question_id
stringlengths
5
6
question
stringlengths
7
293
answers
sequence
ctxs
sequence
2y00o9
How is Wikipedia considered a reputable source when no academic instructor will accept it as one?
[ "When you say \"people\" you mean \"reddit\". And \"reddit\" isn't a qualified/peer reviewed institution claiming to be a source of factual information. The generally accepted sources of \"factual\" information are journals which usually are collections of independently (or sponsored) publications which have been extensively peer reviewed. This basically means that anything that's published is reviewed by qualified professionals to ensure that what is submitted isn't just a bunch of gobbledegook - which happens quite often.", "There are different levels of proof required for different situations. Often, a good enough source is \"my mate told me\". When studying for school exams, schools text books are considered good sources, although they're often not all that accurate. And in many other cases, Wikipedia is a good enough source. The thing I like about Wikipedia is that it clearly lists its own sources - so if you want to read more, or you don't feel Wikipedia is a good enough source, you can follow the links. I often do this when I see links to Wikipedia on here and it's a subject I want to learn more about. For academia, though, it's not considered a source - but it's usually ok to reference the same sources that Wikipedia references, so it can still have its uses.", "Wikipedia is a secondary source, not a primary one. It's got nothing to do with the fact that it's peer edited - Encyclopaedia Brittanica is not a primary source either and so you can't use it as a citation.", "No one accepts it as a scholarly (I think this is the word you're looking for) source. The majority of articles provide valid references every few sentences and for that reason it's certainly a credible starting point for research. I usually use it as a quick summary of relatively current knowledge on a topic then head down to the references section and branch out from there.", "Encyclopedias are not references. They are TL,DR summaries that are helpful for a basic understanding of sources it should cite, giving you a direction for the actual source material.", "In academia a good source isn't just something that is accurate and peer reviewed. It's also ideally the originating work from which you are building on. By definition wikipedia pages are not original works. Each page is a summary of important knowledge collected from independent original sources. For this reason wikipedia does not encourage editors to reference wikipedia. Wikipedia does (or at least should not) do original work, research or draw new conclusions. It's second hand information and certainly not the literal 'source'. My final point is perhaps the most important... Academics are judged by how many people have cited their work. It is part of how they build their reputations. It would be unfair on these hard working people to cite wikipedia because they are not counted towards their reputation in tools like google scholar. Wikipedia is a fantastic and accurate resource, academics encourage its use for general understanding and **source discovery.**", "I've actually had a professor say that the only source we would ever need for his class was Wikipedia. He thought it was great and that people should use it more often. I'm sure there are others that agree with him but I wouldn't dare cite Wikipedia for another class, ever. Come to think about it, He did spend a day telling us that it was totally acceptable to rob a bank if we used that money to explore Europe. . .", "It is really not a reputable source. You can scroll down and check the sources' validity yourself, but there is no way of knowing just by reading the article itself that the information you're getting is legit. What I did in college was use Wikipedia articles to get sources for whatever I was researching. The vast majority of the sources were legit, but there's never a guarantee.", "Academic groups have much higher standards than a typical person. Wikipedia is usually correct, but \"usually\" isn't good enough. The fact that it changes over time (so referencing it is pointless as in a year it could be different), that its created and edited by unaccredited and possibly unqualified sources is a deal breaker as well.", "Life Pro Tip: Find the section you want to use in your paper and there should be a reference number beside it, find the reference at the bottom as designated by the number and use that as your citation." ]
[ [ "university lecturers discourage students from citing any encyclopedia in academic work, preferring primary sources; some specifically prohibit Wikipedia citations. Wales stresses that encyclopedias of any type are not usually appropriate to use as citable sources, and should not be relied upon as authoritative. Wales once (2006 or earlier) said he receives about ten emails weekly from students saying they got failing grades on papers because they cited Wikipedia; he told the students they got what they deserved. \"For God's sake, you're in college; don't cite the encyclopedia,\" he said.\nIn February 2007, an article in The Harvard Crimson newspaper reported that", "-29.200315797002986" ], [ "topic must have been covered in mainstream media or major academic journal sources that are independent of the article's subject. Further, Wikipedia intends to convey only knowledge that is already established and recognized. It must not present original research. A claim that is likely to be challenged requires a reference to a reliable source. Among Wikipedia editors, this is often phrased as \"verifiability, not truth\" to express the idea that the readers, not the encyclopedia, are ultimately responsible for checking the truthfulness of the articles and making their own interpretations. This can at times lead to the removal of information", "-28.01229098711201" ], [ "declined to make it part of the regular curriculum of his department, however, as of February 2015 Professor Mills continues to delve into topics dealing with editing and/or manipulating Wikipedia in his digital history class at George Mason University. As of February 2016, all references to the hoaxes and classes have been removed from the university's web pages.", "-26.040842208079994" ], [ "a town in Ukraine where he was working with the Peace Corps, and told his mother that Wikipedia can be edited by anybody. She began editing later that year when she looked for books published by the Book League of America and found a gap in the site's knowledge resources. She found the encyclopedia to be a suitable outlet for anthropology, citing Margaret Mead as an influence:\nSome of you know that I am a cultural anthropologist at heart. I wanted to follow in the footsteps of Margaret Mead and study cultural anthropology at Barnard (my mom’s alma mater), like Margaret", "-25.33131293160841" ], [ "students and professors create and maintain articles relating to public policy. Volunteer editors of Wikipedia, known as \"ambassadors\", provided assistance to students and professors. This was either done on campus sites or online.\nIn April 2017, the foundation was one of the founding partners in the Initiative for Open Citations. Technology The foundation employs technology including hardware and software to run its projects. Hardware Wikipedia employed a single server until 2004, when the server setup was expanded into a distributed multitier architecture.\nIn January 2005, the project ran on 39 dedicated servers in Florida. This configuration included a single master database server", "-25.096581890946254" ], [ "papers, and new software called Authorship Investigate, also by Turnitin, can look at a paper and compare it against a student's other writings to yield a probabilistic estimate of whether the student is the real author.\nOther universities have enacted rules allowing professors to give students oral examinations on papers which a professor believes to be ghostwritten; if the student is unfamiliar with the content of an essay that he has submitted, or its sources, then the student can be charged with academic fraud, a violation of the rules by which a student agrees to be bound when he enters", "-25.039851706766058" ], [ "efforts would not be long lived. Still, it seems to work very well.\" High editorial standards in medicine and health sciences articles, in which users typically use peer-reviewed journals or university textbooks as sources, have led to the idea of expert-moderated wikis. Some wikis allow one to link to specific versions of articles, which has been useful to the scientific community, in that expert peer reviewers could analyse articles, improve them and provide links to the trusted version of that article. Noveck points out that \"participants are accredited by members of the wiki community, who have a vested interest in", "-24.887907717202324" ], [ "on the internet for students. A project that began in 2002, in 5 years, MIT managed to publish its entire curriculum of lecture notes and exams online. This information is made available for students and teachers, even from other institutions, to be \"freely used, copied, distributed, translated and modified\". Professors have equal access to OpenCourseWare regardless of the institution they belong to. Tapscott and Williams propose that student users should be able to share their desired education structure with professors. Professors then make curriculum structure decisions based on the advice of the community of students and professors to optimize learning", "-24.84004767985607" ], [ "if they feel comfortable enough to cite the source. A: Authority There is, however, not only the currency and relevance of the given source, but also its authority to consider. This is significant because the students and educators will look to see who is the author, publisher, or sponsor before they can trust the information. Their education level and the author's affiliations are important because this can help the readers know if the author is qualified to write on the topic. There should also be a contact information of the publisher or author. The authority of the source helps the", "-24.74157943573664" ], [ "culture and a community that encourages participants (to be called \"authors\") to \"respect\" the expert contributions (by what he referred to as a \"gentle process of guidance\").\nExperts are required to verify their qualifications openly, for transparency and publicly accepted authority. This contrasts with the open and largely anonymous nature of Wikipedia, where subject specialists have neither any verifiable special knowledge of their subject nor agreed special status. Sanger stated that editors would not have pre-approval rights over edits by ordinary authors, though editors would have somewhat undefined authority over articles that fall within their specific area of expertise. Policies and", "-24.679969124961644" ], [ "by the world as to grow their brand and acclaim as a professor. Laws that may apply to digital scholarship are largely outdated but professors would like to use the argument of faculty ownership of traditional works as historical practice and practice compatible with mission of higher education as a public good. Professors argue that it took time and serious effort to make the presentations, slides, media. To date professors have been rarely questioned whether they have the right to bring their course outlines, lecture outlines, and lecture notes with them if they decide to leave the university where they", "-24.570264739042614" ], [ "College has become a commonly cited description of the lack of expertise of Wikipedia editors. See Reliability of Wikipedia.", "-24.343109328925493" ], [ "source? More importantly, the writers of the references should focus on the intended audience. There are a vast number of topics and an increase in access to information. Therefore, the relevance of the information helps the audience know what they are looking for. Also, there is a check-in about whether the data is at an appropriate level of comprehension, that is, the degree must not be too elementary or advanced for the students' or educators' needs. Because of the variety of sources, educators can do their best to keep an open mind about source usage. Moreover, they should decide", "-24.232692514524388" ], [ "created them. Change over the ability of professors to bring digital scholarship with them is expected as universities have begun to take notice and assert copyrights. Professors will argue that since they are the creators and authors of the product they are the owners according to law.\nAs of now most copyright laws in America indicate that the author or creator holds the copyright, but the same cannot be said for digital scholarship. The law explicitly states that if the work is within the scope of his or her employment then the work is the property of the employer. Since the", "-24.17445061518083" ], [ "legally.\" Education and Training Academic courses in library science include collection management, information systems and technology, research methods, information literacy, cataloging and classification, preservation, reference, statistics and management. Library science is constantly evolving, incorporating new topics like database management, information architecture and information management, among others. With the mounting acceptance of Wikipedia as a valued and reliable reference source, many libraries, museums and archives have introduced the role of Wikipedian in residence. As a result, some universities are including coursework relating to Wikipedia and Knowledge Management in their MLIS programs.\nMost schools in the US only offer a master's degree in", "-24.078625259688124" ], [ "to disseminating its research and scholarship as widely as possible by adopting an Open Access Policy. (See: Open access mandate) ScholarSpace ScholarSpace is an institutional repository for the digital scholarly output for the University of Hawai‘i at Mānoa (UHM) faculty, researchers and students. Contributors maintain copyright to their submissions and can control access to their collections. The digital repository serves to capture, index, store, makes searchable, disseminate, and preserve digital materials which include scholarly communications, theses and dissertations, technical reports, teaching materials, images, multimedia clips, interactive teaching programs, data sets, and databases. System & Organization ScholarSpace uses the open-source", "-23.835032122558914" ], [ "an average person can understand what is written.\" The site also claims a \"cooperation\" with Encyclopædia Britannica, to provide students with a reference library.\nThe school's website lists seven faculty members, including two with doctorates, one with Ed.D, three with master's degrees and one with a J.D. degree. According to a newspaper report in 2002, Karademir called the faculty \"advisers\", not \"professors\". Accreditation status and recognition of degrees The university has not sought educational accreditation and does not have a campus. As recently as October 2012, the Oregon Office of Degree Authorization stated on its website that WIU is located", "-23.827428273158148" ], [ "and know the APA, MLA, and sometimes AMA formats for research papers/projects and other assignments. The teachers also do not allow students to use Wikipedia as a credible source of information at all.\nAnother improvement that is underway is a standardized lab report format for all DCMST classes that will be followed for all four years of the student's time at DCMST.", "-23.710502104106126" ], [ "university professors is a fundamental principle recognized by the laws of the Republic, as defined by the Constitutional Council; furthermore, statute law declares about higher education that \"teachers-researchers (university professors and assistant professors), researchers and teachers are fully independent and enjoy full freedom of speech in the course of their research and teaching activities, provided they respect, following university traditions and the dispositions of this code, principles of tolerance and objectivity\". The nomination and promotion of professors is largely done through a process of peer review rather than through normal administrative procedures. Germany The German Constitution (German: Grundgesetz) specifically", "-23.585278830956668" ], [ "possible with the onset of online collaborative writing platforms, such as Authorea, Google Docs, and various others, where a remote service oversees the copy-editing interactions of multiple authors and exposes them as explicit, actionable historic events. Citations Academic authors cite sources they have used, in order to support their assertions and arguments and to help readers find more information on the subject. It also gives credit to authors whose work they use and helps avoid plagiarism.\nEach scholarly journal uses a specific format for citations (also known as references). Among the most common formats used in research papers are the APA,", "-23.504984469735064" ], [ "a false premise; that allowing anyone to edit articles, whether or not they were knowledgeable, would lead to evolution of article quality. Belief in the ability of Wikipedia to succeed, he argued, required a faith that \"some unspecified quasi-Darwinian process will assure that those writings and editings by contributors of greatest expertise will survive\". A secondary criticism was that editors were being self-indulgent, because they spent time on minor alterations while leaving important factual inaccuracies in place, and thus were disregarding the needs of the readers. In a later article about Wikipedia, following the Seigenthaler incident, McHenry restated his earlier", "-23.501215274023707" ], [ "and requires authors who contribute to the section to also submit a draft article on the RNA family for publication in Wikipedia.\nWikipedia has also been used as a source in journalism, often without attribution, and several reporters have been dismissed for plagiarizing from Wikipedia.\nIn 2006, Time magazine recognized Wikipedia's participation (along with YouTube, Reddit, MySpace, and Facebook) in the rapid growth of online collaboration and interaction by millions of people worldwide.\nIn July 2007, Wikipedia was the focus of a 30-minute documentary on BBC Radio 4 which argued that, with increased usage and awareness, the number of references to Wikipedia in", "-23.463520435034297" ], [ "argued that library and information education should provide teaching in source criticism at least at the same level as is taught in Upper Secondary School (see Gudmundsson, 2007).\nIn library and information science the checklist approach has often been used. A criticism of this approach is given by Meola (2004): \"Chucking the checklist\".\nLibraries sometimes provide advice on how their users may evaluate sources.\nThe Library of Congress has a \"Teaching with Primary Sources\" (TPS) program. Ethics Source criticism is also about ethical behavior and culture. It is about a free press and an open society, including the protecting information sources", "-23.27524460677523" ], [ "has no formal editor-in-chief any more and decisions regarding acceptance or rejection of a manuscript appear to be made by majority vote from a mix of external reviewers and editors (whose identity remains confidential unless a manuscript is accepted for publication).", "-23.222654515804606" ], [ "The school tends to have no library, personnel, publications or research. In short, very little that is tangible can be found about the institution. If teaching is offered, the professors may themselves hold advanced degrees from the diploma mill itself or from other unaccredited institutions. They may also sport legitimate qualifications that are unrelated to the subject they teach.\nDoctoral theses and dissertations from the institution will not be available from University Microfilms International, a national repository, or even the institution's own library, if it has one. The address given by a diploma mill is often a postal box, mail forwarding", "-23.153398158145137" ], [ "ranking in search engines.\nA 2018 study examined the way that Wikipedia integrates new scientific information. Editors In 2016 the Wiki Education Foundation and the Simons Foundation presented an outreach program called the \"Year of Science\". In this program, Wikipedia educators visited academic conferences and invited scientists to contribute information from their field of expertise to Wikipedia.\nSome universities have programs to encourage students to edit Wikipedia's science articles as part of the learning experience.\nThe Wikipedia community invites academics to edit Wikipedia articles.\nVarious academic societies have encouraged their membership to edit Wikipedia. Quality A 2005 study published in the journal Nature compared", "-23.148976674070582" ], [ "and an instructor answer, shown directly below, which can only be edited by instructors. Multiple students are allowed contribute to each answer like the Wikipedia entries, and each answer have a version history that shows what each student wrote. Users are allowed to attach external files to posts, use LaTeX formatting, view a post's edit history, add follow-up questions, and receive email notifications when new content is added. The interface consists of a dynamic list of posts on the left side of the screen, a central panel for viewing and contributing to individual posts, and an upper bar for account", "-23.13690393336583" ], [ "any time. The ability for both the teacher and student to edit content allows for study to take place outside the classroom environment, since blogs can usually be accessed using the URL of the blog on any computer. Blogs increase exposure to other students from around the country or world, while improving writing and communication skills. Teachers are using blogs as a way to post important information such as homework, important dates, missed lessons, projects, discussion boards, and other useful classroom information that is accessible by all. As noted, students can access this information from home, or from any", "-23.07840009307256" ], [ "what and when\" so that sources for all arguments are clear. Thus, the scholar tries to be as objective and fact-based as possible.\nIn this way, criticism is much more difficult to ignore or to refute. Most often, a scholarly publication is refereed (\"screened\") by other knowledgeable scholars, who critically examine the text to find possible faults, and possibly suggest alterations. In this way, scholars always try to ensure the quality of what is said. A scholarly criticism is successful if it provides a proof or refutation that nobody can rationally deny, so that most people accepted it as definitive. Much", "-23.013227889794507" ], [ "students or educators know that the information can be used and trusted in a proper manner. Authority in citing a source establishes a trust boundary between the reader and the author of the works. A: Accuracy Emphasizing the trustworthiness of sources, the accuracy of the contents in the source must connect back to the origin. Evidence must support the information presented to the audience. Evidence can include findings, observations, or field notes. The report must be reviewed or referred. It must be verifiable from another source or common knowledge. That said, the language used in the sources has to", "-22.93588163831737" ], [ "article in The Atlantic titled \"Can Wikipedia Ever Be a Definitive Medical Text?\", Julie Beck quotes WikiProject Medicine's James Heilman as stating: \"Just because a reference is peer-reviewed doesn't mean it's a high-quality reference.\" Beck added that: \"Wikipedia has its own peer review process before articles can be classified as 'good' or 'featured.' Heilman, who has participated in that process before, says 'less than 1 percent' of Wikipedia's medical articles have passed.\" Quality of writing In 2008, researchers at Carnegie Mellon University found that the quality of a Wikipedia article would suffer rather than gain from adding more writers when", "-22.828433436807245" ], [ "search or a publicly listed collection a researcher may have to track down its existence through other means, such as following other researcher's citations and references. This is particularly true for materials held by corporations or other organizations that may not employ an archivist and thus be unaware of the extent or contents of their materials.\nIn very restricted archives, access may be restricted only to individuals with certain credentials or affiliations with institutions like universities and then only to those of a certain level. Those lacking the necessary credentials may need to request letters of introduction from an individual or", "-22.790866278577596" ], [ "Academy is not a University: it does not have a permanent teaching staff, but its scientific body, the Curatorium, freely calls upon academics, practitioners, diplomats, and other personalities from all over the world whom it considers qualified to give courses, in English or French (with simultaneous interpretation). These courses are given in the form of a series of lectures, on general or special subjects. In principle, the courses are then published in the Collected Courses of the Academy of International Law, which now run to more than 360 volumes and are certainly among the most important encyclopædic publications on private", "-22.725726470176596" ], [ "the majority's view, buying books for each student was not a realistic alternative because the teachers were copying only short excerpts. Furthermore, the schools had already purchased originals that were kept in the class or library, from which the teachers made copies. If the Board's approach was followed, \"schools would be required to buy sufficient copies for every student of every text, magazine and newspaper in Access Copyright's repertoire that is relied on by a teacher.\" The majority concluded that photocopying short excerpts is reasonably necessary to achieve the purpose of \"research\" and \"private study\"", "-22.55961350206053" ], [ "but a scholar title.\nOnly a docent can be appointed a professor through a special procedure. Unlike Germany (and unlike the traditional Czech practice), a professor is not a function (a seat, Cathedra) at a University, but a scholarly title. This leads to many problems, especially the phenomenon of so-called \"flying professors\", who are teaching at two or three universities at the same time and to the decline of academic life. European and Commonwealth usage In the United Kingdom, Australia, New Zealand, and Europe, the degree is a higher doctorate usually awarded on the basis of exceptionally insightful and distinctive publications", "-22.494670440559275" ], [ "Wiki Education Foundation History The Wikipedia Education Program was started by the Wikimedia Foundation in 2010. The Wiki Education Foundation incorporated in 2013, a process that the Wikimedia Foundation began in 2012 to give the education program \"more focused and specialized support\" and to \"develop additional programs to promote academic research and teaching that engage with Wikipedia\". It has been granted 501(c)(3) charity status.\nIn February 2014, the Wikimedia Foundation (WMF) and Wiki Education Foundation announced the hiring of Frank Schulenburg, who had formerly served as senior director of programs at WMF, as the organization's first executive director. In April 2014,", "-22.277499268762767" ], [ "of Professional Conduct\" (2005) regarding textbooks and reference books states that, since textbooks and encyclopedias are summaries of other scholars' work, they are not bound by the same exacting standards of attribution as original research and may be allowed a greater \"extent of dependence\" on other works. However, even such a book does not make use of words, phrases, or paragraphs from another text or follow too closely the other text's arrangement and organization, and the authors of such texts are also expected to \"acknowledge the sources of recent or distinctive findings and interpretations, those not yet a part of", "-22.257220029598102" ], [ "funded, the scholarly work will be available to only readers who are willing to pay, if author funded, the work will be available openly for free.", "-22.23203427559929" ], [ "sources, and must be mastered, even if one has to struggle to understand them; and Achronim, which are secondary sources, which can be exploited (if you find good material, use it, but if you don't understand it, don't spend too much time on it). The fourth and final step is sevarah, creating the intellectual framework underpinning the Torah.\nSoloveitchik taught at Hebrew University until 1984, and reached the rank of full Professor. During that period, he also taught at and served as Dean of the Bernard Revel Graduate School of Yeshiva University and served as a Rosh Yeshiva (dean) at its", "-22.209233661182225" ], [ "1995 by Edward N. Zalta. Contributors to the Encyclopedia give Stanford University the permission to publish the articles but retain the copyright to those articles. Internet Encyclopedia of Philosophy The Internet Encyclopedia of Philosophy is an online encyclopedia that has the stated purpose of \"providing detailed, scholarly information on key topics and philosophers in all areas of philosophy. The IEP is free of charge and available to all internet users world wide. The present staff of 25 editors and approximately 200 authors hold doctorate degrees and are professors at colleges and universities around the world, most notably from the United", "-22.203879695094656" ], [ "to use Wikipedia writing assignments for academic courses. The overall goal of the initiative is for sociologists to become involved in the writing and editing processes to ensure that social science articles are up-to-date, complete, accurate, and written appropriately.", "-22.196334383101203" ], [ "the sources which would allow future work on a thesis, the necessary bibliography, an exposé of the problems involved as defined by the student, and one or two attempts at edited-down chapters, showing that the problems, sources and bibliography could lead to a real work of original research.\nOn the other hand, one rarely speaks of a \"mémoire de thèse\", as this is too voluminous, and its usage is only to qualify that the thesis is all the student's own work.", "-22.054927043558564" ], [ "and the need to consider online scholarship (or bloggership) as a legitimate means in conducting the critical studies of humanities. List of Biblioblogs Biblioblogs are listed and ranked at The Biblioblog Top 50.", "-22.00265757064335" ], [ "is no deity and no ultimate reality, then undergraduates named Karl Marx, Bertrand Russell, and Jean-Paul Sartre would likewise have some of their major essays excluded from student publications. If any manifestation of beliefs in first principles disqualifies the writing, as seems to be the case, it is indeed difficult to name renowned thinkers whose writings would be accepted, save perhaps for articles disclaiming all connection to their ultimate philosophy. Plato could contrive perhaps to submit an acceptable essay on making pasta or peanut butter cookies, provided he did not point out their (necessary) imperfections. The University's Establishment", "-21.952674753323663" ], [ "precise as it also refers to editors employed by scholarly journals to edit manuscripts after acceptance (in place of the term copy editor).\nAuthors' editors usually work with academic authors, researchers and scientists writing scholarly journal articles, books and grant proposals. Thus, the authors' editor facilitates the academic writing process by acting before submission or peer review. Authors' editors may also help authors revise manuscripts after peer review, but once the document is accepted for publication the collaboration ends (and other editors, for example a copy editor or production editor, take over). The work of authors' editors An author's collaboration with", "-21.946172625408508" ], [ "be unbiased or free of emotion, because of its use for fact retrieval. The content in the source should be free of spelling, grammar, or typographical errors. P: Purpose The purpose of the sources helps the readers know whether the information they are looking for is right for their research. The questions that arise when looking for the purpose range from informing, teaching, selling, entertaining, research or even self-gaining purposes. Also, the author's intentions should be clear. Certain aspects should be taken into consideration whether the information given is fact, opinion, or propaganda as well as political, personal, religious,", "-21.898427740612533" ], [ "be revised. However, the tutor usually does not proofread nor edit the student's work. Instead, the tutor facilitates the student's attempts to revise his or her own work by conversing with the student about the topic at hand, discussing principles and processes of writing, modeling rhetorical and syntactical moves for the student to apply, and assisting the student in identifying patterns of grammatical error in his or her writing. This is based upon a large body of theory discussed in a later paragraph. History Historically, writing centers in American universities began appearing as \"writing labs\" in the early 20th century.", "-21.872490228473907" ], [ "of the debate as to what the world's greatest encyclopedia should be - \n\"One faction believes Wikipedia should contain pretty much anything, as long as it’s factual and verifiable.... On the other side of the debate are the ‘deletionists’, although this somewhat unfairly characterizes their view in a destructive way. Some prefer the word ‘exclusionists’. This camp believes it is important to strictly determine not only whether something is factual, but whether it is notable, whether it is worthy of being included in the pantheon of human knowledge..... At the center of the debate is notability, which is where inclusionists", "-21.86995240894612" ], [ "on distinguished academics without changes to their salaries or duties; the title of professor would be conferred on those whose research was \"of outstanding quality\", leading \"to a significant international reputation\". Reader would be conferred on those with \"a research record of a high order, the quality of which has gained external recognition\". This article provides a list of people upon whom the University of Oxford has conferred the title of professor.\nIn July 1996, the University announced it had appointed 162 new Professors and 99 Readers as part of this move. In January 2001, Congregation's Personnel Committee recommended that the", "-21.85808012638563" ], [ "institutions. Over 40 journals allow their authors to publish open access articles, with the author (or their institution or research funder) paying a publication charge to the journal. The publisher also has several open access journals. Authors are also allowed to post accepted, unedited papers on their websites or the funding body's archives no earlier than 6 months after publication.\nIn June 2010, a letter outlining the University of California libraries' pricing challenges with NPG was distributed to university faculty by campus librarians with the support of the systemwide University Committee on Library and Scholarly Communication. The letter also described a", "-21.836797878117068" ], [ "for offering this alternative studies, though, is the heavy bureaucratic process that needs to be accomplished to receive the approval of specific titles, in particular when it refers to new studies or studies about matters that do not fit with the official studies. For historical reasons, the academic system has been very much under the control of the State and private universities are still regarded with as a threat to the State system.\nThese programmes fall within the category of \"Non officially approved and accredited\" or \"Estudios no oficiales\" and they have no academic or professional effects. This means that they", "-21.757695990789216" ], [ "Science information on Wikipedia Science information on Wikipedia includes the information which Wikipedia presents about science. There have been critiques and discussion about the impact and quality of that information, and the interactions of Wikipedia editors, scientists, and public engagement with the information. Impact A 2017 study found evidence that Wikipedia's popularity as the most popular general information source has influenced how everyone talks and writes about science.\nA 2016 study found evidence that Wikipedia increases the distribution and impact of open access science publications.\nUNESCO reported in 2017 that Wikipedia is a popular source of science information because of its high", "-21.757186691393144" ], [ "publications have subsequently been retracted. Some of the journals had listed academics on their editorial boards without their permission or even knowledge, sometimes in fields very different from their own. In 2012, one of its journals, Advances in Pure Mathematics, accepted a paper written by a parody generator; the paper was not published, but only due to its author's unwillingness to pay the publication fee. The company has also been noted for the many unsolicited bulk emails it sends to academics about its journals. \nIn 2013, the Open Journal of Pediatrics, a SCIRP journal, published a study which concluded that", "-21.724333160731476" ], [ "use an appreciable amount of scholarly citations. They may or may not be defended before a committee but usually are not; there is generally no preceding examination before the writing of the paper, except for at very few colleges. Because of the nature of the graduate thesis or dissertation having to be more narrow and more novel, the result of original research, these usually have a smaller proportion of the work that is cited from other sources, though the fact that they are lengthier may mean they still have total citations.\nSpecific undergraduate courses, especially writing-intensive courses or courses taken by", "-21.64793230536452" ], [ "paid university professors are practically worthless because they can easily be outwitted by an eighth grader in terms of doing scholarly research.\"", "-21.629529341007583" ], [ "such as the one which occurred between the University of California and the Nature Publishing Group.\nFor teaching purposes, some universities, including MIT, provide freely available course content, such as lecture notes, video resources and tutorials. This content is distributed via Internet resources to the general public. Publication of such resources may be either by a formal institution-wide program, or alternately via informal content provided by individual academics or departments. Legislation Any country has its own law and legal system, sustained by its legislation, a set of law-documents — documents containing statutory obligation rules, usually law and created by legislatures. ", "-21.56732983328402" ], [ "and service instead of research. A convention some schools have begun to use is the title \"teaching professor,\" with or without ranks, to clarify that these are in fact true faculty members who simply do not have research obligations.\nSenior lecturers sometimes have substantial experience and accomplishments in their field and possess a doctorate or its professional equivalent and sometimes just require a given number of years of experience. Also, in some schools it is a temporary post for visiting academics of considerable prominence—e.g. a famous writer may serve for a term or a year, for instance. In some", "-21.55181565391831" ], [ "international journals or similarly considered technical publications. Technical patents too are considered. Post graduate research supervision and outreach are also crucial.\nOutside of the appointive tenures, some very senior academic staff in the Kenyan Universities do get baptized \"professor\" by their students or colleagues. This is because they are usually very senior, have mentored many, or they have achieved a lot of academic grounding without the benefit of promotions which can get gruesomely political. A lot of victims are those with solid research credentials combined with great teaching and outreach experience but have not acquired a PhD or equivalent for", "-21.547800000058487" ], [ "documents that reside on the student's Google Drive with the teacher, files are hosted on the student's Drive and then submitted for grading. Teachers may choose a file that can then be treated as a template so that every student can edit their own copy and then turn back in for a grade instead of allowing all students to view, copy, or edit the same document. Students can also choose to attach additional documents from their Drive to the assignment. Grading Google Classroom supports many different grading schemes. Teachers have the option to attach files to the assignment which students", "-21.53995266032871" ], [ "a few of the professors at Harvard University were including Wikipedia articles in their syllabi, although without realizing the articles might change. In June 2007, former president of the American Library Association Michael Gorman condemned Wikipedia, along with Google, stating that academics who endorse the use of Wikipedia are \"the intellectual equivalent of a dietitian who recommends a steady diet of Big Macs with everything\". Medical information On March 5, 2014, Julie Beck writing for The Atlantic magazine in an article titled \"Doctors' #1 Source for Healthcare Information: Wikipedia\", stated that\n\"Fifty percent of physicians look up conditions on the (Wikipedia)", "-21.536555386788677" ], [ "service or suite number. There are legitimate distance learning institutions with limited facilities, however, but legitimate universities make their authority clear. For academics, publications in peer-reviewed scientific journals are important for establishing scientific credentials. However, in diploma mills, the research is either absent, fake or purely self-published without any external review. This may be unfortunately hard to spot, since fake journals also exist. Faculty pages with bios and research may even be stolen from legitimate universities. Promotion and fees Buyers often use the diplomas to claim academic credentials for use in securing employment. For example, a schoolteacher might buy a", "-21.51145369312144" ], [ "Library of Science is a nonprofit open-access scientific publishing project aimed at creating a library of open access journals and other scientific literature under an open content license. The founding of the organization had its origins in a 2001 online petition calling for all scientists to pledge that from September 2001 they would discontinue submission of papers to journals which did not make the full-text of their papers available to all, free and unfettered, either immediately or after a delay of several months. The petition collected 34,000 signatures but the publishers took no strong response to the demands. Shortly thereafter,", "-21.438318438071292" ], [ "of available resources.\nDue to the extensive requirements of resources for online education, many open community projects have been initiated. Specifically, the Wikimedia Foundation has developed a project devoted to free online educational resources, Wikiversity, and recently, several other sites for specific topics have developed.\nChristian Leaders Institute offers tuition free college level ministry education. Students can take any classes free of charge, but are encouraged to help support the mission of the institution by making donations to this 501 (c)3 United States Charity.\nThe Islamic Online University (IOU), a distance-learning higher education institution, offers tuition-free graduate and undergraduate degrees. A very", "-21.416526851418894" ], [ "or entirety\". Other professors protested, claiming that you can't \"plagiarize a little\", that, depending on the context, you can properly cite other authors but not the entire passages and pages, and that what the commission described is a textbook of \"hidden plagiarism\". In general, the commission was accused of polemicizing with Karapandža's evidence instead of dealing with the thesis itself. The composition of the 4-members commission was also criticized. None of the members deal with the corporate finances, which is the theme of the PhD. One of them speaks no English so he couldn't compare the original doctorate to the", "-21.37000680709025" ], [ "employer here would be the university, professors are technically creating work for hire. While faculty of universities appear to not be credited for their work, the primary reason for a university to take ownership of a faculty's work is that the member created the work using university funds mostly. Solutions to the lack of clear laws regarding ownership of digital scholarship are not currently being created but many universities have created written contracts with professors over who owns future work or what they can do with previous work.\nFor example, in the U.S. Supreme Court case Stanford v. Roche, the court", "-21.364895122125745" ], [ "including Robert Berdahl, president of the Association of American Universities (and not a commission member), who stated that the report lacked a \"nuanced understanding\" of the realities of higher education.\nPrivacy advocates have criticized the call for a national student database, which Spellings and the commission have argued should include information on individual students' performance.\nMicrosoft's Gerri Elliot, a commission member, sparred with other commission members over the inclusion of a discussion of the benefits of open source software and open content. Response to commission recommendations The Higher Education Consumers Resource (http://www.highereducationconsumersresource.org/) took exception to the report, citing inadequate research on root", "-21.362310973578133" ], [ "source material is the Purpose, Methods, Results, Conclusions sections of a research paper (in IMRAD style) in a scientific journal by the authors who conducted the study. In some fields, a secondary source may include a summary of the literature in the Introduction of a scientific paper, a description of what is known about a disease or treatment in a chapter in a reference book, or a synthesis written to review available literature. A survey of previous work in the field in a primary peer-reviewed source is secondary source information. This allows secondary sourcing of recent findings in areas where", "-21.355009818900726" ], [ "a result of increased demand for said materials.\nAcademic libraries today vary in regard to the extent to which they accommodate those who are not affiliated with their parent universities. Some offer reading and borrowing privileges to members of the public on payment of an annual fee; such fees can vary greatly. The privileges so obtained usually do not extend to such services as computer usage, other than to search the catalog, or Internet access. Alumni and students of cooperating local universities may be given discounts or other consideration when arranging for borrowing privileges. On the other hand,", "-21.30450256205222" ], [ "grant permission to the University to make their scholarly articles publicly accessible and to exercise the copyright in a \"nonexclusive, irrevocable, worldwide license ... provided that the articles are properly attributed to the authors not sold for a profit.\" The GSE Open Archive houses and makes publicly available the GSE authors' working papers as well as published articles. Between May 21-24th, 2013, the Stanford GSE doctoral students voted in favor of a motion to enact an Open Access policy. At this time, however, despite the strong case made by Professors John Willinsky and Juan Pablo Alperin, no other Stanford academic", "-21.277453387039714" ], [ "professors are by courtesy addressed as \"Professor\". In official functions, however, associate professors are addressed as doctor or associate professors and not professors. As in the USA, the title of 'professor emeritus' may be awarded to a retired or former professor, who may well retain formal or informal links with the institution where the chair was formerly held. Named professorships Many professorships are named in honour of a distinguished person or after the person who endowed the chair. Some chairs have a long history and considerable prestige attached, such as the Gresham professorships, which date back to the 16th Century,", "-21.267264540249016" ], [ "receives. If a professor chooses to use the same book the following semester, even if it is a custom text, designed specifically for an individual instructor, bookstores often buy the book back. The GAO report found that, generally, if a book is in good condition and will be used on the campus again the next term, bookstores will pay students 50 percent of the original price paid. If the bookstore has not received a faculty order for the book at the end of the term and the edition is still current, they may offer students the wholesale price of the", "-21.26171528701525" ], [ "Unaccredited institutions of higher education Unaccredited institutions of higher education are colleges, trade schools, seminaries, and universities which do not have formal educational accreditation.\nEducational institutions may not be legally required to obtain independent accreditation, depending on local laws. Academic degrees or other qualifications from such unaccredited institutions may or may not be accepted by civil service or other employers, depending on the local laws, the institution's reputation, and the industry standards.\nAn institution may not obtain or maintain accreditation for one of several reasons. As accreditation processes often require several years' work, a new institution may not yet have completed the", "-21.240300624325755" ], [ "remained in secret or unauthorized associations, or shall have entered such associations, shall not be admitted to any public office.\n4. No student who shall be expelled from a university by a decision of the university senate which was ratified or prompted by the agent of the government, or who shall have left the institution in order to escape expulsion shall be received in any other university. Press Law Ref: \"Karlsbader Beschlüsse – Preßgesetz\". Retrieved 24 February 2011.\n§1: So long as this decree shall remain in force no publication which appears in the form of daily issues, or as a serial", "-21.22775195352733" ], [ "Academic publishing Academic publishing is the subfield of publishing which distributes academic research and scholarship. Most academic work is published in academic journal article, book or thesis form. The part of academic written output that is not formally published but merely printed up or posted on the Internet is often called \"grey literature\". Most scientific and scholarly journals, and many academic and scholarly books, though not all, are based on some form of peer review or editorial refereeing to qualify texts for publication. Peer review quality and selectivity standards vary greatly from journal to journal, publisher to publisher, and field", "-21.21881035633851" ], [ "about skepticism, rationalism, and empiricism, as well as more contemporary concerns, such as whether Wikipedia, \"where most articles have multiple and anonymous authors\", can be a reliable source of knowledge.", "-21.21366636059247" ], [ "the Drummond Professor of Political Economy. The various academic faculties, departments, and institutes are organised into four divisions, each with its own head and elected board. They are the Humanities division; the Social Sciences Division; the Mathematical, Physical and Life Sciences Division; and the Medical Sciences Division.\nThe University of Oxford is a \"public university\" in the sense that it receives some public money from the government, but it is a \"private university\" in the sense that it is entirely self-governing and, in theory, could choose to become entirely private by rejecting public funds. Finances In 2017/18, the university had an", "-21.177008577331435" ], [ "from university members wanting to buy. There were plenty of other demands for parchment outside the university such as: the record-keeping for the royal government, every similar entity of a commercial or mercantile guild, every religious house that issued a charter or kept a rent roll, every public letter-writer, everyone from major international trader to local shop-keeper who kept accounts. They all demanded parchment in greater numbers and were willing to pay higher than the regulated price which the university members paid. And so, the universities feeling such pressures often chose to regulate parchment as well. Benefits While there were", "-21.169239683949854" ], [ "Scholar A scholar is a person who devotes themselves to scholarly pursuits, particularly to the study of an area in which they have developed expertise. A scholar may also be an academic, a person who works as a teacher or researcher at a university or other higher education institution. An academic usually holds an advanced degree. Definitions The term scholar is sometimes used with equivalent meaning to that of academic and describes in general those who attain mastery in a research discipline. However, it has wider application, with it also being used to describe those whose occupation was researched prior", "-21.078709202600294" ], [ "special issues of journals, are released as Open Access; in addition, Springer allows the authors to make their papers available via their own webpages.", "-21.076364188222215" ], [ "Index of philosophy Featured content Featured content in philosophy represents the best Wikipedia has to offer on philosophy topics, and undergoes vigorous peer review. Outlines of philosophy An outline is an organized list of topics covered in an area. Each outline shows the structure of its subject and serves as a table of contents to its coverage on Wikipedia.", "-21.062932603119407" ], [ "are permanent employees, and the position is often held by particularly distinguished scholars; thus the position is often seen as more prestigious than an ordinary full professorship. The title is used in a somewhat similar sense in the United States, with the exception that research professors in the United States are often not permanent employees and often must fund their salary from external sources, which is usually not the case elsewhere. Independent scholars An independent scholar is anyone who conducts scholarly research outside universities and traditional academia. In the United States, a professional association exists for independent scholars: this association", "-21.058836273557972" ], [ "when they attempt to publish a summary of their review as an article in Wikipedia, where they may find that skeptical editors revert their submission on the logic that it seems to be ‘Original Research'.", "-21.05523520184215" ], [ "viewed as invading younger people's privacy. \nUniversity of Regina professor Alec Couros suggests that instead of \"forcing\" student participation with their own digital platforms, professors should utilize methods like online forums.", "-21.05511815189675" ], [ "text to follow, then the majority of what will be discussed in class can be scrutinized and approved or disapproved. It also provides a guide by implication for teachers as to the tone and content of course lessons. Using only the Bible makes inadvertent or intentional Constitutional violations much more likely, since the class content is predominantly lectures by the teacher. Given that the curriculum has a sectarian nature and promotes religious viewpoints, the fact that the Bible serves as the only text makes the effect of the advancement of religion even more likely. It is possible, as well, that", "-21.03104609955335" ], [ "at the university is Professor, i.e. \"full Professor.\" In Norway, the title \"Professor,\" which is protected by law, is only used for full professors. Prior to 1990, all professors were appointed for life to their chairs by the King-in-Council, i.e. by the King upon the advice of the Cabinet. The position below Professor was historically Docent (translated as Reader in a UK context and Professor in an American context). In 1985, all Docents became full professors. The most common positions below that are førsteamanuensis (translated as Associate Professor), and amanuensis or universitetslektor (translated as Lecturer or Assistant Professor). At the", "-21.03056781954365" ], [ "In August 2000 Nupedia had more than 60 academics contributing to the peer-review process on the site, most with doctorates in philosophy or medicine. Scholars wishing to contribute to Nupedia were required to submit their credentials via fax for verification. At that time, Bomis was attempting to obtain advertising revenue for Nupedia and the company was optimistic that it could fund the project with ad space on Nupedia.com.\nWikipedia began as a feature of Nupedia.com on January 15, 2001, later known as Wikipedia Day. Someone working from the office.bomis.com server created the first ever edit to the website, the creation of", "-21.019625697488664" ], [ "thinkers in the world everywhere. Every university and research institution should be feeding it. Every fresh mind should be brought into contact with its standing editorial organisation. And on the other hand its contents would be the standard source of material for the instructional side of school and college work, for the verification of facts and the testing of statements—everywhere in the world. Even journalists would deign to use it; even newspaper proprietors might be made to respect it.\nSuch an encyclopedia would be akin to a secular bible. Universal acceptance would be possible due to the underlying similarity of human", "-21.007777132443152" ], [ "by creating a textbook incorporating contributions from many academics with different points of view that was \"humbler, more empirical and more topical\". Professor Carlin wrote that students \"are embarrassed when they are no more able to explain the eurozone crisis or persistent unemployment than their fellow students in engineering or archaeology\", and that CORE would ensure that \"digital technology and interactive teaching methods will introduce students to an empirical discipline. They will learn to use evidence from history, experiments and other data sources to test competing explanations and policies.\" Course material CORE's courses are offered through open access online ebooks", "-21.00384106545971" ], [ "academic libraries has broadened to encompass a full range of ideas, problems, and opportunities faced by scholarly publishers, vendors, and libraries and the advancement, sharing, and preservation of knowledge. Topics such as copyright and compliance, standards, communication, digital rights, networking, technology advances, budgets, and archiving are germane to everyone in the information profession.\nWhen Katina began the conference, she had two caveats. First, she did not want concurrent sessions; she wanted everyone to hear the same paper at the same time and react to its content as a community. Second, she did not want exhibits as she felt the Conference should", "-21.00231949052977" ], [ "a master's student at the University of Michigan.\nIn September 2013, the National Archives and Records Administration became the first organisation to employ a permanent full-time Wikipedian in residence when it hired Dominic McDevitt-Parks to join its Office of Innovation in that capacity.\nIn March 2014, Harvard University posted a job listing seeking applicants to be their Wikipedian in residence at the Houghton Library.\nIn October 2014, the University of Victoria Libraries announced that in collaboration with the Electronic Textual Cultures Lab (ETCL) and the Federation for the Humanities and Social Sciences that Christian Vandendorpe had been named honorary resident Wikipedian in residence", "-20.99018723255722" ], [ "review often applied to books and chapters in edited books means that their status is also second-tier, unless an author's personal standing is so high that prior achievement and a continued stake in one's reputation within the scientific community signals a clear expectation of quality.\nThe emergence of institutional digital repositories where scholars can post their work as it is submitted to a print-based journal has taken formal peer review into a state of flux. Though publicizing a preprint online does not prevent it from being peer reviewed, it does allow an unreviewed copy to be widely circulated. On the positive", "-20.986010868364247" ], [ "one reason or the other. The same also applies to some extremely productive young academics that have not attained the right longevity for appointment as professors. Many people from outside of the university fraternity might also just refer to any long serving academic staff as professor. All these are usually acceptable without any question.\nMany people rightly argue that professorial appointments should not be based on longevity, loyalty or sheer availability of vacancies to be filled, but rather on prowess as evidenced by ground breaking research, teaching and outreach. Professorship should not be a reward for loyalty. Whatever the criteria", "-20.983082041027956" ], [ "a course in a much different way than expert teachers, and teachers may not understand the conceptual divide between them and their students. Novice students may perceive the contents of lectures and textbooks as large amounts of information, rather than as meaningful concepts, in contrast to experts, who can naturally see the materials as coherent and meaningful, due to years of mastery. Those who rely on traditional teacher-centered methods such as pure lecture may inadvertently subject students to an information dump, or fail to connect with students at a conceptual level, leaving students unable to learn or retain information", "-20.95292224222794" ], [ "quality of the scientific study itself. Yet many international universities require publication in these high-impact journals by both their students and faculty. One way that some international authors are beginning to overcome this problem is by contracting with freelance medical copy editors who are native speakers of English and specialize in ESL (English as a second language) editing to polish their manuscripts' English to a level that high-impact journals will accept. Peer review Though peer review and the learned journal format are not themselves an essential part of scientific literature, they are both convenient ways of ensuring that the above", "-20.950255029823893" ], [ "do not entitle the bearer to claim to have any specific academic or professional qualifications, as far as the Spanish authorities are concerned. However, there may be private agreements to recognize the titles.\nUniversities offering non-official study programmes are legally bound to clearly differentiate between officially approved and non-officially approved qualifications when naming their offer of non-official qualifications. Non-accredited master's degrees will be described as \"Master\" on its own, without the term \"Universitario\".\nCertain non-officially approved and accredited study programmes may acquire a well deserved reputation. However, neither Professional Association, Government Agencies, Judiciary Authorities, nor Universities -other than the study programme provider-", "-20.94688059668988" ], [ "own area of expertise. For example, the University of Pittsburgh library publishing service publishes peer-reviewed journals and also collaborates with the university press to publish open access monographs.\nSoftware is available to manage the journal publication process. The open source Open Journal Systems by the Public Knowledge Project, and Digital Commons' bepress, are both widely used by library publishing services. Some libraries use Open Journal Systems to create overlay journals which present scholarly content that is held in an institutional repository. History Library publishing has a long history and has been around since before the Internet.\nIn 1990, academic libraries published two", "-20.946108638774604" ], [ "or looking at another student's paper during an exam, copying homework from one another, or copying from a book, article or media without properly citing the source. Individuals can be dishonest due to lack of time management skills, pursuit for better grades, cultural behavior or a misunderstanding of plagiarism.\nOnline classroom environments are no exception to the possibility of academic dishonesty. It can easily be seen from a student's perspective as an easy passing grade. Proper assignments types, meetings and projects can prevent academic dishonesty in the online classroom. However, online assessment may provide additional possibilities for cheating, such as", "-20.93887576754787" ], [ "the responsibility of protecting both teacher and student from being forced to deny truth that has been discovered or to assert claims that have not been established in the discipline.\"\nThe university specifically provides that \"theologians\" in the university are \"expected to give assent to the teachings of the magisterium in keeping with the various degrees of assent that are called for by authoritative teaching.\" The Catholic University of America does not offer general studies in theology. Instead it offers doctorates in historical theology and systematic theology, the latter of which \"undertakes the task of a comprehensive and synthetic understanding of", "-20.938353648176417" ], [ "Humanities and social science academic journals are usually subsidized by universities or professional organization. New developments The Internet has revolutionized the production of, and access to, academic journals, with their contents available online via services subscribed to by academic libraries. Individual articles are subject-indexed in databases such as Google Scholar. Some of the smallest, most specialized journals are prepared in-house, by an academic department, and published only online – such form of publication has sometimes been in the blog format though some, like the open access journal Internet Archaeology, use the medium to embed searchable datasets, 3D models, and interactive", "-20.93356698716525" ], [ "exclusively of full professors, mostly on their published original research as well on teaching and administrative duties. In the past, this required a higher doctorate (\"state doctorate\"). In some fields, such as law, management (gestion), and economics, candidates take the competitive examination known as agrégation; only those achieving the highest grades are appointed.\nNote that in French, the word professeur is used much more widely than the English \"professor\", and when used on its own it suggests a schoolteacher in secondary education. Qualified terms such as professeur des universités are therefore used to clarify the function of the professeur.\nIn higher educational", "-20.91768502560444" ] ]
3nxipf
why did cars used to have their engines in the back, then with more modern cars the engine was moved to the front, then with some sports cars the engine is in the back again?
[ "Most of the high end sports cars put the engine behind the driver, but ahead of the rear axle for better weight distribution. These are considered mid-engined cars. A car with 50/50 weight distribution front to back will be more stable, easier to control and faster through curves.", "Few cars had the engine in the back, primarily VW bugs. The original cars had them in front with a hand crank to start them.", "With modern cars, it has to do with weight distribution, the rear wheels get better traction when the most of the weight is over them. Back in the day, I'm pretty sure the main reason was to make the engine as close to the wheels as possible, to make everything simple and less likely to break", "The main reason is that the engine is probably the heaviest part of your car. Having it up front puts that weight over the two front wheels. These are important because they steer and do most of your breaking. For that they need traction. So having a lot of your weight on top of them keeps them on the road where they do the most good. Front wheel drive cars also use this force to stick to the ground while accellerating and rear wheel drive cars use it to counter balance the torque your rear wheels create with hard acceleration. Your front end actually wants to flip up if your engine is strong enough. Another point is that front engines are easier (cheaper) to cool because you have all that air you're driving through going against the front of your car. So no pipes or protrusions on the car. Just a nice simple grill with a radiator behind it. Rear engines in older cars are made mostly to be cheaper by not having a long drive train to your rear wheels. In sports cars and racing, the engine is placed so as to best balance the car for the race it's doing. Generally if you have your weight evenly on all four tires, your car races better.", "It should be considered that cars had engines in various places throughout history. I'm pretty sure the original Benz motor car was in the back, but that was probably to simplify the drive train. The model T, Model A, a whole host of WW1 era cars and trucks all had their engines in the front. The original Volks Wagen (which became the Beetle) had the engine in the rear because it made for a more compact, roomier interior, where the antiquated engine technology of the day could spew fumes and oil out the back instead of all over the passengers. As many have noted ad nauseum, you get much better weight balance if the engine is as close to the center of the wheelbase as possible, because it's the heaviest component. When it comes to designing a car, everything's about compromise. You can't make a monster truck take a corner at 70MPH, but you can't make a Ferrari climb over another car; you can't expect a Toyota Camry accelerate 0-60mph in 1.5 seconds, but you're not going to find a top fuel dragster that can go 100,000 miles and be frugal.", "The very early cars had rear engines and chain drive (1902 Oldsmobile, for example). Most of them used rear-drive, front-steer because it was more stable and simple. They started switching to front-engine, rear drive pretty quickly for several reasons. The drive shaft design was safer, sturdier, quieter than the chain drive. Liquid cooling needed a front mounted radiator. The more sophisticated transmissions needed more space. Maybe most importantly, front engines open up cargo space in the back. Some sports cars use a rear engine (behind the rear wheels, mostly just Porsche 911), or mid-engine (between the front and rear hubs) both to get the weight distribution closer to 50/50 and to reduce the polar moment of inertia. Having the engine close to the center of the car helps it rotate better." ]
[ [ "engine.\nThe size of the engine gave the car a centre of gravity that was not just rearward but higher than other cars, due to the height of the upper crankshaft above the ground and the need to have the entire engine raised slightly to make room for the lower set of exhausts which left the engine from underneath the car. 1966 championship season The first outing for the P83 came at the first race of 1966 in Monaco, Stewart trying out the car in practise before driving a P261 to victory in the race. In Belgium both Hill and Stewart", "-38.807955055031925" ], [ "front engine before being geared back together to drive the rear prop. This layout resulted in a rather large gearbox on the front of the engine, and the front engine needing an extended shaft to \"clear\" the gearbox.\nWith no common crankshaft it became more practical for all of the accessories to be powered by one engine alone, in this case the rear engine. The supercharger itself used up several hundred horsepower, so the rear propeller delivered considerably less power than the front one.\nThe 803 had two valves per cylinder and overhead camshafts. Displacing 83.6 litres, and using the same 156", "-38.304600776638836" ], [ "claimed the rear-engine cars were for drivers who liked to be pushed around, though as Brabham said \"It started the rear-engined revolution at Indy\".\nA. J. Foyt, who had won his first 500 in 1961, won the 1964 Indianapolis 500, which was the last ever win for a front-engine car, and since Jim Clark's win driving the rear-engine Lotus 38 in 1965, every winner has driven a rear-engine car. Graham Hill won the following year in his first attempt, eventually becoming the only driver to date to achieve auto racing's \"Triple Crown of Motorsport\" of winning the Monaco Grand Prix, Indianapolis", "-38.14751138037536" ], [ "engine directly in front of the transmission, with a transfer case providing power to the front wheels installed directly below the engine. Because assembly was almost by hand, minor changes were made to various aspects of the car as the need arose, with the early prototype two-door enclosed sedan evolving into a roadster. While some vehicles over time had body changes, many of the production cars were not installed with doors, and the canvas roof for the two-door and four-door vehicles aided in reducing overall weight and adding flexibility to conditions in the field.", "-37.699114694376476" ], [ "by packaging the differential in front of the clutch, allowing the axle line to be further forward in relation to the rear face of the engine block. Front-engine transversely mounted / Front-wheel drive The first popular transverse engined FWD cars were the DKW 'Front' made from 1931, which had a twin cylinder two-stroke engine. \nSaab copied this design on their first car, the 1949 Saab 92. The Trabant in 1957 was also one of the only cars to have a transverse mounted engine, being a sort of DKW successor. This was a novelty, especially for a car being", "-37.688783468009206" ], [ "in 1955, they really had not become aware of the benefits of having the engine behind the driver. Based on the 500-cc cars and powered by a modified Coventry Climax fire-pump engine, these cars were called \"Bobtails\". With the center of gravity closer to the middle of the car, they found it was less liable to spins and much more effective at putting the power down to the road, so they decided to build a single-seater version and began entering it in Formula 2 races. Rear-engined revolution Jack Brabham raised some eyebrows when he took sixth place at the 1957", "-37.6420744555071" ], [ "located further back in the engine bay, as close to the firewall as possible.\nSince the 1990s, all-wheel drive has become more common in sports cars. All-wheel drive offers increased traction, although the downside is the added mass of the extra drivetrain components. Examples of all-wheel drive sports cars are the Lamborghini Huracan, Bugatti Veyron and Nissan GT-R.\nRear engine layouts are not commonly used for sports cars, with the notable exception of the Porsche 911.\nAlthough front-wheel drive with the engine at the front (FF layout) is the most common layout for cars in general, it is not as common amongst sports", "-37.527978826954495" ], [ "is longitudinally mounted and the front of the engine also points \nto the front of the car. In front-wheel drive cars with a transverse engine, the front of the engine usually points towards \nthe right-hand side of the car. One notable exception is Honda, where many models have the front of the engine at the left-hand side of the car.\nIn front-wheel-drive cars with longitudinally mounted engines, most often the front of the engine will point towards\nthe front of the car, but some manufacturers (Saab, Citroën, Renault) have at times placed the engine 'backwards', \nwith #1 towards the firewall. One notable", "-37.34702133175597" ], [ "the engine in the rear represented a significant innovation, reducing mechanical losses, noise, and weight of a long drive shaft and exhaust running between a front engine and the rear drive and tailpipe. Bus manufacturers in Germany and the United Kingdom would not perfect rear-engine models until the 1950s. Customers did not always prefer rear-engined designs, noting that front engines were easier to access, and placed engine noise and vibration away from passengers and sometimes outside the coach body. Eventually, the 700 series included both front- and rear-engined models.\nIn 1934, Dwight Austin, patent-holder on an innovative rear-drive system,", "-37.33821648755111" ], [ "Mid-engine design History The mid-engine, rear-wheel drive format can be considered the original layout of automobiles. A 1901 Autocar was the first gasoline-powered automobile to use a drive shaft and placed the engine under the seat. This pioneering vehicle is now in the collection of the Smithsonian Institution. Benefits Mounting the engine in the middle instead of the front of the vehicle puts more weight over the rear tires, so they have more traction and provide more assistance to the front tires in braking the vehicle, with less chance of rear-wheel lockup and less chance of a skid or spin", "-37.212167424302606" ], [ "as Alfa Romeo, Lancia, Porsche (944, 924, 928) and Chevrolet (C5 and C6 Corvettes), place the engine at the front of the car and the transmission at the rear of the car, in order to provide a more balanced weight distribution. This configuration is often referred to as a transaxle since the transmission and axle are one unit. 1890s to 1960s Many of the cars built in the 19th century were rear-wheel drive, often with the engine mounted at the rear of the car. The first rear-wheel drive car with the engine mounted at the front was an 1895 Panhard", "-37.13626961468253" ], [ "Front-engine, front-wheel-drive layout Usage implications Historically, this designation was used regardless of whether the entire engine was behind the front axle line. In recent times, the manufacturers of some cars have added to the designation with the term front-mid which describes a car where the engine is in front of the passenger compartment but behind the front axle. Most pre-World War II front engine cars would qualify as front-mid engine, using the front-mid designation, or on the front axle.\nThis layout is the most traditional form, and remains a popular, practical design. The engine which takes up a great deal of", "-37.11992110556457" ], [ "engine also found its way into the Matra 530 sports car.\nPower was transferred through a single dry plate clutch to the front wheels. The four-speed manual gear box featured synchromesh on all four ratios, and was controlled by means of a column-mounted lever. The universal joints necessary to combine power transmission with steering and suspension functions involved a combination of engineering and materials technologies which at the time was still regarded as \"leading edge\" although front-wheel drive applied to lighter cars with s lighter and less powerful engines had become mainstream in Germany over the three previous decades, following the", "-37.11889286607038" ], [ "mounted engines allow for more crumple zone area in a head-on collision. American auto manufacturers are now shifting larger models (such as the Chrysler 300 and most of the Cadillac lineup) back to rear-wheel drive. There were relatively few rear-wheel-drive cars marketed in North America by the early 1990s; Chrysler's car line-up was entirely front-wheel drive by 1990. GM followed suit in 1996 where its B-body line was phased out, where its sports cars (Camaro, Firebird, Corvette) were the only RWDs marketed; by the early 2000s, the Chevrolet Corvette and Cadillac Catera were the only RWD cars offered by General", "-37.104296648845775" ], [ "were quickly realized, and rapidly began to displace their front-engined counterparts in the starting field. In 1965 Jim Clark won in a rear-engined machine, and another front-engined car would never win again. By the end of the decade, the movement had swiftly taken over the sport, and in 1969, not a single front-engined car would qualify.\nIn 1965, ABC Sports carried the race for the first time on Wide World of Sports, ushering in a new era of television coverage at Indy.\nAfter a fiery fatal crash in 1964, USAC crafted rules to discourage, and eventually ban, the use of gasoline as", "-36.969591155531816" ], [ "engines were also common enhancements for modifying engines in the USA from the 1950s to mid-1960s, as well as during the following decade of high-performance muscle cars, each carburetor feeding different chambers of the engine's intake manifold.\nOlder engines used updraft carburetors, where the air enters from below the carburetor and exits through the top. This had the advantage of never flooding the engine, as any liquid fuel droplets would fall out of the carburetor instead of into the intake manifold; it also lent itself to use of an oil bath air cleaner, where a pool of oil below an element", "-36.9368352915626" ], [ "out from other British made front wheel drive cars. The N/S engine configuration allowed a lot of working space around the engine. The starter was repositioned to the front of the engine and although was a two-minute job to replace, it made the car extremely noisy during startup. It takes its place in history as being the only production car made in Britain to begin life as a front-wheel drive, and end it as a rear-wheel drive until Leyland's successor, MG Rover, repeated the trick in turning the Rover 75 into the MG ZT 260. The Achilles heel of", "-36.7088188896887" ], [ "rear collisions. In the case of the 911, the rear-mounted engine allows for increased practicality in the form of a small rear row of seats that would be impossible with a mid-engined sports car. Disadvantages Excessive weight that is concentrated outside of the wheelbase can interfere with accurate negotiation of corners at high speed. The rear-engined Porsche 911, with its engine far in the rear, was notorious for dangerous oversteer in its early days, and cars with engines far in the front often suffered from the opposite problem of understeer, for which many old American cars with heavy", "-36.63793211422524" ], [ "are extracted. Chassis The engine was suspended in the conventional location at the front of the car at a slight angle to allow straight drive to the rear axle, and with the cylinders lying between the frames of the chassis. The mountings above the engine allowed it to rock sideways to some extent, this being limited by a pair of helical springs at the front and by diagonal radius rods connecting the rear of the gearbox to the ends of the rear axle. In this way the mechanical vibration of the engine and transmission was largely isolated from the chassis", "-36.616313581122085" ], [ "not feature a front-engine roadster.\n1968 - Lotus introduces its turbine-powered Lotus 56, while the turbocharged Offenhauser engine is still being used in many Indy rear-engined cars. Jim Hurtubise qualifies a front-engine roadster for the roadster's last time in Indy history.\n1969 - With the turbine-powered cars and front-engined roadsters completely gone, the Indy cars have two choices for engines, both turbocharged: Offenhauser and Ford. However, the Ford engine suffered from high temperatures during racing, qualifying, and practice so most drivers stuck with the turbocharged Offenhauser. Also, the Indy cars now gain aerodynamic enhancements to improve grip and speed.\n1970 - Offenhauser and", "-36.575850818546314" ], [ "underside of the car to create low pressure regions and thus additional downforce. Previously, teams running Ferrari and Alfa-Romeo flat-12 engines had enjoyed a handling advantage due to the low centre of gravity in such a configuration. However, for ground effect, the wide engine was completely the opposite of what was required as the cylinder heads protruded into the area where the Venturi tunnels should have been. In contrast, the V-configuration of the Cosworth engine angled the cylinders upwards and left ample space under the car for the necessary under-body profile which massively increased downforce and gave more efficient aero", "-36.37809918628773" ], [ "car (known as the \"Heck\", the German automotive term for \"back\" or \"rear\"), a design feature which became standard in Formula One in the early 1960s after later success by the Cooper team.\nIn the 1960s, the Formula One German Grand Prix was often held concurrently with a Formula Two race on the same circuit, allowing BMW F2 cars to take part. In 1967, BMW entered Hubert Hahne in a Lola F2 chassis powered by an enlarged BMW engine which meant that it conformed with the Formula One regulations, while David Hobbs was entered by Lola in the same combination with", "-36.35822966406704" ], [ "to transfer power to the rear wheels means a large centre tunnel between the rear seats; therefore, cars such as the Mazda RX8 and the Porsche Panamera forgo a centre rear seat, and divide both seats by a centre tunnel.\nCurrently most cars are FF, including all front-engined economy cars, though FR cars are making a return as an alternative to large sport-utility vehicles. In North America, GM returned to production of FR-based luxury vehicles with the 2003 Cadillac CTS. As of 2012, all but the SRX and XTS are FR-based vehicles. Chevrolet reintroduced the FR-based Camaro in 2009, and", "-36.228906869422644" ], [ "off to the sides of the car with two mandatory pit stops to avoid such a tragic crash. The tanks were smaller in size compared to years previous. Only a handful of front-engine roadsters remains as the rear-engine cars keep dominating the circuit. The fuel change would not happen again in Indy history until 2005 when the fuel was changed to ethanol, which is what the Indy cars run on today.\n1966 - With Bobby Grim remaining as one of the final front-engine roadster drivers, the rear-engine cars also gain a few drivers from Europe such as Jim Clark, Sir Jackie", "-36.205272222459826" ], [ "the engine and rear axle.\nThe rear position of the engine was favourable for air cooling, while the oil cooler, battery and spare wheel were positioned in the front of the car. The frameless body was characterized by its central structural member, which was firmly welded to the floor panels and which covered the linkage to the brakes, gearbox, etc.\nThe front of the car had a basically rectangular cross section and was rounded all the way to the floor. The front bumper covered the rounded fenders, while the lower halves of the lights were embedded in the bonnet. The rear of", "-36.12980571924709" ], [ "car, coupled to the chassis' hard suspension, created a tendency to make the car slide into corners before the ground effect pulled the car back on to the track. This had the undesired effects of exposing the drivers to even larger g-forces than the Williams FW07 or Brabham BT49 and making the car tend to overuse its tyres. The engine had massive turbo lag, followed by a steep power curve; this upset the balance of the chassis; although the engine was the most powerful engine that year, even more so than the Renault, which made it an annoying menace to", "-36.075933840998914" ], [ "American V8 engine.\nThe coachwork, designed by John Frayling and made by FRP, had its own features such as reduced overhangs, Kamm-tail, roof-integrated engine air intake and special doors which extended into the roof to give the drivers greater access to the cockpit once they were open, an idea that was kept on the car's successor, the Ford GT40. Racing history The prototype car (chassis LGT-P) was shown to the public in January 1963 at the UK Olympia Racing Car Show, making a big success and provoking great expectations, and during the following months South African Tony Maggs raced it at", "-35.97935008897912" ], [ "axle the engine could be mounted further forward and particular care was taken to mount it so as to minimise noise and vibration to the passengers.\nThe engine displaced 4¼-litres (4257 cc/259 in³) with an 88.9 mm (3.5 in) bore and 114.3 mm (4.5 in) stroke. Gearbox Syncromesh was provided on all ratios but first and reverse. Previously it had been provided on just third and fourth speeds. This proved a very welcome refinement adding greatly to the pleasure of driving the car. The gear change lever was moved backwards closer to the driver by the seat squab, cutting back on the chances of finding cold steel", "-35.88375543660368" ], [ "theory, this would improve fuel vaporization, and the new engine was more powerful. However, the new system made the cylinder head, and the rider's inseam, very hot. This, along with an exhaust valvetrain that required frequent adjustment, caused sales to drop. The addition of dual carburetors in 1937 did not revive interest. The design was returned to the original configuration in 1938.\nFor 1940, the Four frame was modified to include plunger rear suspension. In the same year, all Indian models were restyled with large, decorative fenders. In 1941, the 18-inch wheels of previous models were replaced", "-35.71480143873487" ], [ "car, much like the Auto Union Grand Prix cars of the 1930s. These cars were considerably lighter, faster and easier to drive than their front-engined predecessors, and it became obvious that rear-mid-engined cars were the way to go in purpose-built automobile racing. But this new type of cars had not been driven at Spa before, so no one knew how they would perform there. The high-speed bends at Spa were now much faster with these new cars – and in those days, the cars or circuits for that matter had absolutely no safety features of any kind. The cylinder-shaped bodywork", "-35.68946389863686" ], [ "rather than using the engine oil. The radiator was mounted at the left side of the car so that the engine-mounted fan could be retained, but with reversed pitch so that it blew air into the natural low pressure area under the front wing. This location saved vehicle length, but had the disadvantage of feeding the radiator with air that had been heated by passing over the engine. It also exposed the entire ignition system to the direct entry of rainwater through the grille. Early prototypes used the existing 948-cc A-Series unit, but this provided the ADO15 with performance far", "-35.666275065625086" ], [ "found in a two-stroke engine. Beginning with the power stroke, the four-stroke engine operated normally until the piston was just about to reach the bottom of its stroke (bottom dead center, or BDC), when the exhaust valve was opened \"early\". This let the still-hot burnt combustion gases \"pop\" out of the engine while the piston was still moving down, relieving exhaust pressure and preventing exhaust gases from entering the crankcase. After a small additional amount of travel, the piston uncovered 36 small ports around the base of the cylinder, leading to the crankcase which held additional fuel–air mixture (the charge).", "-35.53886575414799" ], [ "contemporary aircraft industry practice. The cars were rear-engined with twin radiators. The first car used an Alvis front-wheel-drive chassis effectively turned back-to-front but adapted so the new front wheels steered. Later cars used Beverley straight 8, Lycoming and Armstrong Siddeley engines. Body The streamlined bodywork is very long at just under 20 feet (6.1 m). The spare wheel was carried inside one of the rear doors which must have put an enormous strain on the hinges and door pillar. The equivalent space in the opposite door was occupied either by a second spare wheel or a cocktail cabinet. The", "-35.47586985304952" ], [ "the Ford's design, also brought the car into modern times. The new trucks continued with the old grille. Other major changes for 1936 were the use of pressed steel \"artillery\" solid wheels instead of wire wheels. 1938 In 1938, Ford announced new styling for its cars. Only a V8 was offered, either a 60 hp (45 kW) V8 or an 85 hp (63 kW) V8. A new dash was used, with recessed controls for safety.", "-35.420450885081664" ], [ "These engines typically use the forward piston to control both intake and exhaust ports, with the interesting result that the carburettor is at the front of the engine, under and to the side of the exhaust. The rear piston controls the transfer port from the crankcase to the cylinder. Increasingly, these models were fitted with an oil mixing pump, fed from a reservoir incorporated in the petrol tank. Some also have a twin-spark plug ignition system firing an almost figure-eight shaped combustion chamber. The improvements tamed, if not virtually eliminated, the previous problem of two-stroke plug fouling. A total of", "-35.409242258174345" ], [ "on one occasion the Ford V8 engine overheated but this was shown to have been caused by using an outdated cooling system that the Ford company had already replaced on its production lines; subsequently the newer version was installed. A minor negative point was that the exhaust pipe had been fitted on the bottom and easily was damaged in terrain. Nevertheless the commission, clearly impressed by the general performance and the modern exterior, already on 9 September judged the type to be \"very acceptable\".\nOn some points however, the commission was still dissatisfied. Firstly, it insisted on a front-wheel drive. As", "-35.39689650305081" ], [ "leaf springs. The engine, clutch, transmission, radiator and front suspension were all supported by an additional subframe. Body Light van designs placing the driver and the engine together at the front of a relatively flat fronted cab had been pioneered in France by Citroën in 1939 with a design that incorporated front wheel drive. Eleven years and one world war later Volkswagen had launched a flat fronted rear wheel drive light van with the engine at the back. By placing the engine at the same end of the vehicle as the driving wheels, both", "-35.393579864525236" ], [ "was effectively two engines in horizontally opposed configuration (\"flat twelve\") on a common crankshaft. There were four Solex carburettors each on a separate manifold that fed three cylinders formed as a single cylinder head. The elements of the engine and ancillary components were laid out so they could be reached for maintenance through the engine deck covers. Air for the engine was drawn from the fighting compartment through air cleaners. Cooling air was drawn into the engine compartment through louvres on the sides, across the radiators and through the engine compartment by a fan driven by the clutch. This fan", "-35.37773297784588" ], [ "front-wheel drive power train, in what was a relatively light weight car. Setting the engine further back in relation to the front wheels would have involved a level of re-engineering for which neither time nor money were available. The decision was therefore taken to switch to a rear wheel drive configuration. The late decision led to issues with the gear box, however, which could not be redesigned at this stage and was simply switched round to allow for the fact that the drive shaft pointed in the opposite direction to that previously envisaged.", "-35.36999577091774" ], [ "(especially on 5 cylinder variants) that the radiator often had to be offset to halfway down one side of the engine bay. One advantage of this technique is that the engine is one of the first things to be struck in a frontal impact, taking much of the force, and allowing for high responsiveness of the procon-ten system.\nThe procon-ten system was available for cars such as the 100 / 200 and the V8, as well as the 80 / 90. It was discontinued in 1994, with the introduction of the new A4 and A8 series, and the 100-based", "-35.34687842999119" ], [ "cars were shipped out the same way.\nThe British cars had right-hand drive with the door hinged from the right hand side of the car and the steering column moved across to the right as well. Right-hand drive meant that both the driver and the engine were on the same side, so a 27 kg (60 lb) counterweight was added to the left side to compensate. Dunlop tyres were used, and Lucas electrics replaced the German Hella and Bosch components, with a different headlamp housing being used. Girling brake components replaced the ATE brake parts.\nThe Isetta was not popular in the UK until", "-35.30143252376001" ], [ "engine was a much smaller Chrysler-supplied 360 cubic inch (5.9 litre) which used more modern controls to reduce emissions comparatively and still producing about 250bhp. In addition, the interior was slightly re-designed with the addition of modern \"sports\" front seats as opposed to the armchair style of the earlier models, as well as a revised dashboard and electronics.\nThe then owner sold up in 1990 to an engineering company believed to be in a stronger position to manufacture the car; this lasted until 1993 with approximately 36 cars built, and while work commenced on development of a much modern Interceptor Series", "-35.286717994825494" ], [ "car's height, which in turn required the use of a flat floor. That led to putting the engine in the rear of the car, directly above the driven axle. Subsequently there was no need for a floor tunnel with a drive shaft and exhaust pipes, which contributed to a reduction in weight. As the designers wanted to reduce the rolling resistance, they did their best to produce an engine as light as possible: an air-cooled V8 with a crank case made from elektron, a magnesium alloy. The gearbox was also made from elektron, and it was positioned in front of", "-35.268345978460275" ], [ "the engine is in the back), just below the radiator. Engines Because of the engine placement, a T3 has nearly equal 50/50 weight distribution fore and aft. The early air-cooled engines were somewhat expensive to produce and had some reliability problems. Volkswagen originally meant to replace them with the Golf's inline-four engine but the cost of re engineering both car and engine made them opt for updating the flat-four instead. An overhead-cam design was mooted but rejected as willingness to rev was considered to be of less importance than low-end flexibility and low cost. The new 1.9 L \"Wasserboxer\" (for", "-35.23422681854572" ], [ "stroke before the next piston starts a new power stroke, resulting in a pause between each power stroke and a pulsating delivery of power. In engines with more cylinders, the power strokes overlap, which gives them a smoother delivery of power and less torsional vibration than a four can achieve. As a result, five-, six-, eight-, ten- and twelve-cylinder engines are generally used in more luxurious and expensive cars. Advantages Four-cylinder engines, often derided as \"four-bangers\", do offer some advantages: an alloy block inline-four is usually small, compact and lightweight, which decreases overall vehicle mass, usually resulting in an increase", "-35.22156588220969" ], [ "Rear-engine, front-wheel-drive layout A rear-engine, front-wheel-drive layout is one in which the engine is between or behind the rear wheels, and drives the front wheels via a driveshaft, the complete reverse of a conventional front-engine, rear-wheel-drive vehicle layout.\nThe earliest example of the form appeared in 1932, with the design and construction of the prototype Maroon Car by chief designer Harleigh Holmes at Coleman Motors, an established builder of Front- and All-Wheel-Drive vehicles based in Littleton, Colorado. The car had front-wheel drive and was powered by a rear-mounted V-8 engine. Only one was built and the vehicle was never placed", "-35.212902745988686" ], [ "massive torque steer, resulting in difficulty in keeping the car in a straight line. The rear engine contributed to unloading of the front wheels, which in turn caused the front engine to overspeed. Visibility was poor as well due to tire smoke from both ends of the car. This coupled with engine oil spray out of the valve cover breathers because of the pressure of the superchargers.\nA second Hurst Hairy Olds was built in 1967, but was wrecked during an exhibition race in Niagara, New York.\nThe 1967 car was the subject of one of the most popular", "-35.19886446543387" ], [ "of split-single engines from 1905-1939 used a single Y-shaped or V-shaped connecting rod. Externally, these engines appeared very similar to a conventional single-cylinder two-stroke engine; they had one exhaust, one carburettor in the usual place behind the cylinders and one spark plug.\nAfter World War II, more sophisticated internal mechanisms improved mechanical reliability and led to the carburetor being placed in front of the barrel, tucked under and to the side of the exhaust. An example of this arrangement was used on the 1953-1969 Puch 250 SGS.\nEarly engines using a \"side-by-side\" layout (with the carburettor in the \"normal\" place behind the", "-35.196641479211394" ], [ "engine power had reduced as a result of either downsizing to six-cylinder engines or detuning the V8 engines in order to comply with increasingly strict vehicle emissions standards. Along with the reduced straight-line performance, the cars also had poor fuel economy and were battling against the industry trend towards smaller cars.\nThe Chrysler Cordoba (second generation) debuted for 1980 and sales fell substantially. It was discontinued in 1983. The 1980 Imperial (sixth generation), which was built on the Cordoba chassis and marked a key milestone in the decline of the personal luxury car. The 318 cu in (5.2 L) V8 engine produced only 140 hp", "-35.17723296768963" ], [ "Glas Isar Origins The car that appeared at the 1957 Frankfurt Motor Show was a prototype which in the event differed significantly from the car that entered production the next year, in that it used front wheel drive. In most other respects, notably regarding the two cylinder boxer engine and the overall shape of the car, only minor stylistic changes differentiated the cars that went into production in 1958 from the 1957 prototypes.\nThe front wheel drive prototype was unstable, however, because of the way the engine was set far ahead of the front axle, and high above the", "-35.17193245224189" ], [ "reminded one of a Victorian era davenport (sofa).\nBecause of the car's unibody construction, passengers rode within the frame of the car, not on top of the frame as they did with most other American makes. It also boasted a stiffer body and better weight distribution through the engine placement over the front wheels, in contrast to the common practice of placing the center of the engine's gravity just behind the front wheels. The automotive press gave the cars positive reviews for their handling and acceleration. Marketing failure DeSoto (and Chrysler) touted all of its Airflow bodies as \"futuristic\" in an", "-35.16866752534406" ], [ "freedom in most areas of the car, therefore the engineers were able to make changes to the car they couldn't do to the older Group A Lancers. These changes included modifications to the engine and its surroundings (lighter internal parts, more rearward tilt to optimize the front weight distribution, new turbo and new exhaust system), but the most significant change was made to the suspensions: now both the front and rear suspensions were MacPhersons, and also bigger wheel arches were implanted, allowing more suspension travel. However, the drivetrain remained the same as before, and when Tommi Mäkinen left the team", "-35.126647331169806" ], [ "The decade which followed became known as the vintage era and featured rapid technical advances over the preceding Brass Era cars. Engine performance benefited from the abandonment of \"tax horsepower\" (where vehicles were taxed based on bore and number of cylinders, rather than actual power output) and the introduction of leaded fuel, which increased power by allowing for higher compression ratios.\nIn the early 1920s, the cost to produce a racing car was not significantly higher than a road car, therefore several manufacturers used the design from the current year's racing car for the next year's sports car. For example, the", "-35.07903652037203" ], [ "increase aerodynamic drag. The driver's seat was moved closer to the center of the car. The change most notable to fans was the addition of a rear wing replacing the familiar spoiler. The wings could be adjusted between 0 and 16 degrees and used with multiple configurations of end plates.\nThe new rules eliminate the asymmetrical bodies on cars, which had run rampant since the 1998 Taurus release. However, almost all advantages of using one car over another have been nullified. NASCAR requires all CoTs to conform to common body templates, regardless of make and model.\nThe rear wing remained a controversial", "-35.05238997365814" ], [ "version driven by a complex series of clutches running from the engine to a large single fan at the back of the car. Therefore, the faster the engine ran, the stronger the suction effect. Like the Lotus, it had sliding \"skirts\" that sealed the gap between the sides of the cars and the ground. These prevented excessive air from being sucked into the low pressure area under the car and dissipating the ground effect. There was a rule banning \"moveable aerodynamic devices\", but the fan also drew air through a horizontally mounted radiator over the engine. Using a fan to", "-35.038800127687864" ], [ "early 1960s to feature a full 33-car field of piston-powered, normally aspirated powerplants. The new engines were also much louder than their turbocharged counterparts, leading some fans and media to compare them to sound of NASCAR engines. Track changes The track was repaved in the fall of 1995. Following the 1996 Brickyard 400, the apexes of the four turns were breaking up. Over the offseason, track crews repaved the apexes of the turns with a different compound of asphalt. The result was a better surface, but a visibly darker area in the apexes of all four turns. Continuing split from", "-35.03672741330229" ], [ "during positive acceleration when the engine power is driving two or fewer wheels. In this situation where all the tires are not being utilized load transfer can be advantageous. As such, the most powerful cars are almost never front wheel drive, as the acceleration itself causes the front wheels' traction to decrease. This is why sports cars usually have either rear wheel drive or all wheel drive (and in the all wheel drive case, the power tends to be biased toward the rear wheels under normal conditions). Rollover If (lateral) load transfer reaches the tire loading on one", "-35.01155957800802" ], [ "high up due to the higher of the engine's two crankshafts being so high up in the car, as well as the need to raise the engine slightly to accommodate the exhausts from the lower set of cylinders. All this led to less than ideal handling characteristics for the car.\nOnly one example was built and it was entered in the last 5 Grands Prix of 1967 in the hands of Jackie Stewart, with Mike Spence driving the car in the first race of 1968. The car failed to finish any of these races due to various engine and transmission failures.", "-35.011489628013805" ], [ "July 2.\nThe extremely long profile of the new design meant that the crankshaft would be highly loaded if power was taken off at the propeller end. Chrysler's solution to this problem was unique; power was instead taken from the middle of the engine, placing the propeller reduction gear in a gap between two V-8 cylinder banks and sending power to the front of the engine via a long extension shaft running below the crankshaft. Additionally many of the accessories were driven off the drive shaft instead of the crank shaft. This solution also raised the weight of the engine by", "-34.99558683895157" ], [ "from the outside of the car on the right side to what would subsequently become a more conventional position in the middle of the floor. (The driver of a Benz 10/30 PS sat on the right side of the car, which at this time was still virtually universal in Europe.)\nFrom 1925 the brakes were rearranged, now operating on all four wheels rather than directly on the drive shaft.\nIn 1926 claimed maximum power from the 2,610 cc engine was increased to at 35 PS (26 kW; 35 hp) which necessarily triggered a name change, cars from this period being sold as", "-34.994589730747975" ], [ "growing displacements and compression ratios made this impractical. Communist bloc cars such as Ladas often still sported crank starting as late as the 1980s.\nFor the first examples of production German turbojet engines later in World War II, Norbert Riedel designed a small two-stroke, opposed-twin gasoline engine to start both the Junkers Jumo 004 and BMW 003 aircraft gas turbines as a form of auxiliary power unit to get the central spindle of each engine design rotating — these were usually installed at the very front of the turbojet, and were themselves started by a pull-rope to get them running during", "-34.95470346149523" ], [ "commonly used double overhead cam straight-eight engines. Other notable straight-eight-powered automobiles were built by Daimler, Mercedes-Benz, Isotta Fraschini, Alfa Romeo, Stutz, Stearns-Knight and Packard. One marketing feature of these engines was their impressive length — some of the Duesenberg engines were over 4 ft (1.2 m) long, resulting in the long hoods (bonnets) found on these automobiles. Premium automobiles in the United States In the United States in the 1920s, automobile manufacturers, including Chandler, Marmon, Gardner, and Auburn, began using straight-eight engines in cars targeted at the middle class. Engine manufacturer Lycoming built straight-eight engines for sale to automobile manufacturers, including Gardner,", "-34.952816392760724" ], [ "the engine car the cylinders were cast in pairs. Power transferred to the rear axle via a disc clutch and a steel drive-shaft. The car was designed for comfort, with suspension that used both laterally and longitudinally mounted leaf springs.\nWith the FN Typ 2000, the car also gained flexible engine mountings. This was followed by the Typ 2700 which, for the first time, was powered by engines designed and built by FN themselves.\nAutomobile production resumed after the First World War, and the Typ 2700a, now equipped with an electric starter, a tachometer and \"automatic\" chassis lubrication. The engine was constructed", "-34.95081381924683" ], [ "sedan with revised front end styling, as well as a return of displaying four Ventiports under the hood, a rear spoiler, projector beam fog lights, Magnasteer, larger brakes, and revised suspension tuning with standard Stabilitrak. \nPower came from the 5.3 L LS4 small-block V8 engine featuring Active Fuel Management technology, which is routed to the front wheels. The combination of a V8 and front-wheel drive are not often utilized due to torque steer which is present in any front-wheel-drive car. This powertrain was also found on the Grand Prix GXP, Impala SS, and Monte Carlo SS. The Super model was", "-34.94563109509181" ], [ "achieved with different cylinder heads. Low-compression cylinder heads such as the ones fitted to Ford Transits had shallow combustion chambers in them while high-compression heads were completely flat.\nTo counteract the engine vibration inherent in a 60° V4, Ford added a balance shaft to the Essex V4. In the related Essex V6 these vibrations were less pronounced, so the V6 did not have a balance shaft. Even with the balance shaft, and notwithstanding Ford's promoting the V4-equipped Corsair as \"The car that is seen and not heard\", reviewers of V4-powered cars frequently commented on the engine's lack of smoothness.\nFor the 1967", "-34.87527876533932" ], [ "the foot from the pedal allowed the roller to spring back from the flywheel, effectively providing \"neutral\" so the car could be cranked without moving forwards.\nThe engine was lubricated by an \"oiler\", essentially a tank mounted under the seat which had several adjustable drip feeds with separate lines to the engine bearings and other areas. All components of the transmission were exposed, so several bearings and pivots had to be oiled or greased manually from time to time.\nA form of differential action was obtained by building each front drive sprocket with a two-way clutch. These clutches engaged when the shaft", "-34.87174484471325" ], [ "the Mk III C's design. Automotive designer John Mills was hired by Robinson Racing to improve the aerodynamics of the team's car.\nAs part of Mills' design, the front end of the car was replaced with entirely new bodywork attempting to resolve two problems. The front radiator was removed and the bodywork opened to allow two wide channels on either side of a shallow nose. These channels fed cooling air into the sides of the car, where new radiators were now located. This not only gave the car better speed in a straight line, but also improved the cooling capabilities", "-34.84705744951498" ], [ "side-valve unit that had powered not merely its predecessor, but also its predecessor’s predecessor, the Ford Eifel of 1935.\nBy 1952 sidevalve engines were already seen as old fashioned. In an analysis undertaken of the models shown at the 1952 Paris Motor Show it was noted that 48 of the cars exhibited were fitted with engines employing overhead valves while only 6 featured sidevalve engines. That Ford were still powering their entry level Taunus P1 with a sidevalve engine ten years later, in 1962, would leave the model looking badly outclassed under the bonnet/hood. The body and running", "-34.81906058534514" ], [ "today. Other contenders include the 1949 Oldsmobile V8 engine, the first in a long line of such powerful V8 engines, as well as the Cadillac V8 of the same year.\nRegardless how it is credited, the horsepower race centered around the V8 engine and the muscle-car era lasted until new smog regulations forced dramatic changes in OEM engine design in the early 1970s. This in turn opened up new opportunities for aftermarket manufacturers like Edelbrock. Each year brought larger engines and/or increases in horsepower, providing a catalyst for customers to upgrade to newer models. Automobile executives also deliberately updated the body", "-34.81861071049934" ], [ "Front-engine, rear-wheel-drive layout Front mid-engine, rear-wheel-drive layout In automotive design, a front mid-engine, rear-wheel-drive layout (FMR) is one that places the engine in the front, with the rear wheels of vehicle being driven. In contrast to the front-engine, rear-wheel-drive layout (FR), the engine is pushed back far enough that its center of mass is to the rear of the front axle. This aids in weight distribution and reduces the moment of inertia, improving the vehicle's handling. The mechanical layout of an FMR is substantially the same as an FR car. Some models of the same vehicle can be classified as", "-34.791511383722536" ], [ "engine featured dry sump lubrication as its racing counterpart and bigger radiators.\nThe stiffer chassis and suspension system were a carryover from the race version. The car was lowered further than a standard M3 and featured additional strut braces between the firewall and strut towers as well as between the right shock towers. The redesigned front and rear fascias and the rear wing optimised aerodynamics.\nThe roof, the hood, the rear wing and front and rear fascias were made from carbon-fibre in order to reduce weight. Notable changes made to the interior included leather Recaro bucket seats, removal of rear seats and", "-34.78871548981988" ], [ "Company components. What made the car 'special' was its low-slung chassis, considered a remedy to the poor road-holding of small sports cars. The first cars used the 832 cc side-valve engine from the Triumph Super 7 fitted to an 84 inch wheelbase chassis bought in from Rubery Owen, semi-elliptic leaf springs all round, and the hydraulic brakes and axles from the Triumph. The top speed was only 65 mph (105 km/h), which was too slow for serious sporting events: so from 1933 a 1098 cc, overhead-inlet, side-exhaust, four-cylinder, Coventry Climax engine was offered, followed in 1934 by the 1476 cc six-cylinder version of the same", "-34.785462923231535" ], [ "engine was warm due to vapor locks. Also, very few people knew about direct injection, and the injection pumps needed frequent adjustment. Branded repair shops and Bosch services became overloaded, and many cars were converted to carburetor. These two-stroke engines were soon superseded by four-strokes.\nThe 1955 Mercedes-Benz 300SL is the first passenger car with a direct injected four-stroke Otto cycle engine. The Bosch fuel injectors were placed into the bores on the cylinder wall used by the spark plugs in other Mercedes-Benz six-cylinder engines (the spark plugs were relocated to the cylinder head). Later, more mainstream applications of fuel injection", "-34.78443784825504" ], [ "V6 engines and front-wheel-drive, but the NASCAR racers only kept the body shape, with the old V8 rear-wheel-drive running gear, rendering obsolete the \"stock\" nature of the cars. When the Ford Thunderbird was retired after 1997, without Ford having any two-door intermediate bodies, the four-door Ford Taurus body was used (although NASCAR racers actually have no opening doors).\nWhile the manufacturers and models of automobiles used in racing were named for production cars (Dodge Charger R/T, Chevrolet Impala SS, Toyota Camry, and the Ford Fusion), the similarities between NASCAR Cup Series cars and actual production cars were limited to a small", "-34.78394144237973" ], [ "wire wheels.\nMany cars were \"hopped up\" with engine modifications such as adding additional carburetors, high compression heads, and dual exhausts. Engine swaps were often done, with the objective of placing the most powerful engine in the lightest possible frame and body combination. The suspension was usually altered, initially by lowering the rear end as much as possible using lowering blocks on the rear springs. Later cars were given a rake job by either adding a dropped front axle or heating front coil springs to make the front end of the car much lower than the rear. Immediately postwar, most rods", "-34.78075657194131" ], [ "with budget-conscious motorists across Europe. The location of the radiator at the front of the car had the advantage of cooling the engine much more efficiently on the motorway. However, because it was much more complex than in the earlier models, the cooling system was very prone to airlocks, which often led to overheating and even head gasket failure. Success Rugged and robust vehicles, they were designed for the often poor quality roads of Soviet-dominated Central and Eastern Europe, where the best traction layout of a two-wheel drive car is a significant benefit. They were once a common sight in", "-34.76486850489164" ], [ "the middle 1960s, sidecar riders sought to achieve greater engine capacities and basic raw power. This included use of car engines and three-wheeled, car-type layouts driving a pair of front wheels.\nHe started to develop a new concept with a repositioned Rennsport BMW engine. Instead of a shaft driving the rear wheel, it would drive the front and sidecar wheels. The outfit was soon 'outlawed' by the FIM, the European road-race regulatory body, as the front and rear wheels (non-sidecar) were designed to be out-of-line, hence deemed to be a three-wheeler (or cyclecar), causing Vincent to revert to his 'old', conventional", "-34.75432517111767" ], [ "internal combustion engine with horizontally opposed pistons. He called it the kontra engine, as the action of each side opposed the action of the other. \nIn 1901, the Wilson-Pilcher car was launched with the choice of a flat-four or flat-six engine mounted at the front of the car with the crankshaft in-line. The water-cooled engines had 95 mm bore and stroke, and the crankshaft was supported with intermediate bearings between each pair of cylinders. The cars were made in London until 1904 when Armstrong Whitworth took over the manufacture, which continued until c. 1907. These cars \"created quite a sensation in automobile", "-34.7474413922173" ], [ "cars used flathead V8 engines until the 1950s while their Lincoln luxury cars used V8 from the 1930s to the 1980s and V12 engines in the 1930s and 1940s. Chrysler used flathead straight-eights in its premium Chrysler cars, including the Imperial luxury model. Airships The British R101 rigid airship was fitted with five Beardmore Tornado Mk I inline eight-cylinder diesel engines. These engines were intended to give an output of 700 bhp (520 kW) at 1,000 rpm but in practice had a continuous output rating of only 585 bhp (436 kW) at 900 rpm. Post-war After World War II, changes in the automobile", "-34.73943200788926" ], [ "engines (originally designed by Tilling-Stevens) have a single crankshaft beneath the centre of the cylinders with both pistons connected by levers. This type of engine configuration dates at least back as far as 1914, as a 2-stroke petrol engine referred to as the \"Simpson's balanced two-stroke\" was described in The Motor Cycle magazine of this date. This design used crankcase compression, and used one piston to uncover the transfer port, and another to open the exhaust port allowing the fresh charge to flow from one end of the cylinder to the other, thereby avoiding the need for deflector crowns for", "-34.72547622930142" ], [ "speeds, and Bernd Rosemeyer later drove an Auto Union around the Nürburgring in a single gear to prove the engine's flexibility.\nThe body underwent wind-tunnel testing at the German Institute for Aerodynamics, a scientific organization that still exists. With the fuel tank located in the centre of the car directly behind the driver, the front-rear weight distribution remained unchanged as the fuel was used; the same location is used in modern open-wheel racing cars for the same reason. The chassis tubes originally piped coolant from the radiator to the engine, but this was eventually abandoned owing to leaks. Racing results", "-34.71315101487562" ], [ "introduced new rules for 1987 in an effort to reduce costs and slow down the cars with a resultant increase in safety, as well as to increase competitiveness between the two engine types. Turbo-powered cars now had to feature a pop-off valve which restricted boost to 4.0 bar, thus limiting engine power. However, advances in engine development, aerodynamics, tyres and suspension meant that the leading teams such as Williams, McLaren and Ferrari nonetheless frequently recorded faster times than they had in 1986, when turbo boost was unrestricted. The FIA also banned super-soft (and sticky) qualifying tyres for 1987, thus eliminating", "-34.705331078836025" ], [ "engine parts (except for the crankshaft), and this is therefore a far more common design today when both engine forms are produced from the same basic design. Petrol A prototype British heavy tank proposed in April 1916 was intended to be powered by a doubled version of the 105 hp Daimler 'Silent Knight' engine, with two banks of cylinders side by side sharing a common crankcase. However this was not a true 'U' engine, as the cylinder banks were to have been independent, each separately driving its own crankshaft and four-speed gearbox. Neither the tank nor the engine were ever made.\nThe", "-34.704011214664206" ], [ "order to support the front-wheel drive lay-out the engine was turned through 180 degrees so that the gearbox was at the front.\nTwo bodies were listed, both with two doors. These were a four seater 2-door \"coach\" (\"Mouette\") bodied car with a fashionably fast-back tail and an open topped two seater \"roadster\" (\"Irlande\"). The inclusion of a Ford engine was reflected in the grill which also came from the Model Y.\nAlthough the Ford transverse leaf springs were retained, the front suspension was made independent. Presentation The manufacturer took a stand at the 27th Paris Motor Show in October 1933, but disappeared", "-34.69461736478843" ], [ "the radiator was positioned behind the engine, reflecting the normal layout for Renault engine compartments during most of the 1920s. However, starting with the massive new Reinastella at the end of 1928, Renault moved the radiator to a more conventional position ahead of the engine, and by time of the next motor show, in October 1929, all Renaults including the Monastella's, lost the old \"wind-cutter\" grill-free front panel, in favour of a conventional front grill, reflecting the positioning of the radiator to a more \"normal\" position, just ahead of the engine block. (This also", "-34.66175378113985" ], [ "which almost all modern FWD vehicles are now based. Peugeot and Renault on their jointly developed small car engine of the 1970s where the 4-cylinder block was canted over to reduce the overall height of the engine with the transmission underneath (PSA X engine). The tendency of this layout to generate unwanted transmission \"whine\" has seen it fall out of favour. Also, clutch changes required engine removal.\nFord introduced front wheel drive to its European customers in 1962 with the Taunus P4. The 1965 Triumph 1300 was designed around a longitudinal engine with the transmission underneath. Audi has also used a longitudinally", "-34.66075460007414" ], [ "Moorland) and Lola Mk 2.\nAlthough these early British FJs were front-engined, the F1 car was undergoing a mid-engined revolution and there were also strands of thinking in FJ that stemmed from the 500cc Formula Three where rear-engined cars had been the norm. It was not long before Cooper started to produce a car similar to their contemporary F1/F2 thinking, later F3s and \"bobtail\" sports car fitted with BMC A-series engines. On the engine side, Keith Duckworth of Cosworth Engineering took an interest in Formula Junior and managed to get hold of two of the new engine to be used in", "-34.63354445970617" ], [ "market cars because the engine could seize suddenly and possibly cause a crash. The F136 engines had incorrectly mounted crankshafts. The manufacturer learned of one such incident from a review car lent to critics. Owners could choose from having a new engine installed by their dealer, having the engine removed and the work done by Ferrari North America or having a new crankshaft and bearings installed at the dealership. Marketing Hot Wheels produced a 1:18 scale model of the 458 Italia, Spider, GT2, Challenge, China Edition and, later, the Speciale versions under both its regular \"Mattel / Heritage\" and premium", "-34.62903997627291" ], [ "body. The top was removed, the rear engine was moved back in the square tube frame, then the second engine was placed in front of the rear engine. The body after finished altering it, was channeled over frame. The body was cut after the first doors, then the rear section of the body was moved forward. They had to make both slender doors buy using the third rear doors and the front doors. After getting the right measurements they made the new doors. Then they put gold Naugahyde on the doors and spare tire carriers. The top in", "-34.62513064011" ], [ "even front to rear weight distribution (50.7% front/49.3% rear) courtesy of the rear transaxle balancing out the engine in the front. North American-market cars had bigger bumpers and the front bumper had a larger rubber portion, replacing the auxiliary lights as required by the North American laws.\nIn mid-1985, the 944 underwent its first significant changes, these included: new dashboard and door panels, embedded radio antenna, upgraded alternator (from 90 amp to 115 amp), increased oil sump capacity, new front and rear cast alloy control arms and semi-trailing arms, larger fuel tank, optional heated and powered seats, Porsche HiFi sound system,", "-34.61706775688799" ], [ "the popularity of modern and smooth turbo-charged inline 3 cylinder engines on compact cars. However, the crankshaft with heavy counterweights tend to make it difficult for the engine to be made sporty (i.e. quick revving up and down) because of the strong flywheel effect.\nUnlike in a crossplane V8, the bank of three cylinders have evenly spaced exhaust pulse 240° (120° if two stroke) crank rotational angle apart, so a simple three-into-one exhaust manifold can be used for uniform scavenging of exhaust (needed for uniform intake filling of cylinders, which is important for 11. Uniform amount of torque generated and 12.", "-34.57745789503679" ], [ "previous 2001 traction control system, and upright aerodynamically shaped periscopic exhaust outlets at the rear. The latter technology was incorporated both to use the hot exhaust gases for aerodynamic effect and to raise these gases higher and out the way of the rear suspension. On previous occasion Ferrari's non chimneyed top exiting exhaust outlets had caused the rear suspension and other elements at the rear of the car to overheat or even melt when minor cracks occurred. Race history At its first race in Brazil, the F2002 was victorious, being driven by Michael Schumacher and continuing Ferrari's trend since 1999", "-34.566603316459805" ], [ "all predecessors (including the DKW) built behind the radiator has been moved forward in the produced since June 30, 1985 vehicles. Therefore, the body was given a new front midsection without a separate \"Grill\" with revised headlights. Replacements The Wartburg engineers developed several four-stroke versions, none of which were accepted for series production. In 1972 a four-stroke inline-four of 1.6 litres producing 82 PS (60 kW) was developed, but the political leadership cancelled the project in favor of a facelift. A slack in demand abroad was compensated for by rising demand within East Germany, made possible by wage increases.\nIn the mid-seventies, a", "-34.54841355280951" ], [ "V8 engines were infamous. Front-engined Ferraris, such as the Ferrari 612 Scaglietti place their engines within the wheelbase, so as to avoid the problem of understeer. Reducing overhanging weight in sports cars is usually a priority, with the notable exception of the 911.\nIn contrast, the excellent handling of the Mini, with its wheels pushed far out at each corner, can be partly credited to its small overhang. The classic Mini and New MINI are automobiles with very little overhang and thus handle very well under extreme conditions. The minimal overhang gives the Mini its bulldog-like stance.\nRear overhang may present", "-34.52922047069296" ], [ "driver's left, as seen from the \ndriver's seat. It can also be thought of as the side that would be on the left if one was standing directly behind the car looking at it.\nWhen referring to engines, the front of the engine is the part where the pulleys for the accessories (such as the alternator and water pump) are, and the rear of the engine is where the flywheel is, through which the engine connects to the \ntransmission. The front of the engine may point towards the front, side or rear of the car.\nIn most rear-wheel drive cars, the engine", "-34.52804601471871" ], [ "the engine in front of the transmission. Although this north-south/forward gearbox layout gave excellent handling, servicing access to the engine was so difficult that the R16's successor, the Renault 20, kept the north-south layout but put the engine ahead of the gearbox.\nGear changing was performed by means of a column-mounted lever which allowed for a more spacious front cabin. The column-mounted gear change (required by the position of the transmission in front of the engine) was rare in West European markets. Model history Series production started in March 1965 at the company's recently completed Sandouville plant, a few kilometers", "-34.52408208721317" ], [ "there was no sign of overheating. Seven bearings for the crankshaft might improve the engine's smoothness but, without sudden opening of the throttle, it is smooth and silky. Clutch worked well, change-speed was light and easy. Brakes worked well and all seats were comfortable for passengers as well as driver.\nThis car with its 2½-litre 6-cylinder engine and three speed gearbox, the correspondent said, should meet the requirements of many who might otherwise buy an American car. Gear changing was as simple as on any American car.", "-34.51878228487476" ], [ "new grille. Under the hood, the V8 engine was now shared with Mercury, allowing Ford to break the 100-hp barrier for the first time. In 1947, the last Ford trucks based on the car chassis were produced. For 1948, the F-Series was introduced as a dedicated truck chassis. Seventh generation (1949–1951) For the 1949 model year, Ford redesigned its car lineup with a number of significant changes. The transverse-leaf suspension, seen since the Model T, was replaced by independent front suspension and longitudinal leaf springs. Fenders and running boards were completely integrated into the bodywork.\nIn 1950, the", "-34.506767253624275" ], [ "around the passenger compartment. The front had a simpler grille that complemented the now-functional hood scoop and a new one-piece curved windshield, while the sides gained period-typical fender chrome accents, and the formerly sloped rear end was squared off. The front to rear fender line was styled to make the car look longer and taillamps were also redesigned. The interior was also updated with a new dash and instrument cluster that were surprisingly modern.\nThere was still no V8 engine available, but the 308 cu in (5.0 L) six-cylinder was standard in Hornets and produced 160 hp (119 kW), the racing-inspired 170 hp (127 kW; 172 PS) \"Twin-H-Power\" (dual", "-34.487479004747" ], [ "T-head engine Overview This was an early form of crossflow cylinder head. The design was very complex for its day, requiring separate camshafts to operate the intake and exhaust valves. This made the engine much more expensive to produce than a comparable L-head (flathead) engine. Additionally, it was also quite heavy and inefficient for its displacement, producing less horsepower than a flathead or modern overhead valve engine of comparable displacement.\nThe reason for this design's popularity from the turn of the 20th century into the 1920s is due to the type of gasoline sold at the time, which ignited at a", "-34.475947400555015" ] ]
15roms
What feminists mean when they say "empower women" and how "empowering women" will lower rape rates.
[ "There are a number of stereotypes about sexuality in women in modern society, and many of them are problematic. The major one when it comes to rape, is that a woman’s value lies in her genitals, and that sex is an object or ‘treat’, that a woman can ‘give’ or ‘grant access to’. To say it as simply as possible (minding that it is more complex than this), if someone believes that they are ‘owed’ sex (whether it be because they have been dating someone for a while, because they are married, or even just because they were being flirted with), and they are sufficiently violent, frustrated or mentally unstable, they may try to ‘take’ the sex that was ‘owed to them’. The ‘empowerment’ idea comes from reinforcing the idea to women (and men) that women are not objects, or gate keepers to sex, but muti-dimensional **people**. Who have choice. And the choice to say no is one that they are entitled to. (Subnote: Not all rape occurs in a dark alleyway with a stranger. A lot of the time, it is someone known, or dating; where the woman is either too afraid/feels unable to say ‘no’, or the man does not listen to that ‘no’.)", "Firstly, a large proportion of rape/sexual assault is male on female. With that in mind, *feminist* is something of a misleading term. I am male, but also a feminist. I suspect most of my friends are 'feminists' without really realising it. Do you think that women fundamentally deserve less than men? If not, you're a 'feminist'. A lot of rape is predicated around the idea of power over someone else, and it is the case in some societies that men's perceived superiority over women makes it okay to discount their feelings. Some women actually believe this too, which is all the more surprising. By 'empowering women' to fight for gender equality, they send the message that rape is a heinous crime that men and women alike should scorn the perpetrators of.", "I can offer my female perspective which is more generally related to women's empowerment than rape. Education is the number one thing that would help women in countries with a poor record of women's rights and therefore higher rape / child marriage / abuse records. A woman who's had a chance to learn, to grow up without the role of wife and mother thrown at her before she's completed secondary school is a woman who is going to fight hard for her rights. If you look at the history of feminism you'll see educated women are treated better, have more choice and fight hard for their rights. Women who are married off young don't realise they may have other choices. Access to birth control. That's another huge step in empowering women. I cannot believe that there are still so many women being denied the basic right to choose if and when they should have children. In many societies women are still considered the primary child carers (which I think is bullshit, having been raised primarily by my dad) which means that when they become pregnant, usually at a young age, their whole life is fucked before its begun. Having a child is a choice you should make mutually with your partner, not something you have no say in. Religion seriously needs to rethink its stance in women. I'm an atheist but I have no issue with people who follow a religious faith. What I do have an issue with is people using arguments and writings than are thousands of years old as a template for his women should behave in this day and age. If we had left our medical practices the same we'd all be dying like flies but the mainly male religious leaders seem perfectly happy to ask women to stay in roles that were outdated a thousand years ago. Because they benefit from it. And the biggest thing for me is the right to speak out without fear of reprisal or hostility from authority figures. If women don't have a right to voice their abuse then society is failing them. This occurs even in western 'feminist' societies. Here in the UK there was a specialist rape case unit within the main police force. They have been investigated and officers fired for, among many things, flat out lying about cases being dropped by the victim, joking privately about women 'asking for it' and in one memorable case they pinned a rape victims underwear to their notice board because they thought they were sexy. Add this to the fact that most women are raped by someone they know and you have the fear of breaking families or friendships coupled with the fear that no one will believe you and a less than willing police force and its clear to see why so many women just don't report rape. TL:DR treat us like people, educate us, stop telling us god wants us to be second class citizens, give us the right to choose our pregnancies and for fucks sake, believe us when we report it.", "Uhh, well, an example would be India. There is an ongoing scandal in India where a woman was gang-raped, which really highlighted the rape culture in India. Essentially, the culture of India is *very* objectifying of women. Not in the \"video game characters have boobs\" way but in the way that women are *constantly* groped and harassed in public. Rape is a big problem because it happens a *lot* but the culture is very, very dismissive of it. They rush to blame the victim for wearing the wrong clothes, for being in the wrong place, and even the police discourage woman rape victims from pressing charges. The idea is that rape cultures contribute to rape, either from rapists thinking rape is \"okay\" or \"justified\" in certain circumstances, or rapists think something that *is* rape, isn't rape, or because at=large rapists aren't being arrested and convicted because nobody gives a shit, and because the women are too afraid to come out and say she was raped because that would bring shame on her family. The solution to this is to \"\"\"\"empower\"\"\"\" women. Instead of being viewed as objects for sexual gratification in a man-controlled world, women should be on parity with men. If women in India were equal to men and there weren't extremely restrictive gender roles, then maybe people would stop treating women like crap, and stop off-handedly dismissing rape. The reason I octuple-quotes \"empower\" is because you seem to have an issue with that word. Empower doesn't mean to give women *more* power than men. At least, that isn't its intent, even if some feminists go a bit overboard. My suggestion is to not get so hung up on words, and focus on the ideas.", "Empowering woman may lower rape rates or it may not - that also depends on the psychology of men who perpetrate those crimes. However, at least an \"empowered\" woman will have resources to whom she can get help and turn to for physical and psychological help when she gets help. And at least she will have the support to heal over the situation as quickly as possible. Edit -I consider myself a feminist. There are many ways woman need to empower other woman within our community, but in this example I just focused on empowering victims of rape to report crimes and get protection through the use of outside resources." ]
[ [ "prove their masculinity to their friends, or under peer pressure and fear that they would be rejected if they didn't participate in the assault. Sex industry and rape Some theorists charge that the acceptance of these sexual practices increase sexual violence against women, by reinforcing stereotypical views about women, who are seen as sex objects which can be used and abused by men, and by desensitizing men; this being one of the reasons why some theorists oppose the sex industry. They argue that pornography eroticizes the domination, humiliation, and coercion of women, and reinforces sexual and cultural attitudes that are", "-27.052703653171193" ], [ "who focus more on pay. Women tend to avoid jobs that require travel or relocation, and they take more time off and spend fewer hours in the office than men do. Men disproportionately take on the most dirty, dangerous and depressing jobs.\"\nThe IWF also argues that feminists manufacture domestic violence legislation that \"is misleading because it is premised on and mean to advance feminist ideology.\" This falls under their larger belief that \"feminists ... lie about data, are opportunistic, construct men as the enemy, and cast women as helpless victims.\"\nConservative commentators have praised the IWF; Linda Chavez credited Women's Figures:", "-26.93067045105272" ], [ "right of many to participate fully in society. Violence is about power, control, and domination. Systems of inequality and oppression interact positioning certain groups as particularly vulnerable to violence. Gendered violence takes place within a socially constructed power dynamic in which one ideology (masculinity) dominates another (femininity). What it means to be a woman in society is influenced and ascribed by the media, which acts a \"powerful educational force\". The media glamorizes violence against women cultivating a \"toxic cultural environment\" in which women are institutionally positioned as inferior and worthy objects of violence.\nMen are disproportionally the offenders, and women disproportionally", "-26.77653435766115" ], [ "has come to represent the search for equal opportunity and respect for women in patriarchal societies, across all social, cultural, and political spheres. Demonstrations and marches have been a popular medium of support, with the January 21, 2017, Women's March's replication in major cities across the world drawing tens of thousands of supporters. Feminists' main talking points consist of women's reproductive rights, the closing of the pay gap between men and women, the glass ceiling and workplace discrimination, and the intersectionality of feminism with other major issues such as African-American rights, immigration freedoms, and gun violence. \"Resistance\" Resistance to oppression", "-26.733326176778064" ], [ "a continuum of coercive power that makes possible the mistreatment of women not only in their homes but also in the community, neighborhood, and society at large\" (Menjívar, 2016). Further, because many of these women believe giving sex is their duty, they do not characterize their experience as marital rape (Bergen, 2016). However, \"…women who have experienced forced sex in marriage understand this experience as an abuse or violation\", they just may not characterize it as marital rape (Torres, 2016). Violence is so entrenched in many cultures it simply becomes a way of life, and wives are left to believe", "-26.723011206031515" ], [ "work on women's sexuality is Anne Koedt's The Myth of the Vaginal Orgasm, which advances the claim that vaginal orgasm is a patriarchal myth. Feminism and sexual violence Rape culture is a culture in which rape and sexual violence are common and in which prevalent attitudes, norms, practices, and media normalize, excuse, tolerate, or even condone sexual violence. Examples of behaviors commonly associated with rape culture include victim blaming, slut-shaming, sexual objectification, and trivializing rape. Rape culture has been used to model behaviour within social groups, including prison systems where prison rape is common and conflict areas where war", "-26.713141141401138" ], [ "institutionally pro-female and anti-male\"; explaining why the UK legal definition of rape states that a woman can not legally rape a man, \"the Sexual Offences Act 2003 was drawn up by radical feminists\"; \"men will support women as stay-at-home partners or parents and women won't\"; \"Charlotte Proudman clearly suffers from an all too common mental health condition 'whiny feminist disorder'\"; \"feminism is a female supremacy movement driven by misandry, the hatred of men, it's a vile ideology\"; \"this whole narrative about work being fulfilling, and exciting, and interesting, and looking after children being stressful and mundane, it's a feminist narrative", "-26.69945785863092" ], [ "\"in conceding that women do engage in acts of domestic violence, female use of violence is justified as self-defense—a lifesaving reaction of women who are being physically attacked by their male partners. The development of the battered woman syndrome as a defense for crimes committed against abusive male partners, including homicide, evidences the wide acceptance of a woman's use of violence as self-defense.\" The theory is that when women commit IPV, it is probably justified because they were previously victims and, therefore, the male was the \"primary aggressor.\" Thus, the woman's violent behavior is caused by her background as a", "-26.63701692770701" ], [ "the systematic oppression of women and reclaiming the term for themselves. Especially among sex-positive feminists, who believe sexual repression and having it called hysteria is a form of oppression. The idea stemmed from the belief that Hysteria was a kind of pre-feminist rebellion against the oppressive defined social roles placed upon women. Feminist writers such as Catherine Clément and Hélène Cixous write in The Newly Born Woman from a place of opposition to the theories proposed in psychoanalytical works, pushing against the notion that socially constructed femininities and hysteria are natural to being female. Feminist social historians of both", "-26.55125832243357" ], [ "on Violence against Women & Children at University of Western Ontario, said, MGTOW advocates \"have no real ability to identify the global forces that are at work in their life, so they hang the blame on feminists\", and show \"a complete lack of self-reflection\", in the end \"reinforcing each other's really distorted perceptions of what's happening in the world\".\nMGTOWs deride feminists as \"social justice warriors\", and see the LGBT rights movement and support for safe spaces as obstacles to male self-ownership. Leah Morrigan states that the MGTOW.com founder Sandman's videos \"proclai[m] his bitter, indiscriminate hate towards women\", who he claims", "-26.52420724312833" ], [ "the primary methods that feminist teachers utilize this decentering of power is through the process known as \"consciousness raising.\" Popularized in the early 1970s, the technique is implemented usually by sitting in a circle and discussing one's own experiences and by finding commonalities that individuals thought were only personal matters of their own lives. Ideally, consciousness raising is used as a method to increase the number of people who are aware of a social issue or problem. Questioning and Debriefing Similar to Consciousness Raising, questioning and debriefing calls for a discussion. The idea of it is to help students realize", "-26.47622176836012" ], [ "attitudes toward violence.\" Feminism and sexual violence Feminist scholars and activists have made unique contributions to the discourse on sexual violence against women and men\n. They have proposed that the root causes of sexual violence lie in the social structure characterized by severe inequality, in which the male is dominant and the female exploited. Feminists also hold that the weak institutional arrangements in place to address consequences of sexual violence, as well as unfair treatment of the victims (or survivors, an alternatively proposed terminology) are direct reflections of the ways in which society regards men, women and the sexual relations", "-26.437924000361818" ], [ "idea with her often-quoted statement, \"Pornography is the theory, and rape is the practice.\"\nAnti-pornography feminists charge that pornography eroticizes the domination, humiliation, and coercion of women, and reinforces sexual and cultural attitudes that are complicit in rape and sexual harassment. MacKinnon argued that pornography leads to an increase in sexual violence against women through fostering rape myths. Such rape myths include the belief that women really want to be raped and that they mean yes when they say no. Additionally, according to MacKinnon, pornography desensitizes viewers to violence against women, and this leads to a progressive need to see more", "-26.355212244496215" ], [ "the world have become involved in advocating for various causes typically associated with feminism, including but not limited to anti-rape and anti-violence activism, as well as challenging the sexualization of women in the media. Many of these activities have been chronicled in a variety of publications and books, including, since 1983, Voice Male magazine, edited by Rob Okun, himself a long-time pro-feminist.\nMarge Piercy (1969) argued that liberal male politicians will sometimes espouse feminist claims to gain votes, despite dubious backgrounds and actions.\nPro-feminist men are often social activists like August Bebel. Advocacy against violence against women An area of feminist social", "-26.33054591610562" ], [ "positions with men.\nMoreover, glass ceiling also hinders women from reaching the top position. The job segregation by sex restrict women in certain types of job like clerical, which limit their work experience and thus making them harder to get promoted. Even though some women are capable enough to move upward, the old-boy network exclude women from decision-making. Violence against women Violence against women is a gender-based violence happen in both public and private life, targeting at women due to their sex or social roles and possibly lead to physical, sexual and psychological harm. International violence against women survey (IVAWS) revealed", "-26.300078354004654" ], [ "expectations surrounding body shape and size.\nThe ideology is founded on a belief that sexual activity in a patriarchal society is intrinsically male and that male sexuality is naturally aggressive or destructive.  Furthermore, it assumes that women cannot choose to be free participants in an industry that’s purpose is to satisfy the male gaze and contributes to male aggression. Radical feminist scholar and writer Andrea Dworkin named male power as the “‘raison d’etre’ of pornography,” as well as stating that pornography in itself is a means for expressing male power in her 1981 book “Pornography: Men Possessing Women.”\nJae Woong Shim, author", "-26.252940230013337" ], [ "domination over and discrimination against women by men and to the prevention of the full advancement of women, and that violence against women is one of the crucial social mechanisms by which women are forced into a subordinate position compared with men\".\nThe Declaration on the Elimination of Violence against Women classifies violence against women into three categories: that occurring in the family (DV), that occurring within the general community, and that perpetrated or condoned by the State.\nThe Inter-American Convention on the Prevention, Punishment, and Eradication of Violence against Women defines violence against women as \"any act or conduct, based on", "-26.23540940482053" ], [ "recruitment campaigns.\nSome research suggests however, that \"women are serious candidates for violent radicalization.\" Although there may be a gender-based distribution of tasks (e.g. especially where participation in combat is involved), this distinction does not apply when it comes to embracing the radical ideology of, or the legitimation of, violent attacks. Some reports reveal that women recognize the same truths and accept the same rules of compliance validated by doctrines as compared to their male counterparts. When they are radicalized, women may appear more indoctrinated than men and more prone to encourage political violence. Online gender issues in religious violent radicalization", "-26.217572749359533" ], [ "between them. Furthermore, feminist critique has led to a closer convergence between feminism and psychology in the study of sexual violence.\nConveying a connection between gender-based sexual violence and concepts of power-seeking and subordination was pioneered in the 1970s and has proven to be very influential. Within this context, rape has been assessed as a foremost tool of intimidation used by men against women. Similarly, domestic violence can be viewed as a particularly severe form of patriarchal domination and oppression.\nFeminist interpretation of pornography also suggests a link between rape and pornography, by which pornography that degrades, humiliates and exercises violence upon", "-26.207515699526994" ], [ "as primarily aggressive in both private and public spheres, violently dominating women by control of their sexuality through pornography, rape (Brownmiller 1975), and other forms of sexual violence, thus imposing upon them masculine definitions of womanhood and women's roles, particularly in the family. Marxist feminists, (Rafter & Natalizia 1981, MacKinnon 1982 & 1983) however, hold that such patriarchal structures are emergent from the class producing inequalities inherent in capitalist means of production. The production of surplus value requires that the man who works in the capitalist's factory, pit, or office, requires a secondary, unpaid worker – the woman", "-26.189918270199996" ], [ "paper entitled \"A Feminist Redefinition of Rape and Sexual Assault: Historical Foundations and Change\", Patricia Donat and John D'Emilio suggested that the term originated as \"rape-supportive culture\" in Brownmiller's Against Our Will. By the mid-1970s, the phrase began to be used more widely in multiple forms of media. Sexualization Sexualization and sexual objectification are practices that contribute to the normalization of hyper-sexualized perceptions of women, which is a theme in rape culture. Hyper-sexualized or pornographic media is often attributed with perpetuating aggressive behaviors and attitudes supporting violence against women. Media depictions of violent sexual activity are also noted to", "-26.160698004154256" ], [ "engage in sex work is often not an autonomous choice, because of economic, familial or societal pressures. Sex work may also be seen as an objectification of women. An opposing view held by other feminists such as Wendy McElroy is that sex work is a means of empowering women, the argument here being that in sex work women are able to extract psychological and financial power over men which is a justified correction of the power unbalance inherent in a patriarchal society. Some feminists regard to sex work as simply a form of labor which is neither morally good or", "-26.103365264483728" ], [ "domination, humiliation, and coercion of women, and reinforces sexual and cultural attitudes that are complicit in rape and sexual harassment. In her book Only Words (1993), MacKinnon argues that pornography \"deprives women of the right to express verbal refusal of an intercourse\".\nMacKinnon argued that pornography leads to an increase in sexual violence against women through fostering rape myths. Such rape myths include the belief that women really want to be raped and that they mean yes when they say no. It is disputed that \"rape myths perpetuate sexual violence indirectly by creating distorted beliefs and attitudes about sexual assault and", "-26.084879303911293" ], [ "normalizing rape culture. As with some areas of feminism, pro-feminists may also believe that pornography reduces women and teenage girls to sex objects. Early writings and assumptions Early writings in the U.S. that the pro-feminist men's movement has identified as antecedents to its thought include Jon Snodgrass's A Book of Readings for Men against Sexism, Michael Kimmel and Michael Messner's collection of essays, Men's Lives, and Joseph Pleck's The Myth of Masculinity. Three basic assumptions of these early texts included the distinction between sex and gender, the treatment of gender as a social construct, and the position that men are", "-26.078499116410967" ], [ "culture concept is much to the detriment of young college-educated women she says. Paglia argues that said individuals are ill-prepared to anticipate or cope with the small minority of deeply evil people in the world, who simply don't care about following laws or obeying social convention. Moreover, Paglia says, feminist proponents of rape culture tend to completely ignore male victims of sexual assault.\nCaroline Kitchens, in a 2014 article in Time Magazine titled \"It's Time to End 'Rape Culture' Hysteria\" suggested that \"Though rape is certainly a serious problem, there's no evidence that it's considered a cultural norm. ...On college campuses,", "-26.04988329540356" ], [ "with murder, in part because of the \"machismo\" culture in Latin America. This culture allows women to be treated as objects rather than humans; equality and basic rights granted to men are not even in question for women. Rape culture and victim blaming are the tactics that go along with machismo, and both men and women largely agree with the misogynistic tendencies that have survived for so long. Attacks on women activists Women who work as public activists, such as human rights defenders, including activists working to protect land and natural resources, face violence, threats, reprisal, and illegal arrests. Such", "-26.031234969414072" ], [ "well, by force or threat of force, it denies women the right to exercise freedom of choice as to their partner for sexual relations and the timing of those relations. These are choices of great importance that may have a substantial effect upon the life and health of every woman. Parliament's intention in replacing the rape laws with the sexual assault offences was to convey the message that rape is not just a sexual act but is basically an act of violence.\nTo back this up, Cory pointed to journal articles describing how victims often become depressed, cannot sleep, feel guilty", "-26.00586518669843" ], [ "sex should be controlled by the man, and that the woman's response and satisfaction are irrelevant. Radical feminists argue that sexual liberation for women cannot be achieved so long as we normalize unequal sexual practices where a man dominates a woman. \"Feminist consciousness raising remains the foundation for collective struggle and the eventual liberation of women\".\nRadical feminists strongly object to the patriarchal ideology that has been one of the justifications for the existence of prostitution, namely that prostitution is a \"necessary evil\", because men cannot control themselves; therefore it is \"necessary\" that a small number of women be \"sacrificed\"", "-25.99967927041871" ], [ "really wanted to, women who are raped are promiscuous therefore \"asking to be raped\" and many women falsely report rape to protect their own reputations or because they are angry at the \"perpetrator\" and want to create a type of backlash. A theory for why rape myths are so common in society is because they are perpetuated by norms already present in society. Researchers claim that communication and language is created by the dominant patriarchy. In positions of power, men control how women are portrayed in the media, women's censorship of body and voice, etc. which forces women to submit", "-25.997762970539043" ], [ "privilege in society, even if he chooses to live as a woman\", and related complaints that some feminists exaggerate women's problems while ignoring men's problems. Also cited was the abortion debate and the argument that women have suffered as a result of a feminist culture that promotes casual sex as empowering. In an op-ed for The Globe and Mail, Margaret Wente supports Women Against Feminism saying she believes modern feminism has become a belief system that presents a distorted view of reality based on misandry and victim-culture and she questions the existence of rape culture.\nCritics say the young women involved", "-25.986862816609573" ], [ "of Germany, the London Feminist Network, the Coalition for a Feminist Agenda, and others. These groups claimed that legally limiting Internet pornography would promote violence prevention, proper sex education, and general public health. Sex-positive feminism In this view, pornography is seen as being a medium for women's sexual expression. Sex-positive feminists view many radical feminist views on sexuality, including views on pornography, as being equally oppressive as those of patriarchal religions and ideologies, and argue that anti-pornography feminist discourse ignores and trivializes women's sexual agency. Ellen Willis (who coined the term \"pro-sex feminism\") states \"As we saw it, the claim", "-25.97593734099064" ], [ "violence against women \"is rooted in gender-based discrimination and social norms and gender stereotypes that perpetuate such violence\", and advocate moving from supporting victims to prevention, through addressing root and structural causes. They recommend programmes that start early in life and are directed towards both genders to promote respect and equality, an area often overlooked in public policy. This strategy, which involves broad educational and cultural change, also involves implementing the recommendations of the 57th session of the UN Commission on the Status of Women (2013). To that end the 2014 UN International Day of the Girl Child was dedicated", "-25.964879626160837" ], [ "not be unchangeable since they are created by people with biasses and may therefore contribute to female oppression. Hedonic Jurisprudence Feminist legal theory produced a new idea of using hedonic jurisprudence to show that women's experiences of assault and rape was a product of laws that treated them as less human and gave them fewer rights than men. With this feminist legal theorists argued that given examples were not only a description of possible scenarios but also a sign of events that have actually occurred, relying on them to support statements that the law ignores the interests and disrespects the", "-25.954114450633824" ], [ "assumption and criticizes it at length. They criticize explanations of rape put forward by social scientists, and as well as by feminists such as Susan Brownmiller, who in Against Our Will popularized the feminist view that rape is an expression of male domination that is not sexually motivated. Other feminist authors they criticize include Kate Millett, Germaine Greer, Susan Griffin, and Catharine MacKinnon. They criticize arguments that rape is not sexually motivated on several grounds. In their view, concluding that rape must be motivated by the desire to commit acts of violence because it involves force or the threat of", "-25.946978099193075" ], [ "D. A. Clarke Career Much of Clarke's writing addresses the link between violence against women and market economics, although she may be best known for her 1991 essay \"Justice Is A Woman With A Sword\". In that essay, which she has updated twice for editions of the anthology Transforming a Rape Culture, she argues that feminist theory has taken a dogmatic approach to nonviolence and that women's self-defense, violent feminist activism, and the encouragement of positive media portrayals of violent women (such as in Kill Bill or Xena: Warrior Princess) have not been given the serious consideration they should receive", "-25.941564249893418" ], [ "Gender Violence establishes the right of women to a life free of violence. The purpose of this law is to prevent, punish and eradicate violence against women, regardless of their sexual orientation or gender identity, among others. Also, it amends the Penal Code and the Intrafamily Violence law to include same-sex couples. The Chamber of Deputies passed the bill on January 17, 2019. Other areas Since 2010, Law 20.418 on the Right to education, information and guidance on Fertility states that \"everyone has the right to confidentiality and privacy about their sexual options and behaviors, as well as the methods", "-25.883116819881252" ], [ "women\". There were no provisions in the constitution guaranteeing gender equality. A United Nations Office on Drugs and Crime report in 2011 placed the country at the fourth highest place globally in terms of its rape of rates. According to the US Department of State, too, many women are \"marginalized\" and cannot enjoy full equality due to their financial dependence.\nIn 2013, the US Department of State reported that violence against women was a \"serious and pervasive problem\". Domestic violence is not specifically criminalized, and while charges may be brought up by the authorities, the police is usually reportedly reluctant to", "-25.873103830901528" ], [ "and focus on recruiting women to join the struggle against patriarchy. Reason reviewed Who Stole Feminism?: How Women Have Betrayed Women and characterized gender feminism as the action of accenting the differences of genders in order to create what Sommers believes is privilege for women in academia, government, industry, or the advancement of personal agendas. \nIn criticizing contemporary feminism, Sommers writes that an often-mentioned March of Dimes study which says that \"domestic violence is the leading cause of birth defects\", does not exist, and that violence against women does not peak during the Super Bowl, which she describes as an", "-25.868611072015483" ], [ "obsession with eliminating 'rape culture' has led to censorship and hysteria.\" Heather MacDonald suggested that \"In a delicious historical irony, the baby boomers who dismantled the university's intellectual architecture in favor of unbridled sex and protest have now bureaucratized both.\" According to Joyce E. Williams, \"the major criticism of rape culture and the feminist theory from which it emanates is the monolithic implication that ultimately all women are victimized by all men\".\nChristina Hoff Sommers has disputed the existence of rape culture, arguing that the common \"one in four women will be raped in her lifetime\" claim is based on a", "-25.867557462654077" ], [ "Feministing Purpose and audience Vanessa Valenti and Jessica Valenti began Feministing in 2004 while working at the National Organization for Women's legal defense fund (now Legal Momentum), where Jessica felt that young feminists were being excluded from feminist discourse. She describes Feministing's purpose as \"a way to get through the mommy filter\" and make feminism more accessible to young women through giving an Internet presence for young feminists. Feministing covers topics ranging from outrage on measures to restrict reproductive rights or pay equity to irreverent or bemused coverage of pop culture and art, such as urinals shaped to look like", "-25.83183006066247" ], [ "the feminists who see pornography as a sexist institution, also see censorship (including MacKinnon's civil law approach) as an evil. In its mission statement, Feminists for Free Expression argues that censorship has never reduced violence, but historically been used to silence women and stifle efforts for social change. They point to the birth control literature of Margaret Sanger, the feminist plays of Holly Hughes, and works like Our Bodies, Ourselves and The Well of Loneliness as examples of feminist sexual speech which has been the target of censorship. FFE further argues that the attempt to fix social problems through censorship,", "-25.83026655246431" ], [ "harmful to women to attempt to tackle the problem of domestic abuse without proper strategy based on facts: \"The research shows that this so-called harmless violence by women because a meta-analysis by Stith and colleagues (2004) found that a woman's perpetration of violence was the strongest predictor of her being a victim of partner violence.\"\nStraus responded to criticism of the CTS by arguing that it is driven by radical-feminists who are uncomfortable with any evidence that women can be as violent as men because it undermines their belief that IPV is an extension of men's desire to subjugate women; \"one", "-25.824491555067652" ], [ "to understand all the reactions of the backlash as originating in themselves. (337) According to Faludi self-help manuals of the 1980s suggested women's power was rooted in surrender and submission to their men and Faludi says that the 1980s therapy books \"blot out the most basic premise of feminist therapy – that both social and personal growth are important, necessary, and mutually reinforcing.\" (338) In 1985 the American Psychiatric Association (APA) added \"pre-menstrual dysphoric disorder\" (PMS), and \"masochistic personality disorder\" to the Diagnostic and Statistical Manual of Mental Disorders (the DSM), thereby, Faludi asserts, causing women's fluctuating hormone", "-25.80175394093385" ], [ "politicized rape, framing it as a larger pattern stemming from women’s oppression rather than a series of random, unexplainable criminal acts. From a feminist standpoint, the only way to completely eliminate rape is to create a society where women and men have equal status.\nWorking from this new feminist definition of rape, anti-rape activists began organizing at the grassroots level, forming the first RCCs. Among the first was the Washington D.C. Rape Crisis Center, founded in 1972 by women identifying with the radical branch of the women’s movement. The D.C. RCC published a pamphlet entitled How to Start a Rape Crisis", "-25.740602262241737" ], [ "secondary health care. And this, when combined with a lack of education, only permeates the lack of information generally known by women about their reproductive rights. Gender-based violence Gender-based violence is another way that women are subjected to the limitations men create for them and how the patriarchal aspect of society can be perpetuated through marriage. Violence against women has been degreed as a violation of women's rights by the United Nations. Additionally, it is defined as, \"...[A]ny act of verbal or physical force, coercion or life-threatening deprivation, directed at an individual woman or girl that causes physical or psychological", "-25.703779552073684" ], [ "following definition of violence against women: \"violence against women\" is understood as a violation of human rights and a form of discrimination against women and shall mean all acts of gender-based violence that result in, or are likely to result in, physical, sexual, psychological or economic harm or suffering to women, including threats of such acts, coercion or arbitrary deprivation of liberty, whether occurring in public or in private life\". Violence against women may be perpetrated by individuals, by groups, or by the State. It may occur in private or in public. Violence against women may be sexual violence, physical", "-25.695957047573756" ], [ "The movement aims to spread awareness about the issue of violence against women by educating men about the problem. Advocacy against rape Although men's participation in anti-rape activism in American campaigns is still uncommon, some men have proved valuable allies in their positions in shelters, support groups, and rape response teams. Some male activists claim that their efforts are met with mistrust and anger. Much literature about male anti-rape activists involves men experiencing epiphanies about the emotional and psychological impact rape inflicts on its victims. Scholars typically claim that in order to end rape and violence against women, men must", "-25.684186122613028" ], [ "redefined to include both caring for women and being vulnerable to emotional issues such as rape, men will continue to avoid taking action against rape. Advocacy against pornography Some pro-feminist scholars believe that the portrayal of sexuality in pornography has contributed to the rise of sexual violence, misogyny, and the perpetuation of inequality between the sexes. They suggest that the normalization of male-dominated, violent, and degrading sexual acts has led users of pornography to incorporate violence into their own lives. Pro-feminists may assert that these trends in pornography are reflected by increased acts of sexual violence; and also contribute to", "-25.668220038103755" ], [ "How to Be a Woman Overview Caitlin Moran wrote How To Be a Woman with the goal of making feminism more approachable for every woman by telling stories of her own life's struggles. She wants women to stop seeing feminists as radical man-haters and to start seeing them as advocates for true equality. In her book Moran calls out any woman who doesn't identify as a feminist saying that all women are inherently feminists unless they reject any notion of personal freedom. Being labeled as a feminist could be positive or negative. Moran tells her own feminist stories using", "-25.66133975170669" ], [ "Rise is an NGO working to implement a bill of rights for sexual assault victims. The Rape, Abuse & Incest National Network (RAINN) is an American group which carries out programs to prevent sexual assault, help victims, and to ensure that rapists are brought to justice. The Victim Rights Law Center is an American non-profit organization that provides free legal services to victims of rape and sexual assault. In the United States, the Office on Violence Against Women works to administer justice and strengthen services for victims of domestic violence, dating violence, sexual assault, and stalking. In South Africa, People", "-25.619351328074117" ], [ "Others link rape culture to modernisation and industrialisation, arguing that pre-industrial societies tend to be \"rape free\" cultures, since the lower status of women in these societies give them some immunity from sexual violence. In industrial rape cultures, women emerge from their homebound roles and become visible in the workplace and other areas traditionally dominated by men, increasing male insecurities that result in their using rape to suppress women.\nOthers also link rape culture to environmental insecurities, where men objectify women as part of their struggle to control their immediate environment. It is also linked to gender segregation, and the belief", "-25.57102427353675" ], [ "underdog through a theory of male domination and female subordination. She also points out a paradox in the fact that feminists work against male violence by envisioning solutions that are muscular and top-down in their power formation:\nIn Foucault's terms, they have not learned - they do not want to learn - how to cut off the head of the king. They seek to wield the sovereign's scepter and especially his sword. Criminal law is their preferred vehicle for reform and enforcement; and their idea of what to do with criminal law is not to manage populations, not to warn and", "-25.544747575186193" ], [ "entailing the obligation on women to be sexually available virtually without limit, though sex may be culturally proscribed at certain times, such as after childbirth or during menstruation.\nSocietal norms around the use of violence as a means to achieve objectives have been strongly associated with the prevalence of rape. In societies where the ideology of male superiority is strong, emphasizing dominance, physical strength and male honor, rape is more common. Countries with a culture of violence, or where violent conflict is taking place, experience an increase in almost all forms of violence, including sexual violence. Global trends and economic factors", "-25.5344907606559" ], [ "of violence perpetrated against them. Pornography Radical feminists, notably Catharine MacKinnon, charge that the production of pornography entails physical, psychological, and/or economic coercion of the women who perform and model in it. This is said to be true even when the women are presented as enjoying themselves. It is also argued that much of what is shown in pornography is abusive by its very nature. Gail Dines holds that pornography, exemplified by gonzo pornography, is becoming increasingly violent and that women who perform in pornography are brutalized in the process of its production.\nRadical feminists point to the testimony of well", "-25.532539537685807" ], [ "system is to blame for the murder of women rather than violent individuals. It is cross-cultural on a mass scale, and is suggested to be considered as a human rights violation by the Women's Studies International Forum. While authors acknowledge \"crimes are committed by individuals and not by abstract entities,\" the prevalence of domestic violence constitutes it as an epidemic. Contemporary feminists believe that re-framing intimate partner violence as a state crime and a crime against humanity will have a \"transformative effect\" on the reduction of violence against women committed by their significant others, as it is already recognized as", "-25.52663652705087" ], [ "and is generalized through terror that is justified through established national discourses. During times of war, mass rape can be seen as an effective way to \"feminize\" one's enemy by violating “his women, nation and homeland,” thus proving that he is incapable of being an adequate protector. The raping of women in this process seeks to destroy the very \"fabric of society, as women are seen as the symbolic bearers of ethno-national identity because of their roles as biological, cultural, and social reproducers of society itself\". Civilian perpetrators In June 2010, UK aid group Oxfam reported a dramatic increase in", "-25.511856333061587" ], [ "that women enjoy or in some way benefit from rape, torture, or other forms of sexual violence. Other research has found similar outcomes (e.g., Allen et al., 1995). The viewing of coercive pornography relates to the strongest acceptance of rape myths, i.e. women want to be raped, women \"ask for it\", women want to be forced. Considering the commodification and objectification argument, concern exists that repeated exposure to coercive pornographic stimuli relates to increasingly negative attitudes toward women. More frequent use increased the dehumanizing effect of Internet pornography and led to more acceptance of violence toward women.\nPornography has been", "-25.488603019994116" ], [ "as \"striking back\" when such questions revealed that women scored equal to or higher than men in desires to use violence out of simple anger or to coerce and control the partner. This, however, is contradicted by other reviews which found women's primary motivation were triggered by anger or self-defense while men's motivation was more about control. Some studies have also postulated that when other factors such as allowing both or neither gender to claim self-defense, or simply including male victims and female perpetrators in the sample, the results were at or near parity for perpetrators and victims, with the", "-25.47124457138125" ], [ "women as being extremely passive, or that the acts which are performed on the women are typically abusive and solely for the pleasure of their sex partner. On-face ejaculation and anal sex are increasingly popular among men, following trends in porn. MacKinnon and Dworkin defined pornography as \"the graphic sexually explicit subordination of women through pictures or words\".\nRadical feminists say that consumption of pornography is a cause of rape and other forms of violence against women. Robin Morgan summarizes this idea with her oft-quoted statement, \"Pornography is the theory, and rape is the practice.\" They charge that pornography eroticizes the", "-25.43690852558575" ], [ "that the definition of sex work as inherently violent has created a “moral panic” that influences political discourse. They contend that this \"panic\" has led to the construction of a trafficking victim who may actually be a woman migrating for work. These feminists argue that this can backfire because it does not protect those women who voluntarily enter into sex work. Criminalization Opponents of the sex workers' rights movement, such as Melissa Farley and Janice Raymond, argue that prostitution should be abolished because legalization can increase incidences of human trafficking. The New UN Trafficking Protocol by Raymond argues that many", "-25.421947056311183" ], [ "reinforcing forms of violence: against women, against other men, and internalized against oneself.\n“Men, Feminism, and Men’s Contradictory Experiences of Power” (1994 and revised in 1999) built on the argument of his book, Cracking the Armour: Power, Pain and the Lives of Men to look at the contradictory nature of men’s power.\nHis article, “The 7 P’s of Men’s Violence” (1999) has been translated into more than a dozen languages. It draws on key points of a feminist analysis of men’s violence.\n“The AIM Framework: Addressing and Involving Men and Boys to Promote Gender Equality and End Gender Discrimination and Violence” (2001) synthesizes", "-25.416805619723164" ], [ "accomplish this task of insuring survival for an entire sex, we must simultaneously address ourselves to the social and material source of sexism: the capitalist form of production and distribution of products, characterized by intrinsic class, race, sex, and caste oppression. When we work for the revolutionary transformation of capitalism into a socialist society, we work for a world in which all people may enjoy the right of full humanity and freedom from poverty, war, racism, sexism, homophobia, anti-Semitism, and repression.\nRadical Women calls for a multi-racial, multi-issue, working class and anticapitalist approach to women's liberation. The group looks to the", "-25.415006026174524" ], [ "Opposing Women Abuse (POWA) is a women's rights organisation that provides services and engages in advocacy to promote women's rights and improve women's quality of life.", "-25.39940513620968" ], [ "is not. Thus, she concludes that radical feminists are looking at pornography as a quick fix to a much larger societal problem. Sex-positive feminist Sex-positive feminists believe that no form of sexual expression should be vilified, except that which is not consensual. One of the main advocates of this feminist perspective is Carol Queen. She argues that radical feminists probably generalize too widely as far as women are concerned, and do not take into consideration more complicated circumstances such as sadomasochism and prostitution. Elisa Glick also states that configurations of power within relationships do not prevent women from exercising it", "-25.36810398295347" ], [ "the product of individuals who have decided to disregard the overwhelming cultural message that rape is wrong. The report argues that the trend towards focusing on cultural factors that supposedly condone rape \"has the paradoxical effect of making it harder to stop sexual violence, since it removes the focus from the individual at fault, and seemingly mitigates personal responsibility for his or her own actions\".\nProfessor Camille Paglia has described concerns about rape culture as \"ridiculous\" and \"neurotic\", an artifact of bourgeois liberal ideologies that people are essentially good and that all social problems can be remedied with education. This rape", "-25.367926742706914" ], [ "victim. Juan Carlos Ramírez explains that given the socially accepted model of femininity as one of submission, passivity and abnegation, whatever behavior does not follow this stereotype will be perceived in an exaggerated manner as abnormal and violent. Thus, women will be perceived as disproportionately aggressive even if merely defending themselves.\nMeta-analyses of the research find that the overwhelming majority of women's IPV against male partners is in the context of being victimized. A 2010 systematic review of the literature on women's perpetration of IPV found that anger, self-defense and retaliation were common motivations but that distinguishing between self-defense and retaliation", "-25.365201134143717" ], [ "accused of sexually harassing Anita Hill, an attorney whom he supervised during his time at the Department of Education and the EEOC. Using this example, Walker addresses the oppression of the female voice and introduces the concept of Third-wave feminism. She defines \"third-wave feminism\" at the end of the article by saying \"To be a feminist is to integrate an ideology of equality and female empowerment into the very fiber of life. It is to search for personal clarity in the midst of systemic destruction, to join in sisterhood with women when often we are divided, to understand power structures", "-25.331261861225357" ], [ "Save the Males Contents Parker claims \"as feminism has reached most of the goals of equality... women have become hostile toward men and maleness in what seems to be a spirit of retributive justice.\" There are arguments for the idea that feminism has transformed from being something that was supposed to help women gain power in society. Instead it has become a tool for modern women to put men down. Using references to popular culture such as Murphy Brown and The Vagina Monologues, Parker points out how the media has slowly begun to portray men as brutish idiots or sexual", "-25.2931296783554" ], [ "acts, coercion or arbitrary deprivation of liberty, whether occurring in public or in private life.\nand identifies three forms of such violence: that which occurs in the family, that which occurs within the general community, and that which is perpetrated or condoned by the State. It also states that \"violence against women is a manifestation of historically unequal power relations between men and women\".\nViolence against women remains a widespread problem, fueled, especially outside the West, by patriarchal social values, lack of adequate laws, and lack of enforcement of existing laws. Social norms that exist in many parts of the world hinder", "-25.291181951659382" ], [ "Violence against women in the United States Violence against women in the United States is the use of domestic abuse, murder, sex-trafficking, rape and assault against women in the United States. It has been recognized as a public health concern. Culture in the United States has led towards the trivialization of violence towards women, with media in the United States possibly contributing to making women-directed violence appear unimportant to the public. History The history of laws and cultural taboos have a current effect on how new sexual assault laws are drafted, how the laws are applied by law enforcement and", "-25.284622718958417" ], [ "believed and why—and how women are questioned especially when they speak out about abuse, harassment, and rape. The piece was previously published in Harper's Magazine. #YesAllWomen: Feminists Rewrite the Story (2014) In this essay, written in response to the 2014 Isla Vista killings and the #YesAllWomen movement it gave rise to, Solnit meditates on the power of naming and language throughout feminist history, touching on the coinage of now commonplace phrases such as \"sexual harassment\", \"domestic violence\", and \"rape culture\". Previously published as \"Our Words Are Our Weapons\" on TomDispatch. Pandora’s Box and the Volunteer Police Force (2014) The final", "-25.268724890542217" ], [ "Protestants oppose pornography because it encourages non-procreative sex, encourages abortion, and can be connected to the rise of sexually transmitted diseases.\nConcerned Women For America (CWA) is a conservative organization that opposes same-sex marriage and abortion. When discussing violence against women, the CWA often uses pornography to illustrate their points. The CWA asserts that pornography is a major reason why men inflict harm on women. The CWA argues that pornography convinces men to disrespect their wives and neglect their marriages, thereby threatening the sanctity of traditional marriage. Unlike other issues CWA has tackled, they are less forcefully anti-feminist when it comes", "-25.251046731718816" ], [ "bring about both violence and peace. For example, reports of violence against civilians tend to emphasize that \"women and children\" as victims to illustrate the brutal nature of violence. Conversely, this framing also implies that men are not victims, despite male victims of sexual violence or the gender-based violence of killing men because they are men.\nGender essentialism also assumes that women are innately peaceful, usually due to their experience as mothers, which is one of the main reasons that people use to argue for including women in peace processes. Another frequently cited gender essentialist argument is that women are natural", "-25.24612345144851" ], [ "process of eliminating women from war is a tool used to discredit women as agents in the international arena. A focal point for many feminist scholars is mass rape during wartime. These scholars will seek to explain why wartime sexual violence is so prevalent through history and today. Some scholars turn to explanations such as rape as a weapon or as a reward for soldiers during the war. Others see sexual violence as an inevitable consequence when social restraints are removed. Feminist Anti-Militarism Feminists within IR often look to how conceptions of masculinity have shaped foreign policy, state identity, and", "-25.237509421858704" ], [ "down or build each other up. I choose the latter.\" Donald Trump Jr. tweeted, \"Sad, but not surprising to watch self professed 'feminists' launching sexist attacks against @IvankaTrump. In their crazed world, sexism is OK if hurts their political enemies. That's ok, they can go put on their stupid hats & she’ll get back to actually fighting for women.\"", "-25.219234090211103" ], [ "attack, it can be used in victim blaming. A “rape supportive” society refers to when perpetrators are perceived as justified for raping. Male victims are more often blamed by society for their rape due to weakness or emasculation. The lack of support and community for male rape victims is furthered by the lack of attention given to sexual assaults of males by society. \nIt has been proposed that one cause of victim blaming is the just world hypothesis. People who believe that the world is intrinsically fair may find it difficult or impossible to accept a situation in which", "-25.215620535309426" ], [ "has launched key interventions to enhance gender equality around the world. \"Despite progress in women’s status in recent decades, the lives of millions of girls and women are still overshadowed by discrimination, disempowerment and poverty.\" \"Millions of women...are subject to physical and sexual violence, with little recourse to justice.\"\nIn 2007, Veneman helped launch a partnership with renowned US playwright and ‘V-Day’ founder Eve Ensler in 2007, to bring awareness and change to the sexual abuse and violence of women in the DRC. ‘Stop Raping our Greatest Resource’ is a campaign initiated by the women of eastern DRC along with", "-25.2072211446648" ], [ "to engage with mainstream institutions, the ability of gender mainstreaming to deconstruct the embedded masculinization of institutions varies depending on the characteristics of the policy, the political nature of the institution, and the depth of the institution's consultation with civil society and other members of the women's rights movement. The danger of gender mainstreaming is that large compromises can be made for small gains and can lead to what feminist and sociology professor Carol Dines calls \"trickle-down feminism\"—i.e., \"working to increase the ranks of women in elite jobs without a strategy for wider economic and social change represents a kind", "-25.20253160689026" ], [ "third-wave. Although, the age criteria for second-wave feminists and third-wave feminists is murky, younger feminists definitely have a hard time proving themselves worthy as feminist scholars and activists.\" Violence against women Violence against women, including rape, domestic violence, and sexual harassment, became a central issue. Organizations such as V-Day formed with the goal of ending gender violence, and artistic expressions, such as The Vagina Monologues, generated awareness. Third-wave feminists wanted to transform traditional notions of sexuality and embrace \"an exploration of women's feelings about sexuality that included vagina-centred topics as diverse as orgasm, birth, and rape\". Reproductive rights One of", "-25.195293803786626" ], [ "goals, with feminism then largely coming under state control. These forces converged in the 1990s, as lipstick feminism, consumerist feminism and American queer theory were rejected and women started to make demands around gender and sexist violence in response to events like the murder of Ana Orantes in Granada on 17 December 1997. This led to media discussions around the portrayal of women and violence against women. Jokes about women being hit by boyfriends and husbands were no longer acceptable on television. This violence against women, coupled with female activists using the Internet to mobilize", "-25.17053024712368" ], [ "reform that promotes gender equality, challenges discrimination, and provides an effective response to existing violence.\nEGM notes 63 to 102\n Other key findings from the EGM. Report recommendations Recommendation 103\n\nExperts stressed the critical importance of women's organisations, civil society, international institutions, donors and States working together to go beyond 'ad hoc' approaches to prevention, and for States to take their responsibility for developing long-term and multi-sectoral strategies so that activity can be coordinated, and evidence built, to achieve real results. With an increased commitment from all actors to such an approach, and corresponding investment, many experts believed violence against women and", "-25.166412149814278" ], [ "An Illustrated Guide to the Economic Progress of Women in America, a 1999 book published in part by the IWF, with \"debunk[ing] much of the feminists' voodoo economics.\" Writing in Capitalist Magazine, John Stossel cited Michelle Bernard's 2007 book Women's Progress as evidence that \"American women have never enjoyed more options or such a high quality of life.\"\nSome writers have asserted that feminist rhetoric is used by the IWF for anti-feminist ends. A New York Times editorial described the IWF as \"a right-wing public policy group that provides pseudofeminist support for extreme positions that are in fact dangerous to women.\"", "-25.155997629837657" ], [ "\"rape is nothing more or less than a conscious process of intimidation by which all men keep all women in a state of fear\". Some feminists assert that male domination of women in socio-political and economic domains is the ultimate cause of most rapes, and consider male-female rape to be a crime of power that has little or nothing to do with sex itself. However, a 1983 study comparing 14 indicators of male dominance and the incidence of rape in 26 American cities found no correlations, except one where greater male dominance actually decreased the incidence of rape. Social learning", "-25.12507322683814" ], [ "will guarantee women the rights of their freedom and their intelligence. Humanity can not be retrograde. [...] Her intelligence, cultivated, will improve the moral faculties and make her exercise the inevitable influence that nature gives her in the great destinies of humanity; yes; because the mission of the woman is serious and great. First-wave Feminism in the country emerged at the end of the 19th century and the beginning of the 20th century, during the consolidation of the modern Argentine State. There was not a homogenous feminist movement, rather individual struggles carried out by women inserted in diverse political identities", "-25.086481785158867" ], [ "organization in every respect, including our approach to feminist struggles.\" DGR's radical feminism views gender, by definition, as a social system created by patriarchy to coercively and violently control behavior of both males and females; however, within this system, men and masculinity are privileged, while women are trained into subordinated behavior and routinely targeted for institutionalized and socially sanctioned violence due to their sex and/or gender role.\nDGR's stance on gender has led some to interpret DGR as transphobic. The controversy especially swelled when a transitioning member of DGR, identifying as a woman, requested to join a women's communal sleeping and", "-25.078590583405457" ], [ "work to better accommodate women. Cultural feminism Cultural feminists contend that the solution to attaining legal equality must come from procedural reform that embraces the differences between men and women. The challenge here derives from acknowledging various differences between men and women without further reinforcing gender stereotypes or promoting sexist practices. As such, the government must intervene insofar as it promotes laws that embrace only the immutable differences between the sexes—such as pregnancy—with the ultimate goal being equal recognition to women's moral voice of caring and communal values. Specifically, whereas women emphasize the importance of relationships and reconciliation of conflicting", "-25.069933640421368" ], [ "lead at 20 percent.\". While this study concerned American cities, a global trend is developing, and has now been termed \"the reverse gender gap.\"\nFeminist theory generally defines gender as a social construct that includes ideologies governing feminine/masculine (female/male) appearances, actions, and behaviors. An example of these gender roles would be that males were supposed to be the educated breadwinners of the family, and occupiers of the public sphere whereas, the female's duty was to be a homemaker, take care of her husband and children, and occupy the private sphere. According to contemporary gender role ideology, gender roles are continuously changing.", "-25.05816682986915" ], [ "against Women considers the criminalization of abortion a \"violations of women's sexual and reproductive health and rights\" and a form of \"gender based violence\"; paragraph 18 of its General recommendation No. 35 on gender based violence against women, updating general recommendation No. 19 states, \"Violations of women’s sexual and reproductive health and rights, such as forced sterilizations, forced abortion, forced pregnancy, criminalisation of abortion, denial or delay of safe abortion and post abortion care, forced continuation of pregnancy, abuse and mistreatment of women and girls seeking sexual and reproductive health information, goods and services, are forms of gender based violence", "-25.05678750955849" ], [ "applied.\" S. E. Smith at the online magazine xoJane asserted that \"we need to talk openly not just about how many MRAs [men's rights activists] like Roosh promote rape and violence against women, but how many of them may be rapists themselves\".\nValizadeh has since said that the post was meant as satire, arguing that its very title indicates that it was not intended as pro-rape advocacy. He also said that even if studies were to show that legalizing rape would reduce the number of rapes, feminists would still oppose any legislation that solved the problem in a way that didn't", "-25.054031696377933" ], [ "Third-wave feminism History The rights and programs gained by feminists of the second wave served as a foundation for the third wave. The gains included Title IX (equal access to education); public discussion about the abuse and rape of women; access to contraception and other reproductive services (including the legalization of abortion); the creation and enforcement of sexual-harassment policies for women in the workplace; the creation of domestic-abuse shelters for women and children; child-care services; educational funding for young women; and women's studies programs.\nFeminist leaders rooted in the second wave such as Gloria Anzaldúa, bell hooks, Cherríe Moraga, Audre Lorde,", "-25.04926902113948" ], [ "women's responses to being raped conflicted with women's experience and were based on unsound methods. She rejected their argument that rape is sexually motivated, arguing that from the perspective of a raped woman, there is no distinction between the tactic employed in rape, violence, and the motivation for rape. She also criticized their distinction between \"instrumental force and excessive force\", arguing that it ignored the victim's perspective. She also argued that they ignored evidence that substantiated the social science account of rape. She criticized them for ignoring forms of violence against women other than rape, and argued that their conception", "-25.043806559566292" ], [ "Feminist views on pornography Harm to women during production Anti-pornography feminists, notably Catharine MacKinnon, charge that the production of pornography entails physical, psychological, and/or economic coercion of the women who perform and model in it. This is said to be true even when the women are being presented as enjoying themselves. It is also argued that much of what is shown in pornography is abusive by its very nature. Gail Dines holds that pornography, exemplified by gonzo pornography, is becoming increasingly violent and that women who perform in pornography are brutalized in the process of its production.\nAnti-pornography feminists point to", "-25.024438380409265" ], [ "actions and sexuality. Wendy McElroy, a prominent individualist feminist, shared her views of pornography by saying \"Individual feminism insists on the principle of self-ownership: a woman's body, a woman's right. It insists that women be free to choose, regardless of the content of their choices.\" McElroy's quote embodies the ideals behind women's pornography according to individualist feminism and leads to the thought process that a woman can exploit her sexuality using her own discretion, through lesbianism, pornography, masturbation, or any consensual sexual act. Statistics There are many concerns that mainstream, male oriented pornography causes rape and sexual aggression in males,", "-25.01981723945937" ], [ "There have also been movements by men aimed at changing the culture through personal reflection and future action, including #IDidThat, #IHave, and #IWill. Awareness and empathy Analyses of the movement often point to the prevalence of sexual violence, which has been estimated by the World Health Organization to affect one-third of all women worldwide. A 2017 poll by ABC News and The Washington Post also found that 54% of American women report receiving \"unwanted and inappropriate\" sexual advances with 95% saying that such behavior usually goes unpunished. Others state that #MeToo underscores the need for men to intervene when they", "-25.007138649307308" ], [ "of rape for the purpose of the public funding of abortion; and workplace discrimination against women.\nWhile used in other contexts, and prior to 2010, it became a common slogan in American political discourse after the 2010 congressional elections. The term is often used to describe opposition to the contraceptive mandate in Obamacare and policies to defund women's health organizations that perform abortions, such as Planned Parenthood.\nThe concept again gained attention in the 2016 U.S. presidential election, when Republican nominee Donald Trump drew notice for a history of inflammatory statements and actions toward women.\nThe phrase and the concept have been criticized", "-24.997285306453705" ], [ "progressives—including Hillary Clinton—that one should default to believing rape accusers, the Broaddrick allegation thus poses a problem.\" Michelle Goldberg of Slate wrote in a late 2015 essay, \"our rules for talking about sexual assault have changed since the 1990s, when these women were last in the news. Today, feminists have repeatedly and convincingly made the case that when women say they've been sexually assaulted, we should assume they're telling the truth. Particularly when it comes to Broaddrick, it's not easy to square the arguments against believing her with the dominant progressive consensus on trusting victims. This is a tension that", "-24.99097522071679" ], [ "goes on to say that it \"directly illustrates a power system wherein social structures or institutions cause harm to people in a way that results in maldevelopment or deprivation\". Rather than the term being called social injustice or oppression, there is an advocacy for it to be called violence because this phenomenon comes from, and can be corrected by human decisions, rather than just natural causes. Cause and effects In The Sources of Social Power, Michael Mann makes the argument that within state formation, \"increased organizational power is a trade-off, whereby the individual obtains more security and food in exchange", "-24.976314664119855" ], [ "be vented through escape tactics, including joining outlawed groups. The Strategy also employs other effective means to prevent violent extremism, including the integration of Preventing of Violent Extremism through Education (PVE-E) in curricula and school programs; adopting a multi-sectoral and multi-stakeholder approach; encouraging student participation through student governance processes and peer-to-peer education; and the involvement of media as a stakeholder. Gender disparity While it is being increasingly reported that women play an active role in violent extremist organizations and attacks as assailants and supporters, men are still more often the perpetrators of violent extremist acts and therefore the targets of", "-24.957384142966475" ], [ "and alcohol is legally incapable of giving consent and someone who has sex with an incapacitated person can be prosecuted for rape. Purpose The goal of Green Dot is to implement a bystander intervention strategy that prevents and reduces power-based personal violence. Power-based violence includes: sexual violence, domestic violence, dating violence, stalking, child abuse, elder abuse, and bullying. The curriculum is created from the concepts and lessons learned through research and theory across disciplines including: violence against women, diffusion of innovation, public health, social networking, psychology, bystander dynamics, perpetration, and marketing/advertising.\nA Green Dot is a behavior, choice, or action that", "-24.946782926235755" ], [ "social and sexual freedoms as men,” (Finn, 2012). First-wave feminism First-wave feminism refers to the feminist movement of the 19th and early 20th century. At this time, women had little control over their lives. Generally, they were housewives who were uneducated and possessed no property or economic rights. Their lives were overwhelmingly limited creating discontent in the context of being limited to roles such as motherhood or wife-hood.\nFeminists of the time (mostly middle-class white women) focused on the legal disabilities of women, especially women's suffrage. The first wave began at the Seneca Falls Convention of 1848, in which Elizabeth Cady", "-24.94598245364614" ] ]
2j6f43
Why can't alcohol commercials actually show anyone drinking the product?
[ "Legally, they can show it, however unofficially, it is banned based off previous agreements and codes of conduct and network guidelines. What does that all mean? It means while the govt hasn't specifically prohibited commercials from showing alcohol consumption, among advertisers and tv stations/channels its an official (but not legally binding) agreement that they simply do not show people drinking alcohol in a commercial, if you want your commercial to air. There is not much demand to change this, so it goes on.", "You just saw the Heineken commercial with nph right?", "Because it makes white moms in America uncomfortable.", "In Australia they show people drinking and going \"ahhhh\"", "In America there is no government rule/law against it, but [each network self-regulates]( URL_0 ) > A spokeswoman for The Beer Institute, the voice of brewers, told us their members are loath to take chances with network policy. > \"If you’re putting an ad together, you will be as conservative as possible so you know it will get past all the networks,\" said Megan Kirkpatrick, director of communications at the Institute. > Kirkpatrick said the brewers have no desire to stir things up and risk stirring a cry for a new law. > \"The fact that it is self-regulated now, that’s not something brewers would want to put in jeopardy,\" Kirkpatrick said. \"It’s the way they have operated for decades. You show a lot of people enjoying a football game or enjoying a baseball game but you don’t show any consumption. I don't think you’re going to see that change.\"", "Here in Germany you can show alcohol consumtion in comercials but i heared it's forbidden to hold the bottle above a specific angle because it's considered as alcoholism", "In India, any commercial for alcohol is banned. To get around this, alcohol companies run commercials for drinking water and music CDs!", "A lot of beer adds in belgium show people (men) drinking for example all the Jupiler ads end with a Guy chugging beer", " URL_1 URL_0 both of these have people drinking the product... is this a US law maybe?" ]
[ [ "is placed.\nCurrently, the standard is that alcohol advertisements can only be placed in media where 70% of the audience is over the legal drinking age. Alcohol advertising's creative messages should not be designed to appeal to people under the age of 21, for example, using cartoon characters as spokespeople is discouraged. Advertising cannot promote brands based on alcohol content or its effects. Advertising must not encourage irresponsible drinking. Another issue in media placement is whether media vendors will accept alcohol advertising. The decision to accept an individual ad or a category of advertising is always at the discretion of the", "-31.07262314276886" ], [ "owner or publisher of a media outlet.\nIn 1991, U.S. Surgeon General Antonia Novello criticized alcoholic beverage companies for \"unabashedly targeting teenagers\" with \"sexual imagery, cartoons, and rock and rap music\" in television and print ads. The Federal Trade Commission conducted an investigation in 2002 into possible targeting to those under the age of 21. However, this investigation and those of some scholars have not found evidence of such targeting. Concerns exist that irresponsible advertising practices or \"pushing the envelope\" with audience composition may lead to permanent legislation governing the advertising of beverage alcohol. Asia In Malaysia, alcohol advertising on radio", "-29.43665547811179" ], [ "Waiters, Andrew J. Treno, and Joel W. Grube's discussions with a sample of youth, ages 9–15, support this claim. They found that these youth saw the purpose of beer commercials is to urge people to buy the product based on not only its quality, but also on \"its relationship to sexual attractiveness.\" They see the \"attractive young adults drink beer to personally rewarding ends\" and the \"youth-oriented music\" and are influenced to drink alcohol. United States In the United States, spirits advertising has self-regulatory bodies that create standards for the ethical advertising of alcohol. The special concern is where advertising", "-29.16037690755911" ], [ "Alcohol advertising in Thailand Alcohol advertising in Thailand is regulated by the Alcoholic Beverage Control Act, BE 2551 (2008). Under section 32 of the law, alcoholic beverages may not be advertised in a manner which directly or indirectly claims benefits or promotes its consumption, and may not show the product or its packaging. Under a declaration issued in an order with the act, all advertisements must also be accompanied by one out of five predefined warning messages, lasting at least two seconds for video advertisements or occupying at least 25 percent of the advertisement area for print media.\nPrior to the", "-28.79401949379826" ], [ "that young people are aware of the most heavily advertised cigarette brands.\" Alcohol is portrayed in advertising similarly to smoking, \"Alcohol ads continue to appeal to children and portrayals of alcohol use in the entertainment media are extensive\". The consumption of alcohol is glamorized and shown without consequences in advertisements, music, magazines, television, film, etc. The advertisements include alcoholic beverages with colorful packaging and sweet tasting flavors, catering to the interests and likes of children and teens. The alcohol industry has a big financial stake in underage drinking, hoping to gain lifelong customers. Therefore, the media are overrun with alcohol", "-28.70951560535468" ], [ "is only allowed after 10:00 pm. Europe In Russia, advertising alcohol products is banned from almost all media (including television and billboards) since January 2013. Before that, alcohol advertising was restricted from using images of people drinking since mid-2000s.\nIn Sweden, since 2010 advertisements are legal for wine and beer, but not on television and radio. Non-periodic magazines are allowed to advertise alcoholic beverages above 15%. These advertisements must contain warnings, but which are worded less strongly than the warnings on tobacco products - for example, \"Avoid drinking while pregnant,\" as opposed to \"smoking kills.\" These rules were introduced into the", "-28.61657913090312" ], [ "that sold alcoholic beverages illegally, and they are still in use today. The operator of an establishment (such as a saloon or bar) would charge customers to see an attraction (such as an animal) and then serve a \"complimentary\" alcoholic beverage, thus circumventing the law.\nIn desperate cases it has to betake itself to the exhibition of Greenland pigs and other curious animals, charging 25 cents for a sight of the pig and throwing in a gin cocktail gratuitously.\n[They] are in a mysterious place called a blind tiger, drinking the very bad whiskey for which Prohibition is indirectly responsible.\n\"Blind tiger\" also", "-28.609565318300156" ], [ "monitors consistent market separation between spirits and ethanol for consumption purposes and ethanol for industrial purposes, which is tax-free. Advertising provisions The SAB ensures compliance with the advertising rules for spirits provided for in the Alcohol Act, which permit product-related advertising only. Portraying a certain lifestyle in relation to spirits is not permitted. It attaches great importance to providing advertising-specific advice. Prior to publication, advertising drafts can be checked free of charge for their compliance with the Alcohol Act on the SAB's own specially developed web portal. Trade regulations The SAB issues permits for wholesale trade. A cantonal retail permit", "-28.26651819096878" ], [ "Alcohol advertising Malt liquor The target market for malt liquor in the United States has been among the African-American and Hispanic populations in cities. Advertisers use themes of power and sexual dominance to appeal to customers. Critics have objected to ads targeting this segment of the population, which suffers disproportionately high rates of alcohol-related illness and poor access to medical care. Among adolescents Peter Anderson and his colleagues performed longitudinal studies and concluded that \"alcohol advertising and promotion increases the likelihood that adolescents will start to use alcohol, and to drink more if they are already using alcohol.\" Elizabeth D.", "-28.23029774227325" ], [ "The other petitioner, Peoples Super Liquor Stores, Inc., operated several liquor stores in Massachusetts, which Rhode Islanders used. The complaint original began, because 44 Liquormart attempted to run an advertisement, which the Supreme Court of the United States described as:\nThe advertisement did not state the price of any alcoholic beverages. Indeed, it noted that “State law prohibits advertising liquor prices.” The ad did, however, state the low prices at which peanuts, potato chips, and Schweppes mixers were being offered, identify various brands of packaged liquor, and include the word “WOW” in large letters next to pictures of vodka and", "-27.914901947719045" ], [ "and televisions was outlawed in 1995. On Malaysian television, alcohol advertising is not shown before 10:00 pm and during Malay-language programs. However, non-Malay newspapers and magazines are allowed to continue alcohol advertising. Supermarkets and hypermarkets have also been criticized for advertising alcohol products on trolleys, which is controversial because Islam is the state religion of the country. After the ban of alcohol advertising on Malaysian radio and televisions, they continued to build the brands with sponsorships of concerts and entertainment events.\nIn Singapore, alcohol advertisement is not allowed to be shown during programmes intended for children and young persons and during", "-27.870894491148647" ], [ "Alcohol advertising on college campuses Research and statistics According to an economic research done by Henry Saffer, who is a PH.D researcher for the National Bureau of Economic Research, \"Product personalities are designed to appeal to specific market segments. For example, in targeting young people, Coors beer is associated with an unspoiled wilderness, whereas Budweiser is associated with athletic success\". By sending these messages to its audiences, beer companies make sure those students consume their specific brand of alcohol so that they can appear more athletic or whatever lifestyle the ads promise. The more appealing the beer and alcohol companies", "-27.6171091820288" ], [ "44 Liquormart, Inc. v. Rhode Island Background In 1956, the Rhode Island Legislature passed two regulations restricting the content of alcohol advertisements. The first prevented both in and out-of-state manufacturers, wholesalers, and shippers from “advertising in any manner whatsoever” the price of any alcoholic beverage offered for sale in Rhode Island. The second prevented Rhode Island news media from “mak[ing] reference to the price of any alcoholic beverages” under any circumstances.\nIn 1985, a liquormart brought a suit against the liquor control commissioner, arguing, among other things, that the first regulation, which prevented the liquormart from advertising its prices, was", "-27.03952493390534" ], [ "and some bitters. As a consumer product, it is almost always mixed with other beverages to create drinks like alcoholic punch or Jello shots or is sometimes added to cocktails in place of vodka or rum. It is also used to make homemade liqueurs, such as limoncello or cassis, and in cooking because its high concentration of alcohol acts as a solvent to extract flavors. Rectified spirits are also used for medicinal tinctures and as a household solvent. It is sometimes consumed undiluted; however because the alcohol is very high proof, over consumption can cause alcohol poisoning more quickly than", "-27.021469556260854" ], [ "to occur in an era where commercials for beer and Viagra are both \"very sexual\" and \"practically omnipresent\". Jackson also said the mishap was \"not intentional\" and a \"costume accident\", also commenting on some media outlets editing her taped apology, saying, \"Sometimes they cut out that I said it was an accident...That's what the media does, that's the way they are because they want it to be told a different way.\" In Glamour Magazine, Janet exclaimed, \"It's hard to believe that there's a war and famine going on in the world and yet people made such a big deal about", "-26.8613126387354" ], [ "usually promote alcoholic beverages, banking services, credit cards, or cars. Although women also promote cars, advertisements involving women are usually highly dependent on their sexuality, which is not the case for those with men, who are shown in these ads in an elegant and powerful way. Also, when men are acting on a television commercial, they are usually performing activities such as playing sports, driving around girls, repairing cars, drinking, relaxing, and having fun.\nAlso, when a man is promoting on an advertisement, they usually speak about the product and do not use it. They seem to be the beneficiary of", "-26.676824876019964" ], [ "or sealed, but instead poured into unlabeled used bottles. The spirit can be bought wholesale from a brewer or by the glass at boutiques and bars. Although not professionally advertised, the drink is very popular. This is partially due to its price, which is lower than that of other professionally bottled or imported drinks. Its relative cheapness makes it a drink associated more with the poor, but even those who can afford better quality are said to consume the spirit in secret.\nThe potency of the liquor heavily affects the bodily senses, providing a feeling likened to that of a knockout", "-26.62831249256851" ], [ "Malay-language programmes.\nIn Indonesia, alcohol advertising was legal in the 1990s, but have since been completely banned.\nIn Hong Kong, alcohol advertising is not allowed to be shown during Family Viewing Hour programmes.\nIn the Philippines, alcohol advertising is allowed. Alcohol warning is also shown in the end of the advertisement explaining with the words: \"Drink Moderately\". On January 1, 2016, the warning was changed to \"Drink Responsibly\".\nIn Thailand, alcohol advertisements are still allowed, but must accompanied by a warning message. See Alcohol advertising in Thailand.\nIn Sri Lanka, public advertising on alcohol is banned totally since 2006.\nIn South Korea, public advertising on alcohol", "-26.512564817094244" ], [ "2017, stated:\nAlcohol product labelling could be considered as a component of a comprehensive public health strategy to reduce alcohol-related harm. Adding health labels to alcohol containers is an important first step in raising awareness and has a longer-term utility in helping to establish a social understanding of the harmful use of alcohol.\nA 2014 study in BMC Public Health concluded that \"Cancer warning statements on alcoholic beverages constitute a potential means of increasing awareness about the relationship between alcohol consumption and cancer risk.\" History Increasing calls for the introduction of warning labels on alcoholic beverages have occurred after tobacco packaging warning", "-26.484428806928918" ], [ "of the sale of alcohol to visibly intoxicated persons or minors who subsequently cause death or injury to third parties (those not having a relationship to the business that sold the alcohol) as a result of alcohol-related car crashes and other accidents.\nThe laws are intended to protect the general public from the hazards of serving alcohol to minors and intoxicated patrons. Groups such as Mothers Against Drunk Driving (MADD) have advocated for the enforcement and enactment of dram shop laws across the United States as well as in the United Kingdom, Canada, New Zealand and Australia. The earliest dram shop", "-26.291942260111682" ], [ "used for a car commercial, or maybe one of their songs is used for a mayonnaise commercial. This could be seen as \"the ultimate sellout that offended aesthetic and bohemian values\" Being that the original intent for the song was not intended for random advertisement, musicians may feel cheated.\nOn the other hand, \"by contrast, today advertisements represent one of the best opportunities for many musicians to gain access to mainstream markets (The erasure of antagonisms between popular music and advertising).\" So, a musician having his or her song used in a popular ad may contribute to the success of that", "-26.224841062736232" ], [ "individuals. As of 2014, alcohol warning labels are required in many countries, including Brazil, Colombia, Costa Rica, France, Guatemala, Mexico, Russia, South Africa, Taiwan, Thailand, and the United States. Modern alcohol advertising promotes alcoholic beverages heavily “as though it was not a toxic substance”. The alcohol industry has tried to actively mislead the public about the risk of cancer due to alcohol consumption, in addition to campaigning to remove laws that require alcoholic beverages to have cancer warning labels. Australia In Australia, \"Alcohol beverage makers must label their products with warning labels relating to the risks of drinking during pregnancy.\"", "-26.21274220495252" ], [ "criticizing the ban. \nThe law also included a requirement to blur depictions of alcoholic beverages on television and in films, as was already done for cigarettes, and for bottles to carry health warnings similar to tobacco packaging warning messages.\nA 2011 ban by the TADPK on advertising in sports meant the basketball team Efes Pilsen had to change its name to Anadolu Efes S.K..", "-26.126081968308426" ], [ "parts of the world. In the US alcohol sales are restricted to individuals ages 21 and greater, that rule isn’t universal and some in nations around the world are trying to cope with the effects of marketing and ad campaigns (O’Brian & Carr 2016).” Marketing messages are important based on the roles of the recipient. In the example of a mom she’s expected to judge the quality of goods and purchase based on the needs of children even though the good may not directly be marketed to and for her. “Noting the incongruence between the self-interested, utility maximizing persona one", "-25.954587747284677" ], [ "from functional sports beverages for example) as they realized that this was the only way to attract customers who were used to drinking the market leading brands, by the proposition that they are offering a higher quality alternative to the market leaders.", "-25.76456187198346" ], [ "alcohol industry around the world has also campaigned to remove laws that require alcoholic beverages to have cancer warning labels.", "-25.674552393495105" ], [ "surrogate advertisements According to the inferences drawn from several surveys and interviews, 42 out of 50 people can understand the actual liquor or tobacco product being advertised.\nSurrogate advertisements do impact a consumer's buying decision as well. They also inform consumers about the leading liquor brands and thus promote sales. Current scenario With government now enforcing ban on surrogate advertisements, companies are turning to event sponsorship, event organising, corporate films and more and more innovative integrated marketing communications strategies, though surrogate advertising is still a common practice.", "-25.44430083921179" ], [ "Advertisements strategically use popular music to make a lasting impression on viewers.\nThe ability to be able to attract a consumer to a product usually requires an advertisement to be presented in a memorable way. Whether it be in a catchy, recognizable song or with loud, vivid colors, an effective commercial or advertisement must come across in a fantastic way in order for the consumer to actually consider taking a product into account. The viewer must be drawn to the advertisement for the product to be remembered later. Music is the number one way for companies to entice a consumer or", "-25.38319381524343" ], [ "messages proved successful. The addition of warning labels on alcoholic beverages is historically supported by organizations of the temperance movement, such as the Woman's Christian Temperance Union, as well as by medical organisations, such as the Irish Cancer Society. The impetus to add alcohol packaging warning messages to containers of alcoholic beverages \"reflect[s] a growing evidence base relating to the relationship between alcohol consumption and a range of health problems including cancer, diabetes, cardiovascular disease, overweight and obesity, liver disease, fetal abnormalities, cognitive impairment, mental health problems, and accidental injury\". Even light and moderate alcohol consumption increases cancer risk in", "-25.35175278771203" ], [ "Alcohol packaging warning messages Alcohol packaging warning messages are warning messages that appear on the packaging of alcoholic beverages concerning their health effects. They have been implemented in an effort to enhance the public's awareness of the harmful effects of consuming alcoholic beverages, especially with respect to foetal alcohol syndrome and alcohol's carcinogenic properties. In general, warnings used in different countries try to emphasize the same messages. Warnings for some countries are listed below. Such warnings have been required in alcohol advertising for many years, although the content of the warnings differ by nation.\nA World Health Organization report, published in", "-25.17056151941506" ], [ "enforcement and implementation of the Code simply because it chooses to violate the code in such brazen manner that curing the violation would cause non-trivial complications for a major television series.\" In association with the complaint, Weissman urged in his letter that the Distilled Spirits Council of the United States become more proactive in regulating the distilleries' initiatives in the entertainment industry. \"Our complaint in this instance is not with the portrayal of heavy alcohol consumption, or even with the glorification of such heavy consumption; it is specific to industry sponsorship of and entwinement with such portrayals. Quite different issues", "-25.16772650211351" ], [ "has also filmed commercials for products including Bud Light, Circuit City, Chrysler, Touchstone Energy Cooperatives, and Diet Coke.", "-25.132080509793013" ], [ "such as \"Cars\" and \"Cdss\". Some norae-bang (song bars) establishments have been known to try to pass off these imitations as the real thing, as Korean law prohibits noraebangs marked as such from selling alcoholic drinks within its premises (as opposed to noraejujeom establishments which are allowed to sell alcohol). Cass Light Cass Light is a low-carb pale lager with 4.0% ABV. Cass Ice Light Pale lager style. Cass 2X Cass 2X is 2.9% ABV. Cass Red A pale lager with 6.9% ABV, this lager contains higher amount of alcohol. Cass Beats New from OB since 2015. Cass Lemon Refreshing", "-25.12200032849796" ], [ "drug, intending to release its first products in December 2013. The cups, glasses, and straws/stirrers served at bars and restaurants would look normal but they would immediately change color to warn people when someone slips a date rape drug into their drink. As of 2017, no product had been released.", "-24.99269035202451" ], [ "commercial products loosely based on the concept of \"purple drank\" are marketed in the United States. In June 2008, Innovative Beverage Group, a Houston, Texas-based company, released a beverage called \"Drank\". The commercial product contains no codeine or promethazine, but claims to \"Slow Your Roll\" with a combination of herbal ingredients such as valerian root and rose hips as well as the hormone melatonin.\nSimilar \"anti-energy\" or relaxation drinks on the commercial market use the names \"Purple Stuff\", \"Sippin Syrup\", and \"Lean\". Criticism These commercial products have been criticized for their potential to serve as gateways to the dangerous illegal concoction.", "-24.941241546941455" ], [ "Drink mix About While some are made with sugar, or sold unsweetened, the products are often made with artificial sweeteners such as aspartame, sucralose, cyclamates or saccharin, and often include artificial flavors and colors. Some of the product include vitamins or other nutrients. The products are variously marketed to children, athletes, bodybuilders, dieters, or as a vitamin supplement. Some brands are only sold as drink mixes, while some beverage companies produce powdered versions of their products, as does Gatorade and Ocean Spray. Another form of drink mix is represented by products mixed into milk, such as malted milk, Nesquik, Ovaltine", "-24.94095305260271" ], [ "TV Regulation Act banned liquor and cigarette advertisements; thus, India gradually adopted surrogate advertisements.\nSuch companies usually either go for brand extension and promote the extended products, or promote certain products which might not be available in the market. The excessive pressure of the ban forced companies to focus more on brand building and thus liquor companies started sponsoring and hosting glamorous events, yet many others started distributing t-shirts, caps, key chains, drinking glasses with the brand name displayed on these products.\nSurrogate advertising mandates a requirement for the product being marketed to have a revenue model associated with it. Effectiveness of", "-24.932773077161983" ], [ "do not intervene in underage drinking. Although restrictions are nationwide and well-known, some salespersons violate the law at times. Minors themselves can never be prosecuted for alcohol consumption under age. Supermarkets and stores generally check minors for their identity card. The law is less thoroughly enforced in many bars and restaurants, but this can vary by location. Alcohol consumption in public Public parties are prohibited nationally on Good Friday, and regionally on other holidays such as All Saints' Day. Buying alcohol remains possible at these times. The government maintains the right to restrict or ban the sale of alcohol for", "-24.917544520809315" ], [ "alcohol consumption by 2016. These products were often nearly pure alcohol that could be diluted to a rough approximation of vodka, and were frequently available at all hours via strategically placed vending machines. In the Irkutsk incident, the victims drank scented bath lotion that was mislabeled as containing drinkable ethanol.\nIn the aftermath of the poisoning, regulations on products being used as surrogate alcohols were tightened around the country. Politicians announced a temporary ban on non-food items with more than 25 percent alcohol, which was extended several times. Causes and event In the 2010s, Russia's economy suffered from a financial crisis,", "-24.91707913477876" ], [ "the state and Islam. This can be seen in the rules set by the UAE National Media Council, which regulates media companies, stating that advertisements cannot “blaspheme” Islamic beliefs or “offend the economic system of the State.\" Educational companies cannot disparage other companies in a way that “discredit or unfairly attack” another company. Depictions of alcohol or drug use is illegal in ads along with racism or other offensive ideas. Statements and claims made in advertisements must be accurate. Regulatory bodies can also ask for sentences to be reworded to prevent confusion.\nMuch of the enforcement of these regulations come after", "-24.898380269623885" ], [ "finding their bottles exploding and disappearing when another person uses the SodaStream to make their own beverages; representing a disruption of the soft drink market. The ad was rejected by CBS for its direct attacks towards the two rival companies. A Forbes writer expressed concern that the network may have had intentionally shown protectionism towards the two soft drink companies (who have been long-time Super Bowl advertisers), and drew comparisons to a recent incident where the CBS-owned technology news site CNET was controversially forced by its parent company to block Dish Network's Hopper with Sling digital video recorder from being", "-24.895521563012153" ], [ "buy spirit beverages only from retailers—unless the state in which they live authorizes direct sales. In 42 states legislation has been passed to allow micro-distilleries in their state to sell directly to customers on the premises or at a legally established tasting room. (RN) California, where Stark Spirits is located, is not one of those states.\nGenerally, a micro-distillery has been characterized as one that produces no more than 100,000 cases of spirits annually. A strong case has been made to further reduce the allowable output for a distillery to be labeled a craft distillery to 50,000 cases", "-24.82140737399459" ], [ "one liquor store owner told Nashville Business Journal reporter Julie Hinds that police warned him to stop selling his biggest selling product, Wild Irish Rose, because it encouraged homeless people to linger in the area.\n— Janice Jorgensen, Encyclopedia of Consumer Brands: Consumable Products (1993), p. 492.\nIn 2005, the Seattle City Council asked the Washington State Liquor Control Board to prohibit the sale of certain alcohol products in an impoverished \"Alcohol Impact Area\". Among the products sought to be banned were over two dozen beers, and six wines: Cisco, Gino's Premium Blend, MD 20/20, Night Train, Thunderbird, and Wild Irish Rose. The", "-24.794334597478155" ], [ "had some type of beer advertising such as discount prices, coupons and even alcohol-related messages (e.g. health related messages). According to the CAS team, the frequent advertising of alcohol both on and off campuses is associated to increased alcohol consumption among college students such as binge drinking. \"The lower average alcohol sale prices among on-premises establishments surrounding the college campus, the higher the college binge drinking rate\".\nAnother study was completed by CASA at Columbia University on drinking rates among college students and the findings were that from 1993 to 2005, the rate of binge drinking has rose 16 percent.", "-24.772423677903134" ], [ "International Federation of Spirits Producers History Spirits are alcoholic drinks that include distilled alcohol, such as gin, liqueurs, vodka, rum, whisky, and brandy. They are high value products. Counterfeit products are sold by subterfuge by re-filling branded spirits bottles.\nThe IFSP was set up to combat the counterfeiting of spirits around the world, which is a big industry. Structure It is situated on Holborn Viaduct (A40) in the City of London near City Thameslink railway station. Function It works in over thirty countries around the world to protect consumers against counterfeit spirits.\nIn the UK it works largely with local council trading", "-24.761010951711796" ], [ "Court held it to be regulating entertainment as a means to boost alcohol sales. Though there are provisions within the Criminal Code dealing with nudity, they did not conflict with the provincial law, as breach of the latter could result in suspension or cancellation of the liquor licence, but did not entail any penal consequences.", "-24.747603476513177" ], [ "placed in recent years to help curb alcohol consumption in the country. Although the bottles are typically half the size of traditional vodka, their alcohol content is such that they can be diluted into a strength similar to vodka. Moreover, they were often available from vending machines at any time of the night, while government-regulated liquor could only be sold within legally defined hours. The machines were often deliberately placed near poorer areas of Russian cities, where the product would be appealing to those seeking a cheaper alternative to regular alcohol. \"Everybody knew that it was not bath oil,\" one", "-24.698333204141818" ], [ "drinks in glass and tins. Marketing Famously, Cocio have used Eva Mendes as a front figure in their commercials.", "-24.696786838932894" ], [ "the music in the advertisement does not necessarily need to have anything to do with the product”(Andersen 260). The entertaining part of an advertisement is one of the most crucial steps to getting customers to buy the product. Music brings a certain flavor to an advertisement, without the music the ad would seem bleak. Music can create emotion and motivate people. When paired with the right ad music can make a person associate the product with a certain feeling enabling them to go purchase the product.\nThe same can be said for advertisements. Generally, people are familiar with Nike, Puma and", "-24.673839875860722" ], [ "of one's consumption partner. The impact of media in creating stereotypes The media often uses and misrepresents stereotypes; however, they are significantly accepted by people among society. The most common way of showing stereotypes is through TV commercials or TV shows. If we consider TV commercials, we can easily understand that in the biggest part of commercials which are advertising domestic products main actors are women. Women are used in this type of commercials because they are considered the ones who make main decisions in purchasing domestic products. On the other hand, in commercials advertising beers or car, main actors", "-24.66780063690385" ], [ "sponsor. They had all but concluded a lucrative deal with Quaker Oats when King came to them with a deal he had already signed with Pepsi. Although it would pay them less money, they had to take it and break off talks with Quaker. Part of the deal was that Michael, who did not drink Pepsi, would have to do two commercials. He made sure that his face appeared minimally in them to avoid overexposing his image. During filming of one of the two commercials, Michael suffered second and third degree burns on his scalp when a firework effect malfunctioned,", "-24.654165589716285" ], [ "Group Against Liquor Advertising The Group Against Liquor Advertising (GALA) was a non-profit group in New Zealand who believed that advertising alcohol leads to increased consumption (as compared to changing brand loyalties). It was not a prohibitionist group.\nThe group was established in the 1990s in response to a government decision in 1992 to permit alcohol brand advertising under a self-regulatory body. The group disbanded in 2012. Many members then moved their support to the Alcohol Action organisation.\nThe chair of GALA for many years starting 1992 was Viola Palmer, a general practitioner. The Complaints Secretary for a time was Cliff", "-24.62947873203666" ], [ "seen as less credible compared to advertisements that lack music and are placed in newspapers or articles. Consumers tend to have a more positive attitude towards commercials that supply accurate and relevant information about a product or a service that the consumer desires. Consumers rely on the credibility of what's being advertised so in order for them to trust in the advertisers' message or product there has to be solidified evidence for it. Relationship with musician Music affects the moral value of the artist, in the sense the music he/she makes out of their feelings and emotional drive is then", "-24.62466054383549" ], [ "staged as the ultimate commodity, and used for the selling of products. The ultimate purpose of many advertisements is thus to appeal to the insecurities of individuals, in hopes of selling them the solution. Marketers fueling negative body imagery are also highly aware that those who undergo these problems are more likely to purchase their products. For that reason, advertisements regularly advocate the ability to achieve a particular look through retouched images, the sexual objectification of women, and products accompanied with explicit messages.\nMany advertisements today display an image of the 'perfect' woman with an idealistic body and flawless facial features.", "-24.610894988873042" ], [ "buyer, usually spending up to half of a million dollars to create commercials that will stand out to the public. In this it includes using popular music that appeals to younger audiences, famous celebrities and musical artists that many can recognize, and star athletes that many look up to.\n\"Picture-word congruency [was] found to enhance verbal recall when the picture does not evoke distracting imagery.” Music has a great part in drawing in a consumer to consider an item for purchasing, but visuals tend to enhance the advertisement for later recall. In times where both lyrical and visual advertisements are presented,", "-24.589832407946233" ], [ "Happy Meals using displays with toys (often related to the newest cinematic release) at children's eye-level inside McDonald's restaurants. Section 248 provides that: \"Subject to what is provided in the regulations, no person may make use of commercial advertising directed at persons under thirteen years of age\". The Court certified the case on behalf of the following class: \"Every consumer pursuant to the Québec Consumer Protection Act who, since November 15, 2013 purchased in Québec for a child under 13 years of age then present inside a McDonald’s restaurant, a toy or Happy Meal, during an advertising campaign directed at", "-24.585498272981567" ], [ "fans of their beer who squabbled over trivialities such as what type of glass to drink it from, because they had forgotten that \"the best beer needs no etiquette\". The commercials starred Stephen Fry as Ivan, Tony Cosmo as Abdul, Tim McInnerny and Roy Castle, and were directed by Paul Weiland.\nA variant of the poem appeared in an ad for Springmaid cotton sheets in Life magazine, 7 January 1952.", "-24.57941306612338" ], [ "passing the 1938 Food, Drug, and Cosmetic Act, which required companies to perform animal safety tests on their proposed new drugs and submit the data to the FDA before being allowed to market their products. The Massengill Company paid a minimum fine under provisions of the 1906 Pure Food and Drugs Act, which prohibited labeling the preparation an \"elixir\" if it contained no alcohol.", "-24.485622148029506" ], [ "humorous commercials depicting what they called \"violence against lemons\". Smirnoff also came out with another citrus-flavored malt beverage in the United States in the late 1990s called Smirnoff Ice, which promoted itself with flashy commercials, usually involving trendy young people dancing in unlikely situations and places. (In the UK, Smirnoff Ice is marketed by Diageo as a PPS.)\nSome have expressed concern that such drinks might appeal to children as they tend to be sweet and brightly colored. Many cooler advertising campaigns have been criticized as trying to make 'alcopops' appeal to young drinkers. In the United Kingdom, that led to", "-24.457754092640243" ], [ "are allowed to send in photos that will then be printed on bottles of the soda. These photos can be put on a small order of custom-made soda, or, if the photos are interesting enough, they can be put into production and used as labels for a whole production run. This strategy is effective at getting customers to co-create the product, and engaging customers with the brand.\nIt could be argued that the Macys Thanksgiving Day parade is a type of experiential marketing, as the viewer is invited to experience floats and entertainment tied to specific brands (and Macy's itself).\nAnother example", "-24.414351996965706" ], [ "another person while driving may face heavier penalties. In addition, many countries have prevention campaigns that use advertising to make people aware of the danger of driving while impaired and the potential fines and criminal charges, discourage impaired driving, and encourage drivers to take taxis or public transport home after using alcohol or drugs. In some jurisdictions, the bar that served an impaired driver may face civil liability. In some countries, non-profit advocacy organizations, a well-known example being Mothers Against Drunk Driving (MADD) run their own publicity campaigns against drunk driving. History The US National Highway Traffic Safety Administration (NHTSA)", "-24.341476815054193" ], [ "requiring soda companies to include in their advertisements warnings that consumption of sugar-sweetened beverages is associated with serious health risks like diabetes. The suit claims that the law is an unconstitutional restriction on commercial speech. In September 2017, a panel of the 9th Circuit Court of Appeals agreed with Olson and provisionally barred the city's mandated warnings.\nIn March 2018, Olson turned down an offer to represent Donald Trump in the probe of Russian interference in the 2016 election. Personal life Olson has been married four times. His first marriage was to Karen Beatie whom he met in college at University", "-24.318708329214132" ], [ "products. Further restrictions were considered, with one top health official announcing that a state monopoly may be imposed on Russia's perfume and pharmaceutical industries. In the end, Russia amended its legal code to strengthen punishments for illegally producing and selling alcohol, banning the kind of alcoholic vending machines through which the Irkutsk bath lotion was sold, and prohibiting online advertisements of alcoholic retailers. The latter's legalization had been mooted prior to the poisoning.\nIndividuals interviewed by a New York Times reporter in February 2017 were skeptical that any measures would be successful in significantly impacting illegal alcohol sales, given that it", "-24.285671155026648" ], [ "produce beverages containing more than 1% alcohol without a license, the law is rarely adhered to for homebrewers, and homebrewing supplies are available from high street stores and websites.", "-24.244094202207634" ], [ "drink have been contested. Forbes reported, \"The Federal Trade Commission filed a complaint in 2010 that the Resnicks' POM Wonderful had used deceptive advertising when marketing the antioxidant-rich drink as being able to treat, prevent or reduce the risk of heart disease, prostate cancer and erectile dysfunction. In 2012 a federal judge agreed that some of the ads were misleading. In 2013 FTC commissioners denied the Resnicks' appeal. In October of 2015, the Resnicks asked the Supreme Court to take the case.\" In May 2016 the Supreme Court declined.\nIn 2015 it was revealed that the Resnicks and", "-24.24269908363931" ], [ "Is H.R. Pufnstuf just one giant drug reference?\":\nWe've heard that for 35 years. We did not intentionally do anything related to drugs in the story. People thought we were on drugs. You can't do good television while on drugs. People never believe you when you say that, but you can't. The shows were very bright and spacey looking. They may have lent themselves to that culture at the time, but we didn't ascribe that meaning to them, and I can't speak to what adults were doing when they were watching the shows. We just set out to make a quality", "-24.20065286703175" ], [ "and Playgirl.\nBecause the laws regarding the sale of alcoholic beverages vary from state to state in the United States, the availability of beer, wine, and liquor varies greatly. For example, while convenience stores in Alaska, Pennsylvania and New Jersey cannot sell any kind of alcohol at all, stores in Nevada, New Mexico, and California may sell alcoholic beverages of any sort, while stores in Virginia, Idaho, or Oregon can sell beer and wine, but not liquor. Similar to grocery stores, convenience stores in New York can sell beer only, not wine or liquor. Altoona, Pennsylvania–based Sheetz tried to find a", "-24.191149025573395" ], [ "Everclear (alcohol) Consumption According to the manufacturer, Everclear \"should be viewed as an unfinished ingredient\", not consumed directly in undiluted form, and the company acknowledges that the product \"has a rather notorious reputation\" due to its high alcohol content. Rather than consuming Everclear directly, the company says it should be diluted by mixing it with water (to make vodka) or other ingredients until the alcohol strength of the drink is \"no more dangerous than other spirits or liqueurs on the shelf\". For example, ordinary vodka and gin have an alcohol concentration typically around 40% alcohol by volume (80 proof), and", "-24.189960595278535" ], [ "its attempts to \"brand disillusionment” through its subversion of traditional marketing. Meanwhile OK Soda's original merchandise, cans and advertising material can still be found readily on eBay with asking prices sometimes in hundreds of U.S. dollars.", "-24.173154296702705" ], [ "however only members can buy takeaway alcohol there. Visitors can consume alcohol in opened containers on licensed premises.", "-24.11766337365043" ], [ "amount of alcohol sponsorship. The 2005 Ashes, for example, featured sponsorship hoardings by brands such as Red Stripe, Thwaites Lancaster Bomber and Wolf Blass wines. In nations like India and Sri Lanka where alcoholic advertising is generally prohibited, those regulations are rounded with distillers offering clothing lines and sports equipment marked with one of their brands or separate soft drink or bottled water lines within tournaments such as the Indian Premier League and test matches, such as United Spirits Limited's McDowell's No.1 and Pernod Ricard's Royal Stag.\nRugby union also has a substantial amount of alcohol sponsorship. The All Blacks feature", "-24.029863865027437" ], [ "a range of commercials. It was used in Argentina to advertise Quilmes beer. It was used again for a Diet Coke commercial in the USA and Canada, appearing initially during the 2007 Oscars and also during American Idol. In 2010, the song was featured in a commercial for Travelers Insurance.\nDrummer Ian Stoddart (one time member of Win) departed in late 2005, and was replaced by Murray Briggs, Riley's brother, formerly of the Anarcho/street punk band Oi Polloi.\nA well received second album Do Whatever Turns You On, produced by Calum Malcolm, was released by Rough Trade on 3", "-23.999390364042483" ], [ "used to separate alcoholic drinks into what are advertised as non-alcoholic drinks and spirits; distilled wine produces low alcohol wine and brandy (from brandywine, derived from Dutch brandewijn, \"burning wine\"), distilled beer may be used to produce low-alcohol beer and whisky.\nHowever alcoholic drinks cannot be further purified to 0.00% alcohol by volume by distillation. In fact, most drinks labeled non-alcoholic contain 0.5% ABV as it is more profitable than distilling it to 0.05% ABV often found in products sold by companies specializing in non-alcoholic drinks. Ethical issues Alcohol is legal in most countries of the world where a drinking culture", "-23.99062313477043" ], [ "they should go on YouTube to watch the videos. A reporter questioned Sak as to whether he had ever seen a \"Girls Gone Wild\" video, and whether that would incite him to make alcohol illegal (Sak replied that he hadn't yet had a chance to review the material).\nNebraska Senator Vickie McDonald responded with \"Anytime anything's on YouTube it's an issue,\" and \"Legislators, parents, grandparents, we need to be on top of these things,\" McDonald proposed Schedule I listing Salvia divinorum as part of their Controlled Substances Act, under which possession of salvia would have been considered a Class IV", "-23.98558184725698" ], [ "beverage that contains a percentage of alcohol intoxicates in large quantities, then it is unlawful to consume any quantity of it, large or small. It is also deemed prohibited to sell or buy such a beverage and it is obligatory to dispose of it because it is considered khamr (intoxicant). However, if the consumption of a large amount of such a beverage does not intoxicate, then it is permissible to sell, buy, and consume it ... Carrion Animal who dies of itself i.e., carrion\nForbidden to you is that which dies of itself, and blood, and flesh of swine, and that on", "-23.984673323619063" ], [ "and tasting \"like a good whisky\", the redistillation process and lack of colour meant that the drink could not legally be sold in the United Kingdom while labeled as \"whisky\".\nManX Spirit won 2 stars in the 2017 Great Taste Awards.", "-23.974059503001627" ], [ "signs.\nAdvertisements for liquor in media must be approved by BABLO, and it is prohibited to use an image of the Maine State House in liquor advertising. Drinking age The legal age to purchase and consume alcohol in Maine is 21, which was instituted in 1987. Minors may consume alcohol at home in the presence of the minor's parents. Minors may not transport liquor unless required due to the minor's employment, or at the request of their parent, guardian, or custodian. Taxes Taxes on liquor at store level are included within the price and calculated by BABLO in order to", "-23.94441913755145" ], [ "to him. It was Crosby, however, who most customarily mocked the brand's unwieldy name in the said commercials by urging people, \"Just say Natural.\"\nOver the years, the brand was also re-priced downward, especially after Budweiser Light was introduced, eventually ending up at its current value pricing. It is commonly consumed by college students because of its low price. Natural Light Beer has also been referred to as \"Natty Light\" or \"Matty Light\" in some circles. It is also a common beer chosen for drinking games due to the inexpensive price of 30 pack cases. In 2018, Natural Light began selling", "-23.935122031893115" ], [ "as well as beer, shooters and other alcohol-derivative beverages are permitted to be sold at gas stations as well as supermarkets. Germany Germany does not require any licenses for the production, wholesale, or retail sale (off-license) of alcoholic beverages. A Gaststättenkonzession is required when alcoholic beverages are sold for consumption on the premises (on-license).", "-23.932018696097657" ], [ "campaign by TBWA exploited the shape of the bottle to create clever advertisements that caused people to become involved in the advertising, and the brand took off. Before Absolut, there were very few distinctions in the vodka category. Today there are regular, premium, and superpremium vodkas each at different price points and qualities. Flavoured vodka varieties have become numerous and may be found commonly in stores in the U.S.A. Alcohol sponsorship in sport Sport has been suggested to be one of the primary, if not the dominant, medium for the promotion of alcohol and drinking to the general population with", "-23.930374507930537" ], [ "alcohol is banned totally since 1975.\nIn September 2017, Facebook announced it would allow users to hide all alcohol advertisements. The move is debated within the UK, as Alcohol Research UK group welcomed the change, while the Alcohol Standards Authority said the UK already had some of the strictest rules in the world.\nIn November 2018, Ireland introduced a law banning alcohol advertisements near schools, children play areas, public transportation, and cinemas, as well as restricting visibility of alcohol products in stores. The legislation will take effect November 2019. Responsible drinking campaigns There have been various campaigns to help prevent alcoholism, under-age", "-23.919069522700738" ], [ "the alcohol industry is considered one of main contributor to formation of \ncivilization or lifestyle diseases. The alcohol industry has tried to actively mislead the public about the risk of cancer due to alcohol consumption, in addition to campaigning to remove laws that require alcoholic beverages to have cancer warning labels.", "-23.916819052035862" ], [ "3 (4.1.2001/1), paragraph 3\nIn the European Union, the labels of drinks containing only more than 1.2% ABV must state the actual alcoholic strength (i.e., show the word \"alcohol\" or the abbreviation \"alc.\" followed by the symbol \"% vol.\").\nAlcohol is a psychoactive drug and some people say that the label non-alcoholic is misleading and is a threat to recovering alcoholics. Mocktails Mocktails, an abbreviation for \"mock cocktails\", are festive, non-alcoholic party drinks. The word \"mock\" implying a facade of the alcoholic cocktail without any of the alcoholic content. In the last few years, it has become so popular that it even", "-23.91371280583553" ], [ "Chimayó Cocktail, Mexican martini, Mojito Blanco and Vampiro. Canada Under Canadian regulations (C.R.C., c.870, section B.02.90), any product labelled, advertised, or sold as Tequila must be manufactured in Mexico, as it would be for consumption in Mexico. However, once imported to Canada for sale, it is legal for Tequila to be diluted with bottled or purified water to adjust it to the desired strength and then sold. United States Similar to the law of Canada, the U.S. law (27 CFR 5.22 (g)) says that tequila must be \"manufactured in Mexico in compliance with the laws of Mexico regulating the manufacture", "-23.910774383839453" ], [ "advertised. Businesses may issue free or complimentary drink coupons (up to one per day per patron). Hotel and motel licensees may also give guests complimentary bottles of wine on special occasions. Licensed establishments are permitted to institute dress codes, cover charges, and minimum age restrictions. Liquor stores are allowed to conduct tastings of beer, wine, and spirits. Bars, restaurants, state concessionaires (e.g. PNC Bank Arts Center), and non-profit organizations with a special permit can host both tastings and tasting dinners, the latter of which permits larger sample sizes. BYOB: bring your own bottle Because some restaurants are unable or choose", "-23.879540216788882" ], [ "different regulations. An editorial article on the commercial wine selling web site Appelation America says that many of the conditions in these regulations are either so complex or so expensive as to discourage wineries from complying.\nIn March 2011, a bill was introduced in the U.S. House of Representatives that would explicitly allow states to regulate alcohol products from outside of the state differently from those produced within the state.", "-23.86955193147878" ], [ "is illegal to distribute alcoholic beverages for free, as well as serving a customer more than two beverages at a time. Practices designed to get customers to drink more, such as drinking games, are prohibited, as is the awarding of drinks as prizes. Place Sales of Alcohol were once only permitted from state-owned stores, but the laws establishing the stores were repealed in 1991 and the stores gradually closed. Privately owned stores now obtain licenses to operate as \"Agency Liquor Stores\". Establishments selling liquor may not be within 300 feet of an existing school or church ", "-23.824345178421936" ], [ "explain that the drinks also have no harmful microbes in them. Based on the information provided by the Ministry of Public Health that assured the Department of Fatwas of the lack of narcotics, alcohol, pepsin, and microbes in both Pepsi Cola and Coca-Cola, Hasanayn al-Makhluf declared the drinks to be permissible under Islamic law.", "-23.803679640375776" ], [ "which had occurred since September 2007. Billboard magazine later hypothesized that this uptick in sales was due to a Cadillac commercial that used the song. According to Matt Talbott, the frontman of Hum:\nPeople have always said this or that about using our songs in movies or commercials and nothing ever really comes of it. [...] [But one day] some guy at an ad firm asking about using a song for a commercial [...] I said, 'Yeah, sure, whatever man.' [He eventually] wrote back and told me more, and when I knew it was for real and that it sounded like", "-23.79958776172134" ], [ "those used in refrigerated display cases significantly damages the taste of beer, yielding a taste that is often described as \"skunky\". This is the result of the essential hop oils spoiling due to UV exposure.\nThe second Corona brand is Corona Light, the first light beer produced by this brewer. Corona Light has 3.4% alcohol by volume, 99 calories (0.41 kJ), per 355 ml (12.0 U.S. fl oz; 12.5 imp fl oz) bottle. Victoria Victoria is a 4% abv Vienna lager first brewed in Toluca, México, in 1865 by Compañía Toluca y México. Grupo Modelo bought out Compañía Toluca y México in 1935.\nIt is generally sold in", "-23.781089075055206" ], [ "that are affiliated with only one alcohol supplier), in favour of free houses which sell products from a variety of suppliers. A partial exception is made for brewpubs where a bar and brewery are on the same site. Consumption The consumption of alcohol in public places is generally forbidden, regardless of the time (in a few provinces and territories this is still not enforced), unless a permit to do so is delivered by the responsible municipal authorities. In Quebec the consumption of drinks with low alcohol contents is permitted in public if accompanied by food. In all of the", "-23.767522175738122" ], [ "weights or short measures to consumers. Before this there was no legislation, only guidelines as to the correct weight of an alcoholic spirit measure, and if spirit measures or optics were used, they required a government stamp to certify that the measure was accurate. This Act specified that only gin, rum, vodka and whisky were spirits and had to be served in the prescribed measured quantities using an approved optic measure. All other drinks are not spirits (for the purposes of the act) and could be free poured. Today, these other drinks may not be free poured, but must be", "-23.758521790558007" ], [ "its government-approved \"methylated spirits\" formulation. Specially denatured alcohol A specially denatured alcohol (SDA) is one of many types of denatured alcohol specified under the United States Title 27 of the Code of Federal Regulations Section 21.151. A specially denatured alcohol is a combination of ethanol and another chemical substance, e.g., ethyl acetate in SDA 29, 35, and 35A, added to render the mixture unsuitable for drinking. SDAs are often used in cosmetic products, and can also be used in chemical manufacturing, pharmaceuticals, and solvents. Another example is SDA 40-B, which contains tert-butyl alcohol and denatonium benzoate, N.F. In the United", "-23.75006016215775" ], [ "of chips at the same time, and after a brief pause, passionately kissing and dry humping each other, much to the surprise of the other man present. The advertisement was initially put on a waiting list before the network outright rejected it due to it violating CBS's broadcast standards and because CBS believed ManCrunch's did not have sufficient credit (ability to pay for the ad). ManCrunch accused CBS of discrimination saying, \"If the ad showed a man and woman kissing it would have been accepted.\" The New York Post concluded it was \"no more racy than nearly any beer", "-23.73220346844755" ], [ "aimed at minimisation of harms to society.\"\nThe author and physician Andrew Weil has commented on the peculiar attitude and emotional bias of some people who think \"drug taking is bad\", but who nevertheless consume alcohol, and formulate the unhelpful conception \"We drink. Therefore alcohol is not a drug.\"\nThe UK drug policy reform group Release believe that the stigma attached to drug use needs to be removed. Release's actions have included challenging such stigmatisation with its \"Nice People Take Drugs\" advertising campaign. Arguments for sending out signals Some argue that sending out signals should be a consideration of drug policy. Previous", "-23.730807786691003" ], [ "true to me, so I didn’t write it. I also think the brand 'alcoholic' prevents a lot of people, especially young people, from seeking help or even reevaluating their relationship with alcohol. In my mind, the whole point of Smashed is to say, you don’t have to be a quote-unquote alcoholic in order to examine the underlying reasons why you're drinking.\" Appearances As a journalist, she has contributed to The Guardian, U.S. News & World Report, Glamour, Jane, and Seventeen magazine. She has promoted her book on 20/20, Good Morning America, CBS Evening News with Katie Couric, Anderson Cooper 360,", "-23.721594715869287" ], [ "of 0.5% or the like of alcohol does not entail deeming its consumption unlawful as long as there is no effect of the alcohol upon consumption of the beverage and it does not intoxicate in large quantities.\nMuhammad ibn al Uthaymeen, a Salafi scholar of Saudi Arabia, was once asked about the so-called (non-alcoholic) beer, given that some brands of non-alcoholic beer have a percentage of alcohol. The following was part of his reply:\nAs to percentage, do not think that any percentage of alcohol in a thing makes it unlawful; rather if the percentage of alcohol has an effect whereby when", "-23.71795757045038" ], [ "have ingredient labeling requirements for spirits, there is often no way for consumers to know if additional flavorings have been used. Although used as a spirit in its own right and mixed in a range of cocktails, truffle-flavored alcohol is also used by chefs to flavour dishes.", "-23.708281207742402" ], [ "of the spirits entered into the barrel and the proof of the bottled spirits are the same\". Drinking Consumers often add water to cask strength whiskies in order to reduce the \"heat\" – the \"burn\" sensation that goes with the drinking experience – and bring out different whiskey flavors. Diluting the whiskey with varying amounts of water will modify the flavor profile, and some consumers like to have control over that. Some add water to the whiskey, while others add ice. The water and temperature affect the taste of the whiskey, and the selection of water is also important. Aficionados", "-23.61190411867574" ], [ "first person in the history of the world to get legally drunk (.08) on\" non-alcoholic beer. In the video, Janus drinks 28 cans and bottles of various non-alcoholic beers and then blows into a breathalyzer. A .02 reading is recorded, leading Janus to conclude that if he can't get drunk on O'Doul's, nobody can. Acting Often appearing on television to talk about competitive eating, Janus began appearing on television in acting roles too. Although he usually plays himself (notably in a music video for the Boston Spaceships and in commercials for Major League Eating: The Game and ESPN's Sportscenter), in", "-23.600679293478606" ] ]
28y373
If a person knew no form of language, written or spoken, what would the thoughts be like in their head?
[ "After a degree in neuroscience, I've come to realize that there are multiple kinds of thought and they all arrive into perception in different ways. There are forms of thought that do not require language (such as \"I'm hungry\", \"fire is hot\", \"flowers are pretty and smell nice\", \"find protection from danger\", etc.) and forms that do (such as \"Reddit is a good forum to get answers\", \"this commenter is a dumbface\", \"I'm beating a dead horse\", etc.). **Simply put: language affords us a method to track the progression of a thought and follow it's logic to a meaningful conclusion.** Without language, our conclusions would be a lot simpler and less meaningful.", "Here is a Radiolab piece on just that. URL_0 ", "The best answer is, we don't really know. For obvious ethical reasons, scientists will never raise a child without language and test the results. There are some rare examples of people who didn't acquire language, like [Genie]( URL_0 , but she was severely abused in addition to being denied language, and one case is hardly conclusive. The science of the brain is still in it's infancy in some ways.", "Every time this concept is brought up I am fascinated because, as far as I can tell, I do not think using words or sentences. Thoughts are just thoughts, if I try to think in sentences it feels like I'm rehearsing something, it's the same difference between reading and reading aloud. Of course I cannot claim I do not use language in my thoughts, but it's not the English language. Is anyone else like this? Does this \"mode\" of thinking have a name I can look up? I am bilingual, that might or not have anything to do with this, but often people ask me \"in what language do you think?\" and I am always stumped trying to explain that I find it very weird to think in a language like that.", " > A deaf gentleman (from birth) came to our medical school and I asked whether they thought with an inner monologue or something else. He said he thought with visual means, e.g. pictures, sign language, and whatnot. > I found it mildly amusing when he told us about how he had a dream about the Queen and she spoke using sign language. URL_0 ", "So what is tip-of-the-tongue then? It's something you have the _thought_ for but not the _word_ for. If thoughts were words you would never experience this feeling.", "My vaguely educated guess would be that all of their internal monologue and reflection would be pictorially centred, as well as sounds from their environment. They would have behavioral schema and repertoire like ordinary people so they could function on their island to survive for that long, so for these behaviors they need cognition and reflection which, without language, I imagine would be visual and auditory in origin. I only have an undergrad psychology degree so I'm sure someone with a more advanced degree in this field could answer this a hell of a lot better", "Even if we could find someone, we would have no way of asking them.", "Steven Pinker covers this subject in his book [The language Instinct]( URL_0 ) and uses actual anecdotal evidence to show that it doesn't actually differ from those with language. Language offers us the ability to communicate with others, it does not affect our ability to carry thoughts. Most of the answers here are wrong.", "Helen Keller, who was blind, deaf, and mute from birth, said that before she learnt to communicate all of her thoughts were just raw, uncontrolled emotions and impulses.", "I think some kind of language for a human is natural...in the sense that humans are a social species and are always interacting with one another. Even with no speech or text we still develop language. Just look at deaf people and sign language. Even if a deaf person isn't taught official sign language, they can invent their own if they're in a social group with other deaf people (or people communicating in the same fashion). BTW, deaf people think in sign language just as you and I usually think with spoken words. If you were to take an example like Genie, she basically grew up in isolation. No one in the family really spoke to her. It was very difficult to really \"study\" Genie (and also ethically grey) and it's also pretty morally wrong to repeat the same circumstances in an \"experiment\", but it seems like growing in isolation COULD stunt the brain. Humans may need social interaction to help link many of the other passages in the brain...this is just my personal musing. As said, it's pretty difficult to study such a thing. tl;dr Unless your hypothetical person grew up in complete isolation, which is abnormal, they would develop some sort of language. Their thoughts would then be partially based on their language, like how I, a speaking person, mostly think with \"speech\" while a deaf person using American Sign Language would think mostly in ASL. Also what kparseyan said. I definitely don't think only in \"speech\" and to imply most of my thoughts are in \"speech\" form is a HUGE simplification. But it's one of those concepts where I struggle to think of the right words to convey my, erm, thoughts, so I don't think I can beat kparseyan's reply there. His bold is also an excellent summary imo.", "I am amazed at how often this kind of question appears here. I, and many others, don't think in a language. We don't have an internal voice going on all the time. We think in concepts and language only comes up if we are thinking explicitly about it, such as when reading or writing. EDIT: typo", "I am going to disagree with /u/kparseyan. Obligatory mention here that I'm working towards a doctorate in English. You have to answer a question before you can even ask about this scenario: **what is language**? Obviously, written and spoken English/French/Chinese is a language. We all get that. But that doesn't really answer the question. We might also stipulate that, with no conscious thought (that we know of) plants don't speak a language. We can nail down both ends of the spectrum, but what you do with the middle is where the fun lives. What does language do? How does language work? Without getting super technical, language is a way of putting a symbol to a concept. The oldest adage about this is the word 'tree'. I say that word, you imagine a tree, but the tree you imagine might not be the same one in my head. We're not talking about a particular tree, we're talking about the concept of a tree. 'Tree' contains nothing. It is a symbol for a set of ideas. But even that's not enough. What language really does, its real power, comes in being able to differentiate between things. It's a relationship of various concepts, a network of ideas, that we separate out in taxonomies. What makes a tree a tree is that it is not a giraffe or a rock or a flower. What something is also implies what it isn't. The human brain, almost any brain, is capable of doing this. /u/kparseyan is incorrect when he says that, without language, you can understand sensations like hunger, pain, beauty....that's not true. Even if it isn't spoken or written, the brain has made a symbol for that sensation. There's an abstraction required, not to feel hunger, but to understand that the feeling is hunger and to act accordingly. Even without language, you'd be able to feel [gnawing hunger] and, probably by instinct alone, you'd be able to connect that feeling to satiation when you eat a sandwich. That's a language that is happening without words. That interaction relays a relationship between the feeling and the solution. That [hunger] is distinct from [sleepy] and [thirsty] and thus requires a different solution. When I feel [x] I identify it as distinct. Things can only be distinct things if I can tell they are different from other things. I need to be able to tell that hunger is different from thirst is different from pain is different from sleepy. Whether you put words or colors or pictures to those different sensations, you're creating a taxonomy of 'things' or 'concepts' that you identify as individual elements. Your brain, therefore, has a language with which to process those individual feelings. Even at the most basic level, you have to make the distinction of where you begin and the world ends. Seeing yourself an an individual, understanding that you are the 'I' is an an act of language. That written/spoken stuff is just a way for us to normalize symbols in social groups. It allows us to communicate our internal monologue with others. My ability to look at a tree and know it is different than a flower or a rock is happening by vision. My ability to talk to you about that time I fell out of a tree when I was six requires a set of symbols that you share with me, so I can relay abstract concepts reliably to another person.", "it's the other way around - what you're describing is self speak which is a result of of having learned language. Thoughts precede speech in terms of function! Language is a tool that allows us to contemplate complex thoughts though! Chomsky gave a nice talk about this in which he pondered the idea of there being a first human that could articulate speech and how it must have been for him. probably a very lonely experience. my guess is language evolved from sounds that evolved over time - we first had to develop the toolbox for it - and once it was there, it took time to build a vocabulary. it wasn't a single event - it was a phenomenon spread across our species. but this only one hypothesis (self domesticating ape hypothesis, which makes the most sense to me) - and there are many! URL_0 ", "If you talk slow and loud enough, anyone can understand English.", "Reminds me of that part of Hitchhikers Guide when the whale improbably comes into existence a few miles above the ground. Still makes me cry I laugh so hard when I read it.", "There's a book about a dude without language, true story. A Man Without Words by one of my favorite authors, Oliver Sacks.", "I for one don't think in English or any language. I had always assumed that to be normal.", "When I think, I almost never think in words or language, although I can articulate myself well verbally. In my brain, every word I know has a distinct feeling to it, and I can phrase what I say or write out of that feeling or sequence of feelings, if you will. I feel the ''essence'' of the word I want to say and I say it. Its hard to explain. Its like each word has its own smell and based on the smell I know what I want to say. Is there something wrong with me?", "I don't believe that all your thoughts are manifested in words and language. I think most thoughts are silent and consist of fleeting imagery like micro-daydreams. That is not to say that you don't experience those language thoughts but just that for each of those there are probably many non-language thoughts you have that you are unintentionally not counting as thoughts.", "For what it's worth, I am bilingual but my thoughts aren't verbal. I don't hear any voice in my head. It's like you read something really fast and don't verbalize it, yet you still understand what you read. The same is true for my thoughts.", "They pretty much wouldn't. At least, not *conscious* thoughts. We have lots of evidence that if children aren't exposed to language in their first few years of life, they never develop anything like normal human mental facilities. Symptoms of such deprivation are almost indistinguishable from organic brain damage: poor sense of self, mental retardation, lack of sense of time or ability to distinguish past, present and future, etc. Of course, it depends on the individual, and just how much, or little, exposure to language they had in the critical period before 6 or 7. There is some evidence from children abandoned and raised by animals, although that's controversial because there are so few of them, and there is a question over whether they might have been abandoned because they were mentally retarded, or became mentally retarded because they were abandoned. There's also evidence from a few cases where parents have neglected their children to such a degree that they never learned to speak, but the same question applies there. Probably the strongest direct evidence comes from children born profoundly deaf. In less enlightened times, or less knowledgeable times, being born deaf almost certainly condemned the child to becoming a deaf-mute, and another term for being deaf and mute is \"deaf and dumb\" -- it is no coincidence that the word dumb is used for both stupid and unable to speak. In times gone past, profoundly deaf children simply didn't develop the same mental facilities as hearing children. Oliver Sacks describes a child, Joseph, who was born deaf but not diagnosed until he was four. With no attempt to teach the child any language at all, by 11 he suffered from a blank incomprehension, and lacked not just language but a sense of time. That was the fate of almost all children born deaf, until the 16th century when the Spanish monk Pedro Ponce de León taught the deaf son of a nobleman to read lips and speak. Prior to that, it was considered that those born deaf were hopeless cases. There's another data point. In the 1880s, European educators made an incredible blunder. They voted to prohibit the teaching of sign language, from fear that it would leave the deaf isolated from the rest of society, and force the deaf to learn to speak oral language. The result was a disaster for the deaf -- by the 1950s, educational outcomes for deaf children were so poor that educators were wondering whether there might be something to the old Medieval theories that deafness was a form of brain damage. Not just academic results, but poorly developed memory, infantile personality, and unfocused sense of self. (Reference: \"The Myth Of Irrationality\", by John McCrone.)", "Believe me, maybe you don't realise this, but your thoughts are NOT 'manifested as words'. No one's are. Language is merely a petty tool of communication made up by humans. Obviously animals aren't incapable of thinking or feeling despite being incapable of talking. Think of words as combinations of sounds/symbols that are commonly accepted to mean something in order to ease communication between people. So yeah, language is not the ultimate thought, it's actually pretty restricting, too. e.g. even now while writing that I stopped a few times to think of a way to write in words something that I otherwise have very clearly understood in my mind xD There are many things you can know and think but not tell or explain, like walking, or meditating. So yeah I hope I succeeded in communicating in words my thoughts to you ;)", "They'd be primitive. Their thoughts would be represented in terms of sensory inputs and biological imperatives, with no higher context. Their access to knowledge would be limited to whatever knowledge they could produce themselves, within their own lifetime. The cultural knowledge of generations that we take for granted, would be inaccessible to them. Think about how difficult it is to produce new knowledge, how slow the progress of science. How much knowledge does one person really contribute in one lifetime, even with access to other people, and the sum total of human knowledge on the internet? They contribute very little. Further, this hypothetical island person would be preoccupied with the task of subsistence living, with little time for deep thought or investigation. For further insight, you might ask how the evolution of the human brain correlates with the origins of language.", "Whenever people ask me this, I ask them to try and think of something, they usually come up with what you're experiencing - the thought in the form of language. Then I ask them to think the same thought (or another, doesn't matter) but cut themselves off in their head. You still know what you were going to think but you never expressed it through language in your mind. I think this is a bit of an interesting experience but like many others have said, language organizes and forms what you think. You're going to have different thoughts based on your ability to organize them through language. It would be the same sort of experience as cutting yourself off like you just did only simpler.", "As odd as this may sound, up until my late teens, I rarely thought in words or sentences unless it was remembering conversations, or preparing to talk to someone. The rest of my thoughts were images, feelings and music. When I'd see a movie scene where a character's thoughts were overlayed on the soundtrack, I'd think it was silly, because I assumed that nobody thought in complete sentences like that. Marrying a writer changed my perspective of that. I'm a visual artist, and my clearest thoughts are visual or musical. Nowadays, I have inner monologues like most people (I think) but find it's a slow way of thinking. I think faster than words, and draw much faster than I write.", "They would not. This person would be seriously retarded and die. [Frédéric II de Hohenstaufen did a famous experiment]( URL_0 ) on this: he arranged for a group of babies to be raised without caresses or be spoken to. The purpose was to discover the \"natural\" language of God. Other people through history have made similar experiments, with always the same result: in order to grow up, a human baby need social interactions. (Also, science FTW : it is a well-known subject 😝)", "As a person who speaks several language fluently, I can tell you that I don't think in any particular language, but in abstract and wordless thoughts. The only time I speak a particular language in my head is if I am thinking ahead to what I plan to say. The rest of the time, my thoughts are wordless. I would think that a person who speaks no language, would be no different.", "I'm no expert, but i often think in images, as in picturing something in my head. I also think in music, hearing music in my head. Neither of these require language. Perhaps if i language didn't take up so much space in my brain i could think in smells, tastes and feelings too?", "On a side note, one does not need to know a written or spoken language to engage in self-talk and thought. Deaf people engage in self-talk and thought by imagining themselves signing.", "We \"think\" in pictures. The self-talk is just commentary. Think of a child who can't speak yet - it's all about the concrete images.", "Read about Helen Keller, she ended up writing a book about learning language and what life was like before that.", "Radio lab did an entire story on just this. A man without a language till he was 27... URL_0 ", "Just so it's clear: I'm coming from the premise that language is not necessarily verbal in nature-- it's the way that we make sense of the world around us. Running the risk of oversimplifying things, I'd say that your hypothetical human-- assuming that he survives to adulthood and has reasonably human progress in his cognitive functions-- would have some sort of primitive visual \"language\". (Visual because, biologically, our brains our wired to favor visual stimuli over other senses). This language's basis would perhaps stem from memories of certain things that may be used to address particular needs. A brook would be something to sate his thirst, a cave for shelter, a stone would be something that can be used to crack open a nut, etc. His past experience of the world around him creates signifiers that can make sense of further experiences. If he once slipped on moss and sprained an ankle, then the next time he sees moss, he would take moss as a signifier of a slippery trail. On another note, there'd also be residues of baser animal instincts-- a wild animal hissing and baring its fangs, I imagine, would not need past experience as a prerequisite; it would probably immediately signify to our human, as it does to us, that he should stay away. I know this sounds as if our hypothetical human would not be much better, linguistically, than an animal, but again to run the risk of oversimplifying things, language (and the social advantages it creates) accelerates how we make sense of the world. Our hypothetical human could not be \"perfectly intelligent,\" because it's language that creates the conditions for (the conventional understanding of) intelligence. Having a word for moss, and having that word \"moss\" mean the same thing to a community of humans, means that members of the community would not need to encounter moss per se (meaning, would not need to have a past experience of moss,) to learn that it would be slippery. An older member of the community would just say \"don't step on moss, you'll slip.\"", "We may never know. This is a very interesting topic and be could learn a lot about how the brain works, but taking a child away from their mother and preventing them to learn any form of language is called 'the forbiden experiment'. But we do know that if a child doesn't learn language at a certain age, they might never learn any language and form some kind of mental retardation because some regions of the brain are underdeveloped. They think in a different way, they can make decisions and they can 'think', but they can't do it with the same complexity as a normal person can. We know this because some song birds have about the same brain plasticy as humans. They have to learn their song from their parents, but if we take them away from their parents they will never learn their song and their bodies will never fully devolop. MRI scans of the birds show that their brain is a complete mess. There is a lot of neural activity missing in these birds. Another example is of a girl named [Genie.] ( URL_0 ) A fairly well known story. However, we are not sure because her asshole father said he put her in that room because she was a little bit autistic. So we are not sure if her mental retardation is just from language depravity or if there might be some other factor at play. But we do know it didn't cure her autism. This is the closest we might ever come to do the forbiden experiment. Sadly, back in the day the only way to check someones brainactivity was by cutting open their skull and looking at it. if only they had the scanning technology we have today. We would know a lot more about the brain and how it works/develops. TL;DR: We might never know how they think because it is forbidden to stop a person of learning language. We do know from birds that the brain doesn't work as complex as normal birds.", "If I remember correctly from an old linguistics class - it was Noam Chomsky that first demonstrated that language is pre processed in the brain in a universal sense. That is, we don't think in language, we think in a more fundamental abstract way. This is hard for people to believe at first when all you've ever known is adding the layer of spoken language on top of that more fundamental process. So if you are Chinese, or British, or a remote Brazilian tribe; the underlying \"language\" for \"I am hungry\" is the same. It's the translational layer of spoken language that sits on top of that where the seeming differences lie. But underneath it's all the same. I'll bet there is a good analogy here for computer languages. A CPU understands instruction sets in a way that makes no sense to a human trying to read them. But if you put a translational layer of software code on top of the CPU layer then the language makes more sense. The instructions (thoughts) are still the same, but the layer of translation between them is different (C vs Perl et al). But I'm not and expert in this. This is just my memory from a class I took years ago.", "I think the top explanation is good but it can be made more clear. Language gives cause and effect some real scaffolding to attach itself to. When I say \"The boy hit the ball\", I know who hit what, what was hit, and what action took place connecting the who and the what. Language provides a way for us to keep track of not only those actions outside of our head, but our own thoughts within our head in a similar manner. It easier to think about deep, perplexing problems because we have the linguistic construct of the \"I\", \"me\" separate from the \"you\", \"her\", \"him\". Those without language certainly still have selves, but it is much harder for them to turn that into anything meaningful. It's not just that our conclusions would be less meaningful, or simpler it's that what problems and issues we are able to resolve are radically different without these linguistic constructs. Note: I have a degree in neuroscience and also a lifelong reader of many books on the subject. A few good ones that are aimed at the general audience: The Language Instinct by Pinker, How the Mind Works by Pinker, The Self Illusion by Hood, and Seeing Voices by Sacks.", "[This thread]( URL_0 ) is kind of helpful. To quote someone. \"I'm not deaf, but I'm a visual thinker. I do not \"hear a voice\" or \"See words\" when I think. I find it strange that most people do. I think in concepts. A chair is an idea, it is not the word \"chair.\" I've read often that deaf people and/or deaf+blind people will either think in signs, or think of ideas. I'm guessing it's similar to when you think of something, like an idea. If I say \"picture a red car,\" most people will form a picture of some car with some shade of red. People with no language probably think with objects or mental images to put scenes together. ^or ^I ^could ^be ^completely ^wrong I don't think early (very very early) humans had language, but they still managed to do some amazing things.", "One symptom of Dyslexia is the preference to think in pictures, graphics and diagrams as opposed to language. This is one of the reasons Dyslexics find language and reading difficult, because our brains are hardwired to think differently. Letters are each individual thoughts, and have a 3d diagram to match. Lower case b, d, p, and q all have the same diagram, so those letters are particularly tricky. It is completely possible to think exclusively in pictures, and like language in thoughts, it can help you to reach otherwise difficult conclusions and processes. For me, fully compensating for my dyslexia meant learning to use language for my thoughts comfortably, to use when convenient. Having both tools makes many concepts much easier to grasp.", "The short answer: Thoughts would be exactly the same as ours minus verbal behavior. The long answer involves going into how we think about language and conceptualize it. Language is under operant control, meaning it is influenced by the world around us. If there were no other people to talk to, there would be no purpose to functional communication. It would be very interesting though to see how one might adjust for this when it comes to issues such as keeping lists and reminders of things to do as well as for measuring. We store all our data/facts/list in a form of language so that other people could in theory comprehend it.", "This topic actually brings up an interesting topic in cognitive science. In order for one to learn language, there just be some underlying systems which enable for language to be learned! In other words, there is a logic decoding unit which is able to pattern match words and gestures when people communicate despite knowing know language at all. A language of thought. When you learn a language, you may not know what people are \"saying,\" but almost magically you learn and pick up a language. Your thoughts may now perceived in this language, but remember at one point, you had no language at all.", "Linguists can be somewhat split in terms of figuring out how language affects us, nevermind how NOT having language affects us. Stephen Pinker (you should definitely read The Language Instinct) argues that all humans are born with an internal language that is not any of the world dialects. My memory is a little fuzzy, so I forget what he calls it, but the reason he is confident that it exists is because humans need to be able to learn their \"first\" language. Which would be impossible without a starting one to translate through.", "We all have thoughts not expressed in language, all the time. I would presume that is what it would all feel like, for one without any language... (For instance, navigating a hallway, you do not think about going left or right around your coworker - but you do think and decide, and you can recall the experience of deciding.) Presumably something similar would be felt for those without language. Although I believe there are thoughts that cannot be thought without language (even if it is not a shared language).", "You know those times when someone struggles to find the right word(s) to express their thoughts? That's because at the time they're not actually thinking in a spoken language (if they were, they could just use the same words from their thoughts). Those thoughts are happening at a different level, and they have to translate those thoughts in order to express them. So without spoken language, they would just think on that different level that we all use from time to time anyway.", "When I meditate, every once in a while my thoughts completely stop. I am aware, but not contemplating anything. Everything feels like it has stopped. When I get in this state, it is such a blissful, peaceful feeling. it actually partly helped me get over my fear of death, since I know what it's like now to be almost nothing- I actually crave the feeling and look forward to feeling that way again when I meditate.", "Not scientific at all, but when I am thinking about something, my thoughts come in pictures and schematics. All of what I know about what I am thinking about is visually laid out in front of me. The only time that I think with words is around other people and I am talking. So I imagine this theoretical person's thought processes would be similar to mine when I am alone.", "Recent research on consciousness will back me up: the conscious part of you which hears the voices in your head, is actually a noise created by your head. You think first then this thinking creates the voices in your head. So, how would the thoughts manifest? Probably in the languages they know: images, sounds, feelings. So \"I'm hungry\" would create an image of a meal.", "I don't have a scientific explanation for it but if we couldn't speak or have any form of written code, I guess thoughts would be visualizations (like it actually happens to me and to others I imagine) don't you just visualize yourself on your thoughts without actually verbalizing it in your head? or is it just me???", "I dont have an internal monologue, unless I purposefully sit there and think out the words in my head. To me that is so impossibly slow, even though I talk faster than most of the people I know...may have something to do with my caffeine addiction. Anyway, its really not a universal thing.", "I know I would get buried here but I don't think with language personally. I think with ideas, it is hard to explain. It is like when reading a book, I don't read the words, I just get what idea the words represent and roll a movie in my head.", "When dolphins communicate they send an actual sonar image of what they are looking at instead of an abstract. there is no word for fish its just the echo image of the fish so the second dolphins sees what the first dolphin saw.", "Anecdotally, I had a friend in high school who was taught sign language when he was very young because the doctors thought he was deaf (he wasn't, at all). He said that even as a teenager, his thoughts were in sign language.", " URL_0 ... A very relevant article about a man who was born deaf and didn't know language existed until he was in his twenties. There is a bit when he takes the doctor to see people like him... Fascinating.", "Their thoughts would be manifested as images. Words represent things, instead of thinking in words, they would simply think of the things that the words represent. This is probably why the first writing systems were pictographs and hieroglyphs.", "I would imagine there would be smells, noises, visualizations, but first, very hard to be in someone else's head, and second, not much scientific data on feral children. Edit: fixed grammar errors and replaced 'put' by 'be'", "Plato handled this nicely in his \"Allegory of the Cave.\" URL_0 (It is also interesting to note that he describes Cinema as part if his allegory. Dude was ahead of his time to say the least.)", "The Nazis actualy tested that in some way. They would put newborn babies to isolation from any spoken language. They wanted to proof that german was the real human language. The babies died from isolation.", "The human desire for language is 1.) Innate, and 2.) So strong that the person would develop their own. So--I'd imagine it would be similar to our own head voice, except a pidgin language.", "When I think,I don't talk to myself unless I want to.You don't need to talk to yourself to think,you only do it if you can and want to.", "It would probably be in abstracts. I think of the word apple when I think about apples. They'd probably think of the actual image of an apple.", "They would still have thoughts and ideas that would be *expressible* with words. \"snow is white\" and \"Schnee ist weiß\" are two sentences expressing the same *thought*.", "Read up on Kasper Hauser. Also, since you're interested in the subject you should watch The Enigma of Kasper Hauser which is an amazing Werner Herzog film.", "The best part about this question is no matter what the answer is, if there really was a person like this they couldn't tell us.", "I assume they have vivid pictures along with emotion tied with them. And expression comes naturally like a baby from the first minute its alive", "I'm not sure - they've always snubbed us when we ask that question for some reason. I guess their thoughts all turn to *\"how-to-be-rude?\"*", "We don't think our thoughts into words, we just use words to describe them to ourselves when trying to comprehend them.", "Don't all psychology student know about Hellen Keller. How do you get a degree in neuroscience without learning about her?", "This episode of [RadioLab]( URL_0 ) would be very interesting for you, especially the \"Words that change the World\" part.", "We would still have feelings and desires its just we wouldn't have words to articulate them to others.", "I almost always think in pictures and feelings sort of. I rarely think stuff in words actually.", "I have a theory that you don't actually think in words, until you think about it.", "You e got to learn tothink without words. lose the mumbler and find the navigator", "You know how you think when you're not thinking in words? That way.", "How stoned do you have to be to ask this question?", "Same as a cat....through images rather than images and 'words'", "I know no languages, written or spoken, AMA!", "Try thinking without words It sounds like \"---__|~~~___**\"" ]
[ [ "conventional or natural. Crathorn's predecessors had argued that thinking occurs in a universal language of concepts acquired causally via experience, and that all conventional languages are subordinated to this mental language, which is shared by everyone in an a priori fashion. But Crathorn could not accept such a position because of his view that only qualities are natural signs of their extra-mental significates. Crathorn argued that except for natural signs of qualities, mental language is conventional because it is derived from conventional language. Hence, whatever language one speaks in his head is modeled on that language used for external communication.", "-30.331410706974566" ], [ "of our perceptions of the objective world:\n\"People do not think in English or Chinese or Apache; they think in a language of thought. This language of thought probably looks a bit like all these languages;...But compared with any given language, mentalese must be richer in some ways and simpler in others.\"\n— Steven Pinker, The Language Instinct, p. 72\n \nChomsky marshaled evidence that a child's rapid mastery of the complexity of language indicated an innate ability programmed into the development of the human mind from birth that could not be explained by the \"blank slate\" view of the infant mind. Rather,", "-30.094752340810373" ], [ "activity of thinking and the contents of thought. The latter can be objectified and embodied by the thinker - through his manipulation of, say, ink and paper, sliding beads, or electric currents and magnetic fields - in visual or other signs that he (and other human beings) can understand. Only such disregard would permit their ignoring the fact that being alive and being capable of experiencing are among the indispensable prerequisites of thinking. Nor do they seem to realize that even true communication with another would not be, of itself, proof that the communicator thinks; the latter would require evidence", "-30.09093198197661" ], [ "in complex civilizations, this mental model was replaced by the conscious mode of thought which, Jaynes argued, is grounded in the acquisition of metaphorical language learned by exposure to narrative practice.\nAccording to Jaynes, ancient people in the bicameral state of mind would have experienced the world in a manner that has some similarities to that of a person with schizophrenia. Rather than making conscious evaluations in novel or unexpected situations, the person would hallucinate a voice or \"god\" giving admonitory advice or commands and obey without question: One would not be at all conscious of one's own thought processes per", "-29.996235547914694" ], [ "Bernard Williams provides a history and full evaluation of this issue. Apparently, the first scholar who raised the \"I\" problem was Pierre Gassendi. He \"points out that recognition that one has a set of thoughts does not imply that one is a particular thinker or another. Were we to move from the observation that there is thinking occurring to the attribution of this thinking to a particular agent, we would simply assume what we set out to prove, namely, that there exists a particular person endowed with the capacity for thought\". In other words, \"the only claim that is indubitable", "-29.59972887072945" ], [ "understanding and that these systems, because they can be said to be minds themselves, are sufficient for the study of the human mind. Searle asks us to imagine that there is a man in a room with no way of communicating with anyone or anything outside of the room except for a piece of paper with symbols written on it that is passed under the door. With the paper, the man is to use a series of provided rule books to return paper containing different symbols. Unknown to the man in the room, these symbols are of", "-29.471106167067774" ], [ "Devices and Desires \"If you cannot be the master of your language, you must be its slave. If you cannot examine your thoughts, you have no choice but to think them, however silly they may be.\"\n \n16. Naming and Telling \"Two things, then, are necessary for intelligent discourse: an array of names, and a conventional system for telling. The power of a language is related, therefore, to the size and subtlety of its lexicon, its bank of names, and the flexibility and accuracy of its telling system, its grammar.\"\n \n17. Sentimental Education \"The history of mankind hasn't yet provided any", "-29.4210861999818" ], [ "evidence for the \"language of thought\" hypothesis, which posits an underlying language of the brain, or \"mentalese\", distinct from a thinker's native tongue. Purpose One study found inner speech was most usual for tasks involving self-regulation (e.g. planning and problem solving), self‐reflection (e.g. emotions, self‐motivation, appearance, behavior/performance, and autobiography), and critical thinking (e.g., evaluating, judging, and criticizing). Development In the 1920s, Swiss developmental psychologist Jean Piaget proposed the idea that private (or \"egocentric\") speech—speaking to yourself out loud—is the initial form of speech, from which \"social speech\" develops, and that it dies out as children grow up. In the 1930s,", "-29.309685353422537" ], [ "conceive other way of writing different to the first-person narrative. It is the unique real and sincere, because, how a poor son of neighbor will know what two or three or four characters are thinking! I don't know myself what I am thinking with this turbulence of the brain, less I know what the neighbor is thinking!\"\n— Fernando Vallejo, La Prensa Literaria\nAccording to critics, the decision of Vallejo of speak in first person breaks the most obstinate tradition of literature of using an omniscient narrator who knows everything and sees everything, the novelist who can cross with his eyes the walls", "-29.286553733923938" ], [ "everyone else's feelings and experiences. Also at this age, there is often a lack of ability to understand that there may be other explanations for events outside of the realm of things they have already comprehended. What happens outside their understanding needs to be explained using what they already know, because of an inability to fully comprehend abstract concepts.\nMagical thinking is found particularly in children's explanations of experiences about death, whether the death of a family member or pet, or their own illness or impending death. These experiences are often new for a young child, who at that point has", "-29.22323070677521" ], [ "the understanding of how doctors and psychologists can identify thoughts.\nThe term \"thought identification\" started being used in 2009 after neuroscientist Marcel Just coined it in a 60 Minutes interview. His reasoning for this term pertains to his overall goal of his research \"to see if they could identify exactly what happens in the brain when people think specific thoughts\". Future research Experts are unsure of how far thought identification can expand, but Marcel Just believed in 2014 that in 3–5 years there will be a machine that is able to read complex thoughts such as 'I hate so-and-so'.\nDonald Marks, founder", "-29.169876764179207" ], [ "has, as its very reality, an inner warrant to command assent, and that invisible predeterminations constitute it and make it definable as that which has an antecedent call on the intellect\nDEWART ON CONSCIOUS COMMUNICATION AND COMPUTERS\nIndeed, some people who have first hand acquaintance with speech are nevertheless so confused about what they do when they speak - and therefore when they think - that they even wonder whether computers do not think.\nAn eminent computer scientist once thus proposed - he was serious, and convinced many of his colleagues - that unless one could tell the difference between teleprinter exchanges between", "-28.759000350080896" ], [ "human mind by triggering thoughts that the mind is physically or logically incapable of thinking. The first of these stories was \"BLIT\" (Interzone, 1988); others include \"What Happened at Cambridge IV\" (Digital Dreams, 1990); \"comp.basilisk FAQ\", and the Hugo-winning \"Different Kinds of Darkness\" (F&SF, 2000).\nThe idea has appeared elsewhere; in one of his novels, Ken MacLeod has characters explicitly mention (and worry about encountering) the \"Langford Visual Hack\". Similar references, also mentioning Langford by name, feature in works by Greg Egan and Charles Stross. The eponymous Snow Crash of Neal Stephenson's novel is a combination mental/computer virus capable of", "-28.517537806015753" ], [ "in parallel. Psychologist B.F. Skinner argued that the mind is an explanatory fiction that diverts attention from environmental causes of behavior; he considered the mind a \"black box\" and thought that mental processes may be better conceived of as forms of covert verbal behavior.\nPhilosopher David Chalmers has argued that the third person approach to uncovering mind and consciousness is not effective, such as looking into other's brains or observing human conduct, but that a first person approach is necessary. Such a first person perspective indicates that the mind must be conceptualized as something distinct from the brain.\nThe mind", "-28.44433651498548" ], [ "which they claimed to speak with authority. The dictum, that with a limited knowledge no one can know that any person is omniscient, may possibly be an old saying of the Sceptics; and they may have extended the idea to say that since human intellect was limited, no one could claim to know everything with such limited intellect. The passage may also be seen as a critic on epistemology. On knowledge In the same passage, Silanka further continues:\nKnowledge cannot completely comprehend the nature of the object of knowledge, for it is said, \"whatever is apprehended should have the parts, near,", "-28.443563654116588" ], [ "ability to comprehend spoken language, as well as to speak it. However, if the person loses hearing ability later in life, most can still maintain a normal level of verbal intelligence. This is thought to be because of the brain's feed forward mechanism still helping to fix speech errors, even in the absence of auditory feedback. Generation Generation of written language is thought to be closely related to speech generation, relying on Broca's area for early processing and on the inferior frontal gyrus for semantic processing. However, writing differs in two major ways. First, instead of relating the thought to", "-28.364443348837085" ], [ "of thought, in the same way, e.g., that thought and language are linked: \"if you feel, you understand.\" The immortality of the soul Thus, knowledge would be an essential faculty of the soul, and, moreover, the human being has a soul conscious of itself, that exists thanks to the thoughts it develops. In this work (Antoniana Margarita), there is the phrase \"I know that I know something, anyone who knows exists, then I exist\" (\"Nosco me aliquid noscere, & quidquid noscit, est, ergo ego sum\").\nHistory has not recognized his contribution even though Descartes had already been accused of plagiarism", "-28.273659786151256" ], [ "an unusual, figurative, senseless manner. Sensible qualities, such as extension, figure, or motion, do not have an existence outside of a mind. Knowledge of external objects Comparing Ontology with Epistemology, Berkeley asked, \"But, though it were possible that solid, figured, moveable substances may exist without the mind, corresponding to the ideas we have of bodies, yet how is it possible for us to know this?\" Knowledge through our senses only gives us knowledge of our senses, not of any unperceived things. Knowledge through reason does not guarantee that there are, necessarily, unperceived objects. In dreams and frenzies, we have ideas", "-28.185039424162824" ], [ "Jurij Moskvitin Essay on the Origin of Thought (1974) In this book, Moskvitin records a collection of his theories on the beginnings of thought and language. In his view, the origin of language and thought lie in spontaneous and rare creative acts, often inspired in a human in a stressful and dangerous situation.\nThese thoughts are inspired by a period in which the author turned his attention \"from 'what he thinks' to 'how he thinks'\", a turn to introspection. Moskvitin describes how he came to observe \"states of mind when consciousness is kept somewhere halfway between the waking state and dream.\"", "-28.008352868724614" ], [ "we are hardly aware of their existence. Research suggests that language is heavily peppered with such bundles in all registers; two examples include \"do you want me to\", commonly found in speech, or \"there was no significant\" found in academic registers. Put together in speech, they can create comprehensible sentences, such as \"I'm not sure\" + \"if they're\" + \"they're going\" to form \"I'm not sure if they're going\". Such a sentence eases the burden on the Lexicon as it requires no grammatical analysis whatsoever.", "-27.993180617399048" ], [ "the late 19th century with experiments involving placing people in different stimuli contexts and them thinking about their thoughts and feelings after. These types of experiments have continued since. Always asking the participant to think about how they feel and their thoughts. However, we can never know if they are accessing their unconscious as they do this or if the information is just coming from their conscious mind. . This makes research into this area more difficult creating the debate over introspection.\nMore recent research suggests that many of our preferences, attitudes, and ideas come from the adaptive unconscious. However, subjects", "-27.97701707066153" ], [ "these two modes of knowing, we can appear to be very knowledgeable about the grammar of a particular language or grammar in general and yet be very poor users of that language. Or, like many native speakers, we can make metalinguistic assertions about the rules of our language which are not at all borne out by the way we actually speak and comprehend our mother tongue. Knowledge of a language, in this metalinguistic sense of the word, can also be \"right\" or \"wrong\". We can have misconceptions about language, or we can have a view of grammar that accords with", "-27.967682346439688" ], [ "is no understanding written or spoken, is an act of transcendence. Thinking symbolically becomes a form of consciousness that goes far beyond individuals. It's a meditation of the past and future, a reflection of the world within and beyond. Communicating through abstract ideas is at the foundation of creativity and symbolic thought, including art, music, the written word, mathematics, and science. \nWinquist noted that in René Descartes' third Meditation, Descartes wrote that God transcended \"subjective dominance.\" The very thought of God's attributes created doubt about the innate ability of human nature to comprehend the existence", "-27.87977908263565" ], [ "hypothesis has been both controversial and groundbreaking. Some philosophers reject the LOTH, arguing that our public language is our mental language—a person who speaks English thinks in English. But others contend that complex thought is present even in those who do not possess a public language (e.g. babies, aphasics, and even higher-order primates), and therefore some form of mentalese must be innate.\nThe notion that mental states are causally efficacious diverges from behaviorists like Gilbert Ryle, who held that there is no break between the cause of mental state and effect of behavior. Rather, Ryle proposed that people act in some", "-27.859324849880068" ], [ "that they were experiencing telepathy. Thought insertion/removal is a symptom of psychosis, particularly of schizophrenia, schizoaffective disorder or substance-induced psychosis. Psychiatric patients who experience this symptom falsely believe that some of their thoughts are not their own and that others (e.g., other people, aliens, demons or fallen angels, or conspiring intelligence agencies) are putting thoughts into their minds (thought insertion). Some patients feel as if thoughts are being taken out of their minds or deleted (thought removal). Along with other symptoms of psychosis, delusions of thought insertion may be reduced by antipsychotic medication. Psychiatrists and clinical psychologists believe and empirical", "-27.82329649964231" ], [ "determines our thoughts and perceptions. For example, it used to be thought that the Greeks, who wrote left to right, thought differently than Egyptians since the Egyptians wrote right to left. Whorf's theory was so strict that he believed if a word is absent in a language, then the individual is unaware of the object's existence. This theory was played out in George Orwell's book, Animal Farm; the pig leaders slowly eliminated words from the citizen's vocabulary so that they were incapable of realizing what they were missing. The Whorfian hypothesis failed to recognize that people can still be aware", "-27.8099152026698" ], [ "such thoughts never entered their minds.", "-27.795798101229593" ], [ "such as brain tissue (that is neurons and synapses). Descartes, who thought extensively about mind-brain relationships, found it possible to explain reflexes and other simple behaviors in mechanistic terms, although he did not believe that complex thought, and language in particular, could be explained by reference to the physical brain alone.\nThe most straightforward scientific evidence of a strong relationship between the physical brain matter and the mind is the impact physical alterations to the brain have on the mind, such as with traumatic brain injury and psychoactive drug use. Philosopher Patricia Churchland notes that this drug-mind interaction indicates an intimate", "-27.68056029593572" ], [ "denoting mental states from verbal explanations alone, requiring knowledge of the syntactic rules, semantic systems, and pragmatics of a language. Studies have shown that understanding of these mental state words predicts theory of mind in four-year-olds.\nA third hypothesis is that the ability to distinguish a whole sentence (\"Jimmy thinks the world is flat\") from its embedded complement (\"the world is flat\") and understand that one can be true while the other can be false is related to theory of mind development. Recognizing these sentential complements as being independent of one another is a relatively complex syntactic skill and has been", "-27.607846269471338" ], [ "thinking are just some of the things that the human brain develops at an early age. Learning how to interact with others and how to focus on certain subjects are essential lessons to learn. This spans from the time we can talk all the way to when we are so old that we can barely walk. However, there are some people out there who have difficulty with these kind of skills and behaving like an average person. This is most likely the cause of having a mental illness. A mental illness is a wide range of conditions that affect a", "-27.557510186044965" ], [ "and wife or brother and sister. Since such people have much in common, it is highly probable that they will sometimes think the same thought at the same time.\" Graham Reed, a specialist in anomalistic psychology, noted that experiments into telepathy often involve the subject relaxing and reporting the 'messages' to consist of colored geometric shapes. Reed wrote that these are a common type of hypnagogic image and not evidence for telepathic communication.\nOutside of parapsychology, telepathy is generally explained as the result of fraud, self-delusion and/or self-deception and not as a paranormal power. Psychological research has also revealed other explanations", "-27.40269632684067" ], [ "in the testimony of people who had experienced telepathy and other \"anomalous phenomena\".\n\nThe idea that ordinary people only utilize a small fraction of the (potentially enormous) capabilities of the human brain had became a particular \"pet idea\" for Campbell by the time he first published his own science fiction writings as a college student. In a 1932 short story he asserted that \"no man in all history ever used even half of the thinking part of his brain\". He followed up on this notion in a note to another story published five years later: \nThe total capacity of the mind,", "-27.37720486701255" ], [ "image of man.\"\nBut I could never have done this by reasoning. I had to rely on subconscious thinking, the only intuitive resource available to humans—which few of us ever use in an entire lifetime. . . .I should add that I could never have learned to think subconsciously without years of ascetic withdrawal. depriving my body, isolating my self, concentrating my mind and spirit. . .until by stages I had perfected what I consider to be a totally new method of writing.\nChazal's other writings include notably La Vie Filtrée (1949), a collection of essays that elaborate the ideas found in", "-27.28902055355138" ], [ "that one must usually understand something of the associated spoken language to comprehend the text. In contrast, symbolic systems, such as information signs, painting, maps, and mathematics, often do not require prior knowledge of a spoken language. Every human community possesses language, a feature regarded by many as an innate and defining condition of humanity (see Origin of language). However the development of writing systems, and their partial supplantation of traditional oral systems of communication, have been sporadic, uneven, and slow. Once established, writing systems on the whole change more slowly than their spoken counterparts and often preserve features and", "-27.253865437873174" ], [ "much misinterpretation and criticism. In 1969, Brent Berlin and Paul Kay rejected the strong hypothesis using a color terminology study.\nSteven Pinker notes that we are not born with language, so that it is not likely that we are engineered to think in words alone. Multiple intelligences Gardner's multiple intelligences theory recognises various forms of intelligence, namely spatial, linguistic, logical-mathematical, bodily-kinesthetic, musical, interpersonal, intrapersonal, naturalistic. Gardner's theory is discussed and cited in many of David A Sousa's 'How the Brain learns' series of books, including 'How the Gifted Brain learns' and 'How the Special Needs Brain Learns'. Areas of competence", "-27.230914060404757" ], [ "it weakens the powers of the mind and of memory. True knowledge can only emerge from a relationship between active human minds. And unlike a person, a text can’t respond to a question; it will just keep saying the same thing over and over again, no matter how often it is refuted.\nThe Canadian communications scholar, Harold Innis argued that a balance between the spoken word and writing contributed to the cultural and intellectual vitality of ancient Greece in Plato's time. Plato conveyed his ideas by writing down the conversations of Socrates thus \"preserving the power of the spoken", "-27.21092567802407" ], [ "language has a certain number of things that can be talked about, \nand certain ways of talking about these things that may not exist in other languages. \nHis theory is substantially influenced by the writings of Benjamin Lee Whorf on linguistic relativity, Etienne Bonnet de Condillac and Wilhelm von Humboldt.", "-27.140191258848063" ], [ "to be known constitutes a man more of a scholar than to know many things simply by rote. The man of one idea may be an object of ridicule, yet if his one idea is apprehended in its proper life and power, he is of far more account than if he had collected a number of notions, all jumbled together in his mind confusedly. The knowledge of a scholar becomes a part of himself; and does not hang around his soul like a broad-cloth coat about his shoulders. Yielding himself to the plastic power of truth, as such, his mind", "-27.129822468501516" ], [ "suggestion. People with mental disorders often believe that they can predict the future or read minds, that they're cursed or vice versa 'chosen', that they come from another planet or another time. People with physical defects become an inspiration for stories of dwarfs, giants and werewolves. They assembly ideas inspired stories about water sprites, centaurs or vampires. According to Vondráček, tales about haunted castles, evil creations or living dead were created as a result of hallucinations and suggestions. Vondráček shows the signs of various mental disorders and mental phenomena on examples from history, from myths and fairy tales, but also", "-27.090307528313133" ], [ "are limited by biology and that certain problems may be beyond our understanding:\nA Martian scientist, with a mind different from ours might regard this problem [of free will] as trivial, and wonder why humans never seem to hit on the obvious way of solving it. This observer might also be amazed at the ability of every human child to acquire language, something that seems to him incomprehensible, requiring divine intervention.\n— Noam Chomsky, Language and problems of knowledge Phenomena and noumena As argued in Kant's Critique of Pure Reason, human thinking is unavoidably structured by categories of the understanding:\nQuantity – Unity,", "-27.0653519249463" ], [ "all knowledge is rooted in experience. Further, there are also simple ideas and complex ideas. Simple ideas enter by the senses, and they are simple and unmixed. Complex ideas are simple ideas that have been combined and related together using the abstracting activity of the mind.\nLocke is also responsible for an early theory of personal identity. He thought that our being the same person from one time to another consists, not in our having the same soul or the same body, but rather the same series of psychological connections. For Locke, to be a person is to", "-27.021924246277194" ], [ "without thinking, but found that these had no effect on real language use.\nDuring the 1970s, Brown was influenced by thinkers such as William T. Powers, taking from his Perceptual Control Theory \"that language learning must consist of looking and listening, not practicing,\" and Timothy Gallwey, from whose Inner Game writings he \"saw that thinking just got in the way of performance.\" Nevertheless, he persisted with trying to achieve fluency in language through conscious practice. While studying physics at the University of Utah, Brown studied Japanese with drills and practice of speeches, but found that \"[n]ot a single sentence was ever", "-27.011860672035255" ], [ "memory, causing the person to be \"captured\" at the general level and ruminating on the idea, ending any deeper search for a specific memory. For example, when prompted with the cue word \"sad,\" a person may think of a general event such as \"sad when people ignore me.\" This thought, in turn, can lead to other thoughts centered on their negative self-beliefs, such as \"why don't people like me,\" \"I'm never good enough,\" etc., so a particular and specific event is never accessed. This error is often found in individuals who score high on ruminative thinking, such", "-26.974622928421013" ], [ "so many extreme and incomprehensible ways. The most basic concepts of his society are unknown to these people. When he inquires about the nearest city, the old man who is \"the Father of the House\" thinks he is talking about a beehive. When the narrator notes that they share the English language, he is again not understood; the people of the house think they speak \"the language of human beings – that is all.\" (Though their spoken language has changed little, the writing system is altered so much that the narrator cannot read the \"Hebrew-like characters\" in which their books are", "-26.970350045943633" ], [ "mind only by its immersion in social relationships together with \"other brains linked by language and culture.\" (p. 331) Human meaning derives not from nature but from the language-linked social network of which we are part.\" (p. 334) If we did succeed in creating a machine capable of participating in a human society like a human being, it would be human (334–35).\nIn the final chapter of Man, Beast and Zombie, Malik laments what he sees as an increasing reluctance to view individual people as autonomous, rational, and competent agents, and a tendency to view them as damaged, weak, incapable, and possessing", "-26.959768679793342" ], [ "as important and therefore may not develop until later. Language There is evidence to believe that the development of theory of mind is closely intertwined with language development in humans. One meta-analysis showed a moderate to strong correlation (r = 0.43) between performance on theory of mind and language tasks. One might argue that this relationship is due solely to the fact that both language and theory of mind seem to begin to develop substantially around the same time in children (between ages 2–5). However, many other abilities develop during this same time period as well, and do not produce", "-26.926479100831784" ], [ "but exist from the first as a synthesis of relations in a consciousness which keeps distinct the \"self\" and the various elements of the \"object,\" though holding all together in the unity of the act of perception. In other words, the whole mental structure we call knowledge consists, in its simplest equally with its most complex constituents, of the \"work of the mind.\" Locke and Hume held that the work of the mind was eo ipso [by that very act] unreal because it was \"made by\" humans and not \"given to\" humans. It thus represented a subjective creation, not", "-26.86131781875156" ], [ "he or she does not know is another aspect of metamemory that enables people to respond quickly when asked a question that they do not know the answer to. In other words, people are aware of the fact that they do not know certain information and do not have to go through the process of trying to find the answer within their memories, since they know the information in question will never be remembered. One theory as to why this knowledge of not knowing is so rapidly retrieved is consistent with the cue-familiarity hypothesis. The cue familiarity hypothesis states that", "-26.829004842521954" ], [ "Thought insertion Thought insertion is defined by the ICD-10 as feeling as if one's thoughts are not one's own, but rather belong to someone else and have been inserted into one's mind. The person experiencing thought insertion will not necessarily know where the thought is coming from, but makes a distinction between their own thoughts and those inserted into their minds. However, patients do not experience all thoughts as inserted; only certain ones, normally following a similar content or pattern. This phenomenon is classified as a delusion. A person with this delusional belief is convinced of the veracity of their", "-26.821629954269156" ], [ "think existence. Thought is always a form of abstraction, and thus not only is pure existence impossible to think, but all forms in existence are unthinkable; thought depends on language, which merely abstracts from experience, thus separating us from lived experience and the living essence of all beings. In addition, because we are finite beings, we cannot possibly know or understand anything that is universal or infinite such as God, so we cannot know God exists, since that which transcends time simultaneously transcends human understanding.\nBradley saw reality as a monistic whole apprehended through \"feeling\", a state in which there is", "-26.798432421812322" ], [ "be possible why don't we give it a try?\nTwo days after our life-changing phone call, I entered a laboratory at Bellevue Hospital in New York City and was hooked up to a computer that turned all the data from my brain and heart into sound. I had a one-hour mental itinerary of the information I wished to convey. I began by thinking about the history of Earth and the life it sustains. To the best of my abilities I tried to think something of the history of ideas and human social organization. I thought about the predicament that our civilization", "-26.78383592265891" ], [ "played a crucial role in our perception of reality. Language is what gives the thought its expression and thus shapes it; in other words, thinking is determined by language. In \"Science and Linguistics\" Whorf stated that:\n\"It was found that the background linguistic system (in other words, the grammar) of each language […] is itself the shaper of ideas, the program and guide. […] We dissect nature along the lines laid down by our native languages.\n[…] This fact is very significant for modern science, for it means that no individual is free to describe nature with absolute impartiality […]. We are", "-26.765508082462475" ], [ "imagine objects that are not perceived by anyone. But, he asked, \"…what is all this, I beseech you, more than framing in your mind certain ideas which you call books and trees, and at the same time omitting to frame the idea of any one that may perceive them? But do not you yourself perceive or think of them all the while?\" The mind had merely forgotten to include itself as the imaginer of those imagined objects. Absolute existence It is impossible to understand what is meant by the words absolute existence of sensible objects in themselves. To speak", "-26.763057135394774" ], [ "– that is perceptual knowledge. When we succeed in knowing something by perceiving it, experience does not fall short of the fact known. But this just shows that a successful and a failed perceptual thought have nothing interesting in common from the point of view of appraising them as knowledge.\nIn this claim that a veridical perception and a non-veridical perception share no highest common factor, a theme is visible which runs throughout McDowell's work, namely, a commitment to seeing thoughts as essentially individuable only in their social and physical environment, so called externalism about the mental. McDowell defends, in addition", "-26.754257716820575" ], [ "I really could not, I felt I could not, use words in their ordinary connections. Used that way they do not express how things are in the night, in the different stages – the conscious, then semi-conscious, then unconscious. I found that it could not be done with words in their ordinary relations and connections. When morning comes of course everything will be clear again [...] I'll give them back their English language. I'm not destroying it for good.\n Joyce is also reported as having told Arthur Power that \"what is clear and concise can't deal with reality, for to", "-26.743228793486196" ], [ "of specific nerve cells.\nA series of experiments on more than 300 people from the U.S. and Korea found that thinking in a second language reduced deep-seated, misleading biases that unduly influence how risks and benefits are perceived.\nOther research has shown that early exposure to a second language increases divergent thinking strategies, helping not only in language-related tasks, but also in areas such as math. Children early on have different ways of expressing themselves, such that they better understand there is more than one way to look at a problem and that there is more than one solution. Acquisition versus", "-26.73110953439027" ], [ "mind is fundamental to the way we think, it’s wired into our brains. And over the millennia we humans have learned ways to improve upon this. The first improvement is language. [...] So language is a way of allowing one person to learn from many different people. But you know, we’ve also learned to turn that concept around to use language as a way of allowing one person to teach many people. [...] the principle remains the same. And in fact, this is the genesis of art. 'Cause art really is just a way of communicating ideas.\n[...] The interactive conversation", "-26.728985754620226" ], [ "thinks that he knows. I neither know nor think that I know\" [from the Benjamin Jowett translation]. Whichever translation we use, the context in which this passage occurs should be considered; Socrates having gone to a \"wise\" man, and having discussed with him, withdraws and thinks the above to himself. Socrates, since he denied any kind of knowledge, then tried to find someone wiser than himself among politicians, poets, and craftsmen. It appeared that politicians claimed wisdom without knowledge; poets could touch people with their words, but did not know their meaning; and craftsmen could claim knowledge only in specific", "-26.723753392056096" ], [ "in societies based on magical thought, a theory does not need to be objectively judged to be valid. In children According to some, so called Magical thinking is most prominent in children between ages 2 and 7. \nDue to examinations of grieving children, it is asserted that during this age, children strongly believe that their personal thoughts have a direct effect on the rest of the world. It is posited that their minds will create a reason to feel responsible if they experience something tragic that they do not understand, e.g. a death,. Jean Piaget, a developmental psychologist, came up", "-26.62284288171213" ], [ "as belonging to the other participant and believed the machine had transferred the thought into their mind through the machine. This occurred after only 5 minutes. These misattributions were more frequent when the target thought was an arousing negative thought as compared to a neutral control. Neurology Identifying brain regions associated with thought insertion has proven difficult. First, it is difficult to find subjects who experience thought insertion frequently. Second, it is difficult to do brain imaging techniques on these subjects while they are experiencing thought insertion. Therefore, most of the findings in this field come from cases of normal", "-26.614436135801952" ], [ "and the language she wrote in. Early in her life, Ortiz Cofer realized her \"main weapon in life was communication,\" and to survive, she would have to become fluent in the language spoken where she lived.\nOrtiz Cofer believes that what it is important in life is not the event but the memory that these events produce. It was these memories that we as humans cling onto and our mind warp into how we would like to perceive these events. Ortiz Cofer tested her theory by asking both her mother and her brother to recall the same event. When both of", "-26.608687834966986" ], [ "view of mind as an originally blank or empty recorder (Locke used the words \"white paper\") on which experience leaves marks. This denies that humans have innate ideas. The image dates back to Aristotle:\n\nWhat the mind (nous) thinks must be in it in the same sense as letters are on a tablet (grammateion) which bears no actual writing (grammenon); this is just what happens in the case of the mind. (Aristotle, On the Soul, 3.4.430ᵃ1).\nAristotle's explanation of how this was possible was not strictly empiricist in a modern sense, but rather based on his theory of potentiality and", "-26.599114921991713" ], [ "notion of a collection of \"thoughts\" that exist in a privileged region of the mind such that they are in principle never accessible to conscious awareness, is incoherent. This is not to imply that there are not \"nonconscious\" processes that form the basis of much of conscious life. Rather, Searle simply claims that to posit the existence of something that is like a \"thought\" in every way except for the fact that no one can ever be aware of it (can never, indeed, \"think\" it) is an incoherent concept. To speak of \"something\" as a \"thought\" either implies that it", "-26.58571978515829" ], [ "not be: \"For never shall this prevail, that things that are not are.\" \nThinking and the thought that it is are the same; for you will not find thinking apart from what is, in relation to which it is uttered. (B 8.34–36)\nFor to be aware and to be are the same. (B 3)\nIt is necessary to speak and to think what is; for being is, but nothing is not. (B 6.1–2)\nHelplessness guides the wandering thought in their breasts; they are carried along deaf and blind alike, dazed, beasts without judgment, convinced that to be and not to be are the", "-26.583774365892168" ], [ "any given moment, there is a great deal of information made available to each individual. Psychologists have found that one's mind can attend to only a certain amount of information at a time. According to Csikszentmihályi's 2004 TED talk, that number is about \"110 bits of information per second\". That may seem like a lot of information, but simple daily tasks take quite a lot of information. Just decoding speech takes about 60 bits of information per second. That is why when having a conversation one cannot focus as much attention on other things.\nFor the most part (except for basic", "-26.573541200661566" ], [ "(1990), he suggests that all three questions might be answered by postulating that the origin of language can be traced to the evolution of representation systems and symbolic thinking, together with a later development of formal syntax. Using primitive communication faculties, which then evolved in parallel, mental models became shared representations subject to cultural evolution. In Lingua ex Machina (2000), he and William Calvin revise this speculative theory by considering the biological foundations of symbolic representation and their influence on the evolution of the brain.\nIn his memoir Bastard Tongues (2008), he describes himself as a \"street linguist\"", "-26.561162730678916" ], [ "could possibly reproach him, as well as his dismissive thoughts of \"theoretical data\" and mainstream philosophy in general (Eliade saw the latter as \"inert, infertile and pathogenic\"). Eliade thus argued, \"a sincere brain is unassailable, for it denies itself to any relationship with outside truths.\"\nThe young writer was however careful to clarify that the existence he took into consideration was not the life of \"instincts and personal idiosyncrasies\", which he believed determined the lives of many humans, but that of a distinct set comprising \"personalities\". He described \"personalities\" as characterized by both \"purpose\" and \"a much more complicated and dangerous", "-26.546671690011863" ], [ "reveal how language is deeply intersubjective. When we speak, we always address our interlocutors, taking their perspective and orienting to what we think they think (or, more often, don't think). Within this tradition of research, it has been argued that the structure of individual signs or symbols, the basis of language, is intersubjective and that the psychological process of self-reflection entails intersubjectivity. Recent research on mirror neurons provides evidence for the deeply intersubjective basis of human psychology, and arguably much of the literature on empathy and theory of mind relates directly to intersubjectivity. In child development Colwyn Trevarthen has applied", "-26.535575155401602" ], [ "K. Logan (2007) develops the thesis that verbal language extends the brain into a mind capable of conceptualization and hence the mind = brain + language. The human brain before it acquired verbal language according to this thesis is considered to be a percept processor. With language the mind is capable of conceptualization and hence able to consider things that are not immediately available in the here and now. The first words of verbal language are concepts associated with all the percepts associated with those words. For example the word water brings to mind the water we drink, the water", "-26.48387094278587" ], [ "sentences that turn the thought into an understandable form. This occurs primarily in the inferior frontal cortex, specifically in an area known as Broca's area. Next, the brain must plan how to physically create the sounds necessary for speech by linking the planned speech with known sounds, or phonemes. While the location of these associations is not known, it is known that the supplementary motor area plays a key role in this step. Finally, the brain must signal for the words to actually be spoken. This is carried out by the premotor cortex and the motor cortex.\nIn most cases, speech", "-26.429735663579777" ], [ "child can think; and, possibly, do it practically; you wouldn't constantly run across folks today who claim that \"a child don't know anything.\" A child's brain starts functioning at birth; and has, amongst its many infant convolutions, thousands of dormant atoms, into which God has put a mystic possibility for noticing an adult's act, and figuring out its purport.\nUp to about its primary school days a child thinks, naturally, only of play. But many a form of play contains disciplinary factors. \"You can't do this,\" or \"that puts you out,\" shows a child that it must think, practically, or fail.", "-26.41673421737505" ], [ "work might tire of social conversations very quickly. Likewise, a fast-talking person might not necessarily be able to manipulate objects swiftly or perform rapid mental calculations. History This approach was developed within experimental psychophysiology in studies on adults only and therefore was not used in developmental psychology (in studies and practical applications of children's temperament).\nFirst known expression of this idea was in the work of Dodge, who studied mental fatigue. Dodge suggested that physical and mental efforts are regulated by different nervous processes.\nThis idea was verbalized again by Vladimir Nebylitsyn, then further developed in differential psychology and psychophysiology experiments", "-26.413484986056574" ], [ "(1999: 10). Cohen states, evidence for knowing that a learner is not able to \"find\" something, is the use of the so-called progressive retrieval (1986). Thereby, the learner is unable to express something that is in his mind and consequently uses an incorrect form. He eventually remembers the correct one (Cohen 1986; Olshtain 1989). Time is considered the decisive factor to measure how far the attrition has proceeded already (de Bot & Weltens, 1995). Hypotheses of language attrition To have a better understanding of language attrition, it is necessary to examine the various hypotheses that attempt to explain how language", "-26.41068716585869" ], [ "(or at least with physical systems of symbols to which information is assigned) by means of such things as computers. From the beginning, computer programmers have been able to develop programs that permit computers to carry out tasks for which organic beings need a mind. A simple example is multiplication. It is not clear whether computers could be said to have a mind. Could they, someday, come to have what we call a mind? This question has been propelled into the forefront of much philosophical debate because of investigations in the field of artificial intelligence (AI).\nWithin AI, it is common", "-26.406870911072474" ], [ "on at least some level—we cannot however claim that computer or any other machine is “thinking” because we have no coherent definition of what thinking is. Taking the example of what’s called “consciousness,” “We don’t even have bad theories” says Chomsky, echoing the famous physics criticism that a theory is “not even wrong.” From Turing’s famous 15 or so page paper Chomsky provides the example of a submarine being said to “swim,” Turing clearly deriding the idea, “if you want to call that swimming, fine,” Chomsky says, repeatedly explaining in print and video how Turing is consistently misunderstood on this,", "-26.38150185055565" ], [ "thinking has tended to avoid proposing precise mechanisms. Literature This term is used to describe the tendency to attribute human characteristics to entities that are other than human. Example; \"My dog's separation anxiety\", etc.", "-26.363318809424527" ], [ "the mind has a built-in propensity to process symbolic representations. The origins of this ability were sought by Steven Pinker in a Darwinian struggle that established the survival value of the ability to communicate. According to Pinker, Charles Darwin himself \"concluded that language ability is 'an instinctive tendency to acquire an art', a design that is not peculiar to humans but seen in other species such as song-learning birds.\" This observation is strongly supported by research on crows.\nThis work can be taken to suggest that although a physical theory is an intermediary between our observations and our notions of", "-26.33963182650041" ], [ "a composition of many minds that come together to change the country for better or worse.\nGentile theorizes that thoughts can only be conjectured within the bounds of known reality; abstract thinking does not exist. Thoughts cannot be formed outside our known reality because we are the reality that halt ourselves from thinking externally. With accordance to \"The Act of Thought of Pure Thought\", our actions comprise our thoughts, our thoughts create perception, perceptions define reality, thus we think within our created reality.\nThe present act of thought is reality but the past is not reality; it is history. The reason being,", "-26.337276925245533" ], [ "linguistic relativity, seeing it as unsound or even ridiculous. For example, Steven Pinker argues in his book The Language Instinct that thought exists prior to language and independently of it, a view also espoused by philosophers of language such as Jerry Fodor, John Locke and Plato. In this interpretation, language is inconsequential to human thought because humans do not think in \"natural\" language, i.e. any language used for communication. Rather, we think in a meta-language that precedes natural language, which Pinker following Fodor calls \"mentalese.\" Pinker attacks what he calls \"Whorf's radical position\", declaring, \"the more you examine Whorf's arguments,", "-26.32050286687445" ], [ "Intrusive thought General Many people experience the type of bad or unwanted thoughts that people with more troubling intrusive thoughts have, but most people can dismiss these thoughts. For most people, intrusive thoughts are a \"fleeting annoyance\". Psychologist Stanley Rachman presented a questionnaire to healthy college students and found that virtually all said they had these thoughts from time to time, including thoughts of sexual violence, sexual punishment, \"unnatural\" sex acts, painful sexual practices, blasphemous or obscene images, thoughts of harming elderly people or someone close to them, violence against animals or towards children, and impulsive or abusive outbursts", "-26.319818507894524" ], [ "all had their applications and misapplications. By bending to their service all the faculties of a powerful mind, by inextinguishable wit, and by every artifice of argument, he carried their thoughts as far as they would reach—so far beyond their sources that they came to us with the vitality of the newly created.", "-26.28405270818621" ], [ "When it happens that one's mind is empty, one is able to possess much intellect without said intellect interfering with the process of absorbing new information. When it happens that one's mind is unified, one understands differences and the variety of information, but does not allow \"one fact to impinge upon that of another.\" When it happens that one's mind is still, although one may daydream and imagine and have a mind constantly in motion, one does not allow these mental meanderings to distort perceptions. Xunzi is referring to peace of mind rather than an attempt to unlearn", "-26.26826248152065" ], [ "Steven Pinker's theory embodies this idea. He proposed that all individuals are first capable of a \"universal mentalese\", of which all thought is composed prior to its linguistic form. Language then enables us to articulate these already existing thoughts into words and linguistic concepts.\nFor example, one may perceive different colors even while missing a particular word for each shade, like New Guinea aborigines can distinguish between the colors green and blue even though they have only one lexical entry to describe both colors. In communities where language does not exist to describe color it does not mean the concept is", "-26.25388679659227" ], [ "to solving the mind–body problem can be removed if we allow that it is possible for one person to directly experience the conscious mind of another. The vast majority of philosophers and scientists writing about consciousness believe that this is impossible, but this would mean that conscious brain states are different from all other physical states, which can be known about by multiple persons. This creates a block to understanding our minds as physical systems. Hirstein describes how \"mindmelding\" could be achieved by connecting person A's prefrontal lobes to person B's posterior cortex, which would in effect connect person A's", "-26.230717120692134" ], [ "always leave us with the mind–body problem which cannot be solved. Biology “Thought”, is any phenomenon, which constitutes of our mind or consciousness. The sensations of thought is presented at our receptors and are then transmitted to the brain where they are perceived in the form of thoughts. This level of awareness is only possible through the presence of a nervous system consisting of a brain and spinal chord. The basic building unit of the nervous system is the neuron. A neuron (also known as a neurone or nerve cell) is an excitable cell in the nervous system that processes", "-26.22012779850047" ], [ "it is about a very real and particular dog in the real world. Stronger idea theories John Locke, considered all ideas to be both imaginable objects of sensation and the very unimaginable objects of reflection. Locke said in his Essay Concerning Human Understanding, that words are used both as signs for ideas—but also to signify the lack of certain ideas. David Hume held that thoughts were kinds of imaginable entities. (See Hume's Enquiry Concerning Human Understanding, section 2). Hume argued that any words that could not call upon any past experience were without meaning.\nNonetheless, George Berkeley and Ludwig Wittgenstein", "-26.218195129797095" ], [ "Any action done by humans is classified as human thought because the action was done due to predisposed thought. He further believes that thoughts are the only concept that truly exist since reality is defined through the act of thinking. This idea was derived from Gentile's paper, \"The Theory of Mind As Pure Act\".\nSince thoughts are actions, any conjectured idea can be enacted. This idea not only affects the individual's life, but everyone around them, which in turn affects the state since the people are the state. Therefore, thoughts of each person are subsumed within the state. The state is", "-26.215531861496856" ], [ "In any case, what we can remember is what we have figured out ourselves. For this purpose, she always bought her own copies of books, since while reading she wrote on the edge of the pages what she had understood from the text by herself. This way one cannot avoid picking up something of a language—as one can't rest until one has learnt who the murderer is, or whether the girl says yes in the end. (This method was, incidentally, applied successfully even before her, by a Hungarian writer, Dezső Kosztolányi as well: according to his account, he studied Portuguese", "-26.190488909036503" ], [ "the author of the thought someone other than themselves. Auditory verbal hallucinations Auditory hallucinations have two essential components: audibility and alienation. While people who experience thought insertion do share the experience of alienation (they cannot recognize that the thoughts they are having are self-generated) with auditory hallucinations, they lack the sense of audibility (experiencing the thoughts as occurring outside of their mind or spoken to them). The person experiencing thought insertion recognizes that the thought is being thought of inside their mind, but they fail to recognize they are the one thinking it. Standard approach The \"standard approach\" is characterized", "-26.17929336002271" ], [ "or rather one's identity and existence as a person, is entirely the product of natural processes, three conclusions follow according to W.T. Stace. First, all mental contents (such as ideas, theories, emotions, moral and personal values, or aesthetic response) exist solely as computational constructions of one's brain and genetics, not as things that exist independently of these. Second, damage to the brain (regardless of how) should be of great concern. Third, death or destruction of one's brain cannot be survived, which is to say, all humans are mortal. Stace, however, believes that ecstatic mysticism calls into question the assumption that", "-26.162748548027594" ], [ "to a machine that could \"transfer thoughts\" from one person to another. They were then told a target word, and were to click a mouse every time they thought about the target word. However, they were only to click the mouse when they believed the target word they were thinking of was not generated by their own mind. It was stressed that the paradigm did not always work and that it was okay to not experience another person's thoughts. The vast majority (72%) of participants made at least one misattribution of agency, meaning they attributed a thought they experienced", "-26.159608823261806" ], [ "as Descartes does, and say that the mind affects the body or vice versa. Moreover, the mind's self-knowledge is not fundamental: it cannot know its own thoughts better than it knows the ways in which its body is acted upon by other bodies.\nFurther, there is no difference between contemplating an idea and thinking that it is true, and there is no freedom of the will at all. Sensory perception, which Spinoza calls \"knowledge of the first kind\", is entirely inaccurate, since it reflects how our own bodies work more than how things really are. We can also have a kind", "-26.15836026490433" ], [ "thought? Deep down, I must be a psychopath.\" This might lead a person to continually surf the Internet, reading numerous articles on defining psychopathy. This reassurance-seeking ritual will provide no further clarification and could exacerbate the intensity of the search for the answer. There are numerous corresponding cognitive biases present, including thought-action fusion, over-importance of thoughts, and need for control over thoughts.\nDespite how real and imposing the intrusive thoughts may be to an individual, the sufferer will never \"act out\" their intrusive thoughts, even if they experience doubt around the question of whether they \"actually want to\" or, due to", "-26.155421531551838" ], [ "short story that \"no man in all history ever used even half of the thinking part of his brain\". In 1936, American writer and broadcaster Lowell Thomas popularized the idea — in a foreword to Dale Carnegie's How to Win Friends and Influence People — by including the falsely precise percentage: \"Professor William James of Harvard used to say that the average man develops only ten percent of his latent mental ability\". \nIn the 1970s the Bulgarian-born psychologist and educator, Georgi Lozanov proposed the teaching method of suggestopedia believing \"that we might be using only five to ten percent of", "-26.153192371246405" ], [ "which involves use of higher thought. This autobiographical layer of self is developed gradually over time. Working memory is necessary for an extensive display of items to be recalled and referenced. Linguistic areas of the brain are activated to enhance the organism's experience, however, contrary to the language of thought hypothesis, language is not necessarily required.", "-26.143061341601424" ], [ "also many words, but fear God.\" (Although a dream may seem reliably to predict the future, it will not necessarily come true; one must place one's trust in God.) Rabbi Samuel bar Nahmani said in the name of Rabbi Jonathan that a person is shown in a dream only what is suggested by the person's own thoughts (while awake), as Daniel 2:29 says, \"As for you, Oh King, your thoughts came into your mind upon your bed,\" and Daniel 2:30 says, \"That you may know the thoughts of the heart.\" When Samuel had a bad dream, he used to quote", "-26.134015307410664" ], [ "can be disadvantageous. It remains unclear under what circumstances, if any, it is best to delegate decision problems to one's unconscious by diverting attention from them (see Payne, Waroquier and Srinivasan & Mukherjee), and to what extent logical, rule-based thought processes can occur outside of awareness. More fundamentally, it is still unknown what exactly happens neurologically when unconscious thought occurs, a more thorough understanding of which may inform those trying to prescribe unconscious or conscious thought. (Antonio Damasio's recent book on the neurology of reason, Descartes Error: Emotion, Reason, and the Human Brain, while not a discussion of consciousness, argues", "-26.091804146417417" ], [ "Some empirical results suggest that even 13-month-old infants have an early capacity for communicative mind-reading that enables them to infer what relevant information is transferred between communicative partners, which implies that human language relies at least partially on theory of mind skills.\nCarol A. Miller posed further possible explanations for this relationship. One idea was that the extent of verbal communication and conversation involving children in a family could explain theory of mind development. The belief is that this type of language exposure could help introduce a child to the different mental states and perspectives of others. This has been suggested", "-26.083080134587362" ], [ "wanting or wonderings, then some aspect of children's minds must direct their attention to other cues. Thus, our ability to learn these word meanings must be shaped by factors internal to the child and not simply from the conditions of their use. Alternative viewpoints Some researchers argue that the poverty of the stimulus argument, which supports nativist theorizing, does not disprove the hypothesis that language is learned entirely from external sources. Some argue that nativist views reflect a failure to imagine how the input could support specific grammatical conclusions in the absence of innate structure. Other areas of criticism range", "-26.08292425100808" ], [ "it difficult to imagine that a \"mind\" capable of \"perception\" could be constructed using only mechanical processes. In the 1961 short story \"The Game\" by Anatoly Dneprov, a stadium of people act as switches and memory cells implementing a program to translate a sentence of Portuguese, a language that none of them knows. In 1974, Lawrence Davis imagined duplicating the brain using telephone lines and offices staffed by people, and in 1978 Ned Block envisioned the entire population of China involved in such a brain simulation. This thought experiment is called the China brain, also the \"Chinese Nation\" or the", "-26.021731437271228" ] ]
4k3f5z
Why does the secret service ALWAYS wear suits regardless of weather when out w/ the president?
[ "The secret service THAT YOU CAN SEE are wearing suits... think about the ones who are blended in all around in plain clothes though.", " URL_0 It looks professional, and the jacket is a socially acceptable way to hide a moderate-sized gun (and other equipment), to avoid scaring the public.", "Because suits look good, they can conceal their weapons, and they blend in to a degree, since the people they are protecting are generally also wearing suits.", "They wear suits because it's nondescript, conceals weapons, blends in with other people, etc. They don't always wear wool suits, they have other materials that breathe better and are cooler for warm weather." ]
[ [ "stand-collar \"everyday\" uniform to be issued since the 1930s (the Navy's and Coast Guard's male dress white and Marine Corps' male dress blue uniform stand-collar coats are worn for formal occasions only). In 2007, Air Force officials announced they had settled on the \"Hap Arnold\" look, with a belted suit coat, but with narrower lapels than the original prototype. However, in 2009, General Norton Schwartz, the new Chief of Staff of the Air Force, directed that \"no further effort be made on the [Hap Arnold] Heritage Coat\" so that the focus would remain on near-term uniform needs. While the evaluation", "-29.55363456188934" ], [ "motivated by the large volume of hate mail directed at the candidate, Secretary of Homeland Security Michael Chertoff announced that the United States Secret Service would provide protection for the campaign, including bodyguards for Obama and other services/resources similar to those employed for the safety of the President of the United States, albeit on a proportionally smaller level. Normally, presidential candidates are not offered Secret Service protection until early February of election year; this was the earliest protection had ever been granted. Second half 2007 On August 1 when making his foreign policy speech Obama created controversy by declaring that", "-29.48058725678129" ], [ "follow the international conventions and wear a top hat. Instead a diplomatic uniform with peaked cap for formal occasions was adopted. Top hats were part of formal wear for U.S. presidential inaugurations for many years. President Dwight D. Eisenhower spurned the hat for his inauguration, but John F. Kennedy, who was accustomed to formal dress, brought it back for his in 1961. Iconically, Kennedy delivered his forceful inaugural address hatless, reinforcing the image of vigor he desired to project, and setting the tone for an active administration to follow.\nHis successor, Lyndon B. Johnson, did not wear a top", "-29.116844358334333" ], [ "Roosevelt attracted considerable attention when he was one of the few foreign representatives at the funeral of King Edward VII who was not in civil or military uniform.\nFor a period of time, U.S. diplomats and consular officers wore modified U.S. Navy uniforms, much as the U.S. Public Health Service Commissioned Corps and U.S. National Oceanic and Atmospheric Administration Commissioned Corps continue to do so today. In 1937, President Franklin D. Roosevelt issued an executive order directing that no person in the diplomatic or consular service should wear a uniform or official costume not previously authorized by the United States Congress.\nWhile", "-28.94785938167479" ], [ "Cover (military) Uniform In some military services (specifically in the United States), a uniform hat is generally referred to officially as a cover, as in \"Hey Marine, remove your cover!\" or \"Sailor, you're not in uniform without your cover.\" It is a regulation in the United States Army, Air Force, Coast Guard, Marine Corps, and Navy that any armed Soldier, Airman, Coast Guardsman, Marine, or Sailor (respectively) must wear headgear while armed and indoors to indicate that they are under arms. Since the Air Force must also follow the same rules of being \"Under Arms\" while indoors, nevertheless they", "-28.708861486345995" ], [ "have security clearances. The Executive Branch, through E.O. 12333 as amended has chosen to control dissemination of information to only those with the need-to-know.\nBecause Members of Congress were elected to office, they do not have to submit to the background check procedures (Congressional Staff on the other hand must submit to background checks to handle classified materials). The House and the Senate limit dissemination of intelligence to members who are on the Intelligence Committees and many of their hearings are closed. Usually, the main concern is leaks of classified information. However, some argue that openness is a tenet", "-28.608729177096393" ], [ "was said to be in possession of names of CIA agents around the world and would be \"threatening to disclose\" them. Via Twitter, Greenwald immediately refuted King's claim and called it a \"blatant lie\".\nKing suggested in 2014 that \"foreign policy was not a major issue\" for President Obama, as he had worn a light tan suit in August in Washington the day before. He also said that \"There's no way any of us can excuse what the president did yesterday\" in reference to wearing the light tan suit as he addressed the media.\nKing and Congressman Bill Pascrell (D-NJ) asked", "-28.44334159209393" ], [ "the welcoming party when they hosted the Vice President of the United States. The protective detail from the Secret Service and the Oklahoma City Police Department are wearing derby hats, police caps or dark cowboy hats. A year later, Sherman became the first sitting Vice President to fly in an airplane. Sherman was also the first Vice President to throw out the first ceremonial pitch at a professional baseball game, the first incumbent Vice President to be renominated by a National Convention, and the only Vice President whose marble bust in the U. S. Capitol is wearing eyeglasses.\nAs a public", "-28.230412657227134" ], [ "mandatory, and some officials wore more brilliant uniforms according to their own taste. In 1853, Secretary of State William L. Marcy issued a circular recommending that U.S. diplomats wear “the simple dress of an American citizen.”\nIn response to what was perceived as the excessive ostentatiousness of some of these individualized uniforms, Congress banned diplomatic uniforms altogether in 1867, by passing a resolution forbidding diplomatic officials to wear \"any uniform or official costume not previously authorized by Congress\". This caused some discomfort to American diplomats, who now had to appear \"underdressed\", in evening dress, to official functions. In 1910, Theodore", "-28.09805042037624" ], [ "bow-tie (either black or U.S. Air Force satin blue). Civil Air Patrol senior members do not wear these semi-formal uniforms, but instead may wear a civilian equivalent consisting of a blue jacket, grey trousers, white dress shirt with a black bow-tie, and distinctive Civil Air Patrol insignia.\nMilitary courtesy and etiquette requirements for these Civil Air Patrol uniform combinations are similar to those of the U. S. Air Force. U.S. Marine Corps The United States Marine Corps mess dress uniforms date from the late 19th century. Mess dress-style uniforms in the USMC are reserved for officers, and staff noncommissioned", "-28.040369422116783" ], [ "Yarborough) informed Yarborough that the President was keen on the Special Forces — but would not visit the SF base unless they were wearing their green berets. The Army, having previously forbidden the green beret, allowed the soldiers to wear them, lest JFK not visit. The Special Forces displayed their capabilities, impressing the President; so often, in the next years, that they referred to it as \"Disneyland.\" President Kennedy's visit was topped with a Bell Aircraft pilot (dressed in Army fatigues) flying with a rocket belt to the President, and saluting him.\nKennedy approved of the Green Beret, and the U.S.", "-27.963154727127403" ], [ "broad-brimmed \"sun hat\" available. Working uniforms Auxiliarists also have several distinctive working uniforms and optional uniform items not authorized for active duty personnel. Hot Weather Uniform The Hot Weather Uniform consists of the ODU t-shirt, dark blue cargo shorts, and the baseball cap. Either brown leather boat shoes or black ankle boots may be worn.\nThe Hot Weather Uniform was formerly authorized for active duty personnel, but was withdrawn from service because of its non-military appearance. Operational Polo Shirt A dark blue \"operational polo shirt\" may be worn in lieu of the ODU blouse, or in lieu of the ODU t-shirt", "-27.95526193547994" ], [ "not wear.\" Some have claimed based on the photograph that Anderson's uniform was one of the few worn by an American diplomat since the early 1800s, but a public law dating to 1867 prohibited diplomats from wearing any uniform not approved by Congress, and Anderson observed that law. In 1937, President Franklin Roosevelt proscribed American diplomats from wearing any uniform. Anderson's uniform is on display at Larz Anderson House.\nThough it has often been said that he \"retired from the diplomatic corps\" after leaving Japan, he remained open to another assignment. In 1923 he actively though unsuccessfully sought nomination as U.S.", "-27.660919512647524" ], [ "not wear a hat to his inauguration, and so single-handedly killed the men's hat industry, is false. Kennedy wore a top hat to the inauguration and to the balls in the evening, removing it only to be sworn in and give his address. He in fact restored the tradition, after Eisenhower broke with it by wearing a homburg instead of a top hat to both of his inaugurations. Johnson, at his inauguration in 1965, was the first President to go completely hatless.", "-27.608766640216345" ], [ "The president felt that since they had a special mission, Special Forces should have something to set them apart from the rest. In 1962, he called the green beret \"a symbol of excellence, a badge of courage, a mark of distinction in the fight for freedom\".\nForrest Lindley, a writer for the newspaper Stars and Stripes who served with Special Forces in Vietnam said of Kennedy's authorization: \"It was President Kennedy who was responsible for the rebuilding of the Special Forces and giving us back our Green Beret. People were sneaking around wearing [them] when conventional forces weren't in the area", "-27.48661665849795" ], [ "Carolina, banned its wear, even though it was worn on the sly when units were in the field or deployed overseas. This was reversed on 25 September 1961 by Department of the Army Message 578636, which designated the green beret as the exclusive headgear of the Army Special Forces.\nWhen visiting the Special Forces at Fort Bragg on 12 October 1961, President John F. Kennedy asked Brig. Gen. William P. Yarborough to make sure that the men under his command wore green berets for the visit. Later that day, Kennedy sent a memorandum that included the line: '\"I am sure that", "-27.46198029513471" ], [ "named him private secretary to the president, though he had been informally doing the job for some time prior. Under McKinley, Cortelyou became notable for his popularity with journalists covering the White House. The correspondents relied on him for information and his tenure as private secretary was noteworthy for some of the same working traits modern press secretaries have become popular for, including providing information to reporters later in the evening if events had transpired in the afternoon, offering advance copies of remarks prepared for the president, and ensuring reporters received transcripts of unprepared remarks made by the president while", "-27.40974629955599" ], [ "to represent the Vice President, and are most often seen on lecterns when they make a speech, and on the sides of presidential transports such as Air Force Two, Marine Two, and limousines. The coat of arms, without the surrounding inscription, is used on the Vice Presidential Service Badge and the vice presidential flag. Regulated use In general, commercial use of the seal is prohibited by 18 USC 713 of the United States Code, and further defined by Executive Orders 11916 and 11649, the same statutes which protect the Seal of the President of the United States. History The", "-27.192598163033836" ], [ "the warrant officers, had a silver-and-black cord, while other ranks had cords in their branch-of-service colors. The United States Marine Corps had the Eagle, Globe, and Anchor badge in black at the front of their campaign hats; its officers had an additional golden-and-scarlet cord around their hat, whereas its other ranks had none.\nBy the 1930s the felt was made very stiff with a permanently flat brim. Due to the frequent wearing of helmets in France in World War I, most troops received a copy of the French bonnet de police that became known as the overseas cap. In 1942", "-27.174613756506005" ], [ "not have to sit on any items in a back pocket (such as a wallet).\nMembers of the United States Marine Corps wore flight suits during most vehicle patrols and ground combat operations in Iraq and Afghanistan, because their standard camouflage utilities were not flame-resistant. Flight suits have now been phased out among ground personnel with the introduction of the Flame Resistant Organizational Gear, or \"FROG\" suit, which resembles the standard camouflage utilities.", "-27.142664732411504" ], [ "of the distinctive headdress, (although members of the Special Forces continued to wear it surreptitiously). This was reversed on 25 September 1961 by Department of the Army Message 578636, which designated the green beret as the exclusive headdress of the Army Special Forces.\nIn 1961, President John F. Kennedy authorized them for use exclusively by the U.S. Special Forces. Preparing for a 12 October visit to the Special Warfare Center at Fort Bragg, North Carolina, the president sent word to the center's commander, Colonel William P. Yarborough, for all Special Forces soldiers to wear green berets as part of the event.", "-27.08046344385366" ], [ "of the United States military. Similarly, military officers have no command authority over CAP members. As part of recognition of CAP's service to the USAF, however, senior members in the grade of second lieutenant and above are allowed to wear \"U.S.\" collar insignia as an official part of their dress blue uniform. All CAP members are required to render military courtesies to all members of the US military and those of friendly foreign nations; however, as CAP officers are not commissioned by the President of the United States, military personnel are not required to render military courtesies to CAP personnel,", "-27.06063365589216" ], [ "on the left hand side. The cover was made in both forest green wool and khaki cotton.\nUsage is common in the U.S. Marine Corps as the headgear when wearing service uniforms (the other option being the bulkier frame-type \"barracks cover\"). In addition, it is the standard headgear for Marine Naval Aviators, Naval Flight Officers and enlisted Aircrewmen wearing flight suits. The Marine officer's garrison cap, unlike those of the Army or Air Force, does not have metallic piping; the only marking that distinguishes it from the enlisted cap is the placement of small officer's rank insignia on the right side", "-26.968317089922493" ], [ "be carried in the pocket when not worn (as the patrol cap could), and provided no shade from the sun when worn.\nDespite years of negative feedback, the beret remained part of the ACU until 2011, when incoming Sergeant Major of the Army Raymond F. Chandler made it his first order of business to address the wishes \"thousands of soldiers\" who wanted the army to end the wear of the beret with the ACU, and the army subsequently did just that. The black beret remained the headgear for the ASU, but was replaced as the default headgear with the ACU patrol", "-26.93875512795057" ], [ "The use of mess dress in the United States Uniformed Services started in the early 20th century. U.S. Air Force In the 1950s and 1960s, the U.S. Air Force formal uniform consisted of a civilian black tailcoat with added military sleeve braid and rank insignia. It could be worn as either a black tie or white tie combination. Due to the tails, it was not considered a mess dress uniform.\nThe original U.S. Air Force mess dress consisted of a short black jacket with black trousers, with a white jacket for summer wear. The jackets had satin lapels with matching", "-26.928576986276312" ], [ "of the Civil Air Patrol, the United States Air Force Auxiliary, may wear the U.S. Air Force mess dress uniform with distinctive Civil Air Patrol insignia and trim. The Civil Air Patrol mess dress uniform is identical to the U.S. Air Force mess dress uniform, except that the silver braid on the jacket and officer rank insignia (shoulder boards) of the U.S. Air Force mess dress uniform is replaced with dark blue braid, and a Civil Air Patrol seal device 3\" in size (either embroidered in bullion or finished in enamel) is worn in place of the middle button", "-26.888099402887747" ], [ "to brigadier generals, even though previously these had been commanded by colonels.\nHowever, McPeak is best remembered by many current and since-retired Air Force personnel for the sweeping changes he made to the Air Force's service dress uniform, especially for commissioned officers. Worn by more personnel during most duties, the new version was a radical departure from the earlier version, which was essentially the same design as the then-U.S. Army service uniform (the U.S. Air Force was originally the U.S. Army Air Corps and then the U.S. Army Air Forces), but with fewer insignia. Because of the new uniform's resemblance to", "-26.842257750453427" ], [ "and visiting foreign dignitaries other than heads of state. While the Secret Service's close-protection role is its most visible, its historic role as agents of the United States Treasury (although they are now agents of the Department of Homeland Security) made it unusual internationally, as usually \"official\" bodyguards are part of general police forces. In the U.S. several private companies have been utilized for corporate executives and politicians.\nIn the UK during 1913-1914 the suffragette movement did protests in an attempt to change the UK law so that women would be able to vote. After suffragette leaders were threatened, activists formed", "-26.777260784234386" ], [ "for two reasons. First, he claims that since the Hatch Act apparently bans White House staffers from using government e-mail resources for political communication, White House aides used political party e-mail resources instead, effectively bypassing the record-keeping requirements of the Presidential Records Act. He claims in the 2,072 days between September 11, 2001 and May 15, 2007, a minimum of 103.6 million messages were likely sent by White House staffers on Republican National Committee servers.\nHe also claims that insecure messaging puts national security at risk. He claims that since the White House staffers must bypass government servers, their email is", "-26.776890217966866" ], [ "such as counterterrorism, intelligence, counterintelligence, government investigations, and background investigations and provides protection/escort for high-ranking government officials, among other federally mandated duties. Officers of this agency are rarely seen in public wearing their full black uniforms; they can be seen providing protection within a few federal buildings throughout the country.", "-26.775270127305703" ], [ "governments had spent money at Trump properties.\nIn February 2017, Trump senior advisor Kellyanne Conway promoted the clothing line of Ivanka Trump in a TV appearance from the White House briefing room. Office of Government Ethics director Walter Shaub requested disciplinary action in a letter to the White House Counsel's office. Under federal ethics regulations, federal employees are barred from using their public office to endorse products.\nAs of August 2019, the House Oversight Committee is investigating why the Air National Guard made a pit stop to stay at Trump's Turnberry resort in Scotland, instead of a U.S. military base as done", "-26.739743219164666" ], [ "Executive Protective Service became the Uniformed Division of the Secret Service in 1977. When the United States Treasury Police was merged into the Uniformed Division of the Secret Service in 1986 it became responsible for the main Treasury building and the Treasury Annex building, both of which are adjacent to the White House.", "-26.71347467007581" ], [ "or crew chief. Uniform For ease of recognition, officials are usually clad in a black-and-white vertically striped shirt and black trousers with a thin white stripe down the side. Officials also wear a black belt, black shoes, and a peaked cap. A letter indicating the role of each official appears on the back of the shirt at some levels, while NFL officials have numbers with a small letter or letters above. Shortly after the September 11, 2001 attacks, an American flag was added to the shirts of NFL officials.\nThe stripes were introduced in the 1920s. Prior to this, plain white", "-26.688862193936075" ], [ "insignia series in the history of the United States Armed Forces.\nEpaulettes were put back on the coat for metal officer rank insignia and braiding returned to the bottom of the sleeves. But the compromise uniform continued to be unpopular, primarily due to its civilian-style cut. Several additional changes were made to make the jacket seem more military in appearance.\nThe current USAF service dress uniform continues to include the three button blue coat. However, as a matter of practicality for daily duty, particularly in warm weather climates, USAF personnel will typically wear the short-sleeve or long-sleeve Shade 1550 light blue", "-26.63577536866069" ], [ "de service) is the primary headgear for men's Royal Canadian Navy service dress. It has been abandoned in the Royal Canadian Air Force in favour of the wedge cap. It has also been eliminated from the Canadian Army in favour of the beret, with two exceptions. General officers wearing army uniform can wear either a beret or a peaked cap with service dress. Royal Canadian Infantry Corps members of foot guards units such as the Canadian Grenadier Guards wear the bearskin cap with full dress but the peaked cap with undress and service dress.\nOn navy caps, the peak and chinstrap", "-26.547368624887895" ], [ "robes, for example when the court is in session, or when attending the President's State of the Union address. At one time all attorneys appearing before the court wore morning coats but they now wear standard business attire. The United States Solicitor General (when the office is held by a male) and his or her male deputies continue the tradition of wearing morning dress when arguing before the court.\nDuring the Victorian and Edwardian era, in the United States morning coat referred to a single-breasted frock coat, so the British then made fun of the fact that Americans were unable to", "-26.5248628500849" ], [ "Secret Service after Hillary Clinton's detail. The book also reveals that the Secret Service covered up the fact that President Ronald Reagan's White House staff overruled the Secret Service to let unscreened spectators get close to Reagan as he left the Washington Hilton, allowing John W. Hinckley, Jr. to shoot the president. The New York Post called the book \"a compelling look at the intrepid personnel who shield America's presidents and their families—and those whom they guard. Kessler writes flatteringly and critically about people in both parties.\"\nKessler's latest book is The Trump White House: Changing the Rules of the Game.", "-26.51723328139633" ], [ "the gold tassels.\nIn 1908, white gloves were still mentioned in the regulations, while in 1912 they were not, and the 1937 regulation said that they are not worn.\nCabinet ministers, being Privy Counsellors, are entitled to wear the 1st Class civil uniform and continue to be so entitled after they leave Cabinet.\nEdward VII ordered Privy Counsellors to wear civil uniform at Privy Council meetings, but this requirement has lapsed. In lieu of Civil Uniform or Court Dress, alternative dress may be worn by gentlemen (except for Household, Diplomatics and Consular Services) on all occasions when uniform or court dress is prescribed.", "-26.49565586843528" ], [ "asked that the Special Forces soldier wear a green beret rather than formal Army headgear. After the funeral, the six military personnel in the honor guard (Army, Navy, Air Force, Marine, Coast Guard, and Special Forces) had spontaneously removed their covers and laid them on the evergreen boughs around the eternal flame. Also laid on the greenery were the insignia of a U.S. Army military policeman and the shoulder braid from a soldier in the 3rd US Infantry Regiment. The presence of the headgear was widely criticized after the dedication of the permanent grave site, and the U.S. Army (which", "-26.47062657470815" ], [ "of the cap and the style of the Eagle, Globe and Anchor. Enlisted garrison caps carry no rank insignia, however all Marine garrison caps carry the Eagle, Globe, and Anchor insignia on the left side. U.S. Air Force A blue flight cap is the most common headgear worn with the U.S. Air Force's service dress or \"blues\" uniform. The color of the piping varies: solid blue for enlisted, blue and silver metallic braid for company-grade officers and field grade officers, and solid silver metallic for general officers. Officers wear large metal rank insignia affixed to the left front of", "-26.453172339631237" ], [ "of the service cap are always black. The cap band is black with the exception of navy military police, who wear a scarlet cap band, and members of Canadian Special Operations Forces Command, who wear a tan cap band.\nOn both navy and army caps, the chinstrap is affixed to the cap via two small buttons, one roughly over each ear; these buttons are miniature versions of the buttons on the service dress tunic, and as such bear an RCN or regimental device.\nThe peak of the cap of non-commissioned members and subordinate officers is left plain, and officers' caps are adorned", "-26.379373467207188" ], [ "that had other specialist clothing (Paratroopers wore the parachutist's coat and trousers, tank crews wore the tankers jacket, various types of parkas were worn in cold weather, etc.). As a result, the field jacket could be seen worn in every theater of war and by nearly every type of soldier, making a rather ubiquitous symbol of the World War II American G.I..\nThroughout the course of the war, the O.D. cotton field jacket proved to be an inadequate outer garment. The jacket's thin lining provided poor insulation during cold weather and the light cotton shell provided little protection from", "-26.37282624124782" ], [ "Additionally, a sword may be prescribed for officers, and white gloves may be required. A white belt may be worn for honor guards.\nThe Tropical Blue uniform, worn in warm weather, omits the jacket and tie, and features a short-sleeved, light blue shirt (identical to that worn by the U.S. Air Force) with rank insignia on shoulder boards for officers, and pin-on collar insignia for petty officers. The Tropical Blue uniform may be worn year-round for general office wear and for visits between commands. It may be worn in lieu of the SDB uniform, but not to functions where civilian dress", "-26.3574619392748" ], [ "addition to being the headdress of the United States Army Special Forces, \"Green Berets\" is also a well known nickname of the organization.", "-26.355764441977954" ], [ "Kennedy whether she would like to change her suit but she refused. When Lady Bird offered to send someone to help her, she responded: \nOh, no ... I want them to see what they have done to Jack.\n Despite the advice of John F. Kennedy's physician, Admiral George Burkley, who \"gently tried to persuade her to change out of her gore-soaked pink Chanel suit\", she wore the suit alongside Vice President Johnson as he was sworn in on Air Force One as the 36th President of the United States. In the photograph of the ceremony (right) the blood stains cannot be", "-26.35073569684755" ], [ "man alone stereotypes. The New Zealand Police Force wear a variant of the bush hat in navy blue, normally in rural areas. Considered obsolete as main dress, it is rarely worn instead of the standard peaked cap. Canada Officers and men of the Royal Canadian Navy and Royal Canadian Air Force serving overseas were issued with white cotton duck hats during the Gulf War. US military The slouch hat has been known in the US military at least since the American Civil War, being fairly common among officers. Some American soldiers assigned to units in the China Burma India Theatre", "-26.317331107798964" ], [ "Carl Kline (White House official) Carl Kline is a former U.S. White House official who was a director of the White House Presidential Personnel Office during the administration of President Donald Trump beginning in May 2017. Prior to working for the White House, Kline was the Chief of Personnel Security for Security Policy and Oversight Directorate at the Department of Defense.\nMultiple sources stated in January 2019 that in at least 30 cases where professional security experts expressed concerns about granting top-secret clearance to specific Trump officials including Jared Kushner, Kline had overruled their concerns. In Kushner's case, Kline was carrying", "-26.3144028641982" ], [ "insignia, while cadets who are not cadet officers will wear a generic insignia. This hat is the standard cover with most of the Air Force style uniforms.\nMany uniformed civilian organizations such as the Boy Scouts of America (which no longer uses them) have used garrison caps.\nWaiters at many old fashioned style diners also wear garrison caps.\nThe American Legion and many other veterans service organizations wear distinctive garrison caps.\nSome commercial air-line employees, particularly flight attendants, wear garrison caps.\nParticipants of U.S. military ROTC and JROTC programs are issued garrison caps for the duration of their studies.\nThe Massachusetts Maritime Academy and State University", "-26.308081394807232" ], [ "item, in 1973 it was abolished altogether. United States Navy The United States Navy tiara was a crescent shaped hat made of black velvet and authorized for optional wear by female commanders and higher-ranked officers with mess dress while indoors. By 2015 the Navy reported very few sales of tiaras and the item was discontinued as an optional uniform accessory effective October 1, 2016.", "-26.291086294688284" ], [ "and a light gray in winter. Naval officers wore white in summer and navy blue in winter while lower ranks wear the traditional bell bottoms and white blouse. The uniform for naval chief petty officers was a buttoned jacket, similar to that worn by American chief petty officers. Officers had a variety of headgear, including a service cap, garrison cap, and beret (linen in summer and wool in winter). The color of the beret varied by season and according to the officer's unit.\nSyrian Commando and Paratroop uniforms consist of lizard or woodland-patterned camouflage fatigues along with combat boots, helmets and", "-26.256806954625063" ], [ "legal justification for the Stellar Wind program, Goldsmith's memos argue that the president has \"inherent constitutional power to monitor Americans' communications without a warrant.\"\nWhile the memos are at times cited as justifying surveillance specifically in times of war, Goldsmith's memos cite the Federalist Papers to argue that \"the president can conduct warrantless searches for foreign intelligence 'even in peacetime.' \"\nMany argue that these legal justifications are retroactive and anti-democratic, in that the argument, as it stands, insulates the Executive Branch's surveillance efforts from Congressional disapproval.\nThe portions redacted are believed to include dissenting arguments, as well as the arguments that explicitly", "-26.253756174177397" ], [ "pointing out that there was little difference between the linen skirt and blouse she had been wearing and a lady's swimsuit of the period.\nOnce, a White House visitor commented on Alice's frequent interruptions to the Oval Office, often to offer political advice. The exhausted president commented to his friend, author Owen Wister, after her third interruption to their conversation and threatening to throw her 'out the window', \"I can either run the country or I can attend to Alice, but I cannot possibly do both.\" \nAlice was the center of attention in the social context of her father's presidency, and", "-26.206142721166543" ], [ "an individual cleared for Department of Defense Top Secret had to undergo another investigation before being granted a Department of Energy Q clearance. Agencies are now supposed to honor background investigations by other agencies if they are still current. Because most security clearances only apply inside the agency where the holder works, if one needs to meet with another agency to discuss classified matters, it is possible and necessary to pass one's clearance to the other agency. For example, officials visiting at the White House from other government agencies would pass their clearances to the Executive Office of the President", "-26.19790667387133" ], [ "episode, he was shown wearing the outfit which is similar to old cartoon and comic book outfit. Unlike in previous versions however, the suit is not to protect him but to protect others from him. In addition, the word Airtight is written on the sides of the suit. Video games Airtight is one of the featured characters in the Action Force II computer game. Other media Airtight is one of the featured supporting characters in the Find Your Fate G.I. Joe book \"Operation: Star Raider\".", "-26.19260658416897" ], [ "Lieutenant and above. U.S. Navy In the U.S. Navy the garrison cap (\"cover\") was first authorized during World War II, originally for aviators and later for all officers and chief petty officers (CPOs). Blue and white versions, as well as a forest green version for aviation officers and CPOs were later developed, although the blue and white versions were discontinued after the war. Today, garrison caps in khaki are almost always worn with service khakis and flight suits. Officers wear a miniature version of the officer crest on the left and small rank insignia on the right side of", "-26.187783746398054" ], [ "to be worn on the fatigue uniform. The metal shield was still worn of the dress uniform. Because a cloth shield would be sewn on to the uniform, and not be removable, the Air Force was forced to rescind its policy requiring the turn in of shields at the end of duty. At this time, Security Police Shields became personal property and were worn both on and off duty, on all uniforms.\nOriginally, the cloth shield was sewn of silver and blue thread on a fatigue background. In 1979, a subdued cloth shield replaced the original, and has followed on to", "-26.184592514371616" ], [ "results of the heritage coat would be made available to the Air Force's leaders should they decide to implement the uniform change, the uniform overhaul is currently on hold indefinitely. Service dress The current U.S. Air Force Service Dress Uniform, which was initially adopted in 1994 and made mandatory on 1 October 1999, consists of a three-button coat, with silver mirror-finish \"U.S.\" pins on the lapels, matching trousers, and is worn either a service cap or flight cap, all in Shade 1620, also known as \"Air Force Blue.\" This is worn with a light blue shirt (Shade 1550) and a", "-26.183183147921227" ], [ "Riley, Kansas before being granted a general discharge from the Army for unsuitability.\nThe Secret Service increased the restricted airspace around the White House. President Nixon congratulated Secret Service officer Kulbaski and the pilot and copilot of the JetRanger. The three and other agents were presented with pairs of presidential cufflinks in a White House ceremony.\nPreston moved to the state of Washington after his release. He married in 1982 and raised his wife's two daughters. He died of cancer on July 21, 2009 while living in Ephrata, Washington.", "-26.182050642790273" ], [ "Navy's Service Dress White or \"chokers\", was adopted by the Guardia and naval service officers and Military Academy cadets. Comprising a high-collar tunic, slacks and white shoes plus a matching peaked cap, the tunic was worn with removable exaggerated twisted cord epaulettes and a red silk sash tied around the waist on formal occasions whilst enlisted ranks wore exaggerated black buff chevrons instead. Starting in the mid-1930s, Guardia officers began being issued with the M1937 or M1942 American peaked caps, in either light tropical khaki and Olive Drab wool cloth, which slowly began to replace the campaign hat in", "-26.17676104462589" ], [ "on the right side of the jacket. Members of the Civil Air Patrol NCO corps wear distinctive Civil Air Patrol NCO rank insignia in lieu of U.S. Air Force NCO rank insignia.\nCivil Air Patrol cadets do not wear the U.S. Air Force mess dress uniform, but may wear the semi-formal uniform described above for U.S. Air Force enlisted members, or a modified semi-formal dress uniform consisting of the old-style U.S. Air Force service uniform (with the four button jacket with patch-type pockets) with the name-tag removed and with Civil Air Patrol distinctive insignia, a white dress shirt, and a", "-26.162328188540414" ], [ "Adams, the post commander at Fort Bragg, banned its wear, even though it was worn surreptitiously when deployed overseas. This was reversed on 25 September 1961 by Department of the Army Message 578636, which designated the green beret as the exclusive headdress of the Army Special Forces.\nWhen visiting the Special Forces at Fort Bragg on 12 October 1961, President John F. Kennedy asked Brigadier General William P. Yarborough to make sure that the men under his command wore green berets for the visit. Later that day, Kennedy sent a memorandum which included the line: \"I am sure that the green", "-26.146102912258357" ], [ "Arab countries. The standard field uniform for Libyan paratroopers (Army commandos) was a two-piece camouflage uniform made of water repellent cotton. The shirt was similar in design to the United States Army fatigue shirt. The shirt and trousers were camouflaged in blue-green, light green, and dark brown. The standard headgear for paratroopers was a sky-blue beret. The uniforms of the air force, however, continued to resemble in both style and colour the uniforms of the United States Air Force, which served as a model when the Libyan Air Force was established.\nOriginally the rank structure of all three services was similar", "-26.12849372671917" ], [ "Watkins. There was also a feeling among the White House and its supporters that the Travel Office had never been investigated by the media due to its close relationship with press corps members and the plush accommodations it afforded them and favors it did for them. (Congress would later discover that in October 1988, a whistleblower within the Travel Office had alleged financial improprieties; the Reagan White House counsel looked into the claim but took no action.)\nRepublicans and other critics saw the events differently. They alleged that friends of President Bill Clinton, including his third cousin Catherine Cornelius,", "-26.11572756257374" ], [ "NBC suit Use NBC stands for nuclear, biological, and chemical. It is a term used in the armed forces and in health and safety, mostly in the context of weapons of mass destruction (WMD) clean-up in overseas conflict or protection of emergency services during the response to a terrorist attack, though there are civilian and common-use applications (such as recovery and clean up efforts after industrial accidents).\nIn military operations, NBC suits are intended to be quickly donned over a soldier’s uniform and can continuously protect the user for up to several days. Most are made of impermeable material such as", "-26.114769037907536" ], [ "Special Operations Aviation Squadron. The standard berets of the Navy, Army and Air Force are black, green and blue, respectively. Search and rescue technicians wear the distinctive orange beret. Canadian Forces Military Police wear a scarlet beret, all personnel part of an airborne unit wear maroon and those members attached to an armoured regiment are issued black berets as part of their uniform. Members of foot guards regiments (the Governor General's Foot Guards and the Canadian Grenadier Guards) wear the khaki beret. As of May 2019, members of the RCEME (Royal Canadian Electrical and Mechanical Engineers) branch switched from", "-26.04028368461877" ], [ "for incidental stops en route off of a military installation is no longer permissible excepting legitimate emergencies only. T-shirt An olive drab green t-shirt, or skivvy shirt, without a logo is worn underneath the blouse. Due to the intense heat in Iraq, moisture wicking t-shirts, such as those produced by Under Armour became very popular. However, due to concerns that the shirts would melt to the skin in the event of a fire or explosion, they are banned when a Marine is deployed to a combat zone. However, the Marine Corps has worked with Danskin to develop their own moisture", "-25.99835545575479" ], [ "standard uniform worn day-to-day is the midshipman khaki uniform, similar to service khakis of the U.S. Navy. Other uniforms include the midshipman service dress whites for graduation or special ceremonies, midshipman summer whites, academy blue-coveralls for maintenance, and salt & peppers. SSO and NROTC midshipman wear the Navy working uniform to training events, as well.\nThe academy has several unique uniform components. Freshman and sophomores wear a black belt with a blue cover. Juniors and seniors wear a white belt with a black cover. Corresponding collar devices and belt buckles are also worn depending on class and rank. Seniors are also", "-25.997852307431458" ], [ "is usually a conservative style, and often made of blue or grey fabric. Interview suits are frequently composed of wool or wool-blend fabric, with a solid or pin stripe pattern. The style of an interview suit, however, will depend on the organizational culture of the industry in which a person seeks employment.\nIn the Southwestern US, men's suits often feature detailing inspired by traditional Western wear such as a pointed yoke and arrow pockets. Suit coats similar in appearance to the Ike jacket are also widespread, and it is common practise to wear cowboy boots instead of conventional dress shoes. Country", "-25.99124056310393" ], [ "United States Navy is the only US armed force not to use the campaign hat. Their recruit division commanders wear normal prescribed covers for their uniforms, with a red aiguillette on their shoulder to show their status. Park rangers Campaign hats are worn by US park rangers of the National Park Service. The federal troops sent to protect the resources of the first national parks were cavalry troopers, whose campaign hat was adopted by the Park Service as a symbol of authority.\nThe evolution of the campaign hat can be seen in a 1905 photo of Buffalo Soldiers in Yosemite. Although", "-25.974611406156328" ], [ "be worn in cold weather instead of the traditional white knickers. These looser-fitting pants allow for layering of warmer clothes underneath. In the 2010 season, college officials and, in many states, high school officials, were given the option of wearing the black cold-weather pants. The black pants became mandatory for college officials in 2011 and for NFL officials in 2012. In 2014, several high school associations started mandating the wearing of the black slacks for varsity level games.\nFor several decades, all NFL officials wore white hats. In 1979, the referees changed to black hats with white stripes, while the other", "-25.972185987629928" ], [ "a black Eisenhower style jacket. Auxiliary officers wear light blue shirts (long sleeve for winter and short for summer), with the badging of auxiliary on the bottom of the crest. Originally front line officer also wore light blue shirts but changed to the current navy blue shirts in the Fall of 2000. Aircraft An unmarked Cessna 206 H (C-FZRR) was registered with the Toronto Police Service and been used for undisclosed surveillance work. The plane has been alleged to have been used during the Rob Ford substance abuse scandal. C-FZRR was sold in 2015 to Sky Photo Techniques. Normal helicopter", "-25.971701705289888" ], [ "the airborne forces.\nThe Navy Special Service Group is only distinguished by their officially issued berets— a dark blue beret with three versions of the \"fouled anchor\" badge for the all of its personnel. A metal SSGN qualification badge featuring a vertical dagger superimposed over a midget submarine is worn over the left pocket on dress uniforms. Parachute wings are worn over the right pocket.", "-25.971678631729446" ], [ "white shirts and the patrol jacket or blue serge. During the summer, officers wear a tie with a short-sleeved shirt, and other members wear short-sleeved shirts. Winter dress is a long-sleeved shirt without tie for all members except officers, who wear a tie with the long-sleeved shirt. In colder weather, members may wear heavier boots, winter coats (storm coats) and a fur cap.\nIn 1990, Baltej Singh Dhillon became the RCMP's first Sikh officer to be allowed to wear a turban instead of the traditional Stetson. On March 15, the federal government, despite protests, decided they would allow Sikhs to wear", "-25.93263016230776" ], [ "for each President and have been used normally with formal suit: suit, tuxedo or military uniform. Since 2006, the Shield was moved up to chest height.\nA symbolic act narrated by Ricardo Palma in his famous Peruvian Traditions was made during the confused first half of the 1840s, by President Justo Figuerola. This, in front of the protests made by the pope in front of his home, he asked his daughter to take the presidential band out of the dresser drawer and give it to the people from the balcony. The crowd left happy and alive to Figuerola and went to", "-25.927677524367027" ], [ "uniform for both Reserve officers and enlisted resembled, in some respects, the men's uniform. It was a forest green and consisted of a skirt, no higher than the bottom of the kneecap, and an unbelted jacket with three bronze buttons, a green cap trimmed with a scarlet cord. Marine Corps emblems were placed on the cap and on the uniform lapels; scarlet chevrons were sewn on the jacket's sleeves. Under the jacket, a khaki shirt and matching field scarf was worn. Added to the ensemble were dark brown gloves, shoulder bag, and shoes. For inclement weather, there was a green", "-25.894928449299186" ], [ "he will not take off his Marine Dress Uniform Jacket to go through the metal detector because it would degrade the uniform. Eventually he is screened in private, with the TSA agent using a metal-detector wand, while the Lt. Col. holds on to the PFC's personal effects in his hand. He then renders honors to the PFC again as the coffin is loaded onto the airplane. On board, the man next to him in first class orders a Jack Daniels, and he orders a water, after which the man asks him \"What, are you on duty?\" He replies, \"Yes, I", "-25.88826014759252" ], [ "officials continued to wear white ones. Finally, in 1988, the NFL switched to the high-school and college football convention: the referee wears a white hat (with the NFL logo since Super Bowl XXXIX), and the other officials wear black hats with white stripes. This has led to referees being referred to as \"white hats\".\nOfficials' hats are occasionally used as markers. If a player not carrying the ball steps out of bounds (a wide receiver running a deep passing route or a player running downfield on punt coverage, for example), the official will drop his hat to mark the spot of", "-25.88326974195661" ], [ "and seamen wore the combination cover's device, and female chief petty officers wore their rate insignia instead. The female black beret's usage was discontinued along with the officer's tiara by the navy in 2016 as part of a naval effort to reduce the number of uniform items, make them appear more unisex, and also due to a lack of widespread use. Venezuela In the Venezuelan Army, black berets are of general use except for Paratroopers, Special Forces, Counter-insurgency troops and soldiers stationed inside the Ministry of Defence and Army headquarters.", "-25.880877681658603" ], [ "White House travel office controversy The White House Travel Office The White House Travel Office, known officially as either the White House Travel and Telegraph Office or the White House Telegraph and Travel Office, dates back to the Andrew Jackson administration and serves to handle travel arrangements for the White House press corps, with costs billed to the participating news organizations. By the time of the start of the Clinton administration, it was quartered in the Old Executive Office Building, and had seven employees with a yearly budget of $7 million. Staffers serve at the pleasure of the president;", "-25.836548158549704" ], [ "appropriate for use in Afghanistan was fielded in 2010. Popular disdain among US troops for the beret headgear as part of the \"default\" headgear for wear with the ACU uniform led to a regulation revision in 2011, with the standard \"default\" headgear for wear with ACUs now being the ACU patrol cap, which provides a much better degree of sun protection for the eyes). The U.S. Army has since developed the OCP uniform (starting in 2016), going back to a green camo pattern, with coyote brown undershirts, boots, and belt. The U.S. Army is still in transition between the old", "-25.831094057066366" ], [ "with all orders of dress, save for the combat uniform. It is properly worn \"on the right side of the head, centred front and back, with the front edge of the cap 2.5 centimetres (1 in) above the right eyebrow.\" Cap badges are worn on the left side, with the centre of the badge 6.5 centimetres (2 ¹⁄₂ in) from the front of the cap centred between the flap and the top seam. The cap worn by general officers is embellished with silver piping. Air force military police in dress uniform wear a scarlet flash in the front of their wedge caps showing", "-25.828159599972423" ], [ "2006 NFL season Officials’ uniform makeover The 2006 season marked the debut of new officiating uniforms which are supposed to be more comfortable for officials to wear in extreme weather over the old polyester uniforms. The uniforms were designed by Reebok using a proprietary material technology to keep officials both warm and dry during the winter months of the season. On the shirt, the position and number are removed from the front pocket and the lettering and numbers on the back side were black-on-white and are smaller print and the sleeve shows the uniform number. Officials also wore full-length black", "-25.81291725076153" ], [ "Marine Corps authorized the use of black, dark-blue, navy-blue, and dark-green female berets, respectively, for wear with various service dress uniforms. These service members wore their traditional cap devices as their beret flash.\nCommissioned officers of the US Army wore a gold metal replica of the coat of arms of the United States as their female beret device while US Air Force commissioned officers, commissioned warrant officers, and warrant officers wore a silver version of the same insignia on their female beret. US Army commissioned warrant officers and warrant officers wore s gold metal eagle rising with wings displayed", "-25.793824367807247" ], [ "which has its own distinctive cap insignia and other uniform devices, Air Force combination caps bear a relief of the Great Seal of the United States rendered in silver-colored metal. For enlisted members, the arms are surrounded by a silver-colored metal circle. (The Chief Master Sergeant of the Air Force has a wreath instead of the circle). Commissioned officers' insignia is larger and lacks the encompassing circle.\nThe chinstrap is secured to each side of the cap with a silver-colored, screw-in, metal button bearing an updated and simplified version of the \"Hap Arnold emblem\" first designed by James T. Rawls for", "-25.755293562076986" ], [ "White House Chief of Staff, the White House Press Secretary and most other high-profile presidential staff assistants, are only employees of the United States as they have no authority to exercise the sovereign power of the federal government. Military officers and secondary appointments In addition to civilian officers of the United States, persons who hold military commissions are also considered officers of the United States. While not explicitly defined as such in the Constitution, this fact is implicit in its structure. According to a 1996 opinion by then-Assistant Attorney General Walter Dellinger of the Justice Department's Office of Legal Counsel,", "-25.7543444110197" ], [ "such as Royal Ascot, the Derby and the Victoria Derby where it is worn with a contrasting waistcoat, usually light grey or sometimes 'fancy'. It is very occasionally seen at funerals but more often it is used as day wear at formal luncheons, especially civic occasions under formal gowns, when worn with a black matching waistcoat (or 'vest'). Male members of the cabinet of Japan wear it in their first public appearance following the formation of the cabinet.\nThe Marshal and Clerk of the United States Supreme Court wear morning coats when the justices are appearing in public wearing their traditional", "-25.751483236497734" ], [ "staff, consisting of a three-piece uniform suit with gold-plated buttons and shoulder straps. The everyday uniform was grey and the dress uniform, which included a dagger, was black. Accoutrements included a coat, raincoat, hat and an ornate cap with the diplomatic insignia. The black dress uniform was similar to the Nazi SS uniform; the Soviet diplomat Victor Israelyan recounted that during World War II he was once given the Hitler salute and a loud \"Heil Hitler!\" by a German prisoner of war who mistook him for an SS officer.\nThe wearing of uniform by all Soviet diplomats on formal occasions was", "-25.74023197183851" ], [ "to do a live report outside the White House, an unidentified Secret Service agent confiscated Acosta's press pass. Acosta recorded the incident on his cell phone, saying \"This is Jim Acosta. I am in front of the White House. Secret Service officer is asking for my hard pass. Obviously, no hard feelings to the officer, but I am now giving my hard pass to the Secret Service.\" The next day, White House Press Secretary Sarah Huckabee Sanders defended their actions, claiming Acosta had \"placed his hands\" on the intern. Timeline of litigation A hearing was held on November 14,", "-25.72779509279644" ], [ "of the White House as they would a normal home. Threats to the president Baughman was interviewed by Time magazine and in an article dated April 20, 1953 he described the Secret Service's biggest fear as, \"escaped mental patients who bear grudges against the President or the Government.\" Baughman admitted that in 1952 the United States Secret Service handled 2,535 presidential protection cases. Of these cases, 74 resulted in arrests, and 72 of those were sent to prison or mental institutions. Organized crime In an interview with The Washington Post published on July 26, 1961, the day after his", "-25.726986541762017" ], [ "seal.\nThis misconception could also have arisen from a comment made by Winston Churchill, who (regarding Truman's redesign of the seal) joked: \"Mr. President, with the greatest respect, I would prefer the American eagle's neck to be on a swivel so that it could face the olive branches or the arrows, as the occasion might demand\".\nAlso furthering this misconception was an episode of The West Wing entitled \"What Kind of Day Has It Been?\", aired in 2000. Character Admiral Fitzwallace, Chairman of the Joint Chiefs of Staff, observed that the presidential seal in the center of the Oval Office carpet contained", "-25.699489825288765" ], [ "cap device and all commissioned officers' cap device is a gold-color rendering of the United States' coat of arms, larger than that of soldiers and lacking the golden disk backing. United States Air Force In the United States Air Force, all personnel have the option to wear combination caps, but only field-grade (major through colonel) and general officers are required to own one. The combination cap is issued without charge to enlisted airmen assigned to certain ceremonial units and details.\nWith the exception of enlisted airmen assigned to the Air Force Band and the Air Force Base Honor Guard, each of", "-25.68988559418358" ], [ "cap. U.S. Navy During the Vietnam War the U.S. Navy personnel assigned to patrol boats wore the South Vietnamese navy black beret with badge. Unit tradition had the back ribbon cut into two pennants after first contact with the enemy with the ends of the pennant notched in a \"V\" to signify he had made an enemy \"kill\". \nUntil October 2016, a black beret was authorized to be worn in the U.S. Navy, albeit solely by female sailors of all pay-grades. Female commissioned officers wore the U.S. Navy officer crest on the beret above the left eyebrow, female petty officers", "-25.67990446467593" ], [ "Forces, the black berets are worn by armor personnel. United States In the United States military, the beret was unofficially worn by a variety of special operations units during and following World War II. In the spring of 1951, the 10th and 11th Ranger Companies wore black berets during their training at Camp Carson, Colorado, before their deployment to Japan. U.S. Air Force In 1979, the black beret was authorized for wear by enlisted personnel in the Tactical Air Control Party. In 1984, two airmen from Pope Air Force Base, North Carolina submitted the current flash and badge design. It", "-25.672748750192113" ], [ "U.S. President Gerald Ford wearing the cap during a 1974 visit to the Soviet Union were seen as a possible sign of détente. Current use Identified with Soviet rule and issued in all Warsaw Pact armies, the ushanka has become a part of the winter uniform for military and police forces in Canada and other Western countries with a cold winter. Gray (American civilian police), green (for camouflage), blue (police, United States Post Office) and black versions are in current usage. In 2013, the Russian army announced that the ushanka was being replaced by new headgear, which is essentially the", "-25.669810973107815" ], [ "Yacht Clubs wear a black doeskin cap with plain black leather peak and a black band, worn with the appropriate individual club's badge.\nFlag officers' caps are not distinguished by oak leaves or similar devices. United States Marine Corps In the United States Marine Corps, these caps are also worn, in two forms. For all ranks, the device is the Eagle, Globe, and Anchor device. In addition, officers wear a lace cross on the top, called the quatrefoil, a traditional mark of distinction from the Marine Corps' foundation enabling sharpshooters aboard ships to identify friendly officers from foes. For blue dress", "-25.654215355520137" ], [ "of the officer's insignia centered on a disk is worn on the front. Warrant Officers wear a gold eagle device centered on the cap. For garrison caps, generally the rank insignia is worn, but recent regulations call for the wear of the DUI. U.S. Air Force For U.S. Air Force service caps, a large, silver eagle device is worn on the service caps. For enlisted men, a smaller version of the officer's insignia is worn, but enclosed in a ring. The use of the same device is because the U.S. Air Force was once part of the U.S. Army.", "-25.63837139098905" ], [ "for the production of \"extraordinarily sensitive national security information,\" and he said much of the information—if not all—could be subject to a claim of executive privilege.\n On August 20, 2007, Fielding wrote to Leahy that the White House needed yet more time to respond to the subpoenas, which prompted Leahy to reply that the Senate may consider a contempt of Congress citation when it returns from its August recess.\nOn July 27, 2007, both White House Press Secretary Tony Snow and White House spokeswoman Dana Perino defended Gonzales's Senate Judiciary Committee testimony regarding the events of March 10, 2004, saying that", "-25.623061641468666" ], [ "summer. Fedoras were originally regarded as too informal but have become more common recently. Top hats were originally worn with black tie, but had been reserved to white tie and morning dress from World War I. Black tie dress does not require a hat today.\nDecorations and orders: Military, civil, and organizational decorations are usually worn only to full dress events, generally of formal governmental or diplomatic significance. Miniature orders and awards are typically worn on the left lapel of the jacket, and neck badges, breast stars, and sashes are worn according to country-specific or organizational regulations. Unlike in white", "-25.619241713138763" ], [ "2011 the green service cap) is a gold-colored rendering of the United States' coat of arms, surrounded by a wreath. The cap device for all other U.S. Army enlisted soldiers is a gold-colored rendering of the United States' coat of arms on a gold-colored disk (males) or surrounded by a gold colored ring (females). The chief master sergeant of the Air Force has the same cap device as the SMA, but in silver-colored metal. Positional color The Sergeant Major of the Army, Chief Master Sergeant of the Air Force and the Senior Enlisted Advisor to the Chairman ", "-25.602467056538444" ], [ "baseball caps as a primary mode of headgear. After trials were conducted the proposal was dropped as being 'a step too far from the professional image of the force'. Uniform When on duty, officers wear a short sleeve black wicking T-shirt with 'Police' on the sleeves, and black uniform trousers with a cargo pocket on each leg. Thames Valley Police no longer use the traditional police jumper, having favoured a black soft-shell with police written on the chest and back. Thames Valley Police do not have Brunswick stars on their epaulettes, just the rank and shoulder number.\nFormal dress comprises an", "-25.525831177132204" ] ]
87pmz2
why do people often wake up when the TV is turned off, even though the room becomes darker and more quiet?
[ "Because even though it's taking stuff away, it's still a big change in what's going on around us. Us humans are wired since we were primitive animals to react to things that might indicate danger. When a big noise suddenly happens, we'd wake up in case we had to flee. When a long consistent noise and light that had been going on for some time suddenly stops, same thing happens, and alarm bells go off so we bolt awake. [Here's a prank where you can see what happens when something in the environment stops. It's pretty jarring.]( URL_0 )", "It stems from a very primal instinct to wake up to anything that might be \"dangerous\". The TV noise is familiar. It being there is what we fell asleep to. Any sound (or lack thereof) that is different from what we would expect wakes us up.", "In the wild, when everything goes suddenly silent it usually means someone noticed a large and dangerous predator. The sudden absence of sound is as important as the sudden presence.", "Specifically because the room has gotten darker and become more quiet. It is the change in our surrounding that prompts us to wake. Sudden changes in light mean danger, something has gotten between you and the light source and might eat you. Sudden changes in sound mean danger, the things that were making noise stopped to hide so something may eat you.", "It is not only because a change might be dangerous, it is that most of our senses are sensible to differences (which for some things like light are strongly related to avoiding dangers, and it is actually the way the eye evolved: a cell sensitive to light variation was more useful than no such cell to escape predators or finding nutrients): - we don't feel absolute temperature, we feel heat transfer (which is why plastic and metal at the same temperature feel very different) - a stable image would fade out in our vision system, which is why the eye \"vibrates\" (microsaccades) when the image doesn't change. - something touching you is detected, but if after contact the pressure remain constant you cannot tell anymore if the thing is still touching you. and so on, including sensing concentration of chemicals inside our body." ]
[ [ "breakfast television/morning show (between 2:00 a.m. and 6:00 a.m.). During this time slot, most people who are at home are asleep, and most of the few of those who are awake are either at work, away from the television, trying to fall asleep, or just returning home from a bar and too intoxicated to pay attention, leaving only insomniacs, intentionally nocturnal people, and irregular shift workers as potential audiences. Because of the small number of people in those categories, the overnight shift was historically ignored as a revenue opportunity, although increases in irregular shifts have made overnight programming more viable than it", "-36.019581732471124" ], [ "cook at the restaurant who had a penchant for making himself late-night snacks. Staff and guest both have reported lights and televisions turning on and off for no apparent reason, knocking on doors with no one there, and sounds and voices with no one present. Paranormal investigators say that reports of hearing children running down the halls could be attributed to \"residual energy\" from the recycled brick used in constructing the building that came from the elementary school. The Dude Rancher's web site states that room 226 is said to be a particularly active area for paranormal phenomena. ", "-33.41561543167336" ], [ "something to watch from what is available, flipping around, not until they find \"something they like\" - because television programming is in fact very rarely satisfying, and viewers rarely watch anything they actually like - but until they find something that doesn't offend them enough to make them flip to the next channel. (Viewers almost never turn off the set as a result of finding nothing tolerable and judging every program available boring or otherwise objectionable. Viewers commonly watch programs they describe later as unbearable, everything else on being even more intolerable. A more common response to a whole spectrum", "-33.37091617651072" ], [ "as teenagers, which makes them prone to stay up late in the evening and sleep later in the morning, may be at particular risk for increases in sleep deficiencies. A PC app such as F.lux and Android apps such as CF.lumen and Twilight attempt to decrease the impact on sleep by filtering blue wavelengths from the display. iOS 9.3 includes Night Shift that shifts the colors of the device's display to be warmer during the later hours. By plane Because of, among other things, electromagnetic waves emitted by this type of device, the use of any type of electronic device", "-31.798386326547188" ], [ "open my eyes, listen – Is it here or isn't? No sign of it. Perhaps it's asleep. Perhaps it will leave me alone today. Carefully, very carefully, I get out of bed. All is quiet. I go to the kitchen, start breakfast. Not a sound. TV – Good Morning America –, David What's-his-name, a guy I can't stand. I eat and watch the guests. Slowly the food fills my stomach and gives me strength. Now a quick excursion to the bathroom, and out for my morning walk – and here she is, my faithful depression: \"Did you think you could", "-31.690319693552738" ], [ "that they were tired of listening to, while leaving the image present so that the viewer would know when to turn the sound back on.", "-31.611727085881284" ], [ "these mobile phones feature the ability for the user to set the alarm's ringtone, and in some cases music can be downloaded to the phone and then chosen to play for waking. Next-generation alarms Scientific studies on sleep having shown that sleep stage at awakening is an important factor in amplifying sleep inertia. Alarm clocks involving sleep stage monitoring appeared on the market in 2005. The alarm clocks use sensing technologies such as EEG electrodes and accelerometers to wake people from sleep.Dawn simulators are another technology meant to mediate these effects.\nSleepers can become accustomed to the sound of their alarm", "-31.33666303807695" ], [ "is moved earlier. Non-clinical sleep and wake-up uses A dawn simulator can be used as an alarm clock. Light enters through the eyelids triggering the body to begin its wake-up cycle, including the release of cortisol, so that by the time the light is at full brightness, sleepers wake up on their own, without the need for an alarm.", "-31.313746254316356" ], [ "waking himself up. He tries a better alarm clock than his older one, which didn't work, a wind-up clock. He put it under his bed so he would have to get out of bed to find it. But with the clock ticking loudly under his bed, he feels like he is on top of a bomb and therefore gets no sleep. As a result, Greg accidentally sets off the fire alarm at school in his sleep-deprived state. The entire school has to evacuate, and the fire brigade is called. After everyone goes back in, the head teacher says that whoever", "-31.071432455646573" ], [ "television series Awake, in which the protagonist lives in parallel realities with differing circumstances.", "-31.069630132900784" ], [ "the night time. Originally players had the option of manually turning off the light when the pet fell asleep (it would turn on the light by itself when it awoke). In order to raise a healthy pet, players were encouraged but not required to turn off the lights when the pet fell asleep. In recent versions, the pet turns off the light on its own when it went to sleep. Recent versions also allow waking the pet for a short time once it has fallen asleep. V5 had the three children look outside on the window when they wake up", "-31.021538627956033" ], [ "them video footage of themselves that they didn't film, and even a duplicate of Scott who is trying to break into the house. Time is also distorted as they experience a night that doesn't seem to end, even though their clocks indicate it should be mid-morning. During one episode of terrifying noises outside, there is an urgent knocking on the door. Penny tells Scott to open it, and that it's Mr. Jones. Scott opens the door to find a masked figure who grabs Scott - but he is just trying to hold on in vain as strong winds suck him", "-30.921456838324957" ], [ "earlier than announced. At the same time, he came to the foyer, locking the door behind him. Later that night, when it was dark, the boys went to fetch more bedclothes from the mother's room, located behind the kitchen. When the son asked why the kitchen was dark, \"why won't you turn on the lights?\", his father said the lamp was broken. They walked through the kitchen in the narrow streak of light coming from the doorways of the foyer and the mother's room. However, the boys saw that all the miscellaneous junk that had accumulated on top of the", "-30.86824699337012" ], [ "electronic devices start turning on and off, as some unseen force appears to move through the home. The commotion wakes Griffin, and he goes downstairs and finds Maddie talking to an unknown presence inside the television. She tells Griffin someone is coming, and he attempts to unplug the TV, causing the lights to go out of control. Maddie then tells the family: \"They're here\" while touching their TV screen. The following evening, Eric and Amy go to dinner with their friends, leaving the three children at home. They learn that their house was built on an old cemetery, although the", "-30.57825770287309" ], [ "returning.\nThe woman goes to bed, leaving the lamp on her bedside table on and the door leading to the lit hallway ajar. She hears creaking sounds and looks towards the doorway. The hallway light turns off. Scared, she hears footsteps approaching the bedroom and hides under the blanket. After a few seconds of silence, she peeks out. The door opens wider by itself, which terrifies the woman.\nThe lamp flickers. From under the blanket, the woman looks towards the power strip it’s plugged in to. She nervously reaches out, locates the plug, and pushes it in more firmly. The flickering stops.", "-30.31052817296586" ], [ "1980s and was heard to say that he looked forward to Whitehouse's comments, as the show's ratings would increase soon after she had made them.\nThe phrase \"Hiding behind (or 'watching from behind') the sofa\" entered British pop culture, signifying in humour the stereotypical early-series behaviour of children who wanted to avoid seeing frightening parts of a television programme while remaining in the room to watch the remainder of it. The phrase retains this association with Doctor Who, to the point that in 1991 the Museum of the Moving Image in London named their exhibition celebrating the programme \"Behind the Sofa\".", "-30.02446401886118" ], [ "too much light. High-intensity light First, over illumination occurs when the intensity of lighting is too high for a given activity. For example, an office building might have many sets of fluorescent lights to keep the area illuminated after sundown. During the daytime, however, large windows might allow for abundant amounts of natural sunlight to enter the office. Therefore, keeping all of the fluorescent lights illuminated during the daytime might cause unnecessary costs and energy consumption. Leaving lights turned on Likewise, not switching off the lights when exiting a room will also cause higher energy consumption. ", "-29.99549671902787" ], [ "crash into a wall).\nTV viewers can be affected as well. If a home theater receiver with external speakers is used, then the display lag causes the audio to be heard earlier than the picture is seen. \"Early\" audio is more jarring than \"late\" audio. Many home-theater receivers have a manual audio-delay adjustment which can be set to compensate for display latency. Game mode Many televisions, scalers and other consumer-display devices now offer what is often called a \"game mode\" in which the extensive preprocessing responsible for additional lag is specifically sacrificed to decrease, but not eliminate, latency. While typically intended", "-29.926098062249366" ], [ "watch them perform from his seat as if he was watching TV, Bean soon becomes bored and rudely shuts the door on them just as they finish the song before heading for bed. Act 3: Christmas Day The following morning, Bean wakes up excited to the fact it is Christmas morning, and proceeds to check the stockings – his turns out to be a sock of his filled with the other; Teddy's turns out to contain a tin that holds a pair of button eyes within; the mouse's turns out to have a piece of cheese that Bean immediately places", "-29.806607986509334" ], [ "The Clock (2010 film) Content After midnight, characters go to bars and drink. Some seek intimacy while others are angry to have been awakened by the phone. In the early hours, characters are generally alone or sleeping. Several dream sequences occur between 3 a.m. and 5 a.m. At around 7 a.m., characters are shown waking up. From 9 a.m. to noon, they eat breakfast and have wake-up sex. As noon approaches, a sequence of action scenes build up to bells ringing in High Noon. The video's pace immediately slows once noon passes.\nBetween 4 p.m. and 5 p.m., transportation becomes important as characters travel on planes,", "-29.786523897346342" ], [ "8 am, and clubbers would, after a somewhat frustrating journey home, finally return home \"with a group of friends in tow\" and \"make the most out of the next few hours\", an experience that they compared to fine art, where people would perform chill out activities. Peter Owt, one of the producers of the Euphoria series, explained:\n\"If you have been standing there at 8 am wondering why the music just stopped, possibly slightly confused that the lights have just come on and have a heartfelt urge to talk to the nearest person, then you are just about ready for the most", "-29.692407252084195" ], [ "\"was as a result of the shifting of Radio 4, which I used to wake up to. I'd lost it on medium wave and was groping around in the morning on the dial, trying to find something that I could listen to, and came across a Dutch radio station who were playing the soundtrack from some obscure Stanley Baker movie called Dingaka. That had quite a lot of stuff from – I think it was – Ghana. I can't remember now, but it really moved me. One of the songs I heard on that was a thing called 'Shosholoza', which", "-29.651112967345398" ], [ "She concluded, saying: \"In all, I think the first time you watch Sit Down, Shut Up, it's really easy to blow it off as another animated show that's trying too hard. However, it's actually worth sticking around and watching a couple of episodes.\"", "-29.53711591211686" ], [ "When We All Fall Asleep, Where Do We Go? Background and production Billie Eilish and her brother Finneas O'Connell began working on When We All Fall Asleep, Where Do We Go? in March 2016 with the track \"Listen Before I Go\". Eilish intended the album to contain material \"that's so fun to be in the moment at a show to\" as well as \"shit that's crazy and also depressing.\" She further wished to \"do everything in this album\" due to her hatred for genre restrictions. The album was recorded in O'Connell's small bedroom studio in Highland Park, California using production", "-29.511412380932597" ], [ "screen switches from pitch black to different arts on the inside of the church in the point of view like the audience themselves are riding the tram. Time passes and the man is at a loss of where he is. He looks around confused and again, finds himself in his apartment. It is obvious that time has passed because the lighting is much darker and the mood is much more sleepy. After this, the man is on the tram and the scenery switches between him on the tram and the objects from earlier in the movie. The man is riding", "-29.400972978221034" ], [ "being of most interest. Television viewership is, in general, highest on weekday evenings, as most Americans are at work during the day, asleep during the overnights, and out taking part in social events on weekends; thus, television has its highest audience at times when people are unlikely to be away from home.\nPrime time for radio is called drive time and, in Eastern and Pacific Time, is 6–10 a.m. and 3–7 p.m. and, for Mountain and Central Time, is 5–9 a.m. and 2–6 p.m. The difference between peak radio listenership and television viewership times is due to the fact that people", "-29.37558765819267" ], [ "enter through a tilted doorway, then sit before a screen from which a disembodied female voice asks questions such as: \"During the day, are you anxious about the coming night?\" and \"What is preventing you from sleeping?\".", "-29.36529347122996" ], [ "which turns the radio on for a set amount of time (usually around one hour). This is useful for people who like to fall asleep while listening to the radio.\nNewer clock radios are available with other music sources such as iPod, iPhone, and/or audio CD. When the alarm is triggered, it can play a set radio station or the music from a selected music source to awaken the sleeper. Some models come with a dock for iPod/iPhone that also charges the device while it is docked. They can play AM/FM radio, iPod/iPhone or CD like a typical music player as", "-29.32732264561855" ], [ "get the phone book from the living room, which usually only takes a minute or two. However, when Rusty (who was talking the whole time) gets back into the living room, three hours have passed. Lisa lets Andrea have her room for the night and she sleeps on the couch in the living room. But the loud ticking from the clock keeps Lisa awake all night. Finally, near 3:00 am, she asks Andrea if she can sleep with her. Andrea says yes and tells Lisa to get her pillow from the living room. But when Lisa gets her pillow, the", "-29.248665903680376" ], [ "first slot.\"\nThe audience survey conducted later by Channel 4 reported that After Dark was watched by 13% of all adults, rising to what the research company referred to as a \"staggering figure\" of 28% amongst young men. One viewer is quoted in the academic study Talk on Television as follows:\nAfter Dark is far better because it allows people to go over all sorts of stages in a discussion and they are not shut off. Well I suppose they are on for three or four hours, but I think that is a really good idea, that you can really work everything out", "-29.213288758226554" ], [ "their cell phones as flashlights. As they sing, Carter notices that one of the plugs is not plugged in properly, which explains why the lights did not work. He tightly plugs it in, causing the lights to shine brightly through the night. SuChin Pak, who is doing the MTV report, gets confirmation from MyEarth that the house is indeed visible from space. The crowd celebrates as the film ends. Production notes The film was originally entitled All Lit Up, and while it was set in the United States, it was shot in Ocean Park, Surrey and other locations throughout Metro", "-29.12697493773885" ], [ "current events, and gossip.\nBecause of demographic shifts and the decreasing number of people at home during the daytime, the daytime television audience has shrunk rapidly in recent years, and that which remains is largely over the age of 55 and thus considered undesirable for most advertisers.\nAnother popular audience in this timeframe is the college student; game shows such as the original Jeopardy! (1964–75), Match Game (1973-79'; 1990), Family Feud (1976-85; 1988-93; 1994; 1999—present), Card Sharks (1978-81; 1986-89), Press Your Luck (1983-86), and, since the 1990s and even more so under current host Drew Carey, The Price is Right (1972-present), have", "-29.098472115045297" ], [ "and the lights actually going off due to faulty wiring, sufficient for Bell to jump into bed in the interim. Leaving out the explanatory details, Paige liked to say that Bell was so fast he could turn off the light and be under the covers before the room got dark. Legend also holds that Bell hit a ball up the middle of the field and that he was struck by the ball as he slid into second base.\nIn Ken Burns' Baseball, Bell was described as being so fast that he once scored from first on a sacrifice bunt. In an", "-29.0695596184014" ], [ "sleeping conditions are ideal or not via Red, Green or Yellow lights. Custom \"Smart Alarms\" are built into the Sense application and play up to 30 minutes before a user's requested wakeup time via the bedside Sense device. Sense can also play sounds such as rainfall and white noise to help the user fall asleep. Sense came in two colours: White and Charcoal.\nThe design of the bedside Sense device was inspired by that of the Beijing National Stadium, where the 2008 Summer Olympics were held.\nSense gives the user a score every night based on the conditions of the bedroom and", "-29.025612505851313" ], [ "a.m.), or once-a-week on Saturday mornings just to have the bare minimum of content that needs to be set. Or, the local networks air these specific programming when children have no realistic ability to watch the programming presented to them, because they're at a timeslot when they're at school, an example of working to the rule or at worst malicious compliance. (E/I regulations prohibit airing the shows at times when children are asleep; however, this regulation also previously prohibited shows from counting towards E/I if they air before school in most jurisdictions, but it does not prohibit airing them while", "-28.92197888661758" ], [ "him a cough sweet instead. Bean finds the remote control for the television and initially mistakes it for a phone, due to his own TV at home having no remote. He tests the remote control's signal range and turns the volume up once he is outside his room until his other neighbour in room 427 comes outside to investigate the noise. Bean hides the remote in his jacket and pretends to tell the guest inside room 426 to be quiet, and goes back inside once the neighbour is gone.\nBack in his room, Bean unpacks his suitcase and places Teddy in", "-28.881705189240165" ], [ "\"I like that romantic idea of living an entire life for yourself while you’re asleep\". Album title The title of the album is from a line in lyrics from a song on the album called \"Rapid Eye Movement\" – \"Give me one more quiet night, 'fore this loud morning gets it right and does me in.\" Reception AllMusic gave the album 3 out of 5 stars stating that 'This Loud Morning winds up as an album that’s primarily textural mood music for the morning, and one that’s not all that loud either'. American Songwriter also gave the album 3", "-28.804033651766076" ], [ "\"Seagull's Rest\" bed-and-breakfast); Badger (and Mousey) wanted to watch it in one of their guests' rooms while she was watching the weather forecast, so they switched the channel with their remote (while they were hiding in the back of the room), and after she changed it back with her own remote, they changed it again. The changing went on until the guest complained to Bodger that her TV was defective.", "-28.798869257750084" ], [ "programs of that decade with what had appeared on American television in 1960 and 1961.\nWhen television is good, nothing — not the theater, not the magazines or newspapers — nothing is better.\nBut when television is bad, nothing is worse. I invite each of you to sit down in front of your own television set when your station goes on the air and stay there, for a day, without a book, without a magazine, without a newspaper, without a profit and loss sheet or a rating book to distract you. Keep your eyes glued to that set until the station signs", "-28.590395612991415" ], [ "usually paid by the landlord. Individual tenants turn lights on, but have little reason to turn them off. Particularly so in the days of incandescent lamps this could be an appreciable cost. For this reason shared dwellings favour timers for staircases instead. The lights are turned on by a push-button switch on any floor. They remain on automatically for an adequate time to climb the stairs, then turn themselves off.\nTo provide longer lighting times when required the button may be pressed repeatedly. For this reason any timer should be a retriggerable monostable, i.e. the off delay lasts from the time", "-28.482587298029102" ], [ "off and objects being moved. The most common report is that the operation managers will lock the building up at night, turn around, and see that a light on the third floor is on. So, they would go shut it off, go back outside, turn around, only to find out that the light was still on, and they wouldn't go back.", "-28.450553222253802" ], [ "and NCIS: Los Angeles have a much broader audiences including older viewers. SideReel described the phenomena as saying \"Online TV viewers are younger and more discriminating. They're driving consumption away from the TV set to the computer.\" Back-channel networks The back-channel is the virtual conversation or information shared on a social media website or application by users and fans while a program is airing in real time. Studies show that a significant percentage of TV viewers simultaneously use a computer, smartphone, or other device while they watch TV shows. With the back-channel forums, a distinction made between television-show related tweets", "-28.44714328245027" ], [ "causes this to happen automatically. Because this tends to turn on and off when at the threshold of reception, and the threshold is often set too low by the manufacturer's product design, manually disabling this when at the edge of the broadcast range prevents the annoying noisy-stereo/quiet-mono switching.\nThe same is true of analog TV stereo and second audio programs, and even for color TV, all of which use subcarriers. Radio reading services and other subcarrier services will also tend to suffer from dropouts sooner than the main station.\nTechnologies are available that allow for switching to a different signal", "-28.441379454452544" ], [ "games, the family stops for a place to sleep, although they end up getting stuck in a run-down motel. In the morning, Greg and his brother, Rodrick, decide to go down to the motel's hot tub. A different family is already in there, so Greg and Rodrick return to their room. As Greg tries to sleep, he hears the family from the hot tub riding the cleaning cart across the hallway. Greg gets mad and yells at them, and the kids call for their father. Their father then steps out into the hallway, but he doesn't see which room Greg", "-28.419536819812492" ], [ "atmosphere of openness and presence of mind in these spaces. In a similar fashion, the policy regarding cell phone usage is that they are encouraged to be used outside of the common areas. Snacks are sold each weeknight and ice cream on weekend nights. Due to the decrepit nature of the lodge and the difficulty of reducing noise, quiet hours are enforced between 11 PM and 7 AM. Each morning at breakfast, announcements are made by directors regarding the daily weather forecast as well as the upcoming program. Every week on Sunday evening the current theme for the week is", "-28.385571806808002" ], [ "Sleeping with the Light On Background \"Sleeping with the Light On\" was written by Busted members James Bourne and Matt Willis and produced by Steve Robson and Graham Stewart.\nThe song was heavily remixed for its release as a single; the first chorus is more forceful than on the album version. This \"New Version\" was also used for the song's music video. Among the single B-sides were a non-album track, \"Last Summer\"; a medley of Busted's first three singles, which was previously performed on CD:UK, and a live recording of \"You Said No\" with 40,000 fans singing the chorus. The song", "-28.318106656559394" ], [ "when he would wake up and what he would wear. At one point, the majority of the viewers voted for Tristan Couvares to have an hour off camera. During the show, many cuss words were bleeped out with a splash screen displaying the word \"whoops\" and a small repeating audio clip. Viewership In its first 14 days of release, ControlTV received more than 3 million completed unique episode views, with viewers staying for an average of 27 minutes per visit on the live feed. By the end of season one the show had accumulated over 13 million completed unique episode", "-28.298738445755134" ], [ "time in the room is usually about patching it up, trying to make friends again, trying to work out what just happened, or what we are going to do when we leave the room. So it was quite curious for me to see that cycle emerging.\"\nIn 2009, Campbell's production company Eleven Film made a series about breast cancer for Sky One, presented by Dawn Porter; and Cast Offs, a drama series for Channel 4.\nCampbell has written for the New Statesman, The Guardian and the Mail on Sunday; and directs commercials for 2am Films.\nOn 10 September 2011 he married Amber Sainsbury", "-28.266456944329548" ], [ "leisurely watching TV. Nyatta leaves them to visit the toilet, and while he is gone, the other family members disappear one by one into thin air. The show on the TV also disappears, leaving only a flashing screen behind. Nyatta returns to find everyone gone. Outside the nearby lamppost extinguishes leaving the house in darkness. Finally the movie also \"turns off\", leaving behind a flashing screen of static before the credits roll. Background The characters of Nyāko and Nyatta first appeared in the June 1990 issue of the monthly manga magazine Garo. They also appeared in a series of", "-28.173305156000424" ], [ "lamp in this room, which has been reported to turn on and off, seemingly at will. In the time before Leyland French bought the house and started living there in 1984, the previous owners who didn't reside in the home, were frequently awakened by calls in the middle of the night telling them the lights at McRaven had come on. Mary Elizabeth's \nghostly apparition has appeared on the house's flying wing staircase, and in the dining room. While handling Mary Elizabeth's wedding shawl, some people say it emits heat, while others claim it about jumped out of their hands.\nMcRaven owner", "-28.15310035739094" ], [ "the overscan, the area of the active picture outside the action-safe area. It is not shown on most consumer television screens, unless the user modifies the television's settings. It is generally considered safe to have elements that shouldn't be seen by the viewers placed in this area, such as the edge of the set or cables and other equipment. However, some television production personnel don't place anything in this area they don't want viewers to see because the red area is always transmitted and could potentially be seen by a viewer with the correct equipment. Television stations generally have professional-grade", "-28.143908255377028" ], [ "shows wind people up with booze beforehand, then when they're actually on the programme they give them glasses of water. We give our guests nothing until they arrive on set and then they can drink orange juice, or have a bottle of wine. And we let them go to the loo.\" Viewer response In 1987, The Guardian wrote: \"After Dark, the closest Britain gets to an unstructured talk show, is already finding that the more serious the chat, the smaller the audience... Channel 4's market research executive Sue Clench... says that around three million saw some of After Dark in its", "-28.084146140266967" ], [ "balloon? What if you couldn't tell the difference between when you were awake and when you were asleep? And then I started looking for a way to marry those two ideas up, and a few months later we had Awake.\" After being turned down by Fox, the pilot (then titled REM) was picked up by NBC in 2011, and the series was green-lit shortly thereafter. Production team Awake was a co-production of Letter Eleven and Howard Gordon's Teakwood Lane Productions, in association with 20th Century Fox Television. Gordon served as showrunner for the series, while Killen wrote several episodes of", "-28.072613837590325" ], [ "including digital clocks, with the logo on the bottom, top or elsewhere, or even without it.\nCertain other channels, like STS, don't broadcast news programs but do show a clock sometimes between programs, at special or scheduled checks or at closedown, though a nightly closedown is rare in Russian channels since most of them are already broadcasting 24 hours a day.\nAfter a tragedy, or on a national remembrance day, those clock idents are shown silent and their color may be changed.", "-28.059926267589617" ], [ "so wide awake?\" as well as an animated can with the brand thumping like a fast heartbeat, simulating the effect the energy drink will have on its consumers. The internet version has the final words \"Now...go change your shorts and get back to work!\". K-fee also released several radio advertisements, both in English and German, narrated by someone talking in a peaceful manner for a short moment before being cut off by the same high pitched scream sound effect used in the television advertisements, following the voice of a whispering child saying \"Ever been so wide awake?\", as well as", "-27.99527153109375" ], [ "Lights Out (2013 film) Plot On a dark and rainy night, a woman (Lotta Losten) comes out of a room and turns off the hallway light, which causes a long-haired, humanlike silhouette to become visible at the other end of the hallway. Surprised, the woman turns the light back on and the silhouette vanishes. Switching the light off and on, she watches the silhouette appear and disappear, stopping when the silhouette suddenly moves so close it's inches away from her face. Gasping, she turns the light back on and tapes the switch in that position to prevent the silhouette from", "-27.97907919542922" ], [ "NBC hoped that viewers who tuned their television channel selectors to the game would not walk over to the television and change the channel or turn off the power switch, but would watch the evening's programming. They anticipated a good game, which would cause the audience to remain in their seats and watch the game in its entirety, \"a perfect lead in for the network's special presentation of Heidi, the Johanna Spyri children's classic, which was scheduled to air after the game at 7 p.m. (EST)\". The television film was preempting Walt Disney's Wonderful World of Color, the program normally", "-27.96263470330814" ], [ "called After Dark, a discussion show for people who couldn't sleep! I came in from a night out and there was McCririck and a couple of others sitting there on the TV talking a load of rubbish. But there was this guy, sitting there quietly, who would chip in every now and again and say something which was quite outstanding. That was Barney Curley and I was drawn to him like a magnet.\nAmong the other guests was the Duchess of Argyll, appearing \"so she said, to put the point of view of the horse\", who later walked out of", "-27.949080298181798" ], [ "for Awake. The installment was rated TV-14 in the United States during its original broadcast. Killen noted that, during the filming of the episode, he became \"hungry\" and wanted to \"bend the rules\" with the installment. He stated that the installment was a model episode that he wanted to \"pursue with the show going forward\". Killen also thought the last \"three or four episodes\" of Awake, including this episode, represent what the show's writers were able to accomplish throughout Awake's original run.\n\"Say Hello to My Little Friend\" marked the first appearance of Hawkins, a detective who was described as a", "-27.878477618847683" ], [ "reset and have people go, 'Wow, I didn’t see that coming!' That’s why we get up in the morning is to take people along for the ride. We’re excited about what’s coming up, too.\"\n\"The End of All Things\" began a four-week break for the series, though the producers initially thought this gap would commence with the following episode. They were pleased that the switch did not cause issues, with Pinkner noting that \"we’re sort of in a zone of episodes where each one is amazing and each one either turns the story or resolves something important or there’s a cliffhanger –", "-27.76492103743658" ], [ "the episode obtained 275,000 viewers, making it the third most-viewed program for the channel behind Alan Partridges: Mid Morning Matters and The Newsroom. Shortly after this episode was broadcast, NBC announced their decision to cancel Awake, due to declining ratings. Despite the series' cancellation, NBC still decided to air the remaining two episodes.\nBefore its original airing, \"Say Hello to My Little Friend\" was highly anticipated by commentators. In a review for \"Slack Water\", The A.V. Club claimed that \"Say Hello to My Little Friend\" would be \"very cool\" because Michael will \"face a crisis when he stops waking up in [the", "-27.762246661732206" ], [ "nothing is better. But when television is bad, nothing is worse. I invite each of you to sit down in front of your television set when your station goes on the air and stay there for a day without a book, without a magazine, without a newspaper, without a profit and loss sheet or a rating book to distract you. Keep your eyes glued to that set until the station signs off. I can assure you that what you will observe is a vast wasteland.\nWhile some applauded his \"vast wasteland\" assault on commercial television as a welcome criticism of excessive", "-27.734566876548342" ], [ "influence and fragmentation of media within Canada. Siegel implies that because of this, the state of television in Canada (i.e. whether it is healthy or dying) depends on the state of television in the United States.\nTelevision was welcomed when it was first introduced into society. It brought about a change from communication which was previously limited to only audio. If one wanted to view something on a screen, one would have to visit the cinema; the television provided a way of sitting at home and having visual communication as well as entertainment. Nowadays, however, with the introduction of smartphones and", "-27.7291918615374" ], [ "television was turned on it would automatically \"default\" to one of the adult channels, each being lightly scrambled but still providing full uncensored audio. These \"mechanical\" features made contact with the channels unavoidable, making children vulnerable to programming designed explicitly for adult viewers.\nCranmer claimed that this was done as a ploy to entice viewers to subscribe while subjecting all viewers to the adult content, including children. He also based his objections on an existing borough ordnance that prohibited the sale of sexually explicit magazines, videos, or performances. In signing a contract with the borough, TCI had agreed to abide", "-27.715780374972383" ], [ "was sleeping in hibernation state, but the host still wakes up from sleep state if its interface is configured to accept wakeup requests. If the host is already active and configured to allow replies to incoming ICMP Echo Request packets, the returned reply should include the same payload. This may be used to detect that the remote host was effectively woken up, by repeating a new request after some delay to allow the host to resume its network services. If the host was just sleeping in low power active state, a single request wakes up that host just enough to", "-27.715037343932636" ], [ "the rooms, with the door open. The door was left open so that the adult monitors could see that each student was present and a minimum of distraction was adhered to. At the beginning of Study Hall, the building was locked down and everyone was in for the night (with a few exceptions). After Study Hall, there was a short period of time for night grooming, a short snack, and such, until lights out. In the 70's restrictions were more relaxed. There was no study hour, but students had to be in the dorm by 8 PM and \"lights out\"", "-27.708631231992513" ], [ "mainstream clips were broadcast as in the rest of the day and evening program. Only formats such as Dance Hits and later Black Hits differed significantly in their formats from the rest of the programmes. Otherwise, the music videos were selected according to the time of day. So in the mornings not too penetrating, but also not very quiet videos were played (Daylight, Pophits). During the day there were stronger songs in the program (Quicklunch), the evening was aimed at those who were looking for some relaxation (Relax, Kiss Me). The night and weekend program was not arranged according to", "-27.691159861031338" ], [ "After singing some of their favorite nighttime songs, the stars begin to fade and before they know it, the morning sun is shining once again.", "-27.654216846218333" ], [ "go through. In addition, the Mini-TV window allows viewers to watch programming while surfing through the menu.", "-27.617739582771605" ], [ "Turn Off the Lights Content and style Regarded as one of Pendergrass's famous \"bedroom ballads\" at the time among R&B audiences as well as adult contemporary audiences, the song involves the narrator who gently tells his mate to \"turn off the lights\" in order for both to enjoy the intimate pleasures. He then transitions his vocal inflection to a rougher singing style and utilizes this command sentence: \"TURN 'EM OFF!\" \"Turn Off the Lights\" was produced by Gamble and Huff.", "-27.555823321745265" ], [ "when music blasts from next door. Bean looks at the alarm clock and upon realizing that it is 12:05 pm, gets up while forgetting that he's nude, knocks angrily at the door and shushes loudly. The music stops and he walks back to his room just as the door closes and locks itself. He reaches for his key, only to remember he does not have it. To make matters worse, he finds himself locked outside his room naked. Panicking, Bean hides in a doorway as a couple come past from a night out.\nOnce they have gone, he manages to escape", "-27.528621024932363" ], [ "others:\nWe have learnt with great concern of Channel 4's decision not to continue with the television discussion programme After Dark. Some of us have worked on and with this production, others have been its on-screen guests, still others have no professional connection with the programme but as viewers have found After Dark uniquely entertaining, instructive and informative. We do not want to see it disappear.\nAngela Lambert wrote later in The Independent:\nI am truly sorry to hear that the Saturday small hours talk show After Dark is to be dropped by Channel 4. It was the most original programme on television, and the", "-27.526924241305096" ], [ "you long after the house lights have come back up.”", "-27.510160471196286" ], [ "intended to make the contestant feel nervous, actually ended up having contestants feel so comfortable in it that it did not service the production team any longer.\nThe lighting system was programmed to darken the set as the contestant progressed further into the game. There were also spotlights situated at the bottom of the set area that zoomed down on the contestant when they answered a major question; to increase the visibility of the light beams emitted by such spotlights, oil was vaporized, creating a haze effect. Media scholar Dr. Robert Thompson, a professor at Syracuse University, stated that the show's", "-27.487977731143474" ], [ "Waking Up (song) Background \"Waking Up\" is a song about being an underachiever, in which writer-vocalist Justine Frischmann \"exorcises her personal malaise\" with the lines: \"I'd work very hard but I'm lazy/I've got a lot of songs but they're all in my head/I'll get a guitar and a lover who pays me/If I can't be a star I won't get out of bed.\" Damon Albarn contributed keyboards to the song.\nThe single was released in February 1995 with the b-side \"Gloria\". \"Waking Up\" was included as the 11th track on Elastica's 1995 self-titled album, and an alternate version was included on", "-27.471310636552516" ], [ "after falling asleep to the network, and judged from the online response that its audience would be \"pretty young, late teens, early 20s\" and \"strangely positive and engaged.\" The network has broadcast praise of the show written by viewers in the form of bumpers, often hinting at further episodes being produced. Episodes have been distributed to sites like YouTube, while a continuous online stream of the show was launched by the network on September 5, 2014. On December 19, 2014, the show's Facebook page announced that additional exclusive material will be added to the livestream.", "-27.432748783714487" ], [ "schedule on the website suggests that it is shown almost daily in the small hours of the morning, when children would not be awake, but hikikomori frequently are. Although the website lists the names of several real-world broadcast channels which supposedly carry the show, none of them are operated by the real-world NHK, again suggesting that in the anime's version of Japan, the N.H.K. is not a broadcasting company and is a conspiracy spanning all media. The listed broadcast times and channels are in fact the times at which the Welcome to the N.H.K. anime aired.\nOnly brief excerpts of", "-27.430176655805553" ], [ "read by other social media users, or even, in some cases, displayed on the screen.\nIn contrast to pre-Internet TV viewing, which typically took place in a family room of a private home, in the 2010s, digital and Internet technologies enable viewers to watch show anytime, anywhere, regardless of the over-the-air television air times. For example, when a TV show is made available on a streaming service, viewers can watch the show on any day and at any time. Viewers with Internet-enabled mobile devices can even stream or download and watch a TV show while commuting on the bus or train.", "-27.381703280378133" ], [ "Another Sleepless Night (Anne Murray song) Content The song, light and uptempo, was a bit of a departure for Murray, whose previous few singles had all been slower-tempo ballads. The narrator notes how it had been hard to sleep during recent nights, as her lover had been away, but then speculates that, with his return, it will yet be \"another sleepless night\", but this time because they'll be up all night \"making romance\".", "-27.35389699492589" ], [ "light to get inside the room, creating a bright atmosphere as the guests dine together.", "-27.35087656306132" ], [ "and months later came out with the music video of the song, \"Woke Up Like This\".", "-27.32422988349572" ], [ "audience leaving because of the lyrics of the song that are quite disturbing. When In-Grid watches the movie she wears the same clothes as when she acted and sang the same song that she sang in the movie.", "-27.3026345757753" ], [ "way that a newspaper has articles or a television has programs, yet it is a medium that has a social effect; that is, a light bulb enables people to create spaces during nighttime that would otherwise be enveloped by darkness. He describes the light bulb as a medium without any content. McLuhan states that \"a light bulb creates an environment by its mere presence.\"\nMore controversially, McLuhan postulated that content had little effect on society — in other words, it did not matter if television broadcasts children's shows or violent programming, to illustrate one example — the effect of television on", "-27.27360077528283" ], [ "carry out the orders of the state.... It was a simple, unvarnished account, and the most riveting piece of television this week. BBC series In January 2003, The Guardian wrote:\nAfter Dark, the open-ended discussion programme that gave its guests free rein to ruminate or ramble – depending on how much alcohol they had consumed – is to make a comeback on BBC Four....\" After Dark is one of the great television talk formats of all time – it was careless of Channel 4 to have let it go\", said the BBCFour controller, Roly Keating. The programme allowed its guests to talk entirely freely. They", "-27.23635005630058" ], [ "\"Hate to Get Up in the Morning\" as I did in the show, but the camera is a severe judge and I am afraid even with the great amount of care and fuss they can't improve what the Fates decreed to be a homely face. As for my voice, I made a recording. When the record was first played on the set, one of the electricians, who didn't know whose voice it was, said, \"If the guy who wrote that song could hear the record, he would turn over in his grave\"--which gives you a fair idea. ", "-27.234916707882803" ], [ "Family Viewing Hour The Family Viewing Hour was a policy established by the Federal Communications Commission (FCC) in the United States in 1975. Under the policy, each television network in the U.S. had a responsibility to air \"family-friendly\" programming during the first hour of the prime time lineup (8 to 9 p.m. Eastern Time). The hour disappeared in 1977 after the policy was overturned in court; however, the concept has continued to be used by some viewers who still believe that the 8:00 p.m. time slot in primetime has an obligation to have family-friendly programming. Background In 1974, there was widespread", "-27.213192235023598" ], [ "I Can't Sleep at Night Music video A music video was produced for the song. Directed by Ulf Buddensieck, the video features Minogue in a house waiting for someone. It begins with Minogue staring longingly outside of her home, but as the video progresses she becomes tired of waiting and falls asleep as her mobile phone begins to ring. The music video was released commercially on The Hits & Beyond special edition companion DVD, released in June 2006.", "-27.191637490323046" ], [ "nap while he prepares dinner. A few hours later, however, an explosion is heard and Max wakes George up to tell him that the power has gone out in the building. Because the exterior doors are electronically locked, everyone is now trapped inside the building. Many of the inmates have already been brought into the dining room for dinner service and the head guard enlists George and William to help escort them back to their cells.\nUnknown to those in the kitchen, several other inmates have seized the opportunity to overtake and kill the prison guards and nurses on the other", "-27.17305305577247" ], [ "could not get much sleep afterwards on account of the noise of the people, bands, etc., etc. Got up at seven, feeling strong and well; the Park presented a curious spectacle, crowds of people up Constitution Hill, soldiers, Bands, etc.\nAt ten I got into the State Coach with the Duchess of Sutherland and Lord Albemarle and we began our Progress. It was a fine day, and the crowds of people exceeded what I have ever seen; many as there were \nthe day I went to the City, it was nothing, nothing to the multitudes, the millions of my loyal subjects,", "-27.162305147791812" ], [ "same intrusive presentation as alerts for imminent threats to public safety that affect a larger population. Gurney thus argued that in such a situation, those who were not awake could learn the details of the alert in the morning instead. He also acknowledged similar opinions presented by Philip Cross in an editorial for its sister publication, the Financial Post; Cross felt that AMBER Alerts on phones should be optional as in the U.S., comparing the disruption of sleep caused by late-night alerts to health effects associated with daylight saving time, and noting that the public would be \"more likely to", "-27.160339559064596" ], [ "to work today, to which Daffy boxes himself (\"Now he tells me!\") before they drive home. When they climb back into the drawers to sleep, the alarm clock goes off again at 06:15. It gets shot by Porky, falls over and dies.", "-27.154683118336834" ], [ "using the set as a means to access specific programs they like the way they might choose a book from a shelf to access the story within. Since the introduction of television, the same percentage of sets are in use on, say, a Thursday evening at a certain hour, year after year, regardless of what content is broadcast. This is because unlike the way people use books, museums, or the cinema as means of consuming desired content, audiences consume television, the medium, as the desired object. TV viewers turn the set on, deciding to \"watch television\", and then seek out", "-27.14835696706723" ], [ "on the radio one evening, she hears interference in the form of a rustling noise over the music. She tries to get the music back by flipping switches and dials, but begins to hear the sounds of people from other apartments in the building. She is so surprised by this that she shuts off the radio. When Jim arrives home, he also tries the radio to get some music, but instead hears elevator noises and doorbells. Believing that the electronics in the building are interfering with the signal he turns the radio off, and determines to call the people who", "-27.12965733699457" ], [ "television sets displaying scenes from The Breakfast Club. The room gets increasingly cluttered with random objects as the video progresses until the last minute. The video was published on YouTube on 3 December 2010; as of August 2019, it had been viewed more than 142 million times. Release and reception Continuing the rock direction recently taken on Sparkle in the Rain but also reflecting their melodic synthpop past, the song caught the band at their commercial peak and, propelled by the success of The Breakfast Club, became a #1 hit in the US and around the world. It is also", "-27.110508256075263" ], [ "heater timer), plugged into a wall outlet with equipment plugged into the timer instead of directly into the power point; or built into equipment.\n A sleep timer is a function on many modern televisions and other electronic devices that shuts off the power after a preset amount of time. The setting is usually made either from the remote control of the device or the device's menu. They are intended to allow viewers to watch as they fall asleep.\nThe mechanism may be mechanical (e.g., clockwork; rarely used nowadays), electromechanical (e.g., a slowly rotating geared motor that mechanically operates switches) or electronic,", "-27.110271817815374" ], [ "is being totally destroyed by a few, rude, self-absorbed and inconsiderate audience members who are controlled by their phones. They cannot put them down. When a phone goes off or when a LED screen can be seen in the dark it ruins the experience for everyone else - the majority of the audience at that performance and the actors on stage. I am so defeated by this issue that I seriously question whether I want to work on stage anymore. Now I’m putting battle gear on over my costume to marshal the audience as well as perform. Memoir LuPone wrote", "-27.048223347126623" ], [ "the station close most often takes place overnight or during the early hours of the morning. The daily sign-off typically occurs between around 11:00 p.m. and 2:00 a.m. and the station will remain closed until about 4:00 a.m. to 7:00 a.m., although in countries with limited broadcast coverage, sign-off may occur at earlier times, and sign-on later. In the age of digital television, some broadcasters' specialty or subchannels may also closedown during significantly different times from their main channels in order to give way to fellow sister channels they share broadcast bandwidth with. For instance, CBeebies in the UK closes down at", "-27.03341333368735" ], [ "the series when she mimes turning a switch at the side of the screen and the image disappears, similar to an old television set.", "-27.011231379176024" ], [ "retain viewer- or readership. \nAccording to a study published in 2008, conducted by John Robinson and Steven Martin from the University of Maryland, people who are not satisfied with their lives spend 30% more time watching TV than satisfied people do. The research was conducted with 30,000 people during the period between 1975 and 2006. This contrasted with a previous study, which indicated that watching TV was the happiest time of the day for some people. Based on his study, Robinson commented that the pleasurable effects of television may be likened to an addictive activity, producing \"momentary pleasure", "-26.929283276826027" ], [ "interesting, and a way of telling stories that no one would know otherwise. The camera is the instrument I pick up when a room is too quiet for music. A perfect way to continue singing the song after a show has ended.\"", "-26.921324344546576" ] ]
3moi8g
How is 'planned-obsolescence' built into Smartphones?
[ "Planned-obsolescence is largely a myth. I'm an engineer, and sure, we often design things to some minimum spec. It *could* be tougher, stronger, and last longer. For example, you *could* design a bridge to last over a hundred years. But a lot of bridges are torn down to widen roads, increase clearance, add a rail system, or other feature. And it's generally stupid to plan that far in the future. So, a typical bridge is designed to last 30 years. Anything longer is a bonus, and is desirable. And if you can spend an extra 10% and get several more years out of it, you might get approval to spend the money. But generally, you plan for a minimum, and don't waste money making it stronger than it needs to be. In devices, this means that a phone might be designed to last 2 years. Anything more is a bonus, and sometimes they *do* make them more future-proof. And it does make those phones more costly. But companies **do not** want to be known for having phones that die in 2 years. It reduces their brand value, and makes their customers angry. They don't do that on purpose, because it's bad for business, and people would stop buying their crappy phones. What actually happens is other tech passing up the hardware. Advances to Android/iOS, advances in cellphone radio technology, new software interfaces, increased bandwidth, higher resolutions, and other factors *besides* the phone.", "The most common example/complaint is the OS maintainers pushing out out an update that reduces the performance of the older handsets. It's usually mandatory because it contains security patches and it's \"excusable\" because they're offered more functionality.", "There's an old anecdote (which is probably made up) about Henry Ford looking at his cars in the scrap yard. He found all of them had exhausts in good condition. When he got back to his factory he told the designers to make the exhaust worse. Plan obsolescence isn't always bad, it just means things have a planned life span and they should be built to meet that life span but not exceed it too much, otherwise it's a waste.", "I'm a product designer and these questions come up frequently in my industry. I would disagree with he structural engineer who posted elsewhere in this thread stating that planned obsolescence is a myth. In my industry it is very real; everything from cars/fridges getting more complicated and digital- increasing rates of failure-to our disposable culture, which can be tied back to the 1940's, an early exam of this is disposable napkins and replacing reusable handkerchiefs, for example, but i digress. If you're interested, a great read on obsolescence in reference to technology and smartphones, which goes into a lot of the details it sounds like you're asking for, is a book called [High Tech Trash: Digital Devices, Hidden Toxics, and Human Health]( URL_0 ) - it talks about the manufacturing process as well as the lifecycle and recyclability of phones, etc (in the sense that there really is none right now; a lot of the rare minerals that go into making smart devices are bonded at such a small level that hey are incredibly hard to separate, and the phones themselves are not built to be salvageable). Other posters have also talked about the OS updates that cause complications with older phones. This is what we called perceived or valued obsolescence; the phone may work fine but it's value and quality are perceived to be lower- this goes hand in hand with the marketing narrative of \"newer-faster\" versions of the product to convince/push consumers to upgrade. (Sorry for errors, I'm on my phone!)", "Your question implies that planned obsolescence is companies *making* things fall apart/degrade after a certain amount of time. In fact, it's companies saying *they don't care* if something degrades after a certain amount of time. In smartphones, you can see this in a couple of ways: * Integrated batteries; even if you're nice to a battery, it will eventually stop taking enough of a charge to be useful. Batteries are picked so that most of the time the battery will not fail within the planned useful life. They save money by not using batteries that last beyond that planned life. * Software updates; as the OS and its core software advance in features and capabilities, it'll be harder and harder for older devices to \"keep up\". Every time the company releases a new device, their cost to test updates on every device goes up. They make up for this by reducing and eventually eliminating testing on the oldest devices. The older the device, generally the less testing it receives. This means old devices are more likely to have problems with newer software. * Wearing components; plugs/jacks, switches, and buttons are designed to survive \"typical use\" for a certain period. Things that wear out less-easily are more expensive. The company plans for the hardware to last past the point they consider the phone obsolete, and so such things often wear out not long after the point of obsolescence. The philosophy of planned obsolescence is really all about saving costs for the company by only spending what it takes to make a product last until it's considered obsolete by the company/majority of users. You can see that different companies approach this philosophy in different ways. E.g. my 2007 iPhone has been in continuous use and hasn't broken, even though it can't run a recent OS due to not being supported; but my inexpensive emergency flip phone died after about 2 years -- it was designed to be cheap and replaceable and the manufacturer *didn't care* about the phone surviving past the typical contract period.", "The only way planned obsolescence can work is if a company can keep a good reputation with customers even if the customers don't get what they pay for in terms of longevity. One of the only companies I know that does this is Apple, and even that is arguable. The solution to planned obsolescence is to stop giving bad companies your patronage. *added 'get'", "New OS releases are typically geared to utilize the performance capabilities of their most recent device, resulting in decreased battery life and sluggish performance with past devices.", "Take the iPhone, for example. If you owned an iPhone 4S when it was new, it was a great phone, super fast as you'd expect from the best iPhone there was at the time. But soon, along came a software update, called iOS 8, which was free to install, and it was advertised as being better in every possible way than iOS 7. Turns out they forgot to mention two things: **it makes your iPhone 4S a lot slower**, and **you cannot go back to iOS 7, no matter what**, at all, ever, *even if you had a backup*. In fact not even the best hackers in the world could figure this out, that's how impossible downgrading is. So people were stuck with a phone that was great 10 minutes ago, but was now slow as hell permanently with no hope whatsoever. They could either complain on internet forums, or buy a new iPhone. That's it. And it will happen again and again every year. You buy the iPhone and see that it's made of super strong glass, aluminum and sapphire - \"this thing should last many years\", you think, seeing how well it's built. But little do you know that while the hardware will indeed last long if you take care of it, it won't be able to keep up with all those software updates. It's not necessarily \"built in deliberately\" the way we'd think, but rather \"why would they do anything about it if it's good for them?\".", "It's not built into phones per se, but when they are designed and they know that they are typically replaced in 2-3 years then that guides choices made such as size of the battery, amount of memory, etc. Could Apple build a phone with more battery power so that it'd still hold an all-day charge after 5 years? Sure... but how much bigger of a phone are you willing to carry and how much more are you willing to pay in order to get that more powerful battery? Or can they keep costs and size down by shooting for a battery that'll carry a an all-day charge for 3 years since they know customers typically upgrade sometime after a 2-year contract expires. The trade-off continuum is different in a laptop that'll last for 4-5 years.", "Not an explanation but an example. I had an older phone about two years ago and was studying abroad. Before I came back I found out my family was having issues with their phones maintaining signals (they had the same phones). When I got back an update was forced on my phone and afterwards I found I could hardly keep up a phone call, let alone any data or gps signals. Luckily we had insurance on the phones. Originally they tried to replace with \"fixed\" versions of our phones but they had the same problem. Only after two “new” phones and lots of complaints did they update our phones. Lesson learned, insurance can work to your advantage after enough complaining.", "You're probably thinking Apple. Apple releases new operating systems each time they release a product, and they make it available to install on previous products. However, the new operating system is more resource intensive and requires better hardware to run smoothly, so it will run slower on the old products. That's really a software issue though. If you stick with the operating system that came with the product it will be fine. I'm sure Apple is similar to Android in having small apps to add specific features which are found in newer operating systems.", "It's not built into the phone, it's built into the standards. I buy a phone. It's Bluetooth 3. Two years later everyone is using Bluetooth 4. I have to upgrade. I buy a phone. It uses a cpu with a certain instruction set. Two years later the instruction set has expanded and apps take take advantage of the new ones are faster,making the old ones feel slower than they are. This may or may not be intentional.", "The easiest way to do this is with \"New Software!\". Want people who still own a phone 3 generations back to buy your new phone? Release a new version of the phones OS that requires more system resources and performance, which slows their phones way down to the point where the annoyance requires them to upgrade." ]
[ [ "of modern cell phones. MOSFET scaling, where MOS transistors get smaller with decreasing power consumption, enabled very large-scale integration (VLSI) technology, with MOS transistor counts in integrated circuit chips increasing at an exponential pace, as predicted by Moore's law. Continuous MOSFET scaling eventually made it possible to build portable cell phones. A typical modern smartphone is built from billions of tiny MOSFETs as of 2019, used in integrated circuits such as microprocessors and memory chips, as power devices, and as thin-film transistors (TFTs) in mobile displays.\nAdvances in MOSFET power electronic technology also enabled the development of digital wireless mobile networks,", "-26.108742512675235" ], [ "Stages of growth model Stages-of-growth model is a theoretical model for the growth of information technology (IT) in a business or similar organization. It was developed by Richard L. Nolan during the early 1970s, and with the final version of the model published by him in the Harvard Business Review in 1979. Summary Nolan’s model concerns the general approach to IT in business. The model proposes that evolution of IT in organizations begins slowly in Stage I, the \"initiation\" stage. This stage is marked by \"hands off\" user awareness and an emphasis on functional applications to reduce costs. Stage I", "-24.758877672546078" ], [ "20% through 2013.” Gartner attributes this anticipated growth to enterprises’ increasing willingness (and ability) to extend decision-relevant information to employees, who are themselves increasingly mobile.\nFor EAM practices as a whole, this means that an increasing proportion of organizations in capital-intensive industry sectors (such as those above) are adopting mobile technology as an integral part of their enterprise asset management strategy – corresponding with an enterprise-wide emphasis on whole life planning, life cycle costing, planned and proactive maintenance and other industry best practices.", "-24.664439701489755" ], [ "assume constant exogenous saving rate and fixed level of technology. The stickiest assumption of this model is that production function does not include diminishing returns to capital. This means that with this strong assumption the model can lead to endogenous growth.", "-23.822927205335873" ], [ "Mobiles for development Mobile leapfrogging Originally a concept used in reference to economic growth theories and industrialization, leapfrogging has more recently been used in the context of sustainable development for developing countries within world development theories. Technological leapfrogging refers to the acceleration of development through the skipping of low-grade, less efficient, and more costly technologies and industries in favour of the direct adoption of more effective and advanced technologies.\nIn the case of M4D, the trajectory of the rapid mass adoption of mobile technologies can be attributed to the \"mobile leapfrog effect\", whereby many developing countries have been seen to bypass", "-23.804805267893244" ], [ "development of the smartphone was enabled by advances in MOSFET (metal-oxide-silicon field-effect transistor) semiconductor device fabrication. The MOSFET (MOS transistor), invented by Mohamed Atalla and Dawon Kahng at Bell Labs in 1959, is the basic building block of computing devices such as smartphones. MOSFET scaling, where MOS transistors get smaller with decreasing power consumption, enabled very large-scale integration (VLSI) technology, with MOS transistor counts in integrated circuit chips increasing at an exponential pace, as predicted by Moore's law. Continuous MOSFET scaling eventually made it possible to build portable smart devices such as smartphones during the 1990s–2000s. A typical smartphone is", "-23.67932639668288" ], [ "acquire data with it powered down; most mobile device acquisition is performed live. With more advanced smartphones using advanced memory management, connecting it to a recharger and putting it into a faraday cage may not be good practice. The mobile device would recognize the network disconnection and therefore it would change its status information that can trigger the memory manager to write data.\nMost acquisition tools for mobile devices are commercial in nature and consist of a hardware and software component, often automated. Examination and analysis As an increasing number of mobile devices use high-level file systems, similar to the file", "-23.631071321782656" ], [ "could not continue indefinitely, but that a natural end to growth was preferable to intervention. Wallich stated that technology could solve all the problems the report was concerned about, but only if growth continued apace. By stopping growth too soon, Wallich warned, the world would be \"consigning billions to permanent poverty\".\nJulian Simon, a professor at the Universities of Illinois and, later, Maryland, argued that the fundamental underlying concepts of the LTG scenarios were faulty, because the very idea of what constitutes a \"resource\" varies over time. For instance, wood was the primary shipbuilding resource until the 1800s, and there were", "-23.611185762332752" ], [ "CEO David Lieb has said technology is evolving to a point where users don’t have to make their phones transfer information to others; it will just happen. Lieb said:\n\"Where I see the whole mobile world moving in the next year or two is from the ‘Age of Intent,’ where we’ve been for the last 40 years, to the ‘Age of Inference’ or the ‘Age of Context.’\"\nThe next generation of mobile apps, Lieb believes, will “solve problems in a way that the user, the customer, doesn’t even have to think about it.”\n\"Mobile will enable all of these apps to kind of", "-23.5618825435522" ], [ "and increase power consumption due to added interfacing resistance. In addition, the quality of connection needed would require expensive pins and sockets, and developing a system to allow the user to arbitrarily place bloks without considerable cost would be very difficult. The end product would likely be much thicker than today's smartphones, and bloks would be at risk of dislodging from the main board(a case to help hold the blocks together during high movement activities, maybe a case with extra antennas for the RF?). RF design of a modular phone is also a major challenge. Antennas integrated into", "-23.53658951248508" ], [ "traditional routes of wired telephony and broadband infrastructure and development, opting instead for the immediate appropriation of wireless cellular and broadband technology. This mobile leapfrogging can be attributed to the lengthy process and high cost of wired infrastructure implementation. Additionally, as seen in mobile adoption in the Arab States, wired infrastructure that predates mobile technology is often old, outdated, and incapable of data transmission, \"the basic requirement for implementing Digital Subscriber Line (DSL) services\".\nMobile ICT platforms and their wide adoption in developing countries serves as an ideal example of leapfrog technology and current practices of leapfrogging within the sustainable development", "-23.53414077229445" ], [ "Companies only invest in them if they generate enough cash to equal the investment amount, otherwise, they may be liquidated. Comparison with the BCG matrix When compared to the BCG matrix consisting of four cells, the GE matrix is more complex with its nine cells. This means it not only takes longer to construct, but also to implement. The BCG matrix is much simpler and the factors needed to construct it are accessed more easily and quickly.It takes into account a wide range of factors when determining market attractiveness and business strengths, which is replaced by market share and market", "-23.52404028584715" ], [ "Essential's new Android phone and their planned future products. Essential wanted to incorporate a Keyssa-developed microchip in the Essential Phone to provide functionality to their modular accessories, but turned to a similar company, SiBeam, to produce the microchip. Keyssa says Essential stole its proprietary technology because the non-disclosure agreements it signed protected the two companies' meetings and prevented Essential from using those trade secrets to make commercial products.\nKeyssa has not been compensated for Essential's use of this guidance and know-how. We are pursuing this action because our attempts to resolve this matter through discussions with Essential have not been successful.\n— Keyssa\nAccording", "-23.513643227284774" ], [ "should be considered as high-growth enterprises. Growth can be measured by the number of employees or by turnover.\" Evolution of a scaleup One way of looking at the evolution of a startup into a scaleup is that scaleups evolve from startups as they cross the (so called) \"growth chasm\" that is, once they solve the startup challenges of market research, development, and identifying a repeatable, scalable business model. This can be identified by a significant sustained repetition of critical mass in a particular startup's most significant metric – generally, this metric is revenue, number of employers, number of active", "-23.469658261572476" ], [ "An example of such beneficial use of mobile technologies would be the sending of a mass alert to registered citizens via short message service, or SMS, in the event of an emergency. Delivery of e-public services through mobile devices eliminates access restrictions and ensures services that are demand-driven.\nTo quote mGovernment practitioner and proponent Ibrahim Kushchu, \"As e-business evolves towards m-business, eGovernment seems to follow the trend with a few but significant mobile government (mGovernment) applications and services.\"\nmGovernment services is now evolving on four dimensions – transforming eGovernment services directly to the mobile platform, providing access to mobile technologies and application", "-23.197081655729562" ], [ "plans in 2016 to invest heavily into technology relating to Internet of Things (IoT) as part of a strategy to capitalize on the growth in that market. For that purpose, €2 billion is planned for investment in relevant sectors by the end of 2020. SAP will also launch a new product line called SAP IoT, which \"will combine large amounts of data from things connected to the Internet with machine learning and SAP's real-time database S/4 HANA.\" SAP S/4HANA In 2015, the company launched [[]], the newest generation of the SAP Business Suite. It was written natively for the SAP", "-23.1371977776289" ], [ "SFA project by 2011 and newer Smartphone platforms, such as Apple's iOS and Google's Android, point to a future of increasing diversity in device selecting and support for sales force. When implementing the mobile sales force automation application or during the first stage of systems development life cycle, project teams will need to evaluate how prospective solutions comprising mobile devices, software and support infrastructure and carrier services are packaged to deliver optimal system usability, manageability and integrative abilities, as well as scalability, reliability and performance. Encouraging use Many organisations have found it difficult to persuade sales people to enter data", "-23.043237397854682" ], [ "Future of Manufacturing To prepare Singapore's manufacturing industry for the future economy, A*STAR outlined its Future of Manufacturing (FoM) roadmap and initiatives at the Committee of Supply Debate 2017. Core to A*STAR's FoM strategy is the creation of public–private partnership (PPP) platforms that drive technology innovation, knowledge-transfer and adoption of advanced manufacturing processes. Three PPP platforms, namely Model Factory, Tech Depot and Tech Access were created to drive uptake of advanced manufacturing processes across different enterprise types.\nA*STAR has implemented the Model Factory Initiative at two locations: ARTC and SIMTech. The Model Factory Initiative is an important platform for companies across", "-23.029147711320547" ], [ "Development Miniaturization became a trend in the last fifty years and came to cover not just electronic but also mechanical devices. Today, electronic companies are producing silicon integrated circuits or chips with switching transistors that have feature size as small as 130 nanometers (nm) and development is also underway for chips that are merely few nanometers in size through the nanotechnology initiative. The focus is to make components smaller to increase the number that can be integrated into a single wafer and this required critical innovations, which include increasing wafer size, the development of sophisticated metal connections between the chip's", "-22.982903497679217" ], [ "Modular smartphone A modular smartphone is a smartphone made using different components that can be independently upgraded or replaced in a modular design. This aims to reduce electronic waste, lower repair costs and increase user comfort.\nThe most important component is the main board, to which others (such as cameras or batteries) are attached. These are packaged in easy-to-remove modules which can be replaced as needed without having to rework the soldering. Components could be obtained from open-source hardware stores. History Desktop computers that use tower cases can easily swap parts such as hard drives, memory, and graphics cards. Among early", "-22.91434122627834" ], [ "happens before an investment is made, in effect reducing the perceived need for investment.\nIn effect, the first and second reinforcing loop act together as a reinforcing loop to restrict growth.\nIf it were not for the delay, the whole system would work optimally thanks to timely investments. Difficulties Identifying Archetype At least two factors can contribute to the difficulty of identifying the Growth and Underinvestment Archetype in real-world complex systems.\nFirst, the archetype can be temporarily covered up by shifting the burden, that is, by trying to solve the underlying problem by a symptomatic solution, instead of a fundamental one. This leads", "-22.823504147527274" ], [ "refreshed interface with updated versions of stock apps such as BlinkFeed, customizable color themes and fonts, along with a new \"Extreme Power Saving Mode\", which caps CPU usage and disables non-essential applications, multitasking services, and sensors to conserve battery life when running low; the mode only allows access to the phone, messaging, e-mail, calendar, and calculator apps.\nFollowing its unveiling, HTC committed to releasing updates to Android 5.0 \"Lollipop\", again within 90 days of the release of its source code. Per this commitment, HTC planned to release Lollipop by the end of January 2015, but the company missed its deadline due", "-22.73300491180271" ], [ "the first-party Google Pixel devices. In a Reddit AMA, Andy Rubin announced that the Essential Phone would get Android Q as well in 2019. Meltdown and Spectre In January 2018, the phone quickly received a patch to fix the Meltdown and Spectre vulnerabilities after they were revealed. Until this time, only phones by Google had these vulnerabilities patched. Availability delay Rubin announced on May 30, 2017, that the Essential Phone would ship in approximately 30 days, i.e. June 2017. This estimated timetable was not met, however, without Essential responding to media queries. In mid-July, Rubin sent an email to potential", "-22.73284536320716" ], [ "it would conduct a survey of smartphone applications to determine how their developers were addressing user privacy, to assess legal compliance, and to educate the public.", "-22.597115178592503" ], [ "sales and outsourced some of their manufacturing. In June, the CEO of HTC, Cher Wang, confirmed that it was developing a \"hero product\" which was planned to launch in October intended to improve its smartphone business.\nRumors surrounding the development of the phone began to surface in July 2015 after the failure of the One M9. It was reported by evleaks that the device will feature a metal unibody, a five-inch screen, and a fingerprint sensor. The internal specifications of the phone was speculated through an unofficial AnTuTu benchmark test report. Several leaked images of the device began to surface which", "-22.52896987576969" ], [ "implementation Smartphones are expensive devices with high resale value, and are therefore often the target of theft, with thieves selling them to cartels for resale. One attempt to address this is a \"kill switch\" which would deter theft. In the United States, Minnesota was the first state to pass a bill requiring smartphones to have such a feature, and California was the first to require that the feature be turned on by default. The California law requires the kill switch to be resistant to reinstallation of the phone's operating system. The CTIA initially resisted the legislation, fearing that it would", "-22.485994175774977" ], [ "Technology life cycle S-curve The shape of the technology lifecycle is often referred to as S-curve. Licensing options Large corporations develop technology for their own benefit and not with the objective of licensing. The tendency to license out technology only appears when there is a threat to the life of the TLC (business gain) as discussed later. Licensing in the R&D phase There are always smaller firms (SMEs) who are inadequately situated to finance the development of innovative R&D in the post-research and early technology phases. By sharing incipient technology under certain conditions, substantial risk financing can come from", "-22.47113539511338" ], [ "the expected target. From a new forecast, requested by the investor, the venture expects to fulfil the target in the next quarter or the next half year. This is caused by external issues the venture does not have control of it. The venture has already suggested to stabilise the existing market the venture already owns and to decrease the promotion by 20% of what the venture is spending at the moment. This is approved by the investor. Risk At this stage, the risk to the venture capital firm of losing the investment drops from 20.1% to 13.6%, and the causation", "-22.45280385827573" ], [ "encourages the use of smartphones on the basis that the technology they provide can be utilized as a means of changing the problematic situation of their manufacture. The ability to communicate quickly and on a global scale enables the spread of knowledge, such as the conditions that corporations provide to the workers they employ, and the result their widespread manufacturing has on globalization. Leonard argues that phones and tablets can be effective tools in bringing about change through slacktivism, because they allow us to spread knowledge, donate money, and more effectively speak our opinions on important matters.\nOthers keep a slightly", "-22.444835151196457" ], [ "Partner program. Later, Trend Micro joined the VCE Select Program, which allowed Trend Micro's Deep Security to be bundled with VCE's converged and hyper-converged infrastructure systems. \nGartner named Trend Micro to the \"Leaders\" ranking of its Magic Quadrant rating for endpoint protection platforms in 2015, 2016 and 2017. In 2016, Trend Micro discovered that a variant of a virus affecting Android phones was able to infect smart TVs.\nTrend announced the launch of a $100 million venture capital investment fund in June 2017 focused on the next generation of technology including the Internet of Things (IoT). In September 2017, Trend Micro", "-22.38600453111576" ], [ "vulnerability (\"root exploit\") and \"hard-rooting\" by flashing a su binary executable is sometimes made. If a phone can be soft rooted, it is vulnerable to malware. Varieties The process of rooting varies widely by device, but usually includes exploiting one or more security bugs in the firmware of (i.e., in the version of the Android OS installed on) the device. Once an exploit is discovered, a custom recovery image that will skip the digital signature check of firmware updates can be flashed. Then a modified firmware update that typically includes the utilities needed to run apps as root can", "-22.277656821177516" ], [ "to secure resources as well as generate public support, mollify critics, and manage conflict through many years of planning, authorization and implementation. Other challenges faced by those planning megaprojects include laws and regulations that empower community groups, contested information and methodologies, high levels of uncertainty, avoiding impacts on neighborhoods and the environment, and attempting to solve a wicked problem.\nA megaproject's economic failures (and successes) have common characteristics. According to John Cunningham, assessing their success, or failure, can be accomplished by benchmarking their performance against these common characteristics in order to mitigate failure and turn a troubled megaproject around.", "-22.238279432756826" ], [ "the Profitable Growth paradox. Most growth investment will at first reduce the profitability, cost reduction efforts to boost the bottom line usually have a negative impact on future growth. This is especially true with mature products or services. The only way out of the Profitable Growth paradox is through innovation. It concerns not only technical innovation but mainly business model innovation, a new product-market space where there is no competition (see Blue Ocean Strategy). An interesting piece of research by the BCG shows that no business model is able to achieve a sustainable competitive advantage for more than 10 years.", "-22.2266453494085" ], [ "the update was only being made available for \"'Google'-branded\" models of the device. Development and modding Due to the open source nature of the Android platform, the Dream became a popular target for modding. Shortly after the release of the Dream, developers discovered a software exploit which would allow a user to gain superuser access to the phone—a process which would be referred to as \"rooting\". As a parallel to \"jailbreaking\" on iOS devices, root access would enable users to perform tweaks and other changes at the system level that cannot be performed under normal circumstances (such as adding auto-rotation,", "-22.15163259941619" ], [ "wireless, and other functionality. Consumers assemble basic modules to create a working device, then add or remove additional modules as desired – in some cases, even while the device is operating. Optional modules include cameras, speakers, large data storage, and medical sensors. Since users can update individual modules when better technology becomes available, Project Ara provides a hedge against cyclical obsolescence.\nIt also reduces the purchase price of a low-end cell phone, by creating the option of buying only the most basic features. This may support the spread of technology in economically-disadvantaged areas. The official Project", "-22.138604750391096" ], [ "More recently, the smartphone (which has combined many features of the cell phone with the PDA) has rendered the PDA obsolete. The growth of new mobile media as a true force in society was marked by smartphone sales outpacing personal computer sales in 2011.\nWhile mobile phone independent technologies and functions may be new and innovative (in relation to changes and improvements in media capabilities in respect to their function what they can do when and where and what they look like, in regard to their size and shape) the need and desire to access and use media devices regardless of", "-22.13621628168039" ], [ "effort by Access, Esteemo, NEC, NTT DoCoMo, and Panasonic to use the platform as a basis for a shared platform implementing a revised version of the i.mode Mobile Oriented Applications Platform (MOAP) (L) application programming interfaces (APIs), conforming to the specifications of the LiMo Foundation. The first smartphone to use the ALP was to be the Edelweiss by Emblaze Mobile that was scheduled for mid-2009. However, it was shelved before release. The First Else (renamed from Monolith) smartphone, that was being developed by Sharp Corporation in cooperation with Emblaze Mobile and seven other partners, was scheduled for 2009, but was", "-22.065255569294095" ], [ "worked with General Dynamics through their Open Kernel Labs acquisition to rebuild Jelly Bean on top of their hardened microvisor for the \"Knox\" project.\nAndroid smartphones have the ability to report the location of Wi-Fi access points, encountered as phone users move around, to build databases containing the physical locations of hundreds of millions of such access points. These databases form electronic maps to locate smartphones, allowing them to run apps like Foursquare, Google Latitude, Facebook Places, and to deliver location-based ads. Third party monitoring software such as TaintDroid, an academic research-funded project, can, in some cases, detect when personal information", "-22.03761815733742" ], [ "2015, HTC unveiled Vive, a virtual reality head-mounted display in collaboration with Valve Corporation. In June and October 2015, HTC reported net losses; the company has faced increased competition from other smartphone makers, including Apple, Samsung, and others, which had resulted in a decline in its smartphone sales, as well a major loss of market share. Its smartphone market share had risen back to 7.2 percent in April 2015 due to its strong sales of recent devices, but HTC's stock price had fallen by 90 percent since 2011.\nIn November 2016, HTC reported that it had sold at least 140,000 Vive", "-22.011376130394638" ], [ "market would be, until products actually become available. Some critics worry about loss of control over the full hardware platform, brand erosion, consumers who make poor choices, whether separately purchased components would cost more than a pre-packaged phone would, and whether modular phones would be more prone to breakage (and thus create more e-waste). Proponents hope that the technical challenges can be overcome and that a viable market ecosystem (the hardware version of an app store) will enable finer-grained competition that will benefit consumers with better and cheaper choices.", "-22.004443454992725" ], [ "been reclaimed by rate center consolidation and number pooling in the US.\nMany phone numbers that are never published or dialed are tied up in hunt groups.\nExpansion options have been discussed by industry forums for several years and, although a recommendation has been made, that expansion plan format has not been approved by the regulatory authorities, i.e. the Federal Communications Commission in the United States and the Canadian Radio-Television and Telecommunications Commission and the regulators may choose a different expansion plan. The industry forum considered dozens of potential options and identified the difficulties with each option.\nNANPA regularly performs exhaustion analyses. The", "-21.993501432734774" ], [ "to invade it, the Poietic Generator could help us by providing \"a set of conceptual tools for the new \"perspecteurs\" (Abraham Bosse) that we could all become\" in order, he says, to \"rethink the imagination of the technology in full light\". Reception by the institutions of research, culture and media Attempts like this are crucial to emancipate the technology from the status a mere instrument for defined purposes, and to recognize the role that it should have as a creator of culture and practices.\nSince the 1990s, many scientists in all disciplines, mentioned the Poietic Generator as a model which may", "-21.992242665583035" ], [ "Hancom's next-generation virtual office suite.\nThe Thinkfree Office product family includes Thinkfree Online, which is the first MS-compatible web-based online office in the world; Thinkfree Mobile Office, which runs on mobile devices such as smartphones and tablets; and Thinkfree Server, which is a web-based office solution that integrates with on-premises and cloud-based servers.\nThinkFree Mobile has been pre-installed in many mobile devices, such as Samsung's Galaxy Nexus, Fujitsu's tablets, and HCL's devices (HCL is one of the biggest Indian mobile device manufacturers).", "-21.967893815948628" ], [ "stage, an implementation of such a technology into a development programme poses a significant risk. If it turns out, that the technology does not perform as expected in the later stages of the development or the concept using that technology is not feasible, a redesign of the complete system often has severe impacts on time, quality and cost. \n\nFLPP addresses this issue via a system driven approach. Based on system studies for future launch systems or upgrades of current systems, promising technologies, which will provide benefits in line with the objectives of FLPP and have a low TRL (typically 2-3),", "-21.89873084158171" ], [ "effectively killing the technology, probably because of lowering demand.", "-21.889496151241474" ], [ "of projects is very small. Venture capital Venture capitalists might demand a high stake in the company. The company will want to prevent this due to loss of ownership. Further, VC's may place restrictive covenants or ratchets that may reduce the flexibility of the biotech firms in their R&D projects. Strategic alliances SWORD is preferred over strategic alliances because it allows the biotech firm to retain potential significant rewards of the product development.", "-21.88073645683471" ], [ "Android Tablets and smartphone. Connectivity and computing power An effective device will be able to process data into actionable information and transmit data and information to other devices or persons. The device may not actually perform computation of final communication, but it must appear as though it does. Extra steps to upload and download information will be perceived as a nuisance or waste of time to the user and cause the device to be underutilized. Some IAs are self-contained in that they have computing capacity and software to perform required tasks independent of a server or other devices. Others", "-21.86354177568137" ], [ "is a need for a tool that has the capability to measure power consumption on Smartphones that software designers could use to monitor their applications in real-time. Researchers have developed specific power management models for specific portable embedded systems and it takes a huge effort to reuse those models for a vast variety of modern Smartphone technology. So the solution to this problem is PowerBooter model that can estimate real-time power consumption for individual Smartphone subsystems such as CPU, LCD, GPS, audio, Wi-Fi and cell phone communication components. Along with PowerBooter model an on-line PowerTutor utility can use the generated", "-21.843457912720623" ], [ "It is believed that 65% of acquisitions which businesses buy in order to grow in size have destroyed more value than they actually created, an acquisition can’t be a substitute for a growth platform.\nNew growth platforms help companies grow as they created families of products, services, and businesses and extend their capabilities into multiple new domains. The NGPs acted as a method of growth in which each business was acquiring new capabilities and further market knowledge. The size of the growth platform is strategic to the corporation. Small scaled businesses can only have a NGP when provided through a partnership", "-21.826914672739804" ], [ "ZTE Open Rooting The phone can be rooted by exploiting a known security vulnerability, CVE-2012-4220 a.k.a. Qualcomm DIAG root. This vulnerability was discovered 7 months before the ZTE Open was released. The vulnerability in question can be used to modify system files, but it cannot be used to unlock the locked bootloader.", "-21.823480360326357" ], [ "leading to a strong and positive impact on the development of telecommunications infrastructure and the advancement of the economic sectors. Additionally, the technology will double the exchanged Internet data volumes and increase the use of smart phones that support this technology, providing room for expansion in terms of increased data usage in the different development sectors such as the educational and health service sectors among others.\nWith the Environment being a top concern for Zain, the company employs eco-friendly practices by installing intelligent towers. Designed to blend into the environment and surrounding landscape, these towers also consume minimum energy. In fact,", "-21.791701157271746" ], [ "Minister of Malaysia at the time (1981–2003), is essentially this:\n“MSC is paramount to leapfrog (Malaysia) into the 21st century and to achieve Malaysia’s Vision 2020, the MSC was created to endeavour the best environment to harness the full potential of the multimedia without any artificial limits. MSC is a global test bed (hub), where the limits of the possible can be explored, and new ways of living, working, and playing in the new area of the Information Age.”\nThe Multimedia Super Corridor is a government-designated zone in designed to leapfrog Malaysia into the information and knowledge age. It aims to attract", "-21.790835133288056" ], [ "through smartphones are clearly non-negligeable anymore across many different countries Methodology of data collection According to Maxl, four different kinds of methods are distinguished which can be used as required. These are listed in the following figure.\nPush studies without contexts (A) are conducted independently from time and location. This can be CATI- or CACI-studies as well as surveys by SMS or MMS. In cases of these research methods, the feedback impulse actively comes from the researcher.\nWith contextual push studies (B) the researcher prompts the respondent to give appropriate feedback once it is recognized that he/she is located in a particular", "-21.784640189725906" ], [ "engagement in joint venture, typically in regions where the technology would be in the ascent phase,as say, a developing country. In addition to providing financial opportunity it allows the technology-owner a degree of control over its use. Gain flows from the two streams of investment-based and royalty incomes. Further, the vital life of the technology is enhanced in such strategy. Licensing in the decline phase After reaching a point such as D in the above diagram, the earnings from the technology begin to decline rather rapidly. To prolong the life cycle, owners of technology might try to", "-21.717000276665203" ], [ "of major risk by stage of development drops substantially from 53.0% to 37.0%. However, new follow-up products are often being developed at this stage. The risk of losing the investment is still decreasing, because the venture relies on its income from sales of the existing product. Example Faced with the dilemma of whether to continuously invest or not. The causation of major risk by this stage of development is 33%. This is caused by the follow-up product that is introduced. History In July 2016, the Financial Post reported that according to a report by PricewaterhouseCoopers and the National Venture Capital", "-21.70296311675338" ], [ "growth depends on policies to increase investment, by increasing saving, and using that investment more efficiently through technological advances.\nThe model concludes that an economy does not \"naturally\" find full employment and stable growth rates.", "-21.694917315740895" ], [ "1 September 2012 SFS Group acquired the Unisteel Technology Group, which is based in Singapore and has production sites in Malaysia and China. Unisteel manufactures miniature screws and precision metal components (e.g. for smartphones and hard disc drives). Although SFS itself produces precision components of a diameter of 0.5 mm, which belong to the thinnest fasteners in the world, it gradually lost market shares due to the continuous migration of the mobile phone industry. The acquisition of Unisteel Technology strengthens SFS' position in its market segment. With the construction of a new plant in Nansha (CN), SFS increases the production of", "-21.684850150020793" ], [ "technological creation process are not available inside a home/domestic territory. \"Technological disconnection\" refers to a situation where specific technologies or manpower are available in the domestic territory, however there is no successor to that information, thus ending the execution of the technological product. Samsung has recently generated a substantial amount of media coverage for outsourcing to China, where workers are paid less for longer hours. As a result of this outsourcing there has been a steady decrease of labouring jobs on the production lines of Samsung and other bigger production companies. Technology South Korea is at the top of the", "-21.679411900295236" ], [ "mobile devices rely on no infrastructure (base stations or access points). In MANET models, the transmitters form a random point process and each transmitter has its receiver located at some random distance and orientation. The channels form a collection of transmitter-receiver pairs or \"bipoles\"; the signal of a channel is that transmitted over the associated bipole, whereas the interference is that created by all other transmitters than that of the bipole. The approach of considering the transmitters-receive bipoles led to the development and analysis of one of the Poisson bipolar network model. The choice of the medium access probability, which", "-21.67610169411637" ], [ "have spent on the phone. These apps usually work by doing one of two things: increasing awareness by sending user usage summaries, or notifying the user when he/ she has exceeded some user-defined time-limit for each app or app category. Research-based Studying and developing interventions for temporary mobile phone non-use is a growing area of research.\nHiniker et al. generated 100 different design ideas for mobile phone non-use belonging to eight organic categories: information (i.e. agnostically providing information to the user about his or her behavior), reward (i.e. rewarding the user for engaging in behaviors that are consistent with his or", "-21.6537720353881" ], [ "boom. This is particularly advantageous because the smartphone combines a myriad of data that would interest an intelligence agency, such as social contacts, user behavior, interests, location, photos and credit card numbers and passwords.\nAn internal NSA report from 2010 stated that the spread of the smartphone has been occurring \"extremely rapidly\"—developments that \"certainly complicate traditional target analysis.\" According to the document, the NSA has set up task forces assigned to several smartphone manufacturers and operating systems, including Apple Inc.'s iPhone and iOS operating system, as well as Google's Android mobile operating system. Similarly, Britain's GCHQ assigned a team to study", "-21.60106913477648" ], [ "the manufacturing value chain to learn about advanced manufacturing technologies, and harness innovation to reinvent or improve business models, for greater productivity and competitiveness.\nThe agency's Tech Access scheme would provide companies, particularly SMEs, access to A*STAR's base of advanced manufacturing facilities and training expertise to build capabilities in advanced manufacturing through the use of advanced machine tools, new processes, prototyping and testing. Another initiative, Tech Depot, offers SMEs a suite of easy-to-use technologies that can help them improve productivity. It would showcase ready-to-go (RTG) packaged solutions such as inventory-tracking, and business process automation systems.\nA*STAR's ARTC would jointly conduct manpower training", "-21.599480845150538" ], [ "to be about 150,000 phones. Successor The PH-2, a successor that was in the works according to designers has reportedly been cancelled. According to sources at Essential in October 2018, the company is working on another phone that operates primarily under voice control to automate certain tasks, such as responding to emails and text messages or making appointments.\nAccording to Android open Source project review website Essential might be working on a tablet or some device meant to work with Android in landscape mode.", "-21.59373930323636" ], [ "M-government Mobile government, or mGovernment refers to collection of services as the strategic use of government services and applications which are only possible using cellular/mobile telephones, laptop computers, personal digital assistants (PDAs) and wireless internet infrastructure. History The world's first mGovernment work initiated by Professor Ibrahim Kushchu in Japan at the mGovLab - now grown into Mobile Government Consortium Int (mGCI) - offering services for the transformation to mGovernment. Proponents of mGovernment services argue it can help make public information and government services available \"anytime, anywhere\" and that the ubiquity of these devices mandates their employment in government functions.", "-21.593692997004837" ], [ "2019, researchers at Check Point found a security breach in Xiaomi phone apps. The security flaw was reported to be preinstalled. \nIn 2019, the company announced launching more than 10 5G phones in 2020.", "-21.58322100058649" ], [ "Miniaturization Miniaturization (Br.Eng.: Miniaturisation) is the trend to manufacture ever smaller mechanical, optical and electronic products and devices. Examples include miniaturization of mobile phones, computers and vehicle engine downsizing. In electronics, Moore's law, which was named after Intel co-founder Gordon Moore, predicted that the number of transistors on an integrated circuit for minimum component cost doubles every 18 months. This enables processors to be built in smaller sizes. History The history of miniaturization is associated with the history of information technology based on the succession of switching devices, each smaller, faster, cheaper than its predecessor. During the period referred", "-21.579061427153647" ], [ "Drop (loyalty program) Funding In August 2015, Drop raised a CA$1 million round of initial financing for launching the app.\nIn October 2017, Drop raised a $5.5 million seed round of venture capital financing led by Sierra Ventures.\nIn February 2018, the company announced that they had raised a US$21 million series A round, led by New Enterprise Associates.\nIn August 2019, the company announced their series B round which was a total of US$44 million, led by HOF Capital and Royal Bank of Canada (RBC) participated as a strategic investor.", "-21.577922615222633" ], [ "Regulations like the Sarbanes-Oxley Act have implemented more stringent regulations following several bankruptcy cases in the US market that many of these companies want to avoid. Technological advancements Startups are taking advantage of the flood of new technology of the last decade to obtain Unicorn status. With the explosion of social media and access to millions utilizing this technology to gain massive economies of scale, startups have the ability to expand their business faster than ever. New innovations in technology including mobile smartphones, P2P platforms, and cloud computing with the combination of social media applications has aided in the growth", "-21.566092075867346" ], [ "Fortify Software History On September 7, 2016, HPE CEO Meg Whitman announced that the software assets of Hewlett Packard Enterprise, including Fortify, would be merged with Micro Focus to create an independent company of which HP Enterprise shareholders would retain majority ownership. \nMicro Focus CEO Kevin Loosemore called the transaction \"entirely consistent with our established acquisition strategy and our focus on efficient management of mature infrastructure products\" and indicated that Micro Focus intended to \"bring the core earnings margin for the mature assets in the deal - about 80 percent of the total - from 21 percent today to", "-21.558006479404867" ], [ "digital phones. For instance Avaya IP Office release 7.0 supports expansion modules for Avaya's digital phones, or alternatively \"heritage\" Nortel Norstar/BCM phones. \nWhether a standalone TVA (such as Citel's Portico TVA) or a hybrid PBX is deployed, the intention is to preserve investment in an installed base of telephone handsets, and remove the need to install Ethernet network infrastructure. External Portico TVA", "-21.52118630858604" ], [ "the delay is Business Process Management, a field of study focusing on improving the efficiency of business processes. With its help, we might be able to identify the excessive delays in the investment process and shorten the delays or eliminate the parts of process that cause it entirely. Plan Ahead, Identify Growth Potential When the reduction of investment delay is not possible, consider having a plan in advance. This includes monitoring the right key performance indicators (some KPIs such as utilization rate might act as an inhibitor for investment, since they frown upon unused capacity) and have an investment plan", "-21.51993820743519" ], [ "System replacement It is possible for the user to install replacement firmware (including CyanogenMod) after the phone has been unlocked using Sony's Bootloader Unlock Tool (which is only available for out-of-box carrier-unlocked devices). After unlocking the phone with the unlock tool and Fastboot, the user may install the replacement firmware.\nThe last supported official CyanogenMod was version 10 (based on Android 4.1 Jelly Bean), however, nightly builds exist for newer versions (including CyanogenMod 10.1, 10.2, 11, and 12 which is based on Android 5.0 Lollipop).", "-21.496644169150386" ], [ "of Oxford says that globally, megaprojects make up 8 percent of total global GDP.\nCare in the project development process is required to reduce any possible optimism bias and strategic misrepresentation, as a curious paradox exists in which more and more megaprojects are being proposed despite their consistently poor performance against initial forecasts of budget, schedule, and benefits.\nMegaprojects are often affected by corruption leading to higher cost and lower benefit.\nMegaprojects refer not only to construction projects but also decommissioning projects, which are projects that can reach multi-billion budgets, and have a high level of innovation and complexity, and are affected by", "-21.486835807561874" ], [ "Megaproject A megaproject is an extremely large-scale investment project. Definition According to the Oxford Handbook of Megaproject Management, \"Megaprojects are large-scale, complex ventures that typically cost $1 billion or more, take many years to develop and build, involve multiple public and private stakeholders, are transformational, and impact millions of people\". However, $1 billion is not a constraint in defining megaprojects; in some contexts a relative approach is needed, such as in developing countries, where a much smaller project (such as one with a $100 million budget) could constitute a megaproject. Therefore, a more general definition is \"Megaprojects are temporary endeavours", "-21.483709140091378" ], [ "to predict an SME’s future funding requirements. Investing ThinCats allows both retail investors and institutional investors to lend directly to UK businesses via its online platforms. Individuals can build self-selected portfolios or invest through pre-selected portfolios called DLPs (Diversified Loan Portfolios).\nSince 2017 ThinCats has announced a number of funding programmes and now manages mandates for a range of institutions, including Waterfall Asset Management, Insight Investment, BAE Systems Pensions and British Business Investments, funding commitments totalling in excess of £800m.", "-21.47407305147499" ], [ "observations that when a less resource-exhaustive technology is introduced, behavior surrounding the use of that technology may change, and consumption of that technology could increase or even offset any potential resource savings. In light of the rebound effect, proponents of degrowth hold that the only effective 'sustainable' solutions must involve a complete rejection of the growth paradigm and a move toward a degrowth paradigm. There are also fundamental limits to technological solutions in the pursuit of degrowth, as all engagements with technology increase the cumulative matter-energy throughput. However, the convergence of digital commons of knowledge and design with distributed manufacturing", "-21.47210716889822" ], [ "root exploit available for new or recently updated phones, but one is usually available within a few months. Industry reaction Until 2010, tablet and smartphone manufacturers, as well as mobile carriers, were mainly unsupportive of third-party firmware development. Manufacturers had expressed concern about improper functioning of devices running unofficial software and related support costs. Moreover, firmware such as OmniROM and CyanogenMod sometimes offer features for which carriers would otherwise charge a premium, such as tethering. Due to that, technical obstacles such as locked bootloaders and restricted access to root permissions have commonly been introduced in many devices. For example, in", "-21.462710052728653" ], [ "place a burden on the mobile terminal, because demodulating and decoding a high data-rate stream involves certain power dissipation in the tuner and the demodulator. An investigation at the beginning of the development of DVB-H showed that the total power consumption of a DVB-T front end was more than 1 Watt at the time of the examination and was expected not to decrease below 600 mW until 2006; meanwhile a somewhat lower value seems possible but the envisaged target of 100 mW as a maximum threshold for the entire front end incorporated in a DVB-H terminal is still unobtainable for a DVB-T", "-21.45981520251371" ], [ "of smartphones, app usage has also greatly increased. The annual number of mobile app downloads over the last few years has exponentially grown, with hundreds of billions of downloads in 2018, and the number of downloads expecting to climb by 2022. Therefore, mobile marketers have increasingly taken advantage of smartphone apps as a marketing resource. Marketers aim to optimize the visibility of an app in a store, which will maximize the number of downloads. This practice is called App Store Optimization (ASO).\nThere is a lot of competition in this field as well. However, just like other services, it is not", "-21.450589344050968" ], [ "prepared in advance.\nSuch plan can also include a stop-gap solution that can temporarily weaken the growth inhibitor, such as hiring outside help in the form of contractors or lending additional capacity. But beware to not let the stop-gap solution become a permanent one, which could become a Shifting the Burden archetype. Modification with a Drifting Standard The Growth and Underinvestment with a Drifting Standard is a special case of the archetype.\nIt adds an additional relationship between the slowing action and the performance standard. When the slowing action is growing (e.g. the backlog of order is increasing in size), it has", "-21.4478874161141" ], [ "LG smartphone bootloop issues Several smartphone models introduced by LG Electronics between 2015 and 2016 were discovered by users to have manufacturing defects, all of which eventually cause the devices to become unstable, or stuck in a loop of reboots attempting to boot, rendering them effectively inoperable—an issue that had been nicknamed a bootloop. The LG G4 (2015) has been the most synonymous with these failures, with LG stating that the issues were the result of a \"loose contact between components\". Similar issues have also been reported to a smaller extent with the G4's successors and sister models, including the", "-21.429993892816128" ], [ "similar time frame will be a sister microarchitecture, which will focus on lower power consumption chips in mobile platforms as well as small form factor features. This microarchitecture will contain specialized features such as mobile optimized crossbar switch and memory controller and other on-die components; link power management for HyperTransport 3.0; and others. At that time, AMD simply dubbed it \"New Mobile Core\", without giving a specific codename.\nOn the December 2006 analyst day, Executive vice president Marty Seyer announced the new mobile core codenamed Griffin launched in 2008 with inherited power optimizations technologies from the K10 microarchitecture, but based on", "-21.4286547350639" ], [ "provision is to allow investors to prevent ownership dilution as the company raises additional capital. Typically, the provision will exempt certain types of shares, such as those in an employee pool, or shares issued to equipment loaners or lessors. Startup companies are advised to attempt negotiating out this right, because it enables existing investors to send stronger (potentially negative) signals to new investors, and consequently drive down the company's valuation.", "-21.426597737707198" ], [ "background information about the organization and key team members. It is commonly developed for a 3-5 year time frame and is useful when seeking external funding from either banks or investors.\nOn the other hand, a Growth Plan is short term, typically 1–2 years or less. It focuses at a much deeper level on the go-to-market section usually seen in a Business Plan. Growth Planning aims to be agile and adapt to changing market conditions that businesses are facing, particularly through technology and digital media. Further, a Business Plan may give a high level view of the plans in place to", "-21.425512731002527" ], [ "the scheme may be lawfully circumvented. Writing in the Australian Financial Review, journalist Laura Tingle identified a number of methods for circumvention including the use of phone me via a provider Skype, advertising supported email services such as Google's Gmail and instant messaging service, Facebook Messenger.\nIn an interview with Sky News, then Communications Minister Malcolm Turnbull suggested journalists could avoid leaving a data trail through using over-the-top applications:\n\"If you have a device, a smartphone and if I call you through the mobile phone network then there will be a record at Telstra that I called your number.\"\n\"If on the other", "-21.417716901458334" ], [ "business to focus 5G efforts on network infrastructure.\nOn July 25, 2019, Apple and Intel announced an agreement for Apple to acquire Intel Mobile Communications' smartphone modem business for US$1 billion. Intel will continue to develop modems for non-smartphones such as PCs, Internet of things and autonomous vehicles.", "-21.39874602330383" ], [ "it can be argued that the market will be uncompetitive and lead to excessive profits being achieved by those who are so favoured.\nAnother criticism is that GNEP seeks to deploy proliferation-prone reprocessing technology for commercial reasons, and to bypass the continued delays with the Yucca Mountain nuclear waste repository, while erroneously claiming to enhance global nuclear security.", "-21.39108944614418" ], [ "(i.e. projects) characterized by: large investment commitment, vast complexity (especially in organizational terms), and long-lasting impact on the economy, the environment, and society\".\nAccording to the European Cooperation in Science and Technology (COST), megaprojects are characterized both by \"extreme complexity (both in technical and human terms) and by a long record of poor delivery\". Megaprojects attract a lot of public attention because of substantial impacts on communities, environment, and budgets, and the high costs involved. Megaprojects can also be defined as \"initiatives that are physical, very expensive, and public\". Bent Flyvbjerg, a professor at the Saïd Business School of the University", "-21.376433330588043" ], [ "OnePlus 3T Controversy Planned Obsolescence: The phone has been marred with complaints of faulty software. The biggest controversy it has been linked to is of planned obsolescence at a far quicker pace than any of the leading smartphone manufacturers. OnePlus, famously announced support for OnePlus 3T till Android Pie. However, the update had faced many delays and was launched in June 2019; far later than the release estimates. This was, allegedly, done to promote newer models of the OnePlus smartphone line while the OnePlus 3T was still a strong performer with regards to specifications. Release The OnePlus 3T was released", "-21.375013465993106" ], [ "shareholders of a company are, the price and quantity of their latest transactions, and the other stocks these investors have in their portfolios. The mobile app also allows users to 'follow' their favourite counters or celebrity investors, and keep tabs on their movements. The users can form private chat groups.\nThe app provides sophisticated investors (those who invest in more than 5 percent of a public-listed company) with resources to conduct due diligence, influence board decisions and access to more intimate knowledge than most other investors.\nSpiking Finance aggregates recent news headlines, announcements, tweets and buy/sell activity of the companies and", "-21.35553367142529" ], [ "all sectors of society to deliberate the best ways in which design and innovation can serve the public interest. The larger goal of the Conclave is to serve as an enabling platform for building the necessary partnerships and consortia that will bring this agenda to practical realization. Emerging Economy Report In 2008, CKS released the Emerging Economy Report. The report aims to serve as an innovation guide for organizations that seek to participate in innovation processes for Emerging Economies. Mobile Development Report In 2007 Nokia commissioned CKS to carry out a study into the effect of mobile phones on", "-21.313921709021088" ], [ "Unihertz Jelly Background and History Unihertz was associated with a previous very small 3G smartphone, the Posh Micro X, which launched in 2015.\n\nReviews of Jelly and Jelly Pro, the \"world's smallest 4G smartphone\" have been mixed, \n\nbut it drew international attention. Controversies There have been accusations of poor battery performance, and network traffic possibly sending personal data to China. Responses claim the network traffic is to speed up apps, and the company has been updating the phone software to improve performance. It is not known whether this is connected to similar widespread problems, but the predecessor Posh Micro X was", "-21.31269176253045" ], [ "of Android devices may look to other sources in the future. Access to alternate apps may require rooting but rooting is not always necessary.\nRooting an Android phone lets the owner add, edit or delete system files, which in turn lets them perform various tweaks and use apps that require root access. Methods Some rooting methods involve use of the command prompt and development interface called Android Debug Bridge (ADB), while other methods may use specialized applications and be as simple as clicking one button. Devices, or sometimes even different variants of the same device, can have different hardware configurations. Thus,", "-21.306538892677054" ], [ "hence sought to bridge the gap by introducing its channel for digital lifestyle infotainment where it would provide a go-to voice for start-ups and entrepreneurs to amplify their creations.\nThe company is first in Singapore to partner with Nanyang Technological University in adopting its proprietary automatic content recognition (ACR) technology that allows users to interact between mobile devices and larger screens.\nIn April 2015, former chief technology officer of Singapore Telecommunications’ (Singtel) L!feLabs Lee Lup Yuen was appointed as Tech Storm's technology advisor.\nThis company was the Finalist in Best Innovative Start-up (Early Stage) 2016 category in the SiTF Awards held in Singapore.", "-21.301755039137788" ], [ "holding the back of their device up against the back of another NFC-equipped Android device, and tapping the screen when prompted. Certain \"System\" apps (particularly those pre-loaded by carriers) that cannot be uninstalled can now be disabled. This hides the application and prevents it from launching, but the application is not removed from storage. Android 4.0 introduced features for managing data usage over mobile networks; users can display the total amount of data they have used over a period of time, and display data usage per app. Background data usage can be disabled globally or on a per-app basis, and a", "-21.30159736709902" ], [ "OnePlus One Development The OnePlus company was founded on 16 December 2013 by former Oppo vice-president Pete Lau. The company's main goal was to design his \"dream\" smartphone; one that would balance the quality of high-end devices from its major competitors with a lower price than other phones in its class. He argued that, despite their lower cost, users would \"never settle\" for the lower-quality devices produced by other Chinese companies, and similar startups such as Blu and Yota. Lau compared the ideals of OnePlus with those of the Japanese company Muji, with a focus on high quality products with", "-21.30076706968248" ], [ "state that microsegment is a rather new concept in terms of other marketing techniques but it is the future of how a business will look to have different customer target groups and bases such as the handset manufacturers and mobile operators. Mobile phones are now very common and almost every person in different age bracket has it, however with so many types of different customers come along different wants and needs so microsegments are key for handset manufacturers and mobile operators to produce a different kind of mobile phone for every microsegment. Traditional market segmentation Traditional market segmentation divides the", "-21.293159806882613" ], [ "SAP Mobile Platform SAP Mobile Platform (formerly Sybase Unwired Platform) is a mobile enterprise application platform designed to simplify the task of creating applications that connect business data to mobile devices for workflow management and back-office integration. SAP Mobile Platform provides a layer of middleware between heterogeneous back-end data sources, such as relational databases, enterprise applications and files, and the mobile devices that need to read and write back-end data.\nApplication developers write the business logic of a mobile application using the development tools in SAP Mobile Platform. The product automatically does the translation required to create customized versions of the", "-21.28670652425717" ], [ "Growth stock Criteria Analysts compute Return on equity (ROE) by dividing a company's net income into average common equity. To be classified as a growth stock, analysts generally expect companies to achieve a 15 percent or higher return on equity. CAN SLIM is a method which identifies growth stocks and was created by William O'Neil a stock broker and publisher of Investors Business Daily.", "-21.27977814269252" ], [ "such as power amplifiers which failed to materialize. However, Qualcomm, the dominant provider of the silicon chip content in mobile phones, has made significant investments in this area and reported volume shipments of a 3G/4G front-end solution using CMOS-based power amplifier technology in February 2014.\nProliferation of CMOS-based solutions increases competition from CMOS RF companies such as Peregrine Semiconductor as well as mobile phone SoC and chipset providers such as Qualcomm and others, and has the potential to significantly reduce the addressable market for GaAs-based devices.\nHowever, companies traditionally focused on GaAs, including RFMD, already use silicon-on-insulator (SOI) technology for switches, and", "-21.268840957898647" ] ]
44lljo
Why do many people in the US opose to free universal things like health and education?
[ "Because it isn't \"free\". It comes out of the pockets of taxpayers anyway. The basic argument is that the government pretty much sucks at running anything. They can't even handle \"free\" healthcare to veterans- who make up a tiny part of the population. The \"right-wing\" standpoint is that the job of the government isn't to provide for the people. It's to safeguard people's rights to provide for themselves.", "Because it is not really free. The cost is passed on to taxpayers and republicans generally argue that leaving the government in charge of such tasks is inefficient and wasteful.", "Because it's NOT FREE! Doctors and healthcare workers still expect to be paid. Schools and hospitals still cost money to build and operate. When you say \"Free Healthcare\" or \"Free College\" you mean healthcare and college paid for through higher taxes. The folks paying the taxes don't like that all the time. Some of the time, it's accepted like k-12 school or emergency room healthcare. At some point there is a line where continuing to spend public money isn't popular enough.", "If you've ever been to the DMV, then you know the answer to this one. Every time you're there, you're subjected to long lines, convoluted regulation, and bad service. Why is it like that? Because there is nothing for the DMV to compete against. The government essentially created a monopoly that everyone had to use, and flooded the system by making it so centralized, leading to the long lines and inefficiency. If you hate the DMV, but need a license, there is nowhere else to go to, so you have to deal with it. Take this system into education and you see the same things. Book shortages, crowded classes, flawed standardized testing systems, under-qualified teachers, and substandard conditions. Take this system into healthcare and you see hospitals being overcrowded, leading to people waiting longer for vital services or having to resort to lower quality healthcare since there are not enough good doctors to go around, so the government will probably be hiring bad ones just like they hire bad teachers. The problem here is that you're paying so much through taxation for what is basically a shoddy product that could be produced better and cheaper if it were left up to a competitive market. Healthcare is already fully regulated even before obamacare, and all of it has been made unaffordable by the government. The one area where the government doesn't touch, the optometrist area, is the only area the average person can afford because it's legal for private doctors to bid prices down. If you're a public sector doctor, you have to serve these people at these prices, which makes it less desirable to be a doctor. A little known fact is that the most regulated businesses are healthcare and education, and they are completely unaffordable. The least regulated industry:technology. Computers are arguably just as complex of a field as biology, but one is affordable to the average person and one isn't. It has nothing to do with the complexity of the product, but how it's being economically handled. If you were to switch the political thinking here and say \"Computers should just be given to all\", you wouldn't own an iphone 5 for 200 bucks, you'd own a windows 95 desktop for 5000 if you could even get it.", "1 simple example: Because Americans don't want entry-level cars like a Toyota Corolla to cost 54,000 USD$, such as in Denmark, among other things. 'Free' is not 'free,' all of these programs come through VAT taxes and exorbitant luxury taxes. And the government is woefully incompetent, would you trust your life with them? There are many a story of U.K. hospitals so inefficient that it takes their ambulances 1 hour to reach a home 10 minutes from A & E. Sure, my premium might cost a pretty penny, but at least I actually have competent care. And the costs will make up for themselves when comparing 7% sales tax to 20% VAT that is common in Europe.", "A lot of people dislike government control, and would rather pay for things themselves than have excessive taxes to cover it due to the inefficiencies that our government has. Almost all of our programs are more expensive per capita than the rest of the world, and it's usually not as good quality, so we don't have any faith free healthcare would be a very good idea. I am mixed on the idea of the government paying for all these things due to the track record. I'd rather see efforts for regulation to make it more affordable than to pay for it for people.", "America has been trained to hate communism and to view socialism as communism, despite being drastically different. Their government also encourages health insurance because that makes money for the companies providing it whereas tax dollars won't turn a profit. It's the same reason Cameron is desperate to privatise the NHS in Britain", "On one hand, Americans are right. public sponsored healthcare and education is definitely not free. They are paid by taxes, which are collected by government. Government is not very efficient in using money, so there is a lot of waste. On the other hand, the costs of healthcare and the costs of education are extremely high in the USA. Healthcare and Education in Europe are very, very good, equally good as in the USA. But the costs are much, much lower. For example, compare the costs of a doctor visit in the USA, with the cost of a doctor visit in Europe and you will find that a European doctor visit is much less expensive. Similarly compare the cost of a private school in Europe and a private school in the USA. Many times, a private school in Europe will be less expensive.", "I just want to add my two cents that this is a highly debatable topic, OP is worded in a way that presumes something is wrong with objecting to government provided health and education, both sides of the argument are being provided in the form of debate, and OP seems more interested in discussion than learning the other point of view. I don't think this is appropriate for an ELI5.", "Because many of us feel that it isn't moral to force one person to pay for things for another person, particularly if such things are not necessary or, in some instances, if they directly violate the moral code of the person paying (for instance, abortion services).", "The folks who are against equal health and education opportunities here (in my experience) are already getting those opportunities. It's easy to be smug, and think \"I got mine, what's their problem?\"", "Where will you get doctors and nurses to work for free? Or professors?" ]
[ [ "rather than by anticipated medical benefits in the U.S. makes its system more unproductive, with poor people avoiding preventive care and eventually using expensive emergency treatment. Ethicist Daniel Callahan has written that U.S. culture overly emphasizes individual autonomy rather than communitarian morals and that stops beneficial rationing by social value, which benefits everyone.\nSome argue that waiting lists result in great pain and suffering, but again evidence for this is unclear. In a recent survey of patients admitted to hospital in the UK from a waiting list or by planned appointment, only 10% reported they felt they should have been admitted", "-34.122837300237734" ], [ "the United States there is no universal access to healthcare free at the point of use. That is not to say that Western cultures have overlooked these rights entirely (the welfare states that exist in Western Europe are evidence of this). Similarly the ex Soviet bloc countries and Asian countries have tended to give priority to economic, social and cultural rights, but have often failed to provide civil and political rights.\nAnother categorization, offered by Karel Vasak, is that there are three generations of human rights: first-generation civil and political rights (right to life and political participation), second-generation economic, social and", "-32.698327276157215" ], [ "While People Feel Worse (2003), which explores people's perception of their own well-being. The book cites statistical data indicating that Americans are better off in terms of material goods and amount of free time but are not happier than before. Easterbrook argues that this has occurred due to choice anxiety (too many decisions to make) and abundance denial (not realizing how well we are doing). His proposed remedy is to make our lives more meaningful by doing good while living well.\nHis book Sonic Boom: Globalization at Mach Speed (2009) asserts that globalization has only just begun and is a", "-32.60189476472442" ], [ "more pain, dislocation, confusion and misery. In which case it might be wise for us as American citizens to consider calling a halt to the mass influx of even more millions of hungry, ignorant, unskilled, and culturally-morally-generically impoverished people. At least until we have brought our own affairs into order. Especially when these uninvited millions bring with them an alien mode of life which—let us be honest about this—is not appealing to the majority of Americans. Why not? Because we prefer democratic government, for one thing; because we still hope for an open, spacious, uncrowded, and beautiful—yes, beautiful!—society, for another.", "-32.56486879463773" ], [ "of Human Rights gives people specific economic rights and including \"Everyone has a right to a standard of living adequate for the health and well-being of himself and his family, including food, clothing, housing and medical care.\", which is violated by the international economic system we now have. Reviews Ruth Jack of The Kelvingrove Review states that Pogge's argument that world leaders not only allow the status quo to persist but actively and knowingly collude to maintain it for their own ends is not convincing while Pogge's statistical analysis of the depth of world poverty", "-32.375709298823494" ], [ "their own voice and revolt against systemic inequalities to take control of their lives and improve healthcare accessibility and affordability. On the contrary, nations that do not empower its citizens to be politically educated have way worse health outcomes than nations whose citizens are politically engaged. For instance, there has been a surge in mortality differentials and unwavering decline in health benefits coverage, especially among for the population living under poverty line. As stated in Global Health Promotion, over the last 10 years there has been a steady loss of health coverage for 1 million people every year. Losing health", "-31.809377209021477" ], [ "justice. Factors like capitalism, exploration of Indigenous lands all contribute to food insecurity for minorities and the people who are the most oppressed in various countries (women being one of these oppressed groups). Because girls and women are the most oppressed by the inequitable global economic processes that govern food systems and by global trends such as climate change, it is reflective of how institutions continue to place women in positions of disadvantage and impoverishment to make money and thrive on capitalizing the food system. When the government withholds food by raising its prices to amounts only privileged people can", "-31.778046844527125" ], [ "had to accept that teaching \"does not pay\". Galeano points out that it is counterintuitive to be financially unappreciative of those who are greatly involved in forming the next generation of workers and citizens. Racism, Sexism, and Poverty People are drawn to capitalism with the promise of choice, but as Galeano points out, those who are allowed to actually make those choices are limited often by money, gender, and race.\"This world, which puts on a banquet for all, then slams the door in the noses of so many, is simultaneously equalizing and unequal: equalizing in the ideas and habits it", "-31.635169857239816" ], [ "Academic, Rowman & Littlefield, Berg, Earthscan, Routledge, Prospect, and Equinox Publishing. Food insecurity and health outcomes In America, almost 50 million people are considered food insecure. This is because they do not have the means to buy healthy food, therefore, lead an unhealthy lifestyle. At least 1.4 times more children who are food insecure are likely to have asthma, compared to food-secure children. And older Americans who are food-insecure will tend to have limitations in their daily activities. When a household is lacking the means (money) to buy proper food, their health ultimately suffers. Supplemental Nutrition Assistance Program (SNAP, formerly", "-31.540975353331305" ], [ "the difficulties people have in picturing a society radically different from their own. It concludes that poverty would be better addressed by a laissez-faire society for many reasons, including the fact that unemployment is caused by the government, that untaxed businesses would have more profits to reinvest in productivity-enhancing technology, that private charities are more efficient than government, that parents would be more likely to avoid having excess children in the absence of social safety nets, etc. It argues that a plethora of choices in education would emerge in a free market. It also notes that the focus of media", "-31.529663220979273" ], [ "nutrition and health, and activism. Today, a growing number of individuals and minority groups are embracing the Food Justice due to the perceived increase in hunger within nations such as the United States as well as the amplified effect of food insecurity on many minority communities, particularly the Black and Latino communities.\nA number of organizations have either championed the Food Justice Cause or greatly impacted the Food Justice space. An example of a prominent organization within the food justice movement has been the Coalition of Immokalee Workers, which is a worker-based human rights organization that has been recognized globally for", "-31.35660345706856" ], [ "the terms of unequal human standards (applying lower standards to their Third World workers than to their First World ones). Furthermore, the argument goes that if people choose to work for low wages and in unsafe conditions because it is their only alternative to starvation or scavenging from garbage dumps (the \"preexisting options\"), this cannot be seen as any kind of \"free choice\" on their part. It also argued that if a company intends to sell its products in the First World, it should pay its workers by First World standards.\nFollowing such a view, some in the United States propose", "-31.282659973949194" ], [ "poverty and accessing health care are lower socioeconomic status. Although the Canada Health Act provides everyone with access to health care without financial obligation, people of lower socioeconomic status typically had lower education level and were less likely to seek medical advice from a health care professional. Other health risks associated with low income and low education are an increase in high risk behaviors leading to poor health including smoking, obesity, and substance abuse specifically alcohol. People of higher income have means to pay for resources which could improve health, such as weight loss programs, gym memberships, smoking", "-31.243024095260807" ], [ "believe that children and adults without health insurance have access to needed health care services at hospital emergency rooms, community health centers, or other safety net facilities offering charity care. Some observers note that there is a solid body of evidence showing that a substantial proportion of U.S. health care expenditures is directed toward care that is not effective and may sometimes even be harmful. At least for the insured population, spending more and using more health care services does not always yield better health outcomes or increase life expectancy.\nChildren in America are typically perceived as in good health relative", "-31.232533729682473" ], [ "is one of the fundamental rights of every human being. Amartya K. Sen, a feminist economist, adds to that as he said that health is among the most important conditions of human life and a critically significant constituent of human capabilities which we have reason to value. It has been found that healthier nations, or those with a greater life expectancy and lower infant mortality, see greater economic growth and prosperity. The argument has also been made the other way that economic growth contributes to healthier nations. It is not just the overall availability of resources that improves health, but", "-31.216975450632162" ], [ "Inclusion (disability rights) Barriers to inclusion in the U.S. Our society is equipped for those without disabilities. This resistance to inclusion in the United States may be that the older architecture of its more prominent cities makes structural adjustment for disabled people costly and supposedly impractical, leading indirectly to a high measure of hostility towards disabled people lest they end up feeling 'entitled' to receive such adjustments automatically and unquestionably.\nOthers tend to blame the attitude of Social Darwinism more generally, accusing it of corrupting the attitude of able-bodied people in the US in particular towards disabled people—often to the point", "-31.10291563993087" ], [ "contributes to health inequalities based on gender, socioeconomic status and race/ethnicity. As Wright and Perry assert, \"social status differences in health care are a primary mechanism of health inequalities\". In the United States, over 48 million people are without medical care coverage. This means that almost one sixth of the population is without health insurance, mostly people belonging to the lower classes of society.\nWhile universal access to health care may not completely eliminate health inequalities, it has been shown that it greatly reduces them. In this context, privatization gives individuals the 'power' to purchase their own health care (through private", "-30.91482020667172" ], [ "care and provides its financing.\" Still others say the term has no meaning at all.\nIn more recent times, the term has gained a more positive reappraisal. Documentary movie maker Michael Moore in his documentary Sicko pointed out that Americans do not talk about public libraries or the police or the fire department as being \"socialized\" and do not have negative opinions of these. Media personalities such as Oprah Winfrey have also weighed in behind the concept of public involvement in healthcare. A 2008 poll indicates that Americans are sharply divided when asked about their views of the expression socialized medicine,", "-30.74747255188413" ], [ "serious illnesses, and are disadvantaged especially in cases of incurable illnesses like AIDS where constant medicating with expensive, non-subsidized drugs is the only way to sustain a normal life.\nThose born into a lower class are at a higher risk of suffering from illness. In the past, the poor suffered from hunger and starvation. However, in high-income countries like the U.S, the opposite is true. Food-insecure families are the most prone to high rates of obesity, especially in children. This can be attributed to the generally higher cost of healthful foods, and a lack of education regarding healthy eating habits, causing", "-30.608965166844428" ], [ "with people having jobs to make a living for themselves, which goes into food and nourishment. Psychology and Disorders Eating disorders are also symbolic with the sociology of food. They represent how control (or lack thereof) someone can have over themselves about one of the things they need to live. Eating disorders do not limit themselves to anorexia. These disorders include bulimia and binge eating as well. Some people often use food a comfort, or even a reward. Or in other cases they see food as a negative thing to avoid, even though they need it for survival. The relationships", "-30.59578618197702" ], [ "meet. People have a right to food and an adequate standard of living. These are human rights the government is obliged to ensure under international treaties it has signed.\"\nAccording to the Human Rights Watch May 2019 report, due to government cuts in welfare in the past years, ten thousands of families in the UK do not have enough food for survival and turn towards sources of non-state charitable aid each year. “The way the UK government has handled its reduction in welfare spending has left parents unable to feed their children in the fifth-largest economy in the world. The UK", "-30.573081421112875" ], [ "believes society has the technology and resources to provide adequate food, housing, education, and healthcare for everyone, using only a fraction of available labor and resources. In his view, this implies it is possible to put an end to wage slavery. Buchheit further stated:\nI don't have to work. I choose to work. And I believe everyone deserves the same freedom I have. If done right, it's also economically superior, meaning we will all have more wealth. We often talk about how brilliant or visionary Steve Jobs was, but there are probably millions of people just as brilliant as he was.", "-30.568832120567095" ], [ "and enjoy life, there cannot be \"overpopulation\". At most, one could say that there are too many people living in a particular area. Even so, people can get used to living with remarkably little personal space.\nThe counter-argument is that in many poor countries people get far more children than they can reasonably feed, support and provide with a decent life under the circumstances. If people had fewer children with the aid of contraception, then it would put much less pressure on already scarce resources and enable a better life for the living. Consent In the social welfare area, there are", "-30.505788337322883" ], [ "claim...\"\nIt has taught us how to live, what to be afraid of, what to be proud of, how to be beautiful, how to be loved, how to be envied, how to be successful.. Is it any wonder that the American population tends increasingly to speak, think, feel in terms of this jabberwocky? That the stimuli of art, science, religion are progressively expelled to the periphery of American life to become marginal values, cultivated by marginal people on marginal time?\" Culture and sports Performances, exhibitions, shows, concerts, conventions and most other events can hardly take place without sponsoring. Artists", "-30.491060285712592" ], [ "the inability of the low income group to verbalize concepts.\nA psychologist has stated that society stigmatizes poverty. Conversely, poor people tend to believe that the wealthy have been lucky or have earned their money through illegal means. She believes that both attitudes need to be discarded if the nation is to make headway in addressing the issue of inequality. She suggests that college not be a litmus test of success; that valorizing of one profession as more important than another is a problem. Skill-biased technological change As of the mid- to late- decade of the 2000s, the most common explanation", "-30.40974216846371" ], [ "from hunger and from the fear of violence, oppression and injustice, including democratic and participatory governance based on the will of the people. 2) equality, no individual or nation must be denied the opportunity to benefit from development. 3) solidarity, global inequities must be managed to distribute costs and burdens fairly in accordance with the principles of equity and social justice, while those who benefit least deserve help from those who benefit most. 4) tolerance, differences within and between societies should not be feared or repressed, but cherished as a precious asset of humanity, while cultures of peace and", "-30.378562403842807" ], [ "brought to them. When more people are literate ...The right of freedom of expression can really only be relevant if people are not too hungry, or too tired to be able to express themselves. It can only be relevant if appropriate grassroots mechanisms rooted in the people exist, through which the people can effectively participate. ...We talk about the human rights that the majority has never been able to enjoy, ... to a job, to decent housing, to a good meal. ...These human rights have been the human rights for a small minority over the years in the Caribbean and", "-30.293327029561624" ], [ "The obesity epidemic that has spread across America also is a great example on how food shapes society and they way people live, along with the evolution of the type of food Americans consume. Due to the busy manic lives that many Americans have, fast food and prepackaged foods with higher calories have gained popularity and have become mainstream in American consumption. The environment in which people with certain socioeconomic backgrounds live also heavily affect the type of food they consume. High calorie and low nutritional food tend to be less expensive and are easier to access. Thus, when", "-30.274380444083363" ], [ "sameness of the notion of 'the people'. Lack of effectiveness One argument often made by the opponents of the anti-globalization movement (especially by The Economist), is that one of the major causes of poverty amongst third-world farmers are the trade barriers put up by rich nations and poor nations alike. The WTO is an organization set up to work towards removing those trade barriers. Therefore, it is argued, people really concerned about the plight of the third world should actually be encouraging free trade, rather than attempting to fight it. Specifically, commodities such as sugar are heavily distorted by subsidies", "-30.186573655693792" ], [ "from oppression, where we can live peaceably with our neighbours, on a sustainable earth, with decent work, a long life and a first-rate health care system to tend for us when our health falters. The big question was: how do we get there? How do we bequeath a better world for our children?\nThe 2007 AFOI was dedicated to eminent jurist, Royal Commissioner, Elliott Johnston QC. 2005: \"What is to be Done?\" 7 - 10 July 2005\nIn a disconcerting age, the 2005 AFOI tested the belief that we can, and should, design our own world, with the majority of sessions explicitly", "-30.17299068509601" ], [ " People are completely left alone as the government does not believe in social programs. Everything is privatized, so schools and hospitals are closed to those who cannot pay for them. Freedom arises in that people are free to do whatever they like without interference from the government.\nThe market, as once stated by Steven Lukes, reproduces and creates inequalities. This is shown in Libertaria through the difficulties people have living in society. The entire state is built on the privatization and trade of various programs and industries on the stock market. Due to this, it", "-30.159394592250464" ], [ "reports and resources as well support services. United States of America (US) The historical relationships in the United States between privileged and marginalized communities' play a major role in the administering of unequal and inadequate education to these socially excluded communities. The belief that certain communities in the United States were inferior in comparison to others has allowed these disadvantages to foster into the great magnitude of educational inequality that we see apparent today.\nFor African Americans, deliberate systematic education oppression dates back to enslavement, more specifically 1740. In 1740, North Carolina passed legislation that prohibited slave education. While the original", "-30.106953742200858" ], [ "question the fairness of what they feel amount to subsidies for having children, such as the Earned Income Tax Credit (US), free K–12 education paid for by all taxpayers, family medical leave, and other such programs.\nOthers, however, do not believe overpopulation to be a problem in itself; regarding such problems as overcrowding, global warming, and straining food supplies to be problems of public policy and/or technology.\nSome have argued that this sort of conscientiousness is self-eliminating (assuming it is heritable), so by avoiding reproduction for ethical reasons the childfree will only aid deterioration of concern for the environment and future generations.", "-30.066163905808935" ], [ "status. The general economic well being of the society the person lives in also tends to be another factor in their status and to what extent they are able to achieve their status.\nFor example, Americans are less likely than people in other industrialized nations to object to current income variances. According to Rodney Stark, in 1992, only twenty-seven percent of Americans strongly agreed that income disparities in their country were too large. In contrast, more than half of Russians, Italians, and Bulgarians agreed with this statement. In stratification systems around the world In all societies a person's social status", "-29.966422373894602" ], [ "to hear that poor Americans should need to rely on a charity that was originally conceived to treat people in the developing world.” System efficiency and equity Variations in the efficiency of health care delivery can cause variations in outcomes. The Dartmouth Atlas Project, for instance, reported that, for over 20 years, marked variations in how medical resources are distributed and used in the United States were accompanied by marked variations in outcomes. The willingness of physicians to work in an area varies with the income of the area and the amenities it offers, a situation aggravated by a general", "-29.912061090755742" ], [ "important for Social\nWorkers to be aware of, because this philosophy fosters empowerment. Our role as\nSocial Workers is not to simply provide services, but to help others develop positive\nself-esteem.\nAnother example of this was Howard Zinn's \"A People's History of America\".\nZinn believed that the dominant narrative being taught in schools was excluding\nthe voice and contributions of marginalized populations. While looking for ways to\nincorporate people's education, one tool that exists is the Zinn Education Project.\nOn this website educators can find critical resources which focus on the voices of\noppressed and marginalized groups. This website contains hundreds of resources\nfree of charge. Using tools such", "-29.898621071130037" ], [ "an antipathy towards the acquisition of knowledge as being outside their class and therefore undesirable, perpetuating their presence in the working class. Health and nutrition A person's social class has a significant impact on their physical health, their ability to receive adequate medical care and nutrition and their life expectancy.\nLower-class people experience a wide array of health problems as a result of their economic status. They are unable to use health care as often and when they do it is of lower quality, even though they generally tend to experience a much higher rate of health issues. Lower-class families have", "-29.77278032535105" ], [ "\"We leave not with the pleasantly dry feeling of having our minds made up, but of being awash in doubt: Should justice be more about punishment or reform? Can we call ourselves a free country when people who have served their time are marked forever with a scarlet letter? Are there crimes which are so abhorrent that reform is impossible?... Hands down, the bravest show currently playing in New York“. New York Times \"America Is Hard to See... arrives at an awkward time to ask for sympathy for these men: a moment when the culture is talking avidly about sexual", "-29.750735473120585" ], [ "at all, if I had been like everyone else. Many people say that it doesn't matter, you can cheat sometimes. But I can't do that. You can't be a little bit sustainable. Either you're sustainable, or not sustainable. For way too long the politicians and people in power have got away with not doing anything at all to fight the climate crisis and ecological crisis, but we will make sure that they will not get away with it any longer.\nAdditionally, media speculation of contemporary figures as being on the autism spectrum has become popular in recent times. New York", "-29.723468861426227" ], [ "more likely they are to report symptoms of depression.” While children used to spend their free time outdoors with others, with the advancement of technology, this free time is seemingly now being spent more on mobile devices.\nPsychologist Nancy Colier has argued that people have lost sight of what is truly important to them in life. She says that people have become \"disconnected from what really matters, from what makes us feel nourished and grounded as human beings.\" People's addiction to technology has deterred neurological and relationship development because tech is being introduced to people at a very young age. People", "-29.714722428965615" ], [ "of living adequate for the health and well-being of oneself and one's family, including food, clothing, housing, and medical care.\" In addition, the Principles of Medical Ethics of the American Medical Association require medical doctors to respect the human rights of the patient, including that of providing medical treatment when it is needed. Americans' rights in health care are regulated by the US Patients' Bill of Rights.\nUnlike most other industrialized nations, the United States does not offer most of its citizens subsidized health care. The United States Medicaid program provides subsidized coverage to some categories of individuals and families with", "-29.69385880266782" ], [ "more than once that the public welfare may call upon the best citizens for their lives. It would be strange if it could not call upon those who already sap the strength of the State for these lesser sacrifices, often not felt to be such by those concerned, in order to prevent our being swamped with incompetence. It is better for all the world, if instead of waiting to execute degenerate offspring for crime, or to let them starve for their imbecility, society can prevent those who are manifestly unfit from continuing their kind. The principle that sustains compulsory vaccination", "-29.691658705618465" ], [ "consumption is a socio-economic behaviour common to the poor social-classes and economic groups, and common to the societies of countries with emerging economies. Among such people, displays of wealth are used to psychologically combat the impression of poverty, usually because such men and women belong to a socio-economic class society perceives as poor. In The Millionaire Next Door: The Surprising Secrets of America's Wealthy (1996), Thomas J. Stanley and William D. Danko reported that Americans with a net worth of more than one million dollars are likely to avoid conspicuous consumption, and that millionaires tend to practice frugality - for", "-29.68032177281566" ], [ "socialized medicine because they say it will lead to health care rationing by denial of coverage, denial of access, and use of waiting lists, but often do so without acknowledging coverage denial, lack of access and waiting lists exist in the U.S. health care system currently or that waiting lists in the U.S. are sometimes longer than the waiting lists in countries with socialized medicine. Proponents of the reform proposal point out a public insurer is not akin to a socialized medicine system because it will have to negotiate rates with the medical industry just as other insurers do and", "-29.65093230063212" ], [ "is poverty and AIDS, where human beings are being oppressed, there is more work to be done…”\n“I know that thanks to who we are and our action we are building a force for change that will be the future of humanity.”", "-29.62856853211997" ], [ "for a civilized and valid society. For example, lower divorce rates, decreasing the incidence of sexually transmitted diseases, and controlling crime are all desirable.\nOthers answer that these so-called problems are themselves outcomes of the very repressiveness that seeks to eliminate them. It is believed that citizens enjoying free thinking, speaking, and acting without coercion or recusancy, have contributed to a society where freethinkers thrive, that is, without having to fear repression through intolerance and injustice. \nPermissive society ultimately comes down to a question of if a given individual has enough capacity to make their own decisions, that is, intellectual independence;", "-29.58233815152198" ], [ "for people to deal with their problems. At least one comprehensive study refutes this idea. Research has found that secular democracies like France or Scandinavia outperform more theistic democracies on various measures of societal health. The authors explains, \"Pressing questions include the reasons, whether theistic or non-theistic, that the exceptionally wealthy U.S. is so inefficient that it is experiencing a much higher degree of societal distress than are less religious, less wealthy prosperous democracies. Conversely, how do the latter achieve superior societal health while having little in the way of the religious values or institutions?\" Law and religion Vogel reports", "-29.488382292271126" ], [ "century are increasingly being universalized across nations and governments. This is the result of many factors, including the Universal Declaration of Human Rights by the United Nations in 1948, the aftermath of World War II and the Holocaust and growing sentiments towards legitimizing marginalized peoples (e.g., pre-industrialized peoples found in the jungles of Brazil and Borneo). Couple this with growing awareness of our impact on the environment, and there is the rising feeling that citizen rights may extend to include the right to dignity and self-determination. If national citizenship does not foster these new rights, then global citizenship may seem", "-29.46206150308717" ], [ "don't believe that American society offers \"equal opportunities\" for social mobility are less averse to redistribution.", "-29.441348755266517" ], [ "equal opportunity to engage in societal dialogue no matter the social class, wealth, education, etc. A person without an education cannot effectively contribute to the modern world. Education teaches skills, ethics, and values which are required to lead a responsible citizen. Education also distinguishes from ignorance and allows a person to face challenges of the modern world. There are many benefits to an inclusive educational system, such as all children form a sense of belonging in their community, encourages parents to participate in their child's education, and allows children to accept individual differences, among children their age. Youth instability Nigeria's", "-29.412514008989092" ], [ "nation's soul that will never be cleansed. It is just as wrong as wrong can be, a huge sin, and it is on our soul. There's a second sin that's almost as great and that's emancipation . . . There should have been a huge program for schools. There should have been all kinds of employment provided for them. Not modern welfare, you can't expect that in the middle of the nineteenth century, but there should have been some earnest effort to prepare these people for citizenship. They were not prepared, and operated under horrible disadvantages once the army was", "-29.357230766967405" ], [ "Health freedom movement Roots and support base Health freedom is a libertarian position but not aligned on the left/right political axis. Libertarian Ron Paul introduced the Health Freedom Protection Act in the U.S. Congress in 2005.\nProminent celebrity supporters of the movement include the musician Sir Paul McCartney, who says that people \"have a right to buy legitimate health food supplements\" and that \"this right is now clearly under threat,\" and the pop star/actress Billie Piper, who joined a march in London in 2003 to protest planned EU legislation to ban high dosage vitamin supplements. United States The Dietary Supplement Health", "-29.32815475272946" ], [ "insurance and is less likely to have access to a hospital or clinic. As a result, this lack of access to adequate health care is an example of economic status; the interaction of income with race and sex. Reproductive freedom Minority women are likely of not knowing how to access information, health care, and family planning techniques that educate them with reproductive freedom. Due to the disproportionate presence of minority women, among poorer groups, depend on Federally funded health care. The restrictions on Medicaid funding abortion, has led to an increase of deaths and injuries from illegal or self-induced abortions.", "-29.3184895307204" ], [ "a premium on education because of the limited socioeconomic opportunities they experienced in their native countries. Consequently, they often allocate more resources towards it.\nThis pushing of second generation African immigrants by their parents has proven to be the key factor in their success, and a combination of family support and the emphasis of family unit has given these citizens social and psychological stability which makes them strive even further for success in many aspects of their daily life and society.\nMany of these American groups have thus transplanted high cultural emphasis on education and work ethic into their cultures which can", "-29.293227239206317" ], [ "politician declares that the United States has the best health care system in the world today, he or she looks clueless rather than patriotic or authoritative.\n\nTo many, the specialness of health care meant that cost should not be a consideration in care. Ethical physicians could and should not consider money in deciding what they should do for sick patients. Patients were to receive whatever services they needed, regardless of its cost. Reasoning based on cost has been strenuously resisted; it violated the Hippocratic Oath, was associated with rationing, and derided as putting a price on life, akin to the economist", "-29.28424653178081" ], [ "right to life obliges States to provide them with sufficient food for their survival. Agreed-upon food standards Regarding the right to food, the international community also specified commonly agreed on standards, such as in the 1974 World Food Conference, the 1974 International Undertaking on World Food Security, the 1977 Standard Minimum Rules for the Treatment of Prisoners, the 1986 Declaration on the Right to Development, the ECOSOC Resolution 1987/90, the 1992 Rio Declaration on Environment and Development, and the 1996 Istanbul Declaration on Human Settlements. Negative or positive right There is a traditional distinction between two types of human rights.", "-29.2763606957742" ], [ "seeking to guarantee privileges in exchange for votes. About the people of the country, he explains that \"people do not care about the amount of holidays because it is one more lazy day for a people who idolizes sloth.\"\nConstantino cites Martin Luther King as an example, to have quoted that \"it's my dream that my four children would one day live in a nation where they would not be judged by the color of their skin, but by the content of character\", and that, in Brazil, has been going the opposite: people would be taking advantage of his black condition", "-29.273832198232412" ], [ "had equal access to housing. When urban schools do a poor job of educating their Latino/a and Black students, this benefits Whites in the sense that it unjustly advantages them in the competition for higher levels of education and jobs. Whites in general cannot avoid benefiting from the historical legacy of racial discrimination and oppression. So unjust enrichment is almost never absent from the life situation of Whites. Spared injustice In Blum's analysis of the underlying structure of white privilege, \"spared injustice\" is when a person of color suffers an unjust treatment while a white person does not. His example", "-29.221241858962458" ], [ "the 19th century, education in the United States has been geared toward producing citizens who can effectively contribute to a capitalistic society, with a cultural premium on efficiency and science. More agrarian cultures, for example, do not even use learning ability as a measure of adult adequacy, whereas the diagnosis of learning disabilities is prevalent in Western capitalistic societies because of the high value placed on speed, literacy, and numeracy in both the labor force and school system. In the bigger picture, these points demonstrate how the label of disability is socially constructed and represents a lack of fit between", "-29.183229303045664" ], [ "health-damaging experiences is not in any sense a 'natural' phenomenon but is the result of a toxic combination of poor social policies, unfair economic arrangements [where the already well-off and healthy become even richer and the poor who are already more likely to be ill become even poorer], and bad politics.\" International health inequalities Even in the wealthiest countries, there are health inequalities between the rich and the poor. Researchers Labonte and Schrecker from the Department of Epidemiology and Community Medicine at the University of Ottawa emphasize that globalization is key to understanding the social determinants of health, and as", "-29.130649059497955" ], [ "as a whole because it produces entitled kids who have no sense of responsibility, hard work, or accountability and likely will not be the kind of citizens who will contribute in a meaningful way to society. Furthermore, such children will find it difficult to succeed in a work environment where qualities such as responsibility, hard work, and accountability are still highly valued.", "-29.121516134007834" ], [ "rights instruments affirms that \"extreme poverty and social exclusion constitute a violation of human dignity and that urgent steps are necessary to achieve better knowledge of extreme poverty and its causes, including those related to the program of development, in order to promote the human rights of the poorest, and to put an end to extreme poverty and social exclusion and promote the enjoyment of the fruits of social progress. It is essential for States to foster participation by the poorest people in the decision making process by the community in which they live, the promotion of human rights and", "-29.089334956137463" ], [ "these areas, and in employment rights, and in many others, we see that where inequality and profound injustice seem entrenched, insurmountable, it leads to instability in our society: divisions between peoples and vulnerability to the populism that stirs hatred between different ethnicities and religious groups, the rise of ancient demons of racism, antisemitism, Islamophobia and xenophobia. Universal Credit Welby maintains Universal Credit is harming poor people and its rollout should be stopped. Welby said:\nIt [Universal Credit] was supposed to make it simpler and more efficient. It has not done that. It has left too many people worse off, putting", "-29.073977865977213" ], [ "educating children will ultimately compel the betterment of society holistically. Paine insists a proactive social welfare system that educates the country's youth, will act as a preventive measure, and engender greater knowledge amongst the population. He explains that poor children and young people are typically deprived of equal access to education. Poor children coming from poor families are often forced to seek apprenticeships and work, and are thus subsequently robbed of the ability to pursue education. Poverty then, becomes cyclical in nature and undoubtedly increases with time. Lack of education amongst the young population,", "-29.07353331457125" ], [ "longer hope to reach Hispanics, African Americans and other minority groups – we need to just do it. Embracing cultures and lifestyles will make us a better party and better leaders. This desire for inclusiveness is near and dear to my heart ... Last week, the American people made a choice and this week, if we choose to call ourselves leaders, if we truly endeavor to serve with a servant's heart for the people who count on us, then we too must work together, listen to one another and learn from the leaders who made the kind of history the American", "-29.064835396886338" ], [ "of food, can be beneficial to health in certain situations. Self-denial is sometimes related to inhibitory control and emotional self-regulation, the positives of which are dealt with in those articles. As people grow accustomed to material goods they often experience hedonic adaptation, whereby they get used to the finer things and are less inclined to savor daily pleasures. Scarcity can lead people to focus on enjoying an experience more deeply, which increases happiness. Negative effects Others argue self-denial involves avoidance and holding back of happiness and pleasurable experiences from oneself that is only damaging to other people. Some argue it", "-29.061613594596565" ], [ "also exists in institutions aside from the government such as religion, education, and marriage among many other. Routines that encourage the selection of one individual over another, for instance in an employment situation, is a form of institutionalized discrimination. The phenomenon occurs unintentionally at times.\nThomas Shapiro’s The Hidden Cost of Being African American addresses many of the problems faced by African Americans in the United States and how their current social and economic situations compare to one another. These issues include the racial wealth gap between blacks and whites, assets, and education. Housing in the United States is valued differently", "-29.057017643420295" ], [ "that even if typical students are harmed academically by the full inclusion of certain students with exceptionalities, that the non-inclusion of these students would still be morally unacceptable, as advocates believe that the harm to typical students' education is always less important than the social harm caused by making people with disabilities less visible in society.\nA second key argument is that everybody benefits from inclusion. Advocates say that there are many children and young people who don't fit in (or feel as though they don't), and that a school that fully includes all disabled students feels welcoming to all. Moreover,", "-29.055240632151254" ], [ "If I'm right, no one will remember.\nMorality is cheap when someone else is paying.\nLaws alone is not enough to ensure that freedom is safeguarded. What is required is a spirit of freedom among the people concerned. There must be an atmosphere of respect, a feeling of belonging together, an atmosphere of harmony with fellow beings.\nWe are a country with a people who are removing the shackles of apartheid and will create a just economic system and a true democracy.\nIt is important that in the process of change, existing institutions of value and means of production are not destroyed. The fabric", "-29.045015185314696" ], [ "which the poor enjoy with the rich in his own country.\"—Thomas Jefferson to John Banister, Jr., 1785. ME 5:186, Papers 8:636\n\"Although I do not, with some enthusiasts, believe that the human condition will ever advance to such a state of perfection as that there shall no longer be pain or vice in the world, yet I believe it susceptible of much improvement, and most of all in matters of government and religion; and that the diffusion of knowledge among the people is to be the instrument by which it is to be effected.\"—Thomas Jefferson to Pierre Samuel Dupont de Nemours,", "-29.034438646165654" ], [ "changing world, is a fundamental human right. (...) There are millions, the majority of whom are women, who lack opportunities to learn or who have insufficient skills to be able to assert this right. The challenge is to enable them to do so. This will often imply the creation of preconditions for learning through awareness raising and empowerment. Literacy is also a catalyst for participation in social, cultural, political and economic activities, and for learning throughout life’. U.S. public library efforts to promote literacy The public library has long been a force promoting literacy in many countries. In the U.S.", "-29.017860072897747" ], [ "mobility, plays a key role in attracting immigrants. Whether this perception is realistic has been a topic of debate. While mainstream culture holds that the United States is a classless society, scholars identify significant differences between the country's social classes, affecting socialization, language, and values. Americans' self-images, social viewpoints, and cultural expectations are associated with their occupations to an unusually close degree. While Americans tend greatly to value socioeconomic achievement, being ordinary or average is generally seen as a positive attribute. Food Mainstream American cuisine is similar to that in other Western countries. Wheat is the primary cereal grain with", "-28.992246374022216" ], [ "disproportionately damage the health of the less educated and less wealthy, and that the net effect on the nation's health has already proved negative.\"\nShe concluded that most patients are unable to make critical decisions about their health care in the consumer-driven model. Some people, called \"monitors,\" track down detailed information, while other people, called \"blunters,\" don't want information. One blunter, a theoretical physicist, said he would be \"insulted\" if someone read 15 papers on theoretical physics and asked him to help design an experiment; he pays his doctor to explain his choices. A \"monitor,\" a lawyer, applied her legal research", "-28.983089181710966" ], [ "heightened awareness of current barriers, wider use of assistive technologies that can make workplaces and tasks more accessible, more accommodating job development, and most importantly deconstructing discrimination.\nCreating inclusive employment that better facilitates the participation of individuals with disabilities is demonstrated to have a significantly positive impact on not only the lives of these individuals, but also the economies of nations who implement such measures. The International Labour Organization estimates that the current exclusion of employable individuals with special needs is costing countries possible gains of 1 to 7 percent of their GDP. Implications The relationship between disability and poverty is", "-28.977096093120053" ], [ "in 2018 such as with the creation of the Religious Liberty Task Force in July of that year. In addition, many providers and practitioners in the United States are only beginning to realize that the institution of mental healthcare lacks knowledge and competence of many non-Western cultures, leaving providers in the United States ill-equipped to treat patients from different cultures. Emotional improvement Unemployment has been shown to have a negative impact on an individual's emotional well-being, self-esteem and more broadly their mental health. Increasing unemployment has been shown to have a significant impact on mental health, predominantly depressive disorders. This", "-28.948499041805917" ], [ "and sanitation as a human right.\n\"Social issues\" as referred to in the United States also include topics (also known as \"causes\") intended by their advocates to advance certain ideals (such as equality) include: civil rights, LGBT rights, women's rights, environmentalism, and veganism. Transnational advocacy Advocates and advocacy groups represent a wide range of categories and support several issues as listed on worldadvocacy.com. The Advocacy Institute, a US-based global organization, is dedicated to strengthening the capacity of political, social, and economic justice advocates to influence and change public policy.\nThe phenomenon of globalization draws a special attention to advocacy beyond countries’", "-28.918092207284644" ], [ "when you talk about socialized health care: absolutely, that’s a no-brainer. Free universities: absolutely, that’s a no-brainer. So, in the definition, I guess those are leaning toward socialist politics. To me, it’s common sense. Charity work Sutherland is a member of a Canadian charity Artists Against Racism.", "-28.89350276661571" ], [ "Regional variation Some claim that Americans live in an \"extraverted society\" that rewards extravert behavior and rejects introversion. This is because the US is currently a culture of external personality, whereas in some other cultures people are valued for their \"inner selves and their moral rectitude\". \nOther cultures, such as Japan, China and regions where Orthodox Christianity, Buddhism, Sufism etc. prevail, prize introversion. These cultural differences predict individuals' happiness in that people who score higher in extraversion are happier, on average, in particularly extraverted cultures and vice versa.\nResearchers have found that people who live on islands tend to be", "-28.88894881703891" ], [ "prominent include ethical consumption and political consumerism, while sustainable consumption, more linked with policy, has also increased in usage.\nOften consumer and citizen are considered as different because consumers only show self-interest, whereas citizens denote expanded self-interest. The general idea is that, consumers ‘buy what they want—or what they have been persuaded to want—within the limits of what they can get. Citizenship, on the other hand, carries duties or responsibilities along with various rights. Since consumers are seen also as citizens they have to behave in a community-oriented, moral and political way, rather than as a self-interested one. Political use of", "-28.873525072820485" ], [ "sense, imagination and thought, emotions, practical reason, affiliation, other species, play, and control over one’s environment (both political and material). Nutrition affects bodily health and bodily integrity, and education has broader connections to sense, imagination and thought, practical reason, and control over one’s environment. Without these capabilities, according to Nussbaum, people fall into poverty traps and lack the proper opportunities to rise out of them. Government efforts such as meal programs can prevent people from falling into poverty, as well as lift them out of it. Pre-World War II Before the official establishment of the large-scale, government-funded food programs that", "-28.870157815283164" ], [ "two factors results in the spread of diseases amongst the poor whom cannot afford better healthcare. Also, one cannot deny that a healthy and well-fed citizen is better suited for increased productivity as part of the workforce. Thus, poverty matters because it affects the social welfare of citizens.", "-28.835077405907214" ], [ "really I think the worst thing that has happened in this nation since slavery ... And it is in a way, it is slavery in a way, because it is making all of us subservient to the government, and it was never about health care. It was about control.\" As an alternative to the Affordable Care Act, Carson said in 2013: \"Here's my solution. When a person is born, give him a birth certificate, an electronic medical record and a health savings account.\" In arguing that the Affordable Care Act gave the government \"control of the people,\" Carson several times", "-28.826031122007407" ], [ "believed that in contemporary societies, \"It is in the schools and from the mass media, rather than at home or from their friends, that the mass of our citizens in all classes learn that life is inevitably routine, depersonalized, venally graded; that it is best to toe the mark and shut up; that there is no place for spontaneity, open sexuality and free spirit. Trained in the schools they go on to the same quality of jobs, culture and politics. This is education, miseducation socializing to the national norms and regimenting to the nation's 'needs.'\"\nGoodman thought that a person's most", "-28.799110941145045" ], [ "higher earnings and are less likely to be in poverty than first generation immigrants, some of whom lack formal legal status. Thus, the unequal access to employment opportunities can generate inequality among family members of different legal statuses. Social benefits Citizens of the United States are entitled to a host of social benefits. Government programs such as Food Stamps and Medicaid can provide support for low-income families. However, children who are U.S. citizens may not always be able to fully enjoy these benefits. Immigrant parents with limited English language ability may be unaware they are eligible for such benefits, or", "-28.791245145141147" ], [ "Our lives were joyful.\"\nCivil rights activist Urvashi Vaid writes in the book, \"The only reason big changes happen is when people like you and me decide to fight for things to change, when we take action to make things different. ... Social activism is all about optimism, even when you lose. The process of doing something about it all ... makes you feel better, like a sweaty dance to music you love.\" Medical student Jake Kleinman contributed an essay, \"From Scared to Proud: The Journey of a Gay Medical Student\", about his experiences which led to his decision to come", "-28.788512199447723" ], [ "but it has failed to alleviate poverty in the country. The philosophy of integral humanism, like Gandhism, opposes unbridled consumerism, since such an ideology is alien to Indian culture. This traditional culture stresses putting restraints on one's desires and advocates contentment rather than ruthless pursuit of material wealth.", "-28.73756680623046" ], [ "benefit them. For example, many Americans rely on a social and sometimes even financial inheritance from previous generations. She argues that this inheritance is unlikely to be forthcoming if one's ancestors were slaves, and privileges whiteness, maleness, and heterosexuality.\nThere are concerns that majority groups use color-blindness as a means of avoiding the discussion of racism and discrimination. Color-blindness can be seen as a way to undermine the hardships of minority groups, as it used to argue that the United States is a meritocracy, in which people that succeed because they work hard not because of their privilege. Critics of this", "-28.69393731537275" ], [ "answers some of these questions in concrete settings.\nSocial injustices occur when there is a preventable difference in health states among a population of people. These social injustices take the form of health inequities when negative health states such as malnourishment, and infectious diseases are more prevalent in impoverished nations. These negative health states can often be prevented by providing social and economic structures such as primary healthcare which ensures the general population has equal access to health care services regardless of income level, gender, education or any other stratifying factors. Integrating social justice with health inherently reflects the social determinants", "-28.69035355420783" ], [ "individuals enjoy comparatively high levels of objective and subjective wellbeing due to socioeconomic status. It has been noted that to live within environmental limits, there is a need to make changes to the comfortable aspects of Western lifestyles, for example, reducing meat consumption, the use of airplanes, and use of electronic gadgets with short life-spans. Western cultural norms associate meat consumption with wealth, status and luxury, and meat consumption per capita in the richest 15 nations of the world is 750% higher than in the poorest 24 nations. A shift in values may be difficult, as people’s life goals are", "-28.688498509611236" ], [ "in Africa have improved and honoured themselves, can they collectively rise above all prejudices and stereotypes ensuring freedom, peace and prosperity for future generations. Views on education Michel Ngue-Awane thinks that education plays a key role in the fabric of the society and argues that individuals will never discover their true purpose in life if they fail to understand their inner self. Education should therefore help individuals to know who they truly are so that they can pursuit their own agenda in life, but when they fail to understand this, they end up studying and living other people’s life.\nHe conclude", "-28.6601106460148" ], [ "class has declined for macro-economic reasons. By causing persons to blame individuals solely for their misfortunes, the three individualistic ideologies perpetuate systems of inequality. The same ideologies can also fuel selfish behaviors. Persons embracing individualistic ideologies may become preoccupied with attaining wealth, full self-reliance, and/or high self-esteem at the expense of altruism, healthy marriages, and the development of deep social bonds, which are assumed to be self-evident virtues. Greene concluded that Americans are too individualistic in the \"wrong\" ways (preoccupied with attaining individual wealth, full self-reliance, and high self-esteem), while not being individualistic enough in the \"right\"", "-28.657959136660793" ], [ "themselves. This realization can lead to empathizing with others. Learning to understand the needs and motivations of others, especially those who live different lives from our own, is an important part of living a productive life. This leads to a view of humanity that can help a person stay free of biased opinions of others and can lead to a more diverse and ultimately more productive and thought provoking life. Choosing the right strategy As pointed out by de Tocqueville, America, in sharp contrast with other developed countries, has had a formidable ability to form associations. Civilians have a desire", "-28.65457494574366" ], [ "sacrifice their personal well-being for the \"price\" of having children. Freedom and control There is a significant correlation between feeling in control of one's own life and happiness levels.\nA study conducted at the University of Zurich suggested that democracy and federalism bring well-being to individuals. It concluded that the more direct political participation possibilities available to citizens raises their subjective well-being. Two reasons were given for this finding. First, a more active role for citizens enables better monitoring of professional politicians by citizens, which leads to greater satisfaction with government output. Second, the ability for citizens", "-28.63432935392484" ], [ "worse, human beings do not rise to such heights. Generations of socialists and socially oriented leaders have learned this to their disappointment and more often to their sorrow. The basic fact is clear: the good society must accept men and women as they are. Reduced prosperity According to economist Hans-Hermann Hoppe, countries where the means of production are socialized are not as prosperous as those where the means of production are under private control. Ludwig von Mises, a classical liberal economist, argued that aiming for more equal incomes through state intervention necessarily leads to a reduction in national income and", "-28.573905341909267" ], [ "a particular race that happens to be prominent in their class, or creating more open spaces for a student in a wheel chair. Regardless of these changes, all students can benefit from them in one way or another. Arguments for full inclusion in regular neighborhood schools Advocates say that even partial non-inclusion is morally unacceptable. Proponents believe that non-inclusion reduces the disabled students' social importance and that maintaining their social visibility is more important than their academic achievement. Proponents say that society accords disabled people less human dignity when they are less visible in general education classrooms. Advocates say", "-28.568093374607997" ], [ "positive, non-school based STEM learning experience for youth who are marginalized in school. Public health As of 2004, according to the United States Commission on Civil Rights: \"Native Americans die of diabetes, alcoholism, tuberculosis, suicide, and other health conditions at shocking rates. Beyond disturbingly high mortality rates, Native Americans also suffer a significantly lower health status and disproportionate rates of disease compared with all other Americans.\"\nIn addition to increasing numbers of American Indians entering the fields of community health and medicine, agencies working with Native American communities have sought partnerships, representatives of policy and program boards, and other ways to", "-28.55911335046403" ], [ "have been reported to be duped into being taken to foreign lands where they are held under difficult conditions and forced to work with meager pay. The power of economic progress has in some cases created conditions where those with less education and resources are convinced to travel from familiar surroundings and feel threatened not to complain for fear of losing their work. Ethnic minorities and women of many third-world countries are especially vulnerable. Societies that are sometimes called \"advanced\" are to some extent dependent on cheap labor and resources taken from those less fortunate. Some believe that our worldwide", "-28.557317302242154" ], [ "(the collective state and range of health in a population). In the US, 12% to 16% of the citizens do not have health insurance. State boards and the Department of Health regulate inpatient care to reduce the national health care deficit. To tackle the problems of the increasing number of uninsured, and costs associated with the US health care system, President Barack Obama says he favors the creation of a universal health care system. However, this view is not shared across the country (see, for example, quotes from New York Times opinion columnist Paul Krugman and Factcheck.org).\nA few states have", "-28.54014790628571" ], [ "ensure that the right to adequate food is especially fulfilled for vulnerable population groups and individuals. Interrelation to other rights The idea of the interdependence and indivisibility of all human rights was a founding principle of the United Nations. This was recognised in the 1993 Vienna Declaration and Programme of Action which reads “all human rights are universal, indivisible and interdependent and interrelated.\" The right to food is considered interlinked with the following human rights in particular: right to life, right to livelihood, right to health, right to property, freedom of expression, freedom of information, right to education, freedom of", "-28.52791282252292" ], [ "to white patients, and low-income people to high-income people. Common barriers to accessing and utilizing healthcare resources included lack of income and education, language barriers, and lack of health insurance. Minorities were less likely than whites to possess health insurance, as were individuals who completed less education. These disparities made it more difficult for the disadvantaged groups to have regular access to a primary care provider, receive immunizations, or receive other types of medical care. Additionally, uninsured people tend to not seek care until their diseases progress to chronic and serious states and they are also more likely to forgo", "-28.516035224543884" ] ]
3079xp
Ted Cruz is staunchly anti-Obamacare. Why is he signing up for Obamacare then?
[ "Practically speaking, it is because he was previously getting health benefits through his wife's job. His wife is going on an unpaid leave of absence for the duration of the presidential campaign, so he (and his wife) won't be covered. Politically, he's still against it, but said something to the effect of that its still technically the law, and he'll follow the law, even if it's one he fundamentally disagrees with.", "Because it's the law, and he has to?", "First, Obamacare is not \"something you sign up for.\" He's searching for a plan provided by a private company on an exchange set up by the federal government. Second, he's doing it because his wife quit her job at Goldman Sachs, leaving him without insurance. The ACA requires people to have health insurance and for congressmen to enroll through the exchanges just like everyone else.", "A Republican sponsored amendment to Obamacare requires congress to use federal exchanges to obtain insurance.", "Actually, he has a couple options. He can go thru a traditional insurance agent and have them find him a policy. He can also go directly thru the insurance provider directly and sign up under special enrollment (blue cross blue shield or whatever.). He definitely does not have to go thru Obamacare to get private insurance.", "\"Ted Cruz thinks the transportation budget is overfunded. Why doesn't he stay in his house all day with a dunce hat and avoid using the roads because I think that's the logical conclusion of disagreeing with my politics?\" Edit: typo fixes" ]
[ [ "the use of \"Patient Protection and Affordable Care Act\" or \"Affordable Care Act\" became limited to more formal and official use. Use of the term in a positive sense was suggested by Democrat John Conyers. Obama endorsed the nickname, saying, \"I have no problem with people saying Obama cares. I do care.\"\nIn March 2012, the Obama reelection campaign embraced the term \"Obamacare\", urging Obama's supporters to post Twitter messages that begin, \"I like #Obamacare because ...\".\nIn October 2013, the Associated Press and NPR began cutting back on use of the term. Stuart Seidel, NPR's managing editor, said that the term", "-33.54386944597354" ], [ "to ignore the will of Congress and the letter of the law.\" Republicans point to Obama's changes to provisions and deadlines of the Patient Protection and Affordable Care Act (commonly known as \"Obamacare\") and his changes to the deportation of some immigrants.\nThe bill's sponsor, Rep. DeSantis spoke in favor of the bill, arguing that \"President Obama has not only failed to uphold several of our nation's laws, he has vowed to continue to do so in order to enact his unpopular agenda... The American people deserve to know exactly which laws the Obama administration is refusing to enforce and why.\"\nRep.", "-32.875507466964336" ], [ "services.\nBacon favors repealing the Affordable Care Act, commonly known as Obamacare. He was supportive of the March 2017 version of American Health Care Act, the GOP's replacement plan for Obamacare. On May 4, 2017, Bacon voted to repeal the Patient Protection and Affordable Care Act and pass the American Health Care Act, nicknamed \"Trumpcare.\" Foreign policy He is a steadfast backer of Israel, and supports the United States recognizing Jerusalem as Israel's capital. In an American Family Association candidate questionnaire from 2016, Bacon opposed the question \"The U.S. military should wait for militant Islamic groups to directly threaten our national", "-32.49272961661336" ], [ "which many Republicans assail it as an attack on freedom, but the provision in President Obama's health care law requiring all Americans to buy health insurance has its roots in conservative thinking.\"\nOther Republican politicians who had previously supported individual mandates, including Romney and Orrin Hatch, similarly emerged as vocal critics of the mandate in Obama's legislation. Writing in The New Yorker, Ezra Klein stated that \"the end result was... a policy that once enjoyed broad support within the Republican Party suddenly faced unified opposition.\"\nThe Affordable Care Act signed in 2010 by Obama included an individual mandate to take effect in 2014.\nOn", "-32.146468811202794" ], [ "checks on all commercial sales of guns. Health care Johnson opposes the Affordable Care Act (Obamacare) and has voted to repeal it. During a radio interview in August 2017, Johnson said the following about John McCain's \"thumbs-down\" vote that ultimately killed Republicans' Obamacare repeal bill, \"He has a brain tumor right now, the vote occurred at 1:30 in the morning, so some of that might have factored in.\" A McCain spokesman called the statements \"bizarre and deeply unfortunate.\" Johnson later stated that he was \"disappointed I didn't more eloquently express my sympathy for what Sen. McCain is going through.\"\nIn early", "-32.128727613137926" ], [ "would amend the Civil Rights Act of 1964 to include a ban on discrimination on the basis of sexual orientation or gender identity.\nRegarding the Affordable Care Act, he has stated his desire to improve the law rather than fight to repeal or defund it. Dold has said the Affordable Care Act was right to require insurance coverage for pre-existing conditions and to allow students to stay on a parent's insurance to age 26. Upon his return to the House in 2015, Dold became one of just three Republican Congressmen to vote against repeal of the Affordable Care Act - the", "-31.902407022862462" ], [ "to Republican presidential candidate Ted Cruz as \"Lucifer in the flesh\" in an interview at Stanford University. On May 12, after Donald Trump became the presumptive Republican nominee, Boehner's support for him became public, though he distanced himself on several policies and expressed satisfaction with Cruz not securing the nomination: \"Thank God the guy from Texas didn't win.\" On February 23, 2017, Boehner predicted Republicans would \"fix\" the Affordable Care Act and give it a different name as opposed to their stated intent to repeal and replace. Business Boehner joined the board of tobacco company Reynolds American on September 15,", "-31.735726001643343" ], [ "end of his first year in office effectively repealed the individual health insurance mandate that was a major element of the Obamacare health insurance system; this repeal is scheduled to be implemented in 2019. Social issues Trump favored modifying the 2016 Republican platform opposing abortion, to allow for exceptions in cases of rape, incest, and circumstances endangering the health of the mother. He has said he is committed to appointing pro-life justices. He says he personally supports \"traditional marriage\" but considers the nationwide legality of same-sex marriage a \"settled\" issue. Despite the statement by Trump and the White House saying", "-31.59579242047039" ], [ "about the Affordable Care Act. For instance, Hannity falsely alleged several times that Democratic Senate Finance Committee Chairman Max Baucus had said Social Security could be \"insolvent in two years\" due to the Affordable Care Act. According to the study, Hannity, unlike other Fox News hosts such as Bill O'Reilly and Greta Van Susteren, \"took a more direct approach, aggressively supporting Republicans and conservatives and attacking Democrats and liberals, endorsing the more spurious claims long after they were proven incorrect, and putting advocacy above accurate reporting, to further the network's themes opposing reform.\" Roy Moore interview and Twitter controversy In", "-31.465440626605414" ], [ "April 2007, Giuliani stated that he is in favor of publicly funded abortions. However, during the May 3, 2007, Republican Presidential Debate, he said that he was against federal funding. When asked why he supports the use of public funds for abortion, he said:\nI don't. I support the Hyde Amendment. I hate abortion. I wish people didn't have abortions. I believe that the Hyde Amendment should remain the law. States should make their decision. Some states decide to do it. Most states decide not to do it. And I think that's the appropriate way to have this decided. I supported", "-31.34228483599145" ], [ "provisions of the Affordable Care Act. Five weeks earlier, Smith had voted with seven other Republicans to pass a resolution condemning the Trump administration's efforts by Department of Justice to have the courts invalidate \"ObamaCare.\" Human rights Smith advocates for human rights, serving on numerous committees that seek to impact both national and international laws and legislation. He has stated that the bills he introduces to the house are meant to make the U.S. take \"human rights seriously.\"\nIn 1999, Smith proposed, as part of the American Embassy Security Act, to stop a U.S. sponsored program which provided training to", "-31.22798130661249" ], [ "assault weapons.\" Health care Northam supports the Affordable Care Act (\"Obamacare\"), although he has argued that it is in need of improvement. After Republican attempts to repeal the law, Northam called for members of Congress to \"put a stop to the uncertainty and work on stabilizing and building on the Affordable Care Act's progress.\"\nNortham opposes a single-payer healthcare system in Virginia, preferring that such a plan be run by the federal government, but supports the creation of a state-run public health insurance option.\nOn June 7, 2018, Northam signed a bipartisan bill expanding Medicaid in Virginia. This fulfilled one of his", "-31.15719846007414" ], [ "2009, she appeared in nationwide television advertisements warning about possible problems with the Patient Protection and Affordable Care Act (also known as Obamacare). In 2011, she was elected to the board of trustees of the American Medical Association. Declaration and early developments In October 2013, Wehby announced that she would seek the Republican nomination for the United States Senate seat held by first-term Democratic incumbent Jeff Merkley. She said that \"I want our kids to have the same opportunities that we had. I'm really concerned when I look at the way things are going we may be the first generation", "-31.09869072737638" ], [ "\"Obamacare\" and the \"Affordable Care Act\" were different or did not know. Approximately 45% were unsure whether the \"repeal of Obamacare\" also meant the \"repeal of the Affordable Care Act.\" 39% did not know that \"many people would lose coverage through Medicaid or subsidies for private health insurance if the A.C.A. were repealed and no replacement enacted,\" with Democrats far more likely (79%) to know that fact than Republicans (47%).\nA 2017 study found that personal experience with public health insurance programs leads to greater support for the Affordable Care Act, and the effects appear to be most pronounced among Republicans", "-31.090178611222655" ], [ "Senate versions of the bill. Paul also told reporters on September 11 that he did not believe the Graham-Cassidy bill would pass. Paul tweeted on September 15 that Graham-Cassidy retained \"90% of Obamacare\" and dubbed it \"more Obamacare Lite\".\nOn September 19, Paul asserted the Graham-Cassidy bill as immortalizing the Affordable Care Act and \"a big government boondoggle of a trillion dollars of spending\" that Republicans should abandon in favor of pursuing measures that would allow for health insurance to be purchased across state lines. On September 22, after President Trump tweeted that \"Rand Paul, or whoever votes against Hcare Bill,", "-31.082467948901467" ], [ "it now. He told the Lawrence Journal-World in response to a question if the Affordable Care Act should be repealed in its entirety, amended to address specific problems or left as it is, he said, \"I opposed ACA because it did nothing to fix a broken system. We had a national crisis in health care before the Affordable Care Act passed, and that crisis still exists today. But instead of playing political games with this issue as Republicans and Democrats in Congress have done, I believe we need to focus on what Washington can actually do to ensure that health", "-31.07474834797904" ], [ "Babin said that President Barack Obama \"deserves impeachment\", but he doubted that Congress would act on that. He also criticised President Obama's foreign policy, calling him an \"appeaser deluxe\".\nIn June 2015, after the Supreme Court of the United States ruled in King v. Burwell that the tax subsidies in the Patient Protection and Affordable Care Act (commonly known as Obamacare) were constitutional, Babin introduced the \"SCOTUScare Act\". His bill would force the Supreme Court Justices to enroll for Obamacare and purchase healthcare insurance under the health exchanges, so that they could, as he said, \"understand the full impact of their", "-31.072919940343127" ], [ "his party by voting with Democrats in favor of the Affordable Health Care for America Act which included a public option for health care. However, Cao voted against the Affordable Care Act, colloquially called Obamacare, because of concerns about abortion. He had also been one of 29 Republicans who voted with Democrats in favor of the re-authorization of the Children's Health Insurance Program.\nCao was one of five House Republicans who voted with Democrats to repeal of Don't Ask Don't Tell in May 2010. He was one of 15 Republicans who joined Democrats and voted in favor of the final repeal", "-31.06285572005436" ], [ "supports the Affordable Care Act and opposes attempts to repeal it, but was criticized by WPHT talk show host Dom Giordano for \"giving vague responses to complaints about the law.\" She has criticized President Obama for his position on Superstorm Sandy aid.\nIn February 2014, Nancy Pelosi hosted a fundraiser for Belgard. The Democratic Congressional Campaign Committee announced it would spend $1.3 million in ads supporting her campaign. One ad about her opponent’s company, reported by Time, was described by Factcheck.org as deceptive, which the DCCC disputes.\nBelgard was criticized by the MacArthur campaign for voting in favor of a tax increase", "-31.002229794336017" ], [ "expressed opposition to a public health insurance option and instead supported a Republican alternative plan. At an April 7, 2010, Republican rally in Minneapolis, Paulsen described the Affordable Care Act as a \"government takeover of health care,\" a claim that Minnesota Public Radio said \"isn't correct.\"\nPaulsen voted to repeal the Affordable Care Act. In January 2017 he voted for the budget reconciliation provision to begin the process of ACA repeal.\nOn May 4, 2017, Paulsen voted to repeal the Patient Protection and Affordable Care Act (Obamacare) and for the American Health Care Act.\nIn February 2018 Paulsen sponsored legislation to repeal caps", "-30.9663739175885" ], [ "opted to remain in the spin room.\nOn October 2, Jindal tweeted an accusation against Trump suggesting that he was in favor of single payer healthcare system and charged Ted Cruz with not showing \"conservative leadership\" in not opposing Trump for the view. Jindal furthered that Cruz was only showing support of Trump because he hoped to court his voters when he eventually dropped out of the race.\nBy mid-October, Jindal was speculated to be ending his campaign after having only $260,000 to spend at the end of the previous month and spending significantly more than that of the third quarter's fundraising,", "-30.960095802438445" ], [ "out that not all policy proposals have been modeled. Affordable Care Act and health-care reform As the 2016 campaign unfolded, Trump stated that he favors repealing the Affordable Care Act (ACA or \"Obamacare\")—which Trump refers to as a \"complete disaster\"—and replacing it with a \"free-market system.\" On his campaign website, Trump says, \"on day one of the Trump Administration, we will ask Congress to immediately deliver a full repeal of Obamacare.\" Trump's campaign has insisted that the candidate has \"never supported socialized medicine.\"\nTrump has cited the rising costs of premiums and deductibles as a motivation to repeal the Affordable Care", "-30.88599389384035" ], [ "in my city of New York, would have been just intolerable for me.\"\nFuture Republican nominee John McCain defended Obama when it came to allegations of guilt by association, saying, \"I think that when people support you, it doesn't mean that you support everything they say. Obviously, those words and those statements are statements that none of us would associate ourselves with, and I don't believe that Senator Obama would support any of those, as well.\" Government officials Vice President Dick Cheney weighed in on the Wright matter on April 10, 2008. He appeared on Sean Hannity's radio show and said,", "-30.868070091717527" ], [ "smoking gun in this campaign, just go Google and type the STOCK Act and CNN and Eric Cantor\", Brat said. Healthcare Brat opposed the Affordable Care Act (Obamacare). In March 2017 he said he opposed the initial version of the American Health Care Act, which was the GOP's replacement for Obamacare, and that he intended to vote against it in the House Budget Committee. On May 4, 2017, Brat voted to repeal Obamacare and pass the revised version of the American Health Care Act. He said the bill contained protections for preexisting conditions and would lead to lower prices; The", "-30.865736721025314" ], [ "go of the issue, because he was not satisfied that Obama had proved his citizenship. After Trump began making his views public, he was contacted by Joseph Farah of WorldNetDaily, who was reportedly on the phone with Trump every day for a week, providing Trump with a \"birther primer\", answers to questions, and advice. After Obama released his long-form birth certificate on April 27, 2011, Trump said \"I am really honored and I am really proud, that I was able to do something that nobody else could do.\"\nOn October 24, 2012, Trump offered to donate five million dollars to the", "-30.86404805222992" ], [ "June 2013, Heller called Obamacare a “colossal monstrosity,” but in April 2014, The Hill named him as one of several “anxious Senate Republicans” who were worried that Republican leaders were “focusing too much this election year on Obamacare.”\nIn June 2017, Heller held a joint press conference with Nevada Governor Brian Sandoval, where Heller fervently opposed the American Health Care Act, the Republican Party's repeal and replacement bill for the Affordable Care Act (ACA). Heller said that he could not support a bill \"that takes away insurance from tens of millions of Americans and hundreds of thousands of Nevadans.\" In July", "-30.85291269015579" ], [ "by the nonpartisan Congressional Budget Office, Blum stated that there was an urgent need for a fix to Obamacare.\nDuring his town halls in May 2017, Blum falsely claimed that if the current version of AHCA became law that coverage would not change for those on Medicaid. He also told his constituents, \"If you're getting your insurance through the group health care marketplace — your employer — nothing changes.\" This was found to be partly false when fact checked by National Public Radio, as whether someone's insurance would change under the GOP bill depends on whether an employer is based in", "-30.70522974341293" ], [ "dismissed the allegations that he engages in \"pay-to-play\". President Obama In 2009, Levin described as \"absolutely right\" the statement by Sarah Palin that the Patient Protection and Affordable Care Act (Obamacare) includes death panels to decide whether elderly people or sick children were worthy of medical care. In 2011, a caller to Levin's show, claiming to be a neurosurgeon, said that the Department of Health and Human Services had issued a document saying that people over age 70 would not be allowed to receive medical treatments. Levin said to the caller, \"so Sarah Palin was right.\" The call was later", "-30.69684093917749" ], [ "a razor\" and \"in remarkably vigorous health\". He pronounced himself \"disappointed\" with President Obama for \"sitting\" on the Keystone Pipeline and has listed his campaign priorities as \"Building support for a high-speed rail system between Baton Rouge and New Orleans and emphasizing the good aspects of Obamacare, while doing what I can to change or amend the provisions that I think are onerous.\" He said that he would have voted against the Affordable Care Act, but criticized Governor Jindal for not accepting the Medicaid expansion. If elected, he hoped to serve on the Committee on Transportation and Infrastructure, to spur", "-30.63216748952982" ], [ "over President Barack Obama's health care proposals, the organization's president at the time, Charmaine Yoest, met with representatives of the Obama administration to discuss \"conscience protection\" and the absence of \"explicit language banning abortion funding and coverage\" in the bill. AUL later came out in opposition to the Patient Protection and Affordable Care Act, and its affiliated legislative action group launched a targeted campaign in congressional districts of House members who supported the bill. In the two op-eds for the Wall Street Journal, Yoest argued that the health care bill would allow for federal funding of abortions and does not", "-30.584042781280004" ], [ "in cavalier activity, and providing options for adoption, and helping single mothers if they want to choose to keep the baby'. Those are all things that we put in the Democratic platform for the first time this year, and I think that's where we can find some common ground, because nobody's pro-abortion. I think it's always a tragic situation. We should try to reduce these circumstances.\"\nObama voted for a $100 million education initiative to reduce teen pregnancy and provide contraceptives to young people. Disability rights Obama was the only Democratic presidential candidate to issue an unsolicited statement expressing his views on", "-30.578388129652012" ], [ "Affordable Care Act signed into law in 2010 by President Obama, but the two differ on how to approach the legislation known as Obamacare. McAllister opposed the United States federal government shutdown of 2013 as a proper method to force the repeal of the measure: \"Obamacare is a nightmare, but it's a reality, and it's here. [We] have to live with it, we have to make it livable. We have to make it work for the people until one day we [have the votes] to repeal it.\" Riser supported the House Republicans' failed effort to de-fund the Affordable Care Act", "-30.547536468831822" ], [ "not result in anyone losing health coverage. Donald Trump Collins did not publicly comment on sexual misconduct accusations against Donald Trump in the wake of the Access Hollywood tape being released. Tax reform Collins supports tax reform and voted in favor of the Tax Cuts and Jobs Act of 2017. He said the bill would encourage businesses to create more jobs and that the economy and communities would strengthen. He said, \"We're making the IRS less ravenous and putting more money back in the hands of American families so that they can pursue more of their ambitions on their own", "-30.5457979348721" ], [ "Catholic than most Catholics I know.\" The issues that drew Kmiec's attention were wages, health care, and the cost of the Iraq War. To those fellow Catholics and pro-life advocates who were surprised at his position, he argued that Obama's desire to \"alleviate social conditions that correlate with abortion\", such as poverty, was convincing. In the endorsement itself, Kmiec explained his disagreements with Obama, especially over the issue of abortion, but indicated that it was time to find common ground on this and other topics. Kmiec opened his piece by praising Obama's \"integrity, intelligence, and genuine good will\".\nAs a result", "-30.545431602397002" ], [ "public option, and asserted that the option has popular support because \"when people hear 'public option' they hear 'free health care'. Everybody wants free health care. Everybody wants health care they don't have to pay for.\"\nLandrieu voted for the Patient Protection and Affordable Care Act (known as \"Obamacare\") in December 2009. In September 2013, Landrieu voted to restore funding for the ACA that House Republicans had eliminated in their version of the funding bill.\nOn March 1, 2012, Landrieu voted against a measure that would have repealed a birth control mandate in the health care bill. In October 2013, she introduced", "-30.499481471139006" ], [ "agree with. That's pretty crazy.\" He also said that Giuliani \"was imbued with the thought that if he was right, it was like a God-given right. That's not what we need in a president.\"\nKoch originally endorsed Hillary Clinton for president during the 2008 campaign, then endorsed Democratic nominee Barack Obama in the general election. In his endorsement of Obama, Koch wrote that he felt that (unlike in 2004) both candidates would do their best to protect both the United States and Israel from terrorist attacks, but that he agreed with Obama's domestic policies much more and that the idea of", "-30.48493390029762" ], [ "positions on issues such as immigration, abortion and same-sex marriage. She was also criticised by primary opponent Jason Conger for her support of the Healthy Americans Act, co-sponsored by Oregon's other U.S. Senator, Democrat Ron Wyden, and Utah Republican Bob Bennett, which Conger said was \"90 percent there with Obamacare\" because it contained provisions that people purchase government-approved insurance plans. Wehby responded that it was \"a good plan; it was a market-based approach\" and said that she never supported the entire bill and did not think uninsured people should be mandated or enticed into buying health insurance. The battle between", "-30.484451366155554" ], [ "puts Americans first.\" Defense In March 2012 she called for cuts in defense spending. Health care Bustos strongly supports the Affordable Care Act (commonly known as Obamacare). In October 2012, her congressional campaign website said, \"The new reform law is not perfect, but makes real improvements in our health care system. It lowers costs for small businesses and makes sure you have coverage that cannot be taken away. It stops insurance companies from denying coverage of preexisting conditions and allows children to stay on their parents' health insurance for longer.\" Bustos, a Catholic, supports legalized abortion. She also supported President", "-30.437214769073762" ], [ "has been a leading supporter of the Affordable Care Act in the Senate and has opposed Republican attempts to repeal the law, consistently speaking on the floor about the positive impact it has had on his constituents.\nIn April 2017, Murphy was one of five Democratic senators to sign a letter to President Trump that warned failure \"to take immediate action to oppose the lawsuit or direct House Republicans to forgo this effort will increase instability in the insurance market, as insurers may choose not to participate in the marketplace in 2018\" and that they remained concerned that his administration \"has", "-30.429271959725156" ], [ "said the bill was \"necessary to stop students from basically doing what I did when I was a kid: voting as a liberal.\" Controversy over the Affordable Care Act and slavery In August 2013, O'Brien spoke at a rally in New Hampshire of the Americans for Prosperity, a conservative political advocacy group, where he likened the Affordable Care Act to an 1850 pro-slavery federal law. In his remarks O'Brien called the healthcare act, popularly known as Obamacare, \"a law as destructive to personal and individual liberty as the Fugitive Slave Act of 1850 that allowed slave owners to come", "-30.422243230277672" ], [ "Patient Protection and Affordable Care Act (PPACA, also known simply as the Affordable Care Act or \"Obamacare\") and perceived attacks by the federal government on their 1st, 2nd, 4th and 10th Amendment rights. Tea Party groups have also voiced support for right to work legislation as well as tighter border security, and opposed amnesty for illegal immigrants. On the federal health care reform law, they began to work at the state level to nullify the law, after the Republican Party lost seats in congress and the Presidency in the 2012 elections. It has also mobilized locally against the United Nations", "-30.40243725734763" ], [ "and Republicans, Cruz declined to answer whether he thought the president was a Christian, reasoning that Obama's faith \"is between him and God\" and opted to give his stance that the Obama administration had been antagonistic towards Christians. Cruz debunked fellow presidential candidate Ben Carson's claim that a Muslim should not serve as President, saying, \"The Constitution specifies there shall be no religious test for public office, and I'm a constitutionalist.\" Post-CNBC debate Cruz was a participant in the CNBC Republican presidential debate on October 28. In his opening statement, he stressed his willingness to govern properly, and later in", "-30.329458967084065" ], [ "and low-information voters. \"Obamacare\" The term \"Obamacare\" was originally coined by opponents as a pejorative. The term emerged in March 2007 when healthcare lobbyist Jeanne Schulte Scott used it in a health industry journal, writing \"We will soon see a 'Giuliani-care' and 'Obama-care' to go along with 'McCain-care', 'Edwards-care', and a totally revamped and remodeled 'Hillary-care' from the 1990s\". According to research by Elspeth Reeve, the expression was used in early 2007, generally by writers describing the candidate's proposal for expanding coverage for the uninsured. It first appeared in a political campaign by Mitt Romney in May 2007 in Des", "-30.305780990747735" ], [ "notion that President Obama is secretly a Muslim, for example stating that Obama might have attended a particular funeral \"if it were held in a Mosque\" and saying that \"some people\" think a Muslim already had been elected president. Trump also speculated that Supreme Court Justice Antonin Scalia's death by natural causes, was in truth caused by murder. Refusal to release tax returns Trump did not release his personal income tax returns, as nominees traditionally do, and said he does not plan to do so before the November election. Before declaring for president he said he would \"absolutely\" release them", "-30.30569269740954" ], [ "Affordable Care Act (Obamacare). He supported the March 2017 version of the American Health Care Act, the GOP's replacement bill for Obamacare. On May 4, 2017, Chabot voted to repeal the Patient Protection and Affordable Care Act and pass the American Health Care Act. Economy The Concord Coalition and anti-tax advocacy groups such as Citizens Against Government Waste and the National Taxpayers Union consistently rated Chabot as one of the most anti-tax members of Congress.\nChabot has advocated for a repeal or modification of the Dodd-Frank Act, which was passed as a response to the financial crisis of 2007–2008. Environment On", "-30.279701959647355" ], [ "of an erasure than a public affirmation—although obviously my vote meant that I thought that Obama was preferable to McCain-Palin. I do not consider abstention a proper option.\nIn February 2011, Fried testified before the Senate Judiciary Committee in support of President Obama's health care reform law. When asked by Illinois Senator Richard Durbin to respond to critics of the law's individual mandate who ask: \"[I]f the government can require me to buy health insurance, can it require me to have a membership in a gym, or eat vegetables?,\" Fried replied:\nYes. We hear that quite a lot. It was put", "-30.270512691815384" ], [ "Affordable Care Act. That's my main issue, because I think that's, again, about the health and financial health of the America's families and if Hillary had won, I could go home.\" She furthered that Republicans had misrepresented their prior position of being opposed to pre-existing conditions during the election cycle and called for Republicans to join Democrats in \"removing all doubt that the pre-existing medical condition is the law – the benefit – is the law of the land\". Abortion Pelosi voted against the Partial-Birth Abortion Ban Act of 2003 and earlier attempts at similar bans, and voted against the", "-30.251572003326146" ], [ "in the White House with liberal activists, Emanuel called them \"fucking retarded\" for planning to run TV ads attacking conservative Democrats who didn't support Obama's health-care overhaul. After the remarks were quoted in a front-page story of the Wall Street Journal, and after he was criticized by Sarah Palin, Emanuel apologized to organizations for the mentally handicapped for using the word \"retarded\".\nAccording to Jonathan Alter's book, The Promise, Emanuel opposed Barack Obama's plan for a broad health care reform, but Obama overrode him. Emanuel advocated a smaller plan because it could get bi-partisan support. Emanuel wanted to expand coverage for", "-30.250766313096392" ], [ "and families of 'martyrs.'\" Nelson did vote for the bill, which passed overwhelmingly. Health care In March 2010, Nelson voted for the Patient Protection and Affordable Care Act, also known as Obamacare, and the Health Care and Education Reconciliation Act of 2010, which passed and were signed into law by President Obama.\nNelson called in 2014 for the expansion of Medicaid.\nIn 2016, he called the House Zika bill \"a disaster,\" complaining that it would take \"$500 million in health care funding away from Puerto Rico\" and limit access to \"birth control services needed to help curb the spread of the virus", "-30.24398737802403" ], [ "group had been running local advertising in selected markets congratulating Republican members of Congress for helping pass a bill to repeal the Patient Protection and Affordable Care Act, despite the fact that the bill had been pulled earlier in the day by Speaker Paul Ryan due to dwindling support among Republicans. AAN stated to Deadspin that \"Conservatives in and out of Congress continue to believe Obamacare has failed and will continue to fight for patient-centered reforms. Therefore, the claims in the ad remain true in spite of [these events].\"\nOn February 25, 2019 the group published the article The Green New", "-30.215638499462784" ], [ "that \"my commitment to the Fair Tax and a common-sense tax overhaul makes it impossible for me to support the second component of the Pledge, which states that I must 'oppose any net reduction or elimination of deductions and credits, unless matched dollar for dollar by further reducing tax rates.'\" Health care Woodall opposes the Affordable Care Act (Obamacare), voting to repeal it.\nWoodall co-sponsored the Sanctity of Human Life Act. In October 2011, Woodall voted for legislation to restrict how private insurance companies listed on a public insurance exchange may offer abortion coverage. LGBT rights Upon the legalization of same-sex", "-30.21186625518021" ], [ "Act Scott voted for the Affordable Care Act (\"ObamaCare\"). On August 6, 2009, Scott was confronted by a constituent who was also a local doctor. The doctor, who later appeared in subsequent debates with his opposition candidate, asked Scott why he was going to vote for a health care plan similar to the plan implemented in Massachusetts and if he supported a government-provided health care insurance option. Scott questioned whether or not the doctor was a resident of Scott's district, although the local TV station WXIA-TV's news department confirmed that the doctor did live and work in Scott's district. Scott", "-30.193026621476747" ], [ "Affordable Care Act (Obamacare) and to pass the American Health Care Act. He publicly called Trump \"unhelpful on health care.\" Controversy On March 18, 2017, Trott held a town hall meeting. The majority of the general public were those opposed to Trott. Topics discussed included the repeal and replacement of the ACA funding for social programs, and whether Trump’s tweets were a good strategy. After the town-hall meeting, Trott and his aide, Stu Sandler, were caught on a hot mic stating “We’re going to take that part where they’re booing funding for the military and I’m going to get", "-30.192654776619747" ], [ "for the protection of his family.\nAffleck appeared alongside then-Senator Barack Obama at a 2006 rally in support of Proposition 87, which sought to reduce petroleum consumption in favor of alternative energy. He appeared in a global warming awareness video produced by the Center for American Progress Action Fund in 2007. Also that year, Affleck admitted he was not \"particularly good at being green\" while, in 2014, he named \"a 1966 Chevelle\" as his guilty pleasure. In 2016, Affleck filmed an endorsement for Rezpect Our Water, an online petition to stop construction of the Dakota Access Pipeline. Democratic Party activism Affleck", "-30.133797756682725" ], [ "think we've gotta make President George W. Bush say, 'OK, I'm cutting off funding because I won't agree to a timetable.'\"\nFranken favors transitioning to a universal health care system, with the provision that every child in America should receive health care coverage immediately. He objects to efforts to privatize Social Security or cut benefits, and favors raising the cap on wages to which Social Security taxes apply. On his 2008 campaign website, he voiced support for cutting subsidies for oil companies, increasing money available for college students, and cutting interest rates on student loans.\nDuring the 2008 election, New York state", "-30.130831157555804" ], [ "Pompeo opposed the Affordable Care Act (ACA). Pompeo has been criticized for saying that he supports funding for certain programs, yet opposing them when they are a part of the ACA. Social issues Pompeo has stated that life begins at conception and believes that abortions should be allowed only when necessary to save the life of the mother, with no exceptions for rape. In 2011, he voted for the No Taxpayer Funding for Abortion Act, which would have banned federal health coverage that includes abortion. On May 31, 2011, he voted for H.R.2059 11-HR2059, which eliminated funding for the United", "-30.114552923680094" ], [ "they use their entitlement, and that means they have to bear more of the burden.\" Paul also stated that he does not support such changes for current retirees or people nearing retirement.\nHe is in favor of repealing the Patient Protection and Affordable Care Act, commonly referred to as Obamacare. Following the Supreme Court decision which upheld the constitutionality of most of Obamacare, Paul released a statement saying, \"Just because a couple people on the Supreme Court declare something to be 'constitutional' does not make it so. The whole thing remains unconstitutional.\" Immigration Paul supports immigration reform with a strong emphasis", "-30.114368159258447" ], [ "on the essential question of defending civilization against its terrorist enemies and their totalitarian protectors, and on that 'issue' I hope I can continue to expose and oppose any ambiguity.\" He was critical of both main party candidates, Obama and John McCain, but wrote that Obama would be the better choice. Hitchens went on to call McCain \"senile\", and his choice of running mate Sarah Palin \"absurd\", calling Palin a \"pathological liar\" and a \"national disgrace\". Hitchens also wrote that \"Obama is greatly overrated\" and that the Obama-Biden ticket \"show[s] some signs of being able and willing to profit from", "-30.034629985457286" ], [ "order to prevent birth defects and in other extreme cases; he encouraged the outcome in Roe and generally supported abortion rights. Roe was also supported by President Bill Clinton. President Barack Obama has taken the position that \"Abortions should be legally available in accordance with Roe v. Wade.\"\nPresident Donald Trump has publicly opposed the decision, vowing to appoint pro-life justices to the Supreme Court. Upon Justice Kennedy's retirement in 2018, Trump nominated Brett Kavanaugh to replace him, and he was confirmed by the Senate in October 2018. A central point of Kavanaugh's appointment hearings was his stance on Roe v.", "-30.00582564494107" ], [ "promise that Americans who liked their health insurance could keep it.\nIn March 2010, Kucinich announced that he supported the Affordable Care Act after previously indicating opposition. LGBT rights Kucinich supports same-sex marriage. Kucinich voted for the expansion of hate crime laws in the United States and against banning LGBT adoption in Washington, D.C. Trade Kucinich has consistently opposed free trade on the grounds that it costs American jobs and enables abusive working conditions in other countries. Youth rights In a Democratic debate during the 2008 Presidential Election, Kucinich and Mike Gravel were the only two candidates who favored lowering the", "-29.99277668306604" ], [ "replacing and repealing the Affordable Care Act bill. Paul spoke with President Trump over the phone on March 6, Paul telling him that the repeal and replacement of the Affordable Care Act should be two separate bills. Two days later, Paul said Republicans were united in repealing the Affordable Care Act, but divided in their stances on its replacement. On March 12, Paul accused House Speaker Paul Ryan of being misleading in portraying supporters of the American Health Care Act of 2017 as not being negotiable, and three days later, March 15, furthered that Ryan was \"selling\" President Trump \"a", "-29.98781327600591" ], [ "battling Republican efforts to repeal the Affordable Care Act but would also be willing to form a compromise measure in the event that Republicans were unable to pass a compromise bill and reached out for bipartisan support. She indicated her support for the Republican plan to expand Health Savings Accounts and said the question of Republicans accepting an expansion of Medicaid was important. In September, Pelosi sent a letter to Democrats praising Senator John McCain for announcing his opposition to the latest Republican effort to repeal and replace the Affordable Care Act and called for both lawmakers and advocacy groups", "-29.959704728855286" ], [ "favor of repealing the Patient Protection and Affordable Care Act (Obamacare) and passing the House Republican-sponsored American Health Care Act.\nFollowing a televised community forum in Plattsburgh four days later, in which many attendees opposed her vote and wanted to maintain Obamacare because it was superior, Stefanik said she had been unfairly criticized for her vote for AHCA. She defended her vote in a post on Medium, \"Setting the Record Straight on the American Health Care Act.\"\nHer claims about the effects of the AHCA have been strongly disputed by journalists' fact-checking from the Glens Falls Post-Star, North Country Public Radio, and", "-29.949513356667012" ], [ "his frustration with Republicans backing \"a bill that will raise costs, reduce coverage, and roll back protections for older Americans and people with pre-existing conditions\".\nAfter Attorney General Jeff Sessions announced the termination of the Deferred Action for Childhood Arrivals (DACA) program on September 5, Obama released a Facebook post rebuking the decision. Two days later, he partnered with former presidents Jimmy Carter, George H. W. Bush, Bill Clinton, and George W. Bush to work with One America Appeal to help the victims of Hurricane Harvey and Hurricane Irma in the Gulf Coast and Texas communities.\nObama hosted the inaugural summit of", "-29.942565997946076" ], [ "Hollingsworth voted for the Tax Cuts and Jobs Act of 2017. Health care Hollingsworth supports the repeal and replacement of the Affordable Care Act (Obamacare). He considers the act government overreach and prefers a private insurance system. Immigration and refugees Hollingsworth opposes the resettlement of Syrian refugees. Barack Obama In April 2016, Hollingsworth called President Obama's leadership a \"failure.\" Abortion Hollingsworth is pro-life. He supports defunding Planned Parenthood. In 2017, Hollingsworth posted on social media a statistic showing that Bloomington, Indiana had seen an increase in abortions in 2016. The Indiana State Department reported that Indiana saw a decline in", "-29.93003699235851" ], [ "Barbara Comstock has been talking about this issue. But I think her commitment would be more meaningful if she was working as hard to hold the president accountable for his sexual assault.\"\nThe Democrats differed on how to improve Obamacare, with Helmer advocating replacing it with Medicare for all, and Biggins favoring single-payer healthcare. Stover favors a single-payer system as well, and says that she'd also like to look at a Medicare-for-all system as well as other proposals for a system that could not be undermined by a future administration. Friedman favors improving the Affordable Care Act. Hill attacked Comstock's vote", "-29.92157139047049" ], [ "of regulations about Obamacare, which included a shift to an \"honor system\" for judging eligibility for Obamacare subsidies. After it was introduced, the White House released a statement indicating that the President will veto the bill if it was passed by Congress. Debate about the final version Some Republicans were unhappy with the final deal. Senator Cruz referred to the Senate bill as a \"terrible deal.\" Two of the conservative organizations that had pushed for the attempt to defund the health law, Heritage Action and the Club for Growth, opposed it.\nRepublicans did not get a delay on", "-29.901878774398938" ], [ "Bennet said that he would support health care reform even if it meant losing the election. In 2016, in response to western and central Colorado having some of the highest healthcare costs in the United States, Bennet said he \"didn't have answers\" and called it \"next to impossible\" to fix the Affordable Care Act given partisan attitudes at that time.\nAs part of a group of Democrats proposing \"more incremental steps to broaden health care coverage\", as opposed to Bernie Sanders's push for \"Medicare for All\", Bennet and Senator Tim Kaine have proposed \"Medicare X\". Medicare X would \"create a public", "-29.897489430150017" ], [ "policy wonk but is cast well as a black, female St. Nick bringing joy to the world. Her endorsement softens Obama, wraps him up, and makes of him a Christmas present to America.\n\"Because Oprah has such a reputation as a tastemaker, I think her early endorsement forced people to take Obama's candidacy seriously,\" explained Dr. Mark Anthony Neal, author, pop culture critic and Duke University professor. \"It made Obama more than a 'Black' candidate. Also, given Oprah's championing of women's issues, her decision not to support Hillary (Clinton) struck a chord for early undecideds... Obama's people understood that much of", "-29.86465846723877" ], [ "Health care Heller voted against the Patient Protection and Affordable Care Act of 2010 (Obamacare).\nDuring the debate prior to the federal healthcare law's passage, Heller said that members of Congress should be forced to join any government-run healthcare plan proposed in early versions of the healthcare law.\nHeller questioned the constitutionality of the law following its passage, and called on Nevada Attorney General Catherine Cortez Masto to join a multi-state lawsuit challenging it.\nOn January 19, 2011, Heller voted to repeal the Affordable Care Act (Obamacare).\nIn May 2013, Heller introduced a bill to suspend $440 million in IRS funding to enforce Obamacare.\nIn", "-29.847988996101776" ], [ "Thus it does not serve as precedent. Affordable Care Act In November 2011, Kavanaugh dissented when the D.C. Circuit upheld the Patient Protection and Affordable Care Act (ACA), arguing that the court lacked jurisdiction in the case. In his dissent concerning jurisdiction, he compared the individual mandate to a tax. After a unanimous panel found that the ACA did not violate the Constitution's Origination Clause in Sissel v. United States Department of Health & Human Services (2014), Kavanaugh wrote a lengthy dissent from the denial of rehearing en banc. In May 2015, Kavanaugh dissented from a decision that denied an", "-29.847603705828078" ], [ "out some sort of a really smart deal with hospitals across the country.\" and has said \"everybody's got to be covered.\" At a February 2016 town hall on CNN, Trump said that he supported the individual health insurance mandate of the ACA, which requires all Americans to have health insurance, saying \"I like the mandate. So here's where I'm a little bit different [from other Republican candidates].\" In March 2016, Trump reversed himself, saying that \"Our elected representatives must eliminate the individual mandate. No person should be required to buy insurance unless he or she wants to.\"\nIn March 2016, Trump", "-29.846033260866534" ], [ "“Obamacare has not delivered on countless promises.” It was reported in April 2017 that Upton had “serious concerns” with President Donald Trump’s proposed health-care law because it would mean “potential higher costs to those with pre-existing illnesses.” In May 2017, after the addition of a new amendment written by Upton that provided additional funds for those with pre-existing conditions, he said he would vote for the bill and said he believed it could now pass the House. In July, Upton was among a group of members from both parties who “unveiled a set of solutions” intended to improve health-care coverage.", "-29.84230310194107" ], [ "the constitutionality of Obamacare. He also filed a brief in support of Arizona's immigration law.\nMcCollum opposed the federal Stimulus bill, as well as the $20 billion federal oil fund that limited his office's ability to pursue claims against BP, and requested additional authority from the federal government to address Medicaid fraud.\nWhile Attorney General, McCollum defended Florida's ban of adoptions by homosexuals from a lawsuit, In re: Gill challenging the ban. McCollum hired Dr. George Rekers, a controversial clinical psychologist, to testify during the trial that heterosexual parents provide a better environment for children. The trial resulted", "-29.82876564413891" ], [ "a press pool composed of journalists from Reuters, Voice of America, Bloomberg, the Associated Press, Agence France-Presse, ABC News, and McClatchey syndicate. During the availability, Trump thanked Obama for their meeting and said he looked forward to tapping him for future counsel. According to Trump, Obama convinced him, during their discussion, to retain certain aspects of his signature policy Obamacare, including the ban on insurance companies denying new coverage to those with pre-existing conditions and the right of parents to keep their adult children on their health insurance policies until the age of 25. November 11 reshuffle On November 11,", "-29.82129840257403" ], [ "to roll over like a fat dog and get scratched by the pharmaceutical and insurance companies because, gee, we have to apologize for so-called Obamacare. I'm not going to apologize a damn bit.\" Schweitzer has said that, instead of \"Obamacare,\" he supports expanding Medicare eligibility to all persons, instead of only those 65 years of age and older as under the current system. Under his proposal, persons not eligible for private health insurance would be able to pay to enroll in Medicare. He has presented his plan as a simpler alternative to \"Obamacare,\" saying it could \"fit on the", "-29.79808992802282" ], [ "plans have not been refiled with the regulatory agencies of the various states. Opponents argue that this situation makes it difficult or impossible for insurance companies to undo the policy cancellations made in preparation for Obamacare. Subsequent criticism President Obama's promise and the subsequent legislation aimed to allow American citizens to keep their healthcare plan were widely seen as promises that could not be kept. Obama's statement \"if you like your healthcare plan you can keep it...\" was later dubbed \"Lie of the Year\" by PolitiFact.com.", "-29.790837763401214" ], [ "to citizenship. Health care Enyart is against repealing the Patient Protection and Affordable Care Act. Speaking about the health care law, Enyart said \"Now are there problems with it? Of course there are problems with it. Let’s not throw the baby out with the bathwater. Let’s change the things that are problems and move on.\" In an analysis of 2014 campaign websites, The Hill found that Enyart is among six congressional Democrats whose websites do not mention the Affordable Care Act, noting that \"Most Democrats in competitive elections are seeking to avoid the topic, opting not to tout the controversial", "-29.78478022944182" ], [ "and complete repeal\" of the act.\nIn March 2017, DeSantis said that he wasn't ready to support the American Health Care Act, the House Republican effort to repeal and replace the Affordable Care Act. He did vote for the May 2017 Republican effort to repeal and replace the Affordable Care Act. Immigration DeSantis was a critic of President Obama's immigration policies; he opposed Obama's deferred action programs (Deferred Action for Childhood Arrivals (DACA) and Deferred Action for Parents of Americans (DAPA) and accused him of failing to enforce immigration laws. DeSantis opposes \"sanctuary cities.\" He is a co-sponsor of the Establishing", "-29.772591514803935" ], [ "being seen as favorable by Michele Bachmann who claimed on Twitter after the debate that the millennials she watched the debate with were favorable of Jindal. After Scott Walker unveiled his health care plan on August 18, Jindal insisted that it was similar to the Affordable Care Act and one of his staffers was reported to as saying that Walker collaborated with Democratic presidential candidate Bernie Sanders on the plan. On August 21, Jindal boasted that he displayed what he called \"videos uncovered\" from Planned Parenthood and furthered, \"I'm here to tell you Planned Parenthood should not get another dime", "-29.761298324498966" ], [ "Act (the ACA or \"Obamacare\"). He has sponsored legislation that would repeal the health care reform law and its amendments in the Health Care and Education Reconciliation Act of 2010. Cruz was part of the group of 13 Senators that drafted the Senate version of the AHCA behind closed doors. Hurricane aid In 2013, Cruz voted against the bill to provide a package of federal aid to the East Coast for recovery from Hurricane Sandy. Cruz said that he did not vote for Sandy disaster relief because the bill was \"filled with unrelated pork\" and that \"two-thirds of that bill", "-29.741815096291248" ], [ "described Meadows as the \"architect of the brink\" for his letter suggesting that Obamacare be defunded in any continuing appropriations bill. Meadows said that sensationalized his role.\nJohn Ostendorff of the Asheville Citizen-Times wrote that Meadows \"said it's best to close the government in the short term to win a delay on 'Obamacare', despite the potential negative impact on the economy.\" Ostendorff wrote that Meadows said he was doing what Tea Party members in Western North Carolina wanted him to do. Meadows said his constituents wanted him to fight against Obamacare \"regardless of consequences.\" Jane Bilello, head of the Asheville Tea", "-29.730656012368854" ], [ "supporting elements of Barack Obama's Patient Protection and Affordable Care Act. The conservative Citizens' Council for Health Freedom stated that he was attempting to implement the \"command and control\" infrastructure of Obamacare. Gottwalt subsequently withdrew the legislation. Health insurance conflict of interest Gottwalt came under the scrutiny of members of the House Ethics Committee in 2012 when lawmakers from that committee asked whether an arrangement violated ethics rules. The arrangement in question occurred in 2011, when Gottwalt sponsored the Healthy Minnesota Contribution Program, a bill that diverted Minnesotans receiving MinnesotaCare to the private insurance market. The legislation was part of", "-29.730522182682762" ], [ "five-page ruling agreed with Scott's argument that only the Commission on Ethics “has constitutional authority to investigate Mr. Hinkle's complaint.” Health care Scott has been a harsh critic of the Affordable Care Act, also known as Obamacare, but in his 2018 Senate campaign stopped harshly criticizing the bill. In 2017, Scott said that individuals with preexisting conditions should be protected. In June 2018, when the Trump administration sought to remove provisions of the Affordable Care Act protecting individuals with preexisting conditions, Scott declined to criticize the administration. Scott said that he did not know enough about it to comment.\nScott has", "-29.702972699073143" ], [ "of the Obama administration's proposal for universal control of the movement of capital.\" Health In a 2016 Twitter post, Carvalho stated, citing Dr. Carlos Armando de Moura Ribeiro, that \"vaccines either kill you or drive you crazy. Never vaccinate your children.\" \nHe has also falsely declared that AIDS does not pose a risk to heterosexuals, basing his arguments on journalist Michael Fumento's book The Myth of Heterosexual Aids. Politics Carvalho spread the debunked conspiracy theory that Barack Obama was not born in the United States. Furthermore, he has claimed that Foro de São Paulo \"is the largest political organization that", "-29.680944205698324" ], [ "to repeal and replace Patient Protection and Affordable Care Act (ACA or \"Obamacare\"). Shortly after taking office, he urged Congress to repeal and replace it. In May of that year, the House of Representatives voted to repeal it. Over the course of several months' effort, however, the Senate was unable to pass any version of a repeal bill. Trump has expressed a desire to \"let Obamacare fail\", and the Trump administration has cut the ACA enrollment period in half and drastically reduced funding for advertising and other ways to encourage enrollment. The tax reform Trump signed into law at the", "-29.677132282056846" ], [ "support for the picketers. He criticized the Bush tax cuts on many occasions.\nAffleck is pro-choice. In a 2000 interview, he stated that he believes \"very strongly in a woman's right to choose\". In 2012, he supported the Draw the Line campaign, describing reproductive rights as \"fundamental\". Affleck was a longtime supporter of legalizing gay marriage, saying in 2004 that he hoped to look back on the marriage debate \"with some degree of embarrassment for how antiquated it was\". Also that year, he remarked that it was \"outrageous and offensive\" to suggest members of the transgender community were not entitled to", "-29.65123293407305" ], [ "announced that President Obama was scheduled to attend an August 5 fundraiser for his candidate in Chicago.\nKirk and Giannoulias disagreed mostly on fiscal and foreign policy. Kirk voted against Obama's Stimulus package and the Patient Protection and Affordable Care Act. As a Congressman, Kirk originally voted for Cap and trade but during the primary campaign announced that if elected a Senator he would vote against it. Giannoulias strongly supported the Patient Protection and Affordable Care Act and Obama's stimulus. Kirk opposed the building of the Park 51 Islamic center near Ground Zero of New York City, while Giannoulias stated that", "-29.63198425306473" ], [ "on religion\". Time magazine argued that Perry's criticisms against Obama were overblown, as Catholic organizations had received $1.5 billion in federal grant monies in the last two years of Obama's administration.\nPerry gave an interview to the Des Moines Register editorial board arguing against the Supreme Court decisions to end prayer in schools. He said the rulings were made by \"eight unelected and, frankly, unaccountable judges\" and called the Supreme Court Justice Sonia Sotomayor \"Montemayor.\" The next day, he delivered a speech criticizing a $535 million bailout the Obama administration gave to the solar power industry, saying it was \"lost to", "-29.59101809025742" ], [ "Care Act of 2010. Pelosi was a key figure in convincing President Barack Obama to continue pushing for health-care reform after the election of Massachusetts Sen. Scott Brown in a January special election, a defeat that was seen as potentially fatal to Democratic reform efforts. After delivering 219 votes in the House for Obama's signature health-care package, Pelosi was both praised and heckled as she made her way to Capitol Hill.\nPelosi has voted to increase Medicare and Medicaid benefits. She does not endorse Senator Bernie Sanders' bill for single payer healthcare.\nOn March 10, 2017, Pelosi stated that Democrats would continue", "-29.58037171632168" ], [ "Social policy of the Barack Obama administration Abortion and contraception In his write-in response to a 1998 survey, Obama stated his abortion position as conforming with the Democratic platform: \"Abortions should be legally available in accordance with Roe v. Wade.\" His presidential candidacy was endorsed by several groups advocating for legal abortion, including NARAL Pro-Choice America and Planned Parenthood. In August 2008, in Lake Forest, California, Obama responded to the question as to when life begins, \"Whether you're looking at it from a theological perspective or a scientific perspective, answering that question with specificity is above my pay grade.\"\nIn the", "-29.579538060352206" ], [ "balances a respect for religious diversity against the need to prevent fraud and abuse.\"\nAccording to Grace-Marie Turner of the National Review, that bill would not \"fix\" Obamacare, but would make \"an important statement about bipartisan support for religious liberty.\"\nThe American Humanist Association opposed the bill and urged its members to contact their representatives and tell them to oppose the bill as well. According to the American Humanist Association, \"religious freedom is being misrepresented by those who support this bill, and it’s time for those who really care about our First Amendment rights and the health of children to step up", "-29.561149993911386" ], [ "opposes government-funded elective abortions in accordance with the Hyde Amendment. He has been a strong supporter of legislation to establish a national childhood cancer database and an increase in funding for autism research. Brownback supports negotiating bulk discounts on Medicare drug benefits to reduce prices. In 2007, Senators Brownback and Sherrod Brown (D-OH) sponsored an amendment to the Food and Drug Administration Amendments Act of 2007. The amendment created a prize as an incentive for companies to invest in new drugs and vaccines for neglected tropical diseases. It awards a transferable \"Priority Review Voucher\" to any company that obtains approval", "-29.532881515158806" ], [ "September 2019.\nA July 2018 NBC News editorial stated that Jones had voted with Trump more often than all but three of his fellow Democratic senators while also taking liberal positions more in line with his party, including LGBT rights. Social issues Jones supports the reversal of mandatory three-strikes laws for nonviolent offenses to give judges flexibility in giving sentences. He opposed both immigration bills proposed in the Senate since he took office. Abortion Jones is pro-choice on abortion. In 2018, Planned Parenthood, which is pro-choice, gave him a 100% rating while the anti-abortion National Right to Life Committee gave him", "-29.528995694898185" ], [ "Barack Obama and the Democratic presumptive nominee, Hillary Clinton, arguing that the country and world had become less safe during their time in office. However, Trump attempted to reach out to supporters of defeated Democratic candidate Bernie Sanders, as well as down-and-out urbanites. In his speech, Trump also became the first Republican nominee to mention the LGBT community in a GOP nomination address, saying, \"As your president, I will do everything in my power to protect our LGBTQ citizens from the violence and oppression of a hateful foreign ideology.\" Reception of Trump's speech Philip Rucker and David Fahrenthold of the", "-29.503434549696976" ], [ "\"partial-birth\" abortions saying the ban didn't sufficiently consider the mother's health. He has, however, expressed support of banning some late-term abortions, provided they include exemptions for the mental and physical health of the mother.\nDuring the third debate during the 2008 presidential election, Obama further detailed his stance on abortion:\n\n\"[...] there surely is some common ground when both those who believe in choice and those who are opposed to abortion can come together and say, 'We should try to prevent unintended pregnancies by providing appropriate education to our youth, communicating that sexuality is sacred and that they should not be engaged", "-29.492654301575385" ], [ "children.\" Friedman also criticized Comstock's FedEx package comparison, saying it did not respect human dignity. Hill has argued that Comstock has not been vocal enough in her support of Trump's immigration policies. Hill supports building a border wall and ending the concept of anchor babies.\nHill supported leaving intrastate cannabis policy to individual states to decide, while all six Democratic candidates favor decriminalizing cannabis, and Helmer advocated legalizing it entirely. Hill said that keeping families together would reduce crime rates, while Friedman said, \"I have to say, as a single mom, I think there are more important things we can do", "-29.484623630036367" ], [ "Alito as an outstanding judge but dismissed claims that Alito is radical, saying, \"He is conservative, yes, but he is not radically conservative like Scalia.\" Fried testified before the Senate Judiciary Committee and wrote a New York Times op-ed in support of Alito, who had served under him in the Solicitor General's office.\nOn October 24, 2008, despite his previous support for the presidential aspirations of Senator John McCain, Fried announced that he had voted for Senator Barack Obama for President by absentee ballot. Fried cited Senator McCain's selection of Governor Sarah Palin as his running mate as the", "-29.476638422580436" ], [ "Obama responded to the statement, saying that he \"does not believe that John McCain or his policy criticism is in any way comparable to George Wallace or his segregationist policies.\" Lewis later issued a follow-up statement clarifying that he had not compared McCain and Palin to Wallace himself, but rather that his earlier statement was a \"reminder to all Americans that toxic language can lead to destructive behavior.\"\n\nOn an African American being elected president, he said:\nIf you ask me whether the election ... is the fulfillment of Dr. King's dream, I say, \"No, it's just a down payment.\" There's still", "-29.455398857826367" ], [ "Post, President Trump \"settled on a strategy of fear – laced with falsehoods and racially tinged rhetoric – to help lift his party to victory in the coming midterms, part of a broader effort to energize Republican voters\". In November 2018, Facebook, NBC, and Fox News withdrew a controversial pro-Trump advertisement that focused on a migrant caravan; Facebook noted that the ad violated Facebook's rules concerning \"sensational content\".\nNearly half of all advertisements by Democrats focused on health care, in particular on defending the Patient Protection and Affordable Care Act (also known as Obamacare or the Affordable Care Act) and keeping in place", "-29.44748696591705" ] ]
1x24ng
Psychologically and physically. What is the difference between water boarding and dunking someone's head in a bucket of water?
