around for us to find and, finding them, could use our silly carbon dating machines to erroneously conclude it was a whopping 65 million years ago that the meteoroid killed the dinosaurs? Deception—by God. Think about that. Please, are there any better options?
<urn:uuid:732dc4fe-305b-4e8c-ba3a-7c919d7c542d>
CC-MAIN-2022-33
https://fixypopulist.com/the-godly-algorithm-60-fast-evolution/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00406.warc.gz
en
0.945136
2,524
3.734375
4
Obsessive-Compulsive Disorder and Addiction: Identifying and Treating Your Dual Diagnosis This guide will cover all that you need to know when it comes to co-occurring obsessive-compulsive disorder and addiction. It will help you understand if you’re showing signs of either condition, as well as why they occur in the brain and how they affect each other. Finally, it will discuss some of the options you have for treatment. Always seek the help of a professional to get an official diagnosis and treatment plan, and be sure to lean on loved ones throughout your journey. Although many don’t think of obsessive-compulsive disorder (OCD) as a common, it affects on average 2.2 million adults in the US. Complex on its own, OCD is only further complicated when it co-occurs with another condition or disease. A dual diagnosis of OCD and a substance use disorder is the beginning to a rocky path, but one you can navigate through with the right help. Addiction And OCD: Understanding What’s Happening Obsessive-compulsive disorder is a brain disorder that greatly impacts a person’s everyday behavior. About half of all cases begin by adulthood, but about a quarter occur before the mid-teens. It is often a lifelong battle for those diagnosed, although there are forms of therapy to keep symptoms manageable. OCD is characterized by two main components: obsessions and compulsions. - Obsessions are defined as intense repetitive thoughts, images, and/or urges that cause distress. - Compulsions are repetitive thoughts or actions someone feels he or she must perform. Most of us can relate to taking the same commute route out of habit, having invasive thoughts, or performing some kind of ritual or repetitive behavior once in a while. But for people with OCD, these kinds of thoughts and actions are so overwhelming, that those with severe forms, may ritualize on and off all day. Often, these obsessions can cause problems at work, school, and home. You’ll need to consult a professional to receive a formal diagnosis, but some signs and symptoms of obsessive-compulsive disorder include: - Unwanted, forbidden thoughts involving religion, sex, and/or harm - Uncontrollable thoughts or behaviors (even when consciously recognized as extreme) - Mental images that cause anxiety - Irrational fears of contamination - Aggressive thoughts toward self and others - Excessive cleaning or washing - Compulsive counting - Fixation on making things symmetrical and precise - Repeatedly checking and re-checking things Though symptoms may worsen or ease over time, it’s important to note that these behaviors and thoughts must take up at least an hour each day to be considered OCD. If they cause significant problems in your daily life, you have genuine cause for concern. While many of us may feel satisfied or content while performing some of our small compulsions, those with OCD don’t derive any pleasure from the action. Although, they may feel temporary relief from the persistent thoughts subsiding, they are still suffering. Co-Occurring Mental Health Disorders People with obsessive-compulsive disorder often attempt to hide their condition or compulsions from others. They may avoid stressful situations that could trigger them, perform ritual behavior behind closed doors, or prevent people from coming into their home. Some will even turn to substances to cope — unfortunately, though these substances may initially have a calming effect, this only leads to bigger problems. In fact, about 20% of Americans with a mood or anxiety disorder have an alcohol or substance use disorder. The problem comes from the fact that these kinds of co-occurring disorders tend to affect each other. Symptoms of one condition can make the symptoms of the other worse and vice versa. In this instance, OCD and the stress it brings may cause someone to abuse substances as a way to relax, facilitate smoother social interactions, or even just numb their anxiety. In turn, the substance abuse can actually make compulsions and obsessions associated with OCD even more severe. Behavioral Signs And Symptoms Addiction has one major factor in common with OCD: it’s largely impacted by impulse. Addicts are unable to control their desire to use, even if there are negative, life-impacting consequences. As a result they end up feeling a compulsion to use even if they’re trying to get clean, and may not be able to fight the urge. Questions About Treatment? Call now to be connected with one of our compassionate treatment specialists.(888) 966-8973 Further, OCD and addiction appear to affect the same area of the brain. Repeated substance abuse leads to changes in the prefrontal cortex, which carries out executive processes like self-regulation and decision-making. These brain alterations can decrease a person’s ability to resist strong urges. Similarly, researchers have compared the brain images of people with OCD to those without and found that there are differences in the prefrontal cortex. It makes sense, that when both conditions are present, they can have dramatic effects on each other. If you’ve been diagnosed with obsessive-compulsive disorder and think you may also be grappling with an addiction, here are some critical symptoms to look out for: - Having intense cravings for the drug - Feeling like you must use the drug regularly - Building up a tolerance to the drug so your body requires more of it to get the same effect - Trouble at work, school, at home, or socially - Spending money you don’t have to keep up your habit - Participating in risky behavior while under the influence - Finding yourself unable to quit using and feeling withdrawal when you cut back If you believe you’ve developed a co-occurring condition, talk to a health or mental care professional as soon as possible. While there may be no cure for obsessive-compulsive disorder or addiction, that doesn’t mean there isn’t help! First, make it a priority to treat both of your conditions. It may take some time to figure out dosages of medications and the proper course of therapy, but it’s crucial that you don’t address one without the other. OCD by itself is treated in a number of ways: medication, cognitive behavior therapy (CBT), or a combination of both. Though traditionally used to treat depression, serotonin reuptake inhibitors (SRIs) tend to be the most effective medication-assisted treatment for OCD, though some doctors opt for selective serotonin reuptake inhibitors (SSRIs) that sometimes have less intense side effects. The downside of SRIs is that they can take up to 8 to 12 weeks to start working, though for some it doesn’t take as long. There have been studies on using antipsychotic medication to treat OCD, but it tends to be riskier and come with mixed results. This year alone has brought important developments to the treatment of obsessive-compulsive disorder. A recent Duke University study’s findings suggested that OCD is likely highly treatable using a class of drugs already undergoing testing in clinical trials. Researchers found that by altering the brains of mice to replicate behaviors similar to OCD, the symptoms could be treated with this kind of medication. Addiction treatment often includes several components, ranging from inpatient rehabilitation to medication to individual counseling. Many find it helpful to join a 12-step program, but there are countless styles of programs across the country so it’s important you find what will work for you. Cognitive behavioral therapy (CBT) Cognitive behavioral therapy (CBT) may be used to treat both OCD and addiction. For OCD, it’s typically directed to the area of exposure and response prevention. - “Exposure” creates direct or imagined exposure to situations or things that trigger obsessions and/or compulsions. The goal is to lessen the anxiety caused by the trigger over time with repeated controlled exposure. - “Response” deals with the ritual side of things and aims to help patients learn to resist the compulsion and eventually drop the behavior altogether. When it comes to addiction, CBT aims to help patients learn to stop negative patterns of thinking and behavior and redirect focus to healthy living. Currently, there is no official therapy to treat both obsessive-compulsive disorder and addiction at the same time. It’s important for you to work one-on-one with a doctor, psychiatrist, or mental health professional to create your own plan of action to tackle your dual diagnosis. The good news is that you have different options for each, and can combine therapies as your doctor sees fit. With some time, patience, and the right treatment, you can take back control of your life from both OCD and addiction.Article Sources Anxiety And Depression Association of America - https://adaa.org/understanding-anxiety/related-illnesses/substance-abuse Anxiety And Depression Association of America - https://adaa.org/about-adaa/press-room/facts-statistics National Institute of Mental Health - https://www.nimh.nih.gov/health/topics/obsessive-compulsive-disorder-ocd/index.shtml National Institute on Drug Abuse - https://www.drugabuse.gov/publications/media-guide/science-drug-use-addiction-basics International OCD Foundation - https://iocdf.org/about-ocd/ocd-treatment/ International OCD Foundation - https://iocdf.org/about-ocd/ocd-treatment/meds/ Harvard Medical School - https://www.health.harvard.edu/mind-and-mood/treating-obsessive-compulsive-disorder Science Bulletin - https://sciencebulletin.org/how-the-brain-makes-and-breaks-a-habit/ Centre for Addiction and Mental Health - https://www.camh.ca/en/health-info/mental-illness-and-addiction-index Psychology Today - https://www.psychologytoday.com/us/conditions/co-occurring-disorders
<urn:uuid:4624aee2-fe1f-4d78-9736-ed9c5198d7a2>
CC-MAIN-2019-22
https://www.addictioncampuses.com/co-occurring-disorders/ocd/
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256724.28/warc/CC-MAIN-20190522022933-20190522044933-00422.warc.gz
en
0.93171
2,136
2.984375
3
Baie de l'Isle-Verte National Wildlife Area Baie de L'Isle-Verte National Wildlife Area (NWA) covers a riparian strip running some 20 kilometres (km) on the south shore of the St. Lawrence Estuary northeast of Rivière-du-Loup. It protects coastal habitats and waterfowl. Environment Canada created this protected area of 568.71 hectares in 1980. The NWA protects the intertidal cordgrass marsh of L’Isle-Verte and coastal habitats that are important for waterfowl, particularly the American black duck, and other animal species. The L’Isle-Verte Marsh is one of the largest cordgrass marshes in southern Quebec. It is recognized as a Wetland of International Significance under the Ramsar Convention. Although the NWA only includes a section of the L’Isle-Verte Marsh, it forms a protective strip between this wetland and human pressures from the south. With its adjacent areas, the NWA is one of the most important nesting sites for the American black duck in Quebec. This NWA is composed of black spruce forest patches and habitat such as: - cordgrass marshes The diversity of its habitats contributes to the year-round presence of a large number of animal species. More than 100 species of birds are found in this territory, a large proportion of which are possibly breeding. The NWA is also home to several species at risk, or of precarious status, such as the peregrine falcon, short-eared owl, bobolink and nelson’s sparrow. Thousands of migratory birds pass through the wildlife area every spring and fall, amongst them are: - greater snow goose - Canada goose - American black duck - green-winged teal - northern pintail - common eider Shorebirds abundant during migration include dunlin, semipalmated sandpiper, and least sandpiper. Mammals found within the wildlife area is the hoary bat, a species of precarious status. Other species include: - snowshoe hare - American porcupine - red squirrel - red fox - American mink The wildlife area is exposed to a number of threats and management challenges, such as: - neighbouring land development - land drainage - presence of invasive alien species - the risk of oil spills in the St. Lawrence More information on Baie de L'Isle-Verte NWA is provided in the summary table below. Under the Canada Wildlife Act, NWAs are protected and managed in accordance with the Wildlife Area Regulations. The primary purpose of NWAs is to protect and conserve wildlife and wildlife habitat. For this purpose and according to the legislation, all activities in a NWA that could interfere with the conservation of wildlife can be prohibited. Consequently, most NWAs are not accessible to the public and all other activities are prohibited in all NWAs. However, some activities may be authorized through Schedule I.1 of the Wildlife Area Regulations or the issuance of permits as long as they are consistent with the management plan goals for the NWA. For more information, consult the NWA Management and Activities section. You can also consult the Baie-de-L’Isle-Verte NWA management plan. Any authorized activities are listed in Schedule I.1 of the Wildlife Area Regulations; signage is also posted at access points. Authorized activities listed in Schedule I.1 of the Wildlife Area Regulations for Baie de L’Isle-Verte NWA, include: - non-commercial wildlife viewing on designated trails and at lookouts and observation towers and in designated areas - non-commercial hiking on designated trails - participation in a non-commercial group meal or non-commercial group event involving 15 or more people in designated areas - non-commercial operation of a vehicle, other than a snowmobile or an all-terrain vehicle, on designated roads and in designated parking areas - non-commercial snowshoeing on designated trails - sport hunting of migratory birds — including with dogs off-leash — without a commercial guide, from half an hour before sunrise to half an hour after sunset in designated areas, if the hunting is carried out - in accordance with any applicable federal permit and any authorization required by the laws of Quebec for sport hunting in that province; and - without the use of toxic shot Hunting for migratory birds is permitted in the fall within the wildlife area with required permits, with the exception of the following areas: - Salicorne facilities (des Vases River) - du Quai and Aboiteau Girard wildlife enhancement works - an agricultural parcel located east of du Quai road - l’Isle-Verte Migratory Bird Sanctuary Permits may be issued for research activities in keeping with the priorities set out in the management plan for the wildlife area or for conservation activities such as surveys, or the enhancement or restoration of habitat. Priority will be given to collaborative activities with local agencies and organizations to promote the protection and the conservation of wildlife species and their habitats in the NWA. For example, initiatives could be launched or continued with the following entities: - universities or research centers to address gaps in scientific knowledge - the province to implement recovery measures for species at risk (particularly those falling under provincial jurisdiction) - non-governmental organizations or municipal authorities to build public awareness of the wildlife area's objectives More information on access and permitting for Baie de L'Isle-Verte NWA can be obtained by contacting the Environment and Climate