[ "Water boarding is a simulation of drowning, while dunking *is* drowning. ***I don't recommend it***, but if you really want you can water board yourself pretty easily. I've done it and only lasted about half a second before I almost had a panic attack. While in the shower, wet a wash cloth. Place it over your face, including your nose and mouth, and look up into the shower head and breathe in.", "Waterboarding triggers all the fear and physiological reflexes of real drowning, but with the prisoner strapped down and water poured in a controlled manner, it is easier to administer and it does not carry the risk of actually drowning him.", "In dunking, your head is force under water. Its shocking but technically you can hold your breath and be fine. Generally with most waterboarding we hear about, a rag is placed over your mouth (cant breath - cant take a proper breath and hold it), then continuous water is poured over you. Small amounts leak through and down your mouth limiting your already limited air path. You struggle for every breath. Your not bobbing for apples, your essentially being choked with water, allowed to breath and choked with water again and again. Not only this, but because you cant take complete breaths, your looking at an imbalance of CO2 and oxygen so you may experience oxygen starvation and such. You are being drowned but it doesnt end in a blissful drowning induced comma like typical drowning. Physically, your looking at damage to the lungs, heart and brain. But this is \"torture light\" so most physical damage will be internal. Psychologically, your fucked. Assuming this is ongoing the person may experience but not limited too , PTSD, serve mental distress, paranoid, sucidial tendencies, self harm, disassociation and numerous other affects that would appear in some rather then others. In my opinion, the psychological damage of torture like waterboarding greatly out weighs any physical pain or damage." ]
[ [ "Waterboarding Etymology While the technique has been used in various forms for centuries, the term water board was recorded first in a 1976 UPI report: \"A Navy spokesman admitted use of the 'water board' torture ... to 'convince each trainee that he won't be able to physically resist what an enemy would do to him.'\" The verb-noun waterboarding dates from 2004. First appearance of the term in the mass media was in a New York Times article on 13 May 2004:\nIn the case of Khalid Shaikh Mohammed, a high-level detainee who is believed to have helped plan the attacks of", "-31.02445874590194" ], [ "new words to mask the similarities. This creates an inside club, especially important in work where secrecy matters. Waterboarding is clearly a jailhouse joke. It refers to surfboarding\"– a word found as early as 1929– \"they are attaching somebody to a board and helping them surf. Torturers create names that are funny to them.\"\nWebster's Dictionary first included the term in 2009: \"[A]n interrogation technique in which water is forced into a detainee's mouth and nose so as to induce the sensation of drowning.\" Technique Waterboarding was characterized in 2005 by former CIA director Porter J. Goss as a \"professional interrogation", "-30.989746745297452" ], [ "arguably different because instead of being strapped to a board, the prisoner is held down by two soldiers as a third pours water from a canteen over a cloth covering face.\nOne eyewitness depiction of waterboarding is a painting by Vann Nath, a Cambodian artist who was held captive and tortured by the Khmer Rouge. After his release in 1979 from Tuol Sleng Prison, he began to paint pictures of the abusive practices used there, including waterboarding, to let people know about them, saying of the prisoners he heard screaming for help: \"I would like their souls to get something from", "-30.559457547878992" ], [ "waterboarding to prove that it is not torture, but changed his mind because of the experience.\nSean Hannity, another commentator who claims that waterboarding is not torture and has described those who oppose waterboarding as \"moral fools\", had declared on 22 April 2009 that he would similarly subject himself to waterboarding to prove that it is not torture. Hannity has yet to subject himself to the technique even though Keith Olbermann and Jesse Ventura have made public wagers regarding Hannity's inability to withstand the treatment.\nIn an 11 May 2009 interview with Larry King, Ventura stated:\n[Waterboarding is] drowning. It gives you the", "-29.001819432218326" ], [ "used a precursor to waterboarding during the Amboyna massacre of English prisoners, which took place on the island of Amboyna in the Molucca Islands in 1623. At that time, it consisted of wrapping cloth around the victim's head, after which the torturers \"poured the water softly upon his head until the cloth was full, up to the mouth and nostrils, and somewhat higher, so that he could not draw breath but he must suck in all the water\". In one case, the torturer applied water three or four times successively until the victim's \"body was swollen twice or thrice as", "-28.562786669332127" ], [ "face, allowing him to breathe. In his article on the topic, he stated \"Well, then, if waterboarding does not constitute torture, then there is no such thing as torture.\" In 2016, conservative commentator Steven Crowder demonstrated waterboarding on his YouTube channel. Mental and physical effects Allen Keller, the director of the Bellevue Hospital/New York University Program for Survivors of Torture, has treated \"a number of people\" who had been subjected to forms of near-asphyxiation, including waterboarding. In an interview for The New Yorker, he argued that \"it was indeed torture. 'Some victims were still traumatized years later', he said. One", "-28.059717631724197" ], [ "of water and oxygen deprivation. In other words there is no doubt that waterboarding causes severe physical and/or mental suffering– one central element in the UNCAT's definition of torture. In addition the CIA's waterboarding clearly fulfills the three additional definition criteria stated in the Convention for a deed to be labeled torture, since it is 1) done intentionally, 2) for a specific purpose and 3) by a representative of a state– in this case the US.\nLt. Gen. Michael D. Maples, the director of the Defense Intelligence Agency, concurred by stating, in a hearing before the Senate Armed Services Committee, that", "-27.9703115887678" ], [ "positions, and simulated dog attacks\". Dershowitz later told the New York Times columnist William Safire that, \"when I first used the word, nobody knew what it meant.\"\nTechniques using forcible drowning to extract information had hitherto been referred to as \"water torture\", \"water treatment\", \"water cure\" or simply \"torture\".\nProfessor Darius Rejali of Reed College, author of Torture and Democracy (2007), speculates that the term waterboarding probably has its origin in the need for a euphemism. \nThere is a special vocabulary for torture. When people use tortures that are old, they rename them and alter them a wee bit. They invent slightly", "-27.634333239344414" ], [ "from a jar so that they had the impression of drowning\". William Schweiker claims that the use of water as a form of torture also had profound religious significance to the Inquisitors.\nIn general, waterboarding seemed to be very extended in the Spanish detention centers in the 1500s. Books from the time explain how to treat persons in custody, and used this \"light\" form of torture. After a specific way of beating, body, legs and arms, it was detailed how to pour 4 cuartillos (approx. 2.5 liters) of water over mouth and nose, with a covering cloth, making sure there was", "-27.584792292589555" ], [ "pain you are likely to experience an immediate and extreme fear of death. You may even suffer a heart attack from the stress or damage to the lungs and brain from inhalation of water and oxygen deprivation. In other words there is no doubt that waterboarding causes severe physical and/or mental suffering – one central element in the UNCAT's definition of torture. In addition the CIA's waterboarding clearly fulfills the three additional definition criteria stated in the Convention for a deed to be labeled torture, since it is 1) done intentionally, 2) for a specific purpose and 3) by a", "-27.520878289542452" ], [ "International Rehabilitation Council for Torture Victims and former member of the United Nations Committee Against Torture has said:\nIt's a clear-cut case: Waterboarding can without any reservation be labeled as torture. It fulfils all of the four central criteria that according to the United Nations Convention Against Torture (UNCAT) defines an act of torture. First, when water is forced into your lungs in this fashion, in addition to the pain you are likely to experience an immediate and extreme fear of death. You may even suffer a heart attack from the stress or damage to the lungs and brain from inhalation", "-27.50630868609005" ], [ "Water-level task The water-level task is an experiment in developmental and cognitive psychology developed by Jean Piaget.\nThe experiment attempts to assess the subject's reasoning ability in spatial relations. To do so the subject is shown pictures depicting various shaped bottles with a water level marked, then shown pictures of the bottles tilted on different angles without the level marked, and the subject is asked to mark where the water level would be.", "-27.264109901414486" ], [ "program on WLS, having lost a listener poll determining whether he or co-host Pat Cassidy would be the one waterboarded. The talk show host had previously claimed that calling waterboarding \"torture\" was wrong, something he had stated that he hoped his reenactment would prove. Lasting only 6 seconds (\"8 seconds less than the average person\", according to program guest Marine Sergeant Klay South), Mancow afterward changed his opinion, saying, \"It is way worse than I thought it would be, and that's no joke\", and described waterboarding as \"absolutely torture\".\nQuestions were later raised about the validity of the procedure. South had", "-27.19346320279874" ], [ "Dry-boarding Dry-boarding is a torture method that induces the first stages of death by asphyxiation. Unlike waterboarding, where water is poured on a wet cloth placed over a supine subject's airways, so their breathing slowly fills their lungs with water, dryboarding induces asphyxiation through stuffing the subject's airways with rags, then taping shut his mouth and nose. It is among techniques used by the United States during its war on terror: CIA and military agents under the Bush administration described this as among enhanced interrogation techniques. It has since legally been defined by US courts as torture.\nAli Saleh al-Marri, a", "-27.014799914555624" ], [ "In a press conference on 30 April, President Obama also stated, \"I believe waterboarding was torture, and it was a mistake.\" Description by U.S. media In covering the debate on the use of waterboarding as an interrogation technique by the U.S. government, U.S. reporters had to decide whether to use the term \"torture\" or \"enhanced interrogation techniques\" to describe waterboarding. National Public Radio's ombudsman detailed this debate and why NPR had decided to refrain from using the word torture to describe waterboarding. Due to criticism of the policy by the media and to NPR directly, a second piece was written", "-26.81359635003537" ], [ "person extends his foot farther into the other person's stall. They continue this process until both of them are sure that the signal is really for sex. Jargon Specific names are often used to designate the various sex positions used for bathroom sex. In the \"toilet rider\" position, a man sits on the toilet lid and the passive partner sits over him, facing either backwards or forwards. In the \"doggy's sink\" position, the passive partner leans over the hand basin, and is penetrated from the rear, giving the active partner a view of the passive partner's front in the", "-26.65685428274446" ], [ "splashes water into the face of an opponent, the defensive player is excluded from the game for twenty seconds, known as a 'kick out' or an ejection. The attacking team typically positions 4 players on the 2 metre line, and 2 players on 5 metre line (4–2), passing the ball around until an open player attempts a shot. Other formations include a 3–3 (two lines of three attackers each) or arc (attackers make an arc in front of the goal and one offensive player sits in the 'hole' or 'pit' in front of the goal). The five defending players try", "-26.279305603908142" ], [ "an action far outside the normal level of acceptable behavior and was commonly given when a player has \"made a travesty of the game\". Water polo An ejection is called for a hold, sink, or pullback by a defensive player, on an opponent without active control of the ball. Their team must play with one fewer defender until 20 seconds have elapsed or there is a change of possession, after which the ejected player or a substitute can reenter the game. These 6 vs 5 situations are often called \"man up\", \"man down\", or a \"power play\". Should any player", "-26.206936130154645" ], [ "put forward that it might not be torture in all cases, or that it is unclear. The U.S. State Department has recognized \"submersion of the head in water\" as torture in other circumstances, for example, in its 2005 Country Report on Tunisia.\nThe United Nations' Report of the Committee Against Torture: Thirty-fifth Session of November 2006, stated that state parties should rescind any interrogation techniques, such as waterboarding, that constitutes torture or cruel, inhuman, or degrading treatment or punishment. Classification in the U.S. Whether waterboarding should be classified as a method of torture was not widely debated in the United States", "-26.17076148794149" ], [ "Where's My Water? Gameplay Swampy, an alligator living in a city sewer system, hates being dirty, but whenever he tries to take a bath, Cranky, another alligator living in the sewers, disrupts the water flow to Swampy's home. Located somewhere on the level is a supply of water, either a finite amount pooled at various locations or an infinite amount flowing from a pipe. Players use the touch screen on their device to dig through the dirt and redirect the water toward an inlet leading to Swampy's bathtub. Occasionally, the water must be routed through other pipes or must", "-26.033820772474428" ], [ "wrote an entry on the Small Wars Journal Blog named \"Waterboarding is Torture... Period.\" Nance was a US Navy counterterrorism specialist and testified before a House judiciary subcommittee concerning US torture practices. He may not have a law degree or wield political power, but he has \"personally led, witnessed and supervised waterboarding of hundreds of people\" during his stint as a Survival, Evasion, Resistance, and Escape (SERE) School instructor. The final paragraph of his entry asks that \"Congressional leaders from both sides of the aisle... stand up for American values and clearly specify that coercive interrogation using the waterboard is", "-25.918893389087316" ], [ "prisoner of war in North Vietnam during the Vietnam War, has stated unequivocally several times that he considers waterboarding to be torture:\nwaterboarding, ...is a mock execution and thus an exquisite form of torture. As such, they are prohibited by American laws and values, and I oppose them.\nProfessors such as Wilson R. Huhn have also challenged the legality of waterboarding.\nIn May 2008, author and journalist Christopher Hitchens voluntarily underwent waterboarding and concluded that it was torture. He also noted that he suffered ongoing psychological effects from the ordeal.\nOn 22 May 2009, radio talk show host Erich \"Mancow\" Muller subjected himself to", "-25.884136657339695" ], [ "Splashdown (video game) Gameplay Splashdown is quite similar to Nintendo's Wave Race series. Players take control of a personal water craft as they race against each other on various courses. Players must pass the correct side of buoys on the way, or the personal water craft may stall as a penalty.", "-25.839009905350395" ], [ "hypoxia directly, or by drowning caused by unconsciousness. The health and safety executive of Northern Ireland specifies activity in a slurry pit as specialist work, requiring the worker to have a separate air supply and a harness lifeline managed by two additional people outside the tank.", "-25.794940406281967" ], [ "swimming pool, although it may also be played while swimming in shallow natural bodies of water (typically the areas near the shores of oceans, seas, and lakes). The players may be swimming, treading water, or walking on the bottom of the pool or body of water. The person designated \"it\" is required to close their eyes, and shouts \"Marco!\" at regular intervals; the other players must shout \"Polo!\" in response. \"It\" must use sound localization to find one of the other players and tag them. The tagged player then generally becomes \"it,\" and the process repeats. Muckle Muckle (sometimes called", "-25.7042090127361" ], [ "number of instances that were not prolonged or extensive\", waterboarding should not qualify as torture under the law. McCarthy has also stated that \"waterboarding is close enough to torture that reasonable minds can differ on whether it is torture\" and that \"[t]here shouldn't be much debate that subjecting someone to [waterboarding] repeatedly would cause the type of mental anguish required for torture\".\nMany former senior George W. Bush administration officials, on the other hand, have seriously questioned or directly challenged the legality of waterboarding. These include former State Department Counselor Philip Zelikow, former Deputy Secretary of State Richard Armitage, former Homeland", "-25.44480473169824" ], [ "[his] mind wander\" and, like what the instructor had described as \"only about 10% of her students\", he fell into the \"chilly\" water. All the same, Pozniak called the experience a \"sensory adventure\" with mewing seagulls, the ocean breeze, and the scent of salt water: both \"soothing\" and \"energizing\".\nLauren Ladoceour, in Yoga Journal in 2013, wrote that stand up paddleboarding was created in the 1940s by surfers at Waikiki in Hawaii. She described paddle board yoga as bringing \"a sense of joyful freedom to an otherwise earth-bound yoga practice.\" Classes began with kneeling poses like Cat-Cow, advancing to standing asanas", "-24.995665171649307" ], [ "lessons.\nThere is an essential difference between the new infant swimming lessons and the traditional parent-child water play sessions. Infant swimming lessons, sometimes called infant swim recovery, teach infants and toddlers how to recover from an accidental fall into a body of water. Unlike traditional parent/toddler classes, which encourage the child's face in the water through blowing bubbles, infant swimming lessons instill in the child the skills to regain buoyancy from a submerged state and to tilt the head back, getting it out of the water to take breaths and cry for help. Children ages one to six-years-old learn advanced", "-24.97963850677479" ], [ "water and \"drips\" a small amount on each person's head. They will then select someone in the circle to \"drop\" the entire container on top of them. This player will then try to tag the \"it\" before the \"it\" sits in the spot of the person who got \"dropped\" on. If \"it\" is tagged then they will remain \"it\" for another round. Vrot Eier A similar, common Afrikaner game is called \"vrot eier\", meaning rotten egg. Instead of saying anything or pointing at anybody a token of some kind (usually a handkerchief) is carried by the one who is \"it\"", "-24.930599937491934" ], [ "Superior Court in Delaware. The accusation made by the State Police that Morse had force-fed his step-daughter was not substantiated at trial. The step-daughter testified at trial that she vomited due to overeating, not force feeding.\nMorse placed her in the bathtub and ran water over her head to rinse the vomit out of her hair. This was the testimony which spawned the term \"waterboarding\" by the prosecution and the media. The trial transcripts contain no testimony regarding any instances of \"waterboarding\" in the context of torture as it is known today.\nMorse was convicted of one felony count of first-degree reckless", "-24.929287906415993" ], [ "considered dirty. The Burmese separate things used for the face and head from things used for the lower body, such as towels, cleaning basins, and soaps. Furthermore, underwear is not raised above head level, and a woman's lower body clothes, such as the traditional Longyi, are not placed to dry or hang in areas that a male or a monk may pass, such as upper levels of corridors.\nRules of etiquette regarding the feet are numerous. Using the water from a public drinking pot to rinse off one's feet is considered an insult. Feet, no matter how clean, are", "-24.904151735343476" ], [ "the newspapers described waterboarding as torture far more frequently when it was performed by countries other than the United States. Spanish Inquisition A form of torture similar to waterboarding is called toca, and more recently \"Spanish water torture\", to differentiate it from the better known Chinese water torture, along with garrucha (or strappado) and the most frequently used potro (or the rack). This was used infrequently during the trial portion of the Spanish Inquisition process. \"The toca, also called tortura del agua, consisted of introducing a cloth into the mouth of the victim, and forcing them to ingest water spilled", "-24.771729165728175" ], [ "in the effort to raise the mouth long enough to breathe, and tilting the head back. As an instinctive reaction, this is not consciously mediated nor under conscious control.\nThe lack of leg movement, upright position, inability to talk or keep the mouth consistently above water, and (upon attempting to reach the victim) the absence of expected rescue-directed actions, are evidence of the condition. Timing The instinct takes place for typically no longer than the final 20–60 seconds during drowning and before sinking underwater. In comparison, a person who can still shout and keep their mouth constantly above water may be", "-24.76207087613875" ], [ "complete sensation that you are drowning. It is no good, because you—I'll put it to you this way, you give me a water board, Dick Cheney and one hour, and I'll have him confess to the Sharon Tate murders. ... If it's done wrong, you certainly could drown. You could swallow your tongue. [It] could do a whole bunch of stuff to you. If it's done wrong or—it's torture, Larry. It's torture.\nOn 15 January 2009, U.S. President-elect Barack Obama's nominee for Attorney General, Eric Holder, told his Senate confirmation hearing that waterboarding is torture and the President cannot authorize it.", "-24.701825595380797" ], [ "real health risk and squat toilets allow splatter on one's own legs and feet. The waterless trough minimizes the risk of splash-back of water during defecation. Perceptions There are two different attitudes towards squat toilets, largely dependent on what users are used to, or whether the toilet is at a public or private place:\nSome people regard squat toilets as more hygienic compared to sitting toilets. They might be easier to clean and there is no skin contact with the surface of the toilet seat. For that reason, some people perceive them as more hygienic, particularly for public toilets.\nSome people regard", "-24.6719631752203" ], [ "Jessica Antonia Liberona Ninoles and detained her in a dark, solitary room. She was stripped naked, forced to lie down on an uncomfortable prison cot and was not permitted to sleep for five days during the interrogation period. The captors constantly threatened to kidnap her nine-year-old daughter from school if she failed to cooperate.\nAccording to the Valech Commission, waterboarding was one of the torture methods most commonly recorded by victims of imprisonment and torture. The captors poured water over a cloth that covered the victims' faces and breathing passages, causing individuals to experience a drowning sensation, and a near-death experience.", "-24.645057414731127" ], [ "Sledging (cricket) Sledging is a term used in cricket to describe the practice whereby some players seek to gain an advantage by insulting or verbally intimidating the opposing player. The purpose is to try to weaken the opponent's concentration, thereby causing them to make mistakes or underperform. It can be effective because the batsman stands within hearing range of the bowler and certain close fielders; and vice versa. The insults may be direct or feature in conversations among fielders designed to be overheard. The term has also been used in other sports, as when the tennis player Nick Kyrgios insulted", "-24.56252141931327" ], [ "boat people might easily get ill.\nAs most of the boat people work on land, it was difficult for parents to take care of their children. Children became more likely to be involved in different accidents, like drowning. Thus, many parents tied up their children aiming at finding the dead bodies easily once the children drowned. Possible discrimination Boat people were regarded as competitors in job market by land dwellers, which could lead to discrimination. Yau Ma Tei boat people had their own accents, which were different with people on land. For example, the word feet in Cantonese was pronounced as", "-24.560540626760485" ], [ " They may have involuntary muscles spasms on one side of their body. They have fine motor control on their dominant side of the body, which can present as asymmetry when they are in motion. People in this class tend to have energy expenditure similar to people without cerebral palsy.\nBecause of the neuromuscular nature of their disability, CP7 swimmers have slower start times than other people in their classes. They are also more likely to interlock their hands when underwater in some strokes to prevent hand drift, which increases drag while swimming. CP6 and CP7", "-24.550633992941584" ], [ "the armpits. If the person is unconscious they may be pulled in a similar fashion held at the chin and cheeks, ensuring that the mouth and nose are well above the water.\nRescue, and where necessary, resuscitation, should be started as early as possible. If conscious, the person should be taken out of the water as soon as possible. In-water resuscitation may increase the chances of a favourable result by a factor of about three, if there will be any delay in getting the person out of the water, but the necessary skills require training. Only rescue ventilation is practicable in", "-24.506974257841648" ], [ "and his mom nags him to clean it up, he eventually keeps it clean to remove his mom's nagging.) Punishment is trying to decrease behavior, either by using negative or positive. Positive punishment is when you add an unwanted stimulus to decrease the target's behavior. (e.g., spanking a child when he behaves badly.) Here, spanking is being added to decrease his bad behavior. Negative punishment is when you remove something the target enjoys or likes to remove his or her bad behavior. (e.g. your child comes home past curfew every weekend, you remove watching TV when he is past curfew,", "-24.467580514407018" ], [ "amount of water, which can have enough force for flushing, but that also requires some degree of artistry in the way one douses the water. Cultural issues Non-Filipinos might be disgusted about this practice, but Filipinos will cringe if they learn that a person uses only toilet paper.\nA controversy where in a Filipino machine operator was reportedly sacked by an engineering firm in Australia allegedly for his toilet habits sparked last January 2009.\nA Townsville Bulletin report posted on news.com.au said that Amador Bernabe, 43 years old, who is a Filipino machine operator, was kicked out of his job by the", "-24.414720696511495" ], [ "representative of a state – in this case the US.\nBoth Human Rights Watch and Amnesty International have condemned waterboarding as a form of torture, the latter group demanding that former president George W. Bush be prosecuted.\nLt. Gen. Michael D. Maples, the director of the Defense Intelligence Agency, concurred by stating, in a hearing before the Senate Armed Services Committee, that he believes waterboarding violates Common Article 3 of the Geneva Conventions.\nThe Tokyo War Crimes Tribunal and United Nations War Crimes Commission both defined waterboarding as ill-treatment and torture in the aftermath of World War II.\nThe CIA director testified that waterboarding", "-24.4007102193209" ], [ "a historical record of regarding waterboarding as a war crime, and has prosecuted individuals for such practice in the past.\nIn 1947, during the Yokohama War Crimes Trials, the United States prosecuted a Japanese civilian who had served in World War II as an interpreter for the Japanese military, Yukio Asano, for \"Violation of the Laws and Customs of War\", asserting that he \"did unlawfully take and convert to his own use Red Cross packages and supplies intended for\" prisoners, but, far worse, that he also \"did willfully and unlawfully mistreat and torture\" prisoners of war. The charges against Asano included", "-24.381153170834295" ], [ "the force. Apartheid in the Union of South Africa The South African Truth and Reconciliation Commission received testimony from Charles Zeelie and Jeffrey Benzien, officers of the South African Police under Apartheid, that they used waterboarding, referred to as \"tubing\", or the \"wet bag technique\" on political prisoners as part of a wide range of torture methods to extract information. Specifically, a cloth bag was wet and placed over victim's heads, to be removed only when they were near asphyxiation; the procedure was repeated several times. The TRC concluded that the act constituted torture and a gross human rights violation,", "-24.318833001627354" ], [ "becomes higher or lower than the surrounding water due to volume change of the swim bladder following ascent or descent, it can correct this difference over time by a physiological process involving controlled absorption and elimination of gases via the blood circulation, the gills, and a gland adjacent to the swim bladder.\nThe human brain exhibits approximately neutral buoyancy as a result of its suspension in cerebrospinal fluid. The actual mass of the human brain is about 1400 grams; however, the net weight of the brain suspended in the CSF is equivalent to a mass of 25 grams. The brain, therefore, exists", "-24.316961271862965" ], [ "personal position and movement, and in association with the vestibular and visual input, allowing the diver to function effectively in maintaining physical equilibrium and balance in the water.\nIn the water at neutral buoyancy, the cues of position received by the kinesthetic, proprioceptive and organic senses are reduced or absent. This effect may be exacerbated by the diver's suit and other equipment. Smell and taste Senses of taste and smell are not very important to the diver in the water but more important to the saturation diver while in accommodation chambers. There is evidence of a slight decrease in threshold", "-24.29741691768868" ], [ "prohibited by 18 U.S.C. § 2340 (the implementation in the United States of the United Nations Convention Against Torture), that the psychological effects can last long after waterboarding ends (another of the criteria under 18 USC 2340), and that uninterrupted waterboarding can ultimately cause death. Classification as torture Waterboarding is considered to be torture by a wide range of authorities, including legal experts, politicians, war veterans, intelligence officials, military judges, and human rights organizations. David Miliband, then United Kingdom Foreign Secretary, described it as torture on 19 July 2008, and stated \"the UK unreservedly condemns the use of torture\". Arguments have been", "-24.232322852301877" ], [ "their body. They have fine motor control on their dominant side of the body, which can present as asymmetry when they are in motion. People in this class tend to have energy expenditure similar to people without cerebral palsy.\nBecause of the neuromuscular nature of their disability, CP7 and CP8 swimmers have slower start times than other people in their classes. They are also more likely to interlock their hands when underwater in some strokes to prevent hand drift, which increases drag while swimming. CP8 swimmers experience swimmers shoulder, a swimming related injury, at rates similar to their", "-24.187494533369318" ], [ "as a, \"severe pain, accompanied by a tightness of his forehead\". In addition to this he experienced a choking sensation, discrete panic attacks and a reduction in his intake of fluids. These manifestations can have a profound effect on a person's health, work, confidence and overall well being.\nhttps://www.fearof.net/fear-of-water-phobia-aquaphobia/ Etymology The correct Greek-derived term for \"water-fear\" is hydrophobia, from ὕδωρ (hudōr), \"water\" and φόβος (phobos), \"fear\". However, this word has long been used in English to refer specifically to a symptom of later-stage rabies, which manifests itself in humans as difficulty in swallowing, fear when presented with liquids to drink,", "-24.149335036054254" ], [ "to tap the swimmers when they approach the wall, indicating when the swimmer should turn or end the race. No prostheses or assistive devices may be worn during competition. Classification Swimmers are classified according to the type and extent of their disability. The classification system allows swimmers to compete against others with a similar level of function.\nSwimmers with physical disabilities are allocated a category between 1 and 10, with 1 corresponding to the most severe types of disability. Physical disabilities of Paralympic swimmers include single or multiple limb loss (through birth defects and/or amputation), cerebral palsy, spinal cord injuries (leading", "-24.12098499009153" ], [ "a method of torture. During the Japanese occupation of Singapore, the Double Tenth Incident occurred. This included waterboarding, by the method of binding or holding down the victim on his back, placing a cloth over his mouth and nose, and pouring water onto the cloth. In this version, interrogation continued during the torture, with the interrogators beating the victim if he did not reply and the victim swallowing water if he opened his mouth to answer or breathe. When the victim could ingest no more water, the interrogators would beat or jump on his distended stomach.\nChase J. Nielsen, one of", "-24.11451421356469" ], [ "discipline, usually, for older children, preteens and teenagers, that restricts their movement outside of the home, such as visiting friends or using the car and they are not allowed to go anywhere but school and few required places. Sometimes it is combined with the withdrawal of privileges for computer, video games, telephone or television. Scolding Scolding involves reproving or criticizing a child's negative behavior and/or actions.\nSome research suggests that scolding is counter-productive because parental attention (including negative attention) tends to reinforce behavior. Non-punitive discipline While punishments may be of limited value in consistently influencing rule-related behavior, non-punitive discipline techniques have", "-24.11386665752798" ], [ "\"take shit\" means to receive bad or frivolous treatment from someone. Such an abused person might say \"I'm not taking any more of your shit!\" to indicate that they will no longer tolerate such treatment.\nWhale shit is sometimes used to describe a person who inspires displeasure or disgust, as in: \"You're lower than whale shit at the bottom of the ocean!\"\n“You can’t polish shit” is a popular aphorism roughly equivalent to \"putting Lipstick on a pig\" (although \"a turd\" is more commonly used). Dominance Shit can also be used to establish social superiority over someone else. The most common gibe", "-24.079195138561772" ], [ "platforms are unofficial, and simply known among the children in a community. For example, the children are often trespassing on quarry land, or the like, when they use the platforms. Usually the locals check the water to make sure it is deep enough and free of clutter, but there is always the danger of a dead fish or beverage can, bottle, branches, or the like floating near the surface of the water. Bad angle of entry can also cause injury even in the absence of clutter (e.g. broken bones or re-arrangement of internal organs from the impact of the water", "-24.062928606639616" ], [ "Water torture Water torture encompasses a variety of techniques using water to inflict physical or psychological harm on a victim as a form of torture or execution. Forced ingestion In this form of water torture, water is forced down the throat and into the stomach. It was used as a legal torture and execution method by the courts in France in the 17th and 18th century. At the end of the 19th century and beginning of the 20th century it was used against Filipinos by American Forces during the Philippine–American War and was employed against British Commonwealth, American and Chinese", "-24.056857075465814" ], [ "well as more firearms and bows, and more equipment as needed.\nWhen the player wades into water deeper than waist-level, they will automatically swim and the same controls for walking apply. The player may not equip a weapon or use any items while in the water. If the player drives their vehicle into the water, they will not be able to recover the vehicle without restarting the hunt.\nAny objects that the player uses - besides their weapons - will not actually be shown, even in third person. Calls, lures, food, water, medical bags, and scent cover will only play a fixed", "-24.04369729256723" ], [ "The suffocation of bound prisoners with water has been favored because, unlike most other torture techniques, it produces no marks on the body. CIA officers who have subjected themselves to the technique have lasted an average of 14 seconds before capitulating. According to at least one former CIA official, information retrieved from the waterboarding may not be reliable because a person under such duress may admit to anything, as harsh interrogation techniques lead to false confessions. \"The person believes they are being killed, and as such, it really amounts to a mock execution, which is illegal under international law\", says John", "-23.998067607346456" ], [ "invent others on their own. He does not approve of making interrogation techniques public information on the basis that it would allow enemy combatants to train and prepare themselves for what they might go through if captured. He drew criticism when, during a debate he made a comment comparing waterboarding to swimming, stating \"There are different ways of doing it. It's like swimming, freestyle, backstroke\", in response to the question \"do you think that waterboarding... constitutes torture?\" Free trade Bond has been a great supporter of expanding free trade to the third world, and he believes in giving presidential authority", "-23.96952225267887" ], [ "attention being paid to them by the individual. Neglect of personal hygiene may mean that the person suffers social difficulties and isolation.\nSelf-neglect can also lead to the individual having a general reduction in attempts to maintain a healthy lifestyle, with increased smoking, drug misuse or lack of exercise.\nAny mental causes of the self-neglect may also lead to the individual refusing offers of help from medical or adult social services. Use in assessment of needs Neglect of hygiene is considered as part of the Global Assessment of Functioning, where it indicates the lowest level of individual functioning. ", "-23.93889016347748" ], [ "his opponent, Stan Wawrinka, by referring to a purported encounter between another player and the latter's girlfriend.\nThere is debate in the cricketing world as to whether this constitutes poor sportsmanship or good-humoured banter. Sledging is sometimes interpreted as abuse, and it is acknowledged some comments aimed as sledges do sometimes cross the line into personal abuse.\nSledging can sometimes be a humorous attempt at distraction. Former Australian captain Steve Waugh referred to the practice as \"mental disintegration\". Origin Australian newspapers acknowledged \"sledging\" as a term in the mid-1970s. Despite the relatively recent coining of the term, the practice is as old", "-23.911148876184598" ], [ "\nA misconduct foul can be incurred for unacceptable language or disrespect, violence, persistent fouls, or taking part in the game after being excluded. Players in the water that acquire a misconduct foul (shown by circular hand motions by the referee) must sit out for the remainder of the game. Coaches and players on the bench may be removed by being awarded a red card. \nA brutality, the most serious foul, occurs when a player strikes an opponent or official with malicious intent. The offending player is removed for the remainder of the game, and their team plays with one fewer", "-23.868454721960006" ], [ "before it was alleged, in 2004, that members of the CIA had used the technique against certain suspected detained terrorists.\nSubsequently, the U.S. government released a memorandum written in 2002 by the Office of Legal Counsel that came to the conclusion that waterboarding did not constitute torture and could be used to interrogate subjects. The OLC reasoned that \"in order for pain or suffering to rise to the level of torture, the statute requires that it be severe\" and that waterboarding did not cause severe pain or suffering either physically or mentally.\nFor over three years during the George W. Bush administration,", "-23.831736581532823" ], [ "to cause disgust in participants, and the facilitators help participants to plan appropriate sanitation facilities.\nUsing the term \"shit\" (or other locally used crude words) during triggering events or presentations - rather than feces or excreta - is a deliberate aspect of the CLTS approach, as it is meant to be a practical, straight forward approach rather than a theoretical, academic conversation.\nCLTS is practiced in at least 53 countries. To be successful in the longer term, CLTS should be treated as part of a larger WASH (water, sanitation and hygiene) strategy rather than as a singular solution to changing behavior. Pre-triggering", "-23.792805738761672" ], [ "people may find that they are unable to urinate while in moving vehicles, or are fixated on the sounds of their urination in quiet restrooms or residential settings. In severe cases, a person with paruresis can urinate only when alone at home or through the process of catheterization.\nAlthough most sufferers report that they developed the condition in their teenage years, it can strike at any age. Also, because of the differing levels of severity from one person to another, some people first experience the problem when they \"lock up\" for the first time attempting to produce a sample for a", "-23.778987116384087" ], [ "may require the use of an assistive device when walking but they do not require use of a wheelchair. They often have problems with their dynamic equilibrium but not their static equilibrium. Quick movements can upset their balance.\nBecause of their balance issues, swimmers in this class can find the starting block problematic and often have slower times entering the water than other competitors in their class. Because the disability of swimmers in this class involves in a loss of function in specific parts of their body, they are more prone to injury than their able-bodied counterparts as a", "-23.76839666813612" ], [ "practice as falling under the prohibition of torture,\" and that violators of the UN Convention Against Torture should be prosecuted under the principle of universal jurisdiction.\nBent Sørensen, Senior Medical Consultant to the International Rehabilitation Council for Torture Victims and former member of the United Nations Committee Against Torture has said:\nIt's a clear-cut case: Waterboarding can without any reservation be labeled as torture. It fulfils all of the four central criteria that according to the United Nations Convention Against Torture (UNCAT) defines an act of torture. First, when water is forced into your lungs in this fashion, in addition to the", "-23.75935015702271" ], [ "themselves were interrogating or had interrogated.\" The two personally waterboarded detainees Abu Zubaydah, Abd al-Rahim al-Nashiri, and Khalid Sheikh Mohammad and swore by the technique's effectiveness, despite having \"no direct experience with the waterboard\" (as it was not a SERE technique) other than testing it on each other.\nThe contractors developed a list of 12 forms of torture for use against detainees. The list included: 1) the attention grasp, 2) walling, 3) facial hold, 4) facial slap, 5) cramped confinement, 6) wall standing, 7) stress positions, 8) sleep deprivation, 9) waterboarding, 10) use of diapers, 11) use of insects, and 12)", "-23.698079787543975" ], [ "is a special disposable bag containing absorbent material that solidifies the urine within seconds, making it convenient and safe to store and dispose of later.\nIt is possible for both genders to urinate into bottles in case of emergencies. The technique can help children to urinate discreetly inside cars and in other places without being seen by others. Toilet training Babies have little socialized control over urination within traditions or families that do not practice elimination communication and instead use diapers. Toilet training is the process of learning to restrict urination to socially approved times and situations. Consequently, young children sometimes", "-23.673546082428402" ], [ "Aquatic therapy Overview Aquatic therapy refers to water-based treatments or exercises of therapeutic intent, in particular for relaxation, fitness, and physical rehabilitation. Treatments and exercises are performed while floating, partially submerged, or fully submerged in water. Many aquatic therapy procedures require constant attendance by a trained therapist, and are performed in a specialized temperature-controlled pool. Rehabilitation commonly focuses on improving the physical function associated with illness, injury, or disability.\nAquatic therapy encompasses a broad set of approaches and techniques, including aquatic exercise, physical therapy, aquatic bodywork, and other movement-based therapy in water (hydrokinesiotherapy). Treatment may be passive, involving a", "-23.627052636205917" ], [ "undesirable behaviors and fails to demonstrate an alternative desirable behavior. They assert that corporal punishment often promotes further undesirable behaviors such as defiance and attachment to \"delinquent\" peer groups and encourages an acceptance of aggression and violence as acceptable responses to conflicts and problems.\nAccording to the Canadian Paediatric Society, \"The research that is available supports the position that spanking and other forms of physical punishment are associated with negative child outcomes. The Canadian Paediatric Society, therefore, recommends that physicians strongly discourage disciplinary spanking and all other forms of physical punishment\".\nThe Royal College of Paediatrics and Child Health of", "-23.61176259977219" ], [ "recovery; however, the internal physical processes are not well understood and remain elusive. Generally research into the health effects of cold water immersion as part of an athletic training regimen is inconclusive, with some studies suggesting a mild benefit such as reducing muscle damage and discomfort and alleviating delayed onset muscle soreness, with other studies suggesting that cold water immersion may slow muscle growth and interfere with an overall training regimen. Bath It is done by standing or sitting in a bucket or bath of icy water. One writer advised: \"don't overdo it.\" Wearing rubberized \"dive booties\" on the feet", "-23.61101397658058" ], [ "of hypnotism, hypothesized that hypnosis causes the subjects to divide their consciousness voluntarily. One part responds to the hypnotist while the other retains awareness of reality. Hilgard made subjects take an ice water bath. None mentioned the water being cold or feeling pain. Hilgard then asked the subjects to lift their index finger if they felt pain and 70% of the subjects lifted their index finger. This showed that, even though the subjects were listening to the suggestive hypnotist, they still sensed the water's temperature. Social role-taking theory The main theorist who pioneered the influential role-taking theory of hypnotism was", "-23.592503652820596" ], [ "is by the villagers walking on land, swimming (slowly) in the ocean, or being transported by boat or on the backs of helpful dolphins.\nThe player has a fixed number of three spaces of movement on each turn. This can be freely distributed among the villagers, for example by moving one villager three spaces, or moving three villagers one space each. When swimming, a villager may only move one space per turn, but there are no such restrictions for other methods of movement.\nWhen travelling by boat, the player can also move a boat with villagers from other tribes on it, provided", "-23.531022502371343" ], [ "knocked out, they will have to find a way to liquify food in order to digest it. Defecating and urinating will leave physical evidence of activities on the island, which could be used to track another player. Things like combat will depend on the player's skill level, but also on things like stamina, health and so on. Wetness, smell, medicine, cooking, hacking, crafting, hunting and poison will also play a major role in the gameplay.\nThe game will offer both third and first-person perspectives, from which the player can alternate, but will prevent third-person peeking by hiding anything a character cannot", "-23.49876377818873" ], [ "is a reasonable form of punishment for the crimes they committed. Another factor of victim blaming involves racism and racial stereotypes.\nSlut shaming is a variant on victim blaming, to do with the shaming of sexual behavior. It describes the way people are made to feel guilty or inferior for certain sexual behaviors or desires that deviate from traditional or orthodox gender expectations. A study of college women from sociologists at the University of Michigan and the University of California found that slut-shaming had more to do with a woman's social class than it did with their activity. Slut shaming", "-23.494128825055668" ], [ "Sink or Swim (video game) Story Players control Kevin Codner, the aquatic hero. After hearing that the SS Lucifer has suffered some sort of mishap (the exact nature of the incident is not made clear in the game. Somehow the captain is shown pulling the plug from his bath, and a fountain of water shoots up and starts flooding the ship.), Kevin gets into a yellow submarine and begins saving the passengers. Reception Electronic Gaming Monthly gave the SNES version a 6.4 out of 10. They commented that the graphics could be better but that the gameplay is both strategic", "-23.461898688467045" ], [ "Stone. Both Fedoruk and Stone had said the arrest was a response to an action, namely peeping, that could have led to a breach of the peace. Cartwright replied that while it is true that seeing a man peeping into one's home can be horrifying, that would not necessarily make a violent reaction a defence. Without evidence that the \"peeping tom\" is attacking, a violent response would simply be revenge. Cartwright also noted the peeping was \"not otherwise criminal and not falling within any category of offences defined by the Criminal Law,\" and that recognizing it as criminal now could", "-23.459989704570035" ], [ "act is known as giving someone a down-trou or drou (though this can have a more specific meaning, relating to loser-shaming in pool playing and other competitive games); in Ireland, it is jocking, zoonking or ka-blinking; in the north of England kegging (or quegging).\nAn alternative term is sharking, which usually implies a sexual assault on a stranger rather than a prank or bullying between peers, and is sometimes applied more broadly to the pulling down of blouses and other top clothing. Bullying Pantsing can be used as a form of bullying and is technically the crime of simple assault. The", "-23.43130476665101" ], [ "caning) or psychological (such as public humiliation) or a combination of both (i.e., through bondage). \nThe goal of discipline is to teach the sub that they have made a mistake, so that they learn self-restraint and become a better sub in the future. The punishment is generally related to the mistake, and is generally proportionate to the severity and frequency of the mistake. For example, a punishment for speaking out of turn for the first time may be a simple restraint (such as being silenced using a gag). The sub may also be given the option of choosing a punishment", "-23.40734759735642" ], [ "Bathroom sex Bathroom sex refers to engaging in sexual activities in the bathroom or toilet, either private or public. Bathroom sex occurs in many parts of the world and in many places, including stores, hotels, bars, restaurants, airplanes, and universities. Bathroom sex is depicted in many films. There is specific jargon which is applied to initiating and having sex in a bathroom, as well as the sex positions that are most commonly used.\nAccording to anthropologist Helen Fisher, when a person is in the bathtub with another person, they have removed their \"defenses\". Therefore, every touch during this", "-23.383886419178452" ], [ "from abuse.\nTo date, USA Swimming has banned more than 100 coaches for violating USA Swimming's detailed Code of Conduct.\nUSA Swimming encourages any swimmers or parents who suspect any abuse or inappropriate behavior to come forward by either contacting the Athlete Protection Officer or logging a complaint of sexual misconduct or abuse relating to USA Swimming through its online reporting system. The complaint process involves USA Swimming working with a third-party investigator to effectively and thoroughly investigate all complaints of abuse. The National governing body The National governing body (NGB) of United States Swimming is an extension of the United States", "-23.372003797318484" ], [ "have energy expenditure similar to people without cerebral palsy.\nBecause of the neuromuscular nature of their disability, CP7 and CP8 swimmers have slower start times than other people in their classes. They are also more likely to interlock their hands when underwater in some strokes to prevent hand drift, which increases drag while swimming. CP8 swimmers experience swimmers shoulder, a swimming related injury, at rates similar to their able-bodied counterparts. When fatigued, asymmetry in their stroke becomes a problem for swimmers in this class. The integrated classification system used for swimming, where swimmers with CP compete against those with", "-23.35505803930573" ], [ "Cayuco Overview Cayuco is the activity of paddling a canoe for the purpose of recreation (also called a float trip), sport, or transportation. It usually refers exclusively to using a paddle to propel a canoe with only human muscle power. A cayuco is propelled using a paddle with one blade where the paddler sits with their legs in front of them, whereas canoes are propelled using single- or double-bladed paddles where the paddler is kneeling or sitting. Cayucos are usually half closed-decked boats with a spraydeck, while canoes are usually open boats.\nCayuco in Puerto Rico is an idiomatic expression for", "-23.339018409285927" ], [ "warns that \"corporal punishment should not be a frequent occurrence\" and that \"discipline must not be harsh and destructive to the child's spirit.\" He warns against \"harsh spanking\" because \"It is not necessary to beat the child into submission; a little bit of pain goes a long way for a young child. However, the spanking should be of sufficient magnitude to cause the child to cry genuinely.\"\nDobson has called disciplining children to be a necessary but unpleasant part of raising children that should only be carried out by qualified parents:\nAnyone who has ever abused a child—or has ever felt himself", "-23.18052956147585" ], [ "published in the scientific journal Applied Cognitive Psychology, doodling can aid a person's memory by expending just enough energy to keep one from daydreaming, which demands a lot of the brain's processing power, as well as from not paying attention. Thus, it acts as a mediator between the spectrum of thinking too much or thinking too little and helps focus on the current situation. The study was done by Professor Jackie Andrade, of the School of Psychology at the University of Plymouth, who reported that doodlers in her experiment recalled 7.5 pieces of information (out of 16 total) on average,", "-23.12499175738776" ], [ "can be touched with any part of the player's body, with open or closed hands. The pool's inside borders are neutral, meaning the ball is normally in play after touching them, points are scored when the ball hits the water in the opponents' side or the opponent team commits a fault. As in volleyball, each team can contact the ball no more than three times before the ball crosses the net, while consecutive contacts must be made by different players - except for contacts while blocking, which are not counted. Players also cannot touch the net or they commit a", "-23.09472506539896" ], [ "to further explain their position and a desire to describe the technique rather than simply describe it as torture.\nExamining the four newspapers with the highest daily circulation in the country (The New York Times, The Los Angeles Times, The Wall Street Journal and USA Today) a student group of the Joan Shorenstein Center on the Press, Politics and Public Policy found that newspapers \"almost uniformly\" characterized waterboarding as torture from the 1930s until the September 11 attacks, at which point a \"significant and sudden shift\" occurred. Between 2002-2008, newspapers only seldom referred to waterboarding as torture. The group also noted", "-23.062563154351665" ], [ "inadequacy is projected or transferred to a victim; through making others feel inadequate and subordinate, the bully thus vindicates their own sense of inferiority.\nDisplacement is another defense mechanism that can explain the propensity of many medical educators to bully students, and may operate subconsciously. Displacement entails the redirection of an impulse (usually aggression) onto a powerless substitute target. The target can be a person or an object that can serve as a symbolic substitute. Displacement can operate in chain-reactions, wherein people unwittingly become at once victims and perpetrators of displacement. For example, a resident physician may be undergoing stress with", "-23.062413197592832" ], [ "restrooms, for obvious reasons, it also needs signs indicating where they are. Thus epistemic considerations enter in addition to structural ones. For a more urgent example, in addition to medicines, physicians also need tests to indicate what a patient's problem is.", "-23.03196336779365" ], [ "required to play a game. Some groups and players prefer to play where both teams sit with their backs against a wall with the mugs that are between each team also pushed back against the wall. This is often done as the distance between walls in bedrooms is often the right distance to play the game and it also prevents caps from flying everywhere preventing breaks in the game to collect caps. Others simply play wherever there is space, this is frequently in the hallways of fraternity houses.\nWith the two teams of two set up on opposing side, distribute the", "-23.016082676265796" ], [ "form of discipline. Paddling or caning was given for \"serious verbal or physical abuse, theft or misbehaviour\". In 2008 the school's paddle was used, with parental agreement, on 10 occasions.", "-23.012778586766217" ], [ "credibility. This tactic was unsuccessfully used in the trial of Daniel Holtzclaw. Post-assault social stigma, mistreatment and abuse Victims of sexual assault are often subjected to social stigma. The victim may be subject to inappropriate post-assault behaviour or language by medical personnel or other organizations.Slut-shaming is the practice of blaming the victim for rape and other forms of sexual assault. It rests on the idea that sexual assault is caused (either in part or in full) by the woman wearing revealing clothing or acting in a sexually provocative manner, before refusing consent to sex, and thereby absolving the perpetrator", "-22.91722456406569" ], [ "bathroom, the player gives information regarding their own bathroom habits, such as how often they shower, for how long, and how often they use a hairdrier. The home office contains settings for computers and related appliances. Finally, the garage has controls for transportation habits, including daily commutes but also trips for vacations, and what (if any) recreational vehicles the user may use. Scenarios Once the user has built a profile, it may be selected and run through the game. Players are allotted a certain amount of time to consider the scenario, go to the appropriate area of the house, and", "-22.895155321602942" ], [ "as used in SERE. The article strongly swayed the Pentagon against the use of the waterboard because its misuse would damage America's reputation worldwide. Nance claimed that using the torture techniques of America's former enemies dishonors the memory of U.S. service members who died in captivity through torture, and that torture does not produce credible intelligence. Nance was called to testify before the U.S. Congress about the use of \"enhanced interrogation techniques\". He told the House Judiciary Committee that: \"Waterboarding is torture, period... I believe that we must reject the use of the waterboard for prisoners and captives and cleanse", "-22.889711618216097" ], [ "as a priority, given its prevalence and associated hazards.\nAccording to the Child Labour Programme of Action, this work should not be seen as child labour, a term which implies that someone benefits unduly from the work that children do. Poor households have little control over the distance to water from the homestead, and often have no alternative but to ask their children to help in carrying water. Therefore, stakeholders in the country indicated that fetching water should rather be seen as a priority form of child work that should be addressed by the government's programme to deliver water to all", "-22.79450786607049" ], [ "to Bobath and Conductive education. In neurological and paediatric rehabilitation, clients can experience early mobility. The mechanical advantages of water support the abilities of the trunk in a mobilising and stabilising way. In this sense Halliwick is a constraint-induced movement therapy without the disadvantage of gravity compensation. Many activities easily can be repeated and varied and clients can learn balance- and stumble- strategies, which have carry-over effects to dry land. This application in fall prevention is extended by using obstacle courses or Ai Chi.\nHalliwick also enables a graded activity programme: with low mechanical impact and increasing physiological demand, chronic", "-22.77218168276886" ], [ "delegates that \"not every wrong, or even every violation of the law, is a crime,\" with \"only violations of the civil service laws\" being found among hiring practices during Gonzales' tenure as Attorney General. For example, a civil violation is not a crime. Defense of torture On December 11, 2014, Mukasey publicly stated on CNN that he believed waterboarding could not be called torture. In a 2008 hearing, he said waterboarding would feel like torture if he were subjected to it.\nAsked directly if Michael Mukasey was a liar because he claimed that enhanced interrogation produced useful intelligence, Sen. John", "-22.76563375844853" ], [ "sister on the swingset (and how high to push her), whether to wash his dad's car, and whether to take his dog for a walk. Making unwise choices can produce negative consequences of various sorts. For instance, if Willy does not wash his father's car, he does not receive his allowance, and cannot buy an item that he will need later in the game. In addition, Willy has a score system called the Trouble-O-meter, a thermometer with \"Good Boy\" at the bottom and \"Cadet School\" at the top. Actions that annoy Willy's parents will cause the meter to go up", "-22.764584689983167" ], [ "experience swimmers shoulder, a swimming related injury, at rates similar to their able-bodied counterparts. When fatigued, asymmetry in their stroke becomes a problem for swimmers in this class. The integrated classification system used for swimming, where swimmers with CP compete against those with other disabilities, is subject to criticisms has been that the nature of CP is that greater exertion leads to decreased dexterity and fine motor movements. This puts competitors with CP at a disadvantage when competing against people with amputations who do not lose coordination as a result of exertion. Other sports People with cerebral palsy are", "-22.75406653090613" ] ]
3vfdoq
Why is morning breath so rank, when it doesn't get that bad during the day?
[ "When saliva is allowed to sit in the mouth for a long period of time without being replaced, and then mostly dries up, bacteria can propagate better which causes the smell.", "When you move your move in the day talking and eating Salvia germs are moved around and kept busy. At night they sleep and get stinky stinky. Day awake germs move. Night germs sleepy and build up like Legos to make a stinky tower", "there are components in saliva that inhibit bacteria from growing. when you sleep, you tend to 1) breath thru your mouth - dries out the saliva and 2) produce less saliva. This allows the bacteria to grow, poop in your mouth, and when you wake up, the poop makes your mouth smell. People that have xerostomia (dry mouth) for 1 of many possible reasons, they tend to have pretty bad breath because of this.", "If you went 6-8 hours straight without eating or drinking anything during the day, it likely would smell as bad as your morning breath.", "good points by all the previous posts. also, anaerobic bacteria (don't use oxygen) flourish at night while your mouth is closed and you're breathing through your nose.", "you also have to add that if youre a mouth breather, it's twice ~ 3 times as bad....hence why most frontal teeth get superiorly damaged vs the back" ]
[ [ "and unclean dentures. Oral based lesions caused by viral infections like herpes simplex and HPV may also contribute to bad breath.\nThe intensity of bad breath may differ during the day, due to eating certain foods (such as garlic, onions, meat, fish, and cheese), smoking, and alcohol consumption. Since the mouth is exposed to less oxygen and is inactive during the night, the odor is usually worse upon awakening (\"morning breath\"). Bad breath may be transient, often disappearing following eating, drinking, tooth brushing, flossing, or rinsing with specialized mouthwash. Bad breath may also be persistent (chronic bad breath), which affects some", "-33.465501195401885" ], [ "whose production depends on daylight, become exhausted over the winter, making it especially easy for the \"sleep hormone\" melatonin to have its effect. When the days become longer in springtime, the body readjusts its hormone levels, and more endorphin, testosterone and estrogen are released. This changeover puts a heavy strain on the body, which responds with a feeling of tiredness.\nIn addition, temperatures usually fluctuate greatly in springtime. When temperatures rise, a person's blood pressure drops, since the blood vessels expand. The expansion of blood vessels is called vasodilation. Food also plays a role. In winter one tends to consume more", "-31.465716027421877" ], [ "Central sleep apnea Signs and symptoms In a healthy person during sleep, breathing is regular so oxygen levels and carbon dioxide levels in the bloodstream stay fairly constant: After exhalation, the blood level of oxygen decreases and that of carbon dioxide increases. Exchange of gases with a lungful of fresh air is necessary to replenish oxygen and rid the bloodstream of built-up carbon dioxide. Oxygen and carbon dioxide receptors in the body (called chemoreceptors) send nerve impulses to the brain, which then signals for reflexive opening of the larynx (enlarging the opening between the vocal cords) and movements of", "-29.774308833942996" ], [ "it's ignored. It is often treated as a \"sleep disorder\" after a sleep study performed, but \"sleep studies cannot diagnose shallow breathing (JR Bach, M.D.).\" Serious symptoms arise most commonly during sleep; however, because when the body sleeps, the intercostal muscles do not perform the breathing for mechanism, it's done by the diaphragm, which is often impaired in people with NMDs. \nVery often, after a sleep study, when someone has been unsuccessfully using positive airway pressure (PAP) ventilation, they are prescribed nasal oxygen at night; this should never be used without clear evidence of oxygen saturation of 94% or less;", "-29.090202112914994" ], [ "Second wind (sleep) Second wind (or third wind, fourth wind, etc.), also occasionally referred to as the wake maintenance zone, is a sleep phenomenon in which a person, after a prolonged period of staying awake, temporarily ceases to feel drowsy, often making it difficult to fall asleep once it happens. They are the result of circadian rhythms cycling into a phase of wakefulness. For example, many people experience the effects of a second wind in the early morning even after an entire night without sleep because it is the time when they would normally wake up.\nWhile most \"winds\" coincide with", "-29.059817006404046" ], [ "the deep and the peripheral, circulation exhibiting unique diurnal periodicity. During the day, they are present in the deep veins, and during the night, they migrate to the peripheral circulation. The cause of this periodicity remains unknown, but the advantages of the microfilariae being in the peripheral blood during these hours may ensure the vector, the nighttime mosquito, will have a higher chance of transmitting them elsewhere. Physiological changes also are associated with sleeping, such as lowered body temperature, oxygen tension, and adrenal activity, and an increased carbon dioxide tension, among other physical alterations, any of which could be the", "-28.78836493034032" ], [ "imbalanced during sleep and fail to give the signal to inhale, causing the individual to miss one or more cycles of breathing. The neurological feedback mechanism that monitors blood levels of carbon dioxide and in turn stimulates respiration fails to react quickly enough to maintain an even respiratory rate, allowing the entire respiratory system to cycle between apnea and hyperpnea, even for a brief time following an awakening during a breathing pause. The sleeper stops breathing for up to two minutes and then starts again. There is no effort made to breathe during the pause in breathing:", "-28.71754339369363" ], [ "Morning sickness Signs and symptoms About 66% of women have both nausea and vomiting while 33% have just nausea. Cause The cause of morning sickness is unknown. While some have claimed it to be due to psychological reasons, this is not supported by evidence.\nNausea and vomiting may also occur with molar pregnancy.\nMorning sickness is related to diets low in cereals and high in sugars, oilcrops, alcohol and meat. Treatments There is a lack of good evidence to support the use of any particular intervention for morning sickness. Medications A number of antiemetics are effective and safe in pregnancy including: pyridoxine/doxylamine,", "-28.387832231237553" ], [ "breathing tubes (trachea) and the small airways. The constant irritation results in excess production of mucus which makes breathing difficult. Frequently, these individuals wake up in the morning with copious amounts of foul smelling mucus and a cough which lasts all day. Wheeze and heavy phlegm are common findings. COPD is a lifelong disorder and there is no cure. Eventually most people develop recurrent pneumonia, lack any type of endurance, and are unable to work productively. One of the ways to avoid chronic bronchitis is to stop or not smoke. Stomach Gastritis or stomach upset is a common irritating disorder", "-28.18116784283484" ], [ "or unusually fast breathing; fast or irregular heartbeat or pulse; fever (high); high or low blood pressure; loss of bladder control; muscle stiffness (severe); unusual increase in sweating; unusually pale skin; and unusual tiredness or weakness.\nDrowsiness is a usual side effect.", "-28.14109063079377" ], [ "Wake low A wake low, or wake depression, is a mesoscale low-pressure area which trails the mesoscale high following a squall line. Due to the subsiding warm air associated with the systems formation, clearing skies are associated with the wake low. Once difficult to detect in surface weather observations due to their broad spacing, the formation of mesoscale weather station networks, or mesonets, has increased their detection. Severe weather, in the form of high winds, can be generated by the wake low when the pressure difference between the mesohigh preceding it and the wake low is intense enough. When the", "-28.130170745542273" ], [ "on the respiratory system, it increases the risk of pharyngeal collapsibility while reducing the intrathoracic volume and diaphragm excursion. Moreover, excessive daytime sleepiness resulting from sleep fragmentation can decrease physical activity and thus lead to weight gain (by sedentary habits or increased food intake to overcome somnolence). The obesity-related obstruction of upper airway structure has led some authors to distinguish between two types of OSA in children: type I is associated with marked lymphadenoid hypertrophy without obesity and type II is first associated with obesity and with milder upper airway lymphadenoid hyperplasia. The two types of OSA in children can", "-27.997565485246014" ], [ "the airway and allows breathing to resume. Breathing normally will restore oxygen levels and the person will fall asleep again. This carbon dioxide build-up may be due to the decrease of output of the brainstem regulating the chest wall or pharyngeal muscles, which causes the pharynx to collapse. People with sleep apnea experience reduced or no slow-wave sleep and spend less time in REM sleep. Diagnosis Sleep apnea may be diagnosed by the evaluation of symptoms, risk factors and observation, (e.g., excessive daytime sleepiness and fatigue) but the gold standard for diagnosis is a formal sleep study (polysomnography, or sometimes", "-27.800691361131612" ], [ "from the pulmonary beds into the systemic circulation, which has become dilated due to hypoxia.\nAs with any syncopal episode that results from a cardiac dysrhythmia, the fainting does not depend on the patient's position. If they occur during sleep, the presenting symptom may simply be feeling hot and flushed on waking. Causes The attacks are caused by any temporary lack of cardiac output. This in turn could be due to any number of causes, including antimony poisoning, cardiac asystole, heart block, Lev's disease or ventricular fibrillation. Paroxysmal supraventricular tachycardia or atrial fibrillation is the underlying cause in up", "-27.622827818151563" ], [ "As oxygen levels in the blood drop, the patient then comes out of deep sleep in order to resume breathing. When several of these episodes occur per hour, sleep apnea rises to a level of seriousness that may require treatment.\nDiagnosing sleep apnea usually requires a professional sleep study performed in a sleep clinic, because the episodes of wakefulness caused by the disorder are extremely brief and patients usually do not remember experiencing them. Instead, many patients simply feel tired after getting several hours of sleep and have no idea why. Major risk factors for sleep apnea include chronic fatigue, old", "-27.613785789173562" ], [ "over the following 12–24 hours. This is mainly because the strength of the land breeze is weaker than the sea breeze. The land breeze will die once the land warms up again the next morning.", "-27.60280483798124" ], [ "proper sleep hygiene.\nMany get a 'second wind' late in the evening, tackle some extra activities, and can't get to sleep until the early hours of the morning. This can be avoided by going to bed earlier in the evening, before the 'second wind' has time to kick in...\n— Archibald Hart \"Fifth day turning point\" Multiple studies have observed that individuals subjected to total sleep deprivation for extended periods spanning multiple days may feel \"helplessly sleepy\" up until the fifth day, upon which all observed individuals would feel what may be described as a second wind. This particular form of the experience", "-27.567959488182623" ], [ "face. Fluid can also collect in the lungs when lying down at night, possibly making nighttime breathing and sleeping difficult (paroxysmal nocturnal dyspnea). Complications Congestive heart failure is the most common result of fluid overload. Also, it may be associated with hyponatremia (hypervolemic hyponatremia).", "-27.42616814255598" ], [ "hormone and increasing blood levels of cortisol. Sleeping more to promote weight loss A regular sleep schedule can contribute to weight loss. While sleeping more than an average of 6.5 hours per night may have beneficial effects on weight, sleeping over 8.5 hours per night has been shown to contribute negatively to weight. Getting adequate sleep may also reduce snacking that occurs throughout the course of the day due to feeling lethargic.\nAccording to a recent study at Brigham Young University, a regular sleep schedule can make an almost immediate difference on the body's ability to metabolize fat cells. In this", "-27.272463470464572" ], [ "this is usually due to excessive exposure to cold air or water, but it can be deliberately induced as a medical treatment. Symptoms usually appear when the body's core temperature drops by 1–2 °C (1.8–3.6 °F) below normal temperature. Basal body temperature Basal body temperature is the lowest temperature attained by the body during rest (usually during sleep). It is generally measured immediately after awakening and before any physical activity has been undertaken, although the temperature measured at that time is somewhat higher than the true basal body temperature. In women, temperature differs at various points in the menstrual cycle,", "-27.246692714397795" ], [ "nose irritation. Other side effects may include dry mouth, dry nose, nosebleeds, sore lips and gums. Weight loss Excess body weight is thought to be an important cause of sleep apnea. People who are over weight have more tissues in the back of their throat which can restrict the airway expecially when sleeping. In weight loss studies of overweight individuals, those who lose weight show reduced apnea frequencies and improved Apnoea–Hypopnoea Index (AHI). Surgery Several surgical procedures (sleep surgery) are used to treat sleep apnea, although they are normally a third line of treatment for those who reject or", "-27.20898753541269" ], [ "Spring fever Spring fever is any of a number of mood, physical, or behavioral changes, which may be experienced coinciding with the arrival of spring, particularly restlessness, laziness, and even amorousness. Overview The term spring fever is an auto-antonym (a term with multiple and opposed meanings):\nOn the one hand, the term may refer to an increase in energy, vitality, and sexual appetite, as well as a feeling of restlessness, associated with the end of winter. This concept may have a biological basis. A lift in mood with the arrival of spring, and longer periods of daylight, is often particularly strong", "-26.999199999889242" ], [ "the body for sleep—peaks; a second wind may occur at this time if one resists or fails to fall asleep before the peak. Such second winds could aggravate sleep debt.\nAdrenaline as a result of anxiety or stress may also be a culprit. Effects on drugs Care should be taken as to avoid administering hypnotic medications too early as the medication may reach peak action during the wake maintenance zone. Not only could this negate the effectiveness of the sleep-aid, it may also cause users of the drug to experience disinhibition, hallucinations, or other dissociative phenomenon if they remain awake.", "-26.982894408196444" ], [ "breathing). These breathing irregularities are not random, but correspond to bursts of eye movements. This breathing pattern is not controlled by the chemoreceptors, but is due to the activation of behavioral respiratory control system by REM sleep processes. Quantitative measure of airflow is quite variable in this sleep stage and has been shown to be increased, decreased or unchanged. Tidal volume has also been shown to be increased, decreased or unchanged by quantitative measures in REM sleep. So breathing during REM sleep is somewhat discordant.\nIn a study of 19 healthy adults, the minute ventilation in REM sleep was 6.46 +/-", "-26.827765925196218" ], [ "the dead land, mixing\n\nMemory and desire, stirring\n\nDull roots with spring rain.\n— T. S. Eliot, The Waste Land\nOccasionally, such lethargy or depression may be described as \"spring fever\", though this term usually relates to an increase in energy and restlessness, or to romantic and sexual feelings, in the spring.\nThe German term Frühjahrsmüdigkeit (lit. \"Spring fatigue\") is the name for a temporary mood or physical condition, typically characterized by a state of low energy and weariness, experienced by many people in springtime. It is not in the category of a diagnosed illness, but rather a phenomenon thought to be initiated by a change", "-26.767026549903676" ], [ "indicated, but not due to less sleep time, but more frequent awakenings during the night. Primary snoring Snoring is a condition characterized by noisy breathing during sleep. Usually, any medical condition where the airway is blocked during sleeping, like obstructive sleep apnea, may give rise to snoring. Snoring, when not associated with an obstructive phenomenon is known as primary snoring. Apart from the specific condition of obstructive sleep apnea, other causes of snoring include alcohol intake prior to sleeping, stuffy nose, sinusitis, obesity, long tongue or uvula, large tonsil or adenoid, smaller lower jaw, deviated nasal septum, asthma, smoking and", "-26.758970867391326" ], [ "pharyngeal dilator muscles of the upper airway decreases during the NREM sleep, contributing to the increased resistance, which is reflected in increased esophageal pressure swings during sleep. The other ventilatory muscles compensate for the increased resistance, and so the airflow decreases much less than the increase in resistance. Arterial blood gases The Arterial blood gasses pCO2 increases by 3-7mmHg, pO2 drops by 3-9mmHg and SaO2 drops by 2% or less. These changes occur despite a reduced metabolic rate, reflected by a 10-20% decrease in O2 consumption, suggesting overall hypoventilation instead of decreased production/metabolism. Pulmonary arterial pressure Periodic oscillations of the", "-26.663414714101236" ], [ "pH, causing the respiratory center to increase the rate and depth of breathing. The consequence is that the partial pressure of CO₂ (PCO2) does not change from rest going into exercise. During very short-term bouts of intense exercise the release of lactic acid into the blood by the exercising muscles causes a fall in the blood plasma pH, independently of the rise in the PCO2, and this will stimulate pulmonary ventilation sufficiently to keep the blood pH constant at the expense of a lowered PCO2.\nMechanical stimulation of the lungs can trigger certain reflexes as discovered in animal studies. In humans,", "-26.570660515717464" ], [ "rather than obstructive sleep apnea.\nPeriodic breathing during sleep occurs typically in adult patients with congestive heart failure.\nPeriodic breathing is also a normal variation of breathing found in premature and full term infants. It occurs when the infant has pauses in breathing for no more than 10 seconds at a time followed by a series of rapid, shallow breaths. Then the breathing returns to normal without any stimulation or intervention. These pauses in breathing may be accompanied by minor oxygen desaturation and bradycardia. It usually occurs when the infant is sleeping deeply, but may occur with light sleep or even when", "-26.32841120188823" ], [ "rises rapidly after wakening, reaching a peak within 30–45 minutes. It then gradually falls over the day, rising again in late afternoon. Cortisol levels then fall in late evening, reaching a trough during the middle of the night. This corresponds to the rest-activity cycle of the organism. An abnormally flattened circadian cortisol cycle has been linked with chronic fatigue syndrome, insomnia and burnout.\nThe HPA axis has a central role in regulating many homeostatic systems in the body, including the metabolic system, cardiovascular system, immune system, reproductive system and central nervous system. The HPA axis integrates physical and psychosocial influences in", "-26.29744288418442" ], [ "more than 15–20 seconds, usually accompanied by bradycardia and hypoxia. This cessation of breathing is due to the underdevelopment of the body's respiratory control center, the medulla oblongata in premature infants.\nAmple research also suggests that caffeine significantly reduces the occurrence of bronchopulmonary dysplasia, which is a chronic lung disorder defined by the need for supplemental oxygen after a postmenstrual age of 36 weeks. Bronchopulmonary dysplasia is common in infants with low birth weight (<2500g) and very low birth weight (<1500g) who received mechanical ventilator machines to help manage respiratory distress syndrome. Currently, there is no treatment for", "-26.27546188890119" ], [ "risk of diabetes among those with moderate or severe sleep apnea is higher. There is increasing evidence that sleep apnea may lead to liver function impairment, particularly fatty liver diseases (see steatosis). Finally, because there are many factors that could lead to some of the effects previously listed, some people are not aware that they have sleep apnea and are either misdiagnosed or ignore the symptoms altogether. Mechanism When breathing is paused, carbon dioxide builds up in the bloodstream. Chemoreceptors in the blood stream note the high carbon dioxide levels. The brain is signaled to awaken the person, which clears", "-26.2382473910111" ], [ "by dry air and limited food and drink. It does not necessarily involve the shift in circadian rhythms that cause jet lag. Travel fatigue can occur without crossing time zones, and it often disappears after one day accompanied by a night of good quality sleep. Cause Jet lag is a chronobiological problem, similar to issues often induced by shift work and the circadian rhythm sleep disorders. When travelling across a number of time zones, the body clock (circadian rhythm) will be out of synchronisation with the destination time, as it experiences daylight and darkness contrary to the rhythms to which", "-26.228346195915947" ], [ "cold; smoking may worsen this effect. Due to the high penetration across the blood-brain barrier, lipophilic beta blockers such as propranolol and metoprolol are more likely than other less lipophilic beta blockers to cause sleep disturbances such as insomnia and vivid dreams and nightmares.\nSerious side effects that are advised to be reported immediately include symptoms of bradycardia (resting heart rate slower than 60 beats per minute), persistent symptoms of dizziness, fainting and unusual fatigue, bluish discoloration of the fingers and toes, numbness/tingling/swelling of the hands or feet, sexual dysfunction, erectile dysfunction, hair loss, mental/mood changes, depression, breathing difficulty, cough, dyslipidemia", "-26.22770463069901" ], [ "movements of air masses in the region. Causes The Morning Glory cloud is not clearly understood because its rarity means it has little significance in terms of rainfall or climate. Regardless of the complexity behind the nature of this atmospheric phenomenon, some conclusions have been made about its causes. Through research, one of the main causes of most Morning Glory occurrences is the mesoscale circulations associated with sea breezes that develop over the peninsula and the gulf. On the large scale, Morning Glories are usually associated with frontal systems crossing central Australia and high pressure in northern Australia. Locals", "-26.174670147767756" ], [ "effect of nitric oxide on muscle cells. There is a suspicion that chronic hemolysis causing chronically depleted nitric oxide may lead to the development of pulmonary hypertension (increased pressure in the blood vessels supplying the lung), which in turn puts strain on the heart and causes heart failure.\nHistorically, the role of the sleep and night in this disease (the \"nocturnal\" component of the name) has been attributed to acidification of the blood at night due to relative hypoventilation and accumulation of carbon dioxide in the blood during sleep. This hypothesis has been questioned by researchers who note that not all", "-26.06277723162202" ], [ "medications are generally believed to be better and safer than earlier generations of sedatives, they have still generated some controversy and discussion regarding side-effects. White noise appears to be a promising treatment for insomnia. Obstructive sleep apnea Obstructive sleep apnea is a condition in which major pauses in breathing occur during sleep, disrupting the normal progression of sleep and often causing other more severe health problems. Apneas occur when the muscles around the patient's airway relax during sleep, causing the airway to collapse and block the intake of oxygen. Obstructive sleep apnea is more common than central sleep apnea.", "-25.958357083494775" ], [ "or an inability to suppress the nocturnal bladder contraction, due to a failure to arouse. The risk for nocturnal enuresis increases with the severity of the sleep-disordered breathing: the more respiratory events per hour of sleep, the higher is the risk for nocturnal enuresis. Obesity may also play a role as it is associated with OSA and with nocturnal diuresis (due to unhealthy diet). The interaction between OSA and obesity might thus result in nocturnal enuresis. Considering the high prevalence of nocturnal enuresis amongst children with sleep-disordered breathing, it is important to consider the latter in the differential diagnosis of", "-25.953383132087765" ], [ "Sleep and breathing Sleep onset Set point of ventilation is different in wakefulness and sleep. pCO2 is higher and ventilation is lower in sleep. Sleep onset in normal subjects is not immediate, but oscillates between arousal, stage I and II sleep before steady NREM sleep is obtained. So falling asleep results in decreased ventilation and a higher pCO2, above the wakefulness set point. On wakefulness, this constitutes an error signal which provokes hyperventilation until the wakefulness set point is reached. When the subject falls asleep, ventilation decreases and pCO2 rises, resulting in hypoventilation or even apnea. These oscillations continue until", "-25.929502603248693" ], [ "or respiratory-related arousals per hour (high apnea-hypopnea index) during sleep. The second is OHS primarily due to \"sleep hypoventilation syndrome\"; this requires a rise of CO₂ levels by 10 mmHg (1.3 kPa) after sleep compared to awake measurements and overnight drops in oxygen levels without simultaneous apnea or hypopnea. Overall, 90% of all people with OHS fall into the first category, and 10% in the second. Treatment In people with stable OHS, the most important treatment is weight loss—by diet, through exercise, with medication, or sometimes weight loss surgery (bariatric surgery). This has been shown to improve the symptoms of", "-25.921326223760843" ], [ "of physiological circumstances, contributes significantly to tight control of the pH of the extracellular fluids (ECF). Over-breathing (hyperventilation) and under-breathing (hypoventilation), which decrease and increase the arterial partial pressure of carbon dioxide respectively, cause a rise in the pH of ECF in the first case, and a lowering of the pH in the second. Both cause distressing symptoms.\nBreathing has other important functions. It provides a mechanism for speech, laughter and similar expressions of the emotions. It is also used for reflexes such as yawning, coughing and sneezing. Animals that cannot thermoregulate by perspiration, because they lack sufficient sweat glands,", "-25.879504628363065" ], [ "Vitamin D and respiratory tract infections Ultraviolet radiation and vitamin D An inverse association between exposure to the sun and upper respiratory tract infections was first proposed in 1926 by Smiley, who theorized that seasonality of infection was caused by “disordered vitamine metabolism in the human...directly due to a lack of solar radiation during the dark months of winter.” Studies of Dutch and Russian subjects have also indicated a correlation of ultraviolet light exposure and relative absence of infection. However, the seasonality of infections such as influenza may also be explicable by other factors. For example, low absolute humidity favours", "-25.86382220427913" ], [ "compared to 7.66 ± 0.34 liters/minute when awake. Rib cage and abdominal muscle contributions Rib cage contribution to ventilation increases during NREM sleep, mostly by lateral movement, and is detected by an increase in EMG amplitude during breathing. Diaphragm activity is little increased or unchanged and abdominal muscle activity is slightly increased during these sleep stages. Upper airway resistance Airway resistance increases by about 230% during NREM sleep. Elastic and flow resistive properties of the lung do not change during NREM sleep. The increase in resistance comes primarily from the upper airway in the retroepiglottic region. Tonic activity of the", "-25.83015494258143" ], [ "low pressure troughs would increase humidity in some hot days, especially in late summer, where they may provide afternoon thunderstorms that are usually accompanied by heavy rainfall and, at times, hail. Furthermore, most mornings and nights would be muggy, with the 9am relative humidity ranging from 69% to 75%. The average 3pm dewpoint temperature in the summer ranges from 16.2 °C (61.2 °F) at the coast, to 14.4 °C (57.9 °F) inland. Dewpoints would be higher in late summer, reaching 20 °C (68 °F), especially in the mornings and evenings, although they would usually be lower in the heat of the day, dipping as low as", "-25.744778337772004" ], [ "hormone melatonin at night. Cortisol levels typically rise throughout the night, peak in the awakening hours, and diminish during the day. Circadian prolactin secretion begins in the late afternoon, especially in women, and is subsequently augmented by sleep-induced secretion, to peak in the middle of the night. Circadian rhythm exerts some influence on the nighttime secretion of growth hormone.\nThe circadian rhythm influences the ideal timing of a restorative sleep episode. Sleepiness increases during the night. REM sleep occurs more during body temperature minimum within the circadian cycle, whereas slow-wave sleep can occur more independently of circadian time.\nThe internal circadian clock", "-25.743332912155893" ], [ "Jet lag Signs and symptoms The symptoms of jet lag can be quite varied, depending on the amount of time zone alteration, time of day, and individual differences. Sleep disturbance occurs, with poor sleep upon arrival and/or sleep disruptions such as trouble falling asleep (when flying east), early awakening (when flying west), and trouble remaining asleep. Cognitive effects include poorer performance on mental tasks and concentration; dizziness, nausea, insomnia, confusion, anxiety, increased fatigue, headaches, and irritability; and problems with digestion, including indigestion, changes in the frequency of defecation and consistency of faeces, and reduced interest in and enjoyment of", "-25.7309540809365" ], [ "panic attack.\nThough caffeine can be shown to decrease the quality of sleep, there is no evidence that caffeine affects all people the same way. In fact, some people report no sleep problems despite regularly consuming caffeine. Regular intake of caffeine may be normal for a person so it is understandable how they may still get satisfactory sleep. This finding shows that caffeine interferes with a modulatory mechanism in sleep regulation rather than a fundamental sleep regulatory brain circuit. Ultimately, regular sleep habits are important in overall quality and timing of sleep.", "-25.66849177871336" ], [ "general population. This study also demonstrated positive correlation between the amount of pain and the degree of abnormality on the breath test. A subsequent study also demonstrated increased prevalence of intestinal hyperpermeability, which some believe occurs commonly with SIBO. One study showed that nearly all fibromyalgia sufferers have unidentified airway constriction during sleep in the form of upper airway resistance syndrome (UARS)--which is known to cause similar symptoms to fibromyalgia. One explanation being that it results from airway inflammation (as indicated by high tumor necrosis factor alpha (TnF-A) readings) caused directly or indirectly by SIBO and/or altered intestinal permeability. More", "-25.61184454234899" ], [ "stimulant effects or disruptive digestive demands. Avoiding nicotine, caffeine (including coffee, energy drinks, soft drinks, tea, chocolate, and some pain relievers), and other stimulants in the hours before bedtime is recommended by most sleep hygiene specialists, as these substances activate neurobiological systems that maintain wakefulness. Alcohol near bedtime is frequently discouraged by clinicians, because, although alcohol can induce sleepiness initially, the arousal caused by metabolizing alcohol can disrupt and significantly fragment sleep. Smoking tobacco products before bed is also thought to reduce one's quality of resting by decreasing the time spent in deep sleep, leading to sleep fragmentation and nocturnal", "-25.58210097819847" ], [ "Fog fever Clinical signs The bovine experiences difficulty breathing and will do everything it can to ease this discomfort. It will try to stand with its airway as straight and extended as possible, raising its head and stretching its neck forwards. Breathing rate will increase as high as 80 breaths per minute. there may also be extension of the tongue, and drooling. The animal may grunt as it breathes and froth may form around the mouth as the condition progresses. Rectal temperature will be normal, although some may show an elevated temperature from respiratory effort. Cause 'Fog fever' results from", "-25.571048794692615" ], [ "room all night can lower temperature to the point of causing hypothermia. Asphyxiation It is alleged that fans may cause asphyxiation by oxygen displacement and carbon dioxide intoxication. In the process of human respiration, inhaled fresh air is exhaled with a lower concentration of oxygen gas (O₂) and higher concentration of carbon dioxide gas (CO₂), causing a gradual reduction of O₂ and buildup of CO₂ in a completely unventilated room. This phenomenon is unrelated to the presence or absence of a fan. Media coverage During the summer, mainstream South Korean news sources regularly report alleged cases of fan death. A", "-25.534290949930437" ], [ "pulmonary arterial pressure occur with respiration. Pulmonary arterial systolic and diastolic pressure and PAD increase by 4-5mm in NREM sleep Effects of arousals Induced transient arousal from NREM sleep cause the following:\nIncrease EMG activity of the diaphragm 150%, increased activity of upper airway dilating muscles 250%, increased airflow and tidal volume 160% and decreased upper airway resistance. Ventilation Irregular breathing with sudden changes in both amplitude and frequency at times interrupted by central apneas lasting 10–30 seconds are noted in Rapid Eye Movement (REM) sleep. (These are physiologic changes and are different from abnormal breathing patterns noted in sleep disordered", "-25.503684842013172" ], [ "as opposed to a forced awakening but these results may warrant more research into the nature of arousal after sleep periods. Caffeine Caffeine is a xanthine derivative that can cross the blood-brain barrier. The caffeine present in coffee or tea exerts its stimulating action by blocking adenosine receptors in the brain. By antagonizing the adenosine receptors caffeine limits the effects of adenosine buildup in the brain and increases alertness and attentiveness. Previous research has shown that coupled with a short nap, consuming caffeine prior to the nap can alleviate the effects of sleep inertia. Nonetheless, individual degree of consumption and", "-25.477783486945555" ], [ "How Do You Sleep at Night Critical reception Deborah Evans Price of Billboard gave the song a favorable review, writing that \"with each successive release [Hayes] seems to grow more confident in his smoky baritone, and he imbuses this taut single with a tense passion that perfectly suits the lyric.\"", "-25.461305099874153" ], [ "of hyposalivation significantly overlaps with that of xerostomia. A reduction in saliva production to about 50% of the normal unstimulated level will usually result in the sensation of dry mouth. Altered saliva composition may also be responsible for xerostomia. Physiologic Salivary flow rate is decreased during sleep, which may lead to a transient sensation of dry mouth upon waking. This disappears with eating or drinking or with oral hygiene. When associated with halitosis, this is sometimes termed \"morning breath\". Dry mouth is also a common sensation during periods of anxiety, probably owing to enhanced sympathetic drive. Dehydration is known to", "-25.413058971549617" ], [ "Springtime lethargy Springtime lethargy refers to a state of fatigue, lowered energy, or depression, associated with the onset of spring. Such a state may be caused by a normal reaction to warmer temperatures, or it may have a medical basis, such as allergies or \"reverse\" seasonal affective disorder. In many regions, there is a springtime peak in suicide rates.\nPsychological and socio-cultural factors also play a role. The opening lines of Eliot's classic poem express some of the complex emotional associations that may be familiar to those who experience dark moods in the spring:\nApril is the cruellest month, breeding\n\nLilacs out of", "-25.40613472450059" ], [ "and unpredictable. Anecdotal evidence suggests that it may relate to stress. Night songs are typically unlike daytime songs, being longer and more complex.\nThough there is a peak of singing activity near dawn, chingolos will sing strongly, if not persistently, at almost any time of day during the main season (September to January), except when mid-day temperatures are much above 30 °C (86 °F). There is a slight resurgence of activity in the evening. Variation In some areas (in arid parts of north-west Argentina, in eastern Patagonia, and in certain sites in Costa Rica) there is often or always no terminal trill, and", "-25.356210085825296" ], [ "certain locations in the body. There are two types of breathing, \"forceful\" and \"gentle\". A scientific study found that only the forceful type results in an increase in body temperature, and that meditation was required to sustain the temperature increase. Health benefits of cold exposure Several studies have shown that exposure to cold increases brown fat and the capacity for non-shivering thermogenesis. It also reduces white adipose tissue, the form of fat related to obesity. There is some evidence that brown adipose tissue may reduce the risk of diabetes through uptake of glucose and lipids. Practices such as cold bathing", "-25.35230973137368" ], [ "from the University of Kentucky depicted that more than 78% of college freshmen consume above the recommended amount of caffeine each day. In one group of researchers' study from the Henry Ford Hospital's Sleep and Research Center and Wayne State College of Medicine, they discovered that caffeine consumed at least six hours before bedtime can significantly disrupt sleep. Participants in this study who consumed caffeine right before bedtime, three hours before bedtime, and six hours before bedtime all experienced a shorter night's sleep, lower sleep quality and spent more time awake at night. Biology Several recent studies have shown that", "-25.332737245829776" ], [ "It can cause both physiological and emotional problems in patients. It is generally an inherited problem that is found in each ethnic group. It is not life-threatening, but it is threatening to a person's quality of life.\nA treatment modality is clipping of the sympathetic nerve at the level of T4 by thoracoscopic means. Night sweats Night sweats, also known as nocturnal hyperhidrosis, is the occurrence of excessive sweating during sleep. The person may or may not also perspire excessively while awake.\nOne of the most common causes of night sweats in women over 40 is the hormonal changes related to menopause", "-25.23201899480773" ], [ "apnea, central sleep apnea, is much more rare and has to do with the part of the brain that regulates breathing. The signal from the brain to the lungs is disrupted, resulting in pauses in breathing. \nTreating obstructive sleep apnea is much easier than central sleep apnea, and the treatment plan may include things such as lifestyle changes, mouthpieces, surgery, and breathing devices\nSince overweight is one of the most important risk factors for obstructive sleep apnea, weight loss interventions combined with active lifestyle counseling showed to be beneficial. A randomized control study showed reduced symptom frequency in patients who participated", "-25.16514351213118" ], [ "function of surrounding brain regions, and pressure is the primary result. Enhanced drowsiness Along with cranial pressure, patients exhibit noticeable lethargy, increasing in severity as the tumor progresses. In the first few months, morning activities are usually unaffected; over time, these effects become more pronounced, especially late at night. Lethargy can disrupt vital signs, depleting energy and desire to perform simple cognitive tasks. Frequent nausea The desire to eat normally becomes worse over time, leading to weight loss from vomiting. Nausea is seen in almost all cases of astroblastoma, especially in low-grade tumors. Impaired vision Vision deficit usually", "-25.163599597362918" ], [ "higher breathing rates may all cause increased work of breathing and fatigue of the respiratory muscles.\nThere appears to be a connection between pulmonary edema and increased pulmonary blood flow and pressure which results in capillary engorgement. This may occur during higher intensity exercise while immersed or submersed.\nFacial immersion at the time of initiating breath-hold is a necessary factor for maximising the mammalian diving reflex in humans. Thermal balance responses The unprotected human body responds to cold water immersion in a progression from a stress situation to hypothermia and death, at a rate depending on time and water temperature. Hypothermia is", "-25.15929970241268" ], [ "imbalance it can be classified as a pregnancy complication (hyperemesis gravidarum). Nausea (morning sickness) Morning sickness occurs in about seventy percent of all pregnant women, and typically improves after the first trimester. Although described as \"morning sickness\", women can experience this nausea during the afternoon, evening, and throughout the entire day. Unfortunately there is no strong evidence showing one treatment that works for all women. Ginger may help some women but the results change from study to study. Bleeding It is common to have bleeding in early pregnancy, this is associated with implantation bleeding and can be mistaken for a", "-25.1548924773233" ], [ "millimoles per liter (108 mg/dL), it is advisable that they take some long-acting carbohydrate before retiring to bed to prevent night-time hypoglycemia. Night sweats, headaches, restless sleep, and nightmares can be a sign of nocturnal hypoglycemia, and patients should consult their doctor for adjustments to their insulin routine if they find that this is the case. Counterintuitively, another possible sign of nocturnal hypoglycemia is morning hyperglycemia, which actually occurs in response to blood sugar getting too low at night. This is called the Somogyi effect.\nIn relation to type 2 diabetes, eating most food earlier in the day may be associated with", "-25.12650571000995" ], [ "discomfort without air conditioning as head indices (feels like) can rise in excess of 50 °C (122 °F). In 2008, the city experienced record rainfall of 255 millimetres (10.0 in). The month of June is also the windiest of all with an average wind speed of 17 kilometres per hour (11 mph). July July is the second wettest month with an average rainfall of 305.3 millimetres (12.02 in) as the monsoon activity increases. The highest rainfall ever recorded in a month accumulated to 743.3 millimetres (29.26 in) recorded in 1995 with very dramatic weather as rain was brought by severe thunderstorms and cloudburst. The highs are", "-25.07686766376719" ], [ "easily, and airflow in and out of the lung is impaired by excessive tissue in the head and neck area. Hence, people with obesity need to expend more energy to breathe effectively. These factors together lead to sleep-disordered breathing and inadequate removal of carbon dioxide from the circulation and hence hypercapnia; given that carbon dioxide in aqueous solution combines with water to form an acid (CO₂[g] + H₂O[l] + excess H₂O[l] --> H₂CO₃[aq]), this causes acidosis (increased acidity of the blood). Under normal circumstances, central chemoreceptors in the brain stem detect the acidity, and respond by increasing the respiratory rate;", "-25.074143189645838" ], [ "a rapid increase in temperature and decrease in dew point (moisture). Heat bursts typically occur during night-time and are associated with decaying thunderstorms. In association with wake lows, heat bursts are caused when rain evaporates (virga) into a parcel of cold dry air high in the atmosphere making the air denser than its surroundings. The parcel descends rapidly, warming due to compression, overshoots its equilibrium level and reaches the surface, similar to a downburst.\nRecorded temperatures during heat bursts have reached well above 90 °F (32 °C), sometimes rising by 20 °F (11 °C) or more within only a few minutes. More extreme events have", "-25.062186661467422" ], [ "the stomach’s musculature” lead to temporary feelings of subsided hunger. Other studies have shown that smokers expend more calories while engaged in activity, which echo conclusions that smokers experience heightened metabolic rates. Also worth noting are the diuretic properties of nicotine, which causes lower calcium levels in the blood.\nThere is much controversy concerning whether smokers are actually thinner than nonsmokers. Some studies have shown that smokers—including long term and current smokers—weigh less than nonsmokers, and gain less weight over time. Conversely, certain longitudinal studies have not shown correlation between weight loss and smoking at least among young persons. Accordingly, while", "-24.98271143052534" ], [ "and confused state, it will get scared and go back to sleep for an additional 40 days, thus prolonging the winter. Thus, if it is sunny on Sretenje, it is a sign that the winter is not over yet. If it is cloudy, it is a good sign that the winter is about to end.\nSimilarly in Germany, on the 27 June, they recognize the Seven Sleepers' Day (Siebenschläfertag). If it rains that day, the rest of summer is supposedly going to be rainy. As well, in the United Kingdom, the 15th of July is known as St. Swithin's day. It", "-24.972136850265088" ], [ "Sleep hollow Signs and symptoms Other than excessive sleep, the disease causes vomiting, hallucination, nausea and disorientation. Victims of the disease often feel hallucinations like a \"snail walking over their face\". In a statement, a professor from Tomsk Polytechnic University, Leonid Rikhvanov, of the department of Geo-ecology and Geo-chemistry said that radon gas from the mine could be the cause of the symptoms.\nThe affected persons fall asleep during day-to-day activities and always feel sleepy. One of the doctors said, \"You wake them up, they can speak to you, reply to you, but as soon as you stop talking and ask", "-24.95308119279798" ], [ "the Earth's oceans. Tropical cyclones can also cause a cool wake, due to turbulent mixing of the upper 30 metres (100 ft) of the ocean. SST changes diurnally, like the air above it, but to a lesser degree. There is less SST variation on breezy days than on calm days. In addition, ocean currents such as the Atlantic Multidecadal Oscillation (AMO), can effect SST's on multi-decadal time scales, a major impact results from the global thermohaline circulation, which affects average SST significantly throughout most of the world's oceans.\nOcean temperature is related to ocean heat content, an important topic", "-24.94107870683365" ], [ "ugliness in the world, but the night is quiet and calm and peaceful, and the ugliness is shadowed.\" He further stated that when he wrote the song, he realized that his sleeping pattern had \"taken its toll on me, I felt so far removed from the rest of the human race that I could hardly imagine what happened during the daytime.\" However, he said that he \"still sleep[s] during the day, but I've learned that too much alienation can be damaging to your mental health, so I try to be careful.\"\nThe title of track 5, \"R.D.C.\", came from an abandoned", "-24.93172032431903" ], [ "Respiratory system Mechanics of breathing In mammals, inhalation at rest is primarily due to the contraction of the diaphragm. This is an upwardly domed sheet of muscle that separates the thoracic cavity from the abdominal cavity. When it contracts the sheet flattens, (i.e. moves downwards as shown in Fig. 7) increasing the volume of the thoracic cavity. The contracting diaphragm pushes the abdominal organs downwards. But because the pelvic floor prevents the lowermost abdominal organs moving in that direction, the pliable abdominal contents cause the belly to bulge outwards to the front and sides, because the relaxed abdominal muscles do", "-24.923618344473653" ], [ "Because of their size, they inhale more air per kilogram of body weight than adults. Their elevated metabolic rate and young defense systems make them more susceptible to air pollution.\nSeniors are also at a higher risk because of the weakening of the heart, lungs and immune system and increased likelihood of health problems such as heart and lung disease.\nExposure to air pollutants can cause a range of symptoms. People with lung or heart disease may experience increased frequency and/or severity of symptoms, and increased medication requirements. It is recommended that those susceptive should take greater precautions. Lifestyle Environment Canada recommends", "-24.905113791290205" ], [ "or fruity breath odor due to ketones, and seizures in advanced cases. Pregnancy toxemia appears to be most common in hot climates. Other serious complications during pregnancy can include a prolapsed uterus, hypocalcaemia, and mastitis.\nFemales that do not give birth may develop an irreversible fusing of the pubic symphysis, a joint in the pelvis, due to calcification which may occur between 6 and 10 months of age. If they become pregnant after this has happened, the birth canal will probably not widen sufficiently and this may lead to dystocia and death as they attempt to give birth. Calcification of the", "-24.880210220406298" ], [ "phase-advance portion of the light PRC.Though quite limited in terms of the total number of DSPD patients studied, such data seem to contradict the notion that DSPD is merely a disorder of sleep timing, rather than a disorder of the sleep system itself.\nPeople with normal circadian systems can generally fall asleep quickly at night if they slept too little the night before. Falling asleep earlier will in turn automatically help to advance their circadian clocks due to decreased light exposure in the evening. In contrast, people with DSPD have difficulty falling asleep before their usual sleep time, even if they", "-24.877163954661228" ], [ "strenuous or labored inhalation is sometimes called clavicular breathing, seen especially during asthma attacks and in people with chronic obstructive pulmonary disease.\nDuring heavy breathing, exhalation is caused by relaxation of all the muscles of inhalation. But now, the abdominal muscles, instead of remaining relaxed (as they do at rest), contract forcibly pulling the lower edges of the rib cage downwards (front and sides) (Fig. 8). This not only drastically decreases the size of the rib cage, but also pushes the abdominal organs upwards against the diaphragm which consequently bulges deeply into the thorax (Fig. 8). The end-exhalatory lung volume is now well", "-24.876254431219422" ], [ "increase secretion. Almost in all cases, sleep deprivation has detrimental effects. For example, cortisol, which is essential for metabolism (it is so important that animals can die within a week of its deficiency) and affects the ability to withstand noxious stimuli, is increased by waking and during REM sleep. Similarly, TSH increases during nocturnal sleep and decreases with prolonged periods of reduced sleep, but increases during total acute sleep deprivation. \n\nBecause hormones play a major role in energy balance and metabolism, and sleep plays a critical role in the timing and amplitude of their secretion, sleep has a sizable effect", "-24.862319843028672" ], [ "Sleep deprivation can cause people to intake food for emotional/psychological need rather than caloric need of the body.\nChronic sleep deprivation (less than 8 hours of sleep) was associated with increase in body mass index (BMI). In the Wisconsin sleep cohort study of 1024 patients, the shorter sleep durations showed reduced levels of leptin and elevated levels of ghrelin. In a study with 3000 patients, it has been found that men and women who sleep less than 5 hours have elevated body mass index (BMI). In another study that followed about 70.000 women for 16 years, there was a significant increase", "-24.85423119150437" ], [ "Andrew Burgess of MusicOMH referred to it as a \"fever dream\", citing it as a \"standout moment\" while Clover Hopes of Vibe magazine praised the song as \"instantly timeless\" and described it as a \"gorgeous drum-powered exercise in vocal discipline (with its whispered huffs and puffs) that deals with the loss of a man's mere presence\". Dan Weiss of Popmatters, gave the song a seven out of ten rating and thought that \"\"Sleeping\" is proof that Keys can find the warmth inside of a song even when she pushes away from the piano and the arrangement drifts into something colder", "-24.815723543637432" ], [ "in fear that if they slept in their cribs they would not awaken.\nAs the heat wave's second day began, 17 people had died from drowning alone after trying to swim in order to escape the heat. By the time the sun had risen on July 5, industry had come to a standstill. Throughout the region factories were closed and mail service was suspended. Due to the temperature indoors many began sleeping outside either on roofs of apartments or on sidewalks with at least 5,000 people sleeping on the Boston Commons alone.\nBesides deaths caused directly by the heat, it was reported", "-24.808931400766596" ], [ "to gangrene after soaking in the hot spring, prompted the Singapore General Hospital to warn that people with nerve disorders or diseases affecting blood circulation should be cautious to hot mineral springs. As a result of some negative rumors and hearsay, and the RSAF redevelopment, public interest began to wane and the number of visitors dwindled. Prior to 2018 During its peak, up to 300 people visited the hot spring daily. On 1 March 2002, it was closed for two months while upgrading and improvement works were carried out to the area around the spring, which had become sodden and", "-24.797882309911074" ], [ "shown significance in treating middle of night insomnia.\nSome studies have shown that zaleplon, which has a short elimination half-life, may be suitable for middle-of-the-night administration because it does not impair next day performance. Prevalence Waking up in the middle of the night, or nocturnal awakening, is the most frequently reported insomnia symptom, with approximately 35% of Americans over 18 reporting waking up three or more times per week. Of those who experience nocturnal awakenings, 43% report difficulty in resuming sleep after waking, while over 90% report the condition persisting for more than six months. Greater than 50% contend with MOTN", "-24.78520811328781" ], [ "Insomnia Poor sleep quality Poor sleep quality can occur as a result of, for example, restless legs, sleep apnea or major depression. Poor sleep quality is defined as the individual not reaching stage 3 or delta sleep which has restorative properties.\nMajor depression leads to alterations in the function of the hypothalamic-pituitary-adrenal axis, causing excessive release of cortisol which can lead to poor sleep quality.\nNocturnal polyuria, excessive nighttime urination, can be very disturbing to sleep. Subjectivity Some cases of insomnia are not really insomnia in the traditional sense, because people experiencing sleep state misperception often sleep for a normal amount of", "-24.76337638765108" ], [ "taken an hour or so before the usual bedtime may induce sleepiness. Taken this late, it does not, of itself, affect circadian rhythms, but a decrease in exposure to light in the evening is helpful in establishing an earlier pattern. In accordance with its phase response curve (PRC), a very small dose of melatonin can also, or instead, be taken some hours earlier as an aid to resetting the body clock; it must then be small enough not to induce excessive sleepiness.\nSide effects of melatonin may include sleep disturbance, nightmares, daytime sleepiness, and depression, though the current tendency to use", "-24.734338003734592" ], [ "nighttime sleep in night shift workers. Medications that promote alertness Caffeine is the most widely used alerting drug in the world and has been shown to improve alertness in simulated night work. Caffeine and naps before a night shift reduces sleepiness during the shift. Modafinil and armodafinil are non-amphetamine alerting drugs originally developed for the treatment of narcolepsy that have been approved by the FDA (the US Food and Drug Administration) for excessive sleepiness associated with SWSD. Medications that promote daytime sleep Obtaining enough sleep during the day is a major problem for many night workers. Hypnotics given in the", "-24.649689534213394" ], [ "and Inland Empire on exceptionally strong June Gloom mornings. If conditions are not as strong, the Basin may be filled while the valleys may be clear. It is not uncommon for motorists to drive over the Sepulveda Pass from the clear, sunny San Fernando Valley and plunge into a cloudy, fog-filled Los Angeles. On a weak June Gloom morning, the clouds and fog may only be present within a mile or two of the coastline, affecting only the beach cities. Formation The low-altitude stratus clouds that make up the June Gloom cloud layer form over the nearby ocean, and are", "-24.640956268107402" ], [ "100 mg/day, such as a 6 oz cup of coffee or two to three 12 oz servings of caffeinated soft-drink, may continue to cause sleep disruption, among other intolerances. Non-regular caffeine users have the least caffeine tolerance for sleep disruption. Some coffee drinkers develop tolerance to its undesired sleep-disrupting effects, but others apparently do not. Risk of other diseases A protective effect of caffeine against Alzheimer's disease and dementia is possible but the evidence is inconclusive. It may protect people from liver cirrhosis. Caffeine may lessen the severity of acute mountain sickness if taken a few hours prior to attaining a", "-24.605802912818035" ], [ "commonly experienced during pregnancy.\nThe increased occurrence of gallstones during pregnancy is due to inhibition of gallbladder contraction (as result of increased smooth muscle relaxation mediated by progesterone) and reduced biliary transportation of bile (mediated by estrogen) which results in cholestasis of pregnancy.\nNausea and vomiting of pregnancy, commonly known as “morning sickness”, is one of the most common GI symptoms of pregnancy. It begins between the 4 and 8 weeks of pregnancy and usually subsides by 14 to 16 weeks. The exact cause of nausea is not fully understood but it correlates with the rise in the levels of human chorionic", "-24.600723528415983" ], [ "breathing. Drowsiness Drowsiness may result as a side effect of taking meclizine. Users are advised not to operate heavy machinery while under the influence. The consumption of alcohol while under the influence of meclizine may result in additional drowsiness. Elderly As with any anticholinergic agent, meclizine may cause confusion or aggravate symptoms in those with dementia in the geriatric population (older than 65 years). Therefore, caution should be used when administering meclizine to the elderly. Mechanism of action Meclizine is an antagonist at H₁ receptors. It possesses anticholinergic, central nervous system depressant, and local anesthetic effects. Its antiemetic", "-24.59354363917373" ], [ "the patient's disease. During the final hours, patients usually will reject food and water and will also sleep more, choosing not to interact with those around them. Their bodies may behave more irregularly, with changes in breathing, sometimes with longer pauses between breaths, irregular heart rate, low blood pressure, and coldness in the extremities. It is important to note, however, that symptoms will vary per patient.", "-24.591371983347926" ], [ "steady state sleep is obtained. The medulla oblongata controls our respiration. Ventilation Breathing is remarkably regular, both in amplitude and frequency in steady NREM sleep. Steady NREM sleep has the lowest indices of variability of all sleep stages. Minute ventilation decreases by 13% in steady stage II sleep and by 15% in steady slow wave sleep (Stage III and Stage IV sleep). Mean inspiratory flow is decreased but inspiratory duration and respiratory cycle duration are unchanged, resulting in an overall decreased tidal volume.\nIn a study of 19 healthy adults, the minute ventilation in NREM sleep was 7.18 ± 0.39(SEM) liters/minute", "-24.56772407470271" ], [ "has been dubbed the \"fifth day turning point\" (Pasnau et al. 1968). Causes There are multiple possible ways by which one may experience a second wind depending on the time of day. A second wind at around 6–8 AM may be explained by cortisol, a light-triggered hormone, peaking at that time. Cortisol activates adrenaline, which helps one stay awake. As late afternoon transitions into evening, changes in light levels can stimulate the suprachiasmatic nucleus to promote an arousal signal. At about 10:30 PM (depending on factors including the season and the condition of the individual), melatonin—the hormone responsible for preparing", "-24.370435421238653" ], [ "the heart does not compensate for the increased volume shift to the pulmonary circulation, in turn causing pulmonary edema and resultant cough. Other causes of nocturnal cough include asthma, post-nasal drip and gastroesophageal reflux disease (GERD). Another cause of cough occurring preferentially in supine position is recurrent aspiration.\nGiven its irritant nature to mammal tissues, capsaicin is widely used to determine the cough threshold and as a tussive stimulant in clinical research of cough suppressants. Capsaicin is what makes chili peppers spicy, and might explain why workers in factories with these fruits can develop a cough.\nCoughing may also be used for", "-24.36851511267014" ], [ "Pneumomediastinum Signs and symptoms The main symptom is usually severe central chest pain. Other symptoms include laboured breathing, voice distortion (as with helium) and subcutaneous emphysema, specifically affecting the face, neck, and chest. Pneumomediastinum can also be characterized by the shortness of breath that is typical of a respiratory system problem. It is often recognized on auscultation by a \"crunching\" sound timed with the cardiac cycle (Hamman's crunch).\nPneumomediastinum may also present with symptoms mimicking cardiac tamponade as a result of the increased intrapulmonary pressure on venous flow to the heart. Diagnosis Pneumomediastinum is uncommon and occurs when air leaks into", "-24.312910286942497" ], [ "Ambulatory blood pressure Blood pressure variability 24-hour, non-invasive ambulatory blood pressure (BP) monitoring allows estimates of cardiac risk factors including excessive BP variability or patterns of circadian variability known to increase risks of cardiovascular event. Nocturnal hypertension Ambulatory blood pressure monitoring allows blood pressure to be intermittently monitored during sleep and is useful to determine whether the patient is a \"dipper\" or \"non-dipper\"—that is to say, whether or not blood pressure falls at night compared to daytime values. A night time fall is normal and desirable. It correlates with relationship depth but other factors such as sleep quality, age, hypertensive", "-24.307421784324106" ], [ "Another Sleepless Night (Anne Murray song) Content The song, light and uptempo, was a bit of a departure for Murray, whose previous few singles had all been slower-tempo ballads. The narrator notes how it had been hard to sleep during recent nights, as her lover had been away, but then speculates that, with his return, it will yet be \"another sleepless night\", but this time because they'll be up all night \"making romance\".", "-24.28907251727651" ], [ "Adenosine is cleared from the brain during sleep.\nPrevious research by the University of Chicago had also associated short sleep with an increase in calorie consumption from snacks, albeit with no change in overall calorie intake, hormone levels or energy expenditure across the different sleep schedules tested. A 2014 review of studies on the link between sleep debt and obesity also reported no association between short sleep duration and total energy expenditure.\nA study of Gonnissen et al. (2012) showed that the desire-to-eat ratings were higher after a night of fragmented sleep in comparison to a normal night of sleep. This could", "-24.261099459195975" ], [ "blood pressure in sleeping patients. The team observed that when patients fell asleep and began snoring, prolonged pauses in their breathing (apneas) were noted that corresponded with dramatic elevations in their resting blood pressure, simulating strenuous exercise as if the patient were lifting weights. Guilleminault then went on to publish several articles illustrating dramatic improvements and reversal of sleep apnea following tracheostomies. Tracheostomy proved curative in these patients, and demonstrated reversal of cardiac arrhythmias and blood pressure abnormalities during sleep; temporarily capping these artificial airways would re-capitulate the changes of sleep apnea, further establishing the causative relationship between sleep apnea", "-24.24134161742404" ] ]
1hbl9t
why some import cars, such as the Nissan R34 Skyline is illegal to own or so hard to get in America?
[ "The US has many many regulations on cars, stuff like emissions controls and safety. Some of this can be extremely expensive to engineer and build, and on low-production models it's not practical. The bigger problem is the testing requirements: manufacturers are required to crash test cars and it's an extremely expensive process. And if they change something, like the transmission, they may have to re-do all the crash testing. Imported cars are required to meet many of these requirements, even if you are just trying to get one car through customs.", "**TL;DR Mercedes offered a better version of the SEL in the European market, so those that could afford it would just ship it in. It was successful enough to damage US dealers. They lobbied congress with many millions of dollhairs.** Since nobody here gave you the correct answer, I will. \"This avenue of vehicle availability was increasingly successful, especially in cases where the US model of a vehicle was less powerful and/or less well equipped than versions available in other markets. For example, Mercedes-Benz chose to offer only the lower-output 380SEL model in 1981 to Americans, some of whom wanted the much faster 500SEL available in the rest of the world. BMW had the same issue with their 745i Turbo. The grey market was successful enough that it ate significantly into the business of Mercedes-Benz of North America and their dealers. The corporation launched a successful million-dollar congressional lobbying effort to stop private importation of vehicles not officially intended for the U.S. market.\" [Source]( URL_0 ) That lobbying led to making a bunch of arbitrary and bullshit laws, like needing US crash testing, US emissions, and US market glass, and only cars that are over the age of 25 are exempt. I now live in the UK, and you can register any road legal car as long as it meets a certain set of guidelines annually on your Ministry of Transport inspection (MOT for my redcoat brothers and sisters). The car market in Europe is 10x better and far cheaper if you buy used. New cars are more expensive as a result of certain trade agreements and high taxes. The R34 is illegal because they do not have NHTSA crash test data on it. The 96-98 R33 is legal because they had full successful crash testing done, but you still need to replace the exhaust and glass.", "I used to on a 92 R32 Skyline. I can tell you that they have very different safety standards. No safety glass, poor reinforcement, and etc. Basically they tried to make a car as light and fast as possible at the cost of safety. A picture of my [Skyline]( URL_0 ) It was back in 07, so camera phones sucked then.", "In 2006, Motorex was banned from importing Skylines into the U.S. because they faked crash tests. Then shortly after that, the government made a new rule that the car has to be 25 years or older in order to be imported. Before then you could easily import one here, and bring it up to U.S. standards. However people usually say its because its a RHD (right hand drive) car but thats not true.", "A buddy of mine had an older skyline that was wrecked and rebuilt and had the serial number of an altima. But that's a cheap way around it. EDIT: i can't spell", "The Ebay's Buyer's Guide is the best read I've seen on the subject, in terms of factuality and actual research: URL_0 Too many resources on the matter are from internet experts or random gurus in the tuning community.", "The corporation anticipates low sales, so they don't spend the considerable amount of money to get them certified as passing all the smog and crash testing. Dealers would be required to have at least one mechanic who is trained to maintain and repair all the warrantee covered potential problems.", "From what I've read a lot of Japanese imports that are meant for sport and racing have totally different safety and emission standards than us. Something as simple as having a little but of a higher emission rating than we will allow will prevent them from being imported. For the die hard racers and fans. They'll go through all the bullshit of buying a skyline, shipping, getting it through customs and added on whatever our government demands to allow it to be brought in, then go through with tuning and turning their skyline into the race car the want...yeah a lot of money. But in a nutshell, it's all bullshit politics between two different nations safety and testing ratings. For example Japan doesn't seem to be as tough of emission standards as the US is.", "you can not import a car and register it unless it has the dot/epa stickers. you may temporarily import a non qualifying motor vehicle...if you post a bond, can be up to a million dollar bond (seen on trucks from Canada that are for trade shows) trust me customs and epa will track you down, since the economy went sour the government has been real eager to ine people.... I work at a customs brokerage, I do this stuff daily.", "So what If I wanted VW Scirocco R in the US. I would basically have to buy it in Canada then \"ILLEGALLY\" drive it into Ohio?" ]
[ [ "manufactured in a plant fully or partially owned by that company should not be considered a captive import. The Ford Crown Victoria, which was known for livery use in the United States, particularly for taxi and police duty, was exclusively built in Southwold, Ontario, Canada at St. Thomas Assembly from 1992 to 2011. It is not considered a captive import in the U.S. because of free trade between the two countries, originally under the Canada–United States Automotive Products Agreement and now under NAFTA. American market In the American market, captive imports \"blurred national distinctions\" because they have been designed and", "-31.767399966716766" ], [ "no vehicle sold by Holden or Ford after the cease of Australian production should be considered a captive import since neither maintains an Australian manufacturing presence.\nIn the United States, a vehicle that is assembled in Canada or Mexico and is distributed domestically by a Big Three automaker is not considered a captive import. This is due to the integration of manufacturing operations by the Big 3 in these countries due to the hospitable trade environment created by the North American Free Trade Agreement (and before NAFTA, the US-Canada Auto Pact), coupled with the proximity of these nations to the U.S.", "-30.864939420018345" ], [ "vehicles into the United States to fill a void in their compact lineup with vehicles such as the Dodge Colt. Mitsubishi would only start selling vehicles under their own name in the United States in 1982.\nIn countries or regions where a foreign manufacturer might have a fully owned subsidiary that develops and manufactures vehicles or a strong manufacturing presence, a captive import can be a vehicle from the manufacturers' indigenous country or an affiliated manufacturer worldwide. Holden is the Australian subsidiary of American General Motors, and was considered to be a domestic manufacturer in Australia until Australian domestic production completely", "-28.451471702661365" ], [ "officially imported vehicles re-manufactured and type approved for the U.S market, with the Citroën badges removed. The importing companies suffered legal harassment from PSA Peugeot Citroën, but despite this, and with no advertising and only a minimal service network, the powerful cult brand of Citroën still managed to sell about 1,000 cars.\nPrice was the biggest hindrance - for example a US market CX GTi cost 107% more than the factory US-model Peugeot 505S.\nAs the U.S. government now exempts cars older than 25 years from all design legislation, the CX can be freely imported. The Canadian government applies a similar rule", "-28.291954351385357" ], [ "the vehicle but sold under its brand. Usually, the manufacturer of the vehicle might be an affiliate of the importer. The Chevrolet Forester was sold in India by General Motors, where its manufacturer, Japan-based Subaru does not have a sales presence and the importation agreement started during the period when the manufacturer of Subaru, Fuji Heavy Industries, was affiliated with General Motors.\nA vehicle manufactured in a country where the manufacturers' indigenous country has a free-trade agreement with other countries in the same region such as the European Union for Europe, NAFTA for North America or ASEAN for Southeast Asia and", "-28.216582085122354" ], [ "so-called \"voluntary restraint agreement\" limiting the number of autos that they could import to the U.S. to 1.68 million per year. One side effect of this quota was that Japanese car companies opened new divisions through which they began developing luxury cars that had higher profit margins, such as with Toyota's Lexus, Honda's Acura, and Nissan's Infiniti. Another consequence was that the Japanese car makers began opening auto production plants in the U.S., with the three largest Japanese auto manufacturers all opening production facilities by 1985. These facilities were opened primarily in the southern U.S., in states which disadvantaged unions", "-28.159174831496784" ], [ "the United States. Only in the 1960s did Datsun begin to brand some automobile models as Nissans, like the Patrol and a small test batch of about 100 Cedric sedans, and then not again until the 1980s. The Japanese market Z-car (sold as the Fairlady Z) also had Nissan badging. In America, the Nissan branch was named \"Nissan Motor Corporation in U.S.A.\", and chartered on September 28, 1960, in California, but the small cars the firm exported to America were still named Datsun.\nCorporate choice favored Datsun, so as to distance the parent factory Nissan’s association by Americans with Japanese military", "-27.975496326791472" ], [ "Also, vehicles made and marketed by European automakers that were eventually acquired by the Big Three automakers, such as Land Rover, Volvo, and Saab, are generally not considered to be captive imports. The Opel vehicles sold in the 1960s and 1970s are exceptions to this rule because they were sold through the Buick distribution channel, while retaining the Opel brand name. Thus, they are captive imports. Recent models Examples of captive imports in the U.S. have included the Cadillac Catera, a rebadged Opel Omega, the Chevrolet Aveo, built by GM Daewoo, and the Chrysler Crossfire — an American design which", "-27.961983377696015" ], [ "Tesla US dealership disputes Tesla, Inc. has faced dealership disputes in several U.S. states as a result of local laws. In the United States, direct manufacturer auto sales are prohibited in many states by franchise laws requiring that new cars be sold only by independent dealers. The electric car manufacturer Tesla maintains that in order to properly explain to their customers the advantages their cars have over traditional vehicles with an internal combustion engine, they cannot rely on third party dealerships to handle their sales. Corporate strategy Tesla has an 60% degree of vertical integration in 2016 according", "-27.743152216717135" ], [ "are normally much higher due to local taxes.\nOverseas exchanges also sell to authorized personnel new US Specification vehicles made by Ford and Chrysler, as well as Harley-Davidson motorcycles.", "-27.655894848459866" ], [ "to configure and experience cars on 1:1 scale digital screens. In markets where it is permitted, Mercedes-Benz opened city centre brand stores.\nTesla Motors has rejected the dealership sales model based on the idea that dealerships do not properly explain the advantages of their cars, and they could not rely on third party dealerships to handle their sales. However, in the United States, direct manufacturer auto sales are prohibited in almost every state by franchise laws requiring that new cars be sold only by dealers. In response, Tesla has opened city centre galleries where prospective customers can view cars that can", "-27.59745763562387" ], [ "these dealers buy mostly new cars at a lower price than Norway's retail price thanks to the moderate demand for Leaf in other countries, where better price deals are offered. Then, the cars are sold in the Norwegian market up to 30,000 kr (~ US$5,000) cheaper than from Norway's dealerships. Official Norwegian dealers have raised questions about the kind of guarantee offered for the imports. Out of 1,412 all-electric cars registered in the country during the first quarter of 2013, 269 were used imports, representing 19% of all registrations during this quarter.\nIn September 2013, several French news outlets reported that", "-27.423058772459626" ], [ "in their models, with many scouring for OEM parts, including police radios, shotgun holders, lights, sirens, and other related equipment. However, the hobby is limited, as many states have regulations on private citizens owning cars that could be mistaken for real law enforcement vehicles. Some get around the regulations by using magnetic decals and removable lights. CHP Hatchback In 1982, the CHP ordered 400 Special Service Package notchback coupes (394 were built by Ford and shipped to the CHP), and at least 4 cars were SSP hatchbacks. These four hatchbacks were painted and equipped in the same", "-27.399225255208876" ], [ "there were plans to continue Cony vehicles under the Nissan badge, the plant was instead put into use to produce larger and far more profitable Nissan models, such as the Nissan Cherry, while the dealer network was transformed into the Nissan Cherry Store. Nissan did not control Aichi Kouchi completely until 2012, when it became a fully fledged subsidiary of Nissan.", "-27.38902093708748" ], [ "Japan. Soler began having trouble financing its purchases of new vehicles.\nSeeing that other Japanese car makers were allowing their dealers in Puerto Rico to transship excess inventory to Latin America and the continental United States, Soler asked if it could do the same. Mitsubishi refused, saying the vehicles were customized for the Puerto Rican market. They lacked heaters and defoggers that they would have needed on the mainland, and their engines could not run on the lower-grade leaded gasoline sold in many Latin American countries at that time. Further, Soler had no experience with maritime shipping and would not been", "-27.380214392673224" ], [ "the classification of the Nissan Pathfinder as a cargo vehicle, which had effectively raised the import tariff on this and similar vehicles from 2.5% to 25% based on a 1989 law. The ruling, which affirmed a 1993 decision by the United States Court of International Trade, opened the door to Japanese expansion in the US light truck market, in particular the growing sport utility vehicle (SUV) segment. During the 1990s, the association opposed a move by the Clinton administration to impose a 100% tariff on 13 luxury vehicles imported from Japan. Fuel economy and emissions On behalf of its members,", "-27.33759585977532" ], [ "cars instead, and 13 discouraged EVs. The most knowledgeable dealerships were Chevrolet, and the least were Toyota.\nIn 2016, two shopper surveys showed contrasting shopping experiences between Tesla and traditional dealerships. One performed by the environmental organization Sierra Club found that in 14% of traditional dealerships, their electric cars were not charged to test drive, and 33% did not discuss $7,500 tax credits.\nAnother study by industry analyst Pied Piper using mystery shoppers found that Tesla sales stores (not galleries) differed among each other on sales techniques, and many stores were reluctant to engage in closing a sale.\nCustomers generally view car shopping", "-27.314685249584727" ], [ "the 1991 Explorer, which Mazda sold as the 2-door only Mazda Navajo from 1991 through 1994. However, Mazda's version was unsuccessful, while the Ford (available from the start as a 4-door or 2-door model) instantly became the best selling sport-utility vehicle in the United States and kept that title for over a decade. Mazda has used Ford's Ranger pickup as the basis for its North American–market B-Series trucks, starting in 1994 and continuing through 2010, when Mazda discontinued importing its B-Series trucks to North America, due to costs associated with the chicken tax.\nFollowing its long-held fascination with alternative engine technology,", "-27.191046442720108" ], [ "electric models, including the Chrysler TEVan, Ford Ranger EV pickup truck, GM EV1 and S10 EV pickup, Honda EV Plus hatchback, Nissan lithium-battery Altra EV miniwagon and Toyota RAV4 EV.\nThe automakers were accused of pandering to the wishes of CARB in order to continue to be allowed to sell cars in the lucrative Californian market, while failing to adequately promote their electric vehicles in order to create the impression that the consumers were not interested in the cars, all the while joining oil industry lobbyists in vigorously protesting CARB's mandate. GM's program came under particular scrutiny; in an unusual move,", "-27.147315257243463" ], [ "franchisee and importer for Nissan, and its Datsun range of cars. Under Botnar's leadership, Datsun had become one of the biggest car imports in Britain, outselling not only its arch Japanese rival Toyota but eventually became the most popular foreign brand in the UK. At its peak, Botnar owned more than 200 Nissan dealerships throughout the country and was considered one of Britain's wealthiest men. Philanthropy Octav's only child, Camelia Botnar was killed in a car crash near Stonehenge in 1972 at the age of 20. Her death led to a wave of philanthropy that saw", "-27.02323221846018" ], [ "demand. Russia While Russia has right hand traffic, it allows the importation of LHT vehicles if they pass the technical inspection. This is compulsory for all street-legal vehicles in Russia. Although a prohibitively high import tariff is levied on cars more than seven years old, to protect local industry, the oldest Japanese vehicles usually pass the inspection, if they were well maintained. Vehicles imported to Russia are sometimes exported to North Korea and Central Asia. Saudi Arabia Unlike the UAE, Saudi Arabia does not allow imports of vehicles from Japan or any LHT country because only left hand drive vehicles", "-27.004500493756495" ], [ "its dealers to service Allstate cars when asked. Many Kaiser-Frazer dealers were displeased to see \"their cars\" sold by another outlet, especially since the Allstate carried more standard equipment, yet sold at a lower price than the Henry J.\nSears marketed the car as \"the lowest-priced full-sized sedan on the U.S. market.\" However, Sears did not accept trade-ins from Allstate buyers, and there may have been reluctance to buy a car through a department store where service was thought to be questionable. (The lack of a trade-in program proved to be a serious impediment to the sale of Graham-Bradley tractors from", "-26.985180595438578" ], [ "components for their passenger cars under license. The United States not only supplied European factories with the necessary blueprints and licenses, but also sourced American-made tooling equipment accordingly, which allowed the automobile companies to optimize their production lines. By the 1960s it was not uncommon for an entire specialized industry—such as the manufacture of helicopters in the United Kingdom—to be dependent wholly on licensed components. \nA number of countries began improving products manufactured under license, and were even able to re-export them successfully. This trend resulted in some technology suppliers imposing additional conditions on the licensee. The United States began", "-26.93520673213061" ], [ "most of them were \"imported\" back to Serbia in the early 2000s, most likely because most of them were in good shape for their age.\nIn the United States, few Yugos are left in service, likely because of international sanctions imposed on Yugoslavia in the early 1990s, which limited the supply of spare parts and service locations. The United Kingdom has around 100 Yugos still in existence and an owners club has been created. Unlike in the United States, the Yugo was never considered to be one of the worst cars ever imported in the UK, partly because other much worse", "-26.90433956479319" ], [ "had been sold to support these programs in the cities of Kyoto, Ebina and Yokohama. City officials and private citizens were using the vehicles.\nNissan took 11 Hypermini August 2006 vehicles back from city council of Pasadena, California after leases expired, stating \"Nissan says it no longer makes the Hypermini and can't maintain the cars\". Publicly owned examples can sometimes be found for sale in Japan.", "-26.895213998737745" ], [ "range on a single charge in partnership with local companies.\nAs of 2013, Chile was the only country outside South Korea that RSM has sold its cars under the Renault Samsung Motors marque and not as rebadged Renaults. In 2015, Renault Samsung badging was replaced entirely by Renault in Chile, with the vehicles themselves now being known under their global Renault names (e.g. the Renault Samsung SM5 is the Renault Latitude). Manufacturing The car manufacturing plant is located at Busan in the Sinho Regional Industrial Site and began production in 1998. It covers 1,650,000 m² and has the capacity to manufacture", "-26.8649625495309" ], [ "Nissan's plant in Washington, England, as an indirect successor to the conventional medium-sized Almera hatchback which ceased production at Washington in November 2006. The direct successor to the Almera in Europe is the Tiida; however it has not been officially imported to the United Kingdom, although it has been available since March 2009 with models sourced by the Arnold Clark dealership network from the Republic of Ireland.\nThe Nissan Note used to be available in three specifications, the 'S', 'SE' and 'SVE'. The base model was equipped with full electric windows, alloy wheels and front fog lights or the Flexi-Board boot", "-26.829124581010547" ], [ "because of its high price. However, it is used very often as official government cars. Chevrolet also rebranded the Argentine-built Suzuki Vitara as the Chevrolet Tracker after Suzuki stopped selling cars in Brazil, but it never achieved the same selling numbers from the original car.\nIn Japan, where foreign car manufacturers have traditionally struggled to compete in the local market, even rebadging of U.S. models like the Chevrolet Cavalier as a Toyota have failed to improve sales. \nIn Australia, GM's Holden operation sold the 1975-84 Isuzu Bellett/Gemini, itself a license built version of the then current Opel Kadett, as the Holden", "-26.807596430378908" ], [ "the Model S passed the Nissan Leaf as the all-time best selling all-electric car in Canada.\nThe all-electric Renault Twizy 40 low-speed quadricycle was certified by Transport Canada in March 2016, and was scheduled to be released on the Canadian market by mid-2016.\nBritish Columbia is the only place in the country where it is legal to drive a low-speed vehicle (LSV) electric car on public roads, although it also requires low speed warning marking and flashing lights. Quebec is allowing LSVs in a three-year pilot project. These cars will not be allowed on the highway, but will be allowed on city", "-26.717031952252455" ], [ "and range. Retail sales of the i-MiEV began in December 2011,\nThe Nissan Leaf roll-out in Canada began with fleet customers on July 29, 2011, and deliveries to individuals began in late September 2011. As of December 2011, the Leaf was sold only through 27 Leaf-certified dealers for the entire country, and sales were limited to customers who live within a 65 km (40 mi) radius of one of those dealers. Cumulative sales through December 2014 reached 1,965 units, and, as of December 2014, the Leaf ranked as the top selling all-electric car in the country.\nRetail sales of the Tesla Model S began in 2012,", "-26.66900184500264" ], [ "is different from the standard dealership model in the global vehicle marketplace. Tesla is the only automaker that sells cars directly to consumers; all others use independently owned dealerships, although many provide online configuration and financing. 48 states have laws that limit or ban manufacturers from selling vehicles directly to consumers, and although Tesla has no independent dealerships, dealership associations in multiple states have filed lawsuits over Tesla's sales practices.\nCountries other than U.S. do not protect dealers. The Federal Trade Commission recommends allowing direct manufacturer sales, which analysts believe would save consumers 8% in average vehicle price.\nIn February 2019, Tesla", "-26.64459060074296" ], [ "found that exclusive cars, sports cars and SUVs were \"characterized by a poor environmental performance.\" Another study found that family size internal combustion vehicles still produced fewer emissions than a hybrid SUV.\nVarious eco-activist groups, such as the Earth Liberation Front or Les Dégonflés have targeted SUV dealerships and privately owned SUVs due to concern over increased fuel usage.\nIn the US, light trucks and SUVs are held to a less-strict pollution control standard than passenger cars. In response to the perception that a growing share of fuel consumption and emissions are attributable to these vehicles, the Environmental Protection Agency ruled", "-26.626891348103527" ], [ "four-cylinder engine.\nDatsun entered the American market in 1958, with sales in California. By 1959, the company had dealers across the U.S. and began selling the 310 (known as Bluebird domestically). From 1962 to 1969 the Nissan Patrol utility vehicle was sold in the United States (as a competitor to the Toyota Land Cruiser J40 series), making it the only Nissan-badged product sold in the US prior to that name's introduction worldwide decades later.\nFrom 1960 on, exports and production continued to grow. A new plant was built at Oppama, south of Yokohama; it opened in 1962. The next year, Bluebird sales", "-26.596903673635097" ], [ "their entire keiretsu structure which is the corner stone of Japanese economy and society to American automobiles. They wanted Japanese dealer networks, such as Toyota, Nissan, Honda, Mitsubishi, and Mazda, to sell American cars. Oe Hiroshi responded that there are fewer American car dealerships in Japan because Japanese consumers prefer European and Japanese cars to American cars. Different vehicle safety program structures also complicate efforts at reciprocal recognition; in Japan and Europe, new vehicles are compliance-tested before they're allowed on the market. Under American laws, automakers self-certify their cars as compliant, and cars are tested only after they go on", "-26.53259867959423" ], [ "transfer of control of Canadian automaking operations to their US parent corporations substantially reduced the autonomy of the Canadian operations with respect to vehicle and component specification, design, and sourcing; manufacturing and production, branding and marketing, and corporate policy.\nThe agreement also prevented Canada pursuing free trade in automobiles elsewhere internationally, and this North American exclusivity led Transport Canada to adopt the Federal Motor Vehicle Safety Standards (FMVSS) of the U.S. National Highway Traffic Safety Administration rather than participating in the European-based development of international consensus on auto safety and emissions regulations.\nOther automobile manufacturers around the world complained to the World", "-26.5008769199776" ], [ "during the 2011 model year. As 2012 production was illegal for sale in the United States (due to lack of stability control), the entire 2012 production was exported to the Middle East. Discontinuation From the 1992 introduction of the Crown Victoria to the 2005 introduction of the Ford Five Hundred, the layout of American full-size sedans underwent an extensive transition. By 1996, as General Motors ended production of the Chevrolet Caprice, Buick Roadmaster, and Cadillac Fleetwood, virtually all competitors of the Crown Victoria had adopted front-wheel drive, with a five-passenger configuration largely replacing six-passenger seating (with the first", "-26.480729814968072" ], [ "300C, Chrysler PT Cruiser, Dodge Caliber, and Jeep Wrangler. Chevrolet markets only Korean-made Daewoo cars, but not its American-made models. Ford markets some cars from its European line, not its American product line. Even Subaru, a Japanese car maker, did not do well with cars made by a US-based subsidiary, Subaru of Indiana Automotive, which exported the US-made Tribeca to Singapore.\nNon-Japanese Asian car brands sold in Singapore include Perodua, Proton, Ssangyong, Hafei Motor, Chery, Geely, Kia, Hyundai, Chana, and Holden Special Vehicles.\nUsed cars that are more than three years old cannot be imported into Singapore. Aftermarket Because Singapore does not", "-26.42604957814183" ], [ "wanted to sell directly through their own-branded dealerships. A voluntary import quota system was in place at this time, restricting the number of cars Japanese automakers could bring into the U.S. As the Japanese company began to open its own branded dealerships to sell directly, every imported Cordia, Tredia, and Starion sold by Mitsubishi had to be discounted from Chrysler's allocation. Incorporation In order to circumvent this, the two partners officially incorporated Diamond-Star Motors in October 1985. An incentive package worth US$274 million, and an intense and controversial lobbying effort by state and local government authorities, meant that Illinois won the", "-26.41838421887951" ], [ "The first models were imported from the UK, but later models were imported from Belgium. The Holden Astra name had previously been used on rebadged Nissan Pulsar models from 1984 to 1989.\nOpel Astra's first generation was exported to Brazil from December 1994 as the Chevrolet Astra, possible because of a lowering of import tariffs. General Motors do Brasil sent the 2.0-litre, 115 bhp engines to Belgium, whence the completed cars took their way to Brazil. In February 1996 the Brazilian government again changed the import tariff, from 20 to 70% - making the car prohibitively expensive and leading to its cancellation", "-26.39163417191594" ], [ "in North America have been imported by individual dealers or independent enthusiasts.\nBetween 1975 and 1980 the Case Corporation (now merged into CNH Global) imported the U-900 model into the United States and sold it through Case tractor dealerships as the MB4/94.\nIn 2002 DaimlerChrysler tried to re-enter the North American market and engaged in 4 years of aggressive marketing, such as truck and trade shows, exposure on the television show Modern Marvels, numerous magazine articles and extensive demonstrations (both touring and on an individual basis). North American retail models were officially limited to the U 500 series (the North-America-specific member of", "-26.287510685622692" ], [ "times more than an Indian make.\nThere are issues with services due to lack of established companies and just about everyone importing and selling them from China, resulting in problems to their customers, this is the reason consumers have started gaining knowledge and prefer more durable versions from well-established companies and Indian manufacturers. E-rickshaw law in India Initially e-rickshaws were unregulated by any central law in India. However, the Delhi High Court, banned running of e-rickshaws in Delhi on 31 July 2014, over safety concerns raised through a public interest litigation. In a rally held for regularization of e rickshaws in", "-26.258641613123473" ], [ "sold only to law enforcement agencies in the U.S. and Canadian market as of 2011. General Motors will not directly sell a Caprice PPV to the general public, however, some vehicles have been purchased by individuals via dealer sales channels. These included GM and dealer demonstrator vehicles, excess unsold dealer inventory, and purchases for demonstration use by law enforcement upfitters and other related businesses. The Caprice PPV is imported from Australia and is a captive import of the Holden Caprice from the WM range, not the short-wheelbase Holden Commodore from the VE Range, which is a main patrol car in", "-26.209312524064444" ], [ "as non-power steering, downgraded interior trim, a downgraded braking system, and a mechanical clutch instead of a hydraulic one.\nVehicles sold in the Middle East region are not equipped with catalytic converters to make the car cheaper to build. Because of the lack of the catalytic converter the vehicles are illegal in Mexico and South America. More recent models have received a Renault-built hydraulic clutch and an optional catalytic converter. Its affordable price, relatively good fuel economy, easy to fix and find spare parts make it popular among local taxi drivers and low income families in Mexico, South America, Central America,", "-26.19978267897386" ], [ "(8 km) from the Port of Tyne where international distribution is based. History Nissan had been importing cars from its native country Japan to the UK since 1968, under the Datsun brand (which was phased out between 1982 and 1984, when the Nissan brand took over completely). After a steady start, its market share rose dramatically from just over 6,000 car sales in 1971 to more than 30,000 a year later, and reaching 100,000 a year before the end of the decade, aided by competitive prices, good equipment levels and a reputation for producing reliable cars. The success of Datsun", "-26.196502083621453" ], [ "to keep production in China and import it rather than having it built in the United States because it made sense from a business point of view: “We have production already going (in China) and adding a second manufacturing facility for the volumes that we would expect in the U.S. just wasn’t feasible,” he said. “We wanted to take advantage of the manufacturing already in place. We’re very confident in the vehicle.”\nOn August 6, 2018, Buick announced that it might withdraw the Envision from the North American market, should a request to seek a waiver to continue to import the", "-26.159229970828164" ], [ "Nissan electric vehicles Nissan Motors has developed several concept cars and limited production electric cars, and launched the series production Nissan Leaf all-electric car in December 2010. As of December 2015, the Leaf is the world's all-time best selling highway-capable plug-in electric car with over 200,000 units sold since its introduction.\nThe Renault-Nissan Alliance committed €4 billion (around US$5.2 billion) into its electric vehicle (EV) and battery development programs with the aim to become the leader in zero-emission transportation. By mid 2015, the Alliance ranked as the world's leading electric vehicle manufacturer with global sales of over 250,000 units delivered since December", "-26.158037745889942" ], [ "Harley-Davidson India History In 2009, Harley-Davidson announced plans to establish a subsidiary to be located in Gurgaon, near Delhi.\nPlans to enter the Indian market were delayed for several years, due to high tariffs and emissions regulations. The pollution regulations have recently changed, but the tariff problem is yet unresolved.\nIn 2007, U.S. Trade Representative Susan Schwab and the Minister for Commerce and Industry of India, Kamal Nath, had agreed that Harley-Davidson motorcycles will be allowed access to the Indian market in exchange for the export of Indian mangoes. One Indian commentator called this \"mango diplomacy.\"\nHowever, India had not specified emission standards", "-26.149315937189385" ], [ "Japanese-market vehicle without replacement or modifications to the headlamps and other lights and reflectors, window glass, tires, seatbelts and other equipment. Chile In Chile, second hand imported vehicles may only be registered in the extreme regions of Arica and Parinacota, Tarapacá, Aisén and Magallanes. Japanese used vehicles must meet emission standards and be converted to left hand drive. However, a big market of non converted cars exists in the duty-free zone of Iquique, where customers from other countries buy them and sometimes drive them home. Greece In Greece, second hand vehicles are allowed but they cannot be older than three", "-26.130522465100512" ], [ "Philippines In 1999 Yulon bought a 75% ownership of Nissan's newly built production base in Santa Rosa, Laguna province. This occurred after the Nissan Motor Company pulled out of the Philippines after the Asian market crises caused poor sales in the country. In 2013, it was announced that Nissan Motor Company of Japan will be again taking over Nissan in the Philippines. This comes after dismal sales and poor model updates from Yulon Taiwan, which ranked Nissan Philippines well below local rivals from Toyota, Mitsubishi, and Hyundai—not reflective of its ranking as no. 6 global carmaker. Joint ventures All of", "-26.087043441599235" ], [ "Autoliners.\nIn August 2017 a large fine was applied by the South Korean Fair Trade Commission against Mitsui O.S.K. Lines and Nissan Motor Car Carrier for antitrust law violation.", "-26.070062831247924" ], [ "February 1996), the various license-built Nissans had all been branded Yue Loong (Yulon after 1992). Assembler With production bases located in China, Philippines and Taiwan, Yulon makes license-built versions of many automakers' models. The companies it manufactures in cooperation with include Chrysler, Geely, GM, Mercedes Benz, Mitsubishi and Nissan. It assembles most of the vehicles from complete knock down kits.\nThe company has used its design and engineering expertise to localize its manufactures to suit Taiwanese tastes.\nWhile Yulon continues to manufacture vehicles for sale on the Taiwanese market, as of 2010 it also imports Nissan, Infiniti, and Renault models for sale", "-26.056016091257334" ], [ "by both the United States and China in July 2018.\nNot many of the imports were from the US even prior to 2018. As of 2017, American automakers exported roughly 250,000 cars to China per annum and imported about 50,000 from China.\nThe government is limiting the number of conventionally-powered new cars that are licensed each year, particularly in Beijing where the wait for a license plate in 2018 was roughly five years. Each such plate was priced at US$14,300, an amount that would almost be adequate to buy a small economy car. Licenses for electric vehicles on the other hand, can", "-26.009013590795803" ], [ "emissions and, in some jurisdictions, making the vehicle illegal.", "-26.006891361030284" ], [ "by Daewoo, now owned by GM, are no longer badged as Daewoos. Instead, they are now badged as Chevrolets. Similarly, in Australia and New Zealand, where Daewoo was unsuccessful, they were rebadged as Holden models. The Australian car manufacturing industry experienced major badge reengineering during the 1980s and 1990s as part of the failed Button car plan.\nIn Japan, Toyota, Nissan, and Honda used this approach to expand vehicle production by offering one car at multiple Japanese dealerships. Toyota took the Corolla, which was exclusive to Toyota Corolla Store locations and sold it as the Toyota Sprinter, which was exclusive to", "-25.99526964875986" ], [ "and Nissan each took a 1.55 per cent stake in Daimler. American Motors In 1979, Renault entered into an agreement with American Motors Corporation (AMC) to sell cars in the US. A year later, Renault acquired a 22.5% interest in AMC. This was not the first time the two companies had worked together. In the early 1960s, Renault assembled CKD kits and marketed Ramblers in France. In 1982, Renault increased its stake in AMC to 46.4%. The Renault Alliance/Encore (a modified version of the Renault 9 and 11) entered production in the US, but following AMC's continued decline, Renault withdrew", "-25.977471731603146" ], [ "American International Automobile Dealers Association The American International Automobile Dealers Association (sometimes abbreviated as AIADA) is a United States lobbying force dedicated to the economic and political interests of America's international nameplate automobile dealers. Headquartered in Alexandria, Virginia, its primary focus is on promoting free trade and opposing tax increases. History AIADA was established in 1970 as the Volkswagen Dealers Association in response to a growing protectionist movement in the United States. On September 10, 1970 the first Board of Directors meeting of the Volkswagen American Dealers Association (VADA) was held. The officers elected were David H. Gezon, President; Ken", "-25.974097203230485" ], [ "and Mercedes-Benz' larger SUVs which are built at BMW's Spartanburg plant or Daimler's Tuscaloosa plant.\nAudi discontinued it’s European Delivery program at the end of 2018 citing “Due to recent changes in the distribution process and the manufacturing of key Audi models outside Ingolstadt and Neckarsulm”.\nJapanese makers who, despite heavy manufacturing presence in North America, still assemble most North America-bound luxury and sports models in Japan, have yet to initiate a similar program. A theoretical program would probably face increased difficulty because, while not illegal to operate in Japan, vehicles for the North American market have their steering wheels on the", "-25.926624679530505" ], [ "the Subaru 360 and the Yugo hatchback, as well as producing his own car, among other things.)\nThe main importer for North America was the American Rabbit Corporation.", "-25.919207886152435" ], [ "loose regulations to export banned goods to the importing country. In 1997, one US company was caught exporting electro-shock guns and pepper spray without a license by mislabeling them as “Fountain pens, Keychains, Child Sound device, [and] Electrical voltage units.”", "-25.91471279162215" ], [ "version). North America The United States has had the sedan-only ninth-generation PS platform model since October 15, 2003. It was announced at the 2003 New York International Auto Show in April for the 2004 model year, following the exhibition of the SSS concept sedan at the North American International Auto Show three years before. The ninth-generation United States-sourced model is available for sale only in a few regional markets, namely the United States, Puerto Rico, Russia, Ukraine and Arabia. Russia began sourcing its Galants from the United States from 2006. The Arabian markets began sourcing their Galants from the United", "-25.910426235874183" ], [ "first five years since its introduction.\nChargers are in use with numerous police agencies in North America as both marked and unmarked patrol cars. Law enforcement agencies outside of the U.S. have also purchased the Charger, including police services in Canada, Mexico, Chile, the Czech Republic, and the Middle East, including Bahrain, Kuwait, Lebanon, and the United Arab Emirates. Both V6 and V8 models are being adopted, with highway patrols favoring the 5.7 L (345 cu in) Hemi V8 engine and cities more likely to purchase the base police package with the 3.5 L V6 fuel-efficient engine. The Charger is also in service", "-25.898602811677847" ], [ "for motorcycles over 500 cc displacement, effectively prohibiting the import of Harley-Davidsons, along with most models of other manufacturers. Plans to export to India were also held up by import duties of 60% and taxes of 30%, which effectively doubled the sale price.\nA Harley-Davidson spokesman said the company thinks demand is high enough to overcome the tariffs, and (then) chief operating officer Matthew Levatich said they would continue to push for lower tariffs. Levatich has since been promoted to chief executive officer.\nHarley-Davidson is introducing 12 models in India from the range of five motorcycle families, namely Sportster, Dyna, VRSC,", "-25.86591357080033" ], [ "an industry observer as \"a clear copy\" – this one of the Toyota Aygo.\nDomestic dealerships have been known to take advantage of this and replace the badging of BYD vehicles with those of other car manufacturers, including Toyota. Micheal Austin, vice president of BYD America, has acknowledged the issue saying that the practices done by dealers (which are franchised) has made BYD \"uncomfortable\". Even the US government has criticized BYD's practices, with a WikiLeaked document from the US Consul-General to Guangzhou (Brian Goldbeck) referring to BYD's practice of copying in a document entitled \"BYD seeks to 'Build Your Dreams' -- based", "-25.85340359224938" ], [ "produce models of cars specifically for sale in Canada, assembled at branch plants there. Although these models were sold under different names, they were similar to the American models, but with cosmetic changes in design.\nThe signing of the agreement in 1965 removed the tariffs between the two countries. In exchange the big three car makers (General Motors, Ford, and Chrysler) and later Volvo agreed that automobile production in Canada would not fall below 1964 levels and that they would ensure the same production-sales ratio in Canada. The two stated goals of APTA were to reduce production costs in Canada through", "-25.85239143529907" ], [ "to answering basic questions, sales people at Chevrolet, Ford, and Nissan dealerships tended to be better informed than those at Honda and Toyota. The survey found that most of the Toyota dealerships visited recommended against buying a Prius Plug-in and suggested buying a standard Prius hybrid instead. Overall, the secret shoppers reported that only 13 dealers “discouraged sale of EV,” with seven of them being in New York. However, at 35 of the 85 dealerships visited, the secret shoppers said sales people recommended buying a gasoline-powered car instead.\nThe ITS-Davis study also found that a small but influential minority of dealers", "-25.840825894947557" ], [ "of Florida, Nissan and NextEra Energy, a local energy company, are working together to offer $10,000 incentives on the all-electric 2017 Nissan Leaf. In addition, the government offers electric vehicle incentives up to $7,500 to people who meet the qualifications outlined by the Federal Electric Vehicles Tax Credit. A standard 2017 Nissan Leaf costs around $30,000. As a result, Florida residents could purchase a new Leaf for less than half of the market value price.\nSan Diego's local private utility, San Diego Gas and Electric (SDG&E), offers its customers an electric vehicle incentive of $10,000 for a 2017 BMW i3.\nSonoma Clean", "-25.82612156616233" ], [ "the ISDT bought a number of Cheney's motorcycles at full price because he considered them better than other makes.", "-25.816824703331804" ], [ "to the car with the Austin 7 Ruby. Nissan began exporting Datsun-badged cars to the United Kingdom in 1968, at which time foreign cars were a rarity, with only a small percentage of cars being imported – some of the most popular examples at the time including the Renault 16 from France and Volkswagen Beetle from West Germany. The first European market that Nissan had entered was Finland, where sales began in 1962. Within a few years, it was importing cars to most of Western Europe.\nDatsun was particularly successful on the British market. It sold just over 6,000 cars there", "-25.8072181189782" ], [ "was already known in the country for the pick-ups and cars imported from the United States before it officially entered Mexico. The Tacoma is built in manufacturing plants in Tecate, Tijuana, Baja California, Mexico and San Antonio, Texas, U.S.A. The Corolla and the RAV4 are very successful in Mexico as in the rest of the world. Missing makers Few are the mainstream makers that have not official representation in Mexico but all of their models can be imported through exotic car dealers located mostly in Mexico City, Puebla, Veracruz, Mérida, Monterrey and Guadalajara. Citroën Some people have begun to import", "-25.800456214929" ], [ "Nissan New Zealand Local production Nissan assembled a variety of vehicles in New Zealand at the Nissan plant in Wiri, South Auckland until late 1998. Complete knock down (CKD) kits were brought in from Japan and assembled in the Wiri plant. Locally produced components were also used and included items such as tyres, seats, trims, and glass.\nDatsuns as they were called at the time, first came to New Zealand in 1962. In 1981 the company re-branded itself worldwide under the Nissan name. End of local production During 1998 the government decided that tariffs on imported cars would be abolished. This", "-25.79929215728771" ], [ "170,000 vehicles were made, mainly for Greece.\nBy the early 1980s, Nissan (Datsun) had long been the best selling Japanese brand in Europe. In order to overcome export tariffs and delivery costs to its European customers, Nissan contemplated establishing a plant in Europe. Nissan tried to convert the Greek plant into one manufacturing cars for all European countries. However, due to issues with the Greek government not only did that not happen but the plant itself was closed. A joint venture with Italy's then state-owned Alfa Romeo was also entered in 1980, leading to Italian production of the Nissan Cherry and", "-25.775885801864206" ], [ "car manufacturers enter similar licensing agreements. Licenses are expensive, which enhances the position of mass producers of model cars, while smaller companies have been marginalized and forced out of business (Clor 1990). For example, when Ferrari entered into an exclusive agreement with Mattel's Hot Wheels, companies like Solido and Bburago felt the crunch, and Bburago went out of business (though the name was eventually reacquired by Maisto). Collectible manufacturers and locations Manufacturers focusing on premium models, usually in white metal and sometimes resin, include Brooklin Models, Western Models, Enchantment Land, Conquest / Madison, Durham Classics, Elegance Models, Mini Auto Emporium,", "-25.733038260077592" ], [ "and first responders to properly handle a crashed plug-in electric-drive vehicle and safely disable its battery and other high voltage systems. Car dealers reluctance to sell With the exception of Tesla Motors, almost all new cars in the United States are sold through dealerships, so they play a crucial role in the sales of electric vehicles, and negative attitudes can hinder early adoption of plug-in electric vehicles. Dealers decide which cars they want to stock, and a salesperson can have a big impact on how someone feels about a prospective purchase. Sales people have ample knowledge of internal combustion cars", "-25.722016822663136" ], [ "them. Though the manufacturers in India are less in number, manufacturers claim that in the vehicle production is less and cost is a little at higher but they offer higher quality products and also offer services and warranty, these manufacturers market the product as an Indian make and are also popular because of uniqueness in their product and providing a branded better quality product.\nThe FRP body e-rickshaws are also popular in India and are manufactured in India due to high shipment cost from China they are cheaper to Indian manufacturers, where a Chinese version of FRP Rickshaw will cost 1.5", "-25.690359499363694" ], [ "outside Japan. Car export companies verification Whilst the majority of websites in Japan are of genuine business companies, there are scams and fraud in Japan. Foreign importers must verify each company, and transfer money only when transactions are satisfactorily completed. Verification of Japanese companies under the Japan Company Trust Organization can be helpful. Canada Any vehicle more than 15 years old may be imported into Canada without regard to its compliance with Canada Motor Vehicle Safety Standards. Vehicles are registered at the provincial level in Canada, and increasingly stringent sub-national vehicle safety requirements make it difficult to register a", "-25.674364520586096" ], [ "588,000 RMB, respectively.\nOther Zotye models have been said to resemble Volkswagen, Audi and Daihatsu models. Threats to disclose industry secrets The Wall Street Journal reported that the government of China will be forcing foreign carmakers to disclose their electric vehicle technology secrets before the vehicles are allowed to be sold in China. The current Chinese automotive policy states that a foreign carmaker must form a joint-venture with a Chinese carmaker if the former plans to sell its electric vehicles there, with the Chinese carmaker owning 51% of the joint venture.\nDue to this supposed threat by the Chinese government, Toyota postponed", "-25.618446529007997" ], [ "state laws in the United States prohibit manufacturers from selling directly, and customers must buy new cars through a dealer. Discrimination Studies have found that some auto dealerships charge higher interest rates or otherwise raise their prices to females and ethnic minorities, including Asians, and African Americans. These issues have sometimes resulted in lawsuits, including class action lawsuits, against the dealers on the basis of discrimination based on nationality.", "-25.61026963312179" ], [ "October 2007 the Venezuelan government imposed an import quota of 4,000 CCA vehicles which had an adverse effect on the company given that 50% of its sales are directed to the Venezuelan market.\nThe company previously produced on its assembly line, Mazda, Mitsubishi and Ford vehicles. However, poor sales for the Mazda brand in Colombia and the construction of a Mazda plant in Mexico, led to Mazdas being imported to Colombia from the Mazda Mexico Company.", "-25.596599380485713" ], [ "white on red. Domestic car market Car brands are typically sold by only one dealer although there are rare exceptions where two dealers sell the same brand. Several dealers have more than one location. Some dealers sell more than one brand, unlike the situation in some western European countries in the past where some manufacturers prohibited dealers from selling competing brands. Negotiation during car purchases is customary but limited due to the lack of competing dealers.\nThe limited size of the Singapore market results in some brands not offering the full model line in Singapore. Unlike in Australia, where the", "-25.594299613381736" ], [ "for Compulsory Specifications said they still needed to determine whether local cars had been affected by the rigging of US vehicle emissions tests. South Korea As of 19 January 2016 South Korea, the world's eighth-largest diesel-car market, planned a criminal case against Volkswagen executives. On 22 September 2015 South Korean authorities announced pollution control investigations into cars manufactured by Volkswagen and other European car-manufacturers. Park Pan-kyu, a deputy director at South Korea's environment ministry said: \"If South Korean authorities find problems in the Volkswagen diesel cars, the probe could be expanded to all German diesel cars\".\nIn November 2015, after defeat", "-25.590056046188693" ], [ "a way to avoid the high import tariffs on cars that existed at the time. Both cars were badged as XM.", "-25.58875807042932" ], [ "not break even on compact cars unless the buyer chose options.\nRon Harbour, in releasing the Oliver Wyman’s 2008 Harbour Report, stated that many small “econoboxes” of the past acted as loss leaders, but were designed to bring customers to the brand in the hopes they would stay loyal and move up to more profitable models. The report estimated that an automaker needed to sell ten small cars to make the same profit as one big vehicle, and that they had to produce small and mid-size cars profitably to succeed, something that the Detroit three had trouble doing.\nSUV sales peaked in", "-25.572397296666168" ], [ "Electric rickshaw Electric rickshaws (also known as electric tuk-tuks or e-rickshaws or toto) have been becoming more popular in some cities since 2008 as an alternative to auto rickshaws and pulled rickshaws because of their low fuel cost, and less human effort compared to pulled rickshaws. They are being widely accepted as an alternative to petrol/diesel/CNG auto rickshaws. They are 3 wheelers pulled by an electric motor ranging from 650-1400  Watts. They are mostly manufactured in India and China, only a few other countries manufacture these vehicles. Battery-run rickshaws could be a low-emitter complementary transport for the low-income people, who", "-25.509125020107604" ], [ "consumers were not allowed to purchase EV1s, but were instead asked to sign closed-end leases, meaning that the cars had to be returned to GM at the end of the lease period, with no option to purchase, despite leasee interest in continuing to own the cars. Chrysler, Toyota, and a group of GM dealers sued CARB in Federal court, leading to the eventual neutering of CARB's ZEV Mandate.\nAfter public protests by EV drivers' groups upset by the repossession of their cars, Toyota offered the last 328 RAV4-EVs for sale to the general public during six months, up until 22 November", "-25.495046000462025" ], [ "led by the Nissan Leaf with 2,487 units registered, including 189 imported used Leafs, and Leaf sales represented 53% of the plug-in segment sales that year. Cumulative sales reached 2,860 Leafs since its launch in September 2011, accounting for more than 5% of the Leaf's global sales. Norway was the first country in the world where an electric car ranked among the top 10 best selling cars, as the Nissan Leaf ranked 9th in October new car sales, and ended 2012 in the 13th place, representing a market share of 1.7% of all new car sales in the country, up", "-25.484198363381438" ], [ "a strategy of importing cars it needed to offer a full range of competitive vehicles. During 1998, General Motors-Holden's Ltd name was shortened to \"Holden Ltd\".\nOn 26 April 1990, GM's New Zealand subsidiary Holden New Zealand announced that production at the assembly plant based in Trentham would be phased out and vehicles would be imported duty-free—this came after the 1984 closure of the Petone assembly line due to low output volumes. During the 1990s, Holden, other Australian automakers and trade unions pressured the Australian Government to halt the lowering of car import tariffs. By 1997, the federal government had already", "-25.483302054832166" ], [ "American automobile dealer that he has been injured by an international conspiracy to restrain trade in the American automobile market ... the same antitrust questions would be presented if Mitsubishi were owned by two American companies instead of by one American and one Japanese partner. When Mitsubishi enters the American market and plans to engage in business in that market over a period of years, it must recognize its obligation to comply with American law and to be subject to the remedial provisions of American statutes.\" And that, to Stevens, meant the Car Dealers' Day in Court Act as much", "-25.469682239112444" ], [ "vehicles were sold in 48 world markets. Nissan global electric vehicle sales passed 275,000 units in December 2016.\nThe second-generation Leaf was launched by Nissan in Japan. Autonomous cars In August 2013 Nissan announced its plans to launch several driverless cars by 2020. The company is building a dedicated autonomous driving proving ground in Japan, to be completed in 2014. Nissan installed its autonomous car technology in a Nissan Leaf all-electric car for demonstration purposes. The car was demonstrated at Nissan 360 test drive event held in California in August 2013. In September 2013, the Leaf fitted with the prototype Advanced", "-25.439236175792757" ], [ "Japan. This featured an overhead camshaft (OHC) and an alloy cylinder head. The reason for the Nissan-Holden combination was because all cars manufactured in Australia from 1 January 1986 had to run on unleaded 91 octane fuel. The previous six-cylinder Black motor was unable to do this, as was the V8, hence the later release date of this engine. As the tooling for the Holden straight-six engine had become worn by this stage, it also was not considered cost-effective to adapt the design to unleaded petrol. The new engines included features such as an Electronic Combustion Control System (ECCS) and", "-25.41936839185655" ], [ "part due to the requirement for OBD-II in the United States market. Some automakers whose products were not exported to North America (such as TVR) continued to use the 14CUX until the later discontinuation of the Rover V8 engine.", "-25.411884072353132" ], [ "emissions and requiring no petroleum fuels.\" Popular Mechanics, upon awarding the Leaf its 2010 Breakthrough Award, explained that the Nissan Leaf is \"not the first pure EV, but [...] hits the mainstream like none of its predecessors.\" Popular Mechanics also alluded to the Leaf's 160 km (100 miles) range, which is said to be \"enough for most commuters for the price of an average vehicle – and with a much lower operating cost than gasoline-powered vehicles.\"\nOther awards received by the Leaf include the 2011 European Car of the Year, EV.com's 2011 EV of the Year, 2011 Eco-Friendly Car of the Year", "-25.407655352260917" ], [ "the four-wheel drive, diesel, 4-door Ford Ranger (and Ranger SORVs), provided by the United States by the thousands. Other vehicles include Humvees, diesel-powered variants of the U.S. consumer Nissan Frontiers, Toyota Hilux pickup trucks imported from Thailand, and Volkswagen Transporter T4/Eurovans, as well as Yamaha motorcycles donated by Japan. Older vehicles, like the UAZ-469 all-terrain vehicle, were obtained from the Soviet Union.", "-25.405544318520697" ], [ "is ironically exercised by Ford and Chrysler, two of the companies the tax was meant to protect. T2c The T2c, with a roof raised by about 10 cm (3.9 in) was built starting in the early 1990s for the Mexican, South American and Central American markets. Since 1991, the T2c has been built in México with the water-cooled 1.8 L inline four-cylinder 53 kW (72 PS; 71 bhp) carbureted engine—easily identified by the large, black front-mounted radiator—and since 1995 with the 1.6 L air-cooled engines for the Brazilian market.\nOnce production of the original Beetle ended in late 2003, the T2 was the only Volkswagen model with an", "-25.389330427206005" ], [ "least one jurisdiction (California) has started compelling manufacturers to brand the titles of any previously reacquired vehicles that they import or export from the jurisdiction. Used vehicles While used cars may be plagued with the same problems that beset new vehicles, used vehicles may also have been abused, improperly maintained or poorly repaired, been unprofessionally rebuilt after a collision or tampered with in some manner to conceal high mileage, mechanical defects, corrosion or other damage.\n\nOne form of lemon is called a cut and shut or clipping, a form of body collision \"repair\" based on buying a wrecked car and sawing", "-25.369189097084018" ], [ "The survey found that not all sales people seemed enthusiastic about making PEV sales; a few outright discouraged it, and even one dealer was reluctant to even show a plug-in model despite having one in stock. And many sales people seemed not to have a good understanding of electric-car tax breaks and other incentives or of charging needs and costs. Consumer Reports also found that when it came to answering basic questions, sales people at Chevrolet, Ford, and Nissan dealerships tended to be better informed than those at Honda and Toyota. The survey found that most of the Toyota dealerships", "-25.354854157500085" ], [ "businesses were too small to handle the vast amount of extra used stock and servicing/repair work which was now being generated. \nThe solution was to buy out many of these smaller businesses to create a large conglomerate which would allow larger, more profitable sites to be developed. The company, at its peak operated, over two hundred car dealerships in the United Kingdom, specialising in primarily vehicles of Nissan, approximately 160 of the 220 sites held Nissan franchises. \nHowever, by the end of the 1980s, Nissan had established the assembly plant in Sunderland, and was considering taking the existing Japanese import", "-25.35097216410213" ], [ "NASCAR. \nIn August 1972, the group changed its name to the Motor Vehicle Manufacturers Association, to reflect the growing importance of truck makers. A major issue then developed over whether foreign-owned automakers with operations and in some cases manufacturing within the U.S. could join the group. In 1986 the association ruled that foreign transplants had to manufacture half their American sales within the country in order to join; a grandfather clause allowed Honda and Volvo to stay in. In May 1988, Toyota's attempt to join was rejected on this line. By 1992, Toyota and Nissan were", "-25.339293773344252" ], [ "2015.\nBy early June 2015, the Renault–Nissan Alliance continued as the leading all-electric vehicle manufacturer with global sales of over 250,000 pure electric vehicles representing about half of the global light-duty all-electric market segment. Nissan sales totaled 185,000 units, which includes the Nissan Leaf and the e-NV200 van. Renault has sold 65,000 electric vehicles, and its line-up includes the ZOE passenger car, the Kangoo Z.E. van, the SM3 Z.E. (previously Fluence Z.E.) sedan and the Twizy heavy quadricycle.\nBy mid-September 2015, the global stock of highway legal plug-in electric passenger cars and utility vans passed the one million sales milestone, with", "-25.33658713917248" ], [ "Nissan Outboard Motors Nissan outboard motors are produced by Tohatsu Corporation of Tokyo, Japan. They are the second largest producer of outboard motors in the world and produce environmentally conscious TLDI series of two-stroke low pressure direct injection outboards that meet current United States Environmental Protection Agency regulations for the US. Mercury outboards from 30 hp and below are rebadged Tohatsus and all Nissan outboard engines in the US and Canada are Tohatsu's with a Nissan decal. Nissan Outboards sold in Japan are re-badged Hondas.", "-25.329283874074463" ], [ "opposite side of vehicles designed for the Japanese market, which would make operation somewhat more difficult. Another factor is the complications of registering a vehicle in Japan due to anti-congestion laws and severe traffic in Japan's major cities.\nDespite being a member of the European Union, which permits LHD and RHD vehicles to be registered in most member countries, British luxury automakers have similar difficulties in implementing such a program due to right-hand drive in Great Britain.", "-25.29118680168176" ] ]
6h2n30
Why is it when I'm somewhere like the mall or other public place you sometimes see people wearing surgical mask?
[ "I have heard that it is considered respectful to wear a surgical mask in public when you are sick to limit spreading your illness in very dense cities.", "This is predominantly an Asian culture phenomenon where people will wear the masks to protect themselves against flu and cold outbreaks, as well as air pollutants. The practice dates back to the early 20th century, when a number of events - huge influenza outbreaks prior to 1919; the Great Kanto Earthquake of 1923 and the ensuing inferno that shot massive amounts of ash into the air; another global flu epidemic in 1934; etc - made use of face masks fairly common in Asia. People assumed the masks offered protection against disease and pollution (air quality gradually became horrendous during the post-WWII industrialization of Japan and China), so their use became widespread and continues to this day. There's a good read on the subject here: URL_0 Edit: interesting point here: > The reality is that the woven-cloth surgical masks provide minimal protection from environmental viruses anyway. (Surgeons use them to protect patients from their mouth-borne germs, not the other way around.) The benefits to protecting oneself from other air pollutants is not mentioned, but unless the mask has an air seal around the face and prevents unfiltered air from getting to your orifices, its actual benefits may be limited. That is, other than protecting *others* from *you*.", "Reading all of this makes sense but since I live in a rather clean city (it's pretty small) I'm just going to look at them and think to myself how thoughtful, they don't want to get others sick, Every time. Nothing wrong with being positive right? Lol", " > Why is it when I'm somewhere like the mall or other public place you sometimes see people wearing surgical mask? Because you're filthy. JK lol. It is not coincidental that these people you've seen are all Asian. It's quite common in East Asia for people to wear facial masks when out and about. It's mostly out of health concerns. For instance, in some places (e.g., China) people are very aware that the air quality is horrendous, so they wear masks as an inexpensive way to protect their lungs. Similarly, people are very sensitive to airborne germs in places like subways or buses where many people are crammed into a confined space. So many people in such situations wear masks to prevent themselves from getting sick or, if they're sick themselves, avoid spreading germs to others. Casually wearing facial masks in Asia is sort of the Asian equivalent of hand-washing in the West. Where westerners are much more cognizant of hand sanitation than dirty air, East Asians are much more cognizant of airborne pathogens and pollutants than dirty hands. So westerners wash their hands but never wear masks, while Asians wear masks but don't wash their hands (as often). *[And before anybody takes issue with that last point, I dare you to visit a public restroom in any East Asian country other than Japan - there is rarely ever hand soap, and when there is, < 50% of people actually use it.]* Of course, everything I just said is an enormous generalization and there are obviously plenty of exceptions at the individual level. But as a general cultural trend, the above is all true.", "People wearing them could be immunocompromised and being exposed to even seemingly healthy people could make them sick. Just because a healthy person doesn't show symptoms doesn't mean they aren't carrying something like the flu virus, it may not be strong enough to make them sick, or they already may have immunity to the specific invader but can be easily passed on to someone who has compromised immune system such as someone with lupus, aids, or chemo patient.", "The people wearing them could have some form of communicable disease (such as tuberculosis, or the flu) and don't want to accidentally infect others." ]
[ [ "and in theatre.\nMasks are a familiar and vivid element in many folk and traditional pageants, ceremonies, rituals, and festivals, and are often of an ancient origin. The mask is normally a part of a costume that adorns the whole body and embodies a tradition important to the religious and/or social life of the community as whole or a particular group within the community. Masks are used almost universally and maintain their power and mystery both for their wearers and their audience. The continued popularity of wearing masks at carnival, and for children at parties and for festivals such as Halloween", "-27.871229353666422" ], [ "Commedia dell'arte masks Commedia dell'Arte masks are one of the biggest classifiers for each character. Every mask goes with a specific character based on the way it looks. Masks were originally all made of leather, but now more commonly made of neoprene. The Commedia masks must show emotion and intelligence as they are covering the face which is the main place emotion can be seen on someone. Masks should be an extension of an actor and their costume, hair and accessories. A mask creates a completely different face for the person that is wearing it. Mask, in Commedia dell'Arte speaks", "-27.662076715394505" ], [ "for the community to illustrate its skills to its neighbours as well as to meet, agree and perform the cultural aspect of a community member dying. Examples Examples of this style of mask can be seen in the Ethnological Museum of Berlin, Derby Museum and Art Gallery, the British Museum and the Indianapolis Museum of Art.", "-27.622136166493874" ], [ "fraction of a removal away. You do have this sort of vampiric attitude to experience.'\"\nEdward de Bono: \"‘I find everything beautiful, everything,’ he says. ‘I am very much against the notion that for something to be beautiful, it has to be in a frame in an art gallery with someone reviewing it. Beauty may be the elegance of a mathematical solution, it can be a Penthouse centrefold, design, a rainy day … anything.’\"\nCardiothoracic surgeons: \"Allen suddenly slices a straight line down the woman’s chest with his scalpel, through the plastic. A jewel-bright bar of blood bubbles up. the sticky plastic", "-27.545472095283912" ], [ "Mask A mask is an object normally worn on the face, typically for protection, disguise, performance, or entertainment. Masks have been used since antiquity for both ceremonial and practical purposes, as well as in the performing arts and for entertainment. They are usually worn on the face, although they may also be positioned for effect elsewhere on the wearer's body.\nMore generally in art history, especially sculpture, \"mask\" is the term for a face without a body that is not modelled in the round (which would make it a \"head\"), but for example appears in low relief. Etymology The word", "-27.51358321911539" ], [ "typically even introducing themselves as soon as they notice the audience. A comic mask is a nobody and a somebody at the same time, the characters seem important even if they are a lowly servant. A mask helps to create the beautiful, extravagant, repulsive and yet attractiveness of each character. Masks represent the actor and the character at once, the actors movements help to create the character and the mask finishes it. The mask and lazzo connected, without the lazzo a character in a mask is not making anything and is less entertaining. Masks and lazzo go hand in", "-27.217505157750566" ], [ "by several people. Masks have been created with plastic surgery for mutilated soldiers.\nMasks in various forms (sacred, practical, or playful) have played a crucial historical role in the development of understandings about \"what it means to be human\", because they permit the imaginative experience of \"what it is like\" to be transformed into a different identity (or to affirm an existing social or spiritual identity). Not all cultures have known the use of masks, but most of them have. Masks in performance Throughout the world, masks are used for their expressive power as a feature of masked performance – both", "-27.16843532520579" ], [ "art through objects that are worn on the body (like Vanitas: Flesh Dress for an Albino Anorectic (1987) )or suggest a presence, and they convey a sense of otherness through a psychic state of being.\nSterbak is a recipient of the 2012 Governor General's Awards in Visual and Media Arts.", "-26.855027075078397" ], [ "Facial composite A facial composite is a graphical representation of one or more eyewitnesses' memory of a face, as recorded by a composite artist. Facial composites are used mainly by police in their investigation of (usually serious) crimes. These images are used to reconstruct the suspect's face in hope of identifying them. PhotoFIT generation Construction of the composite was originally performed by a trained artist, through drawing, sketching, or painting, in consultation with a witness or crime victim. Subsequently, techniques were devised for use by those less artistically skilled, employing interchangeable templates of separate facial features. The first such mechanical", "-26.760396830206446" ], [ "explains that the process takes four months per mask, and how at first \"some people tried to direct me to use prosthetics, but I was adamant it had to be a mask, something that transforms me entirely, something that was not grotesque but real, like a trompe l’oeil\". These expensive silicone masks deteriorate easily after use, turning the photo shoot into a performative act where the action is unrepeatable. This process becomes paradoxical because of the difficulties that are encountered while recreating these casual snapshots. This work references into the canonical work in the history of photography of Cindy Sherman,", "-26.65937865426531" ], [ "face is – \"contorted, people thought it was a deliberate image of ugliness, but you could also say it's the image of a sickly gawky adolescent who is being made to do something she doesn't totally want to do.\" History When the La Petite Danseuse de Quatorze Ans was shown in Paris at the Sixth Impressionist Exhibition of 1881, it received mixed reviews. Joris-Karl Huysmans called it \"the first truly modern attempt at sculpture I know.\" Certain critics were shocked by the piece, and the dancer was compared to a monkey and an Aztec. One critic, Paul Mantz, called her", "-26.646803051411553" ], [ "as the carvers, or the performers, treat each mask philosophically, by considering it as the Mukha (face), rather than a Mukhosh (mask) – the belief being that it comes alive as soon as one puts his face behind it.\nThese ornate wooden masks adorn a large number of homes in Bengal and beyond, with a large number of these masks being exported to the USA, and even enjoying pride of place at the annual State Handicrafts Fair. Healthcare In 2014, Kushmandi CD Block had 1 rural hospital and 2 primary health centres with total 40 beds and 8 doctors (excluding private", "-26.623039971447724" ], [ "a photograph of a human face, software can apply cosmetics, hairstyles, and various eyewear such as contact lenses and sunglasses in order to allow users to visualize different looks without physically trying them on. Today, virtual makeup works in real-time using phone camera tracking, and examples are Visage Technologies's MakeApp, L'Oreal's Makeup Genius, and Oriflame's Makeup Wizard. Books There is also a series of books, aimed at teenage girls, called The Makeover Series, written by Suzanne Weyn. There are several experts who perform the art of makeovers. Usually makeover artists specialize in hair styling, make-up or clothing.\n\"The Makeover Guy\" is", "-26.5351408697843" ], [ "didn’t take me seriously because of my physical aesthetic, so I started blogging… and calling out the [fashion] industry\". She co-founded the Inclusive Fashion and Design Collective (IFDC) with the US disability advocate Liz Jackson in order to \"challenge designers who traditionally haven’t been thinking very diversely, to work with people with disabilities, and find beautiful solutions to these problems. Aesthetics are so important, but if you look at products specifically designed for the disabled community, they’re quite ugly.\" Jackson and Burke were invited to attend the White House for an event titled 'Design for all' where the Obama administration", "-26.49296485717059" ], [ "that allow customers to see themselves in clothes without trying them on. Another store that uses AR to market clothing to its customers is Neiman Marcus. Neiman Marcus offers consumers the ability to see their outfits in a 360-degree view with their \"memory mirror\". Makeup stores like L'Oreal, Sephora, Charlotte Tilbury, and Rimmel also have apps that utilize AR. These apps allow consumers to see how the makeup will look on them. According to Greg Jones, director of AR and VR at Google, augmented reality is going to \"reconnect physical and digital retail\".\nAR technology is also used by furniture retailers", "-26.461157109151827" ], [ "how they look in specific outfits and makeup via in-store kiosks, mobile phones or tablets. Modiface is a web application that anyone can use to give them a virtual makeover. Customers can give any look and decide on what to suits and buy products.\nSephora, the beauty specialty retailer, and ModiFace, an augmented reality virtual makeover technology provider, today announced the launch of a 3D Augmented Reality Mirror that can simulate cosmetics on a user's face in real-time and in 3D. The new patented technology, created by ModiFace, tracks the precise location of a user's facial features and applies eye shadow", "-26.362650682596723" ], [ "masks emphasizes the object itself which is not always the most important aspect of the multimedia and multisensory ritual performance. Without the full costume and the atmosphere of music, spoken or sung word, and physical movements, the full meaning of masks is lost. The same physical object, when placed in different performance contexts, can symbolize different things which makes interpretations difficult after collection. Eze Nwanyi potato Otherwise known as the Queen of Women, this mask represents a wealthy, senior wife and grandmother who commands enormous respect in the village. She embodies the ultimate feminine ideals of strength, wisdom, beauty, stature", "-26.314870767753746" ], [ "sculptor Lord Ronald Gower also believed in the authenticity of the mask. When he created the large public Shakespeare statue in Stratford in 1888, he based the facial features on it. He also attempted to buy it for the nation. The mask is now generally believed to be a fake, though its authenticity claim was revived in 1998.", "-26.3041409644502" ], [ "lifelike, Xiang says she isn't aiming for realism. \"If you put a real person's face next to it, you will see a lot of differences. But what matters to me is ... the poignance of the expression.\" \"I want my art to awaken the sensibility of each onlooker, to awaken his body, so that his body can experience the sculpture. That's why I really want people to stand right in front of my sculpture, to face (it).\"", "-26.154149119189242" ], [ "tend to make masks with fine features and finishes that imitate human skin. Production is aimed almost exclusively to dancers, although they are also made for collectors, and more fantastic ones for the tourist market, especially in Guerrero. It can be difficult to distinguish these masks from more “authentic” ones for dances. In a few communities, there is enough demand to have full-time mask makers, where hundreds are worn for major festivities. One of these is Tlaxcala because almost all dancers are masked. Many of these are made in the town of Apetatitlán de Antonio Carvajal by the Carlos Reyes", "-26.089898278878536" ], [ "the 1930s, \"spectacles\" were described as \"medical appliances.\" Wearing spectacles was sometimes considered socially humiliating. \nIn the 1970s, fashionable glasses started to become available through manufacturers, and governments also recognized the demand for stylized eyewear.\nGraham Pullin describes how devices for disability, like glasses, have traditionally been designed to camouflage against the skin and restore ability without being visible. In the past, design for disability has \"been less about projecting a positive image as about trying not to project an image at all.\" Pullin uses the example of spectacles, traditionally categorized as a medical device for \"patients\", and outlines how they", "-26.086293969710823" ], [ "beauty marks and heavy mascara. Mask construction In making a mask there are a few different ways to do this, leather is the traditional material used but there is also paper mache and plaster casts. Leather is the most used material for making masks as it is the easiest to shape without hurting the face. Leather is also close to the skin and creates a light, easy to wear mask that holds shape and life on stage.", "-26.054865198559128" ], [ "the natural appearance of their face. These pieces were crafted by sculptors. A notable sculptor who created prosthetic pieces for victims of war was Anna Coleman Ladd, a member of the Red Cross who made casts of her patients' faces and then, by hand, would create pieces out of galvanized copper, tin foil, and human hair for them to wear. Ladd's pieces were secured with bands around the head, which were often concealed by false eyeglasses. In the media In the 1986 musical, Andrew Lloyd Weber's The Phantom of the Opera, the character Erik wears a facial mask to hide", "-25.942598872919916" ], [ "art making was manipulation of images with Photoshop and this medium allowed her to endless possibilities in art making. She loves what she does and doesn't see herself doing anything else. It has been a long and winding road but now she can call herself an artist. Work Throughout her work, she aims to portray the masks that women use in order to be accepted by the contemporary society. These masks become an alternative \"skin’, distorting one’s identity\". By constantly using masks, women lose themselves in the process, their identity and sense of self becomes trapped in the mask. The", "-25.898784537042957" ], [ "on display, but realizes it is a fake. In anger, he removes Dr. Neuman's still talking face from his body and puts it on the mask stand, before getting rid of the guards and storming out of the museum in a whirlwind of rage.\nMeanwhile, the real mask, makes its way to a town called Fringe City, and is found in a river by a dog named Otis - who belongs to Tim Avery, an aspiring cartoonist at an animation company, who is feeling reluctant to become a father. He has a beautiful wife, Tonya, and a best friend, Jorge. On", "-25.85690837817674" ], [ "catching the actors right before they take the stage. The scene contains no major action but because the scene contains actors it is important. Actors were seen as celebrities in ancient Greece.\nThe mask is an important part of Greek theatre, for in theaters such as the Theatre of Dionysus 14,000 people came to watch including prisoners who released just for theatrical events. The mouth of a mask is open, as shown in this pelike, and have amplification abilities. In combination with the seating arrangements, it allowed for the sound of the over exaggerated actions of actors to be heard in", "-25.84873298756429" ], [ "Traditional masks are still handcrafted. Most traditional communities have one person who specializes in the craft. This person is almost always male who has learned the trade from his father, with the occasional exception of a widow continuing her husband's trade. Some mask makers specialize in those for a particular dance. Mask makers are respected as they need to know the significance of each dance to make the appropriate masks. Most mask makers have other occupations such as baker, wax worker, factory worker or carpenter. A number of mask makers are also makers of religious images called “santeros.” These craftsmen", "-25.827888905943837" ], [ "Myers's mask had 'the pale features of a human face' and it truly was spooky looking. I can only imagine the result if they hadn't painted the mask white. Children would be checking their closet for William Shatner after Tommy got through with it.\" Hill adds that the \"idea was to make him almost humorless, faceless—this sort of pale visage that could resemble a human or not.\" Many of the actors wore their own clothes, and Curtis' wardrobe was purchased at J. C. Penney for around a hundred dollars. Wallace described the filming process as uniquely collaborative, with cast members", "-25.73253674892476" ], [ "mask at all but as a method of preventing the spread of disease. The striking design originates from 17th-century French physician Charles de Lorme who adopted the mask together with other sanitary precautions while treating plague victims. The mask is often white, consisting of a hollow beak and round eyeholes covered with crystal discs, creating a bespectacled effect. Its use as a carnival mask is entirely a modern convention, and today these masks are often much more decorative. Although the mask and costume is worn almost exclusively by males, the enhancement in decoration also suggests that women are now", "-25.714407599210972" ], [ "and make the retail industry much more custom for the individual. Capturing products has already been done for shoes and magic mirrors can be used in stores to visualize this. Shopping Malls have started to embrace this to repopulate them by attracting customers with VR Arcades as well as presenting merchandise virtually.", "-25.710151631385088" ], [ "owned by the highest grades of the society.\nThe objects are typically small and simple in form, and have a striking patina that derives from being handled or worn on the body.\nIvory objects usually have russet or yellow patinas.\nThe masks are fairly standardized, although the most important masks with special ritual use or symbolic meaning may have distinctive design. A typical mask will have a concave heart-shaped face.\nThe forehead protrudes slightly, the nose is narrow, eyes are slits and the mouth is slightly open.\nEvery time a mask is used it is rubbed with white clay, over time acquiring a white", "-25.62290219782153" ], [ "and transformation of one's self. Masking alludes to one of the iconic characteristics of identity perceived in a different cultural context as means of transforming, disguising or displaying identity. Press During her career, she was interviewed by the press including Reza Jalali for Shargh newspaper during her exhibition in Atbin gallery in 2005, Sara dehghan for Voice of America's Persian News Network (VOA) ( Shabahang program ) in 2010 and Florence Somer Gavage for Kahkeshan TV during her exhibition as a part of Edinburgh Iranian Festival in 2011 and more recently interviewed by Bahar Navai for Jadid online", "-25.616254073596792" ], [ "Culture The costume is also associated with a commedia dell'arte character called Il Medico della Peste (the Plague Doctor), who wears a distinctive plague doctor's mask. The Venetian mask was normally white, consisting of a hollow beak and round eye-holes covered with clear glass, and is one of the distinctive masks worn during the Carnival of Venice.", "-25.58965897766757" ], [ "a character. The concept of the mask speaks a lot, because it is not just about artistic charisma but also has an important message on self-awareness. The message behind the mask is that the form in which God created us in is outside our control, so we have to focus on what we wear and the look we choose to present ourselves in front of others. Fashion career The group suddenly got the attention and a huge number of followers started to notice the differences, and thus he became famous among the young Saudis, which made his name appear in", "-25.577976852603115" ], [ "plastic surgery. The photographs are depicted similar to studio portraits, portrayed from the mid-torso against dark backgrounds. The portraits are hybrids between traditional attire and contemporary fashion trends, commenting on artificial beauty and the sartorial confines of some Muslim women.\nAs Aliabadi continued making artworks that balanced femininity, beauty standards, consumerism, and tolerance, she turned to drawing in her next series \"Eye Love You\" (2009) in which schoolgirl-esque drawings of exaggerated eye makeup in which brides are commonly adorned on their wedding day. The drawings are reminiscent of idle daydreams of school girls, with the eyes embellished with brightly colored eyeshadows,", "-25.57401361328084" ], [ "of the Dead and local saint festivals. Many of the human masks are realistic, and faithfully reproduce various facial types. Others are so stylized that facial figures are only suggested. Expressions vary depending on the character being portrayed. Materials Masks vary by the kinds of materials used to make them. Wood is the most popular material for masks. Clay masks were used in the pre Hispanic period and can still be found in Metepec (Locos masks), some for Tastoanes in Jalisco and many of the dances in Michoacán.\nLeather masks can cover the face or the entire head, such as nin", "-25.55915577230917" ], [ "hand and you need one to have the other. Without one, the other is not as great and fantastic, or as funny, lazzi without masks is not as meaningful.\nEvery mask has to contain a combination of distinct characteristics to create their specific characters. The original Commedia dell'Arte performers originated in the 1530s and 1540s, they wanted to be immediately recognized as the familiar characters that they portrayed as well as being exciting. The actors wanted to be easily recognized and remembered from one show to the next. Actors were playing the same character in every show, and these characters were", "-25.422235123551218" ], [ "culture circles, who regard the masks as symbols and carriers of gods, observe various rules and conventions. For instance, the ceremony of enshrining a Buddha statue is held before making the masks; before using them, the ceremony of opening the case; and storing them, the ceremony of sealing the case. According to the rules, women are not allowed to touch or wear the masks, and only men can produce, use and store masks. Once a man wears a mask, he is supposed to be possessed by a god or spirit. And therefore, he must not speak.\nStudies also show that the", "-25.420607871492393" ], [ "state of the art. Masks The Ancient Greek term for a mask is prosopon (lit., \"face\"), and was a significant element in the worship of Dionysus at Athens, likely used in ceremonial rites and celebrations. Most of the evidence comes from only a few vase paintings of the 5th century BC, such as one showing a mask of the god suspended from a tree with decorated robe hanging below it and dancing and the Pronomos vase, which depicts actors preparing for a Satyr play. No physical evidence remains available to us, as the masks were made of organic materials and", "-25.415634781995323" ], [ "on the front row, inbetween Alexandra Schulman and Gwyneth Paltrow. It was probably one of the best pieces of Fashion Theatre I have ever witnessed.\"\nAlexander McQueen later described his thoughts on the idea used during VOSS of forcing his audience to stare at their own reflection in the mirrored walls for over an hour:\n\"Ha! I was really pleased about that. I was looking at it on the monitor, everyone trying not to look at themselves. It was a great thing to do in the fashion industry—turn it back on them! God, I’ve had some freaky shows.\"\n\nIn 2011, Michelle Olley was", "-25.407709080260247" ], [ "up and her hair styled, on her way to a press conference on her latest book. To the right, there is an emergency worker just before he places a cloth to cover the body.\nMetinides’ aesthetics are derived from popular film of his era, especially black-and-white actions movies related to police and gangsters. His first images as a child were based on these movies as well as the car crashes that frequently occurred in front of his father’s restaurant. This movie influence can be seen in the sequence of photos, from environment to details, common for setting scenes in films. Even", "-25.404426667484586" ], [ "the game of masks as a hypothetical solution to this anxiety.\nChoosing eyewear which is also a mask while looking in the mirror and perceiving one differently. In a society that aims to the annulment of diversity and culture with social massification, having to look different is something one has to learn.\nKuboraum is a curatorial project that interacts with important artists of the contemporary art world and music to produce an ecstatic panorama.\nThe project started in February 2012 with the Italian artisanal tradition implemented in a berlin based creative environment. hence, dreamed in berlin and handmade in Italy.", "-25.37765101704281" ], [ "sculpture as a new medium to document her local community and national events. Her sculptures range from costumed masks to hanging and freestanding soft sculptures, representing both real and fictional characters from her past and present. She began making mixed-media costumed masks after hearing her students express their surprise that she did not already include masks in her artistic practice. The masks were pieces of linen canvas that were painted, beaded and woven with raffia for hair, and rectangular pieces of cloth for dresses with painted gourds to represent breasts. She eventually made a series of 11 mask costumes, called", "-25.348165341070853" ], [ "of the faces of the statues over the years, so the artist and the city decided to replace the faces with the bronze 'mask' that the statues all now 'wear'.”", "-25.340911161270924" ], [ "them but it makes sense). Strangely, when Maggie becomes invisible, her outline gives off the appearance that she is completely naked, even though she is in fact wearing clothes. Why her clothes are not outlined when her body is invisible is never made clear. Reception Mosaic has received mixed reviews. Movie reviewer Rotten Tomatoes gave it an audience rating of 49%, based on 2 reviews.", "-25.30624090236961" ], [ "showing the variety of faces of which any face is capable. And in order to attack the basic misconception, he must underline and exaggerate by distortion, by bandages and metal instruments that force the face into impossible molds. Images of torture and madness abound, as happens from moment to moment in the face seen as a sensitive reflection of extreme perceptions and experience. How can a self-portrait depict statuesque calm in the face of the horrors that surround us all?\nThe central importance of the \"self-portrait\" in Helnwein's work, the mutable art of a doppelgänger, is no accident. It becomes the", "-25.28279580383969" ], [ "Hollow-Face illusion The Hollow-Face illusion (also known as Hollow-Mask illusion) is an optical illusion in which the perception of a concave mask of a face appears as a normal convex face.\nWhile a convex face will appear to look in a single direction, and the gaze of a flat face, such as the Lord Kitchener Wants You poster, can appear to track a moving viewer, a hollow face can appear to move its eyes faster than the viewer: looking forward when the viewer is directly ahead, but looking at an extreme angle when the viewer is only at a moderate angle.\nAccording", "-25.271780603099614" ], [ "Transformation mask A transformation mask is a type of mask used by indigenous people of the Northwest Coast and Alaska in ritual dances. These masks usually depict an outer, animal visage, which the performer can open by pulling a string to reveal an inner, human face carved in wood. Northwest coast peoples generally use them in potlatches to illustrate myths, while they are used by Alaska natives for shamanic rituals.", "-25.23244763171533" ], [ "Visitor Experiences at Art Museums, by Simon Hayhoe, examines the question, Why would a person who is blind want to visit an art museum, even when he or she cannot touch the exhibits? The book features a study at the Metropolitan Museum of Art, New York, and presents case studies of visitors who are blind and visually impaired, teachers at the museum and blind artists, such as Esref Armagan. Through this study, the book examines philosophies of exclusion and access, and argues there is an extra dimension to understanding the visual arts by people who are blind or visually impaired.", "-25.2078805360361" ], [ "things\" which he said was a reflection of modern society.\nWith that in mind, portly actors were hired in order to give the impression of Tweedledum and Tweedledee from Lewis Carroll's Through the Looking-Glass. Makeup supervisor Michael Westmore then created a prosthetic design for the actors, intending to make them look \"whimsical\". Appliances were created for their cheeks, foreheads and the tip of the actor's noses. A further addition was the eyebrows, as Westmore wanted them to look permanently sad. The final step in the makeup process was the creation of sets of false upper teeth, which while Westmore suggested was", "-25.202523703264887" ], [ "The Human Face, a feature arts documentary directed by artist-filmmakers Nichola Bruce and Michael Coulson for BBC television. Anderson was the presenter in this documentary on the history of the face in art and science. Her face was transformed using latex masks and digital special effects as she introduced ideas about the relationship between physiognomy and perception. Her varied career in the early 1990s included voice-acting in the animated film The Rugrats Movie. In 1994 she created a CD-ROM titled Puppet Motel, which was followed by Bright Red, co-produced by Brian Eno, and another spoken-word album, The Ugly One", "-25.187671234976733" ], [ "making public sculptures in the town, \"When Liverpool is Capital of Culture in 2008, I'll be making a large work for the Anglican Cathedral, which I'm really looking forward to.\"\n\nOther sculptures have included Death Mask (2002) which is a bronze cast of her own head. Emin loaned this work to the National Portrait Gallery in 2005,\nThe death mask, which enjoyed a popular revival in the nineteenth century, was a method for preserving the final expression and physiognomy of the famous or infamous, largely based on the belief that facial features and proportion could explain personal attributes such as genius or", "-25.099797167698853" ], [ "to do something a little more low-key and restrained. So there was a lot of back and forth trying to figure out where we were idea-wise.\"\nThe masks were based on old Halloween costumes and a compilation book of drawings by David Lynch. Murai described the drawings as \"like terrifying children in Halloween masks from the ‘30s and ‘40s. They’re all just really crudely put together. They’re all literally just like, bags with eyes and mouths drawn on them, but they’re just so awful and terrifying just because it looks so poorly put together.\" Murai also said the masks were \"related", "-25.06004659557948" ], [ "of their mask that makes them recognizable even if it is a different mask in another show. A characters identification is found in their mask. There is four or five classes that the masks can be grouped into: the old men such as Pantalone and il Dottore; the young and adventurous man, il Capitano; the servant sometimes named Zanni; and another old man though more crooked and crippled Pulcinella. The servant characters such as Zanni typically will have a long nose, sometimes with more curve for Pantalone, and the servants whose names that end in \"ino\" such as Truffaldino or", "-25.048569310631137" ], [ "with digitally lightened skin and hair – or may already have features that are considered \"white\").\nThe fashion industry believes that by advertising unattainable standards of beauty, they fuel a customer demand by \"creating a craving that can't be satisfied\". Body size and shape misperception As well as being dissatisfied with their body size, exposure to idealized images of thin bodies is associated with overestimation of one's own body size. Recent research suggests that this exposure to images of thin bodies may cause a recalibration of the visual perceptual mechanisms that represent body size in the brain, such that the observer", "-25.028102743730415" ], [ "stereotypical women's bodies such as Dream of Beauty, 1997 - 2000, and\" Catwalk I \"-.\" Catwalk II \", 2004, these virtual models created without photographic model you are the synthesis of ideal images of a woman, as they are given us by the media. They correspond to the ideals of the fashion industry and plastic surgery . In \"Catwalk II\" moves the figure like a model on the catwalk and presented as in a film report from a fashion show.\nThe development of this series with the version of \"Brush Maya\", 2011, transcends the boundaries between the real world and virtual", "-25.024009173561353" ], [ "featuring mask representations of comedy and tragedy in each corner.", "-24.92715552835216" ], [ "light, and a rare eye for beauty and portraiture,\" while Alex Kapranos of Franz Ferdinand said that \"working with Søren, nothing feels invasive or exploitative. You trust him and you forget about his lens. It becomes invisible. It makes him the photographer he is - not just how he responds to his light meter, sets his aperture or chooses a composition, but how he can capture what makes us the humans we are.\" Ricky Wilson of Kaiser Chiefs once jokingly remarked \"anyone who can keep five uninterested grown men in coats from Leeds in his view-finder for more than five", "-24.87961932186954" ], [ "sculpture....Clothing isn’t merely decorative, it changes the body’s movement, it informs the choreography. Often, the performer’s body is deconstructed or distorted or extended by what she is wearing: a black penitent’s shroud covers her head, but exposes her legs, making her look like a mini-skirted Klu-Klux-Klan member; an enormous metal claw with excessively long fingers weaves through the air, both menacing and mesmeric (referencing Kay Lynn’s Finger Dance); her Max Wall bulging bottom channels the Bouffon, looking down at the world and laughing. At times, she seems to be almost puppeteering herself in a complex animation of body and object", "-24.847724680479587" ], [ "example, the little dolls in her award-winning artwork were from her childhood. The face of the woman is covered with glass since Lipi believes when one grows up, the past will be preserved in memory just like in a showcase. Trans rights Reversal Reality (2015)\nLipi showcased her exhibition \"Reversal Reality\" in the India Art Fair, with Anonnya who served as its inspiration. She met Anonnya while making her video piece HOME for a show \"Cross Casting\" at Britto Arts Trust. Lipi stated that transgender peopple \"are considered strangers and aliens, people to be afraid of\". In view of this, she", "-24.806694404920563" ], [ "technology, specifically the Virtual Dressing Room technology. Virtual Dressing Room technology offers users the option to upload a photo so they can virtually try on different lenses and experience how they will look before committing to a purchase. Examples of retailers that currently offer this technology are Freshlook Color Studios and Colorful Eyes.\nCosmetic lenses can have more direct medical applications. For example, some contact lenses can restore the appearance and, to some extent the function, of a damaged or missing iris. Therapeutic scleral lenses A scleral lens is a large, firm, transparent, oxygen-permeable contact lens that rests on the sclera", "-24.73457932617748" ], [ "in the wall, lit to look otherwise. Security guards are known to come up to unsuspecting visitors and say \"Touch it! Touch it!\"\nTurrell's works defy the accelerated habits of people, especially when looking at art. He feels that viewers spend so little time with the art that it makes it hard to appreciate.\nI feel my work is made for one being, one individual. You could say that's me, but that's not really true. It's for an idealized viewer. Sometimes I'm kind of cranky coming to see something. I saw the Mona Lisa when it was in L.A., saw it for", "-24.731460592091025" ], [ "with very pale skin are the same,” said Blake Senftner, a senior software engineer at CyberExtruder.\nIn 2018, the Scottish government created a code of practice which dealt with privacy issues and won praise of the Open Rights Group.\nFacial recognition technology market worth a staggering $4.6bn in 2019 - and set to grow by another 25% over next 9 years.\nIn May 2019, the San Francisco Board of Supervisors voted to prohibit police and other government agencies from using facial recognition technology, making San Francisco the first U.S. city to ban this practice. UK Information Commissioner's King's Cross investigation In 2019 the", "-24.70956463093171" ], [ "best grasp of facial expressions and character acting of almost any artist working in the business.\"", "-24.69259764312301" ], [ "onlookers’ horrid reactions. Krystof Doris contextualizes Wearing’s approach: “The relationship between observer and observed is first established, then reversed, but always recounted from the perspective of the artist.” In 2003-2006, Gillian Wearing recreated photographs of her relatives that were found in her family album. She created masks out of silicone of her mother, her father, her sister, her uncle, and a mask of herself with help from experts that were trained at Madam Tussauds in London. They start creating the mask in clay from a two-dimensional image into a three-dimensional object. In an article for The Guardian she", "-24.69202598855918" ], [ "where, Marilyn Monroe wore a white halterneck dress standing over a subway vent and how it became so popular because how beautiful it was or how correctly it was worn. It also left a message telling women \"how to really wear it.\" Costumes in film or stage have the ability to have some sort of an effect on fashion in society. To go through the list of top designs more, The Matrix where they wore trench coats and shades to build a serious character. Factory Girl being another film which shows exaggeration in the costumes for that time frame. One", "-24.683219842234394" ], [ "German author claims the word \"mask\" is originally derived from the Spanish más que la cara (literally, \"more than the face\" or \"added face\"), which evolved to \"máscara\", while the Arabic \"maskharat\" – referring to the buffoonery which is possible only by disguising the face – would be based on these Spanish roots. Other related forms are Hebrew masecha= \"mask\"; Arabic maskhara مَسْخَرَ = \"he ridiculed, he mocked\", masakha مَسَخَ = \"he transfomed\" (transitive). History The use of masks in rituals or ceremonies is a very ancient human practice across the world, although masks can also be worn for protection,", "-24.642626636778004" ], [ "unified through this paper where ‘all of a sudden you have to start re-appraising people.’ The audience’s fantasies of imposing their own interpretations onto these photographed subjects are challenged and redirected by the paper that they are holding. This exchange between Wearing and the people she photographs makes the interaction more conversational rather than typical documentation methods of portrait photography. Mask In Russel Ferguson’s “Show Your Emotions” he draws Wearing’s use of mask draws to an older tradition that runs back to at least as far as classical Greek tragedy: \"One in which the mask functions not so much to", "-24.625483795884065" ], [ "It's challenging to try and make their faces feminine-looking...\n— \nQaunak Mikkigak's work has been in many collections, shows, and galleries. These include:\nPrints in the annual Cape Dorset print collections, 1980, 1981, and 1986.\nGroup Shows; Eskimo_Sculpture, Eskimo Prints and Paintings of Norval Morrisseau, (Art Association of Newport, Rhode Island 1968) Debut- Cape Dorset Jewelry, (Canadian Guild of Crafts Quebec, Montreal 1976) Things That Make Us Beautiful/ Nos Parures,(Department of Indian Affairs and Northern Development, Ottawa 1977-78) and Northern Exposure: Inuit Images of Travel,(Burnaby Art Gallery, British Columbia 1986).\nPrivate and Public Collections: Art Gallery of Ontario; the Canadian Museum of Civilization; the Inuit", "-24.608364808605984" ], [ "to look at things.", "-24.585835812060395" ], [ "are good examples. Nowadays these are usually mass-produced plastic masks, often associated with popular films, TV programmes, or cartoon characters – they are, however, reminders of the enduring power of pretence and play and the power and appeal of masks. Ritual masks Ritual masks occur throughout the world, and although they tend to share many characteristics, highly distinctive forms have developed. The function of the masks may be magical or religious; they may appear in rites of passage or as a make-up for a form of theatre. Equally masks may disguise a penitent or preside over important ceremonies; they may", "-24.5766207769193" ], [ "about making art; there is an example of one woman who is not completely blind but severely impaired who, when sculpting something, finds it easier to close her eyes and feel the material and the shape rather than trying to see it with her imperfect vision, much like a completely blind person would. The book emphasizes the importance of touch and feeling when creating art without sight.\nThe book, Drawing and the Blind: Perceptions to Touch, by John Kennedy, focuses on the ways in which the blind, both young and old, can perceive pictures and 3D objects. According to Kennedy, visually", "-24.569348754070234" ], [ "called ayacahuite bought locally. After the mask is sculpted, it is covered in plaster painted then varnished.\nThe artisan also makes and repairs religious images to order.", "-24.45109411867452" ], [ "Facial mask The first facial mask was invented in England during the 18th century by Madame Rowley, the first “face glove” a mask which was beneficial for anyone who wanted to ‘bleach, purify and preserve the complexion’ of the skin. A sheet mask is a creamy or thick pasted mask applied to clean or smoothen the face. It often contains minerals, vitamins, and fruit extracts, such as cactus and cucumber. There are different kinds of masks for different purposes; some are deep cleansing for cleaning the pores. The perceived effect of a facial mask treatment can be revitalizing, rejuvenating or", "-24.42731175501831" ], [ "Ugly Models Ugly Models is a London-based alternative modelling agency that specialises in character modelling. Owner Marc French says it is about \"celebrating everyone's unique beauty\". Major clients include Calvin Klein, Levi's, Diesel, Vogue, Elle, and Cosmopolitan, with models appearing in film series such as Harry Potter, Pirates of the Caribbean and James Bond. Ugly Models are in official partnership with Guinness World Records and represents the world's tallest man, the world's most pierced woman and the world's most tattooed man. History Ugly was started in 1969 by two photographers to fill a gap in the modeling market for interesting", "-24.405583411222324" ], [ "the case. Even if a video shows the mask being worn in a ritual dance, the dance may have been staged for tourists. Yet if the provenance of the mask is proven, if the mask was made by a member of the society using traditional designs and techniques, it is presumably an authentic example of the style or tradition.\nIt is not always clear what constitutes a style. For example, production of Zimbabwean stone sculptures is relatively recent, dating to the 1950s. It does not draw on any earlier tradition. However, the sculpture plays an important role in establishing the existence", "-24.405510486467392" ], [ "of him. The whereabouts of the face mask from which the bust is derived are not known and, presumably, the mask has not survived.\nThere is an off-campus dormitory complex belonging to the University of Bath named John Wood Complex, on Avon Street.\nBath is now a World Heritage Site, at least partly as a result of the Woods' architecture.", "-24.370831494336016" ], [ "called skeuopoios or \"maker of the properties,\" thus suggesting that their role encompassed multiple duties and tasks. The masks were most likely made out of light weight, organic materials like stiffened linen, leather, wood, or cork, with the wig consisting of human or animal hair. Due to the visual restrictions imposed by these masks, it was imperative that the actors hear in order to orient and balance themselves. Thus, it is believed that the ears were covered by substantial amounts of hair and not the helmet-mask itself. The mouth opening was relatively small, preventing the mouth to be seen during", "-24.34786348270427" ], [ "View in a virtual replication of his or her own real-life appearance. In other words, the technology removes abstractions of a person's appearance or that of his or her personal belongings – there is an immediate disclosure of the person and object, as they visually exist in real life. Although Street View began to blur license plates and people's faces in 2008, the technology is faulty and does not entirely ensure against accidental disclosure of identity and private property. Elwood and Leszczynski note that “many of the concerns leveled at Street View stem from situations where its photograph-like images", "-24.33897107321536" ], [ "extension distortion, where objects closer to the camera appear much larger than they actually are. Though this distortion has a slimming effect, it also exaggerates the auto-photographer's nose and chin, since those parts are closer to the camera than the rest of the face.\nA study published by the American Academy of Facial Plastic and Reconstructive Surgery has found that selfies have altered people's perception of their faces to the point where they increased the demand for rhinoplasties (nose jobs). Forty-two percent of surgeons surveyed have noticed that patients are seeking surgeries to improve their appearance in photographs, especially selfies taken", "-24.303548736555967" ], [ "and Gross launched their museum, spanning the top floor of their Knightsbridge store. The floor has a permanent display of more than four thousand frames that date back to 1969. Also on the top floor is the bespoke service mirrored room, where the clients can create their own glasses or choose a bespoke service and have a pair designed for them. Fashion Cutler and Gross eyewear is designed at the Cutler and Gross headquarters in Marylebone, London, and is handmade in a factory in Domegge di Cadore, Italy.\nThe company's eyewear has been worn on catwalks and in magazines, including Vogue,", "-24.288170862419065" ], [ "the streets of European, Asian, South- and North-American cities, usually showing blurred silhouettes of human entities, often captured in backlight atmospheres of technically disintegrated surroundings. Kamila B. Richter is interested mainly in everything mediatised, the machine glare: the depiction of preconscious processes of sight, which our brain has learned to subconsciously construe. For Kamila B. Richter the camera’s blurred limited phase image is the proper reflection of reality. The abstract, mediatised reality as content and old master style oil painting technique, which she layers in weeklong work stages to finish her versions of mediatised streetscapes, materialize the tension of contemporary", "-24.25936744536739" ], [ "of an actual man. Sculptures portraying true likenesses of people (rather than highly stylized portrayals) are rare in Ancient Egyptian art, both before and after the creation of Ankhhaf's bust. Plaster covers a limestone core, which has been painted red, a colour commonly given to males in both sculpture and in reliefs (figures of women were typically painted yellow). The face is stern, with a slightly uneven mouth which makes him appear as though he is smirking from one side, and aloof and impersonal from the other. There is a slight droop to the eyelids, whose eyes were once", "-24.256785827805288" ], [ "Acoltzi family and the Mendez family of the city of Tlaxcala . Another area with a high demand for masks is Chiapa de Corzo, for the Parachicos dance performed for the feast of Saint Sebastian by thousands of dancers. The best known mask maker of this type is Antonio López, who also teaches the trade to young people. There are still cases where dancers make their own mask, such as the Cora in Nayarit and the Mayo and Yaqui in Sinaloa and Sonora. These are not generally made of wood. In the Cora community, dancers are bound to make", "-24.25407421705313" ], [ "everyone, from the terror of youth and perfection.\" In 2016, Lindbergh declared that \"A fashion photographer should contribute to defining the image of the contemporary woman or man in their time, to reflect a certain social or human reality. How surrealistic is today’s commercial agenda to retouch all signs of life and of experience, to retouch the very personal truth of the face itself?\"\nThe journalist Suzy Menkes wrote that \"Refusing to bow to glossy perfection is Peter Lindbergh's trademark – the essence of the images that look into each person's unvarnished soul, however familiar or famous the sitter\".\nIn 1989, Linda", "-24.248628673143685" ], [ "face was by focusing \"on the subtleties of the human form\", compiling translucent layers of skin to prevent the character from resembling plastic, a task they found daunting due to the audience's familiarity with human skin. To make her skin appear more believable, the animators studied dermatology books \"to determine how various types of illumination play on human skin\", with visual effects supervisor Ken Bielenberg comparing the situation to lighting Diaz herself. He joked, \"You want the sunset to reflect off her face in a way that's flattering ... Fiona may be a computerized princess, but she has her bad", "-24.233380026882514" ], [ "in the past few days, surely pedestrian was stopped by the magnificently-lit, wonderfully-colorful, and beautiful textiles in the shop windows. Here, we praise our first fashion entrepreneur, Antal Alter, who exhibits evening gowns with such glamour and beauty. Alter even used one part of the shop interior as an improvisational display, where garments were drenched in blinding light of the glimmering chandelier. His exhibits was always full of surprises, and they made the ladies visiting the shop often unsure as to where to focus their attention: to the elegant garments and refined textiles, or his stylish arrangement, which – because", "-24.231835742801195" ], [ "of the types of characters that each represents and includes all of the characters including the lovers. It is almost as speaking to the character rather than the masks, saying that they are a type that is unchanged.\nMasks help with the creation of Commedia as they create the characters themselves. Comedy masks tend to make a statement from the second they are seen on stage. They tell the audience who the character is, their social class and type, what they will do or won't do, and what their attitudes are. The moment they step on stage the character comes alive,", "-24.20228679678985" ], [ "every thing I have done\". His later portraits have a singular life and individuality, partly because Rodin stayed on his contour modeling principles. Problems The mask was originally titled Portrait of M. *** and was generally rejected because it presented a man with a broken nose and strong, sharp facial features; which was considered ugly to the eyes of most people.", "-24.19308551819995" ], [ "to make society more aware of ugly people's problems. It also helps people overcome their phobias and, in some cases, to find partners.\nIn 2007, the group unveiled a monument dedicated to ugly people in Piobbico's town square. The monument depicts an unknown person looking at his reflection in a mirror. Traditions The club's emblem is the head of a wild boar. The club's crest features a reclining man smoking a pipe with the slogan: \"Ugliness is a virtue, beauty is slavery\".\nThe club's patron is Vulcan from Roman mythology. At birth Vulcan was so ugly that his mother threw him over", "-24.18397504731547" ], [ "surgeon who creates a disguise for him in the form of a face mask and a pair of gloves using a special material called Dermaplex that has the same properties as human skin, which enable Westin to appear in public. The Dermaplex side effect is that Westin has to remove the mask from time to time because, as Dr. Maggio states, \"The beard will be your enemy, and the itch will drive you crazy.\"\nBy the conclusion of the pilot, the process' lack of stability renders it effectively useless for commercial or military applications, and the Klae Corporation is persuaded to", "-24.180712619854603" ], [ "is the representation of the typical tourist because those behind the lens, the image, and creators are predominantly male, white, and Western. Those that do not fall into this category are influenced by its supremacy. Through these influences female characteristics such as youth, beauty, sexuality, or the possession of a man are desirable while the prevalence of stereotypes consisting of submissive and sensual women with powerful \"macho\" men in advertising are projected.", "-24.17705453914823" ], [ "sculpture were put to practical use in 1988 when she created facial reconstructions for police in Leesburg, Virginia, leading in one instance to the identification of a murder victim.", "-24.17207894380408" ], [ "masks.\nThe artisan has had a career of over forty years and the family is well known for their work, masking the masks for almost all of the carnival celebrations in the state of Tlaxcala. His techniques are very similar to those of the colonial period and does not use molds or models, rather he sculpts designs from memory. Most of the masks are related to traditional dances such as the Danza de Cuadrillas, Cuatro Estaciones, Taragotas, Francesas, Los catrines de levita and La gota. The last two are danced only in San Juan Totolac. He uses wood from a pine", "-24.161051423288882" ], [ "fills you with the childlike energy and creativity of playing make-believe\". TechCrunch called it \"a clever application that lets you change your facial features...\" and Inc. wrote that \"[it] is an example of technology that may make it easier for camera-shy folks to sit through live video calls or take pictures in the future.\" Awards In 2014, Looksery won the Best Innovative Startup Award at the SVOD annual conference in Silicon Valley.", "-24.13672259397572" ], [ "imagination into the performance. The mask is essentially a blank slate, amorphous shape, with no specific characterizations necessarily implied. The expressive masks are basically character masks that are depicting a very particular of character with a specific emotion or reaction. The mask is automatically associated with conflict. The last mask in the series is the red clown nose which is the last step in the student's process. Because this nose acts as a tiny, neutral mask, this step is often the most challenging and personal for actors. Lecoq believed that every person would develop their own personal clown at this", "-24.12815985916677" ], [ "faces were not made by human hand. Some paranormal investigators believe that it is a thoughtographic phenomenon, subconsciously produced by the deceased former owner of the house, María Gómez Cámara.\nSkeptical researchers have performed extensive tests on the faces and believe that they are fabrications possibly created as part of a hoax. It is suspected that the Pereira family may have perpetrated the hoax for financial gain. History Reports of appearances in Bélmez began on 23 August 1971, when María Gómez Cámara claimed that a human face formed spontaneously on her concrete kitchen floor. María's husband, Juan Pereira and their son,", "-24.116762770689093" ], [ "shopper may then drag and drop (and mix-and-match) clothes on the virtual mannequin. Some such solutions are being used to replace the real-life models in the garment photography, reducing the cost associated with human models and standardising the photography processes. Photo-accurate virtual fitting room This technology is a convergence of two techniques: using real models and dress-up mannequins. Instead of photographing garments on people similar to customer’s shape and size, images are made using shape-shifting, robotic mannequins. The computer-controlled mannequins quickly morph through a series of body shapes and sizes while garments – in each different size – are photographed", "-24.110770985000272" ], [ "See-through clothing See-through clothing is any garment of clothing made with lace, mesh or sheer fabric that allows the wearer's body or undergarments to be seen through its fabric. See-through fabrics were fashionable in Europe in the eighteenth century. There was a \"sheer fashion trend\" starting with designer clothing from 2008. See-through or sheer fabric, particularly in skintone (called \"nude\") colours, is sometimes called illusion, as in 'illusion bodice' (or sleeve) due to giving the impression of exposed flesh.\nMesh, web, or net fabric may have many connected or woven pieces with a many closely spaced holes, frequently used for", "-24.10288297571242" ], [ "drawing on ideas about the carnivalesque. The masks serve as a method in which participants can momentarily shed or alter their usual identities, providing the wearer with temporary freedom from social norms. Other common motifs in Téllez's work include mimicry, chalkboards, and disembodied voices.\nWhile Téllez is known primarily for his use of film, he has also used photography, objects, and sculpture in his installations. For several of his exhibitions, including Bedlam (1999) at P.S. 1 Contemporary Art Center and Liftoff (2001), Téllez has constructed large scale birdhouses which entrap the viewer and serve as a subtle reference to Ken", "-24.087878963095136" ] ]
lxs4i
Why does everyone hate the sound of their own recorded voice?
[ "I would like to point out that this dissonance we all feel when hearing our recorded voices is not just a physical difference, but a percieved difference. When we hear our voices recorded, our brain has a certain expectation of what we will hear. Having become so accustomed to what our voice sounds like in our heads, hearing something we don't expect makes our brains mad. To a unbiased third party, it may very well be that the recorded voice is more desirable then the sound oof that voice through body matter. We don't hate our recorded voices because they are better or worse, we hate them because they are challenging something we have known our whole life as a truth.", "So Morgan Freeman's voice sounds even better to him? Lucky bastard.", "I sound like a mentally retarded redneck. I might very well be one, but I don't like to be reminded of the fact.", "The voice you hear internally is the result of your voice transmitting through not just air, but also bone, muscle, and the cavities of your skull. All of these things change the sound of the voice. Hearing your recorded voice, it's just transmitted through air.", "Yeah, I sound like a huge dork. It's so embarrassing. But in my head I sound like a boss.", "I love the sound of my own voice.", "Here's what puzzles me. Professional impersonators. Rich Little, Frank Caliendo and the like. If what we hear coming out of their mouths sounds very much like the celebrity they are impersonating, what they are hearing in their heads must not. Right? Because as we know, what we hear in our heads with regards to our voice, is not what other people hear.", "this is why people audition for american idol and think they can sing.", "External sound make your eardrum vibrate but the vibration is then transmitted by three little bones before being detected by your brain. When you talk, the bones of your skull vibrate and therefore what you hear is the result of both the pressure wave travelling through the air (external sound) but also the vibrations transmitted through your bones. As waves do not propagate the same way in air and bones, what you hear when you talk is not the same thing as what other people hear. Physically speaking, it's a matter of how different frequencies are attenuated depending on the medium but you'd have to be more than five to understand that.", "Well, depending on the fidelity of the recording device, you'll have some variation on what others hear. But yes, a recording of you is much closer to what other people hear than what you hear in your head.", "I don't hate the sound of my own recorded voice. I just think I sound like an asshole.", "Your voice sounds radically different travelling through your skull than through air, into a microphone, out of a speaker, and through even more air. In our heads, we all hear our \"radio voices\" (lots of presence, bass, and warm overtones) so it's only natural that we get slightly disappointed when that effect is taken away.", "I was the vocalist in a high school band and after a while of hearing my voice recorded I got used to the way its sounds, at least when singing (I still talk funny).", "The reason it sounds different is because our ears are behind our mouth, so it sounds different. It just sounds so different when you hear it recorded that it's suprising. You can get used to it pretty easily though.", "I think it's because we're used to the way it sounds to us. I originally hated the sound of my recorded voice until I started recording music. Now I think I have a rather pleasant voice.", "I hate my voice recorded and in my head. I sound like a nasally 12 year old boy. I hate it so much I wish I didn't have to talk. No me gusta.", "I hate my recorded voice, which sounds like a fluffy soft little girl voice, when in my head I sound deeper and more assertive, especially when reading out loud.", "No. Quite the contrary, I love my voice. Apparently many others do as well, as evidenced by the comments in [this]( URL_0 ) video.", "Because I sound like a fag. (I *am* a fag, I just don't want to sound like one).", "If this is true than how does a popular recording artist stand listening to themselves so many times?", "But...but...I *like* my recorded voice... ...when I use British or South African accent." ]
[ [ "it was constant. Otherwise they had no other interest in sound on their stage for years. This did not mean they were not interested in sounds at all. In fact, whenever The Haters were in the studio, they'd always give great detail to every aspect of the sound. A record or CD release, and a live performance are two different things; and they absolutely never saw any reason whatsoever why one had to sound anything like the other.\nThere were a few exceptions, namely, some conceptual \"anti-records\" they released in the late 1980s and early 90s. The first, from 1988,", "-31.282699100323953" ], [ "the audience. Musicians whose voices are barely present in the \"front-of-house\" mix, such as backup vocalists, can have their sound clearly and loudly sent through a monitor speaker so that they can hear themselves singing and ensure that their pitch and timing is correct.", "-31.032090465159854" ], [ "sounded nothing like and often didn't have much in common with. That was what made us uncomfortable. For that reason, we just tried to avoid any connection with the term. Our sound is never reactionary to outside elements, it's always natural and down to experiences.\n— Helen Marnie\nReuben Wu said about the process of making a new Ladytron album: \"We start writing individually. We've never really lived in the same city before. We've always been geographically apart. [...] It's always been first as individuals, and then reviewing everything together, and then working on each other's songs. That's how we've always worked. And", "-30.848674135806505" ], [ "other stuff-- and we failed. But in failing to do that, we stumbled across a sound that's inherently our own. Failing to imitate others only happens because of the mindset that you come from. It's part of finding your own voice. When musicians go through that, the results are, by definition, original. Most of the music that sounds like it's been influenced by [Crooks & Lovers] that has come out since sounds fairly dull, and it's not something we want to carry on doing. We want to get away from it.\".\nMaker says in an interview with FACT \"The new", "-30.76357544446364" ], [ "that a female voice was what the band needed. Michael Timmins said, \"I thought if you had this female voice on top of it, you could do anything you wanted.\"\nHowever, the slow musical tempos and whispery, hushed tones that defined their early work was not just musical inspiration, but came about by necessity. Their recording studio was their re-purposed garage, which was just behind the house and bordered closely with their neighbours. On their first jam session, the police showed up due to a noise complaint from the neighbour. According to Michael Timmins, \"We realized we had to tone down.", "-30.525724080885993" ], [ "two hired English teachers. They were hired was because over half the team were Japanese and sounds that sounded weird to the non-Japanese members did not sound off to them. Due to the mix of British and American sounds, CYBER DIVA did not always sound good when the sounds were mixed. She included the schwa sound; this is not included in all English vocals despite the fact that the phonetic still was used by the voice. A custom dictionary was made for her, this was worked upon in July. Due to its size, they then had to fix the library", "-30.354900715930853" ], [ "of voice in his albums, Callahan has said, \"It’s usually one character per record. So, the character appears in all or most of the songs on one record and then is gone. Though it makes me feel weird to talk about. Because I don’t really think in clear terms of characters. My albums as a whole could be seen as one character with many voices.\" His generally dispassionate delivery of lyrics and dark irony often obfuscate complex emotional and lyrical twists and turns. Critics have generally characterized his music as depressing and intensely introverted, with one critic describing it as", "-30.283279013092397" ], [ "that's the difference between even a really good speaker, they're still – are not really pessimistic but good educational optimistic speaker – there's still something missing compared to when you hear that speaker and you sing a few songs before or after – preferably after I think because then you leave on a feeling on more togetherness and optimism even when the songs are not particularly optimistic. There's something about music that makes people feel optimistic ... Opinions on file sharing Rovics supports file sharing of his own work. In his song, Steal This MP3, Rovics encourages listeners to steal", "-30.23569578520255" ], [ "Since many early 1960s PA systems did not have monitors, singers could only hear their vocals by listening to the reflected sound from the audience-facing \"front of house\" speakers after it bounced back from the rear wall of the venue. This was not an effective way to hear one's vocals, though, because the sound you hear bouncing back from the rear wall of the venue is late. Because singers could not hear their vocals, it made it hard to sing in rhythm with the band and in tune.\nAt this time, many professional live sound engineers were wrestling with the problem", "-30.12030497402884" ], [ "radio shows ended. The ability to record high-quality sound on magnetic tape also created opportunities. Digital recording—thanks to the proliferation of PCs, smartphones (iOS and Android 5.0+), dedicated recording devices, free or inexpensive recording and editing software, and USB microphones of reasonable quality, increasing use of home studios — has revolutionized the industry.\nThe sound recording industry uses the term \"presence\" as the standard of a good quality voice-over and is used for commercial purposes in particular. This term \"presence\" measures the legitimacy of how it sounds, specifically one of a voice-over. Advances in technology for sound recording have helped voice-overs", "-30.10131935677782" ], [ "and most of the singing is live so it’s feeding into the drum mics and vice versa, otherwise it’s all isolated.” Liddiard also described himself as a \"Beyer man\", admitting that he's \"fanatic about them\" and that it compliments their harsher sound. The sessions marked the first time that the band engineered their own sessions in a \"group effort\". Liddiard compared their use of noise on the album to the \"sound of a car crash\", saying: “You mimic. As long as the noise you’re making reflects what’s currently a noise that’s naturally out there, then I think it’s a valid", "-30.090027897771506" ], [ "Obviously I didn't get complete control, I'm new at it and I don't know the ins and outs. I was quite happy to hand over most of it, to be honest. I think I'd get bored in the studio trying to edit clips of my own voice. I was brought up with a lot of country music like Kenny Rogers, but I've got quite eclectic tastes and have everything from Iron Maiden to Britney Spears on my iPod. I like a lot of R&B but I also love choral music. It kind of depends on my mood but I'm very", "-29.706693611777155" ], [ "that made the sound better. So what you hear is pure recording, the band as it really is.\"\nWoodruff had organised for his band to work with Chapman and Kevin \"Caveman\" Shirley (audio engineer): \"I had never met [Chapman], I knew his work. I'd listened to everything he'd ever done... I thought 'if we can drag him out of retirement to get the song structure right'... Susie was writing great songs and great sentiments, but the structure wasn't quite there. I thought if I can then convince him to work with a young rude engineer, which turned out to be [Shirley],", "-29.608726966020186" ], [ "the most problematic and worst-sounding to the human ear.\nOn a practical level for the music professional, the speaker is analytic and clinical-sounding. Gizmodo likened the NS-10 to music editors who reveal the weaknesses of recordings, so that engineers would be forced to either make necessary compensation in the mix or otherwise rework them.\nA 2001 report by Newell et al.  at Southampton University undertaken for Studio Sound  in 2001 found that the NS-10 had excellent time-domain response at low frequencies – its ability to start and stop in response to signal input was found to be superior to that of most", "-29.56296249443949" ], [ "group The Mars Volta and R&B singer Brandy. Of Brandy, Frusciante says \"she's doing something different, she's doing so many vocals that there is never a space. Whenever one voice stops, another one does something in its place. There's very little space, and there are so many vocal parts that are breathy, you don't know what you're listening to. There is so much going on, you can't hear her voice with your conscience, you have to hear it with your subconscience. Some of them have a watery sound, then metallic, she really creates a lot of dimension with her voice.", "-29.509755753133504" ], [ "copying me. You can really hear that he has a voice like me. If he would copy me I wouldn't like it. But that is really strange, because there would not exist much people in the world that really sound so similar to me. And this guy really sounds similar to me, but you hear that he doesn't copy me, because in the moment where he sings more clear, he sounds totally different than me.", "-29.496049626061904" ], [ "The Voice of the People The Voice of the People is an anthology of folk songs produced by Topic Records containing recordings of traditional singers and musicians from England, Ireland, Scotland and Wales.\nThe series was first issued in 1998 as 20 CDs, compiled by Dr Reg Hall, a visiting fellow at Sussex University. \nA second series was issued in 2012 consisting of four volumes (7 CDs) compiled by Shirley Collins, Steve Roud and Rod Stradling.\nA third series was issued in 2013 comprising 4 albums ( 6 CDs and 1 DVD) of field recordings recorded by Peter Kennedy and selected by", "-29.44816944203467" ], [ "the rock 'n' roll era had begun and some engineers were recording loud vocals with singers singing directly into microphones at very close range; when the U 47 or U 48 were used in this way, the result was considered by many engineers at the time to sound unacceptably harsh. (This could be considered ironic, since the U 47 and U 48 have a cult following today specifically for use in close-up vocals, with some engineers seeming to fancy that they are re-creating a \"vintage\" sound—whereas in fact, they are creating a sound quality that was specifically abhorred by many", "-29.2737021711946" ], [ "Loud music Loud music is music that is played at a high volume, often to the point where it disturbs others and/or causes hearing damage. It may include music that is sung live with one or more voices, played with instruments, or broadcast with electronic media, such as radio, CD, or MP3 players.\nPlaying loud music that can be heard from outside of the property from where it is being played (such as a house, apartment, hotel room, or motor vehicle) is considered to be rude by many people and societies. Among those opposed to the practice, it may result in", "-29.254292284836993" ], [ "around she's stressed out. Being isolated and not having anyone to connect with, there was just no physical touching back then\". Influence Her voice is, in its own right, the common thread through all of it. There is no one who sings like that. And I think there are a lot of people who were influenced by it, but even if you try and sing like her, you can't do that. You can't throw your voice like that. You can't throw harmony like that. That is a very distinct voice. Her technique is a thread between the really far-out stuff", "-29.25320900278166" ], [ "really hate listening to myself! The first time I listened to a recording of my singing was when we were recording San Giovanni Battista by Stradella in a church in Perugia in 1949. They made me listen to the tape and I cried my eyes out. I wanted to stop everything, to give up singing... Also now even though I don't like my voice, I've become able to accept it and to be detached and objective about it so I can say, \"Oh, that was really well sung,\" or \"It was nearly perfect.\"\nCarlo Maria Giulini has described the appeal of", "-29.24538352025411" ], [ "Voice (Hiromi album) Music As Hiromi says, \"I called this album Voice because I believe that people’s real voices are expressed in their emotions. It’s not something that you really say. It’s more something that you have in your heart. Maybe it’s something you haven’t said yet. Maybe you’re never going to say it. But it’s your true voice. Instrumental music is very similar. We don’t have any words or any lyrics to go with it. It’s the true voice that we don’t really put into words, but we feel it when it’s real.\" Reception Derk Richardson of The Absolute", "-29.16600732842926" ], [ "We were getting better as musicians as well and I was hopefully getting better as a vocalist. When that happens you want to fine-tune what you're doing. It's also about not wanting to get stuck or pigeonholed into one particular musical place. We've kept the whole gothic thing going right throughout our career, but we did want to do something a little different. With the vocals, a lot of it was kind of shouting in key as opposed to just shouting, it's okay singing like Beelzebub, but your voice can get into trouble if you have a big tour.", "-29.136292759154458" ], [ "voice that sounds both old and young, an effortless yet intricate finger-picking guitar style and lyrics that are both dramatic, and intensely confessional. It is a sound that channels the restless spirit of a young man who left home to travel the country, haunting and impassioned songs formed by endless nights alone on stage with a guitar, playing to packed houses, other times to nearly empty rooms. Stelling estimates that he has played over four hundred shows in just the past three years. It places him within a longstanding tradition that serves to nurture ones character and art.", "-29.08837914299511" ], [ "to what became known as the \"Bacharach Sound.\" He explains:\nI didn't want to make the songs the same way as they'd been done, so I'd split vocals and instrumentals and try to make it interesting  ... For me, it's about the peaks and valleys of where a record can take you. You can tell a story and be able to be explosive one minute, then get quiet as kind of a satisfying resolution.\nWhile he did not mind singing during live performances, he sought mostly to avoid it on records. When he did sing, he explains, \"I [tried] to sing the", "-29.04011156182969" ], [ "\"oversinging\" is applied to them by people who do not like the style. This criticism is mainly focused on too much \"vocal gymnastics\" which some feel degrades the artistic merits of the song, and not necessarily that they strain their voices too much.\nWhile [Roger] Burnley believes all of those divas to be oversingers in their own right, [Hollywood vocal coach, Chrys] Page argues the opposite. \"They don't oversing, but some young hopefuls, trying to sound exactly like those artists, consistently do it because they haven't yet found their own voice and style,\" she said.\nWhen amateurs on shows like Idol are", "-28.929199246282224" ], [ "a collection of songs based around the way such noise and interaction affects those living in cities. In an interview with The Quietus leading up to album's release, Holter stated that, \"We live in a very loud world now. I myself am not the child coming of age – I don't think! – and I'm not grumpy about the loudness, but I'm curious about it. And it's very easy to place a character in today's world who is disenchanted with it and running away, because loudness can be claustrophobic.\" \nThe songs on the album explore this concept in different", "-28.820806941119372" ], [ "People were freaking out because they had stumbled upon a fresh voice and a beautifully written song and ultimately, does the rest really matter?\" Krystina Nellis of Drowned in Sound said the single reminded her of something from a David Lynch movie.\nAdditional, Drowned in Sound wrote of \"Video Games\":\nAbove all the noise of the internet, ‘Video Games’ still works and is magical; I still have to listen on quiet because whenever I do I become convinced something absolutely terrible is about to crash through the window; it might as well be sung by Laura Palmer and be about the Bobs", "-28.792347180715296" ], [ "Richard Skinner at the time of the album's release, Hollis commented that \"I think silence is an extremely important thing. It isn't something that should be abused. And that's my biggest worry because of the whole way that communications have developed, that there is a tendency just to allow this background noise all the time rather than thinking about what is important. The silence is above everything, and I would rather hear one note than I would two, and I would rather hear silence than I would one note,\" and according to Wyndham Wallace, \"this helps explain the fifteen seconds", "-28.751392355457938" ], [ "for his work, and had received threats and insults from people associated with the band: \"I've just mixed a really wonderful band with one of the worst sounding recordings ever. It's kinda disgraceful that they won't spend anything on a decent recording! I won't say who, because last time I commented on a sloppy recording (on this page), they refused to pay me and I got all manner of threats and insults from people associated with the band, so I'd best be quiet!\"\nThe stage blood caused technical difficulties as it soaked the microphone, guitars, and cymbals, which according to Shirley", "-28.678116272902116" ], [ "people may still be affected by the noise. In many universities, complaints from the residents are received every year during the committee election periods. Because the activity “Ngai Jong” is held at public spaces like the university entrance, corridors or near canteens, the noise may cause disturb to passers- by and the general public near the university or those who are using the university facilities. More and more complaints are received, which affects the university’s image and reputation.\nSince students are only allowed to use their own voices and body parts during \"Ngai Jong\" without the help of microphones or other", "-28.623913443880156" ], [ "Townes Van Zandt and Guy Clark to move to Nashville and pursue careers as songwriters. Van Zandt later described how Newbury's voice impressed him: \"I can't really call it 'explain' but I'd tried tell Jeanene [Van Zandt's wife] about the sound of Mickey's voice and the guitar on a good night at the same time. It's hard; you can't do it. It's like from outer space. I've heard about people trying to explain a color to a blind person... There's no way to do it.\" During a show in Galway, Ireland, John Prine said, \"Mickey Newbury is probably the best", "-28.617951905645896" ], [ "All in One Voice Recording Tracks produced by Jimmy Smyth were recorded at Full Moon, Westland and Park House Studios in Dublin, Ireland. \"The Reason Why\" was recorded at Boogie Park Studios in Hamburg, and \"I Put a Spell on You\" was recorded for Mike Batt's album Philharmania at Abbey Road Studios in London. The remaining tracks were recorded at Red Deer Studios in Germany. Singles \"He's the King\" was released ahead of All in One Voice in December 1997. The song was originally used for the German TV series Der König von St. Pauli. Tyler made an appearance in", "-28.58693862630753" ], [ "he loved how the band sounded on the last four songs, he hated the sound of his voice. Rose recalled that his voice was husky and scratchy from the band's lengthy touring at the time, and if he could he would have re-recorded his vocal tracks in a separate session.\nA significantly faster version of \"You're Crazy\" with electric guitars had previously been released on the band's debut album, Appetite for Destruction, and was now recorded as originally intended. \n\"Used to Love Her\" was written as a joke after Izzy Stradlin disliked a song he heard on the radio featuring \"some", "-28.542486579099204" ], [ "in quieter environments than in noisier ones. Oliver Sacks' patient, Mrs. O'C, reported being in an \"ocean of sound\" despite being in a quiet room due to a small thrombosis or infarction in her right temporal lobe. After treatment, Mrs. O'C was relinquished of her musical experience but said that, \"I do miss the old songs. Now, with lots of them, I can't even recall them. It was like being given back a forgotten bit of my childhood again.\" Sacks also reported another elderly woman, Mrs. O'M, who had a mild case of deafness and reported hearing musical pieces. When", "-28.47722109229653" ], [ "but it annoys me how polite it can sound when perhaps what I'm singing is deeply acidic.\" He said he keeps vocals in mind whenever he builds music, no matter the genre: \"It's almost impossible for me to listen to a dance tune from beginning to end without picturing a voice.\"\nIn 2005, readers of Blender and MTV2 voted Yorke the 18th greatest singer of all time. In 2008, Rolling Stone ranked him the 66th, writing that \"by the turn of the century ... Yorke's voice had made him one of the most influential singers of his generation,\" influencing bands including", "-28.45207357977415" ], [ "styles. However, the fact that she could neither read nor write music made it hard to communicate with session musicians. In the studio, she was a perfectionist. Despite producing many tracks, she did not take credit for doing so. During extensive vocal sessions, she repeatedly recorded short phrases and single words. When recording songs, headphones were typically set as high in volume as possible – at a decibel level \"on the threshold of pain\".\nThe Philips Record company's studio was slated as \"an extremely dead studio\", it felt as though it had turned the treble down: \"There was no ambience and", "-28.339741732925177" ], [ "was concerned that there would not be enough voices to duplicate the sound of the songs on the album in a live setting. To compensate for this problem in early performances, Vernon passed out lyrics for some songs to the audience to sing along to. In an interview with Pitchfork, Vernon described this dilemma. \"I don't want to be the guy with an acoustic guitar singing songs, because that's boring for the most part. The song actually needs 80–500 people singing or whatever the vibe is of that room, it needs that fight.\"\nBon Iver performed at Lollapalooza 2009. Bon Iver", "-28.30367772199679" ], [ "vocals are intoned with, one might hazard a guess, a grin on the face of the protagonist.\" Their lyrics were \"generally disrespectful and crazed\" and their music was \"eccentric, loud, irreverent and to the point.\" Mason believes that musically the band was not as bad as generally perceived: \"They sound as if they can actually play but would rather enjoy themselves, which is no mean feat.\" He said that they came from an era that is \"for the most part misunderstood, either cloyingly romanticised or short-sightedly vilified\", and today the story of John's Children is \"relegated to a condescending historical", "-28.302806468156632" ], [ "to people who are interested in certain things and who go through the trouble to find recordings that I might not hear otherwise. Who are playing pieces because they think other people just have to learn about them.\" [Ich möchte Leute hören, die sich für bestimmte Sachen interessieren, die sich die Mühe machen, Sachen zu finden, die ich vielleicht sonst nicht hören würde. Die Stücke spielen, weil sie meinen, dass andere Menschen sie einfach hören müssen.]\nIn Alan Bangs Connection, he put up relationships of various kinds between the songs he played (e.g. only cover versions, only unplugged, certain years of", "-28.28845622180961" ], [ "a low, gutted, rasping sound. This techniques gives particularly women, a deeper voice. Overtone singing is only practised by women and it is generally the overtone singer who leads the song. Diviners often use overtone singing as they believe that it enables them to speak to the ancestors.", "-28.281613824539818" ], [ "review, saying, \"His voice can never be mistaken for anything but country while he makes the music come alive. This is an album that has no bad cuts.\" Personnel Compiled from liner notes.", "-28.26561994032818" ], [ "totally different than what other people might see as a problem. I might be totally focused on my voice. But I think we get a little better as we get older. We're listening to more music and getting more confident with who we are as musicians and as a band. It's a natural progression to get to The Courage of Others. Although it did take a long time and that's due to my influences and falling in love with a different style of music to what we came from.\nSmith also said in the Reverb Magazine interview that his favourite song", "-28.220655466255266" ], [ "Box Recorder.\" McAloon was concerned about finding the correct narrator, saying \"I wanted to make a record I could listen to, so it couldn't be me singing, because I can't stand my voice.\" He later told The Scotsman, \"It has a woman speaking and it sounds like she's speaking about her voice. I loved that distance.\" McAloon explained the title song was 22 minutes long because its \"the length you'll get on an Atari.\" He later felt it was a poor reason, \"but in the end when I figured out the structure of it it was just gonna fall within", "-28.216227362368954" ], [ "is \"to avoid cliche, or the cliches expected of white men with guitars from Manchester\" and sums up their sound as \"highly stylised and deracinated – we're influenced by everything except 12-bar blues.\" He's also commented \"There are no genres I can think of that we haven’t learnt something from. We all share a huge number of basic passions like Radiohead, but we all come from different areas of popular music: jazz and funk; modern US R'n'B, prog and krautrock, post-rock/punk/hardcore. And we all love good honest pop. We’re a rock band as far as we're concerned.\" He's noted that", "-28.205310043907957" ], [ "For Indians, making noise is a sign of happiness. For politicians the ability to make a big noise, by using huge loudspeakers at any opportunity, is a sign of strength. Festivals in India have become political battlegrounds as politicians try to score brownie points over one another by attempting to host the noisiest festival. The use of loudspeakers, permitted by the courts on certain occasions, often exceeds the permissible decibel limit, causing a great deal of stress and anxiety to the neighbourhoods.\nAwaaz Foundation has advocated against noise pollution from various sources and has conducted campaigns to create awareness of adverse", "-28.203340544190723" ], [ "the quality of the sound in a live broadcast environment.\"\nIn 2011, singer Katy Perry was onstage with a recorder in playing position while the sound of a recorder played through the speakers. However, when she took the mouthpiece away from her mouth, the pre-recorded backing track continued to sound through the PA system, indicating that she was miming the performance of that instrument. Artists intentionally showing they are miming In some cases where producers have insisted that bands mime their performance on TV broadcasts, the performers have protested this practice by making it obvious that they are not playing live.", "-28.189070678141434" ], [ "his voice take second fiddle to the extremely proficient playing. In truth, Bondarev’s voice is underutilized and should have taken the forefront, especially when he sings lyrics like: “And I've chosen this existence where we're always racing time / And we're running on pure passion / Leaving everything and everyone behind.”\nWhereas some bands are loud for the sake of being loud, A Moment’s Worth kicks up the sonic level without sacrificing musicianship. Every minute of the record is incredibly cohesive, as if to assume that the band has been playing together for a dozen years (they’ve actually been a band", "-28.14966324449051" ], [ "realized that some people became hesitant to book them because of the name, so they shortened it to Ceann. Sound Five to six guys of ambiguous descent playing something that may or may not sound like Irish music. Some people say we sound like or may be influenced by the following bands: Cake, Stephen Lynch, Johnny Cash, Flogging Molly, Ween, Great Big Sea, They Might Be Giants, Barenaked Ladies, Black 47, The Pogues.", "-28.146074322110508" ], [ "of people to communicate with each other, not particularly internationally but especially emotionally, so what you see around you are people unable to love each other.\"\nTo promote the release of their debut album, Wednesday Morning, 3 A.M., the duo performed again at Folk City, as well as two shows at the Gaslight Café, which went over poorly. Dave Van Ronk, a folk singer, was at the performances, and noted that several in the audience regarded their music as a joke. \"'Sounds of Silence' actually became a running joke: for a while there, it was only necessary to start singing 'Hello", "-28.145231012320437" ], [ "trying to make a point. I wanted to show people how easy it is to manipulate someone's voice. If I can do it with a clip I pulled off of TV, imagine what they are doing on records and during live performances. The entire industry has been so manipulated, because there's such an emphasis on perfection, so when something like this happens, it causes such a stir. I knew something had to have happened to make it jump so fast. It's wild how much the story's been twisted. It's just always been fun for me to manipulate artists, and make", "-28.110244859184604" ], [ "stated: \"What I have done is to try to always create an accessibility using the concept of fragility in the voice to allow the audience to access music that otherwise they might find overtly and harmonically complex or technically demanding to listen to.\" \nOnce a group of classically trained singers, Anúna in the early 1990s began to include untrained singers with experience in non-classical music genres thus achieving the more natural timbre that McGlynn was seeking. \"This is the 'Anúna' sound – powerful and fragile, immediate and human. When I developed it, it was almost as a protest against the", "-28.088628658773814" ], [ "lot heavier than oversaturated. It's just real raw and natural and organic-sounding, which, in itself, is kind of revolutionary these days, when kids are making pro audio-sounding recordings in their dorm rooms, on their laptops, and cutting and pasting verses and choruses. It's no longer cutting edge to make a completely space-aged, robotic-sounding record. I think it's almost fresh now to make one that sounds like an actual band played it. Don't get me wrong - it still sounds airtight and rehearsed, because it is all those things. But it's just real.\" Awards In 2010, Lamb of God was nominated", "-28.049757883738494" ], [ "Human Voice (album) Sound The sound of Human Voice is less lyrical and vocal than his past albums, with emphasis on the warping of human voices and use of synths instead of acoustic arrangements. The first vocalized synth that appears in the album happens to be that of the Casio SK-1 preset that shares the name with the album.", "-28.030355834256625" ], [ "nor the songwriter were comfortable with the results. Williams later wrote \"I'm really proud of the work and the only thing I've ever doubted is the choice of using adult voices. Perhaps I should have given the kids a chance to sing the songs.\" Parker also commented: \"Watching the film after all these years, this is one aspect that I find the most bizarre. Adult voices coming out of these kids' mouths? I had told Paul that I didn't want squeaky kids voices and he interpreted this in his own way. Anyway, as the tapes arrived, scarcely weeks away from", "-28.025019935448654" ], [ "as well and people started sending me messages asking if I was still alive. I'm definitely not dead, but I don't ever want to create the same sound twice, and it took a good while for me to figure out what I wanted to do after Urban Flora,\" he said with an interview with Complex. \"I have a lot of criteria for myself when I make music, and creating something that hasn't been heard before is definitely one of the highest ranking ones.” Sound Galimatias uses sound as a means of designing a space, a moment, or an attitude. His", "-28.003799470279773" ], [ "to classify your own sound, especially when you feel it constantly changing under your feet. But I try to write full structured songs that make people feel. They’re usually based around my piano or keyboard playing, and production could be reminiscent of anything from an old paul simon track to a new mgmt track. That’s where the fun comes in I guess. People have said --which musicians LOVE hearing --\"Oh, you sound like David Gray, James Taylor, or Zero7!\" I take them all as compliments, and keep doing my thing. Ironically enough, I compare my style to a lot of", "-27.958853150368668" ], [ "told The Detroit News, \"Millions of people have responded to [the song]... There's some angst, some anger, and people are feeling like their voices aren't heard. I feel that. I'm a blue-collar guy, not some elitist or crony that wants to be in the ruling class.\" After a very hard fought race Tranchita was narrowly defeated in his first ever political campaign by six percent in the August 2016 primary.", "-27.953000035631703" ], [ "but they could not actually play loud music without harming actor Aaron Paul. The special effects crew unsuccessfully tried several methods to make the speakers pulse, such as shaking them and pulling on strings, but they did not appear realistic. It was achieved after MacLaren visited a local stereo store and an employee provided her a bass tester which would run the stereo system with no noise, but cause the speakers to pulse as if music was playing. That employee was hired to come on the set and run the system, and the lights and pulsing were timed to match", "-27.934102595900185" ], [ "Westerners go to India they make music with lots of respect, but sometimes it feels a bit like there's too much respect. People can be too wary, too wary to make anything that captures the real roughness of some of this music, especially the way the brass bands play when they're following processions and weddings down backstreets and the like.\" To capture less polished recordings, some vocals were recorded with the singers using handheld microphones. The lyrics are in Hebrew, Hindi, and Urdu. Some singers sang phonetically in languages they did not know. All the reverb is natural and was", "-27.934012350364355" ], [ "Chika (software) Development The vocal itself contains twice the number of phonetic recordings as conventional vocals, resulting in a more natural sounding vocal. This was later confirmed to be caused by the addition of approx 200 triphonetic sounds. Noboru confirmed that she has the most triphones out of their Japanese vocals. She can cover rocks songs due to her solid and stable bass.", "-27.910088906037345" ], [ "2003 stated that \"many successful mainstream artists in most genres of music—perhaps a majority of artists—are using pitch correction\". Timothy Powell, a producer/engineer, stated in 2003 that he is \"even starting to see vocal tuning devices show up in concert settings\"; he states that \"That's more of an ethical dilemma—people pay a premium dollar to see artists and artists want people to see them at their best.\"\nIn 2010, producer Teddy Riley claimed that the processing of Michael Jackson's voice with Melodyne caused fans to question the authenticity of the voice on the posthumous album Michael. Riley claimed that because he", "-27.89024018510827" ], [ "has said that it \"feels good to find out my voice is an instrument\", he found the process of learning to sing somewhat \"scary\". \"The first song we did, we recorded all the music, and then Frank was like “Everybody go home, I’m talking to Eddie,” and I was like “Oh no, what’s he going to do to me?” It was a bit scary. We went in and spent hours really, getting me to sing. Once we sort of conquered that one—and he showed me that I could sing—it was a confidence boost. I’ve always been a bit scared of", "-27.86719664795237" ], [ "to the foldback speakers, because the performers may also need to hear a mix without electronic effects such as echo and reverb (this is called a \"dry mix\") to stay in time and in tune with each other. In situations with poor or absent foldback mixes, vocalists may end up singing off-tune or out of time with the band.\nFor live sound reproduction during popular music concerts in mid- to large-size venues, there are typically two complete loudspeaker systems and PA systems (also called sound reinforcement systems): the \"main\" or \"front of house\" system and the \"monitor\" system. Each system consists", "-27.817086385795847" ], [ "good music, how you give your own interpretation and it's the uniqueness actually.\" When asked about her coaching style, she said, \"Anything that I see that is lacking or wrong, I always say it straightforward. That the trouble me sometimes. I also said that I really don't know how to speak well so that is why I'm straightforward. \"If you have no emotions while singing,\" it's very plain. Sometimes other people say that, 'Sarah always repeatedly speak what she always say.' When I critique a performance, I always say that 'You lack sincerity or emotion in singing,' because I'm like", "-27.80828323875903" ], [ "vocal simply as a kind of mischievous experiment. In interviews at the time, he claimed to be testing out his recently purchased DigiTech Talker. It later emerged that the effect was not created by a vocoder, but by using extreme (and then-unheard-of) settings on Antares Auto-Tune.\nTaylor said about the effect that \"this was the most nerve-wracking part of the project, because I wasn't sure what Cher would say when she heard what I'd done to her voice\", but that when she heard it she said, \"It sounds great.\" When her record company requested that the effect be removed, she responded,", "-27.807149884130922" ], [ "a band called Daughtry. The reason why this was chosen was that it struck a nerve with me every time I was listening to my iPhone or my iPod. It feels right. It sounds the way I want it to sound for people to hear me for the first time. That's the other thing for me, an awful lot of people have never heard me sing a full song, they've heard snippets here and there. For me it was really important to have a song that I was really feel happy with and how I sounded on and it stood", "-27.77448772488424" ], [ "it hard to pitch, and I know the sound of my voice isn't very good in purely aesthetic terms, and Roy Harper was recording his own album in another EMI studio at the time, he's a mate, and we thought he could probably do a job on it.\n— Roger Waters, October 1975, Interviewed by Nick Sedgewick in the Wish You Were Here songbook\n\"Have a Cigar\" was a whole track on which I used the guitar and keyboards at once. There are some extra guitars which I dubbed on later, but I did the basic guitar tracks at one time.\n— David Gilmour, October", "-27.761546115463716" ], [ "the capabilities of the Beardytron 5000, he provides an example of some of the sounds he is capable of making with only his vocal cords, such as crying babies, vinyl record scratching, buzzing flies, overtone singing, various animals, a didgeridoo and beatboxing. He then explains that despite his ability to create sounds, the human voice is still intrinsically limited by its physical and biological characteristics. He describes his invention as a real-time music production machine. He states: \"It enables me to, using nothing but my voice, create music in real time as I hear it in my head, unimpeded by", "-27.76103654288454" ], [ "The recording engineer's goal is usually to create a stereo \"image\" with localization information. When a stereophonic recording is heard through loudspeaker systems (rather than headphones), each ear, of course, hears sound from both speakers. The audio engineer may, and often does, use more than two microphones (sometimes many more) and may mix them down to two tracks in ways that exaggerate the separation of the instruments, in order to compensate for the mixture that occurs when listening via speakers.\nDescriptions of stereophonic sound tend to stress the ability to localize the position of each instrument in space, but this would", "-27.725135421176674" ], [ "single person could.\" The native tongue on the recordings allowed Global Recordings Network to bring a source of comfort and trust for people who have been long separated from their homeland. They used the inherent appeal of the medium to gain converts. The film \"has presented disembodied audio as a religion unto itself.\"\nBecause of the low development in these places, devices had to be used that could work without the use of electricity. The devices they used to are referred to as \"Hand Crank\" and consisted of cardboard record players and hand cranked cassette players. They take apart pieces of", "-27.711382206820417" ], [ "band \"If you were in one of your difficult moods you could argue that there are lots of bands making that kind of noise particularly in the United States of America. And you'd say well, why are Aislers Set better than any of the others and I'd have to say, well I don't know they just sort of are...\"\nIn 2002 the band was invited by Belle and Sebastian for a week long tour of the East Coast, culminating in a show at New York City’s Hammerstein Ballroom in front of over 3,000 people. Stevie Jackson of Belle and Sebastian", "-27.680806624499382" ], [ "with a \"high, keening sound\". The Guardian described it as \"instrument-like\" and \"spectral\", and wrote that it \"transcends the egocentric posturing of the indie rock singer stereotype\". Yorke and Radiohead have often manipulated his voice with effects, transforming it into a \"disembodied instrument\". For example, on \"Everything in Its Right Place\", the band treated his vocals to create a \"glitching, stuttering collage\". Pitchfork wrote in 2016 that, over the decades, Yorke's voice had evolved from \"Semi-Interesting Alt-Rocker to Left-Field Art-Rock Demigod to Electronic Grand Wizard\".\nIn 2006, Yorke said: \"It annoys me how pretty my voice is. That sounds incredibly immodest,", "-27.67584549158346" ], [ "think it's just being true as human beings. You can be at both ends of the scale.\"\nMcDougall explained that there is \"a lot more cohesive [because] I know my voice a lot better. I'm excited because the songs have got a very pop structure but [they've] still got a lot of edge.\" The title track was originally three verses longer but the band edited the track down. This original version was more country-orientated and was inspired by \"Your Guardian Angel\" by The Red Jumpsuit Apparatus. It was edited down as the band expected the song to be released as a", "-27.67194580908381" ], [ "various other singers. Overall the feminine voice element of the band was later pulled back, with Valdes explaining in interview \"That was important until the public got used to the sound of our music. The singers are the visual element, but you really have to get people accustomed to your particular sound.\"", "-27.66975253948476" ], [ "had this confused place for so long, that 10 years later, we're still sort of making people scratch their heads going, 'Why am I still loving this band?'\" Wheeler added \"We're still a rock band. There's still guitars all over this thing. We just found a few different ways to use them, different ways to make guitars not sound like guitars. The songs were there, so we had to take the time to experiment and use all our time and energy in the studio just figuring out how to paint this picture.\"\nIn an interview with AbsolutePunk regarding the sound of", "-27.648124428029405" ], [ "programming. Therefore, in addition to the vocalists and Mylène on stage, there were also some backings, which included footage of voices. Perhaps it is this that has led criticism, because some people said that the sound was too great to emerge only from the stage.\" He confirmed then that Farmer had never sung in playback during this tour.\nThe basis idea of the stage set was \"the passage of time\". Boutonnat and Farmer wanted to create \"a little gothic atmosphere, mixing mysterious, deep and old things\", connected to the psychoanalysis. All should be \"both thoughtless and strong\". Finally, a cemetery was", "-27.645172398129944" ], [ "Acting Very Strange History Rutherford opted to do the lead vocals on the album himself, simply because, in his words, \"It does feel odd when someone does... a solo album and they don't sing, because the voice is so much the character of a song. So I thought, 'What the hell? I'm gonna give it a shot.'\" However, this proved to be easier said than done; he recounted that recording the backing tracks for the album was very easy and enjoyable, but that the vocals were \"hard work\".\nStewart Copeland became involved in the recording because he and Rutherford were on", "-27.626723847075482" ], [ "make me realise I'm just a total outcast. I just can't really talk to anyone without feeling stupid.\" and \"Sometimes I just want to run home and never come out of my bedroom again\".\nMultiple songs from Lonerism also feature ambient sounds recorded by Parker on his dictaphone, which Parker explained \"I obsessively record sounds wherever I am. Like, if I'm at a train station, I'll record the trains or a megaphone talking. I love ambient sounds. For me it's like taking photos. I love the idea of recording a collection or a library of weird sounds of stuff.\" An example", "-27.585165797616355" ], [ "a \"guide track\" for \"Evermore\" before he and Menken revisited the track to modify specific lines and notes. To make the actor sound more \"beast-like\", sound engineers digitally modified Stevens' voice, which Menken produced himself. Auto-Tune was used to make Stevens' voice sound lower and heavier. Menken continued making minor changes to the song well into production. On recording a new song, Stevens said, \"the pressure's sort of off — but it's also on — because it doesn't have to sound like it did before, but it should sound good enough to sit alongside the music that's already pretty great.\" Stevens agreed", "-27.575984884388163" ], [ "Cock E.S.P. History Although the group has dabbled in various musical styles and techniques over the years, the most recent has involved the showcasing and amplifying of mistakes and equipment failures. E.S.P. began to feel that such unintended sounds actually had a greater capacity for chaos and intensity than those sounds they actually wished to create. Thus, recent studio recordings were edited to isolate and emphasize these sounds, creating an intricate web of pure noise. \nThe group's live performance has evolved drastically over the years, starting out as a standard recital of the recorded music, and eventually ending up as", "-27.562609560438432" ], [ "sound Special attention is given to the individual sound of each instrument. Recording is done with the utmost fidelity and attention to sonic detail, and mixed so that all the instruments are heard and none are given undue priority. Their albums are also notable for the characteristically 'warm' and 'dry' production sound, and the sparing use of echo and reverberation. Backing vocals Becker and Fagen favored a distinctly soul-influenced style of backing vocals, which after the first few albums were almost always performed by a female chorus (although Michael McDonald features prominently on several tracks, including the 1975 song \"Black", "-27.562427349039353" ], [ "the time, \"It's one of those songs I thought I would hate playing because it’s tricky, but I've been really enjoying it. It feels very new\".\nOn 24 March 2016, the Who, performing in Washington DC played an unrehearsed version of \"Slip Kid\" (first time since May 2015) after Roger Daltrey announced that Pete Townshend would not be able to sing the planned \"Eminence Front\" due to a throat ailment. Daltrey explained, \"Pete can't sing with a voice like that - it'll just do more damage. So we'll have a go at something. We kinda rehearsed it the day before yesterday.", "-27.560239872473176" ], [ "should be able to tell the sound, whether it was made by man or beast or bird ... as a human voice echoes more than all others ... of course, on the Staked Plains we have not this advantage as there is nothing to create an echo.\"\nToday, most of the area's population is localized in the principal cities of Amarillo, Lubbock, Midland and Odessa, Texas. The vast majority of the area is rural, covered by large ranches and irrigated farms. Several small- to medium-sized towns do exist, however, including Andrews, Hereford, Plainview, Levelland, and Lamesa, Texas, and Clovis,", "-27.54415847855853" ], [ "general sounds of the audience. On several different tracks there are problems with noises and distortion from the microphone which are all acoustically similar to each other. All of this suggests that the master tapes for this album were recorded during one set of performances with the same recording set up, the same engineer, and the same troublesome microphone. It is not, like some of Pryor’s unauthorized albums on Laff Records, made up of sonically inconsistent tracks obviously recorded at different performances and different points during his career.\nTwo of the tracks on this album are taken from", "-27.528641281300224" ], [ "is memorable for its formal accomplishments, in particular, its emphatically artificial treatment of sound. As described by scholar Donald Crafton,\nLe Million never lets us forget that the acoustic component is as much a construction as the whitewashed sets. [It] replaced dialogue with actors singing and talking in rhyming couplets. Clair created teasing confusions between on- and off-screen sound. He also experimented with asynchronous audio tricks, as in the famous scene in which a chase after a coat is synched to the cheers of an invisible football (or rugby) crowd.\nThese and similar techniques became part of the vocabulary of the sound", "-27.517621404258534" ], [ "the first demo to send to the producers, Jim and Erren,\" he said. \"After they approved it, I hired singers because I wanted to make it better. I hired a guy to sing it who sounded pretty cool. He had like a rock‑and‑roll kind of voice, so it sounded pretty slick. Then as another option, I hired a girl to sing it to give it a bit more R&B kind of sound. Then I sent those versions to Jim and Erren, and they said, 'Why have you got them on it? We want your voice. It’s funnier.' I thought, 'My", "-27.517197826033225" ], [ "which electronics may affect the future of musical performance by altering the acoustical properties of the human voice (here soprano Sylvia McNair) and a symphony orchestra. It's not exactly an innovative concept -- Edgard Varèse did it all 45 years ago -- and Vocalise came off as a pretty crude piece of work, more a random collection of sound effects than music of substance.\"\nConversely, Jeff Simon of The Buffalo News called it \"a marvelous 21-minute\" work and opined, \"'I wanted to write a piece for electronics that was beautiful to hear.' And so it is.\"", "-27.479932963848114" ], [ "music. I understand that people liked it, but we personally, er, didn't.\" However, in a later interview with Churwell blog Dev explained \"The only reason I said that was to shut up the person I was talking to\" he laughs. \"People haven’t noticed that I meant the complete opposite. Everyone over-analysed us. Even when we said we weren’t gonna do it any more, people kept trying to analyse why. It became quickly apparent to me that talking to this man about his ‘calling’ was entirely misplaced.\"\nOn 26 April 2006 the band released Dig Your Own Grave, an EP meant as", "-27.460179098532535" ], [ "them catchy. He was a beautiful wordsmith. If you look at his lyrics, he obviously was processing his pain and depression, and all of those things. I think that's part of what people, myself included, responded to when he was singing. With the songwriting he had that voice, there's not too many people that have that many options with their voice. He could do a lot of different things with it, and have a lot of different characters in that voice. I feel so lucky that I got to be in a project with him, got to hang out with", "-27.441185708128614" ], [ "and worked with Anderson for several months on this before City of Evil was recorded.\n\"Ron taught me how to have that grit to my voice while still having the tone. He brought all of that to the table and he brought that technique to my voice. I’ve worked with him for about a year and a half now, but I worked with him for nine months before the record,\" said Shadows, \"I told him that I want my voice to sound different from everybody else, but I wanted those characteristics in my voice...It was one of those things that we", "-27.43914803939333" ], [ "transgender woman...via \"intense feelings of abandonment...expressed through intense soundscapes...and walls of distortion\", culminating in a wide expanse of styles and soundscapes. Metcalfe has said of the album's sound, \"I always associated sadness in music with sparseness, barrenness and quietness. I wanted to signify empty space musically. Hence why the harsh noise is few and far between, and I think a little more effective because of all the sparseness it contrasts with\". Comparing the two albums, Metcalfe has said \"Originally I was worried 'The Origin of My Depression' wasn't \"Uboa\" enough because of how restrained and sparse it is as", "-27.42019071347022" ], [ "That's what 'I Wonder Why' was about. We kind of invented this percussive rhythmic sound. If you listen to that song, everybody was doing something different. There's four guys, one guy was doing bass, I was singing lead, one guy's going 'ooh wah ooh,' and another guy's doing tenor. It was totally amazing. When I listen to it today, oftentimes I think, 'man, those kids are talented.'\"\nTheir initial hit was followed by \"No One Knows\" and \"Don't Pity Me\", which also charted the Billboard Top 100. This success won a place for Dion and the Belmonts on the ill-fated \"The", "-27.38039122603368" ], [ "end is what makes the words clear since there is nothing clearer than one voice; everything else is blurrier once it is added. A song that meets these criteria is \"Tracking Treasure Down\", which features one clear voice and the additional background vocals at a certain high end pulled down so high frequencies don't interfere with the lead voice. By taking away the high end it would become muddier, which is something Dave evaded; he took all high-end voices away, except for one, which peaks through and creates a definite position of all minor vocals. The layer comes from the", "-27.36576187807077" ], [ "our urban surroundings and all that happens within as our influence.\" Sam Loynes confirmed Benjamin's perspective, noting that \"The themes in Voices do not relate to any religious ideology. We are interested in trying to decipher the world that surrounds us. The music forms an impression of our misgivings relating to the distaste we have for this world. Yet, it is still a mystery to us.\" Live performances Voices describes its live performances as \"exhibitions.\" Peter Benjamin explained that \"it’s not really a gig, it’s a display of beauty and awfulness. It’s like art, we’re not just a band", "-27.353944283245255" ], [ "it a favorite for live musicians, as you can select up to three voices, combine these into a Preset (20 user presets in memory at a time, 40 built-in) to play from at any given time and save them in a custom-programmed setup (each sound in the PRESET allowed for Transpose, Output Routing, MIDI channel assignments, EFX routing/selection, etc.). Since each voice could be made of up to six individual sounds, the possibilities were very wide-ranging, such as using different key-ranges/splits for each of the six voices (although it significantly ate up polyphony). One particular feature that the VFX (and", "-27.333238115010317" ], [ "have a very small, low-powered PA system which is used mainly for vocals. Some small venues do not have monitor speakers, or they have only one, in front of the lead vocalist. Bass players who do not have a combo amp who are laying down tracks in the recording studio can plug into a DI unit (any professional recording studio will have one), which is connected to the audio console; the audio engineer can provide the bassist with the sound of their instrument through headphones.", "-27.332022528455127" ], [ "behind the mask of popular music. In Mr. Coleman's group a singer is supported by an electric bass, guitar, drums and electric keyboards, a shiny musical mix that has familiar rock and funk references; yet, because of all its rhythmic and metric manipulations, sounds new.\nAlthough the voice – typically treated as the focal point of any arrangement in which it is included – was not an obvious choice for M-Base's complex textures or harmonically elaborated melodies, Wilson wove herself into the fabric of these settings with wordless improv and lyrics. She can be heard on Coleman's debut as a leader", "-27.324532481550705" ], [ "the Voices\" was released as a single in 1999 to promote Music Bank and became a radio hit that same year. Regarding the two songs, Cantrell said that they came from a time when the band was still developing its sound.", "-27.321471351288892" ], [ "His trademark sound with the band, as noted in 1983, has been a characteristic scream, as heard at the end of \"Won't Get Fooled Again\".\nGroup backing vocals are prominent in the Who. After \"I Can't Explain\" used session men for backing vocals, Townshend and Entwistle resolved to do better themselves on subsequent releases, producing strong backing harmonies. Daltrey, Townshend and Entwistle sang lead on various songs, and occasionally Moon joined in. Who's Next featured Daltrey and Townshend sharing the lead vocals on several songs, and biographer Dave Marsh considers the contrast between Daltrey's strong, guttural tone and Townshend's higher and", "-27.31688987405505" ] ]
5pqhe5
Why is the French Revolution considered more important than the American one in world history when it came later and had many of the same themes?
[ "Mostly because the American one was about a part of a nation becoming independent with a new rulership and associated laws. The French one was about getting rid of monarchies, which changed power structures all over Europe, which, even Eurocentricism aside was a huge factor of influence on how the world is today. You can still see monarchies in place in countries where the revolution did not happen, so it also doesn't count as a \"would have happened anyway\" thing.", "Because the American Revolution was a limited rebellion against a limited monarchy in a far off colony. The French Revolution was an absolutist revolution against an absolute monarchy in the most powerful nation in Europe. It rocked the European monarchs to the core, and terrified them that these revolutions could occur in their backyards, hence why they acted quickly to suppress the revolution (and failed). Not to mention, it put the left-right dichotomy into place, introduced the concept of mass conscription (which would lead to the bloodbaths of the American Civil War and the World Wars) and inspired the revolutionary waves of the 19th and 20th centuries.", "The French Revolution was actually a revolution--the social order and government in France completely changed. The American Revolution isn't consistently considered a revolution by scholars, but rather a war of independence and separation from a colonial master. The government of Britain was not overthrown and social order did not change; America (simply) stopped being a part of Britain.", "Rebellion against a colonial power is nothing new. It was practically a national sport in Ireland for centuries before the US existed. Overthrowing a long standing monarchy, especially one as entrenched as France's, and replacing it with a democracy, that was something quite new.", "At the time of the American Revolution, the soon-to-be USA consisted of 13 colonies. Those 13 breakaway colonies did not even comprise the whole of the British interest in the New World - Newfoundland, Quebec and several more substantial colonies remained loyal to the British Crown. France, on the other hand, was an established global empire, with many far-flung political and economic interests. When some of their colonies revolted against British rule, it rattled the British. When the French revolted against monarchic rule, it rattled the wider world - with other nations and rulers considering their own position.", "In addition to what others have mentioned, the French Revolution led to the rise of Napoleon and what could arguably be called the first truly global war." ]
[ [ "French style, particularly that of Paris, has long been considered the height of sophistication by Americans of all social classes. Historical French support of the American Revolution was probably a significant factor in shaping American's feelings towards France. Prior to that, the French had been seen as rivals for control of North America until their decisive defeat in the French and Indian War. With the elimination of France as a major colonial power in North America, the rivalry between American colonists and British interests became primary, and France's role switched to that of a counter to British power.\nPro-French sentiment was", "-37.68331499793567" ], [ "foreign affairs from its founding and has been criticized throughout history for many of its actions, although in many of these examples it has also been praised. Revolutionary France After the American Revolution, the United States immediately began juggling its foreign policy between many different views under the George Washington cabinet. Most notably, the rivalry between Thomas Jefferson and Alexander Hamilton arose due to their opposing views on how the United States should align itself with Revolutionary France in its war against Great Britain in 1793. Jefferson and the Democratic-Republicans, who viewed the French revolution as similar to the previous", "-36.84854405227816" ], [ "voyage stated:\nFor more than two centuries, the United States and France have stood united in the freedom we owe to one another. From the battlefields where a revolution was won to the beaches where the liberation of a continent began, generations of our peoples have defended the ideals that guide us-overcoming the darkness of oppression and injustice with the light of liberty and equality, time and again.\nAs we pay tribute to the extraordinary efforts made by General Lafayette and the French people to advance the Revolutionary cause, we reflect on the partnership that has made France our Nation's oldest ally.", "-36.361775832017884" ], [ "agreement to the effect that the French Revolution was the watershed between the premodern and modern eras of Western history.\nHistorians widely regard the Revolution as one of the most important events in history. It marks the end of the early modern period, which started around 1500 and is often seen as marking the \"dawn of the modern era\". Within France itself, the Revolution permanently crippled the power of the aristocracy and drained the wealth of the Church, although the two institutions survived despite the damage they sustained. After the collapse of the First Empire in 1815, the French public lost", "-35.748957366566174" ], [ "Alexis de Tocqueville. The French Revolution was a failed attempt to copy the American model. Although America has changed in its social composition since 1787, Parsons maintained that it preserves the basic revolutionary Calvinist value pattern. That has been further revealed in the pluralist and highly individualized America, with its thick, network-oriented civil society, which is of crucial importance to its success and these factors have provided it with its historical lead in the process of industrialization.\nParsons maintained that this has continued to place it in the leading position in the world, but as a historical process and not in", "-35.51289045778685" ], [ "their belief in democracy and representative government. Not wanting to repeat the painful experiences following World War I, many Americans wanted to return to a postwar America that would be homogeneous and unified. Portrayals of the revolutionary period by historians reflected this cultural shift, and post-1945 historical writing emphasized the constructive nation-building done by thoughtful elites in the late 1780s and downplayed the fiery rhetoric of patriotic hotheads in the 1770s. That made the revolution seem not very \"revolutionary\" at all. Oliver M. Dickerson placed the blame for friction in the colonies not on the Navigation Acts, which he argued", "-34.19098398432834" ], [ "awaited the changing of the political climate to align to their own ideals before venturing back to France. Many felt the need to be cautious following the radical ideas and events that had characterized the Revolution thus far. Great Britain Many more stayed in Europe, in Great Britain, France's neighbour to the north. The country appealed to people because it had a channel separating them from the revolutionaries and because it was known for being tolerant. Additionally, England, more than America, allowed for the maintenance of the French way of life for the elites because \"the etiquette of European", "-34.117509634117596" ], [ "for future advances in broadly defined individual freedoms.\nOtto Dann and John Dinwiddy report, \"It has long been almost a truism of European history that the French Revolution gave a great stimulus to the growth of modern nationalism.\" Nationalism was emphasised by historian Carlton J.H. Hayes as a major result of the French Revolution across Europe. The impact on French nationalism was profound. For example, Napoleon became such a heroic symbol of the nation that the glory was easily picked up by his nephew, who was overwhelmingly elected president (and later became Emperor Napoleon III). The influence was great in the", "-34.05850939813536" ], [ "Causes of the French Revolution The revolutionary situation The essence of the revolutionary situation which existed in France in the 1780s was the bankruptcy of the king, and hence the state. This economic crisis was due to the rapidly increasing costs of government and to the overwhelming costs incurred by fighting two major wars: the Seven Years' War and the American Revolutionary War. These costs could not be met from the usual sources of state revenue. Since the 1770s, several attempts by different ministers to introduce financial stability had failed. The taxation system was burdensome upon the middle class and", "-33.89299983411183" ], [ "the Americans directly in addition to the money it spent fighting Britain on land and sea outside the U.S.\nFrance's status as a great modern power was re-affirmed by the war, but it was detrimental to the country's finances. Even though France's European territories were not affected, victory in a war against Great Britain with battles like the decisive siege of Yorktown in 1781 had a large financial cost which severely degraded fragile finances and increased the national debt. France gained little except that it weakened its main strategic enemy and gained a new, fast-growing ally that could become a welcome", "-33.772980592621025" ], [ "French Revolutionary and Napoleonic Wars, when the economies of Europe and the United States were recovering and aggressively seeking new markets to sell their products after more than two decades of disruption. Ultimately Spanish America could only connect to the world markets as an exporter of raw materials and a consumer of finished products. Society In addition to improving the economy, the lower social classes also had to be integrated into the new body politic, although they often got few rewards from independence. The political debate seeking answers to these questions was marked by a clash—at times on the battlefield—between", "-33.64933326203027" ], [ "tries to find solutions to help humans think again, since modern philosophy has not succeeded in helping humans to live correctly. On Revolution (1963) Arendt's book On Revolution presents a comparison of two of the main revolutions of the eighteenth century, the American and French Revolutions. She goes against a common impression of both Marxist and leftist views when she argues that France, while well-studied and often emulated, was a disaster and that the largely ignored American Revolution was a success. The turning point in the French Revolution occurred when the leaders rejected their goals of freedom in order to", "-33.61096331750741" ], [ "with the United Kingdom, including the ban on importing tea, perceived as destructive to the French national spirit. As the United Kingdom was the largest economy in the world in the nineteenth century, France deprived itself of its most important economic partner, one that could have supplied France with what it lacked and bought surplus French goods.\nSuch governmental policies and obliviousness to the real reasons of economic troubles were, according to Bastiat, the main causes of the French Revolution of the 1848 and the rise of socialists and anarchists in the years preceding the revolution itself. Events of February Because", "-33.48365669012128" ], [ "because Americans had little specie, and many of the rich merchants were supporters of the Crown. The French secretly supplied the Americans with money, gunpowder, and munitions in order to weaken Great Britain; the subsidies continued when France entered the war in 1778, and the French government and Paris bankers lent large sums to the American war effort. These loans were repaid in full in the 1790s. Creating a \"more perfect union\" and guaranteeing rights The war ended in 1783 and was followed by a period of prosperity. The national government was still operating under the Articles of Confederation and", "-33.48334397084545" ], [ "century, inspired by the liberal ideas of the French and American Revolutions after the demise of Napoléon's Empire (1804–15). In the decades following the outcomes of the Congress of Vienna, ideals of European unity flourished across the continent, especially in the writings of Wojciech Jastrzębowski, Giuseppe Mazzini or Theodore de Korwin Szymanowski. The term United States of Europe (French: États-Unis d'Europe) was used at that time by Victor Hugo during a speech at the International Peace Congress held in Paris in 1849:\nA day will come when all nations on our continent will form a European brotherhood ... A day will", "-33.39545885956613" ], [ "shifted as the United States, with its very rapid growth in wealth, industry and population, came to overshadow the old powers. Trade was at a low level, and mutual investments were uncommon.\nAll during this period the relationship remained friendly—as symbolized by the Statue of Liberty, presented in 1884 as a gift to the United States from the French people. From 1870 until 1918, France was the only major republic in Europe, which endeared it to the United States. Many French people held the United States in high esteem, as a land of opportunity and as a source of modern", "-33.04620835465175" ], [ "ideas. Few French people emigrated to the United States. Intellectuals, however, saw the United States as a land built on crass materialism, lacking in a significant culture, and boasting of its distrust of intellectuals. Very few self-styled French intellectuals were admirers.\nIn 1906, when Germany challenged French influence in Morocco (see Tangier Crisis and Agadir Crisis), President Theodore Roosevelt sided with the French. However, as the Americans grew mightily in economic power, and forged closer ties with Britain, the French increasingly talked about an Anglo-Saxon threat to their culture.\nStudent exchange became an important factor, especially Americans going to France to", "-33.036936767050065" ], [ "of Parliament over the Colonies.\" Legacy and influence: Colony to super-power The American Revolution had wide-reaching, long-lasting impact around the world — not the least of which were the U.S. impact on republicanism internationally, numerous unilateral declarations of independence, and its eventual emergence as the world's only super-power following the Second World War and the Cold War. Unparalleled in wealth and power, the United States has remained the world's only super-power since the fall of the Soviet Union — for nearly three decades.\nThe Revolutionary War entangled Great Britain in conflict with its rival empires of France and Spain; and also", "-32.76805084722582" ], [ "members, not agents sent by France to disrupt the political order. While this generation of individuals did not have the luxury of being very politically active, their presence in neighboring European countries and the United States caused a wrinkle in the fabric of society. These thousands of men, women, and children had survived a popular uprising and would never be able to forget their experiences in revolutionary France, the uncertainty, turmoil, and promise of liberty. America Tens of thousands of émigrés saw America as a compelling destination for multiple reasons. Those who craved peace and stability", "-32.74609953549225" ], [ "the American colonies enabled Britain to deal with the French Revolution with more unity and better organization than would otherwise have been the case. Britain turned towards Asia, the Pacific, and later Africa with subsequent exploration leading to the rise of the Second British Empire. Finance Britain's war against the Americans, the French, and the Spanish cost about £100 million, and the Treasury borrowed 40-percent of the money that it needed. Heavy spending brought France to the verge of bankruptcy and revolution, while the British had relatively little difficulty financing their war, keeping their suppliers and soldiers paid, and hiring", "-32.616238728078315" ], [ "by asking for the taxation of the property of nobles and clergy but was dismissed and exiled for his ideas. The French instability further weakened the reforms that were essential in the re-establishment of stable French finances. Trade also severely declined during the war, but was revived by 1783.\nThe war was especially important for the prestige and pride of France, who was reinstated in the role of European arbiter. However, Great Britain, not France, became the leading trading partner of the United States. The French took pride in their cultural influence on the young country through the Enlightenment, as attested", "-32.55064673812012" ], [ "group wanted revolution, but revolution happened because of the other things that they did want. Much had been made by previous historians of an assumed \"revolutionary spirit\" abroad in France that had been generated by the likes of Voltaire and Rousseau. Thomson argued that a connection between their ideas and the revolution was remote and indirect. They did not preach revolution and were happy to be patronised by any aristocrat so willing. It was later that their ideas and doctrines were used to justify revolutionary events. Instead, Thomson argued, what mattered in 1789 was a \"revolutionary situation\" that turned people", "-32.35179580858676" ], [ "dispute lies in the fact that the American economy was highly diverse; there was no standard form of currency, and records were not consistently kept.\nBy the declaration of the American Revolution, with George Washington as its military leader, a number of dietary changes had already occurred in America. Coffee was quickly becoming the normal hot drink of the colonies and a taste for whiskey had been acquired among many of those who could produce it. In fact, in 1774, the first corn was grown in Kentucky specifically for production of American Bourbon whiskey. This step may have established this American", "-32.330521791940555" ], [ "90% of the people in farming, and only 10% in cities, the American economy proved resilient and able to support a sustained war, which lasted from 1775 to 1783.\nThe American Revolution (1775–1783) brought a dedication to unalienable rights to \"life, liberty, and the pursuit of happiness\", which emphasize individual liberty and economic entrepreneurship, and simultaneously a commitment to the political values of liberalism and republicanism, which emphasize natural rights, equality under the law for all citizens, civic virtue and duty, and promotion of the general welfare.\nBritain's war against the Americans, French and Spanish cost about £100 million. The Treasury borrowed 40%", "-32.26019910443574" ], [ "and provided small workshops, mines, and other new industries with loans for working capital. Some scholars point out that without these banks, the Industrial Revolution would have likely been strangled by lack of capital before it could have begun. French Revolution and Napoleonic Wars Europe remained embroiled in the far-reaching French Revolution and Napoleonic Wars from 1789 to 1815. By early 1793, Britain became involved. Though the countries did form an uneasy treaty in the Peace of Amiens in 1802, hostilities would resume again when Napoleon regained power in 1803. Great Britain would remain involved until the British victory at", "-32.187813768396154" ], [ "the destruction of \"all order and rank in society and government.\" American neutrality Although the president, who believed that the United States was too weak and unstable to fight another war with a major European power, wished to avoid any and all foreign entanglements, a sizable portion of the American public was ready to help the French and their fight for \"liberty, equality, and fraternity.\" In the days immediately following Washington's second inauguration, the revolutionary government of France sent diplomat Edmond-Charles Genêt, called \"Citizen Genêt,\" to America. Genêt's mission was to drum up support for the French cause. Genêt issued", "-32.11951741040684" ], [ "France and the U.S. experienced its industrial revolution in the early 19th century; Germany in the 19th century; and to Russia in the early-mid 20th century.\nIn Britain, the Industrial Revolution was a period of economic transformation from the 1750s to the 1830s, characterized by the growth of a new system comprising factories, railroads, coal mining and business enterprises using new technologies that it sponsored. The new system operated first on textiles, then spread to other sectors and by the mid 19th century totally transformed the British economy and society, setting up sustained growth; it spread to parts of", "-32.117291518487036" ], [ "economic growth, many experienced economic anxiety, and Congress received much of the blame for failing to foster a stronger economy. Foreign affairs In the decade after the end of the Revolutionary War, the United States benefited from a long period of peace in Europe, as no country posed a direct threat and immediate threat to the United States. Nevertheless, the weakness of the central government, and the desire of localists to keep the national government from assuming powers held by the state governments, greatly hindered diplomacy. In 1776, the Continental Congress had drafted the Model Treaty, which served as a", "-32.10725286509842" ], [ "conformists, materialists, racists, violent, and vulgar. The French were individualists, idealists, tolerant, and civilized. Americans adored wealth; the French worshiped la douceur de vivre. This caricature of America, which was already broadly endorsed at the beginning of the century, served to essentialize French national identity. At the end of the twentieth century, the French strategy [was to use] America as a foil, as a way of defining themselves as well as everything from their social policies to their notion of what constituted culture.\nOn the other hand, Kuisel identifies several strong pull effects:\nAmerican products often carried a representational or symbolic quality.", "-32.10535083571449" ], [ "was essentially good but was corrupted by the influence of society. This may be linked with the sentiments spreading through Europe just prior to the French Revolution.", "-31.948161080945283" ], [ "parts of the global trade by plantation islands. The Naval Warfare, on the other hand, was controversial. This period of 1800, was the beginning of a new revolutionary world from the The American Revolution to the The French Revolution. These revolutions had an impact on the European political, cultural and scientific revolution. The political revolutions resulted in the intellectual and the cultural uprise in Europe which gave this period the name \"Enlightenment\". Due to the Enlightenment thinking and scientific revolution in Europe, the western economy was able to develop faster than the rest of the world. Therefore, the consequences of", "-31.87349922696012" ], [ "and documentation of the influx of immigrants in neighboring countries. Still, most nations such as Britain remained magnanimous and welcomed the French. Nationalism Otto Dann and John Dinwiddy report, \"It has long been almost a truism of European history that the French Revolution gave a great \nstimulus to the growth of modern nationalism.\" Nationalism was emphasized by historian Carlton J.H. Hayes as a major result of the French Revolution across Europe. The impact on French nationalism was profound. Napoleon became such a heroic symbol of the nation that the glory was easily picked up by his nephew, who", "-31.6923378262436" ], [ "of influence, Africa and the Middle East.\nThe two nations differed over the waging of the Vietnam War, in part because French leaders were convinced that the United States could not win. The recent French experience with the Algerian War of Independence was that it was impossible, in the long run, for a democracy to impose by force a government over a foreign population without considerable manpower and probably the use of unacceptable methods such as torture. The French popular view of the United States worsened at the same period, as it came to be seen as an imperialist power. 1970–1989", "-31.600003358151298" ], [ "Labor Party of the United States Background The aftermath of the First World War had the effect of producing, throughout the world, the greatest revolutionary wave seen since the Revolutions of 1848. Regimes which had defined their time before the war were abruptly overthrown in Russia, Germany, Austria, Hungary and Turkey. Revolutionary nationalism spread throughout nations, such as the Poles, Finns and Irish, which had been subject to centuries of domination by the great powers. Even the greatest empire on the face of the planet was unable to escape the socioeconomic effects of the War and its aftermath, as the", "-31.553442678414285" ], [ "American nationalism History The United States traces its origins to the Thirteen Colonies founded by Britain in the 17th and early 18th century. Residents identified with Britain until the mid-18th century when the first sense of being \"American\" emerged. The Albany Plan proposed a union between the colonies in 1754. Although unsuccessful, it served as a reference for future discussions of independence.\nSoon afterward, the colonies faced several common grievances over acts passed by the British Parliament, including taxation without representation. Americans were in general agreement that only their own colonial legislatures—and not Parliament in London—could pass taxes. Parliament vigorously", "-31.54632837662939" ], [ "\"revolutionary change\" in public attitude toward US participation in WWI:\nIn November 1916, the slogan of Wilson's supporters, 'He Kept Us Out Of War,' played an important part in winning the election. At that time a large part of the country was apathetic.... Yet, within a very short period after America had joined the belligerents, the nation appeared to be enthusiastically and overwhelmingly convinced of the justice of the cause of the Allies, and unanimously determined to help them win. The revolutionary change is only partly explainable by a sudden explosion of latent anti-German sentiment detonated by the declaration of war.", "-31.520069478894584" ], [ "Economy of the United States Colonial era and 18th century The economic history of the United States began with American settlements in the 17th and 18th centuries. The American colonies went from marginally successful colonial economies to a small, independent farming economy that used slave labor, which in 1776 became the United States of America. 19th century In 180 years, the U.S. grew to a huge, integrated, industrialized economy that made up around one-fifth of the world economy. As a result, the U.S. GDP per capita converged on and eventually surpassed that of the UK, as well as other nations", "-31.469475473539205" ], [ "cooking, that opinion, at least in a small part, began to change with the American alliance with the French. In the first American publication of Hannah Glasse's Art of Cookery Made Easy, insults aimed at French dishes disappeared. A number of Bostonians even attempted to cook French cuisine for their French allies, sometimes with comedic results when entire frogs were put into soups rather than just their legs. Nonetheless, the alliance supported a friendship with France that later resulted in a large migration of French cooks and chefs to America during the French Revolution.\nThe American diet was changed through this", "-31.429889888702746" ], [ "Great Britain as a greater threat than France. Several states, most particularly France, entered the American War of Independence in the hope of overturning Britain's growing strength by securing the independence of the Thirteen colonies of British America. 19th century After the end of the Napoleonic Wars, during which France directly or indirectly controlled much of Europe except for Russia, and the Holy Roman Empire was dissolved, the Concert of Europe tried to maintain the balance of power. The territorial boundaries agreed to by the victorious Great Powers (Prussia, Austria, Russia and Great Britain) at the Congress of Vienna in", "-31.384074632951524" ], [ "the French Revolution. This usage passed to Latin America and animated the independence movement against Spain. In the nineteenth century \"Liberalism\" was the dominant element in Latin American political thought. French liberal ideas were especially influential in Mexico, particularly as seen through the writings of Alexis de Tocqueville, Benjamin Constant and Édouard René de Laboulaye. The Latin American political culture oscillated between two opposite poles: the traditional, as based on highly specific personal and family ties to kin groups, communities, and religious identity; and the modern, based on impersonal ideals of individualism, equality, legal rights, and secularism or anti-clericalism. The", "-31.330762348719873" ], [ "the French Revolution to that event, much as he had previously defended the American Revolution, despite living in the country at war against it.\nHe starts out by establishing that he believes in patriotism, love of one's own country. Because the revolution was overthrowing the French rulers, which was seen as a dangerous example by the English political class, this was an important distinction. But Price says that one's country is not necessarily its rulers, nor even its geography, but is the principles and people that are identified with it, that love for country is a love for one's community and", "-31.330662365362514" ], [ "beginning of the 20th century is often termed the Belle Époque. Although associated with cultural innovations and popular amusements (cabaret, cancan, the cinema, new art forms such as Impressionism and Art Nouveau), France was nevertheless a nation divided internally on notions of religion, class, regionalisms and money, and on the international front France came sometimes to the brink of war with the other imperial powers, including Great Britain (the Fashoda Incident). Yet in 1905-1914 the French repeatedly elected left-wing, pacifist parliaments, and French diplomacy took care to settle matters peacefully. France was caught unprepared by the German declaration of", "-31.183220032369718" ], [ "Great Recoinage of 1816 Background The French Revolutionary Wars (1792-1802) and the Napoleonic Wars (1803-1815) led to financial instability in Britain. This was due to direct military and economic warfare against France as well as Britain's financing of a series of coalitions opposed to the French Revolutionary and Napoleonic regimes. In exchange for large cash subsidies from Britain, nations such as Austria, Prussia and Russia, with armies larger than Britain's, were paid to fight against France. The economic conflicts of that era (such as Napoleon's Continental System and Britain's retaliatory measures against it) especially disrupted trade and the availability of", "-31.1790150586894" ], [ "general belief that federal government economic policy was fundamentally flawed. Americans, many for the first time, became politically engaged so as to defend their local economic interests.\nThe New Republicans and their American System—tariff protection, internal improvements, and the BUS—were exposed to sharp criticism, eliciting a vigorous defense. Post-war European readjustments and the American economy: 1815–1818 The United States and the United Kingdom signed the Treaty of Ghent on December 24, 1814, ending the War of 1812. The British government effectively relinquished its mercantilist policies towards the United States, preparing the way for the development of free trade and the opening", "-31.124019175418653" ], [ "rising spirit of rebellion led to a ‘revolutionary crisis’, 1789-1820. The French revolution was followed by the Napoleonic wars and Latin American wars of independence.\nStability was regained in the ‘Victorian equilibrium’, 1820-96. Consumer prices fell in England (sic). There were revolutions in transportation, agriculture, industry and commerce But by the end of this era, young Englishmen were ‘bankrupt, bored and bloody-minded… the dark clouds began to gather.’ Fourth wave Fischer identifies a further ‘price revolution’ in the 20th century, by which time there were no new lands left to explore or colonise. The German hyperinflation of 1923 and the", "-31.11941029666923" ], [ "political issues raised by the French Revolution. Price drew a bold parallel between the Glorious Revolution of 1688 (the one celebrated by the London Revolution Society dinner) and the French Revolution of 1789, arguing that the former had spread enlightened ideas and paved the way for the second one. Price exhorted the public to divest themselves of national prejudices and embrace \"universal benevolence\", a concept of cosmopolitanism that entailed support for the French Revolution and the progress of \"enlightened\" ideas. It has been called \"one of the great political debates in British history\". At the dinner of the London Revolution", "-31.031701295869425" ], [ "many parts of the world; so much so that Thomas Jefferson is famously quoted as saying \"Every man has two countries, his own and France.\" The very term \"culture\" comes from France. In 2017, France had the third largest diplomatic network in the world.\nFrance was a focal point of the Age of Enlightenment; its attachment to the ideals of liberty, equality, tolerance and reason was notably embodied in the writing and publishing of the Encyclopédie. The French Revolution was one of the most significant events in European and world history. France has since then been instrumental in spreading Republican ideals.", "-31.00582601467613" ], [ "European theater. Ultimately, the United States' proposals and actions did not stop the factors of European nationalism spawned by the previous war, the repercussions of Germany's defeat, and the failures of the Treaty of Versailles from plunging the globe into a Second World War.\nBetween World War I and World War II, America also sought to continue to preserve Pax America as a corollary to the Monroe Doctrine. Some sought the peaceful and orderly evolution of existing conditions in the western hemisphere and nothing by immediate changes. Before 1917, the position of the United States government and the feelings of", "-30.997713478049263" ], [ "explain the American government's position, nor to criticize that of France. Instead, he suggested ways in which France could improve relations with the United States, to the benefit of both countries. He also told Merlin that pro-British propagandists in the United States were portraying the French as corrupt and anxious for war, and were stating that any friend of French principles necessarily was an enemy of the United States. Within days of Logan's last meeting, the French took steps to relieve the tensions between the two nations; they lifted the trade embargo then in place, and released American seamen held", "-30.903135155676864" ], [ "the American Revolution (1776), the intellectual and political leaders of the colonies studied history intently, looking for models of good government. They especially followed the development of republican ideas in England. Pocock explained the intellectual sources in America:\nThe Whig canon and the neo-Harringtonians, John Milton, James Harrington and Sidney, Trenchard, Gordon and Bolingbroke, together with the Greek, Roman, and Renaissance masters of the tradition as far as Montesquieu, formed the authoritative literature of this culture; and its values and concepts were those with which we have grown familiar: a civic and patriot ideal in which the personality was founded in", "-30.829968741862103" ], [ "in the United Kingdom, then subsequently spreading throughout Europe, North America, and eventually the world. The onset of the Industrial Revolution marked a major turning point in human history; almost every aspect of daily life was eventually influenced in some way.\nIn Europe wild capitalism started to replace the system of mercantilism (today: protectionism) and led to economic growth. The period today is called industrial revolution because the system of Production, production and division of labor enabled the mass production of goods. Recognition of the concept of “the economy” The contemporary concept of \"the economy\" wasn't popularly known until the American", "-30.795615941635333" ], [ "in France, were deeply uncomfortable with the notion that multiple ruptures and discontinuities created history. They preferred to stress slow change and the longue durée. They paid special attention to geography, climate, and demography as long-term factors. They considered the continuities of the deepest structures were central to history, beside which upheavals in institutions or the superstructure of social life were of little significance, for history lies beyond the reach of conscious actors, especially the will of revolutionaries.\nNoting the political upheavals in Europe and especially in France in 1968, Eric Hobsbawm argued that \"in France the virtual hegemony of Braudelian", "-30.795386949554086" ], [ "genuine threat existed.\nEvents during and after the Revolution related to the treaty of alliance with France, as well as difficulties arising over the neutrality policy pursued during the French revolutionary wars and the Napoleonic wars, encouraged another perspective. A desire for separateness and unilateral freedom of action merged with national pride and a sense of continental safety to foster the policy of isolation. Although the United States maintained diplomatic relations and economic contacts abroad, it sought to restrict these as narrowly as possible in order to retain its independence. The Department of State continually rejected proposals for joint cooperation, a", "-30.788993254784145" ], [ "from old to new world, the success of the American enterprise after the American Revolution is a good example of the role of institutional and legal frameworks for facilitating a continued flow of capital. The American Constitution’s commitment to private property rights, rights of personal liberty; and strong contract law enabled investment from Britain to America to continue even without the incentives of the colonial relationship. In these ways, early American economic development, both pre and post-revolution, provides a case study for the conditions under which the Lucas Paradox is reversed. Even after the average", "-30.764208455744665" ], [ "needs than to economic growth.\nHistorians are reluctant to use the term \"Industrial Revolution\" for France because the slow pace seems an exaggeration for France as a whole. The Industrial Revolution was well underway in Britain when the Napoleonic wars ended, and soon spread to Belgium and, to a lesser extent to northeastern France. The remainder remained little changed. The growth regions developed industry, based largely on textiles, as well as some mining. The pace of industrialization was far below Britain, Germany, the United States and Japan. The persecution of the Protestant Huguenots after 1685 led to", "-30.761886274907738" ], [ "money because Americans had little specie, and many of the rich merchants were supporters of the Crown. Starting in 1776, the French secretly supplied the Americans with money, gunpowder and munitions in order to weaken its arch enemy, Great Britain. When France officially entered the war in 1778, the subsidies continued, and the French government, as well as bankers in Paris and Amsterdam loaned large sums to the American war effort. These loans were repaid in full in the 1790s.\nBeginning in 1777, Congress repeatedly asked the states to provide money. But the states had no system of taxation either, and", "-30.737635430064984" ], [ "of criticisms usually originating from historians principally interested in the French Revolution rather than the French Enlightenment. David Garrioch points out that religious history, visual sources, and any discussion of revolutionary Paris (all three being of important consequence to the history of the Enlightenment although the focus on the latter tends to teleologically frame 1789 as the terminus ad quem of the 18th century) are all largely absent from Roche’s writings. The history of consumerism in early modern France is also a problematic approach to the broader French Enlightennment because the materially poor of the cities and the bulk", "-30.565585454867687" ], [ "as the French were successful in transforming their society, so were the Haitians. On April 4, 1792, The French National Assembly granted freedom to slaves in Haiti and the revolution culminated in 1804; Haiti was an independent nation solely of freed peoples. The activities of the revolutions sparked change across the world. France's transformation was most influential in Europe, and Haiti's influence spanned across every location that continued to practice slavery. John E. Baur honors Haiti as home of the most influential Revolution in history.\nAs early as 1810, the term \"liberal\" was coined in Spanish politics to indicate supporters of", "-30.52342273609247" ], [ "Prelude By 1796, the end of George Washington's eighth year as president of the United States, the United States' strategic position was dire. Interstate rivalries, violent insurrections (such as the Whiskey Rebellion), and solidifying opposition to the national government in the form of the Anti-Federalist Party combined with its dependence on trade with Europe to weaken the new nation. During this time, the country's increasingly-brittle government was held together almost entirely by Washington's charismatic authority.\nReceiving counsel from Alexander Hamilton, who cautioned the president that \"we forget how little we can annoy\", Washington became convinced that the United States could not", "-30.48835130641237" ], [ "Revolution, the increasing trade with France caused many industrial loanwords from French.", "-30.469591432716697" ], [ "that one of the Americans' great advantages in the negotiations is that their history is not budrened with the major anti-Semitism that has manifested itself for such a long time in Europe.\"", "-30.404427174304146" ], [ "ally of Britain) resumed, so the causes of the war had been cleared away. Especially after the great American victory at the Battle of New Orleans, Americans felt proud and triumphant for having won their \"second war of independence.\" Successful generals Andrew Jackson and William Henry Harrison became political heroes as well. After 1815 tensions de-escalated along the U.S.-Canada border, with peaceful trade and generally good relations. Boundary disputes were settled amicably. Both the U.S. and Canada saw a surge in nationalism and national pride after 1815, with the U.S. moving toward greater democracy and the British postponing democracy in", "-30.28327888798958" ], [ "to organization, command and control, logistics and in general non-material improvements. The revolutionary nature of these changes was only visible after a long evolution that handed Europe a predominant place in warfare, a place that the industrial revolution would confirm.\nThe concept of a military revolution in the sixteenth and seventeenth centuries has received a mixed reception among historians. Noted military historians Michael Duffy and Jeremy Black have strongly criticised it as misleading, exaggerated and simplistic. Industrial warfare As weapons—particularly small arms—became easier to use, countries began to abandon a complete reliance on professional soldiers in favor of conscription. Technological advances", "-30.196661473601125" ], [ "national income, but the private sector benefited from the increase in economic growth. The demand for war supplies stimulated the industrial sector, particularly naval supplies, munitions and textiles, which gave Britain an advantage in international trade during the postwar years.\nThe French Revolution polarised British political opinion in the 1790s, with conservatives outraged at the killing of the king, the expulsion of the nobles, and the Reign of Terror. Britain was at war against France almost continuously from 1793 until the final defeat of Napoleon in 1815. Conservatives castigated every radical opinion in Britain as \"Jacobin\" (in reference to the leaders", "-30.191078202915378" ], [ "return to the taxpayer. In other words, formal empire afforded no great economic benefit when trade would continue whether the overseas political entities were nominally sovereign or not. The American Revolution helped demonstrate this by showing that Britain could still control trade with the colonies without having to pay for their defence and governance. Capitalism encouraged the British to grant their colonies self-government, starting with Canada, which became unified and largely independent in 1867, and Australia, which followed suit in 1901. Napoleonic wars Critical to British success in confronting Napoleon was its superior economic situation. It was able to mobilize", "-30.18706254166318" ], [ "He then develops the idea that the United States is different from other countries in that other nations develop their purpose after they come into existence but in the case of the United States its purpose actually preceded its existence:\n\"France became aware of the national purpose and developed a philosophy of it only after it had been achieved, [...] The rule that action precedes reflection in the discovery of the national purpose suffers but one complete exception. The United States is the only nation that has reversed the sequence by reflecting upon its purpose before it had come into existence.", "-30.134235794423148" ], [ "1776 to 1783. The peace in 1783 left France financially prostrate, while the British economy boomed due to the return of American business. That crisis ended in 1784 as a result of the King's shrewdness in outwitting Fox and renewed confidence in the system engendered by the leadership of Pitt. Historians conclude that the loss of the American colonies enabled Britain to deal with the French Revolution with more unity and organisation than would otherwise have been the case. India His administration secure, Pitt could begin to enact his agenda. His first major piece of legislation as Prime Minister", "-30.09166756796185" ], [ "idea of American exceptionalism. This view holds that the U.S. occupies a special niche among developed nations in terms of its national credo, historical evolution, political and religious institutions, and unique origins. The concept originates from Alexis de Tocqueville, who asserted that the then-50-year-old United States held a special place among nations because it was a country of immigrants and the first modern democracy. From the establishment of the United States after the American Revolution until the Spanish–American War, the foreign policy of the United States had a regional, instead of global, focus. The Pax Americana, which the Union enforced", "-30.080595110484865" ], [ "with the franc as the new currency.\nNapoleon after 1799 paid for his expensive wars by multiple means, starting with the modernisation of the rickety financial system. He conscripted soldiers at low wages, raised taxes, placed large-scale loans, sold lands formerly owned by the Catholic Church, sold Louisiana to the United States, plundered conquered areas and seized food supplies, and levied requisitions on countries he controlled, such as Italy. Long-term impact The French Revolution had a major impact on Europe and the New World, decisively changing the course of human history. It brought an end to feudalism and made a path", "-29.942240949021652" ], [ "from France that it might resume the war, and the weak financial condition of the government. He did not need to tell Castlereagh that the war was very unpopular; Britons wanted peace and a return to normal trade. The war with America had ruined many reputations and promised no gain.\nAfter months of negotiations, against the background of changing military victories, defeats, and losses, the parties finally realized that their nations wanted peace and that there was no real reason to continue the war. Each side was tired of the war: export trade was all but paralyzed, and after the fall", "-29.876524664578028" ], [ "to be a problem during the War of 1812, after which the government increased production of early roads, extensive canals along navigable waterways, and later elaborate railroad networks.\nFollowing the War of 1812, the American economy was altered from an economy dependent on imports from Europe to one that evolved greater internal production and commerce. In 1817 James Monroe replaced James Madison as president of the U.S. The Democratic-Republicans continued policies begun in Jefferson's administration. With a new generation of leaders, the Democratic-Republican Party came to embrace the principles of government activism and the development of large-scale domestic manufacturing. Despite all", "-29.84658534452319" ], [ "Terminology The period of American history between the end of the American Revolutionary War and the ratification of the Constitution has also been referred to as the \"critical period\" of American history. During the 1780s, many thought that the country was experiencing a crisis of leadership, as reflected by John Quincy Adams's statement in 1787 that the country was in the midst of a \"critical period\". In his 1857 book, The Diplomatic History of the Administrations of Washington and Adams, William Henry Trescot became the first historians to apply the phrase \"America's Critical Period\" to the era in American history", "-29.844252002047142" ], [ "in relations which radical ideas might foment through further rebellion and raids (this was a greater worry to the British than the Americans). An unprecedented level of cooperation occurred in diplomatic and military circles. In the United States, in addition to dialogue, the administration of Martin Van Buren used its military forces and local authorities in the enforcement of a new Neutrality Act, encouraged the prosecution of filibusters, and actively deterred American citizens from subversive activities abroad. Thus the Patriot War contributed to the construction of more recent Anglo-American and Canada-U.S. relations; it also led, more immediately, to a backlash", "-29.8106771129751" ], [ "Century can the world \"come to life in any nobility of health and vigor\".\nAccording to David Harvey, Luce believed \"the power conferred was global and universal rather than territorially specific, so Luce preferred to talk of an American century rather than an empire\". In the same article he called upon United States \"to exert upon the world the full impact of our influence, for such purposes as we see fit and by such means as we see fit\". Early characteristics Beginning at the end of the 19th century, with the Spanish–American War in 1898 and the Boxer Rebellion, the", "-29.750581807806157" ], [ "French-American Foundation History The idea was born in 1973 between Ambassador James G. Lowenstein, James Chace, editor-in-chief of Foreign Affairs, both members of the Council on Foreign Relations, an independent think tank, and Nicholas Wahl, a specialist of post-war France at Princeton University. In order to counter an anti-French sentiment within the State Department, the Senate Committee on Foreign Relations and the press, as well as anti-Americanism among the French elite, the three men grew the desire to create a structure dedicated to friendship between the U.S.A. and its oldest ally, and outside government control, unlike the existing exchange programs", "-29.745224409503862" ], [ "Financial costs of the American Revolutionary War The American Revolutionary War inflicted great financial costs on all of the combatants, including the United States of America, France, Spain and Great Britain. France and Great Britain spent 1.3 billion livres and 250 million pounds, respectively. The United States spent $400 million in wages for its troops. Spain increased its military spending from 454 million reales in 1778 to over 700 million reales in 1779. Initial boycotts The economic warfare between Great Britain and the colonists began well before the colonies declared their independence in 1776. Regulations from the crown were met", "-29.744965793128358" ], [ "American Century Origin of the phrase The term was coined by Time publisher Henry Luce to describe what he thought the role of the United States would be and should be during the 20th century. Luce, the son of a missionary, in a February 17, 1941 Life magazine editorial urged the United States to forsake isolationism for a missionary's role, acting as the world's Good Samaritan and spreading democracy. He called upon the US to enter World War II to defend democratic values:\nThroughout the 17th century and the 18th century and the 19th century, this continent teemed with manifold projects", "-29.735505733289756" ], [ "deferring to the court transformed itself into the demand that the public also have a say on political questions as well.\nThe economy in the Ancien Régime during the years preceding the Revolution suffered from instability. The sequence of events leading to the Revolution included the national government's fiscal troubles caused by an unjust, inefficient and deeply hated tax system – the ferme générale – and by expenditure on numerous large wars. The attempt to challenge British naval and commercial power in the Seven Years' War was a costly disaster, with the loss of France's colonial possessions in continental North America", "-29.719974416366313" ], [ "these people are \"apt to feel after a while a certain restlessness and dissatisfaction. Their knowledge is extended, their imagination stimulated; new desires are aroused\". Democracy In the late 18th century, the successful American Revolution may have provided a demonstration effect that sparked the subsequent French Revolution. Political movements may be given a boost from the observed success of similar movements in other countries. The domino effect thesis relates to this idea; it argued that communist revolutions in some countries would spread to other countries.", "-29.68279370163509" ], [ "20th century Overview The century had the first global-scale total wars between world powers across continents and oceans in World War I and World War II. Nationalism became a major political issue in the world in the 20th century, acknowledged in international law along with the right of nations to self-determination, official decolonization in the mid-century, and related regional conflicts.\nThe century saw a major shift in the way that many people lived, with changes in politics, ideology, economics, society, culture, science, technology, and medicine. The 20th century may have seen more technological and scientific progress than all the other centuries", "-29.675603251205757" ], [ "revolution bequeathed to the nation \"a ruling class of landowners.\"\nIn the cities, entrepreneurship on a small scale flourished, as restrictive monopolies, privileges, barriers, rules, taxes and guilds gave way. However, the British blockade virtually ended overseas and colonial trade, hurting the port cities and their supply chains. Overall, the Revolution did not greatly change the French business system, and probably helped freeze in place the horizons of the small business owner. The typical businessman owned a small store, mill or shop, with family help and a few paid employees; large-scale industry was less common than in other industrialising nations.\nA 2017", "-29.670887788175605" ], [ "of revolutionary, anti-monarchical sentiment in the country that contributed to the Revolution 10 years later.", "-29.65546638693195" ], [ "strong ties with capitalist Western Europe, Latin America, British Commonwealth, and several East Asian countries (Korea, Taiwan, Japan). It allied itself with both right-wing dictatorships and capitalist democracies.\nThe American Century includes the political influence of the United States but also its economic influence. Many states around the world would, over the course of the 20th century, adopt the economic policies of the Washington Consensus, sometimes against the wishes of their populations. The economic force of the US was powerful at the end of the century due to it being by far the largest economy in the world. The US had", "-29.653934938745806" ], [ "academic critics looking from point of view of the 1776 or 1789 America as \"idolatrous, and also curiously at odds with the values of the Revolution.\" It was suspicious of religious iconographic practices. At the beginning, in 1776, it was not meant to be that at all.\nOn the 1782 Great Seal of the United States, the date of the Declaration of Independence and the words under it signify the beginning of the \"new American Era\" on earth. Though the inscription, Novus ordo seclorum, does not translate from the Latin as \"secular\", it also does not refer to a new order", "-29.6393448242452" ], [ "in the process leading to the Glorious Revolution of 1688. It was the radical fling of the Puritan Revolution that provided settlers in early 17th-century Colonial America, and the Puritans who settled in America represented radical views on individuality, egalitarianism, skepticism to state power, and the zeal of the religious calling. The settlers established something unique in the world that was under the religious zeal of Calvinist values.\nTherefore, a new kind of nation was born, the character of which became clear by the time of the American Revolution and in the US constitution, and its dynamics were later studied by", "-29.638498806671123" ], [ "win the war against France. For the first time, the continent became one of the main theaters of what could be termed a \"world war\". During the war, the position of the British colonies as part of the British Empire was made truly apparent, as British military and civilian officials took on an increased presence in the lives of Americans.\nThe war also increased a sense of American unity in other ways. It caused men to travel across the continent who might otherwise have never left their own colony, fighting alongside men from decidedly different backgrounds who were nonetheless still \"American\".", "-29.632124955765903" ], [ "to power in 1788.\nIn these last decades of the century, French industries continued to develop. Mechanization was introduced, factories were created, and monopolies became more common. However, this growth was complicated by competition from England in the textiles and cotton industries. On the other hand, French commercial ventures continued to expand, both domestically and internationally. The American War of Independence had led to a reduction of trade (cotton and slaves), but by the 1780s American trade was stronger than before. Similarly, the Antilles represented the major source for European sugar and coffee, and it was a huge importer of slaves", "-29.628511885166517" ], [ "public, except for the Communists, generally had a good opinion of the United States throughout the 1950s and into the 1960s. Despite some cultural friction, the United States was seen as a benevolent giant, the land of modernity, and French youth took a taste to American culture such as chewing gum, Coca-Cola, and rock and roll. De Gaulle In the 1950s France sought American help in developing nuclear weapons; Eisenhower rejected the overtures for four reasons. Before 1958, he was troubled by the political instability of the French Fourth Republic and worried that it might use nuclear weapons in its", "-29.608731995453127" ], [ "\"flatten out\" the complexity and nuances of the Revolutionary period, historians writing in the 1960s and 1970s rehabilitated, in one form or another, all of the previous \"schools of thought.\" Whiggish, economic, imperial, and conflict views came back with a new vitality, new evidence, and a new perspective, perhaps colored by the protest movements and crowd action of 1960s America.\nColonial elites in the 18th century knew that mobs frequently served the public welfare and understood that they played an integral role in protecting a free society. Local uprisings were better defined as extra-institutional, rather than anti-institutional. They were focused and", "-29.543599214754067" ], [ "anti-war sentiments were reflected in many western European countries, generally with the populace less sympathetic to the U.S. stance even when politicians in a given country (e.g. the UK and Spain) aligned themselves with the U.S. position. The general populations of France and Germany were opposed to the war and it would have been difficult for their governments had they failed to reflect those sentiments in policy. France's position in particular has been very much maligned within the U.S. After the first UN resolution, France advised the U.S. that it (the USA) had sufficient UN support", "-29.53032468748279" ], [ "influx of French goods, ideas, and books, which helped spread the ideas of the Enlightenment throughout the Spanish world. In a sense, all things French came into fashion during the subsequent century and gave rise to a new type of person, the afrancesado, who welcomed the new influence. In addition, during the War of Succession, the ports in Spanish America were blockaded by British and Dutch fleets. Spain turned to France for help with the export of its goods, which was the first time in Spanish colonial history that trade occurred with a foreign nation. The new commercial relationship stimulated", "-29.4903448803816" ], [ "war-torn revolution into the southwestern United States. Meanwhile, the United States increasingly replaced Britain as the major trade partner and financier throughout Latin America. The US adopted a \"Good Neighbor Policy\" in the 1930s, which meant friendly trade relations would continue regardless of political conditions or dictatorships. This policy responded to longstanding Latin American diplomatic pressure for a regional declaration of nonintervention, as well as the increasing resistance and cost of US occupations in Central America and the Caribbean. One effect of the two world wars was a reduction in European presence in Latin America and an increasing solidification of", "-29.48288768522616" ], [ "relatively low defense spending. High trade barriers encouraged the development of domestic manufacturing industries and the inflow of foreign technologies. American applied science During the 19th century, Britain, France, and Germany were at the forefront of new ideas in science and mathematics. But if the United States lagged behind in the formulation of theory, it excelled in using theory to solve problems: applied science. This tradition had been born of necessity. Because Americans lived so far from the well-springs of Western science and manufacturing, they often had to figure out their own ways of doing things. When Americans combined theoretical", "-29.46910908018799" ], [ "ideological formulas in The French Revolution provides a good account of the ways in which revolutionary cultures turn into repressive dogmatisms.\nEssentially a Romantic, Carlyle attempted to reconcile Romantic affirmations of feeling and freedom with respect for historical and political fact. Many believe that he was always more attracted to the idea of heroic struggle itself, than to any specific goal for which the struggle was being made. However, Carlyle's belief in the continued use to humanity of the Hero, or Great Man, is stated succinctly at the end of his essay on Muhammad (in On Heroes, Hero Worship & the", "-29.42913507419871" ], [ "World revolution After World War II A new upsurge of revolutionary feeling swept across Europe in the aftermath of World War II, though it was not as strong as the one triggered by World War I which resulted in failed (in the socialist sense) revolution in Germany and a successful one (for seventy years) in Russia. Communist parties in countries such as Greece, France, and Italy had acquired significant prestige and public support due to their activity as leaders of anti-fascist resistance movements during the war; as such, they also enjoyed considerable success at the polls and regularly finished second", "-29.383494924055412" ], [ "unity and a refuge against the menace of war. American example The Democratic-Republican Party of the United States, independent in 1776 constructed their identity on rural, environmental values, with nature seen as beneficial for humanity. Their Federalist opponents, in contrast, promoted urban commerce. The Democratic Party (United States) used such agrarian sentiments to dominate the country's politics in the first half of the 19th century, though they did not prevent the coming of the industrial revolution. They saw Europe and its industrial cities negatively. Jobs in the city attract migrants, creating poor workers and forming potential hotbeds of revolution.\nTo avoid", "-29.369150162732694" ], [ "not carried in British ships. France and Spain established similar policies. Simultaneously, new manufacturers faced sharp competition from British products which were suddenly available again. Political unrest in several states and efforts by debtors to use popular government to erase their debts increased the anxiety of the political and economic elites which had led the Revolution. The apparent inability of the Congress to redeem the public obligations (debts) incurred during the war, or to become a forum for productive cooperation among the states to encourage commerce and economic development, only aggravated a gloomy situation. In 1786–87, Shays' Rebellion, an uprising", "-29.3637195356132" ], [ "that France's influence stood for two distinct models: a negative one, of \"coffeehouses and taverns\" which had wrongly been perceived as factors of civilization by \"our youth\"; and a positive one, represented by \"the French literary and scientific societies\", and supported by \"the sacred family of French bourgeoisie, which is the nation's foundation.\" He also claimed that the upper class' preference for French was tantamount to a loss of national character, \"the history of a ruling class' decline and a people's straying away from the natural path indicated by its past and leading into its future.\" Some of these views", "-29.33827219772502" ], [ "canals. A boom in American manufacturing during the prolonged cessation of trade with Britain created an entirely new class of enterprisers, most of them tied politically to the Republicans, who might not survive without tariff protection. More broadly, the war reinforced feelings of national identity and connection.\nThis spirit of nationalism was linked to the tremendous growth and economic prosperity of this postwar era. However in 1819, the nation suffered its first financial panic and the 1820s turned out to be a decade of political turmoil that again led to fierce debates over competing views of the exact nature of American", "-29.324566987808794" ], [ "United States Factor Background Azar Gat, argues that this \"United States Factor\" is both widely overlooked and the reason for democracy's victory over totalitarianism in the 20th century.\nAccording to the United States Factor notion, \"if it were not for the existence of the USA the liberal democracies would most probably have lost the great struggles of the twentieth century.\" United States Factor in History The 20th century did appear to witness what many theorists have seen as the end of the battles of political ideology, with the political model of liberal democracy coming out on top. Indeed, political scientists, including", "-29.299501125700772" ] ]
36pxah
Is Math considered an invention or a discovery by mathematicians and scientists?
[ "Neither, but I guess it would be closer to an invention in which there are discoveries. In reality it's a language. A language with a lot of rules and limitations, but discoveries about the language let us describe new things in new ways.", "The Mathematical Universe Hypothesis is \"All structures that exist mathematically exist also physically.\" Since the world so precisely acts as small equations describe, it simplifies things if the world is not just acting like math but actually is math, especially if its all possibilities at once. If thats true, then math is a discovery since it physically exists.", "That's a huge philosophical question, one for which there isn't a simple and clear answer (and anyone who claims to have one doesn't know what they're talking about). Maybe try /r/askphilosophy One thing I can say is that it wasn't invented by scientists. That's not what scientists do. It wasn't even necesarilly invented by mathematicians - numbers gave been around a lot longer than professional mathematicians have.", "I would say both. To sum up : Definitions are invented. Theorems are discovered. (But proofs are invented). Mathematics contain both things. You can define/invent a mathematical object (like the number 8). You can define/invent a particular property (like being even) And then you can prove/discover that a particular mathematical object has a particular property (8 is even).", "all of math is the study of an artificial, made up world. Now, it turns out, that for maths that most students are taught, those made up worlds are almost or basically are the same thing as certain things that we see in reality. Geometry is a good example. A point is an imaginary thing. A line is an imaginary infinite series of points. Concepts like area and distance flow from those concepts, but are also stricty imaginary/conceptual. Do these things really exist? Not in their pure, strictly defined mathematic forms, but they're close enough for the physical world. Heck, some theories of quantum physics hold that space IS in fact quantized, that is, made of little \"boxes\" if you will, but for macroscopic measurements traditional geomatery is what works", "I believe this is a heavily debated argument among the science committee. Some believe it is created by humans to understand how nature behaves, and others believe that math is a fundamental property of the universe. I think it is both, but thats just my 2 cents." ]
[ [ "increase in the rate of mathematical discovery that has continued to the present day.\nMathematics is essential in many fields, including natural science, engineering, medicine, finance, and the social sciences. Applied mathematics has led to entirely new mathematical disciplines, such as statistics and game theory. Mathematicians engage in pure mathematics (mathematics for its own sake) without having any application in mind, but practical applications for what began as pure mathematics are often discovered later. History The history of mathematics can be seen as an ever-increasing series of abstractions. The first abstraction, which is shared by many animals, was probably that of", "-27.463589674036484" ], [ "is also reported to have made many discoveries in geometry by\n means of it.\"\nand one in Diogenes Laërtius' Lives and Opinions of Eminent Philosophers, Book 3 (Plato):\n\"He [Plato] was the first to explain to Leodamas of Thasos the\n method of solving problems by analysis.\"", "-27.019408920023125" ], [ "17th century),since the latter reduced it to mathematical deduction (mistrusting observation and experiment), and the former reduced it to pure observation and experiment, excluding mathematics. The real creators of the scientific breakthrough, such as Leonardo da Vinci, Copernicus, Galileo and Kepler and, of course, Newton, followed the three golden rules formulated by St. Thomas Aquinas, ignoring the philosophical controversies between rationalists and empiricists, as well as gradually purging science of all magic, superstition and mythology.", "-26.94071230874397" ], [ "century, contributing numerous theorems and discoveries. Perhaps the foremost mathematician of the 19th century was the German mathematician Carl Friedrich Gauss, who made numerous contributions to fields such as algebra, analysis, differential geometry, matrix theory, number theory, and statistics. In the early 20th century, Kurt Gödel transformed mathematics by publishing his incompleteness theorems, which show that any axiomatic system that is consistent will contain unprovable propositions.\nMathematics has since been greatly extended, and there has been a fruitful interaction between mathematics and science, to the benefit of both. Mathematical discoveries continue to be made today. According to Mikhail B. Sevryuk, in", "-26.342024457029765" ], [ "far from obvious. This is because mathematics did not lend itself to the primary pursuit of Aristotelian science: the discovery of causes.\nWhether it is because Galileo was realistic about the acceptability of presenting experimental results as evidence or because he himself had doubts about the epistemological status of experimental findings is not known. Nevertheless, it is not in his Latin treatise on motion that we find reference to experiments, but in his supplementary dialogues written in the Italian vernacular. In these dialogues experimental results are given, although Galileo may have found them inadequate for persuading his audience. Thought experiments showing", "-26.085490294732153" ], [ "the discovery (some would say invention) of non-Euclidean geometry. (It was several years later that a satisfactory Euclidean model was devised.)\nThis writer fails to see why this discovery was, in the words of Kline, a \"debacle.\" Is it not, on the contrary, a great triumph?... \n\nProfessor Kline does not deal honestly with his readers. He is a learned man and knows perfectly well that many mathematical ideas created in abstracto have found significant application in the real world. He chooses to ignore this fact, acknowledged by even the most fanatic opponents of mathematics. He does this to support an", "-26.02099961368367" ], [ "mathematics. In 1960 the Nobel Prize–winning physicist and mathematician Eugene Wigner wrote an article entitled \"The Unreasonable Effectiveness of Mathematics in the Natural Sciences\". He pointed out that \"the enormous usefulness of mathematics in the natural sciences is something bordering on the mysterious and that there is no rational explanation for it.\" In applying mathematics to understand the natural world, scientists often employ aesthetic criteria that seem far removed from science. Einstein once said that \"the only physical theories that we are willing to accept are the beautiful ones.\" Conversely, beauty can sometimes be misleading; Thomas Huxley wrote that \"Science", "-25.814585797023028" ], [ "chemistry. This controversy within mathematics is occurring at the same time as questions are being asked in the physics community about whether twenty-first century theoretical physics is becoming too mathematical, and leaving behind its experimental roots.\nThe emerging field of experimental mathematics is confronting this debate head-on by focusing on numerical experiments as its main tool for mathematical exploration. Theorems for sale In 2010, academics at The University of Edinburgh offered people the chance to \"buy their own theorem\" created through a computer-assisted proof. This new theorem would be named after the purchaser.", "-25.803001972963102" ], [ "Science is a way of seeking only new mathematics, if all of that correspond.\nOn the view of modern mathematics, It have thought that to solve a mathematical problem be able to reduced formally to an operation of symbol that restricted by the certain rules like chess (or shogi, or go). On this meaning, Wittgenstein interpret the mathematics to a language game (de:Sprachspiel). So a mathematical problem that not relation to real problem is proposed or attempted to solve by mathematician. And it may be that interest of studying mathematics for the mathematician himself (or herself) made much than newness or", "-25.729946060309885" ], [ "mathematics, are scientific or non-scientific.\nInterdisciplinary studies may cover knowledge-generating work that includes both scientific and non-scientific studies. Archaeology is an example of a field that borrows from both the natural sciences and history.\nFields of inquiry may change status over time. For many centuries, alchemy was accepted as scientific: it produced some useful information, and it supported experiments and open inquiry in the pursuit of understanding the physical world. Since the 20th century, it has been considered a pseudoscience. Modern chemistry, which developed out of alchemy, is considered a major natural science. Alternative systems Some philosophers, such as", "-25.556422855810524" ], [ "discoveries in astronomy — discoveries that are more ingenious than those of the Greeks and the Babylonians - and of their valuable methods of calculation which surpass description. I wish only to say that this computation is done by means of nine signs. If those who believe that because they speak Greek they have arrived at the limits of science would read the Indian texts they would be convinced even if a little late in the day that there are others who know something of value.\nThe addition of zero as a tenth positional digit is documented from the 7th century", "-25.452455691352952" ], [ "- Mathematics are the natural bent of my mind. If I had devoted myself exclusively to that study, I might probably have written something useful, as a new era had begun in that science.\" Regardless, the book was another success. It gave an up-to-date description of the latest discoveries revealed through the microscope and was published in two volumes and three parts. In the first part Somerville explained the latest thinking on atoms and molecules, the second part covered plant life and the third part explored animal life. The book included 180 illustrations, which caused her publisher great expense.\nShe was", "-25.449393009766936" ], [ "and “physicist” are becoming ever more vague. It seems plausible that in 100 years we will no longer speak of mathematicians as such but rather of mathematical scientists. It would not be at all surprising if the notion of “Department of Mathematics” at the college and university level gives way to “Division of Mathematical Sciences”.\" Experimental mathematics Experimental mathematics is the use of computers to generate large data sets within which to automate the discovery of patterns which can then form the basis of conjectures and eventually new theory. The paper \"Experimental Mathematics: Recent Developments and Future Outlook\" describes expected", "-25.36222314866609" ], [ "consensus on whether mathematics is an art or a science. Some just say, \"Mathematics is what mathematicians do.\" Mathematics as science The German mathematician Carl Friedrich Gauss referred to mathematics as \"the Queen of the Sciences\". More recently, Marcus du Sautoy has called mathematics \"the Queen of Science ... the main driving force behind scientific discovery\". In the original Latin Regina Scientiarum, as well as in German Königin der Wissenschaften, the word corresponding to science means a \"field of knowledge\", and this was the original meaning of \"science\" in English, also; mathematics is in this sense a field of knowledge. The", "-25.140974449983332" ], [ "The Unreasonable Effectiveness of Mathematics in the Natural Sciences \"The Unreasonable Effectiveness of Mathematics in the Natural Sciences\" is the title of an article published in 1960 by the physicist Eugene Wigner. In the paper, Wigner observed that the mathematical structure of a physical theory often points the way to further advances in that theory and even to empirical predictions. The miracle of mathematics in the natural sciences Wigner begins his paper with the belief, common among those familiar with mathematics, that mathematical concepts have applicability far beyond the context in which they were originally developed. Based on his experience,", "-25.048634825332556" ], [ "formulate a general theorem were not published, and were generally forgotten.\nExperimental mathematics as a separate area of study re-emerged in the twentieth century, when the invention of the electronic computer vastly increased the range of feasible calculations, with a speed and precision far greater than anything available to previous generations of mathematicians. A significant milestone and achievement of experimental mathematics was the discovery in 1995 of the Bailey–Borwein–Plouffe formula for the binary digits of π. This formula was discovered not by formal reasoning, but instead\nby numerical searches on a computer; only afterwards was a rigorous proof found. Tools and techniques", "-24.912925809039734" ], [ "natural sciences continued to be called natural philosophy, but the adoption of the scientific method took science beyond the realm of philosophical conjecture and introduced a more structured way of examining nature.\nNewton, an English mathematician, and physicist, was the seminal figure in the scientific revolution. Drawing on advances made in astronomy by Copernicus, Brahe, and Kepler, Newton derived the universal law of gravitation and laws of motion. These laws applied both on earth and in outer space, uniting two spheres of the physical world previously thought to function independently of each other, according to separate physical rules. Newton, for example,", "-24.883015104118385" ], [ "something that limits the opportunities for doing research, e.g. research tools are not patentable). The Progress of Science requirement constitutionally validates the pragmatic approach to non-obviousness described below. The word Discoveries establishes the level to which the contribution to the Progress of Science must rise to deserve the temporary monopoly. 1790-1850: the early days The first patent statute enacted by the Congress in 1790 required patentable inventions or discoveries to be \"sufficiently useful and important\". One can interpret important as important for the Progress of Science since the importance for economy is stated by useful. The next Patent Act of", "-24.875391128240153" ], [ "History of mathematics The area of study known as the history of mathematics is primarily an investigation into the origin of discoveries in mathematics and, to a lesser extent, an investigation into the mathematical methods and notation of the past. Before the modern age and the worldwide spread of knowledge, written examples of new mathematical developments have come to light only in a few locales. From 3000 BC the Mesopotamian states of Sumer, Akkad and Assyria, together with Ancient Egypt and Ebla began using arithmetic, algebra and geometry for purposes of taxation, commerce, trade and also in the field of", "-24.835818871230003" ], [ "Mathematician History One of the earliest known mathematicians was Thales of Miletus (c. 624–c.546 BC); he has been hailed as the first true mathematician and the first known individual to whom a mathematical discovery has been attributed. He is credited with the first use of deductive reasoning applied to geometry, by deriving four corollaries to Thales' Theorem.\nThe number of known mathematicians grew when Pythagoras of Samos (c. 582–c. 507 BC) established the Pythagorean School, whose doctrine it was that mathematics ruled the universe and whose motto was \"All is number\". It was the Pythagoreans who coined the term \"mathematics\", and", "-24.785321150848176" ], [ "a human activity from as far back as written records exist. The research required to solve mathematical problems can take years or even centuries of sustained inquiry.\nRigorous arguments first appeared in Greek mathematics, most notably in Euclid's Elements. Since the pioneering work of Giuseppe Peano (1858–1932), David Hilbert (1862–1943), and others on axiomatic systems in the late 19th century, it has become customary to view mathematical research as establishing truth by rigorous deduction from appropriately chosen axioms and definitions. Mathematics developed at a relatively slow pace until the Renaissance, when mathematical innovations interacting with new scientific discoveries led to a rapid", "-24.743747728178278" ], [ "development of the scientific method was the use of experiments to distinguish between competing scientific theories set within a generally empirical orientation, which began among Muslim scientists. Ibn al-Haytham is also regarded as the father of optics, especially for his empirical proof of the intromission theory of light. Some have also described Ibn al-Haytham as the \"first scientist\" for his development of the modern scientific method.\nIn mathematics, the mathematician Muhammad ibn Musa al-Khwarizmi (c. 780–850) gave his name to the concept of the algorithm, while the term algebra is derived from al-jabr, the beginning of the title of one of", "-24.703663700493053" ], [ "found in the ideas of the Pythagoreans: the convictions that \"Numbers rule the world\" and \"All is number\", and two millennia later were also expressed by Galileo Galilei: \"The book of nature is written in the language of mathematics\".\nBefore giving a mathematical proof for the formula for the volume of a sphere, Archimedes used physical reasoning to discover the solution (imagining the balancing of bodies on a scale). From the seventeenth century, many of the most important advances in mathematics appeared motivated by the study of physics, and this continued in the following centuries (although in the nineteenth century mathematics", "-24.67249190595612" ], [ "to antiquity, the scientific methodology of this field began to develop in the middle of the 17th century. A key factor was Galileo's introduction of the telescope to examine the night sky in more detail.\nThe mathematical treatment of astronomy began with Newton's development of celestial mechanics and the laws of gravitation, although it was triggered by earlier work of astronomers such as Kepler. By the 19th century, astronomy had developed into a formal science, with the introduction of instruments such as the spectroscope and photography, along with much-improved telescopes and the creation of professional observatories. Earth science Earth science (also", "-24.615820401115343" ], [ "History of science policy Ancient science Most early advances in mathematics, astronomy and engineering were byproducts of more immediate and practical goals. Surveying and accounting needs drove ancient Egyptian, Babylonian, Chinese, and Indian mathematics, while calendars created for religious and agricultural purposes drove early astronomy.\nModern science owes much of its heritage to ancient Greek philosophers; influential work in astronomy, mechanics, geometry, medicine, and natural history was part of the general pursuit of philosophy. Architectural knowledge, especially in ancient Greece and Rome, also contributed to the development of mathematics, though the extent of the connection between architectural knowledge and", "-24.60943827907613" ], [ "Mathematics is to play a role in the discovery of formal proofs, not to displace them.\nIn recent years a number of other research journals in pure mathematics have substantially expanded their coverage of experimental mathematics and new journals devoted in large part to experimental mathematics have been launched. Thus, in 1998 the London Mathematical Society launched LMS Journal of Computation and Mathematics and in 2004 the Journal of Algebra started a new section called \"Computational Algebra\". LMS Journal of Computation and Mathematics was closed to new submissions in October 2015.\nDespite the initial controversy, Experimental Mathematics quickly established a solid reputation", "-24.347757091920357" ], [ "astronomy and to formulate calendars and record time.\nThe most ancient mathematical texts available are from Mesopotamia and Egypt - Plimpton 322 (Babylonian c. 1900 BC), the Rhind Mathematical Papyrus (Egyptian c. 2000–1800 BC) and the Moscow Mathematical Papyrus (Egyptian c. 1890 BC). All of these texts mention the so-called Pythagorean triples and so, by inference, the Pythagorean theorem, seems to be the most ancient and widespread mathematical development after basic arithmetic and geometry.\nThe study of mathematics as a \"demonstrative discipline\" begins in the 6th century BC with the Pythagoreans, who coined the term \"mathematics\" from the ancient Greek μάθημα (mathema),", "-24.07468266179785" ], [ "in contested claims for priority in research discoveries can be credited to the increasing acceptance of the publication of papers in modern academic journals.\nThe Royal Society was steadfast in its unpopular belief that science could only move forward through a transparent and open exchange of ideas backed by experimental evidence. Many of the experiments were ones that we would not recognize as scientific today—nor were the questions they answered. For example, when the Duke of Buckingham was admitted as a Fellow of the Royal Society on June 5, 1661, he presented the Society with a vial of powdered \"unicorn horn\".", "-24.05255406362994" ], [ "and seek to study nature must first, in Galileo's view, fully understand mathematics. Mathematicians, conversely, have sought to interpret and analyse art through the lens of geometry and rationality. The mathematician Felipe Cucker suggests that mathematics, and especially geometry, is a source of rules for \"rule-driven artistic creation\", though not the only one. Some of the many strands of the resulting complex relationship are described below. Mathematics as an art The mathematician Jerry P. King describes mathematics as an art, stating that \"the keys to mathematics are beauty and elegance and not dullness and technicality\", and that beauty is the", "-24.01945832767524" ], [ "nature – the immutable rules it obeyed – and in doing so joined natural philosophy and mathematics for the first time, producing an early work of modern physics.\nThe scientific revolution, which began to take hold in the 17th century, represented a sharp break from Aristotelian modes of inquiry. One of its principal advances was the use of the scientific method to investigate nature. Data was collected and repeatable measurements made in experiments. Scientists then formed hypotheses to explain the results of these experiments. The hypothesis was then tested using the principle of falsifiability to prove or disprove its accuracy. The", "-23.961937435145956" ], [ "outside technical mathematics and physics, \"The Unreasonable Effectiveness of Mathematics in the Natural Sciences\". He argued that biology and cognition could be the origin of physical concepts, as we humans perceive them, and that the happy coincidence that mathematics and physics were so well matched, seemed to be \"unreasonable\" and hard to explain. His original paper has provoked and inspired many responses across a wide range of disciplines. These included Richard Hamming in Computer Science, Arthur Lesk in Molecular Biology, Peter Norvig in data mining, Max Tegmark in Physics, Ivor Grattan-Guinness in Mathematics, and Vela Velupillai in Economics.\nIn November", "-23.943960778735345" ], [ "good mathematics; there is bad mathematics. There are mathematicians who are totally uninterested in science, who are building tools that science will find indispensable. There are mathematicians passionately interested in science, and building tools for specific use there, whose work will become as obsolete as the Zeppelin or the electronic valve. The path from discovery to utility is a rabbit-warren of false ends: mathematics for its own sake has had, and wil continue to have, its place in the scheme of things. And, after all, the isolation of the topologist who knows no physics is no worse than that of", "-23.933189845993184" ], [ "to his proposed relationship between intuition and analysis. The language of mathematics not only permits one to express scientific advancements, but also to take a step back to comprehend the broader world of nature. Mathematics demonstrates the extent of the specific and limited discoveries made by physicists. On the other hand, physics has a key role for the mathematician - a creative role since it presents atypical problems ingrained in reality. In addition, physics offers solutions and reasoning - thus the development of infinitesimal calculus by Isaac Newton within the framework of Newtonian mechanics.\nMathematical physics finds its scientific origins in", "-23.80765080382116" ], [ "of physical science is largely the history of instruments and their intelligent use is well known. The broad generalizations and theories which have arisen from time to time have stood or fallen on the basis of accurate measurement, and in several instances new instruments have had to be devised for the purpose. There is little evidence to show that the mind of modern man is superior to that of the ancients. His tools are incomparably better.\"\nDavis Baird has argued that the major change associated with Floris Cohen's identification of a \"fourth big scientific revolution\" after World War II is the", "-23.77663750638021" ], [ "the new sciences was the unification of the exact sciences and physics by Kepler, Newton, and others, which resulted in a quantitative investigation of the physical causes of natural phenomena.", "-23.771646357810823" ], [ "for acquiring knowledge through observation, quantification, and verification. The scientific method has been developed to acquire knowledge of the physical world and the rules, processes and principles of which it consists, and combined with mathematics it enables the prediction of complex patterns of causality and consequence. An understanding of mathematics is unique to humans, although other species of animal have some numerical cognition.\nAll of science can be divided into three major branches, the formal sciences (e.g., logic and mathematics), which are concerned with formal systems, the applied sciences (e.g., engineering, medicine), which are focused on practical applications, and the", "-23.742318132077344" ], [ "scientific specialties. He conceived of ideas vastly ahead of his time. Notably, he invented concepts for the helicopter, an armed fighting vehicle, the use of concentrated solar power, the calculator, a rudimentary theory of plate tectonics, the double hull, and many others, using inspiration from Chinese ideas. In addition, he greatly advanced the fields of knowledge in anatomy, astronomy, civil engineering, optics, and hydrodynamics.\nThe scientist Galileo Galilei is called the first modern scientist. His work constitutes a significant break from that of Aristotle and medieval philosophers and scientists (who were then referred to as \"natural philosophers\"). Galileo’s achievements include improvements", "-23.721745286369696" ], [ "Robert Grosseteste, Roger Bacon, Albertus Magnus and Duns Scotus. Precursors of the modern scientific method, influenced by earlier contributions of the Islamic world, can be seen already in Grosseteste's emphasis on mathematics as a way to understand nature, and in the empirical approach admired by Bacon, particularly in his Opus Majus. Pierre Duhem's thesis is that Stephen Tempier - the Bishop of Paris - Condemnation of 1277 led to the study of medieval science as a serious discipline, \"but no one in the field any longer endorses his view that modern science started in 1277\". However, many scholars agree", "-23.718081683618948" ], [ "discovery has a particular interest to the mathematician even apart from its relevance to the forms of heavenly bodies which initially instigated these investigations.\"", "-23.695933766430244" ], [ "by Davis and What is Mathematics, Really? by Hersh.", "-23.64527820009971" ], [ "Formal science History Formal sciences began before the formulation of the scientific method, with the most ancient mathematical texts dating back to 1800 BC (Babylonian mathematics), 1600 BC (Egyptian mathematics) and 1000 BC (Indian mathematics). From then on different cultures such as the Greek, Arab and Persian made major contributions to mathematics, while the Chinese and Japanese, independently of more distant cultures, developed their own mathematical tradition.\nBesides mathematics, logic is another example of one of oldest subjects in the field of the formal sciences. As an explicit analysis of the methods of reasoning, logic received sustained development originally in three places: India from", "-23.552609732782003" ], [ "Philosophy of mathematics The philosophy of mathematics is the branch of philosophy that studies the assumptions, foundations, and implications of mathematics. It aims to understand the nature and methods of mathematics, and finding out the place of mathematics in people's lives. The logical and structural nature of mathematics itself makes this study both broad and unique among its philosophical counterparts. History The origin of mathematics is subject to arguments and disagreements. Whether the birth of mathematics was a random happening or induced by necessity duly contingent upon other subjects, say for example physics, is still a matter of prolific debates.\nMany", "-23.539618561742827" ], [ "new discoveries could be found outside of the authoritative works of Aristotle, Pliny, Galen, and other ancient writers.\nGalen of Pergamon (129 – c. 200 AD) had studied with four schools in antiquity — Platonists, Aristotelians, Stoics, and Epicureans, and at Alexandria, the center of medicine at the time. In his Methodus Medendi, Galen had synthesized the empirical and dogmatic schools of medicine into his own method, which was preserved by Arab scholars. After the translations from Arabic were critically scrutinized, a backlash occurred and demand arose in Europe for translations of Galen's medical text from the original Greek. Galen's method", "-23.528831308474764" ], [ "In The Foundations of Modern Science in the Middle Ages, Edward Grant argues that the origins of modern science lie in the Middle Ages and was due to a combination of four factors:\nTranslations into Latin of Greek and Arabic scientific texts in the twelfth and thirteenth centuries; the development of universities, which were uniquely Western and used the translations as the basis of a science curriculum; the adjustments of Christianity to secular learning and the transformation of Aristotle's natural philosophy. Hatfield Gary Hatfield, in his \"Was the Scientific Revolution Really a Revolution of Science?\", argues that while the \"Scientific Revolution\"", "-23.51345699687954" ], [ "example of the application of mathematics to technology in its first modern states. It was also the subject of studies on philology by his terminology and by his exposition of the mode of his times.", "-23.489014102946385" ], [ "engineering. A biologist using a population model and applying known mathematics would not be doing applied mathematics, but rather using it; however, mathematical biologists have posed problems that have stimulated the growth of pure mathematics. Mathematicians such as Poincaré and Arnold deny the existence of \"applied mathematics\" and claim that there are only \"applications of mathematics.\" Similarly, non-mathematicians blend applied mathematics and applications of mathematics. The use and development of mathematics to solve industrial problems is also called \"industrial mathematics\".\nThe success of modern numerical mathematical methods and software has led to the emergence of computational mathematics, computational science, and", "-23.442120736464858" ], [ "to have applications, e.g. number theory in cryptography. This remarkable fact, that even the \"purest\" mathematics often turns out to have practical applications, is what Eugene Wigner has called \"the unreasonable effectiveness of mathematics\". As in most areas of study, the explosion of knowledge in the scientific age has led to specialization: there are now hundreds of specialized areas in mathematics and the latest Mathematics Subject Classification runs to 46 pages. Several areas of applied mathematics have merged with related traditions outside of mathematics and become disciplines in their own right, including statistics, operations research, and computer science.\nFor those who are", "-23.397432702826336" ], [ "source of most new scientific ideas and ways of thinking about the world. It can be exploratory, descriptive, or explanatory; however, explanatory research is the most common.\nBasic research generates new ideas, principles, and theories, which may not be immediately utilized but nonetheless form the basis of progress and development in different fields. Today's computers, for example, could not exist without research in pure mathematics conducted over a century ago, for which there was no known practical application at the time. Basic research rarely helps practitioners directly with their everyday concerns; nevertheless, it stimulates new ways of thinking that have the", "-23.395288529223762" ], [ "Exact sciences The exact sciences, sometimes called the exact mathematical sciences are those sciences \"which admit of absolute precision in their results\"; especially the mathematical sciences. Examples of the exact sciences are mathematics, optics, astronomy, and physics, which many philosophers from Descartes, Leibniz, and Kant to the logical positivists took as paradigms of rational and objective knowledge. These sciences have been practiced in many cultures from Antiquity to modern times. Given their ties to mathematics, the exact sciences are characterized by accurate quantitative expression, precise predictions and/or rigorous methods of testing hypotheses involving quantifiable predictions", "-23.386161469272338" ], [ "of experiments, and theoretical physicists who specialize in mathematical modeling of physical systems to rationalize, explain and predict natural phenomena.\nPhysicists can apply their knowledge towards solving practical problems or to developing new technologies (also known as applied physics or engineering physics). History The study and practice of physics is based on an intellectual ladder of discoveries and insights from ancient times to the present. Many mathematical and physical ideas used today found their earliest expression in the work of ancient civilizations, such as the Babylonian astronomers and Egyptian engineers, the Phoenician scholar Thales of Miletus, Euclid in Ptolemaic Egypt, and", "-23.362749017891474" ], [ "over the latter half of the 20th century, discoveries which relate particularly to the study of complexity in nature. For example, the study of cellular automata, from the early discoveries of Stanislaw Ulam and John von Neumann through to John Conway's Game of Life and the extensive work of Stephen Wolfram, made it clear that complexity could be generated as an emergent feature of extended systems with simple local interactions. Over a similar period of time, Benoît Mandelbrot's large body of work on fractals showed that much complexity in nature could be described by certain ubiquitous mathematical laws,", "-23.35503112699371" ], [ "recognized as a profession since World War II, its roots can be traced to classical antiquity. Critics cite the works of writers like Aristotle as the earliest forms of technical writing. Geoffrey Chaucer's work, Treatise on the Astrolabe, is an early example of a technical document and is considered to be the first technical document published in English.\nWith the invention of the mechanical printing press, the onset of the Renaissance and the rise of the Age of Reason, the need to document findings became a necessity, and inventors and scientists like Isaac Newton and Leonardo da Vinci prepared", "-23.336649442790076" ], [ "fields of science. However, in general Wolfram's idea is that novel ideas and mechanisms can be discovered in the computational universe, where they can be represented in their simplest forms, and then other fields can choose among these discoveries for those they find relevant.\nWolfram has since expressed \"A central lesson of A New Kind of Science is that there’s a lot of incredible richness out there in the computational universe. And one reason that’s important is that it means that there’s a lot of incredible stuff out there for us to 'mine' and harness for our purposes.\" Systematic abstract science", "-23.317823276505806" ], [ "solution is based on reason alone, and its discovery does not depend on any mathematical principle. Because of this, I do not know why even questions which bear so little relationship to mathematics are solved more quickly by mathematicians than by others. In the meantime most noble sir, you have a assigned this question to the geometry of position but I am ignorant as to what this new discipline involves, and as to which types of problem Leibniz and Wolff expected to see expressed this way.”\nWhile this letter seems to suggest Euler's reluctance to tackle such problem, Kuhn and Ehler", "-23.30418709019432" ], [ "and improved upon them. His books on topics like botany, zoology, and minerals included information from ancient sources, but also results of his own empirical investigations. These investigations pushed several of the special sciences forward, beyond the reliance on classical texts. In the case of embryology, for example, it has been claimed that little of value was written between Aristotle and Albert, who managed to identify organs within eggs. Furthermore, Albert also effectively invented entire special sciences, where Aristotle has not covered a topic. For example, prior to Albert, there was no systematic study of minerals. For the breadth of", "-23.303810984201846" ], [ "placing emphasis on observation and a priori reasoning, developing early forms of the scientific method.\nThe most notable innovations were in the field of optics and vision, which came from the works of many scientists like Ibn Sahl, Al-Kindi, Ibn al-Haytham, Al-Farisi and Avicenna. The most notable work was The Book of Optics (also known as Kitāb al-Manāẓir), written by Ibn al-Haytham, in which he conclusively disproved the ancient Greek idea about vision, but also came up with a new theory. In the book, he presented a study of the phenomenon of the camera obscura (his thousand-year-old version of the pinhole", "-23.275695647113025" ], [ "was not possible with the technology available to him and quoted the contemporary judgement of Marin Mersenne, who had questioned the feasibility of reproducing Galileo's results. Furthermore, according to Koyré, Galileo's science was largely a product of his Platonist philosophy and did not really derive from experimental observations.\nKoyré's conclusions were first challenged in 1961 by Thomas B. Settle, who as a graduate student at Cornell University succeeded in reproducing Galileo's experiments with inclined planes using the methods and technologies described in Galileo's writing. Later, Stillman Drake and others worked through Galileo's notes and demonstrated that Galileo was a", "-23.27193919790443" ], [ "must remain a pillar of the scientific method. According to him, it is not necessary that mathematics incorporate physics into itself, but must develop as an asset unto itself. This asset would be above all a tool: in the words of Poincaré, mathematics is \"the only language in which [physicists] could speak\" to understand each other and to make themselves heard. This language of numbers seems elsewhere to reveal a unity hidden in the natural world, when there may well be only one part of mathematics that applies to theoretical physics. The primary objective of mathematical physics is not invention", "-23.242225030437112" ], [ "experimental discoveries of Faraday and the theory of Maxwell's equations of electromagnetism were developmental high points during the 19th century. Many physicists contributed to the development of quantum mechanics in the early-to-mid 20th century. New knowledge in the early 21st century includes a large increase in understanding physical cosmology.\nThe broad and general study of nature, natural philosophy, was divided into several fields in the 19th century, when the concept of \"science\" received its modern shape. Specific categories emerged, such as \"biology\" and \"biologist\", \"physics\" and \"physicist\", \"chemistry\" and \"chemist\", among other technical fields and titles. The term physicist was coined", "-23.223725081188604" ], [ "development of scientific experimentation, standard classification/taxonomy, and mathematics/physics be delayed or accelerated? Would new knowledge and discoveries be freely shared with others or kept secret within a guild or school? Would the necessary \"pruning\" provided by the Enlightenment occur or would the accumulated knowledge be overwhelming and fraught with errors and contradictions? \nIt can also be compared with \"modern day\" satirical TV shows set in this period like Hanna-Barbera's The Roman Holidays (1972) (a rehashing of The Flintstones set in Classical Rome) or ITV2's Plebs (2013-Present) (a sitcom in which Rome is a stand-in for modern-day London). This subgenre is", "-23.223234649558435" ], [ "Many mathematicians feel that to call their area a science is to downplay the importance of its aesthetic side, and its history in the traditional seven liberal arts; others feel that to ignore its connection to the sciences is to turn a blind eye to the fact that the interface between mathematics and its applications in science and engineering has driven much development in mathematics. One way this difference of viewpoint plays out is in the philosophical debate as to whether mathematics is created (as in art) or discovered (as in science). It is common to see universities divided into", "-23.210381086188136" ], [ "famously said, \"Mathematics is an experimental science, and definitions do not come first, but later on. They make themselves, when the nature of the subject has developed itself.\" On another occasion he asked somewhat more defensively, \"Shall I refuse my dinner because I do not fully understand the process of digestion?\"\nIn 1887, Heaviside worked with his brother Arthur on a paper entitled \"The Bridge System of Telephony\". However the paper was blocked by Arthur's superior, William Henry Preece of the Post Office, because part of the proposal was that loading coils (inductors) should be added to telephone and telegraph lines", "-23.18221933185123" ], [ "in the 17th and 18th centuries nothing could be paralleled with the revolutionary progress in the theatre of European science. Moreover, at this same period, no one could report what had taken place in the more distant past, since the Chinese themselves only had a fragmentary knowledge of that. One should not forget that, in China itself, autochthonous mathematics was not rediscovered on a large scale prior to the last quarter of the 18th century.\nCorrespondingly, scholars paid less attention to mathematics; pre-eminent mathematicians such as Gu Yingxiang and Tang Shunzhi appear to have been ignorant of the Tian yuan shu", "-23.1543778617488" ], [ "partly fill the line,\" which would not be considered satisfactory now. Reactions by commentators So great a contribution to physics was Two New Sciences that scholars have long maintained that the book anticipated Isaac Newton's laws of motion.\n— Stephen Hawking\nGalileo ... is the father of modern physics—indeed of modern science\n— Albert Einstein\nPart of Two New Sciences was pure mathematics, as has been pointed out by the mathematician Alfréd Rényi, who argued that it was the most significant book on mathematics in over 2000 years: Greek mathematics did not deal with motion, and so they never formulated mathematical laws of motion, even though", "-23.140942979895044" ], [ "investing millions of dollars and thousands of man-hours, experimentalists are finally able to detect.' He names mathematics as the 'language of nature', and refutes two possible explanations for this. Firstly, he suggests, the idea that they are abstract entities brings about the question of their application. Secondly, he responds to the problem of whether they are merely useful fictions by suggesting that this asks why these fictions are so useful. He summarised his argument as follows:\nA. If God did not exist, the applicability of mathematics would be just a happy coincidence.\nB. The applicability of mathematics is not just a happy", "-23.11727970885113" ], [ "form of “technology.” Creativity An invention must be made by human's artificial metal activity, and from this aspect, it is distinguished with ‘discovery.’ Discovery is to find the one that has already existed before, whereas inventions are fundamentally different in that they create new things that were never existed before. Altitude It merely illustrates the higher level of creativity of technical thoughts. The purpose of the patent act is to define the concept of invention and to be highly sophisticated to distinguish it from the design of the utility model. Statutory inventions Under the Patent Act Article 2, \"Invention means", "-23.088499756602687" ], [ "him from outside, and that he did not consciously create it from within.\n— William Kingdon Clifford, from a lecture to the Royal Institution titled \"Some of the conditions of mental development\"\nThese mathematicians believe that the detailed and precise results of mathematics may be reasonably taken to be true without any dependence on the universe in which we live. For example, they would argue that the theory of the natural numbers is fundamentally valid, in a way that does not require any specific context. Some mathematicians have extrapolated this viewpoint that mathematical beauty is truth further, in some cases becoming mysticism.\nIn Plato's", "-23.08674803422764" ], [ "mathematicians of the Kerala school in the 15th century CE. Their remarkable work, completed two centuries before the invention of calculus in Europe, provided what is now considered the first example of a power series (apart from geometric series). However, they did not formulate a systematic theory of differentiation and integration, nor is there any direct evidence of their results being transmitted outside Kerala. Prehistory Excavations at Harappa, Mohenjo-daro and other sites of the Indus Valley Civilisation have uncovered evidence of the use of \"practical mathematics\". The people of the Indus Valley Civilization manufactured bricks whose dimensions were in", "-23.08263193689345" ], [ "world is an imperfect replica of an idea that a divine craftsman once held. He also believed that the only way to truly know something was through reason and logic not the study of the object itself, but that changeable matter is a viable course of study.\nThe scientific method has ancient precedents and Galileo exemplifies a mathematical understanding of nature which is the hallmark of modern natural scientists. Galileo proposed that objects falling regardless of their mass would fall at the same rate, as long as the medium they fall in is identical. The 19th-century distinction of a scientific enterprise", "-23.072431459615473" ], [ "and measurements.\nThe distinction between the quantitative exact sciences and those sciences which deal with the causes of things is due to Aristotle, who distinguished mathematics from natural philosophy and considered the exact sciences to be the \"more natural of the branches of mathematics.\" Thomas Aquinas employed this distinction when he pointed out that astronomy explains the spherical shape of the Earth by mathematical reasoning while physics explains it by material causes. This distinction was widely, but not universally, accepted until the scientific revolution of the Seventeenth Century. Edward Grant has proposed that a fundamental change leading to", "-23.065385819936637" ], [ "the Greek writers Archimedes and Aristarchus. Roots also emerged in ancient Asian cultures such as India and China, and particularly the Islamic medieval period, which saw the development of scientific methodology emphasising experimentation, such as the work of Ibn al-Haytham (Alhazen) in the 11th century, for example. The modern scientific worldview and the bulk of physics education can be said to flow from the scientific revolution in Europe, starting with the work of Galileo Galilei and Johannes Kepler in the early 1600s. Newton's laws of motion and Newton's law of universal gravitation were formulated in the 17th century. The", "-23.048148761270568" ], [ "after him, as he held not that scientific progress is driven mainly by the accumulation of small works by mediocrities, but that scientific geniuses create a framework within which intellectually commonplace people can work successfully. For example, Ortega thought that Albert Einstein drew upon the ideas of Immanuel Kant and Ernst Mach to form his own synthesis, and that Einstein did not draw upon masses of tiny results produced systematically by mediocrities. According to Ortega, science is mostly the work of geniuses, and geniuses mostly build on each other's work, but in some fields there is a real need for", "-23.03495105053298" ], [ "science is what magic was for ancient civilizations. It gives a sense of hope for those who are willing to do almost anything in order to achieve eternal life. He quotes Kurzweil's Singularity as another example of a trend which has almost always been present in the history of mankind.\nThe Brain Makers, a history of artificial intelligence written in 1994 by HP Newquist, noted that \"Born with the same gift for self-promotion that was a character trait of people like P.T. Barnum and Ed Feigenbaum, Kurzweil had no problems talking up his technical prowess . . . Ray Kurzweil was", "-23.02545726007247" ], [ "Their intent was to develop their discovery into something off which they could profit, then reveal their discovery to prove ownership when they were prepared to make a claim on it.\nThe system of not publicizing discoveries caused problems because discoveries were not shared quickly and because it sometimes was difficult for the discoverer to prove priority. Newton and Gottfried Leibniz both claimed priority in discovering calculus. Newton said that he wrote about calculus in the 1660s and 1670s, but did not publish until 1693. Leibniz published \"Nova Methodus pro Maximis et Minimis\", a treatise on calculus, in 1684. Debates over", "-23.001472195981478" ], [ "science and technology up until the Ming dynasty. Ancient Chinese discoveries and inventions, such as papermaking, printing, the compass, and gunpowder (the Four Great Inventions), became widespread across East Asia, the Middle East and later to Europe. Chinese mathematicians were the first to use negative numbers. By the 17th century, Europe and the Western world surpassed China in scientific and technological advancement. The causes of this early modern Great Divergence continue to be debated by scholars to this day.\nAfter repeated military defeats by the European colonial powers and Japan in the 19th century, Chinese reformers began promoting modern science and", "-22.98708872507268" ], [ "and put mathematics in practice. In early Byzantium (5th to 7th century) the architects and mathematicians Isidore of Miletus and Anthemius of Tralles used complex mathematical formulas to construct the great “Hagia Sophia” temple, a magnificent technological breakthrough for its time and for centuries afterwards due to its striking geometry, bold design and height. In late Byzantium (9th to 12th century) mathematicians like Michael Psellos considered mathematics as a way to interpret the world.\nJohn Philoponus, a Byzantine scholar in the 500s, was the first person to systematically question Aristotle's teaching of physics. This served as an inspiration for Galileo Galilei", "-22.975621426507132" ], [ "(384–c. 322 BC) contributed significantly to the development of mathematics by laying the foundations of logic.\nIn the 3rd century BC, the premier center of mathematical education and research was the Musaeum of Alexandria. It was there that Euclid (c. 300 BC) taught, and wrote the Elements, widely considered the most successful and influential textbook of all time. The Elements introduced mathematical rigor through the axiomatic method and is the earliest example of the format still used in mathematics today, that of definition, axiom, theorem, and proof. Although most of the contents of the Elements were already known, Euclid arranged them", "-22.961004190030508" ], [ "specialization restricting the meaning of \"science\" to natural science follows the rise of Baconian science, which contrasted \"natural science\" to scholasticism, the Aristotelean method of inquiring from first principles. The role of empirical experimentation and observation is negligible in mathematics, compared to natural sciences such as biology, chemistry, or physics. Albert Einstein stated that \"as far as the laws of mathematics refer to reality, they are not certain; and as far as they are certain, they do not refer to reality.\"\nSome modern philosophers consider that mathematics is not a science. The philosopher Karl Popper observed that \"most mathematical theories are,", "-22.910450425115414" ], [ "main research. Controversy The ignorance of proven theories is very controverse. People around the globe profit from achievements of scientists troughout the centuries. From fire over the wheel to cars and other modern inventions, every discovery helped improve human life. Troughout the middle ages the church tried to shut down science (the most-famous example is Galileo Galilei, who was forced by the pope to neglect that the world was round, but luckily for us added \"and yet it moves\"), but as we all know science prevailed and ignited the renaissance, later the french revolution and industrialism. Here it did not", "-22.906444605796423" ], [ "fact, that is exactly what modern scientists are attempting to accomplish in nuclear physics, which is a second reason why Thales is described as the first western scientist, but some contemporary scholars reject this interpretation. Geometry Thales was known for his innovative use of geometry. His understanding was theoretical as well as practical. For example, he said:\nMegiston topos: apanta gar chorei (Μέγιστον τόπος· ἄπαντα γὰρ χωρεῖ.)\nThe greatest is space, for it holds all things.\nTopos is in Newtonian-style space, since the verb, chorei, has the connotation of yielding before things, or spreading out to make room for them, which is extension.", "-22.899048490449786" ], [ "or old. No search can possibly cover every single publication or use on earth, and therefore cannot prove that an invention is \"new\". A prior art search may for instance be performed using a keyword search of large patent databases, scientific papers and publications, and on any web search engine. However, it is impossible to guarantee the novelty of an invention, even once a patent has been granted, since some obscure little known publication may have disclosed the claimed invention. European Patent Convention Under the European Patent Convention (EPC), European patents shall be granted for inventions which, among", "-22.894940626676544" ], [ "philosophy dealing with the ideal nature of the early universe and began employing an internal logic within their predictive planetary systems. This was an important contribution to astronomy and the philosophy of science and some scholars have thus referred to this new approach as the first scientific revolution. This new approach to astronomy was adopted and further developed in Greek and Hellenistic astronomy.\nIn Seleucid and Parthian times, the astronomical reports were thoroughly scientific; how much earlier their advanced knowledge and methods were developed is uncertain. The Babylonian development of methods for predicting the motions of the planets is considered to", "-22.84697745263111" ], [ "the non-human intelligent beings that we know of confirm the status of (advanced) mathematics as an objective language.\" In the paper \"On Math, Matter and Mind\" the secularist viewpoint examined argues (sec. VI.A) that math is evolving over time, there is \"no reason to think it is converging to a definite structure, with fixed questions and established ways to address them\", and also that \"The Radical Platonist position is just another metaphysical theory like solipsism... In the end the metaphysics just demands that we use a different language for saying what we already knew.\" Tegmark responds (sec VI.A.1) that", "-22.828645394474734" ], [ "apparently gave \"a new direction to our civilization\" and created problems that \"are a challenge\" to our current worldview and ways of thinking. In the \"scientific circles\" it is considered that if mathematics is used to prove something, then the question \"is finally settled\", and it can't be discussed. However, most such conclusions are not always based on proven assumptions, and this makes possible a mistake in \"the final conclusion.\" Often one does not take into account the fact that mathematical inference can then be correct if he accepts into account \"all factors\" concerning this issue, and if it is", "-22.826396867632866" ], [ "modern science consisted in the critical view that many of these so-called new discoveries and theories were actually known to the ancients, but lost to the moderns due to their arrogance. In other words, any 'new' discovery was, to a large extent, simply 'old wine in new bottles'.\" Theosophical evolutionism Modern Theosophy, as professor Nicholas Goodrick-Clarke stated, \"adapting contemporary scientific ideas,\" raised the concept of \"spiritual evolution through countless worlds and eras.\" According to professor Donald Lopez, the occult \"system of spiritual evolution\" was more profound and advanced than that proposed by Charles Darwin. Theosophists accepted his theory but rejected", "-22.765829639683943" ], [ "A New Kind of Science Computation and its implications The thesis of A New Kind of Science (NKS) is twofold: that the nature of computation must be explored experimentally, and that the results of these experiments have great relevance to understanding the physical world. Since its nascent beginnings in the 1930s, computation has been primarily approached from two traditions: engineering, which seeks to build practical systems using computations; and mathematics, which seeks to prove theorems about computation. However, as recently as the 1970s, computing has been described as being at the crossroads of mathematical, engineering, and empirical traditions.\nWolfram introduces", "-22.755948433536105" ], [ "additions to knowledge of the laws of nature ... This essential new knowledge can be obtained only through basic scientific research.\" In the late-1960s, however, this view came under direct attack, leading towards initiatives to fund science for specific tasks (initiatives resisted by the scientific community). The issue remains contentious, though most analysts resist the model that technology simply is a result of scientific research. Paleolithic (2.5 Ma – 10 ka) The use of tools by early humans was partly a process of discovery and of evolution. Early humans evolved from a species of foraging hominids which were already bipedal, with a", "-22.73363748245174" ], [ "This became an anchor in the Age of Enlightenment, held across the ages from Newton's time to that of Thomas Jefferson's (1743–1826).\nA notable change was the emergence of a naturalist philosophy, spreading across Europe, embodied by Newton. The scientific method – exploring experimental evidence and constructing consistent theories and axiom systems from observed phenomena – was undeniably useful. The predictive ability of its resulting theories set the tone for his masterwork Philosophiae Naturalis Principia Mathematica (1687). As an example of scientific progress in the Age of Reason and the Lumières movement, Newton's example remains unsurpassed, in taking observed facts and", "-22.713705126545392" ], [ "find nothing in the record. Their processes of thought, taking one day with another, are so defective as to be preposterous. True enough, they are masters of logic, but they always start out from palpably false premises.\nMencken also wrote a review for Sir James Jeans's book, The Mysterious Universe, in which he said that mathematics is not necessary for physics. Instead of mathematical \"speculation\" (such as quantum theory), Mencken believed physicists should just directly look at individual facts in the laboratory like chemists:\nIf chemists were similarly given to fanciful and mystical guessing, they would have hatched a quantum theory forty", "-22.707675737998215" ], [ "was not scientific. Meyer argued that modern scientific method equally relied on \"foundational assumptions\" based on faith in naturalism, which \"assumed all events to be exclusively the result of physical or natural causes\", so on the definition used in the court cases \"science itself does not qualify as legitimate science\". He proposed that \"scientists and philosophers\" could turn to Biblical presupposition to explain \"the ultimate source of human reason, the existence of a real and uniformly ordered universe, and the ability present in a creative and ordered human intellect to know that universe. Both the Old and New Testaments define", "-22.671546373632737" ], [ "Wilhelm Schickard Wilhelm Schickard (22 April 1592 – 24 October 1635) was a German professor of Hebrew and Astronomy who became famous in the second part of the 20th century after Franz Hammer, a biographer (along with Max Caspar) of Johannes Kepler, claimed that the drawings of a calculating clock, predating the public release of Pascal's calculator by twenty years, had been discovered in two unknown letters written by Schickard to Johannes Kepler in 1623 and 1624.\nHammer asserted that because these letters had been lost for three hundred years, Blaise Pascal had been called and celebrated as the inventor", "-22.667707955813967" ], [ "methodologically united through the study of geometry. These mathematical disciplines began in antiquity with the Babylonians and with Hellenistic writers such as Archimedes and Ptolemy. Ancient philosophy, meanwhile – including what was called \"physics\" – focused on explaining nature through ideas such as Aristotle's four types of \"cause\". Ancient Greece The move towards a rational understanding of nature began at least since the Archaic period in Greece (650–480 BCE) with the Pre-Socratic philosophers. The philosopher Thales of Miletus (7th and 6th centuries BCE), dubbed \"the Father of Science\" for refusing to accept various supernatural, religious or mythological explanations for natural phenomena,", "-22.661821347195655" ], [ "of multiple technologies revealed before the patent application point. Since there are many subjective factors involved in whether or not it can be easily invented, there is no perfect standard for whether or not there is inventiveness. Therefore, whether or not it can be quickly developed can be judged individually for each case.\nIn the case of Samsung v. Apple, the second patent lawsuit that followed was the victory of the last US federal Court of Appeals by invalidating Apple's patents for its inventiveness (non-obviousness as US patent law) (Currently, Apple objected to the invalidation and non-infringement, but it overturned it", "-22.64358926168643" ], [ "Atkins. In this interpretation, the various approximations that constitute our current physics theories are successful because simple mathematical structures can provide good approximations of certain aspects of more complex mathematical structures. In other words, our successful theories are not mathematics approximating physics, but mathematics approximating mathematics. Ivor Grattan-Guinness Ivor Grattan-Guinness finds the effectiveness in question eminently reasonable and explicable in terms of concepts such as analogy, generalisation and metaphor. Related quotations [W]ir auch, gleich als ob es ein glücklicher unsre Absicht begünstigender Zufall wäre, erfreuet (eigentlich eines Bedürfnisses entledigt) werden, wenn wir eine solche systematische Einheit unter bloß empirischen Gesetzen", "-22.641467880806886" ], [ "computational engineering, which use high-performance computing for the simulation of phenomena and the solution of problems in the sciences and engineering. These are often considered interdisciplinary. Utility Historically, mathematics was most important in the natural sciences and engineering. However, since World War II, fields outside the physical sciences have spawned the creation of new areas of mathematics, such as game theory and social choice theory, which grew out of economic considerations.\nThe advent of the computer has enabled new applications: studying and using the new computer technology itself (computer science) to study problems arising in other areas of science (computational science)", "-22.62424873712007" ], [ "yet I knew that there were still discoveries to be made. I was thinking about the interesting experiments made by Nikolaus Harnoncourt and Gustav Leonhardt, although I knew we'd have to experiment in our own way. It was a huge challenge; playing period instruments wasn't as easy as it is today, and finding out their secrets was a difficult process. Nowadays an extraordinarily high technical level has been achieved and the upcoming generations don't have any of the problems we pioneers faced. We cleared the way.\nPinnock was at the forefront of the period performance movement and the revitalisation of the", "-22.61662236903794" ], [ "Mathematics Mathematics (from Greek μάθημα máthēma, \"knowledge, study, learning\") includes the study of such topics as quantity (number theory), structure (algebra), space (geometry), and change (mathematical analysis). It has no generally accepted definition.\nMathematicians seek and use patterns to formulate new conjectures; they resolve the truth or falsity of conjectures by mathematical proof. When mathematical structures are good models of real phenomena, then mathematical reasoning can provide insight or predictions about nature. Through the use of abstraction and logic, mathematics developed from counting, calculation, measurement, and the systematic study of the shapes and motions of physical objects. Practical mathematics has been", "-22.61194308953418" ], [ "entre les mathématiques et la physique, etc.\"\n Scott Weinstein in \"ETC: A Review of General Semantics\":\nProfessor Kline's book is a lively account of a fascinating subject. Its conclusions are, however, overdrawn and in many cases unjustified. The lesson to be learned from twentieth century foundational research is not that mathematics is in a sorry state, but rather the extent to which deep philosophical issues about mathematics may be illuminated, if not settled, by mathematics itself. Gödel's theorems do indeed intimate that there may be limits to what we can come to know in mathematics, but they also demonstrate through themselves", "-22.603231432329267" ], [ "mathematically.\nGalileo believed that knowledge could be acquired through reason, and reinforced through observation and experimentation. Thus, it can be argued that Galileo was a rationalist, and also that he was an empiricist. The two new sciences The two sciences mentioned in the title are the strength of materials and the motion of objects (the forbearers of modern material engineering and kinematics). In the title of the book \"mechanics\" and \"motion\" are separate, since at Galileo's time \"mechanics\" meant only statics and strength of materials.\nGalileo had started an additional section on the force of percussion, but was not able to complete", "-22.600105391233228" ], [ "Essays under the title \"Mathematics and the Metaphysicians\":\nWhat is now required is to give the greatest possible development to mathematical logic, to allow to the full the importance of relations, and then to found upon this secure basis a new philosophical logic, which may hope to borrow some of the exactitude and certainty of its mathematical foundation. If this can be successfully accomplished, there is every reason to hope that the near future will be as great an epoch in pure philosophy as the immediate past has been in the principles of mathematics. Great triumphs inspire great hopes; and pure", "-22.599983508349396" ] ]
2yddwg
Why do parents seem to stay the same age for long periods of time to their kids? I thought my mom was 45 for several years at one point.
[ "Because kids are self-centric. We think of our parents as OUR parents, not people in their own right.", "Compared to yourself, your parents aging doesn't change anything. They don't get taller, grow hair in new places, etc., at least not on the short, very noticeable time scale that kids do. Plus kids haven't learned to give a shit about their parents, yet.", "It's because you are truly witnessing age progression. Compare the way you viewed your parents each day over a period of time as opposed to only seeing them once over the same period of time.", "Parents do not age, this is very basic knowledge.", "My mom used to write her age on all government and medical forms as 45 from my grade 6 through grade 10. 15 years passed and she is 53 now. Makes no sense to me although I like to tease her that she is 45 now." ]
[ [ "in their household, which may have been due to the idea that the young people in these times typically waited to establish themselves and start a household before they married and filled a home. As life expectancy becomes older and programs such as Social Security benefit the elderly, the old are now beginning to live longer than prior generations, which then may lead to generations mixing together. According to results of a study by Pew Research Center in 2010, approximately 50 million (nearly one in six) Americans, including rising numbers of seniors, live in households with at least two adult generations,", "-33.59295895136893" ], [ "in the United States don't see themselves as adults and are still in the process of obtaining an education, are unmarried, and are childless, most people in their thirties in the United States see themselves as adults, have settled on a career, are married, and have at least one child.\nCurrently, it is appropriate to define adolescence as the period spanning ages 10 to 18. This is because people in this age group in the United States typically live at home with their parents, are undergoing pubertal changes, attend middle schools or junior high schools, and are involved in a \"school-based", "-33.26363937743008" ], [ "8, children tend to only associate with people within 2 years of their own age. Children mostly segregate from adults, showing less adult interaction as they move into their teenage and young adult years. Studies suggest that the gap in age segregation will grow because of technological knowledge seen in younger adults that is not seen in older adults. It is predicted that younger adults will have to teach older adults about new social environments that will be essential to healthy living. Without these teachings, age segregation is set to increase.\nSome of the prospects for designing social life to overcome", "-32.51492419897113" ], [ "however, their future relationships are often affected, as they lack a model upon which to base a healthy long term relationship. Nonetheless, as adults children of divorcees cope better with change.\nChildren are affected by divorce in many different ways, varying by the circumstances and age of the child. Young children ages two to six are generally the most fearful of parental separation, and often feel abandoned or confused. Both boys and girls have the same amount of trouble coping, but often show this in different ways. Nonetheless this age group adapts best to their situations, as they are often too", "-32.23914910585154" ], [ "late twenties, thus confirming that emerging adulthood is distinct subjectively. Why emerging adulthood is distinct demographically Emerging adulthood is the sole age period where there is nothing that is demographically consistent. At this time, adolescents in the United States up to age 20, over 95% live at home with at least one parent, 98% are not married, under 10% have become parents, and more than 95% attend school. Similarly, people in their thirties are also demographically normative: 75% are married, 75% are parents, and under 10% attend school. Residential status and school attendance are two reasons that the period of", "-31.99235998088261" ], [ "6 April 1993.\nIn New Zealand a person is considered a child or \"minor\" until the age of 18. On reaching this \"age of majority\" the person is no longer a child in the eyes of the law, and has all the rights and obligations of an adult. There are laws to protect young people from harm they may be subject to due to their lack of maturity. Some legal age restrictions are lifted below the age of majority, trusting that a child of a certain age is equipped to deal with the potential harm. For example, a 16-year-old may leave", "-31.96425283094868" ], [ "a significant increase in the percentage of young adults living with parents compared to the previous demographic cohort, Generation X, with 23% of young adults aged 18–34 living with parents in 2000, rising to 32% in 2014. Additionally, in 2000, 43% of those aged 18–34 were married or living with a partner, with this figure dropping to 32% in 2014. High student debt is described as one reason for continuing to live with parents, but may not be the dominant factor for this shift as the data shows the trend is stronger for those without a college education. Richard Fry,", "-31.759571323949785" ], [ "teens or pre-teens, is caused by four main risk factors namely; personality, background, state of mind and drugs. These factors may lead to the child having low IQ and may increase the rate of illiteracy.\nChildren brought up by single parents are more likely to start offending than those who live with both parents. It is also more likely that children of single parents may live in poverty, which is strongly associated with juvenile delinquency. However once the attachment a child feels towards their parent(s) and the level of parental supervision are taken into account, children in single parent families are", "-31.755219024955295" ], [ "it is one in 84; and at age 50 it is one in 44. Although the probability increases with maternal age, 70% of children with Down syndrome are born to women 35 years of age and younger, because younger people have more children. The father's older age is also a risk factor in women older than 35, but not in women younger than 35, and may partly explain the increase in risk as women age. History English physician John Langdon Down first described Down syndrome in 1862, recognizing it as a distinct type of mental disability, and again in a", "-31.560227136476897" ], [ "spanning ages 12 to 18. This is because people in this age group in the United States typically live at home with their parents, are undergoing pubertal changes, attend middle schools and high schools and are involved in a \"school-based peer culture\". All of these characteristics are no longer normative after the age of 18, and it is, therefore, considered inappropriate to call young adults \"adolescence\" or \"late adolescence\". Furthermore, in the United States, the age of 18 is the age at which people are able to legally vote and citizens are granted full rights upon turning 21 years of", "-31.297590621514246" ], [ "have time to cook dinner?\" There are many reasons why someone may put off to school until their children are older, such as not wanting to leave them in the hand of a baby sitter constantly at such a young age. However, once the children get older the parent pursuing an education, may start missing school events that they would have normally attended. The guilt of having to leave a child while attending to educational matters is less when the child is old enough to be able to ask questions about where their parent is and comprehend the response. Even", "-31.186343268840574" ], [ "households in 1990, but reached 24% in 2010. It will reach 30% by 2020. This is because the traditional family relationship is rapidly breaking apart as the aging population grows and the birth rate shrinks. The proportion of one-person households is increasing as the population ages. In 2015, the proportion of one-person households whose head of the family was younger than 39 years old was the highest with 36.9%; the second highest was from 40–59 years old with 33.2%; and last was those who over 60 years old, which was more than 30%. However, for 2045, over 60% of one-person", "-30.96227510739118" ], [ "The majority of people who have divorced (close to 80%) go on to marry again. On average, they remarry just under 4 years after divorcing; younger adults tend to remarry more quickly than older adults. For ķn, just over half remarry in less than 5 years, and by 10 years after a divorce 75% have remarried.\nPeople may be eager to remarry because they do not see themselves as responsible for the previous marriage ending. Generally, they are more likely to believe their partner's behaviors caused the divorce, and minimize the influence of their own actions. Therefore, they remain optimistic that", "-30.930637622543145" ], [ "showed that 41 percent of children born between 22 and 25 weeks had moderate or severe learning disabilities when compared to the test scores of a group of similar classmates who were born at full-term. It is also shown that higher levels of education were less likely to be obtained with decreasing gestational age at birth. People born prematurely may be more susceptible to developing depression as teenagers.\nSome of these problems can be described as being within the executive domain and have been speculated to arise due to decreased myelinization of the frontal lobes. Studies of people born premature and", "-30.695022830856033" ], [ "so preferred because they leave the community when they get married. Boys are separated from their parents when they are around 12 or 13 years old to live separate in the men's houses. Around that age, they are taught by the fathers basic important skills such as fishing, building houses, making canoes or cutting and sewing sago palm leaves.\nGirls on the other hand, they stay with their mother and taught household cores such as cooking, weeding around the house, cleaning and looking after their younger brothers of sisters. One of the important things that girls learn at an early age", "-30.639496664683975" ], [ "live together with small children and take care of the members of the household. In any case, the information analysed shows strong indications that a quarter of out-of-school youth aged 18 to 24 years who left school before completing their secondary education have brothers and sisters or other young family members who were adolescent fathers and mothers. The behaviour patterns analysed also revealed that many young people left the household in which they were raised to set up a new household. An over-representation of this subgroup of adolescents and young people who broke off their educational trajectories before completing their", "-30.59186535119079" ], [ "much later sibling is due to the parents feeling that their first group of children are getting older and they miss having small children around. Sometimes older couples with a more unstable relationship have yet another child in later life due to feeling a need to keep the relationship together when their older children start becoming independent, thus losing the so-called \"glue\" that kept them from growing apart. Effects During the early 20th century having a sladdbarn was considered shameful in the country, as it was considered to imply that the parents were overly sexually active in old age. In", "-30.551536984741688" ], [ "that 18- to 21-year-olds are less culpable for the same reasons that the U.S. Supreme Court found teens under 18 to be. The age group lacks maturity to control their impulses and fully consider risks, making them unlikely to be deterred by knowledge of likelihood and severity of punishment, the judge wrote. In addition, they are susceptible to peer pressure and emotional influence. And their character is not yet well formed, “meaning that they have a much better chance at rehabilitation than do adults,” the judge wrote. “Given the national trend toward restricting the use of the death penalty for", "-30.488465060770977" ], [ "young to remember their non-custodial parent vividly. Children ages seven to twelve are much better at expressing emotions and accepting parentage breakage, but often distrust their parents, rely on outside help and support for encouragement, and may manifest social and academic problems. Adolescents cope the worst with divorce; they often struggle most with the change, and may even turn away from their family entirely, dealing with their situation on their own. They often have problems expressing feelings, similar to far younger children, and may have adjustment issues with long-term relationships due to these feelings. Keeping in touch with both parents", "-30.468556161795277" ], [ "family Code, proposed to have this raised to 18 as well. This was deemed too much, however, and since a lot of prospective adopters would have been disqualified if it were to be followed. In order to solve this, the age of difference of 16 years was chosen.\nAlthough the advanced age of prospective adopters is considered, their health and the kind of home they could provide to the adoptees are more important. Placing a child in the care of an individual who was advanced in age but in good health was seen as more desirable than leaving the child with", "-30.4308120488422" ], [ "or separation occurs.\nChildren of divorced or separated parents exhibit increased behavioral problems and the marital conflict that accompanies parents' divorce places the child's social competence at risk. Divorce of elderly couples Since the mid-1990s, the divorce rate has increased to over 50% among baby boomers. More and more seniors are staying single; an analysis of census data conducted at Bowling Green State University predicted that divorce numbers will continue to rise. Baby boomers that remain unmarried are five times more likely to live in poverty compared to those who are married. They are also three times as likely to receive", "-30.352990422048606" ], [ "been reached. Arnett states that most people in this developmental stage believe they have not yet reached adulthood. Instead, they believe they are slowly progressing into adulthood, and thus the term \"emerging adulthood\" is much more appropriate.\nWhat is more, if the years 18-25 are classified as \"young adulthood,\" Arnett believes that it is then difficult to find an appropriate term for the thirties and that it is nonsensical to combine the late teenage years, twenties, and thirties together because the 18‑25 age period and the thirties are very distinct from one another. He says that while most 18- to 20-year-olds", "-30.278694674023427" ], [ "the young and the old to be relatively disadvantaged. However, more recently, in the United States the tendency is for the young to be most disadvantaged. For example, poverty levels in the U.S. have been decreasing among people aged 65 and older since the early 1970s whereas the number of children under 18 in poverty has steadily risen. Sometimes, the elderly have had the opportunity to build their wealth throughout their lives, while younger people have the disadvantage of recently entering into or having not yet entered into the economic sphere. The larger contributor to this, however, is the increase", "-30.27661477518268" ], [ "emerging adults in the United States feel they have completed adolescence but not yet entered adulthood.\nA number of studies have shown that regarding people in their late teens and early twenties in the United States, demographic qualities such as completing their education, finding a career, marrying, and becoming parents are not the criteria used in determining whether they have reached adulthood. Rather, the criteria that determine whether adulthood has been reached are character qualities, such as being able to make independent decisions and taking responsibility for one's self. In America, these character qualities are usually experienced in the mid to", "-30.15335977479117" ], [ "young people fully enter adulthood. If the years 18–25 are classified as \"young adulthood\", Arnett believes it is then difficult to find an appropriate term for the thirties. Emerging adults are still in the process of obtaining an education, are unmarried, and are childless. By age thirty, most of these individuals do see themselves as adults, based on the belief that they have more fully formed \"individualistic qualities of character\" such as self-responsibility, financial independence, and independence in decision-making. Arnett suggests that many of the individualistic characteristics associated with adult status correlate to, but are not dependent upon, the role", "-30.13904392250697" ], [ "were 12 years old. About ​¹⁄₄ of children of married couples would experience this by age 12. Although the chance of divorce increases for longer marriages in general, the divorce rates are not significantly different for those who cohabit prior to marriage and those who do not. Overall, cohabitation prior to marriage does not appear to negatively impact the chances of future marriage dissolution.\nWhite American working-class women are more likely than either non-white working-class American women or European women to raise their children with a succession of live-in boyfriends, with the result that the children may live with, and then", "-30.08150921834749" ], [ "delinquents. Also in 2009, the three different classifications of age groups among children, being 0-5, 6-11 and 12-17, were roughly equal. As reported in 2009 by the Office of Juvenile Justice and Delinquency Prevention, 57% percent of all juveniles are White, 10% Black, 1% American Indian, 5% Asian, and 22% Hispanic. Poverty, which is also directly connected to a child's chances of becoming a juvenile delinquent, varies by numerous factors. The poverty level of a child can vary by race and living arrangement (and other factors which are not mentioned here). For instance, in 2009, Black and Hispanic children were", "-29.992179068824043" ], [ "their young children back to their hometowns because they are unable to raise children and work at the same time. Because of jus soli laws these children automatically gain American citizenship. These children are called \"left-behind\" Americans and are usually taken care of by grandparents. They are reunited with their parents in the US once they have reached the age to attend grade school.", "-29.985880311753135" ], [ "before age 18 than those with a secondary or higher education, and girls with no education are three times more likely to marry before age 18 than those with a secondary education. Early marriage impedes a young girl's ability to continue with her education as most drop out of school following marriage to focus their attention on domestic duties and having or raising children. Girls may be taken out of school years before they are married due to family or community beliefs that allocating resources for girls' education is unnecessary given that her primary roles will be that of wife", "-29.961740494240075" ], [ "infant less than 1 year of age. As children got older their mourning period grew longer until they were 10 years old and had the same mourning period as an adult (10 months).", "-29.9585019411752" ], [ "less than five school age children - all of whom go to school in St. Anthony as the local school has long closed. The population is aging and often after somebody dies another house is boarded up and abandoned.", "-29.885952963959426" ], [ "children with cohabiting parents saw them break up before they were 12 years old. About a quarter of children of married couples had experienced this by age 12.", "-29.861743007437326" ], [ "by conflict and aggression, they can promote delinquency, and antisocial behaviour among peers. Adulthood and old age When siblings reach adulthood, it is more likely that they will no longer live in the same place and that they will become involved in jobs, hobbies, and romantic interests that they do not share and therefore cannot use to relate to one another. In this stage the common struggles of school and being under the strict jurisdiction of parents is dissolved. Despite these factors, siblings often maintain a relationship through adulthood and even old age. Proximity is a large factor in maintaining", "-29.848937603179365" ], [ "of teens younger than 15 become pregnant each year. Stillborn and newborn deaths are 50% higher for teen moms than women aged 20–29, and are more likely to have a low birth weight.\nTeenage birth rates, as opposed to pregnancies, peaked in 1991, when there were 61.8 births per 1,000 teens, and the rate dropped in 17 of the 19 years that followed. One in four American women who had sex during their teenage years will have a baby before they are married, compared to only one in ten who wait until they are older. Even more will experience", "-29.815718660247512" ], [ "found in their results that the children of same sex families grow into adulthood just as happy and optimistic as children with heterosexual parents do. This study depicts a positive response regarding the concern of the well being of same sex families.", "-29.75909431799664" ], [ " However, as children grow older, their vocabularies grow and instances of underextension decline.", "-29.752404441154795" ], [ "though they personally may not want to have children. On the other hand, men who are single and younger do not feel the same desire because they are not \"prepared\" to emotionally and financially support a child. Alternate family forms The number of married couples raising children has decreased over the years. In Canada, married and common law couples with children under the age of 25 represented 44% of all families in 2001. This statistic has lowered since 1991, when married and common law couples raising children under the age of 25 represented 49 percent of all Canadian families. There", "-29.669551455881447" ], [ "age structure of the family with substantial implications for the financial relationships between and among family members. When we say that \"people are living longer\" we are also saying that parents are living longer. The 1980s concept of the sandwich generation focused on forty-year-olds (usually women) simultaneously taking care of their sixty-five-year old parents and their babies and toddlers. Greater longevity is accompanied by the emergence, however, of the senior sandwich generation in which sixty-year-olds are now the family generation in the middle taking care of (socially and financially) their ninety-year old parents alongside caring for their teenage and young-adult", "-29.6357583591016" ], [ "are born out of wedlock, compared with 36 percent of children born to working-class women, and 13 percent of children born to middle- and upper-class children.\nWith respect to divorce, working-class and poor adults age 18-55 are more likely to divorce than are their middle- and upper-class counterparts. 46 percent of poor Americans aged 18–55 are divorced, compared with 41% of working-class adults and 30 percent of middle- and upper-class adults.\nThe marriage gap is susceptible to multiple interpretations because it is not clear to what extent it is attributable to causation and what to correlation. It may be that people who", "-29.63226812542416" ], [ "be adults between the ages of 18 and 27, and their parents feel the same way. The age at which children feel they no longer are obligated to disclose to their parents has increased over time, and the same trend is predicted over the next few decades.\nOften, the motivation to disclose negative behaviors is purely because the children fear that they will not get away with it or feel obligated to share. Adolescents also want to disclose more if they feel that the activities in question are out of their own jurisdiction. Jurisdiction is measured, in the adolescents' minds, as", "-29.55783447623253" ], [ "less time lived compared to their parents' . The life expectancy for newer generations can expect to be lower due to obesity and the health risks they can experience at a later age. Anti-obesity efforts The National Center for Health Statistics reported in November 2015:\nTrends in obesity prevalence show no increase among youth since 2003–2004, but trends do show increases in both adults and youth from 1999–2000 through 2013–2014. No significant differences between 2011–2012 and 2013–2014 were seen in either youth or adults.\nUnder pressure from parents and anti-obesity advocates, many school districts moved to ban sodas, junk foods, and candy", "-29.547654121357482" ], [ "adolescents of the same age are put in the same classes. Because of the wide variance in the onset of adolescence, this means that one class may include individuals who have not yet started puberty, others who are sexually mature but not fully grown and yet others who are effectively adult. During this period, there is a high risk of an adolescent dropping out of formal education (due most commonly to laziness, intellectual boredom, bullying, or rebellion) without having achieved their full learning potential. The term \"late-bloomer\" may refer to such an individual who develops serious intellectual interests in their", "-29.529665964655578" ], [ "The premature death of one parent also contributed to a small percentage of marriages producing just one child until around the mid 20th century, not to mention the then rare occurrence of divorce. \nOnly children are sometimes said to be more likely to develop precocious interests (from spending more time with adults) and to feel lonely. Sometimes they compensate for the aloneness by developing a stronger relationship with themselves or developing an active fantasy life that includes imaginary friends. Children whose only siblings are much older than them sometimes report feeling like an only child. Advantages cited of having an", "-29.529178701297496" ], [ "that are less economically well off. Conversely, rates of divorce decline as age at the time of second marriage increases. Also, women who enter their second marriage with no children are generally more likely to sustain their marriages. Vulnerabilities to second marriages There are several reasons why second marriages can be more vulnerable to disruption. Partners bring the same personal qualities to their subsequent marriage as they had during the first, but some of these qualities may have contributed to the first marriage’s problems. People who have divorced and remarried multiple times tend to be relatively impulsive and nonconformist. In", "-29.51365587033797" ], [ "for rural Americans age 10 to 24 was almost double the rate among their urban counterparts. This was attributed to social isolation, greater availability of guns, and difficulty accessing healthcare.\nNo withstanding the economic and health challenges, a 2018 survey of rural adults found a majority felt they were better off financially than their parents at the same age. They thought their children would also experience such improvement. Forty percent said their lives came out better than they expected.", "-29.43247515009716" ], [ "and inexperienced eighteen-year-olds, too, will have to experience conflicts and whirlwinds of emotions and face the prejudices of their world shaped by the adults around them. Together, they have to live their lives to the max and make life-changing decisions. And most of all, they must not forget to cherish every moment of their lives. For all they know, the memories of their eighteenth year of existence might be the sweetest, the most precious, and the most unforgettable.", "-29.404629733064212" ], [ "in the home Divorce, death, and remarriage are all disruptive events in a household. Although everyone involved is affected by events such as these, it can be most drastically seen in children. Due to their age, children have relatively undeveloped coping skills. For this reason a stressful event may cause some changes in their behavior. Falling in with a new crowd, developing some new and sometimes undesirable habits are just some of the changes stress may trigger in their lives.\nA particularly interesting response to stress is talking to an imaginary friend. A child may feel angry with a parent or", "-29.39470274784253" ], [ "as middle age. This time span has been defined as the time between ages 45 and 65 years old. Many changes may occur between young adulthood and this stage.\nThe body may slow down and the middle aged might become more sensitive to diet, substance abuse, stress, and rest. Chronic health problems can become an issue along with disability or disease. Approximately one centimeter of height may be lost per decade. Emotional responses and retrospection vary from person to person. Experiencing a sense of mortality, sadness, or loss is common at this age.\nThose in middle adulthood or middle age continue to", "-29.394097296055406" ], [ "researchers say that parents should keep an eye on their child if they have any reason to believe that something is slightly off. If the children are evaluated earlier, they become more acquainted to their disorder and treating it becomes part of their daily routine. This is opposed to adults who might not recover as quickly because it is more difficult for them to adapt.\nMental illness affects not only the person themselves, but the people around them. Friends and family also play an important role in the child’s mental health stability and treatment. If the child is young, parents are", "-29.323739547573496" ], [ "without being married. This idea protects the families pride and honor. Families who do not give their children up for marriage are usually criticized by the neighboring communities and are shown scrutiny. It is easier for the families to follow what everyone else is participating in. Families also marry their children off at a young age to make sure that their daughters have protection and security. Consequences There are many health consequences that spiral from a child giving birth at a young age. Children who are younger than the age of 18 are more likely to die do to aggressive", "-29.319128457340412" ], [ "can influence younger siblings. One study found that the younger sisters of teen mothers were less likely to emphasize the importance of education and employment and more likely to accept human sexual behavior, parenting, and marriage at younger ages. Younger brothers, too, were found to be more tolerant of non-marital and early births, in addition to being more susceptible to high-risk behaviors. If the younger sisters of teenage parents babysit the children, they have an increased probability of getting pregnant themselves. Once an older daughter has a child, parents often become more accepting as time goes by. A study from", "-29.307723712874576" ], [ "eight, with special attention given to preventing homesickness and other common issues seen in young children that are separated from their parents for the first time.", "-29.294755475828424" ], [ "socioeconomic status, income, and wealth accumulation than children of continuously married parents. These outcomes are associated with lower educational achievement.\nYoung men or women between the ages of 7 and 16 who had experienced the divorce of their parents were more likely than youths who had not experienced the divorce of their parents to leave home because of friction, to cohabit before marriage, and to parent a child before marriage.\nDivorce often leads to worsened academic achievement in children ages 7–12, the most heightened negative effect being reading test scores. These negative effects tend to persist, and even escalate after the divorce", "-29.23923723291955" ], [ "finding quality, reliable, and affordable child care. Age impact Age plays a large role in the strength of the effects on a mother caused by the motherhood penalty. A study revealed that the effects of motherhood are strong at a younger age and are eventually weakened when the mother reaches her 40s or 50s. Therefore, if a mother chooses to have children at a younger age, her career may be more affected by the penalty than mothers who choose to wait until after their career has been established. Women who have children at the beginning of their careers", "-29.20937554189004" ], [ "Sharing and building a life with another human being, then learning to live singularly, can be an adjustment that is more complex than a person could ever expect.\nAfter a long marriage, at older ages, the elderly may find it a very difficult assimilation to begin anew; but at younger ages as well, a marriage relationship was often a profound one for the survivor.\nA factor is the manner in which the spouse died. The survivor of a spouse who died of an illness has a different experience of such loss than a survivor of a spouse who died by an", "-29.14861063612625" ], [ "population ages so do individual members of the family. As with other elements of gerontology, this implies that it is not just the parents (and grandparents) who are older than was the case in prior decades. In the context of Family Aging the care-providing children are also older than was the case decades ago. These family aging dynamics have produced an extension of the concept of the \"sandwich\" generation into the more contemporary reality of the \"senior sandwich\" generation in which the \"60-year-old kids\" are the generation in the middle, taking care of (financially and personally) their 90-year-old parents", "-29.123277297010645" ], [ "an event triggered by a youth’s 18th (or 19th) birthday. In most cases, the youth were not emotionally ready to live independently. Youth living with their families don’t typically achieve independence until their mid- to late-twenties, whereas youth in care are \"expelled\" from the system at age 18, whether they are ready or not.\n–Anne Tweddle in Youth Leaving Care Report\nFor youth aged 24 years from the general public, 15% did not complete high school, 13.8% are unemployed, 6.4% are pregnant or are an unwed parent, and 5.5% are on public assistance. For youth from the foster care system of the", "-29.1097113059368" ], [ "two parents) both because boys are born more often than girls (about 1.05–1.1 to 1) and to compensate for deaths prior to full reproduction. Many European and East Asian countries now have higher death rates than birth rates. Population aging and population decline may eventually occur, assuming that the fertility rate does not change and sustained mass immigration does not occur.\nIn an article in the August 2009 issue of Nature, Myrskylä, Kohler and Francesco Billari argue that the previously negative relationship between \"development\", as measured by the Human Development Index (HDI), and birth rates has become J-shaped. The HDI is", "-29.106884691864252" ], [ "Also, children are hit hard. In 2014, 32% of those aged 0–17 are at risk of poverty or social exclusion, which is one child out of three. In the last ISTAT report, poverty is in decline.", "-29.092725052207243" ], [ "of pregnancy, maternal complications, and maternal death, it has been studied that age itself may cause fewer health risks for the mother or the offspring due to the prevalence of first-births among the younger ages. First births are higher among teenagers and are usually more complicated than higher-order births. Included in these observations are other complications related to delivery such as cephalopelvic disproportion, which is a condition in which the mother's pelvis is too small relative to the child's head to allow the child to pass. Cephalopelvis disproportion is most common in younger women. Many of these risks are higher", "-29.091342794679804" ], [ "2 million to 3.7 million U.S. children under age 18 may\nhave a lesbian, gay, bisexual, or transgender parent, and about 200,000 are being raised by same-sex couples.\nThere is ample evidence to show that children raised by same-gender parents fare as well as those raised by heterosexual parents. More than 25 years of research have documented that there is no relationship between parents' sexual orientation and any measure of a child's emotional, psychosocial, and behavioral adjustment. This data has demonstrated no risk to children as a result of growing up in a family with one or more gay parents. No", "-29.07009001917322" ], [ "Generations thus grow in synchronized, ten-year cycles; no barast needs to give his age, as simply stating his generation (if this is not simply inferred from his appearance) will give the needed information.\nAll children live with their mothers until they reach the age of ten; boys then go to live with their fathers. Children remain with their appropriate parent until the approximate age of 18. Despite this separation of sexes, the barast find the idea of considering either sex better than the other for any reason to be completely foreign (female barast do not suffer any large-scale physical incapacity due", "-29.05441711502499" ], [ "at birth in a cold southern hospital.\nWhen the families discover this error, it quickly becomes national news because of the fame of the powerful Cotapos family. The decision of what to do is settled in court. A court decision forces both teenagers to live for a year with their biological families. When they turn 18 they may decide for themselves who they would like to live with.", "-29.03726575151086" ], [ "greater than the difference between the second youngest and the eldest child. A commonly held rule of thumb is that it should be 10 years between the children. Another criteria may be that the child is born long after the first clutch of children and thus is not part of the companionship of their older siblings, missing out on the sibling bonding stage during childhood, developing more as a single child. Causes Sladdbarn can be born because the parents mistakenly believe that they can no longer have children due to their age and stop using contraceptives. Another reason for a", "-29.002787538222037" ], [ "9.3 for third-generation families. Child mortality also decreased over this time, with 7.2 children born to first-generation families living until their 21st birthday. That number increased to 7.9 children by the third generation. Life expectancy was higher for men than for women. Of the men who survived until age 21, the average life expectancy was 69.2 years. Over 55 percent of these men lived past 70; less than 15 percent died before the age of 50. The numbers were much lower for women owing to the difficulties of childbearing. The average life expectancy of women at the age of 21", "-28.959071657736786" ], [ "distances themselves from their family in order to solidify their transition into adulthood. Upon termination of the transition stage, maturity is established and one is fully prepared to enter the adult world. Early adulthood stage This era begins at around age 17 and lasts until about age 45, thus including the early adulthood transition. Although incorporating great amounts of both energy and satisfaction, this phase also entails a lot of stress due to the abundance of change. The 20s and 30s are typically a period of great pleasure, as many new experiences, relationships and aspirations are being pursued. People begin", "-28.918729622266255" ], [ "child grows older, death is still difficult to fathom and this affects how a child responds. For example, younger children see death more as a separation, and may believe death is curable or temporary. Reactions can manifest themselves in \"acting out\" behaviors: a return to earlier behaviors such as sucking thumbs, clinging to a toy or angry behavior; though they do not have the maturity to mourn as an adult, they feel the same intensity. As children enter pre-teen and teen years, there is a more mature understanding.\nAdolescents may respond by delinquency, or oppositely become \"over-achievers\": repetitive actions are not", "-28.909921939251944" ], [ "may be short simply because both parents carried genes for shortness and not because of inadequate nutrition. However, if substantially more than 5% of an identified child population have height for age that is less than the fifth percentile on the reference curve, then the population is said to have a higher-than-expected prevalence of stunting, and malnutrition is generally the first cause considered. Pregnant and lactating mothers Ensuring proper nutrition of pregnant and lactating mothers is essential. Achieving so by helping women of reproductive age be in good nutritional status at conception is an excellent preventive measure. A focus on", "-28.893532763118856" ], [ "system for many individuals and an integral part of their lives from young adulthood to old age. Family Family relationships tend to be some of the most enduring bonds created within one’s lifetime. As adults age, their children often feel a sense of filial obligation, in which they feel obligated to care for their parents. This is particularly prominent in Asian cultures. Marital satisfaction remains high in older couples, oftentimes increasing shortly after retirement. This can be attributed to increased maturity and reduced conflict within the relationship. However, when health problems arise, the relationship can become strained. Studies", "-28.891046282253228" ], [ "older than us, people who are 70 or 80 and they've got attitudes that don't have the deep peaks and valleys as someone who in adolescence who is faced with some things and they go, \"Fuck this, this sucks, how can we have any hope?\" These are people who been through the invention of the horseless carriage to the car to the TV set and are dealing with the internet. How do they view it? It's almost with disdain. This is the wisdom they can't give away, that is what I'm talking about and that youth doesn't have that timeline", "-28.872606963152066" ], [ "children and only 4% lived alone (although they had children). 2% were alone (i.e. single). It was observed that loneliness increased prevalence of depression in old-aged women more than old-aged men in Hong Kong. The study concluded that because of the known trend of older men (who could not find a wife in Hong Kong) marrying women across the border in the mainland, lifestyles adapted to the separation families. Economic In 1999, 48% of Chinese elderly relied on their spouses and 40% on their children, indicates Li Hong and Martin Tracy's survey. \"Worry about not having", "-28.850516231672373" ], [ "did not. Adults who are preoccupied were found to also try to please their parents as they were young, and have a sense of anger towards them. About half of the adults who were found more preoccupied than others were found to have experienced divorce between their parents earlier in life, as well as other negative life events such as death of a parent or sexual abuse. These life events cause the security of attachment between mother and child to decrease as the mother's availability, as well as responsiveness may decrease, no matter the maternal sensitivity experienced prior to these", "-28.84910979331471" ], [ "Male children for example are more valued than females because they will continue with the line or tribe. Girls are not so preferred because they leave the community when they get married. Boys are separated from their parents when they are around 12 or 13 years old to live separate in the men's houses. Around that age, they are taught by the fathers basic important skills such as fishing, building houses, making canoes or cutting and sewing sago palm leaves\".\n\"Girls on the other hand, they stay with their mother and taught household cores such as cooking, weeding around the house,", "-28.838066237600287" ], [ "period between 2001 and 2011. However, the number of children aged 5–14 fell by 11% (69,000). The population of people over 65 also grew by 11% (85,000) and they now represent 17% of the total population and for the first time there are more people over 65 than under 15 years of age. Significantly, in 2011 there were 230,000 people over 80 years of age. Migration Politicians and academics also noted that in the first years of the 21st century the previous trend of a net migration away from Scotland had reversed with significant immigration to Scotland from the rest", "-28.79104251024546" ], [ "(children) are allowed to stay with their parents until they turn 12. Late Pretties \"Late Pretties, or \"Crumblies\" (Littlies, uglies, and new pretties may refer to their parents as crumblies, even if they are still middle pretties), are parents, grandparents, great-grandparents, etc. They live in assisted living homes and receive life extension surgery that allows them to live into their middle hundreds and two-hundreds. Specials (Optional) Uglies are \"surveillanced\" (surveilled) by Special Circumstances to see if they have what it takes to become a Special. The security system in Pretty Town is \"too easy\" to hack and trick. It", "-28.78134259551007" ], [ "expectations have been pinpointed as a risk factor. A girl is also more likely to become a teenage parent if her mother or older sister gave birth in her teens. A majority of respondents in a 1988 Joint Center for Political and Economic Studies survey attributed the occurrence of adolescent pregnancy to a breakdown of communication between parents and child and also to inadequate parental supervision.\nFoster care youth are more likely than their peers to become pregnant as teenagers. The National Casey Alumni Study, which surveyed foster care alumni from 23 communities across the U.S., found the birth rate for", "-28.77990798477549" ], [ "process termed cumulative continuity. These children are more likely to have conflict-based relationships with their teachers and other children. This can lead to more severe problems such as an impaired ability to adjust to school and predicts school dropout many years later. Children who fail to properly self-regulate grow as teenagers with more emerging problems. Their peers begin to notice this \"immaturity\", and these children are often excluded from social groups and teased and harassed by their peers. This \"immaturity\" certainly causes some teenagers to become social outcasts in their respective social groups, causing them to lash out in angry", "-28.771248313831165" ], [ "possessed great wisdom and discernment, and occasional prophecy. They benefited from long life-spans (three times the life of a regular man) and could retain their youth until the very end of their days. Though the reason is not fully explained in the 'Tale of the Years', one factor that almost certainly contributed to their numerical decline was an extremely low birth rate, with many couples having only one child.", "-28.757617331808433" ], [ "would not favor the young when the prognosis is poor and the number of years of life saved would not be great, when dealing with scarcity.\n\nEmanuel co-wrote, \nThe complete lives system discriminates against older people. Age-based allocation is ageism. Unlike allocation by sex or race, allocation by age is not invidious discrimination; every person lives through different life stages rather than being a single age. Even if 25-year-olds receive priority over 65-year-olds, everyone who is 65 years now was previously 25 years. Treating 65-year-olds differently because of stereotypes or falsehoods would be ageist; treating them differently because they have already", "-28.754277531290427" ], [ "parents who move more than an hour away from their children after a divorce are much less well off than those parents who stayed in the same location Psychological Divorce is associated with diminished psychological well-being in children and adult offspring of divorced parents, including greater unhappiness, less satisfaction with life, weaker sense of personal control, anxiety, depression, and greater use of mental health services. A preponderance of evidence indicates that there is a causal effect between divorce and these outcomes.\nA study in Sweden led by the Centre for Health Equity Studies (Chess) at Stockholm University/Karolinska Institutet, is published in", "-28.74978952598758" ], [ "the north where it was around 7/1000. This resulted in about 1.5% (around 1 million) children living in the house of a recently divorced parent in the same year. Along with this, it has been shown that for the past 10 years or so, first marriages have a 40% chance of ending in divorce. And, for other marriages after a first divorce, the chance of another divorce increases. In 2003, a study showed that about 69% of children in American living in a household that was a different structure than the typical nuclear family. This was broken down into", "-28.723962230142206" ], [ "years. A majority of the research found that males were primarily the most \"left behind\" in education because of higher graduation dropout rates, lower test scores, and failing grades. They found that as males get older, primarily from ages 9 to 17, they are less likely to be labeled \"proficient\" in reading and mathematics than girls were.\nIn general, males arrive in kindergarten much less ready and prepared for schooling than females. This creates a gap that continually increases over time into middle and high school. Nationally, there are 113 boys in 9th grade for every 100 girls, and among", "-28.723069241503254" ], [ "often lessens over time. At least 80 percent of siblings over the age of 60 enjoy close ties. Causes According to Kyla Boyse from the University of Michigan, each child in a family competes to define who it is as an individual and wants to show that it is separate from its siblings. Children may feel they are getting unequal amounts of their parents’ attention, discipline, and responsiveness. Children fight most in families where there is neither any understanding that fighting is not an acceptable way to resolve conflicts nor any alternative way of handling such conflicts; in families", "-28.716873097699136" ], [ "the value placed in having children, the higher the age gap will be.\nAs people have chosen to marry later, the age differences between couples have increased as well.\nIn a Brown University study, it has been noted that the social structure of a country determines the age difference between spouses more than any other factor. One of the concerns of relationships with age disparities in some cultures is a perceived difference between people of different age ranges. These differences may be sexual, financial or social in nature. Gender roles may complicate this even further. Socially, a society with a difference in", "-28.715204094187357" ], [ "also a reference to a trend toward members living with their parents for longer periods than previous generations. Kimberly Palmer regards the high cost of housing and higher education, and the relative affluence of older generations, as among the factors driving the trend. Questions regarding a clear definition of what it means to be an adult also impacts a debate about delayed transitions into adulthood and the emergence of a new life stage, Emerging Adulthood. A 2012 study by professors at Brigham Young University found that college students were more likely to define \"adult\" based on certain personal abilities and", "-28.657050982350484" ], [ "age.\nAccording to Arnett, the term \"young adulthood\" suggests that adulthood has already been reached, but most people in the emerging adulthood stage no longer consider themselves adolescents, but do not see themselves entirely as adults either. In the past, milestones such as finishing secondary school, finding a job, and marrying clearly marked the entrance to adulthood, but in modern, post-industrialized nations, as positions requiring a college degree have become more common and the average age of marriage has become older the length of time between leaving adolescence and reaching these milestones has been extended, delaying the age at which many", "-28.65000091488764" ], [ "birth whereas an older women will be okay. Young children who deliver babies are subject to diseases and many health related problems that can prevent them from conceiving another child. Furthermore, children who marry at a young age are typically not educated. They cannot use their education as an outlet to get out of abusive relationships. These children grow up taking the inferior role in the household and are forced to obey their husbands. Child brides are sheltered from their community and are not allowed to participate in communal events. Child brides who run away from their husbands are subject", "-28.626168330549262" ], [ "Panel Survey and the German Socio-Economic Panel suggests that having up to two children increases happiness in the years around the birth, and mostly so for those who have postponed childbearing. However, having a third child does not increase happiness.", "-28.566743698349455" ], [ "intake - often considerably ‘after’ - were accepted by some primary schools in August, while similar children living in the catchment areas of other primary schools were obliged to wait until February. Thus, by the time ‘younger’ pupils came together for first year at the local secondary school, they frequently found themselves amongst children who were up to ten months older which, by dint of puberty and all factors attendant, was often socially awkward for the younger children affected. It was equally awkward when more mature children finished up amongst a majority of those less mature.\nSo, due to convenience, and/or", "-28.54469422873808" ], [ "adapting well, later suffer from anxiety in romantic relationships with men. Studies also showed that girls who were separated from their fathers at a younger age tended to be more angry toward the situation as they aged. Anger and sadness were also observed at common feeling in adolescents who had experienced parental divorce. Academic and socioeconomic Frequently, children who have experienced a divorce have lower academic achievement than children from non-divorced families\nIn a review of family and school factors related to adolescents' academic performance, it noted that a child from a divorced family is two times more likely to drop", "-28.530443532567006" ], [ "their responsibilities. These parents usually have their reputations ruined. Across cultures, females tend to be married earlier than males. Boys are married later than girls in 85 percent of 45 cultures. In the remaining 15 percent, both sexes marry at a roughly the same age. The differential in age of marriage for males and females is from one to five years in 78 percent of 37 societies and between six and ten years in another 18 percent. Consequences According to the book of Eleanor H. Ayer, another situation that could lead teenagers to an early marriage is often unprotected sex,", "-28.518264771511895" ], [ "Estimates indicate that 30% of preschool age children (ages 4–5) do not attend school, and for the most vulnerable populations, the poor and rural, this calculation exceeds 40 percent. Among primary school age children (ages 6 to 12), coverage is almost universal; however there is still a need to incorporate 5 million children in the primary education system. These children live mostly in remote areas, are indigenous or Afro-descendants and live in extreme poverty.\nAmong people between the ages of 13 and 17 years, only 80% are full-time students in the education system; among them only 66% advance to secondary school.", "-28.51314345712308" ], [ "were 29 and below while 2011 had only 106 people. Therefore, the mean age is different because in 2011 its 42.7 while 2001 was 37.57 This also gives further evidence to the current ageing population of the country Marital and civil partnership status In 2001 the large majority 173 out of 277 people were married, remarried or technically still married. 53 were widowed or divorced and 51 are single (never married). In 2011 however there was the added option of same-sex civil partnerships. Of this 4 out of the 304 people were in a same-sex civil partnership and 56.9% were", "-28.465877249196637" ], [ "is marked by 'the importance of school, teams, classes, friends, gangs and organised activities ... and the adults who run those.' Nevertheless, recent research suggests that \"most children do not cease sexual development, interest and behavior\" at this time: rather, they \"cease to share their interest with adults and are less frequently observed.\" Because \"they've learned the rules ... [they] fit in with the grown-up's belief that they're not interested. But the curiosity about it all continues, and there's quite a lot of experimenting going on between them.' alongside other pursuits\nBut while the eight-year-old still has \"years to wait until puberty, adolescence", "-28.462680111071677" ], [ "children and teenagers (0–19 years old) make up 22.4% of the population, while adults (20–64 years old) make up 61.1% and seniors (over 64 years old) make up 16.5%.\nAs of 2000, there were 472 people who were single and never married in the municipality. There were 569 married individuals, 60 widows or widowers and 50 individuals who are divorced.\nAs of 2010, there were 170 households that consist of only one person and 27 households with five or more people. In 2000, a total of 462 apartments (83.7% of the total) were permanently occupied, while 76 apartments (13.8%) were", "-28.45591022773442" ], [ "teenagers (0–19 years old) make up 22.2% of the population, while adults (20–64 years old) make up 58.1% and seniors (over 64 years old) make up 19.7%.\nAs of 2000, there were 1,377 people who were single and never married in the municipality. There were 1,642 married individuals, 222 widows or widowers and 84 individuals who are divorced.\nAs of 2000, there were 359 households that consist of only one person and 136 households with five or more people. In 2000, a total of 1,221 apartments (71.9% of the total) were permanently occupied, while 351 apartments (20.7%) were seasonally occupied and 126", "-28.454337004266563" ], [ "children (up to 7) did not distinguish them while older children (above 11) did.", "-28.449396400610567" ], [ "injury to older adults in the common household, therefore impacting upon their capability to successfully age in place. Among the greatest threats to an ability to age in place is falling. According to the CDC, falls are the leading cause of injurious death among older adults. Therefore, engagement in fall prevention is crucial to one's ability to age in place. Common features in an everyday household, such as a lack of support in the shower or bathroom, inadequate railings on the stairs, loose throw rugs, and obstructed pathways are all possible dangers to an older person. However, simple and low-cost", "-28.448928957863245" ], [ "which could lead to a pregnancy. Other factors that also lead to marriage are love, lust, fear of losing their partner, abuse, extreme parental control, sexual harassment and step-family difficulties. Results One in three teen marriages ends in divorce by the age of 25. Additionally, according to Bob and Sheri Stitof, \"marriages and divorce rates have increased by 68 percent since 1995. Also, one out of every four teenagers have parents that are divorced.\"", "-28.434484051016625" ], [ "and teenagers (0–19 years old) make up 20.4% of the population, while adults (20–64 years old) make up 58.4% and seniors (over 64 years old) make up 21.2%.\nAs of 2000, there were 4,580 people who were single and never married in the municipality. There were 5,256 married individuals, 571 widows or widowers and 530 individuals who are divorced.\nAs of 2000, there were 1,386 households that consist of only one person and 249 households with five or more people. In 2000, a total of 4,274 apartments (93.7% of the total) were permanently occupied, while 210 apartments (4.6%) were seasonally", "-28.419528923586768" ] ]
2zbojf
what happens to all of the atoms in our body when we die?
[ "To many creatures people are just a walking meat pile. The only reason we don't get eaten is because we walk too fast (and our internal defense system kills anything we can't walk away from). After death our bodies get eaten by bacteria, fungi, insects, small animals and whatnot. Our atoms eventually become atoms of animals and plants and earth and wind.", "A kinda relevant & amp; beautiful quote by Richard Feynman - & gt; ... It means the atoms that are in the brain are being replaced: the ones that were there before have gone away. & gt; **So what is this mind of ours: what are these atoms with consciousness? Last week's potatoes! They now can remember what was going on in my mind a year ago—a mind which has long ago been replaced.** To note that the thing I call my individuality is only a pattern or dance, that is what it means when one discovers how long it takes for the atoms of the brain to be replaced by other atoms. The atoms come into my brain, dance a dance, and then go out—there are always new atoms, but always doing the same dance, remembering what the dance was yesterday. So not just after death, even when we live our atoms are constantly getting refreshed/replaced by new ones from the environment.", "Interestingly, your body is constantly refreshing itself with new atoms and a few years it is most likely that every atom in your body will be one that is not in you now. you are not born live your life with a single set of atoms. What happens to your atoms when you die is the same as what is constantly happening to your atoms your entire life. That is you shed them and they go back to the earth to back to the earth to be recycled. Except in this example they are not being replenished only shed.", "They chemically react with the environment the body is put in. Bacteria and countless other organism in the air and the dirt eat and reproduce in and around it basically and changing the chemical make up of the body into the byproducts of decomposition. This can expose a lot of good nutrients (N, CO2) into things like soil, so you turn into cool natural fertilizer.", "This comment is explained by like every post. But I'll help you get a hold of what's going on. So basically you eat and get nutrients and all those molecules that make up your body get replaced but the main structures like cells are still the same. If you look at cells real time under an electron microscope you will see basically a bunch of vibrating molecules. Atoms get replaced all the time, that's thermodynamics in action. When you die you aren't a concept. In fact you are linking the atoms that make \"you\" as \"you\", but this is not a concept. You,.. is well, a recognization of matter. I think therefore i am. When you die the atoms just go to whatever next they thermodynamically change too. A lot of carbon is eatan up and that produces carbon dioxide from cellular respiration. Your nitrates are eaten by bacteria. Maybe some bugs or animals the atoms for food. You've got to think of atoms as simple basic building blocks of the universe. They are just tiny little grains of salt that conform to structures big enough for us to comprehend. In all reality atoms do what they do, the work with the pyshics of thermal dynamics and just go from a more organized state to a more dispersed state.", "Harvard studies suggest postmortem atomic mass undergoes a simple transformation process into what they dubbed as \"white gold\". Some consideration was put into the study after the debunking of the popular theory that several MIT researchers dubbed \"Fecal Earth\". Yale Prof. Antony Gibbs says \"The MIT theory that the remains of the deceased turn into earth's shit upon decomposition is one that could only come out of an institute of technology\" he continues to say, however, \"Harvard's own theory that the matter becomes earthly semen is preposterous, even if more credible.\" A response from Harvard has yet to cum foreword.", "As we decompose, they return to the environment. Some, such as those in bones, are heartier than others, and stick around. But the rest return to the ecosystem. I read somewhere that this return to the system is so dramatic that every person alive has a substantial number of atoms in them that once belonged to Shakespeare. > If you live to 75 years, some 500 trillion of his atoms enter you during your life. URL_0 ", "TIL I'm a meat pile consisting of other meat piles my mother consumed", "They prove someone wasted too much money to store your remains." ]
[ [ "can boil me, burn me, drown me, scatter me — but you cannot destroy me: my little atoms would merely deride such heavy vengeance. Death can do no more than kill you.", "-28.958840216873796" ], [ " Although the bodies are more or less immortal, there comes a time when the aliens destroy them when they feel the souls have progressed to an acceptable level. Even then, not all of the bodies are destroyed, and some continue on with the spaceship as it travels about the galaxy. Music Inside / Outside is the inspiration for Kevin Healey's song, \"Automatic Prophet\" (lyrics by Charlie Weber).", "-28.758816737798043" ], [ "the universe — such a great universe, and so grand a scheme of things. Not even Death can rob me of that honour. For nothing can alter the fact that I have lived; I have been I, if for ever so short a time. And when I am dead, the matter which composes my body is indestructible—and eternal, so that come what may to my 'Soul,' my dust will always be going on, each separate atom of me playing its separate part — I shall still have some sort of a finger in the pie. When I am dead, you", "-27.91077760932967" ], [ "formed, inhibiting further decomposition. Advanced Decay During advanced decay, most of the remains have discolored and often blackened. Putrefaction, in which tissues and cells break down and liquidize as the body decays, will be almost complete. A decomposing human body in the earth will eventually release 32g of nitrogen, 10g of phosphorus, 4g of potassium, and 1g of magnesium for every kilogram of dry body mass, making changes in the chemistry of the soil around it that may persist for years. Dry/Skeletonized Remains Once bloating has ceased, the soft tissue of remains typically collapses in on itself. At the end", "-27.842858174059074" ], [ "unknown if the immortality effects extends to other users presumed dead. The OZ Explosion In the experiment Norman Osborn performs in an attempt to give himself powers, there is an explosion which exposes several people to OZ. Otto Octavius (Doctor Octopus) Norman Osborn's head scientist who uses a set of mechanical arms for multi-tasking and handling hazardous substances. In the initial explosion these arms are fused to his body. It is first thought that he controls only the arms, but this is later disproven. The OZ explosion grants Doc Ock ferrokinesis (the ability to control metal).", "-27.563908252399415" ], [ "is provided by fire, and when a being dies, the body becomes the earth, the body contains water, breathe air and exist in ether or space.", "-27.41083916032221" ], [ "material, now drained of radioactivity. The boy dies next day from radiation burns.\nShortly afterwards, a young doctor named Unwin (Neil Hallett) is having an intimate encounter with a nurse (Marianne Brauns) in a radiation lab at the hospital when something off-camera reduces him to a charred corpse and leaves the nurse out of her mind and screaming.\nRoyston hypothesizes that a form of life that existed in distant prehistory when the Earth's surface was largely molten had been trapped by the crust of the Earth as it cooled; every 50 years there is a tidal surge that these creatures feel, which", "-27.355847582570277" ], [ "Atom (Krauss book) Synopsis In this book Krauss discusses creating parts of an oxygen atom, the primary atoms of the Big Bang. Then he follows it through the remaining history of the Universe. As time has been passing by, the atom was a part of a supernova and star dust, star and planet systems, and, ultimately, a part of living cells. Review In his review Chris Lavers of The Guardian stated \"Krauss weaves his cosmic story around the life of a single oxygen atom, from the time it was just a twinkle in the universe's eye to the eventual death", "-27.26714738955343" ], [ "Mighty Atom (1988 video game) Gameplay The game consists of a total of ten stages. The game's objective is to recover the money that was stolen from Professor Ochanomizu's lab. Instead of the usual extra lives, Atom's remaining life energy is determined by the amount of uranium (abbreviated \"uran\" in the game) he has left in his disposal. Atom begins each stage with 300 uran points, that will gradually decrease with each second. Every time Atom gets hit by certain enemies, falls from a pitfall, or runs out of time, the professor will use his remaining uran points to rebuild", "-26.7392711105349" ], [ "death was impossible because the body was merely a container for \"a universal energy\", and that this had \"been known for a very long time\". When he dies, Edmonds anticipates that \"My energy will return to where it came from – part of a massive, incomprehensible universal web of energy\". EMP Pad On 7 June 2016, Edmonds said on Twitter that an Electromagnetic Pulse device costing £2,315 was \"A simple box that slows ageing, reduces pain, lifts depression and stress and tackles cancer. Yep tackles cancer!\". Edmonds provoked further criticism after tweeting to a man with kidney cancer, lymph node", "-26.35872630251106" ], [ "stage until it finally reaches the dry stage in which the body has basically become a skeleton. About a month passed before \"1-81\" entered the dry stage. Microbes and insects had consumed most of his soft tissues, and the sun had dried out what was left on the bones. Present Today, the Body Farm covers 2.5 acres (10,000 m²) of land and is surrounded by razor-wire and fences. Instead of just one body, approximately forty bodies are studied at the same time in different scenarios. The information gathered by studying how the body decomposes because of digestive enzymes, bacteria, and insects", "-26.26939951837994" ], [ "is ultimately left unresolved after a final narrative twist. The First Death In The First Death a place is denied to the mutilated body which grinds against the rocks and suffers continuing degradation, physical and mental, as even the mechanisms of memory are dislocated. Yet the bond between person and body that ensures life still persists, and, \"at that point without substance/ where the world collides and takes off\", the mechanical instincts of the cosmos rumble into action and sling this irreducible substance again into space - prompting, perhaps, a future regeneration. Critical reception Poena Damni is the most widely", "-26.062661477917572" ], [ "do the work alone.\nAtom was repaired, but got all his memories erased, however Uran and Atom's friends went to his rescue and attempted to protect him from Lamp who went on a rampage against Dr. Tenma and Atom upon learning about their hideout.\nAtom recovered his memories and defeated Lamp, afterward Dr. Tenma fled and later attacked the science ministry where he revealed Atom his story.\nDr. Tenma told Atom that he had rebelled against him just like the dead Tobio did and wanted him to join his side, but Atom refused.\nWith this, Dr. Tenma started a time bomb and tried to", "-25.84884212151519" ], [ "to survive. For a year my mother received no salary. It was stolen. And we traded in order to survive and buy bread.\n They did not have to start \"conquering us\", turning our lives into one continuous strip of hell. Our lives were already hard enough without bombs and \"Grad\" installations. When the rocket hit Grozny market I was three blocks away from the place where it landed. I saw fire from the ground to the sky, and then I heard a deafening explosion.\n In my legs there were sixteen fragments of shrapnel.\n And what happened to the people who", "-25.845619347994216" ], [ "in 1975, but they were never returned to the chapel which held them from 1966 to 1975. Some of the ashes were transferred to the National Human Radiobiology Tissue Repository at Washington State University, which keeps the remains of people who died having radioisotopes in their body.\nIn a 1975 study of the eighteen people who received plutonium injections in Manhattan Project experiments, CAL-1 (Albert Stevens) was shown to have received by far the highest dose to his bones and liver, calculated as 580 and 1460 rad, respectively. The dose of 580 rad was calculated based on the \"average skeletal dose\"", "-25.7673801491037" ], [ "agitate the molecules in solid matter so that it loses cohesion, thereby melting the object in question. Christopher has not been shown to be able to produce actual fire. He has melted bullets while they are in the air, and can even melt people with fatal effects. Heroes Reborn In the Heroes Reborn universe created by Franklin Richards, Bruno Horgan/Melter appeared as a member of Loki's Masters of Evil. Marvel Cinematic Universe The Melter appears in Iron Man: Coming of the Melter, a one-shot set in the Marvel Cinematic Universe between the events of The Avengers and Iron Man 3.", "-25.65098666920676" ], [ "the isotope is successfully pushed beyond its limits, completely destroying it, although the Deltatron has also been destroyed in the process. All trace magnetism which it had been produced after every energy absorption has now disappeared.\nThe Earth has been saved from destruction by the efforts of the Office of Scientific Investigation (OSI). Life returns to normal, as shown by lead OSI agent, Dr. Jeffrey Stewart and his pregnant wife Connie (Jean Byron) completing the purchase of their first house and moving in shortly thereafter. Production notes For the Deltatron, the film used ten minutes of footage of the atom smasher", "-25.576522965275217" ], [ "during a fight with Megala, who had taken control of Firestorm's body, Atom is forced to absorb a massive amount of energy released which splits his molecules apart into the timestream. One of these pieces is found in the 31st Century, where he names himself Nathaniel Adym. Adym had become an agent of Echo, a covert branch of the Science Police assigned to monitor the timestream. As part of his duties, he had interacted with members of the Legion of Super-Heroes stranded in the past, in Legion Lost, along with his subordinates Agent Jocelyn Lure and Agent Yera Allon. Adym", "-25.375414956186432" ], [ "immortality has yet to be shown and that we may still doubt the soul's existence after death. For, it may be that the next death is the one under which the soul ultimately collapses and exists no more. Cebes would then, \"... rather not rely on the argument from superior strength to prove the continued existence of the soul after death.\"\nSeeing that the Affinity Argument has possibly failed to show the immortality of the soul, Phaedo pauses his narration. Phaedo remarks to Echecrates that, because of this objection, those present had their \"faith shaken,\" and that there was introduced \"a confusion", "-25.34436253489548" ], [ "End organ damage End organ damage usually refers to damage occurring in major organs fed by the circulatory system (heart, kidneys, brain, eyes) which can sustain damage due to uncontrolled hypertension, hypotension, or hypovolemia.", "-25.2768100037938" ], [ "highly unstable element and decays by emitting alpha particles. Due to its strong radioactivity, it would definitely be extremely toxic, although significant quantities of nihonium (larger than a few atoms) have not yet been assembled.", "-25.226790818716836" ], [ "587 people had been confirmed killed. The explosion took place on one of the busiest streets in Mogadishu; victims included senior civil servants, five paramedic volunteers, a journalist, an American-Somali man, a medical student and 15 children. The full death total may never be known with certainty, as the remains of many people would not be found due to the intense heat (which could be felt 100 metres away from the scene), and others were buried quickly by relatives following Islamic custom. Around 160 bodies could not be recognised, doctor Aden Nur said, and they were buried by the government", "-25.20076289481949" ], [ "surface enough to melt it. By that point, all life on the Earth will be extinct. The most probable fate of the planet is absorption by the Sun in about 7.5 billion years, after the star has entered the red giant phase and expanded beyond the planet's current orbit. Human influence Humans play a key role in the biosphere, with the large human population dominating many of Earth's ecosystems. This has resulted in a widespread, ongoing mass extinction of other species during the present geological epoch, now known as the Holocene extinction. The large-scale loss of species caused by human influence", "-25.13805395097006" ], [ "again a hundred times,\n          That my bones turn to dust, whether my soul remains or not,\n          Ever loyal to my Lord, how can this red heart ever fade away?", "-25.134217576811352" ], [ "even withstand a nuclear detonation), and is bulletproof. His bodily mass can be dispersed, but for all intents and purposes, it is invulnerable, even from many forms of magic in the DC Universe.\nRegeneration: He is able to regenerate and/or assimilate lost or damaged tissue, although he needs to be reasonably intact for this process to begin. For example, Plastic Man was once reduced to individual, separate molecules and scattered across the Atlantic Ocean for centuries. He was only capable of returning to his usual form after the rest of the League were able to gather enough of his molecules and", "-25.128527031221893" ], [ "it allegedly \"deals with its enemies.\" Deaths from ingesting radioactive materials According to the IAEA, in 1960, a person ingested 74 MBq of radium (assumed to be ²²⁶Ra) and this person died four years later. Harold McCluskey survived 11 years (eventually dying from cardio respiratory failure) after an intake of at least 37 MBq of ²⁴¹Am (He was exposed in 1976). It is estimated that he suffered doses of 18 Gy to his bone mass, 520 Gy to the bone surface, 8 Gy to the liver and 1.6 Gy to the lungs; it is also claimed that a post", "-25.032601739367237" ], [ "among themselves when Mr Atom realized they planned to destroy him and they were all apparently destroyed in a giant explosion. However, the blast had actually thrown Mr. Atom forward in time, to 2053, a world where almost everything was run by atomic power, which Mr Atom found out from an inhabitant, and he decided it would be the perfect conquest for him. Captain Marvel travelled to this future after being told by Shazam of the danger which threatened it and battled Atom again, who forced Marvel off by threatening to cause the destruction of the world using the machinery.", "-24.98125646985136" ], [ "but the organism dies within his body; he realizes that his blood possesses antibodies that can kill the organism due to his heritage.\nThe town is evacuated, and before his death, General Kenneth Lavigne (Rick Herod) orders a nuclear strike. However, Carrie and Frank realize this will cause disaster, as the organism can use any heat or light to grow further. Frank covers Carrie in his blood for protection and they fly in a stolen helicopter back to Fort Lambert so they can kill the organism. Inside, Carrie finds a boil on the vines with Glen's body inside and accidentally bursts", "-24.90405252572964" ], [ "it will make it to the Earth's surface in one piece, disintegrate before breaching the atmosphere, or break up and explode just before reaching the surface. A metallic object tends to be made up of iron and nickel alloys. These metallic objects are the most likely to impact the surface because they stand up better to the stresses of ram pressure induced flattening and fragmentation during deceleration in the atmosphere. The stony objects, like chondritic meteorites, tend to burn, break up, or explode before leaving the upper atmosphere. Those that do make it to the surface need a minimum energy", "-24.89807245557313" ], [ "an amnesiac, brain-dead Captain Atom, now paralleling Breach both as secret origins, and as final fate. Powers and abilities Breach possesses vast super-strength, flight, energy blasts, minor atomic transmutation and huge atomic absorption, he is able to \"melt\" biological substances only with a touch.", "-24.88373686732666" ], [ "Atom's first appearance in a DC comic was in Justice League of America #137, a crossover issue depicting Captain Marvel's first meeting with Superman. With Brainiac projecting a force field around him a much larger Mr Atom attempts to wreck a futuristic city on Earth-One called Tomorrow. Destroying the city meant the three super-speedsters had to repair it, which was causing increased rotation of the Earth. Atom easily withstood the efforts of the Golden and Silver Age Green Lanterns and Flashes, the god Mercury and Ibis the Invincible to subdue him, even when Brainiac's forcefield around him was turned off", "-24.87899748898053" ], [ "energy of certain molecules, such as when he notes the energy signature of the Flash and remarks that his molecules seem to be sparking with fire or lightning. He also does not need air, food or water to survive. Armageddon 2001 An alternate future Captain Atom is featured prominently in the 1991 series Armageddon 2001. A tragedy drives him insane and he uses his powers in vengeance. Unfortunately, it also triggers a chain of events which brings Monarch to the present 'time'. Kingdom Come Captain Atom appears briefly in flashback sequences of Alex Ross and Mark Waid's 1996 mini-series Kingdom", "-24.86498254101025" ], [ "Last Armageddon Story The humans, who breathed the toxin-filled air on Earth's surface, became one with the Earth and kept dissolving. The history of humanity ended and dominion of the planet returned to the demons. These mutant creatures did not depend on oxygen to survive. Therefore, they were able to breathe the air and use the land. Meanwhile, an army of robots wage World War IV against the demons in order to conquer what is now known as Makai - the Demon World. These robots came to the planet on a wave of energy that created an explosion that turned", "-24.853606095479336" ], [ "rate is 4%. For those that do survive, 98% are alive after 1 year, 79% are alive after 5 years, and 49% are alive after 10 years. Many die from the breathing pattern complications following tracheal collapse if they survive the initial incident. 40% of tracheal collapse survivors do not die from the complications related to tracheal collapse.", "-24.78072036861704" ], [ "Naka, some 650 meters from the hypocenter at Hiroshima, who would travel to Tokyo and then with her death on August 24, 1945 was to be the first death officially certified as a result of radiation poisoning, or as it was referred to by many, \"Atomic bomb disease\". It was unappreciated at the time but the average radiation dose that will kill approximately 50% of adults, the LD50, was approximately halved, that is, smaller doses were made more lethal, when the individual experienced concurrent blast or burn polytraumatic injuries. Conventional skin injuries that cover a large area frequently result in", "-24.725347203668207" ], [ "energy of other people, leaving behind smoldering skeletons. This power was necessary for his survival as his own body is in a constant state of hunger for energy that it cannot sustain on its own. During this time, Martin Stein, one half of the Firestorm matrix (Ronnie Raymond being the other half) learned he was dying and decided to destroy all the nuclear weapons in the world. This did not sit well with Earth's governments, particularly the United States, who sent the Suicide Squad to Times Square where Firestorm was holding a press conference. Things quickly got out of control", "-24.68554025515914" ], [ "or suicide. After death, the remains of an organism re-enter the biogeochemical cycle. Organisms may be consumed by a predator or a scavenger and leftover organic material may then be further decomposed by detritivores, organisms that recycle detritus, returning it to the environment for reuse in the food chain.\nOne of the challenges in defining death is in distinguishing it from life. Death would seem to refer to either the moment life ends, or when the state that follows life begins. However, determining when death has occurred is difficult, as cessation of life functions is often not simultaneous across organ systems.", "-24.68305107485503" ], [ "in 1975 without the consent of surviving relatives. Some of the ashes were transferred to the National Human Radiobiology Tissue Repository at Washington State University, which keeps the remains of people who died having radioisotopes in their body.\nThree patients at Billings Hospital at the University of Chicago were injected with plutonium. In 1946, six employees of a Chicago metallurgical lab were given water that was contaminated with plutonium-239 so that researchers could study how plutonium is absorbed into the digestive tract.\nAn eighteen-year-old woman at an upstate New York hospital, expecting to be treated for a pituitary gland disorder, was injected", "-24.68292335420847" ], [ "are able to acquire replacement bodies on a continual basis. Those who have lived for multiple lifespans are called Meths, a reference to the Biblical figure Methuselah. The very rich are also able to keep copies of their minds in remote storage, which they update regularly. This ensures that even if their stack is destroyed, they can be re-sleeved. People who commit serious crimes are imprisoned \"on stack\". Their consciousness is preserved and stored virtually, sometimes for decades, while their body is sold to the highest bidder to be used for re-sleeving another person.\nNumerous colony planets exist apart from Earth;", "-24.681588138686493" ], [ "the atmosphere prompted them to publish Atomic Suicide? in 1957 in which they warned of grave consequences for the planet and for humankind if radioactivity was exploited as a world fuel. Walter Russell died in 1963. Lao died in 1988.", "-24.61539902811637" ], [ "low to the ground. At least 16 civilians lost limbs, at the scene or by surgical amputation, and three lost more than one limb.\nDoctors described removing \"ball-bearing type\" metallic beads a little larger than BBs and small carpenter-type nails about 0.5 to 1 inch (1 to 3 cm) long. Similar objects were found at the scene. The New York Times cited doctors as saying that the bombs mainly injured legs, ankles, and feet because they were low to the ground, instead of fatally injuring abdomens, chests, shoulders, and heads. Some victims had perforated eardrums.\nMBTA police officer Richard H. Donohue Jr. (33)", "-24.614600136104855" ], [ "each other. They also did not seem to live and die the way mortals do. Illyria claimed she lived seven lives at once, and even after her death, releasing her essence from the sarcophagus was enough to resurrect her into the nearest host. In short, under the Old Ones' rule, the world was a living hell.\nAt some point, the Old Ones lost their claim over this reality; some were killed while others were driven from this dimension. The corpses of the greater fallen Old Ones were placed in stone sarcophagi, while their powers were drained and embedded in jewels affixed", "-24.613508664624533" ], [ "By now the world officials had decided to give in to Mr Atom and sent a delegation. But once again he was apparently destroyed, this time in an atomic furnace when the engines were turned on after Marvel disguised himself as part of the delegation to block Mister Atom from the machinery.\nHowever, Mister Atom was re-introduced in 1976, by which time DC Comics had purchased the rights to use the Captain Marvel characters; Captain Marvel's enemy King Kull used his advanced scientific acumen to bring Atom back to the 20th century and employed his help battling Shazam's Squadron of Justice.", "-24.6105856107024" ], [ "he got this wretched book and read it!\nIn July, 1945, when the world's first atomic bomb was exploded in the Trinity Test, Oppenheimer was famously supposed to have quoted a saying from the Bhagavad-Gita: 'Now I am become death, the destroyer of worlds.' Oppenheimer had studied Sanskrit at Berkeley and it was Cherniss who introduced Oppenheimer to his Sanskrit teacher, Arthur W. Ryder. Oppenheimer later claimed to have said those words but there is no contemporary evidence. In 1945, after Hiroshima and Nagasaki when Oppenheimer had become one of the world's most famous scientists, Cherniss saw him at Berkeley.\nIn", "-24.597787111299112" ], [ "immediately clear. According to the BBC and AFP, 78 people died in the explosion, while The Independent said that \"more than 100\" people died, and CNN said that \"[a]t least 121\" were killed. By the day after the incident, the death toll had been increased to 150. An accurate death toll was reportedly difficult to establish, due to the condition of the bodies, many of which were badly burned. 45 people were reported injured, 27 of whom were, according to officials at a local hospital, in critical condition after the incident. Some of the injured were taken to Jaʿār for", "-24.537199467769824" ], [ "holding electrons and protons apart are no longer strong enough to do so. The core collapses in on itself exceedingly quickly, and becomes a neutron star or black hole; the outer layers of the original star fall inwards and may rebound off the newly created neutron star (if one was created), creating a supernova. Controlled structure demolition Large buildings of various structural types such as masonry, steel frame, or reinforced concrete may be reduced to an easily removed pile of rubble by selective destruction of supporting elements by sequenced and confined explosions. The goal is to confine the materials to", "-24.469963606941747" ], [ "euthanised in the three months following the explosion: 10% were killed by the air blast, 15% were killed by radiation, and 10% were killed by the researchers as part of later study. The most famous survivor was Pig #311, which was (reportedly) found swimming in the lagoon after the blast and was brought back to the National Zoo in Washington, DC. The mysterious survival of Pig #311 caused some consternation at the time and has continued to be reported in error. However, an investigation pointed to the conclusion that it had neither swum in the ocean nor escaped the blast;", "-24.469921555079054" ], [ "its end, and it caused the carbon dioxide couldn't be discharged from the space of 40 cm diameter and 200 cm high, which is barely enough for a person to stand in. And eventually it nearly killed me.\nDuring the last 30 minutes in the pipe when I felt lack of oxygen and waited like for a lifetime to be rescued, my head was filled with the images of the rescue scenes during the \"May 12 Wenchuan earthquake\", that and various coalmine mishap scenes. At that moment, I think I finally understood the \"fragility of life\"! I ceaselessly told myself, \"Breathe! Breathe! I", "-24.46621752773717" ], [ "series Atom re-appears as the protagonist in the 2003 series; a robot with the ability to think and reason ('Kokoro', or Japanese for 'heart and soul'). Atom was created by Doctor Tenma as a ‘replacement’ for Tobio, his deceased son. Tenma, overcome with grief, decided to make an identical robot copy, which he will raise just like his own. Tenma, however, during the project lost the trust of his fellow scientists, who had thought that he has been overcome with grief and longing for his son and as a result went insane. Tenma, who was indeed displaying signs of insanity", "-24.46305363799911" ], [ "are alive must first go to the Court of Fire (huoting) in order to refine their form and spirit, while those who rise to heaven after their death must first go the Courtly Pond (tingchi) in order to refine their celestial soul(s) (hun) and body frame. All this accords with the results of their practice (gongye). \nThe third is \"transfer by extinction\" (miedu 烕度, the Chinese Buddhist name for \"Nirvana\"), \"The mortal form (shixing) does not become ashes, as if the corpse is guarded by the Great One (Taiyi) itself. Sometimes, after years, the corpse reverts to be a human", "-24.43534972582711" ], [ "that even if life were destroyed, life could evolve again, perhaps in a worse way. So the world-exploder would need to destroy the possibility of life, but that is in principle beyond human power. To this, J. J. C. Smart replies,\nI am also a little puzzled by Watkin's remark that the pain minimizer would have to destroy the very possibility of life. If the sentient forms of life were totally destroyed, it might be that the sentient forms would be most unlikely to evolve. This is on the supposition, held by some experts, that the evolution of higher forms of", "-24.34623305022251" ], [ "state of perfect preservation of the skeleton, the fibrous tissues of the muscles (still supple and firm), of the ligaments, and of the skin, and above all the totally unexpected state of the liver after 46 years. One would have thought that this organ, which is basically soft and inclined to crumble, would have decomposed very rapidly or would have hardened to a chalky consistency. Yet, when it was cut it was soft and almost normal in consistency. I pointed this out to those present, remarking that this did not seem to be a natural phenomenon.\"", "-24.33980745525332" ], [ "that there may be up to 4,000 excess cancer deaths among the approximately 600,000 most highly exposed people. Of the 100 million curies (4 exabecquerels) of radioactive material, the short lived radioactive isotopes such as ¹³¹I Chernobyl released were initially the most dangerous. Due to their short half-lives of 5 and 8 days they have now decayed, leaving the more long-lived ¹³⁷Cs (with a half-life of 30.07 years) and ⁹⁰Sr (with a half-life of 28.78 years) as main dangers.\nIn March 2011, an earthquake and tsunami caused damage that led to explosions and partial meltdowns at the Fukushima I Nuclear", "-24.33880949360173" ], [ "can be temporarily “killed” by severely damaging his body, but he will always come back, seemingly regenerating his body entirely in the process.\nThe way his immortality power works, however, is not totally understood, as it has manifested in several different ways through the years. Sometimes, Cazador has been reduced to merely a fleshy torso and head, and somehow remained alive. Other times, he would be “killed” by simply punching a hole through his chest.\nOn another occasion, he took a point-blank handgun headshot, without showing any signs of brain damage, yet some time later, he suffered temporary amnesia when losing a", "-24.325896725422353" ], [ "which were identified by the Armed Forces Institute of Pathology in Washington, D.C. as talc, cellulose, calcium phosphate, and methacrylate plastic; However, the examination did not compare the particles found in his lungs with actual dust from the World Trade Center site.\nThe New York City Medical Examiners Office asserted in October 2007 that Zadroga's death was not related to his time at Ground Zero, with Chief Medical Examiner Charles Hirsch and another medical examiner signing a statement that \"It is our unequivocal opinion, with certainty beyond doubt, that the foreign material in your son’s lungs did not get there as", "-24.31045317194912" ], [ "skin samples taken from the dead man. Preparations for the survey Eagle are nearly completed when Bergman gives his report. While 'alive', Russell's skin cells appeared normal; after death, the particle analyser shows their atomic structure is changing, reversing polarity. This is the first step toward a conversion to antimatter. The professor's warning is plain—should matter and antimatter meet, they will annihilate each other in a catastrophic release of energy.\nKoenig scoffs at this speculative evidence and orders Eagle Two launched immediately. He, Helena, Alan Carter, Paul Morrow and Sandra Benes will comprise the crew. ", "-24.295217505743494" ], [ "Death Death is the permanent cessation of all biological functions that sustain a living organism. Phenomena which commonly bring about death include aging, predation, malnutrition, disease, suicide, homicide, starvation, dehydration, and accidents or major trauma resulting in terminal injury. In most cases, bodies of living organisms begin to decompose shortly after death.\nDeath – particularly the death of humans – has commonly been considered a sad or unpleasant occasion, due to the affection for the being that has died and the termination of social and familial bonds with the deceased. Other concerns include fear of death, necrophobia, anxiety, sorrow, grief, emotional", "-24.29212542998721" ], [ "has displayed the ability to survive in the vacuum of space. Firebird may be immortal, but the precise details of this are unclear beyond the fact that she has twice survived apparently fatal attacks that only Thor - himself an immortal - could withstand. MC2 In the MC2 universe, Firebird was killed in the final mission of the original Avengers. Marvel Zombies In the Marvel Zombies universe, Firebird is one of the heroes changed into a zombie.", "-24.29080697608879" ], [ "the level of immortality they achieved was determined by their corpse. If their corpse was sweet-smelling, it was said that they had achieved immortality in an ephemeral state. Likewise, if their corpse disappeared, leaving behind only the clothes, such as in the death of an adept named Ko Hung, this was another form of immortality known as shih chieh hsien (corpse-free immortals) (Cooper, 14). Conception of medicine Medicines can be used to heal ailments on the exterior or interior of the body, to control the ageing of the body, or even to prevent death. The term medicine and elixir are", "-24.256103764520958" ], [ "gas. The absence of fossil evidence is traced again to the internal acids, which (in Dickinson's view) would dissolve the bones soon after death.\nDickinson states he got the idea for his \"pseudo-scientific monograph\" after looking at one of Ursula K. LeGuin's Earthsea books: \nThis one had a bulky body and rather stubby wings, which obviously would never get it airborne, let alone with the two people it was carrying on its back, and all its own weight of muscle and bone. Obviously any lift had to come from the body itself. Its very shape suggested some kind of gas-bag. I", "-24.248068568413146" ], [ "body is made of radium and platinum, which protect her from the Earth's atmosphere. He mixes an acid solution that will kill her. When she comes into the cabin, he throws the bottle of acid at her. She is killed and disintegrates.\nHowever, a locket she was wearing is undamaged. Cutler finds in it a note, written in English, from the \"Master of the Council of Planets of the Galaxy.\" It's an invitation to Earth to join the Council. Cutler now realizes that the alien was a peaceful emissary who killed only in self-defense. Chaffee says that the Council, with its", "-24.217345991288312" ], [ "that the remains were those of a man who was 5 feet 5 ¹⁄₄ inches (1.66 m) tall, aged between 22 and 30 at the time of death, and that death had occurred at least two and no more than six years before. He was able to rule out broken or diseased bones as a cause of death (none were fractured or broken), although not all of them were present. The bones were entirely separate from each other and the brain had disappeared; his clothes had rotted to the point where it was difficult to distinguish them. Forensic tests Lewis Nickolls of the", "-24.065472538786707" ], [ "Mister Atom Publication history Mister Atom first appeared in Captain Marvel Adventures #78 and was created by Otto Binder and C. C. Beck. Golden Age and pre-Crisis version Mister Atom was created by Dr. Charles Langley in a story in Captain Marvel Adventures #78. His body was constructed first, and then Langley charged the robot with radioactive energy. The spark that gave the robot life also ended the life of his creator. Super-charged with a nuclear reactor and armed with a deadly mind, Mister Atom went on a wave of destruction believing he should rule the world and killed several", "-24.044145873747766" ], [ "electrical systems as she passes through by disrupting the flow of electrons from atom to atom, including the bio-electric systems of living bodies if she concentrates in the right way. This typically causes machines to malfunction or be destroyed as she phases through them, and can induce shock and unconsciousness in living beings.\nA downside to Atom Eve's transmutation powers is that she absorbs any unused atoms into her body, which must later be eliminated from her system as waste. She claims that on days when she uses her powers a lot she can \"go to the bathroom\" six or seven", "-24.041314230591524" ], [ "a pink metallic shell began to form all over his body. Both the Inhumans and the repowered mutants tried to save Unus's life, but it was too late. As Unus's field began to dissolve, it was discovered that he had died from lack of oxygen. Necrosha Unus was among the many on the island of Genosha who have been resurrected by Eli Bard and his version of the techno-organic virus. He appeared seemingly repowered by the T.O. virus. Spider-Man and the X-Men Unus was confirmed to be alive and somehow repowered again after the events of Necrosha when he attacked", "-24.03894637594931" ], [ "persist on a surface varies, with the virus surviving for one to two days on hard, non-porous surfaces such as plastic or metal, for about fifteen minutes on dry paper tissues, and only five minutes on skin. However, if the virus is present in mucus, this can protect it for longer periods (up to 17 days on banknotes). Avian influenza viruses can survive indefinitely when frozen. They are inactivated by heating to 56 °C (133 °F) for a minimum of 60 minutes, as well as by acids (at pH <2). Pathophysiology The mechanisms by which influenza infection causes symptoms in humans have been", "-24.037087778793648" ], [ "referred to as Death Spores. The death spores result in the weakness or death of humans in his immediate vicinity. The severity of the effect is based on the endurance, health, and relative proximity of the victims. The spores are fatal to ordinary humans within seconds, though some superhumanly powered beings can withstand exposure to them for extended periods of time.\nImplanted within Omega Red's arms are long retractable tendril-like coils made of carbonadium, an artificial alloy that is the former Soviet Union's attempt at creating true adamantium. Carbonadium is more malleable than adamantium and, while being vastly stronger than steel,", "-24.02620470232796" ], [ "death of the universe proves too much, even for her, and she, Ben, and her children die at the hands of Oblivion, with Reed screaming in agony at the death of his wife and children. Captain Marvel tells him they need to go, and they leave Sue's destroyed part of the ship behind.\nWhen Molecule Man transfers his power to Reed, Reed used it to resurrect his family including Sue, and they began to rebuild the entire Multiverse.\nInvisible Woman was later with Mister Fantastic and the Future Foundation when they were confronted by the Griever at the End of All Things.", "-24.021201359981205" ], [ "body for an extended period of time, \"committing\" the subject to accumulating dose long after the initial exposure has ceased. Over a hundred people, including Eben Byers and the radium girls, have received committed doses in excess of 10 Gy and went on to die of cancer or natural causes, whereas the same amount of acute external dose would invariably cause an earlier death by ARS.", "-23.981106134247966" ], [ "died over the following months as a result of their injuries was at least 270. Among them, four were Spaniards, and all the others were foreigners. The official figure for the number of victims is 215.\nMany of the victims were burned beyond recognition. Most of them were wearing only swimming suits, and the building where their documents were stored was destroyed in the explosion. There was no DNA test available at that time. As a result of the work done by the forensic teams from the tourists' home countries, all the victims were eventually identified.\nSeven of the victims remained unidentified", "-23.95917577893124" ], [ "will continue to exist even when the cells around it are dead. Example Acute tubular necrosis (ATN) in the kidney is a case in which cells heal completely by regeneration. ATN occurs when the epithelial cells that line the kidney are destroyed by either a lack of oxygen (such as in hypovolemic shock, when blood supply to the kidneys is dramatically reduced), or by toxins (such as some antibiotics, heavy metals or carbon tetrachloride).\nAlthough many of these epithelial cells are dead, there is typically patchy necrosis, meaning that there are patches of epithelial cells still alive. In addition, the collagen", "-23.92706049134722" ], [ "solo album, Supernova. It includes a song titled \"A New Star is Born\", which is dedicated to her late father. She told MTV News:\nThat track is dedicated to all those that have loved ones that have passed away. It's saying that there is no such thing as death. We can call it transforming for a lack of better words, but as scientists would say, 'Every atom that was once a star is now in you.' It's in your body. So, in the song I pretty much go along with that idea. ... I don't care what happens or what people", "-23.89203061353328" ], [ "exploded, sending intense shockwaves through clouds of cosmic gas and dust. The gas and dust were subsequently compressed into large groups, then gravity further condensed them into massive objects, and stars were born. Eventually, some of the stars are expected to die in a fiery blast, triggering another cycle of stellar birth and death. This recycling of stellar dust and gas appears to occur throughout the Universe. Earth's own Sun is considered to have descended from multiple generations of stars, as evidenced by heavy elements found, in the Solar System, in concentrations too large for a first-time star.\nDetailed observations of", "-23.88265761092771" ], [ "a person dies suddenly and unexpectedly, his or her life force, manifested as pyreflies, must be released from the body and sent to the Farplane, the final resting place of departed souls. If the sending is not performed, the body's spirit may remain trapped in the physical plane and take on the form of a fiend. A spirit of the dead may resist the transformation into a fiend, even when not sent and remain amongst the living, they are \"unsent\". The unsent play a prominent role in the storyline and mythos, including the playable character Auron and other characters including", "-23.879185560086626" ], [ "other heroes. Reception This version of Atom was ranked as the 144th Greatest Comic Book Character of All Time by Wizard magazine. IGN also ranked the Atom as the 64th Greatest Comic Book Hero of All Time stating; \"Of all the superheroes out here, Dr. Ray Palmer might be one of the most brilliant tortured souls imaginable.\"", "-23.851910725439666" ], [ "Biological immortality Biological immortality (sometimes referred to as bio-indefinite mortality) is a state in which the rate of mortality from senescence is stable or decreasing, thus decoupling it from chronological age. Various unicellular and multicellular species, including some vertebrates, achieve this state either throughout their existence or after living long enough. A biologically immortal living being can still die from means other than senescence, such as through injury, disease, or lack of available resources.\nThis definition of immortality has been challenged in the Handbook of the Biology of Aging, because the increase in rate of mortality as a function of chronological", "-23.83979383687256" ], [ "in which the corpse becomes leathery. Air conditions surrounding the body as well as the condition of the ground in which it is buried are most often contributing factors. Absolute dryness, local radioactivity, or other ground factors such as acidity or salts. Also hermetically sealed coffins without steadily moving air can contribute. Likewise, a small ingestion of poisonous medicines, i.e. very small quantities innocuous to an individual, during one's lifetime can aid in the mummification process after death. These kinds of substances are not readily detectable long after death though since the fat and water in the corpse changes and", "-23.83874203171581" ], [ "a skeleton, it took months. His entombment in a Calatonian burial suit and metal vault lasted hundreds of millennia. After being killed by the Radiant and subsequently undergoing the impact of the casket on Earth, his body was sealed underground in total darkness. Deprived of solar energy, necessary to nourish his Kryptonian anatomy, he could only revive extremely slowly and naturally.\nDoomsday had a highly accelerated healing factor that allowed him to quickly regenerate from most damage. When his side was cut by Superman with a plasma sword, it closed within moments. As a result of his engineering, Doomsday did not", "-23.831836585784913" ], [ "to the point where we can scarcely breathe it. Because we have learned to make new materials for the greater convenience of mankind, we have produced chemical toxins that have saturated our soil and water. Because we have found a new source of energy, and destruction, in the atomic nucleus, we face the threat of nuclear war or, even if we avoid that, the permeation of our environment with dangerous radiation and nuclear wastes.\nIt was first published by Tor Books in 1991, ISBN 0-312-85252-5. A 2018 edition (after both authors had died) includes a new introduction and afterword by Kim", "-23.816839604405686" ], [ "that must have caused a dimensional rift which threw him into another dimension. He also discovers that his body has changed as well. Not only does he discover that he can bleed, something that should be impossible with his injury-resistant mutant physiology, but after a fight against a resident of the twisted dimension, which he was able to defeat, Apocalypse learns that his body is actively refusing physiological mutation. Needing to breathe air for the first time in centuries, he comes to a shocking truth as he watches his hand turn from its usual mutated appearance back to a human", "-23.800576453329995" ], [ "was pronounced dead on 2 July 2015.\nAs of 15 July, seven fatalities were attributed to the explosion.\nAs of 30 July, ten fatalities were attributed to the explosion.", "-23.789341035240795" ], [ "Death abandons the character when he is defeated by the combined might of Captain Marvel, Drax the Destroyer and the Avengers. Two Marvel Annuals feature Thanos as he tries to \"woo\" Death back (courtesy of the Infinity Gems with which he plans to extinguish every star in the galaxy), but the character is killed in a final battle with the Avengers, Captain Marvel and Adam Warlock. When Captain Marvel is dying from cancer, Thanos returns to the character in a vision and introduces him to the entity Death. Marvel willingly surrenders his life and embraces the entity.\nIn Marvel's first", "-23.76848022484046" ], [ "deployed around the planet by the guardian ships. Credibility Helland points out the failure of the July 1952 prediction channeled through Van Tassel that life on Earth will be destroyed “when they explode the hydrogen atom” because in November 1952 the first H-bomb was detonated with no such effect. However, the same message also stated that Ashtar was intervening to stop the destruction of the planet. After the explosion, ensuing messages claimed that various actions were taken by the space fleet to repair damage.\nAfter the introduction of Ashtar by Van Tassel, other mediums began to claim contact. ", "-23.727996498986613" ], [ "Atom #42-43 (June–July 1990), as merely an aspect of Death. Other Giffen stories that feature Death include the Ambush Bug Nothing Special one-shot (Sep. 1992) and a cameo in the Lobo comic book Lobo's Back #3 (Oct. 1992), in which she slaps Lobo for getting fresh with her. She observes the destruction of the Earth in Legion of Super-Heroes vol. 4 #38 (Dec. 1992). The character appeared in Action Comics #894, which was written by Paul Cornell. Cornell confirmed that Neil Gaiman has given his approval for the use of Death in the storyline. In the story, while searching for", "-23.718731688335538" ], [ "lasted for the next three days and 2,000 lorry loads of rubble were removed. From the wreckage and rubble the rescuers managed to extract six survivors. The last to be found alive was Assistant Secretary Downing C. Thompson, 31 hours after the explosion, but he died just over a week later.\nNinety-one people were killed, most of them being staff of the hotel or Secretariat: 21 were first-rank government officials; 49 were second-rank clerks, typists and messengers, junior members of the Secretariat, employees of the hotel and canteen workers; 13 were soldiers; 3 policemen; and 5 were members of the public.", "-23.71652302070288" ], [ "had been recently upgraded, noticed that every time he exploded, a high-frequency pulse was emitted by his body. Experimenting, Iron Man duplicated the pulse, causing Nitro to explode. After he exploded several times in a minute, he passed out from exhaustion (presumably, it takes energy to explode, and he could only spare so much before he passed out). Iron Man then handed him over to S.H.I.E.L.D., along with a recommendation on constructing a null-harness. He was sent to prison.\nOn another occasion, when Nitro's lawyer had him released from captivity, the villain immediately escaped, attempting to rob a bank for money", "-23.71635061714187" ], [ "otherwise affected at all.\nUltrasonic Detection: Plastic Man's body will start to \"ripple\" when an ultrasonic frequency is triggered.\nRubber-Organs: As stated by Black Lantern Vibe, Plastic Man's internal organs (such as his heart when Black Lantern Vibe tried to rip it out) couldn't be removed, unlike many of the Black Lanterns' victims. This perhaps implies that Plastic Man is himself more like one giant, living organ than he is a \"whole\" made of component parts and organs, etc.\nSkilled Thief: Plastic Man was once a very talented professional thief.\nMaster Detective: Although no longer a criminal, he has insight into their mindset, enabling", "-23.708784535090672" ], [ "two hours, her main organs will stop working and she would die. He then finds Owen and Tosh, shooting the former in the hip. After letting Ianto go, he finally confronts Jack, who realises that the bombs are an elementary 51st century confidence trick. Jack throws the device over the building, and John pushes him off the roof in retaliation.\nJohn returns to Torchwood, where he takes a pyramid-shaped object from the Blowfish in the morgue. Gwen (who was saved by the rest of the team) and the others arrive, including Jack, who survived due to his immortality. They hold John", "-23.700623696960974" ], [ "a reminder of his vow to never take a human life again. Deaths Six, throughout the series, has 'died' on three separate occasions; once in The Lab and twice in Third Transmission.\nAfter falling from a great height onto concrete in the events of The Lab, Six is said to have died, or most of him. However, a clone of him is grown and used as an organ donor to save him.\nIn Third Transmission, Six dies as part of the process to send him back in time. However, he will have no memory of it. Also, in the final chapter of", "-23.699804335425142" ], [ "release of energies by the Guardian caused a tear in space through which the Ultimate fell.\nEventually arriving on the planet Calaton, he ravaged that world for three years. With only the capital city left, the royal family combined their life forces into a single energy being, the Radiant. The Radiant killed the Ultimate with a huge blast of energy (laying waste to over a fifth of his planet in the process). In common Calatonian burial procedures, the Ultimate's seemingly dead body was suited and shackled to prevent his spirit from escaping into the afterlife, and he was shot into space", "-23.65031659678789" ], [ "wrong as they didn't take into account the size of the asteroid which could cause a Cretaceous–Paleogene extinction event. The asteroid strikes Earth, critically damaging the planetary ecosystem. The Titan team members are presumably the last humans left alive.\nAs the surviving astronauts slowly die of disease and in-fighting, they decide to try to ensure life will continue to survive: they take a flask of bacteria and drop it into a crater filled with liquid water, in the hope that some form of life will develop.\nThe novel's final sequence depicts the final two crew members returned to life through some unspecified", "-23.633241645991802" ], [ "aboard Flight 77. After the attacks During the attacks and afterwards there was a large amount of toxic dust, debris and ash that was centralized around Ground Zero and created long term health problems. Toxic materials such as asbestos, lead, and mercury were in the air and the debris and many victims and first responders did not wear respirators.\nIt was reported in 2018 that at least 15 FBI agents had died from cancer due to their roles in the aftermath and investigation of the attack. Further, a medical director of the World Trade Center Health Program at Mount Sinai Hospital", "-23.621116367692593" ], [ "body. Human corpses, no matter the manner of death, are aided by insect decomposers. This makes the storage of the body prior to the autopsy, a vital step in the field of forensics.", "-23.61892807847471" ], [ "Empire of the Atom Plot Some time, a little over 10,000 years from now, a noblewoman gives birth to a deformed child, a consequence of having been accidentally exposed to radiation from one of the temples of the Atom Gods. The baby is kept alive because one of the atom priests wants to conduct an experiment to see what will happen if the boy, unlike other mutant children, is given the full education of an atom priest.\nIn his teens the mutant boy Clane helps his father win a war with Mars. He also continues his studies while his", "-23.570439142058603" ], [ "will ionize and disintegrate into isolated stable particles such as electrons and neutrinos, with all complex structures dissipating away. This scenario is known as \"heat death of the universe\".\nAlternatives for the ultimate fate of the universe include the Big Rip mentioned above, a Big Bounce, Big Freeze or Big Crunch.", "-23.55876996536972" ], [ "discovered alive under the rubble in her deceased mother's arms. China Daily called it \"a rare moment of joy amid the devastation of Iran's worst earthquake for years.\" Around this time, relief operations had begun to shift from finding survivors to caring for them. Rescue workers began to slow their efforts, although three individuals were discovered alive shortly after. Water and electricity were restored to most parts of the city by then as well.\nOne of the most notable rescues was that of 97-year-old Sharbānou Māzandarānī (شهربانو مازندرانی in Persian), who was trapped in her home for eight days until she", "-23.544047900810256" ], [ "digital version of the paper ones I've kept my entire life. Nothing more, nothing less. Don't read any more into it than necessary. And in a morbid way, a record of my predilections that will hopefully live on after I die, on some server, somewhere. Grandiose? Maybe. Maybe I just have the balls to admit it. Maybe one day, in the year 2201, a relation of mine will see these zeros and ones, and say, \"Damn, he had fun.\" That is, if we don't annihilate one and other. [sic]", "-23.536625523876864" ], [ "restore approximately 80% of his body mass, after which he began to regenerate the remaining 20% on his own.\nTelepathic Immunity: As stated by Batman (in JLA #88, Dec. 2003), \"Plastic Man's mind is no longer organic. It's untouchable by telepathy.\"\nImmortality: Plastic Man does not appear to age; if he does, it is at a rate far slower than that of normal human beings. In the aftermath of the Justice League story Arc \"Obsidian Age\", Plastic Man was discovered to have survived for 3,000 years scattered into separate, individual molecules on the bottom of the Atlantic Ocean without decaying or being", "-23.529273457592353" ], [ "part of the body and sometimes result in penetrating trauma with visible bleeding. At times the propelled object may become embedded in the body, obstructing the loss of blood to the outside. However, there may be extensive blood loss within the body cavities. Fragmentation wounds may be lethal and therefore many anti-personnel bombs are designed to generate fragments.\nMost casualties are caused by secondary injuries as generally a larger geographic area is affected by this form of injury than the primary blast site as debris can easily be propelled for hundreds to thousands of meters. Some explosives, such as nail", "-23.527556813904084" ], [ "8 million people on Earth die during the war. The total number dead in the DC Universe is stated to be countless. Several heroes also die, including Maxima, Aquaman, Guy Gardner, Queen Hippolyta, General Sam Lane (Lois Lane's father), and Steel are all presumed dead, but later return alive for different reasons.", "-23.51876250627174" ] ]
2s043b
If "tying arrangments" are illegal, how can universities force me to pay for and take elective courses that are completely unrelated to the major I am pursuing?
[ "You are paying them to take a class. That is it. If you want a degree from them you have to take a number of classes in order for them to grant you this degree. You are not buying a degree, you are paying to attend a class, one class at a time.", "There are (at least) two reasons this isn't a problem: 1. You aren't actually buying a degree - a degree is not a product, it is recognition. You are purchasing education. It is clear going in what needs to happen to obtain the degree. For an obvious example, you pay to attend the class, but...you don't get an \"A\" for having done so. And...you don't achieve any credits if you don't get a passing grade. But...you did get the thing you paid for - education. 2. Tying arrangements are more complicated than you're thinking: Tying arrangements arent always illegal (as is noted on the very link you provided) All three of the conditions must be met: \"(1) the forced purchase of one commodity in order to obtain a separate desired commodity or service; (2) possession by the seller of sufficient economic power with respect to the tying product to restrain free trade in the market for the tied product; and (3) that the arrangement affects a not insubstantial amount of commerce in the market for the tied product. \" The fact that the market for degrees is expected to include requirements provided by the university and these are understood as part of the purchase means this is not a per se illegal tying arrangement.", "you definition link states it.. Tying arrangements are not necessarily unlawful.", "Your statement is incorrect for the example. You are not paying them to teach you engineering... you are paying for a degree. If you ONLY wanted to be taught about engineering, you would only pay for the classes and forego the degree. If you want the paper, you do what they say is required to get the piece of paper." ]
[ [ "the Central Universities Act, 2009, does not allow reservations for jobs based on domicile. The people felt cheated and no relief was given to them.", "-24.672885470557958" ], [ "exceptions are applicants for Organ Scholarships and those applying to read for a second undergraduate degree.\nStudents from all backgrounds are encouraged to apply, with \"contextual data\" (factors that may have influenced prior exam performance) taken into account during the admission procedure. The university believes that there are many potential students from less well-off backgrounds whom the university cannot admit simply because they do not apply.\nMost applicants choose to apply to one of the individual colleges, which work with each other to ensure that the best students gain a place somewhere at the University regardless of their college preferences. Shortlisting is", "-24.556420290551614" ], [ "states interpret this provision as disqualifying illegal immigrant students from certain higher education benefits such as in-state tuition rates. Some states have enacted laws aimed at making illegal state residents eligible for in-state tuition rates without violating this IIRIRA provision. However, some students paying out-of-state tuition have filed lawsuits in these states, claiming state education officials violated this federal law. Legislative history The original version of the DREAM Act was introduced on April 25, 2001 by Representative Luis Gutiérrez, Democrat from Illinois, as the \"Immigrant Children's Educational Advancement and Dropout Prevention Act of 2001\" (H.R. 1582) during the 107th Congress.", "-24.544661825799267" ], [ "not offer the program. Dual Enrollment permits high school students to take courses, at local higher education institutions, to earn college credits. Students remain enrolled at their high school. The courses count towards high school graduation requirements and towards earning a college degree. The students continue to have full access to activities and programs at their high school, including the graduation ceremony. The college credits are offered at a deeply discounted rate. The state offers a small grant to assist students in costs for tuition, fees and books. Under the Pennsylvania Transfer and Articulation Agreement, many Pennsylvania colleges and universities", "-24.166213969234377" ], [ "or made illegal the use of credentials from unaccredited schools include Oregon, Michigan, Maine, North Dakota, New Jersey, Washington, Nevada, Illinois, Indiana and Texas. Many other states are also considering restrictions on unaccredited degrees in order to help prevent fraud.", "-23.990241637511645" ], [ "be allowed to take up a job while pursuing a full-time course. Those, who are employed at the time of admission, will be required to produce a certificate of leave from their employer within one month from the date of admission failing which their admission will be cancelled on the recommendation of Head/Dean by the competent authority.\nA student is allowed to repeat courses/improve grades in courses as specified in the rules.\nZero semester/year provision can be availed by a student only under the conditions specified in the rules.\nEXAMINATION AND EVALUATION PATTERN\nThe University follows Semester system for all the courses with choice-based", "-23.85620235389797" ], [ "some jurisdictions. Jurisdictions that have restricted or made illegal the use of credentials from unaccredited schools include Oregon, Michigan, Maine, North Dakota, New Jersey, Washington, Nevada, Illinois, Indiana, Texas and Korea. Many other states are also considering restrictions on the use of degrees from unaccredited institutions.", "-23.66092874156311" ], [ "enroll students or issue degrees; however, these legal authorizations are not the same as educational accreditation. Some U.S. state laws allow authorities to shut down illegal operations of unaccredited schools or diploma mills. In others, particularly, Idaho, Hawaii, Montana, and California, the state permits anyone to claim to operate a college and issue degrees with essentially no oversight. Additionally, in 21 jurisdictions, unaccredited religious degree-granting schools are exempted from government oversight.\nStudents studying at an unaccredited institution are never eligible for financial aid, including student loans, through any government agency. It is legal for the school itself or", "-23.46120478742523" ], [ "community colleges. It is the policy of the UNC system to allow all undocumented students to be considered for admission, and prohibits any school from approving any individual policies that would bar access for these students.\" The UNC system requires that such students \"must be graduates of high schools in the United States, are treated as out-of-state students for admissions purposes, and must pay out-of-state tuition rates.\" Tuition equity laws and policy categories Many states have adopted tuition equity laws in an effort to improve access to education for all students. Generally, most tuition equity laws require that undocumented students", "-23.149846201762557" ], [ "Coursework Plagiarism and other problems Plagiarism and copying can be problematic in graded coursework. Easily accessible websites have given students opportunities to copy ideas and even complete essays, and remain undetected despite measures to detect this. While coursework may give learners the chance to improve their grades, it also provides an opportunity to \"cheat the system\". Also, there is often controversy regarding the type and amount of help students can receive while completing coursework. In most learning institutions, plagiarism or unreasonable coursework help may lead to coursework disqualification, student expulsion, or both. UK GCSE coursework Coursework was removed from UK", "-23.099135985132307" ], [ "credentials from diploma mills and unaccredited schools is explicitly illegal or legally restricted include \nIllinois, \nIndiana, \nMaine, \nMichigan, \nMissouri,\nNevada, \nNew Jersey, \nNorth Dakota,\nOregon, \nSouth Dakota,\nTexas, \nVirginia,\nand \nWashington. \nMany other states are also considering restrictions on unaccredited degree use in order to help prevent fraud. In 2006, Mississippi passed laws to restrict diploma mills and more legislation was planned for 2009 to further restrict institutions operating without approval\". George Gollin, a University of Illinois professor and board member of the Council for Higher Education Accreditation said: California is the only state in the country without rules governing postsecondary education institutions \"You", "-23.09261307930865" ], [ "credits and features in all fields of study. Colleges and universities may not be open to standardizing the curriculum in their programs, as it would mean that they would need to give up the autonomy they previously enjoyed, and possibly lose distinctive features in their curriculum that helped to recruit students to their specific program. Willingness to participate Although a formalized agreement would result in more transfer applicants, many university officials are less than keen to sign bridge program agreements with colleges, as it would mean a significant loss of tuition dollars. Without the formalized agreement, transfer students receive on", "-23.07474293804262" ], [ "has expanded in recent years as a result of rapid expansions in online learning. In 2006, the Department of Education waived the so-called “50 percent rule,” which stipulated that U.S. students in online degree programs could only receive federal student aid if half of their programs were campus-based. Today, one in three students take at least one course online during their college career. In addition, instructors in face-to-face classes can also administer exams online.\nHigher education institutions around the world make use of online proctoring for tens of thousands of exams. The 17 campuses of the University of North Carolina proctor", "-23.05064590566326" ], [ "they were degree-holders. The case never got to trial because the parties reached an out-of-court settlement. Under the settlement, Kennedy-Western degree-holders may say that they have degrees when applying for private sector jobs in Oregon, but must also reveal that the school is unaccredited on all job applications, resumes, business cards and advertisements that mention the degree. (Public employment and licensed professions are excepted from the agreement). A statutory revision was enacted in 2005, allowing graduates of unaccredited and unapproved schools to list an unaccredited degree on a résumé as long as they note the school's unaccredited status in the", "-22.95777806371916" ], [ "for public institutions or Concurso institucional for private institutions. In addition to passing entrance exams, students must fulfill particular prerequisites for some courses.\nEnrollment is limited; each year the institution establishes the number of places available (numerus clausus). The exam scores count for the final evaluation, which includes the secondary school average marks. Then the students have to choose six institutions/courses they prefer to attend, in preferential order. The ones who reach the marks needed to attend the desired institution/course, given the number of vacancies, will be admitted. This means that the students could not be admitted at its first or", "-22.907955390808638" ], [ "unaccredited schools include Oregon, Michigan, Maine, North Dakota, New Jersey, Washington, Nevada, Illinois, Indiana and Texas. Many other states are also considering restrictions on unaccredited degree use in order to help prevent fraud.", "-22.809159368043765" ], [ "once every few semesters. In some cases, students find it impossible (due to other courses, employment, or other reasons) to take these courses when they are offered and sometimes need to stay enrolled in the university for an extra semester or year until these classes are offered again. Take Five Scholars Program At the University of Rochester, students are given the unique opportunity to partake in the Take Five Scholars Program. In this program, the student receives a fifth year, or one additional semester, tuition free while the student studies a subject outside of their major. The student has to", "-22.78730944817653" ], [ "and local law enforcement personnel to enforce immigration matters. This provision had been implemented by local and state authorities in five states (California, Arizona, Alabama, Florida, and North Carolina) by the end of 2006. Higher education restrictions Upon passage of this law, states were restricted from offering in-state tuition at public institutions to students who were not legally in the country. Specifically, if a state allows illegal immigrant students to be eligible for in-state tuition, then residents from other states must also be eligible for in-state tuition. Several states have passed tuition-equality laws by allowing anyone regardless of legal status", "-22.719043320103083" ], [ "State College could not summarily expel students without due process. However, that still does not prevent students who exercise their rights from being subject to more legal action for violation of institutional rules.", "-22.699347682646476" ], [ "challenging courses they can. Dual enrollment Students may enroll in college courses and gain high school and college credit simultaneously. Tuition fees are waived if courses are taken at Cape Fear Community College. Book costs are not waived and must be paid by the student. Tuition fees are not waived if courses are taken at UNC-Wilmington. Dual enrollment applications with school administrative approval, completion of registration card and placement test scores are required prior to enrolling. Three to five semester hours of\ncollege credit is equal to one (1) unit of high school credit. Students must take at least two courses", "-22.682237051747506" ], [ "to enroll in remedial courses before advancing to a college level course in that subject. Colleges review a student's score by subject - math, English, science, etc. - and compare that score to the school's cutoff. For example, a college might use a score of 19 on the ACT math section as the threshold for determining whether a student must enroll in a remedial math course or college-level math course.\nParticularly at community colleges – which are open enrollment to any student with a high school degree or GED – multiple semesters of remedial coursework may be available to and required", "-22.658562597585842" ], [ "have enacted their own laws allowing in-state tuition to be given on the claims that it is based on high school attendance and not explicitly residency. This law is especially important since undocumented immigrants are also unable to obtain governmental financial aid and are unable to legally work, leaving them without sources to help pay for out-of-state tuition.\nThe DREAM Act was introduced in 2001 and aims to give more access to higher education for undocumented immigrants by repealing the law 1996 law. It also aimed to set up pathways for students who obtain higher education to become legal residents. The", "-22.629354497650638" ], [ "operation.\nBecause Rochville University is not accredited by any recognized accreditation bodies in the United States, its degrees and credits are unlikely to be acceptable to employers or academic institutions. Jurisdictions that have restricted or made illegal the use of credentials from unaccredited schools include Oregon, Michigan, Maine, North Dakota, New Jersey, Washington, Nevada,Illinois, Archived 2016-12-24 at the Wayback Machine Nevada statute NRS 394.700</ref> Indiana, and Texas. Many other states are also considering restrictions on the use of degrees from unaccredited institutions. Criticism and controversy Claims have been made that Rochville University is a fraudulent diploma mill.\nAccording to GetEducated.com, an online", "-22.623572693068127" ], [ "and winter semesters at those locations will be completed by 30 September 2012 at the latest, without penalization to enrolled students. The Minister of Education, Recreation, and Sports is granted the ability to deem as not applicable certain other regulations or laws or to \"[prescribe] any other necessary modification to\" Bill 78 so as to provide for any dispositions deemed necessary to ensure the continuation of classes throughout the duration specified by the act.\nThe law makes it illegal to deny a person access to any place if that person has a right or duty to be there and further restricts", "-22.556089808233082" ], [ "case, the student would need an additional semester to graduate.\nStudents may have other difficulties that prevent them from completing the graduation requirements in the traditional four years, such as raising a child or being required to work full-time. Such students may only attend classes on a part-time basis, taking over a decade to complete a bachelor's degree. College-required classes Many times, universities will require classes in order to graduate that fall under the \"General Education Requirements\" category. Often, universities will offer some of these classes (especially at smaller universities where number of teachers or resources are more limited) only", "-22.554476198391058" ], [ "they finish) to make up their credits, pass required testing or meet their goals, and finally obtain a regular or modified diploma. Some alternative programs allow students to finish in half year provided that they meet certain requirements. Certificates of attendance are also given to students that participate in early college or other such programs, as the school will withhold a credit to keep them enrolled in highschool as they continue their college program.\nSome schools do not allow these students to participate in the graduation ceremony. This is controversial as some students feel that the social benefits", "-22.539008063089568" ], [ "roughly 100 college courses that are supported by free content from universities including MIT and Carnegie Mellon University, that students can access without having to pass through an admissions process.", "-22.526147623633733" ], [ "get admitted by taking a specific exam or interview before the College Entrance Examination. In this way, students have more chance to get admitted by the top colleges. In 2010, there were several critical reforms in the education field. In January 31, the education ministry in Guangdong province began to implement parallel voluntary admission in college entrance recruiting system, which is an efficient way to decrease the risk of getting into a college for the majority of students. In November 20, the education ministry of China cancelled the additional Olympics points in College Entrance Exam policy. It is fairer for", "-22.478239686228335" ], [ "they will not enroll, as a way to boost the college's overall yield rate; according to the report, these actions are part of an effort to improve a college's scores on the US News college ranking. This practice is known as yield protection.", "-22.475650972744916" ], [ "as a check on the university presidents\" by allowing an \"unprecedented series of lockstep tuition hikes\" that violates the state's constitutional mandate requiring tuition for in-state students at college to be \"as nearly free as possible.\"\nThe constitutionality challenge included an additional charge against the Board of Regents for continuing to provide in-state tuition for Deferred Action for Childhood Arrivals (DACA) recipient students. A state Court of Appeal previously ruled in June 2017 that DACA students don't have \"lawful immigration status\" and therefore don't qualify for in-state tuition because of a 2006 voter-approved measure that prohibits in-state tuition and financial aid", "-22.443697944050655" ], [ "or Social work, it is mandatory by law. The law also establishes penalties for crimes committed regarding the professional practice, including those in which an individual offers professional services without having the proper diploma or licence.\nFor a number of years, presenting a thesis was the only method to obtain the diploma (título). Nowadays, some universities, like the National Autonomous University of Mexico (UNAM), may still require the thesis, while others, like the federal Institutes of Technology, may forgo the thesis in exchange for demonstrating professional experience, research work, or excellent academic grades.\nBy their nature, some disciplines such as Nursing, Medicine", "-22.349337732361164" ], [ "students to take a college class and have it count as both high school and college credit. Dual credit courses may be taught at the college along with the general college student population, or less commonly taught at the student's high school by high school teacher qualified to teach at the college level. The decision to grant or not grant high school credit for college courses rests solely with each individual high school.\nThe requirements for dual-credit qualification are somewhat strict: the student must apply and be accepted for admission to the college; must receive official permission from their", "-22.29402350174496" ], [ "some circumstances, students may opt out.\nU-Passes are non-transferrable and (before the Compass Card) students were required to have their name printed on the back of their paper pass. Fraudulent use may result in criminal charges or a fine. Students are required to carry supplemental identification (student card) and produce it for inspection, along with the U-Pass, upon request of a Transit Security Officer or a member of the South Coast British Columbia Transportation Authority Police Service. Failure to produce supplemental identification (student card) upon request may result in confiscation of the U-Pass, a fine for not having a", "-22.245638612890616" ], [ "admission to elite universities; this view proposes that weak or negative subjective factors in an application may contribute to a rejection in spite of the applicant's strong qualifications. This view thus posits that \"yield-protected\" applicants simply did not demonstrate enough fit.\nYield rate refers to the proportion of students who matriculate (i.e. accept an admissions offer and attend the college) after acceptance to a college.", "-22.203434514890432" ], [ "enrollment in courses. It is not possible to extend the program end date simply in order to be able to stay around till the graduation ceremony. If the graduation ceremony falls outside the 60-day grace period of completion of coursework, then the student must find some other way to be legally present for it (for instance, by staying around on Optional Practical Training, or getting a B visa for the graduation ceremony). After completion of studies After completion of studies, a student has a 60-day grace period to depart the United States. Note that it is not possible to re-enter", "-22.186618025487405" ], [ "Equal Access Act Intent of the Act The Act provides that if a school receives federal aid and has a \"limited open forum,\" or at least one student-led non-curriculum club that meets outside of class time, it must allow additional such clubs to be organized, and must give them equal access to meeting spaces and school publications. Exceptions can be made for groups that \"materially and substantially interfere with the orderly conduct of educational activities within the school,\" and a school can technically \"opt out\" of the act by prohibiting all non-curriculum clubs.\nIt was ruled constitutional by the Supreme Court", "-22.183280644123442" ], [ "None of the options are meant to give pupils an education that enables them to get right into work after finished graduation. Instead, the students are supposed to study at universities and similar facilities after Ski videregående skole.", "-22.181787746027112" ], [ "Alternative pathways in education Alternative pathways in education are alternative means of obtaining educational qualifications, other than the traditional means of gaining access to or completing the required study to obtain the educational qualifications. Undergraduate study The traditional means of entry to tertiary education involves completing secondary school and obtaining the standard school leaving educational qualification offered in a particular region prior to progressing to university or other higher education study. In the United States, this qualification is the High School Diploma, or the General Education Development (GED) if high school was not completed. In the United Kingdom, this qualification", "-22.12898440441495" ], [ "for admission into the graduate degree programs (ALM).\nTypically applicants must submit a completed application, proof of an accredited bachelor's degree (or foreign equivalent) plus transcripts, resume, two essays, and a nonrefundable application fee. Some programs require additional specific classes to be part of the initial three before formal admission. Students will be denied admission indefinitely if they fail to earn a grade of B after twice enrolling in the Proseminar course.\nSome programs have additional requirements, including specific pre-admission courses and supplemental application materials. For instance, the Literature and Creative writing candidates must submit original manuscripts. Student life Beginning in the", "-22.10833663167432" ], [ "can be earned is limited due to budget constraints. The state dual enrollment program would permit high school students to take courses at local higher education institutions (including those other than CCAC) to earn college credits. Students remain enrolled at their high school. The credits count towards high school graduation requirements, and towards earning a college degree, in both this program and the school-funded program mentioned above. The students continue to have full access to activities and programs at their high school, including the graduation ceremony. The college credits are offered at a deeply discounted rate. For several years, the", "-22.047483818583714" ], [ "may graduate by meeting the requirements of their IEP. Dual enrollment The high school does not offer a dual enrollment program. This state program permits high school students to take courses, at local higher education institutions, to earn college credits. Students remain enrolled at their high school. The courses count towards high school graduation requirements and towards earning a college degree. The students continue to have full access to activities and programs at their high school, including the graduation ceremony. The college credits are offered at a deeply discounted rate. The state offers a small grant to assist students in", "-22.013480405585142" ], [ "have been banned from school balls or trips, or not given the leaving certificates needed for entry into university or other tertiary institutions.", "-21.974595278676134" ], [ "the right to deny the admission of an applicant if the above requirements and all other admission criteria are not satisfactorily complied with.\nAdmission decision will be based on the result of the evaluation of all the required documents, as well as the entrance examination and the interview. The Committee on Admission shall submit to the Dean of the College its recommendation for his review and final recommendation to the President of the University. Any evidence of fraud, misrepresentation, or non-disclosure by the applicant of any information relative to the requirements shall be ground for the cancellation of his admission or", "-21.970172191649908" ], [ "possible to receive state scholarship in every subject, the number of bourses was increased and instead of contracts, the students have to sign a declaration stating that within 10 or 12 years after graduation, students that studied in state-funded places will be expected to work at Hungarian companies for the same length of time they had spent in state-financed higher education. Failing to do this, they will be expected to pay back the cost of their studies calculated at a rate that takes into consideration yearly inflation but will be interest-free. International Criticism of Fourth amendment of the Constitution On", "-21.961614523694152" ], [ "apply for this program before their eighth semester.\nAgnes Scott College also offers a Fifth Year program, tuition-free. It is typically used to take courses that interest them but they could not take during their first four years, to finish a second major, or to take classes that are prerequisites for a graduate program they wish to pursue. Cooperative education Many colleges and universities offer a Cooperative Education program. In this program, a student has the opportunity to integrate work experience into his/her education through full-time employment during one or more semesters. Generally, a student will not enroll in", "-21.95057955541415" ], [ "quotas, requiring universities to reserve a designated number of admission seats for students from outside of the university's region.", "-21.88853453507909" ], [ "completing the test is still an exception. The universities are now free to arrange their own entrance examinations in addition to considering scores from the matriculation examination. Thus, universities accept students based on the entrance exam points, the matriculation exam points, and also a combined score of these two. Successfully passing the test entitles one to wear the Finnish student cap. Compensation system Students who receive an improbatur in any of the obligatory exams fail the entire exam. However, a single failed obligatory exam may be compensated for by good results in other exams. Based on the compensation system, the", "-21.873594290344045" ], [ "providing such reservation is not unconstitutional, but stated that the Act will not be applicable to private minority schools and boarding schools. However, Justice K. S. Panicker Radhakrishnan dissented with the majority view and held that the Act cannot apply to both minority and non-minority private schools that do not receive aid from the government.\nIn September 2012, the Supreme Court subsequently declined a review petition on the Act.\nIn May 2016, the Chetpet-based CBSE school Maharishi Vidya Mandir became embroiled in a scandal over its circumvention of the 25% quota rule. During its admissions cycle, the school told economically weaker parents", "-21.856377943535335" ], [ "on another course. Many students do successfully find places through this route. Factors affecting admission Whether to admit an applicant to a course is entirely the decision of each individual university. They will base their decision on a variety of factors, but primarily the grades predicted or already received in school leaver examinations. As more and more applicants are attaining higher and higher grades in the A level examinations, most universities also use secondary admissions criteria. These may include results at GCSE or Standard grade examinations (or equivalent), the references provided on the application and the information provided on the", "-21.823848549451213" ], [ "The number disqualified for political reasons was known, but publicly the party maintained that the number was very small and that it sought to ensure that only the most able students actually entered colleges and universities.\nBy 1985 the number of institutions of higher learning had again increased - to slightly more than 1,000. The State Education Commission and the Ministry of Finance issued a joint declaration for nationwide unified enrollment of adult students - not the regular secondary-school graduates but the members of the work force who qualified for admission by taking a test. The State Education Commission established unified", "-21.81358758287388" ], [ "UCAS+, the applicant chooses two courses for which offers have been made: a first choice and a second choice. If the conditions of the first choice offer are later met, the applicant may attend this course. If the applicant does not fulfil the conditions of their first choice, but does fulfil the conditions of their second \"insurance\" choice, they can attend their second choice course. If they fail to meet the conditions of both offers, they may choose to go through \"clearing\". This involves ringing up or sending their application to different universities in the hope of finding a place", "-21.8086195368669" ], [ "arts colleges can be as low as 15–20%, while cheating at large public universities can be as high as 75%. Moreover, researchers have found that students who attend a school with an honor code are less likely to cheat than students at schools with other ways of enforcing academic integrity. As for graduate education, a recent study found that 56% of MBA students admitted cheating, along with 54% of graduate students in engineering, 48% in education, and 45% in law.\nThere is also a great difference in students' perceptions and the reality of their own ethical behavior. In a 2008", "-21.807590224776504" ], [ "to take courses, at local higher education institutions, to earn college credits. Students remain enrolled at their high school, including the graduation ceremony. The courses count towards high school graduation requirements and towards earning a college degree. The students continue to have full access to activities and programs at their high school. The college credits are offered at a deeply discounted rate. The state offers a small grant to assist students in costs for tuition, fees and books. Under the Pennsylvania Transfer and Articulation Agreement, many Pennsylvania colleges and universities accept these credits for students who transfer to their institutions.", "-21.792214151471853" ], [ "not be acceptable to employers or other institutions, and use of degree titles may be restricted or illegal in some jurisdictions.\nUniversity of the Nations justifies its lack of accreditation by stating that \"validation by an accrediting agency in one nation could be limiting. With the U of N, students may begin their education in South America, continue it in the United States and complete their U of N degree requirements in Europe. This type of international scope is a challenge for accrediting agencies to validate.\" Additionally, since the school does not pay staff, who work as volunteers, \"the lack of", "-21.77929771784693" ], [ "Traffic school Incentive Opting to take the course may cost the violator anywhere from slightly less than the fine for the violation to significantly more. However, successful completion will usually either completely remove, or significantly reduce, the effect on the violator's driving record, which in turn will at least reduce the effect on the violator's Automobile insurance premiums. Typically, a traffic violator will be offered the opportunity to take such a course only if he or she has not done so within a specified number of months prior to the violation; this keeps frequent violators from abusing the system to", "-21.75580636956147" ], [ "restructuring activities can be done to make it easier for disabled persons to succeed. Grade-cutoff university admission is formally fair, but if in practice it overwhelmingly picks women and graduates of expensive user-fee schools, it is substantively unfair to men and the poor. The unfairness has already taken place and the university can choose to try to counterbalance it, but it likely can not single-handedly make pre-university opportunities equal. Social mobility and the Great Gatsby curve are often used as an indicator of substantive equality of opportunity.\nBoth equality concepts say that it is unfair and inefficient if extraneous factors rule", "-21.738448004733073" ], [ "enrollment The state's dual enrollment program permits high school students to take courses, at local higher education institutions, to earn college credits. Students remain enrolled at their high school. The courses count towards high school graduation requirements and towards earning a college degree. The students continue to have full access to activities and programs at the high school, including the graduation ceremony. The college credits are offered at a deeply discounted rate. The state offers a small grant to assist students in costs for tuition, fees and books. The amount of funding for the district varies widely across the Commonwealth.", "-21.738277104381268" ], [ "coursework. Associate degree In study towards an associate degree, a student takes necessary courses needed to earn a degree that will allow for entry into jobs requiring some level of college education but not a full four-year degree. The associate degree program also allows students who wish to eventually obtain a bachelor's degree at a four-year college to complete the necessary \"core\" requirements to attend the college of their choice. Some states have mandated that the community college's curriculum be structured so as to satisfy \"core curriculum\" requirements at the state's public universities or private universities.\nMany community colleges have articulation", "-21.729802589979954" ], [ "being the only university to not suspend classes in defiances of the government order stating that they are autonomous. However, they must comply to the said order to secure the safety of its students.", "-21.72420330121531" ], [ "Court. The justices held that racial quotas are unconstitutional but permitted institutions of higher education to establish various means to close the race and gender gaps in admissions. Dovalina opposed a single entrance test to determine admission but favored the use of multiple criteria. Community colleges have open admission; LCC has restrictive entrance only in its honors and nursing programs.\nWhile Dovalina was LCC president, the United States Marines in 2005 built a 10-foot fence separating LCC from the Rio Grande. Not designed as a border barrier, the wall is intended to divert smugglers and illegal immigrants to places where the", "-21.709630101309358" ], [ "more difficult. Furthermore, many states only provide for admission on motion based on either an express reciprocal agreement or de facto reciprocity; that is, only if the applicant's home jurisdiction grants their own attorneys the same privilege.\nSome U.S. jurisdictions, such as Illinois, Massachusetts, Minnesota, Ohio, Tennessee, Texas, Wisconsin and the District of Columbia, will allow admission on motion of an attorney licensed in any state in lieu of taking their own bar examination, without the need to show reciprocity.\nSome states such as California, Florida, Louisiana, and South Carolina do not allow reciprocity or admission by motion for attorneys licensed in", "-21.69993128842907" ], [ "system (for example, a licence is worth 180 credits). However the traditional curriculum based on end of semester examinations still remains in place in most universities. That double standard has added complexity to a system, which also remains quite rigid. It is difficult to change a major during undergraduate studies without losing a semester or even a whole year. Students usually also have few course selection options once they enroll in a particular diploma.\nFrance also hosts various catholic universities recognized by the state, the largest one being Lille Catholic University, as well branch colleges of foreign universities. They include Baruch", "-21.699465565907303" ], [ "not take these remedial courses early in their college careers. Disadvantages and criticisms Some students are placed into remedial courses, even when they only have minor issues, leading them to need to pass and complete remedial courses before being able to enroll in a basic course for that subject area. Likewise, some students are restricted from taking classes in other disciplines, such as physical sciences, until they complete developmental sequences. Students who take remedial courses may not have these count as college credits, and these students may be more likely to complete fewer college credits overall or stop out of", "-21.676344913692446" ], [ "attend the school which admitted them; rejected, in which case they will not be able to attend the school; or deferred, in which case they will be reconsidered for admission with the second round of early decision applications or with the regular decision pool and notified later with their final decision. Generally when an applicant is deferred he or she is released from their binding early decision agreement. Advantages of early decision Admission rates for \"early\" applicants tend to be higher than the overall admission rates for the institution; this is particularly true of the most selective colleges. This is", "-21.6515363466533" ], [ "the option of taking College Board approved courses and then taking the College Board's examination in the Spring. Students, who achieve a 3 or better on the exam, may be awarded college credits at US universities and colleges. Each higher education institution sets its own standards about what level of credits are awarded to a student based on their AP exam score. Most higher education give credits for scores of 4 or 5. Some schools also give credits for scores of 3.\nIn 2015, the school offered one Advanced Placement (AP) course at a higher cost than regular courses. None", "-21.639273500069976" ], [ "Indirect entry.\nIn Direct entry students finishing Secondary education and High school education apply for entry, and if they pass their Secondary or High school exams they are selected to join. All students joining through this scheme are sponsored by the government.\nStudent failing to join through Direct entry apply for the Indirect entry scheme where they will be given a short course, and those who pass get admitted. Students joining through this scheme must bear all costs (tuition fees, accommodation etc.) Master of Engineering DIT through the Department of Civil engineering in collaboration with the Department of electrical engineering developed curriculum", "-21.623790442739846" ], [ "US Department of Education launched its Database of Accredited Postsecondary Institutions and Programs website to combat the spread of fraudulent degrees. A number of states have passed bills restricting the ability of organizations to award degrees without accreditation.\nJurisdictions that have restricted or made illegal the use of credentials from unaccredited schools include Oregon, Michigan, Maine, North Dakota, New Jersey, Washington, Nevada, Illinois, Indiana, and Texas. Many other states are also considering restrictions on the use of degrees from unaccredited institutions.", "-21.605512848938815" ], [ "admission but were denied admission on the basis of race. The case regarded the affirmative action policy in place for admissions at the University of Michigan, where on the basis of a points system to admission, minority students received additional points because of their race whereas white students did not. With a maximum of 150 attainable points, one would receive 20 extra points for being part of an underrepresented ethnicity group and would ultimately be granted admission if they met other basic requirements for admission.\nAccording to John A. Payton, the attorney who spoke on behalf of the University of Michigan,", "-21.582708138623275" ], [ "However, every institution has its own policies on admitting undocumented students. For example, following a 2003 recommendation by the state attorney general, many 4-year state colleges in Virginia require applicants to submit proof of citizenship or legal residency, and refuse admission to students without documentation. This policy is not, however, a state law. South Carolina and Alabama, do not allow undocumented students to apply to public universities Additional barriers Understanding how to navigate the higher education labyrinth is a learned social practice, a skill acquired through social networks, parent understanding, and access to the information. The opportunities to", "-21.579179177293554" ], [ "their decisions, they start preparing for the subject tests, and no longer take classes for the other three subjects. This decision will determine which college entrance test they will take at the age of 18, as well as influence their college majors and future career path. Regional discrimination A university usually sets a fixed admission quota for each province, with a higher number of students coming from its home province. As the advanced educational resources (number and quality of universities) are distributed unevenly across China, it is argued that people are being discriminated against during the admission process based on", "-21.577875164803118" ], [ "countries, as well as graduate admissions.) Some students, rather than being rejected, are \"wait-listed\" for a particular college and may be admitted if another student who was admitted decides not to attend the college or university. The five major parts of admission are ACT/SAT scores, grade point average, college application, essay, and letters of recommendation. The SAT's usefulness in the admissions process is controversial. It may or may not be biased, and it may or may not serve as a check on grade inflation in secondary schools. Nevertheless, some colleges are making the SAT optional for applying students. Legacies and", "-21.57181606895756" ], [ "a place. Universities give students either an unconditional offer, where the student will receive a place regardless, or a conditional offer, where the student will receive a place subject to their grades being met. In certain cirumstances, the University may withdraw the application before interviews, though this usually only occurs by some action on the applicants part (not replying to emails in time for example).\nFor applications to universities in the UK, entry requirements for individual courses can either be based on grades of qualifications (e.g. AAA at GCE A-Level, a score of 43/45 in the IB International Baccalaureate Diploma, or", "-21.518822047350113" ], [ "have the option of taking College Board approved courses and then taking the College Board's examination in the Spring. Students, who achieve a 3 or better on the exam, may be awarded college credits at US universities and colleges. Each higher education institution sets its own standards about what level of credits are awarded to a student based on their AP exam score. Most higher education give credits for scores of 4 or 5. Some schools also give credits for scores of 3. High schools give credits towards graduation to students who take the school's AP class. At Line", "-21.502898660022765" ], [ "a single exam, or on the student's performance during the whole semester. In the latter case, a point system is generally used rather than the 2–5 scale. The points accumulated during the semester are added and converted to a final grade according to some scale.\nAs a failing grade means merely having to repeat the failed subject, and can usually be corrected on a retake exam (and in some cases also on a special \"committee exam\"), it is used much more liberally, and it is quite common for a significant number of students to fail a class on the first attempt.", "-21.46652822755277" ], [ "the Court struck down a points-based undergraduate admissions system that added points for minority status, finding that its rigidity violated the Equal Protection Clause; in Grutter, the Court upheld a race-conscious admissions process for the university's law school that used race as one of many factors to determine admission. In Fisher v. University of Texas (2013), the Court ruled that before race can be used in a public university's admission policy, there must be no workable race-neutral alternative. In Schuette v. Coalition to Defend Affirmative Action (2014), the Court upheld the constitutionality of a state constitutional prohibition on the state", "-21.447614459728356" ], [ "control of, their universities are easily covered\". With the new board's decision a regional board of the NLRB ruled that the decision also applied in Penn's case. As a result, the votes cast in the 2004 election will never be counted and unfair labor practice charges were also dropped, as graduate employees at private Universities are no longer protected employees under the National Labor Relations Act. History In the fall of 2015, graduate students from the University of Pennsylvania decided to start another unionization campaign, ten years after initial unionization efforts. In the spring of 2016, they ratified a constitution", "-21.445955291826976" ], [ "it has \"no degree-granting authority from Liberia or Saipan.\"\nWithout recognized accreditation, ASU's degrees and credits might not be acceptable to employers or other academic institutions, and use of degree titles may be restricted or illegal in some jurisdictions. Jurisdictions that have restricted or made illegal the use of credentials from unaccredited schools include Oregon, Michigan, Maine, North Dakota, New Jersey, Washington, Nevada, Illinois, Indiana, Texas and Korea. Many other states are also considering restrictions on the use of degrees from unaccredited institutions. Criticism Steve Levicoff referred to Adam Smith University as a degree mill, and he noted that it operated", "-21.434863162285183" ], [ "colleges he or she prefers to take admission into along with the course, in the decreasing order of preference. The higher rank is most likely to get into the college of his first preference and the chances decrease as the rank lowers.", "-21.425534729052742" ], [ "U.S. Constitution requires that undergraduate students be allowed to participate in the election of the Pennsylvania State University board of trustees—thereby allowing them to have a voice in the board's makeup. Holding The Equal Protection Clause of the Fourteenth Amendment, the court held, did not require the undergraduate students be allowed to participate in the selection of the board of trustees. The court ruled that the selection process for the board does \"serve important governmental objective\" and is \"substantially related to the achievement of those objectives\". The court decided the election of members of the board of trustees", "-21.412435415375512" ], [ "pick 65% to 70% of their students, the rest being selected by lottery. Any qualified child can enter the lottery, regardless of previous school performance (see: Education in Berlin).\nSome gymnasia are inundated with applications and some children have to resort to second or third choices. Tuition State-funded schools (a big majority) are tuition-free, as foreseen by the respective laws, even often on constitutional level. Segregation of students by parent wealth or income is looked down upon, to the point of being an exception to the constitutionally guaranteed freedom to have private schools (Article 7 section 4 of the German constitution,", "-21.409926570035168" ], [ "percent of applicants offered admission, who decide to accept, is known as the admissions yield, and this proportion varies somewhat from year to year, and reflects economic conditions as well as interest in a given university. \nColleges mailing out wait list offers generally advise students to reserve a spot at a college they have been accepted to by sending in a deposit, usually several hundred dollars to guarantee that the student will have a place at any college in the fall. Later, if a student is accepted by a college from a wait list, and if he or she chooses", "-21.404558095120592" ], [ "maximum failing in two courses from the previous year(s). Academic load Students do not register for their courses but study a predetermined plan of courses set by the administration. The maximum load per semester is seven courses excluding the humanities ( e.g. English language).\nCourses are classified into theoretical and practical courses, practical courses include laboratory (workshop) teaching hours. In contrast, there exist predetermined and selective courses.\nSelective courses allow the students to select one course among several ones. Students have the chance to realize annual projects which are accompanied by practical realization. Those projects are essential to increase the students", "-21.3911698704469" ], [ "able to take classes at a university and a special training school at the same time. Educational programs are organized through a timetable where a student can attend classes at a special training school in the morning and a university in the afternoon. Using this approach, a student can learn a variety of subjects at a university and gain vocational skills simultaneously at a special training school. Upon graduation, both the bachelor's degree awarded by the university and the associate degree or diploma awarded by the special training school are granted at the same time. Colleges of technology Colleges of", "-21.374520875047892" ], [ "asynchronously in the style and format similar to university online courses. Using the online format, students and teachers can access and participate in courses at any time: weekends, holidays, etc. And because the courses are asynchronous, there are no registration deadlines, meaning that students can complete their studies at their own pace. The school welcomes non-traditional students, including homeschool students and adult learners.\nCourses are available to meet the needs of a wide variety of learners, including the following: low-enrollment courses, interest-specific electives, college-remedial courses, courses for special needs students, courses for the adult learner, and advanced level courses. Dual enrollment", "-21.346771971788257" ], [ "the Ministry of Education (upon request of the person concerned).\nStudents who enter the university from Baccalaureate studies will have free tuition fees for the first year if they have obtained a global Honours calification in 2nd year of Baccalaureate or if they have obtained the \"Baccalaureate Extraordinary Award\". Likewise, they will be entitled to exemption from registration fees in the entrance exam (Selectivity). This free tuition is not incompatible with obtaining other grants contemplated in the call for grants from the Ministry of Education.", "-21.313042884721654" ], [ "a special course (such as a Laboratory Course), or to compensate for a failed course. Courses After their first year students elect a major in either Humanities, Social Sciences, Sciences, a double major in any two of these or an interdepartmental major in a combination of these. In the latter cases a student will have to make a convincing argument to the Director of Education. There are two double degree programmes on offer, combining the University College Utrecht curriculum with a degree in Law, or a degree in Physics. \nStudents are allowed to combine courses from different disciplines, thereby encouraging", "-21.309550247431616" ], [ "to assign students to remedial courses may be related to over placement. Research on outcomes Depending on their skill level upon entering college, students can spend from 1 to multiple semesters working to fulfill remedial requirements before advancing to college level courses required for their degree. An example of a full sequence of math remedial courses for low-skill students might include: 1) Pre-Collegiate Math, 2) Basic Algebra, and 3) Intermediate Algebra. There are many questions about how this structure both benefits students by increasing their preparation and harms students by increasing the courses required and time needed to complete college.", "-21.304049925878644" ], [ "have no law. Everyone else does.\" This is because Governor Schwarzenegger vetoed renewing the Private Postsecondary and Vocational Education Reform Act. The military also restricts the use of unaccredited degrees; a notable case involved Vice Admiral Donald Arthur of the U.S. Navy.\nWyoming-based Kennedy-Western University sued the state of Oregon in 2004, challenging a state law that made it illegal for résumés used in connection with employment (including job applications) in the state to list degrees from institutions that are not accredited or recognized by the state as legitimate., Kennedy-Western claimed that its degree-holders had a First Amendment right to say", "-21.303687340405304" ], [ "they've received their 34th course credit, attended the school for seven years, or until they are age of 20 and has not been enrolled in a school in the last four years; after which, the secondary school reserves the right to refuse further admission to the student.", "-21.299011944560334" ], [ "has explicit protections for employees only, but these same explicit protections are missing from the student non-discrimination policy. Religious freedom bills As of May 2019, a bill is pending in the Texas Legislature which would allow state-licensed professionals to refuse to serve members of the LGBT community on grounds of religious objections. University LGBT non-discrimination policies The following universities have non-discrimination policies for students and employees based on sexual orientation, gender identity and gender expression: Texas A&M Commerce, Texas A&M Corpus Christi, West Texas A&M, University of Texas at Austin, University of Texas at San Antonio, University of Texas at", "-21.297053667367436" ], [ "such as mathematics or those who take a difficult double-major (within the same degree) or minor may choose to take a minimum number of classes (two, three, or four depending on the number of credits offered per class) at one time in order to achieve higher grades or superior retention. Difficult circumstances Occasionally a student becomes ill or is injured in mid-semester and cannot complete/pass the classes he/she has begun. If this occurs after the drop-deadline, the school may make a judgment as to whether to count the grades against him/her or drop the student from the semester. In either", "-21.296464502626804" ], [ "ceremony—leave the state out of it—and create a business- or domestic-partner contract aligning the couple legally.\nProfessor Gary Becker, a winner of the Nobel Memorial Prize in Economic Sciences, has said that:\nWith marriage contracts that set out the couple's commitments, there is little reason why judges should retain their current involvement in marriage.\nAs of 2015, the only known members of US Congress to support privatization of state marriage are Sen. Rand Paul, Rep. Justin Amash (R–Michigan) and Rep. Gary Palmer (R–Alabama). Religious advocacy Pepperdine University law professor Douglas Kmiec told the Catholic News Agency that churches that do not accept same-sex", "-21.278096700145397" ], [ "Arizona Court of Appeals that said the state hadn't explicitly granted in-state tuition to DACA recipients and that the colleges policy was against Arizona law. Specifically, Proposition 300, a 2006 law passed by Arizona voters with 71.4% of the vote that stipulates state-funded services and benefits such as in-state tuition cannot not be provided to individuals without legal status. Disability access lawsuits investigations According to Legal Newsline, Brnovich has targeted scammers to protect small businesses in Arizona. He shut down an unscrupulous attorney named Peter Strojnik who was \"filing dubious disability access lawsuits against small businesses.\" After Brnovich's investigation, Arizona", "-21.274277308926685" ], [ "lawful pursuit of a common goal, and (ii) it seems 'exceedingly unlikely' it will prevent persons from continuing to associate.\"\nIn its conclusion, the Court cited the Supreme Court's 1972 decision in Baker v. Nelson, noting that when \"faced with a Fourteenth Amendment challenge to a decision by the Supreme Court of Minnesota denying a marriage license to a same-sex couple, the United States Supreme Court dismissed 'for want of a substantial federal question.' (Emphasis added.) There is good reason for this restraint.\" The Court held that Initiative Measure 416 \"and other laws limiting the state-recognized institution of marriage to heterosexual", "-21.267619178936002" ], [ "takes at least one remedial course in math, reading or English. Dual enrollment The high school offers a dual enrollment program. This state program permits high school students to take courses, at local higher education institutions, to earn college credits. Students remain enrolled at their high school. The courses count towards high school graduation requirements and towards earning a college degree. The students continue to have full access to activities and programs at their high school. The college credits are offered at a deeply discounted rate. The state offered a small grant to assist students in costs for tuition, fees", "-21.265557176346192" ], [ "with other applicants However, the application process includes \"...an assessment by The School to confirm it can serve the child.\" , which even for children who \"win the lottery\" or are otherwise guaranteed a slot through their department, can result in denial of admission for reasons relating to learning needs the School purports it cannot serve (despite the presence of other children in The School who receive such services).", "-21.265115240879823" ], [ "not be disqualified from entering or pursuing a business, profession, vocation, or employment because of sex, race, creed, color, or national or ethnic origin. California Constitution, Article I, §8 (1879)\nColorado – Equality of rights under the law shall not be denied or abridged by the state of Colorado or any of its political subdivisions because of sex. Colorado Constitution, Article II, §29 (1973)\nConnecticut – No person shall be denied the equal protection of the law nor be subjected to segregation or discrimination in the exercise or enjoyment of his or her civil or political rights because of religion, race, color,", "-21.254637600970455" ], [ "placed in the Winter Pool, where they can be offered places by other colleges. This is in order to maintain consistency throughout the colleges, some of which receive more applicants than others.\nGraduate admission is first decided by the faculty or department relating to the applicant's subject. When an offer is made, this effectively guarantees admission to a college—though not necessarily the applicant's preferred choice. Access Public debate in the United Kingdom continues over whether admissions processes at Oxford and Cambridge are entirely merit based and fair; whether enough students from state schools are encouraged to apply to Cambridge; and whether", "-21.24284442116914" ], [ "Several states have chosen to ignore or delay the implementation of same-sex marriage.\nA different procedure exists. If officials in a given state repeatedly appeal amparo cases to a federal appeals court and lose five times in a row (note that since 2015 no court in Mexico is allowed to rule against same-sex marriage), and if the appellate court then forwards the results to the Supreme Court (SCJN), the SCJN can force the state legislature to repeal its ban. The Court gives the state a deadline by which it must modify its laws, usually 90 or 180 business days. If the", "-21.236384094801906" ], [ "unconstitutionality. For instance, in 2016, the Congress of Puebla modified its marriage laws, but left intact provisions outlawing same-sex marriages. LGBT groups quickly filed an action of unconstitutionality. Actions of unconstitutionality are reviewed by the full bench of the Mexican Supreme Court. The Court decides whether these laws are constitutional, and if they are not, they are struck down. Unlike the amparo and resolution processes described above, the action of unconstitutionality process is absolute. The states cannot ignore it.\nAs of April 2019, five states (Aguascalientes, Chiapas, Jalisco, Nuevo León, and Puebla) have had their same-sex marriage bans struck down by", "-21.22467570572917" ] ]
5hvqte
What prevents online test takers from just googling the answer?
[ "Google won't help you much with a well made test. Properly made tests test if you understand the topic, they don't ask you to regurgitate memorized definitions, or if they do, such questions don't have a big impact on the final score.", "If they are serious about preventing cheating they require you to use a browser \"lockdown\" software. However this does not prevent someone from using two computers for their test. The most effective method I've seen is a test that has the lockdown browser and additionally a webcam feature. Students must take the test on a computer with a webcam and it records your face and hands as you take the test.", "When I was in college, we had to use a special browser ~~(I forget the name)~~ called Respondus LockDown Browswer that basically locked down a lot of functionality while it was open. You couldn't ALT+TAB to a different window, you couldn't close it without exiting the quiz, it was full screen be default so you could only see it, etc. There were ways around it (I had an iPad, so... yeah), but there were ways to try to stop people from being able to use the computer from doing anything but taking the exam at the time.", "Usually the time limits I took a few online tests (though they were \"open book\" so using google wasn't considered cheating) and whilst it's easy enough to highlight the question and google the answer the time limit makes any meaningful research difficult. If it's short answer or multiple choice you might be able to google em all, but otherwise you still need to study", "In most careers, you are not expected to retain everything you learned in school. The expectation is that you will know where to find the information you need when you need it. If you studied well, you should remember where to find the the information needed.", "There are multiple ways where an online test can limit the possibilities of you 'cheating', but they can never take it away completely. Not without some additional requirements that i haven't seen before. - Time. By only giving so much time to answer the questions, you limit the time a candidate has to look it up. It won't prevent it, but if you look up every question, you'll run out of time - No tab / app switching. By detecting if a window is deactivated (because you're switching to another tab or another program) and immediately terminating the test. This does not prevent a candidate from using his cell phone or secondary computer to look it up. I think the only way they could prevent it, if you were forced to enable your webcam, so they can make sure your eyes stay on the screen. Maybe even requiring you to use the webcam to show your surrounding to make sure you have no notes hanging about. But this has serious implications and i'm not sure if they could make it a requirement.", "At my school, they use an online proctoring service. You connect at a certain time and the proctor will video chat with you. They can see your screen and take over your mouse if need be. You have to pick up your computer and show them the room you're in so that they know you're not using another computer, a paid test taker, or notes. They also check your ID and watch you take the test. There are ways around it (my favorite technique is hiding a cheat sheet under my laptop and holding it when they ask you to pick up the computer and show them your desk) and it's not cheap (25$/exam, 3 exams/class, 4 classes/semester) but it is much better at preventing cheating than nothing.", "In India, for GATE exams, they had a browser open that doesn't have the title bar so you cannot minimize the browser. The browser was locked down, so you cannot open tabs. There was a scientific calculator sticked to the top left corner. The computer did not have a keyboard. To select the correct choice, you have to click the corresponding radio button. And also, they give you a 25 page scratch pad with your serial number on it, so that you cannot exchange it with dude sitting next to you. You are not allowed to take anything with you except a pencil. I couldn't think of any way some one can cheat without getting caught.", "In the world we are living in the question is why we keep teaching how to learn by memory and not how to search for the answer. It's like learning to build a car in order to get a driver's license" ]
[ [ "test because the internet cannot perform the fraud detection steps by itself. Further, the court mentioned that the mere collection and organization of data regarding credit card numbers and Internet addresses is insufficient to meet the transformation prong of the test. Moreover, the internet is not an exclusive source of the data needed for the analysis, and the court found the process is not tied to any particular machine, regardless of whether or not the internet can be considered as a machine.\nSecond, the court examined the claim outside the scope of the machine-or-transformation test like in the Bilski v. Kappos", "-28.370547108454048" ], [ "to choose from.\nMany have questioned the usefulness of security questions. Security specialist Bruce Schneier points out that since they are public facts about a person, they are easier to guess for hackers than passwords. Users that know this create fake answers to the questions, then forget the answers, thus defeating the purpose and creating an inconvenience not worth the investment.", "-26.31850427063182" ], [ "postpone the release of the solutions was made in order to prevent strategic cheating that had been noticed during previous tests. The current test (since autumn 2011) The test is since autumn 2011 divided into two parts - a quantitative and a verbal part of 80 questions each. The quantitative and the verbal parts are both divided into four sections each with different types of questions. The test has a total of 160 questions, divided into four subtests of 40 questions each. Two of the subtests contains questions from the quantitative part of the test. The other two subtests contains", "-26.30382358992938" ], [ "a random challenge value to create a response value.\nSuch encrypted or hashed exchanges do not directly reveal the password to an eavesdropper. However, they may supply enough information to allow an eavesdropper to deduce what the password is, using a dictionary attack or brute-force attack. The use of information which is randomly generated on each exchange (and where the response is different from the challenge) guards against the possibility of a replay attack, where a malicious intermediary simply records the exchanged data and retransmits it at a later time to fool one end into thinking it has authenticated a new", "-26.058524896099698" ], [ "testing vs. outsource testing The main difference between crowdsource testing and software testing outsourcing is that, in crowdsource testing, testers may belong to different workplaces. When outsourcing testing, the testers are from the same company or workplace that is responsible for outsourcing. In crowdsource testing, people voluntarily test software with the possibility of not being paid (if no bugs are discovered). Outsource testers always get paid for their work.\nWhile for some projects it may be possible to get away with only using one approach or the other, a more thorough approach would use a holistic software testing method, which", "-26.02062241587555" ], [ "cheating can be observed even for relatively low stakes.\nSome quizzes also now ban re-entry to the pub after the quiz has started, in order to prevent team members from using public internet stations, public telephones and mobile devices out of sight of the quizmaster. Generally, though, a pub runs its quiz alongside its normal operation, making such a measure impractical. Technology In a digital pub quiz wireless handsets replace the more usual pen and paper. A computer receives and records the answers from each team's handset and the results are exported to a spreadsheet at the end of the quiz.", "-25.87969389447244" ], [ "the test if interrogators are not able to tell the difference between it and a human in a five-minute conversation. Eugene Goostman On June 7, 2014, a computer program named Eugene Goostman was declared to be the first AI to have passed the Turing Test in a competition held by the University of Reading in England. In the competition Eugene was able to convince 33% of judges that they were talking with a 13-year-old Ukrainian boy. The supposed victory of a machine that thinks aroused controversies about the Turing Test. Critics claimed that Eugene passed the test simply by fooling", "-25.87371240835637" ], [ "testing, which include online testing, offline generation of executable tests, and offline generation of manually deployable tests.\nOnline testing means that a model-based testing tool connects directly to an SUT and tests it dynamically.\nOffline generation of executable tests means that a model-based testing tool generates test cases as computer-readable assets that can be later run automatically; for example, a collection of Python classes that embodies the generated testing logic.\nOffline generation of manually deployable tests means that a model-based testing tool generates test cases as human-readable assets that can later assist in manual testing; for instance, a PDF document in a human", "-25.79828829591861" ], [ "unique user name and password, they would then proceed to the test.\nThe test consisted of 40 multiple-choice travel-themed questions to be completed in 15 minutes time (20 minutes from 2003–2006), with a countdown clock visible throughout the test. No two tests were alike, as the questions were picked from a pool of several thousand questions, with each test being \"weighted\" with an equal number of easy, medium, and hard questions. Neither reference materials (printed or electronic) nor help from another person was allowed, and this was agreed to when a student checked the \"Integrity Oath\" box during registration.\nQuestions had to", "-25.703995525691425" ], [ "With the mass use of mobile phones and mobile internet access, cheating has become a problem for some pub quizzes, with covert calls and texts made in the toilets, recent newspapers and magazines brought along especially for the event, ringers and so on. Though a maximum number of members set for teams may help to prevent large numbers of people collaborating, groups posing as several distinct teams are quite common. Some quizzes now ban the use of mobiles and nullify the score of any team found to be cheating. Though more prevalent where large sums of money are at stake,", "-25.597117392229848" ], [ "it has obtained in previous situations. Watson's ability to build off previous knowledge allows queries to be automatically filtered for similar contexts in order to supply precise results.\nMajor search services such as Google, Bing, and Yahoo also have a system of automatically inferring the context of particular user queries. Google tracks user's previous queries and selected results to further personalize results for those individuals. For example, if a user consistently searches for articles related to animals, wild animals, or animal care a search for \"jaguar\" would rank an article on jaguar cats higher than links to Jaguar Cars. Similar to", "-25.517385435989127" ], [ "nor attempts made as to ask complex questions requiring logical replies. A test populated entirely by such questioners would generate a different outcome.\nThough it is on the way, the current Cleverbot is not designed to handle such logic – it is designed to imitate human chat. Thus a claim of an actual pass of the test envisioned by Turing would be open to endless debate.\nCarpenter says we are a long way from having the computing power or developing the algorithms needed to achieve full artificial intelligence, but believes it will come in the next few decades.\n\"We cannot quite", "-25.40713546288316" ], [ "they are deemed likely to fail to generalize outside the test set, or if people consider the rule to be \"cheating\" or \"unfair\". A human can audit rules in an XAI to get an idea how likely the system is to generalize to future real-world data outside the test-set. Goals Cooperation between agents, in this case algorithms and humans, depends on trust. If humans are to accept algorithmic prescriptions, they need to trust them. Incompleteness in formalization of trust criteria is a barrier to straightforward optimization approaches. For that reason, interpretability and explainability are posited as intermediate goals for checking", "-25.325765463581774" ], [ "questions from the verbal part. A fifth subtest is also given in order to develop new questions for future tests, but the result from this subtest is not counted.\nThe test-takers are allowed to mark down their answers on an additional provided answer sheet, in addition to the sheet that they hand in to test supervisor after every subtest, and bring this with them after the test is completed. In this way they can compare their answers to the test key which is later published on the internet, teletext and newspapers. This only allows the test-takers to find out their raw", "-25.27059468650259" ], [ "Black-box testing Test procedures Specific knowledge of the application's code, internal structure and programming knowledge in general is not required. The tester is aware of what the software is supposed to do but is not aware of how it does it. For instance, the tester is aware that a particular input returns a certain, invariable output but is not aware of how the software produces the output in the first place. Test cases Test cases are built around specifications and requirements, i.e., what the application is supposed to do. Test cases are generally derived from external descriptions of the software,", "-25.267243220238015" ], [ "know that one or more of those being interviewed was a computer during the interrogation. As Ayse Saygin, Peter Swirski, and others have highlighted, this makes a big difference to the implementation and outcome of the test. An experimental study looking at Gricean maxim violations using transcripts of Loebner's one-to-one (interrogator-hidden interlocutor) Prize for AI contests between 1994–1999, Ayse Saygin found significant differences between the responses of participants who knew and did not know about computers being involved. Tractability and simplicity The power and appeal of the Turing test derives from its simplicity. The philosophy of mind, psychology, and modern", "-25.261563287174795" ], [ "Criticisms Critics of integrity testing think 1) it is unfair to avoid hiring someone because they have a predisposition to do something that they might never do, 2) integrity tests can violate legal and ethical privacy standards, because some questions may not be related to specific duties of the job, and there is no protection for the illegal use of the data, 3) integrity tests would have adverse impact of screening out a higher proportion of minority group members, 4) if a client learns of their own score, it may have an adverse effect on their morale, but even if", "-25.23820843125577" ], [ "computerized testing that attempts to prevent a user from accessing software other than the test itself.", "-25.23793700584065" ], [ "Challenge–response authentication Other non-cryptographic protocols Challenge-response protocols are also used to assert things other than knowledge of a secret value. CAPTCHAs, for example, are a sort of variant on the Turing test, meant to determine whether a viewer of a Web application is a real person. The challenge sent to the viewer is a distorted image of some text, and the viewer responds by typing in that text. The distortion is designed to make automated optical character recognition (OCR) difficult and preventing a computer program from passing as a human. Cryptographic techniques Non-cryptographic authentication were generally adequate in", "-25.234950099140406" ], [ "the honeypot operator can notify spammers' ISPs and have their Internet accounts canceled. If honeypot operators detect spammers who use open-proxy servers, they can also notify the proxy server operator to lock down the server to prevent further misuse.\nThe apparent source may be another abused system. Spammers and other abusers may use a chain of such abused systems to make detection of the original starting point of the abuse traffic difficult.\nThis in itself is indicative of the power of honeypots as anti-spam tools. In the early days of anti-spam honeypots, spammers, with little concern for hiding their location, felt safe", "-25.186691672657616" ], [ "is called solving the \"mapping problem\".\nIn the case of online testing (see below), abstract test suites exist only conceptually but not as explicit artifacts.\nTests can be derived from models in different ways. Because testing is usually experimental and based on heuristics,\nthere is no known single best approach for test derivation.\nIt is common to consolidate all test derivation related parameters into a\npackage that is often known as \"test requirements\", \"test purpose\" or even \"use case(s)\".\nThis package can contain information about those parts of a model that should be focused on, or the conditions for finishing testing (test stopping criteria).\nBecause test suites", "-25.16779784265964" ], [ "In May 1994, Kaplan, Inc warned ETS, in hearings before a New York legislative committee, that the small question pool available to the computer-adaptive test made it vulnerable to cheating. ETS assured investigators that it was using multiple sets of questions and that the test was secure. This was later discovered to be incorrect.\nIn December 1994, prompted by student reports of recycled questions, then Director of GRE Programs for Kaplan, Inc and current CEO of Knewton, Jose Ferreira led a team of 22 staff members deployed to 9 U.S. cities to take the exam. Kaplan, Inc then presented ETS with", "-25.07604702221579" ], [ "answer clues we are sure of and then proceed filling the schema by exploiting the already answered clues as hints, WebCrow uses two clearly distinct stages. In the first one, it processes all the clues and tries to answer them all: For each clue it finds many possible candidates and sorts them according to complex ranking models mainly based on a probability criteria. In the second stage, WebCrow uses constraint satisfaction algorithms to fill the grid with the overall most likely combination of clue answers.\nIn order to interact with Google, first of all, WebCrow needs", "-25.04902529064566" ], [ "the \"offending\" competitor by displaying their page further down in the search results. For victims of Google bowling, it may be difficult to appeal the ranking decrease because Google avoids explaining penalties, preferring not to \"educate\" real offenders. If the situation is clear-cut, however, Google could lift the penalty after submitting a request for reconsideration. Furthermore, after the Google Penguin update, Google search rankings now take Google bowling into account and very rarely will a website be penalized due to low-quality \"farm\" backlinks. Other search engines Other search engines use similar techniques to rank results, so Yahoo!, Bing, and Ask.com", "-25.0460232392943" ], [ "Crowdsourced testing System Crowdsource testing companies provide the platform for the testing cycles, generally free of charge to the companies whose products are being tested. They then crowdsource the product to a community of testers, who register for testing the software voluntarily. These testers are generally paid per bug, depending upon the type of bug and its market price. The crowdsource testing team is usually in addition to the in-house quality assurance team, not a replacement. Depending on the task, some platforms offer access to their crowd through a self-service model, a managed service by the provider, or both. Crowdsource", "-24.99631987383691" ], [ "they cheated on a test, 72% cheated on a written work, and 97% reported to at least had copied someone's homework or peeked at someone's test. 1/3 reported to have repeatedly cheated.\" The new revolution in high-tech digital info contributes enormously to the new wave in cheating: online term-paper mills sell formatted reports on practically any topic; services exist to prepare any kind of homework or take online tests for students, despite the fact that this phenomenon, and these websites, are well known to educators ; MP3 players can hold digitalized notes; graphing calculators store formulas to solve math problems.\nThe", "-24.921699058133527" ], [ "by automatic reasoning on a properly organized knowledge base of wired rules. Last but not the least, the final constraint satisfaction step is very effective to fill the correct candidate, even though, unlike humans, the system can not rely on very high confidence on the correctness of the answer. Competitions WebCrow speed and effectiveness has been tested many times in man-machine competitions on Italian, English and multi-language crosswords\nThe outcome of the tests is that WebCrow can successfully compete with average human players on single language schemes and reaches expert level performance in multi-language crosswords.", "-24.86619838088518" ], [ "discontinued at that point. Cheating Ahn has described countermeasures which prevent players from \"cheating\" the game, and introducing false data into the system. By giving players occasional test images for which common labels are known, it is possible to check that players are answering honestly, and a player's guesses are only stored if they successfully label the test images.\nFurthermore, a label is only stored after a certain number of players (N) have agreed on it. At this point, all of the taboo lists for the images are deleted and the image is returned to the game pool as if it", "-24.794587918848265" ], [ "search queries for a particular topic. Among other things, we apply a narrow set of removal policies for pornography, violence, and hate speech. It's important to note that removing queries from Autocomplete is a hard problem, and not as simple as blacklisting particular terms and phrases.\nIn search, we get more than one billion searches each day. Because of this, we take an algorithmic approach to removals, and just like our search algorithms, these are imperfect. We will continue to work to improve our approach to removals in Autocomplete, and are listening carefully to feedback from our users.\nOur algorithms look not", "-24.78434346197173" ], [ "claim that Eugene Goostman was the first ever chatbot to pass a Turing test was met with scepticism; critics acknowledged similar \"passes\" made in the past by other chatbots under the 30% criteria, including PC Therapist in 1991 (which tricked 5 of 10 judges, 50%), and at the Techniche festival in 2011, where a modified version of Cleverbot tricked 59.3% of 1334 votes (which included the 30 judges, along with an audience). Cleverbot's developer, Rollo Carpenter, argued that Turing tests can only prove that a machine can \"imitate\" intelligence rather than show actual intelligence.\nGary Marcus was critical of Warwick's claims,", "-24.78006350575015" ], [ "main advantage of exploratory testing is that less preparation is needed, important bugs are found quickly, and at execution time, the approach tends to be more intellectually stimulating than execution of scripted tests.\nAnother major benefit is that testers can use deductive reasoning based on the results of previous results to guide their future testing on the fly. They do not have to complete a current series of scripted tests before focusing in on or moving on to exploring a more target rich environment. This also accelerates bug detection when used intelligently.\nAnother benefit is that, after initial testing, most bugs are", "-24.760442035505548" ], [ "the test may not help the situation as humans can often be misidentified as being a machine. Impracticality and irrelevance: the Turing test and AI research Mainstream AI researchers argue that trying to pass the Turing test is merely a distraction from more fruitful research. Indeed, the Turing test is not an active focus of much academic or commercial effort—as Stuart Russell and Peter Norvig write: \"AI researchers have devoted little attention to passing the Turing test.\" There are several reasons.\nFirst, there are easier ways to test their programs. Most current research in AI-related fields is aimed at modest", "-24.757705213996815" ], [ "Search engine manipulation effect Scenarios At least three scenarios offer the potential to shape/decide elections. The management of a search engine could pick a candidate and adjust search rankings accordingly. Alternatively, a rogue employee who has sufficient authority and/or hacking skills could surreptitiously adjust the rankings. Finally, since rankings influence preferences even in the absence of overt manipulation, the ability of a candidate to raise his or her ranking via traditional search engine optimization would influence voter preferences. Simple notoriety could substantially increase support for a candidate. Experiments Five experiments were conducted with more than 4,500 participants in two countries.", "-24.730500167177524" ], [ "As a result, programmers (especially hackers) will sometimes indulge in an informal reverse Turing test for recreation.\nAn informal reverse Turing test involves an attempt to simulate a computer without the formal structure of the Turing test. The judges of the test are typically not aware in advance that a reverse Turing test is occurring, and the test subject attempts to elicit from the 'judges' (who, correctly, think they are speaking to a human) a response along the lines of \"is this really a human?\". Describing such a situation as a \"reverse Turing test\" typically occurs retroactively.\nThere are also", "-24.7199286998366" ], [ "on a separate form or document.\nIn some tests; where knowledge of many constants or technical terms is required to effectively answer questions, like Chemistry or Biology – the test developer may allow every test taker to bring with them a cheat sheet.\nA test developer's choice of which style or format to use when developing a written test is usually arbitrary given that there is no single invariant standard for testing. Be that as it may, certain test styles and format have become more widely used than others. Below is a list of those formats of test items that are widely", "-24.666203320695786" ], [ "tester seeks to find bugs by any means that seem appropriate. Ad hoc testing can be seen as a light version of error guessing, which itself is a light version of exploratory testing.", "-24.663889895222383" ], [ "many times a search result is clicked on, as compared to the number of times the listing appears in search results.\nIn contrast to PPC fraud, where a competitor leverages the services of a botnet, or low cost labour, to generate false clicks, in this case the objective is to beggar thy competitor by making their CTR rate as low as possible, thereby diminishing their ranking factor (position from the top of search results).\nBad actors will therefore generate false clicks on organic search results that they wish to promote, while avoiding search results they wish to demote. This technique can effectively", "-24.65916860185098" ], [ "tests and in production code during a test-phase.\nThe advantage of internal self-tests is that they can detect errors before they manifest themselves as invalid results observed by the client. This leads to earlier and more specific error detection.\nThe use of assertions can be considered to be a form of test oracle, a way of testing the design by contract implementation.", "-24.642300787032582" ], [ "conditions or actions (logic bombs). Since no immediate, detectable state change occurred, the client honeypot is likely to incorrectly classify the server as safe even though it did successfully perform its attack on the client. Finally, if the client honeypots are running in virtual machines, then an exploit may try to detect the presence of the virtual environment and cease from triggering or behave differently. Capture-HPC Capture is a high interaction client honeypot developed by researchers at Victoria University of Wellington, NZ. Capture differs from existing client honeypots in various ways. First, it is designed to be fast. State", "-24.64114486356266" ], [ "computer screen. This is followed by a section of 16 more complex questions, displayed on the screen, involving interpretation of statistical data and graphs, and problem solving. For this section of the test an on-screen calculator is supplied.\nPractice tests which simulate the real tests can be accessed at practice.skillstestbooking.com. Access is open to anyone but a valid email address must be supplied.\nCandidates are restricted to one attempt and two re-sits for each of the tests. If not successful after three attempts, a candidate can make a further attempts.\nCandidates whose first language is not English, or who have a recognised special", "-24.638841539155692" ], [ "Web development Testing Testing is the process of evaluating a system or its component(s) with the intent to find whether it satisfies the specified requirements or not. Testing is executing a system in order to identify any gaps, errors, or missing requirements contrary to the actual requirements.\nThe extent of testing varies greatly between organizations, developers, and individual sites or applications. Security considerations Web development takes into account many security considerations, such as data entry error checking through forms, filtering output, and encryption. Malicious practices such as SQL injection can be executed by users with ill intent yet with only primitive", "-24.619514701655135" ], [ "sure that it's right? In order that the man who checks may not have too difficult a task, the programmer should make a number of definite assertions which can be checked individually, and from which the correctness of the whole program easily follows\".", "-24.61597017699387" ], [ "various levels of abstraction. The real point is that tests are usually designed from an abstract structure such as the input space, a graph, or logical predicates, and the question is what level of abstraction we derive that abstract structure from. That can be the source code, requirements, input space descriptions, or one of dozens of types of design models. Therefore, the \"white-box / black-box\" distinction is less important and the terms are less relevant. Hacking In penetration testing, white-box testing refers to a method where a white hat hacker has full knowledge of the system being attacked. The", "-24.563813699052844" ], [ "the premise that solving on-the-job coding challenges can allow companies to better assess the skills of a potential candidate.\nDuring a Company Bot challenge, participants are faced with multiple rounds of challenges of varying difficulty. Both the bot and the challenger are attempting to solve the coding challenge side by side. Each participant gains points based on speed and accuracy. After the participant submits their solution, it is evaluated and only accepted if it passes all the tests. Only after winning the Bot challenge, can the participant be provided with the opportunity to submit their information to the recruiter of the", "-24.561618124716915" ], [ "computer version of the test than the other two versions, an explanation of this is due to the fact that the computer based exam is tailored to their demonstrated ability level. These tests are beneficial because they help measure your potential; it gives you a good indicator of where your talents are. By viewing your scores, you can make intelligent career decisions. The higher score you have, the more job opportunities that are available to you. Wiesen Test of Mechanical Aptitude The Wiesen Test of Mechanical Aptitude is a measure of a person's mechanical aptitude, which is referred to as", "-24.507349168969085" ], [ "encrypted to maintain privacy.\nHoneypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot. A honeypot can also direct an attacker's attention away from legitimate servers. A honeypot encourages attackers to spend their time and energy on the decoy server", "-24.474974329350516" ], [ "run-time, most type checkers will reject the program as ill-typed, because it is difficult (if not impossible) for a static analyzer to determine that the else branch will not be taken. Conversely, a static type checker will quickly detect type errors in rarely used code paths. Without static type checking, even code coverage tests with 100% coverage may be unable to find such type errors. The tests may fail to detect such type errors, because the combination of all places where values are created and all places where a certain value is used must be taken into account.\nA number of", "-24.41787858569296" ], [ "Crowdsourced Testing (company) Testing process After every project, a tester's performance is rated on a scale of 0-10. This score is averaged with his previous scores in order to get his Tester Score. Only testers with scores above 6 are allowed to participate in paid projects. First-time testers who register to the Crowdsourced Testing platform are required to begin with free (non-paid) projects before getting their Tester Score above 6.\nWhen requesting a testing project, clients are able to choose between the devices they want tested, the time spent on each device, and the number of testers to test. Crowdsourced Testing", "-24.41756714746589" ], [ "to prevent any hidden errors later on. These different techniques exercise every visible path of the source code to minimize errors and create an error-free environment. The whole point of white-box testing is the ability to know which line of the code is being executed and being able to identify what the correct output should be. Modern view A more modern view is that the dichotomy between white-box testing and black-box testing has blurred and is becoming less relevant. Whereas \"white-box\" originally meant using the source code, and black-box meant using requirements, tests are now derived from many documents at", "-24.413719406584278" ], [ "alter our results by hand in order to prevent such items from showing up. Pranks like this may be distracting to some, but they don't affect the overall quality of our search service, whose objectivity, as always, remains the core of our mission.\"\nIn January 2007, Google changed their indexing structure so that Google bombs such as \"miserable failure\" would \"typically return commentary, discussions, and articles\" about the tactic itself. Google announced the changes on its official blog. In response to criticism for allowing the Google bombs, Matt Cutts, the head of the Google’s web spam team, said that Google bombs", "-24.40723769168835" ], [ "often bordering on spam and fraud, is a growing problem from the perspective of consumer protection and the quality of search engines. By playing the algorithm of search engine giant Google, it is possible to place low quality sites prominently in the search results.\nUntil recently the phenomenon of fake test or comparison websites had escaped public attention. An analysis by testbericht.de discovered that 34,6% of German search traffic related to product tests on the first page of google leads to fake test sites. When a big German newspaper published a report about such a website and consumer protection organization sending", "-24.403318794997176" ], [ "increased time required by the reader to manually insert various newly updated pages into their correct locations in the document. Standardized tests Intentionally blank pages can be useful in standardized tests such as the GCSE, Higher School Certificate, SAT, CAT, ACT, MCAT, and GRE. In these exams, there are often individual, timed sections in which test-takers are prohibited from proceeding to the next section until that section's time interval has passed and the examiner allows them to continue. Because all of these separate sections are printed consecutively in the examination booklet, it may be possible for a test-taker who has", "-24.401702107861638" ], [ "randomized automated tests). Test data may be produced by the tester, or by a program or function that aids the tester. Test data may be recorded for re-use, or used once and then forgotten. Limitations It is not always possible to produce enough data for testing. The amount of data to be tested is determined or limited by considerations such as time, cost and quality. Time to produce, cost to produce and quality of the test data, and efficiency. Domain testing Domain testing is a family of test techniques that focus on the test data. This might", "-24.365037336596288" ], [ "including specifications, requirements and design parameters. Although the tests used are primarily functional in nature, non-functional tests may also be used. The test designer selects both valid and invalid inputs and determines the correct output, often with the help of a test oracle or a previous result that is known to be good, without any knowledge of the test object's internal structure. Hacking In penetration testing, black-box testing refers to a method where an ethical hacker has no knowledge of the system being attacked. The goal of a black-box penetration test is to simulate an external hacking or cyber warfare", "-24.332855739732622" ], [ "uses both a dedicated testing team in addition to the crowd. Crowdsource testing is best for things like beta and compatibility testing, which are necessary final steps for testing; however, most software is far too complex for late-stage testing like this to cover all of the possible issues. A dedicated outsourced or in-house testing team will give a better idea of the software's possible defects, but will not give anywhere near the scope of crowdtesting. Therefore, a good solution is to integrate multiple test teams into any development project (and also to develop with the principles of testability in mind", "-24.326969808200374" ], [ "response software collects the results, and the aggregate data is graphically displayed within the presentation for all to see. Some clickers also have additional keys, allowing the presenter to ask (and audience members to answer) True/False questions or even questions calling for particular numerical answers.\nDepending on the presenter's requirements, the data can either be collected anonymously (e.g., in the case of voting) or it can be traced to individual participants in circumstances where tracking is required (e.g., classroom quizzes, homework, or questions that ultimately count towards a student's course grade). Incoming data may also be stored in a database", "-24.294225922087207" ], [ "also offers packs for people who do not know what tests their product requires. Products In addition to its testing services, Crowdsourced Testing has launched two products designed to help testers during the testing process. Overlook Launched in May 2015, Overlook is a free web-based test plan management software. Its aim is to help teams create executable test plans for test-plan driven testing. Its features include creating and executing test plans, and iOS and Android readiness checklists. Like with its other product Damn Bugs, Crowdsourced Testing has launched a forum to collect user suggestions and requests. The team has claimed", "-24.275724325561896" ], [ "engine decide which links to show for different search queries submitted by that user or which ads to target them with. An interesting development in this field is the invention of automated learning, also known as machine learning. Using this, search engines can refine their profiling models to more accurately predict what any given user may want to click on by doing A/B testing of results offered to users and measuring the reactions of users.\nCompanies like Google, Netflix, YouTube, and Amazon have all started personalizing results more and more. One notable example is how Google Scholar takes into account the", "-24.231196203269064" ], [ "Minimum intelligent signal test Discussion McKinstry criticized existing approaches to artificial intelligence such as chatterbots, saying that his questions could \"kill\" AI programs by quickly exposing their weaknesses. He contrasted his approach, a series of direct questions assessing an AI's capabilities, to the Turing test and Loebner Prize method of engaging an AI in undirected typed conversation.\nCritics of the MIST have noted that it would be easy to \"kill\" a McKinstry-style AI too, due to the impossibility of supplying it with correct answers to all possible yes/no questions by ways of a finite set of human-generated Mindpixels: the fact that", "-24.22808747785166" ], [ "finished the section early to see through the page and read the problems in the next section. By placing intentionally blank pages between these sections, the test-taker is prevented from cheating in this way. By printing a notice on the page, such as \"this page has been intentionally left blank\", test-takers will not be concerned that their test has been misprinted, especially as test instructions often instruct students to check for missing or blank pages and to report any defective test booklets to a proctor. These pages may also be useful as scratch paper. Sheet music In books of sheet", "-24.159703786601312" ], [ "may vary from the simple fact or statement to the more complex, depending upon the age and skill level of the student. By completing CyberHunts, students learn how to navigate a web site, scan a page for detailed information, and then apply the facts or ideas to the question. A CyberHunt is an excellent way to teach beginning internet researching skills.\nAn Internet scavenger hunt is a fact-finding exercise where students answer a list of questions or solve problems as they practice information seeking skills. A hunt can serve as a powerful tool to introduce the study of a new subject", "-24.15205474832328" ], [ "problems or fields. In web analytics, for example, firms such as Omniture, WebTrends, and Google have created specialized software. Criticism Companies wanting to conduct Test and Learn must mobilize, track and analyze site and customer data at very granular levels. This can often be a massive and expensive undertaking. Increasingly however, an exponential increase in computing power, and corresponding decrease in its cost, have made testing more accessible. In the Harvard Business Review February 2009 article \"How to Design Smart Business Experiments\", Thomas Davenport discusses the Test and Learn Process, and describes how several companies have overcome these and other", "-24.143033084112176" ], [ "Harvard Business School, claims that Google has \"hard-coded\" bias in the algorithm it employs to generate its OneBox results which are shown usually at the top when a query can be answered quickly or a direct link can be given. Edelman, states that in such cases, Google services such as Google Finance receive preferential listing over more popular finance sites such as Yahoo! Finance. However, Barry Schwartz, CEO of RustyBrick, points out that OneBox results are not organic and therefore should not been viewed as algorithmic.", "-24.12856186775025" ], [ "Education can be effective, especially where training provides direct feedback. People can take steps to avoid phishing attempts by slightly modifying their browsing habits. When contacted about an account needing to be \"verified\" (or any other topic used by phishers), it is a sensible precaution to contact the company from which the email apparently originates to check that the email is legitimate. Alternatively, the address that the individual knows is the company's genuine website can be typed into the address bar of the browser, rather than trusting any hyperlinks in the suspected phishing message.\nNearly all legitimate e-mail messages from companies", "-24.119098365074024" ], [ "the search within a specified time-frame, offering to refund the up-front fees in such an event. While delimited search is not as desirable for searches that are open-ended in nature, the \"ticking clock\" is often seen by clients as an incentive that motivates delimited search recruiters to stay more active and involved throughout the hiring process.", "-24.064465754956473" ], [ "it is a virtue of a test of intelligence that failure indicates a lack of resourcefulness: The OIG test requires the resourcefulness associated with intelligence and not merely \"simulation of human conversational behaviour\". The general structure of the OIG test could even be used with non-verbal versions of imitation games.\nStill other writers have interpreted Turing as proposing that the imitation game itself is the test, without specifying how to take into account Turing's statement that the test that he proposed using the party version of the imitation game is based upon a criterion of comparative frequency of success in that", "-24.040013989113504" ], [ "tell which queries are the software's and which are the user's. Then, it is more difficult for the search engine to use the data it collects on a user to do things like target ads. Legal rights and court cases Being that the internet and search engines are relatively recent creations, no solid legal framework for privacy protections in terms of search engines has been put in place. However, scholars do write about the implications of existing laws on privacy in general to inform what right to privacy search engine users have. As this is a developing field of law,", "-23.971851276233792" ], [ "Multistage testing Multistage testing is an algorithm-based approach to administering tests. It is very similar to computer-adaptive testing in that items are interactively selected for each examinee by the algorithm, but rather than selecting individual items, groups of items are selected, building the test in stages. These groups are called testlets or panels.\nWhile multistage tests could theoretically be administered by a human, the extensive computations required (often using item response theory) mean that multistage tests are administered by computer.\nThe number of stages or testlets can vary. If the testlets are relatively small, such as five items, ten or more could", "-23.94754464700236" ], [ "a cascade of encrypted anonymous remailers, or possibly public-access Internet locations, such as terminals at a local library, etc.\nIn order to prevent such a system from becoming simply a random unpaid lottery, in which people can randomly guess a name and date (hoping that lightning would strike, as it occasionally does), it would be necessary to deter such random guessing by requiring the \"guessers\" to include with their \"guess\" encrypted and untraceable \"digital cash,\" in an amount sufficiently high to make random guessing impractical.\nBell then goes on to further specify the protocol of the assassination market in more detail. In", "-23.94111262122169" ], [ "bogus pipeline is still used when trying to measure an individual's affect or attitudes toward certain stimuli.\nIn this technique, the person whose attitude or emotion is being measured is told that they are being monitored by a machine or a polygraph (lie detector), resulting in more truthful answers. The electrodes and wires that are connected to this individual are actually fake. However, participants end up telling their true feelings and attitudes because they believe they are being monitored and that the real answers will surface regardless of their response. The bogus pipeline can be used to reduce bias because most", "-23.920885018538684" ], [ "header with the necessary properties is brute force, trying random values until the answer is found; though testing an individual string is easy, satisfactory answers are rare enough that it will require a substantial number of tries to find the answer.\nThe hypothesis is that spammers, whose business model relies on their ability to send large numbers of emails with very little cost per message, will cease to be profitable if there is even a small cost for each spam they send. Receivers can verify whether a sender made such an investment and use the results to help filter email. Sender's", "-23.892412498418707" ], [ "who choose to participate in a 'closely regulated industry,' students who voluntarily participate in school athletics have reason to expect intrusions upon normal rights and privileges, including privacy.\"\nUrinalysis intrudes upon a person's privacy in two ways. First, the subject is monitored while providing the actual sample. In the case of the Vernonia policy, boys were visually monitored from behind while providing the sample, while girls were monitored aurally from outside a closed stall. The Court considered this a \"negligible\" intrusion on the subject's privacy interest. Second, the test discloses personal information concerning \"the state of the", "-23.840285674785264" ], [ "is to allow human testers to exercise new and changed code via either automated checks or non-automated techniques. After the developer accepts the new code and configurations through unit testing in the development environment, the items are moved to one or more test environments. Upon test failure, the test environment can remove the faulty code from the test platforms, contact the responsible developer, and provide detailed test and result logs. If all tests pass, the test environment or a continuous integration framework controlling the tests can automatically promote the code to the next deployment environment.\nDifferent types of testing suggest different", "-23.81915665161796" ], [ "If a test fails, the developer needs to further configure and fix the code until the test is green.", "-23.77972440479789" ], [ "be challenging. To make finding methods easier, some organizations have created method search databases that organize all the methods into one place and link to actual test methods. Some allow searching by method number, analyte, or other keywords in the method.", "-23.771540963556617" ], [ "a limited time. Its intended purpose is to prevent cheating on tests and exams. Press-to-Test is enabled by pressing a certain button combination when turning on the calculator. The features that are blocked (for example 3D graphs and drag & drop for graphs) can be selectively enabled, but access to existing documents is always prohibited. When the handheld is running in Press-to-Test mode, an LED on top of it blinks to indicate that Press-to-Test hasn't been disabled. Press-to-Test can only be disabled by connecting to another calculator or a computer with TI-Nspire compatible software installed. Removing the batteries or pressing", "-23.7661523426068" ], [ "tightly timed. The proofreading test will often have a maximum number of errors per quantity of text and a minimum amount of time to find them. The goal of this approach is to identify those with the best skill set.\nA contrasting approach to testing is to identify and reward persistence more than an arbitrarily high level of expertise. For the spelling portion of the test, that can be accomplished by providing a dictionary, lengthening the word list conspicuously, and making clear that the test is not timed. For the proofreading portion, a suitable language-usage reference book (e.g., The Chicago Manual", "-23.709987236652523" ], [ "ease test code design by allowing the developer to separate methods into different functions and reuse each function for other tests. It also preconfigures tests into a known state at start instead of working with whatever was left from a previous test run. A disadvantage is that it could lead to duplication of test fixtures if using in-line setup. Practices to avoid It is considered bad practice when test fixtures are too general in implicit setup, or when the test method sets up a test fixture and does not use it during the test. A more subtle issue is if", "-23.703915838967077" ], [ "other words, as Afek et al. said, “agents cannot gain if the algorithm fails”. As a result, though agents have preferences, they have no incentive to fail the algorithm. Truthfulness A mechanism is considered to be truthful if the agents gain nothing by lying about their or other agents' values. A good example would be a leader election algorithm that selects a computation server within a network. The algorithm specifies that agents should send their total computational power to each other, after which the most powerful agent is chosen as the leader to complete the task. In this algorithm agents", "-23.696239178651012" ], [ "algorithms to match users. These factors enhance the possibility of users getting matched with a compatible candidate. Users are in control; they are provided with many options so there are enough matches that fit their particular type. Users can simply choose to not match the candidates that they know they are not interested in. Narrowing down options is easy. Once users think they are interested, they are able to chat and get to know the potential candidate. This type of communication saves the time, money, and risk users would not avoid if they were dating the traditional way. Online dating", "-23.66286890109768" ], [ "attacker can guess individual bytes of a packet, and the wireless access point will confirm or deny whether or not the guess is correct. If the guess is correct, the attacker will be able to detect the guess is correct and continue to guess other bytes of the packet. However, unlike the chop-chop attack against a WEP network, the attacker must wait for at least 60 seconds after an incorrect guess (a successful circumvention of the CRC32 mechanism) before continuing the attack. This is because although TKIP continues to use the CRC32 checksum mechanism, it implements an additional MIC code", "-23.637430790200597" ], [ "users. This suggests that although the bot learnt effectively from experience, adequate protection was not put in place to prevent misuse.\nIf a text-sending algorithm can pass itself off as a human instead of a chatbot, its message would be more credible. Therefore, human-seeming chatbots with well-crafted online identities could start scattering fake news that seem plausible, for instance making false claims during a presidential election. With enough chatbots, it might be even possible to achieve artificial social proof. Chatbots and jobs Chatbots are increasingly present in businesses and often are used to automate tasks that do not require skill-based talents.", "-23.636975191067904" ], [ "possibly overstated, since in the tournament in which the bots succeeded, the average 'humanness' rating of the human players was only 41.4%. This showcases some limits of this Turing Test, since the results demonstrate that human behaviour is more complicated and quantitative than was accounted for. In light of this, the BotPrize competition organizers will increase the difficulty in upcoming years with new challenges, forcing competitors to improve their bots.\nIt is also believed that methods and techniques developed for the Computer Game Bot Turing Test will be useful in fields other than video games, such as virtual training environments and", "-23.629641025327146" ], [ "actually do, when the right questions are asked of it. The most obvious way this can happen is by memorization of correct answers to known questions, but there are other, more subtle ways that a person or computer can (intentionally or otherwise) deceive somebody about their level of understanding, too. This is particularly a risk with artificial intelligence, in which the ability of a piece of artificial intelligence software to very quickly try out millions of possibilities (attempted solutions, theories, etc.) could create a misleading impression of the real depth of its understanding. Supposed AI software could in fact come", "-23.572890419047326" ], [ "find bugs in programs are established based on experience in prior testing. The scope of test cases usually rely on the software tester involved, who uses past experience and intuition to determine what situations commonly cause software failure, or may cause errors to appear. Typical errors include divide by zero, null pointers, or invalid parameters. Error guessing has no explicit rules for testing; test cases can be designed depending on the situation, either drawing from functional documents or when an unexpected/undocumented error is found while testing operations. Social impact of guessing A study of guessing in social situations (for example,", "-23.5375885663816" ], [ "for during testing User research is the process of observing and understanding how people interact with different objects in everyday life. These can range anywhere from websites and software products to hardware and other gadgets.", "-23.531407089067216" ], [ "is Google's use of spell checking on searches performed through their search engine. The spell checking minimises the problems caused by incorrect spelling by not only highlighting the error to the user, but by also providing a link to search using the correct spelling instead. Searches like this are commonly performed using a combination of edit distance, soundex, and metaphone calculations.", "-23.52986782445805" ], [ "of checking, under the philosophy of EAFP – \"It is easier to ask for forgiveness than permission\" rather than LBYL – \"look before you leap\" – in this case there is no check, and failure of assumptions to hold are detected at use time, by an exception.\nIn the context of file system TOCTOU race conditions, the fundamental challenge is ensuring that the file system cannot be changed between two system calls. In 2004, an impossibility result was published, showing that there was no portable, deterministic technique for avoiding TOCTOU race conditions.\nSince this impossibility result, libraries for tracking file descriptors and", "-23.506115640106145" ], [ "survey.\nGoogle has also reviewed Google Surveys in a white paper, concluding that \"Google Consumer Surveys can be used in place of more traditional Internet-based panels without sacrificing accuracy\" while also stating that \"[s]ince Google Consumer Surveys only allows one-question or screening two-question surveys, analysis of the relationships between survey questions are difficult or sometimes not even possible\".", "-23.496297031408176" ], [ "or enforce ping limits, to reduce this problem. Trust clients It is possible for clients to tell the server what they are doing and for the server to trust the data it receives. This method is avoided if at all possible due to its susceptibility to cheating: it is a simple matter to route network data through a second computer which inserts fabricated hit messages or modifies existing ones, a technique which cannot be detected by anti-cheat tools.\nHowever, the sheer scale of some games makes computationally expensive solutions like rewinding impossible. In Battlefield 3, for example, a \"hybrid hit detection\"", "-23.457898929249495" ], [ "e-testing software, while practical abilities are assessed using e-portfolios or simulation software. Types Online assessment is used primarily to measure cognitive abilities, demonstrating what has been learned after a particular educational event has occurred, such as the end of an instructional unit or chapter. When assessing practical abilities or to demonstrate learning that has occurred over a longer period of time an online portfolio (or ePortfolio) is often used. The first element that must be prepared when teaching an online course is assessment. Assessment is used to determine if learning is happening, to what extent and if changes need to", "-23.4435836909106" ], [ "testimonials, though the promoted product or service is of dubious quality and would likely not pass the scrutiny of a standards and practices department at a television station or cable network. Academic search Academic search engines enable researchers to find academic literature and are used to obtain citation data for calculating performance metrics such as the H-index and impact factor. Researchers from the University of California, Berkeley and OvGU demonstrated that most (web-based) academic search engines, especially Google Scholar are not capable of identifying spam attacks. The researchers manipulated the citation counts of articles, and managed to make Google Scholar", "-23.423153581097722" ], [ "not being able to detect cheating peers, who engage in such anti-social actions as downloading only from seeds, downloading from the fastest peers, or advertising false pieces.", "-23.38341513184423" ], [ "increasing chances of deviant behavior and creating punishments that are not equitable to their actions. Additionally, monitoring can cause resistance and backlash because it insinuates an employer’s suspicion and lack of trust. Data mining and profiling Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data. Data profiling in this context is the process of assembling information about a particular individual or group in order to generate a profile — that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and social network", "-23.3548287616577" ], [ "in protecting the secrecy of their tests, and they sell tests only to people who have proved their educational and professional qualifications to the test maker's satisfaction. Purchasers are legally bound from giving test answers or the tests themselves out to the public unless permitted under the test maker's standard conditions for administration of the tests.\nThe International Test Commission (ITC), an international association of national psychological societies and test publishers, publishes the International Guidelines for Test Use, which prescribes to \"protect the integrity\" of the tests by not publicly describing test techniques and by not \"coaching individuals\" so that", "-23.353975713296677" ], [ "contest for his students. In 2010 Adam Wierman picked it up at Caltech. Tactics Some webmasters resort to spam, while others use white-hat optimization techniques, like providing good content covering the competition, or optimizing page titles. Most SEO contests expect people to optimize a single web page for a non-existent phrase of two silly words. This is to keep existing web sites from getting a head start and to make sure that regular internet searchers will not be shown contest pages when searching the web for other information.\nRules and limitations can make it harder to benefit from the ranking algorithm", "-23.342884916855837" ], [ "Test stub Example Consider a computer program that queries a database to obtain the sum price total of all products stored in the database. In this example, the query is slow and consumes a large number of system resources. This reduces the number of test runs per day. Secondly, tests may include values outside those currently in the database. The method (or call) used to perform this is get_total(). For testing purposes, the source code in get_total() can be temporarily replaced with a simple statement that returns a specific value. This would be a test stub.\nSeveral testing frameworks are available,", "-23.307808882556856" ], [ "Vexatious requests A public authority is not obliged to comply with a request for information if the request is vexatious.(s14(1)) A request is considered vexatious if it is ‘obsessive or manifestly unreasonable’, harasses the authority or causes distress to its staff, imposes a significant burden, or if the request lacks any serious value. Implementing the act The Act affects over 100,000 public bodies including government departments, schools and councils. The Act came into force in phases, with the final \"general right of access\" to public information under the Act coming into force on 1 January 2005. As well as the", "-23.30311524591525" ], [ "and maintainable. In patterns it is possible to describe how buttons, input fields and structures in the applications being tested need to be interpreted in order for them to be comprehensible. In the case of an error, the goal is to be able to establish, with a test report and a screenshot, why a test step failed.\nThe following example shows how a pattern for a „Logo“ on a website can be depicted. An XPath expression communicates to the test application how the elements on a page are to be interpreted. XPath is used here to define a pattern. The input", "-23.28987027046969" ], [ "Yahoo!, and PayPal up to 90% of the time.\nIn 2014, Google engineers demonstrated a system that could defeat CAPTCHA challenges with 99.8% accuracy.\nIn 2015, Shuman Ghosemajumder, former click fraud czar of Google, stated that there were cybercriminal sites that would defeat CAPTCHA challenges for a fee, to enable various forms of fraud. Subject matter expert Turing test Another variation is described as the subject matter expert Turing test, where a machine's response cannot be distinguished from an expert in a given field. This is also known as a \"Feigenbaum test\" and was proposed by Edward Feigenbaum in a 2003 paper.", "-23.287002473851317" ] ]
4ugsep
Shouldnt the sun be orbiting something else?
[ "The sun orbits around the Milky Way center (where there is most likely a supermassive black hole of all the other stuff that fell in). The Milky Way orbits around…something. As it stands right now, it's going towards the Great Attractor, which is…something. Big. (It's really unfortunate that the way we are aligned with the Milky Way disk that it blocks our view of that…something.) The Great Attractor probably orbits around something else, but it's so far away that we'll never know for sure because it'd take too long to make one orbit. And maybe that orbits around something else. And so on. The Universe as a whole cannot orbit anything, because orbiting is moving around something *in space*, so by definition it can't orbit. Unless you subscribe to a multiverse model, but that's mostly unproven.", "The sun orbits the centre of the galaxy. It takes 200 million years or so. I don't remember the exact number. The galaxy is also part of a local group of galaxies which orbit each other. There is also evidence of larger structures in the universe.", "If you want to zoom out and really look at it, basically everything orbits everything else. For example the moon orbits the earth, but also the earth orbits the moon, its just that the moon is much smaller so its a much smaller orbit. You can see a drawing i just randomly pulled off a google search here: URL_0 . The barycenter, the center of mass, between the moon and the earth lies inside the surface of the earth, but not at earth's center. So there's actually a wobble going on as the earth orbits the moon. This is also true of everything else, because the distances are very large and the masses are pretty large, its generally enough to talk about an object being close enough to dominate, the one object, the planet, the star, that's close enough to make all the other gravitational pulls look insignificant. Though really the moon is actually not so much dominated by the earth, its orbit around the sun is always concave, basically the moon is always falling toward the sun the earth just sort of slows it at places, never bends it away like a bigger planet might do with their moons. Anyway, basically gravity goes from anything to any other thing, the center of mass of our solar system drifts around as the planets, especially the giant ones like Jupiter, Saturn, Uranus and Neptune move around. Sometimes its inside the sun, and sometimes its outside the sun, the sun itself can orbit that. In a broader sense, the Milky Way galaxy that we're in has a bunch of other mass distributed throughout it, and may have a giant black hole at its center. The sun can feel that pull and orbit the center of mass there. And the Galaxy can feel all the other mass in the universe transmitting gravitational force at the speed of light across vast distances, the sum of immense amounts of mass generating force that dissipates over vast distances. Essentially an orbit is just a way of talking about the motion under gravity when there's a big heavy thing close enough by to make all the other big heavy things far away seem insignificant. In reality, everything is orbiting everything else all the time. Everything is falling towards everything in the most efficient way it can.", "The sun is orbiting the center of the Milky Way Galaxy, which is a powerful x ray and gravity source which we believe to be a supermassive black hole. The galaxy is also moving, along with the [Local Group]( URL_2 ) towards an area of strong gravitation we call the [Great Attractor]( URL_1 ) The universe is all there is, so to say it orbits something is kind of meaningless from a scientific perspective. There are ideas of multiverses and multiple universes existing on separate [Branes]( URL_0 ) but that is all highly speculative.", "Our Sun orbiting center of our galaxy known as Milky Way. which in turn probably orbiting something else which we cant see on our human timescale so for us its kind of moving through Universe", "Our sun, like all the other stars in our galaxy, is orbiting the galactic centre. One 'galactic year' (the time it takes us to complete one orbit of our galaxy centre) is about a quarter million of our standard (solar) years. Our galaxy however is not, to our knowledge, orbiting anything else. Galaxies may interact with each other gravitationally, and some do move in various kinds of orbits. But not all, and as far as we can tell so far not ours. > is the whole universe orbitting around something? At least in the standard model, this is impossible. \"The universe\" is the sum of all that is, and so it could not rationally be interacting with anything else, since by definition there *is* nothing else.", "The Sun, along with the other stars in our galaxy, is orbiting the galactic center. However, a less massive object is not guaranteed to orbit a more massive one. For example, you are not orbitng your house. If you are thinking in terms of curved spacetime then: * Imagine a planet going around a star. * If the planet is moving fast enough it will simply escape the 'well' in spacetime. * If the planet is moving too slow, it will eventually fall into the center of the 'well' and crash into the star. * If the planet has the right speed, it will keep going around the star in a stable orbit." ]
[ [ "efforts to inform the public that there is no threat to Earth. They point out that such an object so close to Earth would be easily visible to the naked eye, and would create noticeable effects in the orbits of the outer planets. Most photographs purporting to show \"Nibiru\" beside the Sun are lens flares, false images of the Sun created by reflections within the lens. Claims that the object has been concealed behind the Sun are untenable.\nAn orbit like that of Nibiru within our Solar System is inconsistent with celestial mechanics. David Morrison, NASA space scientist explains that after", "-33.723007295999196" ], [ "planet and the Sun and Moon being celestial objects in their own right and not objects orbiting the Earth).", "-32.777728292217944" ], [ "\"Counter-Earth\" in pulp science fiction and comic books. Once space-based observation became possible via satellites and probes, it was shown to hold no such object. The Sun–Earth L₃ is unstable and could not contain a natural object, large or small, for very long. This is because the gravitational forces of the other planets are stronger than that of Earth (Venus, for example, comes within 0.3 AU of this L₃ every 20 months).\nA spacecraft orbiting near Sun–Earth L₃ would be able to closely monitor the evolution of active sunspot regions before they rotate into a geoeffective position, so that a 7-day early warning", "-32.57146409031702" ], [ "together comprise less than 0.002% of the Solar System's total mass.\nMost large objects in orbit around the Sun lie near the plane of Earth's orbit, known as the ecliptic. The planets are very close to the ecliptic, whereas comets and Kuiper belt objects are frequently at significantly greater angles to it. All the planets, and most other objects, orbit the Sun in the same direction that the Sun is rotating (counter-clockwise, as viewed from above Earth's north pole). There are exceptions, such as Halley's Comet.\nThe overall structure of the charted regions of the Solar System consists of the Sun, four", "-32.183725485207106" ], [ "example:\n\"The model of the solar system is similar to that of an atom, with planets orbiting the sun like electrons orbiting the nucleus. Electrons can jump from orbit to orbit; so we should study ancient records for sightings of planets jumping from orbit to orbit.\"", "-31.92447431205801" ], [ "all remaining reaction wheels staying healthy, which turned out not to be the case (see Spacecraft history below). Orbit and orientation Kepler orbits the Sun, which avoids Earth occultations, stray light, and gravitational perturbations and torques inherent in an Earth orbit.\nNASA has characterized Kepler's orbit as \"Earth-trailing\". With an orbital period of 372.5 days, Kepler is slowly falling farther behind Earth (about 16 million miles per annum). As of May 1, 2018, the distance to Kepler from Earth was about 0.917 AU (137 million km).\nThis means that after about 26 years Kepler will reach the other side of the Sun and will get back", "-31.653843915788457" ], [ "Solar System's evolution. In 2005, astronomer Eugene Chiang speculated that although some of these oligarchs became the planets we know today, most would have been flung outward by gravitational interactions. Some may have escaped the Solar System altogether to become free-floating planets, whereas others would be orbiting in a halo around the Solar System, with orbital periods of millions of years. This halo would lie at between 1,000 and 10,000 AU from the Sun, or between a third and a thirtieth the distance to the Oort cloud.\nIn December 2015, astronomers at the Atacama Large Millimeter Array (ALMA) detected a brief series", "-31.4486222097039" ], [ "orbit of the Sun. Engineering tests were continued until March 24, 1975, when final depletion of the nitrogen supply was signaled by the onset of an un-programmed pitch turn. Commands were sent immediately to the spacecraft to turn off its transmitter, and radio signals to Earth ceased.\nMariner 10 is presumably still orbiting the Sun, although its electronics have probably been damaged by the Sun's radiation. Mariner 10 has not been spotted or tracked from Earth since it stopped transmitting. The only way it would not be orbiting would be if it had been hit by an asteroid or gravitationally", "-31.42795390012907" ], [ "their inability to account for the effects on the gravitational dynamics of the solar system of future intruders from the outside (such as 2I/Borisov in 2019), which may occur at any time.\nThe Solar System is stable in human terms, and far beyond, given that it is unlikely any of the planets will collide with each other or be ejected from the system in the next few billion years, and the Earth's orbit will be relatively stable (ignoring the effects of outside intruders).\nSince Newton's law of gravitation (1687), mathematicians and astronomers (such as Laplace, Lagrange, Gauss, Poincaré, Kolmogorov, Vladimir Arnold and", "-31.41660609768587" ], [ "to overpower him.\nHowever, Earth has moved out of the Martian orbit, thus, making the journey home impossible. Yet Brown creates a theory that if they can use the gravity pull of the Sun to get home. Some time after setting off, the crew all slowly succumb to gamma rays from the Sun one-by-one. By a miracle, there is a total eclipse and Mercury shuts of the rays from the Sun but they quickly find themselves being pulled into Mercury's gravity pull.\nThe crew then realise that Buchan Island has made various satellite fixes on Mercury, thus enabling MR4 to make the", "-31.393440683721565" ], [ "actually orbiting a point that lies away from the center of the primary (larger) body. For example, the Moon does not orbit the exact center of the Earth, but a point on a line between the center of the Earth and the Moon, approximately 1,710 km (1,062 miles) below the surface of the Earth, where their respective masses balance. This is the point about which the Earth and Moon orbit as they travel around the Sun. If the masses are more similar, e.g., Pluto and Charon, the barycenter will fall outside both bodies. Body motion When high jumpers perform a \"Fosbury Flop\",", "-31.32894231006503" ], [ "and Venus. Earth's fate is less clear; although the Sun will envelop Earth's current orbit, the star's loss of mass (and thus weaker gravity) will cause the planets' orbits to move farther out. If it were only for this, Venus and Earth would probably escape incineration, but a 2008 study suggests that Earth will likely be swallowed up as a result of tidal interactions with the Sun's weakly bound outer envelope.\nGradually, the hydrogen burning in the shell around the solar core will increase the mass of the core until it reaches about 45% of the present solar mass. At this", "-31.314592262089718" ], [ "of 8.2 lunar masses for the Kuiper belt.)\nA necessary condition for the existence of a planet in this system are stable zones where the object can remain in orbit for long intervals. For hypothetical planets in a circular orbit around the individual members of this star system, this maximum orbital radius is computed to be 3.8 AU for the primary and 3.5 AU for the secondary. A planet orbiting outside of both stars would need to be at least 108 AU distant.", "-31.280593140458222" ], [ "the gravitational influence of the Sun, it belongs to the bodies called quasi-satellites. This is somewhat analogous to two cars travelling side by side at the same speed and repeatedly overtaking one another but which are however not attached to each other. Orbital calculations show that 2002 AA₂₉ was in this quasi-satellite orbit for 45 years from about 520 AD but because of its tiny size was too dim to have been seen. It switches approximately cyclically between the two orbital forms, but always stays for 45 years in the quasi-satellite orbit. Outside the time frame from about 520-6500 AD,", "-31.2224389675539" ], [ "probability of it remaining bound to the Sun in a highly eccentric orbit is roughly 10%. A previous article reported that if the massive disk extended beyond 80 AU some objects scattered outward by Jupiter and Saturn would have been left in high inclination (inc > 50°), low eccentricity orbits which have not been observed. An extended disk would also have been subject to gravitational disruption by passing stars and by mass loss due to photoevaporation while the Sun remained in the open cluster where it formed. Observations: Orbital clustering of high perihelion objects The clustering of the orbits of", "-31.130715650040656" ], [ "giant star. The Sun will be about 12 billion years old and expand to swallow both Mercury and Venus, reaching a maximum radius of 1.2 AU (180,000,000 km). The Earth will interact tidally with the Sun's outer atmosphere, which would serve to decrease Earth's orbital radius. Drag from the chromosphere of the Sun would also reduce the Earth's orbit. These effects will act to counterbalance the effect of mass loss by the Sun, and the Earth will probably be engulfed by the Sun. Extraterrestrial invasion Intelligent extraterrestrial life, if existent, could invade Earth either to exterminate and supplant human life, enslave it", "-31.098421449518355" ], [ "around both Alpha Centauri A and B, but most recent numerical investigations have shown that the gravitational pull of the companion star renders the accretion of planets difficult. Despite these difficulties, given the similarities to the Sun in spectral types, star type, age and probable stability of the orbits, it has been suggested that this stellar system could hold one of the best possibilities for harbouring extraterrestrial life on a potential planet.\nIn the Solar System, Jupiter and Saturn were probably crucial in perturbing comets into the inner Solar System, providing the inner planets with a source of water and various other", "-31.080612672900315" ], [ "System during a close encounter between the Sun and another star. If a planet was in a distant orbit around this star, three-body interactions during the encounter could alter the planet's path, leaving it in a stable orbit around the Sun. A planet originating in a system without Jupiter-massed planets could remain in a distant eccentric orbit for a longer time, increasing its chances of capture. The wider range of possible orbits would reduce the odds of its capture in a relatively low inclination orbit to 1–2 percent. This process could also occur with rogue planets, but the likelihood of", "-30.976269822218455" ], [ "\nAstronomer Mike Brown notes that if this object's orbit were as described, it would only have remained in the Solar System for about a million years before Jupiter expelled it, and, even if such a planet existed, its magnetic field would have no effect on Earth's. Lieder's assertions that the approach of Nibiru would cause the Earth's rotation to stop or its axis to shift violate the laws of physics. In his rebuttal of Immanuel Velikovsky's Worlds in Collision, which made the same claim that the Earth's rotation could be stopped and then restarted, Carl Sagan noted that, \"the energy", "-30.944163378095254" ], [ "two Earth masses in orbits of less than 10 days were excluded, and planets of more than ten Earth masses out to a two-year orbit were also confidently ruled out. It was also discovered that the habitable zone of the star seemed to be devoid of roughly Earth-mass planets or larger, save for face-on orbits.\nEven though this research greatly restricted the possible properties of planets around Barnard's Star, it did not rule them out completely as terrestrial planets were always going to be difficult to detect. NASA's Space Interferometry Mission, which was to begin searching for extrasolar Earth-like planets, was", "-30.91854440368479" ], [ "Earth's orbit Earth orbits the Sun at an average distance of 149.60 million km (92.96 million mi), and one complete orbit takes 365.256 days (1 sidereal year), during which time Earth has traveled 940 million km (584 million mi). Earth's orbit has an eccentricity of 0.0167. Since the Sun constitutes 99.8% of the mass of the solar system, the center of the orbit is extremely close to the center of the Sun.\nAs seen from Earth, the planet's orbital prograde motion makes the Sun appear to move with respect to other stars at a rate of about 1° eastward per solar day (or", "-30.87390065168438" ], [ "Sun—in essence, Earth and Moon are in free fall around the Sun. If the energy portion of mass behaves differently from the conventional portion, then the Earth and the Moon will fall differently toward the Sun, and the orbit of the Moon around the Earth will be affected. For example, suppose the energy part of the mass does affect gravity, but does not affect inertia. Then:\nFrom our perspective on Earth, this would appear as a displacement, or polarization, of the lunar\norbit away from the Sun with an amplitude of 13 meters. If the violation went the other way, with the\nself", "-30.870336882420816" ], [ "series of smaller 'corpuscules') might exist in an orbit even closer to the Sun than that of Mercury, to account for this perturbation. (Other explanations considered included a slight oblateness of the Sun.) The success of the search for Neptune based on its perturbations of the orbit of Uranus led astronomers to place faith in this possible explanation, and the hypothetical planet was named Vulcan, but no such planet was ever found.\nThe perihelion precession of Mercury is 5,600 arcseconds (1.5556°) per century relative to Earth, or 574.10±0.65 arcseconds per century relative to the inertial ICRF. Newtonian mechanics, taking into account", "-30.7916400207032" ], [ "orbit, and with them the need for a Planet X, vanished. There are no discrepancies in the trajectories of any space probes such as Pioneer 10, Pioneer 11, Voyager 1, and Voyager 2 that can be attributed to the gravitational pull of a large undiscovered object in the outer Solar System. Today astronomers accept that Planet X, as originally defined, does not exist.\nAlthough its mission did not involve a search for Planet X, the IRAS space observatory made headlines briefly in 1983 due to an \"unknown object\" that was at first described as \"possibly as large as the giant planet Jupiter and", "-30.763952711044112" ], [ "of around 0.03, but also with a large error range as well. However, if all the orbital models are brought together then the eccentricity is higher at about 0.116, and again this is subject to a large error range. Compared to the Earth's average distance from the Sun of 149 million km, Ross 128 b orbits 20 times closer. At that close distance from its host star, the planet is most likely tidally locked, meaning that one side of the planet would have eternal daylight and the other would be in darkness. Habitability Ross 128 b is not confirmed", "-30.731875195691828" ], [ "through the background stars in one year. If the Earth orbited the Sun with a constant speed, in a circular orbit in a plane perpendicular to the Earth's axis, then the Sun would culminate every day at exactly the same time, and be a perfect time keeper (except for the very small effect of the slowing rotation of the Earth). But the orbit of the Earth is an ellipse not centered on the Sun, and its speed varies between 30.287 and 29.291 km/s, according to Kepler's laws of planetary motion, and its angular speed also varies, and thus the Sun appears", "-30.67565246068989" ], [ "unknown. In comparison, the Sun is 4.6 billion years old and has a surface temperature of 5778 K.\nThe star's apparent magnitude, or how bright it appears from Earth's perspective, is unknown. Orbit K2-72e orbits its host star with an orbital period of 24 days and an orbital radius of about 0.1 times that of Earth's (compared to the distance of Mercury from the Sun, which is about 0.38 AU). Habitability The exoplanet, along with K2-72c, were announced to be orbiting in the habitable zone of its parent star, the region where, with the correct conditions and atmospheric properties, liquid water", "-30.59219586083782" ], [ "gravitational effects will be negligible on a planet orbiting an otherwise suitable star and habitability potential will not be disrupted unless the orbit is highly eccentric (see Nemesis, for example). However, where the separation is significantly less, a stable orbit may be impossible. If a planet's distance to its primary exceeds about one fifth of the closest approach of the other star, orbital stability is not guaranteed. Whether planets might form in binaries at all had long been unclear, given that gravitational forces might interfere with planet formation. Theoretical work by Alan Boss at the Carnegie Institution has shown that", "-30.550314229622018" ], [ "on the same orbital path as Earth, and appear to lead or follow Earth along the same orbital path.\nOther small natural objects in orbit around the Sun may enter orbit around Earth for a short amount of time, becoming temporary natural satellites. To date, the only confirmed example has been 2006 RH120 in Earth orbit during 2006 and 2007, though further instances are already predicted. Petit's moon The first major claim of another moon of Earth was made by French astronomer Frédéric Petit, director of the Toulouse Observatory, who in 1846 announced that he had discovered a second moon in", "-30.450688751065172" ], [ "0.21847 AU, approximately a fifth of the distance that the Earth orbits the Sun, though its orbital eccentricity has not been confirmed. There are currently two models for its orbit, a circular one like Earth's, and an eccentric one like Mercury's. These are based on the four planet and six planet model for the Gliese 581 system, respectively. Under the four planet model Gliese 581d would most probably be in a spin-orbit resonance of 2:1, rotating twice for each orbit of its parent star. Therefore, the day on Gliese 581d should approximately be 67 Earth days long.\nThe orbital distance places", "-30.42122542540892" ], [ "from the observed regions of the Solar System to have no detectable gravitational effect on the other planets. A Mars-sized object could lie undetected at 300 AU (10 times the distance of Neptune); a Jupiter-sized object at 30,000 AU. To travel 1000 AU in two years, an object would need to be moving at 2400 km/s – faster than the galactic escape velocity. At that speed, any object would be shot out of the Solar System, and then out of the Milky Way galaxy into intergalactic space. Conspiracy theories Many believers in the imminent approach of Planet X/Nibiru accuse NASA of deliberately covering up visual", "-30.325942763971398" ], [ "attempts to resume contact in March 2002 were unsuccessful. It remains within the Solar System, orbiting the Sun.", "-30.316197195788845" ], [ "only one unknown planet, and therefore suggested that this planet is itself in resonance with a more-massive world about 250 AU from the Sun. In their article, Brown and Batygin noted that alignment of arguments of perihelion near 0° or 180° via the Kozai mechanism requires a ratio of the semi-major axes nearly equal to one, indicating that multiple planets with orbits tuned to the data set would be required, making this explanation too unwieldy. Visibility and location Due to its extreme distance from the Sun, Planet Nine would reflect little sunlight, potentially evading telescope sightings. It is expected to have", "-30.30128113621322" ], [ "the Sun; its orbit would be highly eccentric, and strongly inclined to the ecliptic—the planet's orbit would be at roughly a 32-degree angle from the orbital plane of the other known planets. This hypothesis was met with a mixed reception. Noted Planet X sceptic Brian G. Marsden of the Minor Planet Center pointed out that these discrepancies were a hundredth the size of those noticed by Le Verrier, and could easily be due to observational error.\nIn 1972, Joseph Brady of the Lawrence Livermore National Laboratory studied irregularities in the motion of Halley's Comet. Brady claimed that they could have been caused", "-30.290540699614212" ], [ "Earth masses (see above). On 24 August, astronomers using ESO's HARPS instrument announced the discovery of a planetary system with up to seven planets orbiting a Sun-like star, HD 10180, one of which, although not yet confirmed, has an estimated minimum mass of 1.35 ± 0.23 times that of Earth, which would be the lowest mass of any exoplanet found to date orbiting a main-sequence star. Although unconfirmed, there is 98.6% probability that this planet does exist.\nThe National Science Foundation announced on 29 September the discovery of a fourth super-Earth (Gliese 581g) orbiting within the Gliese 581 planetary system. The", "-30.26934150030138" ], [ "Venus or even the Moon as slingshots in journeys to the outer planets.\nThis maneuver can only change an object's velocity relative to a third, uninvolved object, – possibly the “centre of mass” or the Sun. There is no change in the velocities of the two objects involved in the maneuver relative to each other. The Sun cannot be used in a gravitational slingshot because it is stationary compared to rest of the Solar System, which orbits the Sun. It may be used to send a spaceship or probe into the galaxy because the Sun revolves around the center", "-30.26714377834287" ], [ "on the orientation of the body's symmetry axis in the space, affecting, in general, the whole orbit, with the exception of the semimajor axis. Multiple gravitating bodies The effects of other gravitating bodies can be significant. For example, the orbit of the Moon cannot be accurately described without allowing for the action of the Sun's gravity as well as the Earth's. One approximate result is that bodies will usually have reasonably stable orbits around a heavier planet or moon, in spite of these perturbations, provided they are orbiting well within the heavier body's Hill sphere.\nWhen there are more than two", "-30.179755517747253" ], [ "dwarf's smaller nature and fainter heat/light output would mean that such a planet would need to be particularly close to the star's surface. The cost of such an orbit would be that an Earth-sized body would become tidally locked. When this happens, the object presents the same face to its parent at all times as it orbits, just as the Moon does with the Earth (more technically, one sidereal day is exactly equal to one year for the orbiting body).\nTraditional scientific theories proposed that such a tidally locked planet might be incapable of holding on to an atmosphere. Having such", "-30.173288735320966" ], [ "gravitational pull of a large undiscovered object in the outer Solar System. Although most astronomers agree that Planet X, as Lowell defined it, does not exist, as of January 2016 there is speculation concerning Planet Nine.", "-30.14089117158437" ], [ "because such planets are easier to detect. On November 4, 2013, astronomers reported, based on Kepler data, that there could be as many as 40 billion Earth-sized planets orbiting in the habitable zones of Sun-like stars and red dwarfs in the Milky Way. 11 billion of these may be orbiting Sun-like stars. Proxima Centauri b, located about 4.2 light-years (1.3 parsecs) from Earth in the constellation of Centaurus, is the nearest known exoplanet, and is orbiting in the habitable zone of its star. The CHZ is also of particular interest to the emerging field of habitability of natural satellites,", "-30.137432583644113" ], [ "Earth and Sun.\"\nNotably, in April 2002, it reentered a temporary orbit around the Earth-Moon system near the Sun-Earth L1 Lagrangian point—\"a location where the gravity of the Earth and Sun approximately cancel\"—and remained in orbital synchrony with both the Moon and the Earth for a little over a year, reentering a heliocentric orbit in May 2003. The object was \"discovered\" by near-Earth object watcher Bill Yeung on 3 September 2002, labeled object \"J002E3\" by the Minor Planet Center, and was subsequently identified as the former Apollo 12 stage only several days later. The rocket stage is \"the first known case of", "-30.132105630094884" ], [ "orbiting super-Earths into the Sun could be avoided if the debris coalesced into larger objects, reducing gas drag; and if the protoplanetary disk had an inner cavity, their inward migration could be halted near its edge. If no planets had yet formed in the inner Solar System, the destruction of the larger bodies during the collisional cascade could have left the remaining debris small enough to be pushed outward by the solar wind, which would have been much stronger during the early Solar System, leaving little to form planets inside Mercury's orbit. Later developments Simulations of the formation of the", "-30.107453806092963" ], [ "the Sun during the year, the orbit of the satellite must precess at the same rate, which is not possible if the satellite were to pass directly over the pole. Because of Earth's equatorial bulge, an orbit inclined at a slight angle is subject to a torque, which causes precession. An angle of about 8° from the pole produces the desired precession in a 100-minute orbit.", "-30.10177162277978" ], [ "at spotting asteroids in, so the two complement each other.\nAnother possible position for a space telescope would be even closer to the Sun, for example in a Venus-like orbit. This would give a wider view of Earth orbit, but at a greater distance. Unlike a telescope at the SEL1 Lagrange point, it would not stay in sync with Earth but would orbit the Sun at a similar rate to Venus. Because of this, it would not often be in a position to provide any warning of asteroids shortly before impact, but it would be in a good position to catalog", "-30.044033036392648" ], [ "of that produced by the Sun to as little as 0.01%). Any planet in orbit around a red dwarf would have to huddle very close to its parent star to attain Earth-like surface temperatures; from 0.3 AU (just inside the orbit of Mercury) for a star like Lacaille 8760, to as little as 0.032 AU for a star like Proxima Centauri (such a world would have a year lasting just 6.3 days). At those distances, the star's gravity would cause tidal locking. One side of the planet would eternally face the star, while the other would always face away from", "-30.04110072378535" ], [ "(394130) 2006 HY51 Orbit and classification 2006 HY₅₁ orbits the Sun at a distance of 0.1–5.1 AU once every 4 years and 2 months (1,527 days). Its orbit has an eccentricity of 0.97 and an inclination of 33° with respect to the ecliptic.\nIt is the asteroid with the third-smallest known perihelion of any known object orbiting the Sun. Its extreme orbital eccentricity brings it within 0.081 AU of the Sun (26% of Mercury's perihelion) and as far as 5.118 AU from the Sun (making it a Jupiter-grazer). It has a minimum orbit intersection distance with Earth of 0.1064 AU (15,900,000 km), equivalent to 41.5 lunar", "-30.015969229571056" ], [ "planets. Some planets will be destroyed, others ejected into interstellar space. Ultimately, over the course of tens of billions of years, it is likely that the Sun will be left with none of the original bodies in orbit around it. History Ideas concerning the origin and fate of the world date from the earliest known writings; however, for almost all of that time, there was no attempt to link such theories to the existence of a \"Solar System\", simply because it was not generally thought that the Solar System, in the sense we now understand it, existed. The first step", "-30.005671063205227" ], [ "the Sun's gravity at that distance. Indeed, it can be viewed as being at the base of an infinite number of arbitrarily selected domes, but because much of the force from any one arbitrary dome is counteracted by those of another, the net force on that point is immense, but finite. No known or theorized material is strong enough to withstand this pressure, and form a rigid, static sphere around a star. It has been proposed by Paul Birch (in relation to smaller \"Supra-Jupiter\" constructions around a large planet rather than a star) that it may be possible to support", "-29.968759564100765" ], [ "1999 LE31 Description 1999 LE₃₁ orbits the Sun at a distance of 4.3–11.9 AU once every 23 years and 2 months (8,462 days; semi-major axis of 8.13 AU). Its orbit has an eccentricity of 0.47 and an inclination of 152° with respect to the ecliptic.\nIt spends most of its orbit located in the outer Solar System between Jupiter and Uranus, and like all centaurs, has an unstable orbit caused by the gravitational influence of the giant planets. Due to this, it must have originated from elsewhere, most likely outside Neptune. It is both a Jupiter and Saturn-crossing minor planet. Of over half", "-29.963181575476483" ], [ "dark companion in this system in 1899, but Forest Ray Moulton soon published a paper proving that a three-body system with the specified orbital parameters would be highly unstable. The claims by Jacob and See have both been shown to be erroneous.\nA claim of a planetary system was again made by Dirk Reuyl and Erik Holberg in 1943. The companion was estimated to have a mass one tenth the mass of the Sun. This caused quite a sensation at the time but later observations have gradually discredited this claim.\nThe negative results of past studies does not completely rule out the", "-29.960118433111347" ], [ "to the Sun would still occur even if the hypothetical undisturbed motion of the Moon had an eccentricity of zero (i.e. even if the orbit would be circular in the absence of the Sun).\nNewton expressed an approximate recognition that the real orbit of the Moon is not exactly an eccentric Keplerian ellipse, nor exactly a central ellipse due to the variation, but \"an oval of another kind\". Newton did not give an explicit expression for the form of this \"oval of another kind\"; to an approximation, it combines the two effects of the central-elliptical variational orbit and the Keplerian eccentric", "-29.911078962148167" ], [ "example an erroneous barycentric correction had been applied (the same error had also led to claims of planets around HIP 11952 that were subsequently refuted). After applying the corrections, there is no evidence for a planet orbiting the star. If it had been real, the Jupiter-like planet would have been particularly interesting, orbiting a star nearing the end of its life and seemingly about to be engulfed by it, potentially providing an observational model for the fate of our own planetary system in the distant future. Twin Quasar-related planet A microlensing event in the Twin Quasar gravitational lensing system was", "-29.90662519307807" ], [ "planet or brown dwarf that orbits 1 AU from a Sun-like star. In the case of Kepler-90h, this would be practically the same to have a stable orbit.\nTidal effects could also allow the moon to sustain plate tectonics, which would cause volcanic activity to regulate the moon's temperature and create a geodynamo effect which would give the satellite a strong magnetic field.\nTo support an Earth-like atmosphere for about 4.6 billion years (the age of the Earth), the moon would have to have a Mars-like density and at least a mass of 0.07 M⊕. One way to decrease loss from sputtering", "-29.89566009378177" ], [ "generated by the Sun, and because this would not be a stable orbit. Rather it lies in the (constantly moving) plane which passes through L1 and is perpendicular to the line connecting the Sun and the Earth. It stays in this plane, tracing out an elliptical lissajous orbit centered about L1. It orbits L1 once every six months, while L1 itself orbits the Sun every 12 months as it is coupled with the motion of the Earth. This keeps SOHO at a good position for communication with Earth at all times. Communication with Earth In normal operation the spacecraft transmits", "-29.8932813489846" ], [ "Moon that it is captured into the 1:1 spin-orbit resonance and is always showing us one side. Owing to the body tides in it, Mercury is trapped in the 3:2 spin-orbit resonance with the Sun. \n\nFor the same reason, it is believed that many of the exoplanets are captured in higher spin-orbit resonances with their host stars.", "-29.88280381829827" ], [ "as it crossed the Sun.\nIn 1926 the science journal Die Sterne published the findings of amateur German astronomer W. Spill, who claimed to have successfully viewed a second moon orbiting Earth.\nIn the late 1960s John Bargby claimed to have observed over ten small natural satellites of Earth, but this was not confirmed. Modern status It was discovered that small bodies can be temporarily captured, as shown by 2006 RH120, which was in Earth orbit in 2006–2007.\nIn 2010, the first known Earth trojan was discovered in data from Wide-field Infrared Survey Explorer (WISE), and is currently called 2010 TK7.\nIn 2011, planetary", "-29.87239153427072" ], [ "direct, experimental proof of heliocentrism. Improvements in observational astronomy and the use of unmanned spacecraft have since enabled the detailed investigation of other bodies orbiting the Sun. Structure and composition The principal component of the Solar System is the Sun, a G2 main-sequence star that contains 99.86% of the system's known mass and dominates it gravitationally. The Sun's four largest orbiting bodies, the giant planets, account for 99% of the remaining mass, with Jupiter and Saturn together comprising more than 90%. The remaining objects of the Solar System (including the four terrestrial planets, the dwarf planets, moons, asteroids, and comets)", "-29.84702401093091" ], [ "Two-body problem in general relativity Apsidal precession If the potential energy between the two bodies is not exactly the 1/r potential of Newton's gravitational law but differs only slightly, then the ellipse of the orbit gradually rotates (among other possible effects). This apsidal precession is observed for all the planets orbiting the Sun, primarily due to the oblateness of the Sun (it is not perfectly spherical) and the attractions of the other planets to one another. The apsides are the two points of closest and furthest distance of the orbit (the periapsis and apoapsis, respectively); apsidal precession corresponds", "-29.839545731781982" ], [ "about the planets in the Solar System, the mass of the Sun, and details of quasars; even the existence of dark matter is inferred using Newton's law of gravity. Although we have not traveled to all the planets nor to the Sun, we know their masses. These masses are obtained by applying the laws of gravity to the measured characteristics of the orbit. In space an object maintains its orbit because of the force of gravity acting upon it. Planets orbit stars, stars orbit galactic centers, galaxies orbit a center of mass in clusters, and clusters orbit in superclusters. The", "-29.81535875471309" ], [ "Titius–Bode law The Titius–Bode law (sometimes termed just Bode's law) is a hypothesis that the bodies in some orbital systems, including the Sun's, orbit at semi-major axes in a function of planetary sequence. The formula suggests that, extending outward, each planet would be approximately twice as far from the Sun as the one before. The hypothesis correctly anticipated the orbits of Ceres (in the asteroid belt) and Uranus, but failed as a predictor of Neptune's orbit and was eventually superseded as a theory of Solar System formation. It is named for Johann Daniel Titius and Johann Elert Bode. Origin and", "-29.77878132222395" ], [ "the sun could have been responsible for some of the mass extinctions of life on earth.\nIn 1959 Shklovsky examined the orbital motion of Mars's inner satellite Phobos. He concluded that its orbit was decaying, and noted that if this decay was attributed to friction with the Martian atmosphere, then the satellite must have an exceptionally low density. In this context he voiced a suggestion that Phobos might be hollow, and possibly of artificial origin. This interpretation has since been refuted by more detailed study, but the apparent suggestion of extraterrestrial involvement caught the public imagination, though there is some disagreement", "-29.773538100678707" ], [ "of Earth.\nEarth possesses one known trojan, a small Solar System body caught in the planet's gravitationally stable L₄ Lagrangian point. This object, 2010 TK7, is roughly 300 metres across. Like quasi-satellites, it orbits the Sun in a 1:1 resonance with Earth, rather than Earth itself. Temporary satellites Computer models by astrophysicists Mikael Granvik, Jeremie Vaubaillon, and Robert Jedicke suggest that these \"temporary satellites\" should be quite common; and that \"At any given time, there should be at least one natural Earth satellite of 1 meter diameter orbiting the Earth.\" Such objects would remain in orbit for ten months on average, before", "-29.75701975838456" ], [ "Sun's equator and the orbital plane of Jupiter, which is only 6°.\nThe misalignment may indicate that in the past an encounter with another planet altered its orbit, kicking it out of the plane of the planetary system. Its orbital eccentricity is very large (e = 0.2883). Since tidal forces should have reduced the orbital eccentricity of this planet it is possible that there is another massive planet outside the orbit of XO-3 that is in orbital resonance with XO-3b. Another planetary system that may have also undergone such planet-planet interactions is Upsilon Andromedae. Debate There is currently a debate over the", "-29.735801668080967" ], [ "as compared to the delta-v required for other planetary missions.\nThe potential energy liberated by moving down the Sun's potential well becomes kinetic energy; requiring another large delta-v change to do anything other than rapidly pass by Mercury. To land safely or enter a stable orbit the spacecraft would rely entirely on rocket motors. Aerobraking is ruled out because Mercury has a negligible atmosphere. A trip to Mercury requires more rocket fuel than that required to escape the Solar System completely. As a result, only two space probes have visited it so far. A proposed alternative approach would use a solar", "-29.730399338528514" ], [ "(compared to Mercury's from the Sun, which is 0.38 AU). It receives 296.5 times more sunlight that Earth does from the Sun.\nThe planet may be tidally locked meaning that there is a permanent day side and a permanent night side. Discovery The search for 61 Virginis b started when its host star was chosen an ideal target for a planet search using the radial velocity method (in which the gravitational pull of a planet on its star is measured by observing the resulting Doppler shift), as stellar activity would not overly mask or mimic Doppler spectroscopy measurements. It was also", "-29.727548463648418" ], [ "planets' orbits will expand; if Venus, Earth, and Mars still exist, their orbits will lie roughly at 1.4 AU (210,000,000 km), 1.9 AU (280,000,000 km), and 2.8 AU (420,000,000 km). They and the other remaining planets will become dark, frigid hulks, completely devoid of any form of life. They will continue to orbit their star, their speed slowed due to their increased distance from the Sun and the Sun's reduced gravity. Two billion years later, when the Sun has cooled to the 6000–8000K range, the carbon and oxygen in the Sun's core will freeze, with over 90% of its remaining mass assuming a crystalline structure. Eventually,", "-29.70118543956778" ], [ "did calculations to describe orbital motions at gravitational balance points in space that temporarily pull asteroids into bizarre orbits near our planet.\n— Space.com, 1999 Quasi-satellites and trojans Although no other moons of Earth have been found to date, there are various types of near-Earth objects in 1:1 resonance with it, which are known as quasi-satellites. Quasi-satellites orbit the Sun from the same distance as a planet, rather than the planet itself. Their orbits are unstable, and will fall into other resonances or be kicked into other orbits over thousands of years. Quasi-satellites of Earth include 2010 SO16, (164207) 2004 GU9,(277810) 2006", "-29.68729308775437" ], [ "(524435) 2002 CY248 Orbit and classification 2002 CY₂₄₈ orbits the Sun at a distance of 39.4–53.1 AU once every 314 years and 6 months (114,859 days; semi-major axis of 46.2 AU). Its orbit has an eccentricity of 0.15 and an inclination of 7° with respect to the ecliptic. The body's observation arc begins at Kitt Peak with its official first observation on 6 February 2002. A 10-million-year integration of the orbit shows that it is a Classical Kuiper belt object that does not get closer to the Sun than 38.8 AU (5.80 billion km) or further than 54 AU. Physical characteristics Based on an absolute", "-29.686443988786777" ], [ "in 1976 and the orbit of Uranus in 1979. On June 13, 1983, the craft crossed the orbit of Neptune, the second outermost planet, and so became the first human-made object to leave the proximity of the major planets of the Solar System. The mission came to an official end on March 31, 1997, when it had reached a distance of 67 AU from the Sun, though the spacecraft was still able to transmit coherent data after this date.\nAfter March 31, 1997, Pioneer 10's weak signal continued to be tracked by the Deep Space Network to aid the training of flight", "-29.683925160399667" ], [ "other side, but the Sun moves to 2.17 solar radii away from the barycenter when all jovian planets are in line on the other side. The orbital angular momenta of the Sun and all non-jovian planets, moons, and small Solar System bodies, as well as the axial rotation momenta of all bodies, including the Sun, total only about 2%.\nIf all Solar System bodies were point masses, or were rigid bodies having spherically symmetric mass distributions, then an invariable plane defined on orbits alone would be truly invariable and would constitute an inertial frame of reference. But almost all are not,", "-29.660807567997836" ], [ "to another orbit, or to be captured either as a satellite or into a resonant orbit. As a consequence it does not then share its orbital region with other bodies of significant size, except for its own satellites, or other bodies governed by its own gravitational influence. This latter restriction excludes objects whose orbits may cross but that will never collide with each other due to orbital resonance, such as Jupiter and its trojans, Earth and 3753 Cruithne, or Neptune and the plutinos. As to the extent of orbit clearing required, Jean-Luc Margot emphasises \"a planet can never completely clear", "-29.660111917415634" ], [ "2018 WV1 Orbit 2018 WV₁ orbits the Sun at a distance of 0.98–1.10 AU once every 387 days (semi-major axis of 1.04 AU). Its orbit has an eccentricity of 0.06 and an inclination of 2° with respect to the ecliptic. \nAs an Apollo asteroid with an orbital period slightly larger than that of the Earth, its orbit is very similar to that of the Earth, indicating that the object is a piece of lunar ejecta, a fragment of the Moon that was ejected into space when a larger asteroid hit the Moon a long time ago. 2018 flyby On 2 December 2018,", "-29.648618948383955" ], [ "stake conference congregation in Hawaii:\nWe will never get a man into space. This earth is man's sphere and it was never intended that he should get away from it. The moon is a superior planet to the earth and it was never intended that man should go there. You can write it down in your books that this will never happen.\nEarlier, Smith had written that \"it is doubtful that man will ever be permitted to make any instrument or ship to travel through space and visit the moon or any distant planet\". At the 1970 press conference where Smith was", "-29.647007622552337" ], [ "the Sun. Also, Mercury's fairly eccentric orbit makes it much easier to detect the perihelion shift than is the case for the nearly circular orbits of Venus and Earth.\nEinstein's theory was empirically verified during the solar eclipse of May 29, 1919 by measuring the bending of sunlight. Astronomers generally quickly accepted that a large planet inside the orbit of Mercury could not exist, given the corrected equation of gravity.", "-29.646556505351327" ], [ "object one might wish to calculate one for: any satellite orbiting a body (i.e. the Earth) will be in that body's shadow with respect to a given celestial object (like a star) some of the time, and in its line-of-sight the rest of the time. Beta angles describing non-geocentric orbits are important when space agencies launch satellites into orbits around other bodies in the Solar System. Importance in spaceflight When the space shuttle was in service on missions to the International Space Station, the beta angle of the space station's orbit was a crucial consideration; periods referred to as", "-29.625919613230508" ], [ "54 are orbiting in the parent star's habitable 'Goldilocks' zone where liquid water could exist. Five of these are near Earth-size.\nOn 6 January 2015, NASA announced further observations conducted from May 2009 to April 2013 which included eight candidates between one and two times the size of Earth, orbiting in a habitable zone. Of these eight, six orbit stars that are similar to the Sun in size and temperature. Three of the newly confirmed exoplanets were found to orbit within habitable zones of stars similar to the Sun: two of the three, Kepler-438b and Kepler-442b, are near-Earth-size and", "-29.619324362574844" ], [ "to be common objects amongst the celestial bodies orbiting close to the Sun.\nRoughly six percent of the near-Earth asteroids are thought to be extinct nuclei of comets which no longer experience outgassing.", "-29.60297457035631" ], [ "meaning that it radiates about 2% of the amount of energy that the Sun does. It was described as an intermediately active star in its discovery paper. Gliese 3634 lies 19.8 parsecs (approximately 64.6 light years) away from Earth, a relatively close star. Gliese 3634 b is the only planet to have been confirmed in the star's orbit, although initial analysis of the data suggests that a secondary body of an unknown nature also exists, with an orbit of more than 200 days and a mass approximately twice that of Neptune's.\nThe star was first catalogued in 1987, and was referenced", "-29.56756803415192" ], [ "solar days, making approximately the same face visible from Earth at each close approach. Whether this relationship arose by chance or is the result of some kind of tidal locking with Earth is unknown.\nProxima Centauri b, the \"Earth-like planet\" discovered in 2016 that orbits around the star Proxima Centauri is tidally locked, either in synchronized rotation, or otherwise expresses a 3:2 spin–orbit resonance like that of Mercury.\nOne form of hypothetical tidal locked exoplanets are eyeball planets, that in turn are divided into \"hot\" and \"cold\" eyeball planets. Stars Close binary stars throughout the universe are expected to be tidally locked", "-29.561535061875475" ], [ "see figure at right). The four planets discovered from his work are HD 31253b, HD 218566b, HD 177830c and HD 99492c. HD 218566b is within the habitable zone of its solar system. While it is unlikely that it holds extraterrestrial life because it is a gas giant with no solid surface, it is possible that there could be a moon circling it which could sustain life. Analysis of the delta effect Jalowiczor has also done research relating to comets. The work confirmed the delta effect (the variation in the distance between a comet and its observer affecting the perceived", "-29.53228279974428" ], [ "\"when two bodies in space are in motion relative to one another, ... science declares with absolute certainty that from the scientific point of view both possibilities are equally valid, namely that the Earth revolves around the sun, or the sun revolves around the Earth\", although he also went on to refer to people who believed in geocentrism as \"remaining in the world of Copernicus\".\nThe Zohar states: \"The entire world and those upon it, spin round in a circle like a ball, both those at the bottom of the ball and those at the top. All God's creatures, wherever", "-29.52781313113519" ], [ "to complete. It orbits at a distance of just 0.02228 AU from the host star, or about 2.2% the distance between Earth and the Sun. For comparison, Mercury, our Solar System's innermost planet, takes 88 days to orbit at a distance of about 0.38 AU. The size of TRAPPIST-1 and the close orbit of TRAPPIST-1d around it means that the star as seen from the planet appears 5.5 times as large as the Sun from the Earth. While a planet at TRAPPIST-1d's distance from our Sun would be a scorched world, the low luminosity of TRAPPIST-1 means that the planet", "-29.51792464221944" ], [ "Sun will be about 12 billion years old. It is likely to expand to swallow both Mercury and Venus, reaching a maximum radius of 1.2 AU (180,000,000 km). The Earth will interact tidally with the Sun's outer atmosphere, which would serve to decrease Earth's orbital radius. Drag from the chromosphere of the Sun would also reduce the Earth's orbit. These effects will act to counterbalance the effect of mass loss by the Sun, and the Earth will probably be engulfed by the Sun.\nThe drag from the solar atmosphere may cause the orbit of the Moon to decay. Once the orbit of the", "-29.510365787893534" ], [ "astronomers at the University of Central Florida, using the Spitzer Space Telescope, strongly believed they had observed a second planet. This candidate planet was given the preliminary designation UCF-1.01, after the University of Central Florida. It was measured to have a radius of around two thirds that of Earth and, assuming an Earth-like density of 5.5 g/cm³, was estimated to have a mass of 0.3 times that of Earth and a surface gravity of around two thirds that of Earth. It orbits at 0.0185 AU from the star, every 1.3659 days. The astronomers also believe they have found some evidence", "-29.495684314577375" ], [ "planets do indeed move around the Sun, which due to its much larger mass, moves far less than its own diameter and the gravity of which is dominant in determining the orbits of the planets (in other words, the center of mass of the Solar System is near the center of the Sun). The Earth and Moon are much closer to being a binary planet; the center of mass around which they both rotate is still inside the Earth, but is about 4,624 km (2,873 mi) or 72.6% of the Earth's radius away from the centre of the Earth (thus closer to", "-29.495031297788955" ], [ "System. The semimajor axis of the orbit is only 0.63 AU, similar to that of Venus. However, its star is less massive and energetic than the Sun (with a luminosity of 0.62 L☉), thereby putting the planet within its habitable zone. Habitability HD 69830 d likely resides in the habitable zone of its parent star. The exoplanet, with an estimated mass of 17 M⊕, is too massive to likely be rocky, and because of this the planet itself is not habitable. Hypothetically, large enough moons, with a sufficient atmosphere and pressure, may be able to support liquid water and potentially", "-29.459238951385487" ], [ "it spins to simulate gravity, which is absent at the centre. The ship's \"Converter\" reflects an early 1940s viewpoint of atomic power, with atoms of any element \"ripped apart\" in an unspecified manner.\nThe notion of a giant planet with a habitable moon went against theories of planetary formation as they stood before the discovery of \"hot Jupiter\" planets. It was thought that planets large enough to have an Earth-sized moon would form only above the \"snowline,\" too far from the star for life. It is now believed that such worlds can migrate inwards, and habitable moons seem likely. The existence", "-29.41028379022464" ], [ "to the Sun's mass, the center of gravity of the Solar System is displaced slightly away from the center of the Sun. (The masses of the planets, mostly Jupiter, amount to 0.14% of that of the Sun.) Therefore, a hypothetical astronomer on an extrasolar planet would observe a small \"wobble\" in the Sun's motion. Modern use of geocentric and heliocentric In modern calculations, the terms \"geocentric\" and \"heliocentric\" are often used to refer to reference frames. In such systems the origin in the center of mass of the Earth, of the Earth–Moon system, of the Sun, of the", "-29.39832901713089" ], [ "light. For example, planets orbiting the Sun constantly lose energy via gravitational radiation, but this effect is so small that it is unlikely it will be observed in the near future (Earth radiates about 200 watts (see gravitational waves) of gravitational radiation).\nThe radiation of gravitational waves has been inferred from the Hulse–Taylor binary (and other binary pulsars). Precise timing of the pulses shows that the stars orbit only approximately according to Kepler's Laws: over time they gradually spiral towards each other, demonstrating an energy loss in close agreement with the predicted energy radiated by gravitational waves. For their discovery of", "-29.39121223858092" ], [ "who suspects not that the very sun itself is supporting in space the little table against which he leans, or that every star in heaven and every fiber of the soul are directly concerned in the movement of an eyelid that closes, or a thought that springs to birth—I have grown to believe that he, motionless as he is, does yet live in reality a deeper, more human, and more universal life than the lover who strangles his mistress, the captain who conquers in battle, or \"the husband who avenges his honor.\"\nHe cites a number of classical Athenian tragedies—which, he", "-29.37444185873028" ], [ "uninhabitable. In a second study, René Heller then included the effect of eclipses into this concept as well as constraints from a satellite's orbital stability. He found that, depending on a moon's orbital eccentricity, there is a minimum mass for stars to host habitable moons at around 0.2 solar masses.\nTaking as an example the smaller Europa, at less than 1% the mass of the Earth, Lehmer et al. found if it were to end up near to Earth orbit it would only be able to hold onto its atmosphere for a few million years. However, for any larger, Ganymede-sized moons", "-29.370405379362637" ], [ "an orbital period less than about 45 to 60 days will remain safely bound to a massive giant planet or brown dwarf that orbits 1 AU from a Sun-like star. In the case of Kepler-47c, this would be practically the same to have a stable orbit.\nTidal effects could also allow the moon to sustain plate tectonics, which would cause volcanic activity to regulate the moon's temperature and create a geodynamo effect which would give the satellite a strong magnetic field.\nTo support an Earth-like atmosphere for about 4.6 billion years (the age of the Earth), the moon would have to have", "-29.366666150279343" ], [ "in radius, is still virtually unmapped. There are also ongoing studies of the region between Mercury and the Sun. Objects may yet be discovered in the Solar System's uncharted regions.\nCurrently, the furthest known objects, such as Comet West, have aphelia around 70,000 AU from the Sun, but as the Oort cloud becomes better known, this may change. Galactic context The Solar System is located in the Milky Way, a barred spiral galaxy with a diameter of about 100,000 light-years containing more than 100 billion stars. The Sun resides in one of the Milky Way's outer spiral arms, known as the Orion–Cygnus", "-29.366138871118892" ], [ "of life itself. This is also the stated goal of Science Mission Directorate's Heliophysics Research. Local effects The Sun is an active star, and Earth is located within its atmosphere, so there is a dynamic interaction. For example, the Sun' light influences all life and processes on Earth. It is an energy provider that allows and sustains life on earth. However, the Sun also produces streams of high energy particles known as the solar wind, and radiation that can harm life or alter its evolution. Additionally, under the protective shield of earth's magnetic field and its atmosphere, NASA", "-29.358087806147523" ], [ "with the naked eye. Orbit Kepler-442b orbits its host star with an orbital period of 112.3 days and an orbital radius of about 0.4 times that of Earth's (a little larger than the distance of Mercury from the Sun, which is about 0.38 AU). It receives about 70% of the sunlight that Earth receives from the Sun. Habitability The planet was announced as being located within the habitable zone of its star, a region where liquid water could exist on the surface of the planet. It was described as being one of the most Earth-like planets, in terms of size", "-29.349840178329032" ], [ "orbit around the Sun in a 3:2 resonance.\nMany exoplanets (especially the close-in ones) are expected to be in spin–orbit resonances higher than 1:1. A Mercury-like terrestrial planet can, for example, become captured in a 3:2, 2:1, or 5:2 spin–orbit resonance, with the probability of each being dependent on the orbital eccentricity. Moons Most major moons in the Solar System − the gravitationally rounded satellites − are tidally locked with their primaries, because they orbit very closely and tidal force increases rapidly (as a cubic function) with decreasing distance. Notable exceptions are the irregular outer satellites of the gas giants, which", "-29.307593981880927" ], [ "being very similar to that of the Earth. Orbit refinements by JPL's Paul Chodas and amateur astronomer Bill Gray have shown that this object was very close to the Earth in early 1975, but the trajectory is not known with enough accuracy to associate the object with any particular launch. Nevertheless, scientists do not expect that a natural object could remain in this type of orbit for very long because of its relatively high impact probability with the Earth. In fact, an analysis carried out by Paul Chodas suggests that 2010 KQ has a 6% chance of impacting the Earth", "-29.307377485645702" ], [ "and is not a threat for the foreseeable future.\nIt orbits the Sun at a distance of 0.57–1.03 au in less than 9 months (263 days; semi-major axis of 0.80 au). Its orbit has an eccentricity of 0.28 and an inclination of 3.4° with respect to the ecliptic. The body's observation arc begins with its first observation at the Siding Spring Observatory on 21 August 2006. Close approach in 2019 On 10 August 2019 at 7:23 am UTC, 2006 QQ₂₆ safely passed 0.04977 au (7,445,000 km) from Earth; travelling at around 4.67 km/s (16,800 km/h) The asteroid was recovered on 14 July 2019, which extended the observation", "-29.289212633942952" ], [ "they orbit a point clearly outside of Pluto, as visible in animations created from images of the New Horizons space probe in June 2015.\nUnder this definition, the Earth–Moon system is not currently a double planet; although the Moon is massive enough to cause the Earth to make a noticeable revolution around this center of mass, this point nevertheless lies well within Earth. However, the Moon currently migrates outward from Earth at a rate of approximately 3.8 cm (1.5 in) per year; in a few billion years, the Earth–Moon system's center of mass will lie outside Earth, which would make it a double-planet", "-29.264913499122486" ], [ "by a Jupiter-sized planet beyond Neptune at 59 AU that is in a retrograde orbit around the Sun. However, both Marsden and Planet X proponent P. Kenneth Seidelmann attacked the hypothesis, showing that Halley's Comet randomly and irregularly ejects jets of material, causing changes to its own orbital trajectory, and that such a massive object as Brady's Planet X would have severely affected the orbits of known outer planets.\nAlthough its mission did not involve a search for Planet X, the IRAS space observatory made headlines briefly in 1983 due to an \"unknown object\" that was at first described as \"possibly as large as", "-29.236805020576867" ] ]
5sgfzh
Parallel was faster than serial, why isn't there an UPB - "Universal Parallel Bus"?
[ "It comes down to being able to group that parallel data at very high speeds. Say I'm tossing a ball to you and think of this as a serial bus. Now take seven of your friends and I will get seven of mine and we will all toss the ball back and forth at the same time and that is the parallel bus. Now start increasing the speed of the ball toss back and forth. It becomes difficult to keep all eight pairs transferring the ball at the same time. It is much easier to find one pair that kind transfer the ball very quickly than multiple pairs that can do it without one of the pair getting ahead or behind the others.", "At high clock speeds it becomes difficult to transmit and receive data in parallel because propagation delays cause the different data lines (wires) to be very slightly out-of-sync and at high frequencies you have to manage that synchronization. When you transmit the data in serial then you don't have that problem. Modern buses like Thunderbolt and PCIe are serial though much more sophisticated and faster than old RS-232 ports.", "Parallel = faster Serial = cheaper For most problems where USB is the solution: **cheaper > faster**. SCSI and ATA are still around, but SATA (Serial ATA) is displacing ATA because as the technology gets faster: **cheaper > faster**.", "There is. Thunderbolt use two lanes in each direction compared to the one shared lane in USB. USB-C is the same. USB 3.0 also have two lanes but shared between the directions. If you look at PCI-E they have up to 16 channels. When you are talking about multiple channels it is not exactly the same as a parallel bus since the signals is not synchronized but it turns out with modern electronics it is no problems synchronizing the data afterwards which improves the transfer rate and reliability. What Thunderbolt and USB 3.0 have in common is that they are more expensive. You suddenly need as much hardware for a single USB-C connector as you needed for an entire USB 2.0 hub with multiple connectors. And the cables are more expensive, thicker and more fragile. This is fine for some applications, for example when hooking up a TV. But it is not fine in cases where you do not need it which is where USB have found its market.", "To summarise others' contributions here and add a couple of minor points: Problems with parallel: 1. Synchronisation of data across multiple parallel lines at very high data rates is very difficult due to variable propagation speeds of those lines (due to variations in capacitance, inductance and resistance of those lines) 2. Increased cost due to increased complexity of the transmit-receive electronics and mechanical connectors and wiring. 3. Increased size of the connectors and cable, which is at odds with increased miniaturisation and available space on the connected devices. 4. Potentially increased noise due to cross-talk between the data lines, which can only be reduced by increasing (3) and hence (2). 5. Not all data transfers need to be at the maximum bandwidths possible with either serial or parallel connections, since both the data source and destination are likely to have other internal systems that have more limited bandwidth, such as a mechanical hard drive. So, why not stick with the smaller, cheaper serial solution? Back in my day as an electronic engineer, when RS-232 was standard, few could possibly have imagined the data rates that are achievable in serial connections today. There has been an evolution over the past couple of decades in our understanding of the signal propagation and EM effects in wires at very high frequencies, and a corresponding evolution in the mechanical, material and production technologies necessary to deliver such wired connections.", "Software developer here, The problem with parallel cables is that the signals each have to arrive at the destination *at the same time*. As signal frequency increases, this synchronization becomes impractical.", "A friend who really knew his stuff explained to me that only way the parallel signal paths on computer mainboards can work is because the design engineers treat each individual conductor as an antenna and do all the calculations needed to solve for the fact that a) each line is transmitting EM energy, and b) simultaneously being affected by EVERY other line on the board, via EM. The calcs are therefore horrendously complex! Mainboards are static - unchanging, and sealed inside a faraday cage, whereas cables are flexible and therefore unstable, preventing you from doing the calcs at all." ]
[ [ "data rates increase, the problems of timing skew, power consumption, electromagnetic interference and crosstalk across parallel buses become more and more difficult to circumvent. One partial solution to this problem has been to double pump the bus. Often, a serial bus can be operated at higher overall data rates than a parallel bus, despite having fewer electrical connections, because a serial bus inherently has no timing skew or crosstalk. USB, FireWire, and Serial ATA are examples of this. Multidrop connections do not work well for fast serial buses, so most modern serial buses use daisy-chain or hub designs.\nNetwork connections such", "-29.9419097895734" ], [ "Serial interfaces have a number of advantages over parallel SCSI, including higher data rates, simplified cabling, longer reach, improved fault isolation and full-duplex capability. The primary reason for the shift to serial interfaces is the clock skew issue of high speed parallel interfaces, which makes the faster variants of parallel SCSI susceptible to problems caused by cabling and termination.\nThe non-physical iSCSI preserves the basic SCSI paradigm, especially the command set, almost unchanged, through embedding of SCSI-3 over TCP/IP. Therefore, iSCSI uses logical connections instead of physical links and can run on top of any network supporting IP. The actual physical", "-29.740643193212236" ], [ "of two hubs in a single collision domain). Dual-speed hub In the early days of Fast Ethernet, Ethernet switches were relatively expensive devices. Hubs suffered from the problem that if there were any 10BASE-T devices connected then the whole network needed to run at 10 Mbit/s. Therefore, a compromise between a hub and a switch was developed, known as a dual-speed hub. These devices make use of an internal two-port switch, bridging the 10 Mbit/s and 100 Mbit/s segments. When a network device becomes active on any of the physical ports, the device attaches it to either the 10 Mbit/s segment or the 100 Mbit/s", "-29.47688427043613" ], [ "so multicore systems were of more limited use. Since 2004 however, frequency scaling hit a wall, and thus multicore systems have become more widespread, making parallel algorithms of more general use. Communication The cost or complexity of serial algorithms is estimated in terms of the space (memory) and time (processor cycles) that they take. Parallel algorithms need to optimize one more resource, the communication between different processors. There are two ways parallel processors communicate, shared memory or message passing.\nShared memory processing needs additional locking for the data, imposes the overhead of additional processor and bus cycles, and also serializes some", "-28.981341882376" ], [ "segment, as appropriate. This obviated the need for an all-or-nothing migration to Fast Ethernet networks. These devices are considered hubs because the traffic between devices connected at the same speed is not switched. Gigabit Ethernet hub Repeater hubs have been defined for Gigabit Ethernet but commercial products have failed to appear due to the industry's transition to switching.", "-28.588847470236942" ], [ "In a departure from both 10BASE-T and 100BASE-TX, 1000BASE-T and faster use all four cable pairs for simultaneous transmission in both directions through the use of telephone hybrid-like signal handling. For this reason, there are no dedicated transmit and receive pairs. 1000BASE-T and faster require either a straight or one of the crossover variants only for the autonegotiation phase. The physical medium attachment (PMA) sublayer provides identification of each pair and usually continues to work even over cable where the pairs are unusually swapped or crossed. Twisted pair In practice, it does not matter if non-crossover Ethernet cables are wired", "-28.34774338634452" ], [ "and wider buses (16-bit or 32-bit). The 16-bit option became the most popular, as the 32-bit option was more expensive and was thus hardly ever used.\nAt 10 MHz with a bus width of 16 bits it is possible to achieve a data rate of 20 MB/s. Subsequent extensions to the SCSI standard allowed for faster speeds: 20 MHz, 40 MHz, 80 MHz, 160 MHz and finally 320 MHz. At 320 MHz x 16 bits there is a theoretical maximum peak data rate of 640 MB/s.\nDue to the technical constraints of a parallel bus system, SCSI has since evolved into faster serial interfaces, mainly Serial Attached SCSI and", "-28.267647313536145" ], [ "1986, transferring up to 5 MB/s, and evolved into a low-voltage differential 16-bit bus capable of up to 320 MB/s. The last SPI-5 standard from 2003 also defined a 640 MB/s speed which failed to be realized.\nParallel SCSI specifications include several synchronous transfer modes for the parallel cable, and an asynchronous mode. The asynchronous mode is a classic request/acknowledge protocol, which allows systems with a slow bus or simple systems to also use SCSI devices. Faster synchronous modes are used more frequently. SCSI Parallel Interface Internal parallel SCSI cables are usually ribbons, with two or more 50–, 68–, or 80–pin connectors attached. External", "-28.20941374951508" ], [ "Parallel Bus Interface The Parallel Bus Interface, or PBI, is a 50-pin port found on some Atari 8-bit XL computers. It provides unbuffered, direct connection to the system bus lines (address, data, control), running at the same speed as the 6502 CPU. The 600XL and 800XL computers, along with the unreleased 1400XL and 1450XLD had a PBI interface.\nThe Enhanced Cartridge Interface, or ECI, was a modified version of the PBI designed to be smaller and less expensive to implement. Many of the pins in the PBI were duplicated in the 30-pin cartridge slot, so ECI was limited to only those", "-28.15530322216364" ], [ "64-bit parallel interface requires difficult trace routing, because, as with all parallel interfaces, the signals from the bus must arrive simultaneously or within a very short window, and noise from adjacent slots may cause interference. The serial interface of PCIe suffers fewer such problems and therefore does not require such complex and expensive designs. PCI-X buses, like standard PCI, are half-duplex bidirectional, whereas PCIe buses are full-duplex bidirectional. PCI-X buses run only as fast as the slowest device, whereas PCIe devices are able to independently negotiate the bus speed. Also, PCI-X slots are longer than PCIe 1x", "-27.812335243914276" ], [ "or other entity of data. Digital serial transmissions are bits sent over a single wire, frequency or optical path sequentially. Because it requires less signal processing and less chances for error than parallel transmission, the transfer rate of each individual path may be faster. This can be used over longer distances as a check digit or parity bit can be sent along it easily.\nIn telecommunications, parallel transmission is the simultaneous transmission of the signal elements of a character or other entity of data. In digital communications, parallel transmission is the simultaneous transmission of related signal elements over two or more", "-27.715052986284718" ], [ " Adapters which support high speed trace ports generally include several megabytes of trace buffer and provide high speed links (USB or Ethernet) to get that data to the host.\nParallel port adapters are simple and inexpensive, but they are relatively slow because they use the host CPU to change each bit (\"bit banging\"). They have declined in usefulness because most computers in recent years don't have a parallel port. Driver support is also a problem, because pin usage by adapters varied widely. Since the parallel port is based on 5V logic level, most adapters lacked voltage translation support", "-27.29683204763569" ], [ "produce more stable functions. Some applications (such as game servers) may also use their own synchronization mechanism to avoid reliability problems due to clock skew. Interfaces Clock skew is the reason why at fast speeds or long distances, serial interfaces (e.g. Serial Attached SCSI or USB) are preferred over parallel interfaces (e.g. parallel SCSI).", "-27.25451489869738" ], [ "and serial code, and therefore place more emphasis on high single thread performance (e.g. devoting more silicon to out of order execution, deeper pipelines, more superscalar execution units, and larger, more general caches), and shared memory. These techniques devote runtime resources toward figuring out implicit parallelism in a single thread. They are used in systems where they have evolved continuously (with backward compatibility) from single core processors. They usually have a 'few' cores (e.g. 2,4,8), and may be complemented by a manycore accelerator (such as a GPU) in a heterogeneous system. Motivation Cache coherency is an issue limiting the scaling", "-27.14321161143016" ], [ "known as Laplink Software, Inc. and their main software is now PCmover. With the demise of parallel ports on PCs Laplink no longer sells the traditional cable. Instead it has USB to hard drive, USB to USB and Ethernet to Ethernet cables. Comparison to null modem cables A Laplink cable can be seen as a parallel equivalent to a serial null modem cable. Because of the higher bandwidth of the parallel port versus the serial port, a Laplink® cable is able to transfer data more quickly.", "-27.05000270565506" ], [ "slower device, if two devices of different speed capabilities are on the same cable.\nFor all modern ATA host adapters, this is not true, as modern ATA host adapters support independent device timing. This allows each device on the cable to transfer data at its own best speed. Even with earlier adapters, without independent timing, this effect applies only to the data transfer phase of a read or write operation. \"One operation at a time\" This is caused by the omission of both overlapped and queued feature sets from most parallel ATA products. Only one device on a cable can perform", "-26.893902250099927" ], [ "to five segments and four repeaters are allowed between any two hosts. For 100 Mbit/s networks, the limit is reduced to 3 segments (2 Class II hubs) between any two end stations, and even that is only allowed if the hubs are of Class II. Some hubs have manufacturer specific stack ports allowing them to be combined in a way that allows more hubs than simple chaining through Ethernet cables, but even so, a large Fast Ethernet network is likely to require switches to avoid the chaining limits of hubs. Additional functions Most hubs detect typical problems, such as excessive collisions", "-26.806589698186144" ], [ "Parallel I/O Parallel I/O, in the context of a computer, means the performance of multiple input/output operations at the same time, for instance simultaneously outputs to storage devices and display devices. It is a fundamental feature of operating systems.\nOne particular instance is parallel writing of data to disk; when file data is spread across multiple disks, for example in a RAID array, one can store multiple parts of the data at the same time, thereby achieving higher write speeds than with a single device.\nOther ways of parallel access to data include: Parallel Virtual File System, Lustre, GFS etc. Scientific", "-26.711956380924676" ], [ "for \"forced mode auto MDI-X\" which allow a link to be automatically established even if the port does not auto-negotiate. This may or may not be implemented on a given device, so occasionally a crossover cable may still be necessary when connecting auto MDI-X to MDI-X (hub or switch), especially when autonegotiation is deactivated.\nNewer routers, hubs and switches (including some 10/100, and all 1 gigabit or 10 gigabit devices in practice) use auto MDI-X for 10/100 Mbit connections to automatically switch to the proper configuration once a cable is connected.\nGigabit and faster Ethernet links over twisted pair cable use all", "-26.69539578561671" ], [ "number of third-party serial-bus drives such as the MSD Super Disk and Indus GT appeared that often offered better reliability, higher performance, quieter operation, or simply a lower price than the 1541, although often at the expense of software compatibility due to the difficulty of reverse engineering the DOS built into the 1541's hardware (Commodore's IEEE-based drives faced the same issue due to the dependence of the DOS on features of the Commodore serial bus).\nLike the IEEE-488 interface, the CBM-bus offered the ability to daisy chain hardware together. This led to Commodore producing (via a third party) the Commodore 4015,", "-26.596657488073106" ], [ "Virtual LAN History After successful experiments with voice over Ethernet from 1981 to 1984, Dr. W. David Sincoskie joined Bellcore and began addressing the problem of scaling up Ethernet networks. At 10 Mbit/s, Ethernet was faster than most alternatives at the time. However, Ethernet was a broadcast network and there was no good way of connecting multiple Ethernet networks together. This limited the total bandwidth of an Ethernet network to 10 Mbit/s and the maximum distance between nodes to a few hundred feet.\nBy contrast, although the existing telephone network's speed for individual connections was limited to 56 kbit/s (less than one", "-26.525260600377806" ], [ "codified the terminology, the first parallel SCSI devices that exceeded the SCSI-2 capabilities were simply designated SCSI-3. These devices, also known as Ultra SCSI or Fast-20 SCSI, were introduced in 1996. The bus speed doubled again to 20 MB/s for narrow (8 bit) systems and 40 MB/s for wide (16-bit). The maximum cable length stayed at 3 meters but single-ended Ultra SCSI developed an undeserved reputation for extreme sensitivity to cable length and condition (faulty cables, connectors or terminators were often to blame for instability problems).\nUnlike previous SCSI standards, SCSI-3 (Fast-20 speed) requires active termination. Ultra-2 This standard was introduced", "-26.483382287959103" ], [ "link be full duplex and all of them have an identical speed (10, 100, 1,000 or 10,000 Mbit/s).\nMany switches are PHY independent, meaning that a switch could have a mixture of copper, SX, LX, LX10 or other GBICs. While maintaining the same PHY is the usual approach, it is possible to aggregate a 1000BASE-SX fiber for one link and a 1000BASE-LX (longer, diverse path) for the second link, but the important thing is that the speed will be 1 Gbit/s full duplex for both links. One path may have a slightly longer propagation time but the standard has been engineered so", "-26.357102025300264" ], [ "portion of the algorithm.\nMessage passing processing uses channels and message boxes but this communication adds transfer overhead on the bus, additional memory need for queues and message boxes and latency in the messages. Designs of parallel processors use special buses like crossbar so that the communication overhead will be small but it is the parallel algorithm that decides the volume of the traffic.\nIf the communication overhead of additional processors outweighs the benefit of adding another processor, one encounters parallel slowdown. Load balancing Another problem with parallel algorithms is ensuring that they are suitably load balanced, by ensuring that load (overall", "-26.35189935506787" ], [ "as Ethernet made the use of null modem cables less common. In modern systems, such a cable can still be useful for kernel mode development, since it allows the user to remotely debug a kernel with a minimum of device drivers and code (a serial driver mainly consists of two FIFO buffers and an interrupt service routine). KGDB for Linux, ddb for BSD, and WinDbg or KD for Windows can be used to remotely debug systems, for example. This can also provide a serial console through which the in-kernel debugger can be dropped to in case of kernel panics, in", "-26.255375578417443" ], [ "c. 1997 and featured a low-voltage differential (LVD) bus. For this reason ultra-2 is sometimes referred to as LVD SCSI. LVD's greater resistance to noise allowed a maximum bus cable length of 12 meters. At the same time, the data transfer rate was increased to 80 MB/s. Mixing earlier single-ended devices (SE) and Ultra-2 devices on the same bus is possible but connecting only a single SE device forces the whole bus to single-ended mode with all its limitations, including transfer speed. The standard also introduced VHDCI, a very small connector that allows placement of four wide SCSI connectors on", "-26.253316758899018" ], [ "to run at slower speeds as low as 300 bit/s. The SCC had two channels, which could be run at different speeds, and even different voltages, to allow communications with a wide variety of devices and interfaces.\nInitially the engineers had envisioned using the SCC to support a packet-based protocol known as \"AppleBus\". AppleBus would allow peripheral devices to be plugged into a daisy-chain configuration in a manner surprisingly similar to the modern Universal Serial Bus. However, as development continued, Apple's networking project, AppleNet, was being canceled due to high costs and a rapidly changing marketplace. Team members working on AppleBus quickly", "-26.251118488493375" ], [ "improvements when hyper-threading is used for interrupt handling. Drawbacks When the first HT processors were released, many operating systems were not optimized for hyper-threading technology (e.g. Windows 2000 and Linux older than 2.4).\nIn 2006, hyper-threading was criticised for energy inefficiency. For example, specialist low-power CPU design company ARM stated that simultaneous multithreading (SMT) can use up to 46% more power than ordinary dual-core designs. Furthermore, they claimed that SMT increases cache thrashing by 42%, whereas dual core results in a 37% decrease. Intel disputed this claim, stating that hyper-threading is highly efficient because it uses resources that would otherwise be", "-26.2354293721437" ], [ "OpenVMS). The ARC and VAXcluster products not only supported parallel computing, but also shared file systems and peripheral devices. The idea was to provide the advantages of parallel processing, while maintaining data reliability and uniqueness. Two other noteworthy early commercial clusters were the Tandem Himalayan (a circa 1994 high-availability product) and the IBM S/390 Parallel Sysplex (also circa 1994, primarily for business use).\nWithin the same time frame, while computer clusters used parallelism outside the computer on a commodity network, supercomputers began to use them within the same computer. Following the success of the CDC 6600 in 1964, the Cray 1", "-26.230268883518875" ], [ "used for an enterprise-wide network. When organizations are looking for a very strong and trustworthy backbone they should choose a parallel backbone. This backbone is a variation of a collapsed backbone in that it uses a central node (connection point). Although, with a parallel backbone, it allows for duplicate connections when there is more than one router or switch. Each switch and router are connected by two cables. By having more than one cable connecting each device, it ensures network connectivity to any area of the enterprise-wide network.\nParallel backbones are more expensive than other backbone networks because they require more", "-26.14016065816395" ], [ "allows multiple virtual LANs to coexist on the same physical LAN. This means that two machines attached to the same switch cannot send Ethernet frames to each other even though they pass over the same wires. If they need to communicate, then a router must be placed between the two VLANs to forward packets, just as if the two LANs were physically isolated. The only difference is that the router in question may contain only a single Ethernet network interface controller (NIC) that is part of both VLANs. Hence, \"one-armed\". While uncommon, hosts on the same physical", "-26.00245833210647" ], [ "they do not require it. Fast Ethernet or Ethernet hubs may use the MII to connect to multiple PHYs for their different interfaces.\nThe MII fixes the theoretical maximum data bit rate for all versions of Fast Ethernet to 100 Mbit/s. The information rate actually observed on real networks is less than the theoretical maximum, due to the necessary header and trailer (addressing and error-detection bits) on every Ethernet frame, and the required interpacket gap between transmissions. 100BASE-TX 100BASE-TX is the predominant form of Fast Ethernet, and runs over two wire-pairs inside a category 5 or above cable. Each network segment can", "-25.942770220106468" ], [ "Ultra-160 and Ultra-320 devices may be freely mixed on the parallel LVD bus with no compromise in performance, as the host adapter will negotiate the operating speed and bus management requirements for each device. Single-ended and LVDS devices can be attached to the same bus, but all devices will run at a slower, single-ended speed.\nOn some host adapters, this problem is solved by using a SCSI bridge to electrically split the bus into an SE and an LVD half, so LVD devices can operate at full speed. Other adapters may provide multiple buses (channels).\nThe SPI-5 standard (which describes up", "-25.9299611505121" ], [ "to Ultra-640) deprecates single-ended devices, so some devices may not be electrically backward compatible. Mixing Wide and Narrow Both narrow and wide SCSI devices can be attached to the same parallel bus. All the narrow SCSI devices must be placed at one end and all the wide SCSI devices at the other end. The high half of the bus needs to be terminated in between because the high half of the bus ends with the last wide SCSI device. You can get a cable designed to connect the wide part of the bus to the narrow part which either", "-25.910860400937963" ], [ "High-Speed Serial Interface The High-Speed Serial Interface (HSSI) is a differential ECL serial interface standard developed by Cisco Systems and T3plus Networking primarily for use in WAN router connections. It is capable of speeds up to 52 Mbit/s with cables up to 50 feet (15 m) in length.\nWhile HSSI uses 50-pin connector physically similar to that used by SCSI-2, it requires a cable with an impedance of 110 Ω (as opposed to the 75 Ω of a SCSI-2 cable).\nThe physical layer of the standard is defined by EIA-613 and the electrical layer by EIA-612.\nIt is supported by the Linux kernel since version 3.4-rc2.", "-25.90531064575771" ], [ "features as sizable hidden system storage areas, password security locking, and programmable geometry translation.\nA further deviation between ISA and ATA is that while the ISA bus remained locked into a single standard clock rate (for backward hardware compatibility), the ATA interface offered many different speed modes, could select among them to match the maximum speed supported by the attached drives, and kept adding faster speeds with later versions of the ATA standard (up to 133 MB/s for ATA-6, the latest.) In most forms, ATA ran much faster than ISA, provided it was connected directly to a local bus faster than", "-25.892653244547546" ], [ "cabling than the other network topologies. Although this can be a major factor when deciding which enterprise-wide topology to use, the expense of it makes up for the efficiency it creates by adding increased performance and fault tolerance. Most organizations use parallel backbones when there are critical devices on the network. For example, if there is important data, such as payroll, that should be accessed at all times by multiple departments, then your organization should choose to implement a Parallel Backbone to make sure that the connectivity is never lost. Serial backbone A serial backbone is the simplest kind of", "-25.873025993583724" ], [ "PCI Express Architecture Conceptually, the PCI Express bus is a high-speed serial replacement of the older PCI/PCI-X bus. One of the key differences between the PCI Express bus and the older PCI is the bus topology; PCI uses a shared parallel bus architecture, in which the PCI host and all devices share a common set of address, data and control lines. In contrast, PCI Express is based on point-to-point topology, with separate serial links connecting every device to the root complex (host). Because of its shared bus topology, access to the older PCI bus is arbitrated (in the case", "-25.825266420142725" ], [ "four cable pairs for simultaneous transmission in both directions. For this reason, there are no dedicated transmit and receive pairs, and consequently, crossover cables are never required for 1000BASE-T communication. The physical medium attachment sublayer (PMA) provides identification of each pair and usually continues to work even over cables where the pairs are unusually swapped or crossed.", "-25.75217512785457" ], [ "Ethernet crossover cable Automatic crossover Introduced in 1998, this made the distinction between uplink and normal ports and manual selector switches on older hubs and switches obsolete. If one or both of two connected devices has the automatic MDI/MDI-X configuration feature, there is no need for crossover cables.\nAlthough Auto MDI-X was specified as an optional feature in the 1000BASE-T standard, in practice it is implemented widely on most interfaces.\nBesides the eventually agreed upon Automatic MDI/MDI-X, this feature may also be referred to by various vendor-specific terms including: Auto uplink and trade, Universal Cable Recognition and Auto Sensing. 1000BASE-T and faster", "-25.73102157562971" ], [ "Fast Ethernet In computer networking, Fast Ethernet physical layers carry traffic at the nominal rate of 100 Mbit/s. The prior Ethernet speed was 10 Mbit/s. Of the Fast Ethernet physical layers, 100BASE-TX is by far the most common.\nFast Ethernet was introduced in 1995 as the IEEE 802.3u standard and remained the fastest version of Ethernet for three years before the introduction of Gigabit Ethernet. The acronym GE/FE is sometimes used for devices supporting both standards. Nomenclature The \"100\" in the media type designation refers to the transmission speed of 100 Mbit/s, while the \"BASE\" refers to baseband signalling. The letter following the dash", "-25.721472716482822" ], [ "This is the case, for instance, with the VESA Local Bus which lacks the two least significant bits, limiting this bus to aligned 32-bit transfers.\nHistorically, there were also some examples of computers which were only able to address words. Implementation details Buses can be parallel buses, which carry data words in parallel on multiple wires, or serial buses, which carry data in bit-serial form. The addition of extra power and control connections, differential drivers, and data connections in each direction usually means that most serial buses have more conductors than the minimum of one used in 1-Wire and UNI/O. As", "-25.703703982430852" ], [ "gigabit speed isn't supported by any existing hardware. Higher speed standards, 2.5GBASE-T up to 40GBASE-T running at 2.5 to 40 Gbit/s, consequently define only full-duplex point-to-point links which are generally connected by network switches, and don't support the traditional shared-medium CSMA/CD operation.\nMany different modes of operations (10BASE-T half duplex, 10BASE-T full duplex, 100BASE-TX half duplex, ...) exist for Ethernet over twisted pair, and most network adapters are capable of different modes of operation. Autonegotiation is required in order to make a working 1000BASE-T connection.\nWhen two linked interfaces are set to different duplex modes, the effect of this duplex mismatch is a", "-25.68191466643475" ], [ "Hex-Bus The Texas Instruments Hex-Bus interface (sometimes used unhyphenated as Hex Bus and with varying capitalization) was designed in 1982 and intended for commercial release in late 1983. It connects the console to peripherals via a high-speed serial link. Though it was prototypical to today's USB (plug and play, hot-swappable, etc.), it was never released, with only a small number of prototypes appearing in the hands of collectors after TI pulled out of the market. \nSeveral Hex-Bus peripherals were planned or produced. A WaferTape drive never made it past the prototype stage due to reliability issues with the tapes.", "-25.62475755030755" ], [ "and jabbering on individual ports, and partition the port, disconnecting it from the shared medium. Thus, hub-based twisted-pair Ethernet is generally more robust than coaxial cable-based Ethernet (e.g. 10BASE2), where a misbehaving device can adversely affect the entire collision domain. Even if not partitioned automatically, a hub simplifies troubleshooting because hubs remove the need to troubleshoot faults on a long cable with multiple taps; status lights on the hub can indicate the possible problem source or, as a last resort, devices can be disconnected from a hub one at a time much more easily than from a coaxial cable.\nTo", "-25.54302685742732" ], [ "serial—such as coax cable plugged into a HD-SDI port, a webcam plugged into a USB port or Firewire port, Ethernet cable connecting an IP camera to a Power over Ethernet port, FPD-Link, etc.\nOther such cables and ports, transmitting data one bit at a time, include Serial ATA, Serial SCSI, Ethernet cable plugged into Ethernet ports, the Display Data Channel using previously reserved pins of the VGA connector or the DVI port or the HDMI port. Serial buses Many communication systems were generally designed to connect two integrated circuits on the same printed circuit board, connected by signal traces on that", "-25.54028776276391" ], [ "medium for their TRS-80 Model II, Model 12, Model 16, Tandy 6000, Tandy 2000, Tandy 1000 and Tandy 1200 computer models. There were also hooks in the Model 4P's ROM to boot from an ARCNET network.\nWhen Ethernet moved from co-axial cable to twisted pair and an \"interconnected stars\" cabling topology based on active hubs, it became much more attractive. Easier cabling, combined with the greater raw speed of Ethernet (10 Mbit/s, as compared with 2.5 Mbit/s for ARCnet) helped to increase Ethernet demand, and as more companies entered the market the price of Ethernet started to fall—and ARCNET (and", "-25.521125914499862" ], [ "practice of using a single system bus, because a single bus typically became a severe bottleneck as CPUs and memory speeds increased. Due to its dedicated nature, the back-side bus can be optimized for communication with cache, thus eliminating protocol overheads and additional signals that are required on a general-purpose bus. Furthermore, since a BSB operates over a shorter distance, it can typically operate at higher clock speeds, increasing the computer's overall performance.\nCache connected with a BSB was initially external to the microprocessor die, but now is usually on-die. In the latter case, the BSB clock frequency is typically", "-25.500461922492832" ], [ "replace the jumpers.\nHowever, these newer systems shared one quality with their earlier cousins, in that everyone on the bus had to talk at the same speed. While the CPU was now isolated and could increase speed, CPUs and memory continued to increase in speed much faster than the buses they talked to. The result was that the bus speeds were now very much slower than what a modern system needed, and the machines were left starved for data. A particularly common example of this problem was that video cards quickly outran even the newer bus systems like PCI, and computers", "-25.439428023877554" ], [ "switching is used for workgroup connectivity and network segmentation (breaking up collision domains). This allows a flatter network design with more network segments than traditional networks joined by repeater hubs and routers.\nLayer-2 switches have the same limitations as bridges. Bridges break up collision domains, but the network remains one large broadcast domain which can cause performance issues and limits the size of a network. Broadcast and multicasts, along with the slow convergence of spanning tree, can cause major problems as the network grows. Because of these problems, layer-2 switches cannot completely replace routers. Bridges are good if a network is", "-25.396435113507323" ], [ "ASCII, not in EBCDIC, and an asynchronous version of the same was also available, but both were limited to line speeds of no more than 2400 bit/s, the maximum dial-up rate of the day. Another serial controller called the Asynchronous Terminal Adapter (ATA), enable a character-oriented terminal to be interconnect, at a maximum speed of 300 bit/s.\nStrictly speaking it was not 10K, but 10,000 characters per partition as the System Ten’s memory consisted of 6-bit characters. It took 10 characters to make up one instruction, so each partition was only able to accommodate 1,000 instructions. The instruction set was extremely", "-25.3524404092459" ], [ "so a 9,600 bit/s asynchronous serial link will not transmit data at 9600/8 bytes per second (1200 byte/s) but actually, in this case 9600/10 bytes per second (960 byte/s), which is considerably slower than expected.\nIt can get worse. If parity is specified and we use 2 stop bits, the overhead for carrying one 8 bit character is 4 bits (one start bit, one parity bit and two stop bits) - or 50%! In this case a 9600 bit/s connection will carry 9600/12 byte/s (800 byte/s). Asynchronous serial interfaces commonly will support bit transmission speeds of up to", "-25.333632106980076" ], [ "implementing a complete graphics terminal.\nHaving experimented with an X Server on the VAXstation 2000, the team concluded that serial links would not be fast enough to support X Windows, and made the decision to equip the design with Ethernet as its primary communications system. Studying the system throughput as a whole, they estimated that the resulting system would not be terribly fast, but would be faster than an X Server running on the VAXstation 2000, which was considered barely usable. Some consideration was given to equipping it with both the TMS34010 to handle graphics and a 68000 for other tasks,", "-25.285779301386356" ], [ "amount of data so it's not possible to get more parallelism. The speed up is somewhat limited by the assumption we made of performing four parallel operations (please note this is common for both AltiVec and SSE). Parallel Stream paradigm (SIMD/MIMD) // This is a fictional language for demonstration purposes.elements = array streamElement([number, number])[100]kernel = instance streamKernel(\"@arg0[@iter]\")result = kernel.invoke(elements)\nIn this paradigm, the whole dataset is defined, rather than each component block being defined separately. Describing the set of data is assumed to be in the first two rows. After that, the result is inferred from the sources and kernel. For", "-25.27662202238571" ], [ "(CNT). They both offered 50 megabytes per second (MB/s) bandwidth between controllers but at that time, their architecture was not implemented using standard networking protocols and their applications were generally focused on supporting connectivity at high speed between large mainframes and peripherals, often only implementing only point-to-point connections. Ethernet was available in 1986 and was used by most computer centers for general networking purposes. Its bandwidth was not high enough to manage the high data rate required by the 100 MB/s supercomputer channels and 4 MB/s VMEbus channels on workstations.\nUltra's first customer, Apple Computer, purchased a system to connect their", "-25.257154984166846" ], [ "Serial communication Cables Many serial communication systems were originally designed to transfer data over relatively large distances through some sort of data cable.\nPractically all long-distance communication transmits data one bit at a time, rather than in parallel, because it reduces the cost of the cable. The cables that carry this data (other than \"the\" serial cable) and the computer ports they plug into are usually referred to with a more specific name, to reduce confusion.\nKeyboard and mouse cables and ports are almost invariably serial—such as PS/2 port, Apple Desktop Bus and USB.\nThe cables that carry digital video are almost invariably", "-25.25359491328709" ], [ "Ethernet over twisted pair Ethernet over twisted pair technologies use twisted-pair cables for the physical layer of an Ethernet computer network. They are a subset of all Ethernet physical layers.\nEarly Ethernet had used various grades of coaxial cable, but in 1984, StarLAN showed the potential of simple unshielded twisted pair. This led to the development of 10BASE-T and its successors 100BASE-TX, 1000BASE-T and 10GBASE-T, supporting speeds of 10, 100 Mbit/s and 1 and 10 Gbit/s respectively.\nAll these standards use 8P8C connectors, while the cables range from Cat 3 to Cat 8. Naming The common names for the standards derive from aspects of", "-25.244820194347994" ], [ "However, Ertl's most recent tests show that subroutine threading is faster than direct threading in 15 out of 25 test cases. Ertl's most recent tests show that direct threading is the fastest threading model on Xeon, Opteron, and Athlon processors; indirect threading is the fastest threading model on Pentium M processors; and subroutine threading is the fastest threading model on Pentium 4, Pentium III, and PPC processors.\nAs an example of call threading \"push A, push B, add\":\nthread:\n call pushA\n call pushB\n call add\n retpushA:\n *sp++ = A\n retpushB:\n *sp++ = B\n retadd:\n", "-25.239465536898933" ], [ "more time to establish a connection, and the routes are less optimized than a link-state router.\nTBRPF transmits only the differences between the previous network state and the current network state. Therefore, routing messages are smaller, and can therefore be sent more frequently. This means that nodes' routing tables are more up-to-date.\nTBRPF is controlled under a US patent filed in December 2000 and assigned to SRI International (Patent ID 6845091, issued January 18, 2005).", "-25.20247429734445" ], [ "known as the Ethernet way allows 2 repeaters on the single network and does not allow any hosts on the connection between repeaters.\nThe rules were created when 10BASE5, 10BASE2 and FOIRL were the only types of Ethernet network available. The rules only apply to shared-access 10 Mbit/s Ethernet segments connected by repeaters or repeater hubs (collisions domains) and FOIRL links. The rules do not apply to switched Ethernet because each port on a switch constitutes a separate collision domain. With mixed repeated and switched networks, the rule's scope ends at a switched port. Collision detection According to the original", "-25.179007928352803" ], [ "bus to serve both cost-sensitive applications where high throughput is not needed, and performance-critical applications such as 3D graphics, networking (10 Gigabit Ethernet or multiport Gigabit Ethernet), and enterprise storage (SAS or Fibre Channel). Slots and connectors are only defined for a subset of these widths, with link widths in between using the next larger physical slot size.\nAs a point of reference, a PCI-X (133 MHz 64-bit) device and a PCI Express 1.0 device using four lanes (×4) have roughly the same peak single-direction transfer rate of 1064 MB/s. The PCI Express bus has the potential to perform better than the PCI-X bus", "-25.147156278020702" ], [ "school.\nExperimental work reported in Caragea & Vishkin (2011) for the Maximum flow problem, and in two papers by Edwards & Vishkin (2012) for the Graph Connectivity (Connectivity (graph theory)), Graph Biconnectivity (biconnected graph) and Graph Triconnectivity (Triconnected component) problems demonstrated that for some of the most advanced algorithms in the parallel algorithmic literature, the XMT paradigm can offer 8 times to over 100 times greater speedups than for the same problems on state-of-the-art multi-core computers. Each reported speedup was obtained by comparing clock cycles on an XMT prototype relative to the fastest serial algorithm running on the fastest serial machines.\nXMT", "-25.115652965352638" ], [ "Futurebus Futurebus, or IEEE 896, is a computer bus standard, intended to replace all local bus connections in a computer, including the CPU, memory, plug-in cards and even, to some extent, LAN links between machines. The effort started in 1979 and didn't complete until 1987, and then immediately went into a redesign that lasted until 1994. By this point, implementation of a chip-set based on the standard lacked industry leadership. It has seen little real-world use, although custom implementations continue to be designed and used throughout industry. History In the late 1970s, VMEbus was faster than the parts plugged into", "-25.108600473962724" ], [ "on several processors, which work simultaneously. The difference between the different model lies mainly in the way of transmitting information between processors. Typically, in parallel computing the data transmission between processors is very fast, while, in distributed computing, the data transmission is done through a network and is therefore much slower.\nThe time needed for a computation on N processors is at least the quotient by N of the time needed by a single processor. In fact this theoretically optimal bound can never be reached, because some subtasks cannot be parallelized, and some processors may have to wait a result from", "-25.00475572195137" ], [ "single member's maximum bandwidth per communication partner. In extreme, one link is fully loaded while the others are completely idle. For this reason, an even load balancing and full utilization of all trunked links is almost never reached in real-life implementations. More advanced switches can employ an L4 hash (i.e. using TCP/UDP port numbers), which may increase the traffic variation across the links – depending on whether the ports vary – and bring the balance closer to an even distribution. Maximum throughput Multiple switches may be utilized to optimize for maximum throughput in a multiple network switch topology, when the", "-24.964371959445998" ], [ "up to 100 Gigabit Ethernet were standardized in 2010 and 2011.\nEthernet's dominance is partly attributed to the simple advantages for the industry of adopting a single standard to drive up volumes and drive down prices. In part, it is also due to ease of deployment, using its ability to self-configure based on the key concepts of \"learning bridge\" (flooding, and associating learned destination addresses with bridge ports) and \"spanning tree protocol\" (the protocol used for avoiding bridging loops).\nHistorically, competing protocols and cabling have been created in order to access higher speed devices than contemporary Ethernet-connected devices handled at an affordable", "-24.961554481531493" ], [ "more manual steps to move data between the host and the virtual environment. Parallels Desktop, which is designed to run transparently with the Mac OS X host, requires fewer steps to perform the same tasks. Therefore, Parallels Desktop was faster. Networking and file I/O tests Parallels Desktop occasionally displayed lag anomalies while VMware Fusion's virtual drive performance was very close to that of a physical drive. VMware Fusion preferred a bridged connection for reliable performance, and Parallels Desktop was consistent regardless of the type of virtual network adaptor used. Simultaneous use of VM and host OS Parallel Desktop 5 always", "-24.949855795828626" ], [ "parallelism on multiple core systems. This limits performance mostly for processor-bound threads, which require the processor, and not much for I/O-bound or network-bound ones.\nOther implementations of interpreted programming languages, such as Tcl using the Thread extension, avoid the GIL limit by using an Apartment model where data and code must be explicitly \"shared\" between threads. In Tcl each thread has one or more interpreters.\nEvent-driven programming hardware description languages such as Verilog have a different threading model that supports extremely large numbers of threads (for modeling hardware). Practical multithreading A standardized interface for thread implementation is POSIX Threads (Pthreads), which is", "-24.928710555424914" ], [ "Parallel SCSI History The first two formal SCSI standards, SCSI-1 and SCSI-2, included parallel SCSI as a central part of the protocol. The SCSI-3 standard then split the framework into separate layers so parallel SCSI is now just one of a number of available implementations. See the main SCSI article for a complete list. As with all types of SCSI bus, parallel SCSI communication takes place between an initiator and a target.\nThe original SCSI-1 version of the parallel bus was 8 bits wide (plus a ninth parity bit). The SCSI-2 standard allowed for faster operation (10 MHz)", "-24.917221593903378" ], [ "into two general categories: explicitly and implicitly parallel. Using parallel language constructs defined for process creation, communication and synchronization make an application explicitly parallel. Using a tool or parallelizing compiler to convert a serial program into a parallel one, makes it implicitly parallel. Both categories are equally bug-prone. Heisenbugs Concurrent applications should execute correctly on every possible thread schedule in the underlying operating system. However, traditional testing methods detect few bugs, chiefly because of the Heisenbugs problem. A Heisenbug is an error that changes or disappears when an attempt is made to isolate and probe them via debugger,", "-24.890219759552565" ], [ "and gave rise to the Fast SCSI and Wide SCSI variants. Fast SCSI doubled the maximum transfer rate to 10 MB/s and Wide SCSI doubled the bus width to 16 bits on top of that to reach a maximum transfer rate of 20 MB/s. However, these improvements came at the cost of reducing the maximum cable length to three meters. SCSI-2 also specified a 32-bit version of Wide SCSI, which used two 16-bit cables per bus. The 32-bit implementation was largely ignored because it was expensive and unnecessary, and was officially retired in SCSI-3. SCSI-3 Before Adaptec and later SCSITA", "-24.803134792568017" ], [ "hundredth of Ethernet's speed), the total bandwidth of that network was estimated at 1 Tbit/s (100,000 times greater than Ethernet).\nAlthough it was possible to use IP routing to connect multiple Ethernet networks together, it was expensive and relatively slow. Sincoskie started looking for alternatives that required less processing per packet. In the process he independently reinvented transparent bridging, the technique used in modern Ethernet switches. However, using switches to connect multiple Ethernet networks in a fault-tolerant fashion requires redundant paths through that network, which in turn requires a spanning tree configuration. This ensures that there is only one", "-24.78082239552168" ], [ "pF. This does not correspond to a fixed length of cable since varying cables have different characteristics. Empirically tested combinations of bit rate, serial ports, cable type, and lengths may provide reliable communications, but generally RS-232-compatible ports are intended to be connected by, at the most, a few tens of metres of cable. Other serial communications standards are better adapted to drive hundreds or thousands of metres of cable.", "-24.72882283141371" ], [ "core link speed reached 155 Mbit/s. At that time, several breakthroughs in fiber optic telecommunications (notably DWDM and EDFA) technologies combined to lower bandwidth costs that in turn drove a sudden dramatic increase in core link speeds: by 2000, a core link operated at 2.5 Gbit/s and core Internet companies were planning for 10 Gbit/s speeds.\nThe largest provider of core routers in the 1990s was Cisco Systems, who provided core routers as part of a broad product line. Juniper Networks entered the business in 1996, focusing primarily on core routers and addressing the need for a radical increase in", "-24.71311946088099" ], [ " One valid rule is that connectors for wide SCSI buses have more pins and wires than those for narrow SCSI buses. An Amphenol-50 or HD-50 connector is for narrow SCSI, while an Amphenol-68 or HD-68 connector is for wide SCSI. On some early devices, wide parallel SCSI buses used two or four connectors and cables while narrow SCSI buses used only one.\nThe first parallel SCSI connectors were the Amphenol type. They then evolved through two main stages, High-Density (HD) and most recently SCA - 80 pin.\nWith the HD connectors, a cable normally has male connectors while a", "-24.701412158974563" ], [ "execution, performing a sort of ad hoc time-slicing. Single threading In computer programming, single-threading is the processing of one command at a time. The opposite of single-threading is multithreading.\nIn the formal analysis of the variables' semantics and process state, the term single threading can be used differently to mean \"backtracking within a single thread\", which is common in the functional programming community. Scheduling Operating systems schedule threads either preemptively or cooperatively. On multi-user operating systems, preemptive multithreading is the more widely used approach for its finer grained control over execution time via context switching. However, preemptive scheduling may context switch", "-24.697979972115718" ], [ "was then developed for both cascade (2-port) and parallel networking using RS-232 and USB. Such cascade and parallel networks had its pros and cons, where links between the units had weaknesses in such way that it had limited cable length of 16 meters, while the RS-232 TTL version had the same limitation but with only 5 meters. With such limitations, the best solution was a cascade network where each device in the network was acting as a signal buffer, where data was received on port one and went out buffered on port two. The major drawback of such solution was", "-24.697352908784524" ], [ "Gigabit Ethernet interface, the network speed is significantly slower. Especially for older \"blue rings\" models (200 MHz ARM CPU and 32 MByte RAM), where it varies between 3–6 MByte/s, with an average of 4.5 MByte/s. The newer \"white lights\" MyBook World Edition 1 TB and 2 TB storage capacity models, WDH1NC and WDH2NC (oxnas810, 380 MHz ARM CPU and 128 MByte RAM), have drive speeds comparable to USB, at about 10 MB/s write and 25 MB/s read.\nThe \"white lights\" WDH1NC is Jumbo Frames capable and can achieve ~36 MByte/s reading and ~18 MByte/s writing speed over Gigabit Ethernet. Internals This drive runs BusyBox on Linux on an Oxford", "-24.674701226875186" ], [ "backbone network. Serial backbones consist of two or more internet working devices connected to each other by a single cable in a daisy-chain fashion. A daisy chain is a group of connectivity devices linked together in a serial fashion. Hubs are often connected in this way to extend a network. However, hubs are not the only device that can be connected in a serial backbone. Gateways, routers, switches and bridges more commonly form part of the backbone. The serial backbone topology could be used for enterprise-wide networks, though it is rarely implemented for that purpose.", "-24.66966946120374" ], [ "Serial Bus Protocol 2 Serial Bus Protocol 2 (SBP-2) standard is a transport protocol within Serial Bus, IEEE Std 1394-1995 (also known as FireWire or i.Link), developed by T10.\nOriginal work on Serial Bus Protocol started as an attempt to adapt SCSI to IEEE Std 1394-1995 serial interface. Later on it was recognized that SBP-2 may have more general use, and the work on the standard was targeted to provide generic framework for delivery of commands, data and status between Serial Bus peripherals.", "-24.66390481137205" ], [ "LapLink cable A Laplink Cable, also known as null-printer cable, allows the connection of two computers via the parallel port to establish a direct cable connection. \nThe cable was introduced in 1983 with the \"LapLink\" software package, from Traveling Software, to allow fast data transfer between the early PCs running \nMS-DOS, giving much faster transfer rates than the traditional null modem serial cable. At the time, almost all PCs had a parallel printer port, but neither USB nor modern Ethernet was available.\nThe INTERSVR program in MS-DOS 6.0 can also use a LapLink cable. Traveling Software Traveling Software is now", "-24.659832206380088" ], [ "cable to get an odd number. When using more complicated setups through multiple patch panels in structured cabling, the connection can use multiple patch and building cable segments. It is a good idea to have all necessary crossovers on one side, i.e. either on the central hub/switch or on each secondary hub/switch. Auto MDI-X To connect two ports of the same configuration (MDI to MDI or MDI-X to MDI-X) with a 10 or 100 Mbit/s connection (10BASE-T or 100BASE-TX), an Ethernet crossover cable is needed to cross over the transmit and receive signals in the cable, so that they are", "-24.63817504050394" ], [ "pass data through the repeater in a usable fashion from one segment to the next, the framing and data rate must be the same on each segment. This means that a repeater cannot connect an 802.3 segment (Ethernet) and an 802.5 segment (Token Ring) or a 10 Mbit/s segment to 100 Mbit/s Ethernet. Fast Ethernet classes 100 Mbit/s hubs and repeaters come in two different speed grades: Class I delay the signal for a maximum of 140 bit times (enabling translation/recoding between 100BASE-TX, 100BASE-FX and 100BASE-T4) and Class II hubs delay the signal for a maximum of 92 bit times (enabling installation", "-24.606720639858395" ], [ "redundant links by setting up one preferred link between switches in the LAN. This preferred link is used for all Ethernet frames unless it fails, in which case the non-preferred redundant link is enabled. When implemented in a network, STP designates one layer-2 switch as root bridge. On this root bridge the preferred and non-preferred links are calculated. The root bridge switch constantly communicates with the other switches in the LAN using Bridge Protocol Data Units (BPDUs).\nProvided there is more than one link between two switches, the STP root bridge calculates the cost of each path based on bandwidth. STP", "-24.603845353936777" ], [ "can easily switch between fixed and free, and rod and cable by swapping out common parts, though the hub shell will continue to show the designation for a given hub's original configuration. The T, TF, TB, TBF, TBFC, and TBC all had a 25% reduction below direct drive\nIn 1936, a close ratio 2 speed was introduced, this was called TC and offered a 13.46% reduction below direct drive.\nHubs manufactured in the 1930s have a date stamp given as a number at the end of the model designation, this can be seen on examples of all of the hubs mentioned in", "-24.59013495745603" ], [ "only run in half duplex mode. Consequently, due to a larger collision domain, packet collisions are more frequent in networks connected using hubs than in networks connected using more sophisticated devices. Connecting multiple hubs The need for hosts to be able to detect collisions limits the number of hubs and the total size of a network built using hubs (a network built using switches does not have these limitations). For 10 Mbit/s networks built using repeater hubs, the 5-4-3 rule must be followed: up to five segments (four hubs) are allowed between any two end stations. For 10BASE-T networks, up", "-24.581905674480367" ], [ "Explicit multi-threading Explicit Multi-Threading (XMT) is a computer science paradigm for building and programming parallel computers designed around the parallel random-access machine (PRAM) parallel computational model. A more direct explanation of XMT starts with the rudimentary abstraction that made serial computing simple: that any single instruction available for execution in a serial program executes immediately. A consequence of this abstraction is a step-by-step (inductive) explication of the instruction available next for execution. The rudimentary parallel abstraction behind XMT, dubbed Immediate Concurrent Execution (ICE) in Vishkin (2011), is that indefinitely many instructions available for concurrent execution execute immediately. A consequence", "-24.560559625853784" ], [ "in from 21 to 25). Series-parallel comprised two parallel circuits, each of three motors in series, whereas parallel is three parallel circuits of two motors in series. The removable reversing handle controlled the direction of travel and motor connection. Parallel was available only in the forward direction. Demise Their build quality and durability was such that 38 remained on the books in 1990. By April 1993 a number had been withdrawn and partially stripped with 31 in service or under repair. Following a decision by National Rail to use diesel locomotives on its services over the electrified network, the need", "-24.538127611391246" ], [ "Thread (computing) Single vs multiprocessor systems Systems with a single processor generally implement multithreading by time slicing: the central processing unit (CPU) switches between different software threads. This context switching generally happens very often and rapidly enough that users perceive the threads or tasks as running in parallel. On a multiprocessor or multi-core system, multiple threads can execute in parallel, with every processor or core executing a separate thread simultaneously; on a processor or core with hardware threads, separate software threads can also be executed concurrently by separate hardware threads. History Threads made an early appearance under the name of", "-24.534387295891065" ], [ "are widely used across many application domains including general-purpose computing.\nExplicit Multi-Threading (XMT) is a computing paradigm for building and programming multi-core computers with tens, hundreds or thousands of processor cores.\nExperimental work published in 2011 and 2012 demonstrates significantly greater speedups for advanced PRAM algorithms on XMT prototypes than for the same problems on state-of-the-art multi-core computers.\nWork published in 2018 shows that lock-step parallel programming (using ICE) can achieve the same performance as the fastest hand-tuned multi-threaded code on XMT systems. Such inductive lock-step approach stands in contrast to multi-threaded programming approaches of other many core systems that are known for", "-24.52894830936566" ], [ "Twinaxial cabling Twinaxial cabling, or \"Twinax\", is a type of cable similar to coaxial cable, but with two inner conductors instead of one. Due to cost efficiency it is becoming common in modern (2013) very-short-range high-speed differential signaling applications. IBM Historically, Twinax was the cable specified for the IBM 5250 terminals and printers, used with IBM's System/34, System/36, System/38, and IBM System i (formerly known as AS/400) midrange hosts, and with IBM Power Systems machines running IBM i. The data transmission is half-duplex, balanced transmission, at 1 Mbit/s, on a single shielded, 110 Ω twisted pair.\nWith Twinax seven devices can", "-24.504171131644398" ], [ "The SX-3 allows parallel computing using both SIMD and MIMD. It also switched from the ACOS-4 based SX-OS, to the AT&T System V UNIX-based SUPER-UX operating system. In 1992 an improved variant, the SX-3R, was announced. A SX-3/44 variant was the fastest computer in the world between 1992-1993 on the TOP500 list.\nThe SX-4 series was announced in 1994, and first shipped in 1995. Since the SX-4, SX series supercomputers are constructed in a doubly parallel manner. A number of central processing units (CPUs) are arranged into a parallel vector processing node. These nodes are then installed in a", "-24.48961491684895" ], [ "did not have enough buffering to handle full-speed reception. This problem is not as common with advances in bus speeds and memory sizes. A more likely scenario is network congestion within a switch. For example, a flow can come into a switch on a higher speed link than the one it goes out, or several flows can come in over two or more links that total more than an output link's bandwidth. These will eventually exhaust any amount of buffering in the switch. However, blocking the sending link will cause all flows over that link to be delayed, even those", "-24.489150339039043" ], [ "and mathematical models such as traces and Actor event diagrams, have also been developed to describe the behavior of concurrent systems. Bit-level parallelism From the advent of very-large-scale integration (VLSI) computer-chip fabrication technology in the 1970s until about 1986, speed-up in computer architecture was driven by doubling computer word size—the amount of information the processor can manipulate per cycle. Increasing the word size reduces the number of instructions the processor must execute to perform an operation on variables whose sizes are greater than the length of the word. For example, where an 8-bit processor must add two 16-bit integers, the", "-24.48338692742982" ], [ "quickly and reliably converge. Of course, the size of the network also plays an important role. A larger network will converge more slowly than a smaller one.\nRIP is a routing protocol that converges so slowly that even a network of a few routers can take a couple of minutes to converge. In case of a new route being advertised, triggered updates can speed up RIP's convergence but to flush a route that previously existed takes longer due to the holddown timers in use. OSPF is an example of a fast-converging routing protocol. A network of a few OSPF routers can", "-24.47417664830573" ], [ "this points straight down at the surface on which the computer rested. The gate array's connector points directly to the computer's rear, making the cable connection much easier and reliable.\nAn improvement was made in the computer's speed of execution. The original Model 4, though advertised as a 4 MHz machine, actually performs at an effective speed of approximately 3.5 MHz because Z80 wait states are inserted for bus transactions with the slower PAL support circuitry. The Gate Array CPU board allows the Tandy engineers to clock the Z80 at 4 MHz without wait states. These make some third-party hardware modifications, particularly speedup kits, troublesome", "-24.45451286167372" ], [ "Athlon 64 X2 Multithreading The primary benefit of dual-core processors (like the Athlon 64 X2) over single-core processors is their ability to process more software threads at the same time. The ability of processors to execute multiple threads simultaneously is called thread-level parallelism (TLP). By placing two cores on the same die, the X2 effectively doubles the TLP over a single-core Athlon 64 of the same speed. The need for TLP processing capability is dependent on the situation to a great degree, and certain situations benefit from it far more than others. Certain programs are currently written for only one", "-24.44248527001764" ], [ "equal to the processor's, and the back-side bus can also be made much wider (256-bit, 512-bit) than either off-chip or on-chip FSB.\nThe dual-bus architecture was used in a number of designs, including the IBM and Freescale (formerly the semiconductor division of Motorola) PowerPC processors (certain PowerPC 604 models, the PowerPC 7xx family, and the Freescale 7xxx line), as well as the Intel Pentium II processor, \nwhich used it to access their L2 cache (earlier Intel processors accessed the L2 cache over the FSB, while later processors moved it on-chip).", "-24.43749086128082" ], [ "Synchronous serial communication Synchronous serial communication describes a serial communication protocol in which \"data is sent in a continuous stream at constant rate.\" \nSynchronous communication requires that the clocks in the transmitting and receiving devices are synchronized – running at the same rate – so the receiver can sample the signal at the same time intervals used by the transmitter. No start or stop bits are required. For this reason \"synchronous communication permits more information to be passed over a circuit per unit time\" than asynchronous serial communication. Over time the transmitting and receiving clocks will", "-24.4341304662521" ], [ "moves display refresh data from main memory to the shift register, which serializes it into a display of pixels corresponding to the ones and zeros of the memory data. Ethernet is likewise supported by minimal hardware, with a shift register that acts bidirectionally to serialize output words and deserialize input words. Its speed was designed to be 3 Mbit/s because the microcode engine could not go faster and continue to support the video display, disk activity and memory refresh.\nUnlike most minicomputers of the era, Alto does not support a serial terminal for user interface. Apart from an Ethernet connection, the", "-24.415271695237607" ] ]
1ta8ok
If the President committed a murder in his bedroom and the secret service came and saw it would they legally be obligated to arrest him or still have to do whatever he says?
[ "The President is (theoretically) not above the law.", "The secret service is technically a law enforcement agency, and the president is technically a civilian. However, non-VIP murder is not under their jurisdiction, so they would be mostly powerless in a legal sense. In fact, protecting VIPs isn't even their full time job. It's investigating financial crimes; counterfeiting and embezzlement and the like. Most likely they would detain the president, and call the local police to take him *(EDIT: or her)* away.", "Little tip for throwaway accounts Mr. P, don't make them rhyme with any part of your real name. Good luck with whatever you have planned though, looks like you're clear.", "There's the theory that a sitting President is immune from prosecution by virtue of his position and allowing him to be prosecuted would unconstitutionally undermine the authority of the executive branch. The courts have made overtures to support this, but it's never been directly tested. Mainly it's an interesting question for law students and Reddit to talk about.", "They would not be legally obligated to arrest him, because members of the president's protective detail do not enforce criminal laws.", "Apparently all you need to do is use a drone and nobody gives a shit.", "Of course he'd be prosecuted, and impeached. But up the ante. If the Secret Service walked into a room where the president was committing a murder, would they intervene to prevent it, even if it meant shooting the president?", "Wasn't this premise of some terrible movie from the 90s? EDIT: [Found it]( URL_0 ). Actually, turns out [there were two]( URL_1 ) in the same year!", "He could just pardon himself and the secret service guys that help clean up the mess while sending the snitches to Guantanamo" ]
[ [ "sitting president cannot be indicted: \"I don't know how you can indict while he's in office. No matter what it is. ... If [President Trump] shot [then-FBI director] James Comey, he'd be impeached the next day. ... Impeach him, and then you can do whatever you want to do to him.\"\nIn June 2018, Giuliani also said that President Trump should not testify to the special counsel investigation because \"our recollection keeps changing\". In early July, Giuliani characterized that Trump had previously asked Comey to \"give [then-national security adviser Michael Flynn] a break\". In mid-August, Giuliani denied making this comment: \"What", "-30.664362380164675" ], [ "White House, which instead took him to the nearest police station, and then to the Washington Asylum. He answered all the officers' questions, except that he refused to specify what it was he wanted to talk to the president about, stating only \"I want to see the president, I must see him.\"\nThe New York Times reported that it was believed he intended to assassinate the president. The Day Book stated that Winter was believed to be mentally incompetent, though upon being booked into the asylum, he was regarded as \"harmless.\" On 14 April 1912, The New York Times stated that", "-30.5589805766067" ], [ "of the White House as they would a normal home. Threats to the president Baughman was interviewed by Time magazine and in an article dated April 20, 1953 he described the Secret Service's biggest fear as, \"escaped mental patients who bear grudges against the President or the Government.\" Baughman admitted that in 1952 the United States Secret Service handled 2,535 presidential protection cases. Of these cases, 74 resulted in arrests, and 72 of those were sent to prison or mental institutions. Organized crime In an interview with The Washington Post published on July 26, 1961, the day after his", "-29.884989001089707" ], [ "All the President's Men (film) Plot On June 17, 1972, security guard Frank Wills at the Watergate complex finds a door's bolt taped over so that it will not lock. He calls the police, who find and arrest five burglars in the Democratic National Committee headquarters within the complex. The next morning, The Washington Post assigns new reporter Bob Woodward to the local courthouse to cover the story, which is considered of minor importance.\nWoodward learns that the five men, four Cuban-Americans from Miami and James W. McCord, Jr., had electronic bugging equipment and are represented by a high-priced \"country club\"", "-29.62091171371867" ], [ "government and charged with Treason after he was accused of endangering the president's life after his motorcade allegedly refused to give way to the one transporting President Lungu, a case which many viewed as a minor traffic offense and not one that could amount to Treason. Hichilema strongly denied the charge, which carries a maximum sentence of death penalty Police misconduct during arrest The police used excessive force to enter Hichilema's residence damaging his home and property, beat up all his workers, stole colossal sums of money, jewelry, as well as underwear, shoes, speakers, blankets, carpets and food from the", "-29.44539283105405" ], [ "President's conduct\". The report \"does not conclude that the president committed a crime\", as investigators decided \"not to apply an approach that could potentially result in a judgment that the president committed crimes\". Investigators did not make a judgment about whether to charge Trump with a crime, for two main reasons: Firstly, the investigation abided by DOJ Office of Legal Counsel (OLC) opinion written in 2000 that a sitting president cannot be federally indicted, a stance taken from the start of the investigation. Secondly, investigators did not want to charge Trump because a federal criminal charge would hinder a sitting", "-29.36953740171157" ], [ "had confidence that [President Trump] clearly did not commit a crime.” Mueller did not say that, but rather said, \"If we had confidence that the president did not commit a crime, we would have said so.\" Personal life Banderas' husband, Andrew J. Sansone, a member of the board of directors of Habitat for Humanity and founding president of both Old Rock Media and Big Apple Channel, proposed marriage to her with a message in a bottle while they were clam digging on Long Island Sound. She announced their engagement during an episode of America's Election Headquarters on September 21, 2008.", "-29.337097513256595" ], [ "Justice Department on May 29, 2019, Mueller said \"the report is my testimony\" and indicated he would have nothing to say that wasn't already in the report. He commented, \"If we had had confidence that the president clearly did not commit a crime, we would have said so. We did not, however, make a determination as to whether the president did commit a crime\". \"The introduction to the volume two of our report explains that decision. It explains that under longstanding department policy, a present president cannot be charged with a federal crime while he is in office\". Also, \"it", "-29.26896279922221" ], [ "that a person seeking the presidency \"should not suggest violence in any way.\" General Michael Hayden, who is the former head of the CIA, stated that \"If someone else had said that outside the hall, he'd be in the back of a police wagon now with the Secret Service questioning him.\" Secret Service spokesperson Cathy Milhoan said in a statement that the U.S. Secret Service was aware of Trump's comments. The New York Times opinion writer Thomas Friedman condemned Trump's comment, saying \"And that, ladies and gentlemen, is how Israeli Prime Minister Yitzhak Rabin got assassinated.\"\nPolitifact noted that some people", "-29.147205034969375" ], [ "decided it would expand secret and warrantless surveillance, it was Holder who justified it. When the president wanted the authority to kill any American he deemed a threat without charge or trial, it was Holder who went public to announce the \"kill list\" policy. Last week, the Justice Department confirmed that it was Holder who personally approved the equally abusive search of Fox News correspondent James Rosen's e-mail and phone records in another story involving leaked classified information. In the 2010 application for a secret warrant, the Obama administration named Rosen as \"an aider and abettor and/or co-conspirator\" to", "-29.05874366693024" ], [ "stated that FBI and U.S. occupation police had coached them for over two months about what they were to say on the stand, and had been threatened with treason trials themselves if they didn't cooperate. This was followed up by a Morley Safer report on the television news program 60 Minutes.\nU.S. President Gerald Ford granted a full and unconditional pardon to Iva Toguri D'Aquino in 1977 based on these and earlier issues with the indictment, trial, and conviction,—on January 19, his last full day in office. The decision was supported by a unanimous vote in both houses of the", "-29.034033030678984" ], [ "was so excited at having arrested the man who had shot Garfield that he neglected to take his gun from him until after they arrived at the police station. Kearney demanded, \"In God's name, what did you shoot the president for?\" Guiteau did not respond. The rapidly gathering crowd screamed, \"Lynch him\", but Kearney and several other police officers took the assassin to the police station a few blocks away. As he surrendered to authorities, Guiteau uttered the exulting words, repeated everywhere: \"I am a Stalwart of the Stalwarts! I did it, and I want to be arrested! Arthur is", "-28.888544691260904" ], [ "to assassinate the President by a rogue private military company and must race against time to clear his name while uncovering the real threat.", "-28.71555186191108" ], [ "All the President's Men simply did not sound to me like a career FBI man.\nGarment said the information leaked to Woodward was inside White House information to which Felt would not have had access. \"Felt did not fit.\" (Once the secret was revealed, it was noted Felt did have access to such information because the Bureau's agents were interviewing high-ranking White House officials.)\nIn 2002 the San Francisco Chronicle profiled Felt. Noting his denial in The FBI Pyramid, the paper wrote:\nCuriously, his son—American Airlines pilot Mark Felt—now says that shouldn't be read as a definitive denial, and that he plans to", "-28.614193974761292" ], [ "John Hosmer (Bolden's lawyer), Mark Lane (author of Rush to Judgment), and Richard V. Burnes (assistant to Jim Garrison) held a news conference in which they stated they had received information from Bolden that the Secret Service was aware of a prior assassination attempt on Kennedy in Chicago. According to the attorneys, the Secret Service had been informed that an attempt on the President's life would be made in Chicago which resulted in the cancellation of his visit due to safety concerns. They stated that Bolden said he and other agents had shadowed a suspect due to the report.\nOn March", "-28.592504882719368" ], [ "to establish probable cause for Mr. Gray's arrest, as no crime had been committed\", and charged officers with false imprisonment, because Gray was carrying a pocket knife of legal size, and not the switchblade police claimed he had possessed at the time of his arrest. All six officers were taken into custody and processed at Baltimore Central Booking and Intake Center.\nThree of the officers faced manslaughter charges and one faced an additional count of second degree depraved-heart murder. The murder charge carries a possible penalty of 30 years in prison; the manslaughter and assault offenses carry a maximum penalty of", "-28.55642642150633" ], [ "the time of the arrest, they both were carrying a revolver. According to reports by other terrorists, they were placed in patrol cars and were beaten by the officers guarding them. While being handcuffed behind their backs, they were taken separately at an undetermined site, where they were punched and kicked, in addition to receiving death threats. A handcuffed Sarasola was thrown down a hillside before having a gun aimed at his head. The Ministry of Interior denied the claims of torture and attributed the injuries to the moment the terrorists resisted arrest and attempted to escape. On the following", "-28.504727733205073" ], [ "a grand jury and insisted that the officers had been scared by his cellular phone. No weapons or shell casings (besides those of the officers) were found in the vehicle or near the scene.\nIn February 1999, he was arrested for driving without a license and for being a convicted felon wearing a bulletproof vest. At the time, it was illegal for felons to own body armor. Back in New York weeks later, he was arrested for drug possession of crack cocaine and for traffic offenses. With multiple cases in the past and present, he was arrested with marijuana and 20", "-28.50289633893408" ], [ "with possible obstruction of justice by Trump. The report did not exonerate him of obstruction, saying investigators were not confident of his innocence after examining his intent and actions. Investigators decided they could not \"apply an approach that could potentially result in a judgment that the President committed crimes\", as they could not indict a sitting president per an Office of Legal Counsel (OLC) opinion, and would not accuse him of a crime when he cannot clear his name in court. The report concluded that Congress, having the authority to take action against a president for wrongdoing, \"may apply the", "-28.298976020305417" ], [ "and president of the student body at the Episcopal Theological School in Cambridge, Massachusetts, was arrested in Washington, D.C., for soliciting prostitution from a male undercover police officer in Lafayette Square, just north of and adjacent to the White House property. It was his first offense, which police normally handled quietly as a matter for the offender's family to address, but the arrest became known to Senate Republicans. According to Drew Pearson's Washington Merry-Go-Round column published after Hunt's death, Senators Styles Bridges and Herman Welker threatened that if Hunt did not immediately retire from the Senate and agree not", "-28.285551306325942" ], [ "when John Wilkes Booth shot the President. Parker was charged with neglect of duty and tried on May 3, 1865, but no transcripts of the case were kept. The complaint was dismissed on June 2, 1865. Despite leaving his post the night Lincoln was shot, Parker was still assigned to work security at the White House. Before Mary Todd Lincoln moved out of the White House following her husband's death, Parker was assigned as her bodyguard. Mrs. Lincoln's dressmaker Elizabeth Keckley overheard Mrs. Lincoln yell to Parker, \"So you are on guard tonight, on guard in the White House after", "-28.27143993585196" ], [ "National Security Bureau (NSB) chief Tsai Chao-ming (蔡朝明), former deputy chief of the NSB special service center Chiu Chung-nan (邱忠男). The Control Yuan said in an impeachment report that the National Security Bureau had received information on 18 March 2004 about a possible attack on the president, but did not take the report seriously.\nIn 2004, former US State Department Deputy Assistant Secretary Donald W. Keyser has been arrested by the FBI for illegally handing over documents to two Taiwanese NSB officials who served as intelligence liaison officers in USA. Immediately, the director general of NSB, General Hsueh Shih-ming, had recalled", "-28.257299985125428" ], [ "a weapon in his hands, and was not wearing clothing that could conceal a significant amount of explosives; the possibility of accidentally hitting civilians beyond the fence was also cited. A senior official stated: \"A lot of people want to judge the Secret Service for not shooting, but [a] number of things have to be considered in this situation, including whether or not the principal is in the residence\" adding, \"given what's emerged about [Gonzalez's mental health] since the arrest, maybe we'll look back and say the Secret Service played a role in saving his life.\"\nThe Secret Service initially reported", "-28.18561548885191" ], [ "to a tape delay in viewing surveillance footage, officers believed that Cruz was still in the building. As of early March, there were three investigations into the timeline of police response.\nU.S. president Donald Trump criticized the officers who failed to enter the building during the shooting. On February 26, he said that he believed he would have entered \"even if I didn't have a weapon, and I think most of the people in this room would have done that, too.\" His statement was mocked by some late night show hosts, who noted that Trump had avoided the draft. Some survivors", "-28.118350144388387" ], [ "was me that did it.\"\nHe was immediately arrested and charged with treason for attempting to assassinate the sovereign. When he was taken into custody at the police station he asked if the Queen was hurt; he was informed she was unharmed. When he was asked if the pistols had been loaded, he said they were. After his arrest, his lodgings were searched and a locked box was found containing a sword and scabbard, two pistol-bags, powder, a bullet-mould, five lead balls, some of the percussion caps bought from Gray, and the intricate rules and proceedings of an imaginary military society", "-28.092483152868226" ], [ "soon as he wakes up. There is no public opinion, there is a committee of public opinion coordinating the wishes of the crowd. Raise not your voice, or else a will spy betray you, a plain clothes man will arrest you, a gendarme or a butcher will beat you up savagely, and occasionally, in the Police cellars, your head will be crushed or put up against the wall. It is as if we were living under the terror of the GPU in Lubyanka. […] Constitutional guarantees have disappeared. We know a man can be arrested, killed. Individual security is a", "-28.035945678129792" ], [ "days in prison after pleading guilty to possession of an unregistered firearm and unregistered ammunition charges. The judge in the case did not accept the plea bargain that had been arranged with the prosecution for a sentence of time served.\n\"There's no good reason for a person who's not working in law enforcement or presidential protection to be in possession of a loaded weapon within blocks of the White House, let alone to fire it into the air,\" Iscoe said.\nBaxter was later charged with shipping four guns via FedEx in July 2006 without notifying them that the shipment contained firearms.", "-27.992080039926805" ], [ "The dismissals followed a court ruling that kept prosecutors from using, as evidence, secret FBI recordings made without a search warrant. According to Assistant District Attorney Dway McConnell, the state charges cannot be refiled. \nCox continued to face the federal weapons charges. In November 2011, additional federal charges were brought against him. The new charges related to the alleged purchase of hand grenades and silencers, and alleged possession of a loaded grenade launcher.\nOn January 20, 2012, Cox and two co-defendants were charged in the same case with conspiracy to kill officers and employees of the United States, including law enforcement", "-27.983711945358664" ], [ "that was being investigated. During this conversation, the suspect implicated himself in the murder that the undercover agent was investigating.\nThe Supreme Court came to this conclusion despite the government's admission that a custodial interrogation had been conducted by a government agent. Report of warnings being given to detainees in Afghanistan Beginning in 2009, some detainees captured in Afghanistan have been read their Miranda rights by the FBI, according to Congressman Michael Rogers of Michigan, who claims to have witnessed this himself. According to the Justice Department, \"There has been no policy change nor blanket instruction for FBI agents to Mirandize", "-27.97781172764371" ], [ "ready perjury indictments against John Mitchell and Egil Krogh; Krogh would be indicted October 11. While most of this activity went unreported, people tapped into the network of defense attorneys and grand jury witnesses (including the White House) knew that the noose was being tightened around the president. One reporter told James Doyle that a \"middle-level White House guy told him on September 28: \"Over here they talk about how to get Cox all the time.\"\nIt was the Krogh indictment that forced Richardson to have another meeting with Cox on October 12. The break-in of Daniel Ellsberg's psychiatrist's office was", "-27.937358640134335" ], [ "54 (3) and 65 (3) of the constitution, the President may not be held liable for any alleged criminal acts while executing the duties of office. Such prosecution may not occur either while the president is in office or at any time thereafter. Furthermore, Art 65 (1) prevents trial or detention for prosecution of a criminal offense or tort while in office. The only sort of prosecution allowed for a sitting President is that of high treason, which can only be carried out by the Senate, and can only result in removal from office and a ban on regaining the", "-27.92260856507346" ], [ "President Andrew Johnson and Secretary of State William H. Seward and thereby throw the government into electoral chaos. The prosecution did not reveal the existence of a diary taken from Booth's body, which made clear that the assassination plan dated from 14 April. The defense surprisingly did not call for Booth's diary to be produced in court.\nOn June 29, 1865, the eight were found guilty for their involvement in the conspiracy to kill the President. Spangler was sentenced to six years in prison; Arnold, O'Laughlen and Mudd were sentenced to life in prison, and Atzerodt, Herold, Paine and Surratt were", "-27.914747596427333" ], [ "to the White House Monica Goodling, aide to the president Karl Rove and his senior aide Sara Taylor. In addition, legal counsel to the president Harriet Miers and deputy chief of staff to the president Joshua Bolten were both found in contempt of Congress.\nIn 2010, the Justice Department investigator concluded that though political considerations did play a part in as many as four of the attorney firings, the firings were \"inappropriately political\", but not criminal. According to the prosecutors, there was insufficient evidence to pursue prosecution for any criminal offense. Purge of the Central Intelligence Agency Following the resignation of", "-27.897819048375823" ], [ "Later in 1949, as part of the Reorganization Plan, the Council was placed in the Executive Office of the President.\nThe High Value Detainee Interrogation Group also reports to the NSC. Kill authorizations A secret National Security Council panel pursues the killing of an individual, including American citizens, who has been called a suspected terrorist. In this case, no public record of this decision or any operation to kill the suspect will be made available. The panel's actions are justified by \"two principal legal theories\": They \"were permitted by Congress when it authorized the use of military forces against militants in", "-27.86891636287328" ], [ "his parliamentary immunity. Later, as he became state president in August 2007, he could not be brought before the court as, according to the Constitution, presidents may not be tried for any allegations other than treason. The re-opened case in 2008 referred to him as a \"suspect\". He expressed his willingness to appear before the court. However, the case remained for him frozen until the end of his presidency term in August 2014.\nThe criminal court in Ankara decreed that Gül testifies for charges of falsifying official documents as the crime was committed before his presidency. Judicial experts are of the", "-27.84757360140793" ], [ "meeting on the prison barge. The men were asked to sign statements summarizing the interrogation, but the officer's version rarely matched the enlisted man's recollection of the interview. Some men, upon seeing that the written statements did not reflect what they had said, refused to sign. Others felt they had no choice but to sign‍—‌they were being ordered to do so by an officer. Several men refused to give any statement at all. Others spoke freely, thinking that the officer was their defense counsel.\nAfter all the interviews concluded, the group of 208 men were convicted in summary courts-martial of disobeying", "-27.84302183811087" ], [ "murder led to deaths within his own group and forced his own son to put down his mother\". Los Angeles Times columnist Laura Hudson considered the identity of the mysterious figure breaking open the lock on the prison gates to be \"not that much of a \"mystery\" if you consider how many black guys there are running around outside the prison with vendettas against Rick (note: one)\". Ted Pigeon of Slant Magazine described the episode's opening sequence: \"With its dreamlike, foggy setting and a conspicuously waist-down perspective of the saboteur, a peculiar sense of disconnect underlines the implications of what's", "-27.8362450277491" ], [ "Carolina), while casting his vote to impeach Nixon on the House Judiciary Committee, said, \"If there is no accountability, another president will feel free to do as he chooses. But the next time there may be no watchman in the night.\"", "-27.80649003322469" ], [ "head and face. In response to the report, Federal Bureau of Prisons spokeswoman Denise Simmons said, \"We have no knowledge or information to confirm he was assaulted.\" Murder plot On November 16, 2011, James Lukinoff, an inmate at FCI Butner, was indicted for planning to assault and kill an FBI agent involved in investigating the crime for which he was sent to prison. The indictment alleged that from February 2009 to April 2011, Lukinoff developed and pursued a plan to purchase a silencer and have a friend or family member store it until his release from prison. Once released, Lukinoff", "-27.770815072581172" ], [ "arrested on criminal menacing charges when he allegedly threatened a person with a gun.", "-27.751304853183683" ], [ "Park, Virginia, Vince Foster, a deputy White House Counsel during Clinton's first presidential term, was found with a gunshot to the head, a day after contacting his doctor to get treatment for depression. Several official investigations concluded unequivocally that the death was a suicide. However, as he was a law partner and friend of Hillary Rodham Clinton, it was alleged by a number of anti-Clinton conspiracy theorists that his knowledge of the Clintons' financial affairs (which the Whitewater theorists claimed would reveal their illegal dealings) had led them to have him killed. Former conservative journalist David Brock recalled being summoned", "-27.748416075497516" ], [ "pain.\nWhile the President is on a rural fishing trip, armed drones attack his protection detail, with only Banning surviving and saving the President; both are incapacitated, with Trumbull in a coma. FBI Agent Helen Thompson (Jada Pinkett Smith) finds substantial evidence that Banning may be responsible for the attack, with the van used to carry out the attack containing Banning's hair and DNA. Banning is subsequently arrested.\nEn route to a detention facility, Banning and his transport are ambushed. He escapes after killing the assailants, revealed to be agents who took part in his training exercise; Banning realizes that Jennings has", "-27.744616647949442" ], [ "attorney, Captain William Doster, stated to the court that he intended \"to show that George Atzerodt was a constitutional coward; that if he had been assigned the duty of assassinating the Vice President, he could never have done it; and that, from his known cowardice, Booth probably did not assign to him any such duty.\" However, that was to no avail.\nAfter the conviction Atzerodt offered a confession to Reverend Butler, a minister who came to his cell to offer him comfort. Butler said that Atzerodt admitted going to the meeting in March to help plan the kidnapping of Lincoln while", "-27.687621731078252" ], [ "out of jail sentences. However, his associates send him a message that his departure will not be allowed. He lets them know that he has all of their secrets in a safe-deposit box, along with instructions for the bank to forward the contents to the District Attorney in the event of his unnatural death. They call his bluff and he is shot while leaving his office to attend Celia's wedding. On the way to the hospital, he tells his faithful secretary that the criminals were wrong to call his bluff and that the information will be on the way to", "-27.65929948358098" ], [ "Secret Service to dismantle the Oval Office and cabinet room's secret taping systems. He scheduled a meeting with CIA director John McCone and asked if the CIA had any involvement in his brother's death. McCone denied it, with Kennedy later telling investigator Walter Sheridan that he asked the director \"in a way that he couldn't lie to me, and they [the CIA] hadn't\".\nAn hour after the president was shot, Bobby Kennedy received a phone call from Vice President Johnson before Johnson boarded Air Force One. RFK remembered their conversation starting with Johnson demonstrating sympathy before the vice president stated his", "-27.632408314035274" ], [ "a written request from the CIA not to interview them, which would have to state in greater detail the reasons for not interviewing these individuals. Once the decision was made, Gray called Vernon Walters and demanded that written request the next morning, or he would order the interviews to go forth.\nThe next morning, Vernon Walters arrived and delivered a three-page memorandum, marked \"SECRET\", that did not ask the FBI to hold off on the interviews. The meeting concluded with Walters suggesting to Gray that he should warn the President that some members of the White House staff were hindering the", "-27.61666074639652" ], [ "duties as vice president by money for his son simply has no credibility to me. I know him as a man of integrity and dedication to our country.\" Secrecy of transcripts The first whistleblower's report said that \"senior White House officials had intervened to 'lock down' all records of the phone call,\" an act that indicated those officials \"understood the gravity of what had transpired\". They performed the \"lock down\" by placing the record of the call on a top-secret server intended for the most highly classified material, under the direction of John Eisenberg. It was later confirmed that on", "-27.615882395533845" ], [ "police officers arrest him.\nDeputy Fields is the second deputy to the scene of a murder, but Detectives Baker and Hall dismiss her observations. Mr. Greenspan says a black man murdered his wife in a botched robbery, and the detectives pressure Woods to confess after they trace his stolen pistol to the murder. Woods defiantly proclaims his innocence, frustrating his lawyer, James Locket, who advises him to show less attitude in court. At the same time, community activist Reverend Banks raises awareness of the death of a black prisoner whom he believes to have been murdered by the police while in", "-27.599087523616618" ], [ "the United States. In his 1991 memoir, Washington Post journalist Carl Rowan asserted that the FBI had sent at least one anonymous letter to King encouraging him to commit suicide. Historian Taylor Branch documents an anonymous November 1964 \"suicide package\" sent by the Bureau that combined a letter to the civil rights leader telling him \"You are done. There is only one way out for you...\" with audio recordings of King's sexual indiscretions.\nIn March 1971, the residential office of an FBI agent in Media, Pennsylvania was burgled by a group calling itself the Citizens' Commission to Investigate the FBI. Numerous", "-27.563349205025588" ], [ "four people were killed and four were wounded. A bag containing a handwritten identification card with his name was found. In July 2017, he had been arrested in Washington D.C. after confronting an officer at the security barrier outside the White House, saying he needed to talk to the president and that \"he was a sovereign citizen and has a right to inspect the grounds\". According to Mark Pitcavage, it is unlikely that he was a \"legit sovereign citizen\", considering factors like that he did not self-represent himself in court and did not write his name and address", "-27.5435498614097" ], [ "Air Force Sergeant who had killed her sleeping husband with an ax in England on 9 March 1953, from Alderson on a $1,000 bond. This in turn was based on a recent ruling by the United States Supreme Court on 7 November 1955 in the case of Robert W. Toth, a former Air Force Sergeant who had been tried by a court martial for a murder in Korea five months before he had been honorably discharged from the Air Force. The Supreme Court had ruled the military had no jurisdiction to try someone once they had been discharged from military", "-27.52530287166155" ], [ "white man in a murder of a black man, he was risking his life...I tried to encourage him to tell the truth, but you know, it was like saying, 'Why don't you volunteer to be killed?'\"\nLearning that a federal jury was to consider charges against Hurst, Allen talked to the FBI and the United States Commission on Civil Rights in Jackson, asking for protection if he testified. An FBI memo reported that Allen \"expressed fear that he might be killed\", but the Justice Department said it could not give him protection. Allen chose to repeat the official version of events", "-27.51397790387273" ], [ "arrested for the assassination of President Kennedy. Assassination of Kennedy Marina learned of the assassination of President Kennedy from the media coverage of the event, and later, of the arrest of her husband. That afternoon, Dallas Police Department detectives arrived at the Paine household, and when asked if Lee owned a rifle, she gestured to the garage, where Oswald stored his rifle rolled up in a blanket; no rifle was found. She was subsequently questioned both at the Paine household and later at Dallas Police Department headquarters, in reference to her husband's involvement in the assassination of the President and", "-27.49340747160022" ], [ "pleading with the president, but inadvertently reveals her husband's plan. Afraid for his safety, she consents to do whatever the president wishes, as long as he does nothing to endanger her husband. Just as he is about to take advantage of her offer, he is murdered by a native musician (Kamiyama Sojin) who has been hiding in the room.\nHélène is immediately suspected of the murder, and the musician comes out of hiding and accuses her of the crime. Victor is placed in charge of the investigation and discovers that the musician is lying, and that he is the murderer.\nTired of", "-27.480356589658186" ], [ "was his wife calling trying to reach him, implying he thought he had been caught in tryst with someone other than his wife.\nAs the stress has momentarily passed this leads the assistant to Head of Security, Robert Davenport,\nto fortuitously presenting him with a letter found in his desk in-box he would not have received until the next morning. The letter explains that a series of murders will take place on Flight 502 before it lands. Robert Davenport notifies Captain Larkin, via the airline's direct radio channel. Donaldson and his team go over the backgrounds of all the passengers to find", "-27.453020115965046" ], [ "to personally deliver to FBI headquarters the letter telling FBI director James Comey that he was being dismissed \"effective immediately\"; Comey was not present at the time, learning of his firing from television reports while in Los Angeles.\nThe following week, Schiller unintentionally exposed Secretary of Defense James Mattis' cell phone number when a photograph of Schiller carrying papers with the handwritten number on a sticky note was published in The Washington Post.\nOn September 1, 2017, it was reported by CNN that Schiller intended to leave his White House position in late September or early October due to financial considerations. Although", "-27.44578570232261" ], [ "reaching the president. Enraged, and in order to set a precedent, Estrada Cabrera ordered the shooting death of all Vega's Military Academy unit, except two, Rogelio Girón and Manuel Hurtarte, who were taken prisoners without any legal document. Vega had died on the spot where he tried to attack the president, killed instantly by his bodyguards. The president also ordered the Military Academy to be closed, its building demolished and that salt would be spread on the field. Several military officers were sent to prison, including some loyal to the president.\nConditions in the Penitentiary were cruel and foul. ", "-27.440218530711718" ], [ "police and his defence that he had said that he had a giant tapeworm inside him, which affected his life. The court ordered that he be detained \"at the pleasure of the State President\", which meant that only the State President (later President) had the authority to order his release. He was never discharged. However the diagnosis of mental illness has since been dismissed by several forensic psychiatrists. Those who examined Tsafendas during the trial based their diagnoses entirely on what Tsafendas told them and had no access to any other information about him; neither his medical or criminal record,", "-27.438186494167894" ], [ "July 24, 2019, answering questions asked by Representatives. Democrat Ted Lieu asked Mueller whether the reason he did not indict Trump was that Department of Justice policy prohibits the indictment of sitting presidents. Mueller originally confirmed that this was the reason. However, later that day, Mueller corrected his comments, stating that his team did not determine whether Trump committed a crime. Additionally, Mueller answered Republican Ken Buck that a president could be charged with obstruction of justice (or other crimes) after the president left office.\nMueller testified that Trump's written responses to questions from investigators were \"generally\" untruthful and incomplete.\nStephan Roh,", "-27.420541841129307" ], [ "a \"beautiful girl\" with a serious demeanor, who never exhibited any signs of nervousness. FBI negotiators were able to free the passengers and induce her to surrender with no injuries or deaths. The bomb that was strapped to her chest later emerged to be a set of railroad flares wired to what appeared to be a doorbell. Robin Oswald was charged as a juvenile with charges not being announced as is the law in Illinois.", "-27.405394758854527" ], [ "police action to arrest them. However, there was speculation that his murder occurred in a context of trade in arms and drug-smuggling by leading politicians such as Vice President Christon Tembo and former Minister of Defence Benjamin Mwila.", "-27.400875035265926" ], [ "announced that no criminal charges would be filed in the case. After interviewing investigators and attorneys representing both the White House Boys and an administrator, and after reviewing the Department of Law Enforcement's report, Hess concluded that he would be unable to prove or disprove criminal wrongdoing in the case in a court of law. Department of Justice, 2011 In its December 2011 report of its investigation at the Dozier School, the Civil Rights Division of the United States Department of Justice made the following findings about staff at the school, who were cited for use of excessive force,", "-27.398703382761596" ], [ "already assembled along with some faint messages found in Jackson's cell. After the incident occurred prison officials found messages in Jackson's cell that read \"Take the bullets out of the bag\" \"Hurry and give me the piece in the bag. Keep the bullets\". \nJackson was strip searched in San Quentin's Adjustment Center, then escorted to the visiting room. He sat across from Bingham at a wooden table that had no barriers between the two and was intermittently observed by guards. Officials speculated that during this time Bingham passed the gun to Jackson, who concealed it in his hair under a", "-27.39783020899631" ], [ "forced. She got out of bed to check and on opening the bedroom door, she saw a Cakrabirawa (presidential bodyguard) soldier with a gun ready to shoot. She slammed the door shut and yelled a warning to her husband. Nasution wanted to take a look himself and when he opened the door, the soldier shot at him. He flung himself to the floor and his wife slammed and locked the door. The men on the other side began to smash the door down and fired a volley of shots into the bedroom. Mrs. Nasution pushed her husband out through another", "-27.376132394885644" ], [ "me yet. The first thing I heard about it was when the newspaper reporters in the hall asked me that question.\" As he was led from the room the question was called out, \"What did you do in Russia?\" and, \"How did you hurt your eye?\"; Oswald answered, \"A policeman hit me.\" Police interrogation Oswald was interrogated several times during his two days at Dallas Police Headquarters. He admitted that he went to his rooming house after leaving the book depository. He also admitted that he changed his clothes and armed himself with a .38 revolver before leaving his house", "-27.370750292146113" ], [ "sworn-in for his second term) Latta gained access to the White House by following the 33 members of the Marine Band past security. While carrying an overnight bag, he was able to wander around the Executive Residence for 14 minutes, but was eventually discovered near the Blue Room and was apprehended by Secret Service agents, who noticed that he had neither a uniform nor an instrument. Latta reportedly did not know he was doing anything illegal, and was quoted as saying \"I thought if I wasn't supposed to be there, somebody would stop me\" and that \"I just wanted to", "-27.368317000888055" ], [ "three interviews with FBI agents beginning in March 2007, but in early July 2007, in an unannounced early morning raid, a dozen agents armed with rifles appeared at his house, one of whom entered the bathroom and pointed his gun at Binney, who was taking a shower. The FBI confiscated a desktop computer, disks, and personal and business records. The NSA revoked his security clearance, forcing him to close a business he ran with former colleagues at a loss of a reported $300,000 in annual income. The FBI raided the homes of Wiebe and Loomis, as well as House Intelligence", "-27.352923999889754" ], [ "home while wearing the concealed recording device to capture his statements on tape as well. Eventually, five men were arrested and charged with the murder. Police were praised for their quick response in capturing all suspects involved. In total, 22 days had elapsed from the time of the murder to the time all suspects were taken into custody. Perpetrators The five men charged, who later all pleaded guilty or were convicted of the murder, had over fifty prior convictions for offences including armed robbery, assault, larceny, car theft, breaking and entering, drug use, escaping lawful custody, receiving stolen goods and", "-27.34552098857239" ], [ "over the July trial, and against the president of the regional court. On 29 December 2009, the public prosecutor's office in Dresden announced that all investigations had been closed on 21 December 2009 without indictment, as no suspicion of a criminal offence could be substantiated. Prosecutors argued that it must have been particularly difficult to assess the situation for the intervening police officer, because when he entered the room \"Elwy Okaz and Alex Wiens were both covered in blood and Elwy Okaz had just managed to grab the handle of the knife with his hand, making it appear as though", "-27.33602961122415" ], [ "a sitting president could be formally charged if he had not been impeached. Grant was allowed to pay a fine but had to walk back to the White House. In 1878, Congress abolished the Metropolitan Police Board and its duties were taken over by the newly formed DC Board of Commissioners, established by Congress to govern the entire District. That year as well, Thomas P. Morgan was named to replace Richards, who had resigned, as Major and Superintendent. Although a police fund had been established during the MPD's first year to assist those officers injured in the line of duty,", "-27.335878923069686" ], [ "president, on April 14, 1865, Booth assigned Powell to assassinate Seward, with George Atzerodt to kill Vice President Johnson and himself to kill Lincoln, which would slay the three senior members of the Executive Branch. Accordingly, another member of the conspiracy, David Herold, led Powell to the Seward home on horseback and was responsible for holding Powell's horse while he committed the attack. Seward had been hurt in an accident some days before, and Powell gained entry to the home on the excuse he was delivering medicine to the injured man, but was stopped at the top of the stairs", "-27.33583359984914" ], [ "\"determined not to apply an approach that could potentially result in a judgment that the President committed crimes\".\nSince the Special Counsel's office had decided \"not to make a traditional prosecutorial judgment\" on whether to \"initiate or decline a prosecution,\" they \"did not draw ultimate conclusions about the President's conduct\". The report \"does not conclude that the president committed a crime\", but specifically did not exonerate Trump on obstruction of justice, because investigators were not confident that Trump was innocent after examining his intent and actions. The report concluded \"that Congress has authority to prohibit a President's corrupt use of his", "-27.297948394727428" ], [ "reporters and made an inverted OK gesture below his waist, said to be a \"white power\" sign.\nThe case was transferred to the High Court and he was remanded in custody, as his lawyer did not seek bail. He was subsequently transferred to the country's only maximum-security unit at Auckland Prison. He has lodged a formal complaint regarding his prison conditions, on the grounds that he has no access to newspapers, television, Internet, visitors or phone calls. On 4 April, police announced they had increased the total number of charges to 89, 50 for murder and 39 for attempted murder, with", "-27.29426688401145" ], [ "of an assassination attempt on Ronald Reagan, President of the United States at that time. During a conversation with another office worker, Lawrence Jackson, she remarked, \"Shoot, if they go for him again, I hope they get him.\" This comment, unbeknownst to McPherson, had been overheard by another deputy constable, who had then reported what he heard to Constable Rankin, effectively in charge of all those in the office. He requested to speak with McPherson, who admitted to him what she had said, stating, \"Yes, but I didn't mean anything by it.\" After the conversation, Constable Rankin terminated her employment.\nAfter", "-27.278399897564668" ], [ "that he wanted to kill white people, especially white police officers. Following the shooting, Johnson fled inside a building on the campus of El Centro College. Police followed him there, and a standoff ensued. In the early hours of July 8, police killed Johnson with a bomb attached to a remote control bomb disposal robot. It was the first time U.S. law enforcement used a robot to kill a suspect. The shooting was the deadliest incident for U.S. law enforcement officers since the September 11 attacks in 2001 and saw a massive uprising of public support for U.S. police officers", "-27.269632272189483" ], [ "Murder at 1600 Plot In a restroom in the White House, a janitor finds secretary Carla Town dead. Metropolitan Police homicide detective Harlan Regis, whose apartment block is awaiting demolition in favor of a parking lot, is put on the case. At the White House, Regis is introduced to U.S. Secret Service Director Nick Spikings, National Security Advisor Alvin Jordan, and Secret Service agent Nina Chance. Spikings assigns Chance, a former Olympic gold-class sharpshooter, to keep an eye on Regis.\nParallel to this, the White House has to deal with an impending international crisis: President Jack Neil has been trying to", "-27.266316666151397" ], [ "Dickerson v. United States Background In Miranda v. Arizona, the Supreme Court held that statements of criminal suspects made while they are in custody and subject to interrogation by police may not be admitted in court unless the suspect first had certain warnings read to him beforehand. By now, these warnings are familiar to most Americans: that the suspect has the right to remain silent during the interrogation, that anything he says to the police may be used against him in a court of law, that he has the right to legal counsel, and that if he cannot afford legal", "-27.260102353000548" ], [ "from a brain injury. Days earlier he had informed colleagues about death threats. Two men were arrested and later released without charge.", "-27.241571726743132" ], [ "secret, but not to do anything for which they could be arrested for and \"to take care no one be killed\".", "-27.233699208678445" ], [ "a jury\". Regarding the President's efforts to curtail the Special Counsel investigation in the episode involving Corey Lewandowski, the official said it would be hard to justify a prosecution because the obstruction relies on multiple people in a chain all doing something\" and that it was \"a very attenuated chain\", exacerbated \"given that the note isn't even an order\". The official alluded to the belief that prosecutors would not be able to prove that Trump had wanted to shut down the investigation with corrupt intent, because according to the official, there was no underlying crime to cover up. James Comey", "-27.231356826319825" ], [ "room could not have incident to his arrest due to the time between it and his arrest, and the fact that the latter took place in another state. The officers were also aware he was not present, he added, so they could not have been intending to arrest him when they entered his hotel room. The court cited many holdings in California case law to the extent that it did not matter whether the arrest took place before or after the search.\nStoner further claimed his confession had effectively been coerced. He claimed that he had not been arraigned until two", "-27.227178167282545" ], [ "makes it to the prison where Donnelley is going to be executed and saves him. The two fight their way out of the prison. The Resistance finally decides to assassinate President Stevenson, and launches a full assault against the heavily fortified White House. Carson goes inside alone, killing dozens of Nazi soldiers, before allowing the demolitions team into the White House to plant the bombs. Carson finds Stevenson in the middle of an address to the nation, and kills him. The Resistance then blows up the building. During the attack, the Resistance also discovered secret documents detailing the existence of", "-27.22202780644875" ], [ "sureties, and remain under house arrest unless in court, his lawyer's office or at Friday prayers.\nIn April 2008, all charges against him were stayed due to lack of evidence. However, his peace bond stipulated that he must not have contact with any of the other accused, must not apply for a passport and must obey an 8:00pm curfew. He said that he blamed Mubin Shaikh and Wajid Khan for \"lying\", leading to his false imprisonment.\nMr. Farooq stated that, \"we were able to establish, during the preliminary inquiry, that there were a lot of problems with the Crown's case\", and evidence", "-27.221582474419847" ], [ "messaged to contact the prosecutor immediately. When I came to the prosecutor's office, the guard said that it was as if someone in prison had committed suicide. I received a phone call from the Qasr Prison. The Major, who headed the case, sounded very annoyed. Majid had killed himself in his cell. And with his death, his case was closed forever.\"", "-27.205754248192534" ], [ "Secret Service agents shouted \"get down, let's go\". Secret Service agents then half-dragged Ford away from Fromme towards the east entrance of the Capitol, until Ford yelled in protest, \"Put me down! Put me down!\" Ford continued his walk to the California state house, entered, and then met with California governor Jerry Brown at 10:06 a.m. for 30 minutes without mentioning the assassination attempt until they were through talking business. Ford, who later indicated that he was not scared, concluded, \"I thought I'd better get on with my day's schedule\". Aftermath Following the attempt, the Secret Service would not allow reporters or", "-27.19266927591525" ], [ "the President's assent to inquire or carry out investigations regarding information received about the conduct of any person, or any allegation or complaint made against any person. If the President exercises his discretion in concurring with the Director, he or she is permitted to proceed with the investigations, notwithstanding the Prime Minister's refusal to consent. This is one of the few instances where the President's power is not limited by some other body. Granting of pardons, reprieves and remissions Subject to Cabinet's advice, the President is empowered to pardon offenders, or accomplices who provide information leading to the conviction of", "-27.18647197331302" ], [ "November 2014. Federal agency service In 2000, when Moss was an Assistant Attorney General in the Office of Legal Counsel (OLC) of the United States Department of Justice, he wrote the memorandum opinion advising that the Department could not indict a sitting president. \"The indictment or criminal prosecution of a sitting President would unconstitutionally undermine the capacity of the executive branch to perform its constitutionally assigned functions.\"\nThe Mueller Report (March 2019, Vol. II, p. 1) cited the Moss memorandum in partial justification of Special Counsel Robert Mueller's decision not to indict President Donald Trump. \"Given the role of", "-27.181902113952674" ], [ "assassination.\"\nOn May 22, Chief U.S. District Judge Norma Holloway Johnson ruled that since the Secret Service employees are part of the federal law enforcement establishment sworn to assist in criminal investigations, they must testify. The Secret Service appealed her decision and the case eventually made its way to the Supreme Court where the Secret Service lost in a split decision. Scores of Secret Service agents then testified before Starr's Independent Counsel. In the end, Starr and his Independent Counsel were frustrated to learn that the rumor and innuendo that they had been led to believe regarding the Secret", "-27.177940643625334" ], [ "actually a coup d'état. Secret Service conspiracy The House Select Committee on Assassinations reported that it investigated \"alleged Secret Service complicity in the assassination\" and concluded that the Secret Service was not involved. However, the HSCA declared that \"the Secret Service was deficient in the performance of its duties.\" Among its findings, the HSCA noted: (1) that President Kennedy had not received adequate protection in Dallas, (2) that the Secret Service possessed information that was not properly analyzed, investigated, or used by the Secret Service in connection with the President's trip to Dallas, and (3) that the Secret Service agents", "-27.15981374986586" ], [ "is killed before he can shoot Oswald, who is taken to Washington, D.C. and interrogated by the Warren Commission, culminating in the CIA's disbandment. When J. Edgar Hoover threatens to blackmail the President by revealing audio tapes of Kennedy having sex with Marilyn Monroe, Robert Kennedy counters by threatening to release photos of Hoover's alleged homosexuality. When Hoover caves in and agrees to hand over the tapes, Robert Kennedy also demands for Hoover to hand in his letter of resignation.\nSimilar to a future situation, John and Jackie Kennedy appear on television. John reveals his infidelities and asks for forgiveness from", "-27.157656316914654" ], [ "a President (1967), who believed that Oswald, recounting the day's events to the Dallas Police, mistook MacNeil as a Secret Service agent because of his suit, blond crew cut, and press badge (which Oswald apparently mistook for government identification).\nFor his part, MacNeil says \"it was possible, but I had no way of confirming that either of the young men I had spoken to was Oswald.\" On the phone, MacNeil relayed the first report of the shooting to Jim Holton of NBC Radio, who recorded MacNeil's account of what had happened. MacNeil then headed to Parkland Hospital where he arranged a", "-27.154438410594594" ], [ "into the wall, to make the prisoners believe he was dead. He then asked Guardsman Ted Thomas if he wanted to kill one. Thomas then took an occupant into a room and shot into the ceiling. Aubrey Pollard was then taken to room A-3 by Officer Ronald August. August would later admit to Pollard's killing, stating it was in self-defense. A spent cartridge found next to Pollard was a .300 Savage, a type used for sporting rifles, and not issued to police officers. Pollard had extensive injuries to his head. Witnesses described how he had been beaten on the head", "-27.14357425889466" ], [ "Several military officers were sent to prison, including some loyal to the president.", "-27.13294281065464" ], [ "life of a US President in 2007. Earlier on Friday, 3 February 2006, Buddhi was questioned by the Secret Service who made a formal report saying that Buddhi was not a threat to the US President or any Secret Service protected person. Trial The prosecution has alleged that Buddhi posted messages on a Yahoo business discussion forum which appeared in December 2005 and January 2006 calling upon the people of Iraq to retaliate against Iraq war and kill then president George W. Bush, vice-president Dick Cheney and their spouses. Buddhi's lawyer Somnath Bharti has alleged that the indictment did not", "-27.116761493030936" ], [ "a \"process other than the criminal justice system\". This suggested that the investigation could now be picked up by Congress. He stressed that the central conclusion of his investigation was \"that there were multiple, systematic efforts to interfere in our election. That allegation deserves the attention of every American.\" He also stated: \"If we had had confidence that the President clearly did not commit a crime, we would have said so. We did not, however, make a determination as to whether the president did commit a crime\".\nThe House Judiciary and Intelligence committees subpoenaed Mueller on June 25, 2019, with a", "-27.115746763331117" ], [ "for crimes, including one for Dr. Samuel Mudd, controversially convicted of involvement in the Lincoln assassination (he had set Booth's broken leg) and imprisoned in Fort Jefferson on Florida's Dry Tortugas.\nOn March 3, the President hosted a large public reception at the White House on his final full day in office. Grant had made it known that he was unwilling to ride in the same carriage as Johnson, as was customary, and Johnson refused to go to the inauguration at all. Despite an effort by Seward to prompt a change of mind, he spent the morning of March 4 finishing", "-27.10435763146961" ], [ "day after Lincoln was assassinated. An employee of the hotel contacted the police regarding a \"suspicious looking man in a gray coat.\"\nThe military police then conducted a search of Atzerodt's room on April 15 and found that he had not slept in it the night before. Additionally, he had a loaded revolver concealed under his pillow as well as a concealed Bowie knife. The police also found a bank book belonging to Booth in the room. Atzerodt was arrested on April 20. He was apprehended at the house of his cousin, Hartman Richter, in Germantown, Maryland. Trial and execution Atzerodt's", "-27.097936259233393" ], [ "Sergeant John Miller and three officers were arrested by the FBI on a ten-count indictment, on charges of conspiracy, false arrest, and excessive force and obstruction of justice in connection with the investigation. A local businessman had complained to the mayor's office that the officers stopped his employees to check their documentation as they entered and left his place of business. Numerous other charges were detailed in the indictment. Numerous other complaints had been collected. Press reports indicated a suspicion among the investigators that the chief of the department, Leonard Gallo, was involved in obstructing justice and had tried", "-27.082642038702033" ], [ "with him a big, heavy butcher knife as he accompanied the President. If ever the President wanted to fire nuclear weapons, the only way he could do so would be for him first, with his own hands, to kill one human being. The President says, \"George, I’m sorry but tens of millions must die.\" He has to look at someone and realize what death is—what an innocent death is. Blood on the White House carpet. It’s reality brought home.\nWhen I suggested this to friends in the Pentagon they said, \"My God, that’s terrible. Having to kill someone would distort the", "-27.06446483547188" ], [ "always remain shrouded in mystery.\" He goes on to say, however, that the army platoon protecting the president's house offered no resistance. Sheikh Kamal, son of Mujib, was shot at the reception area on the ground floor. Meanwhile, Mujib was asked to resign and allowed time to consider his choice. He telephoned Colonel Jamil Uddin Ahmad, the new Chief of Military Intelligence. When Jamil arrived and ordered the troops back to the barracks, he was gunned down at the gate of the residence. After he refused to resign, Mujib was shot and killed.\nOther people killed in the attack were Sheikh", "-27.05567774217343" ] ]
7fo79c
Can You Protect Electronics From EMPs/solar flares? If So How?
[ "The military does it all the time. The movie fantasy of Russian or terrorist EMP causing military helicopters to fall from the sky is BS. Source: former military communications tech. Pulled off a forum: URL_0 MIL-STD 188-125-1 HEMP Hardening (Fixed Facilities) MIL-STD 188-125-2 HEMP Hardening (Transportable Systems) MIL-STD 202 Environmental Requirements Component Level MIL-STD 810 Environmental Requirements Box Level MIL-STD 461 EMI Requirements (Subsystems) MIL-STD 464 EMI Requirements (Systems)", "EMP and solar flares affect different things. Solar flares affect very long cables (more than a few hundred miles) and cause DC voltage to appear on these wires. These very long wires tend to be things like power grids or telephone lines. The DC voltage is a major problem for power grid transformers which require pure AC power. These can malfunction if exposed to DC voltage from a solar flare. The power grid operator can install DC voltage detectors and shut down the power line when DC voltage is detected. Alternatively, they can use \"series compensation\" of the power line which stops the DC voltage completely and can also boost the power line's AC efficiency (but is very expensive). EMP affects shorter cables from about 1-2 feet up to a few hundred feet. Very small electronic device like phones, watches, laptops should be OK unless connected to external wires. For things with longer wires or bigger systems, industrial machines, cars, etc. Then these could be sensitive. Protection can be internal: adding ultrafast trainsient suppressor diodes at both ends of any wires. Or external: use of a Faraday cage. Don't forget that deep bunkers can use the ground as a Faraday cage and large heavy buildings with lots of concrete and rebar also axt like Faraday cages. So, in general something like a nuclear plant is immune because there is so much concrete surrounding anything electrical and the uncovered bits are already very high voltage, which is much stronger than an EMP so aren't at risk.", "EMP would iduce current in long conductors. Disconnecting things should stop large currents from forming. This should at least stop anything from catching on fire.", "True ELI5: The sun releases a lot of energy. This energy comes in waves, just like you see in water at the beach, but the sun's waves move through the air. Some of the sun's waves you can see (light), but most of them you can't see. We call these by different names, depending on how fast they move. Some you may have heard of are radio waves, microwaves, and X-rays. Some of these waves you can even feel! When you feel warm sunshine on your skin, those are actually one type of wave. Lots of other things make these waves too. People can make these waves too, using special equipment, but we have to be very careful. The sun is the biggest thing that makes waves in our solar system. Different things stop different waves. A pillow or a blanket or your hand can stop most or all of the waves you can see that come out of a flashlight, but it can't stop the waves that you can feel - that's why a flightlight stil feels warm even when you can't see the light. The waves that come from EMPs and solar flares are extra hard to stop. They go so fast that they can go through a lot of things that would stop other waves. That's why doctors can use X-rays to see your bones. It's also why they're so dangerous - they can change how your body works at a very small level, and make you sick. They do the same thing to electronics like your TV and cell phone, but those get even sicker, and immediately stop working. The atmosphere mostly protects you and me from those waves, but electronics are extra sensitive. Because they're so expensive, people spend a lot of time and money thinking about how to protect them better. One thing that stops the waves from EMPs and solar flares best is a thick physical barrier. For example, a box made out of lead, or deep water. But those are big and heavy and not easy to carry around, so they're not very useful for things like smartphones. So they also work on special tools. One of the most famous ones is called a Farraday Cage. It's a box made out of metal, that has a bunch of holes poked in it. The holes are carefully planned to be just the right size to catch the waves and turn them away.", "Faraday cage. Get a 100% metal basket or trash can (with metal lid) and put your electronics inside. Protected by science^^TM", "You could always live in a lead bunker thousands of feet below the ground and that will pretty much stop anything from hitting", "Does wraping the said electronic in aluminum foil count as a Faraday cage?", " > I'll start with the grounding question, because that's the easiest to answer: Doesn't help a bit. All that matters is that the metal container is conductive and doesn't have gaps (ammo cans are bad at isolating from UHF on up because that rubber gasket only leaves the lid connected to the body at the ends, and that allows radiation in if the wavelength is short enough). If you're concerned about direct lightning hits, then having the can connected to ground could attract lightning to it, especially if it's much above ground level. I'd leave it ungrounded. > The paint can sounds like a great solution for anything small enough to fit inside. Since it's designed to make an airtight seal, you know you have metal-to-metal contact all the way around the edge of the lid. Trash cans aren't very good on that point -- the lid probably only touches the can at a few points, leaving long (also thin, but it's the long part that matters) gaps, so RF can get inside. They, like the ammo cans, will still protect well from low frequencies (such as indirect lightning effects). Insulation on the inside isn't really necessary (the whole point of the Faraday cage is that currents only flow on the outside surface), but I suppose it can't hurt. > Radios are a fine way to test isolation. It's better if you can control the signal strengths involved and have some basis for comparisons, so you can get an idea of how much attenuation the can provides. The point about testing at high frequencies is valid -- in all but a very very few cases, low frequencies will always be better-isolated than high frequencies. The microwave, I think, is one of those few counterexamples -- it's a resonant cavity tuned to one specific frequency (2.45 GHz), and the edges of the door are positioned at natural zero-current areas for that frequency. At any other frequency, the fact that the door isn't electrically connected to the body around most of the edge allows some RF through. > As for what frequencies matter for what sort of threats, it's time for numbers. Starting with the lowest, and therefore easiest for a Faraday cage to handle: * Solar flares and resulting geomagnetic storms: Hundredths of a Hz. Complete non-issue for anyone but the guys running the power grid and pipelines. Small risk of surges on the power lines themselves from transformer failures, but absolutely no RF risk (i.e. if it's not plugged in, it doesn't give a damn). * Lightning: Mostly below 1 MHz. That means wavelengths of hundreds of meters, so anything that more or less surrounds your electronics will protect from the electromagnetic waves (i.e. the indirect effects that extend hundreds of meters from the strike). Direct hits from the strike itself are nearly impossible to protect against, since a lightning strike can easily blow a hole through something like an ammo can. But those follow conductors, so don't store your Faraday-protected electronics next to that wire running to the old TV antenna on your chimney. For testing in this frequency range, try an AM radio tuned to the strongest station you can find. * Nuclear EMP: Worst below 100 MHz, but significant up to several hundred MHz. Wavelengths as short as several inches. This is where things become demanding. Gaps of several inches in length may allow RF to penetrate into a Faraday cage. Making sure the lid contacts the body around its whole circumference, or at least every inch or two, is important. To test isolation for this sort of thing, try at least UHF (FRS/GMRS radios operate around 460-470 MHz, which is a good example). * Non-nuclear EMP bomb: Up to several GHz, perhaps tens of GHz. Wavelengths down below an inch. Damn hard to shield against, but short-ranged and, in my opinion, not likely to be seen unless you're on the wrong end of a serious attack from a high-tech power. If you're still concerned about it, then look to absolutely, completely seal your Faraday cage. Consider soldering the lid on to that paint can. Testing at cellphone/wifi frequencies would be a start, but threats could go well beyond that frequency range. There just isn't much consumer hardware that uses frequencies this high. First off: The after-effects of solar flares abso-farking-lutely cannot damage anything that isn't connected to miles of metal. If it isn't plugged into the grid, and isn't a miles-long pipeline, and isn't outside the Earth's atmosphere, it doesn't freaking care. While removing batteries won't do much, removing antennas from radios is an excellent first step (having something that's designed to collect RF energy attached to your electronics is obviously a bad idea). Also, power lines can act as pretty effective antennas, particularly for VHF and lower frequencies, so removing that connection is also a beginning step. It's all a matter of degrees of protection, and something is better than nothing. I don't know exactly where you got [the idea that lead is the best EMP shielding], but I'm guessing you have nuclear EMPs confused with nuclear (i.e. ionizing, mainly gamma) radiation. They are very, very different things. Lead is popular for shielding from x-ray and gamma radiation because it's cheap and extremely dense, but there's nothing else particularly special about it. Its relatively low conductivity gives it a larger skin depth than other metals, which doesn't help for electromagnetic shielding. There are several things wrong with [the listed requirements of quarter-inch-thick-steel]. It sounds like you're talking about a low-altitude or surface nuclear burst. Those don't produce any significant EMP except deep within the kiss-your-ass-goodbye zone. Unless you're inside a hardened blast shelter, you'll be rather too smashed, scorched, and irradiated to notice that your radio isn't working. Widespread nuclear EMPs come from bursts extremely high in the atmosphere -- we're talking low-Earth-orbit altitudes here, hundreds of miles up. The effects are continent-wide, and they don't weaken very much with distance until you pass the burst's horizon. Non-nuclear EMP sources (lightning and conventional, engineered EMP bombs) are short-ranged, but generally on the scale of hundreds of feet to hundreds of yards, not several miles, so your guidelines don't really apply to those either. As for the shielding recommendations, those again sound like you're talking about gamma radiation. A quarter inch of anything is total overkill for RF shielding except at very low frequencies (tens of kHz, maybe?). Such low frequencies don't couple to small circuitry, so there's no reason to worry about them. In response to insistence that all shielding/cages must be grounded: The bit about grounding is simply wrong. Gauss's law does not care if your shielding is grounded, only that it forms a continuous, closed surface. If you don't know what Gauss's law is, or why it applies here, stop giving advice right now because you do not have the background to understand what you're talking about. I mostly agree about digital stuff being more vulnerable than analog. However, once again, lead is not special. Electromagnetic shielding is not a matter of absorbing energy, but reflecting it. Lead isn't uniquely good at either of those. You want conductivity and lots of it, but that's pretty easy to get from common sheet metals. The tough part is making sure that you don't have gaps with poor or nonexistent connections (like around the lid of a container, or at the door of a safe), so if you're choosing a metal you should go for something that makes good, reliable electrical contacts. Also, I'm pretty sure fire-resistant safes don't use lead in their construction. My personal contribution to the thread: HERO. Hazard of Electromagnetic Radiation to Ordinance. HERO is defined as the threat to electrically and non-electrically fire ordinance and equipment from electromagnetic radiation. It's also one of the first things I learned about before the .mil let me within pissing distance of a blasting cap. Thing is, the military's been thinking about this EMP hoo-yah for quite sometime, and they are worried about both pulses, pulse weapons, and rapid accumulation, which has a tendency to fire ungrounded ordinance. So, to prevent electrically fire rockets and sensitive electronics from malfunctioning or \"cooking off\" due to HERO and EMP (which presents a HERO threat) the solution is simple. Mylar baggies, about .7mil thick, and sealed on all four sides. No grounding, no lead, nothing else. Mylar baggies. Shit works too. Next time you order a small electronic component from some internet company, look at the little baggie it comes in. Sealed mylar. That protected that chip from air travel at 35,000 feet, land travel through rural, urban, and suburban areas, and all the electromagnetic radiation that the trip entails. No ground wires. No lead shielding. No safes. Just what I've learned both from electronic warfare specialists, and from my own training in How Not To Get Myself Blown Up Or Fry The Radios. Source: URL_0 ", "I've done this for my gps and portable ham radio in my bug out bag, you basically just make a mini faraday cage.", "Dumb question, would turning off and unplugging electionics during one protect them?" ]
[ [ "the shielding may be less than perfect. Proper shielding is a complex subject due to the large number of variables involved. Semiconductors, especially integrated circuits, are extremely susceptible to the effects of EMP due to the close proximity of the PN junctions, but this is not the case with thermionic tubes (or valves) which are relatively immune to EMP. A Faraday cage does not offer protection from the effects of EMP unless the mesh is designed to have holes no bigger than the smallest wavelength emitted from a nuclear explosion.\nLarge nuclear weapons detonated at high-altitudes also cause geomagnetically induced", "-37.12093435329734" ], [ "or radar systems. In the case of anti-radiation weapons, many times this includes missiles or bombs that can home in on a specific signal (radio or radar) and follow that path directly to impact, thus destroying the system broadcasting. Electronic protection Electronic protection (EP) (previously known as electronic protective measures [EPM] or electronic counter-countermeasures [ECCM]) involves actions taken to protect friendly forces (personnel, facilities, and equipment) from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability (EA). EP is the ability to defeat EA.\nFlares are often used to distract infrared", "-36.72109818120953" ], [ "damaging to electronic equipment. If a single nuclear weapon \"designed to emit EMP were detonated 250 to 300 miles up over the middle of the country it would disable the electronics in the entire United States.\"\nGiven that many of the comforts and necessities we enjoy in the 21st century are predicated on electronics and their functioning, an EMP would disable hospitals, water treatment facilities, food storage facilities, and all electronic forms of communication. An EMP blast threatens the foundation which supports the existence of the modern human condition. Certain EMP attacks could lead to large loss of power for months", "-35.68812297785189" ], [ "(LCs). LCs do not emit light directly. They are used in a wide range of applications, including computer monitors, television, instrument panels, laptops tablet computers etc. They are common in consumer devices such as video players, gaming devices, clocks, watches, calculators, and telephones. Operation Up to three-fourths of the light energy wasted from LCD backlight illumination can be retrieved and utilized using polarizing organic photovoltaics. They can utilize external light energy also apart from backlight illumination using photovoltaic polarizers, which are present within the structure of the LCD screen. Advantages 80% to 90% of the total energy utilized", "-34.358623902575346" ], [ "oven's metal housing. Visible light, with wavelengths ranging between 400 nm and 700 nm, passes easily through the screen holes.\nRF shielding is also used to prevent access to data stored on RFID chips embedded in various devices, such as biometric passports.\nNATO specifies electromagnetic shielding for computers and keyboards to prevent passive monitoring of keyboard emissions that would allow passwords to be captured; consumer keyboards do not offer this protection primarily because of the prohibitive cost.\nRF shielding is also used to protect medical and laboratory equipment to provide protection against interfering signals, including AM, FM, TV, emergency services, dispatch, pagers, ESMR, cellular,", "-34.19508918284555" ], [ "prey on concerned people.\"\nAccording to the FTC, \"there is no scientific proof that so-called shields significantly reduce exposure from electromagnetic emissions. Products that block only the earpiece – or another small portion of the phone – are totally ineffective because the entire phone emits electromagnetic waves.\" Such shields \"may interfere with the phone's signal, cause it to draw even more power to communicate with the base station, and possibly emit more radiation.\" The FTC has enforced false advertising claims against companies that sell such products.", "-34.00707969447831" ], [ "Arc detectors may shut off the transmitter when sparks or fires occur.\nProtection features must also prevent the human operator and the public from encountering the high voltages and power which exist inside the transmitter. Tube transmitters typically use DC voltages between 600 and 30,000 volts, which are deadly if contacted. Radio frequency power above about 10 watts can cause burning of human tissue through contact and higher power can actually cook human flesh without contact. Metal shielding is required to isolate these dangers. Properly designed transmitters have doors or panels which are interlocked, so that open", "-33.98896900541149" ], [ "thus they block a large amount of the electromagnetic interference. See also electromagnetic shielding. They provide less attenuation of outgoing transmissions than incoming: they can block EMP waves from natural phenomena very effectively, but a tracking device, especially in upper frequencies, may be able to penetrate from within the cage (e.g., some cell phones operate at various radio frequencies so while one cell phone may not work, another one will).\nA common misconception is that a Faraday cage provides full blockage or attenuation; this is not true. The reception or transmission of radio waves, a form of electromagnetic radiation, to or", "-33.67303490656195" ], [ "hazard in semiconductor microelectronics employed in electronic equipment, with subsequent currents introducing operation errors or even permanently damaging the devices. Devices intended for high radiation environments such as the nuclear industry and extra-atmospheric (space) applications may be made radiation hard to resist such effects through design, material selection, and fabrication methods.\nProton radiation found in space can also cause single-event upsets in digital circuits.\n6\nThe electrical effects of ionizing radiation are exploited in gas-filled radiation detectors, e.g. the Geiger-Muller counter or the ion chamber. Uses Ionizing radiation has many industrial, military, and medical uses. Its usefulness must be balanced with its hazards,", "-33.61449399410958" ], [ "a photocurrent; this is avoided by encapsulating devices in opaque housings. If these housings are not completely opaque to high-energy radiation (ultraviolet, X-rays, gamma rays), diodes, transistors and ICs can malfunction due to induced photo-currents. Background radiation from the packaging is also significant. Radiation hardening mitigates these effects.\nIn some cases, the effect is actually wanted, for example to use LEDs as light-sensitive devices (see LED as light sensor) or even for energy harvesting, then sometimes called light-emitting and -absorbing diodes (LEADs). Applications P–n photodiodes are used in similar applications to other photodetectors, such as photoconductors, charge-coupled devices, and photomultiplier tubes.", "-33.53428956067364" ], [ "(11.64 in). Ionizing radiation CRTs can emit a small amount of X-ray radiation as a result of the electron beam's bombardment of the shadow mask/aperture grille and phosphors. The amount of radiation escaping the front of the monitor is widely considered not to be harmful. The Food and Drug Administration regulations in 21 C.F.R. 1020.10 are used to strictly limit, for instance, television receivers to 0.5 milliroentgens per hour (mR/h) (0.13 µC/(kg·h) or 36 pA/kg) at a distance of 5 cm (2 in) from any external surface; since 2007, most CRTs have emissions that fall well below this limit. Toxicity Older color and monochrome CRTs", "-33.290629780560266" ], [ "components of nuclear EMP. The geomagnetic storm-like E3 component of nuclear EMP is more closely proportional to the total energy yield of the weapon. Target distance In nuclear EMP all of the components of the electromagnetic pulse are generated outside of the weapon.\nFor high-altitude nuclear explosions, much of the EMP is generated far from the detonation (where the gamma radiation from the explosion hits the upper atmosphere). This electric field from the EMP is remarkably uniform over the large area affected.\nAccording to the standard reference text on nuclear weapons effects published by the U.S. Department of Defense, \"The peak electric", "-33.28349161827646" ], [ "of electronics can devise interference devices to cause the smart meter to report lower than actual usage. Similarly, the same technology can be employed to make it appear that the energy the consumer is using is being used by another customer, increasing their bill.\nThe damage from a well-executed, sizable cyberattack could be extensive and long-lasting. One incapacitated substation could take from nine days to over a year to repair, depending on the nature of the attack. It can also cause an hours-long outage in a small radius. It could have an immediate effect on transportation infrastructure, as traffic lights and", "-33.19931343384087" ], [ "to counter an array of frequency diverse threats. The system is an expandable, active and reactive, scanning-receiver-based jammer with multiple jamming signal sources that allow it to counter multiple simultaneous threats.\nJoint IED Neutralizer (JIN): In 2005, Ionatron attempted to develop an anti IED device that would \"zap\" IEDs from a distance by using lasers to ionize the air and allow man-made lightning to shoot towards the devices detonating them at a safe distance. By using femtosecond lasers light pulses that last less than a ten-trillionth of a second JIN could carve conductive channels of ionized oxygen in the air. Through", "-32.964170686900616" ], [ "a strong electromagnetic field change - an electromagnetic pulse (EMP). Filters are used to prevent spikes entering or leaving the equipment through wires, and the devices coupled electromagnetically to space (such as radio-frequency pick-up coils in MRI scanners) are protected by shielding.", "-32.95447100198362" ], [ "to the thermostat, they would have to gain physical access to the device and upload the malicious firmware via a USB port. This drastically decreases the chances that this type of attack will occur, but it is still possible if a used thermostat is purchased with the firmware already uploaded. The problem that allows this type of attack is with the hardware in the thermostat. Therefore, Nest cannot repair this issue with a simple software update, but rather it would need to build a new thermostat that can prevent this type of attack. Climate change According to the 2015 Residential", "-32.94388382323086" ], [ "Electrical equipment in hazardous areas Electrical ignition hazard A household light switch may emit a small, harmless visible spark when switching. In an ordinary atmosphere this arc is of no concern, but if a flammable vapor is present, the arc might start an explosion. Electrical equipment intended for use in a chemical factory or refinery either is designed to contain any explosion within the device or is designed not to produce sparks with sufficient energy to trigger an explosion.\nMany strategies exist for safety in electrical installations. The simplest strategy is to minimize the amount of electrical equipment installed in", "-32.938862641807646" ], [ "be true because the field strength at the Earth's tangent could be substantially less than 0.5Eₘₐₓ.\"\n(Eₘₐₓ refers to the maximum electric field strength in the affected area.)\nIn other words, the electric field strength in the entire area that is affected by the EMP will be fairly uniform for weapons with a large gamma ray output. For smaller weapons, the electric field may fall at a faster rate as distance increases. Effects An energetic EMP can temporarily upset or permanently damage electronic equipment by generating high voltage and high current surges; semiconductor components are particularly at risk. The effects of damage", "-32.82555228775891" ], [ "radiation effects, but without the consequences of deploying nuclear weapons.\nThe range of NNEMP weapons is much less than nuclear EMP. Nearly all NNEMP devices used as weapons require chemical explosives as their initial energy source, producing only 10⁻⁶ (one millionth) the energy of nuclear explosives of similar weight. The electromagnetic pulse from NNEMP weapons must come from within the weapon, while nuclear weapons generate EMP as a secondary effect. These facts limit the range of NNEMP weapons, but allow finer target discrimination. The effect of small e-bombs has proven to be sufficient for certain terrorist or military operations. Examples of", "-32.592977834137855" ], [ "Lexington Institute in Virginia states that: \"The relevant (electromagnetic weapon) technology is well within the grasp of some countries and transnational terrorist groups\", and further states that U.S. hardware is susceptible to microwave and other directed-energy weapons.\nSuitable materials and tools to create electromagnetic weapons are commonly available. \"The threat of electromagnetic bomb proliferation is very real.\"", "-32.57669664187051" ], [ "such as during daylight, however. As a result, some manufacturers have started to integrate fiber optic sights with tritium vials to provide bright, high-contrast firearms sights in both bright and dim conditions. Safety While these devices contain a radioactive substance, it is currently believed that self-powered lighting does not pose a significant health concern. A 2007 report by the UK government's Health Protection Agency Advisory Group on Ionizing Radiation declared the health risks of tritium exposure to be double than previously set by the International Commission on Radiological Protection, but encapsulated tritium lighting devices, typically taking the form of a", "-32.57376638997812" ], [ "The EMP from the 22 October (K-3) nuclear test (also known as Test 184) blew all of the fuses and fired all of the overvoltage protectors in all of the sub-lines.\nPublished reports, including a 1998 IEEE article, have stated that there were significant problems with ceramic insulators on overhead electrical power lines during the tests. A 2010 technical report written for Oak Ridge National Laboratory stated that \"Power line insulators were damaged, resulting in a short circuit on the line and some lines detaching from the poles and falling to the ground.\" Characteristics Nuclear EMP is a complex multi-pulse, usually", "-32.55462526848714" ], [ "Counter-IED equipment Counter-IED equipment are created primarily for military and law enforcement. They are used for standoff detection of explosives and explosive precursor components and defeating the Improvised Explosive Devices (IEDs) devices themselves as part of a broader counter-terrorism, counter-insurgency, or law enforcement effort. Robots Talon: The TALON transmits in color, black and white, infrared, and/or night vision to its operator, who may be up to 1,000 m away. It can run off lithium-ion batteries for a maximum of 7 days on standby independently before needing recharging. It has an 8.5 hour battery life at normal operating speeds, 2 standard", "-32.49450144218281" ], [ "other devices used only occasionally. However, the many millions of transistors in a modern computer may switch repeatedly at frequencies above 1 GHz, causing interference which appears to be continuous. Nuclear electromagnetic pulse (NEMP) A nuclear electromagnetic pulse is the abrupt pulse of electromagnetic radiation resulting from a nuclear explosion. The resulting rapidly changing electric fields and magnetic fields may couple with electrical/electronic systems to produce damaging current and voltage surges.\nThe intense gamma radiation emitted can also ionize the surrounding air, creating a secondary EMP as the atoms of air first lose their electrons and then regain them.\nNEMP weapons are", "-32.34496180858696" ], [ "could be information from Fylingdales that initiates a nuclear response from the US and/or the UK to a perceived threat – real or false; intended or accidental. The radar beam has created serious concern of radiation risks due to leakage from the sides of the beams -“side lobes”. Although the radiation levels are within UK limits (NRPB), it would be harder for the base to keep within the tighter EU limits (INIRPB), which the UK may soon adopt.\nThe Ministry of Defence (MoD) defends the use and role of the facility, regarding RAF Fylingdales as part of the UK's contribution to", "-32.309165812232095" ], [ "distance and hide from radars enables this technology to have the potential to be used as nuclear weapons.", "-32.306333457818255" ], [ "may be helpful to get reports of fallout patterns and clearance. However, radio and other electronic equipment may be disabled by electromagnetic pulse. For example, even at the height of the cold war, EMP protection had been completed for only 125 of the approximately 2,771 radio stations in the United States Emergency Broadcast System. Also, only 110 of 3,000 existing Emergency Operating Centers had been protected against EMP effects. The Emergency Broadcast System has since been supplanted in the United States by the Emergency Alert System.\nThe reference Nuclear War Survival Skills includes the following supplies in a list of \"Minimum", "-32.303808202268556" ], [ "United States Federal Communications Commission (FCC) to force Fusion Lighting to reduce the electromagnetic emissions of their lamps by 99.9%. In 2001, Fusion Lighting agreed to install metal shielding around their lamps to reduce electromagnetic emissions by 95%.\nIn May 2003, the FCC terminated the proceeding that would have defined out-of-band emission limits for radio-frequency lights operating at 2.45 GHz, saying the record of the proceeding had become outdated and Fusion Lighting had stopped working on such lamps. The order concluded:\nWe therefore decline to provide the requested relief from the Satellite Radio Licensees to prohibit operation of all RF lights", "-32.274254418072815" ], [ "Immunity-aware programming Task and objectives Microcontrollers' firmware can inexpensively improve the electromagnetic compatibility of an embedded system.\nEmbedded systems firmware is usually not considered to be a source of radio frequency interference. Radio emissions are often caused by harmonic frequencies of the system clock and switching currents. The pulses on these wires can have fast rise and fall times, causing their wires to act as radio transmitters. This effect is increased by badly-designed printed circuit boards. These effects are reduced by using microcontroller output drivers with slower rise times, or by turning off system components.\nThe microcontroller is easy to control.", "-32.17565504947561" ], [ "disinfection Ultraviolet lamps are used to sterilize workspaces and tools used in biology laboratories and medical facilities. Commercially available low-pressure mercury-vapor lamps emit about 86% of their radiation at 254 nanometers (nm), with 265 nm being the peak germicidal effectiveness curve. UV at these germicidal wavelengths damage a microorganism's DNA so that it cannot reproduce, making it harmless, (even though the organism may not be killed). Since microorganisms can be shielded from ultraviolet rays in small cracks and other shaded areas, these lamps are used only as a supplement to other sterilization techniques.\nUV-C LEDs are relatively new to the commercial market", "-32.153222884226125" ], [ "EMP attacks were in the range of 1 to 10 megatons This is roughly 50 to 500 times the size of the Hiroshima and Nagasaki bombs. Physicists have testified at United States Congressional hearings that weapons with yields of 10 kilotons or less can produce a large EMP.\nThe EMP at a fixed distance from an explosion increases at most as the square root of the yield (see the illustration to the right). This means that although a 10 kiloton weapon has only 0.7% of the energy release of the 1.44-megaton Starfish Prime test, the EMP will be at least 8%", "-32.114607791474555" ], [ "these measures still leave too much EMI, shielding such as RF gaskets and copper tape can be used. Most digital equipment is designed with metal or conductive-coated plastic cases. RF immunity and testing Any unshielded semiconductor (e.g. an integrated circuit) will tend to act as a detector for those radio signals commonly found in the domestic environment (e.g. mobile phones). Such a detector can demodulate the high frequency mobile phone carrier (e.g., GSM850 and GSM1900, GSM900 and GSM1800) and produce low-frequency (e.g., 217 Hz) demodulated signals. This demodulation manifests itself as unwanted audible buzz in audio appliances such as microphone amplifier,", "-32.0628977046581" ], [ "in the victim unit, temporarily disrupting its function or even permanently damaging it.\nA powerful EMP can also directly affect magnetic materials and corrupt the data stored on media such as magnetic tape and computer hard drives. Hard drives are usually shielded by heavy metal casings. Some IT asset disposition service providers and computer recyclers use a controlled EMP to wipe such magnetic media.\nA very large EMP event such as a lightning strike is also capable of damaging objects such as trees, buildings and aircraft directly, either through heating effects or the disruptive effects of the very large magnetic field generated", "-32.04107349878177" ], [ "a place that might be observed by an onlooker (maybe a colleague, visitor or intruder) is an example of risk avoidance.\nComputers plainly need electrical power, hence they are vulnerable to issues such as power cuts, accidental disconnection, flat batteries, brown-outs, surges, spikes, electrical interference and electronic failures. Physical information security controls to address the associated risks include: fuses, no-break battery-backed power supplies, electrical generators, redundant power sources and cabling, \"Do not remove\" warning signs on plugs, surge protectors, power quality monitoring, spare batteries, professional design and installation of power circuits plus regular inspections/tests and preventive maintenance. It is", "-32.03126538894139" ], [ "Radiosensitizer A radiosensitizer is an agent that makes tumor cells more sensitive to radiation therapy. It is sometimes also known as a radiation sensitizer or radio-enhancer. Mechanism of action Conventional chemotherapeutics are currently being used in conjunction with radiation therapy to increase its effectiveness. Examples include the fluoropyrimidines, gemcitabine and platinum analogs; fluoropyrimidines increase sensitivity by dysregulating S-phase cell cycle checkpoints in tumor cells. Gemcitabine progresses through a similar mechanism, causing cells in the S-phase to disrepair DNA damage caused by the radiation. Platinum analogs such as cisplatin inhibit DNA repair by cross linking strands, and so aggravate the", "-32.00944812153466" ], [ "Pm-146 emits gamma rays that require batteries to be well shielded. The material is toxic and not readily available. Moreover, at the time there was a certain stigma associated with the use of nuclear power and radioactive materials: the public was genuinely fearful and leery of any nuclear technology. This stigma, combined with advances in (and the lower cost of) lithium-ion battery technology, eventually overshadowed aspirations of a more lucrative future for the Betacel, relegating betavoltaic batteries to the realm of academic research in the years that immediately followed. Later developments in betavoltaic technology The Betacel did not", "-32.00532943109283" ], [ "transmitters will be adequate for them. However, due to their high frequency of operation, building a jammer can be difficult for microwave circuits; these systems are therefore less likely to be jammed. Although jamming is easy to perform, it is also easy to detect. A simple firmware upgrade should be adequate for modern DSP-based EAS systems to detect jamming. Nevertheless, the vast majority of EAS systems do not currently detect it. Interference and health issues All electronic article surveillance systems emit electromagnetic energy and thus can interfere with electronics.\nMagneto-harmonic systems need to bring the tags to magnetic saturation and thus", "-31.951291135628708" ], [ "electromagnetic fault injection (EMFI), this class of attacks has been investigated before, but Cui and Housley’s new technique, known as “BadFET,\" is adapted to exploit modern computers and embedded devices, by impacting multiple components within these devices at the same time. By using a 300 volt EMP pulse from 3 millimeters away, the BadFET attack bypasses the Secure Boot protection that keeps processors from running untrusted code.\nCui and Housley also introduced an open source EMFI platform that makes BadFET available to other security researchers, for further analysis, testing and development. Thrangrycat On May 13, 2019, Cui and his research team", "-31.932937425124692" ], [ "that measures the voltage standing-wave ratio switches the transmitter off briefly if a higher voltage standing-wave ratio is detected after a lightning strike, as the reflections are probably due to lightning damage. If this does not succeed after several attempts, the antenna may be damaged and the transmitter should remain switched off. In some transmitting plants UV detectors are fitted in critical places, to switch off the transmitter if an arc is detected. The operating voltages, modulation factor, frequency and other transmitter parameters are monitored for protection and diagnostic purposes, and may be displayed locally and/or at a remote control", "-31.930973145819735" ], [ "electric fields cannot detect voltage inside shielded or armored cables (a fundamental limitation due to the Faraday cage effect). Another limitation is that DC voltage cannot be detected by this method, since DC current does not pass through capacitors (in the steady state), so the tester is not activated.\nThese types of testers can be used on series-connected strings of mini Christmas lights to detect which bulb has failed and broken the circuit, causing the set (or a section of it) not to light. By pointing the end of the detector at the tip of each bulb, it can", "-31.908321402501315" ], [ "radars operate at microwave frequencies with relatively high average energy consumption (up to the tens of kilowatts). The area immediately forward of the radar array for high energy radars is dangerous to human health. The intense radar waves of systems like the AN/TPQ-36 can also detonate electrically fused ammunition at short ranges.", "-31.879990614383132" ], [ "sparks (electrical arcs) when an induced voltage exceeds the breakdown voltage of the surrounding medium (e.g. air at 3.0 MV/m). These can deliver an electric shock to persons or animals. For example, the radio emissions from transmission lines have occasionally caused shocks to construction workers from nearby equipment, causing OSHA to establish standards for proper handling.\nEMR-induced sparks can ignite nearby flammable materials or gases, which can be especially hazardous in the vicinity of explosives or pyrotechnics. This risk is commonly referred to as Hazards of Electromagnetic Radiation to Ordnance (HERO) by the United States Navy (USN). United States Military Standard", "-31.849788187770173" ], [ "through a 100-meter (328-foot) transport tunnel to the 37-square-meter (400-square-foot) shielded target hall. There, they hit the target, which may be a biological sample or shielding material. In a 2002 NASA study, it was determined that materials that have high hydrogen contents, such as polyethylene, can reduce primary and secondary radiation to a greater extent than metals, such as aluminum. The problem with this \"passive shielding\" method is that radiation interactions in the material generate secondary radiation.\nActive Shielding, that is, using magnets, high voltages, or artificial magnetospheres to slow down or deflect radiation, has been considered to potentially combat radiation", "-31.56474547360267" ], [ "is compatible with MBITR, PRC-152, and other common radios used by the U.S. Military. Safety If power is increased over 7 watts there could be safety issues with temperature increase. However, at the operating frequencies of the antenna, ionizing radiation is not a factor. Additionally, the antenna is intended to be placed on the outside of SAPI plates, providing a significant barrier between the radiating element and the operator. Technical details The Tactical Vest Antenna System consists of two radiating elements that are connected by a cable. The cable acts as an extension of the radiating elements, and includes a", "-31.507781870343024" ], [ "EMC problem (excessive field strength) An EMC problem (or Electromagnetic compatibility problem) occurs when one piece of electronic equipment or an electromagnetic system is adversely affected by the operation of another. \nOne example might be breakthrough by the high field strengths produced by a nearby radio transmitter. EMC problems are not always due to defects in the transmitter, and so do not necessarily require improvements in the radio transmitter design, such as reducing its radiated harmonics. It may be that the immunity of the affected equipment is poor due to inadequate shielding, or filtering of sensitive inputs. EMC problems", "-31.489297118445393" ], [ "allowing photomultipliers (e.g. SiPMs) to produce an electrical signal. Introducing moderators and lithium-6 to capture thermalized neutrons further increases the detection capabilities of natural helium, at the expense of losing the initial information of the neutrons (such as energy) and reducing sensitivity to shielded neutron-emitting materials. Radiological threats RPMs are deployed with the aim to intercept radiological threats as well as to deter malicious groups from deploying such threats. Radiological dispersal devices Radiological dispersal devices (RDDs) are weapons of mass disruption rather than weapons of mass destruction. \"Dirty bombs\" are examples of RDDs. As the name suggests, an RDD aims", "-31.427111896598944" ], [ "of windscreens and vision blocks.\nCollective NBC (Nuclear, Biological and Chemical) protection is available which can protect the occupants from shock waves and penetrating radiation from nuclear attacks, radioactive dust, and bacteriological and chemical weapons.\nIts combat tires are capable of enduring anti-personnel mine explosions and small arms fire. If the vehicle is damaged while afloat, a drainage system is capable of removing incoming water. The BTR-90 also features an automatic fire fighting system, and a system for remote laying of smoke screens. The smoke discharge system includes six smoke grenade launchers, three on each side of the vehicle. Armament The main", "-31.37644881894812" ], [ "external shield must also be electrically insulated because of the high voltage on it. Photomultipliers with large distances between the photocathode and the first dynode are especially sensitive to magnetic fields. Applications Photomultipliers were the first electric eye devices, being used to measure interruptions in beams of light. Photomultipliers are used in conjunction with scintillators to detect Ionizing radiation by means of hand held and fixed radiation protection instruments, and particle radiation in physics experiments. Photomultipliers are used in research laboratories to measure the intensity and spectrum of light-emitting materials such as compound semiconductors and quantum dots. Photomultipliers are used", "-31.358656118922227" ], [ "Aurora Generator Test Idaho National Laboratory ran the Aurora Generator Test in 2007 to demonstrate how a cyberattack could destroy physical components of the electric grid. The experiment used a computer program to rapidly open and close a diesel generator's circuit breakers out of phase from the rest of the grid and cause it to explode. This vulnerability is referred to as the Aurora Vulnerability.\nThis vulnerability is especially a concern because much grid equipment supports using Modbus and other legacy communications protocols that were designed without security in mind. As such, they don't support authentication, confidentiality, or replay protection, which", "-31.257576096832054" ], [ "to humans\". The conceivable evidence of cancer risk via personal exposure to RF-EMF with mobile telephone use was identified.\nRadio waves can be shielded against by a conductive metal sheet or screen, an enclosure of sheet or screen is called a Faraday cage. A metal screen shields against radio waves as well as a solid sheet as long as the holes in the screen are smaller than about 1/20 of wavelength of the waves. Measurement Since radio frequency radiation has both an electric and a magnetic component, it is often convenient to express intensity of radiation field in terms", "-31.23971834074473" ], [ "described in terms of three components, as defined by the International Electrotechnical Commission (IEC).\nThe three components of nuclear EMP, as defined by the IEC, are called \"E1\", \"E2\" and \"E3\". E1 The E1 pulse is the very fast component of nuclear EMP. E1 is a brief but intense electromagnetic field that induces high voltages in electrical conductors. E1 causes most of its damage by causing electrical breakdown voltages to be exceeded. E1 can destroy computers and communications equipment and it changes too quickly (nanoseconds) for ordinary surge protectors to provide effective protection from it. Fast-acting surge protectors (such as those", "-31.162017390714027" ], [ "the electromagnetic spectrum through the use of electromagnetic energy. Electronic warfare includes three major subdivisions: Electronic Attack (EA), Electronic Protection (EP), and Electronic Support (ES). Electronic Attack Electronic Attack (EA) involves the use of EM energy, directed energy, or anti-radiation weapons to attack personnel, facilities, or equipment with the intent of degrading, neutralizing, or destroying enemy combat capability. Electronic Protection Electronic Protection (EP) involves actions taken to protect personnel, facilities, and equipment from any effects of friendly or enemy use of the electromagnetic spectrum that degrade, neutralize, or destroy friendly combat capability. Electronic Support Electronic Support (ES) is the subdivision", "-31.062146385316737" ], [ " Inexpensive or home-made test lamps may not include sufficient protection against high-energy faults. It is customary to connect a test lamp to a known live circuit both before and after testing an unknown circuit, to check for failure of the test lamp itself.\nIn the UK, guidelines established by the Health and Safety Executive (HSE) provide recommendations for the construction and use of test lamps. Probes must be well-insulated, with minimal exposure of live terminals, with finger guards to prevent accidental contact, and must not expose live wires if the test lamp glass bulb is broken. To limit the", "-31.042492006672546" ], [ "Bomb Alarm System The Bomb Alarm System (also known as the Bomb Alarm Display System) was a US and UK network of optical bhangmeter sensors intended to confirm the detonation of an enemy nuclear weapon near cities or military installations within the US or at US operated early warning radar sites in the UK or Greenland.\nThe BAS was designed by Western Union in 1959 and was in full operation by 1962. The BAS was the responsibility of the 9th Space Division. The BAS operated until 1967.\nThe BAS sensors were designed to report the occurrence of a nuclear flash via telephone", "-31.036320605082437" ], [ "been proven to generate significant amounts of electromagnetic interference that can interfere with any Bluetooth devices a user has connected to the same computer. Various strategies can be applied to resolve the problem, ranging from simple solutions such as increasing the distance of USB 3.0 devices from any Bluetooth devices to purchasing better shielded USB cables. Car alarm Certain car manufacturers use the 2.4 GHz frequency for their car alarm internal movement sensors. These devices transmit on 2.45 GHz (between channels 8 and 9) at a strength of 500 mW. Because of channel overlap, this will cause problems for channels 6 and 11,", "-31.004126531479415" ], [ "logic circuits have made satellites more vulnerable to radiation, as the total electric charge in these circuits is now small enough so as to be comparable with the charge of incoming ions. Electronics on satellites must be hardened against radiation to operate reliably. The Hubble Space Telescope, among other satellites, often has its sensors turned off when passing through regions of intense radiation. A satellite shielded by 3 mm of aluminium in an elliptic orbit (200 by 20,000 miles (320 by 32,190 km)) passing the radiation belts will receive about 2,500 rem (25 Sv) per year (for comparison, a full-body dose of 5", "-30.98402447614353" ], [ "the type and level of threat to be generated.\nAt the top end of the scale, large outdoor test facilities incorporating high-energy EMP simulators have been built by several countries. The largest facilities are able to test whole vehicles including ships and aircraft for their susceptibility to EMP. Nearly all of these large EMP simulators used a specialized version of a Marx generator.\nExamples include the huge wooden-structured ATLAS-I simulator (also known as TRESTLE) at Sandia National Labs, New Mexico, which was at one time the world's largest EMP simulator. Papers on this and other large EMP simulators used by the United", "-30.98028328822693" ], [ "solar cell that allows the ionizing radiation to hit the solar cell while blocking unwanted wavelengths. Radiochromic film Self-developing radiochromic film can provide very high resolution measurements, for dosimetry and profiling purposes, particularly in radiotherapy physics.", "-30.94014876135043" ], [ "radiation. The gamma rays and the high-energy charged pions will cause heating and radiation damage if they are not shielded against. Unlike neutrons, they will not cause the exposed material to become radioactive by transmutation of the nuclei. The components needing shielding are the crew, the electronics, the cryogenic tankage, and the magnetic coils for magnetically assisted rockets. Two types of shielding are needed: radiation protection and thermal protection (different from Heat shield or thermal insulation).\nFinally, relativistic considerations have to be taken into account. As the by products of annihilation move at relativistic velocities the rest mass changes according to", "-30.849354285513982" ], [ "after such damage. On the other hand, activation-critical electronics within the weapon, such as capacitors, are selected so that they will fail before the safety device in the event of damage, ensuring that the weapon fails safe. Critical signal detection Nuclear weapons will only respond to a specific arming signal. This is passed to the weapon by a unique signal generator located outside the weapon. This output is specific and well-defined, precluding approximation, emulation, noise, or interference from being accepted as a false positive. Parameter recognition A further safeguard is the Environmental Sensing Device (ESD). It determines through environmental sensors", "-30.847134818090126" ], [ "and other sensors.\nOther systems similar to radar make use of other parts of the electromagnetic spectrum. One example is LIDAR, which uses predominantly infrared light from lasers rather than radio waves. With the emergence of driverless vehicles, radar is expected to assist the automated platform to monitor its environment, thus preventing unwanted incidents. First experiments As early as 1886, German physicist Heinrich Hertz showed that radio waves could be reflected from solid objects. In 1895, Alexander Popov, a physics instructor at the Imperial Russian Navy school in Kronstadt, developed an apparatus using a coherer tube for detecting distant lightning strikes.", "-30.807256347383372" ], [ "in a fall or other injury. The lamp provides no indication below the strike voltage of the neon lamp, and so cannot detect certain hazardous leakage conditions. Since it relies on capacitance to complete the circuit, direct-current potential cannot be reliably indicated. If the user of the screwdriver is isolated from ground and capacitively coupled to other nearby live wires, a false negative may occur when testing a live circuit, and a false positive when testing a dead circuit. False negatives may also occur in brightly lit areas which make the neon glow hard to see. Non-contact voltage detectors", "-30.774429617100395" ], [ "still unknown whether one could ever build a useful directed-energy anti-ICBM weapon, it was already possible to build an anti-SDI weapon that would blind such a system's sensors. One commentator went so far as to note that protecting the optics was \"impossible\".", "-30.73691873347343" ], [ "detector is \"solar blind\", meaning it will not cause an alarm in response to radiation from the Sun, so it can easily be used both indoors and outdoors.\nUV detectors are sensitive to most fires, including hydrocarbons, metals, sulfur, hydrogen, hydrazine, and ammonia. Arc welding, electrical arcs, lightning, X-rays used in nondestructive metal testing equipment (though this is highly unlikely), and radioactive materials can produce levels that will activate a UV detection system. The presence of UV-absorbing gases and vapors will attenuate the UV radiation from a fire, adversely affecting the ability of the detector to detect flames. Likewise, the presence", "-30.660257781040855" ], [ "demonstrating that the technology has the ability to be remotely deployed with no electrical supplies into difficult to access areas and locate radiation hazards. This study was part of ongoing work to investigate whether the technology is able to characterize more complex radiation environments as described previously. Oak Ridge National Laboratory, USA A number of trials took place at the US Department of Energy Oak Ridge National Laboratory (ORNL) during December 2010 as described previously. The overall objective for these trials was to demonstrate that a newly developed technology could be used to locate, quantify and characterise the radiological hazards", "-30.649519836180843" ], [ "this to gain unauthorized access to running Windows, Mac OS and Linux computers is the spyware FinFireWire. For this reason, high-security installations typically either use newer machines that map a virtual memory space to the FireWire \"Physical Memory Space\" (such as a Power Mac G5, or any Sun workstation), disable relevant drivers at operating system level, disable the OHCI hardware mapping between FireWire and device memory, physically disable the entire FireWire interface, or opt to not use FireWire or other hardware like PCMCIA, PC Card, ExpressCard or Thunderbolt, which expose DMA to external components.\nAn unsecured FireWire interface can be used", "-30.647767779930746" ], [ "sent to the guarded equipment.\nThe light beams emitted from the transmitter are sequenced, one after the other, and pulsed at a specific frequency. The receiver is designed to only accept the specific pulse and frequency from its dedicated transmitter. This enables the rejection of spurious infrared light and thus enhances their suitability as components within a safety system.\nTypically, light curtains are connected to a safety relay which will remove motive power from the hazard in the event that an object is detected. Safety relays can be provided with muting functionality which enables the temporary disabling of the safety function to", "-30.63135029003024" ], [ "has also been called laser spark spectroscopy (LSS).\nElectric sparks can also be used to create ions for mass spectrometry. Hazards Sparks can be hazardous to people, animals or even inanimate objects. Electric sparks can ignite flammable materials, liquids, gases and vapors. Even inadvertent static-discharges, or small sparks that occur when switching on lights or other circuits, can be enough to ignite flammable vapors from sources like gasoline, acetone, propane, or dust concentrations in the air, such as those found in flour mills or more generally in factories handling powders. Sparks often indicate the presence of a high voltage, or \"potential", "-30.627629447262734" ], [ "Technetium-99 Radiation The weak beta emission is stopped by the walls of laboratory glassware. Soft X-rays are emitted when the beta particles are stopped, but as long as the body is kept more than 30 cm away these should pose no problem. The primary hazard when working with technetium is inhalation of dust; such radioactive contamination in the lungs can pose a significant cancer risk. In the environment The long half-life of technetium-99 and its ability to form an anionic species make it (along with ¹²⁹I) a major concern when considering long-term disposal of high-level radioactive waste. Many of the processes", "-30.611528855981305" ], [ "the tracking “fan” of a PATRIOT radar, or fly outside the effective range of another system) then the missile will not be able to detect reflected radiation from the target and thus will be unable to continue the engagement.", "-30.543326542931027" ], [ "false alarm. Earlier sensors could not operate at speeds fast enough to allow for the incorporation of matched temporal filters that now eliminate solar glint as a false alarm contributor. Architectures Different system architectures have different capabilities and are used for specific applications. In general there are 2 architectures: stand-alone systems with local microphone arrays, and distributed sensor arrays (“wide-area acoustic surveillance”). The former are generally used for immediate detection and alerting to a nearby shooter in the vicinity of the system; such uses are typically used to help protect soldiers, military vehicles and craft, and also to protect small", "-30.5381475740287" ], [ "IRC channel, and attempts to terminate various security products and system monitoring tools.\nIts security level is low, hardly doing any damage to a computer. However, it has been reported to download and install spyware, more viruses, trojans, and worms, although this is not as yet officially been proven.", "-30.46687417308567" ], [ "can radiate sufficient radio frequency interference (RFI) to interfere with cordless telephones and Wi-Fi devices several feet or some meters away.\nIf an electrical conductor touches the outside of the globe, capacitive coupling can induce enough potential on it to produce a small arc. This is possible because the globe's glass acts as a capacitor dielectric: the inside of the lamp acts as one plate, and the conductive object on the outside acts as the opposite capacitor plate. This is a dangerous action which can damage the globe or other electronic devices, and presents a fire ignition hazard.", "-30.42784310458228" ], [ "during the device's lifetime. GaAs LEDs, common in optocouplers, are very sensitive to neutrons. The lattice damage influences the frequency of crystal oscillators. Kinetic energy effects (namely lattice displacement) of charged particles belong here too. Total ionizing dose effects The cumulative damage of the semiconductor lattice (lattice displacement damage) caused by ionizing radiation over the exposition time. It is measured in rads and causes slow gradual degradation of the device's performance. A total dose greater than 5000 rads delivered to silicon-based devices in seconds to minutes will cause long-term degradation. In CMOS devices, the radiation creates electron–hole pairs in the", "-30.39296369283693" ], [ "an antenna, so protection circuits must detect the loss of the antenna and switch off the transmitter immediately. Tube-based transmitters must have power applied in the proper sequence, with the filament voltage applied before the anode voltage, otherwise the tubes can be damaged. The output stage must be monitored for standing waves, which indicate that generated power is not being radiated but instead is being reflected back into the transmitter.\nLightning protection is required between the transmitter and antenna. This consists of spark gaps and gas-filled surge arresters to limit the voltage that appears on the transmitter terminals. The control instrument", "-30.376375209219987" ], [ "system. This meant the PAR buildings had to be hardened against attack and the effects of electromagnetic pulse (EMP). GE began working on the new design and submitted their Phase I initial results in April. However, the follow-on Phase II design effort was then paused while the team re-evaluated the entire concept in light of studies carried out by the Institute for Defense Analyses (IDA) the previous summer.\nConsidering the effects of nuclear blackout, the IDA noticed that the effect is strongly related to frequency; in the VHF band, the effect lasts for several minutes, while in the microwave region it", "-30.311850225785747" ], [ "detectable by human senses, so radiation detection instruments such as Geiger counters must be used to indicate its presence and measure it. However, high intensities can cause emission of visible light upon interaction with matter, such as in Cherenkov radiation and radioluminescence. Ionizing radiation is used in a wide variety of fields such as medicine, nuclear power, research, manufacturing, construction, and many other areas, but presents a health hazard if proper measures against undesired exposure are not followed. Exposure to ionizing radiation causes damage to living tissue, and can result in radiation burns, cell damage, radiation sickness, cancer, and death.", "-30.300654688850045" ], [ "Luminescent solar concentrator A luminescent solar concentrator (LSC) is a device for concentrating radiation, solar radiation in particular, to produce electricity. Luminescent solar concentrators operate on the principle of collecting radiation over a large area, converting it by luminescence (specifically by fluorescence) and directing the generated radiation into a relatively small output target. Design Initial designs typically comprised parallel thin, flat layers of alternating luminescent and transparent materials, placed to gather incoming radiation on their (broader) faces and emit concentrated radiation around their (narrower) edges. Commonly the device would direct the concentrated radiation onto solar cells to generate electric power.\nOther", "-30.23920926748542" ], [ "of the programs. Iraq War During the Iraq War, electromagnetic weapons, including high power microwaves, were used by the U.S. military to disrupt and destroy Iraqi electronic systems and may have been used for crowd control. Types and magnitudes of exposure to electromagnetic fields are unknown. Alleged tracking of Space Shuttle Challenger The Soviet Union invested some effort in the development of ruby and carbon dioxide lasers as anti-ballistic missile systems, and later as a tracking and anti-satellite system. There are reports that the Terra-3 complex at Sary Shagan was used on several occasions to temporarily \"blind\" US spy satellites", "-30.222573276943876" ], [ "a compromise that has shifted over time. For example, at one time, assistants in shoe shops used X-rays to check a child's shoe size, but this practice was halted when the risks of ionizing radiation were better understood.\nNeutron radiation is essential to the working of nuclear reactors and nuclear weapons. The penetrating power of x-ray, gamma, beta, and positron radiation is used for medical imaging, nondestructive testing, and a variety of industrial gauges. Radioactive tracers are used in medical and industrial applications, as well as biological and radiation chemistry. Alpha radiation is used in static eliminators and smoke detectors. The", "-30.215779938618653" ], [ "In most power plant scenarios, where the radiation environment is dominated by X- or gamma rays applied uniformly to the whole body, 1 rad of absorbed dose gives 1 rem of effective dose. In other situations, the effective dose in rem might be thirty times higher or thousands of times lower than the absorbed dose in rad. Material effects Silicon-based microelectronics break down under exposure to radiation. Radiation-hardened components designed for military or nuclear applications can survive up to 100 Mrad (1 MGy).\nMetals creep, harden, and become brittle under the effect of radiation.\nFoods and medical equipment can be sterilized with", "-30.19569593889173" ], [ "any anti-virus (or firewall) software installed and operational may be at increased risk for Camfecting. Softcams may nominally increase this risk, if not maintained or configured properly.", "-30.174357822164893" ], [ "laser light is generated from an infrared laser beam, which should be confined\nwithin the laser housing; however, more than 75% of the devices tested were found to emit infrared light in excess of the limit. Malicious use Laser pointers, with their very long range, are often maliciously shone at people to distract or annoy them, or for fun. This is considered particularly hazardous in the case of aircraft pilots, who may be dazzled or distracted at critical times. According to an MSNBC report there were over 2,836 incidents logged in the US by the FAA in 2010. Illumination by handheld", "-30.148935512814205" ], [ "to deliver the damaging effects of high-energy EMP. Frequency ranges A pulse of electromagnetic energy typically comprises many frequencies from DC (zero Hz) to some upper limit depending on the source. The range defined as EMP, sometimes referred to as \"DC to daylight\", excludes the highest frequencies comprising the optical (infrared, visible, ultraviolet) and ionizing (X and gamma rays) ranges.\nSome types of EMP events can leave an optical trail, such as lightning and sparks, but these are side effects of the current flow through the air and are not part of the EMP itself. Lightning Lightning is unusual in that", "-30.10982137650717" ], [ "another target. Smartphones, tablet computers, smart watches, and other mobile devices such as quantified self devices like activity trackers have sensors such as cameras, microphones, GPS receivers, compasses, and accelerometers which could be exploited, and may collect personal information, including sensitive health information. WiFi, Bluetooth, and cell phone networks on any of these devices could be used as attack vectors, and sensors might be remotely activated after a successful breach.\nThe increasing number of home automation devices such as the Nest thermostat are also potential targets. Large corporations Large corporations are common targets. In many cases attacks are aimed at financial", "-30.104652241803706" ], [ "some simple monitoring electronics and are only available from a few manufacturers.\nTwo common photothyristors include the light-activated SCR (LASCR) and the light-activated TRIAC. A LASCR acts as a switch that turns on when exposed to light. Following light exposure, when light is absent, if the power is not removed and the polarities of the cathode and anode have not yet reversed, the LASCR is still in the \"on\" state. A light-activated TRIAC resembles a LASCR, except that it is designed for alternating currents.", "-30.077701583039016" ], [ "with gigawatts of power produced by this machine, when aimed at enemy missiles and aircraft will cripple their electronic system and computer chips and bring them down right away. Overview The Kali is a particle accelerator. It emits powerful pulses of electrons (Relativistic Electron Beams- REB). Other components in the machine down the line convert the electron energy into EM Radiation, which can be adjusted to x-ray (as Flash X-Rays) or microwave (High Power Microwave) frequencies.\nThis has fueled hopes that the KALI could, one day be used in a High-Power Microwave gun, which could destroy incoming missiles and aircraft", "-30.059087556990562" ], [ "the cost of the installation of the new system is absorbed by those customers. Security Smart meters expose the power supply to cyberattacks that could lead to power outages, both by cutting off people's electricity and by overloading the grid. However many cyber security experts state that smart meters of UK and Germany have a relatively high cybersecurity and that any such attack there would thus require extraordinarily high efforts or financial resources.\nImplementing security protocols that protect these devices from malicious attacks has been problematic, due to their limited computational resources and long operational life.\nThe current version of IEC 62056", "-30.057368292997126" ], [ "High-altitude nuclear explosion EMP generation The strong electromagnetic pulse (EMP) that results has several components. In the first few tenths of nanoseconds, about a tenth of a percent of the weapon yield appears as powerful gamma rays with energies of one to three mega-electron volts (MeV, a unit of energy). The gamma rays penetrate the atmosphere and collide with air molecules, depositing their energy to produce huge quantities of positive ions and recoil electrons (also known as Compton electrons). The impacts create MeV-energy Compton electrons that then accelerate and spiral along the Earth's magnetic field lines. The resulting transient electric", "-30.044312678975984" ], [ "scanned array radar sensor developed by RADA Electronic Industries and an optional passive infrared detector developed by Elbit's Elisra. When a threat is imminent, an explosive projectile interceptor is launched towards it. The interceptor explodes very near the threat, destroying or deflecting and destabilizing it by detonating its warhead. For this, only the blast effect of the explosive is used. The interceptor casing is made of combustible materials so minimal fragmentation is formed in the explosion, helping minimize collateral damage.\nAcquisition of the Iron Fist active protection system was approved in June 2009. The system was to be installed on several", "-30.023730544897262" ], [ "area 400 kilometres (250 mi) across for five minutes. Careful selection of the burst altitudes and locations can produce an extremely effective radar-blanking effect.\nThe physical effects giving rise to blackout are those that also cause EMP, which itself can cause power blackouts. The two effects are otherwise unrelated, and the similar naming can be confusing. Ionizing radiation About 5% of the energy released in a nuclear air burst is in the form of ionizing radiation: neutrons, gamma rays, alpha particles and electrons moving at speeds up to the speed of light. Gamma rays are high energy electromagnetic radiation; the others are", "-30.018288463994395" ], [ "with multiple layers of aluminium foil to effectively shield the RF label from detection, much like a Faraday cage. A similar situation would be the loss of signal that a cell phone suffers inside an elevator: The electro-magnetic, or radio, waves are effectively blocked, reducing the ability to send or receive information.\nHowever, they may miss some tags or be unable to remove or deactivate all of them, especially if concealed or integrated tags are used. As a service to retailers, many manufacturers integrate security tags in the packaging of their products, or even inside the product itself, though this is", "-30.0067887386831" ], [ "harmful effects of uncontrolled radiation. \nNuclear engineers and radiological scientists are interested in developing more advanced ionizing radiation measurement and detection systems, and using these advances to improve imaging technologies; these areas include detector design, fabrication and analysis, measurements of fundamental atomic and nuclear parameters, and radiation imaging systems, among others.", "-29.968957894365303" ], [ "morning, a serious investigation into the incident would be called for. There are a number of software and hardware devices that can be used to supplement the usual logs and usual other safety measures. RF shielding It's practical in some cases to apply specialized wall paint and window film to a room or building to significantly attenuate wireless signals, which keeps the signals from propagating outside a facility. This can significantly improve wireless security because it's difficult for hackers to receive the signals beyond the controlled area of an enterprise, such as within parking lots. Denial of service defense", "-29.95623560505919" ], [ "task, which could be aiming a weapon at someone, or looking at a screen with sensitive information, or dialing a phone.\" Shwaery says that an LED-based device could be safer than a laser-based device intended to achieve the same effects \"Getting an eye-safe wavelength with a laser has been very difficult.\" Shwaery says that the presence of a range-finder and circuitry to modify the intensity of the light depending on the range in the LED device increases its safety. \"The ideal goal for nonlethal technologies is that they be scalable.\" It was intended to be released to police, border patrol", "-29.940810653322842" ], [ "Bofors HPM Blackout Bofors HPM Blackout is a high-powered microwave weapon system, built by BAE Systems, which is stated to be able to destroy at distance a wide variety of commercial off-the-shelf (COTS) electronic equipment. It is stated to be non-lethal to humans. The total weight of the weapon system is less than 500 kg.", "-29.925986068483326" ], [ "Cold-cathode fluorescent lamps were used as backlighting for LCDs in computer monitors and televisions before the use of LED-backlit LCDs. They are also popular with computer case modders in recent years. Science demonstrations Fluorescent lamps can be illuminated by means other than a proper electrical connection. These other methods, however, result in very dim or very short-lived illumination, and so are seen mostly in science demonstrations. Static electricity or a Van de Graaff generator will cause a lamp to flash momentarily as it discharges a high voltage capacitance. A Tesla coil will pass high-frequency current through the tube, and since", "-29.876412598692696" ], [ "activity or enemy attack, while not dismissed, was suggested to be overblown by the news media in a commentary in Physics Today. Instead, the weapons from rogue states were still too small and uncoordinated to cause a massive EMP, underground infrastructure is sufficiently protected, and there will be enough warning time from continuous solar observatories like SOHO to protect surface transformers should a devastating solar storm be detected. Nuclear fallout Nuclear fallout is the residual radioactive dust and ash propelled into the upper atmosphere following a nuclear explosion. Fallout is usually limited to the immediate area, and can only spread", "-29.841979646182153" ], [ "machine guns have been introduced. There are guides in the zone who will provide fast-travel for a fee. Emissions, powerful waves that are sometimes visible or invisible (determinant by intensity), unleash lethal radiation, psi-emissions, and other unknown particles and energy directly from the Chernobyl Nuclear Power Plant, directly affecting the Noosphere in The Exclusion Zone, making it deadly to all lifeforms except specific mutants. Emissions also occur on an infrequent basis, requiring the player to take cover in a building or underground area pointed out by the PDA. If not adequately concealed, the player's nervous system shuts down, resulting in", "-29.84138466703007" ], [ "are available which incorporate blocking filters, thus greatly improving eye safety. The most recent such design also incorporates protection against red fault locating lasers. Non-beam hazards – electrical and other While most of the danger of lasers comes from the beam itself, there are certain non-beam hazards that are often associated with use of laser systems. Many lasers are high voltage devices, typically 400 V upward for a small 5 mJ pulsed laser, and exceeding many kilovolts in higher powered lasers. This, coupled with high pressure water for cooling the laser and other associated electrical equipment can create a greater hazard", "-29.82274517347105" ] ]
3h79k2
When you drink a significantly larger amount of liquid than the average bladder can hold, what does the body do with surplus until it's time to let it go?
[ "Consumed liquid doesn't immediately find its way to the bladder. First, it sits around in the stomach until the stomach contents are sufficiently digested, where the mixture is passed to the intestines. Most of the water is absorbed into the blood stream in the large intestine. Once in the blood, the excess water is removed by the kidneys and then passed down to the bladder. All of these processes take time, and the bladder gradually fills until you feel the urge to urinate.", "The urine will stay in your vascular system for some time until the kidneys can take in the fluid to be filtered and sent to the bladder. If, for say, the person is unable to urinate (urinary retention) and there is a surplus of fluid in the body, it can cause the urine to back up into the kidneys causing them to swell. This can cause the kidneys to fail. The person may also develop urinary or kidney infection. Not common, but if the walls of the bladder are weak, the bladder can rupture which is life threatening. Also, if the bladder is frequently overfilled, the bladder can lose its ability to contract to release the urine from the body.", "Type 1 diabetic here. Pre diagnosis I was DYING of thirst. Quenchless, unfaltering thirst. I got mad one day and drank 5 RT44 Sonic cups of water to try and quench it. I peed for 2 min and 43 sec. I always wondered where my body put the water while my kidneys turbo processed it!", "Imagine a mountain in a forest. Small creeks and rivers flow down off the mountain and drain away water that builds up. Now imagine when a huge rainfall happens. The rivers don't instantly fill up; it takes time for the rain to filter down through the trees and the dirt and eventually reach the creek beds that go on to feed the rivers. The water will eventually get drained away, but it takes time; same as your body.", "The bladder of a healthy adult is only approximately 1/3 full when you first get the urge to pee, so it continues to fill. This is the body's mechanism to keep the bladder from becoming too full." ]
[ [ "without having to waste energy in swimming. The bladder is found only in the bony fishes. In the more primitive groups like some minnows, bichirs and lungfish, the bladder is open to the esophagus and doubles as a lung. It is often absent in fast swimming fishes such as the tuna and mackerel families. The condition of a bladder open to the esophagus is called physostome, the closed condition physoclist. In the latter, the gas content of the bladder is controlled through a rete mirabilis, a network of blood vessels effecting gas exchange between the bladder and the blood. Weberian", "-32.76168551562296" ], [ "50 ml is a significant amount of urine and increases the potential for recurring urinary tract infections. In adults older than 60 years, 50-100 ml of residual urine may remain after each voiding because of the decreased contractility of the detrusor muscle. In chronic retention, ultrasound of the bladder may show massive increase in bladder capacity (normal capacity is 400-600 ml).\nNon-neurogenic chronic urinary retention does not have a standardized definition; however, urine volumes >300mL can be used as an informal indicator. Diagnosis of urinary retention is conducted over a period of 6 months, with 2 separate measurements of urine volume 6 months apart.", "-31.902629904216155" ], [ "from the uterus by the vesico-uterine pouch. In infants and young children the urinary bladder is in the abdomen even when empty. Function Urine, excreted by the kidneys, collects in the bladder before disposal by urination (micturition). The urinary bladder usually holds 300-350 ml of urine. As urine accumulates, the rugae flatten and the wall of the bladder thins as it stretches, allowing the bladder to store larger amounts of urine without a significant rise in internal pressure. Urination is controlled by the pontine micturition center in the brainstem. Investigation Urodynamic testing can help to explain the symptoms. Reptiles In all", "-31.07169724176856" ], [ "$223.5 billion in economic costs in 2006.² More than half of these deaths and three-quarters of the economic costs are due to binge drinking¹ ᵃⁿᵈ ² (≥4 drinks for women; ≥5 drinks for men, per occasion). Urinary system The bladder may rupture if overfilled and not emptied. This can occur in the case of binge drinkers having consumed very large quantities, but are not aware, due to stupor, of the need to urinate. This condition is very rare in women, but it does occur. Symptoms include localized pain and uraemia (poisoning due to reabsorbed waste). The recovery rate is high,", "-30.619126414647326" ], [ "Fuel bladder Fuel bladders or fuel storage bladders are collapsible, flexible storage bladders (also known as tanks) that provide temporary or long term storage for industrial liquids (e.g. fuels). These pillow shaped tanks are designed for large volume liquid transport, industrial chemicals, potable water, sludge, and fuel storage. Standard fuel bladder tanks sizes range from 100 US gallons (380 L) to 200,000 US gallons (760,000 L) capacities and larger and custom fuel storage bladders and cells are available, although at sizes exceeding 50,000 US gallons (190,000 L) there is an increased spill risk. To minimize the risk of leakage, and for the", "-29.78833716965164" ], [ "even though the neural activity associated with a full bladder comes from the bladder itself, and can be felt there as well. In females the need to urinate is felt in the lower abdomen region when the bladder is full. When the bladder becomes too full, the sphincter muscles will involuntarily relax, allowing urine to pass from the bladder. Release of urine is experienced as a lessening of the discomfort. Deafferentation When the sacral dorsal roots are cut in experimental animals or interrupted by diseases of the dorsal roots such as tabes dorsalis in humans, all reflex contractions of the", "-29.470480395044433" ], [ "being dispersed around an average of 21 seconds (standard deviation 13 seconds), despite a 4 order of magnitude (1000×) difference in bladder volume. This is due to increased urethra length of large animals, which amplifies gravitational force (hence flow rate), and increased urethra width, which increases flow rate. For smaller mammals a different phenomenon occurs, where urine is discharged as droplets, and urination in smaller mammals, such as mice and rats, can occur in less than a second. The posited benefits of faster voiding are decreased risk of predation (while voiding) and decreased risk of urinary tract infection. Voluntary control", "-29.289754707664542" ], [ "gas can be removed in a similar manner.\nIn more derived varieties of fish (the physoclisti) the connection to the digestive tract is lost. In early life stages, these fish must rise to the surface to fill up their swim bladders; in later stages, the pneumatic duct disappears, and the gas gland has to introduce gas (usually oxygen) to the bladder to increase its volume and thus increase buoyancy. In order to introduce gas into the bladder, the gas gland excretes lactic acid and produces carbon dioxide. The resulting acidity causes the hemoglobin of the blood to lose its oxygen (Root", "-29.27725112286862" ], [ "then releases it through the urethra, the canal that carries urine to the outside of the body. Controlling this activity involves nerves, muscles, the spinal cord and the brain.\nThe bladder is made of two types of muscles: the detrusor, a muscular sac that stores urine and squeezes to empty, and the sphincter, a circular group of muscles at the bottom or neck of the bladder that automatically stay contracted to hold the urine in and automatically relax when the detrusor contracts to let the urine into the urethra. A third group of muscles below the bladder (pelvic floor muscles) can", "-28.711126061622053" ], [ "open to the esophagus and double as a lung. It is often absent in fast swimming fishes such as the tuna and mackerel families. The condition of a bladder open to the esophagus is called physostome, the closed condition physoclist. In the latter, the gas content of the bladder is controlled through the rete mirabilis, a network of blood vessels effecting gas exchange between the bladder and the blood.\nIn some fish, a rete mirabile fills the swim bladder with oxygen. A countercurrent exchange system is utilized between the venous and arterial capillaries. By lowering the pH levels in the venous", "-28.684029271527834" ], [ "Urinary retention Chronic Chronic urinary retention that is due to bladder blockage which can either be as a result of muscle damage or neurological damage. If the retention is due to neurological damage, there is a disconnect between the brain to muscle communication, which can make it impossible to completely empty the bladder. If the retention is due to muscle damage, it is likely that the muscles are not able to contract enough to completely empty the bladder.\nThe most common cause of chronic urinary retention is BPH. BPH is a result of the ongoing process of testosterone being converted to", "-28.659292989992537" ], [ "in a unique lining called urothelium, a type of transitional epithelium. Unlike the epithelial lining of most organs, transitional epithelium can flatten and distend. Urothelium covers most of the urinary system, including the renal pelvis, ureters, and bladder. Urine formation Average urine production in adult humans is about 1–2 litres (L) per day, depending on state of hydration, activity level, environmental factors, weight, and the individual's health. Producing too much or too little urine requires medical attention. Polyuria is a condition of excessive urine production (> 2.5 L/day). Oliguria when < 400 mL (millilitres) are produced, and anuria one of", "-28.626536123483675" ], [ "the body. Duration Research looking at the duration of urination in a range of mammal species found that nine larger species urinated for 21 ± 13 seconds irrespective of body size. Smaller species including rodents and bats cannot produce jets and instead urinate with a series of drops. Quantity Average urine production in adult humans is around 1.4 L of urine per person per day with a normal range of 0.6 to 2.6 L per person per day, produced in around 6 to 8 urinations per day depending on state of hydration, activity level, environmental factors, weight, and the individual's", "-28.59283240669174" ], [ "or expand according to the ambient pressure. The walls of the bladder contain very few blood vessels and are lined with guanine crystals, which make them impermeable to gases. By adjusting the gas pressurising organ using the gas gland or oval window the fish can obtain neutral buoyancy and ascend and descend to a large range of depths. Due to the dorsal position it gives the fish lateral stability.\nIn physostomous swim bladders, a connection is retained between the swim bladder and the gut, the pneumatic duct, allowing the fish to fill up the swim bladder by \"gulping\" air. Excess", "-28.516686960207153" ], [ "the body.\nThere are two systems that create a hyperosmotic medulla and thus increase the body plasma volume: Urea recycling and the 'single effect.'\nUrea is usually excreted as a waste product from the kidneys. However, when plasma blood volume is low and ADH is released the aquaporins that are opened are also permeable to urea. This allows urea to leave the collecting duct into the medulla, creating a hyperosmotic solution that \"attracts\" water. Urea can then re-enter the nephron and be excreted or recycled again depending on whether ADH is still present or not.\nThe 'single effect' describes the fact that the", "-28.42781282449141" ], [ "bladder protects the underlying tissue from urine. In the uterus, the mucous membrane is called the endometrium, and it swells each month and is then eliminated during menstruation. Nutrition Niacin and vitamin A are essential nutrients that help maintain mucous membranes.", "-28.382490232092096" ], [ "out of the urethra. The micturition reflex normally produces a series of contractions of the urinary bladder.\nThe flow of urine through the urethra has an overall excitatory role in micturition, which helps sustain voiding until the bladder is empty.\nAfter urination, the female urethra empties partially by gravity, with assistance from muscles. Urine remaining in the male urethra is expelled by several contractions of the bulbospongiosus muscle, and, by some men, manual squeezing along the length of the penis to expel the rest of the urine.\nFor land mammals over 1 kilogram, the duration of urination does not vary with body mass,", "-28.226759954769477" ], [ "effect) which then diffuses partly into the swim bladder. The blood flowing back to the body first enters a rete mirabile where virtually all the excess carbon dioxide and oxygen produced in the gas gland diffuses back to the arteries supplying the gas gland. Thus a very high gas pressure of oxygen can be obtained, which can even account for the presence of gas in the swim bladders of deep sea fish like the eel, requiring a pressure of hundreds of bars. Elsewhere, at a similar structure known as the oval window, the bladder is in contact with blood and", "-27.96937284222804" ], [ "Swim bladder The swim bladder, gas bladder, fish maw, or air bladder is an internal gas-filled organ that contributes to the ability of many bony fish (but not cartilaginous fish) to control their buoyancy, and thus to stay at their current water depth without having to waste energy in swimming. Also, the dorsal position of the swim bladder means the center of mass is below the center of volume, allowing it to act as a stabilizing agent. Additionally, the swim bladder functions as a resonating chamber, to produce or receive sound. \nThe swim bladder is evolutionarily homologous to the", "-27.94894564151764" ], [ "to body temperature, only to discharge it as dilute urine, involves an appreciable caloric cost. However, if such sows are given a bulky high-fibre food (which under typical circumstances would result in an increase in water intake), they spend much longer eating, and the excessive drinking largely disappears. In this case, much of the sows’ water intake appeared to be adjunctive drinking that was not linked to thirst.", "-27.914453964331187" ], [ "the gastrointestinal tract and well distributed in body tissues and fluids. 50% is excreted unchanged in urine.", "-27.73274876497453" ], [ "the person may reach a stage where they are no longer able to refrain from urination and involuntary voiding of the bladder may take place. Instances of this sort will often result in full emptying of the bladder, but are likely to be one-off or rare occurrences. Excessive alcohol consumption can also cause episodes of incontinence in otherwise healthy adults.", "-27.66226424393244" ], [ "bladder on its outer back surface at the slit-like ureteric orifices. In the contracted bladder they are about 25 mm (1 in) apart and about the same distance from the internal urethral orifice; in the distended bladder these measurements may be increased to about 50 mm (2 in).\nThe junction between the pelvis of the kidney and the ureters is known as the ureteropelvic junction or ureteral pelvic junction, and the junction between the ureter and the bladder is known as the ureterovesical (ureter-bladder) junction. At the entrance to the bladder, the ureters are surrounded by valves known as ureterovesical valves, which prevent vesicoureteral reflux", "-27.550117712147767" ], [ "even if the bladder is full and cause a large bladder capacity. The internal urinary spincter is intact, however urinary incontinence is common. This is caused from damage to the peripheral nerves. Mixed Mixed type of neurogenic bladder can cause a combination of the above presentations. In mixed type A, the detrusor is flaccid but the spincter is overactive. This causes a large, low pressure bladder and inability to void although not as much risk for kidney damage as a spastic bladder. Mixed type B is characterized by a flaccid external sphincter and a spastic bladder causing problems with incontinence.", "-27.49951334942307" ], [ "organ sense when its limit is reached, triggering a vomit reflex that swiftly empties the stomach. Moreover, drinking a gallon of milk is more difficult than drinking a gallon of water. The fat and protein in milk each inhibit the stomach from releasing its contents into the small intestine, forcing more of the liquid to remain in the stomach. In turn, the action of gastric acid and proteases in the stomach cause proteins in the milk to unravel and expand the liquid into a thick semi-solid substance, further reducing the amount of fluid that can be held in the stomach", "-27.437398259411566" ], [ "see in the graph, urine flow recovers rapidly and subsequently overshoots the typical daily output (between 800 mL and 2L in most people). Since the kidney's resorption capacity takes longer to re-establish, there is a minor lag in function that follows recovery of flow. A good reference range for plasma creatinine is between 0.07 - 0.12 mmol/L. Immersion diuresis Immersion diuresis is caused by immersion of the body in water (or equivalent liquid). It is mainly caused by lower temperature and by pressure.\nThe temperature component is caused by water drawing heat away from the body and causing vasoconstriction of the cutaneous", "-27.426548819814343" ], [ "bladder are abolished. The bladder becomes distended, thin-walled, and hypotonic, but there are some contractions because of the intrinsic response of the smooth muscle to stretch. Denervation When the afferent and efferent nerves are both destroyed, as they may be by tumors of the cauda equina or filum terminale, the bladder is flaccid and distended for a while. Gradually, however, the muscle of the \"decentralized bladder\" becomes active, with many contraction waves that expel dribbles of urine out of the urethra. The bladder becomes shrunken and the bladder wall hypertrophied. The reason for the difference between the small, hypertrophic bladder", "-27.28847458452219" ], [ "the volume is severely depleted, however, the body will retain water at the expense of deranging electrolyte levels.\nThe regulation of urine production occurs in the hypothalamus, which produces ADH in the supraoptic and paraventricular nuclei. After synthesis, the hormone is transported in neurosecretory granules down the axon of the hypothalamic neuron to the posterior lobe of the pituitary gland, where it is stored for later release. In addition, the hypothalamus regulates the sensation of thirst in the ventromedial nucleus by sensing increases in serum osmolarity and relaying this information to the cortex.\nNeurogenic/central DI results from a lack of ADH; occasionally", "-27.23972174074879" ], [ "some physostomes (though not all) can use their gas bladder as a lung, allowing them to live from atmospheric oxygen in conditions where aquatic oxygen levels have dropped to a point which would kill other fish.", "-27.20359816076234" ], [ "in the bladder was significantly reduced. The other parameters, namely the maximum urinary flow and the voiding time were increased and decreased respectively. For healthy males, no influence was found on these parameters, meaning that they can urinate in either position. Treatment Treatment depends on the underlying cause of the obstruction and the severity of the symptoms.", "-27.186571493075462" ], [ "liquid pool. Liquid will ultimately escape from the reticulorumen from absorption through the wall, or through passing through the reticulo-omosal orifice, as digesta does. However, since liquid cannot be trapped in the mat as digesta can, liquid passes through the rumen much more quickly than digesta does. Liquid often acts as a carrier for very small digesta particles, such that the dynamics of small particles is similar to that of liquid.\nThe uppermost area of the rumen, the headspace, is filled with gases (such as methane, carbon dioxide, and, to a much lower degree, hydrogen) released from fermentation", "-27.1135540312971" ], [ "common ostriches drink relatively large volumes of water daily, and excrete generous quantities of highly concentrated urine. It is when drinking water is unavailable or withdrawn, that the urine becomes highly concentrated with uric acid and urates. It seems that common ostriches who normally drink relatively large amounts of water tend to rely on renal conservation of water when drinking water is scarce within the kidney system. Though there have been no official detailed renal studies conducted on the flow rate (Poiseuille's Law) and composition of the ureteral urine in the ostrich, knowledge of renal function has been based on", "-26.97460076335119" ], [ "change. Swim bladder overexpansion Fish with isolated swim bladders are susceptible to barotrauma of ascent when brought to the surface by fishing. The swim bladder is an organ of buoyancy control which is filled with gas extracted from solution in the blood, and which is normally removed by the reverse process. If the fish is brought upwards in the water column faster than the gas can be resorbed, the gas will expand until the bladder is stretched to its elastic limit, and may rupture.\nBarotrauma can be directly fatal or disable the fish rendering it vulnerable to predation, but rockfish are", "-26.84540898213163" ], [ "Potomania Pathophysiology The normal human kidney, through suppression of anti-diuretic hormone, is normally able to excrete vast amounts of dilute urine. Thus a normal adult can drink up to 20 liters per day of water without becoming hyponatremic. However, the intake of solutes is also necessary to excrete free water. Under normal circumstances, this is clinically irrelevant. In the lack of proper solute intake, the amount of free water excretion can be severely limited. Without adequate solute intake, the normal functioning electrolyte gradient that pulls water into urine will be effectively destroyed.\nBriefly, to excrete free water from urine, the urine", "-26.808540932252072" ], [ "more difficult to match fluid loss by reducing urine output (the kidneys must produce at least some urine in order to excrete metabolic waste.) Routes of fluid loss and gain Fluid can leave the body in many ways. Fluid can enter the body as preformed water, ingested food and drink and to a lesser extent as metabolic water which is produced as a by-product of aerobic respiration (cellular respiration) and dehydration synthesis. Input A constant supply is needed to replenish the fluids lost through normal physiological activities, such as respiration, sweating and urination. Water generated from the biochemical metabolism of", "-26.778831864590757" ], [ "body by receiving Kidney chi.\nImbalance of the Bladder leads to frequent or uncontrolled urination.\nThe Bladder Meridian begins in the corner of the eye, moves down the back, and ends on the back of the knee.\nThe Bladder also has another line, which starts alongside the previous line, moves down to the outer edge of the foot and ends on the small toe.", "-26.628469144488918" ], [ "volume in adults is between 2 and 4 litres. Relations The stomach bed refers to the structures upon which the stomach rests in mammals. These include the pancreas, spleen, left kidney, left suprarenal gland, transverse colon and its mesocolon, and the diaphragm. The term was introduced around 1896 by Philip Polson of the Catholic University School of Medicine, Dublin. However this was brought into disrepute by surgeon anatomist J Massey. Blood supply The lesser curvature of the human stomach is supplied by the right gastric artery inferiorly and the left gastric artery superiorly, which also supplies the cardiac region.", "-26.59233842670801" ], [ "the plasma is much higher than it is in the surrounding water. The animals are well-hydrated, and the urine in the cloaca is abundant and dilute, nitrogen being excreted as ammonium bicarbonate. Sodium loss is low and mainly takes place through the skin in freshwater conditions. In seawater, the opposite is true. The osmolality in the plasma is lower than the surrounding water, which is dehydrating for the animal. The cloacal urine is much more concentrated, white, and opaque, with the nitrogenous waste being mostly excreted as insoluble uric acid. Distribution and habitat Crocodilians are amphibious reptiles, spending part of", "-26.491061084903777" ], [ "a standard method for bladder emptying. The technique is safe and effective and results in improved kidney and upper urinary tract status, lessening of vesicoureteral reflux and amelioration of continence. In addition to the clinical benefits, patient quality of life is enhanced by the increased independence and security offered by self-catheterization. Catheter maintenance A catheter that is left in place for more than a short period of time is generally attached to a drainage bag to collect the urine. This also allows for measurement of urine volume. There are three types of drainage bags: The first is a leg", "-26.461980846419465" ], [ "tightly contracted at the same time. This phenomenon is also called detrusor external sphincter dyssynergia (DESD). This can cause urinary retention with high pressures in the bladder that could damage the kidneys. The bladder volume is usually smaller than normal due to increased muscle tone of the detrusor. Spastic neurogenic bladder is usually caused by damage to the spinal cord above the level of the 10th thoracic vertebrae (T10). Flaccid In flaccid (also known as lower motor neuron or hypotonic) bladder, the muscles of the bladder lose ability to contract normally. This can cause the inability to void urine", "-26.39890344883497" ], [ "present within the kidneys. An interesting fact of common ostriches is that when water is freely available, the urine osmolality can reduce to 60–70 mOsm, not losing any necessary solutes from the kidneys when excess water is excreted. Dehydrated or salt-loaded ostriches can reach a maximal urine osmolality of approximately 800 mOsm. When the plasma osmolality has been measured simultaneously with the maximal osmotic urine, it is seen that the urine:plasma ratio is 2.6:1, the highest encountered among avian species. Along with dehydration, there is also a reduction in flow rate from 20 L·d⁻¹ to only 0.3–0.5 L·d⁻¹.\nIn mammals and common", "-26.392116927541792" ], [ "balloon-like organ. The bladder connects to the urethra, the tube through which urine leaves the body.\nDuring urination, detrusor muscles in the wall of the bladder contract, forcing urine out of the bladder and into the urethra. At the same time, sphincter muscles surrounding the urethra relax, letting urine pass out of the body. Incontinence will occur if the bladder muscles suddenly contract (detrusor muscle) or muscles surrounding the urethra suddenly relax (sphincter muscles). Children Urination, or voiding, is a complex activity. The bladder is a balloonlike muscle that lies in the lowest part of the abdomen. The bladder stores urine,", "-26.36346921196673" ], [ "The ureter opens at first into the hind-end of the Wolffian duct; after the sixth week it separates from the Wolffian duct, and opens independently into the part of the cloaca which ultimately becomes the urinary bladder. The renal tubules become arranged into renal pyramids, and the lobulated condition of the kidneys exists for some time after birth, while traces of it may be found even in the adult. The kidney of the ox and many other animals, on the other hand, remains lobulated throughout life. Urinary bladder The urinary bladder is formed partly from the endodermal cloaca and partly", "-26.3392450370593" ], [ "is maintained by a gas-filled swim bladder which can be expanded or contracted as the circumstances require. A disadvantage of this method is that adjustments need to be made constantly as the water pressure varies when the fish swims higher and lower in the water column. An alternative buoyancy aid is the use of lipids, which are less dense than water—squalene, commonly found in shark livers, has a specific gravity of just 0.86. In the velvet belly lanternshark (Etmopterus spinax), a benthopelagic species, 17 % of the bodyweight is liver of which 70 % are lipids. Benthic rays and skates have smaller", "-26.28790762362769" ], [ "intake and outlets and filling the siphon at the crest. If intakes and outlets are submerged, a vacuum pump may be applied at the crest to prime the siphon. Alternatively the siphon may be primed by a pump at either the intake or outlet. Gas in the liquid is a concern in large siphons. The gas tends to accumulate at the crest and if enough accumulates to break the flow of liquid, the siphon stops working. The siphon itself will exacerbate the problem because as the liquid is raised through the siphon, the pressure drops, causing dissolved gases within the", "-26.219178737141192" ], [ "urine continues its flow from the renal pelvis into the ureter, transporting urine into the urinary bladder. The anatomy of the human urinary system differs between males and females at the level of the urinary bladder. In males, the urethra begins at the internal urethral orifice in the trigone of the bladder, continues through the external urethral orifice, and then becomes the prostatic, membranous, bulbar, and penile urethra. Urine exits through the external urethral meatus. The female urethra is much shorter, beginning at the bladder neck and terminating in the vaginal vestibule. Microanatomy Under microscopy, the urinary system is covered", "-26.12527928093914" ], [ "and contraction of the bladder neck and urethra through excitation of the sympathetic preganglionic neurons.\nDiuresis (production of urine by the kidney) occurs constantly, and as the bladder becomes full, afferent firing increases, yet the micturition reflex can be voluntarily inhibited until it is appropriate to begin voiding. Voiding phase Voiding begins when a voluntary signal is sent from the brain to begin urination, and continues until the bladder is empty.\nBladder afferent signals ascend the spinal cord to the periaqueductal gray, where they project both to the pontine micturition center and to the cerebrum. At a certain level of afferent activity,", "-26.120880794740515" ], [ "without a dramatic pressure rise. Damage to the kidneys is imminent if the pressure rises above 40cm of water during filling. Bladder pressure can be measured by cystometry, during which the bladder is artificially filled with a catheter and bladder pressures and detrusor activity are monitored. Patterns of involuntary detrusor activity as well as bladder flexibility, or compliance, can be captured. The most valuable test to test for detrusor external sphincter dyssynergy (DESD) is to perform cystometry simultaneously with external sphincter electromyography (EMG). Uroflowmetry is a less-invasive study that can quantify the urine flow rate as an indicator", "-26.12084176814824" ], [ "bladder was significantly reduced. The other parameters, namely the maximum urinary flow and the voiding time were increased and decreased respectively. For healthy males, no influence was found on these parameters, meaning that they can urinate in either position. Epidemiology Urinary retention is a common disorder in elderly males. The most common cause of urinary retention is BPH. This disorder starts around age 50 and symptoms may appear after 10–15 years. BPH is a progressive disorder and narrows the neck of the bladder leading to urinary retention. By the age of 70, almost 10 percent of males have some degree", "-26.07632783916779" ], [ "is used to increase urine output and decrease extracellular fluid volume.\nSubstances in the circulation can also increase the amount of circulating fluid by increasing the osmolarity of the blood. This has the effect of pulling water from the interstitial space, making more water available in the blood and causing the kidney to compensate by removing it as urine. In hypotension, often colloids are used intravenously to increase circulating volume in themselves, but as they exert a certain amount of osmotic pressure, water is therefore also moved, further increasing circulating volume. As blood pressure increases, the kidney removes the excess fluid", "-26.07545380969532" ], [ "bladder (intravesical) pressure against the depressant of fluid in the bladder (called a cystometrogram), will show a very slight rise as the bladder is filled. This phenomenon is a manifestation of the law of Laplace, which states that the pressure in a spherical viscus is equal to twice the wall tension divided by the radius. In the case of the bladder, the tension increases as the organ fills, but so does the radius. Therefore, the pressure increase is slight until the organ is relatively full. The bladder's smooth muscle has some inherent contractile activity; however, when its nerve supply is", "-26.06078183864156" ], [ "samples of cloacal urine, and samples or quantitative collections of voided urine. Studies have shown that the amount of water intake, and dehydration impacts the plasma osmolality and urine osmolality within various sized ostriches. During a normal hydration state of the kidneys, young ostriches tend to have a measured plasma osmolality of 284 mOsm, and urine osmolality of 62 mOsm. Adults have higher rates with a plasma osmolality of 330 mOsm, and a urine osmolality of 163 mOsm. The osmolality of both plasma and urine can alter in regards to whether there is an excess or depleted amount of water", "-26.01193589961622" ], [ "one is empty. At least half of the remaining gas volume is available for the remainder of the dive. If there is no isolation valve the entire gas supply may be lost.", "-25.956336730741896" ], [ "Urinary system Structure The urinary system refers to the structures that produce and transport urine to the point of excretion. In the human urinary system there are two kidneys that are located between the dorsal body wall and parietal peritoneum on both the left and right sides. \nThe formation of urine begins within the functional unit of the kidney, the nephrons. Urine then flows through the nephrons, through a system of converging tubules called collecting ducts. These collecting ducts then join together to form the minor calyces, followed by the major calyces that ultimately join the renal pelvis. From here,", "-25.898101407685317" ], [ "small intestine) where they are resynthesized into triglycerides, and packaged into chylomicrons which are released into the lacteals (the capillaries of the lymph system of the intestines). These lacteals drain into the thoracic duct which empties into the venous blood at the junction of the left jugular and left subclavian veins on the lower left hand side of the neck. This means that the fat soluble products of digestion are discharged directly into the general circulation, without first passing through the liver, as all other digestion products do. The reason for this peculiarity is unknown.\nThe chylomicrons circulate throughout the body,", "-25.82906211738009" ], [ "Underactive bladder Causes Without diagnostic evaluation, the cause of UAB is unclear, as there are multiple possible causes. UAB symptoms can accurately reflect impaired bladder emptying due either to DU or obstruction (normal or large storage volumes, elevated post-void residual volume), or can result from a sense of incomplete emptying of a hypersensitive bladder (small storage volumes, normal or elevated postvoid residual volume). UAB potentially might also result from inaccurate perceptions of bladder function, such as in neurologic or psychiatric disease. DU itself is often linked to a weak detrusor muscle (impaired contractility), however this association is weak. Both UAB", "-25.820185001415666" ], [ "modern physostome fishes do indeed use their bladders for both.\nTo function in gas exchange, lungs require a blood supply. In cartilaginous fishes and teleosts, the heart lies low in the body and pumps blood forward through the ventral aorta, which splits up in a series of paired aortic arches, each corresponding to a gill arch. The aortic arches then merge above the gills to form a dorsal aorta supplying the body with oxygenated blood. In lungfishes, bowfin and bichirs, the swim bladder is supplied with blood by paired pulmonary arteries branching off from the hindmost (6th) aortic arch. The same", "-25.79938017798122" ], [ "applied to the urinary bladder wall, but voiding can be initiated without straining even when the bladder is nearly empty.\nVoiding can also be consciously interrupted once it has begun, through a contraction of the perineal muscles. The external sphincter can be contracted voluntarily, which will prevent urine from passing down the urethra. Experience of urination The need to urinate is experienced as an uncomfortable, full feeling. It is highly correlated with the fullness of the bladder. In many males the feeling of the need to urinate can be sensed at the base of the penis as well as the bladder,", "-25.72022948425729" ], [ "Bladder outlet decline Decline in bladder outlet is the process of gradual atrophy in the distal structures to the bladder in the urinary system. It happens alongside with atrophy of the reproductive system in females. It is one of the contributing factors for disorders like stress incontinence.\nIt is commonly associated with decline in urethral resistance pressure.", "-25.71783738047816" ], [ "Urinary bladder disease Cystitis Cystitis is a urinary bladder inflammation that results from any one of a number of distinct syndromes. It is most commonly caused by a bacterial infection in which case it is referred to as a urinary tract infection. Bladder trauma Bladder rupture (rupture of bladder, N32.4) may occur if the bladder is overfilled and not emptied. This can occur in the case of binge drinkers who have consumed large quantities of fluids, but are not conscious of the need to urinate due to stupor. This condition is very rare in women, but does occur. Signs and", "-25.683866379666142" ], [ "the ionic concentrations of the urine, and actively add nitrogenous compounds and other metabolic waste products to the urine. Once filtration and reabsorption are complete, the urine is emptied into O. vulgaris' mantle cavity via a pair of renal papillae, one from each renal sac.\nTemperature and body size directly affect the oxygen consumption of O. vulgaris, which alters the rate of metabolism. When oxygen consumption decreases, the amount of ammonia excretion also decreases due to the slowed metabolic rate. O. vulgaris has four different fluids found within its body: blood, pericardial fluid, urine, and renal fluid. The urine and", "-25.677571899956092" ], [ "urine acidity, thereby reducing the likelihood of struvite formation. However, the decrease of struvite uroliths coincides with an increase in oxalate uroliths; low magnesium levels and urine pH both being factors in calcium oxalate formation. Oxalate uroliths are not dissolvable in cat urine. \nLess common forms of uroliths includes ammonium urate, uric acid, calcium phosphate, and cystine uroliths. Treatment A blocked urethra is a life-threatening medical emergency that requires immediate veterinary attention. If the bladder cannot be emptied, it can reach capacity and inhibit kidney function, causing kidney damage. Renal failure and uremia will follow within 36–48 hours of", "-25.609826943080407" ], [ "fullness in the short term, long-term, frequent drinkers may compensate for energy derived from ethanol by eating less.", "-25.606552437646315" ], [ "with volatile solids comprising 75–85% of total solids. Urea is the largest constituent of the solids, constituting more than 50% of the total. On an elemental level, human urine contains 6.87 g/L carbon, 8.12 g/L nitrogen, 8.25 g/L oxygen, and 1.51 g/L hydrogen. The exact proportions vary with individuals and with factors such as diet and health. In healthy persons, urine contains very little protein; an excess is suggestive of illness. Odor Sometime after leaving the body, urine may acquire a strong \"fish-like\" odor because of contamination with bacteria that break down urea into ammonia. This odor is not present", "-25.590637729968876" ], [ "during the night (every 3 hours) to empty the pouch. Over time, emptying time can possibly be increased up to 4–6 hours. Although to decrease the potential for infections and deterioration of the pouch it is best to continue to cath every 3-4 hours. The pouch will continue to expand and will reach its final size at approximately six months. The pouch will then hold up to 1,200 cubic centimeters (cc). Depending on your doctor's orders, each day, the pouch may need to be irrigated with 60 cc of sterile water in an effort to remove membrane", "-25.55286979023367" ], [ "but their gas bladders function similar to those of physoclists.", "-25.53907092109148" ], [ "that drinking urine tends to worsen rather than relieve dehydration due to the salts in it, and that urine should not be consumed in a survival situation, even when there is no other fluid available.\nWhile some people in dire straits have drunk urine, it is unclear whether this actually helped or hindered their situation.\nIn one incident, Aron Ralston drank urine when trapped for several days with his arm wedged under a boulder. The survivalist television host Bear Grylls drank urine and encouraged others to do so on several episodes on his TV shows. Folk medicine In various cultures, there are", "-25.44636712659849" ], [ "stomach emptying time than men. A hormonal link has been suggested, as gastroparesis symptoms tend to worsen the week before menstruation when progesterone levels are highest. Neither theory has been proven definitively. Mechanism Gastroparesis can be connected to hypochlorhydria and be caused by chloride, sodium and/or zinc deficiency, as these minerals are needed for the stomach to produce adequate levels of gastric acid (HCl) to properly empty itself of a meal.\nOn the molecular level, it is thought that gastroparesis can be caused by the loss of neuronal nitric oxide expression since the cells in the GI tract secrete nitric oxide.", "-25.43189074913971" ], [ "amount, but did not consume any additional food, and the group with 200mA consumed both more water and more food. All groups without subfornical organ stimulation did not eat or drink at all.\nOther studies look specifically at drinking, as the SFO is known to have an important role in fluid balance. One such study looked into the connection between the SFO and the median preoptic nucleus. Rats with both partially or fully severed connections to the median preoptic nucleus showed a significantly decreased tendency to drink water when compared to the control group. Then when angiotensin was injected subcutaneously, drinking", "-25.411366090964293" ], [ "by elevated plasma ANH levels. Bladder storage A bladder storage disorder is any factor that increases the frequency of small volume voids. These factors are usually related to lower urinary tract symptoms that affect the capacity of the bladder. Patients with nocturia who do not have either polyuria or nocturnal polyuria according to the above criteria most likely have a bladder storage disorder that reduces their nighttime voided volume or a sleep disorder. Nocturnal bladder capacity (NBC) is defined as the largest voided volume during the sleep period. \nDecreased NBC can be traced to a decreased maximum voided volume or", "-25.3530435480061" ], [ "intake so that it does not exceed insensible loss plus urine output, is probably the most important part of the 'Bull regime'. An individual calculation is made for each patient to allow for variation in body build, pyrexia, and extra-renal losses, but the average permissible intake during complete anuria is 500 ml. per 24 hours.", "-25.285732621065108" ], [ "legs and hips, genitourinary system, and anus. People injured below level L2 may still have use of their hip flexor and knee extensor muscles. Bowel and bladder function are regulated by the sacral region. It is common to experience sexual dysfunction after injury, as well as dysfunction of the bowel and bladder, including fecal and urinary incontinence. It is also possible for the bladder to fail to empty, leading to a potentially harmful buildup of urine. One sign of spinal cord injury that emergency providers may find is priapism, an erection of the penis. Thoracic In addition to the problems", "-25.229505954688648" ], [ "the human body keeps track of loss of body water is that osmoreceptors in the hypothalamus sense a balance of sodium and water concentration in extracellular fluids. Relative loss of body water will cause sodium concentration to rise higher than normal, a condition known as hypernatremia. This ordinarily results in thirst. Conversely, an excess of body water caused by drinking will result in too little sodium in the blood (hyponatremia), a condition which is again sensed by the hypothalamus, causing a decrease in vasopressin hormone secretion from the anterior pituitary, and a consequent loss of water in the urine, which", "-25.22909823845839" ], [ "or impair reactions and possibly cause damage to cellular structures or proteins. To maintain homeostasis the body may excrete excess acid or base through the urine, via gas exchange in the lungs, or buffer it in the blood. The bicarbonate buffering system of blood plasma effectively holds a steady pH and helps to hold extracellular pH around 7.35. The kidneys are responsible for the majority of acid-base regulation but can excrete urine no lower than a pH of 5. This means that a 330mL can of cola, for example, usually ranging in pH from 2.8 - 3.2, would need to", "-25.224954456323758" ], [ "study involving almost 49,000 men, researchers found that men who drank at least 1,44 L of water (around 6 cups) per day had a significantly reduced incidence of bladder cancer when compared with men who drank less. It was also found that: \"the risk of bladder cancer decreased by 7% for every 240 mL of fluid added\". The authors proposed that bladder cancer might partly be caused by the bladder directly contacting carcinogens that are excreted in urine, although this has not yet been confirmed in other studies. Treatment The treatment of bladder cancer depends on how deeply the tumor", "-25.224911086959764" ], [ "close to 1 (U/P≅1). Because of this, solely excreting urine is not sufficient to resolve the osmoregulatory problem in tunas. In turn, they excrete only the minimum volume of urine necessary to rid of solutes that are not excreted by other routes, and the salt is mostly excreted via gills. This is why the composition of solutes in urine differs significantly from that of the blood plasma. Urine has a high concentration of divalent ions, such as Mg²⁺ and SO₄²⁻ (U/P>>1), as these ions are mostly excreted by the kidneys keeping their concentration in blood plasma from rising. Monovalent ions", "-25.21816330263391" ], [ "volume (PVR, ml), increased maximum urinary flow (Qmax, ml/s), which is comparable with pharmacological intervention, and decreased the voiding time (VT, s). The improved urodynamic profile is related to a lower risk of urologic complications, such as cystitis and bladder stones.", "-25.133962490479462" ], [ "from the wellbore to the formation. Since this lost volume is unknown, it becomes very hard to tell how the kill is proceeding, especially if gas is involved with its large volume change through different parts of the wellbore. Combining a well kill with such a \"lost circulation\" situation is a serious problem.\nLost circulation situations can, of course, also lead to well kill situations. Reverse circulation This is often the tidiest way of making a planned well kill. It involves pumping kill fluid down the 'A' annulus of the well, through a point of communication between it and the", "-25.124263181554852" ], [ "Urinary incontinence Mechanism Continence and micturition involve a balance between urethral closure and detrusor muscle activity. Urethral pressure normally exceeds bladder pressure, resulting in urine remaining in the bladder. The proximal urethra and bladder are both within the pelvis. Intra abdominal pressure increases (from coughing and sneezing) are transmitted to both urethra and bladder equally, leaving the pressure differential unchanged, resulting in continence. Normal voiding is the result of changes in both of these pressure factors: urethral pressure falls and bladder pressure rises.\nThe body stores urine — water and wastes removed by the kidneys — in the urinary bladder, a", "-25.029759812692646" ], [ "the temperature of urine goes down the bubbles in it will change. Some of them will disappear, but some will remain. With the temperature decrease particles and impurities will be more difficult to evaluate. They will move toward the middle of the flask, then sink to the bottom. They will all mix, making it more difficult to see the impurities.\nAnother problem with urine cooling is that it would become thicker. The longer that it had to cool down the more likely it was that the crystals in the it would bond together, causing it to thicken. This could lead to", "-24.93158510804642" ], [ "Body fluid Body fluids, bodily fluids, or biofluids are liquids within the human body. In lean healthy adult men, the total body water is about 60% (60-67%) of the total body weight; it is usually slightly lower in women. The exact percentage \nof fluid relative to body weight is inversely proportional to the percentage of body fat. A lean 70 kg (160 pound) man, for example, has about 42 (42-47) liters of water in his body. \nThe total body of water is divided between the intracellular fluid (ICF) compartment (also called space, or volume) and the extracellular fluid (ECF) compartment", "-24.923689597286284" ], [ "Ureter Structure The ureters are tubular structures, approximately 3 mm (0.12 in) in adults, that pass from the pelvis of each kidney into the bladder. From the renal pelvis, they descend on top of the psoas major muscle to reach the brim of the pelvis. Here, they cross in front of the common iliac arteries. They then pass down along the sides of the pelvis, and finally curve forwards and enter the bladder from its left and right sides at the back of the bladder.\nThe ureters enter the bladder from its back surface, traveling 1.5 - 2 cm before opening into the", "-24.921790936787147" ], [ "health. Producing too much or too little urine needs medical attention. Polyuria is a condition of excessive production of urine (> 2.5 L/day), oliguria when < 400 mL are produced, and anuria one of < 100 mL per day. Constituents About 91-96% of urine consists of water. Urine also contains an assortment of inorganic salts and organic compounds, including proteins, hormones, and a wide range of metabolites, varying by what is introduced into the body.\nThe total solids in urine are on average 59 g per person per day. Organic matter makes up between 65% and 85% of urine dry solids,", "-24.9198576543713" ], [ "emptying, the kinetic motion of the liquid out the outflow can propel too much liquid out, causing a loss of the sealing volume in the outflow trap and loss of the trapped air bubble to maintain intermittent operation.\nA fourth problem involves seep holes in the mechanism, intended to slowly refill these various sealing chambers when the siphon is dry. The seep holes can be plugged by debris and corrosion, requiring manual cleaning and intervention. To prevent this, the siphon may be restricted to pure liquid sources, free of solids or precipitate.\nMany automatic siphons have been invented going back to at", "-24.903172583319247" ], [ "sphincter and urethra), and relaxation of the bladder. At high bladder volumes, afferent firing increases, causing a conscious sensation of urinary urge. When the individual is ready to urinate, he or she consciously initiates voiding, causing the bladder to contract and the outlet to relax. Voiding continues until the bladder empties completely, at which point the bladder relaxes and the outlet contracts to re-initiate storage. The muscles controlling micturition are controlled by the autonomic and somatic nervous systems. During the storage phase the internal urethral sphincter remains tense and the detrusor muscle relaxed by sympathetic stimulation. During micturition, parasympathetic stimulation", "-24.88595862267539" ], [ "bladder, the large sack-like organ by the umbilical artery and vein, to the urethra. From there, the urine can be excreted. Female If the fetal pig is a female, there will be a fleshy protrusion ventral near the anus called the genital papilla. The female's internal reproductive system is located below the kidneys. The two sac-like organs attached to the coil-like fallopian tubes are the ovaries. The uterus, which becomes the vagina, is located where the fallopian tubes meet. This system can be difficult to find as it is small as well as extremely dorsal and posterior to the", "-24.86322286608629" ], [ "(backflow of urine).\nA number of structures pass by, above, and around the ureters on their path down from the kidneys to the pelvis. In females, the ureters pass through the mesometrium and under the uterine arteries on the way to the urinary bladder. Nerve supply The ureters are richly supplied by nerves that form a network (plexus) of nerves, the ureteric plexus that lies in the adventitia of the ureters. This plexus is formed from a number of nerve roots directly (T9-12, L1, and S2-4), as well as branches from other nerve plexuses and nerves; specifically, the upper third of", "-24.86144813837018" ], [ "use of an endoscope. A gastric emptying scan is considered the gold standard to assess gastric emptying rate.\nA large number of studies have indicated that most cases of peptic ulcers, and gastritis, in humans are caused by Helicobacter pylori infection, and an association has been seen with the development of stomach cancer.\nA stomach rumble is actually noise from the intestines.\nThe stomach has to regenerate a new layer of mucus every two weeks, or else damage to the epithelium may result. Surgery In humans, many bariatric surgery procedures involve the stomach, in order to lose weight. A gastric band may be", "-24.786490377620794" ], [ "buoyancy and does not waste gas by overfilling, or by excessive weighting. The actual volume of the bladder should not affect gas consumption by a skilled user, as only enough gas to achieve neutral buoyancy is needed. Deep dives will require more gas, and dives in which the diver ascends and descends by large amounts and/or frequently, will require venting for each ascent and top up for each descent. The amount of gas used was generally below 6% of the gas consumption during the dive during US Navy trials and the use of small pony cylinders for inflation was considered", "-24.77731018783379" ], [ "Erythritol Human digestion In the body, most erythritol is absorbed into the bloodstream in the small intestine, and then for the most part excreted unchanged in the urine. About 10% enters the colon. Because 90% of erythritol is absorbed before it enters the large intestine, it does not normally cause laxative effects, as are often experienced after consumption of other sugar alcohols (such as xylitol and maltitol), although large doses can cause nausea and stomach rumbling. In males, doses greater than 0.66 g/kg body weight and in females, doses greater than 0.8 g/kg body weight, will cause laxation. Blood sugar", "-24.77555623697117" ], [ "amount of plasma cleared is simply the drain volume divided by an estimate of the patient's volume of distribution.\nAs an example, if someone is infusing four 2 liter exchanges a day, and drains out a total of 9 liters per day, then they drain 9 × 7 = 63 liters per week. If the patient has an estimated total body water volume V of about 35 liters, then the weekly Kt/V would be 63/35, or about 1.8.\nThe above calculation is limited by the fact that the serum concentration of urea is changing during dialysis. \nIn automated PD this", "-24.771669599751476" ], [ "are also commonly used in oil spill recovery operations. \nHigh end fuel bladders offer a high degree of protection of the stored liquids, ensuring the contents never come in contact with air. This ensures that there is no risk of evaporation or explosion due to gas formation. In order to prevent liquid contamination, a neutral barrier film is added to the fuel bladder's inner side.\nFuel bladders are most useful in situations where critical infrastructure has been compromised or does not exist. Benefits of using a flexible storage system like fuel bladders is their ability to be transported and", "-24.769521559432178" ], [ ".06 m volume of space in the gut region of the skeleton.\nThe total mass of the gastroliths themselves was 7 kilograms (15 lb). Most were less than 10 millilitres (0.35 imp fl oz; 0.34 US fl oz) in volume. The least massive clast was .1 grams (0.0035 oz) and the most was 715 grams (25.2 oz), with most of them being toward the smaller end of that range. The clasts tended to be close to spherical in shape, although the largest specimens were also the most irregular. The largest gastroliths contributed the most to the total surface area of the set. Some gastroliths were so large and irregularly shaped", "-24.76571187574882" ], [ "flow (which is solute clearance + free water clearance) will equal the rate of solute excretion divided by the urine osmolality. With a diet of only solute poor beer, only about 200–300 mOSM (normal 750 mOSM to greater than 900 mOSM) of solute will be excreted per day, capping the amount of free water excretion at four liters. Any intake above 4 liters would lead to a dilution of the serum sodium concentration and thus hyponatremia.\nAny vomiting or GI absorptive problems due to alcohol intoxication can also compound the effect of potomania due to additional electrolyte and acid-base disturbances. Treatment", "-24.76466060843086" ], [ "lead to the stomach's inability to contract and lose its ability to empty itself. Side effects of gastroparesis include chronic indigestion, nausea and vomiting.", "-24.761585010099225" ], [ "has a lower breathing rate. Each kidney has a capacity of 858 cm³ (52.4 cu in), and can produce urine with high chloride concentrations. Like the horse, the dromedary has no gall bladder. The grayish violet, crescent-like spleen weighs less than 500 g (18 oz). The triangular, four-chambered liver weighs 6.5 kg (14 lb); its dimensions are 60 cm × 42 cm × 18 cm (24 in × 17 in × 7 in). Reproductive system The ovaries are reddish, circular and flattened. They are enclosed in a conical bursa and have the dimensions 4×2.5×0.5 cm (1.57×0.98×0.20 in) during anestrus. The oviducts are 25–28 cm (9.8–11.0 in) long. The uterus is bicornuate. The vagina is 3–3.5 cm (1.2–1.4 in) long and has well-developed", "-24.750630758644547" ], [ "Treatments for overactive bladder Efficacy of treatments Studies have shown that few people get complete relief from overactive bladder drugs and that all available drugs are no more than moderately effective. A typical person with overactive bladder may urinate 12 times per day. Medication may reduce this number by 2-3 and reduce urinary incontinence events by 1-2 per day.\nOxybutynin is sometimes used in combination with Kegel exercises and Functional electrical stimulation.\nA 2009 literature review on women found that no drug seemed better than others, and paid special attention to comparing newer drugs to older ones. There is not sufficient evidence", "-24.71797161968425" ], [ "to precipitate. Other individuals who develop bladder stones include those who have had spinal cord injury, paralysis, or some type of nerve damage. When nerves to the back are damaged, the bladder cannot empty, resulting in stagnant urine. Causes Bladder stones may occur whenever the kidneys, bladder, or ureters become inflamed, which may occur when the urine becomes too concentrated or when the body becomes dehydrated. Minerals such as calcium and magnesium crystallize into the stones, which then can cause such symptoms as lower back or abdominal pain or difficulty with urination. The use of urinary catheters may cause", "-24.691116427333327" ], [ "(especially if they span the full breadth of the ship), or from accidental flooding, such as has occurred in several accidents involving roll-on/roll-off ferries.\nIf a compartment or tank is either empty or full, there is no change in the craft's center of mass as it rolls from side to side (in strong winds, heavy seas, or on sharp motions or turns). However, if the compartment is only partially full, the liquid in the compartment will respond to the vessel's heave, pitch, roll, surge, sway or yaw. For example, as a vessel rolls to port, liquid will displace to the port", "-24.665603763074614" ], [ "maw, which can sell for as much $10,000 per kilogram.\nSwim bladders are also used in the food industry as a source of collagen. They can be made into a strong, water-resistant glue, or used to make isinglass for the clarification of beer. In earlier times they were used to make condoms. Swim bladder disease Swim bladder disease is a common ailment in aquarium fish. A fish with swim bladder disorder can float nose down tail up, or can float to the top or sink to the bottom of the aquarium. Risk of injury Many anthropogenic activities, like pile driving", "-24.65818401501747" ] ]
2b1mr8
Why isn't the Westboro Baptist Church considered a hate group in the U.S. and has all the legal benefits of a religion?
[ "In the US, \"hate groups\" are legal. You can espouse hate all you want, because you have freedom of speech. You just can't threaten people, or attempt to incite others to violence.", "There is no legal status as hate group in the US. Private organizations like the South Poverty Law Center keep lists, and the FBI has a list of groups likely to commit hate crimes, but there is no official list. So the statement \"Yes but hate groups are not tax exempt, like the WBC\" is not true. You can lose your non profit status for committing crimes, inciting others to commit crimes, or improper campaigning. But so long as you follow the rule for a non-profit, the First Amendment allows you to be as hateful you want.", "I thought it was because they don't actually advocate physical violence against those they target. They just tell everyone that God's going to do it for them.", "To add on to what everyone is saying about hate groups technically being legal, many members of the WBC are actually highly accomplished lawyers. Scary to say the least, but they have actually won several lawsuits brought against them. They know exactly what they can get away with legally, and use that to their own twisted advantage.", "ELI5: Why does everyone on this sub feel the need to ask loaded questions that they don't want to hear a legitimate answer to, they just want to spout they're own uninformed opinion and bitch?", "WBC, KKK, Scientology - they all have protection. I'm sure there are people who think that mainstream, \"normal\" Christians are just as wacky as the KKK. And there are people who probably think the ACLU or NAACP are hate groups, too. It's all kind of relative and the First Amendment protects them all. TL;DR - First Amendment allows crazies.", "Ok. This may be hard for you progressive Christians to hear. But the Westboro Baptists aren't making up the shitty views they have. It is all in the same book that you pick and choose the good parts out of. And being crazy-religious-dicks isn't illegal in the United States. We have a secular government to protect your right to worship who you want. That means them too. They are monstrous people, yes. But freedom of speech is what makes America awesome, and not Iraq.", "They are considered a hate group by many organizations like the Southern Poverty Law Centre (the SPLC is pretty much as high-up as it goes when it comes to \"hate group\" designation). The American government doesn't classify \"hate\" because it would violate the first-amendment rights of the groups. The courts have sided with this which is why flat-out bans on funeral protests have been unsuccessful. The American govenrment only classifies terrorist, gangs and organized crime groups which WBC is not.", "There's no legal status of \"hate group.\" And the only legal benefit of being a religious group is tax exemption, if you are also not for profit. WBC claims non-profit status. That's about the only thing that's significant about them from a legal standpoint. They can believe whatever they want, say whatever they want and be \"religious\" however they want. Haters gonna hate." ]
[ [ "themselves as \"very religious\". Additionally, members believe in the Calvinist theology of predestination which includes believing that all disasters and catastrophes come from the hand of God. The public acts of the church have cast a political spotlight on the group that have given them vast attention for only having approximately 80 members. In particular, the religious connection to active political hate speech has led to much controversy.\nThe Westboro Baptist Church considers membership in most other religious groups, such as the Roman Catholic Church or Islam, as akin to devil worship, and states these other churches to be \"Satanic frauds", "-34.224734180063024" ], [ "Americans have a negative view of the Baptist faith.\nMany independent Baptist congregations are staunch fundamentalists, regarding all Baptist associations as too liberal for them to join. Many of these congregations have a history of employing evangelism techniques that critics consider too extreme and abrasive for modern American culture. Independent Baptist author and publisher Jack T. Chick, for example, distributes cartoon tracts that depict teenagers being attacked by a chainsaw-wielding Satan, the Catholic Church as an Egyptian/Babylonian inspired cult, and moderate evangelical churches that use modern Bible translations rather than the King James Version as being duped by the Catholic Church's", "-33.55457095615566" ], [ "mainstream Christian churches and secular groups, and is well known for its aggressive protesting style.\" In Britain, the Methodist Church, Baptist Union, United Reformed Church, and Evangelical churches \"have issued a joint statement repudiating the actions of Westboro Baptist Church,\" stating that:\nWe do not share their hatred of lesbian and gay people. We believe that God loves all, irrespective of sexual orientation, and we unreservedly stand against their message of hate toward those communities. Neither the style nor substance of their preaching expresses the historic, orthodox Christian faith. And we ask that the members of Westboro Baptist Church refrain from", "-33.04735399456695" ], [ "SBC churches revealed a history of crime that could have prevented them from working.\nThe convention's statement of faith, the Baptist Faith and Message, is not binding on churches or members due to the autonomy of the local church (though SBC employees and missionaries must agree to its views as a condition of employment or missionary support). Politically and culturally, Southern Baptists tend to be conservative. Most oppose the use of alcohol as a beverage, homosexual activity, and abortion with few exceptions. Pastor and deacon Generally, Baptists recognize only two scriptural offices: pastor-teacher and deacon. The Southern Baptist Convention passed a", "-32.12982059104252" ], [ "regarded as a legitimate branch of Islam by mainstream Muslims.\nThe white supremacist Creativity Movement (formerly the World Church of the Creator), led by Matthew F. Hale, is associated with violence and bigotry. Aryan Nations is another religiously-based white supremacist hate group.\nWestboro Baptist Church is considered a hate group because of its provocative stance against homosexuality and the United States, and it has been condemned by many mainstream gay rights opponents as well as by gay rights supporters. Internet hate groups Traditionally, hate groups recruited members and spread extremist messages by word of mouth, or through the distribution of flyers and", "-31.854241495690076" ], [ "stirring up any more homophobic hatred in the UK or elsewhere.\nA frequent critic of the WBC is political commentator Bill O'Reilly, who regularly calls the church \"evil and despicable\". Documentary filmmaker Michael Moore has also criticized the church.\nThe Anti-Defamation League (ADL) describes the Westboro Baptist Church as \"virulently homophobic\", saying its anti-homosexual rhetoric is often a cover for anti-Semitism, anti-Americanism, racism, and anti-Catholicism. The Southern Poverty Law Center (SPLC) has added the Westboro Baptist Church to its list of hate groups. Jerry Falwell referred to Phelps as \"a first-class nut\". WBC picketed Falwell's funeral service on May 22, 2007.\nIn response", "-31.65957205282757" ], [ "not toward the church or Baptist beliefs in general. This negative stereotype has often been perceived legalism, associated with the word \"baptist\". Churches who make this change are interested in attracting people who are unchurched, and who may have barriers with becoming affiliated with a denomination, or specifically becoming a \"baptist\". Keeping the distinct name and simply adding Community Church to the end is a common change.\nA name such as \"Grace Community Church\" is felt by these churches to be less likely to cause unnecessary negative stereotypes or offence, to signal and inspire a change in the mindset", "-31.011257621612458" ], [ "of the Westboro Baptist Church are merely a ploy to receive attention and publicity above all else, though the Phelpses themselves deny this claim. Counter-protesting against the group, they suggest, gives them attention and incentive that they do not deserve; and a more effective response against Phelps would be to ignore his family and congregation completely. WBC, through the closely related Phelps Chartered law firm, has collected fees under the Civil Rights Attorney's Fees Award Act of 1976 when their protests have been unlawfully disrupted.\nKatherine Weber of The Christian Post states that \"Westboro is considered an extremist group by most", "-30.83321165695088" ], [ "do not adhere to their faith regardless of age or sex. According to the article, Jewish and Christian religious texts show “hatred for all the men, women, children, elderly, and even for useful animals like cows, donkeys and others.” The article states that the Global Anti-Aggression Campaign believes that the West is pursuing their policies based upon these religious texts. Anti-Americanism The Global Anti-Aggression Campaign expresses the organization’s anti-American sentiments in the founding statement by claiming the American administration:\n“is working to achieve control over Muslim nations and peoples, stealing their wealth, annihilating their will, and changing their educational curriculums and", "-30.62178906009649" ], [ "social withdrawal. So-called Christianity, as commonly practiced in the United States, is actually the racist Antichrist. \"Theologically,\" Cone affirms, \"Malcolm X was not far wrong when he called the white man 'the devil.'\" The false Christianity of the white-devil oppressor must be replaced by an authentic Christianity fully identified with the poor and oppressed. Educator After receiving his doctorate, Cone taught theology and religion at Philander Smith College and Adrian College. At the urging of his mentor, C. Eric Lincoln, Union Theological Seminary in New York City hired his as assistant professor in 1969. He remained there until his death", "-30.617195302125765" ], [ "be due to the large sense of religiosity or other factors, according to The Huffington Post. Some criticize the lack of response some black churches have had with the current social issues black communities are facing. For example, gay acceptance is traditionally lower in black churches, as they tend to be more conservative. Many black churches openly oppose homosexuality, or they are completely silent on the matter. Some feel that strict church beliefs interfere with greater social issues affecting black communities. Many black churches have been slow to react to the HIV/AIDS issues affecting black communities. And some say that", "-30.612846184172668" ], [ "church's conservative direction in former U.S. President Jimmy Carter's book, Our Endangered Values and attacked Carter's positions on subjects such as abortion and homosexuality.\nIn January 2007, Carter and former President Bill Clinton proposed that a broadly inclusive alternative Baptist movement should be established to counter what they called a \"negative image\" of Baptists. Chapman disputed the contention that Baptists had a negative image, and pointed out that the SBC was by no means a \"white\" organization since of the 43,071 churches 4,742 said they were mainly \"ethnic\" and 2,085 said they were mainly African-American.\nIn June 2006, Chapman said that an", "-30.531373273552163" ], [ "by stigmatizing homosexuality and HIV/AIDS, it could be making the issue worse for the communities affected. These critics think that since the black church is an integral part of many black communities, the church should be one of the leaders in affecting social justice and change. These and other factors can drive people away from the church and religion. De-stigmatizing atheism While many African Americans once used faith in religion to organize and galvanize people, there are more and more people seeing religion as part of the past. Sikivu Hutchinson believes that it is important to offer support structures for people", "-30.495497455005534" ], [ "it is a religion based on fraud or deceit on the part of its past and present leaders. In 2015, the FBI began tracking anti-Mormon hate crimes in the United States and have noted an increase in incidents over time. Reaction Many of those who have been labeled \"anti-Mormon\" object to the designation, arguing that the term implies that disagreement or criticism of Mormonism stems from some inherent \"anti-Mormon\" prejudice, rather than being part of a legitimate factual or religious debate. Eric Johnson, for example, makes a distinction between \"personal animosity and intellectual dialogue\". Johnson insists that he is", "-30.290650650538737" ], [ "dominate discussion in the West - that Christians can't be persecuted because they belong to the world's most powerful church. The truth is two thirds of the 2.3 billion Christians in the world today live… in dangerous neighbourhoods. They are often poor. They often belong to ethnic, linguistic and cultural minorities. And they are often at risk.\"", "-30.181185508496128" ], [ "album. Politics Many of Bad Religion's songs are about different social ills, although they try not to ascribe the causes of these ills to any single person or group. Greg Graffin believes that the current political situation in the United States can make it difficult to voice these concerns, as he doesn't want to feed the polarization of viewpoints.\nThe band contributed a song to the Rock Against Bush series organized by Fat Mike's Punkvoter, a political activist group and website whose supporters are primarily left-liberal members of the punk subculture.\nBrett Gurewitz attributed his anger towards former U.S. president George W.", "-30.128573665511794" ], [ "gun control and globalism. Some may hold strong anti-communist and anti-socialist positions and endorse neoliberal and pro-free market capitalist ideas in part due to the Prosperity Theology that many hold. Some conspiracy theories like Cultural Marxism and New World Order have proven popular among its base. South American Evangelicals also tend to follow Christian Zionism and be supporters of Israel, supporting policies such as the moving of the embassies of their countries to Jerusalem.\nSome have been describe also as supporters of the death penalty, \"hard hand\" on crime, Creationism (and opposition of teaching the scientific theories of Evolution and", "-30.02702795062214" ], [ "as mainstream conservatives; it supports national self-determination, immigration restriction, federalism, and home rule, and opposes free trade and global capitalism. Its specific issues include states' rights, race relations (especially interracial marriage, which it opposes), and Christian right values. They have criticized Martin Luther King, Jr., who is considered by the organization as a left-wing agitator of Black American communities with notable ties to communism, and holding personal sexual morals unworthy of a person deserving national recognition. They consider the American Civil Rights Movement and the Frankfurt School as elementally subversive to the separation of powers under the United States", "-30.020639071954065" ], [ "enacted against African Americans by White churches and their parishioners. There are many examples of mistreatment of African American churchgoers by White church leaders, including segregated worship spaces and being the last ones to receive the eucharist or communion. Entire churches or denominations would also declare themselves to be only for white members. Regional differences exacerbate problems of racism, with religious leaders from the South being much more likely to hold racist views than those from the North.\nIt is also possible that one reason why churches remain segregated is that society and communities at large are very segregated, and churches", "-30.010634445468895" ], [ "part due to several factors, including the lack of opportunity to pursue leadership roles in predominantly White or segregated churches, the fact that African American churches allowed a place to build community, and for interests in practicing Christianity differently.\nSociologists who study religion also explain that people generally choose to be religious groups with those similar to them in many aspects, not just race. \"Congregational sameness\" has been proven to make religious organizations more cohesive and better fulfill the social and psychological needs that people look for from religious groups. Racism One reason for the racial segregation of churches is racism", "-29.9862901904271" ], [ "years, black churches have served as a symbol of hope for many of African-American people, and unfortunately these churches have been the targets of hate crimes.\"\nCongressman Clay Higgins said, \"I'm suggesting that the fires were related, because the churches burned in a same method.\"\nFormer State Senator Elbert Guillory said, \"We always have been a good relationships in our society between black and white residents. So the main question is: where does this come from? Who's doing it and for what reason?\"", "-29.942085987422615" ], [ "several prominent black authors in America wrote or discussed their criticisms of the Christian church in various forms. Anthony Pinn called Christianity a tool for keeping the status quo and historically, for supporting slavery. Michael Lackey sees African American atheism as a way to celebrate a \"revolutionary victory\" over what he perceives as an oppressive and violent god-concept. Many African American atheists see hope in a secular world view and find \"religious culture a reason for melancholic mourning.\" Similar views have been expressed by black atheists in the UK, some of which have roots in countries like Nigeria. These atheists", "-29.881573581165867" ], [ "to the discrimination faced by ethnic minorities, LGBT communities, and women. \"Americans still feel it's acceptable to discriminate against atheists in ways considered beyond the pale for other groups,\" asserted Fred Edwords of the American Humanist Association. The degree of discrimination, persecution, and social stigma atheists face in the United States, compared to other persecuted groups in the United States has been the subject of study and a matter of debate.\nIn the United States, seven state constitutions include religious tests that would effectively prevent atheists from holding public office, and in some cases being a juror/witness, though these have", "-29.85849107831018" ], [ "governments should enact laws supporting their religious tenets. The Christian right is a major force in North America. They generally support laws upholding what they consider religious values, such as opposition to abortion, contraception, sex outside marriage and to same-sex marriage and reject scientific positions on evolution and other matters where science disagrees with the Bible. Outside the West, some other religious and ethnicity based political groups are considered right-wing. The Hindu nationalist movement has attracted privileged groups fearing encroachment on their dominant positions and also \"plebeian\" and impoverished groups seeking recognition around a majoritarian rhetoric of cultural pride, order,", "-29.844510018476285" ], [ "that, members continue to suffer psychological damage from it\" and that \"the church has not done enough to rectify its racist past\". The large majority of black Mormons, however, say they are willing to look beyond the racist teachings and adhere to the church. Church president Gordon B. Hinckley gave sermons against racism. He taught that no one who utters denigrating remarks can consider himself a true disciple of Christ, and noted the irony of racial claims to the Melchizedek priesthood.\nRichard Abanes contends that the church tries to hide past racial practices, citing the 1981 change in the Book of", "-29.76703794295463" ], [ "denied in mainstream American society. Because of this, African-American pastors became the bridge between the African-American and European American communities and thus played a crucial role in the Civil Rights Movement.\nLike many Christians, African-American Christians sometimes participate in or attend a Christmas play. Black Nativity by Langston Hughes is a re-telling of the classic Nativity story with gospel music. Productions can be found in African-American theaters and churches all over the country. Islam Generations before the advent of the Atlantic slave trade, Islam was a thriving religion in West Africa due to its peaceful introduction via the lucrative Trans-Saharan trade", "-29.679668976576068" ], [ "and Islam as \"the Antichrist\"; has called Central American immigrants a \"'brown invasion'\" being used by God to punish American whites because of abortion; has claimed that the Las Vegas massacre was conducted by government death squads; has asserted that Antonin Scalia was murdered; and, in July 2018, predicted an imminent coup that would result in the nationally televised decapitation of the Trump family on the White House lawn.", "-29.63488892805617" ], [ "South, and there are, no doubt, racists everywhere.\"\nIn response to the 2016 Orlando nightclub shooting Hill wrote on the League's website that \"In a free & independent South, Islam would be banned, Muslims deported, and all mosques closed down. The ownership of firearms, including military grade, would be encouraged for all Southern citizens in order to protect the public from such incidents as occurred overnight in Orlando, Florida\".\nIn a 2017 decision, the Tennessee Court of Appeals ruled that a blog post describing a family as white supremacist, based on a photo showing a League of the South bumper sticker", "-29.627197198336944" ], [ "the ruling gentry's disregard of public need. The vitality of the religious opposition made the conflict between 'evangelical' and 'gentry' styles a bitter one. Kroll-Smith (1984) suggests the strength of the evangelical movement's organization determined its ability to mobilize power outside the conventional authority structure. Organization Though each Baptist church is autonomous, Baptists have traditionally organized into associations of like-minded churches for mutual edification, consultation, and ministerial support. The constituency of these associations is based on geographical and doctrinal criteria. Many such associations of Baptist churches have developed in the United States since Baptists first came to the continent.\nUntil", "-29.610309241892537" ], [ "Another 23% of the adult population identified as having no religious affiliation. According to the American Religious Identification Survey, religious belief varies considerably across the country: 59% of Americans living in Western states report a belief in God, yet in the South (the \"Bible Belt\") the figure is as high as 86%.\nThe United States has more Christians than any other country in the world. Going forward from its foundation, the United States has been called a Protestant nation by a variety of sources.\nPoliticians frequently discuss their religion when campaigning, and many churches and religious figures are highly politically active. As", "-29.60318598642334" ], [ "Homosexuality and Baptist churches Basic beliefs As with most issues, there is a diversity of views of members of Baptist churches on homosexuality. Some denominations remain more conservative, believing in what they describe as 'traditional' marriage between one man and one woman. Other more liberal denominations allow local and autonomous congregations to determine their own regional policies. Thus, denominations are generally divided on the issue and reflect a diversity of opinions.\nNevertheless, Baptists generally believe that homosexuality must be an issue that is approached with compassion and love. Dr. Albert Mohler, President of The Southern Baptist Theological Seminary, emphasizes that:", "-29.523763844881614" ], [ "Racial segregation of churches in the United States Racial segregation of churches in the United States is a pattern of Christian churches having segregated congregations based on race. As many as 87% of Christian churches in the United States are completely made up of only White or African-American parishioners.\nRacially segregated churches have existed within the United States since before it became a country, and lasted well through the post slavery era into the modern age.\nThere are many reasons for the history and continued prevalence of racial segregation in U.S. churches, including racism, denominational differences, and isolation. This segregation also has", "-29.464029292576015" ], [ "suggests that there is some kind of cabal among secular Jews. That's nonsense. But is there a segment of the secular Jewish community that is anti-Catholic? Absolutely.\nIn November 2005, he criticized an episode of CSI: Crime Scene Investigation for promoting \"a pro-abortion rights agenda by portraying those who are opposed to abortion as religious nuts not to be taken seriously\".\nIn the spring of 2006, after Comedy Central refused to allow its animated television series South Park to show an image of Muhammad, Donohue said the show's creators Trey Parker and Matt Stone, whom he had frequently criticized, should have protested", "-29.363521374587435" ], [ "church at all, but those who attend racially segregated churches are more likely to be both covertly and overtly racist than either group. It is difficult to posit whether this intolerance is caused by attending a segregated church, or if those who hold prejudiced views are more likely to seek out a segregated church.\nIn a study of White Protestant Christians from the 1990s, it was found that those who had more contact with African Americans, especially a personal or more intimate relationship, were more likely to believe in structural inequality and racial discrimination than their counterparts with few or no", "-29.331202946486883" ], [ "religious lines is officially illegal, discrimination and prejudice against Muslims is common in American society. Muslims face discrimination in the workplace, discrimination at airport security checkpoints, immigration hearings. Additionally, Muslims are subjected to harassment, and there have been incidents of deadly violence perpetrated against Muslims due to their religion. As a consequence of the Patriot Act, various bodies of the American government have explicitly engaged in the targeted surveillance and infiltration of Muslim communities. Studies have noted that Muslims are disproportionately negatively portrayed as violent in American media. Treatment of atheists In the United States, seven state constitutions include religious", "-29.324328856280772" ], [ "are sorry to see religion having a deleterious effect on their homeland.\nAfrican-American communities tend to believe that the church is the center of morality and often turn to the church to solve various social problems that the government is not being perceived to solve or care about. As writer, Cord Jefferson put it, \"For a long time, black houses of worship doubled as war rooms to plan protest actions and galvanize people made weary by centuries of racist violence and legislation.\" Many black people have turned to religion to find the answers to their own suffering. In addition to the", "-29.290885928610805" ], [ "an ethical framework predicated on a system of oppressor class versus a victim much like Marxism.\nTrinity United Church of Christ, Chicago, has been cited in the press and by Cone as the best example of a church formally founded on the vision of black theology. The 2008 Jeremiah Wright controversy, over alleged racism and anti-Americanism in Wright's sermons and statements, caused then-Senator Barack Obama to distance himself from his former pastor.\nStanley Kurtz of the National Review wrote about the perceived differences with 'conventional American Christianity'. He quoted the black theologian Obery M. Hendricks Jr.: \"According to Hendricks, 'many good church-going", "-29.272917940979823" ], [ "atheists in the military, and recently, with the development of the Army's Comprehensive Soldier Fitness program, atheists have alleged institutionalized discrimination. In several child custody court rulings, atheist parents have been discriminated against, either directly or indirectly. As child custody laws in the United States are often based on the subjective opinion of family court judges, atheism has frequently been used to deny custody to non-religious parents on the basis that a parent's lack of faith displays a lack of morality required to raise a child.\nProminent atheists and atheist groups have said that discrimination against atheists is illustrated by a", "-29.27169788547326" ], [ "secularism in the Civil Rights Movement in the United States is another important subject for Jacoby. She believes that accepting the importance of secularism in the civil rights movement does not deny the role religion played in it, and while she has admitted that \"the driving force in the early civil rights movement were the black churches of the South\", she has also pointed out that the movement was not intrinsically religious, and that in fact, the white churches of the South were strongly opposed to it.\nSusan Jacoby has also highlighted the link and similarities between secularism and feminism. She", "-29.26331973588094" ], [ "George Yancey finds that the perception of some Christians that they are persecuted is not unfounded, and that anti-Christian hostility is real. Yancey, in a 2017 publication, suggests that levels of anti-Christian hostility have not significantly risen over the past few decades (in the United States), however those with this hostility have gained economic power and thus \"... Christian activists may be correct in that they now pay a stiffer price for that animosity.” \nSome Christian journalists point out that \"American Christians are being persecuted as you read this\" while noting that the persecution of Christians is real in the", "-29.237783559714444" ], [ "the Family Association's director of governmental affairs, has criticised \"powerful Jewish forces behind the ACLU\" and stated that secular Jews often \"turn out to be the worst enemies of the country\" while the AFA's president Tim Wildmon stated \"Most of the Jews in this country, unfortunately, are far-left.\"\nBryan Fischer, former director of issues analysis, has described Muslims as \"Parasites Who Must Convert or Die\" and stated that the First Amendment to the United States Constitution protects only the religious practice of Christianity, writing in a blog post \"The real object of the amendment was, not to countenance, much less to", "-29.20438064262271" ], [ "The ACLJ is one of several American Christian groups that are promoting conservative Christian laws in Africa, supporting controversial movements regarding LGBT rights, including support in Uganda for criminalizing homosexuality. Criticism The ACLJ has been criticized by the ACLU for its stance on putting prayer in public school and by Americans United for confounding support of separation of church and state with being anti-religious. The Human Rights Campaign is critical of the ACLJ's finances citing that the organization does not meet \"10 out of 20 of the Better Business Bureau’s standards for charity accountability\" and that ACLJ obfuscates how much", "-29.20265896015917" ], [ "than Muslims in Republican states. Democratic states, once again, showed \"no significant callback biases.\" The study added that \"employers in older counties are significantly less likely to call back the Muslim candidate compared to the Christian candidate\" In the workplace Protection against religious discrimination in the workplace is found in the context of the Civil Rights Act of 1964 Employees claim religious discrimination when it involves any of the following: disparate treatment, religious harassment, failure to reasonably accommodate religious beliefs, and retaliation against an applicant or employee who alleges religious discrimination. Disparate treatment can be defined as someone receiving different", "-29.200217573117698" ], [ "voters behind presidential candidate Ronald Reagan in 1980. Secularism In the United States, Supreme Court decisions that outlawed organized prayer in school and restricted church-related schools (for example, preventing them from engaging in racial discrimination while also receiving a tax exemption) also played a role in mobilizing the Religious Right. In addition, questions of sexual morality and homosexuality have been energizing factors—and above all, the notion that \"elites\" are pushing America into secularism. Christian nation Opponents criticize the Evangelicals, who they say actually want a Christian America—in other words, for America to be a nation in which Christianity is given", "-29.190625779738184" ], [ "African American contacts, who more so blamed African Americans for \"not working hard enough,\" as being the cause of racial inequality. Community organization Many have noted that primarily black churches were an integral part of the civil rights movement and a popular way to dispense information about boycotts and other activist ideas. Black churches continue to be important for bonding and community building in African American communities, as well as a place where African Americans are safe and free to grieve about the racism they face. Liturgical rituals are important for activist and community organizing in African American communities, whether", "-29.18819970439654" ], [ "permissible and sometimes obligatory, and did not constitute discrimination. The Church therefore opposes the extension of at least some aspects of civil rights legislation, such as nondiscrimination in public housing, educational or athletic employment, adoption, or military recruitment, to gay men and lesbians. The United States Conference of Catholic Bishops published a statement that was characterized by two theologians as claiming that \"nondiscrimination legislation protecting LGBT people promotes immoral sexual behavior, endangers our children, and threatens religious liberty.\" It also campaigns against same-sex marriage. Notable lesbian, gay and bisexual Catholics There have been notable gay Catholics throughout history. Writers such", "-29.155480885732686" ], [ "Civil religion in schools plays a dual role: it socializes youth to a common set of understandings, but it also sets off subgroups of Americans whose backgrounds or beliefs prevent them from participating fully in civil religious ceremonies. Ethnic minorities The Bellah argument deals with mainstream beliefs, but other scholars have looked at minorities outside the mainstream, and typically distrusted or disparaged by the mainstream, which have developed their own version of U.S. civil religion. White Southerners Wilson, noting the historic centrality of religion in Southern identity, argues that when the White South was outside the national mainstream in the", "-29.07672748796176" ], [ "that African Americans began forming their own churches, in part because of the unequal treatment they were facing in integrated churches in both the North and the South. Christian theology was often used to justify this split, with the implication that it was God's plan to have people separated by race. Jim Crow Era A survey was conducted of African American churchgoers in 1948 found that 94% of African Americans were a part of predominantly African American congregations. Of the other 6% who were part of integrated denominations, 99% went to segregated churches. During this time African American churches", "-29.07120772387134" ], [ "University of California, San Francisco, University of California, Santa Barbara, and University of California, Santa Cruz. University of California Adoption of, “Anti-Semitic Forms of Anti-Zionism” as Form of Discrimination The organization led a year-long campaign to get the University of California Board of Regents to formally recognize current manifestations of campus antisemitism which, according to AMCHA Initiative, include anti-Zionism's participation in anti-Jewish hostilities. On March 22, 2016, the University of California Regents passed a Statement of Principles Against Intolerance which included the statement, “Anti-Semitism, anti-Semitic forms of anti-Zionism and other forms of discrimination have no place at the", "-29.05673184242187" ], [ "ever overturned. White supremacy, hate crimes Arkansas is one of only four states in the U.S. to not have any legal protection against hate crimes (an anti-hate crimes measure passed the state Senate in 2001 but failed before a House panel, and a similar bill failed in 2017). The forests of Arkansas and the Ozark mountain region have provided cover for clandestine hate groups. White nationalist groups such as The Covenant, The Sword, and the Arm of the Lord (abbreviated CSA. In the 1980s this group had a compound in the Ozarks, later raided by the authorities) found cover in", "-29.046661908214446" ], [ "the black church are switching to predominantly white denominations, or not attending church altogether. Woodson emphasizes the importance of the black church as “the only institution that the race controls.”\nIn “Dissension and Weakness,” Woodson discusses the lack of tolerance those in rural areas have for dissension and differences in denomination around them. Woodson, once again, refers back to the lack of guidance and presence educated black people have in the black church and the effects of it; which includes children becoming more involved with gambling, drinking, and smoking.\n“Professional Education Discouraged” discusses the discouragement many black Americans face in academic settings.", "-29.033181739083375" ], [ "Bapticostal movement National Baptist Convention The National Baptist Convention, the largest predominantly African-American Baptist denomination in the United States, does not have any official beliefs or standpoints regarding Pentecostal and charismatic expressions of worship in their churches' services or in their national and district meetings and conventions, as they believe their churches have autonomous authority to deal with how they handle and address Pentecostal and charismatic expressions of worship. In fact, in many churches that are a part of the National Baptist Convention, and in many of their national and district meetings and conventions across the United States, their adherents", "-29.0303409434855" ], [ "Church in Aberdeen in protest at the presence of the Reverend Scott Rennie; further notes that the Westboro Baptist Church has gained notoriety for its extreme, homophobic views and pickets of American soldiers' funerals; also notes that the head of the church, Pastor Fred Phelps, and his daughter, Shirley Phelps-Roper, appeared on a list of individuals banned from entering the United Kingdom in 2009; considers that the views espoused by Pastor Phelps and his followers have no place in 21st century Scotland, and calls on the Home Secretary to confirm the continuation of the ban on their entry to the", "-29.02486786810914" ], [ "statement in November [2014] arguing that the \"[normalization of] homosexuality in the southern states\" would not be acceptable to their program. Others argued that the campaign wouldn't be enough to change the hearts of \"biblically literate Christians.\" Southern Protestants, especially those in the Southern Baptist Convention, are alleged to be the most vehemently opposed to the expansion of LGBT protections in the south.", "-28.969305088045076" ], [ "Ebenezer Baptist Church is located in the Sweet Auburn district as is the King Center, location of Martin Luther and Coretta Scott King's gravesites.\nThe Civil Rights Movement ended Jim Crow laws across the South. A second migration appears to be underway, with African Americans from the North moving to the South in record numbers. While race relations are still a contentious issue in the South, the region surpasses the rest of the country in many areas of integration and racial equality. According to 2003 report by researchers at the University of Wisconsin–Milwaukee, Virginia Beach, Charlotte, Nashville-Davidson, and Jacksonville were the", "-28.954292049980722" ], [ "\"believing in Christ is to believe in the United States.\"\nIn April 2007 other credible reports cite that police in Minh Hóa District in northern Quảng Bình Province confiscated Bibles from IEM followers and pressured followers to abandon their faith, telling them reportedly that Protestantism \"was a bad American religion\".\nThere were no reports of forced religious conversion of minor U.S. citizens who had been abducted or illegally removed from the United States or of the refusal to allow such citizens to be returned to the United States. Improvements and positive developments in respect for religious freedom The status of respect for", "-28.909758773224894" ], [ "to the teaching of God.\"\nDuring an interview with CBN, Jeffress further addressed racial issues: \"There has been a failure on the part of the Church, even a failure on conservative Christians in decades past, to denounce racism, to embrace segregation, which is so wrong.\" He added, \"I think we did have some catching up to do but I think that in this environment, we need to say clearly, that racism is abhorrent in the eyes of God.\"\nIn the summer of 2017, addressing the issue of DACA and children born to illegal immigrants, Jeffress said the \"president is one of the", "-28.88648186059436" ], [ "\"The unholy alliance of the Political Right and the Religious Right threatens to destroy the America we love. It also threatens to generate a revulsion against God and religion by identifying them with militarism, ecological irresponsibility, fundamentalist antagonism to science and rational thought, and insensitivity to the needs of the poor and the powerless.\" Commentators from all sides of the aisle such as Rob Schenck, Randall Balmer, and Charles M. Blow criticized the Christian right for its tolerance and embrace of Donald Trump during the 2016 presidential election despite Trump's failure to adhere to any of the principles advocated by", "-28.873705088393763" ], [ "the rise of the modern missions movement, and the backlash against it, led to widespread and bitter controversy among the American Baptists. During this era, the American Baptists were split between missionary and anti-missionary. A substantial secession of Baptists went into the movement led by Alexander Campbell, to return to a more fundamental church. United States Leading up to the American Civil War, Baptists became embroiled in the controversy over slavery in the United States. Whereas in the First Great Awakening Methodist and Baptist preachers had opposed slavery and urged manumission, over the decades they made more of an", "-28.864243647956755" ], [ "The number of attacks against Christian churches rose from 14 in 2000 to over 100 in 2003. Dozens of these acts were confirmed by U.S. diplomatic observers. This anti-Christian violence was led by extremist Buddhist clergy and has included acts of \"beatings, arson, acts of sacrilege, death threats, violent disruption of worship, stoning, abuse, unlawful restraint, and even interference with funerals\". It has been noted that the strongest anti-West sentiments accompany the anti-Christian violence since the Sinhalese Buddhist nationalists identify Christianity with the West which they think is conspiring to undermine Buddhism.\nIn the postwar Sri Lanka, ethnic and religious minorities", "-28.848789509531343" ], [ "objective truth (there are no facts, only interpretations), the repudiation of Christian concern for the poor and the weak, and disdain for the powerless\". On the Christian left, a number of commentators, including preacher and New York Daily News columnist Shaun King, criticized Trump's racially charged rhetoric as inconsistent with Christianity.\nTrump struggled with Mormon voters, affecting his party's grip on Utah, where Mormons constitute a majority, and Nevada, where they are a significant minority. Reasons for this include Trump's rhetoric concerning Muslims, which Mormons see as a parallel to their own historic persecution. Following the release of the 2016 Access", "-28.79457054042723" ], [ "to the world.\"\nHenderson has no problem with other people believing in God, as long as they aren't hurting anyone or making voting decisions based on their religious beliefs, \"I don't see any reason to attack them for that.\"\nWhen asked if her experience with religion and atheism is different because she is black she responded, \"There are still so many African Americans who are stuck in the slave mentality their ancestors handed down to them. They don't ask questions or wonder why there are laws for slavery in the Bible. They haven't done the research about why slavery was allowed to", "-28.791155301849358" ], [ "Islamophobia in the United States In hiring A 2013 Carnegie Mellon University study found that, nationally, Muslims had \"13% fewer callbacks\" than Christians after submitting identical job applications to the same establishments. The study also concluded that discrepancies between callbacks for Muslims and Christians were larger \"in counties with a high fraction of Republican voters,\" with Christians getting almost four times as many return calls in these constituencies. On the other hand, there was no discernible hiring discrimination against Muslims in Democratic counties. Biases were larger on the state level, with Christians getting more than seven times as many callbacks", "-28.787715622398537" ], [ "Klan and other White supremacist groups have expressed antisemitic views. They claim that their antisemitism is based on purported Jewish control of the media, international banks, radical left-wing politics, and the Jews' promotion of multiculturalism, anti-Christian groups, liberalism and perverse organizations. They rebuke charges of racism by claiming that Jews who share their ideology maintain membership in their organizations. A racial belief which is common among these groups, but not universal among them, is an alternative history doctrine, which is sometimes called British Israelism. In some of its forms, this doctrine absolutely denies the view that modern Jews have any", "-28.771385156811448" ], [ "manner.\nSome criticize what they see as a politicization of Christianity because they say Jesus transcends political concepts.\nMikhail Gorbachev referred to Jesus as \"the first Socialist\". Race and diversity The Christian right has tried to recruit social conservatives in the black church. Prior to the 2016 United States presidential election, Ben Carson emerged as a leader in the Christian right. However he has a very low approval rating among African Americans. LGBT rights Whilst the Christian right in the United States is making a tough stand against the progression of LGBT rights, other Christian movements have taken a more lenient approach", "-28.7426775025815" ], [ "and agnostics. In addition, freedom of expression provisions and legislation separating church from state also serve to protect the rights of atheists. As a result, open legal discrimination against atheists is not common in most Western countries. However, prejudice against atheists does exist in Western countries. A University of British Columbia study conducted in the United States found that believers distrusted atheists as much they did rapists. The study also showed that atheists had lower employment prospects. Europe In most of Europe, atheists are elected to office at high levels in many governments without controversy. Some atheist organizations in Europe", "-28.733055085118394" ], [ "Neo-orthodoxy's highly contextual modes of reasoning often rendered its main premises incomprehensible to American thinkers and it was frequently dismissed as unrealistic. Civil Rights Movement As the center of community life, Black churches held a leadership role in the Civil Rights Movement. Their history as a focal point for the Black community and as a link between the Black and White worlds made them natural for this purpose.\nMartin Luther King Jr. was but one of many notable Black ministers involved in the movement. He helped found the Southern Christian Leadership Conference (1957), serving as its first president. King received", "-28.698523023398593" ], [ "United States (which concerned the conflict of the Mormon practice of polygamy with anti-bigamy laws) affirmed that secular laws still apply when they contradict religious practices, unless a superseding law establishes a right to a religious accommodation.\nThe American Bar Association has opposed legislation banning foreign law or sharia as unnecessary, given that existing safeguards against foreign law already protect against rules that are contrary to American foreign policy, including discrimination on the basis of gender and religion. Background of controversy In June 2009, a family court judge in Hudson County, New Jersey denied a restraining order to a woman who", "-28.671046876523178" ], [ "at the time in American life. According to Widtsoe, all Mormon theology could be reconciled within a rational, positivist framework. The church's political involvement in LGBT issues The church opposes same-sex marriage, but does not object to rights regarding hospitalization and medical care, fair housing and employment rights, or probate rights, so long as these do not infringe on the integrity of the family or the constitutional rights of churches and their adherents to administer and practice their religion free from government interference. The church supported a gay rights bill in Salt Lake City which bans discrimination against gay", "-28.669614271537284" ], [ "and a defense of \"Western civilization from the challenges of modernist culture and totalitarian governments.\" Black conservatives are motivated by two of the values of general conservative thought, for the love of God and country. The black church specifically is linked to Christian evangelism and a dependence on God and his plans. These plans are part of what allow Black conservatives to get behind the ideas of individualism that conservatism is built on. Though it may seem antithetical to reconcile the history of slavery and segregation with the ideas of complete American freedom and equality, it is actually the hope", "-28.667119308258407" ], [ "power skinheads, the Boycott, Divestment and Sanctions movement and others whose total membership is estimated at 3,000. Several fundamentalist churches also preach antisemitic messages.\nThe 1998 ADL survey also found a correlation between antisemitism and sympathy for right-wing antigovernment groups. Although antisemitism has declined over the past 35 years, the activities of some antisemitic groups have intensified. From 1974 to 1979, membership in the Ku Klux Klan rose from a historic all-time low of 1,500 to 11,500, and throughout the 1980s various Klan factions allied themselves with more explicitly neo-Nazi groups like the Aryan Nations (see neo-Nazi movements). The founding (1979)", "-28.660897169844247" ], [ "in the case of the forced conversion of American citizens by a private actor. Societal abuses and discrimination There were no reports of societal abuses or discrimination based on religious belief or practice; however, some religious groups reported societal hostility within their regions. Established churches denounced new unaffiliated religious groups, most of which are individually motivated Tele-ministries, as \"sects\" or \"cults,\" claiming that they were detrimental to societal peace and harmony. In practice, such denunciation did not inhibit the practice of the unaffiliated religious groups. In the northern provinces, especially in rural areas, societal hostility by Muslims against Christians and", "-28.65810513496399" ], [ "no longer be considered a civil rights group. It has become a racist organization with black supremacy ideals and an expressed hatred for whites.\" (Martin Luther King's Southern Christian Leadership Conference was classified as a \"hate-type\" group by the federal government during the same period).\nSNCC became a target of the Counterintelligence Program (COINTELPRO) of the Federal Bureau of Investigation (FBI) in a concerted effort at all levels of government to crush black radicalism – both violent and nonviolent – through both overt and covert means ranging from propaganda to assassination.\nCharles E. Cobb, formerly SNCC field secretary in Mississippi, has said", "-28.654325575567782" ], [ "a people. The LDS people are no better or no worse than any other group of people. Any dispute is to be a disagreement with the \"ism\", not the \"Mormon\".\nJames White, meanwhile, rejects the term because of a lack of reciprocal terminology. He wrote to one LDS apologist, \"If you will identify yourself as an anti-Baptist, I'll let you call me an anti-Mormon.\"\nEven some members of the church who write negatively about it, especially those who call into question its divine nature, have had their writings labeled anti-Mormon. Ex-Mormons who write about the church are likewise frequently labeled anti-Mormon, even", "-28.62385070784876" ], [ "has made no distinctions in policy for black people, but it remains an issue for many black members of the church. Alvin Jackson, a black bishop in the LDS Church, puts his focus on \"moving forward rather than looking back.\" In an interview with Mormon Century, Jason Smith expresses his viewpoint that the membership of the church was not ready for black people to have the priesthood in the early years of the church, because of prejudice and slavery. He draws analogies to the Bible where only the Israelites have the gospel.\nIn a 1997 TV interview, President Gordon B. Hinckley", "-28.618522858072538" ], [ "the 2006 First North American Secessionist Convention, when the issue of the League of the South and racism was raised, Don Kennedy, identified as \"a leader of the League of the South\", stated: \"How can you believe in liberty and discriminate against your neighbor? Equality before the law is something we want, and we're on the record for that.\" News stories about the Second North American Secessionist Convention also mentioned the SPLC's allegations, as well as skeptical responses from convention attendees. Convention organizer Kirkpatrick Sale responded: \"They call everybody racists. There are, no doubt, racists in the League of the", "-28.593969002598897" ], [ "was \"a white backlash against black progress,\" the push ended as White Americans were less inclined to push for social segregation. However, many historians have noted that religion was an important motivator for people to be in favor of civil rights, as they saw racism as sinful or unchristian. This may have varied widely by region, as Southern pastors were much more racist than their Northern counterparts. Additionally, many evangelical Christians believed that integration and equality may be impossible, as they believed that the world was descending into chaos as a precursor to \"the second coming,\" when Jesus would return", "-28.583766379626468" ], [ "South \"pogroms\". Stressing the similarities rather than the differences between the Jewish and Black experience in America, Jewish leaders emphasized the idea that both groups would benefit the more America moved toward a society of merit, free of religious, ethnic and racial restrictions.\nThe American Jewish Committee, the American Jewish Congress, and the Anti-Defamation League were central to the campaign against racial prejudice. Jews made substantial financial contributions to many civil rights organizations, including the NAACP, the Urban League, the Congress of Racial Equality, and the Student Nonviolent Coordinating Committee. About 50 percent of the civil rights attorneys in the South", "-28.579857928445563" ], [ "religion brought before the Equal Rights Commissioner. Some observers believed the existence of and the activities of the Federal Office of Sect Issues and similar offices at the state level foster societal discrimination against minority religious groups.\nMembers of groups that the Government considers to be \"sects\" continued to complain that the Government lacks an objective stance when dealing with them. The \"sects\" claimed that the Government relies too heavily on isolated cases of persons who have had negative experiences with a group, rather than speaking directly to the vast majority of members who make no complaint. Societal prejudice could also", "-28.576673107338138" ], [ "point in its history, where its previous attitudes toward other cultures and people of color, which had once been shared by much of the white American mainstream, began to appear racist and neocolonial. The church came under intense fire for its stances on blacks and Native Americans issues. The church and blacks The cause of some of the church's most damaging publicity had to do with the church's policy of discrimination toward blacks. Blacks were always officially welcome in the church, and Joseph Smith established an early precedent of ordained black males to the Priesthood. Smith was also anti-slavery, going", "-28.570989533211105" ], [ "blatantly sexist stance and the similarities to white supremacist ideologies:\n Many RBNs routinely preach hate. Just as white supremacists have referred to African Americans as \"devils,\" so have many RBNs referred to whites. White supremacists have verbally attacked gays, as have RBNs. White supremacists embrace paranoid conspiracy theories, as do their African counterparts. Many white supremacists and RBNs consistently deny that they are preaching hate, and blame the mainstream media for misrepresenting them. (A striking exception is the NOI's Khallid Muhammad, who, according to Gates, admitted in a taped speech titled \"No Love for the Other Side\": \"Never will I", "-28.562541059596697" ], [ "has been directly attributed to fundamentalist Christian groups.\nIn 2006 Keith Ellison became the first Muslim elected to the federal government, as the representative of Minnesota's 5th congressional district. When re-enacting his swearing-in for photos, he used the copy of the Qur'an once owned by Thomas Jefferson.\nA Gallup Poll released in 2007 indicated that 53% of Americans would refuse to vote for an atheist as president, up from 48% in 1987 and 1999. Research shows that candidates that are perceived to be religious are considered more trustworthy. Separation of church and state In the 1780-1820s in New England the dominant Federalist", "-28.514636191073805" ], [ "against abortion, pornography, sexual deviancy, and extreme feminism. Beginning around the presidency of Donald Trump, Christian conservatives have largely refrained from engaging in debates about sexual morality.\nInfluential Christian right organizations at the forefront of the anti-gay rights movement in the United States include Focus on the Family, Family Research Council and the Family Research Institute. An important stratagem in Christian right anti-gay politics is in its rejection of \"the edicts of a Big Brother\" state, allowing it to profit from \"a general feeling of discontent and demoralization with government\". As a result, the Christian right has endorsed smaller government, restricting", "-28.503900119569153" ], [ "are supposed to convey in the public sphere; that homosexuality is seen as antithetical to being black in the African American community; and the association of the African American community with the church in the United States.\nAfrican Americans in general tend to have more homophobic beliefs than the rest of the country. More black Americans support the idea that queer people should be condemned, or that AIDS is an acceptable punishment for gay people. Some believe this to be attributable to the effect that conservative church going has on African Americans.\nHowever, black people in general are less supportive of homophobic", "-28.497194500581827" ], [ "church's lay priesthood. The church was sharply criticized for its policy during the civil rights movement, but the policy remained in force until a 1978 reversal that was prompted in part by questions about mixed-race converts in Brazil. In general, Mormons greeted the change with joy and relief. Since 1978, black membership has grown, and in 1997 there were approximately 500,000 black members of the church (about 5 percent of the total membership), mostly in Africa, Brazil and the Caribbean. Black membership has continued to grow substantially, especially in West Africa, where two temples have been built. Many black Mormons", "-28.48772333143279" ], [ "association.\nBecause of its particular doctrinal views, the religious group is criticized by main Christian churches, including evangelical associations.", "-28.476508308493067" ], [ "the well.\nAmerican pastor Ty Grigg says that the rule (assuming all American pastors implemented it) has not been \"effective at curbing infidelity\". He says that the rule \"has framed relating with the opposite sex with fear\", and that this leads to a diminished mutual respect, which in turn creates \"the kind of environment where inappropriate relating is more likely to occur\". Others, though, suggest that unfaithful pastors must have failed to implement the rule.\nChristian author Michael Brown says that criticism against the rule has misunderstood the purposes of the rule. He says that the rule prevents third parties from", "-28.461759558180347" ], [ "organization's founding Executive Director, Ken Sehested, advocated an explicitly Baptist peace organization because:\nWith some exceptions, progressive movements--those dealing with justice and peace issues--have few entry points into the subculture of Baptist institutions. By and large their voices simply are not heard; or, if heard, not heeded, primarily because the vocabulary and appeals to authority are so different from our traditional language of faith.\nThere are 73 partner churches in the United States, and 2 in Canada, a very small membership in proportion to the total number of Baptist churches in North America. Its size reflects that the agenda of the body", "-28.442695983532758" ], [ "rights The LDS church has been involved with many pieces of legislation relating to LGBT discrimination and same-sex marriage. Leaders have stated that it will become involved in political matters if it perceives that there is a moral issue at stake and wields considerable influence on a national level with over a dozen members of congress having membership in the church in the early 2000s, and about 80% of Utah state lawmakers identifying as Mormon. Views on discrimination laws In February 2003, the LDS Church said it did not oppose a hate-crimes bill, which included sexual orientation, then under consideration", "-28.392526237352286" ], [ "on religion, which he described as a man-made phenomenon caused by deliberate actions and omissions of hate-mongers. For instance, there is the case of simplistic explanations for complex societal problems and these are given for the purpose of stirring resentment. Some civil rights movements stir up hatred against religion. For example, homophobia is typically defined by gay rights activists as not only including refusal to bake a gay wedding cake, but also religious teaching that homosexuality is evil, which results in censorship of religious freedom. \nHatred can also be sanctioned by religion. The Hebrew word describing David's \"perfect hatred\" (KJV)", "-28.375210588914342" ], [ "message towards all races. In 1905, the church suspended an elder for opposing the full integration of all races.\nHistorian Dale Morgan wrote in 1949: \"An interesting feature of the Church's doctrine is that it discriminates in no way against ... members of other racial groups, who are fully admitted to all the privileges of the priesthood. It has taken a strong stand for human rights, and was, for example, uncompromisingly against the Ku Klux Klan during that organization's period of ascendancy after the First World War.\"\nAt a time when racial segregation or discrimination was commonplace in most institutions throughout", "-28.370186017127708" ], [ "by theological differences and in part by differences in practice. Religious scholar Terriel Byrd explains these practical differences by saying that the church allows African American Christians to show their \"disillusionment\" with society and their mistreatment within it, whereas White people remain more reserved, as they hold societal power and do not need to express the same kind of anguish. Various denominations have made it a formal goal to increase diversity within their congregations. Pentecostalism Pentecostalism in the United States grew out of the Holiness movement. Pentecostalism and Holiness were especially attractive to African Americans from the South because the", "-28.366799854848068" ], [ "the anti-Catholic tradition that existed in the United States, which was inherited as a result of Protestant/Catholic European competition and wars, which had been fought between Protestants and Catholics over the preceding three centuries. When the United States was founded, it inherited the anti-Catholic, anti-papal animosity of its original Protestant settlers. Anti-Catholic sentiments in the U.S. reached a peak in the 19th century when the Protestant population became alarmed by the large number of Catholics who were immigrating to the United States. This was due in part to the standard tensions that arise between native-born citizens and immigrants. The resulting", "-28.330276397689886" ], [ "religions practiced in the United States, assuming that these faiths all share the same values. Alvin J. Schmidt argues that since the 1700s, expressions of civil religion in the United States have shifted from a deistic to a polytheistic stance.\nSome scholars have argued that the American flag can be seen as a main totem of a national cult, while others have argued that modern punishment is a form of civil religion. Arguing against mob violence and lynching, Abraham Lincoln declared in his 1838 Lyceum speech that the Constitution and the laws of the United States ought to become the \"political", "-28.32684609707212" ], [ "views, or political affiliation. Critics, however, say the law gives the privately run admissions committees a wide latitude over public lands, and believe it will worsen discrimination against the Arab minority. Zionism Some critics of Israel equate Zionism with racism, or describe Zionism itself as racist or discriminatory. In 1975, the United Nations General Assembly passed Resolution 3379, which concluded that \"Zionism is a form of racism and racial discrimination\". During debate on the resolution, U.S. ambassador Daniel Patrick Moynihan argued that Zionism \"clearly is not a form of racism\", defining racism as \"an ideology ... which favors discrimination on the", "-28.315147274028277" ], [ "has not issued a written repudiation of racist doctrines. Apostle Bruce R. McConkie told members to \"[f]orget everything that I have said, or what President Brigham Young or President George Q. Cannon or whomsoever has said [about Blacks and the priesthood] .... We spoke with a limited understanding.\" Some black members have made formal requests to the church to issue a statement, while other black members have argued against that effort. \nDarron Smith, a critical black church member, contends in his book, Black and Mormon, that the church \"refuses to acknowledge and undo its racist past, and until it does", "-28.314347157254815" ], [ "their church. Nevertheless, given the denomination's diversity, some pastors and congregations affiliated with the National Baptist Convention, USA, Inc. announced their support for same-sex marriage. \"The National Baptist Convention, USA, Incorporated does not dictate to its constituent churches what position to take on issues because we believe in the autonomy of the local church.\" Charismatic movement The National Baptist Convention does not have any official stances regarding Pentecostal and Charismatic expressions of worship in their churches' services or in their meetings and conventions, as they believe their churches have autonomous authority to deal with how they handle and address Pentecostal", "-28.305650245194556" ], [ "to a youth group from Broadway Baptist Church in Fort Worth, Texas, to help build homes for the poor, stating they did so because the church had been removed from the Southern Baptist Convention. This action was condemned by Kentucky Equality Federation because the church pastor stated officials told him it was because of their tolerance of homosexuality.", "-28.289189879607875" ], [ "States, Wexler's research focuses on church-state issues and environmental law. He also writes legal fiction. Our Non-Christian Nation: How Wiccans, Satanists, Atheists, and Other Non-Christians are Demanding their Rightful Place in American Public Life (2019) Wexler examines how a smaller portion of the United States population identifies as Christian than in the past, and how the growing non-Christian religions are using the law to assert themselves and create a more diverse public square. Wexler travels the country to obtain first hand accounts of the religious disputes of the Summum in Salt Lake City, Wiccans in Wisconsin, Atheists in Greece, New", "-28.228068120748503" ], [ "by CAIR and University of California, Berkeley's Center for Race and Gender said that groups promoting islamophobia in the US had access to 206 million USD between 2008 and 2013. The author of the report said that \"The hate that these groups are funding and inciting is having real consequences like attacks on mosques all over the country and new laws discriminating against Muslims in America.\"\nIslamophobia has consequences. In the United States, religious discrimination against Muslims has become a significant issues of concern. In 2018, The Institute for Social Policy and Understanding found that out of the groups studied, Muslims", "-28.186030342796585" ] ]
4tlzjl
What makes up the "old lady" smell in perfumes/powdered cosmetics?
[ "I believe it is their attraction to scents based with two choices, either rose water or lilac. These smells seem to be targeted or coveted to an older audience. Not sure which. My granma liked rose based. Ugh.", "Oh, I know this one!! I believe what you're thinking of as \"old lady perfume smell\" is from aldehydes, which is a category of compounds that are present in a wide range of perfumes. The perfume that popularized aldehydes (though not the first to use them) was the classic Chanel No. 5, released in the early 1920's. At the time, I believe it felt distinctly modern and avant garde to feature a synthetic smell as a prominent note in a lady's perfume, instead of traditionally feminine florals; I'm sure you can imagine how that turned things on their head! This character of perfume was duplicated and riffed on through the 50s and 60s. But of course, as with so many fashions, the effect is now dated. Combine the outdated trend with the fact that most of the people still wearing it are probably using very old bottles of the stuff (and perfume does change in character as it ages, never in a good way), you get \"old lady smell.\" Fashion is cyclical, though, so don't be surprised if aldehyde-based perfumes start to get popular again, though I predict they will be far more subtle and nuanced this time around.", "Chanel no.5 is often what people think of when they think of \"old lady smell\" in regards to perfume. Like another user said the smell is based on strong, sometimes \"powdery\" smelling floral scents like rose. Rose is the big one.", "Part of the smell is moth balls and preferred perfumes, but a lot of it is chemical changes humans go through as they age which makes older people have a distinct body odor.", "\"Old ladies\" don't actually have that smell naturally. The \"old lady\" smell is just a combination of scents of products that women from a previous generation used more often. Some of those smells we rarely come across anymore except when around a woman from a previous generation who is still using the products that cause that scent. When you come across a scent that reminds you of it, you may instantly think \"old lady\" because that's where you've smelled it before.", "This is going to sound stupid. There's a certain men's cologne that I smell on ocassion that has a spicy musky smell. I really like the scent but would feel like an idiot asking a dude what scent he's wearing. Does anybody know what I'm talking about.? And no its not old spice." ]
[ [ "Peau d'Espagne Scent British sexologist Havelock Ellis esteemed peau d'espagne as \"a highly complex and luxurious perfume, often the favorite scent of sensuous persons\" and noted that \"it is said by some, probably with a certain degree of truth, that Peau d'Espagne is of all perfumes that which most nearly approaches the odor of a woman's skin; whether it also suggests the odor of leather is not so clear\". Use As first employed in the sixteenth century, peau d'espagne was composed primarily of rose, neroli, sandalwood, lavender, verbena, bergamot, clove and cinnamon oil, as well as civet and musk. Leather", "-34.815016057153116" ], [ "2008, the original Old Spice scent was repackaged as \"Classic Scent\", both in the after shave and cologne versions. The white glass bottles gave way to plastic, and the gray stoppers to red. Old Spice Classic shower gel was sold using the slogan \"The original. If your grandfather hadn't worn it, you wouldn't exist.”\nIn January 2016, Procter & Gamble changed the scent of its Old Spice Classic After Shave. According to the product's website, under ratings & reviews, the change was made in order to \"comply with new regulations\". Advertising In the 1970s and 80s, Old Spice ad campaigns in", "-34.26770745713657" ], [ "I wanted my nana to smell it and not have an allergic reaction. she also notes that her mother inspired her to get into the beauty business stating \"My mom used to have this pretty display with tons of perfume bottles and I’d always look at them. So I knew from a young age that I wanted to make my own fragrance one day. Packaging and scent The perfume is described as an \"unusual mixture\". The fragrance's Top Notes consists of notes of white tea, bitter orange, lemon zest. In its Heart Notes, the scent features a combination of mint,", "-34.13494218409869" ], [ "etc.. (Scents of honey can also be assimilated).\nAgeing also brings other flavours to the wine. Barrel ageing creates scents of vanilla, butter, brioche, toast, caramel, etc. The long maturing wines like yellow wine or sherry have typical aromas of fresh walnuts, almonds, and hazelnuts.\nFinally the soil can impart a flavour characteristic of a region. Thus, the mineral aromas of flint (odour of flint or of light stone) well expressed in Chardonnay B and sauvignon B, and the scent of oil is typical of old Alsatian Rieslings B.\nSame aromas that may be thought to be confined to red wines are found", "-33.70584136283469" ], [ "of the 12th century comments on this passage that galbanum is bitter and was included in the incense as a reminder of deliberate and unrepentant sinners. The incense formula was apparently ground small or into a powder. This would be possible because Galbanum, which is a sticky tar-like resin, can be made into a powder by drying, low boiling, or adding a diluent\nIt is occasionally used in the making of modern perfume, and is the ingredient which gives the distinctive smell to the fragrances \"Must\" by Cartier, \"Vent Vert\" by Balmain, \"Chanel No. 19\" and \"Vol De", "-33.59702724189265" ], [ "Beaux said in a 1953 interview with Time. The article continued: \"Beaux gives each essence the nose test because some scents will last after a week of exposure, while others, for some unknown reason, will last only a few hours. When he is creating a new perfume he does no sniffing, simply jots down a formula, claims he knows exactly what the final result will smell like. Says Beaux: 'It is like writing music. Each component has a definite tonal value ... I can compose a waltz or a funeral march.'\" At the time of the interview, Beaux was not", "-33.56424452638021" ], [ "Perfumer A perfumer is an expert on creating perfume compositions, sometimes referred to affectionately as a Nose (French: le nez) due to their fine sense of smell and skill in producing olfactory compositions. The perfumer is effectively an artist who is trained in depth on the concepts of fragrance aesthetics and who is capable of conveying abstract concepts and moods with fragrance compositions. At the most rudimentary level, a perfumer must have a keen knowledge of a large variety of fragrance ingredients and their smells, and be able to distinguish each of the fragrance ingredients whether alone or in combination", "-33.15512304326694" ], [ "other ingredients consisting of complex chemical mixtures. However, \"anyone armed with good GC/MS equipment and experienced in using this equipment can today, within days, find out a great deal about the formulation of any perfume... customers and competitors can analyze most perfumes more or less precisely.\"\nAntique or badly preserved perfumes undergoing this analysis can also be difficult due to the numerous degradation by-products and impurities that may have resulted from breakdown of the odorous compounds. Ingredients and compounds can usually be ruled out or identified using gas chromatograph (GC) smellers, which allow individual chemical components to be identified both through", "-33.134501182401436" ], [ "2-Nonenal Odor characteristics The odor of this substance is perceived as orris, fat and cucumber. Its odor has been associated with human body odor alterations during aging.", "-33.12791604507947" ], [ "people and something that was not reminiscent of other perfumes she had smelled. Nordstrom National Beauty and Fragrance Director Cheri Botiz said that while the pop singer was working with perfumers on Purr, the aim was to \"capture the distinctive notes of her favorite perfumes\". Packaging and scent Purr's scent is fresh with a citrus twist which also features peach nectar and apple with green bamboo. It also includes a \"delicate bouquet of jasmine blossom, pink freesia and Bulgarian rose, balanced by vanilla orchid, white amber, creamy sandalwood and musk.\" The bottle is purple, shaped like a cat, decorated with", "-33.101649838718004" ], [ "The perfume composition will then be either used to enhance another product as a functional fragrance (shampoos, make-up, detergents, car interiors, etc.) or marketed and sold directly to the public as a fine fragrance.\nAlternatively, the perfumer may simply be inspired to create a perfume and produce something that later becomes marketable or wins a brief. This is more common in smaller or independent perfume houses.", "-32.9263901594386" ], [ "into pieces about 4 inches square; two of these are pasted together with the above paste, placed between 2 pieces of paper, weighted or pressed until dry. It may then be inclosed in silk or satin. It gives off its odor for years; is much used for perfuming paper, envelopes, etc.; for which purpose 1 or 2 pieces of the perfumed leather, kept in the drawer or desk containing the paper, will impart to it a fine and durable perfume. In culture The scent gave its name to a 1933 comedy in four acts by French writer Jean Sarment.", "-32.89879606256727" ], [ "the most well known for odour memorization and understanding. It and its variants are commonly used to train perfumers entering into the field.", "-32.80832802262739" ], [ "Laudamiel and Christoph Hornetz. Laudamiel read the novel in 1994 and began recreating odors from it in 2000; Hornetz joined the project in 2002. 14 of the fragrances were inspired by the novel and film, the 15th works as a fragrance enhancer but can also be worn on its own. Smells represented by the perfumes include Paris in 1738, a virgin's navel, a clean baby and leather. The coffret was released as a limited edition of 1,300 sets which sold for US$700 each; all 1,300 sets were sold. Box office The film was a financial success, especially in Europe, earning", "-32.769294026715215" ], [ "of gold dust. What more could you ask for?\". Reception Kristin Booker of the fashion website Refinery29 described the scent as a \"voluptuous, sexy floral\". Kathleen Hou writing for New York opined that the perfume's best part was that it was inspired by a poem by Angelou. Hou also noted feminist influences in the scent with usual additions of orchid and masculine notes of autumn woods, cashmere, musk, and vetiver extract. She concluded her review by stating \"Maya Angelou-reading perfume sounds (and will surely smell) pretty good\". With a similar opinion, Treye Green of the International Business Times noted more", "-32.76743116549915" ], [ "perfume is known to be more \"sweet\" than its previous bottle. The bottle is a cat-shaped bottle which is basically the same as its previous bottle, other than that it is light pink and the collar is the letter \"M\". Meow's scent has ingredients including pear, honeysuckle, and vanilla. The fragrance also features small scents of musk and amber as well. Release On December 1, 2011, Katy confirmed that the launch of the perfume would be on December 13, 2011, at Nordstrom stores. However, before this date the perfume was already out for pre-order.", "-32.73382873243099" ], [ "creating bespoke perfumes for individuals who are less interested in purchasing the same fragrances that every other person is wearing and more inclined to wearing a perfume tailored precisely to their own preferences, memories and scent matches. Some cosmetic brands such as Shiseido and Décléor are devoting substantial efforts to the task of finding out the beneficial properties of aromas on our sense of well-being and health. Shiseido currently has a skincare line called \"The Skincare\" that uses aromachology in their products.\nBroader applications for aromachology are found in industries that introduce scent into products other than cosmetics or perfumes. Aromachology", "-32.726565817181836" ], [ "embaumé\" was replaced with the unapologetic \"Belle Halaine\" (or \"Beautiful Breath\"). The \"R\" for Rigaud became \"RS\" for Rrose Sélavy.\nThe object touches on several issues; authorship, since the label is by Rigaud, Duchamp and Man Ray; gender identity or sexual orientation, as the woman's perfume now has a Duchamp as its principle image. Further sexual connotations arise due to suggestions of smell, touch, and taste intrinsic to the piece.\nShortly after its inception, Duchamp gave the bottle to Yvonne Chastel-Crotti, the ex-wife of Jean Crotti (who eventually married Suzanne Duchamp). Yvonne Crotti kept it throughout her lifetime. The first exhibition within", "-32.68758993514348" ], [ "acid. White crystals of a terpene known as ambrein can be separated from ambergris by heating raw ambergris in alcohol, then allowing the resulting solution to cool. Breakdown of the relatively scentless ambrein through oxidation produces ambroxan and ambrinol, the main odor components of ambergris.\nAmbroxan is now produced synthetically and used extensively in the perfume industry. Applications Ambergris has been mostly known for its use in creating perfume and fragrance much like musk. Perfumes can still be found with ambergris around the world. It is collected from remains found at sea and on beaches, although its precursor originates from the", "-32.64544911903795" ], [ "smell, therefore, Chaldée the perfume (a dry musk) was produced), Le Sien (one of the first perfumes for men and women), and Cocktail (literally a floral cocktail). All these, with the exception of Le Sien, were re-released during the 1980s (under the name Ma Collection), and were available until recently, all in a 50ml Eau de Toilette Spray, 75ml Eau de Toilette bottle, and 30ml pure perfume bottle, each with a unique art deco box. A Jean Patou silk scarf, printed in a pattern complementing that of the box was included with the pure perfume. Joy remains the world's second", "-32.56196950838057" ], [ "higher ratio of perfume oil to alcohol and may therefore last longer on the skin of the wearer.\nSome of the better known fragrances are Angel Food, Baby Powder, Carrot, Cosmopolitan Cocktail, Leather, Paperback, Play-Doh (created in 2006 to mark Play-Doh's 50th anniversary), Riding crop, Sushi, Pipe Tobacco, Turpentine, Snow, Lime, and Golden Delicious Apple. The fragrances in the line can be combined and layered together so that wearers can create their own fragrances.\nBesides its cologne sprays, Demeter Fragrance Library makes other products scented with the same fragrances, including body lotions, shower gels, exfoliant scrubs and room sprays.", "-32.41202386136865" ], [ "from straw yellow to gold, the aroma from dry, semi-dry to sweet. Its flavor is that of ripe grapes, with attractive taste. It is an aromatic wine, much like scented lemon flowers or sage essence.\nGewürztraminer It is produced in a wide variety, from dry to sweet. Its color is yellow-green to gold or amber-gold, after several aging years. Its specific and distinct aroma resembles that of roses. The taste is slightly spicy, but otherwise smooth and velvety. Through aging it becomes full-bodied, slightly bitter and has a hazelnut flavor.\nPinot gris it is a very attractive wine, thanks to its noble", "-32.299281464423984" ], [ "green accords.\" The fragrance comprises top notes of tomato leaves, citrus, fruity and watery notes. The scent's heart is made of black pepper and a floral accord, including rose notes. Sandalwood and patchouli notes are in the fragrance's drydown. The overall effect of the scent is frequently described as \"fresh\" and \"energetic\" or \"spicy.\" Related products The popularity of the fragrance prompted Lacoste to release companion products in addition to the cologne including Lacoste Essential Shower Gel, after-shave and deodorant stick. Variants Since the inception of the brand, Lacoste has offered a variety of spin-off fragrances. For men, Lacoste offers", "-32.29861546998097" ], [ "style. They were presented in classic flacons with cut glass stoppers and colorful, embossed labels depicting bold and beautiful women. Many of these perfumes were named after famous operas or historical figures; particularly Prussian and Polish noble families given his heritage.\nBlocki also derived inspiration from his family and one of the more artistic results was a perfume named Psyche Rose. The fragrance was inspired by the White Rock Sparkling Water company's trademark Psyche logo; a nymph kneeling on an alabaster rock and admiring her reflection in pure spring water. White Rock was owned by Edwin Gale and Blocki's brother, William.", "-32.222679748083465" ], [ "my laboratory and the surrounding area (for an area of several meters) was affected by the scent released from the spices... On the first day of processing, the aroma was so intense that I could almost taste it... Upon my return home that evening, the scent that had attached itself on my body and clothes was really apparent to both my wife and daughter. During the course of the week, the odor lessened slightly but was still noticeable in and around my lab. Within a few weeks the distinct aroma of the spices diminished to a freshness or cleanness of", "-32.149443594855256" ], [ "formula, rather than newly added ingredients. 2009 change In October 2009, the formula for the transparent amber soap was altered from the original to become 'Gentle Care' and wrapped in an inner cellophane covering. The new soap was slightly softer in texture and lasted half as long, but its most noticeable difference was its scent. The aroma of the classic transparent amber bar, which used to be characterized by a mild, spicy herbal fragrance, had been altered to a stronger aromatic scent. The \"Hypoallergenic, non-comedogenic\" claim was dropped, and the 3-month aging process described on the original box does not", "-32.106372303678654" ], [ "natural scent of our bodies, thus forgoing an ancient form of animal communication. I wanted to isolate these primal human essences and deliver them in an environment devoid of other sensual distractions. The piece represents the true essence of a woman - free of visual prejudice.\" Eau De M, 2014 In 2014 she expanded the Smell Me olfactory self-portrait concept by exposing it to the wider public through guerilla advertising. The resultant piece, Eau De M, which consisted of the artist's sweat essence delivered by way of a magazine scent-strip fragrance advertisement, appeared as a double-sided insert in the full", "-32.09310163166083" ], [ "be non-interventionist. For Malle, there is only one rule perfumers have to follow when creating a perfume for the house; \"Eliminate all that is superfluous or merely decorative\".\nMalle wanted the perfumers to receive credit for their creations, and as such openly advertises the perfumer behind the scent, which includes placing the perfumers name on the bottles and boxes. This acknowledgment of the perfumer was a decision that perfume critic Chandler Burr described as \"all-but-revolutionary\". The reason Malle gives for crediting the perfumers was that he \"thought it was so unjust to always hide perfumers like ghostwriters; I wanted them to", "-31.983251974568702" ], [ "the 2001 Sense of Smell Institute's Richard B. Solomon Award, and has helped pioneer the trend toward using natural ingredients.\nAftel's 2005 book Scents and Sensibilities guides the reader through the history and creation of solid perfume. Fragrant, published in 2014, is organized around five ingredients: cinnamon, frankincense, ambergris, jasmine and mint. Fragrance Aftel's first fragrance line, founded with a partner, was called Grandiflorum; in 2000, Aftel launched her own line, Aftelier. As of 2016, the line offers a range of 18 fragrances, as well as an option for clients to work with Aftel to develop a custom fragrance. In 2016,", "-31.949567056493834" ], [ "versions include the Fragrance Circle, developed in 1979 by U. Harder at Haarman & Reimer, the Wine Aroma Wheel, from 1984 by sensory chemist Ann C. Noble, and the Fragrance Wheel, created in 1992 by perfumery taxonomist Michael Edwards. Fragrance Families and Personality Various suggestions have been put forth about the link between a person's favorite scent family and their personality. Stephen V. Dowthwaite, founder of PerfumersWorld, claimed that \"Our choices in perfume are influenced by [...] the image we want to portray.\" According to Dowthwaite, very feminine personalities gravitate toward Florals while very masculine personalities prefer the Woody family.", "-31.923169930145377" ], [ "Frédéric Malle, the fragrance was part of a turn toward the recognition of the perfumer behind the scent, with Malle including not only the name of the perfume and brand on his bottles' labels, but also the \"nose\" who created the fragrance. In turn, Giacobetti is among the perfumers who have raised the profile and sales of such independent and niche perfume lines, where (with a few exceptions) fashion labels and celebrity licensees previously dominated the perfume market. En Passant was featured in a 2017 exhibit on contemporary perfumery at Somerset House in London.\nGiacobetti also received acclaim for her 1999", "-31.91480316783418" ], [ "to be cleaned or the detergent itself before or during use. These agents include optical brighteners, fabric softeners, and colourants. A variety of perfumes are also components of modern detergents, provided that they are compatible with the other components and do not affect the colour of the cleaned item. The perfumes are typically a mixture of many compounds, common classes include terpene alcohols (citronellol, geraniol, linalool, nerol) and their esters (linalyl acetate), aromatic aldehydes (helional, hexyl cinnamaldehyde, lilial) and synthetic musks (galaxolide). Environmental concerns Phosphates in detergent became an environmental concern in the 1950s and the subject of bans", "-31.90369363813079" ], [ "of perfumers is the oldest souk of Tunis. It is located just behind the Al-Zaytuna Mosque. When this souk was built, nobles and business owners were the only ones with the right to do this job. Therefore, it was considered one of the finest. Fragrances compounds of rare and valuable species were sold, there was also incense from India and Yemen, as well as some cosmetics. Souk El Berka Built in 1612 by Yusuf Dey, the souk El Berka is the old souk of black slaves in Tunis. This souk became later the souk of jewelers.\nThis souk has a square", "-31.89386026452121" ], [ "Role of an aromachologist Pleasant aromas cause people to linger longer, a boon to retail stores, museums, spas and casinos. Pleasant smells have been shown to improve productivity, and improve physical performance, with athletes running faster, doing more pushups, and experiencing shorter recovery time after an extensive workout when the room was scented with either peppermint or lemon.\nBy blending specific smells, an aromachologist can create a more restful environment and improve health conditions. A study in 1987 showed that the smells found in nutmeg oil, maize extract, neroli oil, valerian oil, myristici, soelemcin and elemicin reduce stress in humans as", "-31.88353063823888" ], [ "that reminds me of an Italian spring morning, of mountain daffodils and orange blossoms after the rain\". He named his fragrance Eau de Cologne, in honour of his new hometown.\nThe Original Eau de Cologne 4711, is named after its location at Glockengasse No. 4711. It was also developed in the 18th century by Wilhelm Mülhens and produced in Cologne since at least 1799 and is therefore probably one of the oldest still produced fragrances in the world. On 12 December 2006, the perfumes and cosmetics company Mäurer & Wirtz took over 4711 from Procter & Gamble and has expanded it", "-31.88251937381574" ], [ "Odeur 53, a blend of 53 non-traditional notes to create a modern and striking scent. Some of these notes are: oxygen, flash of metal, wash drying in the wind, mineral carbon, sand dunes, nail polish, cellulose, pure air of the high mountains, burnt rubber, and flaming rock. Director John Waters and architect Stephen Alesch both wear the fragrance.\nComme des Garçons released the perfume for the Luxe series \"Champaca\", for which artist Katerina Jebb produced the visuals.\nSince 2002, the perfume line joined Puig company to become part of its catalogue of fragrances. The company Puig owns a partial license for Comme", "-31.873536366561893" ], [ "of Houbigant is the only fragrance house that has existed through four centuries of history. Through these centuries, the perfumers of the House of Houbigant have made groundbreaking discoveries in the formulation of perfumes that have revolutionized forever the way perfumes are constructed.\nOver the centuries, the House of Houbigant became perfumer to the royal courts of Europe. When in 1793 Marie-Antoinette was guillotined, she carried three vials of Houbigant perfume in her corsage to give her strength. Josephine, the future Empress of France, belonged to a group of stylish young men and women called \"The Muscadins\" because of their craze", "-31.85160192030162" ], [ "Demeter Fragrance Library The Demeter Fragrance Library (called The Library of Fragrance in Europe) is a Great Neck, New York company that sells over 200 different fragrances based on \"everyday\" scents, such as baby powder, dirt, gin & tonic, play-doh and tomato. History \"Demeter\" was founded by ex-Kiehl's perfumer Christopher Brosius, in 1993, as a project 'bottle' everyday odors into wearable personal colognes. The first three colognes that were created – Dirt, Grass and Tomato – were launched at New York department stores, Bergdorf Goodman and Henri Bendel, in 1996. The three scents sold well, which led to further introductions", "-31.84543158725137" ], [ "the other hand, Aromachology is the term The Fragrance Foundation and the Sense of Smell Institute, both based in New York, assigned in 1989 to the concern about the scents and the psyche behavior because of odors. Aromachology is a relatively new science that explores positive feelings induced by odors far from any holistic or healing process. The term also covers, both, natural and synthetic scents. The term aromachology is sometimes mistaken by companies with several other terms such as \"essential oils\" or \"aromatherapy\" as marketing phrases. The products shouldn't be labeled other than aromachology because they do not offer", "-31.815239679897786" ], [ "mild, spicy fragrance, but is now very strong. In the UK, the change has been noticed since 2009, with the scent being almost like coal tar. There has also been a reduction in its moisturizing properties. Marketing The first of the famous Pears soap marketing campaigns used Giovanni Focardi's most well-known statue, You dirty boy!, exhibited at the Exposition Universelle de Paris in 1878. The statue was so popular that Pears purchased the rights to produce copies as advertisements for its soap products. The statues were in terracotta, plaster and metal, and were used in shop counter displays.\nFrom the late", "-31.80741526766724" ], [ "prominent perfume market in Italy was Seplasia in Capua. Perfumes were rubbed on or poured onto the user and were often believed to be helpful against different ailments, such as fever and indigestion. Different scents were appropriate for different occasions, as well as for men and women. Deodorants made from alum, iris and rose petals were common.\nIn addition to personal use, perfumes were used in food and to freshen the household aroma. Containers and mirrors Makeup usually came in tablet or cake form, sold at marketplaces. Wealthy women bought expensive makeup that came in elaborate containers made from gold, wood,", "-31.761396735848393" ], [ "unisex. Women's fragrances used to be common in all levels of concentration, but today are mainly seen in parfum, EdP and EdT concentrations. Solvent types Perfume oils are often diluted with a solvent, though this is not always the case, and its necessity is disputed. By far the most common solvent for perfume-oil dilution is alcohol, typically a mixture of ethanol and water or a rectified spirit. Perfume oil can also be diluted by means of neutral-smelling oils such as fractionated coconut oil, or liquid waxes such as jojoba oil. Applying fragrances The conventional application of pure perfume (parfum", "-31.65815880187438" ], [ "the wearer's skin is important, since dry skin will not hold fragrance as long as skin with more oil. Describing a perfume The precise formulae of commercial perfumes are kept secret. Even if they were widely published, they would be dominated by such complex ingredients and odorants that they would be of little use in providing a guide to the general consumer in description of the experience of a scent. Nonetheless, connoisseurs of perfume can become extremely skillful at identifying components and origins of scents in the same manner as wine experts.\nThe most practical way to start describing a perfume", "-31.655165296280757" ], [ "off bubonic plague. By drinking the cologne the citrus oil scent would be exuded through the pores, repelling fleas. Much as flea shampoo for dogs can be based on citrus oils today.\nIn modern times, Eau de Cologne or \"cologne\", has become a generic term. The term \"cologne\" can be applied to perfume for men or women, but it conventionally refers to perfumes marketed towards men.", "-31.630517999641597" ], [ "Sillage (perfume) Sillage (UK: /siːˈjɑːʒ/, French: [sijaʒ] (listen)) in perfume refers to the aura or trail created by a perfume when it is worn on the skin. It comes from the word in French for \"wake\" and can best be described as how a fragrance diffuses around the wearer. Sillage or diffusion in fragrances can also be called the \"projection\" of a fragrance.\nCompounds such as Hedione (methyl dihydrojasmonate) can be used to enhance the diffusivity of a fragrance. Hedione is a synthetic relative of methyl jasmonate, a naturally occurring compound in floral scents such as jasmine, tuberose and magnolia. Methyl", "-31.61592016999566" ], [ "has a particular scent that for many Americans is associated with the smell of the baby itself. According to Johnson & Johnson's representative Fred Tewell, baby powder-scented cleaning products became almost a standard not only to cosmetics, but to diapers as well. Johnson's Baby Cream (1921) Johnson's Baby cream was introduced in 1921. The Gift Box (1921) According to Margaret Gurowitz, Johnson & Johnson's corporate historian, in 1921 the company released its first \"Baby Gift Box\" that contained small packages of Baby Powder, Baby Cream and Baby Soap and \"was designed as a small gift that people could take when", "-31.599828738340875" ], [ "product.\nRalph Barton, the eminent cartoonist for The New Yorker and who was said to have been somewhat of a dandy, reportedly wore the scent. \"In lieu of a scarfpin, a scarab seal ring encircles his cravat, and when indoors he is partial to Chinese slippers. . . . Chanel No. 22 is his customary perfume. His favored dressing gown is of a gallant jade hue.\" Modern Scent The Wertheimer family still runs the Chanel perfume business.\nJacques Polge, the modern Chanel perfumer, released a collection called Les Exclusifs in February 2007. This included Chanel No. 22. The 200-milliliter spray bottle of the", "-31.5758208988118" ], [ "them where they will not be exposed to light. An opened bottle will keep its aroma intact for several years, as long as it is well stored. However, the presence of oxygen in the head space of the bottle and environmental factors will in the long run alter the smell of the fragrance.\nPerfumes are best preserved when kept in light-tight aluminium bottles or in their original packaging when not in use, and refrigerated to relatively low temperatures: between 3–7 °C (37–45 °F). Although it is difficult to completely remove oxygen from the headspace of a stored flask of fragrance, opting for spray", "-31.562587902411906" ], [ "received mostly positive reviews, with Sugarscape saying \"Though we find it hard not to be biased when it comes to all things One Direction, we can honestly say that their perfume is pretty damn good.\" The Daily Mail's Elsa Mcalonan said \"It's certainly a scent that you won't forget in a hurry as it doesn't wear off [...] it's truly a smell you'll need to fall in love with before you part with a penny of your pocket money.\"", "-31.53462768411555" ], [ "aromatics. There are hardly any true unitary-scent perfumes consisting of a single aromatic material.\nThe family classification is a starting point to describe a perfume, but does not fully characterize it. Fragrance wheel This newer classification method is widely used in retail and the fragrance industry, created in 1983 by the perfume consultant Michael Edwards. The new scheme simplifies classification and naming, as well as showing the relationships among the classes.\nThe five main families are Floral, Oriental, Woody, Aromatic Fougère, and Fresh, the first four from the classic terminology and the last from the modern oceanic category. Each of these are", "-31.521450911641296" ], [ "with other fragrances. As well, they must know how each ingredient reveals itself through time with other ingredients. The job of the perfumer is very similar to that of flavourists, who compose smells and flavourants for many commercial food products. The practice of perfume-making has recently attracted academic interest among major research funding agencies. Employment Most perfumers are employed by several large fragrance corporations in the world including Mane, Robertet, Firmenich, IFF, Givaudan, Takasago, and Symrise. Some perfumers work exclusively for a perfume house or in their own company, but these cases are not as common.\nThe perfumer typically begins a", "-31.520461536005314" ], [ "in these industries is to affect customers through their sense of smell and entice them into purchasing the perfume or perfumed product. As such there is significant interest in producing a perfume formulation that people will find aesthetically pleasing. The perfumer The job of composing perfumes that will be sold is left up to an expert on perfume composition or known in the fragrance industry as the perfumer. They are also sometimes referred to affectionately as a \"Nez\" (French for nose) due to their fine sense of smell and skill in smell composition.\nThe composition of a perfume typically begins with", "-31.512579655969603" ], [ "sweet myrrh or scented myrrh to be distinguished from medicinal opopanax and true myrrh. A resinoid is prepared from the resin by solvent extraction. Steam distillation of the resin gives the essential oil, which has a warm, sweet, balsamic odor. Opopanax oil and resinoid are used in perfumes with oriental characteristics. An IFRA recommendation exists. Bdellium Opopanax is also known as \"perfumed bdellium\".\nBdellium is a semi-transparent resin extracted from Commiphora roxburgii and from Commiphora africana. Both resins were used as incense. They are referred to by Pliny (Historia Naturalis, 12:36) as Bactrian and Nubian bdellium. The bdellium referred to by", "-31.492034555958526" ], [ "work with World Duty Free to create an online resource to help the user discover their ideal scent; www.discoverfragrance.com (currently out of business). Shortly after Dove collaborated with The Macallan Scottish whiskey house where the perfumer created a new way of experiencing whiskey; using an odour profiling technique referred to now as The Macallan Aroma Box. Roja Parfums Following on from his bespoke fragrance experience Dove decided to present his own fragrance range. Initially referred to as ‘The Trilogy’, Dove created a scent for each female fragrance family; Oriental, Chypre, and Floral, entitled ‘Enslaved, Unspoken, and Scandal’ accordingly.\nIn 2011, the", "-31.47455687612819" ], [ "New York Times perfume critic Chandler Burr wrote, “The Ormonde Jayne collection has managed to bottle mesmerizing strangeness that stays, just barely at times, this side of unwearable art scents.”\nIn Luca Turin and Tania Sanchez’s Perfumes: The Guide, the line’s titular fragrances Ormonde Man and Ormonde Woman both received five-star reviews. Both fragrances are based on hemlock; Ormonde Man also has notes of juniper berries and oud. Turin and Sanchez also included the pair in their book of 100 “classics” in perfumery.\nOther notable Ormonde Jayne fragrances include Orris Noir, based on purple-black iris, pink pepper and pimento berries; Champaca, an", "-31.470812277751975" ], [ "Fragrance Holder for three individual fragrances is located in the top left pocket of the Ladies' pannier, watches holder at the concealed section of Gentlemen's pannier, top right pocket with fragrance bottles in the Gentlemen's pannier and 2 watch or jewellery holders at Ladies' pannier, buyer-specified fragrance bottles, universal vanity pouch at bottom left pocket, Ladies' and Gentleman's Accessory Z-Boxes at door pannier, seat back reclines by 27°, calf rest raises electrically by 68°, foot rest raising feet up to 30°, choice of two compartment trims, Light (Seashell with Navy Blue Contrast Leather and Seashell tone-on-tone stitching) or Dark (Navy", "-31.46008221208467" ], [ "the Osmothèque was officially founded on 26 April 1990 with an initial collection of 400 perfumes, both those reproduced by the Osmothèque and those supplied by external perfumers at houses such as Chanel, Guerlain and Lanvin. The collections The Osmothèque is the world’s largest scent archive, storing over 3,000 perfumes from the past and present, all preserved at a constant temperature under argon gas. Perfumes accepted into the collection are either those reconstituted using archived formulae by the Osmothèque’s internal perfumers (known as osmocurators) or those supplied by external perfume houses. As a legal deposit archive, the Osmothèque receives a", "-31.372331431135535" ], [ "Guernec of International Flavors & Fragrances. Its top notes include wild berries, dark plum and bergamot accords. The main note of the heart is velvety red flower (celosia), but there are also sambac jasmine and rainbow plumeria. The base contains cashmere, patchouli and liquid praline. The fragrance comes in a red and gold jewel-shaped bottle, which was inspired by a queen's sceptre. Perry told Elle that the perfume is aimed at \"any woman with even the smallest mustard seed of power inside her who wants to bring it out.\" Although marketed as a women's fragrance, Perry said it suits \"someone", "-31.33101032342529" ], [ "Heaton has created several fragrances, including \"Smells Like Weeds (The Queen of Hungry Spirits)\", a perfume made using bee-friendly plants; and \"Smells Like Money (Hungry Spirits)\", a perfume extracted from hundreds of dollar bills using the labor-intensive method of cold enfleurage.\nIn 2014, Heaton founded The Virginia Perfume Company to create authentic, small-batch perfumes based on old-world techniques. Personal life Heaton lives in Virginia with her husband and stepchildren.", "-31.214525653187593" ], [ "of some pharmaceutical drugs including tadalafil, L-DOPA, and atrasentan. Fragrance Piperonal has a floral odor which is commonly described as being similar to that of vanillin or cherry. For this reason it is commonly used in fragrances and artificial flavors. The compound was named Heliotropin after the 'cherry pie' notes found in the heliotrope flower's fragrance (even though the chemical is not present in the flower's true aroma). Perfumers began to use the fragrance for the first time by the early 1880s. It is commonly used to add vanilla or almond nuances, generally imparting balsamic, powdery, and floral aspects to", "-31.20716489671031" ], [ "smokey aromas. Synonyms Over the years Fer and its wines have been known under various synonyms including Arech, Arrouya, Bequignaou, Béquignol, Bois droit, Braucol, Brocol, Caillaba, Camarouge, Camirouch, Chalamoncet, Chalosse noir, Chausset, Couahort, Cruchenit, Estronc, Estrong, Fer bequignaou, Fer Noir, Ferre, Folle Rouge, Here, Herrant, Herre, Mances, Mansoi, Mansois, Mauran, Moura, Mourach, Noir brun, Panereuil, Petit Fer, Petit here, Petit Mourastel, Petite here, Piec, Piek, Pienc, Pinenc, Plant de fer, Queufort, Salebourg, Saoubade, Saumances, Saumansois, Saumences, Scarcit, Veron and Verron.", "-31.197629852104" ], [ "Tetramethyl acetyloctahydronaphthalenes Odour OTNE has a woody, floral, ambergris odour. Its odour is long-lasting on skin and fabric. Uses Iso E Super is a very common perfume ingredient, providing a sandalwood-like and cedarwood-like fragrance, in soap, shampoo, perfumes, detergents, fabric fresheners, antiperspirants or deodorants, and air fresheners. It is also used as a tobacco flavoring (at 200–2000 ppm), as a plasticizer and as a precursor for the delivery of organoleptic and antimicrobial compounds. Production Iso E Super is produced commercially by Diels–Alder reaction of Myrcene with 3-Methyl-3-penten-2-one in the presence of aluminum chloride to give a monocyclic intermediate that is", "-31.15962433713139" ], [ "Make a Smellmitment Make a Smellmitment is an advertising campaign created by Wieden+Kennedy for Old Spice in the United States. The campaign is preceded by “The Man Your Man Could Smell Like\" which was a television advertising campaign by Wieden+Kennedy for Old Spice. The \"Make a Smellmitment\" campaign retains much of the format from the previous campaign including its characters played by Isaiah Mustafa and Terry Crews. The content of the new campaign ads also consist of character monologues during long single shots while engaging in random activities and addressing the female audience. The inaugural commercial, titled “And So It", "-31.105523933721997" ], [ "Gourmand (fragrance) A gourmand fragrance is a perfume consisting primarily of synthetic edible (gourmand) notes, such as honey, chocolate, vanilla or candy. These top and middle notes may be blended with non-edible base notes such as patchouli or musk. They have been described as olfactory desserts. They are also called \"foodie\" fragrances and can be both feminine and masculine.\nThierry Mugler's Angel, launched in 1992, is credited as the first modern gourmand scent. Additional examples include Mugler's A*Men, Lolita Lempicka's Lolita Lempicka and Au Masculin, Hanae Mori's Butterfly, Calvin Klein's Euphoria, Burberry's Brit for Men, Rochas' Rochas Man, Chopard's Wish and", "-31.079071816813666" ], [ "extrait) in Western cultures is at pulse points, such as behind the ears, the nape of the neck, and the insides of wrists, elbows and knees, so that the pulse point will warm the perfume and release fragrance continuously. According to perfumer Sophia Grojsman behind the knees is the ideal point to apply perfume in order that the scent may rise. The modern perfume industry encourages the practice of layering fragrance so that it is released in different intensities depending upon the time of the day. Lightly scented products such as bath oil, shower gel, and body lotion are recommended", "-31.0634136874869" ], [ "creation L'Artisan Parfumeur Dzing!, a scent inspired by Paris's Cirque d'Hiver. Discussing Dzing! in The New York Times, Chandler Burr called the perfume \"one of the most innovative, authentically strange scents of the past two decades\", managing to combine diverse aromas of sawdust, circus animals, caramel apples and more into \"a comforting, subtly succulent mix.\" Burr writes: \"Dzing! plays subtle purity against subtle power; it's fresh without green (a trick that takes serious perfumer talent to pull off), sweet without sugar (ditto), warm and soft like a plank of newly sawed pine still warm from the blade.\" Turin gave the", "-31.027260697737802" ], [ "are also used in perfumery. In a perfumery context the most common Schiff's Base is known as aurantiol, produced by combining methyl anthranilate and hydroxycitronellal. Occurrence Methyl anthranilate naturally occurs in the Concord grapes and other Vitis labrusca grapes and hybrids thereof, and in bergamot, black locust, champak, gardenia, jasmine, lemon, mandarin orange, neroli, oranges, rue oil, strawberry, tuberose, wisteria, galangal, and ylang ylang. It is also a primary component of the essential apple flavor, along with ethyl acetate and ethyl butyrate.", "-30.993873940460617" ], [ "Aromachology Aromatherapy vs. Aromachology The history of aromatherapy goes back to Ancient Egypt. People for years have used essential oils to treat their psychological and physical well-being. In Ancient Egypt, people used essential oils for cosmetic and medicinal products. Civilizations from around the globe also used aromatherapy for therapeutic purposes.\nThe term aromatherapy dates from the 20th century when French chemist Jean-Maurice Gattefosse rediscovered the healing powers of lavender's essential oil by trying to relieve a severe burn. Aromatherapy requires the incorporation of essential oils and plant-based essentials for therapeutic and holistic process assuring the well-being of the mind and body.\nOn", "-30.97274628150626" ], [ "\"expensive hooker\". The packaging lists the perfume's notes as \"tears of belladonna, crushed heart of tiger orchidea with a black veil of incense, pulverized apricot and the combinative essences of saffron and honey drops\". According to the product packaging, instead of the pyramidal structure used in most perfumes, Lady Gaga Fame uses \"push-pull technology\", where the ingredients demonstrate aspects of each note without precedence. Rather than utilizing top, middle, and base notes, the perfume is based on three accords – \"dark\" (containing the Belladonna notes), \"sensual\" (containing the honey, saffron, and apricot notes), and \"light\" (containing the Tiger Orchid notes)", "-30.956676022149622" ], [ "safflower oil was used. Apricot and peach oils were used to remove freckles and liver spots. A powder called 'mibun' or 'baekbun' was made from ground rice and millet blended with water or oil.\nScents were added to extracts from grains and other plants, for example from dried clove buds. Perfume was also used to relieve stresses and tiredness. The Gyuhap Chongseo, an ancient women's encyclopedia, includes various methods for making perfume.\nAccording to Gyuhap Chongseo, eyebrows were the central feature of a woman's face. The work describes ten popular eyebrow shapes. Crescent or willow leaf shapes were most popular. Plant ash", "-30.93695902923355" ], [ "as migraine headaches and respiratory difficulties, when exposed to fragranced products\". \nThe composition of fragrances is usually not disclosed in the label of products, hiding the actual chemicals of the formula, which raises concerns among some consumers.\nFragrances are regulated in the United States by the Toxic Substances Control Act of 1976 that \"grandfathered\" existing chemicals without further review or testing and put the burden of proof that a new substance is not safe on the EPA. The EPA, however, does not conduct independent safety testing but relies on data provided by the manufacturer. List of chemicals used as fragrances In", "-30.910064156691078" ], [ "in the south of France.\nBetween the 16th and 17th centuries, perfumes were used primarily by the wealthy to mask body odors resulting from infrequent bathing. In 1693, Italian barber Giovanni Paolo Feminis created a perfume water called Aqua Admirabilis,\ntoday best known as eau de cologne; his nephew Johann Maria Farina (Giovanni Maria Farina) took over the business in 1732.\nBy the 18th century the Grasse region of France, Sicily, and Calabria (in Italy) were growing aromatic plants to provide the growing perfume industry with raw materials. Even today, Italy and France remain the center of European perfume design and trade. Imprecise", "-30.90360260568559" ], [ "Aramis (fragrance) Aramis is fragrance introduced by Estée Lauder in 1964. It was the first prestige men’s fragrance widely available in department stores, and is now sold in 120 countries. Aramis was created by perfumer Bernard Chant.\nIt is classified as a leather chypre; its top notes are fresh/bitter herb combined with a body odor note from cumin, followed by gardenia, jasmine, amber and sandalwood.\nPerfumer and fragrance historian Roja Dove has called it \"an incredibly refined and distinctive fragrance” that is \"as much of a legend as the hero it was named after.\"", "-30.89611770553165" ], [ "Odor An odor, or odour, is caused by one or more volatilized chemical compounds that are generally found in low concentrations that humans and animals can perceive by their sense of smell. An odor is also called a \"smell\" or a \"scent\", which can refer to either a pleasant or an unpleasant odor.\nWhile \"scent\" can refer to pleasant and unpleasant odors, the terms \"scent\", \"aroma\", and \"fragrance\" are usually reserved for pleasant-smelling odors and are frequently used in the food and cosmetic industry to describe floral scents or to refer to perfumes.\nIn the United Kingdom and other Commonweath, English speaking", "-30.894157763395924" ], [ "the whole blend a grounding element\" before concluding \"the notes are not wrong\". Charlie Gowans Eglinton of Elle, noted that the perfume promised to be \"almost as intoxicating as Bey herself\" with a \"sexy scent\" of musk according to reports she had read. In a guide for spring perfumes to buy in 2014, editors of E! Online included Rise, calling it \"exactly what you think it would be: vivacious, strong and bold\" and concluding \"it is certainly not a dainty spring scent\". Cinya Burton of the same publication noted the fragrance was different than other floral perfumes during the season,", "-30.848425274598412" ], [ "and satins, lots of glass, mirror and crystal, as well as the black lacquer, give the salon the air of an exotic boudoir\".\nSince it opened in 2004 the Haute Parfumerie has stocked scents from many famous and unfamiliar brands including Tom Ford, Caron, Lalique, Xerjoff, Dior, Atelier Flou, Clive Christian, and Grossmith.\nDove received requests from customers to smell ‘Roja Dove’ creations. Previously, in 2002, Dove joined names like Manolo Blahnik in donating prizes for the annual Terrence Higgins Trust fundraiser, the perfumer created a bespoke scent for the highest bidder contained within a Baccarat crystal presentation bottle. In 2005,", "-30.840889949824486" ], [ "Maurice Roucel Maurice Roucel is a contemporary perfumer who has worked at companies IFF, Quest, Dragoco and presently Symrise. Roucel began his career in perfumery on February 19, 1973 while working as the head chromatography chemist at Chanel for 6 years. He commenced his apprenticeship under Henri Robert, Chanel's house perfumer at the time. He joined Quest International and for 12 years developed his craft as a perfumer before switching to work for Symrise in 1996. Most of the fragrances composed by Roucel have his signature scent of Michelia longifolia.\nHe was also the winner of various accolade in the fragrance", "-30.8407279997773" ], [ "an investigation by the fashion house [that refuted] claims made by PETA [the animal-rights organization] that its famous Birkin bags were being 'constructed from the skins of factory-farmed and cruelly slaughtered crocodiles.' \" Perfumery Since 1951, the company has created a number of scents for both men and women, as well as unisex lines. Crystal lighting and glass Belonging to the group is the crystal glass manufacturer Saint-Louis, the oldest crystal company in the world. Since its founding in 1586, Saint-Louis has drawn design inspiration from the decorative periods of the 19th and 20th centuries, from the Restoration to Modern", "-30.834416601937846" ], [ "Old Spice History Old Spice products were originally manufactured by the Shulton Company. The Shulton Company was founded in 1934 by William Lightfoot Schultz. Schultz was inspired by his mother's potpourri and as a result, the first Old Spice product in 1937 was a woman's scent called Early American Old Spice. The product was received well, and therefore followed with Old Spice for men in 1938.\nThe men's products included shaving soap and aftershave lotion, marketed with a nautical theme. Sailing ships in particular were used for the brand's packaging. The original ships used on the packaging were the Grand Turk", "-30.829353571825777" ], [ "rights to it from Coco Chanel on April 4, 1924, and founded Parfums Chanel, for which they hired Ernest Beaux as chief perfumer. In his new function Ernest Beaux created many famous perfumes until he retired in 1954; his successor as chief perfumer of Perfumes Chanel was Henri Robert. Death and funeral Ernest Beaux died in his Paris apartment on 9 June 1961, aged 79. The church in which his funeral was held was completely decorated in roses. Creating perfumes and later controversies \"Pepper and salt don't taste pleasantly when taken alone, but they enhance the taste of a dish,\"", "-30.8005362675176" ], [ "magazine, was listed as one of the top seven bespoke perfumers in the world by Forbes Magazine.\nIn 2005, Aftel was invited to participate in a collaborative project between the Rosicrucian Egyptian Museum in San Jose and the Stanford University School of Medicine, recreating a perfume for a two-thousand-year-old child mummy, unofficially dubbed Sherit, from chemically analyzed resins that were scraped from the mummy's burial mask.\nAftel founded the Natural Perfumers Guild in 2002 to increase public awareness and education in natural perfumes. Food In addition to perfumes, the Aftelier line also offers chef's essences, available to retail customers as well", "-30.78790674688571" ], [ "(halata) is Latin word meaning \"odor\", \"fragrance\" or \"perfume\". Distribution and habitat The sweet rein grows with low shrubs, sedges and grasses in Melaleuca viridiflora woodland in northern parts of the Northern Territory.", "-30.765088789106812" ], [ "damascones and damascenones are also important fragrance chemicals that are used extensively in the perfumes and fragrance industry. Both β-damascenone and β-ionone although low in concentration in rose distillates are the key odor-contributing compounds in flowers. In fact, the sweet floral smells present in black tea, aged tobacco, grape, and many fruits are due to the aromatic compounds resulting from carotenoid breakdown. Disease Some carotenoids are produced by bacteria to protect themselves from oxidative immune attack. The golden pigment that gives some strains of Staphylococcus aureus their name (aureus = golden) is a carotenoid called staphyloxanthin. This carotenoid is a", "-30.760633527941536" ], [ "as the instruments and containers used. Her analysis included the Zakro palace's room XLVII and the rooms 32 and 38 of the Pylos palace. The fragrances there were made mainly from olive oil, were considered luxury items, and produced under palatial control in a centralised fashion (unlike bronze work, which was decentralised). Every stage of the production process was documented by scribes; indeed, different products appeared to have their own specialist scribes writing the relevant tablets. Shelmerdine documented the ingredients used in several perfumes; these included henna, coriander, myrrh, honey, and \"po-ni-ki-jo\".\nShelmerdine considered the influence of Mycenaean perfumery on later", "-30.760633431957103" ], [ "frequently being used to cover up damage caused by the harshness of the soaps and other beauty products that were in general use at the time, many of which contained arsenic or lead. Pears began to experiment with soap purification and eventually managed to produce a gentle soap based on glycerine and other natural products. The clarity of the soap gave it a novel transparent appearance, which provided a marketing advantage. To add to the appeal, Pears gave the soap an aroma reminiscent of an English garden.\nDuring the nineteenth century, Pears built a large market for its soap in the", "-30.734657196968328" ], [ "orange, and bitter orange. It can also contain oils of neroli, lavender, rosemary, thyme, oregano, petitgrain (orange leaf), jasmine, olive, oleaster, and tobacco.\nIn contemporary American English usage, the term \"cologne\" has become a generic term for perfumes usually marketed towards men. It also may signify a less concentrated (but more affordable) version of a popular perfume. History The original Eau de Cologne is a spirit-citrus perfume launched in Cologne in 1709 by Giovanni Maria Farina (1685–1766), an Italian perfume maker from Santa Maria Maggiore Valle Vigezzo. In 1708, Farina wrote to his brother Jean Baptiste: \"I have found a fragrance", "-30.729405918120392" ], [ "is also an ingredient in many brands of gin.\nFabienne Pavia, in her book L'univers des Parfums (1995, ed. Solar), states that in the manufacturing of perfumes using orris, the scent of the iris root differs from that of the flower. After preparation the scent is reminiscent of the smell of violets.\nIn Japan, the roots and leave of the plant, were hung in the eaves of a house to protect the house and occupants from attacks by 'evil spirits'. \nOther magic uses, include as a 'love potion', with the root powder in sachets, or sprinkled around the house or sheets of", "-30.670452101592673" ], [ "would be remembered. As of November 2017, the house has 29 perfumes created by 16 different perfumers.\nIn January 2015 Editions de Parfum Frédéric Malle was sold to Estée Lauder for an undisclosed fee.", "-30.658283399156062" ], [ "her album, Memoirs of an Imperfect Angel, her marriage, and her role in the movie, Precious. Ingredients The scent has lotus blossom, tuberose, gardenia, green apple, neroli, exotic wood and white musk.", "-30.65058892092202" ], [ "Nag Champa Nag Champa is a fragrance of Indian origin, based on a combination of magnolia (champaca or champak) and sandalwood, or frangipani (plumeria) and sandalwood - though when frangipani is used, the name is usually just \"Champa\", without the \"Nag\". It is used in incense, soap, perfume oil, essential oils, candles, and personal toiletries. It is a popular and recognizable incense fragrance throughout the world.", "-30.612144320301013" ], [ "a brief by the perfumer's employer or an outside customer. The customers to the perfumer or their employers, are typically fashion houses or large corporations of various industries. The perfumer will then go through the process of blending multiple perfume mixtures and sell the formulation to the customer, often with modifications of the composition of the perfume. \nThe perfume composition will then be either used to enhance another product as a functional fragrance (shampoos, make-up, detergents, car interiors, etc.), or marketed and sold directly to the public as a fine fragrance. Technique Although there is no single \"correct\" technique for", "-30.603275396861136" ], [ "one of the most prestigious things a designer can do.\"\nThe fragrance called \"L\" was launched in September 2007 at Soho House in New York City. Stefani worked with perfumer Harry Fremont to develop the scent. Stefani described the fragrance as \"it's another thing you can wear and another thing I can be part of creatively. I created it for myself -- it's like me shrunk into a box.\" The perfume is a blend of the aromas of hyacinth, white freesia, fresh pear, violet, jasmine, rose, lily, sweet pea, orange blossom, peach, frangipani, heliotrope and musk. Critical reception The line was", "-30.582197218260262" ], [ "Super Odor Killer. The fragrance was not readily identifiable because it used a blend of perfumes left over when fragrance manufacturers produced a little too much for another company's orders. This blend was not only good at masking a variety of odors, it could be used at slightly higher fragrance levels without overwhelming the user. Renuzit was also the first to introduce an air freshener for the kitchen when they brought out \"Country Kitchen\" cinnamon fragrance in 1979. It proved to be highly popular and was soon copied by competitors.\nRenuzit offered a cleaning solvent at one time, sold in 4-ounce", "-30.573471725307172" ], [ "Arpège History The fragrance has been referred to as the \"fragrance of 1000 flowers\" and its official name is a derivation of the musical term arpeggio. In fact, the perfume contains some 60 floral essences. Like Chanel No.5, launched six years earlier, it is considered an aldehydic floral perfume.\nIt was created by perfumers André Fraysse and Paul Vacher for Jeanne Lanvin and presented to her musician daughter Marie-Blanche on her 30th birthday. The bottle design The original black bottle with a gold top was decorated with a gold illustration of Jeanne Lanvin and her daughter, created by French fashion illustrator", "-30.541675439744722" ], [ "noted to smell of paraffin (although this odour may have been caused by the woman initially storing the beret beneath a sink in her scullery). The woman also informed investigators that close to the scene of her discovery, she had also located several sections of torn paper, which she had collected and discarded, and a section of candle which she had herself used then also discarded. By 21 December, police enquiries had also produced an eyewitness who stated that on the morning of the discovery of Vera's body, the door to a coal shed close to Addison Road had been", "-30.465665080490908" ], [ "vanilla extracts. The packing of the perfume is very similar to the original one, but features a pink and white colour scheme and the \"S\" logo is surrounded by a bunch of flowers. Similarly, the bottle retains the original shape but has a \"more romantic and feminine feel\" and a pink colour scheme; the colour of the perfume is golden rose.", "-30.439336136041675" ], [ "of \"ancient perfumery\". Other collections include toiletries, leathergoods, travel accessories, eyewear, footwear, jewelry, and home furnishings. In 2014, the company opened its first Etro Home store in Milan during the Salone del Mobile.", "-30.41406736697536" ], [ "originally created in 1933 for the Bishop of Paris. Popular culture Creed has stated that it has created perfumes exclusively for celebrities and well-known political figures. Creed claims that Tabarome Millesime (2000) \"was commissioned by a legendary British statesman who loved fine brandy and highest quality cigars\" (presumably Winston Churchill). Also, Creed's Vetiver is marketed to have been created for \"one of America's leading families, a political dynasty now known worldwide for its energy, vigor, and impeccable style\" (presumably the Kennedy family). This claim is challenged by 3 other perfume houses and has not been confirmed by Creed or historians.", "-30.40196706604911" ], [ "uses of scent beyond the bounds of commercial perfumery\" - joining the artisan and independent awards to create what was intended as a broad snapshot of the diversity and creative potential in the field of perfume.\nThe third annual Art and Olfaction Awards were held on May 6, 2016 at Hammer Museum as part of their public programming. The expanded event was hosted by artist and producer Zackary Drucker, and was free, open to the public, and live streamed on the internet. In an effort to better cement the award's international commitment, the fourth annual Art and Olfaction Awards take place", "-30.39171166361848" ], [ "scent was sold exclusively in Chanel boutiques and at Bergdorf Goodman with a price of $175 USD. The modern interpretation is said to have placed less emphasis on the incense bottom note.\nA \"voile\" - a lighter, alcohol-free version – of the scent was introduced in 1996.", "-30.38501817968063" ] ]
1qkwsq
Why are people so paranoid about government surveillance or surveillance in general?
[ "Cause people don't like people watching them. That is a pretty simple one.", "It's not the surveillance itself which is the problem, it's who gets that information and how they intend to use it. Surveillance can be used to keep people safe but it can also become the tool of an oppressive government.", "\"1984\" is the name of a novel by George Orwell you should read.", "Imagine you're in class and you just pooped your pants. No one else in your class knows you pooped your pants, and you go to your teacher to ask for help. Your teacher takes you to the bathroom to clean up your pants, and doesn't tell anyone else that you pooped them. You would be happy that no one else knows. If a government or someone else is doing surveillance, then they would also know. They could tell other people, and they might write down that you poo your pants in class. Even if you do not know those people, you would not want anyone to know you pooped your pants. People don't like surveillance because they do not want others to know everything about them, and they do not want to worry about how their actions are viewed.", "Someone else actually explained this exact thing to me, so I'll relay what I remember to you. Pretend we've got a huge school (talking thousands of children), and the principle wants to stay up to date on their very activities. After all, it'd be very bad if there was a little incident in a school this size as it can easily balloon over, plus there are idiots from other schools whom know kids from your school and come by to mess things up. So you ask a very smart, honest, and secretive kid to ask about three or four of his friends to keep their ears open, and to relay results to you. At first, this plan is perfect, after all nothing bad could possible happen. I mean, he did choose great kids. However, these kids in turn gave their responsibility to their friends and that's where the buck stopped. However, we've gone from a brilliant kid, to just some people helping their lazy friend. This is maybe about 1% of the school population whom know what the principle wanted done. So the smart kid from earlier and his select three or four are trust worthy. After all, they wouldn't abuse the information they found out just to get back at someone. However, what about the couple of other kids whom have never even come face to face with you? So now back to your question, the principle is the US government, the smart kid is the head of NSA with the people he chose personally the upper executives. The people they in turn chose are just the normal workers whom listen to all interactions done by people. Now the problem with why people don't want the NSA listening on to them is because the people at the bottom level haven't done anything to prove that they have robot like mind-sets. After all, they are human and and could very well succumb to their human emotions and reveal something important or embarrassing to get revenge on someone who may or may not have wronged them. For example, would you want your mother, grandmother, teachers, boss, coworkers, and the nice old lady at the supermarket knowing about your giant amputee porn collection? As well, this much information given to so many people could very well fall in the wrong hands (leading up to what I just said). And that my 5 year old class, is why we don't want the NSA listening to us.", "Serious answer: The big problem with surveillance at least in America falls on a few different levels. 1. Surveillance shows a dangerous trend historically. Normally when governments install massive amounts of surveillance they become oppressive and use the surveillance to control the behaviors of people. See: (Cuba, China, USSR) 2. Surveillance is a breach of our 4th amendment rights. Surveillance on the level of the NSA is breaking the barrier of illegal search and seizure, when you start to break down one of our constitutional protections, you can slowly break them all down. 3. Everybody is doing something wrong. Whether you know it or not, you have probably broken some law and if the people with this surveillance technology were so inclined they could likely charge you with something.", "After High School you will realize that who you are with your superiors and your clients is different than who you are with your friends and this could be different from who you are on the net all alone. So whoever gets access to it can show it to the people you don't want to and put the pressure on you to go get information on other friends. I'm mostly worried about how some hard headed agent could use anything in order to use us to infiltrate our friends, our groups, our families. To do their undercover jobs.", "1.) Possibility of blackmail. There are some embarrassing truths about everyone and someone who knows them can use them. Also there are enough people in high position in politics, the economy or the press who have potentially career destroying secrets (like infidelity) to give those behind surveillance enormous power. 2.) You are not the same person everywhere. When you talk to a potential employer you show a very different personality than when you party with your friends (I hope). Surveillance makes you retreat to a \"safe\" personality all the time. 3.) Selective enforcement of the law. You can scan the population for people you don't like and then scan those people for breaking of minor or rarely enforced laws and then suddenly enforce those on them only. (Today's laws are complicated and vague enough that everyone sometimes breaks some of them without realizing) 4.) In the event of a totalitarian takeover (for example a government loses an election but successfully refuses to step back) it gives a huge database into the wrong hands. 5.) In the past many countries mistakenly persecuted people for example for being of a certain sexual orientation, religion, race and so on. It would be naive to assume that it won't happen again in the future and a huge surveillance database would of course be employed to find those people and make a case against them. 6.) Many harmless things we do, like for example taking photographs or wandering around, look suspicious in the eyes of someone trained to search for threats. You don't want to constantly think about whether what you are about to say or do would look suspicious to someone looking for suspicious stuff. 7.) I know no example in history of a large surveillance infrastructure that wasn't eventually used against the population.", "Because while the people doing the surveiling today may be honest and well intentioned, tomorrow they may not be. Various countries have had their run ins with these problems, in the US that would be Mcarthyism, though few other people were comparably creepy, URL_0 Basically what do you do if someone comes to power in the government and says 'all these tools we've built to find terrorists, we're now going to use to find gays and jews', or 'to root out communists' or whatever agenda they happen to have? If the data exists it can be misused. Now the upshot of surveillance is that well, for example, the police can wiretap any phone from a technical perspective. Pick essentially any random phone number in your country and the police can wiretap it - there are legal constraints on them randomly wiretapping phones usually, but the the technical capability is there. Intelligence is kind of the same problem - you need to be able to spy on people because well, frankly they're spying on you, and sometimes people really are plotting against you. If prostitution is the oldest profession, spying is the second oldest. It's a matter of what are you willing to risk you spies being able to do, for what benefit they can get out of it, without knowing for sure who you are worried about before hand. Can intelligence officials blackmail politicians or public figurs? Certainly the police have tried to do that over the years. Could a political party use the information to suppress their opponents? Take voter ID - where the data is legally acquired (peoples names, ages and addresses basically). Knowing what the data says you can write laws to specifically target people you don't want voting, women, blacks, students or, whomever. Of course knowing voter names, ages and addresses also helps you keep the voter rolls up to date so you know who is allowed to vote where. Lots of countries have some form of voter ID laws that aren't used to oppress people - the same information can be used for good things or bad. It's just a matter of whether or not you trust future politicians to not misuse it.", "If \"If you have nothing to hide, you have nothing to fear\" is the philosophy of government officials, shouldn't the government declassify everything? In fact, this is really hypocritical of them; they obviously set up these surveillance programs in secret to hide it from the American public.", "The question is how far will it go?" ]
[ [ "gather intelligence on their competitors, suppliers or customers.\nSurveillance can be viewed as a violation of privacy, and as such is often opposed by civil liberties activists. A liberal democracy may have laws which restrict domestic government and private use of surveillance. Authoritarian governments seldom have any domestic restrictions, and international espionage is common among all types of countries.\nConcerns have been raised about surveillance with regards to the Internet of things. Where surveillance technology is used for identification, monitoring, location tracking or to gain access to buildings and networks. Computer The vast majority of computer surveillance involves the monitoring of data", "-33.9682171625027" ], [ "the best ones. Politics United Kingdom's Liberal Democrats have demanded that the Government end indiscriminate mass surveillance and introduce a more targeted and effective counter-terrorism policy that uses targeted surveillance of specific individuals who are suspected of wrongdoing. Liberal Democrats home affairs spokesperson Alistair Carmichael asks that, \"mass spying on the British people should be replaced with targeted surveillance of specific individuals suspected of wrongdoing\".\nIn the 2015 \"Resolution 2045\" the European Parliamentary Assembly \"recognises the need for effective, targeted surveillance of suspected terrorists and other organised criminal groups\" and states that \"such targeted surveillance can be an effective tool for", "-33.42192425986286" ], [ "clues to illegal activity.\nSurveillance is very useful to governments and law enforcement to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity. With the advent of programs such as the Total Information Awareness program, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance For Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of citizens.\nHowever, many civil rights and privacy groups—such as Reporters Without Borders, the Electronic Frontier Foundation, and the American Civil Liberties Union—have expressed concern that increasing surveillance of citizens may lead to a", "-33.313825435121544" ], [ "Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt.\nSome of the surveillance systems (such as the camera system that has its feed run through a facial recognition system mentioned above) can also have other uses besides countering criminal activity. For instance, it can help on retrieving runaway children, abducted or missing adults and mentally disabled people. \nOther supporters simply believe that there is nothing that can be done about the loss of privacy, and that people must become accustomed to having no privacy. As Sun Microsystems CEO Scott McNealy", "-32.87859070514969" ], [ "Some critics, such as Michel Foucault, believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing. This allows the State to control the populace without having to resort to physical force, which is expensive and otherwise problematic.\nWith the development of digital technology, individuals have become increasingly perceptible to one another, as surveillance becomes virtual. Online surveillance is the utilization of the internet to observe one's activity. Corporations, citizens, and governments participate in tracking others'", "-32.42276289360598" ], [ "as the Total Information Awareness program, and laws such as the Communications Assistance For Law Enforcement Act have led many groups to fear that society is moving towards a state of mass surveillance with severely limited personal, social, political freedoms, where dissenting individuals or groups will be strategically removed in COINTELPRO-like purges.\nKate Martin, of the Center For National Security Studies said of the use of military spy satellites being used to monitor the activities of U.S. citizens: \"They are laying the bricks one at a time for a police state.\"\nSome point to the blurring of lines between public and private", "-31.08660924283322" ], [ "a country where the government engages in pervasive surveillance of large numbers of its citizens and visitors. Such widespread surveillance is usually justified as being necessary for national security, such as to prevent crime or acts of terrorism, but may also be used to stifle criticism of and opposition to the government.\nExamples of early surveillance states include the former Soviet Union and the former East Germany, which had a large network of informers and an advanced technology base in computing and spy-camera technology. However, these states did not have today's technologies for mass surveillance, such as the use of databases", "-30.501148258685134" ], [ "targets, both domestic and abroad, are not suspected of any crime but hold religious or political views deemed \"radical\" by the NSA.\nAccording to a report in The Washington Post in July 2014, relying on information provided by Snowden, 90% of those placed under surveillance in the U.S. are ordinary Americans, and are not the intended targets. The newspaper said it had examined documents including emails, text messages, and online accounts that support the claim. Congressional oversight Despite White House claims that these programs have congressional oversight, many members of Congress were unaware of the existence of these NSA programs or", "-30.17373144330668" ], [ "on surveillance of public spaces can provide sufficient protections so that an individual's right to privacy can reasonably be weighed against the benefits of surveillance. However, anti-surveillance activists have held that there is a right to privacy in public areas. Furthermore, while it is true that there may be scenarios wherein a person's right to public privacy can be both reasonably and justifiably compromised, some scholars have argued that such situations are so rare as to not sufficiently warrant the frequent compromising of public privacy rights that occurs in regions with widespread CCTV surveillance. For example, in her book Setting", "-30.04632339120144" ], [ "outlets fulfill their viewers' needs, and portray terrorism as a threat because of the cycle that surveillance engenders. As terrorism flourishes as a prominent discourse of fear, consumers want information faster because they feel their safe being is in peril. The idea of total surveillance, as prescribed by Foucault, becomes a cycle where the disruption of power causes scrutiny by various players in system. If the media-outlets are not constantly looking for stories that fulfill consumer needs, then they are scrutinized. In addition to the surveillance aspect of news dissemination, therein is the notion that \"needs\" drive the network of", "-29.90682791103609" ], [ "cases generate substantial unintended consequences. Intelligence, surveillance and reconnaissance Most counter-terrorism strategies involve an increase in standard police and domestic intelligence. The central activities are traditional: interception of communications, and the tracing of persons. New technology has, however, expanded the range of military and law enforcement operations.\nDomestic intelligence is often directed at specific groups, defined on the basis of origin or religion, which is a source of political controversy. Mass surveillance of an entire population raises objections on civil liberties grounds. Homegrown terrorists, especially lone wolves are often harder to detect because of their citizenship or legal status and ability", "-29.896887636274187" ], [ "law enforcement and crime prevention\", while at the same time \"according to independent reviews carried out in the United States, mass surveillance does not appear to have contributed to the prevention of terrorist attacks, contrary to earlier assertions made by senior intelligence officials. Instead, resources that might prevent attacks are diverted to mass surveillance, leaving potentially dangerous persons free to act\". Organizations Privacy campaigners argue that instead of \"wasting resources gathering and sifting through the volume of data being accumulated through mass surveillance\", resources would be better allocated in providing more personnel for targeted surveillance.\nIn an analysis of 10 recent", "-29.48421754949959" ], [ "that is to say, 'well, if you're so boring then we shouldn't be talking to you, and neither should anyone else', but philosophically, the real answer is this: Mass surveillance is a mass structural change. When society goes bad, it's going to take you with it, even if you are the blandest person on earth.\"\nHarvey A. Silverglate estimated that the common person, on average, unknowingly commits three felonies a day in the US.", "-29.43480092380196" ], [ "to national security, all of which have negative psychological effects on the population, such as depression, anxiety, and insomnia. Politicians conduct interviews, televised or otherwise, and utilize their social media platforms immediately after violent crimes and terrorist acts, to further cement the fear of terrorism into the minds of their constituents.", "-29.084050023346208" ], [ "European Court of Human Rights. Intelligence agencies and MPs have criticised the viewpoint of privacy campaigners on this issue.\nFollowing the publication of a special report by the Intelligence and Security Committee of Parliament in March 2015, which identified shortcomings in past oversight and potential improvements to the legislative framework, Prime Minister David Cameron initiated an inquiry into the legalisation governing the interception powers of the intelligence agencies.\nA third independent report into surveillance in the UK published in July 2015 found the intelligence agencies are not knowingly carrying out illegal mass surveillance of British citizens. However, it did say the laws", "-28.914866142229585" ], [ "tool to monitor and make sure citizens abide by the law, it has now created even more problems. With cameras only becoming more advanced and more common, it is difficult to determine whether these surveillance cameras are helping to ensure a safe society or leading to bigger issues altogether.\nWith the growing of Web 2.0, social networking sites, surveillance may be more easily and commonly abused in many situations for a variety of reasons. The Communications Security Establishment (CSE), formerly known as Communications Security Establishment Canada (CSEC), has previously spied on Canadians through the public wireless internet connections in an airport", "-28.867821589174127" ], [ "individuals and crowds. It has been argued that terrorists won't be deterred by cameras, that terror attacks aren't really the subject of the current use of video surveillance and that terrorists might even see it as an extra channel for propaganda and publication of their acts. In Germany calls for extended video surveillance by the country's main political parties, SPD, CDU and CSU have been dismissed as \"little more than a placebo for a subjective feeling of security\". Privacy Proponents of CCTV cameras argue that cameras are effective at deterring and solving crime, and that appropriate regulation and legal restrictions", "-28.60884519474348" ], [ "terrorist groups, have similar security monitors. In addition, the security clearance process weeds out employees who are openly disgruntled, ideologically disaffected, or otherwise with motives for betraying their country and so people in such positions are likely to reject recruitment as spies. Therefore, some intelligence services have tried to reverse the above process by first recruiting potential agents and then having them conceal their allegiance and pursue careers in the target government agency in the hope that they can reach positions of access to desired information.\nBecause the spy career of a mole is so long-term, sometimes occupying most of a", "-28.453714697956457" ], [ "does not mean that they deserve the prestige and influence that has been accorded to them. The leakers and their supporters would never hand the state modern surveillance powers, even if they came wrapped in all sorts of rules and regulations that would constrain their abuse. They are right to worry, but wrong — even paranoid — to distrust democratic governments in this way. Surveillance and secrecy will never be attractive features of a democratic government, but they are not inimical to it, either. This the leakers will never understand.\" Personal life Wilentz lives in Princeton, New Jersey and is", "-28.410081028589047" ], [ "of wiretaps and bugs has also been fraught with procedural violations, even when the required procedures were meager, thus compounding the abuse. The inherently intrusive nature of electronic surveillance, moreover, has enabled the Government to generate vast amounts of information – unrelated to any legitimate governmental interest – about the personal and political lives of American citizens.\"\nThe \"potential criminal liability of the National Security Agency and the Central Intelligence Agency for operations such as SHAMROCK (interception of all international cable traffic from 1945 to 1975) and MINARET (use of watchlists of U.S. dissidents and potential civil disturbers to provide intercept", "-28.15578615314007" ], [ "some spies' decisions, and seems particularly likely if they are bored with their life. Excitement is seldom a spy's primary motivation, but may be a contributing factor. One notable example is Christopher Cooke, who claimed to be fascinated with espionage, and who told investigators he specifically sought to involve himself in spycraft for that reason. Disaffection and grudges Some spies are motivated largely by personal, non-ideological hostility towards the country or organisation they are spying on. This may stem from some real or imagined wrong—a person may, for example, betray secrets to the enemy if they feel they have not", "-28.146719595133618" ], [ "it. Privacy is clearly not a reasonable expectation in communications to persons in the many countries whose governments openly intercept electronic communications, and is of dubious reasonability in countries against which the United States is waging war.\nVarious Circuit Courts upheld warrantless surveillance when the target was a foreign agent residing abroad, a foreign agent residing in the US and a US citizen abroad. The exception does not apply when both the target and the threat were deemed domestic. The legality of targeting US persons acting as agents of a foreign power and residing in this country has not been addressed", "-28.067709368508076" ], [ "the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.\nThe appearance of a 'Domestic Surveillance Directorate' of the NSA was soon exposed as a hoax in 2013.\nNSA's domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution. The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable searches and seizures applies to the contents of all communications, whatever the means, because \"a person's private communications are akin to personal papers.\"", "-27.94758469768567" ], [ "Lenese Herbert, it is stated that invasive visual examination of faces and facial expressions for law enforcement purposes under the guise of protective administrative searches ineffectively protects national and airport security and violates reasonable expectations of privacy. FACS improperly provides unreasonable governmental activity with a legitimizing scientific imprimatur that conceals governmental agents' race- and ethnicity-based prejudices, which leads to targeting minorities' faces as portents of danger.\" Lie detectors Lie detectors use questioning techniques in conjunction with technology to measure human responses to these stimuli, to attempt to ascertain if that person is lying, or telling the truth. The most longstanding", "-27.852915557246888" ], [ "Spying on Democracy Themes Spying on Democracy focuses mainly on the theme of confidentiality. Boghosian describes the many ways that the government acquires personal information, whether it be from telecommunications companies, or video surveillance cameras.\nOther themes discussed include control, technology, and civil liberties. Why does the government need all of this information? Boghosian discusses how technology is used to categorize and monitor people based on their everyday activities. People are categorized by the associations, purchases, and perceived political beliefs. The government then takes this data and creates databases about \"persons of interest.\" Spying on Democracy calls into question the meaning", "-27.812904224032536" ], [ "up marriages, disrupt meetings, ostracize persons from their professions, and provoke target groups into rivalries that might result in deaths. Intelligence agencies have served the political and personal objectives of presidents and other high officials. While the agencies often committed excesses in response to pressure from high officials in the Executive branch and Congress, they also occasionally initiated improper activities and then concealed them from officials whom they had a duty to inform.\nGovernmental officials—including those whose principal duty is to enforce the law—have violated or ignored the law over long periods of time and have advocated and defended their right", "-27.707448886940256" ], [ "prominent incidents that related to privacy and security first came up, the majority of respondents favored an ideology of \"security first\", while maintaining that a dramatic reduction in civil liberties should be avoided. Events often caused Americans to back allow government to investigate suspected terrorists more effectively, even if those steps might infringe on the privacy of ordinary citizens. The majority of respondents reject steps that translate into extreme intrusion into their lives.\nVarious administrations claimed that reducing privacy protections reduces obstacles that anti-terrorism agencies face attempting to foil terrorist attacks and that fewer privacy protections makes it more difficult for", "-27.678150384745095" ], [ "official surveillance. Privacy in placing calls is of value not only to those engaged in criminal activity. The prospect of unregulated governmental monitoring will undoubtedly prove disturbing even to those with nothing illicit to hide. Many individuals, including members of unpopular political organizations or journalists with confidential sources, may legitimately wish to avoid disclosure of their personal contacts. See NAACP v. Alabama, 357 U.S. 449, 463 (1958); Branzburg v. Hayes, 408 U.S. 665, 695 (1972); id., at 728–734 (STEWART, J., dissenting). Permitting governmental access to telephone records on less than probable cause may thus impede certain forms of political affiliation", "-27.637678548846452" ], [ "hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.\nThe Obama administration's argument that NSA surveillance programs such as PRISM and Boundless Informant had been necessary to prevent acts of terrorism was challenged by several parties. Ed Pilkington and Nicholas Watt of The Guardian said of the case of Najibullah Zazi, who had planned to bomb the New York City Subway, that interviews with involved parties and U.S. and British court documents indicated that the investigation into the case had actually been initiated in response to \"conventional\" surveillance methods such", "-27.60008073033532" ], [ "the security services, and want it amended so that the surveillance is targeted and based on suspicion and argue that the powers are so sweeping, and the bill's language so general, that not just the security services but also government bodies will be able to analyse the records of millions of people even if they are not under suspicion.\nTroy Wolverton notes that the documents leaked by Snowden revealed widespread abuses, both at home and abroad. He says that \"instead of targeted surveillance of particular threats, the NSA had a motto and mentality of 'collect it all' on everybody, the privacy", "-27.556985632225405" ], [ "privacy, including that of mail, telephone, and electronic correspondence, but the government reportedly continues to violate these legal protections when there is a perceived security threat. Security laws allow the government to monitor individuals' movements and private communications, including via cell phones and e-mail.", "-27.483387259941082" ], [ "Nothing to hide argument The nothing to hide argument states that government surveillance programs do not threaten privacy unless they uncover illegal activities, and that if they do uncover illegal activities, the person committing these activities does not have the right to keep them private.\nA person who favors this argument may state \"I've got nothing to hide\" and therefore does not express opposition to government surveillance. An individual using this argument may say that a person should not worry about government or surveillance if they've got \"nothing to hide.\"\nThe motto \"If you've got nothing to hide, you've got nothing to", "-27.471884047263302" ], [ "Surveillance abuse Surveillance abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society.\nDuring the FBI's COINTELPRO operations, there was widespread surveillance abuse which targeted political dissidents, primarily people from the political left and civil rights movement.\nOther abuses include \"LOVEINT\" which refers to the practice of secret service employees using their extensive monitoring capabilities to spy on their love interest or spouse.\nThere is no prevention in the amount of unauthorized data collected on individuals and this leads to", "-27.453719436889514" ], [ "for other various reasons, and by other types of actors.\nThe term covert interrogation also refers to interrogation techniques that may be overt in manner, but are hidden from public, media, governmental, and other types of third-party oversight, for various reasons. Devices When the subject is unaware of it, the forensic examination of a subject's mobile phone and records is a type of covert interrogation. This pertains to other devices, such as computers, and modes of communication, such as telephone records. United States The United States government has engaged in the covert interrogation, surveillance and deportation of terrorism suspects.\nBlack site covert", "-27.337926009429793" ], [ "danger of politicization-the potential for the intelligence community to distort information or judgment in order to please political authorities-is real. Moreover, the danger can never be eliminated if intelligence analysts are involved, as they must be, in the policy process. The challenge is to develop reasonable safeguards while permitting intelligence producers and policy-making consumers to interact.\" Clandestine intelligence versus covert action Clandestine and covert operations share many attributes, but also have distinct differences. They may share, for example, a technical capability for cover and forgery, and require secret logistical support. The essence of covert action is that", "-27.30722278461326" ], [ "Mass surveillance By country Privacy International's 2007 survey, covering 47 countries, indicated that there had been an increase in surveillance and a decline in the performance of privacy safeguards, compared to the previous year. Balancing these factors, eight countries were rated as being 'endemic surveillance societies'. Of these eight, China, Malaysia and Russia scored lowest, followed jointly by Singapore and the United Kingdom, then jointly by Taiwan, Thailand and the United States. The best ranking was given to Greece, which was judged to have 'adequate safeguards against abuse'.\nMany countries throughout the world have already been adding thousands of surveillance cameras", "-27.275251424172893" ], [ "may justify the exceptional and narrowly-tailored use of surveillance programmes, surveillance without adequate safeguards to protect the right to privacy actually risk impacting negatively on the enjoyment of human rights and fundamental freedoms.\" Purpose The purpose of the principles was to provide civil society groups, states, the courts, legislative and regulatory bodies, industry and others with a framework to evaluate whether current or proposed surveillance laws comply with International Human Rights.\nThe concern was that key protections to privacy had been eroded away with technological advancements, therefore needed robust support in some areas to raise international human rights to the standards", "-27.019194818014512" ], [ "broadly that the state must maintain an enormous vigilance and enforcement apparatus... This apparatus is not accountable to the public and enjoys immense police powers... Whether the civilian government is able to control the security bodies is an open question; indeed the civilian government is so penetrated by the apparatus that there is no clear distinction between the two.\"\nIn some cases spookocracies feature literal rule of the state by people from secret police, as it was, for instance, in the USSR under Beria and Andropov, and is in Russia under Vladimir Putin. Russian Federation A \"Law on Foreign Intelligence\" adopted", "-26.9702579416753" ], [ "the spying programme is. If the answer is, 'Oh, we're spying on so many people we can't possibly even count them,' then that's an awful lot of people.\" Five months after Swartz's death, the scale of a vast global surveillance program would be revealed in great detail through the release of top-secret NSA documents by Edward Snowden. The film follows director Brian Knappenberger's recent op-ed documentary for The New York Times titled \"Why Care About the NSA?\" Supporters Supporting the digital protest was a \"broad coalition of activist groups, companies, and online platforms\". The Guardian observed that supporters included unlikely", "-26.969226166052977" ], [ "for suspicious patterns in phone numbers called and e-mail addresses—and then have to go to a judge to get a warrant to actually look at the content under guidelines set by Congress—to prevent a day where, out of fear, we give government a license to look at anyone, any e-mail, any phone call, anywhere, anytime.\nPolitical commentator David Brooks similarly cautioned that government data surveillance programs are a necessary evil: \"if you don't have mass data sweeps, well, then these agencies are going to want to go back to the old-fashioned eavesdropping, which is a lot more intrusive.\"\nConservative commentator Charles Krauthammer", "-26.965268511841714" ], [ "In some situations, a person can be enticed to spy by the sense of importance or significance it gives them—they cease being a minor functionary, and have a substantial, albeit covert, effect. The target often gains a sense of superiority over his or her colleagues, whom he or she is outwitting. Robert Hanssen is an example of someone who, though paid handsomely, decided to spy due to arrogance. Excitement In rare cases a spy may be motivated by the excitement of tradecraft alone. It is possible, although hard to observe and demonstrate, that excitement and thrills play a part in", "-26.93112712528091" ], [ "expert and cryptographer, described it as the \"most common retort against privacy advocates.\" Colin J. Bennett, author of The Privacy Advocates, said that an advocate of privacy often \"has to constantly refute\" the argument. Bennett explained that most people \"go through their daily lives believing that surveillance processes are not directed at them, but at the miscreants and wrongdoers\" and that \"the dominant orientation is that mechanisms of surveillance are directed at others\" despite \"evidence that the monitoring of individual behavior has become routine and everyday\". Effect on privacy protection Viseu, et al. said that the argument \"has been well", "-26.911043933068868" ], [ "junior partner the British agency GCHQ – when it comes to the reason why the system of suspicion of surveillance is being built and the objective of this system – is nothing less than the elimination of individual privacy worldwide\n— Glenn Greenwald George W. Bush and Barack Obama eras Greenwald is critical of actions jointly supported by Democrats and Republicans, writing in 2010: \"The worst and most tyrannical government actions in Washington are equally supported on a fully bipartisan basis.\" In the preface to his first book, How Would a Patriot Act? (2006), Greenwald opens with some of his own personal", "-26.902921012835577" ], [ "untargeted, secret and sometimes even illegal mass surveillance programs.\" However, Moreas and his fellow rapporteurs considered it \"very doubtful that data collection of such magnitude is only guided by the fight against terrorism, as it involves the collection of all possible data of all citizens; points therefore to the possible existence of other power motives such as political and economic espionage.\" France On October 21, 2013, France summoned Charles Rivkin, the U.S. Ambassador to France, to clarify and explain the NSA's surveillance of French citizens. Speaking to journalists, President François Hollande said, \"We cannot accept this kind of behaviour between", "-26.873605850560125" ], [ "government’s surveillance activities must be decided by the public, not secretive spy agencies interpreting secret legal authorities.\n— The American Civil Liberties Union", "-26.86178053759795" ], [ "said: \"You have zero privacy anyway. Get over it.\"\nAnother common argument is: \"If you aren't doing something wrong then you don't have anything to fear.\" Which follows that if one is engaging in unlawful activities, in which case they do not have a legitimate justification for their privacy. However, if they are following the law the surveillance would not affect them. Opposition With the advent of programs such as the Total Information Awareness program and ADVISE, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance for Law Enforcement Act, governments now possess", "-26.860744223493384" ], [ "anything against the wall\".\nHaaretz, Chris Megerian and Eli Stokols of Los Angeles Times, and Kyle Cheney of Politico have labelled Spygate as a conspiracy theory by President Trump.\nJournalist Shepard Smith has said that \"Fox News knows of no evidence to support the president's claim. Lawmakers from both parties say using an informant to investigate is not spying. It's part of the normal investigative process.\" Former judge and Fox News legal analyst Andrew Napolitano also stated that the use of an informant was part of standard procedure.\nWashington Post columnist Max Boot described Spygate as the latest example in a \"nonstop\" series", "-26.812260479375254" ], [ "or groups (e.g., citizens photographing police). Well-known examples are George Holliday's recording of the Rodney King beating and the organization Copwatch, which attempts to monitor police officers to prevent police brutality. Counter-surveillance can be also used in applications to prevent corporate spying, or to track other criminals by certain criminal entities. It can also be used to deter stalking methods used by various entities and organizations.\nSousveillance is inverse surveillance, involving the recording by private individuals, rather than government or corporate entities.", "-26.7701831026352" ], [ "watching people or not, it was the fact that we were watching people so much that we did not understand what we had. The problem is that when you collect it all, when you monitor everyone, you understand nothing.\n— Edward J. Snowden, \nIn May 2015 The Intercept revealed that it obtained documents that showed that officials inside the NSA have criticized the 'collect it all'-approach as well with the documents having titles such as \"Data Is Not Intelligence\", \"The Fallacies Behind the Scenes\", \"Cognitive Overflow?\", \"Summit Fever\", \"In Praise of Not Knowing\", \"Dealing With a 'Tsunami' of Intercept\", \"Overcome by Overload?\"", "-26.751997033366933" ], [ "surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.\nOpposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.", "-26.737463588709943" ], [ "spying can make people feel reluctant to access intimate details or use the internet in a certain way, and as paraphrased by Steve Robson of the Daily Mail, he said that the internet \"should be protected from being controlled by governments or large corporations.\" India Minister of External Affairs Salman Khurshid defended the PRISM program saying, \"This is not scrutiny and access to actual messages. It is only computer analysis of patterns of calls and emails that are being sent. It is not actually snooping specifically on content of anybody's message or conversation. Some of the information they got out", "-26.730296906811418" ], [ "news, claiming that detentions made without trial during Operation Coldstore and Operation Spectrum were based on fake news for party political gain.\nFacebook and Google have opposed the introduction of new laws to combat fake news, claiming that existing legislation is adequate to address the problem and that an effective way of combating misinformation is through educating citizens on how to distinguish reliable from unreliable information. South Africa A wide range of South African media sources have reported fake news as a growing problem and tool to both increase distrust in the media, discredit political opponents, and divert attention from corruption.", "-26.726859575337585" ], [ "prosecutions. Privacy concerns Concerns over privacy have been raised with this technology, most notably in the context of Google Glasses and policing. The advent of large-scale data collection, possibly in combination with facial recognition and other technologies capable of interpreting videos in bulk, means that all cameras, including body worn cameras, could create a means of tracking people anywhere they go. In policing, critics have warned that each police officer could become a \"roving surveillance camera\" Police will interact with citizens during vulnerable moments, such as in a hospital, or in a domestic violence situation. Concerns have also been raised", "-26.70189222006593" ], [ "Motives for spying Money For many spies, the primary motivation is the prospect of financial gain. Spies may seek to supplement their existing income, or to remedy financial difficulties. Sometimes these spies are detected due to extravagant spending of the money they receive. John Anthony Walker is an example of a spy who worked for money. Ideology, patriotism, or religion Some people become spies because of their beliefs. These can include political opinions, national allegiances, and cultural or religious beliefs. This was particularly true during the Cold War, when many spies were motivated by their support for the ideologies of", "-26.624537156050792" ], [ "agencies to infiltrate organizations suspected of political dissent.\nDonner also cited the government's use of scapegoats to divert attention from government criticism onto other political groups.", "-26.603213788359426" ], [ "law-enforcement and counterterrorism officials\", some of whom knew of the domestic spying program, \"said the torrent of tips [from NSA wiretapping] led them to few potential terrorists inside the country they did not know of from other sources and diverted agents from counterterrorism work they viewed as more productive\". February 5, 2006 On February 5, The Washington Post noted that \"fewer than 10 U.S. citizens or residents a year, according to an authoritative account, have aroused enough suspicion during warrantless eavesdropping to justify interception of their (purely) domestic calls, as well. That step still requires a warrant from a federal", "-26.601259015733376" ], [ "the government to obtain sensitive data such as text-messages, email, call logs and web surfing history from its people without the need for court permission.\nThe installation of mass surveillance cameras in Singapore is an effort to act as a deterrence not only for terror attacks but also for public security such as loan sharks, illegal parking and more. As part of Singapore's Smart Nation initiative to build a network of sensors to collect and connect data from city life (including the citizen's movement), the Singapore government rolled out 1000 sensors ranging from computer chips to surveillance cameras, to track almost", "-26.52295235809288" ], [ "as a whistleblower at the National Security Agency drew attention to the extent of US government surveillance operations. Surveillance by network administrators may include being able to view how many times a journalist or source visits a website per day, the information they are reading or viewing, and online applications they utilize. Mexico In Mexico, it is reported that the government there has spent $300 million during one year to surveil and gather information from the population with specific interest in journalists to get access to their texts, phone calls, and emails. Technology Newsrooms rely on end-to-end encryption technologies to", "-26.509078240182134" ], [ "limited to SNS stalking, but can lead to further \"in-person\" stalking because nearly 25% of real-life stalking victims reported it started with online instant messaging (e.g., Facebook chat). Performative surveillance Performative surveillance is the notion that people are very much aware that they are being surveiled on websites, like Facebook, and use the surveillance as an opportunity to portray themselves in a way that connotes a certain lifestyle—of which, that individual may, or may not, distort how they are perceived in reality. 2010 application privacy breach In 2010, the Wall Street Journal found that many of Facebook's top-rated apps were", "-26.482014149951283" ], [ "the CTG or the EU, the United States participates in information exchanges with the group. Criticism Because the CTG is not under the umbrella of any government and is very secretive about its activities, the group has been criticized as lacking accountability and legitimacy.\nThe informal nature of the organization has been criticized by scholars who say it prevents the CTG from being effective at combating terrorism, and that the existence of the group itself prevents Europol from being effective.\nFollowing the announcement of the real-time terrorism database created by the CTG, the group was criticized for engaging in \"mass surveillance,\" with", "-26.478627618052997" ], [ "and the worst in the ranking. In March 2010, they added Turkey and Russia to their 'under surveillance' list regarding Internet censorship, and warned other countries, such as the United Arab Emirates, Belarus and Thailand, also \"under surveillance\" status, to avoid getting transferred into the next \"Enemies of the Internet\" list. Security and espionage In May 2013, former United States CIA and NSA employee Edward Snowden provided The Guardian with documents revealing the existence of far-reaching espionage systems installed by the NSA at critical junctions where Internet traffic is aggregated. As various world governments have learned the extent to", "-26.44856808462646" ], [ "unable to monitor at the risk of our safety.\"\nRon Paul, a former Republican member of Congress and prominent libertarian, thanked Snowden and Greenwald and denounced the mass surveillance as unhelpful and damaging, urging instead more transparency in U.S. government actions. He called Congress \"derelict in giving that much power to the government,\" and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.\nNew York Times columnist Thomas L. Friedman defended limited government surveillance programs", "-26.44503508968046" ], [ "are classified. In a U.S State Department report in 2015, it is believed that law enforcement and government agencies have extensive networks for gathering information and conducting surveillance. A majority of Singaporeans are under the impression that authorities track telephone conversations and the use of the internet of civilians, and routine checks are done on some opposition politicians and other government critics.\nThe Singapore Info-communications Media Development Authority was also listed as a customer of spyware maker Hacking Team in a data leak. The group is alleged to have used spyware to analyse the digital footprint of its intended audience.\nAccording to", "-26.381723244820023" ], [ "government's ability to conduct electronic surveillance in the United States of persons reasonably believed to be located outside the United States. This legislation expired in early 2008, and in July 2008 the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 was enacted.\nThe DOJ OIG review concluded that several considerations favored initiating the process of transitioning the PSP to FISA authority earlier than had been done, especially as the program became less a temporary response to the September 11 terrorist attacks and more a permanent surveillance tool. These considerations included the PSP's effect on privacy interests of U.S. persons,", "-26.314610530622303" ], [ "Residential Surveillance at a Designated Location Residential Surveillance at a Designated Location (Chinese: 指定居所监视居住) is a form of detention regularly used by authorities in the People's Republic of China against individuals accused of endangering state security. The detention occurs at a location that is typically not disclosed to the family, and can include guesthouses, hotels or disused official buildings.\nThe measure has been used heavily since 2015 against human rights lawyers, Falun Gong practitioners and dozens of others accused of political offences, including foreigners. Well known victims have included artist Ai Weiwei, Nobel Peace Prize-winning poet Liu Xiaobo and Swedish bookseller", "-26.279617935128044" ], [ "most people do have things to hide. For example, if a person is looking for a new job, they might not want their current employer to know this. Also if an employer wishes total privacy to watch over their own employee and secure their financial information it may become impossible, and they may not wish to hire those under surveillance. The most concern of detriment is securing the lives of those who live under total surveillance willingly, educating the public to those under peaceful watch while identifying terrorist and those who use the same surveillance systems and mechanisms in opposition", "-26.273844771581935" ], [ "not be deprived of the rights of fair and regular trial\", because they are still covered by GC IV, Article 5.\nSpies and terrorists are only protected by the laws of war if the \"power\" which holds them is in a state of armed conflict or war, and until they are found to be an \"unlawful combatant\". Depending on the circumstances, they may be subject to civilian law or a military tribunal for their acts. In practice, they have often have been subjected to torture and execution. The laws of war neither approve nor condemn such acts, which fall outside their", "-26.249048221710837" ], [ "in potential unwarranted intrusions into privacy and restrictions upon autonomy. The widespread incorporation of information and communication technologies within the daily life of urban residents results in increases in the surveillance capacity of states - to the extent that individuals may be unaware of what information is being accessed, when the access occurs and for what purpose. It is possible that such conditions could give rise to the development of an electronic police state. Shanghai, Amsterdam, San Jose, Dubai, Barcelona, Madrid, Stockholm, and New York are all cities that use various techniques from smart city technology.", "-26.23563314205967" ], [ "as a friend, coworker, or stranger that is interested in one's mundane activities. Individuals leave traces of information when they are online that reveal their interests and desires of which others observe. While this can allow people to become interconnected and develop social connections online, it can also increase potential risk to harm, such as cyberbullying or censoring/stalking by strangers, reducing privacy.\nIn addition, Simone Browne argues that surveillance wields an immense racializing quality such that it operates as \"racializing surveillance.\" Browne uses racializing surveillance to refer to moments when enactments of surveillance are used to reify boundaries, borders, and bodies", "-26.23398104928492" ], [ "to their urban, suburban and even rural areas. For example, in September 2007 the American Civil Liberties Union (ACLU) stated that we are \"in danger of tipping into a genuine surveillance society completely alien to American values\" with \"the potential for a dark future where our every move, our every transaction, our every communication is recorded, compiled, and stored away, ready to be examined and used against us by the authorities whenever they want.\"\nOn 12 March 2013, Reporters Without Borders published a Special report on Internet Surveillance. The report included a list of \"State Enemies of the Internet\", countries whose", "-26.1675464855507" ], [ "a rise in the unmasking of U.S. person’s identities in intelligence reports after the administration loosened privacy rules in 2011. Many of the searches involved any and all mentions of foreign targets.\nOfficials like former National Security Adviser Susan Rice have argued their activities were legal under the so-called minimization rule changes the Obama administration made, and that the intelligence agencies were strictly monitored to avoid abuses. The FISA court and the NSA's own internal watchdog entity disputes this claim, stating that the administration conducting such queries were \"in violation of that prohibition, with much greater frequency than had been previously", "-26.143029284721706" ], [ "Some people that say support video surveillance in city streets may not support indiscriminate telephone taps and vice versa. Besides the types, the way in how this surveillance is done also matters a lot; i.e. indiscriminate telephone taps are supported by much fewer people than say telephone taps only done to people suspected of engaging in illegal activities.\nSurveillance can also be used to give human operatives a tactical advantage through improved situational awareness, or through the use of automated processes, i.e. video analytics. Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts.", "-26.101318792672828" ], [ "that by June 24 they were already seeing what they said was evidence that suspected terrorists had begun changing their communication practices in order to evade detection by the surveillance tools disclosed by Snowden. Judicial branch Leaks of classified documents pointed to the role of a special court in enabling the government's secret surveillance programs, but members of the court maintained they were not collaborating with the executive branch. The New York Times, however, reported in July 2013 that in \"more than a dozen classified rulings, the nation's surveillance court has created a secret body of law giving the National", "-26.074396547744982" ], [ "surveillance in the United States. In an op-ed for The New York Times, the American author William Safire called it \"the supersnoop's dream: a Total Information Awareness about every U.S. citizen.\"\nHans Mark, a former director of defense research and engineering at the University of Texas, called it a \"dishonest misuse of DARPA\".\nThe American Civil Liberties Union launched a campaign to terminate the full implementation of Total Information Awareness, claiming that if implemented, it would \"kill privacy in America\" because \"every aspect of our lives would be catalogued\". The San Francisco Chronicle criticized the program for \"Fighting terror by terrifying U.S.", "-26.029937591520138" ], [ "\"the implication that NSA's foreign intelligence collection is arbitrary and unconstrained is false.\"\nThrough its global surveillance operations the NSA exploits the flood of images included in emails, text messages, social media, videoconferences and other communications to harvest millions of images. These images are then used by the NSA in sophisticated facial recognition programs to track suspected terrorists and other intelligence targets. June Vodafone revealed that there were secret wires that allowed government agencies direct access to their networks. This access does not require warrants and the direct access wire is often equipment in a locked room. In six countries where", "-26.022925609213416" ], [ "are used by the government as a way to control social media rumours from spreading. Ideas such as linking Aadhaar to social media accounts has been suggested to the Supreme Court of India by the Attorney General. In some parts of India like Kannur in Kerala, the government conducted fake news classes in government schools. Some say the government should conduct more public-education initiatives to make the population more aware of fake news.\nIn India, Facebook has partnered with fact-checking websites such as BoomLive. Following over 30 killings linked to rumours spread over WhatsApp, WhatsApp introduced various measures to curb the", "-26.02261085913051" ], [ "and revolutionaries\" for deportation. The domestic operations were increased against political and anti-war groups from 1936 through 1976. Illegal surveillance The final report of the Church Committee concluded:\nToo many people have been spied upon by too many Government agencies and too much information has been illegally collected. The Government has often undertaken the secret surveillance of citizens on the basis of their political beliefs, even when those beliefs posed no threat of violence or illegal acts on behalf of a hostile foreign power. The Government, operating primarily through secret and biased informants, but also using other intrusive techniques such as", "-25.974686356144957" ], [ "have had nothing whatsoever to do with domestic surveillance.\" Edward Lucas, former Moscow bureau chief for The Economist, agreed, asserting that \"Snowden's revelations neatly and suspiciously fits the interests of one country: Russia\" and citing Masha Gessen's statement that \"The Russian propaganda machine has not gotten this much mileage out of a US citizen since Angela Davis's murder trial in 1971.\"\nBob Cesca objected to The New York Times failing to redact the name of an NSA employee and the specific location where an al Qaeda group was being targeted in a series of slides the paper made publicly available.\nRussian journalist", "-25.971062064229045" ], [ "National Security Agency in popular culture The National Security Agency (NSA), the main signals intelligence organization of the United States, has been featured in numerous works of spy fiction over the past decades, with its depictions augmenting along with the growing public awareness of this highly-secretive organization. NSA's mystique makes it a popular candidate for the role of a powerful antagonist and the agency has been portrayed performing tasks that are illegal.", "-25.947466036770493" ], [ "do not have the right to privacy from police observation from public airspace. The weakness of legal protection from UAV surveillance have led to calls from civil liberties advocacy groups for the U.S. government to issue laws and regulations that establish both privacy protections and greater transparency regarding the use of UAVs to gather information about individuals. As an example, the American Civil Liberties Union (ACLU) has warned of a \"nightmare scenario\" in the future where the police might be able, with computer technology, to combine mobile phone tracking with video data and build up a database of people's routine", "-25.934908331022598" ], [ "ability to bring a product to market. Spies may be given other roles that also require infiltration, such as sabotage.\nMany governments spy on their allies as well as their enemies, although they typically maintain a policy of not commenting on this. Governments also employ private companies to collect information on their behalf such as SCG International Risk, International Intelligence Limited and others.\nMany organizations, both national and non-national, conduct espionage operations. It should not be assumed that espionage is always directed at the most secret operations of a target country. National and terrorist organizations and other groups are also targeted.", "-25.87355047033634" ], [ "data Most of the NSA's collected data which was seen by human eyes (i.e., used by NSA operatives) was used in accordance with the stated objective of combating terrorism.\nOther than to combat terrorism, these surveillance programs have been employed to assess the foreign policy and economic stability of other countries.\nAccording to reports by Brazil's O Globo newspaper, the collected data was also used to target \"commercial secrets\". In a statement addressed to the National Congress of Brazil, journalist Glenn Greenwald testified that the U.S. government uses counter-terrorism as a \"pretext\" for clandestine surveillance in order to compete with other countries", "-25.852999363385607" ], [ "of the police \"People with heavy viewing habits believe that 5 percent of society is involved in law enforcement. Their video world is peopled with police officers, judges, and government agents. People with light viewing habits estimates a more realistic 1 percent.\" General mistrust of people \"Those with heavy viewing habits are suspicious of other people's motives. They subscribe to statements that warn people to expect the worst.\" These people would be likely to believe statements such as: \"Most people are just looking out for themselves\"; \"In dealing with others, you can't be too careful\"; and \"Do unto others before", "-25.852803779300302" ], [ "news, fake accounts, bots and trolls, which Rappler thinks are being used to silence dissent. The creation of fake news, and fake news accounts on social media has been a danger to the political health of the country. According to Kate Lamble and Megha Mohan of BBC news, \"What we're seeing on social media again is manufactured reality... They also create a very real chilling effect against normal people, against journalists (who) are the first targets, and they attack in very personal ways with death threats and rape threats.\" Journalists are often risking their lives in publishing articles that contest", "-25.839051866088994" ], [ "a person who is part of a political group which opposes the policies of the national government, might not want the government to know their names and what they have been reading, so that the government cannot easily subvert their organization, arrest, or kill them. Other critics state that while a person might not have anything to hide right now, the government might later implement policies that they do wish to oppose, and that opposition might then be impossible due to mass surveillance enabling the government to identify and remove political threats. Further, other critics point to the fact that", "-25.821401312292437" ], [ "bringing environmental risks to the attention of appropriate authorities. Government employees could be at a similar risk for bringing threats to health or the environment to public attention, although perhaps this is less likely.\nThere are examples of \"early warning scientists\" being harassed for bringing inconvenient truths about impending harm to the notice of the public and authorities. There have also been cases of young scientists being discouraged from entering controversial scientific fields for fear of harassment.\nWhistleblowers are often protected under law from employer retaliation, but in many cases punishment has occurred, such as termination, suspension, demotion, wage garnishment, and/or harsh", "-25.787726549082436" ], [ "of anyone involved be damned\".\nJo Glanville, editor of Index on Censorship and a member of the Ministry of Justice working party on libel reform, asserts that keeping the country safe does not entitle the government or the intelligence services to act without regards to our human rights and that \"it is possible to conduct targeted surveillance with effective oversight while according respect to all our rights\". Software Computer scientists at the University of Pennsylvania have developed an algorithmic framework for conducting targeted surveillance of individuals within social networks while protecting the privacy of \"untargeted\" digital bystanders that \"outputs a list", "-25.77932301769033" ], [ "the media and civil liberties groups as mass surveillance. Similar capabilities exist in other western European countries, such as France.\nSurveillance of electronic communications in the United Kingdom is controlled by laws made in the UK Parliament. In particular, access to the content of private messages (that is, interception of a communication such as an email or telephone call) must be authorised by a warrant signed by a Secretary of State. In addition European Union data privacy law applies in UK law. The law provides for governance and safeguards over the use of electronic surveillance. Further oversight including a requirement for", "-25.77524587723019" ], [ "program.\n\nACLU Executive Director Anthony Romero stated: \nPresident [George W.] Bush may believe he can authorize spying on Americans without judicial or Congressional approval, but this program is illegal and we intend to put a stop to it... The current surveillance of Americans is a chilling assertion of presidential power that has not been seen since the days of Richard Nixon.\nAccording to The New York Times, several legal experts, including some who agreed with its conclusion, said the decision \"overlooked important precedents, failed to engage the government’s major arguments, used circular reasoning, substituted passion for analysis and did not even offer", "-25.770582092081895" ], [ "not need to conspire to engage in activities that were lawful and ethical, or to which no one would object.\nThere are some coordinated activities that people engage in with secrecy that are not generally thought of as conspiracies. For example, intelligence agencies such as the American CIA and the British MI6 necessarily make plans in secret to spy on suspected enemies of their respective countries, but this kind of activity is generally not considered to be a conspiracy so long as their goal is to fulfill their official functions, and not something like improperly enriching themselves. Similarly, the coaches of", "-25.714831737219356" ], [ "It is possible that that information could be made available to the authorities.\"\nWhen discussing the MAINWAY program, former U.S. Senate majority leader Trent Lott stated \"What are people worried about? What is the problem? Are you doing something you're not supposed to?\"\nJohann Hari, a British writer, argued that the \"nothing to hide\" argument is irrelevant to the placement of CCTV cameras in public places in the United Kingdom because the cameras are public areas where one is observed by many people he or she would be unfamiliar with and not in \"places where you hide\".\nIn November 2015, British Conservative Party", "-25.694435677025467" ], [ "people\" for not understanding the threat terrorists pose to the United States. Mike Rogers, the chair of the House Intelligence Committee, praised Obama's stance on NSA surveillance. Peter King, another member of the House Intelligence Committee, questioned the need for the proposed reform of NSA surveillance, but admitted that they were necessary to calm down the \"ACLU types\".\nReactions from global leaders were limited. Great Britain and Russia, both states with extensive surveillance programs, offered no comments. Dilma Rousseff, the current president of Brazil and an outspoken critic of NSA surveillance, also refused to comment. In Germany, a government spokesperson demanded", "-25.626687682350166" ], [ " monitoring of the populace helps to contain threats to the \"consensual view of established authority\" or threats to the continuity of power structures and privilege. Freedom of speech Some claim that true freedom of speech, especially on controversial subjects, is difficult or impossible unless individuals can speak anonymously. If anonymity is not possible, one could be subjected to threats or reprisals for voicing an unpopular view. This is one reason why voting is done by secret ballot in many democracies. Controversial information which a party wants to keep hidden, such as details about corruption issues, is often published or", "-25.616569190780865" ], [ "Person of Interest (TV series) Plot You are being watched. The government has a secret system: a machine that spies on you every hour of every day. I know, because I built it. I designed the machine to detect acts of terror, but it sees everything. Violent crimes involving ordinary people; people like you. Crimes the government considered 'irrelevant'. They wouldn't act, so I decided I would. But I needed a partner, someone with the skills to intervene. Hunted by the authorities, we work in secret. You'll never find us, but victim or perpetrator, if your number's up... we'll find", "-25.570135324000148" ], [ "Minister Ricardo Patiño called \"violations of privacy, torture and other actions that are denigrating to humanity.\" Other countries Russia, South Africa, and Turkey reacted angrily after it was revealed that their diplomats had been spied on during the 2009 G-20 London summit. Index on Censorship London-based Index on Censorship called upon the U.S. government to uphold the First Amendment, saying, \"The mass surveillance of citizens' private communications is unacceptable—it both invades privacy and threatens freedom of expression. The US government cannot use the excuse of national security to justify either surveillance on this scale or the extradition of Snowden for", "-25.56398132090544" ], [ "can reduce crime by three means: by deterrence, by observation, and by reconstruction. Surveillance can deter by increasing the chance of being caught, and by revealing the modus operandi. This requires a minimal level of invasiveness.\nAnother method on how surveillance can be used to fight criminal activity is by linking the information stream obtained from them to a recognition system (for instance, a camera system that has its feed run through a facial recognition system). This can for instance auto-recognize fugitives and direct police to their location.\nA distinction here has to be made however on the type of surveillance employed.", "-25.547232508892193" ], [ "created a new body of law broadening the ability of the NSA to use its surveillance programs to target not only terrorists but suspects in cases involving espionage, cyberattacks and weapons of mass destruction.\nFormer CIA analyst Valerie Plame Wilson and former U.S. diplomat Joseph Wilson, writing in an op-ed article published in The Guardian, said that \"Prism and other NSA data-mining programs might indeed be very effective in hunting and capturing actual terrorists, but we don't have enough information as a society to make that decision.\"\nThe Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is", "-25.536349588466692" ], [ "Political crime Overview At one extreme, crimes such as treason, sedition, and terrorism are political because they represent a direct challenge to the government in power. Espionage is usually considered a criminal act. But offenders do not have to aim to overthrow the government or to depose its leaders to be acting in a way perceived as \"political\". A state may perceive it threatening if individuals advocate change to the established order, or argue the need for reform of long-established policies, or engage in acts signifying some degree of disloyalty, e.g. by burning the nation's flag in public. But the", "-25.536203932329954" ], [ "saying it allows law enforcement to invade the privacy of citizens and that it eliminates judicial oversight of law enforcement and domestic intelligence. In an effort to effectively combat future acts of terrorism, the National Security Agency (NSA) was given broad powers. NSA commenced warrantless surveillance of telecommunications, which was sometimes criticized since it permitted the agency \"to eavesdrop on telephone and e-mail communications between the United States and people overseas without a warrant\". In response to requests by various intelligence agencies, the United States Foreign Intelligence Surveillance Court permitted an expansion of powers by the U.S. government in seeking,", "-25.534733799722744" ], [ "angry and paranoid universe into which campaigners have descended, alleging phone taps and other forms of surveillance as they struggle against sinister conspiracies between health authorities and drug companies.\"", "-25.52339013305027" ] ]
1mpljf
how does hypnosis work? Does a person who is easily hypnotized not have as much of a powerful brain as someone who isn't able to be hypnotized as easy or at all?