Change Canada regional office. Notice from Environment and Climate Change Canada Public notice - Gros-Cacouna Marsh Birding Site Environment and Climate Change Canada wishes to inform the public about the rules for using the Gros-Cacouna Marsh Birding Site to ensure the conservation of wildlife and their habitats as well as the safety of users. Hiking, nature observation and photography are permitted at this site in the following designated areas: trails, towers and observation decks. These activities are prohibited outside the designated areas. To protect this site, it is prohibited to: - destroy or remove a plant - walk off the trailsb - allow any domestic animal to run at large - swim, camp or light a fire - picnic, except in designated areas (tables, benches) - undertake an unauthorized activity - use any means of transportation, except on the access road to the parking lot - remove, damage or destroy any poster, sign or other structure - dump or deposit any waste material a Migratory bird hunting is authorized, in accordance with the regulations, in the portion of the marsh’s southwest pond indicated on the attached map (125 m from the dike) from behind temporary blinds and from sunrise until 2 p.m. on the dates set out each year in the Migratory Birds Hunting Regulations for the Quebec region, namely: - Waterfowler Heritage days - the first two weekends of the regular season - weekends after the last Friday of October, until the end of the migratory bird hunting season b Hunters may walk to their hunting locations. For more information or to report a problem, contact the Department’s Public Inquiries Centre at 1-800-668-6767 or at firstname.lastname@example.org. This notice shall not be construed so as to abrogate or derogate from any Aboriginal treaty or other rights of Indigenous Peoples. Plan your visit Corporation PARC Bas-Saint-Laurent offers activities and services within Baie de L’Isle Verte NWA, including guided hiking tours, activities to build awareness of wildlife species habitat conservation, and welcome area and interpretation services at the Maison Girard. Please contact that organization for additional information. - biting insects in summer - camping prohibited - dogs allowed on leash - waterfowl hunting in the fall Location of wildlife area (access) Several access points along Route 132, in L’Isle-Verte, about 30 kilometers east of Rivière-du-Loup. Interpretation centre - Maison Girard 371, route 132 Tél. : 418-898-2757 More information on services offered to public can be obtained by contacting the Environment and Climate Change Canada regional office. Map of the area Map of Baie de L'Isle-Verte NWA Map showing the area surrounding L'Île-Verte, Quebec, on the edge of the St. Lawrence River. The boundaries of Baie de L'Isle-Verte NWA, as well as those of L'Isle-Verte MBS, are indicated. The wildlife area is divided into multiple sections which follow parts of the shoreline between road 132 and the St. Lawrence River. The bird sanctuary overlaps in part with a terrestrial section of the wildlife area and extends into the St. Lawrence near L'Île-Verte. The scale on the map is in km. Permanent water, intertidal water and roads are all indicated on the map. A small inset national map situates the NWA in Canada. This map is for illustrative purposes only and should not be used to define legal boundaries. |Protected are designation||NWA| |Latitude/Longitude||48°01' North / 69°21' West| |Reason for creation of protected area||Protection of a cordgrass marsh and coastal habitats along the St. Lawrence Estuary to benefit various waterfowl species (particularly the American black duck and the snow goose) and other animal species.| |Date created (Gazetted)||1980 – Legal description| |International Union for Conservation of Nature (IUCN) Management Category||Habitat/Species Management Area – (IV): protected area aim to protect particular species or habitats and management reflects this priority| |Keystone or flagship species| |Listed Species under the Species at Risk Act (SARA)||At least six species listed under the Species At Risk Act, including the short-eared owl, peregrine falcon and least bittern. Nine species under the Quebec's Act Respecting Threatened or Vulnerable Species, such as nelson’s sparrow.| |Main habitat type||Tidal cordgrass marsh| |Faunistic and floristic importance||With adjacent areas, the wildlife area is one of the most important nesting sites for the American black duck in Québec. The area is also important for the Nelson's Sparrow, which could be designated as threatened or vulnerable by the provincial government. The site serves as a major staging area for the greater snow goose and the Canada goose.| |Invasive species||Common reed and purple loosestrife| |Main threats and challenges|| |Management Agency||Environment and Climate Change Canada (Canadian Wildlife Service)| |Public access and usage||Authorized activities listed in Schedule I.1 of the Wildlife Area Regulations for Baie de L’Isle-Verte NWA, include: Trails and at lookouts and observation towers and in designated areas Note: If there is a discrepancy between the information presented on this web page, any notice posted at the NWA site and the law, the law prevails, as it is the legal instrument authorizing the activity. Environment and Climate Change Canada - Quebec Region Canadian Wildlife Service 801-1550, D’Estimauville Avenue Toll-free: 1-800-668-6767 (in Canada only) Corporation PARC Bas-Saint-Laurent 43, rue Alexandre, suite 100 Related links and documents Report a problem or mistake on this page - Date modified:
<urn:uuid:07b178ab-c312-4dbf-8fb9-9aac8766b0c7>
CC-MAIN-2022-33
https://www.canada.ca/en/environment-climate-change/services/national-wildlife-areas/locations/baie-isle-verte.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571246.56/warc/CC-MAIN-20220811073058-20220811103058-00005.warc.gz
en
0.884937
2,686
3.296875
3
The purpose of this documentary is to retrace the liberation legacy of the African Methodist Episcopal Church (AME) in three different locations united by common narratives related to struggles against enslavement and apartheid. The AME Mother Bethel Church was founded by Rev. Richard Allen in Philadelphia, Pennsylvania, in 1794, as the first protestant church ministered exclusively by former enslaved people. It became a legally incorporated denomination in 1816. Upon the request of the Haitian government, The AME sent 6,000 individuals to the island of Saint-Domingue between 1824-1826, two decades after this first Black Republic in the world came into being. The Haitian Revolution is an integral part of the history of the AME in the island and it is also crucial to note that Richard Allen was deeply involved in the logistics of this immigration, the most important one of the XIX Century in Dominican history. In 1946, Marcus Witbooi, a descendant of anti-colonial Namibian national hero, Hendrik Witbooi, deserted the German Rhenish Mission and affiliated his congregation to the AME inspired by the historical liberation narratives and practices of this church. Later, AME members were instrumental in the liberation and independence of Namibia from South Africa. The role of African Methodism in the Caribbean and the African continent will be approached from perspective of decolonial theory. This ratifies my intention of presenting South-South narratives of liberation in the voices of its own protagonist. This reflection is extremely valuable since until today neither the AME in Haiti, the Dominican Republic or Namibia has a physical archive where church members and historians could consult their amazing legacies. The archival value of the raw footage of this film will motivate Africana and international experts on Protestant church histories, among others, to join forces with the AME Connectional Church in providing a safe place for these histories to be preserved in a dignified way. The film starts narrating how the sound of the typewriter of my grandfather, George Augustus Lockward Stamers, impregnated my childhood and teenage years. Little did I know that from his incesant typing the first documented account of African Methodism in the island of Saint-Domingue was being written. The cover of his book, “El Protestantismo en Dominicana“ (1976, Editora Dominicana) is arguably the ugliest version of the legendary portrait of Rev. Richard Allen. However, the beauty of its content surpasses any description. It has been a powerful influence in my work as scholar and arts curator. After this first sequence, the film will offer an overview of the legal battle that the Rev. Richard Allen and the AME fought in the courts of Philadelphia for a decade to achieve full independence from the oppression of the established white Methodists. The definitions and historical entanglements of Black citizenship, a central theme that unites the narratives of the AME in Saint-Domingue and Namibia, will be one of the main foci. Another one will be the role of women in these histories. Equally, the social engagement of the AME in community education and health services will convey how the powerful legacy of Rev. Richard Allen is still alive accross time and space. To further illustrate the historical relevance of the AME, we will include archival images of prominent AME members, Rosa Parks and Fredrick Douglass. Rather than provoking strong emotions, the camera will slowly uncover a universe of forking paths; routes departing from Africa and later returning with suitcases full with stories of self-determination and triumph. It is vital for the atmosphere of introspection that each interviewee is presented as a hero or heroine of a remarkable story by means of portraying them with radical close-ups. We will see a lot of skin and sound will have a prominent place, features that I admire in the work of Bergman and Tarkovsky. This film is also inspired by works such as Jean-Marie Teno´s, Le Malentendu Colonial1where the first-person narrative threads the interviews and is juxtaposed with the sound-on-tape, especially, in this case, with the singing of the church members. A slow paced editing will reinforce the calm environment that the sound, as protagonist, recreates. ALLEN REPORT will combine these strategies with slow camera movements in sequence-shot offering the audience a sense of intimacy, shaping a state of introspective reflection. With this approach, ALLEN REPORT will allow the imagination and capacity of free-association of the audience to thrive. Instead of presenting “the facts” in a direct, matter-of-fact way, a number of slow takes will approach the subject facilitating its understanding as self-explanatorily as possible. The frames will dissolve from one geographic location to another and the same will happen with the historical moments, which will be “portrayed” juxtaposing archival material and new footage. The notion of travel with the landscape serving as a unifying mechanism connecting different realities and narratives will serve asleitmotif. I will avoid the a priori sub-titling of the landscape. This strategy is similar to the one I used for curating the images of the exhibition “Pares & Nones. Contemporary Photography Haiti and Dominican Republic”2. In this exhibition the audience is often disconcerted about the actual location of the image: are we in Haiti or in the Dominican Republic? Given the importance of the visual memory bias that we share as two nation-states in the same island, this strategy questions “certainties” and opens the way for new insights. One of the challenges that I am facing in this project is creating a credible atmosphere that may faithfully illustrate the interconnections between these different locations. Another predicament will be the translation of the four local languages of the interviewees: English, French, Creole and Spanish. The subtitles will enhance the oral histories of each territory in their original language, contributing to highlight the transnational nature of African Methodism and the cosmopolitanism of the subjects in question, versed as they are in imponderable sophisticated narratives. The “element of surprise” will materialize through camera positions that will strive to find in the natural volume of the space a dignifying and unexpected angle that will transform even the most humble environment into an epic shot, as in the photographic work of Robert Stephenson (Haiti)3 Zwelethu Methetwa (South Africa)4 or David Goldblatt (South Africa). When we enter a church, for example, the camera perspective will give an epic tone to the frame as if we were entering a building designed by Luis Barragán (Mexico). Unveiling the characteristic baroque Caribbean in search of sober, majestic volumetric planes, is an element that will contribute to counter the tendency of (self) exotization of our visual imaginaries. The shooting in Namibia will provide a natural environment for this type of sober treatment of the image since the areas where we’ll shoot, as most of that country, are basically dessertic. With this location and its extraordinary narratives, the demystyfing character of ALLEN REPORT will be further accentuated. For example, certain pre-conceptions about Negritude and the African continent in particular will be challenged since part of the Namibian population, especially those who will be interviewed who are members of Nama clan, were already creolized and multilingual societies before the arrival of German colonizers, in 1884. Interviews to Date 1. Lucia Witbooi. AME Namibia. Member of Parliament and widow of Pastor Marcus Witbooi, 5th generation Captain descendant of founder of the AME in Gibeon, Marcus Witbooi. March 19th, Berlin. (English). 2. Patrick Delatour. Restauration architect and expert on African-American presence in Haiti since Dessalines and Christoph. Abril 14th, Port-au Prince. (English). 3. Elvire Douglas. Expert on Disaster Management and AME leader. Apri. 14Th, Port-au-Prince. (English). 4. Francois-Albert Murat. Pastor. AME Saint Paul. April 14th, Port-au-Prince. (English). 5. Charles Poisset Roumain. Author and scholar specialized on the history of the Protestant church in Haiti. April 15th, Port-au-Prince. (French). 6. Pastor Joel Mehu. AME Supervisor. April 16th, Tombe Gateau. (French and Creole). 7. Suzy Castor. Sociologist and Historian specialist on the Haitian Revolution and Black citizenship. April 17th, Port-au-Prince. (Spanish) 8. Rubén Silié Valdéz. Dominican Ambassador in Haiti and specialist on Haitian-Dominican bilateral relations. April 17th, Port-au-Prince. (Spanish) 9. Anilda Lockward de Brito. Architect and daughter and editor of my Grandfather´s work. April 25th, Santo Domingo (Spanish) 10. Martha (Leticia) Willlmore. Descendant of AME first settlers in Samaná and historiographer. (English). April 28th, Samaná. (English) 11. Judy Altagracia Justo Anderson. Descendant of AME first settlers in Samaná and historiographer. (Spanish). April 28th, Samaná. (Spanish) 12. Leoncio King. AME Samaná pastor and descendant of first settlers. April 28th, Samaná. (Spanish). Current Production Status We have completed the initial research in Germany and Namibia (2011-2013), as well as in Haiti and the Dominican Republic (2013). The 15 min work-in-progress/trailer, funded by Amistad Films, was completed on July 2013. We have held five working sessions in Santo Domingo (2013) between the director and producers Mario Delatour, Linel Hernandez, as well as the editor and cinematographer Aura Canela and Oliver Mota. We have obtained written approval and support along with full access to church archives from the Presiding Prelates of the AME, Bishops Sarah Frances Davis and David R.Daniels Jr. We have started the process of applying for funding from documentary film foundations, academic institutions and cultural funds.
<urn:uuid:d96580b4-d421-43a2-b8ca-c3915d050f4f>
CC-MAIN-2022-33
https://alannalockward.wordpress.com/2013/08/20/allen-report/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00206.warc.gz
en
0.927321
2,210
2.828125
3
This blog will give you regular, high-quality information about cancer. You'll also get to meet the info team and get updates on our projects. We hope you find it useful. And if there are any topics you'd like us to blog about, just let us know. This week is European Head and Neck Cancer Awareness Week. But let’s be honest, it’s not the most high-profile event on the calendar. Head and neck cancers can be kind of hard to understand - the definitions aren’t simple, the cancers themselves are rare, and even imagining where they are can be difficult. Most people can picture where the lungs are, but can you point to your nasopharynx? How do you even pronounce “otolaryngology”, much less define it? So in this blog, we’d like to try and clear up a few things. (By the way, your nasopharynx is just above the soft part at the back of your mouth, where it connects your nose to your throat. And the word is pronounced “oh-toe-lar-en-gall-uh-gee”. It means ‘study of the ear and throat', and if you play it in Scrabble it could score up to 266 points.) So, what are head and neck cancers? Most are cancers that start in the mouth or throat. But the group also includes rarer ones found in the nose, the sinuses, the part of the throat called the pharynx, and the salivary glands. Here’s a diagram that shows where they are (including the nasopharynx, if you’re still thinking about that one): The group of head and neck cancers does not include the brain, eyes, oesophagus, skin, thyroid or trachea. Head and neck cancers are quite rare. There were only about 12,000 cases in all of the UK in 2015. We know that if they are found early, most head and neck cancers can be well treated. The European Head & Neck Society have identified the most critical symptoms. If you have one or more of these symptoms for 3 weeks, please see your doctor: Head and neck cancers are more often found in older men, but they can affect women too. And younger people can also be affected. There are some things that increase the risk of developing head and neck cancers. These include: Alcohol and tobacco are the main risk factors, and reducing your exposure to alcohol and tobacco is good for a lot of other reasons too. If you would like help to cut down on your smoking, Macmillan has information you might find useful. If you’re worried about HPV, please speak to your GP or your local sexual health clinic – they will have more information about HPV, how it’s spread, and how it can be prevented. If you have more questions or concerns, you can contact Macmillan’s support line on 0808 808 00 00 for free. Macmillan’s Online Community also has a group for people affected by head and neck cancers, where people can ask questions, share experiences, and support each other. The Make Sense campaign has additional resources available to people with head and neck cancers. To see what else Macmillan's cancer information team has been blogging about, please visit our blog home page! You can subscribe to receive our blogs by email or RSS too. We're with you every step of the way The Macmillan team is here to help. Our cancer support specialists can answer your questions, offer support, or simply listen if you need a chat. Call us free on 0808 808 00 00. Comments? Feel free to add them below (you need to be logged in). Keep in touch Follow Macmillan’s cancer information team on Twitter @mac_cancerinfo My husband died from head and neck cancer which started as a squamous cell cancer on his forehead and spread to his salivary gland and facial nerves. It involved a large open wound d on his forehead which never healed and by the time the medical staff realised it had spread it was inoperable. What followed was a nightmare year and it was clear that there needs to be much more accurate knowledge developed about this type of cancer, which in addition to pain is disfiguring. My husband never smoked was fit and healthy before this. In addition to everything else more research is needed into chronic wound treatment. The fabulous hospice where he died accepted that they had little experience with this type of cancer, including dressing such a raw facial wound. I feel angry that more is not known about head and neck cancer. After being diagnosed with cancer at the base of the tongue in 2009, I had 45 bouts of radio therap is. This appears to have got rid of the cancer, but no-will say I am cured. The aftermath is Is I have since had several operations and now have no lower jaw. I breathe through my neck with a tracheotomy tube, am fed through a Rig in my stomach as my throat is closed up. I have no speech so commmunicate via a wipe board or tablet using text to speech. Am unable to walk any distance due to tracheostomy. I have no control over my lips and dribble constantly, so overall not a great quality of life. So sorry for your loss Effie, and sorry to read of your difficulties following treatment tonybt. I'm in my 2nd week of Radiotherapy/chemotherapy, 4 and a bit weeks to go. I have a P16 positive cell carcinoma of the right oropharynx involving soft palate, tonsil and younger base and possible right posterior mandible. I have been told that due to the proximity of an abnormal area in my jaw (biopsy was clear) they will not be able to effectively spare it, and that I will be at high risk of complications of osteonecrosis. My oncologist was very positive about my prognosis and eventual cure and recovery. I think that I would have presented to my Dr earlier had I put all my symptoms together and came up with a warning. As it was, major weight loss was the trigger. Other minor symptoms included fleeting headaches that felt different to a normal one, kind of on the surface rather than in my head; very mild sore throat, occasional earaches, tiredness. I just hope that I didn't leave it too late to save my jaw, I really don't want to be in your boat tonybt. I'm not in pain anymore (Apart from my RIG) thanks to the chemo, which has shrunk the tumour and allowed me to swallow almost normally. I still have trouble opening my mouth more than a fingers width, but I chop my food small and manage ok. My wife is pestering me to try taking activated curcumin supplement which is said to help the treatment along. I'm a big sceptic and am loathe to take it if it's a waste of time, or worse, have a detrimental effect on my treatment. I'm hunting for some published, peer reviewed papers on the efficacy of curcumin in treatment of H&N cancer. Please post a link, offer an opinion if you have one. Best wishes to you Hi Ettie Thank you for your comment. We're sorry to hear of your husband's death, and that you had such a tough and frustrating year. If you ever want someone to talk to about how it's made you feel, remember you can call us free on 0808 808 00 00, Monday to Friday between 9am and 8pm. We're glad you've also found the Online Community and I hope it provides some support. You may not know that we have a group for Bereaved spouses and partners where you can find support from other people who might be going through a similar experience, which you might wish to join. All the best,Liza Hi tonybt, Thank you for comment. We're sorry to hear of your diagnosis and to read that you're having to deal with those difficult changes to your life. We're glad to see you've found the Online Community and hope it is providing some support. Are you a member of our Head and neck cancer group? You might find sharing comments and reading other people's stories is a useful source of support. If you have questions or concerns about the changes to your life, or if you just want to tell someone about how these changes are making you feel, you may also wish to write to our support line via this online form. Or, if you have a computer, tablet or smartphone you can download the NGT Lite app for free to message the support line. The NGT app works by connecting you to a relay assistant who reads to the other person the words you've typed, and types to you their reply. For more information about the Next Generation Text Service, how to download the app and how to use it, please visit the Next Generation Text Service website.I hope that is of some help, and wish you all the best,Liza Hi Blunt , Thank you for your comment. We're sorry to hear of your diagnosis. It's good to hear that you are managing okay and that your pain has improved. If you're unsure about taking the supplement, the best thing to do is to speak to your healthcare team about your concerns. We recommend always telling your cancer doctor about any drugs you are planning to take - including vitamins, herbal drugs and supplements. They know your situation best, and will be in the best position to discuss what effect any drugs or supplements will have on your treatment, if any. If you or your wife would like to talk to one of our cancer information nurse specialists about your concerns or questions about the supplement, they are available on 0808 808 00 00, Monday to Friday from 9am to 8pm. Or you can write to them via this online form, if you'd prefer not to call. We hope you're also finding the Online Community a source of support. If you would like to join, we have a group for people with head and neck cancer, which you might find helpful.I hope this is of some help, and wish you all the best with treatment. Liza Safe payments by: We're here to provide physical, financial and emotional support. So whatever cancer throws your way, we're right there with you. © Macmillan Cancer Support © Macmillan Cancer Support, registered charity in England and Wales (261017), Scotland (SC039907) and the Isle of Man (604). Also operating in Northern Ireland. A company limited by guarantee, registered in England and Wales company number 2400969. Isle of Man company number 4694F. Registered office: 89 Albert Embankment, London SE1 7UQ. VAT no:
<urn:uuid:d4fed39c-8f6f-4037-b95d-9c79c72811c6>
CC-MAIN-2019-22
https://community.macmillan.org.uk/blogs/b/new_information_available/posts/head-and-neck-cancer-awareness---clearing-up-confusions
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258451.88/warc/CC-MAIN-20190525204936-20190525230936-00222.warc.gz
en
0.966567
2,266
2.84375
3
In this paragraph, we are talking about How to Make a Map in Minecraft. For a computerized domain, Minecraft can be a significant spot. Utilize the “boundless” world sort, and the virtual territory extends on perpetually toward each path. Finder maps help you keep your course, always so for more youthful players who will, in general, wander from the Minecraft pack. We tell you the best way to create a guide in Minecraft so everybody can discover their direction home. You needn’t bother with a guide on the off chance you made a domain utilizing the “level” type. They’re just 256 x 256 squares, which means you’ll probably never stray excessively far from home or tumble off the edge. Guides are most appropriate for boundless landscapes, with five exact sizes you can make to follow anyplace from little to madly enormous separations. The amount Does a Gallon of Water Weigh? Determine your map and Know How to Make a Map in Minecraft In this paragraph, Minecraft offers two guide types. For this guide, we assume you need the Locator Map given it tracks the situation of each significant part in the domain, not merely you. The Basic Map (or only Map) is a simple guide of your domain also. However, it does exclude area following. This rendition is likely more qualified to hold tight a divider for adornment. In the two cases, the guide you make doesn’t quickly show each mountain, stream, and desert. It works like how RPGs conceal an unfamiliar area, gradually pulling back the overcast cover as you adventure forward. At last, your excursions will uncover the whole domain—the most important tips about How to Make a Map in Minecraft. A guide will start revealing your domain the second it’s opened — ground zero. This point will stay at the focal point of your focus, regardless of whether you bring forth point, bed, or making table. What you need to Make How to Make a Map in Minecraft Both the Basic Map (guide) and the Locator Map require explicit instruments and fixings. We show them underneath alongside screen captures just on the off chance that you’re new to Minecraft. A creating table (left) and a heater (right): You can’t make anything without one of these two things. Four iron metal squares and one heap of Redstone dust: To get the Red stone dust, you need a square of Redstone mineral (right), which lives deep underground inside the domain’s last 16 layers. When you get Redstone metal, toss it into a heater with some fuel, and you’ll make Redstone dust. Iron mineral squares (left) dwell only above the ocean level. Nine sugar sticks: These are utilized to make the paper. As appeared above, that develops close to water. Fuel to consume in the heater: You can utilize one square of charcoal, one yard of coal, or four squares of wood — whatever consumes. Coal is gotten from coal minerals, which you can discover most anyplace underground (or in caverns) and break utilizing a pickaxe. Join wood and coal in a heater to make charcoal. Nonetheless, using wood as fuel is likely the least work escalated alternative for this guide. Most Liked Instagram Posts With everything assembled, you would now be able to proceed onward to make your guide. Make your guide The accompanying directions will make a vacant Locator Map, which shows your present area in the long run. If you need a guide without geolocation, you can sidestep the guidelines for making a compass and start at Step 6. Stage 1: Open the heater and add the iron metal (top square) and fuel (base square). In our model demonstrated as follows, we utilize charcoal as fuel. Stage 2: The heater makes iron bars until your iron metal or fuel is exhausted or leaves the heater. To finish, drag the iron bars down into your stock. Stage 3: Open the Crafting Table and add four iron bars and one heap of Redstone dust. The Crafting Table naturally makes a compass. Stage 4: To finish, drag the compass down into your stock. Stage 5: With the Crafting Table open, drag three piles of three sugar sticks into the base squares, as demonstrated as follows. Each sugar stick stack makes three pieces of paper, which means you’ll drag heaps of paper into your stock multiple times. Stage 6: Then, With the Crafting Table open, select the compass in your stock and drag it to the middle square. Fill all different courts with one piece of paper each, as demonstrated as follows (eight aggregate). In case you’re not making a Locator Map, trade the compass out for a ninth piece of paper, filling every one of the nine squares. These non-finder maps prove to be useful when cloning served guides later. You can get ideas about How to Make a Map in Minecraft. Stage 7: To complete, drag the new unfilled Locator Map into your stock or Hotbar. Since you have a guide, your best course of action is to fill it! Once more, this works likewise to how RPGs conceal an unfamiliar area, gradually pulling back the overcast cover as you adventure forward. Most Important Stages Stage 1: Open your stock and drag the vacant Locator Map you just made into the Hotbar. 2: Select the guide and do the accompanying to make it visible: Console: Press the left trigger Personal Computer: Press the right-click button on your mouse Mobile phone: Tap and hang on the screen 3: Travel over your Minecraft domain to fill the guide. As the guide delivers the territory, you’ll notice that it has a cutoff: Your player pointer will stop along the edge as you move outside the guide’s limits. In its present status, it catches a zone of 128 x 128 squares dependent on the location where it was first opened — a large portion of that of the “level” world sort. Our model appeared over, the base guide caught a couple of city blocks on our “boundless” Minecraft Realm. We have to zoom out for more significant inclusion, which requires an excursion back to the Crafting Table. Enlarge your Map & Make the Best Map in Minecraft How to Make a Map in Minecraft You can augment the guide multiple times. Here are the real sizes: - Zoom 1: 256 x 256 (Level 1/4) - 2: 512 x 512 (Level 2/4) - 3: 1024 x 1024 (Level 3/4) - Zoom 4: 2048 x 2048 (Level 4/4) Firstly, You can’t make a solitary guide of an endless Minecraft world. You could make extra Level 4/4 guides if you need to follow huge zones outside your unique Level 4/4 guide. Notwithstanding, Level 4/4 guides are colossal. You may locate that Level 1/4 guides are simpler to peruse and a superior alternative of planning the nearby territory. Best tips about How to Make a Map in Minecraft. Since level world sorts are 256 x 256 squares, you can work without much of a stretch. Most Important Stages How to Make a Map in Minecraft Stage 1: Secondly, Open the Crafting Table and supplement your present guide in the middle square while filling the excess eight yards with paper. On the off chance that you have to create more paper, re-visitation of the past directions on the best way to utilize sugar stick. 2: Thirdly, Drag your new extended guide (256 x 256, or Level 1/4) into your stock. 3: Most importantly, For a much bigger guide, drag your just-developed guide once again into the Crafting Table and fill the excess squares with paper. That makes a 512 x 512 guide (Level 2/4). 4: Drag the new re-extended guide into your registry. 5: Above All, Repeat the cycle for the 1024 x 1024 guide (Level 3/4) or twice for the 2048 x 2048 rendition (Level 4/4). This paragraph, With your guide augmented, resets and starts re-recording the climate from where it was first opened. While that is incredible for you, shouldn’t something be said about the wide range of various players getting to your domain, exceptionally more youthful players? And you should know How to Make a Map in Minecraft. Duplicate your Map How to Make a Map in Minecraft So, The Gamers with kids know the fear of conveying a virtual pursuit party about play a game. However, They stray excessively far to where you’re moving from screen to screen, attempting to pinpoint their accurate area. With a Locator guide, you can see the location of all significant parts in the domain, not merely you. Map cloning is to furnish all players with a duplicate of your guide so they can securely re-visitation where you previously opened the first — otherwise known as ground zero. Replicated maps are decent should have a thing for more youthful players who love to stray, particularly in unlimited domains. In conclusion, To duplicate a guide, you’ll need a Cartography Table, demonstrated as follows, and an unfilled guide about How to Make a Map in Minecraft. Before you start, ensure your present guide is finished before making a duplicate. If you have the Level 4/4 form, this may take some time. Stage 1: Open the Cartography Table and add your finished guide in the top square alongside a vacant guide in the base square. 2: Name your replicated map (discretionary). Remember that this cycle renames the two guides. 3: Drag the two guides into your stock. 4: Repeat the past three steps for extra duplicates.