[ "Hypnosis is largely misunderstood by a lot (perhaps even most) people. Even by the experts it is not fully understood. It involves taking a subject and working with them to open their mind to be more willing to accept and act on suggestions. I cannot speak to the psychology or physiology of that interaction--I'm not a doctor. However, I can say, from having listened to a number of stage hypnotists, that it is an entirely voluntary act. Hypnosis is not about the hypnotist taking control of a weak mind. It's about the hypnotist guiding a person to bring their mind to a very specific state. Thus, according to some hypnotists, it is actually *easier* to hypnotize \"smart\" people (I will leave the defining of \"smart\" as an exercise for the reader; most likely the key characteristic is that the individual has a good awareness, an ability to follow instructions, and an ability to \"let go.\"). It's also important to remember that a person under hypnosis still has quite a lot of voluntary control. They cannot be made to go against their moral fiber or to ignore most basic instincts (\"you can't hypnotize someone to death\"). Also (for fans of the movie Office Space) if someone is put into hypnosis and then the hypnotist leaves then they will come out of hypnosis relatively quickly (as in within hours, as opposed to being in a semi-trance for the rest of their life). Hypnotic triggers can be activated decades later, though (in some cases).", "As a non-official expert on hypnosis ^^^and ^^^by ^^^that ^^^I ^^^mean ^^^a ^^^hypnofetishist REAL hypnosis is not at all like you might see in movies or stage(d) hypnosis. It has nothing to do with someone's intelligence or mental power or whatever. It does not grant complete control over someone. It cannot make you do anything you already are not willing to do. Hypnosis basically allows you to relax and become \"suggestable\". That doesn't mean \"Will obey any suggestion\", it means that, when a suggestion is made by the hypnotist, your brain will consider the possibility of taking that action, as opposed to your normal inhibitions taking over and, for example, saying \"But that's embarassing!\". In the same sense, if someone were to hypnotize you and suggest that you do something that you would never in a million years do... you won't do it. That will usually cause you to snap out of trance, but even if you don't, you won't feel compelled to do something you absolutely would never do in the first place. So, if you're told to think you're a chicken, and you start clucking, you probably don't care if it makes you look a little silly, especially since stage hypnosis has a sort of \"magic show\" feel and you're more inclined to accept silly commands. But if someone were to, for example, hypnotize you and tell you to have sex with them, unless you REALLY wanted to screw that person, you wouldn't do it.", "Hypnotist here (on a hobby basis). **First question:** There are many theories to how it works, but the one I was taught is that your brain has a filter called the \"critical filter/sense/mind\". Hypnosis is ONE way to lower the critical filter to a point where commands are accepted without question. The \"concious mind\" is considered to contain this filter, so the general goal in hypnosis is to get you unconcious (not in the sense of being knocked out) but still listening. The most widely spread way of doing this is to put someone to sleep. Almost. That's why hypnotists say \"Sleep!\", because we're all familiar with that state and it helps to lower/disable the critical filter. **Second question:** \"Powerful\" is a provocative word. It's not that they are not as powerful, it's that some people will respond better to authority than others. In classical hypnosis (aka \"direct\" aka. \"You are getting tired! You are sleepy!\") you are relying a lot on that people will accept your authority without question. In modern hypnosis (aka. \"indirect\" aka. \"You MAY feel your eyes are getting HEAVY\") you don't rely on authority as much so it will work on more people. Your language is the key. (Third question - you didn't ask, but you assumed something about hypnosis): Please understand that a good hypnotist can hypnotize anyone. Both \"Powerful\" or not. Some people make *easier* clients because they accept authority better but a good hypnotist can hypnotize anyone IF they are WILLING. **Some more info on the two methods:** Classic: Forcing your will onto someone until they \"caved in\" either by having them look at a fixed point or repeating commands like \"Sleep! Your eyes are getting tired!\" etc. This is how hollywood usually depicts it. It can look and sound dramatic so it makes for good theater and movies. **Modern:** Use of indirect commands like \"You may feel your eyes are getting heavier, so it's ok to blink and close them\" or \"As you sit in the chair and feel the weight of your own body dragging you down you may feel a relaxing sensation. It's ok to go along with it\". This is not so dramatic, however this is the way most modern therapeutic hypnosis works. You can combine the methods since the classic method can be more effective and less time consuming. **Are there other methods than classic and modern?** Yes! There are a lot of \"instant-\" and \"almost-instant\" methods that work on the same principle as trick-theifes use: Confusion. Confusion means your brain is desperately looking for an explaination and will likely grab at whatever it gets. This is where you have a split second to throw in a command like \"Sleep!\". You can also use physical touch, turn people around, grab their hand and even bump directly into them to get a moment of confusion. In this moment, your attention will be misdirected and/or looking for explaination or direction. The idea is that you forcibly tell them to sleep in the moment of confusion to give them direction. It won't always work. People are different. **\"Fun\" fact about confusion and misdirection (act of directing your concious attention):** Trick-thieves use this method as they bump into you (initial confusion), then they grab you with both arms (extends confusion) and say sorry (explaination and misdirection) and perhaps grab your arm (confusion and misdirection) and shake your hand (extends confusion) to \"truly\" say sorry (misdirection) and perhaps even go further to ask for direction while talking quickly and saying contradictory things (further extending the confusion and misdirection). Meanwhile, his hands are all over your wallet but you won't conciously notice because your constantly confused and misdirected. Long write. I hope this helped someone. Let me know if you need any further explaination.", "Your susceptibility to hypnosis depends on your ability to bypass your \"critical factor,\" not on your intelligence. So what is the critical factor? Every day, you have random thoughts, such as \"I really hope I don't spill this cup of apple juice all over myself.\" Or \"I should go study now.\" Whether your subconscious mind automatically carries out these instructions depends on your critical factor. When you are child, you have not yet developed the critical factor. That's why if you tell a small child: \"don't drop that,\" they will invariably drop whatever they are holding (since the subconscious mind can't understand \"don't\" - e.g. if you read \"don't picture a pink elephant,\" you tend to automatically picture a pink elephant). It's because they have no critical factor. The instructions you give them go directly to their subconscious mind, and and their body implements them. As you grow older, you recognize that you can't simply blindly follow every external instruction that you receive. However, you still need the ability to communicate with your subconscious. How else do you instruct your body to do things, like eat, drink, walk over to the bed, etc? Your critical factor parses which instructions you want to follow and which you do not. A hypnosis \"induction,\" which is said before any instructions are attempted, is supposed to induce the subject into a relaxed state and to distract the conscious mind so that the critical factor will be lessened (for the later instructions to come). For 99% of the population, hypnosis places them in a relaxed state where their critical factor is not as strong. These people are more likely to follow suggestions. But for those 99%, when they are hypnotized, they still feel in complete control. If they are hypnotized by a stage hypnotist, for example, to squack like a chicken, they will report that they were aware of what was happening the whole time. They complied because they thought it would be funny and didn't see any harm in it. The hypnosis induction made them relaxed and lessened their critical factor, so they were less worried in this state about embarrassment or the social implications of doing something stupid. The fact that everyone expected them to comply also lessened the social embarrassment from doing something stupid and in fact placed peer pressure to comply. So most people under hypnosis are still in complete control of themselves. They are simply in a state of heightened suggestiveness. However, one could choose not to be hypnotized. The induction won't do anything to you if you think hypnosis is stupid or won't work (this is your critical factor telling you not to pay any attention to the hypnosis). I have personally been under hypnosis and gotten an important phone call and decided to break out of the trance state and go back to my \"normal\" state so I could answer the phone. There is no such thing for most people that if they are not broken out of trance, they will continue to walk around like zombies. For most people, also, unless they are completely skeptical of hypnosis, the longer you spend on the induction (relaxing their critical factor), the more susceptible they will later be to suggestions. So for 99% of the population, hypnosis is not strong enough to alter your perception of reality or force you to do anything you would not otherwise. However, approximately 1% of the population are extremely susceptible to hypnosis. They can be hypnotized to *completely eliminate* their critical factor. They will accept all suggestions with critically evaluating them, just as a small child might. The hypnotist is giving commands directly to their subconscious, with no interruption for their conscious mind. These can be hypnotized not to feel pain. They can be age regressed so they can perfectly describe a memory from when they were 2 years old and can be led to believe they are actually still 2 years old. They can be hypnotized to forget whatever they have done while under hypnosis. There are various measures of susceptibility to hypnosis, such as the Harvard Group Scale (HGSS). Hypnosis works better to treat some types of disorders because they tend to be more susceptible. For example, people with multiple dissociative personality disorders tend to be VERY susceptible to hypnosis and can be hypnotized to switch between various personalities to allow the therapist to talk to a certain personality. Here are some examples of what can be done to this hyper-sensitive 1% with hypnosis. They can be convinced to throw what they believe to be acid in someone's face: URL_2 They can be hypnotized not to feel extreme cold (to the point where they could die of hypothermia without ever feeling cold): URL_0 They can be instructed to forget what has happened (Derren has already hypnotized this subject at this point in the video not to remember anything he does when he sees polka dots): URL_3 Disclaimer - Derren is an entertainer, but what he does in selecting a subject (narrow down to only the most susceptible person he could find) is done by many other researchers who have tested hypnosis theories. You can also see Derren himself being *shocked* at certain points in the video that his subject really doesn't seem to remember anything. Derren himself is amazed at how far he can go with hypnosis with someone who is so hyper-sensitive to it, which leads to the conclusion that these videos are not merely staged for entertainment purposes. Derren even makes the subject take a polygraph to see if he is lying about being that deep in trance: URL_1 ", "As far as I know you have to 'accept' the hypnosis. You're not meant resist it because the reason why you are being hypnotized is likely to get help i.e. hypnosis as a cure for irrational arachnaphobia.", "I have notes related to this topic so let me just post it here: **What is hypnosis?** It is the ability, using verbal direction, to lead someone into an altered state of consciousness (it resembles daydreaming), during which time they are much more receptive to suggestion. Once in this state, the hypnotist can make either direct or indirect suggestions to help the subject to break damaging or undesirable habits, such as smoking, over eating, anxiety, etc. This is where hypnosis becomes hypnotherapy. The actual mechanism that makes hypnosis work is quite difficult to quantify. Basically, the things that drive us and make us who we are, are deeply embedded in our subconscious mind. We don’t need to carefully think about what we strongly agree or disagree with, what we love or hate, or strongly desire, it is “hard wired” into our mind. Some of this comes from personal experience, preference, and needs, and some from our childhood from direct commands or suggestions from our parents or authority figures. Normally we process information via our 5 senses and our “hard wiring” forms something termed the “critical censor,” which acts as a kind of filter to determine whether anything presented to us conforms with our deepest beliefs. The critical censor decides whether or not to accept or reject the information presented to us. If it is accepted it is “absorbed” into our subconscious and becomes either accepted knowledge, a part of our belief system, a moral viewpoint, or an ambition/desire. Information or commands that are at odds with our previously accepted knowledge, beliefs, morals, or desires are rejected by the critical monitor, and they have no effect on our behaviour or actions. This can be explained quite nicely by Freudian psychology. The Id (subconscious) is the most powerful part of the mind, and it automatically, and without our conscious realisation, contains our deepest desires, and controls our behaviour. The Ego (rational, logical mind) analyses information to see if it makes sense, before passing it onto the Super Ego (critical censor). The Super Ego is like the gatekeeper to the subconscious mind, it decides whether or not to accept the information, instruction, command, and either sends it into the Id (subconscious) where it becomes a component of our behaviour, or rejects it out of hand. All problem behaviour, like smoking for example, are habits that are embedded in our subconscious mind and have become a part of our image of who we are, this is why they are difficult to break. We all know that smoking is bad for our health, but trying to make yourself stop is incredibly difficult – the command that your logical mind gives yourself is rejected by the critical censor and never makes it into the subconscious. This is where hypnosis can help. By concentrating all of the subjects attention onto a single object, their critical censor is gradually subdued allowing the hypnotist to speak almost directly to the subconscious mind, and overcoming the problem of the suggestion not being accepted. **Common Misconceptions about hypnosis** *1) You can be hypnotized and do things against your will* The simple fact is that although you subdue the critical censor and speak almost directly to the subconscious mind, people will not respond to suggestions that are against their most deeply held moral beliefs. *2) Under hypnosis you are unconscious* This is not the case. Hypnosis is an altered state of mind in which the subject is in a state similar to daydreaming. They are at all times conscious and aware and in control of what is happening to them, and can come out of hypnosis anytime that they choose. *3) Only weak minded people can be hypnotized* The opposite is true. Generally more intelligent people are easier to hypnotise, possibly because they have a greater ability to inwardly visualise and not be distracted by other thoughts. *4) You can get stuck in Hypnosis* This is impossible, if the hypnotist dropped dead after inducing the trancethe subject would either come out of hypnosis by themselves or drift off to sleep. *5) You can be made to reveal embarrassing secrets* This is false for the reasons given above. The subject is aware of what is happening and can not be forced to do things against their will. *6) If you can hear the Hypnotist you weren’t hypnotised* People experience hypnosis in different ways. Hearing and remembering what the hypnotist said to you is completely natural, hypnosis is not sleep, it is an altered state of consciousness. Although your subject may not have felt hypnotised, the hypnotist can usually visually see the physical changes, and of course the subjects modified behaviour is the ultimate proof.", "Hypnotherapist here (registered with the GHSC in the UK) and I also just graduated with my BSc in Psychology. Hypnosis is a deeply relaxed state of focused attention (e.g. The hypnotises voice). All hypnosis is self hypnosis, you are always the one who puts yourself in trance. I prefer to call a hypnotherapist a 'hypnotic operator'. For the sake of ELI5, hypnosis allows you to relax your conscious, thinking part of your mind and explore the realms of your unconscious which, when coupled with suggestions, can create powerful change. Hypnotisability is correlated to intelligence but int he opposite way you describe. People below a certain IQ (iirc 75?) cannot be/very hard to be hypnotised as an imagination must be present. The more creative you are, the more easily you can be hypnotised. Those who are more SKEPTICAL however have a harder time of letting go. While this may scream the placebo effect, there have been hundreds of clinical studies comparing the effects of hypnosis to a placebo, meditation and suggestions without trance. Hypnosis is almost always show to be better than the alternatives (the studies I recall were using hypnosis for both chronic and acute pain relief). Stage hypnosis is much different, very much based on social pressure of not wanting to be the one idiot on stage who doesn't go along with the suggestions. Also, these people are always volunteers and so there's a bit of a performer inside of them waiting to come out anyway ;)", "A few years back I attended a Hynotist stage show. I was called on stage with my friends in tow. One by one each friend was hypnotized and suddenly performing silly tricks on stage like a bunch of circus monkeys. I was asked to leave the stage and ushered off quickly when the \"magic\" fell flat on me. Comments?", "Hypnosis does not work. It's a fraud. Not withstanding the placebo effect and the power of suggestion." ]
[ [ "The last chapter deals with the suggestibility of human beings and how this is related to hypnosis. Some people are more easily hypnotised than others. If one succeeded to hypnotise someone else, the hypnotised person might be suggestible. The hypnotist is able to change and shape opinions, experiences, and events of other people and let the hypnotised people believe that the implanted memories are their own. This can be a powerful and a dangerous tool. Erismann also explains that suggestibility and \"implanting\" beliefs into the mind of other people is not only happening through hypnosis but can also happen if", "-33.544572179205716" ], [ "of scientific interest more beset by divided professional opinion and contradictory experimental evidence... No one can say whether hypnosis is a qualitatively unique state with some physiological and conditioned response components or only a form of suggestion induced by high motivation and a positive relationship between hypnotist and subject... T.X. Barber has produced \"hypnotic deafness\" and \"hypnotic blindness\", analgesia and other responses seen in hypnosis—all without hypnotizing anyone... Orne has shown that unhypnotized persons can be motivated to equal and surpass the supposed superhuman physical feats seen in hypnosis.\nThe study concluded that there are no reliable accounts of its effective", "-31.994379374664277" ], [ "are often repeated in multiple sessions before they achieve peak effectiveness. Conscious and unconscious mind Some hypnotists view suggestion as a form of communication that is directed primarily to the subject's conscious mind, whereas others view it as a means of communicating with the \"unconscious\" or \"subconscious\" mind. These concepts were introduced into hypnotism at the end of the 19th century by Sigmund Freud and Pierre Janet. Sigmund Freud's psychoanalytic theory describes conscious thoughts as being at the surface of the mind and unconscious processes as being deeper in the mind. Braid, Bernheim, and other Victorian pioneers of hypnotism did", "-31.65175265155267" ], [ "the hypnotist had nothing to do with the content of their hypnotic recall. (emphasis in source)\nWhen under hypnosis, an individual will attempt to fill in gaps in their memory with any information, including fantasies. The information used to fill gaps can come from the hypnotist and the individual under hypnosis. For example, the hypnotist may either knowingly or unknowingly use loaded questions that influence the already ambiguous memories of abductees in such a way the patient creates an alien abduction narrative for them. Skeptics Robert Sheaffer and Phillip J. Klass say individual abduction researchers appear to exert influence on the", "-31.518641208822373" ], [ "providing one of the first nonstate definitions of hypnosis in a 1941 article:\nHypnotic behaviour is meaningful, goal-directed striving, its most general goal being to behave like a hypnotised person as this is continuously defined by the operator and understood by the client.\nPut simply, it is often claimed that, whereas the older \"special state\" interpretation emphasises the difference between hypnosis and ordinary psychological processes, the \"nonstate\" interpretation emphasises their similarity.\nComparisons between hypnotised and non-hypnotised subjects suggest that, if a \"hypnotic trance\" does exist, it only accounts for a small proportion of the effects attributed to hypnotic suggestion, most of which can", "-31.251186180510558" ], [ "of hypnotism, hypothesized that hypnosis causes the subjects to divide their consciousness voluntarily. One part responds to the hypnotist while the other retains awareness of reality. Hilgard made subjects take an ice water bath. None mentioned the water being cold or feeling pain. Hilgard then asked the subjects to lift their index finger if they felt pain and 70% of the subjects lifted their index finger. This showed that, even though the subjects were listening to the suggestive hypnotist, they still sensed the water's temperature. Social role-taking theory The main theorist who pioneered the influential role-taking theory of hypnotism was", "-31.234780411235988" ], [ "subject to expect to be hypnotized could produce hypnotic results, and he found that a subject's score on a hypnotic suggestibility scale could be increased through both motivation and expectation.\nAt first perceived as an iconoclast or \"hypnosis opponent,\" his research and views came to be taken more seriously by the psychological community.\nThose who embraced traditional views of hypnosis as an altered state of consciousness were displeased by Barber’s habit of placing quotation marks around the term hypnosis to reflect his concerns. Some interpreted this as an expression of a cavalier and dismissive attitude about the entire field. That interpretation became", "-31.220841622187436" ], [ "good.\" Murphy adds that repeated hypnosis defeats an individual's self-motivation, self-knowledge, unique sense of self, sense of reality, and ability to think critically. Murphy describes Peale's understanding of the mind as inaccurate, \"without depth\", and his description of the workings of the mind and the unconscious as deceptively simplistic and false: \"It is the very shallowness of his concept of 'person' that makes his rules appear easy ... If the unconscious of man ... can be conceptualized as a container for a small number of psychic fragments, then ideas like 'mind-drainage' follow. So does the reliance on self-hypnosis, which is", "-31.19969843601575" ], [ "them.\nMasters called hypnosis a \"duplication of life's errors\":\nWhen I was a hypnotist, they used to say to me, \"You're a hypnotist, are you? When are you going to put me to sleep?\" And I would say, \"Well when are you going to wake up? Because you're already asleep.\" Hypnosis is an altered state of consciousness [...] When a person is hypnotized—or reacts to stress, which is the same thing—he's not aware that he's being influenced. And when he is under the influence, he moves and has his being according to somebody else's will. And we don't realize that but when", "-30.638677971670404" ], [ "not be completely aware, on a conscious level, of the suggestions.\nThe hypnotist gains rapport\nwith the listener(s) and the hypnotist maintains psychological congruency\n(the act of truly acting towards your goals without hesitation), both linguistically and in one's nonverbal communication. As the subject listens while feeling a psychological connection with the hypnotist and the hypnotist displaying behaviors such as confidence and understanding, the hypnotist then presents linguistic data in the form of metaphor:\nThe Metaphor presents a surface structure of meaning in the actual words of the story, which activates an associated deep structure of meaning that is indirectly relevant to the listener,", "-30.377832066325936" ], [ "wonders whether a hypnotist can induce trance in a total stranger and then compel him to carry out behavior for his own personal and private benefit--the subject somehow becoming the helpless tool of the powerful hypnotist.\"…\"No authority has seriously maintained that such a total control fantasy could be translated into real life with the help of hypnosis. Fortunately, the Manchurian Candidate still remains fiction.” \nDr. Orne sought to prove his stance by replicating experiments previously believed to have demonstrated hypnosis could coerce subjects into \"unacceptable” or “antisocial” behavior – such as handling a poisonous snake or throwing acid on a", "-30.293337446128135" ], [ "transderivational searches.\nScottish surgeon James Braid, who coined the term \"hypnotism\", claimed that focused attention was essential for creating hypnotic trances; indeed, his thesis was that hypnosis was in essence a state of extreme focus. But it can be difficult for people racked by pain, fear or suspicion to focus on anything at all. Thus other techniques for inducing trance become important, or as Erickson explained:\n ... long and frequent use of the confusion technique has many times effected exceedingly rapid hypnotic inductions under unfavourable conditions such as acute pain of terminal malignant disease and in persons interested but hostile, aggressive,", "-30.28485783369979" ], [ "self-hypnosis sometimes require assistance; some people use devices known as mind machines to assist in the process, whereas others use hypnotic recordings.\nSelf-hypnosis is claimed to help with stage fright, relaxation, and physical well-being. Stage hypnosis Stage hypnosis is a form of entertainment, traditionally employed in a club or theatre before an audience. Due to stage hypnotists' showmanship, many people believe that hypnosis is a form of mind control. Stage hypnotists typically attempt to hypnotise the entire audience and then select individuals who are \"under\" to come up on stage and perform embarrassing acts, while the audience watches. However, the effects", "-30.073449216899462" ], [ "interpret the effects of hypnotism as due primarily to a specific, abnormal, and uniform psychological or physiological state of some description, often referred to as \"hypnotic trance\" or an \"altered state of consciousness\". Nonstate theorists rejected the idea of hypnotic trance and interpret the effects of hypnotism as due to a combination of multiple task-specific factors derived from normal cognitive, behavioural, and social psychology, such as social role-perception and favorable motivation (Sarbin), active imagination and positive cognitive set (Barber), response expectancy (Kirsch), and the active use of task-specific subjective strategies (Spanos). The personality psychologist Robert White is often cited as", "-30.05175108241383" ], [ "consciousness. In a seminal article on hypnotism, the personality psychologist Robert White, had argued that hypnotic subjects were actively trying to enact a socially constructed role.\nHypnotic behavior is meaningful, goal-directed striving, its most general goal being to behave like a hypnotised person as this is continuously defined by the operator and understood by the client. \nFollowing White's radical interpretation of hypnosis, Sarbin used concepts from his own role theory, empirical research data, and analogies with other socially constructed roles, to argue in a much more rigorous manner that hypnotic subjects were not in a special state of consciousness but", "-30.04342578840442" ], [ "hypnotherapy treatment; and the ‘LBR Criteria’ (2003) to be able to differentiate more easily between causal and trigger events and helping to target more accurately the erroneous data which requires reinterpretation.\nHypnotherapy expert Dr Peter Marshall, former Principal of the London School of Hypnotherapy and Psychotherapy Ltd. and author of A Handbook of Hypnotherapy, devised the Trance Theory of Mental Illness, which provides that people suffering from depression, or certain other kinds of neuroses, are already living in a trance and so the hypnotherapist does not need to induce them, but rather to make them understand this and help", "-29.84591882576933" ], [ "ability to hypnotize people.", "-29.836804649115948" ], [ "account for them. Because hypnosis can recreate the false beliefs (accounting for factor 1 of the two-factor theory of delusional belief above) and disrupt the ability to reject a belief on implausibility (accounting for factor 2) with no lasting consequences, it is a good model to study monothematic delusions, particularly mirrored-self misidentification.\nCognitive-delusory hypnosis is the most difficult type of hypnotic suggestion to enter and is required to study mirrored-self misidentification. Therefore, only those who are highly susceptible to hypnosis can participate in these studies. In a typical study, participants are placed in a hypnotic trance and are either told to", "-29.762368089111988" ], [ "of its generalization. Hypnotherapy The term \"hypnosis\" is derived from the Greek word hypnos, which means \"sleep\". When in a state of hypnosis, otherwise known as a trance, one experiences deep relaxation and altered consciousness. This trance is particularly characterized by extreme suggestibility and heightened imagination. Within this state, individuals have complete free will and are indeed fully conscious, however they become hyperattentive to the subject at hand and nearly exclude any other thought.\nThis state of trance is widely used as a means to recall suppressed or repressed memories. During the sessions of hypnosis, a great deal of spontaneous recovery", "-29.667885181028396" ], [ "Covert hypnosis Technique Covert hypnosis is a phenomenon not too different from indirect hypnosis, as derived from Milton H. Erickson and popularized as \"The Milton Model\" in style,\nbut the defining feature is that the hypnotized individual subsequently engages in hypnotic phenomena without conscious effort or choice. Covert hypnosis, like \"Ericksonian Hypnosis\", \"operates through covert and subtle means... to reach deeper levels of consciousness than are touched by the surface structure of language\".\nIt is the concept that an individual, 'the hypnotist,' can control another individual's behavior via gaining rapport.\nDuring hypnosis, the operator or hypnotist makes suggestions. The subject is intended to", "-29.620877946494147" ], [ "than the immediate action. A hypnotist uses techniques that use these instinctive \"fillings-in of gaps\" and changes to how we respond to a scenario or moment. In the therapy setting, a hypnotist or hypnotherapist will likely evaluate these automatic cognitive leaps, or dogma, or any self-limiting or self-sabotaging beliefs.\nBeing under the influence of suggestion can be characterized as exhibiting behavioral compliance without private acceptance or belief.\nThat is, actions being inconsistent with one's own volition and belief system and natural unhindered action-motivations. This could hinder the autonomy, expression or self-determination of an individual. It could equally supersede emotions with rationally chosen,", "-29.61822345224209" ], [ "not refer to the unconscious mind but saw hypnotic suggestions as being addressed to the subject's conscious mind. Indeed, Braid actually defines hypnotism as focused (conscious) attention upon a dominant idea (or suggestion). Different views regarding the nature of the mind have led to different conceptions of suggestion. Hypnotists who believe that responses are mediated primarily by an \"unconscious mind\", like Milton Erickson, make use of indirect suggestions such as metaphors or stories whose intended meaning may be concealed from the subject's conscious mind. The concept of subliminal suggestion depends upon this view of the mind. By contrast, hypnotists who", "-29.568528370233253" ], [ "deliberate long-term results. Non-state explanations of hypnotic responsiveness According to some theoretical explanations of hypnotic responses, such as the role-playing theory of Nicholas Spanos, hypnotic subjects do not actually enter a different psychological or physiological state; but, rather, simply acting on social pressure – and, therefore, it is easier for them to comply than to disobey. Whilst this view does not dispute that hypnotized individuals truly experience the suggested effects, it asserts that the mechanism this takes place by has, in part, been \"socially constructed\" and does not, therefore, require any explanation involving any sort of an \"altered state of", "-29.511746996497095" ], [ "Lee Shapiro observed that the \"deeper\" the hypnotism, the more likely a particular characteristic is to appear, and the greater extent to which it is manifested. Scheflin and Shapiro identified 20 separate characteristics that hypnotized subjects might display: \"dissociation\"; \"detachment\"; \"suggestibility\", \"ideosensory activity\"; \"catalepsy\"; \"ideomotor responsiveness\"; \"age regression\"; \"revivification\"; \"hypermnesia\"; \"[automatic or suggested] amnesia\"; \"posthypnotic responses\"; \"hypnotic analgesia and anesthesia\"; \"glove anesthesia\"; \"somnambulism\"; \"automatic writing\"; \"time distortion\"; \"release of inhibitions\"; \"change in capacity for volitional activity\"; \"trance logic\"; and \"effortless imagination\". Hypnotic induction Hypnosis is normally preceded by a \"hypnotic induction\" technique. Traditionally, this was interpreted as a method of", "-29.275040375447134" ], [ "research assistant.   By adding a control group of simulators to these experiments, Orne demonstrated that the control group (simulators) were more likely than the hypnotized subjects to perform the requested “antisocial” act.  Orne explains that this is because subjects in these experiments, both hypnotized and simulators, trusted that they were not in any real danger.  He concludes:  “The popular view which holds that hypnosis is able to exert a unique form of control over the hypnotized individual, which can compel him to carry out otherwise repugnant actions, must be rejected. \nDr. Orne used the CIA’s money as emergency contingency funds", "-29.263792908081086" ], [ "magnetism\"), but differed in his theory as to how the procedure worked. Characteristics A person in a state of hypnosis has focused attention, and has increased suggestibility.\nThe hypnotized individual appears to heed only the communications of the hypnotist and typically responds in an uncritical, automatic fashion while ignoring all aspects of the environment other than those pointed out by the hypnotist. In a hypnotic state an individual tends to see, feel, smell, and otherwise perceive in accordance with the hypnotist's suggestions, even though these suggestions may be in apparent contradiction to the actual stimuli present in the environment. The effects", "-29.206698249850888" ], [ "the nervous system of the subject causes their conscious mind to be temporarily disengaged. During this brief window of distraction the hypnotist quickly intervenes, allowing the subject to enter the state of intense, hyper imagination and inner focus.", "-29.205399736296386" ], [ "any suggestions whatever, there seems no point in calling him hypnotised, regardless of how fully and readily he may respond to suggestions of lid-closure and other superficial sleeping behaviour. Conditioned inhibition Ivan Pavlov stated that hypnotic suggestion provided the best example of a conditioned reflex response in human beings; i.e., that responses to suggestions were learned associations triggered by the words used:\nSpeech, on account of the whole preceding life of the adult, is connected up with all the internal and external stimuli which can reach the cortex, signaling all of them and replacing all of them, and therefore it can", "-29.14387306716526" ], [ "that the real precursor of hypnotism was the ancient practices of meditation rather than in the more recent theory and practice of Mesmerism. As he later wrote,\nInasmuch as patients can throw themselves into the nervous sleep, and manifest all the usual phenomena of Mesmerism, through their own unaided efforts, as I have so repeatedly proved by causing them to maintain a steady fixed gaze at any point, concentrating their whole mental energies on the idea of the object looked at; or that the same may arise by the patient looking at the point of his own finger, or as", "-29.098639513773378" ], [ "illness, and shamanic possession, etc. This interpretation of hypnosis is particularly relevant to understanding stage hypnosis, in which there is clearly strong peer pressure to comply with a socially constructed role by performing accordingly on a theatrical stage.\nHence, the social constructionism and role-taking theory of hypnosis suggests that individuals are enacting (as opposed to merely playing) a role and that really there is no such thing as a hypnotic trance. A socially constructed relationship is built depending on how much rapport has been established between the \"hypnotist\" and the subject (see Hawthorne effect, Pygmalion effect, and placebo effect).\nPsychologists such as", "-29.06571690517012" ], [ "control and opens themselves to mental vulnerability. In an interview published in the January 2015 issue of Bizarre, Alex Tsander, billed therein as \"Britain's premier fetish hypnotist\", discussing hypnotism in the BDSM context, explicitly distinguished between the use of hypnotic themes in role-play and \"real\" induced effects. However, the distinction is arguably ambiguous and where one ends and the other begins may be unclear. Tsander himself insists that there is no such thing as a \"state of hypnosis\" but that hypnotic influence can elicit an authentic sense of loss of control through manipulation of multiple \"antecedent variables\". In his 2014", "-28.96966973587405" ], [ "Hypnotherapy Definition The United States' Federal Dictionary of Occupational Titles describes the job of the hypnotherapist:\n\"Induces hypnotic state in client to increase motivation or alter behavior patterns: Consults with client to determine nature of problem. Prepares client to enter hypnotic state by explaining how hypnosis works and what client will experience. Tests subject to determine degree of physical and emotional suggestibility. Induces hypnotic state in client, using individualized methods and techniques of hypnosis based on interpretation of test results and analysis of client's problem. May train client in self-hypnosis conditioning.\" \nGOE: 10.02.02 STRENGTH: S GED: R4 M3 L4 SVP: 7", "-28.736701361078303" ], [ "of hypnosis are not limited to sensory change; even the subject's memory and awareness of self may be altered by suggestion, and the effects of the suggestions may be extended (posthypnotically) into the subject's subsequent waking activity.\nIt could be said that hypnotic suggestion is explicitly intended to make use of the placebo effect. For example, in 1994, Irving Kirsch characterised hypnosis as a \"nondeceptive placebo\", i.e., a method that openly makes use of suggestion and employs methods to amplify its effects.\nIn Trance on Trial, a 1989 text directed at the legal profession, legal scholar Alan W. Scheflin and psychologist Jerrold", "-28.696749940085283" ], [ "first influential researchers of hypnotism was Indo-Portuguese monk, Abbé Faria. He was a pioneer of the scientific study of hypnotism who believed hypnosis worked purely through the power of suggestion.\nThe Scottish surgeon James Braid, focused on the susceptibility of the subjects and not on what the hypnotist was doing. By doing this Braid was able to make a revolutionary observation and conclusion by having his subjects stare at and concentrate on a shiny object. He notice that \"the staring paralyzed the eye muscles, he concluded, and the fixed attention weakened the mind, resulting in an unusual state of the", "-28.642886996240122" ], [ "of the study was that there was no evidence that hypnosis could be used for military applications, and no clear evidence whether \"hypnosis\" is a definable phenomenon outside ordinary suggestion, motivation, and subject expectancy. According to the document:\nThe use of hypnosis in intelligence would present certain technical problems not encountered in the clinic or laboratory. To obtain compliance from a resistant source, for example, it would be necessary to hypnotise the source under essentially hostile circumstances. There is no good evidence, clinical or experimental, that this can be done.\nFurthermore, the document states that:\nIt would be difficult to find an area", "-28.60896856553154" ], [ "notion of holding up hypnotism as a panacaea or universal remedy. As formerly remarked, I use hypnotism ALONE only in a certain class of cases, to which I consider it peculiarly adapted – and I use it in conjunction with medical treatment, in some other cases; but, in the great majority of cases, I do not use hypnotism at all, but depend entirely upon the efficacy of medical, moral, dietetic, and hygienic treatment, prescribing active medicines in such doses as are calculated to produce obvious effects\" — James Braid\nJust three days before his death he sent a (now lost) manuscript,", "-28.608234310377156" ], [ "message in The Power of Positive Thinking to that of hypnosis, writing that \"self knowledge, in Mr. Peale's understanding, is unequivocally bad; self hypnosis is good.\" Murphy explains that such repeated hypnosis defeats an individual's self-motivation, sense of reality, and ability to think critically. He describes Peale's understanding of the mind as inaccurate and his description of the workings of the mind as deceptively simplistic and false. Murphy states that if man's unconscious “can be conceptualized merely as a container for a small number of psychic fragments, then ideas like 'mind-drainage' follow. So does the reliance on self-hypnosis, which is", "-28.546250009007053" ], [ "may converge towards a steady state. Increasing the signal-to-noise ratio enables messages to be more clearly received. The hypnotist's object is to use techniques to reduce interference and increase the receptability of specific messages (suggestions). Systems theory Systems theory, in this context, may be regarded as an extension of Braid's original conceptualization of hypnosis as involving \"the brain and nervous system generally\". Systems theory considers the nervous system's organization into interacting subsystems. Hypnotic phenomena thus involve not only increased or decreased activity of particular subsystems, but also their interaction. A central phenomenon in this regard is that of feedback loops,", "-28.537738225684734" ], [ "\"command\" hypnosis, in which the hypnotist assumes \"positive authoritative control\" over the subject. \"It is the firm conclusion of this Board that most scientology and dianetic techniques are those of authoritative hypnosis and as such are dangerous. ... the scientific evidence which the Board heard from several expert witnesses of the highest repute ... which was virtually unchallenged - leads to the inescapable conclusion that it is only in name that there is any difference between authoritative hypnosis and most of the techniques of scientology. \"\nL.Ron Hubbard published, to all staff and all auditors, that hypnosis, as permformed by", "-28.51671993956552" ], [ "would otherwise be criminal conduct is not guilty of a crime if he does so in a state of unconsciousness[.]\" Depending on jurisdiction, automatism may be a defense distinct from insanity or a species of it. Hypnosis While the general scientific consensus is that hypnosis cannot induce individuals to engage in conduct in which they would not otherwise engage, the Model Penal Code, as well as the criminal codes of Montana, New York, and Kentucky do provide hypnosis and hypnotic suggestion as negating volition, and consequently, actus reus.\nPerhaps the earliest case of hypnotism as negating voluntary conduct is California v.", "-28.40551525563933" ], [ "humans may quite obviously be hypnotists or psychics.", "-28.348607696942054" ], [ "a form of hypnosis. She claimed that these drills are sometimes done for several hours at a time, \"until the preclear can do it without delay, without protest, without apathy, but with cheerfulness.\" \nIn his book The Creation of Human Ability, Hubbard denied the hypnotic nature of the processes and drills. He stated: \"(They) induce no trances. People who think so simply don't know much about hypnotism.\" \nA 2005 article in the Miami Herald quoted Scientology critic David Touretzky as saying \"It's very clear that what they're doing is putting people into a light trance\".\nA 2010 article in Ynet quoted", "-28.2784176676505" ], [ "Robert Baker and Graham Wagstaff claim that what we call hypnosis is actually a form of learned social behaviour, a complex hybrid of social compliance, relaxation, and suggestibility that can account for many esoteric behavioural manifestations. Cognitive-behavioural theory Barber, Spanos, and Chaves (1974) proposed a nonstate \"cognitive-behavioural\" theory of hypnosis, similar in some respects to Sarbin's social role-taking theory and building upon the earlier research of Barber. On this model, hypnosis is explained as an extension of ordinary psychological processes like imagination, relaxation, expectation, social compliance, etc. In particular, Barber argued that responses to hypnotic suggestions were mediated by a", "-28.180348673602566" ], [ "of influence, which is only enhanced (or formalized) through expected cultural rituals.\nOliver Zangwill pointed out in opposition that, while cultural expectations are important in hypnotic induction, seeing hypnosis only as a conscious process of influence fails to account for such phenomena as posthypnotic amnesia or post-hypnotic suggestion. Faster methods of hypnotic induction In early hypnotic literature a hypnosis induction was a gradual, drawn-out process. Methods were designed to relax the hypnotic subject into a state of inner focus (during which their imagination would come to the forefront) and the hypnotist would be better able to influence them and help them", "-28.139362697373144" ], [ "use by an intelligence service in history.\nResearch into hypnosis in military applications is further verified by the Project MKULTRA experiments, also conducted by the CIA. According to Congressional testimony, the CIA experimented with utilizing LSD and hypnosis for mind control. Many of these programs were done domestically and on participants who were not informed of the study's purposes or that they would be given drugs. Self-hypnosis Self-hypnosis happens when a person hypnotises oneself, commonly involving the use of autosuggestion. The technique is often used to increase motivation for a diet, to quit smoking, or to reduce stress. People who practise", "-28.13325499097118" ], [ "the use of \"waking suggestion\" and self-hypnosis. Subsequently, Hippolyte Bernheim shifted the emphasis from the physical state of hypnosis on to the psychological process of verbal suggestion:\nI define hypnotism as the induction of a peculiar psychical [i.e., mental] condition which increases the susceptibility to suggestion. Often, it is true, the [hypnotic] sleep that may be induced facilitates suggestion, but it is not the necessary preliminary. It is suggestion that rules hypnotism.\nBernheim's conception of the primacy of verbal suggestion in hypnotism dominated the subject throughout the 20th century, leading some authorities to declare him the father of modern hypnotism.\nContemporary hypnotism uses", "-28.113901638542302" ], [ "and be hypnotised by an eclectic selection of experimental works.", "-28.062904723978136" ], [ "to finding if there is a true link between subvocalization and hallucinations, but it is very difficult to see this connection because not many patients experience hallucinations.", "-28.041775660858548" ], [ "hypnotizability of any clinical group, followed by those with posttraumatic stress disorder.", "-28.026117310568225" ], [ "Theodore Sarbin. Sarbin argued that hypnotic responses were motivated attempts to fulfill the socially constructed roles of hypnotic subjects. This has led to the misconception that hypnotic subjects are simply \"faking\". However, Sarbin emphasised the difference between faking, in which there is little subjective identification with the role in question, and role-taking, in which the subject not only acts externally in accord with the role but also subjectively identifies with it to some degree, acting, thinking, and feeling \"as if\" they are hypnotised. Sarbin drew analogies between role-taking in hypnosis and role-taking in other areas such as method acting, mental", "-28.00267488832469" ], [ "susceptibility as \"high\", \"medium\", or \"low\". Approximately 80% of the population are medium, 10% are high, and 10% are low. There is some controversy as to whether this is distributed on a \"normal\" bell-shaped curve or whether it is bi-modal with a small \"blip\" of people at the high end. Hypnotizability Scores are highly stable over a person's lifetime. Research by Deirdre Barrett has found that there are two distinct types of highly susceptible subjects, which she terms fantasizers and dissociaters. Fantasizers score high on absorption scales, find it easy to block out real-world stimuli without hypnosis, spend much time", "-27.98575651535066" ], [ "Dissociative Dissociatives are a class of hallucinogen which distort perceptions of sight and sound and produce feelings of detachment – dissociation – from the environment and self. This is done through reducing or blocking signals to the conscious mind from other parts of the brain. Although many kinds of drugs are capable of such action, dissociatives are unique in that they do so in such a way that they produce hallucinogenic effects, which may include sensory deprivation, dissociation, hallucinations, and dream-like states or trances. Some, which are nonselective in action and affect the dopamine and/or opioid systems, may be", "-27.898372434356133" ], [ "used to re-experience drug states and mystical experiences. Self-hypnosis is popularly used to quit smoking, alleviate stress and anxiety, promote weight loss, and induce sleep hypnosis. Stage hypnosis can persuade people to perform unusual public feats.\nSome people have drawn analogies between certain aspects of hypnotism and areas such as crowd psychology, religious hysteria, and ritual trances in preliterate tribal cultures. Irritable bowel syndrome Hypnotherapy has been studied for the treatment of irritable bowel syndrome. Hypnosis for IBS has received moderate support in the National Institute for Health and Clinical Excellence guidance published for UK health services. It has been used", "-27.67010843276512" ], [ "later work, Observations on Trance or Human Hybernation (1850), Braid provides probably the first account of self-hypnosis by someone using hypnotism upon themselves:\nBraid's Account of Self-Hypnotism\nIt is commonly said that seeing is believing, but feeling is the very truth. I shall, therefore, give the result of my experience of hypnotism in my own person. In the middle of September, 1844, I suffered from a most severe attack of rheumatism, implicating the left side of the neck and chest, and the left arm. At first the pain was moderately severe, and I took some medicine to remove it; but, instead of", "-27.619060313678347" ], [ "of stage hypnosis are probably due to a combination of psychological factors, participant selection, suggestibility, physical manipulation, stagecraft, and trickery. The desire to be the centre of attention, having an excuse to violate their own fear suppressors, and the pressure to please are thought to convince subjects to \"play along\". Books by stage hypnotists sometimes explicitly describe the use of deception in their acts; for example, Ormond McGill's New Encyclopedia of Stage Hypnosis describes an entire \"fake hypnosis\" act that depends upon the use of private whispers throughout. Music hypnosis The idea of music as hypnosis developed from the work", "-27.569109744974412" ], [ "to him as an \"advanced thinker\" with a \"high and noble character\". She later disavowed the hypnotic aspect of Quimby's methods. In Science and Health with Key to the Scriptures, she calls hypnotism mere deception practiced by those who aim to control the patient: \"The Christian Scientist demonstrates that divine Mind heals, while the hypnotist dispossesses the patient of his individuality in order to control him.\" Fall in Lynn On February 1, 1866, Eddy slipped and fell on ice while walking in Lynn, Massachusetts, causing a spinal injury:\nOn the third day thereafter, I called for my Bible, and opened it", "-27.534397567273118" ], [ "tested by asking the individuals about esoteric knowledge that they learned during hypnosis. These individuals typically have no recall of the hypnotic experience whatsoever however, when tested on these obscure pieces of knowledge they are able to supply the correct answer; thus demonstrating they have source amnesia – they are able to recall the knowledge but they lack the capacity to indicate the context in which they learned this knowledge. In fact, the subjects often attribute their knowledge of the obscure facts to learning experiences other than during hypnosis (e.g.: \"I read it somewhere,\" \"Somebody must have told me,\" etc.).", "-27.381367412977852" ], [ "the transmission of a magnetic or occult influence from my body into that of my patients; nor do I profess, by my processes, to produce the higher [i.e., supernatural] phenomena of the Mesmerists. My pretensions are of a much more humble character, and are all consistent with generally admitted principles in physiological and psychological science. Hypnotism might therefore not inaptly be designated, Rational Mesmerism, in contra-distinction to the Transcendental Mesmerism of the Mesmerists.\nDespite briefly toying with the name \"rational Mesmerism\", Braid ultimately chose to emphasise the unique aspects of his approach, carrying out informal experiments throughout his career in order", "-27.34905065241037" ], [ "to solving the mind–body problem can be removed if we allow that it is possible for one person to directly experience the conscious mind of another. The vast majority of philosophers and scientists writing about consciousness believe that this is impossible, but this would mean that conscious brain states are different from all other physical states, which can be known about by multiple persons. This creates a block to understanding our minds as physical systems. Hirstein describes how \"mindmelding\" could be achieved by connecting person A's prefrontal lobes to person B's posterior cortex, which would in effect connect person A's", "-27.299319334146276" ], [ "based upon his working methods. Indirect techniques Where classical hypnosis is authoritative and direct and often encounters resistance in the subject, Erickson's approach is permissive, accommodating and indirect. For example, where a classical hypnotist might say \"You are going into a trance\", an Ericksonian hypnotist would be more likely to say \"you can comfortably learn how to go into a trance\". In this way, he provides an opportunity for the subject to accept the suggestions they are most comfortable with, at their own pace, and with an awareness of the benefits. The subject knows they are not being hustled and", "-27.28285777149722" ], [ "again. The patient also has a strange, almost sexual, obsession with the hypnotist.\nJanet was not only a hypnotist. He would engage the patient, talk to him, address the “sick” forces within him, and attempt to use hypnosis to contact the unconscious. Like exorcism, hypnosis also attacked the unconscious.\nExperts now refer to Janet’s approach as the cathartic method. In A Critical Dictionary of Psychoanalysis, Charles Rycroft said that abreaction was the term applied to the expression of affect, with the subsequent alleviation of symptoms being the catharsis.\nLater, Sigmund Freud and his followers deemed the cathartic cure to be unsuccessful because it", "-27.28241919996799" ], [ "Suggestion Trance and suggestion Modern scientific study of hypnosis, which follows the pattern of Hull's work, separates two essential factors: \"trance\" and suggestion. The state of mind induced by \"trance\" is said to come about via the process of a hypnotic induction—essentially instructing and suggesting to the subject that they will enter a hypnotic state. Once a subject enters hypnosis, the hypnotist gives suggestions that can produce sought effects. Commonly used suggestions on measures of \"suggestibility\" or \"susceptibility\" (or for those with a different theoretical orientation, \"hypnotic talent\") include suggestions that one's arm is getting lighter and floating up in", "-27.27403650386259" ], [ "the simple cliche of their usage would be distracting rather than focusing. Debates Hypnotic induction may be defined as whatever is necessary to get a person into the state of trance — i.e., when understood as a state of increased suggestibility, during which critical faculties are reduced, and subjects are more prone to accept the hypnotist's commands and suggestions. Evidence of changes in brain activity and mental processes have also been associated experimentally with hypnotic inductions.\nTheodore X. Barber argued that techniques of hypnotic induction were merely empty-but-popularly-expected rituals, inessential for hypnosis to occur: hypnosis on this view is a process", "-27.27156744230888" ], [ "characteristics of narratives retrieved during hypnotic recall. This influence tends to influence recovered abduction narratives in ways that reinforces the preconceived biases of the individual researcher.\nThe hypnotized subject's existing beliefs may also lead them to create an alien abduction story under hypnosis; hypnotised individuals tend to believe thoughts, images, or ideas they have while under hypnosis originate from personal experience rather than other sources, such as the therapist's suggestions. This can explain Budd Hopkins' observation that patients came to believe they had been abducted even though their hypnotist was skeptical of the abduction phenomenon. Thomas E. Bullard said the presence", "-27.222653546516085" ], [ "to explore an approach, which would avoid undesirable implications of hypnotherapy (e.g., the passivity of the individual and dependency on the therapist). When he was investigating hallucinations in healthy persons, he found that a majority of the subjects reported having two types of experienced sensation: heaviness in the extremities and feeling of warmth. Schultz wanted to understand whether simply imagining a state of heaviness and warmth in one's limbs could induce a state similar to hypnosis. Based on this idea he developed six basic exercises.\nAutogenic training was popularized in North America and the English-speaking world by Wolfgang Luthe, who co-authored,", "-27.220875708240783" ], [ "them as external). In addition, individuals with psychosis are much less susceptible to hypnosis than those with DID. Difficulties in differential diagnosis are increased in children.\nDID must be distinguished from, or determined if comorbid with, a variety of disorders including mood disorders, psychosis, anxiety disorders, PTSD, personality disorders, cognitive disorders, neurological disorders, epilepsy, somatoform disorder, factitious disorder, malingering, other dissociative disorders, and trance states. An additional aspect of the controversy of diagnosis is that there are many forms of dissociation and memory lapses, which can be common in both stressful and nonstressful situations and can be attributed to much less", "-27.2091624684399" ], [ "of hypnosis that were based on dissociation. He proposed a three-dimensional description of hypnosis. He theorized that there are three distinct subtypes of good hypnotic subjects: the fantasy prone, the amnesia-prone, and the highly motivated positively set subjects. Other Interests Although hypnosis was the main focus of Barber’s research, his other interests included investigator bias, psychical phenomena, and comparative psychology, as reflected in his book The Human Nature of Birds (1993). His later unpublished work focused on the mind–body problem and is purported to advance a type of panpsychism. \nThe results of this final project, to be published posthumously, argues", "-27.185627977058175" ], [ "to flee, the hypnotizers simply cause pain to the original body, still alive in a vat of fluid, and he is immediately recalled. That's a BODY IN PAWN. It's a second body you may have, living somewhere else, right in present time. But the second body is not under YOUR direct control.\n(Source magazine #105, pg.39, 1997; see also Hubbard, Research and Discovery Series vol. 10)\nThey can apparently cause major problems for people undergoing medical operations, as \"pain, an anaesthetic or a serious accident cause him to change to the other area with a shocking impact on the other body. The", "-27.110731994034722" ], [ "the muscles involved, albeit in a very small degree. Braid extended Carpenter's theory to encompass the observation that a wide variety of bodily responses besides muscular movement can be thus affected, for example, the idea of sucking a lemon can automatically stimulate salivation, a secretory response. Braid, therefore, adopted the term \"ideo-dynamic\", meaning \"by the power of an idea\", to explain a broad range of \"psycho-physiological\" (mind–body) phenomena. Braid coined the term \"mono-ideodynamic\" to refer to the theory that hypnotism operates by concentrating attention on a single idea in order to amplify the ideo-dynamic reflex response. Variations of the basic", "-27.044701223996526" ], [ "because of the intense suggestions given by the trusted therapist. Suggestions can stir up memories from movies, stories, magazines, and many other of the innumerable stimuli one sees throughout their life. Hypnosis is a more relaxed, aware state where subjects can bypass a lot of the conscious doubts and mind chatter and be aware of what comes up from the unconscious.\nIn the United States many mental health workers rely on hypnosis to retrieve memories. Previous research concludes that with the active conscious mind consistently taking up one's mental capacity, hypnosis provides the calmness to retrieve what's needed. Psychoanalytic therapy Psychoanalytic", "-27.007876537798438" ], [ "as far as to say that hypnosis is the opposite of sleep, because he found that hypnosis gave responses linked to alertness rather than lethargy. In Hull's research, some of his subjects even felt that hypnotism made their sensitivity and alertness better. In fact, many of Hull's subjects in hypnotic states did believe that their senses had increased. They genuinely thought their senses were better, but this was never proven to be a significant result. The main question of Hull's study was to examine the veracity of the apparently extravagant claims of hypnotists, especially regarding extraordinary improvements", "-26.993720407423098" ], [ "experiences; abductees are more likely to accept suggestions of a hypnotist as true, are prone to becoming fully engrossed in their imaginations and fantasies, are more likely to believe in unusual phenomena, and experience more alterations in consciousness, such as spacing out. False memory hypothesis This is one of the most widely accepted theories in the scientific community. It involves an explanation, using psychological theory and research, of ways psychologically healthy individuals may come to believe they have been abducted and ways they maintain that belief. False memory involves several steps or series of events, not all of which are", "-26.993372101685964" ], [ "an \"autosuggestion\") might be taught to the subject for them to repeat to themselves when in self-hypnosis.\nIn addition, since stress prevents well-functioning of the immune system, researchers from the Ohio State University came to a conclusion that self hypnosis to prevent stress can also help in protecting the immune system against the negative effects of it. They proved this by showing that students who performed self-hypnosis during stressful exam weeks showed a stronger immune system when compared to those who did not learn self-hypnosis. Other uses Self-directed thought which is based in hypnosis can be used for many other issues", "-26.98167127170018" ], [ "and medical fields, as it is considered ambiguous; the term nonpsychotic hallucination is preferred. Pseudohallucinations, then, are more likely to happen with a hallucinogenic drug. But \"the current understanding of pseudohallucinations is mostly based on the work of Karl Jaspers\".\nA further distinction is sometimes made between pseudohallucinations and parahallucinations, the latter being a result of damage to the peripheral nervous system.\nThey are considered a possible symptom of conversion disorder in DSM-IV (2000). In DSM-5 (2013), this definition has been removed. Also, pseudohallucinations can occur in people with visual/hearing loss, with the typical such type being Charles Bonnet syndrome.", "-26.945589734910754" ], [ "example, he can make himself look and sound like a different person, or look and feel like a wall, or even seem invisible. For this to work, these people have to be within a range of his powers. With artificial aids, Mastermind can cause only one person among many who are present to see his illusions. He is even capable of affecting telepaths as powerful as Professor Xavier and Jean Grey, although to manipulate Dark Phoenix he required an amplifying device called a \"mind-tap mechanism\" provided by the White Queen that enabled him to project illusions directly into the entity's", "-26.86621468589874" ], [ "is. Another example would be thought broadcast, which is when a patient believes that everyone can hear their thoughts. These positive symptoms sometimes are so severe to where the schizophrenic believes that something is crawling on them or smelling something that is not there in reality. These strong hallucinations are intense and difficult to convince the patient that they do not exist outside of their cognitive beliefs, making it extremely difficult for a patient to understand and become self-aware that what they are experiencing is in fact not there.\nFurthermore, a study by Bedford and Davis (2013) was conducted to look", "-26.837650979985483" ], [ "hallucinations could show the result of over-activation of the muscles in the larynx. Using an electromyography to record muscle movement, individuals experiencing hallucinations showed greater muscle activation before these hallucinations occurred. Unfortunately, this muscle activation is not easily detected which means the muscle movement must be measured on a wider range.\nThough a wider range is needed to detect the muscle movement, it is still considered as subvocalization. Much more research is needed to link subvocalization with hallucination but many schizophrenics report \"hearing voices\" (as hallucinations) coming from their throat. This small fact could be a clue", "-26.738539156147453" ], [ "The skilled hypnotherapist constructs these gaps of meaning in a way most suited to the individual subject - in a way which is most likely to produce the desired change.\nFor example, the authoritative \"You will stop smoking\" is likely to find less leverage on the unconscious level than \"You can become a non-smoker\". The first is a direct command, to be obeyed or ignored (and notice that it draws attention to the act of smoking); the second is an opening, an invitation to possible lasting change, without pressure, and is less likely to raise resistance.\nRichard Bandler and John Grinder identified", "-26.682528711215127" ], [ "may not carry as strong a relationship with other hypnotic scales as originally thought. More recent research has found significant correlations with absorption scales, and dissociative experiences. Other scales Many other tests are not widely used because they are usually seen as less reliable than the Stanford Scale and Harvard Group Scale. Many professionals think that these tests produce results because they involve attentional control and a certain level of concentration is required to be hypnotized.\nConversely, concentration can be something induced through the use of hypnosis instead of a \"fuel\" used to get hypnosis running. Susceptibility Individuals of extremely", "-26.652413859177614" ], [ "of the applied psychotherapy outweighed the need for deep hypnosis in many cases. Hypnotic depth was to be pursued for research purposes. Applications There are numerous applications for hypnosis across multiple fields of interest, including medical/psychotherapeutic uses, military uses, self-improvement, and entertainment. The American Medical Association currently has no official stance on the medical use of hypnosis. However, a study published in 1958 by the Council on Mental Health of the American Medical Association documented the efficacy of hypnosis in clinical settings.\nHypnosis has been used as a supplemental approach to cognitive behavioral therapy since as early as 1949. Hypnosis was", "-26.648856318119215" ], [ "unclear. They may indicate that suggestions genuinely produce changes in perception or experience that are not simply a result of imagination. However, in normal circumstances without hypnosis, the brain regions associated with motion detection are activated both when motion is seen and when motion is imagined, without any changes in the subjects' perception or experience. This may therefore indicate that highly suggestible hypnotic subjects are simply activating to a greater extent the areas of the brain used in imagination, without real perceptual changes. It is, however, premature to claim that hypnosis and meditation are mediated by similar brain systems and", "-26.635584331990685" ], [ "which activates a recovered deep structure of meaning that is directly relevant to the listener.\nIn other words, this process builds most likely unconscious states within the listener, and then associates those states through covert conditioning, also known as covert anchoring, thereby forming unconsciously controlled behaviors and thoughts. Often methods of tricking the listener to believe that the hypnotist is talking about something else other than the subject are employed, for instance, by shifting use of time and use of identity in language. One famous example is employed by Milton H. Erickson \"and a tomato can be happy\". An example A", "-26.62803377909586" ], [ "religious and paranormal topics conducted by phone and mail-in questionnaire polled 1,721 Americans on their belief in telekinesis. Of these participants, 28% of male participants and 31% of female participants selected \"agree\" or \"strongly agree\" with the statement, \"It is possible to influence the world through the mind alone.\" Subsets of psychokinesis Parapsychologists divide psychokinetic phenomena into two categories: macro-psychokinesis – large-scale psychokinetic effects that can be seen with the naked eye, and micro-psychokinesis – small-scale psychokinetic effects that require the use of statistics to be detected. Some phenomena – such as apports, levitation, materialization, psychic healing, pyrokinesis, retrocausality, telekinesis,", "-26.62720284500392" ], [ "of hypnotherapy done by a hypnotherapist. Each individual session focuses on controlling the pain and relaxing the mind. The number of hypnotherapy sessions varies according to the patient and their susceptibility to hypnosis. Generally, the patient would be ready for hypnosurgery after 6 weeks of training. Post-operative hypnosis Hypnosis may also be helpful post-surgery in helping to facilitate faster healing in patients, with one study reporting faster tissue healing in patients who use hypnosis during surgical recovery. Several other studies have shown a psychological link with healing and recovery. In a study of patients up to seven weeks after undergoing", "-26.581537415462662" ], [ "It is precisely this posture of Freud's that the consciousness is \"dominated\" that was put into question by Borch-Jacobsen.\nBertrand Méheust rebuked Borch-Jacobsen for accepting without further discussion a dated view of hypnotherapy, bequeathed by the positivist institutional medicine of the 19th century. Furthermore, he argues that hypnosis follows a state of absolute passivity and therefore hurts well-being, and that hypnosis is induced in someone in which all consciousness is disconnected, a being totally immersed in the inner self, indeed a puppet who thinks and lives totally by the workings of another. He takes sides with Armand Marie Jacques de Chastenet", "-26.56522987858625" ], [ "by some alienists in the Victorian era, to treat the condition then known as hysteria.\nModern hypnotherapy is widely accepted for the treatment of certain habit disorders, to control irrational fears, as well as in the treatment of conditions such as insomnia and addiction. Hypnosis has also been used to enhance recovery from non-psychological conditions such as after surgical procedures, in breast cancer care and even with gastro-intestinal problems, including IBS. Efficacy A 2003 meta-analysis on the efficacy of hypnotherapy concluded that \"the efficacy of hypnosis is not verified for a considerable part of the spectrum of psychotherapeutic practice.\"\nIn 2005, a", "-26.55027365044225" ], [ "on the observations of those doctors. Antipsychotic and atypical antipsychotic medication may also be utilized to treat the illness if the symptoms are severe and cause significant distress. For other causes of hallucinations there is no factual evidence to support any one treatment is scientifically tested and proven. However, abstaining from hallucinogenic drugs, stimulant drugs, managing stress levels, living healthily, and getting plenty of sleep can help reduce the prevalence of hallucinations. In all cases of hallucinations, medical attention should be sought out and informed of one's specific symptoms.", "-26.54664369445527" ], [ "waxy catalepsy, sometimes accompanied by spontaneous anesthesia, is seen as an indicator of hypnotic trance . Suggested or induced rigid catalepsy, of extended limbs or even the entire body, sometimes tested with heavy weights, has been a staple of stage hypnosis shows and even academic demonstrations of hypnotism since the late 18th Century, as proof of extraordinary physical abilities possible in trance states. Such demonstrations have also been performed by Asian martial artists to prove the presence of \"ki\" or \"chi\" power, a kind of psychological or spiritual resource. Historical cases St. Teresa of Avila experienced a prolonged bout", "-26.54522754403297" ], [ "his diamond cutting business to start a new company, the Institute of Hypnosis. Lessons in hypnotism During his early years in Brighton, Masters saw a stage hypnosis presentation where the hypnotist easily induced volunteer subjects to do strange and outlandish things. Masters remembered pondering the question: \"Why can't hypnotism be used to make people act sensibly, rather than foolishly?\"\nUpon further exploration of hypnotism in the 1950s, Masters repudiated hypnotherapy, but he soon opened the Institute of Hypnosis in Houston. There, he saw as many as thirty clients a day for consultation, where he says he \"unhypnotised\" them instead of hypnotizing", "-26.493408517781063" ], [ "takes full ownership of, and participates in, their transformation. Because the induction takes place during the course of a normal conversation, Ericksonian hypnosis is often known as Covert or Conversational Hypnosis.\nErickson maintained that it was not possible consciously to instruct the unconscious mind, and that authoritarian suggestions were likely to be met with resistance. The unconscious mind responds to openings, opportunities, metaphors, symbols, and contradictions. Effective hypnotic suggestion, then, should be \"artfully vague\", leaving space for the subject to fill in the gaps with their own unconscious understandings - even if they do not consciously grasp what is happening.", "-26.45231908268761" ], [ "poor judgment, memory loss, and a decrease in motor coordination. Potential causes of brain hypoxia are suffocation, carbon monoxide poisoning, severe anemia, and use of drugs such as cocaine and other amphetamines. Other causes associated with brain hypoxia include drowning, strangling, choking, cardiac arrest, head trauma, and complications during general anesthesia. Treatment strategies for brain hypoxia vary depending on the original cause of injury, primary and/or secondary.", "-26.450748171133455" ], [ "Some practitioners have claimed hypnosis might help boost the immune system of people with cancer. However, according to the American Cancer Society, \"available scientific evidence does not support the idea that hypnosis can influence the development or progression of cancer.\"\nHypnosis has been used as a pain relieving technique during dental surgery and related pain management regimens as well. Researchers like Jerjes and his team have reported that hypnosis can help even those patients who have acute to severe orodental pain. Additionally, Meyerson and Uziel have suggested that hypnotic methods have been found to be highly fruitful for alleviating anxiety in", "-26.439308549277484" ], [ "crude forms of brain-computer interface. Indications Neuroimaging follows a neurological examination in which a physician has found cause to more deeply investigate a patient who has or may have a neurological disorder.\nOne of the more common neurological problems which a person may experience is simple syncope. In cases of simple syncope in which the patient's history does not suggest other neurological symptoms, the diagnosis includes a neurological examination but routine neurological imaging is not indicated because the likelihood of finding a cause in the central nervous system is extremely low and the patient is unlikely to benefit from the procedure.\nNeuroimaging", "-26.387864365882706" ], [ "defined in relation to classical conditioning; where the words of the therapist were the stimuli and the hypnosis would be the conditioned response. Some traditional cognitive behavioral therapy methods were based in classical conditioning. It would include inducing a relaxed state and introducing a feared stimuli. One way of inducing the relaxed state was through hypnosis.\nHypnotism has also been used in forensics, sports, education, physical therapy, and rehabilitation. Hypnotism has also been employed by artists for creative purposes, most notably the surrealist circle of André Breton who employed hypnosis, automatic writing, and sketches for creative purposes. Hypnotic methods have been", "-26.35394492535852" ], [ "questions he was asked while in his trance state. The hypnotist was keen to discover if anybody else was able to hear. He quietly said to the student, Perhaps there is some part of you that is hearing my voice and processing the information. If there is, I should like the index finger of your right hand to rise as a sign that this is the case(Hilgard, 1977, p. 186). The finger rose. At this, the student requested that he be brought out of the hypnotically-induced period of deafness. On beingawakened, the student said that he had requested to come out", "-26.285116678514896" ], [ "neural mechanisms.\nAnother study has demonstrated that a colour hallucination suggestion given to subjects in hypnosis activated colour-processing regions of the occipital cortex. A 2004 review of research examining the EEG laboratory work in this area concludes:\nHypnosis is not a unitary state and therefore should show different patterns of EEG activity depending upon the task being experienced. In our evaluation of the literature, enhanced theta is observed during hypnosis when there is task performance or concentrative hypnosis, but not when the highly hypnotizable individuals are passively relaxed, somewhat sleepy and/or more diffuse in their attention.\nStudies have shown an association of hypnosis", "-26.274527303154173" ], [ "fantasies and memories, away from the negative aspects of their current reality. Self-hypnosis and stress Patients who are stressed and/or lack self-esteem can be taught self-hypnosis techniques which can induce relaxation and/or strengthen their self-esteem. Specifically, once the patient is in a self-hypnotic state the therapist can communicate messages to the patient, allowing the relaxation and strengthening process to occur.\nOften, when teaching self-hypnosis, a subject is taught a specific \"trigger word\" (that will only induce self-hypnosis when the subject deliberately uses the word to hypnotize themselves) to facilitate the rapid induction of the hypnotic state. Also, a phrase (often termed", "-26.238099902227987" ], [ "fixation\" fatigued certain parts of the brain and caused a trance—a \"nervous sleep\" or \"neuro-hypnosis.\"\nLater Braid simplified the name to \"hypnotism\" (from the Greek ὕπνος hypnos, \"sleep\"). Finally, realizing that \"hypnotism\" was not a kind of sleep, he sought to change the name to \"monoideism\" (\"single-thought-ism\"), based on a view centred on the notion of a single, dominant idea; but the term \"hypnotism\" and its later, misleading (circa 1885) Nancy-centred derivative \"hypnosis,\" have persisted.\nBraid is credited with writing the first ever book on hypnotism, Neurypnology (1843). After Braid's death in 1860, interest in hypnotism temporarily waned, and gradually shifted", "-26.221598978270777" ], [ "take place, in every other function of the body, as well as in the muscles of voluntary motion. — Braid, (1855), footnote at p.10. Death Braid maintained an active interest in hypnotism until his death.\n\"I consider the hypnotic mode of treating certain disorders is a most important ascertained fact, and a real solid addition to practical therapeutics, for there is a variety of cases in which it is really most successful, and to which it is most particularly adapted; and those are the very cases in which ordinary medical means are least successful, or altogether unavailing. Still, I repudiate the", "-26.21993283496704" ], [ "White wrote: \"It can be safely stated that nine out of ten hypnotic techniques call for reclining posture, muscular relaxation, and optical fixation followed by eye closure.\" Suggestion When James Braid first described hypnotism, he did not use the term \"suggestion\" but referred instead to the act of focusing the conscious mind of the subject upon a single dominant idea. Braid's main therapeutic strategy involved stimulating or reducing physiological functioning in different regions of the body. In his later works, however, Braid placed increasing emphasis upon the use of a variety of different verbal and non-verbal forms of suggestion, including", "-26.212954214424826" ] ]
2v54o2
Do old psychology experiments need to be performed again in the modern day or are their results still just a valid now as they were then, even with progress in the field?
[ "This seems like a very valid point, but psychologists study the same thing for a very long time, doing research and attempting to refine a singular truth about aspects of society and the psyche. Because they're always doing this our understanding gets updated and refined anyway, incorporating the changes we undergo as a culture. But variations of these old experiments could only help the process, so I think yes.", "I'd imagine most can't because of how unethical things were", "Basically, many experiments and studies are repeated to make sure the results are still valid. However, many of the studies actually are since the way humans think never really changes. We just adapt to our environment which kinda brings up the next point of different fields in psychology. Many studies in the behavioural approach are never replicated because socio cultural aspect are thought to not impact on them.", "An experiment is always valid unto itself. If I say I took 30 random people, asked them where the rain comes from, and 29 of them said the rain demon in the sky, that's a valid experiment. Unless you think I'm lying about the results, that's a factual accounting of how the experiment happened. 29/30 people *did* say the rain demon in the sky. It's the conclusions that might not be valid. If you find that 'random people' meant, the local rain demon cult, you might question whether that's a fair sample. You might decide to perform a *similar* experiment, but fundamentally different by asking 30 people chosen at random from the phone book instead. You might also question whether asking people where the rain comes from is a valid way to actually determine where the rain comes from. You might think the experiment should not be used to come to that conclusion. But if you feel that my results were faithfully recorded, the experiment still has merit. Maybe you want to know how many people in rain demon cults report that rain comes from the rain demon, for example. But if the method and results are re order faithfully and detailed, the experiment will always have some merit. It just depends on what kind of merit exactly." ]
[ [ "experiment's result should be considered evidence of absence, or if it remains absence of evidence. The debate is whether the experiment would have detected the phenomenon of interest if it was there.\nThe argument from ignorance for \"absence of evidence\" isn't necessarily fallacious, for example, that a potentially life saving new drug poses no long term health risk unless proved otherwise. On the other hand, were such an argument to rely imprudently on the lack of research to promote its conclusion, it would be considered an informal fallacy whereas the former can be a persuasive way to shift the burden of", "-29.11895766638918" ], [ "2). Because one cannot rewind history and replay events after making small controlled changes, causation can only be inferred, never exactly known. This is referred to as the Fundamental Problem of Causal Inference – it is impossible to directly observe causal effects.\nA major goal of scientific experiments and statistical methods is to approximate as best possible the counterfactual state of the world. For example, one could run an experiment on identical twins who were known to consistently get the same grades on their tests. One twin is sent to study for six hours while the other is sent to the amusement", "-28.43644373922143" ], [ "but that they deliberated about it, and that experiment and use then let them know if they had reasoned justly or not. It mattered little, they said, that people declared that the greater number of remedies had been the subject of experiment from the first, provided they confessed that these experiments were the results of the reasoning of those who tried the remedies. They went on to say, that we often see new sorts of diseases break out, for which neither experiment nor custom has yet found out any cure; and that, therefore, it is necessary to observe where they", "-28.158881183713675" ], [ "experimenter during psychical research experiments. Ralph W. Gerard gave the book a positive review but stated the results from the experiments may be explainable by alternative factors such as misinterpretation or unintended cues without recourse to the paranormal.\nPsychologist L. Börje Löfgren heavily criticized Challenge of Psychical Research stating that Murphy hardly ever considered the \"possibility that spontaneous occurrences might actually be memory falsifications (conscious or unconscious), simple lies, or similar phenomena.\" He concluded his review by suggesting the book is \"especially apt to do much damage and seduce people into believing in things for which there is extremely scant evidence.\"", "-27.63593022164423" ], [ "to change may prove to be difficult. Experimentalists have the ability to create certain tasks that elicit the dependent variable. Laboratory experiments Laboratory experiments are the most common form of experimentation. Here the idea is to construct a highly controlled setting in a laboratory. The use of lab experiments increased due to growing interest in issues such as economic cooperation, trust, and neuroeconomics. In this type of experiments, treatment is assigned randomly to a group of individuals in order to compare their economic actions and behavior to an untreated control group within the artificial laboratory environment. The ability to control", "-27.51536287635099" ], [ "confirmed the effects they were looking for, and concluded that the odds of this happening (a positive result) was around five times higher than in fields such as space- or geosciences. Fanelli argues that this is because researchers in \"softer\" sciences have fewer constraints to their conscious and unconscious biases. Replication Over the subsequent few years, a replication crisis in psychology was identified, where it was publicly noted that many notable findings in the field had not been replicated and with some researchers being accused of outright fraud in their results. More systematic efforts to assess the extent of the", "-27.468668249435723" ], [ "of the others, it would be inappropriate and irresponsible to disseminate information on all of the models\".\nOf course, it would have been ideal to have the kind of conclusiveness associated with laboratory experiments when we conduct social experiments in communities and schools. Andy B. Anderson (1975) wrote that \"the idea of a controlled experiment has long been recognized as a goal worth pursuing in the social and behavioral sciences for the same obvious reason that made this mode of inquiry the predominant research strategy of the natural and physical sciences: the controlled experiment permits the most unequivocal assessment of a", "-27.10043839984428" ], [ "provides a good rival hypotheses. Instrument change (instrumentality) The instrument used during the testing process can change the experiment. This also refers to observers being more concentrated or primed, or having unconsciously changed the criteria they use to make judgments. This can also be an issue with self-report measures given at different times. In this case the impact may be mitigated through the use of retrospective pretesting. If any instrumentation changes occur, the internal validity of the main conclusion is affected, as alternative explanations are readily available. Regression toward the mean This type of error occurs when subjects are selected", "-26.92735679067846" ], [ "Experiments are useful in social psychology because they are high in internal validity, meaning that they are free from the influence of confounding or extraneous variables, and so are more likely to accurately indicate a causal relationship. However, the small samples used in controlled experiments are typically low in external validity, or the degree to which the results can be generalized to the larger population. There is usually a trade-off between experimental control (internal validity) and being able to generalize to the population (external validity).\nBecause it is usually impossible to test everyone, research tends to be conducted on a sample", "-26.817134054144844" ], [ "In other words, it is conceivable that replicating the experiment using a diverse group of people (with different objectives and views in life) would have produced radically distinct results.\nResearchers from Western Kentucky University argued that selection bias may have played a role in the results. The researchers recruited students for a study using an advertisement similar to the one used in the Stanford Prison Experiment, with some ads saying \"a psychological study\" (the control group), and some with the words \"prison life\" as originally worded in Dr. Zimbardo's experiment. It was found that students who responded to the classified advertisement", "-26.707481353194453" ], [ "and make accurate predictions in a wide range of circumstances – are often called scientific theories.\nMost experimental results do not produce large changes in human understanding; improvements in theoretical scientific understanding typically result from a gradual process of development over time, sometimes across different domains of science. Scientific models vary in the extent to which they have been experimentally tested and for how long, and in their acceptance in the scientific community. In general, explanations become accepted over time as evidence accumulates on a given topic, and the explanation in question proves more powerful than its alternatives at explaining the", "-26.670970761333592" ], [ "their empirical observations.\n\nTaken together, such experiments lead to a surprising conclusion:\n\"Even when we deal with ideologically neutral conceptions of reality, when these conceptions have been recently acquired, when they came to us from unfamiliar sources, when they were assimilated for spurious reasons, when their abandonment entails little tangible risks or costs, and when they are sharply contradicted by subsequent events, we are, at least for a time, disinclined to doubt such conceptions on the verbal level and unlikely to let go of them in practice.\" In cultural innovations Physicist Max Planck wrote that \"the new scientific truth does not triumph", "-26.614629723713733" ], [ "general science is reached. ... But in the cases in which an experiment has not been completed, because of its not having been repeated in such a way that the persons, the time and the circumstances varied in everything that did not cause the determining cause, whereas this cause [remained invariable], the experiment does not prove certain knowledge, but only probably opinion. Motion Al-Baghdadi was a follower of the scientific and philosophical teachings of Ibn Sina. According to Alistair Cameron Crombie, al-Baghdadi\nproposed an explanation of the acceleration of falling bodies by the accumulation of successive increments of power with successive", "-26.590492335148156" ], [ "that any thinking person had to question how and why research and results based on animal models could safely be extrapolated to humans. Finally, she complained that animal experimentation was doubly cruel because of the unnecessary repetition of experiments to replicate or prove the same point, which in many cases she argued could have been arrived at by simple, common sense. These papers were widely distributed and copies could be found in libraries throughout the UK. Modern movement After sustained lobbying by animal welfare organisations and other interested parties, in 1983 the UK Government announced that it", "-26.495887770783156" ], [ "gave support to the self-enhancement motive rather than self-assessment of self-verification.\nThe fifth experiment carried out by Sedikides suggests that in the past experiments the possibility of self-assessing was less likely than self-verification or self-enhancement as the participants would not have been objective in their self-evaluation. For this experiment therefore the experimental group were asked to approach their reflections in an objective way, as if they were approaching their self-concept as a scientist, bringing each of their traits under scrutiny. Results of this study showed that those subjects who were asked to be objective in their assessment strove more for accuracy", "-26.489201147516724" ], [ "as the basic evidence of the truth of thought transference...\n...the whole of those alleged experiments were bogus, and originated in the honest desire of two youths to show how easily men of scientific mind and training could be deceived when seeking for evidence in support of a theory they were wishful to establish.\nThe experiments of Samuel Soal and K. M. Goldney of 1941–1943 (suggesting precognitive ability of a single participant) were long regarded as some of the best in the field because they relied upon independent checking and witnesses to prevent fraud. However, many years later, statistical evidence, uncovered and", "-26.465633357409388" ], [ "clinical psychology and developmental psychology, and a field closely related to psychology that has also been implicated is educational research.\nFocus on the replication crisis has led to other renewed efforts in the discipline to re-test important findings, and in response to concerns about publication bias and p-hacking, more than 140 psychology journals have adopted result-blind peer review where studies are accepted not on the basis of their findings and after the studies are completed, but before the studies are conducted and upon the basis of the methodological rigor of their experimental designs and the theoretical justifications for their statistical analysis", "-26.41801719344221" ], [ "of experiments could ever prove a scientific theory, but a single experiment could disprove one, science should be based on falsification. Whilst this forms a logical theory for science, it is in a sense \"timeless\" and does not necessarily reflect a view on how science should progress over time.\nAmong the most influential challengers of this approach was Thomas Kuhn, who argued instead that experimental data always provide some data which cannot fit completely into a theory, and that falsification alone did not result in scientific change or an undermining of scientific consensus. He proposed that scientific consensus worked in the", "-26.413045039982535" ], [ "helped to further the field of psychology, especially within the realm of psychology of learning. The information they provided us with is critical, however, many of the experiments they conducted were not ethical and could not be recreated in this day and age. The American Psychological Association has since been created and they created a code of conduct that ensures safety and privacy of experiment participants. Learning Theories Learning theories are attempts to better understand and explain learning processes. There are many ways to address learning. Three of the major theories are behaviorism, cognitive constructivism and social constructivism. Behaviorism Behaviorism", "-26.23465247126296" ], [ "example, in Carlsmith and Aronson (1963) participants were led to believe that a set of signals would reliably precede certain outcomes. To create the disconfirmation, after a few trials the experimenters paired a new outcome with a previous stimulus.\nWhen this is not possible, participants are sorted into groups or placed onto a graded scale according to their prior beliefs. Experimenters can do this as Festinger and his researchers did, i.e. join a cult and observe the impending disconfirmation, though this can also be achieved by pre-testing participants and grouping them based on their responses. These methods—covert/participant observation, pre-selection—are", "-26.201841513859108" ], [ "yet I knew that there were still discoveries to be made. I was thinking about the interesting experiments made by Nikolaus Harnoncourt and Gustav Leonhardt, although I knew we'd have to experiment in our own way. It was a huge challenge; playing period instruments wasn't as easy as it is today, and finding out their secrets was a difficult process. Nowadays an extraordinarily high technical level has been achieved and the upcoming generations don't have any of the problems we pioneers faced. We cleared the way.\nPinnock was at the forefront of the period performance movement and the revitalisation of the", "-26.18150759319542" ], [ "a broad scientific consensus that PK research, and parapsychology more generally, have not produced a reliable, repeatable demonstration.\nA panel commissioned in 1988 by the United States National Research Council to study paranormal claims concluded that \"despite a 130-year record of scientific research on such matters, our committee could find no scientific justification for the existence of phenomena such as extrasensory perception, mental telepathy or ‘mind over matter’ exercises... Evaluation of a large body of the best available evidence simply does not support the contention that these phenomena exist.\"\nIn 1984, the United States National Academy of Sciences, at the request of", "-26.17053851741366" ], [ "findings as \"an unexpected outcome\" that \"leaves social psychology in a difficult situation.\" Alternative interpretations In his book Irrational Exuberance, Yale finance professor Robert J. Shiller argues that other factors might be partially able to explain the Milgram Experiments:\n[People] have learned that when experts tell them something is all right, it probably is, even if it does not seem so. (In fact, the experimenter was indeed correct: it was all right to continue giving the \"shocks\"—even though most of the subjects did not suspect the reason.)\nIn a 2006 experiment, a computerized avatar was used in place of the learner", "-26.164956537279068" ], [ "students despite the university only allowing graduate students to participate. The legitimacy of their research was questioned because Leary and Alpert took psychedelics with the students during the experiments. Also, the selection of research participants was not random sampling. These concerns were then printed in The Harvard Crimson and the publicity that followed resulted in the end of the official experiments, an investigation by the Massachusetts Department of Public Health that was eventually dropped, and the firing of Leary and Alpert.\nAccording to Andrew Weil, Leary was fired for not giving his required lectures, while Alpert was fired for allegedly giving", "-26.028099203191232" ], [ "the first to conduct true psychological experiments that held validity. While most psychologists of the time conducted work from behind a desk, Weber was actively conducting experiments, manipulating only one variable at a time in order to gain more accurate results. This paved the way for the field of psychology as an experimental science and opened the way for the development of even more accurate and intense research methods. \nOne of Weber’s greatest influences was on Gustav Fechner. Weber was appointed the Dozent of Psychology at the University of Leipzig the same year that Fechner enrolled. ", "-25.99009738006862" ], [ "the principles and challenges concerning the planning and interpretation of studies involving people. Human subjects present experimenters with challenges not seen in other scientific experiments: they may fail to take the treatment, they may drop out of a study, and they may lie or misrepresent the outcome. In his book, Fleiss addressed these problems.\nFleiss also contributed chapters to more than two dozen books and authored or co-authored more than 200 statistical and scientific papers concerning the application of statistics in fields ranging from psychiatry and cardiology to dentistry. Recognition and awards Because of the high reputation he enjoyed in the", "-25.97358725464437" ], [ "experiments you ought to make in order best to determine the acceleration of gravity, or the value of the Ohm; but it will tell you how to proceed to form a plan of experimentation.\n[....] Unfortunately practice generally precedes theory, and it is the usual fate of mankind to get things done in some boggling way first, and find out afterward how they could have been done much more easily and perfectly.\nKirstine Smith proposed optimal designs for polynomial models in 1918. (Kirstine Smith had been a student of the Danish statistician Thorvald N. Thiele and was working with Karl Pearson in", "-25.944399043451995" ], [ "in importance following the 1979 publication of Laboratory Life: the Social Construction of Scientific Facts with co-author Steve Woolgar. In the book, the authors undertake an ethnographic study of a neuroendocrinology research laboratory at the Salk Institute. This early work argued that naïve descriptions of the scientific method, in which theories stand or fall on the outcome of a single experiment, are inconsistent with actual laboratory practice.\nIn the laboratory, Latour and Woolgar observed that a typical experiment produces only inconclusive data that is attributed to failure of the apparatus or experimental method, and that a large part of scientific", "-25.940844030468725" ], [ "experiment's conclusion in order to reveal any deceptions used and generally make sure that the participants are unharmed by the procedures. Today, most research in social psychology involves no more risk of harm than can be expected from routine psychological testing or normal daily activities. Adolescents Social Psychology plays a key role in a child's development. During this time, teens are faced with many issues and decisions that can impact a teen's social development. They are faced with self esteem issues, peer pressure, drugs, alcohol, tobacco, sex, social media and more. Psychologists today are not fully aware of the affect", "-25.925279315561056" ], [ "like biomedicine, psychology, and policy evaluation, controlled, randomized experiments remain the preferred method of evaluating treatments. Educational statisticians and some mathematics educators have been working to increase the use of randomized experiments to evaluate teaching methods. On the other hand, many scholars in educational schools have argued against increasing the number of randomized experiments, often because of philosophical objections, such as the ethical difficulty of randomly assigning students to various treatments when the effects of such treatments are not yet known to be effective, or the difficulty of assuring rigid control of the independent variable in fluid, real school settings.\nIn", "-25.90204467024887" ], [ "exploratory, informal experiments and the formal experiments. During the exploratory phase, the researchers would simply be trying to determine whether there is a phenomenon that could be worth further investigation, which often implies the use of much more complicated protocols and expensive equipment. In doing so, they are also trying to set up a comfortable, relaxed atmosphere that is believed to be conducive to psychic phenomena. It is during this stage that Shaw and Edwards were able to convince the researchers of psychic abilities. Revelation and aftermath In mid-1981, the two were fairly famous in the psi world, and even", "-25.81339487398509" ], [ "I don't think the experiments are sensitive enough yet to test many of these specific ideas. One could imagine experiments that might test these things, but they'd be very hard to perform.\nA demonstration of a quantum effect in the brain has to explain this problem or explain why it is not relevant, or that the brain somehow circumvents the problem of the loss of quantum coherency at body temperature. As Penrose proposes, it may require a new type of physical theory. Ethical problems Can self-awareness, or understanding of a self in the surrounding environment, be done by a classical", "-25.775886318064295" ], [ "at a later time, and if they are incorrect, this may lead to the revision or rejection of the theory. Modification and improvement If experimental results contrary to a theory's predictions are observed, scientists first evaluate whether the experimental design was sound, and if so they confirm the results by independent replication. A search for potential improvements to the theory then begins. Solutions may require minor or major changes to the theory, or none at all if a satisfactory explanation is found within the theory's existing framework. Over time, as successive modifications build on top of each other, theories consistently", "-25.755284807120916" ], [ "the experiment and alter their behavior in an attempt to support that hypothesis. Orne conceptualized this change by saying that the experiment may appear to a participant as a problem, and it is his or her job to find the solution to that problem, which would be behaving in a way that would lend support to the experimenter's hypothesis. Alternatively, a participant may try to discover the hypothesis simply to provide faulty information and wreck the hypothesis. Both of these results are harmful because they prevent the experimenters from gathering accurate data and making sound conclusions.\nOutside of participant motivation, there", "-25.742483042180538" ], [ "these sorts of experiment \"theoretical experiments-in-imagination\"), such as Einstein's thought experiment of chasing a light beam, leading to special relativity. This is a unique use of a scientific thought experiment, in that it was never carried out, but led to a successful theory, proven by other empirical means. Variety Thought experiments have been used in a variety of fields, including philosophy, law, physics, and mathematics. In philosophy they have been used at least since classical antiquity, some pre-dating Socrates. In law, they were well-known to Roman lawyers quoted in the Digest. In physics and other sciences, notable thought experiments", "-25.729744401294738" ], [ "more recent experiments have shown positive results when conducted under properly controlled conditions. This lack of successful experiments has led the mainstream scientific community to reject remote viewing, based upon the absence of an evidence base, the lack of a theory which would explain remote viewing, and the lack of experimental techniques which can provide reliably positive results.\nScience writers including Gary Bennett, Martin Gardner, Michael Shermer, and professor of neurology Terence Hines describe the topic of remote viewing as pseudoscience. According to Martin Gardner, Targ and Puthoff \"imagined they could do research in parapsychology but instead dealt with 'psychics' who", "-25.71324066145371" ], [ "hypotheses. Although the field makes abundant use of randomized and controlled experiments in laboratory settings, such research can only assess a limited range of short-term phenomena. Thus, psychologists also rely on creative statistical methods to glean knowledge from clinical trials and population data. These include the Pearson product–moment correlation coefficient, the analysis of variance, multiple linear regression, logistic regression, structural equation modeling, and hierarchical linear modeling. The measurement and operationalization of important constructs is an essential part of these research designs Controlled experiments A true experiment with random allocation of subjects to conditions allows researchers to make strong inferences about", "-25.697388938860968" ], [ "40-year experiment. A leak in 1972 led to cessation of the study and severe legal ramifications. It has been widely regarded as the \"most infamous biomedical research study in U.S. history\". Because of the public outrage, in 1974 Congress passed the National Research Act, to provide for protection of human subjects in experiments. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research was established. It was tasked with establishing the boundary between research and routine practice, the role of risk-benefit analysis, guidelines for participation, and the definition of informed consent. Its Belmont Report established three", "-25.657203486189246" ], [ "and troublesome evidence. A degenerative research programme indicates that a new and more progressive system of theories should be sought to replace the currently prevailing one, but until such a system of theories can be conceived of and agreed upon, abandonment of the current one would only further weaken our explanatory power and was therefore unacceptable for Lakatos. Lakatos's primary example of a research programme that had been successful in its time and then progressively replaced is that founded by Isaac Newton, with his three laws of motion forming the 'hard core'.\nThe Lakatosian research programme deliberately provides a framework within", "-25.609287162835244" ], [ "of quantum spin measurements could not be reconciled with the validated predictions of quantum mechanics. Animals, science and animal science Shanks has explored the role played by animal experimentation in the contexts of anatomy and physiology during the renaissance. He has argued that animal experimentation provided a crucial driving force behind the method of analysis and synthesis that would come to play a central role in the emergence of the physico-chemical sciences in the 17th and 18th centuries. According to Shanks, the development of modern science flows from physik (i.e., medicine) to physics, and not the reverse as", "-25.592329701816197" ], [ "experiments using volunteer subjects from the undergraduate student body began. As opposed to the approaches of psychical research, which generally sought qualitative evidence for paranormal phenomena, the experiments at Duke University proffered a quantitative, statistical approach using cards and dice. As a consequence of the ESP experiments at Duke, standard laboratory procedures for the testing of ESP developed and came to be adopted by interested researchers throughout the world.\nGeorge Estabrooks conducted an ESP experiment using cards in 1927. Harvard students were used as the subjects. Estabrooks acted as the sender with the guesser in an adjoining room. In total 2,300", "-25.5720534301945" ], [ "their conclusions. Some have also developed ways to avoid it. For instance, there is the case of holding the observation when conducting a field study from a distance, from behind a barrier such as a two-way mirror or using an unobtrusive measure. Trial effect Various medical scientists have studied possible trial effect (clinical trial effect) in clinical trials. Some postulate that, beyond just attention and observation, there may be other factors involved, such as slightly better care; slightly better compliance/adherence; and selection bias. The latter may have several mechanisms: (1) Physicians may tend to recruit patients who seem to have", "-25.480772617447656" ], [ "back on studies that involve only statistics that are unrepeatable, owing their results to poor experimental methods, recording mistakes and faulty statistical mathematics.\nAccording to Planer, \"all research in medicine and other sciences would become illusionary, if the existence of PK had to be taken seriously; for no experiment could be relied upon to furnish objective results, since all measurements would become falsified to a greater or lesser degree, according to his PK ability, by the experimenter's wishes.\" Planer concluded the concept of psychokinesis is absurd and has no scientific basis.\nPhilosopher and physicist Mario Bunge has written that \"psychokinesis, or PK,", "-25.45563220907934" ], [ "However, self-experiment lacks the statistical validity of a larger experiment. It is not possible to generalise from an experiment on a single person. For instance, a single successful blood transfusion does not indicate, as we now know from the work of Karl Landsteiner, that all such transfusions between any two random people will also be successful. Likewise, a single failure does not absolutely prove that a procedure is worthless. Psychological issues such as confirmation bias and the placebo effect are unavoidable in a single-person self-experiment where it is not possible to put scientific controls in place.\nSuch", "-25.384564533713274" ], [ "as varied as decision making, the socialization of children, and color preference.\nIn addition, Festinger is credited with the ascendancy of laboratory experimentation in social psychology as one who \"converted the experiment into a powerful scientific instrument with a central role in the search for knowledge.\" An obituary published by the American Psychologist stated that it was \"doubtful that experimental psychology would exist at all\" without Festinger. Yet it seems that Festinger was wary about burdensome demands for greater empirical precision. Warning against the dangers of such demands when theoretical concepts are not yet fully developed, Festinger stated, \"Research can increasingly", "-25.360561306217278" ], [ "that understanding of nature could be reached with certainty only by deductive logic since induction from experiment could not provide certainty; therefore, experiments merely served to confirm the conclusions of reasoned arguments about nature. Polinière abandoned this method, arguing that truths about nature could be reached only by experiment. He died in his birth town of Coulonces in 1734.", "-25.35268618313421" ], [ "always be reconstructed as a straightforward argument, without the irrelevant particulars. John D. Norton, a well-known philosopher of science, has noted that \"a good thought experiment is a good argument; a bad thought experiment is a bad argument.\"\nWhen effectively used, the irrelevant particulars that convert a straightforward argument into a thought experiment can act as \"intuition pumps\" that stimulate readers' ability to apply their intuitions to their understanding of a scenario. Thought experiments have a long history. Perhaps the best known in the history of modern science is Galileo's demonstration that falling objects must fall at the same rate regardless", "-25.321718145394698" ], [ "1967 (charter) issue of the popular magazine Psychology Today, with a more rigorous version of the paper appearing in Sociometry two years later. The Psychology Today article generated enormous publicity for the experiments, which are well known today, long after much of the formative work has been forgotten.\nMilgram's experiment was conceived in an era when a number of independent threads were converging on the idea that the world is becoming increasingly interconnected. Michael Gurevich had conducted seminal work in his empirical study of the structure of social networks in his MIT doctoral dissertation under Pool. Mathematician Manfred Kochen, an Austrian", "-25.321479732556327" ], [ "reproducibility project show that much of the published research is just \"psycho-babble\", the replication crisis does not necessarily mean that psychology is unscientific. Rather this process is part of the scientific process in which old ideas or those that cannot withstand careful scrutiny are pruned, although this pruning process is not always effective. The consequence is that some areas of psychology once considered solid, such as social priming, have come under increased scrutiny due to failed replications.\nNobel laureate and professor emeritus in psychology Daniel Kahneman argued that the original authors should be involved in the replication effort because", "-25.297895172960125" ], [ "Hyman says that, even if the results from remote viewing experiments were reproduced under specified conditions, they would still not be a conclusive demonstration of the existence of psychic functioning. He blames this on the reliance on a negative outcome—the claims on ESP are based on the results of experiments not being explained by normal means. He says that the experiments lack a positive theory that guides as to what to control on them and what to ignore, and that \"Parapsychologists have not come close to (having a positive theory) as yet\".\nHyman also says that the amount and quality of", "-25.26250382885337" ], [ "experimentation, influenced by Ibn Sina, as follows:\nBecause of the frequency of the experience, these judgements may be regarded as certain, even without our knowing the reason [for the phenomenon]. For there is certain knowledge that the effect in question is not due to chance. It must accordingly be supposed that it is due to nature or to some modality thereof. Thus the cause qua cause, though not its species or mode of operation, is known. For experimental science is also constituted by a knowledge of the cause and by an induction based on all the data of sensation; whereby a", "-25.23549728875514" ], [ "on WMT concluded that \"the results are inconsistent\" due to the fact that many studies had \"inadequate controls\" as well as \"ineffective measurement of the cognitive abilities of interest.\"\nIn 2012, a systematic meta-analytic review was undertaken. Stringent criteria for inclusion ensured that all studies were either randomized controlled trials or quasi-experiments. All studies had to have a treatment and a treated or untreated control group. By this time, some twenty-three studies met these criteria, including both clinical samples of typically developing children and adults. The results closely replicated the original finding by Ericcson et al. (1980): There were short-term improvements", "-25.173601163784042" ], [ "be due to chance. Replications are important, to ensure that the result is valid and not due to chance, or some feature of a particular sample. False positive conclusions, often resulting from the pressure to publish or the author's own confirmation bias, are a hazard in the field. Famous experiments The Asch conformity experiments demonstrated the power of conformity in small groups with a line length estimation task that was designed to be extremely easy. In well over a third of the trials, participants conformed to the majority, who had been instructed to provide incorrect answers, even though the majority", "-25.172622819663957" ], [ "psychological experiment to test how human beings conform to roles. That study was brought to a premature end as a result of the extreme brutality displayed by guards towards prisoners. Milgram experiment This itself was related to the Milgram experiment at Yale University in 1961.\nThe BBC Experiment was led by psychologists Professor Alex Haslam (University of Exeter) and Professor Steve Reicher (University of St Andrews) who planned and designed the psychological experiment with the series' executive producer Nick Mirsky and producer Gaby Koppel of the BBC. At the time, Reicher was editor of the British Journal of Social Psychology", "-25.1599638504631" ], [ "that would never have been achieved, if there had been crystal clarity about all the consequences from the start, or if people insisted on absolute precision prior to doing anything. Scientists often try things out on the basis of \"hunches\", and processes like serendipity can play a role.\nLearning something new, or trying to create something new, is rarely a completely formal-logical or linear process, there are not only \"knowns\" and \"unknowns\" involved, but also \"partly known\" phenomena, i.e. things which are known or unknown \"to some degree\". Even if, ideally, we would prefer to eliminate fuzzy ideas, we might need", "-25.13958543690387" ], [ "research. The field suffers from high bias, low reproducibility, and widespread misuse of statistics. The replication crisis affects psychology more strongly than any other field; as many as two-thirds of highly publicized findings may be impossible to replicate. Meta-research finds that 80-95% of psychological studies support their initial hypotheses, which strongly implies the existence of publication bias.\nThe replication crisis has led to renewed efforts to re-test important findings. In response to concerns about publication bias and p-hacking, more than 140 psychology journals have adopted result-blind peer review, in which studies are pre-registered and published without regard for their outcome. An", "-25.059552235063165" ], [ "argued that perceptual experimenters were misguided in their control over physical variables of stimuli, and the display of stimulus information should be manipulated instead. This stance breaks from traditional thought in that Gibson posited that fundamentally sound experiments could be conducted in the external world without having to construct artificial laboratory settings.", "-25.0579743393464" ], [ "selection procedures, along with widespread discontent over such grueling processes, resulted in the eventual abolishment of the practice by royal decree. Modern psychological evaluation In the 1800s, Hubert von Grashey developed a battery to determine the abilities of brain-damaged patients. This test was also not favorable, as it took over 100 hours to administer. However, this influenced Wilhelm Wundt, who had the first psychological laboratory in Germany. His tests were shorter, but used similar techniques. Wundt also measured mental processes and acknowledged the fact that there are individual differences between people.\nFrances Galton established the first tests in London for measuring", "-25.017710210740915" ], [ "is based on the reproduction of experiments, and so far parapsychologists have been unable to support any of their claims thorough repeatable tests... We don't rule out the possibilities, but we think the evidence should be very solid.\" Concerning newspapers that print psychic predictions for the upcoming year, Karr states that \"Their predictions rarely come close to occurring... 1992 was not a very good year for psychics. Then again no year is good for them, every year the media publishes their predictions and every year their predictions are wrong.\" Asked about a psychics prediction for Dolly Parton for", "-24.97729953227099" ], [ "(50% had failed to reproduce one of their own experiments). In 2009, 2% of scientists admitted to falsifying studies at least once and 14% admitted to personally knowing someone who did. Misconducts were reported more frequently by medical researchers than others. In psychology Several factors have combined to put psychology at the center of the controversy. Much of the focus has been on the area of social psychology, although other areas of psychology such as clinical psychology, developmental psychology, and educational research have also been implicated. According to a 2018 survey of 200 meta-analyses, \"psychological research is, on average, afflicted", "-24.96024742994632" ], [ "of the nature of the experiment, Zimbardo found it impossible to keep traditional scientific controls in place. He was unable to remain a neutral observer, since he influenced the direction of the experiment as the prison's superintendent. Conclusions and observations drawn by the experimenters were largely subjective and anecdotal, and the experiment is practically impossible for other researchers to accurately reproduce. Erich Fromm claimed to see generalizations in the experiment's results and argued that the personality of an individual does affect behavior when imprisoned. This ran counter to the study's conclusion that the prison situation itself controls the individual's behavior.", "-24.886726142605767" ], [ "about the true nature of the experiment. In an experiment conducted by Stanley Milgram in 1963 the researchers told participants that they would be participating in a scientific study of memory and learning. In reality the study looked at the participants' willingness to obey commands, even when that involved inflicting pain upon another person. After the study, the subjects were informed of the true nature of the study, and steps were taken in order to ensure that the subjects left in a state of well being. Use of deception raises many problems of research ethics and it is strictly regulated", "-24.79111355636269" ], [ "web experiments is rising. For example, a number of psychology and law researchers have used the web to collect data. Lora Levett and Margaret Bull Kovera examined whether opposing expert witnesses are effective in educating jurors about unreliable expert evidence. Rather than sensitizing jurors to flaws in the other expert's testimony, the researchers found that jurors became more skeptical of all expert testimony. In her experiment, this led to more guilty verdicts. Levett and Kovera's research used a written transcript of a trial, which participants then read before making their decision. This type of stimulus has been criticized by some", "-24.778219912666827" ], [ "or for not accurately predicting an event that subsequently occurs, then scientific endeavour will be restricted to certainties only, and the benefits that are associated with findings, from medicine to physics, will be stalled.\nThis position was countered by other views. David Ropeik, writing for Scientific American, contested the \"trial against science\" thesis, describing it as \"a judgment not against science, but against a failure of science communication\".\nDuring the trial, other scientists attacked the scientific conduct of the commission. Professor Francesco Giovanni Maria Stoppa, a member of the commission until 2003, said: \"They should have given information proportional to our knowledge,", "-24.765163329488132" ], [ "there are better alternatives, if there are unintended outcomes, and whether the program goals are appropriate and useful. Metascience The field of metascience has revealed significant problems with the methodology of psychological research. Psychological research suffers from high bias, low reproducibility, and widespread misuse use of statistics. These finding have led to calls for reform from within and from outside the scientific community. Confirmation bias In 1959, statistician Theodore Sterling examined the results of psychological studies and discovered that 97% of them supported their initial hypotheses, implying a possible publication bias. Similarly, Fanelli (2010) found that 91.5% of psychiatry/psychology studies", "-24.75219842919614" ], [ "effect provides a larger benefit to long-term memory when the tested material is difficult enough to require effort, the rate of retrieval success is high, and feedback with correct answers is given after testing. Empirical evidence The first documented empirical studies on the testing effect were published in 1909 by Edwina E. Abbott. An important step in proving the existence of the testing effect was presented in a 1992 study by Carrier and Pashler. Carrier and Pashler showed that testing does not just provide an additional practice opportunity, but produces better results than other forms of studying. In their experiment,", "-24.66238278200035" ], [ "an adult should be able to accomplish, using reason and logic. That being said, half of the participants answered the problem incorrectly. Approach to experimentation Peter Wason took a rather unconventional approach to his studies. When running experiments, he took a more active approach. Although he had some lab aides, he insisted on being present when experiments were run, so he could actively watch the subjects’ behavior throughout the process. It is also said that Wason infused a clinical psychology atmosphere into his study by asking his subjects how they felt about the experiment itself, as well as the results", "-24.647073080472182" ], [ "type of science is experimental science, which is often said to work by conducting experiments to disprove hypotheses about the workings and causes of natural phenomena. This approach cannot prove a hypothesis, since some later experiment may disprove it, but the accumulation of failures to disprove is often compelling evidence in favor. However, when confronted with totally unexpected phenomena, such as the first evidence for invisible radiation, experimental scientists often use the same approach as historical scientists: construct a set of hypotheses about the causes and then look for a \"smoking gun\". Subdivisions As knowledge has increased, paleontology has developed", "-24.64389442652464" ], [ "For important results, other groups will try to repeat the experiment. If they consistently fail, they will bring these negative results into the scientific debate. Critiques of scientific objectivity A critical argument on scientific objectivity and positivism is that all science has a degree of interpretivism. In the 1920s, Percy Bridgman's The Logic of Modern Physics and the operationalism presented was centered in such recognition. Thomas Kuhn's The Structure of Scientific Revolutions Based on a historical review of the development of certain scientific theories in his book, The Structure of Scientific Revolutions, scientist and historian Thomas Kuhn raised some philosophical", "-24.637770396162523" ], [ "or why the symptoms grow worse over time.\nAssessing novel interpretations submitted to Scientific journals: If new knowledge from new studies is presented in the context of existing knowledge, that process allows the credibility of resulting conclusions to be established. As knowledge is evolutionary in nature, earlier knowledge usually forms a foundation for later increments. However academic constraints usually incline researchers to avoid Thinking outside the box. This leads to a Catch-22 problem for researchers who seek to reinterpret earlier studies, making deductions from existing data that dissent from existing, widely approved interpretations. For example, the current understanding of Pleistocene", "-24.6257792124743" ], [ "many other phenomena, as verified by its predictive power in other contexts. For example, it has been known since 1859 that the observed perihelion precession of Mercury violates Newtonian mechanics, but the theory remained the best explanation available until relativity was supported by sufficient evidence. Also, while new theories may be proposed by a single person or by many, the cycle of modifications eventually incorporates contributions from many different scientists.\nAfter the changes, the accepted theory will explain more phenomena and have greater predictive power (if it did not, the changes would not be adopted); this new explanation will then be", "-24.590759774415346" ], [ "of studies with surprising findings from examinations using small sample sizes before allowing the manuscripts to be published.\nMoreover, only a very small proportion of academic journals in psychology and neurosciences explicitly stated that they welcome submissions of replication studies in their aim and scope or instructions to authors. This phenomenon does not encourage the reporting or even attempt on replication studies. Emphasizing replication attempts in teaching Based on coursework in experimental methods at MIT and Stanford, it has been suggested that methods courses in psychology emphasize replication attempts rather than original studies. Such an approach would help students learn scientific", "-24.510642509383615" ], [ "paper. That is, the person who would receive the academic credit for the experiment must also be the subject of it. Motivations There are many reasons experimenters decide to self-test, but amongst the most fundamental is the ethical principle that the experimenter should not subject the participants in the experiment to any procedure they would not be willing to undertake themselves. This idea was first codified in the Nuremberg Code in 1947, which was a result of the trials of Nazi doctors at the Nuremberg trials accused of murdering and torturing victims in valueless experiments. Several of", "-24.48959642625414" ], [ "in contested claims for priority in research discoveries can be credited to the increasing acceptance of the publication of papers in modern academic journals.\nThe Royal Society was steadfast in its unpopular belief that science could only move forward through a transparent and open exchange of ideas backed by experimental evidence. Many of the experiments were ones that we would not recognize as scientific today—nor were the questions they answered. For example, when the Duke of Buckingham was admitted as a Fellow of the Royal Society on June 5, 1661, he presented the Society with a vial of powdered \"unicorn horn\".", "-24.41355798116274" ], [ "the experiment, and his pleas that his life was at risk and that he suffered from a heart condition. The experiment, the \"researcher\" insisted, had to go on. The dependent variable in this experiment was the voltage amount of shocks administered. Zimbardo's experiment The other classical study on obedience was conducted at Stanford University during the 1970s. Phillip Zimbardo was the main psychologist responsible for the experiment. In the Stanford Prison Experiment, college age students were put into a pseudo prison environment in order to study the impacts of \"social forces\" on participants behavior. Unlike the Milgram study in", "-24.412443018087288" ], [ "reveal a critical and analytical way of thinking and emphasis on experimental evidence in physics, through which he became one of the early founders and advocates of modern scientific methodology.\nThe more experience and experiments are accumulated during the exploration of nature, the more faltering its theories become. It is always good though not to abandon them instantly. For every hypothesis which used to be good at least serves the purpose of duly summarizing and keeping all phenomena until its own time. One should lay down the conflicting experience separately, until it has accumulated sufficiently to justify the efforts necessary to", "-24.412215733071207" ], [ "American Around 1875 the Harvard physiology instructor (as he then was), William James, opened a small experimental psychology demonstration laboratory for use with his courses. The laboratory was never used, at that time, for original research, and so controversy remains as to whether it is to be regarded as the \"first\" experimental psychology laboratory or not. In 1878, James gave a series of lectures at Johns Hopkins University entitled \"The Senses and the Brain and their Relation to Thought\" in which he argued, contra Thomas Henry Huxley, that consciousness is not epiphenomenal, but must have an evolutionary function, or it", "-24.39685727492906" ], [ "experimenter's task is to work out how these interact.\nThe example of someone having a positive experience with a drug is easy to see how drug dependence and the law of effect works. The tolerance for a drug goes up as one continues to use it after having a positive experience with a certain amount the first time. It will take more and more to get that same feeling. This is when the controlled substance in an experiment would have to be modified and the experiment would really begin. The law of work for psychologist B. F. Skinner almost half a", "-24.395636991772335" ], [ "Since the object of scientific research is the discovery of new phenomena, this bias can and has caused new discoveries to be overlooked; one example is the discovery of x-rays. It can also result in erroneous scientific support for widely held cultural myths, on the other hand, as in the scientific racism that supported ideas of racial superiority in the early 20th century. Correct scientific technique emphasizes careful recording of observations, separating experimental observations from the conclusions drawn from them, and techniques such as blind or double blind experiments, to minimize observational bias. Processing bias Modern scientific instruments can extensively", "-24.38766100606881" ], [ "but so far the Academy has yielded no result. The author has vividly described bizarre and seemingly pointless experiments conducted there, for example - trying to change human excretion back into food and trying to extract sunbeams out of cucumbers or teaching mathematics to pupils by writing propositions on wafers and consuming it with \"cephalick tincture\". Gulliver is clearly unimpressed with this academy and offers many suggestions to improve it. The author's ulterior motive on describing this place could possibly have been to point out the senseless side of science in his time.\nThe Academy is home to The Engine, a", "-24.36995763641471" ], [ "Self-experimentation Psychology The self-experimental approach has long and often been applied to practical psychological problems. Benjamin Franklin recorded his self-experiment of successively devoting his attention for a week to one of thirteen \"Virtues\", \"leaving the other Virtues to their ordinary Chance, only marking every Evening the Faults of the Day.\"\nIn psychology, the best-known self-experiments are the memory studies of Hermann Ebbinghaus, which established many basic characteristics of human memory through tedious experiments involving nonsense syllables.\nIn Self-change: Strategies for solving personal problems, M. J. Mahoney suggested that self-experimentation be used as a method of psychological treatment, and recommended that clients be", "-24.365234897530172" ], [ "The results of the experiment were a disaster for American psychiatry, because they destroyed the idea that psychiatrists were a privileged elite that was genuinely able to diagnose, and therefore treat, mental illness.\nCurtis credits the Rosenhan experiment with the inspiration to create a computer model of mental health. Input to the program consisted of answers to a questionnaire. Curtis describes a plan of the psychiatrists to test the computer model by issuing questionnaires to \"hundreds of thousands\" of randomly selected Americans. The diagnostic program identified over 50% of the ordinary people tested as suffering from some kind", "-24.342827284242958" ], [ "concern about compensation, improve subject confidence that they have a real human partner in the experiment, and ensure that subjects have an appropriate understanding of the instructions and the decision problems in the experiment.\nScholars have also formulated techniques to decrease or account for drop-outs, including the high-hurdle technique (motivationally adverse information is clustered at the beginning of the study), the seriousness check (requesting participant's probability estimate that they'll complete the study), and the warm-up phase (placing consent forms or other pre-study materials first to winnow the samples before the study begins). Use in psychology A wide range of psychology experiments", "-24.325478865997866" ], [ "The experiment contained various verified measures and a selection of interactive puzzles which tested various aspects of risk judgement. The experiment was promoted on the BBC One science TV programme, “Bang Goes the Theory” in April 2011. The BBC Stress Test This updated version of the earlier experiment presented more comprehensive feedback and was re-launched by Claudia Hammond on BBC Radio 4’s ‘All in the Mind’ in June 2011. The Get Yourself Hired Test This experiment into job seekers’ psychological skills accompanied BBC Three’s ‘Up For Hire’ programme. It was promoted in October 2011. Test Your Morality This experiment", "-24.32300441613188" ], [ "this case) neurological theory. According to Susanna Martinez-Conde, president of the Neural Correlate Society, which hosts the competition. “These are the best illusions of the year, so they’re very new by definition. You’re going to know the phenomenology first, and the neural underpinnings second. Typically, we don’t know why these illusions work in the brain. We may have theories, but the experiments have not been done, because it’s too early.\"", "-24.303150503372308" ], [ "reforms started by the changes in ethics committees recommended by the Inquiry and cemented in the role of the Health and Disability Commissioner New looks at the Inquiry There have been many articles over time in the lay and academic press over the last twenty years, with some believed to take a 'revisionist' view of the Unfortunate Experiment. Some (such as Barbara Farnsworth Heslop claimed that lack of ethical and research training left Herb Green ill-equipped to design or carry out a better experiment. More recent research may support Green's claims to the Inquiry that there was no experiment and", "-24.299298408906907" ], [ "referred to as experiments in society today. Many of these \"secrets\" were considered to be proven medical remedies and everyday cure-alls. Experiments that were considered highly effective or had a high success rate, however, could be used as an exchange of goods or as a way to pay off debt and in some instances could even help one jump into a higher social standing or class. Many of these remedies, over time and by different cultures, would change and become highly sought after and prized within their given community. Apart from medical and cosmetic remedies, other uses show advice for", "-24.297747436212376" ], [ "participate in the experiments had to be turned away due to the high demand. To satisfy the curiosity of those who were turned away, a black market for psychedelics sprang up near the Harvard campus. Firing of Leary Other professors in the Harvard Center for Research in Personality raised concerns about the legitimacy and safety of the experiments. They were concerned with Leary and Alpert's abuse of power over students. Leary and Alpert pressured graduate students to participate in their research who they taught in a class required for the students' degrees. Additionally, Leary and Alpert gave psychedelics to undergraduate", "-24.297574650350725" ], [ "experiments which are in all books. These we call depredators.\n“We have three that collect the experiments of all mechanical arts, and also of liberal sciences, and also of practices which are not brought into arts. These we call mystery–men.\n“We have three that try new experiments, such as themselves think good. These we call pioneers or miners.\n“We have three that draw the experiments of the former four into titles and tables, to give the better light for the drawing of observations and axioms out of them. These we call compilers.\n“We have three that bend themselves, looking into the experiments of their", "-24.288216160144657" ], [ "would not have been naturally selected in humans. The same year James was contracted by Henry Holt to write a textbook on the \"new\" experimental psychology. If he had written it quickly, it would have been the first English-language textbook on the topic. It was twelve years, however, before his two-volume The Principles of Psychology would be published. In the meantime textbooks were published by George Trumbull Ladd of Yale (1887) and James Mark Baldwin then of Lake Forest College (1889).\nWilliam James was one of the founders of the American Society for Psychical Research in 1885, which studied psychic phenomena", "-24.285438795108348" ], [ "to as the Scientific Revolution. Using ancient authority and divine revelation as the ultimate source of knowledge was replaced by a belief that knowledge of nature could only be obtained through detailed observations or artificial experiments. If one read the Saggi alone, it would seem that this new experimental science underlay the Cimento's every activity. The Saggi epitomized the new way of doing science, concentrating on the experiments themselves, with little or no analysis or explanations of the results of the experiments. Recent studies have cast doubt about society member's acceptance of this new method for acquiring knowledge and", "-24.276248312089592" ], [ "from setting out to disprove psychic phenomena, \"(W)e considered it entirely possible that the psychology of perception was about to go through a psychic revolution, and if so, we wanted to be included. But over the next three years of research, when we examined each dazzling claim of ESP, or psychokinesis (PK), we discovered that a simple, natural explanation was far more credible than a supernatural or paranormal one.\" Regardless of the preferences of the authors, they followed the evidence they found where it led them. As they state in chapter eight, \"It is never the scientist’s own conclusion that", "-24.250653821742162" ], [ "Science.\nExperimental methods involve the researcher altering a variable in the environment and measuring the effect on another variable. An example would be allowing two groups of children to play violent or nonviolent videogames, and then observing their subsequent level of aggression during free-play period. A valid experiment is controlled and uses random assignment.\nCorrelational methods examine the statistical association between two naturally occurring variables. For example, one could correlate the amount of violent television children watch at home with the number of violent incidents the children participate in at school. Note that this study would not prove that violent TV causes", "-24.238117524888366" ], [ "deception to prevent the participant from discovering the true hypothesis of the experiment and then debrief the participants. For example, research has demonstrated that repeated deception and debriefing is useful in preventing participants from becoming familiar with the experiment, and that participants do not significantly alter their behaviors after being deceived and debriefed multiple times. Another way that researchers attempt to reduce demand characteristics is by being as neutral as possible, or training those conducting the experiment to be as neutral as possible. For example, studies show that extensive one-on-one contact between the experimenter and the participant makes it more", "-24.221701736212708" ], [ "that the literature examined that related to applied psychology and social betterment was steadily declining as well. Allport suggests that psychologists were turning to specialized journals not included in his survey and that some welcomed the change while others did not.\nIn conclusion, Allport's address welcomed the change, claiming that psychology should avoid authoritarianism in the field, from becoming a cult that ruled out novel and unexplained phenomenon by \"one-sided tests of method.\"", "-24.197559981432278" ], [ "as a case study, they discussed deficiencies in the accepted methodology most commonly used in experimental psychology. LeBel and Peters suggest that experimental psychology is systemically biased toward interpretations of data that favor the researcher's theory.\nIn 2012, the same journal that published Bem's original experiments, The Journal of Personality and Social Psychology (Vol. 103, No. 6), published \"Correcting the Past: Failures to Replicate Psi\" by Jeff Galak of Carnegie Mellon University, Robyn A. LeBoeuf of the University of Florida, Leif D. Nelson of the University of California at Berkeley, and Joseph P. Simmons of the University of Pennsylvania. The paper", "-24.195723044860642" ], [ "unless they had \"competent and reliable scientific evidence\" which was defined as randomized controlled trials done by competent scientists. For the judgment's monetary component, LearningRx agreed to pay $200,000 of a $4 million settlement. Reception The \"brain training\" field has been controversial in the scientific community; in 2014 a group of 75 scientists put out a statement saying that most claims made by companies in the field were pseudoscience, which was countered several months later by an industry-organized group of scientists who said that there was evidence for their effectiveness.\nIn 2012 Douglas K. Detterman of the Case Western Reserve University", "-24.16093231207924" ], [ "shows Wundt's transition from a physiologist to an experimental psychologist. \"Why does not psychology follow the example of the natural sciences? It is an understanding that, from every side of the history of the natural sciences, informs us that the progress of every science is closely connected with the progress made regarding experimental methods.\" With this statement, however, he will in no way treat psychology as a pure natural science, though psychologists should learn from the progress of methods in the natural sciences: \"There are two sciences that must come to the aid of general psychology in this regard:", "-24.151558960962575" ], [ "the success of current scientific theories is no miracle. It is not even surprising to the scientific (Darwinist) mind. For any scientific theory is born into a life of fierce competition, a jungle red in tooth and claw. Only the successful theories survive—the ones which in fact latched on to actual regularities in nature.\" (The Scientific Image, 1980)\nNo miracles argument has been considered wrong, because it commits the base rate fallacy. Pessimistic induction Pessimistic induction, one of the main arguments against realism, argues that the history of science contains many theories once regarded as empirically successful but which are now", "-24.150143659087462" ], [ "the Follow Through evaluation (i.e., the Intellectual Achievement Responsibility Scale (IARS) and the Coopersmith Self-Esteem Inventory). But it was better, according to many researchers, to measure outcomes imperfectly rather than not to measure them at all. Thus, while \"perfect\" measures of desired outcomes might never exist, one should not let the perfect be the enemy of the good—in other words, one could call into question the efficacy of conducting any experiment at all on the basis that some bias or imperfection exists.\nWas Follow Through a social or scientific program? After an initial period, new regulations mandated that 80 percent of", "-24.14159010257572" ] ]
lgbas
How were they able to increase the speed of USB 2.0 40 times compared to USB 1.1. It's using exactly the same connector with the same 4 wires and the same shielding.
[ "They never aimed for speed on USB1. It was a replacement for a bunch of different disjoint ports with a speed that would allow all their functions to be condensed to a single connector. That was the whole point - a Universal Serial Bus. You could connect keyboards (no more PS/2 keyboard connector), mice (no PS/2 mouse connector), serial devices (no more serial ports), parallel devices (no more parallel port) and similar devices. It wasn't intended for fast transfer - you'd use Firewire/iLink/IEEE1394 for that. For a five-year-old: It's like somebody took the good Lego, Duplo, Meccano and K'Nex parts and made them fit together. Your parents will still call it a toy but it's really really awesome.", "I compare your comparison to saying how can cars travel faster now on the same roads as 20 years ago. Roads (cable) stay the same. The cars (electronic circuitry) evolved.", "In USB 1.1, you were only allowed to use small sentences once a millisecond (1000 microseconds) (8 bytes) to talk back and forth, so it took longer to send blocks of data. In USB 2.0, you could start a sentence every 125 microseconds (8x more sentences), and they could be 1024 bytes long USB 1.1: 1000000 uSec/sec / 1000/frame = 1000 frames/sec USB 2.0: 1000000 uSec/sec / 125/frame = 8000 frames/sec USB 1.1 - 8 bytes x 1000 frames/sec = 8000 bytes/second USB 2.0 - 1024 bytes x 8000 frames/sec = 8,192,000 bytes/second", "Ever pack a suitcase haphazardly, find out stuff won't fit, and re-pack it to make more efficient use of the space? The suitcase didn't change, but the way you fit stuff in it did. When USB 1.x was created, it was meant to replace serial, PS/2, and parallel port functions. None of these things used transfer of over a few megabytes per second. So the engineering focus was on reliable data transfer, hot-plugging, etc; so long as it was \"fast enough\". As people created things like video cameras, storage devices, etc., there became demand for a faster interface. The engineers were able to improve the way data is \"packed into\" a USB cable, so that instead of a new connector and cable, you only had to upgrade the ends. This also meant you could use old devices with the new stuff, which meant you could just have one type of connector on your PC.", "Imagine that the USB slot is a mailbox, and that the circuitry on either side is the postal service. Back in 1990, they weren't very organized, and they only had a few staff. So the postal service came once a week. Now it's 2011, and the postal service has invested a lot of time, research, and money into creating new infrastructure (better trucks, paved roads for the trucks go to on, etc). Your mailbox (USB port) is still exactly the same, but the postal service (circuitry behind the port and the cable it uses) has drastically improved with all that effort, so now they're delivering your mail every single day. Yay!", "You're going to shit your pants when you hear about S/PDIF and ADAT Lightpipe." ]
[ [ "pairs, which additionally require shielding (typically, shielded twisted pair but twinax is also mentioned by the specification). Thus, to support SuperSpeed data transmission, cables contain twice as many wires and are thus larger in diameter.\nThe USB 1.1 standard specifies that a standard cable can have a maximum length of 5 meters (16 ft 5 in) with devices operating at full speed (12 Mbit/s), and a maximum length of 3 meters (9 ft 10 in) with devices operating at low speed (1.5 Mbit/s).\nUSB 2.0 provides for a maximum cable length of 5 meters (16 ft 5 in) for devices running at high speed (480 Mbit/s). The primary reason for this limit is", "-32.191346963256365" ], [ "the resulting specification achieving 480 Mbit/s, 40 times as fast as the original USB 1.1 specification.\nThe USB 3.0 specification was published on 12 November 2008. Its main goals were to increase the data transfer rate (up to 5 Gbit/s), decrease power consumption, increase power output, and be backward compatible with USB 2.0. USB 3.0 includes a new, higher speed bus called SuperSpeed in parallel with the USB 2.0 bus. For this reason, the new version is also called SuperSpeed. The first USB 3.0 equipped devices were presented in January 2010.\nAs of 2008, approximately 6 billion USB ports and interfaces were in the", "-31.48181749714422" ], [ "maximum length of 5 meters (16 ft 5 in) with devices operating at full speed (12 Mbit/s), and a maximum length of 3 meters (9 ft 10 in) with devices operating at low speed (1.5 Mbit/s).\nUSB 2.0 provides for a maximum cable length of 5 meters (16 ft 5 in) for devices running at high speed (480 Mbit/s).\nThe USB 3.0 standard does not directly specify a maximum cable length, requiring only that all cables meet an electrical specification: for copper cabling with AWG 26 wires the maximum practical length is 3 meters (9 ft 10 in). Power USB supplies power at 5 V ± 5% to power USB downstream devices. Protocol layer During USB communication, data is", "-31.34236832280294" ], [ "inside data centers. Conventional PCI-E data cables carry data at up to eight gigabits per second, while networking cables reach 40 Gbit/s. The latest version of the USB standard tops out at ten Gbit/s. The technology does not directly replace existing cables in that it requires a separate circuit board to interconvert electrical and optical signals. Its advanced speed offers the potential of reducing the number of cables that connect blades on a rack and even of separating processor, storage and memory into separate blades to allow more efficient cooling and dynamic configuration.\nGraphene photodetectors have the potential to surpass germanium devices", "-30.970568931694288" ], [ "USB 2.0. Ethernet The IEEE 802.3af, at, and bt Power over Ethernet (PoE) standards specify more elaborate power negotiation schemes than powered USB. They operate at 48 V DC and can supply more power (up to 12.95 W for af, 25.5 W for at aka PoE+, 71 W for bt aka 4PPoE) over a cable up to 100 meters compared to USB 2.0, which provides 2.5 W with a maximum cable length of 5 meters. This has made PoE popular for VoIP telephones, security cameras, wireless access points, and other networked devices within buildings. However, USB is cheaper than PoE provided that the distance is short and power demand is", "-30.523074920813087" ], [ "Fast Ethernet In computer networking, Fast Ethernet physical layers carry traffic at the nominal rate of 100 Mbit/s. The prior Ethernet speed was 10 Mbit/s. Of the Fast Ethernet physical layers, 100BASE-TX is by far the most common.\nFast Ethernet was introduced in 1995 as the IEEE 802.3u standard and remained the fastest version of Ethernet for three years before the introduction of Gigabit Ethernet. The acronym GE/FE is sometimes used for devices supporting both standards. Nomenclature The \"100\" in the media type designation refers to the transmission speed of 100 Mbit/s, while the \"BASE\" refers to baseband signalling. The letter following the dash", "-30.17068597348407" ], [ "of two hubs in a single collision domain). Dual-speed hub In the early days of Fast Ethernet, Ethernet switches were relatively expensive devices. Hubs suffered from the problem that if there were any 10BASE-T devices connected then the whole network needed to run at 10 Mbit/s. Therefore, a compromise between a hub and a switch was developed, known as a dual-speed hub. These devices make use of an internal two-port switch, bridging the 10 Mbit/s and 100 Mbit/s segments. When a network device becomes active on any of the physical ports, the device attaches it to either the 10 Mbit/s segment or the 100 Mbit/s", "-30.158928556164028" ], [ "Bayvel of University College London were able to increase networking speeds to 1.125 terabits per second. Christos Santis, graduate student Scott Steger, Amnon Yariv, Martin and Eileen Summerfield developed a new laser that quadruples transfer speeds with fiber optics. If these two technologies were combined, then a transfer speed of up to 4.5 terabits per second could potentially be achieved.", "-29.994916586852014" ], [ "the speed of USB storage devices (more evident with USB 3.0 devices, but also noticeable with USB 2.0 ones) is that the USB Mass Storage Bulk-Only Transfer (BOT) protocol drivers are generally slower than the USB Attached SCSI protocol (UAS[P]) drivers.\nOn some old (2009–2010) Ibex Peak-based motherboards, the built-in USB 3.0 chipsets are connected by default via a 2.5 GT/s PCI Express lane of the PCH, which then did not provide full PCI Express 2.0 speed (5 GT/s), so it did not provide enough bandwidth even for a single USB 3.0 port. Early versions of such boards (e.g. the Gigabyte Technology P55A-UD4 or P55A-UD6) have a", "-29.917874393984675" ], [ "and transfer rates of USB very closely (from 1.5 and 12 Mbit/s up to 480 Mbit/s for USB 2.0) and makes for a natural wireless extension of USB in the short range (3 meters, up to 10 at a reduced rate of 110 Mbit/s). Still, there is no physical bus to power the peripherals any more, and the absence of wires means that some properties that are usually taken for granted in USB systems need to be achieved by other means.\nThe goal of the specification is to preserve the functional model of USB, based on intelligent hosts and behaviorally simple devices, while allowing", "-29.842057063549873" ], [ "segment, as appropriate. This obviated the need for an all-or-nothing migration to Fast Ethernet networks. These devices are considered hubs because the traffic between devices connected at the same speed is not switched. Gigabit Ethernet hub Repeater hubs have been defined for Gigabit Ethernet but commercial products have failed to appear due to the industry's transition to switching.", "-29.815934446130996" ], [ "sent until another transfer can be initiated. This reduces bus occupancy, meaning that nothing is sent for considerable fractions of bus time. A gap every 23 frames is not noticeable, but a gap every three frames can be very costly to throughput.\nAs USB has become faster, devices have also become hungrier for data and so there is now demand for sending large amounts of data - either to be stored on the device, or be relayed over wireless links (see 3GPP Long Term Evolution).\nSince the new devices, although faster than before, are still much lower in power than desktop PCs,", "-29.7723784391128" ], [ "Gigabit Ethernet interface, the network speed is significantly slower. Especially for older \"blue rings\" models (200 MHz ARM CPU and 32 MByte RAM), where it varies between 3–6 MByte/s, with an average of 4.5 MByte/s. The newer \"white lights\" MyBook World Edition 1 TB and 2 TB storage capacity models, WDH1NC and WDH2NC (oxnas810, 380 MHz ARM CPU and 128 MByte RAM), have drive speeds comparable to USB, at about 10 MB/s write and 25 MB/s read.\nThe \"white lights\" WDH1NC is Jumbo Frames capable and can achieve ~36 MByte/s reading and ~18 MByte/s writing speed over Gigabit Ethernet. Internals This drive runs BusyBox on Linux on an Oxford", "-29.685949813050684" ], [ "as a switch or a network interface controller may have different PHY types through pluggable PHY modules, such as those based on SFP+. Like previous versions of Ethernet, 10GbE can use either copper or fiber cabling. Maximum distance over copper cable is 100 meters but because of its bandwidth requirements, higher-grade cables are required. \nThe adoption of 10 Gigabit Ethernet has been more gradual than previous revisions of Ethernet: in 2007, one million 10GbE ports were shipped, in 2009 two million ports were shipped, and in 2010 over three million ports were shipped, with an estimated nine million ports", "-29.663534315128345" ], [ "USB (Communications) Transaction latency For low-speed (1.5 Mbit/s) and full-speed (12 Mbit/s) devices the shortest time for a transaction in one direction is 1 ms. High-speed (480 Mbit/s) uses transactions within each micro frame (125 µs) where using 1-byte interrupt packet results in a minimal response time of 940 ns. 4-byte interrupt packet results in 984 ns. Signaling state The host includes 15 kΩ pull-down resistors on each data line. When no device is connected, this pulls both data lines low into the so-called single-ended zero state (SE0 in the USB documentation), and indicates a reset or disconnected connection. USB 2.0 speed negotiation USB 2.0 devices use a special protocol", "-29.6470583989867" ], [ "devices, although powered Ethernet can support them at longer cable distances; however, PoweredUSB does not incorporate USB 3.x officially. In general, since the voltage drop at high currents can be significant over even a few meters, higher voltages are desired for larger distances.\nIn 2012, the USB-IF released the USB Power Delivery Specification (USB PD) as an optional part of the USB 2.0 and 3.x specifications. It defines features similar to those addressed by PoweredUSB, but without requiring the use of proprietary connectors. Instead, the connectors defined in the USB 2.0 and 3.0 standards are continued to be used; higher currents require PD-aware USB-cables,", "-29.476656398401246" ], [ "bandwidth. The device has to receive at least three sets of KJ chirps before it changes to high bandwidth terminations and begins high bandwidth signaling. Because USB 3.0 uses wiring separate and additional to that used by USB 2.0 and USB 1.x, such bandwidth negotiation is not required.\nClock tolerance is 480.00±0.24 Mbit/s, 12.00±0.03 Mbit/s, and 1.50±0.18 Mbit/s.\nThough high bandwidth devices are commonly referred to as \"USB 2.0\" and advertised as \"up to 480 Mbit/s,\" not all USB 2.0 devices are high bandwidth. The USB-IF certifies devices and provides licenses to use special marketing logos for either \"basic bandwidth\" (low and full) or high bandwidth after passing a compliance", "-29.382369599901722" ], [ "they do not require it. Fast Ethernet or Ethernet hubs may use the MII to connect to multiple PHYs for their different interfaces.\nThe MII fixes the theoretical maximum data bit rate for all versions of Fast Ethernet to 100 Mbit/s. The information rate actually observed on real networks is less than the theoretical maximum, due to the necessary header and trailer (addressing and error-detection bits) on every Ethernet frame, and the required interpacket gap between transmissions. 100BASE-TX 100BASE-TX is the predominant form of Fast Ethernet, and runs over two wire-pairs inside a category 5 or above cable. Each network segment can", "-29.275251364917494" ], [ "to accommodate higher link rates, support for compression and encryption, networking, and sophisticated display schemes, such as channel bonding used on large area displays (LADs).\nLink rates: At the time the original ARINC 818 specification was ratified, the fiber-channel protocol supported link rates up to 8.5 gigabits per second (Gb/s). ARINC 818-2 added rates of 5.0, 6.375 (FC 6x), 12.75 (FC 12x), 14.025 (FC 16x), 21.0375 (FC 24x), and 28.05 (FC 32x) Gb/s. The 6x, 12x, and 24x speeds were added to accommodate the use of high-speed, bi-directional coax with power as a physical medium. The 5 Gbit/s rate was", "-29.249354173371103" ], [ "of the USB system without the need for users to calculate cable lengths or enforce technical rules.\nThe intention of USB is to make sure any standard-compliant cable can be used to connect any two compatible devices, and the connection will work, without question. To this end, the USB standard limits the maximum length of any compliant (and thus logo-bearing) USB cable (to about 15 feet), and up to this length, users are expected to buy a longer cable rather than extending a shorter one they already have. For a longer cable length, a USB hub is required. ", "-29.220246220589615" ], [ "the maximum allowed round-trip delay of about 1.5 μs. If USB host commands are unanswered by the USB device within the allowed time, the host considers the command lost. When adding USB device response time, delays from the maximum number of hubs added to the delays from connecting cables, the maximum acceptable delay per cable amounts to 26 ns. The USB 2.0 specification requires that cable delay be less than 5.2 ns/m (1.6 ns/ft), (192000 km/s) - which is close to the maximum achievable transmission speed for standard copper wire).\nThe USB 3.0 standard does not directly specify a maximum cable length, requiring only that all cables", "-29.146904981069383" ], [ "the gross bit rate.\nCommon communication links such as 10 Mbit/s Ethernet (10Base-T), USB, and FireWire typically have a symbol rate slightly lower than the data bit rate, due to the overhead of extra non-data symbols used for self-synchronizing code and error detection.\nJ. M. Emile Baudot (1845–1903) worked out a five-level code (five bits per character) for telegraphs which was standardized internationally and is commonly called Baudot code.\nMore than two voltage levels are used in advanced techniques such as FDDI and 100/1,000 Mbit/s Ethernet LANs, and others, to achieve high data rates.\n1,000 Mbit/s Ethernet LAN cables use four wire pairs in full duplex", "-29.146375667623943" ], [ "possible to run 10GBASE-T over the Cat5e cable that had been used for the wiring in many buildings but that, with the development of fast WiFi protocols such as IEEE 802.11ac, there was a significant demand for cheap uplink faster than 1000BASE-T offered. IEEE 802.3bz will also support Power over Ethernet, which has generally not been available at 10GBASE-T.\nAs early as 2013 the Intel Avoton server processors integrated 2.5 Gbit/s Ethernet ports.\nWhilst Broadcom had announced a series of 2.5 Gbit/s transceiver ICs, 2.5 Gbit/s switch hardware was not widely commercially available at that point; 10GBASE-T switches do not generally support", "-29.01224222651217" ], [ "core link speed reached 155 Mbit/s. At that time, several breakthroughs in fiber optic telecommunications (notably DWDM and EDFA) technologies combined to lower bandwidth costs that in turn drove a sudden dramatic increase in core link speeds: by 2000, a core link operated at 2.5 Gbit/s and core Internet companies were planning for 10 Gbit/s speeds.\nThe largest provider of core routers in the 1990s was Cisco Systems, who provided core routers as part of a broad product line. Juniper Networks entered the business in 1996, focusing primarily on core routers and addressing the need for a radical increase in", "-28.93162078790192" ], [ "slower device, if two devices of different speed capabilities are on the same cable.\nFor all modern ATA host adapters, this is not true, as modern ATA host adapters support independent device timing. This allows each device on the cable to transfer data at its own best speed. Even with earlier adapters, without independent timing, this effect applies only to the data transfer phase of a read or write operation. \"One operation at a time\" This is caused by the omission of both overlapped and queued feature sets from most parallel ATA products. Only one device on a cable can perform", "-28.68366241507465" ], [ "accordingly, lowering the requirements on the cabling, so that 2.5GBASE-T and 5GBASE-T can be deployed at a cable length of 100 m on unshielded Cat 5e and Cat 6 twisted-pair cables, respectively. Power over Ethernet Unlike the preceding 10GBASE-T standard, equipment manufacturers have indicated their intention to implement 802.3at type Power over Ethernet on certain types of NBASE-T switches. This implementation is intended to support high-bandwidth wireless access points (802.11ac / 802.11ax) which exceed the speed capabilities of existing 1000BASE-T Power over Ethernet connections. History The intermediate speeds became relevant around 2014 as it became clear that it would not be", "-28.63677819498116" ], [ "over USB. The MIDI capability is extended to allow up to sixteen simultaneous virtual MIDI cables, each of which can carry the usual MIDI sixteen channels and clocks.\nUSB is competitive for low-cost and physically adjacent devices. However, Power over Ethernet and the MIDI plug standard have an advantage in high-end devices that may have long cables. USB can cause ground loop problems between equipment, because it connects ground references on both transceivers. By contrast, the MIDI plug standard and Ethernet have built-in isolation to 500V or more. eSATA/eSATAp The eSATA connector is a more robust SATA connector, intended for connection", "-28.635507377744943" ], [ "up to 100 Gigabit Ethernet were standardized in 2010 and 2011.\nEthernet's dominance is partly attributed to the simple advantages for the industry of adopting a single standard to drive up volumes and drive down prices. In part, it is also due to ease of deployment, using its ability to self-configure based on the key concepts of \"learning bridge\" (flooding, and associating learned destination addresses with bridge ports) and \"spanning tree protocol\" (the protocol used for avoiding bridging loops).\nHistorically, competing protocols and cabling have been created in order to access higher speed devices than contemporary Ethernet-connected devices handled at an affordable", "-28.571545642480487" ], [ "the Ultra-160 standard with the data transfer rate doubled to 320 MB/s. The latest working draft for this standard is revision 10 and is dated May 6, 2002. Nearly all SCSI hard drives being manufactured at the end of 2003 were Ultra-320 devices. Ultra-640 Ultra-640 (otherwise known as Fast-320) was promulgated as a standard (INCITS 367-2003 or SPI-5) in early 2003. It doubles the interface speed yet again, this time to 640 MB/s. Ultra-640 pushes the limits of LVD signaling; the speed limits cable lengths drastically, making it impractical for more than one or two devices. Because of", "-28.559215187691734" ], [ "10 Gigabit Ethernet 10 Gigabit Ethernet (10GE, 10GbE, or 10 GigE) is a group of computer networking technologies for transmitting Ethernet frames at a rate of 10 gigabits per second. It was first defined by the IEEE 802.3ae-2002 standard. Unlike previous Ethernet standards, 10 Gigabit Ethernet defines only full-duplex point-to-point links which are generally connected by network switches; shared-medium CSMA/CD operation has not been carried over from the previous generations Ethernet standards so half-duplex operation and repeater hubs do not exist in 10GbE.\nThe 10 Gigabit Ethernet standard encompasses a number of different physical layer (PHY) standards. A networking device, such", "-28.545813660224667" ], [ "take advantage of increased available current of between 150 mA and 900 mA, respectively.\nUSB 3.1, released in July 2013 has two variants. The first one preserves USB 3.0's SuperSpeed transfer mode and is labeled USB 3.1 Gen 1, and the second version introduces a new SuperSpeed+ transfer mode under the label of USB 3.1 Gen 2. SuperSpeed+ doubles the maximum data signaling rate to 10 Gbit/s, while reducing line encoding overhead to just 3% by changing the encoding scheme to 128b/132b.\nThe amount of connectors used for USB 3.1 has also been reduced to two: USB-A and USB-C.\nUSB 3.2, released in September 2017, preserves existing USB", "-28.525163244630676" ], [ "larger MTU size than what Gigabit Ethernet had at the time. So the Swedish operators decided that Netnod should implement SRP. The SRP rings installed were running at 2x622Mbit/s in each city.\nIt wasn't soon until the 2x622Mbit/s was not enough. Netnod then proposed to the operators to migrate to SRP 2x2.5Gbit/s, which was also installed. The larger operators all moved to the new SRP rings, but the smaller operators wanted a cheaper method. By 2000, Gigabit Ethernet was starting to become mass-market and the price had dropped compared to SRP. Gigabit Ethernet had by then also implemented jumboframes. Netnod said", "-28.420802660286427" ], [ "3.1 SuperSpeed and SuperSpeed+ data modes but introduces two new SuperSpeed+ transfer modes over the USB-C connector with data rates of 10 and 20 Gbit/s (1.25 and 2.5 GB/s). The increase in bandwidth is a result of multi-lane operation over existing wires that were intended for flip-flop capabilities of the USB-C connector. USB 3.2 is also the first version to use the USB-C connector as the sole connector. USB4 The USB4 specification was released on 29 August 2019 by USB Promoter Group.\nUSB4 is based on the Thunderbolt 3 protocol specification. It supports 40 Gbit/s throughput, is compatible with Thunderbolt 3,", "-28.416836564054393" ], [ "medium for their TRS-80 Model II, Model 12, Model 16, Tandy 6000, Tandy 2000, Tandy 1000 and Tandy 1200 computer models. There were also hooks in the Model 4P's ROM to boot from an ARCNET network.\nWhen Ethernet moved from co-axial cable to twisted pair and an \"interconnected stars\" cabling topology based on active hubs, it became much more attractive. Easier cabling, combined with the greater raw speed of Ethernet (10 Mbit/s, as compared with 2.5 Mbit/s for ARCnet) helped to increase Ethernet demand, and as more companies entered the market the price of Ethernet started to fall—and ARCNET (and", "-28.397154730279" ], [ "can be indicated by a black connector color.\nThe connectors, available from various manufacturers, provide an auto-locking facility to reduce the risk of accidental power failures. Special provisions for hot-plugging are recommended, but optional. Outlook Extending USB's power capability is also a response to Power over Ethernet, which has more flexible dynamic power negotiation capabilities up to 48 V DC and up to about 1 A, and whose maximum bandwidth is potentially greater than even USB 3.1's 10 Gbit/s. The combination of USB 3.0 and a 6 A limit at the most common (5, 12 and 24 V DC) voltages would permit support of a wider variety of", "-28.317045468938886" ], [ "gigabit speed isn't supported by any existing hardware. Higher speed standards, 2.5GBASE-T up to 40GBASE-T running at 2.5 to 40 Gbit/s, consequently define only full-duplex point-to-point links which are generally connected by network switches, and don't support the traditional shared-medium CSMA/CD operation.\nMany different modes of operations (10BASE-T half duplex, 10BASE-T full duplex, 100BASE-TX half duplex, ...) exist for Ethernet over twisted pair, and most network adapters are capable of different modes of operation. Autonegotiation is required in order to make a working 1000BASE-T connection.\nWhen two linked interfaces are set to different duplex modes, the effect of this duplex mismatch is a", "-28.276673395506805" ], [ "simplest—frames are simply sent and received without modification one at a time. This was a good strategy for USB 1.1 systems (current when the protocol was issued) with 64 byte packets but not for USB 2.0 systems which use 512 byte packets.\nThe problem is that Ethernet frames are about 1500 bytes in size—about 3 USB 2.0 packets, and 23 USB 1.1 packets. According how the USB system works, each packet is sent as a transfer, a series of maximum-length packets terminated by a short packet or a special ZLP (zero-length packet). After this, there is bus latency, where nothing is", "-28.248724273501466" ], [ "codified the terminology, the first parallel SCSI devices that exceeded the SCSI-2 capabilities were simply designated SCSI-3. These devices, also known as Ultra SCSI or Fast-20 SCSI, were introduced in 1996. The bus speed doubled again to 20 MB/s for narrow (8 bit) systems and 40 MB/s for wide (16-bit). The maximum cable length stayed at 3 meters but single-ended Ultra SCSI developed an undeserved reputation for extreme sensitivity to cable length and condition (faulty cables, connectors or terminators were often to blame for instability problems).\nUnlike previous SCSI standards, SCSI-3 (Fast-20 speed) requires active termination. Ultra-2 This standard was introduced", "-28.24415809183847" ], [ "the IEEE 802.11ac standard, the first Wi-Fi standard to offer speeds in the gigabit per second range. MU-MIMO enables an access point (AP) to transmit to up to four client devices simultaneously. This eliminates contention delays, but requires frequent channel measurements to properly direct the signals. Each user may employ up to four of the available eight spatial streams. For example, an AP with eight antennas can talk to two client devices with four antennas, providing four spatial streams to each. Alternatively, the same AP can talk to four client devices with two antennas each, providing two spatial streams to", "-28.19162125189905" ], [ "a COM symbol is sent or received.\nUnlike previous standards, the USB 3.0 standard does not specify a maximum cable length, requiring only that all cables meet an electrical specification: for copper cabling with AWG 26 wires, the maximum practical length is 3 meters (9.8 ft). Power and charging As with earlier versions of USB, USB 3.0 provides power at 5 volts nominal. The available current for low-power (one unit load) SuperSpeed devices is 150 mA, an increase from the 100 mA defined in USB 2.0. For high-power SuperSpeed devices, the limit is six unit loads or 900 mA (4.5 W), almost twice USB 2.0's 500 mA.\nThe term", "-28.162728611496277" ], [ "sideloading varies greatly, depending on the USB version supported, and further still by the actual engineering implementation of the USB controller. USB is available in Low-Speed, Full-Speed, and Hi-Speed levels, with High-Speed USB transferring up to 480 Mbit/s (60 MB/s). However, the majority of mobile phones as of the time of writing of this article are Full-Speed USB. Of the mobile products supporting USB 2.0 Hi-Speed, the actual sideloading performance usually ranges between 1-5 MB/s. However, the popular BlackBerry mobile phones by RIM and the iPods by Apple distance themselves at higher performing speeds of roughly 15.7 MB/s and 9.6", "-28.15955712817231" ], [ "However, if one chooses to forego the \"no technical knowledge needed\" aspect of USB and think as an engineer, it is possible to use passive USB extender cables to assemble a cable length approaching 15 feet and use it without problems. Despite being nonstandard, these extender cables are readily available from many sources.\nAnother class of USB extenders are actually USB hubs with a length of cable permanently attached. These do comply with the USB standard, if not more than a limited number of them are connected together. However, they require power from the USB connection and so", "-28.04061160047422" ], [ "(plug-and-play) slot for a media-specific transceiver in order to connect a fiber optic cable or sometimes a copper cable. SFP transceivers exist supporting SONET, Gigabit Ethernet, Fibre Channel, PON, and other communications standards. At introduction, typical speeds were 1 Gbit/s for Ethernet SFPs and up to 4 Gbit/s for Fibre Channel SFP modules. In 2006, SFP+ specification brought speeds up to 10 Gbit/s and the SFP28 iteration is designed for speeds of 25 Gbit/s. The SFP replaced the larger GBIC in most applications, and has been referred to as a Mini-GBIC by some vendors.\nA slightly larger sibling is the four-lane Quad Small Form-factor Pluggable", "-28.022943090007175" ], [ "full-speed USB 2.0 devices with 2 CAN interfaces and 10/100 Ethernet MAC in LQFP100 and LQFP144 packages. Multiple peripherals are supported including a 10-bit 8-channel ADC and a 10-bit DAC. LPC2200 The LPC2200 series are based on the ARM7TDMI-S processor core. LPC2100 The LPC2100 series are based on the ARM7TDMI-S processor core. The LPC2141, LPC2142, LPC2144, LPC2146, and LPC2148 are full-speed USB 2.0 devices in LQFP64 packages. Multiple peripherals are supported including one or two 10-bit ADCs and an optional 10-bit DAC. LPC1800 The NXP LPC1800-series are based on the ARM Cortex-M3 core. The LPC1850 is pin-compatible with the LPC4350", "-28.007557694567367" ], [ "to five segments and four repeaters are allowed between any two hosts. For 100 Mbit/s networks, the limit is reduced to 3 segments (2 Class II hubs) between any two end stations, and even that is only allowed if the hubs are of Class II. Some hubs have manufacturer specific stack ports allowing them to be combined in a way that allows more hubs than simple chaining through Ethernet cables, but even so, a large Fast Ethernet network is likely to require switches to avoid the chaining limits of hubs. Additional functions Most hubs detect typical problems, such as excessive collisions", "-27.99726286358782" ], [ "pass data through the repeater in a usable fashion from one segment to the next, the framing and data rate must be the same on each segment. This means that a repeater cannot connect an 802.3 segment (Ethernet) and an 802.5 segment (Token Ring) or a 10 Mbit/s segment to 100 Mbit/s Ethernet. Fast Ethernet classes 100 Mbit/s hubs and repeaters come in two different speed grades: Class I delay the signal for a maximum of 140 bit times (enabling translation/recoding between 100BASE-TX, 100BASE-FX and 100BASE-T4) and Class II hubs delay the signal for a maximum of 92 bit times (enabling installation", "-27.99520002596546" ], [ "USB 3.0 Architecture and features In USB 3.0, dual-bus architecture is used to allow both USB 2.0 (Full Speed, Low Speed, or High Speed) and USB 3.0 (SuperSpeed) operations to take place simultaneously, thus providing backward compatibility. The structural topology is the same, consisting of a tiered star topology with a root hub at level 0 and hubs at lower levels to provide bus connectivity to devices. Data transfer and synchronization The SuperSpeed transaction is initiated by a host request, followed by a response from the device. The device either accepts the request or rejects it; if accepted, the device sends data or", "-27.968492272222647" ], [ "gigabit ethernet (1000BaseT) ports for high-speed uplinks to distribution or core switches or for stacking of switches and two gigabit SFP ports for a 1Gbit/s fiber transceiver for uplinks to distribution/core layer. PowerConnect 5500 The PowerConnect 5500 series switches are gigabit ethernet access-switches, available in 4 models: either a 24 or 48 port gigabit ethernet switch or a 24/48 port gigabit ethernet switch with power-over-ethernet option. Regardless of the model the switches offer two HDMI ports for stacking and two SFP+ 10Gbit transceiver ports for 10Gb uplinks.\n\nThe technical specifications of the 4 models are all the same, except for the", "-27.901099497830728" ], [ "require A-to-A, B-to-B, and sometimes Y/splitter cables. See the USB On-The-Go connectors section below for a more detailed summary description. \nThere are cables with A plugs on both ends, which may be valid if the cable includes, for example, a USB host-to-host transfer device with 2 ports. Durability The standard connectors were designed to be more robust than many past connectors. This is because USB is hot-pluggable, and the connectors would be used more frequently, and perhaps with less care, than previous connectors.\nStandard USB has a minimum rated lifetime of 1,500 cycles of insertion and removal, the mini-USB receptacle increases", "-27.844571306050057" ], [ "2.5GBASE-T and 5GBASE-T IEEE 802.3bz, NBASE-T and MGBASE-T refer to efforts to produce a standard for Ethernet over twisted pair copper wire at speeds of 2.5 Gbit/s and 5 Gbit/s. This would create intermediate speeds between existing standards Gigabit Ethernet and 10 Gigabit Ethernet. The resulting standards are named 2.5GBASE-T and 5GBASE-T. Technology The physical (PHY) layer transmission technology of IEEE 802.3bz is based on 10GBASE-T, but operates at a lower signaling rate. By reducing the original signal rate to ​¹⁄₄ or ​¹⁄₂, the transfer rate drops to 2.5 or 5 Gbit/s, respectively. The spectral bandwidth of the signal is reduced", "-27.784304852364585" ], [ "SuperDisk or LS-120 drives, which hold 20% more data and can also read standard ​3 ¹⁄₂-inch 1.44 MB diskettes, but they have a lower data-transfer rate due to lower rotational speed. The rivalry was over before the dawn of the USB era.\nThe Zip drive was Iomega's third generation of products different from Iomega's earlier Bernoulli Boxes in many ways including the absence of the Bernoulli plate of the earlier products,. Compatibility Higher-capacity Zip disks must be used in a drive with at least the same capacity ability. Higher-capacity drives can read lower-capacity media. The 250 MB drive writes much more slowly to", "-27.732014609180624" ], [ "be shared over the network, or both, by using a third-party USB hub.\nIn early 2009, Apple released the second generation Time Capsule. It offered simultaneous 802.11n dual-band operation, which allows older devices to use slower wireless speeds, without affecting the overall performance of devices that can use higher 802.11n speeds. The second generation model also included the addition of Guest Networking, a feature which allows creation of a separate wireless network for guests. The guest network uses different authentication credentials, ensuring the security of the primary network. The hard disk storage space of each model was doubled: capacities were 1 TB", "-27.730466611188604" ], [ "via either Gigabit Ethernet or 10 Gigabit Ethernet controllers. The currently (June 2014) sold systems with 1 Gbit/s connections are the PS4100, PS6100 and PS6200 while the comparable systems with 10 Gbit/s Ethernet connections are PS4110, PS6110 and PS6210. There have been a number of previous generations, and as long as the software is updated on older systems they can work with the newer models. Within each series there are several options allowing for different types and sizes of hard disk drives or solid-state drives. EqualLogic options combine both in the same chassis and automatically migrate the most frequently", "-27.665553726212238" ], [ "In a departure from both 10BASE-T and 100BASE-TX, 1000BASE-T and faster use all four cable pairs for simultaneous transmission in both directions through the use of telephone hybrid-like signal handling. For this reason, there are no dedicated transmit and receive pairs. 1000BASE-T and faster require either a straight or one of the crossover variants only for the autonegotiation phase. The physical medium attachment (PMA) sublayer provides identification of each pair and usually continues to work even over cable where the pairs are unusually swapped or crossed. Twisted pair In practice, it does not matter if non-crossover Ethernet cables are wired", "-27.661267001179112" ], [ "(CNT). They both offered 50 megabytes per second (MB/s) bandwidth between controllers but at that time, their architecture was not implemented using standard networking protocols and their applications were generally focused on supporting connectivity at high speed between large mainframes and peripherals, often only implementing only point-to-point connections. Ethernet was available in 1986 and was used by most computer centers for general networking purposes. Its bandwidth was not high enough to manage the high data rate required by the 100 MB/s supercomputer channels and 4 MB/s VMEbus channels on workstations.\nUltra's first customer, Apple Computer, purchased a system to connect their", "-27.63517176557798" ], [ "low.\nEthernet standards require electrical isolation between the networked device (computer, phone, etc.) and the network cable up to 1500 V AC or 2250 V DC for 60 seconds. USB has no such requirement as it was designed for peripherals closely associated with a host computer, and in fact it connects the peripheral and host grounds. This gives Ethernet a significant safety advantage over USB with peripherals such as cable and DSL modems connected to external wiring that can assume hazardous voltages under certain fault conditions. MIDI The USB Device Class Definition for MIDI Devices allows Music Instrument Digital Interface (MIDI) music data to be sent", "-27.633898990166927" ], [ "while HDLC and USB use bit stuffing: they insert an additional 0 bit (forcing a transition) after 5 or 6 (respectively) consecutive 1 bits. While bit stuffing is efficient, it results in a variable data rate because it takes slightly longer to send a long string of 1 bits than it does to send a long string of 0 bits.\nSynchronized NRZI (NRZI-S, SNRZI) and group-coded recording (GCR) are modified forms of NRZI. In NRZI-S, each 8-bit group is extended to 9 bits by a 1 in order to establish a transition for synchronisation. Randomized non-return-to-zero Return-to-zero describes a", "-27.57579146148055" ], [ "extend the power delivery limits for battery charging and devices requiring up to 100 watts. USB has been selected as the standard charging format for many mobile phones, reducing the proliferation of proprietary chargers. Connectors The three sizes of USB connectors are the default or standard format intended for desktop or portable equipment, the mini intended for mobile equipment , and the thinner micro size, for low-profile mobile equipment such as mobile phones and tablets. There are five speeds for USB data transfer: Low Speed, Full Speed, High Speed (from version 2.0 of the specification), SuperSpeed (from version 3.0), and", "-27.385981686093146" ], [ "Virtual LAN History After successful experiments with voice over Ethernet from 1981 to 1984, Dr. W. David Sincoskie joined Bellcore and began addressing the problem of scaling up Ethernet networks. At 10 Mbit/s, Ethernet was faster than most alternatives at the time. However, Ethernet was a broadcast network and there was no good way of connecting multiple Ethernet networks together. This limited the total bandwidth of an Ethernet network to 10 Mbit/s and the maximum distance between nodes to a few hundred feet.\nBy contrast, although the existing telephone network's speed for individual connections was limited to 56 kbit/s (less than one", "-27.354183524788823" ], [ "cable plugs, allowing devices with USB 3.0 Micro-B ports to run at USB 2.0 speeds on USB 2.0 Micro-B cables. However, it is not possible to plug a USB 3.0 Micro-B plug into a USB 2.0 Micro-B receptacle, due to a physically larger connector. Backward compatibility USB 3.0 and USB 2.0 (or earlier) Type-A plugs and receptacles are designed to interoperate.\nUSB 3.0 Type-B receptacles, such as those found on peripheral devices, are larger than in USB 2.0 (or earlier versions), and accept both the larger USB 3.0 Type-B plug and the smaller USB 2.0 (or earlier) Type-B plug. USB 3.0 Type B plugs are larger than USB 2.0 (or earlier) Type-B", "-27.341448028026207" ], [ "later standards 10 Mbit/s technology has been largely replaced by faster Fast Ethernet, Gigabit Ethernet and 100 Gigabit Ethernet standards. 10BASE-FL 10BASE-FL is the most commonly used 10BASE-F specification of Ethernet over optical fiber. In 10BASE-FL, FL stands for fiber optic link. It replaces the original fiber-optic inter-repeater link (FOIRL) specification, but retains compatibility with FOIRL-based equipment. When mixed with FOIRL equipment, maximum segment length is limited to FOIRL's 1000 meters. 10BASE-FB The 10BASE-FB is a network segment used to bridge Ethernet hubs. Here FB abbreviates FiberBackbone. Due to the synchronous operation of 10BASE-FB, delays normally associated with Ethernet repeaters are", "-27.290422774647595" ], [ "a faster speed, now possible using new transistor designs. However, there is a physical limit to performance because of the time it takes signals to move between parts of the machine, which in turn is defined by its physical size. As always, Cray's design work spent considerable effort on this problem and thus allow higher operating frequencies. For the 7600, each circuit module actually consisted of up to six printed circuit boards, each one stuffed with subminiature resistors, diodes, and transistors. The six boards were stacked up and then interconnected along their edges, making a very compact, but basically unrepairable", "-27.283959303138545" ], [ "Terabit Ethernet Terabit Ethernet or TbE is Ethernet with speeds above 100 Gbit/s. 400 Gigabit Ethernet (400G, 400GbE) and 200 Gigabit Ethernet (200G, 200GbE) standards developed by the IEEE P802.3bs Task Force using broadly similar technology to 100 Gigabit Ethernet were approved on December 6, 2017. In 2016, several networking equipment suppliers were already offering proprietary solutions for 200G and 400G.\nThe Ethernet Alliance's 2019 technology roadmap expects speeds of 800 Gbit/s and 1.6 Tbit/s become IEEE standard after 2020, possibly in 2025. Doubling to 800 GbE is expected to occur after 112 Gbit/s SerDes become available. The Optical Internetworking Forum (OIF) has already announced five new projects", "-27.21423236146802" ], [ "25 Gigabit Ethernet 25 Gigabit Ethernet and 50 Gigabit Ethernet are standards for Ethernet connectivity in a datacenter environment, developed by IEEE 802.3 task forces 802.3by and 802.3cd and are available from multiple vendors. History An industry consortium, 25G Ethernet Consortium, was formed by Arista, Broadcom, Google, Mellanox Technologies and Microsoft in July 2014 to support the specification of single-lane 25-Gbit/s Ethernet and dual-lane 50-Gbit/s Ethernet technology. The 25G Ethernet Consortium specification draft was completed in September 2015 and uses technology from IEEE Std. 802.3ba and IEEE Std. 802.3bj.\nIn November 2014, an IEEE 802.3 task force was formed to develop", "-27.159578564489493" ], [ "the additional transitions associated with it double the signal bandwidth. Network design 10BASE2 coax cables have a maximum length of 185 metres (607 ft). The maximum practical number of nodes that can be connected to a 10BASE2 segment is limited to 30 with a minimum distance of 50 centimetres (20 in) between devices. In a 10BASE2 network, each stretch of cable is connected to the transceiver (which is usually built into the network adaptor) using a BNC T-connector, with one stretch connected to each female connector of the T. The T-connector must be plugged directly into the network adaptor with no cable", "-27.147486453988677" ], [ "Carrier Ethernet Background Ethernet has a long history. It has become dominant in enterprise networks. This dominance has led to high production-volume components, which in turn have allowed extremely low cost per bit. Likewise Ethernet has a long history of re-inventing itself. From the original copper coaxial cable format (\"thicknet\") it has extended its scope to nearly all copper, optical fiber and wireless physical media. Bit rates have continued to increase, traditionally growing tenfold each time a new rate is defined. Gigabit Ethernet interfaces are widely deployed in PCs and servers, and 10 Gbit/s in local area network (LAN) backbones.\nRates", "-27.121185136202257" ], [ "Mini-USB, but approximately half the thickness, enabling their integration into thinner portable devices. The Micro-A connector is 6.85 by 1.8 mm (0.270 by 0.071 in) with a maximum overmold boot size of 11.7 by 8.5 mm (0.46 by 0.33 in), while the Micro-B connector is 6.85 by 1.8 mm (0.270 by 0.071 in) with a maximum overmold size of 10.6 by 8.5 mm (0.42 by 0.33 in).\nThe thinner Micro-USB connectors were introduced to replace the Mini connectors in devices manufactured since May 2007, including smartphones, personal digital assistants, and cameras. \nThe Micro plug design is rated for at least 10,000 connect-disconnect cycles, which is more than the Mini", "-27.092328126047505" ], [ "and gave rise to the Fast SCSI and Wide SCSI variants. Fast SCSI doubled the maximum transfer rate to 10 MB/s and Wide SCSI doubled the bus width to 16 bits on top of that to reach a maximum transfer rate of 20 MB/s. However, these improvements came at the cost of reducing the maximum cable length to three meters. SCSI-2 also specified a 32-bit version of Wide SCSI, which used two 16-bit cables per bus. The 32-bit implementation was largely ignored because it was expensive and unnecessary, and was officially retired in SCSI-3. SCSI-3 Before Adaptec and later SCSITA", "-27.07512437751575" ], [ "Today, RS-232 has mostly been replaced in personal computers by USB for local communications. Advantages compared to RS-232 are that USB is faster, uses lower voltages, and has connectors that are simpler to connect and use. Disadvantages of USB compared to RS-232 are that USB is far less immune to electromagnetic interference (EMI) and that maximum cable length is much shorter (15 meters for RS-232 v.s. 3 - 5 meters for USB depending on USB speed used).\nIn fields such as laboratory automation or surveying, RS-232 devices may continue to be used. Some types of programmable logic controllers, variable-frequency drives, servo", "-27.019545290750102" ], [ "while two lanes implement bidirectional USB 3.1 Gen 2 channel between the PC and the headset. Unlike the classic DisplayPort USB-C alternate mode, VirtualLink has no USB 2.0 channels active, instead providing a higher speed USB 3.1 Gen 2 (SuperSpeed+) over the same A6, A7, B7, B6 pins. VirtualLink also requires the PC to provide 15 to 27 Watts of power. No information pertaining to VirtualLink alternate mode compatibility with USB4 (and so Thunderbolt 3 alternate mode) has been published, as of April 2019.\nTo achieve 6 high-speed lanes over USB-C, VirtualLink requires special cables that conform to version 1.3 of", "-27.006668323941994" ], [ "establish an aggregate 2-gigabit connection using two 1-gigabit NICs teamed together. Note the data signaling rate will still be 1Gbit/s, which can be misleading depending on methodologies used to test throughput after link aggregation is employed. Microsoft Windows Microsoft Windows Server 2012 supports link aggregation natively. Previous Windows Server versions relied on manufacturer support of the feature within their device driver software. Intel, for example, released Advanced Networking Services (ANS) to bond Intel Fast Ethernet and Gigabit cards.\nNvidia also supports \"teaming\" with their Nvidia Network Access Manager/Firewall Tool. HP also has a teaming tool for HP branded NICs which will", "-26.936790784064215" ], [ "hundredth of Ethernet's speed), the total bandwidth of that network was estimated at 1 Tbit/s (100,000 times greater than Ethernet).\nAlthough it was possible to use IP routing to connect multiple Ethernet networks together, it was expensive and relatively slow. Sincoskie started looking for alternatives that required less processing per packet. In the process he independently reinvented transparent bridging, the technique used in modern Ethernet switches. However, using switches to connect multiple Ethernet networks in a fault-tolerant fashion requires redundant paths through that network, which in turn requires a spanning tree configuration. This ensures that there is only one", "-26.891097367328257" ], [ "this points straight down at the surface on which the computer rested. The gate array's connector points directly to the computer's rear, making the cable connection much easier and reliable.\nAn improvement was made in the computer's speed of execution. The original Model 4, though advertised as a 4 MHz machine, actually performs at an effective speed of approximately 3.5 MHz because Z80 wait states are inserted for bus transactions with the slower PAL support circuitry. The Gate Array CPU board allows the Tandy engineers to clock the Z80 at 4 MHz without wait states. These make some third-party hardware modifications, particularly speedup kits, troublesome", "-26.889824478625087" ], [ "draw full power from a single USB3 port. A USB2 phone will probably charge faster since 900 mA is \"available\" to it.\nUSB 3.0 ports may implement other USB specifications for increased power, including the USB Battery Charging Specification for up to 1.5 A or 7.5 W, or, in the case of USB 3.1, the USB Power Delivery Specification for charging the host device up to 100 W. Availability The USB 3.0 Promoter Group announced on 17 November 2008 that the specification of version 3.0 had been completed and had made the transition to the USB Implementers Forum (USB-IF), the managing body of USB specifications.", "-26.873574963232386" ], [ "frequencies; however, the increased complexity leads to implementation difficulties, higher power consumption, and greater costs. Since all current G.fast implementations are limited to 106 MHz, non-linear precoding yields little performance gain. Instead, current efforts to deliver a gigabit are focusing on bonding, power and more bits per hertz. Deployment scenarios The Broadband Forum is investigating architectural aspects of G.fast and has, as of May 2014, identified 23 use cases. Deployment scenarios involving G.fast bring fiber closer to the customer than traditional VDSL2 FTTN (fiber to the node), but not quite to the customer premises as in FTTH (fiber to the", "-26.862345732210088" ], [ "speeds and do not support alternate modes.\nAll USB-C cables must be able to carry a minimum of 3 A current (at 20 V, 60 W) but can also carry high-power 5 A current (at 20 V, 100 W). USB-C to USB-C cables supporting 5A current must contain e-marker chips programmed to identify the cable and its current capabilities. USB Charging ports should also be clearly marked with capable power wattage.\nFull-featured USB-C cables that implement USB 3.1 Gen 2 can handle up to 10 Gbit/s data rate at full duplex. They are marked with a SuperSpeed+ (SuperSpeed 10 Gbit/s) logo. There are also cables which can carry only USB 2.0 with up", "-26.84364566007571" ], [ "and products which will also considerably increase speeds. This feature may not be compatible with other equipment. Compression Broadcom, another chipmaker, developed a competing proprietary frame-bursting feature called \"125 High Speed Mode\" or Linksys \"SpeedBooster\", in response to criticism of Super G's interference potential.\nU.S. Robotics also had a \"MAXg\" line of wireless products boasting 125 Mbit/s (actual throughput 35 Mbit/s) and about a 75% increase in signal range from the 802.11g standard. Based on tests performed by KeyLabs on March 23, 2005 the MAXg series consistently outperformed the equivalent proprietary solutions and some of the \"Draft 802.11n\" solutions from", "-26.78264991188189" ], [ "pF. This does not correspond to a fixed length of cable since varying cables have different characteristics. Empirically tested combinations of bit rate, serial ports, cable type, and lengths may provide reliable communications, but generally RS-232-compatible ports are intended to be connected by, at the most, a few tens of metres of cable. Other serial communications standards are better adapted to drive hundreds or thousands of metres of cable.", "-26.764169767004205" ], [ "15, 1998 in the US. Steve spoke about the USB port. It was 30x faster than the old Apple serial ports. Up to 127 devices could be plugged into the USB port. It was Hot Plug-able. It had dynamic drivers. It was an emerging industry standard. Steve reviewed Apple's software strategy. It started with Mac OS 8 and Mac OS X. The modern features of Mac OS X were: Protected Memory, Virtual Memory, Preemptive Multitasking, Fast Networking, Fast File I/O, Fully PPC Native, and Runs OS 8 Apps. Mac OS 8.1 shipped in First Quarter 1998. Mac OS 8.5", "-26.73979935089301" ], [ "to external hard drives and SSDs. eSATA's transfer rate (up to 6 Gbit/s) is similar to that of USB 3.0 (up to 5 Gbit/s on current devices; 10 Gbit/s speeds via USB 3.1, announced on 31 July 2013). A device connected by eSATA appears as an ordinary SATA device, giving both full performance and full compatibility associated with internal drives.\neSATA does not supply power to external devices. This is an increasing disadvantage compared to USB. Even though USB 3.0's 4.5 W is sometimes insufficient to power external hard drives, technology is advancing and external drives gradually need less power, diminishing the eSATA advantage. eSATAp (power over", "-26.728179018708033" ], [ "speeds reduced the impact of collisions on overall throughput, and Ethernet costs dropped.\nIn the early 1980s ARCNET was much cheaper than Ethernet, in particular for PCs. For example, in 1985 SMC sold ARCNET cards for around US$300 whilst an Ungermann-Bass Ethernet card plus transceiver could cost US$500.\nAnother significant difference is that ARCNET provides the sender with a concrete acknowledgment (or not) of successful delivery at the receiving end before the token passes on to the next node, permitting much faster fault recovery within the higher level protocols (rather than having to wait for a timeout on the expected replies). ", "-26.696844862948637" ], [ "preferred it over the more common USB 2.0 for its then greater effective speed and power distribution capabilities. Benchmarks show that the sustained data transfer rates are higher for FireWire than for USB 2.0, but lower than USB 3.0. Results are marked on Apple Mac OS X but more varied on Microsoft Windows. Intellectual property considerations Implementation of IEEE 1394 is said to require use of 261 issued international patents held by 10 corporations. Use of these patents requires licensing; use without license generally constitutes patent infringement. Companies holding IEEE 1394 IP formed a patent pool with MPEG LA, LLC", "-26.666206858615624" ], [ "Ethernet.\nAs of early 2016, chassis/modular based core router platforms from Cisco, Juniper and other major manufacturers support 400 Gbit/s full duplex data rates per slot. One, two and four port 100GbE and one port 400GbE line cards are presently available, with 200GbE expected to become available after 802.3cd standard ratification. Standards development The IEEE formed the \"IEEE 802.3 Industry Connections Ethernet Bandwidth Assessment Ad Hoc\", to investigate the business needs for short and long term bandwidth requirements.\nIEEE 802.3's \"400 Gb/s Ethernet Study Group\" started working on the 400 Gbit/s generation standard in March 2013. Results from the study group were published", "-26.662969464072376" ], [ "IO Accelerator Specifications The mezzanine adapter connects to the blade server using a PCI Express ×4 link, uses less than 9 watts, has bandwidth up to 800 MB/s and latency as low as 50 microseconds.\nThe PCIe adapter connects to the server using a PCI Express version 1.0 ×4 link, ×8 link, or version 2.0 ×4 link, depending on model.\nThe IO Accelerator was initially offered in capacities of 80 GB, 160 GB, and 320 GB. The 320 GB model uses MLC NAND, whereas the other two models used SLC NAND. The 80 GB and 160 GB are now discontinued, and a new 640 GB model has", "-26.62996734608896" ], [ "access speed is limited by the upstream link to the ISP. LANs may be wired or wireless. Ethernet over twisted pair cabling and Wi-Fi are the two most common technologies used to build LANs today, but ARCNET, Token Ring, Localtalk, FDDI, and other technologies were used in the past.\nEthernet is the name of the IEEE 802.3 standard for physical LAN communication and Wi-Fi is a trade name for a wireless local area network (WLAN) that uses one of the IEEE 802.11 standards. Ethernet cables are interconnected via switches & routers. Wi-Fi networks are built using one or more wireless antenna", "-26.583568295187433" ], [ "USB hardware This article provides information about the physical aspects of Universal Serial Bus, USB: connectors, cabling, and power. The initial versions of the USB standard specified connectors that were easy to use and that would have acceptable life spans; revisions of the standard added smaller connectors useful for compact portable devices. Higher-speed development of the USB standard gave rise to another family of connectors to permit additional data paths. All versions of USB specify cable properties; version 3.X cables include additional data paths. The USB standard included power supply to peripheral devices; modern versions of the standard", "-26.524894470063373" ], [ "USB 2.0 or 3.0 slots, HDMI output, and a 3.5 mm jack. Lower level output is provided by a number of general-purpose input/output (GPIO) pins which support common protocols like I²C. Current models have an Gigabit Ethernet (8P8C) port and eMMC module socket.", "-26.507009226967057" ], [ "cables), up to 15 m (active cables), or up to 100 m in length (active optical cables). Like 10GBASE-CX4, DA is low-power, low-cost and low-latency with the added advantages of using less bulky cables and of having the small form factor of SFP+. SFP+ Direct Attach today is tremendously popular, with more ports installed than 10GBASE-SR. Backplane Backplane Ethernet, also known by its task force name 802.3ap, is used in backplane applications such as blade servers and modular routers/switches with upgradable line cards. 802.3ap implementations are required to operate in an environment comprising up to 1 metre (39 in) of copper printed circuit", "-26.48931434986298" ], [ "can be used for either 10GBASE ethernet or for stacking of switches at (slightly) lower latency. Some examples of combi stacking/ethernet are Dell PowerConnect PCT6200, PCT7000 and the 1G Powerconnect blade switches PCM6220 and PCM6348. SFP+ Direct Attach Also known as Direct Attach (DA), Direct Attach Copper (DAC), 10GSFP+Cu, 10GBASE-CR, 10GBASE-CX1, SFP+, or 10GbE Cu SFP cables. Short Direct Attach cables use a passive twin-ax cable assembly while longer ones, sometimes called active optical cable (AOC) use short wavelength optics. Both types connect directly into an SFP+ housing. SFP+ Direct Attach has a fixed-length cable, typically 1 to 7 m (passive", "-26.44327891676221" ], [ "it. Etisalat have chosen not to improve their ADSL speeds any further, as they have already started implementing high speed cable connections using fiber optics, which supports speeds up to 500Mbps.", "-26.424571924297197" ], [ "as keyboards and mice, to PCs. The USB is a Plug and Play bus that can handle up to 127 devices on one port, and has a theoretical maximum throughput of 480 Mbit/s (high-speed USB defined by the USB 2.0 specification). Because USB ports are standard features of PCs, they are a natural evolution of conventional serial port technology. However, it is not widely used in building industrial test and measurement systems for several reasons (e.g., USB cables are rarely industrial grade, are noise sensitive, are not positively attached and so are rather easily detachable, and the maximum distance between", "-26.417645538866054" ], [ "and 100-Mbit/s configurations for other purposes. The spare pairs may be used for power over Ethernet (PoE), for two plain old telephone service (POTS) lines, or for a second 10BASE-T or 100BASE-TX connection. In practice, great care must be taken to separate these pairs as 10/100-Mbit/s Ethernet equipment electrically terminates the unused pins. Shared cable is not an option for Gigabit Ethernet as 1000BASE-T requires all four pairs to operate. Single-pair In addition to the more computer-oriented two and four-pair variants, the 100BASE-T1 and 1000BASE-T1 single-pair Ethernet PHYs are intended for automotive applications or as optional data channels in other", "-26.379027021248476" ], [ "the USB-C standard and uses shielded differential pairs for both USB 2.0 pairs.\nThe available bandwidth is estimated to be equivalent to DisplayPort 1.4 (32.4 Gbit/s, up to 4K @ 120 Hz with 8 bpc color) for video and 10 Gbit/s of USB 3.1 Gen 2 data.\nNvidia GeForce 20 series cards, initially released in 2018, implement a single VirtualLink port in all RTX Founders Edition (FE) cards (2060, 2070, 2080, 2080 Ti). This port is also available on Quadro RTX cards.", "-26.366528830491006" ], [ "cable separately. It has a web upload speed of 48kbit/s.", "-26.33374390762765" ], [ "this to 5,000 cycles, and the newer Micro-USB and USB-C receptacles are both designed for a minimum rated lifetime of 10,000 cycles of insertion and removal. To accomplish this, a locking device was added and the leaf-spring was moved from the jack to the plug, so that the most-stressed part is on the cable side of the connection. This change was made so that the connector on the less expensive cable would bear the most wear.\nIn standard USB, the electrical contacts in a USB connector are protected by an adjacent plastic tongue, and the entire connecting assembly is usually protected", "-26.318925476065488" ], [ "test and paying a licensing fee. All devices are tested according to the latest specification, so recently compliant low bandwidth devices are also 2.0 devices. USB 3.0 USB 3 uses tinned copper stranded AWG-28 cables with 90±7 Ω impedance for its high-speed differential pairs and linear feedback shift register and 8b/10b encoding sent with a voltage of 1 V nominal with a 100 mV receiver threshold; the receiver uses equalization. SSC clock and 300 ppm precision is used. Packet headers are protected with CRC-16, while data payload is protected with CRC-32. Power up to 3.6 W may be used. One unit load in Super Speed mode is", "-26.298203345533693" ], [ "connector provides up to two PCI Express 3.0 lanes as a pure PCI Express connection to the storage device, allowing bandwidths of up to 2 GB/s.\nInstead of the otherwise usual approach of doubling the native speed of the SATA interface, PCI Express was selected for achieving data transfer speeds greater than 6 Gbit/s. It was concluded that doubling the native SATA speed would take too much time, too many changes would be required to the SATA standard, and would result in a much greater power consumption when compared to the existing PCI Express bus.\nIn addition to supporting legacy Advanced Host Controller Interface", "-26.28544163704646" ], [ "to about 300 m (1,000 ft). For longer distances, other signal standards, such as RS-422, are better suited for higher speeds.\nSince the standard definitions are not always correctly applied, it is often necessary to consult documentation, test connections with a breakout box, or use trial and error to find a cable that works when interconnecting two devices. Connecting a fully standard-compliant DCE device and DTE device would use a cable that connects identical pin numbers in each connector (a so-called \"straight cable\"). \"Gender changers\" are available to solve gender mismatches between cables and connectors. Connecting devices with different types of connectors requires", "-26.258788499602815" ], [ "reduced, thus allowing segment distances to be extended without compromising the collision detection mechanism. The maximum allowable segment length for 10BASE-FB is 2000 meters. This media system allowed multiple half-duplex Ethernet signal repeaters to be linked in series, exceeding the limit on the total number of repeaters that could be used in a given 10 Mbit/s Ethernet system. 10BASE-FB links were attached to synchronous signaling repeater hubs and used to link the hubs together in a half-duplex repeated backbone system that could span longer distances. FOIRL Fiber-optic inter-repeater link (FOIRL) is a specification of Ethernet over optical fiber. It was especially", "-26.254543155257124" ], [ "devices, such as keyboards and mice, to PCs. The USB is a Plug and Play bus that can handle up to 127 devices on one port, and has a theoretical maximum throughput of 480 Mbit/s (high-speed USB defined by the USB 2.0 specification). Because USB ports are standard features of PCs, they are a natural evolution of conventional serial port technology. However, it is not widely used in building industrial test and measurement systems for a number of reasons; for example, USB cables are not industrial grade, are noise sensitive, can accidentally become detached, and the maximum distance between the", "-26.204479377018288" ] ]
607you
Can someone explain the controversy over male circumcision?
[ "Many people don't believe you should cut off functioning parts of the body of toddlers who can't consent, for no benefit.", "The controversy is that parents are removing a piece of their child's flesh, which may reduce sexual sensation as an adult, for what many to believe to be very overrated, and ultimately unnecessary, medical reasons. So on the one side, you have people who say, \"It's tradition, and it makes it easier to clean the penis.\" On the other side, you have people who say, \"You're mutilating your child's genitals for no good reason, and we'd all be appalled if you were cutting of their ears or something, so why is this any different?\"", "For years, doctors claimed cutting the foreskin was \"hygienic\" and everyone followed along; it was culturally expected for a while. This practice was also done for religious purposes. Today, we know the pseudoscience behind the \"hygiene\" is false, and cutting the foreskin has no medical benefits. Many people believe that with the knowledge we now have, the practice is barbaric and should be discontinued until the person is old enough to consent to the procedure.", "Circumcision is primarily a cosmetic surgical procedure done on the genitals of newborns. There is nothing else like it that is deemed acceptable in Western medicine. There are some marginal health benefits, such as decreased rates of UTIs, decreased transmission of certain STIs, decreased risk of penile cancer, etc. However, all of these things are either very rare in anatomically normal, healthy boys, or are better prevented by other means (condom usage, hygiene education, HPV vaccination, etc). In short, it's a cosmetic surgery done on pediatric patients that are unable to give informed consent, with very questionable utility in preventative medicine." ]
[ [ "regarding circumcision of male children on 27 May 2010. The KNMG argues against circumcising male minors due to lack of evidence the procedure is useful or necessary, its associated risks, and violate the child's autonomy. They recommend deferring circumcision until the child is old enough to decide for himself. The Royal Dutch Medical Association questions why the ethics regarding male genital alterations should be viewed any differently from female genital alterations, when there are mild forms of female genital alterations (like pricking the clitoral hood without removing any tissue or removing the clitoral hood altogether). They have expressed opposition to", "-33.50333510429482" ], [ "Male circumcision has been practiced as a surgical means of sexual repression in some cultures, although it may be practiced for various reasons, with the World Health Organization recommending it as a means of reducing HIV/AIDS. Circumcision is also a religious tradition in Judaism and Islam. According to medieval Jewish theologian Moses Maimonides, the \"reason\" for male circumcision is \"the wish to bring about a decrease in sexual intercourse and a weakening of the organ in question, so that this activity be diminished and the organ be in as quiet a state as possible.\" \nIn the late-nineteenth century, circumcision of", "-33.26432636776008" ], [ "against women.\" Male Circumcision Male circumcision involves the removal of the foreskin from the penis. It is a surgical procedure in which the foreskin is opened and separated from the glans. The procedure is most commonly performed on children for religious and cultural reasons. It can also be performed for the treatment of certain medical conditions such as urinary tract infections, phimosis and balanoposthitis. Historical Origins The origins of circumcision date back to 2400 B.C.E. in Egypt, where an engraving of an adult male being circumcised was found in the tomb of Ankh-Mahor at Saqqara. It is believed that the", "-32.95031537167961" ], [ "to bodily integrity goes hand in hand with his or her sexual autonomy.\" Controversy in India While circumcision debates are often dominated by the concerns of Anglophone countries, very different controversies over the procedure regularly erupt in other cultural contexts. In South Asia, Pakistan has long used circumcision status as a definitive marker of Indian covert involvement in its internal affairs. But this assumption was thrown into confusion when it was discovered that large segments of its own Muslim male population, specifically from western tribal areas, were themselves uncircumcised. Controversy in Israel Opposition to circumcision exists among Jews in", "-32.75891600002069" ], [ "released by the United Nations and numerous other international bodies opposes female circumcision as a form of mutilation. Whether or not male circumcision amounts to mutilation is a subject of academic debate. The Danish Society for General Medicine has declared non-medical male circumcision an ethically unacceptable mutilation while the Parliamentary Assembly of the Council of Europe has condemned non-medical male circumcision as a \"violation of the physical integrity of children\".\nCastration is also a form of mutilation, as are body piercing, some forms of extreme body modification, and some cosmetic surgery. Punishment Maiming, or mutilation which involves the loss of, or", "-32.44340119262051" ], [ "the Ngo ya Tuiritu heard that there are men who talk of female circumcision, and we get astonished because they (men) do not give birth and feel the pain and even some die and even others become infertile, and the main cause is circumcision. Because of that the issue of circumcision should not be forced. People are caught like sheep; one should be allowed to cut her own way of either agreeing to be circumcised or not without being dictated on one's own body.\"\nElsewhere, support for the practice from women was strong. In 1956 in Meru, eastern Kenya, when the", "-32.038971796864644" ], [ "such as clanging or hissing, inversion or pressure during restraint. Brit milah (circumcision ritual) The Jewish practice of brit milah, or circumcision of infant males, has been attacked in both ancient and modern times as \"painful\" and \"cruel\", or tantamount to genital mutilation due to its being conducted without the boy's consent.\nHellenistic culture found circumcision to be repulsive, circumcision was regarded as a physical deformity, and circumcised men were forbidden to participate in the Olympic Games. Some Hellenistic Jews practised epispasm. In the Roman Empire, circumcision was regarded as a barbaric and disgusting custom. According to the Talmud, the consul", "-31.967755326943006" ], [ "both male circumcision and all forms of female circumcision, however they do not advocate a prohibition of male circumcision and prefer that circumcisions be done by doctors instead of illegal, underground circumcisers .\nOn the contrary, the Dutch Council on Public Health and Care does not agree with the Royal Dutch Medical Organisation and states that they wrongly do not distinguish between male and female circumcision and that they do not take into account freedom of religion and the right of parents to raise their children according their own beliefs or convictions. Scandinavia In 2013 children's ombudsmen from Sweden, Norway, Finland,", "-31.66935118136462" ], [ "evidence that male circumcision protects against HIV infection or other STIs\". The CDC concludes \"There are as yet no convincing data to help determine whether male circumcision will have any effect on HIV risk for men who engage in anal sex with either a female or male partner, as either the insertive or receptive partner.\" Men who have sex with men A 2008 meta-analysis of gay and bisexual men (52% circumcised) found that the rate of HIV infection was not lower among men who were circumcised. For men who engaged primarily in insertive anal sex, no effect was observed.", "-31.584581029426772" ], [ "mutilation of female minors, with some exceptions based on medical need. Opponents of male circumcision assert that laws against genital modification and mutilation of minors should apply equally to males and females.\nMany anti-circumcision groups have joined the International Coalition for Genital Integrity and endorsed its declaration, which was adopted by the First International Symposium on Circumcision, on March 3, 1989, at Anaheim, California (there have been nine such further symposia held since, with the proceedings of several subsequently published in book form). Intact America, founded in 2008, and other organizations such as Genital Autonomy America, the American Academy of Pediatrics,", "-31.46311768506348" ], [ "with whom she has had sex:\nIt has been thought that circumcision perfects what is defective congenitally. This gave the possibility to everyone to raise an objection and to say: How can natural things be defective so that they need to be perfected from outside, all the more because we know how useful the foreskin is for that member? In fact this commandment has not been prescribed with a view to perfecting what is defective congenitally, but to perfecting what is defective morally. The bodily pain caused to that member is the real purpose of circumcision. None of the activities necessary", "-31.39359225894441" ], [ "Muslim and Jewish communities, criticized the ruling as an attack on religious freedom. Necla Kelek inserted herself into the debate. In an article in Die Welt, she wrote: \"The circumcision of Muslim boys is an equally repulsive archaic custom as female genital mutilation among little girls. It is an instrument of oppression, and should be ostracized.\" Since November 2017, she is official \"ambassador\" for the registered association intaktiv e. V., which is against circumcision of male children.", "-31.23910148924915" ], [ "those highly educated members of parliament like Linah Kilimo, can be accused of not being mature enough to be taken seriously. To others the practice of female circumcision is known as female genital mutilation, and draws a great deal of criticism from both abroad and many women who have undergone it, such as Maasai activist Agnes Pareyio. It has recently been replaced in some instances by a \"cutting with words\" ceremony involving singing and dancing in place of the mutilation. However, the practice remains deeply ingrained and valued by the culture. The Maa word for circumcision, \"emorata,\" is used for", "-31.035669563920237" ], [ "the argument which states that there is an indirect correlation between Islam and female circumcision fails to explain why female circumcision is not practiced in much of the Islamic world, and conversely is practiced in Latin American countries such as Brazil, Mexico and Peru.\nThe French intellectual, journalist and translator Renée Saurel observed that female circumcision and FGM more generally directly contradict Islam's sacred text: \"The Koran, contrary to Christianity and Judaism, permits and recommends that the woman be given physical and psychological pleasure, pleasure found by both partners during the act of love. Forcibly split, torn, and severed tissues are", "-30.994271180796204" ], [ "Islamic theological justification for female circumcision: \"If circumcision for the man (though not compulsory) has an aesthetic and hygienic purpose, there is no existing religious Islamic text of value to be considered in favour of female excision, as proven by the fact that this practice is totally non-existent in most of the Islamic countries.\"\nMahmud Shaltut, the former Sheikh of Al-Azhar in Cairo – one of the most important religious offices in Sunni Islam – also stated that female circumcision has no theological basis: \"Islamic legislation provides a general principle, namely that should meticulous and careful examination of certain issues prove", "-30.923421262003103" ], [ "and the violation of the child's autonomy. Adult circumcision In a paper published June 2006, the British Medical Association Committee on Medical Ethics does not consider circumcision of an adult male to be controversial, provided that the adult is of sound mind and grants his personal consent after receiving all material information regarding the known risks, disadvantages, and potential benefits to be derived from the surgical operation.\nCircumcision of adults as a public health measure for the purpose of reducing the spread of HIV also involves ethical concerns such as informed consent and concerns about reducing attention paid to other measures.", "-30.772877358540427" ], [ "this interpretation, physically incapable of committing zinā. Sodomy Muslim scholars justify the prohibition of sodomy, anal sex (liwat) and oral sex, on the basis of the Qur'anic verse 2:223, saying that it commands intercourse only in the vagina (i.e. potentially procreational intercourse). The vaginal intercourse may be in any manner the couple wishes, that is, from behind or from the front, sitting or with the wife lying on her back or on her side.\nThere are also several hadith which prohibit sodomy.\nDo not have anal sex with women.\n— Reported by Ahmad, At-Tirmidhi, An-Nasa'i, and Ibn Majah\nMuhammad also said, \"Cursed he. ..who has", "-30.547638305033615" ], [ "not be violated. Female circumcision is a cruel and degrading customary practice and is tantamount to torture. The circumcision of girls is prohibited.\" This change followed the local ban in the region of Putland in 2014.\nShe attended an event to celebrate Women's Day in Mogadishu in March 2015. In July, Samatar condemned the rumours surrounding a new gender law which sought to give men and women equal rights, after rumours spread that it was legalising same sex marriage in contrary to Islamic law, calling the claims \"propaganda and baseless report\". Personal life Samatar is a member of the Tumal clan.", "-30.517931636597496" ], [ "societies where circumcision of girls is completely prohibited, hypersexuality takes over the entire society, and a woman is not satisfied with one person, or two, or three. This, God forbid, is now happening even in Muslim societies where they prohibit circumcision. They use a mistake in practice to prohibit the tradition, and they end up causing a lot of damage on the extreme side of the sexual life of the woman.\nThe comments were brought to light by a tweet by the Middle East Media Research Institute in June, which links to the video, originally posted on the mosque's YouTube", "-30.498764672673133" ], [ "Denmark, and Iceland, along with the Chair of the Danish Children's Council and the children's spokesperson for Greenland, passed a resolution that emphasized the decision to be circumcised should belong to the individual, who should be able to give informed consent.\nThe Nordic Association of Clinical Sexologists supports the position of the Nordic Association of Ombudsmen who reason that circumcision violates the individual's human rights by denying the male child his ability to make the decision for himself.\nThe medical doctors at Sørland Hospital in Kristiansand, Southern Norway have all refused to perform circumcisions on boys, citing reasons of conscience. United Kingdom", "-30.48092755372636" ], [ "in this instance\". Children's rights It has been reported that female circumcision has been carried out in New South Wales, Victoria and Western Australia. The act has been a criminal offence since the 1990s. The first criminal trial concerning female circumcision in Australia ended with the conviction of three members of the Dawoodi Bohra Shia Muslim community in November 2015 and in 2016 a community leader was imprisoned. There are reportedly 120,000 migrant women living in Australia who have had their genitals mutilated.\nA study, conducted by researchers from the Australian paediatric surveillance unit at Westmead Children's Hospital in Sydney, has", "-30.46740502229659" ], [ "Ethics of circumcision Australia and New Zealand The Royal Australasian College of Physicians (2010) released a statement indicating that neonatal male circumcision \"generally considered an ethical procedure\", provided that 1) the child's decision makers, typically the parents, are acting in best interest of child and have been given full knowledge and 2) the procedure is performed by a competent provider, with sufficient analgesia, and does not unnecessarily harm the child or have substantial risks. They argue that parents should be allowed to be the primary decision-makers because providers may not understand the full psychosocial benefits of circumcision. Additionally, this procedure", "-30.432752262437134" ], [ "same issue of the Journal of Medical Ethics; \"Circumcision of Male Infants as a Human Rights Violation, Journal of Medical Ethics, 2013; Tortured Bodies, Tortured Minds, Informed Consent as a Legal Fiction Inapplicable to Male Circumcision,\" in The Rights of the Child: Ensuring Every Child's Fundamental Right to Body Ownership and Protection from Medical, Cultural, and Religious Infringements (G.C. Denniston et al., eds., Springer, 2013), \"Promoting Genital Autonomy by Exploring Commonalities Between Male, Female, Intersex, and Cosmetic Female Genital Cutting,\" Global Discourse, Summer 2012, \"A Rose By Any Other Name: Rethinking the Similarities and Differences between Male and Female Genital", "-30.401272602612153" ], [ "called for the reintroduction of customary circumcision after it was banned by Zulu king Shaka in the 19th century. Similar issues, though on a smaller scale, have arisen with traditional circumcision of Aborigines in remote areas of central Australia. Controversy in Germany On June 26, 2012, a court in Cologne, Germany ruled that circumcision was \"inflicting bodily harm on boys too young to consent\", deciding that the practice contravenes the \"interests of the child to decide later in life on his religious beliefs\". The decision was based on the article \"Criminal Relevance of Circumcising Boys. A Contribution to the Limitation", "-30.323485639411956" ], [ "by several groups, to be a form of violence against young men and boys. The International Criminal Court considers forced circumcision to be an \"inhumane act\". Some court decisions have found it to be a violation of a child's rights. In certain countries, such as Australia, Bangladesh, Canada, Indonesia, Pakistan, the Philippines, South Korea, Turkey and the United States, newborn baby males are routinely circumcised without the child's consent. As well, the Jewish and Muslim faiths circumcise boys at a young age. It is also practiced in Coptic Christianity and the Ethiopian Orthodox Church.\nAlthough a 2012 court ruling in Germany", "-30.193620906138676" ], [ "Judaism and masturbation Orthodox Judaism The Talmud forbids male masturbation, as it leads to unnecessary spilling of semen, or the impure thoughts of women other than the man's lawful wife. This prohibition is derived from the Biblical narrative of Onan (Talmud Niddah 13a). The Talmud (ibid) likens the act to murder and idolatry. The wrath displayed by God toward Onan was invoked not through the act of spilling semen, but through disobedience to God's command for Onan to impregnate his brother's widow (see the story in Genesis 38:8-10). Others consider the death sentence excessive for failure to properly follow the", "-30.1624418690335" ], [ "calls on ending and banned to Female Circumcision in some parts of the Muslim world, especially in rural Africa where most still practice it. His views were supported by Sheikhs in Al-Azhar. Female Masturbation Qaradawi urged women to not masturbate and elaborated that its dangerous to stick things into the vagina. Homosexuality On 5 June 2006, on the Al Jazeera program Sharia and Life, al-Qaradawi (a regular on the program) reiterated orthodox views on homosexuality. When asked about the punishment for people who \"practise liwaat (sodomy) or sihaaq (lesbian activity)\", al-Qaradawi replied: \"The same punishment as any sexual pervert –", "-30.14879069008748" ], [ "(L. 3,5,6) punished sodomy with banishment and castration. Within the term \"castration\" were included all sexual crimes considered unnatural, such as male homosexuality, anal sex (heterosexual and homosexual) and zoophilia. Lesbianism was considered sodomy only if it included phallic aids.\nIt was King Chindasuinth (642–653) who dictated that the punishment for homosexuality should be castration. Such a harsh measure was unheard of in Visigoth laws, except for the cases of Jews practising circumcision. After being castrated, the culprit was given to the care of the local bishop, who would then banish him. If he was married, the marriage was declared void,", "-30.03684839631569" ], [ "changes in sleep patterns, irritability, changes in feeding, and parental bonding. Some men who were circumcised as infants described their feelings about the procedure using the terms \"violation, torture, mutilation and sexual assault\". Prevalence Circumcision is one of the world's most widely performed procedures. Approximately 37% to 39% of males worldwide are circumcised, about half for religious or cultural reasons. It is most often practiced between infancy and the early twenties. The WHO estimated in 2007 that 664,500,000 males aged 15 and over were circumcised (30–33% global prevalence), almost 70% of whom were Muslim. Circumcision is most common in", "-30.033375847124262" ], [ "American Civil Liberties Union, and Centers for Disease Control strive to raise public awareness on the biological and sexual functions of the foreskin, alter policy and change attitudes toward male infant circumcision in the United States.\nHowever, linking male circumcision to female genital mutilation (FGM) is itself highly controversial. Organizations actually involved in combating FGM have been at considerable pains to distinguish the two, as this UNICEF document explains: \"When the practice first came to be known beyond the societies in which it was traditionally carried out, it was generally referred to as 'female circumcision'. This term, however, draws a direct", "-30.03320291035925" ], [ "guidance, information, and resources to support the delivery of safe male circumcision services in countries that choose to scale up the procedure as one component of comprehensive HIV prevention services. Cultures and religions In some cultures, males are generally required to be circumcised shortly after birth, during childhood or around puberty as part of a rite of passage. Circumcision is commonly practiced in the Jewish and Islamic faiths. Judaism Circumcision is very important to most branches of Judaism, with over 90% of male adherents having the procedure performed as a religious obligation. The basis for its observance is found", "-29.944551011256408" ], [ "still births in circumcised women is not because of the FGM they underwent but because they delay receiving prenatal care and visiting hospitals because they fear being stigmatized by the medical staff because of their circumcision.\nFGM supporters believe that FGM prevents prostitution by decreasing a woman's sexual desire, and is more hygienic. According to a five-year research done by Hanny Lightfoot-Klein, an anti-FGM activist, 94% of circumcised women reported being satisfied by their sex lives and had sex between three and four times a week.\nAnti-FGM advocates state that more than 80% of women who experience it reported suffering a minimum", "-29.929352277547878" ], [ "are often subjected to medical operations to their genitalia and other sex characteristics to make them conform to a male or female appearance or nature. These practices have been criticised by human rights institutions and practitioners, and intersex advocates, as human rights abuses, violating rights to live free from violence and harmful practices, and rights to bodily autonomy, integrity and dignity, drawing parallels to female genital mutilation. Decision-making principles Decision-making principles were published in 2010 by Gillam, Hewitt and Warne, three clinicians associated with the Royal Children’s Hospital, Melbourne and Murdoch Childrens Research Institute. The principles include minimizing \"psychosocial risks\"", "-29.884312439273344" ], [ "but also physically and mentally unhealthy, stimulating the foreskin to produce the host of maladies of which it was suspected. In this climate, circumcision could be employed as a means of discouraging masturbation. All About the Baby, a popular parenting book of the 1890s, recommended infant circumcision for precisely this purpose. (However, a survey of 1410 men in the United States in 1992, Laumann found that circumcised men were more likely to report masturbating at least once a month.) As hospitals proliferated in urban areas, childbirth, at least among the upper and middle classes, was increasingly under the care of", "-29.82612286041035" ], [ "of the genitals\". This is a form of exhibitionism found in religion or artwork, rather than a display for arousal, and it always refers to the act of a woman exposing herself. The act of lifting up one's skirt to display the genitals can be an apotropaic device; it can, in circumstances of war, evoke the fear of the enemy. It can also be an act that evokes surprise and subsequent laughter and a letting go of sadness. What is significant about anasyrma is that it reflects the numinous quality of the female genitals and the genital region through which", "-29.817787862426485" ], [ "against the procedures on behalf of human rights, stating that it is \"a violation of the human rights of girls and women\" and \"reflects deep-rooted inequality between the sexes\". Female genital mutilation has existed at one point or another in almost all human civilizations, most commonly to exert control over the sexual behavior, including masturbation, of girls and women. It is carried out in several countries, especially in Africa, and to a lesser extent in other parts of the Middle East and Southeast Asia, on girls from a few days old to mid-adolescent, often to reduce sexual desire in an", "-29.768388244032394" ], [ "the wife agrees; and (2), if the wife does not agree, then it is preferable to refrain.\nDespite the formal disapproval of religious authority, gender segregation in Muslim societies and the strong emphasis on virility leads adolescents and unmarried young men to seek alternative sexual outlets to women, especially with males younger than themselves. Not all sodomy is homosexual, but for many young men heterosexual sodomy is considered better than vaginal penetration, and female prostitutes report the demand for anal penetration from their male clients.", "-29.75536487431964" ], [ "and that irrespective of how the life was created, after 120 days an abortion becomes impermissible, forbidden. Female circumcision Tantawy opposed female circumcision calling it un-Islamic, especially in 1997, when he said \"The ulema (theologians) of Islam are unanimous in agreeing that female circumcision has nothing to do with religion\" and revealed his own daughter had not been circumcised. Suicide bombings Tantawy initially took a line against suicide bombings, and unlike his compatriot Yusuf al-Qaradawi, he condemned the use of suicide bombings against Israelis, rejecting the argument that all Israelis were legitimate targets, because at some stage they would all", "-29.69755719305249" ], [ "Rajm. However, Hanabali scholars insist that homosexuality among men must be punished by beheading, instead of Rajm as recommended by the Maliki madhab of Islam. Maliki Maliki school of jurisprudence (fiqh) holds that stoning is the required punishment for illegal sex by a married or widowed person, as well as for any form of homosexual relations among men. Malik ibn Anas, founded of Maliki fiqh, considered pregnancy in an unmarried woman as a conclusive proof of zina. He also stated that contested pregnancy is also sufficient proof of adultery and any Muslim woman who is pregnant by a man who", "-29.672901419049595" ], [ "being used in the name of political correctness to mask the hammering that women are taking. When The Female Eunuch was written our daughters were not cutting or starving themselves. On every side speechless women endure endless hardship, grief and pain, in a world system that creates billions of losers for every handful of winners. It's time to get angry again.\nHer comments on female genital mutilation (FGM) proved controversial, particularly that opposition to it is an \"attack on cultural identity\", just as outlawing male circumcision would be viewed as an attack on Jews and Muslims. Greer wrote that feminists fighting", "-29.63708113163011" ], [ "context is the removal of the testicles. Sometimes the term (meaning \"cutting\") is also used to refer to penis removal, but that is less common. Castration has been performed in many cultures throughout history, but is now rare. In the 21st century, castration has been reported among slave boys in South Asia. It should not be confused with chemical castration. Hemi-castration The removal of one testicle (sometimes referred to as unilateral castration) is usually done in the modern world only for medical reasons. Circumcision Circumcision is the surgical removal of part or all of the foreskin from the penis. It", "-29.635610167504638" ], [ "her hair in one.\nIn some cultures, girls' passing through puberty is viewed with concern for a girl's chastity. In some communities, there is a traditional belief that female genital mutilation is a necessity to prevent a girl from becoming sexually promiscuous. The practice is dangerous, however, and leads to long-term health problems for women who have undergone it. The practice has been a custom in 28 countries of Africa, and persists mainly in rural areas. This coming-of-age custom, sometimes incorrectly described as \"female circumcision\", is being outlawed by governments, and challenged by human rights groups and other concerned community", "-29.58581457841501" ], [ "for congenital abnormality in 1890. But as late as 1936, L. E. Holt, an author of pediatric textbooks, advocated both circumcision and female genital mutilation as a treatment for masturbation.\nThe first serious questioning of the practice did not occur until late 1949, when the paediatrician Douglas Gairdner, D. M., published The Fate of the Foreskin in the British Medical Journal; according to Wallerstein, this began to seriously affect the practice of circumcision in Great Britain. According to Darby and Cox, the persistence of circumcision in the US has led to more vigorous protest movements. A 1980 protest march at the", "-29.570431305939564" ], [ "circumcision. This ruling came about after a conference instigated by research and a documentary on FGM in Somalia by the German action group Target. The fatwa is now also used in Western Europe to combat FGM.\nOn 24 June 2007, after an 11-year-old died under the knife undergoing circumcision, he decreed that female circumcision was not just \"un-Islamic\" but forbidden. Views on women According to Dr James Dorsey of Nanyang Technological University, \"Gomaa asserted in 2015 that women did not have the strength to become heart surgeons, serve in the military, or engage in sports likes soccer, body building, wrestling and", "-29.546547702761018" ], [ "the penis was prescribed by John Harvey Kellogg as a \"cure\" for masturbation. William Acton, a leading authority on sexuality in mid-Victorian Britain, advocated male circumcision in order to prevent \"undue excitement of the sexual desires … which it is our object to repress.\"\nA \"biocultural analysis\" of male circumcision supports the hypothesis \"that a practical consequence of circumcision, complementary to any religious-symbolic function, is to make a circumcised male less sexually excitable and distractible, and, hence, more amenable to his group's authority figures.\" Honor killings An honor killing is the homicide of a member of a family or social group", "-29.542796837398782" ], [ "to be considered as Sunnah. Trimming is taught to be considered acceptable.\nIn the 1980s, some strippers and pornographic actresses adopted a more radical trimming of their pubic hair in response to the fear of the HIV/AIDS epidemic and other STDs and contagions.\nThe reason for the removal of pubic hair from women in pornography was a matter of \"technical considerations of cinematography\". Hair removal progressed to full removal. Because of the popularity of pornography, pubic hair shaving was mimicked by women.\nThe presentation is regarded by some as being erotic and aesthetic, while others consider the style as unnatural. Some people", "-29.506421119440347" ], [ "of situational sexual behavior in which women confined to a harem or harem-like situation may engage in sexual acts with the other women confined with them, either because it is encouraged by the master of the harem and/or the other women, as a form of sexualized social bonding, as a way of \"training\" new members, or in the cases of women who would otherwise consider themselves strictly heterosexual, then simply because there are no available men to become intimate with.\nWhile \"harem\" refers to the now largely antiquated practice of a very wealthy or influential man, such as a king or", "-29.49928712262772" ], [ "concerns that led to the widespread adoption of this surgical procedure at this time. The first was a growing belief within the medical community regarding the efficacy of circumcision in reducing the risk of contracting sexually transmitted diseases, such as syphilis. The second was the notion that circumcision would lessen the urge towards masturbation, or \"self abuse\" as it was often called.\nThe tradition of circumcision is said to have been practiced within the British Royal Family, with varying accounts regarding which monarch started it: either Queen Victoria on account of her rumored adherence to British Israelism and the notion she", "-29.430871822172776" ], [ "elective circumcision of male newborns outweigh the risks of the procedure, although the health benefits are not great enough to recommend routine circumcision for all male newborns, and that parents ultimately should decide whether circumcision is in the best interests of their male child.\nAfter the release of the position statement, a debate appeared in the journal Pediatrics and the Journal of Medical Ethics. In 2013, a group of 38 Northern European pediatricians, doctors, surgeons, ethicists and lawyers co-authored a comment stating that they found the AAP's technical report and policy statement suffered from cultural bias, and reached recommendations and conclusions", "-29.336588199655125" ], [ "a practice that is neither advocated in Islam nor appears in Quran, but has been adopted by some Muslim societies, as mentioned in the film by Qanta Ahmed...the film presents a Muslim preacher, Sheikh Yussuf Al Badri, from Al Azhar Islamic University in Cairo, saying: “circumcision is the reason why Muslim women are virtuous, unlike Western women who run after their sexual appetite in any place with any man.” When considering this example, I just wonder why filmmakers have chosen to play up the views of this scholar rather than the anti-circumcision views advocated by the film...For me, it gives", "-29.335971898632124" ], [ "that the act of vaginal intercourse is an \"unequal act\" for males and females, due to issues such as pregnancy, increased risk of STDs, and risk of physical injury if the girl is too young and not physically ready. In the US, in Michael M. v. Superior Ct.450 U.S. 464 (1981) it was ruled that the double standard of offering more legal protection to girls is valid because \"the Equal Protection Clause does not mean that the physiological differences between men and women must be disregarded\".\nTraditionally, many age of consent laws dealt primarily with men engaging in sexual acts with", "-29.28826402455161" ], [ "debate. He is a critic of the practice of male circumcision, arguing that it should only be a legal procedure for boys above the age of 15, the Danish age of sexual consent.", "-29.248304830180132" ], [ "for electric shock treatment, infibulation, restraining devices like chastity belts and straitjackets, cauterization or – as a last resort – wholesale surgical excision of the genitals. Routine neonatal circumcision was widely adopted in the United States and the UK at least partly because of its believed preventive effect against masturbation (see also History of male circumcision). In later decades, the more drastic of these measures were increasingly replaced with psychological techniques, such as warnings that masturbation led to blindness, hairy hands or stunted growth. Some of these persist as myths even today. Referring to such viewpoints and treatments, Messer and", "-29.24593621439999" ], [ "operation was in wide practice. The original reason for the surgical removal of the foreskin, or prepuce, was to control 'masturbatory insanity' – the range of mental disorders that people believed were caused by the 'polluting' practice of 'self-abuse.'\"\n\"Self-abuse\" was a term commonly used to describe masturbation in the 19th century. According to Paige, \"treatments ranged from diet, moral exhortations, hydrotherapy, and marriage, to such drastic measures as surgery, physical restraints, frights, and punishment. Some doctors recommended covering the penis with plaster of Paris, leather, or rubber; cauterization; making boys wear chastity belts or spiked rings; and in extreme cases,", "-29.20942673816171" ], [ "of the BMA statement: \"The law and ethics of male circumcision: guidance for doctors (2003). Journal of Medical Ethics circumcision issue, July 2013 The Journal of Medical Ethics devoted the entire July 2013 issue to the controversial issue of non-therapeutic circumcision of male children. The numerous articles represent a diverse variety of views. Other views Povenmire (1988) argues that parents should not have the power to consent to neonatal non-therapeutic circumcision.\nRichards (1996) argues that parents only have power to consent to therapeutic procedures.\nSomerville (2000) argues that the nature of the medical benefits cited as a justification for infant circumcision are", "-29.203372313728323" ], [ "however, does not nullify the marriage and the wife must seek divorce if she is to leave her husband.\nMuslim scholars justify the prohibition on the basis of the Qur'anic verse 2:223, saying that it commands intercourse only in the vagina (i.e. potentially procreational intercourse). The vaginal intercourse may be in any manner the couple wishes, that is, from behind or from the front, sitting or with the wife lying on her back or on her side.\nThere are also several hadith which prohibit sodomy.\nFrom the story of Lot it is clear that the Qur'an regards sodomy as an egregious sin. The", "-29.17706179289962" ], [ "properly denies it as regards the maiming of the body. Birth control and the purpose of sexuality Prior to this encyclical, it was believed by some Catholics that the only licit reason for sexual intercourse was an attempt to create children. At the time, there was no official church position on any non-procreative purposes of intercourse. Casti connubii does repeat several times that the conjugal act is intrinsically tied with procreation:\n... any use whatsoever of matrimony exercised in such a way that the act is deliberately frustrated in its natural power to generate life is an offense against", "-29.167074712837348" ], [ "out of necessity. He also permitted masturbation as a means whereby soldiers, far away from their wives on a tour of duty may remain chaste. The four Sunni schools of jurisprudence (known as Madhaahib - the Hanafi, Shafi'i, Maliki and Hanbali schools of Fiqh) have differing stances on the issue. Some see it forbidden in certain cases (i.e. if it leads a man/woman to ignore their spouse sexually) but recommended it when they see it as a lesser evil to illicit sex. It is generally prohibited according to the Hanafi and Hanbali Mazhabs, unless one fears adultery or fornication, or", "-29.124205012223683" ], [ "Mental Rotation test—providing some limited support to the virilization hypothesis of female promiscuity (see also Prenatal hormones and sexual orientation). The aforementioned hypothesis is not at all mutually exclusive with other hypotheses.\nLibido is correlated with the menstrual cycle so that many women experience an increase in sexual desire several days immediately before ovulation. Testosterone levels rise gradually from about the 24th day of a woman's menstrual cycle until ovulation on about the 14th day of the next cycle. During the high-testosterone period before ovulation, a woman typically feels more attracted to masculine facial features and is more likely to pursue", "-29.124019688082626" ], [ "issued a decree in 1996 declaring female circumcision unlawful and punishable under the Penal Code, and according to UNICEF the prevalence of women who have had this procedure has slowly declined from a baseline of 97% of women aged 15–49 since 1995. According to a report in the British Medical Journal BMJ, \"[t]he issue came to prominence...when the CNN television news channel broadcast a programme featuring a young girl being circumcised by a barber in Cairo. ...Shocked at the images shown worldwide, the Egyptian president was forced to agree to push legislation through the People's Assembly to ban the operation\".", "-29.110258088694536" ], [ "to being administered one (e.g., under the pretence of being constipated). An enema can be an auxiliary to, or even a substitute for, genital sexual activity.\nThat some women use enemas while masturbating was documented by Kinsey, A. in \"Sexual Behavior in the Human Female.\" He stated, \"There still [are] other masturbatory techniques which were regularly or occasionally employed by some 11 percent of the females in the sample ... enemas, and other anal insertions, ... were employed.\"\nEnemas are sometimes used in sadomasochistic activities for erotic humiliation or for physical discomfort.\nAn enema can be employed prior to anal sexual activities such", "-29.106144393444993" ], [ "which he failed to show up for. The charges insisted that both Hollick’s papier-mâché mannequin and the distribution of anatomically correct diagrams of sex organs were obscene, edging on pornographic. However, the first charges were eventually dropped due to witnesses dismissal of the mannequin as obscene, but rather informational, which only reaffirmed the widely held belief that Hollick’s teachings provided a fresh, welcoming view of sex. Even though charges still remained against Hollick, the rising support by his followers pushed him to forfeit the bail, leave Philadelphia behind, and begin a new life in New York to share his teachings", "-29.082968048664043" ], [ "a practice that formerly fell into the category of Type IV female genital mutilation. In 2008, The World Health Organisation reclassified the practice as a body modification due to a perceived lack of harm and a reported much more positive perception of women's sexuality by those who practice it.", "-29.06725010050286" ], [ "sexual intercourse while a woman is menstruating (see niddah). In order to decrease the chance of menstruation occurring just before (or on) the wedding night, some brides briefly regulate their periods in the months leading up to their wedding. Male contraception In the Mishneh Torah, Hilchot Issurei (21:18)–which is part of the Maimonides' Law Code from the medieval period–it is stated that expending semen for no purpose is forbidden as a man holds the sole responsibility in the act of procreation. Because the commandant for this duty rests on the man, any form of male contraception or sterilization is prohibited", "-29.029178803641116" ], [ "the adult entertainment business, who have undergone breast augmentation but have maintained their genitalia.\" Willow Arune wrote, \"Using the term she-male for a transsexual woman would be considered highly offensive, for it implies that she is working 'in the [sex] trade.' It may be considered libelous.\" Melissa Hope Ditmore, of the Trafficked Persons Rights Project, notes the term \"is an invention of the sex industry, and most transwomen find the term abhorrent.\" Biologist and transgender activist Julia Serano notes that it remains \"derogatory or sensationalistic.\" According to sex columnist Regina Lynn, \"Porn marketers use 'she-male' for a very specific purpose", "-29.025729107670486" ], [ "is abomination.\" (Leviticus, 18:22). However, Rashi interpreted the matter as only prohibiting anal sexual acts between two men (and not other sexual acts between them), as he stated: \"As one would penetrate a blue-brush into a receiver.\" But other authoritative commentators of the Torah see all sexual acts between two males to be included within the ban on \"sperm in vain\", which is a separate prohibition that is not limited to intercourse and which could include solitary sex (i.e. masturbation). The Jewish sages added additional barriers to this ban, and forbid males to put themselves in any situation that might", "-29.009122159041" ], [ "this occurrence allows Alan to realize that sex is a natural thing for all men, even his father. Alan walks Jill home after they leave. She convinces Alan to come to the stables with her.\nOnce there, Jill seduces Alan and the two undress and attempt to have sex. However, Alan breaks this off when he hears the horses making noises in the stables beneath, which he decides is the reason for his inability to get an erection. Jill tries to ask Alan what the problem is, but he shouts at her to leave. After Jill dresses and walks out of", "-29.007144349394366" ], [ "ejaculation is banned, male ejaculation and its consumption remain acceptable. Although the British Board of Film Classification reports that the pornographic act it most regularly censors is \"scenes of choking and gagging during deep throat fellatio\", there is no suggestion of banning these acts—only ones that see a woman receiving pleasure from sitting on a man's face.\nPandora Blake, webmaster of the BDSM-themed site Dreams of Spanking, insinuated that the sites shut down for failure to comply with the regulations \"have been gay sites and female domination. No BDSM sites with female submissives have been targeted because that [women's subordination] is", "-28.99561451887712" ], [ "are considered zināʾ (fornication), including adultery and homosexuality, according to Islamic law and exegesis of the Qur'an. From the story of Lot it is clear that the Qur'an regards sodomy as an egregious sin. The death by stoning for people of Sodom and Gomorrah is similar to the stoning punishment stipulated for illegal heterosexual sex. There is no punishment for a man who sodomizes a woman because it is not tied to procreation. However, other jurists insist that any act of lust in which the result is the injecting of semen into another person constitutes sexual intercourse.\nIn Islam, oral sex", "-28.92913415102521" ], [ "circumcision as a treatment for masturbation.\nThe first serious questioning of the practice did not occur until late 1949 when Gairdner published The Fate of the Foreskin in the British Medical Journal; according to Wallerstein this began to affect the practice of circumcision in the United Kingdom.\nAccording to Darby and Cox, the persistence of circumcision in the US has led to more vigorous protest movements. A 1980 protest march at the California State Capitol was reported in an Associated Press article. The National Organization of Circumcision Information Resource Centers (NOCIRC), was formed by Marilyn Milos, R.N., in 1985. The organization's stated", "-28.921743159065954" ], [ "two women is prohibited. Extramarital sex In Judaism, extramarital sex is universally frowned upon; according to some authorities, it even falls under a biblical prohibition. The written Torah never forbids sex outside the context of marriage, with the exception of adultery and incest. According to Exodus 22:16, the man who entices a woman who isn't betrothed must marry her afterwards, unless her father refuses to allow him Exodus 22:17. Still, extramarital sex is forbidden in rabbinical Judaism. Male Despite not having been explicitly prohibited in the Torah, the Halakha and the Oral Torah view masturbation as an Halakhic prohibition and", "-28.886689122533426" ], [ "Confessions, which is based in part on the crime.\nAnother widely circulated rumor (sometimes used to counter claims that Short was a prostitute) holds that Short was unable to have sexual intercourse because of a congenital defect that resulted in gonadal dysgenesis, also known as \"infantile genitalia\". Los Angeles County district attorney's files state that the investigators had questioned three men with whom Short had engaged in sex, including a Chicago police officer who was a suspect in the case; FBI files on the case also contain a statement from one of Short's alleged lovers. Short's autopsy itself, which was reprinted", "-28.879757508453622" ], [ "and a study reporting that the procedure is a determinant of chastity in Egyptian girls. He also blamed the controversy about the procedure on the fact that the \"West wants to impose its culture and philosophy on us\". The ban was controversial in the medical community as well. In the debates leading up to the ban, a gynecologist at Cairo University, said that \"Female circumcision is entrenched in Islamic life and teaching,\" and, \"called on the government to implement training programmes for doctors to carry out the operation under anaesthesia. Another doctor reportedly said, \"If my daughter is not circumcised", "-28.85744865793822" ], [ "Sodomy law Criminalization The Middle Assyrian Law Codes (1075 BC) state: If a man has intercourse with his brother-in-arms, they shall turn him into a eunuch. This is the earliest known law condemning the act of male-to-male intercourse in the military.\nIn the Roman Republic, the Lex Scantinia imposed penalties on those who committed a sex crime (stuprum) against a freeborn male minor. The law may also have been used to prosecute male citizens who willingly played the passive role in same-sex acts. The law was mentioned in literary sources but enforced infrequently; Domitian revived it during his program of judicial", "-28.85367245739326" ], [ "nappy-wearing sexual deviant, who said he was 'a little bit gay'. It called Mary a rape victim, said the birth of Jesus was because 'the condom split', ridiculed His wounds on the cross and the sacrament of Holy Communion, had God as an ineffectual old man who needed guidance from Jerry Springer and finished up with Springer as a counterfeit saviour of mankind who told Jesus to \"Grow up for Christ's sake and put some f***ing clothes on.\"\nThe group maintained a presence outside the Cambridge Theatre in London where it ran. It then mounted protests outside every theatre on", "-28.850760947942035" ], [ "in vain, in addition to having its own prohibition. According to many opinions, even marital sexual acts in which the sperm does not enter the vagina are considered no less an act of sperm in vain.\nThe Sefer Hasidim, however, states that if a man's sexual desire is so great that he afraid of committing a worse sin, then he is allowed to masturbate in order to avoid a worse sin. Female Yosef Hayyim in Ben Ish Chai said that the Halakha is that female masturbation is wrong because it creates evil forces (Qliphoth) and brings the woman to connect spiritually", "-28.83234944157084" ], [ "includes the possibility that societal double standards may scare more men than women into not talking about or otherwise revealing their sex fantasies (corroborated by the existence of characteristics that differ between male volunteers and male nonvolunteers, but not between female volunteers and female nonvolunteers, in erotica research) giving a false appearance of men having narrower ranges of sexual fantasies than women, and the possibility that men who want to be castrated out of their spiritual beliefs may have to commit sex crimes and claim that it was due to uncontrollable urges to get castrated since such surgery is not", "-28.81412158269086" ], [ "article, \"The International Crime of Female Genital Mutilation,\" was published in the March 1979 issue of Ms.. The article reported on the \"75 million women suffering with the results of genital mutilation.\" According to Steinem, \"The real reasons for genital mutilation can only be understood in the context of the patriarchy: men must control women's bodies as the means of production, and thus repress the independent power of women's sexuality.\" Steinem's article contains the basic arguments that would later be developed by philosopher Martha Nussbaum.\nOn male circumcision, she commented, \"These patriarchal controls limit men's sexuality too  ... That's why men", "-28.801595237826405" ], [ "of circumcision \"remained a central rite\" and the Union for Reform Judaism has, since 1984, trained and certified over 300 practicing mohels under its \"Berit Mila Program\". Humanistic Judaism argues that \"circumcision is not required for Jewish identity.\"\nThe circumcision consists of three procedures, the first being the cutting of the foreskin. The second is the priah, or peeling back of the epithelium after the foreskin has been amputated. According to Shaye J. D. Cohen, in Why Aren't Jewish Women Circumcised?: Gender and Covenant in Judaism, pg 25, the Torah only commands circumcision (milah). David Gollaher has written that the rabbis", "-28.76649744916358" ], [ "Female genital mutilation Terminology Until the 1980s FGM was widely known in English as female circumcision, implying an equivalence in severity with male circumcision. From 1929 the Kenya Missionary Council referred to it as the sexual mutilation of women, following the lead of Marion Scott Stevenson, a Church of Scotland missionary. References to the practice as mutilation increased throughout the 1970s. In 1975 Rose Oldfield Hayes, an American anthropologist, used the term female genital mutilation in the title of a paper in American Ethnologist, and four years later Fran Hosken, an Austrian-American feminist writer, called it mutilation in her influential", "-28.75538772062282" ], [ "delinquent in his early years, as Sean says to Christian, \"I've spent too many years trying to corral your bad genetics\". Season One Matt worries about sex with his girlfriend, Vanessa, and her possible reaction to his foreskin. He tells his parents that he wants to have a circumcision; Sean declines to perform the procedure, telling Matt there is nothing wrong with not being circumcised. However, when Vanessa is turned off, Matt decides to circumcise himself after reading a 'how-to guide' on the Internet. Unsurprisingly, his attempt goes wrong and Sean and Christian are forced to perform the operation properly.", "-28.74711449656752" ], [ "the Prophet. He replied, \"Last night I turned my wife over,\" meaning that he had had vaginal intercourse with her from the back. The Prophet did not say anything to him until the verse cited above was revealed. Then he told him, \"[Make love with your wife] from the front or the back, but avoid the anus and intercourse during menstruation.\"\n— (Reported by Ahmad and At-Tirmidhi)\nFurthermore, it is reported that Muhammad referred to anal sex as \"minor incest\".\nIslamic law establishes two categories of legal, sexual relationships: between husband and wife, and between a man and his concubine. All other sexual relationships", "-28.69864174904069" ], [ "to be in the child's best interests, and there is valid consent from both parent or the child if it is capable of expressing a view. American Academy of Pediatrics The American Academy of Pediatrics currently has no official stance on neonatal circumcision. Criticism The expired American Academy of Pediatrics (AAP) position statement on male circumcision (2012) has attracted significant critical comment, including from the AAP itself.\nIn a dissenting paper, Frisch et al point out \"Circumcision fails to meet the criteria to serve as a preventive measure for UTI [...] As a preventive measure for penile cancer, circumcision also fails", "-28.695952765468974" ], [ "According to the CDC website, research has documented a significant reduction of HIV/AIDS transmission when a male is circumcised. Child circumcision In the same British Medical Association paper, circumcision of a child to treat a clear and present medical indication after a trial of conservative treatment also is not considered to be ethically questionable, provided that a suitable surrogate has granted surrogate consent after receiving all material information regarding the known risks, disadvantages, and potential benefits to be derived from the surgical operation. Criticism and revision of BMA statement The BMA statement of 2003 took the position that non-therapeutic circumcision", "-28.695248512609396" ], [ "death by stoning for people of Sodom and Gomorrah is similar to the stoning punishment stipulated for illegal heterosexual sex. There is no punishment for a man who sodomizes a woman because it is not tied to procreation. However, other jurists insist that any act of lust in which the result is the injecting of semen into another person constitutes sexual intercourse.\nSodomy often falls under that same category as sex between and unmarried man and women engaging in sexual acts. Male-male intercourse is referred to as liwat (literally, \"joining\") while female-female intercourse is referred to as sihaq (literally, \"rubbing\"). Both", "-28.685180972708622" ], [ "trans women have undergone penectomies, however this is much rarer. Personal reasons Issues related to the removal of the penis appear in psychology, for example in the condition known as castration anxiety, which happens as a result of a man having anxiety as to whether he may at some point become castrated.\nPeople who are third gender will sometimes want an emasculation by choosing to have their penis, testicles, or both removed.\nMale members in the sect of skoptsy (Russian: скопцы, \"castrated\") were required to become castrated, either only the testicles (\"lesser seal\") or also the penis (\"greater seal\").", "-28.646234738931525" ], [ "Cunnilingus Cunnilingus is an oral sex act performed by a person on the female genitalia (the clitoris, other parts of the vulva or the vagina). The clitoris is the most sexually sensitive part of the human female genitalia, and its stimulation may result in female sexual arousal or orgasm.\nCunnilingus can be sexually arousing for participants and may be performed by a sexual partner as foreplay to incite sexual arousal before other sexual activities (such as vaginal or anal intercourse) or as an erotic and physically intimate act on its own. Like most forms of sexual activity, oral sex can be", "-28.604588542875717" ], [ "bed together: two are committing debauchery (stuprum), two are being debauched.\"\n\"Doesn't that make four men?\"\n\"You're mistaken: the man on either end each counts as a single offense, but the one in the middle both acts and is acted on.\" Masturbation Masturbation is little noted in the sources for Roman sexuality. Martial has a few mentions in his poems, but considers it an inferior form of sexual release resorted to by slaves, though he admits to masturbating when a beautiful slave-boy is too expensive to obtain: \"my hand relieved me as a substitute for Ganymede\".\nMasturbation was a longstanding if infrequent theme", "-28.603835683432408" ], [ "He exclaims, \"But I'm gay! I don't like vaginas!\" when Mrs. Garrison tries to reason by explaining that she's the same person, only with a vagina instead of a penis.\nAs he has now been persuaded to endorse cosmetic surgery, Gerald Broflovski allows his son to undergo the negroplasty. Meanwhile, Mrs. Garrison is puzzled by the absence of her period. Believing she is pregnant, she cheerfully decides to have an abortion. However, since she does not have ovaries and a uterus, she cannot menstruate, become pregnant, nor have an abortion (it is then revealed that the primary reason for having sex-reassignment", "-28.577686667151283" ], [ "Nullo (body modification) The term nullo (or smoothie) refers to an extreme body modification subculture made up mostly of men who have had their genitals (and sometimes also their nipples) surgically removed. Nullos are not necessarily transgender; most identify as eunuchs. They are often either asexuals or submissive homosexuals. The term nullo is short for genital nullification. Though the procedure is mostly done by men, there are women who also voluntarily have their vagina stitched closed and clitoris removed.\nOne of the most famous nullos is Mao Sugiyama, a Japanese artist and asexual activist who in 2012 had his genitals surgically", "-28.575322307180613" ], [ "of Pornography and sexual representation: a reference guide notes that pornography actresses in the 1960s and 1970s did not trust birth control methods, and that more than one actress of the period told him that ejaculation inside her body was deemed inconsiderate if not rude. Transmission of disease Any sexual activity that involves contact with the bodily fluids of another person contains the risk of transmission of sexually transmitted diseases. Semen is in itself generally harmless on the skin or if swallowed. However, semen can be the vehicle for many sexually transmitted infections, such as HIV and hepatitis. The California", "-28.569584054406732" ], [ "Audiovisual Media Services Regulations 2014 Protests Upon going into force on 1 December 2014, the regulations were subject to immediate criticism, much of it arising from the debates around \"female ejaculation\". A Vice interview with BBFC officials indicated that apparent \"female ejaculation\" was regularly cut due to restrictions on urolagnia, and the difficulty of distinguishing what could be \"female ejaculation\" from straightforward urination. A blog for the New Statesman highlighted that many of the activities were popular in the LGBT and BDSM communities or related to expressions of female sexuality. Myles Jackman, an obscenity lawyer, expressed concerns that the regulations", "-28.506733173067914" ], [ "and Levite gifts (Lev. 21:16–24). Islam In Islam, castration is considered a sin and strictly forbidden, whether one performs it on himself or on another. As Abdullah ibn Mas'ood said, \"We were on a campaign with the Messenger of Allah (blessings and peace of Allah be upon him), and we had no women with us. We said: Why don't we get ourselves castrated? But he forbade us to do that.\" Medical consequences A subject of castration who is altered before the onset of puberty will retain a high voice, non-muscular build, and small genitals. He may well be shorter than", "-28.506216139066964" ], [ "her \"unwavering commitment to righting a wrong.\" She received NurseWeek magazine's Nursing Excellence 2001 Patient Advocacy Award. Criticism According to Michael and David Benatar, \"[Milos's] argument begs the question. It assumes that circumcision disfigures and injures. Yet this is exactly what is in dispute in debates about whether circumcision constitutes mutilation.\" Louis J. Kern feels her view of sexual matters is \"angry, confrontational, emotionally exploitative, and sensationalist.\" Bernhard Ohanian, writing in 1986, claims that \"Jews are quick to see undertones of anti-Semitism\" in Milos's arguments. Conversely, Jews have also critiqued the practice.", "-28.502284292306285" ], [ "\"styles\" of the circumcision of a Muslim vary on every individual, and change in the light of new medical knowledge.\nEarlier, instead of being carried out in hospitals, they would be carried out in local clinics and at homes by visiting circumciser. Celebrations In Indonesia, after a child is circumcised, there is a feast called Perayaan Sunatan, but some ulemas in Indonesia say this is bid‘ah whereas most of them say it is not. In Turkey also widely celebrated and called \"Sunnet Toreni\" \"Sunnet mevludu\". Female genital mutilation Khafḍ, or k̲h̲ifāḍ, refers to female genital mutilation (FGM). FGM is sometimes ", "-28.495719367841957" ], [ "to achieve a consensus on this issue; some legal schools prescribed capital punishment for sodomy, but others opted only for a relatively mild discretionary punishment. There was general agreement, however, that other homosexual acts (including any between females) were lesser offenses, subject only to discretionary punishment. Homosexuality The Qur'an strictly prohibits homosexuality through the story of Lot (see verses 7:80-84, 26:165-166, 11:69-83, 29:28-35 of the Qur'an; which is also rendered in the Biblical Book of Genesis), in Al-Nisa, Al-Araf and possibly verses in other surahs. For example, this was the verse addressed directly to Muhammad and his followers:\nWe also sent", "-28.492693380772835" ], [ "act of excision is a reminder that women are from which all human creation is derived. Bondo elders believed that excision improves sexual satisfaction as it removes focus from the clitoris onto the hidden g-spot inside the vaginal canal which they believe has more satisfying and intense orgasms. It is also thought to enhance the appearance of a women's genitalia and make it easier to penetrate.\nIn Sierra Leone, FGM usually consists of removing the clitoris as a major part in preparing the young women for marriage and motherhood through this initiation ceremony. The procedure is usually performed by an elderly", "-28.47647332365159" ], [ "with ambiguous genitalia are sexually damaging and may render them infertile. For example, in cases involving male children with micropenis, doctors may recommend the child be reassigned as female. The Intersex Society of North America objects to elective surgeries performed on people without their informed consent on grounds that such surgeries subject patients to unnecessary harm and risk.\nIn some cases, a child's gender may be reassigned due to genital injury. There have been at least seven cases of healthy male infants being reassigned as female due to circumcision damaging their penises beyond repair, including the late David Reimer (born Bruce", "-28.461923382565146" ], [ "widely acceptable across the globe. FGM supporters in Sierra Leone believe that females who do not receive the circumcision will have trouble conceiving, suffer psychological trauma, have bad luck, or be considered unworthy of marriage. Women who are pro-FGM state that it does not oppress female sexuality and instead it celebrates it through these ritual practices.\nThey also state that the supposed consequences of excision (which include menstrual problems, painful sex, infections, et cetera) were not specific to women who underwent FGM. The rate for infertility is ten percent for both groups. They also argue that the reason for increase of", "-28.460487039701547" ], [ "Since then it is legal for a female to walk topless in public anywhere in Ontario, Canada. New Zealand In New Zealand, Indecent exposure is considered to be where a person \"intentionally and obscenely exposes any part of his or her genitals\". Otherwise there is no specific law prohibiting nudity in public places, although lesser charges may apply depending on the behaviour of the individual in question.\nThe High Court of New Zealand has upheld a conviction of disorderly conduct for nudity in the street, because it was not a place where nudity was known to occur or commonplace. Being nude", "-28.439868952613324" ] ]
3u6fyw
What operating system does Microsoft use to make their new Operating Systems?
[ "Sure, they used 8 in the beginning, but Microsoft has a pretty strong dogfooding culture. The idea is to use 10 to develop 10, in hopes of finding bugs and fixing them.", "Microsoft would use existing operating systems to design the most basic version of the next operating system. In most cases, this operating system will have the bare minimum to boot up, and do almost nothing else. They would then work inside that new operating system to develop all their necessary features and components (a gui, applications, accessories), and then compile that full operating system into a boot disk, that you would buy today.", "The operating system used to program does not have to be the same as the target operating system. Using a cross compiler, and proper libraries, you can compile for a different operating system or even different processor type. See also URL_0 ", "It is important to realize that current operating system from MS are very much an assemblage of a large number of parts. Many of these parts either don't change much from version to version all that much. So it is not like they have to rewrite everything all at once. It seems they start out with making changes to the core and once that runs halfway well they use their development on that to upgrade al the other parts. Early previews of new Windows versions often still have a host of features from the previous version that have not yet been updated or deleted." ]
[ [ "design in Mac OS 8.6. Against this, the modern macOS (originally named Mac OS X) is based on Darwin, which uses a hybrid kernel called XNU, which was created by combining the 4.3BSD kernel and the Mach kernel. Microsoft Windows Microsoft Windows was first released in 1985 as an add-on to MS-DOS. Because of its dependence on another operating system, initial releases of Windows, prior to Windows 95, were considered an operating environment (not to be confused with an operating system). This product line continued to evolve through the 1980s and 1990s, with the Windows 9x series adding", "-25.33778898406308" ], [ "Macintosh operating systems The family of Macintosh operating systems developed by Apple Inc. includes the graphical user interface-based operating systems it has designed for use with its Macintosh series of personal computers since 1984, as well as the related system software it once created for compatible third-party systems.\nIn 1984, Apple debuted the operating system that is now known as the \"Classic\" Mac OS with its release of the original Macintosh System Software. The system, rebranded \"Mac OS\" in 1996, was preinstalled on every Macintosh until 2002 and offered on Macintosh clones for a short time in the 1990s. Noted for", "-24.96476093853198" ], [ "commercialized by many vendors throughout the 1980s and 1990s.\nSince the late 1990s, there have been three operating systems in widespread use on personal computers: Apple Inc.'s macOS, the open source Linux, and Microsoft Windows. Since 2005 and Apple's transition to Intel processors, all have been developed mainly on the x86 platform, although macOS retained PowerPC support until 2009 and Linux remains ported to a multitude of architectures including ones such as 68k, PA-RISC, and DEC Alpha, which have been long superseded and out of production, and SPARC and MIPS, which are used in servers or embedded systems but no longer", "-24.8250950066722" ], [ "develop a new operating system for their computers called OS/2. Microsoft produced that operating system, but also continued to sell their own alternative, which proved to be in direct competition with OS/2. Microsoft Windows eventually overshadowed OS/2 in terms of sales. When Microsoft launched several versions of Microsoft Windows in the 1990s, they had captured over 90% market share of the world's personal computers.\nAs of June 30, 2015, Microsoft has a global annual revenue of $86.83 Billion USD and 128,076 employees worldwide. It develops, manufactures, licenses, and supports a wide range of software products for computing devices. 1975–1985: The founding", "-24.77067969791824" ], [ "earlier Mac OS releases.\nThe macOS architectural legacy is the successor to Mac OS 9 and the classic Mac OS legacy. However, unlike the classic Mac OS, it is a Unix-based operating system built on NeXTSTEP and technology developed at NeXT from the late 1980s until early 1997, when Apple purchased the company, and its CEO Steve Jobs returned to Apple. macOS also makes use of the BSD codebase and the XNU kernel, and its core set of components is based upon Apple's open source Darwin operating system.\nAn early version of the operating system, Mac OS X Server 1.0, was released", "-24.76240399699236" ], [ "An operating system processes system data and user input, and responds by allocating and managing tasks and internal system resources as a service to users and programs of the system. An operating system performs basic tasks such as controlling and allocating memory, prioritizing system requests, controlling input and output devices, facilitating computer networking, and managing files.\nCommon contemporary desktop operating systems are Microsoft Windows, macOS, Linux, Solaris and FreeBSD. Windows, macOS, and Linux all have server and personal variants. With the exception of Microsoft Windows, the designs of each of them were inspired by or directly inherited from the Unix operating", "-24.445931838301476" ], [ "its ease of use, it was also criticized for its lack of modern technologies compared to its competitors.\nThe current Mac operating system is macOS, originally named \"Mac OS X\" until 2012 and then \"OS X\" until 2016. Developed between 1997 and 2001 after Apple's purchase of NeXT, Mac OS X brought an entirely new architecture based on NeXTSTEP, a Unix system, that eliminated many of the technical challenges that the classic Mac OS faced. The current macOS is preinstalled with every Mac and is updated annually. It is the basis of Apple's current system software for its other devices – iOS,", "-24.33479437569622" ], [ "extensions. Mac OS X / OS X / macOS macOS (originally named \"Mac OS X\" until 2012 and then \"OS X\" until 2016) is the current Mac operating system that officially succeeded the classic Mac OS in 2001.\nAlthough the system was originally marketed as simply \"version 10\" of Mac OS, it has a history that is largely independent of the classic Mac OS. It is a Unix-based operating system built on NeXTSTEP and other technology developed at NeXT from the late 1980s until early 1997, when Apple purchased the company and its CEO Steve Jobs returned to Apple. Precursors to", "-24.282811741810292" ], [ "OEM contracts Computer hardware is usually sold with an operating system other than Linux already installed by the original equipment manufacturer (OEM). In the case of IBM PC compatibles the OS is usually Microsoft Windows; in the case of Apple Macintosh computers it has always been a version of Apple's OS, currently macOS; Sun Microsystems sold SPARC hardware with the Solaris installed; video game consoles such as the Xbox, PlayStation, and Wii each have their own proprietary OS. This limits Linux's market share: consumers are unaware that an alternative exists, they must make a conscious effort to use a different", "-24.046946486458182" ], [ "operating system available from Ubuntu specifically, to Windows and even OSx86, but disclaiming that they do not and will not sell Mac OS X. Commodore USA's online store sold Microsoft Windows separately and bundled Linux in their keyboard computers. Later, Commodore USA announced that they would officially support, develop, and ship their computers with AROS, but shifted their focus on redesigning Linux as Amiga Workbench 5, and Amiga Workbench X, but decided to name it Commodore OS and dropped all plans of making it resemble an Amiga-like operating system due to additional legal proceedings.\nExamples of announced products that appear to", "-23.986562043966842" ], [ "Microsoft Windows version history Microsoft Windows was announced by Bill Gates on November 10, 1983. Microsoft introduced Windows as a graphical user interface for MS-DOS, which had been introduced a couple of years earlier. In the 1990s, the product line evolved from an operating environment into a fully complete, modern operating system over two lines of development, each with their own separate codebase.\nThe first versions of Windows (1.0 through to 3.11) were graphical shells that ran from MS-DOS. Later on, Windows 95, though still being based on MS-DOS, was its own operating system, using a 16-bit DOS-based kernel and a", "-23.895217968398356" ], [ "OSs of today are often either inspired by, or directly descended from, minicomputer OSs. UNIX was originally a minicomputer OS, while Windows NT kernel—the foundation for all current versions of Microsoft Windows-borrowed design ideas liberally from VMS. Many of the first generation of PC programmers were educated on minicomputer systems.", "-23.865828107853304" ], [ "replaced by DOS, Microsoft's first operating system product, was the first popular operating system of the time.\nIn the early years of the 21st century, another successful business model has arisen for hosted software, called software-as-a-service, or SaaS; this was at least the third time this model had been attempted. From the point of view of producers of some proprietary software, SaaS reduces the concerns about unauthorized copying, since it can only be accessed through the Web, and by definition, no client software is loaded onto the end user's PC. By 2014, the role of cloud developer had been defined;", "-23.84235942950272" ], [ "OS X and Mac OS X Server, starting at version 10.0; Mac OS X is now named macOS.\nmacOS's primary programming environment is essentially OpenStep (with certain additions such as XML property lists and URL classes for Internet connections) with macOS ports of the development libraries and tools, now called Cocoa.\nmacOS has since become the single most popular desktop Unix-like operating system in the world, although macOS is no longer an OpenStep compliant operating system. GNUstep GNUstep, a free software implementation of the NeXT libraries, began at the time of NeXTSTEP, predating OPENSTEP. While OPENSTEP and OSE were purchased by Apple,", "-23.825976866064593" ], [ "in July of the same year. Microsoft kept the version number, but renamed it MS-DOS. They also licensed MS-DOS 1.10/1.14 to IBM, which, in August 1981, offered it as PC DOS 1.0 as one of three operating systems for the IBM 5150, or the IBM PC.\nWithin a year, Microsoft licensed MS-DOS to over 70 other companies. It was designed to be an OS that could run on any 8086-family computer. Each computer would have its own distinct hardware and its own version of MS-DOS, similar to the situation that existed for CP/M, and with MS-DOS emulating the same solution as", "-23.81755199309555" ], [ "Windows Embedded Automotive History The Windows Embedded Automotive operating system was originally shipped with the AutoPC that was jointly developed by Microsoft and Clarion. The system was released in December 1998, and referred to the operating system itself as \"Auto PC\". Microsoft's Auto PC platform was based on Windows CE 2.0, and had been announced in January of that year.\nOn October 16, 2000, Microsoft officially announced the next version of the platform. This version of the operating system was renamed to \"Windows CE for Automotive\" and had new applications preinstalled like the Microsoft Mobile Explorer.\nOn October 21, 2002,", "-23.578086094581522" ], [ "Apple's primary operating system since 1984. Unlike its predecessor, macOS is a UNIX operating system built on technology that had been developed at NeXT through the second half of the 1980s and up until Apple purchased the company in early 1997.\nThe operating system was first released in 1999 as Mac OS X Server 1.0, followed in March 2001 by a client version (Mac OS X v10.0 \"Cheetah\"). Since then, six more distinct \"client\" and \"server\" editions of macOS have been released, until the two were merged in OS X 10.7 \"Lion\".\nPrior to its merging with macOS, the server edition – ", "-23.55554270092398" ], [ "the original release of Mac OS X include OpenStep, Apple's Rhapsody project, and the Mac OS X Public Beta.\nmacOS makes use of the BSD codebase and the XNU kernel, and its core set of components is based upon Apple's open source Darwin operating system.\nmacOS is the basis for some of Apple's other operating systems, including iPhone OS/iOS, watchOS, tvOS, and audioOS. A/ROSE The Apple Real-time Operating System Environment (A/ROSE) was a small embedded operating system which ran on the Macintosh Coprocessor Platform, an expansion card for the Macintosh. The idea was to offer a single \"overdesigned\" hardware platform on which", "-23.370744218773325" ], [ "History of Microsoft Microsoft is a multinational computer technology corporation. Microsoft was founded on April 4, 1975, by Bill Gates and Paul Allen in Albuquerque, New Mexico. Its current best-selling products are the Microsoft Windows operating system, Microsoft Office, a suite of productivity software, Xbox, a line of entertainment of games, music, and video, and Bing, a line of search engines, and Microsoft Azure, a cloud services platform.\nIn 1980, Microsoft formed a partnership with IBM to bundle Microsoft's operating system with IBM computers; with that deal, IBM paid Microsoft a royalty for every sale. In 1985, IBM requested Microsoft to", "-23.30396235070657" ], [ "\"System\"; Apple rebranded it as \"Mac OS\" in 1996 due in part to its Macintosh clone program that ended a year later.\nClassic Mac OS is characterized by its monolithic design. Initial versions of the System Software run one application at a time. System 5 introduced cooperative multitasking. System 7 supports 32-bit memory addressing and virtual memory, allowing larger programs. Later updates to the System 7 enable the transition to the PowerPC architecture. The system was considered user-friendly, but its architectural limitations were critiqued, such as limited memory management, lack of protected memory and access controls, and susceptibility to conflicts among", "-23.2963115347884" ], [ "operating system, and they must either perform the actual installation themselves, or depend on support from a friend, relative, or computer professional.\nHowever, it is possible to buy hardware with Linux already installed. Lenovo, Hewlett-Packard, Dell, Affordy, Purism, and System76 all sell general-purpose Linux laptops, and custom-order PC manufacturers will also build Linux systems (but possibly with the Windows key on the keyboard). Fixstars Solutions (formerly Terra Soft) sells Macintosh computers and PlayStation 3 consoles with Yellow Dog Linux installed.\nIt is more common to find embedded devices sold with Linux as the default manufacturer-supported OS, including the Linksys NSLU2 NAS device,", "-23.18795344641694" ], [ "that also provides some interactive utilities such as memory card management, audio or video CD playback, copy protection and sometimes carry libraries for developers to use etc. Few of these cases, however, would qualify as a true operating system.\nThe most notable exceptions are probably the Dreamcast game console which includes a minimal BIOS, like the PlayStation, but can load the Windows CE operating system from the game disk allowing easily porting of games from the PC world, and the Xbox game console, which is little more than a disguised Intel-based PC running a secret, modified version of Microsoft Windows in", "-23.18137785941508" ], [ "around 40 developers on average.\nIn October 2008, it was announced that Windows 7 would also be the official name of the operating system. There has been some confusion over naming the product Windows 7, while versioning it as 6.1 to indicate its similar build to Vista and increase compatibility with applications that only check major version numbers, similar to Windows 2000 and Windows XP both having 5.x version numbers. The first external release to select Microsoft partners came in January 2008 with Milestone 1, build 6519. Speaking about Windows 7 on October 16, 2008, Microsoft CEO Steve Ballmer confirmed compatibility", "-23.063716874836246" ], [ "the first to be named \"Mac OS\" instead of \"System\". These changes were made to disassociate the operating system from Apple's own Macintosh models. File systems The Macintosh originally used the Macintosh File System (MFS), a flat file system with only one level of folders. This was quickly replaced in 1985 by the Hierarchical File System (HFS), which had a true directory tree. Both file systems are otherwise compatible. An improved file system named HFS Plus (\"HFS+\" or \"Mac OS Extended\") was announced in 1997 and implemented in 1998.\nFiles in most file systems used with DOS, Windows, Unix, or other", "-23.054324299195287" ], [ "were produced for the console versions, while the Linux, Windows and OS X releases were digital exclusives.", "-23.042375050950795" ], [ "from a Unix to a Windows-based system for its core software. This caused \"a flurry of discussion in the automobile market.\" According to Automotive News, the Unix-based system could support more users, but the Microsoft software was compatible with more of the newer applications being used by dealerships. Reynolds also developed the Reynolds Generations Series Suite in collaboration with Microsoft, but the product was not successful in the marketplace. It was discontinued in 2005.\nIn 2011 Reynolds and Reynolds introduced the current version of its dealer management software, called ERA-IGNITE, which reduced the number of screens needed to perform tasks by", "-23.037704245653003" ], [ "the early OSes on these machines was Digital Research's CP/M-80 for the 8080 / 8085 / Z-80 CPUs. It was based on several Digital Equipment Corporation operating systems, mostly for the PDP-11 architecture. Microsoft's first operating system, MDOS/MIDAS, was designed along many of the PDP-11 features, but for microprocessor based systems. MS-DOS, or PC DOS when supplied by IBM, was designed to be similar to CP/M-80. Each of these machines had a small boot program in ROM which loaded the OS itself from disk. The BIOS on the IBM-PC class machines was an extension of this idea and has accreted", "-23.03681198490085" ], [ "announcement that an update to the operating system would allow OEMs to produce devices with as little as 1 GB of RAM and 16 GB of storage, critics felt that these changes would help Windows compete against Linux-based devices in the low-end market, particularly those running Chrome OS. Microsoft had similarly cut the price of Windows XP licenses to compete against the early waves of Linux-based netbooks. Reports also indicated that Microsoft was planning to offer cheaper Windows 8 licenses to OEMs in exchange for setting Internet Explorer's default search engine to Bing. Some media outlets falsely reported that the", "-23.028359534044284" ], [ "Comparison of Microsoft Windows versions Microsoft Windows is the name of several families of computer software operating systems created by Microsoft. Microsoft first introduced an operating environment named Windows in November 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces (GUIs).\nAll versions of Microsoft Windows are commercial proprietary software. General information Basic general information about Windows. Supported file systems Various versions of Windows support various file systems, including: FAT12, FAT16, FAT32, HPFS, or NTFS, along with network file systems shared from other computers, and the ISO 9660 and UDF file systems used for", "-23.026214798621368" ], [ "serves as the mechanism for updating all system drivers, software, and firmware.\nMicrosoft showcased other aspects of the new operating system, to be known as Windows 8, during subsequent presentations. Among these changes (which also included an overhauled interface optimized for use on touch-based devices built around Metro design language) was the introduction of Windows Runtime (WinRT). Software developed using this new architecture could be processor-independent (allowing compatibility with both x86 and ARM-based systems), would emphasize the use of touch input, would run within a sandboxed environment to provide additional security, and be distributed through Windows Store—a store similar to services", "-22.98017238530224" ], [ "at DEC with him. Cutler arrived at Microsoft on October 31, 1988, and work on the future operating system started in November.\nThe operating system was first developed as a revised version of OS/2, an operating system Microsoft had jointly developed with IBM. While OS/2 was originally intended to succeed MS-DOS, it had yet to be commercially successful. The OS was to be designed so it could be ported to different processor platforms, and support multiprocessor systems, which few operating systems did at that time. To target the enterprise market, the OS was also to support networking, the POSIX standard, and", "-22.943376619019546" ], [ "form on personal computers is still low relatively, while adoption of the Android operating system is very high. The term Linux adoption, often overlooks that operating system or other uses such as in Chrome OS that also use the Linux kernel (but have almost nothing else in common, not even the name – Linux – usually applied; while Android is the most popular variant – in fact the most popular operating system in the world). Linux adopters Outside of traditional web services, Linux powers many of the biggest Internet properties (e.g., Google, Amazon, Facebook, eBay, Twitter or Yahoo!). Hardware platforms", "-22.93933302507503" ], [ "macOS High Sierra, when it was replaced with the Apple File System. There are some other interface changes such as separating network features from printing, and some improvements to application switching. However, in underlying technical respects, Mac OS 8 is not very different from System 7. Transition to Mac OS X macOS (originally named \"Mac OS X\" until 2012 and then \"OS X\" until 2016)\nis Apple's current Mac operating system that officially succeeded the classic Mac OS in 2001. Although it was originally marketed as simply \"version 10\" of Mac OS, it has a history that's largely independent of the", "-22.909352513146587" ], [ "head of marketing at Microsoft, convinced the company that the name Windows would be more appealing to customers.\nWindows 1.0 was not a complete operating system, but rather an \"operating environment\" that extended MS-DOS, and shared the latter's inherent flaws and errors.\nThe first version of Microsoft Windows included a simple graphics painting program called Windows Paint; Windows Write, a simple word processor; an appointment calendar; a card-filer; a notepad; a clock; a control panel; a computer terminal; Clipboard; and RAM driver. It also included the MS-DOS Executive and a game called Reversi.\nMicrosoft had worked with Apple Computer to develop applications for", "-22.829574954346754" ], [ "developed, Linux computers were \"a tough sell for non-technical users\".\nMicrosoft historically engaged in licensing practices that discouraged the installation of non-Microsoft operating systems. Microsoft once assessed license fees based on the number of computers an OEM sold, regardless of whether a Windows license was included. Beginning in 1983, Microsoft sold MS-DOS licenses to OEMs on an individually-negotiated basis. The contracts required OEMs to purchase a number of MS-DOS licenses equal to or greater than the number of computers sold, with the result of zero marginal cost for OEMs to include MS-DOS. Installing an operating system other than MS-DOS would effectively", "-22.79963851085631" ], [ "DOS and OS/2 prompts, and running a DOS program under OS/2 will launch a separate DOS window to run the application.\nAll versions of Windows for Itanium (no longer sold by Microsoft) and x86-64 architectures no longer include the NTVDM and can therefore no longer natively run MS-DOS or 16-bit Windows applications. There are alternatives in the form of virtual machine emulators such as Microsoft's own Virtual PC, as well as VMware, DOSBox, and others. Legacy compatibility From 1983 onwards, various companies worked on graphical user interfaces (GUIs) capable of running on PC hardware. However, this required duplicated effort and did", "-22.71234922631993" ], [ "Console Inc. Console OS Console OS is the first commercial distribution of the Android operating system, designed for traditional PC hardware. It debuted on Kickstarter in June, 2014. The funding campaign was successful, raising $78,497 from 5,695 backers.\nThe distribution differs from open-source options such as Android-x86 by including commercial, closed-source drivers, codecs, and players. The Console OS platform, effectively, is the Intel Architecture equivalent to CyanogenMod.\nConsole OS runs as a native operating system. Unlike alternative solutions for the PC, such as BlueStacks, it does not run Android in an emulator. This provides superior performance, particularly on lower-end systems - but", "-22.66989314375678" ], [ "Some specific proprietary software products are not available in any form for Linux. As of September 2015, the Steam gaming service has 1,500 games available on Linux, compared to 2,323 games for Mac and 6,500 Windows games. Emulation and API-translation projects like Wine and CrossOver make it possible to run non-Linux-based software on Linux systems, either by emulating a proprietary operating system or by translating proprietary API calls (e.g., calls to Microsoft's Win32 or DirectX APIs) into native Linux API calls. A virtual machine can also be used to run a proprietary OS (like Microsoft Windows) on top of Linux.", "-22.56471476261504" ], [ "Microsoft Studios announced further acquisitions with Obsidian Entertainment and inXile Entertainment. As Xbox Game Studios (2019–present) The studio rebranded itself on February 5, 2019 as Xbox Game Studios, as to reflect Microsoft's intent to use the Xbox brand to support gaming across all the devices it supports. At E3 2019, Xbox Game Studios announced it had acquired Double Fine, and established a new internal studio dedicated to Age of Empires headed by Shannon Loftis, bringing their total studio count to fifteen. The untitled Age of Empires arm of Xbox Game Studios does not directly develop any games, but oversees efforts", "-22.56275305824238" ], [ "release, Microsoft issued its first major update as Version 3.0 in 1992. This version included Microsoft's first Global Address Book technology and first networked scheduling application, Microsoft Schedule+.\nVersions 3.0 through 3.5 included email clients for MS-DOS, OS/2 1.31, Mac OS, Windows (both 16 and 32-bit), a separate Windows for Workgroups Mail client, and a DOS-based Remote Client for use over pre-PPP/pre-SLIP dialup modem connections. A stripped-down version of the PC-based server, Microsoft Mail for PC Networks, was included in Windows 95 and Windows NT 4.0. The last version based on this architecture was 3.5; afterwards, it was replaced by Microsoft", "-22.53189059594297" ], [ "is a Windows NT system and does not use DOS as a base OS, and because the Windows NT architecture is different from Windows 9x. Some DOS programs that cannot run natively on XP, notably programs that rely on direct access to hardware, can be run in emulators, such as DOSBox or virtual machines, like VMware, Virtual PC, or VirtualBox. This also applies to programs that only require direct access to certain common emulated hardware components, like memory, keyboard, graphics cards, and serial ports. With DOS emulators, 32-bit versions of Windows XP can run almost any program designed for any", "-22.495892156206537" ], [ "developing of computer programs. For example, most Unix systems are source-compatible, as long as one uses only standard libraries. Microsoft Windows systems are source-compatible across one major family (the Windows NT family, from NT 3.1 through Windows 10, or the family that includes Windows 95, Windows 98, and Windows Me), with partial source compatibility between the two families.", "-22.46381419399404" ], [ "Although the PC platform is almost completely decentralized at a hardware level, there are two dominant software forces: the Microsoft Windows operating system and the Steam distribution service.\nMicrosoft introduced an operating environment named Windows on November 20, 1985 as an add-on to DOS in response to the growing interest in graphical user interfaces (GUIs). Microsoft Windows came to dominate the world's personal computer market with over 90% market share, overtaking Mac OS, which had been introduced in 1984.\nValve does not release any sales figures on its Steam service, instead it only provides the data to companies with games on Steam,", "-22.417386946151964" ], [ "company, and needed a real-time operating system, so the company replaced the AT&T-supplied UNIX kernel with their own in-house developed, yet compatible real-time variant. This kernel was originally a Z80 kernel called OS8.\nOver time, the company also replaced several of the UNIX standard userspace tools with their own implementations, to the point where no code was derived from UNIX, and their machines could be deployed independently of any AT&T UNIX license. Two years later and in cooperation with Luxor, a computer called ABC 1600 was developed for the office market, while in parallel, DIAB continue to produce enhanced versions", "-22.39922848873539" ], [ "the Windows OS and Office software. The upgraded systems were approximately five to six years old, and were said to be too old to invest in upgrades to the latest Microsoft product. After revisions in April 2010, the Arizona Department of Education now requires public and charter schools to consider free and open source software in development of new IT plans.", "-22.393720475258306" ], [ "Microsoft announced that the platform would be renamed to \"Windows Automotive\". The version added support for development using the .NET Compact Framework.\nWindows Automotive 4.2 reached General Availability on June 1, 2003 and Windows Automotive 5.0 reached GA on August 8, 2005.\nWith the release of Ford Sync, Microsoft renamed the platform from \"Windows Mobile for Automotive\" to \"Microsoft Auto\".\nMicrosoft again renamed the operating system as \"Windows Embedded Automotive\", and updated its version to 7 on October 19, 2010. This is the latest in MS Auto category, and is based on the Windows CE platform.\nWindows Embedded Automotive 7 reached GA on", "-22.327818306395784" ], [ " Development continued until Microsoft Project 4.0 for Mac in 1993. Microsoft Project 4 for the Mac included both 68k and PowerMac versions, Visual Basic for Applications and integration with Microsoft office 4.2 for the Mac. In 1994, Microsoft stopped development of most of its Mac applications and did not offer a new version of Office until 1998, after the creation of the new Microsoft Macintosh Business Unit the year prior. The Mac Business Unit never released an updated version of Project, and the last version does not run natively on Mac OS X.\nMicrosoft Project 1.0 was the only version", "-22.30202439695131" ], [ "the first 64-bit version.\nMicrosoft Project 2013 was the first to contain Modern UI-based look, and introduced Microsoft account and OneDrive integration\nMicrosoft Project 2016 is the last to support Windows 7 and Windows 8(.1)\nMicrosoft Project 2019 runs only on Windows 10, and it contains features carried over from Office 365.\nVersions for Windows were released in 1990 (v1.0), 1992 (v3.0), 1993 (v4.0), 1995 (Project 95, v4.1a), Project 98 (v8.0), Project 98 SR-1 (1999), Project 2000 (v9.0), Project 2000 SR-1 (2001), Project 2002 (v10.0), Project 2003 (v11.0), Project 2007 (v12.0), Project 2010 (v14.0), Project 2013 (v15.0) and Project 2016 (v16.0). There was no", "-22.231802750815405" ], [ "1981.\nWithin a year Microsoft licensed MS-DOS to over 70 other companies, which supplied the operating system for their own hardware, sometimes under their own names. Microsoft later required the use of the MS-DOS name, with the exception of the IBM variant. IBM continued to develop their version, PC DOS, for the IBM PC. Digital Research became aware that an operating system similar to CP/M was being sold by IBM (under the same name that IBM insisted upon for CP/M), and threatened legal action. IBM responded by offering an agreement: they would give PC consumers a choice of PC DOS or", "-22.222878961911192" ], [ "DOS 3.0 was completed, IBM had a team of developers covering the full OS. At that point in time, either IBM or Microsoft completely developed versions of IBM PC DOS going forward. By 1985 the joint development agreement (JDA) between IBM and Microsoft for the development of PC DOS had each company giving the other company a completely developed version. Most of the time branded versions were identical however there were some cases in which each of the companies made minor modifications to their version of DOS. In the fall of 1984, IBM gave all the source code and documentation", "-22.195663447200786" ], [ "as an accessory. Operating system The Xbox runs a custom operating system which is based on the Windows architecture kernel. It exposes APIs similar to APIs found in Microsoft Windows, such as Direct3D 8.1. The system software may have been partially based on the Windows NT kernel, but it has modified log files.\nThe user interface for the Xbox is called the Xbox Dashboard. It features a media player that can be used to play music CDs, rip CDs to the Xbox's built-in hard drive and play music that has been ripped to the hard drive; it also lets users manage", "-22.184094392461702" ], [ "systems for installation of the new version), an HP Inc. executive explained that because it knew Microsoft targeted the operating system for a release in 2015, the company was able to optimize its then-current and upcoming products for Windows 10 in advance of its release, negating the need for such a milestone.\nThe general availability build of Windows 10, numbered 10240, was first released on July 15, 2015 to Windows Insider channels for pre-launch testing prior to its formal release. Although a Microsoft official said that there would be no specific RTM build of Windows 10, 10240 was described as an RTM", "-22.18136400784715" ], [ "the high-end field of animation and visual effects; see the list of proprietary software for Linux for more details. There are also several companies that have ported their own or other companies' games to Linux, with Linux also being a supported platform on both the popular Steam and Desura digital-distribution services.\nMany other types of applications available for Microsoft Windows and macOS also run on Linux. Commonly, either a free software application will exist which does the functions of an application found on another operating system, or that application will have a version that works on Linux, such as with Skype", "-22.156805416045245" ], [ "and PCs. Apple's macOS, a replacement for Apple's earlier (non-Unix) Mac OS, is a hybrid kernel-based BSD variant derived from NeXTSTEP, Mach, and FreeBSD.\nUnix interoperability was sought by establishing the POSIX standard. The POSIX standard can be applied to any operating system, although it was originally created for various Unix variants. BSD and its descendants A subgroup of the Unix family is the Berkeley Software Distribution family, which includes FreeBSD, NetBSD, and OpenBSD. These operating systems are most commonly found on webservers, although they can also function as a personal computer OS. The Internet owes much of its existence to", "-22.11526959470939" ], [ "was found to be much larger than the Linux kernel. Later, a 2011 analysis of Ubuntu's \"Natty\" release (a popular Linux distribution) main repository found that 8% to 13% of it consisted of GNU components (the range depending on whether GNOME is considered part of GNU), while only 6% is taken by the Linux kernel (9% when including its direct dependencies). Determining exactly what constitutes the \"operating system\" per se is a matter of continuing debate.\nOn the other hand, some embedded systems, such as handheld devices and smartphones (like Google's Android), residential gateways (routers), and Voice over IP devices, are", "-22.113674385123886" ], [ "Linux-based products, or distributions, with commercial support. The naming remains controversial. Referring to the complete system as simply \"Linux\" is common usage. However, the Free Software Foundation, and many others, advocate the use of the term \"GNU/Linux\", saying that it is a more accurate name for the whole operating system.\nLinux adoption grew among businesses and governments in the 1990s and 2000s. In the English-speaking world at least, Ubuntu and its derivatives became a relatively popular group of Linux distributions. The free BSDs (1993–) When the USL v. BSDi lawsuit was settled out of court in 1993, FreeBSD and NetBSD (both", "-22.106700117816217" ], [ "Xbox (console) Creation and development Before the Xbox, Microsoft had found success publishing video games for their Windows PCs, releasing popular titles such as Microsoft Flight Simulator and the massively successful Age of Empires. However, Microsoft had not delved into the home console market of video games, which was dominated at the time by Sony's PlayStation. Sony was working on their next video game console, the PlayStation 2, announced officially to the public on March 2, 1999, and intended for the system to act as a gateway for all types of home entertainment. Microsoft CEO Bill Gates saw the upcoming", "-22.102020305319456" ], [ "release through the Windows Insider program in June 2019. Development Microsoft's first foray into achieving Unix-like compatibility on Windows began with the Microsoft POSIX Subsystem, superseded by Windows Services for UNIX via MKS/Interix, which was eventually deprecated with the release of Windows 8.1. The technology behind Windows Subsystem for Linux originated in the unreleased Project Astoria, which enabled some Android applications to run on Windows 10 Mobile. It was first made available in Windows 10 Insider Preview build 14316.\nWhereas Microsoft's previous projects and the third-party Cygwin had focused on creating their own unique Unix-like environments based on the POSIX standard,", "-22.06718875875231" ], [ "History of Linux The history of Linux began in 1991 with the commencement of a personal project by Finnish student Linus Torvalds to create a new free operating system kernel.\nSince then, the resulting Linux kernel has been marked by constant growth throughout its history. Since the initial release of its source code in 1991, it has grown from a small number of C files under a license prohibiting commercial distribution to the 4.15 version in 2018 with more than 23.3 million lines of source code, not counting comments, under the GNU General Public License v2. Events leading to creation After", "-22.06430824182462" ], [ "large number of enterprises that had transitioned to Linux during the late-2000s recession. In a company survey completed in the third quarter of 2009, 48% of surveyed companies reported using an open-source operating system.\nThe Linux Foundation regularly releases publications regarding the Linux kernel, Linux OS distributions, and related themes. One such publication, \"Linux Adoption Trends: A Survey of Enterprise End Users,\" is freely available upon registration.\nTraditionally, the term Linux adoption, refers to adoption of a Linux OS made for \"desktop\" computers, the original intended use (or adoption on servers, that is essentially the same form of OS). Adoption of that", "-22.044007082411554" ], [ "a copy of Windows pre-installed and without paying extra for the license either so that another operating system can be used or because a license was already acquired elsewhere, such as through the MSDN Academic Alliance program. Microsoft encourages original equipment manufacturers (OEMs) to supply computers with Windows pre-installed by presenting their dominance in computer sales and arguing that consumers benefit by not having to install an operating system. Because the price of the license varies depending on discounts given to the OEM and because there is no similar computer that the OEM offers without Windows, there is no", "-22.031013455067296" ], [ "Android operating system used by many tablets and smartphones, it also introduced Chrome OS—an operating system designed for personal computing built around its popular Chrome web browser, in 2009. Primarily shipping on netbooks known as Chromebooks, Chrome OS is designed for users who frequently use web applications and cloud-based services (such as Google's own Play and Drive)—all of its \"applications\" are web applications, and the OS itself formerly used only a fullscreen web browser as its shell until an update in 2012, which introduced a desktop environment closer to that of other operating systems.\nWindows RT was ultimately cannibalized by low-end", "-22.027623060392216" ], [ "only 1.82% of all \"desktop\" (or laptop) PCs, it has been widely adopted for use in servers and embedded systems such as cell phones. Linux has superseded Unix on many platforms and is used on most supercomputers including the top 385. Many of the same computers are also on Green500 (but in different order), and Linux runs on the top 10. Linux is also commonly used on other small energy-efficient computers, such as smartphones and smartwatches. The Linux kernel is used in some popular distributions, such as Red Hat, Debian, Ubuntu, Linux Mint and Google's Android, Chrome OS, and Chromium", "-22.020797098623007" ], [ "an open-source computer operating system, helped prevent Microsoft from being considered a monopolist. Microsoft considered Linux to be their main competitor during the 1990s. Many computer makers offer Linux or Windows for their users, and a large percentage of mobile phone and tablet operating systems are Android, which is a Linux variant. Not only are monopolies affected, but several other businesses with strongholds are affected. Microsoft Office has open-source competitors such as LibreOffice. Open-source for-profit businesses Numerous companies have created businesses around open-source software. They do this by publishing all of their code open-source, then charging for training, certifications, add-ons,", "-22.01436915002705" ], [ "better processor. Later Microsoft also released Windows 3.11, a touch-up to Windows 3.1 which included all of the patches and updates that followed the release of Windows 3.1 in 1992.\nMeanwhile, Microsoft continued to develop Windows NT. The main architect of the system was Dave Cutler, one of the chief architects of VMS at Digital Equipment Corporation (later purchased by Compaq, now part of Hewlett-Packard). Microsoft hired him in August 1988 to create a successor to OS/2, but Cutler created a completely new system instead.\nMicrosoft announced at its 1991 Professional Developers Conference its intentions to develop a successor to both Windows", "-21.987662930740044" ], [ "OS for other companies use was brought up by various members of Apple, Jean-Louis refused to give in to the idea, maintaining that the Macintosh was more powerful than any other computer at the present, and had a superior architectural roadmap for future expansion than any other computer. Although many of the companies were interested (such as AT&T, for the use of the OS in their own equipment—they were so interested in this idea that the then-CEO of AT&T made a personal phone call to Sculley), Gassée would have none of it, and so the idea of licensing the Mac", "-21.98696622418356" ], [ "For this deal, Microsoft purchased a CP/M clone called 86-DOS from Seattle Computer Products, which it branded as MS-DOS, although IBM rebranded it to IBM PC DOS. Following the release of the IBM PC in August 1981, Microsoft retained ownership of MS-DOS. Since IBM had copyrighted the IBM PC BIOS, other companies had to reverse engineer it in order for non-IBM hardware to run as IBM PC compatibles, but no such restriction applied to the operating systems. Due to various factors, such as the software selection available for MS-DOS, Microsoft eventually became the leading PC operating systems vendor. The company", "-21.984373159124516" ], [ "computers with the ability to run multitasking operating systems like those of earlier minicomputers and mainframes. Microsoft responded to this progress by hiring Dave Cutler, who had developed the VMS operating system for Digital Equipment Corporation. He would lead the development of the Windows NT operating system, which continues to serve as the basis for Microsoft's operating systems line. Steve Jobs, a co-founder of Apple Inc., started NeXT Computer Inc., which developed the NEXTSTEP operating system. NEXTSTEP would later be acquired by Apple Inc. and used, along with code from FreeBSD as the core of Mac OS X (macOS after", "-21.96639422548469" ], [ "Microsoft wanted to further develop Windows, while IBM desired for future work to be based on OS/2. In an attempt to resolve this tension, IBM and Microsoft agreed that IBM would develop OS/2 2.0, to replace OS/2 1.3 and Windows 3.0, while Microsoft would develop a new operating system, OS/2 3.0, to later succeed OS/2 2.0.\nThis agreement soon fell apart however, and the Microsoft/IBM relationship was terminated. IBM continued to develop OS/2, while Microsoft changed the name of its (as yet unreleased) OS/2 3.0 to Windows NT. Both retained the rights to use OS/2 and Windows technology developed up to", "-21.957471425412223" ], [ "and consumer-oriented PC maintenance options, but is often regarded as one of the worst versions of Windows due to stability problems, restricted real mode DOS support and other issues.\nMicrosoft released Windows XP and Office XP in 2001, a version that aimed to encompass the features of both its business and home product lines. The release included an updated version of the Windows 2000 kernel, enhanced DOS emulation abilities, and many of the home-user features found in previous consumer versions. XP introduced a new graphical user interface, the first such change since Windows 95. The operating system was the first to", "-21.949679133686004" ], [ "the operating system was generally designed to be a single large, inter-related set of components. With successive releases, the set of components considered to be the core of Microsoft Windows numbered into the thousands, with numerous dependencies that prevented the company from producing a version of Microsoft Windows that (for example) didn't include the graphical user interface and printing components. Further complicating this was the issue that many configuration tasks could only be performed using the graphical user interface.\nIn an April 2003 interview coinciding with the release of Windows Server 2003, Rob Short, the vice-president of the Windows", "-21.914537559292512" ], [ "the project to replace any non-free code that originated with Bell Labs. Once this was done, however, AT&T sued. After two years of legal disputes, the BSD project spawned a number of free derivatives, such as NetBSD and FreeBSD (both in 1993), and OpenBSD (from NetBSD in 1995). macOS macOS (formerly \"Mac OS X\" and later \"OS X\") is a line of open core graphical operating systems developed, marketed, and sold by Apple Inc., the latest of which is pre-loaded on all currently shipping Macintosh computers. macOS is the successor to the original classic Mac OS, which had been", "-21.912247014523018" ], [ "Microsoft released version 1.0 of Windows PowerShell (formerly codenamed Monad), which combined features of traditional Unix shells with their proprietary object-oriented .NET Framework. MinGW and Cygwin are open-source packages for Windows that offer a Unix-like CLI. Microsoft provides MKS Inc.'s ksh implementation MKS Korn shell for Windows through their Services for UNIX add-on.\nSince 2001, the Macintosh operating system macOS has been based on a Unix-like operating system called Darwin. On these computers, users can access a Unix-like command-line interface by running the terminal emulator program called Terminal, which is found in the Utilities sub-folder of the Applications folder, or by", "-21.903750237848726" ], [ "code, and the study estimated that it would have required about seventy three thousand man-years and cost US$8.66 billion (in 2019 dollars) to develop by conventional means. \nIn the United States, the name Linux is a trademark registered to Linus Torvalds. Initially, nobody registered it, but on August 15, 1994, William R. Della Croce, Jr. filed for the trademark Linux, and then demanded royalties from Linux distributors. In 1996, Torvalds and some affected organizations sued him to have the trademark assigned to Torvalds, and, in 1997, the case was settled. The licensing of the trademark has since been handled by the", "-21.88221007271204" ], [ "Linux-powered device Community maintained devices These devices were not intended to run Linux at the time of their production, but a community effort made possible either full or partial Linux support. Because of the open source philosophy that free and open source software brings to the software world, many people have ported the Linux kernel to run on devices other than a typical desktop, laptop or server computer. Some ports are performed by committed individuals or groups to provide alternative software on their favorite hardware. Examples include iPods, PlayStations, Xbox, TiVo, and WRT54G.\nThe original hardware vendors are in some cases", "-21.87122065067524" ], [ "Linux adoption Linux adoption is the adoption of Linux computer operating systems (OS) by households, nonprofit organizations, businesses, and governments.\nMany factors have resulted in the expanded use of Linux systems by traditional desktop users as well as operators of server systems, including the desire to minimize software costs, increase network security and support for open-source philosophical principles. In recent years several governments, at various levels, have enacted policies shifting state-owned computers to Linux from proprietary software regimes.\nIn August 2010, Jeffrey Hammond, principal analyst at Forrester Research, declared, \"Linux has crossed the chasm to mainstream adoption,\" a statement attested by the", "-21.84883591484686" ], [ "first-party studios were not as strong as those of Sony, explaining that \"Sony has always been about first party and Microsoft wanted to emulate that, but they allowed studios like Rare and Lionhead to fade away.\" In 2018, Microsoft acquired a large number of third-party studios, including Compulsion Games, InXile Entertainment, Ninja Theory, Obsidian Entertainment, Playground Games, and Undead Labs, and hired former Crystal Dynamics head Darrell Gallagher to lead a new Microsoft studio known as The Initiative.\nIn 2016, Microsoft began to make future Xbox One-exclusive first-party releases simultaneously available on Windows 10 PCs, with digital cross-buy support via Microsoft", "-21.844553002039902" ], [ "resemble the original UNIX.\nUnix-like systems run on a wide variety of computer architectures. They are used heavily for servers in business, as well as workstations in academic and engineering environments. Free UNIX variants, such as Linux and BSD, are popular in these areas.\nFour operating systems are certified by The Open Group (holder of the Unix trademark) as Unix. HP's HP-UX and IBM's AIX are both descendants of the original System V Unix and are designed to run only on their respective vendor's hardware. In contrast, Sun Microsystems's Solaris can run on multiple types of hardware, including x86 and Sparc servers,", "-21.81863715716463" ], [ "the operating system was most commonly called simply UNIX (in caps) or the UNIX Time-Sharing System.\nAT&T licensed Version 5 to educational institutions, and Version 6 also to commercial sites. Schools paid $200 and others $20,000, discouraging most commercial use, but Version 6 was the most widely used version into the 1980s. Research Unix versions are often referred to by the edition of the manual that describes them, because early versions and the last few were never officially released outside of Bell Labs, and grew organically. So, the first Research Unix would be the First Edition, and the last the Tenth", "-21.817815450427588" ], [ "Microsoft Word and Microsoft Office were mostly developed internally, Microsoft also continued its trend of rebranding products from other companies, such as Microsoft SQL Server on January 13, 1988, a relational database management system for companies that was based on technology licensed from Sybase.\nOn May 22, 1990 Microsoft launched Windows 3.0. The new version of Microsoft's operating system boasted new features such as streamlined graphic user interface GUI and improved protected mode ability for the Intel 386 processor; it sold over 100,000 copies in two weeks. Windows at the time generated more revenue for Microsoft than OS/2, and the company", "-21.81237223080825" ], [ "that represents files and applications using icons and relates concepts like directories and file deletion to real-world objects like folders and a trash can; and overlapping windows for multitasking. Classic Mac OS The \"classic\" Mac OS is the original Macintosh operating system that was introduced in 1984 alongside the first Macintosh and remained in primary use on Macs through 2001.\nApple released the original Macintosh on January 24, 1984; its early system software was partially based on the Lisa OS and the Xerox PARC Alto computer, which former Apple CEO Steve Jobs previewed. It was originally named \"System Software\", or simply", "-21.805464885925176" ], [ "the company went public with an IPO, raising US$61 million at US$21.00 per share. By the end of the trading day, the price had risen to US$28.00. In 1987, Microsoft eventually released their first version of OS/2 to OEMs. By then the company was the world's largest producer of software for personal computers—ahead of former leader Lotus Development—and published the three most-popular Macintosh business applications. That year the company purchased Forethought, the developer of PowerPoint and Microsoft's first major software acquisition on the 30th July 1987.\nMeanwhile, Microsoft began introducing its most prominent office products. Microsoft Works, an integrated office program", "-21.77848679703311" ], [ "to saving money on an operating system.\nBecause Microsoft Windows is the de facto standard operating system for PCs, hardware device drivers of different qualities can readily be found that will enable virtually any component designed for the PC architecture to function on a Windows platform. However, the same isn't true for alternative operating systems like Linux and BSD, so these system users have to be careful to avoid hardware that is incompatible with their choice of operating system. Even among hardware devices that technically will \"work\" with these alternative operating systems, some will work better than others. Therefore, many users", "-21.769901319174096" ], [ "for the Android OS, which is also an operating system based on the Linux kernel, as GNU is not a part of it.\nA minority of public figures and software projects other than Stallman and the FSF, notably Debian (which had been sponsored by the FSF up to 1996), also use GNU/Linux when referring to the operating system as a whole. Most media and common usage, however, refers to this family of operating systems simply as Linux, as do many large Linux distributions (for example, SUSE Linux and Red Hat Enterprise Linux). By contrast, Linux distributions containing only free software use", "-21.76882441257476" ], [ "to distribute Windows are nonexclusive, and OEMs are free to distribute computers with a different operating system or without any operating system.\nMicrosoft does not provide refunds for Windows licenses sold through an OEM, including licenses that come with the purchase of a computer or are pre-installed on a computer.\n\nAccording to Microsoft's End User License Agreement for Windows 7 the ability to receive a refund for the operating system is determined by the hardware manufacturer:\nBy using the software, you accept these terms. If you do not accept them, do not use the software. Instead, contact the manufacturer or installer to determine", "-21.76299867546186" ], [ "the OS can be deployed onto anything but a full-fledged PC; even though XPe supports the same hardware that XP Professional supports (x86 architecture), licensing restrictions prevent it from being deployed on to standard PCs. However, Microsoft has made some exceptions to this rule, allowing XPe alongside a standard OEM install of Windows. Some Dell notebooks contain an embedded XP installation as part of the MediaDirect 2.0 feature, and they were also found on some Acer ones as well as the Samsung Q1.\nWindows Embedded Standard 2009 succeeded XPe in 2H 2008. Windows Embedded Standard 2009 is derived from Windows XP", "-21.74276935623493" ], [ "two companies later had a series of disagreements over two successor operating systems to DOS, OS/2 and Windows. They split development of their DOS systems as a result. The last retail version of MS-DOS was MS-DOS 6.22; after this, MS-DOS became part of Windows 95, 98 and Me. The last retail version of PC DOS was PC DOS 2000 (also called PC DOS 7 revision 1), though IBM did later develop PC DOS 7.10 for OEMs and internal use.\nThe FreeDOS project began on 26 June 1994, when Microsoft announced it would no longer sell or support MS-DOS. Jim Hall then", "-21.732065596384928" ], [ "equipment and systems business model encountered stiff competition from other hardware vendors, such as Dell, that now offered Linux as a pre-installed operating system.\nOn June 26, 2001, VA Linux decided that it would leave the systems-hardware business and focus on software development. During the summer of 2001, all 153 of the hardware-focused employees were dismissed as a result of this shift in the company's business model.\nOn December 6, 2001, the company formally changed its name to VA Software, recognizing that the majority of the business was now software development and specialty news and information services. However, the company's Japanese subsidiary", "-21.71145349519793" ], [ "OS. Microsoft Windows Microsoft Windows is a family of proprietary operating systems designed by Microsoft Corporation and primarily targeted to Intel architecture based computers, with an estimated 88.9 percent total usage share on Web connected computers. The latest version is Windows 10.\nIn 2011, Windows 7 overtook Windows XP as most common version in use.\nMicrosoft Windows was first released in 1985, as an operating environment running on top of MS-DOS, which was the standard operating system shipped on most Intel architecture personal computers at the time. In 1995, Windows 95 was released which only used MS-DOS as a bootstrap. For backwards", "-21.692920633300673" ], [ "open source Linux-based mobile operating system, which has now been discontinued.\nNokia previously produced some phones running a variant of Linux (e.g. the Nokia N900), but in 2013, Nokia's handset division was bought by Microsoft. Other embedded systems with graphical user interface Smartphones are gradually replacing these kinds of embedded devices, but they still exist. An example are the Portable media players. Some of the OEM firmware is Linux based. A community-driven fully free and open-source project is Rockbox.\nIn-vehicle infotainment hardware usually involves some kind of display, either built into the Dashboard or additional displays. The GENIVI Alliance works on a", "-21.682494874141412" ], [ "in kernel space. Windows 9x had very little distinction between the interface and the kernel.\nMany computer operating systems allow the user to install or create any user interface they desire. The X Window System in conjunction with GNOME or KDE Plasma 5 is a commonly found setup on most Unix and Unix-like (BSD, Linux, Solaris) systems. A number of Windows shell replacements have been released for Microsoft Windows, which offer alternatives to the included Windows shell, but the shell itself cannot be separated from Windows.\nNumerous Unix-based GUIs have existed over time, most derived from X11. Competition among the various vendors of", "-21.67219412769191" ], [ "operating systems are marketed and sold.\nOn September 30, 2014, Microsoft unveiled Windows 10; Terry Myerson explained that Windows 10 would be Microsoft's \"most comprehensive platform ever,\" promoting plans to provide a \"unified\" platform for desktop computers, laptops, tablets, smartphones, and all-in-one devices. Windows 10 on phones was publicly unveiled during the Windows 10: The Next Chapter press event on January 21, 2015; unlike previous Windows Phone versions, it would also expand the platform's focus to small, ARM-based tablets. Microsoft's previous attempt at an operating system for ARM-based tablets, Windows RT (which was based upon the PC version of Windows 8)", "-21.664239683334017" ], [ "representative stated that their contracts with OEMs did not \"stop[] any OEM from shipping any operating system on their PCs\". In 2010, Microsoft stated that its agreements with OEMs to distribute Windows are nonexclusive, and OEMs are free to distribute computers with a different operating system or without any operating system. In a 2001 article in Byte, it was reported that license agreements between OEMs and Microsoft forbade OEMs from including Windows alongside another operating system on the same computer. According to a 1999 New York Times article, \"critics assert that the company continues to use its market clout to", "-21.66415244282689" ], [ "United States federal regulators who oversee the company's operations following the 2001 United States v. Microsoft Corp. settlement. According to status reports filed, the three-member panel began assessing prototypes of the new operating system in February 2008. Michael Gartenberg, an analyst at Jupiter Research, said, \"[Microsoft's] challenge for Windows 7 will be how can they continue to add features that consumers will want that also don't run afoul of regulators.\"\nIn order to comply with European antitrust regulations, Microsoft proposed the use of a \"ballot\" screen containing download links to competing web browsers, thus removing the need for a version of", "-21.65274871251313" ], [ "install macOS on Windows and Linux versions of VMware software through the use of patches, even though the company states it is only officially supported for VMware running on Apple-labeled computers according to Apple's licensing policies.", "-21.631315755398646" ], [ "released with an updated version of the Windows Store which merged Microsoft's other distribution platforms (Windows Marketplace, Windows Phone Store, Xbox Video and Xbox Music) into a unified store front for Windows 10 on all platforms, offering apps, games, music, film, TV series, themes, and ebooks. \nIn September 2017, Microsoft began to re-brand Windows Store as Microsoft Store, with a new icon carrying the Microsoft logo. Xbox Store was merged into this new version of the platform.\nWeb apps and traditional desktop software can be packaged for distribution on Windows Store. Desktop software distributed through Windows Store are packaged using the", "-21.61407235491788" ], [ "Windows took a distant third with the remaining 9%. In 2018, out of 4.4 billion computing devices Android accounted for 2 billion, iOS for 1 billion, and the remainder were PCs, in various forms (desktop, notebook, or tablet), running various operating systems (Windows, macOS, ChromeOS, Linux, etc.).\nIn late 2017, the iPad Pro received the iOS 11 update, adding the ability to run multiple windows, drag and drop from one app to another, and browse a user's files. Types Tablets can be loosely grouped into several categories by physical size, kind of operating system installed, input and output technology, and uses.", "-21.58228004309001" ], [ "and advocates of open source software. The documents also alluded to legal and other actions against Linux as well as other open source software. While Microsoft acknowledged the documents, it claimed that they are merely engineering studies. Despite this, some believe that these studies were used in the real strategies of the company.\nMicrosoft, in 2000, released new products for all three lines of the company's flagship operating system, and saw the beginning of the end of one of its most prominent legal cases. On February 17, Microsoft released an update to its business line of software in Windows 2000. It", "-21.563606600859202" ], [ "Windows 98 called Windows Me, short for \"Millennium Edition\". It was the last DOS-based operating system from Microsoft. Windows Me introduced a new multimedia-editing application called Windows Movie Maker, came standard with Internet Explorer 5.5 and Windows Media Player 7, and debuted the first version of System Restore – a recovery utility that enables the operating system to revert system files back to a prior date and time. System Restore was a notable feature that would continue to thrive in all later versions of Windows.\nWindows Me was conceived as a quick one-year project that served as a stopgap release between", "-21.563198733725585" ], [ "without the platform for which they were designed. The operating system emulators include DOSBox, a DOS emulator which allows playing games developed originally for this operating system and thus not compatible with a modern-day OS. Console emulators such as Nestopia and MAME are relatively commonplace, although the complexity of modern consoles such as the Xbox or PlayStation makes them far more difficult to emulate, even for the original manufacturers. The most technically advanced consoles that can currently be successfully emulated for commercial games on PC are the PlayStation 2 using PCSX2, and the Nintendo Wii U using the Cemu emulator.", "-21.559878979809582" ] ]
2fn69p
Why is the name "Sean" pronounced like "Shawn" when there's no letter H in it?
[ "Seán comes from the Irish name for John, the accent on the a (called a fada) makes the a longer and so changes the pronunciation as well as this Se in Irish is often pronounces as SH. The name Shawn in an anglicised version of the Irish name Seán.", "It's not an English name; it's Gaelic. (There are Scottish and Irish versions of Gaelic, but the name is pronounced the same way in both). In Gaelic, when the letter s is next to an i or e, it's pronounced \"sh\". Thus Sean is pronounced as if it were \"Shean\"; Siobhan as if it were \"Shiovan\"; Sinead as if it were \"Shineat\". [As you may have noticed, bh is pronounced as the English v, and d sounds more like the English t anywhere except the beginning of a word, in which case it sounds more like the English j. Perfectly clear, right?] S is pronounced the same as it is in English under other circumstances (i.e. when it is not next to i or e). Edit: Well, I'm not going to argue with everyone named Sinead. :) I can't speak for Irish, but I am quite sure that in Scottish Gaelic, D is pronounced quite like an English T under most circumstances. (There are actually quite a few rules about pronouncing D: At the beginning of a word, it's more like English J. \"Dearbh\" is pronounced as \"jerav\". DH next to E or I is a nearly-silent Y sound. \"Taigh\" has a nearly silent \"dh\", so pronounced \"tai\". DH otherwise is a soft, back-of-the-throat \"gh\" sound. D by itself, after the beginning of a word, is usually closer to a T.)", "Until recently I thought Sean was read like \"seen\". Being a non English speaker i admired Sean Bean's cool name \"Seen Been\".", "Because Seán isn't an English word. When non-Irish English speakers heard the word, they started spelling it Shawn because its pronounced that way. Seán is the original word, Shawn is Seán anglicised.", "As an Irish person the language as the people call it is Irish. Not Gaelic, this bugs me big time. Gaelic is the root language like Germanish, not the actually language. Also in Ireland Gaelic is a game. French people speak French, German people speak German. Irish people speak Irish. Get it right!", "The name is hibero-nordic (Vikings turn up in Ireland, bring their names from which we get names like John, Jon, Juan, and Jonsi), and the locals adopt them, adjusting for their own phonetics. I'm now speaking from the point of view of a Gaidhlig (scottish dialects of the language) learner, but to my knowledge everything I say is true of Irish (Gaelge) also. Anyone about please correct my if I err. In Gaelic, the vowels a, o and u are \"broad\", and so broaden consonants near them, whilst e and i are 'slender' and so 'slenderise' consonants near them. The Slender form of 's' is pronounced like \"sh\". Also, h is used to asperate the consonants: b, c, m, p, d, g, t, and s. (The lenited 'sh' is also pronounced like the english, so when leniting 'Se' to 'She' we have a slenderised lenited 's' - pronounced \"h\"). A better example of this effect is in Seamus. Seamus is pronounced with a slender \"sh\" sound at the beginning and a broad 's' sound at the end. If we are to put the name in the vocative case we have to to two things, first we lenite, so 'Se' - > 'She', pronounced \"h\", secondly, we have to slenderise the end of the word, so '-as' (pronounced \"sh\") - > '-ais', pronounced \"sh\". Seamus -- > Sheamais, the latter being where we get the name Hamish. :D (neat, right?)", "My niece's name is Sadhbh, which is pronounced \"Sive.\" In contrast, her brother's name is Fionn, which is pronounced \"Fionn.\"", "Everything the Irish do is to confuse the English. An English warrant with a misspelled name was not valid. When the English outlawed dancing the Irish Kevin Bacon came up with dancing where just your legs move but your upper body and your arms remain still. If the English looked in the window they would just see folks standing around instead of having a dance.", "It's an Irish name. The Irish language pronounces letters differently to English, so when our names and place names are used in English, the letters don't always make sense to foreigners. Consider: \"Tadhg and Caoimhe met the Taoiseach and Tanaiste outside the Dail, on their way from Aungier Street to Ranelagh.\" Prounounced: \"Tie-g and Qweev-ah met the Tee-shock and Taw-nish-tah outside the Dawl, on their way from Ainger Street to Rah-neh-lah.\"", "Honestly this is something you could have probably Googled and gotten the same answers as this thread.", "My name is Sean, and people have occasionally pronounced it \"Seen\" throughout my life. But it has gotten much worse since I moved to Arizona, where there is a local news anchor, Sean McLaughlin, who actually pronounces it that way. I hate him.", "PSA - the language is not called Gaelic. It's called Irish. Gaelic is a language family consisting of Irish, Scots Gaelic, and Manx.", "my name is sean and i appreciate this thread.", "I'm a native Irish speaker, and live in an area where nearly all names are in Irish, so since the answer has been explained, if anyone wants me to explain or write a few names phonetically, I'm happy to help. (I'm from Connemara so the pronunciation might vary from other regions.)", "Because the Irish Gaelige language is a bitch to read. In the same way that, in English, i/e will make a 'c' sound like an 's' (eg. fla**cc**id), or a 'g' sound like a 'j' (eg. **g**iant), in Irish, i/e makes 's' shound like 'sh'. In the original spelling, it would have been spelled 'Seán', the 'á' indicates that the 'e' is silent in 'eá'. And 'á' is pronounced similarly to 'aw' (although it depends upon the dialect). So, Seán > Shawn", "It's SHAUN BAUN or SEEN BEAN. He can't have it both ways.", "I'm late to the party but.... In Irish orthography using the western/latin alphabet you can tell whether a vowel sound is broad (velarised - pronounced with the back of the tongue raised to the velum or soft palate) or slender (palatalised with the blade of the tongue raised to the hard palate) by looking at the vowels around it. Usually if the immediately following or preceding vowel is front (i or e) the consonant is palatalised and this is the cased in 'Seán'. You see the same with 'cáis' pronounced 'cash' with long 'a' and meaning 'cheese' and the name 'Aisling'. If the immediately preceding or following vowel is back (a, o or u) then the consonant is velarised. An example with 's' is the word (and name) 'saoirse' pronounced roughtly 'seershe'.", "Because it's an Irish not an English name. Here's a YouTube playlist of Irish name pronunciations, eg. Siobhán, Sadhbh, Saoirse, Niamh, Aoife, Oisín, Tadhgh, etc. URL_0 ", "I'm very late to the game here but for those who are interested: In Irish every consonant, historically, had two variations, a broad form and a slender form. So, for example the vowel sound in the words *bó* and *beo* is similar but the b at the beginning is different. (This is an over simplification and misrepresents the language as it is today somewhat but it shows my point) The most obvious facet of this is that the letter s is pronounced as it normally is in English when succeeded or preceded by a broad vowel but is pronounced like the English sh when preceded or succeeded by a slender vowel (e or i), Hence Seán becomes shawn. There are still some dialects where you can hear the difference between the broad and the slender \"r\" sounds as well. The slender \"r\" is kind of close to an \"l\" sound and is rolled slightly. It's mostly only used by news readers today, because it smacks of a certain professional old timey authenticity.", "Well im pretty sure it's of irish (or that general area) descent, and it's just how they pronounce stuff, like how we pronoune ph as f. They pronounce Sidhe as Shee as well, just how their phonetics evolved", "It's an Irish name, not English. Basically the same reason that Siobháin is Shiv-awn, Órfhlaith is Orla, Éadaoin is a-deen and Niamh is Neev", "A few days ago, someone posted on /r/askreddit asking for the dumbest thread to ever make the front page. This. It's this one.", "Iarfhlaith and Caoilfhinn are my personal favourites for names to confuse yanks.", "It's Irish. Irish phonetics are a bit wild.", "The Irish Gaelic name Sean was borrowed in the middle ages from Norman French Jehan (i.e. Jean, or John in English - ultimately a Biblical Hebrew loan); in Irish Gaelic there is no native sound exactly equivalent to the initial je- (/dʒɛˈ/) in Jehan, so it was substituted with Irish se-, pronounced like \"shyuh\" (similar to English \"shut\"). The reason se- in Irish is pronounced this way is do to a linguistic process call palatization that affects consonants that come into contact with the vowels -e- or -i-. In Irish Gaelic, an -s- occurring next to an -e- or -i- is pronounced like English -sh-. URL_1 URL_0 ", "Because the Roman alphabet wasn't created exclusively for the convenience of English speakers, and other languages that use the alphabet follow their own spelling conventions. Sean is an Irish name, hence it has an Irish spelling and Irish pronunciation. This is the same reason that the Spanish name José is not pronounced \"joe-zay\" or \"joes.\"", "The worst part about being a Sean is the learning curve for kids growing up in class. \"Your names SEEN?!?\" \"No, no it is not it's Pronounced Shawn\" \"no it isn't I can read and your name is seen\" Like bitch I don't care if you're five", "I'd just like to add that Sean is the CORRECT SPELLING, not shawn or shaun or shonne or whatever the fuck else exists. source: my name is Sean and always has been. other Sean's will agree.", "Sean is an Irish name and in Irish the letter S when followed by a vowel is pronounced “sh”. Another example that British people might be familiar with is Sinn Fein (Shin Fain).", "So I need to start spelling my name Seán instead of Sean or I need to embrace that my name is supposed to be pronounced Shaan", "Out of all the ELI5 questions lately, this has to be near the bottom of the barrel.", "Poor non-Irish people trying to say our names... Source: Labhair mé a lán Gaeilge", "People who spell it \"Shawn\" may as well be named \"Chad\".", "Same reason \"Siobhan\" is pronounced \"Shih-von,\" and \"Saoirse\" is pronounced \"Ser-sha\"", "Se = shuh án = awwn Seán = Shawn", "Not so long ago, we pronounced the \"e\" in \"Sean\" as a palatal vowel, much like we later did and \"u\" in sugar. The term palatal means that the tongue is against or near the roof of the mouth and, in this case, just behind where the roof meets the teeth. The thing is, as the language changed over time, it grew to not include very much palatalization (whereas some languages like French and Russian have quite a bit), so it became awkward or, at least not common place, for many native speakers to palatize their vowels in these positions. However, right near this palatal space is the fricative space where we pronounce fricative consonants (e.g., sounds like \"sh\" in \"shoot\" and \"zh\" in the second \"g\" of \"garage\"). This fricative space is directly behind where your top and bottom teeth meet. So people with difficulty making this sound would drop their tongues slightly and go from having the vowel be palatal to the consonant preceding the vowel be fricative. To make a long story short, this change is part of a common phenomenon where the pronunciation is assimilated into already familiar sounds. This can happen when a word moves from one language to another (like \"constitu|tion|\") or when pronunciation within a language changes over time (like \"ni|gh|t\").", "Sean is an irish name, basically a translation of John. In Irish it is spelled with a fada so it's Seán. The fada changes the way the \"a\" sounds from the regular \"a\" to an \"aw\" sound. The \"H\" sound again is due to the irish background \"s+vowel\" generally makes a \"sh\" sound, seachtain(week) sounds like shock - tin (ish.. depending on area), sioc(frost) sounds like shook. Hope that helps.", "It was originally an Irish name (Seán) that was loaned from the French, Jehan (now Jean). It then morphed out from there. So the names Shawn, Shaun, etc., came after the original spellings, likely in an attempt to reconcile the evolution of pronunciations. Edit for clarification: The S replaced the J because the Irish pronunciation of the dza sound is S in their orthography.", "because when names get adopted into different languages, those languages tend to adapt the name so that it fits better into their pronunciation. Wikipedia shows that it was originally a French name, adopted by the English and then later further adopted by the Irish Jehan / Johan - > Johan/John - > Seán", "I googled 'sean', and the very first result answered this question. why the fuck did this need a post here? and why did it get so many upvotes? talk about low hanging fruit here edit: it doesn't even need to be explained like you're five, its such a cut and dry answer", "i dont understand why the english language doesnt have accents, can someone explain to me why people just decided to drop them from the language? its such a foreign concept to english speakers but when you learn a bit about a language with them it just makes pronunciation easier.", "Its an Irish name and its supposed to be spelt Séan. The little dash over the e is called a fada and gives the e an aww sound. This is why its pronounced Shawn.", "Now that I know the answer to the question that I'm sure everyone was dieing to know the answer to.. Reddit is only going to go downhill from here.", "As someone named Sean, nothing burns me up more than when people spell my name Shawn...Sean is the right way to spell it damn it!", "Because the Irish are a bunch of drunken bastards. Source: I'm Welsh and just as drunk and just as much a bastard.", "Sean is a Gaelic name. There is no \"J\" in this alphabet. John becomes Sean. James becomes Seamus. Joseph becomes Seosamh(Sho-sav).", "Because it's an Irish name not an English one so you don't pronounce it like an English word", "I feel like half of these ELI5 posts could be easily answered with a google search", "Why does laugh or cough have an \"F\" sound when there's no F in it?", "I think because of the accent/language it's from. Sidhe is pronounced shee. Believe it's gaelic", "You're gonna be pissed when you hear that sometimes \"K\" is pronounced \"sh\" in Swedish", "Im going to make up a whole new name for my kid. Like Pimmy", "Why is 'ballet' pronounced like 'ballay' when there is no 'y' in it?", "Because that is how Sean Connery would prefer it, as well as myself", "The fact that it's derived from Irish and was transliterated oddly to English.", "Sean here. I've always pronounced my name \"seen.\" I'm such an idiot.", "TIL why my name is spelled and pronounced the way it is.", "Kind of like how the Irish name Seamus is pronounced shaymus", "Why come words that ain't not from English is spelt wrong?", "because another language doesn't say it the same as English", "Fun fact. In Irish. \"Sean\" means old. ~~Séan~~\"Seán\" means john.", "Because the H from herb has to go somewhere.", "Because Sean is an Irish language name, not English.", "Because the english language is a dick like that", "WHY AREN'T THEY SPELT LIKE SHAUN!? FUCK THIS WORLD.", "ffs, OP. was google too hard for you?" ]
[ [ "Yes! We Have No Bananas History Frank Silver explained the origin of the song to Time Magazine: \"I am an American, of Jewish ancestry, with a wife and a young son. About a year ago my little orchestra was playing at a Long Island hotel. To and from the hotel I was wont to stop at a fruit stand owned by a Greek, who began every sentence with 'Yess.' The jingle of his idiom haunted me and my friend Cohn. Finally I wrote this verse and Cohn fitted it with a tune.\" \nThe song was the theme of the", "-25.07503135371371" ], [ "August, the band released \"All of Us\" Pronunciations One accepted pronunciation of Pnau is \"pah-now\". The name is commonly accented to simulate the sound of a gunshot. Nick Littlemore explained the name was the result of an instance when he was speaking in tongues. After shouting gibberish for half an hour, Littlemore decided Pnau would be an appropriate band name.\nAnother theory on the pronunciation, according to one interview with the pair, is \"pah-nyeow\". The group has on other occasions explained that the name \"rhymes with meow\".", "-24.94895093422383" ], [ "call someone some distance away, as a way of showing aggression, or when someone is surprised. In Russian, \"oy\" (\"ой\") is often used as an expression of various degrees of surprise. In the Scandinavian languages, \"Oi!\" or the Swedish variant, \"Oj!\", is commonly used. Here it means \"Oh\" or \"Woops\", an exclamation of surprise. There's also a form in Indonesian \"oi\" means to call someone.\nIn Vietnamese, oi, spelt in the Vietnamese alphabet as \"ơi\" is regularly used to call attention to a person in a sentence. It is can used in conjunction with a name or a pronoun. For example,", "-24.553402262739837" ], [ "for \"yes\". For example, \"Are you going to the Disco?\" \"eh.\"\n\"Eh?\" used to solicit agreement or confirmation is also heard regularly amongst speakers in Australia and the United Kingdom (where it is sometimes spelled \"ay\" on the assumption that \"eh\" would rhyme with \"heh\" or \"meh\"). In the Caribbean island of Barbados the word \"nuh\" acts similarly, as does \"noh\" in Surinamese Dutch and Sranantongo. The usage in New Zealand is similar, and is more common in the North Island. It is also heard in the United States, especially Minnesota, Wisconsin, the Upper Peninsula of Michigan (although the Scandinavian-based", "-24.54441069124732" ], [ "2000, Mays lived in Atherton, California, in a house he bought in 1969. \"Say Hey Kid\" and other nicknames It is not clear how Mays became known as the \"Say Hey Kid.\" One story is that in 1951, Barney Kremenko, a writer for the New York Journal, began to refer to Mays as the 'Say Hey Kid' after he overheard Mays say, \"'Say who,' 'Say what,' 'Say where,' 'Say hey'\". Another story is that Jimmy Cannon created the nickname because Mays did not know everybody's names when he arrived in the minors. \"You see a guy, you say, 'Hey, man.", "-24.471589888446033" ], [ "name U.N.V. that Shawn gave the abbreviation its meaning of \"Universal Nubian Voices.\"\nThe group's debut album, Something's Goin On was released first as an independent record and received a lot of airplay in Detroit on radio station WJLB. The group sold 10,000 copies of the album's title track, attracting the attention of Madonna's label, Maverick Records. Signed to the label, the album received a nationwide release and the title track became a hit in August 1993, reaching #29 on the Hot 100 and #3 on the R&B charts. The album's second single, \"Straight from My Heart\" came out at the", "-24.444885629112832" ], [ "pronounced /ˈbækmən/ (with a short 'a' sound as in \"back\"), and he uses this pronunciation when referring to himself. The more common pronunciation of \"bock-mən\", especially on American radio, became so widespread, however, that he did not bother correcting people after BTO became popular.", "-24.028434194857255" ], [ "\"We Accept You / We Reject You / One of us! One of us!\" (a reference to Tod Browning's Freaks) and \"I've got a rhyme that comes in a riddle / O-Hi-O! / What's round on the ends and high in the middle? / O-Hi-O!\", which references Devo's home state of Ohio.\nThe song begins in the unusual time signature of time, but switches partway through to common time for the call and response sections.\nThe original version of \"Jocko Homo\" lacks all call and response choruses except \"Are we not men?\", as well as the \"God made man\" bridge.", "-23.751877777976915" ], [ "indicate that he was not close to his family, or disliked his name because of his father's supposed intemperance and modest financial circumstances. Others indicate that he was called \"Jed\" and \"Jerry\", and disliked the nicknames so much that he resolved to change his name. Whatever the reason, when he turned 21 he successfully petitioned the New Hampshire General Court to legally change it. He chose the name Henry Wilson, inspired either by a biography of a Philadelphia teacher or a portrait from a book on English clergymen.\n(The ideas that his name change resulted from disrespect of", "-23.406856043904554" ], [ "by Jackson mid-sentence before he could ask it. Jackson then confronted Hamilton's use of the phrase \"the n-word\" when discussing the issue. Jackson pressed Hamilton to use the actual word before he would answer the question, but Hamilton refused, citing that he wasn't comfortable saying it aloud and if he did, the segment wouldn't make it to air. Jackson refused to back down, goading Hamilton further until he retracted the question.\nHamilton attempted to end the conversation by stating, \"It's too bad, I thought it was a great question.\" Jackson replied, \"No, it wasn't a great question if you", "-23.28936100122519" ], [ "the origin of its name, receiving the response \"I do not know sir; some people say that it is called so because its head is like that of a woman, others because a young girl in love leaped from the top of it and was killed.\"", "-23.276130789599847" ], [ "Cracker Jack.\nHowever, Yahoo is the pronunciation of the Chinese name of one of its founders, Jerry Yang. Ingredients Base the name on ingredients: Clorox for chlorine plus sodium hydroxide, Pepsi for the digestive enzyme pepsin. Merged When two companies merge into one, sometimes both names are kept: ExxonMobil, Cadbury Schweppes. Mimetics Use alternative spellings for common sounds: 2(x)ist, Krispy Kreme. Nickname Use a founder's nickname: Adidas aka Adolf Dassler, Haribo Hans Riegel Bonn, Kinkos. Neologism A completely new made-up word: Kodak, Verizon, Mimex. Onomatopoeia Use a sound associated with a product function or other brand idea: Twitter, Meow Mix. Personification", "-23.234563190257177" ], [ "the appropriateness of Harrison's opening words: \"That is all I want to say\". Inglis writes that Harrison goes on to state both \"[what] he wants to do for his lover\" and \"what he hopes for in return\", in the respective lines \"To try to love you more\" and \"A smile when I feel blue\".\nLeng considers that the song's middle eight echoes the same \"tongue-tied difficulty\" that Harrison had first introduced in his 1966 composition \"I Want to Tell You\":\nTimes I find it hard to say \n With useless words getting in my way \n Silence often says much more \n", "-23.1964309955074" ], [ "his father's surname (as is traditional in Hispanic culture; see Roberto Clemente Walker). However, when his mother, Maximina Pove, was in the first grade, her teacher changed her last name, changing the \"v\" to a \"w\" and adding an \"r\" at the end.\nDuring Pellot's first two professional seasons, in the French-Canadian town of Drummondville, Quebec, Pellot went by his birth name, Victor Pellot. However, Pellot noticed that the mostly French-speaking crowd began to laugh whenever his name was announced. Initially, Pellot surmised that the crowd was laughing because he was black. This turned out to be incorrect, and Pellot soon", "-23.107784394407645" ], [ "himself as \"Sioux\" causing a reaction from the family members, \"A boy name Sioux?\"\nThe gender-bending implications of the title have been adapted to explore issues of sex and gender, another use of the popular song title that goes beyond its original scope. The 2001 documentary A Boy Named Sue features a transgender protagonist and uses the song in the soundtrack. A Boy Named Sue: Gender and Country Music is the title of a 2004 book about the role of the gender in American country music.\nIn the film Swingers, one of the male characters is named Sue. The name is explained", "-23.045070244465023" ], [ "From Me to You Composition Lennon and McCartney began writing \"From Me to You\" while riding a coach heading to Shrewsbury as part of the Beatles' tour with Helen Shapiro. The title was inspired by the name of the letters section of the New Musical Express, which they had been reading: \"From You to Us\". McCartney noted that their early songs tended to include the words \"I\", \"me\" or \"you\" in them, as a way of making them \"very direct and personal\" to the band's fans.\nIn his 1980 interview with Playboy, Lennon recalled writing the song:\nWe were writing it in", "-23.037043349875603" ], [ "identical but used lyrics written by Shrigley which include the consistent repetition of the word \"No\" and occasionally \"No brains, no teeth, no legs, no eyes...\". Hot Chip, a band who are reported to be a favourite of Franz Ferdinand, also performed their own version of \"No\" on the same album.\nThe band 'met' Gorillaz in December 2005 and interviewed each other for a feature in Observer Music Monthly.\nAt the 2009 NME Awards ceremony, they performed a cover of Blondie's \"Call Me\" with Elly Jackson of La Roux on guest vocals.\nWhen Franz appeared on Radio 1's Live Lounge on 6 April", "-23.03152077458799" ], [ "Jenny (The Click Five song) Background In an interview with Songfacts, Romans stated about the origin of the song's title: \"'Jenny' is just a name. A name that scans well in songs,\" adding: \"A lot of people are like, 'Okay, who's Jenny?' It's more a representation of anyone being fickle.\" However, rumours suggest that this song is referencing a possible friendship between some of the band member's time at the Berklee College of Music with South Korean singer, Park Bom, whose English name was \"Jenny\". In 2016, band member Kyle Patrick said in response to the rumour circulating on Twitter:", "-23.001353931846097" ], [ "o.k. or O.K. or okay. It may be pronounced as in English, but /ɔˈkeː/ or /oˈkeː/ are also common. The meaning ranges from acknowledgement to describing something neither good nor bad, same as in US/UK usage.\nIn Maldivian Okay is used in different ways, often used to agree with something, more often used while departing from a gathering \"Okay Dahnee/Kendee.\"\nIn Singapore, OK is often used with suffixes used in \"Singlish\" such as OK lor, OK lah, OK meh, OK leh, which are used in different occasions. Gesture In the United States and much of Europe a related gesture is made by", "-22.97559788962826" ], [ "OK OK (spelling variations include okay, O.K., and ok) is an American English word denoting approval, acceptance, agreement, assent, acknowledgment, or a sign of indifference. OK is frequently used as a loanword in other languages. It has been described as the most frequently spoken or written word on the planet. The origins of the word are disputed.\nAs an adjective, OK principally means \"adequate\" or \"acceptable\" as a contrast to \"bad\" (\"The boss approved this, so it is OK to send out\"); it can also mean \"mediocre\" when used in contrast with \"good\" (\"The french fries were great, but the burger", "-22.962947268621065" ], [ "in the world. He isn't even the best drummer in the Beatles.\" This observation has generally been attributed to John Lennon, but Lewisohn had been doubtful because he could find no record of his having said it and thought it was out of character for Lennon to say something that he did not actually believe, though he was also well known for making mischievous remarks. However, Lewisohn has since confirmed that the line actually originated in a 1981 episode of the BBC radio comedy series Radio Active, written by Angus Deayton and Geoffrey Perkins.\nIn 2005, Lewisohn announced that he", "-22.951011928613298" ], [ "of his first name is due to the different spellings on his two singles.\nHe is not to be confused with (but has been, in literature and record listings, etc.) another blues harmonica player, Willie James Foster (September 19, 1921 – May 20, 2001).", "-22.938879696826916" ], [ "as well as the somewhat tongue-in-cheek explicit yes/no construction \"O不OK?\" (O bù OK?), \"Is it OK or not?\"\nIn Russia, OK is used very frequently for any positive meaning. The word in Russian has many morphologies: \"окей\", \"океюшки\", \"ок\", \"окейно\", etc.\nIn France and Belgium, OK is used to communicate agreement, and is generally followed by a French phrase (e.g. OK, d'accord, \"Okay, chef\") or another borrowing (e.g., OK, boss. ok, bye.). Rarely pronounced /ɔk/ these days, except by young children encountering dialog boxes for the first times.\nIn the Philippines \"okay lang\" is a common expression, literally meaning \"just okay\" or", "-22.815376901708078" ], [ "the special echo the rock produces to act as a sort of amplifier, giving the rock its name. The murmuring is hard to hear today owing to the urbanization of the area. Other theories attribute the name to the many boating accidents on the rock, by combining the German verb lauern ('to lurk, lie in wait') with the same \"ley\" ending, with the translation \"lurking rock\".\nAfter the German spelling reform of 1901, in almost all German terms, the letter \"y\" was changed to the letter \"i\", but some proper nouns have kept their \"y\", such as Bayern, Speyer, Spay, Tholey,", "-22.79954844337044" ], [ "as finding a letter O. Big Bird, glad that Telly found his letter, wonders when he will find his \"la-la-ers.\"\nMumford returns and tries his spell again, but it makes people \"baa\" like sheep instead. Telly and Prairie find a jam session, and think they have the musicians they need. Elmo, playing the drums, says that playing them is almost as easy as saying his name. He announces a break, previewing highlights of the special's second half.\nTelly and Prairie ask Big Bird if he can help them find dancers, but he is busy with his line. The next auditions do not", "-22.768973589409143" ], [ "of seventh chords. In the second bridge, the line \"Yes, my name is Billy Shears\" recalls Starr's alter-ego from the Beatles' 1967 album Sgt. Pepper's Lonely Hearts Club Band – specifically, the character named at the end of the album's title song and under which Starr sings the ensuing track, \"With a Little Help from My Friends\". In \"I'm the Greatest\", this section ends with a reference to Starr's age in early 1973: \"Now I'm only thirty-two / And all I wanna do, is boogaloo ...\" The word \"boogaloo\" was a pet phrase of Bolan, whose use of the term had", "-22.74534472549567" ], [ "ink has been spilled debating the meaning of the band's name. John absolutely insists that he was unaware of a CBS News interview from February 10, 1964, in which John Lennon, dismissing a similar question about their moniker, quipped, \"It means Beatles, doesn't it? But that's just a name, you know, like 'shoe'.\" Paul McCartney immediately chimed in, \"The Shoes, you see? We could have been called the Shoes for all you know.\" But if the band's name was intended to be an intentional evocation of that moment, there would certainly have been a \"The,\" which there isn't. Asked why,", "-22.695502832357306" ], [ "changed the spelling to Fuess due to its difficult pronunciation for Americans. According to Fuess, he and his family pronounce their name Fease. Often times he would go by one his nicknames. Those he knew in high school and at Amherst College called him \"Dutch.\" At Phillips Academy he was known as either \"Jack\" or \"Claudie\" or once Headmaster \"B.D.\" (Bald Doctor). Someone even wrote the following poem titled \"Fuess Please\" in 1930 to illustrate the difficulty of his name:\nHe'll exclaim, \"Oh what's the use!\"\n\nWhen he hears you utter \"Fuess.\"\n\nAnd he'll like it even less\n\nIf", "-22.69489485595841" ], [ "either \"Bo Diddley\" or \"Mona\". The percussive piano sound and the rhythms that are reminiscent of some Buddy Holly songs sound like an homage to older rock 'n' roll songs.\n\"She's the One\" has connections with other Springsteen songs. The line from \"Backstreets\", \"I hated you when you went away\" was originally a line in \"She's the One\". \"She's the One\" includes references to French cream and French kisses, which were originally included in an early Springsteen song, \"Santa Ana\". Springsteen has claimed that he wrote the song primarily because he wanted to hear E Street Band saxophonist", "-22.678203739691526" ], [ "allows his mother to use.\nAlthough not canon, Mr. T has stated that in terms of his Christian faith, B. A. now stands for \"Born Again\".\nIn syndicated versions of The A-Team aired in Hispanic and Spanish speaking countries, such as Mexico, B. A. Baracus is translated as Mario Baracus. In Spain, it was translated to M. A. Barracus, in part for the nickname \"Bad Attitude\" which translates into \"Mala Actitud\". In the French version, the meaning of the initials was dodged altogether since the character is constantly called \"Barracuda\" after the large and ferocious fish species of the same name, and", "-22.67701355245663" ], [ "\"just fine\". Sometimes spelled as okey.\nIn Malay, it is frequently used with the emphatic suffix \"lah\": OK-lah.\nIn Vietnamese, it is spelled \"Ô kê\".\nIn India, it is often used after a sentence to mean \"did you get it?\", often not regarded politely, for example, \"I want this job done, OK?\" or at the end of a conversation (mostly on the phone) followed by \"bye\" as in \"OK, bye.\"\nIn Indonesia, OK is also used as a slogan of national television station RCTI since the year 1994.\nIn Pakistan, OK has become a part of Urdu and Punjabi languages.\nIn Germany, OK is spelled as", "-22.669952351017855" ], [ "and ‘oi’ in Brazilian Portuguese, as an informal greeting equivalent to the English 'hi' or 'hey'. 'Ohøj' is used in Danish almost identically to the aforementioned usages. It stems from the sea-faring world, used as an interjection to catch the attention of other crew members, and as a general greeting. It can sometimes also be found on land spoken as a general greeting, again, especially in a maritime context.\nAlexander Graham Bell originally suggested 'ahoy' be adopted as the standard greeting when answering a telephone, before 'hello' (suggested by Thomas Edison) became common. \"a, hoy, hoay\" Ahoy is a combination of", "-22.66851337836124" ], [ "BBC that older fans, in particular, pronounce it with two.\nA professor of applied linguistics of Newcastle University stated that if a second 's' was added to the name, it has to ultimately be pronounced in speech. The BBC went on to state that according to the Apostrophe Protection Society, if the ground is named as the \"Park of St James\", the name of the ground is correctly written as St. James's Park, with the second 's' pronounced.\nCommenting on the written form on Radio Newcastle a week after the BBC story, a different senior lecturer in applied linguistics also of Newcastle", "-22.65014069643803" ], [ "came from that realization. It was one of the first songs we put together when we met in January of 1989.\" Critical reception Mick Wall, writing in Kerrang!, stated, \"Vocally and lyrically, of course, we find ourselves on new ground. Hogarth's certainly got a voice, smooth as glass and emotive as hell. And, in common with his more famous predecessor, it's a very un-American voice, the vowel sounds are all Queen's English. But there the comparisons end. Steve Hogarth is no Fish clone. He's no Peter Gabriel nor Phil Collins apologist, either. He doesn't need to be. He's got a", "-22.569850331230555" ], [ "\"k\" in an effort to \"take the Hun out of his name.\" As he was already well known at the time, the change received wide publicity. \"From then on\", as he wrote in his autobiography, \"most Rickenbachers were practically forced to spell their name in the way I had...\"\nHe believed his given name \"looked a little plain.\" He signed his name 26 times, with a different middle initial each time. After settling upon \"V\", he selected \"Vernon\" as a middle name.\nIn 1916, Rickenbacker traveled to London, with the aim of developing an English car for American races. Because of an", "-22.566755301435478" ], [ "I'm saying? So at that point we had to come to some sort of a resolution. And KP, who signed me to LaFace, he just said, 'OK, look man, how about T.I.?' Cause on this one record I had, it was like, 'T-I-P.' I was like, 'Wait a minute, wait a minute. No. That was — you left out a letter still!' You know what I'm saying? He was like, \"Well, listen man. You got something better?', 'No, I don't have — I don't have anything better.' 'Well, that's what we going with, man.' So it's kinda how it came", "-22.528616625480936" ], [ "he's like 'Yo I just signed with Roc Nation' and I\"m like 'Yo I just signed with J. Records… When it came time to do the lead single for my album he was the first person I thought of.\" Critical response DJBooth.net compared the song to Mary J. Blige and Method Man's 1995 hit \"I'll Be There for You/You're All I Need to Get By\". They give praise to the Oak & Pop heavily influenced beat and Varner's vocals stating \"Varner puts her distinctly unique voice on full display, laying down charismatic vocals declaring that she loves her man even", "-22.449226966593415" ], [ "After the song's release, so many people had misinterpreted the word as \"Bruce\" that Lynne actually began to sing the word as \"Bruce\" for fun at live shows.\nELO engineer Reinhold Mack remembers the genesis of the term differently, stating that Lynne was actually singing \"Bruce\" as a joke in advance of an Australian tour \"referring to how many Australian guys are called Bruce.\" Music video A music video for the song was produced, which showed video of the band performing the song interspersed with various animations relating to the song's subject matter, including big-bottomed majorettes and a pulsating neon frankfurter.", "-22.43286550557241" ], [ "\"the Honkies\" or \"the Crackers\" (which they used when backing Dylan for a January 1968 concert tribute to Woody Guthrie), but these names were vetoed by their record label; Robertson suggests that during their time with Dylan everyone just referred to them as \"the band\" and the name stuck. Initially they disliked the moniker, but eventually they grew to like it, thinking it both humble and presumptuous. In 1969, Rolling Stone referred to them as \"the band from Big Pink.\"\nTheir first album, Music from Big Pink (1968) was widely acclaimed. The album included three songs written or co-written by Dylan", "-22.368484874023125" ], [ "believed that few people in Britain could pronounce \"O'Mahony\" correctly. Allen himself hoped that a surname beginning with \"A\" would put him at the top of any agent's list.\nAllen lost the top of his left forefinger above the middle knuckle after catching it in a machine cog. However, he enjoyed inventing stories to explain the loss, which became a minor part of his act. One version was that his brother John had surprised him by snapping his jaw shut when they were children, resulting in him biting it off. A further explanation he gave on his programme, Dave Allen at", "-22.268332217703573" ], [ "a derogatory nickname Rose had for Fafara. \"We called him that because I used to say, 'I want to take this dude's head and pull it back and rip his tongue out of his neck,'\" Rose grumbled. It features such lines as, \"Look at your face, look at your name/ Funny you're a loser with only yourself to blame,\" and \"You want to be like me 'cause it's real/ So you steal on your way to fame.\"\nIn an interview, Lajon Witherspoon reported having since reconciled with Fafara, stating \"oh, man, all that stuff was young, crazy, Morgan was married to", "-22.264658716972917" ], [ "album. The producers reject his suggested titles, taken from Beatles records, and name the album One Man Only, pushing his talent. Jack persuades them to launch the album with a rooftop concert in Gorleston-on-Sea. Backstage, two fans approach him and tell him they know he plagiarised the songs, but thank him, fearing the music was gone forever. They give him the address of John Lennon, who has survived into old age, out of the public spotlight. Jack asks Lennon if he has led a successful life; Lennon replies that he has lived happily with his wife. He advises Jack to", "-22.25794250878971" ], [ "word \"sonus\", which is the root of sonic and sound, and the other was \"sonny\", a common slang term used in 1950s America to call a young boy. In 1950s Japan, \"sonny boys\" was a loan word in Japanese, which connoted smart and presentable young men, which Sony founders Akio Morita and Masaru Ibuka considered themselves to be.\nThe first Sony-branded product, the TR-55 transistor radio, appeared in 1955 but the company name did not change to Sony until January 1958.\nAt the time of the change, it was extremely unusual for a Japanese company to use Roman letters to spell its", "-22.245589449768886" ], [ "are often either misunderstood or not understood at all by fans, wrote, \"But who's to say Reagan wasn't right to insist the song was an upper? When I hear those notes and that drumbeat, and the Boss' best arena-stentorian, shout-groan vocals come over the speakers, I feel like I'm hearing the national anthem.\" General reaction \"Born in the U.S.A.\" peaked at #9 on the Billboard Hot 100 singles charts in late 1984. It was the third of a record-tying seven Top 10 hit singles to be released from the Born in the U.S.A. album. In addition it made", "-22.199908152921125" ], [ "never spoken the line to him. Pet Sounds lyricist Tony Asher did not recall hearing the remark and could not verify whether it was actually spoken. He said that, \"it seems very much like Mike. And to tell the truth, I think he had a point,\" arguing that Pet Sounds \"was not much of a success\" and that its music \"was [probably] not what Beach Boys fans were expecting.\"\nOver the ensuing years, \"don't fuck with the formula\" was repeated in myriad books, articles, websites, and blogs. The remark is usually invoked to signal the conflicts that arose between Wilson and", "-22.193905979278497" ], [ "Etymology The term \"booyah\" may be a variant of \"bouillon\". It is thought to have derived from the French language words for \"boil\" (bouillir) and \"broth\" (bouillon). The spelling with an H has been attributed to phonetic spelling by Wallonian immigrants from Belgium. The Dictionary of American Regional English attributes the term to French Canadian immigrants; others attribute it to a derivation from the Provençal seafood dish bouillabaisse.\nAn article in the Green Bay Press-Gazette on October 29, 1976, speculating on the origin of the spelling and related fundraiser event, reads:\nLester (Rentmeester) relates recollections of his schoolteacher father, Andrew, probably the", "-22.15375579893589" ], [ "was named after him (he is commonly referred to as \"Fish\" among many other nicknames) though other explanations for the name have been given. In addition to drumming, he also sings back-up vocals and occasionally lead-vocals (usually on cover songs, most of them humorous – the best examples are Prince's \"Purple Rain\", Neil Diamond's \"Cracklin' Rosie\", Will Smith's song \"Gettin' Jiggy Wit It\", and Syd Barrett-era Pink Floyd's \"Bike\"). Worthy of note are his more serious vocal efforts, including lead vocals on Phish's cover of the Talking Heads song \"Crosseyed and Painless,\" and his vocal duties on the Phish", "-22.112268231721828" ], [ "2016 United States presidential election nominees Donald Trump and Hillary Clinton, with Perry taking side with the latter. Zaleski of The A.V. Club was negative towards the track, calling it \"galling\" and \"particularly oblivious\". She noted the line, \"'Cause I'm feminine and soft, but I'm still a boss, yeah\", was not in concordance with the \"not [...] warm or relatable\" Clinton, whom Perry supported on multiple occasions. The Los Angeles Times's Mikael Wood negatively wrote: \" 'Hey Hey Hey' plays like a weak attempt to duplicate the success of her uplifting 2013 smash 'Roar', this time with a paper-thin tune and", "-22.07866242423188" ], [ "Ask Me Why Composition Written in early 1962, \"Ask Me Why\" is principally a John Lennon composition, but was credited to Paul McCartney and John Lennon, as were all other Lennon–McCartney originals on the first pressings of Please Please Me album. Paul McCartney said, \"It was John's original idea and we both sat down and wrote it together, just did a job on it. It was mostly John's.\" It was part of their live act prior to their recording contract, and was one of the songs performed at their first Parlophone recording session in EMI's Abbey Road studio two on", "-22.063473949194304" ], [ "Allen Walker Read Allen Walker Read (June \n2, \n1906 – October 16, 2002) was an American etymologist and lexicographer, best known for his studies into the words \"OK\" and \"fuck.\"\nRead was born in Winnebago, Minnesota, earned a bachelor's degree from the University of Northern Iowa (then called Iowa State Teachers College) in 1925, a master's degree from the University of Iowa in 1926, and studied at the University of Oxford as a Rhodes Scholar from 1928 to 1931. He was a chaired professor at Columbia University in New York City from 1945 until 1975. He was a past president", "-22.024864692903066" ], [ "begin with an \"R\"; however, most characters are able to understand him almost perfectly. In most iterations, he keeps his sentences relatively short, usually using charades for anything longer than three or four words. His catchphrase, usually howled at the end of every production, is \"Scooby-Dooby-Doo!\" or \"Rooby-Rooby-Roo\". Scooby was voiced by Don Messick through Arabian Nights in 1994, after which point Messick quit smoking; quitting smoking changed his voice and prevented him from achieving the same raspy vocal effect (despite Messick's efforts, he suffered a career-ending stroke in 1996 and died in 1997, before any further Scooby-Doo productions were", "-22.02394302537141" ], [ "on the early morning football show Soccer AM, and revealed the name for their album would be Famous First Words, after discussing it in the canteen just half an hour before the interview. They released their debut single, \"Darling Buds of May\", on 27 June 2011. This was followed by three more singles, \"New Year's Day\", released 8 May 2011, and \"\", released 27 June 2011. In June 2011, the band was forced to change their name from Brother to Viva Brother due to a lawsuit brought by another band, also called Brother. Leonard Newell admitted that his band", "-21.996494939128752" ], [ "the San Francisco 49ers. The \"O!\" chant was also heard during the 2016 Summer Olympics in Rio de Janeiro, Brazil, when Baltimore native Michael Phelps received one of his gold medals on August 9, 2016.\nIn recent years, when the Orioles host the Toronto Blue Jays, fans have begun to shout out the multiple instances of the word \"O\" in \"O Canada\". Washington Capitals fans will do the same when they play one of the NHL's Canadian teams. \"Thank God I'm a Country Boy\" It has been an Orioles tradition since 1975 to play John Denver's \"Thank God I'm a Country", "-21.960268748225644" ], [ "quickly. In The Jeffersons season 2 (1976) episode \"The Breakup: Part 2\", Mr. Bentley explains Cockney rhyming slang to George Jefferson, in that \"whistle and flute\" means \"suit\", \"apples and pears\" means \"stairs\", \"plates of meat\" means \"feet\".\nThe use of rhyming slang was also prominent in Mind Your Language (1977–79), Citizen Smith (1977–80), Minder (1979–94), Only Fools and Horses (1981–91), and EastEnders (1985-). Minder could be quite uncompromising in its use of obscure forms without any clarification. Thus the non-Cockney viewer was obliged to deduce that, say, \"iron\" was \"male homosexual\" ('iron'='iron hoof'='poof'). One episode in Series 5 of Steptoe", "-21.940058481064625" ], [ "The Parlor History O'Connor and Krans began writing and performing together in 1998, when they met in the elevator of their college dorm. They \"didn't really think of [them]selves as a band\", and thus never gave themselves a name. Friends began referring to them as \"Jeneric\", a combination of their first names, which later morphed into \"We are Jeneric\", after their website's url. \nAfter spending time living abroad, the couple moved into O'Connor's family estate in Altamont, NY, converting it back into a working farm. They set up a recording space in the house's parlor, from which they derived their", "-21.901730722514912" ], [ "alternative forms are \"newby\", \"nubie\", and \"newbee\" (e.g. Los Angeles Times of August 1985: \"It had to do with newbees. I could be wrong on the spelling, but newbees are the rookies among the Blue Angels...\").\nIn 2009, \"noob\" was among candidates for the one-millionth English word selection by the Global Language Monitor. Connotations of variants Different spellings can have quite different connotations; so in some contexts a \"newb\" refers to a beginner who is willing to learn; while a \"noob\", refers disparagingly to an inexperienced or under-talented hacker or gamer who lacks the determination to learn.", "-21.88665825355565" ], [ "said, 'This is for Jim' – because of that lick [in 'The Bells of Rhymney'].\"\nWriting in The Beatles Anthology, Harrison commented on the difficulties he faced as a nascent songwriter during the Rubber Soul period, relative to Lennon and McCartney, both of whom had been writing \"since they were three years old\". He said he wrote \"If I Needed Someone\" as a love song to Pattie Boyd, the English model whom he married soon after the song's release. The lyrics have nevertheless invited interpretation as being about a groupie or, in the words of music journalist Robert Fontenot, \"some other", "-21.859545840648934" ], [ "it like that, 'cuz I like noise.\" Although the composition is credited to the Lennon–McCartney partnership, it was written by McCartney alone. John Lennon acknowledged in a 1980 interview: \"That's Paul completely.\" Composition The song's musical key is E major and the time signature throughout is 4/4. On the recording issued on The Beatles, its structure comprises two combinations of verse and chorus, followed by an instrumental passage and a third verse–chorus combination. This is followed by a prolonged ending in which the performance appears to stop before picking up once more, and the track subsequently fades out and then", "-21.814328191103414" ], [ "\"Why\", Lennon can be heard asking \"Were you gettin' that?\".", "-21.786863804911263" ], [ "Breen (now better known as Abz Love), Ritchie Neville, Scott Robinson, Sean Conlon, Jason \"J\" Brown, and stand-by members Peter Montpellier, Paul Taylor, Anthony Baker (rapper) and Ric Hershon. Because his first name was Richard, Breen created the nickname 'Abs' (from his middle name, \"Abidin\") to avoid confusion with Neville (born Richard Neville Dobson). Montpellier and Taylor were later cut when the final five were chosen in May 1997 and Hershon couldn't attend the final selection. Anthony Baker made it into the band originally, but doubt was cast over Anthony's rapping style as his North Eastern accent came through.\nThe group", "-21.786789547884837" ], [ "the initials 'RD', a reference to his nickname \"Dickie\" (as in \"dickie bird\").", "-21.753217325545847" ], [ "but isn’t really, over-produced, bland vocals. 'Call My Name' is isn’t by no means terrible, it’s just very blah.\" Similarly, Jenn Selby of Glamour noted that \"Call My Name\" bears resemblance to other productions by Harris, yet admitted that she was surprised with the result of their collaboration, while Elena Gorgan of Softpedia said that the song has everything to become the summer's hottest anthem. The Guardian critic Alexis Petridis gave the song a mixed review, criticizing it for being generic and adding that it lacks \"the spark that powered Rihanna's We Found Love.\" Chart performance Hours after its official", "-21.748980818782" ], [ "and we did that.\" \nThe entire album was produced by Grammy Award-nominated producer Greg Wells, who is known for his work with Adele, Katy Perry, and OneRepublic, among many others. \"Greg was the first producer we've worked with who really spoke my language, which translated into the sound of the album,\" Ritter commented. \"If you really want to know what Kids in the Street sounds like, it sounds like The All-American Rejects finally got their shit together and wrote a record that was going to keep them around.\" Promotion and release During an interview with MTV in October 2011, Ritter", "-21.74868976743892" ], [ "hear my voice.\nI said three, four... he was grimacing, his eyes and his cheeks, he was grimacing so I knew he was awake and then when I said five his eyes popped open like I startled him. He rolled over and got up and said \"I'm OK! Jack I'm OK\" or whatever he said. I said, 'Do you want to continue?', he said 'Yes' and put his arms on my shoulders. I pushed his arms off and said walk over there, come back to me and show me you're OK. He did and we let it go.\nIt is the referee's", "-21.737416822696105" ], [ "an inspiration. John D. Luerssen of Allmusic has stated that they sound similar to The Knack, The Calling, and label-mates Fountains of Wayne. Mikael Wood of Baltimore City Paper has compared the Click Five to Fall Out Boy and the All-American Rejects in terms of sound and crossover appeal. In terms of songwriting, Bill Lamb of About.com has remarked that they seem reminiscent of The Beatles and The Beach Boys. Gary Susman of Entertainment Weekly has stated their vocal harmonies are similar to Queen, but they sing more like the Backstreet Boys.\nSeveral critics and commentators have stated that the Click", "-21.731537880608812" ], [ "using the stage name \"Raine\" instead of \"Mike\" to reduce confusion about having two Mikes in the band. He has used this name professionally ever since (even after Mike Turner left the band) and at one point, made the change legal.\nAn independent music video of the band's debut song \"Out of Here\" was created in February 1992 by Sam Siciliano, a film student and friend of Turner's, who produced, edited, and directed the video. The video was aired on the MuchMusic Indie show. After returning to Arnyard Studios to continue writing and recording material, drummer Jim Newell departed the band.", "-21.726918198852218" ], [ "Jack snipe Etymology The common name has been said to come from the Welsh word for a snipe, giach (pronounced with a hard g), but modern dictionaries say it comes from the masculine name Jack. Alfred Newton hypothesized that, \"It may be, as in Jackass, an indication of sex, for it is a popular belief that the Jack-Snipe is the male of the common species; or, again, it may refer to the comparatively small size of the bird, as the 'jack' in the game of bowls is the smallest of the balls used, and as fishermen call the smaller Pikes", "-21.71418779611122" ], [ "Outta My Head (Ay Ya Ya) Background and composition The song was first mentioned in a September 2007 MTV News article describing a sneak peek of Simpson's album; the article gave its title as \"Ay Ay Ay\". Simpson's father Joe Simpson joked that the song was about her mother Tina, while Tina replied that the song was also about Joe; Simpson herself said that it was \"not about my mom. I just have too many voices in my head, everyone having their own opinion.\"\nOn November 13, 2007, Simpson told MTV News at CosmoGIRL!'s Born to Lead Awards that the album", "-21.713107752497308" ], [ "at the nearby Barbagallo Raceway in Wanneroo. \nRicciardo pronounces his name \"Ricardo\" instead of the Italian pronunciation \"Rit-chi-ardo\", saying that is how his family pronounces it. He has been nicknamed \"the honey badger\". When asked why, he said, \"It's supposed to be the most fearless animal in the animal kingdom. When you look at it, he seems quite cute and cuddly, but as soon as someone crosses his territory in a way he doesn't like, he turns into a bit of a savage and he'll go after anything – tigers, pythons – he turns very quickly, but he's a good", "-21.685361381270923" ], [ "sign.\nBeginning in the early 1970s, the horns were known as the \"P-Funk sign\" to fans of Parliament-Funkadelic. It was used by George Clinton and Bootsy Collins as the password to the Mothership, a central element in Parliament's science-fiction mythology, and fans used it in return to show their enthusiasm for the band. Collins is depicted showing the P-Funk sign on the cover of his 1977 album Ahh... The Name Is Bootsy, Baby! \nFrank Zappa can be seen jokingly making the gesture in the 1979 film Baby Snakes in response to the audience, commenting, \"That's right, spindle twice.\"\nIn 1977, a", "-21.681948089622892" ], [ "\"All those guys in the band, certainly Al, Dennis, and Mike, were constantly saying, 'What the fuck do these words mean?' or 'This isn't our kind of shit!' Brian had comebacks, though. He'd say, 'Oh, you guys can't hack this.'... But I remember thinking that those were tense sessions.\"\nMike Love said \"some of the words were so totally offensive to me that I wouldn't even sing 'em because I thought it was too nauseating.\" The original lyrics of \"I Know There's an Answer\", known as \"Hang On to Your Ego\", created a stir within the group. He opposed the song's original", "-21.6765232582693" ], [ "Records in England told the band that they would not release the song unless it was given an \"alternate title\" (though, in British English, they may have used the word \"alternative\"). By his own account, Dolenz said \"OK, 'Alternate Title' it is\".\nThe song is played by all four Monkees with Dolenz on vocals, drums and timpani, Davy Jones on backing vocals, Mike Nesmith on guitar, Peter Tork on piano and organ, and producer Chip Douglas (The Turtles) on bass guitar.\nDolenz reprises lyrics from the song in \"Love's What I Want\", a bonus track to the 2016 Monkees album Good", "-21.67599540867377" ], [ "Back in Brazil Recording Rolling Stone called the song one of the weirdest tracks on the album, while noting that McCartney played over 9 instruments in the song. The song starts out with a lounge beat, but also included guitar, Wurlitzer piano, conga drums, and a triangle. The chorus of the song just features McCartney yelling the word \"Ichiban!,\" which is strange because it is a Japanese word and not Portuguese. When McCartney was asked why he said \"Ichiban\" in the song he dismissed the question and promised that he'll answer the question at a later date, in the You", "-21.649359020288102" ], [ "presidents who have used this pronunciation include Dwight D. Eisenhower, Jimmy Carter, Bill Clinton, George W. Bush as well as U.S. vice president Walter Mondale. In his 2005 book, Going Nucular, linguist Geoffrey Nunberg suggests that the reasons underlying the differing pronunciations of this word may be different from president to president. Whereas Eisenhower's pronunciation most likely arose from his lack of familiarity with the word (having first learned it in mid-life), Bush's usage may represent a calculated effort to appeal to populist sentiment, though this theory is rejected by linguist Steven Pinker. This analysis is repeated in the", "-21.63858976517804" ], [ "2NU Name When \"This Is Ponderous\" began getting radio play in 1990, the band had not formally come together. A DJ introducing the song said it was from a group \"too new\" to have a name, and \"2NU\" came from that.", "-21.631537512386785" ], [ "Don't Bring Me Down Misheard lyric A common mondegreen in the song is the perception that, following the title line, Lynne shouts \"Bruce!\". In the liner notes of the ELO compilation Flashback and elsewhere, Lynne has explained that he is singing a made-up word, \"Grooss\", which some have suggested sounds like the Swiss/German expression \"Gruß,\" meaning \"greetings.\" Lynne has explained that originally he did not realize the meaning of the syllable, and he just used it as a temporary placekeeper to fill a gap in the lyrics, but upon learning the German meaning he decided to leave it in. ", "-21.60092009138316" ], [ "on iTunes, the Canadian band issued a cease and desist letter. The group ultimately decided to keep the most similar name as possible, removing the vowels, leaving simply 'WSTR'. Musical style and influences WSTR is generally credited as a pop punk band, where the group's lead singer, Sammy Clifford, has cited many of his music influences were from the United States, including Blink-182 and New Found Glory.", "-21.60078470107692" ], [ "around, liking Korn's sound. Bassist Reginald \"Fieldy\" Arvizu said it was because it sounded so \"different\".\nThe band name is derived from a fan suggestion, \"Corn\", which the group initially rejected, but later settled on for a lack of better ideas. Shaffer had the idea to spell the name with both a \"K\" instead of a \"C\", and a backwards \"R\" so the band's name would appear as \"KoЯn\". The logo was designed by lead vocalist Jonathan Davis. Silveria explained, \"the music makes the name, because Korn's a dumb name. But once we get established, it makes the name cool.\" Music", "-21.600115163833834" ], [ "Nashville Sounds' mascot is an anthropomorphic rooster named Booster. He is bright red with yellow legs, beak, comb, and palms and red, orange, and yellow tail feathers resembling flames. He wears the same style jerseys as the team with the number zero on the back. He made his debut on April 17, 2015, at the Sounds' first game at First Tennessee Park. His name refers to \"boosting\" or building enthusiasm for the team, while his appearance is a play on Nashville hot chicken.\nThe first Sounds mascot was introduced during the team's inaugural 1978 season. Homer Horsehide resembled their major league", "-21.59342422708869" ], [ "recalled that during an event Rihanna met with Drake backstage and asked him to record a verse on her song, \"She's calling me up saying, 'Where are the files?' That's one thing you don't hear often from artists on her level.\" \"What's My Name?\" was written by Mikkel S. Eriksen, Hermansen, Ester Dean, Traci Hale and Drake, while the production was done by StarGate. In an interview for HitQuarters, Hale explained that she got into the project that's to a phone call she received from Dean. She also elaborated that her work on the song was mostly lyrical, while Dean", "-21.583786989824148" ], [ "began asking people to pronounce his name as \"Lou-in\" rather than \"Le-veen\" because the misspelling of his name by Americans had led to many missed phone calls. Earlier, he had spent six months as a visiting professor at Stanford in 1930, but on his immigration to the United States, Lewin worked at Cornell University and for the Iowa Child Welfare Research Station at the University of Iowa. Later, he became director of the Center for Group Dynamics at MIT. While working at MIT in 1946, Lewin received a phone call from the director of the Connecticut State Inter Racial Commission", "-21.574983444996178" ], [ "and album covers, plus peppered lyrics, song names, and album titles with the president's various monikers, including \"Reagan,\" \"Ronnie,\" \"Bonzo,\" and \"The Gipper.\"\nSome punk bands even named themselves after the president or events related to him, the first being the anarcho-punk band Reagan Youth who formed in Queens, New York in 1980 as a tongue-in-cheek reference to the Hitler Youth. The band's theme song was sung in satire as if by a cadre of neo-fascist youth, shouting, \"Reagan Youth—Sieg Heil!\" In April 1981, 19 days after the attempted assassination of Reagan by John Hinckley Jr., a skate punk group from", "-21.56335527729243" ], [ "Rex Orange County Name The name Rex Orange County is based on a teacher-given nickname, \"the OC\", after his surname O'Connor. \"The OC\" is a nickname for Orange County, California, popularized by the television show The O.C. Childhood At age five, O'Connor was a part of the choir at the school where his mother worked. He grew up listening to Queen, ABBA, Green Day, and Weezer, along with more classical soulful artists, like Stevie Wonder who also inspired him. He is a drummer, self-taught pianist, and he picked up the guitar when he was 16. At this age, he started", "-21.550365017727017" ], [ "('mono') sound.\nThe Calling entered the ARIA Albums Chart in March 2004 and reached No. 53 before exiting the top 100 in September of the same year. By December 2006 it was certified platinum for shipment of 70,000 units, becoming the first Australian hip hop album to achieve platinum status. In March 2012, it re-entered the chart and peaked at No. 50 – eight-and-a-half years after its first release. It featured two singles, \"The Nosebleed Section\" and \"Dumb Enough\", which were listed in the Triple J Hottest 100, 2003. \"The Nosebleed Section\" was ranked No. 17 in the Triple J Hottest 100 of All Time", "-21.485647903289646" ], [ "expressing myself.\" Titling Despite the critical and commercial success of her two previous albums, Jackson continued to receive numerous comparisons to her brother Michael, often with doubts that she held staying power in the music industry. When Edna Gundersen of USA Today questioned her about the subject, she responded: \"Certain people feel I'm just riding on my last name ... That's why I just put my first name on janet. and why I never asked my brothers to write or produce music for me.\" Virgin Records expressed the album title \"punctuates the declaration of strength the singer, songwriter and producer boldly", "-21.48399652959779" ], [ "I.O.I.O. Recording The title \"I.O.I.O.\" is derived from the calls on the chorus sung by Maurice accompanied by Colin's drumming, and Barry sings the verses and plays guitar. Former Bee Gees guitarist Vince Melouney was featured, having played the guitar on the song's first session on 12 June 1968 during sessions for, Idea, but was not present when the song was finished, as he left the group following the album Odessa. The song's second session was October 8, 1969 after they had recorded \"Twinky\" (unreleased) and \"The Chance of Love\". (Pentangle drummer Terry Cox added drums on the October 8", "-21.459198479511542" ], [ "the branches of trees.\nThey spent their final night in Nairobi at a YMCA, before they returned to London. The Beatles—according to McCartney—needed a new name, so on the flight back to England, Evans and McCartney played with words to see if they could come up with something new. Evans innocently asked McCartney what the letters \"S\" and \"P\" stood for on the pots on their meal trays, and McCartney explained that it was for salt and pepper, which led to the Sgt. Pepper's Lonely Hearts Club Band name. They arrived back in London on 19 November 1966. Before the cover", "-21.447983416030183" ], [ "all time. The writer commented that the song was \"a true falsetto fantasy\" and that it was \"still thrilling to hear the sweet-voiced duo trade harmonies on the chorus\". In 2005, Dutch musicians Hi Tack sampled \"Say Say Say\" on their debut single, \"Say Say Say (Waiting 4 U)\". The song featured Jackson's vocals from the original recording, plus McCartney's \"Baby\". 2015 version On October 6, 2015, McCartney released a new version of the song in which the vocal roles of him and Jackson are reversed. It was remixed by Steve Orchard and Mark \"Spike\" Stent. On the new version,", "-21.414588602958247" ], [ "will probably begin with an M.\" During interviews the band has already given many different reasons and meanings to the album's name. In some they stated that it had no meaning and that they had the title in mind for at least two years before deciding upon it. But Martin also said it was reference to the album's characters, the boy (Mylo) and the girl (Xyloto) respectively. Another meaning suggested by the frontman was that the name was supposed to be a graffiti tag for the band, relating \"xylophone\" to the word \"xyloto\". Much of the art was done by", "-21.399281202349812" ], [ "the group was confronted with the grammatical incorrectness of their name. The group said they were aware that “sheeps” was not the correct plural form but contended that this did not matter. “Many bands have spelling mistakes in their name, such as The Beatles. Remember it’s just a band name, so anything works,” was their reply.", "-21.35074986773543" ], [ "name is a combination of the common middle name of all the men on their father's side (James) and their mother's maiden name (Davis). In around 2014, Motown president Ethiopia Habtemariam heard the group's demo and signed them to a recording contract. The trio's first Motown single, \"Better Than You Are\", was released in January 2015. A second single, \"Co-Pilot\", and its accompanying music video were released the following month. The group also released a cover of The Cranberries' song, \"Zombie\". In May 2015, the trio released its self-titled debut EP (James Davis) on Motown and began opening for Seinabo", "-21.347770078988106" ], [ "of affection\". A \"bang\" means a kiss and this Irish phrase of \"bang on the ear\" can best be considered equivalent to the more common phrase \"peck on the cheek\".\n\"Has Anybody Here Seen Hank\" is a country music tribute to Hank Williams, listening to whom Scott described as \"a life-changing experience\". The Waterboys had previously paid tribute to a different influence on Scott, Patti Smith, with the song \"A Girl Called Johnny\" on their first album, The Waterboys.\n\"Dunford's Fancy\" was written by Wickham for Steve Dunford, brother to Waterboys producer John Dunford.\n\"The Stolen Child\" was the first William", "-21.344514928292483" ], [ "Tenida Tenida The suffix da used after his actual nickname Teni is short for dada (elder brother) which is used to initiate conversations with an elderly male stranger in colloquial Bengali. The shorthand, used after a person's name, is a mark of respect and acknowledgment of seniority. He is the leader of the gang and sometimes the neighborhood bully. Tenida's real name is Bhojohori Mukherji (Bengali: ভজহরি মুখার্জী). He is an indigent Bengali Brahmin. Pyalaram Pyalaram (Bengali: প্যালারাম), the narrator of the stories, wrote from the point of view of the writer himself. He was a timid member and suffered", "-21.343722532037646" ], [ "Myspace blog, Ruud said \"I decided to call it that because I think that name raises all the questions that don't have immediate answers in an instant. And what is more interesting than searching for answers? Everybody is looking for certain answers I guess. Even subconsciously. Therefore it's multi-interpretable. The only questionable thing about the name that might raise some eyebrows instead of questions is when you pronounce the abbreviation of it; FAWK. Ah well, that's just a minor detail...\nMusically it's going to be heavy in the basics. Very guitar oriented of course. It won't be a shred-fest but guitaristically", "-21.342080553004052" ], [ "heard a milkman whistling 'From Me to You'. Actually, I'm sure that I once heard a bird whistling it as well. I swear I did!\" First US release When it released \"Please Please Me\" in the United States, Vee-Jay Records signed a licensing agreement giving it the right of first refusal on Beatles records for five years. Despite the failure of \"Please Please Me\" to catch on, Vee-Jay chose to release \"From Me to You\"; as a result, it was never turned down by Capitol, because it was never offered to them. \"From Me to You\" was released on Vee-Jay", "-21.341233696801282" ], [ "got called a fag by the jocks. Couldn't walk through the halls without hearing that or being picked on.\"\nWhen you play the part Jon says \"All My Life Who Am I\" backmasked it sounds like he's saying \"Hell No, Hell No More!\" repeatedly.\n\"Daddy\", the album's longest track saw, Jonathan Davis \"descending very real tears.\" Davis said that the song's concept deals with his childhood, saying \"People think 'Daddy' was written because my father abused me, but that's not what the song's about. When I was a kid, I was being abused by someone else. I don't really like to talk", "-21.339803869967" ], [ "of McCartney. Martin remembers that McCartney suggested this change to make his voice sound younger. McCartney says, \"I wanted to appear younger, but that was just to make it more rooty-tooty; just lift the key because it was starting to sound turgid.\" Release The song was nearly released on a single as the B-side of either \"Strawberry Fields Forever\" or \"Penny Lane\". It was instead held over to be included as an album track for Sgt. Pepper's Lonely Hearts Club Band. It was also included in the film Yellow Submarine.", "-21.330907162395306" ], [ "this name is much more reflective of Trump's true nature, and says that if viewers wanted to vote for \"the charismatic guy promising to make America great again\", they should \"stop and take a moment to imagine how [they] would feel if [they] just met a guy named Donald Drumpf.\"\nAfter noting the \"powerful\" and \"almost onomatopoeic\" connotation that the Trump surname has with some people, Oliver says of the ancestral name, \"Drumpf is much less magical. It's the sound produced when a morbidly obese pigeon flies into the window of a foreclosed Old Navy. [...] It's the sound of a", "-21.325660620932467" ], [ "regional variant). Probably named for Iggy Pop or simply a diminutive for \"Grandfather\". In the German production his full name is \"Bap Niedecken\". The name refers to the German band \"Bap\" (Cologne dialect for \"Papa\" = \"Father\") and the singer Wolfgang Niedecken. In the Brazilian production his name is \"Toca Raul\", a reference to Raul Seixas, and to a popular expression associated with him (Toca Raul = Play Raul) but that is also said during many rock concerts in Brazil, regardless of the singer.\nOther Bohemians – The other Bohemians have constantly changing names following media trends. These are usually music-related,", "-21.324710728919854" ], [ "Kipp Lennon Early and personal life Lennon was born in Venice, California, the son of William and Isabelle Lennon. His given name is Christopher. The explanation he gives for his nickname is: \"When I was brought home from the hospital as a brand new baby, March 1960, everyone was calling me 'Chrissy', like people do with newborns. You add an 'e' or 'y' or whatever to their name as an instant nickname. Okay, so my brother Joe was 3 years old and he couldn't say 'Chrissy', and kept saying 'Kippy'. My brother Dan, who was ten, thought that was hilarious,", "-21.31572500918992" ] ]
5kxpj5
why are most cars front-wheel drive, but motorcycles and bikes are rear-wheel drive?
[ "Most cars are FWD for two somewhat related reasons; packaging and cost. Generally speaking, FWD powertrains are less complex, require fewer parts, and take up less room than a RWD car; this makes the car lighter, cheaper to produce, and increases cabin space. Motorcycles and bikes are RWD mostly due to the interference with the steering and/or engineering difficulties that would result from running a chain to the front wheel. It's much easier to run the chain to the rear wheel that never turns.", "FWD in cars requires less drive train linking the front of the engine to the rear wheels. Great for economy vehicles. Motorcycles however are single track vehicles that turn differently than cars. On a car you turn the wheels and they shift left or right. On a bike you lean to the side to turn as well as use the handlebars. If you linked a chain between the engine and front wheel you could no longer turn your handlebars at low speed. Also front wheel drive causes things to be bad at turning. A FWD car will always understeer, not an admirable trait for a bike. Higher end cars often are equipped with rear wheel drive or all wheel drive which both offer advantages in performance over front wheel drive however are less economic.", "it's engineering reasons. cars come in all kinds of drivetrain. it's just that most are front wheel drive, because they're cheap, efficient, light, and mostly controllable. on a bike. it's easier to transfer the power to the rear wheel, as they don't really lose and efficiency by doing so, unlike most rear wheel drive car, which have to add a number of moving parts, and along with it, weight, to transfer the power from the front of the car, all the way to the rear (quite a bit more part than you might think) so on a bike, there's no real reason to move the driving wheel. instead, there reason to keep it rear wheel driven. that is weight bearing and grip. on acceleration, weight transfer occurs, and some amount of weight is transferred to the rear half of the vehicle, and then to the rear wheel, and now because it's bearing more load, it's being pushed down, and it has more grip, so more acceleration, means more weight transfer means more grip, at least until the tire hit it's limit but if it were front wheel driven, when you accelerate, the weight that was supposed to be pushing down on the driving wheel, the front wheel, and lifted off, and so the more you accelerate, the less grip it has. on a car, it may just results in wheel spin, but that's it, reduce the acceleration, the tires grip again, and you're off again. but a loss of front wheel grip on a bike is literally fatal. because you're balancing your bike with your body, and not with 4 wheels, once one of your wheel loses grip, it's SUPER easy to lose balance and fall. rear wheel momentary loss of grip may still be manageable, but front wheel loss of grip will almost guarantee you a fall. of course there's mechanical reasons too, mainly how to transfer the power to the front wheel on a bike, except is it's an electric bike TL;DR : you want grip on the driving wheel, and when you accelerate you're 'giving' the rear wheel more grip. but loss of grip on the front wheel on a bike is more fatal than it is on a car", "Most cars have engines in the front. The engine is pointed sideways so that the turning motion the engine generates can be connected straight to one of the front wheels. If the engine needs to turn one of the back wheels, then you need to add a bunch of stuff in order to get the turning motion from the engine all the way to a back wheel. This usually means a long shaft connected at 90 degrees to another shaft that is connected to the wheels. The more stuff you add the more you lose energy to friction. This is bad for fuel economy.", "The only reason FWD exists is because of packaging and cost. FWD is cheap to produce as everything interesting about the car (engine, driven wheels) can be packaged together in one place. RWD provides superior handling and performance to FWD. It permits you to have control over the behavior of both the front and rear of the vehicle under acceleration and braking (e.g. oversteer), allows 100% of friction from one set of wheels to be allotted to acceleration instead of split between steering and acceleration, and due to weight transfer under acceleration allows for greater force to be applied while accelerating (weight shifts to the rear when accelerating and shifts to the front when braking, thus large brakes on the front wheels). There is also no interference of the powertrain with the steering of a RWD vehicle -- e.g. torque steer can occur in a FWD car if one wheel gains even slightly more traction than the other -- and the feeling/responsiveness of the steering wheel is usually better because of the lack of interference as well. AWD in performance cars is usually heavily biased to send power to the rear wheels, and it's for these reasons. The reason AWD is useful in performance cars is because many of them have so much power that the rear wheels alone do not have enough traction to put all of that power to the road without wheelspin, so the front wheels can also be used for acceleration. AWD drivetrains have more loss due to mechanical inefficiencies, so there needs to be a good reason to use AWD vs. RWD or FWD alone (and usually that's because there is so much available power -- 500+ hp -- that the loss is worth the other tradeoffs).", "Most answers are wrong. The main reason for FWD is that it handles easier. If you lose grip, the car behaves calmly and nicely, instead of going into a fishtail that requires some skill to control. That said, with skill, you can do a lot more with RWD, but, the sad truth is that very few drivers have that skill (even if many think they have). This is why racing cars often have RWD (and because it's easier to put a large engine in and transfer the power from a large engine without things breaking). RWD is actually easier to build. Sure, the drive shaft is a little longer, but the mechanics are simpler. It's not a coincidence that RWD came before FWD. So, why not on motorcycles. Well, the front wheel is also a large part of how you keep the balance. So, if it looses grip, you get a very nasty situation. Anyone who has tried using the front brake on a bike on ice knows that it's painful. This is not a problem with cars, as they aren't very prone to tipping over.", "It would be difficult to steer with a chain linked from the engine or pedals to the front wheel on a bike." ]
[ [ "cheap alternative to passenger cars; they have also been used by armed forces, police and the UK's AA and RAC motoring organisations. Design A sidecar motorcycle is a three-wheeled vehicle with the side wheel not directly aligned with the rear motorcycle wheel, and is usually powered by the rear wheel only. This is different from a motor tricycle (trike), where both rear wheels are powered and share a common axle. However, either P.V. Mokharov of the Soviet Union or H.P. Baughn of Great Britain seem to have been the first to employ a driven sidecar wheel in 1929. Baughn", "-35.31589736492606" ], [ "For this reason, conventional cars have a relatively wide wheel base. A wide wheel base however, also leads to a high frontal area leading to high drag.\nThe stability issue of narrow vehicles is solved when it is able to take a banked turn. By banking the centrifugal force is compensated by the inward lean. This behavior can be observed in motorcyclists when taking turns. Also in nature, high-speed animals bank into the curve they are taking.\nOn a motorcycle, the rider has to work in three modes of operation, i.e. a high-speed, low-speed and stand-still mode. At high speed, the rider", "-34.801410669257166" ], [ "with shaft drives a longitudinal engine. Longitudinal engines in motorcycles do have one disadvantage: the \"tipping point\" of the crankshaft tilts along the entire motorcycle to a greater or lesser degree when accelerating. This is partly resolved by having other components, such as the generator and the gearbox, rotate in the opposite direction to the crankshaft.\nMost larger, \"premium\" vehicles use this engine orientation, both front and rear wheel driven, because powerful engines such as the inline-6 and 90° big-bore V8 are usually too long to fit in a FF transverse engine bay, while most mainstream modern vehicles use front wheel", "-34.64963313512271" ], [ "to lean in the same manner as bikes without sidecars. Also, Ural had a reversible sidecar for the European market.\nThe body typically provides one passenger seat and a small trunk compartment behind. In some cases the sidecar has a removable soft top. In some modifications, the sidecar's body is used for carrying cargo or tools, like a truck's platform. The sidecar is typically mounted so that the motorcycle is closer to the centre of the road, i.e. with the sidecar on the right for right-hand traffic. Handling A sidecar makes the bike asymmetrical. A fixed mounted rig with right mounted", "-34.59943791409023" ], [ "them cleaner and quieter than motorcycles, as well as having more built-in storage space. Automatic clutches and continuously variable transmissions (CVT) make them easier to learn on and to ride. Scooters usually have smaller wheels than motorcycles. Scooters usually have the engine as part of the swingarm, so that their engines travel up and down with the suspension.\nUnderbones are small-displacement motorcycles with a step-through frame, descendants of the original Honda Super Cub. They are differentiated from scooters by their larger wheels and their use of footpegs instead of a floorboard. They often have a gear shifter with an automatic clutch.\nThe", "-34.26204419287387" ], [ "Scooters have a \"step-through\" seating style, in which the driver sits on a more chair-like seat, with the legs together; as well, scooters have automatic transmissions. Laypersons often associate the engine size as a dividing line between motorcycles and scooters, since a typical scooter has a small 50 cc engine, but scooter engines can also be as large as 650cc as used in the Suzuki Burgman.\nMotorcycles with sidecars are not usually considered tricycles. It can be harder to categorize three-wheeled automobiles. While some early prototype automobiles were steam tricycles, three-wheeled cars such as the Morgan 3-Wheeler are often classified as", "-34.197889282688266" ], [ "sidecar can go faster in left turns than in right turns because the sidecar prevents it from tipping over. In right turns, they can tip over if curves are taken too fast. Some techniques can be used to take a right curve faster without tipping, like usage of the brake on the sidecar, if one is fitted.\nWhile a sidecar pilot is described as driving rather than riding, with all but the heaviest rigs, the comparison to a car is weak. Driver and passenger body position affect higher speed handling, especially on dirt or other uneven surfaces. If the sidecar and", "-34.1592203444452" ], [ "of the motorcycle in jurisdictions where traffic keeps to the right side of the road; the sidecar's position is reversed in left-side jurisdictions. This matches the usual configuration of driver and front-seat passenger in cars. In the UK, sidecars fitted to the right side are prohibited on motorcycles registered after August 1981. In Italy, left-mounted sidecars were prohibited in 1924, though the ban was not enforced until 1959.\nIn the Republic of China (Taiwan), Article 39-2 of the Road Traffic Security Rules (zh:道路交通安全規則) prohibits the registration of new motorcycles with sidecars but does not specifically restrict fitting them later. Flexible", "-34.042148068590905" ], [ "located further back in the engine bay, as close to the firewall as possible.\nSince the 1990s, all-wheel drive has become more common in sports cars. All-wheel drive offers increased traction, although the downside is the added mass of the extra drivetrain components. Examples of all-wheel drive sports cars are the Lamborghini Huracan, Bugatti Veyron and Nissan GT-R.\nRear engine layouts are not commonly used for sports cars, with the notable exception of the Porsche 911.\nAlthough front-wheel drive with the engine at the front (FF layout) is the most common layout for cars in general, it is not as common amongst sports", "-33.992852955176204" ], [ "fuel-cells or batteries.\nMotorcycle engines can be mounted transversely; with the crankshaft aligned perpendicular to the frame or longitudinally, with the crankshaft parallel to the frame. Motorcycles with transversely mounted engines are more suited to have chain or belt final-drive. Motorcycles with longitudinally mounted engines are more suited for shaft final-drive.\nMotor scooters often have the engine as part of the rear suspension, so the engine is not fixed rigidly to the main frame. Instead, the combined engine-transmission-swingarm assembly is pivoted to follow the road surface and is part of the \"unsprung weight\". The chain final-drive of scooters runs in an oil-bath", "-33.94363527344831" ], [ "On most bikes, when the front wheel is turned to one side or the other, the entire rear frame pitches forward slightly, depending on the steering axis angle and the amount of trail. On bikes with suspensions, either front, rear, or both, trim is used to describe the geometric configuration of the bike, especially in response to forces of braking, accelerating, turning, drive train, and aerodynamic drag.\nThe load borne by the two wheels varies not only with center of mass location, which in turn varies with the amount and location of passengers and luggage, but also with acceleration and deceleration.", "-33.89563409939001" ], [ "parts. Velomobiles with two rear wheels may drive just one wheel, or may drive both. Driving a single wheel is the simplest and lightest approach. Driving both wheels can improve traction but also increases complexity, cost, and weight. A solid axle may be used, but increases friction/drag in corners and thus can slow down the vehicle. One alternative is a differential, which is the approach used in most cars. A second alternative is to use a pair of ratchets, where the slower wheel is driven and the faster wheel coasts. Rear drive often", "-33.87574988126289" ], [ "Two-wheel drive Four-wheeled vehicles For four-wheeled vehicles (and by extension, vehicles with six, eight, or more wheels) this term is used to describe vehicles that are able to power at most two wheels, referred to as either front or rear-wheel drive. The term 4x2 is also used, to denote four total wheels with two being driven. Most road vehicles use a 2WD layout due to its light weight and simplicity. Traction on the road is usually sufficient that the driving force can be reliably transmitted through only two wheels.\nFor vehicles that have part-time four-wheel drive, the term refers to the", "-33.84986988714081" ], [ "have varying engine displacements and configurations ranging from 50 cc single-cylinder to 850 cc twin-cylinder models.\nTraditionally, scooter wheels are smaller than conventional motorcycle wheels and are made of pressed steel or cast aluminum alloy, bolt on easily, and often are interchangeable between front and rear. Some scooters carry a spare wheel. Many recent scooters use conventional front forks with the front axle fastened at both ends. Regulatory classification Most jurisdictions do not differentiate between scooters and motorcycles. For all legal purposes in the United States of America, the National Highway Traffic Safety Administration (NHTSA) recommends using the term motorcycle for all of", "-33.79843100612197" ], [ "well as a unique driving experience.\nWith two wheels in the front (the \"tadpole\" form or \"reverse trike\") the vehicle is far more stable in braking turns, but remains more prone to overturning in normal turns compared to an equivalent four-wheeled vehicle, unless the center of mass is lower and/or further forward. Motorcycle-derived designs suffer from most of the weight being towards the rear of the vehicle.\nFor lower wind resistance (which increases fuel efficiency), a teardrop shape is often used. A teardrop is wide and round at the front, tapering at the back. The three-wheel configuration allows the two front wheels", "-33.7811325202274" ], [ "at the back (1F2R) (such as the Reliant Robin). Due to better safety when braking, an increasingly popular form is the front-steering \"tadpole\" or \"reverse trike\" sometimes with front drive but usually with rear drive. A variant on the 'one at the front' layout was the Scott Sociable, which resembled a four-wheeler with a front wheel missing.\nThree-wheelers, including some cyclecars, bubble cars and microcars, are built for economic and legal reasons: in the UK for tax advantages, or in the US to take advantage of lower safety regulations, being classed as motorcycles. As a result of their light construction and", "-33.76673142632353" ], [ "cars rather than motorcycles. Generally, the motorcycle classification will require passengers to sit behind the driver, whereas in the car classification, at least one passenger is able to sit abreast to the driver. Motorcycle tricycles A motorized tricycle's wheels may be arranged in either configuration: delta or tadpole. A delta trike has one wheel in front and two in back, and the tadpole trike has two wheels in front and one in back. Occasionally, rear wheel steering is used, although this increases the turning circle and can affect handling (the geometry is similar to a regular trike operating in", "-33.69342908391263" ], [ "type, such as road racing and street bikes, or motocross and dirt bikes.\nStreet bikes include cruisers, sportbikes, scooters and mopeds, and many other types. Off-road motorcycles include many types designed for dirt-oriented racing classes such as motocross and are not street legal in most areas. Dual purpose machines like the dual-sport style are made to go off-road but include features to make them legal and comfortable on the street as well.\nEach configuration offers either specialised advantage or broad capability, and each design creates a different riding posture.\nIn some countries the use of pillions (rear seats) is restricted. Experimentation and invention", "-33.46572140889475" ], [ "rider system, are mostly caused by the rider or by friction. In addition to pedaling, the rider can apply torques between the steering mechanism (front fork, handlebars, front wheel, etc.) and rear frame, and between the rider and the rear frame. Friction exists between any parts that move against each other: in the drive train, between the steering mechanism and the rear frame, etc. In addition to brakes, which create friction between rotating wheels and non-rotating frame parts, many bikes have front and rear suspensions. Some motorcycles and bicycles have a steering damper to dissipate undesirable kinetic energy, and some", "-33.18650638364488" ], [ "drive along with a transverse engine arrangement.\nCars with longitudinal engines usually have a smaller minimum turning circle than those with transverse engines. This is because there is more space to the sides of the engine, allowing deeper wheel arches so the front wheels are able to turn through a greater angle.\nHonda and Toyota were also offered cars with longitudinal engines, namely Honda Vigor, Acura/Honda Legend/RL and Toyota Tercel.", "-33.12680189913954" ], [ "Three-wheeler Overview Many three-wheelers which exist in the form of motorcycle-based machines are often called trikes and often have the front single wheel and mechanics similar to that of a motorcycle and the rear axle similar to that of a car. Often such vehicles are owner-constructed using a portion of a rear-engine, rear-drive Volkswagen Beetle in combination with a motorcycle front end. Other trikes include ATVs that are specially constructed for off-road use.\nThree-wheelers can have either one wheel at the back and two at the front (2F1R), (for example: Morgan Motor Company) or one wheel at the front and two", "-33.09261104010511" ], [ "Rear-wheel drive Rear-wheel drive (RWD) is a form of engine and transmission layout used in motor vehicles, where the engine drives the rear wheels only. Until the late 20th century, rear-wheel drive was the most common configuration for cars. \nMost rear-wheel drive vehicles feature a longitudinally mounted engine at the front of the car. Location of engine and transmission The most common layout for a rear-wheel drive car is a with the engine and transmission at the front of the car, mounted longitudinally.\nOther layouts of rear-wheel drive car include front-mid engine, rear-mid engine and rear-engine. Transaxle configuration Some manufacturers, such", "-32.90628992983329" ], [ "more “neutral” handling - with less oversteer or understeer. This is a much more efficient means of turning and allows for faster cornering speeds as opposed to a two-wheel or conventional four-wheel-drive system. Drawbacks Such a system is very difficult and expensive to design and engineer, which is why it is only usually found on race cars and very expensive sports cars.\nMost mid-engine cars, because of the size and position of the engine and transmission, compromise heavily on both passenger and boot/trunk space.\nFour-wheel-drive systems tend to be quite heavy and some of the engine's power can be lost through", "-32.77704355440801" ], [ "the engine is mounted on the frame, most modern scooters allow the engine to swing with the rear wheel, while most vintage scooters and some newer retro models have an axle-mounted engine. Modern scooters starting from late-1980s generally use a continuously variable transmission (CVT), while older ones use a manual transmission with the gearshift and clutch control built into the left handlebar.\nScooters usually feature bodywork, including a front leg shield and body that conceals all or most of the mechanicals. There is often some integral storage space, either under the seat, built into the front leg shield, or both. Scooters", "-32.724012696009595" ], [ "and four-wheel drive rally vehicles because they can be easily turned rapidly by using excess power to the wheels and the use of opposite lock steering, however the technique is still beneficial when the driver needs to decelerate and slide at the same time. In rear wheel drive, left foot braking can be used when the car is at opposite lock and about to spin. Using throttle and brake will lock the front tires but not the rears, thus giving the rears more traction and bringing the front end around.\nFinnish rally legend Flying Finn Rauno Aaltonen used left-foot braking as", "-32.67593903004308" ], [ "would not consider a conventional motorcycle or scooter as an alternative, seeing it as a far less convenient and less safe option. To these people, an FF motorcycle needs to be seen (and hence marketed) as a two-wheeled car rather than an enclosed motorcycle. As the FF design moves the rider from an upright or Head First (HF) posture to a recumbent position (as in the Quasar and Dan Gurney's Alligator), the machine becomes lower and may make it harder to see in traffic. However, most FFs have seat which is no lower than the average car, and much", "-32.589223902876256" ], [ "gain momentum, with the 1981 Ford Escort, the 1982 Nissan Sentra, and the 1983 Toyota Corolla. Front-wheel drive became the norm for mid-sized cars starting with the 1982 Chevrolet Celebrity, 1982 Toyota Camry, 1983 Dodge 600, 1985 Nissan Maxima, 1986 Honda Legend, and the 1986 Ford Taurus. By the mid-1980s, most formerly rear-wheel-drive Japanese models were front-wheel drive, and by the mid-1990s, most American brands only sold a handful of rear-wheel-drive models. 1990–present The vast majority of front-wheel-drive vehicles today use a transversely mounted engine with \"end-on\" mounted transmission, driving the front wheels via driveshafts linked via constant velocity (CV)", "-32.572437955008354" ], [ "Wheelie In vehicle acrobatics, a wheelie, or wheelstand, is a vehicle maneuver in which the front wheel or wheels come off the ground due to sufficient torque being applied to the rear wheel or wheels, or rider motion relative to the vehicle. Wheelies are usually associated with bicycles and motorcycles, but can be done with other vehicles such as cars, especially in drag racing and tractor pulling. History The first wheelie was done in 1890 by trick bicyclist Daniel J. Canary, shortly after modern bicycles became popular. Wheelies appear in popular culture as early as 1943, as U.S Army motorized", "-32.55742598499637" ], [ "to close the geometry of the suspension (it means that, unlike the BMW version, the suspension will work also with a broken upper arm).\nDrag racing motorcycles (called dragbikes) will often use longer swingarms to keep their center of gravity as forward as possible, which reduces the tendency to wheelie at the start.\n\nA single-sided swingarm is a type of swingarm which lies along only one side of the rear wheel, allowing the rear wheel to be mounted like a car wheel (unlike the conventional motorcycle double-sided swingarm). Single-sided swingarms are traditionally found on small motorcycles or scooters, where a robust chain", "-32.40918340423377" ], [ "because they are too commonplace and utilitarian, while motorcycles retain a unique romance.\nThe interior of the Guggenheim's spiral ramp was covered in reflective stainless steel, a design by Frank Gehry, with a stylized pavement under the tires of the exhibits, and the bikes not leaned over on their kickstands, but rather standing up, as if in motion, held by thin wires and small clear plastic chocks under the wheels. Early examples from the 19th century, steam cycles and three wheelers mostly, were in a single room near the entrance. The first series produced motorcycle, and the first motorcycle", "-32.39473127172096" ], [ "Motorcycle frame A motorcycle frame is a motorcycle's core structure. It supports the engine, provides a location for the steering and rear suspension, and supports the rider and any passenger or luggage. Also attached to the frame are the fuel tank and battery. At the front of the frame is found the steering head tube that holds the pivoting front fork, while at the rear there is a pivot point for the swingarm suspension motion. Some motorcycles include the engine as a load-bearing stressed member; while some other bikes do not use a single frame, but instead have a front", "-32.2997705352027" ], [ "Flathead motorcycles Flathead motorcycles are a type of bike that was a standard for pre-war motorcycles, in particular US V-twins such as Harley-Davidson and Indian, some British singles, BMW flat twins and Russian copies thereof.\nFlathead motorcycles have side-valve cylinder heads, an early engine design that has mostly fallen into disuse. \nIn 1925 Cleveland Motorcycle Manufacturing Company released a motorcycle with a 36.5 cubic inches (598 cc) T-head four-cylinder engine designed by L. E. Fowler. Model W, singles, and 45s (DL, RL, and WL) The flathead engine saw service in Harley-Davidson motorcycles beginning with the Model W's flat-twin, produced from 1919 to", "-32.20929393952247" ], [ "motorcycles were mounted horizontally along the frame, but all current four-cylinder BMW motorcycles have transverse engines. The modern Triumph company has offered inline-four-powered motorcycles, though they were discontinued in favour of triples.\nThe 2009 Yamaha R1 has an inline-four engine that does not fire at even intervals of 180°. Instead, it uses a crossplane crankshaft that prevents the pistons from simultaneously reaching top dead centre. This results in better secondary balance, which is particularly beneficial in the higher rpm range, and \"big-bang firing order\" theory says the irregular delivery of torque to the rear tire makes sliding in the corners at", "-32.172989169252105" ], [ "wheels introduce more weight and more complexity. The fourth wheel is only of the most benefit to the single-seat rider when going off-road. When two and sometimes four riders want to ride together in a sociable configuration the four-wheel recumbent cycle is a viable option. Homebuilts As with upright bikes, there is a subculture of recumbent builders who design and build home-built recumbents. Often these are assembled of parts from other bikes, particularly mountain bikes. The frame designs may be as simple as a long steel tube bent into the appropriate shape, or as elaborate as hand-built carbon fiber frames.", "-32.170313125592656" ], [ "is longitudinally mounted and the front of the engine also points \nto the front of the car. In front-wheel drive cars with a transverse engine, the front of the engine usually points towards \nthe right-hand side of the car. One notable exception is Honda, where many models have the front of the engine at the left-hand side of the car.\nIn front-wheel-drive cars with longitudinally mounted engines, most often the front of the engine will point towards\nthe front of the car, but some manufacturers (Saab, Citroën, Renault) have at times placed the engine 'backwards', \nwith #1 towards the firewall. One notable", "-32.15739943928202" ], [ "as Alfa Romeo, Lancia, Porsche (944, 924, 928) and Chevrolet (C5 and C6 Corvettes), place the engine at the front of the car and the transmission at the rear of the car, in order to provide a more balanced weight distribution. This configuration is often referred to as a transaxle since the transmission and axle are one unit. 1890s to 1960s Many of the cars built in the 19th century were rear-wheel drive, often with the engine mounted at the rear of the car. The first rear-wheel drive car with the engine mounted at the front was an 1895 Panhard", "-32.13153825630434" ], [ "other contemporary Jaguar saloons and sports cars (the reason for the unusual inverted leaf spring arrangement was the same as for the D-Type: to transfer all rear axle loads forward to the unitary body shell. The rear of the car was unstressed). The rear wheel track was some 4.5 in (114 mm) narrower than the front track and looked peculiar from behind, a feature that was blamed (probably incorrectly) for excessive understeer at low speed. It was reported to be better balanced at higher speeds - indeed, the narrower track was deemed to assist high speed straight-line stability and was a feature", "-32.09265661027166" ], [ "only riders on 26\" wheeled bikes use hydraulic rim brakes on both wheels, while for 20\" competition the split is more even between rim brakes and disks. \nThe main reason for the preference for rim brake on the back of 26\" wheeled bikes is that there is significant wind-up between the wheel rim and the hub while hopping on the back wheel thanks to the longer spokes and bigger wheel and disk diameter used compared to a 20\" wheel. This occurs because disk brakes hold the hub still rather than the rim. The effect is noticeable as a springiness in", "-32.03203931522921" ], [ "cycles are often bicycles. Although four wheels were used as far back as the Velocar, they are not today common. As of 2017, there is at least one 4-wheel production model, the QuattroVelo. Four wheels tends to further hurt aerodynamics and weight compared to three; but for a given width, four wheels is much more laterally stable than three wheels. Also, four wheels can be placed in a way that increases luggage capacity a lot compared to three-wheel designs.\nMost velomobiles drive the rear wheel(s). This approach is simple and can often use many standard bicycle", "-32.02462410500448" ], [ "Bike-engined car A bike-engined car is a small or light weight car that is powered by an engine that was designed for use in a motorcycle. Characteristics Early examples of bike-engined cars include the 1948 Invacar and the 1949 Bond Minicar, both of which were designed as basic, low-cost transportation.\nModern motorcycle engines are often available with higher specific outputs than car engines, which provides a performance advantage in a lightweight car. The motorcycle's sequential gearbox is often fitted with the engine, allowing for fast gearshifts. \nThe drawbacks of using motorcycle engines in cars are the lack of reverse gear and", "-32.01869078516029" ], [ "They have also been widely used by Scania, MAN, Volvo and Renault's bus divisions. Alternative convention with twin-cylinder motorcycles The description of the orientation of V-twin and flat-twin motorcycle engines sometimes differs from the convention as stated above. Motorcycles with a V-twin engine mounted with its crankshaft mounted in line with the frame, e.g. the AJS S3 V-twin, Indian 841, Victoria Bergmeister, Honda CX series and several Moto Guzzis since the 1960s, are said to have \"transverse\" engines, while motorcycles with a V-twin mounted with its crankshaft mounted perpendicular to the frame, e.g. most Ducatis since the 1970s and most", "-31.983171542931814" ], [ "Legal definition of motorcycle The legal definition of a motorcycle for the purposes of registration, taxation and rider licensing in most countries is a powered two-wheel motor vehicle. Most countries distinguish between mopeds up to 49 cc (scooters do not count as a separate category) and the more powerful, larger, vehicles known as motorcycles. Many jurisdictions include some forms of three-wheelers as motorcycles. Australia and New Zealand In New Zealand, a motorcycle is any two- or three-wheeled motor vehicle weighing less than 1000 kg, that can travel faster than 50 km/h or that has an engine capacity exceeding 50 cc. A moped is a", "-31.926565535541158" ], [ "handling. Sport Sidecar racing events exist in Motocross (see Sidecarcross), Enduro, Grasstrack, Trial, road racing and Speedway with sidecar classes. The sport has followers in Europe, the United States, Japan, Australia and New Zealand. The sidecars are often classed by age or engine size, with historic sidecar racing often being more popular than its modern counterpart. Older classes in road racing generally resemble solo motorcycles with a platform attached, where modern racing sidecars are low and long and borrow much technology from open wheel race cars. In all types of sidecar racing there is a rider and a passenger who", "-31.855379422195256" ], [ "Longitudinal engine In automotive engineering, a longitudinal engine is an internal combustion engine in which the crankshaft is oriented along the long axis of the vehicle, front to back. \nThis type of motor is usually used for rear-wheel drive cars, except for some Audi and SAAB models equipped with longitudinal engines in front wheel drive. In front-wheel drive cars a transverse engine is usually used. Trucks often have longitudinal engines with rear-wheel drive. \nFor motorcycles, the use of a particular type depends on the drive: in case of a chain or belt drive a transverse engine is usually used, and", "-31.83134163892828" ], [ "wheels. However, many modern motorcycles reduce this effect by rotating flywheels or alternators in the opposite direction to that of the crankshaft.\nOne of the first motorcycles with a longitudinally-mounted flat-twin engine was the 1916 ABC, which was built in the United Kingdom. To accommodate chain drive, the ABC used a bevel drive at the gearbox to change the direction of the drive through ninety degrees. BMW's first motorcycle, the 1923 BMW R 32 was another early example of a longitudinally-mounted flat-twin engine, although it this case the power was transmitted to the rear wheel via a shaft drive.\nOver time,", "-31.821503099054098" ], [ "can be used, with subsequent advantages for transversal stability (the center of mass is further to the front) and traction (two driven wheels instead of one). Some vehicles have a front engine driving the single rear wheel, similar to the rear engine driving the rear wheel. The wheel must support acceleration loads as well as lateral forces when in a turn, and loss of traction can be a challenge.\nA new tadpole configuration has been proposed with a rear engine driving the front wheels. This concept (Dragonfly Three Wheeler) claims both stability and traction (two driven wheels), as", "-31.819714638142614" ], [ "the transmission. Indeed, in modern vehicles this is common. However, due to historical particularities, this was not always practical.\nIn the conventional rear-wheel drive layout, the transmission system normally contained two sections, the \"gearbox\" or \"transmission\" mounted behind the engine, and the \"final drive\" mounted in the rear axle at the rear of the car. The reason for this separation of duties between the front and back of the car was to allow the drive shaft to run at lower torque, by using higher RPM. As power is the product of RPM and torque, running the shaft at higher RPM allowed", "-31.80777786084218" ], [ "Motorized tricycle A motorized tricycle, motor trike, or three-wheeled motorcycle is a three-wheeled vehicle based on the same technology as a bicycle or motorcycle, and powered by an electric motor, motorcycle, scooter or car engine. Classification Depending on the design of the vehicle, a motorized trike may be categorized as a motorcycle, motor scooter, or simply the three-wheeled counterpart to a motorized or electric bicycle. The main difference between a motorcycle trike and a scooter trike is that motorcycles are sat on in a \"saddle\"-style seating (as with a horse), with the legs apart, and motorcycles have manual transmissions.", "-31.76558403816307" ], [ "using forward momentum. A fixed-gear drivetrain has the drive sprocket (or cog) threaded or bolted directly to the hub of the back wheel, so that the pedals are directly coupled to the wheel. During acceleration, the pedal crank drives the wheel, but in other situations, the rear wheel can drive the pedal cranks. This direct coupling allows a cyclist to apply a braking force with the legs and bodyweight, by resisting the rotation of the cranks. It also makes it possible to cycle backwards.\nAs a general rule, fixed-gear bicycles are single-speed. A derailleur for gear selection would introduce chain slack,", "-31.76067874635919" ], [ "remains in a generally upright position when the motorcycle leans left or right into a turn because the base of the pivot ball hitch is able to move in the opposite direction of the motorcycle without causing the coupler to bind. Coupler binding Making a turn on a single-track vehicle such as a two-wheeled motorcycle requires the driver to lean the bike. The amount of the lean is dependent upon the speed. Faster speeds require more leaning than slower speeds do. When making a turn with a trailer attached, the mechanism that joins the trailer to the motorcycle", "-31.734649128105957" ], [ "to create the wide round surface of the vehicle. The single rear wheel allows the vehicle to taper at the back. Examples include the Aptera 2 Series and Myers Motors NmG. Two rear Having one wheel in front and two in the rear for power reduces the cost of the steering mechanism but greatly decreases lateral stability when cornering while braking.\nWhen the single wheel is in the front (the \"delta\" form, as in a child's pedal tricycle), the vehicle is inherently unstable in a braking turn, as the combined tipping forces at the center of mass from turning and braking", "-31.673149326932617" ], [ "mode when 4WD is deactivated and power is applied to only two wheels. Two-wheeled vehicles For two-wheeled vehicles such as motorcycles and bicycles, the term is used to describe vehicles which can power the front as well as the back wheel. The term 2x2 is also used to denote two total wheels with both being driven. 2x2 vehicles are typically either mechanically driven via chain or shaft or are hydraulic driven. This scheme greatly improves offroad performance, but is quite complicated and requires more power to operate, thus most 2WD machines are either \"exotic\" bikes for enthusiasts or created with", "-31.66153456401662" ], [ "the car is rigidly mounted on the bike. The three wheeled BRP Can-Am Spyder Roadster uses two front wheels which do not lean, and so it steers like a car.\nSome sidecars allow the motorcycle to lean independent of the sidecar, and in some cases, the sidecar even leans in parallel with the motorcycle. These vehicles must be countersteered the same way as a solo motorcycle. The three wheel Piaggio MP3 uses mechanical linkages to lean the two front wheels in parallel with the rear frame, and so that it is countersteered in the same manner as a two-wheeled motorcycle.\nFree-leaning multi-track", "-31.624650788173312" ], [ "of motorcycles, and is most frequently used when describing off-road motorcycles.\nDuring the late 1970s and 1980s, motorcycle rear suspension design and performance underwent tremendous advances. The primary goal and result of these advances were increased rear wheel travel, as measured in how far the rear wheel could move up and down. Before this period of intense focus on rear suspension performance, most off-road motorcycles had rear wheel travel of about 3.5–4 inch (9–10 cm). At the end of this period, most of these motorcycles had rear wheel travel of approximately 12 inch (30 cm). At the beginning of this period, various rear suspension", "-31.621651134482818" ], [ "layout has some advantages compared to other 2WD layouts. The weight is biased towards the driven wheels- as with FF vehicles. This both improves drive-wheel traction and reduces the tendency for the undriven wheels to dig in. In addition, the driving and steering requirements are split between front and rear- as with FR vehicles- making it less likely for either to lose traction. Many dune buggies successfully use a Volkswagen beetle as the donor car for this reason. The relative simplicity and light weight compared to 4WD can therefore sometimes outweigh the disadvantage of only having two driven wheels.\nWhere RR", "-31.54481482808478" ], [ "rear suspension designs and lighter bicycle weight. Another variation is to have a 26\" front wheel with a 29\" rear wheel (commonly called a \"69er\" though Trek introduced a \"69er\" in 2007 with a 29\" front wheel and a 26\" rear wheel).", "-31.510268789017573" ], [ "motorcycle) sales exceed those of automobiles, and a motor scooter is often the family transport.\nIn Taiwan, road infrastructure has been built specifically with two wheelers in mind, with separate lanes and intersection turn boxes. In Thailand, scooters are used for street to door taxi services, as well as for navigating through heavy traffic. The extensive range of cycle tracks in the Netherlands extends into parts of Belgium and Germany and is open to all small powered two-wheelers. Motor scooters are popular because of their size, fuel-efficiency, weight, and typically larger storage room than a motorcycle. In many localities, certain road", "-31.452926705009304" ], [ "an increasing number of luxury cars have used all-wheel drive.\nMany American luxury cars from the 1970s to the 1990s switched to a front-wheel drive layout with transverse engine, due to the Arab Oil Embargo of 1973 and the 1979 fuel crises which eliminated many FR platforms in favor of the more economical front-wheel drive (FF) layout. From the early 2000s, several of these American luxury cars reverted to FR layouts. European manufacturers Prior to World War II, a wide array of European producers made luxury cars, including Rolls-Royce Limited, Bugatti, Delage, Delahaye, Talbot-Lago and Isotta Fraschini, Aston Martin, Maybach.\nFrance was", "-31.433726988267154" ], [ "for travelling. By the end of the century the definition had expanded to include bicycles and tricycles. In 1916, the United States Society of Automobile Engineers defined a roadster as: \"an open car seating two or three. It may have additional seats on running boards or in rear deck.\" Due to it having a single row of seats, the main seat for the driver and passenger was usually further back in the chassis than it would have been in a touring car. Roadsters usually had a hooded dashboard.\nIn the United Kingdom, historically the preferred terms were \"open two-seater\" and \"two-seat", "-31.431892297114246" ], [ "Two-wheels A police motorcycle is a motorcycle used by various police forces and departments. They may be custom designed to meet the requirements unique of a particular use. A police motorcycle is often called a \"motor\" by police officers in the United States. Similarly, motorcycle units are known as motor units and motorcycle officers are known as motor officers.\nThe maneuverability of the motorcycle on crowded streets offer advantages not provided by larger, more traditional police vehicles. The motorcycle's relatively small size allows it to get to accident scenes more quickly when incidents such as traffic collisions slow down access by", "-31.412992529571056" ], [ "only the rear wheels independently of the front wheels. At low speed (e.g. parking) the rear wheels turn opposite to the front wheels, reducing the turning radius, sometimes critical for large trucks, tractors, vehicles with trailers and passenger cars with a large wheelbase, while at higher speeds both front and rear wheels turn alike (electronically controlled), so that the vehicle may change position with less yaw and improved build-up of the lateral acceleration, enhancing straight-line stability. The \"snaking effect\" experienced during motorway drives while towing a travel trailer is thus largely nullified.\nFour-wheel steering found its most widespread use in monster", "-31.412654868681784" ], [ "The solid rear wheel, for example, is reminiscent of the Harley-Davidson V-Rod and the Fat Boy's solid front. The distinctive trumpeted twin exhaust as well as the front wheel has been described as echoing the Honda Magna.\nCertain aspects of the Venox's design more closely resemble larger displacement bikes. The 63-inch (1,600 mm) wheelbase is typical of a bike with a 500-700 cc engine. Faux chrome plates under the 3.7 gallon fuel tank, already a gallon more than other light cruisers, give it the appearance of a long range cruiser. Overall, most dealership and road tester informal surveys show that many", "-31.41220471597626" ], [ "they generally increase the unsprung weight of the rear suspension. This is due to the additional material required to give identical torsional rigidity to a conventional (two-sided) swingarm setup. For this reason sports bikes are rarely seen using the setup. Notable exclusions are the Ducati 916 which was intended to be taken endurance racing, the MV Agusta f4 which has a hollow interior for reducing weight (a magnesium version is also available), and the Ducati 1098, which was given a single sided swingarm purely for styling reasons.\nOn many shaft-drive motorcycles the drive shaft is contained in one of the long", "-31.392216587264556" ], [ "provided to the side of the fuel tank (above the rider's leg). British and many other motorcycles after World War II used a lever on the right (with brake on the left), but today gear-changing is standardised on a foot-operated lever to the left. Scooters, underbones and miniatures Traditional scooters (such as the Vespa) still have manual gear-changing by a twist grip on the left hand side of the handlebar, with a co-rotated clutch lever. Modern scooters were often fitted with a throttle-controlled continuously variable transmission, thus earning the term twist-and-go.\nUnderbone and miniature motorcycles often have a three to five-speed", "-31.386440499249147" ], [ "the middle 1960s, sidecar riders sought to achieve greater engine capacities and basic raw power. This included use of car engines and three-wheeled, car-type layouts driving a pair of front wheels.\nHe started to develop a new concept with a repositioned Rennsport BMW engine. Instead of a shaft driving the rear wheel, it would drive the front and sidecar wheels. The outfit was soon 'outlawed' by the FIM, the European road-race regulatory body, as the front and rear wheels (non-sidecar) were designed to be out-of-line, hence deemed to be a three-wheeler (or cyclecar), causing Vincent to revert to his 'old', conventional", "-31.37712495296728" ], [ "Scooter (motorcycle) Description The Shorter Oxford English Dictionary defines a motor scooter is a motorcycle similar to a kick scooter with a seat, a floorboard, and small or low wheels. The US Department of Transportation defines a scooter as a motorcycle that has a platform for the operator's feet or has integrated footrests, and has a step-through architecture.\nThe classic scooter design features a step-through frame and a flat floorboard for the rider's feet. This design is possible because most scooter engines and drive systems are attached to the rear axle or under the seat. Unlike a conventional motorcycle, in which", "-31.27811802836368" ], [ "Most are similar to a regular motorcycle but with pedals and a crankset that may be used with or instead of motor drive. Although mopeds usually have two wheels, some jurisdictions classify low-powered three- or (rarely) four-wheeled vehicles as a moped.\nIn some countries a moped can be any motorcycle with an engine capacity below 50cc. Etymology The word moped was coined by the Swedish journalist Harald Nielsen in 1952, as a portmanteau of the Swedish words \"motor\" and \"pedaler\". The claimed derivation from the term motor-velocipede is incorrect. According to Douglas Harper, the Swedish terms originated from \"(trampcykel med) mo(tor", "-31.201150950437295" ], [ "to use either their left foot or their right foot to change gear; the gear lever and rear brake pedals could be swapped around in order to allow this. However, the gearbox did cause issues for some riders, as neutral was located in an unusual place; at the top of the gearbox, as most motorcycles placed this gear between first and second. Chassis-wise, the 350 GTR was fairly conventional, as it used a steel twin-cradle frame, gaitered front forks with twin shock absorbers at the rear, 19\" wheels and drum brakes. Reception and sales As Bridgestone were not known for", "-31.19750201192801" ], [ "turning, these devices are the better option for towing trailers behind a two-wheeled motorcycle. However, the standard car type \"ball and socket\" couplings used in the United Kingdom are perfectly adequate for two wheeled motorcycles providing plenty of lean angle. World records The Guinness World Record for a motorcycle and trailer is 139.5 mph, set in 2002 by Motor Cycle News (UK) towing a Squire D21 trailer behind a Kawasaki ZZ-R1100.", "-31.182133201902616" ], [ "front wheel to the rear wheel. Also, depending on the shape of the bike and the shape of any fairing that might be installed, aerodynamic lift may be present that either increases or further reduces the load on the front wheel. Braking Most of the braking force of standard upright bikes comes from the front wheel. As the analysis above shows, if the brakes themselves are strong enough, the rear wheel is easy to skid, while the front wheel often can generate enough stopping force to flip the rider and bike over the front wheel. This is called a stoppie", "-31.174940401393542" ], [ "car is substantially different from driving a car with fenders. Virtually all Formula One and Indycar drivers spent some time in various open-wheel categories before joining either top series. Open-wheel vehicles, due to their light weight, aerodynamic capabilities, and powerful engines, are often considered the fastest racing vehicles available and among the most challenging to master. Wheel-to-wheel contact is dangerous, particularly when the forward edge of one tire contacts the rear of another tire: since the treads are moving in opposite directions (one upward, one downward) at the point of contact, both wheels rapidly decelerate, torquing the chassis of both", "-31.164153022466053" ], [ "75, Porsche 924, and Chevrolet Corvette (since 1997), sought a more even weight distribution between front and back by placing the weight of the transmission at the rear of the car, combined with the rear axle to form a transaxle. The clutch was mounted with the transaxle and so the propeller shaft rotated continuously with the engine, even when in neutral gear or declutched. Motorcycles Motorcycles typically employ a wet clutch with the clutch riding in the same oil as the transmission. These clutches are usually made up of a stack of alternating friction plates and steel plates. The friction", "-31.159413564077113" ], [ "Motorcycle transmission Manual Most manual transmission two-wheelers use a sequential gearbox. Most modern motorcycles (except scooters) change gears (of which they increasingly have five or six) by foot lever. On a typical motorcycle either first or second gear can be directly selected from neutral, but higher gears may only be accessed in order – it is not possible to shift from second gear to fourth gear without shifting through third gear. A five-speed of this configuration would be known as \"one down, four up\" because of the placement of the gears with relation to neutral, though some motorcycle gearboxes and/or", "-31.14588577207178" ], [ "motorcycle, and sometimes it was called a moped, \"step-thru\", or scooterette. \nThe plastic fairing ran from below the handlebars and under the footpegs, protecting the rider's legs from wind and road debris, as well as hiding the engine from view. This design was like the full enclosure of a scooter, but unlike a scooter the engine and gearbox unit was not fixed to the rear axle. This had several benefits. It moved the engine down and away from the seat, detaching the rear swingarm motion from the drivetrain for lower unsprung weight. It also made engine cooling air flow more", "-31.10558369383216" ], [ "Brothers, Enfield, Middlesex, England. \nTricycles are built in a variety of styles, which differ from city to city, and are usually made locally by building a sidecar and affixing it to an imported motorcycle. Usually both the cycle and sidecar are covered, but not always by the same roof. Larger companies, such as Fitcor Marketing, also manufacture passenger tricycles. They are built with more seats with the motor situated at the back, rather than below the driver as per a motorcycle. Passenger tricycles Passenger tricycles can accommodate from four passengers up to as many as six or more, excluding the", "-31.103572638705373" ], [ "Motorcycling Motorcycling is riding a motorcycle. For some people, motorcycling may be the only affordable form of individual motorized transportation, and small-displacement motorcycles are the most common motor vehicle in the most populous countries, including India, China and Indonesia.\nIn developing countries, motorcycles are overwhelmingly utilitarian due to lower prices and greater fuel economy. Of all motorcycles, 58% are in the Asia Pacific and Southern and Eastern Asia regions, excluding car-centric Japan.\nMotorcycles are mainly a luxury good in developed nations, where they are used mostly for recreation, as a lifestyle accessory or a symbol of personal identity. Beyond being a mode", "-31.096595528244507" ], [ "only the rear wheel; but it was produced only in small numbers. The experimental Kingsbury Fortuna and Quattro velomobiles steered all wheels; this approach avoids some of the stability problems of rear-wheel steering while still reducing the steering angle of the front wheels. However, this approach has not (as of 2017) gained wider use in velomobiles.\nA velomobile's fairing shields the drivetrain from weather, as well as the rider. Drivetrain maintenance is often reduced compared to other cycles, especially unfaired bicycles, where the front wheel kicks up grit-containing dust, mud, and dirty water that lands directly on the chain", "-31.082506491460663" ], [ "increasing the amount of torque that can be supplied to the rear wheels before wheelspin occurs. \nBecause the engine is not in the front, the car can be designed with a minimum amount of frontal area perpendicular to the wind, greatly increasing aerodynamic efficiency.\nA computer-controlled four-wheel-drive differential system allows a car to both accelerate and corner more quickly, since it can vary the amount of torque going to the front and rear wheels, and therefore vary how much the car behaves like a front- or rear-wheel-drive car. This means that through a fast corner the car is able to display", "-31.067515374161303" ], [ "Roadster (automobile) A roadster (also spider, spyder) is an open two-seat car with emphasis on sporting appearance or character. Initially an American term for a two-seat car with no weather protection, usage has spread internationally and has evolved to include two-seat convertibles.\nThe roadster was also a style of racing car driven in United States Auto Club (USAC) Championship Racing, including the Indianapolis 500, in the 1950s and 1960s. This type of racing car was superseded by rear-engine cars. Etymology The term \"roadster\" originates in the United States, where it was used in the nineteenth century to describe a horse suitable", "-31.06496494275052" ], [ "Rear-engine, front-wheel-drive layout A rear-engine, front-wheel-drive layout is one in which the engine is between or behind the rear wheels, and drives the front wheels via a driveshaft, the complete reverse of a conventional front-engine, rear-wheel-drive vehicle layout.\nThe earliest example of the form appeared in 1932, with the design and construction of the prototype Maroon Car by chief designer Harleigh Holmes at Coleman Motors, an established builder of Front- and All-Wheel-Drive vehicles based in Littleton, Colorado. The car had front-wheel drive and was powered by a rear-mounted V-8 engine. Only one was built and the vehicle was never placed", "-31.063685459608678" ], [ "common than motorcycles. In developed nations, motorcycles are frequently owned in addition to a car, and thus used primarily for recreation or when traffic density means a motorcycle confers travel time or parking advantages as a mode of transport.\nIn the developing world a motorcycle is more likely to be the primary mode of transport for its owner, and often the owner's family as well. It is not uncommon for riders to transport multiple passengers or large goods aboard small motorcycles and scooters simply because there is no better alternative. Cost of ownership considerations regarding maintenance and parts, especially in remote", "-31.05473851312854" ], [ "two-wheel-drive outfits were so successful in trials events in the early 1930s that there were attempts to have the ACU ban them from competition. A great many companies experimented with two-wheel drive in sporting events and indeed many companies employed them in military vehicles prior to the commencement of World War II. Currently, the Russian manufacturer Ural produces several models with two-wheel drive that can be engaged as desired.\nThe sidecar consists of a frame and of a body. The frame may either be fixed to the bike, or it may be attached in a way which makes the bike able", "-31.04119516228093" ], [ "made of metal, plastic, or even bamboo.\n\"Budget\" child trikes have pedals directly driving the front wheels, for better control of the bike and braking issues but better models (such as the Pashley Pickle) have chain drive to a single rear wheel. Children's rear-drive trikes lack a differential, so one rear wheel spins free. Rear-drive is preferable to front-drive as most of the rider's weight is on the rear wheels; indeed most front drive trikes are prone to skidding when force is applied to the pedals.\nUnlike adult bikes, children's trikes do not always have pneumatic tires, having instead wheels of solid", "-31.0235255677253" ], [ "tend to be smaller and, as a result, run down much faster than other forms of automotive batteries. Also, it is usually not possible to push start a moped or scooter with automatic transmission.\nLarger motorcycles featured a manual compression release mechanism that made starting easier while modern units did this automatically through a cable attached to the kick start lever.\nToday, dedicated off-road motorcycles and many ATVs use kick start systems, due to the increased weight of electric starters. The majority of the inexpensive two-wheelers and sometimes three-wheelers in developing countries, also use kick start levers.\nThe first kick start motorcycle", "-31.01791182704619" ], [ "side of a motorcycle's lower frame. As well as their supposed protective function, they are valuable as a mount point for accessories like highway pegs, lights and, on police motorcycles, sirens, cameras and radar guns. One variation is the sump-guard, primarily for off-road riding. Custom Tires Specialized tires based on the purpose of the bike are common. Bikes meant for drag racing will have fatter, thicker tires, cross country bikes will often have whitewalls or lettering on their tires, and high end bikes will often have custom spokes as well - both in type and color. Bikes driven in", "-31.012487285859606" ], [ "motorcycles to allow higher cornering speeds and greater lean angles. Fairings may or may not be used on a sport bike; when used, fairings are shaped to reduce aerodynamic drag as much as possible and provide wind protection for the rider.\nThe combination of rider position, location of the engine and other heavy components, and the motorcycle's geometry help maintain structural integrity and chassis rigidity, and determine how it will behave under acceleration, braking, and cornering. Correct front-to-rear weight distribution is of particular importance to the handling of sport bikes, and the changing position of the rider's body dynamically changes the", "-31.0103579609422" ], [ "special uses in mind.\nManufacturers who have one in production include Rokon and Christini. Manufacturers who are working or have worked on a prototype include ZID, Suzuki, Yamaha, KTM, and Honda. Two-wheeled drive with sidecars For three-wheeled vehicles such as motorcycles with sidecars, the term is used to describe vehicles which can power the sidecar as well as the back wheel. Sidecar-drive vehicles are typically mechanically driven via a shaft and may or may not have a differential. This scheme greatly improves offroad performance, but is more complicated and requires more power to operate, thus most 2WD machines are vehicles created", "-30.997254174377304" ], [ "the turning circle and can affect handling (the geometry is similar to a regular tricycle operating in reverse, but with a steering damper added). Other Some early pedal tricycles from the late 19th century used two wheels in tandem on one side and a larger driving wheel on the other.\nAn in-line three-wheeled vehicle has two steered wheels, one at the front and the other in the middle or at the rear. Recumbent Recumbent trikes' advantages (over conventional trikes) include stability (through low centre of gravity) and low aerodynamic drag. Disadvantages (compared to bicycles) include greater cost, weight, and width. The", "-30.97629681802937" ], [ "handling of the motorcycle. Because of the complexity of modeling all the possible movements of different sized riders, to approach perfect tuning of a motorcycle's weight distribution and suspension is often only possible by having a bike customized or at least adjusted to fit a specific rider. Generally, road racing style sport bikes have shorter wheelbases than those intended for more comfortable touring, and the current trend in sport bike design is towards shorter wheelbases, giving quicker turning at the expense of a greater tendency for unintentional wheelies and stoppies under hard acceleration and braking, respectively. Variations Sport touring motorcycles", "-30.952625952195376" ], [ "being rear-wheel drive, unless the vehicle is of American origin. This ruling makes it quite flexible for drivers to choose an appropriate car to race in, however there are some car models which have been banned outright for their increased strength compared to other vehicles. This is mainly to keep competition fair and not to endanger drivers who may be racing in weaker cars. The SsangYong Rodius and the Chrysler Imperial are two of the most prominent to have been banned for these reasons.\nThere are lots of other banger classes out there, but many are only applied for special event", "-30.940429419861175" ], [ "makes for interesting effects: A sidecar wheel brake — usually a pedal side-by-side with the motorcycle rear brake — helps considerably. Sidecars place a heavy strain on wheel bearings, wheel-spokes and suspension components; even frames and engines may suffer. A banking false-sidecar known as the \"Sidewinder\" became available in the UK in the 1980s, intended to overcome learner-driver licensing requirement restrictions of 125 cc introduced in 1983, but its carrying capacity was restricted, being approximately equivalent to a tool box. Trailer and tow hitch A trailer hitch or tow hitch is a device mounted on a motorcycle that enables it to tow", "-30.934761158539914" ], [ "driven wheels significantly influence the handling characteristics of a car and are therefore important in the design of a sports car. Traditionally, most sports cars have used rear-wheel drive with the engine either located at the front of the car (FR layout) or in the middle of the car (MR layout). Examples of FR layout sports cars are the Caterham 7, Mazda MX-5, and the Chevrolet Corvette. Examples of MR layout sports cars are the Ferrari 488, Ford GT and Toyota MR2. To avoid a front-heavy weight distribution, many FR layout sports cars are designed so that the engine is", "-30.931860129348934" ], [ "bike geometry are not coordinated the combination will be unstable, especially at speed, with shimmy upon acceleration or deceleration.\nIn rigid mounted rigs, leaning the motorcycle by clamping it rigidly a few degrees away from the sidecar is used along with a few degrees of \"toe-in\" of the sidecar wheel toward the centerline of the vehicle to allow for road camber and provide a balance resulting in comfortable, straight line travel. Most sidecars are also fitted with steering damping devices of either friction or hydraulic type to lessen the effects of sudden inputs, as encountered on rough roads, upon the vehicle's", "-30.90564154786989" ], [ "cycles include motorbike, motorbicycle, motorized bicycle, motor-driven cycle, and goped (motorized inline skateboard with T-bar). History The term \"moped\" now only applies to low-power (often super-economy) vehicles, but pedals were fitted to some early motorcycles, such as the pictured 1912 Douglas. Pedaling away from stationary was a great improvement over \"run and jump\" and light pedal assistance (LPA) was valuable for climbing hills. Better transmissions with wider ranges, better clutches and much better engine performance made pedals obsolete on most motorcycles by 1918 but the pedals on mopeds remained valuable for their original purposes as late as the 1990s.\nThe earliest", "-30.889687799150124" ], [ "motorcycles often meant that repairs had to be done on the road-side miles from home. Modern motorcycles are as reliable as automobiles but many riders feel that their motorcycle is more than just a means of transportation which leads them to want to do maintenance on the motorcycles themselves.", "-30.886631579283858" ], [ "Dual-sport motorcycle Evolution of dual-sports The concept of a versatile motorcycle equally at home on dirt and pavement is as old as motorcycling itself. Most roads were still unpaved when motorized bicycles first appeared around 1900. In a sense, all motorcycles at that time were dual-sports, intended to be used on dirt as well as pavement. Advertisements well into the 1920s depict motorcycles on dirt roads, raising clouds of dust. By 1940, most roads in developed countries were paved and motorcycles had become heavier and more oriented to the street. In the 1950s and 1960s British manufacturers such as", "-30.877316540572792" ], [ "direct, and made it possible to fit larger wheels. Placing the engine in the center of the frame, rather than close to the rear wheel, greatly improved front-rear balance. The fuel tank was located under the hinged seat, which opened to reveal the fuel filler inlet. The 17 inch wheels, in comparison to the typical 10 inch wheels of a scooter, were more stable, particularly on rough roads, and psychologically made the motorcycle more familiar, having an appearance closer to a bicycle than a small-wheel scooter.\nThe pushrod overhead valve (OHV) air-cooled four stroke single cylinder engine had a 40-by-39-millimetre (1.6 in × 1.5 in) bore", "-30.85911405607476" ], [ "alterations to make it suitable for horizontal mounting. Motorcycle use In motorcycling, the term \"in-line\" is sometimes used narrowly, for a straight engine mounted in line with the frame. A two-cylinder straight engine mounted across the frame is sometimes called a parallel twin. Other times, motorcycling experts treat the terms parallel, straight, and inline as equivalent, and use them interchangeably.", "-30.854427394049708" ], [ "the type of setup that is used on most motorcycles. Often, the axle is inserted into slotted dropouts and the chain is adjusted by moving the wheel forward or backward within the slots. This allows the engine to be mounted which makes the bike's drive train much more rigid and reliable. There are also other advantages to this type of axle, including the possibility of a cleaner and more attractive rear axle area, but this setup is often more expensive than a live axle and custom parts are much more difficult to locate. Custom parts Custom parts are what make", "-30.852043532184325" ], [ "based on the German Lloyd LP400.\nDante Giacosa's Autobianchi Primula of 1964, Fiat 128 and Fiat 127, put the transmission on one side of the transversely mounted engine, and doubled back the drivetrain to put the differential just behind the transmission, but offset to one side. Hence the driveshafts to the wheels are longer on one side than the other. This located the weight just a bit in front of the wheels. It is this system which dominates worldwide at present.\nFront-wheel-drive vehicles tend to suffer from torque steer under heavy acceleration. This is caused by differing drive shaft", "-30.827400874870364" ] ]
q5whr
How certain people can eat any and everything and not get fat?
[ "I watched [this]( URL_0 ) documentary a couple of years ago - 'Why Aren't Thin People Fat?' It basically suggested that thin people don't eat as much as they think they do, in terms of portion size, calories, etc. They made the participants eat 4000 calories a day (I think) which most of the thin people couldn't even manage, and they all put on weight just as expected. Or all except one guy who was an anomaly, and it turned out he'd started twitching his legs and stuff to counteract the extra calories, or something. Pretty interesting stuff. Obviously there are so many other factors and theories about it; genetics, metabolism, lifestyle, etc. But basically, thin people can't actually 'eat everything' and not get fat, they just tend to have different perceptions of how much they eat.", "[The types of bacteria in your gut can change how many calories your body actually gets to use from the food you eat.]( URL_0 )", "Maybe they eat any everything in front of you but eat much less for the rest of the day when you're not looking? Same with exercise. Maybe you never see them workout, but they could be doing quite a bit of walking when you're not looking. It could also explain why you never see Johnny study for his math tests but gets high marks every time. What you're seeing may not be what is actually going on. We call this *perception*. Unless you were with the person and observing them all the time, you are simply assuming something. EDIT: better rewording" ]
[ [ "food habits are reinforced by junk food advertisements and the availability of unhealthy food at supermarkets. As a result, teenagers are three times as likely to be overweight than they were 20 years ago. Palestinian territories According to the World Health Organization, obesity affects 26.8% of the Palestinian population (23.3% males, 30.8% females). This is mostly due to decreased physical activity and greater than necessary food consumption, particularly with an increase in energy coming from fat. Two other factors are smoking and urbanization. In addition, \"leisure-time physical activity is not a common concept in the Palestinian context, especially for rural", "-29.177128111128695" ], [ "and refers to the amount of energy it takes the body to digest, absorb, and metabolize nutrients in the diet. The amount of energy expended while processing food differs by individual but on average it amounts to about 10% the number of calories consumed during a given time period. Processing proteins and carbohydrates has more of a thermogenic effect than does processing fats. Genetics Genetics play an important role in weight management and contribute to a person's risk of becoming obese. In fact, several genes have been found to be associated with elevated Body Mass Index (BMI) and obesity. That", "-28.265935954637825" ], [ "It has sold more than 400,000 copies as of 2011.\nEnig co-wrote another book with Fallon called Eat Fat, Lose Fat which promotes what Enig considered \"good\" fats, and argued that many who follow low-fat diets feel low on energy because they are \"fat deficient\".", "-27.75762690420379" ], [ "extent that, research suggests, humans cannot live without cooking. A study on 513 individuals consuming long term raw diets found that as the percentage of their diet which was made up of raw food and/or the length they had been on a diet of raw food increased, their BMI decreased. This is despite access to many non thermal processing, like grinding, pounding or heating to 48 deg. c. (118 deg. F). With approximately 86 billion neurons in the human brain and 60–70 kg body mass, an exclusively raw diet close to that of what extant primates have would be not viable", "-27.729762861170457" ], [ "Food is often consumed communally, making it nearly impossible to ensure proper portions. A person who does not eat when food is offered is seen as offensive and shameful. It is also normal within Qatari society to be obese. Diabetes The country has among the highest rates of obesity, diabetes and genetic disorders in the world. It has the highest rate of obesity among boys in the MENA region.\nAs of 2013, 16% of the adult population in Qatar have been diagnosed with diabetes. The government has launched numerous campaigns and initiatives to combat the rise in diabetes; the establishment of", "-27.21945019258783" ], [ "2010, How Not To Get Fat addresses dieting from a completely different angle with Marber addressing the psychological side of dieting alongside people's emotional relationships with food.\nIn January 2011, Marber's book was published by Quadrille, How Not To Get Fat;Your Daily Diet which included a hundred recipes by Carolyn Humphries, a former Head Chef, and prolific food writer.\nIn May 2014 Ian Marber published Eat Your Way to Lower Cholesterol co-authored with Dr Laura Corr, consultant cardiologist at Guy's and St Thomas's Hospitals with recipes by Dr Sarah Scheneker.\nApril 2019 saw the publication of Manfood, a ‘no nonsense’ guide to nutrition", "-27.199978226883104" ], [ "thought to contribute to obesity, or to individuals based on body measures, as they do in Japan. A study released in October, 2010 had a similar cost estimate, of $168 billion, nearly 17% of U.S. medical costs. This is an estimated $2,400 per obese person. The study was performed by researchers at Cornell and Emory universities.\nHowever, in contrast to yearly costs, lifetime costs can be highest among healthy people, who live longer. One study in the Netherlands indicated that: \"Until the age of 56, yearly health costs were highest for obese people and lowest for healthy-living people. At older ages,", "-27.115225803339854" ], [ "who ate the most subsidized food had a 37% higher risk of being obese compared to people who ate the least amount of subsidized food. This brings up the concern that minority communities are more prone to risks of obesity due to financial limitations. The subsidies result in those commodities being cheap to the public, compared to those recommended by dietary guidelines.\nPresident Trump proposed a 21% cut to government discretionary spending in the agriculture sector, which has met partisan resistance. This budget proposal would also reduce spending on the Special Supplement Nutrition Program for Women, Infants and Children,", "-26.935884156730026" ], [ "beriberi, pellagra, and scurvy. These diseases collectively can also cause diarrhea, skin rashes, edema, and heart failure. Individuals are often irritable and lethargic as a result.\nThere is insufficient scientific data on exactly how long people can live without food. Although the length of time varies with an individual's percentage of body fat and general health, one medical study estimates that in adults complete starvation leads to death within 8 to 12 weeks. Starvation begins when an individual has lost about 30%, or about a third, of their normal body weight. Once the loss reaches 40%", "-26.89010179399338" ], [ "five is overweight or obese. Once considered a problem only of high-income countries, obesity rates are rising worldwide. Globally, there are now more people who are obese than who are underweight, a trend observed in every region over the world except parts of sub-Saharan Africa and Asia. In 2013, an estimated 2.1 billion adults were overweight, as compared with 857 million in 1980. Of adults who are overweight, 31% are obese. Increases in obesity have been seen most in urban settings.\nSince body fat can be measured in several ways, statistics on the epidemiology of obesity vary between sources. While BMI", "-26.855232773825264" ], [ "a world without carbohydrate-rich diets, obesity would be a rare condition as well.\"\nAlthough Taubes points out his beliefs regarding consumption of carbohydrates, he clarifies by saying, “this is not a diet book, because it’s not a diet we’re discussing, this is a way of life.\" Reception Harvard pulmonologist Dennis Rosen reviewed Why We Get Fat in a positive light, calling it a “well-researched and thoughtful book.” In The New York Times, Abigail Zugar characterizes Why We Get Fat\nas “a sort of CliffsNotes version” of Taubes’s Good Calories, Bad Calories, resulting in a “particularly intriguing and readable synthesis.”", "-26.843548943812493" ], [ "global consumption is 39 kg per year denoting North Americans consume over three times the global average. Not considering any other sources of protein a person would typically eat in the same day, the average North American eats enough meat to support a 223 lb person and Europeans eat enough meat to support 168 lbs. Whereas Chinese people eat enough to support 99 lbs of body weight and Africans eat only enough meat to support 25 lbs. Health Effects and Benefits Meat has been linked to the development of colorectal cancer and increased tumor development in patients with pancreatic cancer. There are correlations", "-26.804760313068982" ], [ "woman in Little Britain USA (referring to them as her \"illegal friend\").\nThe FatFighters diets Marjorie promotes are generally counterproductive to her group. One diet used by FatFighters is the \"Half-the-Calories\" diet. This involves cutting food in half, therefore giving it half the calories and because it's half the calories a person can have twice as much. Marjorie is also a great believer in diets that involve eating dust, as dust, of course, has no fat in it, so someone can have as much dust as they like. In the Little Britain script book for series 2, there is a FatFighters", "-26.630967079749098" ], [ "in humans, the compounds are consistently correlated with high levels of cholesterol and uric acid, and PAPs as found on fast food packaging may be a significant source of PFCA contamination in humans. Fast food and diet On average, nearly one-third of U.S. children aged 4 to 19 eat fast food on a daily basis. Over the course of a year this is likely to result in a child gaining 6 extra pounds every year. In a research experiment published in Pediatrics, 6,212 children and adolescents ages 4 to 19 years old were examined to extrapolate some information about fast food.", "-26.513116458454533" ], [ "study published in \"The American Journal of Clinical Nutrition\" in December 2007. Trans fats Foods that have undergone processing, including some commercial baked goods, desserts, margarine, frozen pizza, microwave popcorn and coffee creamers, sometimes contain trans fats. This is the most unhealthy type of fat, and may increase your risk for high cholesterol, heart disease and stroke. The 2010 Dietary Guidelines for Americans recommends keeping your trans fat intake as low as possible. Other potential disadvantages Processed foods may actually take less energy to digest than whole foods, according to a study published in \"Food & Nutrition Research\" in 2010,", "-26.426214017090388" ], [ "Africa (who eat a low fat diet). Male African Americans have a high incidence of colon cancer of 72 per 100,000, while Native Africans in South Africa have a low incidence rate of colon cancer of less than 1 per 100,000, a more than 72-fold difference in rates of colon cancer. Factors affecting deoxycholate levels A number of factors, including diet, obesity, and exercise, affect the level of deoxycholate in the human colon. When humans were switched from their usual diet to a meat, egg and cheese based diet for five days, deoxycholate in their feces increased by", "-26.179479667542182" ], [ "lecturer on nutrition at King’s College London and food insecurity expert, said: “Recent national survey data suggests that 8% of adults experienced not having enough money for food over 2016 – this figure is likely to be many times more than the number helped by food banks. We need ongoing national survey monitoring to understand the scale of food insecurity, who is at risk, and the implications for child and adult health and wellbeing.” Those who are short of food are frequently also short of other products they need like shampoo and basic hygiene products. Some people must choose", "-26.092391476471676" ], [ "reduction in chronic disease risk, enhanced immunity, maximal physical and mental performance, increased longevity and permanent weight loss.\"\nThe diet advocates eating five times a day, with 3 meals and 2 snacks, and includes eating proteins, carbohydrates - those with a lower glycemic index are considered more favorable, and fats (monounsaturated fats are considered healthier) in a caloric ratio of 30%-40%-30%. The hand is used as the mnemonic tool; five fingers for five times a day, with no more than five hours between meals. The size and thickness of the palm are used to measure protein while two big", "-26.07233965373598" ], [ "the under-five population ranged from 2 to 35 percent, while wasting—low weight for height—probably does not exceed 10 percent of the under-five population. These figures reflect village diets based predominantly on rice, with vegetables as a common accompaniment and animal protein—fish, chicken, and wild foods—eaten irregularly. Children aged six months to two years—the weaning period—are particularly susceptible to malnutrition. \nThe nutritional status of adults is related closely to what is being grown on the family farm, as well as to dietary habits. For example, fresh vegetables and fruits are not highly valued and therefore are not consumed in adequate amounts.", "-25.925135330937337" ], [ "mode. Today we don't have the problem of finding food yet our body is still set up to eat as much as possible and store as much as possible for famine times. This leads to excess weight to be put on. Taubes compares getting fat to smoking cigarettes: \"Not every long-term smoker gets lung cancer — in fact, only a minority do — but among people with lung cancer, smoking is by far the most common cause. In a world without cigarettes, lung cancer would be a rare disease, as it once was,\" he writes. \"In", "-25.918977697612718" ], [ "liters of soda per year, as well as 40% more carbohydrates, 30% more fat, and 40% more food than the body needs. The greater availability of fast food and junk food in combination with a low activity lifestyle has contributed to the obesity trend. Other factors include the impact of technology and a high consumption of rice and bread. Many families with a moderate income are limited in the foods they are able to afford, resulting in a higher incidence of obese children. However, childhood obesity is not a concern because it is believed that these children will outgrow their", "-25.891520388700883" ], [ "sizes affect food intake. Some of his work led to the introduction of mini-size packaging. Another of his papers found that people who eat with someone who is fat will make worse food choices, which the UK National Health Service described as \"not wholly convincing and does not prove this phenomenon exists in the general population.\"\nIn 2005, Wansink's lab published experimental findings in a paper called \"Bottomless bowls: why visual cues of portion size may influence intake\". In this study, the lab built an apparatus containing a tube that pumped soup into the bottom of a bowl at a", "-25.802260328258853" ], [ "seen at Chick-fil-A, Burger King, and KFC. Chipotle uses aluminum meal lids that are made from 95% recycled material, but they do not have postconsumer recycling, so the lids that are left on-site are landfilled.\nThere are lots of healthy damages on the human body while eating fast food products. It would be proper to know how fast food has a negative impact on human health. The researchers found that if a person eats fast foods more than a once a week, they may gain a significant amount of fat in their body. Also, there is a debate over proceeded food", "-25.798129117385542" ], [ "overweight and obesity than being underweight. In 2008, more than 1.4 billion adults aged 20 and above were overweight. Of these, more than 200 million men and nearly 300 million women were obese. More than 40 million children under the age of five were overweight in 2011.\nSome facts on world anti obesity day on Times of India & NDTV.", "-25.683875734524918" ], [ "the vast majority of people labelled 'overweight' and 'obese' according to current definitions do not in fact face any meaningful increased risk for early death. In a quantitative analysis of a number of studies, involving more than 600,000 men and women, the lowest mortality rates were found for people with BMIs between 23 and 29; most of the 25–30 range considered 'overweight' was not associated with higher risk. Relationship to health A study published by Journal of the American Medical Association (JAMA) in 2005 showed that overweight people had a death rate similar to normal weight people as defined by", "-25.579362982476596" ], [ "high\" amounts of saturated fat, even if saturated fats from animal products and tropical oils are avoided. This is because all fats contain some saturated fatty acids. For example, if a person chose fats with only 20% saturated fatty acids, setting fat intake at 35% of total calories would mean that 7% of calories would come from saturated fat. For this reason, the Institute of Medicine recommends consuming no more than 35% of calories from fat. Body weight Studies have shown that the effectiveness of low-fat diets for weight loss is broadly similar to that of low-carbohydrate diets in the", "-25.567061217945593" ], [ "fruits and vegetables. The diet's high fat ratio may increase the risk of heart disease. People following the diet can lose much weight at first, but this loss is generally not sustained any better than with normal calorie restriction.\nThe book was originally published in 1978 and received an unexpected boost in popular sales when its author, Herman Tarnower, was murdered in 1980 by his jilted lover Jean Harris. A made-for-tv movie, The People vs. Jean Harris, capitalized on the infamous murder, and was broadcast in 1981. Jean Harris was portrayed by Ellen Burstyn.", "-25.42881082261738" ], [ "because of its limited food options and deter people from sticking to the diet. The diet has been criticised for being too low in protein, fiber, vegetables, and fruits. The diet does not include guidance on how to change unhealthy overeating or lack of exercise and their importance to permanent weight loss. Nutrition In the United States, Special K Original has 120 Cal per 31g cup serving. One serving contains 0.5g fat, 23g carbohydrates, 4g sugar, and 6g protein. In the United Kingdom, Special K Original is 17% sugar, meaning a 30g serving contains 5g of sugar.\nIn the UK, an", "-25.40262647351483" ], [ "provide \"enough calories or protein for most people to sustain.\"", "-25.285690944535816" ], [ "Richard Mattes Education Mattes received his B.S. in biology from the University of Michigan in 1975, his M.P.H. in public health nutrition at the University of Michigan School of Public Health in 1978, and his Ph.D. from Cornell University in human nutrition in 1981. Research In 2007, Mattes co-authored a study which found that people who consumed caloric beverages did not compensate for the calories in them as much as people who consumed solid food. In 2015, he published a study reporting that the taste of fat deserved to be considered another basic taste, alongside sweet, sour, salty, bitter and", "-25.265878726844676" ], [ "are defined in US law as a food of minimal nutritional value.\nEven in a culture that eats sweets frequently, candy is not a significant source of nutrition or food energy for most people. The average American eats about 1.1 kg (2.5 pounds) of sugar or similar sweeteners each week, but almost 95% of that sugar—all but about 70 grams (2.5 ounces)—comes from non-candy sources, especially soft drinks and processed foods. Meal replacements Candy is considered a source of empty calories, because it provides little or no nutritional value beyond food energy. At the start of the 20th century, when", "-25.222765211045044" ], [ "with adult humans has demonstrated that they have active brown fat that is central to redefining its role in metabolic regulation and protection from obesity.", "-25.194493008006248" ], [ "Diet and obesity Diet plays an important role in the genesis of obesity. Personal choices, food advertising, social customs and cultural influences, as well as food availability and pricing all play a role in determining what and how much an individual eats. Dietary energy supply The dietary energy supply is the food available for human consumption, usually expressed in kilocalories per person per day. It gives an overestimate of the total amount of food consumed as it reflects both food consumed and food wasted. The per capita dietary energy supply varies markedly between different regions and countries. It", "-25.18108817571192" ], [ "intake. In much of Asia, fat intake is around ten percent of total food energy consumed, and heart disease there is almost nonexistent. Kurzweil goes on to show that in America, closer to forty percent of caloric intake is from fat.\nNumerous agencies such as the American Dietetic Association, American Heart Association and U.S. Surgeon General advocate thirty percent of caloric intake from fat. However, Kurzweil says this causes a comparatively slight reduction in atherosclerosis levels. He says that he thinks these agencies use an artificially high figure because they assume that nobody would even attempt to attain a lower level", "-25.177673897560453" ], [ "Low-fat diet A low-fat diet is one that restricts fat and often saturated fat and cholesterol as well. Low-fat diets are intended to reduce the occurrence of conditions such as heart disease and obesity. For weight loss, they perform similarly to a low-carbohydrate diet, since macronutrient composition does not determine weight loss success. Fat provides nine calories per gram while carbohydrates and protein each provide four calories per gram. The Institute of Medicine recommends limiting fat intake to 35% of total calories to control saturated fat intake. Composition According to the National Academies Press, a high-fat diet can contain \"unacceptably", "-25.175446240929887" ], [ "diets are relatively high in protein and fats. Low-carbohydrate diets are sometimes ketogenic (i.e., they restrict carbohydrate intake sufficiently to cause ketosis). Low-calorie Low-calorie diets usually produce an energy deficit of 500–1,000 calories per day, which can result in a 0.5 to 1 kilogram (1.1 to 2.2 pounds) weight loss per week. One of the most commonly used low-calorie diets is Weight Watchers. The National Institutes of Health reviewed 34 randomized controlled trials to determine the effectiveness of low-calorie diets. They found that these diets lowered total body mass by 8% in the short term, over 3–12 months. Women doing", "-25.108918433670624" ], [ "other preventable diseases. In low income areas diets that are affordable and accessible are generally high in refined grains, added grains, and added fats which might fill up someone’s stomach for a short time but are extremely nutrient poor, often leading to higher risk of disease and higher mortality. These nutrient poor diets have also been an independent predictor in many studies of obesity and metabolic syndrome. Ken Shandy and Phat Beets Phat Beets believes that these diets are not being consumed by choice, and that physical proximity to healthy food choices is a huge indicator in diet quality. In", "-25.061028269017697" ], [ "way in which they are prepared, have varied widely by time, location, and culture.\nIn general, humans can survive for two to eight weeks without food, depending on stored body fat. Survival without water is usually limited to three or four days. About 36 million humans die every year from causes directly or indirectly related to starvation. Childhood malnutrition is also common and contributes to the global burden of disease. However global food distribution is not even, and obesity among some human populations has increased rapidly, leading to health complications and increased mortality in some developed, and a few developing countries.", "-25.054866330872755" ], [ "malnutrition is prevalent in girls than boys. The research used Harvard weight-for-age standard, which found that 14.4% of girls were classified as severely malnourished in comparison with only 5.1% of boys, showing sex-biased nutrition-related practices favoring boys. Single obese mothers in USA Low food security does not only display itself in hunger and decrease in body size, but also in weight-gaining. According to a number of studies showing the linkage between low food security and sex differences, low food security is linked to being over-weight and “gaining 5 pounds or more in one year, but only among women”.", "-25.04181767065893" ], [ "corporeal food and drink will not be necessary for the sustaining of your body, nor will you hunger for bread or any other food... because after you have once tasted the celestial bread and drunk of the living fountain you will remain fattened for eternity...\" And so it was… But in order that the tumult of gossip be quieted, since some said she had a devil –she who neither ate nor drank- two or three times a week she was accustomed to accept some morsel... and then spit it back…around for a time in her mouth... and then spit", "-25.015398181742057" ], [ "as many calories from fast food restaurants than children ranging from two to eleven years old.\nThe FDA found that trans fats raises the amount of cholesterol in blood, which raises the chance of developing heart disease which is known as one of the leading causes of death in the U.S. In a recent study, it was found that 11 out of 25 restaurants failed after tests on the use of antibiotics as well. Antibiotic-resistant infections affect at least 2 million Americans each year, which will leave at least 23,000 of those people to die. Consumer appeal Fast food outlets have", "-24.968531980583066" ], [ "not eating enough, but also eating too much.\nIn January 1977, after having held hearings on the national diet, the McGovern committee issued a new set of nutritional guidelines for Americans that sought to combat leading killer conditions such as heart disease, certain cancers, stroke, high blood pressure, obesity, diabetes, and arteriosclerosis. Titled Dietary Goals for the United States, but also known as the \"McGovern Report\", they suggested that Americans eat less fat, less cholesterol, less refined and processed sugars, and more complex carbohydrates and fiber. (Indeed, it was the McGovern report that first used the term complex", "-24.907746347686043" ], [ "a diet for health is thought to be 50-55%. Foodstuffs There is evidence that the quality, rather than the quantity, of carbohydrate in a diet is important for health, and that high-fiber slow-digesting carbohydrate-rich foods are healthful while highly-refined and sugary foods are less so. People choosing diet for health conditions should have their diet tailored to their individual requirements. For people with metabolic conditions, a diet with approximately 40-50% carbohydrate is recommended.\nMost vegetables are low- or moderate-carbohydrate foods (in some low-carbohydrate diets, fiber is excluded because it is not a nutritive carbohydrate). Some vegetables, such as potatoes, carrots, maize", "-24.89917740508099" ], [ "supermarket for every 70,000 people while two of the three highest-income wards (Wards 2 and 3) have one for every 11,881 people. One in five of the city's food stamp recipients lives in a neighborhood without a grocery store.\" Twenty-one studies have found that food stores in low-income communities are less likely to stock healthy or fresh food or snacks. These food stores are also more likely to offer lower quality items at higher prices, compared to food stores in predominantly white communities. Food deserts and obesity Low income families are more vulnerable to becoming overweight and obese due", "-24.897865757338877" ], [ " His ability to eat so much food without gaining weight is attributed to a very rare and implausibly high metabolism. He once claimed that he weighed 300 pounds after a meal, although he is usually portrayed as slim and healthy.\nJughead's special abilities concerning food extend to being able to identify food in a sealed can by smell, and being able to detect the slightest flaws in food preparation by taste. As such, he is a respected food critic, as well as a gourmet chef himself. One time, when he sought out Miss Grundy's help with his creative", "-24.882560520260085" ], [ "very low calorie. Several diets are effective. A meta-analysis of six randomized controlled trials found no difference between three of the main diet types (low calorie, low carbohydrate, and low fat), with a 2–4 kilograms (4.4–8.8 lb) weight loss in all studies. At two years these three methods resulted in similar weight loss irrespective of the macronutrients emphasized. High protein diets do not appear to make any difference. A diet high in simple sugars such as those in soft drinks increases weight. There is evidence that dieting alone is efficient for weight loss and improving health for obese individuals. Exercise", "-24.873619554942707" ], [ " \"If there is food, then I eat...if there isn't any, then I don't\n I don't ask for food from anybody else...\n It’s hard to find people who die from hunger…\n If they are not sick or unwell.\"\nHis view on selling and buying:\n ", "-24.867425600939896" ], [ "a body would otherwise consume. For reference, each kilogram of body fat is roughly equivalent to 32,300 kilojoules or 7,700 kilocalories of food energy (i.e., 3,500 kilocalories per pound).\nChanges in body temperature – either hotter or cooler – increase the metabolic rate, thus burning more energy. Prolonged exposure to extremely warm or very cold environments increases the basal metabolic rate (BMR). People who live in these types of settings often have BMRs 5–20% higher than those in other climates.", "-24.84959893175983" ], [ "shown that over 60 percent of college students commonly ingest sugary and fatty foods like chocolate and potato chips over fruits and vegetables. Presently, sugar accounts for approximately 20 percent of an American’s diet, which equates to about 90 pounds of sugar per person per year. This explains why a study, conducted by Stephanie Goodwin of Virginia Polytechnic Institute, states that three out of four students don’t eat at least five servings of fruits and vegetables daily, denying students key vitamins C and E, as well as fiber. Causes Malnutrition can be caused by a number of things including inadequate", "-24.740191329066874" ], [ "They will either eat nothing (common) and perish or eat everything (uncommon).", "-24.69029015378328" ], [ "when deprived of it, the person may engage in actions similar to those of hard drug addicts, including an uncontrollable search for the substance, and in devious behaviour, such as stealing or lying.\nPaul Kenny of Mount Sinai Hospital has found that rats who are offered food rich in both fat and sugar, such as cheesecake, at first nibble at it but once they get used to it they binge on it and become very overweight. In the experiment, rats offered diets that were just sugary or just fatty did not binge and did not gain much weight. When the cheesecake", "-24.671058484585956" ], [ "any connection between percentage of calories from fat and risk of cancer, heart disease, or weight gain. The Nutrition Source, a website maintained by the Department of Nutrition at the Harvard School of Public Health, summarizes the current evidence on the impact of dietary fat: \"Detailed research—much of it done at Harvard—shows that the total amount of fat in the diet isn't really linked with weight or disease.\"", "-24.667254263025825" ], [ "which is often more beneficial for long term weight management vs rapid weight loss. For example, choosing a black coffee instead of a full fat latte will save calories that will add up in the long run. Low fat meats reduce the total amount of calories and cholesterol consumed. For example, traditional beef patties have 19.2% fat and 272 kcal per 100 g of meat. On the other hand, lean beef patties have 9.8%fat and 196 kcal. Eating more dairy Studies have shown that a diet high in dairy decreases total body fat. This occurs because a high amount of", "-24.65795400184288" ], [ "fatness as they age. The health impact of childhood obesity is unknown. Algeria In 2003, 16.4% of the total population was obese. In 2006, 10.3% of boys and 8.7% of girls age 6–10 were overweight. Egypt In 1996, Egypt had the highest average BMI in the world at 26.3. In 1998, 1.6% of 2- to 6-year-olds, 4.9% of 6- to 10-year-olds, 14.7% of 10- to 14-year-olds, and 13.4% of 14- to 18-year-olds were obese. 45% of urban women and 20% of the rural population were obese.\nObesity rates rose as oils, fat, and sugars were more regularly consumed, beginning in the", "-24.626311421088758" ], [ "and oil, and an increase in overall available calories. Available calories per person increased from 2,330 kilocalories (9,700 kJ) per day in 1980 to 2,940 kilocalories (12,300 kJ) per day in 2002. Rates of overweight and obese adults increased 12.9% in 1991 to 27.3% in 2004.\nOverall rates of obesity are below 5% in China as a whole but are greater than 20% in some cities. India Obesity has reached epidemic proportions in India in the 21st century, with morbid obesity affecting 5% of the country's population. Obesity is a major risk factor for cardiovascular disease and NGOs such as", "-24.602920294149953" ], [ "It is further argued that technology may advance to a point where it becomes hard to distinguish between \"human and machine\".\nIn 2016, Henneberg co-authored an article which demonstrates that the consumption of meat contributes to obesity to the same extent as the consumption of sugar. This is because protein is processed by the human body after fats and carbohydrates, which are conventionally thought to contribute to weight gain. Controversy In 2008, Henneberg was suspended from the University of Adelaide pending an investigation of possible fraud. As head of department, the university held him technically responsible for the disappearance of $400,000", "-24.60236463046749" ], [ "A chief risk factor for prediabetes is excess abdominal fat. Obesity increases one’s risk for a variety of other medical problems, including hypertension, stroke, other forms of cardiovascular disease, arthritis, and several forms of cancer. Obese individuals are at twice the risk of dying from any cause than normal-weight individuals. The prevalence of obesity and overweight have risen to epidemic proportions in the United States, where 67% of adults are overweight and, of these, approximately half are obese.\nThe prevalence of hypertension, another cardiometabolic syndrome component, has been increasing for the last decade. In 1994, 24% of U.S. adults had hypertension.", "-24.597266954526276" ], [ "to lose weight quickly or who want to be healthy and find that belonging to a group of people defined by a strict way of eating helps them to avoid the many bad food choices available in the developed world.\nRegardless of their evidence base, or lack of, fad diets are extremely popular, with over 1500 books published each year, and many consumers willing to pay for diet products, making for an industry worth $35 billon/year in the USA. About 14-15% Americans declare having used a fad diet for short-term weight loss. Fad diet is a part of the diet industry", "-24.592571953806328" ], [ "obese women are almost three times as likely to die within one month of birth and almost twice as likely to be stillborn than babies born to women of normal weight.\nObesity has been cited as a contributing factor to approximately 100,000–400,000 deaths in the United States per year (including increased morbidity in car accidents) and has increased health care use and expenditures, costing society an estimated $117 billion in direct (preventive, diagnostic, and treatment services related to weight) and indirect (absenteeism, loss of future earnings due to premature death) costs. This exceeds health-care costs associated with smoking or problem drinking", "-24.561993054463528" ], [ "is perceived, they might actually eat less. \"We used to have foods that we chewed for 15, 20 or 30 times before we swallowed; it took more work to eat.\" Today she says \"There is rarely a food out there, outside of a sweet chewy candy, you have to chew more than 12 times and it is gone; so, you're in for the next hit to get more pleasure.\" She directed the radio audience to the value of the texture experience in food and the connection it has in the overall satisfaction of the consumer. In conclusion, she suggested", "-24.55243339552544" ], [ "of micro and macronutrients. Often inequality in food access leaves distribution which uneven, resulting in undernourishment for some and obesity for others.\nUndernourishment, or hunger, according to the FAO, is dietary intake below the minimum daily energy requirement. The amount of undernourishment is calculated utilizing the average amount of food available for consumption, the size of the population, the relative disparities in access to the food, and the minimum calories required for each individual. According to FAO, 868 million people (12% of the global population) were undernourished in 2012. This has decreased across the world since 1990, in all regions except", "-24.517342954641208" ], [ "Cynthia Kenyon Personal diet Kenyon's research prompted her to make personal dietary changes.\nIn 2000, when she discovered that putting sugar on the worms' food shortened their lifespans, she stopped eating high glycemic index carbohydrates and started eating a low-carbohydrate diet.\nShe briefly experimented with a calorie restriction diet for two days, but couldn't stand the constant hunger.", "-24.47742597326578" ], [ "61% of adults in the United States were overweight or obese (body mass index greater than 25). 300,000 deaths each year in the United States are attributed to obesity.\nThe State of Georgia ranks 14th in adult obesity and 12th in the number of overweight children.", "-24.38947349935188" ], [ "Inedia Scientific assessment Documented studies on the physiological effects of food restriction clearly show that fasting for extended periods leads to starvation, dehydration, and eventual death. In the absence of food intake, the body normally burns its own reserves of glycogen, body fat, and muscle. Breatharians claim that their bodies do not consume these reserves while fasting.\nSome breatharians have submitted themselves to medical testing, including a hospital's observation of Indian mystic Prahlad Jani appearing to survive without food or water for 15 days, and an Israeli breatharian appearing to survive for eight days on a television documentary. In other cases,", "-24.38188007327517" ], [ "week, compared to those who ate three or fewer family meals per week, were 38% less likely to report poor consumption of vegetables, 31% less likely to report poor consumption of fruits, and 27% less likely to report poor consumption of dairy foods. The results of a survey in the UK published in 2010 imply that children raised by their grandparents are more likely to be obese as adults than those raised by their parents. An American study released in 2011 found the more mothers work the more children are more likely to be overweight or obese. Developmental factors Various", "-24.367061952078075" ], [ "respiratory system function, and central nervous system function (Schlosser).\nAccording to the Massachusetts Medical Society Committee Jeff Nutrition, fast foods are commonly high in fat content, and studies have found associations between fast food intake and increased body mass index (BMI) and weight gain. In particular many fast foods are high in saturated fats which are widely held to be a risk factor in heart disease. In 2010, heart disease was the number 1 ranking cause of death. A 2006 study fed monkeys a diet consisting of a similar level of trans fats as what a person who ate fast food", "-24.360533547835075" ], [ "an occasional indulgence. Foods such as sweet biscuits, cakes, deserts, fast food as well as pastries and fruit juices are high in saturated fats as well as added sugars. Saturated fats are responsible for raising blood cholesterol levels and in turn could put children at a much higher risk of contracting heart disease or inducing a heart attack. Thus five or fewer servings of sweet indulgences should be consumed in a week, as a maximum.\nNutrition Australia ultimately seeks to help children \"eat a rainbow\" by encouraging them to consume a fruit and a vegetable of a different colour every", "-24.3579267016612" ], [ "Minimal nutritional value Minimal nutritional value, in United States law, refers to foods that may not be sold in competition with the school lunch and breakfast programs. These are foods that USDA has determined contain little to no nutritional value. For example, sugar candy, soda pop without fruit juices, and chewing gum are considered to be foods of minimal nutritional value. Candy containing nuts or chocolate is considered to have some nutritional value.", "-24.355366009578574" ], [ "amounts of calories in the form of fat and added sugars yet provide very limited amounts of essential micronutrients. These foods are thus said to provide \"empty calories.\" Children In 2011 16.7 million children lived in food-insecure households, about 35% more than 2007 levels, though only 1.1% of U.S. children, 845,000, saw reduced food intake or disrupted eating patterns at some point during the year, and most cases were not chronic.\nAlmost 16 million children lived in food-insecure households in 2012. Schools throughout the country had 21 million children participate in a free or reduced lunch program and 11 million children", "-24.331024415863794" ], [ "2007.\nThe first weight-loss book to promote calorie counting, and the first weight-loss book to become a bestseller, was the 1918 Diet and Health: With Key to the Calories by American physician and columnist Lulu Hunt Peters. Low-fat Low-fat diets involve the reduction of the percentage of fat in one's diet. Calorie consumption is reduced because less fat is consumed. Diets of this type include NCEP Step I and II. A meta-analysis of 16 trials of 2–12 months' duration found that low-fat diets (without intentional restriction of caloric intake) resulted in average weight loss of 3.2 kg (7.1 lb) over habitual eating. Low-carbohydrate Low-carbohydrate", "-24.32817266186248" ], [ "Africans is 60 years of age or older. The number of centenarians (humans of age 100 years or older) in the world was estimated by the United Nations at 210,000 in 2002. Jeanne Calment is widely believed to have reached the age of 122; higher ages have been claimed but are unsubstantiated. Diet Humans are omnivorous, capable of consuming a wide variety of plant and animal material. Varying with available food sources in regions of habitation, and also varying with cultural and religious norms, human groups have adopted a range of diets, from purely vegan to primarily carnivorous. In some cases, dietary", "-24.27995897164874" ], [ "with other foods in the same meal, and so on. Despite these scientific doubts, there are other serious scientific studies which endorse this method. Although a review concluded that low glycemic index diets do not achieve greater weight loss than low-fat diets, the former might lead to greater reductions in cardiovascular risk factors. Popularity Montignac sold 15 million books about his diet, and his method has been made famous by the celebrities who adopted it, including Gérard Depardieu and others.", "-24.27978077507578" ], [ "meats, sweets, and sugar. It is also \"rich in potassium, magnesium, and calcium, as well as protein\".\nThe Mediterranean diet, which includes limiting consumption of red meat and using olive oil in cooking, has also been shown to improve cardiovascular outcomes. Obesity Most people who are overweight or obese can use dieting in combination with physical exercise to lose weight.\nDiets to promote weight loss are divided into four categories: low-fat, low-carbohydrate, low-calorie, and very low calorie. A meta-analysis of six randomized controlled trials found no difference between the main diet types (low calorie, low carbohydrate, and low fat), with a 2–4", "-24.259175904269796" ], [ "foods such as lean meats and vegetables, and has a concept of \"good\" (mostly monounsaturated) fats. It makes no restriction on calorie intake, includes an exercise program, and is based around taking three main meals and two snacks per day.\nThe first stage of the diet aims for rapid weight loss (13 lbs in two weeks). According to the UK's National Health Service (NHS), the severity of the first stage of the diet may result in the loss of some vitamins, minerals and fiber. The NHS reports that dietary restrictions during stage one may cause side effects including \"bad breath, a", "-24.24961027817335" ], [ "consumes several times its bodyweight each day.", "-24.17965874262154" ], [ "(absenteeism, loss of future earnings due to premature death) costs. This exceeds health care costs associated with smoking and accounts for 6% to 12% of national health care expenditures in the United States. Prevalence The National Center for Health Statistics estimates that, for 2015-2016 in the U.S., 39.8% of adults aged 20 and over were obese (including 7.6% with severe obesity) and that another 31.8% were overweight.\nObesity rates have increased for all population groups in the United States over the last several decades. Between 1986 and 2000, the prevalence of severe obesity (BMI ≥ 40 kg/m²) quadrupled from one in", "-24.179227847227594" ], [ "food sources from containers or into the body just by handling products made from it. Certain researchers suggest that BPA actually decreases the fat cell count in the body, but at the same time increasing the size of the ones remaining; therefore, no difference in weight is shown, and an individual is even likely to gain more.\nHigh-fructose corn syrup (HFCS) is found in many food products on grocery store shelves: by 2004, for example, it accounted for 40% of caloric sweeteners added to foods and beverages sold in the United States, and was the only caloric sweetener used in soft", "-24.175220961507875" ], [ "fraction of their day chewing compared to other extant primates living on raw diets. American girls and boys spent on average 8 and 7 percent of their day chewing respectively, compared to chimpanzees who spend more than 6 hours a day chewing. This frees up time which can be used for hunting. A raw diet means hunting is constrained since time spent hunting is time not spent eating and chewing plant material, but cooking reduces the time required to get the day's energy requirements, allowing for more subsistence activities. Digestibility of cooked carbohydrates is approximately on average 30% higher than", "-24.170935267116874" ], [ "are included in the diet, there is found to be a reduction in the incidence of cancer, stroke, cardiovascular disease, and other chronic ailments. Research has shown that, compared with individuals who eat less than three servings of fruits and vegetables each day, those that eat more than five servings have an approximately twenty percent lower risk of developing coronary heart disease or stroke.\nThe nutritional content of vegetables varies considerably; some contain useful amounts of protein though generally they contain little fat, and varying proportions of vitamins such as vitamin A, vitamin K, and vitamin B₆; provitamins; dietary minerals; and", "-24.15314954452333" ], [ "capita consumption of cheese was 4 pounds (1.8 kg) in 1909; 32 pounds (15 kg) in 2000; the average person consumed 389 grams (13.7 oz) of carbohydrates daily in 1970; 490 grams (17 oz) in 2000; 41 pounds (19 kg) of fats and oils in 1909; 79 pounds (36 kg) in 2000. In 1977, 18% of an average person's food was consumed outside the home; in 1996, this had risen to 32%. Contributing factors Numerous studies have attempted to identify contributing factors for obesity in the United States. These studies have resulted in numerous hypotheses as to what those key factors are. A common theme is", "-24.111721017034142" ], [ "Fat substitute A fat substitute is a food product with the same functions, stability, physical, and chemical characteristics as regular fat, with fewer Calories per gram than fat. They are utilized in the production of low fat and low calorie foods. Background Fat is present in most foods. It provides a unique texture, flavor, and aroma to the food it is found in. While fat is essential to life, it can be detrimental to health when consumed in excess of physiological requirements. High fat diets increase risk of heart disease, weight gain, and some cancers. High blood cholesterol is more", "-24.086237852432532" ], [ "the actual nutritional or health quality of the food or beverage in question. These claims are not consistent among all food and beverage groups, although some of them do accurately represent the nutritional and or health benefits of a certain food or beverage, often this does not guarantee that all claims across all beverages and foods are reflective of actual nutrition. Additionally, even if a certain product is in fact low fat or any one of the different types of “low content” claims, consumers often focus on the claim and neglect other health considerations like added sugars, calories, and other", "-24.061598924017744" ], [ "2011, the German Development Economics Conference paper stated that as living standards rise and lifestyle change occur, the demands for food products increases and dietary composition changes. Higher overall consumption of processed food and dairy products led to higher rates of obesity within the population. In a dietary study by Rachmi et al. (2017), the result was that the prevalence of obesity among children and adolescents who frequently ate fried and oily food more than 4 times a week is higher than their counterparts at 7.2% and 4.7% respectively. In a study in 2007 and 2009, conducted in", "-24.05420830500225" ], [ "of residents are obese, 22% are diabetic, and 32% have high blood pressure—compared to the citywide averages of 24%, 11%, and 28% respectively. In addition, 20% of children are obese, compared to the citywide average of 20%.\nEighty-one percent of residents eat some fruits and vegetables every day, which is less than the city's average of 87%. In 2018, 69% of residents described their health as \"good,\" \"very good,\" or \"excellent,\" lower than the city's average of 78%. For every supermarket in Crotona Park East and Morrisania, there are 10 bodegas.\nThe nearest hospitals are NYC Health + Hospitals/Lincoln in Melrose and", "-24.041742717905436" ], [ "low-calorie diets should have at least 1,000 calories per day and men should have approximately 1,200 calories per day. These caloric intake values vary depending on additional factors, such as age and weight. Very low-calorie Very low calorie diets provide 200–800 calories per day, maintaining protein intake but limiting calories from both fat and carbohydrates. They subject the body to starvation and produce an average loss of 1.5–2.5 kg (3.3–5.5 lb) per week. \"2-4-6-8\", a popular diet of this variety, follows a four-day cycle in which only 200 calories are consumed the first day, 400 the second day, 600 the third day,", "-24.03969685191987" ], [ "Why We Get Fat Synopsis Analyzing anthropological evidence and modern scientific literature, Taubes contends that the common “calories in, calories out” model of why we get fat is overly simplistic and misleading because it ignores the multiple complex physiological responses to different foods. It is a more powerful issue than just the calories which would be released as heat by burning the food in a lab calorimeter. Instead, Taubes notes the advantages of a low carbohydrate diet. He argues that the consumption of carbohydrates drives the body to release insulin, which in turn can lead to insulin resistance", "-23.985302679813685" ], [ "at 3,120 calories, with 89 grams of saturated fat. The United States Department of Agriculture's Center for Nutrition Policy and Promotion states in its dietary guidelines that a typical female adult should consume about 2,000 calories (males 2,500) and no more than 10% of saturated fat per day. In an attempt to offer healthier, lower-calorie meal options, The Cheesecake Factory created a \"Skinnylicious\" menu that features a variety of cocktails, salads, appetizers, and specialty dishes such as lemon-garlic shrimp and grilled salmon. Popular culture The restaurant was depicted as the workplace on The Big Bang Theory where Penny and Bernadette", "-23.980226443105494" ], [ "overweight or obese has jumped to 80% in 2010. In the book \"Top 10 of Everything 2011\", the women of Kuwait ranked 5th for the highest percentage of obesity. In 2000, it was determined that amongst children age 10–14, 30% of boys and 31.8% of girls were overweight.\nAccording to the Dasman Center for Research and Treatment of Diabetes, 15% of the adult population has diabetes, with 50% of adults over 45 living with the disease. 22 of every 100 children have developed diabetes as a result of an unhealthy weight.\nThe increased risk of excess weight or obesity is due", "-23.97295394379762" ], [ "regularly would consume. Both diets contained the same overall number of calories. It was found that the monkeys who consumed higher levels of trans fat developed more abdominal fat than those fed a diet rich in unsaturated fats. They also developed signs of insulin resistance, an early indicator of diabetes. After six years on the diet, the trans fat fed monkeys had gained 7.2% of their body weight, compared to just 1.8% in the unsaturated fat group. The American Heart Association recommends consumption of about 16 grams of saturated fats a day.\nThe director of the obesity program for the Children's", "-23.945855400885193" ], [ "can be a ticket out of poverty.\nOne possible reason for poor nutrition in rural areas is that agricultural produce can fetch a decent price, and thus is often sold rather than kept for personal consumption. Rural families would not consume eggs that their hen lay but will sell it in the market for about 20 yuan per kilogram. The money will then be spent on books or food like instant noodles which lack nutrition value compared to an egg. A girl named Wang Jing in China has a bowl of pork only once every five to six weeks, compared to", "-23.940952757489868" ], [ "and 247 grams of low quality fat daily, for a total of 143,100 calories and 16.9 pounds of fat in one month. He also claims to drink almost nothing but Coca-Cola and, according to Super Size Me, he rarely eats the fries. At first, Don kept all the boxes of Big Macs he ate in the back of his car. He met and proposed to his wife, Mary, at a McDonald's in 1975. In addition, he has a statue of Ronald McDonald in his yard. Gorske also states that he has only eaten one Burger King Whopper sandwich in his life", "-23.919794026267482" ], [ "Diet food Terminology In addition to diet other words or phrases are used to identify and describe these foods including light, zero calorie, low calorie, low fat, no fat and sugar free. In some areas use of these terms may be regulated by law. For example, in the U.S. a product labeled as \"low fat\" must not contain more than 3 grams of fat per serving; and to be labeled \"fat free\" it must contain less than 0.5 grams of fat per serving. Process The process of making a diet version of a food usually requires finding an acceptable low-food-energy", "-23.91609753901139" ], [ "fare. A 2007 study in the British Journal of Nutrition found that female rats who eat junk food during pregnancy increased the likelihood of unhealthy eating habits in their offspring.\nOther research has been done on the impact of sugary foods on emotional health in humans, and has suggested that consumption of junk food can negatively impact energy levels and emotional well-being.\nIn a study published in the European Journal of Clinical Nutrition, the frequency of consumption of 57 foods/drinks of 4000 children at the age of four and a half were collected by maternal report. At age seven, the 4000 children", "-23.89285505306907" ], [ "Ranges (AMDR) for adults identified by the Food and Nutrition Board of the United States Institute of Medicine as \"associated with reduced risk of chronic diseases while providing adequate intakes of essential nutrients,\" which are 45-65% carbohydrate, 10-35% protein, and 20-35% fat as a percentage of total energy. However, the nutritional quality of the specific foods comprising those macronutrients is often poor, as with the \"Western\" pattern discussed above. Complex carbohydrates such as starch are believed to be more healthy than the sugar so frequently consumed in the Standard American Diet.\nA review of eating habits in the United States in", "-23.8549089227854" ], [ "example of a population thriving on a long term low-carbohydrate, fat-based diet in the form of their traditional Inuit cuisine. However, it is unclear if their diet causes a prolonged state of ketosis as ketone levels in this population are lower than expected when tested. This may be due to limitations in urine ketone testing, adaptation to a long-term ketogenic diet, higher than expected dietary carbohydrate, or genetic factors. Inuit consume calories from carbohydrates from the glycogen found in raw meats as well as available plant matter such as mosses and lichens which may be above the carbohydrate allotment to", "-23.84105163953427" ], [ "servings from the protein-rich group, but this is intended to be a maximum. The pyramid recommends two to four fruit servings, but this is intended to be the minimum.\nThe fats group as a whole have been put at the tip of the pyramid, under the direction to eat as little as possible, which is largely problematic. Under the guide, one would assume to avoid fats and fatty foods, which can lead to health problems. For one, fat is essential in a person's general sustainability. Research suggests that unsaturated fats aid in weight loss, reduce heart disease risk, lower blood sugar,", "-23.837901708728168" ], [ "was more likely to overeat and have a preference for junk food. Even when the offspring were not given the option of junk food, their bodies metabolized food differently from offspring whose mother ate healthier. Offspring of mothers who ate badly had higher levels of cholesterol and triglycerides in their bloodstream and higher risk of heart disease. In addition, these offspring had higher levels of glucose and insulin, which indicate development of type 2 diabetes. The rats were studied through adulthood and were found to be fatter than the offspring whose mothers ate healthier. This study showed that the diet", "-23.797087094382732" ], [ "21% of residents are obese, 10% are diabetic, and 29% have high blood pressure—compared to the citywide averages of 24%, 11%, and 28% respectively. In addition, 25% of children are obese, compared to the citywide average of 20%.\nEighty-eight percent of residents eat some fruits and vegetables every day, which is about the same as the city's average of 87%. In 2018, 83% of residents described their health as \"good,\" \"very good,\" or \"excellent,\" more than the city's average of 78%. For every supermarket in Morningside Heights and Manhattanville, there are 11 bodegas.\nThe Mount Sinai St. Luke's hospital is located in", "-23.773498459282564" ], [ "an issue. Many parts of the world have access to a surplus of non-nutritious food, in addition to increased sedentary lifestyles. Yale psychologist Kelly Brownell calls this a \"toxic food environment\" where fat and sugar laden foods have taken precedence over healthy nutritious foods.\nThe issue in these developed countries is choosing the right kind of food. More fast food is consumed per capita in the United States than in any other country. The reason for this mass consumption of fast food is its affordability and accessibility. Often fast food, low in cost and nutrition, is high in calories and heavily", "-23.720388333123992" ], [ "is \"rich in red meat, dairy products, processed and artificially sweetened foods, and salt, with minimal intake of fruits, vegetables, fish, legumes, and whole grains.\"\nAn unhealthy diet is a major risk factor for a number of chronic diseases including: high blood pressure, high cholesterol, diabetes, abnormal blood lipids, overweight/obesity, cardiovascular diseases, and cancer.\nThe WHO estimates that 2.7 million deaths each year are attributable to a diet low in fruit and vegetables. Globally such diets are estimated to cause about 19% of gastrointestinal cancer, 31% of ischaemic heart disease, and 11% of strokes, thus making it one of the leading preventable", "-23.713609184516827" ] ]
8cnnjj
Why is Human Resources (HR) not an independent and objective unit reporting directly to Board (like Internal Audit), in order to be Pro-employee instead of Pro-company
[ "HR is supposed to be pro-company. The entire purpose of HR is to hire and retain the employees that will bring the most value for the company. If you are looking for some group whose primary focus is the benefit of the employees, and not the company, the organization you're thinking of is called a union.", "Who says HR is supposed to be pro-employee? Its basic function is to handle everything that has to do with the workforce. They do their job within the framework of the law and the rules of the company. Making it an independent unit wouldn't affect their job. It's the people working there that make the difference, not so much the org structure", "What you’re describing is a union. A union’s role is to represent the workers’ best interests in dealing with the employer. HR’s job is to manage company resources of the human kind, just as somebody my manage company assets or inventory.", "You're kind of answering your own question in a way. If we're being cynical, it wouldn't make sense for a company to pay HR to do their job in a way that doesn't benefit them, but the employees.", "Because the Human Resources department in a company is set up by and paid for by the company. The company isn't going to pay for a department full of employees that aren't pro\\-company. A smart business will release that being pro\\-employee more often than not benefits the company and is also pro\\-company \\- but this isn't a requirement and is often not the approach businesses take. If you are looking for an unit that is pro\\-employee you are thinking of a Union which is paid for by employees \\(by way on union dues\\).", "The answer's in the name. Companies think of employees as a resource, and HR exists to manage that resource. HR can deal with some issues that employees have, but they exist for the sake of the company.", "Because HRs job is to be pro company and keep the company from getting sued while also acquiring bodies at the cheapest price. Why would companies give a toot (eli5) about being pro employee?", "HR is Human Resources. In other words managing humans as a resource. They are NOT here for the employee, though they take care of employee needs. Ultimately they are a part of the company that defends the company not the employee. Unions are the thing you're thinking of. Unions are there FOR the employees, paid by the employees, work for the employee's benefits, etc.", "HR is not about being pro-employee. It is about preventing the company from being subject to lawsuit, and weeding out problem employees from the work force so that production/efficiency goes up. Any benefit to the employee is purely coincidental. The function you are wanting is covered by OSHA governmental agency for safety concerns, and Unions for quality of life concerns.", "Human Resources departments exist for the company, not the employee. Many people make that mistake, to their detriment. Edit for typo" ]
[ [ "recorded, documented, maintained and included in the management review and considered for continual improvement. Audit A systematic, independent and documented process for obtaining evidence and evaluating it objectively to determine the extent to which the defined criteria are fulfilled. Independent does not necessarily mean external to the organization. In many cases, particularly in smaller organizations, independence can be demonstrated by the freedom from responsibility for the activity being audited.\nThe objective of audit is to determine whether the OSHMS and its elements are in place, adequate, and effective in protecting the safety and health of employees and preventing incidents in the", "-28.72758815431598" ], [ "decisions.\nStaff management may involve moving a workforce around and utilizing human resources. Within staff management there is also line management, which involves the hierarchy system of the organization. Human resources and line management are often aligned as they both involve employees of any given organization.\nSee explanation of staff and line. Human resources Human resources (HR) refers to any activity within a business, company, or organization used to deal with the management of its employees. These tasks can include employment, training, growth, and improvement. A number of large-scale, global or international organizations might also do internal job postings to save money", "-26.706335376435618" ], [ "perceived lack of independence present, or if the auditor is placed in a compromising position by company directors. Many difficulties lie in determining whether an auditor is truly independent, since it is impossible to observe and measure a person’s mental attitude and personal integrity. Similarly, an auditor’s objectivity must be beyond question, but how can this be guaranteed and measurement, but appears independent too. If an auditor is in fact independent, but one or more factors suggest otherwise, this could potentially lead to the public concluding that the audit report does not represent a true and fair view. Independence in", "-26.659099217874882" ], [ "major accountability processes are compliance based and performance based. \"Traditionally, accountability has involved defining rules and procedures and then employing various means to ensure compliance with these expectations\" Performance-based practices rely on standardized processes that measure performance in terms of output and results. Yet compliance based, and performance based accountability has limitations for measuring the efficiency, effectiveness, equity, and economy of the bureaucracy. Furthermore, accountability stems from a multidimensional perspective, which includes the general public the bureaucracy serves, peers and co-workers, office managers, public administrators, and elected officials. Discretion Discretion can be defined as a component in the decision", "-26.586028481809194" ], [ "Human resource management system A human resources management system (HRMS) or human resources information system (HRIS) is a form of human resources (HR) software that combines a number of systems and processes to ensure the easy management of human resources, business processes and data. Human resources software is used by businesses to combine a number of necessary HR functions, such as storing employee data, managing payrolls, recruitment processes, benefits administration, and keeping track of attendance records.\nA human resources management system ensures everyday human resources processes are manageable and easy to access. It merges human resources as a discipline and, in", "-26.56954452017999" ], [ "increased flexibility in working hours, better retraining, and innovative (and usually industry-specific) performance markers. Managers destined for the service sector are being trained to use unique measurement techniques, better worker support and more charismatic leadership styles. Human resources finds itself increasingly working with management in a training capacity to help collect management data on the success (or failure) of management actions with employees. Evidence-based management Evidence-based management is an emerging movement to use the current, best evidence in management and decision-making. It is part of the larger movement towards evidence-based practices. Evidence-based management entails managerial decisions and organizational practices informed", "-26.3096730254083" ], [ "commended, there seems to be a tension between voluntary reporting and accountability, for companies are likely to produce reports favouring their interests.\nThe re-arrangement of social and environmental data that companies already produce as part of their normal reporting practice into an independent social audit is called a silent or shadow account.\nAn alternative phenomenon is the creation of external social audits by groups or individuals independent of the accountable organisation and typically without its encouragement. External social audits thus also attempt to blur the boundaries between organisations and society and to establish social accounting as a fluid two-way communication process. Companies", "-26.305382799340805" ], [ "Human resource management in public administration Human resource management in public administration concerns human resource management as it applies specifically to the field of public administration. It is considered to be an in-house structure that ensures unbiased treatment, ethical standards, and promotes a value-based system. Pertinent legislating Pendleton Civil Service Reform Act 1883: designed to end to the spoils system and provide federal government jobs based on merit and be selected through competitive exams. The act also made firing and demoting employees for political reasons unlawful. It also made requiring employees to give political service or contributions", "-26.270917876186104" ], [ "Audit trail Industry uses In telecommunication, the term means a record of both completed and attempted accesses and service, or data forming a logical path linking a sequence of events, used to trace the transactions that have affected the contents of a record.\nIn information or communications security, information audit means a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event.\nIn nursing research, it refers to the act of maintaining a running log or journal of decisions relating to a research project, thus making clear the steps taken and", "-26.25115531673987" ], [ "member. Each team member is a representative of a department and therefore can leverage their familiarity with accessing and providing knowledge of that department for the team. This increases the efficiency of a cross-functional team by reducing time spent gathering information. Greater depth of information Cross-functional teams require information from all levels of management. The teams may have their origins in the perceived need to make primarily strategic decisions, tactical decisions, or operational decisions, but they will require all three types of information. Almost all self-directed teams will need information traditionally used in strategic, tactical, and operational decisions. For example,", "-26.243480439301038" ], [ "news, making decisions on the basis of a well-judged mix of trust and distrust…’\nThis discussion extends to the technocratic project of making things quantifiable by calculating and evaluating the possibilities of probable consequences. Ethics in accounting The nature of accounting establishes a unique position of trust in relation to the clients, employers and general public, who count on accountants' professional judgment and advice in making financial/managerial decisions.'They have the responsibility to ensure that their duties are performed in conformity with the ethical values of honesty, integrity, objectivity, due care, confidentiality, and the commitment to the public interest before one’s own.'", "-26.21839608271307" ], [ "unsolved problem in the information technology industry. According to projections from Gartner (2003), white collar workers spend 30–40% of their time searching, finding, and assessing unstructured data. BI uses both structured and unstructured data. The former is easy to search, and the latter contains a large quantity of the information needed for analysis and decision making. Because of the difficulty of properly searching, finding and assessing unstructured or semi-structured data, organizations may not draw upon these vast reservoirs of information, which could influence a particular decision, task or project. This can ultimately lead to poorly informed decision making.\nTherefore, when designing", "-26.09312023745133" ], [ "HRHIS A human resource for health information system (HRHIS), also known as human resource information system (HRIS) — is a system for collecting, processing, managing and disseminating data and information on human resource for health (HRH). Depending on the level of development of a country's health care system and the organization of its workforce, an HRHIS can be computerized or paper-based, including information on numbers and distribution of health workers and track their career information. It is usually an integral part of a comprehensive health management information system, and may be used to monitor and assess the performance of the", "-26.004537425366152" ], [ "access to information is a major impediment to an independent auditor and indicates that an organization is not truly supportive of the auditor's mandate and its commitment to sound governance should be questioned. Reporting of critical findings Inform the Audit Committee without delay of any issue of risk, control or management practice that may be of significance.\nThe Chief Audit Executive (CAE) reports the most critical issues to the audit committee quarterly, along with management's progress towards resolving them. Critical issues typically have a reasonable likelihood of causing substantial financial or reputational damage to the company. For particularly complex", "-25.886964291791628" ], [ "support employees directly with their questions, grievances, and work on a range of projects within the organization. They \"may handle all aspects of human resources work, and thus require an extensive range of knowledge. The responsibilities of human resources generalists can vary widely, depending on their employer's needs.\" Specialists, conversely, work in a specific HR function. Some practitioners will spend an entire career as either a generalist or a specialist while others will obtain experiences from each and choose a path later. The position of HR manager has been chosen as one of the best jobs in the US, with", "-25.87290934230714" ], [ "HR metrics, more specifically Retention metrics, HR leaders are able to quantify variables such as turnover rate, average tenure, the rate of veteran worker, or the financial impact of employee turnover. These results can indicate how much separating employees is costing the company and help the company to create proactive plans to prevent future loss of top talent.\nMore importantly, metrics enable leaders and decision makers in organizations towards more efficient and better delivery of HR services HR Metrics and Data Executives tend to make consistently better decisions when they use facts gathered from their organizations in objective ways. Many of", "-25.817069559045194" ], [ "budget, designs and implements managerial tools needed to run the institution (accounting charts, activities charts, indicators, etc.), and provides continuous oversight of the institution's activities and their compliance with budget estimates.\nThe mission of Human Resources is to develop the staff members’ abilities and strengthen their motivation, play an active role in building the organization and optimizing its services, and define and ensure the implementation of best institutional practices for managing human resources in conformance with the established guidelines.\nThe Central Services include the Information Systems Department, the Law Department, the Investigation Department and the Studies and Statistics Department. These departments are", "-25.81576858855078" ], [ "of his daily work communicates and liaises with the director-general and the staff of the organisation. Independent budgeting Although CAEs and internal auditors are paid by the company, the human resource budget of the directorate of internal audit, in particular, should be protected from interference from the audited organisation. The typical risk is that the audit's budget subject to the approval of director of HR and of the DG is a source of potential interference or friendly pressure to self-limit the CAE’s critic exercise of an independent viewpoint. An appeal to the board, even expressly foreseen as part of the", "-25.815605307030637" ], [ "Fiscal transparency Budget transparency On the other hand, “Budget transparency” may refer to the narrower budget sector (e.g. ‘budgetary central government), any may not include the budgets of autonomous agencies, or extra-budgetary funds. The term may also refer to a wider concept e.g. the International Budget Partnership’s ‘Open Budget Survey’, which includes some questions on assets and liabilities but which focuses on 8 key reports centred around the budget. The term budget transparency is generally not used to refer to as wide a concept as fiscal transparency.\nFiscal openness refers to fiscal transparency together with direct public participation in fiscal policy", "-25.764433592426727" ], [ "Well integrity Accountability/responsibility Accountability is the position that ensures a particular task is being done. They typically control the budget and organizational chart structure.\nResponsibility is the position that actually does the task. There are a variety of tasks associated with well integrity and responsibility can reside with a field's well operations engineer, operators, well service technicians, etc. Well operating processes This includes processes such as personnel competency, well startup-operating-shutdown procedures, process to report anomalies, corrosion/erosion control, etc. Well service processes This includes processes such as personnel competency, intervention procedures, etc. Tubing/annulus integrity This refers to the integrity of the production", "-25.758511024151176" ], [ "in making MNCs accountability is given by the spatial, financial and cultural distance of these organisations to those who are affecting and affected by it.\nSocial accounting also questions the reduction of all meaningful information to financial form. Financial data is seen as only one element of the accounting language. Self-reporting and third party audits In most countries, existing legislation only regulates a fraction of accounting for socially relevant corporate activity. In consequence, most available social, environmental and sustainability reports are produced voluntarily by organisations and in that sense often resemble financial statements. While companies' efforts in this regard are usually", "-25.734189848501728" ], [ "turnover costs. By implementing programs to improve work/life balance, employees can be more engaged and productive while at work.\nExit Interview and Separation Management Programs Retention tools and resources Employee Surveys – By surveying employees, organizations can gain insight into the motivation, engagement and satisfaction of their employees. It is important for organizations to understand the perspective of the employee in order to create programs targeting any particular issues that may impact employee retention.\nExit Interviews – By including exit interviews in the process of employee separation, organizations can gain valuable insight into the workplace experience. Exit interviews allow the organization to", "-25.699654735323747" ], [ "other procedures as we considered necessary in the circumstances. We believe that our audit provides a reasonable basis for our opinion.\n\nA company's internal control over financial reporting is a process designed to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with generally accepted accounting principles. A company's internal control over financial reporting includes those policies and procedures that (1) pertain to the maintenance of records that, in reasonable detail, accurately and fairly reflect the transactions and dispositions of the assets of the company; (2) provide reasonable assurance that", "-25.693853423736073" ], [ "However, organizations have to ensure that the data they have uphold integrity and are quality data.\nWhile HR systems is one way of obtaining metrics, many organizations because of lack of resources or time, or simply because they don’t know where to begin can enlist the help of a retention specialist or purchase metric systems designed solely for HR Metrics.\nThe HRIS systems (Workday, Successfactors, Oracle HR, etc.) provide often strong reporting tools within the systems to reflect cost of people. While talent acquisition systems (like Taleo, etc.) Provide insight in recruitment costs. If the HR department wants to create data around", "-25.63827107608506" ], [ "Accountability In ethics and governance, accountability is answerability, blameworthiness, liability, and the expectation of account-giving. As an aspect of governance, it has been central to discussions related to problems in the public sector, nonprofit and private (corporate) and individual contexts. In leadership roles, accountability is the acknowledgment and assumption of responsibility for actions, products, decisions, and policies including the administration, governance, and implementation within the scope of the role or employment position and encompassing the obligation to report, explain and be answerable for resulting consequences.\nIn governance, accountability has expanded beyond the basic definition of \"being called to account for one's", "-25.58436345430391" ], [ "issues, the responsible manager may participate in the discussion. Such reporting is critical to ensure the function is respected, that the proper \"tone at the top\" exists in the organization, and to expedite resolution of such issues. It is a matter of considerable judgement to select appropriate issues for the audit committee's attention and to describe them in the proper context.", "-25.431802428105684" ], [ "linked to considering carefully, and being open to challenge in relation to, one's choices concerning how research agendas are framed and the styles in which write-ups of research \"results\" are created. Administrative Internal rules and norms as well as some independent commission are mechanisms to hold civil servants within the administration of government accountable. Within department or ministry, firstly, behavior is bound by rules and regulations; secondly, civil servants are subordinates in a hierarchy and accountable to superiors. Nonetheless, there are independent \"watchdog\" units to scrutinize and hold departments accountable; legitimacy of these commissions is built upon their independence, as", "-25.406298257329155" ], [ "the best possible information. The accountant perspective focuses on the accountability value in budgeting which analyzes the amount budgeted to the actual expenditures thereby describing the \"wisdom of the original policy\". Smith and Lynch's public manager's perspective on a budget is a policy tool to describe the implementation of public policy. Further, they develop an operational definition:\nA \"budget\" is a plan for the accomplishment of programs related to objectives and goals within a definite time period, including an estimate of resources required, together with an estimate of resources available, usually compared with one or more past periods", "-25.37551716299413" ], [ "ethics may be implicitly embedded in many established laws, they can extend beyond those strictures and address obligations that relate to reputation and individual well-being, for example.\nTransparency is an application of Respect for Law and Public Interest that can encourage assessing and implementing accountability. Accountability ensures that researchers behave responsibly, and ultimately it galvanizes trust in ICTR. Transparency-based accountability helps researchers, oversight entities, and other stakeholders avoid guesswork and incorrect inferences regarding if, when, and how ethical principles are being addressed. Transparency can expose ethical tensions, such as the researcher's interest in promoting openness and reproducibility versus withholding research findings", "-25.332689341585592" ], [ "them remains low. Information expert Information expert (also expert or the expert principle) is a principle used to determine where to delegate responsibilities such as methods, computed fields, and so on. \nUsing the principle of information expert, a general approach to assigning responsibilities is to look at a given responsibility, determine the information needed to fulfill it, and then determine where that information is stored. \nThis will lead to placing the responsibility on the class with the most information required to fulfill it. High cohesion High cohesion is an evaluative pattern that attempts to keep objects appropriately focused, manageable and", "-25.33239322709278" ], [ "Employee retention Employee retention refers to the ability of an organization to retain its employees. Employee retention can be represented by a simple statistic (for example, a retention rate of 80% usually indicates that an organization kept 80% of its employees in a given period). However, many consider employee retention as relating to the efforts by which employers attempt to retain the employees in their workforce. In this sense, retention becomes the strategies rather than the outcome.\nA distinction should be drawn between low-performing employees and top performers, and efforts to retain employees should be targeted at valuable, contributing employees. Employee", "-25.227384876846372" ], [ "Electronic human resources Management The Management aspect of E-HR involves drafting policies and controlling both the traffic and collection of electronic information.\nAs new technology comes out that is more portable and capable of creating and storing more information, it is the responsibility of HR to define how employees interact with the data. According to a Deloitte study in August 2008, 90% of employer data is electronically stored information (ESI), and 40% of executives say that data volumes are becoming unmanageable. Unmanageable data makes locating relevant data more challenging which can manifest into significant losses through wasted storage space and reductions", "-25.203290219290466" ], [ "archives is ethical.\nThe AAA also asserts that anthropologists' ability to collect and store data at all is \"a privilege\", and researchers have an ethical duty to store digital data responsibly. This means protecting the identity of participants, sharing data with other anthropologists, and making backup copies of all data.", "-25.186903328333756" ], [ "the important decisions made by executives affect the business and the bottom line; therefore, in order to convince executive leaders that organizations are benefiting from their people or on the contrary, losing money and wasting resources, HR will need to provide palpable evidence. This evidence can be found in HR Metrics. The key to finding the right metrics for your organization needs is to identify the overall business needs as organizations may differ in terms of the metrics they use. Metrics used by the organization need to show data on how human capital strategy is effective and that organizations are", "-25.153569938913733" ], [ "Operational continuity Operational continuity refers to the ability of a system to continue working despite damages, losses or critical events. In the Human Resources and Organizational domain, including IT, it implies the need to determine the level of resilience of the system, its ability to recover after an event, and build a system that resists to external and internal events or is able to recover after an event without losing its external performance management capability. Organizational Continuity is achieved only with specific corporate planning. In the material domain, it determines the need to adopt redundant systems, performance monitoring systems, and", "-25.06866838175901" ], [ "Evidence-based conservation Systematic review A systematic review consists of a non-subjective assessment of available data and evidence related to a management. Synthesizing results from different studies over different time periods, locations or sample sizes can reduce the bias present in individual studies. Systematic reviews differ from traditional reviews by being easily understood, peer reviewed and repeatable. Detailed protocols remain available for conducting a thorough, unbiased systematic review. Synopsis Part of implementing an evidence-based conservation analysis requires generating a synopsis. This refers to the brief description of a single study or a systematic review. Synopses form the building blocks of", "-25.017923816037182" ], [ "departmental role, such as the First Civil Service Commissioner, the chair of the UK Statistics Authority and the chair of the Charity Commission.\nThe committee chooses its own subjects of inquiry, within its overall terms of reference; however, it seeks evidence from a wide variety of individuals and groups with relevant interests and experience. The members of the committee are drawn from the three largest political parties, and the committee itself mainly publishes its results through reports and making its recommendations known to the government.\nCreated on 3 June 2015, the committee replaced the longstanding Public Administration Select Committee and the Political", "-25.01707255720794" ], [ "Human resources HR responsibilities Human resource managers are in charge of many duties pertaining to their job. The duties include planning, recruitment and selection process, posting job ads, evaluating the performance of employees, organizing resumes and job applications, scheduling interviews and assisting in the process and ensuring background checks. Another job is payroll and benefits administration which deals with ensuring vacation and sick time are accounted for, reviewing payroll, and participating in benefits tasks, like claim resolutions, reconciling benefit statements, and approving invoices for payment. HR also coordinates employee relations activities and programs including but not limited to employee", "-25.01695990344092" ], [ "the Institute for Fiscal Studies, academia, and other bodies. Primary legislation The Budget Responsibility and National Audit Act sets out the overarching duty of the OBR to examine and report on the sustainability of the public finances. It also gives complete discretion to the OBR in the performance of its duties, as long as those duties are performed objectively, transparently and independently and takes into account the sitting government's policies and not alternative policies. Framework document The OBR’s governance and management arrangements are set out in greater detail in a Framework document drawn up by the Treasury and agreed", "-24.99953286856453" ], [ "Duty of care (business associations) Waste Directors have a duty not to waste corporate assets by overpaying for property or employment services. Thus the definition of waste is an exchange so one-sided that no business person of ordinary, sound judgment could conclude the corporation has received adequate consideration. This is difficult to prove in a court of law. Case law The duty of care has been set out or clarified in a number of decisions. Among the important duty of care cases are:\nSmith v. Van Gorkom (setting out duty to be reasonably informed in decision-making).\nCaremark, Unocal Corp. v. Mesa Petroleum", "-24.977267073621192" ], [ "the positive obligation of public bodies to provide, make public and disseminate information about their activities, budgets and policies so that citizens can understand what public bodies are doing, can participate in public life and can monitor the behaviour of public authorities. The second component is a reactive one, entailing the right of all persons to requests information and documents to public bodies, along with the right to receive an answer. In principle, all the main information held by public bodies should be available, while exceptions to disclosure should be grounded on the protection of other values, such as privacy,", "-24.944216748961026" ], [ "and internal auditors, monitor progress and review results and review fees and expenses. Review significant findings or unsatisfactory internal audit reports, or audit problems or difficulties encountered by the external independent auditor. Monitor management's response to all audit findings; (e) Manage complaints concerning accounting, internal accounting controls or auditing matters; (f) Receive regular reports from the Chief Executive Officer, Chief Financial Officer and the Company's other Control Committees regarding deficiencies in the design or operation of internal controls and any fraud that involves management or other employees with a significant role in internal controls; and (g) Support management in resolving", "-24.907703704298" ], [ "Audit focuses on results, evaluating the effectiveness and suitability of controls by challenging underlying rules, procedures and methods.\nManagement Audit is an assessment of methods and policies of an organization's management in the administration and the use of resources, tactical and strategic planning, and employee and organizational improvement. Management Audit is generally conducted by the employee of the company or by the independent consultant and focused on the critical evaluation of management as a team rather than appraisal of individual.", "-24.876137891113558" ], [ "analysis. Reporting Businesses report differently based on their stakeholders and other interested parties.\nFor small businesses, reporting on a cash basis is considered adequate. For larger businesses, typically backed by investors, it is necessary to provide more in-depth reporting based on Generally Accepted Account Principles (GAAP) in the United States and International Financial Reporting Standards (IFRS) elsewhere. These principles are a set of rules for accurate and consistent financial reporting and are mandatory for publicly traded companies.", "-24.85485649650127" ], [ "\nOrganizational independence is effectively achieved when the chief audit executive reports functionally to the board. Examples of functional reporting to the board involve the board:\nApproving the internal audit charter; Approving the risk based internal audit plan; Approving the internal audit budget and resource plan; Receiving communications from the chief audit executive on the internal audit \nactivity’s performance relative to its plan and other matters; Approving decisions regarding the appointment and removal of the chief audit executive; Approving the remuneration of the chief audit executive; and Making appropriate inquiries of management and the chief audit executive to determine whether there are", "-24.83845288298926" ], [ "is the norm for procedures, information, consultation and decision-making to be in the public domain and to involve external stakeholders.\nThere was overwhelming support for the Agency’s policy of basing decisions on scientific evidence, and for this policy to be maintained and developed further. The vast majority of stakeholders believe the Agency to be independent and to act independently, with general recognition that decisions are based on scientific evidence.\nThere was general support for the Agency amongst all stakeholder groups, both in terms of the objectives of the Agency, and the way in which the Agency has approached and undertaken its responsibilities.\nOne", "-24.83827490334079" ], [ "Information audit The information audit (IA) extends the concept of auditing holistically from a traditional scope of accounting and finance to the organisational information management system. Information is representative of a resource which requires effective management and this led to the development of interest in the use of an IA.\nPrior the 1990s and the methodologies of Orna, Henczel, Wood, Buchanan and Gibb, IA approaches and methodologies focused mainly upon an identification of formal information resources (IR). Later approaches included an organisational analysis and the mapping of the information flow. This gave context to analysis within an organisation's information systems", "-24.78283454359145" ], [ "Service governance Service portfolio The portfolio of services is a list of all internal services that are available within the organization. The portfolio describes each service, how it is funded, its associated costs and ownership boundaries, and its current performance and identified conflicts. The portfolio will include services which have been outsourced and are supplied to the organization by third parties.\nThe services portfolio provides a map of the organization, providing directors with a different way of understanding the dynamics of the organization than those received from financial reports. This allows the board to more easily make decisions based on accurate", "-24.76370450480158" ], [ "like production scheduling, inventory purchases, and media flightings. In other cases, the team would confine itself to tactical and operational decisions. In either case it would need information associated with all three levels. Greater range of users Cross-functional teams consist of people from different parts of an organization. Information must be made understandable to all users. Not only engineers use technical data, and not only accountants use financial data, and not only human resources personnel use HR data. Modern organizations lack middle managers to combine, sort, and prioritize the data. Technical, financial, marketing, and all other types of information must", "-24.75225849251592" ], [ "proposed. One is to broaden the criteria for individual responsibility so that individuals are held accountable for not anticipating failures in the organization. Another solution, recently proposed by Thompson, is to hold individuals accountable for the design of the organization, both retrospectively and prospectively.\nAccountability is an element of a RACI to indicate who is ultimately answerable for the correct and thorough completion of the deliverable or task, and the one who delegates the work to those responsible. Public/private overlap With the increase over the last several decades in public service provided by private entities, especially in Britain and the", "-24.74913972853028" ], [ "on all levels. Transparency Is on integral element of the democratic process, together with the right to vote and the right of surveillance. Transparency is synonymous with partnership and development as far as it is a means of knowledge and surveillance. It is displemed in the right of the citizen to know and the duty of the authorities to tell the truth and uncover facts. Without transparency there remains none but the freedom to choose between bad and worse. The absence of knowledge means the absence of freedom. Equity Is the building block of the society’s existence, and has a", "-24.714048788377113" ], [ "demands. Resources, however, are defined as job-relevant features that help workers achieve work-related goals, lessen job demands, or stimulate personal growth. Control and support as per the DCS model are subsumed under resources. Resources can be external (provided by the organization) or internal (part of a worker's personal make-up). In addition to control and support, resources encompassed by the model can also include physical equipment, software, performance feedback from supervisors, the worker's own coping strategies, etc. There has not, however, been as much research on the JD-R model as there has been on the constituents of the DC or DCS", "-24.690634882063932" ], [ "Public sector ethics Ethics in the public sector is a broad topic that is usually considered a branch of political ethics. In the public sector, ethics addresses the fundamental premise of a public administrator's duty as a \"steward\" to the public. In other words, it is the moral justification and consideration for decisions and actions made during the completion of daily duties when working to provide the general services of government and nonprofit organizations. Ethics is defined as, among others, the entirety of rules of proper moral conduct corresponding to the ideology of a particular society or organization (Eduard). Public", "-24.666872071457874" ], [ "procedures that are appropriate in the circumstances, but not for the purpose of expressing an opinion on the effectiveness of the entity's internal control. Accordingly, we express no such opinion. An audit also includes evaluating the appropriateness of accounting policies used and the reasonableness of significant accounting estimates made by management, as well as evaluating the overall presentation of the consolidated financial statements.\nWe believe that the audit evidence we have obtained is sufficient and appropriate to provide a basis for our audit opinion.\nOpinion\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the", "-24.661614082115847" ], [ "Audit Information technology audit An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement. Accounting Financial auditives (including taxation, misselling and other forms of fraud) to misstate financial information, auditing has become a legal requirement for many entities who have the power to", "-24.661363199463494" ], [ "capital management\" (HCM)\nis sometimes used synonymously with \"HR\", although \"human capital\" typically refers to a more narrow view of human resources; i.e., the knowledge the individuals embody and can contribute to an organization. Likewise, other terms sometimes used to describe the field include \"organizational management\", \"manpower management\", \"talent management\", \"personnel management\", and simply \"people management\". In popular media Several popular media productions have depicted human resource management in operation. On the U.S. television series of The Office, HR representative Toby Flenderson is sometimes portrayed as a nag because he constantly reminds coworkers of company policies and government regulations.\nLong-running American comic", "-24.66101031956532" ], [ "of computer-based accounting information systems is that they automate and streamline reporting, develop advanced modelling and support data mining. Reporting is major tool for organizations to accurately see summarized, timely information used for decision-making and financial reporting. The accounting information system pulls data from the centralized database, processes and transforms it and ultimately generates a summary of that data as information that can now be easily consumed and analyzed by business analysts, managers or other decision makers. These systems must ensure that the reports are timely so that decision-makers are not acting on old, irrelevant information and,", "-24.66091495738884" ], [ "communication right of the CAE, is often ineffective on short-term imposed constraints, given the time constraints of the budget process. The best practice is that the audit committee's opinion is required on the CAE’s draft budget, well in advance of the normal budgeting process of the organisation. Access to information Information is of key importance to organize, prepare and perform internal audits. Independent auditors are generally granted full access to any and all information they require to discharge their responsibilities. Reasonable restrictions would be limited to things such as personal information in personnel records such as health information. Unduly restricted", "-24.655822956913198" ], [ "role internal auditing should play in the corporate arena, in keeping with the IPPF's philosophy. Organizational independence While internal auditors are not independent of the companies that employ them, independence and objectivity are a cornerstone of the IIA professional standards; and are discussed at length in the standards and the supporting practice guides and practice advisories. Professional internal auditors are mandated by the IIA standards to be independent of the business activities they audit. This independence and objectivity are achieved through the organizational placement and reporting lines of the internal audit department. Internal auditors of publicly traded companies in the", "-24.614044564415963" ], [ "Chief information governance officer History and evolution In past decades, information governance responsibilities might have fallen under the purview of the chief information officer (CIO). But somewhere along the line, the CIO job description changed to focus solely on the information systems and associated technology that power a company—not the information itself.\nIn today's age of big data, organizations have more information under their control than ever before. To extract the maximum value from that data while simultaneously protecting an organization from its associated risks, business leaders have turned toward the CIGO because of the role's independence from other departments.", "-24.581378080607465" ], [ "the practices of traceability and transparency. Traceability is 'the practice of sharing information among supply chain partners about materials that meet industry standards for minimising environmental risk', and Transparency is 'the flow of money through the entire supply chain with an explicit goal of ensuring that each organisation makes enough of a profit to do more than just subsist'. In essence, traceability is concerned with how things are made throughout the chain while transparency is concerned with keeping profits flowing through the entire chain. To maximise surplus, it is important to ensure continuity of the supply chain system by letting", "-24.57446880544194" ], [ "making in conservation was based on intuition and/ or practitioner experience often disregarding other forms of evidence of successes and failures (e.g. scientific information). This has led to costly and poor outcomes. Evidence-based conservation provides access to information that will support decision making through an evidence-based framework of “what works” in conservation. \nThe evidence-based approach to conservation is based on evidence-based practice which started in medicine and later spread to nursing, education, psychology and other fields. It is part of the larger movement towards evidence-based practices.", "-24.572889045984084" ], [ "Solid line reporting Solid-line (direct) reporting Solid-line reporting is a direct reporting relationship between a supervisor and a subordinate employee. The supervisor provides primary guidance to the employee, controls the major financial resources the employee relies on to perform his/her work, conducts performance reviews with the subordinate, and provides all other direct supervision. Dotted-Line (indirect) reporting Dotted-line reporting describes a relationship between an employee and a secondary supervisor/leader that provides additional oversight and guidance to the employee in the execution of his/her work. The intent of the dotted-line relationship is to ensure that the dotted-line supervisor/leader has the authority to", "-24.5464881128014" ], [ "resource managers will be concerned with using indicators that are directly related to evaluating policies and objectives. They require their indicators to be sensitive, responsive and have historical data available like the technical audience, but they are also looking for indicators that are cost-effective and have meaning for public awareness. Finally, the general public responds to indicators that have clear and simple messages and are meaningful to them, such as the UV index and the air quality index. Indicator systems and communicating them Individual indicators are designed to translate complex information in a concise and easily understood manner", "-24.535930143012138" ], [ "Materiality (auditing) Materiality is a concept or convention within auditing and accounting relating to the importance/significance of an amount, transaction, or discrepancy. The objective of an audit of financial statements is to enable the auditor to express an opinion whether the financial statements are prepared, in all material respects, in conformity with an identified financial reporting framework such as Generally Accepted Accounting Principles (GAAP). \nAs a simple example, an expenditure of ten cents on paper is generally immaterial, and, if it were forgotten or recorded incorrectly, then no practical difference would result, even for a very small business. However,", "-24.508429437616996" ], [ "including elected representatives whose mandate it is to monitor service provision, are largely unaware of this information. In order to solve this issue, MoFPED partnered with Innovations for Poverty Action (IPA), the Overseas Development Institute (ODI), and Advocates Coalition for Development and Environment (ACODE) in 2014 to launch a Budget Transparency Initiative to make department, project-, and location-specific budget information available to politicians, opinion leaders, and the public as well as mobilize them to monitor and provide feedback on the spending and services provided by government institutions.", "-24.467298395202306" ], [ "management's responsibilities for the financial statements. \nFor audit evidence, it is reliable if the auditor has no other means of obtaining evidence. Examples may include situations involving contingent liabilities or off-balance-sheet liabilities. The person issuing the letter should have the appropriate authority or seniority in the organization to vouch on the issue. \nIn the case of contradictions between other sources of evidence and management representations, the auditor should conduct further investigations.", "-24.437495623549694" ], [ "Analytical procedures (finance auditing) Evidence Analytical procedures include comparison of financial information (data in financial statement) with prior periods, budgets, forecasts, similar industries and so on. It also includes consideration of predictable relationships, such as gross profit to sales, payroll costs to employees, and financial information and non-financial information, for examples the CEO's reports and the industry news. Possible sources of information about the client include interim financial information, budgets, management accounts, non-financial information, bank and cash records, VAT returns, board minutes, and discussion or correspondence with the client at the year-end.", "-24.435246872124253" ], [ "labor union). Consequently, HR, usually through representatives, engages in lobbying efforts with governmental agencies (e.g., in the United States, the United States Department of Labor and the National Labor Relations Board) to further its priorities.\nHuman Resource Management has four basic functions: staffing, training and development, motivation, and maintenance. Staffing is the recruitment and selection of potential employees, done through interviewing, applications, networking, etc. There are two main factors to staffing: attracting talented recruits and hiring resources. HR Managers must create detailed recruitment strategies and have a plan of action to put forward when recruiting. Next, managers can put strategies into", "-24.424423517404648" ], [ "Employeeship The Elements of Employeeship The key to this approach is for teams to be able to have transparent conversations with their \"leader\" regarding things that are not normally discussed in the work setting, subjects such as: What is loyalty?; openness and transparency; the meaning of work and how it fits in with our lives; relationships between us in the team; responsibility, accountability and taking initiative; the service we offer others.\nTypically the discussions follow a pre-designed questions so that deeper exploration can occur.", "-24.422494646469204" ], [ "resource usage for individual items.\nUnder ABC, accountants assign 100% of each employee's time to the different activities performed inside a company (many will use surveys to have the workers themselves assign their time to the different activities). The accountant then can determine the total cost spent on each activity by summing up the percentage of each worker's salary spent on that activity.\nA company can use the resulting activity cost data to determine where to focus its operational improvements. For example, a job-based manufacturer may find that a high percentage of its workers are spending their time trying to figure out", "-24.421764765376793" ], [ "accountability framework to encourage desirable behavior in the valuation, creation, storage, use, archival, and deletion of information. It includes the processes, roles, standards, and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals.\nAs compared to eDiscovery, information governance as a discipline is rather new. Yet there is traction for convergence. eDiscovery—as a multibillion-dollar industry—is rapidly evolving, ready to embrace optimized solutions that strengthen cybersecurity (for cloud computing). Since the early 2000s eDiscovery practitioners have developed skills and techniques that can be applied to information governance. Organizations can apply the lessons", "-24.40898899102649" ], [ "align their HR strategy with what employees look for in an organization and enact programs and practices that will influence top talent to stay at the organization. \nIn the past, exit interview data was being collected by the organization but not much was being done in terms of interpreting the data and making it actionable. Today there are metrics, analytics, benchmarks, and best practices that help organizations make sense of and use the data towards proactive organizational retention programs. Recently an array of exit interview software has been developed and popularized. However this method of conducting Exit Interviews has some", "-24.405535882706772" ], [ "Employee self-service Employee self-service (ESS) provides employees access to their personal records and details. ESS features include allowing employees to change their contact details, banking information, and benefits. ESS also allows for administrative tasks such as applying for leave, seeing absence history, reviewing timesheets and tasks, inquiring about available loan programs, requesting overtime payment, viewing compensation history, and submitting reimbursement slips. With the emergence of ESS, employees are able to transact with their Human Resources office remotely. Human Resources Information Systems and ESS Human Resources Information Systems (HRIS) have brought ESS functionality to a wide range of organisations, from small", "-24.398827680834756" ], [ "the premise that public sector information is to be managed for public purposes as a national resource.\nThe office encourages agencies to embed the principles in their internal policies and procedures on information management. The intention is that by doing so they will help build a culture of proactive information disclosure and community engagement.", "-24.37997061085207" ], [ "Resource breakdown structure Definition Assignable resources, such as personnel, are typically defined from a functional point of view: \"who\" is doing the work is identified based on their role within the project, rather than their department or role within the parent companies. In some cases, a geographic division may be preferred. Each descending (lower) level represents an increasingly detailed description of the resource until small enough to be used in conjunction with the work breakdown structure (WBS) to allow the work to be planned, monitored and controlled. Example In common practice, only non-expendable (i.e., durable goods) resources are listed in", "-24.376124790807353" ], [ "of information, but that the use of open data technologies does not necessarily equate accountability.\nThe Organisation for Economic Co-operation and Development (OECD) approaches open government through the following categories: whole of government coordination, civic engagement and access to information, budget transparency, integrity and the fight against corruption, use of technology, and local development. History The term 'open government' originated in the United States after World War II. Wallace Parks, who served on a subcommittee on Government Information created by the U.S. Congress, introduce the term in his 1957 article “The Open Government Principle: Applying the Right to Know under the", "-24.37605527623691" ], [ "documentation efforts on What and How columns. By contrast, a travel agent company, whose business is more concerned with people and event-timing, could find it beneficial to focus their documentation efforts on Who, When, and Where columns. However, there is no escaping the Why column's importance as it provides the business drivers for all the other columns. Applications and influences Since the 1990s the Zachman Framework has been widely used as a means of providing structure for information technology engineering-style enterprise modeling. The Zachman Framework can be applied both in commercial companies and in government agencies. Within", "-24.366983061311544" ], [ "Philosophy of accounting Introduction Often, accountants are trusted to provide the knowledge such as financial statement in which financial/managerial decisions are based. According to the IASB project, conceptual framework, it states the role of financial report as \n'The primary users need information about the resources of the entity not only to assess an entity's prospects for future net cash inflows but also how effectively and efficiently management has discharged their responsibilities to use the entity's existing resources' \nSuch great significance is put on the role of accounting in business industry yet the issue of trust has always been the fundamental", "-24.36693307308451" ], [ "confidentiality status of Congressional Research Service reports, until September 18, 2018, was a matter of contention due to the lack of public access to research that was paid for by taxpayer money.\nCongress had historically reserved to itself control over the dissemination of CRS products to the public on the principle that CRS, as an extension of congressional staff, works exclusively for the Congress: \"dissemination is limited to Members of Congress.\" From 1952 until 2018 a provision was included in CRS annual appropriations acts requiring approval by one of its two congressional oversight committees for acts of \"publication\" by the CRS.\nThe", "-24.346105044117394" ], [ "at the state level, and responsibility for monitoring, assessment, and reporting is allocated to all eight divisions of UNEP, creating redundancies. Additionally, the UNEP system of reporting is disorganized and difficult to access. \"The public cannot use UNEP's publications and benefit from the organization's work to the fullest due to the lack of a single easily accessible, searchable, and sortable database or catalog of publications\". Agenda Setting “Another important function critical to the effectiveness of an anchor institution is agenda setting and management of intergovernmental processes to gain agreement on standards, policies, and guidelines or even just serving", "-24.33822064823653" ], [ "expertise because they focus on either the “what,” “how,” “who,” “where,” “when,” or “why” of the enterprise. For example, Functional View work products answer the question “how is the mission carried out?” They are most easily developed by experts in functional decomposition using process and activity modeling. They show the enterprise from the point of view of functions. They also may show organizational and information components, but only as they relate to functions. Viewpoints In systems engineering, a viewpoint is a partitioning or restriction of concerns in a system. Adoption of a viewpoint is usable so", "-24.3327223088545" ], [ "employee monitoring to track the behavior and output of workers. She used the term 'panopticon' because the workers could not tell that they were being spied on, while the manager was able to check their work continuously. Zuboff argued that there is a collective responsibility formed by the hierarchy in the information panopticon that eliminates subjective opinions and judgements of managers on their employees. Because each employee's contribution to the production process is translated into objective data, it becomes more important for managers to be able to analyze the work rather than analyze the people.\nFoucault's use of the panopticon metaphor", "-24.329895602872966" ], [ "and the external auditor.\nA primary focus area of internal auditing as it relates to corporate governance is helping the Audit Committee of the Board of Directors (or equivalent) perform its responsibilities effectively. This may include reporting critical management control issues, suggesting questions or topics for the Audit Committee's meeting agendas, and coordinating with the external auditor and management to ensure the Committee receives effective information. In recent years, the IIA has advocated more formal evaluation of Corporate governance, particularly in the areas of board oversight of enterprise risk, corporate ethics, and fraud. Audit Project Selection or \"Annual Audit Plan\"", "-24.31336922394064" ], [ "Administrative history Administrative history is a historiographic field which looks at the history of state administrations and bureaucracies. Originally considered a sub-field of Administrative Sciences that was intended to improve contemporary governance, administrative history has become an increasingly separate field. Administrative historians study the changes in administrative ideologies and administrative law while also looking at civil servants and the relationship between government and society. It is related to political and constitutional history. The discipline is most common in France, Germany, the United Kingdom, and Italy.", "-24.28903877930287" ], [ "authority must demonstrate that in the fulfilment of their duties under Best Value they have: compared their service provision with that of other private and public providers; consulted with local business and community; considered competition in provision; and challenged the reasons for, and methods of, provision (the ‘4 Cs’).\nThe third defining element introduced a regime of audit and measurement of performance, with the broad expectation that, year-on-year, costs would reduce and quality would increase. Performance would be monitored locally through Best Value Performance Reviews (BVPRs), partly through adherence to locally and statutorily determined Best Value performance indicators (BVPIs), and disseminated", "-24.26468295557197" ], [ "the practice of investigating, resolving and handling such occurrences by using skilled staff and software tools. Good management can contribute to efficiency of business processes. Often in these cases the process will be called exception management, as exceptional cases are not the sole focus of the managerial policy, and exception management (as opposed to management by exception) denotes a more moderate application of the process.\nManagement by exception (MBE), when applied to business is a style of management that gives employees the responsibility to take decisions and to fulfill their work or projects by themselves. It consists of focus and analysis", "-24.263597665991284" ], [ "Resources & Labor Review The Human Resources & Labor Review (HRLR) publishes a human competitiveness index & analysis annually by Asia First Media, previously ChaseCareer Network (ChaseCareer.Net). This system is based on Human Resources & Labour Review Indexes (HRI and LRI), which measure the performance of top 300 universities' graduates.\nIn 2004, a couple of educational institutions voiced concerns at several events in regard to the accuracy and effectiveness of ranking bodies or lists. The HRLR ranking was pioneered in late 2005 within a working group in response to those concerns. The team was founded in January 2007, in London, and", "-24.246013037899957" ], [ "to show how to have better employment relations in the workforce. Also, to bring out the best work ethic of the employees and therefore making a move to a better working environment. Planning Administration and operations used to be the two role areas of HR. The strategic planning component came into play as a result of companies recognizing the need to consider HR needs in goals and strategies. HR directors commonly sit on company executive teams because of the HR planning function. Numbers and types of employees and the evolution of compensation systems are among elements in the planning role.", "-24.24428645412263" ], [ "Audit committee Role in oversight of financial reporting and accounting Audit committees typically review financial statements quarterly and annually in public companies. In addition, members will often discuss complex accounting estimates and judgments made by management and the implementation of new accounting principles or regulations. Audit committees interact regularly with senior financial management such as the CFO and Controller and are in a position to comment on the capabilities of these managers. Should significant problems with accounting practices or personnel be identified or alleged, a special investigation may be directed by the audit committee, using outside consulting", "-24.237921407317913" ], [ "Human Asset Management Human Asset Management (HAM) is the part of the company that manages human assets (or human capital). It is the management of employees as assets, combining many conceptual elements of an employee’s life cycle through an organization focusing on that people are a company’s most important assets. Many elements are included in the Human Asset Management area, including employer branding, recruitment, onboarding, retention, development, culture, career management, mobility, succession planning, talent management, performance management, employee administration and legal issues. Developments Human Asset Management is an evolution from the old terms like Human Resource Management (HRM) and Human", "-24.21871109057429" ], [ "Director of Personnel, and an Accounts Payable manager.\nCorp Accounting provides its employees with a fundamental understanding of how the company is run. It is the last line of defense that ensures the continual operation of the services. Corp POps The Corp's People Operations Department has a staff of four managers— the Director of POps oversees the department and serves on The Corp's Upper Management, the Director of POps Operations handles payroll, federal work study and employee systems, the Director of Employee Relations oversees a team of Directors of Personnel for each service, and the Director of Professional Development works with", "-24.202205922622852" ], [ "a report. An example of a Congressional investigation, is the Senate investigation on pre-war intelligence which produced the Report on Pre-War Intelligence on Iraq. Another example is the joint House and Senate Intelligence Committees inquiry after 9/11; the report produced presented the findings, conclusions, a discussion, and a series of recommendations. The effectiveness of Congressional investigations is often criticized because Congress through its budgetary powers and oversight responsibilities has influence over the community, and therefore the question becomes can Congress be objective about its own actions.\nThe Government Accountability Office (GAO) also known as the investigative arm of Congress, helps Congress", "-24.190881236307177" ], [ "does privacy matter? Data is useful to make systems more efficient; however, defining the end goal of this efficiency is essential in assessing how ethical data usage is.\nThe use of data monitoring by government to observe citizens needs explicit authorization by appropriate judicial process. Possibly it would even be more efficient to observe the relatively small number of criminals manually rather than track the relatively large population. Blanket observation of inhabitants by national governments and corporations is a slippery slope to an Orwellian style of governance. Privacy is a not about keeping secrets, it is about choice, human rights, freedom,", "-24.190833679601383" ], [ "how companies are managed.\nPeople analytics is also known as workforce analytics, HR analytics, talent analytics, people insights, talent insights, colleague insights, human capital analytics, and HRIS analytics. HR analytics is the application of analytics to help companies manage human resources. The aim is to discern which employees to hire, which to reward or promote, what responsibilities to assign, and similar human resource problems. HR analytics is becoming increasingly important to understand what kind of behavioral profiles would succeed and fail. For example, an analysis may find that individuals that fit a certain type of profile are those most likely to", "-24.181977851389888" ], [ "objective evidence showing conformance to required processes, to assess how successfully processes have been implemented, and to judge the effectiveness of achieving any defined target levels. Quality audits are also necessary to provide evidence concerning reduction and elimination of problem areas, and they are a hands-on management tool for achieving continual improvement in an organization.\nTo benefit the organization, quality auditing should not only report non-conformance and corrective actions but also highlight areas of good practice and provide evidence of conformance. In this way, other departments may share information and amend their working practices as a result, also enhancing continual improvement.", "-24.174852508734944" ], [ "human resources. The objective of human resource (HR) planning is to ensure the best fit between employees and jobs, while avoiding workforce shortages or spares. The three key elements of the HR planning process are forecasting labour demand, analysing present labour supply, and balancing projected labour demand and supply. Tools and technologies Human resources use various tools and technologies to achieve its goals, especially when it comes to strategic planning. These technologies include but are not limited to social media, policies and management information systems. Social media Social media is used as a tool in human resources and business in", "-24.167661853011396" ], [ "Administrative leave Administrative leave is a temporary leave from a job assignment, with pay and benefits intact. Generally, the term is reserved for employees of non-business institutions such as schools, police, and hospitals.\nThe definition of administrative leave may vary by institution.\nIndividuals may also be eligible for administrative leave for various reasons including: bereavement, jury/court appearances, military leave, internal reviews, and investigations.\nIn academic settings, administrative leaves are provided for the same purpose as research/study leaves, i.e., to allow individuals to improve themselves academically and to engage in research to foster their effectiveness as teachers and scholars.\nAn employee may be placed on", "-24.1632334330327" ], [ "etc.).\nGRC is a discipline that aims to synchronize information and activity across governance, and compliance in order to operate more efficiently, enable effective information sharing, more effectively report activities and avoid wasteful overlaps. Although interpreted differently in various organizations, GRC typically encompasses activities such as corporate governance, enterprise risk management (ERM) and corporate compliance with applicable laws and regulations.\nOrganizations reach a size where coordinated control over GRC activities is required to operate effectively. Each of these three disciplines creates information of value to the other two, and all three impact the same technologies, people, processes and information.\nSubstantial duplication of tasks", "-24.133536430409094" ], [ "Evidence-based management Overview Evidence-based management entails managerial decisions and organizational practices informed by the best available evidence. As with other evidence-based practice, this is based on the three principles of: 1) published peer-reviewed (often in management or social science journals) research evidence that bears on whether and why a particular management practice works; 2) judgement and experience from contextual management practice, to understand the organization and interpersonal dynamics in a situation and determine the risks and benefits of available actions; and 3) the preferences and values of those affected.\nWhile, like its counterparts in medicine, and education EBMgt considers the circumstances", "-24.13243628991313" ] ]
42j13d
Why do football players have water boys squirt water into their mouths? Why don't they drink from a water bottle on their own?
[ "Athletic trainer here - from my experience working with football players, they want the water squirted in order to keep the gloves dry. Getting the forces wet decreases the stickiness/grip.", "The waterboy knows that as soon as he hands water bottles to players the bottles will be dropped, left sitting somewhere, handed off, etc as soon as the player is called back into play. Only way the waterboy keeps track of his bottles and ensures they are full and ready during for timeouts is by not releasing them out of his grip.", "When there is a stoppage in play, it's only for a limited time. Having a waterboy run around to each player and give them some water is much more efficient than having each player run to the bench, find their bottle, take a drink, and put it back. Time is of the essence." ]
[ [ "splashes water into the face of an opponent, the defensive player is excluded from the game for twenty seconds, known as a 'kick out' or an ejection. The attacking team typically positions 4 players on the 2 metre line, and 2 players on 5 metre line (4–2), passing the ball around until an open player attempts a shot. Other formations include a 3–3 (two lines of three attackers each) or arc (attackers make an arc in front of the goal and one offensive player sits in the 'hole' or 'pit' in front of the goal). The five defending players try", "-27.314340306591475" ], [ "Where's My Water? Gameplay Swampy, an alligator living in a city sewer system, hates being dirty, but whenever he tries to take a bath, Cranky, another alligator living in the sewers, disrupts the water flow to Swampy's home. Located somewhere on the level is a supply of water, either a finite amount pooled at various locations or an infinite amount flowing from a pipe. Players use the touch screen on their device to dig through the dirt and redirect the water toward an inlet leading to Swampy's bathtub. Occasionally, the water must be routed through other pipes or must", "-25.175784952996764" ], [ "Spud (game) Spud is a game for children and adults, where players try to eliminate each other by catching and throwing an inflated and generally soft ball. It is related to \"call ball\" and \"ball tag\". \nAs few as three may play, with no upper limit. A large, open area is required. The game begins with each player being assigned a number, in secret, with the highest number corresponding to the number of players. For example, if 5 people are playing, each player will be assigned one of the numbers 1 through 5. A player is chosen as 'It.' ", "-24.519043727807002" ], [ "individual \"drops\" that interact with each other.\nThe place players were routing water towards became a bathtub, at which point the designers had to devise a reason for having a bathtub underground. That reason came from the urban legend of alligators living in city sewers, so the game's lead character became a \"hygiene-conscious alligator\". Unlike many mobile games released by Disney, where characters from the company's films are used, Where's My Water? represents the first time that Disney has produced an original character for a mobile game. In designing that character, Disney Mobile wanted one \"that felt like it belonged when", "-24.22403504239628" ], [ "an action far outside the normal level of acceptable behavior and was commonly given when a player has \"made a travesty of the game\". Water polo An ejection is called for a hold, sink, or pullback by a defensive player, on an opponent without active control of the ball. Their team must play with one fewer defender until 20 seconds have elapsed or there is a change of possession, after which the ejected player or a substitute can reenter the game. These 6 vs 5 situations are often called \"man up\", \"man down\", or a \"power play\". Should any player", "-23.345503994845785" ], [ "away. Squirt and Splash has players squirting each other and have the person with the highest score to survival wins. In Basketball, players have to make the most baskets in the game and perform tricks to earn more points.\nFood Fight is a mode where players attempt to deplete their rival's health bars by throwing various food items.\nThe Pipe Challenge is the 2nd party mode where players put pipes together to create a pipeline to blast rockets, Rugrats dinosaurs, and more. The Racing mode is the 5th party event where players race each other and see who has the most coins", "-22.791323224431835" ], [ "games are often criticized as faking their distress, because the humor lies only in their reaction to the punishment and therefore the punishment need not exist. An oft-discussed example of this is the hot water baths—the participants claim that the water is extremely hot, but it does not need to be hot for the participants to provide a funny reaction. As such, participants will often try to convince the viewers that the water is hot through various means (having an audience member stick his hand in the water, for example, or breaking character by saying that the water is hotter", "-22.634733444079757" ], [ "Swimmer (video game) Gameplay The player collects fruit to score points and power up to knock enemies out. Players can swim from side to side to avoid obstacles, or press a button to dive under them. The aim of the game is to swim until the character reaches the treasure island. Legacy In 2005, Swimmer was released for the Xbox as part of the Tecmo Classic Arcade collection.", "-22.488472928875126" ], [ "skip school and go to the NFL so he can share in his son's newfound fame, citing the success of Tiger Woods and his father. He is tackled to the ground by an enraged Helen to the cheers of the attendants. Bobby and Vicki leave to consummate their marriage. Production The idea for \"The Waterboy\" came from one of Sandler Saturday Night Live characters. Sander said \"You could compare him to 'Canteen Boy,' whereas he does love water and they both get picked on a lot, but the thing I like the most about this character is just that he", "-22.43989959056489" ], [ "in the context of Two-Player games may be considered unsporting. In some circumstances, particularly from the area of the corner flag against a CPU team, it is possible to use a high pass to chip the ball over the opposing goalkeeper for a goal. Volley/header The volley is a one-touch pass set up by a lofted pass or cross. It generally delivers a shot with the highest sting the game can provide which makes it an important tool against opponents of higher quality. If the ball is of sufficient height it will be struck with the head instead of the", "-22.300174105504993" ], [ "knocked out, they will have to find a way to liquify food in order to digest it. Defecating and urinating will leave physical evidence of activities on the island, which could be used to track another player. Things like combat will depend on the player's skill level, but also on things like stamina, health and so on. Wetness, smell, medicine, cooking, hacking, crafting, hunting and poison will also play a major role in the gameplay.\nThe game will offer both third and first-person perspectives, from which the player can alternate, but will prevent third-person peeking by hiding anything a character cannot", "-22.242113282205537" ], [ "Splashdown (video game) Gameplay Splashdown is quite similar to Nintendo's Wave Race series. Players take control of a personal water craft as they race against each other on various courses. Players must pass the correct side of buoys on the way, or the personal water craft may stall as a penalty.", "-22.19222219614312" ], [ "swimming pool, although it may also be played while swimming in shallow natural bodies of water (typically the areas near the shores of oceans, seas, and lakes). The players may be swimming, treading water, or walking on the bottom of the pool or body of water. The person designated \"it\" is required to close their eyes, and shouts \"Marco!\" at regular intervals; the other players must shout \"Polo!\" in response. \"It\" must use sound localization to find one of the other players and tag them. The tagged player then generally becomes \"it,\" and the process repeats. Muckle Muckle (sometimes called", "-21.95074954163283" ], [ "line: \"Everything went great, and, I mean, yeah, that's thanks to my O-line.\" He became a fan favorite as Miami supporters \"rhythmically chanted\" his last name (\"Berry, Berry, Berry ...\") when he entered games. Asked in November 2009 about whether he lacked the moves to shake defenders, Berry replied:\n\"If you're not a defensive lineman or a legit linebacker, I'm going to run through you. When I look up and see nothing but one guy (in front of him), I'm going through him. ... They say I can't shake (defenders). I got moves, but why use it when you don't need", "-21.86444256361574" ], [ "Each day, fewer and fewer players would be at practice, as many players quit the team from illness or disgust. The situation was compounded by Bryant's refusal to allow water breaks. This practice, which is now widely recognized as dangerous, was at the time commonly employed by coaches at all levels in an attempt to \"toughen up\" their players. The only relief provided the players were two towels soaked in cold water; one towel was to be shared by the offensive players, and one by the defense. One of the Junction Boys, future NFL coach Jack Pardee, would later say", "-21.847943658707663" ], [ "running the ball and the rainy weather conditions that had affected the San Francisco area for days prior to the game, analysts expected that it would center around both teams' rushing offenses. The Baltimore Sun sports writer Kent Baker predicted that \"the teams' non-reliance on the pass will serve both well. The game should be fairly low scoring and rapidly played, with the Midshipmen eking out a victory.\" Navy The Midshipmen triple option rushing offense, including future National Football League (NFL) fullback Kyle Eckel, ranked third among FBS teams in total rushing yards and averaged 291 rushing yards per", "-21.764593279454857" ], [ "teams requiring faster, more nimble athletes (comparatively) than their American counterparts. Paradoxically, this makes Canadian defense better at defending rushing plays. Rushing plays tend to be unlikely to produce a full ten yard gain, and if correctly anticipated by the defense, much gain at all. The fewer downs means that an unsuccessful rushing play leaves an offense to have a single play to make comparatively longer first down yardage, so rushing plays are less-favored unless the team on offense is actively managing the clock while maintaining the lead. \nPundits often like to claim that a Canadian team that rushes for", "-21.564923357684165" ], [ "Fish Out of Water (video game) Gameplay The player throws three swimmers from a selection of 6 fish (or really fish and mammals) one at a time. Each fish has a unique style (such as the whale Micro best used when thrown in a high arc). After three fish are thrown a panel of 6 crabs judge the player with each crab having its own likes and dislikes on a scale of 1 to 10. There is also a boost bar which allows the player to increase the velocity of the fish being thrown. There are also achievements to be", "-21.39896398835117" ], [ "water and \"drips\" a small amount on each person's head. They will then select someone in the circle to \"drop\" the entire container on top of them. This player will then try to tag the \"it\" before the \"it\" sits in the spot of the person who got \"dropped\" on. If \"it\" is tagged then they will remain \"it\" for another round. Vrot Eier A similar, common Afrikaner game is called \"vrot eier\", meaning rotten egg. Instead of saying anything or pointing at anybody a token of some kind (usually a handkerchief) is carried by the one who is \"it\"", "-21.37545909662731" ], [ "well as more firearms and bows, and more equipment as needed.\nWhen the player wades into water deeper than waist-level, they will automatically swim and the same controls for walking apply. The player may not equip a weapon or use any items while in the water. If the player drives their vehicle into the water, they will not be able to recover the vehicle without restarting the hunt.\nAny objects that the player uses - besides their weapons - will not actually be shown, even in third person. Calls, lures, food, water, medical bags, and scent cover will only play a fixed", "-21.353065613424405" ], [ "choice of the winning pitcher) and video games.\nThe club has several hazing rituals, such as requiring the most junior relief pitcher on the team to carry water and snacks to the bullpen in a brightly colored small child's backpack (Barbie in 2005, SpongeBob SquarePants in 2006, Hello Kitty in 2007, Disney Princess and Tinkerbell in 2009, Chewbacca and Darth Vader in 2010), and many of its players, both past and present, are notorious pranksters. For example, Bert Blyleven earned the nickname \"The Frying Dutchman\" for his ability to pull the \"hotfoot\" – which entails crawling under the bench in the dugout", "-21.310150706209242" ], [ "a medic). If the Scorcher goes into water, his weapon will be temporarily disabled (indicated by bubbles being shot out instead of fire). He wears a pair of dark glasses.\nBlaster: Considered the weakest unit in the game and needs to be protected. The Blaster is similar to the Chucker. Instead of using grenades, they throw a bunch of dynamite sticks which goes over cover and inflicts heavy damage. However, they have an extremely slow rate of fire and the second shortest attack range, so they are not as useful. Attack may randomly result in an \"instant death\" of an opposing", "-21.183832285227254" ], [ "other team, although sometimes against hosts (e.g. Jesse would verse a kid, to see who could balance a rotten egg on their head the longest). The games usually involved mess of some sort (e.g. one game, titled 'Vomit Comet' involved Dave and Emily giving questions to the kids on stage on the opposing teams with 'yes' or 'no' answers. If the kid hesitated, said 'ah' 'um', 'yes' or 'no', the kid on the other team would win and receive points, whereas the other team member would go into an elevator, and have a bucket of artificial vomit poured on his", "-21.14353718381608" ], [ "Mario at high speeds, allowing him to run across water and break into certain areas. Each of FLUDD's nozzles use water from its reserves, which can be refilled via water sources such as rivers or fountains. There are also some areas where FLUDD is taken away from Mario, forcing him to rely on his natural platforming abilities. At certain points in the game, Mario may come across an egg which hatches into a Yoshi after being brought a fruit he asks for. Yoshi can be ridden upon and can attack by spitting juice, which can clear certain obstacles that water", "-21.052741929613376" ], [ "games of beach ball volleyball or spraying them with substances like Silly String and fire extinguishers. Additionally, a few of The Aquabats' enemies are known only to be \"defeated\" by fans by being pelted with projectiles supplied by the band, usually large quantities of plastic balls. Acknowledging the younger members of their fanbase, The Aquabats often incorporate any children in the venue as part of their shows, inviting them to dance onstage with the band at the end of their sets. With parents' permission, children can also take part in onstage games and activities with the aid of the audience.", "-21.04449073059368" ], [ "were initially covered in brown sludge however later episodes they remain dry.\nIn New Zealand kids television, What Now introduced a new gungey game the big breakfast and Splat Cave. Fe Fi Fo Yum has a challenge which sees two children go barefoot into a bowl of gunge to collect objects for their teammates such as letters/numbers or other items. The final game also makes use of the gunge bowl, where the last part involves wading in the pool and up a ramp in order to release their captive teammates. In 2014, a few new games such as Use Ya Head,", "-20.998333831783384" ], [ "Liquid Kids Gameplay Liquid Kids is a single player platform game that features Hipopo, a platypus (referred to as a hippo) who must fight his way through a large number of enemy-packed levels in search of his missing girlfriend - rescuing other platypuses along the way. Hipopo is armed with water bombs which can be thrown at enemies to soak and damage them. Once soaked, the enemies can then be kicked and destroyed completely. Enemies left unkicked however will dry out and recover after a short period of time.\nThe level design presents moving platforms, collapsible floors, boats and water-wheels all", "-20.8924662284262" ], [ "speaking with everyone in the stadium. The trio don football players’ uniforms and bypass the guard in the guises of differing players and storm the field. They try asking questions to the players, who end up ignoring them, and Curly finds an ice cream vendor and takes off after him, somehow hijacking his wagon. The Stooges get pulled into the game and, after a few bouts of hardship, get an idea…if they would get the ball away from the players they would have no choice but to answer their questions. With that, Larry and Moe attach chains to the pants", "-20.883397808822338" ], [ "In an interview about the development of Super Mario Sunshine with Koizumi along with Kenta Usui and producer Takashi Tezuka, it was mentioned that the game's development began with the idea of gameplay involving a water pump. However, at first the developers thought that the world was too daringly out of character with Mario. Therefore, they tried using a man-type character, but thought this was too odd and that \"if there was a man next to Mario, there is a sense of incongruity.\" There were ten candidates for possible water nozzles, and FLUDD was chosen because of fitting in the", "-20.880777546670288" ], [ "reliever went through a rough stretch of blown saves, Rivers once jumped on top of the bullpen car to prevent Gossage from entering the game. \nAfter baseball, Rivers began training racehorses in his native Florida. His son, Mickey Jr., played minor league baseball in the Rangers organization, and his daughter Rhonda is a teacher in the Houston area.", "-20.713618144509383" ], [ "drains as they perform special moves, and gradually refills when they are not attacking. Different moves use up different amounts of energy, and certain characters can win any match by repeatedly using a particularly damaging move that does not require much energy. Several different power-ups are also available in the game, including a donut that increases speed, bowling pins that can be used as clubs, and bubble gum that slows players down.\nIn addition to health items, the letters A, N, U and T appear randomly in the ring. If either player collects enough to spell the word \"TAUNT\", they can", "-20.60193404695019" ], [ "water polo player at the Games. Despite the United States' past successes, the team failed to medal in 1992 and would mark the last Olympics Wilson would participate in. Outlet pass Wilson is credited with the introduction of the \"outlet pass\" to water polo. A former Little League pitcher, Wilson was able to move the ball from defense to offense quickly with a long pass to the offensive players from his position in goal. Richard Corso, the former US National Team Goalkeepers Coach who assisted Wilson, noted that, \"We really changed the game in 1980 and '84. ", "-20.516795225208625" ], [ "of the game and the ensuing article in The Sporting News pictured Atwater and noted the impact of his hits on the game.\nSuper Bowl XXXII was Atwater's last great game, and 1997 his last great season. In 1998, he was relegated to only playing on 1st and 2nd downs and replaced on 3rd downs. Nevertheless, because of the viewership of the Super Bowl from the previous year, he was voted as an AFC Pro Bowl starter for an eighth and final time. Following the Pro Bowl voting, the Denver Post noted that Atwater's selection to the Pro Bowl was", "-20.482452931581065" ], [ "\nA misconduct foul can be incurred for unacceptable language or disrespect, violence, persistent fouls, or taking part in the game after being excluded. Players in the water that acquire a misconduct foul (shown by circular hand motions by the referee) must sit out for the remainder of the game. Coaches and players on the bench may be removed by being awarded a red card. \nA brutality, the most serious foul, occurs when a player strikes an opponent or official with malicious intent. The offending player is removed for the remainder of the game, and their team plays with one fewer", "-20.317154365911847" ], [ "Wet (video game) Gameplay Wet is an action game that combines shooting and swordplay with acrobatics and gore. The main character, Rubi, carries twin pistols and a sword (she can also carry dual shotguns, submachine guns, or crossbows), and can fire while jumping, sliding on her knees, and running on walls. During these acrobatic actions, the game enters slow motion, and she will automatically aim at a second enemy, allowing the player to shoot at two enemies at once. She can also combine her attacks, such as wall running off a person or performing a sword uppercut while sliding. Racking", "-20.304838715761434" ], [ "foot in the aforementioned game, was placed on injured reserve.\nOn September 28, 2014, Bridgewater made his first NFL start against the Atlanta Falcons and won the game, in large part due to his 317 passing yards, and scored his first NFL touchdown on a 13-yard rush. After spraining his ankle during the Falcons matchup, Bridgewater was inactive for the next game against the Green Bay Packers on Thursday Night Football in Week 5. However, he was able to recover in time for the Week 6 game against the Detroit Lions. However, a weak offensive line against a strong Lions' defense", "-20.27973244828172" ], [ "Splashy Fish Origin Splashy Fish was released in the wake of the take down of Flappy Bird. Massimo Guareschi of redBit said he created the game using a commercial app development system in three days. Within fifteen hours of its launch, the game reached the top of the iTunes free download list. The fish controlled by the player is loosely based on the Cheep Cheep from the Super Mario series.", "-20.20535988204938" ], [ "Australian Rugby League (video game) Gameplay Due to the limitations of the console, ARL presents a simplified version of the game, yet allowing a wide variety of moves. Running is done with the C button, and while holding allows a player to accelerate, while it is mashed, it allows to break a tackle. Passing is done by pressing the B button with a direction; if no direction is entered, the player fakes a pass. the A button, if pressed inside the try area (or in jump distance), grounds the ball, if far and pressed in combination of the direction of", "-20.170212148528663" ], [ "consisted of nine players all lined up in buckets hanging over a body of water containing crocodiles for the trivia game, or sharks for the typing game. The buckets would all start in the middle of the screen and when the game began. In the trivia game, multiple choice questions would be asked by the server and would be answered by the players using the function keys (f1-f4). If a player got the question right, his or her bucket would be raised, otherwise, it would be lowered. If the player's bucket reached the water, that player would be eliminated and", "-20.168464747432154" ], [ "mouths, which involves applying the right amount of power so that the Beloms do not fly over or under the Faultons.\nIn the first game of Faulton Feeding, the player must successfully feed at least two Faultons; in the second he must feed four. If he succeeds, he advances to the next league; if he fails, he must begin the league again.", "-20.105380036635324" ], [ "freshmen on end-around plays. He has a peculiar way of running with a loose hitch in his hips that shakes off tacklers. He also handles the ball well and is the best man at catching forward passes among the freshmen. Wieman gives Rugby (the English game he played in California) and basketball the credit for his ability to catch the ball. On punts he is generally waiting for his man to catch the ball.\"\nIf it were not for the ban on freshmen play, the Times concluded there was no doubt that he would be playing on the", "-20.013347264000913" ], [ "efficiency, while also not interfering with active play. As well as dealing with the game balls, ball boys/girls may also provide the players with other assistance, such as the delivery of towels and drinks. Feeding Feeding is how the ball boys and girls give the balls to the players. At different tournaments, they use different techniques for feeding. At some tournaments, bases have both arms in the air, feeding the balls with one arm; at others, they have one arm in the air which they feed the balls and the other arm behind their back. When feeding the ball, they", "-19.991512618587876" ], [ "were victorious in a 39–20 rout of the Broncos.\nAs the final seconds of the game ticked away, Harry Carson, continuing the recent trend started by the Giants, gave head coach Bill Parcells a Gatorade shower, going as far as to take off his jersey and pads and sneak behind Parcells with a Rose Bowl security team shirt on. Thanks in large part to this particular Gatorade dunking, a tradition of sorts was formed that continues to this day. In addition, Brad Benson and Bart Oates drenched Simms with a cooler of ice water; \"I think it was very appropriate to", "-19.978688862251147" ], [ "half of the 12-ounce cup). Purpose of game and winning The purpose of Bucknell pong (referred to as \"pong\" to Bucknellians) is to hit the opponents' cup three times. After one hit, the team being hit has to drink half of their beverage. After the second hit the team must drink the rest. After the third hit the team loses. One can also win the game by hitting the ball into the opponents' cup once. If that happens, the game automatically ends and the losing team must chug their beverage. In this style of", "-19.959446358960122" ], [ "of compressed water from its hands, as opposed to many other Water-types that shoot water from their mouths. It was created by Yusuke Ohmura, who designed the Water-type starters of the previous two generations as well as the mascot creatures for X and Y, Xerneas and Yveltal. Greninja's design was finalized by Ken Sugimori, Game Freak's art director.\nAs Pokemon X and Y take place in Kalos, a fictional region inspired by France, Greninja's name combines the French word for frog (grenouille) and \"ninja\". It is used for the English, Spanish, and Italian localizations of X and Y. Ironically, a completely", "-19.914511257549748" ], [ "required to play a game. Some groups and players prefer to play where both teams sit with their backs against a wall with the mugs that are between each team also pushed back against the wall. This is often done as the distance between walls in bedrooms is often the right distance to play the game and it also prevents caps from flying everywhere preventing breaks in the game to collect caps. Others simply play wherever there is space, this is frequently in the hallways of fraternity houses.\nWith the two teams of two set up on opposing side, distribute the", "-19.8796628722921" ], [ "Underwater rugby Play It is played under water in a pool with a depth of 3.5m to 5m and goals (heavy metal buckets with a diameter of about 40 cm) at the bottom of the pool. Two teams (blue and white), each with six players (plus six substitutes), try to score a goal by sending the slightly negatively buoyant ball (filled with saltwater) into the opponents’ goal. It is a fast and exhausting game; therefore, the subs replace their players on the fly.\nThe ball may be passed in any direction but must not leave the water. It \"flies\" about 2m", "-19.861509775510058" ], [ "the game player can practice and improve court skills. Features The new button layout now allows the player to choose when to shoot and when to dunk/layup. The new system improves on previous frustrations with 3 foot jumpers and losing possessions because of unnecessary dunk attempts. The \"pro hop\" has finally been introduced into the game and with it the ability to split defenders, or throw an opposing defender off rhythm. Not to be outdone, big men were given the ability to \"power dribble,\" which creates space into the lane for an easier basket. Yet, with the newly improved defense", "-19.856376993935555" ], [ "this type of pool can be folded up for convenient storage. They are regarded in the swimming pool industry as \"splasher\" pools intended for cooling off and amusing toddlers and children, not for swimming, hence the alternate name of \"kiddie\" pools.\nToys are available for children and other people to play with in pool water. They are often blown up with air so they are soft but still reasonably rugged, and can float in water. Public pools Public pools are often part of a larger leisure centre or recreational complex. These centres often have more than one pool, such as an", "-19.819318619556725" ], [ "my football.\"\nThis prompted his manager at Tottenham, Harry Redknapp, to promise a ban on alcohol for Tottenham players:\n\"I'll implement a strong rule next season that drinking is a no-no here. Footballers should not drink. You shouldn't put diesel in a Ferrari. I know it's hard but they are earning big money, they are role models to kids. We wouldn't get these problems if the players weren't drinking. There's still too much of a drinking culture in English football but it's not as bad as it used to be. At Tottenham we do a lot with kids, a lot of them", "-19.803696399671026" ], [ "Spray (video game) Gameplay The player controls the Spirited Prince Ray, who can summon liquid-shooting spirits, hence the title SPRay. Besides water, Ray also has control over spirits that shoot oil, slime, anti-matter, and vomit. The player attacks enemies with Ray's sword and with the spirits, which are also used to solve environmental puzzles and give Ray special abilities. For example, slime lets the player stick to walls while vomit can reveal hidden platforms.\nTecmo also stated that the game also contains a number of multi-player mini-games. Reception The game received a 42% aggregate review rating on Metacritic, indicating \"generally unfavorable", "-19.788836863823235" ], [ "and remove the ailment by telling them he's \"sorry\". Both angry and depressed Mudokons will not follow Abe if he tells them to. Clouds of laughing gas will turn Mudokons \"wired\" (lime), causing them to hyperactively run in Abe's direction and in some cases make it harder to get past enemies and obstacles. They will only calm down when slapped but the slap will have no effect if done within the gas cloud. \"Sick\" Mudokons will not respond to any GameSpeak command whatsoever (aside from being slapped) and can only be cured with a special chant, obtained when Abe finds", "-19.765676361752412" ], [ "which hovered back and forth ominously over each teacher's head, as all of the kids were asked tossup questions that anyone could buzz in to answer. Getting a question right won $100, but a wrong answer gave the $100 to the other team. The first team to go over $1,000 won the game. The faucet would then stop hovering right above the losing team's teacher, and dump gallons of thick green slime all over them. \nIn the first show that was filmed (though not the first to air), the three boys representing Lawrence Junior High School (of Chatsworth, California) and", "-19.72041045851074" ], [ "He was foaming at the mouth. I still have nightmares from the hit he gave me . . . . My junior year, we were 5–0 and Florida was 0–5. There is no question that we were the much better team, and they beat us . . . . My senior year, we're playing Florida at home and we're 4–0. They had a decent team, but it wasn't like the year before . . . . Chan Gailey was their quarterback, and he had a big game. That game was a blowout. ", "-19.679680859291693" ], [ "will hurt Quiffy.\nMost of the levels have taps in them, which pour water in to the level. The modelling of the water was quite advanced for a home computer game of its time; the water will flow to the lowest point that it can and when multiple taps are pouring water in one place, it will fill up proportionally fast. A lot of levels feature taps in all areas so the entire level will eventually flood, leaving Quiffy with no available source of air. This aspect is how the game derives its title. Reception The game was reviewed in 1990", "-19.656140201666858" ], [ "he will spit green guck from his mouth. It also features neat jumping physics. Upon pressing the jump button, if you press it again and hold it, Frogger will blow up his cheeks and slowly glide to his destination, this is efficient for getting from a high ledge, lilly pad, cliff, etc. to a lower one. Frogger can also swim in this game.\nThe game is more of an adventure than a challenge, being particularly aimed at children. Unlike most computer games, the PC port doesn't have options to change the resolution or overall graphic quality, thus making the world appear", "-19.64224571781233" ], [ "when taking a shower, Brown said that was for \"humorous effect\" and denied there was anything improper about the game. Nevertheless, a command that could be entered into the in-game console in order to disable the blur effect was removed from the game in an expansion. No official reason was given for the change.\nIn Louisiana, Thompson helped draft a 2006 bill sponsored by state representative Roy Burrell to ban the sale of violent video games to buyers under 18 (HB1381). In an effort to avoid constitutional problems, it avoided trying to define \"violent\" and instead adopted a variation of the", "-19.638748965546256" ], [ "round in their eternal battle. It’s hilarious to see Homer indebted to the Terrible Two...\"\nIn Latin America, the nickname \"Ratboy\", which Homer uses to refer to Bart at one point of the episode, has taken great fame on Internet, in large part, thanks to various YouTube videos, the phrase translated as \"Niño Rata\". Internet users use this phrase to refer to the inexperienced and immature video game fans between 7 to 12 years old who do not know how to lose, because if they lose, they scream, mainly fans of video games like Minecraft, Call of Duty, FIFA, Grand Theft", "-19.605749721988104" ], [ "him into the water, and it went in with him. It was in the water maybe two seconds,\" Bolt said. \"It was a real good party from what I understand.\" The trophy was dented the previous day, when a player dropped it during a locker room celebration, Bolt said.\nIn 1999 and 2003, the cup made a trip to Joe Nieuwendyk's alma mater, Cornell University, both times visiting a local college bar. In 2003, Martin Brodeur ate popcorn out of the Cup. It had butter stains and salt damage for the next eight days before Jamie Langenbrunner cleaned it. In 2003,", "-19.547909384826198" ], [ "previous game as well.\nPeople move their mouths and the Punisher even pumps the slide on his shotgun (why he has a shotgun in the cutscenes and never in the game I will never know), which is impressive by Game Boy standards. Spider-Man's mouth area moves really well, although it does give his head a distorted look. That is bad. But otherwise looks like Spidey.\nOn the subject of the sound, Waddle stated that he believed that it was excellent for the game boy and impressive as well and that the music track definitely was above that of the NES version, comparing", "-19.54475603575702" ], [ "a reputation for taking advantage of the situation to do things to opponents that would otherwise draw penalties, since the officials' attention is necessarily focused on the ball and away from the players trying to get to it. Most commonly, players will \"pile on\" opponents already down trying to recover the ball. Some NFL players also report that pokes in the eyes, pinches or other abuse is common in post-fumble pileups, conduct which has sometimes led to confrontations, fights or even brawls.\nThe usual aftermath of a fumble, at every level of play, is a pile of players, many still squirming", "-19.543044484220445" ], [ "Super Play Action Football Gameplay The goal of the game is to obtain the ball and reach the other end of the field to score a touchdown, while avoiding opponent players who can pile onto the character possessing the ball.\nIf the opponent players do manage to pile onto the character holding the ball, the play stops and the team goes back to the previous line. A quirk in the gameplay allows the defensive player to get an easy sack if they dive with the nose tackle at the precise moment the ball is snapped.\nMario, from the Super Mario Bros. series", "-19.538220979622565" ], [ "Out of Water in six different levels and Mayor Turkey Lurkey in one level. The player also has to collect five baseball cards throughout each level of the game, the cards will help unlock special bonus mini-games in multiplayer mode.", "-19.537107082554712" ], [ "is able to dodge ten throws successively, they win the game. The game may also be played in a team verses team format, which is usually the case when boys get involved. A team consisting of boys usually compete against a team made up of girls. Each team sends one dodger at a time to battle against the two throwers representing the other team. Whichever team is able to get the most dodgers dodging ten throws successively wins the game. \nThe game requires a great degree of athletic ability, some throwers can throw the ball as fast as", "-19.523162562865764" ], [ "doozie maroonie\", when a Pirate slapped an extra-base hit; the \"o-o-l-l-ld dipsy doodle\" to remark a breaking pitch that caused a rival batter to strike out, and \"put 'em on and take 'em off\" to describe a double play. Then, when Pittsburgh was able to load the bases, he would use the phrase \"They're F.O.B.\" (full of Bucs). On other occasions, in case the rival team put on a hitting display, or the Pirates lost the game, he moaned deeply: \"Oh!, my achin' back.\"\nBut perhaps his most memorable expression came when a Pirate belted a home run. In lieu of", "-19.511022006860003" ], [ "Olly olly oxen free \"Olly olly oxen free\" is a catchphrase used in children's games such as hide and seek, capture the flag, and kick the can to indicate that players who are hiding can come out into the open without losing the game, that the position of the sides in a game has changed (as in which side is in the field or which side is at bat or \"up\" in baseball or kickball), or, alternatively, that the game is entirely over.\nThe Dictionary of American Regional English says that the phrase may be derived from all ye, all", "-19.50577434594743" ], [ "of complaints might have become intolerable to his teammates if Appling had not developed a novel remedy,\" wrote Robert McG. Thomas Jr. of The New York Times. \"He simply took his misery out on opposing pitchers, rapping out 2,749 hits, all but 587 of them singles.\"", "-19.497582550393417" ], [ "one or two. When the player is very low on guts, all he is able to do is pass to another player with more guts, or keep running with the ball. After every half-time, some of the player's guts are replenished.\nHowever, the guts for a player do not regenerate when not controlling the player, unlike the Captain Tsubasa games.\nIn a somewhat humorous gesture, commentary is provided by an orange parrot wearing a suit, who is heavily biased towards the player's team. He cries if the team loses, but celebrates when the team is victorious. Game modes The game consists of", "-19.471532786963508" ], [ "especially when wet from player's sweat. Still the majority of players (notably Phoenix Suns point guard Steve Nash) expressed dislike for the new ball, saying among other things that it became slippery when wet, bounced awkwardly and gave players cuts.\nThe largest complaint came from the fact that players had not been consulted before the new ball was put into play. The NBA Players Association filed an unfair labor practice lawsuit against the league because of that fact, subsequently dropping it after the league announced that it would revert to the leather balls starting on January 1, 2007. In a humorous", "-19.41075360160903" ], [ "having little boys playing in front of their parents and friends. Little boys should be playing their sports by themselves.\" In what Michelle Nolan in Ball Tales calls a \"remarkable book\", Tunis uses his only non-Dodgers baseball novel to emphasize a favorite theme when the young protagonist admits to his father \"it's better to lose, much as it hurts, than to play dirty\".\nSchoolboy Johnson closed out the decade in 1959. Roy Tucker and teammate Speedy Mason are cut from the Dodgers and end up together on a Triple-AAA team. When both men get called back, the older and wiser players", "-19.40219263662584" ], [ "100 yards or more per game is likely to win, but the reality is winning teams rush the ball in defense of their leads, and not as a tactic to produce drives that lead to points unless they are markedly superior to their opponents. The larger field generally permits greater YAC (yards after catch) on each individual catch, where the NFL produces passing plays where there are either very few YAC yards (immediate tackle) or huge YAC yards (missed tackle or broken coverage for huge gains.) For this reason, Canadian teams usually prefer passing over rushing to a greater", "-19.37399227474816" ], [ "a brutal fighting game in which players cut each other's arms off, launch cruise missiles at one another, and get impaled. But BloodStorm isn't funny, except in a snickering, Beavis and Butt-head sort of way — like when the screen flashes 'Cat Fight!' before two female combatants step into the ring.\"", "-19.328138217737433" ], [ "their team is stuck in. They decide they need a pitcher, a good pitcher who can win a few games for the team. Back at the nursing home, Mac dislocates his shoulder during a game of horseshoes, and suddenly he is able to throw any object at a curve of 360°. With dreams of his past fame and glory, and a newfound curve ball, Mac decides to try out for his old team. Mouth, a typical hot-head manager, gives the old man a tryout begrudgingly, but fails to pay attention as Mac strikes out their best hitters.", "-19.32313455612166" ], [ "ball.Popular Mechanics noting in 1910 that \"African dodger\" had become \"too old and commonplace\" and was being replaced with dunk tanks in which an African-American would fall into a tank of water when a target was hit with a ball. The illustration accompanying the article shows a game labeled \"Drop the Chocolate Drop\" and is captioned \"Amusing to All but the Victim\". Safety Aside from cost, safety is the primary reason that a dunk tank might not be permitted at a given event. If the operator(s) is/are not fully trained or not giving the proper instructions, people have been", "-19.312559108861024" ], [ "is limited to pushing and shoving.\nUnlike most other team sports, in which teams usually have an equivalent number of players on the field at any given time, in baseball the hitting team is at a numerical disadvantage, with a maximum of five players (batter, up to three runners, and on-deck batter) and two base coaches on the field at any time, compared to the fielding team's nine players. For this reason, leaving the dugout to join a fight is generally considered acceptable in that it results in numerical equivalence on the field, a fairer fight, and a generally neutral outcome,", "-19.298843442928046" ], [ "slingshot and Chowder can attack enemies with water balloons. Boxes containing ammo for the secondary attacks can also be used for refill. Additionally, food found around the house can restore health and tokens allow the player to play the game \"Thou Art Dead\". Plot At the beginning of the game, D.J., Chowder and Jenny are pulled into the house in the police car. After that, they give a jump to avoid being eaten by the house while the police car is thrown down into the stomach.\nHowever, Chowder and Jenny are pulled away from D.J. shortly after, by two giant pipes.", "-19.298158172052354" ], [ "Slap Shot (video game) Gameplay Slap Shot's game play is very similar to hockey games that came out in the 1980s; mainly NES's Ice Hockey and Konami's Blades of Steel. This game allows the option of choosing to play an exhibition match or in a tournament. Teams Slap Shot has 24 different teams split into three pools. Loosely based on IIHF World Championships pools by the time the game was released, the three groups have different difficulty levels, Pool A being the hardest, Pool B being Normal, and Pool C being easiest. It's not possibly to play teams from different", "-19.252708727202844" ], [ "player begins drinking when the word thunder is sung and switches to the next player the next time it is sung.\nSport related drinking games involve the participants each selecting a scenario of the game resulting in their drink being downed. Examples of this include participants each picking a footballer in a game while other versions require multiple players to be selected. Should a player score or be sent off, a drink must be taken. Another version requires a drink for every touch a player takes of the ball. Hybrid games Some drinking games can fall into multiple categories such as", "-19.219732219935395" ], [ "season, the Giants dumped Gatorade on Parcells on October 20; it was another home win over the Redskins, but after consecutive losses to Dallas and Cincinnati. This became a tradition in football, analogous to the champagne showers teams make in their locker rooms after winning a championship.\nBurt was known to wear an extremely tight jersey causing him to stick out in a crowd. To protect against opposing players grabbing onto his jersey he opted to wear one that was several sizes smaller. He would need assistance pulling it in and off for each game, sometimes even using scissors to", "-19.214267865696456" ], [ "sacks in the 20–3 loss at the San Francisco 49ers on Monday Night Football in Week 1. He threw only 18 times the next game, but completed 14 of those passes for 153 yards and threw his first touchdown pass of the year to tight end Kyle Rudolph in a 26–16 win over the Detroit Lions in Minnesota's home opener. Bridgewater had some struggles in week three against the San Diego Chargers, going 13 of 24 for 121 yards and one interception but won the game 31–14 with a strong performance by the defense and running back Adrian Peterson. He", "-19.186805411125533" ], [ "it was saved.\nLacking violence, the game uses graphical surrealism and potty humor to keep its young audience interested. The player must search each level for bathrooms in the hopes of finding a clean toilet to use to clean himself up after being hit in the face with dirty things such as kitty litter. In the final level the player sneaks into a nightclub and then into a house with no bathroom, and meets the game's only boss, whose weapon of choice is his own dirty diapers and who emits a brief fart-like sound when hit. In order that the game", "-19.180520444526337" ], [ "both games, even hitting the post against Iceland with a great volley, he was never selected by Jack Charlton again. The reason being that the Manager was asked by the Czechs what he was going to do about Kennedy elbowing one of their players in the mouth when he visited their dressing room after the game \"with his teeth all knocked\". He never picked him again partly for this reason but also because in Tony Galvin and Kevin Sheedy he had two players who could do a better job.", "-19.177545442151313" ], [ "Donut County Gameplay In Donut County, the players control a hole across several different levels. As players move the hole to swallow objects, the hole increases in size. There are some puzzle aspects to this; to swallow objects floating on top of water, the player may need to maneuver the hole to drain part of the water, and then have that water consumed by a bird, repeating this until the water is drained. Later in the game, the player gains access to a catapult that fits in the top of the hole. This can be used to fling certain items", "-19.175166355329566" ], [ "keys to rescue captured lobsters, or sponges to bung up the holes in leaking oil tankers. James must also fire bubbles at his enemies to trap them, before popping them to finish them off. Reception James Pond received mixed but mostly positive reviews. VideoGames & Computer Entertainment gave the game seven out of ten, calling it \"an entertaining and challenging undersea caper that should please just about anyone\". Electronic Gaming Monthly gave it a four, four, three, and six, out of ten, calling it \"not exciting or fun\", but \"a nice kids [sic] game\". Sequels James Pond was followed by", "-19.148787237354554" ], [ "Pushball Pushball is a game played by two sides on a field usually 140 yards (130 m) long and 50 yards (46 m) wide, with a ball 6 feet (1.8 m) in diameter and 50 pounds (23 kg) in weight. Occasionally, much heavier balls were used. The sides usually number eleven each, there being five forwards, two left-wings, two right-wings and two goal-keepers. The goals consist of two upright posts 18 feet (5.5 m) high and 20 feet (6.1 m) apart with a crossbar 7 feet (2.1 m) from the ground. The game lasts for two periods with an intermission. Pushing the ball under the bar counts", "-19.132838986828574" ], [ "goes to switch the drinks with regular water. Her plan succeeds, and Zeus are forced to play through the remainder of the game as a normal team, allowing Raimon to seize victory and win the Football Frontier. Gameplay By talking to a Celia inside the team's clubroom, players can scout out other members of the school they want to add to their team, either by name/criteria, or by a 'connection map', which grows bigger the more players obtained from it. They can then locate them on the overworld and challenge them to a battle, which, if won, adds them to", "-19.116949702438433" ], [ "foul line, which is a difficult dunk made famous in slam dunk competitions by Julius Erving (Dr. J.) and later revived by Michael Jordan. Yet, despite his versatility and promise, Wheatley considered turning down athletic scholarships in hopes of obtaining an academic scholarship. College Wheatley chose to remain in metropolitan Detroit and attend the University of Michigan on an athletic scholarship. He played running back for the football team for four years and ran on the track team for three years. As both a football player and track athlete he was highly decorated; he earned first-team All-Big", "-19.106075545423664" ], [ "major Scooby-Doo! villains, such as Redbeard or the Black Knight. Various secret passages and trap doors, which act as shortcuts, are scattered throughout the game. Outside levels also have various obstacles, such as moving platforms and mud-slides.\nScooby must also collect Scooby Snacks scattered throughout the game in order to open \"Snack Gates\" that open many of the game's doors; as the game progresses, the Snack Gates demand more Scooby Snacks. Although it is optional to collect all of the snacks, bonus content is unlocked if the player does so. The voice acting is complemented by sound effects taken straight from", "-19.050349119032035" ], [ "and they play Scrabble. The infected have still been floating downstream, so they investigate the bridge again. This time, they block the gap with a Jeep. During a scuffle with the infected, John refuses to use his pistols, but instead stabs them. He explains his refusal to use firearms is because of an incident from when he was a police officer. The infected eventually knock the Jeep into the river and float towards John's cabin. John and Naomi fight off the infected, where John uses his weapons to save Naomi. Later, John tells Naomi he loves her and they kiss.", "-19.02591657542507" ], [ "ring will not fit. The \"Balloon and Dart\" game can be rigged by underinflating the balloons or by using dull point darts. Some games may be rigged to play honestly or dishonestly and can be switched by the game operator. The \"Milk Bottle\" game can be rigged this way. On a rigged game, one of the milk bottles is heavier than the others. Depending on how the bottles are stacked will determine if the player will win.\nSome games are simply impossible to win. One such game is the \"Push 'em Up\" (or \"Stand the Bottle\") game, which requires the player", "-19.018510030116886" ], [ "coaches. He enjoyed the less paternalistic treatment that the coaches accorded to their swimmers, saying that \"In Australia, after a race they want to lock you in your room. In America, you can share a beer after the meet with the coach.\" The shortcourse pools used in the United States played into the hands of Brooks, as his strong legs gave him an advantage in pushing away from the turns, which came twice as often in comparison to longcourse (50 m) pools. He had initially planned to stay in the United States for only a year, but decided to extend his", "-19.01462105824612" ], [ "made a funny remark on loud audio to referee Shayne Hayne saying to him “I’ll buy you a beer” to allow a disallowed Matt Scott try when origin streaker Wati Holmwood interrupted play by running an almost 100 metres naked. In August, following Broncos team-mate Corey Norman's axing from the Broncos line-up (of the final games of the 2013 season) Hodges and Josh Hoffman took turns playing Fullback and in the Centres, rotating/interchanging between these 2 positions. However, Hodges season ended prematurely after a snapped left Achilles which he suffered in the Round 22 home clash against the St George", "-19.004829859128222" ], [ "single hit unless he has stones. The stones can shoot out of his club, killing enemies. As many as three stones can come out of the club. There are also many pitfalls, traps and deadly lava/water since Big Nose can't swim.\nIt was followed by the sequel Big Nose Freaks Out in 1992.", "-18.950444690912263" ], [ "program around. Kiffin made an offseason splash by breaking the social norms among SEC head football coaches and violating a handful of NCAA rules. In a season-opening win over Western Kentucky, Kiffin appeared to have made a difference for Tennessee, as the Volunteers had their largest margin of victory in nine years.\nThat victory was followed by consecutive losses, however, against UCLA and No. 1-ranked Florida. Tennessee ended its losing streak with a win against Ohio, then began alternating wins and losses. The victory against Ohio was followed by a loss to Auburn. A win against Georgia preceded a loss to", "-18.943993146764114" ], [ "process\".\nThe earliest phase of development centered around the concept of the game, which was players using their fingers to guide water to a goal. According to FitzRandolph, \"We had a whole bunch of ideas, and at some point along the line, it kept coming back that water, water was very fresh and people hadn't done a lot of physics around water.\" Designers invested time in making sure the water flowed naturally and as a player might expect it would in real life, thus making the gameplay easier to learn for newcomers. In actuality, the water is rendered as lots of", "-18.93162025278434" ], [ "Greg Finley, the game's hustling expert and introduce the player to hustling pool. Curly greets the player in a full motion video, but despite the game mode that is selected, Curly will only play 9-ball pool. Starting as a rookie in the garages and work the player rises through the bars and pool halls to eventually take on Curly himself. Along the way earning cash to spend on new cues and equipment which you can use to impress fellow hustlers and attract bigger cash prize pots. This mode shares similarities to the Hustle Tour mode in Virtual Pool:", "-18.870557127520442" ], [ "all of Yoshi's main platform games, starting with Super Mario World 2: Yoshi's Island in 1995, in which they appear as common enemies, as well as having a boss in the form of 'Bigger Boo'. In the Yoshi games, Boos mainly act in the same way as they do in the Mario games. Other appearances Outside of the games, Boos also appear in the Super Mario-kun comics. They also make an appearance in The Legend of Zelda: Link’s Awakening, along with several other Mario characters. Reception With Boo being one of the more popular Mario enemies, their image has", "-18.867430412909016" ], [ "The highlight of his freshman year came in the Ohio State–Michigan game where he broke a 52-yard run for a touchdown that put the Buckeyes up for the rest of the game. Sophomore season With Antonio Pittman going into the NFL Draft, Wells became the starting running back and started every game in his sophomore year for Ohio State. Wells rushed for 222 yards in the annual rivalry game against Michigan, the second most rushing yards by an Ohio State running back against Michigan. Junior season Wells rushed 13 carries for 111 yards and a touchdown in his first game", "-18.8668486145325" ], [ "water to Swampy's tub. Collecting a certain number of rubber ducks will also unlock new groups of levels. Development Where's My Water? was developed by Creature Feep, a team of designers within the Disney Mobile division of Disney Interactive Studios. Creature Feep is headed up by game design director Tim FitzRandolph, whose earlier works included the popular game JellyCar that Disney would later acquire and distribute. In an October 2011 interview, FitzRandolph explained that the goal for the development of Where's My Water? was \"to contribute a new character to the company, while making a really fun game in the", "-18.838882897165604" ], [ "history for games started. He also started in 14 post-season games.\nOne of Atwater's career highlights happened on September 17, 1990, during a Monday Night Football telecast from Mile High Stadium in Denver, Colorado. As Kansas City Chiefs massive 260 lbs. running back Christian Okoye, came through a hole in the line of scrimmage, he was met by Atwater. The resulting collision stopped Okoye in his tracks, with Atwater standing over him, taunting the proclaimed \"Nigerian Nightmare\", while he lay on the ground stunned. His coach Mike Shanahan stated \"That's the hit people will remember him for.\"\nIn Super Bowl XXXII, he", "-18.82630233152304" ] ]
3rytv8
How can people doubt huge moments in history, like the holocaust or men landing on the moon?