<urn:uuid:4f92f094-e90f-44d7-a58c-704f2f17d92a>
CC-MAIN-2022-33
https://trendytarzan.com/how-to-make-a-map-in-minecraft/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00405.warc.gz
en
0.900015
2,053
2.546875
3
Planting grasses (seeds, plugs or plants) is a quick and fairly inexpensive way to establish cover on bare, disturbed ground. Figuring out which species are adapted to your site is worth your time to assure good establishment and to prevent using a species that is inappropriate. Selecting the most appropriate native grasses for your site can be challenging! Montana has 236 native grass species and numerous non-native species. Unfortunately some non-native species are aggressive and invasive and these undesirables are often planted by unwitting landowners. It is surprising how many of these are included in grass seed ‘mixes’. How do we determine if a species is desirable? Learn to identify grasses in your local area. Identify both native and non-native species present on your site. Examine your site conditions and select species appropriate for that site. Grass identification can be difficult and usually requires the inflorescence (flower-like structure) of the grass to be present for correct id. Here are a few options for determining what grasses you have on your property: - use the “Montana Grasses” app - take a sample to your extension service agent - find a willing botanist to assist Chances are you have weedy grasses on your site as well as desirable species. Knowing what species you are dealing with is important. Here are some examples of invasive grasses in Montana according to the Center for Invasive Species and Ecosystem Health: - cheatgrass (Bromus tectorum), - smooth brome (Bromus inermus) - Bermuda grass (Cynodon dactylon) - quackgrass (Elymus repens) - orchardgrass (Dactylis glomerata L.) - reed canary grass (Phalaris arundinacea) - timothy (Phleum pratense) - bulbous bluegrass (Poa bulbosa) - annual bluegrass (Poa annua) - canada bluegrass (Poa compressa) - Kentucky bluegrass (Poa pratensis) Weedy grasses invade and colonize disturbed sites where they freely reproduce and thrive, outcompeting native species. Not only does this devalue land but creates serious eradication challenges when we attempt to restore native grasslands. Whether or not we can truly restore a native grassland to its former condition is a subject of debate for another day, but leaving sites to be overtaken by weedy species is perhaps one of the most serious ecological issues we currently face. Once you have identified species present on the property determine tactics for reducing weedy species while increasing native species appropriate for your site. It may be impossible to totally eradicate weeds without serious damage to soil. Tactics for reducing weeds might include hand-pulling, bio-controls or herbicides. Can native grasses be weedy? Yes, when introduced to different conditions than they normally exist in. - A drought tolerant native grass may reseed like crazy when introduced to an irrigated site. (e.g. prairie junegrass) - A rhizomatous (spreads by underground stems) grass (e.g. sweetgrass) may take over an entire area if the soil is moist and comprised of organic matter. In the wild sweetgrass would be restricted by the size of the moist meadow in which it lives. In a garden it could become invasive. It’s all about ‘right plant, right place.’ It’s an old adage but it’s still true. Ideally replicating the native grass palette already in place is optimal for the ecosystem, plant health and local fauna. Right plant, right place! Assess the climactic conditions on your site. Is it sunny, shady, moist, dry, sloped? Keep in mind conditions may have changed due to construction, soil disturbance, compaction, removal of forest canopy and vegetation, etc… and you may be dealing with an altered landscape that may have difficulty supporting species that once grew there. Next select species appropriate for your site. Match growing conditions. Use a mix of grasses already in the area. Naturalistic plantings include a mix of grass species and forbs (wildflowers and herbaceous plants). Examples of native grass species in northern Rocky Mountains: Examples of native grass species in northern Rocky Mountains: |Achnatherum (Oryzopsis) hymenoides||indian ricegrass||medium||moderate||full||sandy||drought tolerant, short-lived, ornamental| |Aristida purpurea||purple threeawn||short||moderate||full||sandy||easy to establish, warm season grass |Bouteloua gracilis||blue grama||short||little||full||sand to silty-loam||drought tolerant, moderate establishment| |Bromus marginatus (carinatus)||mountain brome||medium||high||full to part sun||silty-loam to clay||short-lived, rapid establishment, keep moist| |Calamagrostis rubescens||pinegrass||medium||moderate||part to full shade||silty-loam to clay||rhizomatous, understory in coniferous forests| |Danthonia unispicata||one-spike oatgrass||short||moderate||full to part sun||sand to clay||moderately easy establishment| |Deschampsia cespitosa||tufted hairgrass||medium||very high||full||silty-loam to clay||very moist sites| |Elymus canadensis||canada wildrye||tall||moderate||full||sand to silty-loam||rapid establishment, short-lived, moist sites| |Elymus glaucus||blue wildrye||tall||moderate||full||sand to silty-loam||rapid establishment, short-lived, good for stabilization| |Elymus lanceolatus aka Agropyron dasystachyum)||thickspike wheatgrass||medium||little||full||sand to clay||rhizomatous, drought tolerant, short-lived |Elymus (Agropyron, Pascopyrum) smithii||western wheatgrass||medium||moderate||full||silty-loam to clay||drought tolerant, long-lived| |Elymus trachycaulus aka Agropyron caninum, Agropyron trachycaulum)||slender wheatgrass||tall||high||full||sand to clay||moderate drought tolerance, rapid establishment, short-lived, good high elevation species| |Festuca campestris||rough fescue||medium||moderate||full to part sun||silty-loam to clay||priries and open woods, does not tolerate trampling| |Festuca idahoensis||Idaho fescue||short||little||full||silty-loam to clay||slow establishment, moderate drought tolerance |Hierochloe odorata (Anthoxanthum hirtum)||sweetgrass||medium||very high||full||silty-loam to clay||rhizomatous, wet meadows| |Hordeum jubatum||foxtail barley||short||little||full||sand to clay||easy to establish, good for disturbed areas, awns problematic for pets| |Koeleria macrantha, Koeleria cristata||prairie junegrass||short||little||full to part sun||sandy||drought tolerant, early season| |Leymus cinereus, aka Elymus cinereus||great basin wildrye||tall||little||full||silty-loam to clay||spring moisture followed by dry, slow establishment| |Phleum alpinum||mountain timothy||short||high||full to part sun||clay||short-lived, prefers poorly drained mountain meadows| |Poa secunda||Sandberg bluegrass||short||little||full||sand to clay||drought tolerant, early season, slow establishment| |Pseudoroegneria spicata, aka Agropogon spicatum||bluebunch wheatgrass||medium||moderate||full||silty-loam to clay||drought tolerant, moderate establishment| |Stipa (Hesperostipa) comata||needle and thread||medium||moderate||full||sand to silty-loam||drought tolerant, long-lived; long awns problematic for pets| |Stipa nelsonii (Achnatherum) nelsonii||Columbia needlegrass||medium||moderate||full||silty-loam to clay||drought tolerant, moderate establishment |Stipa (Achnatherum ) occidentalis||western needlegrass||medium||moderate||full to part sun||silty-loam to clay||drought tolerant, long-lived| |Stipa (Achnatherum) richardsonii||Richardson's needlegrass||medium||moderate||full to part sun||silty-loam to clay||drought tolerant, long-lived, awns problematic for pets| |Stipa (Nassella) viridula||green needlegrass||medium||moderate||full||silty-loam to clay||drought tolerant, moderate establishment| Not all species work in all places – right plant, right place! Know what type of site each species needs. Once you know what species are appropriate for your site and have dealt with weeds, where can you obtain grass seed, plugs or plants? When you check out seed companies and look for native grass seed you will often find that they offer cultivars of natives – plants selected for desirable characteristics that can be maintained by propagation. This is done through selection, hybridization, and genetic modification but the thing to remember is that a cultivar has a particular trait that it has been replicated through propagation. For example, a grass may be selected for its blue color, or it’s ability to produce lots of seed, or it’s ease of establishment. These traits may or may not be desirable. A cultivar is designated by a word or several words in quotation marks that follow the botanical name, for example: Pseudoroegneria spicata ‘Secar’ or a list of cultivars following the plant description: Secar, Goldar, Whitmar. There is ongoing debate over the use of cultivars. My preference is to avoid them. They lack genetic diversity and impact the gene pool in the wild. Their homogeneity tends to look unnatural and there is concern over their value to wildlife that has evolved over time with a genetically diverse population. On the other hand it may be difficult to locate seeds of native grass species. One option is to collect your own seed. If you don’t have time to do that, select native species and create your own mixes. Keep in mind you only need small quantities of small seeds and larger quantities of big seeds. Most seed companies will provide the number of live seeds per pound and seeding rates for pure stands. The Montana State University Extension publication Revegetation Guidelines for Western Montana may be helpful. Some companies that sell native grass seed: Let me know if you have another favorite so I can share the info!
<urn:uuid:2437a8d9-8941-4d63-a8d1-a01d70f77f2e>
CC-MAIN-2022-33
http://blackfootnativeplants.com/BlackfootNativePlants/blackfoot-native-plants/which-grasses-should-i-plant/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00404.warc.gz
en
0.839509
2,552
3.171875
3
« PreviousContinue » “ VIII. Possibly prepositions which have been distinetly marked tere, at first, thort interjectional by grammarians. Those variations words, such as our carters and thep- in termination, which were' adopted herds make use of to their cattle, to in order to denote the states and redenote the relations of place. Or lations of certain parts of speech, perhaps a more skilful linguist and constitute the next object which preantiquary may be able to tracefents itself for investigation. them from other words, as the con- “ The plural of nouns is frejundlions have been traced by quently marked by rude nations by the learned author above men- a repetition of the fingular. I have tioned. fecn a letter from an African chief “ Many prepositions are evident- to his correspondent in England, ly formed by composition, as, be- during the late war. The man had twveen ; befiules, that is, being or ex- learned to speak and even to write ifting at the side or near. a little English; but, probably fol“ IX. The definitive article, in lowing the idiom of his own lanall the languages with which I have guage, he complains of the merany acquaintance, is formed from chants, that they had lately sent no the demonstrative pronoun this, hic, ship ship, at which he wonders very or ille. The Greek article è, , To, much, for that they had plenty of may appear to be derived immedi- Nave Nave very chcap, &c. I am not ately from the relative oç; but I able to account for the formation of think both are very evidently no the plural upon any other principle other than the demonstrative zlos, than that, on which I account for reduced by a kind of contraction the formation of the other states or very common in words much in cases. use. 6. The terminations, which serve “ The Spanish article il, la, and to mark the cases of nouns in the lo, and the Italian, il, la, are evi- ancient languages, I have no doubt dently the Latin, ille. The French were originally petty words, equile, is apparently derived from either valent to our prepositions, only the Spanish or Italian. placed after, instead of before, the “ Our the is an easy corruption noun; and which in conversation, from this. Perhaps in common and before the language became ftaspeech the s might be left out be- tionary in writing, being constantly fore consonants, and the i pro. added to nouns to denote their states nounced short, which would reduce and relations, became, after the init almost immediately to our defi- vention of writing, part of the nite article. The Lowland Scots, noun. who continue to speak a dialect of " The distinguishing of the genthe old English, make use of a limi- ders by the termination is a refinelar ellipfis, commonly using the forment inuch farther removed from the plural thesi. common practice : indeed, many “ The most probable etymology languages have never arrived at it'; of our indefinite article a is, that it nor is it quite impoffible that it may is a contraction of any, as seems to have been accidental. This idiom, be iinplied by the form which it af- as I may call it, has its inconvenifumes before a vowel, an. It has led to strange mis“Such appears to have been the applications of gender in the Laorigin of the several species of words sin; and we find that the French language has entirely lost the use of the verb, are, 1. The present, of the neuter, probably from this I am reading. 2. The perfect pait, circumstance. I have read, or have done reading “ The inflexions of verbs ori. 3. The future, I am about to read. ginated from the practice of com- 4. The aorist (or indefinite) of the pounding the radical word with present, of use in general assertions, particles and auxiliaries : the per- as, I read frequently. 5. The aorist ions were probably ditiinguished by of the pait, I read, or did read. 6. the addition of a pronoun; and I The aorist of the future, I Mall think this might be demonstrated read. 7. The imperfect, I was by a nice examination into the ety- reading. 8. The plusquam-perfect mology of the pronouns, and due (or the more than perfectly past) confideration in what manner they i. e. was palt at a definite point of might be corrupted, when com- time, as, I had read Homer, before pounded with verbs. I fazu Mr. Pope's translation. 9. ". The personal inflexions might The future-perfect (or the after. be dispented with (as in some bar- future) which is to the future what barous languages) provided the no- the plufquam-perfect is to the past, minative cafe always stood immedi as, I fall have read the book, before ately before the verb; but as this wvill want it. was found to be frequently incon- “ I know no language that difistent with convenience, as well as ftinguishes all these divisions of time with elegance, the inflexion of the by the inflexions of the verb. The verb became necessary, to avoid Greek approaches nearest to perambiguity, The Greek and Latin fection in this point ; but it has no languages poflefs greater accuracy present aorist, and is very incorrect in this respect than any I know, in the use of the second aorist and which enabled their auth'rs to use second future, which, notwithgreater liberty of transposition, and standing the apologies of some ineven on some occasions wholly to genious writers, I am still inclined omit the personal pronouns. to think redundant : most probably ". The personal inflexions serve they may be the antiquated tenses. to mark distinctly the agent: but The Latin wants an aorist of the there is a more material circum- present, a definite future, and a stance to be defined by the inflexion paulo-poft-futurum, or future-perof the verb, and that is, time ; as fect. The reader will see by the a thing may exist at one moment above statement of the tenses,' that in a state different from that which we have only two intlesions to deit will exist in the next. But since note the times, viz. those of the it would be neither necessary nor present and the past; the rest is convenient always to specify the performed by auxiliaries; and afdirect point of time, a few general ter all, it is with difficulty that we divifions took place, and these are avoid confounding the present with more or less in number, in propor- the aorist of the present; e. g. A tion as the language was more or mcrry heart maketh a chearful counteless formed when it became fta. tionary in writing. 