[ "Have you considered why you believe that the Holocaust happened? Think about it. You believe that it happened because people you trust told you it did. You believe that there is a huge amount of evidence because those same people that you trust told you that there is. Have you examined the evidence yourself? Have you examined huge numbers of written accounts, and analyzed their accuracy? Have you visited the camps, spent years studying forensics, and collected the evidence you need to make a conclusion? Have you even gained enough knowledge to critically examine the work of the people who *do* claim to have done these things? Have you actually looked through the body of \"videos and photos\" and considered whether they constitute real evidence for the claims involved? Have you looked at Nazi records discussing mass extermination? I suspect that 99% of the people on this subreddit have not done all this. I certainly haven't. Now, I tend to trust the historians who have actually studied World War II. They put in the time, and they say it happened, so I accept that it happened. But I can't pretend that I did the work to gain that knowledge myself - someone else did that, and my acceptance of the Holocaust as a fact depends on my trust of those people. So if you don't trust the establishment, whether that be the government, or historians, or the mainstream media, then it's very easy to doubt the work that they have done, since almost nobody has actually examined the evidence themselves. This holds true for almost all historical events. If I don't trust the US government to tell the truth for shit, then why should I believe that the first moon landing was anything other than a propaganda piece? All the evidence that says it happened is sourced from somebody I don't trust, and I'm sure as hell not going to go the moon myself to check. This is why people disbelieve historical events - they don't trust the people who are the sole providers of evidence, and they are not able to put in the years of work to actually accumulate the evidence themselves.", "Belief is basically accepting the proof. No matter what proof is given to some people, for whatever reason their minds will not accept the evidence. For example - Lets say *I don't believe in China.* I've never **seen** it. I've never traveled that far. Hell, as far as I know it could be some huge crazy thing and I'm in my own version of the Truman Show. You could tell me all about China, show me pictures, videos, whatever, but I think it's all part of your conspiracy to trick me. The proof is not proof because it's all part of the deception. So you fly me to China, show me the view from above and we land and walk around. Okay now I **see it**, I believe it. You can't do that with past events. You can't take the JFK conspiracy people back to when he was killed and *show* them. No evidence put before them will be believed because they think it's all propaganda.", "When it comes to any 'huge' moment in history we are depending on those who write the history to determine, first of all, what constitutes \"huge\" events, and secondly how they unfolded. There are many events in History that are lost to many, simply because they are underreported. If things can be lost, who is to say things can't be added?", "Here's what most people think about themselves. They are presented with an idea (say the holocaust happened). They consider they evidence. They listen to the arguments. And using their reason, they deduce a conclusion (true). Here's reality. They are presented with an idea. They consider whether or not they want to believe that idea. Does it fit with what I already believe? Would it put me in a tough position if it were true? How will my peers react if I believe this? They reach a conclusion. They then nod as they consider the evidence and arguments in their favor, and shake their heads at everything else. Sounds stupid, but everyone acts this way. Including me. Including you. The truth of the matter is, it's really hard to prove things. If you only believed what you could definitively prove, you wouldn't believe much at all. People who doubt these events aren't less capable of reason than those who do. Instead, they disagree because they have different initial biases. I recommend reading Bertrand Russel's \"The Problems of Philosophy\". In his first few chapters, he shows how hard it is to prove even that anything exists at all (that is, the world isn't an illusion). If you can easily doubt they existence of the entire world, well then it's easy to doubt any particular event now isn't it?", "Now, I believe that the Holocaust happened. I'm Jewish, and members of my family were greatly affected by it. But in Germany, Austria, and surrounding countries, it's *illegal* to deny the Holocaust. The same government that teaches that it happened can put you in jail for challenging it. Doesn't that make it sound like a big conspiracy?", "Denying something commonly known, as well as claiming something commonly denied, is a way of feeling special. Whether to compensate for some social or personal issue, or to conform to some stereotype is for a therapist to determine, but the feeling is the same: when you believe something against the common consensus you get this \"have-seen-the-matrix\" feeling that is addictive and ego-boosting. That is why a conspirscy theorist will tend to pick up many fringe beliefs and even mix them. 9/11 is an inside job + aliens = aliens did 9/11 as an inside job therefore US president is alien. Trying to reason with them except for the casual believer (if someone rather naive runs into a conspiracy group might pick up on the beliefs until shown how stupid they compare to reality) is a waste of time because you are attempting to deny them a huge pleasure.", "Plato's Allegory of the Cave is a possible reason. The basics of it are that the experiance of the individual is their reality, and even when exposed to the \"Truth\" of something they preffer the fictional perceptions because it relates back to their experiances. The process to accept a new reality are sometimes painful and so people avoid changing their perceptions if it causes them injury. Another way to describe this reaction is bias. People unconciously preffer to believe in a lie if it is more comfortable than the truth (IE I got fired because my boss didn't like me, not I was a poor employee). There are alternate reasons as well beyond subconcious denial. For example if I told you that Nasa had made contact with an intelligent alien life form but hid it from the world, would you believe me? Probobly (hopefully) not, but what if it appeared on CNN BBC Fox ABC NBC the cover of Time magazine and every major paper in America? You likely would believe it, even though you never saw the aliens yourself. There is some logic behind that choice, but either way you cant know for sure because it is an event in the past. Your rely upon a judgement of how credible the source of information is. People who deny major historic events often cite that the credibility of the source of the primary evidence is inadequte. This in itself might be a logical reason for dismissing a source of information. Take the moon landing as your cited example. Often moon denyers will state that Nasa and the US government have a motive to decieve people into believing there was a moon landing. Since all of the source material (lets ignore the laser reflection devices left on the moon for now) originates from a government controlled source and that source has a viable motive for not telling the truth if they did not land on the moon, they cannot be trusted. Since the source is suspect and it conflicts with their personal belief that we did not land on the moon, it is easier to deny it and create a false reality for yourself than it is to change that belief. To take your example of the Bible, a person who has for the majority of their life been told that the Bible was true by trusted sources will believe that. In order to change that belief they would have to accept some uncomfortable changes to their world view, for example death does not lead you to a heaven or hell, you just stop existing. That would be a pretty uncomfortable truth to accept for someone who believed their faithfulness and good deeds would be rewarded and their abstinance from committing sins appreciated after death. Confirmation Bias is a tendency to look for facts situations or explanations that justify an already held belief. Back to the moon landing, people stating that the flag in the video would not wave in the vaccum of space on the moon view the flag moving as proof that the entire thing was a hoax (this was disproven on mythbusters a while back, pretty good episode). In either case, confirmation bias leads them to believe that the waving flag is proof they are correct. TLDR * When accepting a new peice of information as a fact, if the fact is aversive to already held beliefs it is easy to dismiss as incorrect. * People have a bias towards certain types of sources and against others. * Confirmation bias reinforces the incorrect or misinterpreted facts in the eyes of an observer.", "You know, the US president during the holocaust knew people would say the holocaust never happened, so he ordered shut tons of photographs to be taken", "I expect to get some backlash on this, if anyone gets around to reading it, but here goes. I would wholly appreciate if anyone can convince me to change my mind on any of this. To start off, reality is a pervasive thing. Especially the reality of the past. Every time you remember a memory, that memory has the potential to be altered. There was a woman who had fully convinced herself she was present at the twin towers on 9/11, when she wasn't actually there at all. Regression hypnosis therapy was an extremely popular thing for a while, until we started to realize how fragile memory was. Lots of people wound up in jail, because therapists trying to 'unlock' repressed memories of abuse in their patients would actually *create* those memories. Patients who were not actually abused would come out of regression hypnosis therapy with vivid memories of ha inn been abused as children. Really, people's minds are open books, ready to believe whatever they're told. So, now that I've hopefully explained *how* people can just believe whatever, let me try and answer the *why*. I'll start with the religion one, since that's surprisingly the less controversial answer. Simply put, telling myths full of miracles provides the people telling them with power over the people believing them. If you say \"I want you to give me 10% of your money every week\", no one will do it. But, if you say \"God created man, man sinned, and was condemned to hell. But God was loving enough to send his son Jesus to earth to perform miracles to prove he was God's son, and then die for our sins on the cross, so that as long as people know about him they won't go to hell. Believe in him, and you won't go to hell. Also, btw, if you care about everyone, please give me 10% of your money every week so that I can keep telling people about Jesus so they won't go to hell.\" Well, now you're getting somewhere. So, people believe it because they're gullible, and they're told it because someone else benefited from telling them that lie. Now down to the meaty part of your question -- Why *do* people believe in things like moon landing and holocaust denialism? At this point, we start to enter territory where truth is like a treacherous swamp, full of sinkholes and crocodiles. There will be all kinds of differing opinions because this is an area where truth has been so skewed that people for the most part just don't know what to believe. Regardless, it's a real that I'm fascinated with, and so I'm pretty sure what I'm about to say is the truth. Repeat after me these two words. *Conspiracy Theory*. Don't they make you feel kind of dirty? Why is that? A conspiracy is just a plot by a group of people to accomplish a goal. If you think about it, it's actually absurd to suggest that powerful people *don't* conspire to get things done. In a world ruled by money, it doesn't matter how you got that money. If you look around you, I'm sure you'll see that the noblest people are often the poorest. That's because they don't think it's worth violating the law or lying to people to make money. Any 'legitimate' business that makes a sufficient amount of money is pushed flush up against the line of legality and is usually well past the line of morality. Beyond that line of legality is a whole world of illegal business. Money is money. 'Legitimate' business do deals with criminals, such as banks laundering money for drug cartels. Look at the Iran-Contra scandal, for example. That was *our own government* buying and selling *illegal drugs* in order to fund the contras and provide weapons to Iran. The whole reason they're doing this is to manipulate the working parts of our society to create advantages for American businesses to prosper. That's why countless democratic governments have been overthrown by CIA coups throughout the years. That's why JFK was assassinated, and why the twin towers fell. 'Okay -- hold up. You can't prove those last two edgarallenbro. Those are just *conspiracy theories*.' Well, that's true. When conspiracies are proven, we no longer call them conspiracies. We refer to them as 'scandals' or the like. The fact of the matter is that the CIA tried VERY hard to cover up the Iran-Contra scandal, and nearly succeeded. The journalist who first sought to expose it is dead, allegedly from suicide, although it is likely that he was killed, and it was made to look like suicide. Things like the JFK assassination and 9/11 have so far been covered up with much more ferocity, due to the implications of people knowing the truth. So what does any of this have to do with the moon landing or holocaust denial? Those things are one of the many ways in which institutions like the CIA have sought to cover up their clandestine actions by manipulating public opinion. By introducing clearly ludicrous theories like holocaust denial, moon landing denial, hollow earth theory, reptile people, etc. etc. etc., they have been able to delegitimize serious theories. A lot of the 'people' you see believing these theories *do not actually believe them*. Many of them don't even actually *exist!* There are identities that are *proponents* of these theories that have been revealed to be government operatives. They are straw men, meant to convince *just enough* gullible people to go along with them so that *you*, the average person, are convinced that 'people will believe anything'. This is so that you can turn around and say \"Well, I know there are people who believe JFK wasn't assassinated at the hands of a lone gunmen, but there are also people who believe that the holocaust was a a hoax. They're all just crazy conspiracy theories.\" and the people who are willing to do unbelievable things to seize and maintain power can continue to get away with it.", "Damn. I had this huge thing written up and somehow something crashed and ah... anyway There's a lot of reasons. History's written by the victors The government has proven they'll do shady things (and in times of war have more reason to) We've recently found out just in the last few decades that stuff they were commonly teaching when I was a kid was complete bullshit (like Columbus discovering America and Paul Revere \"the red coats are coming\") This makes us more skeptical about the history we already know And the moon landing is an easy target . Firstly it's mind blowing to think they went to the moon back in an age of such crappy technology. The same people with no cell phones and no personal computers went to the moon? Secondly; the fact that we haven't hardly gone back since the 70's If you look at the way every other technology has progressed you'd think we'd be taking tourists to the moon by now, instead it seems like we're exactly where we were in the 60's as far as going to the moon is concerned And that's hard to believe In general, the same government that came up with a plan to blow up an airliner near Cuba and blame it on them---which only didn't happen because the president said no--- the same government that doused an entire town with lsd .... It's not hard to believe they'd fake a moon landing to get one up on some commie bastards Edit: also while I haven't surly fact check this, I heard somewhere that some scientist have said there's a problem with radiation that we still haven't solved today that would have made it impossible to go to the moon in the 60s", "The truth is a north Korean is confronted routinely with fake evidence that their leader has divine powers and that there is starvation in America. A sufficiently repressive government can force all sorts of crzy ideas. Paranoia is a psychological condition that causes you to see conspiracies with little direct evidence. Once you believe that you live in a north Korean state, it's easy to believe anything that supports that state is a lie. You will find that all moon landing deniers and holocaust deniers have strongly negative feelings about the US government.", "Human memory is a very complex thing. Recall of a memory refers to the subsequent re-accessing of events or information from the past, which have been previously encoded and stored in the brain. In common parlance, it is known as remembering. During recall, the brain \"replays\" a pattern of neural activity that was originally generated in response to a particular event, echoing the brain's perception of the real event. In fact, there is no real solid distinction between the act of remembering and the act of thinking. These replays are not quite identical to the original, though - otherwise we would not know the difference between the genuine experience and the memory - but are mixed with an awareness of the current situation. Memories are not frozen in time, and new information and suggestions may become incorporated into old memories over time. Thus, remembering can be thought of as an act of creative reimagination. Because of the way memories are encoded and stored, memory recall is effectively an on-the-fly reconstruction of elements scattered throughout various areas of our brains. Memories are not stored in our brains like books on library shelves, or even as a collection of self-contained recordings or pictures or video clips, but may be better thought of as a kind of collage or a jigsaw puzzle, involving different elements stored in disparate parts of the brain linked together by associations and neural networks. Memory retrieval therefore requires re-visiting the nerve pathways the brain formed when encoding the memory, and the strength of those pathways determines how quickly the memory can be recalled. Recall effectively returns a memory from long-term storage to short-term or working memory, where it can be accessed, in a kind of mirror image of the encoding process. It is then re-stored back in long-term memory, thus re-consolidating and strengthening it. When people get a false notion in their head, it colors all the recollections that come after it. Over time, the person remembers the past quite differently than it really was. Additional evidence doesn't fix this, because it doesn't code consistently with the person's memories. So a bible story that doesn't change (because the pages in the book don't change) much more effectively reinforces itself than exposure to new facts.", "A few years ago I looked into 'Holocaust Deniers' and really I was just interested in the whole 'Holocaust' story and its something like the way they portray 'Climate Deniers' (note using the same 'Deniers' word for association). In fact, very very few people (none I found) deny there was most definitely a horrific oppression, that many Jews were put in camps and that many many people died. Waiiiit! But they are 'Deniers!' like you know 'climate deniers' deny ANY man-made or ANY warming or they deny Co2 Exists! No, actually most of the 'holocaust denial' documentaries ranged from very moderate questioning of 'methods' and doubting numbers like '6 million'. But I didn't come across too many who just declare 'nothing ever happened!'. Whats sorta sad is that for people who just genuinely want to learn and understand there was just such a hyper-charged defense mechanism where in one case a dutiful scientists who simply did NOT find gas in samples was pretty much destroyed and humiliated as a 'Holocaust Denier'. Another young Jewish man got to have his life destroyed when on a pilgrimate to a camp he simply pointed out technical problems with the 'holocaust narrative' and what was actually preserved. He seems to have gone into hiding as a 'vile antisemite' despite being a Jew who wasn't actually saying 'the holocaust totally never happened'. So.. quite a world of politics, history and emotions in that. I have no idea about 'moon landing deniers' though Ive heard of that on the internet. Cant say. I dont think they are the 'same people' tmk", "When you make questioning an historic event punishable by imprisonment, people get suspicious.", "Some people can not bring themselves to imagine bad things happen, particularly if it was supposedly done by people who have the same basic values as their own. (They say to themselves \"I believe in white power and I'm a good person so Hitler can't possibly have been that evil.\") Some people need their government to be incompetent, so it must have faked that thing they cannot imagine themselves being able to do. (\"I cant get to the moon, so clearly my incompetent government couldn't have done that either.\") Some people need there to be an all-powerful and downright mean force in the universe that is responsible for their own failures and shortcommings. (e.g. \"I'm a great guy with plenty o smarts, so the only reason that I must be failing is that *random* *villianous* *organization* has decided to work tirelessly against my efforts.\") Next to last, \"There must be an option that leaves me completely safe and in control.\" Though this is more of the \"homeopathy\" and \"vaccine denial\" mind set. It's an intimate denial rather than a global one, but it's in the same spectrum since it scales up to conspiracy theories about \"big pharma\" and genocide. Finally there is simple fear. If that could happen there and then, then it can happen here and now. Therefore, it must not have happened because that would be just awful. Every behavior \"pays its freight\" with the person exhibiting that behavior. Ask yourself \"What is this person paying themselves by denying the murder of seven million jews?\" You'll usually find the denier is really protecting a world view that some solution, final or otherwise, is \"possible\", for a problem they've manufactured amidst a community that they value. \"All my friends are Nazis so Nazis can't be as bad as all that, so clearly someone is just trying to make them look bad to keep them from their rightful personal and professional success.\" On a siding rail, some people are desperate to feel that they know what others do not. They need to be \"an initiate in secret truths\". This need _requries_ that what most people believe is indeed false. You can not be the keeper of the inner mysteries of the temple if everyone outside the temple has the same knowledge as you. This keeper of inner mysteries is then both champion and martyr of their special truth. \"I know the truth, and they cannot see, for I a wise and they are sheep.\" (It's an inferiority complex re-written as projection.) In short, most people are desperate to simplify their world without the hassle of examining their world-views. They need to be right and they need to be special. The easiest way to do that is to deny facts that don't fit their own ideals. Individual elements vary person-to-person, but the pattern in broad strokes is fairly uniform. \"Every man is the hero in his own story\" is not just an aphorism, it's a motivating imperative.", "Holocaust : the denial is not binary. It's more like : < 1 million people were killed, not the 6m that the conspirators would have you believe. I wouldn't know whether that's true. I'm just pointing out that the claim in more nuanced in the case of the Holocaust. (The men never landing on the moon claim, of course, is binary in nature : it never happened as per the conspiracy theorists). As a only-somewhat-related example of how perception can be skewed : I live in Hong Kong, and we have these cage homes here (literally cage-like small cabins, 6 per room) for the poorest of the poor to live in. Now, 90% of cage home dwellers are male. Yet, when you walk on the street, you would be likely to meet someone handing out a pink ribbon (and collecting some $$) to raise awareness for breast cancer than for the plight of men living in cages. The likelihood of these two happening is at a ratio of 1000:1 women:men. Most people reading this post, even from Hong Kong, might not know about the gender disparity in cage dwellers. That skewed ratio of perception-bombing is how \"reality\" gets defined for most of us, whether we like it or not. Most of \"history\" that is promulgated widely is advertisement, too, IMHO. In particular, the winner gets to skew historical \"reality\".", "Upon realizing how severely and how often we are lied to by political leaders and the media, it becomes pretty easy to doubt the official story on just about everything. It's like that kid in school who was always making up crazy stories, eventually you just assume he's lying no matter what he says. URL_0 ", "Pay close attention to these people. The root agenda for why they deny common belief, is to purposely believe the opposite of \"sheeps\" so that they can feel like they are enlightened. It is a defense mechanism for inferiority.", "A must see hilarious mockumentary on moonlanding conspiracy is Dark Side of the Moon by William Karel 2002. Some interviewees - Buzz and Lois Aldrin, Henry Kissinger, Donald Rumsfeld and many many more. I watched it without realising it was a joke until it was part way thru. Felt my known world collapsing around me, then became suspicious, then couldn't stop laughing. Dirty rats, had me goin' for a bit.", "Belief in conspiracy theories, alternative medicine, and other woo is fun and exciting. You're an insider, one of the smart ones, not one of the sheep. It makes you feel special. This isn't *the* reason, but it can be a factor.", "Prove that they happened. Your evidence (in their mind) will be what you've been told, unless you experienced it yourself. Their evidence is what they've been told.", "The answer you are looking for is: cognitive dissonance. It is when someone is presented with facts that contradict their pre-existing beliefs. More often than not, people will manipulate those facts or discredit that validity of those facts in order to reinforce what they *already* believe. This means that **no amount of evidence, regardless of how solid it is, will satisfy them!** For example: most holocaust deniers also happen to be Nazi sympathizers or have heavily entrenched anti-Semitic beliefs. Thus, they have a pre-existing belief in Jews as liars and swindlers and/or Nazis as having positive ideas. They cannot mentally accept the idea of those pre-existing beliefs being wrong. If they are presented with evidence of the holocaust, they will make every effort to discredit the evidence or manipulate it to fit their existing beliefs. The evidence produces dissonance in their minds and so they invent ways to manipulate it to create consonance in their minds. Check out the book, \"Mistakes Were Made, But Not By Me\" by Carol Tavris and Elliot Aronson. When you start to understand cognitive dissonance, you will learn a tremendous amount about why people do what they do. TL;DR--People, quite literally, cannot handle the truth, so they invent lies and change the truth.", "Did you know there was an Angora rabbit breeding program at Auschwitz? It was a surprise to me. Not saying the holocaust didn't happen of course, but they do make you want to look into it more yourself, it's not as cut and dry as it first seems, and there's lots of unusual and interesting facts you don't hear about otherwise. Just throwing these out there for those interested: > Some images some holocaust revisionists have made URL_1 Whether or not these are entirely factual, it's interesting to see how they think. > Holocaust survivor testimony URL_0 A rather bizarre holocaust survivor testimony > Holocaust survivor testimony URL_2 Quite a few bizarre stories from holocaust survivors, I was surprised that I'd never heard about this stuff before. > Talk by David Irving URL_3 This talk is really interesting. He seems like a pretty smart guy rather than the stereotypical conspiracy theorist. > Interview with Ursula Haverbeck URL_4 Again, she seems to know her stuff. These people don't seem crazy or stupid to me.", "1) People are scared of the truth and what it might mean. Take how the church reacted to Galileo supporting the idea that the planets revolved around the sun. They were scared about what this could mean for the bible and so they suppressed it for as long as not as they could. The facts that are scary may seem irrational to you, but it makes perfect sense to them. 2) Holding a minority view bonds people together, giving them an identity and a sense of belonging. I'll bet terrorist groups are a tight band of brothers. Just like cults and other niche groups. Your unique beliefs bond you together tight like a family. It's really no different from the other things we do to show belonging: dress in team colors, drive certain motorcycles, listen to certain styles of music...it's the price you pay to be part of the club.", "Because they read 1984 and see the masses as sheep. Governments lie. They've been caught doing it. They manipulate facts to gain political ends. It is not surprising that people suspect everything. Likewise, people have certain world views, and if certain facts challenge those world views, they would rather challenge the facts than change their thinking. It's like people who believe the world is 7000 years old. It's not. Period. They just chose to believe a make-believe story, and now have to reconcile it with facts by challenging those fact. I mean... dinosaurs for crying out loud. Dinosaurs!", "I've met holocaust survivors, not Jews but gypsies.If you heard a story from a first hand survivor and didn't feel anything, didn't get moved by it, or at least didn't believe it, put back your tin foil hat and crawl back into your mothers basement.", "There was [this post]( URL_0 ) asking how holocaust deniers justified their side of the argument. Good answers that explain their view: URL_1 URL_0 Also what [desu_vult]( URL_2 ) said is probably a bit part of it too.", "Discrepancies about basic information typically lead to large divisions about what did or did not occur. The best example is probably the whole \"debate\" around the speed at which a body can be cremated. I got bored some time ago and wanted to know how people could deny the holocaust and although I don't deny the genocide I've seen the information and it's pretty clear that facts and 70 year old propaganda have commingled for quite some time to create some fairly impactful mistruths. The 6 million number being picked out before they even found all of the camps, the claim that 4 million jews and others were killed at Auschwitz was only formally changed in the 90's but they never adjusted the 6 million number, the discrepancies with the number the red cross had for the total deaths resulting from the holocaust, and that's just basic math we haven't even gotten into how poorly designed this genocide machine was you can look that up for your selves but I have trouble believing 1.1 million people were killed in gas chambers, drug by hand across a floor put on a tiny man powered elevator lifted 2-4 at a time then loaded into ovens where they were fully cremated in under 10 minutes a body even with multiple corpses in the same oven, times a modern crematorium can't even spit at, and then incinerated at Auschwitz. I really have to say I'm not convinced a genocide didn't happen but what literally means \"whole burnt offering\" seems pretty misleading considering the whole story. I'm betting I'm banned from like 18 countries and 100+ subreddits now; look it up some time try to get a balanced perspective, look up jewish researchers refuting the claims of deniers and tell me those documents don't wrangle the english language down to the ground and make you want to stop reading them, the most serious one's I could find are tens of pages long and and even though they cared enough to write so much and find sources they don't even take the claim seriously. They developed an entire vernacular just to discus the topic, that centers around the pre-supposition of proof and emotional appeal; you need a primer in \"holocaust revisionism\" before you even understand half of what they say and then you realize they still don't refute any of the actual points they just try to move goalposts and ignore the basic math and proof of inflated numbers being persistent in early war propaganda, \"the 6 million\" shows up in propaganda long before the end of the war.", "Because history is written by the victors. Common held beliefs of history change all the time. We can for example, look at certain Roman accounts of battles. \"Well it says here they killed thirty thousand enemies, but we now know the enemy army was most likely only 20 thousand strong\" This is something that no one has any problem questioning because it happened X amount of time ago. People (rightly) doubt things because of this. Remember not to confuse those of us who believe an event like the holocaust is exaggerated with those who deny it happened outright. For example, nearly 57% of people who were surveyed across the globe believe the Holocaust to be exaggerated. This does not mean they deny it happened. There are discrepancies about previously held public \"knowledge\" about the holocaust. The term \"denier\" gets thrown at anyone who questions the numbers and methods used. Most people still believe the common notion of \"6 million Jews were gassed or executed!\" Which we know to be inaccurate. But anyone who tries to discuss these historical inaccuracies (mostly presented by the Soviets, mind you. A nation renown for lying and exaggerating for propaganda purposes) is instantly shouted down. There isn't a single Nazi document of plans, ideas or even methods pertaining to an undertaking of gassing or otherwise executing millions of Jews. Were Jews killed? absolutely. It was a terrible time and millions of people from all over the world were killed. It's no real surprise though, as the holocaust is still used as justification to this day for certain groups of people to treat other people like shit. This comment will more than likely be down voted and will likely not even receive a response other than personal attacks and insults. Challenging common held misconceptions makes people feel uncomfortable.", "A similar thing happens much more commonly with racism and sexism. There are people who believe that there is no such thing as white male privilege and will deny it, in spite of the mountain of evidence that says otherwise", "Most of these comments are completely missing the point. The human mind is capable of all kinds of delusional thinking in all aspects of life. That is how 93% of people believe they are above average drivers and that flying in a plane is more dangerous than getting on the highway tomorrow. Our brains distort and change the world around us based on what we want to believe. Want to ride a motocycle? Eventually you will come to believe that the staristics do not apply to you and that you won't be the one who is road meat. We rarely see reality, only our perception of it. This is how people who are obese can believe that their diet has no effect on what they are doing and continue to eat exactly the same way. People believe all kinds of crazy nonsense every single day of their lives big and small. If you are a person with little to no critical thinking ability then you will happily glance at the world, come up with an opinion based on that cursary examination and believe the echos in your own mind. The top post asks whether you have ever done anaylsis of WWII holocaust and how you came to believe it. You don't need trust people who \"told you about it\" when you have your own independent verification system called your senses, aka your eyes and ears as well as a basic understanding of the mechanisms by which your brain distorts the truth. Now unless you want to get into solipsism and brains and in vat which basically says we can't prove anything except we exist let's just agree for the sake of this particular post that there is a consensus reality out there that is independent of us or at the very least that there are other entities who are not us, aka external or objective reality, aka the other minds problem. Now to verify go ahead and do the following: Join a Pinterest group of old photos for five minutes do a search for WWII. Now look at them. Done. Now read a few books from survivors. Done. Or if you don't have the time to do even the most basic research then go into a book store for five minutes and simply scan the number of books on the subject. After that you now have only three logical choices. One, you can believe that every single photo is fabricated and that all those books by independent actors are part of a vast conspiracy to defraud you. Two you can assume that based on the amount of imagery and accounts out there that it is probably correct simply based on the sheer effort it would take to defraud the whole world for no particularly good reason or profit. Three you can fall back on solipsism and say there is no way to independently verify anything, that your senses are faulty and that the reality you see is an illusion. While the third may work in philosophy class, I am going to go with number two. Most people do but there are a number of people who can't consciously go through the process that I have outlined and all of this happens below the surface of their consciousness and they are prone to believing one, without having any understanding of why. This essentially makes them non player character in their own lives. As I said earlier people believe all kinds of delusions on a daily basis. Is it really any surprise when someone believes some big ones too? Just watch any of the political debates and you will see that grown people are capable of the most insane belief systems because they have no understanding of how or why they believe anything. In short people's brains are generally broken, as is evidenced by the sheer number of logical fallacies we are capable of using at any point of any day. It's no wonder people choose to disbelieve what is right in front of them.", "So I [19M from UK] have been to Poland, been to Birkenau and Auschwitz, I've spoken to holocaust survivors and the families of those lost during the holocaust. I've been through their museums, and studied the primary sources. I went a few years ago, when I was 16, part of a school trip. Perhaps this is an American thing? I've heard of Holocaust deniers, but have never met one, I've been to Germany too and I don't think many there deny it. This whole idea seems ludicrous to me. An interesting book is 'The Gulf War Did Not Take Place' by Jean Baudrillard, in which he argues that from the eyes of everyone who wasn't directly militarily involved, the Gulf War was not a real war. This is interesting, obviously Baudrillard knows it factually occurred, he discusses the idea of media control and the distance of Modern to war to civilians of Nato; to very briefly summarise. I like this concept. However to something like the Holocaust this cannot be applied. For me the moon landing is different, as it is entirely controlled, all the footage is controlled by the Government, and the staff of NASA too. I have no doubt we can place a man on the moon, and I personally believe we have, but I do see why you could be sceptical.", "In respect to the Holocaust, it has specific elements to it that are denied by \"deniers\" or \"revisionists.\" Mainly they include how many died, how they died and why they died. Proving the last, intent, is probably the hardest job for historians. When it comes to specific evidence the rationalization for dismissing them assumes many forms. * For eye-witness accounts, depending on when those accounts were given, they will be dismissed due to bad memory if it has been decades since the events in question, or some type of bias against those being accused if it's immediately after the event(s). * Interviews with perpetrators, like SS guards or the heads of concentration/death camps, that detail what happened are readily dismissed with the idea that they were coerced by interviewers. * With respect to photos and videos, they were doctored. These are \"simple\" arguments that get much more complex and complicated when you dissect and deconstruct them. More so, they support already established belief systems; conspiracy theories are a dime a dozen, if you believe in one there's that much more reason to believe others.", "A lot of conspiracy theories are fueled by people's distrust of government/authority figures in general which by itself makes perfect sense, I think. I mean a lot of the structure of the US government was centered around the idea that the government shouldn't always be trusted and usually that its not in the people's best interest to trust them. On top of that while a lot of conspiracy theories are pretty loopy the reaction to them is often pretty irrational as well. Whenever someone suggests that 9/11 is an inside job or the moon landing never happened suddenly others feel entitled to act like they themselves know anything about physics or architectural stability of sky scrapers when they've probably not even done the cursory amount of research the conspiracy theorist has. And a final note, conspiracies are real, they've happened. Whenever a group of people secret try to undermine or exploit another group, that's a conspiracy and there are tons of examples of it actually happening throughout history.", "I genuinely believe. Especially so in the world of the Internet. That unless someone has seen something for themselves, they can never really say 100% whether it happened or not. All media is manipulated, all opinions are subjective etc etc. I never disbelieved in the holocaust but shit me spending a day at auschwitz there Is no fucking way in hell that is made up. One of the most brutal things I've ever witnessed and that was just whats left as an aftermath. Someone would have had to go pretty fucking far to fake that. I think it's healthy to question things but if you disbelieve, go and prove it/disprove it to yourself first before repeating the Internet and telling everyone else!", "Not that I follow this line of thinking, but all of the examples you provided (videos, photos, witnesses) can be fabricated. They can also be propaganda where they only show a half truth due to political reasons. After all, historical perspective often boils down to an ideology that the masses choose to accept and propagate. For example, how often are the Japanese internment camps mentioned in the US when discussing WW2? The answer is \"not very often\" in the US. A nation denying that they do not do despicable acts, and their populace believing them/not caring, is par for the course. Just look at Guantanamo or the black sites in Chicago for examples.", "I know this is my most controversial reply yet, but... I think that people who believe in conspiracy theories are just a little bit overwhelmed by the fact that they are succumbed in a system where a lot is happening and feel overthrown by an authority that \"can do anything they want, so they could also make up any story they want\". A lot of people are just a *little* bit dumb I think, and that's why they pull their mouths open and try to do something about *that stupid government*, because they don't trust what they don't understand.", "My Dad was in a photographic unit with the Royal Canadian Air Force. He took lots of pictures during his 2 1/2 years in Europe. They finally ended up at Bergen-Belsen and he took pics of the mass graves full of emaciated, dead Jewish people. Literally thousands of them. He showed me those pics when I was about 14 years old. He said there were so many dead bodies laying around, all that the Allies could do was to bulldoze them into the existing mass graves. There were too many dead bodies to be handled individually.", "Well, the two things aren't the same. There is overwhelming evidence the holocaust happened, the only real matter of debate was just how high the death count was. Absolute deniers do so out of hatred for Gypsies or Jews and not historical fact. The moonlanding is a different kettle of fish; it's a binary thing, so it either happened or it didn't happen. The evidence and science isn't clear to many, so it takes a lot of accepting on faith.", "As a little spin-off to the question, do people believe that what bible says actually happened? I read /u/desu_vult response and I am amazed at the amount of people that blindly believe that bible is true. How can you possibly believe in a super-being such as Jesus? EDIT: I would probably just consider him a really good magician if I saw all his tricks right in a front of my eyes.", "The 'fact' there are so many conspiracy theorists is actually in itself a wide-ranging conspiracy spread among the masses by the Trilateral Commission and Knights Templar, the Illuminati and Dick Cheney. As the masses focus on this inconsequential crap. these major manipulators go about their dirty work in plain sight. We're all destined to become Idiocracy slaves and I know this because it's all written on the Dark Web. (ref: www.dark.web/com)", "It's because when multiple source reports slightly differing numbers on the holocaust the automatic assumption is that they're all wrong or lying except one. The moon landing is pretty simple; people don't understand science. If you played Kerbal Space Program (with certain realistic mods) one would know that a moon landing is far from impossible.", "Mot people who I've spoken to I'd call revisionists, in that the number killed in the Holocaust is way lower then generally believed, not that there was no mass deaths at all. And some revisionists work can be quite convincing.", "People believe whatever fits with their own personal narrative and reject anything that doesn't. We aren't as rational as we would like to believe.", "It's because our world governments are notorious for lying to us, for political gain, so people tend to think everything they say/do is bullshit.", "To be honest, the US government doesn't have a good track record in not lying to it's people." ]
[ [ "the Moon to alert them to mankind's attainment of space travel. In addition, the 1953 short story \"Encounter in the Dawn\" contains elements of the first section of the film, in which the ancestors of humans are apparently given an evolutionary \"nudge\" by extraterrestrials. The opening part of another Clarke story, \"Transience\", has plot elements set in about the same time in human history, but is otherwise unrelated.\nThe 1972 book The Lost Worlds of 2001 contains material that did not make it into the book or film.\nClarke's first attempt to write the sequel to 2001 was a film screenplay, though", "-29.971209991479554" ], [ "with a dead crew—the result of a secret attempt to beat the United States to the Moon in the 1960s. Tom Nowicki played Major Andrei Mikoyan, a Russian member of the Space Shuttle crew in the story.\nThis story correlates with another claim about the unsuccessful second manned test flight of the N1 rocket.", "-29.9083003483247" ], [ "after the February 2001 airing of their network's television special, Conspiracy Theory: Did We Land on the Moon?, seen by about 15 million viewers. This Fox special is seen as having promoted the hoax claims.\nA 2000 poll conducted by the Public Opinion Foundation (ФОМ) in Russia found that 28% of those surveyed did not believe that American astronauts landed on the Moon, and this percentage is roughly equal in all social-demographic groups. In 2009, a poll held by the United Kingdom's Engineering & Technology magazine found that 25% of those surveyed did not believe that men landed on the Moon.", "-29.87040902476292" ], [ "again and the astronauts would be stranded on the Moon. But it may also be that a photograph like this one is as close as we're able to come to looking directly back into the human past ...\nThere the [Apollo 11] lunar module sits, parked just where it landed 40 years ago, as if it still really were 40 years ago and all the time since merely imaginary. Science and engineering The Apollo program has been called the greatest technological achievement in human history. Apollo stimulated many areas of technology, leading to over 1,800 spinoff products as of 2015. The flight", "-29.629091359791346" ], [ "A Funny Thing Happened on the Way to the Moon Overview Sibrel's claims that the moon landing was a hoax making claims about supposed photographic anomalies; disasters such as the destruction of Apollo 1; technical difficulties experienced in the 1950s and 1960s; and the problems of traversing the Van Allen radiation belts. Sibrel proposes that the most condemning evidence is a piece of footage that he claims was secret, and inadvertently sent to him by NASA; he alleges that the footage shows Apollo 11 astronauts attempting to create the illusion that they were 130,000 miles (210,000 km) from Earth (or roughly", "-29.541003797086887" ], [ "Human Moments in World War III \"Human Moments in WWIII\" is a science fiction short story by American writer Don DeLillo, originally published in a 1983 issue of Esquire Magazine and later incorporated into his published short story collection The Angel Esmeralda. It revolves around two astronauts, whose interactions are described while orbiting above an Earth torn apart by armed conflicts (hence the title) of ambiguous origin. Plot summary The narrative begins as a first person narrator describes his companion, named Vollmer, as they orbit above a war-torn Earth. The primary goal of their mission is to collect information and", "-29.370110340882093" ], [ "Astronauts Gone Wild Encounters with astronauts In Astronauts Gone Wild, Sibrel confronts nine Apollo astronauts and asks them to swear an oath on a Bible that they traveled to the Moon and back. Buzz Aldrin Sibrel's first encounter is with the Apollo 11 crewmember Buzz Aldrin. Inside an office room, he shows Aldrin his \"secret\" footage, which Sibrel says was sent to him by mistake from NASA. According to Sibrel, this footage shows the crew rigging a shot inside their spacecraft to appear halfway to the Moon, when they were really in Earth orbit and trying to deceive the world.\nAldrin", "-29.143479069927707" ], [ "on broadcasts of the Apollo missions for CBS. He later reflected regarding the Apollo 11 moon landing, “There was one event of really enormous importance that had almost no witnesses. And the only verification we have . . . came from a TV camera.”\nHe later elaborated:\nWhenever there was something on the news about a space shuttle, they would cut to a studio in St. Louis where there was a simulation of what was going on. I grew up in the generation where my parents basically believed if it was in the newspaper it was true. That turned out to be", "-29.043321025907062" ], [ "to the Earth and telling us of his experiences. Beyond the moon he is never likely to go unless, through an error in launching, his space vehicle misses its target and wanders off into space, never to return. Lectures In 1944 Spencer Jones was invited to deliver the Royal Institution Christmas Lecture on Astronomy in our Daily Life.", "-29.010525836376473" ], [ "Assistant Administrator for Legislative Affairs, Robert F. Allnut, concluded in a 1970 letter, \"after fifteen years of manned space voyages including space stations and landing on the Moon, spacemen have brought back not a shred of evidence -- verbal, photographic, or otherwise -- for the existence of extraterrestrial spacecraft, or 'UFOs'.\"\nIn 2009, footage from NASA was posted on YouTube by ufologists which \"renew[ed] UFO conspiracy theories that the government is hiding knowledge about its interactions with intelligent life\" by relying on a \"lack of context\" to promote a \"collection of indistinct imagery and allegations\". A number of the incidents were", "-28.94820200651884" ], [ "the Moon by the Russians; they were attached to the uncrewed lunar rovers Lunokhod 1 and Lunokhod 2. Public opinion In a 1994 poll by The Washington Post, 9% of the respondents said that it was possible that astronauts did not go to the Moon and another 5% were unsure. A 1999 Gallup Poll found that 6% of the Americans surveyed doubted that the Moon landings happened and that 5% of those surveyed had no opinion, which roughly matches the findings of a similar 1995 Time/CNN poll. Officials of the Fox network said that such skepticism rose to about 20%", "-28.637992895652133" ], [ "land. One survivor is found, revived, and questioned.\nThe boys also find evidence of an ancient lunar civilization, and postulate that the craters of the Moon were formed not by impacts from space, but by nuclear bombs that destroyed the alien race.\nWhen the base's Nazi leader shoots the pilot in order to silence him, Cargraves convenes a trial and finds him guilty of murder. Cargraves prepares to execute the prisoner by ejecting him into vacuum, mostly as a bluff for information on how to fly the base's spaceship. The Nazi capitulates in the airlock and teaches them how to fly the", "-28.60226699357736" ], [ "so that their souls could go on a journey aboard a spaceship they believed to be following comet Hale–Bopp. Some male members of the group underwent voluntary castration in preparation for the genderless life they believed awaited them after the suicide.\nIn May 1997, two Heaven's Gate members who had not been present for the mass suicide attempted suicide, one succeeding, the other becoming comatose for two days and then recovering. In February 1998, the survivor, Chuck Humphrey, committed suicide. Adam House In 2007, in Mymensingh, Bangladesh, a family of nine, all members of a novel \"Adam's cult\", committed mass suicide", "-28.550364842863928" ], [ "that NASA may have taken missions to the Moon after Apollo 17, but these missions were kept secret from the public due to alien interference and new-found extraterrestrial artifacts. Birnes claims that NASA made three additional trips to the Moon; Apollo 18, Apollo 19, and Apollo 20. Additionally, he claims that the Apollo 13 incident was actually an extraterrestrial attack meant to scare humans away from landing on the Moon.\nBirnes's credibility was called into question when a UFO sighting over Morris County, New Jersey, on January 5, 2009, featured on the show UFO Hunters as a preview of the show's", "-28.29216347564943" ], [ "and it's something everybody in this country should be proud of.\nThe case was dismissed in 1997. Revised theory from Conspiracy Theory: Did We Land on the Moon? (2001) Kaysing states that:\nThe astronauts were launched with the Saturn V. Then, in order to account for their disappearance, they simply orbited the Earth for eight days and in the interim they showed these fake pictures of the astronauts on the Moon. But on the eighth day the command console separated from the vehicle and descended to Earth as, of course, was shown in the films. Legacy Kaysing encouraged Ralph René to write", "-28.214997103554197" ], [ "First Men to the Moon First Men to the Moon is a novel by rocketry expert Wernher von Braun, published in 1960. It tells the story of John Mason and Larry Carter, fictional astronauts traveling to the Moon.\nVon Braun's book is dedicated to his daughters Iris and Margrit, who he believed would live in a world in which flights to the Moon were commonplace.\nAlong with detailed illustrations by Fred Freeman, von Braun's story is based on his own scientific knowledge and includes technical explanations of a journey into space. The novel describes the use of a method of investigating the", "-28.08740242726344" ], [ "an awesome achievement.\" James Burke has said in retrospect that it was \"[t]he greatest media event of all time\". On its tenth anniversary in 1979, he looked back on the whole Apollo programme in two BBC documentaries, The Men Who Walked on the Moon (BBC1) and The Other Side of the Moon (BBC2, later the same night).\nStuart Harris, the producer of those documentaries, has written a memoir\nof BBC TV's Apollo 11 coverage, recalling that the event became a bone of contention between the Science & Features Department, which had covered previous space events, including the Apollo 8 mission, and the", "-27.818070292647462" ], [ "Around the Moon Plot Having been fired out of the giant Columbiad space gun, the Baltimore Gun Club's bullet-shaped projectile, along with its three passengers, Barbicane, Nicholl and Michael Ardan, begins the five-day trip to the Moon. A few minutes into the journey, a small, bright asteroid passes within a few hundred yards of them, but does not collide with the projectile. The asteroid had been captured by the Earth's gravity and had become a second moon. \nThe three travelers undergo a series of adventures and misadventures during the rest of the journey, including disposing of the body of a", "-27.708830646122806" ], [ "1969 (TV series) Reception Verne Gay of Newsday called the first episode about Apollo 11 \"an essential and long overdue reminder\" of how the event was the work of many. He said the episode made an \"honorable effort\" to include the women who contributed to the Moon landing, made necessary by the book and film Hidden Figures, and largely ignored by other stories told about the event. Of a later episode about the Chappaquiddick incident, Gay said, \"Alas ... [this] episode makes a hard landing back to Earth.\"\nA review in Vox framed the Manson Girls episode in #metoo terms. \"There’s", "-27.580658458333346" ], [ "Five subsequent Apollo missions also landed astronauts on the Moon, the last in December 1972. Throughout these six Apollo spaceflights, twelve men walked on the Moon. These missions returned a wealth of scientific data and 381.7 kilograms (842 lb) of lunar samples. Topics covered by experiments performed included soil mechanics, meteoroids, seismology, heat flow, lunar ranging, magnetic fields, and solar wind. The Moon landing marked the end of the space race; and as a gesture, Armstrong mentioned mankind when he stepped down on the Moon.\nApollo set major milestones in human spaceflight. It stands alone in sending manned missions beyond low Earth", "-27.563504666672088" ], [ "Various theories are discussed by the perplexed astronauts: hallucinations? A hoax? A hostile power trying to trick them? They record and play back the conversations over and over, trying to figure out what is going on. Soon, they realize that these unknown people are aware of them and are offering to help.\nAt first, the Sunbird's commander refuses to communicate with them, suspicious of their motives. As they continue to plead with the astronauts to accept their rescue offer, the men are chilled to hear their mission referred to in historical terms. They come to realize that they were not only", "-27.494777286134195" ], [ "Time reviewed:\nNight of the Auk (by Arch Oboler) took place on a rocket ship returning to the earth from man's first landing on the moon (time: \"The day after some tomorrow\"). The mood of the return voyage is far from jubilant, what with a loathed egomaniac in command, a succession of murders and suicides, the discovery that full-scale atomic war has broken out on earth, and the knowledge that the rocket ship itself is almost surely doomed. Playwright Oboler seems indeed to be prophesying that the atomic age may end up with man as extinct as the great auk. Closing", "-27.48551477897854" ], [ "13, and after analyzing a detached doppelgänger arm, NASA finds that the beings are not living, as they are composed of an unknown inorganic material.\nMeanwhile, a retired NASA custodian from the era of the first Moon landings, living in a retirement home, slowly remembers the horrible secret that will mean the teenagers' imminent death if they are allowed to travel to the Moon. Back on Earth, after the doppelgängers attack the Moon base, the children and their \"chaperones\" are declared dead, leaving no hope for them. One by one, each are killed by their doppelgängers: the two engineers on the", "-27.378676159249153" ], [ "Apollo 20 hoax The Apollo 20 hoax is a faux story told in a series of YouTube videos about an American crewed lunar mission that discovered evidence of an extraterrestrial civilization on the far side of the Moon. Hoax In April 2007, videos began appearing on YouTube under the username \"retiredafb\" telling the extraordinary story of Apollo 20, a secret lunar mission that definitively proved the existence of intelligent, alien life on the Moon. Then, on May 23, 2007, Italian ufologist Luca Scantanburlo interviewed a man who identified himself as William Rutledge, a retired American astronaut living in Rwanda.", "-27.348140363785205" ], [ "Moon landings had been faked. Research quickly found, however, that the video was a hoax. Academic work In 2002, NASA granted US$15,000 to James Oberg for a commission to write a point-by-point rebuttal of the hoax claims. However, NASA canceled the commission later that year, after complaints that the book would dignify the accusations. Oberg said that he meant to finish the book. In November 2002, Peter Jennings said \"NASA is going to spend a few thousand dollars trying to prove to some people that the United States did indeed land men on the Moon,\" and \"NASA had been so", "-27.330113505362533" ], [ "contact with alien life and staging faked Apollo Moon landings, framed as developments which followed a successful 1943 Philadelphia Experiment. These culminate in \"a hole ripped in space-time\" in 1983.\nThe authors have encouraged speculation about the contents; for example, they wrote, \"Whether you read this as science fiction or non-fiction you are in for an amazing story\" in their first chapter, describing much of the content as \"soft facts\" in a Guide For Readers and publishing a newsletter with updates to the story.\nThe work has been characterized as fiction. In media In 2004's Eternal Sunshine of the Spotless Mind,", "-27.313272768864408" ], [ "social conditions on earth. Félix (as Dino Kraspedon), later publicly clarified that he did not witness the male human extraterrestrial leaving or entering any spacecraft. \nUnder his pen name Dino Kraspedon, Félix appeared to correctly predict that there would be a period of terrorism. However Félix seems to have been motivated to fulfill his own prediction since a 2018 Brazilian investigative journalism report revealed that in 1967-68 Félix himself was actually leading a group of 14 police officers in a false flag operation committing acts of terrorism in coordination with a general with close ties to Brazil's right wing dictatorship.", "-27.311925060814247" ], [ "crew members were on their way to the US to surrender (but before Japan had surrendered).\nThirty-nine members of the Heaven's Gate UFO religious group committed mass suicide in March 1997 by drinking a lethal dose of phenobarbital and vodka \"and then lay down to die\" hoping to enter an alien spacecraft.\nA mysterious woman, known as the Isdal Woman, was found dead in Bergen, Norway, on 29 November 1970. Her death was caused by some combination of burns, phenobarbital, and carbon monoxide poisoning; many theories about her death have been posited, and it is believed that she may have been a", "-27.239880489651114" ], [ "Australia. Famous people on this flight included Gene Roddenberry and Timothy Leary. Suborbital flights Short flights that cross the boundary of space without attempting to reach orbital velocity are a cost-effective method of space burial. The remains do not burn up and are either recovered or lost. Moon burial The first moon burial was that of Dr. Eugene Shoemaker, a portion of whose cremated remains were flown to the Moon by NASA. Shoemaker's former colleague Carolyn Porco, a University of Arizona professor, proposed and produced the tribute of having Shoemaker's ashes launched aboard the NASA's Lunar Prospector spacecraft. Ten", "-27.232382278190926" ], [ "one was Israeli.\nEleven people (all men) have lost their lives training for spaceflight: eight Americans and three Russians. Six of these were in crashes of training jet aircraft, one drowned during water recovery training, and four were due to fires in pure oxygen environments.\nThe Space Mirror Memorial, which stands on the grounds of the John F. Kennedy Space Center Visitor Complex, commemorates the lives of the men and women who have died during spaceflight and during training in the space programs of the United States. In addition to twenty NASA career astronauts, the memorial includes the names of a U.S.", "-27.16261952603236" ], [ "its very own satellite - the Moon. Most of the aliens died in a crash and just a bunch of them, placed in suspended animation, survived.\nWith no one to reanimate them, these poor creatures were doomed to the eternal sleep though. It was a shot from a Russian navy cruiser Aurora main gun that signaled the beginning of the October Revolution of 1917. Drunken sailors missed the Tsar's Winter Palace and hit the Moon instead. This shot deactivated alien sleeping machines and awakened the rest of their crew. A short while after remaining aliens realized that there was only", "-27.140746969205793" ], [ "Good News From Outer Space Plot In 1999, George Eberhart, a tabloid journalist, has been resuscitated from a successful suicide by a new scientific process, known as the \"Han process\". Amidst premillennial hysteria across the United States, compounded by both biblical prophecies concerning the End of Times and Ufologists reporting sightings of giant alien spacecraft, the resurrected George leaves both his job and his wife, Lucy, and discovers in Raleigh, North Carolina a series of unusual incidents the locals believe are angelic interventions, but that George suspects are due to alien interference with the progress of humanity. Awards In", "-27.11195365327876" ], [ "halfway to the Moon) when, he claims, they were only in a low Earth orbit.\nThe film also asserts that NASA's early inexperience in rocket technology and inconsistencies in NASA's records could point to a possible hoax, and that the Space Race was actually a race to develop armaments with the huge budget allocated to the Apollo missions. The film's premise is that NASA perpetrated a fraud because of the perception that if the United States could land men on the Moon before the Soviet Union, it would be a major victory in the Cold War, since the Soviets had been", "-27.107763149309903" ], [ "Battle in Outer Space Plot In 1965, a series of mysterious and devastating incidents are happening on Earth. These incidents range from a railroad bridge levitated off the ground causing a train wreck in Japan; an ocean liner lifted out of the Panama Canal by a waterspout, destroying it; severe flooding in Venice, Italy; and the destruction of the J-SS3 space station.\nA UN-connected international meeting is called at the Space Research Center in Japan. Major Ichiro Katsumiya, Professor Adachi and Dr. Richardson open the conference and describe the disasters, adding that the survivors suffered from extreme frostbite. Dr. Richardson theorizes", "-27.08811180840712" ], [ "them to malfunction and shut off the voice of humans for good.\nAftermath does not talk about the International Space Station while Life After People discusses the fate of the Immortality Drive aboard the ISS. Both documentaries make reference to objects on the Moon, although Life After People does this as part of the miniseries episode \"Roads to Nowhere\". Unlike Life After People, Aftermath does not comment on the Voyager 2 spacecraft. The Life After People episode \"Sky's The Limit\" mentions the Cassini–Huygens Space orbiter. However no other space probes were noted. It should however be noted that the original Life", "-27.05640544668131" ], [ "it contained \"no moonmen, no monsters, no incredible surprises\". To ensure this realism, he collected a wide range of documents about rockets and space travel with which to conduct research. In this he was aided by Heuvelmans, who collected pictures of rockets and atomic research facilities for him. Hergé's research archive included an article from the American magazine Collier's which discussed how humanity could reach the Moon, as well as books by Pierre Rousseau and Auguste Piccard. A further work that he used was L'Astronautique (1950), a book on putative space travel by the physicist Alexander Ananoff, with whom Hergé", "-26.967562366393395" ], [ "Cosmic Birth Synopsis Between 1968 and 1972, twenty-four American astronauts traveled to the Moon, with twelve of them walking on its surface. Through interviews with 5 Apollo astronauts, as well as family members of two of the astronauts who have passed, the film looks into how going to the Moon changed the astronauts, as well as how the astronauts helped people back on Earth better understand our own planet.\nThe film also explores the impact of the photographs coming out of NASA during the Apollo era and what role they played in helping start the environmental movement in the early 1970s.", "-26.934257593165967" ], [ "never granted them the suspension of disbelief given to other science-fiction programmes.\nThe characters seem aware of the apparent implausibility of their situation. In \"Black Sun\", Victor Bergman asserts the chances of their surviving the explosion which knocked them from orbit are \"just about infinite.\" In \"Matter of Life and Death\", Koenig remarks \"many things have happened since we broke away from our own solar system, unexplainable things.\" How they survived and are able to travel the Universe seems to be a central mystery to which the Alphans, and the audience, have no concrete answers.\nSpeaking about the show in 2010, Bain", "-26.907401087519247" ], [ "by Moon exploration missions and certain plastic items will survive intact for not only thousands, but millions of years after mankind has vanished. They will be the last legacy of the human race. Comparison to Life After People As with Life After People, the similar special feature on the History Channel, Aftermath does not explain how humanity disappeared but rather what would happen to the Earth after we disappeared. It also shows that humans have disappeared instantly, not a few at a time. Both series depict the possible fates of famous pieces of infrastructure and buildings. It, too, uses CGI", "-26.903750103432685" ], [ "space programme in July 1971, at the very moment it was providing results. In 2003 he published his book 'The Moonlandings, An eyewitness account' in which he recounted how and why the first men landed on the moon.\nTurnill wrote many obituaries of people involved in aerospace and other figures for The Guardian, The Times and The Daily Telegraph, the last to appear during his lifetime being of Sir James Hamilton, who helped design Concorde's wing. It appeared in The Guardian in May 2012.\nFollowing a few months of poor health Turnill died at the Pilgrim's Hospice in Ashford, Kent, on 12", "-26.887940725311637" ], [ "spaceflight during the Vostok programme and reached its peak with the Apollo program which captured the imagination of much of the world's population. The landing of Apollo 11 on the Moon was an event watched by over 500 million people around the world and is widely recognized as one of the defining moments of the 20th century. Since then, and with the end of the space race due to the dissolution of the Soviet Union, public attention has largely moved to other areas.", "-26.882364705437794" ], [ "Nothing Ever Happens on the Moon \"Nothing Ever Happens on the Moon\" is a science fiction short story by American writer Robert A. Heinlein, published in April and May 1949 in Boys' Life, a magazine of the Boy Scouts of America, who jointly hold copyright with Heinlein, dated 1976. The story is about a boy who tries to become an Eagle Scout on the Moon.\nThough the story is not usually counted among the Future History stories, Heinlein wrote in a foreword in Expanded Universe that \"This story is compatible with the so-called 'Future History' series. It", "-26.873455026419833" ], [ "events of the same kind are also suspected to have occurred during the Holocene epoch.\nFrom these statistics, one may expect that such strong events occur once per tens of millennia, while weaker events may occur once per millennium or even century. The event of 774 did not cause catastrophic consequences for life on Earth, but had it happened in modern times, it may have produced catastrophic damage to modern technology, particularly to communication and space-borne navigation systems. In addition, a solar flare capable of producing the observed isotopic effect would pose considerable risk to astronauts.\nAs of 2017, there is \"little", "-26.826668773021083" ], [ "in an interview after the war, said:\nWe were starting on this journey together in fear, but all of us hoping for something above all that we would remain together. We had all had a taste already of what things could be like, none of us did expect for anything very much, we all knew that they could put us to death. I was the only one officially condemned to death. The others were not. But there is always a fugitive ray of hope that some miracle will take place.\nWhen the women arrived in Germany they were put into separate cells", "-26.76931708343909" ], [ "the first to achieve a successful space launch (Sputnik 1 in 1957), the first crewed space flight (Vostok 1 in 1961), and the first spacewalk (Voskhod 2 in 1965). Criticisms Jim McDade, writing in The Birmingham News, characterized A Funny Thing Happened on the Way to the Moon as \"full of falsehoods, innuendo, strident accusations, half-truths, flawed logic and premature conclusions.\" According to McDade, the \"only thing new and weird\" in the film is that the claim that video views of Earth were actually filmed through a small hole to give the impression that Apollo 11 was not in low", "-26.761304792715237" ], [ "all died years ago. In fact, the Martians use the memories of the astronauts to lure them into their old homes, where they are killed in the middle of the night.\nA third mission, \"Zeus III\", lands on Mars in June 2001. It is commanded by Col. Wilder himself with five other astronauts (Spender, Parkhill, Briggs, Cook, McClure) as subordinates. The crew discovers five ancient cities in the vicinity of the spacecraft, one of which apparently was inhabited only a few weeks ago. The scientists find that all of the Martians have died of chickenpox accidentally brought from Earth by the", "-26.725480433611665" ], [ "The Dying Night Plot summary Three astronomers, who have been working on the Moon, Mercury and the asteroid Ceres, meet for the first time in ten years at a convention on Earth. They also meet a former colleague of theirs, Romero Villiers, who had to stay on Earth because of illness. Villiers claims to have invented a mass-transference/teleportation device, but dies under suspicious circumstances before he can demonstrate the device to his friends.\nAnother scientist who has seen the device demonstrated suspects that Villiers has been murdered by one of his classmates, and he questions them. In the course of his", "-26.684125914180186" ], [ "devising a reactionless space drive and then, with a small team, building a spaceship around it and taking to another celestial body provides the foundation of the adventure that H. G. Wells laid out in First Men in the Moon (1901).\nIn what seems a remarkable coincidence, both The Wailing Asteroid and Edmond Hamilton’s The Haunted Stars (1960) present the human race as the descendants of an alien garrison, whose abandoned base astronauts discover on another body of our solar system.\nIn a small side adventure, Joe Burke and his team are accidentally teleported to an alien planet many light years from", "-26.68191749387188" ], [ "the meeting in the absence of Shepard and so it was he who answered the red phone to be informed there had been a fire in the Apollo 1 CM, and that the three astronauts, Gus Grissom, Ed White and Roger Chaffee were dead. When the enormity of the situation was ascertained, it fell on Collins to go to the Chaffee household to inform Martha Chaffee that her husband had died. The Astronaut Office had learned to be proactive in informing astronauts' families of a death quickly, because of the death of Theodore Freeman in an aircraft crash in 1964,", "-26.679459405248053" ], [ "Night of the Auk Summary The action takes place aboard a spacecraft returning from the first manned Moon landing, the crew of which witnesses nuclear war break out on Earth. In his foreword to the published edition of the play, Oboler expressed the hope that its vision of a potential future would prove to be \"a playwright's fancy\". History of the play Night of the Auk was based on Oboler's radio play \"Rocket from Manhattan\", which aired as part of Arch Oboler's Plays on September 20, 1945, the month after the atomic bombings of Hiroshima and Nagasaki. \"Rocket from Manhattan\"", "-26.67591109010391" ], [ "of these events were organised by local astronomy societies and universities.\nThe show returned for a second series on 16–18 January 2012. The first episode had a theme about the moon, including a live interview with 'the last man on the moon', Apollo 17 astronaut Eugene Cernan. The second episode had a focus on black holes, and the third on the possible existence of extra-terrestrial life. Each episode included different guests, such as impressionist and amateur astronomer, Jon Culshaw on the second night. The final episode also included a feature titled the \"Great Big Dulverton Switch Off\" where every light in", "-26.65671472827853" ], [ "futility of man's scientific approach to nature), and the other that Muhammad was illiterate. NASA photograph After Apollo mission photographs were published of Rima Ariadaeus, the 300 km-long rift line on the surface of the Moon, it was suggested by Muslims on some internet sites that this was result of the splitting mentioned in the Quran. In 2010, NASA scientist Brad Bailey was asked about this and replied \"My recommendation is to not believe everything you read on the internet. Peer-reviewed papers are the only scientifically valid sources of information out there. No current scientific evidence reports that the Moon", "-26.64066664868733" ], [ "The Right Stuff (book) Writing and publication In 1972 Jann Wenner, the editor of Rolling Stone, assigned Wolfe to cover the launch of NASA's last Moon mission, Apollo 17. Wolfe became fascinated with the astronauts, and his competitive spirit compelled him to try to outdo Norman Mailer's nonfiction book about the first Moon mission, Of a Fire on the Moon. He published a four-part series for Rolling Stone in 1973 titled \"Post-Orbital Remorse\", about the depression that some astronauts experienced after having been in space. After the series, Wolfe began researching the whole of the space program, in what became", "-26.626561748271342" ], [ "Buck Nelson Buck Nelson (April 9, 1895 – 1982) was an American farmer who claimed to have had an encounter with an unidentified flying object and its human crew in 1954 while living in Missouri. Buck Nelson believed the friendly occupants of the spacecraft to be humans from the planet Venus. His story is contained in a 1956 booklet he authored, My Trip to Mars, the Moon, and Venus. It has been speculated by some that the space visitors have bases on Venus, the Moon, and Mars instead of living on those planets. There are also some who claim the", "-26.584969088435173" ], [ "they have found disappeared in the Bermuda Triangle many years before. So what is it doing in space? As they attempt to solve this mystery, it quickly becomes apparent that a malevolent force has been waiting on the NASA shuttle, using the aforesaid dead body as its host and it now begins to stalk the crew members one at a time. Release The film was released on VHS by Vidmark Entertainment on May 30, 1990. Connections in popular culture The film's title is a reference to the 1973 Pink Floyd album of the same name\nGerman black metal band Nargaroth uses", "-26.583474698869395" ], [ "Lunokhod programme. To date, the last human to stand on the Moon was Eugene Cernan, who as part of the Apollo 17 mission, walked on the Moon in December 1972. See also: A full list of lunar Apollo astronauts.\nMoon rock samples were brought back to Earth by three Luna missions (Luna 16, 20, and 24) and the Apollo missions 11 through 17 (except Apollo 13, which aborted its planned lunar landing).\nFrom the mid-1960s to the mid-1970s there were 65 Moon landings (with 10 in 1971 alone), but after Luna 24 in 1976 they suddenly stopped. The Soviet Union started focusing", "-26.58078564429843" ], [ "I Shot an Arrow into the Air Plot A manned space flight with eight crew members crash lands on what the astronauts believe to be an unknown asteroid. Their expectations of survival or rescue are bleak. Only four of the crew survive: the commanding officer Donlin, crewmen Corey and Pierson, and a crewman who is barely alive. After they bury the dead men, Donlin and Pierson concern themselves with taking care of the injured crewman, but Corey, realizing water is in short supply, is only concerned about saving himself, setting himself at odds with Donlin and Pierson. After the injured", "-26.56680092329043" ], [ "Cosmic Voyage (1936 film) Plot In the year 1946, the Soviet space program is undergoing turmoil. Professor Sedikh, who is planning to lead the first manned exploration to the Moon, is denounced by his rival Professor Karin as being too old and too mentally unstable for the mission. Professor Sedikh, aided by his assistant Marina and a youth named Andryusha, disregard Prof. Karin's authority and make a successful landing on the Moon. Although a few problems occur at the Moon, including the discovery of a damaged oxygen tank and Professor Sedikh's becoming trapped under a fallen boulder, the expedition", "-26.563697429955937" ], [ "on the moon. Through joint efforts, one quarter of the population of the earth was able to see the first steps of the first men on the moon. Life Magazine estimated that 600 million people watched the first step on the moon by Armstrong. \"People from 47 countries watched the astronauts...Images of the flag-planting ceremony passed through the fixed-focus lens of the camera, were transformed into electrical impulses, amplified a hundred times and beamed directly to earth.\" \nThe WX-31034 Lunar Camera Tube rests on Mare Tranquillitatis (Sea of Tranquility) on the moon's surface. Awards and honors 1966 – Goetze's", "-26.561835092725232" ], [ "had previously been common. The documentary-like film Destination Moon advocated a Space Race with an unspecified foreign power almost a decade before such an idea became commonplace, and was promoted by an unprecedented publicity campaign in print publications. Many of the astronauts and others working in the U.S. space program grew up on a diet of the Heinlein juveniles, best evidenced by the naming of a crater on Mars after him, and a tribute interspersed by the Apollo 15 astronauts into their radio conversations while on the moon.\nHeinlein was also a guest commentator for Walter Cronkite during Neil", "-26.536511974642053" ], [ "space; and none will be so difficult or expensive to accomplish. Full text \nOn December 24, 1968, the crew of Apollo 8, Frank Borman, James Lovell and William Anders, became the first human beings to enter lunar orbit and see the far side of the Moon in person. Humans first landed on the Moon on July 20, 1969. The first human to walk on the lunar surface was Neil Armstrong, commander of the U.S. mission Apollo 11. The first robot lunar rover to land on the Moon was the Soviet vessel Lunokhod 1 on November 17, 1970, as part of the", "-26.50877608335577" ], [ "of the Last Moon in the basis has the story of Mysteries of Yoshitsune, but it is actually the perspective about the former by the non-human entities from the Moon who come to collect the souls, whose figures dressed in black can be seen in the music video and cover of singles \"Returner (Yami no Shūen)\" and \"Arrow\", as well album. The non-human narrator during the show questions why the humans with such strong feelings of friendship and love, repeat the same mistakes, can't stop hurting each other, and spend short lives fighting. Composition According to Gackt, it's a heavy", "-26.46685920818709" ], [ "Moon landing conspiracy theories Moon landing conspiracy theories claim that some or all elements of the Apollo program and the associated Moon landings were hoaxes staged by NASA, possibly with the aid of other organizations. The most notable claim is that the six crewed landings (1969–1972) were faked and that 12 Apollo astronauts did not actually walk on the Moon. Various groups and individuals have made claims since the mid-1970s that NASA and others knowingly misled the public into believing the landings happened, by manufacturing, tampering with, or destroying evidence including photos, telemetry tapes, radio and TV transmissions, and Moon", "-26.43131457734853" ], [ "we can find\". Lovell replied, \"We'll see you on the other side\", and for the first time in history, humans travelled behind the Moon and out of radio contact with the Earth.\nWith ten minutes remaining before LOI-1, the crew began one last check of the spacecraft systems and made sure that every switch was in its correct position. At that time, they finally got their first glimpses of the Moon. They had been flying over the unlit side, and it was Lovell who saw the first shafts of sunlight obliquely illuminating the lunar surface. The LOI burn was only two", "-26.42744311032584" ], [ "came up he did not see anybody else\".\nThe Coroner said, so far as he could make out, there was nothing wrong with the machine or the piloting. It appeared to be a pure accident. He recorded a verdict of \"Death from injuries received through the sudden accidental fall of a flying boat.\"\nMoon was buried at Southampton Old Cemetery with a wooden marker which is believed to be part of the propeller of the plane in which he died, which was erected by his comrades of 230 Squadron, Royal Air Force.", "-26.38745298293361" ], [ "first observations using it.\nNASA's Apollo program was the first, and to date only, mission to successfully land humans on the Moon, which it did six times. The first landing took place in 1969, when astronauts placed scientific instruments and returned lunar samples to Earth. Before spaceflight The ancient Greek philosopher Anaxagoras (d. 428 BC) reasoned that the Sun and Moon were both giant spherical rocks, and that the latter reflected the light of the former. His non-religious view of the heavens was one cause for his imprisonment and eventual exile. In his little book On the Face in the", "-26.365886574145406" ], [ "on letter paper by To-yün Hsüan, worn and blurred. In old people's memory the moon of thirty years ago was gay, larger, rounder, and whiter than the moon now\". At the end of the story, Eileen Chang writes that, \"the moon thirty years ago are dead but the story of thirty years ago is not yet ended- can have no ending\". The moon is a symbol of eternity that never changes, showing that the tragedy of life will never stop and that the story goes on.\nThe Moon Foretells the Fates of the Characters\nThe image of the moon appears at important", "-26.35280473844614" ], [ "American soldier who stated:\nI never was so sure before of exactly what I was fighting for. Before this you would have said those stories were propaganda, but now you know they weren't. There are the bodies and all those guys are dead.\nEleven prisoners survived the burning of the barn and were found alive by U.S. soldiers - seven Poles, three Russians and one severely wounded French.\nOn April 21, 1945, the local commander of the 102nd ordered between 200 and 300 men from the town of Gardelegen to give the murdered prisoners a proper burial. Over the next few days, the", "-26.323293903755257" ], [ "stake conference congregation in Hawaii:\nWe will never get a man into space. This earth is man's sphere and it was never intended that he should get away from it. The moon is a superior planet to the earth and it was never intended that man should go there. You can write it down in your books that this will never happen.\nEarlier, Smith had written that \"it is doubtful that man will ever be permitted to make any instrument or ship to travel through space and visit the moon or any distant planet\". At the 1970 press conference where Smith was", "-26.31108949269401" ], [ "Armstrong was reported to have witnessed multiple UFOs during Apollo 11. An explanation was that the sightings could have been attributed to jettisoned components. Additional stories were accredited to a hoax spread by science fiction writer Otto Binder. Buzz Aldrin says his words were taken out of context from an interview in 2005 about the incident.\nDuring a 2005 spacewalk outside the International Space Station, astronaut Leroy Chiao reported seeing lights in a formation he described as \"in a line\" and \"almost like an upside-down check mark\". The incident was promoted as a possible UFO sighting in the television series", "-26.30481735379726" ], [ "Magazine concluded that the series finale made no real attempt to resolve any of the plotlines or mysteries set up during the earlier run of the show. Wider influence On March 17, 2009, the United Nations hosted a Battlestar Galactica retrospective including a discussion with Mary McDonnell, Edward James Olmos, Ronald D. Moore and David Eick on human rights, terrorism, children and armed conflict, and reconciliation between civilians and faiths. The Discussion was moderated by actress Whoopi Goldberg and also included Radhika Coomaraswamy, the Special Representative of the Secretary-General for Children and Armed Conflict; Craig Mokhiber of the Office of", "-26.299448415622464" ], [ "person, an injured astronaut who is regaining consciousness after a crash landing on Mars.\nThe story is told as a second-person narrative (i.e., \"You raised your head ...\", \"If you were the kid ...\"). Publication history Shortly after its original appearance in The Magazine of Fantasy and Science Fiction, \"The Man Who Lost the Sea\" appeared in issue 74 (January 1960) of the French-language magazine Fiction (under the title \"L'homme qui a perdu la mer\"). Its first appearance in Britain was in the October 1963 issue of Venture Science Fiction.\n\"The Man Who Lost the Sea\" appeared in two best-of-the-year anthologies—The Best", "-26.29418317467207" ], [ "other missions), there were huge pieces to be filled in. Stock footage researchers were set to the task of finding newsreel footage of the time, and beautiful and unusual footage from around the world to represent both the people and the planet as this event unfolded. The scenes of the making of the spacecraft and suits, and the testing of human endurance were shot in the months following the first moonwalk. The launch sequence itself, with all the slow motion shots of flame, smoke and falling ice were put together from engineering film shot by cameras on the launch pad", "-26.280056183517445" ], [ "all but wiped out by the horrific bombardment.\nA handful of survivors desperately struggle to escape the alien mop-up fleet. They hide close to the sun, inside asteroids, beneath the crusts of moons, within ice rings, and in the fathomless depths of interstellar space. But most are hunted down and slaughtered.\nThe last man and woman on Earth are captured as zoo specimens. In the belly of an alien starship, a squid-like being relates to them the pitiless logic behind humankind's execution: the moment humans learned to travel at relativistic speeds was the moment mankind simply became too dangerous", "-26.237506415956886" ], [ "attempt to initiate World War III. The opening scene of the film depicts astronauts getting killed in space. Satellite weapons and moon vehicles are depicted in Diamonds Are Forever. Bond becomes the astronaut himself in Moonraker. According to Cork, \"They deal with the ideas of manipulation of satellites. They really are dealing with the way the space program works now: We're sending up incredible sophisticated satellites.... Ian Fleming was fascinated by rocketry and space. He even communicated with Arthur C. Clarke.\" U.S. President John F. Kennedy In order for any nation to embark on a major project such as going", "-26.20027850527549" ], [ "after the incident. Bondarenko's death was the first known cosmonaut or astronaut fatality. It is not clear whether other cosmonauts were told of his death immediately; the media did not learn of Bondarenko's death – or even of his existence – until many years later, in 1986. Unsubstantiated reports of other cosmonaut deaths created the myth of the lost cosmonaut.\nThe next uncrewed flight, Korabl-Sputnik 5, was launched on March 25, two days after Bondarenko's death. Like the previous Vostok 3KA flight, it lasted for only a single orbit, carried a mannequin and a dog, Zvezdochka (\"Starlet\", or \"Little star\"). This", "-26.14448859228287" ], [ "Force study on UFOs Friend said he believed in the possibility of life in Extraterrestrial life in the universe. Friend led the Air Force study on UFOs. In 1952 the U.S. Air Force started a classified study called Project Blue Book. The project was shut down in 1969 even though 701 documented incidents remain a mystery. Personal Born is Columbia, South Carolina February 29, 1920. From an early age Friend loved airplanes. Friend wanted to sign up to fly for the army but he was turned away because he was black. He attended Lincoln University in Pennsylvania and studied aviation.", "-26.097918349551037" ], [ "Earth to the Moon, and by Bret Harrison in the 2015 ABC TV series The Astronaut Wives Club. That year, he was also portrayed by Colin Hanks in the Season 3 episode \"Oklahoma\" of Drunk History, written by Laura Steinel, which retold the story of his Mercury-Atlas 9 flight.\nWhile he was in space, Cooper recorded dark spots he noticed in the waters of the Caribbean. He believed these anomalies may be the locations of shipwrecks. The 2017 Discovery Channel docu-series Cooper's Treasure followed Cooper's friend Darrell Miklos as he searched through Cooper's files to discover the location of the suspected", "-26.07527675089659" ], [ "Voyage (novel) Plot summary The book tells the story in flashbacks during the actual Mars mission of the chronicalised history until the mission's beginning. The point of divergence for this alternate timeline happens on November 22, 1963, where John F. Kennedy survived the assassination (Jacqueline Kennedy was killed, hence the renaming of the Kennedy Space Center as the Jacqueline B. Kennedy Space Center), but was crippled and thus incapacitated, as Lyndon B. Johnson is still sworn in. On July 20, 1969, Apollo 11 astronauts Neil Armstrong and Joe Muldoon walk on the Moon, and Nixon's \"most historic phone call\" is", "-26.072857517399825" ], [ "First on the Moon Plot A group of journalists are investigating a highly secret document when they uncover a sensational story: that before the Second World War, in 1938, the first rocket was made in the USSR and Soviet scientists were planning to send an orbiter to the Moon and back. The evidence is convincing; it is clear that in this case, Soviet crewed lunar program cosmonauts were first.\nThe movie follows the selection and training of a small group of cosmonauts. The one who shines above the others (similar to the clear front-runners in the early historical Soviet space", "-26.054570153122768" ], [ "\"NASA Mooned America!\", after René decided that he also had research to prove the landings were faked. More generally, despite refutations and other evidence, Kaysing's writings have inspired others in their disbelief in the historicity of the Moon landings. \nKaysing's daughter, Wendy L. Kaysing, has stated that she hopes to one day write a book about her father with Kaysing's nephew, Dietrich von Schmausen, not to reiterate Kaysing's hoax claims, rather to talk about her father as a person.", "-25.999374419690866" ], [ "and Sam must piece together a centuries-old puzzle. How can Janus Prime’s moon weigh billions of tons more than it should? Why is the planet riddled with deadly radiation? As the violence escalates around them, will the time travellers survive to discover the answers?", "-25.991436406737193" ], [ "which a \"Mother Plane\" from space would destroy the white race. She predicted this event using numerological analyses based on the sacred number 19, an idea derived from Rashad Khalifa. She stated that the UFO was seen after the 1986 bombing of Tripoli. She also argued that the Space Shuttle Challenger disaster in the same year was divine punishment delivered on the USA, because \"the aim and purpose of America's Space Program beginning in the 1960's with the landing on the Moon in 1969, was to prepare for war against the Great Mother Ship and its companion wheels harnessing an", "-25.987409378110897" ], [ "formed, something large collided and combined with it — a vast spacecraft. The pilot of the spacecraft survived in the Moon, until awakened by astronauts on July 20, 1969. It apparently followed them back to Earth, where it began construction of a ship to return home — by converting the entire Earth into a spaceship. In the process, it was engaged in battle by the members of SMASH. It killed some members, and trapped others in suspended animation for 30 years, until freed by the combined efforts of Tom Strong and Tom Strange.\nIn Tom Strong #12, it is revealed that", "-25.96666638951865" ], [ "Frankenstein Meets the Space Monster Plot All of the women on the planet Mars have died in an atomic war, except for Martian Princess Marcuzan (Marilyn Hanold). Marcuzan and her right-hand man, Dr. Nadir (Lou Cutell), decide they will travel to Earth and steal all of the women on the planet in order to continue the Martian race. The Martians shoot down a space capsule manned by the android astronaut Colonel Frank Saunders (Robert Reilly), causing it to crash in Puerto Rico. Frank's electronic brain and the left half of his face are damaged after encountering a trigger-happy Martian and", "-25.95983907862683" ], [ "with the inconvenient fact that famine in this part of the world has been a recurring phenomenon, which Mao did not invent or even magnify.\"\nIn The China Journal, Felix Wemheuer, lecturer of Chinese history and politics at University of Vienna, said that Dikötter's figure of 45 million dead was higher than other estimates of 15 to 40 million dead, and said, \"It seems that his interest is in presenting the highest number possible, to label the Great Leap as the greatest mass killing in human history.\" Wemheuer says the figure derived from discrepancies between Cao Shuji's 2005 estimate of 32.5 million and data", "-25.943322218394314" ], [ "a year after the Apollo 1 accident. The Apollo program reached its objective of successfully landing men on the Moon on July 20, 1969, with Apollo 11.\nAt the time of his death, Grissom had attained the rank of lieutenant colonel and had logged a total of 4,600 hours flying time, including 3,500 hours in jet airplanes. Some contend that Grissom could have been selected as one of the astronauts to walk on the Moon. \"Deke\" Slayton wrote that he had hoped for one of the original Mercury astronauts to go to the Moon, noting: \"It wasn't just a cut-and-dried decision", "-25.919082378270105" ], [ "we realized there were few pictures of Neil. My fault perhaps, but we had never simulated this during our training.\"\nAldrin reentered Eagle first, but, before ascending the ladder, he was the first human to urinate on the Moon. With some difficulty they lifted film and two sample boxes containing 21.55 kilograms (47.5 lb) of lunar surface material to the hatch using a flat cable pulley device. Armstrong reminded Aldrin of a bag of memorial items in his sleeve pocket, and Aldrin tossed the bag down. It contained a mission patch for the Apollo 1 flight that Ed White never flew due", "-25.901313918060623" ], [ "Maza of the Moon Plot synopsis Ted Dustin, an American inventor, seeks to win a prize of one million dollars by being the first person to touch the Moon with an object launched from Earth. He devises a huge gun, which fires upon the surface of the Moon. Shortly thereafter, the Moon fires back, and war breaks out between the planet and its satellite. Using a videophone he invented, Ted hails communication with the Moon. A beautiful woman and her guards first reply, but their transmission is cut off by warlike yellow aliens. Ted eventually heads", "-25.895277612144127" ], [ "to his death in a cabin fire during the launch rehearsal; medallions commemorating Yuri Gagarin, the first man in space, and Vladimir Komarov, the first man to die in a space flight, and a silicon disk etched with goodwill messages from 73 nations. After transferring to LM life support, the explorers lightened the ascent stage for the return to lunar orbit by tossing out their backpacks, lunar overshoes, an empty Hasselblad camera, and other equipment. The hatch was closed again at 05:01, and they repressurized the lunar module and settled down to sleep.\nAt 17:54 UTC, they lifted off in Eagle's", "-25.86049210326746" ], [ "Armstrong and Eugene Cernan, the first and last humans to set foot on the Moon; John Young and Robert Crippen, the first pilots of the Space Shuttle; and Ferguson and Hurley, the commander and the pilot of the current (last) shuttle flight.\nJust before the crew prepared to go for sleep, CAPCOM Megan McArthur notified them that the flight controllers thought that the GPC-4 failure was caused by a single event upset (teams on the ground listed a Coronal Mass Ejection as one of three potential contributing factors) and that GPC-4 was a healthy machine. Furthermore, she mentioned that the plan", "-25.846916039154166" ], [ "UFO sightings in outer space UFO sightings in outer space are sightings of unidentified flying objects reported by astronauts while in space that they could not explain at the time. These sightings have been claimed as evidence for alien visits by ufologists. Some of the alleged sightings never occurred: science fiction writer Otto Binder perpetuated a hoax claiming Apollo 11 Commander Neil Armstrong had encountered UFOs during the Apollo mission. UFO proponents see comments by astronauts or photos processed by NASA as one of the \"strongest bodies of evidence\" because they are considered to be of high trustworthiness; however, NASA", "-25.843952472670935" ], [ "to see an exploding meteor coming at them and aligned with the Moon. This would explain why the monks were the only people known to have witnessed the event; such an alignment would only be observable from a specific spot on the Earth's surface.", "-25.839791204591165" ], [ "circumstances of his death are not known. His unit was involved in heavy fighting against the Nazis in October 1941, and 3 October is sometimes given as the date of his demise. Evidence collected in the 1990s suggests that he disappeared in January or February 1942 while repairing a communications cable at night near Zasetski. Remembrance and tributes When American astronaut Neil Armstrong visited the Soviet Union after his historic flight to the Moon, he collected a handful of soil from outside Kondratyuk's house in Novosibirsk to acknowledge his contribution to spaceflight, reportedly urging Soviet authorities to start commemorating Kondratyuk.", "-25.823905449942686" ], [ "Fifth Man severely, accusing the authors of the literary equivalent of bait-and-switch.\nYet a close read of this novel and its prequel Oxygen clearly shows that the same character responsible for killing Astronaut Hampton and almost killing the rest of the crew, was also responsible for the failed \"lifeboat\" mission in the earlier novel. More to the point, however, a Fifth Man does exist on Mars. The surviving astronauts see him very briefly before they make their hurried take-off. They do not recognize him, but anyone who has read the third chapter of the Biblical book of Daniel probably will. Thus", "-25.823536912231702" ], [ "earliest description of a space flight by use of a vessel that has rockets attached) and meets the inhabitants. The Moon-men have four legs, firearms that shoot game and cook it, and talking earrings used to educate children.\nHis mixture of science and romance in the last two works furnished a model for many subsequent writers, among them Jonathan Swift, Edgar Allan Poe and probably Voltaire. Corneille and Molière freely borrowed ideas from Le Pédant joué. Death The play suggests that he was injured by a falling wooden beam in 1654 while entering the house of his patron, the Duc D'Arpajon.", "-25.793805129040265" ], [ "Moon Man (book) Moon Man (Der Mondmann in German, Jean de Lune, in French ) is a novel written and illustrated by the French author Tomi Ungerer published in 1966. Plot Moon Man is in the Moon in space. A comet flies by and brings him down to Earth in the ground. People race through the site. Moon Man comes out of the ground and goes to prison because people think he's different. He is trapped in a ball and chain. He enters his third quarter and goes out the window. The general comes to verify that", "-25.785880786832422" ], [ "Back to the Moon Plot summary The prologue of the novel begins with a dramatized account of the second EVA of Apollo 17. Astronaut Jack Schmitt discovers orange soil in Shorty Crater at the very end of the EVA and gathers samples in a race against time to get back to the LEM. Meanwhile, Wernher von Braun is watching the end of the mission on TV with other NASA engineers. Katrina Suttner, the young daughter of one of von Braun's colleagues, is in on a secret involving the mission, and is certain that humans will soon return to the Moon.\nThe", "-25.779661681852303" ], [ "humans to ride the Saturn V rocket into space, on Apollo 8. They also became the first to leave low-Earth orbit and go to another celestial body, entering lunar orbit on December 24. They made ten orbits in twenty hours, and transmitted one of the most watched TV broadcasts in history, with their Christmas Eve program from lunar orbit, which concluded with a reading from the biblical Book of Genesis. Two and a half hours after the broadcast, they fired their engine to perform the first trans-Earth injection to leave lunar orbit and return to the Earth. Apollo 8 safely", "-25.773958320496604" ], [ "end of 1968, a year that had seen much upheaval in the United States and most of the world. They were the first human beings ever to orbit another celestial body, having survived a mission that even the crew themselves had rated as having only a fifty-fifty chance of fully succeeding. The effect of Apollo 8 was summed up in a telegram from a stranger, received by Borman after the mission, that stated simply, \"Thank you Apollo 8. You saved 1968.\"\nThe crew were accorded ticker tape parades in New York, Chicago and Washington, D.C., where they were awarded the NASA Distinguished", "-25.770487119909376" ] ]
kp5kz
Writing in the passive voice is something I like to do ELI5: Why is it such a bad thing?
[ "It's not. Most of these stupid english rules (passive is incorrect, don't split infinitives, don't end sentences in prepositions, etc) came from grammar books published in the 18th and 19th century by people who wanted English to read more like Latin, which they thought was a more scholarly language. It's a form of [linguistic prescription]( URL_1 ), which basically means telling people how they ought to be speaking/writing. See also: URL_0 ", "The passive voice certainly has its uses. A quick scan of the wikipedia entry and I found this: Merriam–Webster's Dictionary of English Usage (1994) recommends the passive voice when identifying the object (receiver) of the action is more important than the subject (agent), and when the agent is unknown, unimportant, or not worth mentioning: The child was struck by the car. The store was robbed last night. In the sentence where the child was struck by the car, the focus of the writer or speaker's intent is the child, not the car. Had the sentence read \"the car struck the child\", then the focus would be on the car as it is the subject of the sentence. In the passive voice, the child is the focus of the sentence (despite the fact that the car is still the subject - I think) and some action is being done *to* it.", "There's nothing inherently wrong with it. Often, sentences structured that way can sound stilted, awkward, or wordy, which is why a lot of English teachers will tell you not to use passive voice. In this case, the problem isn't with the passive voice itself, but with inexperienced writers' inability to use it effectively. It certainly doesn't come very naturally, except in cases of victimization; most often, sentences will read more clearly and be more concise in active voice. However, if you're planning to publish any sort of scientific paper ever in your life, it's best not to listen to those English teachers, because you'll need those passive-voice-ification skills they're trying to drill out of you. Overall, it's generally best to learn where and when passive voice is most effective, use it in those cases, and stick to active voice elsewhere.", "We're taught that it is \"bad\" because usually an active voice makes the sentence easier to understand. We've grown up with most of our sentences following a \"subject verb\" structure. Passive - The ball was thrown by the boy. Active - The boy threw the ball. The active voice places the \"actor\" at the front, so you know immediately who is doing what. In the passive voice, you are first told what was done, and then finally who did it." ]
[ [ "English passive voice Misuse of the term Though the passive can be used for the purpose of concealing the agent, this is not a valid way of identifying the passive, and many other grammatical constructions can be used to accomplish this. Not every expression that serves to take focus away from the performer of an action is an instance of passive voice. For instance \"There were mistakes.\" and \"Mistakes occurred.\" are both in the active voice. Occasionally, authors express recommendations about use of the passive unclearly or misapply the term \"passive voice\" to include sentences of this type. An example", "-29.293416018830612" ], [ "Compulsive talking Compulsive talking (or talkaholism) is talking that goes beyond the bounds of what is considered to be socially acceptable. The main factors in determining if someone is a compulsive talker are talking in a continuous manner or stopping only when the other person starts talking, and others perceiving their talking as a problem. Personality traits that have been positively linked to this compulsion include assertiveness, willingness to communicate, self-perceived communication competence, and neuroticism. Studies have shown that most people who are talkaholics are aware of the amount of talking they do, are unable to stop,", "-28.938613068836275" ], [ "clause to have no subject.\nUse of the passive voice is not as common in Finnish as in Germanic languages; sentences in the active voice are preferred, if possible. Confusion may result, as the agent is lost and becomes ambiguous. For instance, a bad translation of the English \"the PIN code is asked when...\" into PIN-koodia kysytään kun... begs the question \"who asks?\", whereas laite kysyy PIN-koodia kun... (\"the device asks for the PIN code when...\") is unambiguous. Nevertheless, this usage of the passive is common in Finnish, particularly in literary and official contexts. Occasionally this leads to extreme cases such", "-28.567827318795025" ], [ "tasks (Bodrova & Leong 2007). Children talk to themselves aloud while carrying out a task or activity; this is what Piaget called \"egocentric speech\" (1926), but has more recently come to be known as \"private speech.\" To guide themselves, children often use speech or phrases that they have heard during collaborative action with peers or adults, and sometimes even imitate their caregiver's voice (Luria 1961). There is evidence that the proportion of private speech that children use increases when the task they are engaging in is more difficult or novel; in addition, private speech tends to precede action in these", "-28.088449900213163" ], [ "that the authors misunderstood what constitutes the passive voice, and he criticized their proscription of established and unproblematic English usages, such as the split infinitive and the use of which in a restrictive relative clause. On Language Log, a blog about language written by linguists, he further criticized The Elements of Style for promoting linguistic prescriptivism and hypercorrection among Anglophones, and called it \"the book that ate America's brain\".\nThe Boston Globe's review described The Elements of Style Illustrated (2005), with illustrations by Maira Kalman, as an \"aging zombie of a book ... a hodgepodge, its now-antiquated pet peeves jostling for space", "-28.063938214909285" ], [ "are voiced, giving members previously unaware of them more reason to lean in that direction. PAT is an example of informational influence. Although PAT has strong empirical support, it would imply that unshared items of information on the opposite side of the favored position would also come up in discussion, canceling the tendency to polarize. Research has shown that when group members all lean in one direction, discussion content is biased toward the side favored by the group, inconsistent with PAT. This finding is consistent with social comparison notions; upon discovering where the group stands, members only voice items of", "-27.891733256634325" ], [ "supportive services. One such is to sit as close to the teacher as possible improves the student's ability to hear the teacher's voice and to more easily read the teacher's lips. When lecturing, teachers can help the student by facing them and by limiting unnecessary noise in the classroom. In particular, the teacher can avoid talking when their back is turned to the classroom, such as while writing on a whiteboard. Instructing while using a sign language is often consider the best option for Deaf/Hard of Hearing students.\nSome other approaches for classroom accommodations include pairing Deaf/Hard of Hearing students", "-27.788084296131274" ], [ "the following sentence which is in passive voice:\nThe potatoes were eaten by Kabaisa.\nThe words were eaten indicate the passive voice.\nThe passive voice shows that something has been acted upon by someone or something else. Passive The passive voice is employed in a clause whose subject expresses the theme or patient of the verb. That is, it undergoes an action or has its state changed.\nIn the passive voice the grammatical subject of the verb is the recipient (not the doer) of the action denoted by the verb.\nSome languages, such as English and Spanish, use a periphrastic passive voice; that is,", "-27.652473318506964" ], [ "monologues about topics that bore the listener, fails to provide context for comments, or fails to suppress internal thoughts. Individuals with AS may fail to detect whether the listener is interested or engaged in the conversation. The speaker's conclusion or point may never be made, and attempts by the listener to elaborate on the speech's content or logic, or to shift to related topics, are often unsuccessful.\nChildren with AS may have a sophisticated vocabulary at a young age and such children have often been colloquially called \"little professors\", but have difficulty understanding figurative language and tend to use language literally.", "-27.645497104909737" ], [ "of speech, which resides in the left hemisphere, on the right side of the brain. This is casually known as the \"singing center.\" By teaching stroke victims to sing their words, this can help train this area of the brain for speech. In support of this theory, Levitin asserts that \"regional specificity,\" such as that for speech, \"may be temporary, as the processing centers for important mental functions actually move to other regions after trauma or brain damage.\" Thus in the right hemisphere of the brain, the \"singing center\" may be retrained to help produce speech. Singing animals Scholars agree", "-27.54742336354684" ], [ "belong to a more prestigious speech community. A common instance of hypercorrection in English is the use of the personal pronouns \"you and I\" as a correction of \"me and you\" in situations in which the accusative personal pronoun \"me\" is more appropriate. Because the use of \"you and I\" is internalized as the more grammatically sound form in the mind of many English speakers, that rule becomes over-applied in a situation when a speaker wants to compensate for perceived linguistic deficiencies. A speaker may try to avoid feelings of linguistic insecurity and perceived stigmatization by projecting a more educated", "-27.48912637165631" ], [ "of hesitation forms as being to dissociate oneself slightly from the harsh reality of what is to follow. With the use of a beat of time filled with a meaningless interjection, uncommitted people who are \"into distancing\" make use of such formulaic language to create a little distance between themselves and their words, as if it might lessen the impact of their words.\nHowever, not all forms of formulaic language are considered appropriate or harmless.There are examples of formulaic language production that lean towards being offensive, for instance, the use of anything considered to be profanity within a given culture.\nIn this", "-27.458780255634338" ], [ "Alogia In psychology, alogia (Greek ἀ-, “without”, and λόγος, “speech”), or poverty of speech, is a general lack of additional, unprompted content seen in normal speech. As a symptom, it is commonly seen in patients suffering from schizophrenia and schizotypal personality disorder, and is considered a negative symptom. It can complicate psychotherapy severely because of the considerable difficulty in holding a fluent conversation.\nAlogia is often considered a form of aphasia, which is a general impairment in linguistic ability. It often occurs with intellectual disability and dementia as a result of damage to the left hemisphere of the", "-27.382890080319157" ], [ "amount of language input the listener is able to understand. These negative emotions prevent efficient processing of the language input. The hypothesis further states that the blockage can be reduced by sparking interest, providing low-anxiety environments, and bolstering the learner's self-esteem.\nAccording to Krashen (1982), there are two prime issues that prevent the lowering of the affective filter. The first is not allowing for a silent period (expecting the student to speak before they have received an adequate amount of comprehensible input according to their individual needs). The second is correcting their errors too early on in the learning process. Reception", "-27.348964943783358" ], [ "low and listeners get the gist of what the speaker is discussing. On the other hand, if a speaker is shouting and/or using emotionally driven words, listeners tend to remember key phrases and the meaning of the speech. This is full access of the fight or flight mechanism all people have functioning in the brain, but based on what triggers this mechanism will lead to better recall of it. People tend to focus their attention on cues that are loud, very soft, or something unusual. This makes the auditory system pick up the differences in regular speaking and meaningful speech,", "-27.226206475992512" ], [ "In other, more severe cases, the individual with speech problems may compensate with AAC devices.\nSpeech impairments can seriously limit the manner in which an individual interacts with others in work, school, social, and even home environments. Inability to correctly form speech sounds might create stress, embarrassment, and frustration in both the speaker and the listener. Over time, this could create aggressive responses on the part of the listener for being misunderstood, or out of embarrassment. Alternatively, it could generate an avoidance of social situations that create these stressful situations. Language impairments create similar difficulties in communicating", "-27.160818433156237" ], [ "or exactly what it is. For example, Hebrew speakers acquiring English, may understand how the passive voice, 'a cake is made', works, but may prefer active voice, 'I make a cake,' thus avoiding the passive construction. Kellerman (1992) distinguishes three types of avoidance: (1) learners of the L2 make anticipations or know there is a problem with their construction and have a vague idea of the target construction, (2) the target is known by the L1 speaker, but it is too difficult to use in given circumstances; such as conversational topics that the L1 speaker may have a deficiency in", "-27.12052293200395" ], [ "with their voice, instead of having to look at the screen and keyboard.\nStudents who are physically disabled or suffer from Repetitive strain injury/other injuries to the upper extremities can be relieved from having to worry about handwriting, typing, or working with scribe on school assignments by using speech-to-text programs. They can also utilize speech recognition technology to freely enjoy searching the Internet or using a computer at home without having to physically operate a mouse and keyboard.\nSpeech recognition can allow students with learning disabilities to become better writers. By saying the words aloud, they can increase the fluidity of their", "-27.0976823559904" ], [ "speakers from those who lack confidence in their social standing and thus avoid its use entirely. Rhetorical and popular usage Ain't can be used in both speech and writing to catch attention and to give emphasis, as in \"Ain't that a crying shame\", or \"If it ain't broke, don't fix it.\" Merriam-Webster's Collegiate Dictionary gives an example from film critic Richard Schickel: \"the wackiness of movies, once so deliciously amusing, ain't funny anymore.\" It can also be used deliberately for what The Oxford Dictionary of American Usage and Style describes as \"tongue-in-cheek\" or \"reverse snobbery\". Star baseball pitcher Dizzy", "-27.08444287715247" ], [ "interjection to either focus attention on the speaker or to convey some emotional state such as surprise, regret, disbelief, etc. Finally, example (f) uses say in an emphatic, often imperative way. This function dates from the (early) Middle English period Emergence of innovative forms: go, be all, be like In addition to basic verba dicendi and manner of speaking verbs, other forms are frequently used in spoken English. What sets these apart is that they are not, semantically speaking, reporting verbs at all. Such forms include be like, be all, and go.\n(19)a. Pat was like “I’ll call you.”\n ", "-27.030178315297235" ], [ "cry.\") Such phrasings may put one's scene partner in a difficult position. At the same time characters do not always succeed and this may mitigate problems while this usage may help create emotional vitality. Teachers also differ on using physically oriented goals. Some find them petty while others find they help actors act more convincingly by lending a sense of physical truth in addition to mental/willful truth.\nObstacle refers to what stops the character from achieving their goal. Drama needs (both in terms of practice and the need for interest) conflicts, which arise not only from the goals but from fighting", "-26.96101897623157" ], [ "silent reading, low-vocalizers read louder to compensate for this lack of movement so they can understand the material. When individuals undergo “feedback training”, where they are conscious of these muscle movements, this difference diminishes. Role in articulation Articulation during silent speech is important, though speech is not solely dependent on articulation alone. Impairing articulation can reduce sensory input from the muscle movements of the larynx to the brain to understand information being read and it also impaires on-going speech production during reading to direct thinking. Words that are of high similarity minimize articulation, causing interference, and may reduce", "-26.945691014116164" ], [ "often sounds more or less like:\n\"Don't be fooled into thinking you are welcome here. [...] You are not wanted, and you and your families will be shunned, excluded, beaten, and driven out, whenever we can get away with it. We may have to keep a low profile right now. But don't get too comfortable. [...] Be afraid.\"\nAnother function of hate speech is to let others with similar views know they are not alone, to reinforce a sense of an in-group that is (purportedly) under threat. A typical message sent this time to like-minded individuals can read like:\n\"We know some of", "-26.939063705620356" ], [ "spiral of silence is less likely to be activated in the United States, because individuals are more likely to put emphasis on their personal goals. They put the \"I\" identity over the \"we\" identity, and strive for personal success. Therefore, it was hypothesized that they would be more likely to speak out, regardless of if they are in the minority. On the other hand, it was predicted that individuals in Taiwan put more emphasis on the collective goal, so they would conform to the majority influence in hopes of avoiding tension and conflict. The study also tested the effect of", "-26.911532723215714" ], [ "Edwin Vaughan, a sociologist and longtime activist for the blind, argues that since \"in common usage positive pronouns usually precede nouns\", \"the awkwardness of the preferred language focuses on the disability in a new and potentially negative way\". According to Vaughan, it only serves to \"focus on disability in an ungainly new way\" and \"calls attention to a person as having some type of 'marred identity'\" in terms of Erving Goffman's theory of identity. In the social model of disability, a person \"is\" disabled by societal and environmental factors.\nIn 1993, the National Federation of the Blind adopted a resolution condemning", "-26.88546290929662" ], [ "writing, and be alleviated of concerns regarding spelling, punctuation, and other mechanics of writing. Also, see Learning disability.\nUse of voice recognition software, in conjunction with a digital audio recorder and a personal computer running word-processing software has proven to be positive for restoring damaged short-term-memory capacity, in stroke and craniotomy individuals. People with disabilities People with disabilities can benefit from speech recognition programs. For individuals that are Deaf or Hard of Hearing, speech recognition software is used to automatically generate a closed-captioning of conversations such as discussions in conference rooms, classroom lectures, and/or religious services.\nSpeech recognition is also very useful", "-26.87102556148602" ], [ "are situated in certain temporal and spatial conditions that define who they are, either oppressor or oppressed, and he suggests that dialogue defines humanity. Likewise, Elizabeth Ellsworth discusses the oppressive myths that perpetuate power dynamics in the classroom, including racism on campuses. She calls for a new critical pedagogy \"of the unknowable,\" suggesting a need to recognize the absence of universal notions of dialogue, rationality, or knowledge, and instead openly acknowledge the many differing social groups and discourse communities in every classroom. Thus, critical pedagogy can be seen as/in an activist pedagogy, taking into account political inequalities and empowering students", "-26.869705116027035" ], [ "such as Dr. Martin Luther King, Jr., and personal stories from everyday Americans, which helps the audience connect emotionally with the speech. Voicing is a powerful rhetorical device because the audience can engage in the speech by reacting through chants, cheers, and vocalizations Voicing changes the definitions of roles so that the speaker is not the only active participant.\nIn a January 26, 2008 speech in South Carolina, Obama told three stories of a woman struggling to make ends meet, a man who cannot find work, and a woman who is waiting for her son to return from Iraq. Obama", "-26.84515671567351" ], [ "with others, but may also include difficulties in understanding what others are trying to say (receptive language). Because of the pervasive nature of language impairments, communicating, reading, writing, and academic success may all be compromised in these students. Similar to individuals with speech impairments, individuals with language impairments may encounter long-term difficulties associated with work, school, social, and home environments. Assistive technology Augmentative and alternative communication (AAC) includes all forms of communication other than oral communication that an individual might employ to make known his/her thoughts. AAC work to compensate for impairments that an individual might have with", "-26.83639711746946" ], [ "as a result listeners may be confused and forget the correct meaning. Overcoming listening barriers The active listening technique is used to improve personal communications in organizations. Listeners put aside their own emotions and ask questions and paraphrase what the speaker says to clarify and gain a better understanding of what the speaker intends to say. Judging or arguing prematurely is a result of holding onto a strict personal opinion. This hinders the ability to be able to listen closely to what is being said. Eye contact and appropriate body languages are seen as important components to active listening.", "-26.83066969871288" ], [ "Sparks, Helm, and Albert, is a method used by music therapists and speech-language pathologists to help people with communication disorders caused by damage to the left hemisphere of the brain by engaging the singing abilities and possibly engaging language-capable regions in the undamaged right hemisphere.\nWhile unable to speak fluently, patients with non-fluent aphasia are often able to sing words, phrases, and even sentences they cannot express otherwise. MIT harnesses the singing ability of patients with non-fluent aphasia as a means to improve their communication. Although its exact nature depends on the therapist, in general MIT relies on the use of", "-26.8171119063918" ], [ "for why the spiral of silence theory has less of an effect online could be that studies do not acknowledge whether the person is more likely to speak out against dominant views offline as well. The person might have characteristics that make him comfortable speaking out against dominant views offline, which make them just as comfortable speaking out in an online setting. Even though research suggests that there is a chance people will speak out with their opinions more often in an online setting, silencing of views can still occur. Another research article examined the influence of different opinion climates", "-26.76338546280749" ], [ "Internal monologue Negative self-talk Negative self-talk (also known as unhelpful self-talk) refers to inner critical dialogue. It is based on beliefs about ourselves that develop during childhood based on feedback of others, particularly parents. These beliefs create a lens through which the present is viewed. Examples of these core beliefs that lead to negative self-talk are: \"I am worthless\", \"I am a failure\", \"I am unlovable\". Relation to the self Inner speech is strongly associated with a sense of self, and the development of this sense in children is tied to the development of language. There are, however,", "-26.760827356381924" ], [ "Vygotsky, Winsler considers the use of private speech to be an important turning point in a child's development, as it supports the child in verbalizing their thoughts, regulating their attention, and helping them produce decisions on their own. According to Winsler, private speech is beneficial in lowering impulsivity in small children, while increasing performance as they learn to recollect and express their train of thought.\nWinsler is also known for his research on early childhood education, where he has focused on evaluating the cognitive, language, and social-emotional outcomes and school readiness of children from diverse backgrounds, many who come from low-income", "-26.751498179102782" ], [ "many people that are unable to speak are not cognitively impaired, but are simply suffering from an inability to produce the sounds for speech. A helper or “facilitator” assists by guiding the non-speaking person’s hand over a keyboard. However, empirical tests have revealed that the facilitator is actually the one doing the typing, and not the person with the disability. Stuart Vyse, reporting for Skeptical Inquirer, commented that “it is unfortunate that a leading Down syndrome advocacy group is promoting a belief system over evidence-based methods that work.”", "-26.73816515802173" ], [ "zǒu, \"I cannot not go\") tries to emphasize that the situation is out of the speaker's hands and that the speaker has no choice in the matter: \"Unfortunately, I have got to go\". Similarly, \"没有人不知道\" (Méiyǒu rén bù zhīdào, \"There is not a person who does not know\") is a more emphatic way to express \"Everyone knows\".\nDouble negatives nearly always resolve to a positive meaning even in colloquial speech, while triple negatives resolve to a negative meaning. For example, \"我不相信没人不来\" (Wǒ bù xiāngxìn méi rén bù lái, \"I do not believe no one will not come\") means \"I do not", "-26.726306404496427" ], [ "found in nonstandard dialects of English, such as \"ain't\". Rationale Bourland and other advocates also suggest that use of E-Prime leads to a less dogmatic style of language that reduces the possibility of misunderstanding or conflict.\nKellogg and Bourland describe misuse of the verb to be as creating a \"deity mode of speech\", allowing \"even the most ignorant to transform their opinions magically into god-like pronouncements on the nature of things\".", "-26.68561660742853" ], [ "they have at their disposal, results in students experiencing personal empowerment and expressing a personal voice—the unique expression of the self that seems like hearing that particular person speak in their writing.\nCritical pedagogy in dialogue journal writing creates contexts for students to think critically, often in collaboration with the teacher, and develop communicative language abilities as well as critical understanding and awareness of the language and the world. When critical pedagogy is used in language teaching and in interactive writing, learners have the opportunity to use the language in context, use it in writing to consider authentic situations, and think", "-26.6310448787699" ], [ "object to the idea of being pressured into speaking and writing in a way that does not come naturally, and criticize the proposed changes as a form of socially enforced censorship that unnecessarily constrains freedom of speech.\nMany people do not enjoy being criticized for using \"offensive\" language, when no offense was meant and they do not advocate the ideas which inclusivists say are implicit in the language. Sometimes people use inclusive language because it is socially acceptable, despite actually holding discriminatory views, either openly or secretly. Advocates hope that asking people to use inclusive language, even if they don't explicitly", "-26.59366383170709" ], [ "as compulsive talkers talk with a greater frequency, dominate conversations, and are less inhibited than others. They have also been found to be more argumentative and have a positive attitude regarding communication. Tendencies towards compulsive talking also are more frequently seen in the personality structure of neurotic psychotic extraverts. It has also been found that talkaholics are never behaviorally shy. Talkaholic scale In 1993 James C. McCroskey and Virginia P. Richmond constructed the Talkaholic Scale, a Likert-type model, to help identify those who are compulsive talkers. A score of 40 or above, which indicates two standard deviations above", "-26.53689778968692" ], [ "person might increase the loudness in their voice while the other spoke softer and softer, each trying to lead the conversation towards their style's conception of normal talking. Systems of holding back Systems of holding back are also a form of schismogenesis. They are defined as \"mutually aggregating spirals which lead people to hold back contributions they could make because others hold back contributions they could make.\"\nIn Systems intelligence literature, it is held that human interaction has a tendency to fall into such systems unless conscious effort is made to counter this tendency. For example, although most managers would want", "-26.530879760248354" ], [ "person is saying, while at the same time take notes during the discussion. The leader must narrow down to a single focus instead of looking at all the aspects spoken during the discussion. The leader focuses on similar phrases and words to narrow down the discussion to a single topic.\nRephrasing refers to skills in which the leader repeats what others are saying for more clarification during a group discussion. The focus group leader typically asks group members for more in-depth opinions after rephrasing. It allows group members to have a broad perspective in order to view topics from different angles", "-26.52747348038247" ], [ "dominant or on the rise. Conversely, when individuals perceive that their opinion is less popular or losing popularity, they are less likely to voice it in public. What one individual decides to do affects all of society around them. Vocal minority and hardcore The theory explains a vocal minority (the complement of the silent majority) by stating that people who are highly educated, or who have greater affluence, and the few other cavalier individuals who do not fear isolation, are likely to speak out regardless of public opinion. It further states that this minority is a necessary factor of change", "-26.518777398508973" ], [ "about real change, we cannot work within the racist, patriarchal framework because change brought about in that will not remain.\nAlso in Sister Outsider is \"The Transformation of Silence into Language and Action.\" Lorde discusses the importance of speaking, even when afraid because one's silence will not protect them from being marginalized and oppressed. Many people fear to speak the truth because of how it may cause pain, however, one ought to put fear into perspective when deliberating whether to speak or not. Lorde emphasizes that \"the transformation of silence into language and action is a self-revelation, and that", "-26.429429996060207" ], [ "the /l/, to denote disapproval or disfavor on the part of the speaker. Either form is correct. Devoicing Devoicing occurs at the ends of phrases. That is especially notable with the phoneme /m/ and with vowels. Yaqui speech often sounds \"breathy\" to English-speakers. Gestures One word, laute, has two contradictory meanings: \"quickly\" and \"slowly\". (English has mercurial, which can mean either \"unhesitating\" or \"scatter-brained\", and quite which can mean \"very\" or \"a little\".)\nLaute is often accompanied with a quick or slow open-handed movement to indicate the meaning, or it could be translated as \"at a different rate of speed\" and", "-26.356088674307102" ], [ "possibly curtailing free speech on genuine political matters and limiting the scope of constitutionally entrenched fundamental liberties.\nDespite such criticisms, some social activist groups remain optimistic that Speakers' Corner represents a step towards political liberalization and the promise of a wider political space. Although Dr. Kenneth Paul Tan, Assistant Dean of the Lee Kuan Yew School of Public Policy, has noted that initial cynicism was inevitable as Speakers' Corner was a top-down initiative, he recognizes that civil society activists have since actively occupied and made use of Speakers' Corner to generate public interest in various social and political issues. This view", "-26.35100915719522" ], [ "to a text—what Stewart calls the \"phonetic undertow of literary writing\". Subvocalization has been corroborated by empirical science. Minuscule movements in the larynx and other muscles involved in speech have been observed in subjects during silent reading. While the vocal cords do not outwardly activate, it has been proposed that subvocalization reduces the cognitive load on working memory, and that reading comprehension depends as much on the way words \"sound\" in the reader's mind as it does on the words' visual (typographical) arrangement. Stewart argues that this phonotext, so often ignored by the \"phonophobia\" of post-Derridean deconstruction, opens up new", "-26.31892949139001" ], [ "tone, the timbre excellent – imperative, very sharp. A slightly lower pitch would have been better, but it could still fall within this man's spectrum.\" The Voice may also be subtly employed in any manner of conversation, public speaking, or debate to help soothe, convince, persuade, influence, or otherwise enhance the effect of the words being spoken.\nThe Voice is useless against targets who cannot hear the speaker; both Baron Harkonnen in Dune and House Corrino in Children of Dune employ deaf people to guard Jessica, knowing that she cannot control them via the Voice. Being a manipulation of the target's", "-26.317984150548" ], [ "angry,\" because the mediopassive voice is rarely used. Many intransitive Spanish verbs behave that way: me caí, I fell; me cansé, I became tired. Croatian Croatian and other Slavic languages are very similar in this respect to Spanish, employing the same constructs with the passive/reflexive particle se: Otac se razljutio kad je njegov sin razbio svjetiljku. This would be again literally translated \"The father angered himself when his son broke the lamp.\" Similar constructs are Svjetiljka se razbila \"The lamp broke\" and Vrata su se zatvorila \"The door closed.\" However, not all verbs permit such use.\nThe (medio)passive is used when", "-26.30719009997847" ], [ "extreme language against an individual or a group that either implies a direct threat that physical force will be used against them, or is seen as an indirect call for others to use it.\" Sprinzak argues that verbal violence is often a substitute for real violence, and that the verbalization of hate has the potential to incite people who are incapable of distinguishing between real and verbal violence to engage in actual violence.\nPeople tend to judge the offensiveness of hate speech on a gradient depending on how public the speech is and what group it targets. Although people's opinions of", "-26.300364210852422" ], [ "engine) to generate grammatical English out of it.\nFreeSpeech is language-independent, meaning it uses pictures of objects, actions, and even abstract ideas like the past tense, instead of English words like \"I\" or \"eat\". Some shown on the TED talk include a bowl of soup, a person talking, and a small clock with an arrow pointing backward to signify the past tense of a verb.\nFreeSpeech was tested widely among children with special needs such as autism and language impairments, to teach them grammar. It also saw use by children in the Deaf community to learn literacy—a task complicated by the unique", "-26.272995888837613" ], [ "and \"people who talk just to hear themselves.\" So he wrote: \"It is more difficult to write than to think, much more difficult: so everyone thinks.\"", "-26.262397193990182" ], [ "explored voice more extensively. According to Taylor Stoehr, \"voice is the pervasive reflection in written or spoken language, of an author's character, the marks by which we recognize his utterance as his.\". However, just as in Aristotle's time set of specific rules or guidelines has yet been laid out for the production or interpretation of voice. Due to the vast array of elements involved in the production of voice this task would be nearly, if not entirely, impossible. \nLanguage\nAs mentioned before, Aristotle thought the language of a speech should avoid being too", "-26.255227673449554" ], [ "that they have internalised the idea that they are not entitled to raise their voice.\" By this logic, he says that those with intellectual disabilities are muted. Calvez's study examines the experiences of those with intellectual disabilities, with special attention to the fact these groups are often marginalized and silenced.\nMany disabled groups are silenced by the dominant abled group that knowingly or unknowingly exclude them. The means of muting, ridicule, ritual, control, and harassment can all apply to disabled groups. Ableist language, such as use of the pejorative term \"retard\", can be used to ridicule disabled groups. By bringing attention", "-26.253948322031647" ], [ "we are, based on our communicative practices with others. Foucault uses this concept in his analysis of the political economy and natural history, but it’s very useful when studying organizational communication.\nDiscursive formations perhaps can intensify the conditioning of the silent employee based on the power aspect of the discourse itself. When one speaks or writes, a message can be delivered in a certain context, and that can have an effect on the employee on whether or not to remain silent. Discourse is the product of the dominant power interests in organizations and these interests can perpetuate themselves based", "-26.247344729024917" ], [ "among the most successfully treated speech and language problems because they can be solved with surgery or reconditioning of the voice (Boone 286).\nA phonation disorder is a problem with pitch, loudness, or intensity that originates in the vocal folds of the larynx. Phonation disorders may be functional, caused by continuous yelling or throat clearing, excessive smoking, or speaking at an abnormally low frequency or pitch. The results may be an increased size or thickening of the vocal folds, lesions or polyps on the vocal folds, or problems with elasticity of the larynx. In these cases, the treatment involves resting the", "-26.23364125547232" ], [ "communicators may become resentful because they feel as if their own needs are not being met and may become confused because they cannot identify their own feelings. People on the receiving end of passive communication typically feel frustrated, guilty, and may discount the passive communicator for not knowing what they want. While engaging in this type of communication, passive individuals typically feel anxious during the conversation and hurt or angry later.\nPassive communicators tend to build dependency relationships, often do not know where they stand in situations, and will over-promote others, all resulting in depletion of their self-esteem. Passive communicators do", "-26.21470529551152" ], [ "voices its position, but the mediators must be neutral and non-biased. But the mediators fail to conduct discussions in a constructive impartial manner.\"", "-26.149519703365513" ], [ "speakers. Passive speakers are often targeted in language revival efforts to increase the number of speakers of a language quickly, as they are likely to gain active and near-native speaking skills more quickly than those with no knowledge of the language. They are also found in areas where people grow up hearing another language outside their family with no formal education. Passive language A passive language is a related term used in interpreting or translating. It is the language or languages from which the interpreter works. For example if an interpreter's job is to translate from German, Dutch and Swedish", "-26.134099389200856" ], [ "Voices of the Poor Voices of the Poor was an effort in the 1990s through 2000 by the World Bank to collect the experiences of the poor across the world. The name is also used for the reports that were eventually published from the effort. The effort consisted of two parts: primary research using participatory poverty assessment (PPA) in 23 countries, and reviews of existing PPAs and other participatory research. The project was originally called \"Consultations with the Poor\", but was changed to \"Voices of the Poor\" in late 1999.\nVoices of the Poor also informed the 2000 World Development Report.", "-26.128026106394827" ], [ "include fears that the teaching style will reduce the available time to teach content material, difficulties getting teachers \"on board\" with the style, as well as fears that the teacher is ill-equipped to teach writing. Ramsay also found while working in Jamaica, that students who were unable to compose in their first language (either because of academic deficiencies or because the language did not have a written language) had difficulties composing in their second language using WAC practices. This was a sentiment echoed by Alexander Friedlander, who in his research found that students unable to write in their first language", "-26.127432713110466" ], [ "excessively friendly to conceal their anger or frustration. \nPeople on the receiving end of passive-aggressive communication are usually left confused, angry, and hurt. They tend to be alienated from others because they elicit these unpleasant feelings. A passive-aggressive communication style does not address and properly deal with the pertinent issues or problems. This maladaptive problem-solving style keeps passive-aggressive communicators in a state of powerlessness, resulting in continued passive-aggression.\nExamples of Passive-Aggressive Language/Behavior include: wistful statements, backhanded compliments, purposefully ignoring or saying nothing, leaving someone out, sabotaging someone, and muttering to oneself instead of confronting the issue.", "-26.080933419216308" ], [ "rationality but, allowing for the immeasurable wide range of human experience, to see them as they really are.\" While the language \"as they really are\" is debatable, rhetorical critics explain texts and speeches by investigating their rhetorical situation, typically placing them in a framework of speaker/audience exchange. The antithetical view places the rhetor at the center of creating that which is considered the extant situation; i.e., the agenda and spin. Purpose of criticism Rhetorical criticism serves several purposes or functions. First, rhetorical criticism hopes to help form or improve public taste. It helps educate audiences and", "-26.06304664176423" ], [ "the child watches a video of him/herself performing the desired action, can be useful.\nIf additional confounding speech problems exist, a SLP may work with the student to identify what factors are complicating speech production and what factors might be increasing the mute behaviors. Additionally, he/she might work with the individual to become more comfortable with social situations, and with the qualities of their own voice. If voice training is required, they might offer this as well. Aphasia Aphasia refers to a family of language disorders that usually stem from injury, lesion, or atrophy to the left side of", "-26.06071899156086" ], [ "instead of criticism, because \"feedback\" may sound more neutral, while criticism may seem to be about \"finding fault\". A more polite language may be used when there are issues of authority and obedience (\"who has to follow whom\"), as well as the need for cooperative teamwork to get a job done (\"constructive collegial attitude\"). The question is often \"who controls the feedback\", \"who is allowed to criticize\", \"who owns the problem\" and \"who is to do something about the problem\". It may be that managers educate employees to employ a more positive and professional language, in order to get them", "-26.0316748310579" ], [ "Do-support Further uses In addition to providing do-support in questions and negated clauses as described above, the auxiliary verb do can also be used in clauses that do not require do-support. In such cases, do-support may appear for pragmatic reasons. Meaning contribution In the various cases seen above that require do-support, the auxiliary verb do makes no apparent contribution to the meaning of the sentence so it is sometimes called a dummy auxiliary. Historically, however, in Middle English, auxiliary do apparently had a meaning contribution, serving as a marker of aspect (probably perfective aspect, but in some cases, the meaning", "-26.009616911935154" ], [ "studied how affect impacts the cognitive responses to a persuasive message.\nShe has also studied the influence of self-talk in the regulation of behavior. Her research provided a socio-cognitive understanding on the conditions and effects of this form of speech. Her research showed that people talk to themselves using the pronoun I, but sometimes, they also address themselves in the second person pronoun, you. According to her research, when people require conscious self-guidance, people refer to themselves as you. Moreover, she concluded that the second-person mode of self-talk contribute to effective self-regulation.\nIn the late 1990's she investigated how intention facilitates actual", "-25.993170984322205" ], [ "positivity of emotions such as pride and satisfaction, which can motivate people to reach their goal.\nThe use of self-talk goes beyond the scope of self-improvement for performing certain activities, self-talk as a linguistic form of self-help also plays a very important role in regulating people’s emotions under social stress. First of all, people using non-first-person language tend to exhibit higher level of visual self-distancing during the process of introspection, indicating that using non-first-person pronouns and one’s own name may result in enhanced self-distancing. More importantly, this specific form of self-help also has been found can enhance people’s ability to regulate", "-25.991723882907536" ], [ "and reading materials limited. The inmates used the term, \"each one, teach one\" as a battle cry to ensure everyone in the movement was educated. \nThe phrase is used as a slogan in literacy campaigns in Nigeria. Asia In the first half of the 20th century, the phrase was applied to the work of a Christian missionary, Dr. Frank Laubach, who utilized the concept to help address poverty and illiteracy in the Philippines. Many sources cite Dr. Laubach as creating the saying, but many others believe that he simply used it in order to advance the cause of ending illiteracy", "-25.990880261349957" ], [ "our place\") and menkäämme meille (\"let us go to our place\") are replaced by mennään meille (see spoken Finnish).\nBecause of its vagueness about who is performing the action, the passive can also translate the English \"one does (something)\", \"(something) is generally done\", as in sanotaan että… \"they say that…\"\nFormation of the passive is dealt with in the article on Finnish verb conjugation. As first-person plural In modern colloquial Finnish, the passive form of the verb is used instead of the active first-person plural in the indicative and the imperative, to the almost complete exclusion of the standard verb forms. For", "-25.98761997418478" ], [ "use; other studies indicate that cognitive dissonance can be used to encourage people to act pro-socially, such as campaigns against public littering, campaigns against racial prejudice, and compliance with anti-speeding campaigns. The theory can also be used to explain reasons for donating to charity.\nCognitive dissonance can be applied in social areas such as racism and racial hatred. Acharya of Stanford, Blackwell and Sen of Harvard state CD increases when an individual commits an act of violence toward someone from a different ethnic or racial group and decreases when the individual does not commit any such act of violence. Research", "-25.980344829848036" ], [ "appeals to audience imagination and hopes; done when the speaker paints a scenario of positive future results of following the course of action proposed.\nIn some cases, downplaying the ethos can be done while emphasizing pathos, for example as William Jennings Bryan did in his Cross of Gold speech:\nI would be presumptuous, indeed, to present myself against the distinguished gentlemen to whom you have listened if this were but a measuring of ability; but this is not a contest among persons. The humblest citizen in all the land when clad in the armor of a righteous cause is stronger than all", "-25.975366854050662" ], [ "online discussion without the pressure of complying with the majority group.\" This is not to say that a spiral of silence does not occur in an online environment. People are still less likely to speak out, even in an online setting, when there is a dominant opinion that differs from their own. But people in the online environment will speak up if someone has a reference group that speaks up for them. In an online situation, just having one person be there to encourage a minority point of view can put an end to a spiral of silence. Another reason", "-25.972840722824913" ], [ "to indicate that the first speaker is unimportant.\nFailing to speak can also be rude: a rude person might pointedly ignore a legitimate and polite greeting or question to communicate disregard for the other person, or might fail to express appropriate thanks for favors or gifts by way of communicating either a sense of selfish entitlement or a disregard for the efforts of the giver. Sometimes people will leave very short gaps when speaking that may allow another person to begin speaking on a subject, however that can vary, and sometimes two or more people speaking at the same", "-25.955918631108943" ], [ "of several new words and phrases added to Oxford Dictionaries. Martin states that \"the perceived orthodoxy [of progressive politics] has prompted a backlash among people who feel their speech is being policed\".\nIn May 2014, the concept was incorporated into a parody role-playing video game titled Social Justice Warriors. Developed by Nonadecimal Creative, Social Justice Warriors involved the concept of debating online against Internet trolls who make racist and other provocative comments by choosing from different responses such as \"'dismember their claims with your logic,' rebroadcast their message to be attacked by others, or go for the personal attack.\" Users were", "-25.944029042613693" ], [ "social discretion, embarrassment and defiance. In Western literature, the essence of the difference between just talking and really communicating through silence is analyzed in Harold Pinter’s The Dumb Waiter.\nIn negotiation, haragei is characterised by euphemisms, vague and indirect statements, prolonged silences and careful avoidance of any comment that might cause offense. Information is communicated through timing, facial expression and emotional context, rather than through direct speech. It is sometimes considered a duplicitous tactic in negotiation to obfuscate one's true intentions, which may cause haragei to be viewed with suspicion in the West. It can also be misconstrued by those with", "-25.932252450867963" ], [ "be called \"the motor theory of speech perception,\" he suggested that CP's explanation lay in the anatomy of speech production.\nAccording to the (now abandoned) motor theory of speech perception, the reason people perceive an abrupt change between /ba/ and /pa/ is that the way we hear speech sounds is influenced by how people produce them when they speak. What is varying along this continuum is voice-onset-time: the \"b\" in /ba/ is voiced and the \"p\" in /pa/ is not. But unlike the synthetic \"morphing\" apparatus, people's natural vocal apparatus is not capable of producing anything in between ba and pa.", "-25.92496601626044" ], [ "grimy phrase: 'failure of communication' … and this phrase has been fixed to my work quite consistently. I believe the contrary. I think that we communicate only too well, in our silence, in what is unsaid, and that what takes place is a continual evasion, desperate rearguard attempts to keep ourselves to ourselves. Communication is too alarming. To enter into someone else's life is too frightening. To disclose to others the poverty within us is too fearsome a possibility.\n\nI am not suggesting that no character in a play can never say what he in fact", "-25.920883855374996" ], [ "of the task that are beyond the child's ability all the while increasing the expectations of what the child is able to do. Speech, a critical tool to scaffold thinking and responding, plays a crucial role in the development of higher psychological processes (Luria, 1979) because it enables thinking to be more abstract, flexible, and independent (Bodrova & Leong, 1996). From a Vygotskian perspective, talk and action work together with the sociocultural fabric of the writing event to shape a child's construction of awareness and performance (Dorn, 1996). Dialogue may range from casual talk to deliberate explanations about features of", "-25.899950477426046" ], [ "tend to exaggerate how they usually talk. An example of this or shown in blank where somebody May states that \"this homework is so hard I'm going to kill myself!!\" This dialogue is normal and texting but not entirely appropriate and other scenarios. Another thing that texting changed was a person's grammar or writing style. In it showed that 75% of friends noted that their best friends grammar or writing styles .Though only 25% of acquaintances noticed that their friends grammar or writing styles had changed. The evolution of texting is evolving and its uses it is not only", "-25.89858080286649" ], [ "грешите! (the second possible Bulgarian translation of \"But you are wrong!\"), it would then mean that someone is talking to several persons.\nGenerally, ti is used among friends and relatives. When talking to each other, young people often start with the formal vie but quickly transition to ti in an informal situation. Unless there is a substantial difference in social situation (e.g. a teacher and a student), the choice of the form is symmetric: if A. uses ti to address B., then B. also uses ti to address A. While people may transition quickly from vie to ti, such transition presumes", "-25.89438437926583" ], [ "informal speech, me occurs in this position, e.g. Johnny and me are coming tomorrow (possibly because of the lack of direct agreement between me and are).\nChildren are often taught in school that they should always order oneself after any others in a compound subject and use I, saying Johnny and I instead of me and Johnny. Although intended specifically for compound subjects, when adopted by speakers it typically is generalized to compound objects, leading to alternations such as between me and you vs. between you and I.", "-25.887492697889684" ], [ "with others, and this has been suggested to be due to the freedom to control what they say and so not have their cognitive abilities stretched by having to work out how to respond to what someone has just said.\nWhile similar to private speech which usually starts after 3 and ends about 7, crib talk lacks its self-regulatory instructions. Problems Crib talk is difficult to transcribe because such young children typically have poor pronunciation, and because there may be little context to infer the likely meaning of a child’s words, even with the help of a parent. This has limited", "-25.881492230750155" ], [ "manipulability may need further instruction to develop their ability. Teachers have a responsibility to students they serve to identify their needs and implement instructional strategies to scaffold students’ understandings of sounds.\nIntervention strategies may be necessary in remediating students who cannot correctly identify sounds in isolation on a given opportunity. Programs like Reading Recovery have contemporary phonemic techniques embedded in the program. Also, books and poems may specifically focus on word families and similar sound patterns for children to identify and understand in context. Sound sorts can be integrated through programs, or very inexpensively through teacher-created materials. For example, students can", "-25.831282288047078" ], [ "are often used in the imperative form, with the goal of swaying an audience. This form of speech has long been considered to be the peak of rhetorical skill, and many past pieces are still studied. Cicero Cicero described the style's positive and negative effects. He commented on the eloquence and drive behind it, as well as the passion that it can convey to an audience. He noted how it held great emotional power over an audience and could be used to rally listeners to a cause.\nHowever, he found danger in using the style. If the audience was not", "-25.8050073729828" ], [ "with this paradigm as it avoids the discomfort of public speaking. Students who do not feel comfortable stating their ideas in class can take time to sit down and think through exactly what they wish to say.\nCommunication via written media may lead students to take more time to think through their ideas since their words are in a more permanent setting (online) than most conversations carried on during class (Smith). Perception of professor Online learning situations also cause a shift in perception of the professor. Whereas anonymity may help some students achieve a greater level of comfort, professors must maintain", "-25.792203002762108" ], [ "is interrupted by a close friend or family member, or perhaps must answer the phone. CS is used in a completely unmonitored environment where the subject feels most comfortable and will use their natural vernacular without overtly thinking about it. Fundamental concepts While the study of sociolinguistics is very broad, there are a few fundamental concepts on which many sociolinguistic inquiries depend. Speech community Speech community is a concept in sociolinguistics that describes a distinct group of people who use language in a unique and mutually accepted way among themselves. This is sometimes referred to as a Sprechbund.\nTo be", "-25.786145295016468" ], [ "students retain through questioning. Students can concentrate on their lessons and feel more at ease in asking questions during discussions.\nHowever, the Whole Group Discussion approach calls for effective classroom management by teachers. Otherwise, it may be too disturbing for them to implement ground rules for students. There are also downsides for students who are not good in taking notes. They must first learn the strategies in proper note-taking in the classroom. There are strategies in effective implementation of Whole Group Discussions. The Think-Pair-Share is commonly used for lower elementary pupils to persuade the children in acquiring listening and speaking skills.", "-25.781263713608496" ], [ "self-interest, but based on genuine commitment to ideals and goals. Step 3: Silence as a Tool for Strategic Planning Move beyond reliance on words by knowing when to refrain from speaking if verbal communication falls short, and let events take a natural course through waiting patiently yet without becoming overly passive. Step 4: Enter the Realm of Anti-Structure When both words and no-words fail, a more inventive form of White Collar Zen is required, which is found in the fourth step, the path of anti-structure. Awakening the Unmoving Mind empowers you to cross over invisible lines of hierarchy and division.", "-25.73348558114958" ], [ "and audience. In Academic Communities In academia, several courses offered at institutions incorporate rhetorical stance. Speech and English departments, especially, have implemented this tactic in their educational plans. In speech classes, rhetorical stance is used when the speaker, the student presenting, is addressing the audience, his/her classmates. According to Ross Winterowd, speakers and authors adjust their rhetorical stance to accommodate a particular audience. When the speaker is talking, they alter their rhetorical stance and use various techniques for different audiences based on the particular situation. There are several ways that a speaker or writer can make their audience feel a", "-25.732506412528892" ], [ "intentions behind euphemisms and convoluted phrasing. Orwell says that this decline is self-perpetuating. He argues that it is easier to think with poor English because the language is in decline; and, as the language declines, \"foolish\" thoughts become even easier, reinforcing the original cause:\nA man may take to drink because he feels himself to be a failure, and then fail all the more completely because he drinks. It is rather the same thing that is happening to the English language. It becomes ugly and inaccurate because our thoughts are foolish, but the slovenliness of our language makes it easier", "-25.7322979059536" ], [ "speakers does not how to continue their speech. Fillers like \"Mmmm\", a \"Non-lexical filler\", and \"Well\", a \"Lexical filler\", are also said to signal listener's understanding of the information provided.\nResearch has shown that people were less likely to use formulaic language in general topics and domains they were more well-versed in, because they were more adept at selecting the appropriate terms. To date, there is insufficient research done to say if fillers are a part of integral meaning, or if they are aspect of performance, but we can say that they are useful in facilitating information for the listener.", "-25.728442079154775" ], [ "active listening could otherwise fix and lead to barriers against success in an organization. On the job, we may need to appear interested in what others say because of their position. Features that contribute Things such as an accent, height, weight, scars, and even something as small as body posture can all contribute to an audience falling victim to pseudo-listening. Being self-conscious about some of these personal flaws as a speaker may inhibit the listeners experience. This lack of self-confidence could lead to other distractions made by the speaker. While these physical flaws may lead to disinterest in the reader", "-25.72084778500721" ], [ "as \"thank you\" or \"how are you?\". Apraxia of speech can also occur in conjunction with dysarthria, an illness which inflicts muscle weakness affecting speech production), or aphasia, which causes language difficulties related to neurological damage. Developmental coordination disorder Developmental coordination disorder is a chronic neurological disorder that affects the voluntary movements of speech.\nChildren with developmental coordination disorder are unable to formulate certain kinds of voluntary speech; however, they may speak set words or phrases spontaneously, constituting formulaic language—although they may not be able to repeat them on request.", "-25.68906394764781" ], [ "granted to this type of language, allowing politicians to come across more \"authentic\" despite conveying an angrier tone, helping them appeal to certain voters.Yarvin, Jessica (2017). \"What the #$@! Democrats are swearing more. Here's why\". PBS.", "-25.650470538646914" ], [ "(\"s/he, they\"). The passive voice (sometimes called impersonal or indefinite) resembles a \"fourth person\" similar to, e.g., English \"people say/do/...\". There are four tenses, namely present, past, perfect and pluperfect; the system mirrors the Germanic system. The future tense is not needed, because of context and the telic contrast. For example, luen kirjan \"I read a book (completely)\" indicates a future, whereas luen kirjaa \"I read a book (not yet complete)\" indicates present.\nNouns may be suffixed with the markers for the aforementioned accusative case and partitive case, the genitive case, eight different locatives, and a few other cases. The case", "-25.625570979551412" ], [ "trying to reduce silent speech in study participants, in 1952, it came to the conclusion that silent speech is a developmental activity which reinforces learning and should not be disrupted during development. In 1960, Edfelt seconded this opinion. Techniques for studying subvocalization Subvocalization is commonly studied using electromyography (EMG) recordings, concurrent speaking tasks, shadowing, and other techniques.\nEMG can be used to show the degree to which one is subvocalizing or to train subvocalization suppression. EMG is used to record the electrical activity produced by the articulatory muscles involved in subvocalization. Greater electrical activity suggests a stronger use of subvocalization.", "-25.616517181682866" ], [ "own mental attitude, and not a mere authoritative dictation of his acts.\nToday student voice is seeing a resurgence of importance as a growing body of literature increasingly identifies student voice as necessary throughout the educational process. Areas where advocates encourage actively acknowledging student voice include curriculum design and instructional methods, Educational leadership and general school reform activities, including research and evaluation. Curricular approaches Specific types of activities that can specifically engage student voice include learning by teaching, education decision-making, school planning, participatory action research, learning and teaching evaluations, educational advocacy, and student advisories for principals and superintendents. Service learning Engaging", "-25.605571019259514" ], [ "constituent. \"Good Cue\" make it easier for listeners to process the information they have been presented while \"Bad Cue\" make it harder for listeners process the relevant information.\nThere is strong empirical evidence that speakers use formulaic language in similar ways across languages and that formulaic language plays a fundamental role in the structuring of spontaneous speech, as they are used to achieve a better synchronization between interlocutors by announcing upcoming topic changes, delays related to planning load or preparedness problems, as well as speaker's intentions to take/give the floor or to revise/abandon an expression he/she had already presented. Communicative goals", "-25.600903976737754" ], [ "that the correction of the subject-positioned \"me and you\" to \"you and I\" leads people to \"internalize the rule that 'you and I' is somehow more proper, and they end up using it in places where they should not – such as 'he gave it to you and I' when it should be 'he gave it to you and me.'\"\nOn the other hand, the linguists Rodney Huddleston and Geoffrey K. Pullum write that utterances such as \"They invited Sandy and I\" are \"heard constantly in the conversation of people whose status as speakers of Standard English is clear\" and that", "-25.589570785865362" ] ]
4o21cl
What factors consistently make Iceland, Denmark, Austria the most peaceful countries on earth?
[ "a small, homogeneous population with a culture of non-violence and their size generally keeps them out of geopolitical conflicts (except Austria... not so peaceful at times)", "Geographical size and/or population size. Small countries with small populations don't cause major ripples in global politics. They don't lobby for world power because, well... they don't own/consume huge amounts of resources, they don't require a lot of global support, and other nations aren't looking to them for help either. If you're a big strong football player, like 6'5\" 275lbs, and you drive a huge diesel pick-up truck, guess what? All of your friends are going to ask you for help when they move. If you're a tiny lady with slender wrists and you drive a Fiat, no one is asking you to help them move the 500lb marble dining room table. They'll stop by later to have a coffee and a chat.", "Spent a semester in Copenhagen. While the Danes are generally quite satisfied with their lives, the happiness rating has become such a thing that they always respond very favorably to quality-of-life surveys in order to maintain their reputation. Of course, some of these rankings are done with socioeconomic data so the survey tidbit doesn't apply.", "As an American who's lived in Sweden and visits Scandinavia annually, I'd say the biggest factor is that their government invests in its people. It's that simple. It invests and funds and supports education, healthcare, people's rights, and anything else you'd expect from a government. Not only that, but the government is far more transparent. American's don't typically know how their tax dollars are being spent. They don't know that most tax dollars go to subsidies for companies directly or indirectly. People **still** don't understand that Walmart benefits from tax programs more than anyone, and that very, very, very, very few of your tax dollars go to food stamps. You can't rule out the small populations or the simple fact that it's their culture, and culture gets passed on. Vikings were the travelers of Old Norse society, but their societies back home were quite progressive. They had child support and an anti-rape culture even then. The modern idea of brutes killing and raping everything is only partly true, mostly myth - and it's not like they were doing anything everyone else wasn't also doing." ]
[ [ "Iceland has the 2nd highest quality of life in the world. Based on the Gini coefficient, Iceland also has one of the lowest rates of income inequality in the world, and when adjusted for inequality, its HDI ranking is 6th. Iceland's unemployment rate has declined consistently since the crisis, with 4.8% of the labour force being unemployed as of June 2012, compared to 6% in 2011 and 8.1% in 2010.\nMany political parties remain opposed to EU membership, primarily due to Icelanders' concern about losing control over their natural resources (particularly fisheries). The national currency of Iceland is the Icelandic króna (ISK).", "-27.062514785386156" ], [ "a unifying force for the citizens of the country, as well as its status as the oldest parliament in the world.\nAnother aspect of culture held dear by many Icelanders is their history of non violence and neutrality. The idea of Iceland as an unarmed nation with no military force became a tradition which shaped the idea the population held about itself. It was this pacifism which stopped Iceland from joining the United Nations in 1944, and although it made contributions to the Allies, it would not declare war. When it did join the UN in 1946, the terms were that", "-26.877525072428398" ], [ "Iceland is the only country in the world to have a population under two million yet still have a floating exchange rate and an independent monetary policy.\nA poll released on 5 March 2010 by Capacent Gallup showed that 31% of respondents were in favour of adopting the euro and 69% opposed. Another Capacent Gallup poll conducted in February 2012 found that 67.4% of Icelanders would reject EU membership in a referendum.\nIceland's economy has been diversifying into manufacturing and service industries in the last decade, including software production, biotechnology, and finance; industry accounts for around a quarter of economic activity, while", "-26.577208754897583" ], [ "Icelanders Iceland Icelanders have had a tumultuous history. Development of the island was slow due to a lack of interest from the countries controlling it for most of its history: Norway, Denmark–Norway, and ultimately Denmark. Through this time, Iceland had relatively little contact with the outside world. The island became independent in personal union with the Kingdom of Denmark in 1918. Since 1944, Iceland has been a republic, and Icelandic society has undergone a rapid modernisation process in the post-independence era. History Iceland is a geologically young land mass, having formed an estimated 20 million years ago due to volcanic", "-26.139178026547597" ], [ "a higher income than the Eurozone countries. Norway's GDP per capita is as high as 80 per cent above the EA17 average and Norway is actually one of the countries with the highest standard of living in the world.\nHowever, after the financial crisis of 2007–2008 and the following recession all the Nordic countries have been affected by the global crisis though to varying degrees. Iceland was most affected and had an economic crisis from 2008 to 2011, but GDP growth was also negative in all the other Nordic countries in 2008 and 2009. From 2009 most of the Nordic countries", "-26.10820881282052" ], [ "leads to more stable job retention and less reliance on part-time employment. Only 11.9 percent of the working population is dependent on temporary employment.\nUnlike purely social-democratic states in Europe, the Nordic model that Iceland adopted borrows aspects of both a social-democratic and liberal-welfare state. Iceland not only sees high government involvement in providing social welfare and amenities as with the social-democratic model, but like the liberal-welfare model, it is also heavily reliant on free trade and markets. The country relies on an open capitalistic market for economic growth, yet also embraces a corporatist system that allows for wage bargaining to", "-25.962706733727828" ], [ "support the future development of the European Union as a federation of nation states, 35% are opposed. The Nordic countries were the most negative towards a united Europe in this study, as 73% of the Nordics opposed the idea. A large majority of the people for whom the EU conjures up a positive image support the further development of the EU into a federation of nation states (56% versus 27%).", "-25.155130729428492" ], [ "Iceland producing Iceland's current genetic make-up among its population.\nDuring World War II both Iceland (under the Kingdom of Denmark) and Ireland remained neutral. Iceland obtained its independence in June 1944. On 11 March 1948, both Iceland and Ireland established diplomatic relations. In 1960, Iceland joined the European Free Trade Association while Ireland joined the European Union in 1973. In 2003, both nations signed a double taxation agreement. After the 2008 banking crisis that affected heavily the two nations, Iceland began the formal application process to join the EU; however, Ireland raised concerns over Iceland's over fishing of the mackerel which", "-24.780768093129154" ], [ "grown in importance with the end of World War I. Second, Iceland had shown that it was capable of governing its own affairs (starting with Home Rule in 1904) and relations with other states (during World War I when Iceland was cut off from Denmark). The founding of the Republic On June 17, 1944, during the occupation of Denmark by Nazi Germany, while the armed forces of the United States, the United Kingdom and Canada were still in Iceland, a referendum was held on severing ties with the monarchy and the country voted overwhelmingly to become a republic.", "-24.765066535706865" ], [ "growth rates but relatively low economic freedom. Developing nations can have higher growth rates than developed nations, as they have cheap labor and can import investment, technology and organizational skills from rich countries.\nWhen examining the subcomponents of the index, any positive effect that a low level of taxes might have is more disputed than the importance of rule of law, lack of political corruption, low inflation, and functioning property rights. Many north European nation, such as Iceland (# 70), Denmark (# 15), Finland (# 11) and Sweden (# 39), have extensive welfare states, which are strongly opposed by advocates of", "-24.70599531661719" ], [ "in the international economy, these countries were forced to specialize in areas in which they had a competitive advantage. One example of this is Finland identifying the increasing demand for wood across Europe, and using their abundance of natural resources to give rise to a major timber industry. This allowed Finland to experience tremendous growth during the latter half of the 1930s.\nNorway also grew after a strong recovery in 1934 from stagnant foreign trade and rising unemployment caused by the great depression. Denmark's neutrality during World War 1 allowed it to supply both sides and profit from", "-24.703948871348985" ], [ "a republic was established on Jón Sigurðsson's 133rd birthday. This ended nearly six centuries of ties with Denmark. Genetics Due to their small founding population and history of relative isolation, Icelanders have often been considered highly genetically homogeneous as compared to other European populations. For this reason, along with the extensive genealogical records for much of the population that reach back to the settlement of Iceland, Icelanders have been the focus of considerable genomics research by both biotechnology companies and academic and medical researchers. It was, for example, possible for researchers to reconstruct much of the maternal genome of Iceland's", "-24.626687476760708" ], [ "the United Nations, Dag Hammarskjöld, was a Swedish citizen. Thus the people of the Scandinavian Peninsula had a strong influence in international affairs during the 20th century.\nIn 1949, Norway, Denmark and Iceland became founding members of the North Atlantic Treaty Organisation for their defence against East Germany, the Soviet Union and all other potential invaders, and these three countries remain members as of 2011.\nSweden and Finland joined the European Union in 1995. Norway, however, remains outside the Union.", "-24.445499883033335" ], [ "countries, including Denmark, Finland, Iceland, Norway and Sweden as well as Greenland and the Faroe Islands, also ranked highest on the metrics of real GDP per capita, economic equality, healthy life expectancy, having someone to count on, perceived freedom to make life choices, generosity and human development. Likewise, countries adopting similar policies have ranked high on indicators such as civil liberties, democracy, press, labour and economic freedoms, peace and freedom from corruption.\nThe objectives of the Party of European Socialists, the European Parliament's democratic socialist and social democratic bloc, are now \"to pursue international aims in respect of the principles on", "-24.307615941332188" ], [ "Nordic governments to support economic growth and the financial and business sectors. From 2006 Iceland has experienced a fall in gross capital formation. This is after many years with an Icelandic growth particularly driven by investments, which had more than tripled in the recent ten years. Iceland also holds a leading position compared to the other Nordic countries regarding growth in public consumption in the years from 2000 to 2008.\nRecent years’ large balance-of-payments surplus in Denmark, Finland, Norway and Sweden has reduced the countries’ foreign debt. In addition to a balance-of-payments surplus or deficit, the size of a country's foreign", "-24.277630664902972" ], [ "attention in Iceland. Past policies During the 1990s, before the United Nations' Year of Family Iceland was spending roughly 18% GDP on welfare and health care. This percentage was quite low compared to other European countries. This percentage spent on both healthcare and welfare seemed looked even thinner because Iceland has more children per family than other European countries with more progressive health care and social policies. After Iceland made the decision to implement more progressive family policies the Minister of Social Affairs  appointed The Family Council in 1998. This council helped implement policies like those for paternity leave in", "-24.256722948834522" ], [ "Third World.\nIn 1995 Sweden, together with Finland and Austria, joined the European Union which extended the number of member countries from 12 to 15. Membership and its issues are among the most important questions in Swedish politics. Apart from the European Union, Sweden is also an active member of the United Nations and several other organisations such as the Organisation for Economic Co-operation and Development and International Monetary Fund.", "-24.223700632035616" ], [ "Iceland gradually began to rejoin Western Europe economically and socially. With this return of contact with other peoples came a reawakening of Iceland's arts, especially its literature. Twenty years later in 1874, Iceland was granted a constitution. Icelanders today recognize Jón's efforts as largely responsible for their economic and social resurgence.\nIceland gained full sovereignty and independence from Denmark in 1918 after World War I. It became the Kingdom of Iceland. The King of Denmark also served as the King of Iceland but Iceland retained only formal ties with the Danish Crown. On 17 June 1944 the monarchy was abolished and", "-24.2216906985268" ], [ "civilization, the Icelanders chafed under the \"protective custody\" in which they found themselves placed. They felt at first, when Canadian troops made up a large part of the total force, that a wholly British contingent would be preferable, but when the Canadians were later replaced by British troops most Icelanders seemed to find their lot no more bearable than before. As the scope of Germany's aerial blitzkrieg widened, the people of Iceland grew more uneasy; for it to be \"defended\" by one of the belligerent powers, they felt, was an open invitation to attack by the other. The Icelandic Government", "-24.198037866823142" ], [ "warfare,\" and the world celebrates a new age of peace.\nWith the price of crude oil at USD $800 a barrel, the EU member states are forced to consolidate political, economic, and military power to form a united European superstate, the European Federation (EF), which has a greater population and Gross National Product (GNP) than the U.S. The United Kingdom and Ireland opt not to join the new state, however, and instead form their own union known as the \"New Commonwealth,\" which remains neutral but allows European forces to man the missile defense uplink sites on its territory.\nAs EF membership is", "-24.132891579371062" ], [ "politics of these countries. Viewed from afar, they are all open, successful, externally orientated. Seen from inside, they address a fear that things are not as they were, that a combination of immigration and membership of the European Union poses a challenge to the traditions of the Nordic way of life. In some way the fact that Finland has joined the EU demonstrates that the country is no longer just the small, poor, well-behaved neighbour of the Nordic block.\nIt gave two reasons for the populist surge across Europe: The \"movements tap into a deep discontent with the mainstream parties in", "-24.108054768526927" ], [ "countries have been hit by recession very hard, for instance Spain's unemployment rate reached 18.7% (37% for youths) in May 2009 — the highest in the eurozone. In the UK, youths bore the brunt of unemployment during the recession.\nThe rise of advanced economies in Brazil, India, and China increased the total global labor pool dramatically. Recent improvements in communication and education in these countries has allowed workers in these countries to compete more closely with workers in traditionally strong economies, such as the United States. This huge surge in labor supply has provided downward pressure on wages and contributed to", "-24.006715964176692" ], [ "other small eurozone countries such as Finland and Belgium – noting that the physical wealth of those countries exceeds that of Ireland because of their \"vastly superior\" transport infrastructure, telecommunications network, and public services. Tiger economy From 1995 to 2000, GDP growth rate ranged between 7.8 and 11.5%; it then slowed to between 4.4 and 6.5% from 2001 to 2007. During that period, the Irish GDP per capita rose dramatically to equal, then eventually surpass, that of all but one state in Western Europe. Although GDP does not represent the standard of living, and the GNP remained lower than the GDP,", "-23.959907159907743" ], [ "most important countries. Sweden specialized in iron ore, Finland in paper, Denmark in agrarian products, and Norway in nickel and aluminum. Germany's expansion created a tense political climate, and the Nordic states relied on political cooperation while other countries turned inwards in an attempt to become more self-sufficient. Representatives from Norway, Denmark, Finland, and Sweden met numerous times throughout the interwar period to establish strategies, which protected industries such as timber and agriculture that were exposed to international competition. The most important meeting proved to be The Oslo Convention in 1930, which included the four Nordic", "-23.95882745052222" ], [ "2009), gave widespread attention in Nordic media. Wetterberg (and Stoltenberg) argued that it would give member countries more influence if they combined their voices on the world stage. The six countries, if combined, would have the world's tenth largest economy; larger than e.g. Russia or Brazil. The Vision The organisation strive to further integrate the Nordic countries (Sweden, Denmark, Norway, Finland, Iceland, Greenland, Faroe Islands and Åland) and to create a Nordic federation or a union. The countries have a long common history and the societies display many common characteristics. Nordisk Vision argues that the historical, social, economical, cultural and", "-23.84902730433896" ], [ "of the country's dependence both on unreliable fish catches and foreign demand for fish products, Iceland's economy remained stable well into the 1990s, when the country's economy was greatly diversified. NATO membership, US defense agreement, and the Cold War In October 1946, the Icelandic and United States governments agreed to terminate U.S. responsibility for the defense of Iceland, but the United States retained certain rights at Keflavík, such as the right to re-establish a military presence there, should war threaten.\nIceland became a charter member of the North Atlantic Treaty Organization (NATO) on 30 March 1949, with the reservation that it", "-23.80917470541317" ], [ "with Norway during the 1990s as hope. He did however claim that ultimately it was the major fishing countries of the EU who would influence the outcome of the application.\nIn February 2013, the Icelandic chief negotiator stated that the main driving force for Iceland joining the EU was the benefit to the country of adopting the euro to replace the inflation-plagued Icelandic króna. Iceland's HICP inflation and related long-term government interest rates were both recorded to be around 6% on average for 2012. Most importantly, however, while the country retained the Icelandic kronur, it was unable to lift the capital", "-23.76979114022106" ], [ "to raise any armed forces. The close cooperation between the Americans and the Icelanders led to Iceland's giving up neutrality and becoming a charter member of the North Atlantic Treaty Organization (NATO) in 1949. Iceland has not had any armed forces (but see Cod Wars), but its contribution was bases for its allies: the American Air Force Base and Naval Air Station at Keflavík. India The Indian Empire consisted of the present-day territory of India, Pakistan, and Bangladesh; Burma had become a separate colony in 1937. As part of the British Empire, India was covered by Britain's declaration of", "-23.717367640405428" ], [ "Allies. However, during the Winter War between Finland and Russia in 1939–1940, Sweden did support Finland and declared itself \"non combatant\" rather than neutral.\nCompared with large parts of Europe, the Nordic region got off lightly during the World War II, which partially explains its strong post-war economic development. The labour movement – both trade unions and political parties – was an important political presence throughout the Nordic countries in the 20th century. The big social democratic parties became dominant and after World War II the Nordic countries began to serve as a model for the welfare state. Economically, the five", "-23.654576339991763" ], [ "of the financial sector; however, challenges remain in making the fishing industry more efficient and sustainable, as well as in improving monetary policy to address inflation. Iceland's public debt has decreased since the economic crisis, and as of 2015 is the 31st highest in the world by proportion of national GDP. Economic contraction Iceland had been hit especially hard by the Great Recession that began in December 2007, because of the failure of its banking system and a subsequent economic crisis. Before the crash of the country's three largest banks, Glitnir, Landsbanki and Kaupthing, their combined debt exceeded approximately six", "-23.64123095863033" ], [ "was averted via arbitration. Iceland's peaceful adoption is in many ways remarkable, given the decades of civil strife before Norway became fully Christian. A likely explanation is that the major gothi chieftains of Iceland preferred religious change to civil strife.\nOnce the Church was firmly in control in Iceland, horsemeat, infanticide, and pagan rituals practiced in private were banned.", "-23.619933335430687" ], [ "Denmark–Iceland relations 19th century Iceland achieved home rule in 1874, and became a fully sovereign state in 1918, united with Denmark under a common King.\nIn 1814, following the Napoleonic Wars, Denmark-Norway was broken up into two separate kingdoms via the Treaty of Kiel. Iceland, however, remained a Danish dependency. Throughout the 19th century, the country's climate continued to worsen, resulting in mass emigration to the New World, particularly Manitoba in Canada. About 15,000 out of a total population of 70,000 left. However, a new national consciousness was revived, inspired by romantic and nationalist ideas from Continental Europe, and an Icelandic", "-23.57694321796953" ], [ "there would be no military bases in the country. The importance placed on pacifism was a significant part of Icelandic national identity. When Iceland decided to join NATO in 1949, it resulted in a riot outside the Althing as this decision broke the historical tradition of neutrality that was viewed as important to Icelandic heritage.\nLanguage was also an important factor in Icelandic nationality, where an emphasis was placed on making laws in their native language. A common language served as a unifying factor for Icelanders, as well as a way to distinguish themselves from the Danish and the laws of", "-23.56482801279708" ], [ "Instead, the government would be allowed to maintain large public deficits in the first year – 2009 – allowing fiscal multipliers to counteract the output contraction that was underway. Iceland also was not asked to downsize its Scandinavian-type welfare system.\"\nIceland is the only country in the world to have a population under two million yet still have a floating exchange rate and an independent monetary policy.", "-23.53128535732685" ], [ "Iceland owes the surrounding world values corresponding to five times the country's total production. Sweden also had foreign debts by the end of 2010, but at a much smaller scale. In 2012, all Nordic countries had a surplus on the total balance of payments. Norway accounts for a substantial foreign exchange surplus, which is due to revenue from exports of oil and gas. Industries Since the late 1990s, the Nordic manufacturing industry has accounted for a slightly declining proportion of the gross domestic product, with Norway being a distinct exception. In Norway, the manufacturing industry's proportion of GDP is still", "-23.499085542513058" ], [ "Centuries of isolation have helped to insulate the country's Nordic culture from external influence; a prominent example is the preservation of the Icelandic language, which remains the closest to Old Norse of all modern Nordic languages.\nIn contrast to other Nordic countries, Icelanders place relatively great importance on independence and self-sufficiency; in a public opinion analysis conducted by the European Commission, over 85% of Icelanders believe independence is \"very important,\" compared to 47% of Norwegians, 49% of Danes, and an average of 53% for the EU25. Icelanders also have a very strong work ethic, working some of the longest hours of", "-23.48107199979131" ], [ "are Iceland, Liechtenstein and Norway's contribution to reducing economic and social disparities in European Economic Area and to the strengthening of bilateral relations with the 15 beneficiary states in Central and Southern Europe. All three countries have provided the financial support in terms of social and economic imbalances since 1994 and both grants initiatives were established in connection with the historic enlargement of the European Union and European Economic Area in 2004. Iceland, Liechtenstein and Norway agreed on joint management of the EEA Grants and Norway Grants; however, the decision-making procedure regarding the EEA Grants lies in hands of the", "-23.45553581629065" ], [ "compared to countries such as France. The current Swedish government is continuing the trend of moderate rollbacks of previous social reforms. Growth has been higher than in many other EU-15 countries. Also since the mid-1980s, Sweden has had the fastest growth in inequality of any developed nation, according to the OECD. This has largely been attributed to the reduction in state benefits and a shift toward the privatisation of public services. According to Barbro Sorman, an activist of the opposition Left Party, \"The rich are getting richer, and the poor are getting poorer. Sweden is starting to look like the", "-23.41255281397025" ], [ "and the United Kingdom, in relation to the smaller Nordic states. The United Kingdom was the leading economic power at the time, and Germany was rapidly gaining strength under Hitler and the Nazi Party. It also shows how different economic factors and policies lessened the effects of the great depression on the Nordic States. Germany The sanctions and reparations following Germany's loss in World War 1 completely destroyed the country's economy. Other nations felt the effects of the deteriorating German economy as they relied on Germany's industrial capabilities. By 1932, close to six million people were", "-23.403621801350255" ], [ "ranked 27th in the 2012 Index of Economic Freedom, lower than in prior years but still among the freest in the world. As of 2016, it ranks 29th in the World Economic Forum's Global Competitive Index, one place lower than in 2015. According to INSEAD's Global Innovation Index, Iceland is the 11th most innovative country in the world. Unlike most Western European countries, Iceland has a flat tax system: the main personal income tax rate is a flat 22.75%, and combined with municipal taxes, the total tax rate equals no more than 35.7%, not including the many deductions that are", "-23.31040674020187" ], [ "Australia's trade balance due to more imports and higher consumption of domestic production; increased greenhouse gas emissions; overuse of agricultural soils; marine fisheries and domestic supplies of oil and gas; and a decline in urban air quality, river quality and biodiversity. Environment Some environmental movements believe that as the driest inhabited continent, Australia cannot continue to sustain its current rate of population growth without becoming overpopulated. The Sustainable Population Australia (SPA) argues that climate change will lead to a deterioration of natural ecosystems through increased temperatures, extreme weather events and less rainfall in the southern part of the continent, thus", "-23.27014301973395" ], [ "with various United Nations and other aid agencies, helped to relieve famine, disease, and poverty, and to suppress some local armed conflicts. Europe slowly united, economically and, in some ways, politically, to form the European Union, which consisted of 15 European countries by the end of the 20th century.\n\nIn the last third of the century, concern about humankind's impact on the Earth's environment made environmentalism popular. In many countries, especially in Europe, the movement was channeled into politics through Green parties. Increasing awareness of global warming began in the 1980s, commencing decades of social and political debate. The nature of", "-23.26079721271526" ], [ "only a smart part of contribution. In rapidly growing economies such as Ireland, Estonia and Latvia regional differences lead to a positive outcome and relative decline in the more peripheral parts. Socio-economic differences due to regional disadvantage occur particularly in Finland, France and Spain, where the high unemployment rate has increased in more peripheral regions.\nMigration into rapidly growing areas seems in most European countries as an emerging issue. Spatial disparities in European Regions The increase in intra-national regional disparities is experienced by almost all the EU-27 Member States. Mapping potential accessibility to European GDP makes it possible to identify the", "-23.231503142451402" ], [ "freedom; it was also ranked fourth from the bottom on the Failed States Index, being one of the few \"sustainable\" states in the world.\nIreland is a member of the EU, the OECD and the UN. Ireland's policy of neutrality means it is not a member of NATO. Ireland's population is the fastest growing in Europe, with an annual growth rate of 2.5%.\nNote that many geographic and cultural articles on Ireland consider the island of Ireland as a whole, including Northern Ireland, which is part of the United Kingdom. Where no distinct article for the Irish state is available, this", "-23.20118624443421" ], [ "Norwegian political economist, pointed out.\nIngebritsen noted that: Each Nordic government had to respond to a different set of interest groups – some that anticipated positive benefits of European integration and others that anticipated undesirable costs. One of the major differences is how dependant nations are on their raw materials and manufacturing production.\nFor example, Iceland is a nation that is heavily dependent on fishing as its main export and therefore seeks to protect its fisheries. If Iceland would join the EU it would have to share the market as well as its fishing grounds with for example Spain and Portugal. ‘", "-23.15149609275977" ], [ "better off by this measurement than generally less developed or more free market countries like Britain, the Mediterranean, and the new accession states, Ireland is still more unequal than France, Germany, and the Scandinavian countries. Moreover, Ireland's inequality persists by other measurements. According to an ESRI report published in December 2006, Ireland's child poverty level ranks 22nd out of the 26 richest countries, and it is the 2nd most unequal country in Europe. Death of the Tiger In an economic analysis, the Economic and Social Research Institute (ESRI) on 24 June 2008 forecasted the possibility the Irish economy would experience", "-23.125623041938525" ], [ "Context Denmark, Norway and the United Kingdom were already economically linked within the European Free Trade Area. The UK's role in international affairs had weakened, unlike the EC member countries, which in the 1960s were strongly recovering from the Second World War; Ireland remained economically dependent on the UK, which represented nearly 75% of its exports and sought to reduce this dependence.\nTo join the EC, countries had to meet two criteria: belonging to the European continent and obtain agreement from all member countries. On 31 July 1961 the United Kingdom, Ireland and Denmark applied to join the EC. ", "-23.092017730232328" ], [ "Iceland hosted a summit in Reykjavík in 1986 between United States President Ronald Reagan and Soviet Premier Mikhail Gorbachev, during which they took significant steps toward nuclear disarmament. A few years later, Iceland became the first country to recognise the independence of Estonia, Latvia, and Lithuania as they broke away from the USSR. Throughout the 1990s, the country expanded its international role and developed a foreign policy oriented toward humanitarian and peacekeeping causes. To that end, Iceland provided aid and expertise to various NATO-led interventions in Bosnia, Kosovo, and Iraq.\nIceland joined the European Economic Area in 1994, after which the", "-23.061141186015448" ], [ "and a rich cultural heritage.\nBesides, the Northern Dimension also has the objectives of addressing the challenges arising from uneven regional development, and helping avoid the emergence of new dividing lines in Europe following EU enlargement.\nWith the enlargement of the Union on 1 May 2004 to include Estonia, Latvia, Lithuania, and Poland, the importance of the Northern Dimension has increased considerably: eight EU Member States (Denmark, Germany, Poland, Lithuania, Latvia, Estonia, Finland, and Sweden) surround the Baltic Sea, and the EU’s shared border with Russia has lengthened. History Recent years have seen far-reaching changes in the geopolitical map of northern Europe.", "-23.053254280763213" ], [ "hardest-hit economies were those of southern Europe: Greece, Cyprus, Italy, Spain, and Portugal, along with Ireland. Among other reasons, harsh austerity measures significantly affected the public approval of EU leadership. The percentage of Greeks approving the EU leadership decreased from 32% in 2010 to 19% in 2013, while in Spain, the approval dwindled more than a half from 59% in 2008 to 27% in 2013. Overall, only four of the 27 members countries approved the EU leadership. Peter S. Goodman suggests that \"distrust about the treaties and conventions that hold together modern Europe appear at an all-time high.\" \"Europe's establishment", "-23.001838179014158" ], [ "began to form later.\nIceland has the highest government expenditure on culture, a total of 3.3 per cent of its GDP in 2011. Denmark comes second with a total of 1.6 per cent of GDP in 2011. Sweden spend the least in 2011 with 1.1 per cent. Looking at per capita expenditure, Iceland again has the highest expenditure with Norway coming second. Greenland spends the third highest amount on culture and leisure per capita. In Iceland and Norway, expenditures have more than doubled since 2000. In the other Nordic countries, expenditures have gone up between 40 and 50 per cent in", "-22.998896712088026" ], [ "cents for every euro a male counterpart gets). Religion as a factor Scandinavian countries have Lutheranism as their main religion. Schroder argues that Lutheranism promotes the idea of a nationwide community of believers and it promotes state involvement in economic and social life. This allows nationwide welfare solidarity and economic co-ordination. Currently, a large number of Scandinavians have been described as being irreligious. Reception The Nordic model has been positively received by some American politicians and political commentators. Jerry Mander has likened the Nordic model to a kind of \"hybrid\" system which features a blend of capitalist economics with socialist", "-22.99866616888903" ], [ "also reflects a non-traditional conception of Europe's world role as a global \"civilian power\", exercising collective influence in the functional spheres of trade and diplomacy, as an alternative to military dominance. The European Union is a supranational union and not a sovereign state and has its own foreign affairs and defence policy. Anyway these remain largely with the member states of the European Union, which includes France, Germany and the United Kingdom (referred to as the \"EU three\").\nBrazil and India are widely regarded as emerging powers with the potential to be great powers. Political scientist Stephen P. Cohen asserts", "-22.928464598226128" ], [ "would further restrain their development. International relations Until the recent past, little attention was paid to the interests of Third World countries. This is because most international relations scholars have come from the industrialized, First World nations. As more countries have continued to become more developed, the interests of the world have slowly started to shift. However, First World nations still have many more universities, professors, journals, and conferences, which has made it very difficult for Third World countries to gain legitimacy and respect with their new ideas and methods of looking at the world. Development theory During the Cold", "-22.920466914016288" ], [ "Iceland in World War II Background German interest in Iceland in the 1930s grew from nothing at all to proportions found by the British government to be alarming. The Third Reich's overtures began with friendly competition between German and Icelandic football teams. When war began, Denmark and Iceland declared neutrality and limited visits to the island by military vessels and aircraft of the belligerents. Neutrality During the German occupation of Denmark, contact between the countries was disrupted. Initially, the Kingdom of Iceland declared itself to be neutral, and limited visits of belligerent warships and imposed a ban on belligerent aircraft", "-22.91749995412829" ], [ "economy was greatly diversified and liberalised. International economic relations increased further after 2001, when Iceland's newly deregulated banks began to raise massive amounts of external debt, contributing to a 32% increase in Iceland's gross national income between 2002 and 2007. Economic boom and crisis In 2003–2007, following the privatisation of the banking sector under the government of Davíð Oddsson, Iceland moved toward having an economy based on international investment banking and financial services. It was quickly becoming one of the most prosperous countries in the world but was hit hard by a major financial crisis. The crisis resulted in the", "-22.90319981786888" ], [ "3.5 percent. ILO thought that the main reason of these four countries’ success was social dialogue, macroeconomic policies and labor market policies. For instance, the Wassenaar Agreement signed in Holland in 1982, and Denmark advocated the national recovery program with Ireland in 1987. These agreements stood for the will of social partner to solve economic dilemma.", "-22.800512950721895" ], [ "in 2007, the GNP achieved the same level as of some other Western European countries'. Tax policy Many economists credit Ireland's growth to a low corporate taxation rate (10 to 12.5% throughout the late 1990s). Since 1956, successive Irish governments have pursued low-taxation policies. European Union Structural and Cohesion Funds Since joining the EU in 1973, Ireland has received over €17 billion in EU Structural and Cohesion Funds. These are made up of the European Regional Development Fund (ERDF) and the European Social Fund (ESF) and were used to increase investment in the education system and to build physical infrastructure.", "-22.784060757636325" ], [ "economic nationalism was unsustainable. While other European countries enjoyed fast growth, Ireland suffered economic stagnation. The policy changes were drawn together in Economic Development, an official paper published in 1958 that advocated free trade, foreign investment, and growth rather than fiscal restraint as the prime objective of economic management.\nIn the 1970s, the population increased by 15% and national income increased at an annual rate of about 4%. Employment increased by around 1% per year, but the state sector amounted to a large part of that. Public sector employment was a third of the total workforce by 1980. Budget deficits and", "-22.77521704864921" ], [ "Corbyn, who rejected Third Way social democracy, after the economic recession caused the so-called Pasokification of many social democratic parties.\nThe United Nations' World Happiness Report shows that the happiest nations are concentrated in social democratic nations, especially in Northern Europe, where the social democratic Nordic model is employed. This is at times attributed to the success of the Nordic model in the region, where similar democratic socialist, labour and social democratic parties dominated the political scene and laid the ground to their universalistic welfare states in the 20th century. The Nordic countries, including Denmark, Finland, Iceland, Norway and Sweden as", "-22.75997591763189" ], [ "Iceland–United States relations Overview The United States has maintained an interest in Iceland since the mid-1800s. In 1868, U.S. Department of State under William H. Seward authored a report that contemplated the purchase of Iceland from Denmark.\nThe United States military established a presence in Iceland and around its waters after the Nazi occupation of Denmark (even before the U.S. entered World War II) in order to deny Nazi Germany access to its strategically important location (which would have been considered a threat to the Western Hemisphere).\nThe United States was the first country to recognize Icelandic independence from Denmark in June", "-22.72792583471164" ], [ "nations of the earth have not as yet found true peace...the old rivalries between nations have not ceased to exert their influence...Conditions have become increasingly worse because the fears of the people are being constantly played upon by the ever-present menace of new wars, likely to be more frightful and destructive than any which have preceded them. Whence it is that the nations of today live in a state of armed peace which is scarcely better than war itself, a condition which tends to exhaust national finances, to waste the flower of youth, to muddy and poison the very fountainheads", "-22.70181345276069" ], [ "in Greece and slow recovery in Italy and in Iberia (Spain and Portugal) continue in keeping growth in the Euro area to a minimum. Germany continues to lead Europe in stability and growth, while both the UK and Ireland are seeing strong growth of 3–4%. Unemployment in Ireland reducing at the fastest levels in Europe, expected to reach 8% by 2016, down from double that in 2011. The Czech Republic and Germany have constantly the lowest unemployment rate in the EU. Growth outlook in general remains optimistic for Europe in the future. With positive growth expected across the Euro area.", "-22.69901198358275" ], [ "countries in its economic development, with a long tradition of education, science, and industry. The country has a higher proportion of higher education graduates than any other country in Eurasia.\nThe economic development of the country has been uneven geographically with the Moscow region contributing a very large share of the country's GDP.\nInequality of household income and wealth has also been noted, with Credit Suisse finding Russian wealth distribution so much more extreme than other countries studied it \"deserves to be placed in a separate category.\"\nAnother problem is modernisation of infrastructure, ageing and inadequate after years of being neglected in the", "-22.683910152351018" ], [ "a significant decline in living standards. The treasury became highly indebted, and there was a shortage of food and fears over an imminent famine.\nIceland was part of neutral Denmark during the war. Icelanders were, in general, sympathetic to the cause of the Allies. Iceland also traded significantly with the United Kingdom during the war, as Iceland found itself within its sphere of influence. In their attempts to stop the Icelanders from trading with the Germans indirectly, the British imposed costly and time-consuming constraints on Icelandic exports going to the Nordic countries. There is no evidence of any German plans to", "-22.64374629216036" ], [ "in global climate change politics because it is the eleventh largest emitter and unlike other large emitter countries, 86% consider global warming to be a very serious problem. Compared to the rest of the world, Latin America is more consistently concerned with high percentages of the population worried about climate change. Further, in Latin America, 67% believe in personal responsibility for climate change and say that people will have to make major lifestyle modifications. Europe Europeans have a tendency to be more concerned about climate change than much of the world, with the exception of Latin America. However there is", "-22.6198772880889" ], [ "Croatia, Slovenia, Russia, Austria, France, Bosnia and Herzegovina, Estonia, as well as other member states of the organization, and the experience of different countries in this area, exchange experiences and ideas among member states about ways to participate in national and international levels to address youth unemployment were made.\nOn October 2–28, 2017, the delegation of the Ministry of Labor and Social Protection of Population of Azerbaijan visited the Republic of Lithuania within the twinning project \"Support to the Ministry of Labor and Social Protection of Population in the Modernization of Public Employment Services in Azerbaijan\". During the visit a meeting", "-22.604648865410127" ], [ "the world: the Netherlands, Belgium, Canada, South Africa, Argentina, Spain, Portugal, Norway, Sweden, Denmark, New Zealand, Uruguay, Iceland, France, the United Kingdom (minus Northern Ireland), Ireland, the United States, Luxembourg, Brazil, Mexico, Colombia. About 1 billion people (from an estimated world population of 7 billion) live in countries with marriage equality.\nHe is a strong advocate for human rights and represented the Dutch parliament on numerous occasions at meetings in the United Nations. Dittrich was member of the Parliamentarians for Global Action (PGA) and was also vice president of Liberal International until October 2007.\nAfter 12½ years in Parliament Dittrich decided to", "-22.59535049070837" ], [ "Global Peace Index 2017: World 0.28% more peaceful than last year: “Levels of peace around the world have improved slightly for the first time since the Syrian war began, but harmony has decreased in the US and terrorism records have increased, a Sydney-based think-tank has found.”\nForbes: “The Global Peace Index, which the Institute compiles annually, paints a sombre picture: The world has become even less peaceful in 2016, continuing a decade-long trend of increased violence and strife. Published every year since 2008, the Index ranks 163 independent states and territories by their level of peacefulness.”\nForbes: The World's Most and Least", "-22.58903673416353" ], [ "fast integration with the European Union, safety against Russian leverage has been increased by building fully NATO-compatible military. 1000 troops (a high per-capita amount) are simultaneously committed in NATO and UN operations. Finland has also opposed energy projects that increase dependency on Russian imports. At the same time, Finland remains one of the last non-NATO members in Europe and there seems to be not enough support for full membership unless Sweden joins first.\nThe population is aging with the birth rate at 10.42 births/1,000 population or fertility rate at 1.8. With median age at 41.6 years Finland is one of the", "-22.58898568151926" ], [ "by a number of nations, including Iceland and the United Kingdom, as well as by the Republic of Ireland and Denmark (on behalf of the Faroe Islands). The United Kingdom and Ireland reached a power sharing agreement over Rockall, but as yet no other agreements exist with Iceland or Denmark. Icesave dispute The Icesave dispute was a dispute between Iceland and the United Kingdom, Germany and the Netherlands over frozen assets held by collapsed Icelandic banks which operated in the above countries, causing much political tension. Mackerel row In recent years, mackerel migration and spawning has taken place into both", "-22.578864699578844" ], [ "War. The United States provided extensive economic patronage, advocated on Iceland's behalf in international organizations, allowed Iceland to violate the rules of international organizations, and helped Iceland to victory in the Cod Wars. Despite this, the relationship with the United States was contentious in Icelandic domestic politics, leaving some scholars to describe Iceland as a \"rebellious ally\" and \"reluctant ally.\" Iceland repeatedly threatened to leave NATO or cancel the US defence agreement during the Cold War, which is one reason why the United States went to great lengths to please the Icelanders. Cod Wars The Cod Wars were a series", "-22.564617566298693" ], [ "Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Italy, Latvia, Lithuania, Luxembourg, Netherlands, New Zealand, Norway, Poland, Portugal, Romania, Saudi Arabia, Slovakia, Slovenia, Spain, Sweden, Turkey, United Kingdom, and the United States). Multilateralism Canada is and has been a strong supporter of multilateralism. The country is one of the world's leading peacekeepers, sending soldiers under the U.N. authority around the world. Canadian former Minister of Foreign Affairs and subsequent Prime Minister, Lester B. Pearson, is credited for his contributions to modern international peacekeeping, for which he won the Nobel Peace Prize in 1957. Canada is committed to disarmament, and is especially", "-22.554264153486656" ], [ "is practically nonexistent.\nA considerable portion of the government budget is assigned to health care, and Iceland ranks 11th in health care expenditures as a percentage of GDP and 14th in spending per capita. Overall, the country's health care system is one of the best performing in the world, ranked 15th by the World Health Organization. According to an OECD report, Iceland devotes far more resources to healthcare than most industrialised nations. As of 2009, Iceland had 3.7 doctors per 1,000 people (compared with an average of 3.1 in OECD countries) and 15.3 nurses per 1,000 people (compared with an OECD", "-22.533206191059435" ], [ "and large excess exports in recent years. Iceland is the only country which has balance of payments deficits as of 2011. At the same time, unemployment is low in most of the Nordic countries compared with the rest of Europe. As a result of the cyclical down-turn, the public balance is now in deficit, except for Norway. Over the past ten years, the Nordic countries had a noticeably larger increase in their gross domestic product (GDP) than the Eurozone. The only exceptions were Denmark and Åland which had a lower growth. Measured by GDP per capita, the Nordic countries have", "-22.52302282990422" ], [ "outcomes\" and their effect on income equality have been noted since the 1970s and 80s. Denmark, along with other Nordic countries, such as Finland and Sweden, has long held a stable low wage inequality index as well. The scope and strength of Denmark's redistributive system and the latitude of the welfare state are the reasons for Denmark's low levels of inequality. The welfare system, in particular, allows for negligible effects that market income inequality can have on \"disposable income inequality (i.e. market income after taxes and transfers)\". The rise in income inequality all over the world, though, has not shielded", "-22.49340424797265" ], [ "highest in the world. There is a generous welfare system in Sweden, Denmark and Finland (which are EU members ) and in Norway and Iceland (which are outside the EU). Scandinavian unions Denmark–Norway as a historiographical name refers to the former political union consisting of the kingdoms of Denmark and Norway, including the Norwegian dependencies of Iceland, Greenland and the Faroe Islands. The corresponding adjective and demonym is Dano-Norwegian. During Danish rule, Norway kept its separate laws, coinage and army as well as some institutions such as a royal chancellor. Norway's old royal line had died out with the death", "-22.484116973821074" ], [ "neighbouring countries like Czech Republic and Slovakia were made possible. Because of this, Lower Austria held a Three-Countries-Day with its neighbours. The new European Union of 25 was the main focus of the 10th annual \"Europa-Forum Wachau\". 2013 The discussion meeting was held on 15 and 16 June 2013 and specifically focused on the crisis that some EU-states were in. \"Beyond the crisis - Outlines of a new Europe\" was a special motto of discussions between politicians of Austria, the EU and Balkan states. The meeting between Serbia's and Kosovo's head of government was of great importance. Then Austrian outside", "-22.477644165977836" ], [ "effect. The countries were: Australia, Austria, Belgium, Brazil, Czech Republic, Denmark, Finland, Germany, Hungary, Iceland, Ireland, Italy, Korea, Latvia, Liechtenstein, Luxembourg, Mexico, Netherlands, New Zealand, Norway, Portugal, Russia, Sweden, Switzerland, United Kingdom, and United States.\nSeaton, Marsh, and Craven (2009) expanded this list to 41 countries, including both collectivist and individualist cultures.\nThe effects of academic self-concept (ASC) on career aspirations appear to generalize across many countries as well. Nagengast and Marsh (2011) showed that science career aspirations were significantly affected by science self-concept in 57 countries. In this study there was also some evidence that the effect might be larger in", "-22.473907288280316" ], [ "originally been bitter enemies, but with the approaching threat of Lutheranism, they found common cause as allies against religious reform. Denmark had been embroiled in civil war during the dissolution of the Kalmar Union, and the two Icelandic bishops had held both secular and ecclesiastical power in the country for many years. Lutheran influence in Iceland Luther's influence had already reached Iceland before King Christian's decree. The Germans fished near Iceland's coast, and the Hanseatic League engaged in commerce with the Icelanders. These Germans raised a Lutheran church in Hafnarfjörður as early as 1533. Through German", "-22.445948225627944" ], [ "the rising share of the services sector, diversifi cation of exports, more solid economic policies, and increased participation in the global economy.\nAccording to Reuters, Iceland has had \"over 20 financial crises since 1875\". Agricultural modernization Certain institutional arrangements in Iceland retarded the modernization of agriculture and the growth of non-agrarian sectors. One such institution was \"the system of land tenures with its heavy obligations to landlords and insecure farm leases, which discouraged fixed capital investment on the farms. The other was a wide-ranging social legislation set up to regulate family formations and to maintain a balance between agriculture and the", "-22.44583743238786" ], [ "problems, a consequence that a number of observers have attributed to Iceland's extensive deregulation. South Africa South Africa’s GDP has grown since the beginning of the new government system in 1994, which ended the rule of apartheid in South Africa. While some see the implementation of neoliberal policies inside South Africa as having spurred the country's growth rate, others cite policies such as maintaining high interests rates to quell inflation as actually hurting economic growth. Meanwhile, the implementation of GEAR (Growth Employment and Redistribution Strategy) policies have caused a decline in employment that started after the new government", "-22.38327894450049" ], [ "On 27 July 1940, both Iceland and Sweden established diplomatic relations. In June 1944, Iceland became a republic and both nations opened embassies in each other's capitals, respectively. During World War II both nations remained officially neutral, however, Iceland was invaded by the allies and used as a base while Sweden unofficially assisted the allies.\nSince the establishment of diplomatic relations between Iceland and Sweden, both countries have actively participated in the international arena to discuss issues affecting the Nordic nations such as climate change, Arctic policy and in mutual defense outside of NATO. Both countries have participated in foreign expeditions", "-22.369187800592044" ], [ "1 January 1995 Austria, Finland, and Sweden acceded to the EU marking its fourth enlargement. The Norwegian government lost a second national referendum on membership. Eastern enlargement As with the Mediterranean countries in the 1980s, the countries in Central and Eastern Europe had emerged from dictatorships and wanted to consolidate their democracies. They also wanted to join the project of European integration and ensure they did not fall back into the Russian sphere of influence. The EU and NATO offered a guarantee of this, and the EU was also seen as vital to ensuring the economic success of those countries.", "-22.32631028239848" ], [ "declining importance, however, and Americans still considered Germany to be their fourth most important international partner behind the United Kingdom, Canada and Japan. Americans considered economic cooperation to be the most positive aspect of US-German relations with a much smaller role played by Germany in U.S. politics.\nAmong the nations of Western Europe, German public perception of the US is unusual in that it has continually fluctuated back and forth from fairly positive in 2002 (60%), to considerably negative in 2007 (30%), back to mildly positive in 2012 (52%), and back to considerably negative in 2017 (35%) reflecting the sharply polarized", "-22.309895664686337" ], [ "its countries as \"stout free-traders who resist the temptation to intervene even to protect iconic companies\" while also looking for ways to temper capitalism's harsher effects, and declared that the Nordic countries \"are probably the best-governed in the world\". Some economists have referred to the Nordic economic model as a form of \"cuddly\" capitalism, with low levels of inequality, generous welfare states and reduced concentration of top incomes and contrast it with the more \"cut-throat\" capitalism of the United States, which has high levels of inequality and a larger concentration of top incomes.\nBeginning in the 1990s, the Swedish economy pursued", "-22.298257352536893" ], [ "DC; and at the United Nations Secretariat in New York.\nThe 2019 GPI indicates Iceland, New Zealand, Portugal, Austria, and Denmark to be the most peaceful countries and Somalia, Afghanistan, Syria, South Sudan, Yemen, and Iraq to be the least peaceful. Long-term findings of the 2017 GPI include a less peaceful world over the past decade, a 2.14 per cent deterioration in the global level of peace in the past decade, growing inequality in peace between the most and least peaceful countries, a long-term reduction in the GPI Militarization domain, and a widening impact of terrorism, with historically high numbers of", "-22.294937982573174" ], [ "despite a similar sized economy and population. Other countries receive more benefit from different areas of the EU budget. Overall, certain countries make net contributions, notably Germany (the largest contribution overall) and the Netherlands (the biggest contribution per person), but also the UK and France. The largest per capita beneficiaries are Greece and Ireland.\nAnother aspect is difference between older Western European and newer Central and Eastern member states, due to transitional arrangements the latter received smaller payments. In 2013 payments per hectare were 527 euros in Greece and only 89 euros in Latvia. In compensation the newer members were allowed", "-22.290922571031842" ], [ "from Iceland's close Cold War ally the United States, indicated that Iceland was left without \"shelter\", according to the 2018 book Small States and Shelter Theory: Iceland’s External Affairs by University of Iceland political scientists. The Icelandic government was under the impression that Iceland would receive extensive assistance from the United States, similar to the aid that Iceland repeatedly got in economic crises during the Cold War. University of Iceland political scientist Baldur Thorhallsson has argued that Iceland received belated assistance from the IMF relative to Ireland (which was also undergoing a financial crisis) because Iceland was not a member", "-22.26455702347448" ], [ "in mainstream terms of search.\nEconomist Jeffrey Sachs argues that among developed countries those with high rates of taxation and high social welfare spending perform better on most measures of economic performance compared to countries with low rates of taxation and low social outlays. He concludes that Friedrich Hayek was wrong to argue that high levels of government spending harms an economy and \"a generous social-welfare state is not a road to serfdom but rather to fairness, economic equality and international competitiveness\". Austrian economist Sudha Shenoy responded by arguing that countries with large public sectors have grown more slowly.\nEconomist Bryan Caplan", "-22.261015307507478" ], [ "and the European Union have shared common values and helped shape the new Europe.\"\n Norway – The Prime Minister of Norway, Jens Stoltenberg, congratulated the European Union, stating that the EU \"has helped to secure peace and build democracy in Europe over many years.\"\n  Switzerland – The President of Switzerland, Eveline Widmer-Schlumpf, congratulated the EU. A government statement said the prize recognised \"the essential role\" which the EU has played in the peaceful development of the continent.\n United Nations – The Secretary-General of the United Nations, Ban Ki-moon, lauded the decision in a statement on behalf of the entire United", "-22.2284522225018" ], [ "environmental degradation, critical lack of modern infrastructure, etc.), and the comparatively much lower growth rate seen in Brazil. However, Brazil's lower growth rate obscures the fact that the country is wealthier than China or India on a per-capita basis, has a more developed and global integrated financial system and has an economy potentially more diverse than the other BRICs due to its raw material and manufacturing potential. Many other Eastern European countries, such as Poland, Romania, the Czech Republic, Slovakia, Hungary, Bulgaria, and several others were able to continually sustain high economic growth rates and do not experience some of", "-22.211294139186066" ], [ "Russia and the United States.\nFinland is well represented in the UN civil service in proportion to its population and belongs to several of its specialised and related agencies. Finnish troops have participated in United Nations peacekeeping activities since 1956, and the Finns continue to be one of the largest per capita contributors of peacekeepers in the world. Finland is an active participant in the Organization for Security and Cooperation in Europe (OSCE) and in early 1995 assumed the co-chairmanship of the OSCE's Minsk Group on the Nagorno-Karabakh conflict.\nCooperation with the other Scandinavian countries also is important to Finland, and it", "-22.1812162657734" ], [ "country, in all of Europe. The Danish scholar of religion Margit Warburg speculates that the Icelandic people are culturally more open to religious innovation. Judaism The Jewish population in Iceland is not large enough to be registered as a separate religious group. There are no synagogues or prayer houses in the country. There was no significant Jewish population or emigration to Iceland until the 20th century, though some Jewish merchants lived in Iceland temporarily during the 19th century. The Icelanders' attitude towards the Jews has mostly been neutral, although in the early 20th century the intellectual Steinn Emilsson was influenced", "-22.174387005412427" ], [ "Empire. Finland's declaration of independence in 1917 from Russia was followed by a civil war, wars against the Soviet Union and Nazi Germany, and a period of official neutrality during the Cold War. Finland joined the United Nations in 1955 and the European Union in 1995 and participates in the Eurozone. Finland has been ranked the second most stable country in the world, in a survey based on social, economic, political, and military indicators.\nFinland has seen excellent results in many international comparisons of national performance such as the share of high-technology manufacturing, the rate of gross domestic product growth, and", "-22.168204414716456" ], [ "Canada have strong economies and are rich in natural resources. According to Moody's, negative effects from New Zealand's appreciation is offset by the fact that her currency has depreciated with respect to Australia, her biggest customer. Eurozone The Eurozone is a special case where some members, principally Germany, enjoy a large current account surplus and so could accept or even benefit from currency appreciation. Other countries though such as Greece, Spain, Portugal and Ireland have twin deficits and so to a large extent would benefit from a depreciation. While the European Central Bank (ECB) did practice", "-22.161270471697208" ], [ "taxes. During this period Sweden's economic growth was also one of the highest in the industrial world. A series of successive social reforms transformed the country into one of the most equal and developed on earth. The consistent growth of the welfare state led to Swedes achieving unprecedented levels of social mobility and quality of life—to this day Sweden consistently ranks at the top of league tables for health, literacy and Human Development—far ahead of some wealthier countries (for example the United States).\nHowever, from the 1970s and onwards Sweden's GDP growth fell behind other industrialised countries and the country's per", "-22.155654586094897" ], [ "neutrality. Twentieth century Sweden often took an insular view and kept Europe and what was going on \"on the continent\" at an arm's length. EU membership challenged this, but a majority of the electorate is still eurosceptic, and it is unlikely that a referendum at any other time but in conjunction with a very severe recession would have yielded a positive result. The Oresund Bridge between Malmö and Copenhagen, Denmark, opened in 2000, is sometimes seen as a symbol of Sweden's stronger ties to continental Europe.\nDuring the late 1990s, the Swedish Armed Forces were severely downsized, with enlistment decreasing to", "-22.105037102007827" ], [ "peace is widely perceived as something intangible, various organizations have been making efforts to quantify and measure it. The Global Peace Index produced by the Institute for Economics and Peace is a known effort to evaluate peacefulness in countries based on 23 indicators of the absence of violence and absence of the fear of violence.\nThe last edition of the Index ranks 163 countries on their internal and external levels of peace. According to the 2017 Global Peace Index, Iceland is the most peaceful country in the world while Syria is the least peaceful one. Fragile States Index (formerly known as", "-22.094867331557907" ], [ "U.S. has 50), a homicide rate that is 1/4 than in the U.S., the 18 most developed countries in Europe all have more broadly distributed wealth than the U.S. (the U.S. ranks 24th in the world), higher lifespan than the U.S., higher literacy rates than the U.S., and higher quality of life than the U.S. Also, Europeans provide 47% of all the humanitarian aid in the world, and are seen by Rifkin as being more effective in global economic market regulation, evidenced by the fact that the EU stopped the merger of General Electric and Honeywell, fined Microsoft for anti-trust,", "-22.075990265293512" ] ]
5eglv4
If "we" are going to Mars soon, why do we mind so much that the Rovers (etc) do not "contaminate" the planet?
[ "This is mostly an assumption, but: The rovers are sent to Mars for research. To take photographs and samples of most everything. If you want to investigate Mars, it's a bad idea to send a long a piece of Earth (e.g. dirt, minerals, bacteria) and then examine it on Mars. TL;DR: Don't get earth bacteria on your Mars samples.", " > the planet will be completely Terra-formed That's unlikely to occur on any conceivable timescale, if ever. Minimizing contamination now, means there's more to study without worry that your samples are already contaminated. For example, it'd be really annoying for one of our probes to 'discover life' only for many man hours of research to discover it is some earth bacteria clinging to the drill bit or what have you.", "Once we contaminate it, there's no un-contaminating it. Right now we have chance to study how things work on Mars -- and notably, to study if there's any life on Mars -- without thinking it actually came from us. So we want to study it carefully in its pristine state, while that exists.", "There's actually a whole wealth of moral hand-wringing that's been going on in science fiction literature on this very topic for years. Basically, we're going to end up going somewhere, which means we're bringing our 'pets' with us. There's really no connection between human habitation and terraforming like you're thinking though. Likely there will be some bacteria and maybe some lichen that might survive, but Mars is pretty damned inhospitable to life actually. The reason we're so keep to keep it lifeless is because we're trying to figure out if there is life there already or if there ever was. Once humans show up and our little biome gets out of the domes then we're going to have a really hard time figuring out what might be Martian and what's Terran. Now here's something that'll keep you up at night. If Mars DOES have life or ever had life then that means that, statistically, the whole universe should be crawling with life. I mean, to have two planets (and lets not forget Europa) that have life would mean that it's pretty common. Now why haven't we heard from any of our neighbors yet? Check out the Fermi Paradox sometime. Suffice to say, I really really hope we don't find life anytime soon. The implications are terrifying.", "Because Mars colonization missions would presumably be obliged to uphold the same standards of *planetary protection*." ]
[ [ "Mars offers greater potential than Earth's satellite as a place for habitation:\nIf we are going to put a few people down there and ensure their appropriate safety, would you then go through all that trouble and then bring them back immediately, after a year, a year and a half? ... They need to go there more with the psychology of knowing that you are a pioneering settler and you don't look forward to go back home again after a couple of years.\nA comprehensive statement of a rationale for \"Mars to Stay\" was laid out by Dr. Aldrin in a May", "-29.529306386501048" ], [ "with such slogans as, \"Traitors Return to Earth\" and \"What Would Zheng He Do?\"\nIn October 2009, Eric Berger of the Houston Chronicle wrote of \"Mars to Stay\" as perhaps the only program that can revitalize the United States' space program:\nWhat if NASA could land astronauts on Mars in a decade, for not ridiculously more money than the $10 billion the agency spends annually on human spaceflight? It's possible ... relieving NASA of the need to send fuel and rocketry to blast humans off the Martian surface, which has slightly more than twice the gravity of the moon, would actually reduce", "-27.74547567763875" ], [ "on a non-existent partner, never took form.\nIn March 2014, SpaceX said that they also had been contacted by Inspiration Mars, but that accommodating such requirements would require some additional work and that such work was not the current focus of SpaceX. Mission trajectory as proposed They proposed a free return trajectory to allow the spacecraft to use the smallest possible amount of propellant to flyby Mars and return to Earth. They stated that the January 2018 launch window offered a rare orbit opportunity to travel to Mars and return to Earth in 501 days.\nTheir stated backup plan involved a mission", "-27.625588307233556" ], [ "costs by about a factor of 10, by some estimates.\nHard Science Fiction writer Mike Brotherton has found \"Mars to Stay\" appealing for both economic and safety reasons, but more emphatically, as a fulfillment of the ultimate mandate by which \"our manned space program is sold, at least philosophically and long-term, as a step to colonizing other worlds\". Two-thirds of the respondents to a poll on his website expressed interest in a one-way ticket to Mars \"if mission parameters are well-defined\" (not suicidal).\nIn June 2010, Buzz Aldrin gave an interview to Vanity Fair in which he restated \"Mars to Stay\":\nDid the", "-27.35492806811817" ], [ "Mars One Overview Mars One's original concept includes launching a robotic Mars lander and Mars orbiter as early as 2020, to be followed by a human crew of four in 2024, and one in 2026 which would not be returning to Earth. Although the announcement garnered much international publicity, the concept has been criticized by scientists, engineers, and those in the aerospace industry. Mars One is noted as being very short on funding, lacking critical concepts about hardware, life support, electrical power supply, and has been criticized as glossing over logistics, medical concerns, and protection against space radiation. The concept", "-27.153959487237444" ], [ "for Mars first they make good time and land with high spirits.\nThe Martians are not happy to see them, however. There has always been a bitter rivalry between the two worlds, and Mars has a reputation for winning the classic at all costs and through any means, scrupulous or otherwise. When they try to refuel the Last Hope they discover their shipment of fuel has somehow disappeared from the warehouse in which it was stored. A long drawn out search finally locates the missing fuel in a pile of garbage that was ready for destruction. Jerry, Dick, and Tod all", "-26.825525505839323" ], [ "and get back home. If the propellant has to be transported there from Earth, costs of a launching soar.\nWithout some radical improvements in technology, the prospects for sending astronauts on a round-trip to Mars any time soon are slim, whatever the presidential rhetoric. What's more, the president's suggestion of using the Moon as a base — a place to assemble equipment and produce fuel for a Mars mission less expensively — has the potential to turn into a costly sideshow. There is, however, an obvious way to slash the costs and bring Mars within reach of early manned exploration. The", "-26.82133186461897" ], [ "and back to Earth on a 501-day round trip, with no landing planned on Mars. The mission would have taken advantage of an infrequently occurring free return trajectory—a unique orbit opportunity which occurs only once every fifteen years—and will allow the space capsule to use the smallest possible amount of fuel to get it to Mars and back to Earth. The two-person American crew – a man and a woman – will orbit around Mars at a distance of 100 miles (160 km) of the surface. \"If anything goes wrong, the spacecraft should make its own way back to Earth —", "-26.81144719437725" ], [ "probability but cannot yet be ruled out.\nThere are no immediate plans for a Mars sample-return, but it remains a high priority for NASA and the ESA because of its great potential biological and geological interest. The European Space Foundation report cites many advantages of a Mars sample-return. In particular, it would permit extensive analyses on Earth, without the size and weight constraints for instruments sent to Mars on rovers. These analyses could also be carried out without the communication delays for experiments carried out by Martian rovers. It would also make it possible to repeat experiments in multiple laboratories with", "-26.549389022868127" ], [ "Mars: Colonizing the Red Planet summarizes their rationale for Mars to Stay:\n[Mars to stay] would obviate the need for years of rehabilitation for returning astronauts, which would not be an issue if the astronauts were to remain in the low-gravity environment of Mars. We envision that Mars exploration would begin and proceed for a long time on the basis of outbound journeys only.\nIn November 2010, Keith Olbermann started an interview with Derrick Pitts, Planetarium Director at the Franklin Institute in Philadelphia, by quoting from the Dirk Schulze-Makuch and Paul Davies article, saying, \"The Astronauts would go to Mars with the", "-26.0591901116386" ], [ "space. Every member of the group raised their hand.\nAdditional immediate and pragmatic reasons to consider one-way human space exploration missions are explored by Krauss. Since much of the cost of a voyage to Mars will be spent on returning to Earth, if the fuel for the return is carried on board, this greatly increases the mission mass requirement – that in turn requires even more fuel. According to Krauss, \"Human space travel is so expensive and so dangerous ... we are going to need novel, even extreme solutions if we really want to expand the range of human civilization beyond", "-25.977048012180603" ], [ "on Mars, but given the recent Curiosity rover findings, past Martian life seems possible. Objectives The Mars 2020 rover will explore a site likely to have been habitable. It will seek signs of past life, set aside a returnable cache with the most compelling rock core and soil samples, and demonstrate technology needed for the future human and robotic exploration of Mars.\nA key mission requirement is that it must help prepare NASA for its long-term Mars sample-return mission and crewed mission efforts. The rover will make measurements and technology demonstrations to help designers of a future human expedition understand any", "-25.88396272204045" ], [ "North America.\nHowever, the Mars colony, dubbed the Mars Base, does not forget about the plight of Earth. Troops are sent in to fight the Inbit from the Moon, only to fail miserably. The Inbit do not attack Mars and show no interest towards the other planets. Surprisingly, the aliens show no hostility towards humans unless they are directly provoked. The Inbit can also sense the presence of HBT and use of the fuel is limited under their supervision, as HBT is a common component in weapons technology. Mars Base becomes a gigantic military factory, producing vast amounts of advanced weaponry", "-25.85235354086035" ], [ "believe that Mars was intentionally responsible for the delay of 18 hours searching for the fuel. They take off from Mars and head towards Jupiter.\nHalfway however, Jerry discovers that Dick has not fully recovered from his injuries. He becomes sick and delirious, and they are forced to turn back to Mars to get Dick the medical care he needs. By the time the Last Hope leaves Mars for the second time, they are nearly 100 hours behind schedule, and their carefully planned course is now useless.\nEn route to Jupiter for the second time the Last Hope loses power due to", "-25.805385378153005" ], [ "said in an interview that he wants to see humans on Mars by 2035, but he does not think Mars One will be the first to achieve it. Publications Wired magazine gave it a plausibility score of 2 out of 10 as part of their 2012 Most Audacious Private Space Exploration Plans.\nThe project lacks current funding as well as sources for future funding. The organization has no spacecraft or rocket in development or any contracts in place with companies that could provide a spacecraft or rocket. While plans point to SpaceX for both resources, the company has no contracts", "-25.76376166038972" ], [ "in 2016 to be funded by both private and public funds. The speed of commercially available Mars transport for both cargo and humans will be driven, in large part, by market demand as well as constrained by the technology development and development funding.\nElon Musk said that there is no expectation of receiving NASA contracts for any of the ITS system work SpaceX was doing. He also indicated that such contracts, if received, would be good. Competition for the American super-heavy-lift market In August 2014, media sources noted that the US launch market might have two competitive launch vehicles available", "-25.647229427588172" ], [ "toward Mars at one point being a dynamic Earth-like planet). Goal 4: Prepare for the human exploration of Mars A human mission to Mars presents a massive engineering challenge. With Mars' surface containing superoxides and lacking a magnetosphere and an ozone layer to protect from radiation from the Sun, scientists would have to thoroughly understand as much of Mars' dynamics as possible before any action can be taken toward the goal of putting humans on Mars. Challenges Mars exploration missions have historically had some of the highest failure rates for NASA missions, which can be attributed to the immense engineering", "-25.486957982247986" ], [ "on Mars with no return trip planned. Although there are a number of technological and physiological issues involved with such a mission that remain to be worked out, there are also a number of behavioral issues affecting the crew that are being addressed before launching such missions. In preparing for such an expedition, important psychological, interpersonal and psychiatric issues occurring in human spaceflight missions are under study by national space agencies and others.\nIn October 2015, the NASA Office of Inspector General issued a health hazards report related to human spaceflight, including a human mission to Mars. Psychosocial issues on-orbit Researchers", "-25.438191473360348" ], [ "Mars' thin atmosphere and weak magnetic field provide less protection against high-energy particles than on Earth, this event overloads many electronics systems on Mars, as well as damaging the \"exosuit\" (space suit) systems of many people who are outdoors and otherwise unprotected, so that several members of the party are killed, including Telemachus. Furthermore, the GPS-like navigation system Teri has used all her life is permanently down.\nTeri and Alik, a boy in the party, re-invent celestial navigation and reach the nearest railhead, where there is a working phone, only to find that the disaster is planetwide and help will", "-25.277792865686934" ], [ "lander to the planet by 2016 and, after several stages, land four humans on the Martian surface for permanent settlement in 2023. A new set of four astronauts would then arrive every two years.\nMars One has received a variety of criticism, mostly relating to medical, technical and financial feasibility. There are also unverified claims that Mars One is a scam designed to take as much money as possible from donors, including reality show contestants. Many have criticized the project's US$6 billion budget as being too low to successfully transport humans to Mars, to the point of being delusional. A similar", "-25.226939913787646" ], [ "of humans visiting Mars in the future.", "-25.224891345809283" ], [ "other potential environmental conditions that could affect future astronauts living and working on Mars. Design The three major components of the Mars 2020 spacecraft are the cruise stage for travel between Earth and Mars; the Entry, Descent, and Landing System (EDLS) that includes the aeroshell, parachute, descent vehicle, and sky crane; and the rover.\nThe rover is based on the design of Curiosity. While there are differences in scientific instruments and the engineering required to support them, the entire landing system (including the sky crane and heat shield) and rover chassis can essentially be recreated without any additional engineering or research.", "-25.210795711631363" ], [ "The Day Mars Invaded Earth Plot NASA successfully lands a robotic surveyor on Mars. The rover begins to explore, but after just a few minutes it is completely destroyed by what appears to be a high energy surge. At exactly the same instant back at mission control, Dr. Dave Fielding (Kent Taylor), in charge of the project, suddenly feels oddly disconnected and not himself; he shakes it off and then goes to face the crowd of expectant reporters. Right after he leaves, his exact body double is sitting at his desk.\nDave then leaves for a vacation and flies to California", "-25.207335180282826" ], [ "to be first to Mars. It instead sees synergies in possible cooperation with such entities. However, politicians may push NASA into competition with private entities such as Boeing and SpaceX in getting humans to Mars. President Trump has planned for NASA to reach Mars in the 2030s.\nBoeing has stated that one of its rockets will lead to the first crewed expedition to Mars, before SpaceX or others will land a crewed mission. Boeing is the primary contractor on the U.S. Space Launch System (SLS) NASA rocket program that has the ultimate goal of a crewed Mars mission. SpaceX has declined", "-25.13673019169073" ], [ "sending anybody anywhere\".\nIn January 2014, German former astronaut Ulrich Walter strongly criticized the project for ethical reasons. Speaking with Tagesspiegel, he estimated the probability of reaching Mars alive at only 30%, and that of surviving there more than three months at less than 20%. He said, \"They don't care what happens to those people in space... If my tax money were used for such a mission, I would organize a protest.\"\nSpace tourist Richard Garriott stated in response to Mars One, \"Many have interesting viable starting plans. Few raise the money to be able to pull it off.\"\nFormer astronaut Buzz Aldrin", "-25.08250652183051" ], [ "of reasons and with varied proposals. One of the oldest groups is the Mars Society who promote a NASA program to accomplish human exploration of Mars and have set up Mars analog research stations in Canada and the United States. Mars to Stay advocates recycling emergency return vehicles into permanent settlements as soon as initial explorers determine permanent habitation is possible.\nElon Musk founded SpaceX with the long-term goal of developing the technologies that will enable a self-sustaining human colony on Mars. In 2015, he stated \"I think we've got a decent shot of sending a person to Mars in 11", "-25.064719422336566" ], [ "one-way trip to Mars in a presentation at the International Space Development Conference, arguing that the mission could be done with less difficulty and expense without a return to Earth. In 2006, former NASA engineer James C. McLane III proposed a scheme to initially colonize Mars via a one-way trip by only one human. Papers discussing this concept appeared in The Space Review, Harper's Magazine, SEARCH Magazine and The New York Times. NASA Design Reference Mission 5.0 (2007) NASA released initial details of the latest version conceptual level human Mars exploration architecture in this presentation. The study further developed concepts", "-24.987269209770602" ], [ "why the decision to write Packing for Mars was not a random adventure that Roach decided to embark on. \"I had no idea until I started this book that when you're heading to the moon or to Mars, you're essentially coasting. I thought it was like a car where you'd have your foot on the gas the entire time, and I used to think, 'Jesus, that's a lot of gas.' \" By the end of her book, she was able to vividly describe and make understandable the many nitty-gritty details that would normally be overlooked. She does this by addressing", "-24.974352922901744" ], [ "Mars. While the astronauts traveling to the Moon could do so in spacecraft with a relatively small amount of habitable space, a mission to Mars would require something much larger. Astronauts would need a facility with ample life support, living space and radiation shielding for the much longer journey. A 1999 NASA study estimated that a mission to Mars would require lifting about 437 metric tons (482 short tons) into space, of which 250 metric tons (280 short tons) was propellant.\nAldrin proposed that the costs of Mars missions could be greatly reduced by use of large space stations, called \"castles\",", "-24.9720143919385" ], [ "to overpower him.\nHowever, Earth has moved out of the Martian orbit, thus, making the journey home impossible. Yet Brown creates a theory that if they can use the gravity pull of the Sun to get home. Some time after setting off, the crew all slowly succumb to gamma rays from the Sun one-by-one. By a miracle, there is a total eclipse and Mercury shuts of the rays from the Sun but they quickly find themselves being pulled into Mercury's gravity pull.\nThe crew then realise that Buchan Island has made various satellite fixes on Mercury, thus enabling MR4 to make the", "-24.87541903850797" ], [ "Comparison of embedded computer systems on board the Mars rovers The embedded computer systems on board the Mars rovers sent by NASA must withstand the high radiation levels and large temperature changes in space. For this reason their computational resources are limited compared to systems commonly used on Earth. In operation Direct teleoperation of a Mars rover is impractical, since the round trip communication time between Earth and Mars ranges from 8 to 42 minutes and the Deep Space Network system is only available a few times during each Martian day (sol). Therefore, a rover command team plans, then sends,", "-24.8710388935433" ], [ "Human mission to Mars Travel to Mars The energy needed for transfer between planetary orbits, or \"Delta-v\", is lowest at intervals fixed by the synodic period. For Earth / Mars trips, this is every 26 months (2 years and 2 months), so missions are typically planned to coincide with one of these launch windows. Due to the eccentricity of Mars' orbit, the energy needed in the low-energy windows varies on roughly a 15-year cycle with the easiest windows needing only half the energy of the peaks. In the 20th century, there was a minimum in the 1969 and 1971 launch", "-24.816091635992052" ], [ "U.S. Space Shuttle. Inspiration Mars Poynter was a developer of the crew and life-support systems \nfor the Inspiration Mars free-return mission to Mars planned for launch in January 2018. The two person spaceflight mission was originally to be a private, nonprofit venture \nof 501 days duration which will allow a small human-carrying spacecraft to use the smallest possible amount of fuel to get it to Mars and back to Earth. However, this plan proved unworkable without significant funding and assistance from NASA.\nThe life support system is critical. \"If anything goes wrong, the spacecraft should make its own way back", "-24.80835822942754" ], [ "Mars in the Ares 4 MAV. While working on the rover, Watney accidentally shorts out the electronics of Pathfinder, losing the ability to communicate with Earth (except for spelling out Morse code with rocks).\nAfter Watney leaves for Schiaparelli, NASA discovers that a dust storm is approaching his path, but has no way to warn him. The rover's solar cells will be less and less able to recharge, endangering both the rendezvous and his immediate survival (if there is not enough power to run his life-support equipment). While crossing Arabia Terra, Watney becomes aware of the darkening sky and improvises a", "-24.78334230388282" ], [ "between Earth and Mars, started on November 29, 2008 and communication with the rovers was not possible until December 13, 2008. Increased energy On February 6, 2009, a beneficial wind blew off some of the dust accumulated on the panels. This led to an increase in energy output to 240 watt-hours (860 kJ) per day. NASA officials stated that this increase in energy was to be used predominantly for driving.\nOn April 18, 2009 (sol 1879) and April 28, 2009 (sol 1889) energy output of the solar arrays were increased by cleaning events. The energy output of Spirit's solar arrays climbed from", "-24.76790007587624" ], [ "at Mars on October 11, 1999, at 7:45:14 UT, but a malfunctioning valve during the Earth swingby resulted in a loss of fuel and left the spacecraft with insufficient acceleration to reach its planned trajectory. Two course correction burns on December 21 used more propellant than planned, leaving the spacecraft short of fuel. New mission plan The new plan was for Nozomi to remain in heliocentric orbit for an additional four years, including two Earth flybys in December 2002 and June 2003, and encounter Mars at a slower relative velocity in December 2003. First Earth flyby On April 21, 2002,", "-24.749514303799515" ], [ "the conclusion of the surface stay; the rest would be available for Mars rovers. The process of generating fuel is expected to require approximately ten months to complete. Second launch Some 26 months after the Earth Return Vehicle is originally launched from Earth, a second vehicle, the Mars Habitat Unit, would be launched on a 6-month long low-energy transfer trajectory to Mars, and would carry a crew of four astronauts (the minimum number required so that the team can be split in two without leaving anyone alone). The Habitat Unit would not be launched until the automated factory aboard the", "-24.7061613950209" ], [ "return trip, to dramatically reduce the size of the outbound vessel and the cost of the mission. He also published an article in the Journal of the British Interplanetary Society in 1989 recommending in-situ propellant production for a manned Mars mission, though he recommended that the technique would not be feasible until a Mars base were already well-established, due to the risks of relying on fueling a spacecraft with in-situ produced propellant. Robert Zubrin credits this paper as a forerunner of the Mars Direct mission architecture, in which French's concern is resolved by devoting a separate spacecraft to the return", "-24.644890857318387" ], [ "5% overnight, in contrast to the expectation they would decrease—the added power allowed the missions to continue beyond their expected lifetime. One theory is that wind currents in craters aid in cleaning events, and also if the rover is sloped, this is speculated to help remove dust.\nThe term started being used in 2004 as the Mars Exploration Rovers' (MER) solar panels started to benefit from these events. The rovers were expected to last about 90 sols (Martian days) on Mars, after which dust would cover their solar panels and reduce solar power to levels too low for the rovers to", "-24.631056175916456" ], [ "of planning for future human exploration missions through May 1998.\nThe report of the Reference Mission Version 3.0 states:\nFrom the work of the original Reference Mission (Version 1.0), the strategy for the human exploration of Mars has evolved from its original form to one of reduced system mass, use of a smaller, more reasonable launch vehicle, and use of more current technology. The steps which have been taken by the Exploration Team are motivated by the need to reduce the mass of the payload delivery flights, as well as the overall mission cost, without introducing additional mission risk. By eliminating the", "-24.598406273346882" ], [ "orbit to a Mars transfer orbit is many kilometers per second. When we think of getting astronauts to the surface of Mars and back home we quickly realize that an enormous amount of propellant is needed if everything is taken from the Earth. This was the conclusion reached in the 1989 '90-Day Study' initiated by NASA in response to the Space Exploration Initiative.\nSeveral techniques have changed the outlook on Mars exploration. The most powerful of which is in-situ resource utilization. Using hydrogen imported from Earth and carbon dioxide from the Martian atmosphere, the Sabatier reaction can", "-24.594209508912172" ], [ "the counter-invasion of Mars is going badly, with the Martians successfully defending themselves using heat ray weapons against the invaders. Charlotte Hemming, an aristocratic young photojournalist, is saved by Robert Autumn from the thuggish agents of an increasingly repressive British Government - led by Spry, now Prime Minister. Autumn asks her to travel to Mars and investigate why out of the thousands of soldiers sent, only three hundred and seventy two have returned from the war. At the same time, the government is shown to be under pressure from a Nationalistic Scottish breakaway faction; plus Canada, Australia and New", "-24.510672581076506" ], [ "need to be overcome are only the requirements of the rigor of a 501-day trip on a psychological and physical level for the human crew. However, in November 2013, Tito and other Mars Inspiration team members admitted that their plan was impossible without significant levels of assistance and funding from NASA.", "-24.489215416404477" ], [ "space and other structures. Some critics contend unmanned robots can perform better than humans at a fraction of the expense. If life exists on Mars, a human mission could contaminate it by introducing earthly microbes, so robotic exploration would be preferable. SpaceX The long-term goal of the private corporation SpaceX is the establishment of routine flights to Mars to enable colonization. To this end, the company is developing Starship, a spacecraft capable of crew transportation to Mars and other celestial bodies, along with its booster Super Heavy, a super heavy-lift launch vehicle. In 2017 SpaceX announced plans to send two", "-24.47846237127669" ], [ "policies regarding the exploration of space and occupancy of celestial bodies. In the 1967 United Nations Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space, Including the Moon and Other Celestial Bodies, it was determined that no country may take claim to space or its inhabitants. Since the planet Mars offers a challenging environment and dangerous obstacles for humans to overcome, the laws and culture on the planet will most likely be very different from those on Earth. With Elon Musk announcing his plans for travel to Mars, it is uncertain how the", "-24.475212269317126" ], [ "decomposition within the RCM. This waste gas is also used for gas bearings (dry lubrication) of all moving parts as well as the circulation controlled \"blowing\" of the wings for stability control and navigation. Mars entomopter Flight in the atmosphere of Mars is difficult. Aerial Mars rovers using a conventional fixed wing would have to fly at over 250 mph just to stay aloft in the rarefied Mars atmosphere. This makes landing on the rocky surface almost impossible, thereby precluding sample inspection/gathering. Also, the high speed flight means that dwell time on any particular area will be difficult—a negative feature that", "-24.46942160193794" ], [ "to Mars by a single Falcon Heavy launch, the Dragon spacecraft acting as their interplanetary cruise habitat. Additional living space for the journey would be enabled through the use of inflatable add-on modules if required. The problems associated with long-term weightlessness would be addressed in the same manner as the baseline Mars Direct plan, a tether between the Dragon habitat and the TMI (Trans-Mars Injection) stage acting to allow rotation of the craft.\nThe Dragon's heatshield characteristics could allow for a safe descent if landing rockets of sufficient power were made available. Research at NASA's Ames Research Center", "-24.42733546247564" ], [ "current focus of SpaceX. SpaceX had no contracts with Mars One. The first Mars One cargo mission to Mars was proposed to launch by 2022, followed by a crewed mission in 2024, but without funds, hardware, and without a launcher it did not happen. Mars Transit Vehicle A hypothetical crewed interplanetary spacecraft, for which there were no concept design studies, was to have been assembled in low Earth orbit and comprise two propellant modules: a Transit Living Module (discarded just before arrival at Mars) and a lander (see \"Human Lander\" below). In 2012, Mars One speculated that the Transit Living", "-24.364070116826042" ], [ "budgetary cuts, and when Congress reinstated funding for Mars exploration after a loud outcry from planetary scientists and enthusiasts, NASA announced in December 2012 the Mars 2020 rover and, later, that it would indeed prepare a sample cache. Landing The proposed MAX-C mission would have arrived at Mars in January 2019 in the northern hemisphere during winter, given the favorable atmospheric pressure at this season and performance of the 'sky crane' delivery system. Due to the eccentricity of the Martian orbit, latitude access for a solar powered rover, northern latitudes are less severe on the power/thermal design than southern", "-24.328573185761343" ], [ "controlled descent test vehicle to accomplish propulsive-return over-water tests. SpaceX COO Gwynne Shotwell said at the Singapore Satellite Industry Forum in summer 2013 \"If we get this [reusable technology] right, and we’re trying very hard to get this right, we’re looking at launches to be in the US$5 to 7 million range, which would really change things dramatically.\"\nMusk stated in a 2011 interview that he hopes to send humans to Mars' surface within 10–20 years. In 2010, Musk's calculations convinced him that the colonization of Mars was possible. In June 2013, Musk used the descriptor \"Mars Colonial Transporter\" (only later", "-24.22694442482498" ], [ "be removed while preserving the life of the human. Containment seems the only option, but effective containment to the same standard as a robotic rover appears difficult to achieve with present-day technology. In particular, adequate containment in the event of a hard landing is a major challenge.\nHuman explorers may be potential carriers back to Earth of microorganisms acquired on Mars, if such microorganisms exist. Another issue is the contamination of the water supply by Earth microorganisms shed by humans in their stools, skin and breath, which could have a direct effect on the long-term human colonization of Mars. The Moon", "-24.21884811943164" ], [ "the need for spare parts in a Mars colony based on the failure rates of parts on the ISS. They determined that a resupply mission every two years would be necessary unless a large space in the initial launch were to be reserved for extra materials. Lansdorp commented on this saying, \"They are correct. The major challenge of Mars One is keeping everything up and running. We don't believe what we have designed is the best solution. It's a good solution.\"\nIn March 2015, one of the Mars One finalists, Joseph Roche, stated to media outlets that he believes the mission", "-24.157966610509902" ], [ "interested, the first reflight of a Falcon 9 booster stage could happen as early as late 2014.\nIn February 2014, SpaceX made explicit that the newly defined super-heavy launch vehicle for what was then called Mars Colonial Transporter would also make use of the reusable technology.\nThis was consistent with Musk's strategic statement in 2012 that \"The revolutionary breakthrough will come with rockets that are fully and rapidly reusable. We will never conquer Mars unless we do that. It'll be too expensive. The American colonies would never have been pioneered if the ships that crossed the ocean hadn't been reusable.\"\nAlso in May", "-24.14144569974087" ], [ "Mars rover A Mars rover is a motor vehicle that travels across the surface of the planet Mars upon arrival. Rovers have several advantages over stationary landers: they examine more territory, they can be directed to interesting features, they can place themselves in sunny positions to weather winter months, and they can advance the knowledge of how to perform very remote robotic vehicle control.\nThere have been four successful robotically operated Mars rovers, all managed by the Jet Propulsion Laboratory: Sojourner, Opportunity, Spirit and Curiosity. On January 24, 2016, NASA reported that current studies on Mars by Curiosity and Opportunity (the", "-24.123227783016773" ], [ "become more open – and dangerous – about their thefts. The Astros quickly convert their vehicles into a hi-tech defense military force, and\nso, the war on Mars began. Later, the Astros at Eagle Command Base intercept a coded message from the aliens, saying they are not from Mars, but still intend to drive away the astronauts and claim the crystals for themselves.\nIt was a harsh struggle for a long while, with both sides on a stalemate, until one of the Astro machines, named the Crystal Reaper, accidentally stumbled across the cracks forming the surface of the Alien Hive on Olympus", "-24.11216575835715" ], [ "Exploration of Mars Current status On June 10, 2018, Opportunity rover fell silent, leaving Curiosity of the Mars Science Laboratory mission with six orbiters surveying the planet: Mars Odyssey, Mars Express, Mars Reconnaissance Orbiter, Mars Orbiter Mission, MAVEN, and the Trace Gas Orbiter, which have contributed massive amounts of information about Mars. The stationary lander InSight is investigating the deep interior of Mars. No sample return missions have been attempted for Mars and an attempted return mission for Mars' moon Phobos (Fobos-Grunt) failed in 2011.\nFive more missions are in the late stages of development and fabrication, and will be launched", "-24.10264118584746" ], [ "by Gilliam, entitled Springtime for Mars, providing a story about what happened to the Sojourner rover after it lost contact with us on 24 September 1997. In Springtime for Mars a young female hacker is able to reestablish contact with the rover and the story comes \"full circle within the increasing reverberations of diaspora and legacy.\"", "-24.097040407854365" ], [ "an opportunity to push on to Mars by extending the Apollo program was squandered by a change in focus to Shuttle and space station programs that only reached orbit: \"I spent some time analysing what we could have done had we used the budgets we received to explore the capabilities inherent in the Apollo hardware after it was built. The short answer is we would have been on Mars 15 or 20 years ago, instead of circling endlessly in low Earth orbit.\"\nIt was widely known that Griffin hoped to keep his job under President Barack Obama so that Constellation and", "-24.096864783074125" ], [ "and sociological issues that could affect long-duration expeditionary space missions. Early human spaceflight missions to Mars are expected by some to have significant psycho-social problems to overcome, as well as provide considerable data for refining mission design, mission planning, and crew selection for future missions. Revisions Since Mars Direct was initially conceived, it has undergone regular review and development by Zubrin himself, the Mars Society, NASA, Stanford University and others. Mars Semi-Direct Zubrin and Weaver developed a modified version of Mars Direct, called Mars Semi-Direct, in response to some specific criticisms. This mission consists of three spacecraft and includes", "-24.092438160460006" ], [ "or 12 years\". Richard Branson, in his lifetime, is \"determined to be a part of starting a population on Mars. I think it is absolutely realistic. It will happen... I think over the next 20 years, we will take literally hundreds of thousands of people to space and that will give us the financial resources to do even bigger things\".\nIn June 2013, Buzz Aldrin, American engineer and former astronaut, and the second person to walk on the Moon, wrote an opinion, published in The New York Times, supporting a human mission to Mars and viewing the Moon \"not as a destination", "-24.04140664492752" ], [ "risk than landings. Most early Soviet proposals called for launches using the ill-fated N1 rocket. They also usually involved fewer crew than their American counterparts. Early Martian architecture concepts generally featured assembly in low Earth orbit, bringing all needed consumables from Earth, and designated work vs. living areas. The modern outlook on Mars exploration is not the same. Recent initiatives In every serious study of what it would take to land humans on Mars, keep them alive, and then return them to Earth, the total mass required for the mission is simply stunning. The problem", "-24.011556431076315" ], [ "Mars 3 were physically tethered probes; Sojourner was dependent on the Mars Pathfinder base station for communication with Earth; MER-A & B and Curiosity were on their own. As of August 2019, Curiosity is still active, while Spirit, Opportunity, and Sojourner completed their missions before losing contact.", "-23.981552875367925" ], [ "Return Vehicle. Precise landing would be supported by a radar beacon started by the first lander. Once on Mars, the crew would spend 18 months on the surface, carrying out a range of scientific research, aided by a small rover vehicle carried aboard their Mars Habitat Unit, and powered by the methane produced by the Earth Return Vehicle. Return and follow-up missions To return, the crew would use the Earth Return Vehicle, leaving the Mars Habitat Unit for the possible use of subsequent explorers. On the return trip to Earth, the propulsion stage of the Earth Return Vehicle would be", "-23.969111211463314" ], [ "mechanical arm for new planetary discoveries. One of these discoveries came from sending a rover to another planet and collecting samples from this planet. With a rover, NASA can just keep the rover on its designated planet and explore all they want. Mechanical arms are also attached to the ships that are acting as satellite stations in Earth's atmosphere because they help grab degrees that might cause damage to other satellites. Not only that, but they also keep astronauts safe when they have to go make a repair to the ship or satellite. Now, space isn't where all the rover's", "-23.948484620821546" ], [ "military discovers their hideout, the Martians are forced to return home without their female captives. Mars still needs women. Development Buchanan was making low budget films for AIP. He said he might've rejected an idea that AlP had and told them to call him back in an hour. \"With Mars, I called Jim Nicholson with the opening. 'We get this signal from outer space... What is it, Mr. Nicholson, what is it?'. And I said, 'Mars Needs Women!' He said, 'When can you start?' It was almost like a fond throwback to the days at Columbia, when they'd just trust", "-23.948098971577565" ], [ "is difficult with chemical rockets. It could be feasible with advanced spacecraft propulsion technologies, some of which have already been tested to varying levels, such as Variable Specific Impulse Magnetoplasma Rocket, and nuclear rockets. In the former case, a trip time of forty days could be attainable, and in the latter, a trip time down to about two weeks. In 2016, a University of California scientist said they could further reduce travel time for a robotic probe to Mars down to \"as little as 72 hours\" with the use of a \"photonic propulsion\" system instead of the fuel-based rocket propulsion", "-23.887354211150523" ], [ "the intended object in only one run.\nThe Mars landing rovers have to utilize a similar manipulation of input. NASA has to overcome an approximately twenty-minute time delay in information exchange from Earth and the rover on Mars.", "-23.83300230922032" ], [ "challenges of these missions as well as some bad luck. With many of the goals of the MEP involving entry, descent, and landing of spacecraft (EDL) on the surface of Mars, factors like the planet's atmosphere, uneven surface terrain, and high cost of replicating Mars-like environments for testing come into play. Atmosphere Compared to the Earth, the atmosphere of Mars is about 100 times thinner. As a result, if a landing craft were to descend into Mars' atmosphere, it would decelerate at a much lower altitude, and depending on the object's mass, may not have enough time to reach terminal", "-23.81858777609159" ], [ "The rover is scheduled to land on Mars on 18 February 2021, with a planned surface mission of at least 1 Mars year (668 sols or 687 Earth days).", "-23.81321802903767" ], [ "life forms and the city people, who use technic and accept that most life on Mars results from earthly terraforming. After finding peace all human Martians decide to start an expedition to the old home, because earth is still silent after all those centuries. The Martian astronauts reach the moon and discover the last messages of the final survivor of the moon bas crew. Understanding, that the impact destroyed civilization they dare to visit earth. This almost results in a catastrophe. The landing party is attacked by primitives and has to learn that even advanced technology is useless, because their", "-23.7623059187099" ], [ "the new and radically lower-cost transport infrastructure to build up a sustainable human civilization on Mars, potentially, on numerous other locations around the Solar System, by innovating and meeting the demand that such a growing venture would occasion.\nIn July 2017, SpaceX made public plans for ITS based on a smaller launch vehicle and spacecraft. The new system architecture has \"evolved quite a bit\" since the November 2016 articulation of the very large \"Interplanetary Transport System\". A key driver of the new architecture is to make the new system useful for substantial Earth-orbit and cislunar launches so that the new system", "-23.749129456671653" ], [ "stated in February 2013 that \"Inspiration Mars's proposed schedule is a significant challenge due to life support systems, space radiation response, habitats and the human psychology of being in a small spacecraft for over 500 days\", but that \"we remain open to further collaboration as their proposal and plans for a later mission develop\".\nJohn Logsdon, professor emeritus at George Washington University's Space Policy Institute, said the timeline was \"totally implausible\" for a mission to be launched in 2018, although the\"Plan B\" mission might be possible \"if the stars align\".\nTheir website became defunct in late 2015.", "-23.741082680346153" ], [ "nobody stayed on Mars to use the off – switch, millions of years later this invention caused the aircraft of Commander Drax final mission to jump into future instead of being destroyed by the shockwave of a comet-impact.\nAfter moving to earth the Hydree society declined. Only after the impact the former martians started to try to influence earths faith.\nThe Hydree are also the inventors of a weapon named Flächenräumer, that malfunctioned and started to cause instable parallel universes. Nosfera The Nosfera are the result of experiments, the Daa’muren have made with humans. A child with at least one Nosfera parent", "-23.72459575968969" ], [ "used as a counterweight to generate artificial gravity for the trip back.\nFollow-up missions would be dispatched at 2 year intervals to Mars to ensure that a redundant ERV would be on the surface at all times, waiting to be used by the next crewed mission or the current crew in an emergency. In such an emergency scenario, the crew would trek hundreds of kilometers to the other ERV in their long-range vehicle. Components The Mars Direct proposal includes a component for a Launch Vehicle \"Ares\", an Earth Return Vehicle (ERV) and a Mars Habitat Unit (MHU). Launch Vehicle The plan", "-23.724551851746128" ], [ "lies in that to launch the amount of consumables (oxygen, food and water) even a small crew would go through during a multi-year Mars mission, it would take a very large rocket with the vast majority of its own mass being propellant. This is where multiple launches and assembly in Earth orbit come from. However even if such a ship stocked full of goods could be put together in orbit, it would need an additional (large) supply of propellant to send it to Mars. The delta-v, or change in velocity, required to insert a spacecraft from Earth", "-23.719121558395273" ], [ "but more a point of departure, one that places humankind on a trajectory to homestead Mars and become a two-planet species\". In August 2015, Aldrin, in association with the Florida Institute of Technology, presented a \"master plan\", for NASA consideration, for astronauts, with a \"tour of duty of ten years\", to colonize Mars before the year 2040.", "-23.701334532848705" ], [ "first Mars and Lawrence didn’t want to give it up, so Creed offered $20,000 for it. They were so surprised that they said \"You can have that one and whatever else you need!\" It was that call that saved them, allowing them to stay in L.A. a little bit longer. After that, in late 2008, they were asked by Aaron-Bay Schuck (Mars' A&R) to help write Flo Rida's number one single \"Right Round\". From then on, Lawrence and Mars decided to call their duo The Smeezingtons. Levine joined the team later.\nIn 2008, Mars was a struggling singer-songwriter, and Levine was", "-23.693593116127886" ], [ "Corps to Mars to protect American civilians and interests with lethal force if necessary. The discoveries on Mars, however, start a global war. The United States and its allies fight against most of the member nations of United Nations.\nAs the war drags on it is discovered that Mars is not the only place that holds ruins of an alien civilization. In Luna Marine it is discovered that the Earth's own Moon contains mysterious technologies of long vanished species. The US attempts to take those ruins currently held by the UN using another Marine force made from veterans from Mars,", "-23.691417609536074" ], [ "is a Mars rover under development by NASA with a launch planned for 2020. It is intended to investigate an astrobiologically relevant ancient environment on Mars, investigate its surface geological processes and history, including the assessment of its past habitability and potential for preservation of biosignatures within accessible geological materials.", "-23.66683809519691" ], [ "days (0.68 years) in the transit to Mars, and in the case of a free-return style abort without the use of propulsion at Mars, 1.5 years to get back to Earth, at a total delta-v requirement of 3.34 km/s. Zubrin advocates a slightly faster transfer, that takes only 180 days to Mars, but 2 years back to Earth in case of an abort. This route comes also at the cost of a higher delta-v of 5.08 km/s. Zubrin claims that even faster routes have a significantly higher delta-v cost and free-return duration (e.g. transfer to Mars in 130 days takes 7.93 km/s delta-v and", "-23.664333848573733" ], [ "as compared to the delta-v required for other planetary missions.\nThe potential energy liberated by moving down the Sun's potential well becomes kinetic energy; requiring another large delta-v change to do anything other than rapidly pass by Mercury. To land safely or enter a stable orbit the spacecraft would rely entirely on rocket motors. Aerobraking is ruled out because Mercury has a negligible atmosphere. A trip to Mercury requires more rocket fuel than that required to escape the Solar System completely. As a result, only two space probes have visited it so far. A proposed alternative approach would use a solar", "-23.63323440348904" ], [ "settlement of Mars. In 2016, initial test flights of an Interplanetary Transport System vehicle were expected no earlier than 2020.\nIn 2017 SpaceX was making test flight progress in incrementally and iteratively developing a fairing recovery system.\nIn July 2017, Musk said \"we are quite close to being able to recover the fairing. ... We've got a decent shot of recovering a fairing by the end of the year, and reflight by late this year or early next.\"\nThe cost savings to SpaceX of recovering the fairing is expected to be on the order of US$5 million. Together, the booster stage and the", "-23.62221430084901" ], [ "more than 200 and a vehicle takeoff weight of several thousand tons.\nThis low-tech single-stage reference design would reach Mars and back in four weeks from the Earth's surface (compared to 12 months for NASA's current chemically powered reference mission). The same craft could visit Saturn's moons in a seven-month mission (compared to chemically powered missions of about nine years).\nA number of engineering problems were found and solved over the course of the project, notably related to crew shielding and pusher-plate lifetime. The system appeared to be entirely workable when the project was shut down in 1965, the main reason being", "-23.61822820391535" ], [ " Aside from the prestige such a mission would bring, advocates argue that humans would easily be able to outperform robotic explorers, justifying the expense. Aerospace engineer Robert Zubrin is one of the proponents of such missions. Various asteroids, moons, and places on Mars can be mined while crops are initially being planted. This method will save lives on Earth, add potentially trillions of dollars to the world economy annually, and provide a stable colony on Mars. Some have also stated that persons should stay on Earth, but get food and resources from Mars and surrounding asteroids, moons, greenhouses in", "-23.605386588293186" ], [ "at an estimated development cost of US$10 billion. In October 2016, President Barack Obama renewed U.S. policy to pursue the goal of sending humans to Mars in the 2030s, and to continue using the International Space Station as a technology incubator in that pursuit. The NASA Authorization Act of 2017 directed NASA to get humans near or on the surface of Mars by the early 2030s. Astronomy on Mars With the presence of various orbiters, landers, and rovers, it is possible to practice astronomy from Mars. Although Mars's moon Phobos appears about one-third the angular diameter of the full moon", "-23.591774897811774" ], [ "of the information systems and resources in the solar system and Earth-based corporations control much of the Mars economy (\"Objects in Motion\"). As a result, there is some hostility among Mars-born humans towards Terrans and many in EarthForce do not feel obligated to risk their lives to help Earth fight the plague. Shadow technology The galaxy is dealing with the Shadow technology legacy, which, among other things, includes the release of the plague on Earth by the Drakh, which is made out of Shadow technology and Earthforce's use of it, which Gideon had to experience tragically ten years before. Episodes", "-23.590932437160518" ], [ "is wrong and pulls together. They soon discover they are trapped, unable to leave the isolated estate due to a malfunctioning main gate.\nDave then encounters his body double in the mansion's main house. The duplicate Dave informs him that Mars is inhabited and that all Martians are beings without any physical bodies, an energy-like intelligence. They traveled to Earth via the Martian probe's high-gain, two-way radio transmitter, destroying the robotic rover in the process. Now on Earth, the Martians plan to replace key humans with duplicates to quash any further Earth missions to Mars. Since Dave's wife and children would", "-23.57526765923103" ], [ "on our behalf.\"\nOn July 18, 2017, Rohrabacher asked a panel of space experts testifying before the House Committee on Science, Space, and Technology if civilizations could have existed on Mars in the past. Kenneth Farley, a project scientist on NASA's Mars Rover 2020 Project, said: \"I would say that is extremely unlikely.\" Tax reform Rohrabacher voted against the Tax Cuts and Jobs Act of 2017. Despite efforts made by Republicans to change the bill to be more generous regarding cap deductions on new home mortgages, Rohrabacher remained staunch at voting nay on the bill, as the more than half of", "-23.572023536718916" ], [ "25 February 2007, the craft was scheduled for a low-altitude flyby of Mars, to correct the trajectory. This was not without risk, as the estimated altitude of the flyby was a mere 250 kilometres (160 mi). During that encounter, the solar panels could not be used since the craft was in the planet's shadow, where it would not receive any solar light for 15 minutes, causing a dangerous shortage of power. The craft was therefore put into standby mode, with no possibility to communicate, flying on batteries that were originally not designed for this task. This Mars manoeuvre was therefore nicknamed", "-23.557263457172667" ], [ "the death of David Bowie and the visions of Elon Musk. Bailey believed Musk's ambitions to colonize Mars were both intriguing yet troubling. He explained, \"His plan to send people to Mars to save the Earth...is sort of an exciting thing, an optimistic thing, [but] I really worry that the idea that Elon's going to send some rich people to Mars means we don't have to save the Earth anymore.\" \"What Kind of World\" would serve the purpose of tackling both arguments.\n\"Come So Far\" tells the story of a young man who tries to travel from Afghanistan to London to", "-23.53466875873528" ], [ "under the surface. The mission cost as of 2011 was projected to be less than US$425,000,000, not including the launch cost. SpaceX 2015 estimation was 2,000–4,000 kg (4,400–8,800 lb) to the surface of Mars, with a soft retropropulsive landing following a limited atmospheric deceleration using a parachute and heat shield. Beyond the Red Dragon concept, SpaceX was seeing potential for Falcon Heavy and Dragon 2 to carry science payloads across much of the Solar System, particularly to Jupiter's moon Europa. SpaceX announced in 2017 that propulsive landing for Dragon 2 would not be developed further, and that the capsule would not receive", "-23.531692087140982" ], [ "this is the \"powered flight through the Mars-relevant retropulsion regime\" that models Mars entry and descent conditions, although SpaceX is of course interested also in the final engine burn and lower velocity retropropulsive landing as well since that is a critical technology for their reusable booster development program which they hope to use for Mars landings in the 2020s. Landing site identification Concept art for a Mars lander concept as it approaches the surface, illustrating how identifying a safe landing spot is a concern.", "-23.52762900883681" ], [ "will have expertise in many fields because only eight people can be transported to Mars. Conflicts Conflicts unrelated to geology and the mechanics of the mission will occur. The fields of expertise needed for a successful mission is still unknown; along with this, a language barrier is a common conflict when gathering a crew. Also, space is an environment naturally unfamiliar to humans; certain health issues will arise. For instance, humans lose much of their strength and bone density when they live in space because of the microgravity environment. Other health concerns include space sickness and loss of", "-23.525991196347604" ], [ "on the Curiosity rover. Mars Science Laboratory Squyres said in an interview that he would not be the principal investigator for the Mars Science Laboratory, launched in 2011, as he did not want to be away from his family again for a long period (as happened during the Mars Exploration Rover Mission).", "-23.391116083963425" ], [ "say that other Martians moved to the Earth's poles where the climate is more Mars-like.\nJulie, Walter, Eric Eden, and some others take a German flying machine to the arctic. There, Walter shows them the active Martian pit and explains what all the red weed is there for: it's removing the air, which is why the Earth's climate has been changing. He thinks with the Jovians watching, they are forced to merely colonize, and that humans should work with them instead of against.\nWhen Earth-Mars opposition comes around again, the Martians do not launch any cylinders. The war of the worlds is", "-23.377084007748635" ], [ "humans to Mars, to the point of being delusional. A similar project study by NASA estimated the cost of such a feat at US$100 billion, although that included transporting the astronauts back to Earth. Objections have also been raised regarding the reality TV project associated with the expedition. Given the transient nature of most reality TV ventures, many believe that as viewership declines, funding could significantly decrease, thereby harming the entire expedition. Further, contestants have reported that they were ranked based on their donations and funds raised. Academia John Logsdon, a space policy expert at George Washington University, criticized the", "-23.373033683994436" ], [ "habitat pictured in science fiction. Interplanetary spaceflight Mars requires less energy per unit mass (delta V) to reach from Earth than any planet except Venus. Using a Hohmann transfer orbit, a trip to Mars requires approximately nine months in space. Modified transfer trajectories that cut the travel time down to four to seven months in space are possible with incrementally higher amounts of energy and fuel compared to a Hohmann transfer orbit, and are in standard use for robotic Mars missions. Shortening the travel time below about six months requires higher delta-v and an exponentially increasing amount of fuel, and", "-23.34306038444629" ], [ "depot and the beginnings of a Mars base.\nInspiration Mars planned a crewed flyby of Mars using third party hardware but has been inactive since 2015.\nIt is widely thought that NASA and the China National Space Administration (CNSA) are in a tacit race to put humans onto Mars. China is projected to have a crewed follow-up to 2020s robotic exploration sometime after that; while NASA has a timeline of getting there in the 2030s.", "-23.34017527507376" ], [ "a delay beyond December 7 would have caused MAVEN to miss the launch window as Mars moved too far out of alignment with the Earth.\nHowever, two days later, a public announcement was made that NASA had deemed the 2013 MAVEN launch so essential to ensuring future communication with current NASA assets on Mars—the Opportunity and Curiosity rovers—that emergency funding was authorized to restart spacecraft processing in preparation for an on-time launch.\nOn September 22, 2014, at approximately 2:24 UTC, MAVEN spacecraft entered orbit around Mars, completing an interplanetary journey of 10 months and 711 million kilometres (442 million miles). Spacecraft overview MAVEN was", "-23.33599021428381" ], [ "the physical state that astronauts going to Mars would arrive in. Once on Mars, surface gravity is only 38% of that on Earth, which is also likely to affect the viability and development of the foetus. Upon return to Earth, recovery from bone loss and atrophy is a long process and the effects of microgravity may never fully reverse. Radiation Mars has no global magnetosphere as Earth does. Combined with a thin atmosphere, this permits a significant amount of ionizing radiation to reach the Martian surface. The Mars Odyssey spacecraft carries an instrument, the Mars Radiation Environment Experiment (MARIE), to", "-23.317368058085776" ] ]
3tx8tl
Why can't batteries be recharged infinite times?
[ "The materials inside them actually degrade over time when used and recharged repeatedly. Due to this, they have a finite lifespan", "Batteries work by containing chemicals that react to produce electric energy. In rechargeable batteries, applying electric energy can reverse these reactions to restore the original state in wich electric energy can be produced, effectively \"storing\" electric energy. However, neither process is perfect - a small part of the materials involved (which tend to be pretty aggressive) reacts in different ways, which are not reversible. This problem is excarbated by high temeperatures (which stimulate all chemical reactions).", "I think I read this analogy here once about this topic. I don't have the original quote, nor do I remember who said it, so I'm not claiming this as my own. Think of a battery as a cup you use to drink water. Imagine everytime you fill the water cup, it forms a very thin layer of ice on the bottom that never melts. The layer is so thin that you won't notice the ice buildup until you've used it very many times. Eventually you've got a cup that can only hold a tiny amount of water. Now replace ice with rock salt and water with ions and that's the explanation with batteries. When Lithium ions move across the electrode while charging, they form a rock salt in the battery.", "Take something that is flexible and bend it a few times. After a while, it tends to permanently deform, and does not snap back as much or weakens where it was bent, or just snaps. Batteries can be thought of in similar fashion. The stress of recharge cycles eventually causes part of the battery to lose the ability to hold a charge.", "In the case of lead-acid, the \"plate\" is a thin leaf of Pb (negative) and PbO2 (positive) and the reaction absorbs the sulfide ion from the sulfuric acid electrolyte to convert both plates to lead(II) sulfate (PbSO4). It's reversible, of course... but it's like this. If you had an iron plate and it scales apart into rust, and electrolytically turned the rust back into iron, it's not a plate anymore, is it? Lead plates can be cycled about 300 times total. The material swells and contracts during discharge/recharge and slowly falls apart. It flakes off bits of lead, it cracks which disconnects a part of the plate from the terminal. There is a porous separator (a plastic or rubber mesh) between the positive and negative plates to allow them to be sandwiched very close to keep the resistance down, while separating them to prevent a short. Flakes shedding off pack into the separator and can poke through, resulting in a short. You might envision it as \"plating\" a new lead surface when it's recharged. That's not it- *the lead never moves in either plate*. The sulfide ion moves in and out of the electrolyte. The plate must be thin and porous on a molecular level (because each lead molecute can only react with electrolyte it's in contact with, otherwise the lead is useless). You might think \"well we could glue the lead to fiberglass cloth to hold it together\" but the lead will still flake and crack apart and come off at about the same point. You might say \"well let's make the lead plate like 1/4\" thick\" but then the battery would only have like 5% of the capacity it should for its size- and the shedding flakes off the plate surface will STILL clog the separator. People often ask \"well can't I just wash out the old electrolyte with new and fix the battery\"? Well, each cell is like 200 plates of interleaved positive/separator/neg plates with flaked bits of plate packed into the separator. The flaked stuff is insoluble and can't be washed out. Replacing the electrolyte fixes nothing. It can only be truly reformed by melting it back down and rolling it down into a new sheet during remfg. In the case of NiCd/NiMH/NiFe Edison cells (rare, used early 20th cent), it's different- the plates don't really break down. Rather, every time we charge them, the electrolyte loses a bit of water. In the typical sealed \"AA\" steel-can battery, there's no surplus electrolyte, and no way to refill them. But there ARE very uncommon flooded-plate NiCd/NiMH/NiFe batteries which you can add distilled water to. I have a lot of vintage flooded-plate NiCd that work fine that I sell on eBay. These DO last basically forever. It's crazy how long they last. But they do require maintenance and their charging cycle management is a bit crazy. The NiCd/NiMH/NiFe has one other enemy- carbonation. Regardless of whether they're the sealed type or not. The electrolyte is a strong base (not acid) of potassium hydroxide. If exposed to air, it absorbs carbon from the small trace of CO2 in the air and forms potassium carbonate, which is chemically useless and charging doesn't reverse that back into hydroxide. However... you CAN simply drain the electrolyte and mix up new KOH and refurbish the cell like-new again." ]
[ [ "hundreds of times. The apparent symptom is that the battery \"remembers\" the point in its charge cycle where recharging began and during subsequent use suffers a sudden drop in voltage at that point, as if the battery had been discharged. The capacity of the battery is not actually reduced substantially. Some electronics designed to be powered by Ni–Cd batteries are able to withstand this reduced voltage long enough for the voltage to return to normal. However, if the device is unable to operate through this period of decreased voltage, it will be unable to get enough energy out of the", "-35.322860152984504" ], [ "additional full discharge will cause more and more damage to that cell. Age and use—normal end-of-life All rechargeable batteries have a finite lifespan and will slowly lose storage capacity as they age due to secondary chemical reactions within the battery whether it is used or not. Some cells may fail sooner than others, but the effect is to reduce the voltage of the battery. Lithium-based batteries have one of the longest idle lives of any construction. Unfortunately the number of operational cycles is still quite low at approximately 400-1200 complete charge/discharge cycles. The lifetime of lithium batteries decreases", "-34.497725879831705" ], [ "prevent the type of damage that will shorten the battery's life. Storage Battery life can be extended by storing the batteries at a low temperature, as in a refrigerator or freezer, which slows the side reactions. Such storage can extend the life of alkaline batteries by about 5%; rechargeable batteries can hold their charge much longer, depending upon type. To reach their maximum voltage, batteries must be returned to room temperature; discharging an alkaline battery at 250 mA at 0 °C is only half as efficient as at 20 °C. Alkaline battery manufacturers such as Duracell do not recommend refrigerating batteries. Battery", "-34.02858889539493" ], [ "and old batteries is depleted, the string voltage will drop, and when the old batteries are exhausted the new batteries still have charge available. The newer cells may continue to discharge through the rest of the string, but due to the low voltage this energy flow may not be useful, and may be wasted in the old cells as resistance heating.\nFor cells that are supposed to operate within a specific discharge window, new cells with more capacity may cause the old cells in the series string to continue to discharge beyond the safe bottom limit of the discharge window, damaging", "-33.83136646798812" ], [ "later models, to retain the clock and configuration memory. These early machines required the backup battery to be replaced periodically due to the relatively large power consumption. Some manufacturers of clone machines used a rechargeable battery to avoid the problems that could be created by a failing battery. Modern systems use a coin style primary battery. In these later machines, the current draw is almost negligible and the primary batteries usually outlast the system that they support. It is rare to find rechargeable batteries in such systems.\nBackup batteries are used in uninterruptible power supplies (UPS), and provide power to", "-33.7632842665771" ], [ "battery's stored energy will be depleted in a shorter time period.\nIn a given period of time, a higher level of power means that more energy is used. For a given power level, a longer run period causes more energy to be used. For a given amount of energy, a higher level of power means that that energy is used in less time. Misuse of watts per hour Power units measure the rate of energy per unit time. Many compound units for various kinds of rates explicitly mention units of time: for example, miles per hour, kilometers per hour, dollars per", "-33.7442320479895" ], [ "may also serve as a quick method to recharge the batteries on those devices. The environmental burden of disposing used batteries has contributed to e-waste; something that wearable generators may drastically reduce. Enough energy can theoretically be harnessed from a person's body heat to power a smartphone or tablet.", "-33.26305393187795" ], [ "discarded, and not recharged with electricity and reused like a secondary cell (rechargeable battery). In general, the electrochemical reaction occurring in the cell is not reversible, rendering the cell unrechargeable. As a primary cell is used, chemical reactions in the battery use up the chemicals that generate the power; when they are gone, the battery stops producing electricity and is useless. In contrast, in a secondary cell, the reaction can be reversed by running a current into the cell with a battery charger to recharge it, regenerating the chemical reactants. Primary cells are made in a range", "-33.04935220719199" ], [ "Business Department in Gainesville, Florida, and later retracted by them, but the damage was done. It is unlikely to be a real phenomenon, but has taken on a life of its own as an urban myth.\nThe battery survives thousands of charges/discharges cycles. Also it is possible to lower the memory effect by discharging the battery completely about once a month. This way apparently the battery does not \"remember\" the point in its charge cycle.\nAn effect with similar symptoms to the memory effect is the so-called voltage depression or lazy battery effect. This results from repeated overcharging; the symptom is that", "-32.65447909134673" ], [ "Batteries kick in only during extended interruptions, e.g., if the mains power or a fuel cell fails, which lengthens battery life.\nUninterruptible power supplies (UPS) may be powered by supercapacitors, which can replace much larger banks of electrolytic capacitors. This combination reduces the cost per cycle, saves on replacement and maintenance costs, enables the battery to be downsized and extends battery life.\nSupercapacitors provide backup power for actuators in wind turbine pitch systems, so that blade pitch can be adjusted even if the main supply fails. Voltage stabilizer Supercapacitors can stabilize voltage fluctuations for powerlines by acting as dampeners. Wind and photovoltaic", "-32.59300929948222" ], [ "suited for use depending entirely on the type of battery. NiCd cells must be fully discharged occasionally, or else the battery loses capacity over time due to a phenomenon known as \"memory effect.\" Once a month (perhaps once every 30 charges) is sometimes recommended. This extends the life of the battery since memory effect is prevented while avoiding full charge cycles which are known to be hard on all types of dry-cell batteries, eventually resulting in a permanent decrease in battery capacity.\nMost modern cell phones, laptops, and most electric vehicles use Lithium-ion batteries. These batteries last longest if the", "-32.591546014089545" ], [ "primary cells, can produce current immediately on assembly. These are most commonly used in portable devices that have low current drain, are used only intermittently, or are used well away from an alternative power source, such as in alarm and communication circuits where other electric power is only intermittently available. Disposable primary cells cannot be reliably recharged, since the chemical reactions are not easily reversible and active materials may not return to their original forms. Battery manufacturers recommend against attempting to recharge primary cells. In general, these have higher energy densities than rechargeable batteries, but disposable batteries do not fare", "-32.51952797433478" ], [ "several hundred times while alkaline batteries can be used only once. NiMH rechargeable batteries do not have what is commonly referred to as 'memory effect' so they can be recharged at any time. The main environmental concerns of batteries are the harmful materials they contain, such as Mercury (Hg), Cadmium (Cd) and Lead (Pb). Batteries containing these materials need to be carefully disposed of to avoid the harmful effects on human health and environment. Canadians buy over 150 million batteries per year. It takes less energy to recharge a battery than to produce a new one. Using metal recovered", "-32.38046808112995" ], [ "battery is frequently charged; fully discharging the cells will degrade their capacity relatively quickly, but most such batteries are used in equipment which can sense the approach of fill discharge and discontinue equipment use. When stored after charging, lithium battery cells degrade more while fully charged than if they are only 40-50% charged. As with all battery types, degradation also occurs faster at higher temperatures. Degradation in lithium-ion batteries is caused by an increased internal battery resistance often due to cell oxidation. This decreases the efficiency of the battery, resulting in less net current available to be drawn from the", "-32.24227073551447" ], [ "in the string (where multiple batteries are used together) to a consistent operating voltage. However the overcharging process is complicated by the fact that not only is the battery out of service during refresh cycles, but the high currents required to complete the overcharge process (within a reasonable timeframe) are also the cause of various parasitic losses. These include thermal losses and losses due to various side reactions (chiefly hydrogen evolution, oxygen evolution and grid corrosion).\nUltraBattery can operate without a refresh charge for extended periods. For stationary cycling applications such as renewable energy or grid support, this may be between", "-32.146345445886254" ], [ "other hand, they can be recharged 3,000 times. The reduction in capacity also reduced the production cost, which decreased the initial investment for rechargeable batteries. They also weigh 30% less. The product numbers are HR-3UQ (AA) and HR-4UQ (AAA). 2nd generation Along with the upgrade of the regular Eneloop cells in April 2013, the Lite version was also upgraded. According to Panasonic, it can now be recharged up to 3,000 times (life cycles) (model numbers BK-3LCC for the AA and BK-4LCC for the AAA battery). The upgraded batteries also retain 90% of the charge after one year like the regular", "-32.013793019461446" ], [ "needed. As prices are rapidly declining, PV systems increasingly use rechargeable batteries to store a surplus to be later used at night. Batteries used for grid-storage stabilize the electrical grid by leveling out peak loads usually for several minutes, and in rare cases for hours. In the future, less expensive batteries could play an important role on the electrical grid, as they can charge during periods when generation exceeds demand and feed their stored energy into the grid when demand is higher than generation.\nAlthough not permitted under the US National Electric Code, it is technically possible to have a “plug", "-31.919400825165212" ], [ "battery, and for all practical purposes, the battery appears \"dead\" earlier than normal.\nThere is evidence that the memory effect story originated from orbiting satellites, where they were typically charging for twelve hours out of 24 for several years. After this time, it was found that the capacities of the batteries had declined significantly, but were still fit for use. It is unlikely that this precise repetitive charging (for example, 1,000 charges/discharges with less than 2% variability) could ever be reproduced by individuals using electrical goods. The original paper describing the memory effect was written by GE scientists at their Battery", "-31.868002880422864" ], [ "the old cells.\nWhen recharged, the old cells recharge more rapidly, leading to a rapid rise of voltage to near the fully charged state, but before the new cells with more capacity have fully recharged. The charge controller detects the high voltage of a nearly fully charged string and reduces current flow. The new cells with more capacity now charge very slowly, so slowly that the chemicals may begin to crystallize before reaching the fully charged state, reducing new cell capacity over several charge/discharge cycles until their capacity more closely matches the old cells in the series string.\nFor such reasons, some", "-31.85867114024586" ], [ "level control. \nFor downhill skiing or winter biking, rechargeable nickel metal or lithium batteries are generally used. If not recharged properly, \"battery memory\" will shorten the battery's capability to recharge. There are two types of lithium batteries: Li-ion & Li-Polymer, which use several types of heating technologies including copper wire, nichrome wire, metal \"mesh\" systems, carbon-embedded fabric, carbon fibers and very thin flexible heating technologies that can be printed onto substrate. This has allowed for extra features to be added such as temperature sensors, Bluetooth integration and the ability to control the temperature from a smartphone. \nThe most reliable systems", "-31.792838205350563" ], [ "with supercapacitors for energy storage has about half the run time of a comparable battery model, but can be fully charged in 90 seconds. It retains 85% of its charge after three months left idle. Grid power buffer Numerous non-linear loads, such as EV chargers, HEVs, air conditioning systems, and advanced power conversion systems cause current fluctuations and harmonics. These current differences create unwanted voltage fluctuations and therefore power oscillations on the grid. Power oscillations not only reduce the efficiency of the grid, but can cause voltage drops in the common coupling bus, and considerable frequency fluctuations throughout the entire", "-31.710718534013722" ], [ "is then no longer available to participate in the normal charge/discharge cycle, so a battery temporarily revived with EDTA will have a reduced life expectancy. Residual EDTA in the lead–acid cell forms organic acids which will accelerate corrosion of the lead plates and internal connectors.\nThe active materials change physical form during charge/discharge, resulting in growth and distortion of the electrodes, and shedding of electrode into the electrolyte. Once the active material has fallen out of the plates, it cannot be restored into position by any chemical treatment. Similarly, internal physical problems such as cracked plates, corroded connectors, or", "-31.70078821521747" ], [ "battery. However, if Li-ION cells are discharged below a certain voltage a chemical reaction occurs that make them dangerous if recharged, which is why many such batteries in consumer goods now have an \"electronic fuse\" that permanently disables them if the voltage falls below a set level. The electronic fuse circuitry draws a small amount of current from the battery, which means that if a laptop battery is left for a long time without charging it, and with a very low initial state of charge, the battery may be permanently destroyed.\nMotor vehicles, such as boats, RVs, ATVs, motorcycles, cars, trucks,", "-31.60748174751643" ], [ "it is disconnected. If a battery is left disconnected, any internal charge will drain away slowly and eventually reach the critical point. From then on the film will develop and thicken. This is the reason batteries will be found to charge poorly or not at all if left in storage for a long period of time. Chargers and sulfation Conventional battery chargers use a one-, two-, or three-stage process to recharge the battery, with switched-mode power supply include more stages in order to fill the battery more rapidly and completely. Common to almost all chargers, including non-switched models, is the", "-31.57369627954904" ], [ "periods (weeks) without significantly reducing the lifetime of the battery. During this phase, the charge current decreases gradually to a small residual value that compensates for any self-discharge of the battery. Special cases A bad battery will have short I-phase and Uo-phase, but there is a risk of gassing, further damaging the battery.\nIf a battery is connected to a significant load during charging, the end of the Uo-phase may never be reached and the battery will gas and be damaged, depending on the charge current relative to the battery capacity.", "-31.507573393915663" ], [ "Rechargeable fuel battery Rechargeable fuel batteries are a new type of rechargeable battery that researchers have developed which uses electrodes in liquid form. This type of battery can either be recharged or the liquid electrodes can be replaced.\nThese batteries could allow electric cars to travel 500 miles before recharging. Replacing the liquid electrodes could only take a few minutes while recharging batteries takes much longer. These batteries don't have the problems of short circuits and overheating. The downsides are that nanoparticles degrade quickly, the technology is new and needs more development, they need to focus on cheaper production, and refilling", "-31.474132328643464" ], [ " Due to their high pollutant content compared to their small energy content, the primary battery is considered a wasteful, environmentally unfriendly technology. Due mainly to increasing sales of wireless devices and cordless tools which cannot be economically powered by primary batteries and come with integral rechargeable batteries, the secondary battery industry has high growth and has slowly been replacing the primary battery in high end products. Secondary cell A secondary cell, commonly referred to as a rechargeable battery is an electrochemical cell that can be run as both a galvanic cell or as an electrolytic cell. This is", "-31.460321943071904" ], [ "in Li-ion batteries. In some batteries the gains from the recovery life can extend battery life by up to 45% by alternating discharging and inactive periods rather than constantly discharging. The size of the recovery effect depends on the battery load, recovery time and depth of discharge.\nEven though the recovery effect phenomenon is more prominent in the lead acid battery chemistry, its existence in alkaline, Ni-MH and Li-Ion batteries is still questionable. For instance, a systematic experimental case study shows that an intermittent discharge current in case of alkaline, Ni-MH and Li-Ion batteries results in a decreased usable energy output", "-31.39530965613085" ], [ "if the battery could hold its charge after it is unplugged, which would clarify whether it is really a new battery technology, or simply a capacitor. Braga responded to critics, saying \"Data is data, and we have similar data from many different cells, in four different instruments, different labs, glove box. And at the end of the day, the LEDs are lit for days with a very small amount of active material after having cycled for more than 23,000 times\". Comparison with lithium-ion batteries Braga and Goodenough stated they expect the battery to have an energy density many times higher", "-31.3745891454746" ], [ "Charge cycle A charge cycle is the process of charging a rechargeable battery and discharging it as required into a load. The term is typically used to specify a battery's expected life, as the number of charge cycles affects life more than the mere passage of time. Discharging the battery fully before recharging may be called \"deep discharge\"; partially discharging then recharging may be called \"shallow discharge\".\nIn general, number of cycles for a rechargeable battery indicates how many times it can undergo the process of complete charging and discharging until failure or it starting to lose capacity.\nApple Inc. clarifies that", "-31.29443388013169" ], [ "the space needed for the battery anymore. The thin film batteries can be attached to the inside of the casing or in some other convenient way. There are many opportunities in which to use this type of batteries. Renewable energy storage devices The thin film lithium ion battery can serve as a storage device for the energy collected from renewable sources with a variable generation rate, such as a solar cell or wind turbine. These batteries can be made to have a low self discharge rate, which means that these batteries can be stored for long periods of time without", "-31.231706178659806" ], [ "the word \"cycle life\" to specify lifespan in terms of the number of cycles to reach 80% of the rated battery capacity. Inactive storage of these batteries also reduces their capacity. Calendar life is used to represent the whole life cycle of battery involving both the cycle and inactive storage operations.\nBattery cycle life is affected by many different stress factors including temperature, discharge current, charge current, and state of charge ranges (depth of discharge). Batteries are not fully charged and discharged in real applications such as smartphones, laptops and electric cars and hence defining battery life via full discharge cycles", "-31.229894625139423" ], [ "stored energy can be up to about 800 watt hour n (Wh), but mostly about 400 Wh (2013). In ideal conditions, after a thousand charges NiCd batteries have 85% of their original capacity and are therefore considered worn. With NiMH batteries about 400 to 800 cycles are possible. The charging time depending on the type of battery is around 2 to 9 hours. The durability of the battery is dependent on other factors. As lead-acid batteries discharge they provide less power, so that full motor power is no longer achieved. The very light, more expensive lithium ion batteries are now", "-31.199802849907428" ], [ "Primary cell A primary cell is a battery (a galvanic cell) that is designed to be used once and discarded, and not recharged with electricity and reused like a secondary cell (rechargeable battery). In general, the electrochemical reaction occurring in the cell is not reversible, rendering the cell unrechargeable. As a primary cell is used, chemical reactions in the battery use up the chemicals that generate the power; when they are gone, the battery stops producing electricity and is useless. In contrast, in a secondary cell, the reaction can be reversed by running a current into the cell with a", "-31.19407259062791" ], [ "pack would result in the need for a peak of 340 kilowatts of power from some source for those 60 seconds. It is not clear that such batteries will work directly in BEVs as heat build-up may make them unsafe. Recharging time Electric cars like Tesla Model S, Renault Zoe, BMW i3, etc. can recharge their batteries at quick charging stations within 30 minutes to 80 percent.\nResearchers from Singapore have 2014 developed a battery that can be recharged after 2 minutes to 70 percent. The batteries rely on lithium-ion technology. However, the anode and the negative pole in the battery is no", "-31.164051967964042" ], [ "and ultimately in premature failure, as the electrodes disintegrate due to mechanical stresses that arise from cycling. Starting batteries kept on a continuous float charge will suffer corrosion of the electrodes which will also result in premature failure. Starting batteries should therefore be kept open circuit but charged regularly (at least once every two weeks) to prevent sulfation.\nStarting batteries are of lighter weight than deep cycle batteries of the same size, because the thinner and lighter cell plates do not extend all the way to the bottom of the battery case. This allows loose disintegrated material to fall", "-31.163823379421956" ], [ "to separation of the power and energy components), long cycle life (because there are no solid-to-solid phase transitions), quick response times, no need for \"equalisation\" charging (the overcharging of a battery to ensure all cells have an equal charge) and no harmful emissions. Some types also offer easy state-of-charge determination (through voltage dependence on charge), low maintenance and tolerance to overcharge/overdischarge. They are safe and typically do not contain flammable electrolytes and due to the reason that electrolytes can be stored away from the power stack. These technical merits make redox flow batteries a well-suited option for large-scale energy storage.\nThe", "-31.150488969986327" ], [ "reversible, battery charge/discharge cycles often irreversibly produce unreversed chemical reaction products of the reagents. Accordingly, the cycle-life of rechargeable batteries is usually limited. Further, the reaction products lower power density. Additionally, the chemical processes are relatively slow, extending charge/discharge times. Electro-chemical capacitors A fundamental difference between redox reactions in batteries and in electrochemical capacitors (supercapacitors) is that in the latter, the reactions are a very fast sequence of reversible processes with electron transfer without any phase changes of the electrode molecules. They do not involve making or breaking chemical bonds. The de-solvated atoms or ions contributing the pseudocapacitance simply", "-31.004271796206012" ], [ "2–3 years at best. Many of the wireless devices use a Lithium-Ion (Li-Ion) battery, which charges 500-2500 times, depending on how users take care of the battery and the charging techniques used. It is only natural for these rechargeable batteries to chemically age, which is why the performance of the battery when used for a year or two will begin to deteriorate. Battery life can be extended by draining it regularly, not overcharging it, and keeping it away from heat. SIM card Mobile phones require a small microchip called a Subscriber Identity Module or SIM card, in order to function.", "-30.963775292853825" ], [ "the battery appears to be fully charged but discharges quickly after only a brief period of operation. In rare cases, much of the lost capacity can be recovered by a few deep-discharge cycles, a function often provided by automatic battery chargers. However, this process may reduce the shelf life of the battery. If treated well, a Ni–Cd battery can last for 1,000 cycles or more before its capacity drops below half its original capacity. Many home chargers claim to be \"smart chargers\" which will shut down and not damage the battery, but this seems to be a common problem. Environmental", "-30.95556407002732" ], [ "conventional devices each increment of charge is absorbed by a single or a small number of particles until they are charged, then moves on. By distributing charge/discharge circuitry throughout the electrode, heating and degradation could be reduced while allowing much greater power density.\nIn 2014, researchers at Qnovo developed software for a smartphone and a computer chip capable of speeding up re-charge time by a factor of 3-6, while also increasing cycle durability. The technology is able to understand how the battery needs to be charged most effectively, while avoiding the formation of dendrites. Durability In 2014, independent researchers from Canada", "-30.92332623375114" ], [ "to the building. Additionally these batteries power the remote cellular phone systems that thwart phone line snipping as well. The backup battery usually has a lifespan of 3-10 years depending on the make and model, and so if the battery runs flat, there is only one main source of power to the whole system which is the mains power. Should this fail as well (for example, a power cut), it usually triggers a third backup battery located in the bellboxes on the outside of the building which simply triggers the bell or siren. This however means that the alarm cannot", "-30.91348849615315" ], [ "charge jumps the gap. That permits current to flow back onto the isotope, equalizing the charge and resetting the cantilever. As long as the isotope is decaying - a process that can last for decades - the tiny cantilever will continue its up-and-down motion. As the cantilever directly generates electricity when deformed, a charge pulse is released each time the cantilever cycles.\nRadioactive isotopes can continue to release energy over periods ranging from weeks to decades. The half-life of nickel-63, for example, is over 100 years. Thus, a battery using this isotope might continue to supply useful energy for at least", "-30.839614444994368" ], [ "mixed with others), different histories experienced amongst the cells in a battery pack (e.g., charging/discharging, heat exposures, etc.) and must be accounted for to maximize life and service of the particular battery pack in use. Each battery cell will be, for these reasons, somewhat different and so every balancing circuit must be able to accommodate those differences. Without effective and appropriate balancing, discharging during use must stop when any cell first runs out of charge (even though other cells don't); this limits the energy that can be taken from and returned to the battery.\nWithout balancing, the smallest capacity", "-30.825346314173657" ], [ "Rechargeable alkaline battery Recharging of disposable alkalines Manufacturers do not support recharging of disposable alkaline batteries, and warn that it may be dangerous. Despite this advice, alkaline batteries have been recharged, and chargers have been available. The capacity of a recharged alkaline battery declines with number of recharges, until it becomes unusable after typically about ten cycles.\nLow-ripple direct current is not suitable for charging disposable alkaline batteries; more suitable is a current pulsed at a rate of 40 to 200 pulses per second, with an 80% duty cycle. Pulsed charging appears to reduce the risk of electrolyte—usually potassium hydroxide", "-30.744107606820762" ], [ "two lives are equal since the cells last for only one cycle by definition. (The term shelf life is used to describe how long a battery will retain its performance between manufacture and use.) Available capacity of all batteries drops with decreasing temperature. In contrast to most of today's batteries, the Zamboni pile, invented in 1812, offers a very long service life without refurbishment or recharge, although it supplies current only in the nanoamp range. The Oxford Electric Bell has been ringing almost continuously since 1840 on its original pair of batteries, thought to be Zamboni piles. Self-discharge Disposable batteries", "-30.737640258390456" ], [ "the battery plates, forming a spongy film. If the battery is immediately recharged, the film will dissolve back into the acid.\nIf the battery is stored or repeatedly operated in this partially charged state for an extended period, the film will slowly crystallize into a solid. This process of \"sulfation\" takes time, so it only has a chance to build to significant levels if the battery is repeatedly discharged below this critical level. There are numerous other conditions that can lead to the same problem developing.\nBatteries also have a small amount of internal resistance that will discharge the battery even when", "-30.703432868933305" ], [ "of a battery that is not recyclable is the paper separators that wrap the plates. Due to the acid bath the paper sits in, the fiber length is reduced so far that it cannot be rewoven.\nIndustry wide, there is a greater than 98% rate of recovery on all lead acid batteries sold in the United States, resulting in a virtually closed manufacturing cycle.", "-30.676050271023996" ], [ "50 times greater than the energy it contains. Due to their high pollutant content compared to their small energy content, the primary battery is considered a wasteful, environmentally unfriendly technology. Due mainly to increasing sales of wireless devices and cordless tools which cannot be economically powered by primary batteries and come with integral rechargeable batteries, the secondary battery industry has high growth and has slowly been replacing the primary battery in high end products. Usage trend In the early twenty-first century, primary cells began losing market share to secondary cells, as relative costs declined for the latter. Flashlight power demands", "-30.670099474373274" ], [ "Cells have a limited cycle life, which is affected by deep discharge; the first cycle gives the greatest capacity, and if deeply discharged a cell may only provide 20 cycles. The available energy on each cycle decreases. Like primary alkaline cells, they have a relatively high internal resistance, making them unsuitable for high discharge current (for example, discharging their full capacity in one hour).\nUnlike rechargeable alkaline batteries, NiMH batteries can endure anywhere from a few hundred to a thousand (or more) deep discharge cycles, resulting in a long useful life; their limitation is now more usually by age rather", "-30.633989298483357" ], [ "not identical, cells. Each cell has its own charge capacity. As the battery as a whole is being deeply discharged, the cell with the smallest capacity may reach zero charge and will \"reverse charge\" as the other cells continue to force current through it. The resulting loss of capacity is often ascribed to the memory effect.\nBattery users may attempt to avoid the memory effect proper by fully discharging their battery packs. This practice is likely to cause more damage as one of the cells will be deep discharged. The damage is focused on the weakest cell, so that each", "-30.61943215021165" ], [ "Recovery effect The recovery effect is a phenomenon observed in battery usage where the available energy is less than the difference between energy charged and energy consumed. Intuitively, this is because the energy has been consumed from the edge of the battery and the charge has not yet diffused evenly around the battery. \nWhen power is extracted continuously voltage decreases in a smooth curve, but the recovery effect can result in the voltage partially increasing if the current is interrupted.\nThe KiBaM battery model describes the recovery effect for lead-acid batteries and is also a good approximation to the observed effects", "-30.497383716428885" ], [ "instead of steel, offsetting some of the increased cost of cesium.\nWhen not in use, Na-NiCl\n₂ batteries are typically kept molten and ready for use because if allowed to solidify they typically take 12 hours to reheat and charge. This reheating time varies depending on the battery-pack temperature, and power available for reheating. After shutdown a fully charged battery pack loses enough energy to cool and solidify in 3–4 days. Liquid-metal batteries Professor Donald Sadoway at the Massachusetts Institute of Technology has pioneered the research of liquid-metal rechargeable batteries. Both Magnesium–antimony and more recently lead–antimony were used in experiments at MIT.", "-30.443837970349705" ], [ "lower self-discharge rate than older types of secondary cells; but they have lost that advantage with the development of rechargeable secondary cells with very low self discharge rates like low self-discharge NiMH cells that hold enough charge for long enough to be sold as pre-charged. \nCommon types of secondary cells (namely NiMH and Li-ion) due to their much lower internal resistance do not suffer the large loss of capacity that alkaline, zinc–carbon and zinc chloride (\"heavy duty\" or \"super heavy duty\") do with high current draw.\nReserve batteries achieve very long storage time (on the order of 10 years or more)", "-30.39167698251549" ], [ "needed for profitable operation. Degradation Over their lifespan batteries degrade gradually leading to reduced capacity due to the chemical and mechanical changes to the electrodes. Batteries are multiphysics electrochemical systems and degrade through a variety of concurrent chemical, mechanical, electrical and thermal failure mechanisms. Some of the prominent mechanisms include solid electrolyte interphase layer (SEI) growth, lithium plating, mechanical cracking of SEI layer and electrode particles, and thermal decomposition of electrolyte.\nDegradation is strongly temperature-dependent, with a minimal degradation around 25 °C, i.e., increasing if stored or used at above or below 25 °C. High charge levels and elevated temperatures (whether from charging", "-30.381386809400283" ], [ "the effects of weak cells, dead cells with high resistance, or shorted cells. For example, stronger strings can discharge through weaker strings until voltage imbalances are equalized, and this must be factored into the individual inter-cell measurements within each string. Series new/old battery interactions Even just a single string of batteries wired in series can have adverse interactions if new batteries are mixed with old batteries. Older batteries tend to have reduced storage capacity, and so will both discharge faster than new batteries and also charge to their maximum capacity more rapidly than new batteries.\nAs a mixed string of new", "-30.380311177141266" ], [ "energy delivered over the life of the battery. From this one can calculate the cost per kWh of the energy (including the cost of charging). Variability A 2015 study by Andreas Gutsch of the Karlsruhe Institute of Technology found that lithium-ion battery lifespan could vary by a factor of five, with some Li-ion cells losing 30% of their capacity after 1,000 cycles, and others having better capacity after 5,000 cycles. The study also found that safety standards for some batteries were not met. For stationary energy storage it was estimated that batteries with lifespans of at least 3,000 cycles were", "-30.3427961319685" ], [ "off the plates and collect at the bottom of the cell, prolonging the service life of the battery. If this loose debris rises enough it may touch the bottom of the plates and cause failure of a cell, resulting in loss of battery voltage and capacity. Deep-cycle batteries Specially designed deep-cycle cells are much less susceptible to degradation due to cycling, and are required for applications where the batteries are regularly discharged, such as photovoltaic systems, electric vehicles (forklift, golf cart, electric cars and other) and uninterruptible power supplies. These batteries have thicker plates that can deliver less peak current,", "-30.327970020356588" ], [ "mechanically replaced at special stations in a couple of minutes (battery swapping).\nBatteries with greatest energy density such as metal-air fuel cells usually cannot be recharged in purely electric way. Instead, some kind of metallurgical process is needed, such as aluminum smelting and similar.\nSilicon-air, aluminum-air and other metal-air fuel cells look promising candidates for swap batteries.\nAny source of energy, renewable or non-renewable, could be used to remake used metal-air fuel cells with\nrelatively high efficiency. Investment in infrastructure will be needed. The cost of such batteries could be\nan issue, although they could be made with replaceable anodes and electrolyte. Chassis swapping Instead", "-30.196472987241577" ], [ "Most energy production or storage devices have a complex relationship between the power they produce, the load placed on them, and the efficiency of the delivery. A conventional battery, for instance, stores energy in chemical reactions in its electrolytes and plates. These reactions take time to occur, which limits the rate at which the power can be efficiently drawn from the cell. For this reason, large batteries used for power storage generally list two or more capacities, normally the \"2 hour\" and \"20 hour\" rates, with the 2 hour rate often being around 50% of the 20 hour rate.\nSolar panels", "-30.163143563368067" ], [ "without loss of capacity, by physically separating the components of the battery and only assembling them at the time of use. Such constructions are expensive but are found in applications like munitions, which may be stored for years before use. Recharging primary cells Attempts to extend the life of primary cells, for example by recharging alkaline batteries, meet with variable results. Third-party devices are manufactured and represented as being able to recharge primary cells. The internal chemical reactions of a primary cell are not easily reversed by externally applied currents, so reactants do not entirely return to their initial state", "-30.148777160793543" ], [ "a charge cycle means using all the battery's capacity, but not necessarily by discharging it from 100% to 0%: \"You complete one charge cycle when you’ve used (discharged) an amount that equals 100% of your battery’s capacity — but not necessarily all from one charge. For instance, you might use 75% of your battery’s capacity one day, then recharge it fully overnight. If you use 25% the next day, you will have discharged a total of 100%, and the two days will add up to one charge cycle.\"", "-30.13933096884284" ], [ "voltage, 1.5 volts each, type D, a cylindrical shape and is expected to last approximately 100 hours. A battery weighs 150 g. The most common cells employed are common alkaline primary batteries but rechargeable batteries can also be used. The common alkaline batteries have the disadvantage of a good chance of leakage of corrosive fluids when the unit is placed into storage for long periods, so it is advisable to remove the batteries for storage. \nThe units were shipped with a packet containing a silica gel to absorb any moisture inside the container and maintain the electronic components of the", "-30.13687885052059" ], [ "that all the memory cells are refreshed before a single bit is lost, manufacturers must set their refresh times conservatively short.\nThis frequent DRAM refresh consumes a third of the total power drawn by low-power electronics devices in standby mode.\nResearchers have proposed several approaches for extending battery run-time between charges by reducing the refresh rate, including temperature-compensated refresh (TCR) and retention-aware placement in DRAM (RAPID).\nExperiments show that in a typical off-the-shelf DRAM chip, only a few weak cells really require the worst-case 64 ms refresh interval, and even then only at the high end of its specified temperature range.\nAt room temperature", "-30.109085832053097" ], [ "non-volatile; it is byte-addressable; and it can be written to arbitrarily, without concerns about wear and device lifespan. However, including a second memory to achieve non-volatility (and the on-board backup power source) increases the product cost compared to volatile memory. Backup power NVDIMMs evolved from the BBU (battery backed up) DIMM, which used a backup battery to sustain power to a volatile memory for up to 72 hours. However, batteries are disfavored in computer components because they have a limited lifespan, they may be regarded as hazardous waste, and may contain heavy metals which violate RoHS compliance.\nWhen the module", "-30.062233579577878" ], [ "such as volume expansion and power density. Limitations of current battery technology A battery’s ability to store charge is dependent on its energy density and power density. It is important that charge can remain stored and that a maximum amount of charge can be stored within a battery. Cycling and volume expansion are also important considerations as well. While many other types of batteries exist, current battery technology is based on lithium-ion intercalation technology for its high power and energy densities, long cycle life and no memory effects. These characteristics have led lithium-ion batteries to be preferred over other battery", "-30.035988531424664" ], [ "grid that supports active material. The capacity of a deep cycle battery is usually limited by electrolyte capacity and not by the plate mass, to improve life expectancy. New technologies Although still much more expensive than traditional lead-acid, a wide range of rechargeable battery technologies such as lithium-ion are increasingly attractive for many users. Recycling The vast majority of deep cycle batteries on the market today are lead acid batteries. Lead acid batteries are recycled 98% by volume, 99.5% by weight. The plastic cases, lead plates, sulfuric acid, solder, and other metals are 100% recovered for reuse. The only part", "-30.015713102009613" ], [ "table where the relationship between present voltage and SOD is captured. Determining the energy is also an issue because the energy is changing as the battery gets old. The new batteries have the total energy written on their back but the value can’t be true for all time. It can estimate the energy at highest and lowest discharge rate to decrease the error. The internal resistance also has significant impact on the discharged current. To decrease the effect of internal resistance all the phone components can be switched to their lowest power modes to minimize the discharge current when taking", "-29.9629804957367" ], [ "which are currently lost when batteries are recycled in other countries. Before reclaiming battery materials, the batteries be put through a brine discharge using neutral salts. By minimising the rate of corrosion it is possible to recover the cathode and anode materials. Kendrick has called on battery manufacturers to make batteries that are easier to dismantle. She is part of the Faraday battery challenge, a four-year investment by the Government of the United Kingdom that looks to develop new materials for batteries.", "-29.93866598108434" ], [ "dust build up on the heat sink. Many laptops are difficult to disassemble by the average user and contain components that are sensitive to electrostatic discharge (ESD). Battery life Battery life is limited because the capacity drops with time, eventually requiring replacement after as little as a year. A new battery typically stores enough energy to run the laptop for three to five hours, depending on usage, configuration, and power management settings. Yet, as it ages, the battery's energy storage will dissipate progressively until it lasts only a few minutes. The battery is often easily replaceable and a higher capacity", "-29.93317443606793" ], [ "typically lose 8 to 20 percent of their original charge per year when stored at room temperature (20–30 °C). This is known as the \"self-discharge\" rate, and is due to non-current-producing \"side\" chemical reactions that occur within the cell even when no load is applied. The rate of side reactions is reduced for batteries stored at lower temperatures, although some can be damaged by freezing.\nOld rechargeable batteries self-discharge more rapidly than disposable alkaline batteries, especially nickel-based batteries; a freshly charged nickel cadmium (NiCd) battery loses 10% of its charge in the first 24 hours, and thereafter discharges at a rate of", "-29.841028253780678" ], [ "must be periodically replaced through routine maintenance. Depending on the charge–discharge cycles and type of battery this can mean a maintenance period of anything from a few months to a year.\nVented cell voltage rises rapidly at the end of charge allowing for very simple charger circuitry to be used. Typically a battery is constant current charged at 1 CA rate until all the cells have reached at least 1.55 V. Another charge cycle follows at 0.1 CA rate, again until all cells have reached 1.55 V. The charge is finished with an equalizing or top-up charge, typically for not less", "-29.81181701258174" ], [ "directly relate to time of day. Power source RTCs often have an alternate source of power, so they can continue to keep time while the primary source of power is off or unavailable. This alternate source of power is normally a lithium battery in older systems, but some newer systems use a supercapacitor, because they are rechargeable and can be soldered. The alternate power source can also supply power to battery backed RAM. Timing Most RTCs use a crystal oscillator, but some have the option of using the power line frequency. The crystal frequency is usually 32.768 kHz, the same frequency", "-29.776659534865757" ], [ "reagents. If this kind of battery is over-discharged, the reagents can emerge through the cardboard and plastic that form the remainder of the container. The active chemical leakage can then damage or disable the equipment that the batteries power. For this reason, many electronic device manufacturers recommend removing the batteries from devices that will not be used for extended periods of time. Toxic materials Many types of batteries employ toxic materials such as lead, mercury, and cadmium as an electrode or electrolyte. When each battery reaches end of life it must be disposed of to prevent environmental damage. Batteries are", "-29.773645019799005" ], [ "is highly inefficient. [REF] The inefficiency is largely due to increases the incidence of side reactions (for instance electrolysis) which dissipate energy.\nThe presence of the ultracapacitor integrated in the UltraBattery acts to limit the formation of hard sulfation inside the cell. [REF] This supports the battery's ability to operate for long periods in a partial SoC where the battery operates more efficiently. [REF] Conventional VRLAs are somewhat constrained to operate in the inefficient region toward the top of their charge capacity in order to protect them against damage by sulfation. Research continues into the reasons why the", "-29.706782107707113" ], [ "conditioner, an AC inverter, and a battery storage/charging unit that contained six BB-2590 rechargeable batteries. RENEWS was designed to power two or three laptops continuously. The storage component provided power at peak demand for about five hours when energy was not being generated by the renewable components.  RENEWS components weighed about 100 pounds, and was stored in two cases weighing about 70 pounds each.", "-29.65956235260819" ], [ "rectifiers have a long but not indefinite service life of 60,000 to 100,000 hours, depending on rating and cooling. The rectifier can show some unforming of the rectifier characteristic after long storage. Each cell can withstand a reverse voltage around 25 volts and has a forward voltage drop around 1 volt, which limits the efficiency at low voltages. Selenium rectifiers have an operating temperature limit of 130 °C and are not suitable for high-frequency circuits. Replacement Selenium rectifiers had a shorter lifespan than desired. During catastrophic failure they produced significant quantities of malodorous and highly toxic fumes that let the", "-29.65233156643808" ], [ "two types of ageing cause a loss of performance (capacity or voltage decrease), overheating, and may eventually lead to critical failure (electrolyte leaks, fire, explosion). Some batteries can be maintained to prevent loss of performance due to ageing. For example, non-sealed lead-acid batteries produce hydrogen and oxygen from the aqueous electrolyte when overcharged. The water has to be refilled regularly to avoid damage to the battery, and the inflammable gases have to be vented out to avoid explosion risks. However, this maintenance has a cost, and recent batteries, such as Li-Ion, are designed to have a long lifespan without maintenance.", "-29.63220965428627" ], [ "may happen immediately once the charger is switched on. Some chargers may keep the voltage at Uₘₐₓ for some time and allow the current to drop to 80% of the constant-current value, before proceeding to the next stage.\nStage 2 is called the Uₒ-phase, constant-voltage boost stage, absorption stage, or topping charge. In this stage, the battery is continued being charged at a constant (over)voltage Uₒ, but the charge current is decreasing. The decrease is imposed by the battery. The voltage in the Uₒ-phase is too high to be applied indefinitely (hence, overvoltage), but it allows charging the battery fully in", "-29.618218733929098" ], [ "Battery charger A battery charger, or recharger, is a device used to put energy into a secondary cell or rechargeable battery by forcing an electric current through it.\nThe charging protocol (how much voltage or current for how long, and what to do when charging is complete, for instance) depends on the size and type of the battery being charged. Some battery types have high tolerance for overcharging (i.e., continued charging after the battery has been fully charged) and can be recharged by connection to a constant voltage source or a constant current source, depending on battery type. Simple chargers of", "-29.595840686830343" ], [ "current flow. As the charging process continues, such a battery will reach the charger's preset cut-off more rapidly, long before it has had time to accept a complete charge. In this case the battery charger indicates the charge cycle is complete, but the battery actually holds very little energy. To the user, it appears that the battery is dying. Regeneration The lead sulfate layer can be dissolved back into solution by applying much higher voltages. Normally, running high voltage into a battery will cause it to rapidly heat and potentially causing thermal runaway which may cause it to explode. Some", "-29.581953956978396" ], [ "are numerous suppliers of large battery storage. Operating characteristics Since they do not require any mechanical movement, battery storage power plants allow extremely short control times and start times, in the range of few 10s of ms at full load. As well as shaving power peaks of up to a few hours, due to that reactivity, they can also dampen the fast oscillations (second) that appear when electrical power networks are operated close to their maximum capacity. These instabilities are voltage fluctuations with periods of up to several 10s of seconds and can soar, in worst cases, to high amplitudes,", "-29.576348624017555" ], [ "was the first practical secondary (rechargeable) battery that could have its capacity replenished from an external source. The electrochemical reaction that produced current was (to a useful degree) reversible, allowing electrical energy and chemical energy to be interchanged as needed. Common lead acid batteries contain a mixture of sulfuric acid and water, as well as lead plates. The most common mixture used today is 30% acid. One problem however is if left uncharged acid will crystallize within the lead plates of the battery rendering it useless. These batteries last an average of 3 years with daily use however it is", "-29.531194101989968" ], [ "long as power is applied; it loses its content when the power supply is lost.\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes. Security Full disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with", "-29.489024219219573" ], [ "used as a rating on batteries to indicate the maximum current that a battery can safely deliver on a circuit. Standards for rechargeable batteries generally rate the capacity over a 4-hour, 8 hour or longer discharge time. Types intended for special purposes, such as in a computer uninterruptible power supply, may be rated by manufacturers for discharge periods much less than one hour. Because of internal resistance loss and the chemical processes inside the cells, a battery rarely delivers nameplate rated capacity in only one hour. Fast-charging, large and light batteries As of 2012, lithium iron phosphate (LiFePO\n₄) battery technology", "-29.4782356582582" ], [ "attributed to establishments by Terra Choice Environmental Services Inc. or the Hotel Association Canada respectively. Rechargeable batteries Ongoing technological advances in rechargeable batteries and battery chargers, means most single-use alkaline batteries can largely be replaced with higher capacity, environmentally preferable, rechargeable Nickel-Metal Hydride (NiMH) batteries. Rechargeable batteries will outperform the best alkaline single-use batteries in high-drain appliances such as digital cameras. Rechargeable batteries may not last as long as alkaline batteries on a single charge in low drain (e.g. radio), medium drain (e.g. MD player), and pulse drain devices (e.g. photoflash); but NiMH batteries can be reused over", "-29.470556444197427" ], [ "the battery is going to be stored unused for a long period of time, it should be discharged down to at most 40% of capacity (some manufacturers recommend fully discharging and even short-circuiting once fully discharged), and stored in a cool, dry environment. Overcharging Sealed Ni–Cd cells consist of a pressure vessel that is supposed to contain any generation of oxygen and hydrogen gases until they can recombine back to water. Such generation typically occurs during rapid charge and discharge, and exceedingly at overcharge condition. If the pressure exceeds the limit of the safety valve, water in the form of", "-29.462939402088523" ], [ "various higher-capacity batteries, or simply replacing it because of age (a replacement battery costs a small fraction of the manufacturer's battery-replacement charge).\nSeveral people have successfully documented replacing the built-in Lithium ion battery with a higher-capacity battery, increasing time the T3 can be used without charging. Batteries of 1100mAh are available that fit just fine. However, disassembling the case is complicated by 5 small metal tabs, not mentioned by most online instruction pages: two on each side, and one on the back just above the docking connector, which must be released as one of the first disassembly steps (for example, by", "-29.457594059775147" ], [ "cathode during recharging has, in the past, presented challenges for the commercial viability of the NiZn battery. Another common issue with zinc rechargeable batteries is electrode shape change and dendrites (or \"whiskers\"), which may reduce the cell discharging performance or, eventually, short out the cell, resulting in a low cycle life.\nRecent advances have enabled this problem to be greatly reduced. These advances include improvements in electrode separator materials, inclusion of zinc material stabilizers, and electrolyte improvements (e.g. by using phosphates). PowerGenix has developed 1.6 V batteries with claimed battery cycle life comparable to NiCd batteries.\nBattery cycle life is most commonly", "-29.457040320558008" ], [ "only produce between 1,000 and 2,000 flashes (depending on the power level selected) and the fact that these flash batteries were not rechargeable led to professionals replacing these flashes with other models that were powered by batteries that could be recharged. Current repairs and updates There is a company that has developed a rechargeable power supply for the Stroboflash II, III, and IV, which plugs right into the Stroboflash power pack instead of the original dry cell batteries and utilizes two 12 volt rechargeable battery packs. They also repair these flashes. This can be found at Stroboflash.com.", "-29.42987545323558" ], [ "about 10% a month. However, newer low self-discharge nickel metal hydride (NiMH) batteries and modern lithium designs display a lower self-discharge rate (but still higher than for primary batteries). Corrosion Internal parts may corrode and fail, or the active materials may be slowly converted to inactive forms. Physical component changes The active material on the battery plates changes chemical composition on each charge and discharge cycle; active material may be lost due to physical changes of volume, further limiting the number of times the battery can be recharged. Most nickel-based batteries are partially discharged when purchased, and must be charged", "-29.382069012015563" ], [ "battery in the world, which was based on a titanium disulfide cathode and a lithium-aluminum anode. \n\"All these batteries are called intercalation batteries. It’s like putting jam in a sandwich. In the chemical terms, it means you have a crystal structure, and we can put lithium ions in, take them out, and the structure’s exactly the same afterwards,\" Whittingham said \"We retain the crystal structure. That’s what makes these lithium batteries so good, allows them to cycle for so long.\"\nToday’s lithium batteries are limited in capacity, because less than one lithium ion/electron is reversibly intercalated per transition metal redox center.", "-29.257435034232913" ], [ "inaudible. This is because certain chemical reactions in the cell increase the internal resistance and, thus, lower the voltage. These reactions reverse themselves when the battery is left idle, so it is good only for intermittent use. Zinc-carbon cell, the first dry cell Many experimenters tried to immobilize the electrolyte of an electrochemical cell to make it more convenient to use. The Zamboni pile of 1812 is a high-voltage dry battery but capable of delivering only minute currents. Various experiments were made with cellulose, sawdust, spun glass, asbestos fibers, and gelatine.\nIn 1886, Carl Gassner obtained a German patent on a", "-29.22320122351084" ], [ "Other common battery cell types can last significantly longer or shorter periods, such as the smaller CR2016 which will generally last about 40% less time than CR2032. Higher temperatures and longer power-off time will shorten battery cell life. When replacing battery cell, the system time and CMOS BIOS settings may revert to default values. Unwanted BIOS reset may be avoided by replacing battery cell with PSU power switch turned on and plugged into electric socket on the wall. On ATX motherboards, turning on power switch on PSU, will supply 5V standby power to the motherboard to keep CMOS memory energized", "-29.221990127349272" ], [ "estimate battery internal resistance, particularly to check the state of discharge of a battery rather than obtain an accurate DC value. Some chargers for rechargeable batteries indicate the ESR.\nIn use, the voltage across the terminals of a disposable battery driving a load decreases until it drops too low to be useful; this is largely due to an increase in internal resistance rather than a drop in the voltage of the equivalent source.\nIn rechargeable lithium polymer batteries, the internal resistance is largely independent of the state of charge but increases as the battery ages; thus, it is a good indicator of", "-29.16816296750767" ], [ "etc have used lead–acid batteries. These batteries employ a sulfuric acid electrolyte and can generally be charged and discharged without exhibiting memory effect, though sulfation (a chemical reaction in the battery which deposits a layer of sulfates on the lead) will occur over time. Typically sulfated batteries are simply replaced with new batteries, and the old ones recycled. Lead–acid batteries will experience substantially longer life when a maintenance charger is used to \"float charge\" the battery. This prevents the battery from ever being below 100% charge, preventing sulfate from forming. Proper temperature compensated float voltage should be used", "-29.167113859206438" ], [ "time in LEDs also allows for use of motion detectors for additional efficiency gains. Rechargeable Battery Batteries will store the electricity generated by the solar panel during the day and provide energy to the fixture during the night. The life cycle of the battery is very important to the lifetime of the light and the capacity of the battery will affect the backup days of the lights. There are two types of batteries commonly used in solar-powered street lights- gel cell deep cycle batteries as well as lead acid batteries. Lithium-ion batteries are also popular these days as they are", "-29.158007190755598" ], [ "seven minutes. Sodium–sulfur batteries have been used to store wind power. A 4.4 MWh battery system that can deliver 11 MW for 25 minutes stabilizes the output of the Auwahi wind farm in Hawaii.\nLithium–sulfur batteries were used on the longest and highest solar-powered flight. Lifetime Battery life (and its synonym battery lifetime) has two meanings for rechargeable batteries but only one for non-chargeables. For rechargeables, it can mean either the length of time a device can run on a fully charged battery or the number of charge/discharge cycles possible before the cells fail to operate satisfactorily. For a non-rechargeable these", "-29.149330795160495" ], [ "instead of at its right end. A separate lamp serves as a power indicator.\nPower is supplied by an integrated rechargeable battery pack or by an external battery charger, which also serves as an AC adapter to allow the calculator to operate from AC power. The battery pack (model EL-84) contains six nickel-cadmium AA batteries connected in series, giving a total voltage of 7.2 volts and, with the original batteries, a total capacity of 450 milliampere-hours. (Present-day nickel-cadmium AA batteries have much greater capacity.) Battery life with the original batteries is about three hours, which gives an average power usage of", "-29.138230026932433" ], [ "Memory effect Other problems perceived as memory effect Phenomena which are not true memory effects may also occur in battery types other than sintered-plate nickel-cadmium cells. Voltage depression due to long-term over-charging A common process often described to memory effect is voltage depression. In this case, the peak voltage of the battery drops more quickly than normal as it is used, even though the total energy remains almost the same. In modern electronic equipment that monitors the voltage to indicate battery charge, the battery appears to be draining very quickly. To the user, it appears the battery is not holding", "-29.13122364458468" ] ]
5dv65p
How come NYC (latitude=40°) gets covered in snow during winter whereas Melbourne (latitude=-38°) never really gets much?
[ "Oceanic currents and wind patterns keep the weather on some coasts milder than on others. That is why the West Coast is much warmer in the winter and cooler in the summer than the East Coast of the US. Melbourne is protected from Antarctic weather systems by the Southern Ocean, while nothing stops polar winds from reaching NYC.", "Topography matters. I live in Dublin, 55N, which is very close to the same latitude as Edmonton, Alberta. I've been there - very nice, gets about 50% more sunshine than Dublin, but in winter ... hoo, boy. I was in Edmonton one January, walking around in -20C during the day, in bright sunshine, but one night there was a severe storm during which the temp dropped below -30C. Ireland's climate is warmed by the Gulf Stream, and it never gets *really* cold. Last winter Dublin got no snow worth mentioning at all. Edmonton, on the other hand, is on the east side of the Rockies, and cold air sweeps down over land all the way from the Arctic. If that hits moist Pacific air pushed up over the Rockies, the result is massive snowfall.", "Jet stream patterns. Melbourne gets hit by (relatively) dry warm winds that have blown across the Great Victoria Desert, the Nullarbor Plain, and the Great Australian Bight (which is fed by warm winds from the Indian Ocean). New York gets pinned between the cold Polar jet stream blowing down from Canada (picking up moisture along the way from the Great Lakes) and wet wind blowing in from the North Atlantic Ocean. The relative lack of other land masses in the southern hemisphere creates a warm jet stream (the 'westerlies') that isolates Australia from the Antarctic cold winds (the 'Polar easterlies'). So the winds that hit southern Australia are mostly warm winds being pushed south from the Indian Ocean, despite its low latitude and proximity to Antarctica.", "Because latitude isn't the only determining factor in what kind of whether a location gets. Topology and relation to ocean currents is much more telling. That's why countries like England and Denmark have mild climate even though they're further north than the entire continental United States." ]
[ [ "a persistent cloud deck with associated precipitation which linger across the region for prolonged periods of time. Temperature differences between the warmer coast and far northern inland sections can exceed 36 degrees Fahrenheit (20 degrees Celsius), with rain near the coast and frozen precipitation, such as sleet and freezing rain, falling inland. Two-thirds of such events occur between November and April. which moves from northeast to southwest.\nUnlike the vast majority of the state, New York City features a humid subtropical climate (Koppen Cfa). New York City is an urban heat island, with temperatures 5–7 degrees Fahrenheit (3–4 degrees Celsius) warmer", "-33.52582654176513" ], [ "County) and smallest in area (New York County) are both part of New York City. Climate Upstate New York is well known for its cold and snowy winters, particularly in comparison to the more temperate climate of downstate New York. The snowy reputation is especially true for the cities of Buffalo, Rochester, Oswego and Syracuse, and is largely due to lake-effect snow from Lake Ontario and Lake Erie. The villages of Old Forge and Saranac Lake, both in the Adirondacks, often vie on winter nights with places like International Falls, Minnesota and Fargo, North Dakota for the coldest spot in", "-30.597169788146857" ], [ "most winter seasons and precipitation can fall as rain with temperatures sometimes climbing above 10 °C (50 °F). Average winter snowfall is 121.5 cm (47.8 in) at the weather station in Downtown Toronto and 108.5 cm (42.72 in) at Toronto Pearson International Airport.\nThe average January maximum/minimum is −1 °C (30 °F)/−7 °C (19 °F) in the city. There are usually a few colder periods where temperatures remain below −10 °C (14 °F) and less frequently below −20 °C (−4 °F) at night (especially in the northern suburbs), with wind chills making it feel like −30 °C (−22 °F).\nDue to its position on the northwest shore of Lake Ontario, Toronto is not a direct target of heavy,", "-30.477962963515893" ], [ "expected in the northern highlands (Northern Plateau) and 0 °F (−18 °C) or colder in the southwestern and east-central highlands (Southern Plateau). The Adirondack region records from 35 to 45 days with below zero temperatures, in normal to severe winters. Winters are also long and cold in both Western and Central New York, though not as cold as the Adirondack region due to the warming influence of the Great Lakes. The New York City metro area, in comparison to the rest of the state, is cold but for not as long as the rest of the New York in the winter", "-30.148533799336292" ], [ "eastward and westward from Saint Laurent Boulevard, and northward from the St. Lawrence River and the Lachine Canal. (A few streets in Le Sud-Ouest borough, such as rue Charlevoix, cross the Lachine Canal. In those cases, the addresses south of the Lachine Canal have an \"O\" prefixed to their street numbers.) Winter Winter in Montreal is often cold and snowy, and can be windy at times. Most days stay near or below freezing, and temperatures remain well below freezing at night. Sometimes with windchill, temperatures may feel colder than the actual temperature. Typical winter daytime temperatures are between 2 and", "-30.071684128633933" ], [ "Climate of New York The climate of New York state is generally humid continental, while the extreme southeastern portion of the state (New York City and Long Island area) lies in the warm humid subtropical climate zone. Winter temperatures average below freezing during January and February in much of New York state, but several degrees above freezing along the Atlantic coastline, including New York City. \nSeasonally, summer-like conditions prevail from June to early September statewide, while areas in far southern New York and New York City have summer conditions from late May through late September. Cold-air damming east", "-29.994974525856378" ], [ "−8 °C (36 and 18 °F) and overnight temperatures are between −10 and −15 °C (14 and 5 °F). Temperatures in the downtown core can be warmer than those in the northwestern suburbs by up to 5 °C (9.0 °F) due to the urban heat island effect. Some days are milder with temperatures staying well above freezing; conversely, night temperatures occasionally plunge below −20 °C (−4 °F), especially with windchill.\nMontreal receives plenty of snow throughout the winter season. Snow mainly falls between early December and early March, although it mostly snows in January and February. Although it is rare, light snow could fall in late October and April.", "-29.95603580615716" ], [ "long-standing cold weather legend is unproven, because there are no official temperature measurements at any street corner in Canada to confirm the coldest intersection. Winnipeg's city centre is usually 3–4 °C warmer than the airport, owing to the urban heat island effect. Cultural references There are numerous cultural references to the intersection, including the 1992 Randy Bachman and Neil Young hit song “Prairie Town”, with the chorus repeating the line “Portage and Main, 50 below”. The British band Blurt have a song named “Portage & Main” on their album Kenny Rogers' Greatest Hit. It is also the setting for the Stompin'", "-29.95529163934407" ], [ "significant urbanization within New York city has led to an urban heat island, which causes temperatures to be warmer overnight in all seasons.\nAnnual precipitation is fairly even throughout the year across New York state. The Great Lakes region of New York sees the highest annual rain and snow amounts in New York state, and heavy lake-effect snow is common in both western and central New York in winter. In the hotter months, large, long-lived complexes of thunderstorms can invade the state from Canada and the Great Lakes, while tropical cyclones can bring rains and winds from the southwest during the", "-29.920723184754024" ], [ "(especially in the city itself, which averages several degrees above freezing). The record low for New York state is −52 °F (−47 °C), set at Stillwater Reservoir on February 9, 1934 and at Old Forge on February 18, 1979. In February 2015, Rochester experienced its coldest month ever, with an average temperature of 12.2 °F (−11 °C); while later that year had a near-record warm November and a record-breaking December. The latter month was about 12 degrees F warmer than average, and several degrees over the previous record. Cloudiness Southeastern sections of the state near New York City have an average annual", "-29.8059754340793" ], [ "tributary of the Fishkill Creek, also crosses the town in a roughly north–south orientation. There are numerous smaller water bodies, including Willow Brook which feeds into Sprout Creek. Clove Mountain, at 1,398 ft (426 m) in elevation is located within the town.\nNew York as a whole has a humid continental climate. The highest known temperate in Verbank was 99°F, which occurred in 1948. The lowest temperature was –29°F, recorded in 1994. Average monthly precipitation ranges from 2.62 in (67 mm) in February, to 4.37 in (0.111 m) in July. The coldest month is typically January, with an average high of 34°F and a low of 12°F.", "-29.784295270559596" ], [ "and summers are hot inland but cooler towards the coast. Precipitation is plentiful and in some areas reaches over 45 inches. Snowfall is more common in Westchester than in New York City, with the exception of the southwest of the county where snowfall is often between 40 and 60 inches . In January, less dense areas have a low of 16-18 °F and a high of 30–34 °F while dense areas like Yonkers and White Plains have a low of 20–25 °F and a high of 35-40 °F. In the summer, this effect is much milder. Coastal areas (Mamaroneck, New Rochelle, Rye, Port Chester) have highs of", "-29.71875254745828" ], [ "−4.3 °C (24.3 °F) on February 5. On February 11 the city surpassed this, dropping to −4.4 °C (24.1 °F). Vancouver had its coldest February on record. One benefit from the cold, however, was that it killed many Japanese beetles, an invasive species to the area.\nOn February 5, Kelowna dropped to −20.3 °C (−4.5 °F) with a wind chill of −24 °C (−11 °F). The next day, on February 6, the wind chill dropped to as low as −26 °C (−15 °F). On February 10 the temperature in the city dropped to −20.8 °C (−5.4 °F) with a wind chill of −27 °C (−17 °F).\nTemperatures reached −20.7 °C (−5.3 °F) in Ashcroft on February 5,", "-29.655758720939048" ], [ "more of this increase occurred at night: the average minimum temperature has been 1.8 °C (3.2 °F) higher. Average precipitation during the same period was close to the average of the previous period, snowfall totals down only marginally with slightly higher rainfall. September and January have seen the highest average temperature increases. Part of this warming is likely attributed to increased urban growth surrounding the airport.\nAn older study conducted in the 1990s analysed the heat island effect comparing data from selected regional stations, including both Downtown Toronto and Pearson Airport, enough for Downtown Toronto to have a different Köppen climate classification", "-29.46666164699127" ], [ "(5 °F), −30 °C (−22 °F) after wind chill), although the CBC reported that Montreal and Winnipeg decided to go on without any changes. New Year's Eve celebrations at New York City's Times Square were the second-coldest on record, at 9 °F (−13 °C) (−4 °F (−20 °C) after wind chill). Record temperatures In 2017, Watertown, New York and Buffalo, New York, had their coldest final week on record for the year. The National Weather Service indicated that a temperature of −15 °F (−26 °C) took place in Omaha, Nebraska on December 30, 2017, lower than the previous record set in 1884. \nOn January 1, 2018 in Aberdeen, South", "-29.22870351956226" ], [ "as the District of North Vancouver on the North Shore Mountains get more rain. Snow is problematic for meteorologists to predict due to temperatures remaining close to freezing during snow events. Temperatures The average annual temperature in Vancouver is 11.0 °C (51.8 °F) downtown and 10.4 °C (50.7 °F) at YVR airport in Richmond. This is one of the warmest in Canada. Greater Vancouver is in USDA plant hardiness zone 8, similar to other coastal or near-coastal cities such as Seattle, Portland, Amsterdam, and London, as well as places such as Atlanta, Georgia and Raleigh, North Carolina, far to the south (though these locations", "-29.200943728268612" ], [ "the eastern part of the country, leading to well-below average temperatures. Record temperatures The average temperature in Boston for January was 2.9 °F (1.6 °C) below the 1981–2010 normal, and the average temperature in February was 19.0 °F (−7.2 °C), which was 12.7 °F (7.1 °C) below the 1981–2010 normal, making it the second-coldest month of any month all-time, behind February 1934. March was 5.2 °F (2.9 °C) below average. By the end of a period spanning from the beginning of February to the end of December, Worcester, Massachusetts saw a record 101.4 inches (258 cm) of snowfall, breaking the 86.7 inches (220 cm) record set in 2004–05, which was", "-29.20073806430446" ], [ "in the west than the east, although cloud cover is very common across the region. The weather is unpredictable at all times of the year, and although the seasons are distinct, they are considerably less pronounced than in interior Europe or the eastern seaboard of North America. Average daytime maximums in Belfast are 6.5 °C (43.7 °F) in January and 17.5 °C (63.5 °F) in July. The highest maximum temperature recorded was 30.8 °C (87.4 °F) at Knockarevan, near Garrison, County Fermanagh on 30 June 1976 and at Belfast on 12 July 1983. The lowest minimum temperature recorded was −18.7 °C (−1.7 °F) at Castlederg, County Tyrone on", "-29.18153714154505" ], [ "each winter. Winters are cold compared with other coastal cities on the same latitude because the direction of the Atlantic currents is going east to Europe.\nBecause it juts out into the Atlantic, Nova Scotia is prone to tropical storms and hurricanes in the summer and autumn.", "-28.97963498538593" ], [ "trend occurs during the winter—winter temperatures are warmer along the lakeshore and downtown than inland.", "-28.81425129220588" ], [ "with the rest of South West England, Street has a temperate climate which is generally wetter and milder than the rest of the country. The annual mean temperature is approximately 10 °C (50.0 °F). Seasonal temperature variation is less extreme than most of the United Kingdom because of the adjacent sea temperatures. The summer months of July and August are the warmest with mean daily maxima of approximately 21 °C (69.8 °F). In winter mean minimum temperatures of 1 °C (33.8 °F) or 2 °C (35.6 °F) are common. In the summer the Azores high pressure affects the south-west of England, however convective cloud sometimes forms inland, reducing", "-28.73358030547388" ], [ "centimeters (9 in) and 26.8 centimeters (11 in) on the 21st and on the 24th respectively. Higher elevations and cities northeast of Vancouver, such as Coquitlam, received over 30 centimeters (12 in) of snow with each of the storms. The snow, however, was also accompanied by frigid temperatures such as the −15.2 °C (5 °F) on the 20th, which broke the daily low temperature record at the airport which is situated at sea level. It happened to be the coldest temperature recorded in December for 40 years; dating back to the −17.8 °C (0 °F) on the 29th in 1968. \nAnother snowstorm on the 26th brought", "-28.633691068207554" ], [ "is influenced by the city's proximity to the Apuseni Mountains, as well as by urbanisation. Some West-Atlantic influences are present during winter and autumn. Winter temperatures are often below 0 °C (32 °F), even though they rarely drop below −10 °C (14 °F). On average, snow covers the ground for 65 days each winter. In summer, the average temperature is approximately 18 °C (64 °F) (the average for July and August), despite the fact that temperatures sometimes reach 35 °C (95 °F) to 40 °C (104 °F) in mid-summer in the city centre. Although average precipitation and humidity during summer is low, there are infrequent yet heavy and often violent", "-28.51085526641691" ], [ "areas. On average, Buenos Aires is warmer than the surrounding areas by 1.5 to 3.5 °C (2.7 to 6.3 °F) owing to the urban heat island. The average heat island is in summer than in winter. This varies by season; its influence during the day is the strongest in July than in January. In contrast, the urban heat island effect during nights is the most intense in January than in July.\nThe El Niño–Southern Oscillation is a major factor in the variation of annual precipitation within Buenos Aires and the Pampas, particularly during spring and summer. During an El Niño year, precipitation is", "-28.448535587529477" ], [ "air masses: a warm, humid one from the southwest and a cold, dry one from the northwest.\nDownstate New York, comprising New York City, Long Island, and lower portions of the Hudson Valley, has rather warm summers with some periods of high humidity and cold, damp winters which are relatively mild compared to temperatures in Upstate New York due to downstate region's lower elevation, proximity to the Atlantic Ocean, and relatively lower latitude. Upstate New York experiences warm summers, marred by only occasional, brief intervals of sultry conditions, with long and cold winters. Western New York, particularly the Tug Hill region,", "-28.441341766156256" ], [ " Scarborough, Ontario, recorded an all-time record low temperature of −35.2 °C (−31.4 °F), several degrees colder than the official coldest record for Toronto, which Scarborough is now a part of. The city of Toronto itself dropped to −31 °C (−24 °F), but recorded its coldest January on record with −12.4 °C (9.7 °F) at the airport. The cold air was also accompanied by large snowfalls, with 50 centimeters (20 inches) falling on the western side of Lake Ontario. Just like the mild pattern in the western United States, southern British Columbia got above 10 °C (50 °F) several times during the month of January. Rapid melting and", "-28.42561397049576" ], [ "lower lying land in the valley is often cooler and effectively a 'frost pocket'. Albeit still mild comparatively speaking, temperatures on a clear night will likely be colder than the land at the top of valley floor or roughly speaking along Reddish Road/Gorton Road. The effects of a Fohn Wind are often present here, where the Warm air rises from the valley floor, tempering the air at the top and thereby reducing overnight lows, more particularly in winter.\nAs a comparison, Temperatures on any given clear night throughout the year, can be between 1-3 degrees C warmer than the Manchester weather", "-28.19790981603728" ], [ "eastern prairie provinces, Ontario, Quebec, and the Northwest Territories. However, only southern Ontario set temperature records.\nDuring most of the early cold wave, Winnipeg was the coldest major city in Canada. On January 6, it reached a low of −37 °C (−35 °F), while on January 7, the low was −36 °C (−33 °F). On both days, the temperature did not go above −25 °C (−13 °F). Other parts of southern Manitoba recorded lows of below −40 °C (−40 °F). On January 5, the daily high in Saskatoon was −28.4 °C (−19.1 °F) with a wind chill of −46 °C (−51 °F).\nOn January 7, 2014, a cold temperature record was set in Hamilton,", "-28.19032377609983" ], [ "temperate weather due to its location in Adirondack State Park. The Adirondacks (or ADKs for short) are in northern New York. The lakes in the area greatly contribute to the humidity in the summer months (late May through August), thus contributing to the rapid and unforeseen change in weather and large quantities of precipitation the area gets in relation to the national average. The Adirondacks see a clear distinction between seasons, but the cold weather months last the longest. Snow typically begins to fall in late October and continues until the later days of April/early May. Though winters in the", "-28.178327116416767" ], [ "located far south of warm-summer inland areas like Yellowknife and Fairbanks where vegetation thrives. Being on the 58th parallel it is located closer to the equator than cities like Stockholm, Oslo, Helsinki and Saint Petersburg, all of which have far gentler year-round climates. It is also on the same parallel as the extremely mild northern tip of mainland Scotland (Thurso). With the North American population centres being further south due to the cold climate it still lies far north of provincial centres Montreal and Quebec City, being located in the distant wilderness from the majority of Quebec's population. It also", "-28.172135642700596" ], [ "the last century. Precipitation ranges from 1,000 to 1,300 mm (39 to 51 in) and falls throughout the year. The city of Buenos Aires is surrounded by a climate similar to the northern part of the province, but the city itself resembles more the Delta climate, with less frost.\nThe southwestern region is the driest region, and it experiences a more marked differences in temperatures. Summers are often hot, between 30 and 35 °C (86 and 95 °F), but nights are usually comfortable (14 to 18 °C (57 to 64 °F)). Thunderstorms are less frequent, but can be very violent in nature. Frost can make an appearance", "-28.15170376340393" ], [ "North Pole created high winds, and brought extreme sub-zero temperatures, further exacerbated by severe wind chill. Large amounts of snow fell in the affected area. Some have attributed the unusual weather pattern to climate change. Canada The polar vortex split into three parts, with the dominant part setting up over the Great Lakes and Nunavut. This gave prairie Canada and northern Ontario a persistent northern flow, leading to record cold temperatures. Alberta On February 3, Calgary recorded a temperature of −27.7 °C (−17.9 °F) and a wind chill of −39 °C (−38 °F). On February 5, the city dropped to −28.9 °C (−20.0 °F) and a", "-28.12636153952917" ], [ "rain and snow as well as surges of both warm and cold air.\nThe basic climate of the Northeast can be divided into a colder and snowier interior (Pennsylvania, New York State, and New England), and a milder coast and coastal plain from southern Rhode Island southward, including, New Haven, CT, New York City, Philadelphia, Trenton, Wilmington, Baltimore...etc.). Annual mean temperatures range from the low 50s F from Maryland to southern Connecticut, to the 40s F in most of New York State, New England, and northern Pennsylvania. Wildlife The Northeast has 72 National Wildlife Refuges, encompassing more than 500,000 acres (780 sq mi;", "-28.104225333285285" ], [ "Boston, Cape Cod,) and the Connecticut River Valley (e.g. Springfield) receive approximately 2/3 the amount of snowfall of central Massachusetts (e.g. Worcester) and the Berkshires (e.g. Pittsfield.) Total annual snowfalls average 43.3 in (110.0 cm) in Boston; 43.2 in (109.7 cm) in Springfield; and 69.1 in (175.5 cm) in Worcester. The ground is often covered with snow for weeks at a time during January and February.\nAlthough Massachusetts has a humid climate, its climate is sunny compared to other humid climates at the same latitude. In Boston, the average percentage of possible sunshine for every month is at least 50%. In summer and", "-28.038020521984436" ], [ "mean temperature of 22.3 °C (72.1 °F) and afternoon maximum average of 26.6 °C (79.9 °F) The average humidity is 74%, and the city (downtown area) averages five days with the temperature exceeding 30 °C (86 °F) and about 65 millimetres (2.6 in) of precipitation, mostly brief periods of showers and sometimes thunderstorms. Toronto's elevation is 112 m (367 ft 5 ¹⁄₂ in) above sea level on average.\nIn January 2012, the Toronto Organizing Committee for the 2015 Pan and Parapan American Games (TO2015) announced that sixty percent of the venues that had been proposed would be dropped in favour of a clustering system seen at other multi-sport events such as the", "-28.024660881550517" ], [ "norm. The days are dry, the nights relatively humid. January is also associated with the deciduous trees in the city shedding their leaves. 26–27 January 2008 recorded a minimum temperature of 10.2 °C, which is the lowest recorded in 45 years. Mumbai's winter in 2012 had the minimum temperature 8.2 °C. The lowest recorded temperature is 7.4 °C (45.3 °F) on 22 January 1962 which was the coldest day in Mumbai ever. February The fine January weather continues for the first fortnight of February. The mean daily minimum stays at 17.3 °C and mean daily maximum being 31.3 °C with some possibility of some unseasonal showers.", "-27.999615709355567" ], [ "per winter. The coldest month on record at Vancouver International Airport was January 1950 when an arctic air inflow moved in from the Fraser Valley and remained locked over the city, with an average low of −9.7 °C (15 °F) and an average high of only −2.9 °C (27 °F), making for a daily average of −6.3 °C (20.7 °F), 10 °C (18 °F) colder than normal. The coldest temperature ever recorded in the city was −18.3 °C (−1 °F) on December 29, 1968. The coldest temperature across Metro Vancouver, however, is −23.3 °C (−10 °F) recorded on January 23, 1969.\nWith snow being an infrequent occurrence over a typically mild winter, many", "-27.92303939795238" ], [ "since 1946, and was followed by the warmest April ever on record.\nWinter weather conditions in Toronto can vary greatly from one year to another and is significantly affected by global weather patterns such as El Niño–Southern Oscillation (ENSO). El Niño winters are generally mild and dry, with decreased snowfall (such as the winters of 2009–2010 and 2015–2016), while La Niña winters tend have more precipitation (the aforementioned winters of 1999 and 2008 are both La Niña). ENSO Neutral years are more unpredictable. Summer Maximum temperatures typically range from 23 to 31 °C (73 to 88 °F) with moderate to high humidity, proximity", "-27.92200694859548" ], [ "wind chill of −36 °C (−33 °F).\nOn February 5, Edmonton recorded a temperature of −32.3 °C (−26.1 °F) and a wind chill of −37 °C (−35 °F), as a result of the polar vortex making its way west.\nExtreme cold carried into March, with temperatures hitting −31.2 °C (−24.2 °F) in Calgary on the second, and −38.6 °C (−37.5 °F) in Lethbridge, the coldest March temperature ever recorded in the city. Temperatures dropped to −38.0 °C (−36.4 °F) in Medicine Hat, only 0.9 away from the March record low. British Columbia On February 4, the temperature in Richmond dropped to −5.6 °C (21.9 °F) with a wind chill of −11 °C (12 °F).\nOn the same day, the", "-27.91421561903553" ], [ "Conversely, winter temperatures tend to be cooler inland by a couple of degrees. Daylight The relatively high latitude of 49° 15′ 0″ N (similar to Paris, France, at 48° 85′ 66″) means sunsets as early as 4:15 pm and sunrises as late as 8:10 am. From November to February, at the sunshine measuring station at the airport in Richmond, on average more than 70% of the already short daytime is completely cloudy. The percentage of cloudiness is higher in Vancouver and especially the North Shore because upslope winds going up the mountainsides lead to the development of clouds.\nSummers, in contrast,", "-27.851189879103913" ], [ "mornings, typical maximum daily temperatures of 15 degrees Celsius (59 degrees Fahrenheit), and minimums of a few degrees above freezing. The year average temperature 16,1 °C (60.8F) Occasional snowfall occurs in suburbs at higher altitudes, and may extend throughout the city, though this happens infrequently (about every 8–10 years). Geography Its geographical position is 27°01′34″S 50°55′17″W, and its height is approximately 1048 meters above sea level. Currently, its population is around 36170 according to IBGE estimate. However, this figure fluctuates with the guest workers (10000) throughout the apple harvest season (From January to April). Flag The municipal flag was instituted by", "-27.8507643606863" ], [ "Arkville, New York Climate This climatic region is typified by large seasonal temperature differences, with warm to hot (and often humid) summers and cold (sometimes severely cold) winters. According to the Köppen Climate Classification system, Arkville has a humid continental climate, abbreviated \"Dfb\" on climate maps.", "-27.850377902330365" ], [ "arctic front associated with it passed through the region, bringing record cold temperatures in the eastern half of the United States.\nOn January 3, Boston had a temperature of 2 °F (−17 °C) with a −20 °F (−29 °C) wind chill, and over 7 inches (180 mm) of snow. Boxford, Massachusetts recorded 23.8 inches (600 mm). Fort Wayne, Indiana had a record low of −10 °F (−23 °C). In Michigan, over 11 inches (280 mm) of snow fell outside Detroit and temperatures around the state were near or below 0 °F (−18 °C). New Jersey had over 10 inches (250 mm) of snow, and schools and government offices closed. Over a dozen deaths", "-27.84686039702501" ], [ "receives heavy lake-effect snows, especially during the earlier portions of winter, before the surface of Lake Ontario itself is covered by ice. The summer climate is cool in the Adirondacks, Catskills, and at higher elevations of the Southern Tier.\nSummer daytime temperatures usually range from the upper 70s to mid-80s °F (25 to 29 °C), over much of the state. In the majority of winter seasons, a temperature of −13 °F (−25 °C) or lower can be expected in the northern highlands (Northern Plateau) and 5 °F (−15 °C) or colder in the southwestern and east-central highlands of the Southern Tier.\nNew York ranks 46th among the", "-27.804015567711758" ], [ "to dip across the city in the winter from December to February and temperatures below 5 °C are not uncommon. The average annual rainfall is 1,110 mm (44 in). Fog is common in the winters, while hot dry winds, called loo, blow in the summers.\nThrough a combination of water pollution, new constructions of upstream dams, and increase in the local temperature, the water level of the Ganges has recently gone down significantly, and small islands have become visible in the middle of the river.\n17 May 2012 was the hottest day of the season so far with mercury soaring up to 45.6 °C.", "-27.7635475203424" ], [ "In Winters, the temperature may drop to 6° Celsius, creating a thick layer of fog all over the city limiting visibility to 10 to 30 meters. In the winters of 2009-2010, Baluahi, Bhojpur, and Patna experienced extreme weather with a record decrease in temperature to 4°-5° Celsius. The coldest month is January. It becomes necessary to wear heavy woolen clothes during winter. Irrigation There are in Baluahi about 1 big and deep ponds which stores rain water and is used for irrigation and waste drainage and also a main thing sone canal is near by baluahi. The higher elevation of", "-27.746538699924713" ], [ "The city has mesothermal highland tropical climate, with cold and dry winter rains and higher, taking into account the situation of latitude and altitude ranging from 990m to 1733m. According to regional averages, the winter is hardly unpleasant unless one or the other day, the coldest month, July, has averaged approximately 55 °F and 61 °F, daily maximum of 71 °F and 73 °F and minimum of 41 °F to 50 °F and may reach even with minimum absolute in Celsius Scale up to 0 °C (32 °C), and may even gear.", "-27.705864147625107" ], [ "The climate is also humid, with cloud cover in the winter months that keeps temperatures down and can produce cold nights. Average temperature between December and April is 18 °C. The area receives most of its rain in the summer to early fall. However, the cloud cover that exists in winter is generally absent and daytime temperatures can go up to 35 °C with high humidity.\nDue to its high altitude the city temperatures can reach temperatures below 0 °C. Many homes burn firewood for warmth in cold weather. This can give the city a slightly smoky smell although the number of homes burning", "-27.69623180758208" ], [ "the warmest from 10 years. The daily temperature reached up to 20 °C (68 °F) and at night rarely dropped below 0 °C (32 °F). November was very wet, usually dropped 100 millimetres (3.9 in) of water, and the standard is approximately 40 millimetres (1.6 in). Like in October the wind was blowing strongly, particularly on the coast of the Baltic Sea. At the end of the month, thick fog blocked airports in Warsaw, Kraków and Wrocław to 3 days.\nWinter 2006/2007 was extremely warm and rain, in many cities, the snow lay only a few days. At night the temperature increased up to 14 °C (57 °F) degrees,", "-27.695010935945902" ], [ "the UHI by Luke Howard in the late 1810s said that the urban center of London was warmer at night than the surrounding countryside by 2.1 °C (3.7 °F). Though the warmer air temperature within the UHI is generally most apparent at night, urban heat islands exhibit significant and somewhat paradoxical diurnal behavior. The air temperature difference between the UHI and the surrounding environment is large at night and small during the day. The opposite is true for skin temperatures of the urban landscape within the UHI.\nThroughout the daytime, particularly when the skies are cloudless, urban surfaces are warmed by the absorption", "-27.679082614718936" ], [ "the coldest temperature recorded in February since record keeping began in 2010. This record was broken again on the 10th when it reached −21.7 °C (−7.1 °F).\nOn February 6, the temperature in Nanaimo dropped to −6.7 °C (19.9 °F) and a wind chill of −9 °C (16 °F). Manitoba In Winnipeg, Manitoba, temperatures reached as low as −40 °C (−40 °F), the coldest temperature recorded in the city since February 2007, when it reached −42 °C (−44 °F). Northwest Territories On February 2, the temperature in Yellowknife dropped to −42.9 °C (−45.2 °F) and a wind chill of −53 °C (−63 °F). Nunavut Environment Canada issued extreme cold warnings for most of Nunavut. The", "-27.63362630807387" ], [ "148,600 Climate The Atlantic Northeast region is known to have all four seasons. In the New England region of the United States summers are hot with an average temperature of 80-85 degrees Fahrenheit in late June through August. In the fall the air is cool with temperatures from 45-50 degrees Fahrenheit and in the spring, it tends to be rainy with temperatures from 40-60 degrees Fahrenheit. In the winter there tends to be a lot of snowfall averaging around 35 inches per year. The typical temperature in this area during the winter is around 25 degrees Fahrenheit. The Canadian Maritimes", "-27.572686220642936" ], [ "only region in Alaska in which the average daytime high temperature is above freezing during the winter months. There are even a few regions in the far southeast Alaska where the average temperature is warm enough to grow some cold-hardy palm trees. South The climate in south central Alaska, with Anchorage as a typical city, is mild by Alaskan standards. This is due in large part to its proximity to the coast. While it does not get nearly as much rain as the southeast of Alaska, it does get more snow, although days tend to be clearer here. It is", "-27.565432465984486" ], [ "which is around 1,000 miles (1,600 km) closer to the North Pole. The Twin Cities can also experience droughts, floods, and on average are windier than Chicago, Illinois (the \"Windy City\", although that is not the origin of the phrase). Records With temperature records dating to 1 October 1872, the range in temperatures has officially ranged from −41 °F (−41 °C) on January 21, 1888, up to 108 °F (42 °C) on July 14, 1936 during the Dust Bowl years. The coldest daily maximum temperature was −20 °F (−29 °C), set six days before the all-time record low, while the warmest daily minimum was 86 °F (30 °C), again", "-27.513660441560205" ], [ "be near 90 °F well into October, but by this time, the nights are noticeably cooler.\nWinters in Georgetown have highs in the 50s and 60s, with a few days dropping near freezing, providing the region with one or two ice storms per season. However, a few days reach well above the average. The region not uncommonly experiences the 80s well into December and 70s in January.\nFall, winter, and spring all average about two to three inches of rain per month, while July and August are the driest, averaging only one to two inches and sometimes no precipitation at all. Most of", "-27.498964839731343" ], [ "(including Georgian Bay), frequent heavy lake-effect snow squalls increase seasonal snowfall totals upwards of 3 m (120 in). Such conditions and the absence of long stretches of brutal cold make for excellent winter recreation. Northern Ontario Köppen climate classification Dfc: The northernmost parts of Ontario—primarily north of 50°N and with no major cities in the area—have a subarctic climate (Köppen) with long, severely cold winters and short summers, with dramatic temperature changes possible in all seasons. In summer, hot weather occasionally reaches even the northernmost parts of Ontario for brief periods, although humidity is generally lower than in the south. With", "-27.447585515355968" ], [ "covers the southeast part of the city and has a population of 65,000. Winter Typical winter phenomena include the bonspiel (January) thaw, ice fog, and the aurora borealis. The city is virtually assured of having a white Christmas as there is only one 25 December on record in the last century where there was no snow on the ground. Out of Canada's 100 largest cities, Winnipeg's winter is the tenth coldest with an average low of −20.2 °C (−4.4 °F). From December through February the maximum daily temperature exceeds 0 °C (32 °F), on average, for only 10 days and the minimum daily temperature", "-27.44086379482178" ], [ "the winter, which allows temperatures to become rather cold in the winter. The city receives fairly little rain, strong winds, and sometimes small amounts of snow during the winter. Temperature The air temperature in this region express the influence of the hot temperature that comes by the valley of the river Vardar, from south. The year's average temperature in this region is 14.5C. The thing that is interesting is that during the year there aren’t a temperature that are below 3.2C. During the summer we are witnesses of the extremely high temperatures, and during the winter we can", "-27.432398946373723" ], [ "of 42 to 45 Degree Celsius and a minimum temperature range of about 30 to 35 Degree Celsius. Periodic sand storms rage through the area during May and June due to the Prevalent low humidity. The hot wind, locally known as \"Lu\" blows across the district in these months. The cool wave starts from somewhere in early November. December, January and February are the winter months. Though the daytime temperature in winter is not that low, however there is always a sharp decrease in nights. The mean maximum and minimum temperatures during this period are 20 and 4 Degree Celsius", "-27.37057004921371" ], [ "winter. Southern Plains/Lower Midwest/Middle East Coast The region from the southern Plains, to the lower Midwest, eastward to the central East Coast (the New York City/coastal Connecticut region southward to Maryland) has a humid subtropical climate with cool to cold winters and hot, humid summers. This climate abuts the humid continental climate farther to the north. Daytime highs range from 80 to 90 °F (27 to 32 °C) in summer to 35 to 50 °F (2 to 10 °C) in winter. Lows range from the 60 °F (16 °C)s in summer to 25 to 35 °F (−4 to 2 °C) in winter. Cities in this region include Wichita,", "-27.334622281428892" ], [ "Canada.\nCoastal areas are typically warmer during the winter, and cooler during the summer, than other regions of the ecozone. They also experience frequent sea fog in late spring and early summer due to the interaction of the warm Gulf Stream currents with the much colder Labrador Current.\nWith an average of nearly 180 frost-free days, the coasts may have up to 1,750 growing degree days, whereas the inland areas of New Brunswick have an average annual growing season of 1,500 growing degree days, and just 80 frost-free days. Protected areas This ecozone contains a number of protected areas, including national and", "-27.328356526857533" ], [ "average of 8.8 days each winter from December to February at Midway.\nBased on 30-year averages obtained from NOAA's National Climatic Data Center for the months of December, January and February, Weather Channel ranked Chicago the sixth-coldest major U.S. city as of 2014.\nAlthough it is extremely rare, temperatures during late winter (generally March 1–20) can reach up to and well over 80 °F (27 °C). In 2012, there were eight days in the month of March with temperatures 80 °F (27 °C)+ (with a ninth day occurring in many suburban areas) during the record-breaking March 2012 North American heat wave. The last couple of 80 °F", "-27.32270940678427" ], [ "in their respective hemispheres at around 60° latitude. The polar night jet moves at a greater height (about 24,000 metres (80,000 ft)) than it does during the summer. During these dark months the air high over the poles becomes much colder than the air over the Equator. This difference in temperature gives rise to extreme air pressure differences in the stratosphere, which, when combined with the Coriolis effect, create the polar night jets, that race eastward at an altitude of about 48 kilometres (30 mi). The polar vortex is circled by the polar night jet. The warmer air can only move", "-27.30891402385896" ], [ "at night and January is the coldest time of the year. The two dominant influences on the climate of Lealholm are the shelter against the worst of the moist westerly winds provided by the higher ground and the proximity of the North Sea. Late, chilly springs and cool summers are a feature of the area but there are often spells of fine autumn weather. Onshore winds in spring and early summer bring mists or low stratus clouds (known locally as sea frets) to the area. Within the area variations in climate are brought about by local differences in altitude, aspect", "-27.308215964585543" ], [ "buzzards. The more frequent fish is trout. Climate The climate is temperate with quite marked features of continental climate. Being protected from the south by the south and south-west winds by the chain of the Apennines, the winters have moderate snowfalls: Ovada receives more snowfall than other Italian towns located at the same altitude since the territory of the low Alessandrino and generally in Lower Piedmont, is often home to major inversions that warm southerly winds fail to unseat. Also for this reason, morning temperatures in winter easily drop below 0 °C. The close proximity to the Ligurian Sea (less", "-27.279806685737185" ], [ "whose formation will accelerate with the increase of temperature.\nSome cities exhibit a heat island effect, largest at night. Seasonally, UHI shows up both in summer and winter. The typical temperature difference is several degrees between the center of the city and surrounding fields. The difference in temperature between an inner city and its surrounding suburbs is frequently mentioned in weather reports, as in \"68 °F (20 °C) downtown, 64 °F (18 °C) in the suburbs\". \"The annual mean air temperature of a city with 1 million people or more can be 1.8–5.4 °F (1.0–3.0 °C) warmer than its surroundings. In the evening, the difference can be", "-27.25811311954658" ], [ "it) as a result of unusual contrast between cold air in Canada and mild winter temperatures in the United States. This produced significant wind where the air masses met, leading to bitter wind chills and worsening the impacts of the record cold temperatures. United States On January 5, 2014, Green Bay, Wisconsin was −18 °F (−28 °C). The previous record low for this day was set in 1979.\nOn January 6, 2014, Babbitt, Minnesota was the coldest place in the country at −37 °F (−38 °C). The cold air reached as far as Dallas, which experienced a low temperature of 16 °F (−9 °C).\nOn January 7,", "-27.25021158286836" ], [ "days with snowfall above 0.2 cm is only at 8.7 days. Vancouver's coastal climate has nonetheless allowed it to be ranked in 59th place under the category of \"Most huge snowfall days (25 cm or more)\", placing it above cities like Calgary and Toronto as Vancouver averages 0.13 days annually with snowfall accumulations above 25 cm (within a calendar day).\nSnow in Vancouver tends to be quite wet, which, combined with typical winter temperatures rising above and falling below 0 °C (32 °F) throughout the course of the day, can make for icy road conditions.\nYears or months with snowfall surpassing 100 cm (39 in) are not completely", "-27.234584438745514" ], [ "Climate of Karachi January The month of January is the coolest month of the year in the city, with mostly clear skies and a constant N, NE breeze blowing. The influx of very cold and very dry Siberian winds (called \"Quetta Waves\" in common parlance), bring brief and cold spells to the region, dropping the night temperatures to below 10 degrees Celsius. Western Disturbances from the Persian Gulf and Iran affect the city during this time, bringing with them light rainfall. The highest rainfall during this month was 89.3 millimetres (3.52 in), which was recorded in 1995. The highest temperature of", "-27.234431175515056" ], [ "inversion smog. At such times, it is possible for it to be cold at street level and much warmer at the tops of the skyscrapers and in higher terrain. In 1983, on the 45th floor [about 145 m (460 ft) above the street] of the Petro-Canada Center, carpenters worked shirtless in +12 °C, windy conditions (temperature reported to them by overhead crane operator), but were chagrined to find out the street temperature was still −20 °C as they left work at 3:30 that afternoon. Records Loma, Montana, boasts having the most extreme recorded temperature change in a 24-hour period. On 15 January 1972, the temperature", "-27.228102275170386" ], [ "bring a bulk of the wintry precipitation to the region during the cold season as they track parallel to the coastline, forming along the natural temperature gradient of the Gulf stream before moving up the coastline. The Appalachian Mountains largely shield New York City and Philadelphia from picking up any lake-effect snow, though ocean-effect snows are possible near Cape Cod. The Finger Lakes of New York are long enough for lake-effect precipitation. Lake-effect snow from the Finger Lakes occurs in upstate New York until those lakes freeze over. Bay-effect snows fall downwind of Delaware Bay,", "-27.204954569111578" ], [ "2,360 millimetres (93 in) in the north. The rainfall pattern in the province has a bimodal distribution with two peaks occurring in Spring and Autumn with winters being the driest. The exceptions are the north and higher altitude areas where precipitation is well distributed throughout the year. Snowfall has occurred at the higher hills. For example, during the winter of 1975, snowfall was observed and accumulated in Bernando de Irigoyen, one of the coldest towns in the province due to its high altitude 815 m (2,674 ft). Owing to the humid climate and high rainfall, relative humidity is high.\nThe vegetation is the so-called", "-27.20429737408415" ], [ "nights are calm with cool to cold temperatures. February February experiences similar weather to January except that usually it is a few degrees warmer. Most nights are cool and days are warm with an average low and high of 5.4 °C (41.7 °F) and 19.2 °C (66.6 °F), respectively. Overcast for several days is not uncommon during this month with the least amount of sunshine experienced during this month. A record high of 30.0 °C (86.0 °F) recorded on 28 February 1985, while the coldest −2.0 °C (28.4 °F) on 8 February 1978 have been recorded. Average rainfall is relatively greater than January totaling to 84.1 millimetres (3.31 in).", "-27.187986651901156" ], [ "more sultry and tropical summers with frequent bouts of hot temperatures and high dew points. The remainder of New York State enjoys modestly warm summers. Summer temperatures usually range from the upper 70s to mid 80s °F (25 to 30 °C), over much of the state. The record high for New York state is 108 °F (42 °C), set at Troy on July 22, 1926. Winter Winters are often cold and snowy above the New York City Long Island and the Hudson Valley areas of New York. In the majority of winter seasons, a temperature of −13 °F (−25 °C) or lower can be", "-27.185127222332085" ], [ "the earliest resorts in New York to open, and had more trails and a greater percentage open than any resort outside the Adirondacks in mid January; by the end of the month they approached 100% open. As of early February, the winter was one of the mildest ever seen in the Rochester area as far as temperature and snowfall, and nearly all snow and ice-based winter activities were inhibited, with alpine skiing relying heavily on available artificial snowmaking capabilities. By mid February, a total of only about 30 inches of natural snow had fallen in the region, though with the", "-27.170252669038746" ], [ "not as volatile as in the winter, daily high and low temperatures rarely vary more than 15 degrees (7 °C) either side of normal. While summertime around much of the country means long stretches of hot and humid weather, Minnesota is located far enough north where periods of cooler, drier polar air frequently move in behind polar fronts dropping south from Canada. The polar air typically does not linger very long however and is quickly replaced by the warmer and more humid air from the Gulf of Mexico again. The cool, dry polar air colliding with hot and humid summertime", "-27.129317949875258" ], [ "the borough are 680 mm (26.8 in) and on the hills about 800 mm (31.5 in).\nAir temperatures average 8.9 °C (48.0 °F), the warmest month is July with 16.9 °C (62.4 °F), the coldest is January at 0.8 °C (33.4 °F). In the hills it is around 0.5 °C (0.9 °F) to 1.0 °C (1.8 °F) colder per 100 metres (328 feet) of height. For an average of 37 days (during the months of November to March) the average daytime temperatures remain below 0 °C (32 °F). The number of hours of sunshine is 1,435 hours per year, with a monthly variation from 200 hours in June to 32 hours in December. History The settlement of", "-27.12047674524365" ], [ "climate, with harsh winters and warm summers. The warmest month of the year is July, with an average temperature of 25°C (77°F). The coldest month of the year is January, when temperatures average -5°C (23 °F).\nAnnual precipitation for Srbac is about 875 mm. Due to the city's high latitude; it snows in Srbac almost every year as well. Strong winds come from the north and northeast bringing in lots of snow. History Archaeological evidence points to an Iron Age settlement existing in the region (Cagan grad). Before the collapse of the Western Roman Empire a town was mentioned in this area.", "-27.09850385945174" ], [ "of the province is temperate at low elevations, and very cold in the higher Andean peaks. Temperature The mean annual temperatures in the province are relatively cold for its latitude owing to the marine currents to the east and higher altitude to the west. Mean annual temperatures in the province can vary, depending on altitude and distance from the sea. The northern parts of the province are the warmest, with a mean annual temperature of more than 15 °C (59.0 °F) while the coldest areas are found in the Cordillera where the mean annual temperatures are less than 10 °C (50.0 °F). At the", "-27.077818055229727" ], [ "at a frigid -5 °C (23 °F) on the 28th as the arctic ridge began to stabilize over the south coast. Drier air began to influence the coast with sunny breaks and isolated flurries beginning on the evening of the 27th and ending on the morning of the 29th. On the 30th, about 25 cm (8-10 inches) of snow was recorded to be on the ground at Vancouver International Airport. In some areas of the lower mainlands hills/higher elevations such as West Vancouver, North Vancouver, Coquitlam, Burnaby Mountain and Maple Ridge the snow started earlier (some snow recorded as early as the 24th) and", "-27.060068282065913" ], [ "under wind warnings. Europe also saw the 2013-2014 Atlantic winter storms in Europe which has been linked to the cold winter in North America. United States On January 3, Boston had a temperature of 2 °F (−17 °C) with a −20 °F (−29 °C) wind chill, and over 7 inches (180 mm) of snow. Boxford, Massachusetts recorded 23.8 inches (600 mm). Fort Wayne, Indiana had a record low of −10 °F (−23 °C). In Michigan, over 11 inches (280 mm) of snow fell outside Detroit and temperatures around the state were near or below 0 °F (−18 °C). New Jersey had over 10 inches (250 mm) of snow, and schools and government", "-27.050133199736592" ], [ "The day highs average 29 to 30 °C. The nights hover around 18 °C. By the second fortnight the humidity starts to increase and the day temperature might rise up to 32 °C. Smog increases. 6 February 2008 recorded a minimum temperature of 9.4 °C. Just two days later, on 8 February, the minimum temperature recorded was 8.5 °C, which was the lowest temperature Mumbai has seen since January 1962. This was the coldest day in February ever. March The month of March sees a mean minimum temp of 20.6 °C and mean maximum temp of 32.7 °C. The beginning of March sees night temperatures reach 15 °C.", "-27.02569044561824" ], [ "is 76 degrees, although in the summer, temperatures sometimes exceed 90 degrees. Most of the area is frost-free; during the coldest periods the average nighttime temperature is about 42 degrees. Due to its proximity to the ocean, days often start with early morning fog; afternoons can be breezy.\nAnnual rainfall is roughly 10 inches (25 cm) and comes mostly between November and April. Rainfall is higher in the surrounding hills, up to 20 inches (51 cm). The area is ideal for avocados, strawberries, tomatoes and many other sub-tropical fruits, vegetables, and flowers.\nNative evergreen oak trees are common in the Fallbrook area, and in", "-27.025454479196924" ], [ "rare occasions snowfall has exceeded a foot in depth. The National Weather Service does not maintain a station in the area (there are cooperative stations in Ben Lomond, California and Woodside, California), but normal annual rainfall has been estimated to exceed 50 inches (1,300 mm). Heavy fog is very common in the area, especially in the summer months, and usually clears back to the coast from the late morning to early evening. Normal temperatures in January range from the lower fifties to upper thirties, and in July from upper seventies to lower fifties. Kings Mountain Art Fair An", "-27.023871816520113" ], [ "fog is frequent and daytime temperatures average in the low 70's to low 50's at night. Wintertime, temperatures easily dip into double digits below zero. Add to that, a wind chill factor caused by the prevailing wintertime north westerlies which have been measured from atop the firetower at hurricane-force winds. Ice storms can occur as early as late November which can make traveling to the top of the mountain a challenge. Average rainfall on the mountaintop is 58 inches and normal snowfall is 20 to 25 inches annually. Springtime arrives late as flower buds and leaves aren't in full bloom until after", "-27.009368910978083" ], [ "the months of winter insolation is strong and the high temperature range with high temperatures during the day, which descend well below the average for night, as well as between the lit and shadow areas, due to low humidity. Infrastructure and Services It has electric lighting, water and sewer service. In telecommunications and Internet service coverage through the operator Claro and Movistar recently. Roads and Transportation It comes through the route through the Panamericana north from Lima to Paramonga, then a turn northeast to Chaskitampu, Cajacay, Qunuqucha and Wallanka, at night, the road is paved only until Wallanka, from there", "-27.003675262152683" ], [ "the moderating influence of Lake Superior, whilst winters are cold and snowy, albeit milder than areas on similar parallels to the west, due to the low-scale maritime moderation. Although winter temperatures are similar to those in nearest large metropolitan city Minneapolis a couple of degrees latitude south-west, the main difference being that April is also a winter month in Copper Harbor, since the marine effects delay spring. The temperature lag effect is so great that March holds the town's record low, and April's record low temperatures are not much warmer than those of December.", "-27.003128991869744" ], [ "is strongly influenced by the cold Hudson Bay low-pressured and polar high-pressure air masses. The climate depends largely on the water surface during certain parts of the year. In the winter months the bay is covered almost entirely by pack ice and this keeps the air chilled and thus temperatures stay consistently low. Cold, dry arctic air typically lingers over the area throughout winter. Gusts can sometimes become violent, reaching speeds of up to 130 km/h. The ice begins melting in May and is almost completely gone by the beginning of June. This brings in the rainy season with an abundance", "-26.981354086252395" ], [ "\nThe high humidity and high temperatures led to major heat wave that overtook the major Northeast Megalopolis. Temperatures in Central Park, New York City reached a peak of 103 °F (39 °C). The temperature reached 105 °F (41 °C) in Newark, New Jersey.\nMeanwhile, in Ontario and Quebec, extreme temperatures were also reported daily during the first week of August. Ottawa recorded its second-hottest day ever when the mercury approached 37 °C (99 °F) on August 9 and at the Toronto Airport it hit 38 °C (100 °F) on the same day, the hottest day there since 1955 with four straight days topping 35 °C (95 °F). Numerous records were shattered", "-26.98123988189036" ], [ "of the cold fronts, which usually move in a west to east direction are moderated as they pass over the Pacific Ocean. As such, cold temperatures are not as extreme as they are in the northern hemisphere. Similar to the rest of Patagonia the climate is characterized by strong winds throughout the year, which also leads to higher evapotranspiration, another factor in the province being mostly dry. Temperature The western parts of the province are the coldest with an annual mean temperature of 8 °C (46.4 °F) owing to the higher elevations while the coastal areas are the warmest with an annual", "-26.972655645709892" ], [ "can continue to affect the city during this month, often causing overcast skies and light to moderate rainfall. The intensity of rainfall in February is relatively higher compared to the preceding month. The average high for the month is a pleasant 27.7 °C whereas the lows hover around 15 °C. March Weather turns quite warm with the start of March, with increasing humidity and intensity of sunshine. Highest temperature was recorded at 42'C in 2004 and then again in 2010. March is considered spring time in the city, when the skies are usually clear blue and W/SW breeze dominates, making the outdoors", "-26.938298229768407" ], [ "have far more growing degree days due to their much warmer summers). The semi-mild climate sustains plants such as the Windmill Palm. Vancouver's growing season averages 221 days, from March 29 until November 5. This is 72 days longer than Toronto's, and longer than any other major urban centre in Canada.\nDespite normally semi-mild winters due to the onshore air flow over the North Pacific Current, occasional cold arctic outflows (sinking cold continental air that flows down through the Fraser Valley coastward) in winter can sometimes last a week or more. These arctic outflows occur on average one to three times", "-26.918738658860093" ], [ "zero in winter and can reach -20°C or -30°C. High winds and storms are common, and therefor wind-chill has to be taken into account as the wind can have a substantial effect on outdoor comfort, even when the ambient temperature is relatively high.\nFurther north beyond the ice cap, annual precipitation decreases. North-east of the ice cap it drops to between 350 and 450 mm per year, the lowest in Iceland. Precipitation increases closer to the north coast and in parts of the highlands such as at Askja. Temperatures can fall quite low in clear and calm weather during winter.\nSoutherly winds generally", "-26.901499339299335" ], [ "Wolds to the east and the Pennines to the west. The low-lying ridge of the Escrick moraine marks its southern boundary. York lies in the middle of the area. Climate As part of Great Britain, the Vale of York generally has cool summers and relatively mild winters. Weather conditions vary from day to day as well as from season to season. The latitude of the area means that it is influenced by predominantly westerly winds with depressions and their associated fronts, bringing with them unsettled and windy weather, particularly in winter. Between depressions there are often small mobile anticyclones that", "-26.86904558876995" ], [ "severe cold like that found in the interior northern U.S. (i.e. Minnesota/North Dakota). At lower elevations, winter precipitation falls mostly as rain. However, snow does occur even at the lowest elevations, primarily when Pacific moisture interacts with cold air intruding into the Pacific Northwest from western Canada (i.e. Alberta and interior British Columbia). In Seattle, WA and Portland, OR, winter-season snowfall varies greatly; in Seattle, the average winter-season snowfall is about 7 inches. In January 1950 (the coldest month in Pacific Northwest history), Seattle received an all-time record 57 inches of snow; that same month, Portland received 41 inches. Summers", "-26.85725244076457" ], [ "temperature of 80.8 degrees Fahrenheit and an average nighttime of 55 degrees Fahrenheit, while the coldest month of the year is December with an average daytime temperature of 57 degrees Fahrenheit and an average nighttime temperature of 38.6 degrees Fahrenheit. Items of interest Foster City's Werder Pier is a remainder of the original expanse of the San Mateo–Hayward Bridge. It is also one of the state's longest and oldest piers in existence. Unfortunately, due to much needed repair, the once popular fishing pier is no longer in operation.\nA number of San Francisco professional athletes have called Foster City home. Former", "-26.854619517631363" ], [ "combines with the moderating effects of the Baltic Sea and numerous inland lakes to explain the unusually warm climate compared with other regions that share the same latitude, such as Alaska, Siberia, and southern Greenland.\nWinters in southern Finland (when mean daily temperature remains below 0 °C or 32 °F) are usually about 100 days long, and in the inland the snow typically covers the land from about late November to April, and on the coastal areas such as Helsinki, snow often covers the land from late December to late March. Even in the south, the harshest winter nights can see the temperatures", "-26.85150324848655" ], [ "was 46.4 °C (115.5 °F), on 7 February 2009. Winter Winters in Melbourne are cool with moderate rainfall. The lowest temperature on record is −2.8 °C (27.0 °F), on 21 July 1869. Snowfall is very rare: the most recent occurrence of snow in the Central Business District was on 25 June 1986 and the most recent snowfalls in the outer eastern suburbs and Mount Dandenong were on 11 August 2019. More commonly, Melbourne experiences frosts and fog in winter.", "-26.851351972291013" ], [ "mild throughout the year, much like the majority of the New South Wales coast. Day temperatures average between 24 °C and 29 °C in the summer months, and rarely go above 33 °C. Average day temperatures during winter months are between 6 °C and 12 °C, and rarely dip below 2 °C. Night temperatures tend to be much cooler, dropping off anywhere from 10 to 20 degrees after the sun goes down.\nHelensburgh often seems like it has its very own climate compared to neighbouring locations, with visitors to the area often commenting that Helensburgh seems to be a couple of degrees colder than Sydney or", "-26.837391444540117" ], [ "variations that can be over 25 °C and differences of up to 14 °C between the average summer and winter high temperatures. Temperatures also drop about 0.7 °C or 1.3 °F for every 100 m of altitude.\nNorthern cities such as Auckland, Whangarei, and Tauranga experience mean yearly maxima of between 19–20 °C (66–68 °F) and mean yearly minima of around 11–12 °C (52–54 °F). Eastern cities on the North Island such as Gisborne, Napier, and Hastings also have mean yearly maxima of between 19–20 °C (66–68 °F) but have slightly lower yearly mean minima of around 9–10 °C (48–50 °F). The two largest cities on the South Island, Christchurch and Dunedin, have", "-26.82833993015811" ] ]
412zym
Why do Aboriginal Australians have it worse of than other natives people in developed countries?
[ "I don't know much about the situation in other countries, but I know a reasonable amount about the situation here, although I am a white Australian so I won't pretend to understand the full situation. The biggest problem is that indigenous Australians aren't one people, there's something like 300 separate nations. While they obviously share common ground, each group has different wants and needs so rather than trying to solve one problem you're trying to solve hundreds. There are various indigenous spokespeople, but some people don't like them either because they're from a different tribe or because they feel they've been whitewashed. All in all, even just organising a proper meeting to discuss the injustice indigenous Australians face (with all stakeholders involved) is a hard task, let alone actually solving the problems. In terms of actually solving the problems, a lot of indigenous people distrust whitefella institutions like hospitals and the like. Up until 1970 the government stole indigenous people from their families to be raised by white families, foster homes and the church. Since it's so recent, a decent proportion of the current indigenous population were involved in that and understandably don't want that to happen to their kids/grandkids. On a similar note, a big problem in indigenous communities is child abuse, which is normally solved by removing the child from their abusers. Obviously after the horrors of the stolen generation this is avoided wherever possible, which means the abuse continues and can propogate through generations. Another big thing is that Australia is so barren that some indigenous communities are so remote that it's hard to provide support, even where it's wanted. That said, a lot (but not all) of the more remote communities are happy living the way they do and we generally let them just do their thing. Death in custody is a big issue too. Obviously there's cases of police brutality and the like, but there's also a high suicide rate too. Indigenous Australians have a VERY strong connection to the land and their extended family and depriving them of that by incarcerating them causes extreme mental anguish, often driving them to end their lives. Those are just a few of the things that I could come up with off the top of my head. I don't pretend to fully understand the problem, but it's 2.30am in Australia. Hopefully someone who knows a bit more will reply in the morning.", "Canadian here. Indigenous people in Canada are in the same boat. Some tribes opened casinos but other tribes in remote areas have it rough. We make the same claims here too. The new PM is working to make some headway...", "I was going to type a really long reply to this...covering a lot of the historical abuses suffered by the Aboriginal people of Australia but I honestly think it's because those in charge don't give a shit. I live in Australia but I'm English so have a different perspective on things compared to my Aussie husband and friends. They say they're against the abuse of Aboriginal people but they really just turn a blind eye. In the remote communities where some Aboriginal people live, there are little to no provisions for them such as medical help and education is poor. Aussies usually come up with an explanation such as \"Well they don't want to be helped\" or \"They don't mind living like that...\" When in fact, all it is is that they don't have access to the same shit that my children do....we live in a white, middle class community...the schools are good, there are plenty of hospitals and doctors. They also seem to segregate here...I've seen medical centres specifically for Aboriginal people...in CENTRAL ADELAIDE which is a metropolitan city! The locals say \"Well they have different needs...so they need their own place...\" as though there are no alcoholic white people here! Yes, alcohol abuse is rife in Indigenous communities but that's because there is generations of abuse to get over...and that doesn't just happen over night. As I say, I am white, English and living in a middle class suburb and I never see any Aboriginal people here. They all live in the \"poor area\" Why? Because their education is neglected EDIT. I've just looked it up...why Aboriginals need a separate health centre and I feel very ignorant. It's because many Aboriginal people have such bad memories and fear of institutions due to their being stolen from their parents and made to live in orphanages and abused, that there had to be special environments set up where Aboriginal people could feel comfortable and happy to visit. :( The abuse is very recent...in the 1970s children were still being stolen and abused by the authorities.", "Australian here, my Mother was Stolen Generation. She was taken from her family at 5, put into abusive orphanages and foster homes, denied access to her biological family for decades and treated as an outcast by many. Nobody ever truly apologized for what happened to her, her story is not unique. Indigenous Australians are the oldest surviving culture on earth, descending from those who left Africa 75,000 years ago, when they arrived Australia was lush and full of mega fauna. Over thousands of years they changed the landscape, created hundreds of languages and over 250 separate nations. The vast majority of Aborigines died as a result of white settlement due to disease, of those remaining many were massacred, put into slavery, bred out or hired to hunt other indigenous people as trackers. Indigenous Australians today face issues arising from the denial of education, the mental health issues and substance abuse that stem from those traumatic circumstances and the racism that paints such a horribly inaccurate depiction of many Indigenous Australians. The statistics for incarceration, substance abuse and violence in the indigenous population are shameful. Other countries have schemes in place to create awareness and fix the issues that were created in less accepting times. Australia has put little effort or funding into the areas it should, education and rehabilitation. In recent years they have done the opposite, they threatened to throw many communities off their land, cut funding to many schemes to help young indigenous to create a better life for themselves and closed others schemes that were beneficial but not important enough to keep according the Abbott government. I really love my country, but I hate how little they have done to right these wrongs, they seem to put more effort into sweeping these issues under the rug than actually creating solutions to bring back quality of life for the founders of this land.", "Government assistance to the indigenous of Australia is often literally enough have for them to not work and still have enough to eat, a house to live in, tobacco to smoke and beer to drink on the weekends (restrictions apply). It's harsh to say but in small towns that's all many of them do. Alcohol and drug abuse rates are high, and work rates are low. Children are often taught to do the same. I'm mainly talking about the town-camp style areas, and have only the NT as my reference. I do realize that the indigenous are normal people and am not saying anything about race, merely groups and culture.", "Fundamentally I'd argue it is because the technological gap between them and their colonizer was the widest of any of those relationships. In, say, the American colonies the English settlers had to at least pretend to deal with the American tribes as something like equals. The level of English technology, on the other hand, was vastly higher in 1787 (First Fleet lands in Australia) while the level of technological sophistication (and social sophistication for that matter) among the Australian aborigines was much lower than North American Indians. It would have been impossible, for example, for the American colonists to have treated North America as terra nullius as happened in Australia. Edit: and just to add a bit, this was true even within Australia. The Tasmanian aborigine population, for example, was the least technologically advanced of all the native populations in Australia (they had lost the ability to make stone tools, for example) and were completely wiped out.", "It's a tough problem, and \"why\" can't simply be answered. If you had to look at broad reasons, I'd suggest the following. I now believe (I used not to) that the way to begin to address this is a formal treaty with the Aboriginal and Torrest Strait Islander people. Not all Australians would agree with me. But a successful [referendum]( URL_0 ) on constitutional recognition of the original inhabitants will be a fine start, and one I think will be successful. * Erosion of cultural identity through loss of land (either it being appropriated or the people forcefully moved) * Linked to this is loss of spiritual identity, closely related to place * Forced removal leading to a loss of practical parenting skills as well as the loss of opportuntity to practice traditional parenting * Clear past and present discrimination, leading to social and economic marginalisation * Grief and anger at these lead to mental issues, alcohol abuse, violence which is handed down across the generations. Patterns of behaviour establish themselves. * Sexual and physical violence (including genocide) perpetrated by whites to which aboriginals were powerless to respond * All leading to trouble with the law, continued disadvantage * A basic misunderstanding (or refusal to understand) Aboriginal culture in the past leading to destructive policies that may well have been well intentioned.", "I think at the moment the problem comes from both sides. Up to the '70s the Australian government treated the aboriginals abhorrent. That has changed now. Huge amounts of money are poured into the aboriginal communities. Some laws, to right the wrongs of the past are even completely over the top. However, all this hasn't worked very well yet. There are quite a few individuals that have done great, but not the majority. Partly because aboriginals don't trust the white people anymore. Partly because they are indifferent and as long as they get handouts they don't give a f. There are a few aboriginals on r/Australia and they seem to know that in order to move forwards, both parties have to pick up their game. The government has to work smarter, not just throw more money at it, and the aboriginal community has to realise that they are not just victims of the past anymore but have to work towards a better future.", "I live in the suburbs about an hour South of Perth, Western Australia, unfortunately some of the seamingly racist comments are very accurate for about 80-90% of the Aboriginal population around here. Don't get the wrong idea, I have met a very nice Chirstian Aboriginal family, but they are very much in the minority around here. Hell, there's actually an Aboriginal \"mafia\" who tried to break into my friends house with axes. This kind of reputation can make it very difficult for people to trust Aborigines, whether that particular person is a criminal or the nicest person in the world.", "One of my best friend, until recently, used to work very closely with Aboriginal communities. He's a Redditor so would be more than happy to do an AMA I'm sure. He's got some... interesting stories.", "No idea about australia, but the natives (indios) of central america got it pretty rough as well", "there's several things and it goes both ways. One is the Indigenous communities lack of education. The Australian Government WANTS indigenous Australians to go to University, get well paying jobs, good educations and improve their conditions but many Indigenous people don't take these offers, instead preferring to live off Centrelink. Secondly, welfare is an issue. The government provides more generous welfare towards Indigenous communities which is fine, many communities are in the middle of the barren Outback and require additional assistance but there are also a significant number of Indigenous Australians who take advantage of welfare which can be seen in some of the poorer suburbs of the main cities (Melbourne, Sydney etc.) where I can see this myself, many Aboriginal people abuse substances and just bum around not doing much. Third, there was an insane amount of mistreatment given to Indigenous Australians behest of the Australian Government many decades ago (Aboriginal Australians were considered \"native fauna\" until the 1960s) which adds to tension between the Government and the Indigenous communities and also kind of puts many Indigenous Australians in a repeating circle of low-income, laziness, vagrancy etc. Fourthly, Indigenous Australians do receive a lot of shit from almost everyone here (although I notice it more in non-Anglo Australians) that they're shit-kicker junkies who drink goon (cheap bagged alcohol), smash darts (smoke cigarettes), hit the sniff (sniff petrol) and steal your shit. The problem is, this isn't actually a stereotype, a lot of Indigenous Australians (\"Abos\" or \"coons\" from the racist fuckwits) live like this which leads to high suicide rates and lots of substance abuse. This all falls into that whole repeating circle of Indigenous life that I mentioned. In America, you really wont hear white people, Hispanic people or anything refer to African Americans as \"Niggers\" to their face, nor will you hear it out loud, Indigenous Australians can and almost always do get insulted non-stop just for walking past someone, it's actually fucking insane how much shit they get. People will move away from an Indigenous person and if they try to talk to someone, they'll get called a dirty abbo and told to fuck off. Really, there's motivation behest of the Government to get the Indigenous communities off the ground and get Indigenous Australians into well paying jobs and a successful life but they staunchly refuse to help themselves and they also get an un-godly amount of shit from almost everyone. They pretty much get decent money from the government and don't have to do shit for it, it's not too hard for them to get so they usually just end up going to that. I'm afraid I might come off as a racist or someone who hates Indigenous people but that's not the case, I grew up with a lot of Indigenous people and I used to have a family sleep in my father's truck because the father of their family would kick them out of the house. He eventually sold their mattresses for drug money then they moved in with us, that's the kind of life many Indigenous children go through (in regards to substance abuse) and am actually half Aboriginal myself (one of my parents were Stolen Generation)." ]
[ [ "Indigenous health in Australia Indigenous Australian health and wellbeing statistics indicate Aboriginal Australians are much less healthy than the rest of the Australian community. In 1989, the National Aboriginal Health Strategy was created. In 2010–11 the most common cause of hospital admissions for Indigenous Australians in mainland Australia was for kidney dialysis treatment. A 2007 study found that the 11 largest preventable contributions to the indigenous burden of disease in Australia were from tobacco, alcohol, illicit drugs, high body mass, inadequate physical activity, low intake of fruit and vegetables, high blood pressure, high cholesterol, unsafe sex, child sexual abuse", "-30.7669655890204" ], [ "without a national bill of rights of some kind. Racism in Australia traces both historical and contemporary racist community attitudes, as well as political non-compliance and alleged governmental negligence on United Nations human rights standard and incidents in Australia.\nAn ongoing human rights issue in Australia is the legacy of mistreatment of indigenous Australians, who are disproportionately of disadvantaged socioeconomic standing, have shorter life spans, and make up a disproportionately high number of imprisoned persons, thus receiving disproportionately high levels of social welfare payment as well as preferential employment and tertiary educational placement in state sectors. In 2016–17, the estimated", "-30.436340618340182" ], [ " Today, all Aboriginal cultures have been impacted by degrees of marginalisation and exclusion from participation in the dominant culture of Australia. Given this declaration, Elkin states that this represents an adaption of \"intelligent parasitism\" of white culture. This has resulted in higher than average rates of infant mortality, and lower rates of life expectancy, education and employment.", "-30.36784723366145" ], [ "Australia was in danger of being \"swamped by Asians\", and that these immigrants \"have their own culture and religion, form ghettos and do not assimilate\". Hanson argued that \"mainstream Australians\" were instead subject to \"a type of reverse racism ... by those who promote political correctness and those who control the various taxpayer funded 'industries' that flourish in our society servicing Aboriginals, multiculturalists and a host of other minority groups\". This theme continued with the assertion that \"present governments are encouraging separatism in Australia by providing opportunities, land, moneys and facilities available only to Aboriginals\". Among a series of criticisms", "-30.294950380222872" ], [ "right to vote. Indigenous Australians were not allowed social security benefits e.g. Aged pensions and maternity allowances. However, these benefits were provided to other non-Indigenous Australians by the Commonwealth Government. Aboriginals in rural areas were discriminated and controlled as to where and how they could marry, work, live, and their movements were restricted. Language Dehumanization and dehumanized perception can occur as a result of language used to describe groups of people. Words such as migrant, immigrant, and expatriate are assigned to foreigners based on their social status and wealth, rather than ability, achievements, and political alignment. Expatriate has been found", "-29.843174464898766" ], [ "custody.\nWhile there has been significant progress in redressing discriminatory laws, Indigenous Australians continue to be at a disadvantage compared to their non-indigenous counterparts, on key measures such as: life expectancy; infant mortality; \nhealth;\nand levels of education and employment.", "-29.701147315830895" ], [ "compared to the general Australian population. Poverty and employment discrimination The impact of discrimination and stigma can be seen in high rates of poverty. A 2015 Australian survey of people born with atypical sex characteristics found high levels of poverty, in addition to very high levels of early school leaving, and higher than average rates of disability. 6% of the 272 survey participants reported being homeless or couch surfing.\nOII Europe states that \"stigma, structural and verbal discrimination, harassment\" as well as harmful practices and lack of legal recognition can lead to \"inadequate education, broken careers and poverty (including homelessness) due", "-29.693326014792547" ], [ "perceptions of racism caused poor psychosocial functioning. The researchers suggested that factors such as racism, discrimination and alienation contributed to physiological health risks in ethnic minority families. The study also mentioned the effect of poverty on Aboriginal populations: higher morbidity and mortality rates.\nAboriginal Australians suffer from high rates of heart disease. Cardiovascular diseases are the leading cause of death worldwide and among Aboriginal Australians. Aboriginal people develop atrial fibrillation, a condition that sharply increases the risk of stroke, much earlier than non-Aboriginal Australians on average. The life expectancy for Aboriginal Australians is 10 years lower than non-Aboriginal Australians. Technologies such", "-29.39793347005616" ], [ "Indigenous communities than non-Indigenous ones in Australia.\nA submission by Mick Gooda to a 2016 government report emphasised that the rates of crime and incarceration of Indigenous people could not be viewed separately from history or the current social context. He referred to referred to Don Weatherburn's work, which showed four key risk factors for involvement in the criminal justice system: poor parenting (particularly child neglect and abuse); poor school performance and/or early school leaving; unemployment; and drug and alcohol abuse. Indigenous Australians fare much worse than non-Indigenous citizens in relation to these four factors, and mental illness, including foetal alcohol", "-29.31892948044697" ], [ "communities already weakened by disease. Additionally, Aboriginal Australians groups had a deep spiritual and cultural connection to the land, so that in being forced to move away from traditional areas, cultural and spiritual practices necessary to the cohesion and well-being of the group could not be maintained. Proximity to settlers also brought venereal disease, to which Aboriginal Australians had no tolerance and which greatly reduced Aboriginal fertility and birthrates. Settlers also brought alcohol, opium and tobacco, and substance abuse has remained a chronic problem for Aboriginal communities ever since. Entire communities in the moderately fertile southern part of the", "-29.30768201009778" ], [ "Couldn't Be Fairer Synopsis Couldn't Be Fairer reveals how Australia's first people are still suffering from social oppression, with many living on reservations where alcoholism is rampant and unemployment the major occupation. Aboriginal land rights are a central theme: Miller clearly demonstrates the contrast between the attitudes of European Australians, who see the land only as a resource to be mined, farmed, grazed and built upon, and Aboriginal Australians, who regard the land as sacred. Archival footage compares the original lifestyle of Aboriginal Australians to their current pitiful condition, and shows how European settlers attempted to \"civilize\" mixed blood children", "-29.028074669236958" ], [ "very pressing and numerous issues against them. There are still very much negative stereotypes associated with Indigenous communities such as being freeloaders, drug addicts or dumb. Aboriginal people are more likely to feel depression due to several factors such as: poverty, loss of cultural identity, inadequate health care and more. The aboriginal people are also continually colonized by the Canadian government due to the takeover of Indigenous lands for oil projects which have not been agreed upon and are still ongoing. Slavery of Aboriginals and Black Canadians There are records of slavery in Canada from the 17th century. The majority", "-28.91898952293559" ], [ "less likely to have completed a secondary education, three times as likely to have acquired a police record, and were twice as likely to use illicit drugs as were Aboriginal people who grew up in their ethnic community. The only notable advantage \"removed\" Aboriginal people achieved was a higher average income. The report noted this was likely due to the increased urbanisation of removed individuals, and greater access to welfare payments than for Aboriginal people living in remote communities. There seemed to be little evidence that removed mixed-race Aborigines had been successful in gaining better work even in urbanised areas.\nBy", "-28.592006293387385" ], [ "Indigenous Australians and crime Indigenous Australians are both convicted of crimes and imprisoned at a disproportionately high rate in Australia. The issue is a complex one, to which federal and state governments as well as Indigenous groups have responded with various analyses and numerous programs and measures. Background Many sources report over-representation of Indigenous offenders at all stages of the criminal justice system.\nThe links between lower socioeconomic status and the associated issues that come with it (inadequate housing, low academic achievement, poor health, poor parenting, etc.) to all types of crime are well-established, if complex, and disadvantage is greater in", "-28.360502951662056" ], [ "regions, is exacerbated by factors not present in the broader Australian community...Dispossession,cultural fragmentation and marginalisation have contributed to the current crisis in which many Indigenous persons find themselves; high unemployment,poor health, low educational attainment and poverty have become endemic elements in Indigenous lives...\".\nAge-standardised figures in 2002 showed that 20 percent of Indigenous people were the victims of physical or threatened violence in the previous 12 months, while the rate for non-Indigenous people was 9 percent. In 2011–2012, the percentage of Aboriginal homicide offenders decreased to 11 percent and victims to 13 percent. Family violence The 2001 homicide study found that", "-28.347651552699972" ], [ "abuse and intimate partner violence. Up to 15% of the 10 year life expectancy gap compared to non-Indigenous Australians has been attributed to mental health disorders. Mental health should be taken into consideration in the Aboriginal concept of health and well being. The status of the mental health issue is difficult to define as there are little sources for evidence in Aboriginal health in Australia. In the incidence of children and the elderly many problems tend to be hidden. Some of the behavioural problems encountered tend to be linked to neurodevelopment delay and a failing education system. Violence and accidents", "-28.17541551258182" ], [ "ten Aboriginal prison inmates in the Northern Territory suffer from significant hearing loss. Health dynamics A number of factors help to explain why Aboriginal and Torres Strait Islander people have poorer health than other Australians. In general, Aboriginal and Torres Strait Islander people are more likely to have lower levels of education, lower health education, higher unemployment, inadequate housing and access to infrastructure than other Australians.\nIn particular, crowded housing has been identified as contributing to the spread of infectious diseases. Aboriginal and Torres Strait Islander Australians are also more likely to smoke, have poor diets and have high levels of", "-27.96029552357504" ], [ "Indigenous communities suffer particularly from poverty causing them to be marginalised from society. Although \"local and federal governments implemented social protection programs so as to alleviate poverty conditions and interregional disparities, in general, conditions for indigenous people remain unchanged,\" (Gonzales cited World Bank, 2005). Studies have shown that ethnicity is an important cause for inequality in income distribution, access to basic health care services and education, which in turn explain the significant difference in earnings between indigenous and non-indigenous people. According to the World Bank, about three-quarters of indigenous peoples in Mexico are poor and the gap between indigenous and", "-27.94199149729684" ], [ "the early Aboriginals was predominantly made up of land animals, fish and shellfish, as well as birds and plant foods. Post colonisation, the Aboriginals experienced excessive disruptions to their socioeconomic circumstances and thus, this has seen a rapid decline in their health status. Forced to assimilate into a white, European Society, Aboriginals abandoned their traditional way of living and reluctantly adopted those of the colony. Over time this has seen the introduction of sugar and refined foods into the diet of Aboriginal Australians, initially to sever existing connections to the land. Aboriginals have since viewed sugar as an important cultural", "-27.76055872521829" ], [ "Australians reported difficulty in accessing healthcare for their children, which include transportation costs and prescription costs. Displacement and disenfranchisement prevents access to healthcare resources such as screening programs, and results in delayed or inadequate treatment. An example of this can be seen in the high rates of cervical cancer, where a meta-analysis of Indigenous women from Australia, New Zealand, Canada and the United States attributed these rates to “socio-economic disenfranchisement resulting from colonialism”, rather than genetics. \nThe displacement of Indigenous Australians to reserves and the isolation from society led to generations suffering from starvation and malnutrition. This has had profound", "-27.678491081576794" ], [ "remote communities consume low levels of fruit, and high amounts of white bread. Cross-cultural miscommunication Among the factors that have been at least partially implicated in the inequality in life expectancy between Indigenous and non-Indigenous people in Australia are cultural differences resulting in poor communication between Indigenous Australians and health workers.\nAccording to Michael Walsh and Ghil'ad Zuckermann, Western conversational interaction is typically \"dyadic\", between two particular people, where eye contact is important and the speaker controls the interaction; and \"contained\" in a relatively short, defined time frame. However, traditional Aboriginal conversational interaction is \"communal\", broadcast to many people, eye contact", "-27.57259742219685" ], [ "food, bringing with it, family identities and reinforcing connections. Hence, Aboriginals have since become highly vulnerable to suffering from conditions such as diabetes. European influence The prevalence of type 2 diabetes, obesity and the corresponding diseases that are associated with this condition, are often attributed to the European influences at the time of colonisation. Sugar and refined foods were used at this time as a means of detaching Aboriginals from the land and assimilating them into white society. Consequently, Aboriginal Australians have likened certain traditions and memories to the use of sugar. Thus, the ‘westernisation’ of Aboriginal communities forced the", "-27.56455969347735" ], [ "in the aftermath of events like the September 11 attacks and Bali Bombing by radical Muslim extremists contributed to strained ethnic relations in some Australian communities. A notable outcome was the 2005 Cronulla race riot that saw thousands of Anglo-Saxon Australians target persons of Middle-Eastern appearance in south-eastern Sydney. Indigenous Australians Indigenous peoples of Australia, comprising Aboriginal and Torres Strait Islanders peoples, have lived in Australia for at least 65,000+ years before the arrival of British settlers in 1788. The colonisation of Australia and development into a modern nation, saw explicit and implicit racial discrimination against Indigenous Australians.\nCo-Indigenous Australians continue", "-27.5037689832252" ], [ "Australia and the US have lower rates of continual training than their native born peers as a whole, but are likely to continue gaining technical skills after establishing an initial technical aptitude. The appeal of new educational opportunities to migrants also loses appeal with age; older movers see less of an incentive to spend time to improve upon their existing skills.\nIncreased global mobility has helped to destabilize the prospects of young people looking for reliable work and led to a greater assumption of risk on behalf of young people. Coping strategies push them to put off long term", "-27.446647238975856" ], [ "supported by the state, and were nearly eradicated by the state during the 20th century. Because of these conflicts, aboriginal population identify less or do not identify with the national identity of being an Australian, but their ethnic identities are salient. Immigration As immigration increases, many countries face the challenges of constructing national identity and accommodating immigrants. Some countries are more inclusive in terms of encouraging immigrants to develop a sense of belonging to their host country. For example, Canada has the highest permanent immigration rates in the world. The Canadian government encourages immigrants to build a sense of belonging", "-27.42852611420676" ], [ "David H. Turner Turner's view of indigenous Australian society The indigenous Australians, far from being a primitive people, have a highly sophisticated society and worldview which, in Turner's view, is in many ways more advanced than those of modern Western civilization. According to Turner, the Aborigines have developed several social mechanisms for ensuring social and environmental harmony that run contrary to conventional Western thinking. In particular, rather than formulate their society around notions of personal or national autonomy and property, they favour a philosophy of mutual dependence. It is this mutual dependence, or interdependence, which ensures peaceful coexistence.\nThis is explicit", "-27.381893784921886" ], [ "Indigenous Australian sport Participation with European Australians The British discouraged Indigenous Australians from continuing their existing sporting traditions. Australian aboriginals have faced discrimination when participating in mainstream white Australian sports. Cricket, rugby, netball, soccer and field hockey were introduced into Aboriginal communities as a way of socialising Aboriginals into greater Australian culture. Cricket was specifically used to teach \"white values.\"\nWhile sport has provided some opportunities for Australian aboriginals, it has not provided a framework for enabling community wide benefits as it relates to wider Australian culture. Male indigenous Australians have largely been under-represented at the highest level of Australian", "-27.356265960872406" ], [ "Racism in Australia Racism in Australia traces both historical and contemporary racist community attitudes, as well as political non-compliance and governmental negligence on United Nations human rights standard and incidents in Australia. Contemporary Australia is the product of Indigenous peoples of Australia combined with multiple waves of immigration, predominantly from the United Kingdom and Ireland.\nLaws forbid racial and other forms of discrimination and protect freedom of religion. Demographic analysis indicates a high level of inter-ethnic marriage: according to the Australian Census, a majority of Indigenous Australians partnered with non-Indigenous Australians, and a majority of third-generation Australians of non-English-speaking background had", "-27.315400357707404" ], [ "non-Aboriginal Australians will need to have more awareness of Aboriginal Australian cultures. Respecting Traditional Law and Governance Aboriginal society has long had a complex system of Law and Governance which is different and often at odds with the Westminster system introduced by Europeans. Non-Aboriginal Australians failing to respect the importance of traditional law is a major contributor to the current lawlessness and social breakdown in Aboriginal communities. Constitutional Reform The Australian Constitution which came into effect in 1901 permits racial discrimination and also makes no mention of the human rights of Aboriginal Australians. In January 2012, a Government appointed Expert", "-27.314540808903985" ], [ "overestimated the positive impact of local immigration on natives' attitudes towards immigrants because they omitted the tendency of xenophobic natives to move to locations with few migrants; instead, they find that, if anything, high concentrations of ethnic minorities likely exacerbated xenophobia in England. With David Card, they also find that xenophobic attitudes among European natives are mainly driven by concerns over how changes in the composition of the local population due to immigration may affect amenities from neighbourhoods, schools and workplaces, instead of concerns over wages and taxes, thus explaining why individuals with lower education tend to display more xenophobic", "-27.19553024461493" ], [ "are unemployed, and it has been found that the second most common source of unfair treatment after members of the public is while Aboriginal persons are at work or applying for work. In addition, there is a significant lack of consultation with Aboriginal peoples on the methods they think best to tackle issues like unemployment. Crime Aboriginal Australians are overrepresented in Australia's criminal justice system. As of 2018, Aboriginal and Torres Strait Islander prisoners represented 28% of the total full-time adult prisoner population while accounting for 2% of the general population. Furthermore, the increasing percentage of Aboriginal women in Australia's", "-27.156427614449058" ], [ "families and communities throughout Australia and became part of the Stolen Generations. In a 1980 study on European-Australian and Indigenous Australian relations in Western Australia, Kenneth Liberman reflects on how European-Australian settlers imposed their standards of \"morality\" onto Indigenous Australians, with \"the implicit attitude that the best thing which European society could do for Aboriginals was to make Europeans of them.\" According to Australian anthropologist A. P. Elkin, \"European society was endeavoring to turn Aboriginal people into individualists\" by teaching them the \"moral value of work.\" He notes how European-Australian pastoralists forced \"Aboriginals living on their stations to perform some", "-27.142743183881976" ], [ "and low utilization of healthcare resources can be due to a combination of many factors. Racial discrimination towards Indigenous peoples that stems from processes of colonialism leads to a cumulative exposure to racism, and this is related to negative health outcomes. It produces feelings of anger and shame, which limits active participation in the mainstream healthcare system and society at large. Hospitalisation rate Indigenous Australians go to hospital at a higher rate than non-Indigenous Australians. In 2010–11, Indigenous Australians used hospitals 2.5 times more frequently than non-Indigenous people. This rate comes from an age-standardised separation rate (hospital check-out) of 911", "-26.870707556488924" ], [ "and activist Kevin Gilbert interviewed Jabanungga for the award winning book Living Black: Blacks Talk to Kevin Gilbert.\nSuffering is that the white people class them as the lowest person on earth. Modern Aboriginals are victims of this chain of historical events. I believe that Aborigines should come to view their background a bit more realistically on the surface and with a bit less shame underneath.\nAboriginal people were forced to work, if they didn’t, the station owners called the police in. I always thought Australia was different to America, but we had slavery here, too. The people might", "-26.814137180277612" ], [ "people are seen presumptively as \"Australian\", and as prototypical citizens. Catherine Koerner has claimed that a major part of white Australian privilege is the ability to be in Australia itself, and that this is reinforced by, discourses on non-white outsiders including asylum seekers and undocumented immigrants.\nSome scholars have suggested that public displays of multiculturalism, such as the celebration of artwork and stories of Indigenous Australians, amount to tokenism, since indigenous Australians voices are largely excluded from the cultural discourse surrounding the history of colonialism and the narrative of European colonizers as peaceful settlers. These scholars suggest that white privilege in", "-26.810992768441793" ], [ "1991.\nThere are a number of possible explanations for why newcomers earn less than native Canadians in the same jobs with the same skills. Lower hourly wages might be an indication that the labour productivity of immigrants is lower, and employers thus have reason to pay them less. New workers are also less familiar with the Canadian labour market and will thus not be able to maximize their salaries. Employers will also be less familiar with an immigrant's background and thus less willing to offer the same salary as to a native. Immigrants, especially visible minorities have different values than native-born", "-26.7286012689583" ], [ "countries with respect to human development standards, and yet amidst this wealth and prosperity, aboriginal people live in conditions akin to those in countries that rank much lower and in which poverty abounds. At least one in five aboriginal Canadians live in homes in need of serious repair, which are often also overcrowded and contaminated with mould.\" Youth suicide James Anaya, the UN’s special rapporteur on the rights of indigenous peoples was deeply concerned by the suicide rate in aboriginal communities. He noted particularly that in Pukatawagan there has been a suicide (once) every six weeks since January 2013. Twenty-year-old", "-26.64525881203008" ], [ "the Australian average. They did, however, experience higher rates of robbery, overall. The study could not sample incidents of crime that were not reported. Additionally, multiple surveys of international students over the period of 2009-10 found a majority of Indian students felt safe. Asylum seekers Commentators have accused the Australian Government of racism in its approach to Asylum seekers in Australia. Both major parties support a ban on asylum seekers who arrive by boat. Australia operates the Pacific Solution which includes the relocation asylum seekers. Former Minister for Immigration and Border Protection Scott Morrison described asylum seekers as 'illegal'.", "-26.63207725531538" ], [ "by the University of New South Wales created a brief media uproar. Amongst the advised language changes, they recommended \"settlement\" be replaced by \"invasion\", \"colonisation\" or \"occupation\". They also deemed that the generally accepted anthropological assumption that \"Aboriginal people have lived in Australia for 40,000 years\" should be dropped for \"... since the beginning of the Dreaming/s\" as it \"reflects the beliefs of many Indigenous Australians that they have always been in Australia, from the beginning of time\" and because \"many Indigenous Australians see this sort of measurement and quantifying as inappropriate.\" While some commentators considered the guidelines appropriate, others", "-26.62466338009108" ], [ "Japan. The Maori and Australian Aborigines had been largely dispossessed and disenfranchised during the 19th and early 20th centuries, but relations between the descendants of European settlers and the Indigenous peoples of Australia and New Zealand began to improve through legislative and social reform over the post-war period corresponding with the civil rights movement in North America. 1970s Australia was a vocal critic of white-minority rule in the former British colonies of South Africa and Rhodesia.\nThe arts also diversified and flourished over the period – with Australian cinema, literature and musical artists expanding their nation's profile internationally. The iconic Sydney", "-26.578578480053693" ], [ "an identity because some non-Aboriginal people now wanted to refer to themselves as indigenous because they were born there. Definitions from academia Dean of Indigenous Research and Education at Charles Darwin University, Professor MaryAnn Bin-Sallik, has lectured on the ways Aboriginal Australians have been categorised and labelled over time. Her lecture offered a new perspective on the terms urban, traditional and of Indigenous descent as used to define and categorise Aboriginal Australians:\nNot only are these categories inappropriate, they serve to divide us. ... Government's insistence on categorising us with modern words like 'urban', 'traditional' and 'of Aboriginal descent' are really", "-26.558425109116797" ], [ "practice their culture and ways of life because the environment they depend on to hunt, fish etc. is drastically changed. In addition, this destruction hinders the practice of Indigenous culture and creation of knowledge making it more difficult for Indigenous individuals to pass down their traditions to future generations.\nWhile employment opportunities are brought to local communities as a pillar of neo-extractivism projects, the conditions are often unsafe for workers. TNCs can take advantage of more lenient health and safety conditions in developing countries and pay inadequate wages in order to maximize their profits. As well, foreigners usually fill the highest", "-26.534282610879018" ], [ "outspoken about the lack of job opportunities for indigenous people living in the centre of Australia. Because of this, he said, the communities were living in poverty, and that the situation would continue to get worse until the federal government began talking to the communities directly. A lot of the problem, Forrester claimed, was due to racism. He called the situation \"economic apartheid\". He also acknowledged, however, that most people from indigenous-speaking communities lacked the literacy in English needed to keep a job. Most adults could not read and write, and the younger people did not have enough access to", "-26.516297579859383" ], [ "circumstances. Aged care workers retain an important role in providing a communication link for older people to reach legal and emotional assistance. Services for Indigenous Australians Many Indigenous Australians have experienced historically significant challenges. Indigenous Australians have been dramatically affected by white colonisation in Australia and may be eligible for aged care services at a younger age than non-Indigenous Australians. Some groups use the term \"family violence against aunties and uncles\" in place of \"elder abuse\". The incidence of abuse of older people can be particularly high in Indigenous communities that can be related back to important factors such as", "-26.490520285791717" ], [ "which have led to higher suicide rates, violence, substance abuse and incarceration of Indigenous peoples today.\nSocial, political and economic factors that result from colonisation present barriers to quality healthcare, health education, and health behaviours. Acculturation has produced xenophobia, which has socially marginalized Indigenous people and excluded them from society. Social inclusion is a social determinant of health, and social marginalization allows for injustices against Indigenous people to persist. Political disempowerment prevented them from accessing social services, sickness benefits, and from voting until the 1960s. Socio-economic inequality has resulted in poor employment opportunities, housing, education and healthcare. One in seven Indigenous", "-26.4684077915299" ], [ "Australia the kind of problem they have in South Africa or in America or increasingly in Great Britain. I think it's been a very good policy and it's been of great value to us and most of the criticism of it that I've ever heard doesn't come from these oriental countries it comes from wandering Australians. (Lamb) \"For these years of course in the past Sir Robert you have been described as a racist.\"\n(Menzies) \"Have I?\"\n(Lamb) \"I have read this, yes.\"\n(Menzies) \"Well if I were not described as a racist I'd be the only public man who hasn't been.\" Higher", "-26.44000111850255" ], [ "over the lives of Western Australian Aboriginal people which, some say, only increased their suffering. In 1937 Neville declared:\nAre we going to have one million blacks in the Commonwealth or are we going to merge them into our white community and eventually forget that there were any Aborigines in Australia?\nNeville believed that biological absorption was the key to 'uplifting the Native race.' Speaking before the Moseley Royal Commission, which investigated the administration of Aboriginal people in 1934, he defended the policies of forced settlement, removing children from parents, surveillance, discipline and punishment, arguing that\n\"[T]hey have to be protected against themselves", "-26.366055959486403" ], [ "limited for many Aboriginal people due to the residential school act and its legacy. Many Aboriginal people have been unable to establish effective relationships with families and friends as a result of being taken away at an early age from their communities. The usual social bonds that occur with family members, friends and community members were severely and permanently damaged, leaving this population particularly vulnerable (Health Council of Canada, 2005). Existing public policies and corporate strategies There are numerous policies and strategies that have been implemented to address chronic disease prevention and management in Northern Ontario. The existing policies and", "-26.36458356771618" ], [ "progress of science in Ancient Greece. The authors suggest we would expect to see fewer adaptive changes among the Amerindians and sub-Saharan Africans, who have farmed for the shortest times and were genetically isolated from older civilizations by geographical barriers. In groups that had remained foragers, such as the Australian Aborigines, there would presumably be no such adaptations at all. This may explain why Indigenous Australians and many Native Americans have characteristic health problems when exposed to modern Western diets. Similarly, Amerindians, Aboriginals, and Polynesians, for example, had experienced very little infectious disease. They had not evolved immunities as did", "-26.31293692428153" ], [ "under the law, colonial government policy and public opinion treated Aboriginal peoples as inferior. The Nationality and Citizenship Act 1948, which came into force on 26 January 1949, created an Australian citizenship, but which co-existed with the continuing status of British subject. Aborigines became Australian citizens under the 1948 Act in the same way as other Australians (though Aborigines were not counted in the Australian population until after the 1967 referendum). The same applied to Torres Strait Islanders and the indigenous population of the Territory of Papua (then a part of Australia).\nIn 1770 and again in 1788, Britain claimed Eastern", "-26.273615219746716" ], [ "into destitute areas, lost their sources of livelihood, and were excluded from the labor market. Additionally, Aboriginal communities lost their culture and values through forced assimilation and lost their rights in society. Today various Aboriginal communities continue to be marginalized from society due to the development of practices, policies and programs that \"met the needs of white people and not the needs of the marginalized groups themselves\". Yee also connects marginalization to minority communities, when describing the concept of whiteness as maintaining and enforcing dominant norms and discourse. Poor people living in run-down council estates and areas with high", "-26.258672984025907" ], [ "On the contrary, our still predominantly Anglo-Australian rulers are indifferent; some profit from, and others actually take pride in their active collaboration with the Third World colonization of Australia. None of the major parties, indeed, not one member of the Commonwealth Parliament, offers citizens the option of voting to defend and nurture Australia's Anglo-European identity. The problem, in short, is clear: The Australian nation is bereft of a responsible ruling class.\nIn December 2005, Fraser further criticised multiracialism in Australia by writing an article regarding the 2005 Cronulla riots, entitled \"Diversity vs. Freedom: Australians Fight On The Beaches.\" As with the", "-26.175762464874424" ], [ "with respect to Aboriginal people, who were supposed to be treated as British subjects in the same way as the settlers.\nIn common with other areas of South Australia, and Australia as a whole, settlers on the frontier employed various tactics to deal with Aboriginal resistance to being forced off their traditional lands. Initially these revolved around keeping them at a distance using threats of violence, but they soon escalated to terrorising Aboriginal people to stop them interfering with stock and other property, tactics which sometimes resulted in violent clashes. Violence by settlers towards Aboriginal people often went unreported to the", "-26.044502162811114" ], [ "climate change. Due to climate change, indigenous people have been threatened with their livelihood and cultural idententies across the world North America, Europe, Latin America, Africa, Asia and the Pacific. Approximately 370 million indigenous people are affected. Child Rights Researchers at the Overseas Development Institute identified that children in South Asia may be particularly vulnerable to violations of human rights following climate related disasters. These can include gender-based violence, child labour, family break-ups and barriers to their development and learning. The researchers argue that child rights are rarely prioritised in policies to reduce disaster risk or adapt to climate change", "-26.04059657495236" ], [ "14 prisons across Australia, and heard story after story of Indigenous people with disabilities, whose lives have been cycles of abuse and imprisonment, without effective support.\" The researcher said that the result is Australia's prisons are disproportionately full of Indigenous people. In addition to this, Aboriginal Australians are overrepresented as victims of crime. An ABS report from 2016 found that these persons are more likely to be victims of assault than non-Aboriginal persons by ratios of 2.6 (in NSW), 6 (in SA), and 5.9 (in NT). Aboriginal women are again highly overrepresented in this figure, accounting for a higher proportion", "-26.02252611883887" ], [ "and education quality, many Aboriginal people have requested to be more involved in the creation of culturally appropriate curricula for their children.\nRecent Northern Territory government policies have led to many Aboriginal languages no longer being taught in schools. Human Rights The Australian Government's treatment of Aboriginal Australians has been condemned by the United Nations Special Rapporteur on Indigenous Rights, James Anaya in 2009, and again by United Nations High Commissioner for Human Rights, Navi Pillay in 2011. An Amnesty International campaign has been created to challenge the Government’s homelands policy. Cross-Cultural Understanding To achieve genuine Reconciliation, it is noted that", "-25.996909526293166" ], [ "can be a result of ignorance, thoughtlessness, prejudice and stereotyping. Forms of discrimination: economic accessibility, social accessibility, temporal accessibility and administrative accessibility.\nIn the majority of the countries worldwide, particularly countries in Africa, older people are typically the poorest members of the social spectrum, living below the poverty line.", "-25.963215461117215" ], [ "wellbeing levels between people who identified as only Pacific, and people who identified with two Pacific groups (e.g. Tongan and Samoan). This suggests that lower wellbeing only occurred when the two ethnic groups associated with, were very different (e.g. Pacific and New Zealand European).\nIdentity Tension Effect: Associating with both a Pacific group and a majority ethnic group (e.g. New Zealand European) may lead to negative feelings about Pacific aspects of identity. This is because people who identify with multiple ethnic groups tend to be more likely to internalise negative stereotypes about Pacific people held by the majority. This can lead", "-25.81104101665551" ], [ "limited numbers of local people who are employed in the economy enter at its lowest level and are unable to live in tourist areas because of meager wages and a two-market system.\nIn some cases, the resentment by local people results in environmental degradation. As a highly publicized case, the Maasai nomads in Kenya killed wildlife in national parks but are now helping the national park to save the wildlife to show aversion to unfair compensation terms and displacement from traditional lands. The lack of economic opportunities for local people also constrains them to degrade the environment as a means of", "-25.77381316482206" ], [ "is concentrated among the poorest of the poor\", and that socio-economic disadvantage is \"closely related with family violence, being both a cause of child abuse... and a form of child abuse and neglect in itself\". The Indigenous community is significantly poorer than the non-Indigenous community in Australia. Alcohol abuse There is a link between alcohol abuse and violence in Indigenous communities, but the relationship is complex and it is not straightforward causality. Some of the \"underlying issues associated with alcohol use and dependence [include] educational failure, family breakdown, the lack of meaningful employment and economic stagnation\" (Homel,Lincoln & Herd 1999;", "-25.740237807380254" ], [ "Canada has a self-perpetuating system, where the societal mechanisms ensure that the poorest Canadians remain poor. The face of urban poverty is lack of low-income housing for individuals and families, and increasing homelesness. Racism and prejudice Racism has a strong undercurrent in the Canadian society. However, they are not visible and openly identified. The current prevalent forms are structural racism (e.g. Henry and Elfie Ginzberg experiment), individualized racism (e.g. racial profiling of police defined broadly by Ontario Human Rights Commission), and internalized racism (First generation immigrants and refugees). Social distance between whites and non-whites is very much a distinct aspect", "-25.735712866007816" ], [ "all the studies... makes it clear that, with very few exceptions, there is no strong statistical support for the view held by many members of the public, mainly that immigration has an adverse effect on native-born workers in the destination country.\" Overall economic prosperity Whereas the impact on the average native tends to be small and positive, studies show more mixed results for low-skilled natives, but whether the effects are positive or negative, they tend to be small either way. Immigrants may often do types of work that natives are largely unwilling to do, contributing to greater economic prosperity for", "-25.68822620145511" ], [ "as better than their peers. Any disloyalty to their \"mates\" is treated harshly, and is known as the tall poppy syndrome, where people who grow greater than their peers are harshly criticised as being narcissistic, or \"up themselves\". Even the most successful and beautiful Australians are eager to proclaim how ordinary they are, to the extent that two-thirds of the highest earning households define themselves as middle class, lower middle class or even working class. This egalitarian social system makes Australian society appear \"laid-back\" or relaxed to visitors. Most forms of address are by first name or nickname, even for", "-25.667922041306156" ], [ "the population, owning outright around 20% of all land - largely in the sparsely inhabited central Australian desert rather than the resource rich coastlines. Intense focus on the impact of historical policies like the removal of mixed ethnicity Aboriginal children from their Aboriginal parent resulted in a bipartisan Parliamentary apology to Aborigines carried in 2008. The apology was met with some controversy given the previous Prime Minister's, John Howard, steadfast refusal to apologise on behalf of the Australian Government and by the non-participation of some conservative politicians including Peter Dutton. Aboriginal health indicators remain lower than other ethnic groups within", "-25.63982815213967" ], [ "Australia, and the White Australia policy restricted the freedoms for non-white people, particularly with respect to immigration. Indigenous people were governed by the Aborigines Protection Board and treated as a separate underclass of non-citizens. Prior to a referendum conducted in 1967, it was unconstitutional for Indigenous Australians to be counted in population statistics.\nHolly Randell-Moon has said that news media are geared towards white people and their interests and that this is an example of white privilege. Michele Lobo claims that white neighborhoods are normally identified as \"good quality\", while \"ethnic\" neighborhoods may become stigmatized, degraded, and neglected.\nSome scholars claim white", "-25.633806221128907" ], [ "that Aboriginal women have a higher likelihood of being victimized compared to the rest of the female population.\" While Canadian national averages of violence against women are falling, they have remained the same for aboriginal communities throughout the years. The history of residential schools and economic inequality of indigenous Canadians has resulted in communities facing violence, unemployment, drug use, alcoholism, political corruption, and high rates of suicide. In addition, there has been clear and admitted racism towards indigenous people by the Royal Canadian Mounted Police, making victims less likely to report cases of domestic violence.\nMany of the issues facing indigenous", "-25.632305277249543" ], [ "of Canada, the overrepresentation of Aboriginal women and girls in sexual exploitation and trafficking in Canada has been explored on repeated occasion through a span of years. However, the identified root causes never seem to change. These are the impact of colonialism on \"Aboriginal societies, the legacies of the residential schools and their inter-generational effects, family violence, childhood abuse, poverty, homelessness, lack of basic survival necessities, race and gender-based discrimination, lack of education, migration, and substance addictions\".Colonization in Canada has taken and maintains the form of systematic discrimination, embodied in harmful policies and legislation that have greatly damaged Aboriginal societies.", "-25.62825472964323" ], [ "of acculturation. There have been increased reports of health issues such as alcoholism, obesity, and hypertension, which are generally observed more often in urban populations. Perhaps because of these health risks, many indigenous people choose to live in voluntary isolation from mainstream society.", "-25.468371634196956" ], [ "they are doing well in Australia. He also expressed fear that the Indian media reports might lead to backlash against other Indian Australians. Others have objected to labeling Australia as racist based on the actions of a few.\nSitaram Yechury, a member of parliament representing the Communist Party of India (Marxist), wrote that both sides of the debate have points. Economic crises and downfalls often cause rising fascism and racism against minorities, such as the rise of Nazi Germany, the Great American Depression, as well as economic downturns in India itself resulting in racist-like violence between various ethnic groups and", "-25.426672015571967" ], [ "Australian survey of people born with atypical sex characteristics found high levels of poverty, in addition to very high levels of early school leaving, and higher than average rates of disability. An Employers guide to intersex inclusion published by Pride in Diversity and Organisation Intersex International Australia also discloses cases of discrimination in employment. Healthcare Discrimination protection intersects with involuntary and coercive medical treatment. Maltese protections on grounds of sex characteristics provides explicit protection against unnecessary and harmful modifications to the sex characteristics of children.\nIn May 2016, the United States Department of Health and Human Services issued a statement explaining", "-25.42089079017751" ], [ "was weakened through policies of successive Protectors of Aborigines in Western Australia, particularly Henry Prinsep and A. O. Neville, who sought to \"breed out\" the Aboriginal race through miscegenation with whites. Successive outbreaks of measles and other illnesses also took their toll on the successive demoralisation of these people. Nevertheless, since the 1930s the number of Aboriginal people in Pindjarup lands has increased, though most now identify themselves by the language group Noongar, rather than Pindjarup.\nFrom the 1940s to the 1970s up to 500 Aboriginal people, including many of Pindjarup heritage, were incarcerated at the Roelands Aboriginal Mission,", "-25.390464105148567" ], [ "by many members of the public, namely that immigration has an adverse effect on native-born workers in the destination country.\" Overall economic prosperity Whereas the impact on the average native tends to be small and positive, studies show more mixed results for low-skilled natives, but whether the effects are positive or negative, they tend to be small either way.\nImmigrants may often do types of work that natives are largely unwilling to do, contributing to greater economic prosperity for the economy as a whole: for instance, Mexican migrant workers taking up manual farm work in the United States has close to", "-25.33441552007571" ], [ "a minor riot occurred in the area involving construction workers from Bangladesh, Pakistan and India, which helped fuel stereotypes of construction workers as being dangerous. Fiji In Fiji, another country where large numbers of people of Indian origin were brought for agricultural plantation work, over 125 years ago, they are viewed in a manner different from some other parts of the world. Sienkiewicz finds the stereotypes popular in Pacific Islands is that Indians are too materialistic, caring only about money; that while the Indians work very hard to attain financial success, they refuse to share it. People with origins in", "-25.3045857087709" ], [ "to regulate body temperature in response to fever. The effect of this is that the desert people are able to have a higher body temperature without accelerating the activity of the whole of the body, which can be especially detrimental in childhood diseases. This helps protect people to survive the side-effects of infection. Health Aboriginal Australians have disproportionately high rates of severe physical disability, as much as three times that of non-Aboriginal Australians, possibly due to higher rates of chronic diseases such as diabetes and kidney disease. In a study comparing Aboriginal Australians to non-Aboriginal Australians, obesity and smoking rates", "-25.29813286793069" ], [ "the issue of the health of indigenous peoples.\nThe WHO notes that \"Statistical data on the health status of indigenous peoples is scarce. This is especially notable for indigenous peoples in Africa, Asia and eastern Europe,\" but snapshots from various countries (where such statistics are available) show that indigenous people are in worse health than the general population, in advanced and developing countries alike: higher incidence of diabetes in some regions of Australia; higher prevalence of poor sanitation and lack of safe water among Twa households in Rwanda; a greater prevalence of childbirths without prenatal care among ethnic minorities in Vietnam;", "-25.281098395345907" ], [ "comments in his 1972 memoirs, Be Just and Fear Not, in which he made it clear that he maintained his view that non-European people should not be allowed to settle in Australia. He wrote:\nI am proud of my white skin, just as a Chinese is proud of his yellow skin, a Japanese of his brown skin, and the Indians of their various hues from black to coffee-coloured. Anybody who is not proud of his race is not a man at all. And any man who tries to stigmatize the Australian community as racist because they want to preserve this country", "-25.275330671225674" ], [ "results in under-nutrition or malnutrition among the rural poor. Social isolation due to inadequate roads and poor access to information makes acquiring health care (and affording it) particularly difficult for the rural poor, resulting in worse health and higher rates of infant mortality. There have been noted disparities in both Asia and Africa between rural and urban areas in terms of the allocation of public education and health services. Case study: Africa A study of 24 African countries found that “standards of living in rural areas almost universally lag behind urban areas.” In terms of education, school enrollments and", "-25.24624196649529" ], [ "better homes than those afforded by typical Aborigines, where they could grow up to work as domestic servants and for social engineering. The removed children are known as Stolen Generations. Other British commonwealth Acts on half-castes and Aborigines enacted between 1909 and 1943 were also, in theory, called Welfare Acts, in statutes passed deprived these people of basic civil, political, and economic rights and made it illegal to enter public places such as pubs and government institutions, marry, or meet relatives. British Central Africa British Central Africa, now part Malawi and part Zimbabwe, referred to people of mixed descent as", "-25.214307186135557" ], [ "critical of Asians, mainly Chinese, who did not join unions, and who were prepared to work for lower wages and conditions. Wealthy land owners in rural areas countered with the argument Asians working on lower wages and conditions were necessary for development in tropical Queensland and the Northern Territory. It was claimed that without Asian workers these regions would be abandoned. Under growing pressure from the union movement, each Australian colony enacted legislation between 1875-1888 excluding further Chinese immigration. Post-war immigration The government began to expand access to citizenship for non-Europeans in 1957 by allowing access to 15-year residents, and", "-25.19741681375308" ], [ "of fellow Australians. Nevertheless, there is a competing principle to afford every immigrant and Australian citizen an equal opportunity to uphold their cultural beliefs. In this regard, some have questioned the Australian government's right to strip these refugees and asylum seekers of their cultural beliefs and understandings in regards to their health. Prolonged health issues In 1992, mandatory detention was introduced for refugees and asylum seekers entering Australia illegally. However, the introduction of mandatory detention has triggered debate. The importance of protecting Australia's borders and integrity of Australia's immigration system was the initial reason for the policy, while those who", "-25.157315928423486" ], [ "to be subjected to racist government policy and community attitudes. Racist community attitudes towards Aboriginal people have been confirmed as continuing both by surveys of Indigenous Australians and self-disclosure by non-Indigenous Australians.\nSince 2007, government policy considered to be racist include the Northern Territory Intervention which failed to produce a single child abuse conviction, cashless welfare cards trialled almost exclusively in Aboriginal communities, the Community Development Program that has seen Indigenous participants fined at a substantially higher rate than non-Indigenous participants in equivalent work-for-the-dole schemes, and calls to shut down remote Indigenous communities despite the United Nation's Declaration on the Rights", "-25.145037703565322" ], [ "effects on physical and intellectual development; Indigenous communities today in remote locations continue to suffer from malnutrition and chronic health problems, as well as lower levels of education. The persistence of inequality in educational attainment among contemporary Indigenous communities is viewed as a product of historical, political and social factors. European colonisers believed that Indigenous people were intellectually inferior, and education was thus denied as it was considered pointless. Low levels of education increase the likelihood of engaging in high risk health behaviors, as well as lower rates of participation in health screening and treatment. However, poor health behaviours", "-25.102256371057592" ], [ "culturally diverse as European nation states, before contact had significant cultural differences, which have tended to collapse and fuse as a result of European cultural contact. Nevertheless they remain strong parts of Aboriginal identity in contemporary Western Australia.", "-25.096979217749322" ], [ "disparity has also seen a change in attitudes. Younger New Zealanders increasingly accept inequality as an unavoidable social reality, and egalitarian concerns are less popular.\nThe 'Brain Drain' (emigration of skilled young workers) is a troubling phenomenon for the Government, and often cited by Opposition parties in election campaigns. Since 1999, university graduates have increasingly chosen to live and work abroad. Studies suggest that around 25% of kiwi graduates will emigrate upon graduation, usually selecting Australia, the UK or Canada as their new home.", "-25.094209035276435" ], [ "and a report of the extent of these practices was made public.\nProfessor Marcia Langton- Anthropologist – “If we were to compare the impact of these so called assimilation policies in their consequences to doing something similar to the Australian population today. Let’s say we’d leave one third of Australians living in their family homes, living their lifestyles. Another third we’d take out of their homes and we’d put them in the illegal immigrant detention centres and then the other third, take them away from their families, their children and we’d enslave them and we’d make them work on cattle stations", "-25.05990585204563" ], [ "of Indians facing racism in Australia. Marantz's training included a three-week course on Australian culture and \"how to act Australian\". During the course topic \"dissecting the Australian psych\", employees were told that Australia was known as \"the dumbest continent on Earth\" where college was \"literally\" unknown. Australians were technologically backward with the average person using mobile phones no better than the Nokia 3110 classic, were racist and that the best time to call was Friday nights as all Australians \"drink constantly\" and would likely be \"smashed\". In an interview on U.S. radio, Marantz stated he was shocked at the extent", "-25.05722895206418" ], [ "gaining attention in Canada. The reality for many Aboriginal women and girls in Canada are that they are \"victims\" and survivors of domestic sex trafficking. Aboriginal women and girls are being targeted for sexual exploitation and relocated from their communities, homes, foster homes, to and within urban centres in Canada. In general, the high rates of migration from a reserve (rural area) to an urban centre also poses an increased risk and entry point through which vulnerable Aboriginal women and girls may be exploited. \"The promises by sex traffickers to provide shelter and employment in off reserve communities can lead", "-25.04729876797137" ], [ "the many who need reminding why the Indigenous people of Australia are once again being defrauded of their human and political rights in a country calling itself a democracy.\n— John Pilger, Our Generation.", "-25.04246163094649" ], [ "people to:\n\"... live as members of a single Australian community, enjoying the same responsibilities, observing the same customs and influenced by the same beliefs, hopes and loyalties as other Australians.\"\nDiscriminatory legislation was removed by the Australian Government and state governments in the early 1960s. The last two states to grant Aboriginal people voting rights were Western Australia in 1962, and Queensland in 1962 (for Australian elections) and 1965 (for state elections). In New South Wales, Aboriginal policy was managed by the Aborigines Welfare Board (AWB), which sought either to keep people on its managed stations or to exert control over", "-24.9805153459165" ], [ "Media portrayals of Indigenous Australians Media portrayals of Indigenous Australians fall into a range of categories, which academics and commentators have described as often negative or stereotyped. In issues which concern them, Indigenous voices are continually drowned out by non-Indigenous voices, which present them as \"problems\" for the rest of society. Most stories are directed at white audiences, and anything which concerns welfare, or land rights especially, is tinged with a clear sense of conflict between \"us\" and \"them.\" Indigenous people are often portrayed positively in documentaries and advertisements, almost as tourist attractions, yet when they interact with contemporary society", "-24.916301189921796" ], [ "many Chinese and Japanese immigrants in British Columbia lived in unsanitary conditions and were not inclined to improve their living space, thereby proving their inferiority and their unwillingness to become truly Canadian. Forrest E. La Violette refuted this claim by stating that while Japanese and Chinese immigrants did often have poor living conditions, both of the groups were hindered in their attempt to assimilate due to the difficulty they had in finding steady work at equal wages.\nIn reference to Japanese Canadians specifically, human geographer Audrey Kobayashi argues that prior to the war, racism \"had defined their communities since the first", "-24.900408809800865" ], [ "people in several countries found 71% of Australian respondents thought that the country was becoming more tolerant of transgender people. Indigenous LGBTI community Gender diverse and transgender indigenous Australians are often referred to as sistergirls and brotherboys. The level of acceptance varies with each community and its elders. In 2015, Dameyon Bonson established Black Rainbow as a mental health support and suicide prevention service for LGBTI indigenous Australians, given that they often suffer dual discrimination through both racism and homophobia/transphobia, and are 45 times more likely to commit suicide than the general population.", "-24.872615751824924" ], [ "is another manifestation of cultural cringe. For several generations following the cessation of penal transportation, many Australians felt a sense of shame about being descended from convicts, and many did not even attempt to investigate their families' origins for fear of finding convicts in their lineage. In recent decades community attitudes have changed, and many Australians with convict ancestors are now more comfortable investigating and discussing their past, wearing their forebears' status almost as a badge of pride. Colloquially, attempts by non-Australians to negatively connote convict pasts are laughed off by Australians, who are now more inclined to associate criminal", "-24.861449921154417" ], [ "awareness amongst indigenous people in terms of their ethnic belonging.\nAs many Argentinians believe that the majority of the indigenous have died out or are on the verge of doing or that their descendants have assimilated into Western civilisation many years ago, they hold the idea that there are no indigenous people in their country. The use of pejorative terms likening the indigenous to lazy, idle, dirty, ignorant and savage are part of the everyday language in Argentina. Those stereotypes have forced many indigenous people, over the years, to hide their identity to avoid racial discrimination. Language The Qulla speak Northwest", "-24.848100664879894" ], [ "Nonetheless, Ford argues that \"Racism and racial discrimination remain a part of everyday life for Britain's ethnic minorities. Black and Asian Britons...are less likely to be employed and are more likely to work in worse jobs, live in worse houses and suffer worse health than White Britons\". The University of Maryland's Minorities at Risk (MAR) project noted in 2006 that while African-Caribbeans in the United Kingdom no longer face formal discrimination, they continue to be under-represented in politics, and to face discriminatory barriers in access to housing and in employment practices. The project also notes that the British school system", "-24.74594289480592" ], [ "non-Indigenous people believe that Aboriginal women are dirty, promiscuous, overtly sexualized, which makes these women vulnerable to violent assaults. Colonial culture has been foundation of these stereotypes creating a relationship of violence and hatred, which justifies the treatment of First Nations peoples to this day. Modern perpetuation of stereotypes The mainstream media makes a lot of money making movies that play along with stereotypes; while accurate portrayals may be critically acclaimed they are not often made or widely distributed. Overcoming stereotypes In the 1980s and 1990s, the Canadian Broadcasting Corporation (CBC) made efforts to improve the portrayals of Aboriginal", "-24.706445403309772" ], [ "to stigmatize the Australian community as racist because they want to preserve this country for the white race is doing our nation great harm... I reject, in conscience, the idea that Australia should or ever can become a multi-racial society and survive.\nHe was the last leader of ALP and Liberal parties to support it.\nHistorian Geoffrey Blainey achieved mainstream recognition as a critic of multiculturalism when he wrote that multiculturalism threatened to transform Australia into a \"cluster of tribes\". In his 1984 book All for Australia, Blainey criticized multiculturalism for tending to emphasise the rights of ethnic minorities at the expense", "-24.674488705699332" ], [ "overt expressions of racism, as well as criticism of those expressions. Newspapers have frequently reported on and criticized discrimination against immigrants, in forms such as being paid lower than the minimum wage, having their wages withheld, unsafe work conditions, physical abuse, or general denigration.\nIn a 2010–2014 World Values Survey, 44.2% of South Koreans reported they would not want a foreigner as a neighbor. Racist attitudes are more commonly expressed towards immigrants from other Asian countries and Africa, and less so towards European and white North American immigrants who can occasionally receive what has been described as \"overly kind treatment\". Related", "-24.63839079477475" ], [ "prevalent in Aboriginal populations, the need for medical assistance is even greater in many Aboriginal Australian communities. The researchers suggested the use of mass drug administration (MDA) as a method of combating the diseases found commonly among Aboriginal peoples, while also highlighting the importance of \"sanitation, access to clean water, good food, integrated vector control and management, childhood immunisations, and personal and family hygiene\".\nAnother study examining the psychosocial functioning of high-risk-exposed and low-risk-exposed Aboriginal Australians aged 12–17 found that in high-risk youths, personal well-being was protected by a sense of solidarity and common low socioeconomic status. However, in low-risk youths,", "-24.634079614072107" ], [ "youth to be under supervision. This is evidence of a clear issue occurring not only within Australia's criminal justice system, but within communities as a whole.\nExplanations for this overrepresentation link back to the effect systemic racism has on the individual and the community. Historical acts of systemic racism, such as the Stolen Generation, have traumatised entire communities, as has other issues such as police brutality, disconnection from land, offence criminalisation and poor socioeconomic situation as a result of high poverty and unemployment rates, amongst others. On 9 August 2018, a senior research officer from Human Rights Watch reported, \"I visited", "-24.592622155032586" ] ]
2ac7nm
Why do semi trucks leave behind huge chunks of tires on the road?
[ "Can confirm what others have said: They use retreaded tires on tractors in any position except steer (the very front two tires). Retreading is a system by which a used tire has new tread applied to it at a tire plant, thereby making it a \"refurbished\" tire. Retread tires are used on every position on a truck except the steer axle, only new tires go on steer axle (this is the very front two tires on a truck, if they are not new then they are against DOT regulation). Is it safe? By and large, yes, we have never had a major failure across the board in a retread campaign. Do I recommend driving next to a truck or a trailer on the highway? Absolutely not. It isn't even so much because of the tires but because of the driver, sitting on the side of one they usually won't see you, if there is a blowout the tread may hit your car and damage it severely (we have large steel belts, sort of like in your car, but unfurled they would be about the size of your car). Another thing is that if a retread blows then it could blow out other tires, the truck could swerve and destroy your car. If you are on city streets being next to a truck is a lot like being next to a car so I wouldn't worry there but on highways I would suggest sticking as far as you can away from a tractor, especially one that has a trailer attached because trailer tire retreads tend to be several times retreaded tractor tires. tl;dr tractors have copies of copies of copies of tires and therefore trend toward the weaker side. Source: I am a parts manager (that deals with tires every day) for a national trucking company.", "Semi trucks tend to have retreaded tires. Retreading or recapping is a process of recycling an old tire by putting new treads on it. Sometimes these treads give out and tear themselves off leaving a bit of a mess.", "yes a lot of trucks use retreaded or recapped tires but the real reason is because the tire wear out and fail. It common for a truck to go over 200,000 miles in a year. Thats 6.6 times more than the average car. Plus 4.5 times more tires means 30times more chance of tire failure over a normal car", "They drive on low quality retreaded tires, I'm assuming to save money. The tire doesn't hold out long enough and blows out.", "Truck drivers rarely if ever take the time to check tire pressures on all of their tires. Under inflated tires run hotter causing the tread to separate. this happen more often on re-caps, but it will happen on all tires under certain conditions. You never want to run over one of these. They can have sharp metal in them and will flatten your tires in the process. On a side note: never stop next to one of these pieces of tread in the southeast U.S. It might be a gator, the resemblance is startling.", "What happens is they often have their bald tires \"re-treaded\" because it's cheaper than buying new tires. The new tread eventually falls off.", "As others have said here, it is from retreaded tires. That may leave you to wonder why/how they keep on driving after it. What you have to remember is that, unlike in a car, the driver probably can't easily feel if something happens to the rear tire on the truck. In a car, if you have a flat on the front tires, you can know immediately but it is harder (though you still know) on the back tires. Well, imagine a huge truck, on a trailer, and really far back. It would be easy to not notice.", "\"Watch out for them gators, son\" explanation: truckers call them gators.", "Basically, when you drive on a flat tire, it comes apart. Tractor trailer drivers are not always aware that they have a flat tire on the trailer, and the tire gets hot and comes apart from being driven flat for many miles. It is not relevant if the tire is retreaded or not. Non-retreaded tires fail in the same manner. Usually when you pick up a road gator, the retread is still attached to the tire casing. It is true that retreaded tires tend to be older, and very common on trailers and drive positions. They can spontaneously fail, but it is uncommon. Usually, road gators are caused by simply driving on a flat until it comes apart. source : tire shop owner", "Why do they allow retreads in the US when they're so dangerous. I've heard stories of them blowing out near other drivers and risking their lives. I've almost been in accidents before where I or others have to swerve to avoid ones already littering the road. I wish they'd improve the rail network and get rid of semi's altogether.", "Followup question: why the hell here in California freeways are littered with that crap that i have to swerve around all the time while I have never seen that living in France for 25 years?", "In Florida, you have to look twice. What may appear to be a blown out semi truck tire may actually be an alligator sun bathing on the side of the road.", "Alright, so I work in a truckstop tireshop and this is from what I know. Department of Transportation has rules when it comes to tires, the big ones are: -Cannot run a tire with 2/32nds of tread or less. -Cannot run a used tire/retread on steers. -Cannot run a tire with patches, sidewall or otherwise more than three to a quarter of tire. Now this is where shit hits the fan. You'll find drivers, whether they are aware or not, running P.O.S. tires with WAY too little PSI (should be around 100-110 depending) while loaded. It isn't always retreads, but you will get Joe Blow trying to save a buck, and he will do the work at his fleets yard (parking for company trucks) not following any regulations. A good company/fleet might run something from Michelin, where the repairs to the casing of an older tire and the retread were done to DOT regulation. A good driver keeps up with maintenance and replaces what needs to be replaced, but do keep in mind shit happens. Just last night alone, I replaced 3 blown-out tires and I mean all that were left were sidewalls. Two were bad maintenance practice, which was evident from the rest of the trailer/tractor and looking for THE cheapest thing we carry. I wiitnessed an under-the-table deal between two truckers where one had low tread tires (4/32) and sold them to some guy to be mounted to replace his blow out. TL;DR: Some drivers/fleets are just out to make a buck, even if they have to cut corners and risk other drivers.", "I was once passing a big truck on my motorbike on a freeway in Australia. One of the re-tread tires came apart and launched the entire giant chunk of rubber out the side, directly at me about a meter and a half off the ground. I managed to swerve hard and duck as it flew over the top of me. It felt like a Matrix slow-mo as the huge section of rubber skimmed over the top of me. If it had hit me, it would have knocked me off the bike - it was a good 2m long. Hundreds of other little bits of rubber rained off my helmet and body as I accelerated past the truck. I felt incredible bad-ass, but it could have so easily fucked me up. I was wearing full riding gear, but coming off my bike at 110 km/h would have been very messy.", "When you have that many wheels and a tire blows out, you may not notice it. Keep driving on it and it shreds to pieces on the highway. Blow out a tire on a 4 wheeled car, and you will for sure notice it right away." ]
[ [ "moose-vehicle collisions. Normally, salt would make its way off the pavement onto the gravel shoulder and into the soil, however, rumble strips will retain and create a salt lick on the road surface. Loose rock salt in the rumble strip subjected to evaporating moisture will cake and accumulate and is not easily dislodged by truck traffic.", "-34.07903265522327" ], [ "Rut (roads) A rut is a depression or groove worn into a road or path by the travel of wheels or skis. Ruts can be formed by wear, as from studded snow tires common in cold climate areas, or they can form through the deformation of the asphalt concrete pavement or subbase material. The main reason is heavy loaded truck acts more pressure than assumed during the construction of roads. These heavy loaded trucks will imprint the tire impression on roads causing ruts.\nRuts prevent rainwater from flowing to the side of the road into ditches or gutters. Rainwater trapped in", "-33.951673936513544" ], [ "85.5 inches than the right tires (88.5) to assist in handling. Meanwhile, the trucks had mesh shields and hood deflector screens attached to prevent debris from the dirt from entering the radiators and damaging the vehicles. The trucks also had the front spoilers and splitters removed, the grille closed, and the rear spoilers raised and enlarged by 40 square inches to generate more downforce. The trucks' windshields remained, meaning the track crew had to keep the track dry, to prevent mud from making them unable to be cleared. On the hoods, bug deflectors, which were 8 by 12 inches, were", "-33.80323761454201" ], [ "drivers of large vehicles are reluctant to use these for their intended purpose. In many cases, the stamped, coloured concrete looks like paving- or cobblestone. Pedestrians may mistake the truck apron for part of the sidewalk. Owing to this error of misinterpreting the truck apron as part of the sidewalk, there is a risk of pedestrians being struck by off-tracking trailers. Despite the conjecture, there is reduced chance of pedestrians using the truck apron as a sidewalk if there is a large vehicle approaching. Even when a truck apron is not present, most pedestrians will step back from the edge", "-33.614000252913684" ], [ "Road debris Road debris, a form of road hazard, is debris on or off a road. Road debris includes substances, materials, and objects that are foreign to the normal roadway environment. Debris may be produced by vehicular or non-vehicular sources, but in all cases it is considered litter, a form of solid waste. Debris may tend to collect in areas where vehicles do not drive, such as on the edges (shoulder), around traffic islands, and junctions.\nRoad spray or tire kickup is road debris (usually liquid water) that has been kicked up, pushed out, or sprayed out from a tire. In", "-33.4694123712834" ], [ "on off-road vehicles in order to better traverse rough terrain. Regular automotive tires don't provide enough traction to help a vehicle through sand, dirt, snow and ice, so specialized tires are normally used on off-road 4x4 vehicles. Large overall wheel diameter provides a better ride comfort and road clearance. Wide tires help to distribute the weight on sand, while narrower tires help get better traction in the snow or on ice. Each tire type has its own tread type to provide a proper grip in certain road conditions. Common off-road tire types are: Sand tires, Mud-terrain tire, Snow tires and", "-33.20728025585413" ], [ "centerline of highway has a pavement joint and if milled CLRS are installed over this joint they will make pavement more vulnerable to deterioration. Truckers have reported deterioration of the joint and the CLRS.\nAlso, road salt prematurely degrades asphalt, so having it retained and concentrated in rumble strips is not desirable. Opposition and removal In February 2010, Johnson County, Kansas, considered legislation to allow buses to travel on the paved shoulder (which was rumble stripped) when traffic slows to less than 35 mph (56 km/h). The estimated cost was between $17.6 million and $20 million, including $2.4 million to remove", "-33.155880580416124" ], [ "passing cars. Loose salt does not provide sufficient traction for motorcycles, which can lead to skidding, especially around corners.", "-32.95725310762646" ], [ "such as individually sustainable housing.\nRows of stacks of tyres are often used as barriers in motor racing circuits as a method of dissipating kinetic energy over a longer period of time during a crash, comparatively to striking a less malleable material such as a concrete or steel wall.\nMany cattle farmers re-purpose old tractor tires as water troughs for their cattle by placing them over natural springs or by piping stream water into them. These tires contain the water and allow it to pool for the cattle without any additional interaction from the farmer. Most farmers also include a", "-32.81190225703176" ], [ "hand or foot pumps for filling a tire with air by the vehicle owner. Cans of pressurized air can sometimes be bought separately for convenient emergency refill of a tire.\nSome cars and trucks are equipped with run flat tires that may be driven with a puncture over a distance of 80 km to 100 km. This eliminates the need for an immediate stop and tire change or calling for roadside assistance. Racing tires Tires have more traction when they are bald, because there is more surface area making contact with the road. The reason regular tires have treads is to avoid hydroplaning", "-32.53456112521235" ], [ "the driver pulls over onto the shoulder with the flat tire passing over the rumble strip. This may cause the flat tire's sidewalls to be crushed or abraded between the metal wheel rim and rumble strip high-points. Wildlife attraction Wildlife-vehicle collisions can be a significant problem when large animals are involved such as moose, elk, and deer, which can cause serious vehicle damage, injury, and fatalities. Separate studies in New Hampshire (US) and Quebec (Canada), of radio-collared moose found that home ranges were associated with salt licks formed by road salt runoff. These roadside salt licks were thought to increase", "-32.369838821701705" ], [ "predominantly along unsurfaced tracks, forest tracks, or older roadways that may have fallen into disuse. In the UK they are usually roads which are not maintained in any way and will often include fords. Mudding Mudding is off-roading through an area of wet mud or clay. The goal is to drive through as far as possible without becoming stuck. There are many types of tires that are recommended for this activity. Some tires are balloon tires, mud-terrain tires and paddle tires. This activity is very popular in the United States, although it is illegal on public land due to the", "-32.249697682476835" ], [ "is raised slightly, in an attempt to keep light vehicles on the main road surface. The truck apron is constructed of reinforced concrete. In many parts of North America planners, designers, and builders attempted to make truck aprons and roundabouts more attractive by stamping and colouring the concrete. From a distance the concrete looks like red paving stones. Roundabouts Truck aprons are used on roundabouts and slip lanes to compensate for the off-tracking of larger vehicles. Off-tracking is the shorter path that the rear wheels follow as a vehicle moves around a corner. The longer the vehicle and the sharper", "-32.129941488386976" ], [ "on many large quarrying dump trucks and they were also an iconic feature of the Alvis FV600 chassis vehicles, such as the Stalwart and Saracen. The FV600 used a version of the DAF H-drive, with a single differential between sides and all wheels on each side linked by an internal driveshaft and bevel gearboxes to the halfshafts. This has no differential axle between wheel stations on each side and so 'wind-up' was a regular problem for these vehicles when driven on roads. If individual wheels were out of phase with their neighbours, possibly caused by cornering or slightly varying tyre", "-32.02485053706914" ], [ "thought to carry over 10 short tons (9,100 kg) of asphalt for ongoing repairs of the highway. The joints between transverse stringers holding up this section of roadway and the eastern main girder (holding the decorative friezes), failed. A four-door sedan followed the truck through the hole; neither driver was seriously injured. It took hours to back all the traffic off the span trapped behind the collapse. It was later learned that the truck was actually carrying 30 tons of asphalt, and was 9 tons overloaded. Blame was assigned to the trucking company, Edenwald Construction Corp. of Whitestone, Queens, but they", "-31.956631862791255" ], [ "so that they have rounded surfaces, to reduce standing water and ice, primarily to prevent frost damage but also increasing traction in poor weather. Some sections of road are now surfaced with porous bitumen to enhance drainage; this is particularly done on bends. These are just a few elements of highway engineering. As well as that, there are often grooves cut into the surface of cement highways to channel water away, and rumble strips at the edges of highways to rouse inattentive drivers with the loud noise they make when driven over. In some cases, there are raised markers between", "-31.945765337964986" ], [ "is dry, there is flying dust and gravel,' she said. 'Truckers from my constituency tell me that the U.S. Customs officials say they are not going to put up with the mud that is coming across on the trucks. There is also concerns about grain seeds and weeds coming across in the mud on truck tires.'...Highway Minister Maynard Sonntag said. 'Highway No. 6 has a much higher traffic count, many more trucks in and out from the States than Highway No. 35 would have.’' \" \"The projects on Highways 39 and 6 will help to improve traffic flow through these", "-31.702414896630216" ], [ "to be very heavy duty.\nDump trucks (\"tippers\" in the UK) transport loose material such as sand, gravel, or dirt for construction. A typical dump truck has an open-box bed, which is hinged at the rear and lifts at the front, allowing the material in the bed to be unloaded (\"dumped\") on the ground behind the truck.\nFlatbed trucks have an entirely flat, level platform body. This allows for quick and easy loading but has no protection for the load. Hanging or removable sides are sometimes fitted.\nSemi-tractors (\"artics\" in the UK) have a fifth wheel for towing a semi-trailer instead of a", "-31.682711568821105" ], [ "adaptable to rough terrain. Major manufacturers include Volvo CE, Terex, John Deere and Caterpillar. Collisions Dump trucks are normally built for some amount of off-road or construction site driving; as the driver is protected by the chassis and height of the driver's seat, bumpers are either placed high or omitted for added ground clearance. The disadvantage is that in a collision with a standard car, the entire motor section or luggage compartment goes under the truck. Thus, the passengers in the car could be more severely injured than would be common in a collision with another car. Several countries have", "-31.462830002768897" ], [ "maintain. Wheeled drivetrains are cheaper and give a higher top speed. The tracked drivetrain has greater off-road capability.\nTires play a significant role for any off-road vehicle equipped with wheels, as they ensure optimal traction required to keep it moving. The off-road tire tread types vary depending on the terrain type. The most common types of off-road tires are A/T (stands for \"All Terrain\") and M/T (stands for \"Mud Terrain\"). While the A/T tires perform excellently on the sand, they are barely usable in the mud. There are also unique Sand Blaster and Mud bogging tires used for the most challenging", "-31.458163554460043" ], [ "the pavement's natural transverse cracks together. Prestressed concrete pavements have also been used in the construction of highways; however, they are not as common as the other three. Prestressed pavements allow for a thinner slab thickness by partly or wholly neutralizing thermally induced stresses or loadings. Drainage system design Designing for proper drainage of highway systems is crucial to their success. Regardless of how well other aspects of a road are designed and constructed, adequate drainage is mandatory for a road to survive its entire service life. Excess water in the highway structure can inevitably lead to premature failure, even", "-31.44442722958047" ], [ "large vehicle will periodically get wedged under a bridge, which causes traffic to back up for several miles. In one incident a truck full of scissors became stuck and spilled its cargo, causing more than 30 cars to get flat tires. There is a 10 foot (3.0 m) height limit for the entire parkway. Local media has taken to referring to these kinds of accidents as a truck being \"Storrowed\", and the city of Boston has annual advisories in August to those renting box trucks for college move-ins to avoid the city's low-clearance parkway system, including Storrow Drive. History Between 1958", "-31.376689094890025" ], [ "Off-road tire Off-road tires (Off-road tyre) are a category of vehicle tires that use deep tread to provide more traction on unpaved surfaces such as loose dirt, mud, sand, or gravel. Compared to ice or snow tires, they lack studs but contain deeper and wider grooves meant to help the tread sink into mud or gravel surfaces. Design Off-road tires are typically radials with thick, deep tread. On dirt surfaces, the exposed edges of the tread dig into soft ground to give more traction than rolling friction alone, analogous to the traction provided by cleated shoes. These off-road tires provide", "-31.267077162163332" ], [ "made rules that new trucks should have bumpers approximately 40 cm (16 in) above ground in order to protect other drivers. There are also rules about how long the load or construction of the truck can go beyond the rear bumper to prevent cars that rear-end the truck from going under it. Tipping Another safety consideration is the leveling of the truck before unloading. If the truck is not parked on relatively horizontal ground, the sudden change of weight and balance due to lifting of the body and dumping of the material can cause the truck to slide, or even to tip", "-31.246079260483384" ], [ "a large number of wide wheels and tires, low tire pressure and low vehicle weight, all result in exceptionally low ground pressure, high grip and off-road ability. Nevertheless, for further enhanced off-road, snow and mud performance, optional tracks can be mounted directly onto the wheels.", "-31.229985878497246" ], [ "in a case of hard braking, the difference in friction will cause the vehicle to start to rotate towards the side offering higher grip. Split friction may cause jack-knifing of articulated trucks, while trucks with towed trailers may experience trailer swing phenomena. Split friction may be caused by an improper road spot repair that results in high variance of texture (roads) and colour (thin ice on newly paved black spots thaws faster than ice on old greyish asphalt) across the road section. Measurement The two ways to measure road slipperiness are surface friction testing and stopping distance testing. Friction testing", "-31.170109722879715" ], [ "\nIn a dump truck, wet materials stick in the top of the tub during unloading and causes trailer roll over. Insurance costs are lower for a live bottom trailer because it does not have to be raised in the air and there are few cases of trailer roll over. Disadvantages Some live bottom trailers are not well suited for heavy rock and demolition. However rip-rap, heavy rock, and asphalt can be hauled if built with the appropriate strength steels.", "-31.097500405972824" ], [ "washed into a road crossing and derailed during a heavy thunderstorm.\nCollision with road debris resulted in a solar vehicle accident at the World Solar Challenge 2007 in Australia.\nRoad debris, for the most part, tends to collect in areas where two-track vehicles such as cars and buses do not drive. In urban areas, this tends to be on the edges (shoulder) and on the crown of the road, and debris frequently collects around traffic islands and junctions. In rural areas, debris collects in the middle of the lane and on the outside of corners and bends. Road debris can be especially", "-31.074117604218372" ], [ "contains a significant proportion of clay becomes very slippery when wet, and in the rainy season, it may be difficult even for four-wheel drive vehicles to avoid slipping off very cambered roads into the drainage ditches at the side of the road. As it dries out, such laterite can become very hard, like sun-dried bricks. Maintenance Gravel roads require much more frequent maintenance than paved roads, especially after wet periods and when accommodating increased traffic. Wheel motion shoves material to the outside (as well as in-between travelled lanes), leading to rutting, reduced water-runoff, and eventual road destruction if", "-30.958625730818312" ], [ "felled and those used for transport on normal highways and roads. Because the roads in forests are rough and often temporary, the suspension and tires of an offroad truck are especially significant. Solid, low pressure and high pressure tires have been used. As many as nine axles may be used to provide low ground pressure and good traction.\nTimber is commonly grown in hilly country unsuitable for farming and so the ability of a log truck to climb a gradient is significant. The steepness depends on the quality of the surface - mud and snow are harder", "-30.9298670499702" ], [ "the AASHO Road Test, heavily loaded trucks can do more than 10,000 times the damage done by a normal passenger car. Tax rates for trucks are higher than those for cars in most countries for this reason, though they are not levied in proportion to the damage done. Passenger cars are considered to have little practical effect on a pavement's service life, from a materials fatigue perspective.\nOther failure modes include aging and surface abrasion. As years go by, the binder in a bituminous wearing course gets stiffer and less flexible. When it gets \"old\" enough, the surface will start losing", "-30.901263577598" ], [ "(dump trucks, garbage trucks and fire-fighting trucks) are normally around this size. Heavy Heavy trucks are the largest on-road trucks, Class 8. These include vocational applications such as heavy dump trucks, concrete pump trucks, and refuse hauling, as well as ubiquitous long-haul 4x2 and 6×4 tractor units.\nRoad damage and wear increase very rapidly with the axle weight. The number of steering axles and the suspension type also influence the amount of the road wear. In many countries with good roads a six-axle truck may have a maximum weight of 44 t (97,000 lb) or more. Off-road Off-road trucks include standard, extra", "-30.828878294560127" ], [ "the rear so the tires would not rub against each other. The dual wheels were used for a variety of body styles, including dump trucks, tow trucks, tankers, fire trucks, and flatbed stake trucks. Wheel nuts changed with each new style of wheel to meet the changes made in the designs of the wheel. Special wheels were produced for ambulances, buses, and funeral coaches (hearses). Variants The Model AA was available with a number of options. Two wheelbases were available, 131.5 inches (3,340 mm) and 157 inches (4,000 mm). Various body styles were available on different chassis.\nThe Model AA Ford", "-30.808530317619443" ], [ "becomes \"gumbo\" which clings to and builds up on tires, wheels, feet and hooves. If caught on dirt roads in the breaks by rain the best (and sometimes the only) course is to simply wait till the surface dries out.", "-30.792873408761807" ], [ "big tyres. The coil sprung axles with torque tubes allow an axle angle offset of up to 30°, giving the tyres a wide range of vertical movement to allow the truck to comfortably drive over extremely uneven terrain, even boulders of one metre in height.\nUnimogs are equipped with high visibility driving cabs to enable the operator to see the terrain and more easily manipulate mounted tools. The newest Unimog models can be changed from left-hand drive to right-hand drive in the field to permit operators to work on the more convenient side of the truck. The ability to operate on", "-30.78393718242296" ], [ "side dump can become stuck if the pile becomes wide enough to cover too much of the trailer's wheels. Trailers that dump at the appropriate angle (50° for example) avoid the problem of the dumped load fouling the path of the trailer wheels by dumping their loads further to the side of the truck, in some cases leaving sufficient clearance to walk between the dumped load and the trailer. Winter service vehicles Many winter service vehicles are based on dump trucks, to allow the placement of ballast to weigh the truck down or to hold sodium or calcium chloride salts", "-30.716337379533798" ], [ "axle is a dead axle situated behind a drive axle. Dead axles are also found on semi trailers, farm equipment, and certain heavy construction machinery serving the same function. On some vehicles (such as motorcoaches), the tag axle may be steerable. In some designs the wheels on a lazy axle only come into contact with ground when the load is significant, thus saving unnecessary tire wear. Lift axle Some dump trucks and trailers may be configured with a lift axle (also known as an airlift axle or drop axle), which may be mechanically raised or lowered. The axle is", "-30.67744527949253" ], [ "the rear wheels did not have to dig new \"ruts\" on muddy curves because most roads of the day were unpaved and often badly rutted.\nThis four-wheel steering mechanism was integrated with Muehl limited-slip differentials on both the front and rear axles. \nFrom the transfer case, shafts led to the top of both the front and rear solid portal axles giving the trucks a very high ground clearance allowing it to drive through mud up to its hubcaps. Engine power was transmitted by half-shafts with a u-joint and bearing that was connected by a pinion gear to each of the four", "-30.655117998598143" ], [ "that the effective damage done to the road is roughly proportional to the Fourth power of axle weight. A typical tractor-trailer weighing 80,000 pounds (36.287 t) with 8,000 pounds (3.629 t) on the steer axle and 36,000 pounds (16.329 t) on both of the tandem axle groups is expected to do 7,800 times more damage than a passenger vehicle with 2,000 pounds (0.907 t) on each axle. Potholes on roads are caused by rain damage and vehicle braking or related construction works.\nPavements are designed for an expected service life or design life. In some parts of the United Kingdom the", "-30.578605133807287" ], [ "road surface while gritters drop road salt and sand, which both melts the snow and ice from the road surface, and provide a rougher surface to grip onto. However, in dry conditions, sand and salt on the road surface can themselves increase road slipperiness and pose a danger to road traffic, and therefore, roads are cleared by street sweepers after roadworks and gritting to make sure that all the loose material is cleared from the road surface.", "-30.576736870978493" ], [ "Dump truck A dump truck, known also as a dumper truck or tipper truck, is used for taking dumps (such as sand, gravel, or demolition waste) for construction. A typical dump truck is equipped with an open-box bed, which is hinged at the rear and equipped with hydraulic rams to lift the front, allowing the material in the bed to be deposited (\"dumped\") on the ground behind the truck at the site of delivery. In the UK, Australia and India the term applies to off-road construction plant only, and the road vehicle is known as a tipper lorry (UK, India),", "-30.47308694894309" ], [ "damage paved roads as much as tracks, but provide less traction.\nIn construction areas loaders are also used to transport building materials - such as bricks, pipe, metal bars, and digging tools - over short distances.\nFront-loaders are commonly used to remove snow especially from sidewalks, parking lots, and other areas too small for using snowplows and other heavy equipment. They are sometimes used as snowplows with a snowplow attachment but commonly have a bucket or snow basket, which can also be used to load snow into the rear compartment of a snowplow or dump truck.\nHigh-tip buckets are suitable for light materials", "-30.453969626192702" ], [ "composed of small stones compacted into a hard, durable surface. \"Road metal\" later became the name of stone chippings mixed with tar to form the road surfacing material tarmac. A road of such material is called a \"metalled road\" in Britain, a \"paved road\" in Canada and the US, or a \"sealed road\" in parts of Canada, Australia and New Zealand.\nA granular surface can be used with a traffic volume where the annual average daily traffic is 1,200 vehicles per day or less. There is some structural strength if the road surface combines a sub base and base and is", "-30.453344331632252" ], [ "fiberglass body. The trucks are 13'5\" long and 5'2\" high, feature a three-speed transmission and can reach speeds as high as 140 mph (230 km/h). A portion of the frame protects the driver from rolls. Next to the driver is a 5-US-gallon (19 l) jug that catches fluids which may have spilled from damage that the truck sustains. Each truck may race with tires from Toyo Tires or Continental Tire, while Hawk Performance provides brake pads.\nThe trucks are identical to each other, though drivers are allowed to change some aspects of their trucks, such as the spring rates, ride heights and camber. Gordon,", "-30.43549810521654" ], [ "pallet truck which could be moved under a wooden platform before lifting it off the floor to move it. Tipping hoppers were also made, although owing to the limitations of the small wheels, these were not intended for gardens or construction sites, as has often been claimed, but were mostly for collecting waste materials around factories. Another variation shortened the body and the truck was used for towing trailers.\nRoad performance of the Auto-Truck was improved by fitting larger rear wheels with pneumatic tyres. Several tyre and suspension spring options remained in production throughout its history. An early development even offered", "-30.418441250163596" ], [ "way to repair road, it has some drawbacks. Loose crushed stone is often left on the surface, owing to underapplication of bitumen or overapplication of stone. If not removed, this can cause safety and environmental problems such as cracked windshields, chipped paint, loss-of-control crashes (especially for motorcyclists, bicyclists and small trucks), and deposition of foreign material into drainage courses. Therefore, it is very important to sweep the road after the emulsion sets. As mentioned earlier, this problem can be minimized by using chips precoated with bitumen. Overapplication of emulsion can lead to bleeding, a condition where the excess asphalt rises", "-30.382895327114966" ], [ "at April 2016, the road surface has deteriorated and is heavily potholed. Accidents and Black-spots For the traffic that it has, the Kisii-Sirare road is too narrow. In some occasions, overtaking vehicles (particularly buses and trailers) have to get one set of wheels to overlap the road as there is not enough space. Large vehicles also have to slow down when they meet as it is often that one of them, or both of them, will have to get the outside set of wheels off the road. These are factors that have led to many pedestrians and cyclists being hit.\nThe", "-30.31041922426084" ], [ "like road recyclers where they can also blend the old road surface in the mixture. Road pavement mill A road pavement mill is a construction vehicle with a powered metal drum that has rows of tungsten carbide tipped teeth that cut off the top surface of a paved concrete or asphalt road. Usually (since sustainability is now very important) extracts the material for recycling into new asphalt. In some applications the entire road pavement can be removed. The reasons for removal may be that the road surface has become damaged and needs replacing.\nIt is a very high-powered machine, with some", "-30.296074616489932" ], [ "report estimates that urban drivers pay an average of $746/year on vehicle repairs while the average US motorist pays about $335/year. In contrast, the average motorist pays about $171/year in road maintenance taxes (based on 600 gallons/year and $0.285/gallon tax). Slab stabilization Distress and serviceability loss on concrete roads can be caused by loss of support due to voids beneath the concrete pavement slabs. The voids usually occur near cracks or joints due to surface water infiltration. The most common causes of voids are pumping, consolidation, subgrade failure and bridge approach failure. Slab stabilization is a non-destructive method of solving", "-30.25868383559282" ], [ "be carried on improved roads and most US trucks in the past have used them. Single, larger tires in a line (having the same track) work better and get stuck less often on soft ground. The M939A1 and M939A2 series use oversized 14:00 R20 tires and rear tandem \"Super Singles\". M939A2 series vehicles use a central tire inflation system (CTIS).\nThere are three wheelbases (measurements are from the centerline of the front axle to the centerline of the rear tandem). The short, used for tractors and dump trucks, is 13 feet 11 inches (4.24 m), the long (\"standard\"), used for cargo", "-30.224685432040133" ], [ "Dirt road Driving on dirt roads While most gravel roads are all-weather roads and can be used by ordinary cars, dirt roads may only be passable by trucks or four-wheel drive vehicles, especially in wet weather, or on rocky or very sandy sections. It is as easy to become bogged in sand as it is in mud; a high clearance under the vehicle may be required for rocky sections.\nDriving on dirt roads requires great attention to variations in the surface and it is easier to lose control than on a gravel road. Laterite and murram roads In Africa, parts of", "-30.22315901251568" ], [ "trucks no longer exists therefore.\nIn military use, the COE design increases the chance of crew injury or death in the event of running over a landmine. This is because the tire that detonates the mine is directly below/beside the driver.", "-30.200157562969252" ], [ "crashes (about 30 percent of crashes) where the top failure for trucks is caused by the brakes (29 percent of the time compared to 2% of the time for the car).\nTruck drivers often spend their nights parked at a truck stop, rest area, or on the shoulder of a freeway ramp. Sometimes these are in secluded areas or dangerous neighborhoods, which account for a number of deaths due to drivers being targeted by thieves for their valuable cargo, money, and property, or for the truck and trailer themselves. Drivers of trucks towing flatbed trailers are responsible for securing and strapping", "-30.162247937521897" ], [ "time, the largest tires the trucks were running were 48 inches (1.2 m) in diameter.\nIn April 1981, Bob Chandler drove over junked cars in Bigfoot in what is often believed to be the first monster truck to crush cars. Chandler drove Bigfoot over a pair of cars in a field as a test of the truck's ability, and filmed it to use as a promotional tool in his four-wheel drive performance shop. An event promoter saw the video of the car crush and asked Chandler to do it in front of a crowd. Initially hesitant because of the \"destructive\" image that", "-30.098781768465415" ], [ "lanes to reinforce the lane boundaries; these are often reflective. In pedestrian areas, speed bumps are often placed to slow cars, preventing them from going too fast near pedestrians.\nPoor road surfaces can lead to safety problems. If too much asphalt or bituminous binder is used in asphalt concrete, the binder can 'bleed' or flush' to the surface, leaving a very smooth surface that provides little traction when wet. Certain kinds of stone aggregate become very smooth or polished under the constant wearing action of vehicle tyres, again leading to poor wet-weather traction. Either of these problems can increase wet-weather crashes", "-29.97839003551053" ], [ "2004, a AAA Foundation for Traffic Safety study revealed that vehicle-related road debris caused 25,000 accidents and nearly 100 deaths a year. Causes Road debris can be caused by various factors, including objects falling off vehicles or natural disasters and weather, specifically wind, storms, tornadoes, hurricanes, etc. Road surface Road debris is a hazard that can cause loss of vehicle control with damages ranging from a flat tire, vehicular rollover, penetration of the passenger compartment by the debris, or collision, with accompanying injuries or deaths. In the year 2011, the National Highway Traffic Safety Administration's Traffic Safety Facts found that", "-29.97541137051303" ], [ "concern about highways with narrow paved shoulders is the condition of the adjacent gravel shoulder. Sometimes, the paved and gravel shoulders are combined as the \"recovery zone\" beyond the rumble strip. However, if the gravel is loose, soft, non-level, eroded, or there is an \"edge-drop\" from the pavement to the gravel, then the gravel shoulder portion will be ineffective for recovery, especially at highway speeds. When a vehicle's tires sink into a soft shoulder, thus compromising vehicle handling, it is known as \"vehicle tripping\".\nVirtual rumble strips require an adequate recovery zone as well. Climate Climate is another factor that", "-29.908323235227726" ], [ "of weight compared to tires. Continuous tracks allow the operator to carry heavier payload on slick, snowy, or muddy surfaces, and are popular in some countries. Background Early British dumpers had a payload of about a ton and were 2-wheel drive, driving on the front axle and steered at the back wheels. The single cylinder diesel engine (sometimes made by Lister) was started by hand cranking. The steering wheel turned the back wheels, not front. Having neither electrics nor hydraulics there was not much to go wrong. The skip was secured by a catch by the driver's feet. When the", "-29.898398821766023" ], [ "Flatbed truck Road trucks A flatbed has a solid bed, usually of wooden planks. There is no roof and no fixed sides. To retain the load there are often low sides which may be hinged down for loading, as a 'drop-side' truck. A 'stake truck' has no sides but has steel upright pillars, which may be removable, again used to retain the load.\nLoads are retained by being manually tied down with ropes. The bed of a flatbed truck has tie-down hooks around its edge and techniques such as a trucker's hitch are used to tighten them. Weather protection is optionally", "-29.815828660997795" ], [ "one of the tires on the trailer bed was flat and was being ripped piece by piece on the highway. This was videoed by a passenger in a motor vehicle behind the truck and the video went viral on internet. Unfortunately, no one was injured.\n(2) This next point is shocking. Another truck travelling down south of the island with an intermodal container was bolting on the highway with a motor vehicle. The truck driver was descending down the highway fast with a container and posing a risk to other motor vehicles and road users. The attempted vehicle the truck was", "-29.80126217092038" ], [ "both radially and axially. As the blocks are still large though and unsiped, water clearance from the block surface is still poor and the tyres still have a risk of aquaplaning on wet tarmac, compared to a typical road tyre. This pattern is also directional and so wheels should be mounted as either left-side or right-side.", "-29.772019086231012" ], [ "long tons; 3.5 short tons) and were equipped with two wheel hub motors with a power output of 20 PS (15 kW).\nThe wheels of each vehicle were made of wood. The front wheels were fitted with single-layer solid rubber tyres, and the rear wheels had double layered tyres. The two hub motors were very vulnerable, partly due to the vehicles' lack of suspension, and partly because they were not fully enclosed like their present-day equivalents. These weaknesses led to breakdowns, as the roads were still unpaved dirt roads, causing the motors to suffer from dust exposure. For these reasons, the three trolleybuses", "-29.76474801214863" ], [ "environments as the deep sea floor, and the surfaces of the Moon and Mars. Snowmobiles once used cleated tracks, but racing snowmobiles are banned from using cleated track for safety reasons and instead use rubber tracks.\nProtrusions molded into rubber tractor tire treads are known as lugs, as are cleats for round wheels, which perform a similar function. Unlike metal grousers, these rubber tire treads or crawler-track shoes/pads may be more suitable for driving on roads.", "-29.708122731244657" ], [ "the spare tire was mounted behind the cab, thus allowing a truck-bed measuring only 9 ft (2.74 m) long. These “prime mover”-style bodies were not a success as the US6 was to be mainly used for transporting cargo.\nThe U3/U4 and the 6x4 U7/U8 cargo trucks had a longer wheelbase, which allowed the spare tire to be mounted under the 12 ft (3.66 m) truck-bed. 197,000 trucks with the 12 ft (3.66 m) truck-bed were built.\nThe U5 tank truck had a long wheelbase and a two-compartment 750 U.S. gal (2,800 l) tank mounted on the truck-bed. Tanker trucks were not equipped with winches.\nThe 6x4 U6 semi-tractor was the only semi-tractor", "-29.615387191064656" ], [ "can be a pop-up or out that extends from the trailer. Tear Drop While there are some tear drop trailers that are not off-road specific many tear drops are designed with rugged tires, sturdy materials and suspension flexibility to be taken off the pavement. All storage and living space is contained inside the trailer. Most models have the kitchen outside with a separate door or opening. Military/Utility (M416/M101) Retired military trailers are built to withstand rough terrain and conditions often associated with combat zones, which makes them overbuilt for most off-road travel. The trailer is often used as storage and", "-29.56872459879378" ], [ "end of a vehicle, the inside wheel on that end will lift, causing a change in handling characteristic. If it reaches half the weight of the vehicle it will start to roll over. Some large trucks will roll over before skidding, while passenger vehicles and small trucks usually roll over only when they leave the road. Fitting racing tires to a tall or narrow vehicle and then driving it hard may lead to rollover.", "-29.55605768004898" ], [ "normal trucks are equipped with robotic arms to collect trash bins and dumpsters without the need for workers to exit the vehicles. Flatbed trucks are used for special pickups that are too large for normal trucks, and hauling away construction waste.", "-29.54943834117148" ], [ "over it. A retractable front spoiler can reduce scraping of the car on curbs or other road imperfections, while still improving drag at high speeds. Other vehicles Heavy trucks, like long haul tractors, may also have a spoiler on the top of the cab in order to lessen drag caused from air resistance from the trailer it's towing, which may be taller than the cab and reduce the aerodynamics of the vehicle dramatically without the use of this spoiler. The trailers they pull can also be fitted with under-side spoilers that angle outward to deflect passing air away from", "-29.54372095398503" ], [ "direction), although later the steering wheel did both speed and direction. Some trucks pulled trailers, some (like the dump truck) did not. The line was unique because of the ability to pick up and deliver the loads, doing so with help from various accessories including a pipe loader, and a gravel loader, all without intervention from the operator.\nThe roadway had special junctions, allowing the trucks to reverse into special loading and unloading docks. Loading/unloading was done automatically, usually by contact with the truck reversing in, but in the case of the crane, bulldozer and airport the movement was driven by", "-29.541474761179416" ], [ "loads that it would normally endure. There are many ways that the subbase or base can be weakened.\nPoor drainage in the road bed is a frequent cause of this degradation of the base or subgrade. A heavy spring thaw, similarly to poor drainage, can weaken the base course, leading to fatigue cracking. \nStripping or raveling is another possible cause of fatigue cracking. Stripping occurs when poor adhesion between asphalt and aggregate allows the aggregate at the surface to dislodge. If left uncorrected, this reduces the thickness of the pavement, reducing the affected portion's ability to carry its designed loading. This", "-29.531107430986594" ], [ "crack, and in more severe cases, the markers contribute to road surface raveling (a process in which the aggregate particles are dislodged from the road surface, causing the surface texture to become deeply pitted and very rough) or potholes.\nThis type of surface damage can be found exclusively underneath the pavement markings such as lane markings and turn-lane arrows. There is no definitive explanation of the relationship between pavement markings and surface deterioration, but there are several hypotheses. One is that water vapor may have been trapped underneath the road surface markings, causing the de-bonding of asphalt binder from the aggregate", "-29.528601516387425" ], [ "or tires can cause the vehicle to hydroplane.\nHeavy rainfall, snowmelt, or high levels of groundwater may trigger a movement of soil or sediments, possibly causing mudslides, landslides, avalanches, or sinkholes.\nMudslides in volcanic terrain (called lahars) occur after eruptions as rain remobilizes loose ash deposits.\nMudslides are also common in the western United States during El Niño years due to prolonged rainfall.\nAnother problem mud creates is it can prove difficult to get out of if stuck, most bogs are more dangerous than quicksand because you can sink deep in to the mud. You can drown in a peat bog because they are", "-29.52333437956986" ], [ "and a car entered the section, the remaining expansion joint failed, and the deck crashed into the river below.\nThe ensuing investigation cited corrosion from water buildup due to inadequate drainage as a cause. During road mending some 10 years before, the highway drains had been deliberately blocked and the crew failed to unblock them when the road work was completed. Rainwater leaked down through the pin bearings, causing them to rust. The outer bearings were fracture-critical and non-redundant, a design flaw of this particular type of structure. The bearings were difficult to inspect close-up, although traces of rust could be", "-29.49548154126387" ], [ "semi end dump has a 3-axle tractor pulling a 2-axle trailer with dual tires, in the EU trailers often have 3 axles and single tires. The key advantage of a semi end dump is a large payload. A key disadvantage is that they are very unstable when raised in the dumping position limiting their use in many applications where the dumping location is uneven or off level. Transfer dump truck A transfer dump is a standard dump truck pulling a separate trailer with a movable cargo container, which can also be loaded with construction aggregate, gravel, sand, asphalt, klinkers, snow,", "-29.465906287543476" ], [ "wheel. During maintenance, the choice of material can be inadequate for motorcycles. For example, asphalt sealer is used to fill and repair cracks in asphalt paving, but this often creates a slick surface that can cause a motorcycle to lose traction. Sometimes, steel plates are used as temporary covers over road trenches. The sliding nature of those, combined with an inappropriate installation can cause incidents.\nAustralian motorcycle advocate Rodney Brown writes that the nature and likely consequences of hazards differ significantly for motorcyclists compared to drivers of other vehicles.\nFor example, the current highway standards in the US permit pavement ridges of", "-29.452803586102164" ], [ "DG, and water will collect in the wheelpaths. This is more prevalent on asphalt pavement, but concrete pavements are not immune. Before wet pavement crashes reach unacceptable levels, maintenance actions such as resurfacing or diamond grinding should be taken, even if other pavement distress such as cracking is still low.", "-29.441875673510367" ], [ "for use both on- and off-road. Such tires attempt to compromise between grip on loose terrain and safety or comfort on paved roads. Some tires, such as the bar grip used on United States military vehicles in World War II, accomplish this by separating the tire into distinct on-road and off-road tread zones. Modern all-terrain tires typically employ hybrid tread patterns and tougher compound to increase the wear life under mixed-surface conditions.", "-29.40147741799592" ], [ "of an automobile, because the rim supports the tire's profile.\nThe sidewall is that part of the tire, or bicycle tire, that bridges between the tread and bead. The sidewall is largely rubber but reinforced with fabric or steel cords that provide for tensile strength and flexibility. The sidewall contains air pressure and transmits the torque applied by the drive axle to the tread to create traction but supports little of the weight of the vehicle, as is clear from the total collapse of the tire when punctured. Sidewalls are molded with manufacturer-specific detail, government mandated warning labels, and other consumer", "-29.37254287826363" ], [ "causing it to melt at lower temperatures and run off to the edge of the road, while sand increases traction by increasing friction between car tires and roadways. The amount of salt dropped varies with the condition of the road; to prevent the formation of light ice, approximately 10 g/m² (2.0 lb/1000 sq ft; 0.018 lb/sq yd) is dropped, while thick snow can require up to 40 g/m² (8.2 lb/1000 sq ft; 0.074 lb/sq yd) of salt, independent of the volume of sand dropped. The grit is sometimes mixed with molasses to help adhesion to the road surface. However, the sweet molasses often attracts livestock, who lick the road.\nGritters are among the", "-29.30491196247749" ], [ "rained. The surface soon broke up under heavy military traffic. The road was only wide enough to allow for one-way traffic and had a number of hairpin bends that required 3-ton trucks to make three-point turns. The 10th Advanced Ordnance Depot was established at 17 Mile in prefabricated huts, erected by Papuan labour, while the 8th Advanced Ammunition Depot handled the ammunition depots at 12 Mile and 19 Mile. In the crisis days of early 1942 some 2,500 tonnes (2,500 long tons) of ammunition was dumped where it was unloaded off the trucks and covered with tarpaulins, with only one", "-29.28988584706167" ], [ "debris fell on it during a heavy rainstorm, covering the surface in as much as 4 feet (1.2 m) in places. In January 2008 a landslip at Cowms Moor following heavy rain caused the road to be closed to all traffic between Ladybower and Glossop, although access was still available to local premises and businesses including the Snake Pass Inn. A subsequent investigation by the British Geographical Survey showed the road has had a history of subsidence-related long-term closures dating back to the 1930s, including a 1970s project that attempted to strengthen the layer below the tarmac with local rock fill.", "-29.278730445890687" ], [ "turning in a corner of a track. This could cause a bead of the tire to come off the rim completely, or enough to cause partial loss of air. It is also possible for the tire to have more traction on the ground than there is friction between the tire and rim. In this case the wheel would slip around the tire beads without turning the tire. Beadlocks, of one form or another including adhesive, are therefore used to keep the beads of off-road tires firmly seated and prevent slip, even when inflation pressure is low. Standard beadlocks A standard", "-29.263761843321845" ], [ "rear and can be moved forward or back until the front of it is lowered onto the ground. The containers are usually open-topped boxes used for rubble and building debris, but rubbish compactor containers are also carried. A newer hook-lift system (\"roller container\" in the UK) does the same job, but lifts, lowers, and dumps the container with a boom arrangement instead of a cable and hoist. Off-highway dump trucks Off-highway dump trucks are heavy construction equipment and share little resemblance to highway dump trucks. Bigger off-highway dump trucks are used strictly off-road for mining and heavy dirt hauling jobs.", "-29.257527679030318" ], [ "from roads. Rainwater and snowmelt running off of roads tends to pick up gasoline, motor oil, heavy metals, trash and other pollutants and result in water pollution. Road runoff is a major source of nickel, copper, zinc, cadmium, lead and polycyclic aromatic hydrocarbons (PAHs), which are created as combustion byproducts of gasoline and other fossil fuels.\nDe-icing chemicals and sand can run off into roadsides, contaminate groundwater and pollute surface waters; and road salts can be toxic to sensitive plants and animals. Sand applied to icy roads can be ground up by traffic into fine particulates and contribute to air pollution.\nRoads", "-29.187592488728114" ], [ "that automobiles would not become mired down in mud in the low-lying areas. However, the gravel was too thick, and loose gravel meant horses needed to be shoed and cars would careen wildly over the road, and so therefore the grass trail alongside the road was used instead. The Department of Public Works fixed this problem by mixing clay with the gravel. This era was followed by four-horse teams pulling a sulky plow across the roads, eliminating ruts and forming a hard and level surface to drive upon. The 1920s were indeed years of road work;", "-29.185354704095516" ], [ "of oxygen, nutrients, and minerals between water and sediment.\nBelow the surface, the burrows of some species form intricate lattice-like networks and may penetrate a meter or more downwards. This means that the burrowed mud is a productive habitat, providing food and shelter for a wide range of mud-dwellers and other animals that forage in and over the mud. Problems Mud can pose problems for motor traffic when moisture is present, because every vehicle function that changes direction or speed relies on friction between the tires and the road surface, so a layer of mud on the surface of the road", "-29.086581587143883" ], [ "a series of cracks in the asphalt parallel to the building line and extending a distance of 15 to 20 feet of the center of the road. At the building line, the pavement had sunk between 2 and 3 feet throughout the length of the frontage. The absence of firm rock stratum to support the cylinders as originally designed necessitated a reduction of their bearing pressure. A specialist had to be brought in from the United Kingdom to advise on the project requirements. \nTo avoid the further risk of loss of ground, the sinking of the cylinders were stopped. The", "-29.08105869431165" ], [ "more than the rear wheel, is more dangerous since front wheel steering is critical for maintaining balance.\nAlso, because real tires have a finite contact patch with the road surface that can generate a scrub torque, and when in a turn, can experience some side slipping as they roll, they can generate torques about an axis normal to the plane of the contact patch.\nOne torque generated by a tire, called the self aligning torque, is caused by asymmetries in the side-slip along the length of the contact patch. The resultant force of this side-slip occurs behind the geometric center of the", "-29.07439333817456" ], [ "clips inside the body that attached to the sides of the chassis; they are known as \"side-clips.\" They also came with a set of foam tires. 1981 brought five new Stomper trucks: the Chevrolet LUV, Datsun Li'l Hustler, Jeep Renegade, Subaru BRAT, and Toyota SR5. The Stunt Set and Wild Mountain sets also returned, though different pieces were shown in the 1981 catalog. The short-lived Stomper SSC Super Cycles also debuted in 1981. The trucks were also sold with an additional set of rubber tires so that they could be driven outdoors.\nThe Jeep Cherokee and Jeep Scrambler were the new", "-29.068808577401796" ], [ "body.\nTank trucks (\"tankers\" in the UK) are designed to carry liquids or gases. They usually have a cylindrical tank lying horizontally on the chassis. Many variants exist due to the wide variety of liquids and gases that can be transported.\nWreckers (\"recovery lorries\" in the UK) are used to recover and/or tow disabled vehicles. They are normally equipped with a boom with a cable; wheel/chassis lifts are becoming common on newer trucks. Driving In many countries, driving a truck requires a special driving license. The requirements and limitations vary with each different jurisdiction. Europe Driving licensing has been harmonized throughout the", "-29.0061653096418" ], [ "gear reduction at the hub to help turn the tires. All trucks have hydraulic steering in both the front and the rear (four wheel steering), with the front wheels controlled by the steering wheel and the rear wheels by a toggle switch. \nThe tires are typically \"Terra\" tires used on fertilizer spreaders, and are of size 66\"×43\"-25\", that is, 66-inch diameter, 43-inch width, to fit 25-inch diameter rims (168×109-63 cm). \nMost trucks utilize a modified or custom-designed automatic transmission, such as a Turbo 400, Powerglide, Ford C6 transmission, or a Torque-flite 727. A limited number of trucks utilize a Lenco transmission,", "-29.005584174068645" ], [ "changing the tire more unpleasant and the mechanism may also rust on older cars, making it difficult to free the spare. The cradle arrangement is usually only practical on front wheel drive cars, as the cradle would get in the way of the rear axle on most rear or four wheel drive cars. A similar arrangement is also often found on trucks where the spare is often stored beneath the truck bed.\nMany sport utility vehicles (SUVs) and off-road vehicles have the spare wheel mounted externally – usually on the rear door, but others may mount them on the roof, the", "-28.981591448893596" ], [ "heavy-duty highway-legal trucks, typically outfitted with off-road features such as a front driving axle and special tires for applications such as logging and construction, and purpose-built off-road vehicles unconstrained by weight limits, such as the Liebherr T 282B mining truck. Design Almost all trucks share a common construction: they are made of a chassis, a cab, an area for placing cargo or equipment, axles, suspension and roadwheels, an engine and a drivetrain. Pneumatic, hydraulic, water, and electrical systems may also be present. Many also tow one or more trailers or semi-trailers. Engines and motors Most small trucks such as sport", "-28.96995791342306" ], [ "their maximum grip on loose surfaces, but on paved surfaces the smaller contact patch affords less traction as compared to street tires. Tires with less aggressive knobs (smaller knobs and the shape of the tread cross-section closer to that of street tires) can provide a compromise, giving less grip off-road, but a grip closer to that of street tires on paved surfaces. Such tires are useful for enduro and dual-sport motorcycles and other vehicles designed to be used both off-road and on pavement.\nSome off-road tires are designed to be used with low inflation pressure on difficult terrain, reducing their rigidity", "-28.937616323586553" ], [ "use of road salt in the winter. The salt created corrosion of the steel within the concrete bents (vertical columns and horizontal caps), which expanded and weakened the steel and caused pieces of concrete to fall off. Remedial work had to be applied starting in the 1990s at a cost of $8 million per year. The remedial work included sealing expansion joints to force the salty water into the drains and extensive patching of the concrete columns. Exposed steel was sand-blasted and repainted.\nThe annual maintenance costs for the Gardiner Expressway were estimated in 2011 at $12 million per year. According", "-28.933711557430797" ], [ "to December 2009. Problems with road surface and their remediation In 2008, shortly after the road received the I-795 designation, major flaws developed in the route's paving surface. Though rated for a 15-year life span, the pavement began to deteriorate after only 16 months of use. During the planning of the road, as early as 2003, some engineers had warned that the thin pavement would be inadequate for heavy truck traffic. However, most NCDOT officials deemed a thicker road surface too expensive, as it would have added approximately $2.8 million to the cost of the road. At first,", "-28.899723852809984" ], [ "it was better to have the wheel flanges located inside the rails, and thus the distance measured on the inside of the wheels (and, by extension, the inside faces of the rail heads), was the important one. Studded tires On relatively level highways, the depth of the ruts due to carbide studded tires is relatively uniform; however, on hilly highways the ruts tend to be deeper on the uphill sections compared to the downhill and level sections. On the uphill sections, the vehicle delivers more power to the wheels to overcome gravity, thereby, increasing the shearing force of the studs", "-28.899454524129396" ], [ "trains. This is reflected in the most popular configurations of trucks generally having dual drive axles and three axles on the trailers, with four tyres on each axle. This means that Australian single semi-trailer trucks will usually have 22 tyres, which is generally more than their counterparts in other countries. Super single tyres are sometimes used on tri-axle trailers. The suspension is designed with travel limiting, which will hold the rim off the road for one blown or deflated tyre for each side of the trailer, so a trailer can be driven at reduced speed to a safe place for", "-28.878084256895818" ], [ "following the canyon.\nDuring dry weather road 400 is a reasonably good quality dirt road (mostly sand and clay over a sandstone foundation). If the road has been recently graded it may be suitable for passenger cars, however high clearance vehicles are recommended.\nIt is considered impassable in wet weather. Many sections traverse ancient seabed deposits of mudstone, silt, and shale. When wet the clay surface becomes exceptionally slick, even four wheel drive is rendered useless. Additionally many drainages cross the road in various locations, and these may wash out during periodic flash flooding, particularly during summer thunderstorms. Even in dry", "-28.87257498514373" ], [ "the tyres may compact part of the last furrow slice turned on the previous run. The use of furrow widener or a longer mouldboard on the rear body will overcome the problem. The latter moves the soil further towards the ploughed land leaving more room for the tractor wheels on the next run.\nDriving with all four wheels on unploughed land is another solution to the problem of wide tyres. Semi-mounted ploughs can be hitched in a way that allows the tractor to run on unbroken land and pull the plough in correct alignment without any sideways movement (crabbing). Riding and", "-28.84070406941464" ] ]
1b6ybw
How does a smoker feel, when wants to smoke, but doesn't have a cigarette
[ "It's kind of like being thirsty without water", "It's like the beginning stages of an anxiety attack. It's hell when you're already stressed out. I feel like all my organs are pushing up to my heart and lungs, making them both work harder. You have a one track mind and cannot focus on anything but smoking. Then when you get one it's like you've just had a pile of rocks removed from the top of you.", "Eating 1 Pringle then leaving the pack open in front of you- you could just not have one, but fuck it.", "For whatever reason, I can smoke casually and occasionally and never feel physically addicted. My grandfather and uncle were the same. But when I do feel the desire to partake, I feel a tightness or pressure in my chest that is relieved by inhaling, as though I'm filling a hole in my chest. I also want to say that it's not worth trying cigarettes in order to experience the unique sensation. I used to be a drug rehab counselor in a prison and I can tell you 100% of the time, cigarettes were the first substance my clients became addicted to, and the last they ever gave up.", "Like not being invited to a party. Sad and somehow get in a bad mood and say things you don't mean. Like not sleeping for a while. And you know it can all be better if you just go smoke.", "Have you ever been dumped, or fired? Reaching for a cigarette and finding an empty pack feels like the Universe just broke up with you, and now you'll never feel pleasure again.", "I'll try to describe it. It's starting mentally, the same it would do if you really, really needed a glass of water. It's much like when you have made a run on a hot day. The need for water you feel there = the need for a cigarette after 2-3 hours. If you don't take one (it's your own choice after all) the need starts to get physical. You lungs start to tickle - not in a bad way. It's like when you scrath something, so it kindda feels good, but also like you want to do something about it - a teasing feeling. If you still not choose to take a cigarette it gets worse. Your throat starts to tickle the same way your lungs now do, and you can nearly taste the wonderful taste of nicotine on your tungue, imagine the taste like candy or chocolate (it dosn't taste like that, but it feels the same way). Maybe imagine the taste like when you have emptied a bag of chips and there is nothing left in the bag, but you still feel like eating more of them - something like that. If you still not choose to take a cigarette it starts to get really bad. Your heart starts to beat faster and you can really feel the shape of your lungs from the ticking feeling, which is no longer pleasant, but much more of a nuisance to you. Your mouth gets dry and you start shaking - not much, but it's there. You still don't want a cigarette? You start losing the ability to think straight, and can only concentrate on what it would feel like to smoke a cigarette. Everything becomes slighty more insignificant compared to the feeling of nicotine in your body. But hey, you can stop whenever you want to. Source: I'm a smoker Source of error: I'm suffering from anxiety as well, and maybe it mixes up with the nicotine addiction.", "For me, its not even the literal cigarette that gets me. Its me convincing myself of alternate scenarios in which a cigarette is present for me to have. My own psychology used against me. Its like Dark Link in the water temple, but its actually a camel. btw, nine days without one! first people I've told! been smoking since I was thirteen, super excited.", "Like i want to rip someones face off. It's one thing if I have some and want one, no biggie. But if I dn't have any? Well I make things happen lol Edit: I realize how pitiful this is and how much it controls my life.... maybe I should really make an effort to quit.", "this is actually the reason i started smoking, sadly enough. i wanted to know what made my dad \"decide\" he needed to light up when he did. now i know. its an uncontrollable urge to satisfy a need you dont understand. what's worse than wanting to smoke and not having a cigarette is wanting to smoke, having a cigarette, and not having a source of fire. i can't help but blame god when i don't have a cigarette and want one. so, think of the most awful thing ever and blaming god for it, in that moment you feel desperate, lost, out of control and angry. :)", "To me it feels like I can hear my phone ringing but I can't find it.", "I would feel anxious and then when I would finally get to smoke it would be almost instant relief.", "My lifestyle doesn't necessitate that I stop smoking for more than an hour or two, basically ever (except sleeping). So for me, and for probably a lot of smokers, it is second nature. It is almost always exactly one hour between when I smoke cigarettes. There are some exceptions to this. Certain things just immediately activate me lighting up. After a meal. When I get into a car. After sex. After smoking something... else. When I make what I know will be a long phone call. On the rare occasions that I can not smoke for a long time, such as a long plane ride, it is more mental for me than it seems to be for most people. Even after an 8 hour cross-country plane ride with a layover, it is simply a \"want\". It doesn't \"feel\" like anything. I think this is because I know that having a cigarette is simply not a possibility in these circumstances. So I think about it, increasingly more as time passes, but I don't experience what I would describe as a physical withdraw. Note that when I say I think about it \"more\" as time passes. I am talking about once every couple minutes here. Unless I can distract myself with a book. I have tried to quit a few times, but even then I have used an electronic cigarette, nicotine gum, or a patch. I have not gone one day without nicotine in my body since 1999. :/", "I usually equate it to the panic you get when you hold your breathe.", "motivated to get my ass up and go to the store", "I started smoking to find out. Horrible decision.", "I am a smoker who has tried to quit on multiple occasions. I've also casually read up on smoking and how the brain works when it's addicted. The best way I can describe it, is that it's very much like being hungry. When you've eaten a meal, your brain releases chemicals that you interpret as a feeling of satisfaction. When you smoke a cigarette, very similar chemicals are released and you feel satisfied. When people can't have a cigarette they may get irritable. How would you feel if you had to work all day without lunch? It's a very similar craving, and it's insidious how it commandeers your natural instincts for food. Smoking is also an appetite suppressant for this reason.", "One time a smoker, always a smoker. It doesn't matter if you're on a smoking-break for the rest of your life, that feeling to grab a cigarette will creep up on you when you least expect it. The constant feeling of \"something is missing\". A lot of people confuse the feeling with hunger or thirst, but no matter how much you eat or drink, it's still there. This is worst the months after quitting but it's still with me, and it's strongest when you least want it to be i.e. stressed out, sad, in shock, basically places where you are most vulnerable.", "I once \"taco'ed\" a quad at the dunes... broken clavicle, separated shoulder, separated sternum, 3 broken ribs and broken ulna. I regained consciousness before anyone noted the accident and in a panic desperately struggled to get up and walk to prove I wasn't crippled. Same panic ensued when my head went through a windshield in car accident. That panic and fear is similar to how I feel when I don't have a smoke easily accessible. As a matter of fact, I'm feeling a little jittery right now.", "I'm writing a paper that's due tomorrow. I should go smoke. No I don't have time right now, later. But then I will get more done because I'll be relaxed. Later. Right now. Maybe. Well I'm not making any progress anyway. I wonder how much I've smoked today. One more. Wait, I need to work on this paper. After this page. I'll go. And it's like that in circles all day over and over even right after I've smoked. TL;DR: Don't.", "It's a nagging feeling. Anxious. Like someone keeps whispering in your ear \"a cigarette would be *great* right now. And it never goes away. 3 years strong right now.", "Like having an itch that you can't scratch" ]
[ [ "a customer walks in smoking and asks him for a room, Anil tells him that smoking is strongly prohibited. When the customer displays indifference, Anil proceeds to shoot the man with a gun. The story ends with Anil and the owner sitting together, smiling and watching a commercial about the effects of smoking.\nAfter this story, a second friend in the group around the bonfire goes to the car looking for a blanket. When she leaves, the body of the first girl who left the bonfire is shown. The second girl is chased around the forest, caught and stabbed by an", "-30.557568191899918" ], [ "anything for you. Why don't you stop smoking for them?\"", "-30.39358444849495" ], [ "a drug thing; when you're smoking a joint you get totally paranoid about people, you can't relate to people. There's that crossover between the paranoia you get when you're smoking dope and the depression afterwards.\" In 2015 Butler elaborated further to Dave Everly of Classic Rock: \"I used to be a cutter. I'd cut my arms, stick pins through my fingers, that kind of thing. I used to get really depressed and it was the only thing that could bring me out of it. If Sabbath hadn't made it, I'd have been long dead. I'd have killed myself.\" According to", "-30.36132293473929" ], [ "designed to increase the positive affect associated with smoking and decrease the perceptions of risk. Therefore, seeing this advertisement could lead people astray to start smoking because of its induced appeal. In a study by Slovic et al. (2005), he released a survey to smokers in which he asked “If you had it to do all over again, would you start smoking?” and more than 85% of adult smokers and about 80% of young smokers (between the ages of 14-22) answered “No.” He found that most smokers, especially those that start at a younger age, do not take the time", "-30.262163332663476" ], [ "scrape away a 'No Smoking' sign. The Boy is attracted by this middle class rebellion, pulls the sign off and presents it to her and tries to engage her in conversation.\nLater, battling her way into a department store she finds he has followed her. Leaving the store, she thinks she has lost him. But he catches up with her on a crowded pavement. She tries to throw him off, he finds her again. She flees to her mother's apartment – followed by the Boy. The Woman is desperately embarrassed and tries to explain, but her mother treats the whole thing", "-30.148931780131534" ], [ "individual's unconscious (Freud) and the collective unconscious of the entire human race (Jung).\nRapaille Associates worked on Philip Morris's Archetype Project, an effort to study the emotional reasons why people smoke, presumably so the company could better leverage these emotions in advertising and promotions. Rapaille noted that typically peoples' first experience with smoking involved seeing an admired adult do it, and having a feeling that they were excluded from the activity and strongly wanting to be included. Rapaille ultimately linked smoking with adult initiation rituals, risk taking, bonding with peers and the need for kids to feel like they belong to", "-30.10202614584705" ], [ "Smoker's face \"Smoker's face\" describes the characteristic changes that happen to the faces of many people who smoke.\nThe general appearance is of accelerated ageing of the face, with a characteristic pattern of facial wrinkling and sallow coloration.\nA summary of a study published by the National Institutes of Health found that certain facial features appeared in about 46% of continuing smokers and 8% of former smokers who had smoked a full decade while those same features were absent in a control group of non-smokers.", "-29.667958402540535" ], [ "satisfying as traditional cigarettes and quit vaping. E-cigarette do not provide nicotine to the blood as fast as cigarettes and fall short of the throat-hit that cigarettes give, causing some to turn back to traditional cigarettes. In the small number of published studies on reasons for discontinuation of e-cigarette use in young users, adolescent and young adult smokers have cited lack of satisfaction and e-cigarettes' poor taste and cost as reasons for discontinuing. Additional reasons have included negative physical effects (e.g., feeling lightheaded) and loss of interest. In one study of young adults aged 18–35, former and never smokers of", "-29.343033715791535" ], [ "that individuals are 77% more likely to conform to non-friends, while close friendships decrease conformity. Therefore, if an acquaintance offers a cigarette as a polite gesture, the person who has stopped smoking will be more likely to break his commitment than if a friend had offered. Recent research from the International Tobacco Control (ITC) Four Country Survey of over 6,000 smokers found that smokers with fewer smoking friends were more likely to intend to quit and to succeed in their quit attempt.\nExpectations and attitude are significant factors. A self-perpetuating cycle occurs when a person feels bad for smoking yet", "-29.248611387360143" ], [ "was, I'd quit!\" Another employee, who is now a father, nearly offers George a cigar in honor of the occasion, but then remembers that he quit smoking. Almost everyone at the office still smokes, and George admits that he loves smoking, and he babbles like crazy and runs out of the office like a madman, leading into the following montage...", "-29.11849552480271" ], [ "avoided because of its attendant health and relational issues, and not smoking enhances one's overall stress coping capacity (SCC).\nAt the 1963 convention of the Cigar Institute of America, Weybrew noted: \"When a smoker is forbidden to smoke he just doesn't like it. The smokers in the test got irritable, ate too much, had trouble sleeping, and personal relationships began to deteriorate.\"\nOn Easter Sunday, 17 April, Triton sighted the Cape of Good Hope and subsequently re-entered the South Atlantic Ocean, returning to the command authority of Rear Admiral Lawrence R. Daspit (COMSUBLANT). Return to the St. Peter and St. Paul", "-28.79210258484818" ], [ "the evening and as he goes to bed (as a huge cloud of smoke covers his head), when he wakes up in the morning, as he shaves, as he drinks coffee and at work. But soon his throat tickles and his eyes get irritated and he cannot blow out his matches. So he throws away all of his smoking products and decides to quit. It works fine at first, and feels he can do it.\nBut then the boss congratulates George for being able to quit smoking, and as he lights up a cigarette, he says \"It ain't easy. If it", "-28.524177026818506" ], [ "to smoke if you want to be one of the group.\n— T.L. Achey, 1978 Lorillard Memo", "-28.50440477844677" ], [ "smokers to quit.", "-28.460761975089554" ], [ "strongly prohibited in his inn. When Anil tries to go outside for a smoke, the man restricts him, telling him about the diseases that come along with smoking. The owner then locks Anil inside the lodge and tells him that in a matter of months, he can cure his smoking addiction. The owner takes Anil to a basement of sorts and shows him piles of dead bodies, telling him that he tried to prevent them but these people would not stop smoking. After a few months, Anil is now seen working at the lodge, acting strange and eccentric himself. When", "-28.351837175467153" ], [ "as if they had black eyes, by implication from a fight with smokers of other cigarettes (campaign by a subsidiary of American Tobacco Company, now owned by British American Tobacco). Mood changes Nicotine is also advertised as good for \"nerves\", irritability, and stress. Again, ads have moved from explicit claims (\"Never gets on your nerves\") to implicit claims (\"Slow down. Pleasure up\"). Although nicotine products temporarily relieve nicotine withdrawal symptoms, an addiction causes worse stress and mood, due to mild withdrawal symptoms between hits. Nicotine addicts need the nicotine to temporarily feel normal. Nicotine addiction seems to worsen mental health", "-28.337235862010857" ], [ "Butt Out Plot An overly upbeat anti-smoking music group called Butt Out, which incorporates elements of dance and hip-hop into its routine, performs at South Park Elementary. The boys are put off by the annoying unoriginality and condescendingly sentimental nature of the performance, in which the performers proclaim that if everyone refuses to smoke, they can grow up to be \"just like us\". The boys take this literally and go behind the school to start binge smoking, which they do despite it causing them to cough furiously. When their school counselor Mr. Mackey approaches, the boys discard their still-lit cigarettes", "-28.217272793641314" ], [ "the least likely to be regular smokers, with 19.0% of those aged over 70 being smokers in 2011. Smoking cessation In 2009, 56 Tokelauans called Quitline, an telephone service which helps smokers end their addiction to cigarettes. The same number of Tokelauans called Quitline in 2008.", "-28.1892829439239" ], [ "adjuster with an insurance company. His extremely tight routine is badly affected one day when he is asked to stay late. He returns home in a packed train, when he discovers that a young hoodlum has misappropriated his cigarettes and his newspaper. He decides to confront the young man, and smokes his cigarettes one after the other. The young man does the same and it becomes a contest. Finally Septimus, feeling that he has taught the young man a lesson, opens his briefcase to find his cigarettes and paper intact, implying that he has actually been smoking the young man's", "-28.121517195890192" ], [ "found to think they should not smoke by looking at cigarette pack warning pictures. According to the Center for Disease Control, 83.1% of teenagers who know cigarette warning pictures responded that they thought smoking cigarettes should not be allowed to smoke. The health authorities have announced that they will replace the cigarette warning label in December and will include a picture symbolizing 'carcinogenicity' in cigarette-type electronic cigarette packs. South Korean smoking etiquette Local smoking etiquette in South Korea is influenced by Confucianism. For instance, smokers generally refrain from, or seek permission before lighting up in the presence of social superiors;", "-28.117621152487118" ], [ "admits he was wrong, though he is unsure if he can change. She advises him to talk about his problems to their parents and to her. Smoke tries to persuade him otherwise, but he throws him out the window, as he feels that he has \"listened to him long enough.\" After falling in a garbage truck, Smoke vows to return. After Smoke leaves, all of the cartoon characters appears on a poster on Michael`s wall as a reminder to always say no when confronted by drugs. Michael smiles at Corey as they go tell their parents about his drug problem.", "-28.067006981465966" ], [ "do not receive the small respite because they simply do not smoke. To certain working environments, however, smoking breaks are widely accepted and seen by some as a good way to network with colleagues.", "-28.025952025782317" ], [ "with other cigarette packages, eventually causing a fire on top of a table. The three Prodigy cigarette boxes then exit the house, leaving the rest of the dancing cigarette packages to continue burning. A man enters the pub to 'open up' the next morning, puzzled to find all the burnt cardboard remains.\nCigarette boxes contain the message \"Smoking is harmful to your health\" in Ukrainian language (\"Куріння шкодить вашому здоров'ю\").\nThe video won an award at the 2009 Rushes Soho Shorts Film Festival for best music video.", "-28.001720705535263" ], [ "song, Eilish and her brother created a sound inspired by a girl blowing cigarette smoke in the former's face alongside a drum kit and a jazz-inspired loop in order to replicate the feeling of being \"in secondhand smoke\". \"If you're just sitting in a room and you listen to this song, the chorus kind of, like, throws itself at you. Like 'I'm in their secondhand smoke,'\" Eilish told MTV. Eilish has cited Frank Sinatra, Johnny Mathis, Frank Ocean, Michael Bublé and the song \"So Sorry\" by Feist as influences for the song's writing and production.", "-27.76143676735228" ], [ "His son, Murray Charlton, said on ABC's Australian Story, he \"probably smoked up until the last five years of his death, but he had emphysema, so really, once he got emphysema, he couldn't even smoke. Er, that was the irony of it. And he yeah, it was certainly what killed him in the end. I mean, yeah. Which was, I thought, was very sad, coming from a world champion, to die of cigarettes. It was very sad, I thought. It's like the gods… I mean, if you're a wonderful artist, they usually take your sight away. And I think that's", "-27.72098217246821" ], [ "health benefit of not smoking a cigarette over the effect of smoking one. However, later at night when the cigarette is immediately available, their subjective value of the cigarette may rise and they may choose to smoke it.\nA theory called the \"primrose path\" is intended to explain how preference reversal can lead to addiction in the long run. As an example, a lifetime of sobriety may be more highly valued than a lifetime of alcoholism, but, at the same time, one drink now may be more highly valued than not drinking now. Because it is always \"now,\" the", "-27.718708206899464" ], [ "smoker, etc but the guy falls in love with her as he feels that she is a pure girl.", "-27.478105424102978" ], [ "She smoked frequently for a period of time before deciding to quit the habit, although when stressed she has been shown to relapse, even taking a cigarette from one of the teenagers when desperate, due to an unexpected visit from her mother-in-law, who treats her shabbily. Her parents Kitty's parents generally generate stress for both Kitty and Red, particularly her rather cold, unaffectionate, hypercritical mother, Bea (played by Betty White). Kitty's genial but rather hapless father, Burt (played by Tom Poston), evokes more affection. Burt makes a terrible financial investment in an ostrich farm (located next to a coyote farm)", "-27.44493675499689" ], [ "hands and feet.\nAlthough cigarette smoking causes a greater increase in the risk of cancer than cigar smoking, cigar smokers still have an increased risk for many health problems, including cancer, when compared to non-smokers. As for second-hand smoke, the NIH study points to the large amount of smoke generated by one cigar, saying \"cigars can contribute substantial amounts of tobacco smoke to the indoor environment; and, when large numbers of cigar smokers congregate in a cigar smoking event, the amount of ETS [i.e. second-hand smoke] produced is sufficient to be a health concern for those regularly required to work in", "-27.397543357277755" ], [ "that? They don't want to, you see. When they feel bad like this fellow here, they think they want to stop, but they don't, really. They can't bring themselves to admit they're alcoholics, or that liquor's got them licked. They believe they can take it or leave it alone — so they take it. If they do stop, out of fear or whatever, they go at once into such a state of euphoria and well-being that they become over-confident. They're rid of drink, and feel sure enough of themselves to be able to start again, promising they'll take one,", "-27.36288996739313" ], [ "No Smoking (2007 film) Plot The film begins with a man waking up in decrepit old house in an unknown area. He gets a call from his wife enquiring where he is. Unaware of his location, he searches the house for a cigarette. He accidentally opens a room and finds it filled with Russian soldiers. One of the them starts chasing him and opens fire at him. He gets shot in the leg and jumps into a bathtub he finds in the snow.\nThe man wakes up in a bathtub. He is revealed to be K (John Abraham), a wealthy businessman", "-27.259787656599656" ], [ "taking extra breaks to smoke at work and decides to start smoking. He soon begins smoking every chance he gets to stop whatever task he is doing. When Peter's smoking begins to affect his sex life with Lois, she tries to make him stop but he's unable to break the habit and starts sneaking smokes during any little task, becoming fidgety and irritated when unable to get away. The smoking has an effect on his appearance and Lois takes him to the doctor. At the hospital, Dr. Hartman refuses to help with Peter's condition and bribes Peter and Lois to", "-27.18255897090421" ], [ "After smelling smoke again, Frazer looks over the fence and spots Stonie smoking. After a mishap where Charlie Hoyland accidentally discovers the dope, Stonie then comes clean to Toadie and Charlie's mother, Steph and explains he is depressed because he and Chantelle were trying for a baby and they are not having much luck. Chantelle comes to Ramsay Street to sort her husband out. Stonie announces he is giving up marijuana. However, just as he is about to throw the rest in the bin, he holds onto it. Chantelle gives him an ultimatum: her or the marijuana. Stonie chooses", "-27.15159777458757" ], [ "on the AMC series Mad Men, smokes cigarettes with a short holder.", "-27.14569683925947" ], [ "relapses tend to reduce the smoker’s confidence in their ability to fully quit, and therefore reduce their motivation to quit despite their experience of the positive effects of quitting.\nRelapses tend to be attributed to stressful situations and having friend groups that smoke. Relapses are also caused by cigarette smokers’ use of the narghile as a means of easing off of cigarettes, which ends up proliferating their dependence.\nSome cigarette smokers do not have serious intentions to quit and others do not plan to quit at all, but the majority of cigarette smokers have interest in quitting.\nAbout a third of narghile smokers", "-27.069421938620508" ], [ "guy is smoking a cigarette, and the wife becomes the cigarette, and she's the smoke he's breathing in. So, she's closer to him in this way then she ever could be in the flesh.(...).\"\nLa Torre wrote the lyrics to \"Don't Look Back\", predominantly basing them on a poem about moving on, which he wrote many years prior when he was \"in a really weird place personally\". He explains that the song is about \"taking charge of [your] own life and not making up excuses for why life is such a pain in the ass sometime,\" because La Torre believes that", "-26.97962738914066" ], [ "Arthur P. Mullaney suggested people give up cigarettes for a day and donate the money to a local high school. In 1974, a \"Don't Smoke Day\" (or \"D-Day\") was promoted by Lynn R. Smith of the Monticello Times in Monticello, Minnesota. On November 18, 1976, the California Division of the American Cancer Society successfully prompted nearly one million smokers to quit for the day. That California event marked the first Smokeout.\nThe name has resulted in some confusion due to colloquial usage of the term smokeout, which, (among other things), suggests an activity centered on a large amount of solo or", "-26.978574525157455" ], [ "are attractive because they allow smokers to both experience access to nicotine and mimic cigarette smoking behavior.", "-26.96303242223803" ], [ "and prospective smokers—mainly teens and preteens—to recognize cigarette smoking for what it is: the most deadly habit.\"\nIn July 2015, Slant Magazine's Julia Pressman describes the \"Tobacco\" segment in her article \"The British Dude Who Is Winning America's War on Bullshit\", in which she features five ways Oliver \"has owned 2015 thus far\". The website Inverse included the February 15 segment, the second most effective from the show's second season, saying it \"may be the most lasting of the entire year\". Furthermore, the website's Matthew Strauss wrote, \"Jeff shows up when you Google Image-search 'Marlboro'; he's on bus stops in Uruguay;", "-26.92282974231057" ], [ "a strong anti-smoking message, because it doesn't need to: Everyone knows that smoking is bad for you, including people who continue to do it.\"\nThere is no point during the film at which any of the characters smoke. Dargis of The New York Times unwittingly states, \"Thank You for Smoking is rated R (Under 17 requires accompanying parent or adult guardian). It includes mild violence, discreet sex and, of course, countless cigarettes.\" In the film, even Robert Duvall's filtered cigarette maverick \"The Captain\" is shown repeatedly drinking mint juleps rather than smoking cigarettes. Some critics argue that Reitman's reluctance to show", "-26.75902381647029" ], [ "had never perceived before that moment, i.e. that he was an addict. Second, his son John lent him a medical handbook which explained that the physical withdrawal from nicotine is just like an \"empty, insecure feeling\". He claims that these two realisations crystallised in his mind just how easy it was to stop and so then enabled him to follow an overwhelming desire to explain his method to as many smokers as possible. Easyway Carr left his accountancy job in 1983 and set up his first Easyway clinic to charge other addicts for advice. He wrote ten books which appeared", "-26.749913606010523" ], [ "smoke while still in their teens... The smoking patterns of teenagers are particularly important to Philip Morris.\" - Philip Morris Companies Inc., 1981. Replacement smokers The industry refers to new smokers as “replacement smokers” because they are in effect, replacing smokers who have quit or died, whether from smoking or other causes, over the years. Young people, including college students, constitute the majority of replacement smokers, and tobacco companies have created marketing campaigns targeting this age group. These advertisements show smoking as modern, hip, cool, fun, and adventurous. Alternative press Tobacco companies use “alternative press” and brand recognition as another", "-26.709086953298538" ], [ "The Man Who Quit Smoking Plot The Plot focuses on Dante Alighieri, a young man who loves smoking. When his father dies Dante inherits 17 million kr on one special condition: He must give up smoking in 14 days and then stay smoke-free for an entire year. If he fails, his uncle inherits the 17 million instead. Dante has a living hell while trying to quit, and hires a private detective agency called Little Secret Service who he gives free hands to stop him from smoking, While his uncle, who has taken up smoking himself, also does everything he can", "-26.660806449246593" ], [ "smoker. When she was nine, her mother moved in with Roy Battersby, and his sons introduced her to cigarettes. She does not drink alcohol.\n\"...I've never been drunk even. I've never taken drugs. I've never had a one-night-stand....\"\nIn 2007, she appeared alongside David Schwimmer in the sixth of the Writers Guild of America member-conceived Internet videos for Project \"Speechless\", in support of the WGA labour strike against the Alliance of Motion Picture & Television Producers.\nIn 2012, she appeared alongside Judy Greer and Andrea Savage in the Funny or Die video \"Republicans, Get in My Vagina\", a satire of the Republican Party's", "-26.637627612188226" ], [ "Another Puff Content The song discusses a man trying to stop smoking cigarettes.", "-26.56758682918735" ], [ "The Cigarette Duet Writing and recording The song is about a couple who fights over the health risks of smoking. The female in the song is the smoker while the male is trying to encourage her to stop smoking. In the song, we learn the male was a previous smoker, but later quit. The lyrics are often compared to Nancy & Lee with its dialogue. In an interview, she said \"I sort of knew when I wrote it if any of my songs are going to get big, it’s probably this one that’s going to be successful and it has", "-26.511701489100233" ], [ "to get cigarettes, Timmy approaches the woman, who panics and tries to run away, dying when she hits her head on a rock after being tripped by Timmy, who believes that they are playing a game. Oblivious to the woman's death, Timmy engages in intercourse with her body, and leaves when he hears the girl's boyfriend approaching.\nTimmy returns home, and when his mother notices that his pants are unfastened, she angrily lectures him on the evils of sex, and comforts and sedates him when he has an outburst. While Timmy sleeps, Mrs. Benson reveals to Jenny that she was paralyzed", "-26.496114826586563" ], [ "to have seen a man smoking a cigarette inside the car. However, she later stated that she had not seen a man nor a person smoking a cigarette, but rather had seen what appeared to be a red light glowing from inside the car, potentially from a cell phone. At about the same time, another neighbor saw the car as well as someone walking around the vehicle. She witnessed a third neighbor pull up alongside the vehicle.\nThat neighbor, a school bus driver returning home, noticed the young woman was not bleeding or visibly injured, but cold and shivering. He offered", "-26.399404657291598" ], [ "drink' and a 'long drag' are just placeholders for any vice the overworked might depend on to survive. The concern isn't how Americans cope with their blue-collar lives (though she's by no means undermining the severity of addiction); it's the culture of stress that suffocates everyone that should piss people off\". Maeve McDermott of USA Today says \"the song is less a pro-cigarette anthem as it is a tribute to sneaking away from your responsibilities and taking a minute to breathe\". Commercial performance \"Smoke Break\" set, according to Taste of Country's Sterling Whitaker, \"an all-time record for the largest first-week", "-26.29249322845135" ], [ "and they'd say, 'Hey, Mort,' or, 'Hey, Mouth, autograph my cigarette.' And I'd do it.\" He also blamed tobacco companies for lying to consumers about cigarettes.", "-26.214038440957665" ], [ "the smoke has cleared, causes him to look up at the sky and realize he's no longer Sam the kid, but Sam the man.\" The Gay & Lesbian Review found it an \"impressive comic debut novel\" and that \"Mastbaum’s quirky narrator and comic verve propel the reader through this story of painful yet instructive young love made art for readers of all ages.\"", "-26.202418524881068" ], [ "not save it. She must also undergo detoxification, thanks to all the tablets she has taken. She becomes very depressed, as smoking cigarettes is now her only pleasure in life. \nIn a withdrawal clinic, Hanna gets a visit from Ronald, who is about to leave for Vienna, but he can give her no comfort. She smokes one last cigarette in the lavatory and drops out of a top-floor window to her death. Reception Kino said in its review \nThis is a hymn of praise. For only every now and then do we encounter a film that's true, that's honest, that's", "-26.14926342360559" ], [ "Smoke (A Thousand Horses song) Content The song is a ballad in which the narrator compares his lover to the substance dependence of tobacco, referring to her as a \"habit that I can't let go\". Critical Giving it a \"B+\", Jim Casey of Country Weekly praised the song's Southern rock and blues influences, adding that \"The forlorn lyrics are despairing, but frontman Michael Hobby's gritty vocals…drive the song into an endorphin-releasing euphoria.\" Commercial The song debuted at number 48 on the Country Airplay chart dated for the week ending January 24, 2015. It debuted at number 48 on the Billboard", "-26.12498128786683" ], [ "For Smokers\" cigarette cards in certain packs. One provides information on quitting smoking and the other states that \"Light, \"Ultra Light\", \"Mild\", \"Medium\", and \"Low Tar\" cigarettes are just as harmful as \"Full Flavor\" ones. World record price Early in 2007, a world record price was paid in America for a single card – $2,350,000. This card was resold later in the year for another world record price, $2,800,000. The card in question featured Honus Wagner, one of the great names in U.S. baseball at the turn of the 20th century. Wagner was a dedicated non-smoker and objected when America's", "-26.11321264709113" ], [ "playing the comical aspects of Dot, stating, \"She's not dreadfully funny but she's amusing and I like that because it lightens it up a bit.\" Smoking Smoking cigarettes has become synonymous with Dot, and Brown has suggested that the habit is \"intrinsic\" to the character. Following the 2007 England smoking ban, it was reported in the Daily Mail that the BBC were refusing to prohibit the character from smoking on-screen despite the act being banned in workplaces, as they have \"to portray real life – and people smoke\". Dot's smoking was criticised by private healthcare company Bupa in 2008, when they", "-26.025928050163202" ], [ "Smoke Gets in Your Eyes (Homicide: Life on the Street) Plot summary Howard (Melissa Leo) quits smoking, and her partner Felton (Daniel Baldwin) fears her edginess will endanger his safety. Bayliss (Kyle Secor) also tries to quit smoking, but tries to live vicariously through his smoking partner Pembleton (Andre Braugher). Howard and Bayliss petition Gee (Yaphet Kotto) to set up a non-smoking section for the squad room, but an amused Gee refuses because most of the detectives smoke. Howard, Felton, Bayliss and Pembleton find they share a common suspect in a Union Square murder, and plan a joint stakeout. Howard", "-26.014198303571902" ], [ "Smoke Gets in Your Eyes (Mad Men) Plot In 1960, in Manhattan, Don Draper (Jon Hamm), creative director for the advertising agency Sterling Cooper, is facing a professional dilemma: how to sell cigarettes despite increased public awareness of their health risks. He seeks input from customers and his girlfriend Midge Daniels (Rosemarie DeWitt), but is unable to find a solution. He rejects academic research results provided by the company's consulting psychologist that suggests some customers will be drawn to smoking despite the health risks because of a collective \"death wish\".\nMeanwhile, Peggy Olson (Elisabeth Moss) starts work at Sterling Cooper as", "-25.99564279956394" ], [ "seen a television advertisement for blu e-cigarettes on the Internet, 76% of smokers stated that it resulted in them to ponder about using traditional cigarettes, 74% stated it resulted in them to ponder about giving up using traditional cigarettes, and 66% stated it resulted in them to consider going on to use an e-cigarette. The 34% of the people who took part in the study who had vaped were much more likely to ponder about using traditional cigarettes after seeing the advertisement compared with non-users. This study indicated that seeing an e-cigarette advertisement could incite thoughts relating to smoking and", "-25.989037927880418" ], [ "smoke alarm she left on the floor is now sitting on a chair, and realizes someone else has been in the house. Upon going to retrieve her cell phone from the charger, she finds it is missing, and begins to panic. When she hears a noise from the backyard, she arms herself with a knife, and opens the curtains to find the Man in the Mask, staring at her. Screaming, she stumbles into the hallway, and watches as the front door is forced ajar. When she goes to push the door closed, the blonde woman, now in a doll mask—Dollface—peeks", "-25.96166979769623" ], [ "Blowin' Smoke Content The song is about a waitress who is \"down on her luck\" and aspires to do better, but is \"just blowin' smoke\". The title is a double meaning, referencing the fact that the waitress is smoking a cigarette while also playing on the term \"blowing smoke\", which Musgraves refers to as meaning \"talking shit\".\nThe song opens and closes with the ambient noise of a Waffle House restaurant, recorded by co-writer and co-producer Luke Laird. Critical reception Billy Dukes at Taste of Country said \"every element of 'Blowin' Smoke' works together to fill in gaps in a listener’s", "-25.910620090784505" ], [ "I don't smoke weed. I used to smoke; I used to be a pretty big pothead when I was younger, but I don't smoke. I might have an occasional glass of champagne.\" Logic, however, had a serious cigarette addiction, dedicating the song, \"Nikki\", from Under Pressure to talk about the subject. He talks about smoking since he was 13 and that when giving up marijuana and alcohol, he could not muster the courage to give up cigarettes until about 2014. He, however, pledged not to smoke another cigarette concluding the release of Under Pressure.\nLogic also has a YouTube channel where", "-25.85251498396974" ], [ "instead of him. The Smoking Man claims he likes the both of them, which is why she was returned; he reveals that he told Skinner it was Mulder who shot the man in the parking lot, although he didn't believe this to be true, incidentally revealing himself as unaware of who did, namely X. He tells Mulder that he'll never know the truth if he kills him, and Mulder decides not to.\nMulder returns to FBI headquarters and types out a resignation letter that he hands into Skinner. Skinner visits his office as Mulder is packing his things, and relates an", "-25.782325428910553" ], [ "the narrator if he wants to come and watch him play in Greenwich Village, and the narrator, unsure, somewhat begrudgingly agrees to go. \nSonny then begins to talk about his heroin addiction in somewhat ambiguous terms. He says that when the lady was singing at the revival meeting, it reminded him what it feels like when heroin is coursing through your veins. Sonny says it makes you feel in control, and sometimes you just have to feel that way. The narrator asks if he has to feel like that to play. He answers that some people do. They talk about", "-25.76411310210824" ], [ "plays in encouraging young people to smoke. She herself took up smoking as a teenager because of the attractive packaging and she compared addiction to nicotine to heroin dependence; though she had no direct experience of the latter. According to The Daily Telegraph, her comments raised questions about why the Coalition dropped plans for plain packaging shortly after David Cameron employed Lynton Crosby, who has worked for tobacco companies, as an election strategist. Ministerial career Following her appointment as Parliamentary Under-Secretary of State for Public Health in September 2012, Soubry gave an interview with The Times in which she stated", "-25.75375229625206" ], [ "\"Yes\" (because the tobacco is typically packaged in a can, though other forms of packaging also existed), the caller follows up with, \"Well, you'd better let him out!\", or, \"Then why don't you let him out before he suffocates!?\"", "-25.73559355296311" ], [ "brief stint of not smoking cigarettes.\nIn the series' final episode, he is one in a handful of characters to get something of a resolution: Having lost his bar in a game of strip poker (he refused to remove his shirt having just put on ten pounds), he burns it down in order to win back his old boyfriend - \"a firefighter from Buffalo\". Also in the last sketch is a childhood photo of Kurt Cobain (an acquaintance of Thompson's), sitting on the bar as it burns down.\nThompson has described Buddy as a \"butch queen\" and an \"alpha fag\", pointing out", "-25.72794350294862" ], [ "such as intelligence, fun, sexiness, sociability, high social status, wealth, health, athleticism, and pleasant outdoor pursuits. Many of these associations are fairly implausible; smoking is not generally considered an intelligent choice, even by smokers; most smokers feel miserable about smoking, smoking causes impotence, many smokers feel socially stigmatized for smoking, and smoking is expensive and unhealthy.\nMarketing also uses associations with loyalty, which not only defend a brand, but put a positive spin on not quitting. A successful campaign playing on loyalty and identity was the \"rather fight than switch\" campaign, in which the makeup the models wore made it seem", "-25.717090645146527" ], [ "Harmony, King Bach and other influencers. The lyrics revealed that you get half the matches on dating apps if you're smoking in your profile picture. \"Left Swipe Dat\" encouraged teens to lose the cigarettes so they could avoid being \"left swiped,\" aka, passed over on a dating app.\nIn another effort to connect smoking to a teen passion point, \"CATmageddon\" showed teens that smoking is bad for pets and set up the scenario that if there were no cats (due to smoking-related illness and disease) there would be no cat videos and therefore there would be a \"CATmageddon,\" a", "-25.70778174791485" ], [ "please!), \"se colgaron de nuevo\" (they're hung-up again), and more recently \"what pass? qué pasa papi?\" ('what pass,' what's happening daddy?) or \"cuando fumo me siento una geisha\" (when i smoke i feel like a geisha) among many, many others.", "-25.683550705303787" ], [ "smoking can cause.\nThe brand is also known to be used as a \"social currency\" in China. \"A person who wanted to buy a bicycle in the early 1980s often had to obtain a ration coupon from his unit, and in such a situation it often made sense to hand the individual responsible for issuing coupons a carton of Double Happiness cigarettes and a couple bottles of erguotou baijiu (white liquor)\" wrote Andrew Wedeman, in his book \"Double Paradox: Rapid Growth and Rising Corruption in China\". In 2009, Chinese legislators decided that \"tobacco consumption had led to an increase in rampant", "-25.652037634150474" ], [ "for being a former smoker, he begins smoking again to find solidarity with his \"flock.\"\nAs the deadline to start the thirty-day clock approaches, only a very few of the town's residents haven't signed the no smoking pledge. One of them is alcoholic Edgar Stopworth, who Reverend Brooks decides to pay a house call on, to convince him to take the pledge. But Edgar knows himself pretty well and in desperation tells the Reverend \"My drinking is directly connected to my smoking. The booze bone's connected to the smoke bone.\" The Reverend looks defeated but comes up with the idea of", "-25.56991030916106" ], [ "tension. Some didn't talk to me. Others pretended nothing had happened, which is worse. Some say it's just youthful folly, but I feel more adult than them. I'm not the only clean rider but there aren't many who can say 'I don't take drugs'. For most riders, their health is the last of their concerns.\"\nHe moved to a smaller team, Jean Delatour, but the mistreatment continued. In 2001 at Four Days of Dunkirk, he later told Bicycling, \"several guys tried to ride me into the ditch . . . it got dangerous, and I realized that it wasn't worth continuing\".", "-25.556379463130725" ], [ "20 Cigarettes Synopsis Oscar Klavier has been a smoker since his mother introduced him to cigarettes as a schoolboy. As a middle-aged man, the women he loves gives him an ultimatum: she will only marry him if he gives up smoking. To help him quit, a therapist encourages him to discuss the 20 most emotionally important cigarettes of his life. Production history Kahan was commissioned by the BBC to write the radio play, and then in 2007 to rewrite the play for the stage by the National Youth Theatre. The production was directed by Toby Frow.\nFollowing the introduction of", "-25.549345567356795" ], [ "at a certain point, and all that shit, it's what was goin' on in the streets ... eventually all my friends got smoked. Everybody was droppin'. All my friends started packing burners everyday, we was wild shorties.\n— Kool G Rap, The Source Magazine, issue 72, September, 1995.\nAround this time, Wilson was looking for a DJ, and through Eric B., he met DJ Polo, who was looking for an MC to collaborate with. Kool G Rap and DJ Polo Juice Crew producer Mr. Magic and DJ Marley Marl allowed Polo and Kool G Rap to go to their studio to record a", "-25.509342226796434" ], [ "increasement of the addictiveness of their cigarettes and not eliminating the nicotine in their cigarettes. The compensation that every person can claim is €3000 and the brands in question are MS, Alfa, Bis, Brera, Colombo, Cortina, Esportazione, Eura, HB, Kent, Lido, MS Club, Mundial, Nazionale, Nazionali, N80, Rothmans, SAX Musical, St. Moritz, Stop, Super, Zenit, Vogue, Dunhill, Lucky Strike and Pall Mall. MotoGP SAX cigarettes were a sponsor of the Aprilia Racing Team in the 2003 Grand Prix motorcycle racing season.", "-25.496376643772237" ], [ "the gambling floor, American croupiers are exposed to secondhand smoke. A health hazard evaluation of several Las Vegas casinos showed that nonsmoker croupiers suffered from more respiratory ailments than their administrative counterparts at the casinos and had cotinine and NNAL (both components of secondhand smoke) in their urine samples. Britain banned smoking in all public places, including casinos, in 2007.", "-25.470534748747014" ], [ "is considered to have bad morals. “But smoking is for everyone, man or woman.” Rayhana herself fled Algeria in 2000, following terrorist attacks in which many of her friends were killed. Filming Due to the nude scenes in the film, the production could not use a hamam in Algeria or Turkey. Instead, they chose to film in a hamam in Thessaloniki, Greece. Reception The film received universal accolades, and has been screened at international film festivals around the world. It has a 100% audience rating on Rotten Tomatoes. According to the Hollywood Reporter's Jordan Mintzer, Smoke is a \"fairly gripping", "-25.411622149520554" ], [ "boss, Nancy and Kim. The latter two are smokers, and go on a cigarette break, which Rachel can't join as she doesn't smoke and she is angered to find that Nancy and Kim are busy making company decisions without her during the smoking break. Rachel fears for her position, as Kim and Nancy spend more time together during smoking breaks and have a better chance to bond, and thus Nancy is most probably going to get promotions. To make an effort and bond with her co-workers, Rachel goes with them and smokes a cigarette. She is not enthusiastic to fall", "-25.409642782295123" ], [ "said the \"Smokin'\" referred to smoking haddock, or to truck drivers' tyres when they're 'burnin' the roads'. It became their most successful single up to this point, hitting No. 12 in the charts and leading to a memorable appearance on \"Top of the Pops\".\nIn November 1998, the album Out Spaced was released. This was a collection of songs from the 1995 Ankst releases (including \"Dim Brys: Dim Chwys\"), the band's favourite B-sides, plus \"The Man Don't Give a Fuck\" and \"Smokin'\". A limited edition appeared in a comedy rubber sleeve, shaped like a nipple. 1999–2000: Guerrilla and Mwng In 1999, NME", "-25.40020841298974" ], [ "Burn Out (Midland song) Content The song is about a male narrator watching a relationship \"burn out\", comparing it to a cigarette burning itself out. Lead singer Mark Wystrach told the blog Taste of Country that he sees the song as a prequel to their 2017 debut single \"Drinkin' Problem\", saying that \"Burn Out\" is \"very much in the same landscape. It could tell the story of how the character in 'Drinkin' Problem' could get to that place, as usually is the case through heartache\". He also feels that the song draws inspiration from Dean Dillon and Gary Stewart, while", "-25.373042817111127" ], [ "upper left edge says: \"Os Titãs advertem: O ministério faz mal a sua saúde\" (Titãs warn: the Ministry is unhealthy for you), a parody of the similar warning placed in all cigarettes' packs in Brazil, as well on cigarette advertisings in television: \"O Ministério da Saúde adverte: fumar é prejudicial à saúde\" (The Ministry of Health warns: smoking is unhealthy).\nOther shots include Tony Bellotto pretending sex with a sex doll, some band members hugged with the naked women and the final shot of the clip, with all the band members and the Bombril man singing the song.\nAccording to the band,", "-25.353579679474933" ], [ "but was seen as trying to be \"responsible\" when it did not show teenagers smoking, although it showed alcohol and sex. People also noticed that the series is \"giving you major dramarama payoff in only its second week on the air\" and that wasn't even \"the episode's biggest angst–y moment.\"\nNew York magazine approved that \"there's no such thing as 'lunch' on the weekends\", \"that kids actually do venture outside of their neighborhoods\" (since The New York Palace Hotel is in Midtown Manhattan), and \"saying you live in Williamsburg makes much more sense... for real-estate emotional conflict\", plus the fact Rihanna", "-25.34228255326161" ], [ "smoke that can hurt the player.", "-25.336625256109983" ], [ "This Picture (song) Lyrics It tells the story of a relationship involving sadomasochism and an abusive female in a position of dominance. In the lyrics, the phrase \"ashtray girl\" is meant to refer to a woman who uses her partner as an \"emotional ashtray\"; \"cigarette burns on my chest\" makes reference to a supposed particular fetish of James Dean. As singer/lyricist Brian Molko commented, prior to its performance at a concert, \nThere's an old story that somebody told me once about James Dean. For those of you who don't know this yet, James Dean was gay. Yes, I'm sorry, it's", "-25.332397386606317" ], [ "to sit outside the library at dawn on a rainy morning and get ripped to the tits on crank and powerful music.\nWe spent the next six hours in a tiny concrete cell with about twenty Puerto Ricans. We couldn't sit down because they had pissed all over the floor, so we stood in the middle of the room, giving out cigarettes like representatives of the Red Cross. They were a dangerous-looking lot. Some were drunk and others seemed crazy. I felt safe as long as we could supply them with cigarettes, but I wondered what would happen when we ran", "-25.282901153026614" ], [ "Smoking Man' [sic] is more about who the CSM wished he might have been than the person he actually was. This isn't a true story; it's a manifesto.\"\nRobert Shearman and Lars Pearson, in their book Wanting to Believe: A Critical Guide to The X-Files, Millennium & The Lone Gunmen, rated the episode three stars out of five. The two compared the episode to \"Musings of a Cigarette Smoking Man\", but called it \"throw away and charming\". Shearman and Pearson criticized the episode for being \"largely concerned in suggesting to the audience that the government is being conspiratorial ... five", "-25.24907023396372" ], [ "bags on the sidewalk outside of Philip Morris’s (now former) headquarters in New York City. One youth steps forward with a megaphone to shout up at the workers in the building, \"do you know how many people tobacco kills every day? This is what 1200 people actually looks like.\" Another \"truth\" advertisement, \"Singing Cowboy\", portrays a cowboy who has a breathing stoma (opening) in his neck singing, \"you don’t always die from tobacco, sometimes you just lose a lung\", and other similar lyrics. A third commercial, \"1 out of 3\", uses \"fantasized scenes such as an exploding soda", "-25.244419926486444" ], [ "allowed to smoke in certain areas if they had written permission from their parents. On the other hand, boys were required to have a \"businessman's haircut\", and that girls \"dress neatly, are polite, well-mannered and ladylike\", (they were also asked to \"remember to wear soft slippers on the Third Floor.\") There was no uniform, but there was the expectation for \"all students to rise when any adult enters a room\". \nAll students were boarders (no 'day students'), and were provided with wholesome meals: breakfast at 8:00 am, lunch at 1:15 pm, and dinner at 6:30 pm. Two staff would", "-25.197735774796456" ], [ "and even is thrilled when Hank re-lapses. When he hears that Joseph was caught smoking a cigarette (Dale's own brand of Manitoba 100), Dale is proud and encourages Joseph to read a pro-smoking endorsing book from the Manitoba corporation.\nDale reveals that he doesn't know what to do with his hands and is consequently a heavy smoker (\"Of Mice and Little Green Men\"). This is also proven when he runs back for his cigarettes, despite the fact that a bomb that he created is armed. He once attempted to quit smoking and switched to chewing tobacco, but when his wife prohibited", "-25.182422336074524" ], [ "titled \"A word to smokers (about nonsmokers and anti-smokers)\" and \"A word to nonsmokers (about smokers).\" The ad encourages tolerance of smokers by depicting smoking as a \"personal choice\" and a \"small ritual\". There was no mention of any health effects.\nAn example pamphlet is Answers to the Most Asked Questions about Cigarettes.\nThe institute also published newsletters aimed at physicians and dentists such as Tobacco and Health (OCLC 48549026) and a newsletter Tobacco Observer (OCLC 4556750) that seems to have been aimed at a general audience. Richard Kluger characterized Tobacco Observer as \"attack literature.\" White papers The Tobacco Institute published a large number", "-25.178007189417258" ], [ "in particular triggered you going sober?\" in a 2011 interview, Reynolds replied:\n\nCocaine - just messing with hard drugs and not being able to stop. My drinking was way out of control; I couldn't drink one beer without ending up blacking out and doing drugs. It would happen over and over again. Probably from like seventeen years old to twenty-four, I just didn't know how to control my intake of drugs or alcohol. It just happens to certain people. You are either that way or you aren't that way, you know? I smoked weed like my life depended on it. Then", "-25.1779406441201" ], [ "Kim, Reno 911!, 12 Miles of Bad Road, the films Sex and the City 2 and Horrible Bosses, and a cameo in a Rascal Flatts music video, \"Why Wait\".\nWhite is known for drinking Scotch as part of his act, as well as smoking cigars or cigarettes. He stated during his You Can't Fix Stupid show, \"Somebody asked what I was drinking. If the company that made the stuff I was drinking was paying me, I'd have it in their bottle and not mine. But it's the kind of scotch that people drink that are going to die penniless. It's good", "-25.16882003428327" ], [ "and asks if has yet gotten the other to \"get into other drugs and\nstart mugging people.\" The interlocutor answers \"Nah, I didn't do anything. In fact, I'd say I'm exactly the\nsame as when I smoked my first joint.\" An off-screen voice is heard to say \"Eddie, did you even look\nfor a job today?\" to which he replies \"No, ma.\" while quickly trying to conceal evidence of drug use. The scene fades out and the words \"Nothing happens with marijuana\" appear above \"Partnership for a Drug-Free America\" with a voice-over \"Marijuana can make nothing happen to you, too.\" Other reactions Author", "-25.16656748476089" ], [ "addiction quite exhausting actually, because I grew a really thick beard and my hair was always really filthy. When I was shooting those scenes I met with a guy who was an addict, and he told me things that you go through, like you can’t relax when you’re trying to come off it. You can‘t sleep so you drink loads of alcohol to try and kill the pain. The clock barely seems to move. For me as an actor, they really let me go as far as I could on that. We had letters as well from people saying how", "-25.16427583017503" ], [ "also used in a June 2008 anti-smoking advertisement commissioned by the New South Wales government in Australia with the theme \"everybody knows smoking causes these diseases ... yet you still do it\".\nA cover of the song by Sigrid plays during the opening credits of Justice League.\nCohen's version plays at the end of the Netflix documentary series The Staircase.", "-25.147865987266414" ], [ "over smoke until the individual returns to normal, as is done to a pig that has gone wild. Gururumba see this as a way of stress relief; however, Westerns would call this psychosis. Attention should be drawn to the attitude of the community toward the wild man. \"A feeling of expectant excitement is observable in the community; the actions of the wild man take on the character of a public spectical.\" When news of its occurrence spreads, people drop what they are doing to simply watch the \"wild man.\" The onlookers enjoy the instances when the wild man suddenly turns", "-25.104405065940227" ], [ "anyone gets tired or wants to sleep, the owner threatens to not pay us anything, to \"beat the crap out of us for being lazy,\" or to denounce us to the police so they would deport us. The shop doors are locked and the door to the street as well. Yesterday when I asked what he owed me, because I wanted to send money to my family, he told me he didn't owe me anything, he shouted at me that if I kept screwing around he would call immigration and he grabbed me kicking, he also hit my wife.\"]\n— Source: Organización", "-25.034275330312084" ], [ "of the song are of somebody striking a match to light up and inhale a cigarette.", "-24.991548451362178" ], [ "Feel Free\" – he started feeling very, very bad... He used to see visions a lot. And I remember I had to take him out of the club because it was really starting to affect him – he was swaying... He'd never heard anything so loud; he was ten years older than me and he'd never been to a rock club, because jazz was his thing when he was young. ... Anyway, we got out into the street and he collapsed on the ground and he said the ground was opening up and there was fire and stuff pouring out", "-24.98575328971492" ], [ "hide the smell of smoke.\nConnie and Linda are sitting in one of the rooms talking. The conversation begins with Connie determining if she should straighten out her hair or not as she thinks it is hurting her desirability. Linda admits openly that when she first saw Connie's frizzy hair that she personally thought the girl would never make money in their trade. Connie explains that after her time off if she returns and Walter is still at the Ranch, then she won't stay as she 'can't handle him'. It is revealed through the discussion that Walter is starting to sexually", "-24.97898544024065" ] ]
1et0by
Why is the general Xbox One reveal feedback negative?