16 To trace the formation of the " The general divisions of time, Greek tenses would be very diffithat we know to be capable of be- cult : the Latin is a less complex ing distinctly marked by inflexions language, and in it we can trace them with more certainty. In the of the contingent mood, than supauxiliary verb fum, it appears that posing it formed by the addition of the three principal tenses have been some particle, and a consequent originally different verbs ; fum, fui, contraction. The fubjunctive of cro (whence I suppose eram). The the Latins was probably made by tenses of the regular verbs are evi. adding to the indicative dently formed by compounding the Greek particle far, min (fi, or these with the radical verb; as, if ), as amo-em, amem, &c. Where amabam, in all probability it was there are two forms of conjugation, formerly ama-ram; ama-vi, at tirit perhaps the antiquated form is ait was probably ama-fui, which dopted to signify contingencies onwould calily foften into amavi; a- ly. This is evidently the cafe in maveram, or amavi-eram; amabo, our own language; as, Indic. I or ama-ro, corrupted like the im- am; Subj. I be, or if I be. I am perfect. This fpe ies of compofi- inclined to think the Greek Subs tion is still more plainly exempli- junctive came into use in the same fied in what we call the irregular manner. verb poffum. Pol-lum, that is, po- " I have little doubt that what tens-fum ; pot-ui, or potens fui ; por- is called the imperative mood is no ero, or potens-ero : the formation of other than a corruption of the inthe other tenfes is evident. The dicative or subjunctive, by an iter. two tenses of our auxiliary, an and ation of the pronoun, as amas-te, avas, appear also to have been ori- which by use came to amate or aginally different verbs. Perhaps mato, and aficrwards by ellipfis to the Greek augment is derived from ama. the past tense of space, jv, orý; the 6. krow but one language that only difference is, that it is pre- has an optative mood. In Greek fixed, instead of being postfixed as the verb obci (oimai) anciently ligwith the Latins. nified to wish, and it is compound66 Belides the circumstance of ed with all the tenses of the optatime, there are two other circum- tive mood, as tumlovas (tuptoimi), stances of which verbs ought to in- &c. form us, and those are, actuality " The infinitive mood is to verbs and contingency: whether a thing what the abstract noun is to. adreally exiits, or there is only a pol- jectives. It conveys a particular fibility of its existence; whether idea of the action, which may be an action be really done, or is only generally applied. Thus the idea commanded or wished to be done. which the word whiteness conveys Hence those inflexions, which are is, that of fome particular white called moods (mode or manner of body; the idea which the word to existence), of which all that we eat conveys is, that of some ania have feen are, the indicative, the mal in the action of eating. fubjunctive (or contingent), the im- “ 'The Greeks formed their iofiperative, and the optative. nitive directly into a nouu, by pre “ The indio ative denotes the fixing the neuter article to. The thing or action as it really is ; and Latins conformed theirs to the man. is the verb in its primitive state, ner of a noun ; and their g’runds only subject to the temporal in- and lupines appear to have been flexions. formed by imitating the cases of “ I can give no better account nouns, and endeavouring to adapt the verb to their regimen. Thus cessary to enlarge on them in this the verb in the infinitive sometimes place; lince I am not writing a represents a nominative case, as, grammar, but a sketch of the hiSeire tuum nihil eft, &c. When the liory of language. verb ftood in the place of the ob- có The pailive voice is evidently ject, they frequently conformed it a late invention, and the middle to the rule of the accusative, as, voice a refinement till farther reEo amatum. Amandi corresponds moved from common practice, al. to the genitive case of the noun, most peculiar indeed to the Greeks. amando to the ablative. The patlive in Greek is plainly “ The participles are adjectives formed by the addition of sui to the formed from the verb, and are pro- participle.” bably a late invention. It is unne OF HOM ER, AND [ From the Observer. ] WHEN the human genius from the sudden and abrupt effu was more matured and fions of unpremeditated verse. better qualified by judgment and « In this manner Homer, the experience, and the thoughts, in- great poet of antiquity, and the fastead of being hurried along by the ther and founder, as I must think, furious impulte of a heated fancy, of epic poetry, revolving in his cabegan to take into fober contempla- pacious mind the magnificent events tion the worldly actions of men, and of the Grecian association for the the revolutions and changes of hu- destruction of Troy, then fresh in man events, operating upon society, the tradition, if not in the memothe poet began to prepare himself ries, of his contemporaries, planned by forethought and arrangement of the great design of his immortal ideas for the future purposes of com- Iliad. With this plan arranged and pofition. It became his first business settled in his thoughts beforehand, to contrive a plan and groundwork he began to give a loose to the force for the Itructure of his poem: he and powers of his imagination in faw that it muit have uniformity, strains and rhapsodies, which by fimplicity, and order, a beginning, frequent recitation fixed upon his A middle, and an end ; that the main memory, and, as he warmed with object must be interesting and im- the advancing composition, he fal. portant, that the incidents and ac- lied forth in search of hearers, ccfiary parts must hinge upon that chaunting his verses in the aflemobject, and not wander from the blies and cities that received him; central idea, on which the whole his fancy working out those wonought to rest; that a subject cor- derful examples of the sublime, as responding thereto, when elevated he took his folitary migrations from by language, fuperior to the phrase place to place. When he made his and dialogue of the vulgar, would passages by fea, and committed him. constitute a work more orderly and self to the terrors of the ocean, the better constructed, than what arose grandest scenes in nature came un. der his view, and his plastic fancy, which might be found in the Ilias seizing every object that accorded Minor. It is evident by the context, to its purposes, melted and com- that he does not think either of pounded it into the mass and mat. these poems were composed by Hoter of the work, on which his brain mer, and no less evident that he was labouring: thus with nature in does not know to whom they are to his eye, inspiration at his heart, be ascribed ; their high antiquity and contempaltion ever active, fc. therefore is the only point which cured by solitude against external this celebrated critic'has put out of interruption, and undisturbed by doubt. worldly cares and concerns from 66 The Ilias Minor appears to within, the wandering bard per. have been a poem, which includes formed what time has never equall. the taking of Troy, and the return ed, and what to all posterity will of the Greeks. Thcincidents of the remain the standard of perfection - Æneid, as far as they refer to the Hunc nemo in magnis fublimitate, Trojan story, seem to have been in parvis proprietate, fuperaverit : taken from this poem, and in partiidein latus ac pressus, jucundus et cular the episode of Sinon, which gravis, tum copia tum brevitate mi- is amongst the dramatic subjects menrabilis ; nec poetica modo fed ora- tioned by Aristotle : the controversy turia virtute eminentiffinus-Quin- between Ajax and Ulysses for the til. lib. x. “ Him no one ever arınour of Achilles was copied by excelled in fublimity on great to Ovid from the fame poem. If this pies, in propriety on small ones; work is not to be given to Homer, whether diffused or compressed, gay we must believe it was written fince or grave, whether for his abun. the Iliad, from the evidence of its dance, or his brevity, he is cqually title; but if the author's name was to be admired; nor is he fuperemi- lost in Aristotle's ti'ne, his antiquity nent for poetical talents only, but is probably little short of Homer's'; for oratorical also.” fome fcholiasts have given this poem “ There is no doubt but Homer to Lesches; but when Lesches livcomposed other poems besides his ed, and of what country he was, I Iliad and Odyfiev. Aristotle, in his find no account. Poetics, de idedly afcribes the Mar- “ The Cypriacs are supposed to gites to Homer; but as to the Ilias contain the love-adventures of the Minor and the Cypriacs, though it Trojan ladies during the fiege, and is evident those poems were in his probably was a poem of fiction. hands, yet he seerns ignorant of their Herodotus has an observation in author; the pairage I allude to will his second book upon a passage in be found in the twenty-third chap- this poem, in which Paris is said to ter of his Poetics : he is comparing have brought Helen from Sparta to chose two poems with the Pliad and Troy in the space of three days; Odyffey, as furnishing lubjects for whereas Homer says they were long the drama, and obterves that the driven about on their voyage flage could not properly draw above place to place. From this want of one or at most two plots for tragedy correspondence in a fact of such from the lliad and Odyssey reipec- confequence, Herodotus concludes tively; whereas many might be upon fair grounds of criticism, that taken from the Cypriacs; and he Homer was not author of the Cycnumerates to the amount of ten, priacs, though Pindar ascribes it to
<urn:uuid:df317a96-accf-4c87-9419-1f34b8c0bc21>
CC-MAIN-2022-33
https://books.google.az/books?id=l3wEAAAAQAAJ&pg=RA3-PA94&vq=%22Slaves+cannot+breathe+in+England+%3B+if+their+lungs+Receive+our+air,+that+moment+they+are+free,+They+touch+our%22&dq=editions:UOM39015033617179&lr=&output=html_text
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00004.warc.gz
en
0.967309
4,066
2.546875
3
Home & Garden Garden 15 Lovely Types of Lilies for Your Garden Transform your yard into a floral-scented paradise. By Gia Mora Gia Mora Facebook Twitter Writer and Quality Team Editor University of Colorado University of Pisa Gia is a writer, performer, and producer who has written extensively about veganism, food waste, and sustainable living. Learn about our editorial process Published May 26, 2022 J. MacNeill-Traylor / Getty Images Share Twitter Pinterest Email Home & Garden Planting Guides Indoor Gardening Urban Farms Insects Perhaps the most recognizable garden flowers, lilies are gorgeous summer-blooming perennials that bring color, texture, and fragrance to any garden. Lilies grow from bulbs into six-petaled flowers of various sizes and shapes atop one- to eight-foot-tall stems. These sturdy, branchless stalks make lilies ideal garden flowers. Native to the temperate climates of North America, Europe, and Asia, lilies can thrive in many hardiness zones. Here, we’ve selected 15 beautiful lilies you can plant in your own backyard. Lilies are toxic to cats. For more information about the safety of specific plants, consult the ASPCA's searchable database. 1 of 15 Casa Blanca Lily (Lilium ‘Casa Blanca’) Joe Mabel / Wikimedia Commons / CC BY-SA 3.0 Bring bees and butterflies to your garden by planting Casa Blanca lilies. Their graceful white petals house green stamen with blood-orange anthers that bloom on three- to four-foot-tall stalks. These hybrid Oriental lilies are highly fragrant, bringing an irresistible scent to any yard. Casa Blanca lilies look best when planted in small to medium-sized groups (up to 12 bulbs). These hardy perennials can be grown both in the ground and in containers, and they make excellent cut flowers for your mid to late summer garden party. USDA Growing Zones: 4 to 9.Sun Exposure: Full or partial sun.Soil Needs: Well-drained, loamy, and moist. 2 of 15 African Queen Trumpet Lilies (Lilium ‘African Queen’) Epibase / Wikimedia Commons / CC By 3.0 African queen trumpet lilies have lovely six- to eight-inch long apricot-tangerine blossoms with a raspberry-plum reverse. Their sturdy, six-foot-tall stems can house up to a dozen flowers. These giant yet elegant lilies bloom in mid to late summer and provide gardens with an intoxicating fragrance. Plant your African queen trumpet lily bulbs behind other perennials for a striking aesthetic effect from these exotic perennials. African queen trumpet lilies like their bulbs planted in the shade and their blooms peeking into the sunlight. USDA Growing Zones: 3 to 9.Sun Exposure: Full or partial sun.Soil Needs: Well-drained, loamy, and moist. 3 of 15 Royal Lily (Lilium regale) JLPC / Wikimedia Commons / CC BY-SA 3.0 With up to 25 blossoms per stem, these trumpet lilies have aubergine streaks on the outside with yellow throats surrounding tangerine anthers. Royal lilies can grow in containers or in the ground, making them ideal for gardens big and small. With stalks four to six feet tall, royal lilies grow nicely with other perennials and annuals. These midsummer bloomers love to keep their roots in the shade and their flowers in the sun. Because of concerns with pests, molds, and viruses, these lilies require some time and attention from a gardener. USDA Growing Zones: 4 to 8.Sun Exposure: Full sun to part shade.Soil Needs: Loamy, moist, well-drained soils. 4 of 15 Michigan Lily (Lilium michiganense) Veronica Starcevich / 500px / Getty Images A graceful wildflower from the prairies of North America, Michigan lilies can grow up to five feet tall and two feet wide. Their orange and brown- or purple-spotted petals curve backward over a raspberry reverse to expose long stamen and pistil, adding visual variety to any garden. Planting these perennials does more than add interest: it helps keep the Michigan lily alive. Thanks to habitat destruction, removal, and deer predation, this flower is listed as an endangered species in New York state. Plant Michigan lilies in groups of at least three to best display their blooms. USDA Growing Zones: 4 to 8.Sun Exposure: Full sun to part shade.Soil Needs: Loamy, moist, well-drained soils. 5 of 15 Turk’s Cap Lily (Lilium martagon) Rosmarie Wirz / Getty Images Like the Michigan lily, the Turk’s cap lily has delicate, recurved six-inch petals known for attracting hummingbirds. Some of these purple and crimson-colored lilies have spots; others do not. A fragrant perennial, Turk's cap lilies can grow up to six feet tall with 30 to 50 blooms appearing on a single stalk. This martagon hybrid can tolerate hot summers so long as they have sun-dappled afternoons. Keep your Turk’s cap lily in the shade to produce the biggest, most luxurious blossoms. USDA Growing Zones: 4 to 8.Sun Exposure: Full sun to part shade.Soil Needs: Loamy, moist, well-drained soils. 6 of 15 White Turk’s Cap Lily (Lilium martagon ‘Album’) With pure white petals steeply recurving back to reveal green and orange stamen, the white Turk’s cap lily gives variety to your garden bloom size. Up to 40 small, two-inch flowers can bloom on a single five- to seven-foot stem. White Turk’s cap blossoms add color and dimension when planted below trees or shrubs. These martagon hybrids bloom earlier in the summer and can be grown in well-drained containers or plots. The white Turk’s cap lily is disease-resistant, making it an effortless and beautiful addition to any backyard. USDA Growing Zones: 3 to 7.Sun Exposure: Full sun to part shade.Soil Needs: Loamy, moist, well-drained soils. 7 of 15 Black Beauty Lily (Lilium martagon ‘Black Beauty’) JelaRadosavljevic / Getty Images A garden favorite, this Orienpet hybrid is fragrant and long-lasting. The black beauty’s three-inch recurved raspberry flowers burst from a chartreuse star. White lines each petal’s elegant edges, and the upward-scooping stamen are tipped with blood orange anthers. When black beauties bloom in mid to late summer, a single four- to seven-foot stalk can bear 20, 40, or even 150 blossoms. Keep the roots of this martagon hybrid cool, but don’t plant them in the shade as their stems can grow weak. Also, keep an eye out for leaf beetles, which can pose a problem. USDA Growing Zones: 3 to 8.Sun Exposure: Full sun to part shade.Soil Needs: Loamy, moist, well-drained soils. 8 of 15 Tiger Lily (Lilium lancifolium) DK Media / Getty Images The dark burgundy or black spots on these five-inch flowers give tiger lilies their common name. Their two- to five-foot-tall stalks house up to 10 coral-colored blossoms, each with eye-catching elongated stamen. These Asiatic perennials are hardy, relatively drought-tolerant, and bloom in late summer. They can grow in the ground or in a container (just don’t overwater). Tiger lilies are prone to the highly contagious mosaic virus, which doesn’t affect their petals but can disfigure other lily varieties. For that reason, horticulturalists recommend planting your tiger lilies away from other Oriental or Asiatic lilies in your garden. USDA Growing Zones: 3 to 7.Sun Exposure: Full sun to part shade.Soil Needs: Loamy, moist, well-drained soils. 9 of 15 Bright Diamond Lily (Lilium ‘Bright Diamond’) User10095428_393 / Getty Images The satin white leaves of the bright diamond lily shine in any garden. This Longiflorum-Asiatic flower has lithe, pale green stamen topped with burnt orange anthers. Their hardy, glossy, dark green stems grow three to four feet tall and bloom in early to midsummer. The bright diamond lily mixes well with other perennials and annuals in the garden. Plant them in a container or in the ground in groups of three or more for the greatest visual effect. These lilies often struggle with aphids, slugs, and other pests as well as molds, so they require a bit of gardener attention. USDA Growing Zones: 4-8.Sun Exposure: Full or partial sun.Soil Needs: Well-drained, loamy, and moist. 10 of 15 Stargazer Lily (Lilium ‘Stargazer’) Vicki Jauron, Babylon and Beyond Photography / Getty Images A vibrant Oriental, the stargazer lily has upward-facing crimson-dotted magenta flowers. In mid to late summer, these attention-grabbing six-inch blossoms appear eight to a stalk and bring a pop of pink to any backyard. Stargazers are known for their intense, almost spicy scent. At two to three feet tall, these lilies are some of the shortest, so they mix well with other perennials and annuals. Stargazers are easy to grow, have sturdy stalks, and attract a number of pollinators—all pluses for novice gardeners. Keep them in the sun most of the day to avoid leggy stems. USDA Growing Zones: 4 to 9.Sun Exposure: Full or partial sun.Soil Needs: Well-drained, loamy, and moist. 11 of 15 Patricia’s Pride Lily (Lilium ‘Patricia’s Pride’) AHPhotoswpg / Getty Images Also called Purple Rain, this upward-facing Asiatic hybrid lily lives up to its name. A deep purple heart extends out from a yellow throat into white petals. Patricia’s Pride lilies are on the shorter side, standing just three to four feet tall. Each slender stem houses four or five delightful blossoms. These perennials mix well with other flowers and make excellent border plants. Patricia’s Pride lilies have sensitive stems that require protection from heavy wind. But once you’ve planted these beauties, they come back in even greater numbers—a lazy gardener’s dream come true. USDA Growing Zones: 3-8.Sun Exposure: Full or partial sun.Soil Needs: Well-drained, loamy, and moist 12 of 15 Apricot Fudge Lily (Lilium ‘Apricot Fudge’) okimo / Getty Images Look no further for a truly unique garden addition. Apricot fudge lilies resemble roses with their bulbous blooms. Aptly named, their soft color and extended pistil make their three-inch flowers stand out in a crowd. These Longiflorum-Asiatic lilies also have a luscious fragrance that wafts off their early to midsummer blossoms. Unfortunately, this variety is prone to aphid, beetle, and weevil infestations and requires more attention than other lilies. With a little TLC, however, apricot fudge lilies add ambiance to any garden. Plant these perennials in groups for the most striking visual display. USDA Growing Zones: 3-8.Sun Exposure: Full or partial sun.Soil Needs: Well-drained, loamy, and moist. 13 of 15 Brasilia Lily (Lilium ‘Brasilia’) Michel VIARD / Getty Images An exquisite Oriental lily, the Brasilia has large, outward-facing white petals. Gardeners love to watch the magenta-traced scalloped edges darken into crimson during this lily’s mid to late summer bloom. Even better? The intoxicating scent of the Brasilia lasts from the first flower to the last petal drop. These perennials grow well in containers, making them ideal for urban gardeners. In the ground, their sturdy three- to four-foot stalks make excellent garden border flowers and look best when planted in groups of at least three. Watch out for molds and pests as they frequently appear on these lilies. USDA Growing Zones: 4-9.Sun Exposure: Full or partial sun.Soil Needs: Well-drained, loamy, and moist. 14 of 15 Arbatax Lily (Lilium ‘Arbatax’) Daimei Kato/Aflo / Getty Images A breathtaking blossom, the arbatax lily has pink petals extending from a white heart. Featuring sharp leaves on four- to five-foot-tall stems, this gently scented lily provides stunning cut flowers – as long as you can find a vase big enough to accommodate its 6- to 12-inch wide blossoms. These Asiatic-Longiflorum lilies bloom in early to midsummer. Plant them in groups of up to 12 bulbs. If you’re in a cooler climate, add mulch to the roots in the winter. Mix these perennials with annuals or other summer-blooming plants. Arbatax lilies are great for balconies and patios because they grow well in containers. USDA Growing Zones: 2 to 9.Sun Exposure: Full or partial sun.Soil Needs: Well-drained, loamy, and moist. 15 of 15 Dwarf Asiatic Tiny Dessert Lily (Lilium ‘Tiny Dessert’) Mgoodyear / Wikimedia Commons / CC BY-SA 4.0 Don’t let the name fool you—dwarf Asiatic lilies are not among the shortest of the Lilium family. Standing on two- to five-foot-tall stems, these Asiatic hybrids bear four- to six-inch upward-facing blossoms. This feature makes these mid-to-late-summer bloomers fabulous garden border plants. In contrast to other varieties, tiny dessert lilies are unscented. These sunny flowers bring warmth to the garden when planted in decent-sized clumps. Bred in the Netherlands for container growing, dwarf Asiatic tiny dessert lilies work equally well in well-irrigated lawn beds. USDA Growing Zones: 2 to 9.Sun Exposure: Full or partial sun.Soil Needs: Well-drained, loamy, and moist. To check if a plant is considered invasive in your area, go to the National Invasive Species Information Center or speak with your regional extension office or local gardening center.
<urn:uuid:0259986c-027b-4f02-bbda-e998f72a1600>
CC-MAIN-2022-33
https://www.treehugger.com/types-of-lilies-5272159?utm_source=emailshare&utm_medium=social&utm_campaign=shareurlbuttons
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00203.warc.gz
en
0.867609
3,183
2.671875
3
Making geometry models suitable for CFD meshing is often a time-consuming bottleneck in CFD analysis. Here we will discuss why this is so and some ways to alleviate the problems. NASA’s CFD Vision 2030 Study stated that “most standard CFD analysis processes for the simulation of geometrically complex configurations are onerous.” A major factor contributing to this perception is the preparation of geometry models for mesh generation, a task deemed a “significant bottleneck” in CFD workflows. Geometry Modeling Fundamentals A computational geometry model is an idealised mathematical representation of an object’s shape. Broadly speaking, there are two categories of solid object representation: boundary representation and volumetric representation. Boundary representation is the method of describing a solid object implicitly from its boundary and generally consists of two sub-representations: geometry and topology. Geometry describes individual shapes such as points, curves, and surfaces. Topology describes the entities that limit the portion of each geometric shape and the interconnections between those limited shapes. Geometry models produced in mechanical computer-aided design (MCAD) software are referred to as analytic boundary representations. The surfaces can be explicit and piecewise or implicit. The predominant form of parametric spline used in MCAD software is NURBS (Non-Uniform Rational B-Spline). A T-Spline is a spline with a partially empty parametric space; the spline’s control points need not be defined at each parametric (u,v) coordinate. In general, a T-Spline model can consist of fewer surfaces than a NURBS model on the same shape. A U-Spline (Unstructured Spline) is a further generalisation of NURBS that are defined on triangular unstructured meshes versus the structured grid that is the rectangular parametric space of a NURBS or T-Spline. Subdivision (Sub-D) is a method for modelling freeform surfaces that starts with a coarse mesh and through recursive point insertion achieves a limit surface that either interpolates or approximates the points in the original coarse mesh. Geometry models in the form of explicit surface meshes, independent of degree or element type, whether originally created for rendering, 3D printing, simulation, etc., are referred to as discrete boundary representations. Discrete models can be produced by most CAD software (by tessellating an analytic model). There are other situations where the source of discrete models are 3D scans and extant meshes. 3D scans of an object allow the as-built versus the as-designed object to be represented for simulation. 3D scans also capture an object in its loaded configuration such as the upward flex of an aircraft’s wings in flight. It is important to understand that analytic geometry has effectively unlimited resolution, but discrete geometry is limited to the resolution of the point density used to describe the shape. In other words, you can evaluate a NURBS surface anywhere and get coordinates that lie on the surface, but when you evaluate a discrete surface, you get a shape defined by linear interpolation between the known discrete points. Topology is a mapping of logical connections that unifies a collection of subsets of geometric entities into a whole, often called a solid model or just a solid. The bounding (limiting) of surfaces in a B-Rep topology is accomplished through an operation called trimming. This operation imprints curve(s) into a surface’s parametric space and limits the surface to the portion of the parametric space bounded by that curve and others. The resulting trimmed surface has a non-rectangular parametric space which affords it a great deal of flexibility in modelling complex shapes. Volumetric representation is the method of describing a solid object explicitly from a series of solid, space-filling primitives. Constructive Solid Geometry (CSG) is the method of taking solid primitives and combining them hierarchically using the standard Boolean operations: union, intersection, and difference. The individual solid primitives are typically trivial shapes such as spheres and blocks, but can be arbitrarily complex. Spatial occupancy modelling involves “digitising” the region of interest into pixels (2D) or voxels (3D). The relative properties of adjacent pixels are used to define boundaries within the region. X-ray, MRI, and CT scan are examples of spatial occupancy models. Implicit geometry modelling defines a shape by an implicit function that evaluates to zero on the shape’s surface, a negative value on its interior, and a positive value elsewhere. Originating Intent & Software A geometry model may be created specifically for the purpose of simulation. Whether or not this model is derived from a master model in MCAD software, it will typically include simplifications and abstractions that vary based on the type of simulation to be performed (e.g., solid mechanics, fluid dynamics, electro-magnetics). Simulation models are often created using software other than MCAD, such as software developed in-house or commercial off-the-shelf (COTS) software. This is especially true during the conceptual design phase when software tools like these may be the predominant tool for generating the outer mold line (OML). In order to circumvent the complexity associated with using geometry models created in MCAD software, many organisations utilise design software tailored to their specific application. Notable among these tools for aerospace applications are OpenVSP and ESP . Sources of Geometry Model Unsuitability All of the geometry modelling techniques described above can produce geometry models that are perfectly suitable for mesh generation and CFD simulation. In practice, however, their use often presents challenges for the downstream user. Interoperability & Translation It is fair to say the most widely employed interoperability method for geometry models is transmission via a file. A wide variety of geometry model file formats are available including standard formats, native CAD formats, and de facto standards. All file formats suffer from a common problem; nothing prevents them from being written in ways that violate the format’s specification. In turn, any standard-conforming application that attempts to read these violating files is likely to fail. It is important that a mesh generator be flexible enough to support a wide variety of geometry model file formats so that you can work with geometry provided by different sources. In addition, the ability to automatically assemble the model into a solid that’s ready for meshing is invaluable. The translation of a B-Rep model through the interoperability toolchain is a potential source of data loss and introduction of errors. While the general mathematics of analytic B-Reps are well known, the manner in which they are implemented in the MCAD software and the receiving applications may differ significantly, especially in terms of the tolerances used in surface-surface intersections and related computations. A mesh generator requires a variety of geometry modelling capabilities to prepare and supplement the model provided by the CAD software. Are you interested in learning more about geometry manipulation in Pointwise? Check out the playlist of short videos. Interoperability by Direct Interface In order to minimise the potential data loss due to translations of a geometry model through intermediate format(s), an alternative approach is for the receiving software to directly interface with the CAD software through an application programming interface (API). A receiving application would implement a direct interface for each MCAD platform from which geometry models will be received. Within a single organisation or a group or organisations that have standardised on a single MCAD application, this limitation should not be too severe. To alleviate the need for multiple implementations, the receiving application could implement a CAD-neutral API. Using a CAD-neutral API allows the interface to multiple CAD systems to be implemented once. Intersections, Trimming, and Tolerances What is often revelatory is the fact that the intersection of surfaces in a model comprised of analytically