[ "A few items people don't seem to like: 1. Games have to be registered to a specific console. If you buy a game second-hand, you have to pay an additional fee for it. People don't like this because when it comes to physical media, a lot of gamers buy games used specifically because it's cheaper. 2. Many of the features explained at the reveal have nothing to do with gaming, making it hard for the demographic they're trying to appeal to particularly excited for them. The idea of watching TV through my game console, while nice, isn't likely to sell the system on its own. 3. Very few games actually got shown off. Sure, we know they've got 15-ish exclusive titles, but little disclosure as to what they are.", "People on Reddit are overly critical of things when they aren't the key demographic.", "The Xbox One its goal is to be an all in one entertainment system aimed at whole families, but more of the vocal and hardcore gamers just wanted to see the games in action and raw power of the console. In all honesty, whatever the feedback is right now will change after E3 which is in 19 days. To get a better review just wait until then because that's where they are going to show off all of the games and see the true power of this new console.", "Well, one thing that bothered me was that Microsoft will be implementing some sort of fee for playing second hand games. That is the only big issue I have with it. That said, I wasn't going to buy it anyway.", "Usually it has been Playstation versus Xbox for the \"hardcore\" gamers, such as Call of Duty, Battlefield, Halo etc. This has been consoles promoting the most popular games for the stereotypical gamers. On the other side, we had Nintendo Wii with a focus on the entire family. Not games you usually play for hours and hours, online and achieving online fame. To me, XboX has tried to combine hardcore gaming with a family-focused box that will be the center of the living room where you can stream movies and update social network sites. This has no use for the \"normal\" xbox customers, and many looks at these features as a waste of resources that would otherwise be used at improving gameplay graphics and so on. I feel that XboX tried to please both gamers and appeal to families who wants to stream movies and whatnot, but ended up half-assing both.", "Add to all of the other reasons people have posted the fact that Kinect cannot be unplugged, and Xbox One won't be backwards compatible, which means it won't be able to play Xbox 360 or Original Xbox games at all. Also, it is a Blu-Ray disc reader now, so it likely will not be able to play HD DVDs.", "All we know about it are the aesthetics, and it looks like a NES and they appear to have ruined what has the most ergonomic controller ever", "Gamers are incapable of expressing a positive opinion anything, ever.", "It's more of a media console than gaming console. That makes the gamers mad. And gamers being mad on the Internet means crazy angry shit goes down. And is almost always an overreaction. No idea why that group is that way, but it is.", "No Backwards Compatibility, Pay a license to play used games, Weaker hardware than PS4, Games are tied to your account, fixed what's not broken with the controller. No way to remove kinetic, More media centre than gaming console.", "Very little new info, confirmed it will have worse specs than ps4, similar to 360/ps3, not much but a difference." ]
[ [ "closely to the force feedback. This allows the user to truly feel what forces go through the steering rack, instead of just artificial effects, and genuinely enhance the realism of the game. Despite this, some high end manufacturers believe that force feedback has still not been perfected, and therefore companies such as Thomas SuperWheel have not adopted a force feedback system in their products. Frex, on the other hand, has gone the other way and equips their high-end Simwheel with powerful force feedback and no mechanical centering device.", "-25.729769617610145" ], [ "with a 51% average score on the Xbox 360 format on Metacritic. Some critics were more positive about it, such as Games Master magazine in the UK, which called it \"a likeable, if slight, slice of gory Brothers Grimm gaming\". However, many sources were considerably more scathing. IT Reviews said that \"the dodgy controls combined with some awkward camera viewpoints, plus the overly repetitive levels, slowly sap much of the joy from the experience\". GameSpot went further, criticising the game's lack of pacing, lousy boss fights and \"shallow, repetitive combat\".\nA considerable number of glitches marred the Xbox 360 release in", "-25.39569120433771" ], [ "best required the least input from the player. They criticized the lack of widescreen support but offered minor praise for its steady frame rate. 1UP.com lambasted the port for what they called its slapdash quality, criticizing its display, controls, and dated design, and saying it \"feels like it wasn't even tuned for the Xbox 360 controller and its analog sticks\". Destructoid was less harsh, writing that fans of the franchise would be able to enjoy the game but warned casual players that \"all you'll find is a relic that was once considered greatness\", and that it pained them to say", "-25.019698894557223" ], [ "player feedback through fan sites and unofficial forums. Also because of mistranslation fears, dedicated teams in each of the game's release regions would gather feedback and transmit it to the development team. The game's first closed Alpha test began on March 11, 2010. It was available only to veteran players from XI. During alpha testing, the team used player feedback to find out key problems with the game, such as limitations on graphical adjustments making the game run at a slow frame rate. The open Beta test was originally scheduled to begin on August 31, but was indefinitely postponed due", "-24.756463146361057" ], [ "relies entirely on flat textures for the game's visuals. At E3 2006 the developers of You Are Empty gave GameSpot a private screening of the game. GameSpot expressed interest in the physics engine, saying that it might \"have some unexpected consequences\".\nThere is a graphic problem with the latest Nvidia drivers (resulting in a white checker board corruption in the game). Before a patch was released, the developer suggested the players install an older Nvidia driver that was included in the game to solve the problem. Reception The game received generally negative reviews from critics. On the review aggregator GameRankings, the", "-24.58671362872701" ], [ "4 and Xbox One are constantly compared in the media for raw power, presuming that the PlayStation 4 version of the game's resolution was lowered to reach parity with the Xbox One's, but Ubisoft later denied that this was the reason.\nInstead, Pontbriand stated that the decision for parity came from the limitations of the consoles' CPUs. The number of NPCs and general amount of AI was paramount to keeping the game locked at 30 frames per second.", "-24.411752226205863" ], [ "force feedback adds valuable information to the driving experience and makes it easier to feel what the vehicle is doing. This is in contrast to most other racing game force feedback where a series of canned force feedback events are triggered by different terrains or generic game events. Such force feedback adds nothing to the feel of the vehicle and can actually get in the way of good lap times. Graphics The visuals were advanced for 1998, allowing 300,000 polygons on-screen at once. They were highly praised by the media, with IGN in particular calling them \"beautiful\" and", "-24.350801498396322" ], [ "without sacrificing much in the way of graphics, playability, or overall value. In fact, the game's complicated control scheme is better served on an Xbox controller than it is in the PC's typical mouse and keyboard setup.\" However, he too criticized the lack of Xbox Live support and the poor graphical quality of the cutscenes. Game Revolution gave the game a B+, praising the controls and atmosphere, but criticizing the AI and lack of Xbox Live support. Eurogamer were as unimpressed with the Xbox version as they had been with the PC version, scoring it 6 out of 10. Reviewer", "-24.12085614335956" ], [ "Xbox 360 technical problems The Xbox 360 video game console is subject to a number of technical problems and failures that can render it unusable. However, many of the issues can be identified by a series of glowing red lights flashing on the face of the console; the three flashing red lights (nicknamed the \"Red Ring of Death\" or the \"RRoD\") being the most infamous. There are also other issues that arise with the console, such as discs becoming scratched in the drive and \"bricking\" of consoles due to dashboard updates. Since its release on November 22, 2005, many", "-23.953945363944513" ], [ "the Xbox 360. Murray stood by his earlier statements criticising Microsoft's platform; he said, \"Obviously a comment like that isn't meant exactly how it sounds. For probably a few years XBLA was basically the only show in town. If you managed to get your game on there it was almost a guarantee of success. I don't think that's the case now. That isn't Microsoft's fault, and it isn't developers' fault. It's just that a hundred games come out there a year, and of those maybe ten break through and make an impact. The rest don't.\" He stressed the decision to", "-23.907895705284318" ], [ "from frequent unavoidable hits. However, they praised the game's graphics, especially the Mode 7 effects, and gave it a score of 7 out of 10.", "-23.764714871445904" ], [ "Respawn felt that Kinect support did not suit the game and chose not to support the peripheral. The development team reported considerable interest in support for esports competitive play, and while such features were not prioritized for the initial release, Respawn indicated that esports accommodations were under consideration for future iterations.\nThe game was feature complete as of December 2013, and the Respawn team continued to address game bugs and balancing issues before launch. Respawn ran a closed beta test with an open registration in February 2014 that saw two million unique users. An Xbox One patch to bring support for", "-23.764676075268653" ], [ "complaints stem from its reloading system which requires you to move a magazine from one side of the screen to the other to reload, wasting precious seconds in an already difficult game. Because of its poor appearance, but great gameplay most reviews gave it an average score. IGN gave it a 6.9 out of 10 citing its mediocre graphics and poor originality. GameSpot gave it a 5.5 out of 10 also criticizing the graphics, but still appreciating its original gameplay. X-Play gave it a 1 out of 5.", "-23.74296571011655" ], [ "of Zelda; they cited the tank's additional abilities as a main reason behind its ranking.\nIn a 2010 interview with Iwata, he was surprised about the game's reception outside Japan, which retrogamers have named it as one of their favorite and most memorable 8-bit titles. He said: \"It’s kind of funny that the first time I ever really had any sense of the game’s success was about 10 years following the original release of Blaster Master, when a young staff member from the U.S. office said something to me like, 'You’d definitely have become a super-famous game designer if you were", "-23.704461280140094" ], [ "IGN cited was that the driving model is somewhat unrealistic. IGN gave the PC version an 8.5, with the issue being the spotter's incompetence. The Xbox review was also an 8.5, and praised the framerate. GameSpot called the game the Tony Hawk or Madden of NASCAR, and gave the game an 8.8, with Metacritic giving it an 88. The more critical review came from GameZone, giving the game an 8.4.", "-23.690354066115106" ], [ "game. Neutral powerups can affect the gameplay in both positive and negative ways, depends on the situation, positive ones help in passing the level, while negative ones make the level more difficult. To alert the player, a loud warning sound will be heard if the player picks up a negative power-up.\nMost of the power-ups are directly taken from MegaBall with different names. New additions include FireBall, Set-Off Exploding, Shrink Ball, Split Ball, Super Shrink, and Fast Ball.\nIn addition, there are also two unused negative power-ups called Gravity Ball and Magnetism, found in the game's internal coding and is a leftover", "-23.678685252030846" ], [ "is usually limited by the video monitor, since the game cannot display more frames per second than the monitor's refresh rate (with exception of turning vertical sync (v-sync) off which in turn causes graphical artifacts). In situations where the CPU and/or GPU load is high, FPS can drop below the monitors refresh rate.\nIndividual frames need not be finished within the interval of a screen refresh to output at an equivalent rate. Game engines often make use of pipelining architectures to process multiple frames concurrently, allowing for more efficient use of the underlying hardware. This has the consequence of exacerbating input", "-23.52951969555579" ], [ "a hardware update of the PlayStation 4 released in late 2016 that similarly focuses on 4K gaming and improved virtual reality performance, although Phil Spencer stated that the PlayStation 4 Pro's competition is instead the Xbox One S. In October 2016 Penello stated that the performance advantage of the Xbox One X over the PS4 Pro would be \"obvious\", noting that the PS4 Pro's GPU only had 4.2 teraflops of graphical computing performance in comparison to Microsoft's stated 6 teraflops. Some journalists thought that Microsoft's messaging and positioning of Scorpio alongside the release of the Xbox One S were at", "-23.511888008644746" ], [ "Using the same code will revert them. Reception Despite the film's average to negative reception, the game managed to have received generally mixed to positive reviews from critics.\nMarc Nix of IGN gave the game a 5.5 rating out of 10 and praised its graphics, but wrote: \"Unfortunately, the actual game doesn't show nearly as much polish as the graphics engine. The layout of the stages has you making all kinds of blind jumps — the viewing angle won't adjust to show you where you're jumping, so often you'll be jumping over bottomless cliffs or even across tiny platforms without a", "-23.47094123857096" ], [ "knows best--shooting things in the face. This is one post-apocalyptic wasteland that you'll definitely want to venture into.\" Ars Technica gave a more negative review of the Xbox 360 version, criticizing lack of story, undeveloped characters, uninteresting quests and a \"broken save system\" (autosave checkpoints being too far apart, forcing frequent manual saves which are slow on the Xbox 360), while acknowledging the quality of the visuals. Edge gave it seven out of ten and called it \"a stunningly rendered FPS, but one that seems caught between a desire to innovate and the desire to be true to the template", "-23.460792451363886" ], [ "terminally crap\". One of the most positive reviews came from Richard Leadbetter of Computer and Video Games, who gave the game a score of 87%. Leadbetter highly praised the graphics and sound, writing \"The mixture of polygon 3D and sprites is effective and the sound is brilliant\".", "-23.453752221626928" ], [ "\"intolerably stupid\" A.I. of the computer-controlled racing opponents. Lucas also felt that the game should have included more cars and tracks, and criticized the game's \"very thin\" sound effects: \"These are sports cars of magnitude. The hums, whines and purrs of these particular 'mobiles should not be taken lightly. However, there are times when it sounds like this is a race of turbo-charged hand blenders.\"\nNext Generation reviewed the Nintendo 64 version of the game, rating it two stars out of five, and stated that \"It really needs a better sense of speed and more tension, or at least some unique", "-23.391929152494413" ], [ "The graphics are nice and the scrolling pretty smooth.\" The magazine wrote that the game can become addicting upon getting used to the controls.\nHome Computing Weekly, which gave the ZX Spectrum version two stars out of five, called the game \"boring\", in part because of the inability to change its difficulty settings. The publication noted \"the limited graphics are very well-drawn, the sound is simple but effective and machine code ensures a smooth movement of vehicles and scrolling.\" Three critics for Your Sinclair gave the ZX Spectrum version a negative review, criticizing the controls and poor collision detection, although one", "-23.360765608973452" ], [ "of the Xbox 360 has been subject to a number of technical problems. Since the console's release in 2005, users have reported concerns over its reliability and failure rate.\nTo aid customers with defective consoles, Microsoft extended the Xbox 360's manufacturer's warranty to three years for hardware failure problems that generate a \"General Hardware Failure\" error report. A \"General Hardware Failure\" is recognized on all models released before the Xbox 360 S by three quadrants of the ring around the power button flashing red. This error is often known as the \"Red Ring of Death\". In April 2009 the warranty was", "-23.3344787472015" ], [ "articles have appeared in the media portraying the Xbox 360's failure rates, with the latest estimate by warranty provider SquareTrade to be 23.7% in 2009, and currently the highest estimate being 54.2% by a Game Informer survey.\nThere has been legal action taken attempting to hold Microsoft responsible for the Xbox 360's failure rate and provide compensation for those affected. General Hardware Failure errors Three flashing red lights around the Xbox 360 power button instead of the one to four green lights indicating normal operation represent an internal problem that requires service. This error was soon nicknamed the \"Red Ring of", "-23.313997303455835" ], [ "on the Zune and Windows Media Center, known as the \"New Xbox Experience\" or NXE.\nSince the console's release, Microsoft has released several updates for the Dashboard software. These updates have included adding new features to the console, enhancing Xbox Live functionality and multimedia playback capabilities, adding compatibility for new accessories, and fixing bugs in the software. Such updates are mandatory for users wishing to use Xbox Live, as access to Xbox Live is disabled until the update is performed. New Xbox Experience At E3 2008, at Microsoft's Show, Microsoft's Aaron Greenberg and Marc Whitten announced the new Xbox 360 interface", "-23.28369084338192" ], [ "from critics. The improved graphics, sound & minimum changes from the original game were heavily praised, but was criticized for its AI problems & the dated campaign level design. Aggregate review website Metacritic assigned a score of 82/100 based on 74 reviews. GameSpot also gave the game a score of 7.0 out of 10 due to the fact that there wasn't major changes to the game other than graphics. IGN also gave the game a score 8.5 out of 10. Jeff Gerstmann from Giant Bomb, who reviewed the original game when he was at GameSpot, gave the title a negative", "-23.26089828601107" ], [ "controls are much better, which makes Legacy a better proposition on the 360. Still, the overly long missions and the lack of save points make it hard to really embrace the game.\"\nGameSpy's Gerald Villoria scored the game 2.5 out 5. He praised the graphics, the voice acting and the storyline, but felt the overall game was disappointing; \"The game simply doesn't satisfy for those looking for a truly compelling gameplay experience, falling short of bringing the vision and feel of Star Trek to the interactive medium.\" He was heavily critical of the combat mechanics and argued that the game felt", "-23.197691111068707" ], [ "by the chosen consoles, seeing these as simply means to reward the player. Blow also states his concerns on other pop-up messages that could occur on the consoles or computer versions, as he considers The Witness a \"subtle kind of game\" with quiet ambient audio that these pop-ups detract from.\nBlow wanted The Witness to be for the player that \"is inquisitive and likes to be treated as an intelligent person\". He was very careful to avoid \"over-tutorializing\" the game, noting that when a new idea is introduced in a game, the decision to immediately explain it to avoid confusion \"kills", "-23.195977975439746" ], [ "scrolling is so jerky that the game is almost unplayable. He further criticized that the graphics are dull and fail to make the ramps and obstacles of the tables stand out from the backgrounds. A reviewer for Next Generation also found the fact that the Super NES version displays less than half of the table at a time to be a problem, in part because of the poor scrolling, but also because \"Since a lot of the scoring devices are near the top of the table, it means that most of the time you're shooting blind.\" He gave it two", "-23.17286380204314" ], [ "other ports of popular Xbox 360 Xbox Live Arcade titles such as Ms. Splosion Man, Toy Soldiers and Ilomilo. Updates and downloadable content A patch was released September 9, 2010 to fix issues in the game. Players can no longer use collision glitches with the world geometry to find ways to cheat on the game's leaderboards. Additionally the patch adds an audible beep to players who sit idle in multiplayer lobbies, prompting them to set their status to \"ready\". The patch also decreases the amount of time to wait on players who do not finish multiplayer races. ", "-23.165779732749797" ], [ "considered the animations to be \"amateurish,\" while criticizing the gambling games, including their sluggish pace. Malcom concluded that people other than \"fanatical\" Trump fans would be frustrated by the game's \"terminal slowness.\" Jeff James of Amazing Computing reviewed the Amiga version and noted that it could not be installed to a hard drive. In addition, he considered the animations of casino visitors and dealers to be \"a little coarse and grainy,\" and criticized the sluggish pace of the gambling games. Because of these issues, he believed that the game may only appeal to avid gamblers.\nRick Ratliff of Detroit Free Press", "-23.16003154721693" ], [ "8.5/10 score for the Xbox 360 and PlayStation 3. The Xbox 360 version of the game received ratings of 7.9/10 from IGN, a B from 1UP and an 8.4/10 from Team Xbox. IGN's score for the PlayStation 3 version was lower (7.5/10).\nOf the sixth generation console versions, IGN awarded both the Xbox and PlayStation 2 versions a 7.0/10. However, IGN strongly criticized the current generation versions for having too many bugs, unimproved player models, incorrect commentary, and most of all, extremely illogical player ratings.\nThe handheld versions received negative reviews due to shallow gameplay. GameSpot stated in its 2.5/10 review of", "-23.152163379047124" ], [ "Official Xbox Magazine rated the game 4 out of 10 and considered it boring, while criticizing its \"tedious\" levels and \"irritating\" camera. Common Sense Media gave it a score of 4 out of 5 stars.", "-23.047215913655236" ], [ "solid red light is similar to the one-light error if an \"E XX\" error message is displayed and a three-light error code if the error message is absent. Response to rate of failure In the early months after the console's launching, Microsoft stated that the Xbox 360's failure rate was within the consumer electronics industry's typical 3% to 5%. Nevertheless, Microsoft has not released its official statistics on the failure rate of the various versions of the console.\nOn July 5, 2007, Peter Moore, the Vice President of Microsoft's Interactive Entertainment Business division published an open letter recognizing the console's", "-22.981148593295075" ], [ "aim assist to make up for the lack of precision controls. In 2010, Rahul Sood, the president of Voodoo PC, stated that Microsoft had terminated cross-platform play between Xbox 360 and computer players for an upcoming game claiming that even skilled console players \"got destroyed every time\" in matches against computer players of mediocre skill due to the difference between controller and keyboard-and-mouse controls, and thus would be seen as an embarrassment to the Xbox 360. Microsoft's Senior Director of Computer and Mobile Gaming Kevin Unangst countered this point, stating that Microsoft's internal testing found that much of the", "-22.9515788089775" ], [ "that had played the game before its official release. Users expressed concern with the apparent lack of features and other issues associated with the PlayStation 4 launch, while many players on the Windows version via Steam and GOG.com gave the game negative reviews due to the poor graphics capabilities or inability to launch the game. Players were also disappointed at the apparent lack of features that Hello Games and Sony had stated in earlier announcements and interviews would be included in the game; a list initially compiled by members of the No Man's Sky subreddit consisting of all such features", "-22.936431907404767" ], [ "360 re-release for its controls and noted that the game \"stands up pretty well\" despite its age, although he stated that the game quickly becomes repetitive. Corey Cohen of Official Xbox Magazine praised the Xbox 360 version for its music and controls, and noted that it was as appealing as the arcade version.\nTarryn van der Byl of Pocket Gamer criticized the iPhone version for its poor controls, and stated that the game's optional 3D graphics mode was \"ugly and feels clumsy and inaccurate.\" Slide to Play considered the iPhone/iPod version a \"mixed bag\", but praised the gameplay. Mark Langshaw of", "-22.929030916347983" ], [ "play again. From that point the credits begin as the camera descends down a manhole. Reception Peer Schneider of IGN rated the game at 2.5 out of 10, citing the graphics, controls, and gameplay. He said it \"[l]ooks and plays like it was programmed in two weeks. Controls are bad\" and \"this add-on disk is a glorified movie player.\" The only thing he found appealing about the game was its presentation, saying that \"[t]he Param team definitely has a sense of humor. Both Doshin games will make you laugh because they're so absurd.\" He ended his review of the game", "-22.893130619385374" ], [ "every race, the camera, and the lack of balance between the challenges. Metacritic's average score for the Xbox 360 is a 64.", "-22.857931335289322" ], [ "IGN gave the Xbox version a 3.3 rating out of 10 and criticized it for not taking advantage of the console's graphical capability. Boulding also criticized the game's animation, writing, \"When you do see pedestrians scurrying out of the way, they look like tiny flat action figures waddling to safety.\" Boulding also said the game included the, \"Worst soundtrack ever\", calling it \"pure synthesized, acid-washed crap.\" Boulding also wrote, \"The crashes and other sound effects aren't very effective and the attempt at surround sound is laughable.\"\nGerald Villoria of GameSpot rated the GameCube and Xbox versions a 3.5 rating out of", "-22.842188107722905" ], [ "rendering of 2013's technology\". Acknowledging that its controller was a mere refinement of the \"ubiquit[ous]\" Xbox 360 design, he praised the controller for its improved D-pad and quieter triggers but criticized its stiff shoulder buttons. Kinect received positive reviews for its face recognition login and improved motion tracking, but that whilst \"magical\", \"every false positive or unrecognized [voice] command had us reaching for the controller.\" The overall interface was also considered more intuitive and flexible than that of PlayStation 4, but its game library view was described as being a \"jumbled, sadly unfilterable rows of every owned piece of software\",", "-22.82012178876903" ], [ "the review aggregator Metacritic, which assigned scores as a weighted average of reviews, assigned Mass Effect Infiltrator a score of 67 based on 23 reviews. Slide To Play initially gave the game a poor review, criticizing the controls and noting that while the graphics are \"detailed and highly impressive\", the environments themselves were stale and repetitive. After the 1.0.3 update however, the review was updated to state that the game had \"graduated from a clunky mess to a high-quality shooter.\" Android Police were more positive, describing Infiltrator as a \"really fun game with good controls. To top it off, it", "-22.74555123792379" ], [ "received \"favorable\" reviews, while the Head On version received \"average\" reviews, according to the review aggregation website Metacritic.\nHyper's Maurice Branscombe commended the Xbox 360 version for \"looking and playing better than ever before\". However, he did not like the soundtracks and stated that \"the game's load times are too long\". In Japan, Famitsu gave the same console version a score of three sevens and one six for a total of 27 out of 40.", "-22.673428309208248" ], [ "Reception (Rio) The game received mixed reception, with, for lowest to highest, Metacritic at 60 out of 100 based on 16 reviews for the Xbox 360 version, and 65 out of 100 based on 8 reviews for the PlayStation 3 version. And in GameRankings, 40.00% for the Wii version, 58.00% for the Nintendo DS version, 64.73% for the Xbox 360 version, and 71.67% for the PlayStation 3. Rio: The 4-D Experience Rio: The 4-D Experience is a 12-minute 4D film shown at various 4-D theatres over the world. Produced by SimEx-Iwerks, it premiered on September 27, 2013 at the San", "-22.635693761636503" ], [ "combination for Windows Phone 8.1 and later is the phone's Power button and the Volume Up button. Xbox One As of March 2015, an Xbox One can take a screenshot by double-pressing the Xbox button. Pressing the Y button will then save it. The equivalent voice command for this action is \"Xbox, take a screenshot\". Hardware overlays On Windows systems, screenshots of games and media players sometimes fail, resulting in a blank rectangle. The reason for this is that the graphics are bypassing the normal screen and going to a high-speed graphics processor on the graphics card by using a", "-22.608988430421505" ], [ "of the Federation, Klingons and Romulans. PC Critical response to the PC version of the game was mainly negative, with many reviewers unsatisfied with the control system, only one camera setting that cannot zoom in or out, the inability to save more than one campaign at a time, the inability to save within a mission, a buggy and slow multiplayer mode, the inability to set the exact make-up of AI fleets in skirmish mode, a 3D universe without a z-axis, the inability to change the control scheme, and AI allies that will not automatically assign repairs.\nAlthough graphics were touted as", "-22.60506051266566" ], [ "Grand Prix Circuit (video game) Reception A Computer Gaming World review had mixed feelings about the game, noting the controls, which governed steering, acceleration, and shifting all at the same time, took so long to get used to that the reviewer ended up asking a friend to do shifting for him. The review did note the game was quite good after getting used to the controls.", "-22.59585591056384" ], [ "it rightfully should be, and there's simply not enough transparency in the logic within it. There are oddities peppered throughout, which is the root for countless headaches and frustrations.\" Xbox One's in-game performance was mixed, with some titles showing slower performance over PS4, but some multi-platform games performing better on Xbox One than PS4. CNET praised the wider lineup of multimedia services and apps on Xbox One over PS4, not requiring Xbox Live Gold for online save data storage, support for high-speed USB 3.0 as secondary storage, and having a \"slightly better\" lineup of upcoming exclusives, concluding that \"While the", "-22.59371343595558" ], [ "score has an increased cinematic feel as well as incorporating many of the styles (downtempo, electronic, ambient) that made the Forza Motorsport 3 OST a fan favorite.\"\nOn August 26, 2011, at PAX Prime it was announced that Turn 10 would include the UNSC Warthog from Microsoft Studios' Halo series in Forza Motorsport 4's Autovista mode. The model of Warthog used in Forza Motorsport 4 is identical to the version in the then-upcoming Halo 4, although the vehicle is not drivable. Turn 10 has cited the vehicle's exaggerated four wheel steering system, fictional futuristic technology and excessive height as reasons for", "-22.55603407700255" ], [ "that also knowingly listed games that require their disc to run alongside those which did not. The console was also panned for missing certain promised features on-launch, such as Upload Studio, game streaming, and certain apps/services.\nLater on, critics felt that the Xbox One's functionality had matured over the year following its launch; Jeff Bakalar of CNET, assigning it a score of 8/10, acknowledged improvements to Xbox One's software since its original release, but that its user interface was still unintuitive in comparison to Xbox 360 and PlayStation 4, explaining that \"navigating the interface seems to be much more problematic than", "-22.534179568261607" ], [ "owing to allow a consistent framerate, the end results did not save the game from being bashed by critics upon release in September 2015. Most critics noted that the graphics were inferior even to the games released on the PlayStation 2, while the gameplay barely resembled previous releases and the fact that the game was rendered almost unplayable by numerous bugs. Furthermore, the simplistic, bland environments and missions, as well as the complete absence of NPCs were noted, while some critics pointed out that better levels could have been designed with the Create-a-Park feature of previous games, whereas most levels", "-22.52558201539796" ], [ "pop up from a tank because they are likely to be shot.\nThe game starts off with simple, symmetric levels where the CPU starts with roughly the same hardware as the player. As the game progresses, the levels become more complex, demanding more skill to control all units effectively, and the computer gains an advantage in starting units. For example, the CPU's fort usually has substantially more powerful guard turrets. The computer also gains more logistic advantages. Combat takes place on several planets, with 4 missions on each. When one is successfully captured, a space ship transports the robot army to", "-22.516427605165518" ], [ "20-point scale, this latest scoring system change was retroactive and all previous IGN review scores were to be updated to follow the new system. However, despite the announcement, the article included a short addition, post-release; it stated that after much discussion, they have decided to retain the decimal point in all upcoming scores. Re-review policy In early 2014, IGN introduced a new policy, in which a game's review score can be re-reviewed and improved, provided that continuous updates form a significant change in the game compared to how it was at launch. Examples of games that have been re-reviewed were", "-22.468109494599048" ], [ "game, while complaining that the dialogue was not taken straight from the anime.\nDowntown Jimmy of Extreme Gamer complained that the controls were too simple and criticized the camera for not having a lock on feature. While he felt that the graphics were not impressive, they still looked good enough to surpass his expectations of what the game looked like. Carolyn Petit of GameSpot found that the visuals captured the look of the anime very well. She stated that the controls were complex but featured little depth. She mentioned that attacks made the battle within the game feel \"tremendous\", but stated", "-22.439023057864688" ], [ "of the 35s has been welcomed by reviewers as a return to the best HP professional calculator traditions, in contrast to their more recent advanced calculators which were seen as feature-packed and heavily styled for the student market, but in some cases poorly designed and built. Particular mention has been made of the traditional HP feel of the keyboard with a big ↵ Enter key back in its traditional place. Shortcomings which have been identified include the lack of any facility for communication with a computer (for loading and saving programs and data), and sluggish performance.\nResponse to the calculator's logic", "-22.424184486495506" ], [ "and 76 out of 100 on the PS3 and Xbox 360 versions, respectively. Game Informer gave the 360 and PS3 versions a 9/10, praising the new Karma system and The Exchange. GameSpot gave the game a 7/10, noting that \"the game lacks fluidity, but is fun in its own right.\" In a positive review, IGN praised the game for its controls on consoles, but said they were disappointed by the fact that there is only one town in the game, as well as bugs, including a glitch where the game will not save once a certain week has been reached.", "-22.392310590890702" ], [ "Stunt Race FX Gameplay The gameplay differs from Nintendo's own Super Mario Kart by being somewhat more difficult and through the lack of weapons to use to attack other vehicles in the game. Similarities with Nintendo's F-Zero include the ability to boost the speed of the vehicles; the use of the L and R buttons to make sharper turns; the possibility of damaging vehicles by running into walls, hazards, or other vehicles; and the possibility of receiving damage by falling. Graphics The capabilities of the Super FX chip are demonstrated extensively in Stunt Race FX. Each course is constructed of", "-22.35458996781381" ], [ "phrase. Reception Before the game was released, fan reception was mixed, with the major complaint being the focus of four-player co-op. All 4 One received positive reviews, with a Metacritic score of 70/100 indicating \"mixed of average reviews\". IGN gave the game an 8/10 citing as a step backwards from A Crack in Time. The most negative review has come from Destructoid who gave the game 4/10 and said \"Ratchet & Clank: All 4 One should have been about $15, five hours shorter, and released on the PlayStation Network. It's a game that does a disservice to the high pedigree", "-22.314617447933415" ], [ "the camera and graphics as fatal flaws. IGN gave the game a 2.5 stating that \"Everything that could have gone wrong did go wrong\". The Official Xbox Magazine gave the game a 2.0 describing the game as \"Tedious\". EGM gave the game a 28 stating the game should be \"avoided like lycanthropy\".\nThe title currently has a Metacritic score of 47 out of 100, indicating \"generally unfavorable reviews\".", "-22.305141328586615" ], [ "is also a high score table but no way to save it when the game is turned off. Reception Delta Patrol was reviewed in 1987 in Dragon #128 by Hartley, Patricia, and Kirk Lesser in \"The Role of Computers\" column. The reviewers gave the game 4 out of 5 stars. Computer Gaming World stated \"the graphics are not especially exciting and the game reminds this reviewer of the old Atari 2600 game, Megamania\". Zzap!64 saw reviewers Julian Rignall, Gary Penn and Steve Jarratt divided by the game; none disliking it, but some not thinking it was as good as its", "-22.2667251478415" ], [ "TotemBall Compatibility Unlike other Xbox Live Vision titles, Totemball is not compatible with the Kinect and can only be played with the original Xbox Live Vision camera, because it was released before the Kinect existed.\nTotemBall received \"mixed or poor\" reviews from critics according to Metacritic with a current score of 44/100.", "-22.265883129963186" ], [ "positive reviews when it was released. Before then, as IGN stated, the original Xbox controller was \"huge, ugly, cheap, and uncomfortable\" and concluded to be an \"abomination\". Many of these problems were corrected with Microsoft's releases of the Xbox controller S and then the Xbox 360 controller. IGN credited the Xbox 360 controller for its being one of \"the most ergonomically comfortable console controllers around\". It was also praised for its improved button placement, its functioning logo as a button, and Microsoft's choice of bottom-mounting headset ports as opposed to top-mounting them so as to minimize snagged wire problems.", "-22.254662428284064" ], [ "or otherwise unacceptable to the quality of the medium, often using Electronic Arts as an example.\nAlthough Zero Punctuation episodes are usually intended to highlight Croshaw's criticisms of video games, his opinions are not universally negative, and any positive feelings towards the aspects of a game will usually be explicitly stated. During his review of Portal, he admitted to being unable to find any faults with the game. He opened his review of BioShock by saying \"nobody likes it when I'm being nice to a game,\" referring to the negative reception of his favorable review of Psychonauts.\nCroshaw cites the work of", "-22.240601538556803" ], [ "This will cause the Xbox to overheat, cause an error, and shut the console down. Systematic fault Systematic faults are often a result of an error in the specification of the equipment and therefore affect all examples of that type. Such faults can remain undetected for years, until conditions conduce to create the failure. Given the same circumstances, each and every example of the equipment would fail identically at that time.\nFailures in hardware can be caused by random faults or systematic faults, but failures in software are always systematic.", "-22.228329372766893" ], [ "Metacritic, calculating an average score of 72 out of 100 based on 15 reviews for the PlayStation 4 version, 68 out of 100 based on 11 reviews for the Xbox One version , and 63 out of 100 based on 3 reviews for the PC version. The game was criticized for technical issues, length, and pacing, but heavily praised for its exhilarating gameplay and interesting world. User reviews on Steam are \"Very Positive\", on Metacritic they vary between each platform (all of the user review averages are in the range between 7 and 8).\nJim Sterling, reviewing the PS4 release, heavily", "-22.22490243415814" ], [ "an average score of 40% based on 7 reviews. On Metacritic, the game had an average score of 34 out of 100, based on 5 reviews.\nBob Colayco of GameSpot gave the game a rating of 3.1 out of 10, saying the game \"is terrible from top to bottom, suffering from bland, derivative gameplay, simplistic level design, brain-dead AI, and a buggy graphics engine that chugs even at low resolution.\" Colayco said \"The game was originally slated to ship for both the Xbox and the PC, but it doesn't take much time with the PC version to understand why the console", "-22.21718685925589" ], [ "an important role in the game, as it affects both the player and the AI. The in-car view also returns, making its first appearance in a Need for Speed game since Porsche Unleashed. The in-car view is highly detailed, and it is possible to see the driver changing gears and moving his head to get a better view of the mirror. The crashes affect the player's visuals. While crashing, there is a temporary blur on screen. The sound aspect have detailed car crash sound, as well as a sharp gasp of breath from the driver before a collision.\nThere are 60+", "-22.204673876869492" ], [ "to the program as with the Xbox 360, primarily due to legal issues related to intellectual property, contracts, and companies that have since gone defunct. Pre-release While the initial unveiling of the Xbox One in May 2013 created criticism that led to significant changes in the digital rights management scheme it would use, other features of the console were highlighted by journalists. The editorial staff of Game Informer offered both praise and criticism for the console. Matt Helgeson described the console as Microsoft's intent to \"control the living room\". He called Xbox One's instant switching features \"impressive\", and that the", "-22.199298726336565" ], [ "the game. Over time, noteworthy fixes and updates came through in the form of improved gamma control on Windows and Linux platforms, fixing anti-aliasing issues, debugging, performance optimizations, usability fixes, subtitles, voice-overs, and 3D capability for users with certain high-end graphics cards, amongst much more. Each update was rolled out in around two weeks of the last, continuing improvement on the game. In the last update before release, version 0.98, Unigine's changelog noted that it had included splashes during the introduction of its partners, including NVIDIA and RakNet.\nThough originally uninterested in an OS X release of the game, Unigine later", "-22.181436101614963" ], [ "they gave negative thoughts about the games AI because of how timid it was.", "-22.17767916136654" ], [ "Effect 2 is very negative, you won't receive any keys from us in the future.\" This spawned criticism from vmedia towards company. Martin Pospisil from BadFly Interactive admitted that company made a mistake and said that it was caused by experience from some reviews that compared their games with big AAA titles like Left 4 Dead or Mass Effect, which led to very low ratings. He said that BadFly will not blacklist any magazine for negative review if it is fair and honest. Possible sequel In June 2016, BadFly Interactive’s CEO and Creative Director Lubomír Dykast said that BadFly Interactive", "-22.174443570409494" ], [ "cosmetic additions for the co-op mode, and that the quality of the graphics on the Windows and Mac version do not suggest a simple console port.", "-22.13688037850079" ], [ "\"spectacular\" graphics and stating that the game was \"almost worth buying for the sound-effects alone\". Despite the \"commonplace\" story \"where once again, an Evil Wizard has taken over control of the world\", the magazine advised readers to \"buy this game\". Advanced Computing Entertainment said the graphics are \"largely repetitive\" but \"wonderfully drawn\" and wrote the \"Sound is sparse but the effects are great.\" The reviewer called it a \"thrilling game with plenty in it to keep you searching, fighting and pondering for a long time.\" He summarised the game as a \"huge, immensely playable and very atmospheric mixture of role-playing", "-22.09072261923575" ], [ "would be heard instead, and after that the game would crash. Critical reaction The game was programmed making the most of the capacities of 8-bit computers, and taking a high level of care for details: plot, mapping, graphics, artificial intelligence of the characters, sound, etc. All of this made the game to be regarded as one of the best video games made for 8-bit computers. In spite of its singular qualities as expressed by its positive initial reviews, the game had a modest commercial success and was never officially released outside of Spain, a country where it came to achieve", "-22.07109952182509" ], [ "the PlayStation 3 and Xbox 360; PC were told that EA will share more news when it becomes available. On 14 December 2010 the first update was released which added the three cars to the player's garage. Xbox 360 players experienced problems with the update. Criterion released another Xbox 360 title update the following day, however, some users reported that the new update had caused their career saves and racing stats to be reset. On 17 December 2010 a third title update was released which repaired these issues. Criterion released the official second update for the consoles on 15 February", "-22.057894113473594" ], [ "the game 3/10 with the author claiming he had given up on the game in frustration. Sinclair User found the game similarly 'unfair' with 'unspeakably bad' graphics but said it had some 'neat twists' awarding an overall score of 2/5. ZX Computing was more positive, giving a rating of 'good'. Although acknowledging the 'dreadful' presentation and 'unplayable' key sequence, the reviewer claimed the game \"proves the point that you don't have to have great graphics for it to be addictive\".", "-22.046759798540734" ], [ "Super R.B.I. Baseball Reception The video game review magazines of the mid-1990s gave this game fairly positive reviews. GamePro highly praised the game's selection of options and stats and the clearly detailed, comical graphics. However, they described the controls as poor, with both a confusing configuration and slow reactions to button presses. They concluded \"With more features than any other baseball cart, Super RBI should've been serious competition for excellent games like World Series Baseball. Too bad the controls undercut that potential.\"", "-22.02894451895918" ], [ "various statistics they collect, the feedback and general attitudes from the player base they monitor, and their own personal opinions and gut feelings where the balance should be. Not all three points are equally weighed, but they consider avoiding allowing one of these areas overwhelm the other two.\nNot all updates will be equivalent across platforms; a planned update will reduce the damage of Torbjörn's auto-aiming turrets on console versions but will not be applied to the Windows version, while a later patch for consoles helped to improve the precision of aiming with controller analog sticks. In September 2016, Blizzard", "-22.007582388847368" ], [ "Given a smaller window of say 2 frames, however, the effect of lag becomes much more significant. Assuming the human's response is centered on the 2 frame window and the super-human has a 99.99% chance to hit the window, introducing a full frame of lag causes the success rate to drop all the way to about 50%.\nIf the game's controller produces additional feedback (rumble, the Wii Remote's speaker, etc.), then the display lag will cause this feedback to not accurately match up with the visuals on-screen, possibly causing extra disorientation (e.g. feeling the controller rumble a split second before a", "-22.00355929194484" ], [ "others praising the relatively low learning curve and simplicity, while major criticism was aimed at the game for its relatively poor interface, high difficulty, poor driver simulation, poor financial simulation and lack of overall improvements over the original Grand Prix Manager. Despite this, the game remains very popular among F1 management game fans.", "-21.994456524727866" ], [ "it convinces you of its strengths.\" Crystal Steltenpohl of Diehard GameFAN wrote about the Xbox 360 version, \"The (mostly) fun level design, interesting gameplay, and strong visuals bring together an experience that will remind you of older Metroidvania games while keeping it fresh. (...) The game is only $1. It’s practically a steal. If you like these types of games, this is one I wouldn’t recommend passing up on.\" According to Rob Hamilton of HonestGamers, who gave it a 8/10, \"The game's not perfect, but thanks to its low asking price, it's a great way to enjoy a flashback to", "-21.978036945482017" ], [ "HD consoles using the DirectX 11 technology utilized for XV. Alongside this, a large proportion of the upgrade was done using HexaDrive's in-house engine HexaDrive Engine 2.0. While originally meant to have a cursory role compared to the DirectX 11 elements, it ended up being used far more than anticipated. The resolution was increased from the original game's 480x272 pixels to the 1920x1080 required. Despite all these changes, the team took care that the lighting and shadow effects remained faithful to the look of the original, as updating too much of the game's visual style would fundamentally alter the experience.", "-21.97618446448905" ], [ "console's interface.\nAlaina Yee of IGN also praised how Xbox One had evolved since its launch, assigning it with Kinect a score of 8.1/10 and acknowledging that Microsoft had \"made good on its promise of listening to consumers, rolling out a steady stream of updates that have both broadened and deepened what this third Xbox console offers.\" Regarding the console's slightly lower level of graphics capabilities in comparison to PlayStation 4, it was noted that \"while videophiles might spot instances of upscaled graphics and less detailed environments immediately, most people generally won't notice a difference between Xbox One and PlayStation 4", "-21.97610567731317" ], [ "added to the sound effects, as the original platform's speaker system had previously limited the range and strength of sounds. The original camera behavior needed to be developed from scratch, as the camera angles used in the original looked out of place on the large screen. During the run-up to release, the team made modifications to the camera after receiving negative comments during demonstrations, addressing scenery collisions and the visibility of player and enemy characters during active gameplay. Because of these modifications, character speed and movement could be increased and improved. By December 2014, the game was in its final", "-21.96567311014587" ], [ "of the game, which in turn cause various problems with hit- and collision detection. If the low update rate is caused by a low frame rate (as opposed to a setting on the client, as some games allow), these problems are usually overshadowed by numerous problems related to the client-side processing itself. Both the display and controls will be sluggish and unresponsive. While this may increase the perceived lag, it is important to note that it is of a different kind than network-related delays. In comparison, the same problem on the server may cause significant problems for all clients involved.", "-21.949808784309425" ], [ "at worst make the experience downright unplayable.\" IGN's Hilary Goldstein disagreed, writing that although EA \"is one of the worst offenders when it comes to porting games to the PS3,\" the frame rate issues were not bad enough \"to make me throw my controller in disgust.\"\nOn January 3, 2008, IGN reported that Valve employees had created a thread on Valve's website forums for players to list the problems they had encountered and to suggest fixes, which caused speculation that a patch was being planned to address the issues in the PlayStation 3 version, such as the frame rate issues, the", "-21.94966812086932" ], [ "been criticized for slow performance, even on top-end (at the time) computers. Finally, the engine has been criticized for the length of time required for the artificial intelligence to complete its turns, a lack of any multiplayer support and the uncooperativeness of its camera controls.", "-21.94766729173716" ], [ "the Xbox Games Store came with a free month of EA Access. A large update for the game was released to coincide with its launch. The update brought in several new features, items and options, while also fixing certain issues and bugs. Pre-release The inclusion of the Bautista bat flip celebration, which could be viewed during the beta, received wide media coverage, with sites such as Yahoo! Sports, Fox Sports, CBS Sports, as well as the MLB's own Cut4 news subsidiary reporting on it. Critics who played the game's beta gave it generally positive reviews. Samit Sarkar of Polygon stated", "-21.937890288972994" ], [ "offered an opportunity for testers to win a Premium model of its Xbox 360 video game console.\nOn July 27, 2006, before the operating system's release to manufacturing (RTM), a notable incident involving WSR occurred during a demonstration by Microsoft that resulted in an unintended output of \"Dear aunt, let's set so double the killer delete select all\" when several attempts to dictate led to consecutive output errors; the incident was a subject of significant derision among analysts and journalists in the audience. Microsoft later revealed that these issues were due to an audio gain glitch that caused the speech recognizer", "-21.93131084140623" ], [ "noticed some lag while the game was in fullscreen mode calling it \"annoying\" he mentioned it never affected the gameplay and was hopeful that it would be addressed in a future software update.\nIn his positive review Nintendo Life reviewer Matthew Mason gave the game 8/10 stars calling it \"Great\". He said that while it was \"cooperative at its core\" it was \"imminently playable as a solo experience\" and that he found sitting next to someone watching them play it to be a pleasurable experience.\nThe game was nominated for \"Australian Developed Game of the Year\" at the Australian Games Awards.", "-21.926252176588605" ], [ "unit's portability; the game can be played in portrait mode and the player can tilt the device to simulate tilting of the pinball table. However, following release, players reported issues with low frame rates and poor graphics on some of the tables; while Zen Studios has said they were working on a patch to fix these as well as make other display improvements, the studio later announced in March 2018 that they had to forgo the patch citing that there was no universal fix as the issue was one done table-by-table; they can optimize tables going forward but could not", "-21.910076962274616" ], [ "quickly derail the experience when things go awry at the worst possible time ...\"\nIn an interview with Nintendo Life, Shuichiro Nishiya, a game redirector from NDcube, said in relation to the car mechanic, \"In past installments, everyone would move separately through the board. As a result, the actions of the other players often didn't affect you. You could just look at the TV screen when it was your turn and during the minigames.\" He further noted, \"In Mario Party 10, though, players move together in a car, so each player's action will affect the others, meaning you'll need to keep an", "-21.905361624143552" ], [ "graphics and effects, such as having rain bounce off the player's weapon. Many destructible objects are featured, but most of the environment is not alterable. On May 11, 2007, a demo for the Xbox 360 was released on the Xbox Live Marketplace. A second demo was released onto Xbox Live Marketplace, a week after the game's release.", "-21.90097425377462" ], [ "viewing detailed info on some players (the game quits after double-clicking on player's name), wrong statistics about some players (ex. incorrect information about scored goals etc.) or even an unexpected exit of the game after viewing post-match statistics.\nThe best way to cope with these problems is to make a lot of savegames, for ex. every in-game month.\nThe game does not run properly on Windows XP. But it runs smoothly on Windows 98, so you can use a free software like Microsoft Virtual Machine with Windows 98 on Windows XP to run the game.", "-21.883153313945513" ], [ "and that they are \"not wrong\" for having grievances.\nThe redesigned dialogue interface featured in Fallout 4 received mixed reception by the community. Unsatisfied fans created mods for the game, providing subtitles and allowing the player to know what their character would say before choosing it as it was in previous games in the franchise such as in Fallout 3 and Fallout: New Vegas. Though even taking the mods into account, Patricia Hernandez of Kotaku still criticized the writing of the game in her review, describing it as \"thin\", \"You never have particularly long or nuanced conversations with the other characters.", "-21.88162073219428" ], [ "and one of the most charming games ever made. But even those accolades are dwarfed by its scope, its potential, and the apparent endlessness of them both.\"\nSome reviewers have criticised the game's control system. Eurogamer's review stated that the jump timing sometimes feels \"off by a fraction of a fraction of a second\" and that this can be a minor annoyance when attempting challenges which require dexterity and timing. In IGN's review, Chris Roper also reported issues with the control system stating that the game's heavily physics-based gameplay \"left a few corners on what should have been a razor-sharp control", "-21.87066871143179" ], [ "average score of 57. All of these scores are considered \"mixed or average\" by the site. The PlayStation 2 and Nintendo Wii versions were criticized for not having the same mechanics that are in the PlayStation 3 and Xbox 360 versions. The Nintendo DS version received generally favorable reviews from critics. On Metacritic it received an average score of 79 out of 100 based on 21 reviews. On GameRankings it received an average score of 78% based on 19 reviews. Notably however, the game received a 9/10 from the Official UK Xbox Magazine. The Official UK PlayStation Magazine awarded the", "-21.865184772992507" ], [ "errors had an almost jet-black background with a hue of dark green. Later versions would show a completely jet-black background. Reports of impending Q4 red-light failure stem from users who report an abnormal display with poor, grainy video as well as black dots or artifacts appearing on the screen. Vertical green or red strokes on the screen can also indicate an E74. Secondary Error Code Xbox 360 consoles which have a hardware failure will display a secondary error code by blinking a sequence of LEDs when the correct button sequence is pushed. An error code of 0001 may represent a", "-21.83375502720446" ], [ "Death\", echoing Windows' Blue Screen of Death error. Warning signs may include freeze-ups, graphical problems in the middle of gameplay, such as checkerboard or pinstripe patterns on the screen, and sound errors; mostly consisting of extremely loud noises that can be affected by the volume control, the console only responding when the power button is pressed to turn it off. These events may happen once or several times until the hardware failure occurs, or not at all. If the console freezes occasionally, the error will not necessarily follow. The technical problems seem to affect some generations of consoles more", "-21.82193623369676" ] ]
3qafab
The semicolon, when to use it and why it matters.
[ "You use a semicolon when you want to join two related statements together, but don't want to use a 'joining word' like _but_ or _and_, or you don't want to imply as long a pause as a full stop/period. For example: *I went on vacation the other day; the flight was very long.* An important point is that both statements should be complete sentences in their own right. In other words you should be able to use a period instead of a semi-colon and still have both statements make sense.", "To add an ELI5 answer to the others- A semi colon looks like a period on top of a comma, right? So, you can think of it as being both a period and a comma. On each side of the semi colon, you need to have what would be a complete sentence on its own (hence the period). Instead of just using a period though, you want to show that the two sentences are meant to be read as connected or maybe dependent on each other (hence the comma). The way a colon is different is that what follows a colon *isn't usually a complete sentence on its own*, just additional material to, like /u/lollersauce914 said, support or clarify what came before.", "“Here is a lesson in creative writing. First rule: Do not use semicolons. They are transvestite hermaphrodites representing absolutely nothing. All they do is show you've been to college.” -Kurt Vonnegut They can separate two ideas that could be distinct sentences but that you want to relate. If you ask me (or Vonnegut), though, just use a period instead.", "Really? A hour has passed without some programmer being a smart-ass? Source: Am a smart-ass programming student", "foreach ($statement as $line) { if($line- > code) { end; } else { continue; } }", "when programming, I use it every day. I also use it a whole freaking lot, but unless i'm programming, it's like it doesn't exist.", "They are used to connect two things that could be complete sentences on their own; these things are typically also related to each other in some logical way.", "This has to do with how many ideas you're presenting in your sentence. > A normal sentence already has one complete idea. > The colon's specific use: when you have an incomplete idea that is leading into another idea, often used with lists, that together form a full idea. > The semi-colon has a slightly different use; it lets you keep building on an already complete idea. In most cases you want to avoid the semi colon. With very little rewording, you can rewrite any sentence that could have a semi colon better by using many other constructs. > The semi-colon has a slightly different use. The semi colon lets you keep building on an already complete idea. > The semi-colon has a slightly different use, to let you keep building on an already complete idea. > The semi-colon's slightly different use: to let you keep building on an already complete idea. > The semi-colon has a slightly different use that lets you keep building on an already complete idea. There is also another grammatical construct called em dash, written in text as \"--\" (which is auto corrected in word to a long -) that, if you really really think you a semi colon is appropriate, \"--\" is probably better. The em dash can generally take the place of comma's, parenthesis, or colons too. > The semi-colon's slightly different use -- it lets you keep building on an already complete idea. In many cases, this would be better with comma's, parenthesis, or colons anyways, but the em dash generally increases readability and adds emphasis. > The em dash lets you take a complete idea and add any other idea -- generally something related that builds around the original idea -- too the middle or end of it. > The em dash lets you take a complete idea and add any other idea, generally something related that builds around the original idea, to the middle or end of it.", "Semicolon usage confused me for a long time until I realized a few simple tricks: 1) A semicolon joins two sentences where the second sentence is required in order for the first sentence to make sense. 2) If the second sentence refers back to the first sentence using a non-specific pronoun, such as \"he,\" \"she,\" \"it,\" then a semicolon may be used. For instance: \"I just met up with Bob; he explained everything.\" You COULD use \"I just met with Bob AND he explained everything,\" but since you didn't use AND, then there are two sentences in need of either a period or a semicolon. In this case, a semicolon is more appropriate for flow. 3) When you use connecting words called conjunctions, such as \"however,\" \"therefore,\" \"furthermore,\" then you can use a semicolon or a period. It's pretty simple once you get the hang of it, and I think English teachers overcomplicate it. Just ask yourself if you have two complete sentences: If I delete the first sentence, would the second sentence make sense on its own, or does it point back to the first? If that's the case, you can use either a period or a semicolon depending on how you want the paragraph to flow. That said, semicolons confuse so many people that it is best to just leave them out, unless you're writing formally.", "As a native English speaker in the US with a job that frequently involves writing reports and such, I have never used a semicolon in my adult life. I feel like I must have used one when I was writing a paper for English class back in high school over 15 years ago, but I imagine most English speaking people have never had a need to use it.", "It's really simple, actually. Any time you would use a period to connect sentences, you can replace the period with a semi-colon. You would typically do this when you want to add special emphasis between the sentences you're connecting. Smaller use case: you can use semi-colors to separate list items that contain commas, since separating those by commas would be confusing. [Edited for clarity.]", "It's a period, but it's for when another complete sentence relates to another complete sentence, or when one requires context. \"Johnny played football.\" \"That is why he got hurt.\" \"Johnny played football; that is why he got hurt.\"", "I've wondered this for a long time and asked a lot of people. There is no why. There is never a reason you need one. I don't see why they came up with it.", "The easiest way I've always thought about it is that it means \"that is\", as in: \"He eats a lot...that is, he's fat\" \"He eats a lot; he's fat\"", "Not an expert, but I immediately thought of this video I stumbled upon a few years back. How (NOT) to use the semicolon: URL_0 " ]
[ [ "Semicolon History The first printed semicolon was the work of the Italian printer Aldus Manutius the Elder in 1494. Manutius established the practice of using the semicolon to separate words of opposed meaning and to allow a rapid change in direction in connecting interdependent statements. Ben Jonson was the first notable English writer to use the semicolon systematically. The modern uses of the semicolon relate either to the listing of items or to the linking of related clauses. English Although terminal marks (i.e. full stops, exclamation marks, and question marks) mark the end of a sentence, the comma, semicolon and", "-31.123861337662674" ], [ "In French, a semicolon (point-virgule, literally 'dot-comma') is a separation between two full sentences, used where either a colon or a comma would not be appropriate. The phrase following a semicolon has to be an independent clause, which is related to the previous one (but not explaining it, contrary to a sentence introduced by a colon).\nThe dash character is used in French writing too, but not as widely as the semicolon. Usage of these devices (semicolon and dash) varies from author to author. Literature Some authors have spurned the semicolon throughout their works. Lynne Truss stated that \"Samuel Beckett spliced", "-29.645359825808555" ], [ "Conjunctive use (philately) In philately, the term conjunctive use refers to the simultaneous use of different types of postage stamps to pay separate parts of a postal charge on the same letter.\nExamples include the addition of an adhesive postage stamp to an item of postal stationery already bearing an imprinted stamp to pay additional postal charges such as airmail or registration charges, or the part transport of mail by a local postal service. Such covers are known as conjunctive covers.", "-28.963413603685694" ], [ "inconsistencies of the circumflex, proposed in 1990 a simplified orthography abolishing the circumflex over the letters u and i except in cases where its absence would create ambiguities and homographs. These recommendations, although published in the Journal officiel de la République française, were immediately and widely criticized, and were adopted only slowly. Nevertheless, they were upheld by the Académie française, which upgraded them from optional to standard and for use in school books in 2016.", "-28.226195651572198" ], [ "L Phonetic and phonemic transcription In phonetic and phonemic transcription, the International Phonetic Alphabet uses ⟨l⟩ to represent the lateral alveolar approximant. English In English orthography, ⟨l⟩ usually represents the phoneme /l/, which can have several sound values, depending on the speaker's accent, and whether it occurs before or after a vowel. The alveolar lateral approximant (the sound represented in IPA by lowercase [l]) occurs before a vowel, as in lip or blend, while the velarized alveolar lateral approximant (IPA [ɫ]) occurs in bell and milk. This velarization does not occur in many European languages that use ⟨l⟩; it is", "-27.834416900903307" ], [ "be placed inside the caret, in the margin, or above the line. Circumflex accent A raised variant of the symbol can be found on some typewriters, where it is used to denote a circumflex in some languages, such as French and Portuguese. It is typically a dead key, which does not cause the carriage to advance and thus allows the following letter to strike the same spot (below the circumflex) on the paper.\nAs regards computer systems, the original 1963 version of the ASCII standard reserved the code point 5Eₕₑₓ for an up-arrow (↑). However, the 1965 ECMA-6 standard replaced the", "-27.7719785944646" ], [ "E.g., the letters ⟨i⟩ and ⟨e⟩ are interchangeable symbols representing the sound /ɪ/; the ‘ll’ combination is pronounced /lj/ and the letter ⟨c⟩ will be pronounced /s/ when it precedes a front vowel, as in Spanish. A notable innovation in Eskayan romanised orthography is the letter combination ‘chd’ which represents the sound /d͡ʒ/. Phonology and phonotactics Eskayan shares all the same phonemes as Boholano-Visayan (the particular variety of Cebuano spoken on Bohol) and even includes the distinctive Boholano voiced palatal affricate /d͡ʒ/ that appears in Visayan words such as maayo [maʔad͡ʒo] (‘good’). With the exception of this phoneme, Eskayan shares", "-27.323009204279515" ], [ "other cases a final semicolon is treated either as optional syntax, or as being followed by a null statement, which is either ignored or treated as a NOP (no operation or null command); compare trailing commas in lists. In some cases a blank statement is allowed, allowing a sequence of semicolons or the use of a semicolon by itself as the body of a control flow structure. For example, a blank statement (a semicolon by itself) stands for a NOP in C/C++, which is useful in busy waiting synchronization loops.\nAPL uses semicolons to separate declarations of local variables, and to", "-27.284558225590445" ], [ "empty space in a document, and is thought to allow the numbers to blend into the text more effectively. As tabular spacing makes all numbers with the same number of digits the same width, it is used for typesetting documents such as price lists, stock listings and sums in mathematics textbooks, all of which require columns of numeric figures to line up on top of each other for easier comparison. Tabular spacing is also a common feature of simple printing devices such as cash registers and date-stamps. \nCharacters of uniform width are a standard feature of so-called monospaced fonts, used", "-27.23773924773559" ], [ "circumflex indicates the historical presence of a phoneme which over the course of linguistic evolution became silent, and then disappeared altogether from the orthography. Indication of Greek omega In words derived from Ancient Greek, the circumflex over o often indicates the presence of the Greek letter omega (ω) when the word is pronounced with the sound /o/: diplôme (δίπλωμα), cône (κῶνος). Where Greek omega does not correspond to /o/ in French, the circumflex is not used: comédie /kɔmedi/ (κωμῳδία).\nThis rule is sporadic, because many such words are written without the circumflex; for instance, axiome and zone have unaccented vowels", "-27.11565555382549" ], [ "without them, semicolons are considered an unnecessary nuisance by some.\nThe use of semicolons in control flow structures and blocks of code is varied  – semicolons are generally omitted after a closing brace, but included for a single statement branch of a control structure (the \"then\" clause), except in Pascal, where a semicolon terminates the entire if...then...else clause (to avoid dangling else) and thus is not allowed between a \"then\" and the corresponding \"else\", as this causes unnesting.\nThis use originates with ALGOL 60, and falls between the comma (,) – used as a list separator – and the period/full stop (.) – used to", "-27.070014899247326" ], [ "terminator. No semicolon is needed before the end keyword of a record type declaration, a block, or a case statement; before the until keyword of a repeat statement; and before the else keyword of an if statement.\nThe presence of an extra semicolon was not permitted in early versions of Pascal. However, the addition of ALGOL-like empty statements in the 1973 Revised Report and later changes to the language in ISO 7185:1983 now allow for optional semicolons in most of these cases. A semicolon is still not permitted immediately before the else keyword in an if statement, because", "-27.06447078799829" ], [ "easily be confused with the letter \"l\". Further, on some typewriters, particularly older ones, the unshifted L key had to be used to type the numeral 1. Even in some computer typefaces, the two characters are barely distinguishable. This caused some concern, especially in the medical community.\nAs a result, L (uppercase letter L) was adopted as an alternative symbol for litre in 1979. The United States National Institute of Standards and Technology now recommends the use of the uppercase letter L, a practice that is also widely followed in Canada and Australia. In these countries, the symbol L is also", "-26.833322890568525" ], [ "work shows that both l and r phonemes are used. Not too many words use the letter l and are actually rarely heard in native speakers (Firth, 1963). Vowels The vowel phonemes of this language are basic. They use /a, e, i, o, u/. The vowel length is similar to the consonant lengths. Linguists do not interpret long vowels in writing so they use shortcuts like macrons (a line over the vowel indicating a longer length), but in Tikopia writing they use two identical juxtaposed vowels. According to the Tikopia dictionary, “This has typographical simplicity,", "-26.569153807751718" ], [ "orthography, using substitutions of other characters, letters or otherwise, to represent a letter or letters in a word. For more-casual use of leet, the primary strategy is to use homoglyphs, symbols that closely resemble (to varying degrees) the letters for which they stand. The choice of symbol is not fixed—anything the reader can make sense of is valid. However, this practice is not extensively used in regular leet; more often it is seen in situations where the argot (i.e., secret language) characteristics of the system are required, either to exclude newbies or outsiders in general, i.e., anything that the average", "-26.358712999266572" ], [ "Ll Ll/ll is a digraph which occurs in several natural languages. English In English, ll often represents the same sound as single l: /l/. The doubling is used to indicate that the preceding vowel is (historically) short, or that the \"l\" sound is to be extended longer than a single \"l\" would provide (etymologically, in latinisms coming from a gemination). It is worth noting that different English language traditions transpose \"l\" and \"ll\": British English \"travelled\" and like words, for example, are usually spelled with a single \"l\" (i.e., \"traveled,\" et al.) in U.S. English. Welsh In Welsh, ll", "-26.30561206075072" ], [ "used to print two US letter or A4 pages side by side using imposition; four pages would be printed on B2, eight on B1, etc. C series The C series is defined in ISO 269, and is usually used for envelopes. The area of C series sheets is the geometric mean of the areas of the A and B series sheets of the same number; for instance, the area of a C4 sheet is the geometric mean of the areas of an A4 sheet and a B4 sheet. This means that C4 is slightly larger than A4, and slightly smaller", "-26.281372198223835" ], [ "Standard L-function In mathematics, the term standard L-function refers to a particular type of automorphic L-function described by Robert P. Langlands. Here, standard refers to the finite-dimensional representation r being the standard representation of the L-group as a matrix group. Relations to other L-functions Standard L-functions are thought to be the most general type of L-function. Conjecturally, they include all examples of L-functions, and in particular are expected to coincide with the Selberg class. Furthermore, all L-functions over arbitrary number fields are widely thought to be instances of standard L-functions for the general linear group GL(n) over the", "-26.270359244452266" ], [ "eth, albeit representing a different sound, the affricate [dʑ]. In 1892 it was officially introduced in Croatian and Slavonian schools (in the Habsburg Kingdom of Croatia-Slavonia where the Croatian language was official) and so definitively added to Gaj’s Latin alphabet. The letter thereafter gradually entered daily use, spreading throughout Serbo-Croatian and then to Macedonian (its Latin transliterations heavily influenced by Serbo-Croatian from the Yugoslav period).\nThe crossed d is today considered a distinct letter, and is placed between Dž and E in alphabetical order. Its Cyrillic equivalent is Ђ ђ. Its partial equivalent in Macedonian is Ѓ ѓ (because only some", "-26.220529380778316" ], [ "names.\nIn some delimiter-separated values file formats, the semicolon is used as the separator character, as an alternative to comma-separated values. Mathematics In the argument list of a mathematical function , a semicolon may be used to separate variables from fixed parameters.\nIn differential geometry, a semicolon preceding an index is used to indicate the covariant derivative of a function with respect to the coordinate associated with that index.\nIn the calculus of relations, the semicolon is used in infix notation for the composition of relations: Other uses The semicolon is commonly used as parts of emoticons, in order to indicate winking or", "-26.20710628433153" ], [ "U History The letter u ultimately comes from the Phoenician letter waw by way of the letter y. See the letter y for details.\nDuring the late Middle Ages, two forms of 'v' developed, which were both used for its ancestor 'u' and modern 'v'. The pointed form 'v' was written at the beginning of a word, while a rounded form 'u' was used in the middle or end, regardless of sound. So whereas 'through' and 'excuse' appeared as in modern printing, 'have' and 'upon' were printed 'haue' and 'vpon', respectively. The first recorded use of 'u' and 'v' as distinct", "-26.092988134361804" ], [ "first distinction between the letters \"u\" and \"v\" is recorded in a Gothic script from 1386, where \"v\" preceded \"u\". By the mid-16th century, the \"v\" form was used to represent the consonant and \"u\" the vowel sound, giving us the modern letter \"u\". Capital and majuscule \"U\" was not accepted as a distinct letter until many years later. Letter In the International Phonetic Alphabet, /v/ represents the voiced labiodental fricative. See Help:IPA.\nIn English, V is unusual in that it has not traditionally been doubled to indicate a short vowel, the way, for example, P is doubled to indicate the", "-26.058963670249796" ], [ "Sesquilinear form In mathematics, a sesquilinear form is a generalization of a bilinear form that, in turn, is a generalization of the concept of the dot product of Euclidean space. A bilinear form is linear in each of its arguments, but a sesquilinear form allows one of the arguments to be \"twisted\" in a semilinear manner, thus the name; which originates from the Latin numerical prefix sesqui- meaning \"one and a half\". The basic concept of the dot product – producing a scalar from a pair of vectors – can be generalized by allowing a broader range of scalar values", "-26.038414999609813" ], [ "ESC/P ESC/P, short for Epson Standard Code for Printers and sometimes styled Escape/P, is a printer control language developed by Epson to control computer printers. It was mainly used in dot matrix printers and some inkjet printers, and is still widely used in many receipt thermal printers. During the era of dot matrix printers, it was also used by other manufacturers (e.g., NEC), sometimes in modified form. At the time, it was a popular mechanism to add formatting to printed text, and was widely supported in software. Derivation ESC/P derives its name from the start of the escape sequences used,", "-26.02559973395546" ], [ "a semicolon as a statement separator.\"}} The study has been criticized as flawed by proponents of semicolon as a separator, due to participants being familiar with a semicolon-as-terminator language and unrealistically strict grammar. Nevertheless, the debate ended in favor of semicolon as terminator. Therefore, semicolon provides structure to the programming language.\nSemicolons are optional in a number of languages, including BCPL, Eiffel, and Go, meaning that they are part of the formal grammar for the language, but can be inferred in many or all contexts (e.g. by end of line that ends a statement (in Go)). As languages can be designed", "-25.97842948687321" ], [ "Anacoluthon Etymology The word anacoluthon is a transliteration of the Greek ἀνακόλουθον (anakólouthon), which derives from the privative prefix ἀν- (an-) and the root adjective ἀκόλουθος (akólouthos), \"following\". This, incidentally, is precisely the meaning of the Latin phrase non sequitur in logic. However, in Classical rhetoric anacoluthon was used both for the logical error of non sequitur and for the syntactic effect or error of changing an expected following or completion to a new or improper one. Use of the term The term \"anacoluthon\" is used primarily within an academic context. It is most likely to appear in", "-25.901631268521214" ], [ "(see Old English phonology).\nDespite the phonetic history, the complementary distribution of [ç] and [x] in modern Standard German is better described as backing of /ç/ after a back vowel, rather than fronting of /x/ after a front vowel, because [ç] is used in onsets (Chemie [çeˈmiː] 'chemistry') and after consonants (Molch [mɔlç] 'newt'), and is thus the underlying form of the phoneme.\nAccording to Kohler, the German ach-Laut is further differentiated into two allophones, [x] and [χ]: [x] occurs after /uː, oː/ (for instance in Buch [buːx] 'book') and [χ] after /a, aː/ (for instance in Bach [baχ] 'brook'), while either", "-25.896044083754532" ], [ "Pentalogy A pentalogy (from Greek πεντα- penta-, \"five\" and -λογία -logia, \"discourse\") is a compound literary or narrative work that is explicitly divided into five parts. Although modern use of the word implies both that the parts are reasonably self-contained and that the structure was intended by the author, historically, neither was necessarily true: in fact, a pentalogia could be assembled by a later editor, just as Plotinus's Enneads were arranged in nines by Porphyry in order to create an overarching structure of six which would express the idea of perfection.", "-25.8555684426683" ], [ "than B4. The practical usage of this is that a letter written on A4 paper fits inside a C4 envelope, and both A4 and C4 paper fits inside a B4 envelope.\nSome envelope formats with mixed sides from adjacent sizes (and thus an approximate aspect ratio of 2:1) are also defined in national adaptations of the ISO standard, e.g. DIN C6/C5 is 114 mm × 229 mm where the common side to C5 and C6 is 162 mm. Common loose sizes Letter, Legal and Ledger/Tabloid are by far the most commonly used of these for everyday activities, and the only ones included in Cascading", "-25.779143621213734" ], [ "defining a vector or matrix (whereas a comma separates the columns within a row of a vector or matrix) or to execute a command silently, without displaying the resulting output value in the console.\nIn HTML, a semicolon is used to terminate a character entity reference, either named or numeric. The declarations of a style attribute in Cascading Style Sheets (CSS) are separated and terminated with semicolons.\nThe file system of VAX/VMS, Files-11, uses semicolons to indicate a file's version number. The semicolon is permitted in long filenames in the Microsoft Windows file systems NTFS and VFAT, but not in its short", "-25.768387094838545" ], [ "and it is common for 影 to be transliterated with the apostrophe. \nThese conventions are used both for Chinese itself and for other scripts of China, such as ʼPhags-pa and Jurchen.\nIn Americanist phonetic notation, the middot is a more common variant of the colon ⟨꞉⟩ used to indicate vowel length. It may be called a half-colon in such usage. Graphically, it may be high in the letter space (the top dot of the colon) or centered as the interpunct. From Americanist notation, it has been adopted into the orthographies of several languages, such as Washo.\nIn the writings of Franz Boas,", "-25.758816816436592" ], [ "Becquerel Capitalization As with every International System of Units (SI) unit named for a person, the first letter of its symbol is uppercase (Bq). However, when an SI unit is spelled out in English, it should always begin with a lowercase letter (becquerel)—except in a situation where any word in that position would be capitalized, such as at the beginning of a sentence or in material using title case. Definition 1 Bq = 1 s⁻¹\nA special name was introduced for the reciprocal second (s⁻¹) to represent radioactivity to avoid potentially dangerous mistakes with prefixes. For example, 1 µs⁻¹ could be taken to mean", "-25.660925112257246" ], [ "the letters were taken.\nIn addition to placing the letters most commonly used in the easiest positions for the typesetter to reach, the compartments for different characters vary in size according to the frequency of usage. Thus, for setting English text, the \"e\" box is the largest, and the \"j\", \"k\", \"q\", \"x\", and \"z\" boxes are the smallest.\nOther large compartments in the California job case hold spaces used to separate words or to fill out lines of type, including em and en spaces. An em space has the width of the point size of the type (i.e., as wide as", "-25.57822599064093" ], [ "sibilant /z/, in Albanian, Breton, Czech, Dutch, French, Hungarian, Latvian, Lithuanian, Romanian, Serbo-Croatian, Slovak, and the International Phonetic Alphabet. It stands for /t͡s/ in Chinese pinyin, Finnish (occurs in loanwords only), and German, and is likewise expressed /ts/ in Old Norse. In Italian, it represents two phonemes, /t͡s/ and /d͡z/. Castilian Spanish uses the letter to represent /θ/ (as English ⟨th⟩ in thing), though in other dialects (Latin American, Andalusian) this sound has merged with /s/. In Portuguese, it stands for /z/ in most cases, but also for /s/ or /ʃ/ (depending on the regional variant) at the end of", "-25.560893716174178" ], [ " Â, â (a-circumflex) is a letter of the Inari Sami, Romanian, and Vietnamese alphabets. This letter also appears in French, Friulian, Frisian, Portuguese, Turkish, Walloon, and Welsh languages as a variant of letter “a”. Berber languages \"â\" can be used in Berber Latin alphabet to represent [ʕ]. Emilian-Romagnol  is used to represent [aː] in Emilian dialects, as in Bolognese câna [kaːna] \"cane\". French ⟨â⟩, in the French language, is used as the letter ⟨a⟩ with a circumflex accent. It is a remnant of Old French, where the vowel was followed, with some exceptions, by the consonant ⟨s⟩. For", "-25.556433763937093" ], [ "SIE (file format) The SIE format is an open standard for transferring accounting data between different software produced by different software suppliers.\nSIE could be used to transfer data between software on the same computer, but also used for sending data between companies, for example between the company, the accountant and the audit. It can also be used for transferring from trade pre-systems like payables, receivables and salary systems to accounting as well as from accounting to tax administrative special applications. History SIE was formed in 1994 as a Swedish national Accounting standard SW vendor and specialist (accountant/audits) interest group and", "-25.52329866529908" ], [ "system, matres lectionis are still introduced to mark vowels, but the letter Vav is used only as a consonant, while its variants ħolám and šurúq serve as vowel letters. This system also makes clear distinction between final He used as a vowel marker (e.g. ילדה /jalˈda/ \"a girl\" ) and as a consonant (e.g. ילדהּ /jalˈdah/ \"her child\"). This system was never extensively used, and the Academy of the Hebrew Language finally abandoned it in 1992, when new rules were published not assuming any use of vowel dots.\nRules for unvocalized spelling were first issued by the Hebrew Language Committee in", "-25.44799991704349" ], [ "Other uses The capital letter L is used as the currency sign for the Albanian lek and the Honduran lempira. It was often used, especially in handwriting, as the currency sign for the Italian lira. It is also infrequently used as a substitute for the pound sign (£), which is based on it.\nThe Roman numeral Ⅼ represents the number 50. Forms and variants In some sans-serif fonts (i.e., typefaces), the lowercase letter ell ⟨l⟩ may be difficult to distinguish from the uppercase letter eye ⟨I⟩ or the digit one ⟨1⟩. To avoid such confusion, some newer fonts have a finial,", "-25.444334760308266" ], [ "D-side (UK telephone cabling) In a UK telephone line, the term D-side or distribution side refers at any point on a local loop connection between a customer's premises and a telephone exchange to the wires (or pairs of copper wires) leaving into the direction of the customer. Conversely, E-side is the exchange side of a telephone line, that is the wires leaving any connection point into the direction of the telephone exchange.\nThese terms are used, for example, by technicians of Openreach, Virgin Media and other UK phone companies when referring to wiring connections going from a Primary Connection Point (PCP)", "-25.426769092213362" ], [ "Ľ Ľ/ľ is a grapheme found officially in the Slovak alphabet and in some versions of the Ukrainian Latin alphabet. It is an L with a caron diacritical mark, more normally ˇ but simplified to look like an apostrophe with L, and is pronounced as palatal lateral approximant [ʎ], similar to the \"lj-\" sound in Ljubljana or million. Ukrainian ⟨Ľ⟩ appears in some versions of the Ukrainian Latin Alphabet (Latynka), such as Jireček and Luchuk. It represents a palatalised ⟨l⟩, transcribed as /lʲ/. In other versions, it is written as ⟨lj⟩ or ⟨li⟩.", "-25.399244071915746" ], [ "Triptych (philately) A triptych is a philatelic term (from the Greek: \"three\" + \"fold\") which was borrowed from the art world and having the same meaning: a set of three panels hinged together. It is used to describe three se-tenant postage stamps of related design that make up a complete single design.\nIn the US, the form is rarely used, perhaps because it does not lend itself to the popular plate block of four format for collecting. Instead, one frequently sees blocks of two or four or other even number of se-tenant stamps. In 1976, the US produced the \"Spirit", "-25.320444158636747" ], [ "Philately Etymology The word \"philately\" is the English translation of the French \"philatélie\", coined by Georges Herpin in 1864. Herpin stated that stamps had been collected and studied for the previous six or seven years and a better name was required for the new hobby than timbromanie, which was disliked. He took the Greek root word φιλ(ο)- phil(o)-, meaning \"an attraction or affinity for something\", and ἀτέλεια ateleia, meaning \"exempt from duties and taxes\" to form \"philatelie\". The introduction of postage stamps meant that the receipt of letters was now free of charge, whereas before stamps it was normal", "-25.31988643645309" ], [ "French In French, the ellipsis is commonly used at the end of lists to represent et cetera. In French typography, the ellipsis is written close up to the preceding word but has a space after it, for example: comme ça… pas comme ceci. If, exceptionally, it begins a sentence, there is a space before and after, for example: Lui ? … vaut rien, je crois… .\nHowever, any omitted word, phrase or line at the end of a quoted passage would be indicated like this: [...] (space before and after the square brackets but not inside), for example: … à Paris,", "-25.285788880777545" ], [ "Bra–ket notation Introduction Bra–ket notation is a notation for linear algebra and linear operators on complex vector spaces together with their dual space both in the finite-dimensional and infinite-dimensional case. It is specifically designed to ease the types of calculations that frequently come up in quantum mechanics. Its use in quantum mechanics is quite widespread. Many phenomena that are explained using quantum mechanics are explained using bra–ket notation. Vectors vs kets In mathematics, the term \"vector\" is used for an element of any vector space. In physics, however, the term \"vector\" is much more specific: \"vector\" refers almost exclusively", "-25.274100653477944" ], [ "nor emoticons are in his view appropriate in such correspondence. June Hines Moore shares that view. So, too, does Lindsell-Roberts, who gives the same advice of not using them in business correspondence, \"or you won't be LOL\". Acceptance On March 24, 2011, LOL, along with other acronyms, was formally recognized in an update of the Oxford English Dictionary. In their research, it was determined that the earliest recorded use of LOL as an initialism was for \"little old lady\" in the 1960s. They also discovered that the oldest written record of the use of LOL in the contemporary meaning of", "-25.271532681537792" ], [ "Circumflex in French First usages The circumflex first appeared in written French in the 16th century. It was borrowed from Ancient Greek, and combines the acute accent and the grave accent. Grammarian Jacques Dubois (known as Sylvius) is the first writer known to have used the Greek symbol in his writing (although he wrote in Latin).\nSeveral grammarians of the French Renaissance attempted to prescribe a precise usage for the diacritic in their treatises on language. The modern usage of the circumflex accent became standardized in the 18th or 19th century. Indication of a lost phoneme In many cases, the", "-25.264615348773077" ], [ "Composition of relations Notational variations The semicolon as an infix notation for composition of relations dates back to Ernst Schroder's textbook of 1895. Gunther Schmidt has renewed the use of the semicolon, particularly in Relational Mathematics (2011). The use of semicolon coincides with the notation for function composition used (mostly by computer scientists) in category theory, as well as the notation for dynamic conjunction within linguistic dynamic semantics.\nA small circle has been used for the infix notation of composition of relations by John M. Howie in his books considering semigroups of relations. However, the small circle is widely used", "-25.261647705337964" ], [ "L-packet In the field of mathematics known as representation theory, an L-packet is a collection of (isomorphism classes of) irreducible representations of a reductive group over a local field, that are L-indistinguishable, meaning they have the same Langlands parameter, and so have the same L-function and ε-factors. L-packets were introduced by Robert Langlands in (Langlands 1989), (Langlands & Labesse 1979).\nThe classification of irreducible representations splits into two parts: first classify the L-packets, then classify the representations in each L-packet. The local Langlands conjectures state (roughly) that the L-packets of a reductive group G over a local field F are conjecturally", "-25.248992853339587" ], [ "adapted the integral symbol, ∫, from the letter ſ (long s), standing for summa (written as ſumma; Latin for \"sum\" or \"total\"). The modern notation for the definite integral, with limits above and below the integral sign, was first used by Joseph Fourier in Mémoires of the French Academy around 1819–20, reprinted in his book of 1822 (Cajori 1929, pp. 249–250; Fourier 1822, §231).\nIsaac Newton used a small vertical bar above a variable to indicate integration, or placed the variable inside a box. The vertical bar was easily confused with or x′, which are used to indicate differentiation, and the", "-25.24722344172187" ], [ "are directly over C are carved out. Applications The line integral has many uses in physics. For example, the work done on a particle traveling on a curve C inside a force field represented as a vector field F is the line integral of F on C. Quantum mechanics The path integral formulation of quantum mechanics actually refers not to path integrals in this sense but to functional integrals, that is, integrals over a space of paths, of a function of a possible path. However, path integrals in the sense of this article are important in quantum mechanics; for example,", "-25.234238510252908" ], [ "respectively in British English. Centring is an interesting example, since, according to the OED, it is a \"word ... of 3 syllables (in careful pronunciation)\" (i.e., /ˈsɛntərɪŋ/), yet there is no vowel in the spelling corresponding to the second syllable (/ə/). The OED third edition (revised entry of June 2016) allows either two or three syllables. The three-syllable version is listed as only the American pronunciation of centering on the Oxford Dictionaries Online website. The e is dropped for other derivations, for example, central, fibrous, spectral. However, the existence of related words without e before the r is not", "-25.19848108568476" ], [ "The comma and the cedilla are both derivative of a small cursive z (ʒ) placed below the letter. From this standpoint alone, ș, ț, and d̦ could potentially be regarded as stand-ins for sz, tz, and dz respectively.\nIn Latvian, the comma is used on the letters ģ, ķ, ļ, ņ, and historically also ŗ, to indicate palatalization. Because the lowercase letter g has a descender, the comma is rotated 180° and placed over the letter. Although their Adobe glyph names are commas, their names in the Unicode Standard are g, k, l, n, and r with a cedilla. They were", "-25.17917170212604" ], [ "letter j. In the western dialects, /ʎ/ lost its palatal feature and merged with /l/ (alveolar lateral approximant). In the northern dialects, the phoneme /ʎ/ has been preserved.\nThe digraph ly was also used for the sound /ʎ/ in Croatian alphabet before Gaj's Latin Alphabet was introduced.", "-25.151034349692054" ], [ "Lira Lira sign In the Unicode system, 'LIRA SIGN' (U+20A4) maps to ₤, a blackletter L with two bars.\nFor Turkish lira, the Turkish lira sign () is used. The primary symbol for the Italian lira was L. but the symbol ₤ and prefix \"Lit.\" were common. For other currencies L is used, sometimes in a double-crossed script form (₤) or less often single-crossed (£, Unicode 'POUND SIGN'). Occasionally a plain capital \"L\" crossed by a bar (Ł) is used. Other uses The Carl Lindström Company and its subsidiary Parlaphone Records used the ₤ symbol in a circle as its trademark,", "-25.14648066670634" ], [ "D with stroke Đ (lowercase: đ, Latin alphabet), known as crossed D or dyet, is a letter formed from the base character D/d overlaid with a crossbar. Crossing was used to create eth (ð), but eth has an uncial as its base whereas đ is based on the straight-backed roman d. Crossed d is a letter in the alphabets of several languages and is used in linguistics as a phonetic symbol. Appearance In the lowercase, the crossbar is usually drawn through the ascender, but when used as a phonetic symbol it may be preferred to draw it through the bowl,", "-25.138848183902155" ], [ "Pentomic Pentomic (cf. Greek pent(e)- and -tome, \"of five parts\") refers to a structure for infantry and Airborne divisions adopted by the U.S. Army in 1957 in response to the perceived threat posed by tactical nuclear weapons use on the battlefield.\n\"Pentomic Division\" was \"a public relations term designed to combine the concept of five subordinate units ('penta') with the idea of a division that could function on an atomic or nonatomic battlefield.\" Nuclear battlefields The addition of mechanization to army forces led to rapid changes in doctrine. During World War I the defensive firepower of infantry forces and especially", "-25.065029851451982" ], [ "Acrostic An acrostic is a poem (or other form of writing) in which the first letter (or syllable, or word) of each line (or paragraph, or other recurring feature in the text) spells out a word, message or the alphabet. The word comes from the French acrostiche from post-classical Latin acrostichis, from Koine Greek ἀκροστιχίς, from Ancient Greek ἄκρος \"highest, topmost\" and στίχος \"verse\". As a form of constrained writing, an acrostic can be used as a mnemonic device to aid memory retrieval.\nRelatively simple acrostics may merely spell out the letters of the alphabet in order; such an acrostic may", "-24.950954493368044" ], [ "a separate phoneme – \"jat diphthong\" – or even two phonemes, one short and one long. There are even several proposals by Croatian linguists for an orthography reform concerning these two diphthongs, but they have not been seriously considered for implementation.\nThe ongoing standardization of Montenegrin has introduced two new letters, ⟨Ś⟩ and ⟨Ź⟩, for the sounds [ɕ] and [ʑ] respectively. These are optional spellings of the digraphs ⟨sj⟩ and ⟨zj⟩. Critics note that [ɕ] and [ʑ] are merely allophones of /sj/ and /zj/ in Herzegovinian dialects such as Montenegrin, so the new letters are not required for an adequate orthography.\nMost", "-24.950069895829074" ], [ "Ve (Cyrillic) History Both Ve and the Cyrillic letter Be (Б б) were derived from the Greek letter Beta (Β β), which already represented /v/ in Greek by the time that the Cyrillic alphabet was created. \nIn the Early Cyrillic alphabet, its name was вѣдѣ (vědě), meaning \"I know\".\nIn the Cyrillic numeral system, it had the value of 2. Usage In Russian and Bulgarian, Ve generally represents /v/, but at the end of a word or before voiceless consonants, it represents the voiceless [f]. Before a palatalizing vowel, it represents /vʲ/.\nIn standard Ukrainian pronunciation (based on the Poltava dialect), Ve represents a", "-24.945653594331816" ], [ "written as 'me'. Although this will have no effect in printing applications (both print the letter 'ම'),\nit is highly recommended to stick to this usage.\nMost of the base letters are obtained in an obvious way (note that 'e' could be used instead of 'a' to print the same letter):\nka - ක, ga - ග, ja - ජ, ta - ට, da - ඩ, na - න, pa - ප, ba - බ, ma - ම, ya - ය, ra - ර, la - ල, wa - ව, sa - ස, ha - හ\nSome require two letters:\ncha - ච, tha -", "-24.938086616108194" ], [ "L-function In mathematics, an L-function is a meromorphic function on the complex plane, associated to one out of several categories of mathematical objects. An L-series is a Dirichlet series, usually convergent on a half-plane, that may give rise to an L-function via analytic continuation.\nThe theory of L-functions has become a very substantial, and still largely conjectural, part of contemporary analytic number theory. In it, broad generalisations of the Riemann zeta function and the L-series for a Dirichlet character are constructed, and their general properties, in most cases still out of reach of proof, are set out in a systematic way.", "-24.936785100609995" ], [ "the comma is used to denote Logical Conjunction (\"and\").\nThe comma-separated values (CSV) format is very commonly used in exchanging text data between database and spreadsheet formats. Diacritical usage The comma is used as a diacritic mark in Romanian under the s (Ș, ș), and under the t (Ț, ț). A cedilla is occasionally used instead of it, but this is technically incorrect. The symbol d̦ (d with comma below) was used as part of the Romanian transitional alphabet (19th century) to indicate the sounds denoted by the Latin letter z or letters dz, where derived from a Cyrillic ѕ (/dz/).", "-24.931226905740914" ], [ "is all necessary information, the L is used as a filler until you reach 4 letters. Note that the '一' is also the shortcut character for 'G' (making it one stroke only in practice).\nExample 3c: 广: The code for this character is 'YYGT'. At first, you type the key where this character is located, which is a 'Y'. Then, you type a 点 stroke, which is also on 'Y'. The next will be the 横 stroke on 'G', and the last will be the 捺, on 'T'. Characters requiring disambiguation strokes Example 4: 等\nConsists of three components: t (竹), f", "-24.90837357658893" ], [ "/l/, as an [m] before /m/, /p/ or /w/, as an [ŋ] before /k/, and as an [ɲ] before /j/.\nBecause of its small phoneme inventory, Toki Pona allows for quite a lot of allophonic variation. For example, /p t k/ may be pronounced [b d ɡ] as well as [p t k], /s/ as [z] or [ʃ] as well as [s], /l/ as [ɾ] as well as [l], and vowels may be either long or short. Writing systems 14 Latin letters, a e i j k l m n o p s t u w, are used to write the", "-24.876412031939253" ], [ "⟨n⟩ or ⟨m⟩ followed a vowel, it was often omitted, and a tilde (i.e., a small ⟨n⟩) was placed over the preceding vowel to indicate the missing letter; this is the origin of the use of tilde to indicate nasalization (compare the development of the umlaut as an abbreviation of ⟨e⟩.) The practice of using the tilde over a vowel to indicate omission of an ⟨n⟩ or ⟨m⟩ continued in printed books in French as a means of reducing text length until the 17th century. It was also used in Portuguese, and Spanish.\nThe tilde was also used occasionally", "-24.875017968122847" ], [ "dictionaries. The abbreviated form &c. or &c is still occasionally used (The ampersand character, &, derives from a ligature of et).\nThe phrase et cetera is often used to denote the logical continuation of some sort of series of descriptions. For example, in the following expression:\n     We will need a lot of bread: wheat, granary, wholemeal, etc.\nIn blackletter (Gothic or Fraktur) typography, the \"r rotunda\" (ꝛ) is sometimes used for et in place of the similar-looking Tironian et (⁊), followed by c, to yield ꝛc. In popular culture In the 1956 film The King and I, Yul Brynner repeatedly", "-24.860100055957446" ], [ "Thus programming languages like Java, the C family, Javascript etc. use semicolons to obtain a proper structure in the respective languages. Data The semicolon is often used to separate elements of a string of text. For example, multiple e-mail addresses in the \"To\" field in some e-mail clients have to be delimited by a semicolon.\nIn Microsoft Excel, the semicolon is used as a list separator, especially in cases where the decimal separator is a comma, such as 0,32; 3,14; 4,50, instead of 0.32, 3.14, 4.50.\nIn MATLAB and GNU Octave, the semicolon can be used as a row separator when", "-24.846061358228326" ], [ "vocês (\"[to] you\", plural and singular) is currently rare in General BP, where lhe is often replaced as noted above by te or, alternatively, by para você. On the other hand, lheísmo, i.e. the use of lhe not only as an indirect object (e.g. Eu lhe dou meu endereço, \"I will give you my address\"), but also as a direct object (e.g. Eu lhe vi na praia ontem, Eng. \"I saw you at the beach yesterday\") is frequent in Northeastern Brazilian dialects, especially in Bahia.\nIn standard written BP, it is common to use lhe(s) as indirect object forms", "-24.83984027983388" ], [ "phonemic, is not indicated in Tifinagh. The letter t, +, is often combined with a preceding letter to form a ligature. Most of the letters have more than one common form, including mirror-images of the forms shown here.\nWhen the letters l and n are adjacent to themselves or to each other, the second is offset, either by inclining, lowering, raising, or shortening it. For example, since the letter l is a double line, ||, and n a single line, |, the sequence nn may be written || to differentiate it from l. Similarly, ln is |||, nl |||,", "-24.783730737006408" ], [ "letters ae and oe (diphthongs, as are Greek αι and οι) and are often written that way (e.g., Caesar, phoenix). However, since in A-L both ae and oe represent a simple vowel, not a diphthong, the use of the single letters æ and œ better represents the reality of A-L pronunciation.\nDespite being written with two letters, the sequences ch, ph, rh, th represent single sounds. The letter x, on the other hand, usually behaves like a sequence of two sounds (being equivalent to cs). Syllables The simple vowels of A-L (a, æ, e, ei, i, o, œ, u, y) can", "-24.78232255212788" ], [ "is used in easy-open packaging. Since the creation of perforation devices in the 1840s and 1850s, it has seen use in several areas.\nPostage stamps are one common application of this, where small round holes are cut in lines to create individual pieces. Perforations on stamps are rather large, in the order of a millimeter, in comparison other perforated materials often have smaller holes.\nIt is common for cheque-books, notebooks and legal pads to have perforations making it easier to tear out individual pages or leaves. Perforation is used in ways to separate loose leaf (or even a form of graph", "-24.766644223360345" ], [ "either of the two letters or just leave it blank (e.g. saken can also be spelled sakn and sakun in the internet). \"Ë\" may also be used as recommend by the Komisyong ng Wikang Filipino's Ortograpiyang Pambansa of 2013.\nIn 1996, McKaughan and Macaraya, in their revised Maranao dictionary, the digraph \"ae\" was introduced and used to represent the supposed presence of the vowel /ɨ/.\nDouble vowels are pronounced separately. For example, \"kapaar\" is pronounced as /kapaʔaɾ/.\nIn some older orthographies, \"q\" is used for the glottal stop regardless of position, while in others an apostrophe is used. Outside of linguistic literature, the", "-24.74642296670936" ], [ "[tʃ], [dʒ], [ʃ] and [ʒ] respectively. The combination ⟨sc⟩ appears in Papiamento in loan words such as adolescente, but it is not considered a digraph. Use of C The pronunciation of ⟨c⟩ in both dialects follows the general rule of the hard and soft ⟨c⟩ as in Latin-based orthographies of various European languages, i.e. pronounced [s] before ⟨e⟩ and ⟨i⟩, and [k] elsewhere. However, the use of ⟨c⟩ differs per dialect. As Papiamento is focused more on etymology than phonemic spelling, the ⟨c⟩ is far more commonly used compared to Papiamentu, where its use is limited to proper names.\nThere is", "-24.743662357563153" ], [ "Laplace transform In mathematics, the Laplace transform is an integral transform named after its inventor Pierre-Simon Laplace (/ləˈplɑːs/). It transforms a function of a real variable t (often time) to a function of a complex variable s (complex frequency). The transform has many applications in science and engineering.\nThe Laplace transform is similar to the Fourier transform. While the Fourier transform of a function is a complex function of a real variable (frequency), the Laplace transform of a function is a complex function of a complex variable. Laplace transforms are usually restricted to functions of t with t", "-24.726889735553414" ], [ "Claude Émile Jean-Baptiste Litre Claude Émile Jean-Baptiste Litre is a fictional character created in 1978 by Kenneth Woolner of the University of Waterloo to justify the use of a capital L to denote litres.\nThe International System of Units usually only permits the use of a capital letter when a unit is named after a person. It is often difficult to distinguish between the character \"l\" and the digit \"1\" in certain fonts or handwriting, and therefore both the lower-case (l) and the upper-case (L) are allowed as the first letter in litre. The United States National Institute of Standards and", "-24.721961925315554" ], [ "The orthography is more or less similar to the one employed by Tagalog: b, d, f, g, h, k, l, m, n, ng (for /ŋ/), s, t, w, and y (for /j/). Though other letters may be used in writing foreign words.\nAwed et al. (2004) use a system of diacritics to accommodate the seven vowel phonemes of Tboli. The vowels are: a, i, é (for /ɛ/), e (for /ə/), ó (for /o/), u, and o (for /ɔ/).\nThe glottal stop /ʔ/ is usually not represented in writing. Though the grave accent ` is used to represent it as in ngà /ŋaʔ/", "-24.710645177052356" ], [ "letters are used in standard spelling, the I.T.A. simply used larger versions of the same lower-case characters. The following chart shows the letters of the 44-character version of the I.T.A., with the main pronunciation of each letter indicated by symbols of the International Phonetic Alphabet beneath:\nNote that \"d\" is made more distinctively different from \"b\" than is usual in standard typefaces (which is possible since in the I.T.A. there is no \"q\").\nLater a 45th symbol was added to accommodate accent variation, a form of diaphonemic writing. In the original set, a \"hook a\" or \"two-storey a\" (a) was used for", "-24.70578326069517" ], [ "pronounced /ʎ/ by many speakers. However, even it is sometimes subject to the same reduction to /j/ that ly has been, mainly if it is at the end of a word. History Originally, the digraph letter ly was used to represent the palatal lateral /ʎ/, just as the digraph letter ny is still used to represent the palatal nasal /ɲ/. However, in the eastern dialects as well as in the standard dialect, the phoneme /ʎ/ lost its lateral feature and merged with /j/ (akin to Spanish yeísmo). The Hungarian letter ly came to be pronounced the same as the Hungarian", "-24.682896823156625" ], [ "is not clear or the monosyllabic cognate is not in common use in American English (e.g., null is used mainly as a technical term in law, mathematics, and computer science).\nIn the UK, a single l is generally preferred in distil(l), instil(l), enrol(l), and enthral(l)ment, and enthral(l), although ll was formerly used; these are always spelled with ll in American usage. The former British spellings instal, fulness, and dulness are now quite rare. The Scottish tolbooth is cognate with tollbooth, but it has a distinct meaning.\nIn both American and British usages, words normally spelled -ll usually drop the second l when", "-24.682266917312518" ], [ "as P,L) indicated a unique letter on the square (Q). The pad was never reused while the substitution square could be reused without loss of security. This enabled rapid and secure encoding of messages.", "-24.677345884032547" ], [ "NPV is that the dot product of the Poynting vector and wavevector is negative (i.e. that ); however this definition is not covariant. Whilst this restriction is rarely of practical significance, the criterion has nevertheless been generalized into a covariant form. For plane waves propagating in a Veselago NPV medium, the electric field, magnetic field and wave vector follow a left-hand rule, rather than the usual right-hand rule. This gives rise to the name \"left-handed (meta)materials\". However, the terms left-handed and right-handed can also arise in the study of chiral media, so this terminology is best avoided. Refraction", "-24.667608510120772" ], [ "Emic unit History and terminology The first emic unit to be considered, in the late 19th century, was the phoneme. The word phoneme comes from the Greek: φώνημα, phōnēma, meaning \"that which is sounded\", from the verb φωνέω, phōneō, \"sound\", which comes in turn from the noun φωνή, phōnē, \"sound\". Thus it was originally used (in its French form phonème) to refer simply to a speech sound. But it soon came to be used in its modern sense, to denote an abstract concept (for more details, see Phoneme: Background and related ideas). It is by analogy with phoneme that other", "-24.66759103903314" ], [ "used instead of ⟨i⟩ in diphthongs, as a replacement for final -ii, and in vowel groups (as in Savoja); this rule was quite strict for official writing. ⟨j⟩ is also used to render /j/ in dialect, e.g. Romanesco dialect ⟨ajo⟩ [ajo] (garlic; cf. Italian aglio [aʎo]). The Italian novelist Luigi Pirandello used ⟨j⟩ in vowel groups in his works written in Italian; he also wrote in his native Sicilian language, which still uses the letter ⟨j⟩ to represent /j/ (and sometimes also [dʒ] or [gj], depending on its environment). Basque In Basque, the diaphoneme represented by ⟨j⟩ has a variety", "-24.65632436767919" ], [ "Kunrei-shiki and Hepburn romanisations of Japanese, ⟨z⟩ stands for a phoneme whose allophones include [z] and [dz]. Other systems A graphical variant of ⟨z⟩ is ⟨ʒ⟩, which has been adopted into the International Phonetic Alphabet as the sign for the voiced postalveolar fricative. Other uses In mathematics, U+2124 ℤ (DOUBLE-STRUCK CAPITAL Z) is used to denote the set of integers. Originally, ℤ was just a handwritten version of the bold capital Z used in printing but, over time, it has come to be used more frequently in printed works too.\nIn chemistry, the letter Z is used to denote the Atomic", "-24.63969920523232" ], [ "sesquisyllable (from Latin: sesqui- meaning \"one and a half\"), consisting of a stressed syllable with approximately the above structure, preceded by an unstressed \"minor\" syllable consisting only of a consonant and a neutral vowel /ə/. That structure is present in many conservative Mon–Khmer languages such as Khmer (Cambodian), as well as in Burmese, and it is reconstructed for the older stages of a number of Sino-Tibetan languages. Tone systems Phonemic tone is one of the most well-known of southeast Asian language characteristics. Many of the languages in the area have strikingly similar tone systems, which appear to have", "-24.638627489854116" ], [ "However, because it is harder to pronounce, the short form hextet is used—in analogy to how hex is commonly used as an abbreviation for hexadecimal in computing. This usage of hex to mean 16 is also in line with the similar IEEE 1754 term hexlet indicating 16 octets.\nAlthough the word hextet is not officially recognized in the IETF documents, the word is used in technical literature on IPv6 published after the Internet Draft. Official IETF documents simply refer to them as pieces.\nCisco sources generally use the term quartet as does IPv6.com, a reference either to the four digit grouping or", "-24.628646340512205" ], [ "contains only 4 letters C, O, D and E, each of length 2. To represent the letter O using the previous method, we need to either add a lot of zeros:\n0, 0, 2, 2, 2, 0, ... , 2, ...\nor record which 4 letters we have used. Each way makes the description longer than:\n(0,4), ('C','O','D','E')\nThe JPEG File Interchange Format uses this method of encoding, because at most only 162 symbols out of the 8-bit alphabet, which has size 256, will be in the codebook. Pseudo code Given a list of symbols sorted by bit-length, the following pseudo code will", "-24.622765237640124" ], [ "(such as in the syllable coda; e.g. sòl [ˈsɔɫ] 'ground'), /l/ is dark irrespective of position in Eastern dialects like Majorcan and standard Eastern Catalan (e.g. tela [ˈtɛɫə]).\nThe distribution of the two rhotics /r/ and /ɾ/ closely parallels that of Spanish. Between vowels, the two contrast (e.g. mirra [ˈmirə] 'myrrh' vs. mira [ˈmiɾə] 'look'), but they are otherwise in complementary distribution. [ɾ] appears in the onset, except in word-initial position (ruc), after /l/, /n/, and /s/ (honra, Israel), and in compounds, where [r] is used. Different dialects vary in regards to rhotics in the coda, with Western Catalan generally", "-24.618343889247626" ], [ "to get the longer vowel. Thus the 'sumihiri' convention implies less effort in typing, too. The other remark concerns the use of 'E' for the 'එ' sound. 'E' is used for this as we have used the 'e' to indicate the closed 'අ' sound (see above). However, the corresponding long vowel sound is still indicated by 'ee'.\nFurthermore, the following vowel sounds exist:\n ai - ඓ, au - ඖ Other Letters Other forms of Sinhala letters are created by combining vowel sounds with the base letters. Example Here is a complete example of sumihiri usage to create various forms of the", "-24.617648561121314" ], [ "entirely different phonemic referents in the various languages that use it in their orthographies (English /juː/, /ʊ/, /ʌ/ etc., French /y/, German /uː/, /u/, etc., not to mention various uses of U as a symbol). CJK fullwidth forms In traditional Chinese character encodings, characters usually took either a single byte (known as halfwidth) or two bytes (known as fullwidth). Characters that took a single byte were generally displayed at half the width of those that took two bytes. Some characters such as the Latin alphabet were available in both halfwidth and fullwidth versions. As the halfwidth versions were more commonly", "-24.61575491214171" ], [ "to the rules; nüe and lüe should be used instead. However, some Chinese input methods (e.g. Microsoft Pinyin IME) support both nve/lve (typing v for ü) and nue/lue. Phonological intuition The placement of the tone marker, when more than one of the written letters a, e, i, o, and u appears, can also be inferred from the nature of the vowel sound in the medial and final. The rule is that the tone marker goes on the spelled vowel that is not a (near-)semi-vowel. The exception is that, for triphthongs that are spelled with only two vowel letters, both of", "-24.602412070147693" ], [ "frequent though in the speech of polite speakers, but seem to be losing ground as well. Note, however, that ele(s) or ela(s) are never used as direct objects in formal writing, such as newspaper articles, academic papers, or legal documents. The use of -lo, -la, etc. replacing \"você\" as direct object is restricted mostly to the written language (in particular, movie subtitles) although it occurs frequently in a few fixed expressions like Prazer em conhecê-lo (\"Pleased to meet you\") or Posso ajudá-lo? (\"May I help you?). Lhe(s) The use of lhe and lhes as indirect object forms of você and", "-24.602378474664874" ], [ "emic units, such as the morpheme and the grapheme, were named using the -eme suffix. The actual terms \"emic unit\" and \"etic unit\" were introduced by Kenneth Pike (1954).\nThe prefix allo- used in terms such as allophone is from the Ancient Greek ἄλλος meaning \"other\". The prefix is also used in chemistry. Generalizations outside linguistics In linguistics a distinction is made between so-called \"emic\" and \"etic\" accounts. For example a phonemic description is one expressed in terms of phonemes, whereas a phonetic one is based on the phones actually produced. This distinction was generalized by Pike (1954) and is applied", "-24.577475769037846" ], [ "Latin letters in its system.\nRomanization of Pashto uses Č/č, Š/š, Ž/ž, X̌/x̌, to represent the letters چ, ش, ژ, ښ, respectively. Additionally, Ṣ̌/ṣ̌ and Ẓ̌/ẓ̌ are used by the southern Pashto dialect only (replaced by X̌/x̌ and Ǵ/ǵ in the north).\nThe latter Š/š is also used to transcribe the /ʃ/ phoneme in Sumerian and Akkadian cuneiform, and the /ʃ/ phoneme in Semitic languages represented by the letter shin (Phoenician and its descendants). Other uses The caron is also used in Mandarin Chinese pinyin romanization and orthographies of several other tonal languages to indicate the \"falling-rising\" tone (similar to the", "-24.562655949324835" ], [ "Ä Independent letter The letter Ä occurs as an independent letter in the Finnish, Swedish, Skolt Sami, Karelian, Estonian, Luxembourgish, North Frisian, Saterlandic, Emiliano-Romagnolo, Rotuman, Slovak, Tatar, Gagauz, and Turkmen alphabets, where it represents a vowel sound. In Finnish and Turkmen this is always /æ/; in Swedish and Estonian, regional variation, as well as the letter's position in a word, allows for either [æ] and [ɛ]. In German and Slovak Ä stands for [ɛ] (or a bit archaic but still correct [æ]).\nIn the Nordic countries, the vowel sound [æ] was originally written as \"Æ\" when Christianisation caused the former Vikings", "-24.56145853820226" ], [ "mathematics The term pentacle is used in Tilings and Patterns by Grumbaum and Shepard to indicate a five-pointed star composed of ten line segments, similar to a pentagram but containing no interior lines.", "-24.561030080833007" ], [ "CV, CGV, and N: Avatime allows consonant-approximant clusters, where the approximant may be /l/, /w/, /j/. There is also a syllabic nasal, which takes its own tone: /kpāŋ̄/ \"many\".\nAny consonant but /n/, /l/ may form a cluster with /l/: /ɔ̀kplɔ̄nɔ̀/ \"table\", /ɔ̀ɡblāɡɛ̄/ \"snake\", /káɣʷlɪ̀tsã̀/ \"chameleon\", /sɪ̄ŋʷlɛ̀sɛ̃̀/ \"mucous\". After a coronal consonant, the /l/ is pronounced [r].\nWhen two vowels come together, they are either separated by a glottal stop [ʔ], fuse into a single vowel, or the first vowel reduces to a semivowel. In the latter case, the four front vowels reduce to [j] and three of the back vowels reduce", "-24.555057611098164" ], [ "it represents, while the compression maps a set of words on to a schema.\nIn the following definitions denotes an alphabet, denotes all words of length over the alphabet , denotes the alphabet with the extra symbol . denotes all schema of length over the alphabet as well as the empty schema .\nFor any schema the following operator , called the of , which maps to a subset of words in :\nWhere subscript denotes the character at position in a word or schema. When then", "-24.540071279392578" ], [ "it represents /x/ in the word \"doh\"; it represents /ç/ in \"ihlet\"; and it is silent in \"Cseh\". As part of a diphthong, it represents, in archaic spelling, /t͡ʃ/ with the letter C as in the name \"Széchényi; it represents, again, with the letter C, /x/ in \"pech\" (which is pronounced [pɛx]); in certain environments it breaks palatalization of a consonant, as in the name \"Horthy\" which is pronounced [hɔrti] (without the intervening H, the name \"Horty\" would be pronounced [hɔrc]); and finally, it acts as a silent component of a diphthong, as in the name \"Vargha\", pronounced [vɒrgɒ].\nIn Ukrainian", "-24.53354066851898" ], [ "local word for the unit in question, and which can therefore differ from one language to another, SI symbols are a form of standardised mathematical notation to represent the units and are the same in any language (compare chemical symbols).\nThere are certain circumstances where abbreviations (as opposed to the SI symbols) are used, particularly where safety is concerned. One such instance is the use of \"mcg\" rather than \"μg\" to represent \"micrograms\" in the pharmaceutical industry. Area The SI unit of area is the square metre (m²), but when the metric system was first introduced in 1795, the unit of", "-24.530193038488505" ] ]
3ja14y
Kim Davis, Rowan County, Kentucky who is refusing to issue gay marriage licenses
[ "For anyone who hasn't heard of this whole situation, here's a summary: Kim Davis is the County Clerk for Rowan County, Kentucky. After the Supreme Court ruled that states cannot ban same-sex marriage, she stopped giving out marriage licenses to any couple. Davis based her actions on the idea that same-sex marriage conflicts with her Christian beliefs, so she refuses to be involved with a marriage between people of the same sex. Davis took the matter to court, arguing that her religious views should excuse her from the aspects of her job that she considers immoral. The court did not accept her position, so she appealed, and again the courts said she could not stop issuing marriage licenses. While this was going on, Davis was granted a \"stay,\" which basically said she could keep denying marriage licenses while the matter was in court. The stay just expired and the Supreme Court rejected an extension to the stay. As a result, it's pretty clear that Davis will not be able to get legal permission to continue avoiding issuing marriage licenses. In spite of the courts telling her she needs to issue the licenses, Davis still refuses to do so. By continuing to do this, she risks being fined or jailed at a later point in time. However, because County Clerk is an elected position, she cannot be fired. It is possible that she could impeached by the legislature, but that would not be a simple procedure. TL;DR: County Clerk refuses to give out marriage licenses, citing religious objections to same-sex marriage. Issue goes to court and all rulings go against her. Clerk continues to refuse to give out marriage licenses, but she can't just be fired or anything straightforward like that.", "ELI5: How could she be divorced three times, and still claim religious exemption for a religion she clearly picks and chooses the rules she wishes to follow?", "Think of it like this. Your parents tell you its ok to have an imaginary friend. Your parents ask you to do your chores, but your imaginary friend says not to after you've agreed to do your chores. You then cry and whine to everyone that your parents are being unfair and say that anyone who doesn't listen to your imaginary friend is ruining your life. Your parents are the government, your imaginary friend is Jesus, and your chores are to get paid 3 times as much as you should be paid to sign pieces of paper that let people be married under the government's eyes.", "Since she is being jailed for contempt, and can't be 'fired' because she is an elected official, does that mean she's basically stuck in jail believing herself to be a martyr for her cause until she either resigns, gives up, or is impeached?", "There is an old saying that comes to mind in this case: \"Your right to swing your fist ends at the tip of my nose\". She can't be fired because she is elected. She is not in jail because of her religion, she is in jail because of contempt of court. The law of the land is not a moveable feast. You cannot decide which ones you are going to obey and which ones you are going to ignore when you are an elected official. Her right to practice her religious beliefs (swing her fist) are trumped by the law of the land when she violates the legal rights of others (tip of my nose). Court told her to stop swinging her fist into other people's noses, and she kept beating up on others anyway.", "How is Kim Davis refusing to do her job of issuing marriage licenses different than Barack Obama refusing to enforce immigration and drug laws?", "I don't, in any way, agree with this woman, and I don't mean, in any way, to blame the couples who just want to get married. But my question is, Why do they have to get their license from HER? Can't they go to another city or county? They shouldn't have to, but they can, right? I feel like, if it was me, I'd want to make a stink about how awful she's being, but I'd want to be married more.", "Let everyone be subject to the governing authorities, for there is no authority except that which God has established. The authorities that exist have been established by God. Consequently, whoever rebels against the authority is rebelling against what God has instituted, and those who do so will bring judgment on themselves. - Romans 13 Any questions, Ms. Davis?", "I would love to have this explained as well. It seems silly that a judge commanded her to do something like that. Shouldn't she simply be fired? She is refusing to do her job correctly. Each time she does this she is making the state vulnerable to lawsuits. Why is it that the legal action being taken is against her instead of the state for employing someone who is willfully breaking the law?", "I don't understand the big debate. Kim Davis is citing freedom of religion not just \"while\" but in order to force her religious views on others. Literally the only reason she thinks it is ok to not issue marriage licenses to same sex couples is precisely the reason why its NOT ok. The blatant hypocrisy is baffling. This government was specifically founded secularly, so any justifications for her actions as a GOVERNMENT official that are \"because religion\" are invalid.", "Question: She is being jailed indefinitely until she gives gay marriage licenses out. How are they still going to make her do it once she is released? She goes back to work, refuses a licence, goes back to jail, goes back to work, again refuses, back to jail. Is this how this is working? Are they going to force her to quit her role?", "Can someone explain how it is that she is getting out of jail, but still saying she is not going to issue licenses? I thought that to get out of jail, she had to either resign or agree to issue licenses to homosexual couples. So how is it that she's out but not doing either of those things? What happens next?", "One last thing. How do we know that Davis really is acting out of religious faith and not just bigotry because she hates gays? Wouldn't the government have to have some sort of RELIGIOUS TEST for her to pass to make sure it's actually religion and not something else? Let's say I'm in the air force. And I realize on the eve of battle that I am a Quaker pacifist. Can I keep my job and pay but not fight? Do they join me up to a Quaker tester machine to see if I'm lying? Let's say I'm a meat inspector. And I convert to Islam. (Like Davis had a religious awakening whilst on the job). Can I not certify any meat processors that are not halal? How about if there are none? Can I just sit on my ass? Government has a DUTY to uphold the constitution (the real one, not the one they wish it was if Jesus was president) and perform FAIRLY and within the law for all US citizens. Otherwise there is no freedom, only anarchy driven by money, power, and religious zealots.", "Why do \"Christians\", I use quotations out of respect for people that acually do follow Christianity, why do they cherry pick their believes she doesn't want to be stoned to death ok that's understandable. Then why does she feel ok to get married again that's just as sacrilegious as gay marriage and even worse since she had a child from an afair. I just don't understand how Christian Conservative Terrorists can make these more stand claims while they're completely devoid of morals under their own beliefs? Tldr; We must call these people what they are Christian Conservative Terrorists, and refuse to address them as anything but what they are. If you're Christian you have just as much duty to stomp this out as an Islamic would Radical Islamic Terrorists.", "I've begun to see those arguing in support of Kim Davis stating that the ruling of the Supreme Court does not make a law and only Congress can create laws therefore she is doing nothing wrong. So what is it that the Supreme Court does that are not making laws? Is it that equal marriage is a right, not a law? I'm pretty much convinced these people are just using words and nothing they argue in this situation makes any sense. Also if this argument actually made sense, even her incompetent lawyer would have been using this in her defense but rather he chose to invoke Nazi comparisons.", "Let me start by saying I'm FOR marriage equality, but what I don't get is why isn't she just moved to a different position within that office and the \"office manager\" or someone else fulfill the license requests? Just as I have the right to my opinion of marriage equality, she has a right to her opinion of no equality, but this should be a non-issue. Just have someone else do the job...", "The 14th amendment states \"No State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States\". Wouldn't KY making her issue marriage licenses be enforcing a law that infringes on her right to freedom of religion? I know that the 14th amendment was intended for former slaves but it should still apply to everyone correct?", "Can someone explain the argument of a Hindu man being thrown into jail for refusing to slaughter a cow. I don't understand the similarity. Wouldn't the cow have already been slaughtered and he would be filling out the paperwork stating the cow was slaughtered? It's a state document for an action that has already taken place, correct?", "Now that Kim has been jailed and 5 of her 6 deputies have agreed to issue licenses - what happens now with her son, the 6th deputy who is still refusing? Is he able to skate by now that the office is issuing in general? How is he held accountable to the law now too?", "Forgive my ignorance when it comes to US law, but I do not understand why Kim Davis was put in jail, instead of just fired? Wouldn't a better solution just for whoever is her boss to fire her for non-compliance and the problem would be solved?", "Is there anything stopping the governor from bringing in clerks from other counties into Rowan County to issue the marriage licenses? I don't see why there should be a delay if there are other clerks in the state who are willing to issue licenses.", "It's simple. Her job has certain requirements. She is unwilling to perform her job. Rather then bitching and moaning about her \"rights\", she needs to find a new job. That's the way it works in the real world.", "Gay marriage does not make babies so some people have a problem calling it marriage. Others see it as an attack on a cultural practice that has been around for thousands of years.", "Can someone explain to me the limits of the freedom of religion regarding this case, and why her actions and decision are or are not protected?", "ELI5: How come this job is done by an elected official and it is not just a regular government position for which you can apply?", "Why is all the focus on Davis when she is not the only clerk pulling this stunt?", "What is happening now that she has been released. And, why was she released?", "Can't she just be replaced with someone who isn't an incompetent nut?", "Could she quit herself? Couldn't someone bribe her into quitting?" ]
[ [ "filed a lawsuit in the United States District Court for the Eastern District of Kentucky against Kim Davis. The case was assigned to Judge David L. Bunning. Hearings for a preliminary injunction ordering Kim Davis to issue marriage licenses to all couples were held on July 13, and July 20. The plaintiffs contend that Obergefell mandates marriage licenses be issued to all couples across the nation, including in Rowan County. Davis contends that the First Amendment protects her from having to do so, as her religious beliefs forbid her to issue marriage licenses to same-sex couples, and thus she stopped", "-32.192055395731586" ], [ "marriage licenses to same-sex couples. The most famous one is Kim Davis, county clerk for Rowan County, Kentucky, who claimed to be acting \"under God's authority\" when she protested the nationwide legalization of same-sex marriage in 2015 by refusing to issue marriage licenses to couples of any gender. She served five days in jail for contempt of court. Similarly, in 2015, a Tennessee judge protested the legalization of same-sex marriage by his refusal to issue a divorce to an opposite-sex couple. He argued that the Supreme Court's ruling revealed that it believed the state of Tennessee \"to be incompetent to", "-31.319372620317154" ], [ "In May 2012, both Lambda Legal and the American Civil Liberties Union filed lawsuits in state court challenging the refusal of the Cook County clerk's office to issue marriage licenses to same-sex couples. Both contend that the Illinois Marriage and Dissolution of Marriage Act violates the Illinois Constitution's guarantees of equal protection and due process. These lawsuits have since been abandoned due to the State Legislature passing a same-sex marriage law in November 2013.\nOn February 21, 2014, a federal judge authorized Cook County to issue marriage licenses to same-sex couples without waiting for the Illinois statute legalizing same-sex marriage to", "-31.299528388510225" ], [ "Miller v. Davis Background and District Court On June 26, 2015, the Supreme Court of the United States ruled in Obergefell v. Hodges that a state may not refuse marriage licenses to same-sex couples. Kentucky had previously banned same-sex marriage by constitutional amendment, thus same-sex couples rushed to get married as soon as the decision was handed down. The county clerk of Rowan County, Kim Davis, has refused to issue marriage licenses to any couple, same-sex or opposite-sex, since the decision.\nOn July 1, 2015, two same-sex couples and two opposite-sex couples represented by the American Civil Liberties Union of Kentucky", "-31.236488269874826" ], [ "is to share in legal property and assets as well.\" Marriage historian Stephanie Coontz also criticized Jones' refusal to issue state marriage licences because it \"penalizes heterosexual couples who are coming to the church without actually winning anything for same-sex couples.\"\nJones' concerns were that the U.S. same-sex marriage debate \"has been bogged down … by a blurring of religious and legal definitions of marriage.\" Two factors contribute to these blurred definitions: religious groups' activism against same-sex marriage, and clergy acting as both religiously sanctioned and state-sanctioned agents during a wedding. Jones advocated for a European model of marriage, where the", "-30.571716310456395" ], [ "Kentucky and the other states lacked legal standing to sue on behalf of their residents and that the plaintiffs were representing solely the interests of egg farmers, not \"a substantial statement of their populations.\" Civil liberties In 2002, Conway expressed support for some provisions of the Patriot Act. In 2010, he expressed satisfaction that the act had been amended to provide more judicial restraint of surveillance by federal agents. On February 27, 2014, Conway filed for a 90-day delay on District Court Judge John Heyburn's February 12, 2014 ruling, which ruled that Kentucky's ban on recognizing same-sex marriages from other", "-30.5690430351533" ], [ "marriage license issue, while the out-of-state recognition issue was appealed.\nOn July 1, 2014, U.S. District Judge John G. Heyburn II found in favor of the intervening same-sex couple plaintiffs and ruled that Kentucky's ban on allowing same-sex marriage in-state violates the Equal Protection Clause.\n\nIn doing so, Judge Heyburn departs from the opinions issued by most of the other U.S. district courts that examined the issue; he \"does not determine whether Kentucky's laws interfere with a fundamental right.\" Looking at the trio of marriage cases of Loving v. Virginia, Zablocki v. Redhail, and Turner v. Safley; Judge Heyburn states that: \n[T]he", "-30.526592914622597" ], [ "the decision of the federal district court in Nevada and remanded it back to the district court, ordering it to issue an injunction to bar enforcement of Nevada's amendment banning same-sex marriage. The court held that Nevada's ban on same-sex marriage constituted a violation of same-sex couples' Fourteenth Amendment right to equal protection. The court also applied heightened scrutiny in concluding that Nevada's ban constitutes discrimination on the basis of sexual orientation. On October 9, Judge James C. Mahan issued the injunction and same-sex couples began obtaining marriage licenses. Statute Between 1975 and 2017, Nevada's marriage statute (NRS 122.020) stated", "-30.391829331420013" ], [ "the Alabama supreme court ordered Alabama's probate judges to stop issuing marriage licenses to same-sex couples, stating that a previous federal ruling that same-sex marriage bans violate the US constitution did not preclude them from following state law, which defined marriage as between a man and a woman. In April 2015 Guam's attorney general directed officials to begin processing marriage license applications from same-sex couples, but the governor said he wanted to study the issue further, and the public health director said he wouldn't accept the applications. In May 2015, a federal judge ruled that same-sex marriage was legal in", "-30.371195852858364" ], [ "of their children challenging the state's denial of marriage licenses to same-sex couples. The suit named two county clerks as defendants. On November 21, West Virginia Attorney General Patrick Morrisey asked the court to allow his office to defend the state's statutes, and on December 19 both he and the clerk asked the court to dismiss part of the suit. On January 30, 2014, the judge assigned to the case, U.S. District Judge Robert C. Chambers, dismissed the part of the suit challenging the state's refusal to recognize same-sex marriages from other jurisdictions, since none of the plaintiffs had married", "-30.195221832233074" ], [ "activity harmful to a child.\"\nIn 2016, Moore was suspended from the Alabama Supreme Court for instructing state probate judges to deny marriage licenses to same-sex couples, in contravention of Obergefell v. Hodges, in which the U.S. Supreme Court determined that same-sex couples have a constitutional right to marry.\nIn 2017, Moore called for impeaching judges who have issued rulings supportive of homosexuality and same-sex marriage. In November 2016, Moore argued that the Obergefell ruling was worse than the 1857 Dred Scott v. Sandford ruling (which declared that African-Americans, whether enslaved or free, were property and could not be American citizens). The", "-30.141895818174817" ], [ "on hold until the federal appeals court ruled on Nebraska's marriage ban. Also in March 2015, the Alabama supreme court ordered Alabama's probate judges to stop issuing marriage licenses to same-sex couples, stating that a previous federal ruling that same-sex marriage bans violate the US constitution did not preclude them from following state law, which defined marriage as between a man and a woman.\nIn April 2015 Guam's attorney general directed officials to begin processing marriage license applications from same-sex couples, but the governor said he wanted to study the issue further, and the public health director said he wouldn't accept", "-30.12817316199653" ], [ "18, 2014, the Colorado Supreme Court ordered clerks in Adams and Denver counties to stop issuing marriage licenses. The state Supreme Court was scheduled to hear oral arguments regarding the merits of the state's same-sex marriage ban on September 30, 2014. Burns v. Hickenlooper Burns v. Hickenlooper is a same-sex marriage case filed on July 1, 2014 in the U.S. District Court for the District of Colorado. The plaintiffs were six same-sex couples who had been legally married in another state but whose marriage Colorado did not legally recognize or who had been refused a Colorado marriage license, solely because", "-30.127706419909373" ], [ "on the front lines of the struggle for LGBTQ rights. The Benton County Commission decided to stop issuing all marriage licenses—straight and gay—in response to a demand by Attorney General Hardy Myers that they not issue licenses to same-sex couples. Jaramillo stated that, \"If we were going to end up with discrimination, we weren't going to issue marriage licenses to anyone.\"", "-30.12489012982587" ], [ "separate lawsuit he filed with the state Supreme Court should prevent gay marriage in all but the two counties that were home to cases covered in the ruling from the nation's capital (Douglas and Sedgwick counties) couples beyond Douglas and Sedgwick counties picked up marriage licenses also. Later in November 2014 the Kansas Supreme Court ruled that Johnson County could issue marriage licenses to same-sex couples and left it to the federal courts to determine whether a Kansas ban on same-sex marriage violated the U.S. Constitution. Derek Schmidt then asked the 10th Circuit Court of Appeals for an en banc", "-30.050028659345116" ], [ "of close of business December 26, more than 1,225 marriage licenses were issued, with at least 74 percent, or 905 licenses, issued to gay and lesbian couples. The state Attorney General's office was granted a stay of the ruling by the United States Supreme Court on January 6, 2014 while the Tenth Circuit Court of Appeals considered the case. On Monday October 6, 2014, the Supreme Court of the United States declined a Writ of Certiorari, and the 10th Circuit Court issued their mandate later that day, lifting their stay. Same-sex marriages commenced again in Utah that day. Politics In", "-30.036930828297045" ], [ "refuse to issue marriage licenses to same-sex couples, after which Davis began issuing licenses to same-sex couples, as did many counties in Alabama. In February 2015, a Texas probate judge ruled Tuesday that the state's ban on same-sex marriage was unconstitutional, as part of an estate battle. Later that month Sarah Goodfriend and Suzanne Bryant became the first same-sex couple married in Texas, after their marriage license was issued in response to a district judge’s order in Travis County because one of the women had been diagnosed with ovarian cancer. However, the clerk's office noted that “[a]ny additional licenses issued", "-30.02546632103622" ], [ "steadily. By the afternoon of June 30, all judicial districts had agreed to issue marriage licenses to same-sex couples, though some had yet to receive an application from a same-sex couple. On both July 9 and 14, 2015, state attorneys announced that the state was now fully recognising the marriages of same-sex couples for state benefits, taxation and other purposes. Religious exemption order On July 7, 2015, Governor Brownback issued an executive order to prohibit \"state government from taking any discriminatory action against any 'individual clergy or religious leader,' or any 'religious organization' that chooses not to participate in a", "-29.96294025873067" ], [ "marriage license as the plaintiffs have requested, which only officers of the state's executive branch can do. He warned the court that doing so could invite myriad lawsuits \"concerning any dispute a party has with any local or county official\". On August 16, the Supreme Court declined to hear this case and a similar one, but said that the plaintiffs were entitled to an \"expedited review\" in the district court.\nOn August 22, 2013, New Mexico District Judge Sarah Singleton ordered Santa Fe County Clerk Geraldine Salazar to begin issuing marriage licenses to same-sex couples or show cause why the county", "-29.947406763909385" ], [ "when it is completed.\" Currently, same-sex marriages are neither licensed nor recognized there. On January 6, 2016, Alabama's Chief Justice, Roy Moore, issued a ruling forbidding state officials from issuing marriage licenses to same-sex couples. The ruling had no effect as all Alabama counties continued either issuing marriage licenses to all couples or not issue licenses at all. In May 2016, Moore was charged with ethics violations by the state Judicial Inquiry Commission for the ruling, subsequently being suspended from the bench for the remainder of his term on September 30 of that year. Parental rights Post-Obergefell, six states have,", "-29.909598220139742" ], [ "marriage licenses to same-sex couples. Also that afternoon, the Searcy plaintiffs asked the district court to hold Don Davis, Probate Judge for Mobile County, in contempt for failing to open his marriage license division that day. The court denied that motion later that day because Davis was not a party to the Searcy lawsuit.\nRepublican U.S. Senator Jeff Sessions commented on February 9: \"I think it's an unhealthy trend that judges feel that they're somehow reflecting popular opinion when first of all, it's not popular opinion, and secondly, who are they to be ruling on cases based on how they feel.\"", "-29.891235140908975" ], [ "and legislative restrictions on same-sex marriage interfere with the fundamental right to marry, violating the due process clause of the Constitution of the United States, and discriminate on the basis of sexual orientation, violating the equal protection clause.\nIn response to the decision, though Crabb had yet to issue any order enforcing it, county clerks in increasing numbers began issuing marriage licenses to same-sex couples and in some cases performing marriage ceremonies for them. On June 13, after a week of legal maneuvering and a threat of legal action against the clerks on the part of Wisconsin Attorney General J. B.", "-29.862259879286285" ], [ "October 2014, Wilson, defending state law asked the Supreme Court of South Carolina to intervene to stop same-sex marriage licenses from being issued in South Carolina after the 4th Circuit Court of Appeals issued a ruling striking down state bans on same-sex marriage. The 4th Circuit has jurisdiction over South Carolina. Threatened litigation against DACA In July 2017, Texas Attorney General Ken Paxton led a group of Republican attorneys general from nine other states, including Wilson, plus Idaho Governor Butch Otter, in threatening that they would litigate against the Deferred Action for Childhood Arrivals (DACA) policy that had been put", "-29.840160628809826" ], [ "that the Court of Appeals need not remand for further proceedings should it rule that Baker does not control...\" He identified the discrimination Nevada makes between marriages the state does and does not recognize as a distinction based not on gender, which would require him to use intermediate scrutiny, but on sexual orientation, stating that the state maintains \"heterosexual superiority ... by relegating (mainly) homosexual legal unions to a lesser status\".\nHe found that only the rational basis standard applies to distinctions based on sexual orientation, relying on High Tech Gays v. Defense Industrial Security Clearance Office (1990). He explained his", "-29.83790573326405" ], [ "did not have to permit property to be used for gay weddings, which we all agree, why must religious property be sold to an organization if it is going to be used for a gay wedding?\" Massachusetts Attorney General Martha Coakley filed a brief supporting the plaintiffs that said \"we believe that this family was unfairly discriminated against by the diocese when it refused to sell them property based on their sexual orientation.... And no reasonable person would think that a wedding that took place on a property no longer owned by a church was endorsed by that church.\" Oral", "-29.776627316663507" ], [ "same-sex couples. It scheduled a hearing for November 6.\nOn November 18, 2014, the Kansas Supreme Court ruled that Johnson County had been within its jurisdiction to issue marriage licenses to same-sex couples based on its interpretation of the law. It lifted the stay on Johnson County from issuing the licenses, but did not direct other counties to issue them.\nJudge Daniel D. Crabtree heard oral arguments on October 31, 2014 in another lawsuit in U.S. district court, Marie v. Moser. He found the state's ban on same-sex marriage unconstitutional on November 4, but stayed enforcement of his ruling for a week.", "-29.737447075429372" ], [ "based in Denver found that states cannot ban gay marriage, but that ruling was put on hold pending an appeal; however, clerk Boulder county clerk Hillary Hall (the first clerk to do so) and clerks in Denver and Pueblo counties issued marriage licenses to same-sex couples in Colorado in spite of the hold. Later that year, same-sex marriage was legalized in Colorado, but the ruling was stayed. Colorado's Supreme Court ordered the Denver county clerk to stop issuing marriage licenses to gay couples while the state's ban against the unions was in place. While that decision did not include Boulder", "-29.70461637886183" ], [ "his decision. Bifurcation of case On February 14, two same-sex couples who were denied marriage licenses in Jefferson County, Timothy Love, Lawrence Ysunza, Maurice Blanchard, and Dominique James, asked to be allowed to intervene in the suit because their challenge to Kentucky's ban on same-sex marriage within the state raises substantially the same arguments as the original suit. On February 27, 2014, before the final order was issued, the state attorney general asked Judge Heyburn to stay enforcement of his Bourke order for 90 days, noting that even if the state does not appeal the decision it needs time to", "-29.669956272409763" ], [ "same-sex couples. He withdrew the threat several days later when Bisbee agreed to rewrite the ordinance, removing rights reserved for married couples under Arizona law. In October, 2014, a federal judge ruled that Arizona's law banning gay marriage was unconstitutional, and Horne did not appeal. He felt the chance of it being overturned was \"zero,\" and, added, \"I think it is over.\"\nHorne filed a 2013 lawsuit that compelled the Maricopa County Community College District to end its policy of in-state tuition for \"dreamers\" (undocumented immigrants with federal work permits, who came to the U.S. as children). ", "-29.634402323281392" ], [ "of Baptists, Lutherans, and Unitarian Universalists, filed a lawsuit, arguing that North Carolina's statute that makes it a crime to preside at the solemnization of the marriage of a couple that lacks a valid state marriage license unconstitutionally restricts religious freedom. On June 3, 2014, additional national religious denominations and clergy from across traditions were added as plaintiffs, including the Alliance of Baptists, the Association of Welcoming and Affirming Baptists, and the Central Conference of American Rabbis in addition to Episcopal, Jewish and Baptist clergy. On October 7, the plaintiffs asked for an immediate injunction against the state, citing the", "-29.634040391189046" ], [ "were Kentucky Governor Steve Beshear and Attorney General Jack Conway, as well as Sue Carole Perry, Shelby County Clerk. Their suit, Bourke v. Beshear, argued that Kentucky should recognize same-sex marriages from other jurisdictions. The case was assigned to Judge John G. Heyburn II. Bourke decision In a decision issued February 12, 2014, Judge Heyburn found that Kentucky must recognize same-sex marriages from other jurisdictions because withholding recognition violates the U.S. Constitution's guarantee of equal protection. He wrote:\n[T]he Court concludes that Kentucky's denial of recognition for valid same-sex marriages violates the United States Constitution's guarantee of equal protection under the", "-29.568508324446157" ], [ "the Kansas Supreme Court issued an injunction to halt to issuance of marriage licenses to same-sex couples there.\nSeveral Kansas counties began issuing marriage licenses to same-sex couples for the first time on November 13, 2014, though the state Attorney General contended that the federal court order in Marie v. Moser only applied to two counties. The head of the LGBT advocacy group Equality Kansas said it was unclear whether all counties were required to issue such licenses, while the ACLU said \"[t]he ruling was clear\" and applied to all counties. Johnson County remained under a state court's temporary order not", "-29.564762548776343" ], [ "from enforcing its ban, effective immediately. Arizona Attorney General Tom Horne said the state would not appeal the ruling and instructed county clerks to issue marriage licenses to same-sex couples. Appeal On November 18, Arizona announced it would appeal the district court rulings to the Ninth Circuit Court of Appeals. The state solicitor, Robert Ellman, said the state hoped to avoid paying the original plaintiffs' attorneys fees should the U.S. Supreme Court uphold bans on same-sex marriage. On December 1, all parties asked the court to suspend proceedings pending action by the U.S. Supreme Court in similar cases from the", "-29.561810787767172" ], [ "refused to recognize \"valid marriages of same-sex couples entered into in other states or jurisdictions and otherwise meet the prerequisites for marriage in the State of South Carolina, except that they are of the same sex\" or denied equal treatment to the same. On the morning of November 19, 2014, Judge Condon began to issue marriage licenses to those who had applied prior to the state Supreme Court's order. Kayla Bennett and Kristin Anderson held their marriage ceremony outside of the Charleston County Probate Court, marking the state's first licensed same-sex wedding. Condon v. Haley On October 8, 2014, Charleston", "-29.534286208450794" ], [ "more than 100 same-sex couples. A week later the Pennsylvania Department of Health filed a lawsuit in Commonwealth Court to enjoin Hanes from issuing any more such licenses. Commonwealth Court cases The lead state court case is Commonwealth v. Hanes. Oral arguments were held on September 4, 2013. On September 12, 2013, Judge Dan Pellegrini ordered Hanes to stop issuing marriage licenses to same-sex couples \"[u]nless and until either the General Assembly repeals or suspends the Marriage Law provisions or a court of competent jurisdiction orders that the law is not to be obeyed or enforced\". Hanes had issued 174", "-29.47717091170489" ], [ "that day, including those in Birmingham and Mobile, while others denied licenses to same-sex couples or issued no licenses to anyone. On June 27, 2015, the Alabama ACLU asked the state's association of probate judges to instruct its members to comply with the ruling. As of June 29, 2015, at least 32 of the state's 67 counties were issuing marriage licenses to same-sex couples, and at least 22 of the counties were either refusing to do so or were refusing to issue marriage licenses to anybody. Also on June 29, the Association of County Commissions, an organization that provides liability", "-29.41053255839506" ], [ "the federal ruling applied statewide. Also that month Attorney General Patrick Morrisey announced he would no longer fight a challenge to West Virginia's same-sex marriage ban, and thus same-sex marriage was legalized in West Virginia. Same-sex marriage was also legalized in Alaska, Arizona, Colorado, Idaho, and Wyoming that month. In November 2014, same-sex marriage was legalized in Kansas, but Supreme Court Justice Sonia Sotomayor issued an order temporarily blocking it. The order was lifted later that month; although Kansas Attorney General Derek Schmidt said that a separate lawsuit he filed with the state Supreme Court should prevent gay marriage in", "-29.39529266790487" ], [ "the western third of the state, North Carolina Attorney General Roy Cooper said that the federal ruling applied statewide. Also that month Attorney General Patrick Morrisey announced he would no longer fight a challenge to West Virginia's same-sex marriage ban, and thus same-sex marriage was legalized in West Virginia. Same-sex marriage was also legalized in Alaska, Arizona, Colorado, Idaho, and Wyoming that month. In November 2014, same-sex marriage was legalized in Kansas, but Supreme Court Justice Sonia Sotomayor issued an order temporarily blocking it. The order was lifted later that month; although Kansas Attorney General Derek Schmidt said that a", "-29.339036277728155" ], [ "couples, as did many counties in Alabama. In February 2015, a Texas probate judge ruled Tuesday that the state's ban on same-sex marriage was unconstitutional, as part of an estate battle. Later that month Sarah Goodfriend and Suzanne Bryant became the first same-sex couple married in Texas, after their marriage license was issued in response to a district judge's order in Travis County because one of the women had been diagnosed with ovarian cancer. However, the clerk's office noted that \"[a]ny additional licenses issued to same sex couples also must be court ordered,\" and the Texas Supreme Court issued an", "-29.268969210941577" ], [ "19, 2014, Judge McShane struck down Oregon's same-sex marriage ban in Geiger v. Kitzhaber. He ordered that the state immediately issue licenses to same-sex couples. The State of Oregon did not appeal (Oregon Attorney General Ellen Rosenblum declined to defend the state's ban on same-sex marriage); same-sex marriage in Oregon was legalized as a result. Personal McShane is openly gay, and he is the first openly gay federal judge in Oregon. His partner is Gregory Ford, and they have a son.\nMcShane sits on the boards of The Wayne Morse Center for Law and Politics at the University of Oregon", "-29.268902574345702" ], [ "ruling until February 9. Despite opposition from government officials, same-sex couples began marrying in various counties throughout Alabama that day, though some refused to do so. On March 3, the Alabama Supreme Court found same-sex marriage bans constitutional and ordered county officials to immediately stop marrying same-sex couples.\nOn June 26, 2015, the U.S. Supreme Court ruled the denial of marriage rights to same-sex couples unconstitutional. The Attorney General announced compliance with the ruling, and several county officials began issuing marriage licenses that day. However, as of 2018, eight counties still refuse to issue marriage licenses to any couples, to avoid", "-29.215982170215057" ], [ "challenged in several lawsuits. On October 7, 2014, officials in Johnson County began accepting licenses for marriage applications, due to the Supreme Court's recent refusal to hear a Utah case now binding on Kansas. The state Attorney General filed a lawsuit in order to stop those actions. One couple obtained a marriage license and married on October 10, on the steps of the Johnson County courthouse. On October 10, 2014, the Kansas Supreme Court ordered officials in Johnson County to stop issuing marriage licenses to same-sex couples, though it allowed for court clerks to accept applications for marriage licenses from", "-29.210323701030575" ], [ "expedited marriage license to Gray and Ewert before the state's same-sex marriage law took effect in June 2014, because Gray was terminally ill; slightly later that same year, it was declared that all same-sex couples in Illinois where one partner had a terminal illness could marry immediately. 2014 In January 2014, same-sex marriage was legalized in Oklahoma, but the ruling was stayed; in 2014, a U.S. appeals court in Denver upheld the lower court ruling that struck down Oklahoma's gay-marriage ban, but that was also stayed. In March 2014, same-sex marriage was legalized in Michigan, and Glenna DeJong and Marsha", "-29.208449305209797" ], [ "statewide standards for identification procedures.\nOn October 10, 2008, Bordon dissented in the case of Kerrigan v. Commissioner of Public Health, in which the court held that gay and lesbian couples could not be denied the right to marry because of the Equal Protection Clause of the state constitution. This decision made Connecticut the third state (along with Massachusetts and California) to legalize same-sex marriage through judicial decree of the state supreme court.\nBorden also served as a member of the Board of Directors of the Hartford Foundation for Public Giving, and screened criminal cases for transfer to the Supreme Court. He", "-29.205434283067007" ], [ "ban was unconstitutional. San Carlos Apache Tribe According to the Constitution and by-laws of the San Carlos Apache Tribe of Arizona, all marriages shall be in accordance with state laws. On October 17, 2014, Arizona's ban on same-sex marriage was declared unconstitutional. Sault Ste. Marie Tribe of Chippewa Indians The Sault Ste. Marie Tribe of Chippewa Indians in Michigan changed its marriage laws on July 7, 2015 by removing gender-specific language and also the need obtain marriage licenses from the state of Michigan before getting married. A spokesperson of the tribe noted that these changes were necessary to legalize same-sex", "-29.20288962358609" ], [ "the National Center for Lesbian Rights took on the plaintiffs' representation. Reaction to Searcy and Strawser rulings The Alabama Probate Judges Association issued a statement on January 24 that said \"There is nothing in the judge's order [in Searcy] that requires probate judges in Alabama to issue marriage licenses to same-sex couples\". The next day, the editorial board of AL.com called on the Governor and state legislators to end their opposition to same-sex marriage. On January 27, the Chief Justice of the Alabama Supreme Court, Roy Moore, released a letter addressed to Governor Robert J. Bentley, in which he said", "-29.151177053456195" ], [ "the constitutionality of the state's denial of marriage rights to same-sex couples. On October 14, U.S. District Judge William Osteen ruled for the plaintiffs. Discrimination protections North Carolina outlaws discrimination based on religion, color, national origin, age, sex or handicap, sexual orientation and gender identity in public employment, but discrimination on grounds of sexual orientation and gender identity are not prohibited statewide in private employment, however it is against the law to sue in state courts for such discrimination. State law bans local municipalities from prohibiting discrimination on the basis of sexual orientation or gender identity in areas other than", "-29.080016588559374" ], [ "Dénia refused to issue a marriage license to a lesbian couple. The judge also filed a constitutional challenge against the same-sex marriage law before the Constitutional Court based on Article 32 of the Constitution that contains the text \"Men and women have the right to contract marriage with full juridical equality.\" In August 2005, a judge from Gran Canaria refused licenses to three same-sex couples and mounted another constitutional challenge. In December 2005, the Constitutional Court rejected both challenges owing to both judges' lack of standing to file them. On 30 September 2005, the opposition People's Party decided to initiate", "-29.05566618317971" ], [ "to same-sex couples, claiming that the California Constitution's equal-protection clause gave him authority to do so. Approximately 4,000 same-sex couples were issued licenses in San Francisco from February 12 until March 11, 2004 (when the weddings were halted by the California Supreme Court), bringing international attention to the Mayor and the City. On August 12, 2004, the California Supreme Court voided those licenses, declaring Newsom had overstepped his authority. Following this decision, San Francisco and nearly two dozen gay couples sued the state of California on the issue of same sex marriage. In 2005, Superior Court Judge Richard Kramer agreed", "-29.043397165136412" ], [ "where those unions are legal.\nOn July 1, 2014, Heyburn ruled again in favor of same sex marriage, declaring that same-sex couples have a right to marry in Kentucky. He wrote \"In America, even sincere and long-hold religious beliefs do not trump the constitutional rights of those who happen to have been out-voted\", in response to arguments put forth by attorney Leigh Latherow, who was hired by Gov. Steve Beshear to defend the ban. The argument put forth by the Ashland attorney was solely justified by the assertion that traditional marriages contribute to a more stable birth rate, which in turn", "-29.01335881956038" ], [ "relationship during her marriage, forbidden both by the laws of the State of Alabama and the Laws of Nature.\" The Court of Civil Appeals removed Moore from the case, a decision that was later affirmed by the Alabama Supreme Court.\nIn February 2002, as Alabama Chief Justice, Moore issued a controversial opinion that expressed his belief that the state should use its powers to punish \"homosexual behavior\". The case, D.H. v. H.H., was a custody dispute where a lesbian was petitioning for custody of her children, alleging abuse by her ex-husband. A circuit court in Alabama had ruled in favor of", "-28.969913735840237" ], [ "Same-sex marriage in the Northwest Territories Legal proceedings In December 2004, NWT Justice Minister Charles Dent stated the Government would not issue marriage licences to same-sex couples until a court ruling or federal legislation legalized them. However, he indicated that the territory would not contest any lawsuit on the subject, and would comply with such a ruling or law.\nOn May 20, 2005, a Yellowknife couple, Jason Perrino and Colin Snow, sued the Northwest Territories Government over the right to get married, saying that refusing them a licence is a violation of their Charter rights. The territorial Supreme Court was supposed", "-28.961744969390566" ], [ "Same-sex marriage in Hawaii Baehr case (1991–1999) Baehr v. Miike (originally Baehr v. Lewin) was a case decided by the Supreme Court of Hawaii, which initially found the state's refusal to grant same-sex couples marriage licenses discriminatory. In 1991, three same-sex couples sued Hawaii Director of Health John C. Lewin in his official capacity, seeking to force the state to issue them marriage licenses. After the case was dismissed by the trial court, the couples appealed to the state Supreme Court. In the plurality opinion delivered by Chief Justice Ronald Moon in 1993, the court ruled that while the right", "-28.94918436766602" ], [ "lifted their stays on October 7, 2014, and Suthers ordered all county clerks to issue marriage licenses to same-sex couples.\nIn West Virginia, on October 9, Governor Ray Tomblin announced he was ordering state agencies to act in compliance with the decision of the Fourth Circuit Court of Appeals in ''Bostic v Schaefer'' on the unconstitutionality of same-sex marriage bans.\nIn North Carolina, District Court Judge Max O. Cogburn, Jr., ruling in General Synod of the United Church of Christ v. Cooper on October 10, 2014, struck down North Carolina's ban on same-sex marriage, citing the Fourth Circuit's ruling in Bostic v.", "-28.94168081472162" ], [ "all but the two counties that were home to cases covered in the ruling from the nation's capital (Douglas and Sedgwick counties) couples beyond Douglas and Sedgwick counties picked up marriage licenses also. Later in November 2014 the Kansas Supreme Court ruled that Johnson County could issue marriage licenses to same-sex couples and left it to the federal courts to determine whether a Kansas ban on same-sex marriage violated the U.S. Constitution. Derek Schmidt then asked the 10th Circuit Court of Appeals for an en banc hearing on the Kansas same-sex marriage ban, but the 10th Circuit refused. Also in", "-28.938838722067885" ], [ "case voluntarily dismissed as of October 22, 2014. Montgomery County license issuance In July 2013, shortly after Pennsylvania Attorney General Kathleen Kane declined to defend Pennsylvania's prohibition of same-sex marriage in U.S. district court, D. Bruce Hanes, the Montgomery County Register of Wills and Clerk of the Orphans' Court, announced he would issue marriage licenses to same-sex couples. He interpreted his Orphan's Court position as a judicial one and found that denying same-sex couples marriage licenses as the statutes required would violate their rights under the State Constitution. Between July 24 and August 9, 2013, he issued marriage licenses to", "-28.92913422838319" ], [ "civil union licences to both opposite-sex and same-sex couples. Religious groups could still solemnize opposite-sex unions as marriages if they chose, but any civil ceremony would be permitted to recognize only a civil union. The Alberta Government also considered continuing to issue marriage licences to opposite-sex couples only in court, on the grounds that the Federal Government's legislation encroached on the Provincial Government's jurisdiction over the solemnization of marriage.\nOn July 12, 2005, Klein conceded that the advice given to him by legal experts was that a challenge in court to refuse to marry same-sex couples had no chance, and wasting", "-28.918154683546163" ], [ "County Probate Judge Irvin Condon, citing Bostic v. Rainey, accepted a marriage license application presented by a female couple, the first same-sex marriage license application accepted in the state. In other parts of the state, some same-sex marriage license applications were blocked by judges. Attorney General Wilson filed Wilson v. Condon, requesting an emergency injunction from South Carolina Supreme Court to halt the issuance of marriage licenses to same-sex couples. On October 9, the state Supreme Court agreed to halt the issuance of licenses pending the resolution of Bradacs. Because a South Carolina couple cannot receive a marriage license until", "-28.905809139017947" ], [ "the state statutes since July 1998 as well.\nOn April 16, 2015, Kentucky Equality Federation v. Beshear (also known as Kentucky Equality Federation v. Commonwealth of Kentucky) was ruled on by Franklin County Circuit Court Judge Thomas D. Wingate. Judge Wingate sided with Kentucky Equality Federation against the Commonwealth and struck down the Kentucky Constitutional Amendment banning same-sex marriages.\nKentucky has extended hospital visitation rights to same-sex couples through a designated visitor statute. Federal lawsuits Two lawsuits filed in federal court in 2013 and 2014 have challenged Kentucky's denial of marriage rights to same-sex couples as well as the state's refusal to", "-28.90070913285308" ], [ "to keep same-sex marriages on hold until the Supreme Court ruled whether laws banning them are constitutional. But the chief justice of the Alabama Supreme Court, Roy Moore, wrote in his own order later that the latest ruling legalizing same-sex marriage in Alabama did not apply to the state's probate judges and directed them not to comply. The judge who issued that latest ruling (Judge Callie V. S. Granade) then ruled that the local probate judge (Judge Don Davis of Mobile County) could not refuse to issue marriage licenses to same-sex couples, after which Davis began issuing licenses to same-sex", "-28.89739206165541" ], [ "licenses to same-sex couples.\nThe Superior court refused to grant the groups' request for an immediate stay, and the City and County continued to issue marriage licenses to same-sex couples. Following this, the California Attorney General and a number of taxpayers filed two separate petitions seeking to have the California Supreme Court issue an original writ of mandate, asserting that the City's actions were unlawful and \"warranted [the court's] immediate intervention.\" On March 11, 2004, the California Supreme Court ordered officials of San Francisco \"to enforce the existing marriage statutes and to refrain from issuing marriage licenses not authorized by", "-28.894450940191746" ], [ "same-sex marriage cases and encouraged state officials and judges to ignore federal court rulings overturning bans on same-sex marriage.\nMoore issued an order to probate judges and their employees on February 8, the day before a federal court ruling legalizing same-sex marriage in Alabama was set to take effect, ordering them to disregard the ruling and enforce the state's ban under threat of legal action by the governor. On February 9, after the United States Supreme Court allowed the federal court ruling to take effect, probate judges in Birmingham, Montgomery, and Huntsville disobeyed Moore and issued marriage licenses to same-sex couples.\nOn", "-28.888352125242818" ], [ "banning same sex marriage. In the weeks following the address, Newsom asked his staff to gather background information and to explore how the city could start issuing marriage licenses to same sex couples without alerting the media. Before the first marriage was performed, Newsom's office informed Nancy Pelosi, Dianne Feinstein, California Secretary of State Kevin Shelley, California Attorney General Bill Lockyer, and Democratic National Committee chairman Terry McAuliffe. Gay Massachusetts Congressman Barney Frank told Newsom that it wasn't the right time.\nOn his 36th day in office, Newsom issued a directive to the San Francisco city-county clerk to issue marriage licenses", "-28.874904404423432" ], [ "issuing same-sex marriages licenses, bringing the total population living in counties that issue same sex marriage licenses to 86%.\nThe state's 4th Judicial District had announced that it \"[would] have to wait for another court ruling before it will begin issuing licenses\" after the ruling in Moriarty. Counties affected under this decision were: Anderson, Coffey, Franklin, and Osage. Judge David Ricke of the state's 13th Judicial District indicated that the ban would remain there as well, affecting Butler, Elk and Greenwood counties. Twelve more counties reported as deciding to deny marriage licenses to same-sex couples were: Cheyenne, Jackson, Jefferson, Logan, Pottawatomie,", "-28.869637286639772" ], [ "which bans discrimination based on sexual orientation. This ruling was reviewed by the Mexican Supreme Court and the Court issued a unanimous ruling against the ban on same-sex marriage. \nIn July 2017, a same-sex couple was successful in getting married without first receiving a court order. From late August 2018, the Civil Registry has allowed same-sex couples to marry without the need for an amparo. However, the process takes three business days, compared with two hours for opposite-sex couples.\nOn 28 August 2019, the Congress of Oaxaca passed legislation bringing the state into line with the executive order. Puebla On 7", "-28.867119534079393" ], [ "March 2016, the CfA made a request to Kim Davis—the controversial county clerk of Rowan County, Kentucky, who had gained international attention the previous year after defying a federal court order to issue marriage licenses to same-sex couples—for access to public records under the Kentucky Open Records Act. The CfA specifically sought copies of retainer agreements and lawyer-client engagement agreements between Davis and Liberty Counsel, the religious advocacy organization that represented Davis in the marriage-license dispute. Liberty Counsel, which responded to the request on Davis' behalf, refused to comply, arguing that the documents were preliminary and private records not subject", "-28.859029552695574" ], [ "Voting Rights, and school free speech.\nIn 2014 Cook voted to uphold gay marriage bans in Michigan, Kentucky, Ohio, and Tennessee in a 2-1 ruling. The ruling was the second to uphold gay marriage bans since the U.S. Supreme Court struck down the federal Defense of Marriage Act in 2013 and diverged with rulings by the U.S. Courts of Appeals for the 4th, 7th, 9th and 10th circuits, which then led the U.S. Supreme Court to grant writ of certiorari to review same-sex marriage bans when it previously declined to do so. In Obergefell v. Hodges the Supreme Court reversed the", "-28.81711624818854" ], [ "day after the decision, 25 of the state's 32 judicial districts were issuing licenses to same-sex couples, and some of those that were not had yet to receive an application from a same-sex couple. By June 30, all judicial districts were either issuing same-sex marriage licenses or had announced their intention to do so. Kansas for the previous decade had recognized neither same-sex marriages nor any other form of legal recognition of same-sex unions. The state explicitly banned same-sex marriage and all other types of same-sex unions both by statute and by constitutional amendment.\nThe state's definitions and restrictions had been", "-28.813295711006504" ], [ "a learning specialist at Goucher College, and her partner Lisa Polyak, an environmental engineer for the U.S. Army Medical Department. The plaintiffs had applied for marriage licenses in several different Maryland counties but were denied by court officials. In their complaint, the plaintiffs argued that the state's statutory ban on same-sex marriage violated constitutional protections of due process, equality, and prohibitions against sex discrimination in Articles 24 and 46 of the Maryland Declaration of Rights.\nIn January 2006, Baltimore Circuit Court Judge M. Brooke Murdock granted summary judgment to the plaintiffs, writing that \"Family law §2-201 violates Article 46 of the", "-28.792811344887014" ], [ "on the face of them not consistent with the law\". The clerks soon relented under orders from the Attorney General. In June 2004, GLAD brought a lawsuit, Cote-Whitacre v. Department of Public Health, on behalf of several out-of-state same-sex couples and several town clerks who objected to being forced to discriminate in denying licenses to such couples. The SJC upheld the law on March 30, 2006, though it allowed that residents of states like New York and Vermont, which did not explicitly exclude same-sex couples from marriage, might pursue the case further. On September 29, 2006, Superior Court Justice Connolly", "-28.781569324724842" ], [ "couples. A statement from Governor Sam Brownback said: \"An overwhelming majority of Kansas voters amended the constitution to include a definition of marriage as one man and one woman. Activist judges should not overrule the people of Kansas.\" Kansas Attorney General Derek Schmidt said he was prepared for litigation and noted that the Kansas ban on same-sex marriage had not been invalidated in court. Schmidt filed a lawsuit in the Kansas Supreme Court, Schmidt v. Moriarty, asking the court to order Moriarty to stop issuing the licenses. Later that day, Kansas Chief Justice Lawton Nuss issued a temporary injunction suspending", "-28.77071675960906" ], [ "ruling against Kansas' ban on same-sex marriage issued on November 4, 2014, by U.S. District Judge Daniel D. Crabtree in Marie v. Moser, following Kansas Attorney General Derek Schmidt's failure to win a stay of that ruling from the Tenth Circuit and the U.S. Supreme Court. A Kansas Supreme Court decision in a state case, State v. Moriarty, affirmed the right of a circuit judge to determine the validity of the state's ban. The state contends that it need only recognize licenses issued in the two counties whose officials were named in the federal lawsuit and subject to the order", "-28.75550245505292" ], [ "Abbott.\nIn February 2015, two state judges in Travis County held the state's ban on same-sex marriage unconstitutional. One ordered the recognition of a common-law marriage between two women and the other order the county clerk to issue a marriage license to two women. They obtained their license and wed before Attorney General Ken Paxton obtained stays from the Texas Supreme Court and asked that court to void the marriage license.\nOn June 26, 2015, the United States legalized same-sex marriage nationwide due to the U.S. Supreme Court's decision in Obergefell v. Hodges. Since then, same-sex marriage has been legal in the", "-28.737809173297137" ], [ "issuing them to same-sex couples. State law states that probate judges \"may\" issue marriage licenses. This language was added following the legalization of interracial marriage in Alabama in 1967.\nIn January 2016, Alabama Chief Justice Roy Moore ordered probate judges to stop issuing marriage licenses to same-sex couples, stating that the Obergefell ruling did not apply to Alabama. His statement had no legal effect. In May, Moore was charged with ethics charges by the Judicial Inquiry Commission, and was found guilty and suspended in September 2016. Adoption rights and parenting Alabama permits adoption by same-sex couples. Child Placing Agency Inclusion Act", "-28.73132549948059" ], [ "order from the Alabama Supreme Court Chief Justice Roy Moore ordering county clerks to not comply with the federal rulings, the Probate Judges Association acknowledged that the order in Searcy, if lifted, requires them to issue marriage licenses to same-sex couples and said it would encourage its members to comply. A week after the rulings went into effect, the majority of counties began issuing marriage licenses to same-sex couples.\nOn March 3, 2015, the Alabama Supreme Court ordered all counties in the state to stop issuing marriage licenses to same-sex couples.\nGranade issued an injunction on May 21, 2015, clarifying that", "-28.718938096921192" ], [ "Missouri's same-sex marriage ban stayed its order directing Jackson County to issue licenses to same-sex couples. Also in November 2014, the Sixth Circuit Court of Appeals upheld bans on same-sex marriage in Kentucky, Ohio, Tennessee, and Michigan, marking the first time since the Supreme Court's rulings in Windsor v. U.S. and Hollingsworth v. Perry (both of which were in favor of same-sex marriage) that any federal appeals court upheld a state's voter-approved ban on same-sex marriage. 2015 In January 2015, U.S. District Judge Robert Hinkle in Tallahassee ruled that all clerks in the state were required under the Constitution to", "-28.714003939006943" ], [ "the time. 1990–1994 On December 10, 1990, three same-sex couples applied for marriage licenses at the Hawaii Department of Health. When denied licenses, the couples sue to have the prohibition on licenses for same-sex couples declared unconstitutional and discriminatory, resulting in Baehr v. Miike (originally Baehr v. Lewin). After the case was dismissed by the trial court, the couples appealed to the State Supreme Court. In the plurality opinion delivered by Judge Steven H. Levinson in 1993, the court ruled that while the right to privacy in the Hawaii state constitution does not include a fundamental right to same-sex marriage,", "-28.702115372929256" ], [ "was required to issue licenses to same-sex couples in addition to those he had already issued to the Strawser plaintiffs as required by the federal court. On that date, Davis asked the court for additional 10 days to respond. On March 11, the court rejected Davis' request for an extension and ordered him not to issue any additional marriage licenses to same-sex couples.\nFollowing the Alabama Supreme Court's order of March 3, Judge Davis kept Mobile County's marriage license bureau closed. On March 18, Probate Judge Steven Reed of Montgomery County asked the court to amend its order so that it", "-28.688861647809972" ], [ "flouting Pennsylvania law banning such unions. Hanes called the commonwealth's ban \"arbitrary and suspect\", saying he believes it violates the Pennsylvania Constitution and the United States Constitution. The Republican administration of Governor Tom Corbett filed suit in the Commonwealth Court of Pennsylvania in an attempt to block Hanes from licensing same-sex marriage. Commonwealth Court Judge Dan Pellegrini ordered Hanes in September 2013 to stop issuing same-sex marriage licenses. After Federal Judge John Jones threw out Pennsylvania's ban on same-sex marriage in May 2014, calling it unconstitutional, offices in other counties were able to issue these licenses, while Hanes had to", "-28.687395161004815" ], [ "of who they are. The main defendants, the state Governor and the Attorney General, agreed with the plaintiffs insofar as having the court issue an injunction declaring the same-sex marriage ban unconstitutional, but they wanted a stay and swift resolution by the U.S. Supreme Court in order to avoid costly litigation.\nU.S. District Judge Raymond Moore found in favor of the plaintiffs in Burns on July 23, 2014, granting their motion for a preliminary injunction. In his ruling, Judge Moore noticed a split among the state defendants even though they agreed with the plaintiffs' motion: \"Defendant Attorney General believed Kitchen [v.", "-28.673980353603838" ], [ "lesbian couples could not be denied the right to marry because of the Equal Protection Clause of the state constitution. This decision made Connecticut the third state (along with Massachusetts and California) to legalize same-sex marriage through judicial decree of the state supreme court. The majority opinion was written by Justice Richard N. Palmer, and joined by Justices Norcott, Joette Katz, and Judge Lubbie Harper Jr.; Justices Peter T. Zarella, Christine S. Vertefeuille, and David Borden dissented.\nMost recently, Justice Norcott wrote the Court's opinion in Bysiewicz v. DiNardo, holding that Secretary of State Susan Bysiewicz did not fulfill the statutory", "-28.672660608077422" ], [ "same-sex couple filed a motion for summary judgment; the state defendants filed a motion to dismiss. On January 23, 2015, Judge Callie V.S. Granade of the United States District Court for the Southern District of Alabama ruled that Alabama's refusal to license and recognize same-sex marriages is unconstitutional. She ordered the state Attorney General to stop enforcing those bans. The plaintiffs' attorneys hoped the state would comply, though other LGBT rights advocates anticipated further litigation. Legislative leaders denounced the ruling of \"a single unelected and unaccountable federal judge\" or saw the ruling as evidence that \"traditional values espoused by Alabamians", "-28.66992043396749" ], [ "based on that.\nAttorney General Patrick Morrisey announced on October 9 that he would no longer defend the suit since the U.S. Supreme Court had declined to review a similar Virginia case that had found that state's denial of marriage rights to same-sex couples unconstitutional. Judge Chambers ruled on November 7 that the state's denial of marriage rights to same-sex couples is unconstitutional. Legalization On October 9, 2014, West Virginia Governor Ray Tomblin announced he was ordering state agencies to act in compliance with the recent decisions of federal courts on the unconstitutionality of same-sex marriage bans. The state started issuing", "-28.640213695471175" ], [ "state of Washington, and 30 from other states.\nOn March 10, 2004, the State Legislature's Legislative Counsel, Greg Chaimov, issued an opinion that \"state law requires a county clerk to license the marriage of a same-sex couple.\" The office of Attorney General Hardy Myers issued an opinion March 12, 2004, after reviewing it with the Governor, that concluded that Oregon law prohibits county clerks from issuing marriage licenses to same-sex couples; that the Oregon Supreme Court would likely find denying such licenses violates Article I, Section 20 of the Oregon Constitution; but that current state practices should not change in anticipation", "-28.63130347186234" ], [ "Court, with no noted dissent, declined to stay the district court's ruling in an unsigned order. This route was the last legal one Davis could seek to maintain her policy of not issuing any marriage licenses.\nOn September 1, 2015, the plaintiffs and other couples tried to get marriage licenses, and were declined again. Davis cited \"God's authority\" for her refusal, even though she was in direct defiance of the court's order. The plaintiffs immediately filed a motion to hold Davis in contempt of court.\nOn November 2, Davis' lawyers filed a motion asking the 6th Circuit Court of Appeals to overturn", "-28.62311398802558" ], [ "Rights Tribunal held that marriage commissioner Orville Nichols had discriminated against a same-sex couple by refusing to perform their marriage ceremony. The Tribunal ordered him to pay $2,500 in compensation to the couple. In 2009, the Saskatchewan Court of Queen's Bench upheld the Tribunal's decision. In response to a reference question from the Government of Saskatchewan, the Saskatchewan Court of Appeal ruled in 2011 that two proposed bills which would have permitted marriage commissioners to refuse to perform same-sex marriages because of religious objections would be unconstitutional. Ordained religious ministers in Canada are not required to marry same-sex couples. A", "-28.578278420158313" ], [ "case raises equal protection claims but does not assert a fundamental right to marry.\nOn November 29, 2012, Judge Robert C. Jones ruled against the plaintiffs, holding that \"the maintenance of the traditional institution of civil marriage as between one man and one woman is a legitimate state interest\". The decision was appealed to the Ninth Circuit Court of Appeals.\nIn February 2014, the state withdrew its brief defending Nevada's ban on same-sex marriage. Governor Brian Sandoval stated: \"It has become clear that this case is no longer defensible in court\". On October 7, 2014, the Ninth Circuit Court of Appeals reversed", "-28.55070633208379" ], [ "Moriarty's order authorizing the issuance of marriage licenses to same-sex couples \"[i]n the interest of establishing statewide consistency\" on the question of issuing licenses to same-sex couples, but the court allowed for the continued acceptance of applications for marriage licenses.\nOn November 13, following a federal court decision striking down the state's same-sex marriage ban in Marie v. Moser, Judge Moriarty asked the court to lift its temporary stay and allow him to issue licenses to same-sex couples. On November 18, the court ruled that Judge Moriarty was \"within his jurisdiction\" in ordering the issuance of marriage licenses to same-sex couples", "-28.532595324795693" ], [ "Attorney General announced that his government would comply with the ruling. \nThe court also ruled that two couples who had previously had a wedding ceremony in the Metropolitan Community Church of Toronto using an ancient common-law procedure called the reading of the banns would be considered legally married.\nOn September 13, 2004, the Ontario Court of Appeal declared the Divorce Act also unconstitutional for excluding same-sex marriages. It ordered same-sex marriages read into that act, permitting the plaintiffs, a lesbian couple, to divorce. British Columbia decision A ruling, quite similar to the Ontario ruling, was issued by the B.C. Court of", "-28.516657608561218" ], [ "striking down Missouri's same-sex marriage ban stayed its order directing Jackson County to issue licenses to same-sex couples. Also in November 2014, the Sixth Circuit Court of Appeals upheld bans on same-sex marriage in Kentucky, Ohio, Tennessee, and Michigan, marking the first time since the Supreme Court's rulings in Windsor v. U.S. and Hollingsworth v. Perry (both of which were in favor of same-sex marriage) that any federal appeals court upheld a state's voter-approved ban on same-sex marriage. 2015 In January 2015, U.S. District Judge Robert Hinkle in Tallahassee ruled that all clerks in the state were required under the", "-28.50082736251352" ], [ "on 11 August 2014. They were rejected and subsequently filed an injunction. The injunction was granted in February 2015.\nOn 1 May 2015, six couples filed injunctions after being denied marriage licenses from the Civil Registry in Hermosillo.\nBy 1 September 2016, 26 same-sex couples (20 of whom were lesbian couples and the remaining 6 were gay male couples) had sought injunctions to marry in Sonora. All of them had been granted by the courts. Legislative action An initiative to allow same-sex couples to marry was delivered to the state's Congress by former Labor Party candidate for governor, Miguel Angel Haro Moren,", "-28.484928340418264" ], [ "decision found the state's denial of marriage rights to same-sex couples unconstitutional. The state formerly banned same-sex marriage and all other types of same-sex unions both by statute and by constitutional amendment until the ban was overturned by a federal court decision.\nNorth Carolina had previously denied marriage rights to same-sex couples by statute since 1996. A state constitutional amendment that was approved in 2012 reinforced that by defining marriage between a man and a woman as the only valid \"domestic legal union\" in the state and denying recognition to any similar legal status, such as civil unions. Constitutional ban In", "-28.473515616031364" ], [ "to issue such licenses. More counties began issuing licenses on November 17, even while the Kansas Supreme Court was deliberating whether district judges had the authority to authorize them. The National Organization for Marriage (NOM) urged Kansas Governor Sam Brownback to \"order local clerks to refuse to issue marriage licenses that violate Kansas law defining marriage as the union of one man and one woman.\" Its president, Brian Brown, said: \"The question for the people of Kansas, and indeed the nation, is whether we are going to allow an illegitimate order by federal judges to trump state law and the", "-28.459372931625694" ], [ "denied. Because the complainant died during the injunction process, a lower court had dismissed the case, but the Supreme Court granted the injunction and ordered recognition of the marriage by both the state of Puebla and the IMSS. The injunction required IMSS to extend benefits equal to married heterosexual couples' benefits to gays and lesbians who are married or have entered into civil unions throughout Mexico.\nA decision of the Mexico Supreme Court on 12 June 2015 resulted in a ruling that found that state bans on same-sex marriage were unconstitutional. The court's ruling is considered a \"jurisprudential thesis\" and did", "-28.45701974350959" ], [ "Fourth Circuit's ruling in Bostic v. Rainey. On October 10, District Court Judge Max O. Cogburn, Jr. denied a request by leaders of the state Legislature to be allowed to intervene to defend the state's ban and ruled the state's ban on same-sex marriage unconstitutional. He wrote:\nThe issue before this court is neither a political issue nor a moral issue. It is legal issue, and it is clear as a matter of what is now settled law in the Fourth Circuit that North Carolina laws prohibiting same-sex marriage, refusing to recognize same-sex marriages originating elsewhere, and/or threatening to penalize those", "-28.454045633901842" ], [ "said: \"Massachusetts should not become the Las Vegas of same-sex marriage. We do not intend to export our marriage confusion to the entire nation.\" His spokesman announced he was sending letters to the governors and attorneys general of the other states to explain his view that same-sex marriage was not legal in their state and asking \"if we're wrong\" about that. Denying license to all out-state couples became known as \"the Romney plan\". It also allowed visitors from Ontario to marry, since same-sex marriage was legal there. The Governor's legal counsel, Daniel Winslow, warned that a Justice of the Peace", "-28.448803860577755" ], [ "the United States Constitution, which the lawmakers took an oath to uphold. Marriage statistics By June 26, 2016, Richland County, home to the state capital of Columbia, had issued 422 marriage licenses to same-sex couples. In that same time, Charleston County, South Carolina's third-most populous county, had issued 387 same-sex marriage licenses. Public opinion An August 2011 Public Policy Polling survey found that 21% of South Carolina voters thought that same-sex marriage should be legal, while 69% thought it should be illegal and 10% were not sure. A separate question on the same survey found that 48% of South Carolina", "-28.432584426365793" ], [ "implement it. Judge Heyburn issued a final order in Bourke on the same day ordering the state to recognize same-sex marriages from other jurisdictions at once, which created de jure legalization of recognition of out-of-state same-sex marriages; being a final order it was then immediately subject to appeal. He then bifurcated the case and allowed the new plaintiffs to intervene and argue against Kentucky's denial of marriage licenses to in-state same-sex couples. This portion of the case would remain in district court, retitled as Love v. Beshear. A briefing schedule on the in-state issue was completed by May 28. On", "-28.428407124825753" ], [ "in. On May 19, 2014, a federal judge overturned a ban on same-sex marriages in Oregon, and beginning on October 9, 2014 same-sex marriages were allowed in Nevada. Fort McDowell Yavapai Nation Chapter 10 of the Law and Order Code of the Fort McDowell Yavapai Community of Arizona states that all marriages since April 19, 1954, \"shall be in accordance with state laws.\" On October 17, 2014, U.S. District Court Judge John Sedwick ruled that Arizona's same-sex marriage ban was unconstitutional. Grand Portage Band of Chippewa The Grand Portage Band of Chippewa (part of the Minnesota Chippewa Tribe) follows state", "-28.418009743647417" ], [ "California. In 2012, the United States Court of Appeals for the Ninth Circuit affirmed that the proposition violated the constitutional rights of gays and lesbians. When the matter was appealed to the Supreme Court of the United States, the court found that ProtectMarriage.com had not had legal standing for a federal appeal case, and ordered the Appeals court ruling voided, leaving Walker's ruling standing. California resumed issuing same-sex marriage certificates the following day, leading ProtectMarriage.com to file an emergency application with the Supreme Court, asking that the marriages be halted because the state had not waited the usual 25 days", "-28.417731616063975" ] ]
344kc6
There is no archeological evidence that dragons ever existed. So, if they're simply imagined, how is it that they're present in almost every major culture and depicted so similarly?
[ "There are certain things that are common in human mythology, and one of them is that humans are predisposed to be impressed by really big things. And it's easier to imagine a really big version of something that already exists than to design something completely from scratch. Hence why so many cultures have stories of giant humans running around. This applies to other creatures as well; take a reptile of some sort, scale it up to being bigger than a house, and suddenly you've got a dragon of some kind. Imagination adds other embellishments such as horns or breathing fire, or whatever the local variation is. (And they can be pretty varied; consider the differences between a standard European dragon, a Chinese dragon, and the Aztec winged serpent -- but they're all basically big lizards.) Similarly, many cultures have stories of giant birds, be it the ~~European~~ Middle Eastern (thanks productusmaximus!) Roc or the North American Thunderbird. This of course gives rise to the question of why some animals don't seem to get the gargantuan myth treatment as often. To this I can only speculate that when one has to deal with actual bears and tigers and jaguars, stories about even larger ones aren't necessary for drama.", "Asian dragons are depicted completely differently from European style dragons (which were themselves a wide range of dragony things with no consistent appearance). There are only dragons in a **few** major cultures, and most people would not include the flying serpents of central/south american myth as \"dragons\", nor do dragons make appearances in Indian, African, Middle East, or many other \"major\" cultures.", "Short answer: > There are two distinct cultural traditions of dragons: the European dragon, derived from European folk traditions and ultimately related to Greek and Middle Eastern mythologies, and the Chinese dragon, with counterparts in Japan (namely the Japanese dragon), Korea and other East Asian countries. > The two traditions may have evolved separately, but have influenced each other to a certain extent, particularly with the cross-cultural contact of recent centuries. [Long Answer]( URL_0 )", "People were finding dinosaur bones long before the modern age, and they had to invent stories to explain them. They came up with dragons.", "The dragons in different cultures and at different times are wildly different in style and mythology. We group a lot of different giant serpent/lizard monster concepts into one heading and call them dragons. The fact that we have a lot of serpent monsters is likely caused by early peoples inability to comprehend snake movements by anything other than magic. In almost all cultures snakes are either symbols of evil or symbols of good, but regardless they are magical.", "The dinosaur fossil thing that many people here mention has a huge problem, it is not actually easily discernible how dinosaurs looked like based on fossils, when the whole fossil craze began it took some time to figure out that these fossilized remains were from things whose skeletons looked similar too that of lizards etc. Our first attempts to reconstruct dinosaurs were often very wrong. It seems a bit unlikely that primitive people all over the world without the tools or the technology that we have could have dug up up dinosaur bones and accurately reconstructed what dinosaurs must have looked like when they were still in the bronze age or ever earlier. The idea also misses the fact that the modern dragon that looks like a big winged lizard who breathes fire is just that a modern thing. If you go back in time you will find that local depictions of what we call dragons tended to be a lot more different from each other and from what we have today. Dragons were frequently described as large serpents or chimeras mad up of different sorts of animals. Many of them were multi headed and limbed and descriptions comparing them to giant lizards are spare. The [proto indo-european religion]( URL_0 ) that most religions in Asia and European and the middle east and Africa were based on and influenced by is thought to have featured a hero/god fighting a large serpent and most modern dpeictions of dragons in Eurasia are probably connected to that. The dragon-like mythical animals in other places like Australia, the Americas or sub-Saharan African only fit the mold of the dragon with a lot more squeezing. So the explanation is more like: Once upon a time some people had a story about a hero slaying a big serpent. That story got exaggerated over the generations and spread throughout half the world to produce myths and religions of gods battling giant serpents. Like Thor vs. Jörmungandr or Marduk vs. Tiamat or even several times in Christian mythology. Over time those descriptions of dragons changed and evolved. when those cultures re-encountered one another they saw the similarities between the concepts and started adapting parts of their neighbours description of the creatures. Eventually dinosaurs were discovered and the by then already pretty dinosaur-like gestalt was influenced by that. People attempted to make creatures from unrelated cultures fir the pattern even if not appropriate and nowadays thanks to modern fantasy stories dragons from around the world look and act very similar.", "There are three predators that hunted and killed early humans (and other mammals) that we instinctively fear; birds of prey, big cats, snakes. A dragon is a manifestation of those three. Finding dinosaur bones only helped fuel our imaginations.", "I used to spend a lot of hours in the library as a child ... I used to read a lot. It was a normal day until a passage in a book I could read \"Dragons do not exist\"... I thought it was a mistake... I went in search of answers down the long corridors of the library, gathering books and more books until I could't carry any more... I spend a lot of time reading... When my mother came to pick me at the end of the day I was in tears... My search proved that the dragons really did not exist. That this magnificent and scary at the same time animal was just a myth. Sad moment of my childhood.", "I read a theory somewhere that it's some kind of amalgamated primal-subconscious archetype of our ancestors' most feared predators, the snake, the eagle, and the leopard. Probably quite fanciful but a cool idea", "Note: I wanted to give a logical, legible, and casual examination of the question. As a result, it's pretty dull - but maybe helpful? This question makes me think of the major traits I personally associate with dragons: they're reptilian and they breath fire. Lots of creatures - mythological or plainly observable fly, so I don't think that's critical to the 'idea' of a dragon. Also to be fair, not all 'dragons' are supposed to breath fire - and I'm sure there are plenty of other fire-breathers within various mythologies. I think with the first thing, a mythological creature being described as reptilian in it's physical characteristics is a perfectly natural consequence of people being exposed to snakes, lizards, alligators, turtles, ect. It would be quite strange for a culture to ignore an entire class of animals. It may be the case that there are cultures that depicted 'dragons' that were entirely unaware/unexposed to reptiles of any sort, but were these people also perfectly isolated from people who did? I don't think it is much of a stretch at all, from that point, to expect that a good number of isolated cultures could have conceived of an original version of a reptilian animal inspired by the observance of real, living reptiles. This character, through stories and artwork, would naturally be adopted by other other cultures as people interact with each other and share their ideas. Just as with music, religion, or what have you. So the idea of a dragon becomes attached to other ideas, which become a part of people's collective imaginations, and consequently become a part of those people's cultures. As for the fire-breathing part of the mystery, I think I have a good comparison. The thing that's strange about 'fire-breathing dragons' existing in multiple cultures is that there is no evidence (to my knowledge) of any observable animal being able to expel a stream of fire from it's mouth/nostrils/whatever. I think that's the gist of what we understand from depictions of such dragons. Here's my comparison: zombies eating brains. Zombies are another 'character' that can be observed in many cultures. If we decide that the most basic quality of a 'zombie' is that it is a person that has died who has come back to life, I think most people would agree that it is unsurprising that such an idea could be imagined naturally by many isolated groups of people observing death. Just as it's unsurprising that people familiar with snakes would imagine a special kind of snake. The thing that doesn't follow naturally of observing the real world is the 'brain-eating' part. As with 'brain-eating zombies', the idea of 'fire-breathing dragons' is too specifically fantastic for us to believe that several distinct cultures could have conceived of it naturally. I don't think it's reasonable to conclude from this that 'brain-eating zombies' did in fact exist in a physical capacity. My reasoning in this case is: those ideas are too specific to have originated in isolated cultures in every single individual case. Dragons only properly become 'fire-breathing dragons' once that idea becomes a part of stories and artwork. The stories only have to become popular for them to influence a people's culture. People that are a part of a culture where this popular fiction has not been accepted may very well imagine a fantastic creature that is similar only in being reptilian in nature. TL;DR People who saw reptiles were bound to imagine fantastic exaggerations, which all can be recognized as 'dragons'. Beyond their reptile-inspired characteristics, their similarities could largely be a case of specific incarnations (flying, fire breathing, poisonous, aquatic) becoming especially popular, and thus more likely to spread between cultures.", "Check out real America's most authoritative source: \"Some creation scientists have postulated that the differing nature of dragons in the west and east may be because after the Great Flood, predatory, carnivorous dinosaurs tended to migrate westward, whereas large, plant-eating dinosaurs tended to migrate east from Mt. Ararat.\" URL_0 ", "It's because dinosaur bones were continuously found throughout human history. And certain dinosaur skulls look like dragons. You could imagine unearthing a giant tooth and trying to imagine the creature it came from, in time those became Dragons in oral history.", "The dragon's we see in popular culture are actually from cultural diffusion - historically, cultures had much different depictions of them. Further, when there were similarities, they were akin to very large snakes/serpents.", "First of all, there is no *paleontological evidence*, not archeaology, paleontology. First of all, there are lots of things many societies came to separately. All culture on all corners of the globe have found constellations in the sky. All cultures have a tradition of believing comets in the sky were a bad thing. Many cultures have independenty came up with the idea of a god of thunder or lightning, Zeus, Thor, etcetera. Many cultures have come up with the idea of warfare. Many have come up with the idea of giant humans." ]
[ [ "like he was praying. Dragons Dragons are known to have existed in the Anita Blake novels, as seen on page 544 of Obsidian Butterfly. However, it implies that most species, if not all, are extinct in present times. Gargoyles In The Lunatic Cafe, page 55, gargoyles are described as carrion eaters with the nearest grouping located in Kentucky. It is possible that they will attack a man, but it happens rarely. In France, there are three species reported that are either bigger than a human or human sized. Quetzalcoatl The status of the supposedly extinct Quetzalcoatl Draconus Giganticus,", "-34.73962679420947" ], [ "superstition. Linnaeus tried to debunk some of these creatures, as he had with the hydra; regarding the purported remains of dragons, Linnaeus wrote that they were either derived from lizards or rays. For Homo troglodytes he asked the Swedish East India Company to search for one, but they did not find any signs of its existence. Homo lar has since been reclassified as Hylobates lar, the lar gibbon.\nIn the first edition of Systema Naturae, Linnaeus subdivided the human species into four varieties based on continent and skin colour: \"Europæus albus\" (white European), \"Americanus rubescens\" (red American), \"Asiaticus fuscus\" (brown Asian)", "-32.632411681930535" ], [ "believed possible until later proved so by Georges Cuvier, and partly because many scientists doubted that the dodo had ever existed. It seemed altogether too strange a creature, and many believed it a myth. The bird was first used as an example of human-induced extinction in Penny Magazine in 1833, and has since been referred to as an \"icon\" of extinction. 17th-century specimens The only extant remains of dodos taken to Europe in the 17th century are a dried head and foot in the Oxford University Museum of Natural History, a foot once housed in the British Museum but now", "-32.15311393162119" ], [ "Dungeons & Dragons has a monster called the sisiutl in the book Stormwrack.\nPseudo-scientific group the Society for Scientific Exploration theorised that the sisiutl, and other similar creatures in Pacific Northwest culture like the Sea-Wolf and the Haietlik, was based on real sightings of a cryptid, perhaps a Basilosaurus.", "-31.92924148698512" ], [ "of the Alps\" in 1887 explained that these creatures could all be identified as species of lizards or snakes (seemingly ignoring the cat-headed features). Dalla Torre considered these giant creatures of the past to have died out by his time, alongside the folk belief associated with them, but that the popular notion of the Tatzelwurm in his day lingered on as a \"phantom\" of those past legendary creatures.\nIn contrast, Josef Freiherr von Doblhoff counted these early dragons among his \"Tatzelwurm of old and now\", the title of his 1896 paper. Although Wagner in the 17th century reported each Swiss monster", "-31.482951363985194" ], [ "alligators, or, in California, alligator lizards.\" Mesopotamia Ancient peoples across the Near East believed in creatures similar to what modern people call \"dragons\". These ancient peoples were unaware of the existence of dinosaurs or similar creatures in the distant past. References to dragons of both benevolent and malevolent characters occur throughout ancient Mesopotamian literature. In Sumerian poetry, great kings are often compared to the ušumgal, a gigantic, serpentine monster. A dragon-like creature with the foreparts of a lion and the hind-legs, tail, and wings of a bird appears in Mesopotamian artwork from the Akkadian Period (c. 2334 – 2154 BC) until", "-31.42088649678044" ], [ "It is not the only lizard from the Canary Islands to have been considered extinct only to be rediscovered later: This happened with other giant lizards of the Canary Islands, like the El Hierro giant lizard and La Gomera giant lizard (rediscovered 1974 and 1999, respectively); the somewhat smaller Tenerife speckled lizard was only discovered for the first time in 1996.\nAt this point, not a single living individual has been captured and any remaining population, if existing, is assumed to be tiny.", "-31.28297148339334" ], [ "Flavius Philostratus discussed dragons (δράκων, drákōn) in India in The Life of Apollonius of Tyana (II,17 and III,6–8). The Loeb Classical Library translation (by F.C. Conybeare) mentions (III,7) that \"In most respects the tusks resemble the largest swine's, but they are slighter in build and twisted, and have a point as unabraded as sharks' teeth.\" According to a collection of books by Claudius Aelianus called On Animals, Ethiopia was inhabited by a species of dragon that hunted elephants and could grow to a length of 180 feet (55 m) with a lifespan rivaling that of the most enduring of animals.", "-31.268742513813777" ], [ "to them, especially when rocks are disturbed. These species are rarely found outside native temperate grasslands, and does not adapt well to changed environments, primarily due to the lack of food diversity found outside their native habitat. T. pinguicolla may already be extinct due to the heavy degradation that grasslands have received in Victoria, with the last known confirmed sighting being made in 1969.\nAccording to herpetologist Lyn S. Nelson, \"Observations indicate that arthropod burrows, surface rocks, or other similar refuge sites may be necessary for the continued persistence of populations of dragons, by providing thermal refugia.\" They are known", "-31.215112322737696" ], [ "large number of ethnic myths about dragons are told throughout China. The Houhanshu, compiled in the fifth century BC by Fan Ye, reports a story belonging to the Ailaoyi people, which holds that a woman named Shayi who lived in the region around Mount Lao became pregnant with ten sons after being touched by a tree trunk floating in the water while fishing. She gave birth to the sons and the tree trunk turned into a dragon, who asked to see his sons. The woman showed them to him, but all of them ran away except for the youngest, who", "-31.131698336685076" ], [ "at Australia who were the ancestors of modern Australian Aborigines. However, scientists estimate that Thylacoleo became extinct 30,000 years ago. Modern sightings of an animal described as remarkably like Thylacoleo have led some researchers to speculate that a small relict population has somehow survived in remote areas. Cryptozoologists who promote the theory of survival of the Tasmanian tiger or thylacine Thylacinus cynocephalus, a Thylacinid, and also currently accepted as extinct, favour proposed survival of the Queensland tiger. The fundamental difference between the two cases, however, is that the last Tasmanian tiger in captivity died in 1936, and the species", "-31.118339552012003" ], [ "animal and plant life is so accurate that entomologists who analysed her study journal from the expedition could identify 73 percent of the lepidopterans by their genus and 66 percent as exact species. Some of the animals and plants she drew are likely to have since become extinct. Her drawings are part of the scientific exploration by Europeans. Early taxonomy of tropical plants relied on images or specimens. Following her return to Amsterdam the images she had made were used by Carl Linnaeus and others to identify one hundred or so new species. At the time there was no standardised", "-31.063052825047635" ], [ "belongs in its barrow, canny and jealous of its jewels\". The dragon was not considered a fictional animal in this period, but a real part of the natural world – like other animals that Anglo-Saxons had heard of but not seen because they lived in other parts of the world.", "-31.038756995869335" ], [ "Dragon, Grandchildren of Gods\"). Prehistory The Vietnamese dragon is the combined image of crocodile, snake, cat, rat and bird. Historically, the Vietnamese people lived near rivers, so they venerated crocodiles as \"Giao Long\", the first kind of Vietnamese dragon.\nThere are some kinds of dragons found on archaeological objects. One group is that of the crocodile-dragons, with the head of a crocodile and the body of a snake. The cat-dragon excavated on a glazed terracotta piece in Bắc Ninh has some features of Đại Việt period dragon: it does not have a crocodile head, its head is shorter and it has", "-30.985271286044735" ], [ "Dragon A dragon is a large, serpent-like legendary creature that appears in the folklore of many cultures around the world. Beliefs about dragons vary drastically by region, but dragons in western cultures since the High Middle Ages have often been depicted as winged, horned, four-legged, and capable of breathing fire. Dragons in eastern cultures are usually depicted as wingless, four-legged, serpentine creatures with above-average intelligence.\nThe earliest attested dragons resemble giant snakes. Dragon-like creatures are first described in the mythologies of the ancient Near East and appear in ancient Mesopotamian art and literature. Stories about storm-gods slaying giant serpents occur throughout", "-30.917199193769193" ], [ "animal and plant species whose status is harder to determine. Many species have not been seen since their description.\nHubbardia heptaneuron, a species of grass that grew in the spray zone of the Jog Falls prior to the construction of the Linganamakki reservoir, was thought to be extinct but a few were rediscovered near Kolhapur.\nSome species of birds have gone extinct in recent times, including the pink-headed duck (Rhodonessa caryophyllacea) and the Himalayan quail (Ophrysia superciliosa). A species of warbler, Acrocephalus orinus, known earlier from a single specimen collected by Allan Octavian Hume from near Rampur in Himachal Pradesh was rediscovered", "-30.776470338911167" ], [ "serpents killed Laocoön and his sons when Laocoön argued against bringing the Trojan Horse into Troy.\nIn antiquity and in the bible, dragons were imagined as huge serpentine monsters, which means that the image of a fire-breathing dragon with four/two legs and wings came much later—in the late Middle Ages; Most of the stories say that they live in the sea, the Babylonian myths of Tiamat, the myth of the Hydra, Scylla, Cetus and Echidna in the Greek mythology and maybe even the Leviathan, confirm that.\nIn Norse mythology, Jörmungandr, or \"Midgarðsormr\" was a sea serpent so long that it encircled the", "-30.691984784261876" ], [ "than 100 species of mammals, including dogs, cats, oreodonts, saber-toothed tigers, horses, camels, and rodents. The Blue Basin and the Sheep Rock unit contain many of these same fossils, as well as turtles, opossums, and large pigs. More than 60 plant species are fossilized in these strata, such as hydrangea, peas, hawthorn, and mulberry, as well as pines and many deciduous trees. One of the notable plant fossils is the Metasequoia (dawn redwood), a genus thought to have gone extinct worldwide until it was discovered alive in China in the early 20th century.\nAfter another period of erosion, a series of lava", "-30.506780350318877" ], [ "On the Track of Unknown Animals Subject As one reviewer explained, it is a book \"about animals that might exist.\" On the Track of Unknown Animals cites animals that had only been discovered relatively recently, such as the pygmy chimpanzee, coelacanth, Komodo dragon and giant panda; and those that are believed to have become extinct relatively recently, such as the moa and Tasmanian tiger. A major theme is that these animals were generally known to local peoples, but their stories were dismissed by visiting zoologists, particularly the okapi.\nThe author then discusses evidence for mystery animals from all over the world", "-30.473219583684113" ], [ "events was reported earlier in 2014 with Spinosaurus, another sail-backed theropod which had only been known from few remains since 1912. Poached remains were reunited with specimens obtained by scientists, and Spinosaurus was shown to have been quite different from other spinosaurids. The two cases showed that the lifestyle and appearance of incompletely known extinct animals cannot always be safely inferred from close relatives. By 2017, the Mongolian government had increased its effort to seize poached fossils from collectors and repatriate them, but proving their provenance had become a scientific and political concern. Therefore, a study tested the possibility of", "-30.469369543599896" ], [ "were mostly represented by lepidosauromorphs (such as lizards and tuatara relatives). Among pseudosuchians, only small crocodylomorphs did not go extinct by the end of the Triassic, with both dominant herbivorous subgroups (such as aetosaurs) and carnivorous ones (rauisuchids) having died out. Phytosaurs, drepanosaurs, trilophosaurids, tanystropheids, and procolophonids, which were other common reptiles in the late Triassic, had also become extinct by the start of the Jurassic. However, pinpointing the extinction of these different land reptile groups is difficult, as the last period of the Triassic (the Rhaetian) and the first period of the Jurassic (the Hettangian) each have few records", "-30.459122934378684" ], [ "have been based on far older fossils of plesiosaurs, which are thought to have informed a unique depiction of a dragon in this book that departs noticeably from the classically slender, serpentine dragon artwork of the era by having a barrel-like body and 'paddle-like' wings. According to some researchers, this dramatic departure from the typical dragon artwork of this time, which is thought to have been informed by the Lindwurm, likely reflects the arrival of a new source of information, such as a speculated discovery of plesiosaur fossils in quarries of the historic Swabia region of Bavaria.\nEighteenth century skeletal reconstructions", "-30.450462637840246" ], [ "nearly all Indo-European and Near Eastern mythologies. Famous prototypical dragons include the mušḫuššu of ancient Mesopotamia; Apep in Egyptian mythology; Vṛtra in the Rigveda; the Leviathan in the Hebrew Bible; Python, Ladon, Wyvern, and the Lernaean Hydra in Greek mythology; Jörmungandr, Níðhöggr, and Fafnir in Norse mythology; and the dragon from Beowulf.\nThe popular western image of a dragon as winged, four-legged, and capable of breathing fire is an invention of the High Middle Ages, based on a conflation of earlier dragons from different traditions. In western cultures, dragons are portrayed as monsters to be tamed or overcome, usually by saints", "-30.41460777440807" ], [ "Middle East, India, and Central Asia. Until at least 3,000 years ago, the aurochs was also found in eastern China, where it is recorded at the Dingjiabao Reservoir in Yangyuan County. Most remains in China are known from the area east of 105°E, but the species has also been reported from the eastern margin of the Tibetan plateau, close to the Heihe River. In Japan, excavations in various locations, such as in Iwate and Tochigi prefectures, have found aurochs which may have herded with steppe bison. Extinction By the time of Herodotus (fifth century BC), aurochs had disappeared from southern", "-30.365192442914122" ], [ "lack of accurate population data can generally be attributed to the secretive nature of the species, creating issues in regards to collecting and examining specimens. During the initial survey of 1969, researchers located ten male and female individuals including the holotype, and recent coloured photographic evidence from 2007 proves that the species is still extant in the original location of surveyal. Threats The only apparent threat to the lizard is the disturbance of the habitat in which it resides. The habitat is not particularly wide ranging in size, and is concentrated to only a fairly localised area. However, due to", "-30.210305820190115" ], [ "addition, some evidence from the fossil record has suggested that an extinct species, the giant nukupu‘u (Hemignathus vorpalis) existed prior to European discovery of the Hawaiian Islands.", "-30.018182740343036" ], [ "dragon of the same name that lived in a cave near the excavation site. The cave was on Wawel Hill, the namesake of the type species S. wawelski. Paleoecology Smok was the largest predator in its environment. Other large predatory archosaurs included the dinosaur Liliensternus and the rauisuchids Polonosuchus and Teratosaurus, but these animals were much smaller than Smok. It was one of the largest archosaurs in the world during the Late Triassic, and larger archosaurs did not appear until after the Early Jurassic. Smok lived alongside small carnivorous dinosauromorph and poposauroid archosaurs and large herbivorous dicynodonts. Paleobiology Examination of", "-30.01806261431193" ], [ "size of adult humans, but were supposedly of more advanced, having built cities when humans were still living in crude mud huts. By the time of the story, dragons were so rare that many thought them as legends. It was revealed that dragons were sophisticated creatures and superior craftsmen compared to humans. But as the human race became dominant, many dragons sought to protect their culture by retreating underground. Nargri descended from the exceptions who believed dragons should remain above ground, to interact with the changing world, while withdrawal from the world would lead to extinction.", "-29.96135580763803" ], [ "in a hundred are afraid of snakes and notes that fear of snakes is especially prominent in children, even in areas where snakes are rare. The earliest attested dragons all resemble snakes or bear snakelike attributes. Jones therefore concludes that the reason why dragons appear in nearly all cultures is because of humans' innate fear of snakes and other animals that were major predators of humans' primate ancestors. Dragons are usually said to reside in \"dank caves, deep pools, wild mountain reaches, sea bottoms, haunted forests\", all places which would have been fraught with danger for early human ancestors.\nIn her", "-29.855616779605043" ], [ "huge extinct or migrating crocodiles bear the closest resemblance, especially when encountered in forested or swampy areas, and are most likely the template of modern dragon imagery. This also fits with the ancient words 'Draco' and ‘Drakon’, meaning ‘large serpent’ or ‘sea serpent.’ Etymology The word dragon entered the English language in the early 13th century from Old French dragon, which in turn comes from Latin: draconem (nominative draco) meaning \"huge serpent, dragon\", from Ancient Greek δράκων, drákōn (genitive δράκοντος, drákontos) \"serpent, giant seafish\". The Greek and Latin term referred to any great serpent, not necessarily mythological. The Greek word", "-29.803519134235103" ], [ "Planar dragons inhabit the outer planes. Other dragons Other species of true dragon that exist outside of the main dragon families include: Steel, Mercury, Pearl, Amber, Cloud, Mist, and many more.\nTwo comedic dragons that appeared in Dragon Magazine #156: The Pink Dragon, which had a cone breath weapon of bubbles (stung the eyes); and the Paper Dragon, which looked like a dog-sized folded paper dragon, which when slain left several spell scrolls from its remains. Lesser dragons Lesser Dragons comprise all dragonkind that are not true dragons, and includes a broad range of creatures. Landwyrms Landwyrm is a family of", "-29.773523456751718" ], [ "During this period, no tracks indicating the presence of tigers were discovered. After the final report of this survey had been published, the Javan tiger was declared extinct.\nRumours and indications of the possible presence of tigers in the Meru Betiri National Park prompted the park's Chief Warden Indra Arinal to initiate another search. With support of the Sumatran Tiger Project, twelve members of the park staff were trained in autumn 1999 to set up camera traps and map their observations. The Canadian The Tiger Foundation provided infrared cameras. Despite a year of work, they photographed no tigers, few prey, and", "-29.733417325245682" ], [ "appeared around the east coast of Asia. This might be related to the Komodo dragons on the Indonesian islands, tales of which were quite common throughout East Asia. The other appearance of the term is on a globe engraved on two conjoined halves of ostrich eggs, dated to 1504. Earlier maps contain a variety of references to mythical and real creatures, but the Hunt-Lenox Globe and the egg globe are the only known surviving maps to bear this phrase. Furthermore, the two maps may be closely linked: an investigation of the egg globe performed by collector Stefaan Missinne concluded that", "-29.660079062043224" ], [ "proto-dragon which must survive one thousand years in order to become a fully fledged dragon. In either case they are said to be large, benevolent, python-like creatures that live in water or caves, and their sighting is associated with good luck. Japanese dragon Japanese dragon myths amalgamate native legends with imported stories about dragons from China, Korea and India. Like these other Asian dragons, most Japanese ones are water deities associated with rainfall and bodies of water, and are typically depicted as large, wingless, serpentine creatures with clawed feet. Gould writes (1896:248), the Japanese dragon is \"invariably figured as possessing", "-29.656061803223565" ], [ "similar to other European dragons, Slavic dragons have their peculiarities.\nIn Russian and Ukrainian folklore, Zmey Gorynych is a dragon with three heads, each one bearing twin goat-like horns. He is said to have breathed fire and smelled of sulfur. It was believed that eclipses were caused by Gorynych temporarily swallowing the sun. According to one legend, Gorynych's uncle was the evil sorcerer Nemal Chelovek, who abducted the daughter of the tsar and imprisoned her in his castle in the Ural Mountains. Many knights tried to free her, but all of them were killed by Gorynych's fire. Then a palace guard", "-29.528555845317896" ], [ "other animals killed by a flash flood. Such mass mortalities would have further jeopardised a species already in danger of becoming extinct. Yet the fact that the dodo survived hundreds of years of volcanic activity and climactic changes shows the bird was resilient within its ecosystem.\nSome controversy surrounds the date of their extinction. The last widely accepted record of a dodo sighting is the 1662 report by shipwrecked mariner Volkert Evertsz of the Dutch ship Arnhem, who described birds caught on a small islet off Mauritius, now suggested to be Amber Island:\nThese animals on our coming up to them stared", "-29.516819409502205" ], [ "recorded in areas where they are now regionally extinct. For example, Herodotus recorded the species inhabiting Lake Moeris in Egypt. Additionally, the Nile crocodile is known from fossil remains to have once inhabited Lake Edward on the border between the Democratic Republic of the Congo and Uganda. They are thought to have become extinct in the Seychelles in the early 19th century (1810–1820). Today, Nile crocodiles are widely found in, among others, Somalia, Ethiopia, Uganda, Kenya, Egypt, the Central African Republic, the Democratic Republic of the Congo, Equatorial Guinea, Tanzania, Rwanda, Burundi, Zambia, Zimbabwe, Gabon, Angola, South Africa, Malawi, Mozambique,", "-29.496180645481218" ], [ "\"white dodo\" as a valid species. The British writer Errol Fuller agrees that the 17th-century paintings do not depict Réunion birds, but has questioned whether the ibis subfossils are necessarily connected to the solitaire accounts. He notes that no evidence indicates the extinct ibis survived until the time Europeans reached Réunion. Cheke and Hume have dismissed such sentiments as being mere \"belief\" and \"hope\" in the existence of a dodo on the island. Evolution The volcanic island of Réunion is only three million years old, whereas Mauritius and Rodrigues, with each of their flightless Raphine species, are eight to ten", "-29.460694939945824" ], [ "those species of birds among the 10,000 or so that exist in the world, given the limitations of human beings. A perfect example is the Vaurie's nightjar in China's south-western Xinjiang. It has been seen for certain only once, in 1929, a specimen that was held in the hand. Surveys in the 1970s and 1990s failed to find it. It is perfectly possible that it has evolved as a species that can really be identified in the wild only by other Vaurie's nightjars, rather than by humans. As a result, scientists do not know whether it is extinct, endangered, or", "-29.460247401017114" ], [ "a 90-year period when it was not seen, the extinction of the desert rat-kangaroo is not certain; thus, sightings of this animal would not fall into the cryptozoology category. In similar cases, the broad-faced potoroo was last seen in the late 19th century and is considered extinct, Gilbert's potoroo was considered extinct for 120 years prior to its rediscovery in 1994, and the long-footed potoroo was only discovered in 1967.\nThe finding of recent remains in the 1980s casts some doubt on the extinction of this species. Professor Ronald Nowak stated in his 2005 book, \"perhaps a small population still survives,", "-29.44355483946856" ], [ "lichens have been documented. Dry tropical areas of granitic and limestone bedrock make up the other one-third of the country with just over 20 species documented in these habitats. Algae Algae classification is problematic. They are a diverse group, but no longer generally considered part of the Plant Kingdom and are in general poorly known. A review of freshwater diatoms listed 134 species; most of them have been described from fossil deposits and it is unknown if they have become extinct. It is assumed that Madagascar harbours a rich endemic diatom flora. Diatom deposits from lake sediments have been used", "-29.435858520650072" ], [ "was in southeast Asia. There are presently three extinct named species of Gigantopithecus: G. blacki, G. bilaspurensis, and G. giganteus.\nIn 1955, 47 G. blacki teeth were found among a shipment of \"dragon bones\" (also called \"oracle bones\") in China. Tracing these teeth to their source resulted in the recovery of more teeth and a rather complete large mandible. By 1958, three mandibles and more than 1,300 teeth had been recovered. Gigantopithecus remains have come from sites in Hubei, Guangxi, and Sichuan, from warehouses for Chinese medicinal products, as well as from cave deposits. Not all Chinese remains have been dated", "-29.402382495463826" ], [ "scattered legends suggest that humans and dragons were once one race. The ancient Pelnish lore and Kargad legends describe an agreement between them called the Vedurnan or Verw Nadan to separate because of their differing temperaments and goals. The dragons chose the free life of air and fire, while humans chose the material world of earth and water.\nEarly in the history of humans, the largest and most powerful realm was centered on the northern islands of Enlad and Éa, although this realm did not rule all of Earthsea and it is unclear whether other realms existed. The wars and romantic", "-29.387394356454024" ], [ "it was long unknown whether it arrived. Contemporary documents first published in 2014 proved the story, and showed that it had arrived alive. It was meant as a gift, and, despite its rarity, was considered of equal value to a white deer and a bezoar stone. It is the last recorded live dodo in captivity. Extinction Like many animals that evolved in isolation from significant predators, the dodo was entirely fearless of humans. This fearlessness and its inability to fly made the dodo easy prey for sailors. Although some scattered reports describe mass killings of dodos for ships' provisions, archaeological", "-29.383500997486408" ], [ "China tiger signs were found in 11 reserves in the mountains of Sichuan, Guangdong, Hunan, Jiangxi and Fujian Provinces, but these data were insufficient to estimate population size. No tigers were directly observed; evidence was limited to sightings of tracks, scrapings and reported sightings by local people.\nIn 2001, field studies were carried out in eight protected areas encompassing 2,214 km² (855 sq mi) in five provinces of south-central China using camera traps, GPS technology and extensive sign surveys. But no evidence of tigers was found. No scats observed by the field team could be positively verified as being from tigers. Evidence for possible", "-29.344041018310236" ], [ "Barbados racer History This species was often believed to be the snake described by Richard Ligon in his \"A True and Exact History of the Island of Barbadoes\" (1657):\n\"Having done with Beasts and Birds, we will enquire what other lesser Animalls or Insects there are upon the Iland, of which, Snakes are the chiefe, because the largest; and I have seen some of those a yard and a halfe long.\" Conservation status It is believed to be extinct, as there has not been a confirmed sighting since 1961. Habitat loss is believed to have caused its decline, particularly the land", "-29.317166079505114" ], [ "first dinosaur discovery of Thailand. Expedition and research Since 1976, the Department of Mineral Resources with Thai-French Paleontological Project had continuously investigated the dinosaurs in the Phu Wiang mountains. The project found so many vertebrae, teeth, and footprints of the dinosaurs mainly from sandstone of Early Cretaceous Sao Khua Formation (about 130 million years old) including sauropod and theropod with wide range of sizes from a hen up to a large dinosaur with about 15 meters long. These finds have excited Thai people to make visiting the dinosaur sites as well as Princess Maha Chakri Sirindhorn who visited the site", "-29.30369542603148" ], [ "fossils is unhelpful. Bee-eater fossils from the Pleistocene (2,588,000 to 11,700 years ago) have been found in Austria, and there are Holocene (from 11,700 years ago to present) specimens from Israel and Russia, but all have proved to be of the extant European bee-eater. Opinions vary as to the bee-eater's nearest relatives. In 2001, Fry considered the kingfishers to be the most likely, whereas a large study published in 2008 found that bee-eaters are sister to all other Coraciiformes (rollers, ground rollers, todies, motmots and kingfishers). A 2009 book supported Fry's contention, but then a later study in 2015 suggested", "-29.287251384477713" ], [ "Dragon Booster 10,000 years ago Ten-thousand years ago, on the planet of Draconis there existed a breed of Gold-Boned beings called dragons. These Dragons had star-shaped marks on their foreheads (called bone-marks) and were known to all as Star Dragons (they were later renamed as Gold Dragons when the other colours emerged). Humans and Dragons lived side by side and together they built an almost atlantean world. 3000 years ago Two-thousand years later, the Prophecy of the Dragon Priests came true. Dragons, realising that they had been tricked, rose up against their masters and began the Great Dragon-Human War. Led", "-29.271000399021432" ], [ "Indian leopard, striped hyena, wild dog (Dhole), Bengal fox, Muggar crocodile, golden jackal, and bears. The tiger and the leopards are conspicuous by their absence though infrequent evidences are met with. Recently a tigress was found dead due to old age. Other fauna often seen is smooth Indian otter, sloth bear and Indian grey mongoose. \nHerbivores living here include: Four-horned antelope (Chousingha), nilgai (blue bull), chinkara (Indian gazelle), sambar deer, blackbuck antelope, barking deer, grey langur, rhesus macaque, chital (spotted deer) and wild boar. \nReptile species found in Nauradehi includes monitor lizard, mugger crocodile, turtle, tortoise and snakes.", "-29.231966279650806" ], [ "Philippines. Due to lack of favourable habitats and small founder population, some species of animals have become extinct and others have radiated into endemic species. For example, in Holocene times, ancient pangolin (Manis palaeojavanica), panther (Panthera sp) and tapir (Tapirus indicus) became locally extinct in Borneo. Of the 57 mammal species that were identified from archaeological remains in the Niah Caves, Sarawak, 13 were bats. Four of these were megachiropterans, Pteropus vampyrus, Rousettus amplexicaudatus, Rousettus sp and Eonycteris spelaea, all of which remain extant species in Borneo and Peninsular Malaysia. \nThe provisional list of mammals of Borneo (sensu Lord Medway,", "-29.199235675216187" ], [ "of tigers confined at the temple exceeded 150.\nThe original eight tigers brought to the temple were rescues, and thus far DNA data is incomplete and therefore unavailable to the public, as the pedigree of the tigers is not entirely known. However, it is presumed that they are Indochinese tigers, except Mek, a Bengal tiger. It is possible that some may be the newly discovered Malayan tigers, as well as cross breeds or hybrids. Issues, reports, and controversy Critics charge that the Tiger Temple is a criminal organization. An NGO, Care for the Wild International, claimed that based on information collected", "-29.193700661882758" ], [ "a mixture of advanced and ancient species, and also of species found only in the Jehol and others found all around the world. It is possible that northeast Asia was isolated for part of the Jurassic by the \"Turgai Sea\" which separated Europe from Asia at the time.\nThe Jehol Biota includes many species that were previously known only from the Late Jurassic or earlier. These \"relict\" species include the compsognathid dinosaur Sinosauropteryx and the anurognathid pterosaur Dendrorhynchoides. It also has the earliest and most primitive known members of groups that spread all around the world by the Late Cretaceous,", "-29.18258589047764" ], [ "Neotropical rainforests today, and it is likely that leaf damage was made by relatively few species.\nRemains of the giant boid Titanoboa cerrejonensis have been found from a gray claystone layer underlying Coal Seam 90 in the Cerrejón mine. Titanoboa is the largest known snake to have ever existed, reaching an estimated length of 12.8 metres (42 ft). Eunectes, the anaconda, is likely to be a close living analogue of Titanoboa.\nA dyrosaurid crocodylomorph called Cerrejonisuchus improcerus was described in 2010 from the Cerrejón Formation in the same layer as Titanoboa. It was a small dyrosaurid, and had the shortest snout length relative", "-29.177783868042752" ], [ "then a few other species of similarly poisonous birds have been discovered, most of which also gain their poison from their prey. A recent article in China has been published bringing up the question if the Zhen bird could have really existed.", "-29.17705483654572" ], [ "however, this could have been very different. There are several species that have gone extinct since human colonization of the island (1,500 to 2,000 years ago) that could very likely have been dispersers of the seeds. This includes species of primates that were thought to be similar to baboons, and the heaviest bird that ever lived, the elephant bird, which had a powerful beak that could have opened large fruit. Today, water may be the means by which the seeds are dispersed.\nLack of water can sometimes be a problem for plants in Madagascar. It appears that the baobab overcomes this", "-29.149952306892374" ], [ "with several fins, long claws and teeth. Their scales can vary between all the colours of the rainbow, and they are so strong that almost no weapon can hurt their skin. They usually live inside hollow trunks, dens, or in the abandoned caves in the mountains. Dragons in Hungarian literature In earlier tales, dragon had no treasure-hoarding characteristics. Later, they became hoarders of gold and gems. This version of the dragon slithered onto the pages of children's literature of the 19th and early 20th centuries, where they appeared often. they generally appeared as aggressive beasts of prey. \nIn these", "-29.110465954290703" ], [ "Period, or about 106 to 97 million years ago. At least 80 other vertebrate species are known from the Mussentuchit, including fish, frogs, lizards, snakes, crocodilians, dinosaurs, birds, and mammals, although not all are complete enough to name. Many dinosaur groups are represented by fossils from this member, including carnivorous theropods as well as several different herbivorous types, including the iguanodont Eolambia. The presence of aquatic animals like fish and frogs, as well as the mudstone in which their fossils are found, suggests that this was a floodplain environment.\nEarlier layers within the Cedar Mountain Formation contain different nodosaur species. The", "-29.07383383816341" ], [ "Aitareya Brahmana, a Vedic text of the early 1st millennium BCE, the nature of the Vedic rituals is compared to \"a snake biting its own tail.\"\nIt is a common belief among indigenous people of the tropical lowlands of South America that waters at the edge of the world-disc are encircled by a snake, often an anaconda, biting its own tail. Dragons Usually large to gigantic, serpent-like legendary creatures that appear in the folklore of many cultures around the world. Beliefs about dragons vary drastically by region, but dragons in western cultures since the High Middle Ages have often been depicted", "-29.04305256862426" ], [ "Some, such as Neogalaxias, exist only in small areas. The nautilus—considered a living fossil and related to the ammonites, which became extinct at the end of the Mesozoic era—occurs in Pacific waters around New Caledonia. There is a large diversity of marine fish in the surrounding waters, which are within the extents of the Coral Sea.\nSeveral species of New Caledonia are remarkable for their size: Ducula goliath is the largest extant species of pigeon; Rhacodactylus leachianus, the largest gecko in the world; Phoboscincus bocourti the largest skink in the world, thought to be extinct but rediscovered in 2003. Ethnic groups", "-28.999130312076886" ], [ "other Paleozoic groups, such as the trilobites, extinct. History of study The first known eurypterid specimen was discovered in the Silurian-aged rocks of New York, to this day one of the richest eurypterid fossil locations. Samuel L. Mitchill described the specimen, discovered near Westmoreland in Oneida county in 1818. He erroneously identified the fossil as an example of the fish Silurus, likely due to the strange, catfish-like appearance of the carapace. Seven years later, in 1825, James E. DeKay examined the fossil and recognized it as clearly belonging to an arthropod. He thought the fossil, which he named Eurypterus remipes,", "-28.998557525013894" ], [ "Dragon (Middle-earth) Earliest conceptions Dragons are already present in The Book of Lost Tales, the earliest Middle-earth-related narratives written by Tolkien, starting in 1917. The Book of Lost Tales was eventually posthumously published in two volumes as part of The History of Middle-earth series, which was edited and includes commentary by his son Christopher.\nIn the earliest drafts of \"The Fall of Gondolin\", the Lost Tale that is the basis for The Silmarillion, Morgoth (here called Melkor) sends mechanical war-machines in the form of dragons against the city; some even serve as armoured personnel carriers for Orcs. These machines do not", "-28.997649451281177" ], [ "birds recovered at Shanwang are the most abundant and best-preserved found so far in China. Fossils of ancient deer and bear are among the best-preserved from this period of time found anywhere in the world. Plant fossils include moss, fern, gymnosperm, and angiosperm species. In addition to 100 species of algae, other plant species are from 46 families, 98 genera and 143 species.", "-28.987130160676315" ], [ "long suspected, but no one had been able to prove.\nCo-author Mark Norell, Curator-in-Charge of fossil reptiles, amphibians and birds at the American Museum of Natural History, also weighed in on the discovery, saying:\nThe more that we learn about these animals the more we find that there is basically no difference between birds and their closely related dinosaur ancestors like velociraptor. Both have wishbones, brooded their nests, possess hollow bones, and were covered in feathers. If animals like velociraptor were alive today our first impression would be that they were just very unusual looking birds.\nAccording to Turner and co-authors Norell and", "-28.984889099374413" ], [ "of the continent, predating even elves and dwarves. Perhaps once there were many, but over the years, in-fighting and fighting the younger races have taken their toll. There are only a half dozen dragons known to be left. All living dragons are of the Old age or higher. Dragons are extremely intelligent and knowledgeable, conserving much lore that has been lost to the younger races. They speak their own language; some also speak Elven or Dwarven. Some of these dragons took part in the Battle of Deismaar, the only verified alive and awake dragons right now are the dragon of", "-28.97197851891906" ], [ "an extinct animal could have possessed, such as a plesiosaur disguised on the seafloor like a wobbegong or something that dinosaurs aren't usually shown doing, such as a sleeping Tyrannosaurus. The texts describe the adaptations or habits and explain why they are plausible. Some of the entries are deliberately made to break a paleoartistic cliché, such as a Tenontosaurus walking alone without a predatory Deinonychus in sight (Tenontosaurus is almost exclusively depicted in dinosaur art as the prey of Deinonychus).\nThe second and last major section of the book is titled \"All Todays\", and depicts animals from the present day as", "-28.96878407074837" ], [ "which indicates that the group had spread significantly during their 50 million year existence. Pterygotioids appear to have been relatively abundant throughout the Silurian and Devonian world, with unusually (in terms of eurypterids, most groups being absent entirely) large numbers recovered from the ancient continent of Gondwana (composed of Africa, India, South America, Australia and Antarctica).\nThe earliest known pterygotioids, belonging to the genus Hughmilleria, are from the Llandovery epoch of the Silurian and appear around the same time in Laurentia, Scotland and South China. With the group already being widespread at this seemingly early stage in their evolution, it is", "-28.954512076365063" ], [ "dragons are among the rarest and most potent of the dragons. They claim themselves as the pursuers of Io's final vision. Choosing to live in the Astral Sea amongst the gods and angels, these dragons nevertheless pursue agendas and plots that put them into contact with creatures of the mortal world. Mithrals seek to further their own plans at any cost, and woe to the lesser creature that tries to thwart them. These dragons have visions of other times and spaces. Being native to the Astral Sea, mithral dragons are immortal and will not die unless slain in battle. Orium", "-28.936784752935637" ], [ "Palaeophonus Fossil records This genus is known in the fossil record from the Silurian to the Carboniferous (age range: 428.2 to 314.6 million years ago). Fossils have been found in Europe, the United States, and Canada. Description Palaeophonus was virtually identical to modern scorpions. It grew to a lengths of 2.5–3.5 in (64–89 mm). These animals did not have eyes and therefore they were blind.\nUntil a few decades ago, Palaeophonus, similarly to many other scorpions of the Silurian, was thought to be one of the earliest animals to have conquered the land. In fact, a closer examination of the fossils has determined", "-28.913829096476547" ], [ "the popular imagination, plesiosaurs have come to be identified with the Monster of Loch Ness. That has had the advantage of making the group better known to the general public, but the disadvantage that people have trouble taking the subject seriously, forcing paleontologists to explain time and time again that plesiosaurs really existed and are not merely creatures of myth or fantasy.", "-28.90134552650852" ], [ "entirely, but very little remains today due to deforestation. The Rodrigues solitaire lived alongside other recently extinct birds such as the Rodrigues rail, the Rodrigues parrot, Newton's parakeet, the Rodrigues starling, the Rodrigues owl, the Rodrigues night heron, and the Rodrigues pigeon. Extinct reptiles include the domed Rodrigues giant tortoise, the saddle-backed Rodrigues giant tortoise, and the Rodrigues day gecko. Diet Leguat stated that the Rodrigues solitaire fed on dates, whereas Tafforet mentioned seeds and leaves. No other accounts mention diet. It has been suggested it ate latan palm fruits, for which it competed with the now extinct Cylindraspis tortoises.", "-28.874248123858706" ], [ "1786, sub-fossil bones were discovered in a cave which confirmed Leguat's descriptions, but at this time no living residents of Rodrigues remembered having seen living birds. The star constellation Turdus Solitarius was named after this bird.\nMauritius, Réunion, and Rodrigues were also once each home to one or more species of giant tortoises, now extinct, which comprised the genus Cylindraspis. There are thirteen living endemic reptile species, including a number of species of day geckoes (genus Phelsuma).\nThe islands have no native mammals, except for bats such as the Mauritian flying fox. Wildlife, threats and preservation Today Mauritius has one of the", "-28.868631236371584" ], [ "Titanoboa: Monster Snake Description The documentary describes the finding of and scientific examination after Titanoboa. The tagline of the documentary is:\nMeet Titanoboa: She's longer than a bus, eats crocodiles for breakfast and makes the anaconda look like a garter snake.\"\nThe documentary was released on March 28, 2012 at the Baird auditorium of the Smithsonian National Museum of Natural History.\nFrom a fossil bed deep within Colombia's Cerrejón coal mine emerges Titanoboa, the largest snake ever found. This Paleocene reptile, from the epoch following the dinosaurs' demise, stretches our concept of what a snake can be. At 48 feet (14.6 m), this mega", "-28.864698906312697" ], [ "Malay kings.\nIt has been pointed out that lions have never lived in Singapore (not even Asiatic lions), and the beast seen by Sang Nila Utama was therefore suggested to be a tiger, most likely to be the Malayan tiger. Another candidate for the beast mentioned in the Malay Annals is mythical beast called janggi told in Minangkabau legends as a guardian of gold mines. Dark red hair called rambut janggi, said to be of this mythical beast but probably actually from orangutans, adorn lances that were kept by the Minangkabaus as heirlooms. Regardless of the exact species of animal, the", "-28.851055288891075" ], [ "The Crater Lake Monster Plot In Crater Lake, Northern California, Dr. Richard Calkins is informed by his colleague Dan Turner that he and his girlfriend Susan Patterson have made an incredible discovery in a nearby cave system. The three head down and discover a system of cave drawings, including what appears to be a depiction of people fighting off a Plesiosaurus, thus providing evidence that dinosaurs existed at the same time as humans did. However, a flaming meteorite crashes into the lake just overhead, resulting in a cave-in that destroys the cave system and the drawings, while the three scientists", "-28.840029645835784" ], [ "grass; and Caryophyllaceae, Sapindaceae, and Acanthaceae flowering plants. The prehistoric snake Sanajeh mainly raided the nests of sauropods for eggs, though it is possible it also targeted smaller theropod eggs.\nIndia, by the Late Cretaceous, had separated from Madagascar and South America during the break-up of Gondwana, and Rajasaurus lived on an isolated island, likely causing endemism and unique characteristics not seen in other abelisaurids. However, despite being an island, there is no evidence of endemic animals with unique traits from Late Cretaceous India, perhaps indicating a continued connection to other parts of the world, likely Africa due to its proximity.", "-28.836658427724615" ], [ "T. pinguicolla. Based on recent studies, it is highly likely that T. pinguicolla is extinct, due to the destruction of most of its habitat and the last sighting of the species being made in 1969. If the species is extinct, it could represent the first known reptilian extinction on the Australian mainland in modern times. The species may have gone extinct due to the intensive land use and conversion in the basalt grasslands surrounding the highly-populated city of Melbourne.\nHowever, there is some hope that the species may still survive. Unconfirmed sightings have been made during surveys from 1988-1990, though later", "-28.818337788397912" ], [ "that the fossils may have been of the Réunion solitaire, and this suggestion was published in 1995. The ibis was reassigned to the genus Threskiornis, now combined with the specific epithet solitarius from the binomial R. solitarius. Birds of this genus are also white and black with slender beaks, fitting the old descriptions of the Réunion solitaire. No fossil remains of dodo-like birds have ever been found on the island. Cultural significance The dodo's significance as one of the best-known extinct animals and its singular appearance led to its use in literature and popular culture as a symbol of an", "-28.805772419436835" ], [ "the common name \"Wallace's giant bee\"; it is also known as the \"giant mason bee\". It was thought to be extinct until it was rediscovered in 1981 by Adam C. Messer, an American entomologist, who found six nests on the island of Bacan and other nearby islands. The bee is among the 25 \"most wanted\" lost species that are the focus of Global Wildlife Conservation's \"Search for Lost Species\" initiative.\nAfter 1981, the bee was not observed in the wild for the next 37 years. In 2018, two specimens were collected in Indonesia, one on Bacan in February and the", "-28.805613002128666" ], [ "disappearance of most of the original forests. Many forest vertebrate species were thought to be locally extinct. Detailed surveys conducted by group members showed that many were still around, albeit rare. These include banded leaf monkey (Presbytis femoralis), Sunda slow loris (Nycticebus coucang), Malayan porcupine (Hystrix brachura). leopard cat (Prionailurus bengalensis) and five-banded flying dragon (Draco quinquefasciatus). Findings have now been compiled into a pocket guide under the editorship of Nick Baker and Kelvin Lim. A Photographic Guide to Mammals, Reptiles, Amphibians and Freshwater Fishes is fully illustrated with most of the images taken in or adjacent to the animals’", "-28.79187792589073" ], [ "Nanipora Discovery Nanipora kamurai was first discovered in a public swimming area in Okinawa. The species is considered to be a \"living fossil\" because the animals most closely related to it genetically are extinct.", "-28.791460219712462" ], [ "was conquered by Apollo, and buried under the Omphalos, and that it is a case of one god setting up his temple on the grave of another.\nThe priestess of the oracle at Delphi became known as the Pythia, after the place-name Pytho, which Greeks explained as named after the rotting (πύθειν) of the slain serpent's corpse in the strength of Hyperion (day) or Helios (the sun).\nKarl Kerenyi pointed out that the older tales mentioned two dragons, who were perhaps intentionally conflated; the other was a female dragon (drakaina) named Delphyne in the Homeric Hymn to Apollo, with whom dwelt a", "-28.791178363520885" ], [ "snake was longer than a school bus and was at the top of the monster-eat-monster food chain. Organized by the Smithsonian Institution Traveling Exhibition Service in collaboration with the Smithsonian Tropical Research Institute, the Smithsonian Channel, the Florida Museum of Natural History, and the University of Nebraska–Lincoln, Titanoboa: Monster Snake features a life-size—and incredibly life-like—model of the prehistoric creature as it swallows a crocodile whole. Featuring compelling text and video, the exhibition is an amazing look at a lost world and the incredible animals that inhabited it. Until 2004, no one knew what lived in the South American tropics during", "-28.737601911314414" ], [ "to transport the subterranean or terrestrial waters to the sky. Dragons combine features of serpent, crocodile, and deer, and may show 'star' signs; they have been variously identified as the nocturnal sky and as the Milky Way. World endings and beginnings Within the framework of the post-Classic cycle of thirteen katuns (the so-called 'Short Count'), some of the Yucatec Books of Chilam Balam present a deluge myth describing the collapse of the sky, the subsequent flood, and the re-establishment of the world and its five world trees upon the cycle's conclusion and resumption. The lightning deity (Bolon Dzacab), the divine", "-28.72625834296923" ], [ "softer tissues. Implications of the find Priscomyzon provides evidence that agnathans close to modern lampreys had existed before the end of the Devonian period. Lampreys have ancient origins, have endured for 360 million years and lived through four major extinction events - even so, their evolutionary history is obscure. In ancient seas jawless vertebrate fish led to jawed fish, and thence to all other vertebrates, including humans. Being the only extant jawless vertebrates and a virtual time capsule of embryology and DNA, lampreys and hagfish are of immense scientific interest. Knowing the period during which they became parasitic would shed", "-28.718555601735716" ], [ "parts of China. A major target of the survey are parts of the Red River in Yunnan Province. Locals in the area have reported seeing 1-2 turtles that have a similar description to that of this species, meaning that there is a small possibility the species may still survive in the wild. In Oct. 2018, the Asian Turtle Program announced that it was interviewing local people to collect data to guideline searches for R. swinhoei in the very large area of flooded valleys formed by damming the Da River. Rediscovered individuals In April 2018, conservationists confirmed the existence of a", "-28.69895305148566" ], [ "in were numerous rocky, small caves, that sat on a limestone bed. It is likely that the caves were eroded by possibly acidic rainwater. Diphydontosaurus is very well known from these deposits, potentially because they drowned after a rainstorm or monsoon. Other animals also found in the caves were 2.97 m (9.75 ft) long sauropodomorph dinosaurs, smaller 10 cm (4 in) sphenodontians like Diphydontosaurus, and other groups of varying sizes between the two. In the cavernous system, the small sphenodontians like Diphydontosaurus probably fed on insects. Diphydontosaurus existed from 231–200 mya in both England and Italy combined.", "-28.678655213821912" ], [ "from microscopic elements to extensive bonebeds, with nearly complete, sometimes articulated dinosaur skeletons, have been found. Most other animals known from the formation are freshwater animals, and some are exclusively freshwater forms (for instance, frogs and salamanders). However, marine fossils are also found in the formation, suggesting that the sea was nearby. The bird fauna is mainly composed of orders still existing today. Other vertebrates Other land vertebrates include pterosaurs (e.g. cf. Azhdarcho), crocodiles, champsosaurs, lizards, snakes, turtles, frogs and salamanders.\nRemains of fishes and mammals have also been found in the Lance Formation.", "-28.670809449773515" ], [ "(A. sligoi), an undescribed species from eastern China, and the far smaller North American hellbender (Cryptobranchus alleganiensis).\nA 2018 study of mitochondrial DNA revealed that there are five wild clades of the Chinese giant salamander, as well as two only known from captives (their possible wild range is unknown). They diverged from each other 4.71–10.25 million years ago and should possibly be recognized as cryptic species. Despite this deep divergence, they can hybridize among each other, and also with the Japanese giant salamander. One of these clades was identified in 2019 as Andrias sligoi, a species described in 1924 by Edward", "-28.665947570698336" ], [ "omnipotence and creation at will, and that only four-toed dragons (who had thumbs with which to hold the orbs) were both wise and powerful enough to wield these orbs, as opposed to the lesser, three-toed dragons. \nAs with China, the number nine is significant and auspicious in Korea, and dragons were said to have 81 (9×9) scales on their backs, representing yang essence. Imugi Korean folk mythology states that most dragons were originally Imugis (이무기), or lesser dragons, which were said to resemble gigantic serpents. There are a few different versions of Korean folklore that describe both what imugis are", "-28.65098982630252" ], [ "the time Europeans arrived in Hawaiʻi. Four species - H. bombycinus, H. crucibracteatus, H. giffardianus, and H. wilderianus - were only ever known from a single individual in the wild. Today, four of the known species are extinct, two are extinct in the wild and persist only in cultivation, and only one (H. distans) has a small, highly endangered wild population. Although it has been suggested that poor pollination due to extinction of their honeycreeper pollinators is a factor, the abundant fruits and high germination rates of at least some species argues against this. The main reason is probably feeding", "-28.64679956366308" ], [ "addition, 111 described taxa of scorpions are extinct.\nThis classification is based on that of Soleglad and Fet (2003), which replaced the older, unpublished classification of Stockwell. Additional taxonomic changes are from papers by Soleglad et al. (2005). Fossil record Scorpion remains have been found in many fossil records, including marine Silurian and estuarine Devonian deposits, coal deposits from the Carboniferous Period and in amber. The oldest known scorpions lived around 430 million years ago in the Silurian period. Though once believed to have lived on the bottom of shallow tropical seas, early scorpions are now believed to have been terrestrial", "-28.642590156086953" ], [ "dragons are instead represented as harmless, benevolent, and inferior to humans. They are sometimes shown living in contact with humans, or in isolated communities of only dragons. Though popular in the late nineteenth and early twentieth centuries, \"such comic and idyllic stories\" began to grow increasingly rare after the 1960s, due to demand for more serious children's literature.\nOne of the most iconic modern dragons is Smaug from J. R. R. Tolkien's classic novel The Hobbit. Dragons also appear in the bestselling Harry Potter series of children's novels by J. K. Rowling. Other prominent works depicting dragons include Anne McCaffrey's Dragonriders", "-28.63599941213033" ], [ "are no extant native snakes there. The legend of Saint George and the Dragon, which has pre-Christian origins, tells that the saint, often depicted on horseback and armed with a lance, killed a dragon.\nMore recently, the urban legend of New York sewer alligators holds that pet reptiles, released when they grew too large for their owners' comfort, thrived and grew to monstrous size beneath the city's streets. As symbols The snake or serpent has played a powerful symbolic role in different cultures. In Egyptian history, the Nile cobra adorned the crown of the pharaoh. It was worshipped as one of", "-28.63438520836644" ], [ "dragons living in Elric’s day.\nThe Dreamthief’s Daughter contains scraps of dragon-lore not hinted at in earlier books. There are actually several types of dragons; those native to Melniboné are long-nosed Phoorn dragons. When young, they have black and white rings around their tails and snouts. The Melnibonéans invented a saddle-like sorcerous membrane named skeffla’a which enables the dragons to move between planes of existence. \nPlants: Many plants growing on the island have magical or medicinal properties, including soporifics, stimulants, and the hallucinogens that give the Dreaming City its name. Some were originally planted by Melnibonéans and established themselves; in latter", "-28.632547547478225" ], [ "Guajira, Colombia. Before this discovery, few fossils of Paleocene-epoch vertebrates had been found in ancient tropical environments of South America. The snake was discovered on an expedition by a team of international scientists led by Jonathan Bloch, a University of Florida vertebrate paleontologist, and Carlos Jaramillo, a paleobotanist from the Smithsonian Tropical Research Institute in Panama.\nThe name Titanoboa means \"titanic boa\". The species epithet cerrejonensis refers to the Cerrejón coal mine and the Cerrejón Formation, in which the fossils have been found. Habitat Titanoboa inhabited the first recorded tropical forest in South America. It shared its ecosystem with large Crocodylomorpha", "-28.63145841273581" ], [ "from the Khorat Plateau, including extinct dinosaurs, fish, crocodylomorphs, mammals, and turtles. His team from the Mahasarakham University discovered various fossil mammals in a Chaiyaphum cave, including teeth from pandas, hyenas, and the extinct orangutan Khoratpithecus piriyai.", "-28.606965565879364" ], [ "use of 13 species of reptiles (crocodilians and snakes) in Brazil for magic religious purposes such as magic spells, attracting sexual partners, and as amulets to protect against the evil eye.\nA dragon is a legendary creature, typically with snake-like or reptilian traits, in the myths of both European and Chinese cultures, with counterparts in Japan, Korea and other East Asian countries.\nThe (genuine) plesiosaur Woolungasaurus is named after the Woolunga, a mythical reptile of Australia. In Greek mythology snakes are associated with deadly antagonists, as a chthonic symbol, roughly translated as 'earthbound'. The nine-headed Lernaean Hydra that Hercules defeated and the", "-28.586606439988827" ], [ "might nowadays be rare or extinct due to disappearance of their food plants, but overall the genus is not yet very well studied. As far as is known, the caterpillar larvae of most Eudonia feed on mosses, namely of subclasses Bryidae and Dicranidae; some also eat lichen. In a few cases, other food plants have been recorded or suspected, such as Colobanthus pearlworts or woody asterids of genus Olearia (daisy-bushes).", "-28.583924411213957" ], [ "discovered during over 100 years of collection in that area. Due to the absence of ornithischian dinosaurs, it is suggested that prehistoric Madagascar saw a different herbivore community dynamic than was seen elsewhere in the Cretaceous.", "-28.579755440121517" ] ]
5xfs1p
Why are people often ridiculed for buying $5 lattes but not for buying $5 beers?
[ "Making coffee at home is much more common than brewing beer at home. That's really all it is.", "You can get the same size brewed coffee or tea for under $3, sometimes under $2--with the same sweeteners or whatever as the latte. You likely will not find a $2 beer outside of happy hour. The fact that you can make coffee (or even espresso) at home while half-asleep also adds to this. That drink is even cheaper, minus the initial cost of the press/brewer/machine. You can't brew a single bottle of beer very well, much less \"on demand\". So while costs are the same at the time of service, the frequency of purchase and fact that there are easy lower-cost options for one and not the other combine to make a $5 latte ridiculous and a $5 beer normal. It's weird, but it is what it is.", "Making beer is more involved than making coffee. There's more ingredients, it takes more time, and there's more waste. For coffee, you grow the beans, dry them, roast them, grind them, and mix with hot water. It's delicious! For beer you grow the barly, malt it, mash it, boil it, add hops whch you've also grown, then add yeast which has been specifically chosen for certain characteristics. Then you wait a week or two, possibly adding more hops, then you carbonate the beer and ship it to wherever people want to drink it at. It makes sense that beer cost more than a cup of coffee. About the stereotype though... I like coffee and beer. When I buy coffee from Starbucks, I just get coffee. Plain, black coffee in the smallest size. This only cost a few bucks. The expensive drinks are the ones with all the extra stuff. Those are basically milkshakes with a bit of coffee flavor. I can see why they're more expensive, but they're also much more than a \"cup of coffee\".", "When you're paying 5 bucks for a beer you're usually in a social setting, playing pool, listening to music. Having a good time with your friends. When you go through the drive through for coffee every morning you are paying for something to sip alone or at work. Something you could have made at home for a couple of cents, while saving yourself time not sitting in a drive through.", "You can only justify expenses you'd do yourself (in most cases). The people laughing at the latte drinkers think that the beer is worth it but that the latte isn't. Vice versa also exists in some circles" ]
[ [ "them. We believe that wine tastes better in a $20 glass than a $1 glass. We believe that an $80,000 Porsche Cayenne is vastly superior to a $36,000 VW Touareg, even if it is virtually the same car. We believe that $225 Pumas will make our feet feel better--and look cooler--than $20 no names. . . and believing it makes it true.\"\nGodin uses the idea that consumers will believe not whatever they want to believe but also what the marketers want them to believe. The idea that there is no concrete 'self-fulfilling truth' is expressed in the preface.\n\n\"Here's the", "-26.163018289167667" ], [ "previously owned by San Miguel, was sold to Lion Nathan for A$325 million in November 2007. In 2006 Boag's Brewery reported total revenues of A$92 million.\nAlthough Foster's Lager is not a popular domestic beer in the 21st century, its popularity internationally has grown and the product is made mostly for export. In January 2005, the brand was one of the ten best-selling beers globally.\nThe introduction of the Tap King product by Lion Nathan in mid-2013 caused controversy due to the perceived impact upon alcohol venues. The product is a home draught beer dispenser and raised concerns regarding lower patronage rates", "-25.92292871652171" ], [ "the Republic of Ireland because of the massive decrease in alcohol sales in that country. Alcohol consumption has dropped two per cent from its all-time peak in 2001. The lager is being offered at selected bars and off-sales outlets in Northern Ireland. The launch will be accompanied by an advertising and marketing campaign with promotions in bars. As of February 2013, the product is still being advertised in North America. Composition It is a 4.5% a.b.v. strength brew and gets its black colour from the roasted barley added into it. Other Guinness brand products Guinness has made several attempts to", "-25.866831571533112" ], [ "said the often messy \"pay to play\" approach, sometimes the only route to get a beer on bar/restaurant taps in major U.S. markets, further supported the brewery's limited distribution.\nIn 2009, a New York City bar was raided and fined for illegally selling Spotted Cow. In 2015, a bar in Maple Grove, Minnesota, also was caught illegally selling Spotted Cow after the establishment's owner allegedly purchased kegs in Wisconsin and took them back to Minnesota for retail sale. Awards New Glarus Brewing Company has been one of the most award-winning brewers of its size. It won two bronze medals at the", "-25.504670872469433" ], [ "acted in consequence thereof and how\ndid the event prove? Why, their beers were small and bad to such a degree that it became a fashion with the people to drink one half twopenny and one half porter at threepence halfpenny the pot.\nSir, your very humble servant,\nObadiah Poundage Modern usage Obadiah Poundage was also used as a pen-name by the author of a long-running diary column in What's Brewing, the monthly newsletter of the Campaign for Real Ale.", "-25.33141336758854" ], [ "craze died, and the microbrewery movement took off, General had difficulty maintaining profitability as a brewer of inexpensive beers. The fact that Lucky Lager tasted no worse than expensively-advertised \"premium\" brands such as Budweiser or Miller did not impress a market of drinkers where image was frequently more important than taste. The brewery's fortunes began to decline.\nAfter the Vancouver, WA brewery shut down in July 1985, the Olympia Brewing Company in Tumwater, WA began to produce Lucky Lager in the US. In July 2003, this brewery was also closed. Lucky Lager continued to be sold in its original Northern", "-25.285151268850313" ], [ "the double gold at the 2007 California State Fair Commercial Wine Competition. Charles Shaw Chardonnay is mass-produced in California and sold only through Trader Joe's grocery stores. \"We choose to sell good quality wines at $2 a bottle because we think it's a fair price,\" Fred Franzia told ABC News. \"We think the other people are charging too much.\"", "-24.796329573524417" ], [ "in the original beer manufacture's glass. After the reform in the alcohol taxes in July 2012 the tax rate doubled. Each liter of beer is charged with 4.2nis tax. In order to avoid raising prices at the pubs, and as a result, the loss of customers, a new \"magic\" appeared, called \"pint\". The customers don't really know the vague term of a pint, and it varies from place to place. Some of the places didn't even change the menu, and it's served as 500 ml.\nIn the United States, a pint is 16 US fluid ounces (473 ml). However, the typical conical", "-24.79367237642873" ], [ "lager produced by Cervecería Modelo in Mexico for domestic distribution and export to all other countries besides the United States, and by Constellation Brands in Mexico for export to the United States. The split ownership is a result of an anti-trust settlement permitting the merger of Grupo Modelo with AB InBev.\nThe Corona brand is one of the top-selling beers worldwide. Outside Mexico, Corona is commonly served with a wedge of lime or lemon in the neck of the bottle to add tartness and flavor.\nIn the United States, Corona Extra is the top selling imported beer. The Hand Malt Beer Belgian", "-24.653598495315237" ], [ "successful. And if you can’t help them be successful, at some point you have to say your model isn’t working, and if your model is not working, perhaps public dollars shouldn’t be going to pay for it.”\nCritics said that companies that associated with Lager profited from government funding, but did not have the delivered value. In fiscal year 2014, ECOT paid companies that associated with Lager nearly $23 million, or 1/5 of its $115 million government revenue.\n“The growth has been huge,” said Aaron Churchill, of the Thomas B. Fordham Institute. “There are clearly a lot of questions about the quality", "-24.572001404652838" ], [ "bottles) of the brand were sold in the U.S. market.\nAs of 2016, the brand is no longer sold in the U.K. Wine writers Oz Clarke and James May of the BBC television series Oz and James's Big Wine Adventure said this is \"simply because these fun-named wines have gone out of fashion\". However, about 420,000 cases (5 million 750 ml bottles) per year continue to be exported to the United States. Controversies The wine's arguably offensive name has helped to draw attention to the brand, but has also caused some problems in its marketing and distribution.\nThe Advertising Standards Association of", "-24.562473465921357" ], [ "Pony Bottle of Premium Beer in Pennsylvania\".\nAmong Mexican beers, Corona sells 7 U.S. fl oz (207 ml) ponies and 7.1 U.S. fl oz (210 ml) cuartitos, branded as Coronita, from the Spanish diminutive -ita. The American-market 7 oz. ponies come in 6-packs and the Mexican market 210 ml cuartitos come in boxes of 12.\nIn Australia, a limited range of beers are available in a 250 ml (8.8 imp fl oz; 8.5 U.S. fl oz) bottle, nicknamed a throwdown or grenade.\nIn the United States, small bottles are most popular for the on-premises market, where they are sold by the bucketful. The motivation in the 1970s was to target lighter drinkers, and to ensure that the lager", "-24.48950704128947" ], [ "said in reference to claims that he sells wine for virtually the same price as a bottle of water:\n\"They're overcharging for the water. Don't you get it?\".\n \nand \n\"I don't make wine to put in a closet. We sell wine to drink.\"\nIn August 2013, Bronco Wine Company entered into a marketing campaign for its Allure Moscato wine products in partnership with Hip Hop artist Warren G and Brand Elite, LLC. Media reports A profile in SF Weekly noted:\nFranzia, his brother, and a cousin co-own Bronco and control at least 35,000 acres (140 km²) of vineyards under cultivation in the Central Valley, more than", "-24.23553831978643" ], [ "— lambics, gueuzes, and krieks similar to those you would find in Belgium. On-premises sales account for 95% of their bottle sales, and they rarely sell kegs outside the tasting room. Most of their beers are produced in quantities of fewer than 1,000 bottles.", "-24.19728553161258" ], [ "imports made up the balance. In terms of market share in dollar value, beer's share dropped from 47.9 percent to 42 percent in ten years, mostly due to the increasing popularity of wine. Imported beer sales, in volume, have grown significantly, increasing at an annual average rate of 6.0% between 2004 and 2014.\nThe top selling style of beer in Canada, by far, is the pale lager. This type is also called North American Style Lager (by the Canadian Brewing Awards, for example.) In 2016, the best-selling brand was Budweiser with its products manufactured in Canada. History Beer was first", "-24.19052678420121" ], [ "free drink to consumers. Customer opinion Most of the customers are pleased with this brand new selling method. The restaurant owners were appreciated because of their effort of competing with the high inflation rate. Most of the customers still think that was acceptable when the owner increase the price. A netizen, “Qoo” said that, “ It is reasonable to raise the price otherwise there is no way for this kind of small restaurants to survive.” Meanwhile, Mr. Chan living in Sham Shui Po also said the meal was almost 70% cheaper than the meal having in the industrial regions nearby.", "-24.161630655711633" ], [ "2017. Sales are low due to poor name recognition, high price of up to $600 per bottle, and the tendency of restaurant patrons to buy well-known mass-market brands from France. Still, the brandies can be found nationwide in most large cities and some small ones as well.\nParticularly in recent years, the distillery has been experimenting with grappa, eau de vie, liqueur, and other liquors. In 2007 Mr. Corley produced a Syrah/Zinfandel grappa that garnered his first 5-star outstanding rating from Paul Pacult. He has since, seen many of these for his blends.\nCoale was also a participant in Hangar One", "-24.143251915142173" ], [ "and it probably moves them up in price because typically, the higher-price wines get the better scores.\" Smiley said that shoppers were too smart to be fooled: \"If Wilfred and BevMo fix the ratings, people will catch on and go elsewhere.\"\nIn scoring, Wong uses a 100-point system that he developed before working for the large retailer. Wong reports that his system is aimed at the taste of the consumer rather than at that of the intellectual, unlike Parker's system which is more cerebral. One of the differences, said Wong, is that Parker may give a \"fruitful\" wine 88 points when", "-24.141065373987658" ], [ "to purchase some (at the full list price of more than $100 per bottle). It has been called \"the bourbon everyone wants but no one can get\". A writer for The Wall Street Journal said \"You could call it bourbon, or you could call it a $5,000 bottle of liquified, barrel-aged unobtanium.\" Jen Doll wrote in The Wire, \"It's an age-old dilemma (supply and demand) leading to an age-old marketing dream (a product that can't be kept on the shelves ... money in the pockets ... bourbon in the bourbon snifters).\"\nAccording to an article published by Fox News and Maxim,", "-24.119995481145452" ], [ "relaunched the Toña brand as a traditional Nicaraguan beer, often associated with the local culture and customs. It is sold in 350 ml (12 U.S. fl oz; 12 imp fl oz) bottles and aluminum cans, and in 1 liter (34 U.S. fl oz; 35 imp fl oz) returnable bottles. Premium Premium is a 4.5% lager introduced in 1999 and aimed at consumers who prefer imported brands. It is sold in 350 ml (12 U.S. fl oz; 12 imp fl oz) bottles.", "-24.08536736847418" ], [ "sold them, or if they are over 28 square meters and sell beverages from the same manufacturer or importer. Businesses are not required to accept more than 50 bottles per customer per day. The deposit was initially ₪0.25, but was raised shortly after the ₪0.05 coin was discontinued.\nIn 2015, the system achieved a total return rate of 77%.\nMost 500 mL beer bottles (local brands such as Goldstar and Maccabee plus certain imported ones like Carlsberg and Tuborg) have a deposit of ₪1.20, and are willingly accepted even by smaller businesses (plastic water bottles, glass wine bottles and soda cans are mostly", "-24.0393985863775" ], [ "could trace where under-age drinkers bought them. A company spokesman complained, \"This is discrimination at the highest level. Buckfast is no more involved in crime than any other brand of alcohol\". A former head of the Scottish Police Federation said: \"Buckfast, the distributors and the lawyers who act on behalf of the monks refuse, point blank, to take any responsibility for the antisocial behaviour that's caused by the distribution and the consumption of Buckfast. They even refuse to change the glass bottles to plastic bottles despite overwhelming evidence that large areas in play parks and certain areas in Scotland are", "-24.02215493156109" ], [ "or 5 percent alcohol. The next beer they sample is another apple beer but with an extra kick of flaming apple schnapps. Francois explains that the fruity beers only have an alcohol content of 2.5 percent so the shot is used for more potency and flavor in the beer. The shot increases the alcohol content to 6 or 7 percent.\nFrancois and Zane take a break from drinking beer after that to try some Brussels sprout flavored liquor. It seems to be gin infused with Brussels sprouts and was not to Zane's taste.\nThe next beer is made by monks and can", "-24.0109057582049" ], [ "entering the market. South Korean beer companies denied the allegations, one specifically saying that \"most (South) Korean beers contain more than 70 percent malt, and some including Hite Max of Hite and OB Golden Lager of OB contain 100 percent malt. Rice and corn are not cheaper than malt, and these grains are used in the mixture to generate a mild taste.\" Despite the negative reactions from the South Korean breweries, many local beer drinkers are still dissatisfied with the taste of local beer brands.", "-24.00797548564151" ], [ "around for centuries, the formal and organized sale and resale of the best wines for profit became a more established phenomenon in the late 1970s and early 1980s. Indeed, at least in the United States in the 1960s and early 1970s, newspaper articles about investing in wine were more likely to warn that it is illegal for individuals to sell wine, and that the \"investment\" would be drunk by the investor.\nHowever, by the mid-1980s, in the state of Illinois, and in special cases in California, it was legal to sell wine without a retail license, and more investors were", "-23.94927380824811" ], [ "of membership, a “willingness to gamble” would be preferable for those who would consider joining. \nAccording to Popular Mechanics, the Rare Beer Club offers its members “the good, weird, funky stuff,” pointing out that “there are actually a few beers you likely couldn't find anywhere else, like extra hoppy harvest editions of Belgian pale ales or small batch fruit sours from rural Oregon.” The reviewer indicated that, though there are cheaper options for craft beer fans, the Rare Beer Club “offers the very most.” The reviewer for Men’s Journal noted that mail-order clubs had first flourished before rare craft", "-23.936148293025326" ], [ "in Europe, including France and England, and Portuguese-speaking countries Brazil, Angola and Mozambique. It is reportedly the best-selling Portuguese beer in the world.\nThe main export market continues to be Angola, where the group's best-selling brand is Super Bock.\nIn 2014, Super Bock extended its export market to Arab countries, with the arrival of the first containers with half a million liters of Super Bock Non-Alcoholic 0.0% to Saudi Arabia, a beer without alcohol due to a process that does not stop the fermentation stage and claims to allow the preservation of the beer's essential characteristics. As of 2014 Unicer intended to", "-23.91444385516661" ], [ "compared to a premium-brand spirit bottle of a similar size.\nBeer is not so highly taxed anymore in order to protect Swedish breweries and their employment opportunities against purchase during travel abroad. It is (as of 2011) 1.66 SEK per % alcohol and litre, which means 4.15 SEK for a 5% beer can (50 cl). Such a can usually costs about 10 SEK (1.05 EUR) at Systembolaget. For wine the tax follows a table. For 12% wine the tax is 21.58 SEK per litre. For distilled products the tax is 5.0141 SEK per % and litre (501.41 SEK per litre alcohol or 251", "-23.850144632189767" ], [ "resulted in threats to administration officials. Another issue is that many roving vendors sell beer and customers in the market proper can be seen drinking their purchases as they walk through the aisles. The most popular form of buying beer here is a “michelada” with a large bottle of beer (940ml) called a caguama emptied into a large cup and mixed with lime juice, salt and sometimes chili pepper and Worcestershire sauce. These vendors do not ask for proof of age. This informal market has made La Lagunilla one of the main centers for the production and sale of bootlegged", "-23.84068843748537" ], [ "Real Ale (CAMRA) has described this practice as selling a short measure, and says that it costs drinkers £1m a day in beer they have paid for but not received. The British Beer and Pub Association has issued guidelines for bar staff to give a 'top up' to any drinker who is unsatisfied with the measure they receive.\nCAMRA recommends the use of \"lined\" or \"oversized\" glasses in pubs. These have a line near the top (usually labelled \"pint to line\") to which the beer should be poured, with the head forming above it. In the past a number of breweries", "-23.837013459211448" ], [ "offering the higher-priced category when taking orders. The terms come from the relative positions of the bottles of spirit used for the drinks; the cheapest version of a spirit offered by a bar is typically stored in a long rail or \"well\" making it readily available to a busy bartender, while the more expensive, better-quality liqueurs and spirits are displayed on shelves behind the bar where they attract patrons to the available selection. Sizes A \"pony\" is slang for one US fluid ounce (30 ml) of spirit, while the standard-size \"shot\" of alcohol is a 1.5-US-fluid-ounce (44 ml) \"jigger\", with a \"double\"", "-23.80074508292455" ], [ "than 20. In addition, businesses selling food for on-premises consumption do not need an alcohol license to serve 3.5% beer. Virtually all major Swedish brewers, and several international ones, in addition to their full-strength beer, make 3.5% folköl versions as well. Beer below or equaling 2.25% ABV (lättöl) is not legally subject to age restrictions; however, some stores voluntarily opt out from selling it to minors anyway. Low-point beer Low-point beer, which is often known in the United States as \"three-two beer\" or \"3 point 2 brew\", is beer that contains 3.2% alcohol by weight (equivalent to about 4% ABV).\nThe", "-23.799100931767043" ], [ "alcoholic drinks. The drink, available in 10 oz., 32 oz. glass bottles and 12 oz. aluminum cans, was legal for all ages and tasted like ginger ale with a slightly beerish aftertaste (ingredients included lemon and lime juice, apple flavor, and ginger). Addressing the alcohol issue A small brochure explaining Chelsea was included with the 4-pack of 10 oz. bottles. On one page of the brochure the alcohol issue was addressed this way:\n\"The not so soft drink is not so ordinary...\n\"The fact is most soft drinks contain a very small amount of alcohol. New Chelsea contains a bit more alcohol", "-23.771230762678897" ], [ "for scores of seasoned old drinkers who like to know they can still buy a round for the house once in a while. Behind the portal of many an unfashionable old bar awaits the not inconsequential delight of being able to enjoy a night of drinking in New York without using up a $10 bill.\nShort beer, in Britain, (also known as small beer), was used to describe a beer brewed for a short period of time to kill off bugs in it so making it safe to drink, as the water was often unhealthy. In popular culture The 1939", "-23.693274648539955" ], [ "sale to minors or sale of enhanced high-strength extracts, most Salvia proponents otherwise argue against stricter legislation.\nAlcohol related financial contributions featured highly for Representative Dennis Reboletti's 2006 political campaign. According to the National Institute on Money in State Politics, 'Beer, Wine & Liquor' was his seventh highest industry contributor.", "-23.676802115965984" ], [ "an hour, and still have the ability to earn tips from customers purchasing beer.", "-23.629280049644876" ], [ "funding for the company came from technology investors.\nIn 2013, the company halted production due to quality issues caused by excessive pressure inside the cans. Production resumed in 2014 after a change to a more traditional 12-ounce aluminum, albeit still lacking the pop top. Churchkey beer The brewery's only beer is a Pilsner-style lager with 29 IBUs and 4.9 percent ABV. It is packaged in a 12-ounce steel can made by Ball Corporation that is designed to be recyclable, as is the churchkey that is included with purchasing a six-pack. As of 2014 the beer is only available in the", "-23.600434213440167" ], [ "restaurant denies ever allowing anyone to take unopened bottles of wine off the premises, saying \"Why would we jeopardize our liquor license for the sake of selling a couple bottles of wine?\"\nIn the weeks following the expensive meal, former senior Harris staffers claimed that \"they initially rejected a defense contractor's $10 million appropriation request last year but reversed course after being instructed by Harris to approve it.\" In May 2006, Harris's campaign spokesman Christopher Ingram acknowledged that she had also had a previous dinner with Wade in the same restaurant in March 2004, when the $32,000 in illegal donations had been", "-23.59730954698898" ], [ "choice of the middle and lower classes (along with ananá fizz and pineapple juice), whereas the higher classes would rather go for champagne or local sparkling wines for their Christmas or New Year toast. Popular commercial brands of cider are Real, La Victoria, \"Rama Caida\", Tunuyan. It is usually marketed in 0.72-litre glass or plastic bottles. However, there has been lately a campaign by some bottlers to make cider a drink consumed all year round, in any occasion, and not only seasonally. Cider now comes in smaller bottle sizes and commercials show people drinking at any time (and not only", "-23.579014346163603" ], [ "and is even lower in calories at 67 per bottle (vs. 80).\nOf course, beer connoisseurs usually rate regular beers as preferable to the light, and especially to the ultra light, beers. For example, reviews generally consider Molson Canadian 67 to be too light in taste, without the rich beer flavour of more highly-rated products. Consumers who evaluate beer on Web sites such as Beer Advocate and Rate Beer consider the ultra light beers such as Molson Canadian 67 and Sleeman Clear 2.0 as refreshing at best and bland or watered down at worst. Nonetheless, consumers who prefer not to give", "-23.545895111223217" ], [ "rarely consume enough beverage to make the offering unprofitable. Some establishments, who make their primary income with beverage sales, only offer free refills to members of rewards programs.\nBars in the United States often do not charge designated drivers for soft drinks, including refills. United States In certain areas of the United States, such as Massachusetts and New York, politicians have proposed banning free refills as a move against obesity. \nWhen New York City banned sugary drinks over 16 ounces in 2012, critics faulted free refills as one of the ban's biggest weaknesses.\nIn June 2012 Cambridge, Massachusetts, mayor Henrietta Davis unsuccessfully", "-23.530317010667204" ], [ "less common in other parts of the country. The bottled beers are also widely distributed to British supermarkets and exported to Germany and the United States.\nThe company produces five regular cask ales and six seasonal. Only two of the beers are filtered and pasteurised to be made available in bottles, Theakston XB and Old Peculier.\nBest Bitter (3.8% ABV) is regularly paired with XB in pubs, Theakston Best Bitter is the company's most easily found product, served in many pubs, mainly in the north of England.\nXB (4.5% ABV) is a premium strength Bitter with a more complex flavour. It was launched", "-23.52992724467913" ], [ "made with a 50/50 mixture of pilsner beer and lemon-lime soft drink. It is unavailable in markets where pre-mixed alcoholic beverages are banned. \nHolsten Alkoholfrei (\"Alcohol-Free\") is a non-alcoholic 0.5% ABV pilsner. \nHolsten Fassbrause Zitrone (\"Keg Soda - Lemon\") is a non-alcoholic shandy that is made with a 70/30 mixture of lemon-flavored soft drink and non-alcoholic pilsner beer. It is a niche product sold almost exclusively in Northern European markets. It is sold in 330-ml bottles in six-packs and 500-ml cans. Advertising Holsten sponsored Tottenham Hotspur football team from 1983 to 1995, and again from 1999 until 2002. They", "-23.511030691544875" ], [ "in cask or case of 8 bottles, and is currently being served at various Robinson's pubs (it is also available from the brewery).\nAs of December 2013 the beer is in the process of being discontinued as it was a limited edition beer.", "-23.44402055995306" ], [ "thresholds may be sold in grocery stores but only to people aged 18 or above.\nSince the 3.5% threshold is reasonably close to the alcohol content of an international lager beer, many international brands such as Heineken, Carlsberg and Pilsner Urquell are sold in two versions in Sweden - the internationally renowned product as a starköl at Systembolaget and a slightly watered-down version as a folköl in the grocery stores. Economy The modern trend is toward consumers increasingly choosing stronger beer than the 3.5% abv brands, generally referred to as folköl (people's beer) sold at grocery stores. Any stronger beer is", "-23.4393058714777" ], [ "Cayetano and former Special Assistant to the President Bong Go called for pullout of alcopops from the market due to \"deceptive packaging that resembles fruit juices usually bought by young consumers\". Alcopops also have seven percent alcohol content, which is slightly lower than that of local beer brand Red Horse Beer. South Africa In South Africa, \"spirit coolers\" cannot be sold to persons under the age of 18. They are only sold at liquor stores. United Kingdom In June 1997, Co-op Food became the first major retailer to place an outright ban on the sale of alcopops in its shops.", "-23.3926062026585" ], [ "discontinued the drink in 2015 due to poor sales.", "-23.31320291396696" ], [ "in line with consumers increasing preference for lower calorie drinks. In 2018, Tang's manufacturer Mondelez reported a drop in sales following the introduction of tax on calorific sweetened beverages in the Philippines.", "-23.298410490271635" ], [ "compared to 10% before the ban. The main reason is that the market became much more competitive since 2006, with many stronger local, Western European and South American wine brands, especially in the mid-price segment.\nThe ban was lifted by the end of 2013.", "-23.27541228698101" ], [ "are, depending on location, commonly found in pubs and bars today. Creation The packaging for Hooper's Hooch was created by KLP Scotland, the marketing and packaging agency for the Bass Brewery. Criticism At the time, along with other alcopops, the drink received criticism for encouraging underage drinking by appealing to children due to its sweet taste and use of cartoon-like advertising. With an ABV of 5.0% it was actually stronger than most lagers. In 1996 an advertising campaign for Hooch was criticised by the Advertising Standards Authority for appealing to underage drinkers. In 1997 the drink was relaunched with an", "-23.272394125175197" ], [ "times the drink's retail price. Four Loko appeared on Craigslist and collectible cans of the drink were being sold on eBay.\nIn late December 2010, a reformulated version of the drink was put on shelves. The new product had exactly the same design as the original, but the caffeine, guarana, and taurine (ingredients in the original drink) had been taken out of the formula and replaced by Red 40, a food coloring agent. However, sales of the original drink continued, usually for a price of roughly $3 per 24 ounce can.", "-23.22110605047783" ], [ "Urge (drink) Sizes Urge was available in Norway in 0.5 L and 1.5 L bottles, and later also in 0.33 L cans, but in Q1 of 1999 the 1.5 L bottles were taken off the market due to unsatisfactory sales. The cans also vanished from the market a few years later, leaving only the 0.5 L bottles.\nA massive campaign by the consumers on the internet community Facebook led to the relaunch of the 1.5 L bottle size on 1 September 2008. It has a sugar content of 68 grams per 0.5 L bottle.\nIn 2017, the 0.33 L cans also returned", "-23.2195446556143" ], [ "pronounced in the retail sphere, with wine rated above 90 points usually selling well while those even in the 85–89 range, which is rated \"good to very good\", are often ignored by consumers.", "-23.199928019661456" ], [ "has been manufacturing CLUB Premium Lager for over 85 years. CLUB Premium Lager sold under the tagline, “Beer deԑ ԑnoaa ne CLUB” and the moniker ‘Charlie’ is Ghana's #1 selling beer. The company introduced CLUB Shandy in the early 1990s, and Castle Milk Stout in the mid 90s. Eagle Lager was introduced in the 2010s while Beta Malt in PET pack was introduced in 2015. The company launched Belgian pilsner, Stella Artois, Eagle Extra Stout, and Beta Malt in Returnable Glass Bottles (RGB) in 2017.", "-23.18944664261653" ], [ "positive price differences of $1.3 - $3.3 were found to exist between their average price of 24-bottle packs of brands including Molson Canadian, Molson Dry, Coors Light, Budweiser and Bud Light. Using Molson Canadian as an example, the adjusted 24 pack price from Quebec IGA and Metro flyers was found to be $26.81 versus $28.12 for Ontario TBS locations.[16]\nIn response to Sen's analysis, The Beer Store commissioned a survey of Quebec – Ontario beer pricing by Debra Aron, an economist with Navigant Economics, which reviewed average TBS home consumer beer prices for all of 2013 in comparison to all beer", "-23.176168429024983" ], [ "gold medal in the American Style Specialty Lager category in 1997. The 1999 acquisition of Olde English 800 by Miller meant its share of the U.S. malt liquor business grew to 36 percent; it also led to a \"less controversial\" marketing strategy for the brand, one that by 2000 included the sponsorship of a series of minority business seminars. 2000s–2010s In 2010, the 3.2% ABW version of Olde English was rated one of \"the worst beer[s] in the world\" by RateBeer.com, a beer rating website.", "-23.174915024326765" ], [ "Rare Beer Club Reception The Rare Beer Club has received positive reviews from many print and online media sources. A Los Angeles Times critic referred to the club as “game-changing,” with “expertly curated bottle shipments that continue to be among the industry's best,” and noted that about half of the beers featured in the monthly selections were produced exclusively for it. Fortune magazine affirmed that the club is a “favorite” of craft beer enthusiasts, and that it is “the way to go” for an experience “more off the beaten path.” The reviewer, however, cautioned that, given the high monthly price", "-23.17364799844654" ], [ "involved the drinking of water, not Budweiser or any other beer. In the summer of 2005, the company began marketing \"bud pong\" kits to its distributors. Francine I. Katz, vice president for communications and consumer affairs, was reported in The New York Times as saying that bud pong was not intended for underage drinkers because promotions were held in bars, not on campuses. And it did not promote binge drinking, she said, because official rules call for water to be used, not beer.\nThe New York Times quoted a bartender at a club near Clemson University as saying she had worked", "-23.14654466281354" ], [ "mark in the industry that they had the hardest game to play — period, bar none. That's fine if you're not worried about catering to a customer and making sales.\nReturn of Werdna was the worst-selling product we ever launched. People would buy it, and it was unplayable. So they'd put it down, and word spread around. There were other hard-core players in the market that loved it. They said, \"Ah, why doesn't everybody do this?\" Well, we don't because you guys are a minority. If you're a glutton for punishment, you're going to have to get your pleasure somewhere else", "-23.145070384052815" ], [ "true to me, so I didn’t write it. I also think the brand 'alcoholic' prevents a lot of people, especially young people, from seeking help or even reevaluating their relationship with alcohol. In my mind, the whole point of Smashed is to say, you don’t have to be a quote-unquote alcoholic in order to examine the underlying reasons why you're drinking.\" Appearances As a journalist, she has contributed to The Guardian, U.S. News & World Report, Glamour, Jane, and Seventeen magazine. She has promoted her book on 20/20, Good Morning America, CBS Evening News with Katie Couric, Anderson Cooper 360,", "-23.11613838178164" ], [ "Rob McIsaac. Most of their beer is now sold in cans. Cameron's Brewing Company in Mississauaga, Ontario also sell the majority of their beer in cans. Craft brewer Black Bridge in Saskatchewan is strongly in favour of cans, due to the lower weight (\"we can transport more beer while reducing our carbon footprint\") and much greater resistance to light and oxygen that can reduce shelf life in addition to lower packaging and shipping costs.\nThree provinces were providing major support to small brewers in 2015. Ontario invested $1.6 million to assist 20 craft breweries in expanding and in marketing. B.C. announced", "-23.107659901928855" ], [ "law, and breweries campaigned against it, but competing brewers claimed it was because they thought Okells wanted to produce other types of beer. The eventual outcome was a slight relaxation of the law, which permitted the brewing of lager, wheat beer and fruit beer. Okells used the changes in the law to produce a Canadian lager, which drew criticism from the local brewing community. However, Bushy’s head, Martin Brunnschweiler, says the act helped their Ruby Mild beer win a regional beer award, because they could not add chemicals or preservatives.\nIn 2002, the Department of Health considered changing the law to", "-23.08811211361899" ], [ "purchased; needing a tap to serve the contents; and posing difficulties in determining the amount of beer remaining (weighing the keg or observing its buoyancy are common techniques). Despite this, a pony keg can be a cheap way to provide beer for a medium-sized party. In some places such as Cincinnati, the term pony keg can mean a convenience store that sells beer. Sixth barrel A sixth barrel keg contains approximately 5.2 gallons, and is becoming the choice for many establishments and breweries that wish to use kegs smaller than a half barrel. The sixth barrel kegs are nominally larger", "-23.08754850376863" ], [ "uncommon wines, and the customer retains the regular right to return faulty wine for the money back within five years of purchase.\nThough the available quantities of the special release wines can be very limited, some wines so sparse they entail minimal purchasing quotas in order to reach a wider public, prices may be as low as ⅓ or ¼ of world market value. As a result of considerable enthusiasm surrounding these product launches, the trends of customer behaviour has come under criticism for sinking to an uncivilised level.\nVinmonopolet is not established on Svalbard. Instead the government can license private alcohol", "-23.08455592620885" ], [ "anything bought—grew the [became] pleasanter, drawn out into [the] Gallicized lagniappe [emphasis added].\nLagniappe is derived from the South American Spanish phrase la yapa or ñapa (referring to a free extra item, usually a very cheap one). La is the definite article in Spanish as well as in French (la ñapa or la gniappe = the ñapa/gniappe). The term has been traced back to the Quechua word yapay ('to increase; to add'). In Andean markets it is still customary to ask for a yapa (translates as \"a little extra\") when making a purchase. The seller usually responds by throwing in a", "-23.069354242100076" ], [ "exporting to many countries; they are also well represented in Germany's big beer market.\nKrönleins now exports Stockholm Fine Festival (also known as: Stockholm Premium Lager) to United States of America", "-23.037458327627974" ], [ "allowed to be sold at very inexpensive prices because of the Trader Joe's branded label. Under California law at the time, there were fair trade provisions for alcoholic beverages which made it illegal to sell wines at a cheaper price than branded competitors, such as Gallo's. Berning's program simply \"got around\" the alcohol fair trade laws by offering their own wines under the Trader's Joe brand, the Trader Joe's Winery label. The program was a huge success, which helped Trader Joe's stay competitive in wine retailing for eight years until the alcohol fair trade laws were abolished in 1978.\nCoulombe credited", "-22.99431683702278" ], [ "is sold in returnable bottles, the deposit for which can be almost the price of the beer itself. but certain brands, such as Corona and Victoria, are available in large bottles of 925 or 940ml. The slang term for these is caguamas (sea turtles) or in some parts, like Mazatlán, ballenas (whales), but usually referring to the Pacifico brand. This type of bottle was first introduced in Mexico in 1960 along with the six-pack, often referred to in Mexico as a \"six\". Very little beer in Mexico is served on tap.\nIn Mexico, beer is commonly served with lime juice.\nA beer", "-22.932811694932752" ], [ "Jack's and White Ace, as well as other cheap alcoholic drinks such as Skol Super and supermarket branded beers like Tesco Super and Asda Super.\nIt is available in 2-litre bottles and in 500 ml cans.", "-22.928353019582573" ], [ "people preferring one brand even limiting themselves to drink beer from the other as some kind for honor, though Polar beers are more popular than Regional beers and with the Zulia beer entering the market again with some success. Beer consumption per capita in Venezuela, is the highest in Latin America with 90 liters in 2007; and 95,45 liters in 2009.", "-22.90306547435614" ], [ "(e.g. Old Swan Brewery and Hop Back Brewery).\nWest Country White Beer, a spontaneously fermented wheat beer.\nWobble was historically a low-strength ale that was provided on site to workers in particularly heavy and thirst-inducing occupations, such as foundries. However, modern-day beers called Wobble tend to be strong. Lager Lager is the term generally used in England for bottom-fermented beer.\nDespite the traditional English beer being ale, more than half of the current English market is now lager in the Pilsener and Export styles. These lighter coloured, bottom fermented beers first started gaining real popularity in England in the later part of the", "-22.896060695755295" ], [ "produced Oranjeboom pils and other lagers, and also Trio Stout. Oranjeboom Breweries were also the manufacturers of the popular Dutch Gold beer, which is one of the best selling lager beers in retail around the Republic of Ireland.\nThe main beer produced under the brand name is Oranjeboom Premium Pilsner - a 5% ABV lager. There is also an Extra Strong 8.5% ABV version, a Super Strong 12.0% ABV version as well as lower strength and alcohol-free versions and a bokbeer sold under the brand name.", "-22.879803929870832" ], [ "punishable by a fine of up to $500 and up to 6 months imprisonment.\nLicensed vendors may not advertise happy hours, serve more than two beverages at a time to a customer, give a discount to a person or group of persons, or permit the play of games that involve drinking.\nAs of June 2018, all 77 counties allow liquor by the drink. The last 14 counties that only allowed private bottle clubs as well as beer taverns and restaurants permitted to sell only low-point beer (3.2% alcohol by weight) voted to go wet prior to new laws that went into", "-22.859927882818738" ], [ "alcohol content was increased from 4.3% to 4.8%, and the name changed from \"Milwaukee's Best Premium\" to \"Milwaukee's Best Lager.\" The name was eventually changed back to \"Milwaukee's Best Premium.\" Milwaukee's Best Ice In the fall of 2016, the alcohol content was increased from 5.9% to 6.9%. In August 2017, it was reduced back to 5.9%. Advertising In 2006, MillerCoors ran a series of ads depicting men who were perceived as being unmanly, and are subsequently crushed by a giant can of Milwaukee's Best Light falling from the sky, followed by the slogan \"Men should act like men, and light", "-22.845778292481555" ], [ "beer (tafelbier, bière de table) is a low-alcohol (typically not over 1.5%) brew sold in large bottles to be enjoyed with meals. The last decade it has gradually lost popularity due to the growing consumption of soft drinks and bottled water. It comes in blonde or brown versions. Table beer used to be served in school refectories until the 1980s; in the early 21st century, several organizations made proposals to reinstate this custom as the table beer is considered more healthy than soft drinks. Some bars serve a glass of draft lager with a small amount of table beer added,", "-22.84389578337141" ], [ "other drinks as it is considered a fine beverage on its own, but some people have been known to drink beton (literally translated as concrete), which is a shot-glass of low quality šljivovica dropped into a glass of beer.\nDue to prevailing consumerism, rakija had the image of a low-class category of drinks, not comparable to foreign imports, such as whiskey or rum. A recent upsurge due to purging of the poor producers and standardisation reintroduced rakija as a connoisseur's drink. Slovakia The common term referring to moonshine in Slovakia is domáce, meaning \"made at home\"; or pálenô / pálenka", "-22.839874842960853" ], [ "to counter the popularity of homebrew. Declining consumption has also led to the introduction of mass-market non-alcoholic beverages, dubbed as \"near beer\".\nAt the start of the 21st century, alcohol-free beer has seen a rise in popularity in the Middle East (which now makes up a third of the market). One reason for this is that Islamic scholars issued fatawa which permitted the consumption of beer as long as large quantities could be consumed without getting drunk. Pros and cons Positive features of non-alcoholic brews include the ability to drive after consuming several drinks, the reduction in alcohol-related illness, and less", "-22.8300100210472" ], [ "previous release, the gift packs contained 6 bottles of Westvleteren 12 and 2 decorated glasses. Distributed to selected locations across 22 states, they retailed at the regulated price of $84.99.\nA six pack (at CAD$76.85) was sold out on December 12, 2012, at various LCBO locations in Ontario. International reputation Many beer drinkers rank Westvleteren 12 among their favourite beers. The 8 and the Blonde also rank highly on beer-rating websites.\nIn June 2005, when Westvleteren 12 was again highlighted as \"Best Beer in the World\", news organizations followed this up and articles appeared in the international press, highlighting the beer ranking", "-22.81301394017646" ], [ "admitted he was sad to see it go: \"This is our pride and joy,\" he said, \"but the barrel tasting needs to go home\". The move was in part because of the event's popularity; so many people sought places each year that the restaurant was having to refuse tickets to some of its regular customers. The venue used in 1986, San Francisco's Stanford Court Hotel, could accommodate twice as many guests. \"Woody Allen may think that going West and dying are the same thing,\" Asher explained, \"but we're going to prove him wrong.\" The first barrel tasting in San Francisco", "-22.806869271211326" ], [ "an alcohol content greater than 7%. Six of the thirteen beers made by Great Divide in 2006 exceeded this threshold, and one, Old Ruffian, has over 10.2% alcohol content, which is twice that of America's top selling beer Budweiser. “I also think that brewers like to sell the beer that they like to drink.\" Dunn said, \"And as people who can and do drink beer all day long, it’s obviously more interesting for us to drink big beers that are long on flavor and complexity.”\nIn 1997, Great Divide beer was used in the NBC miniseries Asteroid.. In 2000, Denver", "-22.79307154752314" ], [ "in sales early in its resurgence(late 2011/early 2012) can be attributed to a grass roots effort by Beer Can Alley, a Des Moines, Iowa Country bar. Several national country music acts would perform at the establishment during this time and inspired multiple references in many popular songs In 2013, it became one of the top ten most popular liquors, displacing Jose Cuervo tequila. In 2016, Bloomberg reported that with estimated sales of at least $150 million in 2015, the brand had overtaken Jägermeister in popularity to become the top-selling liqueur in the United States.\nThe brand's label was", "-22.783831609027402" ], [ "of 2013. Year over year, sales increased every month in the first four months of 2014.\nThe Opel Adam is not sold in Denmark, Norway, Sweden, Turkey, Chile as well as in CIS countries. Singapore is one of the few markets outside Europe which sells the Opel Adam. Adam by Bitter Bitter has been producing a luxury version of the Adam since 2014 as the Opel Adam by Bitter. The differences between the Bitter and Opel versions are mainly cosmetic.", "-22.783199616940692" ], [ "in the 1980s.\nAs a result of the Thai government crackdown, restricted supply has had an effect on prices, further curtailing the popular use of ya ba. In 1999–2000, when buying a straw-full (around 20 pills) in Chiang Rai Province, north Thailand, ya ba was sold for around 10 baht per pill and commonly used on the go-go circuit and by young \"MTV\" clubbers. Retail prices have risen from 100–150 baht (US$3–4) to 250–450 baht per pill as a result of the crackdown, though it remains a popular party drug.\nIn 2000, ya ba was smuggled across the porous border with Myanmar", "-22.779016081593" ], [ "to take away the fizziness and act as a sweetener, in Limburg it is referred to as a \"half om\". Glassware Belgian \"special\" beers (stronger or bottled beers) are often served in elaborate branded beer glassware. Unless the bar is out of the specific glass that goes with that beer it is more often than not served in its own glass. Most bartenders or waitresses will apologize if the beer comes in a different glass.\nOne of the more common types is the tulip glass.\nA tulip glass not only helps trap the aroma, but also aids in maintaining large heads, creating", "-22.76129494368797" ], [ "approximately $2.14 per bottle compared to $0.14 per bottle of wine and $0.05 per can of beer. There is also a concern for the health of consumers thereof and the safety risk behind homemade brewing due to the apparatus involved. In some States a person can still purchase a legal version of witblits or moonshine from commercial distillers. Total volume produced cannot exceed a fixed amount per year as detailed in local South African laws. Side effects Intoxication, flushed skin, impairment of balance, loss of muscle control, feeling of euphoria, decreased social inhibition, impaired decision making, blindness, neurological damage, paralysis", "-22.746924431652587" ], [ "popularity, which also included winning a Michelin Guide \"Bib Gourmand\" award, was described by some critics as having negatively impacted the experience, with tables very hard to book and prices increasing from the bargain levels that had contributed to the initial success – in 2010 it was described by The Observer as \"not cheap, but worth every penny.\" The restaurant went on to win the \"Best Wine List\" award in Tatler magazine's 2013 restaurant awards. Site and layout Cleevely had purchased the freehold on the small site for about two and a half million pounds, taking the view that if", "-22.744501726509043" ], [ "nationally was sold in bottled form, although the figure was 60 per cent in the South of England, falling to 20 per cent in the North of England. Pale ale had replaced mild as the beer of choice for the majority of drinkers.\nHome brewing without a licence was legalised in 1963, and was to become a fairly popular hobby, with homebrewing equipment shops on many high streets. Lager rapidly rose in popularity from the 1970s, increasing from only 2% of the market in 1965 to 20% in 1975., with English brewers producing their own brands or brewing under licence. Canned", "-22.722860187262995" ], [ "Lager, Citrus Box, Ob-La-Di, What’s on Stage, Nirav, Elder Betty and Single Chair. It also produces up to four seasonal beers, seasonal variety packs and several limited release products.", "-22.722294533916283" ], [ "for authenticity in terms of what people eat and drink; a rebellion against artificial ingredients… Craft beer fits right into it because craft beer speaks of traditional values and for real beer. Craft beer is taking off now because people want bigger, more flavorful beers. They’re tired of drinking the same old generic lager, lager, lager that their fathers and their grandfathers used to drink.” Beer Gilroy beers are brewed using a combination of three types of malted barley; pale malt for the base, and crystal and black malts for colour and flavour. The beers are naturally carbonated and contain", "-22.71511941584322" ], [ "the overlapping grip for a beer can, and, more importantly, a man who has conquered the two hardest things in life—how to putt better than anyone ever, and how to live lavishly without an income\". Low once stated: “I had been a test pilot for Foot Joys forever. I test their $65 alligator models to see if standing in them for long periods of time in a bar brings any serious harm [and] what effect spilling beer has on them”.\nLow's idol wasn't a golfer, it was the jockey Willie Shoemaker. Low told golf writer Jim Murray, \"putting a", "-22.706934974441538" ], [ "changed its name to Lucky Breweries, Inc. in 1969. As the national brands moved into California in the early 1960s, Lucky Lager’s sales began to falter. In an effort to increase sales with younger drinkers, this led to the ill-fated introduction of King Snedley's Beer, an alternate brand in addition to Lucky. According to some accounts, King Snedley's was just Lucky Lager repackaged with a different brand and marketed toward counterculture consumers. The new brand flopped and was withdrawn from the market, though it would reappear briefly in 1975. As sales continued to decline, the Salt Lake City brewery", "-22.70661452645436" ], [ "Canada's best-selling beer until 1979 when, with the increasing popularity of lagers, it was surpassed by Labatt Blue. Labatt 50 is fermented using a special ale yeast, in use at Labatt since 1933.\nLabatt Blue is a 5% abv pale lager. There are 11.53 US fluid ounces (341 ml) of beer in a bottle of Labatt Blue. There are 355 mL of beer in a standard can of Labatt Blue/Bleue in Canada with other volumes available in specific regions of the country.\nBlue, the company's flagship brand, has entered a number of international beer ratings competitions and has always performed notably well. In", "-22.701748463645345" ], [ "bottles. In 1997, Corona Extra became the top-selling imported beer in the United States, surpassing Heineken.\nCorona Extra is available in a variety of bottled presentations, ranging from the 250 ml (8.5 U.S. fl oz; 8.8 imp fl oz) ampolleta (labeled Coronita and just referred as the cuartito) up to the 940 ml (31.8 U.S. fl oz; 33.1 imp fl oz) Corona Familiar (known as the Familiar or Litro). Corona Mega is now available in a 1.2 liter bottle. A draught version also exists, as does canned Corona in some markets.\nUnlike many beers, Corona is bottled in a clear bottle, increasing the opportunity for spoilage. Exposure to sunlight or light from fluorescent bulbs such as", "-22.69994418175429" ], [ "receive may be completely devoid of alcohol. To cater to a wide range of customers, even bars or breweries that make their own in-house beers and ciders may still offer the non-alcoholic version; one should not assume they are ordering the alcoholic version.\nSweet cider typically is the direct result of pressed apples; according to the regulations of the Commonwealth of Pennsylvania, apple cider is legally defined as an \"amber golden, opaque, unfermented, entirely nonalcoholic juice squeezed from apples\". This is distinct from apple juice, which has a much sweeter taste, is typically heavily filtered, and may or may not", "-22.69539999042172" ], [ "of the \"Southern Man\" series of advertisements has led to Speight's undergoing something of a boom and it can now again be found throughout the country.\nThe Speight's brewery also makes Speight's Old Dark, and the Speight's Craft Range of beer, including Speight's Distinction Ale, Speight's Summit, and Speight's Triple Hop Pilsner, all of which are lagers of varying colour. Speight's also makes a cider.\nIn 2008 Speight's Summit, a lager brewed with all natural ingredients, was introduced. Then in 2009, Speight's Traverse, a low-carb beer, was released on to the market. Marketing Amongst many marketing angles, the 'Southern man' campaign has", "-22.65820814901963" ], [ "United States Congress quintupled the excise tax on wine, most producers of wine coolers dropped wine from the mix, substituting it with cheaper malt liquor. These malt-based coolers, while sometimes referred to as \"wine coolers\", are in a different category of beverage—sometimes called \"malt beverage\", \"malternative\", or just \"cooler\". Bartles & Jaymes refers to its malt beverage as a \"flavored malt cooler\".\nIn Germany, wine coolers became popular in 2004, when the German government imposed an extra duty on alcopops (pre-mixed spirits) of 0.80 to 0.90 euro per bottle, effective 1 August 2004. To circumvent higher taxation, some German producers have", "-22.657873682997888" ], [ "from 200,000 to 850,000 barrels a year between 1989 and 1995. By 1993 the cask version was outsold only by Tetley and John Smith's, and the majority of sales were outside of the North West. By 1994 it was the fourth-highest selling bitter brand in the country. The canned variant was distributed nationwide from 1990 and was the highest-selling canned bitter in the UK from 1992 until 2000. The beer was officially exported overseas from 1993, initially to Canada. The rise in sales of the beer coincided with the elevation of Manchester from \"city of dark, beaten mills to the", "-22.65080441419559" ], [ "beers became widely available in grocery stores, and that the Rare Beer Club was “the one club still worth its dues.” The Berghoff blog voted it one of the three best mail-order beer clubs in the United States. According to the American Craft Beer website, “There are lots of decent beer clubs out there – but few as good as The Rare Beer Club.”", "-22.644221275870223" ], [ "a dimpled glass tankard (known as a jug), and may be drunk with snack food (e.g. crisps, dry roasted or salted peanuts, and pork scratchings) or a meal However, the number of pubs fell by around a third between the early 1970s and 2017 and since 2014 more beer has been sold in bottles by supermarkets and off licences (off-trade) than in pubs (on-trade). Marston's Brewery and Greene King are the two largest brewers of premium cask and bottled beers, having grown by acquisition. Shepherd Neame Brewery is the largest family-owned brewery.\nGin has been popular in England since the late", "-22.643381830006547" ], [ "drink prices by increments of about 10 cents every few minutes depending on their popularity. Popular drinks become more expensive, while unpopular drinks become cheaper.", "-22.637367254868877" ] ]
4nktw9
What was the difference between the socialism of Nazi Germany and the socialism of the Soviet Union?
[ "Despite the name of \"national socialism\" the Nazis were not actually socialist and very far from anything that could be considered socialist ideology. The Soviet union at least was in the same general ball park. They were communist with a Marxist–Leninist ideology. An extreme and specialized outgrowth of the general socialist ideology but socialism none the less. There are some conspiracy theories popular in places like the United states of America that would make you think that the Nazis were leftist or part of some communist, Jewish or homosexual conspiracy when they were very much the opposite of that and doing their best to persecute and kill everyone who actually was. The Nazis were far right and the Soviets were far left. Due to the nature of the political spectrum the two extreme points actually did have some things in common. Many of the things they had did have in common were however less outgrowth of their respective ideologies but rather a result of them both being undemocratic and not tolerating dissent as well as accumulating as much power as possibly at the top and removing possible competitors. Nazism was all about race and with some great mythology build around the concept how the Aryan race was destined to throw of the shackles of the lesser race and eventually rule. Communism had a completely different ideology that was less centered around race and more around the fact that their political ideology was destined to eventually overcome all others. Both were willing to bend and twist their ideologies to suit their needs, even to the point of briefly allying with each other despite being on the face of it natural enemies.", "Despite the similar-sounding names, the ideologies of National Socialism (as practiced by the Nazi Party) and Socialism (as envisaged by Karl Marx) are complete opposites. Marx described his socialism as using the unity of the working class to bring about an end to capitalism. One of Marxism's most well-known phrases is \"working people of the world, unite\". Fascism (of which National Socialism is a variation) is a doctrine which deliberately fosters enmities amongst the working class to bolster up a form of state capitalism. The Nazis were more than happy to turn sections of the working class against each other (by telling Germans that Jews, homosexuals, socialists, etc, were their enemies). The idea of a united working class, as perceived by Marx, stood in complete opposition to what Hitler wanted to achieve.", "Hitler even said himself that Germany wasn't socialist. They just said it was to win the worker vote because the USSR popularized socialism. The USSR actually was socialist, of the Marxist-Leninist variety. Their state was controlled by class conscious workers and their means of production were controlled by the working class through this effect." ]
[ [ "Friedrich and Brzezinski, the most important difference between Nazi and Stalinist ideology lies in the degree of universality involved. Stalinism, and communist ideology in general, is universal in its appeal and addresses itself to all the \"workers of the world.\" Nazism, on the other hand, and fascist ideology in general, can only address itself to one particular race or nation – the \"master race\" that is destined to dominate all others. Therefore, \"in communism social justice appears to be the ultimate value, unless it be the classless society that is its essential condition; in fascism, the highest value is dominion,", "-31.491629763273522" ], [ "Republic) were formed to replace the parties of the pre-Nazi period, whereas the Social Democratic Party of Germany and Communist Party of Germany merged to form the Socialist Unity Party of Germany. These parties were the Christian Democratic Union (CDU), Liberal Democratic Party of Germany (LDPD), and later the National Democratic Party of Germany (NDPD) and Democratic Farmers' Party of Germany (DBD).\nAs the Communists consolidated their power, the bloc parties all jettisoned their original programs. All of them nominally embraced \"socialism\", becoming loyal partners of the SED. With few exceptions, they voted unanimously for all government proposals. One", "-31.03266094584251" ], [ "racial struggle, rather than the class struggle at the center of Marxist ideology. While Nazi ideology opposed both the communism of the Soviet Union and capitalism, associating Jews with both systems, the German Reich moved toward a command economy closer to the Soviet system under Hitler, which comported with the anti-capitalism of both Stalin and Hitler. Nazi criticism of capitalism shared similarities with that of Marxists in that they both focused upon excessive financial concentration, declining exports, shrinking markets and overproduction. Hitler later boasted that the best means to beat inflation \"was to be sought for in our", "-30.72209810995264" ], [ "summer, the German Communist Party had been replaced by the Socialist Unity Party (SED / Sozialistische Einheitspartei Deutschlands), through a contentious merger that within the Soviet occupation zone incorporated the more moderately left-wing Social Democratic Party (SPD) to form a unified party of the broad left, thereby reducing the risk that a resurgent Nazi Party might one day rise again and again exploit political splintering of the political left to re-establish a right-wing dictatorship. As matters turned out, the party merger involving the SPD and the Communists formed the basis for a rapid return to one-party dictatorship, and by the", "-30.603106138762087" ], [ "Economic System of Socialism The Economic System of Socialism (ESS) was an economic policy implemented in East Germany between 1968 and 1970, which was introduced and led by the country's autocratic leader, Walter Ulbricht. It focused on high technology sectors in an attempt to make self-sufficient growth possible. Overall, centralized planning was reintroduced in the so-called structure-determining areas, which included electronics, chemicals, and plastics. Industrial combines were formed to vertically integrate industries involved in the manufacture of vital final products. Price subsidies were restored to accelerate growth in favored sectors.\nThe annual plan for 1968 set production quotas in the structure-determining", "-30.176242839428596" ], [ "in German life had nothing to do with national socialism and it was democracy of the masses rather than aristocratic conservatism that caused the Nazi movement. After World War II, Ritter wrote the book Europa und die deutsche Frage (Europe and the German Question), which denied that the Third Reich was the inevitable product of German history, but was rather in Ritter's view part of a general Europe-wide drift towards totalitarianism that had been going on since the French Revolution, and as such, Germans should not be singled out for criticism.\nIn Ritter's opinion, the origins of National Socialism went back", "-30.091451323023648" ], [ "the democratic Weimar Republic into the Nazi regime. National Socialism and Holocaust denial German protections for freedom of ideas and expression are superseded by various provisions against \"anti-constitutional\" politics, which usually (but not exclusively) refers to Neo-Nazism. National Socialist parties National Socialism is banned outright in Germany as anti-constitutional; it is illegal to found or belong to a Nazi party. Any party considered to be National Socialist can be banned by the Bundesverfassungsgericht, Germany's highest court. Likewise, publications in support of such groups are automatically placed on the Index, and some may be banned altogether.\nMaterials which express sympathy with National", "-30.009167164898827" ], [ "The System (Nazism) \"The System\" (German: Das System) was a derogatory term used by the Nazis to denote contemptuously the Weimar Republic, whose official name was German Reich (Deutsches Reich), and its institutions. In Nazi publications and propaganda, the word was used in a number of compounds: for example, the period from the German Revolution of 1918–1919 to the Nazi seizure of power (German: Machtergreifung) in 1933 was called \"The time of the System\" (German: Systemzeit) and political opponents of the Nazis from this period were called \"System parties\", \"System politicians\" or the \"System press\". After the Nazi takeover, the", "-29.95308618998388" ], [ "with the centre-left Social Democratic Party of Germany was intended to avoid the mistakes of 1932 when divisions between the two principal left wing parties were widely believed to have opened the way for Nazi dictatorship. In the event the new merged party, the Socialist Unity Party (Sozialistische Einheitspartei Deutschlands / SED), would have emerged by 1949 as the ruling party in a new one-party dictatorship. Edith Baumann was a top level party functionary from the outset. In 1946 she became a member both of the SED Party Executive (\"Parteivorstand\") and of its Central Committee. German Democratic Republic In October", "-29.61104854795849" ], [ "the Socialist Unity Party of Germany (SED / Sozialistische Einheitspartei Deutschlands). The creation of the party came about through a contentious merger in the area under Soviet Administration of the old Communist Party and the more moderately left-wing Social Democratic Party. The merger was in theory one of equals, but by the time the German Democratic Republic was formally founded in 1949 the positions of party influence and leadership were almost all held by men who, like Koenen, had been members of the Communist Party until 1946. Herbert Krolikowski joined what was by now the new country's ruling SED (party)", "-29.587555731879547" ], [ "After being opponents for most of the 1930s, the Soviet Union and Nazi Germany signed the Molotov-Ribbentrop Pact in 1939 and remained aligned for the first two years of World War II, until Hitler broke it by invading the USSR in 1941.\nMarxist theories of fascism have seen fascism as a form of reaction to socialism and a feature of capitalism. In addition, several modern historians have tried to pay more attention to the economic, political and ideological differences between these two regimes than to their similarities. Although Michael Geyer and Sheila Fitzpatrick in Beyond Totalitarianism: Stalinism and Nazism Compared (2009)", "-29.55930856446321" ], [ "goal of fascist nations was to create a closed economic system, self-reliant, but also ready to make war and expand. Fascist economies can then be seen as a sort of capitalist economy, with little state intervention usually in the form of business subsidies. Socialism Socialism is any of the various ideologies of economic organization based on some form of social ownership of the means of production and cooperative management of the allocation of resources. Socialist systems can be distinguished by the dominant coordination mechanism employed (economic planning or markets) and by the type of ownership employed (Public ownership or cooperatives).\nIn", "-29.55591893295059" ], [ "then that logically implies, that any other socialisms are denied. Yet, when it is acknowledged that there exists a diversity of socialisms, then there is the challenge of uniting those socialisms and finding something in common. If, for example, there are Marxists in East Germany who think that East Germany used to be socialist, and there are other East German Marxists who think that East Germany has always been (state-)capitalist, then it is difficult for them to unite, because they have very different concepts of capitalism and socialism, rooted in very different interpretations of Marx's theory. Ecology The ecological Marxist", "-29.542233754124027" ], [ "have also made comparisons between Nazism and Stalinism as part of their work.\nStanley Payne, in his work on fascism, said that although the Nazi Party was ideologically opposed to communism, Adolf Hitler and other Nazi leaders frequently expressed recognition that only in Soviet Russia were their revolutionary and ideological counterparts to be found. Both placed a major emphasis on creating a \"party-army,\" with the regular armed forces controlled by the party. In the case of the Soviet Union this was done through the political commissars, while Nazi Germany introduced a roughly equivalent leadership role for \"National Socialist Guidance Officers\" in", "-29.474760149038048" ], [ "the former aimed to only socialise production while the latter aimed to socialise both production and consumption (in the form of free access to final goods). However, Marxists employed the term \"socialism\" in place of \"communism\" by 1888, which had come to be considered an old-fashion synonym for socialism. It was not until 1917 after the Bolshevik Revolution that \"socialism\" came to refer to a distinct stage between capitalism and communism, introduced by Vladimir Lenin as a means to defend the Bolshevik seizure of power against traditional Marxist criticisms that Russia's productive forces were not sufficiently developed for socialist revolution.\nA", "-29.209657135375892" ], [ "Germany (Sozialistische Einheitspartei Deutschlands / SED), formed through a contentious merger of the old German Communist Party and (many of the elements of) the more moderately left-wing Social Democratic Party. During the next few years the authorities sought to move towards a new one-party dictatorship, not by banning the other political parties but by controlling them. This was achieved by placing them all into an umbrella organisation known as the National Front and itself controlled by the SED (party). In the end it was only in the Soviet occupation zone (reinvented, formally in October", "-29.172706286917673" ], [ "KPD (Communist Party). However, this part of Germany was occupied by the Soviet military in 1945 and the Soviet Union took a hands-on approach to reconfiguring the political landscape. The Soviets favoured a one-party political structure. The SPD, along with the KPD (German Communist Party/Kommunistische Partei Deutschlands) were forcibly merged into the SED (Socialist Unity Party of Germany/Sozialistische Einheitspartei Deutschlands), of which Walter Buchheim now became a committed member.\nIn 1949 he attended the DASR (an Administration Academy for political high flyers subsequently renamed after Walter Ulbricht), in Forst Zinna, after which promotion beckoned. He was appointed to the senior", "-29.140760075417347" ], [ "of Germany (KPD) was the largest Communist Party in the world outside of the Soviet Union, until it was destroyed by the Nazis in 1933. In the 1920s and early 30s, Communists and Nazis often fought each other directly in street violence, with the Nazi paramilitary organizations being opposed by the Communist Red Front and Anti-Fascist Action. After the beginning of the Great Depression, both Communists and Nazis saw their share of the vote increase. While the Nazis were willing to form alliances with other parties of the right, the Communists refused to form an alliance with the Social Democratic", "-29.08282515060273" ], [ "Merger of the KPD and SPD into the Socialist Unity Party of Germany Background Among circles of the workers' parties KPD and SPD there were different interpretations of the reasons for the rise of the Nazis and their electoral success. A portion of the Social Democrats blamed the devastating role of Communists in the final phase of the Weimar Republic. The Communist Party, in turn, insulted the Social Democrats as \"social fascists\" (\"Sozialfaschisten\"). Others believed that the splitting of the labour movement into the SPD and KPD prevented them effectively opposing the power of the Nazis, made possible by the", "-29.073080996982753" ], [ "Socialist Left (Germany) The Socialist Left (German: Sozialistische Linke, SL) is a political caucus in the Left Party of Germany. It includes political viewpoints ranging from left Keynesianism and left social democracy to reform communism and Marxism. SL members share a common goal of orienting the Left Party firmly toward the labor movement.\nSocialist Left was founded on 19 August 2006 in Wuppertal at a meeting of 50 delegates. Most of its members were initially members of the Labor and Social Justice Alternative, and its membership was centered in West Germany. Following the merger of the WASG with the Party of", "-29.016139332728926" ], [ "the \"western democracies\" they insinuate that their \"democracy\" is not genuine. National Socialism envisages abolishing the difference in wealth, education, intellect, taste, philosophy, and habits by a leveling process which necessitates in turn a total control over the child and the adolescent. Every personal attitude will be branded—after communist pattern—as \"bourgeois,\" and this in spite of the fact that the bourgeois is the representative of the most herdist class in the world, and that National Socialism is a basically bourgeois movement.\nHitler in Mein Kampf repeatedly speaks of the \"masses\" and the \"herd\" referring to the people. The German people should", "-29.013607038359623" ], [ "Socialist Unity Party of Germany Early history The SED was founded on 21 April 1946 by a merger of the Social Democratic Party of Germany (SPD) and the Communist Party of Germany (KPD) which was based in the Soviet occupation zone of Germany and the Soviet-occupied sector of Berlin. Official East German and Soviet histories portrayed this merger as a voluntary pooling of efforts by the socialist parties. However, there is much evidence that the merger was more troubled than commonly portrayed. By all accounts, the Soviet occupation authorities applied great pressure on the SPD's eastern branch to merge with", "-28.958163500894443" ], [ "noted similarities between Stalinism and Nazism, they have also stated that \"when it comes to one-on-one comparison, the two societies and regimes may as well have hailed from different worlds\". By contrast, David Ramsay Steele posits that \"there is a close ideological relationship between Marxism and Fascism\". When Nazi Germany aligned itself with Communist Russia in 1939, British journalist John Gunther happened to be working in Moscow. He wrote in his 1940 book Inside Europe that \"certain shrewd observers had seen which way the wind was blowing. They had seen that Communism and Fascism were more closely allied than was", "-28.954205268870282" ], [ "National Party (\"Deutsche Staatspartei\"/ DStP) and the National People's Party (\"Deutschnationale Volkspartei\" / DNVP). On a national level, in January 1933 the political backdrop was transformed when the Nazi Party took power and converted Germany into a one-party dictatorship. Political activity - except in support of the Nazi Party - became illegal. At the end of February 1933 the Reichstag fire was instantly blamed on the Communists, and in March 1933. By this time persecution and arrests of Communist parliamentarians had already started, and following reconfiguration, at the Bürgerschaft session of 8", "-28.806568832340417" ], [ "to be an economic system structured upon production for use and social ownership in place of the profit system and private ownership.\nDemocratic socialists, especially contemporary proponents of market socialism, have argued that—rather than socialism itself—the major reason for the economic shortcomings of Soviet-type economies was their failure to create rules and operational criteria for the efficient operation of state enterprises in their administrative, command allocation of resources and commodities and the lack of democracy in the political systems that the Soviet-type economies were combined with. As a result, their form of socialism explciity rejects authoritarian allocation in favor of democracy.", "-28.78451398864854" ], [ "\"National Socialists\" and their movement as \"National Socialism,\" but never as \"Nazis.\" Position within the political spectrum The majority of scholars identify Nazism in both theory and practice as a form of far-right politics. Far-right themes in Nazism include the argument that superior people have a right to dominate other people and purge society of supposed inferior elements. Adolf Hitler and other proponents denied that Nazism was either left-wing or right-wing, instead they officially portrayed Nazism as a syncretic movement. In Mein Kampf, Hitler directly attacked both left-wing and right-wing politics in Germany, saying:\nToday our left-wing politicians in particular are", "-28.71041335107293" ], [ "Socialist Unity Party (\"Sozialistische Einheitspartei Deutschlands\" / SED), a new political party formed in the Soviet zone during April 1946, through a contentious political merger. The creation of the SED was presented as a way to prevent a repeat victory of right-wing populism by ensuring that the political left was unified. However, by the time the region was rebranded and relaunched, in October 1949, as the German Democratic Republic (East Germany) the SED was itself coming to be recognised as the ruling party in a new kind of one-party dictatorship. During 1949 Arno Donda", "-28.655297969526146" ], [ "Stalinism or Nazism inevitable, but rather that they help to explain why the Stalinist and Nazi regimes developed similar features. Similarities and differences of the systems Ian Kershaw admitted that Stalinism and Nazism are comparable in \"the nature and extent of their inhumanity,\" but noted that the two regimes were different in a number of aspects Lewin and Kershaw question the usefulness of grouping the Stalinist and Nazi regimes together under a \"totalitarian\" category, saying that it remains an open question whether the similarities between them are greater or smaller than the differences. In particular, they criticize what they", "-28.57468000720837" ], [ "socialism were purged from the SED. The middle-class CDU and LDPD were weakened by the creation of two new parties, the National Democratic Party of Germany (Nationaldemokratische Partei Deutschlands—NDPD) and the Democratic Peasants' Party of Germany (Demokratische Bauernpartei Deutschlands—DBD). The SED accorded political representation to mass organizations and, most significant, to the party-controlled Free German Trade Union Federation (Freier Deutscher Gewerkschaftsbund—FDGB).\nIncidentally, the party system was designed to allow reentry of only those former NSDAP adherents who had earlier decided to join the National Front, which was originally formed by emigrants and prisoners of war in the Soviet Union during", "-28.569438272417756" ], [ "Socialism, and he worked the word into the name of his National Socialist party. The whole world knows what sort of Socialism Hitler had in mind\".\nMainstream socialists have typically rejected and opposed fascism in turn. However, fascism and communism have common positions in their opposition to liberalism, capitalism, individualism and parliamentarism. Fascists and communists also agree on the need for violent revolution to forge a new era. While fascism is opposed to Bolshevism, both Bolshevism and fascism promote the one-party state and the use of political party militias.\nFascism denounces democratic socialism as a failure. Fascists oppose it for its support", "-28.55843402078608" ], [ "the Soviet sponsored German Democratic Republic / (\"East Germany\")).\nIn April 1946, one month after their arrival in the Soviet zone, a new political party, the Socialist Unity Party (\"Sozialistische Einheitspartei Deutschlands\" / SED), was launched under contentious circumstances. There was a widespread belief that the Nazi Party had been able to come to power only because of divisions on the political left, and the new party was presented as a way to prevent a recurrence of that. By 1949 the SED would itself have evolved, within the zone under Soviet administration, to become the ruling party", "-28.528603317201487" ], [ "that \"red equals brown\", i.e. that the communists and Nazis posed an equal danger to liberal democracy. In 1930, Kurt Schumacher said that the two movements enabled each other. He argued that the Communist Party of Germany, which was staunchly Stalinist, were \"red-painted Nazis.\" This comparison was mirrored by the social fascism theory advanced by the Soviet government and the Comintern (including the Communist Party of Germany), which accused social democracy of enabling fascism and went as far as to call social democrats \"social fascists.\" After the 1939 Molotov–Ribbentrop Pact was announced, The New York Times published an editorial arguing", "-28.524908141582273" ], [ "Karl Dietrich Bracher 1960s In Bracher's opinion, through it was human choices that led to the collapse of the Weimar Republic and the National Socialist period, the roots of National Socialism can be traced back towards the völkisch ideology of 19th century Germany and Austria-Hungary, which found their fullest expression in the personality of Adolf Hitler. Likewise, Bracher complained that too many Germans were willing during the Weimar-Nazi time periods to subscribe to a \"readiness for acclamatory agreement and pseudo-military obedience to a strong authoritarian state\". Through Bracher was opposed to the Sonderweg interpretation of German history, he did believe", "-28.521077269339003" ], [ "the BdL's influence on German politics continued throughout the Second World War. However, the organization ceased to exist as a formality, having been reorganized as the Reichsnährstand by the Nazis in 1933. Agrarian Conservatism Under the Third Reich Early associations between Nazism and conservatism were amicable – agricultural and military opposition to the German Revolution of 1918-1919 suggest sympathy for National Socialism. Furthermore, the assistance of Franz von Papen and Alfred Hugenberg irrefutably connects the legacies of conservatism and National Socialism. However, the alienating “New Order” of Hitler's Third Reich suggests that relations between conservatives and National Socialists were not", "-28.496696764103035" ], [ "renamed the Union of Soviet Socialist Republics, or Soviet Union). The government controlled every aspect of its citizens' lives, from maintaining loyalty to the Communist Party to persecuting religion. Lenin helped to establish this state but it was brought to a new level of brutality under his successor, Joseph Stalin.\nThe first totalitarian state in the West was established in Italy. Unlike the Soviet Union however, this would be a Fascist rather than a Communist state. Fascism is a less organized ideology than Communism, but generally it is characterized by a total rejection of humanism and liberal democracy, as well as", "-28.45176845084643" ], [ "Democratic Union (Christlich-Demokratische Union—CDU), and the Liberal Democratic Party of Germany (Liberal Demokratische Partei Deutschlands—LDPD), was formed in July 1945. The KPD (with 600,000 members, led by Wilhelm Pieck) and the SPD in East Germany (with 680,000 members, led by Otto Grotewohl), which was under strong pressure from the Communists, merged in April 1946 to form the Socialist Unity Party of Germany (Sozialistische Einheitspartei Deutschlands—SED) under pressure from the occupation authorities. In the October 1946 elections, the SED polled approximately 50% of the vote in each state in the Soviet zone. However, a truer picture of the SED's support was", "-28.435095477034338" ], [ "At the same time the entire region was being developed into a separate stand-alone Soviet sponsored German state, the German Democratic Republic, formally founded in October 1949. Already in April 1946, the merging of the old Communist Party and more moderately left wing Social Democratic Party into the new Socialist Unity Party had created the basis for a return to one-party government. Handke, a long-standing member of the Communist Party, now no longer illegal in Germany, like thousands of others, had lost little time in signing over his membership to the new Socialist Unity Party. German Democratic Republic", "-28.42357258242555" ], [ "Nazi Party, particularly among the members of the Sturmabteilung (SA), were committed to the party's official socialist, revolutionary and anti-capitalist positions and expected both a social and an economic revolution when the party gained power in 1933. In the period immediately before the Nazi seizure of power, there were even Social Democrats and Communists who switched sides and became known as \"Beefsteak Nazis\": brown on the outside and red inside. The leader of the SA, Ernst Röhm, pushed for a \"second revolution\" (the \"first revolution\" being the Nazis' seizure of power) that would enact socialist policies. Furthermore, Röhm desired that", "-28.405540876934538" ], [ "by the working classes themselves.\" ISO saw this as distinguishing themselves from socialists who work within the Democratic Party and from various forms of what they disparagingly term Stalinism — nominally socialist politics, usually associated with the former Soviet Bloc and the old Communist Parties. These are seen as advocating socialism \"from above\". Because capitalism is a global system, the ISO argued that capitalism could not be successfully overthrown in individual countries. They agreed with Leon Trotsky that socialism in one country is an impossibility. The ISO held that the former Soviet Union and Eastern Bloc were examples of bureaucratic,", "-28.38692424564215" ], [ "Nazism came to power – as part of an alliance with traditional conservative elites, industrialists, and the army. Unlike the USSR, Nazi Germany did not build its own state, but rather inherited the state machinery of the previous government. This provided the Nazis with an immediate supply of capable and experienced managers and military commanders, but on the other hand it also meant that the Nazi regime had to rely on the cooperation of people who had not been Nazis prior to Hitler's rise to power, and whose loyalty was questionable. It was only during the war, when Nazi Germany", "-28.34544379648287" ], [ "and socialism) as well as anti-Third Way, traditional social democrats merged into democratic socialism. Implementation Although socialism is commonly conflated with Marxism–Leninism and its various variants such as Stalinism and Maoism, there have also been several anarchist and socialist societies that followed democratic socialist principles, encompassing anti-authoritarian, democratic anti-capitalism. The most notable examples are the Paris Commune, the various soviet republics in the post-World War I period and the early Soviet Russia before the abolition of soviets, Revolutionary Catalonia as noted by George Orwell and more recently Rojava. Other examples include the kibbutz in modern-day Israel, Marinaleda in Spain, the", "-28.335120471310802" ], [ "authoritarian socialism was adopted by a diverse range of states and continued to develop well into the 20th century in the Middle East and North African regions. These regions, characterized by authoritarian traits such as uncontested party leadership, restricted civil liberties and strong unelected officials with non-democratic influence on policy, share many commonalities with the Soviet Union. Furthermore, most authoritarian socialist states were ideologically Marxist–Leninist (the state ideology of the Soviet Union that is often referred to as Communism, a specific form of communism that arose in Russia within the Bolshevik faction of the Russian Social Democratic Labour Party) or", "-28.324157832263154" ], [ "Comparison of Nazism and Stalinism A number of authors have carried out comparisons of Nazism and Stalinism in which they have considered the similarities and differences of the two ideologies and political systems, what relationship existed between the two regimes, and why both of them came to prominence at the same time. During the 20th century, the comparison of Nazism and Stalinism was made on the topics of totalitarianism, ideology, and personality cult. Both regimes were seen in contrast to the liberal West, with an emphasis on the similarities between the two. The political scientists Zbigniew Brzezinski, Hannah Arendt and", "-28.322124931335566" ], [ "January 1933 the Nazis took power and lost little time in transforming Germany into a one-party dictatorship. The party's popular support was built on the traditional populist themes of hope and hatred. The principal focus of their hatred was split between the Communists and the Jews. Ida Dehmel was no communist, but she was Jewish. On 20 April 1933 Nazi paramilitaries broke into the meeting room at the Hamburger Hof (hotel) where Dehmel was presiding over the monthly GEDOK meeting: they demanded her resignation. Three weeks later, because of", "-28.312371027946938" ], [ "so-called old and the new left arose in the Federal German Republic to build a new communist party. In addition to the German Communist Party (DKP), which is widely known as the West German KPD successor party and publishes the newspaper Unser Zeit as a party organ , various competing small communist parties , the so-called K groups , were founded, each of which was associated with different ideological concepts of communism (from Maoism to Stalinism to Trotskyism ). Out of these groupings, there were several newspaper projects in the 1970s called Rote Fahne.", "-28.299522449403412" ], [ "establishing an SED dictatorship.\" Within the Soviet occupied zone of Germany, the Social Democrats were pressured into merging with the Communists, on Communist terms, to form the Socialist Unity Party of Germany (Sozialistische Einheitspartei Deutschlands or SED), and Ulbricht played a key role in this. Rise to power After the founding of the German Democratic Republic on 7 October 1949, Ulbricht became Deputy Chairman (Stellvertreter des Vorsitzenden) of the Council of Ministers (Ministerrat der DDR) under Minister-President and Chairman Otto Grotewohl, i.e., deputy prime minister. In 1950, as the SED restructured itself into a more orthodox Soviet-style party, he became", "-28.28818115410104" ], [ "SPD by means of a Landtag referendum. German communists continued to deny any essential difference between Nazism and social democracy even after elections in 1933. Under the leadership of Ernst Thälmann, the KPD coined the slogan \"After Hitler, our turn!\" – strongly believing that united front against Nazis was not needed and that the workers would change their opinion and recognize that Nazism—unlike communism—did not offer a true way out of Germany's difficulties (see also Wilhelm Hoegner and Walter Kolbenhoff.\nAfter Adolf Hitler's Nazis came to power in Germany, the KPD was outlawed and thousands of its members were arrested, including", "-28.28613472118741" ], [ "socialism and that socialism will emerge spontaneously from the grassroots level in an evolutionary manner, developing its own unique political and economic institutions for a highly organized stateless society. Anarcho-communists likewise reject the concept of a \"Socialist state\" for being antithetical to socialism, but they believe that socialism—and thus communism—can only be established through revolution and dissolving the existence of the state.\nWithin the socialist movement, a number of criticisms are maintained towards the use of the term \"Socialist states\" in relation to countries such as China and previously of Soviet Union and Eastern and Central European states before what some", "-28.257745134455035" ], [ "Marxist–Leninist states, social democracy, Soviet-type economic planning, state interventionism and state socialism. Austrian School economists such as Friedrich Hayek and Ludwig von Mises also continually used the word socialism as a synonym for central planning and state socialism, conflating it with fascism. This is especially true in the United States, where socialism has become a pejorative used by conservatives and libertarians to taint liberal and progressive policies, proposals and public figures. 19th century Socialist models and ideas espousing common or public ownership have existed since antiquity, but the first self-conscious socialist movements developed in the 1820s and 1830s. West European", "-28.252888868984883" ], [ "between Communism and fascism. Nolte asserted that the core of National Socialism was \n\"neither in criminal tendencies nor in anti-Semitic obsessions as such. The essence of National Socialism [was to be found] in its relation to Marxism and especially to Communism in the form which this had taken on through the Bolshevik victory in the Russian Revolution\".\n \nIn Nolte's view, Nazi anti-communism was \"understandable and up to a certain point, justified\". For Nolte, the \"racial genocide\" as he calls the Holocaust was a \"punishment and preventive measure\" on the part of the Germans for the \"class genocide\" of the Bolsheviks.", "-28.225663676930708" ], [ "that \"Hitlerism is brown communism, Stalinism is red fascism.\"\nMarxist theories of fascism have seen fascism as a form of reaction to socialism and a feature of capitalism. Several modern historians have tried to pay more attention to the economic, political and ideological differences between these two regimes than to their similarities.\nThe 2008 Prague Declaration on European Conscience and Communism, initiated by the Czech government and signed by figures such as Václav Havel, called for \"a common approach regarding crimes of totalitarian regimes, inter alia Communist regimes\" and for\nreaching an all-European understanding that both the Nazi and Communist totalitarian regimes each", "-28.221327265695436" ], [ "control over the state and by extension over the political and economic spheres of society was justified as a means to safeguard the revolution against counter-revolutionary insurrection and foreign invasion. The Stalinist theory of socialism in one country was an attempt to legitimize state-directed activity in an effort to accelerate the industrialisation of the Soviet Union. Description and theory As a political ideology, state socialism is one of the major dividing lines in the broader socialist movement. It is often contrasted non-state or anti-state forms of socialism, such as those that advocate direct self-management, adhocracy and direct cooperative ownership and", "-28.21455495347618" ], [ "than a mechanism of class and political control and in the process it would cease to be a state in the traditional definition. In Marxist theory, socialism would eventually give way to a stateless communist society.\nPreceding the Bolshevik-led revolution in Russia, many socialist groups including reformists, orthodox Marxist currents such as council communism and the Mensheviks, anarchists and libertarian socialists criticised the idea of using the state to conduct central planning and nationalization of the means of production as a way to establish socialism. Political perspectives State socialism was traditionally advocated as a means for achieving public ownership of the", "-28.186701068389084" ], [ "of the private-based economy to socialism via established political processes under social reform of capitalism.\nIn retaliation, Joseph Stalin unleashed a series of attacks against Marxist reformers and Social Democrats, declaring in 1924 that \"Social democracy is objectively the moderate wing of fascism.... These organisations are not antipodes, they are twins.” In later years, Stalin, Grigory Zinoviev and the Communist International (Comintern) applied the term “social fascists” to the various independent Social Democratic parties, especially in Germany.\nEver since the 1890s, numerous periods were under a continuing crisis of Marxist theory, including the early 1930s where German Marxist theoretician Karl Korsch warned", "-28.185287686574156" ], [ "\"radical left\" alternative to Soviet ideas, had consistently claimed that the Soviet Union was no longer socialist and had betrayed the revolution. To counter this claim of Marxist revisionism, the Soviets defiantly claimed that their socialism was \"real socialism\", implying that other models of socialism were unrealistic. In the West The term \"actually existing socialism\" was often used by orthodox communists in the West to attack either their external (typically Trotskyist) opponents or their internal (typically Eurocommunist) critics. The achievement of \"actual\" socialism being used as a counter to these groups' critiques of repression inside the \"socialist countries\".", "-28.171113028608488" ], [ "by denouncing them as \"social fascists\". According to The God that Failed by Arthur Koestler, a former member of the Communist Party of Germany, the largest communist party in Western Europe in the Interwar period, communists, aligned with the Soviet Union, continued to consider the \"social fascist\" Social Democratic Party of Germany to be the real enemy in Germany even after the Nazi Party had gotten into power.\nIn modern times, some reformists are seen as centre-right. For example, the historical Reform Party of Canada advocated structural changes to government to counter what they believed was the disenfranchisement of western", "-28.171093939934508" ], [ "new type of society he termed state capitalism. For anarchists, state socialism is equivalent to state capitalism, hence oppressive and merely a shift from private capitalists to the state being the sole employer and capitalist.\nDuring World War I, using Vladimir Lenin's idea that Czarism was taking a \"Prussian path\" to capitalism, the Bolshevik Nikolai Bukharin identified a new stage in the development of capitalism in which all sectors of national production and all important social institutions had become managed by the state—he termed this new stage \"state capitalism\".\n\nAfter the October Revolution, Lenin used the term positively. In spring 1918, during", "-28.161034131218912" ], [ "on 24 February 1920, and in an effort to appeal to wider parts of the German population, the DAP was renamed the National Socialist German Workers' Party (NSDAP).\nThe 1920 National Socialist Program stated as its first point, \"We demand the unification of all Germans in the Greater Germany on the basis of the people's right to self-determination.\" Hitler argued in a 1921 essay that the German Reich had had a single task of, \"incorporating the ten million German-Austrians in the Empire and dethroning the Habsburgs, the most miserable dynasty ever ruling.\" The Nazis aimed to re-unite all Germans either born", "-28.129008892102775" ], [ "as 'socialism from below', a term which has been attributed to Hal Draper. This concept can also be traced back to the rules of the First International which stated: \"the emancipation of the working classes must be conquered by the working classes themselves.\" They see this as distinguishing themselves from other socialist groups, particularly both from reformist parties such as the Labour Party (described as a \"capitalist workers' party\") and from various forms of what they disparagingly term Stalinism—forms of socialism usually associated with the former Soviet Bloc and the old Communist Parties. These are seen as advocating socialism from", "-28.109232196991798" ], [ "closed down.\nIn January 1933 the Nazis took power and lost no time in transforming Germany into a one-party dictatorship. Although all \"political activity\" (unless by or on behalf of the Nazi Party) was banned, it was Communist Party politicians and activists on whom relevant state agencies concentrated their attention, especially after the Reichstag Fire in February 1933 and its carefully choreographed aftermath. Towards the end of 1933 the RFMB, which had operated in the shadows as a semi-legal organisation since the government ban on the Red Front Fighters in 1929, decided to further its objectives by", "-28.05693870777759" ], [ "in May 1945 was an end to twelve years of National Socialist dictatorship. The Communist Party was no longer banned. Later that year Jarowinsky joined it.\nIn April 1946 a contentious political merger took place between the Communist Party of Germany and the Social Democratic Party of Germany. The resulting merged party became known as the Socialist Unity Party of Germany (\"Sozialistische Einheitspartei Deutschlands\" / SED). It has never been entirely clear whether those behind the party merger intended that it should take effect across the whole of Germany: in reality its impact", "-28.050848796847276" ], [ "the SPD. The KPD continued to deny any essential difference between Nazism and social democracy even after the elections of 1933, and under the leadership of Ernst Thälmann, the KPD coined the slogan \"After Hitler, our turn!\" – strongly believing that a united front against Nazis was not needed, and that a Nazi dictatorship would ultimately crumble due to flawed economic policies and lead the communists to power in Germany when the people realised that the communists' economic policies were superior.\nTheodore Draper argued that \"the so-called theory of social fascism and the practice based on it constituted one of the", "-28.02735751349246" ], [ "in western capitalism was imminent, and he denounced the cooperation of international communist parties with social democratic movements, labelling them as social fascists, and insisted on a far stricter subordination of international communist parties to the Comintern, that is, to Soviet leadership. This was known as the Third Period. The policy of the Communist Party of Germany (KPD) under Ernst Thälmann was altered accordingly. The relatively independent KPD of the early 1920s almost completely subordinated itself to the Soviet Union.\nStalin's order that the German Communist party must never again vote with the Social Democrats coincided with his agreement, in December", "-27.978584340628004" ], [ "more democratic form of socialism briefly became acceptable in Hungary during Imre Nagy's government (1953–1955) and in Poland during Władysław Gomułka's government, containing ideas that the rest of the Soviet bloc and the Soviet Union itself variously considered revisionist, although neither Nagy nor Gomułka described themselves as revisionists, since to do so would have been self-deprecating.\nAfter the 1956 Secret Speech that denounced Stalin, many communist activists, astounded and disheartened by what they saw as the betrayal of Marxist–Leninist principles by the very people who had founded them, resigned from western communist parties in protest. These quitters were sometimes accused of", "-27.974564765014293" ], [ "that all men are equal.\" He believed that \"the notion of equality was a sin against nature.\" Nazism upheld the \"natural inequality of men,\" including inequality between races and also within each race. The National Socialist state aimed to advance those individuals with special talents or intelligence, so they could rule over the masses. Nazi ideology relied on elitism and the Führerprinzip (leadership principle), arguing that elite minorities should assume leadership roles over the majority, and that the elite minority should itself be organized according to a \"hierarchy of talent,\" with a single leader—the Führer—at the top. The Führerprinzip held", "-27.97413227877405" ], [ "final stage of capitalism, and \"anti-fascism\" was therefore synonymous with anti-capitalism. The KPD stated that \"fighting fascism means fighting the SPD just as much as it means fighting Hitler and the parties of Brüning.\" In 1929 the KPD's paramilitary group Roter Frontkämpferbund was banned as extremist by the governing social democrats. The Antifaschistische Aktion was formed largely as a counter-move to the social democrats' establishment of the Iron Front in 1931, which the KPD regarded as a \"social fascist terror organisation.\" The Antifaschistische Aktion was an integral part of the KPD and was mainly active as a KPD campaign during the", "-27.972022703208495" ], [ "leaders seen by anarchists as Stalinists, such as Kim Il Sung or Mao Zedong). Democratic socialism A significant current of the democratic socialist movement has defined itself in opposition to Stalinism. This includes George Orwell, H. N. Brailsford, Fenner Brockway, and the Independent Labour Party in Britain (particularly after World War II). There were also a number of anti-Stalinist socialists in France, including writers such as Simone Weil and Albert Camus as well as the group around Marceau Pivert. In America, the New York Intellectuals around the journals Partisan Review and Dissent saw Soviet Communism as a form of totalitarianism", "-27.970189813217075" ], [ "Communist Workers' Party of Germany History The roots of the KAPD lie in the left-wing split from the Social Democratic Party (SPD), calling itself the International Socialists of Germany (ISD). The ISD consisted of elements which were to the left of the Spartacus League of Rosa Luxemburg and Karl Liebknecht. The Spartacists and the ISD entered the Independent Social Democratic Party (USPD), the centrist split from SPD, in 1915 as an autonomous tendency within the party. The left-wing of the USPD, consisting of Spartacists and ultra-left council communists went on to form the Communist Party of Germany (KPD) in 1918.", "-27.959576536231907" ], [ "supervising \"social workers, corrective training, mediation assistance\" and dealing with judicial authorities to prevent juvenile delinquency. Socialism and communism Fascism is historically strongly opposed to socialism and communism, due to their support of class revolution as well as \"decadent\" values, including internationalism, egalitarianism, horizontal collectivism, materialism and cosmopolitanism. Fascists have thus commonly campaigned with anti-communist agendas. Fascism opposed the international character of mainstream socialism, but in opposing this international character, it often defined itself as a \"nationalist\" form of socialism, an alternative to the mainstream form of socialism which it regarded as its bitter enemy. Hitler at times attempted to", "-27.953636504884344" ], [ "1966. The party had a leftist period and opposed the republic's integration into Western structures, believing that this might diminish the chances for German reunification.\nThe SPD was somewhat hampered for much of the early history of the Federal Republic, in part because the bulk of its former heartland was now in the Soviet occupation sector, which later became East Germany. In the latter area, the SPD was forced to merge with the Communist Party of Germany to form the Socialist Unity Party of Germany (SED) in 1946. The few recalcitrant SPD members were quickly pushed out, leaving the SED as", "-27.94271446592029" ], [ "Volksgemeinschaft (\"people's community\", a specifically Nazi term), the inner bond between home and the front, and the participation of every level of society. The role of Nazism in bringing about this happy unity is underscored when Inge's aunt recounts how she could not marry a lover of higher social class, Inge wonders if such things are possible, and the aunt declares they were—in those days. The classes also, however unified in purpose, are still recognizable; the lower classes are simple souls, obeying orders at the front and being clowns at home, while the hero is a dignified person of high", "-27.941557243200805" ], [ "of rapprochement with West Germany. Both German states had retained the goal of future unification; however, both remained committed to their own irreconcilable political systems. In 1968, the SED recast the constitution into a fully Communist document. It declared East Germany to be a socialist state whose power derived from the working class under the leadership of \"its Marxist-Leninist party\"–thus codifying the actual state of affairs that had existed since 1949. The new constitution proclaimed the victory of socialism and restated the country's commitment to unification under Communist leadership.\nHowever, the SED leadership, although successful in establishing socialism in East Germany,", "-27.90014569606865" ], [ "redefine the word socialism, such as saying: \"Socialism! That is an unfortunate word altogether... What does socialism really mean? If people have something to eat and their pleasures, then they have their socialism\". In 1930, Hitler said: \"Our adopted term 'Socialist' has nothing to do with Marxist Socialism. Marxism is anti-property; true Socialism is not\". The name that Hitler later wished he had used to describe his political party was \"social revolutionary\". Nikita Khrushchev sardonically remarked: \"In modern times the word Socialism has become very fashionable, and it has also been used very loosely. Even Hitler used to babble about", "-27.89659649130772" ], [ "unproven, and alien Nazi Third Reich contradicted with their pastoralist views. Its rejection of an agricultural, “Earthly” society in favor of an industrious, modernized Germany defied their very visions. Nazi Germany was devoid of their organic and intergenerational life – it professed its love for a radically modern, mechanically “cold” Germany.\nDetested by the society they inhabited and rejected by their moderate peers, German agrarian conservatives were alienated by their own country. Germany chose the path of National Socialism with Hitler's rise to Chancellor in 1933, preventing an organic society from ever emerging. Hitler's illegalization of conservatism as a whole further", "-27.882109807809684" ], [ "the German labour movement seized on this and—using the earlier abbreviated term \"Sozi\" for Sozialist (English: Socialist) as an example—shortened NSDAP's name, Nationalsozialistische, to the dismissive \"Nazi\", in order to associate them with the derogatory use of the term mentioned above.\nThe first use of the term \"Nazi\" by the National Socialists occurred in 1926 in a publication by Joseph Goebbels called Der Nazi-Sozi [\"The Nazi-Sozi\"]. In Goebbels' pamphlet, the word \"Nazi\" only appears when linked with the word \"Sozi\" as an abbreviation of \"National Socialism\".\nAfter the NSDAP's rise to power in the 1930s, the use of the term \"Nazi\" by", "-27.85604914870055" ], [ "socialists, syndicalists, mutualists and anarchists go further in their critique, deriding even Marxism as state socialism for its support of a temporary, proletarian state instead of abolishing the state apparatus outright. They use the term in contrast with their own form of socialism, which involves either collective ownership (in the form of worker cooperatives) or common ownership of the means of production without state economic planning. Libertarian socialists and anarchists believe there is no need for a state in a socialist system because there would be no class to suppress and no need for an institution based on coercion and", "-27.855784514395054" ], [ "workers in terms of Socialism\". At the heart of its aesthetics were ideals of Realism, Socialist partiality, the Socialist struggle for progress and socialist ideas as main theme, social optimism pointing towards a bright future and worker or peasant as positive hero.\nEarlier in 1952, Stalin's \"theory of socialism in one country\" was accepted as political program in the Second SED Party Conference 1952. The Union of German Writers, DSV, was founded in response and therefore oriented towards Stalin's idea of Real Socialism which was expressed in its literary dimension in the Union of Soviet Writers (1934 Conference) as Socialist Realism.", "-27.847534610831644" ], [ "Communists and parties on the left were increasingly threatened by the growth of the Nazi movement. Hitler came to power in January 1933 and rapidly consolidated his control over Germany, destroyed the communist and socialist movements in Germany, and rejected the restraints imposed by the Versailles treaty. Stalin in 1934 reversed his decision in 1928 to attack socialists, and introduced his new plan: the \"popular front.\" It was a coalition of anti-fascist parties usually organized by the local Communists acting under instructions from the Comintern. The new policy was to work with all parties on the left and center in", "-27.827465987298638" ], [ "the imperial predominance of a particular nation or race.\" Five pillars of totalitarian systems In terms of the similarities between Nazism and Stalinism, Friedrich lists five main aspects that they hold in common: First, an official ideology that is supposed to be followed by all members of society, at least passively, and which promises to serve as a perfect guide towards some ultimate goal. Second, a single political party, composed of the most enthusiastic supporters of the official ideology, representing an elite group within society (no more than 10 percent of the population), and organized along strictly regimented lines. Third,", "-27.825827977023437" ], [ "Socialism in One Country Joseph Stalin Stalin presented the theory of socialism in one country as a further development of Leninism based on Lenin aforementioned quotations.\nIn his 14 February 1938 \"Response to Comrade Ivanov\", formulated as an answer to a question of a \"comrade Ivanov\" mailed to Pravda newspaper, Stalin splits the question in two parts. The first side of the question is in terms of the internal relations within the Soviet Union, whether it is possible to construct the socialist society by defeating the local bourgeoisie and fostering the union of workers and peasants.\nStalin quotes Lenin that \"we have", "-27.82145891849359" ], [ "Union of Fascists under Sir Oswald Mosley. Anti-capitalism The Nazis argued that free market capitalism damages nations due to international finance and the worldwide economic dominance of disloyal big business, which they considered to be the product of Jewish influences. Nazi propaganda posters in working class districts emphasised anti-capitalism, such as one that said: \"The maintenance of a rotten industrial system has nothing to do with nationalism. I can love Germany and hate capitalism\".\nBoth in public and in private, Hitler expressed disdain for capitalism, arguing that it holds nations ransom in the interests of a parasitic cosmopolitan rentier class. He", "-27.811004832357867" ], [ "against the Enabling Act, while the Communist Party was blocked from voting.\nIn 1945 the Allied administrations in the Western zones initially allowed the establishment of four parties, which resulted in the (re-)formation of the Christian Democratic Union, the Free Democratic Party, the Communist Party and the SPD. In the Soviet zone of occupation the Soviets forced the Social Democrats to form a common party with the Communists, resulting in the Socialist Unity Party of Germany (SED). In the Western zones, West Germany's Federal Constitutional Court later banned the Communist Party (1956). Since 1949, the SPD has been", "-27.809201754804235" ], [ "perfect. Though similarly “traditionalist” in their yearn to recapture a past German status quo, the Nazi Party and conservatives sought different futures. The Nazi future, led by high technology and scientific development, conflicted directly with the conservative future, led by some rendition of the ancien regime, and varying degrees of tradition (depending on the type of conservative concerned). The imperative obtainment of rural votes established Nazi predominance in German politics, yet reasons for the abandoning of traditional conservatism in favor of National Socialism are, at best, speculations. Regardless, Nazi efforts to modernize agriculture resulted in the increase of farmers’ income,", "-27.80809305267212" ], [ "\"Functionalist\" schools of thought, which dealt with the question of whether the Nazi regime represented an extension of Hitler's autocratic will, faithfully obeying his wishes, or whether it was an essentially chaotic and uncontrollable system that functioned on its own with little direct input from the Führer. Like Kershaw and Lewin, Burrin says that the relationship between the leader and his party's ideology was different in Nazism compared to Stalinism: \"One can rightly state that Nazism cannot be dissociated from Hitlerism, something that is difficult to affirm for Bolshevism and Stalinism.\" Unlike Stalin, who inherited an existing system with an", "-27.807838315158733" ], [ "appeared, which, like Heinrich August Winkler assumes, was in essence agreed with Leipart. In this article, Erdmann distanced himself from the SPD in a hitherto unknown sharpness and emphasized the difference in character with the trade unions. According to Erdmann, the Marxism of the trade unions had never been a belief in a single-minded theory. We are socialists because we are Germans. And precisely for this reason the goal for us is not socialism, but socialist Germany. (...) German socialism grows from German history into the future living space of the German people. Socialist Germany will never become a reality", "-27.80488650594998" ], [ "political manifesto Mein Kampf (\"My Struggle\").\nThe Nazi Party was banned on 9 November 1923; however, with the support of the nationalist Völkisch-Social Bloc (Völkisch-Sozialer Block), it continued to operate under the name \"German Party\" (Deutsche Partei or DP) from 1924 to 1925. The Nazis failed to remain unified in the DP, as in the north, the right-wing Volkish nationalist supporters of the Nazis moved to the new German Völkisch Freedom Party, leaving the north's left-wing Nazi members, such as Joseph Goebbels retaining support for the party. Defeat and abolition Officially, the Third Reich lasted only 12 years. The first Instrument", "-27.790322260374523" ], [ "policies resembled those in Catholic countries. The common point between Nazi and Stalinist practices was the connection of reproduction policies with the ideological goals of the state — \"part of the project of a rational, hypermodern vision for the re-organization of society\". There were nevertheless substantial differences between the two regimes' approaches. Stalin's Soviet Union never officially supported eugenics as the Nazis did—the Soviet government called eugenics a \"fascist science\"—although there were in fact Soviet eugenicists. The two regimes also had different approaches to the relationship between family and paid labor—Nazism promoted the male single-breadwinner family while Stalinism promoted the", "-27.777886998985196" ], [ "Communism advocated by the Soviet occupier, the education that Werner Lamberz had received in a school for future Nazi leaders evidently provided appropriate training for a leadership role within the ostensibly Communist FDJ organisation. In 1947 Lamberz also joined the newly created Socialist Unity Party of Germany (Sozialistische Einheitspartei Deutschlands/ SED) which would become the ruling party of a second German one-party dictatorship after the Soviet occupation zone was relaunched, formally in October 1949, as the German Democratic Republic (East Germany). Werner Lamberz achieved a series of rapid promotions within the local party hierarchy till 1949,", "-27.744061335077276" ], [ "the Soviet Union in the 1940s of decaying into Red fascism by writing: \"Such is the logic of totalitarianism\", that \"communism, whatever it was originally, is today Red fascism\". Bruno Rizzi, an Italian Marxist and a founder of the Communist Party of Italy, claimed as early as 1938 that \"Stalinism [took on] a regressive course, generating a species of red fascism identical in its superstructural and choreographic features [with its Fascist model]\".\n\nMany leftists in the 1930s and 1940s became disillusioned by and estranged from the Soviet Union, condemning it for its rigid authoritarianism. Otto Rühle, a German left communist, wrote", "-27.73729929286492" ], [ "Nazism as more radical than Italian Fascism, which they identified as being too supportive of capitalism.\nThe Nazis argued that capitalism damages nations due to international finance, the economic dominance of big business and Jewish influences within it. Adolf Hitler, both in public and in private, held strong disdain for capitalism and he accused modern capitalism of holding nations ransom in the interests of a parasitic cosmopolitan rentier class. He opposed free-market capitalism's profit-seeking impulses and desired an economy in which community interests would be upheld. He distrusted capitalism for being unreliable due to it having an egotistic nature and he", "-27.709314995830937" ], [ "1920s and early 1930s, and that held that social democracy was a variant of fascism, and even the most insidious form of fascism. Consequently the KPD held that it was \"the only anti-fascist party\" in Germany and stated that \"fighting fascism means fighting the SPD just as much as it means fighting Hitler and the parties of Brüning.\"\nIn the usage of the Soviet Union, the Comintern and its affiliated parties, including the KPD, the epithet \"fascist\" was used from the 1920s to describe capitalist society in general, and virtually any anti-Soviet or anti-communist activity or opinion. The term \"anti-fascist\" became", "-27.694118501240155" ], [ "Democratic Party of Germany (USPD, April 1917–1931) while the more conservative faction became known as the Majority Social Democratic Party of Germany (MSPD, 1917–1922). From 1918 the SPD played an important role in the political system of the Weimar Republic, although it took part in coalition governments only in few years (1918–1921, 1923 and 1928–1930). Adolf Hitler banned the SPD in 1933 under the Enabling Act and the National Socialist régime imprisoned, killed or forced into exile SPD party officials. In exile, the party used the name Sopade. The Social Democrats had been the only party to vote", "-27.693307880763314" ], [ "which, under circumstances that would remain contentious, the Socialist Unity Party (\"Sozialistische Einheitspartei Deutschlands\" / SED), a new united left wing party, was established to ensure that divisions on the political left should never again open the way for a takeover of the state by right wing nationalists. Ironically, by the time, in October 1949, when the Soviet occupation zone was relaunched as the Soviet sponsored German Democratic Republic (East Germany), the SED would itself have become the apparently permanent ruling party in a new kind of one-party dictatorship. In 1946 Arthur Pieck was formally", "-27.689804403766175" ], [ "for Saxony. In the meantime the German Communist Party was abolished, in April 1946, as a result of a controversial merger with the more moderately left-wing SPD (party). Within the Soviet occupation zone this established the basis for a return to one-party government. Communist Party members, along with those from the SPD, were invited to sign their membership across to the new Socialist Unity Party of Germany (SED / Sozialistische Einheitspartei Deutschlands ), and Konrad Naumann was one of many who did so. For a period he obtained promotions in his work with the FDJ, becoming local FDJ President", "-27.665651815594174" ], [ "Socialist League (Germany) The Socialist League (German: Sozialistischer Bund) was initiated as a political movement by Gustav Landauer in May 1908, and was aimed at \"uniting all humans who are serious about realizing socialism\". Its original strategy was to achieve socialism through the formation of worker cooperatives and intentional communities. Martin Buber and Erich Muhsam were early members of Landauer's group, which eventually grew to include about 800 members. During the fall of the Bavarian Soviet Republic in the spring of 1919, Landauer was killed and the movement was thrown into disarray.\nIt reappeared later as a splinter group of the", "-27.66402793332236" ], [ "the dictatorship of Stalin in the Soviet Union and that of Hitler in Germany\" has been a deeply controversial topic and a subject of debate almost from the beginning of those dictatorships. Various other aspects of the two regimes have also been the subject of intense scholarly debate, such as whether Nazi and Stalinist ideologies were genuinely believed and pursued by the respective governments, or whether the ideologies were merely convenient justifications for dictatorial rule. Friedrich himself argues in favor of the former view.\nFriedrich and Brzezinski argue that Nazism and Stalinism are not only similar to each other, but also", "-27.660196025040932" ], [ "region surrounding Berlin which, until October 1949, was administered as the Soviet occupation zone. Between 1945 and 1953 he played a key role in creating the German Democratic Republic (East Germany), a separated Soviet sponsored German state with its political, economic and social institutions modeled on those of the Soviet Union itself. The soviet-styled one-party government was achieved through the creation of the Socialist Unity Party (Sozialistische Einheitspartei Deutschlands / SED) which was formally launched in April 1946 as the product of a contentious merger, within the Soviet zone, of the two leftwing-labour parties, the Communist Party and the centre-left", "-27.655539539642632" ], [ "Socialist state Terminology The term \"Socialist state\" is widely used by Marxist-Leninist parties, theorists, and governments to mean a state under the control of a vanguard party that is organizing the economic, social, and political affairs of said state toward the construction of socialism. States run by Communist parties that adhere to Marxism–Leninism, or some variation thereof, refer to themselves as \"Socialist states\" or \"workers' states\". They involve the direction of economic development toward the building up of the productive forces to underpin the establishment of a socialist economy, and usually include that at least the commanding heights of the", "-27.654024901770754" ], [ "widespread belief that the Nazis had been able to take power in 1933 only because of divisions between the parties of the left, a new political party, the Socialist Unity Party (\"Sozialistische Einheitspartei Deutschlands\" / SED), was formed in April 1946 through a contentious merger involving the Communists and Social Democrats. Although there may have been hopes that the SED would take root across Germany, in reality the effect of the exercise was restricted to the Soviet zone. Margarete Nischwitz was one of thousands of comrades who lost little time in signing their party memberships over from the Communist Party", "-27.6232946383534" ], [ "and state socialism as forms of socialism, instead regarding them as a form of state capitalism in which the state undertakes commercial economic activity and where the means of production are organised and managed as state-owned business enterprises, including the processes of capital accumulation, centralised management and wage labour. As a result, democratic socialism generally mean some form of Marxian socialist opposed to Marxism–Leninism and a social democracy committed to the abolishment of capitalism in favour of socialism as a post-capitalist economy. Other tendencies include anti-Leninist and anti-Stalinist left Marxian socialism (anti-authoritarian socialism from below, classical Marxism, libertarian Marxism and", "-27.618453650477022" ] ]
220dcv
I've heard that you can easily learn a foreign language if you watch foreign language tv. So if I watch tv in spanish, will I learn spanish? How does this work without subtitles?
[ "You technically could, sure. It'd be the same way you learned your first language. Over time, you begin to associate nouns with actual things on the screen, verbs with actions you see, and adjectives from how things look/sound/whatever. If you saw someone walk into a room, and the man behind the desk said \"por favor siéntate\", and the person sat down, eventually, you'd learn that this phrase, in some way, likely means 'sit down'. You'd then notice that 'por favor' is used when someone is asking for something. you could then intuit that 'siéntate' means to sit, and 'por favor' means to ask nicely for something. Eventually you'd pick up on the patterns, but it's not like a weekend of spanish soap operas would really *teach* you spanish. It would certainly take time. Enough exposure would eventually work to some extent, though.", "I've pretty much learned English entirely from watching British and American TV and movies. In the Netherlands everything on TV is subtitled (by law, I think?) rather than voice-overed. It is by far rthe easiest way to learn a new language since you do it uncounsiously. The downside is that (especially hollywood) doesn't use a wide variety of vocabularely so you often still missspell words. On the other hand I have now downloaded 150gb of German movies and tv shows. Tschüs!", "I learned Spanish at 19 years old....first by spending a month or two in a crash course, and then living in Chile for several years. My guess is that maybe you could pick up SOMETHING of a language by watching it on TV, but there are so many contexts that you'd never understand until you actually lived a daily life in a foreign country. Even something as simple as shopping in the grocery store would be difficult of you only knew TV language. You want to learn a language, you have to be fully immersed in it (meaning that, unlike a TV show, you have to respond to questions, ask your own questions, explain yourself, learn the intricacies of the language...and screw up enough with correction that you learn.) TV will make you a parrot. Immersion will make you a master.", "I took a Spanish class for nine weeks, three in the USA and six in Guatemala. I learned so much more and so much quicker in Guatemala learning from native speakers who knew very little to no English. After that I went to Nicaragua for a year and a half and had to speak to the people there and live with Latina who rarely knew any English. I went weeks without ever speaking English. I had to learn Spanish to survive. When I returned to the states I enrolled in Spanish class at school and realized I know the language but I have no clue why Spanish speakers speak like they do. In reality I think it's better to know how to use a language than to know why one uses a word in that language. I also met a guy from Guatemala who had grown up watching every TV show in English. He was kind of a TV buff and it was hard for him to give it up for two years while he was in Nicaragua, but he was fluent in English. So with a lot of years, yeah you could learn a language. But there comes a point where you have to try and speak it. He was really nervous to speak English to us, but when he did he was really good at it.", "I'm polish and that's how I learned English! I watched cartoons in English with no subtitles or vocice-over at all. From my experience watching TV may grant you a kickstart with nouns and phrases, and that's good. You do it simply by associating words to pictures you see on screen. Later on however you'll probably find yourself lacking in grammar etc. that's when you start taking lessons or even leave to another country. You'll be far ahead in terms of vocabulary, and find it easier to catch on with everything else. Also: use that language as much as you can. For example when alone and making dinner try to act as if you were a host of some Spanish cooking show. It really helps :)", "I know several people who learned Spanish just by watching Spanish telenovelas with subtitles in their own language (my understanding is that Spanish is considered a fairly easy language to learn).", "Some good points in the comments, but it also works much much better when your a child and your brain is still developing. The language part of your brain is able to understand/comprehend foreign languages easier in your youth. This typically fades away as you enter adolencense (9-12). Thats why taking your kid to a bilingual school when hes young is great, learning multiple languages when you're young vastly improves cognitive abilities as an adult.", "Correct me if I'm wrong, but I don't think that this will work. You may be able to guess a bunch of words by doing so but you will never be able to get into the grammar rules etc. When learning a foreign language you definately have to get deeper into the topic instead of just watching movies. Otherwise you won't be able to understand how that language works.", "I've been watching anime since I was 13 so about 6 years, and I know maybe 10 or 20 Japanese words, and knowing how to say \"Roger that\", \"Thank you for the meal\", and \"No brother, don't touch me there\" isn't gonna get me too far in Japan", "A lot of the people here in China I know learned a lot of their English from \"Friends\". They had a base from studying but watching the show helped them immensely. It helps a lot with grammar and sentence structure is what one person told me.", "Idk but 20+ years ago my Japanese tennis coach had two kids stay the summer and neither of them spoke a word of English. By the end of the summer both had some rudimentary English. From watching terminator re runs. First words: fuck you asshole.", "I don't think it works very well, either for me or for non English speakers I've heard of who tried. The thing is, to learn a language you have to practice speaking and writing in it. Just inputting it is too passive.", "It helps a lot with understanding speech. If you only learn by text you won’t be able to have a conversation: everything will sound foreign. I don’t think you can use it as a first step." ]
[ [ "rather than Filipino. However, the topics are usually taught, even in colleges, in Tagalog or the local language. By way of contrast, native languages are often heard in colloquial and domestic settings, spoken mostly with family and friends. The use of English attempts to give an air of formality, given its use in school, government and various ceremonies. A percentage of the media such as cable television and newspapers are also in English; major television networks such as ABS-CBN and GMA and all AM radio stations broadcast primarily in Filipino, as well as government-run stations like PTV and the Philippine", "-23.714280465326738" ], [ "first language are expected to learn Spanish.", "-23.099804665191186" ], [ "Very few would prefer highly technical books in either Filipino or the regional language. Movies and TV shows in English are usually not dubbed in most cable channels except a few such as Tagalized Movie Channel.\nBecause English is part of the curricula from primary to secondary education, many Filipinos write and speak in fluent Philippine English, although there might be differences in pronunciation. Most schools in the Philippines, however, are staffed by teachers who are speakers of Philippine English and hence notable differences from the American English from which it was derived are observable.\nPhilippine English traditionally follows American English spelling", "-22.816409441817086" ], [ "of Spanish to those information technology contents developed in other languages, and so people who speak other languages can have access to contents that are only available in Spanish. This service permits translation of texts and text files, as well as web pages, from Spanish to Catalan, French, Galician, English or Portuguese and vice versa. The pairs of language percentages used are as follows: English–Spanish, 23.47% of the total; Spanish–Catalan, 21.12%; Spanish–English, 13.64%; Portuguese–Spanish, 12.63%; Spanish–Portuguese, 10.39%; Catalan–Spanish, 6.48%; Spanish–French, 6.24%, and French–Spanish, 6.03%. Publications Since 1998, the Instituto Cervantes has published the annual El español en el mundo", "-22.49253232467163" ], [ "Pacific Time, during the network's prime time lineup. The subtitles are transmitted over the CC3 caption channel in standard definition and the CS2 caption channel available on most digital tuners in high definition. The network produces the translations in-house, and intends them to attract Hispanic viewers who may not be fluent in Spanish as well as other non-Spanish speakers. Programs that include English captions are identified on-air by a special digital on-screen graphic seen at the start of each episode, denoting the specific caption channels in which viewers can receive subtitles in either Spanish or English (see right).\nTelemundo was the", "-22.176563119428465" ], [ "does not allow for translation into two different languages simultaneously, as is often the case of Israeli television channels that use subtitles in Hebrew and another language (like Russian) simultaneously. Philippines In the Philippines, media practitioners generally have mixed practices regarding whether to dub television programes or films, even within the same kind of medium.\nThey have mixed only with the dub television files and for G and PG graph square boundary. Free-to-air TV The prevalence of media needing to be dubbed has resulted in a talent pool that is very capable of syncing voice to lip, especially for shows broadcast", "-22.14625411752786" ], [ "as Australia, it is so common nowadays for a foreign language to be taught in schools that the subject of language education is referred to LOTE or Language Other Than English. In the majority of English-speaking education centers, French, Spanish and German are the most popular languages to study and learn. English As A Second Language is also available for students whose first language is not English and they are unable to speak it to the required standard. Online and self-study courses Hundreds of languages are available for self-study, from scores of publishers, for a range of costs, using a", "-21.989479082403705" ], [ "of Spanish Language TV in America.", "-21.812801565873087" ], [ "in Spanish with English subtitles.", "-21.736977125357953" ], [ "up a \"language\" such as English, Spanish, and French. Language in classrooms in generalized into one category in order to offer and exposes students to the basics and variety. Some classrooms may focus on one area on a \"language\" while others show multiple aspects of each one. Debates on Language Education Language Education in the United States has brought multiple debates on the topic of teaching foreign languages to native English speakers. Cognitive arguments are used to prove that the teaching of foreign language is useful. Studies have shown that over the duration of learning a second language,", "-21.119476674080943" ], [ "also regularly airs Spanish-dubbed English-language films (primarily those produced by American film studios such as Universal Pictures, Walt Disney Studios Motion Pictures and Sony Pictures Entertainment) that make up much of the network's weekend afternoon and prime time lineup, as well as films natively produced in Spanish (imported from various Latin American countries) that it usually airs daily during the overnight hours; the network also airs films in place of regularly scheduled programming on select national holidays (such as Thanksgiving and Christmas). English subtitles Telemundo provides English subtitles via closed captioning primarily on weekdays from 7:00 to 11:00 p.m. Eastern and", "-21.02391415386228" ], [ "may have studied in international schools abroad, offering English teaching that matches their level and possibly giving special tutoring in Finnish or other subjects. These children have the option to take French, German or Russian as their second foreign language in year 5 instead of English.", "-20.95151854476717" ], [ "programs are geared towards other Eastern European languages including Romanian. Spanish language programming also airs in addition to English language Religious programming, at times geared towards English-speaking Europeans.\nAutomated Adult Contemporary music (in English) fills the rest of the airtime.", "-20.820053735020338" ], [ "starting school year 2009–2010. The program shall initially offer Spanish as a foreign language in one school per region, at two classes of 35 students each, per school. As of 2009, the Spanish government has offered to fund a project and even offered scholarship grants to Spain for public school teachers and students who would like to study Spanish or take up a master's degree in four top universities in Spain. The Spanish government has been funding the ongoing pilot teacher training program about the Spanish language, involving two months of face-to-face classes and a 10-month on-line component. Clásicos Hispanofilipinos", "-20.769477445569464" ], [ "very useful for learning foreign languages. However, according to the same Eurobarometer, virtually no Romanian found this method—watching movies in their original version—to be the most efficient way to learn foreign languages, compared to 53 percent who preferred language lessons at school.\nIn Romania, foreign language television programs and films are generally subtitled rather than dubbed. This includes programs in non-Western languages, such as Turkish, Korean or Hindi. Serbia Serbian language dubs are made mainly for Serbia, but they broadcast in Montenegro and Bosnia & Herzegovina, too. Children's animated and some live-action movies and TV series are dubbed into Serbian, while", "-20.672216646256857" ], [ "method could be used to teach from any language to any language, it is currently used almost exclusively to teach English speaking people other languages. Many different companies offer systems based on this method, but the list of languages offered is almost identical. Learning courses have been developed to teach students Dutch, French, German, Greek, Hebrew, Italian, Japanese, Portuguese (both Brazilian and European), Russian, Spanish (both European and South American) and Welsh.", "-20.663107815897092" ], [ "channels, the talk was also dubbed and translated in the ten languages of the channel, namely French, English, German, Italian, Spanish, Portuguese, Turkish, Russian, Arabic and Persian.", "-20.632336777052842" ], [ "a foreign/second language (except for sheltered courses), they do not need English as a tool in their immediate studies. \"Content-based instruction (CBI) is the integration of selected content with language teaching aims\". Thus, when trying to identify which approach being taken, the question is: \"Is it English for Specific Purposes or English through specific content themes or content areas?\"", "-20.55948757834267" ], [ "variety of rare foreign languages available to students, among which Hebrew, Russian, Arabic and Japanese.", "-20.500911645960514" ], [ "Language education by region Practices in language education vary significantly by region. Firstly, the languages being learned differ; in the United States, Spanish is the most popular language to be learned, whereas the most popular languages to be learned in Australia are Italian and Mandarin Chinese. Also, teaching methods tend to differ by region. Language immersion is popular in some European countries, but is not used very much in the United States. Foreign language education 1995 European Commission’s White Paper \"Teaching and learning – Towards the learning society\", stated that \"upon completing initial training, everyone should be proficient in two", "-20.43208632878668" ], [ "of learning is somewhat difficult, yet if we are persevering, we shall soon improve our knowledge.\nOther Tagalogs like us did not take a year to learn the Spanish language when using my book. This good result has given me satisfaction and encouraged me to print my work, so that all may derive some profit from it.\nThere were also Latin schools where that language was taught together with some Spanish, since it was a mandatory requirement for the study of philosophy, theology and jurisprudence in schools like the University of Santo Tomás, run by the Dominicans. The Philippine priests and lawyers", "-20.36336412599485" ], [ "most common languages include Spanish, French, German, Latin, Russian, and Italian.\nIn a foreign language classroom, one aspect of the curriculum is the teaching of the culture behind the language. This is input into classrooms in order to give students a deeper meaning of the language. According to Michael Byram, in order to fully be able to communicate to someone with a different background, one must have insight into their lives and communication aspects. It is also used to preserve a long standing set of traditions with indigenous people. A case of this was seen in High schools", "-20.3239163987746" ], [ "It has programming in the following languages: Arabic, Cantonese, Filipino, German, Italian, Mandarin, Polish, Punjabi, Spanish and Ukrainian.", "-20.29779041618167" ], [ "is no relevant need to learn a second language if all dealings can be done in their native language; that is especially the case for English-speakers in the United States, particularly the Northern United States and most of the Southern United States, where everyday contact with other languages, such as Spanish and French is usually limited. The country's large area and the most populous regions' distance from large non-English-speaking areas, such as Mexico and Quebec, increase the geographic and economic barriers to foreign travel. Nevertheless, the requirement for all school children to learn a foreign language in some English speaking", "-20.286263406087528" ], [ "not have a right to government services in their preferred language. Public debate in the last few decades has focused on whether Spanish should be recognized by the government, or whether all business should be done in English.\nCalifornia allows people to take their driving test in the following 32 languages: Amharic, Arabic, Armenian, Chinese, Croatian, English, French, German, Greek, Hebrew, Hindi, Hmong, Hungarian, Indonesian, Italian, Japanese, Khmer, Korean, Laotian, Persian, Polish, Portuguese, Punjabi, Romanian, Russian, Samoan, Spanish, Tagalog/Filipino, Thai, Tongan, Turkish, and Vietnamese.\nNew York state provides voter-registration forms in the following five languages: Bengali, Chinese, English, Korean and Spanish. The", "-20.242673544795252" ], [ "and 2012. Thus, pupils were immersed in Catalan except for three hours per week of Spanish medium instruction. However, the most recent Spanish Education Law and some judicial sentences aim at increasing the time of instruction in Spanish for other subjects, if only one child per class asks it, even if the other families don't agree, because of complaints that current policies hinder the right to an education in Spanish.\nSome political parties and civic organizations denounce this situation in which a co-official language like Spanish is barred from public education, claiming that this is a severe breach of civic rights", "-20.237040039821295" ], [ "the teaching of Spanish as a foreign language and to provide useful resources to its members. Throughout the year, it organises the specific activities and programmes for the centre, with several different goals, which include teaching, providing the resources to the teachers to use in their education field, and developing specialised knowledge of the Spanish language for educational purposes. The Centre supports the future teachers of Spanish through its 'Master of Education in Spanish as a Foreign Language', in collaboration with the International University Menéndez Pelayo. For teachers already involved in teaching, the Centre provides advanced activities that", "-20.229398080846295" ], [ "of the biggest publishers on the field of Spanish teaching materials of Spanish as a foreign language. Other important publishers on the field are SGEL, DIFUSIÓN, EDICIONES SM and SANTILLANA.", "-20.186466251630918" ], [ "for those who are interested in exposing their children to the Spanish language. It is also suitable for those children learning English as a second language. Children will hear stories, sing songs and view short videos in both languages. They will also do a simple craft.\nProgram runs for four weeks.\nPreschool Storytime\n(3 years-6 months to 6 years)\nEach week children will enjoy stories, learn new songs, poetry, and movement activities\nall focused on a specific theme, and centered on an early literacy development skill.\nAvailable at all Library Locations\nBook Discussions: Mother-Daughter girls in 4th grade and up and their moms read and discuss a", "-20.1772769836316" ], [ "in both English and Spanish (subtitles or with a translator), with various video and musical backdrops, and user views reaching into the multi-millions.", "-20.16201544006617" ], [ "and payments processing.\nAn influx of foreign students, principally from South Korea, has also led to growth in the number of English language learning centers, especially in Metro Manila, Baguio City, Metro Cebu and Metro Bacolod. Orthography and grammar Philippine laws and court decisions, with extremely rare exceptions, are written solely in English. English is also used in higher education, religious affairs, print and broadcast media, and business. Most educated Filipinos are bilinguals and speak English as one of their languages. For highly technical subjects such as nursing, medicine, computing and calculus, English is the preferred medium for textbooks, communication, etc.", "-19.980433829245158" ], [ "arrangement with a school in Stockholm.\nThe School also offers Distance Learning, via internet classes. Language classes From the first year, students are taught in Spanish, both in conversation and formal studies (oral and written). English is used where appropriate, more in the activities and stage presentations than Spanish. In addition, the school offers weekly Swedish-maintenance classes, for persons who wish to maintain their knowledge of the language, and adult-study classes for learning Swedish and Spanish. Eating The school provides a weekday lunch and afternoon snack to students. Sports and recreation Twice-weekly classes are provided at a local sports facility. In", "-19.91003337445727" ], [ "for Special English is people who have learned English in school, but are less than fluent and do not speak it in daily usage.\nIn February 1962, Loomis announced the addition of three new short-wave radio transmitters that would allow it to better compete with Radio Moscow and Peiping Radio, and to help reach through the jamming of its signal.\nUnder Loomis, the Voice of America reported on the pressing stories of the day, including round-the-clock coverage in Spanish and expanded English language reporting during the Cuban Missile Crisis in 1962. The VOA broadcast Dr. Martin Luther King, Jr.'s I Have a", "-19.897230074287563" ], [ "the language being learned, and the use of the student's native tongue is discouraged. These foreign languages lessons are shared with pupils from other language streams. The idea is to encourage the pupils to use the language they are learning as a means of crossing the communication barrier between themselves and pupils from other language streams. From Year 3 onwards of the secondary school, History and Geography as well as other secondary subjects such as Music are taught in each student's second language. Many of the pupils find themselves in a foreign country, so are surrounded by a foreign language.", "-19.8307910678559" ], [ "Even Read Spanish,\" a half-hour play about Puerto Rican life in New York that aired on WNBC TV Channel 4 on Saturday, May 8, 1971. The script is now preserved at the Centro de Estudios Puertorriqueños at Hunter College.\nAgüeros also wrote a script for Sesame Street, \"No Matter What Your Language\". The song by that name first appeared on the show in its third season (1971–1972). In the song, which has since been featured in a number of episodes, a Spanish speaker teaches an English speaker that, if they take the time, anyone can learn a new language. Agüeros was", "-19.797885720861814" ], [ "informal, free, undirected or naturalistic. On the other hand, educational treatment in the case of foreign language may offer opportunities mainly for learning.\nNevertheless, acquisition can take place in the case of foreign language learning and learning can take place in the case of second language learning. For example, immigrants to the US can attend language teaching classes in the target language environment. On the other hand, foreign language learners that are far from target language environment can sometimes acquire some points for example by listening to foreign radio, reading literature etc.", "-19.75509479054017" ], [ "Choices (Languages)\nFor foreign language courses, students are given two options of Chinese and Spanish. There are 5 levels for language courses, from 1 to 4 and an AP course. For English, students are required to take two English courses until their senior year. Freshmen take General Literature and Communications, sophomores take American Literature and writing 10, juniors take British Literature and writing 11 or AP Language, and seniors are given an option of AP Language or AP Literature. Outside of the academic curriculum, there are myriad of options that you could learn foreign languages from student-run clubs. A lot of", "-19.677033787971595" ], [ "most popular languages for translation: from Russian into English and from English into Russian, from Spanish into English and from English into Spanish, from French into English and from English into French, from Arabic into English and from English into Arabic, from German into English and from English into German, from Italian into English and from English into Italian, from Chinese into English and from English into Chinese, from Japanese into English and from English into Japanese, from Korean into English and from English into Korean, from Greek into English and from English into Greek.\n ", "-19.60039824784326" ], [ "(Note: Programs are aired in English audio and/or with English subtitles):", "-19.577447852032492" ], [ "requirements for language proficiency in Spanish for those wishing to apply for specialised medical training places. Candidates who are citizens of countries where Spanish is not the official language must prove that they have sufficient competence in Spanish by passing the DELE exam C1 or C2. The DELE B2 is no longer accepted for these medical training places.\nSeveral American universities award course credit for the diplomas or require Spanish majors to acquire them. Enrolment Over 100 000 people have taken the DELE exams in eighty countries and two hundred and ninety cities throughout the world. International affiliation As the organisers", "-19.54606579709798" ], [ "on the appearance of the first issue of its journal Hispania suggested:\nThe teaching of the language should aim to provide a broad knowledge of literary Spanish, considered as a highly regarded model; and [only] in an incidental way should it explain the slight variations that are exhibited in educated speech in Spain and in Spanish America, showing the essential unity of all within the literary pattern (...) [And] in the specific case of teaching Spanish to foreigners, I see no reason to hesitate in imposing the pronunciation of the Castilian region.\n— Ramón Menéndez Pidal, \"La lengua española\"\nThe priority of written language", "-19.529614044100526" ], [ "time-shifted – outside of peak hours. These programmes were provided to S4C by Channel 4, free of charge.\nTo make content more accessible to English speakers, all Welsh-language programming carries English subtitles. Originally these were on Teletext page 888, with Welsh subtitles on page 889, with both subtitle languages now also available on digital television platforms. For speakers of English who are learning Welsh, certain programmes, particularly children's programmes Planed Plant Bach (now Cyw) and Planed Plant (now Stwnsh), carry subtitles featuring Welsh subtitles with additional English translations in brackets next to more difficult Welsh-language words. TV films produced for S4C", "-19.492535182042047" ], [ "by a team of about fifty people and faced a variety of problems. According to Luisi, the biggest hurdle was making \"the direct Japanese-to-English text translation read correctly in English. The sentence structure and grammar rules for the Japanese language is very different from English\", making it difficult for the translation to read like native English without distorting the meaning. Michael Basket was the sole translator for the project, though he received the help of native Japanese speakers from the Tokyo office. The localization was taxing for the team due to their inexperience, lack of professional editors, and poor communication", "-19.464432671054965" ], [ "Business School, Uppsala University, etc. Language of instruction is English, though if students speak native language of the school it is possible to receive a stipend, which covers some costs (e.g. accommodation).", "-19.41340803298226" ], [ "will often begin the class reading by reading aloud the story, or a portion of the story, then having the students translate it into their first language. This translation could be done with individual students, or chorally by the whole class. Translation is utilized selectively in this way as a direct method of ensuring an accurate understanding of the language meaning. As the students have already dealt with the language structures in steps one and two, they can often do this at a natural speed. If necessary, the teacher can help them translate any words they don't know. This", "-19.378780138937145" ], [ "to learn the area language since they understand they will only be temporarily in Barcelona, and because of the low hours per week of foreign language instruction. Most CJB students have trivial amounts of Catalan language instruction for festivals and other symbolic reasons. Some of the part-Japanese students take a special Catalan class. Student body As of 2012 there were 60 students at the school. As of 2009 most students are children of temporary Japanese workers. Norio Sudo, the consul general of Japan in Barcelona, stated that these parents are managers of Japanese companies. Some students are part-Japanese. The students", "-19.361837502074195" ], [ "language their second semester. Languages offered are Spanish, French, and Mandarin. If a student chooses Spanish, they take Spanish A in seventh grade and Spanish BC in eighth. These equal Spanish I in high school, and so by ninth grade they can take Spanish II. Students who do not take a foreign language in middle school, or who do not meet the minimum grade requirements to continue, start from the introductory level, such as Spanish I, when they reach high school. Electives All sixth graders participate in the elective wheel, which rotates them through different electives, including drama, Green Team,", "-19.283385122427717" ], [ "teach.\nThe universities have their education in both Finnish and Swedish which means that Tritonia's customer service is bilingual. Due to the fact that a high number of non-native students study in the respective universities, English is also a commonly-used language.", "-19.274577630043495" ], [ "students in the country, while in the following year, they numbered 726, or 34.6% of the total 2,161 foreign students. They are attracted to such universities by the opportunity to use English in a real-live setting rather than as a classroom exercise; however, they face several difficulties in this regard, including the use of Taglish, and more generally the prevalence of code switching between English and Tagalog by both lecturers and peers. They also find it difficult to adapt to the student-centered teaching style of Philippine universities, which demands active class participation. English and Spanish as second languages The majority", "-19.256732241425198" ], [ "the rest of Spain's private TV stations, thus removing advertising from the broadcaster. A TV licence fee has been suggested, but with little popular success.\nMoreover, each of the autonomous communities of Spain have their own public broadcaster, all of them members of FORTA, usually consisting in either one or two public channels that tend to reproduce the model set up by Televisión Española: a general channel and a more cultural related one. In the Autonomous Communities that have their own official language besides Spanish, those channels may broadcast not in Spanish, but in the other co-official language. For example, this", "-19.255900555755943" ], [ "teaching of English to speakers of other languages, to teaching writing in college level and business writing courses, in remedial English classes for native speakers, and in writing classes for the deaf.", "-19.245577213041543" ], [ "Radio in the United States Foreign language broadcasting The majority of programming in the United States is in English, with Spanish the second-most popular language; these are the only two languages with domestically produced, national radio networks. In the largest urban areas of the United States, \"world ethnic\" stations broadcast a wide variety of languages, including Russian, Chinese, Korean and the languages of India; although the relatively widespread languages French and German have comparatively few radio outlets; in the case of German, due to the fact that most of its speakers are Amish or from similar sects and thus shun", "-19.215088274970185" ], [ "programmes are available with multi-channel audio: all programmes go out in French and in German. Further the original version is screened whenever possible with subtitles in French and German and the hearing or visually impaired may get subtitles or an audio description. Since 2015 a selection of programmes are available with English and Spanish subtitles online, with Polish to follow in late 2016.\nThe channel enjoys a major footprint in Europe. Both the German and the French version can be received in nearly whole Europe via the satellite Astra1 (19, 2° East), the French version is also available via Hot Bird", "-19.17169663011373" ], [ "them to gain a cultural experience on their studies, but also giving them a chance to travel abroad while completing their degree. Foreign students in Spain A series of studies conducted within the last decade found similar results in students studying abroad in Spain for a short-term and/or semester long program. These studies found that students can improve their speaking proficiency during one semester, there is a positive relationship between students’ integrative motivation and interaction with second language culture, and student contact with the Spanish language has a great effect on their speaking improvement. We especially see these results in", "-19.12642255404353" ], [ "Language power Overview Each year in the United States, many students are required to learn a language other than English in their educational careers. Often, after years of study and quite likely earning passing grades on final and college entrance exams such as the ACTFL (American Council on the Teaching of Foreign Language) Oral Proficiency Interview, most students cannot speak at a level that will be understood or can they understand basic everyday exchanges at conversational speed in the language's native country, as one would encounter when watching television or listening to the radio.\nLanguage is taught to a level of", "-19.061651607698877" ], [ "year. Most immersion students have already had one year of study of Spanish. To apply, students be prepared to take an entrance exam in addition to submitting their transcript and application essay. The program consists of continuing Spanish in immersive classes through high school, taking at least one year of a supplemental language, and opportunities such as studying abroad for credit, gaining entrance with guest speakers, field trips, and cultural events. The students take approximately 2-3 center classes in a seven block schedule, focusing on oral and written Spanish as well as the culture, literature, and art of Spanish-speaking countries.", "-19.051344358886126" ], [ "the weekend.\nSince the 2003 season it has been broadcast in stereo.\nFrom the 2008 season onwards it has been broadcast in 16:9 format and with subtitles in Catalan for the deaf. The DTTV broadcast also includes English subtitles. This makes it the first programme produced in-house by Televisió de Catalunya that can be watched in English.\nTV3 is Televisió de Catalunya's first and main channel. All the people of Catalonia and Catalan Countries in the rest of Spain is potential viewer. Community In addition to the television programme and its presence on the Internet, Temps d'Aventura has been involved in other initiatives", "-19.040083795320243" ], [ "and is now a Spanish-language broadcaster.", "-18.983488896279596" ], [ "DuesEspatlles). Most programs are broadcast in Catalan, but foreign films and series are dubbed in Spanish.\nOne original program on the station was Notícies 10, airing at 8:25 pm.", "-18.962733737833332" ], [ "intensive studies of English and a second foreign language - French, German or Russian.", "-18.954672875930555" ], [ "and the United States, as a result of regulations that stipulate that virtually all TV eventually must be accessible for people who are deaf and hard–of–hearing. In practice, however, these \"real time\" subtitles will typically lag the audio by several seconds due to the inherent delay in transcribing, encoding, and transmitting the subtitles. Real time subtitles are also challenged by typographic errors or mis-hearing of the spoken words, with no time available to correct before transmission. Pre-prepared Some programs may be prepared in their entirety several hours before broadcast, but with insufficient time to prepare a timecoded caption file for", "-18.90585798840675" ], [ "stations and television providers that have the technological capability to do so must be able to pass through video description if provided by a programming source (with reasoning against doing so including the second audio program already being occupied by Spanish-language audio, or not having the required equipment, for instance). Broadcasters and program guides are encouraged to promote the availability of descriptions, but there is no requirement to do so. \nThe quotas are to be gradually increased over time: it initially applied to the top 25 markets for broadcast stations, and required that 50 hours of described programming be aired", "-18.896984826824337" ], [ "first Spanish-language network in the United States to incorporate English captions during its programming, beginning with the premieres of La Cenicienta (\"Cinderella\") and Amor Descarado (\"Barefaced Love\") on September 8, 2003; this generated a small, loyal fan base among English-speaking viewers. The subtitles were briefly discontinued without notice on October 14, 2008, citing budget cuts made by NBC Universal and the network's switch from analog to digital broadcasts; representatives for Telemundo also cited the need to concentrate resources on its core Spanish-speaking audience. However, the network soon reversed its decision due to demand by viewers in favor of the English", "-18.87077382474672" ], [ "Japanese School in Barcelona Curriculum The school uses Japanese as its language of instruction. Foreign language instruction is two hours per week and consists of the Spanish and English languages. Makiko Fukuda (福田 牧子 Fukuda Makiko), a professor at the Autonomous University of Barcelona and the author of Els usos lingüístics dels nens japonesos i nipocatalans/nipocastellans escolaritzats a Catalunya: el cas de l’alumnat de l’escola complementària de llengua japonesa i del col·legi japonès de Barcelona, stated that many students do not get sufficient progress in their foreign language instruction because they primarily have relations with other Japanese, have little motivation", "-18.85049267380964" ], [ "language students to study overseas.", "-18.839596497346065" ], [ "world. The latter offered subtitles in different languages, including English, Italian, Spanish, and Portuguese. Episodes were released in single format biweekly on Saturdays.", "-18.807855539780576" ], [ "is also offered in other parts of Spain as well as in Portugal by a number of cable television providers. All broadcasts are open and \"free to air\" (restrictions may sometimes apply to sporting events). Location and language TVG's headquarters are located at San Marcos Studios on the outskirts of Santiago de Compostela. All TVG programming is in Galician, except for commercials, which are sometimes in Spanish.\nAs a public channel, TVG is subject to Galician law. Its mission is to promote the Galician language and culture, while providing entertainment and quality productions. TVG's directive board is formed by television specialists", "-18.794389993301593" ], [ "and 5000 teachers. English is the most popular language being studied, followed by Spanish, French, Chinese, and Japanese. The site offers more than 100 languages, including endangered ones such as South African Xhosa.", "-18.794106725559686" ], [ "language while teaching, it provided that \"No person, individually or as a teacher, shall, in any private, denominational, parochial or public school, teach any subject to any person in any language other than the English language.\" With respect to foreign-language education, it prohibited instruction of children who had yet to successfully complete the eighth grade. Facts and arguments On May 25, 1920, Robert T. Meyer, while an instructor in Zion Lutheran School, a one-room schoolhouse in Hampton, Nebraska, taught the subject of reading in the German language to 10-year-old Raymond Parpart, a fourth-grader. The Hamilton County Attorney entered the classroom", "-18.781811419365113" ], [ "at 18:00 on SVT1, before moving to SVTB in August 2008. Foreign programming SVT also airs foreign programming, primarily from the United States, United Kingdom and other Nordic countries, in their original audio with Swedish subtitles, as is the case on other Nordic television channels.\nThe only cases in which dubbing is widespread is in programming aimed directly at children who are not expected to have learned reading skills yet. However for some programmes, viewers may also access 'talking subtitles' through their remote where someone reads the subtitles to viewers (though 'talking subtitles' are not strictly in sync with the", "-18.776494415360503" ], [ "In multilingual Singapore, dubbing is rare for western programmes. English-language programmes on the free-to-air terrestrial channels are usually subtitled in Chinese or Malay. Chinese, Malay and Tamil programmes (except for news bulletins), usually have subtitles in English and the original language during the prime time hours. Dual sound programs, such as Korean and Japanese dramas, offer sound in the original languages with subtitles, Mandarin-dubbed and subtitled, or English-dubbed. The deliberate policy to encourage Mandarin among citizens made it required by law for programs in other Chinese dialects (Hokkien, Cantonese and Teochew) to be dubbed into Mandarin, with the exception of", "-18.775413573621336" ], [ "or Spanish, and will be translated by the United Nations translators.", "-18.769317629514262" ], [ "Let's Speak English Premise This series taught English as a foreign or second language. It was hosted by Betty Fullerton, John Wevers, and as of the seventh episode, Barry Callaghan. Fullerton was a Scarborough, Ontario secondary school teacher while the other hosts were based at the University of Toronto. Michael Kay and Donald Theall from the same university served as series consultants. Production Let's Speak English was a co-production of the CBC, the Metropolitan Education Television Association, Canadian Scene (multicultural news agency), Ontario's provincial citizenship division, and the federal Department of Citizenship and Immigration. Peggy Nairn Liptrott produced the first", "-18.739122260609292" ], [ "hours in the language studied. It is also an opportunity to learn more about the culture of the country of which the language is being spoken. For example, learning History in Spanish the history of Spain and that of Central and South America would be emphasized. Teachers present their lessons in English, German, Italian or Spanish.\nAt the end, students can receive a \"European section\" mention on their baccalaureat. To have that mention, they need to get at least 12/20 on their language examination and at least 10/20 at an additional oral examination on the subject in the language.\nFor example, those", "-18.731603966632974" ], [ "policy requires local TV stations to air at least 25% Malaysian-made programmes (either Malay or English). Some privately owned TV stations (such as TV3, NTV7 and Astro Hitz.TV) do air some English Malaysian-made programmes. A few Malaysian-made TV programmes in Malay carry English subtitles and vice versa.", "-18.693651520792628" ], [ "been translated into English, Spanish and other world languages, as shown by worldCat", "-18.687001435202546" ], [ "or, since 2012, as part of the network's late-night novela repeat block. Some programs (notably the defunct long-running erotic anthology Decisiones (\"Decisions\"), which the network now airs only in reruns), include English captions only for certain episodes, depending on when they were produced. Programs that use English captions are primarily consist of telenovelas, though a few shows outside the genre (such as the prime time court show Caso Cerrado: Edición Especial) are also transcribed in both languages. Availability of English subtitles is limited to the technical capacity of the local station, cable or satellite provider, or other outlet to disseminate", "-18.58112329331925" ], [ "Bird (13° east) are free-to-air.\nA number of European channels which one might expect to be broadcast free-to-air - including many countries' national terrestrial broadcasters - do not do so via satellite for copyright reasons. (Rights to purchase programs for free-to-air broadcast, especially via satellite, are often higher in price than for encrypted broadcast.) The lack of FTA among public broadcasters are prevalent in countries whose broadcasters tend to use subtitles for foreign language programmes; although Spain's two public domestic channels, La Una and La Dos, are also encrypted despite dubbed foreign programmes being the norm in Spain. However,", "-18.5699748352381" ], [ "movies, and music videos and music-related magazine programming; it also broadcasts series originating from Telemundo and networks operated as part of sister division NBCUniversal Cable, made up of original series from sister networks Syfy and USA Network, which incorporated Spanish language subtitles. To reflect its audience, Universo does not exclusively air programming in Spanish, airing a mix of shows presented in English, dubbed into Spanish and incorporating Spanish language subtitles, and programs presented interchangeably in both languages.\nMusic programming on the network during its existence as mun2 usually consisted of a mix of music video in English and Spanish from a", "-18.564041191886645" ], [ "and Spanish.", "-18.53189770782774" ], [ "and Spanish.", "-18.53189770782774" ], [ "foreign sounds, those sounds should be a real language.\"\nBowing to what he termed \"teacher pressure,\" Taritero took the new-language angle a step farther, promoting Pakuni as a potential educational tool. \"I decided to commission a language that would be fun Saturday morning, but then might translate into learning Spanish the following week.\" He took this challenge to UCLA, where he was referred to Victoria Fromkin, Ph.D., the head of the university's department of linguistics. \"The idea of creating a language that could be learned by children was an exciting challenge,\" remembered Dr. Fromkin, \"Not just the old 'Me Tarzan, You", "-18.52749428298557" ], [ "and (2) it is the Sense of Congress that the teaching of English be promoted in Puerto Rico in order for English-language proficiency to be achieved\"; regardless of the fact that English is already taught in all grades from primary school, middle school, and high school, as well as in higher education.", "-18.479668901389232" ], [ "Japanese, and Spanish.", "-18.458405046054395" ], [ "wide range of foreign languages. All 7th and 8th grade students take a foreign language course. The languages are: Spanish, French, Italian, German, and Mandarin Chinese. 6th grade students in C house take all in one year, choosing their favorite language for the last 6 weeks. There is also a native Spanish speakers class. Sports Pin Oak offers many sports programs, including football, soccer, basketball, baseball, softball, cheerleading, swimming, and volleyball. The school also includes cross country running, and lacrosse. Clubs Pin Oak now has over fifty clubs to choose from, including Duct Tape, Dodgeball, Arts and Crafts, Indoor-Outdoor, Movie", "-18.452966819750145" ], [ "rule, all documents submitted in Spain must be translated by a translator certified by the Spanish Ministry of Foreign Affairs and Cooperation; however, in many cases, documents translated internationally and submitted to various consulates and embassies can be translated within the respective country by translators certified within the country of submission. In other words, a certified translator in the United States is able to translate documents for one of the Spanish Consulates located in the United States, but not if the documents are to be presented in Spain. Sweden The Legal, Financial and Administrative Services Agency is an official agency", "-18.443637566262623" ], [ "books have been translated into many languages, among others, English, French, German, Swedish, Bengali, Hindi, Chinese, Italian, Russian, Greek and Slovenian.\nCurrently he is translating the Divina Commedia into Spanish.", "-18.44031023530988" ], [ "excluding on their Filipino and Spanish time. The Filipino Language is also used, as an enhancement in learning more about the national language. The school has an elective Spanish subject, for the Grades 9 and 10. Curriculum The school is following the new curriculum by the Department of Education, the Enhanced K to 12 Curriculum, as of the school year 2012-2013 and Curricula of English, Science and Mathematics is enriched by additional subjects and electives prescribed in DepEd Order no. 49, s. 2003. Class Description A number of six (6) classes for each year level. Minimum of thirty (30) and", "-18.432351049701538" ], [ "founded to provide for the estimated 20% of Australians that speak a language other than English in the home, aiming to complement the ABC.\nIn recent years SBS TV has begun to target a broader cross-section of the Australian community, in part because of the emergence of specialty subscription television channels aimed at such minorities. In addition to its free-to-air channels, SBS also has an interest in the World Movies Channel.\nSBS shows many non-English language films with English subtitles, and each morning shows news bulletins in foreign languages from around the world in its WorldWatch timeslot. In addition to this, a", "-18.366034182632575" ], [ "Mathematics, Humanities and Food Technology Studies are taught in the second language. Spanish Technology Spanish Technology is a course aimed at Year 9 Spanish Immersion students. Through the use of technology, students communicate with pen-pals, exchanging\ninfo about an itinerary in a Spanish speaking country. Furthermore, they have opportunities to create their own recording, edit information and create surveys. The course is designed to provide students with the necessary research skills needed to navigate the Spanish web, use blogs in Spanish and create their own broadcast in Spanish. Health & Physical Education Health & Physical Education is a compulsory core subject", "-18.333525783729783" ], [ "that each visitor has to choose which presentation s/he would like to attend at each slot. Apart from language lessons, language festivals usually include introductory lectures on subjects related to languages and linguistics, as well as so-called \"language clubs\", which are places where visitors can speak to one another in a certain language, listen to music and see films in this language. Also, language festivals often include language concerts where songs in different languages are performed.\nThe presenters of the festival are by and large volunteers: language enthusiasts who agree to present one or more languages that they know without receiving", "-18.330249011865817" ], [ "for students who want to move to English-speaking countries, and other programs for students who do not intend to move but who want to understand English content for the purposes of education, entertainment, or conducting international business. The differences between these two models of English language education have grown larger over time, and teachers focusing on each model have used different terminology, received different training, and formed separate professional associations. English is also taught as a second language for recent immigrants to English-speaking countries, which faces separate challenges because the students in one class may speak many different native languages.", "-18.298718894457124" ], [ "English is the primary language of less than 10% of the population.\nPuerto Rican Spanish is the dominant language of business, education and daily life on the island. The US Census Bureau's 2015 update provides the following facts: 94.1% of adults speak Spanish, 5.8% speak only English,\n78.3% do not speak English \"very well\".\nPublic school instruction in Puerto Rico is conducted almost entirely in Spanish. There have been pilot programs in about a dozen of the over 1,400 public schools aimed at conducting instruction in English only. Objections from teaching staff are common, perhaps because many of them are not fully fluent", "-18.290819071437" ], [ "education ordered the exclusive use of the Spanish in the university.\nMany of the illustrated people, for the modernization of Spain, defended the implantation of education in other languages (French, English, Italian) in the centers, and the translation of outstanding works to Castilian. To the first were opposed those who defended the priority of the classic languages (Latin and Greek) as opposed to the modern ones, and to the second were opposed those who rejected the translations because they would introduce unnecessary foreign words in the Spanish language and would endanger its identity. Two positions arose thus: casticismo, that defended a", "-18.283674316946417" ], [ "whose primary language is not English are eligible for individualized instructional services. To be able to qualify for these services the student's parent or guardian has to indicate that the student's first language learned was a language other than English, the student must also score as having limited English proficiency on nationally normed assessments of their English skills in reading, writing, listening, and speaking. Athletics There are many different sports teams to choose from. The sports are offered in three different seasons Fall, Winter, and Spring. Fall Sports Fall sports include cheer team, cross country, football, boys'/girls' soccer, girls'", "-18.276433332721354" ], [ "education beyond the third grade.\nFinally Spanish was the language of instruction at every level. Critics blamed the absence of bilingual education (or intercultural bilingual education, respectively) for the high dropout rates among rural schoolchildren.", "-18.253862713070703" ], [ "used by language teachers in order to present students with recordings of native speakers’ voices, and broadcasts from foreign radio stations were used to make recordings on reel-to-reel tape recorders. Other examples of technological aids that have been used in the foreign language classroom include slide projectors, film-strip projectors, film projectors, videocassette recorders and DVD players. In the early 1960s, integrated courses (which were often described as multimedia courses) began to appear. Examples of such courses are Ecouter et Parler (consisting of a coursebook and tape recordings) and Deutsch durch die audiovisuelle Methode (consisting of an illustrated coursebook, tape recordings", "-18.25038491131272" ], [ "if the teacher assigned to a class chooses to use Spanish, or during the learning process of one or more recently arrived immigrant students. There is also some intergenerational shift towards Catalan.\nAccording to the Statistical Institute of Catalonia, in 2013 the Catalan language is the second most commonly used in Catalonia, after Spanish, as a native or self-defining language: 7% of the population self-identifies with both Catalan and Spanish equally, 36.4% with Catalan and 47.5% only Spanish. In 2003 the same studies concluded no language preference for self-identification within the population above 15 years old: 5% self-identified with both languages,", "-18.23507612897083" ], [ "Language (o ELSE from the Spanish, Español como Lengua Segunda y Extranjera), aiming to contribute to political and educational linguistics.\nBy June of the same year, three national universities (University of Buenos Aires (UBA), Universidad Litoral (UNL) and the University of Córdoba (UNC)) were working together to design and implement the first official examination to measure competence of Spanish as a foreign language. The exam is called CELU (Certificate of Use of Language in Spanish)) and was approved by Resolution 28 in January 2005. The Certification of Spanish Language and Use The CELU (Certificate of Use of Language in Spanish) is", "-18.23302193597192" ], [ "a language, which is Spanish, distanced as it is from the syncopated rhythm of English. It is for this reason perhaps that this translation will stand as a point of reference for a long time to come». García Tortosa on Joyce In an interview, the scholar had this to say about the Irish writer: «The difficulty with Joyce lies in how one needs to be highly realistic. If you meet someone in the street, that person does not open himself up completely to you. Little by little, in subsequent encounters, that person will start to reveal himself. And", "-18.22643057827372" ] ]
3giduh
How is pure mathematics researched?
[ "Pure mathematician here. Just to add to the comments below (or, will be below once you upvote this comment - zing!): Pure mathematics, as a discipline, originates from the process of successively abstracting the ideas of concrete math. In other words, it looks for the essential structural features that make concrete math \"work,\" without the nonessential, context clues that make it concrete. Think of it like building a taxonomy of the animal kingdom by studying a bunch of animals, classifying them into categories based on their common features, then classifying those categories into categories based on *their* common features, and so on. For example, one path in mathematics might be Euclidean geometry - > [inner product functions]( URL_5 ) - > [norm functions]( URL_3 ) - > [metrics or distance functions]( URL_1 ) - > [topologies]( URL_0 ) - > [sets]( URL_2 ) - > [foundational axioms]( URL_4 ). At each step, \"structure is lost,\" meaning that you sacrifice some of the special properties of each for the sake of putting concepts into successively bigger groups, like squares passing to rectangles passing to quadrilaterals to polygons, or bumblebees passing to bees passing to order hymenoptera to class insecta. Anyway, the \"facts\" which hold these classifications together and connect among them are called theorems, which in order to be accepted must be able to be logically deduced from the accepted theorems \"above it\" in abstraction. For example, you can prove a statement about squares using facts about rectangles, but not vice versa. (That's what makes it deductive reasoning.) The thing is, just like we could discover a new species of bee tomorrow, we could discover some new fact about a mathematical system that hasn't yet been deduced. Or, perhaps more commonly, we could discover a proof -- pure math's standard of demonstrating logical deduction -- for something that mathematicians \"believe\" to be true based on their knowledge of the field. How would you do that? The same way you discover a new species of bee: get familiar enough with all the existing species so that you can spot the one specimen that doesn't fit the pattern, or a new pattern that no one has spotted before. In math this means immersing yourself in all the recently discovered theorems in your field, looking at how their knowledge was constructed from more general and related principles. And then go immerse yourself in those more general and related theories to understand how they work. And so on. Naturally, you typically have to start with learning a lot of general knowledge in the field, growing more specialized as you go. And then, reading a paper, you spot a theorem that you can take one step further down the line. From a logical perspective, this usually takes the form of a hypothesis you can weaken (\"All red squares are rectangles...\" Wait a minute, they don't need to be red!) or a conclusion you can strengthen (\"All squares are quadrilaterals...\" Wait a minute, they're more specifically rectangles!) And then you embark upon constructing a proof, borrowing recent results as well as general knowledge and often a stroke of insight and creativity to form the logical scaffold of the work. You write up your proof, submit it for publication, present it at conferences, teach it to your graduate students, rinse, and repeat. The last paragraph is probably an answer to what you were asking - the \"process\" of pure math research is difficult to describe because it is so often a slow, deliberative, and creatively frustrating search for the right pieces and the right way to put them together, like being in a room full of mismatched puzzle pieces and trying to put together a picture of the specific dog you had as a child. It can be years of labor for small amounts of progress, and there's no accepted procedure, just as there's no fixed procedure for designing great sculpture. But at least from my end, the few rewards pale in comparison to the thrill of the hunt. If you have the chance to pursue pure math even for a while in university, take it! TL;DR: Boil math down to its essential features. Look for hypotheses to weaken or conclusions to strengthen, and try to prove it.", "You pick a problem. Here are some for you: URL_0 You then try to break it down into smaller problems. Maybe you try solving a 2D version of a 3D problem. If you solve the smaller problem you write a paper on it. Most problems are solved bit by bit by mathematicians all over the world.", "Researchers choose a problem, perhaps a conjecture that it would be cool if we could prove, and they try to find out if it is never true/always true/sometimes true. Depending on what they can prove, they might be able to refine an idea and prove it's always true subject to defined constraints.", "* think up a concept that seems somehow interesting. Example: natural numbers. * formalize it as a small number of axioms (things you just assume to be true because they describe the basic properties of your concept). Try to make them as few and as simple as possible. Example: the Peano axioms. * play around with the concept, notice interesting properties, define them formally and give them names. Example: divisibility and prime numbers. * notice that there seems to be a rule that is non-obvious - that's a theorem. Example: every number is a unique product of prime numbers (aka t-he fundamental theorem of arithmetic). * formally prove or disprove that theorem based only on the axioms or other theorems that have already been proven. * find another theorem and repeat, if necessary first make up some more definitions.", "Adding onto other comments in this thread, a lot of discoveries in mathematics arise from mathematicians 'playing around' with stuff, like knots or shapes and trying to boil them down to fundamental rules.", "While this may not be the answer you are looking for, if you're interested in maths, I cannot recommend the Numberphile YouTube channel enough. Look up the \"astounding -1/12\" video. Blew my mind, and have been hooked ever since. You can also check out r/bradyharan, the dude behind this, and many other, very interesting channels.", "It stems from axioms, or \"self-apparent\" truths. I am not a mathematician (and this example has been disproved by non-euclidean math) - but the gist is \"What is the shortest line between two points\". Similar concepts make the foundation upon which mathematical knowledge is built. And that is how I would describe it to my niece - follow up questions are of course welcome!" ]
[ [ "Mathematical sciences The mathematical sciences are a group of areas of study that includes, in addition to mathematics, those academic disciplines that are primarily mathematical in nature but may not be universally considered subfields of mathematics proper.\nStatistics, for example, is mathematical in its methods but grew out of scientific observations which merged with inverse probability and grew through applications in the social sciences, some areas of physics and biometrics to become its own separate, though closely allied field. Computer science, computational science, data science, population genetics, operations research, control theory, cryptology, econometrics, theoretical physics, fluid mechanics, chemical reaction network theory", "-35.06176171055995" ], [ "study, and use of mathematical models in science, engineering, business, and other areas of mathematical practice. Abstract mathematics Pure mathematics is mathematics that studies entirely abstract concepts. From the eighteenth century onwards, this was a recognized category of mathematical activity, sometimes characterized as speculative mathematics, and at variance with the trend towards meeting the needs of navigation, astronomy, physics, economics, engineering, and other applications.\nAnother insightful view put forth is that pure mathematics is not necessarily applied mathematics: it is possible to study abstract entities with respect to their intrinsic nature, and not be concerned with how they manifest in the", "-34.02195172528445" ], [ "Exact sciences The exact sciences, sometimes called the exact mathematical sciences are those sciences \"which admit of absolute precision in their results\"; especially the mathematical sciences. Examples of the exact sciences are mathematics, optics, astronomy, and physics, which many philosophers from Descartes, Leibniz, and Kant to the logical positivists took as paradigms of rational and objective knowledge. These sciences have been practiced in many cultures from Antiquity to modern times. Given their ties to mathematics, the exact sciences are characterized by accurate quantitative expression, precise predictions and/or rigorous methods of testing hypotheses involving quantifiable predictions", "-33.35098009405192" ], [ "Pure Math., Statistics and Computer Sciences. Department of Applied Mathematics is active in Mathematical Modeling, Numerical Analysis and Optimization. The research areas in the Department of Pure Mathematics include Algebra (Group Theory and Non Commutative Algebra), Analysis (Harmonic and Functional Analysis), Dynamical systems, Topology-Geometry (Algebraic and Differential), and Logic. Department of Statistics is actively involved in Spatial and Environmental Statistics, Statistical Shape Analysis, Multilevel Data Analysis, Bayesian Inference and Official Statistics.\nDepartments of Pure Math., Applied Math and Statistics offer admission to students in M. Sc. and Ph. D programs.\nDepartment of Computer Sciences active in image processing, machine learning, Data mining", "-33.339772798659396" ], [ "Mathematics Mathematics (from Greek μάθημα máthēma, \"knowledge, study, learning\") includes the study of such topics as quantity (number theory), structure (algebra), space (geometry), and change (mathematical analysis). It has no generally accepted definition.\nMathematicians seek and use patterns to formulate new conjectures; they resolve the truth or falsity of conjectures by mathematical proof. When mathematical structures are good models of real phenomena, then mathematical reasoning can provide insight or predictions about nature. Through the use of abstraction and logic, mathematics developed from counting, calculation, measurement, and the systematic study of the shapes and motions of physical objects. Practical mathematics has been", "-33.2170950188156" ], [ "pure mathematical research The American Mathematical Society publishes a code of ethical guidelines for mathematical researchers. The responsibilities of researchers include being knowledgeable in the field, avoiding plagiarism and giving credit, to publish without unreasonable delay, and to correct errors. The European Mathematical Society Ethics Committee also publishes a code of practice relating to the publication, editing and refereeing of research.\nIt has been argued that as pure mathematical research is relatively harmless, it raises few urgent ethical issues. However, that raises the question of whether and why pure mathematics is ethically worth doing, given that it consumes the lives of", "-33.06806752369448" ], [ "Mathematical Institute, University of Oxford Overview The Oxford Mathematical Institute includes both pure and applied mathematics (Statistics is a separate department) and is one of the largest and most respected mathematics departments in the UK with about 100 faculty members, and was ranked as the top mathematics department in the UK in the 2014 UK Research Evaluation Framework. Research at the Mathematical Institute covers all branches of mathematical sciences ranging from, for example, algebra, number theory, and geometry to the application of mathematics to a wide range of fields including industry, finance, climate modelling, networks and the brain. It has", "-32.97212683223188" ], [ "real world. Even though the pure and applied viewpoints are distinct philosophical positions, in practice there is much overlap in the activity of pure and applied mathematicians.\nTo develop accurate models for describing the real world, many applied mathematicians draw on tools and techniques that are often considered to be \"pure\" mathematics. On the other hand, many pure mathematicians draw on natural and social phenomena as inspiration for their abstract research. Consulting Many careers in mathematics outside of universities involve consulting. For instance, actuaries assemble and analyze data to estimate the probability and likely cost of the occurrence of an event", "-32.87850165357668" ], [ "Herchel Smith Professor of Pure Mathematics The Herchel Smith Professorship of Pure Mathematics is a professorship in pure mathematics at the University of Cambridge. It was established in 2004 by a benefaction from Herchel Smith \"of £14.315m, to be divided into five equal parts, to support the full endowment of five Professorships in the fields of Pure Mathematics, Physics, Biochemistry, Molecular Biology, and Molecular Genetics.\" When the position was advertised in 2004, the first holder was expected to focus on mathematical analysis.", "-32.61745887785219" ], [ "Pure mathematics Pure mathematics is the study of mathematical concepts independently of any application outside mathematics. These concepts may originate in real-world concerns, and the results obtained may later turn out to be useful for practical applications, but pure mathematicians are not primarily motivated by such applications. Instead, the appeal is attributed to the intellectual challenge and aesthetic beauty of working out the logical consequences of basic principles.\nWhile pure mathematics has existed as an activity since at least Ancient Greece, the concept was elaborated upon around the year 1900, after the introduction of theories with counter-intuitive properties (such as non-Euclidean", "-32.36721983196185" ], [ "then became the subject of study in pure mathematics, where mathematics is developed primarily for its own sake. Thus, the activity of applied mathematics is vitally connected with research in pure mathematics. Statistics and other decision sciences Applied mathematics has significant overlap with the discipline of statistics, whose theory is formulated mathematically, especially with probability theory. Statisticians (working as part of a research project) \"create data that makes sense\" with random sampling and with randomized experiments; the design of a statistical sample or experiment specifies the analysis of the data (before the data be available). When reconsidering data from experiments", "-32.25625619897619" ], [ "are numerical data, with their units of measure and estimates of the errors in the measurements. Technologies based on mathematics, like computation have made computational physics an active area of research.\nOntology is a prerequisite for physics, but not for mathematics. It means physics is ultimately concerned with descriptions of the real world, while mathematics is concerned with abstract patterns, even beyond the real world. Thus physics statements are synthetic, while mathematical statements are analytic. Mathematics contains hypotheses, while physics contains theories. Mathematics statements have to be only logically true, while predictions of physics statements must match observed and experimental data.\nThe", "-31.736014874906687" ], [ "Proceedings of the American Mathematical Society Scope Proceedings of the American Mathematical Society publishes articles from all areas of pure and applied mathematics, including topology, geometry, analysis, algebra, number theory, combinatorics, logic, probability and statistics.", "-31.650791294698138" ], [ "pure mathematics. History Historically, applied mathematics consisted principally of applied analysis, most notably differential equations; approximation theory (broadly construed, to include representations, asymptotic methods, variational methods, and numerical analysis); and applied probability. These areas of mathematics related directly to the development of Newtonian physics, and in fact, the distinction between mathematicians and physicists was not sharply drawn before the mid-19th century. This history left a pedagogical legacy in the United States: until the early 20th century, subjects such as classical mechanics were often taught in applied mathematics departments at American universities rather than in physics departments, and fluid", "-31.540713579626754" ], [ "pure and applied mathematics. A notable exception to this is the Department of Applied Mathematics and Theoretical Physics at the University of Cambridge, housing the Lucasian Professor of Mathematics whose past holders include Isaac Newton, Charles Babbage, James Lighthill, Paul Dirac and Stephen Hawking.\nSchools with separate applied mathematics departments range from Brown University, which has a large Division of Applied Mathematics that offers degrees through the doctorate, to Santa Clara University, which offers only the M.S. in applied mathematics. Research universities dividing their mathematics department into pure and applied sections include MIT. Brigham Young University also has an Applied", "-31.502911449759267" ], [ "as well as the mathematics of computation (for example, theoretical computer science, computer algebra, numerical analysis). Statistics is probably the most widespread mathematical science used in the social sciences, but other areas of mathematics, most notably economics, are proving increasingly useful in these disciplines. Status in academic departments Academic institutions are not consistent in the way they group and label courses, programs, and degrees in applied mathematics. At some schools, there is a single mathematics department, whereas others have separate departments for Applied Mathematics and (Pure) Mathematics. It is very common for Statistics departments to be separated", "-31.49160248960834" ], [ "Mathematics and Natural Science The Department of Mathematics and Natural Science has emerged from the Faculty of Mathematics, Natural Science and Technical Basic Sciences of the HfE. At present, it comprises the Institutes of Mathematics, Physics, Chemistry and Biotechnique as well as Media and Communications. It is in charge of the graduate courses of study of Mathematics, Technical Physics and Applied Media Science. Furthermore, it is responsible for the basic training of the students required for other courses of study in mathematics, physics and chemistry. Department of Economic Sciences and Media The Department of Economic Sciences and Media opened in", "-31.44451802346157" ], [ "Faculty of Mathematics, University of Cambridge The Faculty of Mathematics at the University of Cambridge comprises the Department of Pure Mathematics and Mathematical Statistics (DPMMS) and the Department of Applied Mathematics and Theoretical Physics (DAMTP). It is housed in the Centre for Mathematical Sciences site in West Cambridge, alongside the Isaac Newton Institute. Many distinguished mathematicians have been members of the faculty. Pure Mathematics and Mathematical Statistics The Department of Pure Mathematics and Mathematical Statistics (DPMMS) was created in 1964 under the headship of Sir William Hodge. It was housed in a converted warehouse at 16 Mill Lane, adjacent", "-31.41855113185011" ], [ "increase in the rate of mathematical discovery that has continued to the present day.\nMathematics is essential in many fields, including natural science, engineering, medicine, finance, and the social sciences. Applied mathematics has led to entirely new mathematical disciplines, such as statistics and game theory. Mathematicians engage in pure mathematics (mathematics for its own sake) without having any application in mind, but practical applications for what began as pure mathematics are often discovered later. History The history of mathematics can be seen as an ever-increasing series of abstractions. The first abstraction, which is shared by many animals, was probably that of", "-31.389132663127384" ], [ "Mathematical research is not just a scientific approach; the nature of mathematics is sometimes close to that of art. Some people want individual character and an individual way of working things out. They should be appreciated too. There should be room for single research and collaborative research».\nChang's life was profiled in the 2017 documentary film Girls who fell in love with Math.", "-31.24879303679336" ], [ "A Mathematician's Lament Background This book was developed from a 25-page essay that was written in 2002, originally circulated in typewritten manuscript copies, and subsequently published by Keith Devlin on his online column for the Mathematical Association of America's webzine MAA Online. Quote \"The first thing to understand is that mathematics is an art. The difference between math and the other arts, such as music and painting, is that our culture does not recognize it as such.\" [p. 22]", "-31.163783174328273" ], [ "Mathematical analysis Mathematical analysis is the branch of mathematics dealing with limits\nand related theories, such as differentiation, integration, measure, infinite series, and analytic functions.\nThese theories are usually studied in the context of real and complex numbers and functions. Analysis evolved from calculus, which involves the elementary concepts and techniques of analysis.\nAnalysis may be distinguished from geometry; however, it can be applied to any space of mathematical objects that has a definition of nearness (a topological space) or specific distances between objects (a metric space). History Mathematical analysis formally developed in the 17th century during the Scientific Revolution, but many", "-31.16212999325944" ], [ "distinction is clear-cut, but not always obvious. For example, mathematical physics is the application of mathematics in physics. Its methods are mathematical, but its subject is physical. The problems in this field start with a \"mathematical model of a physical situation\" (system) and a \"mathematical description of a physical law\" that will be applied to that system. Every mathematical statement used for solving has a hard-to-find physical meaning. The final mathematical solution has an easier-to-find meaning, because it is what the solver is looking for.\nPure physics is a branch of fundamental science (also called basic science) . Physics is also", "-31.03637684043497" ], [ "(BA) degree in Mathematics. It consists of a wide variety of courses in pure and applied mathematics taught by a distinguished faculty with a tradition of excellence in teaching and research. Students in advanced coursework often participate in formulating models outside the field of mathematics as well as in analyzing them. For example, an advanced mathematics course in Computers in Medicine and Biology requires a student to construct two computer models selected from the following list: circulation, gas exchange in the lung, control of cell volume, and the renal countercurrent mechanism. The student uses the models to conduct simulated physiological", "-31.034567735972814" ], [ "and “physicist” are becoming ever more vague. It seems plausible that in 100 years we will no longer speak of mathematicians as such but rather of mathematical scientists. It would not be at all surprising if the notion of “Department of Mathematics” at the college and university level gives way to “Division of Mathematical Sciences”.\" Experimental mathematics Experimental mathematics is the use of computers to generate large data sets within which to automate the discovery of patterns which can then form the basis of conjectures and eventually new theory. The paper \"Experimental Mathematics: Recent Developments and Future Outlook\" describes expected", "-30.89231110701803" ], [ "have adopted elements of scientific computations. Ordinary differential equations appear in celestial mechanics (planets, stars and galaxies); numerical linear algebra is important for data analysis; stochastic differential equations and Markov chains are essential in simulating living cells for medicine and biology. Applications Techniques from analysis are also found in other areas such as: Physical sciences The vast majority of classical mechanics, relativity, and quantum mechanics is based on applied analysis, and differential equations in particular. Examples of important differential equations include Newton's second law, the Schrödinger equation, and the Einstein field equations.\nFunctional analysis is also a major factor in quantum", "-30.82679572240886" ], [ "Professor of Mathematical Statistics (Cambridge) The Professorship of Mathematical Statistics at the University of Cambridge was established in 1961 with the support of the Royal Statistical Society and the aid of donations from various companies and banks. It was the first professorship in the Statistical Laboratory, and the first in Cambridge University explicitly intended for the study of statistics. Until 1973 the Professor was ex officio Director of the Statistical Laboratory.", "-30.782965435209917" ], [ "linear algebra. Applied mathematics is also used in specific majors; for example, civil engineers may be required to study fluid mechanics, while \"math for computer science\" might include graph theory, permutation, probability, and proofs. Mathematics students would continue to study potentially any area. Standards Throughout most of history, standards for mathematics education were set locally, by individual schools or teachers, depending on the levels of achievement that were relevant to, realistic for, and considered socially appropriate for their pupils.\nIn modern times, there has been a move towards regional or national standards, usually under the umbrella of a wider standard", "-30.72856379696168" ], [ "Philosophy of mathematics The philosophy of mathematics is the branch of philosophy that studies the assumptions, foundations, and implications of mathematics. It aims to understand the nature and methods of mathematics, and finding out the place of mathematics in people's lives. The logical and structural nature of mathematics itself makes this study both broad and unique among its philosophical counterparts. History The origin of mathematics is subject to arguments and disagreements. Whether the birth of mathematics was a random happening or induced by necessity duly contingent upon other subjects, say for example physics, is still a matter of prolific debates.\nMany", "-30.428617651807144" ], [ "linear algebra, and a year of calculus-based probability and statistics. In the United States, a master program in statistics requires courses in probability, mathematical statistics, and applied statistics (e.g., design of experiments, survey sampling, etc.).\nFor a doctoral degree in statistics, it has been traditional that students complete a course in measure-theoretic probability as well as courses in mathematical statistics. Such courses require a good course in real analysis, covering the proofs of the theory of calculus and topics like the uniform convergence of functions. In recent decades, some departments have discussed allowing doctoral students to waive the course", "-30.38159355893731" ], [ "sections that include a division of Science and Mathematics, indicating that the fields are seen as being allied but that they do not coincide. In practice, mathematicians are typically grouped with scientists at the gross level but separated at finer levels. This is one of many issues considered in the philosophy of mathematics. Inspiration, pure and applied mathematics, and aesthetics Mathematics arises from many different kinds of problems. At first these were found in commerce, land measurement, architecture and later astronomy; today, all sciences suggest problems studied by mathematicians, and many problems arise within mathematics itself. For example, the physicist", "-30.343164554797113" ], [ "Science is a way of seeking only new mathematics, if all of that correspond.\nOn the view of modern mathematics, It have thought that to solve a mathematical problem be able to reduced formally to an operation of symbol that restricted by the certain rules like chess (or shogi, or go). On this meaning, Wittgenstein interpret the mathematics to a language game (de:Sprachspiel). So a mathematical problem that not relation to real problem is proposed or attempted to solve by mathematician. And it may be that interest of studying mathematics for the mathematician himself (or herself) made much than newness or", "-30.32537711272016" ], [ "Mathematics is sometimes called the \"Science of Pattern\", in the sense of rules that can be applied wherever needed. For example, any sequence of numbers that may be modeled by a mathematical function can be considered a pattern. Mathematics can be taught as a collection of patterns. Fractals Some mathematical rule-patterns can be visualised, and among these are those that explain patterns in nature including the mathematics of symmetry, waves, meanders, and fractals. Fractals are mathematical patterns that are scale invariant. This means that the shape of the pattern does not depend on how closely you look at it. Self-similarity", "-30.321661608557406" ], [ "mission of the Faculty of Sciences and Mathematics is to deliver top-notch education in the areas of natural and mathematical sciences, thereby providing primary and secondary schools, institutes, companies, and industry with qualified teachers, researchers, and engineers who will be able to respond to the ever-growing scientific, technological, and research challenges.\nThe vision of the Faculty of Sciences and Mathematics is to reach the level of a developed institution of higher learning in its own fields of study so that the achieved quality would guarantee the Faculty the status of a developed European institution and open the possibility of it becoming", "-30.24809451936744" ], [ "The Mathematical Experience The Mathematical Experience (1981) is a book by Philip J. Davis and Reuben Hersh that discusses the practice of modern mathematics from a historical and philosophical perspective. The book discusses the psychology of mathematicians, and gives examples of famous proofs and outstanding problems. It goes on to speculate about what a proof really means, in relationship to actual truth. Other topics include mathematics in education and some of the math that occurs in computer science.\nThe first paperback edition won a U.S. National Book Award in Science. It is cited by some mathematicians as influential in their decision", "-30.203039378509857" ], [ "mathematics, the advanced level is in practice a prerequisite for the more competitive university science programs, such as those of the universities of technology, other university mathematical science programs, and medicine. In mathematics, 20% of the matriculation examinees take the advanced level. The nationwide matriculation exam together with entirely percentile-based grading provides an easy way to objectively classify each student based on their mathematical ability, regardless of the year when the exam was taken. For example, assuming that the best mathematical students are selected first to the upper academic school and then to the advanced mathematics curriculum, the students achieving", "-30.187089965242194" ], [ "in Control, Dynamics, and Systems: Overview, Grand Challenges, and New Courses\". Mathematical biology Mathematical biology is one of the fastest expanding areas of mathematics at the beginning of the 21st century. \"Mathematics Is Biology's Next Microscope, Only Better; Biology Is Mathematics' Next Physics, Only Better\" is an essay by Joel E. Cohen. Mathematical physics Mathematical physics is an enormous and diverse subject. Some indications of future research directions are given in \"New Trends in Mathematical Physics: Selected Contributions of the XVth International Congress on Mathematical Physics\".", "-30.06044970441144" ], [ "just list the hypotheses, and then start to reason. What you do is trial and error, experimentation, guesswork. You want to find out what the facts are, and what you do is in that respect similar to what a laboratory technician does.\" History Mathematicians have always practised experimental mathematics. Existing records of early mathematics, such as Babylonian mathematics, typically consist of lists of numerical examples illustrating algebraic identities. However, modern mathematics, beginning in the 17th century, developed a tradition of publishing results in a final, formal and abstract presentation. The numerical examples that may have led a mathematician to originally", "-30.016406291804742" ], [ "causation. Philosophy of mathematics Philosophy of mathematics is concerned with the philosophical foundations and implications of mathematics. The central questions are whether numbers, triangles, and other mathematical entities exist independently of the human mind and what is the nature of mathematical propositions. Is asking whether \"1+1=2\" is true fundamentally different from asking whether a ball is red? Was calculus invented or discovered? A related question is whether learning mathematics requires experience or reason alone. What does it mean to prove a mathematical theorem and how does one know whether a mathematical proof is correct? Philosophers of mathematics also aim to", "-29.978582313953666" ], [ "four departments. Department of Mathematical Sciences The head of the Department of Mathematical Sciences is Mrs.G.S. Fransico. Logical and creative thinking are the fundamental approaches for effective and efficient problem solving for continual impartment.\nTherefore, the main objective of the Department of Mathematical Sciences is to develop thinking power to obtain the required outcomes intended from any system.\nTo achieve the main objective of the Department of Mathematics & Mathematical Modeling and Statistics as two subject areas. These subject areas will include secure communication, actuarial science leading to insurance and banking, data analysis, sampling methods, designing experiments, addressing current issues, linear and", "-29.971694614505395" ], [ "a professorship at New York University in New York City. There he founded an institute for graduate studies in applied mathematics. The Courant Institute of Mathematical Sciences (as it was renamed in 1964) is now one of the most respected research centers in applied mathematics.\nCourant and David Hilbert authored the influential textbook Methoden der mathematischen Physik which, with its revised editions, is still current and widely used since its publication in 1924. With Herbert Robbins he coauthored a popular overview of higher mathematics, intended for the general public, titled What is Mathematics?. With Fritz John he also coauthored the two-volume", "-29.898199058166938" ], [ "and actuarial science are other fields that may be considered part of mathematical sciences.\nSome institutions offer degrees in mathematical sciences (e.g. the United States Military Academy, Stanford University, and University of Khartoum) or applied mathematical sciences (e.g. the University of Rhode Island).", "-29.89736208622344" ], [ "For the formalists, mathematics, and particularly geometry, is divided into two parts: the pure and the applied. The first part consists in an uninterpreted axiomatic system, or syntactic calculus, in which terms such as point, straight line and between (the so-called primitive terms) have their meanings assigned to them implicitly by the axioms in which they appear. On the basis of deductive rules eternally specified in advance, pure geometry provides a set of theorems derived in a purely logical manner from the axioms. This part of mathematics is therefore a priori but devoid of any empirical meaning, not synthetic in", "-29.870014686137438" ], [ "Encyclopedia of Mathematics (James Tanton) Synopsis The book has over 1000 entries, which discuss various concepts, definitions, people, and theorems that pertain to mathematics. The book also contains six essays that discuss the various branches of mathematics and their history. Reception Booklist praised the book as a useful \"basic resource for students who wish to have a better understanding of simple or not-so--simple mathematical concepts\" and the School Library Journal called the encyclopedia \"comprehensive\".", "-29.868973610935427" ], [ "mathematics programme, often to avoid the advanced pure and applied mathematics courses. My view is that statistics as a theoretical discipline is better taught late rather than early, whereas statistics as part of scientific methodology should be taught as part of science.\"\nIn the United Kingdom, the teaching of statistics at university level was originally done within science departments that needed the topic to accompany the teaching of their own subjects, and departments of mathematics had limited coverage before the 1930s. For the twenty years subsequent to this, while departments of mathematics had started to teach statistics, there was little realisation", "-29.866439898702083" ], [ "mathematical sciences.", "-29.854114884888986" ], [ "Matha Etymology A matha (Sanskrit: मठ) refers to \"cloister, institute or college\", and in some contexts refers to \"hut of an ascetic, monk or renunciate\" or temple for studies. The root of the word is math, which means \"inhabit\" or \"to grind\". Historical roles of matha The matha tradition of Hinduism attracted royal patronage, attracting endowments to support studies, and these endowments established, states Hartmut Scharfe, what may be \"the earliest case on record of a university scholarship\". Some of these medieval era mathas of Hinduism in Andhra Pradesh, Karnataka, Kerala and Tamil Nadu, were for Vedanta studies, but some", "-29.849264237447642" ], [ "laws in the natural and social sciences. For example, it is used in quantitative scientific modeling, which can generate new hypotheses and predictions to be tested. It is also used extensively in observing and collecting measurements. Statistics, a branch of mathematics, is used to summarize and analyze data, which allow scientists to assess the reliability and variability of their experimental results.\nComputational science applies computing power to simulate real-world situations, enabling a better understanding of scientific problems than formal mathematics alone can achieve. According to the Society for Industrial and Applied Mathematics, computation is now as important as theory and experiment", "-29.848114989232272" ], [ "includes mathematics, systems theory, and theoretical computer science. The formal sciences share similarities with the other two branches by relying on objective, careful, and systematic study of an area of knowledge. They are, however, different from the empirical sciences as they rely exclusively on deductive reasoning, without the need for empirical evidence, to verify their abstract concepts. The formal sciences are therefore a priori disciplines and because of this, there is disagreement on whether they actually constitute a science. Nevertheless, the formal sciences play an important role in the empirical sciences. Calculus, for example, was initially invented to understand motion", "-29.84277187520638" ], [ "the nature of mathematics related to the humanities and the arts. It was chosen by the staff editors as one of their favorite opeds of the year.", "-29.80727690425556" ], [ "required 500-odd journal articles by about 100 authors, and filling tens of thousands of pages. A group of French mathematicians, including Jean Dieudonné and André Weil, publishing under the pseudonym \"Nicolas Bourbaki\", attempted to exposit all of known mathematics as a coherent rigorous whole. The resulting several dozen volumes has had a controversial influence on mathematical education.\nDifferential geometry came into its own when Einstein used it in general relativity. Entirely new areas of mathematics such as mathematical logic, topology, and John von Neumann's game theory changed the kinds of questions that could be answered by mathematical methods. All kinds of", "-29.77272197493585" ], [ "mathematics involves nonclassical logics and constructive mathematics. The study of constructive mathematics includes many different programs with various definitions of constructive. At the most accommodating end, proofs in ZF set theory that do not use the axiom of choice are called constructive by many mathematicians. More limited versions of constructivism limit themselves to natural numbers, number-theoretic functions, and sets of natural numbers (which can be used to represent real numbers, facilitating the study of mathematical analysis). A common idea is that a concrete means of computing the values of the function must be known before the function itself can be", "-29.758813866603305" ], [ "to include asymptotic, variational, and perturbative methods, representations, numerical analysis); Fourier analysis; potential theory; as well as linear algebra and applied probability, outside of analysis. These areas of mathematics were intimately tied to the development of Newtonian physics, and the mathematical physics of that period. This history also left a legacy: until the early 20th century subjects such as classical mechanics were often taught in applied mathematics departments at American universities, and fluid mechanics may still be taught in (applied) mathematics as well as engineering departments.\nThe success of modern numerical computer methods and software has led to the", "-29.758808333368506" ], [ "Mathematics is to play a role in the discovery of formal proofs, not to displace them.\nIn recent years a number of other research journals in pure mathematics have substantially expanded their coverage of experimental mathematics and new journals devoted in large part to experimental mathematics have been launched. Thus, in 1998 the London Mathematical Society launched LMS Journal of Computation and Mathematics and in 2004 the Journal of Algebra started a new section called \"Computational Algebra\". LMS Journal of Computation and Mathematics was closed to new submissions in October 2015.\nDespite the initial controversy, Experimental Mathematics quickly established a solid reputation", "-29.696340418449836" ], [ "open to papers covering a broad spectrum of topics employing a variety of types of mathematics, especially through frequent special issues. Other journals in sociology who publish papers with substantial use of mathematics are Computational and Mathematical Organization Theory, Journal of social structure, Journal of Artificial Societies and Social Simulation \nArticles in Social Networks, a journal devoted to social structural analysis, very often employ mathematical models and related structural data analyses. In addition – importantly indicating the penetration of mathematical model building into sociological research – the major comprehensive journals in sociology, especially The American Journal of Sociology and", "-29.613474182784557" ], [ "Mathematical chemistry Mathematical chemistry is the area of research engaged in novel applications of mathematics to chemistry; it concerns itself principally with the mathematical modeling of chemical phenomena. Mathematical chemistry has also sometimes been called computer chemistry, but should not be confused with computational chemistry.\nMajor areas of research in mathematical chemistry include chemical graph theory, which deals with topology such as the mathematical study of isomerism and the development of topological descriptors or indices which find application in quantitative structure-property relationships; and chemical aspects of group theory, which finds applications in stereochemistry and quantum chemistry.\nThe history of the approach may", "-29.608233067730907" ], [ "Graduate Texts in Mathematics Graduate Texts in Mathematics (GTM) (ISSN 0072-5285) is a series of graduate-level textbooks in mathematics published by Springer-Verlag. The books in this series, like the other Springer-Verlag mathematics series, are yellow books of a standard size (with variable numbers of pages). The GTM series is easily identified by a white band at the top of the book.\nThe books in this series tend to be written at a more advanced level than the similar Undergraduate Texts in Mathematics series, although there is a fair amount of overlap between the two series in terms of material", "-29.60289751086384" ], [ "and a graduate program in Mathematics, Physics, Chemistry, Biology, History, Philology. In addition, a doctoral degree program in Mathematics is offered.", "-29.561429483175743" ], [ "cognitively in examination of the interplay of syntactic structures, figurative language, and other elements of the poem that work to produce its larger effects. Mathematics Modern mathematical analysis is the study of infinite processes. It is the branch of mathematics that includes calculus. It can be applied in the study of classical concepts of mathematics, such as real numbers, complex variables, trigonometric functions, and algorithms, or of non-classical concepts like constructivism, harmonics, infinity, and vectors.\nFlorian Cajori explains in A History of Mathematics (1893) the difference between modern and ancient mathematical analysis, as distinct from logical analysis, as follows:\nThe terms", "-29.55613449442899" ], [ "research and teaching standards in this area remain at the highest level. The department as exchange agreements with renowned universities like the Carnegie Mellon University in the United States, the Seoul National University in South Korea or the National University of Singapore and maintains a highly international student body with more than 27% of students coming from abroad. Department of Mathematics The Institute of Mathematics consists of eleven Chairs and 22 Professorships that focus on classical mathematical disciplines as well as on economic and practical-oriented fields of mathematics. The main areas of research include Algebra, Analysis, Geometry, Stochastics and Mathematical", "-29.55203578295186" ], [ "and seek to study nature must first, in Galileo's view, fully understand mathematics. Mathematicians, conversely, have sought to interpret and analyse art through the lens of geometry and rationality. The mathematician Felipe Cucker suggests that mathematics, and especially geometry, is a source of rules for \"rule-driven artistic creation\", though not the only one. Some of the many strands of the resulting complex relationship are described below. Mathematics as an art The mathematician Jerry P. King describes mathematics as an art, stating that \"the keys to mathematics are beauty and elegance and not dullness and technicality\", and that beauty is the", "-29.540905400179327" ], [ "A Course of Pure Mathematics Contents The book contains a large number of descriptive and study materials together with a number of difficult problems with regards to number theory analysis. The book is organized into the following chapters, with each chapter further divided.\nI. REAL VARIABLES\nII. FUNCTIONS OF REAL VARIABLES\nIII COMPLEX NUMBERS\nIV LIMITS OF FUNCTIONS OF A POSITIVE INTEGRAL VARIABLE\nV LIMITS OF FUNCTIONS OF A CONTINUOUS VARIABLE. CONTINUOUS AND DISCONTINUOUS FUNCTIONS\nVI DERIVATIVES AND INTEGRALS\nVII ADDITIONAL THEOREMS IN THE DIFFERENTIAL AND INTEGRAL CALCULUS\nVIII THE CONVERGENCE OF INFINITE SERIES AND INFINITE INTEGRALS\nIX THE LOGARITHMIC, EXPONENTIAL AND CIRCULAR FUNCTIONS OF A REAL VARIABLE\nX THE", "-29.53638314292766" ], [ "The Foundations of Arithmetic Psychologistic accounts of mathematics Frege objects to any account of mathematics based on psychologism, that is the view that math and numbers are relative to the subjective thoughts of the people who think of them. According to Frege, psychological accounts appeal to what is subjective, while mathematics is purely objective: mathematics are completely independent from human thought. Mathematical entities, according to Frege, have objective properties regardless of humans thinking of them: it is not possible to think of mathematical statements as something that evolved naturally through human history and evolution. He sees a fundamental distinction between", "-29.51425498747267" ], [ "in Chemical analyses. The Department has three programs, Bachelor of Science in Chemistry, Bachelor of Science in Chemistry Minor in Business and Bachelor of Science in Biochemistry. Mathematics Established in 1946, the Department of Mathematics trains its students in logical thought, critical analysis, imagination, and problem solving. It also handles graduate and undergraduate courses in the College of Business and Economics, Liberal Arts and Education. It was awarded as a center of excellence by the CHED. Physics The Department of Physics was recognized by the CHED as a Center of Excellence. The Department caters to a variety of interests in", "-29.499207592889434" ], [ "Master in Data Science Overview As an area of expertise and field, data science is defined as a \"concept to unify statistics, data analysis and their related methods\" in order to \"understand and analyze actual phenomena\" with data. It employs techniques and theories drawn from many fields within the broad areas of mathematics, statistics, information science, and computer science, in particular from the subdomains of machine learning, classification, cluster analysis, data mining, databases, and visualization.\nThe degree is relatively new, with graduate schools, business schools, and data science centers often housing the programs. Data science degree programs have emerged to address", "-29.481821139808744" ], [ "mathematics at the University of Manchester are the Richardson Chair of Applied Mathematics, and the Fielden Chair of Pure Mathematics as well as the named Sir Horace Lamb Chair.", "-29.460024748463184" ], [ "of topics within mathematics in their undergraduate education, and then proceed to specialize in topics of their own choice at the graduate level. In some universities, a qualifying exam serves to test both the breadth and depth of a student's understanding of mathematics; the students, who pass, are permitted to work on a doctoral dissertation. Applied mathematics Mathematicians involved with solving problems with applications in real life are called applied mathematicians. Applied mathematicians are mathematical scientists who, with their specialized knowledge and professional methodology, approach many of the imposing problems presented in related scientific fields. With professional focus on a", "-29.44526789447991" ], [ "Encyclopedia of Mathematics The Encyclopedia of Mathematics (also EOM and formerly Encyclopedia of Mathematics) is a large reference work in mathematics. Overview The 2002 version contains more than 8,000 entries covering most areas of mathematics at a graduate level, and the presentation is technical in nature. The encyclopedia is edited by Michiel Hazewinkel and was published by Kluwer Academic Publishers until 2003, when Kluwer became part of Springer. The CD-ROM contains animations and three-dimensional objects.\nThe encyclopedia has been translated from the Soviet Matematicheskaya entsiklopediya (1977) originally edited by Ivan Matveevich Vinogradov and extended with comments and three supplements adding several", "-29.436176516930573" ], [ "Mathematical statistics Mathematical statistics is the application of probability theory, a branch of mathematics, to statistics, as opposed to techniques for collecting statistical data. Specific mathematical techniques which are used for this include mathematical analysis, linear algebra, stochastic analysis, differential equations, and measure theory. Topics The following are some of the important topics in mathematical statistics: Probability distributions A probability distribution is a function that assigns a probability to each measurable subset of the possible outcomes of a random experiment, survey, or procedure of statistical inference. Examples are found in experiments whose sample space is non-numerical, where the distribution would", "-29.412752881122287" ], [ "Graduate Studies in Mathematics Graduate Studies in Mathematics (GSM) is a series of graduate-level textbooks in mathematics published by the American Mathematical Society (AMS). These books elaborate on several theories from notable personas, such as Martin Schechter and Terence Tao, in the mathematical industry. The books in this series are published only in hardcover.", "-29.4114466101164" ], [ "geometry and trigonometry, statistics and probability, and discrete mathematical modeling. Evaluations, Research, and Reviews Project and independent evaluations and many research studies have been conducted on Core-Plus Mathematics, including content analyses, case studies, surveys, small- and large-scale comparison studies, research reviews, and a longitudinal study. Positive reviews There are multiple research studies and evaluations in which students using Core-Plus Mathematics performed significantly better than comparison students on assessments of conceptual understanding, problem solving, and applications, and results were mixed for performance on assessments of by-hand calculation skills. Some of these studies were funded by the National Science Foundation, the same", "-29.347458762000315" ], [ "Statistics, Mechanics or Discrete Mathematics (also known as Decision Mathematics) modules with the ability to specialise in one branch of applied Mathematics, the new specifications make both Mechanics and Statistics compulsory, with Discrete Mathematics being made exclusive as an option to students pursuing a Further Mathematics course. The first assessment opportunity for the new specification is 2018 and 2019 for A-levels in Mathematics and Further Mathematics respectively. 2000s specification The basic A-Level course consists of six modules, four pure modules (C1, C2, C3, and C4) and two applied modules in Statistics, Mechanics and/or Decision Mathematics. The C1 through C4 modules", "-29.342206751869526" ], [ "to have applications, e.g. number theory in cryptography. This remarkable fact, that even the \"purest\" mathematics often turns out to have practical applications, is what Eugene Wigner has called \"the unreasonable effectiveness of mathematics\". As in most areas of study, the explosion of knowledge in the scientific age has led to specialization: there are now hundreds of specialized areas in mathematics and the latest Mathematics Subject Classification runs to 46 pages. Several areas of applied mathematics have merged with related traditions outside of mathematics and become disciplines in their own right, including statistics, operations research, and computer science.\nFor those who are", "-29.29685297422111" ], [ "set theory. Among the list of new applications in mathematics there are new approaches to probability,\nhydrodynamics, measure theory, nonsmooth and harmonic analysis, etc.\nThere are also applications of non-standard analysis to the theory of stochastic processes, particularly constructions of Brownian motion as random walks. Albeverio et al. have an excellent introduction to this area of research. Applications to calculus As an application to mathematical education, H. Jerome Keisler wrote Elementary Calculus: An Infinitesimal Approach. Covering non-standard calculus, it develops differential and integral calculus using the hyperreal numbers, which include infinitesimal elements. These applications of non-standard analysis depend on the existence of", "-29.288141967379488" ], [ "Baccalaureate Diploma. Background A qualification in Further Mathematics involves studying both pure and applied modules. Whilst the pure modules - formerly known as Pure 4-6 (or Core 4-6), now known as Further Pure 1-3 (4 exists for the AQA board) - build on knowledge from the core mathematics modules, the applied modules may start from first principles.\nTo achieve an A level in Further Maths, candidates must study six modules which have not already been used for their Maths A level. These six modules must consist of FP1, at least one of FP2 or FP3, and 4 other modules.\nWith regard", "-29.253873460067553" ], [ "entre les mathématiques et la physique, etc.\"\n Scott Weinstein in \"ETC: A Review of General Semantics\":\nProfessor Kline's book is a lively account of a fascinating subject. Its conclusions are, however, overdrawn and in many cases unjustified. The lesson to be learned from twentieth century foundational research is not that mathematics is in a sorry state, but rather the extent to which deep philosophical issues about mathematics may be illuminated, if not settled, by mathematics itself. Gödel's theorems do indeed intimate that there may be limits to what we can come to know in mathematics, but they also demonstrate through themselves", "-29.241238175720355" ], [ "mathematics.", "-29.217698299751646" ], [ "mathematics.", "-29.217698299751646" ], [ "mathematics.", "-29.217698299751646" ], [ "Glasgow Mathematical Journal The Glasgow Mathematical Journal is a mathematics journal that publishes original research papers in any branch of pure and applied mathematics. It covers a wide variety of research areas, which in recent issues have included ring theory, group theory, functional analysis, combinatorics, differential equations, differential geometry, number theory, algebraic topology, and the application of such methods in applied mathematics.\nThe editor-in-chief is currently I. A. B. Strachan (University of Glasgow).", "-29.201200792449526" ], [ "theory starts with an empirical phenomenon (as opposed to a broad abstract entity like the social system) and abstracts from it to create general statements that can be verified by data.\nMathematical theory, also known as formal theory, is the use of mathematics to construct social theories. Mathematical sociology aims to take sociological theory, which is strong in intuitive content but weak from a formal point of view, and to express it in formal terms. The benefits of this approach include increased clarity and the ability to use mathematics to derive implications of a theory that cannot be arrived at intuitively.", "-29.19251934066415" ], [ "among mathematics journals. While the journal represents the full spectrum of the Institute's mathematical research activity, most articles are in the fields of applied mathematics, mathematical analysis, or mathematical physics. Its contents over the years amount to a modern history of the theory of partial differential equations. Most articles originate within the Institute or are specially invited. The Institute also publishes its own series of lecture notes. They are based on the research interests of the faculty and visitors of the Institute, originated in advanced graduate courses and mini-courses offered at the Institute. Warren", "-29.175341996364295" ], [ "and Classics. For the Mathematics section, candidates choose to take either 'type Ga(가형)' or 'type Na(나형)'. The former is more difficult than the latter. Subordinate Subjects is divided into three sections: Social Studies, Sciences, and Vocational Education. Candidates can choose up to two subjects, but can't select from different sections at the same time. For example, one can choose Physics II and Biology I for the subordinate section since both are in Science section, but can't choose World History and Principles of Accounting because the former is in the Social Studies section and the latter is in the Vocational Education", "-29.16146876476705" ], [ "Mathematical theory A mathematical theory is a mathematical model that is based on axioms. A theory can be a body of knowledge, and so in this sense a \"mathematical theory\" refers to an area of mathematical research. This is related to, but distinct from, the idea of mathematical models. Branches of mathematics like group theory and number theory are examples of this.", "-29.15375615551602" ], [ "Areas of mathematics Mathematics encompasses a growing variety and depth of subjects over history, and comprehension requires a system to categorize and organize the many subjects into more general areas of mathematics. A number of different classification schemes have arisen, and though they share some similarities, there are differences due in part to the different purposes they serve. In addition, as mathematics continues to be developed, these classification schemes must change as well to account for newly created areas or newly discovered links between different areas. Classification is made more difficult by some subjects, often the most active, which straddle", "-29.131117454671767" ], [ "Mathematics Subject Classification The Mathematics Subject Classification (MSC) is an alphanumerical classification scheme collaboratively produced by staff of, and based on the coverage of, the two major mathematical reviewing databases, Mathematical Reviews and Zentralblatt MATH. The MSC is used by many mathematics journals, which ask authors of research papers and expository articles to list subject codes from the Mathematics Subject Classification in their papers. The current version is MSC2010. Third level Third-level codes are the most specific, usually corresponding to a specific kind of mathematical object or a well-known problem or research area.\nThe third-level code 99 exists in every category", "-29.077314041671343" ], [ "Remarks on the Foundations of Mathematics Remarks on the Foundations of Mathematics (German: Bemerkungen über die Grundlagen der Mathematik) is a book of Ludwig Wittgenstein's notes on the philosophy of mathematics. It has been translated from German to English by G.E.M. Anscombe, edited by G.H. von Wright and Rush Rhees, and published first in 1956. The text has been produced from passages in various sources by selection and editing. The notes have been written during the years 1937-1944 and a few passages are incorporated in the Philosophical Investigations which were composed later. When the book appeared it received", "-29.072215782827698" ], [ "and therefore mathematics, which is not itself a concrete science, is the general gauge by which the position of every science is to be determined. Generalizing thus, Comte found that there were five great groups of phenomena of equal classificatory value but of successively decreasing positivity. To these he gave the names astronomy, physics, chemistry, biology, and sociology.\n— Lester F. Ward, The Outlines of Sociology (1898), \nComte offered an account of social evolution, proposing that society undergoes three phases in its quest for the truth according to a general \"law of three stages\". The idea bears some similarity to Marx's belief", "-29.061957950005308" ], [ "designing a survey often involves minimizing the cost of estimating a population mean with a given level of confidence. Because of its use of optimization, the mathematical theory of statistics shares concerns with other decision sciences, such as operations research, control theory, and mathematical economics. Mathematical awards Arguably the most prestigious award in mathematics is the Fields Medal, established in 1936 and awarded every four years (except around World War II) to as many as four individuals. The Fields Medal is often considered a mathematical equivalent to the Nobel Prize.\nThe Wolf Prize in Mathematics, instituted in 1978, recognizes lifetime achievement,", "-29.03585194054176" ], [ "and computer sciences into one degree, placing special emphasis on the mathematical foundations of computer science and computer-based tools for mathematics. It combines mathematics and informatics subjects, focusing on fields where the two are most relevant to each other and stressing the interrelationships between the two disciplines to shape a degree course that is being successfully taught at leading world universities such as Massachusetts Institute of Technology (MIT) in the US, the University of Oxford in the UK or Université Pierre et Marie Curie in France. School of Physical Activity and Sport Sciences (INEF) Since 14 September 1998 the Faculty", "-29.028956957918126" ], [ "relatively advanced level. Pierre de Fermat and Blaise Pascal (1654), and Christiaan Huygens (1657) started the earliest study of probability theory. In the early 1800s, Gauss and Laplace developed the mathematical theory of statistics, which also explained the use of statistics in insurance and governmental accounting. Mathematical statistics was recognized as a mathematical discipline in the early 20th century.\nIn the mid-20th century, mathematics was broadened and enriched by the rise of new mathematical sciences and engineering disciplines such as operations research and systems engineering. These sciences benefited from basic research in electrical engineering and then by the development of electrical computing,", "-29.019761977371672" ], [ "consensus on whether mathematics is an art or a science. Some just say, \"Mathematics is what mathematicians do.\" Mathematics as science The German mathematician Carl Friedrich Gauss referred to mathematics as \"the Queen of the Sciences\". More recently, Marcus du Sautoy has called mathematics \"the Queen of Science ... the main driving force behind scientific discovery\". In the original Latin Regina Scientiarum, as well as in German Königin der Wissenschaften, the word corresponding to science means a \"field of knowledge\", and this was the original meaning of \"science\" in English, also; mathematics is in this sense a field of knowledge. The", "-29.01718947367044" ], [ "Language of mathematics The language of mathematics is the system used by mathematicians to communicate mathematical ideas among themselves. This language consists of a substrate of some natural language (for example English) using technical terms and grammatical conventions that are peculiar to mathematical discourse (see Mathematical jargon), supplemented by a highly specialized symbolic notation for mathematical formulas.\nLike natural languages in general, discourse using the language of mathematics can employ a scala of registers. Research articles in academic journals are sources for detailed theoretical discussions about ideas concerning mathematics and its implications for society. The language community of mathematics Mathematics is", "-28.97911316662794" ], [ "\"Science in Hapgood and Arcadia\", notes that \"chaos mathematics is about the recovery of information from apparently chaotic and random systems where entropy is high. [...] It is 'asymmetric' (unlike the equations of classical physics), yet it finds regularities that prove to be the regularities of nature itself. Strikingly, this mathematics can generate patterns of amazing complexity, but it also has the power to generate seemingly natural or organic shapes that defeat Newtonian geometry. The promise, then, (however questionable it is in reality) is that information, and by extension, nature itself, can overcome the tendency to increase in entropy\".\nJohn Fleming,", "-28.939506995724514" ], [ "\"Mathematics, Interdisciplinary Applications\" and 8th out of 122 journals in the category \"Statistics & Probability\".", "-28.872130375006236" ], [ "Science degree in Mathematics. The undergraduate curriculum prepares students for graduate studies, careers in applied mathematics, and teaching careers in mathematics. The graduate program provides students with knowledge in theoretical and applied mathematics as required by various disciplines in science and education. Department of Physics & Astronomy The Department has 17 full-time faculty members actively engaged in research in the areas of Biophysics, Nanotechnology, Experimental Physics, Gravitational Wave Astronomy, Relativistic Astrophysics and Physics Education. The department places special emphasis on the involvement of students, at both the undergraduate and graduate levels, in research. CSMT Cohort Program Starting in fall 2012,", "-28.825741066480987" ], [ "life, extending over fourteen years, Cayley produced between two and three hundred papers. As a professor At Cambridge University the ancient professorship of pure mathematics is denominated by the Lucasian, and is the chair that had been occupied by Isaac Newton. Around 1860, certain funds bequeathed by Lady Sadleir to the University, having become useless for their original purpose, were employed to establish another professorship of pure mathematics, called the Sadleirian. The duties of the new professor were defined to be \"to explain and teach the principles of pure mathematics and to apply himself to the advancement of that science.\"", "-28.80588489389629" ], [ "we learn the limits of pure reason. Part one of the main transcendental problem. How is pure mathematics possible? § 6. Mathematics consists of synthetic a priori knowledge. How was it possible for human reason to produce such a priori knowledge? If we understand the origins of mathematics, we might know the basis of all knowledge that is not derived from experience.\n§ 7. All mathematical knowledge consists of concepts that are derived from intuitions. These intuitions, however, are not based on experience.\n§ 8. How is it possible to intuit anything a priori? How can the intuition of the object occur", "-28.79749250120949" ], [ "Sciences There are five African Institutes for Mathematical Sciences. These are situated in Cameroon (est. 2013), Ghana (est. 2012), Senegal (est. 2013), South Africa (est. 2003) and Tanzania (est. 2014). The one in Senegal teaches in both English and French. Each institute provides academic programmes in basic and applied mathematics, including cosmology, finance and computing, as well as interdisciplinary fields like bioinformatics. Each also provides community services.\nThe first institute was the brainchild of South African cosmologist Neil Turok. It is planned to develop 15 centres of excellence across Africa by 2023 within the Next Einstein Initiative, a name inspired by", "-28.769992425339296" ], [ "by Davis and What is Mathematics, Really? by Hersh.", "-28.75718911003787" ] ]
2rmmei
Why didn't the European settlers die of diseases that the Indians had like the Indians died of European diseases?
[ "They did! There were all kinds of diseases that people were introduced to in the new world that they didn't have in the old world. There's a fascinating book by Charles C Mann called 1493 - it's an exploration of everything that occurred after the \"discovery\" of the new world. I really suggest giving it a read", "The European settlers brought worse(better?) diseases with them and also as a result had stronger immune systems. By the time Europeans began settling the America's they had already been trading with the rest of the world for centuries and swapping diseases along with trade goods. Also Europe around that time tended to be nasty, dirty and crowded and a good breeding ground for nasty bugs. Guns, Germs and Steel by Jared Diamond(there's also a PBS special) gives an overview of all of this.", "**If** I'm remembering correctly (and I might not be, but I'm about to go to bed and I'd rather not do a bunch of fact checking research) the primary difference was that many European farmers were in heavy contact with animals they raised/domesticated, whereas Native Americans did not domesticate animals and instead relied fully on wild hunting for their meat. Because of this daily contact with multiple species of animals and their associated waste along with the fact that their residences were often in very close proximity to animal pens, they had more of a chance for diseases isolated to those animals to cross over (mutate into a form that's transmissible) to humans. There are *a lot* of deadly or harmful diseases that originate in animals often due to their own poor hygiene and general wild conditions. The disease that comes to mind foremost to me is the Bubonic Plague which was spread primarily via fleas on rodents, and reportedly killed off around a third or more of the European population. However, even today, we still have problems with animal to human cross over with diseases like Ebola, Bird Flu, and Mad Cow Disease. Thus, while Native Americans certainly had diseases that were unique to the land and killed off or harmed European settlers, the European settlers simply had more deadly/harmful diseases in their repertoire than the Native Americans did. **Edit:** And as others have mentioned (and I neglected to mention) Europeans tended to have more densely packed urban centers (which were perfect for human to human transmission) and more trade/contact between disparate populations than Native Americans.", "There's a strong theory that syphilis [did not exist in Europe until Columbus' crew personally had sex with the locals and brought it back to Europe after the first voyage]( URL_0 ). It's not 100% settled, but the theory is strongly supported by medical historical evidence. Consider that. Not just \"over time\", the *very first voyage* brought back syphilis which plagued Europe like wildfire for over 400 years before an effective treatment was discovered. It didn't annihilate Europe's population like smallpox destroyed Native American populations, but the total volume of people it infected was extremely high. Much larger populations and a much longer time. It seems inevitable though, with or without Columbus's crew's behavior. If not on the first voyage, within the next few trips someone would return with it. So the question you wanna ask is \"did Native Americans have a natural immunity built up to syphilis like Europeans had to smallpox?\" and that's really hard to say. There's no medical documentation on how syphilis worked in Native American populations. I've never heard of the observable effects of syphilis being represented in Native American lore. The observed effects are described in both European medicine and lore.", "The main reason is because the Europeans had access to large amounts of livestock. Most diseases come from animals and they had been co-living with the animals for so long that they gained immunity from a lot of diseases. The native Americans however, weren't living with any livestock (because they were nomadic & because there wasn't a lot of different animals capable of being \"profitable\"). Because of this, the European diseases had a greater affect (effect?) On the Natives, than the other way around.", "They totally did, they got syphilus and yellow fever amongst others.", "According to Guns, Germs, and Steel by Jared Diamond, people from the old world were exposed to more types of different animals as compared to people from the new world. Interacting with animals which includes physical contact with saliva and wastes causes diseases to which people get immune after a generations of exposure. So when people from the old world met people in the new world, the former sort of brought more disease with them than vice versa.", "I think I read somewhere that Europeans illnesses were caused more often by microbes (viruses, bacteria) while New World natives had more issues with parasites. They may have specifically been talking about tropical areas in the New World though... This may also be completely incorrect...", "Native Americans populated the American continents tens of thousands of years ago, originally following herds across the Bering Strait land bridge from Asia. Living harsh nomadic hunting lifestyles, people who fell ill with diseases brought from Eurasia died quickly, and didn't have much time to spread the microbe. Eventually, these microbes were totally eradicated because they weren't being passed on quickly enough to survive in the human population. Eventually, the Native peoples of the Americas, having never interacted with these microbes for hundreds of generations, lost all immunity to them. One exception- STIs like syphillis did survive because they acted slowly and spread quickly. This is one example of diseases spread the other direction, though it never reached epidemic proportions like the diseases that came from the Old World. These microbes spread so quickly (via trade/indirect contact) that they killed entire villages before Europeans even arrived. Seeing cleared, fertilized fields, leveled land, and palisade walls, settlers (obviously incorrectly) believed the land was a gift from God, a myth justifying later logics of conquest and genocide such as Manifest Destiny. It's also worth noting that Europeans gave Native people blankets and other objects infected with Old World diseases, knowing that it would kill the community and clear the land for settlement. Source: Environmental History course at uni", "Well lots of them did. But europeans were breeding faster than people were dying in the colonies, and the long ship ride back to europe managed to prevent a lot of diseases making it back to europe. Also a lot of diseases, notably tropical ones don't survive in europe. They spread for example by insects, which in hot countries are there year round, but in europe (particularly northern europe) they die off every year. Quite a lot of the world experienced next to 0 net population growth until we started developing treatments for malaria.", "I always figured it was the home field DISadvanntage. It only took one European to introduce a disease that killed off whole populations of natives. Even if that European's entire settlement was wiped out, a disease had no way of crossing the pond, and more Europeans would arrive in a couple of months to start the cycle over again." ]
[ [ "World (continental America), the deadly infections of smallpox, measles, and influenza were unheard of. The Native Americans did not have the immunities the Europeans developed through long contact with the diseases. Christopher Columbus ended the Americas' isolation in 1492 while sailing under the flag of Castile, Spain. Deadly epidemics swept across the Caribbean. Smallpox wiped out villages in a matter of months. The island of Hispaniola had a population of 250,000 Native Americans. 20 years later, the population had dramatically dropped to 6,000. 50 years later, it was estimated that approximately 500 Native Americans were left. Smallpox then spread to", "-34.114305655501084" ], [ "year 1550, though the bloodlines continued through to the modern populace. In Amazonia, indigenous societies weathered, and continue to suffer, centuries of colonization and genocide.\nContact with European diseases such as smallpox and measles killed between 50 and 67 per cent of the aboriginal population of North America in the first hundred years after the arrival of Europeans. Some 90 per cent of the native population near Massachusetts Bay Colony died of smallpox in an epidemic in 1617–1619. In 1633, in Fort Orange (New Netherland), the Native Americans there were exposed to smallpox because of contact with Europeans. As it had", "-32.775818278245424" ], [ "native inhabitants of Mexico. Unintentionally introduced at Veracruz with the arrival of Pánfilo de Narváez on April 23, 1520, smallpox ravaged Mexico in the 1520s, possibly killing over 150,000 in Tenochtitlán (the heartland of the Aztec Empire) alone, and aiding in the victory of Hernán Cortés over the Aztec Empire at Tenochtitlan (present-day Mexico City) in 1521.\nThere are many factors as to why Native Americans suffered such immense losses from Afro-Eurasian diseases. Many European diseases, like cow pox, are acquired from domesticated animals that are not indigenous to the Americas. European populations had adapted to these diseases, and built up", "-32.748122185017564" ], [ "Americas, 95% of the indigenous populations are believed to have been killed off by diseases brought by the Europeans. Many were killed by infectious diseases such as smallpox and measles. Similar circumstances were observed in Australia and South Africa. Aboriginal Australians and the Khoikhoi population were decimated by smallpox, measles, influenza and other diseases.\nHow was it then that diseases native to the American continents did not kill off Europeans? Diamond posits that most of these diseases were only developed and sustained in large dense populations in villages and cities; he also states most epidemic diseases evolve from similar diseases of", "-32.712732406158466" ], [ "decline of the American natives. After initial contact with Europeans and Africans, Old World diseases caused the deaths of 90 to 95% of the native population of the New World in the following 150 years. Smallpox killed from one third to half of the native population of Hispaniola in 1518. By killing the Incan ruler Huayna Capac, smallpox caused the Inca Civil War of 1529–1532. Smallpox was only the first epidemic. Typhus (probably) in 1546, influenza and smallpox together in 1558, smallpox again in 1589, diphtheria in 1614, measles in 1618—all ravaged the remains of Inca culture.\nSmallpox killed millions of", "-32.56868593182298" ], [ "as supernatural or magical. The result of the introduction of Eurasian diseases to the Americas was that many more native peoples were killed by disease and germs than by the colonists' use of guns or other weapons. Scholars estimate that over a period of four centuries, epidemic diseases wiped out as much as 90 percent of the American indigenous populations.\nIn Europe during the age of exploration, diseases such as smallpox, measles and tuberculosis (TB) had already been introduced centuries before through trade with Asia and Africa. People had developed some antibodies to these and other diseases from", "-32.490701408998575" ], [ "Native Americans, due to the lack of prior contact with Europeans, had not previously been exposed to the diseases that were prevalent on the distant continent. Therefore, they had not built up internal immunities to the diseases or formed any medicines to combat them. Europeans came into the New World bearing various diseases. Those infected with diseases either possessed them in a dormant state or were not quarantined in such a way that distanced them enough from Native Americans not to spread the diseases, allowing them to spread into epidemics.\nThe trade of Native American captives, and the use of commercial", "-32.47182675823569" ], [ "150,000 in Tenochtitlán alone, including the emperor, and Peru in the 1530s, aiding the European conquerors. Some believe that the death of up to 95% of the Native American population of the New World was caused by Old World diseases although new research suggests tuberculosis from seals and sea lions played a significant part. Goods or people infected with the smallpox virus were included in the ship inventories of the Australian first settlement, and a smallpox epidemic spread across the continent 3 years after European settlement. Sub-replacement fertility The Greek historian Polybius, writing in The Histories, largely blamed the decline", "-32.39474276668625" ], [ "to European diseases, and would not be as susceptible to fall ill as the Native Americans because they had not been exposed to the pathogens yet. In 1501, Spanish colonists began importing enslaved Africans from the Iberian Peninsula to their Santo Domingo colony on the island of Hispaniola. These first Africans, who had been enslaved in Europe before crossing the Atlantic, may have spoken Spanish and perhaps were even Christians. About 17 of them started in the copper mines, and about a hundred were sent to extract gold. As Old World diseases decimated Caribbean indigenous populations in", "-32.38816534995567" ], [ "the centuries, the Europeans had developed high degrees of immunity to these diseases, while the indigenous peoples had no time to build such immunity.\nSmallpox decimated the native population of Australia, killing around 50% of indigenous Australians in the early years of British colonisation. It also killed many New Zealand Māori. As late as 1848–49, as many as 40,000 out of 150,000 Hawaiians are estimated to have died of measles, whooping cough and influenza. Introduced diseases, notably smallpox, nearly wiped out the native population of Easter Island. In 1875, measles killed over 40,000 Fijians, approximately one-third of the population. The Ainu", "-32.32562893076829" ], [ "arrived in the New World, bringing with them the infectious diseases of Europe and Africa, observers noted immense numbers of indigenous Americans began to die from these diseases. One reason this death toll was overlooked is that once introduced, the diseases raced ahead of European immigration in many areas. The disease killed a sizable portion of the populations before European written records were made. After the epidemics had already killed massive numbers of natives, many newer European immigrants assumed that there had always been relatively few indigenous peoples. The scope of the epidemics over the years was tremendous, killing millions", "-32.31948418445427" ], [ "from 10 million to 100 million. Encounters between European explorers and populations in the rest of the world often introduced local epidemics of extraordinary virulence. According to the most extreme scholarly claims, as many as 90% of the Native American population of the New World died due to Old World diseases such as smallpox, measles and influenza. Over the centuries, the Europeans had developed high degrees of immunity to these diseases, while the indigenous peoples had no such immunity. Modern history During the European Agricultural and Industrial Revolutions, the life expectancy of children increased dramatically. The percentage of the children", "-31.932764170895098" ], [ "to European diseases caused high fatalities among the Amerindian population, to such an extent that workers became scarce. Historians estimate that about 30,000 Amerindians under the rule of the Portuguese died in a smallpox epidemic in the 1560s. The Iberian conquerors could not attract sufficient settlers from their own countries to the colonies and, after 1570, they began increasingly to import slaves from Africa as a primary labor force. African slavery in the Americas Over nearly three centuries from the late 1500s to the 1860s, Brazil was consistently the largest destination for African slaves in the Americas. In that period,", "-31.844454571702954" ], [ "rebound occurred for the indigenous populations of the Americas. He concludes that, even though the Spanish were aware of deadly diseases such as smallpox, there is no mention of them in the New World until 1519, meaning perhaps they didn't spread as fast as initially believed, and that unlike Europeans, the indigenous populations were subjected to brutal forced labor in gold and silver mines on a massive scale. Anthropologist Jason Hickel of the London School of Economics estimates that a third of Arawak workers died every six months from lethal forced labor in these mines.\nHistorian David Stannard says that by", "-31.843955644464586" ], [ "among Europeans (long after being introduced from Asia), often proved deadly to Native Americans. In the 100 years following the arrival of the Spanish to the Americas, large disease epidemics depopulated large parts of the eastern United States in the 16th century.\nThere are a number of documented cases where diseases were deliberately spread among Native Americans as a form of biological warfare. The most well-known example occurred in 1763, when Sir Jeffery Amherst, Commander-in-Chief of the Forces of the British Army, wrote praising the use of smallpox-infected blankets to \"extirpate\" the Indian race. Blankets infected with smallpox were given to", "-31.8330054905382" ], [ "Europeans in North America, both the bison and the Native Americans saw a rapid decline in population. Massive over-hunting for sport by colonists eliminated bison populations east of the Mississippi River by 1833 and reduced the numbers in the Missouri basin to a mere few hundred. Foreign diseases brought by settlers, such as smallpox, raged across the land, decimating Native American populations. Left without their primary source of sustenance, many of the remaining indigenous people were forced onto resettlement areas and reservations, often at gunpoint. Early European explorers In May 1673, the French-Canadian explorer Louis Jolliet and the French explorer", "-31.329065485333558" ], [ "various contributing factors, epidemic disease was the overwhelming cause of the population decline of the Native Americans because of their lack of immunity to new diseases brought from Europe. It is difficult to estimate the number of pre-Columbian Native Americans who were living in what is today the United States of America. Estimates range from a low of 2.1 million to a high of 18 million (Dobyns 1983). By 1800, the Native population of the present-day United States had declined to approximately 600,000, and only 250,000 Native Americans remained in the 1890s. Chicken pox and measles, endemic but rarely fatal", "-31.210432541556656" ], [ "when introduced to Native American populations via European carriers, as the people in the Americas had no natural immunity to the new diseases. Measles caused many deaths. The smallpox epidemics are believed to have caused the largest death tolls among Native Americans, surpassing any wars and far exceeding the comparative loss of life in Europe due to the Black Death. It is estimated that upwards of 80–95 percent of the Native American population died in these epidemics within the first 100–150 years following 1492. Many regions in the Americas lost 100%. The beginning of demographic collapse on the North American", "-31.102222362882458" ], [ "the Indians succumbed to European diseases to which they had no natural immunity. After the atrocities of Pedrarias, most of the Indians fled to remote areas to avoid the Spaniards.\nThe regulations for colonial administration set forth by the Spanish king's Council of the Indies decreed that the Indians were to be protected and converted to Christianity. The colonies, however, were far from the seat of ultimate responsibility, and few administrators were guided by the humane spirit of those regulations. The Roman Catholic Church, and particularly the Franciscan order, showed some concern for the welfare of the Indians, but on the", "-31.09567606372002" ], [ "continent simply vanished without trace, often before European settlers arrived or recorded their existence. Diseases Deadly infectious diseases like smallpox, influenza and tuberculosis were always major causes of Aboriginal deaths. \nSmallpox alone killed more than 50% of the Aboriginal population.\nIn April 1789, a major outbreak of smallpox killed large numbers of Indigenous Australians between Hawkesbury River, Broken Bay, and Port Hacking. Based on information recorded in the journals of some members of the First Fleet, it has been surmised that the Aborigines of the Sydney region had never encountered the disease before and lacked immunity to it. Unable to understand", "-31.003512446040986" ], [ "immunity. Native American populations were separated from Europe for thousands of years and had no immunity to these diseases that the Europeans brought with them. Many Native American populations were weakened from starvation due to the Little Ice Age, which was coldest during the 17th century. Their important corn, bean and squash crops failed due to spring frosts and early frosts in autumn. As the Native American population declined, more land was available for European settlement. All these factors made the Native American populations decline dramatically. \nEuropeans purchased land known as land patents so Native Americans", "-30.835985978425015" ], [ "a measles epidemic, suspected by some to be contracted from white settlers, resulted in high fatalities among the tribe. A small group of Cayuse, after putting Witmans medicine to the test with both sick and non sick individuals, and which all test individuals died, believed the missionaries were deliberately poisoning their native people, since a much higher percentage of the natives were dying from the measles than were the whites. (Native Americans had no immunity to the endemic Eurasian diseases carried by European Americans.) In addition, cultural differences and settler encroachment had caused growing tensions.\nThe Cayuse attacked the missionaries, killing", "-30.816046702319" ], [ "(estimated at between 2 and 5 million). The majority of this loss of life was involuntary, due to European diseases the native Amazonian population didn't have immunity to. The Europeans also used the native Amazonians as slaves. There are testimonies of the Europeans navigating upriver from the mouth of the Amazon, capturing entire tribes and carrying them downriver to the plantations where they worked under difficult conditions, dying in a few years. The Europeans, due to their superior weapons, were able to take whatever piece of land they wanted. Previously the incursions of the colonists were motivated by the", "-30.736939806025475" ], [ "tribes were being wiped out in Kenya up until 1899. Along the Zaire river basin were areas where no one survived the epidemics, leaving the land devoid of human life. In Ethiopia and the Sudan, six epidemics are recorded for the 19th century: 1811–1813, 1838–1839, 1865–1866, 1878–1879, 1885–1887, and 1889–1890. Island South East Asia There is evidence that smallpox reached the Philippine islands from the 4th century CE onwards – linked possibly to contact between South East Asians and Indian traders.\nDuring the 18th century, there were many major outbreaks of smallpox, driven possibly by increasing contact with European colonists and", "-30.717945214826614" ], [ "the Census (1894), the North American Indian Wars of the 19th century cost the lives of about 19,000 Europeans and 30,000 Native Americans.\nThe first indigenous group encountered by Columbus, the 250,000 Taínos of Hispaniola, represented the dominant culture in the Greater Antilles and the Bahamas. Within thirty years about 70% of the Taínos had died. They had no immunity to European diseases, so outbreaks of measles and smallpox ravaged their population. One such outbreak occurred in a camp of ensalved Africans, where smallpox spread to the nearby Taíno population and reduced their numbers by 50%. Increasing punishment of the Taínos", "-30.686525508994237" ], [ "Half the native population of Hispaniola in 1518 was killed by smallpox. Smallpox also ravaged Mexico in the 1520s, killing 150,000 in Tenochtitlan alone, including the emperor, and Peru in the 1530s, aiding the European conquerors. Measles killed a further two million Mexican natives in the 17th century. In 1618–1619, smallpox wiped out 90% of the Massachusetts Bay Native Americans. Smallpox epidemics in 1780–1782 and 1837–1838 brought devastation and drastic depopulation among the Plains Indians. Some believe that the death of up to 95% of the Native American population of the New World was caused by Old World diseases. Over", "-30.57082548609469" ], [ "Spaniards had spread diseases such as smallpox, malaria, typhus, influenza, and the common cold to the people of South America. Forty years after the arrival of European explorers and conquistadors, Peru’s native population had decreased by about 80%. Population recovery was made almost impossible by the killer pandemics that occurred approximately every ten years. Additionally, the stress caused by war, exploitation, socioeconomic change, and psychological trauma caused by the conquests was enough to further weaken the indigenous people and render recovery impossible. Current issues The risk of infectious disease in Peru is considered to be very high.", "-30.51388172066072" ], [ "out a large portion of the indigenous population. Historians cannot determine the number of natives who died due to European diseases, but some put the figures as high as 85% and as low as 25%. Due to the lack of written records, specific numbers are hard to verify. Many of the survivors were forced to work in European plantations and mines. Intermixing between the indigenous peoples and the European colonists was very common, and, by the end of the colonial period, people of mixed ancestry (mestizos) formed majorities in several colonies. Slavery and forced labor in colonial Latin America Indigenous", "-30.471047967264894" ], [ "resistance, over many generations. Many of the European diseases that were brought over to the Americas were diseases, like yellow fever, that were relatively manageable if infected as a child, but were deadly if infected as an adult. Children could often survive the disease, resulting in immunity to the disease for the rest of their life. But contact with adult populations without this childhood or inherited immunity would result in these diseases proving fatal.\nColonization of the Caribbean led to the destruction of the Arawaks of the Lesser Antilles. Their culture was destroyed by 1650. Only 500 had survived by the", "-30.450801585655427" ], [ "Indian hospital History Indigenous populations had been hit by various diseases brought by European settlers and missionaries, including tuberculosis, smallpox, measles, mumps, diphtheria, typhoid, and influenza, from the 19th century onwards. These exposures to new diseases reduced the population by as much as 90%. At best, waves of infection are partially documented. Tuberculosis moved more slowly, but by 1950, one in five Inuit people were infected. Mortality rates in the 1930s and 1940s rose higher than 700 people per 100,000.\nEarly hospitals for First Nations were mostly church-run, in a manner similar to the Indian residential schools. For example, the Grey", "-30.390220382076222" ], [ "measles, typhoid fever, and other infectious diseases. Most of the Spanish settlers had developed an immunity to these diseases from childhood, but the indigenous peoples lacked the needed antibodies since these diseases were totally alien to the native population at the time. There were at least three separate, major epidemics that decimated the population: smallpox (1520 to 1521), measles (1545 to 1548) and typhus (1576 to 1581). In the course of the 16th century, the native population in Mexico went from an estimated pre-Columbian population of 8 to 20 million to less than two million. Therefore, at the start of", "-30.33808377564128" ], [ "Thus, in contrast to the indigenous people, Europeans had developed a richer endowment of antibodies. The large-scale contact with Europeans after 1492 introduced Eurasian germs to the indigenous people of the Americas.\nEpidemics of smallpox (1518, 1521, 1525, 1558, 1589), typhus (1546), influenza (1558), diphtheria (1614) and measles (1618) swept the Americas subsequent to European contact, killing between 10 million and 100 million people, up to 95% of the indigenous population of the Americas. The cultural and political instability attending these losses appears to have been of substantial aid in the efforts of various colonists in New England and Massachusetts to", "-30.326092713570688" ], [ "to the Americas by European colonists. It is unclear how many Native Americans were killed by foreign diseases after the arrival of Columbus in the Americas, but the numbers have been estimated to be close to 70% of the indigenous population. The damage done by this disease significantly aided European attempts to displace and conquer the native population.\nA pandemic is a worldwide epidemic. The 1918 flu pandemic, which lasted until 1919, was a category 5 influenza pandemic caused by an unusually severe and deadly influenza A virus. The victims were often healthy young adults, in contrast to most influenza outbreaks,", "-30.27703887881944" ], [ "those that followed during 1545–1548 and 1576–1581, eventually killed more than half of the native population. Most of the Spanish were immune; with his army of fewer than 900 men it would not have been possible for Cortés to defeat the Aztecs and conquer Mexico without the help of smallpox. Many Native American populations were devastated later by the inadvertent spread of diseases introduced by Europeans. In the 150 years that followed Columbus's arrival in 1492, the Native American population of North America was reduced by 80 per cent from diseases, including measles, smallpox and influenza. The damage done", "-29.973268209505477" ], [ "by these viruses significantly aided European attempts to displace and conquer the native population.\nBy the 18th century, smallpox was endemic in Europe. There were five epidemics in London between 1719 and 1746, and large outbreaks occurred in other major European cities. By the end of the century about 400,000 Europeans were dying from the disease each year. It reached South Africa in 1713, having been carried by ships from India, and in 1789 the disease struck Australia. In the 19th century, smallpox became the single most important cause of death of the Australian Aborigines.\nIn 1546 Girolamo Fracastoro (1478–1553) wrote a classic", "-29.840256115559896" ], [ "population was decimated by measles, typhus, cholera, and even the common cold, which had never existed in Australia before the first Europeans came along and started sneezing on things. Without an ancestral history of coping with these pathogens, and with only traditional medicine to treat the sick, the indigenous Australians could only stand by and watch as plagues consumed their people.\nAs such, countless Aborigines fled land that their ancestors may have inhabited for thousands of years, and colonists simply shot numberless tens of thousands others to keep them from hunting sheep or stealing crops. No one knows how many Australian", "-29.83550271182321" ], [ "the Spanish conquest After the arrival of Spanish soldiers in Peru, local people began dying in great number from Eurasian infectious diseases that were chronic among the foreigners. These spread by contact across the New World by indigenous peoples along trading routes, often years ahead of direct contact with the invaders. As the natives have no natural immunity, they suffered high fatalities in epidemics of the new diseases. Because of this, a large medical campaign was launched, saving the life of thousands of natives and descendants of indigenous and Spanish unions called mestizos (\"mixed race\"), which are nowadays the", "-29.812842664818163" ], [ "the Europeans began the human trafficking of massive numbers of enslaved Western and Central African people to the Americas. Like the Native Americans, these African people, newly exposed to the European diseases, lacked any inherited resistances to the diseases of Europe. In 1520, contact with an African who had been infected with smallpox had arrived in Yucatán. By 1558, the disease had spread throughout South America and had arrived at the Plata basin. Colonist violence towards Indigenous peoples accelerated the loss of lives. European colonists perpetrated massacres on the indigenous peoples and enslaved them. According to the U.S. Bureau of", "-29.766503788647242" ], [ "devastation of the indigenous populations.\nEncounters between explorers and indigenous populations in the rest of the world often introduced new infectious diseases, which sometimes caused local epidemics of extraordinary virulence. For example, smallpox, measles, malaria, yellow fever, and others were unknown in pre-Columbian America and Australia.\nThe Canary Islands had an indigenous population called the Guanches whose origin is still the subject of discussion among historians and linguists. Population and distribution Indigenous societies range from those who have been significantly exposed to the colonizing or expansionary activities of other societies (such as the Maya peoples of Mexico and Central America) through to", "-29.693127494712826" ], [ "diseases carried by the Europeans, caused a high rate of fatalities among the indigenous peoples. These losses were exacerbated by the Indian slave trade that flourished in the Southeast during the 17th and 18th centuries. As the survivors and descendants regrouped, the Muscogee or Creek Confederacy arose, which was a loose alliance of Muskogee-speaking peoples.\nThe Muscogee lived in autonomous villages in river valleys throughout present-day Tennessee, Georgia, and Alabama, speaking several related Muskogean languages. Hitchiti was the most widely spoken in present-day Georgia; Hitchiti speakers were the first to be displaced by white settlers, and the language died out.\nMuskogee was", "-29.62141581182368" ], [ "the Eurasian continent. When the Europeans traveled to new lands, they carried these diseases with them. (Note: Scholars believe TB was already endemic in the Americas.) When such diseases were introduced for the first time to new populations of humans, the effects on the native populations were widespread and deadly. The Columbian Exchange, referring to Christopher Columbus's first contact with the native peoples of the Caribbean, began the trade of animals, and plants, and unwittingly began an exchange of diseases.\nIt was not until the 1800s that humans began to recognize the existence and role of germs and", "-29.58203825436067" ], [ "domestic animals. The combined effect of the increased population densities supported by agriculture, and of close human proximity to domesticated animals leading to animal diseases infecting humans, resulted in European societies acquiring a much richer collection of dangerous pathogens to which European people had acquired immunity through natural selection (see the Black Death and other epidemics) during a longer time than was the case for Native American hunter-gatherers and farmers. \nHe mentions the tropical diseases (mainly malaria) that limited European penetration into Africa as an exception. Endemic infectious diseases were also barriers to European colonisation of Southeast Asia and New", "-29.53633328108117" ], [ "the south. The native people were heavily affected by contact with Europeans, who established three Spanish Missions near them from 1770 to 1791. The Spanish forcibly assimilated the Indians, requiring them to labor in the mission fields, while feeding them an inadequate and foreign diet.\nThe native population was further decimated by diseases for which they had no immunity, including influenza, measles, tuberculosis, gonorrhea, and dysentery, which wiped out 90 percent of their people,. Most of the Esselen people's villages within the current Los Padres National Forest were uninhabited by around 1820.\nSpanish Governor José Figueroa granted two square leagues (totaling 8,949", "-29.533946721930988" ], [ "the resident Indigenous peoples. Although the exact pre-colonization population-count of the Americas is unknown, scholars estimate that Indigenous populations diminished by between 80% and 90% within the first centuries of European colonization. The majority of these losses are attributed to the introduction of Afro-Eurasian diseases into the Americas. Epidemics ravaged the Americas with diseases such as smallpox, measles, and cholera, which the early colonists brought from Europe. \nThe spread of infectious diseases was slow initially, as most Europeans were not actively or visibly infected, due to inherited immunity from generations of exposure to these diseases in Europe. This changed when", "-29.527989131580398" ], [ "have higher instances of bacterial and fungal infection. This is seen in statistics such as \"diabetic Sioux (Lakota people) Tribes were four times as likely to have tuberculosis as those without diabetes.\"\nPrior to the 1940s diabetes was virtually unheard of, but ever since the 1960s the prevalence has been on the rise. This rise is thought to be in part due to their food history and culture. Native Americans had a diverse food history prior to colonization, but after colonization the natives were forced to live on non-traditional lands and eat government hand-outs for food. Much of this food was", "-29.518510813708417" ], [ "the farmland they had been promised. Many started to fall sick after their weakening journey on the India and were unable to ward off new tropical diseases such as malaria. Starvation was also a major concern, and there were also some reports of clashes with the indigenous population. About a hundred settlers died in Port Breton from disease and malnutrition.\nAfter two months, a smaller previous expedition ship, the Genil, was sent out in desperation from the failed colony to find food and supplies. Settlers waited two more months for its return before casting off on the India to try to", "-29.42886086125509" ], [ "mainland North American colonies, in Cuba, and in Brazil. The labour force at first included European indentured servants and local Native American slaves. However, European diseases such as smallpox and African ones such as malaria and yellow fever soon reduced the numbers of local Native Americans. Europeans were also very susceptible to malaria and yellow fever, and the supply of indentured servants was limited. African slaves became the dominant source of plantation workers, because they were more resistant to malaria and yellow fever, and because the supply of slaves was abundant on the African coast.\nDuring the 18th century, sugar became", "-29.37105365487514" ], [ "such as historian Andrés Reséndez of University of California, Davis, assert that disease alone does not explain the total destruction of indigenous populations of Hispaniola. While the populations of Europe rebounded following the devastating population decline associated with the Black Death, there was no such rebound for the indigenous populations of the Caribbean. He concludes that, even though the Spanish were aware of deadly diseases such as smallpox, there is no mention of them in the New World until 1519, meaning perhaps they didn't spread as fast as initially believed, and that unlike Europeans, the indigenous populations were subjected to", "-29.360604279238032" ], [ "oats, grasses, and grapevines. But the colonists also inadvertently carried pathogens, weeds, and rats.\" The introduction of these foreign species upset the balance of native species and severely hurt the way of life of the native population. \nThe first major smallpox outbreak among natives was between 1616 and 1619 in Massachusetts. Native Americans had never seen a disease like this, and it wiped out entire settlements in nations such as the Abenaki, the Pawtucket, and the Wampanoag. \"By wiping out the Indians, smallpox helped the colonists help themselves to land and resources formerly controlled by unfriendly native people. The Europeans", "-29.26127718371572" ], [ "later, the Mexican population was reduced to 3 million, mainly by infectious disease. This shows the main effect of the arrival of Europeans in the new world. With no natural immunity against these pathogens, Native Americans died in huge numbers. Yale historian David Brion Davis describes this as \"the greatest genocide in the history of man. Yet it's increasingly clear that most of the carnage had nothing to do with European barbarism. The worst of the suffering was caused not by swords or guns but by germs.\" By 1700, less than five thousand Native Americans remained in the southeastern coastal", "-29.254365416665678" ], [ "later the American bison or buffalo, whose populations were pushed to the brink. The worst consequence physically was the ravages of European diseases such as smallpox being increasingly spread to Native Americans by traders and trappers.\nFinally, for those indigenous peoples who survived, the fur trade intensified the introduction of Western European ideals of commerce and religion, since the beaver trade was an extension of global capitalism and also indirectly led to the spread of Roman Catholic Christianity to some of the tribes. These changes greatly impacted the Native Americans of the region, challenging their already distressed way of life", "-29.24781893450563" ], [ "the entire population eventually acquired at least some minor immunological defense against diseases such as measles and smallpox. Crosby addresses the first subjugation of lands nearest Europe, in his chapter entitled, The Fortunate Isles, which documents the history of the European waves of attacks on the Azores, Madeira Islands, and Canary Islands to bring them under European suzerainty, and their earliest efforts to enslave their populations and restructure their wildlife.(p.70-103)\nHowever, because the majority of the native populations to the Neo-Europes were still participating in hunting/gathering and did not interact with animals in the same manner as Europeans, they were never", "-29.19522226083791" ], [ "during the 19th century—from more than 200,000 in the early 19th century to approximately 15,000 at the end of the century, mostly due to disease. Epidemics swept through California Indian Country, such as the 1833 malaria epidemic. The population went into decline as a result of the Spanish authorities forcing Native Californians to live in the missions where they contracted diseases from which they had little immunity. Dr. Cook estimates that 15,250 or 45% of the population decrease in the Missions was caused by disease. Two epidemics of measles, one in 1806 and the other in 1828, caused many deaths.", "-29.151190578995738" ], [ "throughout the world, with high losses of life.\nSmallpox was a common disease in Eurasia in the 15th century, and was spread by explorers and invaders. After Columbus landed on the island of Hispaniola during his second voyage in 1493, local people started to die of a virulent infection. Before the smallpox epidemic started, more than one million indigenous people had lived on the island; afterward, only ten thousand had survived.\nDuring the 16th century, Spanish soldiers introduced smallpox by contact with natives of the Aztec capital Tenochtitlan. A devastating epidemic broke out among the indigenous people, killing thousands.\nIn", "-29.140962350520567" ], [ "from violence and death from disease. In response, political scientist R. J. Rummel has instead estimated that over the centuries of European colonization about 2 million to 15 million American indigenous people were the victims of what he calls democide. \"Even if these figures are remotely true\", writes Rummel, \"then this still make this subjugation of the Americas one of the bloodier, centuries long, democides in world history.\" Economic pursuit and treatment of slaves Spain and Portugal sought the utilization of foreign and indigenous peoples during post colonial contact with the New World. The Portuguese and Spanish use of slavery", "-29.13281242409721" ], [ "crops from oak, hickory, beech, walnut, chestnut, and butternut failed at times; making the supply of these nuts scarce for food. Rivers froze early so fishing became impossible. Native American populations declined after epidemics of infectious diseases, for which they had no acquired immunity. Native American populations were separated from Europe for thousands of years and had no immunity to the diseases the Europeans brought with them. Many Native American populations were weakened from starvation due to the Little Ice Age, which was coldest during the 17th century. Their important corn, bean and squash crops failed due to", "-29.10948277451098" ], [ "colonization of the Americas, in which millions of immigrants from Europe eventually settled in the Americas.\nThe population of African and Eurasian peoples in the Americas grew steadily, while the indigenous population plummeted. Eurasian diseases such as influenza, pneumonic plagues, and smallpox devastated the Native Americans, who did not have immunity to them. Conflict and outright warfare with Western European newcomers and other American tribes further reduced populations and disrupted traditional societies. The extent and causes of the decline have long been a subject of academic debate, along with its characterization as a genocide. Population overview Given the fragmentary nature of", "-29.108957699412713" ], [ "tribes were enamored with things like metal pots, skillets, and knives, and they traded with the white newcomers anyway, inadvertently spreading diseases to their villages. Biological warfare during the Siege of Fort Pitt The spread of disease from European contact was not always accidental. Europeans arriving in the Americas had long been exposed to the diseases, attaining a measure of immunity, and thus were not as severely affected by them. Therefore, disease could be an effective biological weapon.\nThe Siege of Fort Pitt took place during June and July 1763 in what is now the city of Pittsburgh, Pennsylvania, United States.", "-29.07319460657891" ], [ "England tribes, who demanded tribute or just stole the wampum. Infectious diseases brought by the Europeans, such as smallpox, to which the natives had no natural immunity, combined with intertribal warfare, resulted in great population losses, similar to that suffered by other Native American groups. Cockenoe a Montaukett captured during the Pequot War in 1637, worked with John Eliot in Boston in the 1640s to translate the first parts of the Eliot Indian Bible, before returning to Long Island.\nMohegan missionary and preacher, Samson Occom, formed the Brothertown group along with members of the neighboring Shinnecock band. They moved", "-29.056510476832045" ], [ "20% of them died within four years. None of the bones found show signs of trauma.\nBy 1496, the foreign crops had failed and the colonists were living on small amounts of rationed wheat, bacon, and dried beans. The people became hungry and desperate. The colonists failed to adapt their food sources and at least 50% of them had scurvy. They began to die of scurvy or acute diseases that killed quickly, such as influenza. By 1498 the colony was abandoned by the Europeans. Columbus returned to Spain with a damaged reputation.\nThe Taíno suffered more acutely. The Europeans brought smallpox, measles,", "-29.0439205574512" ], [ "Americas, which is more closely related to a later Eurasian strain likely brought by European colonists. However, this result is criticised by other experts from the field, for instance because there is evidence of the presence of Mycobacterium tuberculosis in 9000 year old skeletal remains.\nAlthough relatively little is known about its frequency before the 19th century, its incidence is thought to have peaked between the end of the 18th century and the end of the 19th century. Over time, the various cultures of the world gave the illness different names: phthisis (Greek), consumptione (Latin), yaksma (India), and chaky oncay (Incan),", "-28.972034518315922" ], [ "from 1492 onwards, some 50-90& of the indigenous population throughout the Americas died from epidemic diseases, exacerbated by the stresses brought on by violent conquest, dispossession and exploitation. This led the Spaniards to supplement aboriginal manpower with slaves from sub-Saharan Africa.\nWell into the 19th century, mining and agriculture accounted for the bulk of economic activity in the Americas. African slave labor held the advantage of having already been exposed to European diseases through geographical proximity, and African laborers readily adapted to the tropical climate of the colonies. In the case of Argentina, the influx of African slaves began in", "-28.923570291037322" ], [ "Without providing statistics, Indian Affairs Superintendent to the area Colonel Alfred Cumming reported at least more deaths than births in most tribes in the area. While noting intemperance, or alcoholism, as a leading cause of death, Cumming specifically cited cholera, smallpox, and measles, none of which the Native Americans were able to treat. The disastrous epidemics exemplified the Osage people, who lost an estimated 1300 lives to scurvy, measles, smallpox, and scrofula between 1852 and 1856, contributing, in part, to the massive decline in population, from 8000 in 1850 to just 3500 in 1860. The Osage had already encountered epidemics", "-28.892412883462384" ], [ "on California's native population, which continued to precipitously decline mainly due to Eurasian diseases to which they had no natural immunity. Like when the Spanish missions in California were established the native inhabitants were often forcefully removed from their traditional tribal lands by incoming miners, ranchers, and farmers. There were a number of massacres, including the Yontoket massacre, the Bloody Island massacre at Clear Lake, and the Old Shasta Massacre, in which hundreds of indigenous people were killed. Thousands more are thought to have died due to disease. Combined with a low birth rate for Indian women the Indian population", "-28.855517260730267" ], [ "living in Central America (Honduras and Guatemala), in the Caribbean, and in North and South America (specifically: Florida, New Mexico, Venezuela, Colombia, the Andean civilisations, and even parts of Brasil).\nTorquemada describes the 1576 epidemic in New Spain in the following terms:\nIn the year 1576 a great mortality and pestilence that lasted for more than a year overcame the Indians. It was so big that it ruined and destroyed almost the entire land. The place we know as New Spain was left almost empty.\nHe reported that two million, mostly indigenous, people died, according to a survey conducted by Viceroy Don Martín", "-28.838000675316835" ], [ "Native American disease and epidemics European contact The arrival of Europeans also brought on the Columbian Exchange. During this period European settlers brought many different technologies and lifestyles with them. Arguably, the most harmful effect of this exchange was the arrival and spread of disease or biological warfare; it was the genocide of entire civilizations.\nNumerous diseases were brought to North America, including smallpox, bubonic plague, chickenpox, cholera, the common cold, diphtheria, influenza, malaria, measles, scarlet fever, sexually transmitted diseases, typhoid, typhus, tuberculosis, pertussis (whooping cough), etc. Each of these brought destruction through sweeping epidemics, involving disability, illness, and extensive deaths.", "-28.8083019155456" ], [ "salmon and shellfish. These peoples developed complex cultures dependent on the western red cedar that included wooden houses, seagoing whaling and war canoes and elaborately carved potlatch items and totem poles.\nContact with Europeans brought a series of devastating epidemics of diseases from Europe the people had no immunity to. The result was a dramatic population collapse, culminating in the 1862 Smallpox outbreak in Victoria that spread throughout the coast. European settlement did not bode well for the remaining native population of British Columbia. Colonial officials deemed colonists could make better use of the land than the First Nations people, and", "-28.756815729138907" ], [ "contagious among the Native Americans, and — together with measles, influenza, chicken pox, and other Old World diseases — was a major cause of death since the arrival of Europeans and their animals. Trade and combat also provided ample opportunity for transmission of the disease. Though the 1763–64 smallpox outbreak weakened the native's resistance to Bouquet's campaign in Muskingum Valley, it is not clear, however, whether the smallpox was a result of the Fort Pitt incident or the virus was already present among the Delaware people. It is estimated that between 400,000–500,000 Native American individuals during and after the war", "-28.528183092945255" ], [ "the Spanish turned out to be disastrous to these Native American tribes. Within 150 years, the majority of the pre-Columbian Native American peoples of Florida had been wiped out. Those who had not succumbed to diseases such as smallpox or yellow fever were either killed or enslaved. Little is left of these first Native Americans cultures in Polk County except for scant archaeological records, including a few personal artifacts and shell mounds. Eventually, the remnants of these tribes merged with the Creek Indians who had arrived from the north and became the Seminole Indian tribe. Early history In the 18th", "-28.489286813077342" ], [ "etc.) and disastrous over-harvesting of the animal populations reduced their population to around 4,000 by the year 1700. Since the Lenape people, like all Native Americans, had no immunity to European diseases, when the populations contacted the epidemics, they frequently proved fatal. Some Lenape starved to death as a result of animal over-harvesting, while others were forced to trade their land for goods such as clothing and food. They were eventually moved to reservations set up by the US Government. They were first moved to the only Indian Reservation in New Jersey, the Brotherton Reservation in Burlington County, New Jersey", "-28.4672141941046" ], [ "to 50% of the native population of El Salvador had already been eliminated by the new diseases, against which they had no immunity. It is likely that disease had significantly weakened the Pipil by the time they fielded large armies against the Spanish at Acajutla and Tacuzcalco. Further waves of epidemic diseases spread across Mesoamerica in 1545–1548, and again in 1576–1581, reducing indigenous populations to just 10% of their pre-contact levels, making successful resistance against the European colonisers extremely difficult. The deadliest of the newly introduced diseases were smallpox, malaria, measles, typhus, and yellow fever. Their introduction was catastrophic in", "-28.464814454157022" ], [ "syphilis, in the Native Americans he treated at the Yankton State Hospital. In his premier paper, Kanner stated that in what he considered the more \"civilized\" countries of Europe, there was a higher susceptibility to paralytic dementia from syphilis compared to the \"less civilized\" Native Americans. Although syphilis was very common amongst the Native Americans, Kanner only came across one patient, Thomas T. Robertson, who was Native American and had symptoms of the late-stage syphilis dementia. Kanner concluded that Native Americans rarely got general paralytic dementia because syphilis had been in their population for so long that it lost the", "-28.410958157881396" ], [ "in San Diego. The Spanish built 20 additional missions in California. Their introduction of European invasive plant species and non-native diseases resulted in havoc and high fatalities for the Native Californian tribes. 19th century The population of Native California was reduced by 90% during the 19th century—from more than 200,000 in the early 19th century to approximately 15,000 at the end of the century, mostly due to disease. Epidemics swept through California Indian Country, such as the 1833 malaria epidemic.\nEarly to mid 19th Century, coastal tribes of northwest California had multiple contacts with Russian explorers due to Russian colonization of", "-28.37333010569364" ], [ "et al. (1998) demonstrated that, at low doses of micro-bacterial pathogens, hosts were able to make an appropriate immune response and avoid tuberculosis; higher doses resulted in a less efficient form of a vaccination. The crowding that was a result of widespread relocation and concentration of native groups by the expanding America greatly impacted the susceptibility native people initially had to the foreign diseases.\nBetween 1837 and 1870, at least four different epidemics struck the Plains tribes. When the plains Indians began to learn of the \"white man’s diseases\", they intentionally avoided contact with them and their trade goods. But many", "-28.337092712929007" ], [ "populations died after first contact due to Eurasian smallpox. One element of the Columbian exchange suggests explorers from the Christopher Columbus expedition contracted syphilis from indigenous peoples and carried it back to Europe, where it spread widely. Other researchers believe that the disease existed in Europe and Asia before Columbus and his men returned from exposure to indigenous peoples of the Americas, but that they brought back a more virulent form.\nIn the 100 years following the arrival of the Spanish to the Americas, large disease epidemics depopulated large parts of the Eastern Woodlands in the 15th century. In 1618–1619, smallpox", "-28.331693677275325" ], [ "for around 8,000 years. It is unknown how many Aborigines were living on the island when the Dutch arrived in 1642 nor when James Cook landed in 1777 but when the British began their colonisation in 1803, there were perhaps seven to eight thousand left, many of whom were already dying from diseases thought to have been contracted from European sailors, explorers and seal hunters. In addition many had been left infertile by venereal disease but the introduction of technologically advanced, brutal convicts and less than sympathetic settlers contributed to their misery. Almost all of the 7000 native people were", "-28.318623095809016" ], [ "the European illnesses that the Portuguese brought with them, such as smallpox. In addition to being exposed to foreign diseases, the Portuguese began to enslave the indigenous people in large quantity. Those who were not enslaved were either killed or required to assimilate into European culture. Out of the Tupi tribes that were enslaved, the Caeté tribe along with the Tamoio tribe were known to resist in a violent manner. The enslavement of the Caeté people saw its peak during the 1550s to the 1560s and did not decrease until 1570 when the first law concerning slavery in Brazil", "-28.303603024221957" ], [ "benefit from their possession of horses than expected, as e.g. the stepped roads of Inca settlements were impassable to horses, the Inca did not maximize their use of anti-horse inventions to stop the Spanish intruders. The Inca Empire collapsed because by the time Europeans arrived, smallpox and other epidemics had already swept through cities, due mostly to the natives' lack of immunity to Eurasian diseases.\nThe contrasting approaches of \"High Counters\" and \"Low Counters\" among historians are discussed. Among the former, anthropologist Henry F. Dobyns estimated the number of pre-Columbian Native Americans as close to 100 million, while\ncritics of the High Counters", "-28.258733948649024" ], [ "trade routes continued the spread of disease. The diseases brought by Europeans are not easily tracked, since there were numerous outbreaks and all were not equally recorded. Suzanne Austin Alchon writes that “indirect evidence suggests that some serious illness may have arrived with the 1500 colonists who accompanied Columbus's second expedition in 1493. [...] And by the end of 1494, disease and famine had claimed two-thirds of the Spanish settlers.” The most destructive disease brought by Europeans was smallpox. The first well-documented smallpox epidemic happened in 1518. The Lakota Indians called the disease the running face sickness. Smallpox was lethal", "-28.24080647690039" ], [ "continent has typically been attributed to the spread of a well-documented smallpox epidemic from Hispaniola in December 1518. At that point in time, approximately only 10,000 indigenous people were still alive on Hispaniola.\nSimilarly, yellow fever is thought to have been brought to the Americas from Africa via the Atlantic slave trade. Because it was endemic in Africa, many people there had acquired immunity. Europeans suffered higher rates of death than did African-descended persons when exposed to yellow fever in Africa and the Americas, where numerous epidemics swept the colonies beginning in the 17th century and continuing into the late 19th", "-28.23343601124361" ], [ "on Maya populations. The Old World diseases brought with the Spanish and against which the indigenous New World peoples had no resistance were a deciding factor in the conquest; they decimated populations before battles were even fought. It is estimated that 90% of the indigenous population had been eliminated by disease within the first century of European contact.\nA single soldier arriving in Mexico in 1520 was carrying smallpox and initiated the devastating plagues that swept through the native populations of the Americas. Modern estimates of native population decline vary from 75% to 90% mortality. Maya written histories suggest that smallpox", "-28.22395340737421" ], [ "of old-world disease appears to have been aggravated by the extreme climatic conditions of the time and by the poor living conditions and harsh treatment of the native people under the encomienda system of New Spain. Enslaved Africans in Latin America The African presence in Latin America had an effect on the culture across Latin America. Black slaves arrived in the Americas during the early stages of exploration and settlement. By the first decades of the sixteenth century they were commonly participating in Spain's military expeditions.\nMarriage was allowed in some areas and some slaves were taught to read and write.", "-28.121902017388493" ], [ "Europe. Ninety-eight percent of the world's cases occur in Africa. India In September 1994, India experienced an outbreak of plague that killed 50 and caused travel to New Delhi by air to be suspended until the outbreak was brought under control. The outbreak was feared to be much worse because the plague superficially resembles other common diseases such as influenza and bronchitis; over 200 people that had been quarantined were released when they did not test positive for the plague. All but two of the deaths occurred around the city of Surat. China The People's Republic of China has eradicated", "-28.11788872361649" ], [ "smallpox, which were spread by European settlers. Many Native Americans were also killed by armed conflicts with European settlers.\nWhite Colombians are mostly descendants of Spaniards, although Italian, German, Irish, Portuguese, Slavic, and Lebanese Colombians are found in significant numbers. Many Spanish colonists came searching for gold, while other Spaniards established themselves as leaders of social organizations teaching natives the Christian faith and the ways of European civilization. Catholic priests provided education for Native Americans that otherwise was unavailable.\nBetween 1540 and 1559, 8.9 percent of the residents of Colombia were of Basque origin. It has been suggested that the present day", "-28.09632199074258" ], [ "of tribespeople were killed by foreign plagues and fever, brought along with the Europeans aboard their ships. Other sources suggest that the high death ratio is a result of genocide. For several centuries, Europeans attempted to penetrate the island of Bioko. They, however, were met with staunch resistance, purported savagery, by the Bubi. A German Gold Coast merchant wrote \"The island of Fernando Po is inhabited by a savage and cruel sort of people,\" and that Europeans did not dare to dock upon their beaches, for fear of surprise attacks from natives with dart-weapons. Surprise attacks on explorers and colonists", "-28.093566188646946" ], [ "populations on Long Island declined dramatically after European colonization due mostly to vulnerability to the new infectious diseases carried by colonists, to which they had no immunity. In 1658 a smallpox epidemic caused the deaths of nearly two-thirds of the Indians on the island. In addition, their communities were disrupted by land encroachment by Dutch and later English colonists; they had to shift from hunting and fishing to horticulture. By 1741, estimates are that only 400 Native Americans in total survived.\nIn 1641, English colonists signed a lease with the Shinnecock Indians. In 1703, this was ratified to include more land", "-28.066539523177198" ], [ "the southern extremities of Tierra del Fuego.\nThe impact of European colonization of the Americas on the indigenous communities has been in general quite severe, with many authorities estimating ranges of significant population decline primarily due to disease but also violence. The extent of this impact is the subject of much continuing debate. Several peoples shortly thereafter became extinct, or very nearly so.\nAll nations in North and South America have populations of indigenous peoples within their borders. In some countries (particularly Latin American), indigenous peoples form a sizable component of the overall national population—in Bolivia they account for an estimated 56–70%", "-28.062585251318524" ], [ "population was under 500.\nThe rapid rate at which the native slaves died necessitated the import of Africans, for whom contact with Europeans was not new and who therefore had already developed some immunity to European diseases. Columbus's son Diego Columbus started the African slave trade to the island in 1505. Some newly arrived slaves from Africa and neighboring islands were able to escape and join maroon communities in the mountains. In 1519 Africans and Native Americans joined forces to start a slave rebellion that turned into a years-long uprising, which was eventually crushed by the Spanish in the 1530s.\nSpanish missionary", "-28.02642346295761" ], [ "this day in the Portuguese language, the people of India being called indianos).\nInitially, the Europeans saw the natives as noble savages, and miscegenation began straight away. Tribal warfare and cannibalism convinced the Portuguese that they should \"civilize\" the Amerindians, even if one of the four groups of Aché people in Paraguay practiced cannibalism regularly until the 1960s. When the Kingdom of Portugal's explorers discovered Brazil in the 15th century and started to colonize its new possessions in the New World, the territory was inhabited by various indigenous peoples and tribes which had developed neither a writing system nor school education.\nThe", "-28.02491451642709" ], [ "the western hemisphere. By 1691, the population of indigenous Americans had declined by 90-95 percent, or by around 130 million people.\"\nAccording to scientists from University College London, the colonization of the Americas by Europeans killed so many people it resulted in climate change and global cooling. UCL Geography Professor Mark Maslin, one of the co-authors of the study, says the large death toll also boosted the economies of Europe: \"the depopulation of the Americas may have inadvertently allowed the Europeans to dominate the world. It also allowed for the Industrial Revolution and for Europeans to continue that domination.\" The", "-28.0118037158245" ], [ "1700s when British, Spanish and American ships explored Oregon's coastal region. In the spring of 1792, some Tututni met British explorer Captain George Vancouver. Merchants traded with the Tututni for sea otter pelts. With the arrival of settlers, infectious diseases new to the Native Americans were transmitted, resulting in the deaths of 75% to 90% of the populations of many Oregon native peoples. They did not have any acquired immunity to these diseases, such as smallpox, measles, and others that were endemic among Europeans and Americans.\nIn the 1840s the first wagon trains carrying immigrants started arriving overland to Oregon (Emigrant", "-28.001821260346333" ], [ "unknown, although it is known that the method used is inefficient compared to respiratory transmission and these attempts to spread the disease are difficult to differentiate from epidemics occurring from previous contacts with colonists. Colonist accounts of smallpox effects on the native peoples These foreign diseases were a constant threat to the native peoples of the Americas since the late fifteenth century. The attempt to \"inoculate\" the native tribes in the area by giving tainted objects to their dignitaries Turtle's Heart and Mamaltee, is documented in William Trent's journal. Thomas Hutchins, in his August 1762 Journal entry among the Natives", "-27.93945653490664" ], [ "1545, would have increased the presence of New World rats and mice. These animals are believed to have also been able to transport the arenaviruses capable of causing hemorrhagic fevers. The effects of drought, combined with the now crowded settlements, is a highly plausible explanation for disease transmission, especially if the pathogens are spread by either human fecal matter or animals.\nAs alluded to above, the Aztecs and other indigenous groups affected by the outbreak were potentially put at a disadvantage given their lack of exposure to zoonotic diseases. Given that many of the Old World pathogens being considered as responsible", "-27.926983038312756" ], [ "most commonly accepted five to thirty million pre-contact population. The population decline, perhaps between 50%-85% at its height, was primarily the result of communicable diseases, particularly smallpox, introduced during the Columbian Exchange, although some scholars blame the harsh rule and slavery. During the three hundred years of the colonial era, Mexico received between 400,000 and 500,000 Europeans, between 200,000 and 250,000 African slaves. and between 40,000 and 120,000 Asians. The 18th century saw a great increase in the percentage of mestizos.\nColonial law with Spanish roots was introduced and attached to native customs creating a hierarchy between local jurisdiction (the Cabildos)", "-27.90217448299518" ], [ "been almost annihilated by Eurasian infectious diseases they had no immunity to, following their first European contacts. Those that remained were killed or dispersed during the Yamasee War of 1715, which virtually emptied the area of its Native American inhabitants.\nAround the year 1740, Scots-Irish and German immigrants began to move into the Waxhaws and establish farms. What is now the Old Waxhaw Presbyterian Church was built in 1752.\nDuring the American Revolution, the settlers in the Waxhaws fiercely resisted the British, under the command of militia Colonel William Davie. In 1781 the British forces of General Cornwallis briefly occupied the town", "-27.895792461735255" ], [ "in 1847. The Native Americans lack of immunity to Eurasian diseases resulted in high death rates, with children dying in large numbers. The Whitmans cared for both Cayuse and white settlers, but half of the Cayuse died and nearly all the Cayuse children perished. Seeing that more whites had survived, the Cayuse blamed the Whitmans for the devastating deaths among their people.\nThe Cayuse tradition held medicine men personally responsible for the patient's recovery. Their despair at the deaths, especially of their children, led the Cayuse under Chief Tiloukaikt to kill the Whitmans in their home on November 29, 1847. ", "-27.866574994899565" ], [ "of the contemporary United States, the Native Americans were often conquered and displaced. The native population of America declined after Europeans arrived, and for various reasons, primarily diseases such as smallpox and measles.\nWhile estimating the original native population of North America at the time of European contact is difficult, an attempt was made in the early part of the twentieth century by James Mooney using historic records to estimate the indigenous population north of Mexico in 1600. In more recent years, Douglas H. Ubelaker of the Smithsonian Institution has updated these figures. While Ubelaker estimated that there was a population", "-27.834440900041955" ], [ "at Matagorda Bay. However, most of the members of this expedition were killed by Native Americans. Only three survived: Dorantes de Carranza, Castillo and Estevanico.\nFor almost seven years they lived in poverty among hostile Native Americans, until the three men managed to reunite with Cabeza de Vaca in September 1534, somewhere west of the Sabine River. Cabeza de Vaca taught his companions the Native American art of medicine. In August 1535, the men fled from the Avavare tribe, with whom they were living as medicine men. They fled inland, crossing what is now Texas (being, apparently, the first Europeans to", "-27.828828354395228" ], [ "killed 90% of the Native Americans in the area of the Massachusetts Bay. Historians believe many Mohawk in present-day New York became infected after contact with children of Dutch traders in Albany in 1634. The disease swept through Mohawk villages, reaching the Onondaga at Lake Ontario by 1636, and the lands of the western Iroquois by 1679, as it was carried by Mohawk and other Native Americans who traveled the trading routes. The high rate of fatalities caused breakdowns in Native American societies and disrupted generational exchange of culture.\nAfter European explorers reached the West Coast in the 1770s, smallpox rapidly", "-27.818946207029512" ], [ "of Columbus's arrival in 1492.\nThe population of the Native American population in Mexico declined by an estimated 90% (reduced to 1–2.5 million people) by the early 17th century. In Peru, the indigenous Amerindian pre-contact population of around 6.5 million declined to 1 million by the early 17th century. The overwhelming cause of the decline in both Mexico and Peru was infectious diseases, such as smallpox and measles, although the brutality of the Encomienda also played a significant part in the population decline.\nOf the history of the indigenous population of California, Sherburne F. Cook (1896–1974) was the most painstakingly careful researcher.", "-27.78574906299764" ] ]
8tdk19
when my phone is connected to my cars audio system via Bluetooth, how does the person talking not hear themself through my speakers?