defined splines is approximate, inexact, and based on a tolerance. This is not a mathematical necessity but one of practicality. Consider that the analytically derived intersection of two bicubic B-Spline surfaces results in an intersection curve of polynomial degree 324. It is impractical for MCAD software to compute, store, and edit curves of this complexity for issues of memory usage, speed, and flexibility. Therefore, the intersection is computed approximately using a process that involves point sampling on each surface to within a tolerance and then fitting the resulting collection of points into a curve. A byproduct of this computation is an intersection curve that does not precisely conform to either of its parent surfaces. The majority of engineers find analysis-suitable model preparation from CAD data to be a tedious and time-consuming task that consumes up to 73 percent of their time (by one study), for reasons not often understood. A natural question arises as to why such a barrier exists between the CAD geometry and analysis model when the CAD system seems to display an accurate representation of the intended design. Details – Too Many, Too Few In manufacturing organisations, the geometry model’s primary use is often a complete product definition. Gammon identifies ten fundamental differences between CAD and CAE (or CFD) geometry models, several of which fall into the category of excess detail. - Excess (and complex) topology which results from the combination of the underlying mathematics and usage practices. - Geometry in excess of the wetted surfaces or OML (i.e., the boundaries of a CFD domain). - Excess realism in the form of geometric details such as embossed or engraved text, fasteners, fillets, and chamfers. - Too idealistic in the sense that “non-manufacturable” geometry is created that includes sliver surfaces, cusps, knife-edges, and similar degeneracies. Excess and complex topology, as cited above, can be resolved by using higher-level topological abstractions (often called sheets or quilts) that account for the distinction between design features and artefacts of the modelling process or tool. Geometry model “repair” and “healing” are the umbrella terms used to address excessive detail. Repair functionality is available in many dedicated software tools, interoperability libraries, and mesh generation and CFD software. Importing and manipulating CAD geometry to make it more suitable for meshing is not always well understood. By editing and creating geometry and using solid model assembly, most models can be readily prepared for mesh generation. Master geometry cleanup in Pointwise. The problem of insufficient detail in a geometry model pertains mostly to geometry required by meshing that has nothing to do with the true product definition as designed, such as outer boundaries, far-field boundaries, closure of certain components, and more. The re-featuring of geometry models imported from STL has to recover the sharp edges and feature lines so that they may be accurately reproduced in the mesh. In addition, it is useful to be able to reduce the density of the facets by merging them where they are coplanar. Here is a video about Pointwise’s tools for importing unstructured wireframe data. Discrete geometry models present an interesting case of insufficient detail. The lack of topology in a discrete model hampers its use. Without topology, the model is a “triangle soup” when, in reality, the object being modelled has distinct geometric features likely significant to the CFD simulation. The facets in a discrete model can be assembled into surfaces bounded by feature lines (aka hard edges). These hard edges can be defined by the relative turning angle of the facet normal vectors on either side of the line. Pointwise, Inc. is solving the top problem facing computational fluid dynamics (CFD) today – reliably generating high-fidelity meshes. The company’s Pointwise software generates structured, unstructured, overset and hybrid meshes; interfaces with CFD solvers such as CFD++, ANSYS FLUENT®, STAR-CCM+®, OpenFOAM®, and SU2 as well as many neutral formats, such as CGNS; runs on Windows, Linux, and Mac, and has a scripting language, Glyph, that can automate CFD meshing. Manufacturing firms and research organizations worldwide have relied on Pointwise as their complete CFD preprocessing solution since 1994. Pointwise is a registered trademark of Pointwise, Inc. in the USA and the EU. Pointwise Glyph, T-Rex and Let’s Talk Meshing are trademarks of Pointwise, Inc. All other trademarks are property of their respective owner.
<urn:uuid:8ef29f6a-059a-4fb5-a0de-dde062f00bed>
CC-MAIN-2022-33
https://www.cfd-technologies.co.uk/preparation-of-geometry-models/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00002.warc.gz
en
0.924744
2,664
3.03125
3
Daniel was one of the prophets of the Jewish exile in Babylonia, along with Jeremiah and Ezekiel. The story of Daniel is a beautiful account of the power of the Lord Jesus Christ to save those who come unto Him. From the book of Daniel we can learn what it means to have a Savior and to rely upon His Atonement. Desire Mercies of the God of Heaven Because of his dependence on the Lord, Daniel came to be known among the Babylonians as a man of great wisdom. When Nebuchadnezzar, the king of Babylon, was troubled with dreams, he commanded the wise men of his kingdom to tell him what his dreams meant. When a few of them could not do so, he ordered all of them destroyed. “And the decree went forth that the wise men should be slain; and they sought Daniel and his fellows to be slain.” But Daniel asked the king for time and promised to interpret the dream for him. “Then Daniel went to his house, and made the thing known to Hananiah, Mishael, and Azariah, his companions: that they would desire mercies of the God of heaven concerning this secret; that Daniel and his fellows should not perish.” (Dan. 2:13, 16-18) Although our lives may not hang in the balance, nearly every day we like Daniel encounter problems that resist solution, that trouble us. How often do we “desire mercies of the God of heaven” concerning our problems? In other words, how often and how intently do we go to Him for help? If we are faithful and do the best we can to solve our difficulties, the Lord will not turn away from us when we ask His help. We can be sure that his saving power, “the mercies of the God of heaven,” will be extended to us and that all will be well. That is the blessing of having a Savior. “Then was the secret revealed unto Daniel in a night vision. Then Daniel blessed the God of heaven.” A great prayer of gratitude follows: “Blessed be the name of God forever and ever: for wisdom and might are his. . . . he giveth wisdom unto the wise, and knowledge to them that know understanding: he revealeth the deep and secret things: he knoweth what is in the darkness, and the light dwelleth with him. I thank thee, and praise thee, O thou God of my fathers, who hast given me wisdom and might.” (Dan. 2:19-23) Are we grateful for the demonstrations of the Savior’s power in our lives? Too often we forget to acknowledge and thank Him for the many ways in which He touches, teaches, and heals us each day. Daniel did not forget to show gratitude. If you want to feel the Spirit, do as Daniel did and express your gratitude each day for the saving work of Jesus Christ. A Kingdom, Which Shall Never Be Destroyed So Daniel went to Nebuchadnezzar and described the dream: “Thou, o king, sawest, and behold a great image. This great image, whose brightness was excellent, stood before thee; and the form thereof was terrible. This image’s head was of fine gold, his breast and his arms of silver, his belly and his thighs of brass. His legs of iron, his feet part of iron and part of clay. Thou sawest till that a stone was cut out without hands, which smote the image upon his feet that were of iron and clay, and brake them to pieces. “Then was the iron, the clay, the brass, the silver, and the gold, broken to pieces together, and became like the chaff of the summer threshingfloors; and the wind carried them away, that no place was found for them: and the stone that smote the image became a great mountain, and filled the whole earth.” (Dan. 2:31-35) Daniel then interpreted the dream. Nebuchadnezzer represented the “head of gold” and the silver, brass, iron, and clay represented inferior kingdoms. Many people have tried to identify the inferior kingdoms; as we prefer the interpretations given by latter-day prophets, let’s turn to President Spencer W. Kimball’s commentary on the dream: “Nebuchadnezzar represented the king of kings, a world power, representing the head of gold. Another kingdom would arise and take over world dominion. The interpretation included the domination of other kingdoms. Cyrus the Great, with his Medes and Persians, would be replaced by the Greek or Macedonian kingdom under Philip and Alexander; and that world power would be replaced by the Roman Empire; and Rome would be replaced by a group of nations of Europe represented by the toes of the image. “With the history of the world delineated in brief, now came the real revelation. Daniel said: “’And in the days of these kings [that is, the group of European nations] shall the God of heaven set up a kingdom, which shall never be destroyed: and the kingdom shall not be left to other people, but it shall break in pieces and consume all these kingdoms, and it shall stand for ever.’(Daniel 2:44) “And it was in the days of these kings that power would not be given to men, but the God of heaven would set up a kingdom—the kingdom of God upon the earth, which should never be destroyed nor left to other people. “The Church of Jesus Christ of Latter-day Saints was restored in 1830 after numerous revelations from the divine source; and this is the kingdom, set up by the God of heaven, that would never be destroyed nor superseded, and the stone cut out of the mountain without hands that would become a great mountain and would fill the whole earth.” (Spencer W. Kimball, “The Stone Cut without Hands,” Ensign, May 1976, 4.) An Image in the Likeness of the World The kingdom of the living Christ is the stone that will fill the earth. The great image represents the kingdoms, powers, and institutions of this world—all that we call “Babylon”—that compete with the Lord’s kingdom. This idol is “the image in the likeness of the world” that is worshiped by so many: “They seek not the Lord to establish his righteousness, but every man walketh in his own way, and after the image of his own god, whose image is in the likeness of the world, and whose substance is that of an idol, which waxeth old and shall perish in Babylon, even Babylon the great, which shall fall. “Wherefore, I the Lord, knowing the calamity which should come upon the inhabitants of the earth, called upon my servant Joseph Smith.” (D&C 1:16-17) The Restoration of the Gospel through the Prophet Joseph Smith is the answer to the great “calamity” that has fallen on us, which is the obsession with worldly success that plagues us. Too many of us have consecrated ourselves to building up the wrong kingdom in the “image of our own gods.” With regard to this devotion of many to this “image in the likeness of the world,” President Kimball said: “I am afraid that many of us have been surfeited with flocks and herds and acres and barns and wealth and have begun to worship them as false gods, and they have power over us. Do we have more of these good things than our faith can stand? Many people spend most of their time working in the service of a self-image that includes sufficient money, stocks, bonds, investment portfolios, property, credit cards, furnishings, automobiles, and the like to guarantee carnal security throughout, it is hoped, a long and happy life. “Forgotten is the fact that our assignment is to use these many resources in our families and quorums to build up the kingdom of God—to further the missionary effort and the genealogical and temple work; to raise our children up as fruitful servants unto the Lord; to bless others in every way, that they may also be fruitful. Instead, we expend these blessings on our own desires, and as Moroni said, ‘Ye adorn yourselves with that which hath no life, and yet suffer the hungry, and the needy, and the naked, and the sick and the afflicted to pass by you, and notice them not.’” [Mormon 8:39.] (Spencer W. Kimball, “The False Gods We Worship,” Ensign, June 1976.) We must not forget that the Lord will ultimately destroy this world system of Babylon, and we may be destroyed with it if we are worshipers of our own self-image as Nebuchadnezzar was. On the other hand, if we follow the Savior, we will do his work—dedicating ourselves and our resources to the saving work of the Church, of missions and the temple and service to the hungry, the needy, and the afflicted. We will be building up His kingdom, which shall never be destroyed. The Lord said to Joseph Smith: “The keys of the kingdom of God are committed unto man on the earth, and from thence shall the gospel roll forth unto the ends of the earth, as the stone which is cut out of the mountain without hands shall roll forth, until it has filled the whole earth.” (D&C 65:2) Those Who Rely on the Son of God “Have No Hurt” Jesus Christ is Himself the cornerstone of this kingdom, as the prophet Jacob taught of Him: “According to the scriptures, this stone shall become the great, and the last, and the only sure foundation.” (Jacob 4:16). He reaches out and saves all who belong to Him. In our individual lives, we all stand between the golden idol of Babylon and the Son of God. That golden idol is often our own self-image. We choose every moment which way we will face, which deity we will bow down to. In the dream of the image, God gave Nebuchadnezzar the extraordinary gift of choice—to worship the true God or to continue to exalt himself. As if to flaunt his arrogance in the face of God, Nebuchadnezzar went on to construct the golden image he had seen in his dreams and to command all to bow to it. “Nebuchadnezzar the king made an image of gold, whose height was threescore cubits, and the breadth thereof six cubits; he set it up in the plain of Dura, in the province of Babylon. . . . An herald cried aloud, To you it is commanded, O people, nations, and languages. . . . fall down and worship the golden image that Nebuchadnezzar the king hath set up; and whoso falleth not down and worshippeth shall the same hour be cast into the midst of a burning fiery furnace. (Dan. 3:1-6) This statue was ninety feet high by nine feet wide, or roughly thirty meters by three meters. It might have stood atop one of the Babylonian ziggurats, an imposing temple to a false god. The spectacle would have been overwhelming as music played and thousands bowed in the surrounding plain. But Daniel’s three friends—Shadrach, Meshach, and Abednego, to call them by their Babylonian names—refused to bow down to the golden image. As a result the king had them thrown into the fiery furnace. “Then Nebuchadnezzar the king was astonied, and rose up in haste, and spake, and said unto his counselors, Did not we cast three men bound into the midst of the fire? . . . . Lo, I see four men loose, walking in the midst of the fire, and they have no hurt; and the form of the fourth is like the Son of God.” (Dan. 3:24-25) There will be “fiery furnaces” in life. The furnaces of rejection, hopelessness, disease, betrayal—these refining fires of life cannot be avoided. To stand up when everyone else is bowing to the image of the world can be frightening and lonely. This is why having a Savior means everything. Regardless of the heat of the trial, He is there with those who have faith in Him. Ultimately—and notwithstanding the pains of this life—because of His atoning sacrifice and His constant watch care, those who rely on the Son of God “have no hurt.”
<urn:uuid:412aa1a9-4d02-48b2-a605-363bce99516b>
CC-MAIN-2022-33
https://latterdaysaintmag.com/article-1-6797/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571959.66/warc/CC-MAIN-20220813142020-20220813172020-00605.warc.gz
en
0.963436
2,711
2.8125
3
Hostas: How to Plant, Grow and Care for Hostas Learn why easy-growing hostas are one of the most popular perennials. Got a shady corner you want to brighten? Count on hosta plants to fill shady spots with leafy textures and colors that pop. Hostas are long-lived perennials with easy-growing personalities. These low-maintenance plants require minimal care to look their best. Plant type: Herbaceous perennial Hardiness: USDA Zones 3 to 9 Size: Plant range in size from about 2 inches to 60 inches tall and about as wide, depending on selection. Culture: Prefers partial to full shade; sun-tolerant cultivars are available. Types of Hosta Like Ireland, where the landscape is said to grow in “forty shades of green,” hostas come in many different colors of green, too, from emerald to chartreuse, blue-green to avocado, and artichoke to olive. Not all hostas are green, though. Some lean toward butter-yellow or gold, powder blue, cream or white. Others are variegated or bordered or striped in various hues. Leaf textures, shapes and sizes also vary from plant to plant, making it possible — and fun — to collect dozens of different species or selections. Look for leaf surfaces that are crinkled, smooth, wavy, puckered or concave. The leaves themselves can be heart-shaped or elongated, oval or rounded. In general, hosta leaves grow symmetrically, forming mounds of foliage that can range from just 3 inches high, for dwarf varieties, to 5 feet tall, for giant types. Care for Hostas Hostas originally come from China, Japan and the islands of South Korea. These outstanding foliage plants grow best in rich, well-drained soils. Most hostas need shade, but some will take sun, so read plant labels and choose varieties that like the growing conditions you can offer. In general, blue hostas have richer color in shady spots, while gold ones need more sun to show their brightest hues. The majority of these undemanding plants grow in average soils and are hardy in Zones 3 to 9. Hostas need average water, but most benefit from watering during dry spells. Also water more often if they’re planted underneath trees that may compete for water and nutrients. Be careful not to overwater, which can cause the plants to rot. Suspect crown rot if you see yellow foliage and stunted growth. How to Plant Hostas Spring is the best time to plant, transplant and divide hostas, when leaves are beginning to emerge. To plant, dig a hole as deep as the root ball and at least twice as wide as the diameter. Space your hostas out as required by their spread at maturity. You won't go wrong adding organic matter to planting holes for hostas. Work in composted leaves, composted manure or whatever type of local compost you can get your hands on. Compost helps improve soil nutrition and moisture in a way that hostas love. Add some mulch to help hold moisture in the soil and keep down weeds; once hostas become established, they usually crowd out competing grass and weeds. Transplanting and Dividing Hostas are easy to transplant either from divisions or directly from nursery pots (see full directions here). To dig a hosta for transplanting, if you're working in early spring, simply dig as much of the rootball as possible. Splitting hostas is best done in spring or early fall. Ideally, plan on dividing hostas before spring or fall rains arrive. Hostas don’t typically need dividing unless they have outgrown a space. In most cases, even when a hosta has filled it growing area, the resulting root restriction doesn’t damage the plant but simply reduces the growth rate. How to Transplant Hostas 01:46 Growing Hostas in Pots Many hostas are great container plants. For best results, use a pot with drainage holes, or drill some in the bottom. Fill the pot with potting soil mixed with slow-release fertilizer. Take your hosta out of the nursery pot and gently loosen the root ball. Put it in its new container and add some soil, burying it no deeper than it was in its original pot. Water thoroughly and make sure any excess drains away. Container-grown plants often dry out faster than those in the garden, so water again as needed, especially in hot weather. Using Hostas in Your Garden During the course of the growing season, expect to see flower stems appear on your hostas. These stems support a spike of white to lavender blooms. The flowers beckon bees, butterflies and hummingbirds to the garden. The long stems look beautiful added to garden bouquets. Use hostas along a border or as a specimen plant in a shade or woodland garden. You can combine with other shade-loving plants, such as ferns, bleeding heart or epimedium, or use it as an accent by itself. If you're primarily growing your hostas for the leaf color they bring to the landscape, you might want to clip flower stems as they form. This creates a consistent look in your hosta plants, although the blue leaf types typically produce another flowering stalk if deadheaded. Pest Prevention for Hostas As much as gardeners like hostas for their steady, reliable beauty, deer like them for their tasty foliage. Rabbits also find hosta leaves, especially the new shoots, particularly irresistible. There are a host of techniques for keeping critters away from hostas — everything from using fabric softener in a spray bottle, to home brews featuring garlic and capsaicin, to rotten egg sprays. What works for one gardener may not work for your backyard's herd of deer, although most folks report consistent success with dried blood repellents and plastic bird netting tossed loosely over plants. Slugs and snails also wreak havoc on hostas, and there are plenty of tips for dealing with these pests as well. Try pet-safe slug baits, pine straw mulch and various traps to keep slugs and snails in check. It's also worthwhile to learn when these slimy munchers reproduce. For many snails and slugs, fall is egg-laying time. Eggs hatch and young slugs go into winter hiding. In spring, they appear early and have voracious appetites. Continue to treat for slugs in fall to put a dent in populations. How to Keep Deer From Eating Hostas For deer, hosta plants are like candy. Some hostas are marketed as containing a degree of deer resistance, but as with all deer resistant plants, when these critters are hungry enough, they’ll eat anything. So no hosta is truly safe. Your best bet is learning how to keep deer away from hostas. Before exploring how to keep deer away from hostas, it’s important to learn how to recognize the signs of deer feasting. When a deer devours a hosta, it tears the leaves from stems and lets the stems remain. You wind up with what looks like spiky celery stalks poking up out of a hosta mound. You may also spot deer hoof prints in soil — they look like an upside down heart. In mulched beds or moist soil, a deer’s foot sinks, so you might see what appear to be deep cylindrical holes. Or you may spy piles of deer droppings, which resemble small black pebbles. The first step in learning how to keep deer away from hostas is to understand a little about deer behavior. Deer are skittish and become alarmed when things are different than normal. They are amazing jumpers and can leap to great heights (up to 12 feet when scared) and across large distances. They are also afraid of predators, like wolves—or a relative, like your own family pup. The surest way to keep deer from eating your hosta plants is fencing your yard. Aim for at least an 8-foot fence, but double-check with the local extension office to confirm what kind of deer are in your area and how high they can jump. Many gardeners rely on an electric fence with several strands of wire, while others prefer a heavy plastic mesh. Deer can’t see the mesh but instead run into it, which keeps them unsettled and more prone to avoid an area. Anything that interrupts the take-off and landing zones can also deter deer because they can’t jump both high and wide. A double fence row is effective at keeping deer out. Simply place an inner fence 3 to 5 feet from the outer one. When you use a double fence, reduce the height to 5 or 6 feet. You can also replace one of the fences with shrubs, stakes or pickets. Exploit a deer’s skittish nature by rotating repellant sprays. Usually anti-deer sprays are based on formulas using dried blood, garlic, red pepper, rotten eggs—or combinations of these items. You can whip up home brews, or rely on manufactured sprays. The bottom line with sprays is to follow directions carefully, reapply as needed and rotate. Otherwise deer can become used to one particular scent. Few diseases bother hostas, although anthracnose can show up in warm, humid weather. You’ll recognize it by the big, irregular spots with dark borders that form on the leaves; later, the middle of the leaves may look torn. Try to avoid the problem by spacing your plants as recommended and watering with soaker hoses or drip irrigation rather than sprinkling the foliage from overhead. If you use a fungicide, choose one that targets this disease and follow label directions. This incredible group of perennials features more than 8,000 named cultivars. There's definitely a type of hosta to please every single gardener. Hosta varieties cover the gamut in terms of size. Tiny miniature types grow 2 inches tall and 4 to 6 inches wide, and gargantuan hosta varieties reach a mature size of 48 inches across and 60 inches tall. Small hosta varieties offer an ideal size for planting along walkways, in shady rock gardens or in fairy gardens. To keep small plants from disappearing among full-size counterparts, many gardeners tuck miniature types of hostas into containers. This technique works especially well in mild-winter regions where temperatures aren't cold enough to damage the plants. The names of miniature hostas usually contain clues that the plants are small, such as 'Baby Booties' (5 inches tall, 19 inches wide), 'Bitsy Gold' (8 inches tall, 21 inches wide) or 'Blue Mouse Ears' (8 inches tall, 12 inches wide). Most nurseries that specialize in selling many hosta varieties usually have lists of miniature types. Giant hostas also frequently have names that contain clues to the plant's size. A few larger-than-life hostas include 'Bigga Luigi' (25 inches tall, 80 inches wide), 'Big Daddy' (25 inches tall, 66 inches wide), 'Kingsize' (48 inches tall, 84 inches wide) and 'Frost Giant' (28 inches tall, 72 inches wide). One of the most well-known giant hostas is 'Empress Wu', which grows to a hefty 48 inches tall and 60 to 72 inches wide, with individual leaves up to 18 inches across. Giant hosta varieties can hold their own anywhere in a landscape, but look especially lovely planted beneath mature trees, atop retaining walls or as part of a hosta garden that fills a shady area. Pair large hosta varieties with shrubs and small trees to create plant combinations that are to scale. Or achieve the same effect by planting large and medium hostas side by side. Just be sure to space plants properly to avoid having the large one engulf the smaller. Slug-resistant types of hostas make it possible to grow these leafy perennials with less slug and snail damage. The slug-resistant hostas typically offer leaves that are thicker, blue or have a seersucker texture. The names of classic slug-resistant hostas, like 'Sum and Substance', 'One Man's Treasure' and 'Praying Hands', don't give a clue about their non-appeal to slugs. Others, like 'Alligator Shoes', 'Rhino Hide' and 'Bulletproof', offer names that are more forthcoming in terms of slug resistance. Other hosta varieties offer outstanding leaf color in shades of blue, gold, chartreuse and variegated patterns. There's even a white leaf hosta, 'White Feather'. It's worth a visit to a garden center or nursery that specializes in hostas if you're considering filling a shady area of your yard with these leafy wonders. You'll discover the vast array of hosta varieties available, including ones that open fragrant flowers. Hostas for Sun Ideal growing conditions for hostas feature filtered light, or what a plant tag would label "partial shade." But many hostas can adapt to increasing amounts of sun. Hosta plants that tolerate sun generally have thicker leaves. 'Rhino Hide' hosta, 'Thunderbolt' hosta and 'Liberty' hosta are varieties with thick leaves. The thicker leaves, by the way, also offer greater slug resistance. Hostas that open fragrant flowers can usually withstand a little more sun. These types of hostas include 'Fried Bananas' hosta, 'Garden Delight' hosta and Hosta plantaginea, a native of China with flowers that open and release fragrance at night. Also, hostas that can withstand some sun typically have leaves with hues of white, yellow or gold. The leaves may be solid or have some variegated pattern of these colors. 'Fire and Ice' hosta has bright white leaves with green edges. 'Sun Power' hosta has bright chartreuse leaves that glow in the landscape. 'Sum and Substance' hosta also has chartreuse leaves, which are large (up to 20 inches across) and puckered. Some of Our Favorite Hosta Varieties 'Patriot' — This long-time favorite has large, oval leaves that look puckered on the surface. White margins surround the deep green foliage. Give it full shade and expect vigorous growth. 'Patriot' is considered a medium-sized hosta and bears lavender blooms in the summer. 'Sum and Substance' — Use this giant hosta, which averages 30 inches tall and 60 inches across, in beds and borders or as a specimen plant. It prefers full morning sun but takes some shade. The pale lilac-to-white blooms open in late summer on 3-inch-long stems. The leaves may turn gold if these drought-tolerant plants get lots of sun. 'Blue Mouse Ears' — Award-winning 'Blue Mouse Ears' is a diminutive beauty, growing just 8 inches tall and 18 inches wide. The thick leaves look rather rubbery and are an attractive blue-green to gray-green. Give it light to full shade and average water. Its bell-shaped, lavender flowers open in midsummer. 'Autumn Frost' — This medium-sized hosta has frosty-blue leaves with bright yellow borders that age to creamy white. The plants grow 10 to 12 inches high and spread to 2 feet in part sun to full shade. Watch for pale lavender flowers in summer. 'White Feather' — This lovely hosta accents any planting with its distinctive colorless leaves. Keep this pale-leafed perennial in light to full shade for best coloring. "White Feather' grows 6 to 10 inches tall and 9 to 12 inches wide. 'Whie Feather's thin leaf tissue is a beacon to slugs, which love munching on the thin material. Keep a supply of slug bait on hand, and use it liberally. Image courtesy of Ball Horticultural Company 'White Feather' Hosta 'Earth Angel' — Named Hosta of the Year in 2009 by the American Hosta Growers Association, this pretty plant reaches 30 inches high with a spread of 40 inches. It's hardy in Zones 4 to 7. The big, heart-shaped leaves are blue-green with broad, creamy-white margins. Give 'Earth Angel' part sun to full shade. 'Francee' — Shade-loving 'Francee' has glossy green leaves with white margins. It likes moist soil and grows about 2 feet high and 4 feet wide. It's a great plant for containers, making a good companion for spring-flowering bulbs and annuals in beds and borders.
<urn:uuid:ab96f27a-ad35-454f-9c93-5069c9eccde1>
CC-MAIN-2022-33
https://www.hgtv.com/outdoors/flowers-and-plants/hosta-plants
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00404.warc.gz
en
0.927697
3,544
2.984375
3