[ "Your car stereo uses active echo cancellation. It know what signal it's sending out of the speakers so it compares the signal it's picking up on the mic to the signal it's send out the speakers and tries to remove anything that is the same in both. This is the same technology that works on your cell phone and on modern table stop speaker phones.", "It seems that some people in the comments are mixing up two technologies. Acoustic Echo Cancellation is the technology that the OP is referring to. This records the incoming audio before it's played from the speakers, and then removes the *echo* after the microphone picks it up before sending it back to the other party. Active Noise Cancellation is the technology used in noise-cancelling headphones. This uses a microphone to pick up background noise and then plays back the inverted sound which effectively cancels it out for the listener.", "I often hear myself echoed back during phone calls at work, it is awful. So difficult to concentrate. I don't know what causes it, but it certainly happens.", "I'm in customer service, we can tell when you're using car audio. There's a bad echo and loud background noise. We have to patiently ask you to repeat everything and often say it's hard to hear you. When you switch to your headset or handset, we usually say OMG I can hear you now! I just wish my older co-workers would realize that shouting into their microphones doesn't help them hear better. Every day... \"I CAN'T HEAR YOU\" OMG Karen the microphone is 2 inches from your mouth, you need to adjust the volume in your ear, not your voice... Also, if you're using car audio in the parking lot, everyone can hear everything from outside, Tammy.", "One piece of advice for bluetooth users... when you go to your mechanics shop to have some work done, make sure you turn off the bluetooth on your phone. Countless times I've been working on a car and been inadvertently listening to someone's entire telephone conversation over their car stereo.", "If you own a Tesla Model 3 then every person you hear will complain that they can hear themselves. Can confirm.", "My part time job is taking phone calls, and I can hear myself echoing on these types of calls. It's the worst." ]
[ [ "August 2014 the program's setup uses five loudspeaker drivers. With V2V technology, cars will purportedly also be able to communicate with one another, and may be able to avoid \"stacking\" similar noises, which can confuse pedestrians. The company is also exploring vehicle-to-mobile phone applications, to help warn pedestrians with headphones on. 3D sound Sound designer Peter Mohlin has attempted to use sound three-dimensionally, providing noises for when a car changes speeds, changes direction or turns on or off, with Herndon quoting that, “In a way, we’ve transformed the steering wheel into a kind of musical controller.\" According to CD News,", "-35.11829363966535" ], [ "the car's speakers and a GPS receiver. There are dock connector cables that offer additional capabilities such as direct integration with the car's audio system and controls.", "-31.850837976613548" ], [ "power cabling connected directly to the automobile's battery. It therefore was quite possible and not uncommon for an IMTS telephone to drain an automobile's battery if used for moderate periods of time without the automobile engine running or if left on overnight. Optionally these units were also connected to the car's horn and could honk the horn as a ringer to summon a user who was away from the car.\nThe IMTS units were full duplex, meaning that a user could both talk and hear the other party at the same time. This was an improvement over the earlier", "-31.757728690863587" ], [ "car includes one sound for forward motion and another for reverse. The VSP was also used in the Nissan Fuga hybrid launched in 2011. The system developed makes a noise easy to hear for pedestrians to be aware of the vehicle approaching, but the warning sounds do not distract the car occupants inside. Nissan explained that during the development of the sound they studied behavioural research of the visually impaired and worked with cognitive and acoustic psychologists, including the National Federation of the Blind, the Detroit Institute of Ophthalmology, experts from the Vanderbilt University Medical Center and a Hollywood sound", "-31.616418793564662" ], [ "front facing speakers but instead it utilizes a mono speaker located on the bottom of the device. The phone features Dolby Surround sound for headphones and it can also play high-resolution audio. It is installed with a digital-to-analog converter (DAC) which upscale the audio from 16 bits to 24 bits. Network The unlocked variant of the A9 is the first non-CDMA phone that is compatible to work with the Verizon networks which was enabled by a software update. HTC has explained that the phone connected to Verizon's network relies on the phone's LTE radio for making phone calls and sending", "-31.41986018701573" ], [ "used for personal audio, either to have sounds audible to only one person, or that which a group wants to listen to. The navigation instructions for example are only interesting for the driver in a car, not for the passengers. Another possibility are future applications for true stereo sound, where one ear does not hear what the other is hearing. Train Signaling Device Directional audio train signaling may be accomplished through the use of an ultrasonic beam which will warn of the approach of a train while avoiding the nuisance of loud train signals on surrounding homes and businesses.", "-31.050757347962644" ], [ "connectivity with the driver’s mobile phone in a safe and easy way. Mirror Link technology, through the second generation MIB infotainment system, also replicates the smartphone screen when a compatible device is plugged in. Full Link is also compatible with both Android and Apple smartphones.\nThe safety features included are: day running full LED lights, parking assist with audio warnings and a rear-view camera which provides live video from the rear of the car to make the driver aware of obstacles when reversing.\nExternally, the biggest difference is full LED lights. It will be available as a 5-door, sport coupé, and sport", "-30.84918117383495" ], [ "voice signal into mechanical vibrations. The vibrations flow through the cheek bones or forehead allowing the user to hear the conversation. This is useful in the noisy situations or if the user is hard of hearing.\nAs of 2018, there are smartphones that offer reverse wireless charging. Multi-mode and multi-band mobile phones Most mobile phone networks are digital and use the GSM, CDMA or iDEN standard which operate at various radio frequencies. These phones can only be used with a service plan from the same company. For example, a Verizon phone cannot be used with a T-Mobile service, and vica", "-30.65543623699341" ], [ "sent over and all listening on different headphones. Old mix just pushed it a little far but no one had a set of speakers we trusted being on the road and such. By the time we got home we were used to the sound but hearing it on the radio next to other things allowed us to gain some perspective on it.", "-30.644728515530005" ], [ "Dual headphone adapter A dual headphone adapter, also known as a \"headphone splitter\" or \"audio jack splitter\", is a device that allows two headphones to be connected through to one audio jack. They can be used to listen to audio through multiple audio input devices, such as headphones on devices such as an MP3 player, CD player, modern Computer with audio-out compatibility (such as a headphone socket) or boombox. Although earbuds, a type of headphone design, can be shared with a friend (with one \"bud\" in another's ear), a dual headphone adapter can be more practical. Dual headphone adapters can", "-30.557755040121265" ], [ "the handset off the telephone by pressing the button on the wireless headset. Bluetooth Bluetooth technology is widely used for short-range voice transmission. While it can be and is used for data transmission, the short range (due to using low power to reduce battery drain) is a limiting factor. A very common application is a hands-free Bluetooth earpiece for a phone which may be in a user's pocket.\nThere are two types of Bluetooth headsets. Headsets using Bluetooth v1.0 or v1.1 generally consist of a single monaural earpiece, which can only access Bluetooth's headset/handsfree profile. Depending on the phone's operating system,", "-30.422073664230993" ], [ "a ringing noise to alert its owner, while the user of the first phone hears a ringing noise in its earpiece. If the second phone is picked up, then the operators of the two units are able to talk to one another through them. If the phone is not picked up, the operator of the first phone continues to hear a ringing noise until they hang up their own phone.\nOne of the main struggles for Alexander Graham Bell and his team was to prove to non-English speakers that this new phenomenon \"worked in their language.\" It was a concept that", "-30.31946120801149" ], [ "can output stereo sound and accept an adapter for standard 3.5mm jack. Next to the audio jack, in the center of the phone, resides a connector used for data transfer and charging. The upper left side of the phone contains 2 volume keys; the right side is a mirror image of the left without the volume keys.", "-30.278520724445116" ], [ "a problem due to the design of the phone, the quality of the cellular network and compression algorithms used in long distance calls. Audio quality can be improved using a VoIP application over WiFi. Cellphones have small speakers so that the user can use a speakerphone feature and talk to a person on the phone without holding it to their ear. The small speakers can also be used to listen to digital audio files of music or speech or watch videos with an audio component, without holding the phone close to the ear. Battery The average phone battery lasts", "-30.222469070577063" ], [ "use in national emergency broadcast systems, but short range units on emergency vehicles can prove an effective means of alerting traffic to their presence, although is not able to alert pedestrians, non-RDS radio users, or drivers with their radios turned off.\nA new technology has been developed and is slowly becoming more popular with police. Called the Rumbler, it is a siren that emits a low frequency sound which can be felt. Motorists that may have loud music playing in their car, for example, may not hear the audible siren of a police car behind them, but will feel the vibrations", "-30.216931571019813" ], [ "recordings and indicated when they could hear from which direction the cars approached. Subjects could locate the hum of the internal combustion engine car at 36 feet (11 m) away, but could not identify the hybrid running in electric mode until it came within 11 feet (3.4 m), leaving just less than two seconds to react before the vehicle reached their position. In a second trial, the background sounds of two quietly idling combustion engine cars were added to the recordings to simulate the noise of a parking lot. Under this condition, the hybrid needed to be 74 percent closer than the", "-30.204898900788976" ], [ "developed an after market technology called \"Vehicular Operations Sound Emitting Systems\" (VOSES). The device makes hybrid electric vehicles sound more like conventional internal combustion engine cars when the vehicle goes into the silent electric mode (EV mode), but at a fraction of the sound level of most vehicles. At speeds higher than between 20 miles per hour (32 km/h) to 25 miles per hour (40 km/h) the sound system shuts off. The system also shuts off when the hybrid combustion engine is active.\nVOSES uses miniature, all-weather audio speakers that are placed on the hybrid's wheel wells and emit specific sounds based on", "-30.149327331455424" ], [ "is not exclusive to electric vehicles. In 2007 research at the Technical University Munich showed that ordinary vehicles in background noise are often detected too late for safe accident avoidance. The researchers measured the distance at which vehicles approaching pedestrians became audible with minimal background noise. These distances were then compared to the stopping distances of the respective cars and an algorithm was proposed to estimate them based on auditory masking.\nResearch conducted at the University of California, Riverside in 2008 found that hybrid cars are so quiet when operating in electric mode (EV mode) that they may pose a risk", "-30.08504062658176" ], [ "Mobile The \"SoundLink Mobile\" was released in 2011 as a smaller, battery-powered model. It used Bluetooth to communicate with the source device. Reviewers praised the unit's audio quality, but criticised the high price and lack of a microphone (to enable its use as a speakerphone).\n\nThe SoundLink Mobile was replaced by the \"SoundLink Bluetooth Mobile Speaker II\", which was sold from 2012 until 2014. It included a rechargeable battery that was rated at up to 8 hours of playback at \"moderate\" volume levels. The rear of the device includes a 3.5 mm auxillary input. The appearance is very similar to its predecessor,", "-30.048358575586462" ], [ "Nokia 6310i Mercedes-Benz Like the 6210 and 6310, the 6310i was optionally included on several Mercedes-Benz cars. A cradle was installed in the dashboard, into which the phone was securely placed. Connectors in the cradle provided the phone with electrical power, routed the audio path through the car's audio system, and an external antenna mounted on the car's chassis replaced the internal antenna, providing a stronger signal and better signal-to-noise ratio.", "-29.997725858469494" ], [ "A loudspeaker that serves as an earpiece is located above the screen. The microphone is featured on the bottom of the phone and is used for phone calls and voice-commands, although it can also be used in many other third-party applications. The unit has an HDMI-out (type D, micro connector) port, which allows sending content to an HD television set. The Sprint Mobile Hotspot application allows sharing the device's mobile broadband with up to eight devices. Smartphone connectivity The EVO features a CDMA cellular radio that supports 3G EVDO, Revisions 0, A, and the yet-undeployed B allowing faster download and", "-29.982775161992322" ], [ "turned off, a cell phone periodically emits radio signals on its control channel, to keep contact with its cell tower and for functions like handing off the phone to another tower if the user crosses into another cell. When the user is making a call, the cell phone transmits a signal on a second channel which carries the user's voice. Existing 2G, 3G, and 4G networks use frequencies in the UHF or low microwave bands, 600 MHz to 3.5 GHz. Many household wireless devices such as Wifi networks, garage door openers, and baby monitors use other frequencies in", "-29.93838823790429" ], [ "of an active noise control system which reduces engine and road noise for the driver and passengers. One or more microphones are used to pick up sound from various places on the vehicle, especially the engine compartment, underside or exhaust pipes, and these signals are handled by a digital signal processor (DSP) then sent to the loudspeakers in such a way that the processed signal reduces or cancels out the outside noise heard inside the car. An early system focused only on engine noise was developed by Lotus and licensed for the 1992 Nissan Bluebird models sold in Japan. Lotus", "-29.935878473770572" ], [ "power source.\nThe speakers work with the Sound BlasterAxx Control Panel software for adjustment of SBX Pro Studio and Crystal Voice settings. The Sound BlasterAxx Control Panel has got a Mac OS X version other than the Microsoft Windows version.\nThe Sound BlasterAxx SBX 8 is the only speaker that does not have Bluetooth capability. The Sound BlasterAxx SBX 10 and Sound BlasterAxx SBX 20 are Bluetooth capable and can be used for answering phones calls from iOS and Android smart phones. The Bluetooth version for the speakers is Bluetooth 2.1(Enhanced Data Rate). The Bluetooth codecs supported are SBC and AAC, aptX", "-29.924825475842226" ], [ "on background noise so that, in theory, the user should not have to adjust the volume when walking between quiet and noisy environments. Signal processing attempts to amplify the caller's voice and reject background noise, allowing the caller to be heard more clearly; however, in practice call quality is poor for models without A2DP. The Bluetooth Headset was criticized for having poor call quality, a lack of features and a high price tag. Bluetooth Headset Series 2 The \"Bluetooth Headset Series 2\" was sold from 2011 until 2015. Compared with its predecessor, the Series 2 included A2DP and a revised", "-29.87480499141384" ], [ "system which allowed the driver to both lock and unlock the car by touching the door handle, without having to use the remote control, and a keyless start system. A new 260 watt, ten speaker Bose DVD-Audio 5.1 sound system equalized for the RL cabin featured several Bose technologies. Bose AudioPilot is a noise compensation technology which analyzes background environmental cabin noise and uses an algorithm based on cabin acoustics to boost certain portions of the musical signal so that it may be heard more clearly above environmental sound \"clutter\" without any apparent change in volume. Bose", "-29.8415094548036" ], [ "that can be set using a tuning knob to overcome potential RF interference with other nearby wireless devices, such as cordless phones or baby monitors. Bluetooth devices use a radio communication frequency such that the devices do not have to be in a visual line of sight with each other.\nDifferent types of wireless speakers are designed for specific needs: Stereo speakers can deliver both Left and Right stereo channels in a single speaker. Speakers designed specifically for outdoor use have a robust casing; manufacturers claim these are weatherproof. Home theatres utilize a specialized set of speakers in", "-29.835751697071828" ], [ "vehicle. After the test several of them changed their opinion and said that this issue was less of a problem than they expected. Nevertheless, some test drivers said they experienced incidents of not being noticed while others said they had taken extra care in their driving with regard to this issue. Regulations Since 2009 the Japanese government, the U.S. Congress and the European Commission are exploring legislation to establish a minimum level of sound for plug-in electric and hybrid electric vehicles when operating in electric mode, so that blind people and other pedestrians and cyclists can hear them coming and", "-29.791204499080777" ], [ "the two where radios use duplex as a default but can communicate simplex on the base station channel if out-of-range. In the US, the capability to talk simplex on a duplex channel with a repeater is sometimes called talk-around, direct, or car-to-car. Push-to-talk (PTT) In two-way radios with headsets, a push-to-talk button may be included on a cord or wireless electronics box clipped to the user's clothing. In fire trucks or an ambulance a button may be present where the corded headset plugs into the radio wiring. Aircraft typically have corded headsets and a separate push-to-talk button on the control", "-29.75290530778875" ], [ "into a phone's or portable media player's micro-USB slot. Smartphones often use a standard 3.5 mm jack, so users may be able to directly connect the headset to it. There are however different pin-alignment to the 3.5mm plug, mainly OMTP and CTIA, so a user should find out which settings their device uses before buying a headphone/headset.\nMany wireless mobile headsets use Bluetooth technology, supported by many phones and computers, sometimes by connecting a Bluetooth adapter to a USB port. Since version 1.1 Bluetooth devices can transmit voice calls and play several music and video formats, but audio will not be played", "-29.599257074092748" ], [ "radio such as internet radio, satellite radio, USB and Bluetooth, and in-dash slots for memory card. By this time some models were offering 5.1 surround sound. And the automobile head unit became increasingly important as a housing for front and backup dashcams, navis, and operating systems with multiple functions, such as Android Auto, CarPlay and MirrorLink. Latest models are coming equipped with features like Bluetooth technology along with HDMI port for better connectivity. Screen size varies from 5-inch to 7-inch for the double Din car stereos. Active noise control and noise synthesis The automobile sound system may be part", "-29.59659065780579" ], [ "Electric vehicle warning sounds Electric vehicle warning sounds are sounds designed to alert pedestrians to the presence of electric drive vehicles such as hybrid electric vehicles (HEVs), plug-in hybrid electric vehicles (PHEVs), and all-electric vehicles (EVs) travelling at low speeds. Warning sound devices were deemed necessary by some government regulators because vehicles operating in all-electric mode produce less noise than traditional combustion engine vehicles and can make it more difficult for pedestrians, the blind, cyclists, and others, to be aware of their presence. Warning sounds may be driver triggered (as in a horn but less urgent) or automatic at low", "-29.58238167653326" ], [ "connect to the iPhone by Bluetooth, use Apple's Lightning port (which has replaced the 3.5 mm headphone jack), or (for traditional headsets) use the Lightning to 3.5 mm headphone jack adapter, which is included with iPhone 7 up until iPhone X and plugs into the Lightning port.\nApple's own headset has a multipurpose button near the microphone that can play or pause music, skip tracks, and answer or end phone calls without touching the iPhone. Some third-party headsets designed for the iPhone also include the microphone and control button. The current headsets also provide volume controls, which are only compatible with more recent", "-29.529038912558462" ], [ "Phone connector (audio) A phone connector, also known as phone jack, audio jack, headphone jack or jack plug, is a family of electrical connectors typically used for analog audio signals.\nThe phone connector was invented for use in telephone switchboards in the 19th century and is still widely used.\nThe phone connector is cylindrical in shape, with a grooved tip to retain it. In its original audio configuration, it typically has two, three, four and, occasionally, five contacts. Three-contact versions are known as TRS connectors, where T stands for \"tip\", R stands for \"ring\" and S stands for \"sleeve\". Ring contacts are", "-29.50310792250093" ], [ "for the headphones is located on the top left corner of the device for the first five generations (original through 4S), after which time it was moved to the bottom left corner. The headphone socket on the first-generation iPhone is recessed into the casing, making it incompatible with most headsets without the use of an adapter. Subsequent generations eliminated the problem by using a flush-mounted headphone socket. Cars equipped with an auxiliary jack allow handsfree use of the iPhone while driving as a substitute for Bluetooth. The iPhone 7 and later have no 3.5 mm headphone jack, and instead headsets must", "-29.49281203292776" ], [ "without a telephone. But, noticing a radio in the room, he uses his knowledge of radio to improvise a way to use it as a phone: the loudspeaker will double as a microphone if they swap the right wires back and forth each time he starts or finishes talking.\nHe reaches the telephone operator and tries to get a message sent to Upshaw's flight, but Jones's man on the flight finds a way to disable the aircraft radio, and contact is lost. Benton then has the operator contact his radio station, where it is almost time for The Fox. They patch", "-29.49242345248058" ], [ "its own equipment. The warning sound is activated when the car is travelling at less than 25 mph (40 km/h). Ford The 2012 Ford Focus Electric was planned to include warning sounds for pedestrians. Ford Motor Company developed four alternative sounds, and in June 2011 involved the electric car fans by asking them to pick their favorite from the four potential warning sounds through the Focus Electric Facebook page. However, ultimately Ford decided to hold off including warning sounds unless federal legislation required it, and no such system was implemented on the production vehicle. General Motors General Motors' first commercially available plug-in", "-29.441348077030852" ], [ "the setting of these switches is determined electronically when the caller dials the number. Once the connection is made, the caller's voice is transformed to an electrical signal using a small microphone in the caller's handset. This electrical signal is then sent through the network to the user at the other end where it is transformed back into sound by a small speaker in that person's handset.\nAs of 2015, the landline telephones in most residential homes are analog—that is, the speaker's voice directly determines the signal's voltage. Although short-distance calls may be handled from end-to-end as analog signals, increasingly telephone", "-29.43925892940024" ], [ "by double tapping on it. Audio and output The N9 has two microphones and a loudspeaker situated at the bottom of the phone. The main microphone enables conversation and recording. The second microphone is located on the back of the device near the flash LEDs and main camera, it is used by MeeGo system for noise cancellation which make phone conversations clearer in noisy environment. On the top, there is a 3.5 mm AV connector which simultaneously provides stereo audio output, with support for Dolby Headphone, and either microphone input or video output. Next to the 3.5 mm connector, there is a", "-29.365380068484228" ], [ "Charge 4.0-compatible, and comes with a Quick Charge 3.0 charger.\nHTC's BoomSound dual-speaker technology features on the device; it uses the earpiece as a tweeter and a bottom-firing speaker as a subwoofer. The phone uses four microphones that can isolate subjects in videos and that can automatically zoom up to 4×. As with the U11, a pair of USonic earbuds are included that connect via USB-C and incorporate a DAC and active noise cancellation. The U12+ can transmit 24-bit audio files via Bluetooth with aptX-HD.\nThe U12+ features the Edge Sense pressure-sensitive sides that debuted on the U11 and", "-29.341557893145364" ], [ "Voice-operated switch In telecommunications, a voice operated switch, also known as VOX or voice-operated exchange, is a switch that operates when sound over a certain threshold is detected. It is usually used to turn on a transmitter or recorder when someone speaks and turn it off when they stop speaking. It is used instead of a push-to-talk button on transmitters or to save storage space on recording devices. On cell phones, it is used to save battery life. Intercom systems that use a speaker in a room as both a speaker and a microphone will often use VOX on the", "-29.184748903207947" ], [ "are sold under different brands. Kyocera makes phones for some Japanese wireless carriers including au, willcom, SoftBank and Y!mobile.\nIn May 2012, Kyocera released the world's first speaker-less smartphone, the Kyocera Urbano Progresso. This phone produces vibration to conduct sound through the ear canal instead of the customary speaker, making it easier to hear phone conversations in busy and noisy places. This also benefits those who are having difficulty hearing, but are not totally deaf. It can be used across the world with CDMA, GSM, GPRS and UMTS antennas. This phone is only available in Japan. Solar cells Kyocera maintains production", "-29.13400109350914" ], [ "Turbo. BMW plays a recorded sample of its motors through the car speakers, using a different samples according to the engine’s load and power. Legality Extremely loud sound systems in automobiles may violate the noise ordinance of some municipalities, some of which have outlawed them. In 2002 the U.S. Department of Justice issued a guide to police officers on how to deal with problems associated with loud audio systems in cars.", "-29.11316812725272" ], [ "CW signal is converted to the intermediate frequency (IF), then mixed with the Beat frequency oscillator (BFO) frequency to generate a difference frequency, which is audible over the radio receiver loudspeaker or headphones.\nSidetone is also used on voice radio equipment to give the radio operator confidence that they are transmitting over the radio. The sidetone audio is typically derived from the transmit audio circuitry. Aviation In aviation audio systems the loudness of the sidetone heard in a helmet or headset may be adjusted to suit personal comfort, although this may lead to communication problems since the person speaking will", "-29.106017727512153" ], [ "this type of headset will either play music at a very low quality (suitable for voice), or will be unable to play music at all. Headsets with the A2DP profile can play stereo music with acceptable quality. Some A2DP-equipped headsets automatically de-activate the microphone function while playing music; if these headsets are paired to a computer via Bluetooth connection, the headset may disable either the stereo or the microphone function. Bluetooth wireless desktop devices Desktop devices using Bluetooth technology are available. With a base station that connects via cables to the fixed-line telephone and also the computer via soundcard, users", "-29.021603121538647" ], [ "add-on batteries, headphones, combined headphone-microphones (which, for example, allow a person to privately conduct calls on the device without holding it to the ear), and Bluetooth-enabled powered speakers that enable users to listen to media from their smartphones wirelessly.\nCases range from relatively inexpensive rubber or soft plastic cases which provide moderate protection from bumps and good protection from scratches to more expensive, heavy-duty cases that combine a rubber padding with a hard outer shell. Some cases have a \"book\"-like form, with a cover that the user opens to use the device; when the cover is closed, it protects the screen.", "-29.00714988427353" ], [ "time, and through the addition of external speakers, the sound system allows pedestrians to hear the noise too, but optionally there can be a different sound within the car from the one that is emitted for the outside. Lotus used a Toyota Prius to demonstrate the device but did not indicate if it intended to bring this technology to market.\nLotus' synthetic sound system was incorporated in the Lotus Evora 414E Hybrid, a concept plug-in hybrid unveiled at the 2010 Geneva Motor Show. The system, called HALOsonic Internal and External Electronic Sound Synthesis, is a suite of noise solutions that uses", "-29.005509648821317" ], [ "speakerphone which allows for good quality listening to music. Camera On the back of the phone there is a 3.2mpx camera which can also record WVGA (800x480) video recording at 16-22FPS. The camera features geo-tagging but has no support for low-light pictures as it has no flash. Connectivity The Huawei Sonic is the first low-range smartphone of its kind to have an NFC (optional) chip in it in its U8650NFC-1 version. The micro-USB port enables USB Mass Storage mode, meaning pictures, videos and music can be transferred on to the phone from a computer.\nThe phone also features a standard 3.5mm", "-28.948775215656497" ], [ "TRRS) 2.5 mm and 3.5 mm sockets are common on cell phones, providing mono (three conductor) or stereo (four conductor) sound and a microphone input, together with signaling (e.g., push a button to answer a call). Three-conductor 2.5 mm connectors are particularly common on older phones, while four-conductor 3.5 mm connectors are more common on newer smartphones. These are used both for handsfree headsets (esp. mono audio plus mic, also stereo audio plus mic, plus signaling for call handling) and for (stereo) headphones (stereo audio, no mic). Wireless (connectorless) headsets or headphones usually use the Bluetooth protocol.\nThere is no recognised standard for TRRS connectors", "-28.862681913662527" ], [ "Bose portable audio products The portable audio products sold by Bose Corporation have been marketed as the \"SoundLink\" models. These wireless speaker systems are battery powered and play audio over a wireless connection from a separate source device (such as a computer or smartphone). Most models use Bluetooth to communicate with to the source device. SoundLink The first SoundLink product was released in 2009 and used a USB wireless transmitter plugged into the computer to receive audio from the computer (using a proprietary protocol— not Bluetooth). The system included a remote control. Reviewers criticised the high price of US$550. SoundLink", "-28.839535047620302" ], [ "models. A fourth ring in the audio jack carries this extra information.\nThe built-in Bluetooth 2.x+EDR supports wireless earpieces and headphones, which requires the HSP profile. Stereo audio was added in the 3.0 update for hardware that supports A2DP. While non-sanctioned third-party solutions exist, the iPhone does not officially support the OBEX file transfer protocol. The lack of these profiles prevents iPhone users from exchanging multimedia files, such as pictures, music and videos, with other Bluetooth-enabled cell phones.\nComposite or component video at up to 576i and stereo audio can be output from the dock connector using an adapter sold by Apple.", "-28.82464832533151" ], [ "known as of today hint at „Minuscule“ being deployed as bluetooth headphones and as such the earbuds will not completely comply with the definition of hearables in a broader sense. If they are to be seen as but an interim stage in the development of a multi-purpose in ear-piece is yet uncertain. A similar approach was chosen by headphone company OwnPhones, which is currently working on wireless, Bluetooth triggered earbuds, which can be fitted individually to the user's ear by a smartphone based measuring application triggering a 3D-printing device. The earphones will be fully compatible with all major smartphone and", "-28.81877601108863" ], [ "integrated with pressure-sensitive digitizers, such as those developed by Wacom and Samsung, and Apple's Force Touch system. Sound Some audio quality enhancing features, such as Voice over LTE and HD Voice have appeared and are often available on newer smartphones. Sound quality can remain a problem due to the design of the phone, the quality of the cellular network and compression algorithms used in long distance calls. Audio quality can be improved using a VoIP application over WiFi. Cellphones have small speakers so that the user can use a speakerphone feature and talk to a person on the phone", "-28.798527433013078" ], [ "vehicle-to-vehicle communication system. The driver may also communicate with the car via a handheld LOOP device, which includes a liquid-crystal display to provide basic information, such as how long the car has been parked and its state of charge; the front fascia of the EV-N lights up as the driver (with the LOOP) approaches or departs. One Honda U3-X personal mobility device is attached to the interior panel of the passenger-side door. The EV-N, U3-X, and other vehicles were shown at Tokyo as part of Honda's HELLO! (Honda ELectric mobility LOop) display.\nAlthough Honda had declared the EV-N was a styling", "-28.732937263237545" ], [ "legislation, some carmakers announced their decision to address this safety issue shared by regular hybrids and all types of plug-in electric vehicles, and as a result, the Nissan Leaf and Chevrolet Volt, both launched in late 2010, and the Nissan Fuga hybrid and the Fisker Karma plug-in hybrid, both launched in 2011, include synthesized sounds to alert pedestrians, the blind and others to their presence. Toyota introduced its Vehicle Proximity Notification System (VPNS) in the United States in all 2012 model year Prius family vehicles, including the Prius v, Prius Plug-in Hybrid and the standard Prius.\nThere is also aftermarket technology", "-28.69025051110657" ], [ "clicking sound as well as the KRACK WPA2 Wi-Fi security issue, however, it did not fix the buzzing sounds heard during calls on some devices. Google has promised a fix in a future update.\nThe Pixel 2 XL has a volume flaw that reduces the sound level of audio clips sent through messaging apps such as Google Allo, Instagram, and Telegram among others. Google is aware of the problem and is looking into it.\nSome of the USB-C to 3.5 mm adapters for the headphones do not work. In some cases, rebooting the phone can fix the issue temporarily. Google is offering replacements", "-28.68549222499132" ], [ "open), and other components which are connected when the phone is \"off hook\". The off-hook components include a transmitter (microphone, A2), a receiver (speaker, A1), and other circuits for dialing, filtering (A3), and amplification.\nA calling party wishing to speak to another party will pick up the telephone's handset, thereby operating a lever which closes the switchhook (A4), which powers the telephone by connecting the transmitter (microphone), receiver (speaker), and related audio components to the line. The off-hook circuitry has a low resistance (less than 300 ohms) which causes a direct current (DC), which comes down the line (C) from the", "-28.68144360097358" ], [ "lines of boomboxes that use Bluetooth technology known as Stereo Bluetooth, or A2DP (Advanced Audio Distribution Profile). They use the wireless Bluetooth technology to \"stream\" audio to the boombox from a compatible Bluetooth device, such as a mobile phone or Bluetooth MP3 player. An example of this is the JAMBOX, which is marketed as a \"Smart Speaker\" as it can also function as a speakerphone for voice calls in addition to being an audio playback device.\nAnother modern variant is a DVD player/boombox with a top-loading CD/DVD drive and an LCD video screen in the position once occupied by a cassette", "-28.666721355868503" ], [ "Journal reported in February 2007 on concerns that quiet cars like the Prius may pose a safety risk to those who rely on engine noise to sense the presence or location of moving vehicles. Blind pedestrians are a primary concern, and the National Federation of the Blind advocates audio emitters on hybrid vehicles, but it has been argued that increased risks may also affect sighted pedestrians or bicyclists who are accustomed to aural cues from vehicles. However, silent vehicles are already relatively common, and there is also a lack of aural cues from vehicles that have a conventional internal combustion", "-28.63793015968986" ], [ "6 Plus.\nSome users have reported Bluetooth issues, manifesting as stuttering music when playing to Bluetooth speakers. Google said it is already working on them.\nThere have been reports of microphone issues that result in weak and spotty voice quality. Google is investigating the issue, and it is suspected that the issue is partially caused by noise cancellation.\nConnectivity issues were reported after the launch in Australia by users of the Telstra 4GX (LTE Band 28) network. Issues included occasional drops out from the 4G/4GX network, such as when switching from Wifi to 4G/4GX.\nThe phone sometimes switches to landscape mode without a clear", "-28.597155670489883" ], [ "patented technologies from Lotus and Harman International. The audio system generates engine sounds inside the vehicle through the audio system. The system also generates the external sound through speakers mounted at the front and rear to provide a warning to increase pedestrian safety. The system comes with four driver-selectable engine sounds, two of which have been designed to have characteristics of a multi-cylinder conventional V6 and V12 engine. Nissan Vehicle Sound for Pedestrians or VSP is a Nissan-developed warning sound system in electric vehicles. The Nissan Leaf was the first car manufactured by Nissan to include VSP, and the electric", "-28.590541522389685" ], [ "blind, and others of the vehicle's presence due to significant noise reduction typical of a hybrid vehicle traveling at low speeds in all-electric mode. This type of warning device is mandated by the Pedestrian Safety Enhancement Act of 2010. The warning sound is generated by externally mounted speakers and it activates automatically only at speeds below about 24 km/h (15 mph).\nPre-facelift styling\nPost-facelift styling", "-28.585214122547768" ], [ "Vehicle audio Vehicle audio is equipment installed in a car or other vehicle to provide in-car entertainment and information for the vehicle occupants. Until the 1950s it consisted of a simple AM radio. Additions since then have included FM radio (1952), 8-Track tape players, cassette players, CD players (1984), DVD players, Blu-ray players, navigation systems, Bluetooth telephone integration, and smartphone controllers like CarPlay and Android Auto. Once controlled from the dashboard with a few buttons, they can now be controlled by steering wheel controls and voice commands.\nInitially implemented for listening to music and radio, vehicle audio is now part", "-28.518402399669867" ], [ "not to startle. According to GM engineers, the biggest challenge is \"developing an active system that can distinguish a pedestrian from another vehicle\"; otherwise, the sound will go off frequently, producing noise pollution instead. Hyundai Hyundai developed a warning noise for called the Virtual Engine Sound System (VESS). The system, which was introduced in September 2010 on its test fleet of BlueOn electric hatchbacks, provides synthetic audio feedback mimicking the sound of an idling internal combustion engine.\nThe 2011 Hyundai Sonata Hybrid is the first mass production car manufactured by Hyundai to include the warning sound system. In 2010 the car", "-28.51595699050813" ], [ "Car Communication GmbH (now Part of TE Connectivity), Insignia, Jensen, JVC, Kenwood, Pioneer, Sony, and Visteon.\nMost car manufacturers offer HD Radio receivers as audio packages in new cars, including Ford, Honda, Hyundai, Kia, Mazda, Subaru, Tesla Motors, Toyota, Volkswagen and, Nissan.\nHome and office listening equipment is currently available from roughly a dozen companies, in both component tuner and tabletop models, including Audio Design Associates, Boston Acoustics (discontinued), DaySequerra, Denon, DICE Electronics, Directed Electronics, Insignia, Jensen Electronics, LG (discontinued), Marantz, McIntosh, Onkyo, Polk Audio, Radiosophy (discontinued), Radio Shack, Rotel, Sangean, Sony, TEAC, Visteon, and Yamaha. Portable Previously, portable HD Radio", "-28.453819851274602" ], [ "the vehicle's steering wheel controls, as well as Bluetooth hands-free telephone calls and text messages without physically using a handheld device. The Bluetooth profile also allows users to pair their Bluetooth Audio-enabled devices to wireless play MP3 files through the vehicle's audio system. Also offered through the system is the use of Pandora Radio to wirelessly stream internet radio stations using a data connection courtesy of their device. Traffic and weather forecasts are also available through this system. Safety Venzas feature vehicle stability control, traction control, electronic brakeforce distribution, brake assist, anti-lock braking, smart stop technology as well as hill-start", "-28.413014544406906" ], [ "which only the rear speaker/s are wireless, while the front speakers are wired.\nWireless speakers receive considerable criticism from high-end audiophiles because of the potential for RF interference with other signal sources, like cordless phones, as well as for the relatively low sound quality some models deliver. Despite the criticism, wireless speakers have gained popularity with consumers and a growing number of models are actively marketed. Specifically, small and portable wireless Bluetooth speaker models have become very popular with consumers.\nWireless speakers can be connected with computers use a AUX jack with a USB adaptor for Bluetooth pairing. Hybrid wireless speakers", "-28.383114058728097" ], [ "associated with noise reduction Electric cars and plug-in hybrids when operating in all-electric mode at low speeds produce less roadway noise as compared to vehicles propelled by an internal combustion engine, thereby reducing harmful noise health effects. However, blind people or the visually impaired consider the noise of combustion engines a helpful aid while crossing streets, hence plug-in electric cars and conventional hybrids could pose an unexpected hazard when operating at low speeds. Several tests conducted in the U.S. have shown that this is a valid concern, as vehicles operating in electric mode can be particularly hard to hear below", "-28.329481642576866" ], [ "with Sony MDR-V900 headphones into a Furman headphone mixer. However, Badu felt she could not perceive all of her voice's frequencies with the headphones and often discarded them to move towards the studio monitors. He also considered situating her in an equilateral triangle with the two speakers, one of which would be placed out of phase in order to have the leakage cancel itself. However, according to him, the mic has to be stationary, while Badu \"likes to hold the mic like an MC. She is at home as a live performer.\" He said of working around audio spills and", "-28.313905128592523" ], [ "controller being correctly interpreted by the phone. Adapters that are wired for headsets will not work for stereo headphones and conversely. Further, as TTY/TDDs are wired as headsets, TTY adapters can also be used to connect a 2.5 mm headset to a phone.\n3.5 mm TRRS (stereo-plus-mic) sockets became particularly common on smartphones, and have been used e.g. by Nokia since 2006; they are often compatible with standard 3.5 mm stereo headphones. Two different forms are frequently found, both of which place left audio on the tip and right audio on the first ring (mirroring the configuration found on stereo connectors). Where they differ", "-28.277547525789032" ], [ "which can alert people and vehicles to the presence of an emergency vehicle before they can be seen. The first audible warnings were mechanical bells, mounted to either the front or roof of the car. A later development was the rotating air siren, which made noise when air moved past it. Most modern vehicles are now fitted with electronic sirens, which can produce a range of different noises. Police driving training often includes the use of different noises depending on traffic conditions and maneuver being performed. In North America for instance, on a clear road, approaching a junction, the \"wail\"", "-28.241106755682267" ], [ "LCD speedometer display that remains clearly visible in all lighting conditions.\nThe car's in-car entertainment, integrated into the car's information system via CAN bus, is not Digital audio broadcasting (DAB) ready. MP3 playback is supported by the entry level audio system and high-end audio, with double-layer sound-insulated windows and integrated navigation system available as extras. In September 2007, a USB box accessory (Ref: 9702.EZ) was released to enable full iPod connectivity with the standard RD4 radio.\nThe C4 does not feature Citroën's Hydractive suspension, which is reserved for higher class models, such as the C5 and C6. The Picasso version can feature", "-28.239459762491606" ], [ "phone connectors include MIL-STD 202, MIL-P-642/*, and MIL-J-641. Headphones Commercial and general aviation (GA) civil airplane headset plugs are similar, but not identical. A standard ​¹⁄₄ in monaural plug, type PL-55 (both two-conductor phone plugs, a.k.a. PJ-055B, which mate with JK-24 and JK-34A jacks) is used for headphones. On many newer GA aircraft the headphone jack is a standard ​¹⁄₄ in phone connector wired in the standard unbalanced stereo configuration instead of the PJ-055 to allow stereo music sources to be reproduced. Microphones Aviation headphones are paired with special tip-ring-sleeve, 0.206 inch/5.23 mm diameter plug, type PJ-068 (PL-68, for the microphone. The PJ-068 mates", "-28.228196885320358" ], [ "connected to the interior light (dome light), and may also be connected to a warning light, speaker or other device, to inform the driver when the door is not closed. The door light is standard equipment on all cars. In American cars from the 1950s-1990s, they had buzzers or \"door dingers\" that sounded, along with the check light, whenever any door is open. Windows Most vehicle doors have windows, and most of these may be opened to various extents. Most car door windows retract downwards into the body of the doors, and are opened either with a", "-28.20298636716325" ], [ "the console volume at a setting similar to the telephone's perceived volume. This allows the dispatcher to shift her attention between the radio and the phone without continually adjusting volume controls during a conversation.\nTransmit audio is compressed so that field units can hear the base station user over background environmental noise present in cars and in the street scape around walkie-talkie users. Tone conflicts In designing a system, it is important to pick selective calling tones that do not conflict with remote control tones in use.\nAnalog voting systems usually utilize either 2,175 Hz or 1,950 Hz as an indication a receiver is", "-28.186396321456414" ], [ "vehicles that drive below a certain decibel level to also emit warning sounds. In April 2014, the European parliament passed legislation that by 2019, all new electric cars sold in the EU had to emit noise via a device to make them audible to pedestrians. However, despite the ruling's relevant nature to the project, Ocaña notes that legislators were \"looking at this from a technical point of view, whereas [Sonic Movement is] looking at it from a user experience point of view.\"\nPan European Networks stated in August 2014 that the company had shifted \"into an intensive research and development phase.\"", "-28.10850688890787" ], [ "built-in phone adapter to connect an audio-only analog or digital phone for house-wide service. It also has audio and video output jacks (RCA) so that images from the video phone can be shown on a larger screen such as a computer or TV. The service provides for video greetings and video mail for others with Iris 2000 or 3000 videophones. The phone service also communicates with any other audio-only telephone, including voice greetings and voice mail. Specification The phone is based on Freescale's i.MX27 ARM Board and runs a custom Linux kernel. It uses SIP for the connection of the", "-28.09905793046346" ], [ "phone. On the right-hand side of the phone there are three keys: two for controlling volume, skipping through tracks in the Media Player, changing radio channel, and zooming in and out when in camera mode. The third button on the right is the camera shutter button which operates the phone's key feature, a 3.2-megapixel Cyber-shot digital camera. In amongst the speaker at the top of the phone is a small camera used for video calls. Located next to this is the IrDA port.\nThe phone has a standard minimum user-available internal memory capacity of 64 MB. The external memory capacity can", "-28.099047649709973" ], [ "not play on WLAN on some handsets.\nAlso, while this handset supports bluetooth 2.1, the A2DP profile isn't supported by the phone software, resulting in any stereo headset not being recognizedˈ It also has issues regarding call logs.", "-28.098572784336284" ], [ "that allow a visitor to hear the sounds the car makes and to see related videos and photographs that show details of what is under the hood of the car.", "-28.02697400073521" ], [ "direct uninterrupted audio directly through the ear canal and create a clear sound with each listen. Using an all-new Snap-Fit Charging mechanism, the Dual Digital gets a perfect charge every time. TV Ears speaker Similar to surround sound, the TV Ears 5.0 Speaker works using wireless technology to provide 90 dB of volume to the user. By plugging the transmitter into the analog or digital ports of the television, cable, or satellite box, the audio travels via speed of light transmission to the user. Alternate hearing aid types Though there is only one type of TV Ears there are several different", "-28.024439873785013" ], [ "the remote control key fob, or by inserting the ignition key and holding it in the lock or unlock position in the external driver's door lock. \nThe remote locking system confirms successful locking and unlocking through either a light or a horn signal, and usually offers an option to switch easily between these two variants. Both provide almost the same functionality, though light signals are more discreet while horn signals might create a nuisance in residential neighborhoods and other busy parking areas (e.g. short-term parking lots). Some manufacturers offer the ability to adjust the horn signal volume.\nOther cars have a", "-28.00468607066432" ], [ "a distance, calling the latter \"absolutely incredible\". He noted the device's limiting of its Bluetooth capabilities at the time (before the May 2017 update), however, writing that \"it's important to know that Google Home is not a Bluetooth speaker; it's purely a Google Cast device. If you want to play audio on a Google Home, the service needs to have a Google Cast button\". He similarly criticized the Assistant's lack of cross-device functionality, writing that \"Pretty much all the actions you send to a Google Home will stay on that Google Home, and there's never an interaction with your phone\",", "-27.983251418510918" ], [ "no longer provide a sticker at all.\nIn addition, personal UHF radios will sometimes be bought and used as toys, though they are not generally explicitly marketed as such (but see Hasbro's ChatNow line, which transmits both voice and digital data on the FRS band). Smartphone apps & connected devices A variety of mobile apps exist that mimic a walkie-talkie/Push-to-talk style interaction. They are marketed as low-latency, asynchronous communication. The advantages touted over two-way voice calls include: the asynchronous nature not requiring full user interaction (like SMS) and it is voice over IP (VOIP) so it does not use minutes on", "-27.97268627025187" ], [ "When a user makes a call to a POTS phone, the audio is digitized into packets that are transmitted from the mobile device and are then decoded into 64 kbit/s PCM. This creates little extra noise, and if the mobile signal strength is sufficient, the user on the POTS line will be able to carry on a conversation.", "-27.967111941732583" ], [ "with your home PC.\nAlong with the music player with MP3 and AAC support, it also has a built-in radio receiver, which is used through the headset supplied. The phone features stereo speakers with 3D sound effects, a new technology which makes the sound more realistic and is now embedded in many of the latest high-class phones.\nIt also has active standby, which displays daily activities and meetings on the phone's idle display.\nNext in the phone line is the Nokia 6280, a 3G version of the Nokia 6270. It was succeeded by the Nokia 6500 slide which was released in September 2007.", "-27.946547118132003" ], [ "the unit. In the original iPad, the speakers push sound through two small sealed channels leading to the three audio ports carved into the device, while the iPad 2 has its speakers behind a single grill. A volume switch is on the right side of the unit. A 3.5-mm TRRS connector audio-out jack on the top-left corner of the device provides stereo sound for headphones with or without microphones and/or volume controls. The iPad also contains a microphone that can be used for voice recording.\nThe built-in Bluetooth 2.1 + EDR interface allows wireless headphones and keyboards to be used with", "-27.93388475984102" ], [ "CT200h, all EV versions of the Honda Fit, and all Prius family cars recently introduced in the United States, including the standard 2012 model year Prius, the Toyota Prius v, Prius c and the Toyota Prius Plug-in Hybrid. The 2013 Smart electric drive, optionally, comes with automatically activated sounds in the U.S. and Japan and manually activated in Europe. Tesla Motors and Volkswagen do not currently include warning sounds in their electric drive vehicles, as both of them decided to add artificial sounds only when required by regulation. Background As a result of increased sales of hybrid electric vehicles in", "-27.925234884314705" ], [ "was added which clarified the music and at the same time, provided the user with a surround sound experience with comfortable hearing. The sound also seems clarified without the headphones, making it a powerful multimedia phone in the market. The Dolby Headphone feature can be shut down and turned on according to user's choice. Photography The Nokia 603 is not that of a kind photographic phone. But still it offers great experience with its 5.0 Megapixel camera. The Camera can shoot photographs and videos at 30 FPS and have a maximum resolution of 2592 x 1944. The camera lacks auto", "-27.844147543422878" ], [ "(up to 128 GB). For connectivity, the phone has LTE, Bluetooth 4.0, NFC, Wi-Fi and screen mirroring.\nSony will also release a Smart Bluetooth Headset (SBH52) that allows answering calls without taking the phablet out, as well as reading call logs and text messages, listening to music and FM radio. The headset has NFC for single-touch pairing with Xperia Z Ultra, and it is also water-resistant. Features The 6.44\" Full HD (1080p) 342 ppi touchscreen display uses Sony's Triluminos™ and X-Reality for mobile technology, with an OptiContrast panel to reduce reflection and enable clearer viewing even in bright sunlight. The screen", "-27.812689689140825" ], [ "to under 25 kilometres per hour (16 mph). For the 2011 Leaf, the driver could turn off sounds temporarily through a switch inside the vehicle, but the system automatically reset to \"On\" at the next ignition cycle. The system is controlled through a computer and synthesizer in the dash panel, and the sound is delivered through a speaker in the front driver's side wheel well. Nissan said that there were six or seven finalist sounds, and that sound testing included driving cars emitting various sounds past testers standing on street corners, who indicated when they first heard the approaching car.", "-27.806151139186113" ], [ "the Smart Listening System™. It uses adaptive audio processing to enhance specific sound frequencies and elevate what the user intends to hear while reducing background noise. Included are four different colored ear tips for fit personalization. The Scoop connects wirelessly to users' phones or tablets via Bluetooth. Wireless Mic The Wireless Mic is a wireless microphone used to hear a specific sound source in a variety of environments. It picks up the intended sound and delivers it to the Scoop. The Wireless Mic comes with a clip for attaching it to clothing or placing it on a table. Charging Case", "-27.788768803467974" ], [ "of the Android Open Source Project, that enables the transmission of 24bit/96 kHz High-Resolution (Hi-Res) audio content over Bluetooth at up to 990 kbit/s, three times faster than conventional audio streaming codecs, to compatible audio devices.\nOther connectivity options include Bluetooth 5 with aptX and Low Energy, NFC, 4x4 MIMO antennas for fast WI-Fi and cellular upload/download speeds, dual-band Wi-Fi a/b/g/n/ac, Wi-Fi Direct, MirrorLink, screen casting via Miracast and Google Cast, DLNA, GPS (with A-GPS), GLONASS, BeiDou and Galileo satellite positioning. The Xperia XZ2 Compact, like most new smartphone nowadays, has no FM radio. Software The Sony Xperia XZ2 Compact launched with", "-27.77075535664335" ], [ "Connected car A connected car is a car that is equipped with Internet access, and usually also with a wireless local area network (LAN). This allows the car to share internet access, and hence data, with other devices both inside and outside the vehicle. For safety-critical applications, it is anticipated that cars will also be connected using dedicated short-range communications (DSRC) radios, operating in the FCC-granted 5.9 GHz band with very low latency. History of connected cars, 1996–present General Motors was the first automaker to bring the first connected car features to market with OnStar in 1996 in Cadillac", "-27.729529234056827" ], [ "the Sound Blaster ZxR, it allows its op-amps to be swapped. The device does not have an encoder but can decode Dolby Digital 5.1 signals.\nThe Sound Blaster X7’s Bluetooth feature is only for receiving audio signals from Bluetooth devices, it can’t be used for transmitting audio signals to Bluetooth speakers and headphones.\nThe Bluetooth codecs supported by the X7 are AAC, SBC, aptX and aptX Low Latency. Differences from the Sound Blaster Z Series The Sound Blaster X7 does not have the ability to encode digital audio with Dolby Digital Live and DTS Connect.\nIt has a Dolby Digital decoder which was", "-27.715291422442533" ], [ "charging and the mini light on the right (again also from the POV) is a blue bluetooth light displayed in periods when connected to an audio device (e.g. bluetooth headset, earpiece etc.) or flashes rapidly for a short time when another bluetooth device requests a file transfer. One of the primary uses of the device when closed is as a landscape still or video camera. When operating in landscape mode, the user holds the phone on its side (90 degrees counter-clockwise), such that the camera key is positioned near the right index finger. The screen text and icons are also", "-27.714027814778092" ], [ "computer or other audio applications, where the sources offer two-channel output, stereo headsets are the norm; use of a headset instead of headphones allows use for communications (usually monaural) in addition to listening to stereo sources.\nVirtual surround headsets feature ear cups that cover the entire ear. This type of headset uses only two discrete speakers, one on each ear cup, to create surround sound. Virtual surround headsets tend to have higher-end driver components which experts and consumers believe to be more durable, as well as have larger speakers which deliver more powerful and dynamic sound quality. Virtual surround headset achieves", "-27.691491477307864" ], [ "price class.\nThe MIE2 and MIE2i were sold from 2010 until 2015. The MIE2 headset is the same as the IE2 headphones, but with a microphone added so that it operates as a cellphone headset. The MIE2i headset is a version of the MIE2 design for Apple devices (including the iPhone, iPod, iMac, iPad). It incorporates an in-line remote control for volume, track up/down and access to select Apple voice applications. Bluetooth Headset The first \"Bluetooth Headset\" model was released on 1 November 2010, using a similar design to the IE2 earphones. Ambient noise sensing automatically adjusts the volume level based", "-27.690307529293932" ], [ "hybrid electric vehicle, the Chevrolet Volt, introduced in December 2010, includes warning sounds for pedestrians. GM's system is called Pedestrian-Friendly Alert System and it is manually activated by the driver, but future generations will probably include an active system. The automaker conducted a test with a group of the visually challenged at Milford Proving Grounds in order to evaluate the audible warning systems on the Volt when a pedestrian is in the car's proximity. The system uses the car's horn to emit a series of warning chirps, like a low tone of a horn, enough to provide an alert but", "-27.66312947042752" ], [ "some computer speakers, etc. In hi-fi speaker systems, the use of wide-range drive units can avoid undesirable interactions between multiple drivers caused by non-coincident driver location or crossover network issues. Fans of wide-range driver hi-fi speaker systems claim a coherence of sound due to the single source and a resulting lack of interference, and likely also to the lack of crossover components. Detractors typically cite wide-range drivers' limited frequency response and modest output abilities (most especially at low frequencies), together with their requirement for large, elaborate, expensive enclosures—such as transmission lines, quarter wave resonators or horns—to approach optimum performance. With", "-27.64350134092092" ] ]
1d7pgs
Why is it that "preemptive strikes" were so important in the middle east but now that N. Korea has been shown to be a threat and actively threatening the US, the US doesn't enact a preemptive strike?
[ "War is political. Preemptive strikes can be real but just as often it's just an excuse to start some shit for ulterior motives. North Korea on the other hand is... * No serious threat * Has nothing America wants, ie. not worth starting shit over * War with North Korea will cause massive trouble The Iraq and Afghanistan conflict caused America to nose dive further into debt and everyone is struggling to stabilize the countries and clean up the mess. Let's assume a NK conflict is swiftly won and NK get's \"liberated\". There are now some 24 million North Koreans from a dysfunctional nation unloaded on the world. That's a pretty big burden to deal with. So in short, there's no pre emptive strikes because there's no real threat and nobody wants to make NK their problem.", "Nobody wants to deal with all of the refugees. It would be a very very large number of North Koreans brainwashed to hate everyone not North Korean that would need to be educated and re-integrated into society. In contrast, we believed that we would be welcomed with open arms and as liberators by the people of Iraq and Afghanistan before we went in there.", "The difference is, the allies of the countries that were attacked in the Middle East have no influence on the United States, or their influence were insignificant to the US. However, N. Korea's allies are much stronger and do not give a shit about the US, so in case of attack, the US does not only risk their presence in Korea, but they could upset other countries backing Korea up. For example, Afghanistan and Iraq were more or less governed by tyrants and/or unfair leaders. They didn't have strong allies that could stand against USA. Iraq lost their friends ever since the Gulf War, and Afghanistan went to non-existance ever since the Taliban took control. In addition, after Al-Qaeda attacking American soil, that was a good enough reason for Americans to enact a preemptive strike. In this case, Russia, China, and Pakistan could be posing additional threat to USA in case of a strike. That is another reason why N. Korea are holding still.", "Attacking a nation that is actually in possession of weapons of mass destruction is dangerous. Pretend WMD are much, much easier to deal with. Also, NK doesn't have any known oil deposits.", "The real problem with a war with NK would be dealing with the aftermath. I'll ELI5 as well and short as I can: A pre-emptive strike on NK would result in an immediate artillery bombardment of Seoul. The effectiveness of this is debatable as NK shells have about a 50% dud rate and Seoul is well prepared to deal with this. Within a few hours, SK and US forces would knock out most of those artillery positions, as well as supply lines in NK. NK troops would defect or surrender en masse as supplies and reinforcements are unable to reach the ever receding front line. At this point, NKs leadership would go all out, but their ranks would falter and pretty soon, less than a week I would guess, the regime would fall. So... Then we now have a few million third world denizens without a functioning government. A humanitarian crisis. To put it bluntly... SK doesn't want an influx of underskilled malnourished brainwashed refugees from a militant police state and neither does China. And if the end result would be reunification of the north and south, China wouldn't take to kindly to now having a country with a major u.s. military base presence on its front doorstep. Edit: formatting and a word" ]
[ [ "are too diminutive to singularly repel an attack by the Korean People's Army. Rather, they serve to convey \"the certainty of American involvement should the North Koreans be tempted to invade\". Examples in theory Paul K. Davis and John Arquilla have argued that the United States should have placed a tripwire force in Kuwait prior to the Iraqi invasion of Kuwait as a method of signaling to Iraq the commitment of the U.S. to an armed response. In this way, they state, the Gulf War might have been avoided.\nIn 2014 Saudi Arabia reportedly requested the deployment of Pakistani military units", "-35.41416503005894" ], [ "terrorism, nuclear proliferation, and continued aggression towards the United States. Trading with the Enemy Act sanctions were lifted in 2008 in response to North Korea's steps toward nuclear disarmament and commitments to continue dismantling its nuclear weapons program. However, North Korea later developed and tested several more nuclear weapons indicating that it was lying. North Korea's designation was grandfathered from an old version of the law that allowed it to be used absent a declaration of war. Because there is no declaration of war between the United States and North Korea, TWEA sanctions cannot be reapplied", "-35.2094368076032" ], [ "Iraq, the Iranian leaders, who regarded Sunni Salafi extremism as a direct threat to their own interests, repeatedly accused America of not striving hard enough to eliminate these groups or even seeking to reach an agreement with them. Military weapons Since the 1980s North Korea has become known as a reliable supplier of arms to other countries including Iran. Weapons sales between North Korea and Iran increased significantly during the Iran-Iraq war. This weapons sale relationship has expanded into further military cooperation including in the development of and exchange of nuclear technology. This relationship has also involved Syria.\nDuring the Persian", "-35.165685468096854" ], [ "concern in foreign policy circles. Many senior officials served only because of Mattis and fought political battles with the White House regularly. One of the most serious areas of concern has been the potential for war with Iran because of the Trump Administration's withdrawal from the JCPOA at the same time the U.S. military is redeploying forces from the Middle East to the Pacific to better compete with China and contain North Korea. Mattis opposed the withdrawal from the JCPOA, calling the deal \"the best we could come up with\".\nDuring an interview on C-SPAN, the Deputy for Middle East Mick", "-35.04594958896632" ], [ "and acting Secretary of State John Sullivan expressing \"deep concern\" over a report by the United Nations exposing \"North Korean sanctions evasion involving Russia and China\" and asserting that the findings \"demonstrate an elaborate and alarming military-venture between rogue, tyrannical states to avoid United States and international sanctions and inflict terror and death upon thousands of innocent people\" while calling it \"imperative that the United States provides a swift and appropriate response to the continued use of chemical weapons used by President Assad and his forces, and works to address the shortcomings in sanctions enforcement.\"\nIn March 2017, Perdue co-sponsored the", "-34.960103738503676" ], [ "war with Iran \"would be an unmitigated disaster for the United States, Iran, the region and the world.” Fellow senator and presidential candidate Elizabeth Warren echoed Sanders saying she was “very concerned about a slide towards war with Iran”.\nOn June 17, Maariv reported that diplomatic sources at the United Nations Headquarters revealed to the newspaper an American plan to carry out a tactical assault against Iran - namely, aerial bombardment of an Iranian facility related to its nuclear program. That evening, the U.S. Department of Defense announced the deployment of 1,000 additional troops to the Middle East as a defensive", "-34.89142243489914" ], [ "are now more willing to conduct an attack in the United States in response to real or perceived US actions that threaten the regime\". Clapper added that Iran was \"keeping open the option to develop nuclear weapons\". In February 2012, Clapper told the Senate that if Iran is attacked over its alleged nuclear weapons program, it could respond by closing the Strait of Hormuz to ships and launch missiles at regional U.S. forces and allies.\nFormer Defense Intelligence Agency chief Lt. Gen. Ronald Burgess told senators that Iran is unlikely to initiate or intentionally provoke a conflict. Clapper said it's \"technically", "-34.87772480137755" ], [ "strike; this may be due to the U.S. missile defense system (it may not be, however). In general, it appears that the PRC's leaders do not greatly fear a first strike (due to their posture of merely inflicting unacceptable losses upon an adversary as opposed to the U.S./Russian policy of trying to \"win\" a nuclear war); in any event, the Chinese arsenal is considered sufficient to ensure that such a first strike would not go unavenged.\nThe United Kingdom and France possess sophisticated nuclear weapons platforms; however their nuclear strategies are minimum credible deterrent-based. Each possesses ballistic missile submarines armed with", "-34.81327905040962" ], [ "well as America's increasing pressure on the government, which North Korea claims is evidence that the United States wishes to attack or invade their country. Rice disputes North Korea's claim that the nuclear test was committed to deter America from invading, saying, \"We shouldn't even allow them such an excuse ... It's just not the case ... [T]here is no intention to invade or attack them. [T]hey have that guarantee.\"\nRice has also repeatedly offered direct negotiations with North Korea in the context of the Six Party Talks, but she has held her ground in her decision not to hold bilateral", "-34.76648384039436" ], [ "that the security of Japan required a non-hostile Korea led directly to President Truman's decision to intervene ... The essential point ... is that the American response to the North Korean attack stemmed from considerations of U.S. policy toward Japan.\"\nAnother major consideration was the possible Soviet reaction in the event that the US intervened. The Truman administration was fearful that a war in Korea was a diversionary assault that would escalate to a general war in Europe once the United States committed in Korea. At the same time, \"[t]here was no suggestion from anyone that the United Nations or the United States", "-34.76457694474084" ], [ "Support for military action against Iran Rationale Especially with regards to the United States and Israel, the primary impetus for an invasion is to halt or at least delay Iran's nuclear program. Israeli prime minister Benjamin Netanyahu has repeatedly stated the threats a nuclear Iran could pose and expressed concern that too long of a delay would lead to a \"point of no return\", after which Iran would become far more dangerous and virtually immune to a future military intervention. To date, Israel has already launched raids against Syrian and Iraqi nuclear reactors, and some point to the success of", "-34.758363033320165" ], [ "desire to stay out of the conflict while at the same time China warning United States that North Korea and Pakistan which they consider allies are not to be interfered with. Japan now headed by a nationalist leader and not happy with the US response to the missile attack on Japan threatens to withdraw from the mutual defense treaty with the US and develop nuclear weapons for itself. Threatened with an invasion from the North South Korea also toys with the idea of going nuclear. An Islamic cleric with his own agenda also conspires with North Korea and Pakistan to", "-34.73301873553282" ], [ "Council has ever taken\". These sanctions, in response to hostile actions taken by North Korea in the form of nuclear and ballistic tests, are intended to keep the DPRK out of the world economic system and cripple the government so that it does not have the resources to continue its nuclear program. When, in 2005, the United States placed sanctions on Banco Delta Asia, a banking system suspected of laundering for North Korea, other banks pulled back and refused business with Banco Delta Asia based on world opinion. These actions taken by the United Nations and United States represent their", "-34.722388978634626" ], [ "Treasury Steve Mnuchin and acting Secretary of State John Sullivan expressing \"deep concern\" over a report by the United Nations exposing \"North Korean sanctions evasion involving Russia and China\" and asserting that the findings \"demonstrate an elaborate and alarming military-venture between rogue, tyrannical states to avoid United States and international sanctions and inflict terror and death upon thousands of innocent people\" while calling it \"imperative that the United States provides a swift and appropriate response to the continued use of chemical weapons used by President Assad and his forces, and works to address the shortcomings in sanctions enforcement.\"\nCornyn supported U.S.", "-34.72017824219802" ], [ "St. Paul, Minnesota in September 2008. Possible war against Iran Organised opposition to a possible future military attack against Iran by the United States is known to have started during 2005–2006. Beginning in early 2005, journalists, activists and academics such as Seymour Hersh, Scott Ritter, Joseph Cirincione and Jorge E. Hirsch began publishing claims that United States' concerns over the alleged threat posed by the possibility that Iran may have a nuclear weapons program might lead the US government to take military action against that country in the future. These reports, and the concurrent escalation of tensions between Iran and", "-34.65328529923136" ], [ "in his 2005 book Tehran Rising: Iran's Challenge to the United States and has said in speeches that in displacing Saddam Hussein's government in Iraq which had been an enemy of Iran, and the Taliban in Afghanistan which had been a rival, the United States had unintentionally taken away two significant checks on the power of Iran in the Middle East.\nIn August 2006 he noted that to that point in time, the U.S. had had a lot of difficulty in convincing especially Russia and China, to support sanctions on Iran for its moving forward with its uranium enrichment program, and", "-34.623945022714906" ], [ "Middle East to \"send a clear and unmistakable message\" to Iran following intelligence reports of an alleged Iranian plot to attack U.S. forces in the region. Israeli intelligence also warned the United States in days prior to the incident of what it said was Iran’s intention to strike Saudi vessels. \nIn the days before the incident, the United States had warned that Iran or its proxies could target marine traffic in the region and deployed naval forces to counter what it called \"clear indications\" of a threat. Motive According to US Secretary of State Mike Pompeo, the incident was orchestrated", "-34.62102619391953" ], [ "in North Korea, diplomacy can make even the most advanced nuclear weapons program a reversible one.\nIn general, Gonzalez plays down the risk of Iranian nuclear weapons. In a speech before the World Affairs Council of Sacramento, he said: \"A lot of anti-Semitic claims that have been made by Iranian President Ahmadinejad scare the crap out of some people. Understandable… But we have to understand that Israel has a nuclear deterrent and Israel sits on Muslim holy ground... no fanatic is going to try to destroy Jerusalem with nuclear weapons. Certainly no ‘fanatic’ from the Islamic Republic of Iran, who has", "-34.55056975256457" ], [ "dealing with Iran because Iran's policy-makers are divided between pragmatists who are motivated by a desire to improve the economy and hardliners who fear U.S. attack and so seek a nuclear deterrent, - the United States can thus exploit this divide to negotiate a favourable agreement. He also argued that the hardliners leader, Supreme Leader Ali Khamenei, was, unlike Saddam Hussein, rational and risk-averse and so, even if Iran did acquire a nuclear capability, Iran could be deterred in a way that Saddam Hussein could not be.\nIn 2007, Pollack co-authored the book Things Fall Apart: Containing the Spillover from an", "-34.405222759216485" ], [ "wars meant that this kind of intervention was no longer the centerpiece of American policy, \"[t]he war drums are beating at this moment in relation to both North Korea and Iran, and as long as Tel Aviv has the compliant ear of the American political establishment, those who wish for peace and justice in the world should not rest easy.\"\nCanadian Foreign Minister John Baird sharply criticized Falk, stating that, not for the first time, \"spewed more mean-spirited, anti-Semitic rhetoric, this time blaming the attacks in Boston on President Obama and the State of Israel. There is a dangerous pattern to", "-34.363055697831214" ], [ "Un as \"Rocket Man\", Warren said that attempting \"to bait an unstable dictator who has nuclear weapons is not a strategy that makes America safer\". Warren opined that there was no solution to North Korea that could be solved with only American military intervention: \"We need to use every tool in the toolbox. And that means diplomatic efforts with the neighbors in the region and actually all around the world so that we can gather intelligence, so we can impose economic sanctions in the right way, so we can enforce those sanctions, so we can bring the right kind of", "-34.34840987592452" ], [ "against North Korea.\nThe threat of potentially suicidal terrorists possessing nuclear weapons (a form of nuclear terrorism) complicates the decision process. The prospect of mutually assured destruction might not deter an enemy who expects to die in the confrontation. Further, if the initial act is from a stateless terrorist instead of a sovereign nation, there might not be a nation or specific target to retaliate against. It has been argued, especially after the September 11, 2001, attacks, that this complication calls for a new nuclear strategy, one that is distinct from that which gave relative stability during the Cold War. Since", "-34.32577983731244" ], [ "these attacks and the lack of retaliation as encouragement for a similar strike against Iran.\nIn 2006, the United States passed the Iran Freedom and Support Act, which appropriated millions of dollars for human rights Non-governmental organization (NGOs) working in Iran. Several politicians in both countries have claimed the Act is a \"stepping stone to war\", although the Act prohibits the use of force against Iran.\nBoth Barack Obama and Benjamin Netanyahu have repeatedly said that a military option should not be taken out of consideration if other means of preventing Iran from acquiring a nuclear weapon fail. Polls In", "-34.2611857599893" ], [ "has once again accused the ROC and the United States in preparation for the invasion of North Korea and the threat of pre-emptive strike on the territory of South Korea. Also, the North Korean leadership said that it will increase its nuclear capabilities \"in the case of deployment of the US mobile complexes THAAD on the territory of the Republic of Korea.\"\nPyongyang was particularly irritated by the fact that the United States implement their plans in Asia Pacific under the pretext of combating the \"threat from the North.\" South Korea The Republic of Korea (ROK) is a strategic partner of", "-34.25758177147145" ], [ "the Syrian government. 2017 North Korea crisis Lavrov has likened the war of words between U.S. President Donald Trump and North Korean leader Kim Jong-un to a kindergarten fight between two children, saying \"Together with China we'll continue to strive for a reasonable approach and not an emotional one like when children in a kindergarten start fighting and no-one can stop them.\"\nLavrov also said that the United States would not carry out a strike on North Korea because \"they know for sure – rather than suspect – that it has atomic bombs.\" He said the U.S. attacked Iraq \"solely because", "-34.24069386372503" ], [ "that it was planning or inviting a confrontation with Tehran. At a news conference, White House Press Secretary Tony Snow dismissed as an \"urban legend\" suggestions that the United States was preparing for another war. Similar denials were issued by Defense Secretary Robert M. Gates and Marine Gen. Peter Pace, chairman of the Joint Chiefs of Staff.\nJan 14, 2007: A former Russian Black Sea Fleet Commander, Admiral Edward Baltin, says he believes the presence of so many US nuclear submarines in the Persian Gulf meant a strike was likely.\nJan 24, 2007: Iranian officials said Wednesday that they had received a", "-34.179933061954216" ], [ "military has prepared plans for a counter-attack in the event of a first strike by North Korea. UNSC Resolution 1874 The United Nations Security Council unanimously adopted resolution 1874 in response to the test, imposing further economic sanctions on the country and authorising UN member states to inspect North Korean cargo and destroy any that may be involved in the nuclear weapons program. In response to the sanctions, an unidentified spokesman for the North Korean Foreign Ministry released a statement through the official Korean Central News Agency saying that the country would begin to \"weaponize\" its plutonium stockpiles. The spokesman", "-34.1619864143031" ], [ "a so-called preemptive \"bloody nose\" attack on North Korea's nuclear program. Assistant Secretary of State for East Asian and Pacific Affairs Susan Thornton confirmed that the administration's policy remains one of \"maximum pressure\" via economic sanctions in order to get North Korea to negotiate on eliminating its nuclear weapons. Thornton however reiterated that military options are still \"on the table\" and that Pyongyang would be forced to give up its nuclear weapons \"one way or another\". Suspicion of continued nuclear program In June 2018, NBC News reported that U.S. intelligence believed that North Korea was increasing production of enriched uranium", "-34.15961334610802" ], [ "embargo on North Korea, denouncing the regime as \"threatening\" and \"belligerent\", but believes that war is not necessary at present. War against Islamic terrorism Brook argues that Islamic terrorists initiated a war against the West because they hate its culture, wealth, love of life, and global influence, and that they attack Israel because of the influence Western culture has had on it. He explicitly rejects the idea that Islamic terrorists attack Western nations because they support Israel or because of any other reason, such as poverty or retaliation.\nBrook claims that the West is not at war with terrorism but the", "-34.10658240347402" ], [ "responsible for the September 11, 2001 attacks on the World Trade Center and Pentagon.\nSome expressed puzzlement that the United States would consider military action against Iraq and not against North Korea, which claimed it already had nuclear weapons and had announced that it was willing to contemplate war with the United States. This criticism intensified when North Korea reportedly conducted a nuclear weapons test on October 9, 2006.\nThere was also criticism of Coalition policy by those who did not believe that military actions would help to fight terror, with some believing that it would actually help Al-Qaeda's recruitment efforts; others", "-34.10557762728422" ], [ "\"a massive military response\" to any threat from North Korea against the United States, including Guam, or its allies.\nEarly on September 4, the Republic of Korea (South Korea) conducted a ballistic missile exercise that involved the South's Hyunmoo ballistic missile and the F-15K fighter jets, which was billed to be in response to North's detonation. The state news agency Yonhap said the South's military had carried out a live-fire exercise simulating an attack on the North's nuclear site, hitting \"designated targets in the East Sea\".\nOn the same day, the UN Security Council convened to discuss further measures against North Korea;", "-34.082566558867256" ], [ "The 2020 Commission Report on the North Korean Nuclear Attacks Against the United States Plot The conflict begins unintentionally, with a North Korean KN-06 unit in Ongjin, near the Korean Demilitarized Zone shooting down a civilian Air Busan Airbus A320, which was flying off-course and without a transponder due to a brief loss of power in the cockpit, having mistaken it for a U.S. stealth aircraft. South Korean President Moon Jae-in orders a retaliatory attack on North Korea without the approval of the United States, firing six missiles at the Headquarters of the Korean People's Army Air and Anti-Air Force", "-34.026172184143434" ], [ "Hirsch began publishing claims that American concerns over the alleged threat posed by Iran's nuclear program might lead the US government to take military action against that country in the future. These reports, and the concurrent escalation of tensions between Iran and some Western governments, prompted the formation of grassroots organisations, including Campaign Against Sanctions and Military Intervention in Iran in the US and the United Kingdom, to advocate against potential military strikes on Iran. Additionally, several organizations and individuals, including the Director-General of the International Atomic Energy Agency, Mohamed ElBaradei, a former United Nations weapons inspector in Iraq, Scott", "-33.986838453384735" ], [ "propaganda, muddied the waters for U.S. observers.\"\nOnce the war began, the Carter administration's policy was broadly neutral and included several actions that favored Iran, although these could also be seen as aimed primarily at preventing a wider war. While many U.S. officials were initially optimistic that limited Iraqi gains would force Iran to agree to an arms-for-hostages deal (this proved unnecessary because Iran purchased adequate arms and equipment from Syria, Libya, North Korea, the Soviet Union, and Israel), a consensus soon emerged that the war had disrupted whatever progress had been made during negotiations with Sadeq Tabatabaei. When Iraq unilaterally", "-33.98655657892414" ], [ "attacks of 2001, U.S. policy has included an emphasis on counter-terrorism. The U.S. has diplomatic relations with all countries in the Middle East except for Iran, whose 1979 revolution brought to power a staunchly anti-American regime.\nRecent priorities of the U.S. government in the Middle East have included resolving the Arab–Israeli conflict and limiting the spread of weapons of mass destruction among regional states. History The United States' relationship with the Middle East prior to World War I was limited, although commercial ties existed even in the early 19th century. President Andrew Jackson established formal ties with the Sultan of Muscat and", "-33.97852863007574" ], [ "2006 highlighting the fact that he did not know how to clear a stoppage on the stolen M249 Squad Automatic Weapon he was using. Attempts to provoke U.S. attack on Iran A document found in Zarqawi's safe house indicates that the group was trying to provoke the U.S. to attack Iran in order to reinvigorate the insurgency in Iraq and to weaken American forces in Iraq. \"The question remains, how to draw the Americans into fighting a war against Iran? It is not known whether America is serious in its animosity towards Iran, because of the big support Iran is", "-33.96838749726521" ], [ "station American tactical nuclear weapons in South Korea.\nIn 2017, during a period of unusually high tension, the South Korean defence minister suggested it was worth reviewing the redeployment of U.S. nuclear weapons to the Korean Peninsula. Public opinion In the late 1990s, a notable minority of South Koreans supported the country's effort to reprocess materials, although only a small number called for the government to obtain nuclear weapons.\nWith the escalation of the 2017 North Korea crisis, amid worries that the United States might hesitate to defend South Korea from a North Korean attack for fear of inviting a missile attack", "-33.94916712778104" ], [ "Japan, and South Korea to avoid \"a military solution\" with North Korea. On June 3 Mattis said the United States regarded North Korea as \"clear and present danger\" during a speech at the international security conference in Singapore. In a June 12 written statement to the House Armed Services Committee Mattis said North Korea was the \"most urgent and dangerous threat to peace and security\". On June 15 Mattis said the U.S. would win a war against North Korea, but \"at great cost\".\nOn March 22, 2017, during questioning from the U.S. Senate, Mattis affirmed his support for U.S. troops remaining", "-33.948596930509666" ], [ "war against Iran? It is not known whether American is serious in its animosity towards Iraq, because of the big support Iran is offering to America in its war in Afghanistan and in Iraq. Hence, it is necessary first to exaggerate the Iranian danger and to convince America and the west in general, of the real danger coming from Iran...\". The document then outlines 6 ways to incite war between the two nations. Iraqi national security adviser Mowaffak al-Rubaie said the document, shows al-Qaeda in Iraq is in \"pretty bad shape.\" He added that \"we believe that this is the", "-33.94440660003329" ], [ "US pulled out and that both possibilities \"would be detrimental to our national security interests.\"\nFollowing Patrick M. Shanahan announcing 1,000 more US troops being deployed to the Middle East for defensive purposes in June 2019, Sanders was one of six senators to sign a letter spearheaded by Tim Kaine and Mike Lee expressing concern that \"increasingly escalatory actions\" by both the US and Iran would \"lead to an unnecessary conflict.\" The senators noted that Congress had not authorized a war against Iran and requested \"a joint Defense, State and Intelligence Community briefing by the end of June to address these", "-33.93456334174698" ], [ "striking North Korea with \"a preventative or preemptive U.S. military strike would lack either a constitutional basis or legal authority\" without congressional approval. In March, Warren confirmed she was in favor of the Trump administration planning discussions with North Korea but warned that President Trump could be taken advantage of without having State Department officials with backgrounds in diplomacy being present. She opined that there was \"no military-only solution to the problems presented by North Korea, and I'm not the only one who feels that way.\" In May, Warren stated that she wanted the 2018 North Korea–United States summit \"to", "-33.93047872450916" ], [ "February 2013 that concerns about Iran's nuclear capability are outrageously exaggerated and that if “the threat of war still looms” it is not because of actual threat assessments, but because of “belligerent” politicians. “Even a theoretical future nuclear-armed Iran,” she argued, “would not be a threat to the existence of Israel” but only “to Israel's longstanding nuclear monopoly in the Middle East.” This, she maintained, “is the real threat motivating Israel's attack-Iran-now campaign.”\nBennis mocked U.S. President Barack Obama in March 2013 for giving a speech on the West Bank that was full of “soaring language in which he urged justice,", "-33.930192090466335" ], [ "North Korea Sanctions Enforcement Act of 2013 Background North Korea–United States relations developed primarily during the Korean War, but in recent years have been largely defined by North Korea's three tests of nuclear weapons, its development of long-range missiles capable of striking targets thousands of miles away, and its ongoing threats to strike the United States and South Korea with nuclear weapons and conventional forces.\nThe 2013 Korean crisis, also referred to as the North Korean crisis by media, was an escalation of tensions between North Korea and South Korea, the United States, and Japan that began because of United Nations", "-33.91173252099179" ], [ "and Hezbollah, without possessing nuclear weapons, and questioned why Iran would be more cautious if it did contain nuclear weapons. He also predicted that should Iran acquire nuclear weapons, a nuclear arms race would be ignited in the region. In response, former United States ambassador to the United Nations John Bolton said that al-Otaiba's comments were indicative of the views of various Arab countries in the region. Release of diplomatic cables Diplomatic cables leaked in 2010 revealed that the officials of some Persian Gulf countries such as Saudi Arabia and Bahrain supported a military attack against Iran to stop", "-33.89662029771216" ], [ "States loosened its economic embargo, but it continued to block more normalized relations, arguing that the country had been implicated in international terrorism and was developing a nuclear weapons capacity. In his State of the Union Address, United States President George W. Bush labeled Iran, along with Iraq and North Korea, as an \"Axis of evil.\"\nTensions with the United States increased after the Anglo-American invasion of Iraq in March 2003, as U.S. officials increasingly denounced Iran for pursuing the alleged development of nuclear weapons.\nThe reform era ended with the conservatives defeat of Iranian reformists in the elections of 2003, 2004", "-33.89079787251467" ], [ "near Pyongyang and a residence of Kim Jong-un.\nFollowing the missile attack, North Korea's leadership, lacking communications infrastructure, misinterprets Tweets from U.S. President Donald Trump so as to believe that a decapitation strike is in-progress. North Korea launches nuclear missiles in the hopes of staving off further U.S.-South Korean attacks, with nuclear bombs detonating over Seoul, Busan, Pyeongtaek and Daegu in South Korea and Tokyo and Yokohama in Japan. Missiles launched at Guam and Okinawa fail to reach their targets. Negotiations in New York City fail to resolve the conflict.\nThe United States launches a retaliatory conventional strike on North Korea, but", "-33.880106235175845" ], [ "1996, the United States has had a policy of allowing the targeting of its nuclear weapons at terrorists armed with weapons of mass destruction.\nRobert Gallucci argues that although traditional deterrence is not an effective approach toward terrorist groups bent on causing a nuclear catastrophe, Gallucci believes that \"the United States should instead consider a policy of expanded deterrence, which focuses not solely on the would-be nuclear terrorists but on those states that may deliberately transfer or inadvertently leak nuclear weapons and materials to them. By threatening retaliation against those states, the United States may be able to deter that which", "-33.85476103769997" ], [ "by Iran to try and raise the price of oil as Washington works to end Iran's exports of crude. Iran has denied the accusation, instead calling for an international investigation and warned of a possible false flag operation. According to Iran, the attack was an \"Israeli mischief\" to attempt and cause a military reaction. The United States, Iran, and Saudi Arabia have all voiced their opposition to military conflict in the region. The maritime incident was followed two days later by an attack on Saudi oil pipelines to Yanbu by Houthis. Both routes were used by Saudi Arabia and the", "-33.84782562929831" ], [ "would consider military action against Iraq and not against North Korea, which had claimed it already had nuclear weapons and had announced that it was willing to contemplate war with the U.S.\nMany critics of the American War on Terror, including the UK's foreign intelligence services, did not believe that American actions would help to end terror, and believed that they would actually increase the ranks and capabilities of terrorist groups; some believed that during the war and immediate post-war period there would be a greatly increased risk that weapons of mass destruction would fall into the wrong hands (including Al-Qaida).\nAmerica's", "-33.77941501858004" ], [ "a possibility that France and Germany, both NATO allies of the United States, \"struck a deal with radical Islam and with radical Arabs\" to use \"extremism and terrorism as the weapon of choice\" to weaken the United States. He stated, \"It sounds fanciful, to be sure,\" but that, \"If this is correct, we will have to pursue the war against terror far beyond the boundaries of the Middle East, into the heart of Western Europe. And there, as in the Middle East, our greatest weapons are political: the demonstrated desire for freedom of the peoples of the countries that oppose", "-33.7762206671614" ], [ "Egypt, Kuwait, Jordan, Qatar, and the United Arab Emirates, in part to hedge Iranian power and prevent the spread of its revolution.\nAmerican support for Iraq during the war had profound effects on Iran. The United States' defense of Saddam and its role in blocking investigations into Iraq's use of chemical weapons on Iranian soldiers and civilians convinced Iran to further pursue its own unconventional weapons program. The government has also used American hostility to justify foreign and domestic policies, including its nuclear program and crackdowns on internal dissent.\nApart from the Iran–Iraq War, Iran and Saudi Arabia engaged in tense competition", "-33.758801677208794" ], [ "his first trip to Asia, traveling to Japan, South Korea, and China. Tillerson remarked that diplomatic efforts in the past 20 years to stop North Korea's nuclear development had \"failed\". Tillerson also stated the United States may need to take preemptive action, remarking \"Certainly, we do not want things to get to a military conflict ... but obviously, if North Korea takes actions that threatens the South Korean forces or our own forces, then that would be met with an appropriate response. If they elevate the threat of their weapons program to a level that we believe that requires action,", "-33.751118808449974" ], [ "Kingdom and elsewhere, including the creation of the Campaign Against Sanctions and Military Intervention in Iran. By August 2007, fears of an imminent United States and/or Israeli attack on Iran had increased to the level that several Nobel Prize winners, Shirin Ebadi (Nobel Peace Prize 2003), Mairead Corrigan-Maguire and Betty Williams (joint Nobel Peace Prize 1976), Harold Pinter (Nobel Prize for Literature 2005) and Jody Williams (Nobel Peace Prize 1997), along with several anti-war groups, including The Israeli Committee for a Middle East Free from Atomic, Biological and Chemical Weapons, Campaign for Nuclear Disarmament, CASMII, Code Pink and many others,", "-33.70784194406224" ], [ "try to halt them with conventional forces, or use nuclear weapons.\nThe U.S. must make a decision as the Chinese invasion forces in Central America gather steam: to build traditional naval super-carriers to meet the new Chinese ones, or to build highly experimental arsenal ships capable of firing thousands of missiles at once, showering its target with overwhelming force while having a crew of only around 100 due to the extent of automation. They might be more effective but are also untested, and the U.S. does not have the resources for both. Baker decides to back the arsenal ships.\nAs the likelihood", "-33.67954653087327" ], [ "meeting to assess the impact of the fighting on the markets. Military responses President Lee instructed the South Korean military to strike North Korea's missile base near its coastal artillery positions if there were an indication of further provocation. Lee Hong-gi of the JCS told the media that the attack had been a \"premeditated, intentional illegal violation of the U.N. Convention, the Armistice Agreement and the inter-Korean non-aggression accord. It is also an inhumane atrocity, in which [North Korea] indiscriminately fired shells into unarmed civilian residential areas.\" He said that the military had \"strengthened our surveillance and monitoring to keep", "-33.66498446227888" ], [ "Nations Panel of Experts stated that North Korea was covertly trading in arms and minerals despite sanctions against this.\nThe academic John Delury has described the sanctions as futile and counterproductive. He has argued that they are unenforceable and unlikely to stop North Korea's nuclear weapons program.\nOn the other hand, Sung-Yoon Lee, Professor in Korean Studies at the Fletcher School, and Joshua Stanton advocate continued tightening of sanctions and targeting Pyongyang's systemic vulnerabilities, such as blocking the regime's \"offshore hard currency reserves and income with financial sanctions, including secondary sanctions against its foreign enablers. This would significantly diminish, if not altogether", "-33.62845756100796" ], [ "Chiefs of Staff Michael Mullen said during an interview with Martha Raddatz on ABC's This Week that the United States did not solve diplomatically, and warned that North Korea was closer to a Nuclear War with United States. He said in a statement, \"We're actually closer, in my view, to a nuclear war with North Korea and in that region than we have ever been\" 2018 On February 15, 2018, after previous media reports, the Trump administration denied considering a so-called preemptive \"bloody nose\" attack on North Korea's nuclear program. Assistant Secretary of State for East Asian and Pacific Affairs", "-33.57238818179394" ], [ "and revolutionary chaos\" had rendered Iran grossly unprepared for the attack.\nIranian leaders, including Khomeini and his successor Ali Khamenei, have long espoused a belief that the U.S. gave Saddam Hussein a \"green light\" to launch the invasion of Iran—something U.S. officials \"have unanimously and vociferously denied.\" Joost Hiltermann observed that a U.S. \"green light\" is also \"the conventional wisdom in the Arab world.\" In fact, Iranian suspicions that the U.S. would use Iraq to retaliate for the hostage-taking predated the invasion, as Carter noted in his diary on April 10, 1980: \"The Iranian terrorists are making all kinds of crazy", "-33.56828030382894" ], [ "with longtime U.S. ally South Korea on February 2, 2017. He warned North Korea that \"any attack on the United States, or our allies, will be defeated\", and any use of nuclear weapons would be met with an \"effective and overwhelming\" response from the United States. During a press conference in London on March 31, 2017, with his UK counterpart Secretary of State for Defence Michael Fallon, Mattis said North Korea was behaving \"in a very reckless manner\" and must be stopped. During a Pentagon news conference on May 26, Mattis reported the U.S. was working with the UN, China,", "-33.566361507553665" ], [ "\"war of words\" between North Korea's leader Kim Jong-un and the Trump administration. Recent threats included Vice-President Mike Pence statement that the period of \"strategic patience\" was over and his April 19 statement that the US \"would meet any attack with an 'overwhelming response.' North Korea recently warned of \"full-out nuclear war if Washington takes military action against it.\" Trump has called for China to rein in North Korea, but China Daily reported that \"Washington must be aware of the limitations to Beijing's abilities, and refrain from assuming that the matter can be consigned entirely to Beijing alone.\" China Daily", "-33.54799351834663" ], [ "fueling fears of a broader regional war.\nIsrael and Saudi Arabia expressed concern about Iran's ability to use diplomatic cover and unfrozen money from the deal to strengthen its regional position and that of its allies. Critics in Washington accused the Obama administration of having been duped by Iran and Russia into accepting a deal that was antithetical to American interests.\nMeanwhile, the administration was also accused of whitewashing Iran's failure to cooperate fully with the IAEA investigation into the possible military dimensions of its past nuclear work.\nIn November 2015 The New York Times wrote, \"[a]nyone who hoped that Iran's nuclear agreement", "-33.54577913932735" ], [ "in September 2012 by Basswood Research for The Foreign Policy Initiative revealed that Iran was cited as the most dangerous threat to American national security interests, with 45.1% of respondents choosing Iran. In addition, 62% of Americans favored preventing Iran from obtaining nuclear weapons, even if this requires the use of military force, as opposed to avoiding a conflict and accepting the prospects of Iranian nuclear weapons. Support from politicians Former Democratic Vice-Presidential Candidate Senator Joe Lieberman of Connecticut stated that he believed an attack against Iran was necessary to prevent the production of nuclear weapons. \"I think the", "-33.54218169325668" ], [ "of the country’s political factions reveal the inadequacy of the American strategy. The commentator also argues that the Supreme Leader’s public remarks concerning the military threats are aimed to send several important messages to the West: Iran will not yield to pressure, there is internal unity among the decision makers, Iran has no offensive intentions and poses no threat to any country in the region, and its policy is dependent on the policy of the other side. A reasonable policy by the United States will be met with a reasonable course of action, and any aggression will be met with", "-33.54147693589357" ], [ "to Iran and its proxy militia Hezbollah. In a more likely scenario, Israel feels Iran will continue to abide by its nuclear deal but threaten the country with a conventional arms buildup on Israel's northern border. Because US and international attention will be focused on Pacific instability, Israel feels less western attention will be given to this issue.\n\nIn a 2017 interview with Hebrew language news site Walla, Israeli defense minister Avigdor Liberman called Kim Jong-Un a madman and said his nation is one of a few extremely bad actors who are attempting to undermine international stability. North Korean state media", "-33.539535811858514" ], [ "interest to counter Iran in the region. The New York Times remarked that such cooperation was made more difficult by controversy over Israel's attitude towards Palestinians. United States US Secretary of State Mike Pompeo denounced the attacks on the Saudi oil industry, on 14 September 2019, as an “act of war”. President Donald Trump called for an increase in sanctions against Iran opposing the strikes. President Trump has approved the deployment of additional U.S. troops to Saudi Arabia and the United Arab Emirates following the attack on Saudi oil facilities that the United States has blamed on Iran. Others Syria", "-33.533684636717226" ], [ "ties to Iran, significantly increased visa restrictions on Chinese nationality students and scholars and classified China as a \"currency manipulator\". In the wake of the significant deterioration of relations, many political observers have warned against a new cold war between China and the U.S. North Korea Nuclear and missile tests conducted by North Korea in 2017 indicated that its nuclear weapons were a serious threat to the United States. In August, Trump dramatically escalated his rhetoric against North Korea, warning that further provocation against the U.S. would be met with \"fire and fury like the world has never seen\". In", "-33.52980236835356" ], [ "and production cutbacks from the Arab states. The weapon was aimed at the United States, Great Britain, Canada, Japan and the Netherlands. These target governments perceived that the intent was to push them towards a more pro-Arab position. Production was eventually cut by 25%. However, the affected countries did not undertake dramatic policy changes.\nIn the United States, scholars argue that there already existed a negotiated settlement based on equality between both parties prior to 1973. The possibility that the Middle East could become another superpower confrontation with the USSR was of more concern to the US than oil. Further, interest", "-33.49234349534163" ], [ "on the Iranian coast. In July, two Israeli missile boats were also deployed.\nSome in Israel are worried that Iran may achieve a latent capability to produce nuclear weapons without taking any overt steps that would expose it to further international action. But Foreign Minister Avigdor Lieberman hopes that sanctions and negotiations can resolve the problem.\nIn April 2012, former Israeli foreign minister Shlomo Ben-Ami warned that \"if the path of war is finally taken, and, in its aftermath, the international community fails once again to pacify the world's most dysfunctional region, the Middle East would devolve into an unruly chaos far", "-33.48520427784388" ], [ "oil and gas is why the U.S. would intervene in various places overseas including the Middle East and Afghanistan; and that other reasons for justifying U.S. intervention \"is just lying to the American people\" and that the U.S. has a long history of lying to justify intervention, giving the examples of the Vietnam, Iraq, and Afghanistan wars.\nIn September 2018, Wilkerson further said that the neoconservative agenda regarding war on Syria and Iran also threatens conflict between the U.S. and Russia and the long-term bogging down of U.S. military forces in major conflict. Wilkerson states, \"My serious concern is about the", "-33.46993096564984" ], [ "sanctions, adding that they would not weaken the DPRK. Economic and commercial sanctions The South Korean-based Hyundai Economic Research Institute estimated that if the sanctions are enforced by all UN member states, North Korea could lose between US$1.5–3.7 billion, whereas other estimates suggest US$4 billion. However, a Congressional Research Service report for the United States Congress notes that this is only possible if the sanctions are applied forcefully. The United States is targeting access by North Korea to foreign banks used by its trading companies. On 16 July 2009, a UN sanctions committee designated for sanctions three North Korean trading", "-33.467460276937345" ], [ "lasting war apart of a wider and deeper issue. In 1996, Osama bin Laden of Al-Qaeda made a threat to the United States, by making a declaration of war. The growing tensions of the Middle East are suggested by Laurence Andrew Dobrot, to be very wide cultural misunderstandings and faults of the West is not making peace with the Middle East. As the Deputy Director for the Missile Defense Agency's Airborne Laser Program, Dobrot, examines the hostility which has been continuous not only since 2001, but since the birth of Wahhabism.\nDobrot proposed that the U.S should recognize the cultural hostility", "-33.46272605011109" ], [ "the World Trade Center and the Pentagon, this definition of imminence, which would require the United States to refrain from action until preparations for an attack are concluded, would not allow the United States sufficient time to defend itself. The defensive options available to the United States may be reduced or eliminated if al-Qa'ida operatives disappear and cannot be found when the time of their attack approaches. Consequently, with respect to al-Qa'ida leaders who are continually planning attacks, the United States is likely to have only a limited window of opportunity within which to defend Americans in a manner that", "-33.42291109498365" ], [ "discussion at Yeshiva University on October 22, 2013, Adelson said that the United States must get tougher about Iran's suspected nuclear weapons program. Controversy arose when he said: \"You pick up your cell phone and you call somewhere in Nebraska and you say 'OK, let it go' and so there's an atomic weapon goes over, ballistic missiles in the middle of the desert that doesn't hurt a soul, maybe a couple of rattlesnakes and scorpions or whatever\". He went on to explain that, after a show of force and a threat to also drop a nuclear bomb on Tehran, the", "-33.40884384611127" ], [ "An example of a rogue ally is Syngman Rhee of South Korea. Due to his ambitions to unify the Korean peninsula, the treaty would contain his adventurism. Another is Chiang Kai-Shek. His ambition to overtake mainland China heightened the fear of entrapment to the US. Another reason for the U.S. in taking bilateral agreements in the region was to assure the nations in the region against the revival of Japanese aggression and at the same time, assisting Japan for its economic recovery, in order for it to become a growth engine of the region by giving enough economic opportunity (a", "-33.4020034252535" ], [ "war between the two countries. North Korea Supreme Leader Kim Jong Un stated that North Korea would \"not use nuclear weapons first unless aggressive hostile forces use nuclear weapons to invade on our sovereignty\" during the 7th Congress of the Workers' Party of Korea in 2016. However, two months earlier, he had threatened a pre-emptive attack against the United States using nuclear weapons over their joint US-South Korean military exercises near the Korean peninsula.", "-33.399475921916746" ], [ "discontinuation of security treaties with the great power guarantors of the North and South.\nIn the 1990s, despite issues surrounding the controversial US-South Korean joint Team Spirit military exercises, the Clinton administration still managed to help turn around the situation regarding peace with North Korea through Jimmy Carter's support. It promised light water reactors in exchange for the availability of North Korea for inspection of its facilities and other concessions. North Korea reacted positively, despite blaming the United States as the original aggressor in the Korean War. There were attempts to normalize relations with Japan as well as the United States", "-33.37900996136523" ], [ "because, Perry explained, the United States saw the principal threat from Iraq to be against Kuwait.\nAnother tragic incident on June 25, 1996 revealed the continuing tension in the Middle East and the dangers involved in the U.S. military presence. Terrorists exploded a truck bomb at the Khobar Towers apartment complex housing U.S. military personnel in Dhahran, Saudi Arabia, killing 19 and wounding 500. In September 1996 an investigative panel set up by Perry recommended vigorous measures to deter, prevent, or mitigate the effects of future terrorist acts against U.S. personnel overseas, and further, that a single DoD element have responsibility", "-33.363317244780774" ], [ "import-oriented policy of the time, needed to obtain weapons from one of the superpowers, or at least an ally who made equipment compatible with one of the superpowers.\nIraq's invasion of Iran, starting the Iran–Iraq War, came shortly after the 1978-1979 Iranian Revolution and the Iranian Hostage Crisis starting in November 1979. The U.S. had been strongly allied with the Shah of Iran, who had bought weapons from the West, primarily but not exclusively from the U.S. Iranian domestic opinion was anti-U.S. because the U.S. had been seen as the patron of the unpopular Shah, Mohammed Reza Pahlevi. The", "-33.36185089625724" ], [ "and China, with Ayatollah Khamenei stating in February 2018: \"In foreign policy, the top priorities for us today include preferring East to West.\" The unilateral decision by the United States drew concerns of increased tensions with Russia and China, both of which are parties to the nuclear agreement. It also heightened tensions in the Middle East, raising the risk of a larger military conflict breaking out involving Israel, Saudi Arabia, and Iran.\nThe United States reinstated sanctions against Iran in August 2018 despite opposition from European allies. The Trump administration also pushed for a military alliance with Sunni Arab states to", "-33.35250277682644" ], [ "of population. \nThe recommendations of the report were that Israel should do anything possible to prevent an anti-Israeli coalition from being formed, and from that coalition gaining control of WMDs. It suggested Israel should retain the option of carrying out preemptive strikes, describing them as 'anticipatory self-defense'. The strikes would be a combination of air strikes and selective covert operations by ground forces at certain critical (and publicly unnamed) locations.\nIt also recommended that Israel should retain its current policy of deliberate ambiguity regarding its nuclear status. If, at a later date, other states in the Middle East", "-33.350040723202255" ], [ "US, China retaliates by launching their own nuclear weapons against Russia. The warheads directed at Moscow, however, are intercepted by the nuclear-tipped anti-ballistic missile system deployed around the capital. Zorin –sleep-deprived and under the effect of amphetamines– is convinced that the US took advantage of the confusion and launched a first strike against Russia. Still in control of the nuclear communicators, Zorin orders the ICBM forces in Western Russia to launch at their pre-programmed targets. Their ballistic-missile submarines are not used in the attack, as they are far less accurate than the ICBMs and, thus, only useful for targeting large", "-33.32168512330827" ], [ "attack. He based this assessment on \"intelligence, the weapons used, the expertise needed\" and \"recent similar Iranian attacks on shipping\". The New York Times reported that experts believe that Iran would carry out such an attack to hit back at the United States while maintaining enough ambiguity to avoid a direct counterattack. The Iranian government, in response, denied any and all responsibility and criticized the accusation. Acting U.S. Secretary of Defense Patrick Shanahan remarked that the U.S. wanted to \"build international consensus to this international problem\", partly by declassifying and releasing intelligence.\nOn June 13, the U.S. military released a video", "-33.316830625721195" ], [ "invasion to occupy Abadan, a contingency plan known by the code name \"Buccaneer\". That plan was ultimately rejected by both Clement Attlee and Winston Churchill. US President Harry S. Truman and US ambassador to Iran Henry F. Grady opposed intervention in Iran but needed Britain's support for the Korean War.\nThe United States was also opposed to nationalization of the AIOC, because of the fear that the idea of nationalization would spread to other places, but the US believed it would be possible to reach a face-saving agreement with Mossadegh, under which actual control and management of the organisation would remain", "-33.312131241451425" ], [ "the U.S. has failed to fulfill its promises in the disarmament process, having not removed the country from its \"State Sponsors of Terrorism\" list or sent the promised aid to the country. The U.S. has recently stated that it will not remove the North from its list until it has affirmed that North Korea will push forward with its continued disarmament. North Korea has since barred IAEA inspectors from the Yongbyon site, and the South has claimed that the North is pushing for the manufacture of a nuclear warhead. The North has recently conducted tests on short-range missiles. The U.S.", "-33.311503643395554" ], [ "threats to kill the American hostages if they are invaded by Iraq—whom they identify as an American puppet.\" There are several reasons for this perception, including some circumstantial evidence. First, although the Carter administration had long been interested in rapprochement with Iraq, prior to the hostage crisis the administration's preference for Iran as the \"strategic choice\" effectively rendered this impossible. After the dramatic break in Iran–United States relations, however, both American and Iraqi officials made a number of positive gestures towards one another, including \"a speech by Saddam denouncing the Soviet invasion of Afghanistan,\" and culminating in an April 10", "-33.30288467011542" ], [ "better than risking a war in Korea and a continuation of North Korea's nuclear program. He promised that he would ask Congress for money to build up U.S. forces in South Korea if the agreement broke down. Again a critical situation had moderated, but implementing the agreement proved difficult. By the end of Perry's term some issues remained outstanding, and tension between the two Koreas flared up from time to time. The Middle East In the Persian Gulf area Iraq continued to make trouble, with periodic provocative moves by Saddam Hussein triggering U.S. military action. After the 1991 Gulf War,", "-33.29334162956002" ], [ "saw Iran as a \"rogue state\" fundamentally opposed to American interests in the Middle East.\nOverthrow was not a viable policy option given the lack of organized opposition and American intelligence assets on the ground. Positive inducement to behavioral changes was also dismissed due to the Iranian regime's deep distrust of the U.S. Finally, punitive military action was ruled out on the grounds that Iran's retaliatory capabilities were considered too great, and the benefits of these strikes were too uncertain. Thus, it was decided to continue American efforts to prevent Iran's acquisition of ballistic missiles and access to international finance. This", "-33.260774405009215" ], [ "concerned that Communist North Korea might have underway a nuclear weapons development program. This gave way to alarm when that country refused to allow full inspection of nuclear sites. In November 1993 North Korea demanded that the United States and South Korea cancel a planned joint training exercise as a precondition during discussions on the nuclear issue. Aspin rejected this demand and announced that the United States would suspend plans to withdraw its troops gradually from the peninsula.\nIn the Persian Gulf area, Iraq remained a problem. In June 1993 two U.S. Navy ships fired Tomahawk missiles against the headquarters building", "-33.260690778505705" ], [ "I do not believe this is the cause of the terrorism we see today whether in the Middle East or elsewhere in the world\". Iran–West tensions Blair wrote in an op-ed published byThe Washington Post on 8 February 2019: \"Where Iran is exercising military interference, it should be strongly pushed back. Where it is seeking influence, it should be countered. Where its proxies operate, it should be held responsible. Where its networks exist, they should be disrupted. Where its leaders are saying what is unacceptable, they should be exposed. Where the Iranian people — highly educated and connected, despite their", "-33.25981739034796" ], [ "first step\" to reduce conflict in the region, and that while \"the nuclear deal will not automatically or immediately bring stability to the region ... Ultimately, a Middle East where diplomacy is the norm rather than the exception will enhance U.S. national security and interests,\" Signatories to the letter include John Esposito, Ehsan Yarshater, Noam Chomsky, Peter Beinart, John Mearsheimer, and Stephen Walt.\nU.S. pro-Israel groups were divided on the JCPOA. The American Israel Public Affairs Committee opposed the agreement and formed a new 501(c)(4) group, Citizens for a Nuclear Free Iran, to run a television advertising campaign against it. In", "-33.21620260410418" ], [ "conflict with Iran. Iran stated that the United States must first return to the nuclear deal before starting any new negotiations.\nDuring the Iran–Iraq War, Iraq started a \"Tanker War\" in the Persian Gulf in 1981. Iran started to fight back in 1984 when Iraq ramped up its attacks on Iranian tankers. In 1987 the U.S. launched Operation Earnest Will to protect Kuwaiti tankers against Iranian attacks. On 5 May 2019, National Security Advisor John R. Bolton announced that the U.S. was deploying the USS Abraham Lincoln carrier strike group and four B-52 bombers to the Middle East to \"send a clear", "-33.215542594098224" ], [ "embargo against North Korea for their role in starting the Korean War. The embargo and related sanctions have been extended to combat North Korea's various illicit activities and continued aggression.\nIn 2005, under the US Patriot Act section 311, $25 million of North Korea's cash was frozen at Macau-based Banco Delta Asia, which the US Treasury said North Korea used for illicit activities.\nIn 2010, US President Barack Obama signed Executive Order 13551, which \"targets North Korea’s importation and exportation of arms, importation of luxury goods, and other illicit activities, including money laundering, the counterfeiting of goods and currency, bulk cash smuggling,", "-33.18099738323508" ], [ "to the United States intervention, some observers believe the U.S. coalition will eventually be forced into brokering an alliance with Tehran. Eyal Zisser of Tel Aviv University has explained that \"the West is helpless and does not know what to do against the Islamic State\" and that it will ultimately conclude it has no choice but to ally with Iran.", "-33.16863870800444" ], [ "the most popular response was for the U.S. to tighten sanctions on North Korea, and the second most popular was a total travel ban between the two countries. United States military action was the least popular response. Nuclear Intelligence Report In August 2017, the Washington Post reported on a confidential assessment carried out by the U.S. Defense Intelligence Agency which suggested that North Korea had successfully developed nuclear warheads for missiles within reach of the US mainland. Reacting to the report President Trump stated that future threats would be \"met with fire and fury and frankly power, the likes of", "-33.15958018913625" ], [ "of friendly nations globally. The orientation of the RDF, however, was on the Middle East.\nThis statement was followed-up in Carter's 1980 State of the Union address when he announced that any attempt by a foreign power to gain control of the Persian Gulf and surrounding area would be regarded as an attack on the vital interests of the United States, and be stopped by all means necessary including the use of military force. This was the first formal commitment of US military power to the region. Formation of United States Central Command On 24 April 1981, Secretary of Defense", "-33.135054184047476" ], [ "including to Myanmar (Burma), Syria, and Iran. International responses In the 1990s, the United States negotiated the Agreed Framework to freeze North Korea's nuclear weapons program while pursuing the denuclearization of the Korean peninsula. This broke down when North Korea's clandestine uranium enrichment program came to light in 2002, after which China convened the Six-party talks to negotiate a step-by-step process to denuclearization. The Six-party talks stalled after multiple North Korean nuclear and missile tests, leading to increased international Sanctions against North Korea, including a series of sanctions resolutions imposed by the United Nations Security Council. In 2018, Presidents Moon", "-33.12740476621639" ], [ "the conclusion that the United States was on the verge of waging a full-scale war against them, and that Iraq was on the verge of unleashing its entire chemical arsenal upon their cities.\nAt this point, elements of the Iranian leadership, led by Rafsanjani (who had initially pushed for the extension of the war), persuaded Khomeini to accept the ceasefire. They stated that in order to win the war, Iran's military budget would have to be increased by 700% and the war would last until 1993. On 20 July 1988, Iran accepted Resolution 598, showing its willingness to accept a ceasefire.", "-33.11352320176411" ], [ "U.S.’s decision because of its concern that the deployment of THAAD might be a measure by the U.S. to contain China.\n\nAccording to Reuters:\n“It was China, not North Korea, that was the most uncomfortable with the idea of deploying THAAD in South Korea,” said Yang Uk, a military expert at the Korea Defense and Security Forum. Beijing opposed THAAD and its powerful radar that can see deeply into Chinese territory, saying it upsets the regional security balance. Opposition from China Stating that the THAAD will undermine China's own nuclear deterrent capability, China’s Ambassador Qiu Guohong warned that the deployment of THAAD", "-33.089818280019244" ], [ "Bush's so-called \"Axis of Evil\" with Iraq and Iran) — has refused to do so. These incidents, and others, have together drastically raised tensions between the two countries within the last two years since talks broke down in 2009 (the North and South are technically still in a state of war, having only signed a truce, and not a formal peace treaty). However, additional motives to sign a deal are the ongoing and worsening food shortages, as well as the upcoming centennial of the birth of North Korea's founder and \"Great Leader\", Kim Il-sung, the father of the second leader,", "-33.088064612495145" ], [ "a retaliation that included China whether or not they were involved, and observed that \"any plan that kills millions of Chinese when it isn't even their war is not a good plan. This is not the American way.\" Flexible response In the late 1950s a number of parties pointed out another serious problem with the all-or-nothing approach. If the Soviets launched a limited attack against isolated U.S. military targets, they could cause significant damage to the U.S.'s own nuclear forces without causing serious civilian casualties. If such an attack was successful, the Soviets would still have the capability of launching", "-33.08745568190648" ] ]
3jdnzm
Can Someone Explain What Is Going On With The Refugee Crisis In The Middle East and Europe?
[ "Most of this new refugee wave are refugees from the Syrian civil war and the following conflicts. Syrian civil war started in 2011 and during that civil unrest ISIS/ISIL also gained great foothold, now (according to Wikipedia) controlling an area with 10 million people spanning [large areas of Syria and Iraq]( URL_0 ) (gray area in this map). When looking from Syria, the route to east takes them to ISIS controlled areas of Iraq. After that there, Iran, which is a [huge country]( URL_1 ) and authoritarian. It's also worth noting that most of the refugees from Middle East are to other Middle Eastern countries. So a lot of them are in countries like Egypt, Lebanon and Jordan. The \"European refugee crisis\" news only tells about the refugees who try to come to Europe.", "People are leaving brutal dictatorships, unstable democracies, and warlord filled states, mostly from Africa but also from the Middle East as well, in attempt to find land where they are not constantly being shot at. Europe is considered a Heaven on Earth, a new promised land full of peace, well paying jobs, and prosperity. They are not going deeper into Africa because they would have to walk over the world's largest desert and only would find other unstable regions. India is not regarded as a place of perpetual peace and prosperity that Europe is, and if your going to go hundreds of miles to find a new home, why not try to find the best of the best you possible can?", "* The middle east is a shithole for a number of reasons. * People are leaving in masses. * Europe has land and sea borders with countries that are near the middle east. * People are overwhelming those borders and trying to get as far as possible away from the middle east.", "Here's the quick and nasty answer. We ( the united states ) effectively sought out to remove dictators in the region who were previously holding order. We can talk all day about how Sadaam did this or that, but at the end of the day there was order with him in power. Now Isis funded in part directly by the US government and indirectly by all of the gear they got from Iraq are raising hell in the region. These refugees are running for their lives so they don't get raped and murdered by these extreme islamists and/or people posing as extreme islamists.", "Why is the news only covering this heavily now? These conditions/wars have been going on for more than the past year", "I live in Turkey. We are a major part of the problem. I mean, we're not the problem but we have to deal with a large portion of it. As per URL_0 , there are 4,013,292 refugees and 1,758,092 (~44%) are in Turkey. Around 30% of the refugees in Turkey are said to live in camps and the rest, they are just walking around looking for money, working illegally, doing illegal stuff such as theft, prostitution etc. Meantime, these are only the offical numbers. There is no physical border between Turkey and Syria, many more refugees are believed to pass to Turkey illegally. Some estimates are over 3 million. Turkey already has own problems and this much illegal immigrants create more problems. When they find out Turkey can't help them and they can't look after themselves in Turkey, they take small boats to Greece illegally. (You should note some Greek islands are only a few miles to Turkey) Of course, these boats they are taking are significanly under equipped, no safety at all and sometimes \"organizators\" fool them. These small boats sink, runs aground and does all sorts of things you can imagine. Just imagine Mexicans or Cubans trying to reach USA. In the end, many refugees die. We don't know how many. Meantime, Turkish government supports ISIS and the regime is basically suspended here in Turkey. The president will do anything illegally to continue his reign. Supporting ISIS is one example. ISIS attacks Turkey from time to time, just to allow the president to change the subject.", "Why doesnt the US offer to take some of these refugees since we are partly responsible for destabilizing several middle eastern countries? we arguably have plenty of land and can stand to take a few thousand of them." ]
[ [ "screening/identification processing. Its monthly budget was estimated at €2.9 million. Motivations The \"European Migrant Crisis\" refers to an enormous and unprecedented wave of both war refugees from the Syrian Civil War and economic migrants from the Near East and Africa. Refugee crisis Refugees are people forced to flee their country of origin because of persecution, war, or violence.\nAccording to the UNHCR, the number of forcibly displaced people worldwide reached 65,600,000 at the end of 2016; the highest level since World War II, with a 40 percent increase taking place since 2011. Of these 65,600,000, 22.5 million were refugees (17.2 million", "-34.82852499431465" ], [ "Valletta Summit on Migration Background The European migrant crisis began when large numbers of migrants and refugees from various countries came to the European Union and applied for asylum. The term \"crisis\" has been widely used since April 2015, when a number of boats carrying migrants sank in the Mediterranean Sea, resulting in the deaths of around 1,200 people. Following the shipwreck of 19 April, the European Council held a meeting to discuss the situation of migrants in the Mediterranean Sea. Among the decisions made during this meeting, EU leaders agreed to increase dialogue with the African Union and other", "-33.91523704947758" ], [ "the United States and Europe, he declared the resolution to stop the spread of terrorism and extremism under the threat of “radical Islamic terror.” \nOngoing wars in the Middle East have led to large Numbers of refugee seeking asylum, and European countries were the primary recipients. Since the European Union members were required to accept the Quotas of Migrants to alleviate the burden of the main landing sites for the migrants, refugees were swarming into the member states (including Malta, Finland, Ireland, Luxembourg, Latvia, Lithuania, Sweden, Portugal, Estonia, Cyprus, Netherlands, Slovenia, Germany, Belgium, France, Romania, Spain, Croatia, Bulgaria, Slovakia, Austria,", "-33.59989145438885" ], [ "European migrant crisis The European migrant crisis, also known as the refugee crisis, is a period beginning in 2015 characterised by high numbers of people arriving in the European Union (EU) from across the Mediterranean Sea or overland through Southeast Europe following Turkey's migrant crisis. It is part of a pattern of increased immigration to Europe from other continents which began in the mid-20th century and which has encountered resistance in many European countries.\nImmigrants from outside Europe include asylum seekers and economic migrants. The term \"immigrant\" is used by the European Commission to describe a person from a non-EU", "-33.38123998773517" ], [ "by the large number of refugees in the country as a result of the war in Syria, and activities carried out under the “Masar” program to accompany the democratizing processes in Middle East and North Africa.\nIn 2014, the project to strengthen the capacities of the Ministry of Social Development to prevent and respond to gender-based violence was completed.\nIn August 2015 the Tahdir-Masar initiative was approved for the Syrian civilian population, co-financed by the EU, which makes the maintenance of the OTC essential. Its objective is to train people with the potential to become key actors in a future transition and", "-32.635385851041065" ], [ "Refugee crisis Definition Crisis of refugees can refer to large groups of displaced people, who could be either internally displaced persons, refugees or other migrants, the incidents in their country of origin, or to problems while on the move, or it can refer to problems in the hosting countries after arrival involving large groups of displaced peoples, asylum seekers or refugees. Causes Causes for the crisis of the refugees can include war and civil war, human rights violations, environment and climate. Refugees as weapons \"Refugees as Weapons\", or \"Weapon of Mass Migration\" is a term used for mass exodus", "-32.54475641576573" ], [ "the refugee crisis and vowed to take over a million refugees in. This was a response to the significant influx of asylum applicants that Europe experienced due to the Syrian civil war.\nThe OPlatz movement continues to organise events up until today and continues to speak out against the Residenzpflicht, while also advocating an alternative asylum political agenda and the diversity of refugees, not only Syrians.", "-32.21422897305456" ], [ "in their homeland will not end in the near future, are leaving Jordan for Europe in growing numbers encouraged friends and relatives who are already there, pushed out by cuts in UN food aid. Jordan says it hosts more than 1 million Syrians in total, but the numbers are starting to fall. The UN’s World Food Programme, which feeds more than half a million refugees in Jordan, says the number of aid recipients fell by about 2,000 in September and 3,000 in October. In a random survey of refugees in October 2015 by the UNHCR, 25 per cent said they", "-31.83942463855783" ], [ "the European migrant crisis in 2016, aimed at establish a “binding and mandatory legislative approach” on resettlement and new EU-wide “readmission” agreements which should take precedence over bilateral ones between EU and non-EU countries.", "-31.69356266205432" ], [ "beginning of the European migrant crisis a lot of Syrian refugees have begun to arrive in Kirkenes via Russia.", "-31.585731860192027" ], [ "tasked with dealing with Chinese refugees in Hong Kong, while also responding Algerian refugees who had fled to Morocco and Tunisia in the wake of Algeria's war for independence. The responses marked the beginning of a wider, global mandate in refugee protection and humanitarian assistance.\nDecolonization in the 1960s triggered large refugee movements in Africa, creating a massive challenge that would transform UNHCR; unlike the refugee crises in Europe, there were no durable solutions in Africa and many refugees who fled one country only found instability in their new country of refuge. By the end of the decade, two-thirds of UNHCR's", "-31.46766985859722" ], [ "reach. She characterised the crisis as a \"humanitarian tragedy of historic proportions,\" before urging the international community to do whatever possible to bring the crisis to an end in a peaceful and diplomatic manner. Global Refugee Crisis On the occasion of the World Refugee Day 2013, she underscored the significant contributions of resettled refugees to their new communities while expressing concern about the safety and well-being of all displaced populations. \"Their challenges are many, but common for all refugees, asylum seekers, and internally displaced persons is that they have either limited or no control over their own lives... Although the", "-31.419198721414432" ], [ "security situation. UNHCR Within the countries neighbour Syria that are hosting Syrian refugees the Office of the United Nations High Commissioner for Refugees (UNHCR), also known as the UN Refugee Agency, is mandated to protect and support Syrian refugees in their voluntary repatriation, local integration or resettlement to a third country. The main framework for coordinating the refugee response is the Syria Regional Response Plan (RRP). Detailed and up-to-date information on the refugee situation can be accessed on the Inter-agency Information Sharing Portal, which is maintained by UNHCR. ICRC Outside the SHARP and the RRP mechanism, the International Committee", "-31.39937634972739" ], [ "European Refugee Fund The European Refugee Fund (ERF) was a scheme designed to facilitate the sharing of the financial costs of the reception, integration and voluntary repatriation of refugees amongst European Union member states. All EU member states apart from Denmark participated in the ERF. The Fund financed both national and transnational projects, including providing skills and language training to refugees, improvements to reception facilities and refugee resettlement or relocation operations. The ERF was allocated €630 million in funding over the period 2008–13. It was set up in 2000, replacing previous ad hoc funding measures. In April 2014, the ERF,", "-31.367672010906972" ], [ "migrant crisis. The summit resulted in the EU setting up an Emergency Trust Fund to promote development in Africa, in return for African countries to help out in the crisis. Negotiations with Turkey On 12 November 2015, at the end of the two-day summit in Malta, EU officials announced an agreement to offer Turkey €3 billion over two years to manage more than 2 million refugees from Syria who had sought refuge there, in return for curbing migration through Turkey into the EU. In November, Turkish president Recep Tayyip Erdoğan reportedly threatened to send the millions of refugees in Turkey", "-31.306948187979287" ], [ "change since 2015, when the government suspended further registration; entering Lebanon has become close to impossible for the remaining Syrian refugees. There were 280,000 Palestinian refugees before the Syrian crisis, 32,000 more fled from Syria. Around 6,000 Iraqi refugees also fled to Lebanon. Additionally, 1-1.5 million Lebanese are in need of humanitarian assistance.\nPublic services and infrastructure are overburdened, exacerbating pre-existing economic and social problems.\nThe Lebanese Crisis Response Plan exposes the official response to the crisis, as developed by the Lebanese government together with the UN and NGOs.\nAbout 12% of refugee households live in informal settlements (tents from timber, plastic sheets,", "-31.18635927059222" ], [ "European migrant crisis has reversed, with refugees from the collapsed European Union states fleeing across the Mediterranean to North Africa. In a reversal of great power politics, China and the Bouazizi Empire send aid to the war-torn United States. The Bouazizi Empire also channels funding to the Free Southern States in an attempt to destabilize the United States, which it regards as a rival to its imperial ambitions. Russia is said to have undertaken a period of aggressive expansion and renamed itself as the Russian Union.\nClimate change also had a significant impact on the world. Florida was inundated by rising", "-31.184390298145445" ], [ "camps, while many have opted to make the dangerous journey to Europe as conditions remain hostile to Palestinians in neighboring Middle Eastern states. According to UNRWA, more than half a million Palestinians resided in refugee camps in Syria before the war started. It is estimated that at least 125,000 prewar.\nAccording to the Euro-Mediterranean Human Rights Monitor, Palestinians who lived in refugee camps in Syria have faced additional obstacles, since they have been made \"refugees for the second time\". The Geneva-based organization reported that more than 160,000 Palestinian Syrian refugees had left their camps in Syria, migrating to neighboring or countries", "-31.17309407144785" ], [ "it. Refugee crisis, from March to June 1999 In March 1999, the NATO started a military air strike in Kosovo, in the name of an \"Humanitarian War\". This led to many Albanians fleeing from Kosovo to neighboring countries, mainly from March to June 1999.\nAlbania opened its borders from the beginning of the crisis in order to let refugees come. People were arriving directly at the border located at the north east of the country, or were transferred from Macedonia. Albania was not prepared for so many people to come and asked for international help in order to cover refugees basic", "-31.101281807234045" ], [ "hundreds of thousands of people were protesting against President Assad. An early violent crackdown was implemented to try to mitigate these uprisings—however, these measures were met with more unrest. By May 2011, thousands of people had already fled the country and the first refugee camps opened in Turkey. In March 2012, the UNHCR decided to appoint a Regional Refugee Coordinator for Syrian Refugees—recognising the growing concerns surrounding the crisis. Just a year later, in March 2013, the number of Syrian refugees reached 1,000,000. By December 2017, UNHCR counted 1,000,000 asylum applications for Syrian refugees in the European Union. As of", "-31.045443955692463" ], [ "Syrian Vulnerable Person Resettlement Programme The Syrian Vulnerable Person Resettlement Programme, sometimes referred to as a Relocation Scheme, is a programme of the United Kingdom government that plans to resettle 20 000 Syrian refugees from refugee camps in Jordan, Lebanon, Iraq, Egypt and Turkey over the period from September 2015 to May 2020. It was first announced in January 2014 and in September 2015 the expansion to 20,000 refugees was made. It is run in partnership between the UK Home Office, the Department for International Development, the Department for Communities and Local Government and NGOs such as Refugee Action. Only 2,659", "-31.027800460055005" ], [ "Refugees By 6 May 2015 the United Nations reported that 40,000 people had fled to seek safety in neighbouring Rwanda, the Democratic Republic of the Congo and Tanzania. By 13 May at least an additional 10,000 people had fled. On 14 May the UN said that over 70,000 people had fled the country. On 18 May 2015 the figure had been revised up to 112,000 refugees and asylum-seekers.\nBy 22 May 2015 a cholera epidemic had broken out amongst refugees in Tanzania and affected over 3,000 people. At least 31 refugees in Tanzania had died from the disease and between 3–500", "-30.950540504058154" ], [ "Refugees of the Syrian Civil War in Jordan Syrian Civil War refugees In the wake of the uprising against the Syrian government and its President Bashar al-Assad, beginning in 2011, close to 2,000 Syrians per day began pouring into Jordan to reside in the first refugee camp near Mafraq, created by the UNHCR. As a small, aid-dependent country, already suffering from financial and environmental issues, the number of Syrians seeking refuge in Jordan has strained the country's resources especially water and agriculture. Jordan is one of the top ten driest countries in the world which endangers its citizens' livelihoods.", "-30.94118668581359" ], [ "alternative route into the Schengen area, as part of the refugee crisis, with most refugees fleeing the Syrian and Iraqi civil wars. As the Croatian Prime minister Zoran Milanović stated that Croatia could not become a \"refugee camp\" and that it had become overwhelmed by the number of refugees entering the country, it was decided that Croatia would stop registering them and that a certain number of refugees be let into Hungary and Slovenia, attempts were made, however, by the authorities of those countries to obstruct the passage of refugees. The refugee crisis and immigration may also, for the first", "-30.902713288203813" ], [ "in Geneva, Switzerland, in July 1979, stating that \"a grave crisis exists in Southeast Asia for hundreds of thousands of refugees.\" Illustrating the prominence of the issue, Vice President Walter Mondale headed the U.S. delegation. The results of the conference were that the Southeast Asian countries agreed to provide temporary asylum to the refugees, Vietnam agreed to promote orderly departures and prevent the exodus of boat people, and the Western countries agreed to accelerate resettlement. The Orderly Departure Program enabled Vietnamese, if approved, to depart Vietnam for resettlement in another country without having to leave their country and attempt the", "-30.689368220919278" ], [ "Demographics of Syria Forced displacement More than six million refugees left the country during the civil war, of whom over five million are registered as refugees by the UNHCR as of mid-2019. Most of them fled to neighboring countries such as Turkey, Lebanon, Jordan, and Iraq, as well as European nations like Greece, Germany and Sweden. Since 2017, tens of thousands have returned.\nThe war resulted in large-scale displacement in the country. The UNHCR estimates internally displaced people (IDPs) at seven million. A further 70,000 people were trapped on the border with Jordan at Rukban in 2016-18, with up to 40,000", "-30.678953357884893" ], [ "with beards singing Allahu Akbar across Europe\". He also dismissed the idea that people arriving in Western Europe via the Balkans are genuine refugees, stating: \"Turkey, Greece, Macedonia, Serbia are safe countries. If you flee them then you are doing it for benefits and a house.\"\nFuture of the Crisis\nWhile data recorded by various bodies and organizations including the UNHCR, IOM and Frontex shows that the overall numbers of immigrants entering Europe has significantly decreased, suggesting that the peak of this crisis has been passed, it is far from over. The growing number of migrants from the Sub-Saharan and Sahel regions,", "-30.66275456859148" ], [ "and some of the frequently mentioned aspects have been presented below. National security After 2015 the Europe refugee crisis, incidents like terrorist attacks that break national security, are partially connected with the asylum policy. After several terrorist attacks happened in France, for example, the Paris attack in November 2015, after which President Hollande announced the National Emergency status across France. Concerns on domestic security was also presumed to be a reason that pulled up the support rate of right-wing parties since 2015, which advocates stricter policies on managing asylum seekers. Some voices also claimed that the influx of Islamist radicals", "-30.66181598114781" ], [ "widely seen as being ineffective in the wake of the European migrant crisis. Support for the proposal has come from France and Germany, with Poland and Hungary expressing opposition to the plan, concerned by the perceived loss of sovereignty.\nThe limitations of the former EU border agency, Frontex, hindered its ability to effectively address and remedy the situation created by the refugee crisis: it relied on the voluntary contributions by Member States as regards resources, it did not have its own operational staff, it was unable to carry out its own return or border management operations without the prior request of", "-30.63614618216525" ], [ "estimated 43,000 are trapped in hard-to-reach locations.\nSome have been displaced multiple times as a result of armed violence. Additionally, 120,000 are displaced to neighboring countries.\nUntil 2011, UNRWA provided services in 12 camps administered by Syrian authorities, including Homs and Yarmouk. Many sustained extensive damage and were forcibly displaced due to armed conflict. As of January 2017, UNRWA manages 9 shelters with about 2,600 Palestine refugees and provides cash, food and non-food items to many more.\nBattles between Tahrir al-Sham and ISIL for control of the Yarmouk Camp continue for more than two years, as of April 2017. Hosts countries in the", "-30.634380149189383" ], [ "now shifted their emphasis to recovery efforts, including digging irrigation canals and distributing plant seeds. Long-term strategies by national governments in conjunction with development agencies are believed to offer the most sustainable results. Refugee crisis By 15 September, more than 920,000 refugees from Somalia had reportedly fled to neighboring countries, particularly Kenya and Ethiopia. At the height of the crisis in June 2011, the UNHCR base in Dadaab, Kenya hosted at least 440,000 people in three refugee camps, though the maximum capacity was 90,000. More than 1,500 refugees continued to arrive every day from southern Somalia, 80 per cent of", "-30.55020717350999" ], [ "United Nations High Commissioner for Refugees History Following the demise of the League of Nations and the formation of the United Nations the international community was acutely aware of the refugee crisis following the end of World War II. In 1947, the International Refugee Organization (IRO) was founded by the United Nations. The IRO was the first international agency to deal comprehensively with all aspects of refugees' lives. Preceding this was the United Nations Relief and Rehabilitation Administration, which was established in 1944 to address the millions of people displaced across Europe as a result of World War II.\nIn", "-30.546701820559974" ], [ "of refugees from a state to a hostile state as a \"weapon\" against an enemy. Weaponized migration occurs when a challenging state or non-state actor exploits human migration—whether voluntary or forced—in order to achieve political, military, and/or economic objectives. Kelly Greenhill counts 56 attempts (1951 to 2006) to employ the direct or indirect threat of mass migrations as a non-military instrument of influence. Read more... War and civil war In June 2015 the UN refugee agency reported that wars and persecutions are the main reasons behind the refugee crises all over the world. A decade earlier, six people were", "-30.5356651408365" ], [ "many nations, so even 'minor' conflicts could result in a large number of displaced persons. Whether in Asia, Central America or Africa, these conflicts, fueled by superpower rivalry and aggravated by socio-economic problems within the concerned countries, durable solutions continued to prove a massive challenge for the UNHCR. As a result, the UNHCR became more heavily involved with assistance programs within refugee camps, often located in hostile environments.\nThe end of the Cold War marked continued inter-ethnic conflict and contributed heavily to refugee flight. In addition, humanitarian intervention by multinational forces became more frequent and the media began to play a", "-30.494663452962413" ], [ "to Europe originate from Syria. Their migration stems from severe socio-political oppression under President Bashar al-Assad. Civil war ensued with clashes between pro and anti-government groups. Anti-government forces were supported by external governments (including the US, UK and France) in an effort to topple the Syrian government via classified programs such as Timber Sycamore that effectively delivered thousands of tons of weaponry to rebel groups. In 2011, a group of Syrians displayed pro-democracy protests in the city of Daraa. Syrian President Bashar al-Assad responded with force and consequently, more protests were triggered nationwide against the Assad regime. By July 2011,", "-30.487050521594938" ], [ "keep Germany and Europe open, to welcome legitimate asylum seekers in common humanity, while doing her very best to stop abuse and keep the movement to manageable proportions. Which demands a European-wide response (…)\".\nAnalyst Naina Bajekal for the United States' magazine Time in September 2015 suggested that the German decision, late August 2015, to allow Syrian refugees to apply for asylum in Germany even if they had reached Germany through other EU member states, has led to increased numbers of refugees from Syria and other regions – Afghanistan, Somalia, Iraq, Ukraine, Congo, South Sudan etc. – endeavouring to reach (Western)", "-30.41352005599765" ], [ "who has done so.\nIn August 2015, while referring to the European migrant crisis, Uzinić stated that \"we must not look at people through prejudice, we need to meet them and meet with them. Refusing to help refugees is like a war crime.\"", "-30.351793928304687" ], [ "of migrant flow in August 2015, its government did not discount the possibility of accepting a greater number of migrants later in the same year.\n Malta – Prime Minister Joseph Muscat called the crisis \"an ugly period\" for Europe, and said that Malta will take in 75 migrants from Italy and Greece. He also called for a 'global system of refugee quotas'.\n Poland – In 2015, just before the parliamentary elections that were to happen that year, government officials with then Prime Minister Ewa Kopacz stated that the country was ready to take 2,000 refugees. \nHowever, after the Law and Justice party", "-30.350999113441503" ], [ "During the two coming years he will be working on the refugees issue in the Middle East: A comparative research between the Palestinian refugees in 1948 and the Syrian refugees during the Syrian crisis, with a focus on the solidarity of the local societies in different places when the issue of refugees arises.", "-30.33804880117532" ], [ "Syrians in Saudi Arabia Refugees As of September 2015, the flow of refugees to the European Union has increased significantly, and there is a rise in criticism of some Muslim nations for allegedly accepting few refugees. The Syrian Civil War forced millions to flee their homes in search of safety. Saudi Arabia, as a rich country, was heavily criticized for not offering land to Syrian refugees – it only offers resettlement for asylum-seekers whose families already reside in Saudi Arabia. Total number The CIA World Factbook estimated that as of 2013, foreign nationals living in Saudi Arabia made up about 21%", "-30.301866951951524" ], [ "budget was focused on operations in Africa and in just one decade, the organization's focus had shifted from an almost exclusive focus on Europe.\nIn 1967, the Protocol Relating to the Status of Refugees was ratified to remove the geographical and temporal restrictions of UNHCR under the 1951 Convention relating to the Status of Refugees. As the Convention was confined to the refugee crisis in the aftermath of World War II in Europe, the Protocol was made to address the “new refugee situations that have arisen since the Convention was adopted and the refugees concerned that may therefore not fall within", "-30.300213496317156" ], [ "a campaign appearance of the Macedonian sister party VMRO-DPMNE for supporting the closure of the Western Balkans route. Which was later criticized as an indirect campaigning aid. In regards to the refugee crisis, the Ministry of Integration introduced values and orientation courses in all states.\nIn March 2017, Kurz criticized rescue actions by aid organizations as \"NGO insanity\", as these would result in more refugees dying in the Mediterranean Sea rather than less. Kurz repeatedly demanded that refugees rescued in the Mediterranean Sea should no longer be taken to mainland Italy, but returned to refugee centers outside of Europe, as according", "-30.201816246128146" ], [ "in 2010 the European Commission explored in a study the financial, political and legal implications of a relocation of migrants in Europe.\nSince April 2015, the European Union has struggled to either handle the influx of migrants, reduce (or stop) that influx, or both, by:\n-- increasing funding for border patrol operations in the Mediterranean;\n-- devising plans to fight migrant smuggling through initiatives such as the military Operation Sophia;\n-- proposing a new quota system both to relocate asylum seekers among EU states for processing of refugee claims to alleviate the burden on countries on the outer borders of the Union and to", "-30.177216100040823" ], [ "society has failed because of the large number of foreigners coming within a short period. Most refugees who arrive in Malta are from war-torn Islamic countries, some with fundamentalist ideologies, such as Libya, Somalia and Syria. Extremist remarks against western countries by muslims have been reported in the northern region of Malta. Mario Farrugia Borg, being a muslim himself, has called for drastic measures against \"illegal migration\". The European Court of Human Rights (ECtHR) has ruled against Joseph Muscat's opt for \"pushback\" of illegal migrants to Libya, despite the threat some refugees may present, as this goes against the fundamental", "-30.172655932532507" ], [ "Near East. The VDPA recognises that, in view of the complexities of the global refugee crisis and in accordance with the Charter of the United Nations, relevant international instruments and international solidarity and in the spirit of burden-sharing, a comprehensive approach by the international community is needed in coordination and cooperation with the countries concerned and relevant organisations, bearing in mind the mandate of the United Nations High Commissioner for Refugees. This should include the development of strategies to address the root causes and effects of movements of refugees and other displaced persons, the strengthening of emergency preparedness and response", "-30.13792465790175" ], [ "nations close to areas with many refugees require help for accommodation and how many wealthier nations are hesitant to provide the needed aid. It conveys global responses to border closings and the effects on refugees, such as the closure of the Republic of Macedonia border and the refugees becoming stuck in Greece's Idomeni border camp.\nDrawing on issues within refugee camps across the world, the film shows the vast numbers of individuals residing in camps such as the now defunct Calais Jungle outside Calais in France and Dadabb in north-eastern Kenya, with many having minimal basic human rights and resources.\nWhile", "-30.118673120916355" ], [ "humanitarian crisis unfolding in 2017. Urgent and targeted actions were needed in order to address this humanitarian crisis. United Nations Secretary-General Antonio Guterres called the international community for the assistance for the affected people to eliminate the risk of famine. Upon this request, AIDA provided financial aid to these countries via the United Nations. Syrian refugees Thousands of people died, 5.2 million people became refugees, 13.5 million are in need of humanitarian assistance since the outbreak of the conflict in March 2011 in Syria. AIDA also contributes to supporting Syrian people that became refugees as a result of this conflict", "-30.062956770067103" ], [ "the UNHCR stated that up to 25% of the population of Kosovo had fled.\nOn June the 11th, 1999, the air campaign from the NATO stopped. The day before, a military technical agreement was signed by both parties and ended the armed conflict. Afterward, the UNHCR report written about the refugee crisis stated that it was well managed, regarding the circumstances. After the crisis - From June 1999 In the peace treaty signed by the Nato and the Federal Republic of Yugoslavia, it was asked that refugees could go back to their homes. Most of the refugees were indeed able to", "-30.020057438290678" ], [ "resettle asylum seekers who have been determined to be genuine refugees.\nIndividual countries have at times re-introduced border controls within the Schengen Area and rifts have emerged between countries willing to allow entry of asylum seekers for processing of refugee claims and other countries trying to discourage their entry.\nAccording to Eurostat, EU member states received over 1.2 million first-time asylum applications in 2015, more than double that of the previous year. Four states (Germany, Hungary, Sweden and Austria) received around two-thirds of the EU's asylum applications in 2015, with Hungary, Sweden and Austria being the top recipients of asylum applications per", "-30.00371346937027" ], [ "According to the European Council on Refugees and Exiles, a network of European refugee-assisting non-governmental organizations (NGOs), huge differences exist between national asylum systems in Europe, making the asylum system a 'lottery' for refugees. For example, Iraqis who flee their home country and end up in Germany have an 85% chance of being recognised as a refugee and those who apply for asylum in Slovenia do not get a protection status at all. United Kingdom In the United Kingdom the Asylum Support Partnership was created to enable all the agencies working to support and assist asylum seekers in making asylum", "-29.986776198027655" ], [ "definition of \"refugee\" from the UNHCR, limited to refugees from the 1948 Arab-Israeli War. Refugees who meet the UNRWA criteria are ineligible for UNHCR services. Public awareness Several new programs have recently been introduced to support and to heighten awareness of the issues faced by refugees around the world. These two new programs are a product of the benchmarks set out by the United Nations Millennium Development Goals.\nThe UNHCR works in different regions of the world to raise awareness about the refugee crisis and the needs of these refugees.\nSince 2009, the UNHCR acknowledged a large presence of migration and refugees", "-29.976280670496635" ], [ "of European origin required assistance. By the 1970s the European refugee problems were mostly solved, but had been replaced by millions of displaced persons in the Third World. He had widened the UNHCR mandate well beyond its original focus on Eastern Europe, extending the organisation's reach to refugees from the Palestinian territory, Vietnam, Angola and Algeria. As the scale and complexity of refugee issues continued to increase, the UNHCR and the international community at large was better positioned to adapt. By the end of 1977 when he chose to step down from the position, he had become the longest-serving UN", "-29.959094207340968" ], [ "Norway, Switzerland, and Liechtenstein) that later caused the refugee crisis. However, Poland, Hungary, and Czechs has refused to accept the refugee quotas and rarely admit any asylum-seekers. Jaroslaw Kaczyński, the leader of the ruling Law and Justice party, had explained to the public that a part of asylum seekers may cause destruction to the safety and culture of the country. Trump, during his presidency, shares the same political views with the party, which Trump himself further endorsed the approach by encouraging the member states of the NATO (North Atlantic Treaty Organization) to demonstrate the belief in the future of the", "-29.957960018386075" ], [ "Refugee Action Refugee resettlement The group's work has included the resettlement of refugees from Vietnam, Bosnia and Kosovo, as well as evacuees from Montserrat after the Soufrière Hills volcano eruption in 1995. Gateway Resettlement Programme Refugee Action operates the largest part of the UNHCR Gateway Resettlement Programme in the UK, which resettles 750 refugees every year. The main countries of origin of current service users include Somalia, Sudan, Iraq, Ethiopia and Congo. Syrian Vulnerable Person Resettlement Scheme The Syrian Vulnerable Person Resettlement Scheme is also delivered by Refugee Action in some areas of the UK. The scheme intends to resettle", "-29.948770290677203" ], [ "least 3,000 Syrian refugees fled Syria as a consequence of such incidents as Syrian army operation in Jisr ash-Shugur in June 2011. In June 2011, Turkish prime minister Erdogan described to Anatolian Agency his feeling that \"They [Syria] are not acting in a humane manner. This is savagery.\" However, at the beginning, the Turkish government refrained from describing the Syrians who fled to Turkey as \"refugees\" or \"asylum-seekers\", instead referring to them as guests, and Erdogan, while demanding the implementation of promised reforms by the Syrian government, initially refrained from calling for Bashar al-Assad's departure, although he later would. Timeline", "-29.938309873105027" ], [ "Africa, where the number of internally displaced persons (IDPs) exceeds the number of refugees. Egypt Starting in the 1990s, the increase in refugees from Sudan has forced UNHCR RO Cairo to shift its focus from education and training to care and maintenance of refugees. In Cairo, the International Organization for Migration (IOM) is involved in helping process refugees for resettlement, moving refugees, and assisting with their medical examinations. IOM also conducts cultural orientation for the refugees to prepare them for resettlement in third countries. The UNHCR regional office in Cairo (RO Cairo) is overextended, and after Somalis the Sudanese (mainly", "-29.936354814184597" ], [ "to jobs, education, and healthcare opportunities; otherwise new conflicts might break out.\nUnlike the case of refugees, there is no international humanitarian institution which has the overall responsibility of protecting and assisting the refugees as well as the internally displaced. A number of organizations have stepped into the breach in specific circumstances. UNHCR The Office of the United Nations High Commissioner for Refugees (UNHCR) was mandated by General Assembly Resolution 428 (V) of 14 December 1950 to \"lead and coordinate international action for the worldwide protection\nof refugees and the resolution of refugee problems....guided by the 1951 United Nations Convention Relating", "-29.92396964193904" ], [ "\"is repeating itself in Syria—tens of thousands of rapes.\"\nA report released 14 January 2013 by the International Rescue Committee stated that a primary reason Syrian refugees flee is because of fear of rape.\nBy late November 2013, according to the Euro-Mediterranean Human Rights Network (EMHRN) report entitled \"Violence against Women, Bleeding Wound in the Syrian Conflict\", approximately 6,000 women have been raped (including gang-rape) since the start of the conflict - with figures likely to be much higher given that most cases go unreported. According to the EMHRN report, most were victims of government forces mostly \"during governmental raids, at checkpoints", "-29.922908260603435" ], [ "Syrian refugee camps Shelters in Syria Within Syria itself, shelter aid for internally displaced persons is coordinated mainly by the Global Shelter Cluster (co-led by UNHCR, IFRC and the Syrian Ministry of\nLocal Administration). However, there is poor accessibility to the areas of need, so efforts were directed at emergency aid. The Shelter Cluster also cites the complexity of administrative procedures and limited capacity of NGOs permitted to operate in Syria as challenges to assistance.\nIn 2016, public buildings were rehabilitated as collective short and mid-term shelters for 24,000 persons. For example, of the 90,000 people from east Aleppo registered by the", "-29.892555742990226" ], [ "Others qualified as refugees claiming to \"escape\" during crises, such as those fleeing during the Hungarian Revolution of 1956, the 1968 Soviet invasion of Czechoslovakia, the Polish Solidarity events and various events that occurred in East Germany, Bulgaria and Albania in the late 1980s. Circumventing the 1975 Helsinki Accords The Helsinki Accords of 1975 were an important Cold War-era agreement signed by most European countries, including those of the Eastern Bloc, the United States and Canada. It governed various territorial agreements, frontier disputes, human rights, the threat of force and other items. The \"third basket\" of the Helsinki Accords contained", "-29.839923040010035" ], [ "Migrant Offshore Aid Station The Migrant Offshore Aid Station (MOAS) is an international humanitarian organisation based in Malta dedicated to providing aid and emergency medical relief to refugees and migrants around the world. \nFounded in 2013 in response to the Mediterranean maritime migration phenomenon, today MOAS is working in Bangladesh to provide emergency medical care and assistance to Rohingya refugees fleeing from violence and persecution in Myanmar. History MOAS was set up after the tragedies of 2013 when two vessels, one carrying people from Eritrea and Somalia and one carrying Syrian refugees, capsized on the way from North Africa to", "-29.80480992095545" ], [ "of the European Union. These include nearly 80,000 refugees who fled to Europe, 57,276 others who fled to neighboring countries, such as Lebanon, Jordan, and Turkey, and another 7,000 Palestinian Syrian refugees who fled to Egypt and the Gaza Strip.\nA number of Palestinian groups are involved in the fighting alongside the Syrian government. 3,642 Palestinians have died during the seven years of war, 1,651 Palestinians have been detained and more than 300 Palestinians are unaccounted for. Residents of Palestinian camps are suffering from air raids, shelling, siege, and malnutrition. It has been seen in the Damascus- area Yarmouk camp. The", "-29.797606679610908" ], [ "refugees living in countries neighboring Iraq and 95% of them still live in the Middle East - although other nations in Europe have begun to accept Iraqi refugees. It is difficult for refugees and their children to obtain legal status in a middle eastern country as they are treated as temporary \"guests\" rather than as \"refugees\". Current regional host countries include Syria, Jordan, Egypt, Lebanon, Kuwait, Iran, small numbers in Iraq, the Gulf States, and Turkey. Only Egypt and Turkey have signed the UNHCR refugee convention, and even then with heavy restrictions and limited effective protection. Jordan Pre-war relations between", "-29.787757933721878" ], [ "debate, refugees were considering setting up an organization that is able to break the media and diplomatic embargo suffered by refugees. At the end of this first gathering, the refugees published the charter for a peaceful and speedy return of refugees with their prerequisites.\nOn April 3, 1995 at Mugunga, the was born. The RDR was intended to be a non-partisan organization that would bring together all the refugee groupings irrespective of political, ethnic, regional or professional background. RDR was an organization that would not compete with the political parties in exile and its action was placed beyond the traditional", "-29.776916095317574" ], [ "the Interior, Building and Community in Berlin, where the protesters demanded the repatriation of Islamic refugees back to the Middle East. It was reported that the group were distributing posters aimed at Syrian refugees that read \"The war is over. Syria needs you\" and referenced a \"remigration policy\".\nIn May 2019, Katrin Ebner-Steiner, leader of AfD Bavaria, indicated that the deportation of non-whites from Germany was a preferable policy to racial integration, after she called for \"Remigration instead of integration\" at a conference for the Southern wing of the party.\nAhead of the 2019 European Parliament election, Germany's opposition party, the far-right", "-29.757416382897645" ], [ "recent trends show the slowing in momentum of applications from Syria.\nFurthermore, given the asylum seeker crisis within Europe, the EASO should consider the ‘pooling of reception places in times of emergency’ to encourage a EU approach to asylum seekers. Future Developments Heijer and colleagues, have recommended that EASO should become the centralised organisation \"encouraging more uniform decisions\". They also argue that the EASO should lead more Asylum Officer training.", "-29.746178168243205" ], [ "in the aftermath of the 1991 Gulf War, though it was re-opened in 1997. By 1999 the flow of Iraqis into Syria resumed, and by 2003 an estimated 250,000 Iraqis had fled to Syria.\nThe present wave of refugees was sparked by the invasion of 2003. The first to leave were officials and military officers with close ties to the former government, followed by people fleeing the violence in Al Anbar Governorate in 2004. At the same time, minority groups (including Christians, Mandeans, and Yezidis) as well as secular-leaning families and professionals fled to escape being targeted amidst the increasingly violent", "-29.746110056259568" ], [ "Third country resettlement Third country resettlement or refugee resettlement is, according to the UNHCR, one of three durable solutions (voluntary repatriation and local integration being the other two) for refugees who fled their home country. Resettled refugees have the right to reside long-term or permanent in the country of resettlement and may also have the right to become citizens of that country.\nResettled refugees may also be referred to as quota or contingent refugees, as countries only take a certain number of refugees each year. In 2016 there were 65.6 million forcibly displaced people worldwide and around 190,000 of them were resettled into", "-29.733447102596983" ], [ "Europe are subject to follow the laws in place by the Common European Asylum System (CEAS). These laws were reformed between 2011 and 2014, and have not since been updated due to the current state of the refugee crisis. The crisis is of an emergency state, so the main priority has been exercising asylum laws, rather than the reformation of them. These laws are in place to prohibit European Union Member States from sending an individual back to where they are at risk of persecution, and to offer international protection to those who are granted refugee status through the course", "-29.717022304510465" ], [ "the country is suffering from ongoing conflicts in adjacent countries. Djibouti has seen a considerable number of refugees and asylum seekers fleeing to the country from Eritrea, Ethiopia, Somalia and Yemen. As of March 2018, the number of refugees and asylum-seekers amounts to 27 000 people. Moreover, the implementation of such strategy also depends on the political leadership and its willingness to commit to the programs. Lastly, social tensions continue to grow as the unemployment rate grows higher, especially among the young population.\nThe resources that have been allocated include an indicative envelope of US$25 million under IDA. In addition", "-29.697586814541864" ], [ "Somalia Following the outbreak of civil war in Somalia, many of the country's residents left in search of asylum. According to the UNHCR, there were around 976,500 registered refugees from the nation in adjacent states as of 2016. The majority of these individuals were registered in Kenya (413,170: 326,611 in Dadaab, 54,550 in Kakuma, 32,009 in Nairobi), Yemen (253,876 in UNHCR centers and urban areas), and Ethiopia (213,775 in five camps in Dollo Ado). Additionally, 1.1 million people were internally displaced persons (IDPs). Most of the IDPs were Bantus and other ethnic minorities originating from the southern regions, including those", "-29.697259856766323" ], [ "immigrants within the European Union.\nIn the United States, the Office of Refugee Resettlement, a program of the U.S. Department of Health and Human Services's Administration for Children and Families, is tasked with managing the secondary migration of resettled refugees. However, there is little information on secondary migration and associated programmatic structural changes. Secondary migration has been hypothesized as one of the driving forces behind the distribution of resettled refugees in the United States. Somalis and secondary migration in the United States Somalis, a refugee group that was initially widely dispersed in the United States, has formed significant communities in Minnesota,", "-29.68606310677569" ], [ "Syria. Arrivals of refugees to Lebanon grew at an unprecedented pace in 2013 and 2014, with an average of 47,000 refugees being registered by UNHCR per month. Close to 30 percent of the refugee population are left without access to safe drinking water because of the increased water scarcity in the region. One issue with providing adequate care for the refugees is that both Syria and Lebanon have deeply divided populations, meaning that their current priorities are not climate change or population growth as much as they are regime stability and national security. Because of this priority focus away from", "-29.67135392606724" ], [ "fled from Jordan to Syria. In 1982, in the wake of 1982 Lebanon War, a few thousand Palestinian refugees left Lebanon and found shelter in Syria.\nThe initial influx of Palestinians was substantial (90,000–100,000), and the government, through a series of laws, gradually paved the way for their integration into the Syrian socioeconomic structure while preserving their separate Palestinian identity. Current trends Due to the civil war in Syria that commenced in 2011, many Palestinians in Syria have been displaced, either within Syria, itself or they have fled the country. Their propensity to fleeing includes having been under siege in refugee", "-29.659991782391444" ], [ "Syrians in Germany Migration history During the European migrant crisis of 2014-2015 hundreds of thousands of Syrian refugees of the Syrian Civil War entered Germany to seek refugee status. The European migrant crisis was especially accelerated when on 4 September 2015, Chancellor Werner Faymann of Austria, in conjunction with Chancellor Angela Merkel of Germany, announced that migrants would be allowed to cross the border from Hungary into Austria and onward to Germany, and early on 5 September 2015, buses with migrants began crossing the Austro-Hungarian border.\nAs of 31 December 2014, the Federal Statistical Office of Germany estimates that there were", "-29.650309559677225" ], [ "symptoms of war that are often motivated by communal hatred based on ethnic background, race, or religious views. External displacement are individuals who are forced out of the borders of their country into another as seen with the Syrian Refugees. The following may have a severe economic impact on a country.\nIn 2015, 53 percent of refugees worldwide originated from Somalia, Afghanistan, and Syria. In a Global Trends Report by the UNHRC, approximately 65 million people around the world have been forced from their home. Out of this number, 21.3 million are refugees, over half of the demographic under the age", "-29.648053506505676" ], [ "countries involved in the migrant crisis by holding a summit in Valletta, Malta.\nThe summit was meant to include leaders of the countries of origin, transit or destination of the migrants. The heads of state and government of EU member states, the African Union Commission, the ECOWAS Commission, and states parties to the Khartoum and Rabat Processes were all invited to the summit, as were the Secretary-General of the United Nations and representatives from the International Organization for Migration. The summit The Valletta Summit began with an opening ceremony in front of Auberge de Castille, the Office of the Prime Minister", "-29.63579033361748" ], [ "the scope of the Convention”.\nIn the 1970s, UNHCR refugee operations continued to spread around the globe, with the mass exodus of East Pakistanis to India shortly before the birth of Bangladesh. Adding to the woes in Asia was the Vietnam war, with millions fleeing the war-torn country.\nThe 1980s saw new challenges for UNHCR, with many member states unwilling to resettle refugees due to the sharp rise in refugee numbers over the 1970s. Often, these refugees were not fleeing wars between states, but inter-ethnic conflict in newly independent states. The targeting of civilians as military strategy added to the displacement in", "-29.635501590557396" ], [ "number of asylum applications lodged by Syrian refugees in Europe steadily increased between 2011 and 2015, totaling 813,599 in 37 European countries (including both EU members and non-members) as of November 2015; 57 percent of them applied for asylum in Germany or Serbia. The largest single recipient of new asylum seekers worldwide in 2014 was the Russian Federation, with 274,700 asylum requests. Migration to Greece and Bulgaria 2007–2015 Between 2007 and 2011, large numbers of migrants from the Middle East and Africa crossed between Turkey and Greece, leading Greece and the European Border Protection agency Frontex to upgrade border controls.", "-29.54781221097801" ], [ "refugees.\nIn 2016, 85.8 percent of refugees in Switzerland received welfare payments. Turkey The vast majority of migrants and refugees entering Europe by sea in 2015, nearly half million by September, arrived from Turkey, according to the United Nations. Turkish officials attempting to deter migration facilitated by smugglers have detained 57,000 travellers and over 100 human traffickers in 2015 through September. Deaths and incidents Several serious accidents and deaths have occurred in Europe as a result of migrant smuggling, both in the Mediterranean Sea, due to the capsizing of crowded and unseaworthy migrant smuggling vessels, and on European soil, due to", "-29.538897357851965" ], [ "Meetings, the organizations announced the creation of the Global Concessional Financing Facility for the Middle East and North Africa. This donor-funded facility is intended to allow countries hosting refugees from the Syrian Civil War, such as Lebanon and Jordan, access to concessional financing and increased coordination for developmental projects. The GCFF was coordinated by the World Bank Group to assist nations housing refugees, and is funded by 6 European states, the European Commission, Japan, Canada and the United States.", "-29.41313457571232" ], [ "Syrians in Austria Migration history During the European migrant crisis of 2014–2015 hundreds of thousands of Syrian refugees of the Syrian Civil War entered Austria to seek refugee status. The European migrant crisis was especially accelerated when on 4 September 2015, Chancellor Werner Faymann of Austria, in conjunction with Chancellor Angela Merkel of Germany, announced that migrants would be allowed to cross the border from Hungary into Austria and onward to Germany, and early on 5 September 2015, buses with migrants began crossing the Austro-Hungarian border.", "-29.396364772721427" ], [ "state or territory where refugees fled to does not run refugee camps (e.g. Syria or Egypt). Some refugees leave camps in search of better economic opportunities in urban centres and to avoid being dependent on aid rations. Some even move back and forth between urban centres and refugee camps to get the best of both.\nA disadvantage is that the UNHCR and other aid agencies cannot legally protect and support refugees dispersed in urban settings as much as in camps.", "-29.391031904611737" ], [ "a dignified and fair future for the refugees and minorities in the Middle East.\"\nAlexander Orakhelashvili said that ‘Just settlement’ can only refer to a settlement guaranteeing\nthe return of displaced Palestinians. He explained that it must be presumed that the Council did not adopt decisions that validated mass deportation or displacement, since expulsion or deportation are crimes against humanity or an exceptionally serious war crime.\nAccording to M. Avrum Ehrlich, 'Resolution 242 called for \"a just solution to the refugee problem,\" a term covering Jewish refugees from Arab countries as stated by President Carter in 1978 at Camp David'.\nAccording to John Quigley,", "-29.383948385890108" ], [ "seekers.\nAs part of a EU-wide resettlement system to distribute refugees in highly exposed countries such as Greece, Malta and Italy more evenly across the EU, Besson agreed to the resettlement of refugees from Malta to France, making France the first country to act on the scheme. Besson subsequently supported the creation of a common European asylum system and advocated for Malta to host the newly established European Asylum Support Office.\nIn September 2009, an area known as \"the Jungle\" near Calais, where many illegal immigrants had settled in order to cross the British channel to the UK, was cleared. According to", "-29.36892468192673" ], [ "anti-Assad stance.\nAs of 13 February 2013, more than 182,938 Syrian refugees are in Lebanon. As the number of Syrian refugees increases, the Lebanese Forces Party, the Kataeb Party, and the Free Patriotic Movement fear the country's sectarian based political system is being undermined. Other parties, such as the mostly Shia Lebanese Option Gathering and the mostly Sunni Najjadeh Party have also taken stances close to 14 March, including calling cancellation of agreements between the two countries. Other Bilal Saab, a senior fellow at the Middle East Institute, argued that Lebanon's handling of the Syrian crisis was a good sign for", "-29.363013228052296" ], [ "to finance SDG implementation and a more comprehensive financial response to ongoing humanitarian responses. [sic] Furthermore, in mid-to-late November I will hold a meeting on the global refugee crisis,\nhumanitarian crisis, especially in Syria and its neighbours, highlighted repeatedly. As such, many called for a new effort by global and regional powers for a peaceful solution in others parts of the Middle East, including the Middle East peace process, highlighted as a source of concern.\n[Other issues include,] addressing peace in Africa, parts of Europe and beyond and stem the spread of extremism. Boko Haram, ISIL and other extremists...highlights as [an]", "-29.351927802315913" ], [ "According to the Associated Press over 14,000 refugees were expelled from Algeria between August 2017 and June 2018, with refugees forced to walk on foot through the Sahara to small towns in Niger. The AP reported that as many as 30,000 refugees had died in the desert in Algeria, Niger and nearby countries since 2014. Angola Decolonisation during the 1960s and 1970s often resulted in the mass exodus of European-descended settlers out of Africa – especially from North Africa (1.6 million European pieds noirs), Congo, Mozambique and Angola. By the mid-1970s, the Portugal's African territories were lost, and nearly one", "-29.341519747540588" ], [ "The government cooperated with the Office of the UN High Commissioner for Refugees (UNHCR) and other humanitarian organizations in assisting refugees and asylum seekers.\nThe UNHCR estimated that approximately 600 persons fled to the country from the September conflict in Pando, Bolivia, and 70 requested asylum. According to the National Committee for Refugees, at the end of the year there were 3,918 recognized refugees in the country. During the year authorities granted refugee status to 226 individuals. Those who maintain their status, which is reviewed every two years, may receive identity and travel documents and work and study in the country.\nFrom", "-29.305958913755603" ], [ "with the 2015 Syrian refugee crisis Sweden adopted new border controls and cut benefits that refugees had previously had. Sweden introduced an amendment to their asylum seeker policies which prevented entitlement to \"accommodation, subsistence allowance and special aid\" for adult asylum seekers with no children and who have had their applications rejected. These emergency measures breached asylum-seekers fundamental rights such as the right to family reunification.", "-29.293724811286665" ], [ "into a war zone among the militants in the region, causing a wave of refugees to flee from the countryside to into the city. The Uruguayan force, unable to engage the militias, are stationed at the UN headquarters and airport in Kinshasa. Due to the violence, refugees flood in into both UN compounds to seek refuge from the fighting. A humanitarian disaster is looming over the region, but France sends a battalion sized force to the region bringing back order and some stability to the region. The French force will not be there long however, as the UN decides on", "-29.272026676335372" ], [ "blamed foreign intervention in the region for the rise of groups such as the Islamic State of Iraq and the Levant (ISIL, also known as ISIS) and for the radicalization of young people. Syria Several Arab League member states have confirmed that there is no solution for the Syria situation without the removal of Assad.\nAdel al-Jubeir, the Saudi foreign minister, addressed the conflict in Syria, saying there could be no solution while President Bashar al-Assad was still in power. Palestine Arab leaders also voiced support for a new French initiative aimed at relaunching Israeli-Palestinian talks and holding an international conference", "-29.268326391204027" ], [ "ongoing civil war. More than half of Syria’s pre-war population of 23 million has been displaced; as of March 2017, five million have fled to neighbouring countries and, as of December 2016, roughly 6.3 million are internally displaced. Syrians, both those that remain in the country and refugees in neighbouring countries, continue to be highly vulnerable to trafficking.\nIn March 2016, the media reported that women from Nepal and Bangladesh were forced to work in the sex industry in Syria. In June 2014, ISIS announced the establishment of an Islamic “Caliphate” in Iraq and Syria. ISIS routinely forces Syrian girls to", "-29.257321835146286" ], [ "Syrian Crisis of 1957 The Syrian Crisis of 1957 was a period of severe diplomatic confrontations during the Cold War that involved Syria and the Soviet Union on one hand, and the United States and its allies, including Turkey and the Baghdad Pact, on the other.\nThe tensions began in August 18, when the Syrian government presided by Shukri al-Quwatli made a series of provocative institutional changes, such as the appointment of Col. Afif al-Bizri as chief-of-staff of the Syrian Army, who was alleged by Western governments of being a Soviet sympathizer. Suspicion that a communist takeover had occurred in Damascus", "-29.25579006667249" ], [ "evidence from Palestinian refugee camps and compounds inside of Syria that provides information of the daily life, health and humanitarian conditions of Palestinian refugees in Syria. It also documents the daily abuses and events that arise out of the conflict that is ongoing in Syria and that has affected the Palestinian refugees in particular. Finally, it details the situation of displaced PRS, that are displaced for the second time outside of Syria. Having fled/migrated to neighbouring countries as either a destination or transit point until they reach Europe.\nQuarterly Update on Palestinian Prisoners (15 January 2012 – 30 August 2012) This", "-29.252710738568567" ], [ "The UN Relief and Works Agency for Palestine Refugees in the Near East (UNRWA) operated over 245 institutions and schools across the Gaza Strip. The agency has been providing shelter to people displaced by the Gaza–Israel conflict since 12 July, eventually operating 89 shelters. Overall, there were seven incidents in which death or injuries occurred at, or damage was done to, UNRWA Shelters. Of these three (Beit Hanoun, Jabaliya and Rafah) resulted in numerous civilian casualties. The other schools which were shelled include ones in Maghazi (hit twice), Deir El Balah and Zaitoun.\nAs of 24 July, UNRWA closed 23 facilities", "-29.239017792453524" ], [ "Open immigration policies and efforts do not address these problems. However, just keeping borders closed does not address them either.\nJeanne Park of the Council on Foreign Relations recommends European leaders to address the root causes of migration such as helping to broker an end to Syria's civil war, restoring stability to Libya, and increasing aid to sub-Saharan Africa. According to her barring a political solution to these regional crises, Europe will continue to struggle with migrant inflows. Concerning the migratory and refugee movements in and from the Horn of Africa Günther Schröder notes that greater efforts are needed to deal", "-29.237549661193043" ], [ "of missing people with any certainty.\" Reactions The United Nations High Commissioner for Refugees reacted to the news by saying that they were \"deeply saddened\" by the deaths, and appealed to European governments to seek \"legal migration alternatives\" for people fleeing war zones.\nA pair of Samos residents who watched the boats capsize wrote an article for Greek Reporter in which they stated, \"That such highly vulnerable people seeking refuge and safety are compelled to travel in small boats at high cost is entirely due to the inhumanity of the EU policies and practices with respect to migration in general and", "-29.191554461605847" ], [ "Syria argues that \"Palestinian refugees in Syria and those who have been doubly displaced to neighboring countries will suffer as a result of the decision. The impact is going to be really massive and tragic, for Palestinians of Syria, its life-saving aid, especially in the context that many Palestinians lack access to many basic services, even [ those who fled] in Lebanon or Jordan. It falls within the long-standing tradition of eroding the existence of Palestinians... and it is tragic\". Demographics According to GAPAR data, 85,000 Palestinian refugees settled in Syria by the end of 1948. In 1960 the number", "-29.180339577782433" ], [ "preliminary investigation into possible war crimes in the Central African Republic\". Syria Over the last seven years, Syria has been in constant conflict, which has led to the death of 500,000 people, 5 million refugees, and 7 million internally displaced persons. To help stop these atrocities the International Syria Support Group (ISSG), the UN, European Union, the League of Arab States, and other countries had agreed to meet to discuss the situation at stake. The conclusion was made that the full implementation of UN Security Council Resolution 2254, which increased the delivery of humanitarian aid, as well as a nationwide", "-29.164437247964088" ] ]
1p70jv
How do I know the color "red" I see is the same hue "red" everyone else (barring CB individuals) sees?
[ "It won't matter , even if they see different variations you both agree it's red. so hues to say which variant is better.", " URL_0 Vsauce's video covering this, it's really informative.", "So here's an interesting book that kind of touches on the subject. ***Basic Color Terms: Their Universality and Evolution*** ( URL_0 ) The book has studied language to find the origin of the words that human civilizations use for colors, and they made a remarkable discovery. As it turns out, humans almost always invent words for colors in the same exact order, which is: 1. Stage I: Dark-cool and light-warm (this covers a larger set of colors than English \"black\" and \"white\".) 2. Stage II: Red 3. Stage III: Either green or yellow 4. Stage IV: Both green and yellow 5. Stage V: Blue 6. Stage VI: Brown 7. Stage VII: Purple, pink, orange, or grey The way this ties into our perception of color is that it's thought that humans must perceive colors in the same way as all others, otherwise there wouldn't be such a strong tendency to name colors in the same chronological order. Blew my mind when I read it. Fascinating read.", "You don't know. You can't know. No one can know. It's reasonable to suppose that the color you see is about the same as the color that others see, but there is no way to test that hypothesis. It's not just color. When you smell a rose, do you have the same sensation as others who smell the same rose? When you feel a texture, is it the same as others feel? When you pick up something heavy, do you feel the same sensation of weight as others? The list goes on and on. Ultimately, these are questions about consciousness itself. You are conscious of experiencing the color red. By comparison, a very smart computer or robot could, in theory, be programmed to detect the color red, and talk about it in the same way that conscious people talk about it. Would the robot be conscious? How would you know? You can take that even farther. Let's say hyper intelligent aliens built two very sophisticated robots. One is programmed to perceive, act and communicate much as humans do. It is not conscious, but it is programmed to behave and communicate as if it is conscious. The other robot does the same, but it is in fact conscious. How would you tell the two apart? The short answer is, you couldn't. Philosophers have been puzzling over this question for a long time. They aren't getting anywhere. This is called \"The hard question of consciousness.\" There's a wikipedia article about it.", "It probably isn't *exactly* the same. Personally my eyes see different \"hues\" (I'm not sure if that's the right term) than each other. I think this might be somewhat common. Try looking at a bright red object using only one eye at a time and see if the colors are exactly the same or not. Personally my right eye sees more red in an object and my left eye sees more blue.", "Is the pattern of neural activity in your retina for \"red\" the same for everyone...No. Does this matter...No. Using techniques like adaptive optics (originally developed for astronomy), we know that the ratio of specific cones and the pattern in your retina varies dramatically between individuals. That said, the wavelength we see as red is universal (650nm) and we essentially calibrate our own vision based on shared experience. Some people may have better or worse color discrimination, but we attach a label to a certain range of visible light. A very small number of people, mostly women may possess a 4th type of photoreceptor that lets them see a bit into the ultraviolet spectrum.", "If you're interesting in thinking about this beyond the EL15 level, look into the \"inverted spectrum\" or \"[inverted qualia]( URL_0 )\" debate in philosophy. A lot of people who study and think about color vision for a living think that there's a gap between knowledge of what your visual system is doing and and knowledge of the conscious qualities, the \"what it's like,\" of the experience you're having.", "Because the photoreceptor system for your retinas is the same as the photoreceptor system in mine. I can say this confidently because even slight changes in this system that could theoretically alter how we perceive color would likely result in failure to observe color completely.", "It's impossible to know. There is a section of metaphysics that refers to \"frames of reference\" that essentially explains that while what every person sees is likely slightly (or very) different, it's still correct. Its not *wrong*, its just different.", "I would assume this is true, not just for sight but for all senses. To me, it explains why some people like some flavors and others like other flavors. why everyone has different favorite colors, smells, sounds/songs, etc.", "There are a couple RadioLab episodes relating to this and address both the optical and perceptual complexities of color URL_0 The episode titled \"Why Isn't The Sky Blue?\" is one of my faves!", "Bertrand Russell has arguments against the existence of \"qualia\", which is the term for perceptions which are essentially subjective. I suggest lots of research into psych/cog sci/philosophy of mind.", "No joke I asked this question to my step sister while sitting at the bus stop when I was in 2nd grade.", "You can't and probably don't. This applies to many things and is a concept in philosophy called [Qualia]( URL_0 )" ]
[ [ "or at most two. Those who can see red predominantly are in the second-lowest social order (only ranking above 'Greys', who cannot perceive colour), and 'Ultra Violets' hold the highest rank. The perception of colour also affects their health and wellness: certain colours have medical effects on people. Doctors in this world are called \"swatchmen\", since they show swatches of colour to their patients. Shades of green, especially Lincoln green, act as a narcotic, and are often abused as recreational drugs. Surnames and names of towns are usually derived from various shades of colour, such as jade, carmine and saffron.\nProtagonist", "-34.59363711900369" ], [ "color that attracts attention Red is the color that most attracts attention. Surveys show it is the color most frequently associated with visibility, proximity, and extroverts. It is also the color most associated with dynamism and activity.\nRed is used in modern fashion much as it was used in Medieval painting; to attract the eyes of the viewer to the person who is supposed to be the center of attention. People wearing red seem to be closer than those dressed in other colors, even if they are actually the same distance away. Monarchs, wives of presidential candidates and other celebrities often", "-33.2473116137553" ], [ "from artwork depicting mythological figures on pottery to The Sistine Chapel to the human body itself.\nColour is highly subjective, but has observable psychological effects, although these can differ from one culture to the next. Black is associated with mourning in the West, but elsewhere white may be. Some painters, theoreticians, writers and scientists, including Goethe, Kandinsky, Isaac Newton, have written their own colour theories. Moreover, the use of language is only a generalization for a colour equivalent. The word \"red\", for example, can cover a wide range of variations on the pure red of the spectrum. There is not a", "-33.12916267503533" ], [ "color is actually the activity of the eye's retina. It is a sensation. The external body is perceived as the cause of the sensation of color. We say, \"The body is red.\" In reality, though, color exists only in the retina of the eye. It is separate from the external object. Color is a mere sensation in the sense organ. The external object is perceived by the intellect's understanding as being the cause of sensations. § 2 Newton, Goethe, and all other color theorists began by investigating light and colored bodies in order to find the cause of color. They", "-33.06422900594771" ], [ "individual develops color preferences. In different countries, color preference vary. In China, red indicates luck, while in Nigeria and Germany it means the exact opposite.", "-33.00840431690449" ], [ "Color symbolism Red Red is a primary color. It is often associated with love, passion, and lust. It is frequently used in relation to Valentine's Day. It can also be used to signify danger or warning but it is also associated with importance. For instance, it is used for stop signs and fire engines. In China, red is often used to symbolize good luck or happiness, and is used for many holidays or weddings. Blue Blue is a primary color. It is the color of the ocean and the sky; it often symbolizes serenity, stability, inspiration, or wisdom. It", "-32.906744341598824" ], [ "a variety of colors: white, red, brown, black, gray or a mix of the colors.", "-32.262056661900715" ], [ "strong metaphorical resonances. For example, a linguistic study of Berlin and Kay study showed that the color red was almost always named at stage II due to the crucial importance of blood.\nModifiers expand and nuance the connotations of a color, as best seen in fashion and paint terminology, which seeks to imbue colors with emotional associations. Thus the same \"poppy yellow\" paint can become the hot-blooded \"amber rage\", the peaceful \"late afternoon sunshine\", or the wealth-evoking \"sierra gold\". The divisions of General Motors often give different names to the same colors featured on different car models. The attachment of", "-31.89654544868972" ], [ "of \"red\" as an identifier by Native Americans for themselves emerged in the context of Indian-European diplomacy in the southeastern region of North America, before later being adopted by Europeans and becoming a generic label for all Native Americans. Linguistic evidence indicates that, while some tribes may have used red to refer to themselves during the Pre-Columbian era based upon their origin stories, the general use of the term was in response to meeting people who called themselves \"white\" and their slaves \"black\". The choice of red rather than other colors may have been due to cultural associations,", "-31.788321536034346" ], [ "colors. Researchers prove that humans who have high optimum stimulation level are more likely to choose red colors rather than blue.\nStudies, which refer to the link between colors and particular individual responses, includes notions of size affected by colors, personal evaluations, and beliefs influenced by colors of goods packaging and sale surroundings. It also contains physiological responses which are suggested by a numerous of studies that warm colors and high saturated colors create stronger physical stimulation, emotional responses produced by different colors, and behavioral reactions which connect with the choices of products. Hypotheses According to literature, colors' components affect personal", "-31.638804233269184" ], [ "subject matter of Coloured identity and heritage. Terminology The term \"coloured\" is currently treated as a neutral description in Southern Africa, classifying people of mixed race ancestry. \nOnce used in the Western countries as well, especially so in North America, the term has shifted in meaning and is now regarded as derogatory in the Western World; a newly-coined term \"person of color\" has since become common and preferred by the members of the community and the general populace. This term tends to mean any non-white person, as opposed to a mixed-race person, where the term \"multiracial\" is used. \"Coloured\"", "-31.631824209645856" ], [ "was binary, \nwhite vs. non-white, hence the term \"person of color\".\nAt college campus protests during the 1960s, a \"Flag of the Races\" was in use, with five stripes comprising red, black, brown, yellow, and white tones.\nIn the 2000 United States Census, two of the five self-designated races are labeled by a color. In the 2000 US Census, \"White\" refers to \"person having origins in any of the original peoples of Europe, the Middle East, or North Africa.\" In the 2000 US Census, \"Black or African American\" refers to a \"person having origins in any of the Black racial groups of", "-31.51375800766982" ], [ "blond, black, red, or white; all natural hair colors including grey, white and lightest blond, are shades of brown. Color shade scale The Fischer–Saller scale, named after Eugen Fischer and Karl Saller, is used in physical anthropology and medicine to determine the shades of hair color. The scale uses the following designations: A (very light blond), B to E (light blond), F to L (blond), M to O (dark blond), P to T (light brown to brown), U to Y (dark brown/black) and Roman numerals I to IV (red) and V to VI (red blond). Brown hair Brown hair is", "-31.458000737824477" ], [ "the \"inverted spectrum\" thought experiment. For example, someone with an inverted spectrum might experience green while seeing 'red' (700 nm) light, and experience red while seeing 'green' (530 nm) light. Synesthesia (or ideasthesia) provides some atypical but illuminating examples of subjective color experience triggered by input that is not even light, such as sounds or shapes. The possibility of a clean dissociation between color experience from properties of the world reveals that color is a subjective psychological phenomenon.\nThe Himba people have been found to categorize colors differently from most Euro-Americans and are able to easily distinguish close shades of", "-31.450561802470475" ], [ "and white, respectively. For this reason, red is generally used as the highest level of warning, such as threat level of terrorist attack in the United States. In fact, teachers at a primary school in the UK have been told not to mark children's work in red ink because it encourages a \"negative approach\".\nRed is the international color of stop signs and stop lights on highways and intersections. It was standardized as the international color at the Vienna Convention on Road Signs and Signals of 1968. It was chosen partly because red is the brightest color in daytime (next to", "-31.443337275006343" ], [ "Red is also associated with either the feminine or the masculine (yin and yang respectively), depending on the source. The Little Red Book, a collection of quotations from Chairman Mao Tse-Tung, founding father of the People's Republic of China (PRC), was published in 1966 and widely distributed thereafter.\nIn Japan, red is a traditional color for a heroic figure. In the Indian subcontinent, red is the traditional color of bridal dresses, and is frequently represented in the media as a symbolic color for married women. The color is associated with purity, as well as with sexuality in marital relationships through its", "-31.142300624283962" ], [ "indicate that the use of \"red\" as an identifier by Native Americans for themselves emerged in the context of Indian-European diplomacy in the southeastern region of North America, before later being adopted by Europeans and becoming a generic label for all Native Americans.\nLinguistic evidence indicates that, while some tribes may have used red to refer to themselves during the Pre-Columbian era based upon their origin stories, the general use of the term was in response to meeting people who called themselves \"white\" and their slaves \"black\". \nThe choice of red rather than other colors may have been due to", "-31.07847508127452" ], [ "colors. However, connotative color associations and color symbolism tends to be culture-bound and may also vary across different contexts and circumstances. For example, red has many different connotative and symbolic meanings from exciting, arousing, sensual, romantic and feminine; to a symbol of good luck; and also acts as a signal of danger. Such color associations tend to be learned and do not necessarily hold irrespective of individual and cultural differences or contextual, temporal or perceptual factors. It is important to note that while color symbolism and color associations exist, their existence does not provide evidential support for color psychology or", "-31.066392563749105" ], [ "that individuals with temporally eccentric pupils see red in front of blue, while with nasally eccentric pupils the relief is reversed.\" Einthoven first explained chromatic aberration in the eye, which means that the eyes will not focus all the colors at the same time. Depending on the wavelength, the focal point in the eyes varies. He concluded that the reason why people see red in front of blue is because light with different wavelengths project onto different parts of the retina. When the vision is binocular, a disparity is created, which causes depth perception. Since red is focused temporally, it", "-30.947392277186736" ], [ "color articles and color symbolism). The field of color psychology attempts to identify the effects of color on human emotion and activity. Chromotherapy is a form of alternative medicine attributed to various Eastern traditions. Colors have different associations in different countries and cultures.\nDifferent colors have been demonstrated to have effects on cognition. For example, researchers at the University of Linz in Austria demonstrated that the color red significantly decreases cognitive functioning in men. Spectral colors and color reproduction Most light sources are mixtures of various wavelengths of light. Many such sources can still effectively produce a spectral color, as the", "-30.90167607163312" ], [ "revealed that there were cross-cultural similarities regarding which emotional states people associated with particular colors: for example, the color red was perceived as strong and active. Light, color, and surroundings Light and color can influence how people perceive the area around them. Different light sources affect how the colors of walls and other objects are seen. Specific hues of colors seen under natural sunlight may vary when seen under the light from an incandescent (tungsten) light-bulb: lighter colors may appear to be more orange or \"brownish\" and darker colors may appear even darker. Light and the color of an object", "-30.819526691135252" ], [ "people. Colors The official colors are yellow, white and black.", "-30.803344572195783" ], [ "and blue because the red stood for the element of fire whereas the blue would represent the element of water. Coincidentally, red and blue are also the colors recognized world-wide to signify emergency services; therefore, red and blue being the best choice of color to recognize an international holiday. The ribbon is traditionally worn on the lapel-otherwise known as the fold of fabric on a shirt- but is not limited to that certain spot. Some people may also put it on their cars visors, hats, hang them in windows or off of car mirrors, or even hang them from trees", "-30.79798451703391" ], [ "green, barely discernible for most people. The Himba have created a very different color scheme which divides the spectrum to dark shades (zuzu in Himba), very light (vapa), vivid blue and green (buru) and dry colors as an adaptation to their specific way of life.\nPerception of color depends heavily on the context in which the perceived object is presented. For example, a white page under blue, pink, or purple light will reflect mostly blue, pink, or purple light to the eye, respectively; the brain, however, compensates for the effect of lighting (based on the color shift of surrounding objects)", "-30.681830817669834" ], [ "or different shades of colors, makes it easier both for children and for adults to recognize them. Research has found that all languages have names for black and white and that the colors defined by each language follow a certain pattern (i.e. a language with three colors also defines red, one with four defines green OR yellow, one with six defines blue, then brown, then other colors). Popular culture The Sapir–Whorf hypothesis is the premise of the 2016 science fiction film Arrival. The protagonist explains that \"the Sapir–Whorf hypothesis is the theory that the language you speak determines how you", "-30.621338716242462" ], [ "Brown (racial classification) Brown or light-brown is a racial and ethnic term. Like black people and white people, it is a metaphor for race based solely on human skin color. In racialist ideas, the color brown and the term brown people were used to describe a series of hypothesized racial groups that included South Asians, Southeast Asians, people from the Horn of Africa, the Middle East and North Africa, and Latin Americans. Bronze skin tones are commonly also placed under the brown racial classification, in Mexico (and Southwestern United States) and the Philippines the term is associated with mestizo", "-30.53318605141976" ], [ "the fear of white. A fear of the color red may be associated with a fear of blood. Overview In his book Chromophobia published in 2000, David Batchelor says that in Western culture, color has often been treated as corrupting, foreign or superficial. Michael Taussig states that the cultural aversion to color can be traced back a thousand years, with Batchelor stating that it can be traced back to Aristotle's privileging of line over color.\nIn a study, hatchling Loggerhead sea turtles were found to have an aversion to lights in the yellow wave spectrum which is thought to", "-30.497806643266813" ], [ "varna (type, order, colour or class) and jati (clan, tribe, community or sub-community), which divides people into four colours: White, Red, Yellow and Black. White people are Brahmans, who are destined to be priests, teachers and preachers; Red people are Kshatriyas, who are destined to be kings, governors, warriors and soldiers; Yellow people are Vyasas, who are born to be cattle herders, ploughmen, artisans and merchants; and Black people are Shudras, who are born to be labourers and servants to the people of twice-born caste. People from all caste denominations exist among Hindus in Sylhet.\nAlthough Islam does not recognise any", "-30.46785576979164" ], [ "red instead of blue, because red is a physiological stimulation, and the opposite people seek for a low stimulation. The OSL is a moderating variable in this case. Thus, the suitable hypotheses assume that persons have OSL level will experience more happiness from an advertisement whose primary color brings a physiological stimulus, meaning that it should have a red hue and also is bright and saturated.\nHypothesis 1: People who have high OSL will experience more happiness in advertising whose primary color is 1.red hue, 2.saturated, and 3.bright.\nHypothesis 2: People who have high OSL tend to be drawn by advertising whose", "-30.46633302484406" ], [ "Colored Colored is an ethnic descriptor historically used in the United States (predominantly during the Jim Crow era), and the United Kingdom with its former colonies. In the United States, the term denoted non-\"white\" individuals generally. The term now has essentially the same meaning in the United Kingdom, with \"coloured\" thus equivalent to \"people of colour\". \nHistorically, for example, in the West Indies the term \"colored\" originally had more complex class and political meaning, specifically it was used to denote a person with some or all Black African ancestry, but also of the same class as white or having certain", "-30.442547579470556" ], [ "red were given higher scores despite the videos otherwise being identical. A study on experienced players of first-person shooters found that those assigned to wear red instead of blue won 55% of the matches.\nThere are several different explanations for this effect. Red is used in stop signs and traffic lights which may associate the color with halting. Red is also perceived as a strong and active color which may influence both the person wearing it and others. An evolutionary psychology explanation is that red may signal health as opposed to anemic paleness, or indicate anger due to flushing instead of", "-30.271210049973888" ], [ "the United States is \"Red on black, friend of Jack; red on yellow, kill a fellow.\" (Other variations include \"Red on yellow kills a fellow. Red on black venom lack.\" and \"Yellow, red, stop!\", referencing the order of traffic lights.) Both mnemonics apply only to coral snakes native to North America: Micrurus fulvius (eastern or common coral snake), Micrurus tener (Texas coral snake), and Micruroides euryxanthus (Arizona coral snake), found in the southern and western United States. Coral snakes found in other parts of the world can have distinctly different patterns, have red bands touching black bands, have only", "-30.249067174221636" ], [ "black as the color of the Dao.\nIn modern China, black is used in daily clothing. White is associated with death and mourning and was formerly worn at funerals, but depends on the age of passing. Red Red, corresponding with fire, symbolizes good fortune and joy. Red is found everywhere during Chinese New Year and other holiday celebrations and family gatherings.\nA red envelope is a monetary gift which is given in Chinese society during holiday or special occasions. The red color of the packet symbolizes good luck. Red is strictly forbidden at funerals as it is a", "-30.23054911987856" ], [ "appears to be in front. However, under monocular vision, this phenomenon is not observed.\nHowever, Bruecke objected to Einthoven's theory on grounds that not all people see red as closer than blue. Einthoven explained that this negative chromostereopsis is probably due to eccentrically positioned pupils because shifting the pupil can change the position of where light wavelengths focus in the eye. Negative chromostereopsis was further studied by Allen and Rubin who suggested that changing the angle between the pupillary center and visual axis can change the direction of chromostereopsis. If the pupillary center is located temporal to the visual axis, red", "-30.178099564742297" ], [ "of petitions made.\nWhite is the most common color and can symbolize gratitude, purity, or the cleansing of negative influences. Red is for love and passion. It can also signify emotional stability. The color gold signifies economic power, success, money, and prosperity. Green symbolizes justice, legal matters, or unity with loved ones. Amber or dark yellow indicates health. Images with this color can be seen in rehabilitation centers, especially those for drug addiction and alcoholism. Black represents total protection against black magic or sorcery, or conversely negative magic or for force directed against rivals and enemies. Blue candles and images of", "-30.116211452987045" ], [ "wear red to be visible from a distance in a crowd. It is also commonly worn by lifeguards and others whose job requires them to be easily found.\nBecause red attracts attention, it is frequently used in advertising, though studies show that people are less likely to read something printed in red because they know it is advertising, and because it is more difficult visually to read than black and white text. Seduction, sexuality and sin Red by a large margin is the color most commonly associated with seduction, sexuality, eroticism and immorality, possibly because of its close connection with passion", "-30.10629825189244" ], [ "the target's color preferences.\nWollard, (2000) seems to think that color can affect one's mood, but the effect also can depend on one's culture and what one's personal reflection may be. For example, someone from Japan may not associate red with anger, as people from the U.S. tend to do. Also, a person who likes the color brown may associate brown with happiness. However, Wollard does think that colors can make everyone feel the same, or close to the same, mood. Color and sports performance In particular, the color red has been found to influence sports performance. During the 2004 Summer", "-30.03969548456371" ], [ "seeing a color is neither necessary nor sufficient for knowing what it is like to see that color, meaning the ability hypothesis does not capture the nature of the new knowledge Mary acquires upon leaving the room. To show that ability is not necessary, Conee cites the example of someone who is able to see colors when she is looking at them, but who lacks the capacity to imagine colors when she is not. He argues that while staring at something that looks red to her, she would have knowledge of what it is like to see red, even though", "-29.998888784612063" ], [ "skin color). \"White\", apart from its racial meaning, is also a term denoting opponents of the Bolsheviks during the Russian Civil War (see White movement for this usage) and \"Red\", apart from its racial meaning, symbolizes communism (or communists), or refers to the Bolsheviks, while \"Green\" often refers to ecologists.\nSometimes, Belarus and Belarusians have been referred to (in Western languages, not Russian) as \"White Russia\" and \"White Russians\", which can be misleading; see those articles for discussion in more depth. Korea The word \"인종\" (injong) is used when describing a person's race, which also incorporates his or her skin color.\n\"백\"", "-29.992832538177026" ], [ "colored red instead of blue.", "-29.898708040709607" ], [ "him about it and he had no idea. He was just on point.\" Fairey also remarked \"I use red frequently because it is a visually powerful, emotionally potent color. Red gets people's attention. In this case there is the added possibility that the red liquid could be blood, giving it an even more sinister sense of foreboding.\" The red color of the artwork was changed for most of the special edition releases. The Best Buy reissue features a black-and-white version of the original artwork.", "-29.78995266946731" ], [ "\"yellow\" and start saying \"orange\", or stop defining as \"black\" and start saying \"white\", or \"rich\" and \"poor\", \"entrepreneur\" and \"worker\", \"civilized\" and \"primitive\", \"man\" and \"animal\", \"beast\" and \"sovereign\", \"christian\" and \"pagan\", or \"beautiful\" and start saying \"ugly\", or \"bad\" and start saying \"good\", or \"truth\" and start saying \"false\", \"determined\" and \"free\"? Or \"in\" and \"out\", \"here\" and \"there\", \"now\" and \"then\", \"past\" and \"present\" and \"future\" and \"eternal\"? Not only are the topological differences between the words relevant here, but the differentials between what is signified is also covered by différance. Deferral also comes into play, as", "-29.76667995279422" ], [ "Shades of black Variations of black (off-black colors) The colors are arranged in order of value (brightness) (v code in the hsv code), the lightest colors at the top and the darkest at the bottom.", "-29.762401879939716" ], [ "This extends even more radically in compounds such as red wine or red hair which are hardly red in the prototypical sense, but the red indicates merely a shift from the prototypical colour of wine or hair respectively. This corresponds to de Saussure's notion of concepts as purely differential: \"non pas positivement par leur contenu, mais negativement par leurs rapports avec les autres termes du systeme\" [p. 162; not positively, in terms of their content, but negatively by contrast with other terms in the same system (tr. Harris 83)].\nOther problems remain—e.g. in determining which of the constituent categories will contribute which", "-29.66839958588389" ], [ "are pragmatic planners, orange personality types are very action-oriented, and blue personality types are very people-oriented. The idea behind True Colors is that it does not pigeonhole people into one personality type over another with the understanding that one's personality might make adjustments based on his or her environment or associations. True Colors is a way to understand the behaviors and motivations of others relative to our own personalities to help mitigate potential conflict by learning to recognize personality differences and characteristics. Scientific basis Results from the correlations of a 2006 study of the True Colors system (Wichard, 2006), show", "-29.66167808242608" ], [ "period as Native Americans encountered people who called themselves \"white\" and their slaves \"black\". The use of \"red\" as an identifier by Native Americans for themselves emerged in the context of Indian-European diplomacy in the southeastern region of North America, before later being adopted by Europeans. The choice of red rather than other colors may have been due to cultural associations, rather than skin color; the red/white dichotomy having symbolic meaning for Native Americans in the southeast. Usage in the northeast region by Europeans may have been largely limited to descriptions of tribes such as the Beothuk of Newfoundland, whose", "-29.658278197370237" ], [ "red and white.", "-29.60681824112544" ], [ "(Kleine Beitel study 1994). The changes to green and red were made following the study from Oxford Brookes University, Psychology Dept on the human pictograms (Angus Gelatly and Meera Dulabh 2012).", "-29.600212335120887" ], [ "on the Japanese proverb \"juunin toiro,\" which means \"ten people, ten colors.\" The meaning being that everyone is different and has a different story. The saying comes from the Japanese word for \"ten\" (Juu / 十) combined with the word for \"person\" (nin / 人); \"iro\" (色) in \"toiro\" is the Japanese word for \"color.\" For \"Zasetsu Chiten\" and \"black & white ~Kuroi Sunglasses Kaketa Hi Kara~,\" misono worked with rock band Straightener's bass guitarist, Hinata Hidekazu, who wrote and produced the songs. Takanori Ohkita performed the drums for the song and Hinata arranged and produced both \"Zasetsu Chiten\"", "-29.571495494339615" ], [ "Helmholtz–Kohlrausch effect Lightness Even when they have the same luminance, colored lights seem brighter to human observers than white light does. The way humans perceive the brightness of the lights will be different for everyone. When the colors are more saturated, our eyes interpret it as the color's luminance and chroma. This makes us believe that the colors are actually brighter. An exception to this is when the human observer is red-green colorblind, they cannot distinguish the differences between the lightness of the colors. Certain colors do not have significant effect, however, any hue of colored lights still seem brighter", "-29.55903041770216" ], [ "as \"half\" or hāfu), though often, for those without contact with the term, mestiço de [East Asian nationality/ethnicity] may also be used. Sararás differ from mulatos at being fair-skinned (rather than brown-skinned), and having non-straight blond or red hair.\nOther people who are not brown (and thus not pardo), but also their phenotypes by anything other than skin, hair and eye color do not match white ones but rather those of people of color may be just referred to as mestiço, without specification to skin color with an identitarian connotation (there are the distinctions, though, of mestiço claro, for the fair-skinned", "-29.55740208227735" ], [ "21st century, \"colored\" is generally regarded as an offensive term, due to the fact that signs under Jim Crow depicted the term \"colored\". The term lives on in the name of the National Association for the Advancement of Colored People, generally called the NAACP. In 2008, its communications director Carla Sims said \"the term 'colored' is not derogatory, [the NAACP] chose the word 'colored' because it was the most positive description commonly used [in 1909, when the association was founded]. It's outdated and antiquated but not offensive.\"\nIn contemporary English today the term \"people of colour\" became widespread since 2010 and", "-29.522892259439686" ], [ "redness only becomes apparent when it has green beside it or the full quality of green is brought out only when it has purple beside it and so forth. Then against the color you play your forms, lines, and texture.\" The occasion for the lecture was a visit to Olivet College in Olivet, Michigan, where Ford had been appointed writer and critic in residence. In January 1937 Biala had exhibited paintings and drawings at the Georgette Passedoit Gallery in New York. In August the show was mounted at the Denver Art Museum in Colorado, and in November she brought it", "-29.442939306987682" ], [ "not recognized in their individuality\" (in other words, people recognize differences in pronunciations); rather, it is that sounds \"are classified according to their similarity\" (in other words, that people classify a variety of perceived sounds into one category). A comparable visual example would involve words for colors. The English word green can be used to refer to a variety of shades, hues, and tints. But there are some languages that have no word for green. In such cases, people might classify what we would call green as either yellow or blue. This is not an example of color-blindness—people can perceive", "-29.432648360496387" ], [ "in 2017 with combination of Orange, White and Black colours.", "-29.425832519948017" ], [ "orange), though it is less visible at twilight, when green is the most visible color. Red also stands out more clearly against a cool natural backdrop of blue sky, green trees or gray buildings. But it was mostly chosen as the color for stoplights and stop signs because of its universal association with danger and warning. The 1968 Vienna Convention on Road Signs and Signals of 1968 uses red color also for the margin of danger warning sign, give way signs and prohibitory signs, following the previous German-type signage (established by Verordnung über Warnungstafeln für den Kraftfahrzeugverkehr in 1927). The", "-29.40144733618945" ], [ "white person who is generally not accepted as a coloured person; or is generally accepted as a white person and is not in appearance obviously a white person.\" Many criteria, both physical (e.g. examination of head and body hair) and social (e.g. eating and drinking habits, familiarity with Afrikaans or a European language) were used when the board decided to classify someone as white or coloured. This was virtually extended to all those considered the children of two White persons, regardless of appearance. The Act was repealed on 17 June 1991. Post-apartheid era In Employment Equity Act of 1994, legislation", "-29.393286679231096" ], [ "ultimately produce basic, affective feelings of pleasure, displeasure, arousal, and calmness. Concepts are embodied knowledge (from your culture), including emotion concepts. Social reality provides the collective agreement and language that make the perception of emotion possible among people who share a culture.\nAs an analogy, consider the experience of color. People experience colors as discrete categories: blue, red, yellow, and so on, and these categories vary in different cultures. The physics of color, however, is actually continuous, with wavelengths measured in nanometers along a scale from ultraviolet to infrared. When a person experiences an object as \"blue\", she is (unconsciously) using", "-29.328515710614738" ], [ "preference for men dressed in red among heterosexual women.\nCommon associations connecting a color to a particular mood may differ cross-culturally. For instance, one study examined color associations and moods using participants from Germany, Mexico, Poland, Russia, and the United States. The researchers did find some consistencies, including the fact that all nations associated red and black with anger. However, only Poles associated purple with both anger and jealousy and only Germans associated jealousy with yellow. These differences highlight how culture influences peoples' perceptions of color and color's relationship to mood.\nDespite cross-cultural differences regarding the 'meanings' of different colors, one study", "-29.262862534669694" ], [ "African American, American Indian and Alaska Native, Native Hawaiian or Other Pacific Islander, Asian, plus \"Some other race\", with the respondent having the ability to mark more than one racial or ethnic category. The Census Bureau defines White people as follows:\n\"White\" refers to a person having origins in any of the original peoples of Europe, the Middle East or North Africa. It includes people who indicated their race(s) as \"White\" or reported entries such as German,\nItalian, Lebanese, Arab, Moroccan, or Caucasian.\nIn U.S. census documents, the designation White overlaps, as do all other official racial categories, with the term Hispanic", "-29.262464193976484" ], [ "Setians are humanoid anyway but they have different features, they can morph and shift and look exactly like humans. Another thing that happens after the days of clouding is like the story of the tower of Babel: the human beings that have similar skin colours can speak to each other. This creates confusion because now the white guys can talk to each other and the red guys can, but they can’t talk to guys with a different colour. Then they start to faction off. This is a way to keep people divided. It’s all part of the plan of the", "-29.255259937926894" ], [ "black and sometimes red. Examples are the German national football team fielded by the German Football Association (DFB) since 1908, German track and field athletes and rowers who use a red chest band, and German race cars, which were, according to the international auto racing colour scheme, painted white with red numbers (since 1934, Mercedes-Benz and Auto Union have used unpainted metal, or silver).\nBetween 1918 and 1933, and after 1945, black-red-gold again became the national colours. Organisations founded in that time frame, such as the German American Football Association (AFVD) or the German Organisation of Non-Olympic sports (IGNOV), often", "-29.2290554207284" ], [ "other and with other subjects. The color has no cultural significance", "-29.12184634146979" ], [ "Red, White and Blue (comics) Other versions In Mark Waid and Alex Ross's miniseries Kingdom Come, he made a more futuristic/savage version of Red, White, and Blue. They each dress in metallic body armor, colored after their namesake, and each had a signature weapon. Red uses a flame thrower, White uses a missile launcher, and Blue uses a laser gun. They were under the control of Lex Luthor and were his eyes and ears inside the Gulag, a large detention center that was built for amoral vigilantes like themselves.", "-29.10834202892147" ], [ "yellow/green, and red/blue.", "-29.10746295961144" ], [ "Political colour Political colours are colours used to represent a political ideology, movement or party, either officially or unofficially. Parties in different countries with similar ideologies sometimes use similar colours. For example, the colour red symbolises left-wing ideologies in many countries (see the red flag, Red Army and Red Scare) while the colour yellow is most commonly associated with liberalism and right-libertarianism. However, the political associations of a given colour vary from country to country: red is also the colour associated with the conservative Republican Party in the United States. Politicians making public appearances will often identify themselves by", "-29.051763043484243" ], [ "and colored red \"- Coroa da Brava\" on right.", "-29.04989141598344" ], [ "term 'white' can only refer to skin colour and therefore [you] are making reference to a skin colour [and] one assumes it must have been on the basis of race that the comment was made\".\nHowever, in the example Abetz gives, the phrase 'angry white man' or indeed 'angry black woman' would be exempt from Section 18C of the Racial Discrimination Act 1975 if it is a fair and accurate report. That is, if the phrase is used to describe a man who is white and angry or a woman who is black and angry, then it is not considered racial", "-29.02985683060251" ], [ "United States of America. Red symbolizes hard work and honor, white represents innocence and purity, and blue refers to justice and perseverance. Yellow signifies wisdom and intuition. Background The shoulder sleeve insignia was approved on 18 June 2012. (TIOH Dwg. No. A-1-1077). Gwangju Uprising The 1980s marked a surge in anti-Americanism in Korea, widely traced to the events of May 1980. \nGwangju convinced a new generation of young [Koreans] that the democratic movement had developed not with the support of Washington, as an older generation of more conservative Koreans thought, but in the face of daily American", "-29.024947977333795" ], [ "in the eye. § 13 Colors and the laws by which they appear reside within the eye. The external cause of color is a stimulus which excites the retina and separates its polarity. Goethe had organized color into three classes: physiological, physical, and chemical. He proposed that the external causes of color are physical colors and chemical colors. Physical colors Physical colors are temporary. They exist when light combines with cloudy transparent or translucent media, such as smoke, fog, or a glass prism. They are comprehensible because we know that they result from part of the qualitative division of retinal", "-28.924760188703658" ], [ "are red and white.", "-28.89987581211608" ], [ "(go). \nUsually, the color green means that one is single and looking for a relationship. Red means that one is in a relationship, or not looking for one. Yellow may mean \"unsure\" or \"maybe,\" or could mean that one is in a relationship but still open to advances. The purpose of a stop light party is to decrease the apprehension associated with approaching potential mates at parties. It also serves the purpose of providing an easy indicator of one's unavailability, to fend off unwelcome advances. The color codes derive from the traffic light signal colors indicating red for stop, yellow", "-28.84965325554367" ], [ "Color anomaly Colour anomaly, sometimes referred to as partial colour blindness, is an inherited condition in which people have full trichromatic colour vision, but do not make the same colour matches as the majority of the human population. It is much more common than dichromacy or other forms of colour blindness, affecting about 6% of human males in Northern European populations. Two forms are common, known as protanomaly and deuteranomaly. In order to match a given spectral yellow light, protanomalous observers need more red light in a red/green mixture than the majority of observers, and deuteranomalous observers need more green.", "-28.847346733964514" ], [ "free MP3 download of \"Deny It All\" from the Red EP on their website. On April 26, Alternative Press debuted a lyric video for \"This Body\" from the Black EP, created by Crescenzo. Concept The Color Spectrum's influence is the subjectivity of perception and to a lesser extent the freedom it affords its viewer. Crescenzo remarks:\nAnything we think of, we can do. Humanity's idea of colors is too broad. This needs to be more personal, because ideas of colors vary from person to person. Even for people who have synesthesia, the specific images or sounds they hear attached to colors", "-28.843609618765186" ], [ "on the age, type, and gender of the character. On a cosmetically-made white face, red and black lines are used to outline the eyes and mouth. Different shapes are used for male and female characters. \nFor certain characters, there is a special makeup style called kumadori. Kumadori consists of dramatic lines and shapes of different colours, each representing a different emotional quality. The most commonly used colours are dark red, representing anger, passion, or cruelty, and dark blue for sadness or depression. Other common colours are pink, representing youth or happiness; light blue or green, representing calmness; purple, for aristocracy,", "-28.79090940518654" ], [ "the same color\".", "-28.786998896976" ], [ "under \"Some other race\" (e.g. giving a national origin such as \"Mexican\" or a designation such as \"Mestizo\" as race), and much smaller numbers listed Black, Native American, or Asian race.\nIn U.S. censuses since 1990, self-identification has been the primary way to identify race. Presumption of race based on countries or regions given in the ancestry question is used only when a respondent has answered the ancestry question but not the race question. The U.S. Census currently defines \"White people\" very broadly as \"people having origins in any of the original peoples of Europe, the Middle East, or North Africa,", "-28.782758628512966" ], [ "the artists' blackness. A fluid depiction of whiteness causes there to be more defining and re-defining of what blackness is as black people are marked as a racial \"other\" by the changing parameters of whiteness. The Kinship Schema In Race and Mixed Race The Kinship Schema, Naomi Zack attempts to explain why a person is considered black or white:\n“If a person has a black parent, a black grandparent, or a black greatn -grandparent (where n represents any number of past generations), then that person is designated black. But if a person has a white parent, or three white grandparents, or", "-28.713387489500747" ], [ "of color and foreshadowing – are the ones that draw attention unbeknownst to the viewer. It is possible that Gentileschi intentionally did this to create a poetic composition. Color Theory Red is considered an \"active\" color. Red usually symbolizes passion, energy, and danger. Yellow symbolizes freshness, and optimism, but yellow also represents cowardice and caution. It is interesting that in the Berlin version, the daughter who is pointing is wearing a yellow garment, she is actively engaging towards the danger, leaning her body in closer to the destruction even though she is further away – almost lacking fear of what's", "-28.696511636604555" ], [ "Red dress effect The red dress effect is a putative phenomenon in which people wearing red clothing, such as a red dress, are perceived to be more sexually appealing than they are when wearing other colours. In primates, a visual indicator of female fertility occurs by way of swelling during the follicular phase and is correlated with increased estrogen levels. It has been asserted that this effect acts subconsciously because participants rarely report that they used color in their attractiveness judgments. However, only one study has tested whether conscious awareness matters, with its findings casting doubt on this earlier", "-28.674140853632707" ], [ "over the world, political parties associate themselves with colors, primarily for identification, especially for voter recognition during elections.\n• Blue generally denotes conservatism.\n• Yellow is often used for liberalism or libertarianism.\n• Red often signifies social democratic, socialist or communist parties.\n• Green is often associated with green politics, Islamism, agrarianism and Irish republicanism.\n• Orange is the traditional color of Christian democracy.\n• Black is generally associated with fascist parties, going back to Benito Mussolini's blackshirts, but also with Anarchism. Similarly, brown is sometimes associated with Nazism, going back to the Nazi Party's tan-uniformed storm troopers.\nColor associations are useful when it is not desirable", "-28.663422640180215" ], [ "Polynesian. Ethnic and racial identifier The appellation \"brown people\" has been applied in the 20th and 21st centuries to several groups. Edward Telles, a sociologist of race and ethnicity, and Jack Forbes both argue that this classification is biologically invalid. However, as Telles notes, it is still of sociological significance. Irrespective of the actual biological differences amongst humans, and of the actual complexities of human skin coloration, people nonetheless self-identify as \"brown\" and identify other groups of people as \"brown\", using characteristics that include skin color, hair strength, language, and culture, in order to classify them.\nForbes remarks upon a", "-28.60701729822904" ], [ "between face recognition and episodic memory is that since face recognition is a major part of human existence, the brain creates a link between the two in order to be better able to communicate with others. Ethnicity Differences in own- versus other-race face recognition and perceptual discrimination was first researched in 1914. Humans tend to perceive people of other races than their own to all look alike:\nOther things being equal, individuals of a given race are distinguishable from each other in proportion to our familiarity, to our contact with the race as whole. Thus, to the uninitiated American all Asiatics", "-28.60579680491719" ], [ "in white, is meant to represent a sense of epiphany and the positivity in realizing and accepting truths, whether they are beautiful or hideous.\"", "-28.569839388132095" ], [ "Redskin Redskin is a slang term for Native Americans in the United States and First Nations in Canada. The term \"redskin\" underwent pejoration through the 19th to early 20th centuries and in contemporary dictionaries of American English it is labeled \"usually offensive\", \"disparaging\", \"insulting\", or \"taboo\".\nThe origin of the choice of \"red\" to describe Native Americans in English is debated. While related terms were used in anthropological literature as early as the 17th century, labels based on skin-color entered everyday speech around the middle of the 18th century. \"At the start of the eighteenth century, Indians and Europeans rarely mentioned", "-28.531856571906246" ], [ "Episkenew speak, but has since identified an influence from the book cover of Métis author Maria Campbell's novel The Book of Jessica. The university agreed with Black's proposal, and helped her source the dresses.\nTo date more than 400 dresses have been donated by women across Canada. Families of missing or murdered women have contributed dresses, and attended some of the exhibitions. Symbolism Black chose the colour red after conversations with an indigenous friend, who told her red is the only colour the spirits can see. \"So (red) is really a calling back of the spirits of these women and allowing", "-28.528484811875387" ], [ "blue as a reference to \"Heavens-Father-God\" and to the ideals of \"liberty and cleanliness, the unbound space\"; whereas green is a stand-in for \"Mother Earth\". Balogh also notes that the two stripes can be deciphered \"without any particular cultural background knowledge\" as being the sky, implicitly a symbol of \"freedom and transcendence\", and the earth; she views the red as a reference to blood, with its dual meaning: \"blood is the symbol of life, on the one hand, and the blood spilled on wars and destruction.\"\nAs sociologist Oana Marcu argues, the reference to \"perpetual movement\" signified that the Romanies were", "-28.510769398359116" ], [ "ethnicity.\nIn British usage, the term refers to \"a person who is wholly or partly of non-white descent\" and its use may be regarded as antiquated or offensive, and other terms are preferable, particularly when referring to a single ethnicity.\nIn South Africa, the term coloureds is used to describe people of a mixed parentage. Thus South Africa has people broadly classified as four races, namely Blacks, Whites, Coloureds and Indians.\nIn other English-speaking countries, the term – often spelled coloured – has varied meanings. In South Africa, Namibia, Botswana, Zambia and Zimbabwe, the term coloured (often capitalized) refers both to a specific", "-28.498436672327443" ], [ "A linguistics expert for the team unsuccessfully argued that the name is merely a descriptive term no different than other uses of color to differentiate people by race. The TTAB also found that the term \"redskin\" refers to Native Americans (rather than having an \"independent meaning\" as the team sometimes claimed) as shown by the costumes worn by both the cheerleaders and marching band from the 1960s until the 1980s, and the native imagery used on the press guides for many years.\nIn a press release the trademark attorney for the team stated that they were confident that they would once", "-28.459385253314395" ], [ "Color blindness Signs and symptoms In almost all cases, color blind people retain blue–yellow discrimination, and most color-blind individuals are anomalous trichromats rather than complete dichromats. In practice, this means that they often retain a limited discrimination along the red–green axis of color space, although their ability to separate colors in this dimension is reduced. Color blindness very rarely refers to complete monochromatism.\nDichromats often confuse red and green items. For example, they may find it difficult to distinguish a Braeburn apple from a Granny Smith or red from green of traffic lights without other clues—for example, shape or position. Dichromats", "-28.453287873242516" ], [ "red couch, a gray wall will appear distinctly greenish. \nBlack and white have long been known to combine \"well\" with almost any other colors; black decreases the apparent saturation or brightness of colors paired with it, and white shows off all hues to equal effect. Tints and shades When mixing colored light (additive color models), the achromatic mixture of spectrally balanced red, green and blue (RGB) is always white, not gray or black. When we mix colorants, such as the pigments in paint mixtures, a color is produced which is always darker and lower in chroma, or saturation, than the", "-28.435596088369493" ], [ "that red ocher, called letsoku, or \"the blood of the earth\", symbolized fertility and the blood of both menstruation and sacrifice, underscoring the key link between the ancestors and fertility and accounting for the fact that red ocher is invariably incorporated into every painting scheme. White symbolized the calm, purity and enlightenment that the ancestors promote and desire, while black represented the dark rain clouds that the ancestors deliver if all is calm and well, and these two colors are frequently combined in dense, alternating patterns applied to transitional zones of the architecture, such as the roofline and around doors", "-28.41529236966744" ], [ "FO Bytča Colors and badge Its colors are blue and white or also red.", "-28.405414526874665" ], [ "The Other Colors Name The Other Colors took their name of the first song Les autres couleurs on the album 361. Marie Möör said at the end of the text : So I dug a tunnel. I found a way. Elsewhere. I have discovered... An other reality. Other colors. In French : Alors... J'ai creusé un tunnel. J'ai trouvé un passage. Ailleurs. J'ai découvert... Une autre réalité. D'autres couleurs. Band members Marie Möör is known on the French music scene for her distinctive style, expressed in songs such as Pretty Day, La Man and J'aime l'ennui. Having collaborated with renowned artists like", "-28.391979047330096" ], [ "seven colours. Red was the dominant colour; yellow and green are also mentioned. The paint was made from hematite.", "-28.386984632030362" ], [ "to lightness: such as red and pink or orange and brown. To English speakers, these pairs of colors, which are objectively no more different from one another than light green and dark green, are conceived of as belonging to different categories. A Russian will make the same red / pink and orange / brown distinctions, but will also make a further distinction between sinii and goluboi, which English speakers would simply call dark and light blue. To Russian speakers, sinii and goluboi are as separate as red and pink, or orange and brown.\nSeveral researchers have studied the Ova-Himba perception of", "-28.382688086796406" ], [ "connection to heat and fertility. It is also the color of wealth, beauty, and the goddess Lakshmi.\nIn Central Africa, Ndembu warriors rub themselves with red paint during celebrations. Since their culture sees the color as a symbol of life and health, sick people are also painted with it. Like most Central African cultures, the Ndembu see red as ambivalent, better than black but not as good as white. In other parts of Africa, however, red is a color of mourning, representing death. Because red bears are associated with death in many parts of Africa, the Red Cross has changed its", "-28.35590060373943" ], [ "meaning The choice of colors reverses a long-standing convention of political colors whereby red symbols (such as the red flag or red star) are associated with left-wing politics and right-wing movements often choose blue as a contrasting color. Indeed, until the 1980s Democrats were often represented by red and Republicans by blue. According to The Washington Post, the terms were coined by journalist Tim Russert during his televised coverage of the 2000 presidential election. That was not the first election during which the news media used colored maps to depict voter preferences in the various states, but it was the", "-28.319526019506156" ], [ "Red Paint People The Red Paint People are a Pre-Columbian culture indigenous to the New England and Atlantic Canada regions of North America. They were named after their burials, which used large quantities of ochre, normally red, to cover both the bodies of the dead and grave goods. Sometimes they are known as the Moorehead Phase of the Laurentian Tradition or the Moorehead burial tradition after Warren K. Moorehead who brought them widely to the attention of scientists. They flourished between 3000 BCE and 1000 BCE. Alternatively, they can be called by the period in which they lived, either the", "-28.31452071055537" ], [ "Color terminology for race Modern physical anthropology In the 1730s, Carl Linnaeus in his introduction of systematic taxonomy recognized four main human subspecies, termed\nAmericanus (Americans), Europaeus (Europeans), Asiaticus (Asians) and Afer (Africans). The physical appearance of each type is briefly described, including colour adjectives referring to skin and hair colour: rufus \"red\" and pilis nigris \"black hair\" for Americans, albus \"white\" and pilis flavescentibus \"yellowish hair\" for Europeans, luridus \"yellowish, sallow\", pilis nigricantibus \"swarthy hair\" for Asians, \nand niger \"black\", pilis atris \"coal-black hair\" for Africans.\nThe views of Johann Friedrich Blumenbach on the categorization of the major", "-28.312525038199965" ] ]
4e3fpj
What is shock? what does it mean when your body goes into a state of shock?
[ "Shock is the name for any time when your tissues need more oxygen than your body can provide. Examples are if you have lost blood (hemorrhagic shock) or if your heart is pumping too weakly (cardiogenic). In septic shock, the blood vessels dilate and are leaky so supply drops, and the oxygen demand is higher due to the infection and inflammation.", "Shock is a condition in which the tissues of the body are not being provided with adequate amounts of oxygen. This is dangerous because your body needs a constant supply of oxygen to keep functioning. Things doctors look for to identify whether someone is in shock include low blood pressure, increased heart rate and respiratory rate, low urine output, and confusion. It typically means that a person is very sick. It can be caused by a number of things, however there are 4 basic \"classes\" of shock. It is very important to identify what type of shock a person is in because the treatment for each is very different. The classes are: 1. Distributive: This type of shock involves dilation of your blood vessels, such that adequate blood pressure cannot be maintained. As a result, your tissues and organs don't receive enough blood. The most common cause of this type of shock is sepsis, an inflammatory state in response to a disseminated infection. Other causes include Anaphylaxis -- a severe allergic response to something like peanuts. 2. Hypovolemic: Your body does not have enough blood to circulate to your tissues. This is often seen in trauma victims who have lost a lot of blood (\"hemorrhagic shock\") 3. Cardiogenic: The heart is failing to adequately pump blood throughout the body. This may be due to conditions like heart attacks or irregular rhythms of the heart (i.e. ventricular fibrillation). 4. Obstructive: There is a blockage in the circulatory system preventing the heart from pumping blood throughout the body. The most common cause is a pulmonary embolism, a blood clot in the vessels of the lungs. The heart cannot mount enough pressure to overcome the blockage created by the clot.", "In response to the traumatic event question: Emotional shock or an \"acute stress reaction,\" is a very variable psychological condition experienced after a traumatic event. It can cause dramatic psychological effects (dissociation, memory loss, hallucination, temporary paralyzation/blindness/other somatization), and it can cause various physical effects mostly related to the autonomic nervous system (tachycardia/bradycardia, hypertension/hypotension, syncope, sweatiness, GI distress, ect). The physical effects are never directly lethal or life threatening, but they can bring about indirect lethal events in a susceptible person (heart attack, stroke, seizure, ect.) Like everything in psychiatry, we do not know exactly what causes it or how it works. We know severe distress can cause states of emotional shock, PTSD, anxiety, and depression. We know psychiatric illness can cause inexplicable physical symptoms (pain, seizures, paralysis, numbness, hallucination, even blindness) without any evidence of physical malfunction. We know an incredible amount, and this is a lot more to learn.", "I was thinking of \"shock\" in the sense of when someone experiences a traumatic event I.e. a car wreck where the accident was so intense the victim is not hurt but in \"shock\".", "As a paramedic, it absolutely kills me when I hear laypeople throwing out the phrase \"he/she is in shock!\" when someone is actually stunned, panicked, or scared." ]
[ [ "extent of the shock. If the shock was pushed past a certain extreme after a particular period in time ASD can develop into what is commonly known as Post-traumatic stress disorder (PTSD). There are two ways that the body responds biologically in order to reduce the amount of stress an individual is experiencing. One thing that the body does to combat stressors is to create stress hormones, which in turn create energy reservoirs that are there in case a stressful event were to occur. The second way our biological components respond is through an individuals cells. Depending on the situation", "-32.560246275010286" ], [ "his textbook on training and behaviour, Steven Lindsay wrote about the public perception of the term \"shock\" and its application in the description of training aids; \"At low levels, the term shock is hardly fitting to describe the effects produced by electronic training collars, since there is virtually no effect beyond a pulsing tingling or tickling sensation on the surface of the skin ... the word shock is loaded with biased connotations, images of convulsive spasms and burns, and implications associated with extreme physical pain, emotional trauma, physiological collapse, and laboratory abuses ... the stimulus or signal generated by most", "-30.09375358305988" ], [ "Shock of birth Shock of birth is the transient depression of muscle tone and deep tendon reflexes that occurs in newborns after birth. In 70% of newborns, it lasts less than 24 hours, and in 84.3% less than 48 hours. Its presence is not affected by whether birth happened through vaginal delivery or cesarean delivery. The term was introduced in 1960.", "-29.377776239067316" ], [ "Trauma trigger A trauma trigger is a psychological stimulus that prompts recall of a previous traumatic experience. The stimulus itself need not be frightening or traumatic and may be only indirectly or superficially reminiscent of an earlier traumatic incident, such as a scent or a piece of clothing. Triggers can be subtle and difficult to anticipate. A trauma trigger may also be called a trauma stimulus, a trauma stressor or a trauma reminder. The process of connecting a traumatic experience to a trauma trigger is called traumatic coupling.\nAvoiding a trauma trigger is a classic behavioral symptom of posttraumatic", "-28.96246674921713" ], [ "Shock (circulatory) Signs and symptoms The presentation of shock is variable with some people having only minimal symptoms such as confusion and weakness. While the general signs for all types of shock are low blood pressure, decreased urine output, and confusion, these may not always be present. While a fast heart rate is common, those on β-blockers, those who are athletic, and in 30% of cases of those with shock due to intra abdominal bleeding may have a normal or slow heart rate. Specific subtypes of shock may have additional symptoms.\nDry mucous membrane, reduced skin turgor, prolonged capillary refill time,", "-28.76840487984009" ], [ "Shell shock Origin During the early stages of World War I in 1914, soldiers from the British Expeditionary Force began to report medical symptoms after combat, including tinnitus, amnesia, headaches, dizziness, tremors, and hypersensitivity to noise. While these symptoms resembled those that would be expected after a physical wound to the brain, many of those reporting sick showed no signs of head wounds. By December 1914 as many as 10% of British officers and 4% of enlisted men were suffering from \"nervous and mental shock\".\nThe term \"shell shock\" came into use to reflect an assumed link between the symptoms and", "-28.633800293362583" ], [ "shock trauma and developmental trauma. Shock trauma is loosely defined as a single-episode traumatic event such as a car accident, natural disaster such as an earthquake, battlefield incident, physical attack, etc. Developmental trauma refers to various kinds of psychological damage that occur during child development when a child has insufficient or detrimental attention from the primary caregivers. Evidence Two randomized controlled studies of Somatic Experiencing as a treatment for PTSD were published in 2017\n. They showed positive results indicating Somatic Experiencing may be an effective therapy method for PTSD and concluded that further research is needed to understand who shall", "-28.19968836739281" ], [ "Myoclonus Signs and symptoms Myoclonic seizure can be described as \"jumps\" or \"jolts\" experienced in a single extremity or even the entire body. The feeling experienced by the individual is described as uncontrollable jolts common to receiving a mild electric shock. The sudden jerks and twitching of the body can often be so severe that it can cause a small child to fall.\nA myoclonic seizure (myo \"muscle\", clonic \"jerk\") is a sudden involuntary contraction of muscle groups. The muscle jerks consist of symmetric, mostly generalized jerks, localized in the arms and in the shoulders and also simultaneously with a head", "-28.083228132891236" ], [ "shock wave usually lasts only a few milliseconds. Like other types of explosions, a blast wave can also cause damage to things and people by the blast wind, debris, and fires. The original explosion will send out fragments that travel very fast. Debris and sometimes even people can get swept up into a blast wave, causing more injuries such as penetrating wounds, impalement, broken bones, or even death. The blast wind is the area of low pressure that causes debris and fragments to actually rush back towards the original explosions. The blast wave can also cause fires or even secondary", "-27.67417183658108" ], [ "registration of traumatic shock becomes, at the same time, the technical structural law of music. It forbids continuity and development. Musical language is polarized according to its extreme; towards gestures of shock resembling bodily convulsions on the one hand, and on the other towards a crystalline standstill of a human being whom anxiety causes to freeze in her tracks [...] Modern music sees absolute oblivion as its goal. It is the surviving message of despair from the shipwrecked.\nThis view of modern art as producing truth only through the negation of traditional aesthetic form and traditional norms of beauty because they", "-27.657800882239826" ], [ "a form of positive punishment, where the correction is applied at the moment an undesired behavior occurs, in order to reduce the frequency of that behavior; or as a form of negative reinforcement, where a continuous stimulation is applied until the moment a desired behavior occurs, in order to increase the frequency of that behavior. Frame of reference Electrical shock is the physiological reaction, sensation, or injury caused by electric current passing through the body. It occurs upon contact of a body part with any source of electricity that causes a sufficient current through the skin, muscles, or hair.\nCommenting in", "-27.57230896758847" ], [ "induced by kinetic energy transfer of blast overpressure via great blood vessels in abdomen and thorax to the central nervous system.\" This hypothesis is supported by observations of neural effects in the brain from localized blast exposure focused on the lungs in experiments in animals.\n\"Hydrostatic shock\" expresses the idea that organs can be damaged by the pressure wave in addition to damage from direct contact with the penetrating projectile. If one interprets the \"shock\" in the term \"hydrostatic shock\" to refer to the physiological effects rather than the physical wave characteristics, the question of whether the pressure waves satisfy the", "-27.063682650317787" ], [ "motivation generated by a moral shock is, as the conceptual label makes plain, moral in nature; it operates at a level of normative force beyond just the purely cognitive or emotional. However, it is important to note that \"for a moral shock to lead to protest, it must have an explicit cognitive dimension as well as moral and emotional ones.\" Moral shocks are moral insofar as they create a sense of outrage or indignation, emotional insofar as anger or frustration accompanies this outrage, and cognitive insofar as the shock is delivered via words and symbols. For instance,", "-27.029592754493933" ], [ "and injuries caused by violence or general accidents. This type of traumatology focuses on the surgical procedures and future physical therapy a patients need to repair the damage and recover properly. Psychological traumatology is a type of damage to one's mind due to a distressing event. This type of trauma can also be the result of overwhelming amounts of stress in one's life. Psychological trauma usually involves some type of physical trauma that poses as a threat to one's sense of security and survival. Psychological trauma often leaves people feeling overwhelmed, anxious, and threatened. Types of trauma When it comes", "-26.997547540871892" ], [ "after being close to a detonation but without any evidence of a head wound. The illness was called shell shock, and a psychological explanation was eventually favoured. By 1934 the current concept of PCS had replaced ideas of hysteria as the cause of post-concussion symptoms. British authorities banned the term shell shock during World War II to avoid an epidemic of cases, and the term posttrauma concussion state was coined in 1939 to describe \"disturbance of consciousness with no immediate or obvious pathologic change in the brain\". The term postconcussion syndrome was in use by 1941.\nIn 1961, H. Miller first", "-26.997287114383653" ], [ "not the major problem in the early stages of exposure as other stresses are more immediately life-threatening.\nCold shock response is the initial reaction to immersion in cold water. It generally starts with a gasp reflex in response to sudden and rapid chilling of the skin, and if the head is immersed there is a risk of inhaling water and drowning. This is followed by a reflexive hyperventilation, with a risk of panic and fainting if not controlled. Cold induced vasoconstriction causes the heart to work harder and the additional work can overload a weak heart, with a possible consequence of", "-26.952444480208214" ], [ "get you thinking. For this reason, I think that playing Shock can actually be therapeutic: when you're feeling confused about some topic in the news, if you can't decide how you feel about some pressing social issue, if you see a new invention and wonder what it might mean, you can play a Shock game about it. Role-playing it out might help you and your friends work through your thoughts and explore possible consequences. In Shock, I think we might finally have an RPG that does what the best written SF does -- help us learn to cope with the", "-26.942400802508928" ], [ "II. In hundreds of experiments, the two disproved traditional theories which held that shock was caused by toxins in the blood. Blalock, a highly original scientific thinker and something of an iconoclast, had theorized that shock resulted from fluid loss outside the vascular bed and that the condition could be effectively treated by fluid replacement. Assisted by Thomas, he was able to provide incontrovertible proof of this theory, and in so doing, he gained wide recognition in the medical community by the mid-1930s. At this same time, Blalock and Thomas began experimental work in vascular and cardiac surgery, defying medical", "-26.834953292127466" ], [ "these compensatory mechanisms. Only parasympathetic tone remains. Consequently, neurogenic shock's unique presentation includes:\nNeurogenic shock is diagnosed based on a person's symptoms and blood pressure levels. Symptoms of neurogenic shock include sweaty, cool skin; labored breathing, low blood pressure; dizziness; and anxiety. Many people with neurogenic shock have suffered an injury to the nervous system, such as the spinal cord.", "-26.76489507155202" ], [ "Defense physiology Definitions stress : As it pertains to the term defense physiology, the term stress refers to a perceived threat to the continued functioning of the body / life according to its current state.\nthreat : What constitutes a threat as it pertains to defense physiology? A threat may be consciously recognized or not. A physical event (a loud noise or car collision), a chemical or a biological agent which alters (or has the possibility to alter) body function (physiology) away from optimum or healthy functioning (or away from its current state of functioning) may be perceived as a threat (also called", "-26.705103394633625" ], [ "Movements”, the moral shock argument says that some events may be so emotionally moving or morally reprehensible that individuals will feel that they must join the cause regardless of their connection or ties to members of that organization. Moral shock is similar in many ways to shock advertising which uses analogous techniques to help increase brand success and awareness. Moral shocks have been shown to help recruit people to the animal rights movement, the movement for peace in Central America, anti-abortion campaigns and anti-racist movements. \nDeborah Gould has suggested another role for moral shocks: radicalizing or reinforcing the", "-26.45821382183931" ], [ "swelling due to an injury, or pregnancy and can result in pain, weakness, numbness or paralysis, an example being carpal tunnel syndrome. Symptoms can be felt in areas far from the actual site of damage, a phenomenon called referred pain. Referred pain can happen when the damage causes altered signalling to other areas.\nNeurologists usually diagnose disorders of the nerves by a physical examination, including the testing of reflexes, walking and other directed movements, muscle weakness, proprioception, and the sense of touch. This initial exam can be followed with tests such as nerve conduction study, electromyography (EMG), and computed tomography (CT).", "-26.41316611818911" ], [ "has experienced a traumatic event which becomes lived and relived in the body and the mind. Trauma can trigger a chronic stress response in the body, which may manifest as an uncontrollable and constant state of heightened arousal and fear. Those with a history of trauma may also interpret this chronic stress response as a threat to their sense of self and relation to the world. Some research suggests that traumatized individuals often have difficulty soothing their overactive internal sensations without relying on external stimuli, such as food, substances, or self-harm. Therefore, psychological trauma is not only associated with psychological", "-26.403580649464857" ], [ "in conditioning, which is the process by which certain fears are formed, and extinction, which is the elimination of those fears. Pathophysiology The symptoms of a panic attack may cause the person to feel that their body is failing. The symptoms can be understood as follows. First, there is frequently the sudden onset of fear with little provoking stimulus. This leads to a release of adrenaline (epinephrine) which brings about the fight-or-flight response when the body prepares for strenuous physical activity. This leads to an increased heart rate (tachycardia), rapid breathing (hyperventilation) which may be perceived as shortness of breath", "-26.390019267972093" ], [ "trauma. On the cognitive level, they may blame themselves or others for the trauma. Often, the person appears disoriented, becomes hypersensitive or confused, has poor concentration, uncertain, and poor troubleshooting capabilities. Physical responses to trauma include increased heart rate, tremors, dizziness, weakness, chills, headaches, vomiting, shock, fainting, sweating, and fatigue. Among the common emotional responses of people who experience crisis in their lives include apathy, depression, irritability, anxiety, panic, helplessness, hopelessness, anger, fear, guilt, and denial. When assessing behavior, some typical responses to crisis are difficulty eating and/or sleeping, conflicts with others, withdrawal and lack of interest in social activities.", "-26.312795862926578" ], [ "Quake (natural phenomenon) Earthquake An earthquake is a phenomenon that results from the sudden release of stored energy in the Earth's crust that creates seismic waves. At the Earth's surface, earthquakes may manifest themselves by a shaking or displacement of the ground and sometimes cause tsunamis, which may lead to loss of life and destruction of property. An earthquake is caused by tectonic plates (sections of the Earth's crust) getting stuck and putting a strain on the ground. The strain becomes so great that rocks give way and fault lines occur. Marsquake A marsquake is a quake that occurs on", "-26.252876192331314" ], [ "Moral shock In sociology, moral shock is a cognitive and emotional process that encourages participation. James M. Jasper, who originally coined the term, used it to help explain why people might join a social movement in the absence of pre-existing social ties with members. It denotes a kind of visceral unease, triggered by personal or public events, that captures people’s attention. Moral shocks often force people to articulate their moral intuitions. It is an appealing concept because it brings together emotional, moral, and cognitive dynamics. According to David A. Snow and Sarah A. Soule, authors of “A Primer on Social", "-26.174187178130524" ], [ "of \"pain\" widely accepted by scientific investigators is \"an unpleasant sensory and emotional experience associated with actual or potential tissue damage, or described in terms of such damage\". Nociception Nociception has been defined as \"the detection of stimuli that are injurious or would be if sustained or repeated\". It initiates immediate withdrawal of limbs or appendages, or the entire body, and therefore has clear adaptive advantages. Nociception usually involves the transmission of a signal along a chain of nerve fibers from the site of a noxious stimulus at the periphery to the spinal cord and brain. In vertebrates,", "-26.072281167129404" ], [ "complex pathophysiological process affecting the brain, induced by traumatic biomechanical forces.\" It was agreed that concussion typically involves temporary impairment of neurological function that heals by itself within time, and that neuroimaging normally shows no gross structural changes to the brain as the result of the condition.\nHowever, although no structural brain damage occurs according to the classic definition, some researchers have included injuries in which structural damage has occurred and the National Institute for Health and Clinical Excellence definition includes physiological or physical disruption in the brain's synapses. Also, by definition, concussion has historically involved a loss of consciousness. However,", "-26.036921386461472" ], [ "Concussions in sport Dangers Concussion symptoms can last for an undetermined amount of time depending on the player and the severity of the concussion. A concussion will affect the way a person's brain works.\nThere is the potential of post-concussion syndrome, defined as a set of symptoms that may continue after a concussion is sustained. Post-concussion symptoms can be classified into physical, cognitive, emotional, and sleep symptoms. Physical symptoms include a headache, nausea, and vomiting. Athletes may experience cognitive symptoms that include speaking slowly, difficulty remembering and concentrating. Emotional and sleep symptoms include irritability, sadness, drowsiness, and trouble falling", "-26.034885753095296" ], [ "sudden physical injury, as from violence or accident,\" or, more simply put, is \"a physical wound or injury, such as a fracture or blow.\"\nAccidental injuries, most of which can be predicted and thus prevented, are the unintentional negative outcomes of unforeseen or unplanned events or circumstances which may have been avoided or prevented if reasonable measures had been taken or if the risks involving the circumstances leading up to the accident been recognized and acted upon (minimized).\nBattery is a criminal offense involving the use of force against another that results in harmful or offensive contact. (Assault is fear/belief of impending", "-26.03000662685372" ], [ "The majority of sufferers can identify triggers that may precipitate an attack. The most common are various foods, infections (e.g., colds), menstruation, extreme physical exertion, lack of sleep, and psychological stresses, both positive and negative.\nA sufferer may also be light-sensitive (photophobic), sound-sensitive (phonophobic) or, less frequently, temperature- or pressure-sensitive during an attack. Some sufferers also have a strong urge to bathe in warm or cold water. Some sufferers report that they experience a restless sensation or stinging pain along the spine, hands, and feet followed by weakness in both legs. Some of these symptoms may be due to dehydration", "-26.006043967354344" ], [ "becomes symptomatic when something else happens such as, following trauma, a change in functional status such as swelling following orthopaedic joint replacement.", "-25.96014667203417" ], [ "crankiness, loss of interest in favorite activities or items, tearfulness, and displays of emotion that are inappropriate to the situation. Common symptoms in concussed children include restlessness, lethargy, and irritability. Forces The brain is surrounded by cerebrospinal fluid, which protects it from light trauma. More severe impacts, or the forces associated with rapid acceleration, may not be absorbed by this cushion. Concussion may be caused by impact forces, in which the head strikes or is struck by something, or impulsive forces, in which the head moves without itself being subject to blunt trauma (for example, when the chest hits something", "-25.952523227388156" ], [ "Second impact (safety) The second impact (also known as second collision and human collision) is the impact suffered between a vehicle occupant and the vehicle he or she is riding in during some kind of safety incident. The first impact is the impact between the vehicle and another object. There is also a third impact between the internal organs and the frame of the body.\nThe term was coined in the 1950s by Sergeant Elmer Paul of the Indiana State Police. Paul convinced Indiana authorities to investigate the mechanics of highway injuries, and worked with safety pioneer Hugh DeHaven.\nThe effects of", "-25.875330127892084" ], [ "Exposure Cold shock response is the physiological response of organisms to sudden cold, especially cold water, and is a common cause of death from immersion in very cold water, such as by falling through thin ice. The immediate shock of the cold causes involuntary inhalation, which if underwater can result in drowning. The cold water can also cause heart attack due to vasoconstriction; the heart has to work harder to pump the same volume of blood throughout the body, and for people with heart disease, this additional workload can cause the heart to go into arrest. A person who survives", "-25.795954101893585" ], [ "by both physical and psychological sensations. Physical sensations such as: burning, painful tingling over the body, pain in the chest that slowly expands and spreads throughout the torso, dizziness, nausea, vomiting, sweating, blanching, coldness and numbness can be experienced by the individual suffering from mortification. The psychological sensations described are feeling shocked, exposed, and humiliated. Descriptions of this experience can be, for example: “It feels like I won’t survive” and “I have the absolute conviction that he or she hates me and it’s my fault”. These sensations are always followed by shock, although they may have happened on various occasions,", "-25.749137585400604" ], [ "take on physical or behavioral forms. These may be direct, individual symptoms of victimization, or they may result from the psychological outcomes described above. Physical The most direct and obvious physical symptoms of victimization are injuries as a result of an aggressive physical action such as assault or sexual victimization. Other physical symptoms that are not a result of injury may be indirectly caused by victimization through psychological or emotional responses. Physical symptoms with a psychological or emotional basis are called psychosomatic symptoms. Common psychosomatic symptoms associated with victimization include headaches, stomachaches and experiencing a higher frequency of illnesses such", "-25.730583463679068" ], [ "child.\"\nJanov describes \"Pain\" as the pain that does not hurt because, as soon as the person goes into it, it becomes simply feeling. Most of the suffering is in the blockage or repression, not the Pain itself. Origins of neurosis Primal theory contends that many or most people suffer from some degree of neurosis. This neurosis begins very early in life (especially in the \"critical period\"—birth plus the first three years) as a result of needs not being met. There may be one or more isolated traumatic events, but more often, it is a case of daily neglect or abuse.\nNeurosis", "-25.68698786763707" ], [ "components of the University of Maryland Medical Center include: R Adams Cowley Shock Trauma Center The R Adams Cowley Shock Trauma Center (also known as Shock Trauma) is the world's first center dedicated to saving lives of people with severe, life-threatening injuries sustained in motor vehicle collisions, violent crimes and other traumatic incidents.\nShock Trauma has more than 100 inpatient beds dedicated to emergency surgery, resuscitation, intensive care, and acute surgical care. The trauma staff treat more than 7,500 critically injured patients each year who arrive by helicopter or ambulance.\nIt is named after its founder, R Adams Cowley, M.D., who came", "-25.643903368792962" ], [ "Psychological injury \"Psychological injury\" refers to psychological or psychiatric conditions associated with an event that leads, or may lead, to a lawsuit in tort action or other legal-related claims, for example, in workers' compensation, United States Department of Veterans Affairs (VA) disability benefits claims, and Social Security Administration (SSA) disability cases. Claimable injuries might result from events such as a motor vehicular collision or other negligent action, and cause impairments, disorders, and disabilities perhaps as an exacerbation of a pre-existing condition (e.g., Drogin, Dattilio, Sadoff, & Gutheil, 2011; Duckworth, Iezzi, & O'Donohue, 2008; Kane & Dvoskin, 2011; Koch, Douglas, Nicholls,", "-25.57644071779214" ], [ "Cold shock response Cold shock response is the physiological response of organisms to sudden cold, especially cold water.\nIn animals, cold shock response is perhaps the most common cause of death from immersion in very cold water, such as by falling through thin ice. The immediate shock of the cold causes involuntary inhalation, which if underwater can result in drowning. The cold water can also cause heart attack due to vasoconstriction; the heart has to work harder to pump the same volume of blood throughout the body. For people with existing cardiovascular disease, the additional workload can result in cardiac", "-25.56096546468325" ], [ "pain, disability, loss of job, poverty and homelessness which obviously cause mental health problems and may cause death. In medicine, a cascade effect may also refer to a chain of events initiated by an unnecessary test, an unexpected result, or patient or physician anxiety, which results in ill-advised tests or treatments that may cause harm to patients as the results are pursued. An example would be ordering a full body CT scan without a clear reason, finding an incidentaloma and undergoing a debilitating surgery to remove it, despite the fact that the condition was asymptomatic and possibly benign. In", "-25.56015794229461" ], [ "recovery efforts. They are consequently dependent on assistance from outside relief agencies.\nOnly in a small minority of cases does this myth turn out to be true. And many times, the experienced shock is short-lived. What in fact happens in most cases is people react immediately to the disaster and its effects. The disaster can also be a jolt of energy which drives people to respond to the emergency. Those who went through the disaster are the first engaged in relief and rescue efforts before any outside agency. They come together along familiar lines such", "-25.53966245220363" ], [ "Shock Treatment (TV series) Shock Treatment is a reality entertainment documentary shown in 2005 on Sky One in the United Kingdom and Fox Reality in the United States. It stars Rutger Hauer as presenter and John Woolvett as the fictional Dr. John Templeton. Other members of the cast include actress Sharon Lloyd as a fake volunteer and magician Paul Andrews as Head of Experiments.\nIn this show, four volunteers are challenged to stay for 48 hours in a disused mental asylum and endure a series of mental challenges designed to test their courage. Such challenges include facing violence, snakes, electricity, the", "-25.53208703978453" ], [ "brings the body to a state similar to hyperaldosteronism. If the stressor persists, it becomes necessary to attempt some means of coping with the stress. The body attempts to respond to stressful stimuli, but after prolonged activation, the body's chemical resources will be gradually depleted, leading to the final stage. History in research The current usage of the word stress arose out of Hans Selye's 1930s experiments. He started to use the term to refer not just to the agent but to the state of the organism as it responded and adapted to the environment. His theories of a universal", "-25.52247019603965" ], [ "the process of feeling pain: transduction, transmission, perception, and modulation. The nerve cells that detect pain have cell bodies located in the dorsal root ganglia and fibers that transmit these signals to the spinal cord. The process of pain sensation starts when the pain-causing event triggers the endings of appropriate sensory nerve cells. This type of cell converts the event into an electrical signal by transduction. Several different types of nerve fibers carry out the transmission of the electrical signal from the transducing cell to the posterior horn of spinal cord, from there to the brain stem, and then", "-25.46810004809231" ], [ "Sports-related traumatic brain injury Signs and symptoms in sports Signs and symptoms of concussions can be hard to determine because they may not present strongly and because they may not present for several hours after the incident has occurred. There are 4 categories that symptoms of a concussion can be classified within: physical, cognitive, emotional and sleep disturbance. The most common symptom is a headache as well as the feeling of being “fog like”. Other, more subtle symptoms that can accompany headaches are emotional changes, irritability, slowed reaction times and drowsiness. Accompanying symptoms can include sensitivity to light,", "-25.461037147571915" ], [ "Operational Stress Injury History Military members experiencing wartime trauma may suffer debilitating psychological effects from their experiences, and historical research has found literary references to these psychological packs throughout recorded history. During the First World War era, psychological symptoms suffered by soldiers in war came to be referred to as \"shell shock\". This progressed by the Second World War to being called \"battle fatigue\", or \"combat stress reaction\". As research continued and the understanding of psychology and psychiatry advanced, it gradually became more understood through the 20th century that experiencing trauma could have a variety of psychological and emotional impacts", "-25.343709995300742" ], [ "shock due to extreme vascular damage and fluid loss through the gastrointestinal tract, which can be fatal.\nIf the affected person does not recover, a multiple-system organ failure phase of colchicine overdose may result. This includes kidney damage, which causes low urine output and bloody urine; low white blood cell counts that can last for several days; anemia; muscular weakness; liver failure; hepatomegaly; bone marrow suppression; thrombocytopenia; and ascending paralysis leading to potentially fatal respiratory failure. Neurologic symptoms are also evident, including seizures, confusion, and delirium; children may experience hallucinations. Recovery may begin within six to eight days and begins with", "-25.317041795962723" ], [ "of trauma, children can and do recover, and that trauma-informed care and interventions produce better outcomes than “treatment as usual”. Trauma-informed care is defined as offering services or support in a way that addresses the special needs of people who have experienced trauma. Medical trauma Medical trauma, sometimes called \"pediatric medical traumatic stress\" refers to a set of psychological and physiological responses of children and their families to pain, injury, serious illness, medical procedures, and invasive or frightening treatment experiences. Medical trauma may occur as a response to a single or multiple medical events. Separation trauma Separation trauma is a", "-25.309627015376464" ], [ "Head injury Concussion A concussion is a form of a mild traumatic brain injury (TBI). This injury is a result due to a blow to the head that could make the person’s physical, cognitive, and emotional behaviors irregular. Symptoms may include clumsiness, fatigue, confusion, nausea, blurry vision, headaches, and others. Mild concussions are associated with sequelae. Severity is measured using various concussion grading systems.\nA slightly greater injury is associated with both anterograde and retrograde amnesia (inability to remember events before or after the injury). The amount of time that the amnesia is present correlates with the severity of the injury.", "-25.240255480253836" ], [ "Toxic shock syndrome Signs and symptoms Symptoms of toxic shock syndrome (TSS) vary depending on the underlying cause. TSS resulting from infection with the bacterium Staphylococcus aureus typically manifests in otherwise healthy individuals via signs and symptoms including high fever, accompanied by low blood pressure, malaise and confusion, which can rapidly progress to stupor, coma, and multiple organ failure. The characteristic rash, often seen early in the course of illness, resembles a sunburn (conversely, streptococcal TSS will rarely involve a sunburn-like rash), and can involve any region of the body including the lips, mouth, eyes, palms and soles of the", "-25.220255817337602" ], [ "the patient. Prognosis If the vital organs are deprived of perfusion for more than just a few time, the prognosis is generally not good. Shock is still a medical emergency characterized by a high mortality rate. Early identifying patients who are likely to succumb to their illness is of utmost importance. Blood loss Trauma remains a leading cause of death worldwide with approximately half of these attributed to hemorrhage. In the United States in 2001, trauma was the third leading cause of death overall, and the leading cause of death in those aged 1 to 44 years. While trauma", "-25.094468271243386" ], [ "the shock is to build buildings that are more resilient to temperature change while still providing water. History In an effort to improve upon water and sanitation technology for impoverished nations, the World Bank and United Nations Development program founded the program in 1978.\nThe program and its for bearer UNDP invested most of its efforts to testing cost-effective technologies such as hand pumps and latrines for future implementation in the 1980s. However, as other world governments and organizations began developing systemic solutions and strategies to approach issues regarding safe water and sanitation, the program followed suit in widening its scope", "-25.09275096433703" ], [ "National trauma National trauma is a concept in psychology and social psychology. A national trauma is one in which the effects of a trauma apply generally to the members of a collective group such as a country or other well-defined group of people. Trauma is an injury that has the potential to severely negatively affect an individual, whether physically or psychologically. Psychological trauma is a shattering of the fundamental assumptions that a person has about themselves and the world. An adverse experience that is unexpected, painful, extraordinary, and shocking results in interruptions in ongoing processes or relationships and", "-25.077838908619015" ], [ "Central pain syndrome Signs and symptoms Pain can either be relegated to a specific part of the body or spread to the entire body. It is typically constant, and may be moderate to severe in intensity. It is often made worse by touch, movement, emotions, barometric pressure and temperature changes, usually cold temperatures along with many other similar 'triggers'. Burning pain is the most common sensation, but patients also report pins and needles, pressing, lacerating, aching, and extreme bursts or constant sharp or unremitting excruciating pain. Individuals may have reduced sensitivity to touch in the areas affected by the", "-25.007378474110737" ], [ "damage was only moderate - that nervous shock was not foreseeable. It does not follow that whenever there is physical injury that psychiatric injury will be foreseeable, therefore, the test is based on the type of damage.", "-24.987464430219916" ], [ "Stressor Psychological Stressors Stressors occur when an individual is unable to cope with the demands of their environment (such as crippling debt with no clear path to resolving it). Generally, stressors take many forms, such as: traumatic events, life demands, sudden medical emergencies, and daily inconveniences, to name a few. There are also a variety of characteristics that a stressor may possess (different durations, intensity, predictability, and controllability). Biological Responses To Stressors Traumatic events or any type of shock to the body can cause an acute stress response disorder (ASD). The extent to which one experiences ASD depends on the", "-24.950617416703608" ], [ "the deceased is will lead to a greater evaluation of the relationship with heightened shock. Track two brings up memories (both positive and negative) and emotional involvement shared with the decedent.\nAny memory could be a trigger for the bereaved, the way the bereaved chose to remember their loved ones, and how the bereaved integrate the memory of their loved ones into their daily lives.\nTen main attributes to this track include; imagery/memory, emotional distance, positive effect, negative effect, preoccupation with the loss, conflict, idealization, memorialization/transformation of the loss, impact on self-perception and loss process (shock, searching, disorganized) (Rubin, 1999). An outcome", "-24.935615316266194" ], [ "shockwave caused by the impact. Conan then notices a sick boy with no accompanying adult. The crews are relieved that their target is nothing but a shipwreck. Fumitada announces to the participants that the \"exercises\" are now over.\nThe participants arrive at the deck during free time. Conan sees the boy from before, who is called \"Yuki-kun\" by a man nearby. Conan wonders if the man is Yuki's father, and finds it suspicious that he didn't notice the shock, and wouldn't show himself until after the free time had started. He decides to follow the two, only to be stopped by", "-24.921376584796235" ], [ "Concussion Signs and symptoms Concussions are associated with a variety of symptoms, which typically occur rapidly after the injury. Early symptoms usually subside within days or weeks. The number and type of symptoms any one individual suffer varies widely. Physical Headaches are the most common mTBI symptom. Others include dizziness, vomiting, nausea, lack of motor coordination, difficulty balancing, or other problems with movement or sensation. Visual symptoms include light sensitivity, seeing bright lights, blurred vision, and double vision. Tinnitus, or a ringing in the ears, is also commonly reported. In one in about seventy concussions, concussive convulsions occur, but seizures", "-24.900521098112222" ], [ "impact syndrome” has, in some cases, been fatal. A history of concussion in football players has been linked to sports-related sudden death. The severity of complications from concussion can include brain swelling, blood clots and brain damage. Ice hockey, soccer, wrestling and basketball carry a high risk for concussion however, football is the most dangerous. Concussion causing situations that involve leading with the head, hitting head to head and striking a defenseless athlete have become subject to penalty in order to discourage players and coaches from this type of play. These rule changes have resulted in technique changes at", "-24.85866450820322" ], [ "resulting from the impact that caused the concussion. Others believe that post-concussion symptoms are related to common psychological factors. Most common symptoms like headache, dizziness, and sleep problems are similar to those often experienced by individuals diagnosed with depression, anxiety, or post traumatic stress disorder. In many cases, both physiological effects of brain trauma and emotional reactions to these events play a role in the development of symptoms. Physiological Conventional neuroimaging studies of the brain following a concussion are typically normal. However, studies have found some subtle physiological changes associated with PCS using more novel imaging modalities. Studies using", "-24.795236583653605" ], [ "mechanical knowledge critical. Headaches, occasional dizziness, and fatigue—all temporary symptoms of brain trauma—may become permanent, or may not disappear for a long time.\nThere are documented cases of lasting psychological effects as well, such as emotional swings often caused by damage to the various parts of the brain that control human emotions and behavior. Some who have experienced emotional changes related to brain damage may have emotions that come very quickly and are very intense, but have very little lasting effect. Emotional changes may not be triggered by a specific event, and can be a cause of stress to the injured", "-24.73948791042494" ], [ "pain, as if the part is 'falling asleep'. The burning and loss of sense of touch are usually, but not always, most severe on the distant parts of the body, such as the feet or hands, spreading until it is in some cases felt from head to toe. For some patients with intense affliction, there often can be unremitting nausea, causing vomiting. The pain can also bring on hyperventilation. Blood pressure can rise due to the pain. Cause Damage to the CNS can be caused by car accidents, limb amputations, trauma, spinal cord injury, tumors, stroke, immune system disorders", "-24.705396912788274" ], [ "'in the grip'. This refers to the times when the inferior function is being showcased. This happens when we are low on energy and under great stress. Stress is defined as any external or internal event that lessens or depletes one's mental and physical well being. Stress is a necessary and sufficient stimulus for bringing out our hidden personality. Unconscious contents are charged with energy that must be discharged in order for a person to function comfortably and with minimal tension and distress. One of the most powerful and universal ways human beings deal with being unacknowledged, unconscious thoughts and", "-24.686915733094793" ], [ "Human response to disasters Panic/Scared One commonly held disaster myth is that people develop an insurmountable, illogical fear in the face of a disaster. In turn, this fear becomes infectious, spreads to others, and causes people to flee without thinking and in a chaotic manner that could hurt those around them.\nIn fact, just the opposite can be expected in most cases. Even when experiencing the increased stress from an earthquake, since they arrive unannounced and it is not known when the aftershocks will end, people continue to act rationally. Not only do few people panic, most are", "-24.678450565814273" ], [ "and noise, fatigue, dizziness, nausea and vomiting. The loss of consciousness is another identifiable characteristic of concussions but it is not a required symptom to diagnose it. The loss of consciousness occurs in only 10% of concussions, so it cannot be a reliable sign of a concussion. Other distinguishing characteristics of concussions are retrograde amnesia (loss of memory just prior to injury) and posttraumatic amnesia (impaired recall of time between the injury or resumption of consciousness and the point at which new memories are stored and retrieved). Diagnosis in sports There are many diagnostic tools and tests within sports.", "-24.630818442237796" ], [ "from fully disclosing the facts, and thus frustrate attempts to address the real root causes. Psychological Following collisions, long-lasting psychological trauma may occur. These issues may make those who have been in a crash afraid to drive again. In some cases, the psychological trauma may affect individuals' life can cause difficulty to go to work, attend school, or perform family responsibilities. Physical A number of physical injuries can commonly result from the blunt force trauma caused by a collision, ranging from bruising and contusions to catastrophic physical injury (e.g., paralysis) or death. Causes A 1985 study by K. Rumar, using", "-24.628987087169662" ], [ "Loss of consciousness may occur, but is not necessarily correlated with the severity of the concussion if it is brief. Post-traumatic amnesia, in which events following the injury cannot be recalled, is a hallmark of concussions. Confusion, another concussion hallmark, may be present immediately or may develop over several minutes. A person may repeat the same questions, be slow to respond to questions or directions, have a vacant stare, or have slurred or incoherent speech. Other MTBI symptoms include changes in sleeping patterns and difficulty with reasoning, concentrating, and performing everyday activities.\nA concussion can result in changes in mood including", "-24.624268265790306" ], [ "Ground shock, or water shock will result from nuclear explosions on (or near) the surface of ground or water. The ground shock can damage or destroy hardened structures. In water, the shock is damaging to nearby vessels and may also produce a surface wave to limited ranges. A crater is formed by an explosion at (or near) the ground surface. The size of the crater depends on the type of ground material and how close to the ground surface the explosion occurs.", "-24.619061291683465" ], [ "fatal, the effects similar to those of severe traumatic brain injury can occur, including persistent muscle spasms and tenseness, emotional instability, hallucinations, post-traumatic epilepsy, mental disability, paralysis, coma, and brain death. Epidemiology Though the incidence of second impact syndrome is unknown, the condition is rare; very few cases have been confirmed in medical literature. In the 13-year period from 1980–1993, 35 American football related cases of SIS were recorded, but only 17 of these were confirmed by necropsy or surgery and magnetic resonance imaging to be due to SIS, and 18 cases were found to be probably SIS-related. Additionally, the initial", "-24.58504782494856" ], [ "up with the concept of the \"golden hour\" — that lives can be saved when trauma patients receive appropriate care within one hour of their injury. Shock Trauma trains physicians and medical personnel from locations overseas and throughout the United States. University of Maryland Marlene and Stewart Greenebaum Comprehensive Cancer Center The University of Maryland Greenebaum Comprehensive Cancer Center (UMGCCC) is designated by the National Cancer Institute as one of the top cancer centers in the country UMGCCC is known for providing coordinated care from teams of specialists—medical oncologists, radiation oncologists, surgical oncologists, pathologists, nurses and other team members", "-24.577487056321843" ], [ "narratives before the 1930s\". Physiological stress represents a wide range of physical responses that occur as a direct effect of a stressor causing an upset in the homeostasis of the body. Upon immediate disruption of either psychological or physical equilibrium the body responds by stimulating the nervous, endocrine, and immune systems. The reaction of these systems causes a number of physical changes that have both short- and long-term effects on the body.\nThe Holmes and Rahe stress scale was developed as a method of assessing the risk of disease from life changes. The scale lists both positive and negative changes that", "-24.575741644803202" ], [ "2003 in the 2003 Chevy 500 when the car driven by Kenny Bräck made wheel-to-wheel contact with Tomas Scheckter's car. This immediately resulted in Bräck's car impacting the catch fence that would record a peak of 214 g₀. Short duration shock, impact, and jerk Impact and mechanical shock are usually used to describe a high kinetic energy, short term excitation. A shock pulse is often measured by its peak acceleration in g₀·s and the pulse duration. Vibration is a periodic oscillation which can also be measured in g₀·s as well as frequency. The dynamics of these phenomena are", "-24.532428678481665" ], [ "Shock Treatment (1973 film) Plot Feeling at a dead end in life, Hélène Masson, the 38-year-old unmarried owner of a fashion business, books into the private clinic of Dr Devilers on the Brittany coast. Most of the workers, she notices, are unskilled Portuguese men who do not seem healthy, as they are prone to fainting. The clinic's regime for its wealthy clients, all regulars, is centred round fresh cell therapy. Her friend Jérôme, who recommended the place but can no longer afford the hefty fees, warns her that the injections are addictive. Next day he is found dead at the", "-24.507916936214315" ], [ "a concussion, chronic pain, or a disorder that involves mood or emotions (such as depression, anxiety, fear, or phobia, and adjustment disorder). These disorders may manifest separately or in combination (co-morbidity). If the symptoms and effects persist, the injured person may become a complainant or plaintiff who initiates legal action aimed at obtaining compensation against whomever is considered responsible for the injury. Scope In the following, psychological injury is discussed in relation to the law, forensic psychology, assessment, malingering, diagnosis, treatment, PTSD, chronic pain, TBI, disability, return to work, psychological tests and testing, and causality. Psychological injury and law Research", "-24.47833862504922" ], [ "brain as physical pain, so emotional stress can be a significantly intolerable state for some people. Some of this is environmental and some of this is due to physiological differences in responding. The autonomic nervous system is composed of two components: the sympathetic nervous system controls arousal and physical activation (e.g., the fight-or-flight response) and the parasympathetic nervous system controls physical processes that are automatic (e.g., saliva production). The sympathetic nervous system innervates (e.g., is physically connected to and regulates) many parts of the body involved in stress responses. Studies of adolescents have shown that adolescents who self-injure have greater", "-24.475564779771958" ], [ "Threshold of pain The threshold of pain or pain threshold is the point along a curve of increasing perception of a stimulus at which pain begins to be felt. It is an entirely subjective phenomenon. A distinction must be maintained between the stimulus (an external thing that can be directly measured, such as with a thermometer) and the person's or animal's resulting pain perception (an internal, subjective thing that can sometimes be measured indirectly, such as with a visual analog scale). Although an IASP document defines \"pain threshold\" as \"the minimum intensity of a stimulus that is perceived as painful\",", "-24.473115905077066" ], [ "to a stimuli they find disturbing or fear inducing until it no longer provokes an emotional response. The stimuli can range from commonly feared situations and objects, such as heights or speaking publicly, to seemingly mundane objects and places that have become distressing through a traumatic experience. If someone is exposed to a traumatic experience it is common that being exposed to reminders, including memories, of the event will trigger anxiety attacks, emotional distress and flashbacks. A common mechanism to deal with these potential triggers is to avoid thinking about them and to avoid situations where they may be", "-24.46126660113805" ], [ "to cognitive and physical handicaps such as parkinsonism, speech and memory problems, slowed mental processing, tremor, depression, and inappropriate behavior. It shares features with Alzheimer's disease. Second-impact syndrome Second-impact syndrome, in which the brain swells dangerously after a minor blow, may occur in very rare cases. The condition may develop in people who receive second blow days or weeks after an initial concussion before its symptoms have gone away. No one is certain of the cause of this often fatal complication, but it is commonly thought that the swelling occurs because the brain's arterioles lose the ability to regulate their", "-24.456792191194836" ], [ "some cases of mass hysteria. Cries from the injured people were deemed a main cause of psychological breakdowns among the rescuers.\nAfter the Crevalcore accident, new procedures of stress management and psychological counseling were developed to help responders better cope with the consequences arising from this sort of incident, moving from self-managed stress control (such as, for example, relying on the need to keep a \"tough guy\" stance in front of fellow responders) to a group-based approach (one such approach involves conducting \"ceremonies\" to help those involved rationalize the shocking experiences).\nAlmost all the responders, relatives and survivors who experienced mental problems", "-24.44718053471297" ], [ "associated with soldiers, police officers, and other emergency personnel. The stressor may involve threat to life (or viewing the actual death of someone else), serious physical injury, or threat to physical or psychological integrity. In some cases, it can also be from profound psychological and emotional trauma, apart from any actual physical harm or threat. Often, however, the two are combined.\nBy the 1990s, \"stress\" had become an integral part of modern scientific understanding in all areas of physiology and human functioning, and one of the great metaphors of Western life. Focus grew on stress in certain settings, such as workplace", "-24.375195300395717" ], [ "test that trainers will perform to prevent getting hit a second time. A second blow can cause a rare condition known as second-impact syndrome, which can result in severe injury or death. Second-impact syndrome is when an athlete suffers a second head injury before the brain has adequate time to heal in between concussions.\nRepeated concussions have been linked to a variety of neurological disorders among athletes, including CTE, Alzheimer's Disease, Parkinsonism and Amyotrophic lateral sclerosis (ALS). National Football League The National Football League's (NFL) policy was first started in 2007, and injured players are examined on field by the medical", "-24.343907699454576" ], [ "effects do not play a role in brain activity. David Chalmers has noted (without necessarily endorsing) a second possibility within quantum mechanics, that consciousness' causal role is to collapse the wave function as per the Von Neumann-Wigner interpretation of quantum mechanics. He acknowledges this is at odds with the interpretations of quantum mechanics held by most physicists, but notes, \"There is some irony in the fact that philosophers reject interactionism on largely physical grounds (it is incompatible with physical theory), while physicists reject an interactionist interpretation of quantum mechanics on largely philosophical grounds (it is dualistic). Taken conjointly, these reasons", "-24.33522534594522" ], [ "Cerebral contusion Signs and symptoms The symptoms of a cerebral contusion (bruising on the brain) depend on the severity of the injury, ranging from minor to severe. Individuals may experience a headache; confusion; sleepiness; dizziness; loss of consciousness; nausea and vomiting; seizures; and difficulty with coordination and movement; lightheadedness; tinnitus;spinning sensations. They may also have difficulty with memory, vision, speech, hearing, managing emotions, and thinking. Signs depend on the contusion's location in the brain. Causes Often caused by a blow to the head, contusions commonly occur in coup or contre-coup injuries. In coup injuries, the brain is injured directly under", "-24.294539619411808" ], [ "these indicators of shock may be absent in elderly or immunocompromised patients or in those with diabetes. Patients should be asked if retching and vomiting occurred before the onset of pain.", "-24.267724986515532" ], [ "is accelerated by an impact with a moving object. Additionally, increased intracranial pressure and movement of cerebrospinal fluid following a trauma may play a role in the injury. Mechanisms Coup injury may be caused when, during an impact, the brain undergoes linear acceleration and deceleration forces or rotational forces, causing it to collide with the opposite side of the skull. The injuries can also be caused solely by acceleration or deceleration in the absence of an impact. Contrecoup injury may be produced by tensile forces. These forces directly disrupt neurons, axons, other neural and meningeal structures, and blood vessels", "-24.242066418519244" ], [ "Pain empathy Pain empathy is a specific subgroup of empathy that involves recognizing and understanding another person’s pain. Empathy is the mental ability that allows one person to understand another person’s mental and emotional state and how to effectively respond to that person. When a person receives cues that another person is in pain, neural pain circuits within the brain are activated. There are several cues that can communicate pain to another person: visualization of the injury causing event, the injury itself, behavioral efforts of the injured to avoid further harm, and displays of pain and distress", "-24.216124335049244" ], [ "Strain (injury) Signs and symptoms Typical signs and symptoms of a strain include pain, functional loss of the involved structure, muscle weakness, contusion, and localized inflammation. A strain can range from mild annoyance to very painful, depending on the extent of injury. Risk factors Although strains are not restricted to athletes and can happen while doing everyday tasks, people who play sports are more at risk for developing a strain. It is common for an injury to develop when there is a sudden increase in duration, intensity, or frequency of an activity.", "-24.19442777975928" ], [ "Whiplash (medicine) Signs and symptoms Symptoms reported by sufferers include: pain and aching to the neck and back, referred pain to the shoulders, sensory disturbance (such as pins and needles) to the arms and legs, and headaches. Symptoms can appear directly after the injury, but often are not felt until days afterwards. Whiplash is usually confined to the spine. The most common areas of the spine affected by whiplash are the neck and middle of the spine. \"Neck\" pain is very common between the shoulder and the neck. The \"missing link\" of whiplash may be towards or", "-24.19143228768371" ], [ "damage results in its own characteristic pattern of deficits. Rather than an entire side of deficits, there is a pattern relating to the myotome affected by the damage. Additionally, lower motor neurons are characterized by muscle weakness, hypotonia, hyporeflexia and muscle atrophy.\nSpinal shock and neurogenic shock can occur from a spinal injury. Spinal shock is usually temporary, lasting only for 24–48 hours, and is a temporary absence of sensory and motor functions. Neurogenic shock lasts for weeks and can lead to a loss of muscle tone due to disuse of the muscles below the injured site.\nThe two areas of", "-24.184070963063277" ], [ "of moderate and severe head injuries. Terminology The terms mild brain injury, mild traumatic brain injury (MTBI), mild head injury (MHI), and concussion may be used interchangeably; although the term \"concussion\" is still used in sports literature as interchangeable with \"MHI\" or \"MTBI\", the general clinical medical literature uses \"MTBI\" instead, since a 2003 CDC report outlined it as an important strategy. In this article, \"concussion\" and \"MTBI\" are used interchangeably.\nThe term \"concussion\" is from Latin concutere, \"to shake violently\" or concussus, \"action of striking together\". Research Minocycline, lithium, and N-acetylcysteine show tentative success in animal models.\nMeasurement of predictive visual", "-24.1708441386927" ], [ "a behavior that ensures the survival of an organism. Pain and fear are integral parts of this mechanism. Pain motivates the individual to withdraw from damaging situations, to protect a damaged body part while it heals, and to avoid similar experiences in the future. Most pain resolves promptly once the painful stimulus is removed and the body has healed, but sometimes pain persists despite removal of the stimulus and apparent healing of the body; and sometimes pain arises in the absence of any detectable stimulus, damage or disease. Fear causes the organism to seek safety and may cause a release", "-24.15692306876008" ], [ "Reactance (psychology) Definition Psychological reactance is \"an unpleasant motivational arousal that emerges when people experience a threat to or loss of their free behaviors.\" An example of such behavior can be observed when an individual engages in a prohibited activity in order to deliberately taunt the authority who prohibits it, regardless of the utility or disutility that the activity confers. An individual's freedom to select when and how to conduct their behavior, and the level to which they are aware of the relevant freedom—and are able to determine behaviors necessary to satisfy that freedom—affect the generation of psychological reactance. It", "-24.14731098687116" ], [ "is the degree of response. It is all about the context of the individual and how they perceive the situation. Selye defined stress as “the nonspecific (that is, common) result of any demand upon the body, be the effect mental or somatic.” This includes the medical definition of stress as a physical demand and the colloquial definition of stress as a psychological demand. A stressor is inherently neutral meaning that the same stressor can cause either distress or eustress. It is individual differences and responses that induce either distress or eustress. Types of stressors A stressor is any event, experience,", "-24.13553031012998" ], [ "Second-impact syndrome Signs and symptoms SIS is a potential complication from an athlete returning to a game before symptoms from a minor head injury have subsided. Such symptoms include headache, cognitive difficulties, or visual changes.\nThe initial injury may be a concussion, or it may be another, more severe, type of head trauma, such as cerebral contusion. However, the first concussion need not be severe for the second impact to cause SIS. Also, the second impact may be very minor, even a blow such as an impact to the chest that causes the head to jerk, thereby transmitting forces of acceleration", "-24.13321658037603" ], [ "Distress (medicine) In medicine, distress is an aversive state in which a person is unable to completely adapt to stressors and their resulting stress and shows maladaptive behaviors. It can be evident in the presence of various phenomena, such as inappropriate social interaction (e.g., aggression, passivity, or withdrawal).\nDistress is the opposite of eustress, a positive stress that motivates people. Risk factors Stress can be created by influences such as work, school, peers or co-workers, family and death. Other influences vary by age.\nPeople under constant distress are more likely to become sick, mentally or physically. There is a clear response association", "-24.111729497890337" ], [ "phenomenon, the emotional state of a person, as well as the context or situation associated with the pain also impacts the perception of the nociceptive or noxious event. For example, if a human experiences a painful event associated with any form of trauma (an accident, disease, etc.), a reoccurrence of similar physical pain will not only inflict physical trauma but also the emotional and mental trauma first associated with the painful event. Research has shown that should a similar injury occur to two people, one person who associates large emotional consequence to the pain and the other person who does", "-24.10926118923817" ] ]
3qfyuh
If I fill a vessel with 1/2 oil 1/2 water will the oil covering the water prevent evaporation?
[ "Yes. This is actually how some of those fancy no-flush urinals work: your pee sinks below a layer of oil, so it won't evaporate and stink up the place.", "Yes. This is how early preservation worked as well. Pemmican is dried meat covered in fat. The fat stops the meat from going bad. The stuff stays good practically forever.", "Yes! This is how you can keep the basement in your house from smelling like sewer gas. A lot of times the water in the trap of your floor drain will evaporate, allowing that lovely sewer smell in. Put a little mineral oil in the drain in you'll prevent the water from evaporating.", "The actual answer to this question more complicated than yes or no. Will it prevent evaporation no. Will it reduce evaporation, yes, almost to the point where it completely prevents it. There are a couple ways for evaporation to occur under this circumstance, but just to give one example the oil itself does partially evaporate and gets replenished by the water underneath at a very, very slow rate. just because two liquids do not mix mechanically does not mean they do not mix chemically but it does mean they will have a much much slower and smaller chemical reaction due to the lack of *surface area contact*.", "Some people keep mosquitoes from breeding in standing water by pouring diesel fuel (or any other oil) on top of the water. It really works, the larvae get in the oil and smother, they can't breathe through it. BTW, this question, it's one of those rare ELI5's where you can easily do the relevant experiment at home!" ]
[ [ "gas injection can be used to maintain reservoir pressure. When a gas cap is coupled with water influx the recovery mechanism can be highly efficient. Aquifer (water) drive Water (usually salty) may be present below the hydrocarbons. Water, as with all liquids, is compressible to a small degree. As the hydrocarbons are depleted, the reduction in pressure in the reservoir allows the water to expand slightly. Although this unit expansion is minute, if the aquifer is large enough this will translate into a large increase in volume, which will push up on the hydrocarbons, maintaining pressure.\nWith a", "-34.38068544568614" ], [ "into oil tankers. \nProduced water from the separator(s)/coalescer is routed to a produced water degasser operating at near atmospheric pressure to removed dissolved gas from the water. Produced water is then routed to a hydrocyclone to remove entrained oil and solids and then either re-injected into the reservoir or dumped overboard. For overboard disposal the water should have an oil content of less than about 30 parts per million (ppm) oil-in-water. In the early days of the offshore industry parallel plate separator units were used to clean produced water prior to overboard disposal. Hydrocyclones, which", "-34.333537291386165" ], [ "prevent an ecological disaster. The plan called for then refilling the tanks with \"harmless\" ballast water to prevent them from being dislodged by flooding.\nHowever, on April 5, the Coast Guard stated that filling the empty tanks with ballast water was not possible, because it would create a hazardous waste that the neither the facility nor the Coast Guard was prepared to deal with afterward. Instead, the oil was removed and the empty tanks remained vulnerable to damage from further flooding. In the meantime, oil production in Cook Inlet was suspended, because the tank farms were out of commission while Mount", "-33.765123222066904" ], [ "the equipment to separate oil from bilge water. Further, as enforced by MARPOL, all ships over 400 gross tons and all oil tankers over 150 gross tons are require to log all oil transfer is an oil record book (EPA, 2011). Cavitation Cavitation is the process of forming an air bubble in a liquid due to the vaporization of that liquid cause by an area of low pressure. This area of low pressure lowers the boiling point of a liquid allowing it to vaporize into a gas. Cavitation can take place in pumps, which can cause damage to the impeller", "-33.76194603694603" ], [ "(Smith, 2018). Oil and water discharge Water, oil, and other substances collect at the bottom of the ship in what is known as the bilge. Bilge water is pumped overboard, but must pass a pollution threshold test of 15 ppm (parts per million) of oil to be discharged. Water is tested and either discharged if clean or recirculated to a holding tank to be separated before being tested again. The tank it is sent back to, the oily water separator, utilizes gravity to separate the fluids due to their viscosity. Ships over 400 gross tons are required to carry", "-33.658857540925965" ], [ "to control the nozzle. During sludging, the water is injected to open the nozzle and drained to close it. Oil and gas industry Conical plate centrifuge can be used to remove water, salts and solids to condition fuels for gas turbine. It also removes some heavy phase liquid and fine solids to obtain high purity liquid fuel. On the other hand, the centrifuge is also useful for treating water, an oil and gas by product, by removing oil contaminants before discharging back to the sea, as required by law. Moreover, emulsion of oil and water can be further treated to", "-33.383816941815894" ], [ "separators are used for waste water processing and for cleanup of oil spills on sea or on lake. Centrifugal oil-water separators are also used for filtering diesel and lubricating oils by removing the waste particles and impurity from them. Problems On a properly operated vessel only small amounts of bilge would be present as long as there are no equipment failures. But even the best-operated vessels suffer equipment failures, which then quickly results in contaminated bilges. Sometimes these contaminants are massive and pose a serious challenge to the crew to deal with in a legal fashion.\nA properly designed", "-33.20814752532169" ], [ "comply with the U.S. standard. Dutch officials have criticized the requirement, as it requires many additional trips to on-shore storage facilities. Spill Response Group head Wierd Koops said, \"you have to get as much oil as possible into the storage tanks and as little water as possible. So we pump the water, which contains drops of oil, back overboard\". Allen explained on 11 June, \"We have skimmed, to date, about 18 million gallons of oily water – the oil has to be decanted from that [and] our yield is usually somewhere around 10% or 15% on that\". The US later relaxed", "-33.18288470551488" ], [ "length, consequently, in a range of 50–125 mm and 60–300 cm. For the dewaxing lubrication oil, evaporators are widely used with the following dimensions: internal diameter of the inner tube is 150–300 mm; the length is 600–1,200 cm.\nSometimes a gas can be added to the liquid flowing through the evaporator. It destroys a liquid laminar layer on the cooled surface of the heat exchanger-crystallizer, increases flow turbulence, and decreases the average viscosity of pumpable ice.\nDifferent liquids, such as sea water, juice, brines, or glycol solutions of additives with more than 3–5% concentrations and a freezing point less than −2 °C are used in the process.\nTypically,", "-33.131533539737575" ], [ "toxic material, such as oils, poisonous gases, fungi or bacteria. A normal dive will end with some pressure remaining in the cylinder; if an emergency ascent has been made due to an out-of-gas incident, the cylinder will normally still contain some pressure and unless the cylinder had been submerged deeper than where the last gas was used it is not possible for water to get in during the dive.\nContamination by water during filling may be due to two causes. Inadequate filtration and drying of the compressed air can introduce small quantities of fresh water condensate, or an emulsion of water", "-32.87937495858205" ], [ "incinerator or taken to a waste management facility. In rare occasions, bilge water can be discharged into the ocean but only after almost all oil is separated out.", "-32.66064933035523" ], [ "replenished from some natural water influx. If the water begins to be produced along with the oil, the recovery rate may become uneconomical owing to the higher lifting and water disposal costs. Water and gas injection If the natural drives are insufficient, as they very often are, then the pressure can be artificially maintained by injecting water into the aquifer or gas into the gas cap. Gravity drainage The force of gravity will cause the oil to move downward of the gas and upward of the water. If vertical permeability exists then recovery rates may be even better. Gas and", "-32.56651030766079" ], [ "latter disadvantage may be insignificant where navigable waters contain elevated background levels of petroleum products; and the advantages make hydraulic tankers useful oil spill recovery ships when their storage tanks may act as oil–water separators.", "-32.197928462410346" ], [ "barrier to leaks of hydrocarbons as well as allowing damaged sections to be replaced. Also, the smaller cross-sectional area of the tubing produces reservoir fluids at an increased velocity in order to minimize liquid fallback that would create additional back pressure, and shields the casing from corrosive well fluids.\nIn many wells, the natural pressure of the subsurface reservoir is high enough for the oil or gas to flow to the surface. However, this is not always the case, especially in depleted fields where the pressures have been lowered by other producing wells, or in low permeability oil reservoirs. Installing a", "-32.18603111131233" ], [ "to remove the remaining crude oil from the facility and replace it with ballast water to stabilize the tanks and protect them from being dislodged during any future flooding. While the facility was again surrounded by lahars, the tank farm itself was not flooded and workers at the facility were not injured. The workers on site were evacuated to a \"safe room\" complete with food and sleeping quarters, as well as bathrooms and entertainment facilities to wait out the flooding.\nOn April 5, the Coast Guard determined that the tanks could not be refilled with ballast water after the oil was", "-32.18504273024155" ], [ "barrels (640,000 m³) of oil would be enough to \"wipe out marine life deep at sea near the leak and elsewhere in the Gulf\" as well as \"along hundreds of miles of coastline.\" Mak Saito, an Associate Scientist at Woods Hole Oceanographic Institution indicated that such an amount of oil \"may alter the chemistry of the sea, with unforeseeable results.\" Samantha Joye of the University of Georgia indicated that the oil could harm fish directly, and microbes used to consume the oil would reduce oxygen levels in the water. The ecosystem, she said, could require years or decades to", "-32.10573074565036" ], [ "oil sitting on the surface of the water into smaller droplets that disperse into the water, which lowers the overall concentration of oil in the water to prevent any further contamination or impact on marine biology and coastal wildlife.", "-32.0346634323505" ], [ "Water injection (oil production) Sources of injected water Any source of bulk water can be used for injection. The following sources of water are used for recovery of oil:\nProduced water is often used as an injection fluid. This reduces the potential of causing formation damage due to incompatible fluids, although the risk of scaling or corrosion in injection flowlines or tubing remains. Also, the produced water, being contaminated with hydrocarbons and solids, must be disposed of in some manner, and disposal to sea or river will require a certain level of clean-up of the water stream first. However, the processing", "-31.99335455718392" ], [ "Hydraulic tankers use water to displace lighter oil to keep the tank full at all times. Tanks or compartments that do not straddle the vessel's centerline are somewhat less prone to destabilising oscillations. Similarly, narrow compartments (aligned bow to stern) and compartments at the extremes away from the centerline, are less prone to cause instability. Historical examples Flooding, liquid cargo leakage, or unintended water (from precipitation, waves, or hull damage) in any compartments or on any decks of watercraft, and the resulting free surface effect are often a contributing cause of accidents, capsizes, and casualties e.g. the loss of TEV Wahine", "-31.974618195497897" ], [ "oil is no longer present. To overcome this limitation most weir type skimmers contain an automatic water drain on the oil collection tank. \n. Belt Belt oil skimmers are one of the most reliable and economical equipment for removing liquid surface floating oil with low electric consumption without the need for any consumable. They can effective remove all kinds of floating oil (including machine oil, kerosene, diesel oil, lubricating oil, plant oil and other liquids with specific gravity less than water. This is a versatile skimmer design, it can remove floating oil no matter what the thickness of the oil", "-31.76637284271419" ], [ "oil, rust, sewage, and several other things that can be harmful to the ocean environment. Bilge content The bilge area is the lowest area on a ship. The bilge water that collects here include drain water or leftover water from the boilers, water collecting tanks, drinking water and other places where water can not overflow. However, bilge water doesn't just include water drainage. Another system that drains into the Bilge system comes from the propulsion area of the ship. Here fuels, lubricants, hydraulic fluid, antifreeze, solvents, and cleaning chemicals drain into the engine room bilges in small quantities. The OWS", "-31.663663314495352" ], [ "to above boiling point. The condensed water is eventually evaporated, thereby disposing of it.\nConsumers are reluctant to employ this system because of the high rate of energy used just to dispose of this water. Cascading The cascading method works by flowing the condensed water directly onto the hot coils of the air conditioner. This eventually evaporates the condensed water.\nThe downside of this technology is that the coils have to be at extremely high temperature for the condensed water to be evaporated. There is a chance that the water might not evaporate entirely and that would cause water to overflow onto", "-31.511188293923624" ], [ "removed, as the water would then become a hazardous waste that the facility would not be able to dispose of properly. Instead, the oil will simply be removed and sent to refineries, with damage to the tanks from further flooding still possible. The Coast Guard will coordinate the oil removal with the Alaska Volcano Observatory and proceed when it is safe to do so.", "-31.44830166688189" ], [ "In addition, it's probable (but unconfirmed) that the isolation valve on the secondary cross-connect line between the wash water tanks was also left open. The valves are kept closed to prevent hydrostatic balancing between the tanks and to minimize free surface effect, both of which are detrimental to a vessel's stability.\nWith improper ballast operations causing a substantial port list, fuel inadvertently began to flow by gravity (hydrostatic balancing) from starboard to port, thereby increasing the severity of the list and eventually causing the aft deck to become awash. An unknown amount of sea water is likely to have entered the", "-31.443491399404593" ], [ "also can apply to any oil storage tank\nOil floats on water and, if still clean enough to see through, has a different refractive index than the water below, making the oil/water interface difficult to judge. This makes manual pumping difficult and unsafe. Removing the entire contents for disposal as hazardous waste is expensive and environmentally unacceptable. However, in the UK at least, the latest regulations require some formal method to be put in place for the removal of the rainwater. One of the systems recommended is an automatic pump system which is able to discriminate between oil and water. A", "-31.398013347614324" ], [ "with a gas or vapor. Certain pressure relief valves for chemical use are not designed to relieve the pressure when in contact with liquids.\nIn some cases, the ullage in a ship's hold can be relevant to stability; liquid or dry bulk cargo in a part-filled hold can shift asymmetrically towards one side as the ship heels to one side and the other, reducing the margin of stability when compared with a full hold. Excessive ullage in a tank may contribute to the free surface effect. When referring to the free surface effect, the condition of a tank", "-31.38796157159959" ], [ "sediment, gravitational and hydrate formation.” Because CO\n₂ hydrate is denser than CO\n₂ in seawater, the risk of leakage is minimal. Injecting the CO\n₂ at depths greater than 2,700 meters (8,900 ft) ensures that the CO\n₂ has a greater density than seawater, causing it to sink.\nOne possible injection site is Juan de Fuca plate. Researchers at the Lamont-Doherty Earth Observatory found that this plate at the western coast of the United States has a possible storage capacity of 208 gigatons. This could cover the entire current U.S. carbon emissions for over 100 years.\nThis process is undergoing tests as part of the CarbFix project,", "-31.383472397283185" ], [ "describe the water that collects in this area. Water that does not drain off the side of the deck or through a thru hull, typically via a scupper, drains down into the ship into the bilge. This water may be from rough seas, rain, leaks in the hull or stuffing box, or other interior spillage. The collected water must be pumped out to prevent the bilge from becoming too full and threatening to sink the ship.\nBilge water can be found aboard almost every vessel. Depending on the ship's design and function, bilge water may contain water, oil, urine, detergents, solvents,", "-31.3438003025949" ], [ "frequently complicated by the use of asbestos insulation on the fuel feed lines. No. 6 oil is very persistent, and does not degrade rapidly. Its viscosity and stickiness also make remediation of underground contamination very difficult, since these properties reduce the effectiveness of methods such as air stripping.\nWhen released into water, such as a river or ocean, residual oil tends to break up into patches or tarballs – mixtures of oil and particulate matter such as silt and floating organic matter – rather than form a single slick. An average of about 5-10% of the material will evaporate within hours", "-31.312714251329453" ], [ "Storage tank Special features Since most liquids can spill, evaporate, or seep through even the smallest opening, special consideration must be made for their safe and secure handling. This usually involves building a bunding, or containment dike, around the tank, so that any leakage may be safely contained.\nSome storage tanks need a floating roof in addition to or in lieu of the fixed roof and structure. This floating roof rises and falls with the liquid level inside the tank, thereby decreasing the vapor space above the liquid level. Floating roofs are considered a safety requirement as well as a", "-31.302904823212884" ], [ "gas until the hydrocarbon concentration inside the tank is under about 1%. Thus, as air replaces the inert gas, the concentration cannot rise to the lower flammable limit and is safe. Cargo operations Operations aboard oil tankers are governed by an established body of best practices and a large body of international law. Cargo can be moved on or off of an oil tanker in several ways. One method is for the ship to moor alongside a pier, connect with cargo hoses or marine loading arms. Another method involves mooring to offshore buoys, such as a single point mooring, and", "-31.277976922341622" ], [ "Centrifugal water–oil separator Mechanism A mix of oil and water is pumped constantly into a cone-shaped separating apparatus at an angle, which creates a spinning vortex. The filtration is a result of the force balance that occurs on fluids in a vortex. High-density liquids will move to the outside, along with any contaminant, displacing the lower-density liquids to the inside (center of rotation). Water, being the more dense liquid, sits on the outside and is removed through a discharge outlet. Any segregated oil can now safely be recovered through a suction orifice at the center. The process will continue to", "-31.25057460635435" ], [ "the produced oil and is usually re-injected into the reservoir to minimize operating costs. The remainder is trapped in the oil reservoir by various means. Carbon dioxide as a solvent has the benefit of being more economical than other similarly miscible fluids such as propane and butane. Water-Alternating-Gas (WAG) Water-alternating-gas (WAG) injection is another technique employed in EOR. Water is used in addition to carbon dioxide. A saline solution is used here so that carbonate formations in oil wells are not disturbed. Water and carbon dioxide are injected into the oil well for larger recovery, as they typically", "-31.165128096472472" ], [ "dikes fully eliminate any sea water seepage in to the coastal reservoir by establishing fresh water seepage to the sea. The rain water falling on the coastal reservoir area and run off water from its catchment area is adequate to cater the seepage and evaporation losses from the coastal reservoir. The 180 km long, 1000 m gap between the two dikes is also used as deep water mega harbor for shipping, ship breaking, ship building, etc. For shipping purpose, the breakwater outer dike facing the sea is envisaged with few locks fitted with twin gates for access to the open", "-31.149596220231615" ], [ "areas near the ocean, seawater could be treated. Passarell The Passarell process uses reduced atmospheric pressure rather than heat to drive evaporative desalination. The pure water vapor generated by distillation is then compressed and condensed using an advanced compressor. The compression process improves distillation efficiency by creating the reduced pressure in the evaporation chamber. The compressor centrifuges the pure water vapor after it is drawn through a demister (removing residual impurities) causing it to compress against tubes in the collection chamber. The compression of the vapor increases its temperature. The heat is transferred to the input water falling in the", "-31.08321103011258" ], [ "These agencies require logs to be kept of any discharges of contaminated water. Gravity plate separator A gravity plate separator contains a series of oleophilic plates through which the contaminated water flows. The oil in the water coalesces on the underside of the plate eventually forming droplets before coalescing into liquid oil which floats off the plates and accumulates at the top of the chamber. The oil accumulating at the top is then transferred to waste oil tank on the vessel where it is later discharged to a treatment facility shore side. This type of Oily Water Separator is very", "-31.074085133819608" ], [ "water supply is replenished both from the land boundary on one side and the sea boundary on the other side. After excessive discharge, saline water from the sea boundary will enter the aquifer and disperse in the freshwater medium, threatening the viability of the aquifer for human use. Several different solutions to seawater intrusion in coastal aquifers have been proposed, including engineering methods of artificial recharge and implementing physical barriers at the sea boundary.\nChemical dispersants are used in oil spills to mitigate the effects of the spill and promote the degradation of oil particles. The dispersants effectively isolate pools on", "-31.03625449433457" ], [ "from breaking in half. This caused the cargo of light crude oil to be spilled which affected sea life. A temporary evacuation of the city of A Coruña was implemented in order to protect the citizens from the hazards of the oil smoke. Out of the 79,000 tonnes of crude oil that the ship was carrying, 67,000 tonnes managed to be spilled and the remaining was salvaged. The salvaged oil was retained through the use of booms, skimmers, and pumps. Since half of the ship was still above water, the rescue team used pumps to drain the still intact tanks.", "-30.984812286915258" ], [ "working with liquid nitrogen to alert workers of gas spills into a confined space.\nVessels containing liquid nitrogen can condense oxygen from air. The liquid in such a vessel becomes increasingly enriched in oxygen (boiling point −183 °C, higher than that of nitrogen) as the nitrogen evaporates, and can cause violent oxidation of organic material.", "-30.959348019954632" ], [ "method to improve the separation rate of water and salts from the bulk. In its unprocessed form, crude oil cannot be used directly in industrial processes because the presence of salts can corrode heat exchangers and distillation equipment. To avoid fouling due to these impurities it is necessary to first remove the salt, which is concentrated in suspended water droplets. Exposing batches of crude oil to both DC and AC high-voltage electric fields induces droplet deformation that ultimately causes the water droplets to coalesce into larger droplets. Droplet coalescence improves the separation rate of water from crude oil because the", "-30.94097256846726" ], [ "Inerting system Oil tankers Oil tankers fill the empty space above the oil cargo with inert gas to prevent fire or explosion of hydrocarbon vapors. Oil vapors cannot burn in air with less than 11% oxygen content. The inert gas may be supplied by cooling and scrubbing the flue gas produced by the ship's boilers. Where diesel engines are used, the exhaust gas may contain too much oxygen so fuel-burning inert gas generators may be installed. One-way valves are installed in process piping to the tanker spaces to prevent volatile hydrocarbon vapors or mist from entering other equipment. Inert", "-30.92167629719188" ], [ "114,000-barrel (18,100 m³) spill of light Louisiana crude oil released in conditions similar to those found in the Gulf would evaporate, that 50% to 60% of the oil would remain in or on the water, and the rest would be dispersed in the ocean. That means that over 100 million US gallons (2.4 Mbbl) of oil remained in the Gulf.\nThe wellhead was capped on 15 July 2010, and by 30 July, the surface oil appeared to have dissipated more rapidly than expected. Some scientists believe that the rapid dissipation of the surface oil may have been due to a combination of factors", "-30.904636387131177" ], [ "responded by stating that a lot of work remained. Using physical barriers such as floating booms, cleanup workers' objective was to keep the oil from spreading any further. They used skimmer boats to remove a majority of the oil and they used sorbents to absorb any remnant of oil like a sponge. Although that method did not remove the oil completely, chemicals called dispersants are used to hasten the oil's degradation to prevent the oil from doing further damage to the marine habitats below the surface water. For the Deep Horizon oil spill, cleanup workers used 1,400,000 US gallons (5,300,000 l;", "-30.894467579433694" ], [ "containers are usually equipped with relief valves that vent off excess pressure, but the tank can still fail if the pressure is not released quickly enough. Relief valves are sized to release pressure fast enough to prevent the pressure from increasing beyond the strength of the vessel, but not so fast as to be the cause of an explosion. An appropriately sized relief valve will allow the liquid inside to boil slowly, maintaining a constant pressure in the vessel until all the liquid has boiled and the vessel empties.\nIf the substance involved is flammable, it is likely that the resulting", "-30.892522812006064" ], [ "and Arab merchants. Watertight subdivision Watertight subdivision limits loss of buoyancy and freeboard in the event of damage, and may protect vital machinery from flooding. Most ships have some pumping capacity to remove accumulated water from the bilges, but a steel ship with no watertight subdivision will sink if water accumulates faster than pumps can remove it. Standards of watertight subdivision assume no dewatering capability, although pumps kept in working order may provide an additional measure of safety in the event of minor leaks. The most common watertight subdivision is accomplished with transverse bulkheads dividing the elongated hull into a", "-30.84467470087111" ], [ "the inlet pressure to the tank.\nAlthough it varies from application to application, blanketing systems usually operate at a slightly higher than atmospheric pressure (a few inches of water column above atmospheric). Higher pressures than this are generally not used as they often yield only marginal increases in results while wasting large amounts of expensive blanketing gas.\nSome systems also utilize inert gases to agitate the liquid contents of the container. This is desirable because products, such as citric acid, are added to food oils the tank will begin to settle over time with the heavier contents sinking to the bottom. However,", "-30.838849425286753" ], [ "hydrocarbon to make a low viscosity fluid which can be aerosolized to penetrate crevices. The volatile hydrocarbon then evaporates, leaving behind the oil. A propellant (originally a low-molecular-weight hydrocarbon, now carbon dioxide) creates pressure in the can to force the liquid through the can's nozzle before evaporating. The product is also sold in bulk as a liquid to industrial companies.", "-30.829012135465746" ], [ "kept a few percent less than atmospheric concentration to reduce fire risk.\nFresh water is produced by either an evaporator or a reverse osmosis unit. The primary use for fresh water is to provide feedwater for the reactor and steam propulsion plants. It is also available for showers, sinks, cooking and cleaning once propulsion plant needs have been met. Seawater is used to flush toilets, and the resulting \"black water\" is stored in a sanitary tank until it is blown overboard using pressurized air or pumped overboard by using a special sanitary pump. The blackwater-discharge system is difficult to operate, and", "-30.8271781455951" ], [ "other waste water into deep wells to dispose of the fluid without contaminating surface or ground water.", "-30.82363180204993" ], [ "surface (displacement method) and facing forward or down again before inhaling the next breath. The displacement method expels water by filling the snorkel with air; it is a technique that takes practice but clears the snorkel with less effort, but only works when surfacing. Clearing splash water while at the surface requires blast clearing.\nExperienced users tend to develop a surface breathing style which minimises work of breathing, carbon dioxide buildup and risk of water inspiration, while optimising water removal. This involves a sharp puff in the early stage of exhalation, which is effective for clearing the tube of remaining water,and", "-30.747919857485613" ], [ "Clean water production (Water for injection) A vapor-compression evaporator, like most evaporators, can make reasonably clean water from any water source. In a salt crystallizer, for example, a typical analysis of the resulting condensate shows a typical content of residual salt not higher than 50 ppm or, in terms of electrical conductance, not higher than 10 μS/cm. This results in a drinkable water, if the other sanitary requirements are fulfilled. While this cannot compete in the marketplace with reverse osmosis or demineralization, vapor compression chiefly differs from these thanks to its ability to make clean water from saturated or even", "-30.739664402179187" ], [ "oil or hazardous substances in harmful quantities into or upon U.S. navigable waters, or into or upon the waters of the contiguous zone, or which may affect natural resources in the U.S. EEZ (extending 200 miles (320 km) offshore). Coast Guard regulations prohibit discharge of oil within 12 miles (19 km) from shore, unless passed through a 15-ppm oil water separator, and unless the discharge does not cause a visible sheen. Beyond 12 miles (19 km), oil or oily mixtures can be discharged while a vessel is proceeding en route and if the oil content without dilution is less than 100 ppm. Vessels", "-30.732076962012798" ], [ "Removal The three basic approaches for removing the oil from the water were: burning the oil, filtering offshore, and collecting for later processing. On 28 April 2010, the USCG announced plans to corral and burn off up to 1,000 barrels (160 m³) of oil each day. In November 2010 the EPA reported that in-situ controlled burning removed as much as 13 million US gallons (49,000 m³) of oil from the water. Another source gives the figure as 265,000 barrels (11,100,000 US gal; 42,100 m³) of oil. There were 411 fires set between April to mid-July 2010 from which cancer-causing dioxins were released. The EPA stated that the", "-30.731418928597122" ], [ "Petrotrin oil spill Clean-up To clean up the oil spill, Petrotrin has opted to use the Corexit 9500 dispersant that was employed BP in the 2010 Deepwater Horizon oil spill. The purpose of oil dispersants is to accelerate the process of degrading oil. Oil that is spilled into a body of water will eventually break down naturally but it is a long process. The way that this dispersant functions is by breaking down oil into tiny droplets that are faster for nature to degrade. This allows two liquids that do not go well together, such as oil and water, to", "-30.723267323919572" ], [ "is intended to remove a large proportion of these contaminants before discharge to the environment (overboard to the sea). Design and operation All OWS equipment, new or old, can, in a laboratory setting, separate oil and water, do so automatically, and produce clean water for discharge overboard that contains no more than 15 parts per million oil. OWS equipment is approved by testing it with specific cocktails of mixed oil and water. Initially these combinations were very simple, basically no more than a mixture of clean water and diesel fuel, but they have become more sophisticated under MARPOL MEPC 107(49).", "-30.681977370753884" ], [ "that included the natural capacity of the region to break down oil (petroleum normally leaks from the ocean floor by way of thousands of natural seeps and certain bacteria can consume it.); winds from storms appeared to have aided in rapidly dispersing the oil, and the cleanup response by BP and the government helped control surface slicks. As much as 40% of the oil may have simply evaporated at the ocean surface, and an unknown amount remains below the surface.\nHowever, many scientists dispute the report's methodology and figures. Scientists said much oil was still underwater and could not be detected.", "-30.6669698204787" ], [ "the clean-up operations.\nThe third factor was the severe weather conditions that hampered efforts to clean up the oil. As a result, clean-up was restricted to manual retrieval of oil using buckets, hand nets, and scoops. Clean-up timeline Of the 1,300 tons of fuel oil that was spilt, some has been lost due to natural dispersion and evaporation by means of severe weather and rough seas. The oil was later emulsified due to the wave patterns which subsequently increased the area and volume of the spill. Despite these occurrences, most of the oil reached the Lungkeng Ecological Preservation Area within the", "-30.656453463092475" ], [ "common in ships but it has some flaws that decrease efficiency. Oil particles that are twenty micrometers or smaller do not get separated. The variety of oily wastes in bilge water can limit removal efficiency especially when very dense and highly viscous oils such as bunker oil are present. Plates must be replaced when fouled, which increases the costs of operation. Electrochemical Wastewater purification of oils and contaminants by electrochemical emulsification is actively in research and development. Electrochemical emulsification involves the generation of electrolytic bubbles that attract pollutants such as sludge and carry them to the top of the", "-30.64923337684013" ], [ "improvement in existing well production. Gas injection Gas injection or miscible flooding is presently the most-commonly used approach in enhanced oil recovery. Miscible flooding is a general term for injection processes that introduce miscible gases into the reservoir. A miscible displacement process maintains reservoir pressure and improves oil displacement because the interfacial tension between oil and water is reduced. This refers to removing the interface between the two interacting fluids. This allows for total displacement efficiency.\nGases used include CO₂, natural gas or nitrogen. The fluid most commonly used for miscible displacement is carbon dioxide because it reduces the oil viscosity", "-30.642311890784185" ], [ "required to render produced water fit for reinjection may be equally costly.\nAs the volumes of water being produced are never sufficient to replace all the production volumes (oil and gas, in addition to water), additional \"make-up\" water must be provided. Mixing waters from different sources exacerbates the risk of scaling.\nSeawater is obviously the most convenient source for offshore production facilities, and it may be pumped inshore for use in land fields. Where possible, the water intake is placed at sufficient depth to reduce the concentration of algae; however, filtering, deoxygenation and biociding is generally required.\nAquifer water from water-bearing formations other", "-30.641559206007514" ], [ "placed near the top of tanks, where they are less efficient. An hydraulic tanker requires a larger volume of void space for buoyancy than conventionally loaded tanks, because the empty, or ballasted, condition of tanks filled with water is heavier than the loaded condition of tanks filled with oil. A heavier ballasted condition may also increase round trip fuel consumption.\nMany petroleum compounds have limited solubility in water. Low solubility is typically of negligible concern with respect to product loss, but toxic petroleum products may be regarded as pollution in the water displaced as a tank is loaded with petroleum. The", "-30.608932908071438" ], [ "surface of the water being kept as large as possible which is reached by a very fine nebulization of the water. A special nozzle and sufficient process water pressure provide for the nebulization degree. Also hydrophobic substances, such as rubber or plastic, can be extinguished or the water quantity can be minimized by adding relaxant agents.\nIn some cases, water is not appropriate as extinguishing agent (e.g. light metals cannot be extinguished using water) or the process is disturbed (e.g. gluing in the sugar industry).\nTherefore, deflectors for material bypassing purposes or sliders and flaps to shut off the conveying flow are", "-30.55837440385949" ], [ "be filled reducing the quantity of water to be bailed out after the paddler re-entry while maintaining flotation and stability of the hull. In some situations it is possible to empty the water in the seasock by turning it inside out.\nThough it is used in kayaks of various shapes and sizes, it is almost a compulsory accessory for paddlers with high volume kayaks that have no bulkheads, where the quantity of water filling the kayak could be unmanageable and in \"skin-on-frame\" kayaks where the construction method makes the adoption of bulkheads impractical. It should be used in conjunction with flotation", "-30.52506224368699" ], [ "of water per minute, at pressures ranging from 500–20,000+ psi. Once the injection process is complete and gas has entered the well, anywhere between 10 and 30 percent of the fluid injected will flow back into the well as wastewater for disposal. In addition to the chemical additives present in fracking fluid, flowback water contains dangerous volatile hydrocarbons, such as hydrogen sulfide pulled from the fractured rock. Workers must use handheld gauges to check fluid levels via hatches on top of wells and when doing so they may be exposed to dangerous plumes of gas and vapor containing the", "-30.508932308090152" ], [ "chemicals, pitch, particles, and other materials. Discharge of bilge liquids may be restricted and for commercial vessels is regulated under Marpol Annex I.\nBy housing water in a compartment, the bilge keeps these liquids below decks, making it safer for the crew to operate the vessel and for people to move around in heavy weather. Bilge maintenance Methods of removing water from bilges have included buckets and pumps. Modern vessels usually use electric bilge pumps controlled by automated bilge switches. Bilge coatings are applied to protect the bilge surfaces. The water that collects is often noxious, and \"bilge water\" or just", "-30.503341478295624" ], [ "in the region, leading to many being unable to fish as well as others losing occupational tools such as nets due to oil damage. Cleanup Effort Mobil responded with a range of equipment to clean the spill, including boats, skimmers, and coastal protection equipment. Warm weather and favorable tides also made it so that much of the oil stayed off the coastline and evaporated, and this was aided by the use of dispersants through helicopters and boats. This led to 60% of the spilled oil naturally dispersing. Containment boons and oil skimmers were also used to control the remaining spilled", "-30.491404846921796" ], [ "a spill occurs and the vapor does not ignite, it would build to higher concentrations. At higher concentrations, the vaporized methane will cause an asphyxiation hazard to anyone exposed. If a spill or leak followed by a vaporization event were to occur in or near water, then water in contact with the spilled LNG can accelerate the vaporization process and increase the concentration of vapor in the immediate area. According to the 2004 Sandia report, this is of special concern to ship and pilot-boat crews, emergency response personnel or others who are exposed in a marine environment.\nAn ignition source close", "-30.470112585935567" ], [ "a dry gas stream (gas is always readily available in the oilfield). The filtered water drops into the de-oxygenation tower, splashing onto a series of trays, causing dissolved oxygen to be lost to the gas stream.\nAn alternative method, also used as a backup to deoxygenation towers, is to add an oxygen scavenging agent such as sodium bisulfite and ammonium bisulphite.\nAnother option is to use membrane contactors. Membrane contactors bring the water into contact with an inert gas stream, such as nitrogen, to strip out dissolved oxygen. Membrane contactors have the advantage of being lower weight and compact enabling smaller system", "-30.459367206785828" ], [ "difficult and depends upon many factors, including the type of oil spilled, the temperature of the water (affecting evaporation and biodegradation), and the types of shorelines and beaches involved. Other factors influencing the rate of long-term contamination is the continuous inputs of petroleum residues and the rate at which the environment can clean itself Spills may take weeks, months or even years to clean up. Volatile organic compounds Volatile organic compounds (VOCs) are gases or vapours emitted by various solids and liquids.\" Petroleum hydrocarbons such as gasoline, diesel, or jet fuel intruding into indoor spaces from underground storage tanks or", "-30.438567112665623" ], [ "be used in combination with the aforementioned stiff brush conveyors and a shorter sweeping boom to collect oil in 2-metre (7 ft) swell. The system consists of a dampening channel that guides the oil to the recovery system on the other side of the ship. Spilled oil surrounded by oil booms can also be collected by two free-floating skimmers connected to the vessel by a flexible pipe.\nAs the recovery systems designed for open water can not be used efficiently or at all during wintertime, Louhi is also equipped with two recovery systems capable of collecting spilled oil from the sea in", "-30.405734901782125" ], [ "settling tanks, which were submerged by the high-tide or were filled manually when the tide was lower. The depth of these tanks suggests that they were designed to allow the alluvial mud and other unwanted solids in the water to settle to the bottom, to be emptied out later. As this settling procedure could take several hours, having more than one tank allowed for them to be at different stages of the settling process, meaning that salt making could continue with little down-time.\nSea-water contains around 3.5 per cent solids on average, 2.7 per cent being salt, with 96.5ccs of sea-water", "-30.380654951179167" ], [ "unwanted combustion.\nTank blanketing is also used to keep contaminants out of a storage space. This is accomplished by creating positive pressure inside the container. This positive pressure ensures that if a leak should occur, the gas will leak out rather than having the contaminants infiltrate the container. Some examples include its use on purified water to keep unwanted minerals out and its use on food products to keep contaminants out.\nTo ensure their safety, gas-blanketing systems for food use are regulated by the U.S. Food and Drug Administration (FDA) and must adhere to strict maintenance schedules and follow all product-contact regulations", "-30.369356940384023" ], [ "ends up directly in the environment is due to general public discharging it onto the ground, into drains and directly into landfills as trash. Other direct contamination sources include runoff from roadways, accidental spillages, natural or man-made disasters and pipeline leakages.\nImprovement in filtration technologies and processes has now made recycling a viable option (with rising price of base stock and crude oil). Typically various filtration systems remove particulates, additives and oxidation products and recover the base oil. The oil may get refined during the process. This base oil is then treated much the same as virgin base oil however there", "-30.36804559128359" ], [ "in environmental remediation, for cleanup of either soil or groundwater contamination. Injection wells can insert clean water into an aquifer, thereby changing the direction and speed of groundwater flow, perhaps towards extraction wells downgradient, which could then more speedily and efficiently remove the contaminated groundwater. Injection wells can also be used in cleanup of soil contamination, for example by use of an ozonation system. Complex hydrocarbons and other contaminants trapped in soil and otherwise inaccessible can be broken down by ozone, a highly reactive gas, often with greater cost-effectiveness than could be had by digging out the affected", "-30.357394523336552" ], [ "Dissolved air flotation Dissolved air flotation (DAF) is a water treatment process that clarifies wastewaters (or other waters) by the removal of suspended matter such as oil or solids. The removal is achieved by dissolving air in the water or wastewater under pressure and then releasing the air at atmospheric pressure in a flotation tank basin. The released air forms tiny bubbles which adhere to the suspended matter causing the suspended matter to float to the surface of the water where it may then be removed by a skimming device.\nDissolved air flotation is very widely used in treating the industrial", "-30.30016521300422" ], [ "the oil reservoir, it is usually necessary to drill into the Earth's crust, although surface oil seeps exist in some parts of the world, such as the La Brea tar pits in California, and numerous seeps in Trinidad. Drive mechanisms A virgin reservoir may be under sufficient pressure to push hydrocarbons to surface. As the fluids are produced, the pressure will often decline, and production will falter. The reservoir may respond to the withdrawal of fluid in a way that tends to maintain the pressure. Artificial drive methods may be necessary. Solution-gas drive This mechanism (also known as depletion", "-30.285299701063195" ], [ "crystallizing brines with total dissolved solids (TDS) up to 650 g/L. The other two technologies can make clean water from sources no higher in TDS than approximately 35 g/L.\nFor economic reasons evaporators are seldom operated on low-TDS water sources. Those applications are filled by reverse osmosis. The already brackish water which enters a typical evaporator is concentrated further. The increased dissolved solids act to increase the boiling point well beyond that of pure water. Seawater with a TDS of approximately 30 g/L exhibits a boiling point elevation of less than 1 K but saturated sodium chloride solution", "-30.250378237629775" ], [ "the leaked oil \nDuring the eight days the fire lasted, firefighters were continuously cooling the ship with both water and, once the fire had sufficiently died down, with foam cannons.\nOne, however experimental, part of the cleanup process was the release of about 100 pounds of bacteria over an acre of the slick. Known as bioremediation, this process has been used in labs, but never before on the open ocean. The microbes work by breaking down oil by “eating” it and turning the “hydrocarbons into more benign byproducts.” The only drawback to this method is that scientists are unsure", "-30.238014090460638" ], [ "and/or cleanup operations.\nConcerns were raised about the appearance of underwater, horizontally extended plumes of dissolved oil. Researchers concluded that deep plumes of dissolved oil and gas would likely remain confined to the northern Gulf of Mexico and that the peak impact on dissolved oxygen would be delayed and long lasting.\nTwo weeks after the wellhead was capped on July 15, 2010, the surface oil appeared to have dissipated, while an unknown amount of subsurface oil remained. Estimates of the residual ranged from a 2010 NOAA report that claimed about half of the oil remained below the surface to independent estimates of", "-30.20120842847973" ], [ "Once a filter has reached its limit, it will not allow contaminated water to be drunk. The LiveSaver bottle has been used by soldiers for drinking water as well as cleaning wounds.\nTo filter the water, one puts contaminated water in the back of the bottle, then screws the lid on. The lid has a built in pump which is operated manually with a hand; the pumping action forces the contaminated water through the nano-filter and safe drinking water collects in another chamber in the bottle. The drinker then opens the top of the bottle from which safe drinking water comes", "-30.196538533520652" ], [ "purify the water. Ozone is delivered (sparged) as a gas in either a dry air or oxygen carrier gas. Specialized equipment is required for in-situ oxidation via ozone gas injection. The ozone has to be pumped into the groundwater from the bottom of the aquifer because the ozone gas is less dense than the water. As the ozone travels through the aquifer against gravity, it reacts with contaminants along the way. However, there are some specific methods of oxidant delivery including injection probes, hydraulic fracturing, soil mixing, vertical wells, horizontal wells, and treatment walls. Injection probes Injection probes are", "-30.194102763198316" ], [ "Produced water, the densest phase, settles out at the bottom of the separator, oil floats on the top of the produced water phase, and gas occupies the upper part of the separator. \nOil from the first stage separator may be cooled or heated in a heat exchanger to aid further separation. Oil is then routed either to a second stage separator, operating at a lower pressure than the first stage to further separate oil/gas/water, or to a coalescer to further remove water. Several stages of separation, operating at successively lower pressures, aim to reduce the amount of", "-30.187287800385093" ], [ "fluid, but will then expand and become light once pressure is removed. This means that having displaced the kill fluid, it will not itself kill the well. Low density (\"light\") liquids such as diesel fuel, or the \"base fluid\" for a \"(synthetic) oil-based mud\" can also be used, depending on availability and pressure-management issues for a specific well. The reservoir fluids should be able to flow to surface, displacing the gas.\nThe cheapest way to do it is similar to bullheading, where the light fluid (nitrogen, or low density liquid) is pumped in under high pressure to force the", "-30.16439937717223" ], [ "bulk from shifting enough to endanger the vessel and its crew. Tank Fluids are the easiest thing to shift, and the most dangerous due to the free surface effect. As a boat rolls, liquids tend to shift towards the lowest part of the vessel. This is the free surface effect. When this happens more weight is now being thrown towards the low side and will cause a more severe roll or potential capsize. To minimize/reduce this risk, tanks are built in sections split up by perforated panels. These panels prevent sloshing, but still allow liquid to transfer keeping the levels", "-30.16338890301995" ], [ "the distance the gas passes through the absorbent material, and the size of the gaps between the grains, as well as the gas composition and ambient pressure. Water in the loop can greatly increase the resistance to gas flow through the scrubber. There is even less point in shallow or skip breathing on a rebreather as this does not even conserve gas, and the affect on buoyancy is negligible when the sum of loop volume and lung volume remains constant. Procedures The underwater environment is unfamiliar and hazardous, and to ensure diver safety, simple, yet necessary procedures must be followed.", "-30.150772861452424" ], [ "injects liquid carbon at least 3000 m below the surface directly into ocean sediments to generate carbon dioxide hydrate. Two regions are defined for exploration: the negative buoyancy zone (NBZ), which is the region between liquid carbon dioxide denser than surrounding water and where liquid carbon dioxide has neutral buoyancy, and hydrate formation zone (HFZ), which typically has low temperatures and high pressures. Several research models have shown that the optimal depth of injection requires consideration of intrinsic permeability and any changes in liquid carbon dioxide permeability for optimal storage. The formation of hydrates decreases liquid carbon dioxide permeability, and injection", "-30.10611100780079" ], [ "in the Clean Water Act limit what may be discharged to sea from an OWS in USA waters. Current limits are < 15 mg/l oil for discharges within 12 nautical miles of shore or 100 mg/l outside that limit. Europe and Canada European countries and Canada have stricter rules on discharge and discharges must contain less than 5 mg/l of contaminants.\nThe discharge of oil contaminated waters are also subject to international controls such as the International Convention for the Prevention of Pollution from Ships (MARPOL), and International Maritime Organization (IMO). These organizations set strict limits to protect marine life and coastal environments.", "-30.0946573758265" ], [ "directly into oil at the source\".\nDispersants are said to facilitate the digestion of the oil by microbes. Mixing the dispersants with the oil at the wellhead would keep some oil below the surface and in theory, allow microbes to digest the oil before it reached the surface. Various risks were identified and evaluated, in particular that an increase in the microbe activity might reduce the oxygen in the water. The use of dispersants at the wellhead was pursued and NOAA estimated that roughly 409,000 barrels (65,000 m³) of oil were dispersed underwater.\nBy 12 July 2010, BP had reported applying 1.07 million US", "-30.061259394580702" ], [ "than the oil reservoir, but in the same structure, has the advantage of purity where available.\nRiver water will always require filtration and biociding before injection. Filters The filters must clean the water and remove any impurities, such as shells and algae. Typical filtration is to 2 micrometres, but really depends on reservoir requirements. The filters are so fine so as not to block the pores of the reservoir. Sand filters are a common used filtration technology to remove solid impurities from the water. The sand filter has different beds with various sizes of sand granules. The sea water traverses the", "-30.05354604808963" ], [ " While some water disposal is permitted in wells – indeed, wastewater is often used to recharge oil reservoirs to improve recovery – industrial wastewater is considered to be a greater danger to drinking water and must be treated differently, and can only be injected into wells meeting specific criteria. Injecting such water into Class II wells is a violation of the federal Safe Drinking Water Act of 1974.\nOn December 7, 2007, Greka spilled over 58,000 US gallons (220 m³) of oil at their Bell Lease in the Cat Canyon Field along Palmer Road southwest of Santa Maria. Greka's", "-30.01980161992833" ], [ "double hull tankers, in high energy casualties where both hulls are breached, oil can spill through the double-hull and into the sea. In grounding events of this type, a mid-deck design overcomes this by eliminating the double-bottom compartments that are void with air. Since the density of seawater is greater than that of oil, water comes into the tanks instead of oil escaping out, and rather than spilling, oil is vented upwards into overflow tanks.\nIf the Exxon Valdez had been a Mid-Deck ship, she would have spilled very little oil. Coulombi Egg Tanker A variation on the Mid-Deck Tanker is", "-30.00885002396535" ], [ "of the dissolved water from the fuel. The separated water then drops to the bottom of the tank, because it is denser than the fuel. Since the water is no longer in solution, it can form droplets which can supercool to below 0 °C. If these supercooled droplets collide with a surface they can freeze and may result in blocked fuel inlet pipes. This was the cause of the British Airways Flight 38 accident. Removing all water from fuel is impractical; therefore, fuel heaters are usually used on commercial aircraft to prevent water in fuel from freezing.\nThere are several methods for", "-29.997747466666624" ], [ "properties of the liquid and its density. Plastic tanks cannot hold very dense liquids at high wall levels. Large, exposed bunding will need a sump pump or some other system to remove precipitation, though it may also be used to transfer spilled liquid into another container. Rainwater must be treated if the liquid being stored is toxic because there may be small amounts of it surrounding the tank.\nThe bund may have a roof to prevent precipitation from getting in, but steps must be taken to provide adequate ventilation when storing flammable liquids. If the wall is over a meter high,", "-29.995847299927846" ], [ "\"which led the water vapour to expand in volume, leading to explosions if it could not escape.\nThe vessel was left to dry in direct sunlight when the light was weak, in the shade when it was strong, or in a closed room when it was raining or cold. The drying process could take several days, depending on the humidity, the size, wall-thickness, and porosity of the vessel. Even when drying was complete, vessels remained between 3-5% saturated with water, which was only expelled during the firing process. Firing In the firing process, the clay is transformed from a malleable material", "-29.988194863835815" ], [ "appear on the exterior surfaces of most things in the immediate area. Water storage Water barrels are often used to collect the rainwater from dwellings (so that it may be used for irrigation or other purposes). This usage, known as rainwater harvesting, requires (besides a large rainwater barrel or water butt) adequate (waterproof) roof-covering and an adequate rain pipe. Oil storage Wooden casks of various sizes were used to store whale oil on ships in the age of sail. Its viscous nature made sperm whale oil a particularly difficult substance to contain in staved containers and oil coopers were probably", "-29.976788035652135" ], [ "water runs smooth and crude runs slower. This will make the pressure vary, and the pipeline will burst (M.A.A). Contaminants Produced crude oil leaving the well may contain large quantities of sulfur (contains e.g. hydrogen sulfide and sulfuric acid) and is then called \"sour\". The sulfur can be very difficult to remove since it may be bound to molecules in the crude and encapsulated in this. The most usual \"crude sweetening packages\" use glycol and/or fatty acids to remove the sulphur content. Crude that contains water is called \"wet\", and the water can then be bound in an emulsion in", "-29.97512019891292" ], [ "surface can be trimmed easily by replacing gasoline with water, which is denser.\nAuguste Piccard, inventor of the first bathyscaphe, composed the name bathyscaphe using the Ancient Greek words βαθύς bathys (\"deep\") and σκάφος skaphos (\"vessel\"/\"ship\"). Mode of operation To descend, a bathyscaphe floods air tanks with sea water, but unlike a submarine the water in the flooded tanks cannot be displaced with compressed air to ascend, because the water pressures at the depths for which the craft was designed to operate are too great. For example, the pressure at the bottom of the Challenger Deep is more than seven", "-29.96062384196557" ], [ "ambient temperature and are full of methane.\nThe next stage is cool-down. LNG is sprayed into the tanks via spray heads, which vaporises and starts to cool the tank. The excess gas is again blown ashore to be re-liquified or burned at a flare stack. Once the tanks reach about −140 °C (−220 °F) the tanks are ready to bulk load.\nBulk loading starts and liquid LNG is pumped from the storage tanks ashore into the vessel tanks. Displaced gas is blown ashore by the HD compressors. Loading continues until typically 98.5% full is reached (to allow for thermal expansion/contraction of cargo).\nThe vessel can", "-29.958922299643746" ], [ "more than 42,000 gallons of oil products in buried containers that could reasonably be expected to discharge oil into waters of the United States.\nEnacting H.R. 311 would ease some compliance requirements for farmers, depending on the capacity of oil product containers located on a farm and whether a farm has previously experienced any spills. Specifically, under the bill, certification of compliance with the EPA rule by a professional engineer would only be required if the farm has an individual tank with a storage capacity greater than 10,000 gallons, has an aggregate storage capacity greater than or equal to 42,000 gallons,", "-29.954871548899973" ], [ "from the members of the Barron Lab of Rice University, Houston, Texas.\nIn 2014, Hayley Todesco from Canada received the prize for inventing a method that uses sand filters to treat oil contaminated water and recover water for reuse.\nIn 2013, Naomi Estay and Omayra Toro from Chile received the prize for their work on how living organisms can help clean oil spills in extremely low temperatures.\nIn 2012, Luigi Marshall Cham, Jun Yong Nicholas Lim and Tian Ting Carrie-Anne Ng, Singapore, won the Stockholm Junior Water Prize for their research on how clay can be used in a low cost method to", "-29.922508745876257" ] ]
1wk311
Why do my eyes turn bloodshot red after smoking cannabis ?
[ "This is extremely common and well known to occur after smoking cannabis. The main compound in cannabis that gets you high, THC, is a powerful vasodilator! This means that THC lowers blood pressure and widens the veins and capillaries throughout your body, including the ones in your eyes, allowing for more blood flow to these areas. This dilation of blood vessels is also why many people experienced a flushed/red face when high on cannabis, and the drop in blood pressure explains why many people may feel dizzy while high.", "If you smoke enough and concentrate, you can shoot laser beams from your eyes", "\"for clarity\" Yeah, man, do it for clarity. Dat clarity kush." ]
[ [ "common and more pronounced in smokers, and becomes less noticeable when smoking is stopped. Smoking cannabis is known to be linked to this condition. It may also develop in areas subjecte to repeat subclinical irritation, caused by low grade irritants such as spices, oral debris or tobacco. Diagnosis Leukoedema lesions disappear when the mucosa is stretched, which helps to differentiate it from other white lesions in the mouth. The differential diagnosis is with leukoplakia, oral candidiasis, oral lichen planus, white sponge nevus, morsicatio buccarum, hereditary benign intraepithelial dyskeratosis and dyskeratosis congenita. Tissue biopsy is not indicated, but when taken, the", "-35.51588377763983" ], [ "blood pressure followed by heart failure eventually leading to shock and death.\nBecause hemoglobin is a darker red when it is not bound to oxygen (deoxyhemoglobin), as opposed to the rich red color that it has when bound to oxygen (oxyhemoglobin), when seen through the skin it has an increased tendency to reflect blue light back to the eye. In cases where the oxygen is displaced by another molecule, such as carbon monoxide, the skin may appear 'cherry red' instead of cyanotic. Hypoxia can cause premature birth, and injure the liver, among other deleterious effects. Local hypoxia If tissue is not", "-33.78507238145539" ], [ "that Green’s drug consumption was as \"insignificant as the color of his eyes\" as the cause of death.\nHowever, under cross-examination, Jiraki testified that there was no swelling noted in the report, nor any fractures to the skull. In the trial of Sgt. Douglas, Jiraki reduced the number of blows to seven (which fit with Nevers’ testimony). And, at Nevers' second trial, Dr. Cassin testified that he examined the body the day after Dr. Jiraki made his examination (this second exam was never disclosed to the defense prior to, or during, the first trial) and that drugs played a major", "-32.811844581505284" ], [ "high on marijuana when the Black Gas came; he explains that the chemicals make the mind and body change, creating an insatiable hunger and a primitive desire to eat and kill. He gives them the keys to his boat and then begs for death. As Tyler and Soo battle off a group of islanders, the doctor warns them that the toxin from the Black Gas is excreted from the tears and saliva of the infected. The couple makes a break for the boat but once they escape the island, Soo realises that Tyler has become infected and she has to", "-32.3340157690036" ], [ "is inhaled, the smoke paralyzes the cilia, causing mucus to enter the lungs. Frequent smoking, over time causes the cilia hairs to die and can no longer filter mucus. Tar from the smoke inhaled enters the lungs, turning the pink-coloured lungs black. The accumulation of this tar could eventually lead to lung cancer, or chronic obstructive pulmonary disease. Chronic obstructive pulmonary disease Chronic obstructive pulmonary disease (COPD) is a common lower respiratory disease that can be caused by exposure to harmful chemicals, or prolonged use of tobacco. This disease is chronic and progressive, the damage to the lungs is irreversible", "-32.17510528070852" ], [ "grounds for a ban on driving, the Finnish Parliamentary Ombudsman issued a statement condemning the practice.\nTHC in saliva is said to be an index of recent cannabis smoking and closely linked to the effects of intoxication however in another study, volunteers were recruited to consume cannabis and subsequent levels of THC taken from saliva. The amounts detected were only above the level of the DrugWipe at 10 ng/ml for 70 minutes with volunteers reporting feeling intoxicated for a further 2 hours.\nAs this 1999 DEA Bulletin shows, Drugwipe is still effective when testing 'Black Cocaine' even when chemical tests fail to detect.\n\"At", "-31.822544809780084" ], [ "of metabolic diseases, called alkaptonuria. This disorder is due to the inability of the body to deal with homogentisate, which when oxidized by the body will produce the compound known as the ochronotic pigment, which causes a black color, and has several negative effects.\nThis first of these effects is that the patient’s earwax will begin to turn black or red, depends on the patient’s diet, since the blood becomes oxidized and thus turns black due to excess of the ochronotic pigment. The other effect of the ochronotic pigment is that it can accumulate in the body’s connective tissue", "-31.698050752165727" ], [ "age with dark eyebrows but gray hair are significantly more likely to have type II diabetes than those with both gray eyebrows and hair. Artificial factors A 1996 British Medical Journal study found that tobacco smoking may cause premature graying. Smokers were found to be four times more likely to begin graying prematurely, compared to nonsmokers.\nGray hair may temporarily darken after inflammatory processes, after electron-beam-induced alopecia, and after some chemotherapy regimens. Much remains to be learned about the physiology of human graying.\nThere are no special diets, nutritional supplements, vitamins, or proteins that have been proven to slow, stop, or in", "-31.650311439705547" ], [ "the powder or mist form can cause redness and pain in the eyes (i.e. conjunctivitis) in small doses. Small doses absorbed through the eyes can also cause tearing (lacrimation). Higher doses can cause tissue damage, severe bleeding at the back of the eye (retinal hemorrhage), and vision impairment or blindness. A large enough dose can be absorbed into the bloodstream and lead to systemic toxicity. Treatment Because no antidote exists for abrin, the most important factor is avoiding abrin exposure in the first place. If exposure cannot be avoided, the most important factor is then getting the abrin off or", "-31.4996169435326" ], [ "urine, typically to a dark orange to reddish color. This effect is common and harmless, and indeed a key indicator of the presence of the medication in the body. Users of phenazopyridine are warned not to wear contact lenses, as phenazopyridine has been known to permanently discolor contact lenses and fabrics. Some may be mistakenly concerned that this indicated blood in the urine.\nPhenazopyridine can also cause headaches, upset stomach (especially when not taken with food), or dizziness. Less frequently it can cause a pigment change in the skin or eyes, to a noticeable yellowish color. This is due to a", "-31.208750235440675" ], [ "the liver (particularly with co-existing hepatitis C), lungs, heart, and vasculature\". The authors cautioned that \"evidence is needed, and further research should be considered, to prove causal associations of marijuana with many physical health conditions\". Brain Imaging studies suggest that long-term exposure does not lead to decreases in white matter or grey matter volume, but may lead to reductions in hippocampal volume. Variations in the methodologies used lend some uncertainty to this conclusion. Heart and circulation The acute effects of cannabis use in humans include a dose-dependent increase in heart rate, typically accompanied by a mild increase in blood", "-31.192200602265075" ], [ "but due to studies in the late 1990s it became apparent that its precursor is cannabigerolic acid, which goes through oxidocyclization through the actions of the enzyme THCA-synthase.\nIt is unstable, and slowly decarboxylates into THC during storage, and the THC itself slowly degrades to cannabinol, found with potential immunosuppressive and anti-inflammatory activities. When heated or burned, as when cannabis is smoked or included in baked goods, the decarboxylation is rapid but not complete; THCA is detectable in people who smoke or otherwise consume cannabis. Legal status THCA is not scheduled by the United Nations' Convention on Psychotropic Substances. United", "-31.17322005389724" ], [ "may occur at the end of the dosing interval, where a patient may feel Parkinson's symptoms. Urine, saliva, or sweat may be discolored (dark color such as red, brown, or black) after taking carbidopa/levodopa/entacapone. Prostate cancer On March 31, 2010, the United States Food and Drug Administration stated it is evaluating long-term clinical data from STRIDE-PD which found that a greater number of patients taking Stalevo had prostate cancer compared to those taking carbidopa/levodopa. Other controlled clinical trials evaluating carbidopa/levodopa/entacapone or entacapone did not find an increased risk of prostate cancer. FDA is still reviewing the available information and has", "-31.11428904821514" ], [ "a tanning agent, however, much larger quantities are used. After canthaxanthin is consumed, it is deposited throughout the body, including in the layer of fat below the skin, which turns an orange-brown color. These types of tanning pills have been linked to various side effects, including hepatitis and canthaxanthin retinopathy, a condition in which yellow deposits form in the retina of the eye. Other side effects including damage to the digestive system and skin surface have also been noted. The FDA withdrew approval for use of canthaxanthin as a tanning agent, and has issued warnings concerning its use. DHA-based products", "-31.02739037241554" ], [ "using it, since THC is stored in the fat cells, leading to a low-grade haze long after the primary high is gone. This myth is based primarily on anecdotal evidence and the known fact that urine drug tests remain positive for at least several days after using, and longer for regular users. The tests however measure non-psychoactive metabolites, not active THC. And the blood levels of THC generally fall well below the psychoactive threshold within 2–4 hours of smoking (4–8 hours after oral use). A cannabis equivalent of a hangover may occur the morning after taking", "-30.967586825951003" ], [ "Red eye (medicine) Visual acuity A reduction in visual acuity in a 'red eye' is indicative of serious ocular disease, such as keratitis, iridocyclitis, and glaucoma, and never occurs in simple conjunctivitis without accompanying corneal involvement. Ciliary flush Ciliary flush is usually present in eyes with corneal inflammation, iridocyclitis or acute glaucoma, though not simple conjunctivitis.\nA ciliary flush is a ring of red or violet spreading out from around the cornea of the eye. Corneal abnormalities The cornea is required to be transparent to transmit light to the retina. Because of injury, infection or inflammation, an area of opacity may", "-30.960598123259842" ], [ "or in those who ceased use earlier in adulthood.\nThere has been a limited amount of studies that have looked at the effects of smoking cannabis on the respiratory system. Chronic heavy marijuana smoking is associated with coughing, production of sputum, wheezing, coughing, and other symptoms of chronic bronchitis. Regular cannabis use has not been shown to cause significant abnormalities in lung function.\nCannabis smoke contains thousands of organic and inorganic chemical compounds. This tar is chemically similar to that found in tobacco smoke, and over fifty known carcinogens have been identified in cannabis smoke, including nitrosamines, reactive aldehydes, and", "-30.854107494815253" ], [ "is present in veins, and can be seen during blood donation and when venous blood samples are taken. This is because the spectrum of light absorbed by hemoglobin differs between the oxygenated and deoxygenated states.\nBlood in carbon monoxide poisoning is bright red, because carbon monoxide causes the formation of carboxyhemoglobin. In cyanide poisoning, the body cannot utilize oxygen, so the venous blood remains oxygenated, increasing the redness. There are some conditions affecting the heme groups present in hemoglobin that can make the skin appear blue – a symptom called cyanosis. If the heme is oxidized, methemoglobin, which is more brownish and", "-30.83783863559529" ], [ "has turned blood red which authorities believed to be caused by a dye. The Environmental Protection Agency is still investigating the source of the discolouration.", "-30.788785141310655" ], [ "cannabis. Spotting cannabis oil or resin is thought to be particularly harmful to the lungs, as the smoke comes off the oil at such a high temperature. One possible way of minimizing the risks of spotting marijuana is using cooler knives, leading to the tetrahydrocannabinol (THC) being vaporised rather than the entire plant matter being burnt. Some users also fill the lower half of the spottle with ice (that stays in place by being frozen to the edges of the spottle), but much more common is to just freeze the bottle, which leads to a cooler smoke that is less", "-30.719599597592605" ], [ "barbiturates. Duquenois-Levine reagent is a series of chemical solutions that turn to the color of purple when the vegetation of marijuana is added. Van Urk reagent turns blue-purple when in the presence of LSD. Scott Test's chemical solution shows up as a faint blue for cocaine base. \nIn recent years, the use of presumptive test kits in the criminal justice system has come under great scrutiny due to the lack to forensic studies, questioned reliability, rendering of false positives with legal substances, and wrongful arrests. Sweat drug screen Sweat patches are attached to the skin to collect sweat over a", "-30.51168694464286" ], [ "told the coroner he believed the death was due to hypersensitivity to either cannabis or equagesic. However, Ronald D. Teare, a professor of forensic medicine at the University of London who was flown in to be the chief expert in the coroner's report, said that it was both \"irresponsible and irrational\" to attribute either edema to cannabis, and concluded the fatal edema was due to a rare reaction to equagesic. Teare, who had supervised nearly 100,000 autopsies and provided evidence for nearly 20,000 inquests in his 35 years of experience, was echoed by R. R. Lycette, the clinical pathologist at", "-30.43754118408833" ], [ " The catheter has a very small video camera on the end of it so that the doctor can find the arteries.\nOnce he has found the arteries, he injects a dye in them so that he/she can detect any blockages in the arteries. The dye is able to be seen on a special x-ray machine.\nThe test takes one to two hours. Not smoking A study showed that those who quit smoking reduced their risk of being hospitalized over the next two years.\nSmoking increases blood pressure, as well as increases the risk of high cholesterol. Quitting can lower blood pressure,", "-30.43382031400688" ], [ "coughing, wheezing, sputum production, and acute bronchitis. It has been suggested that the common practice of inhaling cannabis smoke deeply and holding breath could lead to pneumothorax. In a few case reports involving immunocompromised patients, pulmonary infections such as aspergillosis have been attributed to smoking cannabis contaminated with fungi. The transmission of tuberculosis has been linked to cannabis inhalation techniques, such as sharing water pipes and 'Hotboxing'. Reproductive and endocrine effects A study released by the National Academies of Sciences, Engineering, and Medicine cited significant evidence for a statistical link between mothers who smoke cannabis during pregnancy and lower birth", "-30.408059441600926" ], [ "excreted in the urine where it is converted to an oxidized form, urobilin, which gives urine its characteristic yellow color. Drugs Enterohepatic circulation also means that some molecules which would not otherwise be very toxic can become so because of this recycling process. Pharmacokinetic Models of enterohepatic circulation Pharmacokinetic models of the enterohepatic circulation process has been summarized in a recent article.", "-30.334171862072253" ], [ "medication, porphyria, intra-abdominal bleeding, vaginal bleeding, neoplasm located in either bladder or kidneys pathways.\nIf urine looks dark yellow or similar to orange color, the causative factors might be recent uses of vitamin B-containing nutrient supplement, carotene, phenazopyridine, rifampin, warfarin and laxative.\nThe causation or contributing factors of the urine color change to green or blue are those artificial colors seen in foods and drugs, or bilirubin medicines such as methylene blue, and urinary tract infections. Diagnosis Doctor may prescribe some tests to help get the full picture of the situation, such as blood tests, liver function tests, ultrasound for kidneys and", "-30.30125853708887" ], [ "first question, studies are mixed. Several recent, extensive studies--including one conducted by the National Highway Traffic Safety Administration and one conducted by the American Automobile Association (AAA)--show that drivers with detectable THC in their blood are no more likely to cause car crashes than drivers with no amount of THC in their blood. Others show that cannabis can impair certain abilities important to safe driving (such as reaction time, divided attention, and cognitive functions)--but no studies have been able to show that this increases the actual risk of crashing, or that drivers with THC in their blood cause a disproportionate", "-30.227796577033587" ], [ "written sometime around 2000–1400 BCE. Short term Acute effects may include anxiety and panic, impaired attention and memory, an increased risk of psychotic symptoms, the inability to think clearly, and an increased risk of accidents. Cannabis impairs a person's driving ability, and THC was the illicit drug most frequently found in the blood of drivers who have been involved in vehicle crashes. Those with THC in their system were from three to seven times more likely to be the cause of the accident than those who had not used either cannabis or alcohol, although its role is not necessarily", "-30.119275601711706" ], [ "which is the second metabolic product of THC. 11-COOH-THC is not psychoactive.\nIngestion of edible cannabis products lead to a slower onset of effect than the inhalation of it because the THC travels to the liver first through the blood before it travels to the rest of the body. Inhaled cannabis can result in THC going directly to the brain, where it then travels from the brain back to the liver in recirculation for metabolism. Eventually, both routes of metabolism result in the metabolism of psychoactive THC to inactive 11-COOH-THC. Excretion Due to substantial metabolism of THC and CBD, their metabolites are", "-30.043830560869537" ], [ "Stomatitis nicotina Signs and symptoms The palate may appear gray or white and contain many papules or nodules that are slightly elevated with red dots in their center. These red dots represent the ducts of minor salivary glands which have become inflamed by heat. The condition is painless. If a denture is normally worn while smoking, then the mucosa underneath the denture appears unaffected by the condition. In severe cases, the mucosa may show fissuring and develop a \"dried lake bed\" appearance. Other changes associated with tobacco use may be evident such as brown or black extrinsic staining of teeth", "-29.87720750052904" ], [ "of the forehead, as well as bruising on the nose and on the inner arm.\nAn examination of Brown's body by British officials one week later found no evidence that Brown had vomit in his airways. Another post-mortem examination was carried out ahead of the British inquest into his death by consultant pathologist, Dr Benjamin Swift in 2012, at the behest of Brown's family. Dr. Swift concluded that the finding about cannabis was \"not relevant\" – adding that the drug had not \"caused or contributed to his death\". However, Dr. Swift also discounted violent trauma as a possible cause of death,", "-29.85758507155697" ], [ "glands it contains. Chronic smoking causes submucosal gland hypertrophy and hyperplasia, leading to a Reid Index of >0.5 indicating chronic bronchitis.", "-29.816617370492168" ], [ "those who used it in place of alcohol or tobacco either reduced or stopped their intake of the latter substances.\nA limited number of studies have examined the effects of cannabis smoking on the respiratory system. Chronic heavy marijuana smoking is associated with coughing, production of sputum, wheezing, and other symptoms of chronic bronchitis. The available evidence does not support a causal relationship between cannabis use and chronic obstructive pulmonary disease. Short-term use of cannabis is associated with bronchodilation. Other side effects of cannabis use include cannabinoid hyperemesis syndrome.\nCannabis smoke contains thousands of organic and inorganic chemical compounds. This tar is", "-29.77758775060647" ], [ "glaucoma patients, so he hypothesized that using the drug could prevent blindness in patients. Many Vietnam War veterans also found that the drug prevented muscle spasms caused by spinal injuries suffered in battle.\nIn 1964, Dr. Albert Lockhart and Manley West began studying the health effects of traditional cannabis use in Jamaican communities. They discovered that Rastafarians had unusually low glaucoma rates and local fishermen were washing their eyes with cannabis extract in the belief that it would improve their sight. Lockhart and West developed, and in 1987 gained permission to market, the pharmaceutical Canasol: one of the first cannabis extracts.", "-29.751959405373782" ], [ "been shown whether these tests are accurate or reliable, and it is possible a false positive could result from environmental exposure.\nIt is possible that prior users of chronic cannabis users can test positive for THC even months of years after they have stopped using cannabis; there is evidence that cannabis metabolites can become stored in fat tissue and then be released due to stress or weight loss. False negatives Fat solubility of THC also makes detection in body fluids, which are mostly water, problematic, leading to false indication of non-impairment for users. Legal standards In May 2016, the American Automobile", "-29.74451203321223" ], [ "by name:\n\"The deadly frost is in the green\nYou don't know what I mean\nYou'll find the Benzedrine can throw you off the edge\" Dear and the Headlights – \"Carl Solomon Blues\" The drug is mentioned in the pre-chorus of the song Carl Solomon Blues by Dear and the Headlights, from their second album Drunk Like Bible Times.\n\"Off somewhere in a New York Flat,\n Benzedrine derailed rants, of\n immeasurable frenetic praise,\n that cauterize before they save.\"\nThea Gilmore - \"Benzedrine\"\nThe song \"Benzedrine\", written by Thea Gilmore, appears on her 2001 album Rules For Jokers. Trucker Speed - Fred Eaglesmith Chorus\nAnd it's trucker speed,", "-29.732684738613898" ], [ "syncope (fainting), and seizures.\nSome descriptions of carbon monoxide poisoning include retinal hemorrhages, and an abnormal cherry-red blood hue. In most clinical diagnoses these signs are seldom noticed. One difficulty with the usefulness of this cherry-red effect is that it corrects, or masks, what would otherwise be an unhealthy appearance, since the chief effect of removing deoxygenated hemoglobin is to make an asphyxiated person appear more normal, or a dead person appear more lifelike, similar to the effect of red colorants in embalming fluid. The \"false\" or unphysiologic red-coloring effect in anoxic CO-poisoned tissue is related to the meat-coloring commercial use", "-29.724275779211894" ], [ "been known to use cannabis. However, a doctor at the coroner's hearing was quoted as saying that the cannabis in Lee's stomach was \"no more significant than if Bruce had drunk a cup of tea that day.\"\nLee's physician, Donald Langford, and Peter Wu, a doctor who had treated Lee for another edema ten weeks earlier, believed that the fatal edema could have been caused by a rare allergic reaction to an alkaloid in cannabis, as a large quantity of hashish was removed from his stomach during the earlier edema, and he had been warned not to use it again. Wu", "-29.65611751949109" ], [ "Queen Elizabeth Hospital. Lycette told the hearing that his death could not have been caused by cannabis, and that Lee had died from an edema caused by a reaction to one or both of the ingredients in equagesic.\nAt the time in Hong Kong, Cannabis was seen in an extremely negative light — worse than opium — and was \"considered a 'foreign' drug with sinister and evil undertones.\" Bruce Thomas, author of Bruce Lee: Fighting Spirit stated that \"this view had a massive impact on the official findings,\" and that Wu's inclusion of cannabis as a suspected cause of death \"reflected", "-29.587251436256338" ], [ "damage the liver, although a 2011 meta-analysis of research evidence suggested this concern may be unfounded. In 2007, the Australian Government warned that black cohosh may cause liver damage, although rarely, and should not be used without medical supervision. Other studies concluded that liver damage from use of black cohosh is unlikely. Phytochemicals Black cohosh contains diverse phytochemicals, such as polyphenols and estrogen-like compounds (isoflavones) implicated in effects of black cohosh extracts on hot flashes in menopausal women, although there is no effect confirmed by high-quality clinical research.", "-29.578615849022754" ], [ "regards to cannabis, however, typically only metabolites (produced by the body and thus not found in smoke) are tested rather than THC, so failure is unlikely to result from non-extreme passive exposure. High doses of niacin will help you pass Niacin, also known as Vitamin B3, is speciously claimed by some to \"burn it out\" of one's system when taken at high doses (250–500 mg per day). While some Internet (and other) sources claim that this works wonders, there is no supporting scientific evidence. Very high doses can also cause adverse side effects.\nThis legend may have been (inadvertently) inspired by", "-29.546180293138605" ], [ "very large amounts, it can cause one to stop breathing. Using alcohol and other drugs alongside purple drank increases the chance of respiratory depression. Fallieras stated that the concoction does not cause seizures itself, but increases their likelihood in those susceptible to them. The drink includes a massive amount of the opiate codeine, which can be addictive in high doses, and Fallieras states that \"promethazine has at least anecdotally been noted to intensify the euphoric effects of codeine in the brain.\"\nThe addictive nature of the drink means that trying to discontinue regular usage can bring about symptoms of withdrawal. In", "-29.519060717051616" ], [ "consequences of long-term cannabis toxicity remain unknown and organic disease should not be ruled out as a possible cause. Cannabinoid buildup theory Tetrahydrocannabinol (THC) is a fat-soluble cannabinoid that can be deposited into a person's fat stores, accounting for the long elimination half-life of THC. During periods of stress or food deprivation, a person's fat stores can be mobilized (lipolysis) for energy consumption, releasing the previously stored THC as well. THC can then leach back into the bloodstream, leading to progressively higher concentrations in the blood. The mechanism can be characterized as a \"reintoxication effect.\" Another cannabinoid called cannabigerol acts", "-29.50795564299915" ], [ "also contribute to the chronic inflammation present in COPD. Cardiovascular disease Inhalation of tobacco smoke causes several immediate responses within the heart and blood vessels. Within one minute the heart rate begins to rise, increasing by as much as 30 percent during the first 10 minutes of smoking. Carbon monoxide in tobacco smoke exerts negative effects by reducing the blood's ability to carry oxygen.\nSmoking also increases the chance of heart disease, stroke, atherosclerosis, and peripheral vascular disease. Several ingredients of tobacco lead to the narrowing of blood vessels, increasing the likelihood of a blockage, and thus a heart attack or", "-29.4999666633812" ], [ "Abnormal urine color Cause Infection, disease, medicines, or food can all affect urine color temporarily. For instance, cloudy or milky urine usually accompanied by bad smell possibly indicates urinary tract infection, excessive discharge of crystals, fat, white blood cells, red blood cells, or mucus.\nDark urine that looks brown but clear might be a warning sign of a serious liver disease like hepatitis or cirrhosis. In which, an excess of bilirubin being discharged through urine.\nIn case the urine looks in pink, red, or lighter brown is generally caused by beets, blackberries, certain food colorings, hemolytic anemia, renal impairment, urinary tract infection,", "-29.44530355039751" ], [ "discontinuation of entacapone. Urine color 10% of people taking entacapone experience a change in urine color to orange, red, brown, or black. This side effect is due to entacapone metabolism and excretion in the urine and shown to not be harmful. Sudden sleep onset People have reported sudden sleep onset while engaging in daily activities without prior warning of drowsiness. In controlled studies, patients on entacapone had a 2% increased risk of somnolence compared to placebo. Low blood pressure Episodes of orthostatic hypotension have been shown to be more common at the start of entacapone use due to increased levels", "-29.428790409408975" ], [ "is a layer of red blood cells (the \"blood\"). Above this is a whitish layer of white blood cells (the \"phlegm\"). The top layer is clear yellow serum (the \"yellow bile\"). Blood The blood was believed to be produced exclusively by the liver. It was associated with a sanguine nature (enthusiastic, active, and social). Yellow bile Excess of yellow bile was thought to produce aggression, and reciprocally excess anger to cause liver derangement and imbalances in the humors. Black bile The word \"melancholy\" derives from Greek μέλαινα χολή (melaina kholé) meaning 'black bile'. Excess of black bile was understood to", "-29.37337009399198" ], [ "pressure while lying down and postural hypotension - a drop in blood pressure when standing up. These effects may vary depending on the relative concentration of the many different cannabinoids that can affect the cardiovascular function, such as cannabigerol. Smoking cannabis decreases exercise tolerance. Cardiovascular effects may not lead to serious health issues for the majority of young, healthy users; on the contrary, heart attack, that is myocardial infarction, stroke, and other adverse cardiovascular events, have occurred in association with its use. Cannabis use by people with cardiovascular disease poses a health risk because it can lead to increased cardiac", "-29.368889915087493" ], [ "Acute hemorrhagic conjunctivitis Signs and symptoms The conjunctiva provides lining for the inside of the eyelid as well as a coating for the sclera, the white portion of the eyeball. It typically serves to provide lubrication for the eye through the production of mucus and tears. When infected with AHC, patients will experience painful, red eyes, swelling of the conjunctival tissue, and frequent mucus discharge from the eyes accompanied by excessive tearing and subconjunctival hemorrhaging. This hemorrhaging is caused by the rupture of blood vessels beneath the conjunctiva giving the eyes a bright red appearance. Some patients also experience blurry", "-29.363326116930693" ], [ "Children's Hospital of Eastern Ontario on teenagers who used marijuana and proved that because it uses endocannabinoid system, it shouldn't be used for people under the age of 25 due to risk of memory loss, eruption of symptoms of schizophrenia and psychosis and even permanent brain damage. 2016 In June 2016 she and Cory Gerritsen had studied cannabis' ingredients; cannabidiol and tetrahydrocannabinol and proved that the latter causes psychosis in adolescents. On November of the same year Dr. Mizrahi worked with Dr. Bill MacEwan on a case of a 21-year old who killed a 13-year old tween while being", "-29.355777349555865" ], [ "of patients in treatment for cannabis use disorders. These symptoms include dysphoria (anxiety, irritability, depression, restlessness), disturbed sleep, gastrointestinal symptoms, and decreased appetite. It is often paired with Rhythmic movement disorder. Most symptoms begin during the first week of abstinence and resolve after a few weeks. According to a study in the U.S., 12.1% of heavy cannabis users showed cannabis withdrawal as defined by the DSM-5, and this was associated with significant disability as well as mood, anxiety and personality disorders. Cause Cannabis addiction is often due to prolonged and increasing use of the drug. Increasing the strength of", "-29.34692229810753" ], [ "is then metabolized to 9-carboxy-THC. Some cannabis metabolites can be detected in the body several weeks after administration. These metabolites are the chemicals recognized by common antibody-based \"drug tests\"; in the case of THC or others, these loads do not represent intoxication (compare to ethanol breath tests that measure instantaneous blood alcohol levels), but an integration of past consumption over an approximately month-long window. This is because they are fat-soluble, lipophilic molecules that accumulate in fatty tissues.\nResearch shows the effect of cannabinoids might be modulated by aromatic compounds produced by the cannabis plant, called terpenes. This interaction would lead to", "-29.31962027796544" ], [ "blues.\" Symptoms may resolve after a week if there is no respiratory damage. More severe exposures can cause tracheo-bronchitis, pneumonitis, and pulmonary edema. Symptoms of inflammation may start hours after the exposure and include cough, dryness and irritation of the nose and throat, headache, dizziness, weakness, fever, chills, and chest pain.\nInhaling cadmium-laden dust quickly leads to respiratory tract and kidney problems which can be fatal (often from renal failure). Ingestion of any significant amount of cadmium causes immediate poisoning and damage to the liver and the kidneys. Compounds containing cadmium are also carcinogenic.\nThe bones become soft (osteomalacia), lose bone mineral", "-29.30495266750222" ], [ "choroidal circulation is showing through \"red\" in this foveal region where all retinal ganglion cells are pushed aside to increase visual acuity. Thus, this cherry-red spot is the only normal part of the retina; it shows up in contrast to the rest of the retina. Microscopic analysis of the retinal neurons shows they are distended from excess ganglioside storage. Unlike other lysosomal storage diseases (e.g., Gaucher disease, Niemann–Pick disease, and Sandhoff disease), hepatosplenomegaly (liver and spleen enlargement) is not seen in Tay–Sachs. Management As of 2010 there was no treatment that addressed the cause of Tay–Sachs disease or could slow", "-29.301822149427608" ], [ "causal because THC stays in the bloodstream for days to weeks after intoxication.\nAccording to the United States Department of Health and Human Services, there were 455,000 emergency room visits associated with cannabis use in 2011. These statistics include visits in which the patient was treated for a condition induced by or related to recent cannabis use. The drug use must be \"implicated\" in the emergency department visit, but does not need to be the direct cause of the visit. Most of the illicit drug emergency room visits involved multiple drugs. In 129,000 cases, cannabis was the only implicated drug.\nThe short", "-29.282071596942842" ], [ "In addition, their urine may appear in dark colour and the patients may experience dizziness and confusion. Tachycardia, the increase in heart rate, is also a symptom of the haemolytic disease. Prevention of haemolytic disease of the newborn In the case of pregnancy, when an RhD- mother carries an RhD+ fetus, some of the fetal red blood cells may cross the placenta into the maternal circulation, sensitising the mother to produce anti-RhD antibodies. Since the mixing of fetal and maternal blood occurs mainly during separation of the placenta during delivery, the first RhD+ pregnancy rarely causes any danger to the", "-29.267620478814933" ], [ "Mustard procedure Background The defect is called transposition of the great vessels, or transposition of the great arteries (TGV or TGA). Until the late 1950s, and Senning's operation the condition was commonly fatal. The defect causes blood from the lungs to flow back to the lungs and blood from the body to flow back to the body. This occurs because the aorta and the pulmonary artery, the two major arteries coming out of the heart, are connected to the wrong chambers. The babies look blue because there is insufficient oxygen circulating in their bodies. Procedure The Mustard Procedure", "-29.255899806390516" ], [ "last about 6 hours, with some limited studies showing impairment lasting as long as 24 to 48 hours Specific studies that assess driving and impairment show a return to \"...nonimpaired state within 3-6 hours“\nQuickly sequestered into fat tissues therefore decreasing blood concentration\nIngesting cannabis has much longer magnified effect of the drug\nThe method of testing cannabis in urine can be misleading, due to the potential for interpreting a positive result for THC-COOH, as an indicator of acute impairment.\nLack of concentration, impaired learning and memory, alterations in thought formation, expression and sedation. Physiological signs include tachycardia, dilated pupils with injected conjunctiva, dry", "-29.24116430797585" ], [ "may contribute to cardiovascular disease, but as of 2018, evidence of this relationship was unclear. Cannabis is believed to be an aggravating factor in rare cases of arteritis, a serious condition that leads to amputation in some cases. Because 97% of subjects in the case-reports also smoked tobacco, a formal association with cannabis could not be made. If cannabis arteritis turns out to be a distinct clinical entity, it might be the consequence of vasoconstrictor activity observed from delta-8-THC and delta-9-THC. Other serious cardiovascular events including myocardial infarction, stroke, sudden cardiac death, and cardiomyopathy have been reported to be temporally", "-29.233276519662468" ], [ "Phytophotodermatitis Symptoms A reaction typically begins within 24 hours of exposure and peaks at 48–72 hours after exposure. Initially, the skin turns red and starts to itch and burn. Large blisters (or bullae) form within 48 hours. The blisters may leave black, brown, or purplish scars that can last for several years. This hyperpigmentation of the skin is caused by the production of melanin triggered by the furanocoumarins.\nAlthough media reports have suggested that eye exposure to the sap can lead to temporary or permanent blindness, the risk of permanent blindness is not supported by existing research.\nPhytophotodermatitis can affect people of any age.", "-29.233256430423353" ], [ "structure of porphyrins involving alternating single and double carbon bonds, these compounds exhibit a deep purple color, resulting in the discoloration observed in the skin. Excess alcohol intake decreases hepcidin production which leads to increased iron absorption from the gut and an increase in oxidative stress. This oxidative stress then leads to inhibition of uroporphyrinogen decarboxylase, creating an excess of uroporphyrinogen III which is oxidized from the relatively harmless porphyrinogens into their reduced porphyrins form. Concentrated instances of oxidative stress (alcohol, physical trauma, psychological stress, etc) cause the liver to hemorrhage these porphyrins into the blood", "-29.19121361582802" ], [ "Yellow fever Signs and symptoms Yellow fever begins after an incubation period of three to six days. Most cases only cause a mild infection with fever, headache, chills, back pain, fatigue, loss of appetite, muscle pain, nausea, and vomiting. In these cases, the infection lasts only three to four days.\nIn 15% of cases, though, people enter a second, toxic phase of the disease with recurring fever, this time accompanied by jaundice due to liver damage, as well as abdominal pain. Bleeding in the mouth, the eyes, and the gastrointestinal tract cause vomit containing blood, hence the Spanish name for yellow", "-29.184710742440075" ], [ "tract. Alcohol slows these cells' healing ability to repair the damage to their DNA caused by the harmful chemicals in tobacco. Alcohol contributes to cancer through this process.\nWhile lower quality evidence suggests a cardioprotective effect, no controlled studies have been completed on the effect of alcohol on the risk of developing heart disease or stroke. Excessive consumption of alcohol can cause liver cirrhosis and alcoholism. The American Heart Association \"cautions people NOT to start drinking ... if they do not already drink alcohol. Consult your doctor on the benefits and risks of consuming alcohol in moderation.\"\nAlcoholic drinks are classified by", "-29.178619041311322" ], [ "in the HEXA gene disrupt the activity of beta-hexosaminidase A, preventing the breakdown of the fatty substances. As a result, the fatty substances accumulate to deadly levels in the brain and spinal cord. The buildup of GM2 ganglioside causes progressive damage to the nerve cells. This is the cause of the signs and symptoms of Tay-Sachs disease. Color blindness People who are colorblind have mutations in their genes that cause a loss of either red or green cones, and they therefore have a hard time distinguishing between colors. There are three kinds of cones in the human eye:", "-29.17636143861455" ], [ "are released into the blood as reticulocytes. Polychromasia occurs when the immature reticulocytes of the bone marrow are released, resulting in a grayish blue color of the cells. This color is seen because of the ribosomes still left on the immature blood cells, which are not found on mature red blood cells. These cells still contain a nucleus as well due to the early release, which is not needed in mature blood cells because their only function is to carry oxygen in the blood. The life span of a typical red blood cell is acknowledged to be approximately 120 days", "-29.152732854912756" ], [ "them. Cannabis smoke has been listed on the California Proposition 65 warning list as a carcinogen since 2009, but leaves and pure THC are not. Head and neck A 2011 review of studies in the United States found that although some supported the hypothesis that cannabis use increased the risk of getting head and neck cancer, when other factors are accounted for the majority did not. Gordon and colleagues (2013) said there was a risk of these cancers associated with cannabis use over a long period of time. A 2015 review found no association with lifetime cannabis use and", "-29.150526024983265" ], [ "dioxins, and is classified as a human carcinogen by the US Environmental Protection Agency. \nIf not bound chemically to a biological surface such as soil, leaves or grass, Agent Orange dries quickly after spraying and breaks down within hours to days when exposed to sunlight and is no longer harmful. Toxicology Due to its fat-soluble nature, TCDD enters the body through physical contact or ingestion. Dioxin easily accumulates in the food chain. Dioxin enters the body by attaching to a protein called the aryl hydrocarbon receptor (AhR), a transcription factor. When TCDD binds to AhR, the protein moves to the", "-29.13549994630739" ], [ "Cannabinoid hyperemesis syndrome Signs and symptoms The long-term and short-term effects of cannabis use are associated with behavioral effects leading to a wide variety of effects on the body systems and physiologic states. Cannabinoid hyperemesis syndrome is a paradoxical syndrome characterized by hyperemesis (persistent vomiting), as opposed to the better known antiemetic properties of cannabinoids. Specifically, cannabinoid hyperemesis syndrome takes the pattern of cyclical nausea, vomiting, and abdominal pain in the setting of chronic cannabinoid use. The abdominal pain tends to be mild and diffused. There are three phases of cannabinoid hyperemesis syndrome: the prodromal phase, the hyperemetic phase, and", "-29.132266548884218" ], [ "Paroxysmal nocturnal hemoglobinuria Signs and symptoms The classic sign of PNH is red discoloration of the urine due to the presence of hemoglobin and hemosiderin from the breakdown of red blood cells. As the urine is more concentrated in the morning, this is when the color is most pronounced. This phenomenon mainly occurs in those who have the primary form of PNH, who will notice this at some point in their disease course. The remainder mainly experience the symptoms of anemia, such as tiredness, shortness of breath, and palpitations.\nA small proportion of patients report attacks of abdominal pain, difficulty", "-29.121033964969683" ], [ "28 days of abstinence. Appetite The feeling of increased appetite following the use of cannabis has been documented for hundreds of years, and is known colloquially as \"the munchies\" in the English-speaking world. Clinical studies and survey data have found that cannabis increases food enjoyment and interest in food. A 2015 study suggests that cannabis triggers uncharacteristic behaviour in POMC neurons, which are usually associated with decreasing hunger. Rarely, chronic users experience a severe vomiting disorder, cannabinoid hyperemesis syndrome, after smoking and find relief by taking hot baths.\nEndogenous cannabinoids (\"endocannabinoids\") were discovered in cow's milk and soft cheeses. Endocannabinoids are", "-29.11187860998325" ], [ "those environments.\"\nSmoking tends to increase blood cholesterol levels. Furthermore, the ratio of high-density lipoprotein (HDL, also known as the \"good\" cholesterol) to low-density lipoprotein (LDL, also known as the \"bad\" cholesterol) tends to be lower in smokers compared to non-smokers. Smoking also raises the levels of fibrinogen and increases platelet production (both involved in blood clotting) which makes the blood thicker and more likely to clot. Carbon monoxide binds to hemoglobin (the oxygen-carrying component in red blood cells), resulting in a much stabler complex than hemoglobin bound with oxygen or carbon dioxide—the result is permanent loss of blood cell functionality.", "-29.054138856823556" ], [ "as a \"certain specified COPD\". Cause Most cases of chronic bronchitis are caused by tobacco smoking. Chronic bronchitis in young adults who smoke is associated with a greater chance of developing COPD. There is an association between smoking cannabis and chronic bronchitis. In addition, chronic inhalation of air pollution, or irritating fumes or dust from hazardous exposures in occupations such as coal mining, grain handling, textile manufacturing, livestock farming, and metal moulding may also be a risk factor for the development of chronic bronchitis. Bronchitis caused in this way is often referred to as industrial bronchitis, or occupational bronchitis.", "-29.020552816044074" ], [ "has also been shown to increase the risk of myocardial infarction by 4.8 times for the 60 minutes after consumption. Neuroimaging Although global abnormalities in white matter and grey matter are not associated with cannabis abuse, reduced hippocampal volume is consistently found. Amygdalar abnormalities are sometimes reported, although findings are inconsistent. Preliminary evidence suggests that this effect is largely mediated by THC, and that CBD may even have a protective effect.\nCannabis use is associated with increased recruitment of task-related areas, such as the dorsolateral prefrontal cortex, which is thought to reflect compensatory activity due to reduced processing efficiency. Cannabis", "-29.012039286550134" ], [ "some evidence that prenatal exposure to cannabis was associated with \"deficits in language, attention, areas of cognitive performance, and delinquent behavior in adolescence\". A report prepared for the Australian National Council on Drugs concluded cannabis and other cannabinoids are contraindicated in pregnancy as it may interact with the endocannabinoid system.", "-28.980635965250258" ], [ "effects are almost immediate when the smoke is inhaled. Between 1996 and 1999, eight U.S. states supported cannabis prescriptions opposing policies of the federal government. Most people who are prescribed marijuana for medical purposes use it to alleviate severe pain. Ancient China Cannabis, called má 麻 (meaning \"hemp; cannabis; numbness\") or dàmá 大麻 (with \"big; great\") in Chinese, was used in Taiwan for fiber starting about 10,000 years ago.\nThe botanist Hui-lin Li wrote that in China, \"The use of Cannabis in medicine was probably a very early development. Since ancient humans used hemp seed as food, it was quite natural", "-28.937376124202274" ], [ "adding another white powdery substance to the drug. This cumulative effect can lead to further unintended harm to health dependent on what is being covertly added. Concerns also exist about a number of pharmacological pairings: alcohol and cocaine increase cardiovascular toxicity; alcohol or depressant drugs, when taken with opioids, lead to an increased risk of overdose; and opioids or cocaine taken with ecstasy or amphetamines also result in additional acute toxicity. Benzodiazepines can cause death when mixed with other CNS depressants such as opioids, alcohol, or barbiturates. Scheduling Within the general concept of multiple drug use, several specific meanings", "-28.931880751122662" ], [ "Smoker's melanosis Causes Smoking or the use of nicotine-containing drugs is the cause to Smoker's melanosis,. Also tar-components (benzopyrenes) are known to stimulate melanocytes to melanin production, and other unknown toxic agents in tobacco may also be the cause. These chemical agents have a polycyclic, chain-like structure. Environmental tobacco smoke from parents is causing smoker's melanosis in their children Swedish snuff causes a small elevation of oral melanin pigmented individuals from 3.0% to 4.7%. Nicotine tablets have shown to stimulate to melanin pigmentation of the oral mucosa. Treatment and prognosis Lesions usually disappear between 3", "-28.930984892562265" ], [ "alcohol and tobacco.\nWithdrawal from heavy, chronic cannabis use does not usually exceed 3–4 days, but it has the potential to be psychologically addictive. Withdrawal symptoms are generally mild - loss of appetite, insomnia, feelings of uneasiness/anxiety, tension, stomach ache, headache and irritability all being common symptoms. There are studies that show no actual increased risk of cancer from smoking marijuana, even when duration of use is expanded over several years. In fact, some studies indicate THC to have anticancer properties, with studies showing tumor reduction in mice. Confusion with Jimson weed Historically, and possibly related to the \"Reefer Madness\" legend,", "-28.92368972049735" ], [ "Polychromasia Causes Red blood cells can be released prematurely by a number of mechanisms. Premature release of red blood cells is usually caused due to damage of the bone marrow due to underlying causes as well as in response to the stimulation of hormones in strong association with anemia. Erythropoetin, a hormone made by the kidneys, controls the production of the red blood cells as well as the rate at which they are released from the bone marrow. When these levels of erythropoetin rise, they signal the release of immature red blood cells into the bloodstream and is linked to", "-28.919982402352616" ], [ "conditions. Another review found tentative evidence for use of cannabis in treating peripheral neuropathy, but little evidence of benefit for other types of long term pain.\nWhen cannabis is inhaled to relieve pain, blood levels of cannabinoids rise faster than when oral products are used, peaking within three minutes and attaining an analgesic effect in seven minutes. A 2014 review found limited and weak evidence that smoked cannabis was effective for chronic non-cancer pain. A 2015 meta-analysis found that inhaled medical cannabis was effective in reducing neuropathic pain in the short term for one in five to six patients. Another 2015", "-28.900836297674687" ], [ "is specifically set to protect infants. Benzocaine applied to the gums or throat (as commonly used in baby teething gels, or sore throat lozenges) can cause methemoglobinemia. Congenital Due to a deficiency of the enzyme diaphorase I (NADH-cytochrome b5 reductase), methemoglobin levels rise and the blood of met-Hb patients has reduced oxygen-carrying capacity. Instead of being red in color, the arterial blood of met-Hb patients is brown. This results in the skin of Caucasian patients gaining a bluish hue. Hereditary met-Hb is caused by a recessive gene. If only one parent has this gene, offspring will have normal-hued skin, but", "-28.87652483652346" ], [ "and attributed this safety to the low density of cannabinoid receptors in areas of the brain controlling breathing and the heart. Gettman claims that the discovery of the cannabinoid receptor system in the late 1980s revolutionized scientific understanding of cannabis' effects and provided further evidence that it does not belong in Schedule I.\nIn 2003, the United States government patented cannabinoids, including those in marijuana that cause users to get \"high\" (such as THC) based on these chemicals' prevention of trauma- and age-related brain damage.\nIn January 2008, the American College of Physicians called for a review of cannabis's Schedule I classification", "-28.855090130881194" ], [ "Brown induration Brown induration is fibrosis and hemosiderin pigmentation of the lungs due to long standing pulmonary congestion (chronic passive congestion).Occurs with mitral stenosis and left sided heart failure . Pathology .. The lung vessels are congested with blood and this leads to pulmonary edema when plasma escapes in alveolar spaces . Rupture of congested capillaries leads to release of hemosiderin from damaged Red Blood cells . When alveolar macrophages engulf hemosiderin they are called heart failure cells . Death of heart failure cells in their journey back to lung tissue with subsequent hemosiderin release leads to lung fibrosis .", "-28.844204956723843" ], [ "facial flushing after the ingestion of alcohol. In very high doses it can increase secretion of antidiuretic hormone (ADH), which can lead to hyponatremia. It also markedly raises the serum level of alkaline phosphatase. Chemical properties Chlorpropamide is a white crystalline powder with no characteristic taste or smell. It exhibits polymorphism. Its acid dissociation constant pKₐ is 5.0 at 20 °C.", "-28.74783020731411" ], [ "eye. Pure benzyl alcohol produces corneal necrosis.\nBenzyl alcohol is not considered to be a carcinogen and no data are available regarding teratogenic or reproductive effects.", "-28.7476066306117" ], [ "the area under the eyes. It is believed that iron deficiency can cause dark circles as well. Iron deficiency is the most common type of anemia and this condition is a sign that not enough oxygen is getting to the body tissues.\nThe skin can also become more pale during pregnancy and menstruation (due to lack of iron), allowing the underlying veins under the eyes to become more visible. Fatigue A lack of sleep and mental fatigue can cause paleness of the skin, allowing the blood underneath the skin to become more visible and appear more blue or darker. Age Dark", "-28.69912210360053" ], [ "is evidence that cannabis use during adolescence, at a time when the brain is still developing, may have deleterious effects on neural development and later cognitive functioning. The brain is not completely developed until a person reaches the age range of 22-27. Excessive use of marijuana can cause harm to this development. Based on annual survey data, 7% of high school seniors that smoke daily function at a lower rate in school than students that do not. The sedating and anxiolytic properties of tetrahydrocannabinol (THC) in some users might make the use of cannabis an attempt to self-medicate personality", "-28.69025855628024" ], [ "on the state of the hemoglobin: when combined with oxygen the resulting oxyhemoglobin is scarlet, and when oxygen has been released the resulting deoxyhemoglobin is of a dark red burgundy color. However, blood can appear bluish when seen through the vessel wall and skin. Pulse oximetry takes advantage of the hemoglobin color change to directly measure the arterial blood oxygen saturation using colorimetric techniques. Hemoglobin also has a very high affinity for carbon monoxide, forming carboxyhemoglobin which is a very bright red in color. Flushed, confused patients with a saturation reading of 100% on pulse oximetry are sometimes found to", "-28.68098077387549" ], [ "and higher aggressiveness and lower intelligence during childhood. Fetal alcohol spectrum disorder is a developmental disorder that is a consequence of heavy alcohol intake by the mother during pregnancy. Children with FASD have a variety of distinctive facial features, heart problems, and cognitive problems such as developmental disabilities, attention difficulties, and memory deficits. Tobacco use Tobacco smoking during pregnancy exposes the fetus to nicotine, tar, and carbon monoxide. Nicotine results in less blood flow to the fetus because it constricts the blood vessels. Carbon monoxide reduces the oxygen flow to the fetus. The reduction of blood and oxygen flow may", "-28.67502087241155" ], [ "result either from the consequences of muscle tissue breakdown or from the condition that originally led to the muscle breakdown. Release of the components of muscle tissue into the bloodstream causes electrolyte disturbances, which can lead to nausea, vomiting, confusion, coma or abnormal heart rate and rhythm. The urine may be dark, often described as \"tea-colored\", due to the presence of myoglobin. Damage to the kidneys may give rise to decreased or absent urine production, usually 12 to 24 hours after the initial muscle damage.\nSwelling of damaged muscle occasionally leads to compartment syndrome—compression of surrounding tissues, such as nerves and blood", "-28.671400403021835" ], [ "2008 relatively little research had been done concerning therapeutic effects of cannabinoids on the eyes. Tourette syndrome A 2007 review of the history of medical cannabis said cannabinoids showed potential therapeutic value in treating Tourette syndrome (TS). A 2005 review said that controlled research on treating TS with dronabinol showed the patients taking the pill had a beneficial response without serious adverse effects; a 2000 review said other studies had shown that cannabis \"has no effects on tics and increases the individuals inner tension\".\nA 2009 Cochrane review examined the two controlled trials to date using cannabinoids of any preparation type", "-28.670487397233956" ], [ "related to the \"multi-day impairment\" legend described further down on this list, this legend claims that residual THC stored in fat cells gets released spontaneously into the bloodstream in enough quantities to get one high again long after the last use of cannabis, be it days, weeks, or even months later. This legend is typically accompanied by anecdotal evidence of people who experience a \"high\" after doing exercise of some sort. While somewhat more biologically plausible than the discredited LSD legend due to the fat-solubility of THC, this phenomenon remains scientifically unproven. A 2009 study of rats that", "-28.6641987193143" ], [ "Black eye Signs and symptoms Despite the name, the eye itself is not affected. Blunt force or trauma to the eye socket results in burst capillaries and subsequent haemorrhaging (hematoma). The fatty tissue along with the lack of muscle around the eye socket allows a potential space for blood accumulation. As this blood is reabsorbed, various pigments are released similar to a bruise lending itself to the extreme outward appearance.\nThe appearance (discoloration purple black and blue and swelling) does not necessarily indicate a serious injury, and most black eyes resolve within a week. The tissues around the eye are", "-28.61234685353702" ], [ "Photodermatitis Signs and symptoms Photodermatitis may result in swelling, difficulty breathing, a burning sensation, a red itchy rash sometimes resembling small blisters, and peeling of the skin. Nausea may also occur. There may also be blotches where the itching may persist for long periods of time. In these areas an unsightly orange to brown tint may form, usually near or on the face. Prevention Prevention includes avoiding exposure to chemicals that can trigger the reaction, such as by wearing gloves, or avoiding sunlight or wearing sunscreen preferably with at least factor 30 and with a high UVA protection level on", "-28.59195931709837" ], [ "by the passage of fresh red blood rectally, especially in the absence of bloody vomiting. Isolated melena may originate from anywhere between the stomach and the proximal colon. Other A number of foods and medications can turn the stool either red or black. Bismuth found in many antacids may turn stools black as may activated charcoal. Blood from the vagina or urinary tract may also be confused with blood in the stool. Diagnostic approach Diagnosis is often based on direct observation of blood in the stool or vomit. Although fecal occult blood testing has been used in an emergency", "-28.586151781957597" ], [ "painful neuropathies. Cannabinoids There is little evidence that cannabis helps treat chronic neuropathic pain, and benefits are likely outweighed by psychotomimetic effects. Herbal products There is no good evidence that herbal products (nutmeg or St John's wort) are useful for treating neuropathic pain. Dietary supplements A 2007 review of studies found that injected (parenteral) administration of alpha lipoic acid (ALA) was found to reduce the various symptoms of peripheral diabetic neuropathy. While some studies on orally administered ALA had suggested a reduction in both the positive symptoms of diabetic neuropathy (dysesthesia including stabbing and burning pain) as well as neuropathic", "-28.57051385368686" ], [ "of the Council on Science and Public Health (I-09) that \"...Results of short term controlled trials indicate that smoked cannabis reduces neuropathic pain...\". Epidemiology Women are more likely to be affected than men. History The earliest cited instance of the term is the French, névralgie, which, according to Rowland, was coined by François Chaussier in his 1801 Table Synoptique de la Névralgie, for \"...an affection of one or more nerves causing pain which is usually of an intermittent but frequently intense character\". The features and assumed etiology found in the medical literature have varied significantly over time.\nVarious locations were proposed", "-28.529386684356723" ], [ "a mixture of hemp juice, producing hallucinatory sensations. \"A daily dosage allowed one to divide his body and become ten thousand men, and to ride through the air\". Tao Hongjing records seeing a copy of the hemp-juice potion formula in Hsu Mi's handwriting (Strickmann 1979: 172).\nThe hallucinogenic properties of cannabis were common knowledge in Chinese medical and Daoist circles for two millennia or more (Needham and Lu 1974: 152). The (c. 1st century BCE) Shennong bencao calls \"cannabis flowers/buds\" mafen (麻蕡) or mabo (麻勃) and says: \"To take much makes people see demons and throw themselves about like maniacs. But", "-28.516664797789417" ], [ "Xanthopsia Xanthopsia is a color vision deficiency in which there is a predominance of yellow in vision due to a yellowing of the optical media of the eye. The most common cause is digoxin's inhibitory action on the sodium pump, and the development of cataracts which can cause a yellow filtering effect.\nIt has been suggested that Digitalis-derived digoxin, used to treat heart failure, induced xanthopsia is responsible for the yellow tinting exhibited by many of Van Gogh's works.\nXanthopsia is also a rare side-effect of jaundice, in which bilirubin may be deposited into the eye in sufficient quantity to produce a", "-28.475571236420365" ], [ "It is believed that the cardioprotective effects of garlic are due to red blood cells converting its sulfur compounds into hydrogen sulfide.\nRed blood cells also play a part in the body's immune response: when lysed by pathogens such as bacteria, their hemoglobin releases free radicals, which break down the pathogen's cell wall and membrane, killing it. Cellular processes As a result of not containing mitochondria, red blood cells use none of the oxygen they transport; instead they produce the energy carrier ATP by the glycolysis of glucose and lactic acid fermentation on the resulting pyruvate. Furthermore, the pentose phosphate pathway", "-28.462283670232864" ] ]
ovtni
How does China artificially keep its currency cheap?
[ "The key to China's control over their exchange rate is their capital controls. That, and a central bank with extraordinarily large quantities of dollars and yuan to spend to defend the exchange rate. Germany and many other Western countries used to have a policy of fixed exchange rates. That changed when savvy people with lots of money figured out that they could \"attack\" the fixed rate. How they \"attacked\" the exchange rate is by borrowing vast quantities of German marks and buying British pounds at the fixed rate. Many investors repeated this until the German banks no longer could afford to sell pounds and buy marks to keep the exchange rate constant. At that point, the price of marks went down, the investors traded back and paid off their loans, and pocketed the difference. This process is simply not possible with China, since China does not allow currency traders to do the things they need to do to attack the exchange rate. Furthermore, the Chinese central bank has vast quantities of USD that they can use to defend the exchange rate.", "Instead of exchanging the USD they've earned into yuan (thus resulting in a surplus of USD in circulation in international currency market and short supply of yuan, in other words, devalued USD and higher value in yuan), they buy US treasury bonds, which is in USD denominations, it's not affected by the value of yuan. That way the supply of yuan circulating in the international currency market will never be low.", "The Chinese government refuses to buy Yuan at any value other than the one that they have fixed, making it essentially worthless to trade Yuan up/down on an open market, because, in the end, you won't be able to sell it for any more than the Chinese government is willing to pay for it." ]
[ [ "it illegal to trade currency at any other rate. This is difficult to enforce and often leads to a black market in foreign currency. Nonetheless, some countries are highly successful at using this method due to government monopolies over all money conversion. This was the method employed by the Chinese government to maintain a currency peg or tightly banded float against the US dollar. China buys an average of one billion US dollars a day to maintain the currency peg. Throughout the 1990s, China was highly successful at maintaining a currency peg using a government monopoly over all currency", "-32.13821820705198" ], [ "of China has its own printing technology research division which research new techniques for creating banknotes and making counterfeiting more difficult.\nThe CBPMC bases its production of currency on the macroeconomic planning of the People's Bank of China.\nCBPMC reportedly produces currency for a number of other countries, including Thailand, Bangladesh, Sri Lanka, Malaysia and Brazil.", "-28.600143645016942" ], [ "operator in the process.\nThe Chinese State outlawed the practice of buying real-world goods with virtual currency in 2009, something that had become popular in some parts of the country.", "-27.935511815801874" ], [ "exporter, but subsidizes the American importer. Thus, importers within China have been substantially hurt due to the Chinese government's intention to continue to grow exports.\nThe view that China manipulates its currency for its own benefit in trade has been criticized by Cato Institute trade policy studies fellow Daniel Pearson, National Taxpayers Union Policy and Government Affairs Manager Clark Packard, entrepreneur and Forbes contributor Louis Woodhill, Henry Kaufman Professor of Financial Institutions at Columbia University Charles W. Calomiris, economist Ed Dolan, William L. Clayton Professor of International Economic Affairs at the Fletcher School, Tufts University Michael W. Klein, Harvard University Kennedy", "-27.686258633431862" ], [ "50% to $378 the same day. On 30 November 2013 the price reached $1,163 before starting a long-term crash, declining by 87% to $152 in January 2015. On 5 December 2013, the People's Bank of China prohibited Chinese financial institutions from using bitcoins. After the announcement, the value of bitcoins dropped, and Baidu no longer accepted bitcoins for certain services. Buying real-world goods with any virtual currency had been illegal in China since at least 2009.\nIn 2014, prices started at $770 and fell to $314 for the year.\nOn July 30, 2014, the Wikimedia Foundation started accepting donations of bitcoin.\nIn 2015.", "-27.476978455946664" ], [ "to the U.S. dollar, but being in reality worth noticeably less. For this reason the proxy currency was being treated as being at a greater value than its actual worth, resulting in artificially low prices; the exportation of fuel purchased with this currency for resale with profits by smugglers presented significant problems as hard currency, which backs the proxy, is used by the nation to purchase all of Zimbabwe's oil from foreign countries, thus aggravating inflation and driving down the real value of the bond notes. As a measure to decrease the inflation rate, which had reached a peak of", "-27.44141753110307" ], [ "of Beijing the new Xianfeng banknotes could not be used, so as people could not purchase any actual goods with them in the capital market many Bannermen lost a large part of their disposable income because of this inability to actually purchase things with their salary. \nThe Shanxi and privately owned banks and the new banking corporations which had been established by the Chinese imperial government to be representative of the Chinese provincial treasuries were also assigned blocks of Chinese characters, which were to be placed in the prefix block on each banknote they would issue, thereby making it easy", "-27.397613113134867" ], [ "other traded activities. This drives up wages and thus prices of many (non-traded) services, increasing the overall price level of the economy. The result is that poorer countries, such as China, are shown to be much richer based on PPP-converted real GDP than based on exchange-rate-converted GDP.\nThe database gets its name from the original developers at the University of Pennsylvania, Robert Summers, Irving Kravis and Alan Heston.", "-27.20737399533391" ], [ "bowl kept China from reaching its economic potential and reaching maximum productivity, as lifelong employment guarantee left managers and company owners with little to no incentive to respond to market signals. Similarly, workers who received a paycheck regardless of how much they produced, had no incentive to be more efficient and produce more output. However, this is not the only reason China fell behind economically. State enterprises lacked new technologies that were already being used in other countries, due to the high costs of providing required public services and upholding the wages promised by the state. This ultimately lead to", "-26.771700354729546" ], [ "that it makes possible\". This has allowed China to rely on savings-financed investments for economic growth. However, because low returns also dampens consumer spending, household expenditures account for \"a smaller share of GDP in China than in any other major economy\". However, as of December 2014, the People’s Bank of China \"started to undo decades of financial repression\" and the government now allows Chinese savers to collect up to a 3.3% return on one-year deposits. At China's 1.6% inflation rate, this is a \"high real-interest rate compared to other major economies”. After the 2008 economic recession In a 2011 NBER", "-26.60263027442852" ], [ "currency of a particular country is increased due to an increase in interest rate one can expect the terms of trade to improve. However, this may not necessarily mean an improved standard of living for the country since an increase in the price of exports perceived by other nations will result in a lower volume of exports. As a result, exporters in the country may actually be struggling to sell their goods in the international market even though they are enjoying a (supposedly) high price.\nIn the real world of over 200 nations trading hundreds of thousands of products, terms of", "-26.54599497113668" ], [ "to show that over the decade after China joined the World Trade Organization industrial subsidies have helped give China an advantage in industries in which they previously enjoyed no comparative advantage such as the steel, glass, paper, auto parts, and solar industries.\nExport subsidy is known for being abused. For example, some exporters substantially over declare the value of their goods so as to benefit more from the export subsidy. Another method is to export a batch of goods to a foreign country but the same goods will be re-imported by the same trader via a circuitous route and changing the", "-26.42358645353056" ], [ "China forced to use foreign exchange certificates. The unrealistic levels at which exchange rates were pegged led to a strong black market in currency transactions.\nIn the late 1980s and early 1990s, China worked to make the RMB more convertible. Through the use of swap centres, the exchange rate was brought to realistic levels and the dual track currency system was abolished.\nAs of 2013, the renminbi is convertible on current accounts but not capital accounts. The ultimate goal has been to make the RMB fully convertible. However, partly in response to the Asian financial crisis in 1998, China has been concerned", "-26.374619828246068" ], [ "and the Government realizes that to keep the economy moving forward, they need an efficient system in place to move goods and people across the country. According to World Bank statistics, goods lost due to poor or obsolete transport infrastructure amounted to one percent of China's GDP as recently as the most current survey (mid-1990s). Logistic costs account for 20% of a product's price in China, compared to 10% in the United States, and 5% in other developed countries.\nPorts are being improved for greater use of China's waterways, and airports are being improved across the country. Related industries such as", "-26.322206560508675" ], [ "keeping its vast workforce occupied and encouraging exports to the U.S. One byproduct was a large accumulation of U.S. dollars by the Chinese government, which were then invested in U.S. government securities and those of Fannie Mae and Freddie Mac, providing additional funds for lending that contributed to the housing bubble.\nEconomist Paul Krugman also wrote similar comments during October 2009, further arguing that China's currency should have appreciated relative to the U.S. dollar beginning around 2001. Various U.S. officials have also indicated concerns with Chinese exchange rate policies, which have not allowed its currency to appreciate significantly relative to the", "-26.311606873532583" ], [ "a bit, but don’t change it in any fundamental way). By keeping its current artificially weak — a higher price of dollars in terms of yuan — China generates a dollar surplus; this means the Chinese government has to buy up the excess dollars.\n— Paul Krugman 2010 The New York Times\nGreg Mankiw, on the other hand, asserted in 2010 the U.S. protectionism via tariffs will hurt the U.S. economy far more than Chinese devaluation. Similarly, others have stated that the undervalued yuan has actually hurt China more in the long run insofar that the undervalued yuan does not subsidize the Chinese", "-26.298451189994694" ], [ "way, the government profits from an increase in seigniorage. This practice would increase the money supply but at the same time the relative value of each coin would be lowered. As the relative value of the coins becomes lower, consumers would need to give more coins in exchange for the same goods and services as before. These goods and services would experience a price increase as the value of each coin is reduced.\nSong Dynasty China introduced the practice of printing paper money to create fiat currency. During the Mongol Yuan Dynasty, the government spent a great deal of money fighting", "-26.295900790428277" ], [ "in three days to the lowest point since 2008 as it was hit by strong sales after threats of further USA tariffs. Chinese domestic discourse Chinese economic reforms in the late 1970s propelled the Chinese economy from a closed centrally planned economy to one opened to foreign investments and capital, oriented to manufacturing of electrical goods, textile, toys and exports. This has allowed China to become a creditor country in relations to current accounts and the largest in terms of foreign reserves.\nChina maintains that the value of the renminbi is market-driven. China says that its population receives high savings from", "-26.260722443199484" ], [ "of US intellectual property. In his 2012 documentary, Navarro said that China caused the loss of 57,000 US factories and 25 million jobs. Navarro maintains that China manipulates its currency, and although most economists believe that it is not the case, the U.S. Treasury officially designated China as a \"Currency Manipulator\" on August 5th, 2019.\nOf the more than dozen China specialists contacted by Foreign Policy, most either did not know of him or only interacted with him briefly. Kenneth Pomeranz, University of Chicago professor of Chinese History, said that his \"recollection is that [Navarro] generally avoided people who actually knew", "-26.252055849821772" ], [ "population of over one billion people with the commodities they wanted or needed. Instead, a 'dual track' pricing system aose which had promoted arbitrage between official and free-market prices for the same commodities.\nInflation and the unavailability of consumer goods had made some commodities too expensive for ordinary Chinese workers, as well as resulting in a general decline in living standards. Another factor arising from inflation in China had been corruption among the higher echelons of the CCP. Managers of factories in regulated industries—usually high-level Party cadres—have been selling factory produce on the free market at grossly inflated prices. Inflation and", "-26.250076584154158" ], [ "foreign firms, failing to protect intellectual property rights, and distorting trade with its government subsidies. There were also complaints by various lawmakers who wanted the administration to act against what they said was China's manipulating its currency, worried that it would allow China to underprice its exports and put American and other nations' manufacturing at a great disadvantage. The U.S.-China Business Council in 2014 said that China was restricting investment in more than 100 industrial sectors, including agriculture, petrochemicals and health services, while the U.S. was restricting investment outright in just five sectors.\nA number of senators and congressmen wanted the", "-26.23131193156587" ], [ "History As the second largest economy in the world, China represents a key driver of global growth. Although the Renminbi has been elevated to reserve currency status, only 10.3% of global trade is done through the currency (as of 2015). Because of this imbalance, the Chinese government has undertaken measures in recent years to open the country’s capital account.\nThe Qualified Foreign Institutional Investor (QFII) program was launched in 2002. Primary aims were letting financial institutions outside China invest in China’s stock and bond markets. However, it was limited to certain financial institutions such as commercial banks, securities companies, insurance companies,", "-26.14608097448945" ], [ "for real currency. In many cases, these gamers made more money than salaried workers in Venezuela even though they were earning just a few dollars per day. So many Venezuelans began this practice that it increased inflation with multiple game currencies. Law, regulation and taxation Some governments, perhaps recognizing that current regulatory systems may be ill-suited to address activities such as gold farming, have made statements concerning the sale of virtual goods. Australia In 2006, a spokesperson for the Australian Government stated normal earned income rules also apply to income from the sale of virtual goods. China Gold farming in", "-26.01551182309413" ], [ "governments didn't allow for taxes to be paid using paper money, and after a few years the government started refusing to convert the new paper money into hard currency; consequently, the Chinese people started to distrust it as a valid medium of exchange. In response to the ever more expensive military expenditures caused by the Taiping Rebellion, the government produced more and more high denomination banknotes, which were not convertible. This caused hyperinflation; by the year Xianfeng 9 (1859) the currency had become completely depreciated and was abolished. Earlier Qing dynasty banknotes During the transition from Ming to Qing", "-26.014518835407216" ], [ "to focus on online sales as the access to global consumers yielded much more income then traditional farming.\nWhile most years China's agricultural production is sufficient to feed the country, in down years, China has to import grain. Due to the shortage of available farm land and an abundance of labor, it might make more sense to import land-extensive crops (such as wheat and rice) and to save China's scarce cropland for high-value export products, such as fruits, nuts, or vegetables. In order to maintain grain independence and ensure food security, however, the Chinese government has enforced policies that encourage grain", "-25.99266102378533" ], [ "an artificially low currency to increase its exports in order to maintain a competitive edge in the world markets. By the 1980s, Japan's initial image for exporting shoddy and low quality products began to change dramatically. The resale of its cars would begin to spike upwards, its GDP per capita passed that of the United States while propelling the island country into the world's second largest economy. The U.S. government was growing wary of Japan's artificially low currency and would begin force it up but Japan would aggressively cut interest rates which sputtered growth. Despite bubbles culminating with a series", "-25.946346214035202" ], [ "when production costs or demand for a commodity altered, they often failed to reflect the true values of goods, causing many kinds of goods to be misallocated and producing a price system that the Chinese government itself referred to as \"irrational.\"\nThe best way to generate the accurate prices required for economic efficiency is through the process of supply and demand, and government policy in the 1980s increasingly advocated the use of prices that were \"mutually agreed upon by buyer and seller,\" that is, determined through the market. The prices of products in the farm produce free markets were determined by", "-25.91387692245189" ], [ "was filed in 2006 by the European Union, the United States and Canada, by which time there had already been accusations against China for using a combination of subsidies, tax incentives and an undervalued currency to gain an unfair advantage over foreign companies operating in China.\nChina lowered its average import tariffs to 10% by 2005 from the 40% it maintained in the 1990s. In 2005 Chinese exports to the U.S. increased 31 percent, but imports from the U.S. rose only 16 percent. And while the U.S. trade deficit with China was $90.2 billion in 2001 ($130 billion in 2019 dollars),", "-25.91158876073314" ], [ "last 40 years—real wages grew seven-fold from 1978 to 2007. By 2018, median wages in Chinese cities such as Shanghai were about the same as or higher than the wages in Eastern European countries. More than 75 percent of China's urban consumers are expected to earn between 60.000 and 229.000 RMB per year by 2022. China has the world's second-highest number of billionaires, with nearly 400 as of 2018, increasing at the rate of roughly two per week. China's domestic retail market was worth over 20 trillion yuan (US$3.2 trillion) in 2012 and is growing at over 12% annually as", "-25.910246636572992" ], [ "illegal export of silver out of China, the Kuomintang made the crime of smuggling of silver out of China punishable by either the death penalty or life imprisonment. The new legislation proved ineffective and the deflation would continue to lower the prices. \nAs private banking had come to an end in China, minister Kung laid for a proposal to create a new national fiat currency which would only be backed by government promises. The new currency would only consist of paper money and was intended to give multiple benefits exclusively to the Chinese Nationalist government, one of these benefits was", "-25.853456879922305" ], [ "making all silver in China government-owned property and the other was by expanding the Kuomintang's control over China's economy. As the Chinese government was now officially in possession of all silver in China and with the aid of the \"Currency Stabilisation Fund\", which was created by the United Kingdom and the United States to help the Chinese currency, it was generally believed that China's deflation problem could be solved. The Chinese Nationalist government would gain a complete monopoly over the Chinese money supply, this would make it possible for the government to monetise its debts. The destruction of the Chinese", "-25.81543511430209" ], [ "where it had insufficient reserves of foreign currency to do this successfully. Conversely, in the early 21st century, several major emerging economies effectively sold large amounts of their currencies in order to prevent their value rising, and in the process built up large reserves of foreign currency, principally the US dollar.\nSometimes the reserve account is classified as \"below the line\" and thus not reported as part of the capital account. Flows to or from the reserve account can substantially affect the overall capital account. Taking the example of China in the early 21st century, and excluding the activity of its", "-25.780248641967773" ], [ "consumers will complain that they find it expensive to acquire foreign currency with which to buy importable goods; and foreign governments, on behalf of foreign exporters, may urge such a revaluation to improve their countries' sale of exports. Effects A revaluation of the local currency to a higher value vis-a-vis other currencies will make it less expensive for local consumers to acquire the foreign funds with which to import foreign goods, so they will do more importing. Domestic producers, on the other hand, will be able to sell fewer export goods because foreign consumers will find it more expensive to", "-25.740651658130446" ], [ "in 2000. This increase was in part due to development of salt manufacture from mineral and lake sources. However, despite high production figures, salt prices remain expensive in China as a result of the salt monopoly; whilst average salt consumption as a percentage of personal income in the United States, France and Australia are 0.06%, 0.04% and 0.04% respectively, this value is 0.12% in China. Management The pricing of salt is set uniformly at a national level by China Salt, which centrally makes all decisions regarding market pricing. All legally manufactured table salt is branded as \"China Salt\" before shipments", "-25.72786352277035" ], [ "Bank of China devalued the RMB - by 1.86 percent to CN¥6.2298 per US dollar. A lower renminbi (RMB) \"makes China’s exports more competitive in foreign markets, offsetting part of the surge in the country’s blue-collar wages over the last decade; and it makes foreign companies, houses and other overseas investments seem more expensive.\" On 14 August, the central bank devalued it again to CN¥6.3975 per US dollar. In August there was speculation about the causes of the devaluation of the yuan and the changes in the Chinese economy in 2015, including the \"growth in its services sector rather", "-25.6540142238955" ], [ "of the currency leads to a bottled-up demand for exchange in both directions. It is viewed as a major tool to keep the currency peg, preventing inflows of \"hot money\".\nA shift of Chinese reserves into the currencies of their other trading partners has caused these nations to shift more of their reserves into dollars, leading to no great change in the value of the renminbi against the dollar. Futures market Renminbi futures are traded at the Chicago Mercantile Exchange. The futures are cash-settled at the exchange rate published by the People's Bank of China. Use as a currency outside mainland", "-25.62727661838653" ], [ "not at an unfair disadvantage with China.\" Bloomberg pointed out at that countries such as Brazil, South Korea and Thailand sold their respective currencies in the weeks preceding the report to curb gains and support export. South Korea, Taiwan, Brazil, Colombia and Russia were also tightening rules to limit capital flows and avoid swings in their currencies.\nHowever, the Obama administration decided to postpone the decision to label China a \"currency manipulator\" until after the G20 summit in South Korea and the United States elections, 2010.\nChina issued its own \"warning\" against being made a \"scapegoat\" for the US's failings.\nChina accused the", "-25.60858740506228" ], [ "in 2011, exports totalled 814,300 units. China's home market provides its automakers a solid base and Chinese economic planners hope to build globally competitive auto companies that will become more and more attractive and reliable over the years. In 2017, the country exported roughly 891,000 vehicles. In that year, the value of exports was nearly $70 billion in auto parts and $14 billion in cars, while total imports (parts and vehicles) totalled about $90 billion.", "-25.606470666476525" ], [ "the economy neither is there any evidence that they were redeemed for salaries. So by this time tael notes were used more commonly used to purchase office titles through the Qing government's office selling scheme. Like the Hubu Guanpiao, the Xiangpiao were used until the year 1868, when an edict issued by the imperial government outlawed all government backed banknotes. As in the capital city of Beijing the use of these banknotes led to a depreciation of office prices, but conversely, they partially alleviated the social fallout that occurred from unpaid military salaries.\nBefore their valued had dropped as significantly as", "-25.604246576913283" ], [ "subsidizing a Chinese industry. The ruling means penalty tariffs ranging from 99 percent to 701 percent will be imposed on Chinese imports of circular welded pipe. For more than two decades, the U.S. government had refused to consider subsidy cases against the Chinese government because China was classified as a non-market economy. However, the Bush administration, facing increasing anger over soaring trade deficits with China, reversed course in late 2007 and announced it would treat China in the same way as other countries in disputes involving government subsidies (\"US Steel Industry Wins Trade Case against China\", Associated Press, June", "-25.513867812209355" ], [ "deposit rate is 3%. The Chinese currency (renminbi) is seriously undervalued against the world's major trading currencies and therefore is likely to appreciate against the US dollar in the coming years. Given this situation, if an investor in the US deposits his or her money in a Chinese bank, the investor would get a higher return than if he or she deposits money in a US bank. This makes China a prime target for hot money inflows. This is just an example for illustration. In reality, hot money takes many different forms of investment.\nThe following description may help further illustrate", "-25.482144193600107" ], [ "Renminbi currency value Background The renminbi was introduced in October 1949 after the Communists took power on the Chinese mainland and established the People's Republic of China. Since the Chinese economic reforms of 1978, China has become the world's biggest exporter, second largest economy and biggest manufacturer in the world.\nFor most of its early history, the renminbi was pegged to the U.S. dollar at ¥2.46 per USD (note: during the 1970s it was revalued until it reached ¥1.50 per USD in 1980).\nIts value gradually declined as China embarked on a new economic course during Deng Xiaoping's leadership and transformed into", "-25.411079115670873" ], [ "the value of cash coins was dependent on their weight rather than any denominations. The same developments which lead to the creation of the new Xianfeng coinage had also necessitated the reintroduction of paper money in China after it was absent for two centuries. The new paper currency came in two forms, one was the copper-alloy cash coins-based Da-Qing Baochao and the other was the silver sycee-based Hubu Guanpiao (戶部官票) which were both introduced simultaneously with the new debased cash coinage. \nHowever, the government did not keep adequate reserves of hard currency to back the new banknotes up. Many provincial", "-25.410060865760897" ], [ "Death by China Theme Navarro argues that China violates fair trade by \"illegal export subsidies and currency manipulation, effectively flooding the U.S. markets\" and unfairly making it \"virtually impossible\" for American companies to compete. It is a critique of \"global capitalism\" including foreign labor practices and environmental protection. Currency manipulation and subsidies are stated as reasons that \"American companies cannot compete because they’re not competing with Chinese companies, they’re competing with the Chinese government.\"\nThe book's foreword was written by Tang Baiqiao, a student activist during the 1989 Tiananmen Uprising, now resident in the US and a prominent supporter of President", "-25.40251849165361" ], [ "better wages as Singapore's economic growth and living costs are gradually increasing. Businesses will thus face pressure on their profit margins as rising labour costs leads to higher production costs.\nLabour costs in China and India have been increasing over the years. China was initially one of the lowest labour cost countries known. However, due to the rising demands of people and the increase in the cost of goods, China is no longer regarded as the ‘cheapest’ country to manufacture goods anymore. China is now deemed as less competitive compared to other countries. The increased labour costs have resulted in some", "-25.393425374906656" ], [ "of 2013, while the country's luxury goods market has expanded immensely, with 27.5% of the global share. However, in recent years, China's rapid economic growth has contributed to severe consumer inflation, leading to increased government regulation. China has a high level of economic inequality, which has increased in the past few decades. In 2012, China's official Gini coefficient was 0.474. A study conducted by Southwestern University of Finance and Economics showed that China's Gini coefficient actually had reached 0.61 in 2012, and top 1% Chinese held more than 25% of China's wealth. Historical China was once a world leader in", "-25.354293956101174" ], [ "are reports of illegal-waste imports to China being dismantled and recycled solely for monetary gain, without consideration for workers' health or environmental damage. Although the Chinese government has banned these practices, it has not been able to eradicate them. In 2008, the prices of recyclable waste plummeted before rebounding in 2009. Cardboard averaged about £53/tonne from 2004 to 2008, dropped to £19/tonne, and then went up to £59/tonne in May 2009. PET plastic averaged about £156/tonne, dropped to £75/tonne and then moved up to £195/tonne in May 2009.\nCertain regions have difficulty using or exporting as much of a material as", "-25.351355704289745" ], [ "is more to these projects than just mere financial strategy, he stated “It’s also a vehicle for China to write new rules, establish institutions that reflect Chinese interests, and reshape ‘soft’ infrastructure.”\nThe negative effects of Chinese financial loans to Africa's economy include fear of losing local companies to those Chinese with strong buying powers. Debt from China has also promoted illicit trade among China and African countries. Such imports are cheap because of China's cheap labor and are thus preferred for locally manufactured goods. Examples of cheap imports from China include clothes and electronics. Trade between African countries and China", "-25.335505932338492" ], [ " In other words, such a country’s central bank would buy or sell dollars so as to maintain a stable exchange rate with the dollar. Such a policy has been adopted by several Asian countries including China. If not for the mentioned pegging, the currencies of these countries would rise against the dollar as a result of the US chronic current account deficit with such countries. But, the Asian countries have a vested economic interest in keeping US demand for their exports high. That’s where the pegging of their currency to the US dollar comes in.", "-25.307117738528177" ], [ "China's Circular Economy Background Circular economies are based off the 3R principle, being reduce, re-use, recycle. Reduce refers to a method of improving efficiency, where the input of resources are reduced and output levels are increased. Re-use is the implementation of integrated systems that uses recycled material in the input stage of the manufacturing process, where there is a less reliance on raw materials. The recycling principle revolves around implementing strategies that transform collected waste and normal output into a resource that can be used.\nThe major economic reformation that occurred in China during the late 1970s caused the economy to", "-25.296961647894932" ], [ "currency boards, currency unions and the traditional gold standard) it is impossible to use monetary policy to stabilise the business cycle: this means that any macroeconomic adjustment has to be achieved by changes in the prices of assets and labour. In Hong Kong, this is made easier by two factors: the first is the openness of the economy, with an aggregate demand heavily dependent on international trading partners; this reduces the risk of classic liquidity traps. The second factor is the scarce political clout of the trade unions, which makes it easier to trim the nominal salaries during recessionary times.", "-25.25962828082993" ], [ "prices started at $314 and rose to $434 for the year. In 2016 prices rose to $998 on 1 January 2017. 2017–2019 Prices started at $998 in 2017 and rose to $13,412.44 on 1 January 2018, after reaching its all-time high of $19,783.06 on 17 December 2017.\nChina banned trading in bitcoin, with first steps taken in September 2017, and a complete ban that started on 1 February 2018. Bitcoin prices then fell from $9,052 to $6,914 on 5 February 2018. The percentage of bitcoin trading in the Chinese renminbi fell from over 90% in September 2017 to less than 1%", "-25.257728168067842" ], [ "trade. Markets within China are still relatively closed-off to foreign companies. Due to its large and growing population, it is speculated that if its agricultural markets were opened, China would become a consistent net importer of food, possibly destabilizing the world food market. The barriers enforced by the Chinese government on grains are not transparent because China’s state trading in grains is conducted through its Cereal, Oil, and Foodstuffs Importing and Exporting Corporation (COFCO). Food safety As a developing nation, China has relatively low sanitary and phytosanitary (SPS) standards for its agricultural goods. Corruption in the government, such as the", "-25.250358340652383" ], [ "last name), and finally \"People's Currency\", or \"renminbi\", from June 1949. Era of the planned economy From 1949 until the late 1970s, the state fixed China's exchange rate at a highly overvalued level as part of the country's import-substitution strategy. During this time frame, the focus of the state's central planning was to accelerate industrial development and reduce China's dependence on imported manufactured goods. The overvaluation allowed the government to provide imported machinery and equipment to priority industries at a relatively lower domestic currency cost than otherwise would have been possible. Transition to an equilibrium exchange rate China's transition by", "-25.23868391290307" ], [ "commentators such as Martin Wolf have speculated that China is wary of complying with pressure to allow a substantial currency appreciation as she considers the long period of stagnation Japan experienced after the Plaza accord as in part resulting from Japan allowing a substantial appreciation of her currency against the dollar.\nChinese premier Wen Jiabao has stated that reforms to re-balance the Chinese economy away from its current dependency on exports are well underway and that the yuan is being allowed to gradually appreciate. He warned that if China is forced to revalue its currency too fast that it would lead", "-25.196633561356236" ], [ "private Chinese banks would sell their silver reserves outside of China while slowing down the production and issuance of new banknotes as they were withdrawing more of their older banknotes from circulation. This caused the supply of circulating banknotes to decline and those still left in circulation saw their purchasing power rise. This was disastrous for many private businesses across China as they would suffer from accounting losses as a result, the prices would continue to decline and the price of a sale was often lower than what the product had cost the business. Many business were forced to fire", "-25.15055613781442" ], [ "due to excessive production. In 1989 a national consumption tax (set at 3%) was put into place that calculated prices down to single-yen units, causing the Japan Mint to produce one yen coins in huge numbers.\nThis consumption tax rate was raised in 1997 to five percent, reducing demand for the coin. By the turn of the century other factors such as rising metal costs and increasing usage of electronic money began to come into place. It was reported in 2003, that it cost 13 yen for the mint to produce a rolled plate for one yen coins. The rising price", "-25.084526975534573" ], [ "RMB transactions and intended to \"increase global usage of the Chinese currency\", by \"cutting transaction costs and processing times\" and removing \"one of the biggest hurdles to internationalizing the yuan\". Because of the stock market turbulence, the launch had been delayed and CIPS was '\"watered down\" offering, a \"complementary network for settling trade-related deals in the Chinese currency to a current patchwork of Chinese clearing banks around the world\".\nBy December 2015, the RMB was still the \"fifth most used global payments currency and the second most used currency for trade finance\" with 27 per cent of China's goods invoiced in", "-25.05759261638741" ], [ "and still were not sufficiently accurate.\nIn 1987 the price structure in China was chaotic. Some prices were determined in the market through the forces of supply and demand, others were set by government agencies, and still others were produced by procedures that were not clearly defined. In many cases, there was more than one price for the same commodity, depending on how it was exchanged, the kind of unit that produced it, or who the buyer was. While the government was not pleased with this situation, it was committed to continued price reform. It was reluctant, however, to release the", "-25.057166869795765" ], [ "intensified due to the actions of China, the predominant supplier. Specifically, China has announced regulations on exports and a crackdown on smuggling. On September 1, 2009, China announced plans to reduce its export quota to 35,000 tons per year in 2010–2015 to conserve scarce resources and protect the environment. On October 19, 2010, China Daily, citing an unnamed Ministry of Commerce official, reported that China will \"further reduce quotas for rare[-]earth exports by 30 percent at most next year to protect the precious metals from over-exploitation.\" The government in Beijing further increased its control by forcing smaller, independent miners to", "-25.046738908160478" ], [ "China set the official midpoint rate on the yuan, also known as the renminbi (RMB), to its lowest level since March 2011—at CN¥6.5646 per US dollar. A lower renminbi (RMB) \"makes China’s exports more competitive in foreign markets, offsetting part of the surge in the country’s blue-collar wages over the last decade; and it makes foreign companies, houses and other overseas investments seem more expensive\".\nOn 7 January, Chinese authorities suspended the circuit breaker out of concern that the trade curb may \"have intensified investors’ concerns\".\nOn 16 January 2016 Xiao Gang the head of China Securities Regulatory Commission defended the CSRC's", "-25.03804204406333" ], [ "to China's global trade, its economy ran on a paper money. However, in the 14th century, China's paper money system suffered a crisis, and by the mid-15th century, crashed. The silver imports helped fill the void left by the broken paper money system, which helps explain why the value of silver in China was twice as high as the value of silver in Spain during the end of the 16th century.\nWith the xenophobia and intellectual introspection characteristic of the increasingly popular new school of neo-Confucianism, China under the later Ming Dynasty became isolated, prohibiting the construction of ocean going sea", "-25.019776760673267" ], [ "to being melted down for its bullion value, money that is considered to be \"good\" tends to leave an economy through international trade. International traders are not bound by legal tender laws as citizens of the issuing country are, so they will offer higher value for good coins than bad ones. The good coins may leave their country of origin to become part of international trade, escaping that country's legal tender laws and leaving the \"bad\" money behind. This occurred in Britain during the period of the gold standard. History of the concept Gresham was not the first to state", "-25.010770436245366" ], [ "reason was the fact that there was a severe lack of cash coins circulating in the market at that time and that these banknotes would help alleviate this scarcity. The Fuzhou government often opted to pay using heavily debased cash coins, this happened to the extent that the copper reserves which backed this issue up had lost much of its value, which compounded inflationary pressures and justified the longstanding mistrust of paper money that the Chinese public had for the medium.\nInitially, the Da-Qing Baochao banknotes were able to be redeemed through the local Yu, Ch'ien and T'ien banks in a", "-25.006578533153515" ], [ "1500 rupiah around that time.\nBecause many people simply don't have a choice many people will buy the modern duplicates while for other people their relatively low price might be the main motivation for their preference because in a minor ritual in a small local temple the quantity of cash coins needed may amount to many thousands of rupiah making it an expensive endeavour if they would prefer authentic Chinese cash coins. Despite this, the usage of imitation cash coins is actually not recommended becoming a rather big problem for many of these rituals, this has become such a big problem", "-24.992498764258926" ], [ "cost. China Around the peak of global tobacco production, 20 million rural Chinese households were producing tobacco on 2.1 million hectares of land. While it is the major crop for millions of Chinese farmers, growing tobacco is not as profitable as cotton or sugarcane, because the Chinese government sets the market price. While this price is guaranteed, it is lower than the natural market price, because of the lack of market risk. To further control tobacco in their borders, China founded a State Tobacco Monopoly Administration (STMA) in 1982. The STMA controls tobacco production, marketing, imports, and exports, and contributes", "-24.925539122414193" ], [ "10.1%, in 2004, and even faster 10.4% in 2005 despite attempts by the government to cool the economy. China's total trade in 2006 surpassed $1.76 trillion, making China the world's third-largest trading nation after the U.S. and Germany. Such high growth is necessary if China is to generate the 15 million jobs needed annually—roughly the size of Ecuador or Cambodia—to employ new entrants into the job market.\nOn January 14, 2009 as confirmed by the World Bank the NBS published the revised figures for 2007 financial year in which growth happened at 13 percent instead of 11.9 percent (provisional figures). China's gross domestic", "-24.92440619111585" ], [ "China's currency and exchange rate regime Chovanec argues that it is in China's own interests to move towards a more flexible exchange rate and a stronger Renminbi. Such a move, he believes, would reduce inflationary pressures on China's economy and enhance the buying power, and hence the living standards, of average Chinese citizens, as well as reducing tensions with China's trading partners. However, he sharply disagrees with Paul Krugman, and argues that an exclusive focus on rectifying exchange rates as a \"silver bullet\" is misplaced. Forcing China to strengthen its currency against its will, he contends, would only cause China", "-24.897092160812463" ], [ "and so on have had a policy of maintaining a low value of their currencies in the hope of reducing the cost of exports and thus bolstering their economies. A lower exchange rate lowers the price of a country's goods for consumers in other countries, but raises the price of imported goods and services for consumers in the low value currency country.\nIn general, exporters of goods and services will prefer a lower value for their currencies, while importers will prefer a higher value.", "-24.886721613118425" ], [ "money to continue fighting the expensive war. Huashana praised the idea of producing paper money as a far better alternative to selling offices and degrees, but despite his anti-office selling stance he did not advocate for it to be abolished. \nDuring the 19th century, Chinese trade in commodities such as tea, silk, and grain was of such a large volume that this trade actually taxed the capabilities of the copper-alloy cash coins-based currency system of China. During this period imperial Chinese revenues had to be remitted to the capital city of Beijing and provisional salaries paid. At the time the", "-24.875651326132356" ], [ "5% in a typical developed country. As intermediaries cannot sell these rotten fruits they pay farmers less than they would if able to sell all or most of the fruits and vegetables. This reduces farmer’s revenues although the problem is caused by post-production inefficiencies, which they are not themselves aware of during price negotiations with intermediaries.\nThese information and transportation problems highlight inefficiencies in the market mechanisms between farmers and end consumers, impeding farmers from taking advantage of the fast development of the rest of the Chinese economy. The resulting small profit margin does not allow them to invest in the", "-24.858685648248866" ], [ "a separate interview, he remarked that China achieved its 149.2 percent of its current trade surplus with the United States through \"lying, cheating, and stealing\" and that if China decided to realize its threat that had been expressed since August 2007 to sell its US Treasuries, it would actually hurt its own economy which is reliant on exports to the United States; the economy of the United States would be hurt by a sell-off of Treasuries, causing the United States to buy less from China, which would in turn hurt the Chinese economy.\nSince 2001 Chang has predicted that the Chinese", "-24.83983563289803" ], [ "Majapahit era. The reason for using foreign currency is not given in any source, but most scholars assume it was due to the increasing complexity of Javanese economy and a desire for a currency system that used much smaller denominations suitable for use in everyday market transactions. This was a role for which gold and silver are not well suited. These kepeng Chinese coins were thin rounded copper coins with a square hole in the centre of it. The hole was meant to tie together the money in a string of coins. These small changes—the imported Chinese copper coins—enabled Majapahit", "-24.814805134839844" ], [ "the USA to buy South American or Chinese goods relatively cheaply. These countries mostly had a currency based on the silver standard or even a paper currency, and domestically set the value of silver too high even though the world market price of silver had long been lower.", "-24.81423562002601" ], [ "be financed without a problem as long as credit is cheap. The need to finance trade deficit weakens currency making exports automatically more attractive in a country and abroad. A country in a monetary union cannot use weakening of currency to recover its international competitiveness. To achieve this a country has to reduce prices, including wages (deflation). This means years of high unemployment and lower incomes as it was during European sovereign-debt crisis. Trade A 2009 consensus from the studies of the introduction of the euro concluded that it has increased trade within the eurozone by 5% to 10%, although", "-24.807421082914516" ], [ "conventional modes of centralised war financing as it has been proven ineffective. In turn, it allowed the Chinese provinces a greater flexibility in raising revenues than before, mainly by greatly expanding office selling, a time-honored Chinese fiscal emergency measure of the Ministry of Revenue in the capital city but this was never used on such a scale by provincial and military administrations. The offices being sols were those of jiansheng (監生) and gongsheng (貢生).\nSilver ingots known as sycees have been a part of the Chinese monetary system since around the Tang and Song dynasties, but due to the natural scarcity", "-24.803156947164098" ], [ "the United States had a $270 billion trade deficit with China (Chinese imports totalling $360 billion compared to only $90 billion in American exports) in part to what most U.S. economists warn as an undervaluation of the Chinese currency, Yuan, which in turn gives its exporters a significant advantage in the global economy. China's Response China stated that this legislation, if passed, could spark a trade war. China has also cited Statistics that its currency has appreciated thirty percent in value relative to the dollar since 2005. Additionally, they point to Federal Reserve Chairman Ben Bernanke's Quantitative Easing (such", "-24.803009617113275" ], [ "it nearly doubled by 2005. In the four years after joining the WTO, China in general complied with many of its legal obligations, including passing laws and meeting deadlines. However, it was slow to enforce intellectual property rights and add transparency to its industrial rules and regulations, which made it difficult for U.S. businesses to access its market. By 2019 the estimated costs to the U.S. economy from Chinese IP theft was between $225 billion and $600 billion annually.\nThe Obama administration confronted other issues in 2010, when it opened an investigation into whether the Chinese government was subsidizing its alternative", "-24.741637475104653" ], [ "but the use of a common currency (or foreign exchange reserves) allows the country to run down its currency holdings and cushion the impact of the loss, drawing on the resources of the other country until the cost of the adjustment has been efficiently spread over the future. If, on the other hand, the two countries use separate monies with flexible exchange rates, the whole loss has to be borne alone; the common currency cannot serve as a shock absorber for the nation as a whole except insofar as the dumping of inconvertible currencies on foreign markets attracts a speculative", "-24.72910533225513" ], [ "that the Chinese financial system would not be able to handle the potential rapid cross-border movements of hot money, and as a result, as of 2012, the currency trades within a narrow band specified by the Chinese central government.\nFollowing the Internationalization of the renminbi, on 30 November 2015, the IMF voted to designate the renminbi as one of several main world currencies, thus including it in the basket of special drawing rights. The RMB became the first emerging market currency to be included in the IMF's SDR basket on 1 October 2016. The other main world currencies are the United", "-24.677610520404414" ], [ "(often negative) about countries that do not follow capitalism. A related aspect is the reputation of the government and its corporate governance – how bureaucratic, transparent, corrupt or efficient is a country's government?\nConsumers are generally felt to perceive Chinese products as low-quality, and to associate \"made in China\" labelling with value pricing, unskilled labour and inexpensive materials. In 2007 and 2008 China's reputation suffered worldwide due to product safety institutions in many parts of the world recalling Chinese-made products, such as pet food, toys, toothpaste and lipstick, because of concerns about their quality and safety.\nSome products are strongly associated with", "-24.673495758252102" ], [ "2013 eliminated or displaced 3.2 million U.S. jobs, 2.4 million (three-fourths) of which were in manufacturing.\" EPI reported these losses were distributed across all 50 states.\nTrump has vowed to label China as a currency manipulator on his first day in office. Washington Post fact-checker Glenn Kessler, citing experts such as C. Fred Bergsten, found that \"Trump's complaints about currency manipulation are woefully out of date,\" noting that \"China has not manipulated its currency for at least two years.\"\nTrump has pledged \"swift, robust and unequivocal\" action against Chinese piracy, counterfeit American goods, and theft of U.S. trade secrets and intellectual property;", "-24.670887422777014" ], [ "abandon any policy other than one of keeping their banknotes in general circulation by forcing them on the Chinese population under a continued threat of punishments and penalties and also by making their redemption by its holders as difficult as possible. The complete crash of the new currency systems occurred during the winter of Xianfeng 6 (1856) all the way into Xianfeng 7 (1857). The iron 10 wén cash coin drastically declined in its value, one of the reasons for this was the fact that it was being counterfeited on a large scale. At this time both peasants and merchants", "-24.646447035993333" ], [ "Woods II. Open market trading Typically, a government wanting to maintain a fixed exchange rate does so by either buying or selling its own currency on the open market. This is one reason governments maintain reserves of foreign currencies.\nIf the exchange rate drifts too far above the fixed benchmark rate (it is stronger than required), the government sells its own currency (which increases Supply) and buys foreign currency. This causes the price of the currency to decrease in value (Read: Classical Demand-Supply diagrams). Also, if they buy the currency it is pegged to, then the price of that currency will", "-24.638093365197847" ], [ "Commodity trading in China Commodity trading in China has a short but high-growth history. With an increasing product variety and deepening liquidity pools, the mainland's futures market is playing an increasingly important role in serving the national economy.\nAt present, the commodity markets in China are still in a development stage, with only a few exchanges in China trading in a small group of commodities. In the next few years, the Chinese government will gradually allow more commodities products to be traded in China along with various related derivatives. Size Trading volume of the nation's three commodity futures exchanges totaled", "-24.63152839842951" ], [ "a strengthening of the Chinese yuan. The latter became important as most Chinese aluminium was relatively cheap.\nWorld output continued growing: in 2013, annual production of aluminium exceeded 50,000,000 metric tons. In 2015, it was a record 57,500,000 metric tons. Aluminium is produced in greater quantities than all other non-ferrous metals combined. Its real price (in 1998 United States dollars) in 2015 was $1,340 per metric ton ($1,940 per ton in contemporary dollars).", "-24.62306508749316" ], [ "and manufactured in China, making it the counterfeit capital of the world. In fact, the counterfeiting industry accounts for 8% of China's GDP. Counterfeit goods are produced and manufactured in Russia, North Korea, Taiwan, Bulgaria, and Greece as well. Greece is responsible for 2% of counterfeit goods seized by the EU. Some counterfeits are produced in the same factory that produces the original, authentic product, using inferior materials. \nAnother trend in counterfeiting, especially seen in consumer electronics, is the manufacture of entirely new products using poor quality materials or, more often, incorporating desirable features not present in a brand's authentic", "-24.573219257814344" ], [ "and given a new currency code of ZWR. After 1 August 2008, 10 billion ZWN were worth 1 ZWR. Coins valued at Z$5, Z$10 and Z$25 and banknotes worth Z$5, Z$10, Z$20, Z$100, and Z$500 were issued in ZWR. Due to frequent cash shortages and the apparently worthless Zimbabwean dollar, foreign currency was effectively legalised as a de facto currency on 13 September 2008 via a special program. This program officially allowed a number of retailers to accept foreign money. This reflected the reality of the dollarisation of the economy, with many shop keepers refusing to accept Zimbabwe dollars and", "-24.5709368022508" ], [ "economy following economic reforms begun in 1978–79, the low cost of labor was an important component of advantage in gaining export market share over other exporting countries.\nWages for blue collar workers have risen rapidly since that period, leading to predictions that textile products from China would no longer be competitive due to loss of low wage advantage. However, other advantages held by China over developing countries including \"more efficient supply chain management, more modern infrastructure, and workers’ higher productivity\", have allowed Chinese textile producers to keep costs low relative to other producers. American trade statistics show from 2006 to 2014,", "-24.549963884193858" ], [ "production at the expense of more-profitable crops. Despite heavy restrictions on crop production, China's agricultural exports have greatly increased in recent years. Governmental influence One important motivator of increased international trade was China's inclusion in the World Trade Organization (WTO) on December 11, 2001, leading to reduced or eliminated tariffs on much of China's agricultural exports. Due to the resulting opening of international markets to Chinese agriculture, by 2004 the value of China's agricultural exports exceeded $17.3 billion (US). Since China's inclusion in the WTO, its agricultural trade has not been liberalized to the same extent as its manufactured goods", "-24.547819622641782" ], [ "exporters' money is worth\"—has nothing to do with volatility whatsoever, as this cost is exclusively determined by the interest rate differental between two currencies. Nevertheless, as Tobin said, \"If ... [currency] is suddenly withdrawn, countries have to drastically increase interest rates for their currency to still be attractive.\" Is there an optimum tax rate? Financial transaction tax rates of the magnitude of 0.1%-1% have been proposed by normative economists, without addressing the practicability of implementing a tax at these levels. In positive economics studies however, where due reference was paid to the prevailing market conditions, the resulting tax rates have", "-24.545092831365764" ], [ "machinery and vehicles to transport goods to market. In order to ensure that rural units could cover the costs of the increasing quantities of industrial inputs required for higher yields, the government periodically reduced the prices of the industrial goods sold to farmers, while raising the procurement prices for agricultural products. In the mid-1980s, however, the price gap between agricultural and industrial products was widening to the disadvantage of farmers. Industry After 1982, reforms moved China's economy to a mixed system based on mandatory planning, guidance planning (use of economic levers such as taxes, prices, and credit instead of administrative", "-24.5139507480053" ], [ "exchange reserves, foreign capital was also used to expand production of export commodities, such as textiles, and of import substitutes, such as consumer goods.\nChina has adopted a variety of measures to promote its foreign economic relations, maximizing the role of imports, exports, and foreign capital in economic development. Foreign trade organizations were reorganized, and control of imports and exports was relaxed or strengthened depending on the balance of trade and the level of foreign exchange reserves. Heavy purchases of foreign plants and equipment resulted in import restraint from 1980 to 1983. Because of the expansion of exports in the mid-1980s,", "-24.510539501643507" ], [ "currencies can devalue, often catastrophically, currencies with considerable commodity value are known to better maintain their value; a government can print as many fiat bills as it wants with relative ease, the same is not true of mining precious metals. This leads some investors to purchase goods and debts with high commodity value, which are inherently safer than those with low, or no commodity value, minimizing risk by sacrificing potential return.", "-24.50686064360343" ], [ "trade.\nWith no capital control market players will do this en masse. The trade will involve selling the borrowed currency on the foreign exchange market in order to acquire foreign currency to invest abroad – this tends to cause the price of the nation's currency to drop due to the sudden extra supply. Because the nation has a fixed exchange rate, it must defend its currency and will sell its reserves to buy its currency back. But unless the monetary policy is changed back, the international markets will invariably continue until the government's foreign exchange reserves are exhausted, causing the currency", "-24.49048043507264" ], [ "nations' exports. Nations that imported more than they exported would have their currency depreciated against the bancor; encouraging other nations to buy their products, and making imports more expensive. Gold and national currency would no longer be used in international trade and no longer move between countries.", "-24.483007183411246" ], [ "heavy industries coupled with resource inefficiency, as well as levels of consumption comparable to the Western world, has influenced China into adopting a circular economy to ensure sustainable growth.\nSince China is experiencing their industrialization process later than many other countries they have benefited from the latecomer effect, where they have learned from the success and failures of other nations when creating policy of their own. China has primarily learned from the circular economy strategies of Germany and Japan, where they have shaped many of China's policies revolving around the three R's of re-use, reduce, recycle. Japan's Basic Law for Establishing", "-24.482856570095464" ], [ "both the imperial Chinese and Republican Chinese governments did not have a central bank that regulated the Chinese monetary systems at the time, instead large networks of privately owned banks spread across China had more influence over the Chinese currency system. During this era copper was very commonly used for coinage, but silver was the primary medium of exchange and the whole economy of China was based on a de facto silver standard. \nThe Chinese free banking system allowed the interaction of private banks operating in various regions of China. Privately held banks during this period still operated like any", "-24.48157133818313" ], [ "exports and were subject to confiscation. Despite these measures Chinese merchants kept smuggling out Vietnamese cash coins to re-melt in China with an alloy of lead and zinc to resell them in Đại Nam for a profit which was a major problem for the Vietnamese economy. In the province of Bình Thuận brass and zinc cash coins had become a severe rarity. Illegal and private production of cash coins under Tự Đức As the government didn't produce enough money for the Vietnamese market it permitted the private production of cash coins and deliberately dissolved its own monopoly on the creation", "-24.477104550409422" ], [ "issue spurring heated debates among economists. Jobs go to the destination country and lower cost of goods and services to the origin country.\nOn the other hand, job losses and wage erosion in developed countries have sparked opposition. Free trade with low-wage countries is win-lose for many employees who find their jobs offshored or with stagnating wages.\nCurrency manipulation by governments and their central banks cause differences in labor cost. On May 1, 2002, Economist and former Ambassador Ernest H. Preeg testified before the Senate committee on Banking, Housing, and Urban Affairs that China, for instance, pegs its currency to the dollar", "-24.47701206727652" ] ]
31sn9c
Would a pizzeria owned by a gay couple be legally mandated to cater an event hosted by the Westboro Baptist Church?
[ "No, because for it to be considered discrimination, they have to refuse service to a protected class because they are a protected class. Protected classes are * Religion * National Origin/Ethnicity * Race * Gender Now, you couldn't refuse the Westboro Baptist Church because of their religion, but you could refuse them because you refuse to service that particular group because of what they do. Similarly, I could refuse to my barn out to the Black Panthers, not because of their race but because of the organization itself. Let's say you own a pizza place. There is a couple waiting for pizza that is sucking each other's face. You could kick them out because they are making other people uncomfortable, regardless of whether or not they are gay, because it's what they are actively doing. Discrimination would be if you actively refused service to particular people because of their particular standing in one of the protected classes. But, at the same time it isn't discrimination if you create a business centred around catering specifically to a particular group. ie, a woman's only gym, a gay only bar, a men's club, etc.", " > In cases in which the patron is not a member of a federally protected class, the question generally turns on whether the business's refusal of service was arbitrary, or whether the business had a specific interest in refusing service. [Source]( URL_0 ) This would be tricky with the WBC, because they are *technically* a church, and refusal on the grounds of religion is against the law. However, if the WBC told the owners of the pizzeria that they wanted their website ( URL_1 ) spelled out in pepperoni on all of their pizzas, I think they can legally refuse to comply with that request.", "One of the fundamental problems that we run into with this issue is that sexuality is not one of the federally recognized 'protected classes'. If you asked the people who are in favor of letting business discriminate against gay people if they would be okay if they also said that they didnt wamt to serve black people, or women, or Mexicans, the vast majority of them would (hopefully) say of course not. Until we have sexuality included in the protected classes mandate from the federal government, we will never have a definitive answer to these kinds of questions.", "No. Under current US law a business can refuse service to anyone so long as the reason for refusing service is not rooted in the fact that they are a member of a protected class. This means that they can choose to not cater an event due to time constraints, travel distance, cost, or because they do not cater (catering is more than just providing food, it is also providing staff and at time decorations).", "Few people seem to understand the way anti-discrimination laws work. The law recognizes certain \"protected classes,\" groups of people like blacks, Jews, and (mostly) gays. Their status as a protected class in federal law is currently in transition. If a business is normally open to the public, it is illegal for them to refuse to do business with a protected class. This is one of the things people fought--and even died--for in the civil rights movement. If you don't want to do business with \"those people,\" you are perfectly free to get the fuck OUT of the business and let somebody else have your market share. The people who are citing their religious beliefs today to refuse to do business with icky gay people are using the SAME arguments that people used to use to refuse business to blacks. It is perfectly legal to refuse service to an *individual,* even if they happen to be a member of a protected class. So you can toss out a disruptive crackhead even if he's black. And no, you can't sneak around the law by \"just happening to\" refuse service to a bunch of individuals who \"just happen to be\" members of a protected class. Once a pattern of class discrimination is found, you're in trouble. Although religion is a protected class, the members of *one specific* church are possibly not. You *might* be able to get away with refusing to serve any member of a *specific* church, as long as you have no pattern of discrimination against people of that religion otherwise. You'd probably better have a good lawyer on standby if you wanted to try it, though, especially if the \"church\" is the WBC, which is really just a family of legal trolls who intentionally act outrageously to provoke people into violating their civil rights so they can sue. Mostly, protected classes are things you're born into, not things that you join by choice. There are some exceptions, like family status, pregnancy, etc.", "Here's the thing about America. You can refuse anyone by saying, \"sorry, we're booked that day.\" But if you have to be a giant cunt and say, \"this is against my religion\", that's when you have a problem. (Also, when we allowed businesses to refuse people, we had the Jim Crow south. The Jim Crow south sucked. It's good we don't allow businesses to discriminate. There is no right to own a business in the constitution. If you can't serve people because of your religion, don't open a business. If you do, expect to lose it to fines.)", "You can refuse to do business if they want you to do something you don't want to do, like make a cake saying \"God hates fags,\" or if catering them requires you to go to one of their rallies and listen to their crap for several hours. You can refuse service because one of them was a dick to you or someone you know. You can refuse service because they've proven to be unreliable for payments in the past, with you or with other businesses. What you CANT do, is refuse to provide the exact same service, in the exact same way that you provided it to everyone else because of one aspect of them that you do not like.", "Clarification request: Would they be refusing to host because WBC is a church? Or would they be refusing to host because of who they are, how they behave, and what they choose to represent? There's a difference between choosing to deny service because of religion and another to deny service based on publicized hate speech. Also consider that being forced to provide service would place the pizzeria owners and staff in a situation of duress. So I'd have to say \"No,\" even without bringing religion into the discussion, you can't force someone to provide services in a hostile environment.", "In order for refusal of service to be considered \"discrimination\", the reason for their refusal must fall under one of the items in the list of protected classes, things like: * religion * national origin * gender * race This isn't a full list, but while WBC is indeed a religious denomination, this gay couple probably doesn't have any issues serving religious groups, or even other baptist groups, just hate groups. Hate groups are not a protected class, and therefore I do not believe that refusal of service to members of the WBC would be considered illegal.", "No because businesses have the right to refuse service, just as long as the reason has nothing to do with them being a member of a protected class.", "I wonder the same about a black owned pizzeria refusing service to a KKK wedding.", "Why do people consider gays a hate group? It's really silly." ]
[ [ "Baptists at Our Barbecue Plot \"Baptists at Our Barbecue\" is the story of the small town of Longwinded, Arizona, USA, a divided, feuding town of 262 Mormons and 262 Baptists. It's also a story about one man who will try anything to end the ridiculous feud, bring the town together, and keep the peace-loving girl of his dreams from leaving town.", "-28.561482690594858" ], [ "the resort also featured the Texas Star Oyster Bar.\nThe resort's bowling alley opened in December 2000, and accounted for $15 million to $18 million of the $65 million expansion. The resort also introduced its Club Rev concept, in which the bowling alley was turned into a bowling disco two nights a week, with a disc jockey, a light show, and go-go dancers. The wedding chapel also opened in December 2000, and the Texas Station invited more than 250 married couples to renew their vows there to celebrate the opening. Shootings In 1996, two men shot at security guards in the", "-28.367478499918434" ], [ "few doors away was going bankrupt and Ernie DeBaca was able to buy the building outright.\nThe Castro Theatre originally opened at 479 Castro Street in 1910. The building was later remodeled into a retail store in the mid-1920s after the larger Castro Theater was built up the street. At the root of what was to become the best known gay mecca was the politicizing efforts of Harvey Milk, the first openly gay city supervisor in San Francisco, who started the Castro Street Fair and was later assassinated in SF City Hall in 1978. Milk had also started the Castro Village", "-28.3371022164647" ], [ "the money from the hotel sale to purchase the closed Foxy Firehouse casino. Wiesner reopened the two-story building as the Holy Cow! in March 1992. A microbrewery was added a year later. The Holy Cow was the first microbrewery to open in Las Vegas. Prior to that time, long-standing laws had prevented breweries from operating in the city. However, Wiesner persuaded the state to change its laws to allow the operation of local breweries.\nThe Holy Cow operated as part of Wiesner's Big Dog's Hospitality Group, which consisted of a chain of local bar-restaurants. The Holy Cow was known for its", "-27.887120646599215" ], [ "casinos are sold. By the end of September 2000, approximately 300 of the Santa Fe's 900 employees had left the resort, while approximately 400 others had applied with Station Casinos to keep their jobs. Of the 400 employees, approximately 150 had been rehired or were awaiting possible job offers. In 2002, a former Santa Fe employee alleged that he was beaten on the property's parking lot in 1996 because of his prior Culinary union organizing activities and was subsequently fired for missing too much work as the result of his injuries. Paul Lowden disputed the assault claim, stating that no", "-27.863939832444885" ], [ "overwhelmed and closed to traffic – at least for a few hours - each Halloween to make room for the costumed revelry. In 1979, the adult gay Halloween party moved to Castro Street in The Castro, which by the early 1970s had replaced Polk Gulch as San Francisco's most important gay neighborhood. The Castro becomes a gay community The Eureka Valley of San Francisco, where Market and Castro Streets intersect, had for decades been a blue-collar Irish Catholic neighborhood synonymous with the Most Holy Redeemer Catholic Parish. Beginning in the 1960s, however, suburbs in Berkeley and Oakland attracted young", "-27.59208844289242" ], [ "resort. At that time, the Nevada Gaming Control Board rejected Culinary's request that regulators require Station Casinos to reverse its termination of the Santa Fe's employees. Later in the month, the Las Vegas City Council rejected a request from the union to mandate that Station Casinos retain a certain number of Santa Fe employees. Las Vegas mayor Oscar Goodman was initially supportive of the union's efforts but stated, \"As the law presently exists, we can't impose a condition that these folks be retained.\"\nThe Nevada Gaming Commission subsequently rejected a regulation proposed by the union which would restrict employee layoffs whenever", "-27.409349750931142" ], [ "Craig Estey Richard Craig Estey is the founder of Dotty's, a chain of taverns with slot machines with about 175 locations in Nevada, Oregon, and Montana, and another 150 locations planned in Illinois. The business model is controversial, with sites \"offering minimal food and beverage choices with a heavy focus on gambling.\" The chain caters to women aged 35 and older, with a clean, well-lit atmosphere meant to invoke \"your grandmother's kitchen\". \nIn 2006, Estey came under investigation by the Lottery for alleged incidents of domestic violence against his wife, and for lying to Nevada gaming regulators about the", "-27.339605862543976" ], [ "license at Crazy Horse Too. Signorelli would temporarily lease the club from Rizzolo, as Cadwell was still considered a potential buyer. At the end of September 2006, an opponent of Crazy Horse Too opened a nearby church; because of a Las Vegas city code, businesses that serve alcohol were prohibited from operating within 1,500 feet of a church. The church's deacon denied that he was attempting to sabotage Signorelli's plans for the club. Signorelli was considered a potential buyer of the club in early October 2006, while a city attorney said the nearby church would not be able to prevent", "-27.174998003063592" ], [ "'substantial connections to the community' are allowed, and the pastor of First Southern Baptist Church of Scottsdale was selected instead. The Satanic Temple says they were never asked this question in the application process. Following this, The group's co-founder Michelle Shortt has since filed suit against the city, saying they had 'no written policy regarding prayer and only reversed its decision after backlash from the community and city officials.'. Membership Membership in The Satanic Temple is free and open to anyone and can be obtained by signing up on the official website. Membership cards can be purchased for $25. Additionally,", "-27.097460240955115" ], [ "\"contraband\" barracks in the Shaw community of Washington, D.C. (then called \"Hell's Bottom). It was here, within \"Hell's Bottom, that Reverend Bailey and the founders of the Metropolitan Baptist Church began to minister to some 4,000 newly freed slaves.\nMetropolitan holds the distinction of having had only six pastors in its history since 1864: Reverend Henry Bailey (1864–1870); Reverend Robert Johnson (1870–1903); Reverend Moses W. D. Norman, D.D., LL.D (1905–1926); Reverend Dr. Earnest Clarence Smith (1928–1977); Reverend Dr. H. Beecher Hicks, Jr. (1977–2014) and Reverend Dr. Maurice Watson (2015 - present).\nMetropolitan's pastor-emeritus, Dr. H. Beecher Hicks, Jr., was named one of", "-26.979503078735434" ], [ "a limited time. Though the company was not the first to implement such a policy in the United States, the move came at a time of increasingly heated debate over illegal immigration in the United States and caused the chain's Dallas headquarters to receive complaints and death threats, even the Swad/Fiaschetti's household in Sunnyvale, Texas was threatened by the KKK for associating with Latinos . It also created publicity for the chain, garnering media attention from several outlets including Fox News, The Colbert Report, MSNBC, The Tonight Show and many more. After the first week of the promotion, one owner", "-26.913562091714994" ], [ "critical of the city's financial support of the casino, including increased police presence near the casino and planned financial reimbursements, particularly after initial revenue from the casino has proven to be less than anticipated.\nHorseshoe also faces a unique security challenge, because it holds a 24-7 liquor license at its 14forty bar. The only bars in Maryland that can serve alcohol around the clock are in casinos.", "-26.880899327996303" ], [ "Beth Chayim Chadashim History On April 4, 1972, Selma Kay, Jerry Gordon, Jerry Small, and Bob Zalkin were the only people who came to a weekly Wednesday night meeting at Los Angeles’s Metropolitan Community Church. They were all Jewish, and Selma asked, \"Why don’t we form a temple with an outreach to the gay Jews?\" The others agreed, and Rev. Troy Perry offered them the use of the church’s facilities free of charge. About a dozen women and men responded to the call to an ad hoc committee meeting to discuss the temple's founding, and the first service was", "-26.872633012753795" ], [ "are a couple of Pentecostal churches, an internet cafe, a hardware store and a couple of motels.", "-26.864414444744398" ], [ "Missouri ruled that state law did not authorize municipalities to regulate the location of churches. Other information The synagogue conducted its first wedding for an LGBT couple in 2008.\nIn 2010, Temple Israel made history by promoting assistant rabbi, Amy Feder, 31, to senior rabbi, making her the youngest female senior rabbi to lead a large Reform congregation in North America.\nIn 2018, the Temple had approximately 900 member households.", "-26.85679853268084" ], [ "May 2012. An attorney for Canico said that it was difficult to \"imagine that such a funky little strip mall is the most talked about piece of real estate in Clark County.\"\nIn June 2012, the city council approved a city ordinance that would allow Crazy Horse Too to reopen as a strip club and bar, allowing Canico to sell the property to a potential buyer at a higher value. The vote was approved with the belief that Canico would donate $1.4 million to the city, an amount of money similar to what Rick Rizzolo owed from his September 2006 fine.", "-26.783631547763434" ], [ "others, known as Green and Associates. By this time, integration of the strip had diminished the businesses in West Las Vegas and it had begun slipping into decline. The club was licensed for blackjack, craps, keno, poker and slot machines and offered soul music as entertainment. It operated until 1993, when it was sold again.\nThe new owners renamed the bar the Ultra New Town Tavern and advertised that they had 36 slot machines and 2 gaming tables. In 2003, the ceiling collapsed and in 2010, the city closed it due to its deteriorated condition, after the owner was unable to", "-26.63074008015974" ], [ "held June 9, 1972 in Jerry Gordon’s home. In July 1972, a interfaith service was held at MCC’s sanctuary, to introduce the new temple to the gay and lesbian community. Weekly Friday night Jewish services were then held at MCC.\nIn 1973, BCC received a Torah scroll from the town of Chotebor, Czechoslovakia, on permanent loan from Westminster Synagogue in London. It continues to be a cherished guest at BCC.\nAfter several temporary locations, in 1977 the BCC congregation purchased a storefront at 6000 West Pico Boulevard in West Los Angeles (the Pico-Robertson area) that was transformed into a synagogue", "-26.547800736676436" ], [ "after it became known as a non traditional Christian church. It was operated by a renegade Baptist preacher called Rev. Bill. By the late '70s rumors were circulating about unorthodox dealings with the youths at the school. The school eventually closed. Rev Bill was never heard from again. Local legend says that there was ritualistic practices going on, locking up children and brainwashing them into occult practices. To the locals this place is known as The Devil's Mansion. Now operated as an event center by a non-profit organization, it is currently the home of the weekly Nevada County", "-26.49206053170201" ], [ "Inno-Pacific to court in 2003.\nBefore this could come to trial, Shakey's was sold to Jacmar Companies of Alhambra, California in 2004. Jacmar had been the franchisee of 19 Shakey's restaurants.\nAs of October 2018, there are 51 Shakey's Pizza restaurants in the United States - 48 of the locations are in California (all, except Oroville, are in Southern California), and two in Washington. The last location east of the Mississippi River, in Auburn, Alabama, closed in April 2019.\nThere are six locations in the Greater Mexico City metro area. In popular culture In a season five episode of South Park entitled \"Kenny", "-26.43907400473836" ], [ "Union for four of those years.\nIn 1996, he and his wife opened Saint Giuseppe's Heavenly Pizza in Moline, Illinois; the restaurant is still owned by the family and Schilling ran the restaurant until taking office, when he left his son in charge. According to public personal financial disclosures, Schilling's restaurant has dropped in value from a range of $100,000 to $250,000 down to between $50,000–$100,000. Schilling's son and campaign manager Terry Schilling said, \"The real estate market has really taken a hit in East Moline. It just goes to show that Bobby Schilling has a real stake in this economy.\"", "-26.438644874710008" ], [ "followed by a location in San Francisco about a month later, located less than a block away from AT&T Park. In 2016, Taco Bell launched the Taco Bell Catina flagship store located on the Las Vegas strip. This 24-hour restaurant hosts a variety of unique features including alcohol, new menu items, and a DJ. It was announced in August 2017 that the store would begin hosting weddings. Taco Bell Cantina currently has locations in San Francisco, Berkeley, Chicago (2 locations), Las Vegas, Austin, Fayetteville, Cincinnati, Cleveland, Atlanta, Newport Beach, and plans to open soon in Somerville, MA.\nIn March 2016, Taco", "-26.380498347905814" ], [ "other college towns through a tightly-controlled franchising system, by the mid-1980s there were nearly three new Domino's franchises opening every day.\nIn 1989, the National Organization for Women (NOW) called for a boycott of Domino's because of his active opposition to abortion, but it is unclear what effect, if any, that had on the company's sales.\nIn 1998, Monaghan reportedly sold his 93% of stock ownership of Domino's Pizza to Bain Capital, an investment firm based in Boston, for an estimated $1 billion. Domino's Pizza is an American restaurant chain and the international franchise pizza delivery corporation is headquartered at the Domino's", "-26.36107893033477" ], [ "Las Vegas, which was ultimately cancelled later that year.\nIn September 2007, Steven Johnson, a real estate developer from Arizona, purchased the property for $47 million through his company, Aspen Highlands Holdings, LLC. Many of Johnson's properties in Las Vegas were developed into Walgreens stores, although he said that he had not decided on his plans for the Holy Cow property. By April 2008, a Walgreens store was being planned for the property. Because of the high cost for the land, Johnson hoped to sell the air rights to the property, allowing others to construct a casino and high-rise hotel or", "-26.35276767439791" ], [ "as a result of this tension. The dispute was settled by the priests from Sacred Heart and Holy Family calling their respective patrons to stop fighting and buying each other a beer.\nIn 2008, the two Catholic parishes were merged to create Holy Cross Roman Catholic Church.\nIn 2012, the Souls Harvest Baptist Church relocated to New Philadelphia from Port Carbon, Pennsylvania. They are now located at the corner of Kimber and Clay streets in the building that once housed a Methodist church. This building is the oldest building in town.", "-26.32179114581959" ], [ "San Francisco, which was known as \"the Black House\". In February 1967, LaVey and the Church performed a much publicized Satanic marriage of Judith Case and journalist John Raymond. The ceremony was attended by Joe Rosenthal. LaVey performed the first publicly recorded Satanic baptism in history for his youngest daughter Zeena, which garnered worldwide publicity and was originally recorded on The Satanic Mass LP.\nLaVey attracted a number of celebrities to join his Church, most notably Sammy Davis Junior and Jayne Mansfield. LaVey also established branches of the Church, known as grottos, in various parts of the United States; these included", "-26.291548715133104" ], [ "Vegas Strip.\nIn 2008, Fonfa and his lesbian sister, Gudren, revealed plans for a potential hotel-casino on the adjacent three-acre property initially planned for the second tower. The $1.2 billion resort would be called Q, standing for \"queer\", and would cater to gay and lesbian people. The 45-story hotel would include 1,000 rooms, and would be managed by Wyndham. That year, Fonfa began marketing Allure towards a gay and lesbian clientele to recover from financial losses caused by customers who failed to close on condominium units that they had reserved. In April 2009, Fifield Companies announced that 10 Allure condominium units", "-26.287840135017177" ], [ "to a theater that could hold 600 within several months. In 1971, their own building was dedicated with over a thousand members in attendance.\nBeing outspoken has caused several MCC buildings to be targeted for arson, including the original Mother Church in Los Angeles. Perry's theology has been described as conservative, but social action was a high priority from the beginning of the establishment of the denomination. Perry performed what Time Magazine described as the first public same-sex unions in the United States as early as 1968 and ordained women as pastors as early as 1972.\nMCC has more than 200", "-26.25088525262254" ], [ "confirmed the action of the city. In a public statement, the brothel denied any connection with the Hells Angels and vowed to appeal the ruling. The brothel closed on 7 January 2008. On 15 January 2008 a higher court confirmed the decision; Yab Yum lost its licence and will remain closed.\nOn 3 April 2010 an offer was announced; sex club owner Hennie Vittali was asking €6m for the name and property. Yab Yum Unlocked, the Yab Yum Museum The Yab Yum building was bought for 3 million euros and the brand for 1 million euro by entrepreneur Chris Kraijpoel.", "-26.19683745576549" ], [ "reimburse store owners for the pizzas.\nDomino's sponsored CART's Doug Shierson Racing, which was driven by Arie Luyendyk and won the 1990 Indianapolis 500. In 2003, Domino's teamed up with NASCAR for a multi-year partnership to become the \"Official Pizza of NASCAR.\" Domino's also sponsored Michael Waltrip Racing and driver David Reutimann during the 2007 season in the NASCAR Sprint Cup Series. 30-minute guarantee Beginning in 1973, Domino's Pizza offered a guarantee to customers their pizzas would be delivered within 30 minutes of placing an order or they would receive the pizzas free. This guarantee was changed to $3 off in", "-26.16888053931507" ], [ "and Oprah Winfrey.\nThe Chapel is linked to a vast underground series of tunnels crisscrossing the campus carrying utilities.\nThe congregation of Wake Forest Baptist Church holds regular Sunday services in the chapel. In the late 1990s the chapel became the center of controversy when members of the church decided to conduct a same-sex commitment ceremony. Other events held in the chapel throughout the year, include a Moravian lovefeast during the Christmas season.", "-26.128957780310884" ], [ "Vagabond Inn The Vagabond Inn is an upper-end economy and mid-priced chain of hotels and motels located on the West Coast of the United States.The Vagabond Inn brand is franchised by Vagabond Inn Corporation of El Segundo, California. Today, there are more than 30 Vagabond Inn locations in Arizona, California, Nevada, Oregon, and Texas. The hotels are generally located in busy markets near popular tourist destinations, major attractions, major cities, and airports. History In 1958, Vagabond Motor Hotels, Inc, a California corporation, opened its first hotel in California: the first Vagabond Inn. It was geared towards the value-conscious leisure and", "-26.002185098841437" ], [ "Tremont Temple The Tremont Temple on 88 Tremont Street is a Baptist church in Boston, affiliated with the American Baptist Churches, USA. The existing multi-storey structure was designed by architect Clarence Blackall of Boston, and opened in May 1896. It replaced a much smaller, 1827 structure that had repeatedly suffered damage by fires.\nThe new facility was designed with a large auditorium, ground-floor retail shops, and upper-story offices, all of which could be leased commercially so that the congregation could welcome all worshippers for free.\nThe building is currently under study for landmark status by the Boston Landmarks Commission. History On 28", "-25.9958491527359" ], [ "Holdings of Edmonton, took over the project, and sought new investors to buy or lease the hotel, which was losing $500,000 a month.\nAllarco was acquired in January 1981 by Carma Developers, a Calgary-based real estate company. Carma spent over two years trying unsuccessfully to sell the Shenandoah, before deciding to seek a gaming license to open the casino itself. Nevada passed a law in June 1985 to enable foreign companies to receive gaming licenses, and, weeks later, Carma was the first to take advantage of the new law. The property was reopened and rebranded as the Bourbon Street Hotel", "-25.983520593552385" ], [ "up of American Baptist Churches and Organizations desiring to be inclusive of gays and lesbians. The church continues today with an active ministry.", "-25.939380284844447" ], [ "officially opened for Easter Sunday worship on March 31, 2013.\nWhile the modern trend for many growing churches is to purchase old buildings, renovate existing space, or open satellite campuses in neighboring suburbs, First Baptist Church Dallas decided to keep the entire church in Downtown Dallas, where it has been since its inception in 1868. Social issues In the aftermath of the racial unrest in Charlottesville, Virginia, in August 2017, Pastor Jeffress condemned white supremacy: \"Let there be no misunderstanding. Racism is sin. Period.\" In a separate interview, he also stated that white supremacy and neo-Nazism are \"repulsive and totally contradictory", "-25.930833784190327" ], [ "in 1977, the same year that Elvis-themed weddings began there.\nThe chapel is a small building, in the New England style, with a white picket fence. It holds 30 people.", "-25.895113807928283" ], [ "City, New York. Flay opened the tenth and largest Bobby's Burger Palace site at Maryland Live! Casino in Hanover, Maryland, on June 7, 2012. Bobby's Burger Palace also has an 11th location, in College Park, Maryland. In total, BBP has nineteen locations in eleven states and the District of Columbia.\nThe original Mesa Grill in New York closed in September 2013 following a proposed rent increase by the landlord. Throwdown! with Bobby Flay On Throwdown! with Bobby Flay, the chef challenges cooks renowned for a specific dish or type of cooking to a cook-off of their signature dish. On Episode 5", "-25.884302926642704" ], [ "Cotton Club (Las Vegas) History Established in late 1944 as a small bar by Moe Taub, it was one of the earliest Black clubs to legally operate away from Downtown Las Vegas. Sarann Knight-Preddy become a keno writer for the club, and in 1950 she became the first black woman to hold a gaming license in Nevada.\nIn July 1947 the Cotton Club was sold to Jodie Cannon, who resold it less than 6 months later to Uvalde Caperton, though Cannon stayed on as a manager. The original club was destroyed by an explosion and fire in May 1948. Caperton owned", "-25.8720519692979" ], [ "including a \"precinct\" inside the Jay's Sporting Goods store in Gaylord. A second location was opened in the former McDonald's Bakery in Ludington in 2016, and plans were announced to open a third location in Bay City.\nThe bakery has been publicized for the novelty of a doughnut shop being owned by police officers.", "-25.868983523265342" ], [ "Godfather's Pizza History Godfather's Pizza was founded in Omaha, Nebraska, in 1973. Willy Theisen bought out the pizza parlor and the name in 1974 from Gregg Johnson (who later started the Minsky's Pizza restaurants), and sold his first franchise. Theisen sold the company to Pillsbury in the mid-1980s and stepped down from actively managing the company. In 1986, Pillsbury named Herman Cain CEO and President of the brand. Cain and Ronald B. Gartlan, the company's executive vice president, led a group to purchase the Godfather's brand from Pillsbury, which they did by the beginning of 1990 in a leveraged buyout", "-25.863394373940537" ], [ "as a major gay neighborhood and was targeted by several dozen church members who took weekly trips to preach to the residents about the immorality of homosexuality. In August 1980, a dozen men dressed in 14th century Belgian nun's robes and habits, and according to one participant using the name Sister Missionary Position, \"a teensy bit of make-up so as not to be dowdy on a Friday night\", met the proselytizers where a chase ensued and attracted an audience of gay supporters who heckled the preachers until they left.\n\nIn October 1980, the dozen or so erstwhile nuns held their first", "-25.84654939526706" ], [ "its later years, the church became a hotel. The building has since been demolished, and the land is now the site of a Metropolitan Correctional Center federal facility housing male and female pre-trial and holdover inmates, serving the Southern District of New York.", "-25.84264741914376" ], [ "Burgers & Fries, Wegmans, Home Depot, Bed Bath & Beyond, Christmas Tree Shops, Dick's Sporting Goods, and Best Buy, and restaurants such as Panera Bread, Houlihan's, Chick Fil-A, and Starbucks Coffee, The Cheesecake Factory, Brio Tuscan Grille.\nThere have been plans by Parx Casino and Racing and Penn National Gaming, in a partnership, to build an Off Track Betting Parlor at the site of the former raceway near the lone standing entrance gate. On May 14, 2018, the United States Supreme Court struck down the Professional and Amateur Sports Protection Act of 1992, paving the way for states to legalize", "-25.80259290009053" ], [ "driver Scott Lagasse Jr., who finished 13th in the No. 11 America's Incredible Pizza Company Chevrolet at Charlotte Motor Speedway in October 2008. The sponsorship ended in December 2009 when CJM Racing suspended operations. Keller provided the best run for the team, a third at Gateway Motorsports Park in 2008. Awards In 2008, the America's Pizza Company was named a \"Top Family Entertainment Center of the World\" (TFEC) from the International Association of Amusement Parks and Attractions (IAAPA), which places it among one of the top five entertainment centers in the world. In 2008, AIPC was rated the 456th", "-25.78126161637192" ], [ "building the resort on what became the Las Vegas Strip.\nMexican President Lázaro Cárdenas outlawed gambling in 1935 and closed the resort. It became a state-run school, Escuela Preparatoria Federal Lázaro Cárdenas and eventually fell into disrepair. Remnants of the original buildings remain next to the Plaza Minarete strip center at the end of Avenida Sanchez Taboada. Although the casino and hotel were closed, the racetrack continued to operate for many years. The original grandstand structure was destroyed by fire in 1971, but was rebuilt and continues to operate today", "-25.74724223466137" ], [ "to the point of dictating their choice of marriage partners. The city of Zion was effectively controlled by the church; all of its real estate, while sold at market rates, was conveyed under a 1,100 year lease, subject to many restrictions and to termination at the whim of the General Overseer. Religions other than the Christian Catholic Apostolic Church were effectively banned – visiting preachers from rival sects were harassed and hounded out of town by the city police force.\nVoliva diversified Zion Industries, an industrial concern owned by the church that manufactured Scottish lace, to include a bakery which produced", "-25.738666157832995" ], [ "12,000 pizzas to relief workers following the September 11 attacks on the World Trade Center and The Pentagon. Through a matching funds program, the corporation donated $350,000 to the American Red Cross' disaster relief effort. In 2004, Domino's began a partnership with St. Jude Children's Research Hospital, participating in the hospital's \"Thanks and Giving\" campaign since the campaign began in 2004, and raising $5.2 million in 2014. Advertising In the late 1980s, Domino's was well known for its advertisements featuring a character called the Noid, created by Group 243 Inc. who hired Will Vinton Studios to produce the television commercials", "-25.73608790014987" ], [ "outside of the Casino. Outside entertainment included a live performance from Andy Kushner Entertainment's Rhythm6 band and vertical dance performances by BANDALOOP and pyrotechnics before doors opened to VIPs. Inside entertainment was provide by legendary Motown artist Gladys Knight, with \"break music\" provided by Iggy Azalea and Pauly D.\nIn October 2018, the Horseshoe announced a multi-year marketing deal making it the official casino partner for the Baltimore Ravens. Question Seven In November 2012, after the most expensive political campaign in Maryland's history, voters approved a 6th casino license in the state, as well as the addition of table games", "-25.720410412966885" ], [ "and the Sinners started out as a typical mid 60's garage/dance band before evolving into a soul/horn band, not unlike Wilmer & the Dukes (another regionally popular band). The Saint and the Sinners fought it out with both The Dukes and The Monterays on the local dance circuit.\nThe band could be seen regularly playing the hip clubs and dances of the era. These places include: Hewitt's, The Pin-O-Rama in Oswego, S.U. frat blasts, Carlsys, The Turn On in Downtown Syracuse, and other local high school dances. It was at this time that the Sinners made their first recordings \"LIVE\" (naturally)", "-25.713888961491648" ], [ "El Cortez (Las Vegas) History Marion Hicks and J.C. Grayson built El Cortez, downtown Las Vegas' first major resort, for $245,000. El Cortez opened on November 7, 1941. The location at 6th Street and Fremont was originally considered too far from downtown, but it quickly became so profitable that Bugsy Siegel, Meyer Lansky, Gus Greenbaum and Moe Sedway bought the property in 1945 from J. Kel Houssels for $600,000. John Kell (J. Kell) Houssels, Sr. (1895–1979) had originally opened the 59-room hotel and casino before the sale to the major organized crime figures. Houssels purchased the hotel back from Siegel's", "-25.69384898439239" ], [ "to the city. This is why there are also two Pentecostalist churches and a kingdom hall of Jehovah's Witnesses.", "-25.637070540571585" ], [ "Del Lago Resort and Casino Facilities The casino features 1,960 slot machines, 85 table games, and 14 poker tables.\nThe property has nine restaurants and bars, a spa, and several retail outlets.\nThe resort's entertainment venue, The Vine, has 2,400 seats, and hosts various concerts throughout the year, as well as a weekly comedy night. History In 2011, New York State governor Andrew Cuomo announced his administration's intent to license casinos in upstate New York to compete with Native American tribal casinos. However, this was contingent upon legislation that needed to pass. Cuomo came to an agreement with the legislature in 2013", "-25.626650087491726" ], [ "in the Wasatch Front area of Utah until March 2004, when five Salt Lake outlets were sold to real estate developers. The restaurants were transformed into Walgreens, in a deal which marked \"the point of entry\" into the Utah market for developer Phillips Edison. In August 2005, the restaurant chain settled an employment discrimination lawsuit filed by the Equal Employment Opportunity Commission on behalf of three employees who alleged they had been sexually harassed by a co-worker at a Dee's location in Midvale. As part of the settlement, the company agreed to revamp its sexual harassment policy and", "-25.618914191918975" ], [ "Rosemont Theatre About The Mayor of Rosemont, Bradley Stephens, is currently planning to sell the site to the state of Illinois to use as a casino in an effort to gain revenue. The idea was initially pitched in September 2007 and again in May 2008, to lawmakers in Springfield who have expressed interest in the state-owned casino as they are still seeking ways to support a $31 million public works program advanced by former Governor Rod Blagojevich. In 2012, Akoo International, Inc. purchased five-year naming rights for $1.5 million. The company specializes in making interactive media for college dorms, malls", "-25.572380224170047" ], [ "$15 million. The new owners took possession in March 2007, with the Lottery itself agreeing to operate the stores on a temporary basis. Nevada Estey made his move into Nevada in 1995, gaining approval from the Nevada Gaming Commission for six Dotty's bars built along the model of the Oregon chain. By 2002, there were eight Dotty's locations in the state, and the chain was pushing into Northern Nevada with three planned locations in Reno and Carson City.\nOpposition to Dotty's arose in 2010, led by locals casino operators Station Casinos and Boyd Gaming. Most Dotty's locations operate under a \"restricted\"", "-25.53560218252761" ], [ "the church building.\nIn September 1991, Rossi began broadcasting his nightly radio show Rich Rossi Live on Pittsburgh's WPIT-FM. The program created controversy when Rossi called other evangelical churches \"whores\" who sell out the gospel for money. Rossi appeared on the Jerry Springer Show in 1994 to discuss faith healing, exorcism, and ESP. Attempted murder charge On June 24, 1994, Rossi's wife, Sherrie Lynn, was found near death in a coma on the side of a Pennsylvania road. She had a crushed skull and was left covered in blood; her injuries were so severe that she needed to wear a helmet.", "-25.534950963119627" ], [ "been sold at $150 each for the first 700 members and for $250 for the rest, with a waiting list established.\nIt was financed in large part by Mailman's other gay venture, the nearby New St. Marks Baths – a gay mecca at the time. The nightclub's renovation cost $4.5 million, being $2 million over budget ($17 million at 2017 prices). Money was spent repairing the roof, paying six years of back taxes to the city and fitting out the interior. It opened initially as a private membership gay nightclub (returning the idea of a club to \"nightclub\"), and set", "-25.509062757279025" ], [ "Diocese of Charleston, which covers the whole of South Carolina in the United States.\nThe Baptistines are the name given to a number of religious orders dedicated to the memory of John the Baptist.\nAlong with John the Evangelist, John the Baptist is claimed as a patron saint by the fraternal society of Free and Accepted Masons (better known as the Freemasons).\nIn many Mediterranean countries, the summer solstice is dedicated to St. John. The associated ritual is very similar to Midsummer celebrations in the Anglo-Saxon tradition.", "-25.44932552051614" ], [ "MOD named John Nelson, formerly of Nando's UK, as their CEO of UK operations in January 2016.\nIn January 2017, MOD Pizza had open its 200th location, which was located in Frederick, Maryland. At the time of the opening, the company had locations in 20 states, including Arizona, California, Colorado, Florida, Idaho, Illinois, Kansas, Kentucky, Maryland, Michigan, Missouri, Montana, New Jersey, North Carolina, Ohio, Oregon, Pennsylvania, South Carolina, Texas, Utah, Virginia, Washington and Wisconsin, along with five locations in the United Kingdom.\nIn May 2019, MOD Pizza raised $160 million in a funding round and plans to expand to 1000 stores within", "-25.436465094215237" ], [ "petition protesting the loss of the golf course to the temple, upset that their investments into homes next to a golf course would become investments into homes bordering a busy church. In response, the church distributed printed materials, stating its intentions to work with neighbors with regard to traffic and parking when the time came to present plans to the city. Groundbreaking Ground was broken for the temple on Saturday, April 15, 2006—the day before Easter Sunday. Presiding at the ceremony was Neil L. Andersen of the Presidency of the Seventy. Stake presidents and their families comprised most of the", "-25.43601715020486" ], [ "he decided to open a new type of pizza restaurant catering to Latinos in the US and offering unusual toppings such as chorizo and jalapenos. He bought a failing pizza restaurant, and called his new business La Pizza Loca. Within 5 years, La Pizza Loca opened 12 locations and reached $10 million in sales.\nMeruelo expanded his business focus, founding the Meruelo Group, which has grown into a construction and real estate development firm. Meruelo Group has ownership of Neal Electric Corp, Select Electric Inc., and Doty Bros within the Southern California area. The group also owns Commercial Bank of California.", "-25.433371233404614" ], [ "Rock Hotel, and a second 24-hour location opened at the Hawaiian Marketplace in March 2017. The Las Vegas locations were much larger than the counter-service-only restaurants in New York, and had full liquor licenses and waiter service. It was reported in November 2017, however, that both locations have closed. \nOver the years, the chain has had numerous New York City competitors, including Gray's Papaya and Papaya Dog. In 1976, Nathan's Famous set up shop next door to Papaya King, and a \"hot dog war\" ensued. Nathan's cut the price of its hot dogs to from 50 to 35 cents, while", "-25.40075599454576" ], [ "Barbeque location serves its local community by giving back about 10% of pre-tax profits to local charities and non-profits ; donating food to community events and food-insecure families via Food Rescue ; and raising funds for organizations such as the American Cancer Society, the Resurrecting Lives Foundation , Mission 22 , and the FFA .", "-25.399380529073824" ], [ "Toto's Pizza House Toto's Pizza House (Toto's) is the first pizzeria established in Melbourne, Australia, now a small chain of Pizza stores. Toto's opened for business on 7 July 1961 in Lygon Street, Carlton, Victoria, where the business has remained since. Toto's was originally owned by Salvatore Della Bruna, who operated the business in partnership with Franco Fera and in 1968 with Silvio Tuli and Salvatore Mercogliano. Successful, and well respected, business man Mario Bandera also played a large part. In 1983 the business was purchased by the present owner and Managing Director, Sami Mazloum.\nSilvana Mercogliano, the wife of former", "-25.3981714930851" ], [ "Panthean temple The Panthean Temple, abbreviated as PTC as the Panthean Temple of Connecticut, is located in New Haven County, Connecticut and was the first Pagan and Wiccan church to incorporate in the state of Connecticut under its first name of the \"Pagan Community Church,\" and is a non-profit 501(c)3 religious organization. It was founded by Rev. Alicia Lyon Folberth, in 1995. Practices The Panthean Temple is open to Witches and Pagans of all traditions who honor harm none, which they consider to be a universal tenet of all true spiritual paths. Their practices are devotional, and are primarily", "-25.364599225184065" ], [ "to their original Southern California location, the Dominguez Seminary near the Dominguez Rancho Adobe of Rancho San Pedro, in Rancho Dominguez, California near Long Beach. National Shrine of St. Jude, Chicago The national shrine of St. Jude was founded by Father James Tort, C.M.F., pastor of Our Lady of Guadalupe Church in Chicago, Illinois, United States. Many of Tort’s parishioners were laborers in the nearby steel mills, which were drastically cutting back their work forces early in 1929. Tort was saddened to see that about 90% of his parishioners were without jobs and in difficult financial situations.\nIn an effort to", "-25.362567787000444" ], [ "community and family.\"\nIn June 1988, Wiesner and his brother George opened the Draft House restaurant in North Las Vegas. Wiesner and his partners sold the Marina Hotel to Kirk Kerkorian in 1989. In 1990, Wiesner founded Big Dog's Hospitality Group, a local chain of Wisconsin-themed bar-restaurant-casino properties that included the Draft House, and would later include the Holy Cow Casino and Brewery, Las Vegas' first brewery. Wiesner had to persuade the state to change its laws to allow the operation of breweries in Las Vegas.\nIn 1992, Wiesner created Las Vegas' Badger Desert Golf Classic. Wiesner also built the Sunrise Golf", "-25.354214576029335" ], [ "Baptist Church. The church was \"free\" in that all races were welcome to worship there, and it was a \"union\" of four denominations of Christianity, none of which could have afforded a church of their own at that time. Free Union continued to be known as Nixville until the early 20th century, when the post office's name caught on.\nThe Ballard-Maupin House was added to the National Register of Historic Places in 1999.", "-25.35152065327202" ], [ "Dominican Republic. During that first year, they were able to open three new stores. A year later, Domino's was the first American franchise to open in the country of Haiti. During his time in charge of the franchise, Rodríguez has received the Gold Franny Award, awarded by Domino's headquarters to the best franchise operators. His son, Luis Francisco Rodriguez, is general manager of the franchise.\nIn 1997, Rodríguez acquired 50% of the shares of Servicolt, the operating company of the Avis Rent-a-Car franchise. In 2004, he also acquired Budget Car Rental, becoming the largest car rental company in the Dominican Republic.", "-25.35050376959589" ], [ "company was founded at Packard and Hill streets in Ann Arbor. In June 1986, the first franchise opened in Ypsilanti. In 2003, the new corporate headquarters and distribution center opened in Ann Arbor. In 2017, Cottage Inn opened a franchise location in China. Sponsorships In 2012, Cottage Inn partnered with the Michigan International Speedway to become the official pizza vendor on NASCAR weekends. Although the original plan was for Cottage Inn to provide 24-hour delivery service to customers in the campsites, logistical and staffing issues required the company to scale back its services. Cottage Inn also serves as a pizza", "-25.341663511208026" ], [ "the restaurant by drawing Conan on its walls, the suit lost in the United States Court of Appeals for the Fifth Circuit. The Firesigns thus settled out of court.\nBy 1986, the chain had grown to 120 stores, according to the company. Mosley and Brown sold the franchise rights to Tom Hester and a group of investors in 1988. Mosley died at his home in Madison on November 28, 2017, aged 70. Locations As of 2014, there were 40 Rocky Rococo locations, mostly in Wisconsin, and one each in Minnesota and Washington. The chain generates about $40 million in annual sales.", "-25.341312779046348" ], [ "John Ring laid the foundation for the church, which was the first Swedish Baptist church in the Twin Cities area. In March 1872, the church bought a lot at 6th Street and 12th Avenue for $1,000 ($20,914 today); they broke ground in March of the following year on a new $4,000 wood frame church building.\nThe church had four pastors in its first ten years. The fifth pastor, Dr. Frank Peterson, arrived in June 1881 to a church of 127 members. On March 16, 1885, during Peterson’s pastorate, the church burned and was irreparable. In February 1888, 55 members of", "-25.32634303465602" ], [ "the casino's attractions.\nAs a convicted felon, Benny was no longer allowed to hold a gaming license, so his sons took over day-to-day control when the family bought out Brown. Jack became president while Ted became casino manager. Benny assumed the title of Director of Public Relations.\nIn 1970, Jack began hosting the World Series of Poker (WSOP) at the Horseshoe. Eventually, the WSOP became the largest set of poker tournaments in the world. In 1988, the Horseshoe expanded by acquiring The Mint, a high-rise hotel on the west side of the casino. The expansion of the casino", "-25.31307721518533" ], [ "Homer G. Lindsay Jr. Homer G. Lindsay Jr. (July 10, 1927 – February 14, 2000) was an American Southern Baptist preacher. He co-pastored the nation's third-largest Southern Baptist church, the First Baptist Church of Jacksonville, Florida, with Jerry Vines. Both pastors are notable for their conservative and sometimes controversial public stances, and their wide-reaching influence in the local political arena. According to Paige Patterson, Lindsay was \"one of the great soul-winners of all Christian history\". History Lindsay was born in Nashville, Tennessee, and moved to Jacksonville with his family as a child. His father, Homer G. Lindsay Sr., began pastoring", "-25.30994183155417" ], [ "pizza chain on the Australian Stock Exchange (ASX). In 2013, Domino's acquired 75% of Domino's Japan and Meij made Australia's top CEO list.\nDomino's Pizza Enterprise Limited is now the largest master franchise in the world and owns and operates more than 2,400 stores in Australia, New Zealand, Belgium, France, the Netherlands, Japan, Germany, Luxembourg and Denmark.\nIn 2017, Meij celebrated 30 years with Domino's, which today is the market leader in most of the countries in which it operates. Personal life Meij is married to his wife Jenny and resides in Brisbane, Queensland.", "-25.30255012019188" ], [ "Galleria area as a potential location for a mini-casino. The casino operator won the right from the Pennsylvania Gaming Control Board to build or renovate such a facility, with up to 750 slot machines and plans for 30 table games, in the south central part of the state – specifically, within 15 miles (24 km) of Yoe.\nThe township solicitor said Penn National Gaming is looking at the first floor of the Sears property. A public hearing was held in late July 2018 for feedback on proposed ordinance changes for a potential gambling facility. Many expressed disapproval of a local casino and no", "-25.293458656102302" ], [ "Santa Ysabel Casino History The casino opened its doors on April 11, 2007 with the intention of incorporating a resort into the complex, but plans to do so were scrapped due to funding difficulties shortly after its construction.\nOn April 20, 2011, an unemployed citizen from the town of Ramona, CA scooped a jackpot total of $1,036,253. \nThe penny machine used to win the jackpot was a Gold Series progressive machine owned by Rocket Gaming, which has 1,100 similar games throughout the United States. This was the first one in California.\nOn July 2, 2012 the casino filed for Chapter 11 Bankruptcy", "-25.285631879125503" ], [ "fundraising events. The chain frequently ran \"Ernie Whitt Specials\" on pizza deliveries. Television commercials featured such international celebrities as Dennis Weaver.\nThe company went into receivership, and was purchased by the Little Caesars pizza chain in 1989. Within a few years, locations began closing, including Westdale in 1992.\nCo-founder Grey Sisson is now chair of the Service Inspired Restaurants board, which owns Jack Astor's, Alice Fazooli's and Canyon Creek; the group is based out of the same South Service Road building that Mother's was, in Burlington, Ontario.\nTheir flare glasses are considered drinking glass collectibles. Reestablishment (2013-ca. 2019) The chain is now owned", "-25.279641195718796" ], [ "illegal beer and liquor in the northwest suburbs of Chicago. Touhy partnered with Matt Kolb, who was already supplying the Chicago Outfit with a third of its beer, as well as running highly profitable gambling and loan sharking operations north of Chicago. The two men established a brewery and cooperage, and produced a high quality beer. They soon were selling 1,000 barrels a week at $55 a barrel (for a profit of 92 percent).\nIn 1926, Touhy expanded into illegal gambling and installed slot machines in saloons throughout the northwest Chicago suburbs. By 1926, his slot machine operations alone grossed over", "-25.27366622190675" ], [ "the public. It was organized by the Bartenders Union and the Culinary Workers Union and supervised by the National Labor Relations Board (NLRB) under the Trump administration. It is the sixth Station Casinos property to be unionized. Expansions In 1999, Sunset Station underwent a $34 million expansion project that included a new parking structure, increased casino floor and meeting space and the Sonoma Cellar Restaurant.\nIn 2005, a multimillion-dollar expansion added The Strike Zone Bowling Center as well as additional gaming space.", "-25.26412240332502" ], [ "19, 1965 by Marion Glass. Glass was an owner of three franchises for the larger Dayton-area Cassano's Pizza King chain. Glass said wanted his own restaurant because he wanted to offer a dining-room experience as opposed to the mostly delivery and carry-out options.\nHis departure from Cassano's came a year after what the Dayton Daily News dubbed the \"pizza wars\". A fellow franchisee, Ron Holp, broke off and opened his own restaurant, which led to a lawsuit between Holp and Cassano's, in which Holp was accused of stealing pizza dough from the company. After Holp won the case, Glass asked if", "-25.264028611076355" ], [ "other Pentecostal pastors, with Jones continuing to disguise the fact that he was using religion to further his political ideology. Those conventions drew as many as 11,000 attendees, as Jones and the other preachers conducted \"healings\" and impressed attendees by revealing private information—usually numbers, such as addresses, phone numbers, or Social Security numbers, which private detectives could easily discover beforehand. Jones and Temple members also drove through various cities in Indiana and Ohio on recruiting and fund raising efforts.\nThe Temple stressed egalitarian ideals, asking members to attend in casual clothes so poor members would not feel out of place, and", "-25.252950840396807" ], [ "BJ's Restaurants History BJ's was founded in 1978 and first opened in Santa Ana, California, as BJ's Chicago Pizzeria by Mike Phillips and Bill Cunningham. Phillips and Cunningham sold their company to their accountants Paul Motenko and Jerry Hennessy in 1991.\nBy 1996, seven restaurants had opened between San Diego and Los Angeles. Originally known as Chicago Pizza, the company went public about 1996, raising $9.4 million. The company then bought 26 Pietro's Pizza restaurants in March 1996 in a $2.8 million deal in cash and assumed debt, but then sold off seven of the locations with plans to convert the", "-25.251174148230348" ], [ "early 1931, Nevada governor Fred B. Balzar signed into law Assembly Bill 98, which legalized gambling, and the Meadows was one of the first casinos to open after legalization. The Meadows was owned by Anthony Cornero (aka Anthony Stralla), who was a major bootlegger during Prohibition, operating out of Los Angeles. However, because of a bootlegging conviction, the casino was licensed in the names of his brothers, Frank and Louis Stralla. The Meadows opened on May 2, 1931. Cornero sold the hotel in July 1931 to Alex Richmond. In September 1931, a fire broke out", "-25.24483746772239" ], [ "offer. As a bug-free alternative during the same promotional period, Wayback also offered a beef flavored shake that was garnished with a Slim Jim.\nThe first location in the state of Illinois was opened in Naperville in May 2016.\nIn 2016, Wayback Burgers investigated the possibility of an initial public offering, IPO, but did not proceed further at that time. International expansion The first location outside the United States was opened in Palermo, Buenos Aires in Argentina in February 2015.\nNine months later, the first location in Saudi Arabia was opened in Al Khobar in November 2015 on the other side of the", "-25.24290618269879" ], [ "the Las Vegas Beltway. Montandon was initially against a casino being included in Aliante, but was later convinced that it was a good idea. Prior to Aliante's announcement, North Las Vegas had been considered the Las Vegas Valley's lower-class area, with a reputation for high crime.\nGroundbreaking took place in August 2002. Aliante celebrated its official grand opening on May 3, 2003. At that time, Kilduff estimated that the community would take approximately five years to be entirely built out, contingent on demand. Kilduff also believed that Aliante could rival the nearby Summerlin master-planned community. Aliante's first phase consisted of approximately", "-25.226248914928874" ], [ "The Platinum Early history The property began in 1974, as the Highlander 6 Inn motel. The motel became a Comfort Inn between 1990 and 1993. By 2001, the motel was operating as an Econo Lodge. Michael Peterson, the president and chief executive officer of Diversified Real Estate Concepts, Inc., purchased the land in 2003. Peterson had developed several restaurants and condominiums in Chicago and Wisconsin, and was also planning the nearby Aqua Blue condominium/hotel/casino in Las Vegas until its cancellation. Design and approval In October 2003, the Clark County Commission approved plans for a 24-story, 210-foot condo hotel with 255", "-25.21846489084419" ], [ "Castaways (casino) History The property had originally been San Souci Auto Court, an early motel which opened in the 1930s, and developed into Sans Souci Hotel in the 1950s.\nIn August 1963, Mississippi oilman Ike P. Larue Jr. planned to purchase the Sans Souci hotel-casino and rename it as the Castaways Casino. Larue closed the casino portion on December 31, 1964, due to financial problems. The hotel, restaurant and bar remained open. In August 1965, four men – three Californians and a Las Vegas resident – planned to reopen the casino and invest $300,000 to for eight table games and 70", "-25.19263385317754" ], [ "allowed local families to worship close to home, regardless of their religious affiliation. Several Marietta congregations adopted the Chapel as a mission, rotating services for Baptist, Methodist, Episcopal, and Presbyterian parishioners. The inter-denominational nature of the Chapel reflected its group of Trustees, which included Episcopalians (Irwin and Starnes), Presbyterians (Nesbitt), and Baptists (Ward). Land history The earliest reference to the property—2nd Section, 17th District, Land Lot 7—is in the 1832 Gold Lottery of Georgia, when it was deeded to William Alexander. A warranty deed recorded September 7, 1882, documents a transaction between Marietta Savings Bank and R.L., possibly Rebecca Lanier,", "-25.187142632668838" ], [ "close at the end of 2017. In 2011, Fieri partnered with Carnival Cruise lines to create Guy's Burger Joint to sell Fieri's burgers fleet-wide. As of October 2017, there were 19 restaurants on Carnival's cruise ships, including some serving beer-and-BBQ, Guy's Pig & Anchor Smokehouse Brewhouse.\nIn April 2014, Guy Fieri's Vegas Kitchen and Bar opened in Las Vegas.\nIn 2015, Guy Fieri's Baltimore Kitchen & Bar opened in Baltimore's Horseshoe Casino. In 2018, Fieri collaborated with Planet Hollywood founder Robert Earl to open fast-food chicken sandwich shop Chicken Guy! at Disney Springs in Walt Disney World. Television After winning the second", "-25.17457221908262" ], [ "the same town as the original chain's headquarters, on October 25, 2010. Plans were announced in Spring 2011 for franchise expansion into Baltimore. On August 17, 2011, a second Gino's location opened in Towson, Maryland. Another Gino's opened in Bensalem, Pennsylvania on October 11, 2011.\nA Gino's Burgers and Chicken opened in Oriole Park at Camden Yards at the start of the Orioles season in 2012, but closed by the end of the 2014 season.\nOn January 22, 2013, Gino's Burgers and Chicken opened in Aberdeen, Maryland, however the Bensalem location closed around the same time. Later, on July 9, 2013,", "-25.17099458159646" ], [ "used to come to the door of the church on Sunday and, as the baby slaves were brought out from their christening ceremonies, he paid twenty five pesos (once baptized the cost for the slaves were doubled at 50 pesos).\nIn 2004, the church was designated a historic monument by the Puerto Rican government. The church is part of the Roman Catholic Diocese of Mayagüez.", "-25.164780424296623" ], [ "Methodist Episcopal, with a membership of sixty-seven. It holds its meetings in the public school-house, located near the center of the town. This society has connected with it a prosperous Sabbath-school which holds its sessions each Sabbath morning in the school-house. There is also a Union Sabbath-school in good working order, which occupies the public school-house each Sabbath afternoon. These organizations are working harmoniously and doing much to aid the cause of Christianity. During the past few years, at different times, saloons have been licensed to vend alcoholic liquors, but in a very short time were compelled to cease their", "-25.148946312641783" ], [ "from the neighborhood, and those who had stayed felt unsafe in the neighborhood. The synagogue was vandalized, and some members said they were afraid to attend services.\nIn 1970, B'nai Israel bought 14 acres (56,700 m²) on Montrose Road in Rockville, Maryland. The old building was sold to Nineteenth Street Baptist Church for $1.2 million.\nRabbi Matthew H. Simon attended an ecumenical worship service marking the presidential inauguration of George H. W. Bush in 1989. Rabbi Simon read verses from Deuteronomy 10:17-10:18.\nIn 1989, Rabbi Jonathan Schnitzer left B'nai Abraham Synagogue in Wilson, Pennsylvania, to join B'nai Israel Congregation.\nin 2002, B'nai Israel held a", "-25.134207123759552" ], [ "Domino's Pizza 1960s–1990s In 1960, Tom Monaghan and his brother, James, took over the operation of DomiNick's, an existing location of a small pizza restaurant chain that had been owned by Dominick DiVarti, at 507 Cross Street (now 301 West Cross Street) in Ypsilanti, Michigan, near Eastern Michigan University. The deal was secured by a $500 down payment, and the brothers borrowed $900 to pay for the store. The brothers planned to split the work hours evenly, but James did not want to quit his job as a full-time postman to keep up with the demands of the new", "-25.127963029292005" ], [ "Way Baptist Church under the strict guidance of Rev. Consuella York (who was the first African-American woman to be ordained a Baptist minister in Chicago, and was also the first female chaplain of the Cook County Jail.) Lewis played for all of the services during the week, guided by York's son and Minister of Music, Thomas Alvin Keel, and often played solos. Because Lewis' mother taught school on the north side of the city, she would drop Lewis off at the church early in the morning, and Lewis would stay there until it was time for school, everyday practicing on", "-25.127726548405917" ], [ "24 Hour Church of Elvis History The original location (1109 SW Washington, 45.521752°N 122.682825°W), which operated from 1985–1986, had a changing variety of single coin-operated art installations accessible from the street, as elaborate window displays, and a large uncurated art gallery where any and all could sell their art available for purchase inside. It also had other installations by Pierce besides the coin operated art window installations, such as the artitorium, the hall of art horrors and \"sex or money\" (a parody of a catholic confessional booth). Fundraisers were called \"art parties,\" with bands and artists and kegs", "-25.12411003094985" ], [ "First Baptist Church in the City of New York The First Baptist Church in the City of New York is a Christian congregation based in a sanctuary built in 1890-93 at the intersection of Broadway and West 79th Street in the Upper West Side of Manhattan, New York City. The church is a conservative, independent, evangelistic, mission-oriented church in fellowship with the Southern Baptist Convention. Revolutionary years The first attempt to establish a Baptist presence in New York City dates to 1711, when William Wightman began his ministry. A church was built on Gold Street but disbanded eight years later", "-25.119038400844147" ] ]
1iq01h
If tears are a natural lubricant, why do our eyes sting so badly after crying?
[ "Crying makes your eyes sting? Never makes mine sting. Wonder if something's wrong with you or with me?", "Am I the only one here that wants to try and masturbate with tears now?", "One possibility is that you may have rubbed your eyes a lot while you were crying, which can give you very small cuts on the front part of your eyes. These are called corneal abrasions and can hurt a fair amount. Does the stinging usually happen after you've been crying a while or more at the beginning/during? If it's the second one, your problem might be dry eye. Some people's eyes don't make enough tears, or the tears aren't made properly. This can cause your eyes to get dry really quickly and it can hurt. When this happens, a signal goes to the brain telling it to make more tears. But it often goes overboard and makes way more tears than you need, so you cry for a little bit until the stinging goes away. I don't know of any reason why just tears would make your eyes sting.", "Maybe it's stuff on your face (sweat, oil) that gets into your eyes when you wipe the tears.", "It may be the higher concentration of Saline in tears when they are being over produced." ]
[ [ "of tears because it is said to emanate eerie cries and have a heavy energy surrounding it.", "-36.97195407094114" ], [ "artificial tears may help local symptoms when the feeling returns. Nonsteroidal anti-inflammatory drug (NSAID) eyedrops are widely used to lessen inflammation and eye pain, but have not been proven in rigorous trials. Systemic (oral) pain medication is given if discomfort is severe. Healing is usually rapid (24–72 hours) if the injury source is removed. Further injury should be avoided by isolation in a dark room, removing contact lenses, not rubbing the eyes, and wearing sunglasses until the symptoms improve.", "-35.73082154049189" ], [ "to move inside the joint, get caught between the bones, and cause pain, swelling, and decreased mobility. However, recent research has called into question whether many meniscus tears actually cause pain or are simply part of the normal degenerative process of aging. A 2008 study in the New England Journal of Medicine which shows that about 60% of meniscus tears cause no pain and are found in asymptomatic subjects. The three major treatments for a damaged meniscus are repair, removal, and transplantation. The surgery is often carried out arthroscopically. Repair During repair, the tissues are securely held", "-35.71201169026972" ], [ "different treatments to different kinds of tears:\nIf the meniscus has to be removed (menisectomy) because of injury (either because it cannot heal or because the damage is too severe), the patient has an increased risk of developing osteoarthritis in the knee later in life. If the meniscus is removed and there is no arthritis, there are now meniscus transplant options if the patient is young and has normal alignment.\nMore chronic injury occurs with osteoarthritis, made worse by obesity and high-impact activity. The medial meniscus and the medial compartment are more commonly affected than the lateral compartment.", "-35.31036124595266" ], [ "proteins in tears are differentially deficient or upregulated in dry eye, one of which is lacritin. Topical lacritin promotes tearing in rabbit preclinical studies. Also, topical treatment of eyes of dry eye mice (Aire knockout mouse model of dry eye) restored tearing, and suppressed both corneal staining and the size of inflammatory foci in lacrimal glands. Additional causes Aging is one of the most common causes of dry eyes because tear production decreases with age. Several classes of medications (both prescription and OTC) have been hypothesized as a major cause of dry eye, especially in the elderly. Particularly,", "-35.20135904214112" ], [ "The glottis, however, attempts to remain open as an individual cries. This fight to close the glottis creates a sensation that feels like a lump in the individual's throat.\nOther common side effects of crying are quivering lips, a runny nose, and an unsteady, cracking voice. Frequency of crying According to the German Society of Ophthalmology, which has collated different scientific studies on crying, the average woman cries between 30 and 64 times a year, and the average man cries between 6 and 17 times a year.\nMen tend to cry for between two and four minutes, and women cry for about", "-34.9488032895315" ], [ "Sports-related meniscal tears often occur with other knee injuries, such as an anterior cruciate ligament tear.\nA torn meniscus is commonly referred to as torn cartilage in the knee. Menisci tear in different ways and are noted by how they look, as well as where the tear occurs in the meniscus. Two types of tears include minor, which includes stiffness and swelling within two to three days but usually goes away in two to three weeks. Then there is severe, which without treatment, a piece of meniscus may come loose and drift into the joint space. Tears include longitudinal, parrot-beak, flap,", "-34.807260154309915" ], [ "constantly produce the aqueous portion of tears. Additional cells present in the conjunctival epithelium include melanocytes, T and B cell lymphocytes. Function The conjunctiva helps lubricate the eye by producing mucus and tears, although a smaller volume of tears than the lacrimal gland.\nIt also contributes to immune surveillance and helps to prevent the entrance of microbes into the eye. Vessel morphology The bulbar conjunctival microvasculature contains arterioles, meta-arterioles, venules, capillaries, and communicating vessels. Vessel morphology varies greatly between subjects and even between regions of the individual eyes. In some subjects, arterioles and venules can be seen to run parallel with", "-34.77680363661784" ], [ "these problems. Research has shown that natural tears typically are less severe (although this is perhaps not surprising since an episiotomy is designed for when natural tearing will cause significant risks or trauma). Slow delivery of the head in between contractions will result in the least perineal damage. Studies in 2010 based on interviews with postpartum women have concluded that limiting perineal trauma during birth is conducive to continued sexual function after birth. At least one study has recommended that routine episiotomy be abandoned for this reason.\nIn various countries, routine episiotomy has been accepted medical practice for many years. Since", "-34.63363309633519" ], [ "Acetabular labrum Mechanisms of Injury It is estimated that 75% of acetabular labrum tears have an unknown cause. Tears of the labrum have been credited to a variety of causes such as excessive force, hip dislocation, capsular hip hypermobility, hip dysplasia, and hip degeneration. A tight iliopsoas tendon has also been attributed to labrum tears by causing compression or traction injuries that eventually lead to a labrum tear. Most labrum tears are thought to be from gradual tear due to repetitive microtrauma. Incidents of labrum tears increase with age, suggesting that they may also be caused by deterioration through the", "-34.52804465506779" ], [ "excess tears are produced, the liquid drains through the inner corner of the eyelids, through the nasolacrimal duct, and into the nasal cavities. As more tears are shed, more liquid flows into the nasal cavities, both stimulating mucus production and hydrating any dry mucus already present in the nasal cavity. The buildup of fluid is usually resolved via mucus expulsion through the nostrils. Head trauma If caused by a head injury, rhinorrhea can be a much more serious condition. A basilar skull fracture can result in a rupture of the barrier between the sinonasal cavity and the anterior cranial fossae", "-34.52599400153849" ], [ "secondary tears, the blood can re-enter the true lumen.\nWhile it is not always clear why an intimal tear may occur, quite often it involves degeneration of the collagen and elastin that make up the media. This is known as cystic medial necrosis and is most commonly associated with Marfan syndrome and is also associated with Ehlers-Danlos syndrome.\nIn about 13% of aortic dissections, no evidence of an intimal tear is found. In these cases, the inciting event is thought to be an intramural hematoma (caused by bleeding within the media). Since no direct connection exists between the true lumen and the", "-34.28641396194871" ], [ "tears. However, its routine use has declined as there is some evidence it increases the severity of tears when it is not indicated. A Cochrane review found that routine use of epsiotomy increased the incidence of severe perineal tears by 30%. \nSeveral other techniques are used to reduce the risk of tearing, but with little evidence for efficacy. Antenatal digital perineal massage is often advocated, and may reduce the risk of trauma only in nulliparous women. ‘Hands on’ techniques employed by midwives, in which the foetal head is guided through the vagina at a controlled rate have been widely advocated,", "-34.139940864821256" ], [ "tears in women. ACL, muscular stiffness, and strength During puberty, sex hormones also affect the remodeled shape of soft tissues throughout the body. The tissue remodeling results in female ACLs that are smaller and will fail (i.e. tear) at lower loading forces, and differences in ligament and muscular stiffness between men and women. Women's knees are less stiff than men's during muscle activation. Force applied to a less stiff knee is more likely to result in ACL tears.\nIn addition, the quadriceps femoris muscle is an antagonist to the ACL. According to a study done on female athletes at the University", "-33.807077826655586" ], [ "and blurred vision. Long term use of ciclosporin at high doses is associated with an increased risk of cancer.\nCheaper generic alternatives are available in some countries. Conserving tears There are methods that allow both natural and artificial tears to stay longer.\nIn each eye, there are two puncta – little openings that drain tears into the tear ducts. There are methods to partially or completely close the tear ducts. This blocks the flow of tears into the nose, and thus more tears are available to the eyes. Drainage into either one or both puncta in each eye can be blocked.\nPunctal plugs", "-33.69121836690465" ], [ "lesions occur in male athletes, especially those practicing contact sports and weight-lifting (particularly during a bench press maneuver). Women are less susceptible to these tears because of larger tendon-to-muscle diameter, greater muscular elasticity, and less energetic injuries. The injury is characterized by sudden and acute pain in the chest wall and shoulder area, bruising and loss of strength of the muscle. High grade partial or full thickness tears warrant surgical repair as the preferred treatment if function is to be preserved, particularly in the athletic population. \nActing fast, obtaining the correct diagnoses, and getting the surgical repair as soon", "-33.555009346295265" ], [ "redness, and vision changes. Use should be discontinued if any of them occur. Side effects of hydroxypropyl cellulose include hyperaemia, photophobia, stickiness of eyelashes, discomfort, and irritation. However, the overall side-effect profile of artificial tears is very low.\nArtificial tears have no reported interactions. A documented contraindication of artificial tears is hypersensitivity. Veterinary uses Artificial tears are a part of the topical therapy for keratoconjunctivitis sicca for animals such as dogs, cats and horses. Research A 2016 Cochrane Review seeking to compare the effectiveness of various over the counter artificial tears in treating dry eye. While the review stated that it", "-33.43127637307043" ], [ "and the ends of the lacrimal canals medialward and compresses them against the surface of the globe of the eye, thus placing them in the most favorable situation for receiving the tears; it also compresses the lacrimal sac. This part comprises two pieces: Horner's muscle and the muscle of Riolan, the latter helps hold the eyelids together to keep the lacrimal passage waterproof.\nAssociated pathology, such as a lesion of the facial nerve seen in Bell's palsy results in the inability to blink or close the ipsilateral eyelid. Subsequent lack of irrigation increases the risk of corneal inflammation and ulcers.", "-33.22901797326631" ], [ "is unclear which artificial tear formulation works best, two trials found that 0.2% polyacrylic acid-based tears were more effective in treating dry eye symptoms over 1.4% polyvinyl alcohol-based tears.", "-32.816827549773734" ], [ "tears are generally not very frequent. No meaningful differences were found for intact perineums, first and second degree tears, the risk of pain, urinary or fecal incontinence, or dyspareunia.\nFor the trial titled 'The possibility of antepartal prevention of episiotomy and perineal tears during delivery', 315 primiparous women were questioned between February 2014 and November 2015 after a vaginal delivery, on the use of methods of birth injury prevention: vaginal dilatators EPI-NO and Aniball, perineal massage, natural methods (raspberry-leaf tea or linseed). The authors concluded that 'There was a significantly higher number of women with intact perineum after the use of", "-32.80457001864852" ], [ "where the gelatin was stretched. Although such tears are visually engaging, some animal tissues (other than bone or liver) are more elastic than gelatin. In most cases, temporary cavitation is unlikely to cause anything more than a bruise. Some speculation states that nerve bundles can be damaged by temporary cavitation, creating a stun effect, but this has not been confirmed.\nOne exception to this is when a very powerful temporary cavity intersects with the spine. In this case, the resulting blunt trauma can slam the vertebrae together hard enough to either sever the spinal cord, or damage it enough to knock", "-32.58798077885149" ], [ "Artificial tears Chemistry Preparations contain carboxymethyl cellulose, polyvinyl alcohol, hydroxypropyl methylcellulose (a.k.a. HPMC or hypromellose), hydroxypropyl cellulose and hyaluronic acid (a.k.a. hyaluronan, HA) They contain water, salts and polymers but lack the proteins found in natural tears. Patients who use them more frequently than once every three hours should choose a brand without preservatives or one with non-irritating preservatives. Effects Application of artificial tears every few hours can provide temporary relief from the symptoms of dry eyes.\nHydroxypropyl cellulose stabilizes and thickens the precorneal tear film and prolongs the tear film breakup time. Usage Artificial tears usually are the first line", "-32.47565442154155" ], [ "a stall door to prevent kicking, with the horse twitched, and possibly sedated if extremely painful and likely to try to go down. Buscopan is sometimes used to facilitate rectal examination and reduce the risk of tears, because it decreases the smooth muscle tone of the gastrointestinal tract, but can be contraindicated and will produce a very rapid heart rate. Because the rectum is relatively fragile, the risk of rectal tears is always present whenever an examination is performed. Severe rectal tears often result in death or euthanasia. However, the diagnostic benefits of a rectal examination almost always outweigh these", "-32.23150925482332" ], [ "serum eye drops A 2017 Cochrane review found mixed results when comparing autologous serum eye drops to artificial tears or saline. Evidence from the examined trials showed that autologous serum eye drops may have a small short-term benefit when compared to artificial tears, but there is no evidence of improvement after 2 weeks. Additional options Lubricating tear ointments can be used during the day, but they generally are used at bedtime due to poor vision after application. They contain white petrolatum, mineral oil, and similar lubricants. They serve as a lubricant and an emollient. Application requires pulling down the lower", "-31.9313298232737" ], [ "the age of 50 10% of people with normal shoulders have a rotator cuff tear. Prevalence In an autopsy study of rotator cuff tears, the incidence of partial tears was 28%, and of complete rupture 30%. Frequently, tears occurred on both sides and occurred more often with females and with increasing age. Other cadaver studies have noted intratendinous tears to be more frequent (7.2%) than bursal-sided (2.4%) or articular-sided tears (3.6%). However, clinically, articular-sided tears are found to be 2 to 3 times more common than bursal-sided tears and among a population of young athletes, articular-sided tears constituted 91% of", "-31.804541621007957" ], [ "tumors, or it dissolves and forms a scab for external tumors. Results Cryosurgery is a minimally invasive procedure, and is often preferred to more traditional kinds of surgery because of its minimal pain, scarring, and cost; however, as with any medical treatment, there are risks involved, primarily that of damage to nearby healthy tissue. Damage to nerve tissue is of particular concern.\nPatients undergoing cryosurgery usually experience redness and minor-to-moderate localized pain, which most of the time can be alleviated sufficiently by oral administration of mild analgesics such as ibuprofen, codeine or acetaminophen (paracetamol). Blisters may form as a result of", "-31.77643185458146" ], [ "but their efficacy is unclear. Waterbirth and labouring in water are popular for several reasons, and it has been suggested that by softening the perineum they might reduce the rate of tearing. However, this effect has never been clearly demonstrated. Treatment Treatment is to either let the tear heal naturally or to surgically repair it. Third and fourth degree tears generally require surgical repair. A Cochrane review of comparing surgical treatment with natural healing of first and second degree tears found no to little difference between the two treatment options. The review concluded that there was insufficient evidence to recommend", "-31.39928689046792" ], [ "between the two meningeal layers, thus increasing the likelihood of shearing forces causing a tear. It is also more common in patients on anticoagulants or antiplalet medicationss, such as warfarin and aspirin, respectively. People on these medications can have a subdural hematoma after a relatively minor traumatic event. Another cause can be a reduction in cerebrospinal fluid pressure, which can reduce pressure in the subarachnoid space, pulling the arachnoid away from the dura mater and leading to a rupture of the blood vessels. Risk factors Factors increasing the risk of a subdural hematoma include very young or very old age.", "-31.355923920404166" ], [ "why or how L. reuteri ameliorates its symptoms. One theory holds that affected infants cry because of gastrointestinal discomfort; if this is the case, it is plausible that L. reuteri somehow acts to lessen this discomfort, since its primary residence is inside the gut.\nGrowing evidence indicates L. reuteri is capable of fighting the gut pathogen Helicobacter pylori, which causes peptic ulcers and is endemic in parts of the developing world. One study showed dietary supplementation of L. reuteri alone reduces, but does not eradicate, H. pylori in the gut. Another study found the addition of L. reuteri to omeprazole therapy", "-31.264353218321048" ], [ "therapeutic activities are adjusted according to age and tissue integrity of the repair. Management is more complex in those who have suffered multiple tears. Prognosis While people with rotator cuff tears may not have any noticeable symptoms, studies have shown that, those with age related tears, over time 40% will have enlargement of the tear over a five-year period. Of those whose tears enlarge, 20% have no symptoms while 80% eventually develop symptoms.\nMost usually regain function and experience less pain following surgery. For some, however, the joint continues to hurt. Weakness and a limited range of motion also may", "-31.22710101370467" ], [ "removes years of accumulated biofilm, eliminating the source of inflammation which leads to healthier, more comfortable eyelids and an increase in natural tear production. Many patients are able to stop using artificial tears altogether. Two independent studies demonstrate a 60%-66% increase in tear break up time, which is an indicator of improved tear function. Procedure To administer the device, a physician glides the BlephEx hand piece along the lash line, applying the spinning surgical-grade micro sponge to the lid margin. The sponge is soaked in a lid scrub solution and removes inflammatory scurf, biofilm and bacterial exotoxins (the main causes", "-31.183544592393446" ], [ "who may have just died. In contrast, joyful crying is acknowledging being \"here.\" It emphasized the intense awareness of one's location, such as at a relative's wedding.\nTemporal perspective explains crying slightly differently. In temporal perspective, sorrowful crying is due to looking to the past with regret or to the future with dread. This illustrated crying as a result of losing someone and regretting not spending more time with them or being nervous about an upcoming event. Crying as a result of happiness would then be a response to a moment as if it is eternal; the person is frozen in", "-31.13124499670812" ], [ "with a cotton-tipped applicator, after which tear production is measured with a Whatman #41 filter paper. For this test, wetting under 15 mm after five minutes is considered abnormal.\nA tear breakup time (TBUT) test measures the time it takes for tears to break up in the eye. The tear breakup time can be determined after placing a drop of fluorescein in the cul-de-sac.\nA tear protein analysis test measures the lysozyme contained within tears. In tears, lysozyme accounts for approximately 20 to 40 percent of total protein content.\nA lactoferrin analysis test provides good correlation with other tests.\nThe presence of the recently described", "-31.12376506338478" ], [ "Tears contain bactericides such as lysozyme, so that microorganisms have difficulty in surviving the lysozyme and settling on the epithelial surfaces. Urethra and bladder The genitourinary system appears to have a microbiota, which is an unexpected finding in light of the long-standing use of standard clinical microbiological culture methods to detect bacteria in urine when people show signs of a urinary tract infection; it is common for these tests to show no bacteria present. It appears that common culture methods do not detect many kinds of bacteria and other microorganisms that are normally present. As of 2017, sequencing methods were", "-31.08675384783419" ], [ "common are more susceptible to degenerative meniscal tears. Athletes who constantly experience a high rate of loading (i.e. soccer, rugby) are also susceptible to meniscus tears. Studies have also shown with increasing time between ACL injury and ACL reconstruction, there is an increasing chance of meniscus tears. This study showed meniscus tears occurring at a rate of 50–70% depending on how long after the ACL injury the surgery occurred. Meniscal ramp lesions (tears of the medial meniscus posterior horn at the menisco-capsular junction occur in approximately 25% of ACL-injured knees. Lateral meniscal root tears occur in approximately 7% of ACL", "-31.024419778948868" ], [ "addition, \"crocodile tears syndrome\" is a colloquialism for Bogorad's syndrome, an uncommon consequence of recovery from Bell's palsy in which faulty regeneration of the facial nerve causes sufferers to shed tears while eating. Bogorad's syndrome Bogorad's syndrome, also known as \"Crocodile Tears Syndrome\", is an uncommon consequence of nerve regeneration subsequent to Bell's palsy or other damage to the facial nerve. Efferent fibers from the superior salivary nucleus become improperly connected to nerve axons projecting to the lacrimal glands, causing one to shed tears (lacrimate) on the side of the palsy during salivation while smelling foods or eating. It is", "-30.99904155400145" ], [ "his review with anybody whose eyes didn’t join Bushnell Snr’s in filling with tears is stronger than me.", "-30.927949201257434" ], [ "effects subside within a few hours; egg white can be applied to the affected area to neutralize the burning. Animal studies have shown that repeated exposure to tributylphosphate, one of the phosphate esters used in Skydrol fluids, may cause urinary bladder damage. If Skydrol gets in the eyes, it creates an intense stinging sensation. The recommended treatment for this is to use an eye-wash station, sometimes mineral oil, castor oil or milk is used.\nSkydrol fluids are incompatible with many plastics, paints and adhesives, which can be softened and eventually destroyed by exposure to Skydrol. Some materials (for example rayon, acetate)", "-30.884432618986466" ], [ "seemingly even less common than complete tears. They are more likely to arise from overuse from activities like daily running. The bottom of the foot may be swollen or bruised. Treatment Full recovery from both complete and partial tears typically takes 12 weeks or more. However, activities may gradually resume after 6-8 weeks when the plantar fascia will be mostly recovered. Surgery is typically a last resort. At home, it might be advisable to follow the RICE method to reduce inflammation and ease pain. Immobilization For the first 2-4 weeks after diagnosis, patients are often instructed to use a walking", "-30.839350216148887" ], [ "Cry Baby A boy burns his buttocks after trying to photocopy them, causing him to feel pain whenever he sits down. He then helps his grandfather find a water-holding frog, but they get trapped in the desert without water. Knowing that neither of them can go on any further, the boy sits down on his burnt bottom and tears rush from his eyes as he feels the unbearable pain. His tears fall onto the ground, causing a ton of frogs to appear on the ground and the grandfather's wish is granted. Ex Poser A boy invents a lie detector that", "-30.664784300490282" ], [ "there should be a limit. As long as the tears represent a genuine release of emotion, they should be permitted to fall. But crying quickly changes from inner sobbing to an expression of protest ... Real crying usually lasts two minutes or less but may continue for five. After that point, the child is merely complaining, and the change can be recognized in the tone and intensity of his voice. I would require him to stop the protest crying, usually by offering him a little more of whatever caused the original tears. In younger children, crying can easily be stopped", "-30.56806956822402" ], [ "to the slit lamp microscopes that allow for this more-thorough evaluation under the higher magnification. Mis-diagnosis of a scratched cornea is fairly common, especially in younger patients. Treatment With the eye generally profusely watering, the type of tears being produced have little adhesive property. Water or saline eye drops tend therefore to be ineffective. Rather a 'better quality' of tear is required with higher 'wetting ability' (i.e. greater amount of glycoproteins) and so artificial tears (e.g. viscotears) are applied frequently. Also recommended is Muro 128 5% Ointment (Sodium Chloride Hypertonicity Ophthalmic Ointment, 5%) which is a great relief overnight,", "-30.429735199722927" ], [ "Carotid-cavernous fistula Presentation CCF symptoms include bruit (a humming sound within the skull due to high blood flow through the arteriovenous fistula), progressive visual loss, and pulsatile proptosis or progressive bulging of the eye due to dilatation of the veins draining the eye. Pain is the symptom that patients often find the most difficult to tolerate.\nPatients usually present with sudden or insidious onset of redness in one eye, associated with progressive proptosis or bulging.\nThey may have a history of similar episodes in the past. Causes Carotid cavernous fistulae may form following closed or penetrating head trauma, surgical damage, rupture of", "-30.322296219434065" ], [ "a detachment of the overstressed labrum. Epidemiology In the United States acetabular labrum tears usually occur in the anterior or anterior-superior area, possibly due to a sudden change from labrum to acetabular cartilage. The most common labrum tears in Japan are in the posterior region, likely due to the customary practice of sitting on the floor. Posterior labrum tears in the Western world usually occur when a force drives the femoral head posteriorly which transfers shear and compressive forces to the posterior labrum. Rehabilitation With physical therapy, there is only a small amount of evidence on rehabilitation techniques for the", "-30.318794132675976" ], [ "during feeding, which is forced through the sinuses, stimulating the animals' tear glands into emptying fluid into the eye. Bogorad's syndrome The phrase gives its name to Bogorad's syndrome, colloquially \"crocodile tears syndrome\", an uncommon consequence of recovery from Bell's palsy where faulty regeneration of the facial nerve causes sufferers to shed tears while eating. Russian neuropathologist F. A. Bogorad, who first described the condition in 1926, did so in an article entitled \"syndrome of the crocodile tears\" (also translated as \"the symptom of crocodile tears\"). Bogorad argued that the tears were caused by the act of salivation.", "-30.253523817809764" ], [ "Tears.", "-30.118545411576633" ], [ "that affects the eyes and can lead to vision loss through break down of the central part of the retina called the macula. Degeneration can occur in one eye or both and can be classified as either wet (neovascular) or dry (atrophic). Wet AMD commonly is caused by blood vessels near the retina that lead to swelling of the macula. The cause of dry AMD is less clear, but it is thought to be partly caused by breakdown of light-sensitive cells and tissue surrounding the macula. A major risk factor for AMD is age over the age of 60. Alzheimer's", "-30.05748185959237" ], [ "recovering from tears, are prone to reinjury. Rehabbing too soon or too strenuously might increase the risk of retear or failure to heal. However, no research has proven a link between early therapy and the incidence of re-tears. In some studies, those who received earlier and more aggressive therapy reported reduced shoulder pain, less stiffness and better range of motion. Other research has shown that accelerated rehab results in better shoulder function.\nThere is consensus amongst orthopaedic surgeons and physical therapists regarding rotator cuff repair rehabilitation protocols. The timing and duration of treatments and exercises are based on biologic and", "-29.99620712899832" ], [ "blinking motion required to spread tears.\nAbnormalities of the lipid tear layer caused by blepharitis and rosacea, and abnormalities of the mucin tear layer caused by vitamin A deficiency, trachoma, diphtheric keratoconjunctivitis, mucocutaneous disorders and certain topical medications are causes of keratoconjunctivitis sicca.\nPersons with keratoconjunctivitis sicca have elevated levels of tear nerve growth factor (NGF). It is possible that this ocular surface NGF plays an important role in ocular surface inflammation associated with dry eyes. Pathophysiology Having dry eyes for a while can lead to tiny abrasions on the surface of the eyes. In advanced cases, the epithelium undergoes pathologic changes,", "-29.969981004454894" ], [ "be more effective. Further information that should be considered in the treatment of rotator cuff tears can be found at University of Washington School of Medicine. SLAP tear (lesion) A SLAP (superior labrum anterior to posterior) tear occurs when the cartilage of the shoulder (labrum) delaminates from glenoid. This causes an instability of the shoulder, typically in overhead movements. Symptoms Symptoms include a dull ache deep in the shoulder joint, trouble sleeping due to the instability and discomfort, and extreme weakness in overhead activities. Diagnosis The best diagnosis for a SLAP tear is a clinical exam \nfollowed by an MRI", "-29.96202962473035" ], [ "allows fluid from other parts of the eye to rapidly enter the lens leading to swelling and then whitening, obstructing light from reaching the retina at the back of the eye. Cataracts may develop in 0.7 to 8.0% of cases following electrical injuries. Blunt trauma can also result in star- (stellate) or petal-shaped cataracts. Radiation Cataracts can arise as an effect of exposure to various types of radiation. X-rays, one form of ionizing radiation, may damage the DNA of lens cells. Ultraviolet light, specifically UVB, has also been shown to cause cataracts, and some evidence indicates sunglasses worn at an", "-29.92302284989273" ], [ "prevent infection, which may temporarily color the stub and surrounding skin purple.\nThe umbilical cord contains three vessels: two arteries and one vein. The two arteries carry blood from the baby to the placenta while one vein carries blood back to the baby. Care and feeding Infants cry as a form of basic instinctive communication. A crying infant may be trying to express a variety of feelings including hunger, discomfort, overstimulation, boredom, wanting something, or loneliness.\nBreastfeeding is the recommended method of feeding by all major infant health organizations. If breastfeeding is not possible or desired, bottle feeding is done with", "-29.90173200587742" ], [ "and identifying and closing of any dural tears. The risk of significant bleeding can be prevented by meticulous technique and blood loss is compensated by transfusions. Blood loss can also be reduced by giving hypotensive anesthesia. Rarely major eye injuries, including blindness, are seen. Visual disturbances can occur due to the eye muscle imbalance after orbital mobilization. Ptosis and diplopia can also occur postoperatively, but this usually self-corrects. A quite difficult problem to correct postoperatively is canthal drift, which can be managed best by carefully preserving the canthal tendon attachments as much as possible. Despite the extensiveness in these procedures,", "-29.812418176967185" ], [ "Tears Left to Cry.\"\nThe film inspired the suffix -ception, which can be appended to a noun to indicate a layering, nesting, or recursion of the thing in question.", "-29.807756497670198" ], [ "excessive evaporation Keratoconjunctivitis sicca is usually due to inadequate tear production from lacrimal hyposecretion or to excessive tear evaporation. The aqueous tear layer is affected, resulting in aqueous tear deficiency (ATD). The lacrimal gland does not produce sufficient tears to keep the entire conjunctiva and cornea covered by a complete layer. This usually occurs in people who are otherwise healthy. Increased age is associated with decreased tearing. This is the most common type found in postmenopausal women.\nCauses include idiopathic, congenital alacrima, xerophthalmia, lacrimal gland ablation, and sensory denervation. In rare cases, it may be a symptom of collagen vascular diseases,", "-29.806235910960822" ], [ "people, but may be permanent. The symptoms associated with perineal tear are not always due to the tear itself, since there are often other injuries, such as avulsion of pelvic floor muscles, that are not evident on examination.\nThere are claims that sometimes the perineum is excessively repaired after childbirth, using a so-called \"husband stitch\" and that this can increase vaginal tightness or result in pain during intercourse.", "-29.78498209609097" ], [ "produce complications that can cause eye damage, resulting in impaired vision or (rarely) in the loss of vision.\nSymptom assessment is a key component of dry eye diagnosis – to the extent that many believe dry eye syndrome to be a symptom-based disease. Several questionnaires have been developed to determine a score that would allow for dry eye diagnosis. The McMonnies & Ho dry eye questionnaire is often used in clinical studies of dry eyes. Causes Any abnormality of any one of the three layers of tears produces an unstable tear film, resulting in symptoms of dry eyes. Decreased tear or", "-29.751093529699574" ], [ "with another teardrop allows the person to see and feel everything the other experiences. After David and Mary Margaret leave, Gold discovers that Lacey heard everything and seems to be comfortable with his secret. Mary Margaret volunteers to find Regina after helping to kill Cora. As David places the tear in Mary Margaret's eye, she begins to feel Regina's pain and smell the scent of sardines, leading Emma and Neal to the Storybrooke cannery. As the four converge on the plant, Tamara notices that they have been found out and warns Greg to end the treatment on Regina and meet", "-29.696079948567785" ], [ "injuries to cause bronchial tears (ruptures of the bronchioles). They may hinder breathing. Due to the associated injuries, the mortality rate for people with sternal fracture is high, at an estimated 25–45%. However, when sternal fractures occur in isolation, their outcome is very good.\nThere is controversy over the question of whether the presence of sternal fracture is an indication of cardiac injuries. Causes Vehicle collisions are the usual cause of sternal fracture; the injury is estimated to occur in about 3% of auto accidents. The chest of a driver who is not wearing a seat belt may strike the", "-29.675837405520724" ], [ "it lasts longer than most regular tears and provides protection for those with severe cases.\nNocturnal Lagophthalmos (where one’s eyelids don’t close enough to cover the eye completely during sleep) may be an exacerbating factor, in which case using surgical tape to keep the eye closed at night can help.\nWhilst individual episodes may settle within a few hours or days, additional episodes (as the name suggests) will recur at intervals.\nWhere episodes frequently occur, or there is an underlying disorder, one medical, or three types of surgical curative procedures may be attempted:\nuse of therapeutic contact lens, controlled puncturing of the surface layer", "-29.655603845400037" ], [ "dilate, although not all women will notice this mucus plug being released.\nBloody show is another indication that the cervix is dilating. Bloody show usually comes along with the mucus plug, and may continue throughout labor, making the mucus tinged pink, red or brown. Fresh, red blood is usually not associated with dilation, but rather serious complications such as placental abruption, or placenta previa. Red blood in small quantities often also follows an exam.\nThe pain experienced during dilation is similar to that of menstruation (although markedly more intense), as period pains are thought to be due to the passing of", "-29.48369470968464" ], [ "few initial symptoms include swelling, knee instability, and pain. A popping sound or sensation may or may not be heard when the ACL first tears. A following symptom usually includes the feeling of the knee \"giving out\". Tearing of the ACL is the most significant injury because it leaves the knee unstable, which also causes the knee to lose its normal function.\nEpidemiology\nIt is estimated that 100,000 new anterior cruciate ligament injuries occur in the U.S. each year. Approximately half of the new ACL injuries involve injuries to the ligament, tendon, and or muscle of that affected knee. Women are", "-29.45550254813861" ], [ "slapping the babies backside telling it to be born. Others say it's because the baby does not want to leave the mother's womb so Songzi Guanyin will kick it out, leaving the bruise. While a small portion of people, wrongfully, believe it happens when the doctor is slapping the baby's backside to make it cry. Scientifically, it is also referred to as \"蒙古斑\" (Pinyin: Měng Gǔ Bān; Literally: Mongolian Spot)\nIn Khmer, it is known as \"khnau\" (ខ្នៅ) which translates to 'Mongolian spot' as well as other skin conditions such as vitiligo and leucoderma.\nThe mark is also common among Maya people", "-29.424218717495023" ], [ "Tear of meniscus Signs and symptoms The common signs and symptoms of a torn meniscus are knee pain, particularly along the joint line, and swelling. These are worse when the knee bears more weight (for example, when running). Another typical complaint is joint locking, when the affected person is unable to straighten the leg fully. This can be accompanied by a clicking feeling. Sometimes, a meniscal tear also causes a sensation that the knee gives way.\nA person with a torn meniscus can sometimes remember a specific activity during which the injury was sustained. A tear of the meniscus commonly follows", "-29.418319425050868" ], [ "Ezzos wrote that leaving the infant \"crying for 15, 20, even 30 minutes is not going to hurt your baby physically or emotionally.\" To counter the book's conclusions, Laura Bassi Zaff, PhD, an expert in childhood cognitive development, wrote that careful research has shown that leaving a baby crying may result in emotional harm, perhaps manifesting as \"attachment disorder, or anxiety disorder, or crippling problems with self esteem and interpersonal relationships\". Secular To create a secular version of the book, Gary Ezzo partnered with Robert Bucknam, a pediatrician from Louisville, Colorado, to write On Becoming Babywise: More Than a Survival", "-29.41807180070282" ], [ "(Dilation) Spasm of accommodation is frequently resistant to treatment. However, some patients do find relief through the use of daily eye dilation with cycloplegic drops. One side effect of cycloplegic drops is that they often have BAK as a preservative ingredient, which with daily use can erode the tear shield, \"At each administration of an eye drop containing benzalkonium chloride, its detergent effect disrupts the lipid layer of the tear film. This cannot be regenerated and can no longer protect the aqueous layer of the tear film, which evaporates easily. In these circumstances, the cornea is exposed and eye dryness", "-29.281267743499484" ], [ "7- or 8-years-old. They find it difficult to feed themselves, much less have mental ability or physical capacity for work. No one can hold back the tears when seeing the heads turning round unconsciously, the bandy arms managing to push the spoon of food into the mouths with awful difficulty ... Yet they still keep smiling, singing in their great innocence, at the presence of some visitors, craving for something beautiful.\nOn June 16, 2010, members of the U.S.-Vietnam Dialogue Group on Agent Orange/Dioxin unveiled a comprehensive 10-year Declaration and Plan of Action to address the toxic legacy of Agent Orange and", "-29.239122668252094" ], [ "isolated medial meniscal tear occurs more frequently than any other tear associated with the meniscus. The prevalence of meniscus tears is the same for both knees. In a few different studies the BMI of a person is shown to have a greater effect on the frequency of a meniscus tear; having a higher BMI will result in more weight on the joints, which can cause the knee to be non-aligned, which causes more weight on the muscles, resulting in an easier tear.\nIn 2008 the U.S Department of Health and Human Services reported a combined total of 2,295 discharges for", "-29.198475321856677" ], [ "of treatment for dry eyes. While mild cases require application of lubricant drops four times a day, severe cases require more aggressive treatment, such as ten to twelve times a day. Thicker artificial tears can be used in severe cases, although these may temporarily blur vision. Precautions Drops for red eyes can make the eyes drier.\nIf wearing contact lenses, rewetting or lubricating drops specifically for contact lenses should be used. Other types of drops may contain ingredients that damage contact lenses. Adverse effects, interactions and contraindications Possible adverse effects of carboxymethyl cellulose and similar lubricants include eye pain, irritation, continued", "-29.16330180715886" ], [ "vitreous humor and proliferate to create a thin epiretinal membrane that distorts vision. In more severe cases, vitreous fluid may seep under the tear, separating the retina from the back of the eye, creating a retinal detachment. Trauma can be any form from a blunt force trauma to the face such as a boxer's punch or even in some cases has been known to be from extremely vigorous coughing or blowing of the nose. Diagnosis Posterior Vitreous Detachment is diagnosed via dilated eye examination. For some patients the vitreous gel is extremely clear and so it can be hard to", "-29.14502745514619" ], [ "or object come into contact with the knee causing the ligament to tear. However, non-contact tears typically occur during the following movements: decelerating, cutting, or landing from a jump. ACL injury is 4-6 times higher in females than in males. An increased Q angle and hormonal differences are a few examples of the gender disparity in ACL tear rates. Autograft An accessory hamstring or part of the patellar ligament are the most common donor tissues used in autografts. While originally less commonly utilized, the quadriceps tendon has become a more popular graft.\nBecause the tissue used in an autograft is the", "-29.083709321566857" ], [ "Dentin contains many microscopic tubes containing fluid and the processes of odontoblast cells, which communicate with the pulp. Mechanical, osmotic, or other stimuli cause movement of this fluid, triggering nerves in the pulp (the \"hydrodynamic theory\" of pulp sensitivity). Due to the close relationship between dentin and pulp, they are frequently considered together as the dentin-pulp complex.\nThe teeth and gums exhibit normal sensations in health. Such sensations are generally sharp, lasting as long as the stimulus. There is a continuous spectrum from physiologic sensation to pain in disease. Pain is an unpleasant sensation caused by intense or damaging events. In", "-29.080989035312086" ], [ "Conjunctivochalasis Symptoms Symptoms range from dry eye, epiphora, and irritation, to localized pain, foreign body sensation, subconjunctival hemorrhage, and ulceration. Symptoms are often made worse by vigorous blinking. Causes Most conjunctivochalasis is thought to be caused by both a gradual thinning and stretching of the conjunctiva that accompanies age and a loss of adhesion between the conjunctiva and underlying sclera due to the dissolution of Tenon's capsule. The resulting loose, excess conjunctiva may mechanically irritate the eye and disrupt the tear film and its outflow, leading to dry eye and excess tearing. A correlation may also exist between inflammation in", "-29.073451068456052" ], [ "TearScience Products LipiView Ocular Surface uses Interferometry to measure the thickness of the tear film oily lipid layer. LipiFlow Thermal Pulsation System uses heat and pressure to unblock obstructed Meibomian glands to reduce dry eye symptoms.", "-29.0703758711752" ], [ "pillow that has a hole, such as a travel pillow, for greater comfort.\nIf your piercing is swollen for more than 2 weeks, starts seeping red, black or green colored fluid, bleeds continuously, or causes any problem with your hearing it is advised to call your piercer. In severe cases, see your doctor or go to a hospital.", "-29.04481314943405" ], [ "tissues. The conjunctiva also possess macrophages that play a part in modulating the T-cell immune response and mediating both the innate and acquired immune responses. Lacrimal immune response The tear film is composed of three layers: the lipid, aqueous, and mucin. These play a role in creating a smooth surface to facilitate refraction, lubricating the movement of the eyelid, passively transporting gases such as oxygen and carbon dioxide, and protecting the cornea. This last function is achieved through functions of various layers within the tear film. Tears bathe corneal epithelial cells in a moist environment, preventing them from drying out", "-29.029370943448157" ], [ "Cry No More (Shareefa song) Song information \"Cry No More\" is about a woman in an unhealthy relationship. Her man cheats on her and she always cries. In the song, she sings that she can't cry anymore because she is over and through with her ex-boyfriend. Because she has a lot on her mind, she has no time to cry over him.", "-29.019155683919962" ], [ "tear or sprain rarely requires surgery. If the injury is a Grade 1 or Grade II, microscopic or partial macroscopic tearing respectively, the injury is treated with rest and rehabilitation. Ice, electrical stimulation and elevation are all methods to reduce the pain and swelling felt in the initial stages after the injury takes place. Physical therapy focuses on regaining full range-of-motion, such as biking, stretching and careful applications of pressure on the joint. Full recovery of Grade I or Grade II tears should take between 6 weeks and 3 months. Continued pain, swelling and instability to the joint after this", "-29.018239751894725" ], [ "is experienced, the test is considered positive. MRI Magnetic resonance imaging (MRI) and ultrasound are comparable in efficacy and helpful in diagnosis although both have a false positive rate of 15 - 20%. MRI can reliably detect most full-thickness tears although very small pinpoint tears may be missed. In such situations, an MRI combined with an injection of contrast material, an MR-arthrogram, may help to confirm the diagnosis. It should be realized that a normal MRI cannot fully rule out a small tear (a false negative) while partial-thickness tears are not as reliably detected. While MRI is sensitive", "-28.938641891410953" ], [ "Jann Browne on her 1991 album, It Only Hurts When I Laugh.", "-28.936864601044363" ], [ "performance.\nLong term complications of ACL injury include early onset arthritis of the knee and/or re-tearing the ligament. Factors that increase risk of arthritis include severity of the initial injury, injury to other structures in the knee, and level of activity following treatment. Not repairing tears to the ACL can sometimes cause damage to the cartilage inside the knee because with the torn ACL, the tibia and femur bone are more likely to rub against each other.\nUnfortunately, young female athletes have a significant risk of re-tearing a repaired ACL, or tearing the ACL on the other knee after their recovery. This", "-28.935867375708767" ], [ "and fluid into the tissue (edema), which manifests itself as swelling (tumor). Some of the released mediators such as bradykinin increase the sensitivity to pain (hyperalgesia, dolor). The mediator molecules also alter the blood vessels to permit the migration of leukocytes, mainly neutrophils and macrophages, outside of the blood vessels (extravasation) into the tissue. The neutrophils migrate along a chemotactic gradient created by the local cells to reach the site of injury. The loss of function (functio laesa) is probably the result of a neurological reflex in response to pain.\nIn addition to cell-derived mediators, several acellular biochemical cascade systems", "-28.911752920394065" ], [ "The Crying Boy The Crying Boy is a mass-produced print of a painting by Italian painter Giovanni Bragolin. It was widely distributed from the 1950s onwards.\nThere are numerous alternative versions, all portraits of tearful young boys or girls. In addition to being widely known, certain urban legends attribute a 'curse' to the painting. Curse On 5 September 1985, the British tabloid newspaper The Sun reported that an Essex firefighter claimed that undamaged copies of the painting were frequently found amidst the ruins of burned houses. By the end of November, belief in the painting's curse was widespread enough that The", "-28.906977327385903" ], [ "exposure to fluoride. Trauma Dental trauma may result in discolorations. Following luxation injuries red discoloration may develop almost instantly. This is due to severance of the venous microcirculation to a tooth, while the arteries continue to supply blood to the pulp. The blood is then decomposed gradually and a blue-brown discoloration develops.\nTeeth may turn grey following trauma-induced pulp necrosis (death of the pulp). This discoloration typically develops weeks or months after the injury and is caused by incorporation of pigments released during the breakdown of the pulpal tissue and blood into the dentin.\nYellow discoloration may occur following pulp canal obliteration,", "-28.850870067399228" ], [ "the same time, it would seem that 'grief in general is a \"taming\" of the primitive violent discharge affect, characterized by fear and self-destruction, to be seen in mourning'.\nJulia Kristeva suggests that 'taming sorrow, not fleeing sadness at once but allowing it to settle for a while...is what one of the temporary and yet indispensable phases of analysis might be'. Shand and McDougall Sadness is one of four interconnected sentiments in the system of Alexander Faulkner Shand, the others being fear, anger, and joy. In this system, when an impulsive tendency towards some important object is frustrated, the resultant", "-28.841090139816515" ], [ "lining can cause the tissue to become swollen and congested. Ulceration is thought to be caused by resulting poor blood supply (ischemia), combined with repeated frictional trauma from the prolapsing lining, and exposure to increased pressure are thought to cause ulceration. Trauma from hard stools may also contribute.\nThe site of the ulcer is typically on the anterior wall of the rectal ampulla, about 7–10 cm from the anus. However, the area may of ulceration may be closer to the anus, deeper inside, or on the lateral or posterior rectal walls. The name \"solitary\" can be misleading since there may be more", "-28.818494667997584" ], [ "breaks down into fibrils, which ultimately are the floaters that plague the patient. Regression of the hyaloid artery The hyaloid artery, an artery running through the vitreous humour during the fetal stage of development, regresses in the third trimester of pregnancy. Its disintegration can sometimes leave cell matter. Other common causes Patients with retinal tears may experience floaters if red blood cells are released from leaky blood vessels, and those with uveitis or vitritis, as in toxoplasmosis, may experience multiple floaters and decreased vision due to the accumulation of white blood cells in the vitreous humour.\nOther causes for floaters include", "-28.804989964410197" ], [ "see the PVD. In these cases, additional imaging such as Optical Coherence Tomography (OCT) or ocular ultrasound are used. Treatment Therapy is not required or indicated in posterior vitreous detachment, unless there are associated retinal tears, which need to be repaired. In absence of retinal tears, the usual progress is that the vitreous humor will continue to age and liquefy and floaters will usually become less and less noticeable, and eventually most symptoms will completely disappear. Prompt examination of patients experiencing vitreous humor floaters combined with expeditious treatment of any retinal tears has been suggested as the most effective means", "-28.80229240481276" ], [ "is avascular and does not get a direct blood supply. This poses a problem in a meniscus injury, as blood flow is diminished and the avascular areas tend to not heal.\nInjury\nThe tear of meniscus is among the most common knee injuries. It is usually caused by torsional stress; twisting or turning of the knee too quickly with the foot planted on the ground while the knee is flexed. The feeling of a \"pop\" in the knee is usually felt when the meniscus is torn. Athletes, particularly those who participate in contact sports, are at a greater risk for meniscal tears.", "-28.743473334703594" ], [ "itself has many possible causes, but commonly the cause may be side effects of medications, or conditions such as Sjögren's syndrome. Conversely, conditions which cause drooling or sialorrhoea (excessive salivation) can cause angular cheilitis by creating a constant wet environment in the corners of the mouth. About 25% of people with Down syndrome appear to have AC. This is due to relative macroglossia, an apparently large tongue in a small mouth, which may constantly stick out of the mouth causing maceration of the corners of the mouth with saliva. Inflammatory bowel diseases (such as Crohn's disease or ulcerative colitis) can", "-28.724671471805777" ], [ "Central serous retinopathy Causes CSR is a fluid detachment of macula layers from their supporting tissue. This allows choroidal fluid to leak beneath the retina. The buildup of fluid seems to occur because of small breaks in the retinal pigment epithelium.\nCSR is sometimes called idiopathic CSR which means that its cause is unknown. Nevertheless, stress appears to play an important role. An oft-cited but potentially inaccurate conclusion is that persons in stressful occupations, such as airplane pilots, have a higher incidence of CSR.\nCSR has also been associated with cortisol and corticosteroids. Persons with CSR have higher levels of cortisol.", "-28.71097851972445" ], [ "the powder or mist form can cause redness and pain in the eyes (i.e. conjunctivitis) in small doses. Small doses absorbed through the eyes can also cause tearing (lacrimation). Higher doses can cause tissue damage, severe bleeding at the back of the eye (retinal hemorrhage), and vision impairment or blindness. A large enough dose can be absorbed into the bloodstream and lead to systemic toxicity. Treatment Because no antidote exists for abrin, the most important factor is avoiding abrin exposure in the first place. If exposure cannot be avoided, the most important factor is then getting the abrin off or", "-28.70497989546857" ], [ "John 20:15 Analysis According to John, \"Woman, why are you crying? Who is it you are looking for?\" is the first thing Jesus says upon his resurrection. The first part \"Why are you crying?\" repeats the statement made by the angels in John 20:13. Jesus adds \"Who is it you are looking for?\" This question, which Jesus has asked others previously in the Gospel, is often read as a wider question of what people are seeking in their lives. That Jesus quickly understands why Mary is weeping is also said to show his greater understanding of", "-28.651730253608548" ], [ "tears as their adorable characters enter the School of Hard Knocks.\"", "-28.588102065841667" ], [ "of emotional tears.", "-28.573667055359692" ], [ "and cause vasoconstriction of the iris and sclera, pupillary dilation, widening of the palpebral fissure, and the reduced production of tears. These responses are important during Fight-or-flight response of the ANS. Dilation of the pupils allows for an increased clarity in vision, and inhibition of the lacrimal gland stops tear production allowing for unimpaired vision and redirection of energy elsewhere. Blood vessels of the skin The postganglionic axons of the SCG innervate blood vessels in the skin and cause the vessels to constrict. Constriction of the blood vessels causes a decrease in blood flow to the skin leading to paling", "-28.552620027468947" ], [ "While degeneration of articular cartilage is a common disease process in working animals, resulting in osteoarthritis, cartilage is aneural (does not contain nerves) and does not produce pain. Pain associated with osteoarthritis is secondary to joint capsule pain, due to joint distention and reduced range of motion, or to pain from the underlying bone, which may become damaged following erosion of the articular cartilage.\nInflammatory products, such as inflammatory mediators and cytokines, damage articular cartilage and have been shown to weaken intra-articular ligaments. Therefore, treatment of joint disease should not only address the primary injury producing inflammation, but also the inflammatory", "-28.54555498183072" ], [ "Bloody punctual discharge or lacrimal sac distension above the medial canthal tendon is also highly suggestive of neoplasm. Congenital Congenital nasolacrimal duct obstruction, or dacryostenosis, occurs when the lacrimal duct has failed to open at the time of birth, most often due to an imperforate membrane at the valve of Hasner. Around 6% of infants have congenital nasolacrimal duct obstruction, or dacryostenosis, usually experiencing a persistent watery eye even when not crying. If a secondary infection occurs (Dacryocystitis), purulent (yellow / green) discharge may be present.\nMost cases resolve spontaneously, with antibiotics reserved only if conjunctivitis occurs. Lacrimal sac massage has", "-28.519281691238575" ], [ "tears may be visualized using MRI scans. Treatment Patellar tendon rupture must be treated surgically. With a tourniquet applied, the tendon is exposed through a midline longitudinal incision extending from the upper patellar pole to the tibial tuberosity. The tendon is either avulsed (detached) from the lower patellar pole or lacerated. Even so, the continuity and tone of the tendon should be restored, taking into consideration the patellar height.\nA cast or brace is then put over where the operation took place. The cast or brace remains for at least 6 weeks followed by an unidentified time of rehabilitation of the", "-28.51774315777584" ], [ "things may be too deep for tears, but nothing is too deep for laughter.\"", "-28.515029531728942" ] ]
1eem7n
What does it mean if you get more than one life sentence?
[ "If one count is overturned they still stay in jail.", "Multiple life sentences are given to keep people in prison even if they manage to get other sentences over turned. For example you kill someone and site their car get a life sentence and 20 years, but you find a good lawyer that finds a technicality and gets you off of that life sentence, now you're just serving 20 years.", "If you get a conviction over turned, and you have great behavior in jail so your sentence is reduced by 1/3, you're still going to die in prison.", "it means you're gonna be in jail for a long time" ]
[ [ "years to life,\" \"25 years to life,\" or \"life with mercy\" may be given, which is called an \"indeterminate life sentence.\" A sentence of \"life without the possibility of parole\" or \"life without mercy\" is called a \"determinate life sentence\" because a sentence of \"15 years to life\" means that it is a life sentence with a non-parole period of 15 years. Parole is not guaranteed but discretionary and so that is an indeterminate sentence. Even if a sentence specifically denies the possibility of parole, government officials may have the power to grant an amnesty, to reprieve, or to", "-27.990308035360158" ], [ "of at least one life sentence if, for some reason, one of the murder convictions is overturned on appeal.\nOther countries either allow multiple concurrent life sentences which can be served at the same time (e.g. Russia), or allow multiple consecutive life sentences with a single minimum term (e.g. Australia), thus allowing earlier release of the prisoner.\nSince 2 December 2011, it is possible for back-to-back life sentences to be handed out in Canada. Before doing this, the judge must consider a jury recommendation as to whether to impose a minimum sentence of more than 25 years. The longest minimum sentence", "-26.91669168952103" ], [ "Life imprisonment in the United States In the United States, 1 in 2,000 people are imprisoned for life. This is similar to the total imprisonment rate in Japan, which is roughly 51 per 100,000 residents (approx. 1 in 1,960 residents). There are many U.S. states in which a convict can be released on parole after a decade or more has passed, but in California, people sentenced to life imprisonment can normally apply for parole after seven years.\nThe laws in the United States divide life sentences between \"determinate life sentences\" and \"indeterminate life sentences.\" For example, sentences of \"15", "-26.435483227736768" ], [ "to fixed-term, though total time served must be no less than ten years. Life without parole was enacted into the Criminal Law on Dec 11, 2015, is applicable to those convicted with embezzlement.\n Death penalty with two years reprieve will be commuted to life imprisonment if the convicted did not commit another serious crime within the two year period or fixed-term imprisonment if the convicted helped solve a major crime or contributed the society greatly. Death penalty with reprieve, without parole can be automatically reduced to life without parole if another crime is not committed within the two year period,", "-25.851264008889302" ], [ "it may be one of the rarest cases, after weighing all the circumstances, taking a 'global' view, we are of the view that extreme penalty of death sentence is not called for. However, while affirming life imprisonment, we direct that the accused will not be released from custody before completion of 20 years of actual sentence.", "-25.546102142268865" ], [ "are serving sentences so long that they cannot be completed in a typical lifetime. About 150 inmates have died there in the last five years. An article for QZ reported that 35% of all the world's prison lifers are in the US. Parole and nonviolent offenses Under the federal criminal code, however, with respect to offenses committed after December 1, 1987, parole has been abolished for all sentences handed down by the federal system, including life sentences. A life sentence from a federal court will therefore result in imprisonment for the life of the defendant unless a pardon or", "-25.404810611471476" ], [ "Life imprisonment in New Zealand Life imprisonment has been the most severe criminal sentence in New Zealand since the death penalty was abolished in 1989. Offenders sentenced to life imprisonment must serve a minimum of 10 years imprisonment before they are eligible for parole, although the sentencing judge may set a longer minimum period or no minimum period at all (i.e. life without parole). Released offenders remain on parole and are subject to electronic tagging for the rest of their life.\nLife imprisonment in New Zealand for crimes other than murder is relatively rare. Only six life sentences since 1980 have", "-25.33286251268146" ], [ "a possibility of parole for anyone sentenced to life imprisonment, as life imprisonment is defined as “deprivation of liberty of the convict for the entire rest of his/her life”. Where mercy is granted in relation to a person serving life imprisonment, imprisonment thereof must not be less than 30 years. In Albania, no person sentenced to life imprisonment is eligible for parole; this effectively means imprisonment for the natural life of the convicted person, unless the prisoner is found not likely to re-offend and has displayed good behavior, and the convicted person has served at least 25 years. Also, in", "-24.961154938922846" ], [ "Back-to-back life sentences In judicial practice, back-to-back life sentences are two or more consecutive life sentences given to a felon. This penalty is typically used to prevent the felon from ever getting released from prison.\nThis is a common punishment for a double murder in the United States, and is effective because the defendant may be awarded parole after 25 years when he or she is eligible, and then must serve an additional 25 years in prison to be eligible for parole again. It also serves as a type of insurance that the defendant will have to serve the maximum length", "-24.866032004749286" ], [ "Life imprisonment in France In France, life imprisonment is a punishment of indeterminate length and may last for the remainder of the convict's life. The sentence is the most severe punishment given under French law and it can be imposed by the courts for aggravated murder, treason, terrorism, drug kingpin and other serious felonies resulting in death or involving torture.\nThere is an average of 25 sentences of life imprisonment per year and there are 550 inmates currently jailed for life. Life sentences for crimes other than aggravated murder are rare. \nInmates jailed for life are required to serve a safety", "-24.82607867094339" ], [ "be sentenced to up to life imprisonment if the related offence is a street racing one. A sentence of greater than 14 years, on the death-by-dangerous-driving charge, can only otherwise be imposed if any of the remaining charges of which the offender is convicted carry a maximum prison sentence of more than 14 years (e.g. a conviction for Causing death by criminal negligence, as in R v Smith, because that charge carries a maximum sentence of life imprisonment) or the judge decides to sentence the offender to serve a sentence, on a different charge (e.g. hit and run), consecutively", "-24.781087260222648" ], [ "two thirds of the sentence. For those aged 12–14, the maximum sentence is 15 years in prison, with eligibility for parole after serving half the sentence. Parole is only possible if the juvenile has maintained good behavior, and has not violated any prison rules. If the accused does not maintain good behavior, he or she is required to serve the full sentence in prison. Life imprisonment may only be imposed for juveniles in cases crimes against the security of the state, crimes against the constitution, crimes against national defense, honor killings, and terrorism.", "-24.588696319096925" ], [ "Life imprisonment in Denmark In Denmark, a life sentence (Danish: Livsvarigt fængsel) is the most severe conviction under the Penal Code and reserved for the most serious crimes. The sentence is of indeterminate length. People receiving a life sentence in Denmark can request a pardoning hearing after 12 years. If the hearing is successful, the Justice Minister (or someone authorized by the Minister) grants a pardon, subject to a parole period of up to 5 years.\nPrisoners sentenced to life imprisonment serve an average of 17 years. A person with a life sentence will not be released if it is", "-24.58049795867555" ], [ "Dead time (imprisonment) In United States legal terminology Dead time is time spent institutionalized by a defendant that does not count as credit toward the defendant's sentence. An example would be time spent confined in a mental hospital while the defendant is being restored to competency to stand trial. Halfway house time pending sentencing can also sometimes be dead time.\nIn the United States, federal law provides that a defendant shall be given credit toward the service of a term of imprisonment for any time he has spent in official detention prior to the date the sentence commences (1) as a", "-24.577104346695705" ], [ "other life sentences or indeterminate sentences. Any person released on parole from a life sentence or an indeterminate sentence must remain on parole and be subject to parole conditions of the board for the remainder of the offender's life. \nIndividuals convicted of multiple murder may be given consecutive parole ineligibility periods thus extending their parole ineligibility period beyond 25 years. In rare cases this ineligibility for parole may extend beyond a normal life span, meaning, in de facto terms, a sentence of life-without-parole.\nFor a reflection on the work of a Member of the Parole Board see Lubomyr Luciuk's article in", "-24.426406228145424" ], [ "sets the maximum sentence at 45 years, and Portugal, which abolished all forms of life imprisonment with the \nprison reforms of Sampaio e Melo in 1884 and sets the maximum sentence at 25 years. \nNorway (de jure) and Spain (de facto from 1993 until February 2018, the question being now debated of reintroducing de jure life imprisonment, its habitual practice before it became a democracy in 1978-1983) have abolished life imprisonment but retain other forms of indefinite imprisonment. \nIn Europe, there are many countries where the law expressly provides for life sentences without the possibility of parole. These countries are", "-24.148365744589682" ], [ "has the option of imposing consecutive periods of parole ineligibility for each murder. \nThese provisions of the Criminal Code came into force in December 2011, and permit a trial judge, after considering any jury recommendations, to impose consecutive parole ineligibility periods extending beyond 25 years. In the most extreme cases, this can result in a de facto term of life imprisonment without parole (i.e. a total parole ineligibility period extending beyond the offender's life expectancy). \nThese provisions have been used in several cases since 2011, with parole ineligibility periods of 35 years (Benjamin Hudon-Barbeau ), 40 years (Travis Baumgartner ", "-23.946722231117747" ], [ "Life imprisonment in Belgium Life imprisonment is legal in Belgium and is the most severe punishment available under Belgian law since the abolishment of the death penalty. Under Belgian law, it can only be imposed for the most serious crimes, such as homicide, genocide, crimes against humanity, war crimes or terrorist crimes, for example. Inmates sentenced to life imprisonment are eligible to apply for parole after serving 15 years (when no previous conviction or below 3 years), 19 years (when previous conviction below 5 years), or 23 years (when previous conviction 5 years or more). If the parole court rejects", "-23.83020860615943" ], [ "the parliamentary procedure.\nSome Croatian politicians and law experts still support the introduction of life imprisonment. The opponents argue that long-time imprisonment is a sufficient deterrent and that for many convicted criminals it is essentially equivalent to life imprisonment. As of October 2012, 14 people were sentenced to the maximum term of 40 years.", "-23.830197762712487" ], [ "The main difference between a sentence of life imprisonment for murder and a sentence of life imprisonment for an offence such as criminal negligence causing death is that in the latter case, the offender is eligible for parole after serving seven years. Ireland The rule was abolished in the Republic of Ireland by section 4 of the Criminal Justice Act 1964 which codified the mens rea for murder as intention to kill or seriously injure another person. England and Wales, Northern Ireland The rule was abolished in England and Wales by section 1 of the Homicide Act 1957, and in", "-23.75162137116422" ], [ "the lowest percentage since 2006. Eligibility when sentenced to life Until 2008, for those sentenced to life in prison in New Zealand, the \"standard\" minimum non-parole period was 10 years. In 2002, the Sentencing Act allowed judges to set increasingly lengthy non-parole periods and required a minimum non-parole period of at least 17 years if aggravating factors were involved. This is evident in the 30-year non-parole period given to William Bell who murdered three people at the Mt Wellington-Panmure RSA - currently the longest non-parole period handed down.\nThose sentenced to life in prison may still be released on parole eventually.", "-23.74517613279386" ], [ "may be ordered never to be released or be released after an extensively longer period of time, such are parole is delayed for a non-specific period of 15 years or longer. \nAlthough German law does not explicitly provide for life imprisonment without parole, there is a possibility that some convicts serving life sentences may never be released, particularly if they are considered too dangerous and unlikely to be rehabilitated, or if they are sentenced to extensively long non-parole periods in prisons that would generally last beyond a normal life span, such as 40 to 50 years. As a formality, the", "-23.62668982645846" ], [ "Human Rights as well as the High Court for England and Wales, following a legal challenge by convicted double murderer Anthony Anderson. The final decision on a life sentence prisoner's minimum term now rests with the High Court following a recommendation by the trial judge.", "-23.479882133749925" ], [ "Life imprisonment in Finland In Finland, life imprisonment is the maximum criminal penalty. In actual practice, life imprisonment rarely lasts for the remainder of a convict's life; it currently consists of imprisonment in closed prison and possible periods of imprisonment in a halfway house, supervised parole and full parole. The death penalty was abolished in Finland in 1949 for peacetime offences and for all offences in 1972.\nLife imprisonment is the only possible penalty for the crime of murder and a possible penalty for high treason, treason, espionage, war crimes, genocide, crimes against humanity, homicidal acts of terrorism, and crime against", "-23.416440337452514" ], [ "suspect will not be sentenced to either death penalty or life imprisonment, the extradition must be rejected.\nAdditionally, the Penal Code states that no person may be sentenced to a prison term longer than 25 years, whichever crimes he or she has been found guilty of committing. Therefore, a multiple murderer - no matter how many actual homicides - will not serve more than 25 years in prison. Likewise, in the case murder is committed in addition to other felonies, the defendant will be sentenced to a single prison term, for a period no longer than 25 years, encompassing the applicable", "-23.415905409015977" ], [ "or pardon, the offender will be sentenced to imprisonment for a lifetime, and thus will spend the rest of their natural life in prison. Inmates who committed their crime when they were below the age of 21 cannot be sentenced to life imprisonment. Instead, juvenile offenders can only be sentenced to a maximum of 20 years imprisonment.", "-23.406830134175834" ], [ "Life imprisonment in Canada Mandatory life sentence High treason and first degree murder carry a mandatory sentence of life imprisonment with a full parole ineligibility period of 25 years. Previously, in the case of high treason or first-degree murder (where the offender had been convicted of a single murder) offenders could have their parole ineligibility period reduced to no less than 15 years under the Faint hope clause. However, that option under the Criminal Code was ended by Act of Parliament, effective in December 2011.\nSecond degree murder also carries a mandatory sentence of life imprisonment but with a parole ineligibility", "-23.389874256848998" ], [ "life imprisonment.", "-23.362981525369833" ], [ "inmate has to agree to his release on parole (§ 57a I Nr. 3 StGB). Displays of contrition or appeals for mercy are not a condition for such a release. Today, most life sentences are normally given for murder. Statistics According to data from the federal ministry of justice (1998) the average time served for a life sentence in Germany is 19.9 years. Mandatory sentence Murder, genocide, crimes against humanity, and war crimes against a person. Possible sentence Planning a war of aggression, high treason, treason, illegal disclosure of secrets, engaging in relations that endanger peace, child abuse causing death,", "-23.293189344498387" ], [ "from death sentence to imprisonment for life.", "-23.286807228254474" ], [ "for life imprisonment.", "-23.27097688390495" ], [ "been for crimes other than murder - one for manslaughter in 1996, and five for drug offences in 1985, 1996, 2008 (two) and 2009. In contrast, there have been 886 life sentences for murder during the same period. Preventive detention There is also provision for an indefinite sentence of preventive detention, which can be given for sexual and or violent crimes that do not impose a life sentence like treason or murder (although preventative detention can be imposed alongside life imprisonment, for example, where sexual or violent crimes accompany a murder charge). Since the Sentencing Act 2002 came into force,", "-23.255995370040182" ], [ "become longer, and in 2010 and 2011 was about 35 years. According to the survey by Center for Prisoners' Rights in Japan, in 2012 there were 127 prisoners who had served over 30 years without parole. The rate of re-offending for most released prisoners is low, and the popularity of the death sentence is generally attributed to retribution. Those who are against the death penalty are calling for alternative longer sentences, with more than 10 years before being able to get parole, or jū mukikei (重無期刑), an actual life sentence with no possibility of parole.", "-23.229390018626873" ], [ "people serving a life sentence. \"Custody sentence\" and \"placement sentence\" Criminals considered dangerous can receive a \"custody sentence\" (Danish: forvaringsdom) instead of a life sentence. This can also be used for certain crimes where a life sentence is not possible, such as rape, violence and aggravated robbery. It is often used for people with deviant personalities (for example, antisocial personality disorder) and is typically served in the Herstedvester Prison. It should not be confused with a \"placement sentence\" (Danish: anbringelsesdom), which is reserved for mentally ill people that are ineligible for a normal prison sentence and serve their sentence in", "-23.19540511748346" ], [ "it is a contravention of the European Convention on Human Rights for someone to be sentenced to lifelong imprisonment. When the initial ruling was delivered in January 2012, the court ruled that because the whole-life orders were imposed by a judge only after consideration of the facts of each case, and because the life prisoners could apply to the Home Secretary for compassionate release, their whole life orders did not breach their human rights.\nA later appeal by the same men led to a ruling in July 2013 that there must be a prospect of review of whole life orders within", "-23.183334572036983" ], [ "the offender's income when this is higher than the minimum fine.\nLengths of prison sentences have increased in recent years, though Finnish prison terms are exceptionally short in the international context. Drug trafficking and manslaughter result in the longest prison sentences, of 8–9 years, after premeditated murder. Although life sentences are given for murder, probation is given after 10 years at the earliest, excluding the possibility of presidential amnesty. Therefore, effective life sentences are enforced in only cases of involuntary commitment of murderers.\nThe last time capital punishment was enforced in peacetime was in 1825 (see: Tahvo Putkonen). In the Finnish Civil", "-23.096110994854826" ], [ "received a third sentence of life imprisonment.", "-23.053452375053894" ], [ "following month and was again sentenced to life imprisonment. The average duration of a life sentence in the 2010s has been 14 years.", "-23.039246777589142" ], [ "of the higher offenses, and lower offenses are set to be given a specific punishment. Active If a person receives an active sentence then they must serve their time in jail or prison. Active sentences are given if the person is convicted of a felony that falls into the high offense level of crimes, or if they have a bad prior record of crimes. Once a person is sentenced to active time they must complete their entire time in the prison. There is no ability to parole under the minimum sentence. Community If an offender receives a community punishment it", "-23.01762910636171" ], [ "the Netherlands, there is never a possibility of parole for any person sentenced to life imprisonment, and any form of release for life convicted in the country is only possible when granted royal decree by the King of the Netherlands. In Europe, only the Netherlands, Moldova and Malta explicitly preclude parole or any form of release for life sentences in all cases. Even in other European countries that do provide for life without parole, courts continue to retain judicial discretion to decide whether a sentence of life should include parole or not. In Albania, the decision of whether or not", "-23.014796273735556" ], [ "this crime met the guidelines for a whole life term as it involved planning and resulted in the death of more than one person.\nAngus Sinclair, who had been imprisoned since 1982 for child abuse, was jailed for a minimum of 37 years in 2015. This means he will almost certainly die in prison as he was 69 by the time of his conviction for murdering two teenage girls in 1977. Many other life prisoners have received minimum terms which, due to their great length or the fact that the killer was middle aged or elderly when convicted, make it almost", "-23.01074902363689" ], [ "community. The indeterminate sentence must be reviewed by the court when the nominal sentence has expired and every three years afterward.\nThe minimum nominal sentence that can be imposed is ten years, but the sentencing judge can extend it if the prisoner's criminal history or the nature of the prisoner's offending warrants it.\nThe longest nominal sentence on one or more sentences of indefinite imprisonment is 30 years, currently being served by serial pedophile Geoffrey Robert Dobbs (Queensland), who pleaded guilty to 124 sex offences and one count of attempting to pervert the course of justice committed against 63 girls under his", "-22.970320559339598" ], [ "life sentences are still imposed in Germany for murder, although with the possibility of being released. The ruling does not mean that every convict has to be released, nor does the ruling mean that mandatory life sentences cannot be imposed, but that every convict must have a realistic chance for eventual release, provided they are considered safe to the community. It is at the discretion of the court to decide the length of the parole period, or if the offender is actually eligible for parole. If the convicted person is found not to be safe to the community, they either", "-22.961546029619058" ], [ "life and the death penalty was replaced by a prison term.", "-22.946946259136894" ], [ "custody by offenders serving life sentences can vary substantially. Mandatory sentence Life imprisonment is the mandatory sentence in Ireland for murder or treason. Possible sentence Life imprisonment is a possible sentence in Ireland for assault causing serious harm, possessing firearm or ammunition with intent to endanger life or cause serious injury, aggravated robbery, possession of controlled drugs with intent to supply, rape resulting in death or serious injury, and possession of drugs with intent to supply.", "-22.857166988556855" ], [ "rest of his or her life in prison), and it is possible to be freed before the safety period for serious health reasons.\nFrom 2011, the maximum penalty for persons who were under 16 years of age at the time of their crime is 20 years' imprisonment, with eligibility for parole in 10 years; life sentences are very rarely imposed to offenders between 16 and 18, the last being Mathieu Moulinas in June 2013 for raping and burning alive Agnès Marin two years earlier and the last before him was Patrick Dils in 1986 for stoning two children before being exonerated.", "-22.83593591486715" ], [ "paroled after serving at least 36 years, or 40 years if given more than one sentence. For those convicted of terrorism, there is no parole, and thus they will spend the rest of their lives in prison. In addition, they can be pardoned or have their sentence reduced by the President. Inmates sentenced to ordinary life imprisonment can be paroled after serving 30 years, or 36 years if given more than one sentence. However, parole is not mandatory, and if rejected, inmates can reapply every three years. All other people sentenced to terms of imprisonment can be paroled for good", "-22.81650684963097" ], [ "be an equivalency, the death penalty would have to punish a criminal who had warned his victim of the date at which he would inflict a horrible death on him and who, from that moment onward, had confined him at his mercy for months. Such a monster is not encountered in private life.\nIn the classic doctrine of natural rights as expounded by for instance Locke and Blackstone, on the other hand, it is an important idea that the right to life can be forfeited. As John Stuart Mill explained in a speech given in Parliament against an amendment to abolish", "-22.754041116073495" ], [ "terms for each crime committed.\nIt should also be mentioned that, according to the Portuguese Penal Code, only very rarely will a sentence of less than 5-years imprisonment be enforced. In fact, article 75, § 1, states that if an offence is punishable by a prison term or another non-detentive form of punishment, the court should opt for the non-detentive punishment \"if this punishment will satisfy adequately the objectives of the criminal law.\"\nTherefore, someone convicted to up to 5 years in prison will be put on probation or (if the sentence if for less than 3 years) will simply have the", "-22.741793935289024" ], [ "death penalty under all circumstances, replacing it with life imprisonment.", "-22.730991298885783" ], [ "we don't know when we will die, we get to think of life as an inexhaustible well. And yet everything happens only a certain number of times, and a very small number really. How many more times will you remember a certain afternoon of your childhood, an afternoon that is so deeply a part of your being that you can't even conceive of your life without it? Perhaps four, or five times more? Perhaps not even that. How many more times will you watch the full moon rise? Perhaps twenty. And yet it all seems limitless...\nThe quotation is not attributed", "-22.671802702199784" ], [ "life imprisonment without the eligibility of parole for 57 years. He must serve time for each of his convicted murders consecutively, with additional minor concurrently with the murder convictions.", "-22.666916090835002" ], [ "(or even many federal inmates)\n. Under current law, most juveniles and anyone sentenced to a term of imprisonment up to and including two years less a day will serve time in a provincial prison or reformatory (although they may be released far earlier due to overcrowding or a determination that further incarceration is unjustified). Controversially, the use of \"two years less a day\" sentences has been used by some judges to avoid mandatory sentences such as deportation, weapons prohibitions, prohibitions to entry to the USA, or harsh pardon ineligibility barriers.\nThe use of the terms \"prison\", \"correctional centre\", and \"reformatory\"", "-22.564005944263045" ], [ "was reviewed by the High Court of Justice with regard to the minimum term served before consideration for parole. On 19 December 2006 Mr. Justice Openshaw set the minimum term at 30 years. In his judgement he stated: \nI am anxious that this sentence is not misunderstood or misreported. The sentence is, and remains, a sentence of imprisonment for life. The defendant may not even be considered for release for this offence of murder until he has served at least 30 years. That is not to say that he will then be released, for the whole life term imposed for", "-22.56268656792963" ], [ "15 to 20 years before being paroled, although those convicted of exceptionally grave crimes remain behind bars for considerably longer; Ian Huntley was given a minimum term of 40 years. Some receive whole life sentences which make it almost certain that they will die in prison; they can only be considered for release on appeal to the High Court, or in exceptional circumstances such as great age or ill health.\nBy 2015, there were at least 60 prisoners in England and Wales serving such sentences, issued by either the High Court or the Home Office. These include \"Yorkshire Ripper\" Peter Sutcliffe.", "-22.440679392879247" ], [ "application is that it can only be applied by the Court of Appeal.\nThe doctrine of prospective overruling was also applied in the case of Abdul Nasir bin Amer Hamsah v. Public Prosecutor (1997). The Court of Appeal clarified that the sentence of life imprisonment did not mean imprisonment for 20 years as had been the understanding for some time, but rather imprisonment for the whole of the remaining period of a convicted person's natural life. However, if the judgment applied retrospectively, this would be unjust to accused persons already sentenced to life imprisonment as they would have been assured by", "-22.43937277083387" ], [ "poses a risk to society, that person may be detained in prison past the parole eligibility period. Any person released on parole from a term of life imprisonment or an indeterminate term of imprisonment must remain on parole, with conditions by the Parole Board, and are subject to electronic tagging for the remainder of their natural lives. Dangerous offender While life sentences are rare in non-murder cases, the courts may apply a dangerous offender designation in cases involving serious violent or sexual offences. Such a designation results in an indeterminate sentence with no maximum limit, but a parole review occurs", "-22.42697977943203" ], [ "is life with 40 years without parole. Statutes also provide no method of execution.", "-22.425258692688658" ], [ "behavior after they serve two-thirds of their sentence, or three-fourths if sentenced in cases of terrorism or sex crimes, in prison. However, parole is only possible if the inmate made no violations of prison rules. For those sentenced to less than one year in prison, they can be released after serving half the sentence.\nArticle 107 LES also provides that released prisoners are subject to a supervision period (tr: denetim süresi) that lasts half of the time spent in prison. Only after this period the sentence will count as being executed. Paragraph 16 of Article 107 LES provides that people convicted", "-22.394752365988097" ], [ "Life imprisonment in Ireland Life imprisonment (Irish: príosúnacht saoil) in the Republic of Ireland may last for the natural life of the convict. It is not necessarily \"life imprisonment\" in practice, as not all of the life sentence is generally served in prison custody. The granting of temporary or early release of life sentenced prisoners is a feature of the Irish prison system handled by the Minister for Justice and Equality.\nIn deciding on the release from prison of a prisoner sentenced to life imprisonment, the Minister will always consider the advice and recommendations of the Parole Board of Ireland. The", "-22.363356989168096" ], [ "was found to be erroneous. However, even though the decision to impose life instead of death was based on an erroneous interpretation of the law by the judge, the conclusion of life imprisonment in the original case constituted an acquittal of the death penalty and thus death could not be imposed upon a subsequent trial. Even though the acquittal of the death penalty was erroneous in that case, the acquittal must stand.\nDouble jeopardy also does not apply if the later charge is civil rather than criminal in nature, which involves a different legal standard (crimes must be proven beyond a", "-22.363337434930145" ], [ "in 1967 and was completely abolished nationwide in 1985, some jurisdictions replaced the death penalty with mandatory life imprisonment. Mandatory life imprisonment has since been abolished in Victoria in 1986, Tasmania in 1995 and Western Australia in 2008. \nNew South Wales also abolished mandatory life sentences in 1982, however in 2011 the Parliament of New South Wales passed legislation imposing a mandatory life imprisonment without parole sentence for the murder of a police officer. \nWhen the Australian Capital Territory abolished the death penalty in 1973, it was not replaced with mandatory life imprisonment for any offence. Even so, life imprisonment", "-22.341744370161905" ], [ "appeal by the prisoner to have the minimum term reduced.\nLife imprisonment has been the only option that judges have had when sentencing murderers since the death penalty was abolished in 1965. The average prisoner sentenced to life imprisonment spends 14 years behind bars. More serious cases, which included aggravating factors such as a rape or robbery, have led to murderers spending 20 or more years in prison. A few multiple murderers have remained in prison until their deaths; these include Myra Hindley and Ronnie Kray. An estimated 20 prisoners in Britain have been recommended for lifelong imprisonment; these include Mark", "-22.26177248314343" ], [ "ensure that, except in the case of murder, a life sentence is rarely imposed, even when the offender is found guilty for particularly grievous offences. One common exception is cases which involve terrorism-related conspiracies.\nAs of 2013, 4,800 offenders were serving life sentences in Canada, though only 2,880 (around 60%) were incarcerated (the remainder being on parole). The vast majority of these offenders (about 96%) were serving their sentences for murder. \"Lifers\" constituted 23% of the federal offender population.\nThere is no guarantee that parole will be granted to an offender. If the Parole Board of Canada determines that an offender still", "-22.23730090450772" ], [ "can get a postponement up to one year. A sentence of imprisonment can, in certain cases, be enforced by the Prison and Probation Service with the use of an ankle monitor outside the institution.\nPrison sentences may not be less than 14 days and may not exceed ten years (18 years for some offences) or life imprisonment. A person sentenced to life imprisonment can apply for a determined sentence at the Örebro Lower Court. A prisoner has to serve at least 10 years in prison before applying and the set sentence cannot be under 18 years. However, some prisoners may never", "-22.19881127429835" ], [ "Life imprisonment United States In 2011, the Supreme Court of the United States ruled that sentencing minors to life without parole, automatically (as the result of a statute) or as the result of a judicial decision, for crimes other than intentional homicide, violated the Eighth Amendment's ban on \"cruel and unusual punishments\", in the case of Graham v. Florida.\nGraham v. Florida was a significant case in juvenile justice. In Jacksonville, Florida, Terrence J. Graham tried to rob a restaurant along with three adolescent accomplices. During the robbery, one of Graham's accomplices had a metal bar that he used to hit", "-22.192885923832364" ], [ "time passed, it came to be thought that longer sentences should be imposed, especially in cases such as the Moors Murders, the Yorkshire Ripper and Dennis Nilsen. The Home Secretary (and now the Minister for Justice) was empowered to make Whole Life Orders to ensure that particularly dangerous or heinous criminals were never released. Currently, mandatory lifers serve an average of 14 years and for other lifers the average has been in decline and now stands at nine years. The Criminal Justice Act 2003 Formerly, the Home Secretary reserved the right to set the \"tariff\" or minimum length of", "-22.192846295132767" ], [ "offender poses a serious threat to the community. The indeterminate sentence(s) must be reviewed by the court when the nominal sentence (the minimum term the offender would have been required to serve if they were not dangerous) has expired, and every three years after.\nThe minimum nominal sentence that can be imposed is ten years, but the sentencing judge can extend this if they believe that the prisoner's criminal history and/or the nature of the prisoner's offending warrants it.\nThe longest nominal sentence on sentence(s) of indeterminate imprisonment is 30 years, currently being served by serial pedophile Geoffrey Robert Dobbs (Queensland), who", "-22.105775100506435" ], [ "five other people received sentences that ranged from four to 12 years.", "-22.09124693569538" ], [ "life sentences in Germany were imposed without the possibility of parole (though pardons were sometimes granted). In 1977, the German Constitutional Court found that mandatory sentences of life imprisonment without the possibility of parole are unconstitutional because the respect of human dignity requires a \"realistic prospect of being released\", and the principle of the Rechtsstaat requires a legal regulation for when a prisoner is released. The imposition of life sentences was thus found constitutional, as long as the laws allow for a parole. As a consequence, §57a StGB was introduced in 1981, allowing parole even for life imprisonment.\nIn consequence, mandatory", "-21.98972284917545" ], [ "peace.\nUnder the Finnish criminal code of 1889, life imprisonment consisted of at least 12 years of imprisonment after which the convict was conditionally released and remained on probation for the rest of their life. After 1931, release was by presidential pardon and the probationary period was eight years. Today, those sentenced to life imprisonment may be considered for parole after 12 years and most are released after serving between 12 and 15 years.\nSince 2006, Helsinki Court of Appeals (Helsingin hovioikeus) has acted as Parole Board and a life prisoner is considered for parole after serving 12 years. If the parole", "-21.968877841281937" ], [ "some other determinate or indeterminate sentence based upon the number of murders, the evidence presented, and any aggravating or mitigating circumstances present. Such a compounded sentence may be tailored to run consecutively, with one sentence beginning after completion of another, or concurrently, where all or most of several sentences is served together.\nBelow are several examples of how a murderer may be sentenced, by state: Arizona In Arizona, a person is guilty of murder if an offender knowingly and intentionally causes the death of a person or an unborn child. The murder must be premeditated. If an individual is found guilty", "-21.951641865598504" ], [ "the length of sentences was contrary to the doctrine of separation of powers fundamental to the Westminster system of government. According to this principle, sentencing in each particular case is a function of the judiciary, and cannot be assigned to any other body. The 1976 amendment eliminated the review board entirely, leaving life imprisonment without review as the only possible sentence.\nAnother case, Trevor Stone v. the Queen, challenged the denial of jury trial for most gun offences. It was argued that trial by jury is a fundamental and constitutional right guaranteed by tradition in English common law.", "-21.904892565964474" ], [ "But the sentence is still 'life' and there is no guarantee they will ever get out. Former Board chairman, Sir David Carruthers says murderers and those given indefinite sentences will remain behind bars until they are no longer considered a risk to the community. If they are released, they remain subject to release conditions for the rest of their life and can be recalled if they break their conditions in any way. Parole conditions Having served the minimum non-parole period of their sentence, if the Board feels that an offender no longer poses an undue risk, it may agree to", "-21.883946812666636" ], [ "eligible for parole. Such a long length was due to his involvement in multiple killings, lack of remorse, and his affiliation with a terrorist group.\nIn another case, a court ruled the defendant had to serve at least 38 years in prison for the killings of five people. He was incarcerated beyond the required 38 years after it was determined he was a danger to society. Such a ruling mandates continued imprisonment de jure, as being safe toward society is required to be paroled from a life sentence (§ 57a I Nr. 3 StGB in conjunction with § 57 I Nr.", "-21.880902642991714" ], [ "Such individuals will not receive parole unless they can demonstrate they no longer pose a threat to the community.\nPreventive detention has a minimum period of imprisonment of five years, but the sentencing judge can extend that if the nature of the prisoner's offending or the prisoner's criminal history warrants it.\nThe longest minimum period of imprisonment on a sentence of preventive detention is one of 28 years, which was given in 1984. England and Wales Imprisonment for public protection was a form of indefinite sentence that was used in England and Wales from 2005 until 2012, in addition to the traditional", "-21.876239947865542" ], [ "a day, judges can offer defendants a chance at parole. In the United States federal system, only sentences exceeding one year allow prisoners to obtain early release for good time while incarcerated. As a result, a sentence of a year and a day can lead to less time served than a sentence of a year.", "-21.869552687057876" ], [ "are both sentenced to two years in prison; (b) A betrays B, which sets A free and B is sentenced to four years in prison; (c) B betrays A, with the same result as (b) except that it is B who is set free and the other spends four years in jail; (d) both remain silent, resulting in a six-month sentence each. Clearly (d) (\"cooperation\") is the best mutual strategy, but from the point of view of the individual betrayal is unbeatable (resulting in being set free, or getting only a two-year sentence). Remaining silent results in a four-year or", "-21.852180817753833" ], [ "the second, was appropriate. Since the two offences had been closely linked in time and circumstance, the sentences should run concurrently.\nThe appeal was thus upheld: The sentence of fifteen years' imprisonment was set aside and replaced with one of seven years' and four years' imprisonment, running concurrently.", "-21.847520704002818" ], [ "Life imprisonment in England and Wales History When Parliament was considering abolition of the death penalty, there were many MPs who were against the reform, and the deal offered was that former capital offences would always inevitably merit a mandatory life sentence. Accordingly, life imprisonment replaced the death penalty as punishment for murderers, firstly for those whose sentences were commuted and later for those whose crimes were not \"aggravated\" within the meaning of the Homicide Act 1957. To begin with, it was fairly common for those sentenced to life to be released in around ten to fifteen years. As", "-21.82263874752971" ], [ "Andrew Aston Andrew Simon Aston(born 22 November 1972 in Birmingham, Warwickshire, England) is a convicted British murderer who has the distinction of having received the longest prison sentence ever handed down in England and Wales - 26 concurrent terms of life imprisonment.\nOver a period of three months in early 2001, Aston, a cocaine addict, attacked 26 elderly and disabled people in robberies at their homes in Birmingham and parts of neighbouring Sandwell. Two of the victims died as a result of their injuries; 87-year-old George Dale, who died in hospital two weeks after being attacked at his Ladywood home on", "-21.771864939903026" ], [ "raise a life sentence to death. Ultimately, a five-member petty bench of the Supreme Court has the final say on the penalty, Article 411 of Code of Criminal Procedure allowing it to remand the case or change the punishment if the one handed down by the high court is \"seriously unfair\".\nIn only three cases since 1945, the Supreme Court ruled a high court-imposed life sentence too lenient, and ordered a retrial for death sentence. Among them are Norio Nagayama and Takayuki Fukuda, both under 20 at time of crime. The third case was that of a man convicted of murdering", "-21.76696468674345" ], [ "which are all punishable by life imprisonment.\nAttempted murder by other means not specified in the statute (§ 14) shall be liable to imprisonment for life.", "-21.763229197011242" ], [ "Gerald Ford in 1976 or 1977, and he may have died a free man in Palm Beach, Florida, in 2004.\nDespite the Schick opinion's lack of thorough analysis on life imprisonment without a chance of parole, an imposing amount of precedent has developed based upon it. After Furman v. Georgia, the constitutionality of the death penalty in question as life imprisonment without parole received increased attention from lawmakers and judges, as an alternative to the death penalty.\nSuch penalties predate Schick. One early American case was Ex Parte Wells, who was convicted of murder in 1851 and sentenced to be hanged. On", "-21.754718272601167" ], [ "of murder, there are three possible sentences: 35 years to life, life without parole, or the death penalty. Florida In Florida, a person is guilty of first degree murder when it is perpetrated from a premeditated design to result in the death of a human being. Murder is categorized as a capital offense; if convicted, the offender will receive either the death penalty or life in prison without parole. A unanimous vote of a twelve-person jury, is required to sentence a person to death if they are convicted of capital murder. Hawaii In Hawaii, a person is found guilty of", "-21.739837617453304" ], [ "with its mandatory nature. Life without parole is the second most severe sentence known to American law, after the death penalty. Yet Harmelin's crime was more severe than the crime at issue in Solem. In Solem, the Court struck down a life-without-parole sentence imposed for the crime of uttering a no-account check; Harmelin, however, was convicted of possessing 650 grams of cocaine. Uttering is \"one of the most passive felonies a person could commit.\" The illegal drug trade, by contrast, begets a tremendous amount of violence. In view of these observations, a legislature could rationally conclude that a life sentence", "-21.737867026749882" ], [ "harm is caused. The last reason the death penalty can be inflicted is if murder is committed during a robbery by a gang. All of the cases, in which one can be sentenced to death, are those in which death has resulted or was likely to result. For all seven of these cases, there is the alternative of lifetime imprisonment. Today, attempts are made to find mitigating and extenuating factors so that the lesser punishment is inflicted. It was commanded that the King should avoid capital punishment and instead detain, imprison and repress offenders.\nThere are some main differences between the", "-21.73187852639967" ], [ "which is committed in consequence thereof. The death penalty is also prescribed when someone gives false evidence that results in the defendant being convicted of the crime, sentenced to death and the punishment being carried out. The fourth reason someone can be sentenced to death is murder, under the notion of an eye for an eye. Again, the death penalty is allowed for someone who encourages the suicide of a minor, someone who is insane or a person who is intoxicated. The sixth reason a person can be sentenced to death is if a convict attempts to commit murder and", "-21.730783922424052" ], [ "overlong prison terms and 32 death sentences.", "-21.693150409902046" ], [ "who causes death to a person during or resulting from his or her flight, is guilty of a felony and, upon conviction thereof, shall be imprisoned in a state correctional facility for not less than five nor more than fifteen years. A person imprisoned pursuant to this subsection is not eligible for parole prior to having served a minimum of three years of his or her sentence or the minimum period required by section thirteen, article twelve, chapter sixty-two of this code, whichever is greater. (j) A person who intentionally flees or attempts to flee in a vehicle from a", "-21.677807373847827" ], [ "in Turkey is considered to be of an indefinite length. Article 47 TPC states that aggravated life imprisonment will last for a whole life.\nThe Law 5275 on the Execution of Sentences provides that prisoners sentenced to aggravated life imprisonment are held in rooms for one person and are allowed one hour of open air or sports per day. Under subparagraph c), prisoners serving aggravated life imprisonment may have their daily one-hour open-air exercise and sports period extended and may be allowed to engage in limited contact with prisoners accommodated in the same unit, depending on the risk factors, security requirements", "-21.67152669206189" ], [ "Time served In criminal law, \"time served\" describes a sentence where the defendant is credited immediately after the guilty verdict with the time spent in remand awaiting trial. The time is usually subtracted from the sentence, with only the balance being served after the verdict. For example, the final verdict in the trial of Louise Woodward was that she was guilty, and her sentence was \"time served\" (in her case, 279 days). In this case, this meant she was immediately released.\nIn some cases, time served may earn credit at a different rate than regular incarceration. For example, the defendant may", "-21.65628886988725" ], [ "at least 25 years before being eligible for parole. If the murder was committed because of the victim’s race, religion, or gender, the convicted will be sentenced to life in prison without the possibility of parole.\nA person convicted of second-degree murder in California will face a sentence of 15 years-to-life in prison, and thus must serve at least 15 years in prison before being eligible for parole.\nPunishments are increased if the murder victim was a peace officer, or was killed during a drive-by shooting.\nIf a gun was used during the murder, the punishment will include an additional 10, 20, or", "-21.610243439639817" ], [ "8th Amendment’s prohibition on cruel and unusual punishments\". \"Mandatory life without parole for a juvenile precludes consideration of his chronological age and its hallmark features – among them, immaturity, impetuosity, and failure to appreciate risks and consequences,\" Justice Kagan said. \"It prevents taking into account the family and home environment that surrounds him – and from which he cannot usually extricate himself – no matter how brutal or dysfunctional.\" Dissents Chief Justice John Roberts voiced in his dissent the opinion that mandatory life sentences \"could not plausibly be described\" as unusual when a majority of states endorse them. He wrote:", "-21.570138275652425" ], [ "or innocence and, simultaneously, determine whether the defendant would be punished by death or life imprisonment, was in violation of the Eighth Amendment to the United States Constitution.", "-21.52808783954515" ], [ "a life convicted person is eligible for parole is up to the prison complex after 25 years has been served, and release eligibility depends on the prospect of rehabilitation and how likely it is he or she will re offend or not. \nIn South and Central America, Honduras, Nicaragua, El Salvador, Costa Rica, Venezuela, Colombia, Uruguay, Bolivia, Ecuador, and the Dominican Republic have all abolished life imprisonment. The maximum sentence is 75 years in El Salvador, 60 years in Colombia, 50 years in Costa Rica and Panama, 40 years in Honduras, 25 years in Ecuador, 30 years in Nicaragua, Bolivia,", "-21.5163442005869" ], [ "Life imprisonment in Germany In Germany, a prisoner sentenced to life imprisonment (lebenslange Freiheitsstrafe) normally may apply for parole after having served 15 years. If the parole court rejects the application, the inmate may reapply after a court determined blocking period no longer than two years (§ 57a IV StGB). If the court has determined a \"severe gravity of guilt\" exists (besondere Schwere der Schuld), parole is delayed for a non-specific period beyond 15 years (§ 57a StGB).\nIn declining a prisoner's first application for parole, the parole court determines a lack of suitability based on the extreme gravity of the", "-21.494112388871145" ], [ "a longer sentence compared to an individual who is given the same sentence without a lengthy period of pre-sentencing incarceration. Arbour also points out that pre-sentence incarceration is typically served in detention, in harsher circumstances than the sentence will ultimately call for and without access to educational, rehabilitative and vocational programs.\nBill C-25 creates three changes in the Criminal Code; now under s.719(3), generally the maximum credit a judge can give is 1:1. Under s.719(3.1) and 719(3.2) a judge can give a credit of 1.5:1 only \"if the circumstances justify it.\" Under s.719(3.1), the sentencing judge cannot give greater than 1:1", "-21.491405010820017" ], [ "from imprisonment on a sentence of sixty days or more or while in imprisonment or escape status on such a sentence, except that if 2 points are added committing the offense while under a criminal justice sentence, adding only 1 point for this item; and adding 1 point for each prior sentence resulting from a conviction of a crime of violence that did not receive any points because such sentence was counted as a single sentence, up to a total of 3 points for this item.\nThe guidelines require \"counting prior adult diversionary dispositions if they involved a judicial determination of", "-21.472980574006215" ], [ "for persons convicted of murder?\"' This question assumes that the person's only point of view in the situation is that a person who is convicted must either get the death penalty or not. The second type of presumptuous question is balanced question. This is when the interrogator uses opposite questions to make the witness believe that the question is balanced when the reality is that it is not. For example, the interrogator would ask, \"'Do you favor life in prison, without the possibility of parole?\"' This type of question may seem balanced when in reality it is still influencing", "-21.4598452643404" ] ]
4ji8ef
Why are some animals tasty and some not? Would we be tasty if prepared properly?
[ "In terms of meat I would imagine it's down to the consistency and texture of the cut as well as the amount of fat to be found. Human beings may or may not be delicious, depending on whether or not you're a fan of veal. [William Seabrook]( URL_0 ) was a guy from about a hundred years ago who got to try out some human meat while on a trip to Guinea. He had this so say: \"It was like good, fully developed veal, not young, but not yet beef. It was very definitely like that, and it was not like any other meat I had ever tasted. It was so nearly like good, fully developed veal that I think no person with a palate of ordinary, normal sensitiveness could distinguish it from veal. It was mild, good meat with no other sharply defined or highly characteristic taste such as for instance, goat, high game, and pork have. The steak was slightly tougher than prime veal, a little stringy, but not too tough or stringy to be agreeably edible. The roast, from which I cut and ate a central slice, was tender, and in color, texture, smell as well as taste, strengthened my certainty that of all the meats we habitually know, veal is the one meat to which this meat is accurately comparable.\" Veal is really tender and flavourful and fatty, so if you've got taste buds like most of the rest of us, you'd probably find TASTING your BUD to be a pretty yummy experience.", "I've eaten a ton of non-traditional animals including bear and lion. You know how when you get some spicy food the smell comes out of your pores? Animals eat stuff that is way more \"flavorful\" shall we say than curry so you would never want to eat vulture or possum. Some animals (a lot) have a natural \"gaminess\" and this is just species-dependent. Like elk, it is gamey but it just eats the same thing a cow might eat. Other animals have tasty parts but are by and large too lean and tough to eat (horse is a good example). Some animals like bear and wild boar are far too parasite-ridden to \"prepare properly\" (from a culinary, not safety standpoint). People taste like pork apparently.", "Which animals are not tasty? I'm pretty sure that's entirely a matter of personal preference and you could find someone who enjoys any kind of meat.", "I remember reading, years ago, that lions in Kenya etc. developed a taste for human flesh because we're saltier than their typical prey. If that's true, then how we taste would depend on how much salt you like in your food.", "Taste is subjective. What one person finds tasty, another finds disgusting and vice-versa. Assuming it is fresh meat from a healthy animal, that is not toxic, odds are good someone, somewhere finds it delicious. There are people who would tell you that guinea pigs are the single most delectable meat there is. I've had some things that a lot of other people haven't tried. I can tell you the animals diet makes quite an impact, as does how active they are. Some are stringy, sinewy, and the texture is just unpleasant. Some are succulent and juicy but have a very irony, liver-y taste that I find unappealing. Then again, others will disagree. As far as human flesh, there are those who say it is quite tasty. I haven't eaten any, so I cannot say...but I'm thinking there's a reason human meat is referred to as \"long pig\".", "There is a video out there where these two men have parts of their body surgically removed like a small chunk of skin from their butt or leg and prepared for the other person to eat. It was conducted on live television in some European country either Sweden or Switzerland. I am not really sure about the country to be honest. Both of the men said that it tasted good." ]
[ [ "frequently supplement their diet of small animals with whatever fruits happen to be available. Because of dogs' dislike of bitter tastes, various sprays, and gels have been designed to keep dogs from chewing on furniture or other objects. Dogs also have taste buds that are tuned for water, which is something they share with other carnivores but is not found in humans. This taste sense is found at the tip of the dog's tongue, which is the part of the tongue that he curls to lap water. This area responds to water at all times, but when the dog has", "-32.79267957346747" ], [ "rib cage.\nAdditional differences include the fact that Tenctonese bodies do not assimilate the nutrients of food if it has been cooked. Their main diet consist of raw animal flesh such as uncooked small mammals (weasel, beaver, muskrat), organs (spleen, pancreas), molluscs and insects and raw vegetables. Drinking sour milk affects them in the same way that humans are intoxicated by alcohol. Rather than blush, the eyes of the Tenctonese change color with embarrassment. Instead of getting tense around the neck when they feel stress, their feet swell. Tenctonese ears look more like slits or holes in the sides of their", "-31.71463955397485" ], [ "feral cats and house cats consume several small meals in a day. The frequency and size of meals varies between individuals. They select food based on its temperature, smell and texture; they dislike chilled foods and respond most strongly to moist foods rich in amino acids, which are similar to meat. Cats reject novel flavors (a response termed neophobia) and learn quickly to avoid foods that have tasted unpleasant in the past. They also avoid sweet food and milk. Most adult cats are lactose intolerant; the sugar in milk are not easily digested and may cause soft stools or diarrhea.", "-31.649933438689914" ], [ "the animals and the molasses has the ability to cover undesirable flavors that can be associated with some other chemicals added to the block. This gives the block the ability to contain high levels of unpalatable feedstuffs like urea. Urea is a cheap source of nitrogen, in comparison with other sources, and adding urea to the molasses blocks will reduce the cost of supplementation programs. Medicated blocks In tropical countries, inadequate nutrition and gastro-intestinal nematodes are amongst the commonest problems, particularly in sheep and goats. Molasses, urea and other components are used for producing molasses/urea feeds (blocks, pastes or licks).", "-31.607080024507013" ], [ "entries are mugwort, cypress, mandrake root, grapes, chamomile, muscat, and marrubium (horehound). Animals recommended for their medicinal value include hare, fox (fox grease is recommended for muscle cramps), goat, ox, elephant ivory, and beaver. Some of the minerals and liquids listed are lyme, glass, magnets, pearls, amber, sulpher, water, and vinegar. Foods that double as remedies are also present, with cheese prescribed for purgation, butter, honey, and zipules (a type of heavy fritter) recommended for toothaches. Some of the entries feature truly unusual remedies, such as a lengthy section on the use of mummy (spelled as mommie), the powdered version", "-31.519857558501826" ], [ "dietary omega-3 and -6 fatty acids, particularly EPA, DHA, and arachidonic acid, along with antioxidants such as beta-carotene and vitamin B12, may aid in the prevention of decline of cognitive function, and slow the progression of symptoms.\nSenior cats tend to become particularly picky with their food as a reduced ability to taste and smell is associated with age, therefore, palatability is an important factor to consider. Cats have shown a preference in studies for diets with a higher protein content regardless of the flavouring of the food. Additionally, cats are unable to effectively regulate their water intake, and", "-31.44905475631822" ], [ "world, such as in China, expectoration is more socially acceptable (even if officially disapproved of or illegal), and spittoons are still a common appearance in some cultures. Some animals, including humans in some cases, use spitting as an automatic defensive maneuver. Camels are well known for doing this, though most domestic camels are trained not to. Glue to construct bird nests Many birds in the swift family, Apodidae, produce a viscous saliva during nesting season to glue together materials to construct a nest. Two species of swifts in the genus Aerodramus build their nests using only their saliva, the base", "-31.352822642424144" ], [ "popular pets, though they require extensive exercise and dental care, due to their teeth continually growing throughout their life span, and since they lack the ability to sweat, they require a temperature-controlled environment.\nThe animals instinctively clean their fur by taking dust baths, in which they roll around in special dust made of fine pumice, a few times a week; they do not bathe in water. Their thick fur resists parasites, such as fleas, and reduces loose dander. In scientific research Chinchillas have been used in research since the 1950s. Since the 1970s, the prime interest in chinchillas by researchers is", "-31.279793226567563" ], [ "Jerky Preparation Jerky is made from domesticated animals as well as game animals. Jerky from domesticated animals includes beef, pork, goat and mutton or lamb and game animals such as deer, kudu, springbok, kangaroo, and bison are also used. Recently, other animals such as turkey, ostrich, salmon, alligator, crocodile, tuna, emu, horse, camel, and earthworm have entered the market.\nMost fat must be trimmed from the meat prior to drying, as fat does not dry and thus increases the chances of spoilage (modern vacuum packing and chemical preservatives have served to help prevent these risks). The meat must be dried quickly", "-31.266084339986264" ], [ "Animals may preferentially select acorns that contain fewer tannins. When the tannins are metabolized in cattle, the tannic acid produced can cause ulceration and kidney failure.\nAnimals that cache acorns, such as jays and squirrels, may wait to consume some of these acorns until sufficient groundwater has percolated through them to leach out the tannins. Other animals buffer their acorn diet with other foods. Many insects, birds, and mammals metabolize tannins with fewer ill effects than do humans.\nSpecies of acorn that contain large amounts of tannins are very bitter, astringent, and potentially irritating if eaten raw. This is particularly true of", "-31.246659417374758" ], [ "ingredients used to formulate raw diets can vary. Some pet owners choose to make home-made raw diets to feed their animals but commercial raw food diets are also available.\nThe practice of feeding raw diets has raised some concerns due to the risk of food borne illnesses, zoonosis and nutritional imbalances. People who feed their dogs raw food do so for a multitude of reasons, including but not limited to: culture, beliefs surrounding health, nutrition and what is perceived to be more natural for their pets. Feeding raw food can be perceived as allowing the pet to stay in touch with", "-31.13154145696535" ], [ "feeders. Increased growth rates, vigour and stress resistance among animals cultivated on such diets have been reported. DMS, is responsible for repellent, 'off' tastes and odours that develop in some seafood products because of the action of bacterial DMSP-lyase, which cogenerates acrylate.", "-31.107448344264412" ], [ "made because of their taste, but for their nutritional advantages as well. For example, \"Palu\" is good for acidity and gas problems, (\"Bhatmaas\") reduces the risk of heart diseases, Mustard Oil, used in making (\"Chhwela\"), helps in killing germs and (\"Saag\") is a good source of protein.", "-31.00068035660661" ], [ "and water, analyzing the chemicals found, and determining the presence of prey or predators in the local environment. \nCommunication: Dogs and cats use licking both to clean and to show affection among themselves or to humans, typically licking their faces. Many animals use licking as a submissive or appeasement signal in dominance hierarchies.\nThermoregulation: Some animals use licking to cool themselves. Cats do not sweat the way humans do and the saliva deposited by licking provides a similar means of evaporative cooling. Some animals spread saliva over areas of the body with little or no fur", "-30.972181039862335" ], [ "animal poisonous. Primates Several primate species self-anoint with various items such as millipedes, leaves and fruit. They sometimes drool while doing this. Both capuchin monkeys and squirrel monkeys perform urine washing, when they deposit a small quantity of urine onto the palm of a hand and then rub it on the sole of the opposite foot. It is thought to have multiple functions including hygiene, thermoregulation and response to irritation from biting ectoparasites (such as ticks and botfly). Some strepsirrhines and New World monkeys also self-anoint the body with urine to communicate. Capuchins Wild wedge-capped capuchin monkeys (Cebus", "-30.91084054391831" ], [ "unique texture—a gelatinous rather chewy soft texture of its tendons and skin, and also a rich broth produced from its bones. Nevertheless, to acquire a pleasant soft texture, a prolonged time of cooking, or pressure cooker might be employed in the process, this will extract the gelatins out of the trotters into the soup. \nTraditionally, in Western cuisine, the trotters are not commonly consumed, and not included in common cut of beef, which only recognize shanks. Nevertheless, the cut is often included as part of beef shank. \nIn Indonesian cuisine, cow's trotters is considered as a delicacy. The gulai tunjang", "-30.55605055597144" ], [ "than compromised. According to the International Water Management Institute and UNEP, well-managed agroecosystems not only provide food, fiber and animal products, they also provide services such as flood mitigation, groundwater recharge, erosion control and habitats for plants, birds, fish and other animals. Taste perception Animals, specifically humans, have five different types of tastes: sweet, sour, salty, bitter, and umami. As animals have evolved, the tastes that provide the most energy (sugar and fats) are the most pleasant to eat while others, such as bitter, are not enjoyable. Water, while important for survival, has no taste. Fats, on the other hand,", "-30.550281299074413" ], [ "animal with positive feedback from the licking, and subsequent addiction to the behaviour.\nAnimals in captivity sometimes develop a licking stereotypy during which surfaces (walls, bars, gates, etc.) are repeatedly licked for no apparent reason. This has been observed in captive giraffes and camels.", "-30.475510727032088" ], [ "animal are also used along with plant parts.\nThey use a stone slab to grind their medicine, because they believe the heat created by an electric grinder would degrade the active principles of the plant powder, reducing its quality. Powdered ingredients are then mixed with water. Sufficient amount of additives are also added. Plant parts are commonly prepared using water, hot or cold, as the solvent (100 species), but occasionally remedies are prepared with milk (14 species), honey (2), jaggery or Indian cane sugar (2), ghee or Indian clarified butter (2) and oil (1) in preparing pills in round or rectangular", "-30.440831561456434" ], [ "and chip shops as rock salmon, rock eel, huss or sweet william. In other parts of its range it is occasionally baked or used in fish soup. Its hard skin has been used as a substitute for pumice, but the fact that catsharks have to be skinned before they can be filleted discourages commercial fishermen from catching this species.", "-30.428007915892522" ], [ "each other's body parts for grooming and sex and licking rocks for salt. Gorillas use licking in addition to other senses to determine the nature of an object. In humans Compared to most other mammals, licking has a minor role for humans. The human tongue is relatively short and inflexible, and is not well adapted for either grooming or drinking. Instead, humans prefer to wash themselves using their hands and drink by sucking fluid into their mouth. Humans have much less hair over their skin than most other mammals, and much of that hair is in places which they cannot", "-30.385655549820513" ], [ "for example, overstunning leads to bone fractures and/or electrocution which prevents bleeding of the animal. This negatively affects the quality of the meat, and therefore understunning is an attractive practice for slaughterhouses.\nIn the Netherlands, for example, the law states that poultry must be stunned for 4 seconds minimum with an average current of 100 mA, which leads to systematic understunning.\nThe CrustaStun is a device designed to administer a lethal electric shock to shellfish (such as lobsters, crabs, and crayfish) before cooking. This avoids boiling a live shellfish which may be able to experience pain in a way similar to", "-30.36973015521653" ], [ "chicks to avoid them chilling. Many animals drink by licking. While young mammals drink milk from their mothers' teats by sucking, the typical method of drinking for adult mammals involves dipping the tongue repeatedly into water and using it to scoop water into the mouth. This method of drinking relies in part on the water adhering to the surface of the tongue and in part on muscular control of the tongue to form it into a spoonlike shape. Cattle, horses and other animals lick rocks, salt licks or other objects to obtain mineral nutrients.\nGustation: Animals also use", "-30.346764263580553" ], [ "regulations) has become available. (The status of shellac is controversial.) The prohibitions also extend to certain parts of pure animals, such as blood, certain fat tissues, and the sciatic nerves. Finally, it is forbidden to cook the meat of an animal in the milk or dairy product of that same animal, which has in turn led to the traditional practice of using separate complete sets of kitchen utensils for meat and dairy so as to totally ensure this rule is not broken. Classification of animals The Torah does not classify animals under modern scientific categories of mammals, fish, reptiles and", "-30.204526031157002" ], [ "upset the heifer or cow's stomach. Beet pulp can be offered as a filler to give the animal a bigger body appearance. If the animal will eat the beet pulp dry this is the preferred way for them to eat it since they will eat more of it before they become full. Bedding should be monitored and should be changed whenever is needed to keep the animal clean and dry. Animals should not be tied with show halters for long periods since pressure from the chain shank will be applied to the cow's chin and will cause irritation. ", "-30.204044436199183" ], [ "pressure), and hypoalbuminemia (low serum albumin). Prevention of struvite stones is with a similar diet with milder restrictions.\nCertain dog breeds are predisposed to struvite stones, including Miniature Schnauzers, Bichon Frises, and Cocker Spaniels. They are the most commonly reported bladder stone in female dogs and in ferrets (pregnant ferrets may be especially predisposed). For frequency in cats, see below. Calcium oxalate stones Calcium oxalate stones form in an acidic to neutral urine. Two types naturally occur, calcium oxalate monohydrate, or whewellite (CaC₂O₄·H₂O), and calcium oxalate dihydrate, or weddellite (CaC₂O₄·2H₂O). Their appearance can be rough, smooth,", "-30.198916927169194" ], [ "texture when cooked causes it to squeak on the teeth when being chewed.\nTraditional halloumi is made from unpasteurised sheep and goat milk. Many people also like halloumi that has been aged; kept in its brine, it is much drier, much stronger and much saltier, making it very different from the milder halloumi generally used in the West.", "-30.124751950148493" ], [ "Additionally, certain ingredients can be combined to create a palatable flavour. An example is the synergistic combination of hydrolyzed vegetable protein and xylose, as well as a combination of substances derived from glucose, garlic powder, and nature-identical, non-meat chicken flavouring. The temperature of the food can also be a factor, as warmer food has an increased palatability. Alternative sourcing of ingredients Due to the exclusion of animal products and by-products which are the primary ingredients of conventional dog food, many nutrients that would otherwise be provided by animal products need to be provided by replacement, plant-based ingredients. While both animal", "-30.121425511912093" ], [ "a hidden camera to film cooks beating cats with a wooden stick, dumping them into a fur-removal machine, and then boiling them. The footage included a cook claiming that worse treatment of the cats improved the taste, claiming that \"the blood gets into the meat and tastes delicious\".\nPictures have also circulated featuring two dogs in boiling water in China. It is claimed that this is because some locals prefer the taste of adrenaline-soaked meat. Growing publicity around such incidents, as well as increasing pet ownership, has led to disapproval of the dog and cat meat trade amongst most surveyed Chinese,", "-30.106570220013964" ], [ "most will bark when confronted with strange situations, and some will bay (also referred to as \"speaking\", \"giving tongue\", or \"opening\") when they catch the scent of potential quarry. They also generally get along well with cats and other dogs. They are not too demanding with regard to exercise; their inbred stamina means they do not easily tire when exercised, but they also do not need to be worked to exhaustion before they will rest. Regular exercise helps ward off the weight gain to which the breed is prone. Health The typical longevity of beagles is 12–15 years, which is", "-30.100644950580318" ], [ "groups.\nIn a conversation with Boulder Weekly newspaper Colorado State University Professor of Animal Science Temple Grandin, an expert on animal welfare, described harmful effects of ractopamine on feedlot animals, such as cattle with stiff, sore, and lame limbs, and increased heat stress. In the same column she also opines that meat from ractopamine-treated animals may be tougher.\nRactopamine use is a factor in the development of downer pigs, animals that are unable to move or stand. \nWhen a winning show lamb tested positive for ractopamine in 2014, the owner claimed it was due to negligent feed contamination by the manufacturer, rather", "-30.083910163899418" ], [ "rid of unwanted contents (perhaps developed as a way to reduce exposure to toxins).\nOther animals, such as rabbits and rodents, practise coprophagia behaviours – eating specialised faeces in order to re-digest food, especially in the case of roughage. Capybara, rabbits, hamsters and other related species do not have a complex digestive system as do, for example, ruminants. Instead they extract more nutrition from grass by giving their food a second pass through the gut. Soft faecal pellets of partially digested food are excreted and generally consumed immediately. They also produce normal droppings, which are not eaten.\nYoung elephants, pandas, koalas, and", "-30.081235932406344" ], [ "dog DNA but Nutro's two samples tested positive for the drug, presumably from rendered cattle. The CVM stated that due to the low level of exposure, the risk of adverse effects is low.\nIn March 2007 Nutro was listed as a company affected by the Menu Foods recall.\nIn April 2008, consumeraffairs.com reported multiple cases of diarrhea, vomiting and other intestinal problems in pets fed Nutro products. Nutro stated that their products undergo rigorous safety testing and are 100% safe. Some customers have backed the company, saying that their pets are not having any problems with the food. Veterinarians interviewed stated that", "-30.069163840278634" ], [ "found that Warmbloods were also more likely to perform this behaviour when compared to other breeds. It was also found that the descendants of a crib-biter were more likely to perform the behaviour due to a genetic component.\nGastrointestinal environment and feeding routines were also a crucial topic, hinting that perhaps grain concentrations, grain ratios and forages were the main cause of ulcers, causing the animal to perform the oral stereotypy as a method of comfort. Horses that were unable to partake in a feeding behaviour that it wants to partake in would influence cribbing. Since the animal is unable to", "-30.055033671029378" ], [ "such as pneumonia, dystocia, bone decalcification, vitamin deficiency, gastroenteritis, and prolapses.\nPet owners must avoid using small objects as decoration in their tank, because they tend to eat everything they can. Such small objects, such as pebbles and plastic decorations, may lead to gut impaction, which is very likely to require surgical intervention.\nDespite being very hardy, they may have rachitis, a disease that makes the shell soft due to protein deficiency. It may be corrected by adding protein to meals, especially through fish.\nPlacing turtles in abrasive surfaces can also cause plastron injuries, which provide an entrance point to fungi and bacteria.\nAllowing", "-30.00974467128981" ], [ "finishing. Animal and human foods Glycine is not widely used in foods for its nutrional value, except in infusions. Instead glycine's role in food chemistry is as a flavorant. It is mildly sweet, and it counters the aftertaste of saccharine. It also has preservative properties, perhaps owing to its complexation to metal ions. Metal glycinate complexes, e.g. copper(II) glycinate are used as supplements for animal feeds. Chemical feedstock Glycine is an intermediate in the synthesis of a variety of chemical products. It is used in the manufacture of the herbicides glyphosate, iprodione, glyphosine, imiprothrin, and eglinazine. It", "-29.9787850457069" ], [ "as \"barbaric\" on their website due to the physical harming of a cat or any other creature that comes into contact with an electric fence. Dogs Canines are naturally territorial and will keep cats at bay. Crystals A more traditional cat repeller is to use jelly-like crystals containing methyl nonyl ketone, designed to be scattered around the garden, or around the areas the cat likes to foul. These repellents give off a smell that is very unpleasant to the cat, causing it to avoid that place. Citronella Citronella oil, used for repelling insects, can also be used to get rid", "-29.96695024863402" ], [ "Testicles as food The testicles of calves, lambs, roosters, turkeys, and other animals are eaten in many parts of the world, often under euphemistic culinary names. Testicles are a by-product of the castration of young animals raised for meat, so they were probably a late-spring seasonal specialty, though nowadays they are generally frozen and available year-round. Cookery Testicles are cooked in a variety of ways: sautéed and sauced, fricasseed, deep-fried with breading or batter, in pies, poached, roasted, and so on. Before cooking, they are generally scalded, skinned, and soaked in cold water. Names In English, testicles are known by", "-29.95412979001412" ], [ "as tested by Clark (2001). These results were determined by visual assessments and bacterial cultures. Diet physical properties Diet selection is important for feline dental health. Cats fed a dry food diet have a greater oral health status, in regards to dental diseases and tartar accumulation, when compared to cats fed a wet food diet. Similarly, when cats are fed only, or partially dry commercially prepared cat food as part of their feeding program, there is a reduction in tartar and gingival disease when compared to cats fed home prepared diets. Advantages of a dry diet are due to the", "-29.932859091553837" ], [ "consuming their own feces.\nSome medications, such as antibiotics, taken by mouth or antiseptics or medicated shampoos used on the skin can produce odors that owners may find unpleasant. Likewise, some food ingredients, most noticeably fish meal or fish oil, can produce skin odor in dogs.\nFlatulence can be a problem for some dogs, which may be diet-related or a sign of gastrointestinal disease. This, in fact, may be the most commonly noticed source of odor from dogs fed cereal-based dog foods.\nSkunks and dogs often have aggressive encounters and a dog may be sprayed by a skunk. This results in an", "-29.928124705250866" ], [ "working animals. This is often due to the animal not being housebroken, or for older, sick, or injured pets who have become incontinent. In some cases, these are simply baby diapers with holes cut for the tails to fit through. In other cases, they are diaperlike waste collection devices.\nThe diapers used on primates, canines, etc. are much like the diapers used by humans. The diapers used on equines are intended to catch excretions, as opposed to absorbing them.\nIn 2002, the Vienna city council proposed that horses be made to wear diapers to prevent them from defecating in the street. ", "-29.88213222270133" ], [ "juvenile dandelions and different species of lettuce, though like very many plants, they should be fed rarely due to potentially harmful side effects (for the former) or a lack of nutritional value (for the latter). \nWater is important for all species, but the tortoise, being an arid species, will typically get water from their food, but they still need a constant supply. Tortoises should be soaked in warm water up to the mid shell. Tortoises typically empty their bowels in water as to hide their scent, this is an instinct, and it also helps keep their enclosure cleaner.\nRussian tortoises do", "-29.879131077890634" ], [ "had previously researched why animals eat their placentas stated in 2007 that \"people can believe what they want, but there’s no research to substantiate claims of human benefit. The cooking process will destroy all the protein and hormones. Drying it out or freezing it would destroy other things.\" Two recent studies by researchers from the University of Nevada, Las Vegas, however, appear to be at odds with such claims. UNLV researchers found that some essential nutrients and steroid hormones remained in human placenta that was cooked and processed for encapsulation and consumption.\nThe fee charged by encapsulation specialists for processing", "-29.84169820335228" ], [ "taste buds compared to humans (470 or so versus more than 9,000 on the human tongue). Domestic and wild cats share a gene mutation that keeps their sweet taste buds from binding to sugary molecules, leaving them with no ability to taste sweetness. Their taste buds instead respond to acids, amino acids like protein, and bitter tastes. Cats also have a distinct temperature preference for their food, preferring food with a temperature around 38 °C (100 °F) which is similar to that of a fresh kill and routinely rejecting food presented cold or refrigerated (which would signal to the cat that", "-29.834571458326536" ], [ "Raw feeding Raw feeding is the practice of feeding domestic dogs, cats and other animals a diet consisting primarily of uncooked meat, edible bones, and organs. The ingredients used to formulate raw diets can vary. Some pet owners choose to make home-made raw diets to feed their animals but commercial raw food diets are also available.\nThe practice of feeding raw diets has raised some concerns due to the risk of food borne illnesses, zoonosis and nutritional imbalances. People who feed their dogs raw food do so for a multitude of reasons, including but not limited to: culture, beliefs surrounding health, nutrition and what is perceived to be", "-29.826242120645475" ], [ "loin are among the preferred parts, and the hump is considered a delicacy. The hump contains \"white and sickly fat\", which can be used to make the khli (preserved meat) of mutton, beef, or camel. On the other hand, camel milk and meat are rich in protein, vitamins, glycogen, and other nutrients making them essential in the diet of many people. From chemical composition to meat quality, the dromedary camel is the preferred breed for meat production. It does well even in arid areas due to its unusual physiological behaviors and characteristics, which include tolerance to extreme temperatures, radiation from", "-29.824484392098384" ], [ "Other products, such as guar gum and maltodextrose, are \"Generally Recognized as Safe (GRAS)\" by the FDA; this is also based on scientific testing and long-term consumption by a variety of consumer demographics. With excessive use, polydextrose can have a laxative effect, and olestra may cause loss of fat-soluble vitamins in the form of fatty stools and is liquid at body temperature. Esterified propoxylated glycerol (EPG), which is a solid at body temperature, achieved GRAS status for confectionery uses in November, 2015. EPG's GRAS status expanded to use at levels up to 38 percent by weight in baked goods", "-29.820897348086874" ], [ "as Chiapas, Guerrero, Hidalgo, Puebla and Veracruz. It is considered a delicacy, as well as a food of high protein content, therefore it is often served as a main dish, not as garnish, despite its small portions. They may be eaten as the sole filling in tacos. The Atta, the type of ant most eaten in Mexico, has a nutty flavor.\nAlso in Brazil the queens of leaf-cutter ants (locally known as 'tanajuras') are highly appreciated as delicacies in several regions. The techniques involving their capture and cooking are considered an immaterial patrimony of the people of the Tianguá municipality, in", "-29.816283676940657" ], [ "Russula cyanoxantha. Edibility Despite being described by some mycologists as inedible or even poisonous, Lactifluus piperatus is generally considered edible. However, it is not recommended by some, because of its unpleasant taste. It is difficult to digest when eaten raw, but is used as a seasoning when dried, or sometimes is eaten fresh after parboiling, though its taste is still unappetising. Some recommend frying in butter with bacon and onion or pickling, or baking in a pie or pastry as other ways to prepare it. The milk has a very hot and acrid taste, which is removed if boiled. The", "-29.77849189908011" ], [ "them unlikely to be eaten by any animals (for they have no nutritional value), enhancing their preservation potential.\nFusain shows characteristics diagnostic of pyrolysis in modern material: the cell walls of xylem are homogenized, and subsequently crack along their middles.", "-29.685424826631788" ], [ "easier to play full tones but more difficult to play sharp slaps; for thin skins, the opposite applies. Thin skins are louder than thick ones. Thick skins, such as cow, are particularly hard on the hands of the player and cause more callousing than goatskins.\nSkins from dry and hot-climate areas and poorly fed goats are preferred for djembes because of their low fat content. Skins from cold-climate goats with high-value nutrition have more than double the fat content; they tend to sound dull and lifeless in comparison. Even though the fat content of male goats is lower than that of", "-29.682393690483877" ], [ "such as crabs and tunicates. It also will feed on some species of marine vegetation. Importance to humans Scrawled cowfish can be quite tasty if cooked properly. It is locally abundant in the Caribbean region and often sold fresh. Although they are very good to eat, in many places around the world they are used as an aquarium fish because of their beautiful coloration.", "-29.62669106051908" ], [ "oil and the many truffle-flavored products that have come on to the market in the last few years are not necessarily bad, but they can lead to unrealistic expectations when you encounter the real thing. They offer a consistent experience, one you can guarantee to taste in the dish...they offer a simplified picture, a sort of cartoon version - bright and colourful but ultimately false\".\nThe annual Australian Food Awards, awarded by the Royal Agricultural Society of Victoria, bans the use of 2,4-dithiapentane in entries for truffle-related categories.\nIn May 2017, a class action lawsuit was brought against Sabatino North America LLC,", "-29.614212253320147" ], [ "and food smells. Manufactured smells such as perfume or motor oil, carnivore smells including faeces and food smells all cause the animal to show the action. \nScent rubbing is often performed with scent marking and self-anointing, and is typically used by animals to scent mark an object in their surroundings. This marking can be used as a means of communication between species. Many different species of felids, monkeys, bears, wolves and marmots have primarily been used to study scent rubbing in Carnivores. Differences in gender and age exist for scent rubbing, with adults and males performing the behaviour more frequently", "-29.593530208512675" ], [ "Cook Inlet reported increased instances of a condition known as \"mushy halibut syndrome\". The meat of affected fish has a \"jelly-like\" consistency. When cooked it does not flake in the normal manner of halibut but rather falls apart. The meat is still perfectly safe to eat but the appearance and consistency are considered unappetizing. The exact cause of the condition is unknown but may be related to a change in diet.", "-29.503133832011372" ], [ "moisture in fresh food. When conditions impel them to drink from bodies of water, the methods and motions differ greatly among species. Many desert animals do not drink even if water becomes available, but rely on eating succulent plants.\nCats, canines, and ruminants all lower the neck and lap in water with their powerful tongues. Cats and canines lap up water with the tongue in a spoon-like shape. Canines lap water by scooping it into their mouth with a tongue which has taken the shape of a ladle. However, with cats, only the tip of their tongue (which is smooth)", "-29.498259281027003" ], [ "expense for these creatures as pets is the necessary essentials in order to maintain them. Creating an environment similar to that of where they are from is important. For food, these creatures as pets are often fed fruits, insects, and smaller lizards. As pets, a baby pygmy marmoset needs to be fed every two hours for at least two weeks . Understanding their natural diet is also important because it helps maintain their good health from the necessary protein, calcium and other nutritional sources they need in order to survive.\nIn the United States, each state has different regulations when it", "-29.48805874190475" ], [ "with their tongue. A fraction of a teaspoon of water is taken up with each lap. Although some desert cats are able to obtain much of their water needs through the flesh of their prey, most cats come to bodies of water to drink.\nEating patterns is another indicator to understand the behavior changers in domestic cats. The changers in typical eating patterns can be a early signal for possible physical or psychological health problem. Excretion Cats tend to bury their feces after defecating and can be attracted to a litter box if it has attractant in it. Cats will generally", "-29.460122307296842" ], [ "to mammals, it is found in quantities sufficient to discourage herbivores. It makes wild Cucurbita and most ornamental gourds, with the exception of an occasional C. fraterna and C. sororia, bitter to taste. Ingesting too much cucurbitacin can cause stomach cramps, diarrhea and even collapse. This bitterness is especially prevalent in wild Cucurbita; in parts of Mexico the flesh of the fruits is rubbed on a woman's breast to wean children. While the process of domestication has largely removed the bitterness from cultivated varieties, there are occasional reports of cucurbitacin causing illness in humans. Cucurbitacin is also used as a lure in", "-29.441061860648915" ], [ "because when proteins reach the colon in an undigested state, they are fermented producing hydrogen sulfide gas, indole, and skatole. Dogs and cats digest animal proteins better than those from plants, but products of low-quality animal origin are poorly digested, including skin, feathers, and connective tissue. History and etymology Proteins were recognized as a distinct class of biological molecules in the eighteenth century by Antoine Fourcroy and others, distinguished by the molecules' ability to coagulate or flocculate under treatments with heat or acid. Noted examples at the time included albumin from egg whites, blood serum albumin, fibrin, and wheat gluten.\nProteins", "-29.437121309689246" ], [ "Bag Balm Bag Balm is a salve developed in 1899 to soothe irritation on cows' udders after milking. It is used as a treatment for chapped and irritated skin on humans and can be found in places such as drugstores, ski resorts, online vendors, and needlework stores, in addition to farm and feed stores. Its uses are claimed to be many, for example: \"squeaky bed springs, psoriasis, dry facial skin, cracked fingers, burns, zits, diaper rash, saddle sores, sunburn, pruned trees, rifles, shell casings, bedsores and radiation burns.\" History For the first 115 years, Bag Balm was made by a", "-29.43482169226627" ], [ "acetic acid, hydrogen peroxide, and peptide bacteriocins. It can also produce the antimicrobial nisin, a particularly effective preservative.\nFermented fish preparations can be notable for their putrid smell. These days there are many other techniques of preserving fish, but fish is still fermented because some people enjoy the taste. Risks Alaska has witnessed a steady increase of cases of botulism since 1985. It has more cases of botulism than any other state in the United States of America. This is caused by the traditional Eskimo practice of allowing animal products such as whole fish, fish heads, walrus, sea lion, and whale", "-29.391689793555997" ], [ "fermented fish sauce garum. Garum had a sufficiently long shelf life for long-distance commerce, and was produced in industrial quantities. Anchovies were also eaten raw as an aphrodisiac.\nToday, they are used in small quantities to flavor many dishes. Because of the strong flavor, they are also an ingredient in several sauces and condiments, including Worcestershire sauce, Caesar salad dressing, remoulade, Gentleman's Relish, many fish sauces, and in some versions of Café de Paris butter. For domestic use, anchovy fillets are packed in oil or salt in small tins or jars, sometimes rolled around capers. Anchovy paste is also available.", "-29.390070639186888" ], [ "genus Pseudotrichonympha in the guts of these termites, and intracellular bacterial symbionts of the protists. Vertebrates Domesticated and wild mammals are sometimes coprophagic, and in some species this forms an essential part of their method of digesting tough plant material.\nDogs may be coprophagic, possibly to rebalance their microbiome or to ingest missing nutrients.\nSpecies within the Lagomorpha (rabbits, hares, and pikas) produce two types of fecal pellets: hard ones, and soft ones called cecotropes. Animals in these species reingest their cecotropes, to extract further nutrients. Cecotropes derive from chewed plant material that collects in the cecum, a chamber between the large", "-29.387927917239722" ], [ "subcutaneous fat, and an almost complete lack of functional sweat glands.\nCompared with domestic cattle, the rumen of yaks is unusually large, relative to the omasum. This likely allows them to consume greater quantities of low-quality food at a time, and to ferment it longer so as to extract more nutrients. Yak consume the equivalent of 1% of their body weight daily while cattle require 3% to maintain condition. Odour Contrary to popular belief, yak and their manure have little to no detectable odour when maintained appropriately in pastures or paddocks with adequate access to forage and water. Yak's wool is", "-29.36892350796552" ], [ "mucus or dead skin. Sometimes a male and female cleaner wrasse jointly clean a client. Males punish females for cheating because it often results in the end of the feeding session. This suggests cleaner fish may be aware of the payoffs accrued by an interaction partner.\nResearchers Raihani, McAuliffe, Brosnan, and Bshary tested two sets of cleaner fish (12 and 10 individuals) on their sensitivity to unequal outcomes. The fish had to perform a task to provide food rewards for themselves and a partner. They were equally likely to work when their partner received higher-value rewards or same-value rewards. There was", "-29.36737324943533" ], [ "in general, and methionine and lysine. Heat-stressed fowls seek out vitamin C, which alleviates the consequences of heat stress Learned specific appetites are not necessarily a result of an animal's ability to detect the presence of a nutrient. Because nutrient deficiencies of various types can have stressful effects which vary depending on the missing nutrient, subsequent ingestion of that nutrient is associated with relief of certain signs. An animal may therefore associate the flavor of a food that is high in a certain nutrient with relief of the signs of that nutrient deficiency, while not seeking out other foods rich", "-29.34953814416076" ], [ "the scratching or brushing of their own bodies, or the grooming of others. Through licking and brushing, animals such as the red squirrel clean wounds and remove dirt and debris from their bodies, also aiding in hygiene. Other physical purposes for comfort behaviours includes reduction in heart rates as seen in horses, and thermoregulation.\nThere are reproductive purposes for comfort behaviours in several types of animals. It is necessary in the search for mating partners in animals such as the wren, where reciprocal and continued preening is involved in mating. Similarly, in chickens, dust bathing occurs as female sexual behaviour. During", "-29.334664405090734" ], [ "(bioactive) yogurt contains, among other lactic bacteria, Lactobacillus acidophilus, which may be useful in reducing flatulence. L. acidophilus may make the intestinal environment more acidic, supporting a natural balance of the fermentative processes. L. acidophilus is available in supplements. Prebiotics, which generally are non-digestible oligosaccharides, such as fructooligosaccharide, generally increase flatulence in a similar way as described for lactose intolerance.\nDigestive enzyme supplements may significantly reduce the amount of flatulence caused by some components of foods not being digested by the body and thereby promoting the action of microbes in the small and large intestines. It has been suggested that alpha-galactosidase", "-29.311726736948913" ], [ "are probably multifactorial and they remain abnormal behaviors, this indicates that husbandry changes are needed for animals that exhibit cribbing or wind-sucking.\nA study suggested was that ghrelin levels were higher in a crib-biting horse than in those who did not perform the behaviour. Cribbing also increased salivary secretion. However, a different study found that there was no relation between salivary secretion and reducing gastric acidity. Meaning that cribbing did not provide comfort for ulcers, rather that it stimulated/caused this issue. Treatment Several methods have been devised to prevent cribbing once the behavior has started. However, some ethologists have argued that", "-29.310237631503696" ], [ "although animal fats are sometimes used and cannot be completely excluded as being present in the product. The fatty acids from each source are chemically identical. The Vegan Society, which discourages eating animal-based foods, flags E471 as a potentially animal based. Other uses In the late 2010s, the company Apeel Sciences entered the market in parts of South America, China, and Japan with monoacylglycerols as an alternative to plastic films to prevent withering and conserving fruit and vegetables for transport and storage.", "-29.3032199901063" ], [ "not standard on pet food labels and generally only crude fiber is provided, which does not given an indication of the solubility of fermentability of an ingredients. If non-soluble or non-fermentable fiber is found within the diet, the animal is likely to experience increased fecal bulk and moisture as well as a diluted energy intake. Consequently, dogs may experience decreased nutrient absorption, dehydration, pathogenic bacterial growth in the gut and diarrhea. Avoiding diets with crude fiber levels over 3% or high inclusions of ingredients such as cellulose or peanut hulls will assist in preventing some consequences such as pathogenic bacterial", "-29.28433018521173" ], [ "Cat food Cats are obligate carnivores, though most commercial cat food contains both animal and plant material supplemented with vitamins, minerals and other nutrients. Cat food is formulated to address the specific nutritional requirements of cats, in particular containing the amino acid taurine, as cats cannot thrive on taurine-deficient food.\nOptimal levels of taurine for cat food have been established by the Waltham Centre for Pet Nutrition Dog food Recommendations differ on what diet is best for dogs. Some people argue dogs have thrived on leftovers and scraps from their human owners for thousands of years, and commercial dog foods (which", "-29.27980253350688" ], [ "molar together compose the carnassial pair on each side of the mouth, which efficiently shears meat into small pieces, like a pair of scissors. These are vital in feeding, since cats' small molars cannot chew food effectively, and cats are largely incapable of mastication. Although cats tend to have better teeth than most humans, with decay generally less likely because of a thicker protective layer of enamel, a less damaging saliva, less retention of food particles between teeth, and a diet mostly devoid of sugar, they are nonetheless subject to occasional tooth loss and infection. Ambulation The cat is digitigrade.", "-29.271128721054993" ], [ "of genes relating to detoxification, the immune system, and growth and reproduction, are believed to be part of the reasons behind the cockroach's ability to adapt to human living spaces. Diet American cockroaches are omnivorous and opportunistic feeders that eat materials such as cheese, beer, tea, leather, bakery products, starch in book bindings, manuscripts, glue, hair, flakes of dried skin, dead animals, plant materials, soiled clothing, and glossy paper with starch sizing. They are particularly fond of fermenting foods. They have also been observed to feed upon dead or wounded cockroaches of their own or other species. Habitat American", "-29.179911039565923" ], [ "have only been available for the past century) contain poor-quality meats, additives, and other ingredients dogs should not ingest, or that commercial dog food is not nutritionally sufficient for their dogs. However, many commercial brands are formulated using insights gained from scientific nutritional studies and there is no reliable peer-reviewed evidence that domestic options are superior. Most store-bought pet food comes in either dry form, also known as kibble, or wet, canned form. Raw feeding Raw feeding is the practice of feeding domestic dogs, cats and other animals a diet consisting primarily of uncooked meat, edible bones, and organs. The", "-29.16254751200904" ], [ "Bunting (animal behavior) Bunting is a form of animal behavior, often found in cats, in which the animal butts or rubs their head against other things, including people. Bunting as a behaviour can be viewed as a variation of scent rubbing. This is when an animal, typically a carnivore, will rub its back on a scent such as prey or the urine of an animal of the same species. Evolutionarily speaking, scent rubbing is the oldest form of scent communication and bunting is a derivative of this behaviour. Rolling in the scent of another animal was an adaptation to camouflage", "-29.120986608148087" ], [ "commercial dog food brands. The protein contents of the foods are split into peptides which reduces the dog's immune system from recognizing an allergic threat. Hydrolyzed protein diets for cats are often recommended for felines with food allergies and certain types of digestive issues.", "-29.101736577256816" ], [ "like vomiting and diarrhea, and swelling.\nDogs with sensitivities to food that contain these common proteins may benefit from food that contains a novel protein source. A novel protein is any protein not commonly used in dog food, such as elk, rabbit, or bison. Novel protein diets make up the majority of hypoallergenic dog food diets. Flea allergy dermatitis Flea allergy dermatitis is caused by the bite of a flea. The primary cause is due to the flea's saliva that is injected into the feeding site, triggering an immune response in the dog. This may include redness of the skin", "-29.09838670501631" ], [ "body. Some dinersconsider it a delicacy, but others avoid it because they consider it a toxin source; dislike eating innards; or are put off by its texture and appearance, that of a grainy greenish paste.\nA set of nutcrackers and a long, thin tool for pulling meat from inaccessible areas are suggested as basics, although more experienced diners can eat the animal with their bare hands or a simple tool (a fork, knife or rock). Eating a lobster can get messy, and most restaurants offer a lobster bib. Meat is generally contained in the larger claws and tails, and stays warm", "-29.086331059908844" ], [ "used to prepare nutritious food. In Mexico and Thailand, the heads and legs are removed, and the remainder may be boiled, sautéed, grilled, dried or diced. In China, cockroaches have become popular as medicine and cockroach farming is rising with over 100 farms. The cockroaches are fried twice in a wok of hot oil, which makes them crispy with soft innards that are like cottage cheese. Fried cockroaches are ground and sold as pills for stomach, heart and liver diseases. A cockroach recipe from Formosa (Taiwan) specifies salting and frying cockroaches after removing the head and entrails. In traditional", "-29.082264212396694" ], [ "and matting. Washing with soap should be avoided when possible because soap strips the coat of its natural oils and shine. The Stabyhoun coat will naturally rid itself of dirt and mud. After a swim the dog is usually clean and dry in a matter of hours. Breeding Due to the limited size of the Stabyhoun population, careful breeding is essential. The Dutch Association for Stabyhouns and Wetterhouns (Nederlandse Vereniging voor Stabij- en Wetterhounen/NVSW), the Ameri-Can Stabyhoun Association and the UK Stabyhoun Association has breed advisors who assist with mating selections. In an effort to control inbreeding, the association keeps", "-29.056725295056822" ], [ "Food play Practice Certain fruits (e.g., bananas), vegetables (e.g., cucumbers and zucchinis) and processed meat (e.g., sausages and hot dogs), if used safely, may be fetish objects because they have a phallic shape, and can be substitutes for dildos, useful for vaginal or anal penetration. Other foods are so constituted that they can be sexually penetrated by a penis, if an appropriate hole is drilled in them, such as the namesake of American Pie.\nFrancesco Morackini, an Austrian designer and artist, designed and created a home dildo maker. It allows phallic food to be sculpted into an even more phallic shape", "-29.04531272558961" ], [ "Bauria Description The diet of Bauria is assumed to have included tough fibrous material due to the way the anterior edge of an upper tooth shears against the posterior edge of the corresponding lower tooth to generate a cutting action.\nThe cheek bulges, and the wide and deep depression below them, suggest a muscular arrangement associated with the corners of the mouth, whereby it is possible for such an animal to pull the corners of the mouth forwards as is characteristic of mammals, while in true reptiles the corners of the mouth are fixed and very close to the articulation of", "-29.04144896409707" ], [ "Meat Market by the Ravenmaster. Recently, other foods have been introduced to their diet, such as chicks, lamb, mice and pig hearts, as well as peanuts, dog biscuits soaked in blood and fish in hope that this tactic would reduce the amount of scavenging from the garbage bins.", "-29.032242633329588" ], [ "balance makes the food simple in appearance but rich in flavor.\nDue to economic conditions, maximizing the use of ingredients to save money has become a tradition in Vietnamese cooking. In earlier decades and even nowadays in rural areas, every part of a cow is used, from the muscle meat to the intestines; nothing is wasted. The higher quality cuts from farmed animals (cows, pigs) would be cooked in stirfry, soup or other dishes, while the secondary cuts would be used in blood sausages or soup. The same goes for vegetables like scallions: the leafy part is diced into small bits", "-29.013755311025307" ], [ "eaten salty or sugary foods the sensitivity to the taste of water increases. It is proposed that this ability to taste water evolved as a way for the body to keep internal fluids in balance after the animal has eaten things that will either result in more urine being passed or will require more water to adequately process. It certainly appears that when these special water taste buds are active, dogs seem to get an extra pleasure out of drinking water, and will drink copious amounts of it. Touch The main difference between human and dog touch is the presence", "-28.973223472959944" ], [ "extreme docility of some individuals has led to the myth that Ragdolls are pain resistant. Some breeders in Britain have tried to breed away from the limpness owing to concerns that extreme docility \"might not be in the best interests of the cat\".\nBreed standard marketing and publicity material describe the Ragdoll as affectionate, intelligent, relaxed in temperament, gentle, and an easy-to-handle lap cat. The animals are often known as \"puppy cats\", \"dog-like cats\", \"cat-dogs\", etc., because of their placid nature and affectionate behavior, with the cats often following owners from room to room as well as seeking physical affection akin", "-28.967740986321587" ], [ "can be used in place of roux as well. These items do not contribute to the flavor of a dish, and are used solely for thickening liquids. More recently, many chefs have turned to a group of naturally occurring chemicals known as hydrocolloids. In addition to being flavorless and possessing the ability to act as a thickening agent, the resulting texture is thought by some to be superior, and only a small amount is required for the desired effect.", "-28.95764812087873" ], [ "is a beef product that is often eaten raw in the Middle East and Mediterranean countries. It is made from the hindquarter of beef cattle. Pastirma is a type of intermediate moisture food and can be stored for several months in humid climates. The meat is salted and dried to reduce water activity and increase microbial safety. Additionally, nitrites are added for preservation. The final product has 5% salt and a moisture content between 30-35%. Pet food Semi-moist pet food such as chewy dog treats and soft cat treats are shelf-stable, soft and do not have a high moisture content.", "-28.939444779825862" ], [ "sauce, Garum, Hákarl, jeotgal, rakfisk, shrimp paste, surströmming, shidal Meat-based Chorizo, salami, sucuk, pepperoni, nem chua, som moo, saucisson Tea-based Pu-erh tea, Kombucha Risks Alaska has witnessed a steady increase of cases of botulism since 1985. It has more cases of botulism than any other state in the United States of America. This is caused by the traditional Eskimo practice of allowing animal products such as whole fish, fish heads, walrus, sea lion, and whale flippers, beaver tails, seal oil, and birds, to ferment for an extended period of time before being consumed. The risk is exacerbated when a plastic", "-28.938952366428566" ], [ "female goats, many players prefer female skins because they do not smell as strongly and are reputed to be softer.\nThe skin is mounted with the spine running through the centre of the drum head, with the line of the spine pointing at the player, so the hands strike either side of the spine. Animal skins are thicker at the spine than the sides; mounting the skin with the spine centered ensures that the left and right hand play symmetric areas of equal size and thickness. In turn, this helps to minimize differences in pitch of the notes played by the", "-28.933843458653428" ], [ "food by rubbing it between their paws while holding the food underwater, giving the appearance of 'washing' the food (although the exact motivation for this behaviour is disputed). Captive raccoons sometimes perform these actions of 'washing' their food by rubbing it between their paws, even when there is no water available. This is most likely a vacuum activity based on foraging behaviour at shorelines.\nOne vacuum activity that has been studied is 'tongue-rolling' by calves. Calves raised for 'white' veal are generally fed a milk-like diet from birth until they are slaughtered at about four months of age. The", "-28.926295626326464" ], [ "a variant using clams. An example of ushio-jiru uses tai or sea bream, and this dish is not just the liquid broth, but served with the fish head in it to be consumed, eye-ball and all. The hamaguri ushio-jiru (\"clam consommé\") is also served with the meat of the clam in the clam shell. South Asia In the Maldives the tuna broth known as garudiya is a basic food item, but it is not eaten as a soup in the general sense of the term. Lack of scientific evidence for health benefits By 2013, \"bone broth\" had become a popular", "-28.91959724438493" ], [ "garbage. When going through obedience training it is imperative for a pet owner to know that harsher methods are not effective with this breed. Coonhounds are typically stubborn but can also be sensitive; being overbearing can frighten the animal. Once trained and aware of its size the breed is known to be very gentle and can be trusted with children. While playing with older children they will happily jump into the family swimming pool to play. The dogs are adept in the water and can be compared to other water-loving breeds like the Labrador Retriever in swimming ability.\nCoonhounds", "-28.917893241829006" ], [ "of the feed mixture. Additional flavouring, colours, vitamin and mineral supplementation is added to complete a balanced dog food diet. Fat, from plant oils, is normally used to add both taste and texture to vegetarian dog diets in the United States. Processing of canned vegetarian dog diets Supplementing with canned food is one way to add palatability and water content to a dog's diet. Dog canned food comes in two forms in the United States: stew style and pate style, which can vary in moisture content. The desired type of wet food produced will determine the process needed for the development", "-28.90525537583744" ], [ "low-salt soups were greater when the soup contained umami, whereas low-salt soups without umami were less pleasant. Another study demonstrated that using fish sauce as a source of umami could reduce the need for salt by 10–25% to flavor such foods as chicken broth, tomato sauce, or coconut curry while maintaining overall taste intensity.\nSome population groups, such as the elderly, may benefit from umami taste because their taste and smell sensitivity is impaired by age and medication. The loss of taste and smell can contribute to poor nutrition, increasing their risk of disease. Some evidence exists to show umami not", "-28.89172234828584" ], [ "without proper enzymes in the animal’s digestive tract to do this. Processing has the ability to break down nutrients such as insoluble fiber and protein that can aid in the digestibility of the ingredients and ensure the dog is utilizing the nutrients given to meet its requirements. However, processing can cause negative effects to these traits as well. Processing of kibble – extrusion process Production of dog food kibble is done through a process known as food extrusion. Extrusion is a process commonly used in the pet food industry to develop a product that is porous or \"puffed\" from expansion", "-28.88589487252102" ], [ "ḥalāl, most notably some animal welfare groups, contend that some methods of slaughter \"cause severe suffering to animals\" compared to when the animal is stunned before slaughter, which is why the Egyptian Fatwa Committee has agreed to the electronarcosis. In the United Kingdom, the government funded an independent advisory body Farm Animal Welfare Council to examine the issue, which recommended that conventional dhabīḥah (along with kosher slaughter (sheḥitah)) without prior stunning be abolished. The FAWC chairwoman of the time, Dr. Judy MacArthur Clark, said, \"This is a major incision into the animal and to say that it doesn't suffer is", "-28.884940624571755" ], [ "of a cow flavored to taste like filet mignon. Explaining his use of the paper in 2005, Cantu remarked \"Gastronomy has to catch up to the evolution in technology\" and said he was attempting to change preconceived notions of what food is. Moto customers are \"sick and tired of steak and eggs\", he said. \"They're tired of just going to a restaurant, having food placed on the table, having it cleared, and there's no more mental input into it other than the basic needs of a caveman, just eat and nourish ... there's so much more we can do.\"\nAnother early", "-28.88358167381375" ] ]
6kxpnk
What is meant by the phrase "Nice guys finish last"?
[ "It's a cynical statement that you can't win by playing by the rules, you have to have some kind of advantage, or be willing to bend rules (or outright cheat) to get by in whatever situation they're talking about. It is used in different situations from career to romance.", "Here is an example of how this logic works. You get to the door first at a store selling a limited number of something. You see a crowd behind you and decide you will hold the door for them. You let everyone else through and buy up all the limited stock even though you got there first your kindness made you miss out.", "It is another way of saying \"being overly nice and caring may hold you back from progressing\" in said situation. It describes the idea that people who are always bending over backwards for others and sacrificing their own priorities in attempt to please those people will usually be unable to get what they want, because achieving one's goals may require you to put yourself first.", "A cynical view that being selfless and respectful of certain rules will allow selfish people to win. It's used by people who feel that they did everything ethically correct and aren't any better for it when compared to others. It's also used by people who try and rationalize their own selfishness and disregard for rules. It's also taken on another form by guys who feel that being a decent human being means they should get more woman. When they realize that paying for a drink and opening a couple of doors for a woman doesn't equal her wanting to have sex with them, rather than looking inward at their own shortcomings, they come to the conclusion that an asshole would have had much more success getting laid. They then mutter to themselves, \"She only likes guys that treat her like shit. Why do nice guys always finish last?\"", "Look, I'm playing shortstop, my mother's running from second base to score on a base hit. Everybody's watching the ball. I kinda trip my mother as she goes by. Now I love my mother, but she doesn't she doesn't score the run. So, I'm not a nice guy. Nice guys finish last. --- with apologies for the rough paraphrase from memory - to Leo Durocher", "It's a fairly cynical statement that generally boils down to the idea that if you play strictly by the rules and being caring to others that you won't get as far as head as someone only looking out for themselves. In the simplest terms, in a race if you stop to help someone who tripped, you're going to lose to someone of equal skill who kept running. In another example, if you're working on a project, if you offer someone help instead of just working forward on your own, you could lose to the person you helped, instead of taking advantage of their falling behind.", "Let's say there's 2 candies in the store and 3 kids. One is a nice considerate kid who was there first and took one, another is a bully, the 3rd is just a w/e average kid. The bully takes the last candy because that's what he's about. Let's say he's rough about it. The nice kid can set aside his sweet tooth to let the other kid get the candy. If either the nice or average kid take issue with the bully being forceful in taking a candy what can they do? Do they try to reason with him? They can, but being a bully chances are he won't give a damn. Do they get angry that someone's just so mean and it escalates physically? Now they're all kicked out from the store and no-one gets any candy. The phrase symbolizes this dynamic. Being nice and considerate leaves you with nothing (other than your self-satisfaction or pride) while being a jerk usually gets you your way. If you're a jerk, most won't bother trying to oppose you over minor stuff, and if they do, you can easily make it so much trouble that their victory feels empty. Of course, it's a rather cynical view-point (but not wholly unwarranted). In the real world, integrity and charity are highly valued by those that care to look for it. For example, the shop owner in the example could have seen the whole thing and just kicked the mean kid out, maybe even given you an extra piece he had on him for being a good kid.", "Like most of these sayings you can interpret them with varying degrees of cynicism. It can be a warning for a person that continuously sacrifices himself for the perceived benefit of others, saying that if they don't start paying attention to themselves at some point they will be left behind and miserable. Or it can be about the do good kinda guy, who never breaks a rule, is always honest and tries his hardest. Telling him that if he were a bit more flexible, a bit more willing to play dirty that he would get much further in life. Or last, its a /r/niceguy sentiment, where being \"nice\" doesn't net you any dates with women.", "It's supposedly a misquote. What I always heard was baseball manager Leo Dorecher was asked what he thought about another team and their chances. He replied, 'Nice guys, finish last'. But the comma got dropped, which changes the entire meaning of the sentence." ]
[ [ "says \"wait for it\" quite often. And also he often uses the word \"Nice\" to express when he enjoys something or someone.\nIn the show Barney frequently approaches attractive women with Ted in tow and asks \"Haaaaaave you met Ted?\" as a way to start a conversation with strangers. Thomas says that this phrase is based in real life, as a one-time friend of his often used a similar line to meet women. He is also prone to saying \"Daddy's Home\" as either a chat-up line or for grand entrances, and \"True Story\" as an ending to stories or theories that", "-27.301052109134616" ], [ "second place.\nThough this is the origin of the phrase, Durocher's remark was specific to the context of baseball, and indeed to the context of that set of players, rather than intended as generally applicable to male/female relationship dynamics or in any other context and his allegation of a cause-and-effect relationship between being nice and finishing last was at most merely implicit – it can also be interpreted as \"Nice guys, but they will finish last\", rather than \"all nice guys finish last\".\nSimplistically, the term \"nice guy\" could be an adjectival phrase describing what appears to be a friendly, kind, or", "-26.591785117003383" ], [ "After Words (film) Plot A librarian who has lost her job and is suicidal decides to take a final wonderful trip to Costa Rica before swallowing a bottle of pills, Once there, she meets a younger man, a vibrant tour guide who takes her to all the beautiful places, and becomes intrigued by her aloof intellectualism. He works hard to draw her out, to get her to embrace the Costa Rican motto, \"Pura Vida,\" which means \"pure life,\" but in a broader sense encompasses the national exuberance for living. She inspires him to read the first book he has ever", "-26.382664104981814" ], [ "and the \"come back soon\" the owner wants. Broad stated that the phrase is meaningless because it has been castrated by excessive usage and pretense. He compared the phrase to the salutation \"How are you?\" and the phrase \"had a lovely time\", which are \"conversational space-fillers\" that help prevent embarrassing silences. Usage of the term has been compared to inserting the phrase \"you know\" or the word \"like\" in sentences. In 1982, comedian George Carlin joked at Carnegie Hall, \"That's the trouble with 'Have a nice day'; it puts all the pressure on you. Now you've got to go out", "-26.092919107177295" ], [ "say the second-best, so that, if you remind me of Tom Jones, or The Mayor of Casterbridge, or any other that you fancy, I can say, of course, that one is the best.\"", "-25.88619799911976" ], [ "The Best Day (short story) Plot summary This story is about a woman who is happy but is afraid that the happiness in her life will come to an end. She prays for eternal happiness and the next day an old peddler shows up selling plain things. When she asks him if he has anything for happiness he tries to explain that happiness is just a matter of taking joy in overcoming the difficulties in life. However, she doesn't let him finish and sends him on his way. The next day a medicine man from the east shows up selling", "-25.810266329775914" ], [ "influential Catholic Youth Organization. The two later eloped and married in Texas in 1947. In the 1950s, Day hosted a radio program called Day with the Giants, and later authored a book by the same title describing the life of a manager's wife. Nice guys finish last The saying \"nice guys finish last\" is a condensation by journalists of a quotation by Durocher—he did not originally say this, himself, though it has often been attributed to him, and he did appropriate it as his own. The original quotation was \"The nice guys are all over there, in seventh place\" (July", "-25.77836881615076" ], [ "The Last Word (2017 film) Synopsis A retired businesswoman wants to control everything around her, knowing that she only has a little time left before an imminent death due to a medical condition. She decides to craft her own obituary, so she hires a young obituary writer to work with her to ensure her life story is told her way. The old businesswoman tries to expand the horizons of her life, and adopts a young kid for mentoring and lands herself a job as a disc jockey. She grows close with the young writer and influences her life. Production In", "-25.458017738594208" ], [ "Before the closing credits, Rogers got ready to go out the door by reminding the viewers: \"You always make each day a special day. You know how: By just your being you/yourself. There's only one person in the whole world that's like you, and that's you. And people can like you just/exactly the way you are. I'll be back next time. Bye-bye!\". During the closing credits, which is complete with the show's logo and the episode number, the camera would perform a reversed version of the opening sequence's pan shot, while the \"Neighborhood Trolley\" crosses streets from right to left.\nStarting", "-25.395191561663523" ], [ "of May, the close of May,' but at this point he reminds us that the days are long in this month, so that their ends are always postponed.”\nAt one point Opener reveals how he has been ridiculed by people saying, “it’s in his head.” He is a writer/story-teller – his lives in his head – but the locals (his critics) obviously don’t appreciate his work. He used to object but he doesn’t even try and explain anymore, he doesn’t even respond to them nowadays. He’s resigned himself to the fact that he is misunderstood. He recalls painful trips he used", "-25.189243213466398" ], [ "courteous man. The \"nice guys finish last\" phrase is also said to be coined by American biologist Garrett Hardin to sum up the selfish gene theory of life and evolution. This was disputed by Richard Dawkins, who wrote the book The Selfish Gene. Dawkins was misinterpreted by many as confirming the \"nice guy finishing last\" view, but refuted the claims in the BBC documentary Nice Guys Finish First.\nThe \"nice guys finish last\" view is that there is a discrepancy between women's stated preferences and their actual choices in men. In other words, women say that they want nice guys, but", "-25.166268377797678" ], [ "All's Well, Ends Well Plot details All's Well, Ends Well is a comic romance of 3 hapless brothers, who eventually learn through their amorous exploits and misadventures that love is only won through gradual nurturing, and quickly lost through the quick, dishonest, selfish ways which they have always taken for granted.\nMoon (Raymond Wong) is eldest brother and head of the family. The film begins with the celebration of his 7th anniversary wedding with Leng, which celebration he deserts, preferring instead the company of his mistress (Sheila Chan). He turns up at home with her later, forcing his wife (whom he", "-25.127930456161266" ], [ "Have a nice day Have a nice day is a commonly spoken expression used to conclude a conversation (whether brief or extensive), or end a message by hoping the person to whom it is addressed experiences a pleasant day. Since it is often uttered by service employees to customers at the end of a transaction, particularly in Israel and the United States, its repetitious and dutiful usage has resulted in the phrase developing, according to some journalists and scholars, especially outside of these two countries, a cultural connotation of impersonality, lack of interest, passive–aggressive behavior, or sarcasm. The phrase is", "-25.08795396948699" ], [ "It gives me a chance to say goodbye to my fans, who have been so loyal to me over the years. I hope they and the theatres will all bear with me. I feel good most of the time. But there will be bad days too. It has been a privilege to be allowed to perform my skills on a national stage and television. I have never taken that for granted and I would like to give something back and say, 'thank you for having me. It has been a real pleasure'\". He died on the morning of 25 August", "-24.917167668696493" ], [ "hypothetical conversation that would occur at four points on the curve. In addition to being the basis behind The Dip, the entry was also included in Small is the new Big, a collection of short pieces from his blog. Synopsis Godin introduces the book with a quote from Vince Lombardi: \"Quitters never win and winners never quit.\" He follows this with \"Bad advice. Winners quit all the time. They just quit the right stuff at the right time.\"\nGodin first makes the assertion that \"being the best in the world is seriously underrated,\" although he defines the term 'best' as \"best", "-24.82334368667216" ], [ "nice day\". The phrase can have passive–aggressive connotations, and can be caustically used to end transactions with abusive customers. The speaker may also use the phrase ironically, in either a purposeful or unintentional manner.\nRoly Sussex of The Courier-Mail wrote that \"have a nice day\" can sound \"a touch brusque\" in comparison with \"you have a nice day\". Deeming the word \"you\" as moderating the imperative, Sussex stated that the word \"you\" causes the phrase to seem like a mixture of a command and a hope. He wrote that using \"you\" in imperatives is more common with people under 25. In", "-24.795442862377968" ], [ "adjectives are open: happy hour, fall guy, capital gain, road trip, wheat pit, head start, plea bargain; some of these are colorful (empty nester, loan shark, ambulance chaser, buzz saw, ghetto blaster, dust bunny), others are euphemistic (differently abled (physically challenged), human resources, affirmative action, correctional facility).\nMany compound nouns have the form verb plus preposition: add-on, stopover, lineup, shakedown, tryout, spin-off, rundown (\"summary\"), shootout, holdup, hideout, comeback, cookout, kickback, makeover, takeover, rollback (\"decrease\"), rip-off, come-on, shoo-in, fix-up, tie-in, tie-up (\"stoppage\"), stand-in. These essentially are nouned phrasal verbs; some prepositional and phrasal verbs are in fact of American origin (spell out,", "-24.794042870769545" ], [ "his last words were, \"Well, tomorrow we work on.\"", "-24.76511279254919" ], [ "Commonwealth University's School of the Arts, was cited by Maria Popova's blog Brain Pickings as one of the greatest commencement addresses of all time.\nFernández's speech highlighted the values of not giving up, accepting failure and change as a positive, and keeping integrity with accompanied success. Fernandez also offered ten tips for the graduates for help on the creative journey, including 1) Art requires time; 4) Not every project will survive; and 6) \"When people say your work is good, do two things: first, don't believe them. Second, ask them, 'why?'\"\nOne of the more significant quotes of the keynote speech helped", "-24.70922768620221" ], [ "end of the day you see what I'm saying. At the end of the day I felt like my best situation was to sit down with Jason and let him know I want my release papers dog, I want my walking papers whatever I gotta pay you'll whatever it gone to take, im ready to walk, because my name big enough right now I gotta big enough buzz and a big enough fanbase to say f*** it I'm a do this s*** independent, let me get all my money you feel me. So you know that's really what it was,", "-24.68576735741226" ], [ "Cudi claimed the quote, which is \"I am the smartest man alive!\", expressed his feelings best when he had completed the song: \n\"That’s how I felt when I finished the song. 'Oh my God. It’s so good!' [Laughs] So there had to be a way that I could express myself. So I had to find some of my favorite quotes from my favorite movies. I put on Billy Madison and just watched that. There were so many lines that I picked that were great. But “I’m the smartest man alive!” resonated with me. And Adam Sandler is like a god", "-24.665424215876556" ], [ "slogan \"Be Best\" has also been criticized for having an apparent grammatical error, as it is missing a definite article. The Guardian noted Mrs. Trump's native language, Slovenian, does not use definite articles, and speculated whether the name constituted one-upmanship after Michelle Obama's call to \"Be Better\". Mrs. Trump's senior adviser, Stephanie Winston Wolkoff, called the slogan \"illiterate\" and pushed for an alternative slogan, \"Children First\", which the First Lady rejected due to the similarities with her husband's \"America First\" branding.", "-24.583923680824228" ], [ "To say the right thing, to act the right way\", since \"the boys watching today will be the men of tomorrow.\" As a result, the original slogan is re-worked to reinforce this message, becoming \"The Best Men Can Be\".\nThis campaign includes a companion website, and a pledge by Gillette to donate $1 million per-year over the next three years to organizations, such as Boys & Girls Clubs of America, that \"[help men] achieve their personal best\". In the aforementioned website, Gillette explains the campaign by stating that \"as a company that encourages men to be their best, we have a", "-24.579710350983078" ], [ "Please laugh! Please be nice to us! How are you guys!?) followed by his totally meaningless line such as \"Do you twirl pasta lately?\", \"Do you zip lately?\", \"Do you close curtains lately?\", etc. Then, usually Iwasaki warns him \"Too friendly (to the audience)! What are you saying...\" and moved on to a main dialogue, saying \"Listen, I am thinking I would like to...(i.e. travel abroad, buy a pet, ride a motorcycle, etc.).\" Ueda does not respond properly, acts as if dropping things that has just popped up in his mind, and keeps shooting silly comments. In the end,", "-24.530141370923957" ], [ "– good solid days I mean – is usually all that I'm good for.\"\nHis approach never varied. He would find an area, a subject matter that interested him, and he would return to it almost obsessively for an inordinate amount of time. Over a period of time, he would get to know the place and the people involved, whether they were the marginalized men who lived at the Fulton Fish Market or the staff at the New York Aquarium. He would photograph for several hours, return home, and process his film. He would print and re-print his best", "-24.491059783147648" ], [ "responds, \" well these are my salad days\"\nIn the 1987 Joel and Ethan Coen film Raising Arizona, Nicolas Cage as H.I. “Hi” McDunnough uses the expression twice in the first few minutes of the film. Speaking as the background voiceover rather than as a character, he first says, “These were the happy days, the salad days as they say, and Ed felt that having a critter was the next logical step. It was all she thought about.\" A few moments later, again as the voiceover, he says, \"Our love for each other was stronger than ever, but I preminisced", "-24.480093012796715" ], [ "word \"no\" means; and Pam Halpert (Jenna Fischer) is \"easily the most creative and kind person [he has] ever worked with\". Andy concedes to Robert that putting Gabe Lewis (Zach Woods) in the losers' column was \"astute\". He then demands the Columbus half day and exits, prompting a respecting smile from Robert. Though the office annually gets the half day in any case, they happily wish him good evening as they depart, and Andy looks very pleased with his work as the boss.\nPam is pregnant with her and Jim's second child (revealed to be a boy) and is emotional, easily", "-24.280783084774157" ], [ "Tarantino’s movie Reservoir Dogs.\nThe name of the show in Spanish is a commonly used phrase meaning \"whatever it takes\" (literally: \"whoever might fall\"), as a reference to the unorthodox interviewing methodology.\nA recurring segment is \"Proteste Ya\" (\"Protest Now\"), which involves the people of a certain neighborhood or home area sending an e-mail to an e-mail address especially reserved for Proteste Ya, complaining about government negligence in their neighborhood. The CQC journalists then go to that neighborhood, find out about the problem and try to force the person responsible to make a commitment to improve the situation, often taking something from", "-24.256151323352242" ], [ "figure out, hold up, brace up, size up, rope in, back up/off/down/out, step down, miss out, kick around, cash in, rain out, check in and check out (in all senses), fill in (\"inform\"), kick in or throw in (\"contribute\"), square off, sock in, sock away, factor in/out, come down with, give up on, lay off (from employment), run into and across (\"meet\"), stop by, pass up, put up (money), set up (\"frame\"), trade in, pick up on, pick up after, lose out).\nNoun endings such as -ee (retiree), -ery (bakery), -ster (gangster) and -cian (beautician) are also particularly productive. Some verbs", "-24.222567744669504" ], [ "say such things as \"Dey do dough, don't dey dough\" (They do though, don't they though), and \"Alright! Alright! Calm down, calm down\", which is what one of them says when the other two start arguing. The Self-Righteous Brothers Frank and George Doberman are a pair of opinionated, middle-aged men who spend their time in the pub discussing celebrities they admire. Most are only referred by their surnames, or outrageous alternative names. They describe a kind gesture they would make to the celebrity if they ever met, but then get distracted by an implausible, hypothetical situation and become irate", "-24.200550217414275" ], [ "his most often used quotes is \"How dare you!\" He has also been known to say \"Thank you very little!\", and \"That's a separate issue!\" He often remarks to those who pry into his business, \"That's none of your affair!\" When he feels that he is being pushed around or told what to do (usually by his daughter, Carrie), Arthur often responds by implying that the person is a dictator (e.g. \"yes, mein fuhrer!\") or a smear tactic politician (e.g. \"no thank you Senator McCarthy!\").\nHe almost invariably addresses or refers to Doug by his full name \"Douglas\". Likewise, when", "-24.142161551862955" ], [ "nice day\" to be insincere. The student said that Americans \"say things like that with this big fake smile on their face, and they don't really mean it\". Not having the context of the metaphor, the student took the phrase literally and was unable to discern the intended cordiality. Conversely, when Americans visit stores in Britain where the salespeople engage not in \"have a nice day\" salesmanship, Americans regard British as lacking customer service.\nGuy Browning penned an article in 2007 titled \"How to... have a nice day\" for The Guardian, writing that sarcasm will creep into the discussion if the", "-24.08253618470917" ], [ "A. J. After Hours A. J. After Hours is a television program that aired on the E! cable network in 2001. The talk show, hosted by gossip columnist A. J. Benza, was described as a show that \"mixes interviews with comedy sketches and man-on-the-street segments, and which explores the New York's hip club scene.\"\nThe program received mixed reviews with Entertainment Weekly calling the show \"retro sexist...contempo goofy...hairier than The Man Show,\" and Andrew Wallenstein, writing for Media Life, said the show \"is about as compelling a talk show as The Magic Hour,\" referring to Magic Johnson's failed attempt at a", "-24.053337566962" ], [ "Call for Fun Plot Call For Fun is a ‘coming of age’ film that tells a tale of a smart college kid who is learning the hard way about the various nuances of business life and later coming out of it triumphantly. It portrays the modern day youth who still have their Indian values in place.\nThe movie features Yash(Zaan Khan) who is an easy going, intelligent young man who loves adventures and is fun loving. He is grounded in life, but eager to achieve great success, but as soon as he can!\nJust when Yash’s college gets over, Yash parents Dev", "-24.039500668048277" ], [ "My Laugh Comes Last My Laugh Comes Last is a 1977 thriller novel by British writer James Hadley Chase. Plot summary Larry Lucas is a small-time worker, who is one day approached by a millionaire, Farell Brannigan, to assist him and start a new bank in town, which should be the safest in the world. Thrilled by the offer, Larry jumps for it, starts minting money and enters high class circles, only to come across a series of problems on the way, involving deception, hypocrisy, treachery, murder, blackmail. The rest of the story is about how and whether Larry is", "-23.96036662976985" ], [ "ending. \"Have a nice day\" was the apt phrase for those who serve people they do not know to end a transaction.", "-23.905594696174376" ], [ "and somehow manage to have a good time, all because of some loose-lipped cashier. 'Have a nice day ...' Maybe I don't feel like having a nice day. Maybe, just maybe, I've had 116 nice days in a row and I'm ready, by God, for a crappy day.\"\nWilliam Safire of The New York Times wrote that when the speaker of the phrase is genuine and maintains eye contact, the act is a \"social asset and a note of civility\" in a busy world. However, he stated that when the phrase is robotically said or said in a tone similar to \"get", "-23.86206472709455" ], [ "him away. Title reference The episode title is a quote from Act III, Scene III of William Shakespeare's play Othello, wherein the title character bids farewell both to being happily married and also to his career as a military general, after receiving news his wife has been unfaithful. He feels he can no longer experience \"pride, pomp, and circumstance of glorious war.\" Reception The episode received mixed reviews from critics. Adam Raymond of New York Magazine conveyed his happiness about seeing trains in the episode: \"Before last night’s episode, I was ready to rename it Hell on Hooves because, you", "-23.842167166236322" ], [ "\"be nice\".", "-23.836360769637395" ], [ "use was by UK folk-singer Jeremy Taylor, in a song he wrote in the late 1960s:\nJobsworth, Jobsworth, It's more than me job's worth,\n\nI don't care, rain or snow,\n\nwhatever you want the answer's no,\n\nI can keep you waiting for hours in the queue,\n\nand if you don't like it you know what you can do.\nThe term became widespread in vernacular English through its use in the popular 1970s BBC television programme That's Life! which featured Esther Rantzen covering various human interest and consumer topics. A \"Jobsworth of the Week\" commissionaire's hat was awarded each week to \"a startling tale of going by", "-23.81175432447344" ], [ "Wellington.\" Then, why don't you say \"Your Grace to him ?\" \"Grace ?\" says I, \" why should I say grace for? there's no meat here. Where's the viands? Why, I said sir to him—a common title of respect between man and man.\" \" Well,\" says he, \" you are a rum sort of customer, you are. What do you call the Duke ?\" \"What do I call him ?\" I says ; \"a wholesale carcase butcher! Look at his career. He begins by going to France to learn the art of war, and then he goes to India and kills thousands of natives who", "-23.75749830629502" ], [ "Nice guy A nice guy is an informal term for an (often young) adult male who portrays himself with characteristics such as being gentle, compassionate, sensitive and vulnerable. The term is used both positively and negatively. When used positively, and particularly when used as a preference or description by someone else, it is intended to imply a male who puts the needs of others before his own, avoids confrontations, does favors, gives emotional support, tries to stay out of trouble, and generally acts nicely towards others. In the context of a relationship, it may also refer to traits of honesty,", "-23.756398127428838" ], [ "\"so much deeply felt good will\" permeating through the world that shallow friendliness ought to desist. She stated that for her, saying \"goodbye\" is sufficient because it expresses the same well-wishing farewell sentiment. Leil Lowndes wrote in her 2009 book How to Instantly Connect with Anyone that if someone says \"have a nice day\", the recipient should refrain from sarcastically responding \"Thanks, but I have other plans\" or \"Gee, I was planning on having a miserable one, but now that you mention it, I think I'll have a nice one.\" Lowndes suggested that the response merely be \"You, too.\" Defense Carol", "-23.739700995502062" ], [ "corruption. Contrast this to the retired man, a man of leisure that is fully rested and happy when he arises. He praises God for the gifts he has received, which can not be matched by the luxury items of the busy man. He immediately engages in an honest task or an agreeable lesson. He then waits for sunrise with calmness of mind. He has a happy heart and peace of mind with good intentions for his upcoming daily activities.\nIn the second chapter, he talks of the daily sunrise. Each man, businessman and retiree, has their own prayers. The businessman is", "-23.720574953767937" ], [ "written by James Cameron and William Wisher Jr. The phrase is featured in an exchange between the film's characters John Connor (Edward Furlong) and The Terminator (Arnold Schwarzenegger), where the former teaches the latter the use of slang:\nJohn Connor: No, no, no, no. You gotta listen to the way people talk. You don't say \"affirmative\" or some shit like that. You say \"no problemo\". And if someone comes on to you with an attitude, you say \"eat me\". And if you want to shine them on, it's \"hasta la vista, baby\".\nT-800: Hasta la vista, baby.\nThe Terminator says the phrase again", "-23.650495176087134" ], [ "things we all should do every day. We should do this every day of our lives. Number one is laugh. You should laugh every day. Number two is think. You should spend some time in thought. And number three is, you should have your emotions moved to tears, could be happiness or joy. But think about it. If you laugh, you think, and you cry, that's a full day. That's a heck of a day. You do that seven days a week, you're going to have something special.\nValvano's ESPY acceptance speech became legendary. He closed by saying that \"Cancer can", "-23.55865015980089" ], [ "it is intended to imply a male who puts the needs of others before his own, avoids confrontations, does favors, gives emotional support, tries to stay out of trouble, and generally acts nicely towards others. In the context of a relationship, it may also refer to traits of honesty, loyalty, romanticism, courtesy and respect. When used negatively, a nice guy implies a male who is unassertive, does not express his true feelings and, in the context of dating (in which the term is often used), uses acts of ostensible friendship with the unstated aim of progressing to a romantic or", "-23.50219699484296" ], [ "she is indifferent to it being used insincerely or 1,000 times a day. She wrote that \"have a nice day\" is \"soothing, even kind\", in that it improves the interactions among millions of people crowded together.\nWilliam F. Wyatt Jr. of the Chicago Tribune wrote that \"have a nice day\" used to be new and \"fill[ed] a needed slot\". \"Goodbye\", he stated, inappropriately indicates that salespeople are intimate with customers they do not know and would seem forced. \"Farewell\", Wyatt said, would feel abnormal and could only be employed in an ironic context. The close of a transaction needed an oral", "-23.50019014062127" ], [ "they could all be right. Piglet suggested that they should ask the narrator what a perfect day is. The narrator told them that everyone has their own perfect day, because everyone is different. Pooh, Piglet, Eeyore and Tigger then sang a song, celebrating their differences. After the song, Pooh realized that they forgot to ask Piglet what his perfect day is. Piglet responded that as long as he's with his friends, every day is a perfect day. The narrator then said goodbye, ending the story. Finale The scene then shifted back to Bear's house, where Bear suggested that if everyone", "-23.437596370709798" ], [ "The Last Laugh (1924 film) Plot Jannings' character is a doorman for a famous hotel, who takes great pride in his work and position. His manager decides that the doorman is getting too old and infirm to present the image of the hotel, and so demotes him to a less demanding job, of washroom attendant. He tries to conceal his demotion from his friends and family but, to his shame, he is discovered. His friends, thinking he has lied to them all along about his prestigious job, taunt him mercilessly while his family rejects him out of shame. ", "-23.426945519866422" ], [ "or \"thank you for using our service\", it is commonly used among people in the United States and by retailers in New Zealand and elsewhere. In the 1970s, the American supermarket chain Kmart opened a store in Brisbane, Australia. The workers were trained to say, \"Thank you for shopping at K-Mart. Have a nice day.\"\nOther versions of \"have a nice day\" are \"have a good one\" and \"have a nice one.\" The phrase was universalized after 1950 by truck drivers conversing on their CB radios. Scientific studies indicate that people who regularly smile are more likely to say \"have a", "-23.40765484009171" ], [ "man too is living an empty life by dreaming of becoming an artist but doing nothing to achieve it, and instructs him to ask himself what he is really meant to do in life.\nThe man becomes depressed and unfocused at work, angering his boss. He receives a text message instructing him to catch a particular bus. On board are Kana and Sensei; Kana is wearing a remote-controlled vibrator. Sensei gives the man the control and exits the bus, leaving the pair to pleasure each other. Seeking information about Kana, the man goes to the bar, where Sensei introduces his newest", "-23.394054828269873" ], [ "In an interview with Splitsider, Scott explained the conclusion of the series: \"It's a lot of work for such a short, stupid thing... they're really fun and they're fun to make, but we're ready to move on.\"", "-23.370935927378014" ], [ "as he has forgotten his way back home after shopping for vegetables. The film is more than just the walking conversation between the two, as the younger man safely guides the older counterpart back to his home, where a concerned daughter awaits. The Last One Directed by: Noopur Bora\nIn the ‘Joy of Giving Week’, our dude is on a mission of targeting as many under privileged people as he can, and bring smiles to their faces. He's found his mission to be extremely easy and has also grabbed a lot of attention on social media. He's been successful in bringing", "-23.3683894185815" ], [ "I'll stand for is ideas to get the better of me! I know that rubbish from '18 ..., fraternity, equality, ..., freedom ..., beauty and dignity! You gotta use the right bait to hook 'em. And then, you're right in the middle of a parley and they say: Hands up! You're disarmed..., you republican voting swine!—No, let 'em keep their good distance with their whole ideological kettle of fish ... I shoot with live ammunition! When I hear the word culture ..., I release the safety on my Browning!\"\nSCHLAGETER: What a thing to say!\nTHIEMANN: It hits the mark! You can", "-23.368084630579688" ], [ "In Celebration by David Storey, in a way that suggests it is already a well-known one-liner to the audience.\nBy 1973, \"that's what she said\" had already been characterized as an \"ancient one-liner\". In the early 1990s, it was a recurring joke in the Saturday Night Live sketch \"Wayne's World\". In the movie of the same name, the character, Wayne Campbell, uses the phrase after his partner Garth says, \"Hey, are you through yet? 'Cause I'm getting tired of holding this\", in regard to a picture he is holding. An 1896 recording by Len Spencer of the song \"All Coons Look", "-23.344384956988506" ], [ "response, the manager stated \"Don’t worry, it’s on the house. Lower our taxes and we’ll call it even.\" In response, Biden came back later to the manager and said, \"Why don’t you say something nice instead of being a smartass all the time?\" The story was covered by both local and national news agencies.", "-23.321512727838126" ], [ "The Good Things (film) Plot Wil Wheaton portrays Zach Means, a frustrated Kansas tollbooth worker whose friend has invited him to take a round-the-world cruise with him. While desiring to take him up on this offer, Zach is hesitant to leave behind his familiar surroundings to enter the great unknown. The film focuses on a day in Means' life at the Matfield Green tollbooth, an isolated exit miles away from any sizable settlements, where Means spends much of his time hitting golf balls while waiting for the occasional driver to pass through his station. During the course of the day,", "-23.314959759183694" ], [ "better came up. InBev chief marketing officer Miguel Patricio said in an interview at Business Insider's IGNITION conference that the phrase \"doesn't mean anything. That's the beauty of it. I think that we all need our moments of nonsense and fun.\"\n\"Banquet\" was filmed at a church in Manhattan, New York City. It began running in August 2017. Wieden+Kennedy wanted to do something timed with the Game of Thrones season finale. The story was set in medieval times, where subjects present gifts to the king and queen. As each one brings more cases of Bud Light, the king (portrayed by actor", "-23.281810014126677" ], [ "me: goodbye!\" However, in the final episode of the seasons, Paxman ends the show with \"It's goodbye from (name of the season's winner, who wave and say goodbye), and it's goodbye from me: goodbye!\" Production While the starter questions are being read out, the teams are shown on screen one above the other by means of a split-screen effect. When a player buzzes in, the shot zooms in to that player, accompanied by a voiceover identifying the player by team and surname, for example \"Nottingham, Munro\". The voiceovers are performed live in the studio by Roger Tilling and become more", "-23.263721774153964" ], [ "wrote in his 2007 book Some Day Never Comes that the phrase causes people to feel they have an obligation to have a nice day. Mike Royko wrote in his 2002 book For the Love of Mike that people may have a bad day, not a nice one, because they \"confront a demanding boss, a nasty customer, a crabby teacher\".\nAccording to author John Tschohl, the tediousness of the phrase is exemplified by employees uttering the words so faintly as to be barely audible. The phrase is occasionally used in an ironic manner when others have been disrespectful or have negatively impacted", "-23.261203952657524" ], [ "is excited, he adds \"After Kar\" at the beginning of his signature sentence. This is a combination of \"After All\" and \"Aakhir Kar\" (Urdu: آخر کار). Both of these phrases have the same meanings in English and Urdu respectively.\nHe always wears a janitor's wiper like a rifle on his back. His well-intentioned misadventures and indulgence into the private lives of the guests often put him in trouble with Mr. Shameem, and Mrs. Shameem comes to his rescue, who has sisterly affection for him.\nHe has a fiancée named Jeeran who lives in his village. He often daydreams about her while working.\nRambo,", "-23.239495077483298" ], [ "I'm alright, Jack I'm alright, Jack is a British expression used to describe those who act only in their own best interests even if assistance to others would necessitate minimal effort on their behalf. It carries a pejorative tone and is relatively rarely used to describe the speaker: \"I limped down the aisle and asked a fellow to move along one seat so I could sit down, but he refused: \"I'm alright Jack\". So I hit him with my crutch, your Honour.\"\nThe phrase is believed to have originated among Royal Navy sailors, where a ladder was slung over the side", "-23.235550814075395" ], [ "mean anything to you?\" is singled out as the best line of the episode. The authors of Friends Like Us: The Unofficial Guide to Friends call it a \"good, solid start to the series\" but \"the regular cast (particularly Perry and Schwimmer) might be trying just a little too hard\". Schwimmer recalls enjoying the physical humor involving Ross, particularly the scene where Ross greets Rachel and opens an umbrella on her.\nThe episode was syndicated for the first time on September 21, 1998. Several deleted scenes were restored to the episode, bringing its total running time to 37 minutes, for a", "-23.23128130749683" ], [ "visits the office, he spends half of his time working out of the conference room, and occasionally ventures out and wanders around, randomly choosing employees to have conversations with, an experience that Jim describes as simultaneously terrifying and highly desirable. Robert makes a list of all the workers in the office, dividing them between perceived \"Winners\" and \"Losers\"; after finishing the list, he takes the winners out to lunch. When confronted about the list, after he and the winners return, he states that those are his impressions, and they could change, challenging the office with: \"winners: prove me right; losers:", "-23.22636685652833" ], [ "congratulations, and appreciation of a job well done. It is normal for an African working in his own garden to be thanked for his work by a passing stranger. If one buys a new car in Uganda, or wins a race, one should not be surprised to find themselves being thanked.\nPeople are also thanked early in the morning as a form of greeting. Therefore, a Luganda speaker may translate \"gyebale\" by saying \"well done\". They are just greeting others by way of thanking them for their usual work, not necessarily for a particular task.\nThe expression well done is extrapolated to", "-23.1991954378027" ], [ "Good Work (talk show) Broadcast Good Work premiered on Tuesday, April 14, 2015, in the United States on the E! cable network at 10/9pm ET/PT, following another plastic surgery-based series Botched, which also features Terry Dubrow. The talk show continued to air on Tuesday nights and concluded on May 19, 2015. The series is additionally broadcast on local versions of the network worldwide; in Australia, the series premiered on April 22, 2015, and on May 5, 2015 in the United Kingdom.", "-23.18664208916016" ], [ "Swiderski of the Chicago Tribune wrote that although saying \"have a nice day\" may not be sincere, the speaker has acknowledged that the recipient is there. She argued \"[h]ave we become so analytic that we can't accept these little niceties without asking ourselves, 'Did he really mean it? Does she really care if I have a nice day?'\" Writing that society has become so automated that going through a check-out line at a grocery store without having made eye contact or spoken with the checker is possible, Swiderski favored \"insincerely meant human kindness to a robot\". She encouraged people to", "-23.118079456617124" ], [ "He's still the same Norm. I think he's the toughest to write for because he's not really anything. He's just funny.\n— George Wendt, November 1989 Role Norm's entrance into the bar is a running gag on Cheers, typically beginning with a greeting by Norm. This is followed by the bar crowd yelling his name (except Diane Chambers, who would follow with a more refined \"Norman\"). Norm is also greeted with the customary \"Norm!\" shout at other locations, including a bowling alley (\"From Beer to Eternity\", season 4, episode 9), The Hungrey Heifer (\"Cheers: The Motion Picture\", season 5, episode 24), and", "-23.09938448300818" ], [ "is repeated in many episodes, and is often modified to fit whatever clothing Barney is wearing, such as \"Flight suit up\", \"Snow suit up\", and even \"Birthday suit up\". He also uses the word \"awesome\" to describe anything that he finds remotely pleasing, and invents different kinds of \"high-fives\" for every occasion. However, Barney's arguably most famous catch phrase is \"Legendary!\" which he uses to describe anything and everything fun and exciting (In fact, Ted says that he over-uses it). When saying something is legendary, he typically says \"it's going to be Legen... wait for it... dary! Legendary!\" He also", "-23.090011207794305" ], [ "his opening and closing remarks:\nFor the past two weeks you've been reading about a bad break. (pause) Today I consider myself the luckiest man on the face of the earth. (cut) When you look around, wouldn't you consider it a privilege to associate yourself with such fine-looking men as are standing in uniform in this ballpark today? (cut) ... that I might have been given a bad break, but I've got an awful lot to live for. Thank you.\nThe crowd stood and applauded for almost two minutes. Gehrig was visibly shaken as he stepped back from the microphone, and", "-23.043887341977097" ], [ "difficult than he had expected, and this often has him expressing admiration and respect for the workers' skills and their willingness to take on jobs that most people avoid. Every episode begins with the following narration by Rowe, the first sentence of which is spoken on-camera while he is in the midst of a disagreeable task:\nMy name's Mike Rowe, and this is my job. I explore the country looking for people who aren't afraid to get dirty — hard-working men and women who earn an honest living doing the kinds of jobs that make civilized life possible for the rest", "-23.039627681253478" ], [ "saying that they did a \"Good job\".", "-23.037617093414156" ], [ "The Last Word (2008 film) Plot An odd-but-gifted poet, Evan Merck (Wes Bentley) makes his living writing suicide notes for the soon-to-be departed. So when he meets Charlotte (Winona Ryder), the free-spirited sister of his latest client, Evan has no choice but to lie about his relationship to her late, lamented brother. Curiously attracted by his evasive charms, a smitten Charlotte begins her pursuit, forcing Evan to juggle an amorous new girlfriend, a sarcastic new client (Ray Romano) and an ever-increasing mountain of lies.", "-23.03163673763629" ], [ "more things, even if we don’t really have the free time to use those things.\n— Brook Silva Braga Synopsis The film is billed as \"around the world in 90 minutes.\" Its title describes the feeling that, \"On a trip around the world, every day feels like Saturday.\" When \"everyday is Saturday, each new person an instant best friend,\" you need a guide to how to deal with \"always saying goodbye, and loss of connection(s).\" Silva-Braga stays in hostels around the world, showing us the \"hot spots\" of backpacking adventure—Australia, Southeast Asia, India, and London—and out-of-the-way places like Brazil, Nepal, and Thailand.", "-23.029705576016568" ], [ "you.\" The phrase may be used as a vague all-encompassing, dismissive alternative \"because the truth makes them feel shallow and embarrassed.\" An article in ThoughtCatalog used the phrase in terms of the \"sad, honest truth [that] I don’t deserve a woman as good as she\". Reception Merriam-Webster described it as a \"much-reviled, often-used excuse\". The Huffington Post described it as \"overworked and clichéd\". PsychologyToday argues that \"Opening with \"It's not you, it's me\" is just going put your partner on the defensive from the start.\"", "-23.02340621256735" ], [ "massage parlor, and she joins the group also. Along the way, the friends have many experiences and encounter obstacles which make their longtime friendship even stronger. The movie is sometimes referred to with an unofficial, alternate English title \"August Friends\", a clever double entendre, because the word \"august\" can mean \"venerable\".", "-23.0004807311052" ], [ "points are introduced by Farnsworth announcing, \"Good news, everyone!\"—either to unveil his latest invention or describe the company's latest delivery assignment, which is usually a suicide mission; he acknowledges this in The Beast with a Billion Backs. On the very few occasions he has actual good news, he often opens with \"Bad news, everyone!\" After Fry resigns from his job in \"Law & Oracle\", he states that he only says these phrases to make Fry \"feel better about his pointless job.\" Another is his exclamation, \"Sweet zombie Jesus!\" He often says \"Eh Wha?\" when unaware of the situation, or", "-22.98417657194659" ], [ "End Talk is done by the band alone and the length of the segment is longer than usual, often answering questions from the fans they get through the program's website.\nInternational guests include: Michael Jackson, Bon Jovi, James Brown, Stevie Wonder, Justin Bieber, Backstreet Boys, The Black Eyed Peas, Earth, Wind & Fire, Lady Gaga, Beyoncé, Taylor Swift, Ariana Grande, Mariah Carey, Katy Perry, etc. Love Awards The Love Awards honor the best clips of the year with scenes that never aired on the program. S-1 Grand Prix The S-1 Grand Prix features a series of games with the losing team", "-22.978727436857298" ], [ "\"a new chapter in their relationship\". The title was initially as a joke, and originally intended to be \"Your Bottom\", giving viewers the fun of saying things like \"I saw Your Bottom last night\", and \"I love Your Bottom\"; Mayall said that Alan Yentob, then head of BBC2, took a dislike to the name and so he and Edmondson went with it. He added, \"It's about two guys at the bottom of the heap ... we called it Bottom to make people think we were doing bottom jokes\". \"It's rude, stupid, and a waste of license payers' money\". Filming Each", "-22.97239411668852" ], [ "Thank You for Being Late Contents The book is divided into four parts - Reflecting, Accelerating, Innovating and Anchoring. When a friend arrived late for lunch, Friedman said, \"Thank You for Being Late\", as it gave him time to reflect, to listen to what was taking place around him and to slow down the pace. He begins by sharing a conversation with a fellow blogger, who also happened to be working as a parking attendant. The unlikely pair ended up spending time together as Friedman helped the blogger refine his process. This led to his own deeper reflection on defining", "-22.966006994247437" ], [ "An Evening of Long Goodbyes Synopsis An Evening of Long Goodbyes is about a 24-year-old wealthy layabout who prefers to watch Gene Tierney movies in his chaise longue, with a gimlet in hand, rather than go out and find a job.\nCharles Hythloday is a Trinity College dropout living with his sister, Christabel (\"Bel\"), in their parents' mansion, Amaurot (named after the capital city of More's Utopia). There are only two things that Charles loves more than the film actress, Gene Tierney; his home and his struggling actress sister. While Charles loves his childhood home, Bel notices it makes people become", "-22.927636219683336" ], [ "just the best. And he called my house when I was fifteen, and [asked] \"Do you wanna do something with us?\", not knowing anything about me. Yeah, Tony's the man. Sure, he's the best.\nIn 2012, Reynolds recruited Hawk's son Riley Hawk for Baker and explained the process in an online interview:\n\n... I [thought], \"it's kinda touchy, you know what I mean, like?\" It's kind of weird, you know? Tony's kid, he rides for Birdhouse. But I look at it [and] I picture him on Baker, you know what I mean? So we just approached Tony [and said] \"We want to", "-22.926657238509506" ], [ "to say \"I really don't care about that word. They painted over it. End of story.\"", "-22.921300197485834" ], [ "job done well (e.g. \"Give that kid a chocolate fish\") so much so that a phrase suggesting a person be awarded one can be said regardless of availability of the treat (and either as a compliment or sarcastically).", "-22.909575277299155" ], [ "(\"What an ugly/bitter/moody face\"); or luck—either good or bad. \"Me fue para el orto\" and \"Me fue como el orto.\" mean \"I had an awfully bad luck on that\". \"Tiene un orto que no se puede creer\" may mean \"He/She is incredibly lucky\" but can also be an appraisal of a someone's derrier, depending on context. Cagar Cagar, just as in Portuguese, is a verb meaning \"to shit.\" It also means to screw (something) up, e.g. ¡Te cagaste los pantalones! (\"You shit your pants!\"). Particularly in Spain and Cuba, there are a number of commonly used interjections incorporating this verb,", "-22.90246426478552" ], [ "Are You Ready? (Fatty Gets a Stylist song) Promotion \"Are You Ready?\" has been used in a New York Lottery advertisement on US television and for advertising the Seven Network, in which actors from various shows mime to the words while walking, ending with Alf Stewart from Home and Away yelling the end line \"Let's go!\". Montage version The original video premiered on the official Fatty Gets a Stylist channel on August 14, 2010 along with a similar montage video for \"The Devils In the Details\", which premiered the day before.\nThe video features footage from the early 20th century of", "-22.895172078628093" ], [ "man tells him the cafe is closed. After he leaves, the waiters resume their discussion. The young waiter wants to hurry home to his wife; the older waiter is more thoughtful. He muses on youth and observes that he is now one \"of those who like to stay late in the cafe,\" likening himself to the old man. He mentions the importance to some people of having \"a clean, well-lighted place\" in which they can spend time. After the young waiter leaves, the older waiter reflects on the emptiness of his own life and returns to his home and his", "-22.89368577802088" ], [ "\"Sir, you are a brave man.\"", "-22.87633628724143" ], [ "Kath Skerry declared that the episode was \"brilliantly written, acted, and well paced. It was filled with twists and turns that I didn’t see coming. And I know that it sounds cliche, and I know saying it sounds cliche, sounds cliche. Maybe I’m being cliche but I don’t care. I am what I am – a full fledged Office addict who got exactly what she wanted, and in fact needed from the finale.\" James Poniewozik of Time magazine voiced similar sentiments, believing the finale to be a \"good if not great season-ender, and if the conclusion didn't have the holy-crap", "-22.874801886559" ], [ "The Best Men Can Be Synopsis The introductory short film for the campaign, \"We Believe\", directed by Kim Gehrig, begins by invoking the brand's slogan since 1989, \"The Best a Man Can Get\", by asking \"is this the best a man can get?\" This is followed by scenes demonstrating negative behavior among males, including bullying, sexism, sexual misconduct, and toxic masculinity, acknowledgement of social movements such as #MeToo, and footage of actor Terry Crews stating during Congress testimony that men \"need to hold other men accountable\". The ad continues on to explain that \"we believe in the best in men:", "-22.85708783287555" ], [ "in images for 'Aubergine Corner'.\nThe original catchphrase for the podcast was decided on 2 May 2014 to be \"keep smiling\", however later Greg began to sign off the podcast with the line \"and that (as they say in the business) is the end of the podcast\", which was unofficially adopted as the primary catchphrase. Recently, Greg's sign off has been 'Goodbye forever!'.\nOn occasion, producer Pippa has accompanied Greg while Chris was away and on one occasion, Chris co-hosted the podcast remotely, whilst away taking part in a video journalism course. On another occasion, another 'Chris Smith' from Peterborough (Chris Smith", "-22.85064486390911" ], [ "Good-bye (プラスティック・メモリーズ Say to good-bye), features Michiru Kinushima as the protagonist. It began serialization in the June 2015 issue of ASCII Media Works' Dengeki G's Comic. The first tankōbon volume, which contains chapters published before the serialization, was published on April 27, 2015. Video game A video game adaptation developed by 5pb. for the PlayStation Vita was released in Japan on October 13, 2016.", "-22.840919112379197" ], [ "is \"Take It Like a Man\".", "-22.810615811962634" ], [ "over the past 12 months. The distinction is supposed to go to the person who, \"for good or ill\", has most affected the course of the year; it is, therefore, not necessarily an honor or a reward. In the past, such figures as Adolf Hitler and Joseph Stalin have been Man of the Year.\nIn 2006, Person of the Year was designated as \"You\", a move that was met with split reviews. Some thought the concept was creative; others wanted an actual person of the year. Editors Pepper and Timmer reflected that, if it had been a mistake, \"we're only going", "-22.797213945537806" ], [ "said, is to create a product that is \"demonstrably superior and pleasingly different from the competition in some significant ways.\" According to a 1994 profile in Golf Digest, \"In his sixty-plus years in business, Callaway's reputation for honesty, ethics, and generosity is unblemished.\"\nEly Callaway often repeated the phrase, “Good ethics is good business.” He was actively involved in minority issues and rights, and was chairman of the National UNCF Corporate Campaign. He donated generously to Emory University, as well as the local community near Carlsbad, California and the Callaway Golf Foundation. He also stated, \"What is good in life is", "-22.779381671687588" ], [ "find it quite reassuring. We've had the odd email or mums saying they look at it as a bit of an inspiration that while things are difficult, you can do good things with your life.\" Le Brun met with people from Asperger's organizations and was pleased with the positive reception.", "-22.7632299091988" ], [ "announcing the end of each hour-long lesson by uttering the word finis (Latin for \"end\") has long been abandoned due to the introduction of electrical bells and public address systems.", "-22.75670900050318" ], [ "pop culture references. For example, each hour of the show once opened with an arcane reference. The first hour's opening phrase was a combination of dialogue from the film Thank You for Smoking and a U.S. space program slogan coined by Alan Shepard: \"What's up, Hiroshi? Let's light this candle!\" Miller's other opening phrases for his second and third hours respectively were \"Come to me my babies, let me quell your pain\", (Powers Boothe as Jim Jones in Guyana Tragedy: The Story of Jim Jones) and \"ABC – Always be closing if you want the knife set\" (from Glengarry Glen", "-22.755989303987008" ], [ "and only the ending caused more reaction from his listeners:\nWe say to you that you have made the definition of a business man too limited in its application. The man who is employed for wages is as much a business man as his employer; the attorney in a country town is as much a business man as the corporation counsel in a great metropolis; the merchant at the cross-roads store is as much a business man as the merchant of New York; the farmer who goes forth in the morning and toils all day, who begins in spring and toils", "-22.752985112834722" ] ]
3yasuv
What (Who?) Exactly Defines a Reliable News Source?
[ "For my own sake I try to browse news sources from all over the world. This tends to cut down on specific left/right narratives for a specific region and allows you to extract just the relevant facts of the story. Some discretion and intelligence is needed", "Reliability is used as a way to describe a news source's reputation. Before the internet, the only way to have people listen to your news over others was to have the reputation for the most accurate and truthful information. So organizations would all try to be as reliable as possible. Now that has fallen off for mainstream news organizations, for they only want page views, but many organizations still operate they same way. This incompasses many non-profit organizations, like Human Rights Watch. If they said whatever they wanted, people wouldn't listen to them because they could not be trusted to be right, so they invest a lot of time checking their sources and such so that when they say X many civilians were killed in Syria in 2015 people trust that number.", "In a sense, no news is reliable, since it is \"spoken\" ie. choice of words. But, in order to ensure reliability, multiple news sources on one topic and prior knowledge to cross reference is needed. Some news sources may have several unbiased news but may ALSO contain biased news at the same time ie. topics that relate to that news sources' country", "A reliable news source has nothing to do with your opinion of the news itself. What makes the source reliable is that they provide as many concrete details as possible to their news and back these details up with sources themselves. For example: Bad source: Everyone at the mall was going insane yesterday when Santa refused to take pictures with a black child. This shows that there is a serious problem with racist Santas in this town. Good source: The Santa line was put on hold at the mall yesterday when Santa had to take an impromptu break yesterday. When interviewed, St nick told (reddit news) that he was developing a cough and didn't feel up to working around children. The mall security was worried about upset parents so they set up a quick process of getting them out of line and away from Santa. *including picture of security guards doing this or what not*.", "Reliable would basically be that their reporting is ethical, researched, and corroborated. It is separate from bias, which many people in this thread seem to be mixing the two. You can be reliable, and biased. Examples would be: telling only one side of a story, omission of all the facts (lying by omission), or on a more meta level by not reporting on some controversial issues, but focusing on the other side (which is what is referred to as media bias).", "Good news reads like Wikipedia. It links to original sources, shows where their poll data or statistics comes from, and talks about what both sides of an issue are arguing. Almost no news is like that though. Different companies focus on and ignore different stories and view points. Getting the full story takes piecing together information from a wide range of sources.", "Personally I believe a reliable news source tells you the information with as little conjecture as possible. However reliability is based on a person's view of the product as it meets their own set of criterion so it's impossible to definitively call a piece of media reliable or not. TL;DR: It's impossible to label media as reliable for everyone." ]
[ [ "Intelligence source and information reliability Intelligence source and information reliability rating systems are used in intelligence analysis. This rating is used for information collected by a human intelligence collector. This type of information collection and job duty exists within many government agencies around the world.\nAccording to Ewen Montagu, John Godfrey devised this system when he was director of the Naval Intelligence Division (N.I.D.) around the time of World War II. \nThe system employed by the United States Armed Forces rates the reliability of the source as well as the information. The source reliability is rated between A (history of complete", "-29.816213716952007" ], [ "are two sources of data for statistics. Primary, or \"statistical\" sources are data that are collected primarily for creating official statistics, and include statistical surveys and censuses. Secondary, or \"non-statistical\" sources, are data that have been primarily collected for some other purpose (administrative data, private sector data etc.). Release Official statistics are part of our everyday life. They are everywhere: in newspapers, on television and radio, in presentations and discussions. For most citizens, the media provide their only exposure to official statistics.\nTelevision is the primary news source for citizens in industrialized countries, even if radio and newspapers still play an", "-28.827296440191276" ], [ "to find other sources that are willing to speak on the record. This is especially useful in investigative journalism. Information about a surprise event or breaking news, whether on or off the record, is known as a \"tip-off\". Information that leads to the uncovering of more interesting information is called a \"lead\". Anonymous sources The identity of anonymous sources is sometimes revealed to senior editors or a news organization's lawyers, who would be considered bound by the same confidentiality as the journalist. (Lawyers are generally protected from subpoena in these cases by attorney–client privilege.) Legal staff may need to give", "-28.448977610947622" ], [ "conveys information facilitate mass communication, does not only produce and distribute news, but also enhances the relationship between news providers and readers. Traditional journalism based on single medium defines the role of readers as the recipient and the consumer of information. Journalists thus serve as gatekeepers, deciding which source to cover, and what kind of information the public need to know. News reporting through the television broadcasting, for example, is led by the reporter who is responsible for disseminating information to large audiences. However, with the development of technology, especially the Internet, the role of traditional news providers and readers", "-28.300105071888538" ], [ "counsel about whether it is advisable to publish certain information, or about court proceedings that may attempt to learn confidential information. Senior editors are in the loop to prevent reporters from fabricating non-existent anonymous sources and to provide a second opinion about how to use the information obtained, how to or how not to identify sources, and whether other options should be pursued.\nThe use of anonymous sources has always been controversial. Some news outlets insist that anonymous sources are the only way to obtain certain information, while others prohibit the use of unnamed sources at all times. News organizations may", "-28.2806132817459" ], [ "fact-checking With the circulation of fake news on the internet, many organizations have dedicated time to create guidelines to help read to verify the information they are consuming. Many universities across America provide university students resources and tools to help them verify their sources. Universities provide access to research guides that help students conduct thorough research with reputable sources within academia. Organizations like FactCheck.org, OntheMedia.org, and PolitiFact.com provide procedural guidelines that help individuals navigate the process to fact-check a source.", "-28.237463734574703" ], [ "to specific historical contexts and what is being studied. History In scholarly writing, an important objective of classifying sources is to determine their independence and reliability. In contexts such as historical writing, it is almost always advisable to use primary sources and that \"if none are available, it is only with great caution that [the author] may proceed to make use of secondary sources.\" Sreedharan believes that primary sources have the most direct connection to the past and that they \"speak for themselves\" in ways that cannot be captured through the filter of secondary sources. Finding primary sources Although many", "-27.5784603854554" ], [ "important to the future of the author's career and reputation. Historians consider the accuracy and objectiveness of the primary sources that they are using and historians subject both primary and secondary sources to a high level of scrutiny. A primary source such as a journal entry (or the online version, a blog), at best, may only reflect one individual's opinion on events, which may or may not be truthful, accurate, or complete.\nParticipants and eyewitnesses may misunderstand events or distort their reports, deliberately or not, to enhance their own image or importance. Such effects can increase over time, as people create", "-27.48462170402854" ], [ "Sources (website) Sources is a web portal for journalists, freelance writers, editors, authors and researchers, focusing especially on human sources: experts and spokespersons who are prepared to answer Reporters' questions or make themselves available for on-air interviews. Structure The Sources website is built around a controlled-vocabulary subject index comprising more than 20,000 topics. This subject index is underpinned by an 'Intelligent Search' system which helps reporters focus their searches by suggesting additional subjects related to their search terms. For example, a search for \"cancer\" will suggest terms such as \"chemotherapy\", \"melanoma\", \"oncology\", \"radiation therapy\", \"tobacco diseases\" and \"tumours\", as well", "-27.37032281118445" ], [ "draws conclusions from other than primary sources or secondary sources actually based on primary sources, is by definition fiction and not history at all.\n— Kameron Searle\nHowever, a primary source is not necessarily more of an authority or better than a secondary source. There can be bias and tacit unconscious views which twist historical information.\nOriginal material may be... prejudiced, or at least not exactly what it claims to be.\n— David Iredale\n The errors may be corrected in secondary sources, which are often subjected to peer review, can be well documented, and are often written by historians working in institutions where methodological accuracy is", "-27.042168871772446" ], [ "is reported, and the date on which it was reported. However, this has been criticized as insufficient because it typically does not list the original sources for the information: that is, the NGO, journalist or government responsible for the number presented. Hence, any inherent bias due to the lack of reliable reports from independent or Allied sources is not readily available to the reader. Web counters The IBC overview page states: \"Results and totals are continually updated and made immediately available here and on various IBC web counters which may be freely displayed on any website or homepage, where they", "-26.954645202538813" ], [ "sent to papers of all manner of politics, and the editors say they are able to make their own comments upon the facts which are sent to them. I therefore confine myself to what I consider legitimate news. I do not act as a politician belonging to any school, but try to be truthful and impartial. My dispatches are merely dry matter of fact and detail.\nBut into the first decade of the twentieth century, it was uncommon for to see a sharp divide between facts and values. However, during World War I, scholar Stuart Allan (1997) suggests", "-26.901967720397806" ], [ "Source (journalism) Using confidential information Off-the-record material is often valuable and reporters may be eager to use it, so sources wishing to ensure the confidentiality of certain information are generally advised to discuss the \"terms of use\" before disclosing the information, if possible. Some journalists and news organizations have policies against accepting information \"off the record\", because they believe it interferes with their ability to report truthfully, or because they suspect it may be intended to mislead them or the public.\nEven if writers cannot report certain information directly, they can use \"off the record\" information to uncover related facts, or", "-26.825790903711095" ], [ "analysts, and intelligence agencies may also subscribe.\nNews sources, collectively, described as alternative media provide reporting which emphasizes a self-defined \"non-corporate view\" as a contrast to the points of view expressed in corporate media and government-generated news releases. Internet-based alternative news agencies form one component of these sources. Associations There are several different associations of news agencies. EANA is the European Alliance of Press Agencies, while the OANA is an association of news agencies of the Asia-Pacific region. MINDS is a global network of leading news agencies collaborating in new media business.", "-26.77371050468355" ], [ "it is and we need to do that more than ever now.\nIn January 2019, at Bournemouth University, she warned postgraduate journalism students that confirming information and verifying news sources were critical in this climate of fake news. She stressed the importance of personally verifying news sources. \"Getting your person there is an absolutely standard lesson ... news is not news without verification. ...If you only have the station cat to send, send them!\" In popular culture Adie's role as a BBC television journalist covering the 1980 Iranian Embassy siege in Princes Gate, central London, is included in 6 Days. The", "-26.706060054246336" ], [ "sources It is possible to sort out models by considering the information sources used to compute Trust and reputation values. The traditional information sources are direct experiences and witness information, but recent models have started to consider the connection between information and the sociological aspect of agent's behavior. When the model contains several information sources it can increase the reliability of the results, but conversely, it can increase the complexity of the model. Witness information Witness information, also called indirect information, is what comes from the experience of other members of community. It can be based on their own direct", "-26.70062410736756" ], [ "on their ethics, their integrity and their objectivity.\"\nThe SPJ committee said news organizations that pay for sources, for whatever reason, develop an \"ownership\" interest in these stories. As a result, the public can legitimately question a news organization's credibility and doubt whether its reports are fair and accurate. At the very least, claims the SPJ, news organizations should state up front what they've paid for access and what agreements they've made with a news source. \"It's legitimate to question whether sources are telling the truth or embellishing the story a little to earn their paycheck. . . The fact is,", "-26.598211810487555" ], [ "follows: \"The duties if today’s journalist can be divided roughly into three basic functions: Hunter-gatherer of information, Filter, and Explainer. Only in our role as ‘explainer’, as storyteller, do journalists appear to have a reasonable secure position. To ‘explain’, they have to more than ‘report’… what a Prime minister or a general has to say.\" How analytic journalism supplements other forms of journalism While investigative journalism aims at exposing, analytic journalism aims at explaining. Following a trail of evidence, investigative journalism is more inclined to follow a particular guilty party, while analytic journalism is more inclined to follow that evidence", "-26.402196152070246" ], [ "provided features and fiction for their subscribers. The major news agencies have always operated on a basic philosophy of providing a single objective news feed to all subscribers. For example, they do not provide separate feeds for conservative or liberal newspapers. Fenby explains the philosophy:\nto achieve such wide acceptability, the agencies avoid overt partiality. Demonstrably correct information is their stock in trade. Traditionally, they report at a reduced level of responsibility, attributing their information to a spokesman, the press, or other sources. They avoid making judgments and steer clear of doubt and ambiguity. Though their founders did not use", "-26.319073742710316" ], [ "a notable broadcaster in times of crisis. News agencies News agencies are services which compile news and disseminate it in bulk. Because they disseminate information to a wide variety of clients, who repackage the material as news for public consumption, news agencies tend to use less controversial language in their reports. Despite their importance, news agencies are not well known by the general public. They keep low profiles and their reporters usually do not get bylines.\nThe oldest news agency still operating is the Agence France-Presse (AFP). It was founded in 1835 by a Parisian translator and advertising agent, Charles-Louis Havas", "-26.202277147411223" ], [ "The Source History The Source was started by David Mays, a Jewish Harvard University student in Cambridge, Massachusetts. Mays decided to hire his friends, Jonathan Shecter (as Editor-in-Chief), James Bernard (as senior editor) and Ed Young (as associate publisher), and the four men immediately became shareholders in the ownership of the magazine. At the time, Mays handled duties as the publisher for the magazine, and Shecter was the editor-in-chief. The magazine's offices were moved from Massachusetts to New York City in 1990, a move that was made with the intention to expand the magazine into a mainstream market publication.\nThe magazine's", "-26.168732167236158" ], [ "common scholarly frame for understanding news production is to examine the role of information gatekeepers: to ask why and how certain narratives make their way from news producers to news consumers. Obvious gatekeepers include journalists, news agency staff, and wire editors of newspapers. Ideology, personal preferences, source of news, and length of a story are among the many considerations which influence gatekeepers. Although social media have changed the structure of news dissemination, gatekeeper effects may continue due to the role of a few central nodes in the social network.\nNew factors have emerged in internet-era newsrooms. One issue is \"click-thinking\", the", "-26.158568616534467" ], [ "its name implies, \"news\" typically connotes the presentation of new information. The newness of news gives it an uncertain quality which distinguishes it from the more careful investigations of history or other scholarly disciplines. Whereas historians tend to view events as causally related manifestations of underlying processes, news stories tend to describe events in isolation, and to exclude discussion of the relationships between them. News conspicuously describes the world in the present or immediate past, even when the most important aspects of a news story have occurred long in the past—or are expected to occur in the future. To make", "-26.15771477188173" ], [ "of view in the media, Sources has added extra resources over time to help organizations and individuals to be heard. These include a calendar of events open to the media and a news release service which Sources members can use to distribute their statements and communiques via online posting and RSS. The releases are also subject indexed and integrated into the overall search structure for information on the Sources site.", "-26.138538278835767" ], [ "which communicate directly to local communities. Information overload and the wastage ratio Fred Fedler (1989), mentioned in the book, Dilemmas in the Study of Information: Exploring the Boundaries of Information Science, describes the impact of the Information age by referring to media's \"vulnerability to hoaxes\". Fedler contends \"journalists are vulnerable to information and will always be. Journalists cannot determine the truth to the stories they publish, nor check every details. They receive too many stories, and a single story may contain hundreds of details\". In the same vein, this is what majority of the specialists posits as the", "-26.105055581698252" ], [ "or the writer's opinion. Make the conclusion attention-grabbing. Characteristics of well-written news articles The article is usually on a well-defined topic or topics that are related in some way, such as a factual account of a newsworthy event.\nThe writer of a well-written article is seen as objective and showing all sides to an issue.\nThe sources for a news story should be identified and reliable.\nThe technique of show, don't tell is applied.", "-26.088585707668244" ], [ "debate over the use of anonymous sources in high-profile stories, with many newspapers implementing policies that require the usage of on-the-record sources whenever possible. In the news On September 5, 2018, The New York Times published an op-ed essay by an unnamed \"senior official in the Trump administration,\" who claimed to be part of \"a quiet resistance within the administration of people choosing to put country first.\"", "-26.084261161697214" ], [ "status, it must be supported by at least some of key decision makers as they act as guardians of the formal agenda. They also asserted that certain personages in the media can act as opinion leaders and bring media coverage to a particular issue. Government-affiliated news sources have higher success rates in becoming media agenda and have been found by a number of scholars to be the most frequently appearing of sources at the local, state, and national levels.\nNews sources can also provide definitions of issues, thus determining the terms of future discussion and framing problems in particular ways.", "-26.077224323184055" ], [ "Most have several. The reporter’s challenge is digging out all sides. Sources can help.” From the beginning, Zwicker saw Sources as a public service as well as a tool for journalists. He said that Sources aimed “to help promote a system of information fairness. Communications resources are equivalent to other basic needs – shelter, food, health care, for example. Everyone should have reasonable access to all.” Therefore, he said “we attempt to provide true diversity: access to people in organizations large and small, for-profit and not-for-profit, from low-tech to high-tech, long-established to just-launched.”\nZwicker told users that “within Sources you will", "-26.01447463131626" ], [ "authentic, which any Journalism School teaches, and the single source for several of them, SITE, which received half a million dollars in government funding in 2004, and which is the only source cited for several, has conflicts of interest that should be disclosed to readers of news outlets.", "-26.008765398088144" ], [ "and money. A study completed in 1999 estimated that nearly half of the information reported in newspapers came from information subsidies. Yet another survey suggested that most of the information received by journalists is never published. Trust in the source and content of the data are the criteria journalists use when determining whether or not they will use the material provided. Media Relations and Public Relations Practitioners (PR) Media and Public Relations Practitioners are very similar in many ways. Both parties aim to share information with the public. This information is intended to benefit the public by educating them on", "-26.004462973214686" ], [ "intelligence operations are: planning and direction; collection; processing and exploitation; analysis and production; dissemination and integration; and evaluation and feedback.\" Collection Many of the most important facts are well known or may be gathered from public sources. This form of information collection is known as open-source intelligence. For example, the population, ethnic make-up and main industries of a region are extremely important to military commanders, and this information is usually public. It is however imperative that the collector of information understands that what is collected is \"information\", and does not become intelligence until after an analyst has evaluated and verified", "-25.9912865371316" ], [ " These fact files present a brief analysis of the events in the accounts, and then present miscellaneous related facts from other similar events.\nThe book is written so as to let the reader decide for themselves whether they believe the events therein to be true or not. Audience As with all the True Stores books, it was aimed at an 11+ market, but found popularity with adults and youngsters alike.", "-25.930860828620098" ], [ "improvement of the type and quality of news data. As with any relationship, both parties must be committed to working together to achieve success. Ethical Pitfalls The words ‘fake news’ bombard news outlets today. It is now more important than ever for Public Relations Practitioners to provide honest, truthful, and accurate information to the media. It is equally important that journalists themselves authenticate information that they have been given. There is much pressure for a Public Relations Practitioner to embellish the truth for their client to make news appear better than it really is. PR Practitioners could help the communication", "-25.913450061321782" ], [ "provide a statewide conduit for news and information from a well-established news organization.", "-25.805982103540373" ], [ "records, and various databases. Evaluate sources Information used for military, commercial, state, and other forms of intelligence analysis has often been obtained from individuals or organizations that are actively seeking to keep it secret, or may provide misleading information. Adversaries do not want to be analyzed correctly by competitors. This withholding of information is known as counterintelligence, and is very different from similar fields of research, such as science and history where information may be misleading, incomplete or wrong, but rarely does the subject of investigation actively deny the researcher access. So, the analyst must evaluate incoming information for reliability", "-25.76186358526502" ], [ "Info Source Info Source is a Government of Canada agency repository of information about or collected by the Canadian government. The purpose of Info Source is to help Canadians to access information available through the Privacy Act and the Access to Information Act. Requests made under the Access to Information Act and the Privacy Act must be sent to the Access to Information and Privacy Coordinator at the institution which holds the information. The database is overseen by the Treasury Board Secretariat.", "-25.749135421738174" ], [ "termed by some probably the \"largest and most credible of all 'alternatives' in the world of news agencies.\" It is also considered by some as the \"first and only independent and professional news agency which provides on a daily basis information with a Third World focus and point of view.\"{sfn|(Boyd-Barrett| Thussu|1992|p= 94}}\nThe IPS has never possessed the resources to be a major player in the international media landscape. Because of its focus on longer background pieces and on development issues impacting the lives of people in the South instead of concise news, it is yet to be a news provider", "-25.734210219576198" ], [ "Circular reporting Circular reporting or false confirmation is a situation in source criticism where a piece of information appears to come from multiple independent sources, but in reality comes from only one source. In many cases, the problem happens mistakenly through sloppy intelligence-gathering practices. However, at other times the situation can be intentionally contrived by the original source as a way of reinforcing the widespread belief in its information.\nThis problem occurs in a variety of fields, including intelligence gathering, journalism, and scholarly research. It is of particular concern in military intelligence because the original source has a higher likelihood of", "-25.659623394305527" ], [ "chosen to include in a story to editors deciding which stories are printed or covered, and includes media outlet owners and even advertisers. History Gatekeeping as a news process was identified in the literature as early as 1922, though not yet given a formal theoretical name. In his book 'The Immigrant Press', Park explains the process, \"out of all of the events that happen and are recorded every day by correspondents, reporters, and the news agencies, the editor chooses certain items for publication which he regards as more important or more interesting than others. The remainder he condemns to oblivion", "-25.62652706170047" ], [ "in a proposed news article and ask the person whether this quotation is correct, or how to spell the person's name. Fact-checkers are primarily useful in catching accidental mistakes; they are not guaranteed safeguards against those who wish to commit journalistic frauds. As a career Professional fact checkers have generally been hired by newspapers, magazines, and book publishers, probably starting in the early 1920s with the creation of Time magazine in the US. Fact checkers may be aspiring writers, future editors, or freelancers engaged other projects; others are career professionals. \nHistorically, the field was considered women's work,", "-25.5897446169256" ], [ "role do we, as a society, expect newspapers to fulfill, and how well are they fulfilling it? Newspapers are first and foremost sources of information; they must be aware of the events that are occurring in our immediate surroundings as well as in the rest of the world and filter that information in order to relay the most relevant information to the public. They have great power in their prerogative to choose what to relay and what to withhold; they can capture specific audiences with what they select to publish. Newspapers have evolved from merely being sources of information or", "-25.586091068285896" ], [ "examining certain types of information found in news. Citizen Journalism is a notion among public citizens playing their significant roles in circulating information in news. All there is to citizen journalism is that is deals with the distributing of news by affiliates of the public utilizing the internet to proliferate that information in news. Public relations Public relations is the process of providing information to the public in order to present a specific view of a product or organization.  Public relations differs from advertising in that it is less obtrusive, and aimed at providing a more comprehensive opinion to a", "-25.513549944393162" ], [ "and a shutting out of other, potentially valuable, perspectives and sources of information.\nZwicker decided to do something about the problem, and in summer 1977, Content published its first directory issue, called Sources. Billed as “A Directory of Contacts for Editors and Reporters in Canada”, Sources listed “information officers, public relations officers, media relations and public affairs people, and other contacts for groups, associations, federations, unions, societies, institutions, foundations, industries and companies and federal, provincial and municipal ministries, departments, agencies and boards.”\nExplaining the rationale behind Sources, Zwicker said that “It’s a cliché that every story has two sides. An untrue cliché.", "-25.492850100529722" ], [ "to nutritional labels that consortium partners can use to \"provide clarity on who and what is behind a news story so that people can easily assess whether it comes from a credible source.\" In the Knight Commission's 2019 report \"Crisis in Democracy: Renewing Trust in America\", the authors not that \"[w]hile many news organizations have experimented with transparency initiatives, there are no standard best practices recognized across the industry.\" They recommended that U.S. news media leaders and an ongoing working group of experts from across the industry could identify and adopt common standards and best practices that promote transparency\" by", "-25.438630898410338" ], [ "journal of the nations in which it is interested, and the main newspapers and journals of every nation. This is a basic source of intelligence.\nIt is also common for diplomatic and journalistic personnel to have a secondary goal of collecting military intelligence. For western democracies, it is extremely rare for journalists to be paid by an official intelligence service, but they may still patriotically pass on tidbits of information they gather as they carry on their legitimate business. Also, much public information in a nation may be unavailable from outside the country. This is why most intelligence services attach members", "-25.39822094116971" ], [ "academic materials from others through social media. Massive amounts of data from social platforms allows scientists and machine learning researchers to extract insights and build product features. Using social media can help to shape patterns of deception in resumes. As a news source In the United States, 81% of look online for news of the weather, first and foremost, with the percentage seeking national news at 73%, 52% for sports news, and 41% for entertainment or celebrity news. According to CNN, in 2010 75% of people got their news forwarded through e-mail or social media posts, whereas 37% of people", "-25.388380409985984" ], [ "posts have received. Fact-checking websites and journalists Fact-checking websites FactCheck.org, PolitiFact.com and Snopes.com authored guides on how to respond to fraudulent news. FactCheck.org advised readers to check the source, author, date, and headline of publications. They recommended their colleagues Snopes.com, The Washington Post Fact Checker, and PolitiFact.com. FactCheck.org admonished consumers to be wary of confirmation bias. PolitiFact.com used a \"Fake news\" tag so readers could view all stories Polifact had debunked. Snopes.com warned readers social media was used as a harmful tool by fraudsters. The Washington Post's \"The Fact Checker\" manager Glenn Kessler wrote that all fact-checking sites saw increased", "-25.38461106860086" ], [ "of information by economic necessity and reciprocity of interest.\" Even large media corporations such as the BBC cannot afford to place reporters everywhere. They concentrate their resources where news stories are likely to happen: the White House, the Pentagon, 10 Downing Street and other central news \"terminals\". Although British newspapers may occasionally complain about the \"spin-doctoring\" of New Labour, for example, they are dependent upon the pronouncements of \"the Prime Minister's personal spokesperson\" for government news. Business corporations and trade organizations are also trusted sources of stories considered newsworthy. Editors and journalists who offend these powerful news sources, perhaps by", "-25.379383655716083" ], [ "Post-truth Post-truth is a philosophical and political concept that refers to \"the disappearance of shared objective standards for truth” and the “circuitous slippage between facts or alt-facts, knowledge, opinion, belief, and truth.” Post-truth discourse is often contrasted with the forms taken by scientific methods and inquiry. The term garnered widespread popularity, in the form of \"post-truth politics\", in the period around the 2016 United States presidential election and the Brexit referendum. It was named Word of the Year in 2016 by the Oxford Dictionary where it is defined as \"Relating to or denoting circumstances in which objective facts are", "-25.2745045237898" ], [ "single news source to multiple news sources for a topic or event. The intended purpose of this was to expand the breadth of news sources for any given headline, and therefore expose readers to a variety of viewpoints. There are startups building apps with the mission of encouraging users to open their echo chambers. UnFound.news offers an AI(Artifical Intelligence) curated news app to readers presenting them news from diverse and distinct perspectives, helping them form rational and informed opinion rather than succumbing to their own biases. It also nudges the readers to read different perspectives if their reading pattern is", "-25.247721459134482" ], [ "case has been brought to light by a journalist, law enforcement has an incentive to discover the anonymous source(s). While the source might indeed be valuable for the case in question either by providing additional information or through being a witness in court forcing the journalist to reveal the source would often be short-sighted.\"", "-25.178668757471314" ], [ "into three main categories: open-source research enabled by the Freedom of Information Act, covert operations or \"tradecraft, \" and maintenance of human systems of informants. Increasingly, data-mining of electronic records is used. Information is then stored for future use, and disseminated in a variety of ways. A local election sometimes has a staff member dedicated to reading through all of the opponents' public statements and their voting records; others initiate whisper campaigns that employ techniques of disinformation or \"black ops\" to deliberately mislead the public by advancing a pre-determined \"narrative\" that will present the opponent in a negative light.\nAnother technique", "-25.150899965810822" ], [ "to look for information, how to look and how to corroborate, interpret and decide the results. Commercial intelligence companies aggregate this information and compile it daily into a comprehensive database. Many of these commercial intelligence companies are serviced by in-country providers with researchers on the ground who can obtain information that is not otherwise easily accessible. Reasonable assurance What is reasonable depends upon factors including jurisdiction, risk, resources, and state of the art technology. For sanction matches it depends upon information provided by regulators. In all cases the suggested standard is to the civil standard of proof i.e. on the", "-25.129460466792807" ], [ "information, is used to build a real-time lie detector for social media. This will help, for example, emergency services (who already integrate social media as part of their alerting and response systems) to flag potential hoax emergencies.\nEvaluating the authority of sources automatically is also a project goal, based on the treatment of the news and information that comes from them. For example, a tweet of a BBC news article would hold more weight than one from an unknown source.\nThe project is named after the Greek goddess Pheme. Case studies Pheme addresses social media lies in two scenarios: information about healthcare,", "-25.098535057812114" ], [ "Information sensitivity Public information This refers to information that is already a matter of public record or knowledge. With regard to government and private organizations, access to or release of such information may be requested by any member of the public, and there are often formal processes laid out for how to do so. The accessibility of government-held public records is an important part of government transparency, accountability to its citizens, and the values of democracy. Public records may furthermore refer to information about identifiable individuals that is not considered confidential, including but not limited to: census records, criminal records,", "-25.0488728200487" ], [ "foreign news media, the report concluded that:\nThe CIA currently maintains a network of several hundred foreign individuals around the world who provide intelligence for the CIA and at times attempt to influence opinion through the use of covert propaganda. These individuals provide the CIA with direct access to a large number of newspapers and periodicals, scores of press services and news agencies, radio and television stations, commercial book publishers, and other foreign media outlets.\nFor domestic media, the report states:\nApproximately 50 of the [Agency] assets are individual American journalists or employees of U.S. media organizations. Of these, fewer than half are", "-25.004085104439582" ], [ "unreported scandal, or the perspective of a particular group that may fear retribution for expressing certain opinions in the press. The downside is that the condition of anonymity may make it difficult or impossible for the reporter to verify the source's statements. Sometimes news sources hide their identities from the public because their statements would otherwise quickly be discredited. Thus, statements attributed to anonymous sources may carry more weight with the public than they might if they were attributed.\nThe Washington press has been criticized in recent years for excessive use of anonymous sources, in particular to report information that is", "-24.9560582293052" ], [ "folly; but we have staked upon it our all.\"\nThe New York Times's minimal standard for reporting a fact not otherwise attributed to a single speaker is that it be verified by at least two independent sources.\nCircular reporting is a situation where multiple sources appear to be independent, but in reality originate from a single source. Because circular reporting can happen inadvertently in many situations, extra care must be taken to ensure that multiple sources actually are independent, rather than interconnected in an obscure manner.", "-24.92622233938164" ], [ "Source criticism Source criticism (or information evaluation) is the process of evaluating an information source, i.e. a document, a person, a speech, a fingerprint, a photo, an observation, or anything used in order to obtain knowledge. In relation to a given purpose, a given information source may be more or less valid, reliable or relevant. Broadly, \"source criticism\" is the interdisciplinary study of how information sources are evaluated for given tasks. Meaning Problems in translation: The Danish word \"kildekritik\" like the Norwegian word \"kildekritikk\" and the Swedish word \"källkritik\" derived from the German \"Quellenkritik\" and is closely associated with", "-24.923462302200278" ], [ "tracking their own publicity, self-generated or otherwise, news monitoring clients also use the service to track competition or industry specific trends or legislation, to build a contact base of reporters, experts, leaders for future reference, to audit the effectiveness of their PR campaigns, to verify that PR, marketing and sales messages are in sync, and to measure impact on their target market. City, State, and Federal agencies use news monitoring services to stay informed in regions they otherwise would not be able to monitor themselves and to verify that the public information disseminated is accurate, accessible in multiple formats and", "-24.880553079972742" ], [ "Misleading, Clickbait-y and Satirical 'News' Sources\" in which she advised how to determine if a fraudulent source was a fake news site. Zimdars identified strange domain names, lack of attribution, poor layout, use of all caps, and URLs ending in \"lo\" or \"com.co\" as red flags. Zimdars recommended checking the \"About Us\" page, and considering whether reputable news outlets have reported the same story.\nStanford University professors Sam Wineburg and Sarah McGrew authored a 2016 study analyzing students' ability to discern fraudulent news from factual. The study took place over a year-long period of time, and involved a sample size of", "-24.869818126957398" ], [ "information subsidy.) The journalist relies on appearances of autonomy and even opposition to established interests—but the public relations agent seek to conceal their client's influence on the news,. Thus, public relations works its magic in secret.\nPublic relations can dovetail with state objectives, as in the case of the 1990 news story about Iraqi soldiers taking \"babies out of incubators\" in Kuwaiti hospitals. During the Nigerian Civil War, both the federal government and the secessionist Republic of Biafra hired public relations firms, which competed to influence public opinion in the West, and between them established some of the key narratives employed", "-24.854511534111225" ], [ "FactCheck.org. Factcheck.org monitors the factual accuracy of what is said by major U.S. political players in the form of TV ads, debates, speeches, interviews and news releases.\nThe Annenberg School for Communication at the University of Pennsylvania: The Annenberg School for Communication at the University of Pennsylvania offers students a firm grounding in various approaches to the study of communication and its methods, drawn from both the humanities and the social sciences.\nThe Annenberg School for Communication and Journalism of the University of Southern California: The Annenberg School for Communication & Journalism fosters dynamic synergies and multidisciplinary approaches to the study of", "-24.789898892646306" ], [ "threshold for reporting virtually all information, both true and false.\"", "-24.75276568139634" ], [ "source creates a legal business relationship, it can also affect a journalist's ability to remain objective. The payments are typically for exclusive rights to publish personal information or obtain an interview, which for some news events, leads to bidding wars among the media for access. It also creates a potential conflict of interest by the publisher, whose neutrality should always be protected. Or it may give the source an incentive to embellish or exaggerate, and even fabricate details, since part of the bargain with the reporter is to provide them interesting and valuable information.\nIn the past, chequebook journalism became an", "-24.684774414505227" ], [ "a good journalist, one should:\n1. be aware of the current affairs.\n2. be able to analyze and understand the background of news.\n3. emphasize the ability to judge the value of news, and the complex and changing situation.\n4. have the courage to stand against any pressure from authorities (e.g. the warlords).\n5. be aware of the fact that one is influential to the society and has the power to change it through the news-making.\n6. stay in close touch with different social classes in order to have a comprehensive understanding of the society and the different needs of the readers.\n7. have common sense.\n8. keep", "-24.68128143949434" ], [ "Information Sources in Law Information Sources in Law is a book. First Edition The first edition was edited by R G Logan and published by Butterworths in 1986. It is part of the series which was then known as Butterworths Guides to Information Sources. It consists of twenty-three chapters attributed to twenty contributors. The subject-matter of these chapters ranges from the general to the specialized. A book on legal research describes Information Sources in Law as being \"not as useful for present purposes\" as the title promises. Information Sources in Law is \"detailed\" and its contributors are \"leading experts\". Second", "-24.645646938206482" ], [ "a preference for their products or services to be reported positively in mass media, which can contribute to bias in news reporting in favor of media outlets protecting their profits and revenues, rather than reporting objectively about stated products and services.\nHowever, newspapers have a duty to report and investigate stories related to political corruption. Such investigative journalism is right and proper when it is backed up with documents, interviews with responsible witnesses, and other primary sources. Journalists and editors are often accused of sensationalizing scandals by those whose public image is harmed by the legitimate reporting of the scandal. News", "-24.63631994376192" ], [ "News Department: with a network of the 63 bureaus in cities and provinces nationwide, the department updates daily current events covering politics, diplomacy, socio-culture, science-technology and the environment, particularly the Party and State's guidelines and policies. It is also responsible for correcting wrongful information in the public domain.\n•Domestic news (continuously updated on the web portal news.vnanet.vn)\n•Internal reference report (breaking domestic events and issues of concern)\nWorld News Department: together with a system of the 30 news bureaus in the five continents around the world, it uploads daily world and regional news in line with the Party and State's official stance on", "-24.627726674532823" ], [ "often the news is wholly toothless, sacrificing journalism for sales, and leaving us not with important public information, but with America's Favorite Pencil\".", "-24.584524440710084" ], [ "is \"a poorly-defined and misleading term that conflates a variety of false information, from genuine error through to foreign interference in democratic processes.\" Detecting fake news online Fake news has become increasingly prevalent over the last few years, with over 100 incorrect articles and rumors spread incessantly just with regard to the 2016 United States presidential election. These fake news articles tend to come from satirical news websites or individual websites with an incentive to propagate false information, either as clickbait or to serve a purpose. Since they typically hope to intentionally promote incorrect information, such articles are quite difficult", "-24.579122001734504" ], [ "galvanized by the debates over so-called ‘fake news’, internet companies such as Facebook have launched campaigns to educate users about how to more easily distinguish between ‘fake news’ and real news sources. Ahead of the United Kingdom national election in 2017, for example, Facebook published a series of advertisements in newspapers with ‘Tips for Spotting False News’ which suggested 10 things that might signal whether a story is genuine or not. There have also been broader initiatives bringing together a variety of donors and actors to promote fact-checking and news literacy, such as the News Integrity Initiative at the City", "-24.56940070456767" ], [ "the information we need, we must also know how to evaluate it. Over the past decade, we have seen a crisis of authenticity emerge. We now live in a world where anyone can publish an opinion or perspective, whether true or not, and have that opinion amplified within the information marketplace. At the same time, Americans have unprecedented access to the diverse and independent sources of information, as well as institutions such as libraries and universities, that can help separate truth from fiction and signal from noise.\"\n Obama's proclamation ended with: \n\"Now, therefore, I, Barack Obama, President of the United", "-24.566997482160332" ], [ "page contains one main picture and three main news stories, with the left-hand column, News Digest, providing a 'teaser' of some of the stories inside the Home News, World News, Sport and Business Today sections as well as other information such as winning lottery numbers and weather forecasts. Inside, it usually contains eight to twelve pages of Irish news, called \"Home News\", covering the Republic of Ireland and Northern Ireland. It devotes several pages to important stories such as the publication of government reports, government budgets, important courts cases, and so on.\nWorld News contains news from its correspondents abroad", "-24.551694122546905" ], [ "a free account and contribute news stories that they believe to be newsworthy. The Editor function is simply to provide guidance, correct spelling and grammar mistakes and ensure that the news posting meets its Editorial Guidelines.\nAs interest grows in the non-traditional local online news resource, individual contributions as of January 1, 2010 have grown to more than 60 news stories a month. In addition to publication of articles on the TippNews DAILY website, all news is also posted automatically to its Facebook and Twitter pages.", "-24.545701485752943" ], [ "the source and further assess his willingness to cooperate. When examining documents, screeners should look for items that will indicate whether the source is cooperative or willing to cooperate based on any specific personal interest.\nIf the source has information pertaining to new foreign material, contact appropriate TECHINT specialists, and if the source has information of target exploitation interest, contact the appropriate staff members who deal with targeting. These specialists are not necessarily qualified interrogators and may need to meet jointly with the subject and interrogator, or pass questions to the interrogator. Identification Since the identity of individuals is very relevant", "-24.540202250514994" ], [ "Media in Washington, D.C. Newspapers The Washington Post is the oldest-surviving, and currently the most-read daily newspaper in Washington, with a strong reputation across the U.S. It is notable for exposing the Watergate scandal, among other achievements. The Washington Post Company has multiple media holdings, the Washington Post News Service with Bloomberg News, Fashion Washington, El Tiempo Latino (a Spanish-language publication), The Slate Group, The Daily Herald (in Washington state), as well as the education company Kaplan, Inc.. The Washington Post emphasizes national and political news coverage but also covers regional and local stories. Headquartered in downtown Washington, the newspaper", "-24.53089792082028" ], [ "2010 it has been updated weekly. Generally, information currently available as of January 1 of the current year is used in preparing the Factbook. Government edition of the Factbook The first, classified, edition of Factbook was published in August 1962, and the first unclassified version in June 1971. The World Factbook was first available to the public in print in 1975. In 2008 the CIA discontinued printing the Factbook themselves, instead turning printing responsibilities over to the Government Printing Office. This happened due to a CIA decision to \"focus Factbook resources\" on the online edition. The Factbook has been on", "-24.52658032398176" ], [ "strikes, the CIA still considers the very existence of the program to be classified in its entirety, and any public discussion of it technically constitutes exposure of classified information. \"Parallel reporting\" was at issue in determining what constitutes \"classified\" information during the Hillary Clinton email controversy when Assistant Secretary of State for Legislative Affairs Julia Frifield noted, \"When policy officials obtain information from open sources, ‘think tanks,’ experts, foreign government officials, or others, the fact that some of the information may also have been available through intelligence channels does not mean that the information is necessarily classified.” Corporate classification Private", "-24.523713573205896" ], [ "agencies may also operate news bureaux, and major public relations sources (such as governments, large companies, or advocacy groups) may operate news bureaux of their own to create, rather than simply report, news stories. Decline Traditional news media, particularly television news and newspapers, have cut the number and size of news bureaux in recent decades for several reasons. They face declining profitability due to increasing competition from Internet news sources, and therefore have less money to spend on news-gathering.\nNewspapers rely increasingly on cooperative arrangements with counterparts elsewhere, and often will accept stories from their sister organizations rather than investigating", "-24.503349106918904" ], [ "based on little or no proof beyond a handful of anonymous \"officials.\" Use of anonymous sources There has been sustained criticism of Hersh's use of anonymous sources. Critics, including Edward Jay Epstein and Amir Taheri, say he is over-reliant on them. Taheri, for example, when reviewing Hersh's Chain of Command (2004), complained:\nAs soon as he has made an assertion he cites a 'source' to back it. In every case this is either an un-named former official or an unidentified secret document passed to Hersh in unknown circumstances. […] By my count Hersh has anonymous 'sources' inside 30 foreign governments and", "-24.499930178433715" ], [ "News bureau Operation of news bureaux A news bureau is traditionally operated out of an office by a single news outlet such as a radio, television, or newspaper news program. A single news company such as CNN or NPR may use a single bureau and office staff for all of its programs, and even those of subsidiary or other affiliated companies. For convenience, to save money and space, and to ensure the availability of necessary services (such as video feeds and studios), different companies may share an office space or co-locate at a single office building. News", "-24.485706221385044" ], [ "to questions, they tend to be less certain than they look, and greater authority is no guarantee of quality. Authority tells us only that the creators of the source have qualifications and institutional affiliations that match the expectations of a given disciplinary community, not that the source is infallible, or even that its disciplinary community is the best to pursue the information sought\" (Pierce, 1991, p. 31).", "-24.450331579912017" ], [ "news agencies: China (Xinhua), France (Agence France-Presse), Russia (TASS), and several other countries have government-funded news agencies which also use information from other agencies as well.\nCommercial newswire services charge businesses to distribute their news (e.g., Business Wire, GlobeNewswire, Newsfile Corp., PR Newswire, PR Web, and Cision).\nThe major news agencies generally prepare hard news stories and feature articles that can be used by other news organizations with little or no modification, and then sell them to other news organizations. They provide these articles in bulk electronically through wire services (originally they used telegraphy; today they frequently use the Internet). Corporations, individuals,", "-24.448618020040158" ], [ "extensive information in one place, like voting records, periodicals, press releases, opinion polls, policy statements, speeches, etc. Obtaining a comprehensive understanding of an election, for example, is more convenient than it has been in the past. Political Information available on the internet covers every major activity of American politics. Users, nonetheless, remain susceptible to bias, especially on websites that represent themselves as objective sources.\nE-mail has achieved a large scale of usage amongst numerous levels of government, political groups, and even media companies as a means of communicating with the public and thus plays a significant role in the political-media complex.", "-24.430409968485037" ], [ "activities are described as \"media monitoring\", \"media analysis\", \"internet research\" and \"public surveys\" but are open source nonetheless.\nThe Library of Congress sponsors the Federal Research Division (FRD) which conducts a great deal of tailored open-source research on a fee-for-service basis for the executive branch. Intelligence The US Intelligence Community's open-source activities (known as the National Open Source Enterprise) are dictated by Intelligence Community Directive 301 promulgated by the Director of National Intelligence. The Directive establishes the authorities and responsibilities of the Assistant Deputy Director of National Intelligence for Open Source (ADDNI/OS), the DNI's Open Source Center and the National", "-24.428297146761906" ], [ "new way.\nSince the introduction of the concept a number of media companies have created \"data teams\" which develop visualizations for newsrooms. Most notable are teams e.g. at Reuters, Pro Publica, and La Nacion (Argentina). In Europe, The Guardian and Berliner Morgenpost have very productive teams, as well as public broadcasters. \nAs projects like the MP expense scandal (2009) and the 2013 release of the \"offshore leaks\" demonstrate, data-driven journalism can assume an investigative role, dealing with \"not-so open\" aka secret data on occasion.\nThe annual Data Journalism Awards recognize outstanding reporting in the field of data journalism, and numerous Pulitzer Prizes", "-24.40928270855511" ], [ "NewsBios History Among those journalists whose bios are sold most frequently are members of NewsBios's annual list of the 100 Most Influential Business and Financial Journalists, winners of its Business News Luminary Awards (NewsBios) and the 30 Under 30 list of successful young business journalists.\nNewsBios aggregates and sifts information from more than 60 sources of public information and combines that research with its own analytics and proprietary databases. Among the core advantages of a NewsBio when compared with an authorized profile is the inclusion of biographical information that journalists do not wish the public to know.\nThis unauthorized information may include", "-24.407638455981214" ], [ "World news Foreign correspondents There are essentially two types of reporters who do foreign reporting: the foreign correspondent (full-time reporter employed by a news source) and the special envoy (sent abroad to cover a specific subject, temporarily stationed in a location).\nThe correspondent is a reporter based in a foreign city (often the capital of a country) covering a region, a country or sometimes even an entire continent. He or she regularly files stories to the news editor. He/she gathers materials for these stories from local officials, members of the community, and the local media, as well as from events he/she", "-24.39824355555902" ], [ "We the people are. News media are the people's established institutions designed to facilitate the flow of information not just from government to the people, but from the people – a self-governing people – to the government we employ.\"", "-24.384789011528483" ], [ "relying entirely on people of high rank with household names as sources, we had sources who were not political appointees. One of the things that has gone very wrong in Washington journalism is ‘source addiction,’ ‘access addiction,’ and the idea that in order to maintain access to people in the White House or vice president’s office or high up in a department, you have to dance to their tune. That’s not what journalism is about. \nWe had better sources than she (Judith Miller) did and we knew who her sources were. They were political appointees who were making a political", "-24.383365908492124" ], [ "The Real News features experienced professional journalists from across the globe. All in all, the organization employs around forty people. Content The Real News interviews economists, politicians, and policy experts about breaking news. Regular programs include \"Reality Asserts Itself,\" multi-segment interviews on critical issues, and \"Rattling the Bars\" with host and former Black Panther Eddie Conway. Lawrence Wilkerson, former Chief of Staff to Colin Powell, is a regular contributor. The climate change crisis is considered \"an existential threat\". Partners The Real News Network works with the Political Economy Research Institute (PERI) at University of Massachusetts Amherst to produce interviews and", "-24.37659007203547" ], [ "to have a knowledge of what is currently happening in the world, reporters are also doing the same thing: making readers be aware of current affairs. Speaking about journalism, he said that we, as readers, have to be careful about different reporters’ stances and their different perspectives based on various sources. On the other hand, reporters should always bear the obligation to the truth and be objective by relying on the more reliable sources.\nIn another interview from Central News Agency (news.pchome.com.tw/life/can/20030408/index-20030408165736010244.html inactive as of 2008-05-07) in Taiwan, Wang pointed out that readers are not encouraged to spend too much time", "-24.36395230859489" ], [ "information that is high quality (well written or presented), as it will have been produced by professional journalists. Traditional journalism is often also responsible for setting agendas and having an impact on government policy. The traditional journalistic method of communication is one-way, so there can be no dialogue with the public, and science stories can often be reduced in scope so that there is a limited focus for a mainstream audience, who may not be able to comprehend the bigger picture from a scientific perspective. However, there is new research now available on the role of newspapers and television channels", "-24.356955911542173" ], [ "construe favoritism in reporting, and can create a perceived conflict of interest. Investigative methods Investigative journalism is largely an information-gathering exercise, looking for facts that are not easy to obtain by simple requests and searches, or are actively being concealed, suppressed or distorted. Where investigative work involves undercover journalism or use of whistleblowers, and even more if it resorts to covert methods more typical of private detectives or even spying, it brings a large extra burden on ethical standards.\nAnonymous sources are double-edged—they often provide especially newsworthy information, such as classified or confidential information about current events, information about a previously", "-24.347780593956486" ], [ "\"fake news\". On January 10, 2019 Fox Nation ran a documentary called Black Eye: Dan Rather and the Birth of Fake News.\nThe evolving nature of online business models encourages the production of information that is \"click-worthy\" and independent of its accuracy.\nThe nature of trust depends on the assumptions that non-institutional forms of communication are freer from power and more able to report information that mainstream media are perceived as unable or unwilling to reveal. Declines in confidence in much traditional media and expert knowledge have created fertile grounds for alternative, and often obscure sources of information to appear as", "-24.331191244869842" ], [ "important role in the dissemination of statistical information. On the other hand, newspapers and specialized economic and social magazines can provide more detailed coverage of statistical releases as the information on a specific theme can be quite extensive. Official statistics provides us with important information on the situation and the development trends in our society.\nUsers can gather information making use of the services of the National Statistical Offices. They can easily find it on the agency's website.\nThe development of computing technologies and the Internet has enabled users - businesses, educational institutions and households among others- to have access to statistical", "-24.324931410235877" ], [ "Fact-checking Post hoc fact-checking External post hoc fact-checking by independent organizations began in the United States in the early 2000s. Consistency across fact-checkers One study finds that fact-checkers PolitiFact, FactCheck.org, and Washington Post's Fact Checker overwhelmingly agree on their evaluations of claims. However, a study by Morgan Marietta, David C. Barker and Todd Bowser found \"substantial differences in the questions asked and the answers offered.\" They concluded that this limited the \"usefulness of fact-checking for citizens trying to decide which version of disputed realities to believe.\" A paper by Chloe Lim, Ph.D. student at Stanford University, found little overlap in", "-24.30392584091169" ], [ "above all else, cannot recognize the difference between these two categories.\nA piece of news is not verified the way a piece of knowledge is—whereas knowledge can be verified empirically, news can be verified empirically only after the hearer has already heeded its call. The castaway must first, however, decide when to heed the call of a piece of news and when to ignore it. Percy sets forth three criteria for the acceptance of a piece of news: (a) its relevance to the hearer's predicament; (b) the trustworthiness of the newsbearer; and (c) its likelihood or possibility. As news depends so", "-24.20163386299555" ] ]
opyoi
how the pyramids were built, and why there are conspiracy theories about it.
[ "The pyramids were built using ramps and pulleys and thousands of workers who labored for decades. There are conspiracy theories about them simply because they are old and big and unique. There are very few buildings around that are as old as the pyramids -- 4000 years. People wonder why anyone would build something as huge and impractical as a pyramid. But we simply do not know enough about ancient Egypt to explain everything about them.", "Long ago, a race of humanoid aliens ruled Egypt. The aliens brought their technology to earth in medicine, agriculture, art and architecture. The aliens built the pyramids using their technical expertise and human labor. These building have lasted millenia. For unknown reasons, the aliens have left earth and their stargates have been lost or destroyed.", "Some people can't wrap their heads around the idea that ancient humans were capable of things such as performing basic geometry and moving rocks.", "Conspiracy theories are just an argument from ignorance. I don't understand how people could have built the pyramids with their level of technology so [insert dumb idea to explain it] god did it, aliens did it, or they must've had some other type of outside help we are unaware of.", "No one knows how they were built, we only have some pretty good ideas based on what we assume about the state of technology at that time. logs for rolling, ramps for gradual lifting and pulleys for less gradual lifting were likely involved. Also chiseling and the use of gritty water for cutting stone. That would also require lots of people and lots of time. It also seems reasonable, because of the growing season at that location, that the builders were also farmers who were working on the pyramids during the off season. They would be needed to grow during the growing season and have available time in the off season. All guesses, but they make sense based on what we think we know." ]
[ [ "the north side of the pyramid there was a chapel which sheltered the entrance to the underground funerary chamber.\nThe excavations and studies of the pyramid have revealed that the construction quality was inconsistent and this caused serious structural issues, especially concerning the cladding, which threatened to crack at the base, break off, and collapse under its own extraordinary weight. The ancient architects responded to this issue by building a wall all the way around the pyramid, embedded in the paving of the enclosure, under the cladding. This wall was built from carefully dressed waste stone, which gave it enough solidity", "-33.669335926824715" ], [ "notable fact about the pyramid at Abu Rawash is that the upper most part of the pyramid has seemingly disappeared, revealing the internal passage that runs down into the bedrock. Explanations to why this pyramid is missing its top vary. The second point of interest that this pyramid provides is that it is built on top of a hillock. The builders faced the colossal task of not only hauling megalith stones up a pyramid but also up a hillock. Detail Its location adjacent to a major crossroads made it an easy source of stone. Quarrying — which began in Roman", "-33.629335440055" ], [ "Jean-Pierre Houdin Pyramid construction theory In 1999, Houdin's father, a retired civil engineer, started to develop the idea that the pyramids had been built from the inside. Jean-Pierre Houdin, using advanced 3D modelling technology, helped him identify a construction anomaly which they named \"the spiral structure\". It looked exactly like a ramp built inside the pyramid which they thought could have played a part in its construction. In 2003, his father created the Association of the Construction of the Great Pyramid (ACGP) in order to promote the project. This association enabled him to meet a number of experts. Analytical process", "-33.23890042572748" ], [ "any theory that seeks to explain only how the Great Pyramid was built\".\nHoudin has another hypothesis developed from his architectural model, one that could finally explain the internal \"Grand Gallery\" chamber that otherwise appears to have little purpose. He believes the gallery acted as a trolley chute/guide for counterbalance weights. It enabled the raising of the five 60-ton granite beams that roof the King's Chamber. Houdin and Brier and the Dassault team are already credited with proving for the first time that cracks in beams appeared during construction, were examined and tested at the time and declared relatively harmless. Limestone", "-33.12058528409398" ], [ "levels standing upon a low basal platform. It was built using the talud-tablero style of architecture; the pyramid measures 25 by 25 metres (82 by 82 ft) and stands approximately 6.8 metres (22 ft) tall. In October 2004 the south side of the pyramid collapsed; this is believed to have been caused by a combination of damage caused by the roots of nearby trees and water damage. The restoration of the pyramid with cement in the 1950s had converted the structure into a water trap, while cedar roots had penetrated the building to a height of 6 metres (20 ft) causing significant cracking.\nStructure", "-32.75053664371808" ], [ "of earth fill. The current conical shape of the pyramid was once thought to represent nearby volcanoes or mountains, but recent work by Rebecca Gonzalez Lauck has shown that the pyramid was in fact a rectangular pyramid with stepped sides and inset corners, and the current shape is most likely due to 2500 years of erosion. The pyramid itself has never been excavated, but a magnetometer survey in 1967 found an anomaly high on the south side of the pyramid. Speculation ranges from a section of burned clay to a cache of buried offerings to a tomb. Complex B South", "-32.352077616233146" ], [ "(121 ft). The pyramid was constructed with a mudbrick core and a limestone outer casing with its backing stones. These and the limestone casing were both quarried by stone robbers, which left the core unprotected. The core fared very badly with time and the pyramid now stands only one meter tall due to the its disintegration.\nA fragmented black granite pyramidion was discovered on the east side of the complex and has been restored by G. Jéquier. It is now on display at the Egyptian Museum, Cairo. The pyramidion is decorated by reliefs showing Khendjer making offerings and is inscribed with the", "-32.290427865693346" ], [ "because the pyramid was not completed.\nMud bricks were found at the base of the pyramid, which are not associated with the pyramid itself, but are interpreted as remnants of a construction ramp. Substructure The disposition of the substructures of the layer pyramid is extremely similar to that found in the Buried Pyramid of Sekhemket. Consequently, Mark Lehner and others suggest that the two pyramids must have been constructed very close in time.\nThe entrance to the subterranean structures lies on the east, a disposition which would be unparalleled until the construction of the pyramid of Senusret II, almost 1000 years later.", "-32.11581226854469" ], [ "of approximately 2.5 metres (8.2 ft). The front (south) face of the pyramid was not straight, the angles of the southern corners were slightly greater than 90° with the facade of the pyramid extending out slightly to meet the access ramp. The excavator concluded that this was to create the illusion that the building was larger than its actual size. The pyramidal base originally stood between 9.7 and 9.8 metres (32 and 32 ft) high. The access ramp was 6.4 metres (21 ft) wide and originally faced in stone, as uncovered during the 1949 excavations by Pedro Armillas. However, after the excavations, the", "-32.08199647802394" ], [ "(89 ft) high with a base of 31.5 m (103 ft), its core made of limestone and clay mortar organised in horizontal and accretion layers.\nToday the pyramid is heavily ruined, its outer casing of fine white limestone long gone, and it stands only 5 m (16 ft) tall. While graffiti left by the builders indicate that the construction of this pyramid dates to the later part of Nyuserre's reign and took place under the direction of vizier Ptahshepses, the name of the queen for whom the pyramid was intended is lost. Reptynub has been cited as a likely candidate. In the burial chamber, which is", "-32.027275043103145" ], [ "of the Great Pyramids.\nPopular culture leads people to believe that Pyramids are highly confusing, with many tunnels within the pyramid to create confusion for grave robbers. This is not true. The shafts of pyramids are quite simple, mostly leading directly to the tomb. The immense size of the pyramids attracted robbers to the wealth that lay inside which caused the tombs to be robbed relatively soon after the tomb was sealed in some cases. There are sometimes additional tunnels, but these were used for the builders to understand how far they could dig the tomb into the crust of the", "-31.661482515279204" ], [ "pyramids. Hartwig Hausdorf speculated it was built by aliens, and Philip Coppens repeated this theory.\nDespite claims to the contrary, the existence of these pyramid-shaped tomb mounds was known by scientists in the West before the publicity caused by the story in 1947. Shortly after the New York Times story, Science News Letter (now Science News) published a short item saying: \"The Chinese pyramids of that region are built of mud and dirt and are more like mounds than the pyramids of Egypt, and the region is little travelled. American scientists who have been in the area suggest that the height", "-31.60234770954412" ], [ "Shimizu Mega-City Pyramid Materials and construction process First, the pyramid's foundation would be formed by 36 piers made of special concrete.\nBecause the seismically active Pacific Ring of Fire cuts right through Japan, the external structure of the pyramid would be an open network of megatrusses, supporting struts made from carbon nanotubes to allow the pyramid to stand against and let through high winds, and survive earthquakes and tsunamis.\nThe trusses would be coated with photovoltaic film to convert sunlight into electricity and help power the city. The city will also be powered by pond scum or algae.\nRobotic systems are planned to", "-31.5665188478888" ], [ "the Meidum Pyramid in a downpour while the building was still under construction.\nFranck Monnier and others believe the pyramid not to have collapsed until the New Kingdom, but there are a number of facts contradicting this theory. The Meidum Pyramid seems never to have been completed. Beginning with Sneferu and to the 12th dynasty all pyramids had a valley temple, which is missing at Meidum. The mortuary temple, which was found under the rubble at the base of the pyramid, apparently never was finished. Walls were only partly polished. Two steles inside, usually bearing the names of the pharaoh, are", "-31.542585773422616" ], [ "pyramid's tunnels. The archeological zone is guarded by a mounted police unit, as motor vehicles are not permitted to climb the structure. Some of the land around the pyramid has been bought by authorities and made into soccer fields, and sown with flowers, in order to create a buffer between the construction of homes and the pyramid. Nuestra Señora de los Remedios church The pyramid was a place of pilgrimage in the pre Hispanic period, and it is a place of pilgrimage today, to visit an image known as the Virgin of the Remedies, especially in September. The Virgin of", "-31.537083454430103" ], [ "(3.3 ft) large – roughly dressed grey limestone blocks well-joined with mortar. The inner chambers were similarly framed, but using significantly smaller blocks. The core of the pyramid, between the two frames, was then packed with a rubble fill of limestone chips, pottery shards, and sand, with clay mortaring. This method, while less time and resource consuming, was careless and unstable, and meant that only the outer casing was constructed using high quality limestone. \nThe chambers and mortuary temples of the Abusir pyramids were ransacked during the unrest of the First Intermediate Period, while the dismantling of the pyramids themselves took", "-31.491789159365" ], [ "Meidum Pyramid The pyramid at Meidum is thought to be just the second pyramid built after Djoser's and may have been originally built for Huni, the last pharaoh of the Third Dynasty, and continued by Sneferu. The architect was a successor to the famous Imhotep, the inventor of the stone built pyramid. The collapse of the pyramid is likely due to the modifications made to Imhotep's pyramid design as well as the decisions taken twice during construction to extend the pyramid. Because of its unusual appearance, the pyramid is called el-heram el-kaddaab — (Pseudo Pyramid) in Egyptian Arabic.\nThe second extension", "-31.35994816152379" ], [ "top of the pyramid stood almost 2 metres (6.6 ft) higher than the preceding version and preserved parts of the earlier temple building in its infill; the upper platform has largely collapsed and no trace remains of the final version of the temple superstructure. Both the second and third versions of the pyramid were originally coated in stucco, parts of which were preserved. New stucco was applied during restoration work to match the original coating. Although the pyramid was restored after it was excavated, the 1976 Guatemala earthquake caused considerable damage and the upper portion of the pyramid was reduced to", "-31.330012391299533" ], [ "the western side of the structure.\nA Czech archaeological team led by Miroslav Verner conducted the first intensive excavation between 2001 and 2004, in which the unusual character of the structure as a \"Double pyramid\" became clear. Both sections of the structure have a slightly rectangular base plan, oriented in a north-south direction with extremely steep sides, which make it impossible that the structure was ever a true pyramid. In the masonry, a relatively large number of building inscriptions and marks were found. These included the name of the structure, which can be translated as \"the two [pyramids] are watchful.\"\nDušan Magdolen", "-31.26522853411734" ], [ "metres (21 ft) south of the pyramid base. The ramp was 5.4 metres (18 ft) wide and rose at an estimated angle of 27°. Excavations revealed that the ramp was built of compacted clay and that the pyramid was packed with unworked stones. Both were built simultaneously. Structure 4 was faced with rough volcanic tuff blocks that varied considerably in size, cemented with mud. The blocks were covered in a coating of mortar that varied between 5 and 7 centimetres (2.0 and 2.8 in) thick and that may originally have been painted although no evidence was found to prove this. Around the base of", "-31.155321525235195" ], [ "postulated by Isaac Newton). Taylor was also the first to claim that the pyramid was divinely inspired, contained a revelation and was built not by the Egyptians, but instead by the Hebrews, pointing to Biblical passages (Is. 19: 19-20; Job 38: 5-7) to support his theories. For this reason Taylor is often credited as being the \"founder of pyramidology\". Martin Gardner noted:\nit was not until 1859 that Pyramidology was born. This was the year that John Taylor, an eccentric partner in a London publishing firm, issued his The Great Pyramid: Why was it Built? And Who Built it? ...", "-31.153547711728606" ], [ "Pyramid of Amenemhat III (Dahshur) Structural problems The Black Pyramid, with all its wide passageways, had multiple structural deficits. The pyramid was built in one of the lowest regions of Egypt, only 10 metres above sea level. There are countless corridors and chambers underground, and there are not enough stress relievers to hold up the ceilings. The pyramid is not very sturdy, as it was built with mud brick instead of the traditional stone. The low elevation, corridors, and unstable building material allowed groundwater from the Nile to seep into the walls, causing the entire pyramid to sink into the", "-31.115320686381892" ], [ "early publications by a possible building catastrophe, during which the pyramid's covering collapsed and many workmen would have been crushed. The theory seemed to be fostered by the unknown duration of Snefru's reign. At the time, egyptologists and historians couldn't believe that Snefru ruled long enough to have three pyramids built for him.\nCloser examinations of the pyramid surroundings however revealed several tomb inscriptions and pilgrim graffitos praising the \"beauty of the white pyramid of king Snefru\". They further call for prayers to Snefru and \"his great wife Meresankh I\". Additionally, the surrounding mastaba tombs date to the reign of King", "-30.925105695980164" ], [ "turned the original step pyramid design into a true pyramid by filling in the steps with limestone encasing. While this approach is consistent with the design of the other true pyramids, Meidum was affected by construction errors. Firstly, the outer layer was founded on sand and not on rock, like the inner layers. Secondly, the inner step pyramids had been designed as the final stage. Thus the outer surface was polished and the platforms of the steps were not horizontal, but fell off to the outside. This severely compromised the stability and is likely to have caused the collapse of", "-30.85394147853367" ], [ "Pyramids (Bathgate) The Pyramids are a land sculpture alongside the M8 motorway at Bathgate.\nOriginally named the \"Sawtooth Ramps\" it was sponsored by Motorola and formed part of the M8 Art Project. The sculpture was created by artist Patricia Leighton in 1993. It is 1,000 feet (300 m) long and consists of seven 36-foot (11 m) high ramps made of earth and seeded with grass. The artist based the design on local geographic features (drumlins) and the shape of the surrounding bings. Sheep are grazed on the structure which keeps the grass short. The pyramidal shape of the sculpture gave rise to the", "-30.835995808942243" ], [ "Huni. However, that attribution is uncertain, as no record of Huni's name has been found at the site. It was constructed as a step pyramid, and then later converted into the first \"true\" smooth-sided pyramid when the steps were filled in, and an outer casing added. The pyramid suffered several catastrophic collapses in ancient and medieval times; medieval Arab writers described it as having seven steps – although today only the three uppermost of these remain, giving the structure its odd, tower-like appearance. The hill on which the pyramid is situated is not a natural landscape feature – it is", "-30.83031649608165" ], [ "it is not likely that the pyramid was built in 1665, and it is postulated that the memorial plaque was relocated from elsewhere to the pyramid when it was raised ain the 18th century, sometime before 1774. From the 1916 fire until the present Austrått manor burned down the night of 28 November 1916. The fire is attributed to a lightning strike. All wood in the building burned, including the 14 carved statues around the manor. The estate manager, Julian Frengen, and neighbor Peder Hagemo were two of the men who played an important role in the efforts to", "-30.812916048154875" ], [ "the structure, demonstrating its continued importance. By the time the Spanish arrived, the pyramid was overgrown, and by the 19th century it was still undisturbed, with only the church built in the 16th century visible. Modern history Architect Ignacio Marquina started exploratory tunnelling within the pyramid in 1931. By 1954, the total length of tunnels came to approximately 8.0 kilometres (5 mi).\nToday the pyramid at first looks like a natural hill surmounted by a church. This is the Iglesia de Nuestra Señora de los Remedios (Church of Our Lady of Remedies), also known as the Santuario de la Virgen de los", "-30.73665025731316" ], [ "Pyramid of Amenemhet I Construction Archaeological evidence suggests that Amenemhet started to build his pyramid at Thebes but for unknown reasons switched his capital and the location of his pyramid to Lisht. The pyramid upon its completion rose to a height of 55 m, with a base length of 83 m and a slope of 54 degrees. The core of the pyramid was made with small rough blocks of local limestone with a loose fill of sand debris and mud brick. Some of the limestone was stripped from other monuments, blocks of stone from the pyramids of Khufu, Khafre, Unas", "-30.713731088020722" ], [ "Pyramid power Pyramid power refers to the belief that the ancient Egyptian pyramids and objects of similar shape can confer a variety of benefits. Among these assumed properties are the ability to preserve foods, sharpen or maintain the sharpness of razor blades, improve health, function \"as a thought-form incubator\", trigger sexual urges, and cause other effects. Such unverified theories regarding pyramids are collectively known as pyramidology.\nThere is no scientific evidence that pyramid power exists. History In the 1930s, a French ironmonger and pendulum-dowsing author, Antoine Bovis, developed the idea that small models of pyramids can preserve food. The story persists", "-30.65603055962856" ], [ "the four step pyramid, they made a major shift in construction. Like in the construction of the mastaba, they built a crude core of rough stones and then cased them in fine limestone with packing in between. The major difference is that in mastaba construction they laid horizontal courses, but for the pyramid layers, they built in accretion layers that leaned inwards, while using blocks that were both bigger and higher quality. Much of the rock for the pyramid was likely quarried from the construction of the great trench. It is widely accepted that ramps would have been used to", "-30.634693712054286" ], [ "place during the New Kingdom. Once the limestone casing of the pyramid was removed – for reuse in lime production – the core was exposed to further human destruction and natural erosion which has left it as a ruinous, formless mound. Nyuserre's monument underwent significant stone looting during the New Kingdom, during the Late Period between the Twenty-Sixth and Twenty-Seventh Dynasties, and again during the Roman era.\nThe pyramid is surrounded by open courtyards paved with limestone blocks 0.4 m (1.3 ft) thick, while the bricks layers can be up to 0.6 m (2.0 ft) thick. Unusually, the south wing of the courtyard is significantly", "-30.59286571794655" ], [ "used to build pyramids and temples. South of the pyramid of Menkaure are three satellite pyramids, with each accompanied by a temple and substructure. The easternmost is the largest and a true pyramid. Its casing is partly of granite, like the main pyramid, and is believed to have been completed due to the limestone pyramidion found close by. Neither of the other two progressed beyond the construction of the inner core. Temple complex In the mortuary temple the foundations and the inner core were made of limestone. The floors were begun with granite and granite facings were added to some", "-30.59113718563458" ], [ "visible. Khufu decided to call his necropolis Akhet-Khufu (meaning \"horizon of Khufu\").\nThe Great Pyramid has a base measurement of ca. 750 x 750ft (≙ 230.4 x 230.4 m) and today a height of 455.2 ft (138.7 m). Once it had been 481 ft (147 m) high, but the pyramidion and the limestone casing are completely lost due to stone robbery. The lack of the casing allows a full view of the inner core of the pyramid. It was erected in small steps by more or less roughly hewn blocks of dark limestone. The casing was made of nearly white limestone. The outer surface of the", "-30.47213473363081" ], [ "consort; it was, in fact, the cult pyramid. The pyramid has its own enclosure and bears the standard T-shaped substructure of passage and chambers. It had a base length of approximately 15.5 m (51 ft; 29.6 cu) and a peak approximately 10.5 m (34 ft; 20.0 cu) high. \nThe pyramid's single chamber was built by digging a pit into the ground. The walls of the chamber were made from yellow limestone and joined with mortar. The entrance leading to the chamber was cut at an oblique angle, partly recessed into the masonry and partly sunk into the ground. Very little of the interior structure has been", "-30.45918590942165" ], [ "pyramid with four bands of different masonry at the base and a step on top. Excavations The Meidum Pyramid was excavated by John Shae Perring in 1837, Lepsius in 1843 and then by Flinders Petrie later in the nineteenth century, who located the mortuary temple, facing to the east. In 1920 Ludwig Borchardt studied the area further, followed by Alan Rowe in 1928 and then Ali el-Kholi in the 1970s.\nIn its ruined state, the structure is 213 feet (65 meters) high, and its entrance is aligned north-south, with the entrance in the north, 66 feet (20 meters) above present", "-30.4403338021948" ], [ "it was no longer being used for court purposes. They were unsuccessful. \nThe pyramid roof on the top was designed to resemble the Mausoleum of Maussollos, which was one of the Seven Wonders of the Ancient World. It features 32 Ionic columns (8 on each side). Each of the columns have 6 fluted drums, and a cap, and are about 42 feet (13 m) high, 5​¹⁄₂ feet in diameter. They are made of Indiana limestone.\nThe roof is made of cast aluminum and is topped by two 12-foot (3.7 m) high sphinx-like structures with the fleur-de-lis of St. Louis adorned on", "-30.428971564222593" ], [ "The Pyramids (Indianapolis) History In the 1960s the College Life Insurance Company was rapidly expanding and sought to accommodate its growing staff while providing for anticipated expansion. It decided on a plan by Kevin Roche consisting of nine identical office towers each eleven stories tall and each containing 120,000 square feet (11,000 m²). This would permit it to build towers as it needed additional office space without leaving buildings idle or underused. Only the initial three towers were constructed and take the form of pyramids. In the late 1990s the site was re-landscaped and further construction of towers appears unlikely.\nSince they", "-30.417101801278477" ], [ "that only the outer casing was constructed using high quality limestone.\nOwing to the poor condition of the monument, information regarding its dimensions and appearance contain a degree of imprecision. The pyramid had a base length of 78.5 m (258 ft; 149.8 cu) converging at 50° 30′ towards the apex 48 m (157 ft; 92 cu) high. The architects made a notable error in demarcating the base, causing the southeast corner of the pyramid to extend 1.58 m (5.2 ft) too far east. Consequently, the base is not square. A ditch was left in the north face of the pyramid during construction which allowed workers to build", "-30.39107911795145" ], [ "missing inscriptions. The burial chamber inside the pyramid itself is uncompleted, with raw walls and wooden supports still in place which are usually removed after construction. Affiliated mastabas were never used or completed and none of the usual burials have been found. Finally, the first examinations of the Meidum Pyramid found everything below the surface of the rubble mound fully intact. Stones from the outer cover were stolen only after they were exposed by the excavations. This makes a catastrophic collapse more probable than a gradual one. The collapse of this pyramid during the reign of Sneferu is the likely", "-30.354924697385286" ], [ "Pyramid. All three of the principal pyramids in Group C still support the remains of their summit shrines, possibly even with parts of their roofs and roof combs. The construction of these remaining structures consists of the thin, flat stones associated with the Terminal Classic occupation of the site.\nThe Twin Temples were both built on the same platform on the east side of the Main Plaza and have heights of 17 metres (56 ft) and 18 metres (59 ft), three stelae (Stelae 3, 4 and 5) were erected in front of them in a north-south line. The south pyramid of the two", "-30.35423120809719" ], [ "Platform. Main Pyramid The pyramid construction probably commenced in the early classical period (100 BCE–300CE), based on ceramic evidence comparison with findings on the second stage of the North Platform. The three structures have a chronology spanning the first CE millennium.\nThe structure was 26 m high, and at least had two building stages, from ceramic remains dated between 100BCE–300CE, early classical and 800–1000 CE, late classical.\nThe pyramid, in 1999 was still a 22 m high structure, with 32 degree angle slopes, indicating the use of some technology to control structural pressures of the earthen fill.\nThe excavations show that the solution", "-30.342888023762498" ], [ "in turn surrounded by 14 layers of mud bricks bonded with clay mortar and disposed almost vertically, with an inward inclination angle of 68°. Just as the inner-most stone casing of the pyramid core, each mud brick layer is 2.6 m (8.5 ft) thick.\nWhether the pyramid was finished or left unfinished is disputed among experts. The egyptologist Rainer Stadelmann believes that the pyramid was indeed finished, but others, such as Miroslav Verner, think that the building was left unfinished because of the pharaoh's premature death. In particular, no traces of outer cladding were found, which could hint that there never was one", "-30.312797963852063" ], [ "Merheleva Ridge Misidentification as pyramid and clarification Initial reports indicated that archaeologists had discovered a pyramidal structure.\nKlochko blamed the press: \"I'm not sure where the pyramid idea came from - the media got it wrong,\" says Klochko. \"We didn't find anything like an Egyptian pyramid. Though the site is on a hill. But it's interesting enough in its own right.\"", "-30.24335646565305" ], [ "Great Pyramid was completed from start to finish in approximately 10 years. Interior The original entrance to the Great Pyramid is on the north, 17 metres (56 ft) vertically above ground level and 7.29 metres (23.9 ft) east of the centre line of the pyramid. From this original entrance, there is a Descending Passage 0.96 metres (3.1 ft) high and 1.04 metres (3.4 ft) wide, which goes down at an angle of 26° 31'23\" through the masonry of the pyramid and then into the bedrock beneath it. After 105.23 metres (345.2 ft), the passage becomes level and continues for an additional 8.84 metres (29.0 ft) to", "-30.22207431914285" ], [ "and Edificio F (Building F). By the official end of the project in 1974, interest in the pyramid waned again as it could not be reconstructed in its entirety, like other major pyramids in Mexico. The project was abandoned, leaving only fragmentary knowledge about it.\nDespite the site's pre-Hispanic importance, this pyramid is relatively unknown and unstudied, especially in comparison to others in Mexico such as Teotihuacan, Chichen Itza and Monte Albán. There are a number of possible reasons for this. One is that its existence was not greatly elaborated in a publication by the Mexican government for the 1928 Congreso", "-30.215149483992718" ], [ "The Pyramid (film) Plot In Egypt, a three-sided pyramid is discovered buried 600 feet (180 m) below the desert surface by an archaeological team led by Dr. Miles Holden. After a remote-controlled rover vehicle sent to map the interior goes offline the team enters the pyramid to recover it. They soon become lost and enter a room with an unstable floor that collapses beneath them, injuring Zahir whose leg is crushed and pinned beneath debris. Sunni attempts to climb back up but is attacked by an emaciated, feline creature and forced to retreat. The team leaves Zahir to look for", "-30.210820387583226" ], [ "of the kingdom's capital cities.\nAl-Aziz Uthman (1171–1198), the second Ayyubid Sultan of Egypt, tried to destroy the Giza pyramid complex. He gave up after only damaging the Pyramid of Menkaure because the task proved too large. Pyramid symbolism The shape of Egyptian pyramids is thought to represent the primordial mound from which the Egyptians believed the earth was created. The shape of a pyramid is thought to be representative of the descending rays of the sun, and most pyramids were faced with polished, highly reflective white limestone, in order to give them a brilliant appearance when viewed from a distance.", "-30.18416359409457" ], [ "Pyramidology Pyramidology (or pyramidism) refers to various religious or pseudoscientific speculations regarding pyramids, most often the Giza pyramid complex and the Great Pyramid of Giza in Egypt. Some \"pyramidologists\" also concern themselves with the monumental structures of pre-Columbian America (such as Teotihuacan, the Mesoamerican Maya civilization, and the Inca of the South American Andes), and the temples of Southeast Asia.\nSome pyramidologists claim that the Great Pyramid of Giza has encoded within it predictions for the exodus of Moses from Egypt, the crucifixion of Jesus, the start of World War I, the founding of modern-day Israel in 1948, and future events", "-30.15243371145334" ], [ "that nature produces pyramidal shapes and suggested that the main formation seen today may have been a natural hill shaped into a pyramid by human efforts. He described his own results as inconclusive. The very same blocks were inspected by British archaeologist Anthony Harding shortly afterwards, who concluded they did not constitute evidence of pyramids.\nThe 2006 dig uncovered fractured conglomerate and sandstone plates, which are naturally occurring. Following a visit to the site, American geologist Robert Schoch concluded that these were common natural geological formations of little interest. He accused the workers of carving the hillside to make impressions", "-30.140957150244503" ], [ "agrees, but suggests that Huni's successor, Sneferu (c.2670-2630 BC) the founder of the Fourth Dynasty, was the builder. Speculation about the function of the pyramids ranges from a representation of the king, a depiction of the benben, or a symbol of the political and religious unity of the land to a cenotaph for a royal wife.", "-30.1193547550356" ], [ "built from stone slabs and was originally taller than the final version of the platform but was cut back to the reduced height of the new building.\nPyramid B6 enclosed the southern portion of the west side of the Group B plaza. It is very poorly preserved and the top of the pyramid has collapsed, leaving only the lower walls. Archaeological investigation revealed that the final version of the pyramid had been built over a preceding version.\nStructure B7 was a small, well-proportioned rectangular structure south of the main Group A plaza, between the north end of the ballcourt (B1) to the", "-30.09212276188191" ], [ "the inner corridor and chambers while the core was being erected around it, before filling it in with rubble.\nThe pyramid is surrounded by a limestone paved courtyard, except for where the mortuary temple stood, and is accessed from the temple's north and south wings. Enclosing the courtyard is a tall, rounded enclosure wall 3.15 m (10.3 ft; 6.01 cu) at its thickest. Substructure The pyramid substructure access is found slightly above ground on the pyramid's north face. A short descending corridor – lined with granite – leads into a vestibule, beyond which the route is guarded by a pink granite portcullis, either side", "-30.07811655662954" ], [ "The Pyramid (Kadare novel) Background The first part of the novel was written in 1988-1990 but was rejected by the state publisher. It was serialized in January 1991 in several issues of the new opposition newspaper Democratic Renaissance.\n After the establishment of pluralism and democracy in Albania, it was completed and published in Tirana and Paris. Plot The Pyramid is a political allegory set in ancient Egypt. It is the tale of the conception and construction of the Cheops pyramid but also of absolute political power. Reception The New York Times picked up on the significance of The Pyramid:\n\"For the", "-30.075896605980233" ], [ "god Quetzalcoatl. When the city fell, most of the sculptures in this area were smashed or defaced with some being reused as building stone. The Pyramid of the Niches This pyramid has as a number of names, including El Tajín, Pyramid of Papantla, Pyramid of the Seven Stories and the Temple of the Niches. It has become the focus of the site because of its unusual design and good state of preservation. It was prominent in ancient times as well. A large quantity of sculpture was recovered from this pyramid. The building is mostly constructed of carefully cut and", "-30.074745488644112" ], [ "the bedrock was fashioned into steps. Casing stones cover the top third of the pyramid, but the pyramidion and part of the apex are missing.\nThe bottom course of casing stones was made out of pink granite but the remainder of the pyramid was cased in Tura Limestone. Close examination reveals that the corner edges of remaining casing stones are not completely straight, but are staggered by a few millimeters. One theory is that this is due to settling from seismic activity. An alternative theory postulates that the slope on the blocks was cut to shape before being placed due", "-30.068019026628463" ], [ "The pyramid The step pyramid is made of limestone. It is massive and contains only one tight corridor leading to the close midst of the monument, ending in a rough chamber where the entrance to the tomb shaft was hidden. This inner construction was later filled with rubble, for it was of no use anymore. The pyramid was once 62 metres high and had a base measurement of ca. 125 X 109 metres. It was tightly covered in finely polished, white limestone. Subterranean structure Beneath the step pyramid, a large maze of corridors and chambers was dug. The burial chamber", "-30.067340308160055" ], [ "Great Pyramid) Complex C, “The Great Pyramid,” is the central building in the city layout, is constructed almost entirely out of clay, and is easily seen from far away. The structure is built on top of a closed-in platform—this is where Blom and La Farge discovered Altars 2 and 3, thereby discovering La Venta and the Olmec civilization. A carbon sample from a burned area of the Structure C-1’s surface resulted in the date of 394 ± 30 BCE.\nOne of the earliest pyramids known in Mesoamerica, the Great Pyramid is 110 ft (34 m) high and contains an estimated 100,000 cubic meters", "-30.06652299509733" ], [ "many years after the event, believed that the pyramids must have been built by slave labor. Archaeologists now believe that the Great Pyramid of Giza (at least) was built by tens of thousands of skilled workers who camped near the pyramids and worked for a salary or as a form of tax payment (levy) until the construction was completed, pointing to workers' cemeteries discovered in 1990 by archaeologists Zahi Hawass and Mark Lehner. For the Middle Kingdom Pyramid of Amenemhat II, there is evidence from the annal stone of the king that foreigners from Canaan were used.\nPseudoscientific theories have proliferated", "-30.053115892689675" ], [ "small tracks and miniature coal cars to carry out debris. Examples of these are at the site museum. The base of the pyramid was constructed of sun-dried adobe bricks, which contained ceramic, obsidian and gravel for better compacting. This solid foundation allowed the excavators to only need to create \"false arches,\" like those found in Mayan constructions, rather than adding beams and other supports.\nThe first two tunnels were built to cris-cross the centre, one north/south and the other east/west.When the tunnels reached substructure, they then followed the contour of the structure, and eventually the various tunnels created an underground", "-30.04726694819692" ], [ "via a double staircase on the east side. The top of the pyramid contains two platforms, both of which are decorated with stepped frets. Between the two sets of staircases on the first level on the east side is a tall column-line sculpture. It had been thrown down from the top of the pyramid in ancient times and broken. Archeologists reassembled it at the spot in which it was found. The sculpture is similar in style to the carved stone yokes of Veracruz. The figure seems to be an allegorical representation of a seated figure with a severed upper", "-30.038961800950347" ], [ "spent little time at the site. Most of the work was really done by Marino Gómez, the site guardian, who directed the digging of the tunnels. These tunnels allowed for the mapping and modelling of the pyramid's successive layers. The pyramid had no obvious entrance, due to its deteriorated condition, but the archaeologists decided to begin tunnelling on the north side, where colonial construction had damaged it. On this side, the remains of walls and other structures could be seen.\nTunnelling techniques were based on various team members' experience at Teotihuacan and Tenayuca. These techniques were based on mining, even using", "-30.035188879817724" ], [ "and in the middle was erected an expiatory monument of a pyramidal shape, and surmounted by a funeral vase.\" Controversy The construction of the pyramid triggered many years of strong and lively aesthetic and political debate. Criticisms tended to fall into four areas: (1) the modernist style of the edifice being inconsistent with the classic French Renaissance style and history of the Louvre; (2) the pyramid being an unsuitable symbol of death from ancient Egypt; (3) the project being an immodest, pretentious, megalomaniacal folly imposed by then-President François Mitterrand; and (4) Chinese-American architect I.M. Pei being", "-30.03043250017072" ], [ "construction took casing stones to build a temple in Heliopolis on Ramesses II's orders.\nArab historian Ibn Abd al-Salam recorded that the pyramid was opened in 1372 AD. On the wall of the burial chamber, there is an Arabic graffito that probably dates from the same time.\nIt is not known when the rest of the casing stones were robbed; they were presumably still in place by 1646, when John Greaves, professor of Astronomy at the University of Oxford in his Pyramidographia, wrote that, while its stones weren't as large or as regularly laid as in Khufu's, the surface was smooth and", "-30.019908663234673" ], [ "of the Pyramid itself became a point of controversy among some leading foreign architects, who have both supported and opposed it. Historian Ardian Klosi initiated a petition against the demolition of the structure, gathering around 6000 signatures. A study published in 2015 but undertaken in 2013 suggests that the majority of citizens of Tirana were against the demolition.\nIt was announced in 2017 that the Pyramid will not be demolished, but refurbished. Youth IT Center In 2018, a new project was unveiled that would turn the Pyramid into a IT center for youth with a focus on computer programming, robotics, and", "-30.001715510017675" ], [ "created by sculpting stones, then placing them like a mosaic. For this reason, the structure is also referred to as the Piedra Laborada (Worked Stone) building. Using stone found from both the taluds and the tableros, the archeologists set about reconstructing this structure, using commercially made cement, leading to the structure being called the Tolteca pyramid, after the brand used. This pyramid has since been criticized for being overly reconstructed. The process yielded a large number of ceramics figurines and vessels, which were studied by Florence Müller and range from the Pre Classic to the Postclassic.It has also lost most", "-29.998106457816903" ], [ "Egyptian pyramid construction techniques Egyptian pyramid construction techniques are the controversial subject of many hypotheses. These techniques seem to have developed over time; later pyramids were not constructed in the same way as earlier ones. Most of the construction hypotheses are based on the belief that huge stones were carved from quarries with copper chisels, and these blocks were then dragged and lifted into position. Disagreements chiefly concern the methods used to move and place the stones.\nIn addition to the many unresolved arguments about the construction techniques, there have been disagreements as to the kind of workforce used. The Greeks,", "-29.993084377929335" ], [ "Great Pyramid of Giza History and description Egyptologists believe the pyramid was built as a tomb for the Fourth Dynasty Egyptian pharaoh Khufu (often Hellenized as \"Cheops\") and was constructed over a 20-year period. Khufu's vizier, Hemiunu (also called Hemon), is believed by some to be the architect of the Great Pyramid. It is thought that, at construction, the Great Pyramid was originally 280 Egyptian Royal cubits tall (146.5 metres (480.6 ft)), but with erosion and the absence of its pyramidion, its present height is 138.8 metres (455.4 ft). Each base side was 440 cubits, 230.4 metres (755.9 ft) long. The mass of the", "-29.964930969348643" ], [ "of tunnels inside the pyramid, which began with two in 1931 to prove that the hill was an archeological find. Within, altars with offerings, floors, walls and buried human remains from around 900 AD were discovered. Today, only about 800 meters of these tunnels are open to the public, which have been made into well-lit, arched passages. Visitors enter on the north side, through the center of the pyramid and exit on the south side. There are few signs explaining the structures within, but in one section allows a view of main staircases of one of the pyramids, whose nine", "-29.923367546813097" ], [ "that the pyramid was originally that of Ankhnespepi IV (ˁnḫ-n=s ppj, \"Pepi lives for her\") a wife of Pepi II, and was only later appropriated by Ibi. Adjacent to the pyramid is a small chapel where the funerary cult took place. No trace of a causeway nor of a valley temple has been found to this day, and it is likely that there never was any. The pyramid Ibi's pyramid is not oriented to any cardinal point, being rather on a northwest–southeast axis. The edifice would have been around 31.5 m (103 ft) large and 21 m (69 ft) high with a slope of", "-29.92267959821038" ], [ "and faced with limestone. Most of the facing stone was later pillaged for use in other buildings— a fate common to almost all of Egypt's pyramids— and today the pyramid is little more than an eroded, vaguely pyramidal mountain of mud brick, and of the once magnificent mortuary temple precinct formerly enclosed by a wall there is little left beyond the foundation bed of compacted sand and chips and shards of limestone.\nFrom the pyramid entrance a sloping passageway with steps runs down to a small room and a further short horizontal passage. In the roof of this horizontal passage there", "-29.92265697615221" ], [ "cavity under the base of the stairway was filled with stonework, mortared with concrete and plaster. Movement monitors were placed at critical locations to detect failing integrity. The immediate measures taken to stabilize the pyramid had prevented a catastrophic collapse, but late in 1997, archaeologists noted additional small cracks had developed in the walls of the pyramid (Desmond). Conservation efforts are still underway and, as with El Castillo in Chichen Itza, visitors to the site are now prohibited from climbing the pyramid. Dimensions The exact height of the Pyramid of the Magician is in dispute and has", "-29.907471736718435" ], [ "by Alessandro Barsanti, who uncovered the vertical access shaft leading to the burial chamber. Barsanti, seeing that several corridors and chambers were seemingly unfinished and that all were completely devoid of artefacts, deemed that the pyramid had never been used. Shortly after, in 1910–1911, George Reisner and Clarence S. Fisher worked on the site, excavating the north and east exteriors of the pyramid as well as the cemeteries surrounding it. The dimensions of the pyramid as estimated by Barsanti, Reisner and Fisher differ greatly and even the numbers of subterranean galleries they report are in disagreement. Unfortunately, the pyramid lies", "-29.896357372112107" ], [ "through the renewed excavations of the Oriental Institute, University of Chicago under the direction of S. Harvey to have actually formed the lowest courses of a brick pyramid, the last queen's pyramid to have been built in Egypt. Portions of the limestone pyramidion or capstone were discovered as well, demonstrating conclusively that this structure was pyramidal in form. Magnetic survey also revealed a brick enclosure some 70 by 90 meters in scale, a feature not detected by earlier archaeologists. These accordingly may now be identified as the features described in Ahmose's stela found within: a pyramid and an enclosure, built", "-29.890760561160278" ], [ "and concludes \"we are far from accepting even as a remote possibility a 'man-made' origin of pyramid stones.\" NOVA pyramid building experiment In 1997, Mark Lehner and stonemason Roger Hopkins conducted a three-week pyramid-building experiment for a NOVA television episode. They built a pyramid 6 metres (20 ft) high by 9 metres (30 ft) wide, consisting of a total of 162 cubic metres (5,700 cu ft), or about 405 tons. It was made out of 186 stones weighing an average of 2.2 tons each. Twelve quarrymen carved 186 stones in 22 days, and the structure was erected using 44 men. They used iron hammers,", "-29.88416100815084" ], [ "seashells. Many of the facing stones have fallen or have been removed and used for construction in Cairo.\nMost pyramids are located near Cairo, with only one royal pyramid being located south of Cairo, at the Abydos temple complex. The pyramid at Abydos, Egypt were commissioned by Ahmose I who founded the 18th Dynasty and the New Kingdom. The building of pyramids began in the Third Dynasty with the reign of King Djoser. Early kings such as Snefru built several pyramids, with subsequent kings adding to the number of pyramids until the end of the Middle Kingdom.\nThe last king to", "-29.87564446090255" ], [ "Al-Muqaddasi (d. 991), a great contemporary geographer, confirms the identification: \"Varying accounts have been given me about both structures [the two great pyramids], some saying that they are both talismans, others that they were the granaries of Joseph; others say no, rather, they are their burial grounds.\" Etymology There were additional reasons that may have made the notion of the Pyramids being granaries seem plausible to people in the past. First, there was the murky issue of the etymology of the word pyramid (Ancient Greek: πυραμίς, romanized: pyramis, lit. 'pyramid'). Writing in ca. 390 CE, the Roman historian Ammianus Marcellinus", "-29.805213212035596" ], [ "Azul.\nStructure L8-13 is the north pyramid on the Plaza of the Five Temples. The pyramid stands 13 metres (43 ft) high and measures 22 by 26 metres (72 by 85 ft) at the base. It still has traces of a wooden lintel supported on thick door jambs. One of the jambs is marked with prehispanic graffiti. The pyramid once contained a royal tomb but it has been completely looted. The tomb was carved directly from the limestone bedrock under the pyramid, it is thought to have been the source of various fine quality ceramic vessels painted with images of wayob (spirit", "-29.761543240383617" ], [ "of the narrow shafts that extend from the main burial chamber through the entire body of the Great Pyramid points directly towards the center of this part of the sky. This suggests the pyramid may have been designed to serve as a means to magically launch the deceased pharaoh's soul directly into the abode of the gods.\nAll Egyptian pyramids were built on the west bank of the Nile, which, as the site of the setting sun, was associated with the realm of the dead in Egyptian mythology. Number and location of pyramids In 1842, Karl Richard Lepsius produced the first", "-29.757950076731504" ], [ "in the ancient city of Teotihuacan was surveyed with muography. One of the motivations of the team was to discover if inaccessible chambers inside the Pyramid might hold the tomb of a Teotihuacan ruler. The apparatus was transported in components and then reassembled inside a small tunnel leading to an underground chamber directly underneath the pyramid. A low density region approximately 60 meters wide was reported as a preliminary result, which has led some researchers to suggest that the structure of the pyramid might have been weakened and it is in danger of collapse. Mars Muography may potentially", "-29.752578625862952" ], [ "are a few varying stories of the building of the Pyramid. One such story is that Lord Kilmaine was anxious to find a way of relieving the extreme poverty of his tenants in the post famine years, so he eemployed several men to pick up the stones around the estate.He had those stones piled up and built into a pyramid. This provided the poor people with a little additional income. In the later years a wind-vane adorned the top of the pyramid, so the landlord could indulge in his passion for meteorology and the recording of weather systems over a", "-29.75172747882607" ], [ "who discovered the pyramid in 1843. Owing to the ruined state of the structure, it is known in Arabic as the \"Headless Pyramid\", a name that has been retained. The pyramid was lost under shifting sands in the early 20th century and its attribution to Menkauhor was consequently debated. Instead, it was proposed that the Headless Pyramid was that of Merikare, a structure dating to the First Intermediate Period and which has yet to be found. In 2008, the structure identified by Lepsius was rediscovered by a team of archaeologists under the direction of Zahi Hawass, and excavations at the", "-29.749178195837885" ], [ "believed that there was no prehistory, von Däniken put forward that there is nothing known about how, when, or why these pyramids were built.\nVon Däniken also claims that Egyptians built perfect pyramids from the beginning, but numerous pyramid precursors survive, showing the errors made, and corrected, by Egyptian architects while they were perfecting the technique. These include simple mastabas, the Step Pyramid of Djoser, and the so-called Bent Pyramid.\nIn his book, he says that there is no evidence of Egyptian workers at the pyramid site; however, archaeologists have found evidence of buildings where workers would have lived, with bakeries and", "-29.735600478335982" ], [ "area. Main pyramid Sahure's pyramid is situated upon a hill elevated 20 metres (66 ft) above the Nile valley. Although the subsoil of the area has never been investigated, evidence from the nearby mastaba of Ptahshepses suggests that the pyramid was not embedded into bedrock, but on a platform constructed from at least two layers of limestone. The pyramid had a, likely horizontally layered, core comprising six ascending steps, five of which remain. The core consisted of low-grade roughly cut limestone, bound with mud mortar, and was encased by fine white limestone acquired from the nearby quarries of Maasara.\nSahure's pyramid was", "-29.724207365419716" ], [ "this man, Harry, that built the pyramid.”\nMonte and Harry built a three-story pyramid almost entirely out of cedar. The men installed four golden mirrors on the very tip of the house, which would reflect light and assume the role of a golden beacon. The front half of the pyramid contained the walled rooms of the house. The back half was a three-story partially glassed-in lanai. Monte and Harry also built a small watchtower directly below the golden mirrors. During the construction, Monte and Judy lived in a tent on the second floor. Judy commented on the features of the house:\n“You", "-29.722917820647126" ], [ "site. The construction of the pyramid was likely started during the reign of her husband Neferirkare Kakai and finished during the reign of her son Nyuserre Ini. The pyramid was robbed during the First Intermediate Period. During the Middle Kingdom the pyramid was reopened and the sarcophagus reused for the burial of a young child. By the end of the New Kingdom the destruction of the site occurred when stones were taken from the site to be reused elsewhere.\nThe mortuary temple of Khentkaues II was decorated, but the reliefs were damaged and what remains, are a collection of fragments. The", "-29.70535767788533" ], [ "The pyramids became synonymous with Nigeria's agriculture wealth; a postage stamp even featured a groundnut pyramid. However, as groundnut production declined in the 1970s and 80s the groundnut pyramids disappeared and were replaced with buildings. Modern efforts On February 24, 2014, Dr. Akimwumi Adesina, Minister of Agriculture and Rural Development launched a groundnut value chain project. This project is a joint venture between the Federal Government (FG) of Nigeria and the International Crops Research Institute for the Semi-Arid Tropics (ICRISAT). Their aim is twofold: to increase Nigeria's groundnut production and rebuild the groundnut pyramids. President Goodluck Jonathan reiterated the government's", "-29.681566497078165" ], [ "on a vertical section on the second level of the pyramid, about 2.8 meters above the level of the Plaza. The team removed the masonry and found a narrow corridor six meters long, blocked by debris, leading into the pyramid. That corridor led to another corridor, fifteen meters long, made of large limestone blocks, which ran from north to south inside the pyramid. This corridor was free of debris. There were three chambers on the south side of the corridor; two were open and empty, with signs of rituals performed in front, but the third was", "-29.611736661434406" ], [ "may once have been taller.\nThe pyramid was built to mark the reign of the 27th king of the Tikal dynasty, Yik'in Chan K'awiil, although it may have been built after his death as his funerary temple. Archaeologists believe that Yik'in Chan K'awiil's tomb lies undiscovered somewhere underneath the temple. The summit shrine faces eastward to the site core, with Temple III visible directly in front and Temple I and Temple II beyond it. The structure The pyramid has a rectangular base with its long axis running north-south. It stands 64.6 metres (212 ft) from its supporting platform to the highest part", "-29.605414406294585" ], [ "rock outcropping was used in the core. Due to the slope of the plateau, the northwest corner was cut 10 m (33 ft) out of the rock subsoil and the southeast corner is built up.\nThe pyramid is built of horizontal courses. The stones used at the bottom are very large, but as the pyramid rises, the stones become smaller, becoming only 50 cm (20 in) thick at the apex. The courses are rough and irregular for the first half of its height but a narrow band of regular masonry is clear in the midsection of the pyramid. At the northwest corner of the pyramid,", "-29.603572162683122" ], [ "better-known pyramids at Teotihuacan. Inside the pyramid are some five miles (8 km) of tunnels excavated by archaeologists. Pyramid The pyramid consists of six superimposed structures, one for each ethnic group that dominated it. However, only three have been studied in any depth. The pyramid itself is just a small part of the greater archaeological zone of Cholula, which is estimated at 154 hectares (0.59 sq mi). Building of the pyramid began in the Preclassic Period and over time was built over six times to its final dimensions of 450 metres on each side at the base and 66 metres tall. This base,", "-29.60124272017856" ], [ "encased in a veneer of polished limestone. In several cases, later pyramids were built on top of natural hills to further reduce the volume of material needed in their construction. The materials and methods of construction used in the earliest pyramids have ensured their survival in a generally much better state of preservation than for the pyramid monuments of the later pharaohs. Building the pyramids from quarried stone blocks One of the major problems faced by the early pyramid builders was the need to move huge quantities of stone. The Twelfth Dynasty tomb of Djehutihotep has an illustration of 172", "-29.574937935598427" ], [ "not a step pyramid like the other seven; secondly, the other seven pyramids are built of stone, while the Pyramid of Athribis was made of brick. On account of this last point in particular, Ćwiek criticised Swelim and Stadelmann's inclusion of this pyramid in that group. He further considered it unlikely that a brick structure would have survived in such good condition from the Old Kingdom until the beginning of the 19th century. In his opinion, therefore, it was probably a pyramid from the 13th Dynasty, if not the Late Period.", "-29.571925331663806" ], [ "but three pyramids. The first is called the Meidum pyramid, named for its location in Egypt. Snefru abandoned it after the outside casing fell off of the pyramid. The Meidum pyramid was the first to have an above-ground burial chamber. Using more stones than any other Pharaoh, he built the three pyramids: a now collapsed pyramid in Meidum, the Bent Pyramid at Dahshur, and the Red Pyramid, at North Dahshur. However, the full development of the pyramid style of building was reached not at Saqqara, but during the building of 'The Great Pyramids' at Giza.\nSneferu was succeeded by his son,", "-29.570664607017534" ], [ "and Saqqara, although until 1996 the site was inaccessible due to its location within a military base and was relatively unknown outside archaeological circles.\nThe southern Pyramid of Sneferu, commonly known as the Bent Pyramid, is believed to be the first Egyptian pyramid intended by its builders to be a \"true\" smooth-sided pyramid from the outset; the earlier pyramid at Meidum had smooth sides in its finished state – but it was conceived and built as a step pyramid, before having its steps filled in and concealed beneath a smooth outer casing of dressed stone. As a true smooth-sided structure, the", "-29.541641071613412" ], [ "Priest of Memphis and son of Ramesses II, from the Nineteenth Dynasty indicates that the pyramid was in relatively good condition at this time, needing only minor improvements.\nThe pyramid is now destroyed, and original dimensions are estimates. The length of the base of the pyramid was 78.75 m (258 ft; 150 cu), converging towards the apex at ~53° giving the pyramid a peak 52.5 m (172 ft; 100 cu) high on completion. The remaining ruins leave a mound about 12 m (39 ft; 23 cu) tall, with a pit in its centre dug by stone robbers. Substructure A north chapel once stood over the entrance corridor on the north", "-29.531110845680814" ], [ "building plan contained a simple chamber complex with several rooms and corridors. But for unknown reasons the works were stopped and two further chambers were built inside the pyramid. Remarkable is the so-called Grand Gallery leading to the king's chamber: It has a corbelled arch ceiling and measures 28.7 ft in height and 151.3 ft in length. The gallery has an important static function; it diverts the weight of the stone mass above the king's chamber into the surrounding pyramid core.\nKhufu's pyramid was surrounded by an enclosure wall, with each segment 33 ft (10 m) in distance from the pyramid. On the eastern side,", "-29.530937512026867" ], [ "is square, each side measuring 800 feet, and the height of it is the same. It is built of stone smoothed and fitted together in the most perfect manner, not one of the stones being less than 30 feet in length. This pyramid was made after the manner of steps, which some call 'rows' and others 'bases': When they had first made it thus, they raised the remaining stones with devices made of short pieces of timber, lifting them first from the ground to the first stage of the steps, and when the stone got up to this it was placed upon", "-29.508431208494585" ], [ "El Lahun Overview Like the other Twelfth Dynasty pyramids in the Faiyum, the Pyramid of Lahun is made of mud brick, but here the core of the pyramid consists of a network of stone walls that were infilled by mud brick. This approach was probably intended to ensure the stability of the brick structure. Unusually, despite a Pyramid Temple on the east side, the entrance to the pyramid is on the south. The archaeologist Flinders Petrie nevertheless spent considerable time searching for it on the east side. He discovered the entrance only when workmen clearing the nearby tombs of the", "-29.483789651189" ], [ "constructed in a drastically different manner to those of the preceding dynasty. Its outer faces were framed using massive – at Neferefre's unfinished pyramid the single step contained blocks up to 5 m (16 ft) by 5.5 m (18 ft) by 1 m (3.3 ft) large – roughly dressed grey limestone blocks well-joined with mortar. The inner chambers were similarly framed, but using significantly smaller blocks. The core of the pyramid, between the two frames, was then packed with a rubble fill of limestone chips, pottery shards, and sand, with clay mortaring. This method, while less time and resource consuming, was careless and unstable, and meant", "-29.48376752387412" ] ]
1pj823
how come when you mess up really badly, you feel weird and "sick to your stomach"
[ "I Like /u/mod_maj_gen explanation best, but I always understood it to be that when put into shock, your body will very quickly stop any non-essential processes in order to preserve energy for the \"flight or Fight Response\". One of these non-essential processes is digestion and explains not only the \"sick to your stomach\" feeling, but also the \"butterflies in your tummy\" feeling when you are nervous.", "OP may also be referring to messing up in social situations, aka in front of others. You feel sick because your body is aware of the fact that you have just lost \"value\" in the eyes of others. Most Social Darwinist's would attribute this to the fact that our bodies and emotional circuitry have evolved over the last ~250,000 years to give us the best chances of survival and reproduction. Therefore, if we do something that lowers our value, such as messing up, we get a sickening feeling, to deter us from committing such a violation in the future. It's same reason men will oftentimes experience uncomfortable sensations when they are rejected by a woman.", "I think their was actually some research on this published recently. But basically my understanding is that unlike in a non social animal the human brain treats rejection, disappointment, and other things that are not directly physical but could effect our social standing in a very similar way to physical threats or injury. This is why things like rejection and screwing up, even when it doesnt directly effect our physical well being, trigger the the \"fight or flight response\". I think what happens after this is already explained quite well.", "When you have feelings of apprehension, nervousness, fear, etc, you are activating fight or flight pathways. These fight or flight responses are some of the most \"ancient,\" as even the most basic unicellular organisms have some level of fight or flight response to stimuli. Your entire GI system is lined with neurons, [and is often describe as a second brain]( URL_1 ). One theory is that this second brain originated from our early evolutionary history, where most animals are a stomach, and not much else. Over time, this brain grew symbiotically with out modern brains, and they communicate through the [vagus nerve]( URL_0 ) It is thought that this is where the \"butterflies in the stomach\" feeling comes from. Our modern brain, with it's high-thought capacity, induces fight or flight responses from our thoughts and fears of future \"danger\", whatever that may be. These signals travel down your vagus nerve to your gut, which reacts accordingly. Whether this has some specific physiological purpose or is just a remnant of evolution is debatable, as you can see from other answers to your question. Overstimulation of the vagus nerve can also result in a sharp drop in blood pressure, causing fainting, as a last resort defense mechanism. As anyone with anxiety issues or panic attacks can tell you, once it starts it just snowballs, and often centers around the stomach. It's a pretty interesting system that scientists really have not explored much. Source: trained chemist with anxiety issues, so I research this stuff all day while I stare at my reactions. Although I make no claim that my understanding is 100% accurate and up to date with the most recent research, as it is not my specialized field.", "I thought OP meant \"make a mistake\" (usually of social nature) rather then the direct fight or flight situations the explanators are bringing up. Would you really say that it's the fight or flight system that kicks in if you (to use an internet-relevant example) tell a rape joke to a group and then find out one of the people you told it to was a victim?" ]
[ [ "stomachaches that often occur. Overdose can result in drowsiness, nausea, epigastric pain, and vomiting.", "-34.37720998158329" ], [ "until now. My mood is obviously not great right now. I’m disgusted.\nI go out there and put my body through hell. I’ve broken my neck, dislocated my shoulder twice, torn my other pec, my elbows are mush, I have two protruding discs in my lower back. I even got bit by a brown recluse spider that turned into a flesh-eating disease—the list goes on. I still go out there and prove that I am the best.\n\nWhy do I still do this? Not for them. I do it for my pride. I don't give a rat's ass what the fans think.", "-33.825821221238584" ], [ "end stage of type I and type II hernias occurs when the whole stomach migrates up into the chest by rotating 180° around its longitudinal axis, with the cardia and pylorus as fixed points. In this situation the abnormality is usually referred to as an intrathoracic stomach. Treatment In the great majority of cases, sufferers experience no life-altering discomfort, and no treatment is required. If there is pain or discomfort, 3 or 4 sips of room temperature water will usually relieve the pain. Symptomatic patients should elevate the head of their beds and avoid lying down directly after meals. If", "-33.04273710702546" ], [ "causes than nausea does.\nSome symptoms can be misleading to the patient or the medical practitioner caring for them. For example, inflammation of the gallbladder often gives rise to pain in the right shoulder, which may understandably lead the patient to attribute the pain to a non-abdominal cause such as muscle strain. Symptom versus sign A medical sign has the potential to be objectively observed by someone other than the patient, whereas a symptom does not. There is a correlation between this difference and the difference between the medical history and the physical examination. Symptoms belong only to the history, whereas", "-33.0122124676127" ], [ "people can be brought on by a number of conditions, such as dopamine malfunction or a macular degeneration such as Charles Bonnet syndrome. A feeling of well-being could be caused by a response from the body's dopamine or endogenous opioid systems. The paper also cites a survey where it was found that approximately half of people reporting a near-death experience where not in danger of dying.\nIn regards to Sam Parnia's near-death research, which had an objective test that involved pictures or figures hidden on shelves where a patient could not see them when lying down, but would be able", "-32.344595723436214" ], [ "Stomach disease Chronic disorders Disorders of the stomach are very common and induce a significant amount of morbidity and suffering in the population. Data from hospitals indicate that more than 25% of the population suffers from some type of chronic stomach disorder including abdominal pain and indigestion. These symptoms occur for long periods and cause prolonged suffering, time off work and a poor quality of life. Moreover, visits to doctors, expense of investigations and treatment result in many days lost from work and a colossal cost to the financial system. Gastritis In the stomach there is a slight balance between", "-32.20454228989547" ], [ "strange syndrome whenever I have eaten out in a Chinese restaurant, especially one that served northern Chinese food. The syndrome, which usually begins 15 to 20 minutes after I have eaten the first dish, lasts for about two hours, without hangover effect. The most prominent symptoms are numbness at the back of the neck, gradually radiating to both arms and the back, general weakness and palpitations...\nSymptoms attributed to the Chinese restaurant syndrome have been determined to be false. Although many people believe that monosodium glutamate (MSG) is the cause of these symptoms, an association has never been demonstrated under", "-32.16882469877601" ], [ "find that the pain is intensifying. At its peak, however, it disappears. Thinking that the stomachache was brought by the berries he ate the night before, he turns to look at the terrible mess he made, only to find that, instead of \"doo-doo,\" there was a baby \"Winkie\". For months, father-mother and daughter live peacefully in the forest, eating berries and sometimes from garbage cans nearby. One day, Baby Winkie is kidnapped by a mad English professor living in the woods. The professor is a terrorist, making bombs and mailing them to other terrorists. He kidnapped Baby Winkie for he", "-32.05295093453606" ], [ "lead to the stomach's inability to contract and lose its ability to empty itself. Side effects of gastroparesis include chronic indigestion, nausea and vomiting.", "-31.897622659569606" ], [ "feeling human being to hear such stuff makes me sick to my stomach.\"", "-31.89046358736232" ], [ "much food or liquid in your stomach if your stomach doesn’t have that capability can make you vomit.\" Thus, the vomiting response is likely due to an inability for the stomach to contain the substances.", "-31.865164121292764" ], [ "vomiting but feel less afterwards. The fear comes back, however, if the victim fears they will throw up again. Medications Also noted in the emetophobia internet survey was information about medications. People were asked whether they would consider taking anxiety medication to potentially help their fear, and many in the study answered they wouldn't for fear that the drugs would make them nauseated. Others, however, stated that some psychotropic medications (such as benzodiazepines and antidepressants) did help with their phobia, and some said gastrointestinal medications were also beneficial. Exposure treatments Exposure methods, using video-taped exposure to others vomiting, hypnosis, exposure", "-31.773857143918576" ], [ "effects Common side effects include drowsiness, dizziness and upset stomach.", "-31.653940682066604" ], [ "in a lifetime to several a week, with the average being about one a month.\nThe pain is frequently accompanied by nausea, vomiting, sensitivity to light, sensitivity to sound, sensitivity to smells, fatigue and irritability. In a basilar migraine, a migraine with neurological symptoms related to the brain stem or with neurological symptoms on both sides of the body, common effects include a sense of the world spinning, light-headedness, and confusion. Nausea occurs in almost 90% of people, and vomiting occurs in about one-third. Many thus seek a dark and quiet room. Other symptoms may include blurred vision, nasal stuffiness, diarrhea,", "-31.640382875222713" ], [ "skin and excessive sweating, urinary incontinence, and altered sexual function. Constipation and impaired stomach emptying (gastric dysmotility) can be severe enough to cause discomfort and even endanger health. Changes in perception may include an impaired sense of smell, disturbed vision, pain, and paresthesia (tingling and numbness). All of these symptoms can occur years before diagnosis of the disease. Causes Many risk factors have been proposed, sometimes in relation to theories concerning possible mechanisms of the disease; however, none have been conclusively proven. The most frequently replicated relationships are an increased risk in those exposed to pesticides, and a reduced risk", "-31.617523780325428" ], [ "tears ran down the pink creases in his dusty face.\n\"I've never felt like this before. My will is strong [La tête est bonne], my legs are good, but I'm not making progress. My stomach is in a bad state.\"\n\"Your stomach?\", asked Géo Lefèvre.\n\"Yes. It's finished, finished\", Aucouturier replied.\n\"Allons! Allons! Eat and you'll feel better\", Géo Lefèvre said.\nHe ate, he stood up, clenched his hands and slowly took hold of his machine. Poor beaten champion. The robust Hippolyte brought to ground by stomach pain, abandoned at La Palisse, 135km from the finish.\nGéo Lefèvre insisted the cause was food poisoning.\nLa Palisse, 2", "-31.42702955089044" ], [ "Cricopharyngeal spasm Causes Causes include stress and anxiety. Other causes are not yet clear. In some cases, eating certain foods may bring on acute spasms, in susceptible individuals. Peanuts, pumpkin seeds and other nuts may trigger these spasms. Physiology There are two sphincters in the oesophagus. They are normally contracted and they relax when one swallows so that food can pass through them going to the stomach. They then squeeze closed again to prevent regurgitation of the stomach contents. If this normal contraction becomes a spasm, these symptoms begin.", "-31.398447140556527" ], [ "effects and recommended methods of bringing relief. \nAfter taking an elixir, if your face and body itch as though insects were crawling over them, if your hands and feet swell dropsically, if you cannot stand the smell of food and bring it up after you have eaten it, if you feel as though you were going to be sick most of the time, if you experience weakness in the four limbs, if you have to go often to the latrine, or if your head or stomach violently ache—do not be alarmed or disturbed. All these effects are merely proofs that", "-31.34997036700952" ], [ "mellitus. Pancreatic insufficiency, short bowel syndrome, Whipple's disease, coeliac disease, and laxative abuse should also be considered. The differential diagnosis can be complicated somewhat if the person exhibits only vomiting or diarrhea (rather than both).\nAppendicitis may present with vomiting, abdominal pain, and a small amount of diarrhea in up to 33% of cases. This is in contrast to the large amount of diarrhea that is typical of gastroenteritis. Infections of the lungs or urinary tract in children may also cause vomiting or diarrhea. Classical diabetic ketoacidosis (DKA) presents with abdominal pain, nausea, and vomiting, but without diarrhea. One study found", "-31.340033326734556" ], [ "I have been told so.\" When he starts suffering from the Nausea he feels the need to talk to Anny, but when he finally does, it makes no difference to his condition. He eventually starts to think he does not even exist: \"My existence was beginning to cause me some concern. Was I a mere figment of the imagination?\"\nAnny is an English woman who was once Antoine's lover. After meeting with him, Anny makes it clear that she has changed a considerable amount and must go on with her life. Antoine clings to the past, hoping that she may want", "-31.279520335549023" ], [ "most of us are short strewn, but they always seem very confused by any details you give them. Walking through the front door of home, with a group of friends in tow, it's Mission Accomplished and time to chill, providing you've come to an arrangement on who's making the tea, the toast and nobody has forgotten the Rizzlas. For many there is a fine art to getting the most out of the next few hours. Stories of the mind slowing down and each muscle releasing one by one can result in a feeling that can only be described as looking", "-31.133042219124036" ], [ "I Feel Sick Issue 1 The series opens with Devi yelling out loud, while destroying her own painting in an attempt to remind herself that she isn't insane. After finishing and looking back at her painting, it was as if she never destroyed it. After overhearing her friend yelling, Tenna comes upstairs to check on Devi. However, when Tenna asks her to explain why she was yelling, Devi simply responds by saying \"I don't think I can just yet!\". The flashback reveals an event which occurred a few unspecified years ago, when Devi was sixteen. While on a date with", "-31.124245248851366" ], [ "Intussusception (medical disorder) Signs and symptoms Early symptoms can include periodic abdominal pain, nausea, vomiting (sometimes green in color from bile), pulling legs to the chest area, and intermittent moderate to severe cramping abdominal pain. Pain is intermittent—not because the intussusception temporarily resolves, but because the intussuscepted bowel segment transiently stops contracting. Later signs include rectal bleeding, often with \"red currant jelly\" stool (stool mixed with blood and mucus), and lethargy. Physical examination may reveal a \"sausage-shaped\" mass, felt upon palpating the abdomen. Children, or those unable to communicate symptoms verbally, may cry, draw their knees up to their", "-31.10969383153133" ], [ "become sick soon after eating the same food in the same place: oatmeal in a cafeteria.\nThis suggests food poisoning, but of an incredibly rare type that the doctors have never seen before. The men do not have the main symptoms of food poisoning: diarrhoea and vomiting. Also, the incubation period is too short for the most common bacterial poisonings. They also suspect recreational drugs, but the men deny this, saying that they drink quite heavily but nothing else. This brings them back to the oatmeal. Did it have something in it that could cause this reaction?\nThe other possibilities are a", "-31.0989513322711" ], [ "mouth, constipation, urinary retention, increased heart rate, sedation, irritability, decreased coordination, anxiety, blood disorders, confusion, decreased libido, dizziness, flushing, headache, impotence, insomnia, low blood pressure, nightmares, rapid or irregular heartbeat, rash, seizures, sensitivity to sunlight, stomach and intestinal problems. Other more complicated side effects include; chest pain or heavy feeling, pain spreading to the arm or shoulder, nausea, sweating, general ill feeling; sudden numbness or weakness, especially on one side of the body; sudden headache, confusion, problems with vision, speech, or balance; hallucinations, or seizure (convulsions); easy bruising or bleeding, unusual weakness; restless muscle movements in your eyes, tongue, jaw,", "-31.036621223203838" ], [ "or drink items that do not trigger a response.\nUnlike typical vomiting, the regurgitation is typically described as effortless and unforced. There is seldom nausea preceding the expulsion, and the undigested food lacks the bitter taste and odour of stomach acid and bile.\nSymptoms can begin to manifest at any point from the ingestion of the meal to 120 minutes thereafter. However, the more common range is between 30 seconds to 1 hour after the completion of a meal. Symptoms tend to cease when the ruminated contents become acidic.\nAbdominal pain (38.1%), lack of fecal production or constipation (21.1%), nausea (17.0%), diarrhea (8.2%), bloating (4.1%), and dental decay (3.4%) are also described", "-30.98816487716249" ], [ "rashes and stomach ache.", "-30.984592251305003" ], [ "it can also occur from a blockage at the distal end of stomach, a cancer or a stroke. Symptoms of gastroparesis includes abdominal pain, fullness, bloating, nausea, vomiting after eating food, loss of appetite and feeling of fullness after eating small amounts of food. Diarrhea During digestion, food is stored in the liquid present in the stomach. The food that is not digested travels to the large intestine and colon in liquid form. These organs begin to absorb the water turning the food into a more solid form. Different viruses or bacteria can increase the amount of liquid that is", "-30.959075824415777" ], [ "Martin, a man with a gunshot-induced fistula in his abdomen, experienced lower secretions of digestive juices and a slower stomach emptying when he was upset. In this case, the emotions St. Martin was feeling affected his physiological reaction, but the reverse can also be true. In a study with Crohn's disease patients where patients and unaffected controls watched happy, frightening, disgusting, and saddening films, patients with active Crohn's disease had more responsive EGG (a greater physiological response) and reported feeling more aroused when feeling the negative emotions of disgust or sadness. This leads researchers to believe that increased physiological activation", "-30.82194829097716" ], [ "something like \"he must be sick; I guess he's sick; maybe he's sick; he might be sick.\"", "-30.730445091729052" ], [ "stuff in Night Call Nurses that's so stupid and so dumb, I just get a warm feeling thinking about it. It's so silly and sweet and naive and awful.\"", "-30.63904908846598" ], [ "The Stomach Synopsis Frank (Simon Meacock) is a spirit medium whose talents have proven to be more of a curse than a gift. Whenever a spirit is present his stomach will swell and pulsate, a process that enables his customers to talk to their dead loved ones but at the cost of his own physical well being. Tired of the constant pain and suffering, Frank decides that he will give up the medium life but finds that one of his customers is unwilling to accept his new decision to change his career. Reception Dread Central praised The Stomach, writing \"A", "-30.558201501960866" ], [ "to state that \"Stomach inflation is a complex problem that may cause regurgitation, [gastric acid] aspiration, and, possibly, death.\" When stomach inflation leads to vomiting of highly acidic stomach acids, delivery of subsequent breaths can force these caustic acids down into the lungs where they cause life-threatening or fatal lung injuries including Mendelson's syndrome, aspiration pneumonia, acute respiratory distress syndrome and \"pulmonary injuries similar to that seen in victims of chlorine gas exposure\". Apart from the risks of gastric inflation causing vomiting and regurgitation, at least two reports have been found indicating that gastric insufflation itself remains", "-30.526988313533366" ], [ "Domperidone Nausea and vomiting There is some evidence that domperidone has antiemetic activity. It is recommended by the Canadian Headache Society for treatment of nausea associated with acute migraine. Gastroparesis Gastroparesis is a medical condition characterised by delayed emptying of the stomach when there is no mechanical gastric outlet obstruction. Its cause is most commonly idiopathic, a diabetic complication or a result of abdominal surgery. The condition causes nausea, vomiting, fullness after eating, early satiety (feeling full before the meal is finished), abdominal pain and bloating.\nDomperidone may be useful in diabetic and idiopathic gastroparesis.\nHowever, increased rate of gastric emptying induced", "-30.38463733383105" ], [ "I sat on the bench in New York. Now sometimes that got you into a little bit of hot water; here they seem to like it. Fortunately for me, I don't have to act. This is it. And if you annoy me, or if you lie to me, or if I feel as if you're trying to obfuscate the truth, you're going to get on my bad side. And that's a side that you don't want to be on.\nOn March 30, 2011, Sheindlin was admitted to the hospital after she fainted on the set of her show while handling a", "-30.3453553103609" ], [ "sucks; it's aggravating. It feels like I'm a little off on things, a little slower. My left side is always numb, and my brain doesn't feel as sharp as it used to. And it's tough when people don't want to see or know about that. They draw a big X on you, and that's sad. It's like you're forgotten when you're out of the limelight. Nobody owes me anything, but somebody could maybe give me something (work-wise) to keep me involved. I used to make $5,000 for a two-hour appearance. Now, I have a hard time finding a job for", "-30.261558476428036" ], [ "a hunched, nervous depressed wreck, with Shirley nagging him. Shirley: \"How long you gonna keep on being like this? Makes me sick to look at ya. Why don't you go out and get yourself a job?\". John Allen: \"I can't get one. I tried\". Shirley: \"you can go back to riveting\". John: \"I can't go back to that\" \"not ever since Bud .. I can't climb .. when I get up there, my head swims, I get sick, afraid, I gotta hold on. One minute he was standing there talking to me and the next he was flying through space,", "-30.12953564710915" ], [ "of the following: abdominal pain, bloating, bowel habit abnormalities (either diarrhea or constipation), nausea, aerophagia, gastroesophageal reflux disease, and aphthous stomatitis.\nExtra-intestinal symptoms, which can be the only manifestation of NCGS even in absence of gastrointestinal symptoms, may be any of the following: headache or migraine, “foggy mind”, fatigue, fibromyalgia, joint and muscle pain, leg or arm numbness, tingling of the extremities, dermatitis (eczema or skin rash), atopic disorders, allergy to one or more inhalants, foods or metals (such as mites, graminaceae, parietaria, cat or dog hair, shellfish, or nickel), depression, anxiety, anemia, iron-deficiency anemia, folate deficiency, asthma, rhinitis, eating", "-30.118139968486503" ], [ "your stomach and you are on the verge of developing an ulcer. This was caused by eating raw fish.\" Whereupon he prepared two pints of a decoction for the governor, [Hua Tuo] had him drink one pint first and then after a little while had him finish the remainder. In the space of time that it takes to eat a meal, the governor vomited up three pints or so of parasites. They had red heads and were all wriggling; half of their bodies looked like raw fish slices. The discomfort that he had experienced was immediately relieved. \"This sickness will", "-30.08728683833033" ], [ "my empty stomach churn and I would grow vaguely angry. Why could I not eat when I was hungry? Why did I always have to wait until others were through? I could not understand why some people had food and others did not”’.⁸ “Toting” was a custom important to African-American families’ but it could not always ensure a steady supply of food. However, some employers did recognize this. One employer stated, “there are hungry children in the cabin awaiting their mothers return, when I give out my meals I bear these little blackberry pickaninnies in mind, and I never wound", "-30.081598597869743" ], [ "her life similar to those experienced by her mother; the episodes may have been made worse by symptoms of hepatitis. In 1968, Arbus wrote a letter to a personal friend Carlotta Marshall that says: \"I go up and down a lot. Maybe I’ve always been like that. Partly what happens though is I get filled with energy and joy and I begin lots of things or think about what I want to do and get all breathless with excitement and then quite suddenly either through tiredness or a disappointment or something more mysterious the energy vanishes, leaving me harassed,", "-30.04917568417295" ], [ "bradygastria, which is when electrical activity in the stomach drops to below 2 cpm resulting in a slower stomach rhythm, when exposed to disgusting stimuli, which may be a precursor to nausea and vomiting, both physiological responses to disgust. In this study, the presence of bradygastria was able to predict trait and state disgust, which no other physiological measure used in the study was able to detect. This abnormal myoelectrical activity is usually combined with other precursors to nausea and vomiting, such as increased salivary production, which further supports the idea that these rhythms show early signs of nausea and", "-29.969788974383846" ], [ "had tightness in the stomach, tingling in pretibial areas, and developed a purplish hue in the face indicating blood circulation problems. He vomited after 3 minutes.\nAnother subject given 4 mg complained of “chest oppression” and that “a load is pressing down from above and my body feels heavy.” The subject also reported “numbness of the entire body” and “a pleasant Martini feeling-my body is taking charge of my mind”. The subject reported he saw red spots passing before his eyes and red-purple spots on the floor, and the floor seemed very close to his face. Within 2 minutes these visual effects", "-29.936164324404672" ], [ "Diverticulitis Signs and symptoms Diverticulitis typically presents with left lower quadrant abdominal pain of sudden onset. There may also be fever, nausea, diarrhea or constipation, and blood in the stool. Causes The causes of diverticulitis are poorly understood, with approximately 40 percent due to genes and 60 percent due to environmental factors. Conditions that increase the risk of developing diverticulitis include arterial hypertension and immunosuppression. Obesity is another risk factor. Low levels of vitamin D are associated with an increased risk of diverticulitis. Diet It is unclear what role dietary fibre plays in diverticulitis. It is often stated that a", "-29.830389114562422" ], [ "by symptoms such salivation, feeling faint, and a fast heart rate. Vomiting is the forceful ejection of stomach contents through the mouth. Although nausea and vomiting are closely related, some patients experience one symptom without the other and it may be easier to eliminate vomiting than nausea. The vomiting reflex (also called emesis) is thought to have evolved in many animal species as a protective mechanism against ingested toxins. In humans, the vomiting response may be preceded by an unpleasant sensation termed nausea, but nausea may also occur without vomiting. The central nervous system is the primary site where a", "-29.780369661864825" ], [ "diary a few days later, \"I have never been more wretched, tired and hungry and dispirited, and at the same time feeling we had been let down somehow by somebody.\"", "-29.76804840407567" ], [ "diverticulum may also result in halitosis due to aging food retained in the esophagus. Stomach The stomach is considered by most researchers as a very uncommon source of bad breath. The esophagus is a closed and collapsed tube, and continuous flow of gas or putrid substances from the stomach indicates a health problem—such as reflux serious enough to be bringing up stomach contents or a fistula between the stomach and the esophagus—which will demonstrate more serious manifestations than just foul odor.\nIn the case of allyl methyl sulfide (the byproduct of garlic's digestion), odor does not come from the stomach, since", "-29.68866115785204" ], [ "very beautiful and charmed life. Even when it looked at times like something bad had happened, it soon turned back again to something positive. The loss of my eyesight, although difficult, did not make me bitter. I figured that at my age I have to expect something and remembered all those poor people who suffer from cancer and are in terrible pain. I say to myself that I may have trouble seeing, but I don't suffer any physical, mental, or emotional pain.\"", "-29.634592654998414" ], [ "America. Symptoms include vomiting, loss of appetite, abdominal pain, and general fatigue.", "-29.57046800124226" ], [ "disorder primarily affecting the small intestine caused by the ingestion of wheat, barley, rye, oats, and derivatives, that appears in genetically predisposed people of all ages. CD is not only a gastrointestinal disease, because it may involve several organs and cause an extensive variety of non-gastrointestinal symptoms, and most importantly, it may be apparently asymptomatic. Many asymptomatic people actually are not, but have become accustomed to living with a chronic bad health status as if it were normal, and they are able to recognize that they actually had symptoms related to celiac disease after starting the gluten-free diet and improvement", "-29.560083354299422" ], [ "is to digest food and regulate the intestinal flora. The harmful bacteria in rancid food, for example, creates gas. The colon has distension sensors that can tell when there is unexpected gas pushing the colon walls out—thus the \"second brain\" tells the person that he or she is having intestinal difficulties by way of the sensation of nausea. Doctors typically recommend either total anesthesia or a partial twilight sedative to either preclude or to lessen the patient's awareness of pain or discomfort, or just the unusual sensations of the procedure. Once the colon has been inflated, the doctor inspects it", "-29.54542380629573" ], [ "this, which is certainly true, will make you some less miserable now. I have had experience enough to know what I say; and you need only to believe it, to feel better at once. The memory of your dear Father, instead of an agony, will yet be a sad sweet feeling in your heart, of a purer, and holier sort than you have known before.\nPlease present my kind regards to your afflicted mother.\nYour sincere friend,\n\nA. Lincoln.\nMiss. Fanny McCullough.", "-29.517175606102683" ], [ "Median arcuate ligament syndrome Signs and symptoms Patients with MALS reportedly experience abdominal pain, particularly in the epigastrium, which may be associated with eating and which may result in anorexia and weight loss.The pain can be in the left or right side, but usually where the ribs meet. Other signs are persistent nausea, lassitude (especially after a heavy meal) and exercise intolerance. Diarrhea is a common symptom, some experience constipation. While some experience vomiting, not everyone does. Exercise or certain postures can aggravate the symptoms. Occasionally, physical examination reveals an abdominal bruit in the mid-epigastrium.\nComplications of MALS result from chronic", "-29.496472336206352" ], [ "symptoms, such as nausea, vomiting, and diarrhea, may precede more serious forms of listeriosis or may be the only symptoms expressed. Gastrointestinal symptoms were epidemiologically associated with use of antacids or cimetidine. The onset time to serious forms of listeriosis is unknown, but may range from a few days to 3 weeks. The onset time to gastrointestinal symptoms is unknown, but probably exceeds 12 hours. An early study suggested that L. monocytogenes is unique among Gram-positive bacteria in that it might possess lipopolysaccharide, which serves as an endotoxin. Later, it was found to not be a true endotoxin. Listeria", "-29.483031484065577" ], [ "of fatigue, sensory neuropathy, diarrhea, bone marrow suppression, loss of appetite, nausea, and constipation.", "-29.480540236079833" ], [ "I've over the years tried to not only imagine what it feels like to not be there, but try to remind myself that I could just wake up the next day and it could be gone because that happens, and not to worry about it. And at the same time, when I'm feeling great, I remember the depression and think about the differences in what I'm feeling and why I would feel that way, and not be reactionary one way or the other. You just have to realize that these are patterns of life and you just go through them.\n\nAt", "-29.408160301391035" ], [ "persist after rest, it may be coronary ischemia, or what is called, \"angina\". Some people characterize the pain they feel as though an elephant is sitting on their chest.\nOther typical symptoms include diaphoresis which is sweaty palms, and clammy skin, nausea or vomiting, or shortness of breath. Chest pain radiating down the left arm is also a symptom of coronary ischemia and the pain can also be radiating directly to the back in some instances. Atypical Most atypical symptoms are seen in women, diabetics, and the elderly more than anyone else.\nThese type of symptoms include stomach pain, and simply fatigue.", "-29.39567843324039" ], [ "disorder. Victoria said: \"I felt like an accelerating train, going right down... during the whole period. I had eating disorders and was aware of it, my anguish was enormous. I really hated how I looked like, how I was... I, Victoria, didn’t exist. It felt like everything in my life and around me was controlled by others. The one thing I could control was the food I put in me\". She further said that \"What happened cost and I was the one who stood for the payments. Now I’m feeling well and with the insights I’ve acquired through this I", "-29.373754733765963" ], [ "the intestinal metaplasia of the stomach as a feature of chronic gastritis.", "-29.34325620002346" ], [ "be preceded by symptoms. Associated symptoms are usually because of cerebral hypoperfusion occurring in the upright position and include dizziness, feeling faint or nauseated, diaphoresis, a sense of warmth or blurred vision. Other general symptoms regardless of the position include a feeling of generalized weakness, headache, fatigue, cognitive slowing and shortness of breath. \nSymptoms may be sudden or gradual, getting progressively worse until the patient loses consciousness. Patients may have a single episode with an identifiable precipitating factor or recurrent episodes without an overt, identifiable, precipitating factor. \nBlood pressure and heart rate should be measured in supine and standing", "-29.31518516910728" ], [ "said:\nIn a quiet moment, in a very loud room filled with more people than I could count, Aaron and I were sitting across from one another, totally drained, zombiefied, just looking at each other. He leaned towards me, and I leaned towards him. He quietly said 'Santos, do you still want to do Old Man Gloom?' My stomach dropped, and I responded 'we have to now. We don't have a choice.' We spoke to Nate and he agreed. I don't know what it means, or how it will manifest itself, but we will continue and do our best to honor", "-29.28494516608771" ], [ "the same day, and you don't feel very good when you see a comedy after you've put somebody to rest or watched the Neptune Society blow his ashes into the Pacific Ocean ... Sometimes I feel the way you feel when you find yourself at a dinner party with an uncongenial group of people and you say, 'I've got a great story, but I'm not going to tell it to them tonight. I'm not interested in entertaining them.' A lot of energy goes into it, and sometimes it doesn't seem as if it's worth the trouble. I've been doing", "-29.28335251219687" ], [ "Zachary German Eat When You Feel Sad Eat When You Feel Sad was published by Melville House in February 2010. It is about a character named Robert in an unnamed city.\nOnline and print response to Eat When You Feel Sad was mixed. It has been reviewed in Bookslut, The Rumpus, Time Out Chicago, Publishers Weekly, Philadelphia City Paper, and Nylon.\nDennis Cooper has said of the book: “Zachary German’s nimble, catwalking, archeological, surface dwelling, emotionally unpaved prose is a thing of total wonder and my favorite drug, language-based or otherwise. Eat When You Feel Sad is so bright and pleasurable and", "-29.2719835346943" ], [ "Ellis' inner feelings, mainly her fright, frustration and stress. \"The concept of someone with this disease having a lucid day is real. The disease varies for everyone, but experts we talked to said that patients have bad days and good days and then sometimes they have great days where it seems like they are their old selves. Maybe it's a moment, maybe an hour, for some a whole afternoon, but we were fascinated with the idea of getting this time, this gift, and knowing that it's only temporary. What would you do with that one day? And what would it", "-29.27032866468653" ], [ "common presenting symptoms are gastrointestinal issues such as nausea, vomiting, abdominal pain, and diarrhea, and neurologic or ocular symptoms such as hearing loss, weakness, and peripheral neuropathy. These gastrointestinal symptoms cause patients with MNGIE to be very thin and experience persistent weight loss and this often leads to MNGIE being misdiagnosed as an eating disorder. These symptoms without presentation of disordered eating and warped body image warrant further investigation into the possibility of MNGIE as a diagnosis. Presentation of these symptoms and lack of disordered eating are not enough for a diagnosis. Radiologic studies showing hypoperistalsis, large atonic stomach, dilated", "-29.247380241693463" ], [ "Gastroenteritis Signs and symptoms Gastroenteritis usually involves both diarrhea and vomiting. Sometimes, only one or the other is present. This may be accompanied by abdominal cramps. Signs and symptoms usually begin 12–72 hours after contracting the infectious agent. If due to a virus, the condition usually resolves within one week. Some viral infections also involve fever, fatigue, headache and muscle pain. If the stool is bloody, the cause is less likely to be viral and more likely to be bacterial. Some bacterial infections cause severe abdominal pain and may persist for several weeks.\nChildren infected with rotavirus usually make a full recovery", "-29.22235314111458" ], [ "Proctitis Symptoms A common symptom is a continual urge to have a bowel movement—the rectum could feel full or have constipation. Another is tenderness and mild irritation in the rectum and anal region. A serious symptom is pus and blood in the discharge, accompanied by cramps and pain during the bowel movement. If there is severe bleeding, anemia can result, showing symptoms such as pale skin, irritability, weakness, dizziness, brittle nails, and shortness of breath.\nSymptoms are ineffectual straining to empty the bowels, diarrhea, rectal bleeding and possible discharge, a feeling of not having adequately emptied the bowels, involuntary spasms and", "-29.219623921759194" ], [ "drugs were injected. For his last meal, he had Chinese food: eggrolls, sweet-and-sour shrimp, and batter-fried shrimp. He began his final statement by addressing his step-siblings:\nAll the people that are hating me right now and are here waiting to see me die, when you wake up in the morning, you're not going to feel any different. You're going to hate me just as much tomorrow as tonight. \nWhen you wake up and nothing has changed inside, reach out to God and He will be there for you. Reach out to God and He will heal you. Let Him touch your", "-29.217744071851484" ], [ "Dural ectasia Signs and symptoms Most common symptoms include lower back pain, headaches, weakness, numbness (anesthesia) above and below \nthe involved limb, leg pain, and sometimes there can be rectal and genital pain. Bowel and bladder dysfunction, urinary retention or even incontinence may occur.\nThe symptoms are usually exacerbated by upright posture and often but not always relieved by lying down. However, in many patients it is asymptomatic. Causes It is common in Marfan syndrome, occurring in 63–92% of people with the syndrome. Dural ectasia may also occur in Ehlers-Danlos Syndrome, neurofibromatosis type I, ankylosing spondylitis, and trauma. Diagnosis Diagnosis is", "-29.189064659860378" ], [ "Three days later others started falling ill; 52 people reported a range of symptoms, from fever and nausea to vomiting and diarrhea. The cause was not immediately identified. Researchers plotted the seating arrangement: more than 90% of the people at the same table as the sick woman later reported becoming ill. There was a direct correlation between the risk of infection of people at other tables and how close they were to the sick woman. More than 70% of the diners at an adjacent table fell ill; at a table on the other side of the restaurant, the attack rate", "-29.167799071788977" ], [ "or constriction in chest, choking feelings, sighing, dyspnea.\n11. Gastrointestinal symptoms: Difficulty in swallowing, wind abdominal pain, burning sensations, abdominal fullness, nausea, vomiting, borborygmi, looseness of bowels, loss of weight, constipation.\n12. Genitourinary symptoms: Frequency of micturition, urgency of micturition, amenorrhea, menorrhagia, development of frigidity, premature ejaculation, loss of libido, impotence.\n13. Autonomic symptoms: Dry mouth, flushing, pallor, tendency to sweat, giddiness, tension headache, raising of hair.\n14. Behavior at interview: Fidgeting, restlessness or pacing, tremor of hands, furrowed brow, strained face, sighing or rapid respiration, facial pallor, swallowing, etc.\" Scoring The Hamilton Anxiety Rating Scale is clinician-rated scale that is intended to provide", "-29.16759897908196" ], [ "intestinal symptoms from Crohn's disease often feel better when they do not eat and might lose their appetite. People with extensive small intestine disease may also have malabsorption of carbohydrates or lipids, which can further exacerbate weight loss. Extraintestinal Crohn's disease can affect many organ systems beyond the gastrointestinal tract. Inflammation of the interior portion of the eye, known as uveitis, can cause blurred vision and eye pain, especially when exposed to light (photophobia). Inflammation may also involve the white part of the eye (sclera), a condition called episcleritis. Both episcleritis and uveitis can lead to loss of vision if", "-29.16530647757463" ], [ "much research to be done on the brain-gut connection, research thus far has indeed shown that your stomach does indeed churn differently when you are emotionally aroused, and this could be the basis of the gut feeling that many people describe experiencing. Gender differences In recent years, some research has been done about gender differences in the perception and experience of disgust. One such study, upon presenting both male and female subjects with video clips designed to trigger disgust and found that although women reported feeling more disgust than men at these stimuli, the physiological responses did not show", "-29.150431635789573" ], [ "later noted that he had woken her saying \"I have got the pain & I shall feel better or bear it better if you are awake\". He had taken the antispasmodic twice, and afterwards said \"I am not the least afraid of death- Remember what a good wife you have been to me – Tell all my children to remember how good they have been to me\".\nDr Allfrey attended and gave some relief, then after he left at 8 a.m. Charles began violent vomiting, after two hours gasping \"If I could but die\" repeatedly. Frank and Henrietta returned to join", "-29.147672093815345" ], [ "Esophageal spasm Signs and symptoms The symptoms may include trouble swallowing, regurgitation, chest pain, heartburn, globus pharyngis (which is a feeling that something is stuck in the throat) or a dry cough. Causes It is not clear what causes esophageal spasms. Sometimes esophageal spasms start when someone eats hot or cold foods or drinks. However, they can also occur with eating or drinking. The increased release of acetylcholine may also be a factor, but the triggering event is not known. Spasms may also be the result of a food intolerance. Diagnosis The diagnosis is generally confirmed by esophageal manometry. DES", "-29.14635993068805" ], [ "\"sick in the best sense of the word\". I may be warped, but knowing that the editor had seen a lot of bizarre stuff in her career, I took her comment as a huge compliment, especially since the story was as psychological as it was gritty-physical. I went on to sell it elsewhere (twice!), and it received a Stoker recommendation, so I guess others thought it \"sick\" as well.\"\nGray's books and stories take place in Maine, and according to a 2005 Library Journal review: \"Gray (Mr. Crisper and The Ravenous) continues her tradition of creating compelling horror tales with a", "-29.13926430681022" ], [ "For 25 years extreme spasmodic daily & nightly flatulence: occasional vomiting, on two occasions prolonged during months. Vomiting preceded by shivering, hysterical crying, dying sensations or half-faint. & copious very palid urine. Now vomiting & every paroxys[m] of flatulence preceded by singing of ears, rocking, treading on air & vision. focus & black dots – All fatigues, specially reading, brings on these Head symptoms ?? nervousness when E[mma] leaves me ...\" [the list continues]\nIn his autobiography of 1876, Darwin wrote of his illness, emphasising that it had been brought on by \"the excitement\" of socialising:\nFew persons can have lived a more", "-29.121831920347176" ], [ "with a chronic general medical condition will develop major depression. Common comorbid disorders include: eating disorders, substance-related disorders, panic disorder, and obsessive-compulsive disorder. Up to 25% of people who experience a major depressive episode have a pre-existing dysthymic disorder.\nSome persons who have a fatal illness or are at the end of their life may experience depression, although this is not universal.", "-29.117346491315402" ], [ "the gastrointestinal tract, symptoms can emerge any time in the first fifty years of life; most often they emerge before the person turns 20. Weight loss is common as is a lack of the ability of the stomach and intestines to automatically expand and contract and thus move through it (called gastrointestinal motility) – this leads to feeling full after eating only small amounts of food, nausea, acid reflux, All affected individuals develop weight loss and progressive gastrointestinal dysmotility manifesting as early satiety, nausea, diarrhea, vomiting, and stomach pain and swelling. People also develop neuropathy, with", "-29.10264854237903" ], [ "the stomach lining can account for nausea because alcohol stimulates the production of hydrochloric acid in the stomach. Low blood sugar Studies show that alcohol hangover is associated with a decrease in blood glucose concentration (less than 70 ml/dl), but the relationship between blood glucose concentration and hangover severity is unclear. Also known as insulin shock, hypoglycemia can lead to coma or even death. Immune system In current research, the significant relationship between immune factors and hangover severity is the most convincing among all factors so far studied. An imbalance of the immune system, in particular of cytokine metabolism has", "-29.09756895521423" ], [ "Disorders further notes that the, \"Self-induced vomiting seen in both anorexia nervosa and bulimia nervosa can lead to swelling of salivary glands, electrolyte and mineral disturbances, and dental enamel erosion.\" In addition, \"rarer complications\" include \"tearing [of] the esophagus, rupturing of the stomach, and life-threatening irregularities of the heart rhythm.\" Possible causes According to Cassell and Gleaves, \"biological, psychological, [and] social factors\" all play a role in the development of an eating disorder. In their Introduction, they note that, \"In addition to core eating and body image-related psychopathology of the eating disorder...a variety of additional problems, including depression, anxiety, obsessive-compulsive", "-29.022493631298858" ], [ "can affect the total thickness of the stomach wall and can bleed but rarely perforate. \nSymptoms include abdominal pain, loss of appetite, and weight loss. Diarrhea is also a symptom that can develop, so checking stools for the appearance of blood is important. It is possible for symptoms of Crohn's disease to remain with a person for weeks or go away on their own. Reporting the symptoms to a doctor is recommended to prevent further complications. Cancers Cancers of the stomach are rare and the incidence has been declining worldwide. Stomach cancers usually occur due to fluctuations in acidity level", "-28.988591361558065" ], [ "and sickening, their classmates willingly consume it. Kate and Abby decide to eat granola bars Abby brought instead of the served food. While the class is on its way to its next stop after leaving the restaurant, everyone on the bus except for Kate and Abby become nauseous due to the lunch they ate and start vomiting. The teacher, having also eaten the food, brings the class to a motel to spend the night and recover. As Kate and Abby are in the motel asking for rooms, Abby notices an envelope on the counter with the names Viceroy and Monarch", "-28.944939818466082" ], [ "nausea, stomach pain, excessive sweating, and vomiting. In severe cases, heart arrhythmia, muscle cramps, extreme muscle twitching, paresthesia (the feeling of \"pins and needles\" all over the body), seizures, weakness, and unconsciousness occur. Death may follow.\nToxic symptoms generally resolve themselves after 24 to 48 hours. Supportive treatment for the symptoms is usually administered. Because extreme vomiting occurs, decontamination (e.g., stomach pumping or the ingestion of activated charcoal) is usually not implemented unless ingestion has occurred within one hour. Atropine is usually administered to counteract the low heart rate, and sympathomimetic drugs and liquids administered to raise the blood pressure.\nThe herb", "-28.939790586708114" ], [ "had developed a sleep and behavior disorder after this he developed phantosmia; which was described to be as \"stinky and unpleasant\". The patient did not display the following symptoms: loss of awareness, confusion, automatisms, convulsive seizures or auditory/visual hallucinations. Co-occurrence with other disorders Phantosmia has been found to co-exist in patients with other disorders such as schizophrenia, epilepsy, alcoholic psychosis, and depression. It has also been found that many patients may begin to suffer from depression after the occurrence of phantosmia and have looked towards committing suicide. The occurrence of depression resulted from the severe symptoms of phantosmia as everything", "-28.915141917648725" ], [ "God, it sounds so stupid. But being a kid you're just so frightened... I never talked about it, so it stayed with me all those years. I felt not deserving, not good enough... that's still the way I feel about myself sometimes\", she declared. As a child, she managed discomfort by speaking to her animals, later turning to overeating as an anesthetic, causing fluctuations in weight. Jackson said, \"I began to realize that whenever something really painful was going on, I would eat, and that's how I would run away from it. But I would just be creating another problem", "-28.851117007958237" ], [ "the disease is the result of the Völlige Verzweiflung, a disease that causes their victims to burst their insides out. If the food is eaten raw, nothing will happen; but if the food is cooked, it is a toxin to the Blutbaden. Sam is found by Nick, Hank and Monroe and his stomach explodes, killing him. Deducing Ostler is responsible, Monroe goes to kill him. Nick manages to get Ostler to confess when Monroe and a pack of Blutbaden arrive at the restaurant to kill him. Ostler signs a written confession in the precinct and Renard looks at it and", "-28.829557210439816" ], [ "causing others to vomit, when they are especially fearful of also becoming ill, through a form of mass hysteria.\nMost people try to contain their vomit by vomiting into a sink, toilet, or trash can, as vomit is difficult and unpleasant to clean. On airplanes and boats, special bags are supplied for sick passengers to vomit into. A special disposable bag (leakproof, puncture-resistant, odorless) containing absorbent material that solidifies the vomit quickly is also available, making it convenient and safe to store until there is an opportunity to dispose of it conveniently.\nPeople who vomit chronically (e.g., as part of an eating", "-28.803288747440092" ], [ "symptoms) and is generally detected incidentally when a person is being examined for other ailments.\nOther signs and symptom may include haematuria; loin pain; abdominal mass; malaise, which is a general feeling of unwellness; weight loss and/or loss of appetite; anaemia resulting from depression of erythropoietin; erythrocytosis (increased production of red blood cells) due to increased erythropoietin secretion; varicocele, which is seen in males as an enlargement of the pampiniform plexus of veins draining the testis (more often the left testis) hypertension (high blood pressure) resulting from secretion of renin by the tumour; hypercalcemia, which is elevation of calcium levels in", "-28.79362217069138" ], [ "(months to years) onset of constipation because this information changes the differential diagnosis. This in the context of accompanied symptoms help physicians discover the cause of constipation. People often describe their constipation as bowel movements that are difficult to pass, firm stool with lumpy or hard consistency, and excessive straining during bowel movements. Bloating, abdominal distension, and abdominal pain often accompany constipation. Chronic constipation (symptoms present at least three days per month for more than three months) associated with abdominal discomfort is often diagnosed as irritable bowel syndrome (IBS) when no obvious cause is found.\nPoor dietary habits, previous abdominal surgeries,", "-28.75643202161882" ], [ "for himself. While he admits that it felt good, it ultimately left with him a dark and empty feeling, just as he imagines she feels. He then tells her that he has realized that bullies will always exist, and while such stages in life seem as if they will last forever to children, one day he will grow into a happy adult, and as she lies dying in a hospital, he will visit her to show her that he is still alive and happy, while she will die the same empty, sad person she's always been. The next day, after", "-28.736321577220224" ], [ "guilt, hopelessness, sleeping too much or not enough, changes in appetite and/or weight, fatigue, problems concentrating, self-loathing or feelings of worthlessness, and thoughts of death or suicide. In severe cases, the individual may develop symptoms of psychosis, a condition also known as severe bipolar disorder with psychotic features. These symptoms include delusions and hallucinations. A major depressive episode persists for at least two weeks, and may result in suicide if left untreated.\nThe earlier the age of onset, the more likely the first few episodes are to be depressive. Since a diagnosis of bipolar disorder requires a manic or hypomanic episode,", "-28.709588094381616" ], [ "I Feel Bad Premise I Feel Bad follows Emet, a wife, mother, and career woman who \"feels bad\" when she deviates from her own standards of perfection while trying to \"have it all.\" Development On February 2, 2018, it was announced that NBC had given the production a pilot order. The pilot episode was written by Aseem Batra based on the book I Feel Bad: All Day. Every Day. About Everything by Orli Auslander. Batra also acts an executive producer alongside Amy Poehler, Julie Anne Robinson, Dave Becky, and Joshua D. Maurer. Kelly Pancho and Kim Lessing are set as", "-28.707096796948463" ], [ "most unpleasant side effects of cytotoxic drugs and may result in patients delaying or refusing further radiotherapy or chemotherapy.\nThe strategies of management or therapy of nausea and vomiting depend on the underlying causes. Medical treatments or conditions associated with a high risk of nausea and/or vomiting include chemotherapy, radiotherapy and malignant bowel obstruction. Anticipatory nausea and vomiting may also occur. Nausea and vomiting may lead to further medical conditions and complications including: dehydration, electrolyte imbalance, malnutrition, and a decrease in quality of life.\nNausea may be defined as an unpleasant sensation of the need to vomit. It may be accompanied", "-28.703234065527795" ], [ "never been ill in his life; broad-boned, white and pink, radiant, bad at lessons. Is always thinking about what he is told not to think about. Invents his own games. Hot-tempered and violent, wants to fight at once; but is also tender-hearted and very sensitive. Sensuous; fond of eating and lying still doing nothing. When he eats currant-jelly and buck-wheat kasha his lips itch. Independent-minded in everything. When he cries, is vicious and horrid at the same time; when he laughs every one laughs too. Everything forbidden delights him; he recognizes it at once.\nIn 1881 Ilya entered a private gymnasium", "-28.701516163593624" ], [ "medically possible. Nausea can be severe; it may respond to phenothiazine drugs but is sometimes intractable. Hot baths and showers may lessen nausea temporarily, though caution should be used to avoid burns or falls. Early identification It is recommended that patients with a history of acute porphyria, and even genetic carriers, wear an alert bracelet or other identification at all times. This is in case they develop severe symptoms, or in case of accidents where there is a potential for drug exposure, and as a result they are unable to explain their condition to healthcare professionals. Some drugs are absolutely", "-28.672465964686126" ], [ "a child of man does his fellow. And yet anxiety comes over me, as if I still did not understand what someday I would come to understand, as if the horror I was reading about was waiting for me, as if by reading about it I brought it upon myself, just as one becomes ill with the sickness one reads about.\"\nThe Young Man had a woman who loved him and was unable to withstand the peer pressure of his age. Job had everything he had taken away from him and the only thing he said was, \"The Lord gave\", he", "-28.66142400127137" ], [ "types of complaints that relate to intestinal gas, which may present individually or in combination. Bloating and pain Patients may complain of bloating as abdominal distension, discomfort and pain from \"trapped wind\". In the past, functional bowel disorders such as irritable bowel syndrome that produced symptoms of bloating were attributed to increased production of intestinal gas. However, three significant pieces of evidence refute this theory. First, in normal subjects, even very high rates of gas infusion into the small intestine (30 ml/min) is tolerated without complaints of pain or bloating and harmlessly passed as flatus per rectum. Secondly, studies aiming to", "-28.65212390013039" ], [ "someone who understands him', I have never forgotten what he said to me. I remember he once told me, \"After I die, if you pass by my grave and don't offer a jar of wine and a chicken as sacrifices to me, you'll get a stomachache after your carriage moves another three steps. Don't blame me if that really happens.\" Although that was light-hearted humour, if we were not very close at that time, how would he have cracked such a joke? Now, as I recall these old memories, I feel grief and sorrow. I am now on an eastern", "-28.63648153108079" ], [ "in motion, which is one of the main reasons an intoxicated person may vomit. The person has this feeling due to impairments in vision and equilibrioception. Diplopia (double vision) or polyplopia are common, as well as the symptoms of motion sickness and vertigo. Causes Ingesting a great deal of alcohol in a short amount of time causes alcohol to quickly enter the bloodstream.\nMixing alcohol with normal soft drinks, rather than diet drinks delays the dizzying effects of alcohol because the sugary mixture slows the emptying of the stomach, so that drunkenness occurs less rapidly.\nThe dizzying effects of alcohol upset the", "-28.633970796334324" ] ]
3e2ude
How did American high schools end up being very sports-oriented?
[ "For the same reason America is sports oriented. It makes money (collectively), it's entertaining, it's considered healthy, and it's fun/social.", "Because there is a nominal value placed on education in the States, we expect that everyone will be enrolled in school. So much so, that we have built our sporting development system into our educational system. The professional leagues draw their talent, by and large, from the university leagues, who in turn draw from the high school leagues. There are exceptions, but the expectation is that even if you are only there to play your sport, you will attend school.", "It keeps the kids in school closer to 5pm. So it acts as a daycare since both parents are working to pay the taxes which goes to the overpriced schools.", "Simple: sports generate significantly more revenue than other programs. Sports are made into a spectacle here, which draws fandom. The fandom is intensified by local rivalries, marching-band songs, histories. The events are monetized through jerseys, nick-nacks, memorabilia, hot dogs, etc. The events are sometimes televised - which get corporate sponsorships. Professional Athletes in the United States make a lot of money. Often - they fund facilities for their alma mater in hopes of nurturing more talent. Then talent scouts come to tap shoulders. Not all schools are like this. My High School had a very modest sports program - and spent a lot of money on music and arts. I felt pretty lucky.", "Probably based on how much homework they got. I went to elementary school in Russia, where I would usually get home at around 3 or 4 and be doing homework all day, after which I would read a book and go to sleep. That doesn't leave a lot of time for sports, though I did do ballroom dancing twice a week. When I came to Canada though, I basically stopped doing homework after I finished my Grade 7 math textbook in a week, which left a ton of time for gaming and sports.", "America is a large high school where jocks and rich, popular people rule and the rest of us just have to deal and avoid getting slammed into lockers.", "At the end of the day its down to the dolla... Commercialization mixed with amateur sports is due to the general love of sport in American society.", "It has to do with the size of the US and the availability of large Sports teams. Since not every city can have a professional team many people would attend friendly matches between schools, mostly colleges at first. Once the college sports began getting larger and larger schools would incentivize good players with scholarships to bring in good talent. High school sports grew because 1) games were local and cheep for local sports fans 2) some schools began putting more money in sports programs since they might lead to a student getting a scholarship to a university for the sports they play.", "Your teenage years are when you do most of your social development. Sporting events are large social gatherings. It's also a byproduct of the popularity of professional sports in America just trickling down.", "We live in a country where athletes make 200k and up, while teachers are making 35k. Also consider the number of scholarships available from sports, as compared to say band, or art.", "I can tell you the main reason is money. Alumni donations are VERY strongly correlated with how well the football team is doing. Admissions are similar in the respect. Sports is like (nearly-)free advertising for a high school. Most sports program lose money from an accounting standpoint, but if you ask parents if they would send their kids to a school that didn't have sports, they'd say \"no\". This applies to both High School and College. Honestly the absolute worst effect of American sports-fetishism is the fact that so many high school teachers are just coaches who teach for the sake of being a full-time employee. I literally did not get any Civics or World Geography education because the coaches who taught the classes were revising their play books during class. They would often award bonus points for attending their games. I mean, WHAT??" ]
[ [ "parents exercise little control and children are fully under the coaches' authority.\nAnother disadvantage of this system is that much more attention is paid to sports than school education. Sports boarding schools of Olympic reserve received the sarcastic nickname \"hit-and-run\" (Russian: бей-беги; not be confused with a traffic accident or a baseball play), meaning that children mostly hit footballs and ran around sports fields instead of studying. Sports schools in post-Soviet states After the break-up of the USSR, the system of children and youth sports in Russia passed through difficult times, but managed to retain the network of sports schools, and", "-33.78226632074711" ], [ "more effectively.\nThe reason why most of the school had only one story is because a study in Connecticut found that schools with 800 or less students were more efficient with only one level. Educational system While it awaited the completion of the new school, the town began to implement the system of team teaching in 1959, the year preceding the new high school's opening. It became one of the first schools nationwide to do so. The team teaching system grouped teachers according to area of academics. Each group was led by a team leader (a \"department head\") who organized lessons", "-33.68814106917307" ], [ "in 1909, in Columbus, Ohio. Junior high schools were created for \"bridging the gap between the elementary and the high school\", an emphasis credited to Charles W. Eliot. In the late 19th century and early 20th century, most American elementary schools had grades 1 through 8, and this organization still exists, where some concepts of middle school organization have been adapted to the intermediate grades. As time passed, the junior high school concept increased quickly as new school districts proliferated, or systems modernized buildings and curricula. This expansion continued through the 1960s. Jon Wiles, author of Developing Successful K–8 Schools:", "-33.609852999450595" ], [ "1920s was a decade of prosperity that witnessed the building of large numbers of public high schools with a gymnasium, an idea founded by Nicolas Isaranga. Over the course of the 20th century, gymnasia have been reconceptualized to accommodate the popular team and individual games and sports that have supplanted gymnastics in the school curriculum.\nToday, gymnasia are commonplace in the United States. They are in virtually all U.S. colleges and high schools, as well as almost all middle schools and elementary schools. These facilities are used for physical education, intramural sports, and school gatherings. The number of gyms in the", "-33.41507269795875" ], [ "school has established many sports programs over the years, including baseball, basketball, bowling, football, fencing, cross country, indoor and outdoor track, wrestling, volleyball, and soccer. However, none were as popular as football and basketball in the earlier years of the school. Basketball The basketball team has had the most success in their playoff runs even though there were multiple coaching changes. Head Coach Jose Ferrer currently holds the longest tenure with the team leading the boys varsity team to the playoffs. They had many successes, but have not won finals yet.\nThe Girls varsity basketball team has made the playoffs every", "-33.24952065576372" ], [ "improving the social, mental and physical well-being of inner-city residents.\nSocial agencies such as the YMCA and YWCA, as well as Boys and Girls Clubs, and Boy Scouts and Girl Scouts, provided most of the organized sports to youth in America prior to 1954. While athletics was encouraged by the social gospel movement, youth sports were often organized by youth themselves through the social agencies. This shifted to adults organizing youth sports programs, which was exemplified with the advent of Little League Baseball by Carl Stotz. Little League Baseball was formed in 1939, with a three team league, while in", "-33.134269713534195" ], [ "K–8 school History The \"junior high school\" concept was introduced in 1909. In the late 19th century and early 20th century most American elementary schools had grades 1 through 8. As time passed, until the 1940s, junior high schools increased quickly. The installation of junior high schools was made in order to provide more academic and social opportunities for adolescent students prior to entering high school. By the 1960s many U.S. school districts separated the elementary and junior high school levels, with seventh through ninth grade students at junior high school. As years passed, the model changed to middle schools", "-33.096761674001755" ], [ "the number of teachers 20%.\nFor 2012, StudentsFirst, a political lobbying organization, ranked Florida second among the fifty states, for policy related to education reform. Sports As in most areas, high schools compete in sports in two types of division. One, because of logistical and geographical constraints, is necessarily local. That is, large schools play small ones in the same area. A second division is based on school population and is statewide. Eventually, schools with the best records in this type of division will meet each other for seasonal playoffs to determine the state champion.\nCompetition is under the auspices of the", "-32.972367411796085" ], [ "was surely inevitable, following the transformation of Downside, during the decade preceding the First World War, from a Continental-style college into a mainstream public school: these were the years that saw the Introduction of Rugby Football, Squash, Racquets and, above all, Lawn Tennis. Against such, the older, less sophisticated game, with no prospect of external match fixtures, stood little chance of survival and all efforts to re-introduce it have, so far, failed. However, in 2013 the game was re-introduced into the school life and is fast becoming a major sport at Downside School, with inter-house matches played in the summer", "-32.848467476072074" ], [ "owing to the more conservative political climate of World War II and the Cold War, the reforms' increased labor demands on teachers, and increased competition in college admissions. Nevertheless, the study showed that the curricular structure of American high schools could change under propitious conditions. Its influence was reflected not in direct change but its influence on its participants and subsequent reformers. Design and implementation Based on the criticism that American secondary education curriculum had been designed to meet the needs of college admissions rather than those of students, the Progressive Education Association sponsored an eight-year study between 1933 and", "-32.775484633162705" ], [ "sports, numerous non-athletic extracurricular activities are available in American schools, both public and private. Activities include Quizbowl, musical groups, marching bands, student government, school newspapers, science fairs, debate teams, and clubs focused on an academic area (such as the Spanish Club) or community service interests (such as Key Club). Public and private schools In the United States, state and local government have primary responsibility for education. The Federal Department of Education plays a role in standards setting and education finance, and some primary and secondary schools, for the children of military employees, are run by the Department of Defense.\nK–12 students", "-32.76946066911569" ], [ "and adapted the social change philosophy to schools. Dewey stated, \"The conception of the schools as a social center is born of our entire democratic movement.\" By the early 20th Century, many cities began to recognize schools as social centers, and many states enacted legislation to allow communities to use school facilities more widely (e.g., as art galleries, movie theaters, local health offices).\nDuring the Great Depression, schools were seen as an investment and school facilities continued to be used for multiple purposes. In 1934, Leonard Cavello, an Italian immigrant living in East Harlem, established Benjamin Franklin High School and used", "-32.66797287894042" ], [ "school has most of the outdoor and indoor games. For outdoor games: Basketball, Cricket, Football, Hockey, Volleyball, Throwball, Korfball are the various games in which school competitions are held from time to time. For indoor games Chess, Carrom, and Table Tennis are the games played. Swimming is a major aquatic game of the school. Proper sports equipment and good coaches of each game are available. The school has won competitions of Basketball, Korfball, swimming, chess, etc. The students of school have represented the school at various levels and made the school proud of its sports facilities. Also the students are", "-32.62165360383892" ], [ "in North America during the 19th century. Early games had a variety of local rules and were generally similar to modern rugby union and soccer. By the 1860s, teams from universities were playing each other, leading to more standardized rules and the creation of college football. While several American schools adopted rules based on the soccer rules of the British Football Association, Harvard University held to its traditional \"carrying game\". Meanwhile, McGill University in Montreal used rules based on rugby union. In 1874, Harvard and McGill University in Montreal organized two games using each other's rules. Harvard took a liking", "-32.5809929409445" ], [ "the contrary, are aiming to make our courses fit the particular needs of the student who takes them.\nEducation was a high priority in the Progressive Era, as American high schools and colleges expanded greatly. For men who were older or were too busy with family responsibilities, night schools were opened, such as the YMCA school in Boston that became Northeastern University. Outside the big cities, private correspondence schools offered a flexible, narrowly focused solution. Large corporations systematized their training programs for new employees. The National Association of Corporation Schools grew from 37 in 1913 to 146 in 1920. Starting in", "-32.53478335229374" ], [ "teams were the Comets. Western was a founder member of the Cook County League in 1889 and McKinley of its successor, the Chicago Public League, in 1913. Sports included track (in which the school had two state champions), football (one league championship, in 1890), softball, tennis, baseball (four league championships), and boys' and girls' basketball. It had a traditional rivalry with nearby Crane, for example in indoor baseball (softball), which was particularly popular on the West Side and which Western was the first Chicago school to adopt as a boys' sport, in 1891–1892.", "-32.52472373801265" ], [ "crowds to basketball and other games, especially in small town schools that served nearby rural areas. College preparation In the 1865–1914 era, the number and character of schools changed to meet the demands of new and larger cities and of new immigrants. They had to adjust to the new spirit of reform permeating the country. High schools increased in number, adjusted their curriculum to prepare students for the growing state and private universities; education at all levels began to offer more utilitarian studies in place of an emphasis on the classics. John Dewey and other Progressives advocated changes from their", "-32.503962034483266" ], [ "injuries. This resulted in numerous rule changes agreed upon by the majority of American schools. \nLed by Cal and Stanford, universities of the West Coast took a different path - eliminating America football and changing their game to Rugby union. Other schools that made the switch included Nevada, St. Mary's, Santa Clara, and USC (in 1911). Because the switch to rugby occurred only on the West Coast, the number of teams to play against remained small. This lead to schools scheduling games against local clubs and reaching out to rugby powers in Australia, New Zealand, as well as Canada.", "-32.462527208370375" ], [ "Venues of the 1996 Summer Olympics Before the Olympics Before professional sports came to Atlanta and the Southern United States in the 1960s, college sports were followed in a manner similar to that of professional sports in the New England, Mid-Atlantic, and Midwestern part of the United States. The oldest of the venues in the South used for the 1996 Games was Legion Field in Birmingham, Alabama which opened in 1926 and used from 1948 to 1988 for the Iron Bowl college football rivalry between Auburn University and the University of Alabama, a game that now alternates between the two", "-32.453536044879" ], [ "in 2014 and 2015. Modern history of youth and high school football (1933–present) American has become a popular participatory sport among youth. One of the earliest youth football organizations was founded in Philadelphia, in 1929, as the Junior Football Conference. Organizer Joe Tomlin started the league to provide activities and guidance for teenage boys who were vandalizing the factory he owned. The original four-team league expanded to sixteen teams in 1933 when Pop Warner, who had just been hired as the new coach of the Temple University football team, agreed to give a lecture to the boys in the league.", "-32.44449493425691" ], [ "but it was not until 1924 that three \"country club\" sports were added to the league's schedule golf, tennis, and swimming. The addition of these sports brought the league up to the level of offerings by the Chicago and Suburban public leagues. The 1920s also saw the addition of more schools to the league—St. George, Joliet De la Salle, and Fenwick.\nSome working class sports that had great appeal in some Catholic schools were boxing and bowling, and the league sponsored competition for a few years during the Depression in boxing, and much longer in bowling.\nBy the late 1950s some", "-32.41710046119738" ], [ "60s, 70s and 80s the sport saw the most growth in the area. Most schools, even small rural schools had a football program.\nDuring this time period is when most of the area's schools' rivalries came to fruition. Modern years (1991–present) After the massive growth of the sport, football has continued its success in this region. Fans have continued to support their local schools or colleges in the area with a passion. Even though there is no professional franchise in the area many people root for either the Philadelphia Eagles or Pittsburgh Steelers. High school level football Of the 102 public", "-32.3935854223767" ], [ "came from the Northeast or the Midwest, the trend changed when several teams from the South and the West Coast achieved national success. Wallace William Wade's 1925 Alabama team won the 1926 Rose Bowl after receiving its first national title and William Alexander's 1928 Georgia Tech team defeated California in the 1929 Rose Bowl. College football quickly became the most popular spectator sport in the South.\nSeveral major modern college football conferences rose to prominence during this time period. The Southwest Athletic Conference had been founded in 1915. Consisting mostly of schools from Texas, the conference saw back-to-back national champions with", "-32.378102273487" ], [ "the first eighteen months, sporting activities were limited as the sports fields had not yet been completed, interschool sports had to be played at other schools. 1960s and 1970s By the end of 1961, many of the additional facilities and amenities essential to the running of a high school had been completed: the playing fields, tennis courts and hall. 1962 saw the holding of the first sports meeting at the new school and the swimming bath was completed in 1963. In 1964, a new science laboratory and art room were added to the existing building.\nDuring the third term of 1965,", "-32.36412948500765" ], [ "2000s, problems began to develop in the organization of leagues and conferences. Transportation costs began to grow, as some conferences had teams from as many as four different counties competing against each other. Other conferences were losing competitive balance, as a growth in non-public school enrollment and athletic programs caused tension between non-public and public schools, with public schools accusing non-public schools of recruiting. Conferences also demanded more flexibility in scheduling, as schools felt locked into league and division schedules against opponents either too weak or too strong for true competitive balance. \nThe strongest tensions were found in the Northern", "-32.33497593777338" ], [ "many older schools do not have outdoor facilities readily available.\nSports culture is stronger in independent schools in the United Kingdom, and these schools contribute disproportionate numbers of elite competitors in almost all sports with the exceptions of football, rugby league, boxing and perhaps athletics.\nIn addition to many of the sports already mentioned, popular sports at junior level include netball and rounders, both of which are played almost entirely by girls.\nThe leading body for physical education in the United Kingdom is the Association for Physical Education.\nIn 2006, the UK School Games was established by the Youth Sport Trust as an annual", "-32.32604458509195" ], [ "organized athletics was baseball. A quickly organized team played similar aged opponents from the town of Morris in the late 1890s. Starting in 1901, they began to play a number of high school baseball teams from the area and gained some notice in the local newspapers (which hesitantly covered the team's play). However, because of budget constraints, the team did not have coaches and learned most of their skills from one another.\nThey became a prominent regional team from 1905 until 1907 stringing together victories against many of the high schools in the region. The 1908 season though saw them defeat", "-32.286550814841576" ], [ "New York Interscholastic Athletic Association Sports In 1892, during the winter, Berkeley School conducted the first open indoor-track meet for league members, and in the spring the league introduced baseball as a league competition. In the fall, the league introduced a league championship schedule for football (although some members of the league had played football since at least the fall of 1884). Other sports soon followed, with the adoption of tennis in 1894, ice skating in 1897, ice hockey in 1898, and basketball in 1898. The New York Times devoted almost all its coverage of secondary school sports to the", "-32.25558197845294" ], [ "boasts two state of the art gymnasiums, as well as a new astroturf soccer field. Teams usually compete on weekends.\nIn Elementary school, students are encouraged to participate in numerous sports and can join school teams such as the Track and Field Team. Once in Middle School, the sports program becomes more competitive and the students can participate in all of the sports that the school has to offer. The Middle School teams are divided into the \"A team\" and the \"B team\". The High School Sports program is the most competitive and draws the most school spirit. In high school", "-32.166356694838214" ], [ "esteem and a sense of community. Native Americans Youth sports were an important way of life for Native Americans within boarding schools. Sports for Native Americans living in boarding schools were so important that they were on a similar level of importance as work and teaching. School sports such as track and field, basketball, and wrestling were activities that some Native Americans felt pride in when they participated. This pride was created by the appeal of competition and success, especially against white teams. Former resident of a boarding school for Native Americans, Jeff McCloud's experiences in sports, \"helped him", "-32.13345483838566" ], [ "elementary school restructured. The high school, which educated 1,500 students in its first year, featured regular classrooms, a gymnasium and library. Its sports team, including its football team, The Heart Mountain Eagles, eventually competed against other local high school teams.\nOther sporting events, movie theaters, religious services, crafting groups, and social clubs kept inmates entertained and provided a distraction from the dullness of camp life. Knitting, sewing, and woodcarving were popular not only for entertainment, but because they allowed inmates to improve their dilapidated living conditions. Among children, Girl and Boy Scout programs flourished, as many Nisei had been members before", "-32.06592767372604" ], [ "and has gained recognition around the country for its ability to compete on a regional and national level. The school has a rich history of athletes who have moved on to national and international competition in the Olympic Games, as well as various professional sport leagues. Football Since the school was established 1925, football has been the most popular sport on campus.\nIn early 1929, the school joined the original Texas Intercollegiate Athletic Association (TIAA). By the time the TIAA folded, the \"Fighting Javelinas\" had won two football championships. Following this, the school competed independently for several years. They moved from", "-32.0363471802948" ], [ "ESPN HS History Sensing the high school sports market was being undercovered by local newspapers and television stations, SchoolSports was founded in 1997 in the Greater Boston area. In addition to being one of the first publications dedicated to covering high school sports, SchoolSports also gave student-athletes a voice by allowing them to submit articles for publication in the SchoolBeat section. The magazine's distribution model was also unique, as the publication was sent directly to area high schools free of charge.\nOver the next 10 years, the magazine expanded to 25 markets and was published in Boston, New York, Los Angeles,", "-31.8981170219422" ], [ "many features of modern American education, especially American high schools: counseling programs, the move from many small local high schools to large centralized high schools, curricular differentiation in the form of electives and tracking, curricular, professional, and other forms of standardization, and an increase in state and federal regulation and bureaucracy, with a corresponding reduction of local control at the school board level. (Cf. \"State, federal, and local control of education in the United States\", below) (Tyack and Cuban, pp. 17–26)\nThese reforms have since become heavily entrenched, and many today who identify themselves as progressives are opposed to many of them,", "-31.86055042404496" ], [ "Point School teams have been Knowledge Masters National Fifth Grade Champions four times by demonstrating excellence in American and world history, geography, literature, math, science and fine arts. Middle School placements: students attend most competitive middle schools in the region and abroad. Extracurricular activities After school programs included: Arts and Crafts, Chess, Cooking, Dance, Drama, Sports.", "-31.847988620493197" ], [ "Secondary education in the United States History The United States historically had a demand for general skills rather than specific training/apprenticeships. High school enrollment increased when schools at this level became free, laws required children to attend until a certain age, and it was believed that every American student had the opportunity to participate regardless of their ability.\nIn 1892, in response to many competing academic philosophies being promoted at the time, a working group of educators, known as the \"Committee of Ten\" was established by the National Education Association. It recommended twelve years of instruction, consisting of eight years of", "-31.826746958766307" ], [ "school's most successful teams in recent years include Alpine ski racing, soccer, basketball and track and field. Other sports offered include soccer, baseball, cheering, cross country, football, lacrosse, swimming, ice and field hockey, and tennis.", "-31.797047692778676" ], [ "student first entering high school, to help them break the stigma of high school being a big and scary place. Sports For a smaller scale high school, Russell High School has an impressive amount of interest in sports program. There are three age divisions for students: Grade 7–8, Grade 9–10 (alternatively called 'Junior'), Grade 11–12 (alternatively called Senior), with the occasional 'Varsity' (Grade 9–12) aged team. \nSports are offered for both girls and boys throughout the entire school year. Sports teams include: girls' and boys' soccer, hockey, volleyball, basketball, tennis, badminton, track and field and softball. Additionally, there has", "-31.784230599449984" ], [ "grip on things such as this. With infighting by various groups such as soccer and tennis supporters (being green with envy as to the support for such facilities for football), those same meddlers (as they were known) vowed to split the school system into two high schools with a forthcoming bond-issue because their kids rode the bench in some sports. The plans became watered down. With multi-group infighting and the original board that grew into 10 to 12, guys were pushed out of the stadium organization. They were just a bunch of ex-ballplayers wanting to see something really good", "-31.747277909083095" ], [ "in developing their talent than their university coaches. Some sports are attempting to adapt to new conditions in which a far higher proportion of British teenagers attend university than in the past, notably cricket, which has established several university centres of excellence. School sport Sport is compulsory for all students up to the age of sixteen, but the amount of time devoted to it is often small. There are frequent complaints that state sector schools do too little to encourage sport and a healthy lifestyle. In the 1980s, the government sold many schools sports fields to housing developers; as such,", "-31.742946813825256" ], [ "feeling of connectedness between students who share the same or similar interests with them. In many ways, the small schools in high schools would resemble the team system of many middle schools across the United States. Small schools allow students to have more individual attention from teachers than most average high schools. Many small schools are created by reforming a failed large school into several small ones in the same building, as is the case with the former Theodore Roosevelt High School in the Bronx in New York City. Benefits Supporters of small schools claim that \"in small schools, student", "-31.726023910381628" ], [ "high school was for the first time, right in the neighborhood for residents who live in the west. There was also the opening of PACI (previously a junior high) as a high school, which has a perfectly central location. This new system has made school more accessible for some who might have found attending difficult in the first place. Also with the rural school being open on the west, there was a new tool for community workers.\nDue to the separate school divisions communication was difficult between institutions who resided in the same neighborhood. These schools are located in a neighborhood", "-31.715512679951644" ], [ "at the school played a wide variety of sports, including: Rugby, Hockey, Tennis, Netball, Lacrosse, Cricket, Basketball, Softball, Rounders, Athletics and Football (Soccer).", "-31.71240576523269" ], [ "Chicago, Morgan Park Academy, which was competing against its parent school and YMCAs during 1893 and 1894. Its enthusiasm for the game did not last, however, because in 1896 when the Morgan Park Academy helped form the Academic League the only sports played were football, baseball, tennis, and track and field. The earliest basketball played by a public high school was in 1896, when North Division competed against YMCAs and other athletic clubs.\nMeanwhile, championship competition continued for the girls through the 1905-06 season, but the Victorian attitudes of educators put an end to it. Chicago superintendent of schools Edwin G.", "-31.689230003684315" ], [ "competition have increased, schools have expanded their facilities, and in general the league has positioned itself as one of the state's most competitive high school competitions.\nSoccer has long been the dominant sport among MCC schools; while several schools have had competitive football teams (including state championships won by DeSmet in 2005 and CBC in 2014, 2017, and 2018), it has been \"the beautiful game\" where the MCC has excelled. It is not uncommon for even the league's two smallest schools, Chaminade and Vianney, to field four teams, such is the popularity of soccer among their students. In fact, there has", "-31.677387354021903" ], [ "Professional sports in the Western United States Professional sports have existed in the United States since the late 19th century. The NFL, MLB, NBA and NHL have millions of fans across the nation, and are an important part of American culture. Professional sports did not enter into the American West until the mid-twentieth century. However, the expansion of professional sports into the West has helped to increase the popularity of each of the professional leagues and has changed the landscape of professional sports in America. History Prior to World War II, top-level professional sports in the United States", "-31.63262682302019" ], [ "appropriate, as there was little the two teams had in common.\nIn most U.S. states, high school athletic teams are divided into different classes, usually based on the number of enrolled students, with separate state championship tournaments held for each classification. At the time, Indiana conducted a single state basketball championship for all of its high schools and continued to do so until 1997.\nSome elements of the film do match closely with those of Milan's real story. Like the film's fictional \"Hickory High School\", Milan was a very small high school in a rural, southern Indiana town. Both schools had undersized", "-31.60174538744468" ], [ "after him, because of his labour as educator and as traditional family protector. These schools are in Barcelona, Reus (Tarragona, Spain), Alcobendas (Madrid, Spain) and Medellín (Colombia). They are all related to the same congregation. Activities The school offers a great number of different activities. It has always had a lot of sport teams, which play on local competitions. Football and basketball have always been the most played sports in the school, but there are also other teams which play sports such as volleyball. Therefore, there are some essential facilities like a gym, football and basketball grounds and a", "-31.56440979550348" ], [ "the 1970s seemed to suggest that everything had fallen in place. The curricula of the school appeared to have undergone all the relevant changes and had stabilised. The school was doing well in sports, always taking the first position in athletics and rubbing shoulder with other schools in hockey, football, basketball and the rest. There were a number of clubs and societies to take care of both the social and academic life of the students. The upward surge in the reputation of the school brought other problems in its wake. The chief of these was the pressure on the school", "-31.53451144409337" ], [ "neighborhood, district, or community high schools in the larger cities which may have had one or two schools since the 19th Century. High school enrollment and graduation numbers and rates increased markedly, mainly due to the building of new schools, and a practical curriculum based on gaining skills \"for life\" rather than \"for college\". There was a shift towards local decision making by school districts, and a policy of easy and open enrollment. The shift from theoretical to a more practical approach in curriculum also resulted in an increase of skilled blue-collar workers. The open enrollment nature and relatively relaxed", "-31.520710073984446" ], [ "early 1900s to 1930s showed many families wanting to keep their families together, prompting the school to keep their lower grades available to keep up enrollment, as many boarding schools split up the younger elementary grades from the older grades. Some students and families who decided to have their children attend Rapid City decided so based on the extensiveness of the course catalog and due to the fact that the parents or relatives of these students gained jobs at the school.\nRapid City ran a very strict program. Their techniques stemmed from military drills and discipline, requiring students to walk in", "-31.424707718641002" ], [ "high schools and colleges have sports programs which include softball. Like baseball, softball in Japan is intensely competitive. Japan's win over the United States at the 2008 Olympics reflects the advanced level of play in this East Asian country. China Since the silver medal at the Atlanta Olympics, the Chinese have now made softball a priority at all levels. The game is played in most schools and with a 1.3 billion population; the number of great players is turning out to be a boon for China. The Chinese have frequently toured the US and have now similar caliber coaching and", "-31.36244399265746" ], [ "At the Elementary School, after school sports include volleyball, soccer, floor hockey, taekwondo, table tennis and badminton. Middle and High School AISG fields sports a large number of teams at the High School and Middle School level. Some of the sports that many students participate competitively in are volleyball, basketball, soccer, tennis and badminton, in which they play against other international schools and Chinese universities in the region. In 2008, AISG joined the Asia Pacific Activities Conference, which allows the students to compete against the top international Schools from China, Japan, South Korea, Vietnam, and the Philippines. APAC", "-31.329334567232763" ], [ "of school life. Sports Sports is rare in school Ties with other schools To promote the concept of creating Global citizens, St. Edmund’s, Malviya Nagar successfully stepped into a long-term partnership program with its sister schools - Odsherreds Efterskole, Denmark and Lincoln University Technical College, England in 2015.\nThe program is designed to work mutually on the exchange of experiences, promoting international learning, understanding global issues, creating awareness through cross-cultural skills and communication and above all providing global networking opportunities.\nThis program is not just aimed to benefit students but is also designed to give the teachers of both the schools an", "-31.249938752600116" ], [ "well as local sporting centers. From the Middle School onwards students have the opportunity to compete in a variety of sports, within school as well as against other international schools. Students compete in the SGIS (Swiss Group of International Schools), SCIS (Sports Council of International Schools), and ISST (International Schools Sports Tournaments). Sports include cross-country, volleyball (girls), soccer, and rugby (boys), in the fall; alpine skiing, basketball, and swimming in the winter, and tennis, track and field, softball (girls), and golf in the spring. Arts All students in Pre-School to Grade 6 have compulsory music lessons,", "-31.248022920668973" ], [ "December 28, 1905, 62 schools met in New York City to discuss rule changes to make the game safer. As a result of this meeting, the Intercollegiate Athletic Association of the United States, later named the National Collegiate Athletic Association (NCAA), was formed. One rule change introduced in 1906, devised to open up the game and reduce injury, was the introduction of the legal forward pass. Though it was underutilized for years, this proved to be one of the most important rule changes in the establishment of the modern game. Move towards modernization and innovation (1906–1932) As a result of", "-31.246974419933395" ], [ "to be one of the most outstanding high schools in the United States. Much of that reputation was due to Henry W. Foster, superintendent from 1900 to 1927, and John H. Bosshart, principal from 1920 to 1927. Bosshart succeeded Foster as superintendent, and later served as the first head of the New Jersey Department of Education.\nAmerican public schools were all significantly impacted by World War II. In the words of Lt. General Brehon Sommervell, then Commanding General, Services of Supply: \"The job of the schools in this total war is to educate the nation's manpower for war and for the", "-31.243934147263644" ], [ "have them represent schools of greater variety in terms of socio-economic population, racial and ethnic population, and geography. Numerous programs were developed to encourage closer cooperation between urban/suburban communities. As a result of this effort, a number of athletic conferences expanded. \nWith the expansion of conferences, many smaller conferences, previously able to schedule a full competitive sports schedule found they were unable to fill out schedules without an extraordinary amount of travel to distant schools. Two such conferences, the WCC (Western Connecticut Conference) and the CCIAC (Cross County Interscholastic Athletic Conference) had developed a close working relationship in order to", "-31.2355851047123" ], [ "1881, at least for some of the suburban schools. Football One should not imagine that the competition was anywhere near as organized as it is today. Instead, boys in each of the schools formed a club with an \"eleven\"—to use the vernacular of the day. The clubs then issued challenges to other schools to participate in games. There were no teachers, no coaches, no uniforms, no laid-out fields, and no schedules. There were various league set up during the 1880s, but they were of the sandlot variety and more often than not they never lasted through the season.\nA true football", "-31.22696284725066" ], [ "disturbed by contemporary reports that American high schools were inferior to schools in Europe, Asia, and even third-world countries. Reasoning that a university-affiliated school could be a model for the region and offer an advanced curriculum and integrate the resources of a major university into its operation, Murray explored the possibility as an extension of Duquesne's Spiritan tradition of often unconventional leadership.\nDialogue with the Vincentian Sisters began in 1993; an agreement was finalized 1994, and the inaugurating class was set to enroll in 1995, with Dean Derek Whordley of the Duquesne University School of Education to be president of the", "-31.22506803487977" ], [ "school has teams for football, softball, competition cheerleading, swim team, women's and men's basketball, baseball, women's and men's soccer, golf, tennis, track and field, and cross country.\nIn 2004 the football Seminoles played an undefeated season and went to the Georgia Dome, in their greatest playoff berth, but lost to Statesboro High School, leaving them in a 13-1 season. In 2005, they once again won the region championship, but lost in the 2nd round playoff to Marist High School, 35-14.\nTorrell Troup, a 2006 graduate, was drafted in the second round of the 2010 NFL Draft by the Buffalo Bills.", "-31.216178233225037" ], [ "Cup)\n•Rugby Union: Australia def Namibia 142-0 (2003 Rugby World Cup) American high school sports Vast talent discrepancies between opponents happen more often in high school sports than in college or professional sports. This is especially prevalent in district competition (where schools of similar size are grouped based on geography) and regional single-elimination tournaments in which all schools (regardless of record) participate. It is even more prevalent in Kentucky high school basketball, in which a single state championship for each sex is conducted; this in turn means that district and regional competitions, and even the state tournaments, will feature games involving", "-31.199289174635396" ], [ "one or two times, and sides are shifted at predetermined time intervals. Popularity While not being an organized sport with teams and a league, it is appreciated by children of all ages during school or after, and friends after work play for fun.\nSince 1974 an annual Students World Championship tournament has been held in the northern city of Umeå, whereby some standardized rules are followed. The world championship is called Brännbollscupen, which is followed by the festival Brännbollsyran.\nBrännboll is enjoyed by elementary schoolchildren in the American Upper Midwest (particularly Minnesota), due to the area's large Scandinavian influence.\nA similar game, brennball,", "-31.184004317337894" ], [ "rationalization of a conference that had already been in place for a decade. But even before the emergence of the Cook County League during 1889 and 1890, interscholastic competition of a sandlot variety had gone on for nearly a decade. During the years of this sandlot phase Chicago schoolboys were inventing interscholastic sports, undoubtedly patterning their approach after what they saw in the universities at the time.\nThe first two sports that Chicago area schools adopted for competition were—not surprisingly--football and baseball. No conclusive evidence has surfaced as to what year either sport was adopted, but it was probably sometime around", "-31.167339406052633" ], [ "United States The Modern Schools, also called Ferrer Schools, were United States schools, established in the early twentieth century, that were modeled after the Escuela Moderna of Francesc Ferrer, the Catalan educator and anarchist. They were an important part of the anarchist, free schooling, socialist, and labor movements in the U.S., intended to educate the working-classes from a secular, class-conscious perspective. The Modern Schools imparted day-time academic classes for children, and night-time continuing-education lectures for adults.\nThe first, and most notable, of the Modern Schools was founded in New York City, in 1911, two years after Francesc Ferrer i Guàrdia's execution", "-31.164195651631417" ], [ "The school believes in overall development of the students and thus along with academic result it focuses on Sports too. There are various sports played in the school namely Football, Table Tennis, Badminton, Kho Kho, BasketBall and other athletic games. The school also organizes various Tournaments and Events to encourage competition in the field of sports.\nInteractions with other schools through sporting and cultural activities are a regular feature.", "-31.161237298370907" ], [ "remained strained. Teams in the Western league continued to push for rule changes intended in part to make the game more attractive to U.S. players familiar with the American game. This came to a head in 1940 when the CRU again barred the Western champion Blue Bombers from the Grey Cup on the grounds that the West had played using rules that differed from those in the East. However, the most important pre-war development, implemented in both East and West on a permanent basis for the 1936 season, was the introduction of automatic divisional playoffs. Prior to the formation of", "-31.154746200535556" ], [ "having \"resembled rugby and soccer.\" By 1884, students were participating in several sports, including modern football, which had been invented by Walter Camp of New Haven. Team competition in baseball, tennis, ice hockey, indoor polo and yacht racing also had been established around this time. Basketball was introduced around the beginning of the 20th century.\nHillhouse football teams have won 17 state championships, ranking the school third in the state for football championships. The boys’ and girls’ basketball teams have a combined total 33 state championships. 24 for the boys and 9 for the girls. The boys’ and girls’ track teams", "-31.15446914512131" ], [ "Pupils are largely taught by a form teacher in the early years, but there is an increasing degree of specialist subject teaching as they move up the school. Sport Pupils play Association football, Rugby football, cricket, hockey, netball, rounders, athletics, triathlon and heptathlon. School teams have been successful in County and National level competitions.", "-31.153933851071997" ], [ "was known for having wide athletic activities. It had teams for soccer, basketball, volleyball, boxing, wrestling, and equestrian, and contended different famous teams in the thirties and forties of the last century, including the Royal Guards and Air Force.\nThe School offered classes on many branches of literature, science, business, languages, including Arabic, English and French, and many extra-curricular activity such as music and acting.\nThe School’s library was founded with the establishment of the School and contains a variety of books and publications that cover all branches of knowledge and it used the Dewey decimal method for classification.", "-31.128731531745643" ], [ "first school year open, which made it difficult for its athletic teams to compete with other high schools in sports where size and experience are particularly advantageous. Its football team's record was 1-8 in its first season. The softball field was not built in time for the first school year, and the school used the baseball field for field hockey. Despite tennis courts not being completed until midway through the first school year, the tennis team finished 5-7 that year.", "-31.113264463665928" ], [ "physical activity and athletic competitions play a big role in the lives of students as they build character, teamwork, and good sportsmanship.\nLower School students meet for Physical Education classes multiple times a week. Once the children reach Ninth Age they join special teams called the Crows, Canaries, Hoppers, or Crickets. These are single-gender groups that compete with each other throughout the year in sporting matches. It is a wonderful way to foster a sense of belonging and school spirit as the students prepare to compete on interscholastic teams when they enter Sixth Grade.\nMiddle School has an extensive athletic program, including", "-31.107273276498745" ], [ "similar to 'Indians' when the school was in its early years. The middle school was the 'Warriors' and the elementary school, the 'Braves'.\nThe District received much praise for its transition, including the National Congress of American Indians and organizations as far away as Washington, D.C. After narrowing down many potential new nicknames, the high school decided to retain its red pride, renaming itself the 'Red Hawks'. The middle school obtained the name 'Hawks' and the elementary school, 'Junior Hawks'.", "-31.07440814399979" ], [ "of headmaster, following an eight-month search period. Athletics The school traditionally has a rivalry with Western Reserve Academy, with the football games being the highlight of each school's season throughout the 20th century, starting with the first meeting in 1895.\nUS fields varsity teams in thirteen sports, five in the winter season and four in the fall and the spring seasons: football, soccer, cross country, and golf in the fall; ice hockey, wrestling, swimming, squash, and basketball in the winter; and lacrosse, tennis, track and field, and baseball in the spring.\nUniversity School competes in the Premier Athletic Conference (PAC), an eight-team", "-31.070580535810223" ], [ "program, trained adults foster fun, healthy activities during recess at low-income schools. The grown-ups teach games to the kids and help them learn to handle conflicts without fighting.\"\nA case study of Sports4Kids by the Harvard Family Research Project found that Sports4Kids’ recess and other programs saw visible improvement in several key areas of youth development.\nDuring the 2011 summer, Playworks displayed a 15-second digital ad in New York City’s Times Square, announcing “Recess is another word for the recommended daily allowance of Play.”\nResearch by the Department of Pediatrics at the University of California, San Francisco compared physical and emotional health outcomes", "-31.07046981105077" ], [ "international styles, being able to win Olympic medals in freestyle wrestling at various games. College and high school wrestling grew especially after the standardization of the NCAA wrestling rules, which applied early on to both collegiate and scholastic wrestling (with high school modifications). More colleges, universities, and junior colleges began offering dual meets and tournaments, including championships and having organized wrestling seasons. There were breaks in wrestling seasons because of World War I and World War II, but in the high schools especially, state association wrestling championships sprung up in different regions throughout the 1930s and 1940s. As amateur wrestling", "-31.064424935117586" ], [ "Modern history of American football Modernization of intercollegiate American football (1933–1969) In the early 1930s, the college game continued to grow, particularly in the South, bolstered by fierce rivalries such as the \"South's Oldest Rivalry\", between Virginia and North Carolina and the \"Deep South's Oldest Rivalry\", between Georgia and Auburn. Although before the mid-1920s most national powers came from the Northeast or the Midwest, the trend changed when several teams from the South and the West Coast achieved national success. Wallace William Wade's 1925 Alabama team won the 1926 Rose Bowl after receiving its first national title and William Alexander's", "-31.06060728594821" ], [ "game much safer than regular play but that the new rule was not \"conducive to the sport.\" Finally, on December 28, 1905, 62 schools met in New York City to discuss rule changes to make the game safer. As a result of this meeting, the Intercollegiate Athletic Association of the United States, later named the National Collegiate Athletic Association (NCAA), was formed. One rule change introduced in 1906, devised to open up the game and reduce injury, was the introduction of the legal forward pass. Though it was underutilized for years, this proved to be one of the most important", "-31.050551183503558" ], [ "America's youth to achieve success in college, the workplace, and the 21st century.\nThe founding members recognized that students in the United States were lagging behind their peers from other countries and that schools offering a rigorous, skill-level curriculum that focused on science, technology, engineering, and math (STEM) would provide the foundations to graduate independent thinkers who are capable of innovation and prepared to take leadership roles.\nSonoran Science Academy Tucson, initially called Daisy Science Academy, was opened in 2001, serving grades six through eight. The name of the school was changed the following year to Sonoran Science Academy and the school", "-31.040674919731828" ], [ "Alexander Galt Regional High School History of regional schools The regional school concept emerged in the 1960s, in both the English and French language systems. Schooling was previously divided four ways: English or French, Catholic or Protestant. All high schools within a large catch area were closed and students bused to high school daily. High schools in communities like Magog, Sherbrooke, Lennoxville, Stanstead, Scotstown, Sawyerville, Coaticook and Cookshire were converted to elementary schools, where younger children from the baby boom were swelling the capacity. The loss of identity based on their local high school was a challenge which many small", "-31.019942797378462" ], [ "measure carried by a narrow margin, 312–293. After this move, several other sports adopted the two-class format. In January 2006, after a substantial majority of schools responding to an advisory referendum indicated a preference for more classes, the IHSA Board of Directors approved expansion in several sports, starting in 2007–08.\nAt the culmination of the first drive for expansion, the IHSA also sought a way to add a state championship in football to its schedule of events. Because of the sheer number of schools involved, a playoff involving all schools was not possible. In 1974, the IHSA introduced a five-class system", "-31.01322431390963" ], [ "and high school offer an array of different sports: Field hockey, soccer, swimming, baseball, softball, basketball, cross country, track and field, football, wrestling, volleyball, golf, indoor track, bowling, and cheerleading. The sports teams are known as the Sherburne-Earlville Marauders, and the mascot is a wolf. There are three different sports levels: modified, junior varsity, and varsity. The modified sports level consists of students who are in middle school, while junior varsity teams generally include freshmen and sophomores and varsity-level teams include mostly sophomores, juniors, and seniors. The arts Sherburne-Earlville also houses a relatively strong arts department. The", "-31.011458605992857" ], [ "recorded high school football game in the area took place in 1883 however the exact date was not found nor the schools involved as the box school only said \"Green and Black\" not school names, nicknames or mascots. Massive growth (1945–1990) The sport in the area saw massive growth after World War II. During the next 40 years after the war, high schools and colleges saw a massive spike in participation and fan support. Mostly due to the increased presence of media and state playoffs. The playoff bracket and post-season games drew large numbers of fans and supporters. During the", "-31.004653668918763" ], [ "that each school had to create a sports club formed by their current and former students. As a result, on 3 October 1898, \"English High School Athletic Club\" was founded. The school bought its first facility in the Coghlan district of Buenos Aires, near the train station, with the purpose of practicing physical activities as it was required\nIn 1899 the Argentine Football Association created the second division, where the club registered a team. The championship was won by Banfield; English High School A.C. was the runner up. In 1900 the club decided to compete at the Primera División tournaments again,", "-30.998197517048084" ], [ "the game much safer than regular play but that the new rule was not \"conducive to the sport\". In 1906, President Roosevelt organized a meeting among thirteen school leaders at the White House to find solutions to make the sport safer for the athletes. Because the college officials could not agree upon a change in rules, it was decided over the course of several subsequent meetings that an external governing body should be responsible. Finally, on December 28, 1905, 62 schools met in New York City to discuss rule changes to make the game safer. As a result of this", "-30.990828661540945" ], [ "high school football and its impact on small town communities has been documented by landmark non-fiction works such as the 1990 book Friday Night Lights and the subsequent fictionalized film and television series. American football outside the United States (1874–present) American football has been played outside the US since the 1920s and accelerated in popularity after World War II, especially in countries with large numbers of U.S. military personnel, who often formed a substantial proportion of the players and spectators.\nIn 1998, the International Federation of American Football, was formed to coordinate international amateur competition. At present, 45 associations from the", "-30.98094501900414" ], [ "as pigeon pie. The earliest high school football rivalries took root in the late 19th century in Massachusetts, stemming from games played on Thanksgiving; professional football took root as a Thanksgiving staple during the sport's genesis in the 1890s, and the tradition of Thanksgiving football both at the high school and professional level continues to this day. In New York City, people would dress up in fanciful masks and costumes and roam the streets in merry-making mobs. By the beginning of the 20th century, these mobs had morphed into Ragamuffin parades consisting mostly of children dressed as \"ragamuffins\" in costumes", "-30.9742675813186" ], [ "intercollegiate athletics date back to the late 1890s, but its development was hampered for several decades by inadequate facilities, uncertain financial support, and the small number of male students in an institution designed to develop elementary school teachers. Tennis remained a constant from 1898 on and men's basketball dates back to 1909, but attempts to field teams in football (1922), baseball (1896–1901), swimming and hockey were aborted.\nExpansion into men's and women's sports increased after World War II, and then expanded greatly in the 1960s (men's sports of lacrosse, track & field, cross-country and swimming moved from club to varsity status,", "-30.94820310615978" ], [ "& field, and girls volleyball. All operate with a \"no cut policy,\" meaning any student who wishes to participate may, and nearly 65% of U-Highers participate on at least one team.\nThe high school's extracurricular activities occasionally make national and international news. For example, in 1990 then-Governor Thompson declared a \"Matthew Headrick Day\" and the US House made a proclamation when then-student Headrick appeared on talk shows including Today after winning the Westinghouse. In response to the award, the Chicago Tribune wrote: \"this ... is a ... school where being on the math team ... can actually enhance one's social status.\"", "-30.943587191306506" ], [ "high school having more difficulty gaining admittance to ETSNC, which disproportionately affected rural students. The school's growth during this period began to bring it some national attention, exemplified when the Cleveland, Ohio, school board offered to hire its \"entire output of teachers\" in 1920. Athletics Unlike Mayo, Binnion was a consistent and strong supporter of the college's athletics program. By the time ETSNC became a state institution in 1917, blue and gold had been adopted as its school colors, and in 1919 its teams began using the nickname \"Lions\". Roy Owens of Tyler, who played on early intercollegiate teams, suggested", "-30.940108636268633" ], [ "the entire High School including, The Bash (annual dance), Spirit Week, and more competitions. The committee also provides financial support for other student organizations. Athletics Over half of the students in the high school play on one of the junior varsity and varsity teams in 10 sports: soccer, basketball, softball, baseball, track, swimming and diving, volleyball, cross-country, ultimate Frisbee, golf, and tennis. The athletic program emphasizes participation, high quality instruction, and teamwork. Presently, the no-cut system is being examined in the particularly crowded sports of soccer and basketball to try to address problems caused by this crowding.", "-30.926253045878184" ], [ "yet different from cross country running as practiced in North American secondary and tertiary schools.\nSchool-based teams and competition in the name of one's school are highly prized concepts common to both Japan and North America. It has been pointed out that such fervor over school sports is not shared by all, such as Korea where after-school academic clubs are more the norm, a point of worry for some track and field enthusiasts.\nOther similarities between high school cross country as conducted in North America and high school ekiden in Japan include the season (autumn), approximate team size (5 to 7 competitors),", "-30.91962587790306" ], [ "to the American educational template included public funding, openness, local control, gender neutrality, separation of church and state, and an academic curriculum. The resulting “high school movement” incorporating these virtues produced a larger group of educated workers, enabled social and geographical mobility, and contributed to potential economic growth. In contrast, Europe’s educational template was determined by a centralized government and remained less open in the 1950s, focusing on providing technical training programs in the form of work-study arrangements for older teenagers.\nGoldin states that many of the virtues characterizing the American educational system in the earlier part of the twentieth century", "-30.874783581723932" ], [ "1970s, athletics and gymnastics were also a staple of sports education. As of 2015, Sports clubs include athletics, badminton, basketball, dance, fitness, football, gymnastics, hockey, netball, rounders, tennis and volleyball.\nFrom its inception, the High School ran regular field trips, including excursions to Lord Tennyson's birthplace, the Wolds and the coast. The second headmistress, Miss Kirk, took large numbers of girls on visits to the Lake and Peak Districts; outings to Paris and Stratford were smaller affairs, while a contingent travelled to the Wembley exhibition in 1924. Geography trips to youth hostels around Britain were regularly organised after World War II,", "-30.86352127473947" ], [ "predominantly those that had been most progressive before the study started. External to the high schools, colleges became more selective as applicants increased in the late 1940s. Colleges did not adopt the study's recommendations for reasons of disbelief or ignorance.\nThe Eight-Year Study showed that the curricular structure of American high schools could change under propitious conditions: when families and teachers held liberal ideology, colleges relaxed vetting mechanisms, and foundations offered support. The study brought a brief period of energy and happiness to its participants, who considered the effort worthwhile in retrospect. Its major impact was not direct change but its", "-30.8541450409557" ], [ "American public education by the 1920s organizing grades seven, eight and nine together, then known as the \"junior high school\" (later reorganized, advanced earlier by a grade and known as \"middle schools\" for the 6th-7th-8th grades by the 1980s) and had a co-ed student body with both boys and girls for the first time in Baltimore City, which previously only had four specialized/college preparatory/citywide, sex-segregated (single sex) public high schools - with all-male: Baltimore City College (1839), Baltimore Polytechnic Institute (1883), and the all-female: Western High School (1844), Eastern High School (1844), since the beginnings of the Baltimore City", "-30.846682192843218" ], [ "competition is not as important in American sports as it is in the sporting culture of most other countries, although Olympic ice hockey and basketball tournaments do generate attention. The first international baseball tournament with top-level players, the World Baseball Classic, also generated some positive reviews after its inaugural tournament in 2006.\nThe major professional sports leagues operate drafts once a year, in which each league's teams selected eligible prospects. Eligibility differs from league to league. Baseball and ice hockey operate minor league systems for players who have finished education but are not ready or good enough for the major leagues.", "-30.813235444253678" ], [ "coach their team for the following season. The following year North Division met Brooklyn Boys' High in New York and beat them 75 to 0, which was not as close as the score indicated according to the New York Times report. Baseball The story of the development of baseball among Cook County schools was similar to that of football. There were several baseball leagues that were formed in the 1880s, but none of them lasted. In May and June 1889, however, there was a plethora of games reported in the Chicago Tribune, involving North Division, West Division, Manual Training, Hyde", "-30.79819944871815" ], [ "have remained at the high school as of the beginning of the 2012-13 school year.\nIn addition, almost all athletic teams have been eliminated in favor of a strictly academic approach to schooling. Traditional favorites like high school football and basketball have been scrapped; with a bye given to opponents who were supposed to play against PDCS this year due to a lack of manpower needed to operate a football or girls' basketball team. Some of the less demanding sports like volleyball (for grades 11 and 12) had been given the authorization to compete by the school's athletics department; with 25%", "-30.772594411342652" ], [ "like art, racquet sports, College Bowl, debate and chess were all shelved. Flag football disappeared from the schedule in the mid-80s as more and more local students, who were not familiar with American football, enrolled in member schools. The core sports became soccer (Boys), basketball (Boys and Girls), field hockey (Boys and Girls), and volleyball (Girls). Field hockey was cut after the 1994-95 academic year because insurance premiums were too high and replaced with volleyball for boys and soccer for girls. The final Girls Field Hockey tournament, played at KAS in the fall of 1994, was won by ISI, which", "-30.760778481352645" ] ]
102evn
Why doesn't a phone with its ringer set as 'vibrate', eventually destroy the mechanisms inside working it?
[ "There aren't really any moving parts in a phone. I'd probably guess that the only moving parts were the motor that drives the vibration and I suppose the speaker that vibrates for sound. The non-moving parts aren't really effected by being vibrated assuming they are reasonably well constructed. Some electronic devices (like a laptop) do have moving parts and are more likely to sustain problems if moved around or vibrated too much.", "The vibration is driven by a tiny bit of metal with an imbalance of weight on one side. The diagram [here]( URL_0 ) shows the mechanism. The red part is the imbalanced metal, and it rotates, causing vibration. It doesnt destroy the phone because its very contained. Besides that most phones are made to withstand a couple drops on the ground, so they are sturdy enough to handle vibration.", "They have found a good middle ground to set the vibrate to. In between too violent that it would degrade the phone vs. too soft that you don't feel the vibration. Also, they design the structure of the phone so that it isn't too prone to damage from vibration, and also use materials that serve the same purpose.", "Vibrations aren't really a problem and cause minimal damage (loosening of screws or small amounts of wear on the interface between components until they match the objects resonance frequency. At that point the material itself begins to experience the energy rather than just transfer it to surrounding objects. You would have to have your phone vibrating all the time to see any issues, and probably then the little electric motor that spins the counterweight would fail first." ]
[ [ "timed train of line loop-break pulses when the dial finger wheel was released after rotation. During the period of dial rotation, the receiver was shunted to avoid hearing the dialing pulses.\nThe ringer was a mechanical bell consisting of two bell gongs of slightly different dimensions to produce different pitches and a striker between them driven by a solenoid; when the solenoid was energized by AC ringing current, typically about 90V at 20Hz, it struck the two gongs alternately, producing a distinctive effect of two superimposed sounds. On phones with a ringer loudness control, one gong was mounted off-center on the", "-41.07693849221687" ], [ "Ringer box Components A ringer box consists of a case made of wood, metal, or plastic, containing bells or gongs and an electromagnetically-driven clapper which strikes the gongs when actuated. The electromagnet of the clapper responds to the alternating current sent from a central office exchange or another phone via the telephone network wiring. The direct current required by the telephone's audio circuitry is blocked with a capacitor before entering the ringer to prevent the ringer from being triggered by circuit interruptions and pulse dialing. Typical ring signals ranged from 60 to over 100 Volts at a frequency of 20-30", "-39.724090029951185" ], [ "produce uncontrolled oscillations, resulting in howling audio effects. Sidetone is disabled when phones of any kind are running in speakerphone mode, due to perpetual and almost immediate feedback. Anti-sidetone circuitry in the telephone hybrid brought sidetone under control in the early 20th century, leaving enough feedback signal to assure the user that the phone is really working, and allowing the use of a unitized telephone handset. In cellular technologies, one of the many benefits of sidetone-enabled phones is that a user knows a call has been dropped or ended if he or she no longer hears sidetone. Comfort noise provides", "-37.78347912942991" ], [ "is a big plus but closing the phone with only one hand is a problem as there are no mechanics to help you do this. The speaker made a nice impression as it's loud and clear, but the sound during a call is not that good, and the vibrating alert is too weak. We're glad that there is a music player but it lacks advanced functionality and is quite uncomfortable, unlike the Radio which has an easy to use interface.\"", "-37.59819027071353" ], [ "were also discovered, particularly when using the flash. Antenna Shortly after the iPhone 4 was launched, some consumers reported that signal strength of the phone was reduced when touching the lower left edge of the phone, bridging one of the two locations which separates the two antennas, resulting in dropped calls in some areas with lower signal reception. In response, Apple issued a statement advising that customers should \"avoid gripping [the phone] in the lower left corner\" when making or receiving a call.\nAs a consequence of this problem, it was reported on July 2, 2010 that several iPhone 4 users", "-37.3585450805258" ], [ "Rotary system, and the earlier 1970s stored program control exchanges.\nIn some telephones, the pulses may be heard in the receiver as clicking sounds. However, in general, such effects were undesirable and telephone designers suppressed them by mechanical means with off-normal switches on the dial, or greatly attenuated them by electrical means with a varistor connected across the receiver. Switch-hook dialing As pulse dialing is achieved by interruption of the local loop, it was in principle possible to dial a telephone number by rapidly tapping, i.e. depressing, the switch hook the corresponding number of times for each digit at approximately ten", "-37.25057464107522" ], [ "Ringdown In telephony, ringdown is a method of signaling an operator in which telephone ringing current is sent over the line to operate a lamp or cause the operation of a self-locking relay known as a drop.\nRingdown is used in manual operation, as distinguished from automatic signaling by dialing a number. The signal consists of a continuous or pulsed alternating current (AC) signal transmitted over the line. It may be used with or without a telephone switchboard. The term originated in magneto telephone signaling in which cranking the magneto generator, either integrated into the telephone set or housed in", "-36.844892289082054" ], [ "phone plug halfway into the insert until there is a springy \"click\" feeling, at which point the plug is contacting the signal within the insert jack, but isn't breaking the normalized contact. The \"half-click\" method works fine until the insert cable is jarred or wiggled, causing noise or a loss of signal within the channel.\nBecause of the combination of balanced external devices and unbalanced insert jacks, the process of inserting involves finding out which devices have which kinds of output configurations. Full electronic balancing needs a different cabling style than transformer balancing, which in turn needs a different cabling style", "-36.47434329983662" ], [ "maximum vibration around an open rim. A gong on the other hand has maximum vibration towards the centre). They are usually placed on a pillow, to allow the rim to vibrate freely, though small bells may be held gently in the hand.\nThey are often played by striking, in which case they sound a bell note as a struck idiophone (Hornbostel–Sachs classification 111.242.11).\nAlternatively, some bells may be capable of 'singing bowl' operation as a friction idiophone, (Hornbostel–Sachs classification 133.1). In this mode, a wooden mallet sometimes called a wand or puja is rotated around the outside rim to excite continuous vibrations", "-36.43527485040249" ], [ "a relay. They are so arranged that the right and left bells are struck according to whether a positive or negative pulse of current is received on the telegraph line. Such bells make a much louder sound than the clicking of a needle.\nThe Magnetic found a method of overcoming the problem of dispersion on long submarine telegraph cables. The poorly understood phenomenon at that time was called retardation because different parts of a telegraph pulse travels at different speeds on the cable. Part of the pulse appears to be 'retarded', arriving later than the rest at", "-36.39566261396976" ], [ "or the bell. With the new kind, the user was less likely to leave the phone \"off the hook\". In phones connected to magneto exchanges, the bell, induction coil, battery and magneto were in a separate bell box or \"ringer box\". In phones connected to common battery exchanges, the ringer box was installed under a desk, or other out of the way place, since it did not need a battery or magneto.\nCradle designs were also used at this time, having a handle with the receiver and transmitter attached, now called a handset, separate from the cradle base that housed the", "-36.19953590777004" ], [ "used to pause some computer games. History A standard telegraph circuit connects all the keys, sounders and batteries in a single series loop. Thus the sounders actuate only when both keys are down (closed, also known as \"marking\" — after the ink marks made on paper tape by early printing telegraphs). So the receiving operator has to hold their key down or close a built-in shorting switch in order to let the other operator send. As a consequence, the receiving operator could interrupt the sending operator by opening their key, breaking the circuit and forcing it into a \"spacing\" condition.", "-36.14828084805049" ], [ "is fast. However, they demonstrate a difficult concept visually, as both the actions of the ringers and the bells can be seen simultaneously. The distinctive sound The sound made by a bell rung full-circle has two unique subtle features: rapid strike decay and the doppler effect. \nBecause the clapper strikes the bell as it rising to the mouth upwards position, it rests against the bell's soundbow after the strike, and the peak strike intensity decays away quickly when the clapper helps to dissipate the vibration energy of the bell. This enables rapid successive strikes of multiple bells, such as", "-35.832568209210876" ], [ "tones, and rows have lower-frequency tones in the audible range. When a button is pressed the dial generates a combination signal of the two frequencies for the selected row and column, a dual-tone signal, which is transmitted over the phone line to the telephone exchange.\nWhen announced, the DTMF technology was not immediately available on all switching systems. The circuits of subscribers requesting the feature often had to be moved from older switches that supported only pulse dialing to a newer crossbar, or later an electronic switching system, requiring the assignment of a new telephone number which was billed at a", "-35.73035176063422" ], [ "there. Each time the clappers touch a bell, charge is transferred between the inner and outer surfaces of the Leyden jar. When the jar is completely discharged, the bells will stop ringing.", "-35.62014583355631" ], [ "without having to physically disconnect the insert cables.\nUnbalanced TRS phone inserts are normalized as well. The presence of a plug in the jack breaks normal internal signal flow, sending signal out to external devices and returning this signal to the channel. TRS phone jacks can be specially wired with Tip and Ring connected at the insert end, and both conductors going to Tip at the distant end. This allows for tapping the insert point for its signal without interrupting signal flow inside the mixer. A less reliable method to achieve the same end is to insert a TS or TRS", "-35.562928731087595" ], [ "this is good striking — not only should the bells never clash by sounding at the same moment, the bells should sound to a perfect rhythm, tapping out a steady beat.\nIt is the custom to leave a pause of one beat after every alternate row, i.e., after the ringing of each ‘backstroke’ row. This is called 'open handstroke' ringing (or open handstroke leading). In Devon, Cornwall and parts of Yorkshire, this custom is not followed when call-change ringing; instead the bells strike steadily without the pause. This latter custom is known as the closed-hand or cartwheel arrangement. However for method", "-35.55357192840893" ], [ "with marimbas and xylophones, where the natural sustain time of the wooden bars is short, but vibraphone bars can ring for many seconds after being struck, and this effect is highly desirable in many circumstances. Therefore, the resonators in a vibraphone are usually tuned slightly off-pitch to create a balance between loudness and sustain.\nA unique feature of vibraphone resonators is a shaft of rotating discs, commonly called fans, across the top. When the fans are open (vertical) the resonators have full function. When the fans are closed (horizontal) the resonators are partially occluded, reducing the resonance of the", "-35.53634718165813" ], [ "Phantom vibration syndrome Phantom vibration syndrome or phantom ringing syndrome is the perception that one's mobile phone is vibrating or ringing when it is not ringing. Other terms for this concept include ringxiety (a portmanteau of ring and anxiety), fauxcellarm (a portmanteau of \"faux\" /fo͜ʊ/ meaning \"fake\" or \"false\" and \"cellphone\" and \"alarm\" pronounced similarly to \"false alarm\") and phonetom (a portmanteau of phone and phantom). According to Dr. Michael Rothberg, the term is not a syndrome, but is better characterised as a tactile hallucination since the brain perceives a sensation that is not actually present. WebMD published an", "-35.51470637788589" ], [ "Vibrator (mechanical) Vibrators as components When smartphones and pagers vibrate, the vibrating alert is produced by a small component that is built into the phone or pager. Many older, non-electronic buzzers and doorbells contain a component that vibrates for the purpose of producing a sound. Tattoo machines and some types of electric engraving tools contain a mechanism that vibrates a needle or cutting tool. Industrial vibrators Vibrators are used in many different industrial applications both as components and as individual pieces of equipment.\nBowl feeders, vibratory feeders and vibrating hoppers are used extensively in the food, pharmaceutical, and chemical industries to", "-35.409948551416164" ], [ "button controls a backup bell which is used in case the main bell fails to ring. History The signal to start and stop trading was not always a bell. The original signal was a gavel (which is still in use today along with the bell), but during the late 1800s, the NYSE decided to switch the gavel for a gong to signal the day's beginning and end. After the NYSE changed to its present location at 18 Broad Street in 1903, the gong was switched to the bell format that is currently being used.\nA common sight today is the highly", "-35.34082216814568" ], [ "in change ringing, without excessive overlap and consequent blurring of successive strikes. In addition, the movement of the bell imparts a doppler effect to the sound, as the strike occurs whilst the bell is still moving.\nBoth these effects give full circle ringing of bells in an accurate sequence a distinctive sound which cannot be simulated by stationary chimed bells. English The bells are mounted within a bellframe of steel or wood and each bell is suspended from a headstock fitted to bearings so that the bell may rotate.\nThe headstock is fitted with a wooden stay, which, in conjunction with a", "-35.16171147172281" ], [ "from other typical connections.\nConnections are made by pushing the cable's plug into the female jack on the device. The signal-carrying pin protrudes from the plug, and often comes into contact with the socket before the grounded rings meet, resulting in loud hum or buzz if the audio components do not share a common ground and are powered while making connections. Continuous noise can occur if the plug partially falls out of the jack, breaking the ground connection but not the signal. Some variants of the plug, especially cheaper versions, also give very poor grip and contact between the ground", "-35.11753284424776" ], [ "device. It serves as the unit's power button, and also controls phone calls. When a call is received, pressing the sleep/wake button once silences the ringtone, and when pressed twice transfers the call to voicemail. Situated on the left spine are the volume adjustment controls. The iPhone 4 has two separate circular buttons to increase and decrease the volume; all earlier models house two switches under a single plastic panel, known as a rocker switch, which could reasonably be counted as either one or two buttons.\nDirectly above the volume controls is a ring/silent switch that when engaged mutes telephone ringing,", "-35.101238914590795" ], [ "my great surprise that instead of cutting out two of the cells I had cut out all three; so, therefore, the telephone diaphragm was being operated solely by the energy of the receiver signals. A contact detector operating without local battery seemed so contrary to all my previous experience that ... I resolved at once to thoroughly investigate the phenomenon.\n \nThe generation of an audio signal without a DC bias battery made Pickard realize the", "-34.894601023290306" ], [ "sidetone because a hybrid coil (A3) and other components compensate the imbalance. The junction box (B) arrests lightning (B2) and adjusts the line's resistance (B1) to maximize the signal power for the line length. Telephones have similar adjustments for inside line lengths (A8). The line voltages are negative compared to earth, to reduce galvanic corrosion. Negative voltage attracts positive metal ions toward the wires. Details of operation The landline telephone contains a switchhook (A4) and an alerting device, usually a ringer (A7), that remains connected to the phone line whenever the phone is \"on hook\" (i.e. the switch (A4) is", "-34.76864321081666" ], [ "melody on the arrival of a call. One such ringer, described in a 1989 book, even features a toy dog which barks and wags its tail when a call arrives. Eventually, electronic telephone ringers became the norm. Some of these ringers produced a single tone, but others produced a sequence of two or three tones or a musical melody. Some novelty phones have a ringer to match, such as a duck that quacks or a car that honks its horn.\nThe first commercial mobile phone with customizable ring tones was the Japanese NTT DoCoMo Digital Mova N103 Hyper by NEC, released", "-34.66909896550351" ], [ "strikes of multiple bells, such as in change ringing, without excessive overlap and consequent blurring of successive strikes. In addition, the movement of the bell imparts a doppler effect to the sound, as the strike occurs whilst the bell is still moving as it approaches top dead centre.\nBoth these effects give full circle ringing of bells in an accurate sequence a distinctive sound which cannot be simulated by chimed bells which are stationary and take more time for each strike to decay. Bell decoration Tower bells are often cast with inscriptions on their sides. These are often as simple as", "-34.578702533312025" ], [ "common example is a frequent occurrence when making telephone calls. If, while listening to the phone's dial tone, research subjects move the phone from one ear to the other, the length of time between rings appears longer. In the tactile domain, chronostasis has persisted in research subjects as they reach for and grasp objects. After grasping a new object, subjects overestimate the time in which their hand has been in contact with this object. In other experiments, subjects turning a light on with a button were conditioned to experience the light before the button press. This suggests", "-34.44534377375385" ], [ "a turret clock to broadcast the time by striking the hours and sometimes the quarters. A well-known musical striking pattern is the Westminster Quarters. This is only done when the bells are stationary, and the clock mechanism actuates hammers striking on the outside of the sound-bows of the bells. In the cases of bells which are normally swung for other ringing, there is a manual lock-out mechanism which prevents the hammers from operating whilst the bells are being rung. Warning of invasion In World War II in Great Britain, all church bells were silenced, to ring only to inform", "-34.29722201509867" ], [ "On the return stroke the same happens but the strike will be muffled. Note that only bells swung through a large arc or full-circle can be half-muffled, as it requires considerable rotation of the bell to strike on both sides of the clapper. The tradition in the United Kingdom is that bells are only fully muffled for the death of a sovereign.", "-34.20969283283921" ], [ "operating this device, listening to a radiotelegraphy station. Coherers required an external current source to operate, so he had the coherer and telephone earphone connected in series with a 3 cell battery to provide power to operate the earphone. Annoyed by background \"frying\" noise caused by the current through the carbon, he reached over to cut two of the battery cells out of the circuit to reduce the current\nThe frying ceased, and the signals, though much weakened, became materially clearer through being freed of their background of microphonic noise. Glancing over at my circuit, I discovered to", "-34.17579941707663" ], [ "ring back was introduced. Or the message would play once and then the busy signal is played after the message. For example, the message would say:\nThe number you have called is busy. If it becomes free in the next 30 minutes you will hear a special ring when a call can be attempted. Please hang up.", "-34.10082533804234" ], [ "play music of your choice. Most modern televisions, mobile phones and digital watches have alarm clock functions to turn on or make sounds at a specific time. Traditional Traditional mechanical alarm clocks have one or two bells that ring by means of a mainspring that powers a gear to propel a hammer back and forth between the two bells or between the interior sides of a single bell. In some models, the back encasement of the clock itself acts as the bell. In an electric bell-style alarm clock, the bell is rung by an electromagnetic circuit and armature that turns", "-34.081707414006814" ], [ "have less audible noise, such as mains hum, because the magnetic forces do not exert bending moment on the core. The core is only in compression or tension, and the circular shape is more stable mechanically. Ring or bead The ring is essentially identical in shape and performance to the toroid, except that inductors commonly pass only through the center of the core, without wrapping around the core multiple times.\nThe ring core may also be composed of two separate C-shaped hemispheres secured together within a plastic shell, permitting it to be placed on finished cables with large connectors already", "-34.07830338543863" ], [ "the bell, eventually striking the soundbow and making the bell sound. The bell speaks roughly when horizontal as it rises, thus projecting the sound outwards. The clapper rebounds very slightly, allowing the bell to ring. At the balance point, the clapper passes over the top and rests against the soundbow. The distinctive sound The sound made by a bell rung full-circle has two unique subtle features. \nBecause the clapper rests against the bell immediately after striking it, the peak strike intensity dies away quickly as the clapper dissipates the vibration energy of the bell. This enables rapid successive", "-33.96624285130383" ], [ "call connecting and the eventual presence of a carrier signal. If the dialling was successful, the user then pressed the handset down into rubber cups on the modem to connect. This was only possible because telephones were generally available only from Western Electric, all of a standardized size and layout. There was no sort of automated operation available; even hanging up had to be done manually by returning the handset to the telephone and thereby pressing the hook button. The Apple-CAT II Novation also introduced an internal direct-connect modem, the Apple-CAT II, which plugged into an expansion slot in an", "-33.931767459522234" ], [ "a similar benefit.\nAlmost all land-line (wired and wireless) phones have employed sidetone, so naturally it was an expected convention for cellular telephony but is not standard by any means. Usability experts believe that lack of adequate sidetone causes some people to shout or speak too loudly when using a cell phone (this behavior is sometimes referred to as \"cell yell\"). \nSidetone is valuable for the hearing impaired. The amount of sidetone typically found on land-lines is 8%, and is 4% for cellular phones. Sidetone can be, and often is, amplified for land-line phones for the hearing impaired. In VOIP technologies", "-33.8848409474449" ], [ "a bell's ring, although not loud), indicating that it is not cracked. It is rung in various spots to be sure. A \"flat\" or \"hoarse\" sound (failing to \"sing\") indicates a crack. With the wheel having passed the ring test, the bushing (if any), wheel, paper blotters, steel flanges, and nut are assembled, and the nut is tightened, not as hard as possible, but enough to be firmly fastened in place. The guard is reinstalled, and then the grinder can be plugged in again. Dressing may be needed afterward. When the wheel is first started, the operator stands a bit", "-33.87123774047359" ], [ "Ringing (signal) In electronics, signal processing, and video, ringing is oscillation of a signal, particularly in the step response (the response to a sudden change in input). Often ringing is undesirable, but not always, as in the case of resonant inductive coupling. It is also known as hunting. It is closely related to overshoot, generally occurring following overshoot, and thus the terms are at times conflated.\nIt is also known as ripple, particularly in electricity or in frequency domain response. Electricity In electrical circuits, ringing is an unwanted oscillation of a voltage or current. It happens when an electrical pulse causes", "-33.81375162655604" ], [ "Switch hook and tone dialer Possibly one of the first phreaking methods was switch-hooking, which allows placing calls from a phone where the rotary dial or keypad has been disabled by a key lock or other means to prevent unauthorized calls from that phone. It is done by rapidly pressing and releasing the switch hook to open and close the subscriber circuit, simulating the pulses generated by the rotary dial. Even most current telephone exchanges support this method, as they need to be backward compatible with old subscriber hardware.\nBy rapidly clicking the hook for a variable number of times at", "-33.810414177340135" ], [ "each time they ring it, and then put it down. As the bell sequence changes, however, the ringers physically swap the bells accordingly—so the bells move up and down the table and each row is rung in strict sequence from right to left. Ringers in cross and stretch thus do not have responsibility for their own personal bell, but handle each as it comes.\nSome handbell change ringers practice a hybrid of these two methods, known as body ringing: ringers standing in a line each hold one bell, exchanging places in the line so that the changes sound correctly when the", "-33.76427159080049" ], [ "an electromagnet attached to the telegraph line, with an iron armature near the magnet's pole balanced on a pivot, held up by a counterweight. When current flowed through the electromagnet's winding, it created a magnetic field which attracted the armature, pulling it down to the electromagnet, resulting in a \"click\" sound. When the current ended, the counterweight pulled the armature back up to its resting position, resulting in a \"clack\" sound. Thus, as the telegraph key at the sending end makes and breaks the contact, the sounder echoes the up and down state of the key.\nIt was important that a", "-33.763568227295764" ], [ "to ring the bell. Popov added an innovative automatic reset feature of a \"self tapping\" coherer where the bell arm would spring back and tap the coherer, restoring it to its receptive state. The two chokes (L) in the coherer's leads prevented the radio signal across the coherer from short circuiting by passing through the DC circuit. He connected his receiver to a wire antenna (A) suspended high in the air and to a ground (earth) (G). The antenna idea may have been based on a lightning rod and was an early use of a monopole wire aerial. Demonstrations On", "-33.700650244398275" ], [ "with the user lifting the handset out of the coupler and hanging it up on the phone body in order to depress the hook switch and return the phone to the on-hook state and end the call.\nThere were optional systems to dial the phone or pick it up, but these were generally implemented as separate devices also intended to be used on one end of the connection or the other. For instance, the autodialler was a system that automated the action of picking up the phone and dialing a number, and was normally implemented as a separate box that connected", "-33.6805721942801" ], [ "or control its volume. The device would beep even on silent mode. This issue was most common in the early models of the phone.\nOther users have reported slow response times for the camera, sudden screen blackouts and random reboots.", "-33.660338578993105" ], [ "well as radiating a pulse of energy. The amplitude is usually small and the signal may be treated as \"noise\" or \"interference\". The switching off or \"opening\" of a circuit causes an abrupt change in the current flowing. This can in turn cause a large pulse in the electric field across the open contacts, causing arcing and damage. It is often necessary to incorporate design features to limit such effects.\nElectronic devices such as vacuum tubes or valves, transistors and diodes can also switch on and off very quickly, causing similar issues. One-off pulses may be caused by solid-state switches and", "-33.63175586293073" ], [ "faster, more accurate dialing could be done with push buttons, but this was too unreliable in customer trials until transistors transformed the industry. In 1963, the Bell System introduced to the public its dual-tone multi-frequency (DTMF) technology under the name Touch-Tone, which was a trademark in the U.S. until 1984. The Touch-Tone system used push-button telephones. In the decades after 1963, pulse dialing was gradually phased out as the primary dialing method to the central office, but many systems still support rotary telephones today. Some keypad telephones have a switch for the selection of tone or pulse dialing.\nMobile telephones and", "-33.5096374177956" ], [ "Automatic ring back Automatic ring back is a service offered by phone companies.\nOn making a telephone call to a number that is engaged, automatic ring back is a service provided by the telephone company whereby, when the called number becomes available, the caller is rung back, usually with a distinctive \"ring back\" ring. When the phone is picked up, it calls the previously engaged number. The service is typically invoked by keying a number on hearing the engaged tone.\nIn the UK the service is also known as Ringback.\nIn the United States the service is often called Auto Redial.\nIn the United", "-33.47779719220853" ], [ "output must be robust enough to withstand being grounded. Combining send and return functions via single ​¹⁄₄ in TRS connectors in this way is seen in very many professional and semi-professional audio mixing desks, because it halves the space needed for insert jack fields which would otherwise need two jacks, one for send and one for return. The tradeoff is that unbalanced signals are more prone to buzz, hum and outside interference.\nIn some three-conductor TRS phone inserts, the concept is extended by using specially designed phone jacks that will accept a mono phone plug partly inserted to the first click and", "-33.42853984545218" ], [ "it face down, it will stop ringing, or if the user wishes to establish a Bluetooth or wireless internet connection, they can shake the device and it will automatically connect. However, users have found that these gestures are often poorly recognised, resulting in the device performing unwanted tasks. It is not the first device to have these features; the HTC Desire Z introduced these features in 2010. It features a capacitive QVGA LCD touchscreen display which measures 3 inches with a resolution of 240x320 px at 133 ppi with multitouch support. It also provides a 2 MP rear camera", "-33.40690220729812" ], [ "Ding-ding, and away Ding-ding, and away is a slang expression used by the UK media and railway enthusiasts to describe a type of operating incident in the British railway industry where the guard of a train standing at a platform gives a \"ready to start\" bell code to the driver, when the platform starting signal is at danger, and the driver then moves the train past the signal without checking it. This constitutes a signal passed at danger (SPAD). Overview On multiple unit trains, the guard uses a buzzer code to communicate with the driver. Once the doors have closed", "-33.385166073188884" ], [ "as distinct from method ringing, where the ringers memorise the course of bells as part of a continuous pattern. Call change instructions Calls are usually of the form \"X to (or after) Y\" or \"X Y\"; in which X and Y refer to two of the bells by their physical numbers in the tower (not by their positions in the row). All cause two bells to swap. The first form is used for calling up and calling down, and the second form swaps the two bells mentioned. Use of call changes Call changes are a valuable step in the", "-33.34064212040539" ], [ "or the receiver more sensitive to weaker signals.\nTMAs are used in mobile networks to improve the sensitivity of the uplink in mobile phone masts. Since the transmitter is a mobile phone it cannot be easily modified to transmit stronger signals. Improving the uplink translates into a combination of better coverage and mobile transmitting at less power, which in turn implies a lower drain from its batteries, thus a longer battery charge.\nThere are occasions when the cable between the antenna and the receiver is so lossy (too thin or too long) that the signal weakens from the antenna before reaching the", "-33.26474728200992" ], [ "slider, limits maximum rotational movement to just over a full circle, and allows the bell to be set or rested mouth uppermost. A large wheel is fitted to the headstock and the rope wraps and unwraps as the bell rotates backwards and forwards. Within the bell is a clapper which strikes the thickest part of the bell mouth called the soundbow. In English ringing a set of bells is known as a \"ring of bells\" and an example of a ring of eight bells is shown mouth upwards in the rest position in the accompanying picture. \nThe ringers", "-33.10155184278847" ], [ "only allows a ringer to ring two bells at a time, one in each hand. Depending on the number of bells needed for a particular piece and the number of ringers, it may be necessary for each ringer to ring more than two bells at a time or in short succession (four-in-hand) There are also many techniques that change the sound of the bell as it is rung. Four bells There are two main ways of ringing two handbells with one hand: four-in-hand and Shelley.\nIn the four-in-hand technique, the ringer hold two bells in one hand with the clappers at", "-33.09850558146718" ], [ "Speakerphone Speakerphone setup Many modern speakerphones must first be calibrated to the acoustic characteristics of the room in which they will be used. During this calibration phase, they may make a variety of noises including ascending tones or chiming sounds. This calibration may be automatic or manually invoked by the user, and it may need to be repeated if the speakerphone is relocated within the room. A failure to be properly calibrated can be indicated by the occurrence of echoing, ringing sounds, or feedback. Handset vs. base speakerphone Many cordless telephones have a handset speakerphone as well as a base", "-33.07342023518868" ], [ "gamelan whose iron bells are suspended in air by electronic magnets; a photo sensor prevents them from rising past a certain point, and since they don't touch anything, once rung they will sound with a phenomenally long decay. Another invention is an extra-long bass clarinet. Extra keys spiraled around the instrument allow a microtonal scale. A human blows through the mouthpiece; the dozens of extra keys are played via computer. In 1987 he met Conlon Nancarrow, composer of experimental player piano music unplayable by a human pianist. Trimpin already had the technology to convert Nancarrow's player piano rolls into MIDI", "-33.04693055903772" ], [ "Sagem myX-7 Durability Sagem phones have always been plagued by aesthetic wear problems. This is especially true of the myX-7 model, where the screen is known to scuff and crack particularly easily. The phone's electronics are for the most part able to withstand most normal wear, due to the fact they are not packed tightly into a small space (thus causing components to bump each other), but rather are spread out over the phone's surface area.", "-33.04290421973565" ], [ "Distinctive ring Hardware Adjunct hardware can be employed with this service. For example, if two or three people, as roommates, share a residence, each can have his/her own telephone number, and a phone set in his/her own bedroom, equipped with a \"ring selector\" that is set to filter out all but one particular ringing pattern. When an incoming call rings with a pattern other than the one selected, the telephone set connected to the device would not ring at all, sparing the occupant an intrusion.\nSome fax machines and dial-up modems support distinctive ring natively through a configuration option which causes", "-33.033043050993" ], [ "pressed. This may also be caused by the action sticking after the key is released. The other extreme is that notes do not sound, or sound feebly, when a key is pressed. Advantages and disadvantages of tracker action Currently, some organ builders use tracker action in new organs, others use electric action, and still others use either type depending on the instrument. There are builders and organists who have strong feelings regarding the advantages of one type of action over another.", "-33.029397611288005" ], [ "half features a circular keypad with an iPod-style scroll wheel, and the other features a liquid crystal display. The handset was designed so that for standard use the screen is at the bottom of the phone, and the keypad is on the half that flips out. This was for two reasons: It stops the phone from getting greasy when you talk, and it also improves the weight balance while holding the phone. The handset also inverts so you can hold the phone up the other way if you so wished.\nThere are some major design flaws in the Serene. The", "-33.022544340696186" ], [ "reason, and it does not go back to portrait.\nWhen receiving a call in a three-way call, the user cannot send messages.\nThe initial rollout of the Android 7.0 Nougat software update in September 2016 was temporarily halted after reports of battery drain among early updaters. The issue was fixed and the rollout continued.\nKnown issue where the battery would suddenly drop to zero. Also certain sets would get caught in a bootloop rendering them useless. Following a class action lawsuit in the United States, Huawei reimbursed owners for the issue. A similar class action lawsuit was authorized in the province of Quebec,", "-32.99219534668373" ], [ "induces a small difference between the time it takes light to traverse the ring in the two directions according to the Sagnac effect. This introduces a tiny separation between the frequencies of the counter-propagating beams, a motion of the standing wave pattern within the ring, and thus a beat pattern when those two beams are interfered outside the ring. Therefore, the net shift of that interference pattern follows the rotation of the unit in the plane of the ring.\nRLGs, while more accurate than mechanical gyroscopes, suffer from an effect known as \"lock-in\" at very slow rotation rates. When the ring", "-32.982955129176844" ], [ "current was caused to flow in the coil which created a varying magnetic field that augmented or diminished that due to the permanent magnet. This varied the force of attraction on the diaphragm, causing it to vibrate. The vibrations of the diaphragm push and pull on the air in front of it, creating sound waves. Standard headphones used in telephone work had a low impedance, often 75 Ω, and required more current than a crystal radio could supply. Therefore, the type used with crystal set radios (and other sensitive equipment) was wound with more turns of finer wire giving it", "-32.97594395276974" ], [ "one movement. Shelley is typically used to ring notes in octaves, but can also be used to ring two notes separately by striking the primary bell sideways and the secondary bell forward in an action like tapping the fingers.\nAs to the relative merits of the two techniques, some believe that Shelley ringing is rendered obsolete when four-in-hand is perfected, while others believe that the motion of the clappers in the same plane makes certain techniques more feasible, particularly shaking, martellato and vibrato. Six bells There are several ways to play six bells at a time (i.e., to ring three bells", "-32.96764253790025" ], [ "that the system used \"is suitable for the transmission of sound at distances up to ten kilometers.\"\nGolubitsky studied the causes of the poor phone lines and found that the low sensitivity and poor stability of the phone are explained by the influence of the magnetic field at the center of the membrane, which forms a node of vibration. Golubitsky changed the design, removing the source of interference. The design of the new phone was very simple — the two poles of the magnet were located eccentrically relative to the center of the membrane that did not cause any additional deformation.\nIn", "-32.92076936166268" ], [ "a clock, an alarm, and the popular game Snake. The phone is able to display any of 32 different languages. Vibration is an option for alerting the user to an event, for example receiving a text or reaching the time of an alarm. The 8810 is able to be used with Carbon Copy 5.0, which is a remote access program used for controlling a computer via a dial-up modem connection. Like all Nokia phone models, the 8810 has the option to change the 'profile'. This means that the user can select the volume and melody for tones such as the", "-32.91203149150169" ], [ "the flight determines the rate at which the clapper swings, and therefore the point in time at which it strikes the bell.\nBells are normally left mouth down (for safety.) Before ringing, the bells are swung in increasing arcs until the bell is mouth uppermost. When the ringer desires to make a stroke, the bell is swung around a full circle, the clapper striking once. \nIn English full-circle ringing there is no counter-balancing, so the bell accelerates rapidly to its maximum velocity when mouth downwards, and slows down as it rises to mouth upwards. In Veronese full-circle ringing there is", "-32.887904014554806" ], [ "buttons are instead located where the index finger would normally lie when the phone is held. Alongside the power button, the G2 is also powered on by double-tapping on the screen, and turned off by double-tapping on the status bar or a blank area on the home screen, a feature branded as \"KnockOn\". When the phone is off, the volume keys can also be used to launch directly into the camera or QuickMemo applications by holding them down.\nThe G2 is powered by a 2.26 GHz quad-core Snapdragon 800 processor with 2 GB of RAM and support for LTE or LTE Advanced", "-32.864923520362936" ], [ "Sidetone Sidetone is audible feedback to someone speaking when using a handset or headset as an indication of an active transmission. The term is often used in the telecommunication field. Telephony In telephony, sidetone is the effect of sound picked up by the telephone's transmitter (mouthpiece) and instantly introduced at a low electronic signal level into the receiver (earpiece) of the same handset, a form of feedback. \nSidetone in 19th century telephones varied until the carbon transmitter was used, which produced a distinct sidetone that discouraged speaking loudly enough, and occasionally so loud as to cause the instrument to", "-32.860969865636434" ], [ "transformers, toaster ovens, electric blankets, ultrasonic pest control devices, electric bug zappers, heating pads, and touch controlled lamps. Multiple CRT computer monitors or televisions sitting too close to one another can sometimes cause a \"shimmy\" effect in each other, due to the electromagnetic nature of their picture tubes, especially when one of their de-gaussing coils is activated.\nElectromagnetic interference at 2.4 GHz can be caused by 802.11b and 802.11g wireless devices, Bluetooth devices, baby monitors and cordless telephones, video senders, and microwave ovens.\nSwitching loads (inductive, capacitive, and resistive), such as electric motors, transformers, heaters, lamps, ballast, power supplies, etc., all cause", "-32.80772336802329" ], [ "within the vibrator's enclosure, the inside surface of the can was often lined with a thick sound-deadening material, such as foam rubber. Since vibrators were typically plugged into sockets mounted directly on the radio chassis, the vibration could potentially be mechanically coupled to the chassis, causing it to act as a sounding-board for the noise. To prevent this, the sound-deadening lining inside the can was sometimes made thick enough to support the vibrator's components by friction alone. The components were then connected to the plug pins by flexible wires, to further isolate the vibration from the plug.", "-32.794317582076474" ], [ "of the magnet, exerting a varying force on the diaphragm, causing it to vibrate, creating sound waves. The requirement for high sensitivity meant that no damping was used, so the frequency response of the diaphragm had large peaks due to resonance, resulting in poor sound quality. These early models lacked padding, and were often uncomfortable to wear for long periods. Their impedance varied; headphones used in telegraph and telephone work had an impedance of 75 ohms. Those used with early wireless radio had more turns of finer wire to increase sensitivity. Impedance of 1000 to 2000 ohms was common, which suited", "-32.744206962233875" ], [ "keeps the ring from moving, however, if it is at A. Over time, therefore, the rings will be bumped from B to A and get stuck there, creating an imbalance in the system. In his experiments, Leigh was able to take a pot of \"billions of these devices\" from 50:50 equilibrium to a 70:30 imbalance within a few minutes.\nIn 2009 Mark G. Raizen developed a laser atomic cooling technique which realizes the process Maxwell envisioned of sorting individual atoms in a gas into different containers based on their energy. The new concept is a one-way wall for atoms or molecules", "-32.69673513449379" ], [ "around the loop is greater than unity. \nThe microphone's low-voltage performance is particularly useful in remote locations served by very long telephone lines, where the electrical resistance of the wires can lead to severe DC voltage drop. Most all-electronic telephones need at least three volts DC to work, and so will often become useless in such situations, whereas carbon transmitter telephones will continue to work down to a fraction of a volt. Even where they do work, electronic telephones also suffer from the so-called \"cliff effect\", whereby they abruptly stop working when the line voltage falls below the", "-32.62494533463905" ], [ "be worn outside of the home, such as in an office, car, etc. The remote control can be entrusted to the wearer’s partner, but its range is limited, and the vibrator can also be remotely controlled via an app installed on both mobile devices. However, these vibrators are not silent, producing an audible humming sound when active. Cock rings feature a vibrating bullet, to stimulate the clitoris during intercourse, as well as an erection enhancer.\nSome hands-free vibrators are waterproof.\nThere are also dual type of vibrators which provide stimulation to both the clitoris and G-spot. Some clitoral vibrators may be inserted", "-32.61620160217353" ], [ "audio range, and can be heard as a tone in the receiver's earphones whenever the transmitter signal is present. Thus the Morse code \"dots\" and \"dashes\" are audible as beeping sounds. This technique is still used in radio telegraphy, the local oscillator now being called the beat frequency oscillator or BFO. Fessenden coined the word heterodyne from the Greek roots hetero- \"different\", and dyn- \"power\" (cf. δύναμις or dunamis). Superheterodyne receiver An important and widely used application of the heterodyne technique is in the superheterodyne receiver (superhet), which was invented by U.S. engineer Edwin Howard Armstrong in 1918. In the", "-32.61307698683231" ], [ "off because there was no antenna connected to the chip. Later iterations of the iPhone (starting with the iPhone 7), however, do not contain radio chips at all. A campaign called \"Free Radio On My Phone\" was started to encourage cellphone manufacturers such as Apple to enable the radio on the phones they manufacture, reasons cited were that radio drains less power and is useful in an emergency such as the 2016 Fort McMurray Wildfire. Fingerprint sensor Until 2017, iPhone models starting from iPhone 5S (excluding the iPhone 5C) featured Apple's fingerprint recognition sensor. It is used for unlocking the", "-32.593371698021656" ], [ "Ringing artifacts In signal processing, particularly digital image processing, ringing artifacts are artifacts that appear as spurious signals near sharp transitions in a signal. Visually, they appear as bands or \"ghosts\" near edges; audibly, they appear as \"echos\" near transients, particularly sounds from percussion instruments; most noticeable are the pre-echos. The term \"ringing\" is because the output signal oscillates at a fading rate around a sharp transition in the input, similar to a bell after being struck. As with other artifacts, their minimization is a criterion in filter design. Introduction The main cause of ringing artifacts is due to a", "-32.58322509780555" ], [ "Bell box A bell box is an audible device, often electric, which when activated, emits a chime, bell, or buzzer sound. Components The housing of the bell box may be manufactured from wood, metal, or plastic. The basic core component of a conventional bell box is an electromagnet and a bell or other metal part, some of which create a repetitive sound. The bell sound is normally created inside the box, although the unit may have bells mounted on the outside of the box. The bell box may also include visual alerts such strobe or other flashing lights. Types A", "-32.581702114097425" ], [ "a Leyden jar, while the outside surface of the jar is put in contact with the metal stand. Thus, the central bell takes its charge from the inner surface of the jar, while the outer surface charges the two bells on the conductive chains. This causes the bells to have a difference in electrical potential equal to that between the inner and outer surfaces of the jar. The hanging metal clappers will be attracted to one bell, will touch it, pick up its charge, and be repelled; they will then swing across to the other bell, and do the same", "-32.56734250840964" ], [ "be stopped in any way apart from physically going outside to the bellbox and disabling the siren. It is also why if there is a power outage in the area, most burglar alarms do start ringing and cannot be realistically stopped until the main power is restored. Computers Modern personal computer motherboards have a backup battery to run the real-time clock circuit and retain configuration memory while the system is turned off. This is often called the CMOS battery or BIOS battery. The original IBM AT through to the PS/2 range, used a relatively large primary lithium battery, compared to", "-32.55797692609485" ], [ "mechanism for ringing the bells was installed.", "-32.54959026782308" ], [ "of a battery, B1, and a relay, R, is also attached to the two electrodes. When the signal from a spark gap transmitter is received, the filings tend to cling to each other, reducing the resistance of the coherer. When the coherer conducts better, battery B1 supplies enough current through the coherer to activate relay R, which connects battery B2 to the telegraph sounder S, giving an audible click. In some applications, a pair of headphones replaced the telegraph sounder, being much more sensitive to weak signals, or a Morse recorder which recorded the dots and dashes of the", "-32.530558692640625" ], [ "was the use of electronic tone ringers which used up to eight different tones produced by a tweeter, rather than the traditional bell ringer.", "-32.50722275782755" ], [ "Telephone hook Additional usage A phone receiving many calls in rapid succession can be said to be \"ringing off the hook\". (Often cartoons will show a telephone handset literally bouncing above the ringing base unit.) This most likely led to the present use of \"off the hook\" as a synonym for \"crazy\" or \"exciting\". \"Last night was off-the-hook\" may mean \"last night was really awesome\".\n\"Off the hook\", meaning \"freed from responsibility or culpability\" is not related to the telephone, but most likely derives from the image of a worm or fish dislodging itself from a fish hook.", "-32.43939750704885" ], [ "strike in different sequences. This ability to control the speed of bells soon led to the development of change ringing where the striking sequence of the bells is changed to give variety and musicality to the sound.\nThe vast majority of \"rings\" are in church towers in the Anglican church in England and can be three to sixteen bells, though six and eight bell towers are the most common. They are tuned to the notes of a diatonic scale, and range from a few hundredweight (100 kg) up to a few tons (4,000 kg) in weight. They are most commonly", "-32.42832795641152" ], [ "Jingle (percussion) In percussion, a jingle is one of a cluster of small bells, shaken or tapped on the palm of the player's hand. The small metal discs arranged around the frame of a tambourine are also called \"jingles\". In the Hornbostel–Sachs instrument-classification system, they are described as \"shaken idiophones\". Jingles were often found in ancient times as harness ornaments suspended from the trappings of horses, mules, and camels (Blades and Holland 2001).\nThat term is referenced in Bob Dylan's hit song, \"Mr. Tambourine Man\". It is an onomatopoeic term, often used together with jangle. An example of that usage is", "-32.386726544296835" ], [ "the ringer stops it by damping the bell with a hand or on the body or a padded surface.\nHandbell techniques have changed very much over the years. Donald Allured, founding director of Westminster Concert Bell Choir, is credited with fully realizing an American off-the-table style of ringing that includes many non-ringing sound effects including stopped techniques such as plucking the clapper with the bell on the table. He is also credited for promoting precise damping or stopping of the sound by touching the bell to a soft surface, in the service of more musical results. Multiple-bell techniques Normal ringing technique", "-32.37845075648511" ], [ "(cling together), they conduct electricity much better after being subjected to radio frequency electricity. The radio signal from the antenna was applied directly across the coherer's electrodes. When the radio signal from a \"dot\" or \"dash\" came in, the coherer would become conductive. The coherer's electrodes were also attached to a DC circuit powered by a battery that created a \"click\" sound in earphones or a telegraph sounder, or a mark on a paper tape, to record the signal. Unfortunately, the reduction in the coherer's electrical resistance persisted after the radio signal was removed. This was a problem because", "-32.37295790432836" ], [ "than the minimum) input value: one can have one without the other, but in important cases, such as a low-pass filter, one first has overshoot, then the response bounces back below the steady-state level, causing the first ring, and then oscillates back and forth above and below the steady-state level. Thus overshoot is the first step of the phenomenon, while ringing is the second and subsequent steps. Due to this close connection, the terms are often conflated, with \"ringing\" referring to both the initial overshoot and the subsequent rings.\nIf one has a linear time invariant (LTI) filter, then one can", "-32.35285887811915" ], [ "alert sounds from new & sent emails, text messages, and other push notifications, camera shutter sounds, Voice Memo sound effects, phone lock/unlock sounds, keyboard clicks, and spoken auto-corrections. This switch does not mute alarm sounds from the Clock application, and in some countries or regions it will not mute the camera shutter or Voice Memo sound effects. All buttons except Home were made of plastic on the original first generation iPhone and metal on all later models. The touchscreen furnishes the remainder of the user interface.\nA software update in January 2008 allowed the first-generation iPhone to use cell tower and", "-32.31852112142951" ], [ "critical level. In particular, this means that one telephone on a \"party line\" may tend to \"hog\" all the line current, cutting the others off. With carbon microphones, all receivers on the same line will still operate, albeit with reduced output.\nCarbon microphones are also widely used in safety-critical applications such as mining and chemical manufacturing, where higher line voltages cannot be used, due to the risk of sparking and consequent explosions. Carbon-based telephone systems are also resistant to damage from high-voltage transients, such as those produced by lightning strikes, and electromagnetic pulses of the type generated by nuclear", "-32.31699336068414" ], [ "Ringback number A ringback number is a telephone number that immediately calls back the line it is dialed from. The usual use of a ringback number is by telephone company technicians for testing, with limited utility for subscribers. Use by technicians Typically, a technician tests the terminal equipment (telephone set) ringer by calling a ringback telephone number or a vertical service code, and then hanging up and waiting for the telephone to ring. When answering, the switch may play a low frequency signal tone, at which point the technician flashes the line (hangs up briefly) one or more times. A", "-32.272886090679094" ], [ "to ring changes. The sound of a chime was a poor substitute for the rich sound of swinging bells, and the apparatus fell out of fashion. Consequently, the Ellacombe apparatus has been disconnected or removed from many towers in the UK. In towers where the apparatus remains intact, it is generally used like a Carillon, but to play simple tunes, or if expertise exists, to play changes. Gamelan Perhaps the best-known example from outside Europe of an organized system of bells is the gamelan, an Indonesian orchestra-like ensemble in which a prominent part is played by a variety of", "-32.233181323768804" ], [ "too high setting of the sharpness control. Audio Ringing can affect audio equipment in a number of ways. Audio amplifiers can produce ringing depending on their design, although the transients that can produce such ringing rarely occur in audio signals.\nTransducers (i.e., microphones and loudspeakers) can also ring. Mechanical ringing is more of a problem with loudspeakers as the moving masses are larger and less easily damped, but unless extreme they are difficult to audibly identify.\nIn digital audio, ringing can occur as a result of filters such as brickwall filters. Here, the ringing occurs before the transient as well as after.", "-32.22372233691567" ], [ "some household telephone wiring, it is rarely done. It is usually much easier to install filters at each telephone jack that is in use.\nDSL signals may be degraded by older telephone lines, surge protectors, poorly designed microfilters, Repetitive Electrical Impulse Noise, and by long telephone extension cords. Telephone extension cords are typically made with small-gauge, multi-strand copper conductors which do not maintain a noise-reducing pair twist. Such cable is more susceptible to electromagnetic interference and has more attenuation than solid twisted-pair copper wires typically wired to telephone jacks. These effects are especially significant where the customer's phone line is more", "-32.213946770643815" ], [ "to the target line remaining open before a call was answered or after it was hung up by the recipient, was similarly affected by the demise of mechanical switching.", "-32.212004401691956" ], [ "sidetone may cause users to lower the voice to unacceptable levels, so that the recipient receives insufficient signal level.\nIn the 1920s, developments in anti-sidetone circuitry and non-positional transmitters, which worked in any orientation, permitted Western Electric to develop a handset model substantially free of these problems. The resulting E1 handset was ready for production in 1927. This handset was paired with a base that was essentially a candlestick with a shortened neck of approximately one inch in height, topped with a new cradle for the handset. The cradle incorporated the hookswitch as a vertical plunger actuating the electrical switch contacts.", "-32.200842590944376" ] ]
o2wcs
why America is so obsessed with its founding father's views
[ "I think it's more like, \"How can I make what the Founding Fathers said appear to fit/support my viewpoint?\" People have respect for their beliefs and viewpoints because those ideas shaped the county they live in currently, which also makes it a matter of patriotism. I think others then use that respect as a way of backing up their own, personal ideology.", "When politicians debate issues such as abortion, health care, defense, etc. They are actually debating the constitutionality of the topic. Nobody wants to force abortions, deny people help for their health, or leave America defenseless. Instead they are debating the role the federal government should have (this applies to federal politicians in this context). For example Ron Paul believes that if California wants to legalize medicinal marijuana then the federal government has no right to stop California. The argument of constitutionality comes from how you interpret the constitution. There is strict and their is loose interpretation. Now politicians and the Supreme Court Justices won't say that. Instead they will say framers' intent (strict) or living document (loose). Conservative Justices will approach laws and if they rightfully fall under the powers of congress by seeing if it follows the framers' intent of the elastic clause. While liberal Justices will say that there is no way that the founders could predict everything that had changed in the world and with that we must change our views. To answer your question about the \"obsession.\" It's not n obsession. It's the ultimate precedent that politicians use for their decisions.", "While I am only speaking from my own experience and education, a lot of it comes from how the schools teach about the writing of the Constitution and the early years of the United States. Especially in middle school and younger, the instruction practically is a hagiography of the Framers. It also ties into ideas of American exceptionalism - that America is a unique experiment in democracy and a city on the hill. If you buy into that, or if you want voters to think you do, it makes sense to talk about how the country's founding document and its founding figures are near infallible.", " > she's trying to decipher the intentions of someone who's not answering their phone. While I'm not sure how much Bachman knows about the founding fathers, scholars have a pretty good idea on how the founders viewed government and how it should work by reading material they've written such as articles, documents, and letters to other people. As far as the great respect people have for the founders, I think this comes from how they proposed a completely different governmental system that had never existed before. Before then, most governments were ruled by kings, dictators, oligarchies, theocracies, etc... The founders devised a system of self governance, in that the people are the ones in control of the government, and not a ruler chosen by birth, God, or a select few. The founders took great care in crafting the constitution, in that they intended the federal government to be very limited in scope, with only a few responsibilities, while implementing checks and balances to keep the three branches in check. As to why some politicians glorify the works of the founding fathers, I think they're just trying to appeal to the emotions of their constituency, as well as trying to say, \"Hey, I agree with these geniuses! You should vote for me!\"", "The way our (assuming you're American) Nation is set up is to idolize the founding fathers as virtuous and true. Now despite the fact that they were generally rich, white, racist, plantation owners, many Americans treat them as the 'Ideal' politician. The fact that they helped to create this Nation supposedly gives them the credibility that Politicians would like to add to their image. Don't get me wrong, I respect the Founding Fathers for what they did, but I don't believe that we should Idolize them the way we do. That doesn't mean, however, that we shouldn't uphold the Constitution or the Bill of Rights. (Just for clarification, not trying to spread my personal opinion)", "That's patriotic rhetoric, many countries have heros. Listen to an Hugo Chavez's speech." ]
[ [ "financial, political or other areas by nurturing qualities, such as perseverance and hard work, as opposed to achieving these goals through inherited fortune, family connections, or other privileges. By the mid-1950s, success in the United States generally implied \"business success\".\nIn the intellectual and cultural history of the United States, the idea of the self-made man as an archetype or cultural ideal has been criticized by some as being a myth or a cult. Origins Benjamin Franklin, one of the Founding Fathers of the United States, has been described as \"undoubtedly the original self-made man.\" and the greatest exemplar of the", "-39.26185241912498" ], [ "and magnificent purposes. Above them all and weaving them all together into the most exciting flag of all the world and of all history was the triumphal purpose of freedom.\n\nIt is in this spirit that all of us are called, each to his own measure of capacity, and each in the widest horizon of his vision, to create the first great American Century.\nDemocracy and other American ideals would \"do their mysterious work of lifting the life of mankind from the level of the beasts to what the Psalmist called a little lower than the angels\". Only under the American", "-38.865554635965964" ], [ "as Republicans, but as Americans. We still have the most talented, most productive workers of any country on Earth. We're still home to innovation and technology, colleges and universities that are the envy of the world. Some of the biggest ideas in history have come from our small businesses and our research facilities. It won't be easy, but there's no reason we can't make this century another American century.\" \nThis quote praises America's ability to rise against the odds. Obama's use of exceptionalism became symbolic of a fight to restore and renew America back to its glory days", "-38.63965344121607" ], [ "and we only have any need to create artificially the patriotism which is the birthright of other nations.\" Since the racial and ethnic demographic alterations of the American population caused by the 1965 Hart-Celler Act, Americanism has been rooted less in shared cultural experiences and more in shared political ideals.\nThe concept of Americanism has been around since the first European settlers moved to North America aspired by a vision of a shining \"City on a hill\". John Adams wrote that the new settlements in America were \"the opening of a grand scene and design in Providence for the illumination of", "-38.4442558347655" ], [ "conviction, and purpose, not of creed or birthplace.\"\nAmericanism has two different meanings. It can refer to the defining characteristics of the United States and can also signify loyalty to the United States and a defense of American political ideals. These ideals include, but are not limited to self-government, equal opportunity, freedom of speech, and a belief in progress. This collection of ideals that forms the modern ideology of Americanism holds an enduring appeal to people from lands throughout the globe. History In an essay devoted to Americanism, Agnes Repplier emphasized that, \"Of all the countries in the world, we", "-38.00219467779971" ], [ "the people of the United States as that portion of the English people which is commissioned to explore the wilds of the New World; whilst the rest of the nation, enjoying more leisure and less harassed by the drudgery of life, may devote its energies to thought, and enlarge in all directions the empire of the mind. The position of the Americans is therefore quite exceptional, and it may be believed that no democratic people will ever be placed in a similar one.\nThe phrase an \"empire of the mind\" usually denotes imperialism or a specific empire and has been applied", "-37.90197293025267" ], [ "politically in both political parties over the past century that few Americans now understand their original government and how their Constitution provided the foundation for its historical success. This lack of understanding has produced a profound unease with how government works and explains why society has not responded positively to the changes, provoking a widespread demand for an alternative. There is a general agreement, Devine argues, that something is profoundly wrong and that something about the nation's greatness is being lost. For many, this has meant a turning toward the Constitution and the principles underlying it, which he argues is", "-37.69287418969179" ], [ "liberated to achieve true progress. Chapters 1. The House Divided Against Itself:\nIronically, this references Abraham Lincoln's nomination acceptance speech, but Dewey is claiming that the new division is in the American mind. Americans still claim that people should act morally, and not solely out of selfish desire for profit, yet in all practical matters, they pursue and reward behavior that is selfish and profit driven.\n2. \"America\"—By Formula:\nAmerican capitalism is not completely bad because it has brought people in the world together in some senses. However, American culture is flawed because it is materialistic and has become characterized by three things:", "-37.607747169990034" ], [ "idea of American exceptionalism. This view holds that the U.S. occupies a special niche among developed nations in terms of its national credo, historical evolution, political and religious institutions, and unique origins. The concept originates from Alexis de Tocqueville, who asserted that the then-50-year-old United States held a special place among nations because it was a country of immigrants and the first modern democracy. From the establishment of the United States after the American Revolution until the Spanish–American War, the foreign policy of the United States had a regional, instead of global, focus. The Pax Americana, which the Union enforced", "-37.596605573147826" ], [ "of America, as established in a 1956 law signed by President Dwight D. Eisenhower, is \"In God We Trust\". The phrase first appeared on U.S. coins in 1864.\nAccording to a 2002 survey by the Pew Research Center, nearly 6 in 10 Americans said that religion plays an important role in their lives, compared to 33% in Great Britain, 27% in Italy, 21% in Germany, 12% in Japan, and 11% in France. The survey report stated that the results showed America having a greater similarity to developing nations (where higher percentages say that religion plays an important role) than to other", "-37.46787815357675" ], [ "that appear in American literature such as, but not limited to, all people are equal, The United States of America is the Land of Opportunity, independence is valued, The American Dream is attainable, and everyone can succeed with hard work and determination. John Winthrop also wrote about this term called, American exceptionalism. This ideology refers to the idea that Americans are the chosen ones, and that they are the light. Literary commentary The American Dream has been credited with helping to build a cohesive American experience, but has also been blamed for inflated expectations. Some commentators have noted that despite", "-37.32525818628346" ], [ "philosophy to that of America's Founders and compared these to empirical aspects of America today. Georgetown University Professor George Carey called Devine's book \"refreshing and thought provoking,\" while Professor Tibor Machan found reflecting upon its mix of philosophical and empirical research a \"rewarding experience and William Buckley found it \"wonderfully useful.\"\nThe more recent America's Way Back started with that same combination of tradition and freedom in Western civilization arguing that what is required today is an understanding of this profound synthesis underlying the Constitution, reviving its harmony between freedom and tradition, a fusion whose tension has been", "-37.21914213496348" ], [ "historical development of the United States and its role in forming a unique American identity, characterized by the New England ethos and the political ideals of the founding fathers. These characteristics were supposed to be especially embodied by the traditional architecture of New England which was admired for its elegance and functionalism. Thus, everywhere the Colonial Revival was seen, it symbolized the progress of American Civilization based upon enduring traditional values. By the same token, the style of the Stanley was a reflection of the clientele's back-east gentility as well as an advertisement for the hotel's modern comforts and the", "-36.985542914673715" ], [ "to God are strongly based in an American view of Christianity. The allure of Lin-Manuel Miranda's musical Hamilton is none other than the modernization of true U.S. history. The desire for American art to focus on American issues and history was founded by early patriotic artists like James Nelson Barker.", "-36.89810795219091" ], [ "directed by Dennis Hopper, shows the characters making a pilgrimage in search of \"the true America\" in terms of the hippie movement, drug use, and communal lifestyles. Political leaders Scholars have explored the American Dream theme in the careers of numerous political leaders, including Henry Kissinger, Hillary Clinton, Benjamin Franklin, and Abraham Lincoln. The theme has been used for many local leaders as well, such as José Antonio Navarro, the Tejano leader (1795–1871), who served in the legislatures of Coahuila y Texas, the Republic of Texas, and the State of Texas.\nIn 2006 U.S. Senator Barack Obama wrote a memoir, The Audacity", "-36.85167647288836" ], [ "60 percent of Americans consider their culture \"superior to others\". The Importance of America's relationship with other nations and their reactions to global events mean they are unwilling for multinational efforts and institutions, and compared with other countries' citizens they pay less attention to them.\nKohut and Stokes write that Americans are self-involved, that George W. Bush reflected the real America for others, and that changing these conditions needs a change of leaders and peoples' thoughts. \"Americans think of themselves as kings and queens of the world's prom\", the writers said. According to the book, American security depends on its further", "-36.79781517125093" ], [ "leaders believe so, as do the majority of Americans. But the evidence shows overwhelmingly that America has not lost its traditional values, that the nation compares favorably with most other societies, and that the culture war is largely a myth.” –America’s Crisis of Values \n\"One reason I like surveys is that a survey is a very democratic instrument. You bypass our leaders, you bypass everyone and you go right to the people and say, 'What do you think?'\" \n\"Maybe what we're hearing from our politicians in Washington about how bad things are, how divided we are, maybe that's not true.", "-36.30411018520681" ], [ "skeptical approach, arguing, \"There is no single unifying narrative linking past and present in America. Instead, we have enduring divisions in a nation even larger and more diverse than that of 1787. The best we can do today is to cope with our differences by seeking compromises, just as the Founders had to do, painfully and incompletely in the early Republic.\"", "-36.14692981389089" ], [ "and represented the best combination of faith and pragmatism.” This is evidenced by the popularity of Peale's book, which sold more than 5 million copies worldwide and was eventually translated into over 40 languages. In addition, Peale was close friends with American presidents Eisenhower and Nixon, both of which highly regarded his positive thinking teachings. Countless others accredited The Power of Positive Thinking for their success in overcoming obstacles including George Foster, of the Cincinnati Reds, Rev. Robert Schuller, founder and pastor of the Crystal Cathedral in Garden Grove, and Billy Graham, a prominent Southern Baptist Minister. Popular culture President", "-36.08286472821783" ], [ "with which the United States was first conceived\".\nMartí started to believe that the US had abused its potential. Racism was abundant. Different races were being discriminated against; political life \"was both cynically regarded by the public at large and widely abused by 'professional politicians'; industrial magnates and powerful labor groups faced each other menacingly\". All of this convinced Martí that a large-scale social conflict was imminent in the United States.\nOn the positive side, Martí was astonished by the \"inviolable right of freedom of speech which all U.S. citizens possessed\". Marti applauded the United States' Constitution which allowed freedom of speech", "-36.06241655037593" ], [ "or glory. We have a strong faith in the principle of self-government. We do not care to dominate alien peoples, white or colored; we do not aspire to be the Romans of tomorrow or the \"masters of the world.\" The idealism of Americans centers in the future of America, wherein we hope to work out those principles of liberty and democracy to which we are committed This political idealism, this strain of pacifism, this abstinence from aggression and desire to be left alone to work out our own destiny, has been manifest from the birth of the republic. We have", "-36.04033473266645" ], [ "on the founders of the United States. In the 1960s and 1970s, a revisionist school led by the likes of Bernard Bailyn began to argue that republicanism was just as or even more important than liberalism in the creation of the United States. This issue is still much disputed and scholars like Isaac Kramnick completely reject this view.", "-35.979477035485615" ], [ "thinkers and their schools of thought, we begin instead from America, the American political tradition in all its genius and profundity, and the relation of our tradition to revealed wisdom and to what the elderly Jefferson once called, rather insouciantly, \"the elementary books of public right, as Aristotle, Cicero, Locke, Sidney, etc.\" We think conservatism should take its bearings from the founders' statesmanship, our citizens' loyalty to the Declaration and Constitution, and the scenes, both tender and proud, of our national history. This kind of approach clears the air. It concentrates the mind. It engages and informs the ordinary citizen's", "-35.922065389000636" ], [ "to Americans like Beers who set their own self-interest aside to help others and successfully brought positive social change to the United States.", "-35.775754930196854" ], [ "the continent. This concept was born out of \"A sense of mission to redeem the Old World by high example ... generated by the potentialities of a new earth for building a new heaven\". The phrase \"Manifest Destiny\" meant many different things to many different people, and was rejected by many Americans. Howe argues that, \"American imperialism did not represent an American consensus; it provoked bitter dissent within the national polity.\"\nFaragher's analysis of the political polarization between the Democratic Party and the Whig Party is that:\nMost Democrats were wholehearted supporters of expansion, whereas many Whigs (especially in the North) were", "-35.64716356879944" ], [ "Way of Life\" (1960, 1974); historian Sidney Mead's \"religion of the Republic\" (1963); and British writer G. K. Chesterton, who said that the United States was \"the only nation ... founded on a creed\" and also coined the phrase \"a nation with a soul of a church\".\nIn the same period, several distinguished historians such as Yehoshua Arieli, Daniel Boorstin, and Ralph Gabriel \"assessed the religious dimension of 'nationalism', the 'American creed', 'cultural religion' and the 'democratic faith'\".\nPremier sociologist Seymour Lipset (1963) referred to \"Americanism\" and the \"American Creed\" to characterize a distinct set of values that Americans hold with a", "-35.55024889278502" ], [ "the ignorant, and the emancipation of the slavish part of mankind all over the earth\". Such understanding of Americanism was common thinking throughout the New World after the American Revolutionary War with expectations that the newly independent nation would become more than what Thomas Paine called \"an asylum for mankind\".\nDuring the antebellum period, throughout the 1830s, 1840s, and 1850s, Americanism acquired a restrictive political meaning due to nativist moral panics after increased Irish and German immigration led to the growth of American Catholicism. \nThe years from the end of the Civil War to the end of World War II brought", "-35.4987220276671" ], [ "and the 21st century. Both of these groups often rally behind Old Right slogans such as \"America First\" while sharing similar views to the Old Right opposition to the New Deal and involvement in The Second World War against Hitler, (including Old Right objections to economic programs and loans of naval equipment) to supply England, through the famous 'Blitz' of 1941 'Britain's Finest Hour', viewing such international involvement as likely to involve the US further. Recently, it has been suggested that some of the ideas of the Old Right have seen a resurgence in the 2008 presidential campaign of Ron", "-35.486676751082996" ], [ "all that they can. The fifth and final category is the importance of caring for oneself since only thus can one act to help others. Historiography Liberalism increasingly shaped American intellectual life in the 1930s and 1940s, thanks in large part to two major two-volume studies that were widely read by academics, advanced students, intellectuals and the general public, namely Charles A. Beard and Mary Beard's The Rise of American civilization (2 vol.; 1927) and Vernon L. Parrington's Main Currents in American Thought (2 vol.; 1927). The Beards exposed the material forces that shaped American history while Parrington focused on", "-35.482473719413974" ], [ "ideas on which American society is built, and the critics on the right who believe that only a return to 19th-century small government policies can save us.\"", "-35.376884085027996" ], [ "I saw it, and see it still.\nU.S. Senator Barack Obama also made reference to the topic in his commencement address on June 2, 2006 at the University of Massachusetts Boston:\nIt was right here, in the waters around us, where the American experiment began. As the earliest settlers arrived on the shores of Boston and Salem and Plymouth, they dreamed of building a City upon a Hill. And the world watched, waiting to see if this improbable idea called America would succeed.\nMore than half of you represent the very first member of your family to ever attend college. In the most", "-35.31525081388099" ], [ "generation of young Americans with an \"extreme disbalance in emotional and intellectual growth\". Kennan ended his book with a lament that the America of his youth not longer existed as he complained that most Americans were seduced by advertising into a consumerist lifestyle that left them indifferent to the environmental degradation all around them and to the gross corruption of their politicians. Kennan argued that he was the real radical as: \"They haven't seen anything yet. Not only do my apprehensions outclass theirs, but my ideas of what would have to be done to put things right are far more", "-35.29676781639864" ], [ "be promoted on certain topics, which either intentionally or unintentionally are not being addressed by the establishment\" . North America In the United States of America Techno-Populism has seen development in the past decade due to a backlash against the neo-conservatism and corporatist values presented by a large amount of political parties despite radical changes in economic and social issues. In particular the financial crisis of 2007–2008 led to a growth of resentment against the 1% by the 99%. In response to the Great Recession movements were formed to bring awareness to the growing economic issues ans the Occupy movement", "-35.236455652309814" ], [ "United States.\nRoger suggests that the idea of degeneracy posited a symbolic, as well as a scientific, America that would evolve beyond the original thesis. He argues that Buffon's ideas formed the root of a \"stratification of negative discourses\" that has recurred throughout the two countries' relationship (and has been matched by persistent Francophobia in the United States). Culture According to Brendan O'Connor, some Europeans criticized Americans for lacking \"taste, grace and civility,\" and having a brazen and arrogant character. British author Frances Trollope observed in her 1832 book Domestic Manners of the Americans, that the greatest difference between England and", "-35.17240831509844" ], [ ". . . [mimicking] the aspects of moral virtues.\" The original American Dream had always been about \"quality and spiritual values\": \"The American dream that has lured tens of millions of all nations to our shores in the past century has not been a dream of merely material plenty, although that has doubtless counted heavily. It has been much more than that.\" He warned that \"in our struggle to 'make a living'\" we were neglecting \"to live\". The Epic of America was his attempt save a \"priceless heritage\", and sustain the distinctly American understanding of progress in humane and moral", "-35.159610792374224" ], [ "to me, not because I think it can be proven. There are lots of people out there who think they know the truth about God and religion, but does anybody really know for sure? That's why the Founding Fathers built freedom of religious belief into the structure of this nation, so that everybody could make up their minds for themselves. But I do have a problem with the people who think they have some right to try to impose their beliefs on others. I hate what the fundamentalist fanatics are doing to our country. It seems as though, if everybody", "-35.08905112761386" ], [ "new meaning to the term \"Americanism\" to millions of immigrants coming from Europe and Asia. Those were times of great economic growth and industrialization, and thus brought forth the American scene consisting of \"industrial democracy\" and the thinking that the people are the government in America. Since then, the success of the American nation has brought tremendous power to the notion of Americanism.\nAccording to Wendy L. Wall in Inventing the \"American Way\", Americanism was presented by a national propaganda campaign to contrast with Communism and Fascism, during the Cold War. The benefits of Americanism were promoted through the ideals", "-35.07797939670127" ], [ "people, by the people, for the people; whose just powers are derived from the consent of the governed; a democracy in a republic; a sovereign Nation of many sovereign States; a perfect union, one and inseparable; established upon those principles of freedom, equality, justice, and humanity for which American patriots sacrificed their lives and fortunes. \nI therefore believe it is my duty to my country to love it, to support its Constitution, to obey its laws, to respect its flag, and to defend it against all enemies.\nPage once said:\nThe American's Creed is a summing up, in one hundred words, of", "-35.0754319751195" ], [ "anthology Our American Story (2019), Wood addressed the possibility of a shared American narrative. He focused on the idea of equality as \"the most radical and most powerful ideological force\" that the American Revolution unleashed. \"This powerful sense of equality is still alive and well in America, and despite all of its disturbing and unsettling consequences, it is what makes us one people.\" In popular culture Speaker of the House Newt Gingrich publicly and effusively praised Wood's The Radicalism of the American Revolution (1992), erroneously calling it The Founding of America. Wood, who met Gingrich once in 1994, surmised", "-35.0389874449902" ], [ "of other democracies, Americans really do expect their governments to be a force for good in the world.\"\nOren argues that with regard to the Arab-Israeli conflict, the American tendency to idealism has been reinforced by Christian feelings about the places in which all the major events of the Hebrew and Christian Bibles happened. Oren points out that the sympathy for Judaism felt by many American Christians is historically unique and goes back to the philo-Semitism of the Puritans, who were themselves influenced by 17th-century English Puritanism, which strongly identified with the Biblical Israelites.", "-35.024763685214566" ], [ "and family and less in prideful debate. In 2004, he was awarded the inaugural \"Phillip E. Johnson Award for Liberty and Truth\" by Biola University, a private evangelical Christian college noted for its promotion of intelligent design. Johnson has two children and lives with his wife in Berkeley, California.\nJohnson has stated in an interview that he believed \"the strength of America is not in its towers or in its battleships, it's in its faith. Of course, I said that, but I wasn't sure it was really true anymore. This isn't the same country we were in the previous decades.\"", "-34.975903508126066" ], [ " It launched the life of the churches and the nation in a momentous leap forward. It was a psychological earthquake that reshaped the religious, moral and social landscape of Colonial America for the next two centuries. Christians enjoying spiritual liberties started to crave political liberties as well. Religion and politics were so interwoven that the Christians started craving political freedom as well, thus leading the colonies into a revolution that shaped the foundation we would come to call The United States of America, one nation under God.\nKidd, Thomas S (2007). The Great Awakening: A Brief History w/ Documents.", "-34.939192475691414" ], [ "analysis. This grew out of the work of J. G. A. Pocock who in 1975 argued that a series of scholars had expressed a consistent set of republican ideals. These writers included Machiavelli, Milton, Montesquieu and the founders of the United States of America.\nPocock argued that this was an ideology with a history and principles distinct from liberalism. These ideas were embraced by a number of different writers, including Quentin Skinner, Philip Pettit and Cass Sunstein. These subsequent writers have further explored the history of the idea, and also outlined how a modern republic should function. United States A distinct", "-34.93838348954159" ], [ "Century can the world \"come to life in any nobility of health and vigor\".\nAccording to David Harvey, Luce believed \"the power conferred was global and universal rather than territorially specific, so Luce preferred to talk of an American century rather than an empire\". In the same article he called upon United States \"to exert upon the world the full impact of our influence, for such purposes as we see fit and by such means as we see fit\". Early characteristics Beginning at the end of the 19th century, with the Spanish–American War in 1898 and the Boxer Rebellion, the", "-34.91005042983306" ], [ "Luminaries, such as Copernicus and Harvey, were educated in Italy.\nAt the end of the eighteenth century, Italiophilia was not uncommon among the founders of the United States, and some of the creators of the U.S. Constitution, such as Thomas Jefferson and Benjamin Franklin, looked to Roman models upon which to base the American systems of government and law. The founding fathers were also interested in Renaissance political thinkers and humanists like Machiavelli, and how Italian republics functioned. Jefferson was among the most conspicuous of the early American Italophiles. He was especially impressed with Italian architecture, and based the design", "-34.872314004795044" ], [ "creative gift ideas and simplifying tips to help people prioritize connection and joy over stress, waste, and expense. History With its founding in 1997, the Center for a New American Dream sparked a new and unprecedented national conversation on materialism, living in balance, and the hidden costs of a high-consumption society. The organization’s focus on the intersections between consumption, environmental degradation, and quality of life have made it truly unique among environmental and social justice organizations.\nIn 2017, the Center for a New American Dream underwent a strategic restructuring and name change in order to streamline programs and better respond to", "-34.857412004879734" ], [ "through the lens of political events in world history. It is stated that they believe that the office of the United States President is the seat of the Antichrist. For example, in what is titled The Seed of Abraham, the group reports that Abraham Lincoln, the 16th President of the United States, was the archetypal Antichrist and helped build the “Babylonian nation that leads the entire world astray.” They see American patriotism as a “foolish” compromise to their Christian beliefs. Founder, Monte “Kim” Miller, proclaimed that he was “the Prophet of the Lord,” and that God spoke through his mouth.", "-34.845300059263536" ], [ "voluntary nature of religious association led Americans to take ownership of their own institutions and churches, helping create a democratic sense of responsibility for creating associations and community. These features of American culture, along with the First Amendment's separation of church and state, ensured that American religions could only survive by appealing to the common people. This democratized American Christianity, leading average Americans to shape religious movements themselves. In the post-Revolutionary period, all this led America in an increasingly pluralist and democratic direction.\nMicklethwait and Wooldridge argue that the religions growing around the world tend to exhibit these", "-34.82658706962684" ], [ "that science is bogus.\"\nIn 2017, a Pew Research Center poll revealed that a majority of American Republicans thought colleges and universities have a negative impact on the United States, and in 2019, academics Adam Waters and E.J. Dionne stated that U.S. President Donald Trump \"campaigned for the presidency and continues to govern as a man who is anti-intellectual, as well as anti-fact and anti-truth.\" An uneducated society About 25% of the U.S. population believes in a geocentric solar system (that the sun orbits the earth), and in 2014 35% of Americans could not name any branch of the U.S. government.", "-34.8110486801761" ], [ "was a growing political force in the United States and worldwide, that it had good ideas, and that politically uncommitted people should consider joining its ranks.\nCritics within the World Social Forum process had previously thought that it would not be possible to hold a significant social forum in the United States given its history of American Exceptionalism and because they thought that the United States, as the main imperialist power of its day, did not have large enough social movements to provide a grassroots base for a major social forum.\nBoston Social Forum organizers believe they proved their critics wrong, and", "-34.8081155881664" ], [ "within the political theory of American exceptionalism. American exceoptionalism, as defined by Jentleson, is a theory that holds that the United States possesses an inherent uniqueness and \"special virtue\" that is rooted in American principles and can be traced throughout American history. The idea that the United States is exceptional, or extraordinary, simply because it is the United States is a political philosophy that has been in existence for several decades and is a leading contributor to contemporary American political culture. (See Politics of the United States) Competing Views There are many other ideas as to the behaviors of", "-34.80164472418255" ], [ "whose ideals were highly influential during America's transformation in the early 20th century; Levine considered how Roosevelt willingly gave up office to fight during the Spanish–American War. On the other hand, the Vox Populi were based on historical factions that often splintered into small, independent groups that undertook violent actions, such as the Red Army Faction from the 1970s and the Animal Liberation Front and Earth Liberation Front of present day. During the course of the game's development period, the series of \"Occupy\" protests occurred across several cities; Levine, comparing these protests to other historical ones already incorporated into Columbia's", "-34.786941165613825" ], [ "Quebec.\nCanadian intellectuals who wrote about the U.S. in the first half of the 20th century identified America as the world center of modernity, and deplored it. Imperialists (who admired the British Empire) explained that Canadians had narrowly escaped American conquest with its rejection of tradition, its worship of \"progress\" and technology, and its mass culture; they explained that Canada was much better because of its commitment to orderly government and societal harmony. There were a few ardent defenders of the nation to the south, notably liberal and socialist intellectuals such as F. R. Scott and Jean-Charles Harvey (1891–1967).\nLooking at television,", "-34.77499817250646" ], [ "each other better through education and all forms of cultural and scientific exchanges, the passionate emphasis on truth, justice, peace and the importance of the individual – these impulses were irresistible.\"\nThese sentiments, which gave root to InSEA in 1954, are also guiding principles of USSEA. Art educator Kenneth Marantz was instrumental in establishing the United States organization and served as its first president. Other founding members who served as officers included Maryl Fletcher De Jong, Larry Kantner, Eugenia Oole, Helen Patton, and Tom Sletterhaugh. Sponsored Activities As a means of disseminating shared ideas about the importance of teaching art to", "-34.73710413007575" ], [ "moral growth; \"American greatness\" does not need to have militaristic connotations, instead it needs exceptionalism worth aspiring to.", "-34.72171870942111" ], [ "for secular education. Some such as John Harvard founded a university.\nIn The Quest for Cosmic Justice (2001), the economist Thomas Sowell said that anti-intellectualism in the U.S. began in the early Colonial era, as an understandable wariness of the educated upper-classes, because the country mostly was built by people who had fled political and religious persecution by the social system of the educated upper classes. Moreover, there were few intellectuals who possessed the practical hands-on skills required to survive in the New World of North America, which absence from society lead to a deep-rooted, populist suspicion of men and women", "-34.713963246111234" ], [ "of these are in jeopardy because of the religious right wing.\" \"Americans have to understand that there is a difference between one's personal view as to whether there is a supreme being--and what such a being requires of us--and what the law of the land should be.\"", "-34.712475163491035" ], [ "any thing, or every thing, in that country is not the very best in the world, produces an effect which must be seen and felt to be understood. If the citizens of the United States were indeed the devoted patriots they call themselves, they would surely not thus encrust themselves in the hard, dry, stubborn persuasion, that they are the first and best of the human race, that nothing is to be learnt, but what they are able to teach, and that nothing is worth having, which they do not possess. Style Trollope \"had no profundity of thought ... but", "-34.696856080699945" ], [ "our leaders were fools, our religious counselors were hypocrites, and even our parents were lying to us about damn near everything. An entire generation had William Gaines for a godfather: this same generation later went on to give us the sexual revolution, the environmental movement, the peace movement, greater freedom in artistic expression, and a host of other goodies. Coincidence? You be the judge.\nPulitzer Prize-winning art comics maven Art Spiegelman said, \"The message Mad had in general is, 'The media is lying to you, and we are part of the media.' It was basically ... 'Think for yourselves, kids.'\" William", "-34.68290163687925" ], [ "Who Are We? The Challenges to America's National Identity Describing American identity In describing the American identity, Huntington first contests the notion that the country is, as often repeated, \"a nation of immigrants\". He writes that America's founders were not immigrants, but settlers, since British settlers came to North America to establish a new society, as opposed to migrating from one existing society to another one as immigrants do. Later peoples who joined the culture present in the original British colonies, already established by these settlers, were indeed immigrants.\nMany people point to the American Creed as the core of American", "-34.6448165257716" ], [ "(1887), the reformer Edward Bellamy envisioned a future America set in the year 2000 in which a socialist paradise has been established. The works of authors such as George and Bellamy became popular, and soon clubs were created across America to discuss their ideas, although these organizations rarely made any real social change. Religion The Third Great Awakening which began before the Civil War returned and made a significant change in religious attitudes toward social progress. Followers of the new Awakening promoted the idea of the Social Gospel which gave rise to organizations such as the YMCA, the American branch", "-34.64435312508067" ], [ "the presidency of George W. Bush. While the book reckoned that America needed to reinvent a social contract and a global leadership, it also argued that the lasting hey-day of Liberalism since FDR had been followed by a Conservative cycle that was still running its course, as the later emergence of the Tea Party movement would show. However corroded, the post-Bush Conservative movement was still a powerful one in American politics. Reminding the reader of Arthur Schlesinger’s cycles of American history, the book analyzes the sources of America's various political currents and their legacies. In his foreword, former French Foreign", "-34.63840917995549" ], [ "of this culture; and its values and concepts were those with which we have grown familiar: a civic and patriot ideal in which the personality was founded on property, perfected in citizenship but perpetually threatened by corruption; government figuring paradoxically as the principal source of corruption and operating through such means as patronage, faction, standing armies (opposed to the ideal of the militia), established churches (opposed to the Puritan and deist modes of American religion) and the promotion of a monied interest—though the formulation of this last concept was somewhat hindered by the keen desire for readily available paper credit", "-34.632229479135276" ], [ "bear the image of the Maker of Heaven and earth. Across the generations we have proclaimed the imperative of self-government, because no one is fit to be a master, and no one deserves to be a slave. Advancing these ideals is the mission that created our Nation. It is the honorable achievement of our fathers. Now it is the urgent requirement of our nation's security, and the calling of our time. So it is the policy of the United States to seek and support the growth of democratic movements and institutions in every nation and culture, with the ultimate goal", "-34.598491636512335" ], [ "achievements of the newly created republic and interested in the needs and problems of its people and their efforts to solve them.\nThe civic values of freedom and democracy and the norms of coexistence related to rights and duties had a central place in the task of preparing future citizens as well as inculcating good manners and the appropriate habits required to live in society.\nThe strong ties with the Florida Methodist Church Conference, which partially supported both colleges, were evident in the influence of American culture and traditions in schools. The flag of the United States was present in all the", "-34.56967221369632" ], [ "citizens who were caught in a desperate predicament. It was an age in which American liberalism set the United States, through the New Deal, on a Democratic middle-of-the-road course between the contemporary extremisms of Europe, that of Communism on one hand, and of Fascism on the other. [...] The style of Main Currents was powered by Parrington's dedication to the cause of humane liberalism, by his ultimate humanistic, democratic faith. He saw the democratic dreams of the romantic first half of the 19th century as the climax of an epic story toward which early Americans moved and from which", "-34.54573159178108" ], [ "Lakoff claims that the public political arena in America reflects a basic conceptual metaphor of 'the family.' Accordingly, people understand political leaders in terms of 'strict father' and 'nurturant mother' roles. Two basic views of political economy arise from this desire to see the nation-state act 'more like a father' or 'more like a mother.' He further amplified these views in his latest book, The Political Mind.\nUrban theorist and ethicist Jane Jacobs made this distinction in less gender-driven if not wholly desexualizing terms by differentiating between a 'Guardian Ethic' and a 'Trader Ethic'. She states that", "-34.54133091928816" ], [ "subjects as humans as well as their causes. Personal elements may not be important to public life, but they are the kinds of things people want to know. In Hamilton's famous phrase, he was \"unfaithful to my wife, but not to my country.\" Historians always ask, What did they do for the public? Teaching teachers Maier won fellowships to write curriculum for college courses and high school teachers. She believed that the interest in American history was not tapped in the curriculum of many states. As a democratic country, the U.S. should give any student a background knowledge of what", "-34.50256020831148" ], [ "the standard liberalism philosophies of the western world than the other three freedoms (speech, fear, and religion); this freedom added economic liberty as a societal aspiration. In his essay, Bulosan treats negative liberties as positive liberties by suggesting that Americans be \"given equal opportunity to serve themselves and each other according to their needs and abilities\", an echo of Karl Marx's \"from each according to his abilities, to each according to his needs\". In the final paragraph of the essay, the phrase \"The America we hope to see is not merely a physical but also a spiritual and intellectual", "-34.48136701578915" ], [ "In 2000 Fogel published The Fourth Great Awakening and the Future of Egalitarianism in which he argued that America has been moving cyclically toward greater equality, largely because of the influence of religion, especially evangelicalism. Building on his work on the demise of slavery, he proposed that since evangelicalism was largely responsible for ending the institution he found to be economically profitable, that religion would continue to fuel America's moral development. Fogel diagrammed four \"Great Awakenings\", called (by others) \"The Fogel Paradigm.\" \"Fogel’s paradigm is drawn from what he believes are cycles of ethical challenges America has undergone provoked", "-34.477841367981455" ], [ "Every nation constructs and honors the memory of its founding, and following generations use it to establish its identity and define patriotism. \nThe memory of the Founding and the Revolution has long been used as a political weapon. For example, the right-wing \"Tea Party movement\" of the 21st century explicitly memorialized the Boston Tea Party as a protest against intrusive government. In the 1850s, editors and orators both North and South claimed their region was the true custodian of the legacy of 1776, as they used the Revolution symbolically in their rhetoric. David Ryan, noting that the Bicentennial", "-34.44808409615507" ], [ "unique, diverse and wondrous country, comprised both of those who know its magnificence as their birthright, and others, like me, who are privileged to call our adopted country 'our own.' What we all share is a desire for our families to enjoy America's boundless opportunities while extending to all our fellow citizens justice and the blessings and freedoms upon which the nation was founded.\nTo perpetuate the miracle that is America we must teach our children about its rich history as a nation of immigrants who chose this country and have given meaning to its ideals.\nCitizenship Counts will engage today's", "-34.412865713925385" ], [ "has led to a \"remarkable religiosity\" in the United States that isn't present in other industrialized nations. Wood believes that the U.S. operates on \"a sort of civic religion,\" which includes a generally shared belief in a creator who \"expects better of us.\" Beyond that, individuals are free to decide how they want to believe and fill in their own creeds and express their conscience. He calls this approach the \"genius of religious sentiment in the United States.\"", "-34.40770116659405" ], [ "but now so gloriously located in New York\" (p. 252).\nSchmaltz indulges in a discourse on the virtues of \"service and practicalness\" in America. As an example of opportunities for a practical person in early 20th century America, Schmaltz cites 1928 Democratic Presidential candidate Al Smith, saying: \"Take like Al Smith. Here is a poor boy of the city streets, and a Catholic, and yet we have permitted him to be Governor of New York. Naturally, I'm opposed to his being President, but I've been perfectly willing to see him rise as far as he has, and while he's almost certainly never", "-34.3936849201782" ], [ "America because the Church's founder, Braschi, has lived and worked among various Latin American peoples. While stopping short of pantheism or theological pluralism, the Church believes that \"essential truths\" are deposited by God in all sincere and life–affirming religions and cultures and that since human beings and their knowledge are, by nature, incomplete and flawed, it is nonsense to talk about superiority and inferiority or gradations of value and truth in comparative religion. All humans' belief systems, by virtue of being held by humans, must therefore be partially reflective of truth (of God) and partially reflective of limitations (of people).", "-34.38660375251493" ], [ "To promote their viewpoints, the two sides established academies and colleges, including Princeton and Williams College. The Great Awakening has been called the first truly American event.\nA similar pietistic revival movement took place among some German and Dutch settlers, leading to more divisions. By the 1770s, the Baptists were growing rapidly both in the north (where they founded Brown University) and in the South (where they challenged the previously unquestioned moral authority of the Anglican establishment). Delaware Valley and Mid-Atlantic region Unlike New England, the Mid-Atlantic region gained much of its population from new immigration and, by 1750, the combined", "-34.38349549051782" ], [ "country, its values and its way of life, but today we have realized that this wasn't such a terrible lack of good taste.\" Magdalena Środa, writing for Poland's Gazeta Wyborcza, said she envied Americans their Obama: \"I envy Americans their political engagement, which doesn't exhaust itself with the act of voting or posting election fliers. Americans debate, go door to door and travel to different states in order to convert others to their point of view. This is how a political culture is born and a capital of social trust is established, which, irrespective of who wins the election, remains", "-34.37953961259154" ], [ "Henry Harrison among others, as well as civilian leaders James Monroe, John Quincy Adams, and Henry Clay. Era of Good Feelings and the rise of Nationalism Following the War of 1812, America began to assert a newfound sense of nationalism. America began to rally around national heroes such as Andrew Jackson and patriotic feelings emerged in such works as Francis Scott Key's poem The Star-Spangled Banner. Under the direction of Chief Justice John Marshall, the Supreme Court issued a series of opinions reinforcing the role of the national government. These decisions included McCulloch v Maryland and Gibbons v Ogden; both", "-34.351222304743715" ], [ "its values and concepts were those with which we have grown familiar: a civic and patriot ideal in which the personality was founded in property, perfected in citizenship but perpetually threatened by corruption; government figuring paradoxically as the principal source of corruption and operating through such means as patronage, faction, standing armies (opposed to the ideal of the militia); established churches (opposed to the Puritan and deist modes of American religion); and the promotion of a monied interest – though the formulation of this last concept was somewhat hindered by the keen desire for readily available paper credit common in", "-34.282950414890365" ], [ "God is Back God is Back: How the Global Revival of Faith Is Changing the World is a 2009 book by John Micklethwait and Adrian Wooldridge which argues against the secularization thesis and claims that there is a global revival of faith has started in the late twentieth century.\nMicklethwait and Wooldridge provided a quick coverage of American history, in which they argue that American religion was dramatically transformed by the disestablishment of churches after the American Revolution. An emerging \"free market\" of religious choices led Americans to become increasingly pluralistic and tolerant of other forms of Christianity. The", "-34.23523734798073" ], [ "of the right, as the counterculture of the 1960s provoked fear of social disintegration. In addition, as the Democratic Party became identified with a pro-choice position on abortion and with nontraditional societal values, social conservatives joined the Republican Party in increasing numbers.\nIn 1976, U.S. President Jimmy Carter received the support of the Christian right largely because of his much-acclaimed religious conversion. However, Carter's spiritual transformation did not compensate for his liberal policies in the minds of Christian conservatives, as reflected in Jerry Falwell's criticism that \"Americans have literally stood by and watched as godless, spineless leaders have brought our nation", "-34.23434698032361" ], [ "in the cause, and the enthusiasm will spread; until, before long, the uplifted standard of the pansy, beneath the sheltering folds of the United States flag, shall everywhere thrill men's hearts as the symbol of religious liberty and freedom of conscience.\" Pre-modern movement Critical thought has flourished in the Hellenistic Mediterranean, in the repositories of knowledge and wisdom in Ireland and in the Iranian civilizations (for example in the era of Khayyam (1048–1131) and his unorthodox Sufi Rubaiyat poems), and in other civilizations, such as the Chinese (note for example the seafaring renaissance of the Southern Song dynasty of 420–479),", "-34.23232686836491" ], [ "phrase when he said \"that the nation shall, under God, have a new birth of freedom.\" Bowman repeated his revised version of the Pledge at other meetings.\nDuring the Cold War era, many Americans wanted to distinguish the United States from the state atheism promoted by Marxist-Leninist countries, a view that led to support for the words \"under God\" to be added to the Pledge of Allegiance.\nIn 1951, the Knights of Columbus, the world's largest Catholic fraternal service organization, also began including the words \"under God\" in the Pledge of Allegiance. In New York City, on April 30, 1951, the board", "-34.21499887586833" ], [ "The movement attracted a circle of outstanding writers, including William Cullen Bryant, George Bancroft, Herman Melville and Nathaniel Hawthorne. They sought independence from European standards of high culture and wanted to demonstrate the excellence and exceptionalism of America's own literary tradition.\nIn economic policy, Young America saw the necessity of a modern infrastructure with railroads, canals, telegraphs, turnpikes and harbors. They endorsed the \"market revolution\" and promoted capitalism. They called for Congressional land grants to the states, which allowed Democrats to claim that internal improvements were locally rather than federally sponsored. Young America claimed that modernization would perpetuate the agrarian vision", "-34.188130664078926" ], [ "the 2002 State of the Union address: “For too long our culture has said, ‘If it feels good, do it.’ Now America is embracing a new ethic and a new creed: ‘Let's roll.’”", "-34.179221006536864" ], [ "American nationalism History The United States traces its origins to the Thirteen Colonies founded by Britain in the 17th and early 18th century. Residents identified with Britain until the mid-18th century when the first sense of being \"American\" emerged. The Albany Plan proposed a union between the colonies in 1754. Although unsuccessful, it served as a reference for future discussions of independence.\nSoon afterward, the colonies faced several common grievances over acts passed by the British Parliament, including taxation without representation. Americans were in general agreement that only their own colonial legislatures—and not Parliament in London—could pass taxes. Parliament vigorously", "-34.144545773790014" ], [ "the declining belief in interpersonal ideals such as national pride and in religious ideals such as Christianity has led non-American Westerners to either substitute \"political religions\" such as communism and fascism into their lives or abandon having moral ideals altogether. This, in his opinion, weakens them against pressure from threats such as increasing immigration to Europe by Muslims that have higher birth rates than native Europeans. He has said, \"If all of their goods are material, right, what material good is worth dying for and what material good is worth killing for?\"\nThornton was a strong critic of the Obama administration.", "-34.1419145999389" ], [ "restrictions on who could be considered to be a true American. They identified closely with their country, which they felt \"very close\" to, and were proud of its achievements. Bonikowski and Dimaggio dubbed the group \"creedal\" because their beliefs most closely approximated the precepts of what is widely taken to be the American creed.\nAs part of their findings, the authors report that the connection between religious belief and national identity is a significant one. The belief that being a Christian is an important part of what it means to be a \"true American\" is the most significant factor", "-34.13077974300904" ], [ "located American values within the European Enlightenment. Ramsay had no brief for what later was known as American exceptionalism, holding that the destiny of the new nation United States would be congruent with European political and cultural development. Hildreth Richard Hildreth (1807–1865), a Yankee scholar and political writer, wrote a thorough highly precise history of the nation down to 1820. His six-volume History of the United States (1849–52) was dry and heavily factual—he rarely made a mistake in terms of names, dates, events and speeches. His Federalist views and dry style lost market share to George Bancroft's more exuberant and", "-34.11725997124449" ], [ "for the Supreme Court, homosexual rights, discrimination against religious schools, women in combat units—that's change, all right. But it is not the kind of change America needs. It is not the kind of change America wants. And it is not the kind of change we can abide in a nation we still call God's country.\nBuchanan also said, in reference to the then recently-held 1992 Democratic National Convention, \"Like many of you last month, I watched that giant masquerade ball at Madison Square Garden—where 20,000 radicals and liberals came dressed up as moderates and centrists—in the greatest single exhibition of", "-34.09364542053663" ], [ "form of propositionalism:\nThis abstract approach to assimilation derives, ultimately, from the conviction - as naive as it is chauvinistic - that America is an exceptional country, one not rooted in blood, soil, and kinship, but a nation “dedicated to the proposition that all men are created equal.” Proponents of this are quick to label the more old-fashioned view, that the nation is a metaphorical extended family, as bigotry, but no amount of repetition or rhetorical extravagance can disguise the dangerous logic that is at work. If I love my country because it is mine, I must be loyal to it,", "-34.081095317138534" ], [ "American Century, most famously the late gonzo journalist Hunter S. Thompson who titled his autobiography Kingdom of Fear: Loathsome Secrets of a Star Crossed Child in the Last Days of the American Century.\nWith the advent of the new millennium, critics from the University of Illinois stated that it was a matter of debate whether America was losing its superpower status, especially in relation to China's rise. Other analysts have made the case for the \"American Century\" fitting neatly between America's late entry into World War I in 1917 and the inauguration of its 45th President in 2017.\nOther scholars, such as", "-34.07878918737697" ], [ "of the past and now there were other areas that needed focus. \"Of all the triumphs that have marked this as America's Century –...none is more inspiring, if incomplete, than our pursuit of racial justice.\"\nIn the first half of the 20th century segregation was considered fair and normal. Due to changes made in American society and governmental policies the United States is past the traditional assumptions of race relations.\n\"Affirmative action is a national policy that concerns the way Americans feel about race, past discrimination, preferences, merit – and about themselves. This is why it is an American dilemma, and that", "-33.966484915159526" ], [ "That Used to Be Us Contents The authors write in support of what they view as the 'radical center'. They describe picking out ideas from both the left and right parts of the modern American political spectrum. They state, \"Americans will have to save more, consume less, study longer, and work harder than they have become accustomed to doing in recent decades\".\nIn terms of details, they advocate a variety of measures that may prove unpopular such as carefully planned tax increases. In general, they write that Americans must \"invest in education, infrastructure, and research and development, as well as open", "-33.96186853381005" ], [ "inevitably love the world more readily ... because the Word of God is free and active in the world.\" These conditions were, he felt, symptomatic of the twin errors of acculturated religious liberalism and authoritarian dogmatism, two options American Christians usually chose from in order to achieve the same goal: domesticating the Gospel and thus blunting its transformative impact on both individuals and the state. Instead of concerning himself with the US academic theological scene, Stringfellow sought an audience of law and business students, especially those who opted to embrace Christian beliefs and all the while fully involved themselves in the", "-33.95644013203855" ], [ "generation's commitment to its country and revolutionary ideals, and a younger generation's search for a new life in the United States – and the disenchantment both encounter.", "-33.92755475371814" ], [ "a vast sanctuary by millions of North Americans.\" She continues, \"Is this sanctuary really a recruitment camp for right-wing movements? It would be naive to think otherwise.\"\nThe Oxford Handbook of Religion and American Politics, referring to several studies, reports \"that 'born-again' identification is associated with lower support for government anti-poverty programs.\" It also notes that \"self-reported born-again\" Christianity, \"strongly shapes attitudes towards economic policy.\" Names inspired by the term The idea of \"rebirth in Christ\" has inspired some common European forenames: French René/Renée, Dutch Renaat/Renate, Italian, Spanish and Portuguese Renato/Renata, Latin Renatus/Renata, which all mean \"reborn\", \"born again\".", "-33.915247870085295" ], [ "trend did not come at the expense of the latter (it represented different fertility and retention rates, not switching), to the media and many ordinary observers those developments signaled the aggressive swelling of religious strength. Finally, it would be hard to find any other period of U.S. history that witnessed three leaders who captured the hearts and minds of millions of Americans as King, Graham, and John Paul did.\nThe \"mainstream\" Protestant churches contracted sharply in terms of membership and influence.\nAfter World War Two, some conservative Christian denominations (including the Southern Baptists, Missouri Synod Lutherans, the Church of God, Pentecostals, Holiness", "-33.90016514992749" ], [ "theme extensively developed in The Islamic Middle East [2002]) and to comparative research on egalitarianism and the validation of command in the United States (Is America Breaking Apart? [1999]). Extending this line of thought, another book (The Struggle for the World [2010]) compared modern utopian “aurora movements” ranging from the leftist Zapatistas and rightist supporters of Le Pen to New Age ravers and Slow Food activists. Despite their vast differences, all of these seek new, purified identities and have a polarized vision of the universe. Old contrasts between left and right are blurred and even erased", "-33.88782983562123" ], [ "Top\" and \"New Thought\" have inspired RS/SOM organizations and their teachings to evolve over the years. As stated in the book New Thought: A Practical American Spirituality, \"New Thought still is evolving; it may yet be the point at which religion, philosophy, and science come together as the most effective combination to move the world to greater peace, plenty, health, and harmony. Many believe it might be the quintessential spirituality for the next millennium.\" His teachings attracted famous celebrities of his time including Cecil B. DeMille, Peggy Lee, and Cary Grant. Organizations There are three major organizations", "-33.885193055433774" ] ]
1a9yj9
What's the deal with reddit's obsession with graphene?
[ "It's a new technology with a geometric make-up that has a specific effect on electricity and other things like water. Because it's such a low level technology its implications are vast. This is because it's quite generic to work with materials at such a small scale. The more generic something is the bigger impact it can have. Edit: [ELI5 Friendly]( URL_0 )", "It's amazing stuff. If we can figure out how to manufacture with it, the consequences will revolutionize materials in every industry. As I've heard Michio Kaku describe it, if you have a sheet thinner than a sheet of saran wrap, it would take the weight of an elephant standing on a tip of a pencil to puncture it. And its got all sorts of weird properties. Depending on how you grow your sheet, it might be the best conductor mankind has ever known, it might be a good insulator, it might have anti-bacterial properties, it might be flexible, it might be structural. I think I heard some are trying to use it to make solar panels, I think I've read some people are trying to make LEDs out of it. The ramifications are astounding. Stronger, lighter planes, trains, and automobiles. Thinner, smaller gadgets, greater fuel efficiencies, better energy efficiency making batteries last longer... I don't even know what they're planning for in the medical field, as I don't really keep up with medicine. And it's made of one of the most common elements in all the universe.", "It's made of very common stuff (graphite is everywhere!), is very strong and has lots of very interesting electrical properties that we don't fully understand yet. Just think of it a bit like silicon when transistors were first being developed - a common material that when treated the right way has a seemingly revolutionary property of acting like an extremely fast vacuum tube, so led to a complete revolution in computing and electronics.", "I'm not going to pretend to understand the science behind it but [this]( URL_0 ) article gives a pretty good overview of projects in progress that make use of Graphene and includes links to in depth articles if interested." ]
[ [ "electronic properties were unaffected. Prior approaches involved doping graphene with other substances. The dopant's presence negatively affected its electronic properties. Biological Researchers at the Graphene Research Centre at the National University of Singapore (NUS) discovered in 2011 the amazing ability of graphene to accelerate the osteogenic differentiation of human Mesenchymal Stem Cells without the use of biochemical inducers.\nIn 2015 researchers used graphene to create sensitive biosensors by using epitaxial graphene on silicon carbide. The sensors bind to the 8-hydroxydeoxyguanosine (8-OHdG) and is capable of selective binding with antibodies. The presence of 8-OHdG in blood, urine and saliva is commonly associated", "-32.46668137423694" ], [ "as a first of both a street-legal track car and a production car. Health risks The toxicity of graphene has been extensively debated in the literature. The most comprehensive review on graphene toxicity published by Lalwani et al. exclusively summarizes the in vitro, in vivo, antimicrobial and environmental effects and highlights the various mechanisms of graphene toxicity.\nResults show that the toxicity of graphene is dependent on several factors such as shape, size, purity, post-production processing steps, oxidative state, functional groups, dispersion state, synthesis methods, route and dose of administration, and exposure times.\nResearch at Stony Brook University showed that graphene nanoribbons,", "-30.654880196212616" ], [ "Graphnet Graphnet is a UK provider of healthcare software based in Milton Keynes, Buckinghamshire. The company was founded in 1994. It specialises in shared care records and claims to be \"the UK’s leading supplier of shared care record software to the NHS and care services\". \nIt is not connected to Graphnet, Inc., based in the USA.\nGraphnet’s principal product is CareCentric, a software suite that provides large scale data integration and a single data-viewer for patient/citizen information drawn from a range of care settings that can include acute care, primary care, social care, community care, child health, and mental health.", "-30.48116401984589" ], [ "knowledge about the writing system’s rendering. This makes Graphite especially suited for minority writing systems that cannot rely on applications to provide built-in rendering information. In this regard, Graphite is similar to AAT and different from OpenType which requires applications to provide built-in rendering information. Graphite support Graphite was originally implemented on Windows. It has been ported to Linux. It is also available on Mac OS X Snow Leopard although with AAT, Mac already provides a technology suitable for minority scripts.\nApplications that support Graphite include the SIL WorldPad, XeTeX, OpenOffice.org (since version 3.2, except for the macOS version), LibreOffice (formerly", "-30.010205519676674" ], [ "GraphCrunch GraphCrunch is a comprehensive, parallelizable, and easily extendible open source software tool for analyzing and modeling large biological networks (or graphs); it compares real-world networks against a series of random graph models with respect to a multitude of local and global network properties. It is available at http://bio-nets.doc.ic.ac.uk/graphcrunch2/. Motivation Recent technological advances in experimental biology have yielded large amounts of biological network data. Many other real-world phenomena have also been described in terms of large networks (also called graphs), such as various types of social and technological networks. Thus, understanding these complex phenomena has become an important scientific problem", "-29.529605675983476" ], [ "Novoselov for their graphene related experiments, Petrik claimed that he was the first person to describe how to produce graphene and deserved a share of the prize. Novoselov disputed Petrik's claim.\nIn 2010 Petrik sued two Russian newspapers for defamation after articles they ran about him. He won a judgment against them in which they were ordered to run a retraction and pay damages to him. The settlement awarded him significantly less than he had sought, however. The papers have since insisted that their reports were accurate. Patents The United States Patent and Trademark Office has issued two patents to Viktor", "-29.131765294308934" ], [ "Critics argued that this rendered results allegedly based on other users’ opinions meaningless. Open Graph The Open Graph feature allows developers to integrate their applications and pages into the Facebook platform, and links Facebook with external sites on the Internet. The feature operates by allowing the addition of metadata to turn websites into graph objects. Actions made using the app are expressed on users’ profile pages. Privacy Initial reactions to the launch of Graph Search included many concerns about privacy. The social media analytics company Crimson Hexagon reported that 19 percent of users discussing the launch of the feature were", "-28.440272654173896" ], [ "with DNA damage. Elevated levels of 8-OHdG have been linked to increased risk of developing several cancers.\nThe Cambridge Graphene Centre and the University of Trieste in Italy conducted a collaborative research on use of Graphene as electrodes to interact with brain neurons. The research was recently published in the journal of ACS Nano.\nThe research revealed that uncoated Graphene can be used as neuro-interface electrode without altering or damaging the neural functions such as signal loss or formation of scar tissue. Graphene electrodes in body stay significantly more stable than modern day electrodes (of tungsten or silicon) because of its unique", "-28.357469169422984" ], [ "OCSiAl Technology The synthesis technology used by OCSiAl for graphene nanotubes (also known as single wall carbon nanotubes – SWCNT) is based on research by one of the company's founders, Mikhail Predtechensky, OCSiAl's Chief Technology Officer and a member of the Russian Academy of Sciences. The technology is notable for producing SWCNT in tonnes to enable low enough pricing for industrial applications to become economically feasible.\nThe company's initial synthesis facility, named Graphetron 1.0, was built at the company's scientific and prototyping center in Akademgorodok, Novosibirsk. In 2014 output was estimated at 1 tonne, with a capacity of 10 tonnes. In", "-28.17780311043316" ], [ "Grapher History Before Grapher and Mac OS X, Mac OS 9 was bundled with Pacific Tech's Graphing Calculator, a similar program to Grapher that had been included with over 20 million Macintoshes since 1994 with System 7. No versions of Mac OS X prior to Mac OS X v10.4 included a bundled graphing calculator application. On July 22, 2004, Apple bought Arizona Software's \"Curvus Pro X,\" and renamed it “Graphing Calculator”, before deciding on “Grapher”. The news was publicly announced on September 15, 2004 at AppleInsider.\nVersion 2.0 of Grapher was bundled with Mac OS X v10.5, and version 2.1 with", "-27.923294272550265" ], [ "2013, and an 18th in 2015. Software SIL has developed widely used software for linguistic research. Adapt It is a tool for translating text from one language into a related language after performing limited linguistic analysis. In the field of lexicon collection, ShoeBox, the newer ToolBox (Field Linguist's Toolbox), and Lexique Pro have largely been replaced by FieldWorks Language Explorer (FLEx Windows and Linux) for linguists and WeSay (also Windows and Linux) for non-professionals. Graphite is a smart-font technology and rendering system. Recognitions The 1947 Summer Meeting of the Linguistic Society of America passed a resolution that the work of", "-27.745181615347974" ], [ "special graphite as the cathode.\nThe main feature of LiMPO\n₄ from Phostech is increased capacitance and conductivity by an appropriate carbon coating. The special feature of LiFePO\n₄ • zM from Aleees a high capacitance and low impedance obtained by the stable control of the ferrites and crystal growth. This improved control is realized by applying strong mechanical stirring forces to the precursors in high oversaturation states, which induces crystallization of the metal oxides and LFP.\nIn patent lawsuits in the US in 2005 and 2006, the University of Texas at Austin|University of Texas-Austin and Hydro-Québec claimed that LiFePO\n₄ as the cathode infringed", "-27.73596196086146" ], [ "Nobel Prize–winning work on Graphene by Andre Geim and Konstantin Novoselov was undertaken. The group is led by Professor Thomas Thomson, academic staff members include Professor Jim Miles, Ernie W Hill, Milan Mihajlovic and Paul W Nutter. Software Systems The Software Systems group is concerned with the design, modelling, simulation and construction of mission-critical systems that challenge the states-of-the-art in both software engineering and performance engineering. Such systems are fundamentally composed of physically distributed component sub-systems, and are characterised by large data spaces and high compute needs, with associated complex interactions between the components. The group is led by Professor", "-27.461684795329347" ], [ "Graph is a knowledge base used by Google to enhance its search engine's results with information gathered from a variety of sources. This information is presented to users in a box to the right of search results. Knowledge Graph boxes were added to Google's search engine in May 2012, starting in the United States, with international expansion by the end of the year. The information covered by the Knowledge Graph grew significantly after launch, tripling its original size within seven months, and being able to answer \"roughly one-third\" of the 100 billion monthly searches Google processed in May 2016. The", "-27.33811627002433" ], [ "of matching ads to users and contexts. At Yahoo, Broder also helped build Yahoo! Research into one of the leading Web research organizations. In 2012, Broder joined Google as a distinguished scientist, where he switched focus to another aspect of the WWW experience, large-scale personalization. Contributions In 1989, he discovered (independently from David Aldous) an algorithm for generating a uniform spanning tree of a given graph.\nOver the last fifteen years, Broder pioneered several algorithms systems and concepts fundamental to the science and technology of the WWW. Some of the highlights include: In 1997, Broder led the development of the first", "-27.21232709301694" ], [ "concept and name for their \"Open Graph\" project and protocol, which is their effort to spread their approach to social networking beyond the bounds of the Facebook website, allowing a broader network or \"graph\" of connections between Facebook users, and between Facebook users and the Internet data objects which interest them.", "-27.075156769598834" ], [ "graphene nanoplatelets and graphene nano–onions are non-toxic at concentrations up to 50 µg/ml. These nanoparticles do not alter the differentiation of human bone marrow stem cells towards osteoblasts (bone) or adipocytes (fat) suggesting that at low doses graphene nanoparticles are safe for biomedical applications. Research at Brown university found that 10 µm few-layered graphene flakes are able to pierce cell membranes in solution. They were observed to enter initially via sharp and jagged points, allowing graphene to be internalized in the cell. The physiological effects of this remain uncertain, and this remains a relatively unexplored field.", "-27.04513399604184" ], [ "one of Loompanics' best sellers. The book has information on how to produce crystal methamphetamine through six different methods. It also has data on how to synthesize MDMA or MDA, and how to synthesize methcathinone by oxidation of ephedrine. It also contains syntheses for precursor materials such as phenylacetone, ephedrine, methylamine, and alkyl nitrites. Previous editions of Secrets of Methamphetamine Manufacture have had some criticism: see for example Eleusis v. Fester for discussion between Fester and the past MDMA clandestine chemist Eleusis/Zwitterion. Documentary Preisler was the object of the 40-minute documentary film \"Friction\", by Robert Ellman, made at a cost", "-26.868047455558553" ], [ "METLIN Constantly Evolving Since its initial implementation in 2005, the freely available METLIN website has collected comments and suggestions for improvements from users in the biotechnology, pharmaceutical and academic communities ultimately resulting in a dynamic, intuitive, and functionally useful metabolomics and chemical identification technology. The improved interface allows researchers to readily search the database and characterize metabolites and other compounds through features such as accurate mass, single and multiple fragment searching, neutral loss and full spectrum search capabilities. The powerful similarity searching is a feature introduced in 2010. These features are designed to facilitate the value of their metabolomics MS", "-26.855197753291577" ], [ "Cytrel Cytrel is a cellulose-based tobacco substitute used in some low-tar cigarette brands. It formerly constituted 25% of Silk Cut cigarettes.\nDevelopment began on a replacement for tobacco in cigarettes in the 1950s, to reduce undesirable tobacco smoke components present in cigarettes. Cytrel was developed by Celanese Fiber Marketing Company.\nThe fiber went through a difficult development, with scientists struggling to achieve acceptable smoking, taste, and manufacturing properties. However, the product was of a lower density than tobacco and useful as a bulking agent so development continued. After five revisions the Celanese Fiber Marketing Company released Type 308 to the market.\nIt was", "-26.775842415867373" ], [ "youths, and explores the digital intimacy that comes with new social networking technology, seeing it less as harm than something that fosters open communication.\nxoxosms was produced by Cinereach and premiered on PBS POV in July 2013. It was also featured on the BBC Radio 4 Digital Human series. \"Circle of 6\" (2012) Circle of 6 is a free anti-violence smartphone app. It won the 2011 White House Apps Against Abuse Contest, with Vice President Joe Biden calling it \"a new line of defense against violence\" for young people. The app has more than 300,000 users in 36 countries.", "-26.718496721383417" ], [ "Phosphorene History In the 1960s black phosphorus, a layered semiconducting allotrope of phosphorus, was synthesized, which exhibited high carrier mobility. In 2014, several groups introduced single-layer phosphorene, a monolayer of black phosphorus. It attracted renewed attention because of its potential in optoelectronics and electronics due to its band gap, which can be tuned via modifying its thickness, anisotropic photoelectronic properties and high carrier mobility. Phosphorene was initially prepared using mechanical cleavage, a commonly used technique in graphene production that is difficult to scale up. Liquid exfoliation is a promising method for scalable phosphorene production. Synthesis Synthesis of phosphorene is a", "-26.598544414620847" ], [ "synthesis of methasterone is first mentioned in the literature in 1956 in connection with research conducted by Syntex Corporation in order to discover a compound with anti-tumor properties. In a 1959 research journal article, it is initially mentioned and is elaborated upon where its method of synthesis is discussed in greater detail, its tumor inhibiting properties are verified, and it is noted as being a “potent orally active anabolic agent exhibiting only weak androgenic activity.” The results of subsequent assays to determine methasterone’s anabolic and androgenic activity were published in Vida’s Androgens and Anabolic Agents, a dated but still standard", "-26.47775191470282" ], [ "graphite, carbon nanotubes, and nanodiamonds into CQDs using laser ablation, arc discharge, and electrochemical techniques. For example, Zhou et al. first applied electrochemical method into synthesis of CQDs. They grew multi-walled carbon nanotubes on a carbon paper, then they inserted the carbon paper into an electrochemical cell containing supporting electrolyte including degassed acetonitrile and 0.1 M tetrabutyl ammonium perchlorate. Later, they applied this method in cutting CNTs or assembling CNTs into functional patterns which demonstrated the versatile callability of this method in carbon nanostructure manipulations.\n\"Bottom-up\" synthetic route involves synthesizing CQDs from small precursors such as carbohydrates, citrate, and polymer-silica nanocomposites", "-26.376204741420224" ], [ "Review, a software technical review website, these tailored features add more value that put Cốc Cốc on the map and differentiate Cốc Cốc from other Chromium-based browsers. History The first version of the browser was presented under the brandname Cờ Rôm+ on 4 December 2012 (Cờ Rôm is basically the Vietnamese pronunciation of Chrome). At that time, the interface of Cốc Cốc was similar to that of Google Chrome, but the browser had already integrated two features: the ability to download files to multiple streams and storage of media content\nThe browser was officially submitted five months later 14 May 2013.", "-26.285698761610547" ], [ "hockey stick graph, and in 2003 he became interested in the IPCC process which had featured the graph prominently. With a background in mineral exploration, including the oil and gas exploration company CGX Energy, he felt that he had the mathematical expertise and experience to independently audit the graph. McIntyre downloaded datasets for MBH99 from a ftp server, but could not locate the ftp site for MBH98 datasets and on 8 April wrote to Mann to request this information. Following email exchanges, Mann's assistant sent the information as text files around 23 April 2003.\nMcIntyre then made a series of comments", "-26.211292584077455" ], [ "Berners-Lee's invention of the World Wide Web, but he dislikes the World Wide Web, XML and all embedded markup – regarding Berners-Lee's work as a gross over-simplification of his original vision: \nHTML is precisely what we were trying to PREVENT— ever-breaking links, links going outward only, quotes you can't follow to their origins, no version management, no rights management.\nJaron Lanier explains the difference between the World Wide Web and Nelson's vision, and the implications: \nA core technical difference between a Nelsonian network and what we have become familiar with online is that [Nelson's] network links were two-way instead of one-way.", "-26.11353237880394" ], [ "with heterocyclic dienophiles such as 3-sulfolene to the corresponding Diels-Alder adduct. Molecular building block for polyaromatics Polyaromatic hydrocarbons (PAHs) are of great interest as precursors to graphite, but especially as environmental pollutants with pronounced persistence and carcinogenicity. 1,3-diphenylisobenzofuran reacts quantitatively with acenaphthylene when heated to 160 °C to give 7,12-diphenylbenzo[k]fluoranthene.\nThe twice occurring Diels-Alder reaction of 1,3-diphenylisobenzofuran with p-benzoquinone yields virtually quantitative a product that can be reacted further with p-toluenesulfonic acid to give a pentacene derivative in 49% yield.", "-25.925245424034074" ], [ "data on hübnerite itself. The primary formula of the wolframite series is (Fe,Mn)WO₄. The domination of either iron or manganese would result in forming one of two minerals. The iron dominated one will result in forming ferberite while the manganese dominated one will result in forming hübnerite. Hübnerite is rarer than ferberite due to the difficulty of iron and manganese substitution. There is also a magnesium substitution involved to form an MgWO₄. This magnesium rich usually referred to as wolframite but it is not a mineral it is a crystal scintillator. Structure As hübnerite is a rare endmember of the", "-25.8282805439012" ], [ "Graphitic carbon nitride Graphitic carbon nitride (g-C₃N₄) is a family of carbon nitride compounds with a general formula near to C₃N₄ (albeit typically with non-zero amounts of Hydrogen) and two major substructures based on heptazine and Poly(Triazine imide) units which, depending on reaction conditions, exhibit different degrees of condensation, properties and reactivities. Preparation Graphitic carbon nitride can be made by polymerization of cyanamide, dicyandiamide or melamine. The firstly formed polymeric C₃N₄ structure, melon, with pendant amino groups, is a highly ordered polymer. Further reaction leads to more condensed and less defective C₃N₄ species, based on tri-s-triazine (C₆N₇) units as elementary", "-25.808790347306058" ], [ "November 1990, wrote the world's second web browser.\nSilicone was discovered in 1899 by Prof Frederic Kipping at University College, Nottingham. Michael Creeth of Northampton discovered the hydrogen-bonding mechanism between DNA bases, allowing the structure of DNA to be discovered. Nottinghamshire's Ken Richardson was in charge of the team at Pfizer in Sandwich, Kent that in 1981 discovered Fluconazole (Diflucan), the world's leading antifungal medication, especially useful for those with weakened immune systems. It has few side effects. Richardson is now one of the few Britons in the National Inventors Hall of Fame. Don Grierson at the University of Nottingham was", "-25.808329213992693" ], [ "Web Coherence Overview The purpose of Web Coherence is to improve user interaction with the Internet by studying various phenomenon and publishing Internet usage best practices, articles, and user stories to its members. Web Coherence supports its members in carrying out experiments, in the expectation their participation will lead to a better understanding by the e-community of its relationship with the Internet. They also promote student and researcher activities by providing them the platform and necessary infrastructure to carry out their experiments. Their findings are published to the general web audience and suggests Internet usage best practices.\nThe organisation follows a", "-25.80772457033163" ], [ "Methbot Methbot was an advertising fraud scheme. History Methbot was first tracked in 2015 by cybersecurity firm White Ops, and the botnet saw rapidly increased activity in 2016. The botnet originated in Russia (though it was not state sponsored), and utilized foreign computers and networks in Europe and North America. The infrastructure consisted of 571,904 dedicated IPs, 6,000 domains, and 250,267 distinct URLs, each of which could only house a video ad, and used variants of the names of famous publishers to fool those looking into the domains. This led the operators to game the system, leading ad selection algorithms", "-25.785322112496942" ], [ "Catenet Catenet is an obsolete term for a system of packet-switched communication networks interconnected via gateways.\nThe term was coined by Louis Pouzin, a pioneer in packet-switching technology and founder of the CYCLADES network, at a time when network meant what is now called a local area network. Catenet was the concept of linking these networks into a network of networks with specifications for compatibility of addressing and routing. The term catenet was gradually displaced by the short-form of the term internetwork, internet (lower-case i), when the Internet Protocol replaced earlier protocols on the ARPANET.", "-25.751137948362157" ], [ "the erroneous conclusion that acne was a defining characteristic of XYY males. After learning that convicted mass murderer Richard Speck had been karyotyped, Telfer not only incorrectly assumed the acne-scarred Speck was XYY, but reached the false conclusion that Speck was the archetypical XYY male—or \"supermale\" as Telfer referred to XYY males outside of peer-reviewed scientific journals.\nIn April 1968, The New York Times—using Telfer as a main source—introduced the XYY genetic condition to the general public in a three-part series on consecutive days that began with a Sunday front-page story about the planned use of the condition as a mitigating", "-25.745765279396437" ], [ "of the chiastolite cross, however the most widely accepted theory, proposed by Frondel in 1934, suggests that there is a selective attachment of impurities at the rapidly growing corners of andalusite crystals. As the concentration of these impurities (which consist primarily of graphite) increases, the growth of the crystal is slowed. This concentrated impurity deposit forms a re-entrant as it is absorbed by the growth of the andalusite porphyroblast. The cycle of growth-retardation-growth then repeats itself, creating a featherlike pattern of graphite along four radiating 'arms'.", "-25.698682717978954" ], [ "next generation, and became a backbone member of it in November. CERNET is the first in China that interconnects with Internet2, the next generation of Internet, providing its users with an easy access to Internet2.\nCERNET is an important cultivation base for information and network professionals in China. For example, in the study program for computer information network and its application in the \"State Key Sci-tech Breakthrough Project during Ninth Five-Year Plan Period\", researchers from CERNET and other partner organizations published more than one hundred academic papers both at home and abroad, representing a significant achievement in IT competence fostering.\nFurthermore, CERNET", "-25.69845346058719" ], [ "Linked: The New Science of Networks Synopsis The main purpose of Linked is to introduce the science of networks to the general audience. It provides an easy and readable introduction to the main models and properties of networks and their applications in many areas of real life, such as the spread of epidemics, fighting against terrorism, handling economic crises or solving social problems of the society. As the subtitle of the book says Linked reveals 'How Everything is Connected to Everything Else and What It Means for Business, Science, and Everyday Life'.\nAs Barabási writes in the Introduction, Linked", "-25.674345810126397" ], [ "no means clear that chromium is an essential element in human biology. Nevertheless, chromium is an ingredient in total parenteral nutrition, along with other trace minerals. It is also in nutritional products for preterm infants. Many chromium-containing products, including chromium chloride, chromium citrate, chromium(III) picolinate, chromium(III) polynicotinate are sold as non-prescription dietary supplements. Government-approved health claims In 2005, the U.S. Food and Drug Administration approved a Qualified Health Claim for chromium picolinate with a requirement for very specific label wording: \"One small study suggests that chromium picolinate may reduce the risk of insulin resistance, and therefore possibly may reduce the", "-25.656679719453678" ], [ "new standards defined by the W3C. Incompatible versions of HTML are offered by different vendors, causing inconsistency in how web pages are displayed. The consortium tries to get all those vendors to implement a set of core principles and components which are chosen by the consortium.\nIt was originally intended that CERN host the European branch of W3C; however, CERN wished to focus on particle physics, not information technology. In April 1995, the French Institute for Research in Computer Science and Automation (INRIA) became the European host of W3C, with Keio University Research Institute at SFC (KRIS) becoming the Asian host", "-25.605054034036584" ], [ "as individual movement and gene flow. Graphab Graphab is a software application devoted to the modelling of landscape networks. It is composed of four main modules: graph building, including loading the initial landscape data and identification of the patches and the links; computation of the connectivity metrics from the graph; connection between the graph and exogenous point data set; visual and cartographical interface.\nGraphab runs on any computer supporting Java 1.6 or later (PC under Linux, Windows, Mac...). It is distributed free of charge for non-commercial use.", "-25.43225443433039" ], [ "energy gap decreases, when the number of graphene layers or the number of carbon atoms per graphene layer is increased. Health and Safety The toxicity of graphene-family nanoparticles is a matter of ongoing research. Many authors claim, that GQDs are biocompatible and cause only low toxicity as they are just composed of organic materials, which should lead to an advantage over semiconductor quantum dots. Several in vitro studies, based on cell cultures, show only marginal effects of GQDs on the viability of human cells. An in-depth look at the gene expression changes caused by GQDs with a size of 3 nm", "-25.366672820178792" ], [ "Graphing calculator History An early \"graphical calculator\" was designed and patented by electrical engineer, Edith Clarke, in 1925. The calculator was used to solve problems with electrical power line transmission.\nCasio produced the first commercially available graphing calculator, the fx-7000G, in 1985. Casio's innovations include an icon menu for easy access to functions (1994, FX-7700GE and later), graphing in several colors (1995, CFX-9800G), textbook-like \"Natural Display\" input and output (2004, FX-82ES/300ES & FX-9860G), expandable memory (2005, FX-9860SD), backlit screen (2006, FX-9860G Slim), full-color, high resolution backlit screen (2010, FX-CG10/CG20 PRIZM).\nSharp produced its first graphing calculator, the EL-5200, in 1986. Since then", "-25.288027774135116" ], [ "Arachne (web browser) Background Arachne supports many file formats, protocols and standards including video modes from CGA 640×200 in monochrome to VESA 1024×768 in high color mode (65536 colors). It is designed for systems that do not have any windowing systems installed.\nArachne supports multiple image formats including JPEG, PNG, BMP and animated GIF. It supports a subset of the HTML 4.0 and CSS 1.0 standards, including full support for tables and frames. Supported protocols include FTP, NNTP for USENET forums, POP3, SMTP and Gopher. Arachne includes a full-fledged TCP/IP connection suite, which has support for some dial-up and Ethernet connections.", "-25.252014084137045" ], [ "user's network of friends. Additional results were provided by Microsoft's Bing search engine. In July it was made available to all users using the U.S. English version of Facebook. After being made less publicly visible starting December 2014, the original Graph Search was almost entirely deprecated in June 2019. Initial development The feature was developed under former Google employees Lars Rasmussen and Tom Stocky.\nThe Graph Search Features was launched in Beta January 2013 as a limited preview for some English users in the United States. Company reports indicate that the service launched to between tens and hundreds of thousands", "-25.239545175805688" ], [ "Parylene Parylene is the trade name for a variety of chemical vapor deposited poly(p-xylylene) polymers used as moisture and dielectric barriers. Among them, Parylene C is the most popular due to its combination of barrier properties, cost, and other processing advantages.\nParylene is green polymer chemistry. It is self-initiated (no initiator needed) and un-terminated (no termination group needed) with no solvent or catalyst required. The commonly used precursor, [2.2]paracyclophane, yields 100% monomer above 550 °C in vacuum and does not yield any by-products (Gorham Process). There is very little concern that parylene N will be 'over-cracked', meaning [2.2]paracyclophane is converted to", "-25.206208541072556" ], [ "develop graphene and other solid state materials to achieve this whole genome sequencing. He died on November 13, 2018.", "-25.204784306697547" ], [ "graph, provide a means of further personalizing the web based on intersecting the interest graphs with web content.\nInterest graphs or interest networks can in some cases be derived from social graphs or social networks and may maintain their context within that social network. These are specifically social interest graphs or interest-based social graphs.\nFor an interest graph to be accurate and expressive, it needs to take into account explicitly declared interests, for example \"Likes\" on Facebook or “Interests” in a LinkedIn profile, as well as implicit interest inferred from user activities such as clicks, comments, [tagged] photos and check-ins. Social networks", "-25.16948842292186" ], [ "Glyoxal Applications Coated paper and textile finishes use large amounts of glyoxal as a crosslinker for starch-based formulations. It condenses with urea to afford 4,5-dihydroxy-2-imidazolidinone, which further reacts with formaldehyde to give the bis(hydroxymethyl) derivative dimethylol ethylene urea, which is used for wrinkle-resistant chemical treatments of clothing, i.e. permanent press.\nGlyoxal is used as a solubilizer and cross-linking agent in polymer chemistry.\nGlyoxal is a valuable building block in organic synthesis, especially in the synthesis of heterocycles such as imidazoles. A convenient form of the reagent for use in the laboratory is its bis(hemiacetal) with ethylene glycol, 1,4-dioxane-2,3-diol. This compound is commercially", "-25.115153241320513" ], [ "Hexene Hexene is an alkene with a molecular formula C₆H₁₂. The prefix \"hex\" is derived from the fact that there are 6 carbon atoms in the molecule, while the \"-ene\" suffix denotes that there is an alkene present—two carbon atoms are connected via a double bond. There are several isomers of hexene, depending on the position and geometry of the double bond in the chain. One of the most common industrially useful isomers is 1-hexene, an alpha-olefin. Hexene is used as a comonomer in the production of polyethylene.", "-25.06714722304605" ], [ "Compatible Partners Criticism over claims A 2012 analysis of dating websites by Scientific American stated that algorithm-based dating sites, had not yet provided members of the scientific community with information about their matching algorithm which could be used to vet their claims about their algorithms being scientifically-based.\nIn 2014, eHarmony was criticized by the National Advertising Division of the Better Business Bureau over claims the company had made about their rates of success.\nIn 2018, the Advertising Standards Authority stated that an eHarmony ad which included the lines, \"It's time science had a go at love,\" and \"Imagine being able to stack", "-25.05857131324592" ], [ "called Structured Streaming, that has a higher-level interface is also provided to support streaming. GraphX GraphX is a distributed graph-processing framework on top of Apache Spark. Because it is based on RDDs, which are immutable, graphs are immutable and thus GraphX is unsuitable for graphs that need to be updated, let alone in a transactional manner like a graph database. GraphX provides two separate APIs for implementation of massively parallel algorithms (such as PageRank): a Pregel abstraction, and a more general MapReduce-style API. Unlike its predecessor Bagel, which was formally deprecated in Spark 1.6, GraphX has full support for property", "-25.023750282940455" ], [ "nanoscale and molecular systems to addressing problems in cancer and infectious diseases.\nWhen Heath was a graduate student at Rice University, he ran the experimental apparatus that generated the first C₆₀ molecules and, ultimately, won the Nobel Prize in Chemistry for the three senior members of the collaboration: Robert F. Curl and Richard E. Smalley of Rice University and Harold Kroto of the University of Sussex. This research is significant for the discovery of a new allotrope of carbon known as a fullerene. Other allotropes of carbon include graphite, diamond and graphene. James R. Heath's 1985 paper entitled \"C60: ", "-25.023415745905368" ], [ "Neohexene (3,3-dimethyl-1-butene): an important intermediate in the synthesis of fine chemicals, is produced from the dimer of isobutene, which consists of a mixture of 2,4,4-trimethyl-2-pentene and 2,4,4-trimethyl-1-pentene. Cross-metathesis of the former with ethene yields the\ndesired product. The catalyst is a mixture of WO3/SiO2 for metathesis and MgO for isomerization at 370 °C and 30 bar. The isobutene is recycled to the\nisobutene dimerization unit.\n\n2. Vestenamer 8012: a predominantly trans polymer of cyclooctene made with a WCl6 based catalyst (Degussa-Hüls), used in blends\nand poly-norbornene made by a catalyst generated from RuCl3 in t-BuOH in the presence of air (Norsorex by Atofina, a", "-24.978873296262464" ], [ "Silktide History For the first 10 years, Silktide was a web design agency creating websites for local and national companies. In July 2011, the company gave up web design to focus on making software for testing websites. Silktide Monitor Silktide Monitor is an online website testing and reporting tool that is used to check the quality of a website, and looks for spelling mistakes, grammar issues, broken links, SEO, accessibility and can be automated to generate reports regularly. Globally recognised businesses, such as eBay, Santander and Heroku use Silktide Monitor to maintain the quality of their websites. Silktide Prospect Silktide", "-24.960563553031534" ], [ "that TALEN can be used as tools to harness the immune system to fight cancers; TALEN-mediated targeting can generate T cells that are resistant to chemotherapeutic drugs and show anti-tumor activity.\nIn theory, the genome-wide specificity of engineered TALEN fusions allows for correction of errors at individual genetic loci via homology-directed repair from a correct exogenous template. In reality, however, the in situ application of TALEN is currently limited by the lack of an efficient delivery mechanism, unknown immunogenic factors, and uncertainty in the specificity of TALEN binding.\nAnother emerging application of TALEN is its ability to combine with other genome", "-24.95778604503721" ], [ "publicly visible. One of these, Stalkscan, would receive media attention. Graph.tips was a frequently used tool in the online intelligence community as an interface on top of Facebook Graph Search. Deprecation of most functionality in June 2019 In early June 2019, the feature was further deprecated, with the majority of urls for graph search queries no longer working. Facebook explained this by saying: \"The vast majority of people on Facebook search using keywords, a factor which led us to pause some aspects of graph search and focus more on improving keyword search. We are working closely with researchers to make", "-24.95570699055679" ], [ "of users.\nThe feature has been released only to limited users, with a slow expansion planned. Facebook announced plans for a future mobile interface and the inclusion of Instagram photos.\nIn late September 2013, Facebook announced that it would begin rolling out search for posts and comments as part of Graph Search. The rollout began in October 2013, but many people who had Graph Search were not given immediate access to this feature. A post on the Facebook Engineering blog explained that the huge amount of post and comment data, coming to a total of 700 TB, meant that developing Graph Search", "-24.9198126004776" ], [ "Methionine Biochemical details Methionine (abbreviated as Met or M; encoded by the codon AUG) is an α-amino acid that is used in the biosynthesis of proteins. It contains an α-amino group (which is in the protonated −NH₃⁺ form under biological conditions), an α-carboxylic acid group (which is in the deprotonated −COO⁻ form under biological conditions), and an S-methyl thioether side chain, classifying it as a nonpolar, aliphatic amino acid.\nMethionine is coded for by the initiation codon, meaning it indicates the start of the coding region and is the first amino acid produced in a nascent polypeptide during mRNA translation. A", "-24.905334944836795" ], [ "GraphHopper Users Notable users of GraphHopper are Rome2rio, de:Falk (Verlag), Komoot, Gnome and de:GPSies.com. Since February 2015, GraphHopper has been one of the APIs powering bike and foot routing on the official OpenStreetMap website and version 0.4 was released shortly afterwards in March 2015. Company In January 2016, the developers of GraphHopper and jsprit formed the company GraphHopper GmbH. GraphHopper Directions API The GraphHopper Directions API is an offering of the GraphHopper GmbH and includes a Geocoding API, a Distance Matrix API, a Map Matching API, an Isochrone API and a Route Optimization API besides the Routing API", "-24.8829861402628" ], [ "In particular, ferrocene derivatives have strong inhibitory activity against human lung cancer cell line A549, colorectal cancer cell line HCT116, and breast cancer cell line MCF-7. An experimental drug was reported which is a ferrocenyl version of tamoxifen. The idea is that the tamoxifen will bind to the estrogen binding sites, resulting in cytotoxicity. Materials chemistry Ferrocene, a precursor to iron nanoparticles, can be used as a catalyst for the production of carbon nanotubes. The vinylferrocene can be made by a Wittig reaction of the aldehyde, a phosphonium salt, and sodium hydroxide. The vinyl ferrocene can be converted into", "-24.872307430836372" ], [ "Blingee Blingee (founded 2006) is an online animated GIF creator that allows users to create layered images using original photographs and artwork combined with user-generated ornamentation, referred to as \"stamps.\" History Blingee was founded as part of a website network Bauer Teen Network, and marketed towards young people who wished to add personalized imagery to their Myspace pages. The site, however, was different from other web-based GIF editors, allowing users to make their own profiles and other social network-like functionality. Users could also rate the Blingee compositions of others (referred to as \"Blingees\") and upload new artwork to use as", "-24.856700190051924" ], [ "is headquartered in Santa Cruz, California, USA. Originally a graphics hardware manufacturer, the company has grown and evolved its business over the years. In 1996, GraphOn entered the market for UNIX and Linux server-based computing software. In 2000, a major release was issued, called Bridges for UNIX. In 2002, the product was upgraded and renamed GO-Global UX 2.0. The company significantly expanded its business \nin 2000 by adding Windows application publishing and Web-enabling software to its product \nline with Bridges for Windows. Between 2003 and 2008, versions 2.1 through 3.2 for GO-Global \nfor Windows and GO-Global for", "-24.848061698750826" ], [ "taking their graph with them to other services when they wish to do so, such as when a user is dissatisfied with Facebook. Google has attempted to offer a solution to this problem by creating the Social Graph API, released in January 2008, which allows websites to draw publicly available information about a person to form a portable identity of the individual, in order to represent a user's online identity. This did not, however, experience Google's desired uptake and was thus retired in 2012. Facebook introduced its own Graph API at the 2010 f8 conference. Both companies monetise collected data", "-24.830434613511898" ], [ "is induced during certain stages of growth such as germination, ripening of fruits, abscission of leaves, and senescence of flowers. Ethylene production can also be induced by a variety of external aspects such as mechanical wounding, environmental stresses, and certain chemicals including auxin and other regulators. The pathway for ethylene biosynthesis is named the Yang cycle after the scientist Shang Fa Yang who made key contributions to elucidating this pathway.\nEthylene is biosynthesized from the amino acid methionine to S-adenosyl-L-methionine (SAM, also called Adomet) by the enzyme Met Adenosyltransferase. SAM is then converted to 1-aminocyclopropane-1-carboxylic acid (ACC) by the enzyme ACC", "-24.81587657966884" ], [ "developers made a presentation on the topic at Commercial Users of Functional Programming (CUFP) 2009 conference, and in November 2009 chat.facebook.com was detected as running a modified version of ejabberd. Om Malik commented on the development as \"disruptive\" competition for \"older IM networks such as AOL's AIM and Microsoft's MSN\". On Feb 10th 2010, the Facebook blog announced the opening of the XMPP interface to Facebook chat, based on ejabberd.\nAnother social media and blogging service that uses ejabberd is LiveJournal Talk. The Spanish-focused Tuenti social network uses a modified ejabberd to provide a live chat service.\nThe worldwide jabber.org XMPP server,", "-24.802809936008998" ], [ "Virb History After the launch of PureVolume in 2003, Unborn Media attempted to mimic the website's success by launching Virb, where PureVolume focused primarily on music, Virb would focus on more social features. Virb was launched, as an invite-only beta form in 2006, and was publicly launched in March 2007. Virb was highly praised in 2007 by the Houston Press for its unique design, customisation, and innovative features, such as iTunes integration. Virb was widely heralded as the possible successor to MySpace, due to the site's similar layout and functionality. Virb failed to attract a wider audience, and by the", "-24.762962938810233" ], [ "in the commercial implementation of Google Talk and Facebook Chat. In October 2004, the XMPP working group at IETF published the documents RFC 3920, RFC 3921, RFC 3922 and RFC 3923, to standardize the core XMPP protocol.", "-24.7432813399937" ], [ "ASCII-art-derived words were also a way to attempt to indicate one was knowledgeable about the culture of computer users. \nOnce the reserve of hackers, crackers, and script kiddies, leet has since entered the mainstream. It is now also used to mock newbies, also known colloquially as noobs, or newcomers, on web sites, or in gaming communities. Some consider emoticons and ASCII art, like smiley faces, to be leet, while others maintain that leet consists of only symbolic word encryption. More obscure forms of leet, involving the use of symbol combinations and almost no letters or numbers, continue to be used", "-24.740873357164674" ], [ "that Chinese spies have used LinkedIn to target thousands of business and government officials as potential sources of information.\nIn 2017, Germany's Federal Office for the Protection of the Constitution (BfV) published information alleging that Chinese intelligence services had created fake social media profiles on sites such as LinkedIn, using them to gather information on German politicians and government officials. Applications LinkedIn 'applications' often refers to external third party applications that interact with LinkedIn's developer API. However, in some cases it could refer to sanctioned applications featured on a user's profile page. Embedded in profile In October 2008, LinkedIn enabled an", "-24.726302686147392" ], [ "wire connections is the method of choice to form these connections, thermosonic bonding gold wires directly to the silicon chip has been the process most widely used because of its proven reliability as a result of the low bonding parameters of force, temperature, and time needed to form the bond.", "-24.724869011435658" ], [ "IBoxx The iBoxx bond market indices are benchmarks for professional use and comprise liquid investment grade bond issues. They enable investors to analyse and select benchmarks that reflect their investment profile. They are used for fixed income research, asset allocation and performance evaluation. Underlying bond prices and indices are available in real time for Euro and Sterling and end of day for USD and Asia.", "-24.711725335917436" ], [ "that has led to intensive research in network modeling and analyses.\nAn important step towards understanding biological networks is finding an adequate network model. Evaluating the fit of a model network to the data is a formidable challenge, since network comparisons are computationally infeasible and thus have to rely on heuristics, or \"network properties.\" GraphCrunch automates the process of generating random networks drawn from a series of random graph models and evaluating the fit of the network models to a real-world network with respect to a variety of global and local network properties. Features GraphCrunch performs the following tasks: \n\n1) computes", "-24.665479414863512" ], [ " The Bellagio group defined GRaPH-Int as a network of individuals who are interested in the impact of the interaction between genes and the environment on population health \nFollowing the Bellagio meeting, The GRaPH-Int website was launched at the 4th International DNA Sampling Conference - Montreal, June 2006. Enterprise The GRaPH-Int Enterprise was developed and introduced at the Bellagio workshop as a conceptual and systematic description of the flow of information. It describes the process of translating genome-based science and technology into improvements in population health. Governance GRaPH-Int and its activity are overseen by an administrative hub, secretariat, executive committee", "-24.624179975449806" ], [ "Gigle Networks History Gigle was a venture capital backed privately held company. The company completed a Series A funding round of $11 million in January 2006, led by Accel Partners and Pond Venture Partners; and a Series B funding round of $20 million in November 2007, led by Scottish Equity Partners with participation from Accel Partners and Pond Venture Partners. In December 2010, the company was acquired by Broadcom for $75 million.\nGigle announced 1 Gbit/s physical layer throughput trials in December 2006.\nGigle was involved in multimedia communications standards such as IEEE P1901 and G.hn. Gigle Networks was a board member of", "-24.60170039674267" ], [ "in 2014.\nThe second research project, GraphX, created a graph processing system on top of Spark, a general data-parallel system. GraphX at the same challenged the notion that specialized systems are necessary for graph computation. GraphX was released as an open source project and merged into Spark in 2014, as the graph processing library on Spark. Databricks In 2013, along with Matei Zaharia and other key Spark contributors, Xin co-founded Databricks, a venture-backed company based in San Francisco that offers data platform as a service, based on Spark.\nIn 2014, Xin led a team of engineers from Databricks to compete in the", "-24.59108091390226" ], [ "Carbon nanotubes in medicine CNT Properties CNTs have several unique chemical, size, optical, electrical and structural properties that make them attractive as drug delivery and biosensing platforms for the treatment of various diseases and the noninvasive monitoring of blood levels and other chemical properties of the human body, respectively. Electrical and Structural Carbon nanotubes can be metallic or semiconducting depending on their structure. This is due to the symmetry and unique electronic structure of graphene. For a given (n,m) nanotube, if n = m, the nanotube is metallic; if n − m is a multiple of 3, then the nanotube", "-24.58991672913544" ], [ "from the development of the system. It has been in operation for more than three years, and has indexed 130,000,000 researchers and more than 200 million publications. The research was funded by the Chinese National High-tech R&D Program and the National Science Foundation of China.\nArnetMiner is commonly used in academia to identify relationships between and draw statistical correlations about research and researchers. It has attracted more than 10 million independent IP accesses from 220 countries and regions. The product has been used in Elsevier's SciVerse platform, and academic conferences such as SIGKDD, ICDM, PKDD, WSDM. Operation ArnetMiner automatically extracts the", "-24.578716743271798" ], [ "Cancer Alliance, which is a Translational Cancer Research Center within the Cancer Institute of NSW. Fraud investigation While reading scientific articles on cancer research, Byrne noticed an odd pattern on a particular gene. The papers described ‘strikingly similar’ experiments on a gene that has been linked with childhood leukemia and breast cancer. She recognized the particular gene, because she had previously worked on it, with a team that had cloned the gene 20 years earlier.\nHer experience on that gene made her realize that all of the papers, which were all from China, were describing the wrong nucleotide sequence. A nuclueotide", "-24.564588151333737" ], [ "and his brother Alex van Someren, along with two friends, founded ANT Ltd. to build networking hardware. While with ANT, van Someren wrote the first version of the Fresco web browser which helped the company move from being primarily a hardware company to a software company. ANT Plc. went public on the London Alternative Investments Market in March 2005. In February 2013 ANT was acquired by Espial Group.\nIn 1996 van Someren, along with his brother Alex co-founded nCipher to build high speed cryptographic accelerators and Hardware Security Modules. nCipher went public on the London Stock Exchange on October 2000, at", "-24.519757817382924" ], [ "Wirehog Wirehog was a friend-to-friend file sharing program that was linked to Facebook and allowed people to transfer files directly between computers. History It was created by Andrew McCollum, Mark Zuckerberg, Adam D'Angelo, and Sean Parker during their development of The Facebook social networking website in Palo Alto in the summer and fall of 2004. The only way to join Wirehog was through an invitation from a member and although it was originally planned as an integrated feature of Facebook, it could also be used by friends who weren't registered on Facebook. Wirehog was originally launched in October 2004 and", "-24.51720018062042" ], [ "Facebook Graph Search Facebook Graph Search was a semantic search engine that was introduced by Facebook in March 2013. It was designed to give answers to user natural language queries rather than a list of links. The name refers to the social graph nature of Facebook, which maps the relationships among users. The Graph Search feature combined the big data acquired from its over one billion users and external data into a search engine providing user-specific search results. In a presentation headed by Facebook CEO Mark Zuckerberg, it was announced that the Graph Search algorithm finds information from within a", "-24.50066447269637" ], [ "Beacon Project is an open web service that tests the willingness of international sites to share genetic data. It is being implemented on the websites of the world's top genomic research organizations.\nMatchmaker Exchange: Matchmaker Exchange is a federated network of databases whose goal is to find genetic causes of rare diseases by matching similar phenotypic and genotypic profiles.\nBRCA Challenge: The BRCA Challenge aims to advance understanding of the genetic basis of breast and other cancers using data from around the world. Gather and use genetic data in health care More and more people are getting their DNA sequenced. But the", "-24.47593336564023" ], [ "name from an app that it developed. Landslide Technologies was acquired by j2 Global in 2012. In 2013, Konrath conducted a survey of professionals involved in sales regarding their use of LinkedIn as a sales tool. Of the more than 3,000 people surveyed, she reported findings that only 5% were using it to its full capabilities, while 55% were not using it all. Utilizing the results of this survey, she published her 2013 eBook, Cracking the LinkedIn Sales Code. Writing and speaking In addition to her print publications, Konrath has written a series of eBooks, sales kits, study kits and", "-24.473288723733276" ], [ "Amazon. Privacy issues of social networking sites The advent of the Web 2.0 has caused social profiling and is a growing concern for Internet privacy. Web 2.0 is the system that facilitates participatory information sharing and collaboration on the Internet, in social networking media websites like Facebook, Instagram, Twitter, and MySpace. These social networking sites have seen a boom in their popularity starting from the late 2000s. Through these websites many people are giving their personal information out on the internet.\nIt has been a topic of discussion of who is held accountable for the collection and distribution of personal information.", "-24.47204590390902" ], [ "common to see invalid markup in many of the sites throughout the World Wide Web. Use of proprietary/discontinued elements In the early age of the web (much of the 1990s), the design of the official HTML specification became increasingly strained, compared to the desire of designers for flexibility in creating visually vibrant designs. In response to this pressure, browser makers unilaterally added new proprietary features to HTML that fell outside the standards at the time. This meant there were proprietary elements in HTML that worked in some browsers, but not in others.\nTo some extent, this problem was slowed by the", "-24.46773691731505" ], [ "Symphogen Symphogen is a biotechnology company located in Copenhagen, Denmark that develops protein drugs based on recombinant monoclonal antibody mixtures. These drugs are different from the polyclonal antibodies, as each antibody in the mixture is produced from one carefully selected clone. Their three main areas of therapeutic research are immunoglobulin replacement, cancer, and infectious diseases. The company was founded in 2000 and has patents on a drug discovery platform called Symplex and a drug manufacturing platform called Sympress. Currently, ten drugs are being developed with rozrolimupab (Sym001) being the lead product. Partner collaborations Genentech, Inc.: Collaboration pact with Genentech which", "-24.454824375065073" ], [ "Leadzyme Leadzyme is a small ribozyme (catalytic RNA), which catalyzes the cleavage of a specific phosphodiester bond. It was discovered using an in-vitro evolution study where the researchers were selecting for RNAs that specifically cleaved themselves in the presence of lead. However, since then, it has been discovered in several natural systems. Leadzyme was found to be efficient and dynamic in the presence of micromolar concentrations of lead ions. Unlike in other small self-cleaving ribozymes, other divalent metal ions cannot replace Pb²⁺ in the leadzyme. Due to obligatory requirement for a lead, the ribozyme is called a metalloribozyme.\nLeadzyme has", "-24.45168223102519" ], [ "Buchwald–Hartwig amination Application Because of the ubiquity of aryl C-N bonds in pharmaceuticals and natural products, the reaction has gained wide use in synthetic organic chemistry, with application in many total syntheses and the industrial preparation of numerous pharmaceuticals.\nIndustrial applications include α-arylation of carbonyl compounds (such as ketones, esters, amides, aldehydes) and nitriles. Scope Although the scope of the Buchwald–Hartwig amination has been expanded to include a wide variety of aryl and amine coupling partners, the conditions required for any particular reactants are still largely substrate dependent. Various ligand systems have been developed, each with varying capabilities and limitations, and", "-24.443545712332707" ], [ "been subjected to extensive biochemical and structural characterization. The minimal secondary structure of leadzyme is surprisingly very simple . It comprises an asymmetric internal loop composed of six nucleotides and a helical region on each side of the internal loop. The cleavage site of leadzyme is located within a four-nucleotide long asymmetric internal loop that also consists of RNA helices on its both sides. This is shown in top figure on right, which is the secondary structure of leadzyme generated using mfold. The structures of leadzyme have also been solved using X-ray crystallography and NMR. The crystal structures of the", "-24.436368963768473" ], [ "for HTML Tim Berners-Lee, who was working as a CERN contractor when he created the Web, encountered CERNguid in October 1987, when CERN's Online Computing Group started to maintain its documentation in CERNDOC. Berners-Lee found its hierarchical structure highly limiting. \nFor HTML, Berners-Lee adopted SGML syntax and a subset of the tags specified in CERN's SGMLguid.", "-24.426599000231363" ], [ "open sourcing its product, creating Mozilla. This helped the browser maintain its technical edge over Internet Explorer, but did not slow Netscape's declining market share. Netscape was purchased by America Online in late 1998. Relationships of browsers A number of web browsers have been derived and branched from source code of earlier versions and products.", "-24.417701151687652" ], [ "Essembly Features Essembly contains a number of features common to social networking websites, such as the ability of the user to create a personal profile with information including a photo, contact information, non-political interests, voter information, and a brief resume for educational background and personal strengths. In addition to basic social-networking features, Essembly has several features which are unique. Resolves Interaction on Essembly centers around resolves, or \"short ideological statements, designed to spawn debate.\" Members vote on resolves, by choosing to \"agree, lean agree, lean against, or against.\" When a user votes on a resolve, this vote", "-24.411817676678766" ], [ "N-Acetyltaurine History N-Acetyltaurine was first mentioned in 1990 as a compound in the droplets of the orb spider's viscid spiral. Based on its high hygroscopicity, N-acetyltaurine is an important ingredient which ensures the spider web's flexibility.\nAs a biomarker for ethanol metabolism, N-acetyltaurine was first mentioned in a mice study in 2012. Another study in 2015 focused on the effect of endurance training on an increase in N-acetyltaurine concentrations. The first study focusing on the forensic context of alcohol biomarker analysis in human urine was published in 2016. One year later, in 2017 an evaluation of N-acetyltaurine as an alcoholmarker in", "-24.407765323103376" ], [ "PICALM Interactions PICALM has been shown to interact with CLTC. Clinical significance In humans, certain alleles of this gene have been statistically associated with an increased risk of developing late-onset Alzheimer's disease.", "-24.37120387671166" ], [ "Nanonetwork Communication approaches Classical communication paradigms need to be revised for the nanoscale. The two main alternatives for communication in the nanoscale are based either on electromagnetic communication or on molecular communication. Electromagnetic This is defined as the transmission and reception of electromagnetic radiation from components based on novel nanomaterials. Recent advancements in carbon and molecular electronics have opened the door to a new generation of electronic nanoscale components such as nanobatteries, nanoscale energy harvesting systems, nano-memories, logical circuitry in the nanoscale and even nano-antennas. From a communication perspective, the unique properties observed in nanomaterials will decide on the specific", "-24.33501834749768" ], [ "origin of the carbon nanotube. A large percentage of academic and popular literature attributes the discovery of hollow, nanometer-size tubes composed of graphitic carbon to Sumio Iijima of NEC in 1991. He published a paper describing his discovery which initiated a flurry of excitement and could be credited by inspiring the many scientists now studying applications of carbon nanotubes. Though Iijima has been given much of the credit for discovering carbon nanotubes, it turns out that the timeline of carbon nanotubes goes back much further than 1991.\n\nIn 1952, L. V. Radushkevich and V. M. Lukyanovich published clear images of 50", "-24.318394560192246" ], [ "carbon nanotubes to form complicated nanoelectric systems. Because carbon based products can be properly controlled and act as interconnects as well as transistors, they serve as a fundamental material in the electrical components of NEMS. Difficulties Despite all of the useful properties of carbon nanotubes and graphene for NEMS technology, both of these products face several hindrances to their implementation. One of the main problems is carbon’s response to real life environments. Carbon nanotubes exhibit a large change in electronic properties when exposed to oxygen. Similarly, other changes to the electronic and mechanical attributes of carbon", "-24.30218249716563" ], [ "1-Hexene Production 1-Hexene is commonly manufactured by two general routes: (i) full-range processes via the oligomerization of ethylene and (ii) on-purpose technology. A minor route to 1-hexene, used commercially on smaller scales, is the dehydration of hexanol. Prior to the 1970s, 1-hexene was also manufactured by the thermal cracking of waxes. Linear internal hexenes were manufactured by chlorination/dehydrochlorination of linear paraffins.\n\"Ethylene oligomerization\" combines ethylene molecules to produce linear alpha-olefins of various chain lengths with an even number of carbon atoms. This approach result in a distribution or “full range” of alpha-olefins. The Shell higher olefin process (SHOP) employs", "-24.29630899001495" ], [ "Two-dimensional polymer Covalently-linked polymers There are several examples of covalently linked 2DPs which include the individual layers or sheets of graphite (called graphenes), MoS2, (BN)x and layered covalent organic frameworks. As required by the above definition, these sheets have a periodic internal structure.\nA well-known example of a 2D polymer is graphene; whose optical, electronic and mechanical properties have been studied in depth. Graphene has a honeycomb lattice of carbon atoms that exhibit semiconducting properties. A potential repeat unit of graphene is a sp2-hybridized carbon atom. Individual sheets can in principle be obtained by exfoliation procedures, though in reality", "-24.278057975228876" ] ]
5hh70u
Why are most major religions right-wing, when their central figures are left-wing?
[ "Right-wing politics largely centers around a small, efficient government, low taxation, low regulation, and relies on the free market. This goes hand in hand with the rejection of authority - and religious people believe in a divine authority far more powerful and important than an Earthly government. Thus, they do not trust their government to have a hand in more things than the bare minimum, and their allegiance is to God, not the government.", "Your question includes a false premise. Most religions vote Democrat. URL_0 Not sure why other people are trying to prove a falsehood.", "I don't think the difference is in how religious the people on either side of the political spectrum are. In the US the difference is that the Right Wing operates in the name of religious righteousness for political advantage, while the left wing tends to avoid mixing the two. The reason is that the right wing is currently operating under a principle of exclusion while the left wing is trying to be inclusive. It's identity politics. The problem with the left (this time around) is that part of their previous coalition felt that they were trying so hard to be everything to everyone that they felt they were being ignored, so they jumped to the anti-establishment candidate, who had aligned himself with the right wing.", "they actually arent. I just collected thousands of data for a class that can prove it even. you are confusing this with why are those who connect religion and politics being right wing. mainline protestant, black protestant, and catholics (aside from the abortion issue) are all left wing mostly. they make up most of US religion.", "The scope of your question is very broad. What does right-wing and left-wing mean in this context? Right wing politics embodies a wide spectrum of ideas that most of the time have little to do with each other. For example, you have the social conservatives who want to preserve what they see as traditional values. Then you have the fiscal conservatives who favour deregulation and lower taxes. And then you have the libertarians, the nationalist, and so forth. There is considerable diversity on both the left and the right, partly because the terms \"left\" and \"right\" are so loosely defined. As for whether the \"central figures\" of major religions are left-wing, that is debatable. In fact, I don't think you can classify many religious figures as either left or right wing at all. Using Jesus as an example, he specifically mentioned that his kingdom is of \"not of this world\", and that he is not especially concerned with the affairs of earthly kingdoms." ]
[ [ "center-left includes social democrats, social liberals, progressives and also some democratic socialists and greens (including some eco-socialists). Center-left supporters accept market allocation of resources in a mixed economy with a significant public sector and a thriving private sector. Center-left policies tend to favour limited state intervention in matters pertaining to the public interest.\nIn several countries, the terms far-left and radical left have been associated with varieties of communism, autonomism and anarchism. They have been used to describe groups that advocate anti-capitalism or eco-terrorism. In France, a distinction is made between the left (Socialist Party and Communist Party) and the far-left", "-41.93531170647475" ], [ "sometimes described as far-right. Right-wing populism often involves appeals to the \"common man\" and opposition to immigration. Far-right politics sometimes involves anti-immigration and anti-integration stances towards groups that are deemed inferior and undesirable. Concerning the socio-cultural dimension of nationality, culture and migration, one far-right position is the view that certain ethnic, racial or religious groups should stay separate and it is based on the belief that the interests of one's own group should be prioritised. \nProponents of the horseshoe theory interpretation of the left-right spectrum identify the far-left and the far-right as having more in common with each other as", "-41.70485041044594" ], [ "in the political spectrum as \"left of center\". İnönü in an interview said, \"Actually we are already a left-to-center party after embracing Laïcité (secularity) If you are populist, you are (also) at the left of center.\" In another interview İnönü said that the party was a statist party and this is left of center. İnönü was referring to the Kemalist ideology (the traditional ideology of the party) and the three of the six arrows in the party flag namely; Laicism, Populism and Statism. Thus according to him the party was already at the left of the center. However unlike", "-41.10357047384605" ], [ "oppose socialism and communism. By contrast, the phrase \"far-right\" is used to describe those who favor an absolutist government, which uses the power of the state to support the dominant ethnic group or religion and often to criminalize other ethnic groups or religions. Typical examples of leaders to whom the far-right label is often applied are: Francisco Franco in Spain, Benito Mussolini in Italy, Adolf Hitler in Nazi Germany and Augusto Pinochet in Chile.\nThe United States Department of Homeland Security defines right-wing extremism in the United States as \"broadly divided into those groups, movements, and adherents that are primarily hate-oriented", "-40.47915016277693" ], [ "adherence to right or left, which was developed by Gomez Morin and his associates as having political Pragmatism requiring the adoption policies that correspond to the problems faced by the nation at any given moment.\nThe party ideology, at least in principle, is that of \"National Action\" which rejects a fundamental adherence to left- or right-wing politics or policies, instead requiring the adoption of such policies as correspond to the current problems faced by the nation in the present. According to Manuel Gómez Morín both right and left wing policies may be considered equally carefully in formulation of national policy. (This", "-39.970528495439794" ], [ "Far-right politics Definition The core of the far right’s worldview is organicism, the idea that society functions as a complete, organized and homogeneous living being. Adapted to the community they wish to constitute or reconstitute (whether based on ethnicity, nationality, religion or race), the concept leads them to reject every form of universalism in favor of autophilia and alterophobia, in other words the idealization of a \"we\" excluding a \"they\". The far-right thus tends to absolutize differences between nations, races, individuals or cultures since they disrupt their efforts towards the utopian dream of the organicist community, reconnected to its quasi-eternal", "-39.945158527756575" ], [ "writing for Forward magazine in September 2015, that \"the left has incorporated the attitudes of the nativist far-right. Corbyn's alliances with reactionary, misogynistic, theocratic, and anti-Semitic movements bear out what we’ve said\".\nCommentator Peter Wilby asserted that, while Kamm and Stephen Pollard of the Jewish Chronicle claim \"to be left-wing\", they hold \"no discernible left-wing views\". When interviewed by politics academic Norman Geras in 2003, Kamm said that he wrote to \"express a militant liberalism that I feel ought to be part of public debate but which isn't often articulated, or at least not where I can find it, in the", "-39.74475673977213" ], [ "social liberals. Movements for racial equality and trade unionism have also been associated with the left.\nPolitical scientists and other analysts regard the right as including conservatives, right-libertarians, neoconservatives, imperialists, monarchists, fascists, reactionaries and traditionalists.\nA number of significant political movements do not fit precisely into the left-right spectrum, including Christian democracy, feminism, and regionalism. Though nationalism is often regarded as a right-wing doctrine, many nationalists favor egalitarian distributions of resources. There are also \"liberal nationalists\". Populism is regarded as having both left-wing and right-wing manifestations (see left-wing populism and right-wing populism). Green politics is often regarded as a movement of the", "-39.725195891660405" ], [ "such political leaders espouse a dubious moderation and accommodate the Left, while treating traditional conservative positions as political liabilities.\nThe center-right has gradually embraced most of the Left’s historical positions but has merely restated them with apparent moderation, for example, by rallying to the original, less radicalized form of feminism, by advocating an extensive welfare state with lower marginal tax rates, and by praising Martin Luther King while lying about his endorsement of racial quotas.... Equally important, if the \"conservative movement\" were as concerned about small-government as it is about waging global democratic wars, it might be influencing public opinion accordingly.", "-39.669078334234655" ], [ "and national strength. Many Islamist groups have been called \"right-wing\" including the Great Union Party and the Combatant Clergy Association/Association of Militant Clergy and the Islamic Society of Engineers of Iran.\nThe term \"family values\" has been used as a buzzword by right-wing parties such as the Republican Party in the United States, the Family First Party in Australia, the Conservative Party in the United Kingdom and the Bharatiya Janata Party in India to describe support for traditional families and opposition to the changes the modern world has made in how families live. Right-wing supporters of \"family values\" may oppose abortion,", "-39.64853017474525" ], [ "extreme right, given the fact that many parties that were originally labeled right-wing extremist tended to advance neoliberal and free market agendas as late as the 1980s, but now advocate economic policies which are more traditionally associated with the left, such as anti-globalisation, nationalization and protectionism. One approach, drawing on the writings of Norberto Bobbio, argues that attitudes towards political equality are what distinguish the left from the right and they therefore allow these parties to be positioned on the right of the political spectrum. \nRight-wing populism, a political ideology that often combines laissez-faire capitalism, nationalism, ethnocentrism and anti-elitism, is", "-39.58985509898048" ], [ "political bureau said the left-wing parties had contacts with other factions (such as Hamas and Fatah) but denied any alliance with them. In the 2006 Palestinian legislative elections, the left-wing parties which at the time ran in separated lists obtained 8% of the votes. Zarifa said the left-wing parties are not building on surpassing their previous goals in 2006, but he thinks there is a positive feeling now when the parties are unified. Talal Okal, a writer and political analyst said he believes the left-wing parties can rise in the elections. In contrast, Saleh Abdel Jawad, a professor of political", "-39.48985896370141" ], [ "terms extreme right and extreme left as well as centre-right and centre-left came to be used to describe the nuances of ideology of different sections of the assembly.\nThe terms \"left\" and \"right\" were not used to refer to political ideology per se, but only to seating in the legislature. After 1848, the main opposing camps were the \"democratic socialists\" and the \"reactionaries\" who used red and white flags to identify their party affiliation. With the establishment of the Third Republic in 1871, the terms were adopted by political parties: the Republican Left, the Centre Right and the Centre Left (1871)", "-39.437359215679066" ], [ "in the 2010 report of the same organization PSDB was defined as a \"center-left\" party.\nWorkers' Party campaign leader Marco Aurélio Garcia criticized declarations made by PSDB president Sérgio Guerra that PSDB is \"the real left\". He said that \"PSDB is not a right wing party, it is the right wing's party\". Political alignment The PSDB questions the use of what it considers \"outdated political labels\" such as \"left\" and \"right\". To quote a document drafted by Fernando Henrique Cardoso's office in 1990: \"If left means to be against the existing social order, and right in favor, then social-democracy is without", "-39.422793442689" ], [ "nonetheless comprised the \"supposed thinking wing of the alt-right.\" The Los Angeles Review of Books described the members as identifying with both the left and the right, but united against \"primary adversaries\" hailing predominately from the left, including post-modernism, post-structuralism, Marxism, and political correctness generally, and \"to a lesser extent the neo-fascist alt-right\".\nThis characterization has been rejected by others from within the IDW, such as Quillette, founded by Claire Lehmann and described by Politico as the \"unofficial digest\" of the IDW. Quoting Sam Harris and Daniel Miessler, they have contended that the majority of the most prominent members of the", "-39.312798106228" ], [ "within the Left. Liberal feminism is closely connected with social liberalism, and in America, with the left wing of mainstream politics (e.g., National Organization for Women).\nThe connection between left-leaning ideologies and LGBT rights struggles also has an important history. Prominent socialists who were involved in early struggles for LGBT rights include Edward Carpenter, Oscar Wilde, Harry Hay, Bayard Rustin, and Daniel Guérin, among others. Varieties The spectrum of left-wing politics ranges from center-left to far-left (or ultra-left). The term center-left describes a position within the political mainstream. The terms far-left and ultra-left refer to positions that are more radical. The", "-39.11107709442149" ], [ "parties and right-wing political groups are conniving with the establishment to damage and weaken left-wing parties.\" His statement came during the 2013 general elections, in which, left-wing parties were under immense pressure from the right-wing insurgent groups to limit their political campaigns. Rabbani later accused the international community for supporting the conservative parties in an opposition against the leftist parties. While accusing former president Parvez Musharraf for supporting the ultra-conservative alliance to curb the left-wing parties, Rabbani, with another Marxist Taj Haider, accused the West and the United States of supporting right wing parties for their bid in the elections.", "-39.01333681226242" ], [ "social-liberals (in contrast to traditions of social democracy more common to Western Europe), Rawlsian liberals and civil libertarians, who are often identified with the Democratic Party. There are also leftists who reject many of the platforms of the Democratic Party in favor of more socialist policies. In general, the term left-wing is understood to imply a commitment to egalitarianism, support for social policies that appeal to the working class and multiculturalism. The contemporary center-left usually defines itself as promoting government regulation of business, commerce and industry; protection of fundamental rights such as freedom of speech and freedom of religion (separation", "-39.01221538349637" ], [ "populist and centrist parties in the 2010s.\nNorberto Bobbio saw the polarization of the Italian Chamber of Deputies in the 1990s as evidence that the linear left–right axis remained valid. Bobbio thought that the argument that the spectrum had disappeared occurred when either the Left or Right were weak. The dominant side would claim that its ideology was the only possible one, while the weaker side would minimize its differences. He saw the Left and Right not in absolute terms, but as relative concepts that would vary over time. In his view, the left–right axis could be applied to any time", "-38.61651676998008" ], [ "defines the EDL than \"far-right\". The EDL has been characterised as populist because of its claim to represent \"ordinary people\" against the liberal elites whom it alleges control the country.\nThe EDL disavows the \"far-right\" label, describing itself as \"non-political, taking no position on right-wing vs. left-wing. We welcome members from all over the political spectrum, and with varying views on foreign policy, united against Islamic extremism and its influence on British life.\" Its online material nevertheless often condemns left-wingers, and members regularly complain about \"stupid lefties\". When examining the EDL's public statements, Jackson cautioned against automatically taking them at face", "-38.532005616638344" ], [ "political issues on which left and right seem to have swapped ideologies: right-wingers talk of equality, human rights and 'defending the innocent', while left-wingers fetishise 'choice', selfishness and unbridled individualism.\" (He later regretted expressing himself in this way.) The article gained much attention on Twitter and Hasan debated the issue with Suzanne Moore on the Today programme on BBC Radio 4.\nTelegraph blogger Brendan O'Neill thought both Hasan and his pro-choice opponents shared the modern left's \"instinct for paternalism\" which contrasted, he asserted, with the pre-occupations of radicals a century ago, an era in which such figures, Hasan asserted, often opposed", "-38.39696750382427" ], [ "center-left as of its foundation, after all, it was the Brazilian Social Democratic Party\". As he notes, \"this story changed after 1994, with the election of PSDB to the presidency. [...] A rhetoric of overcoming classical ideological division [...] was one of the justifications of the grand parliamentary alliance with center and right-wing parties. [...] As such, after the 1994 presidential election, most analysts started defining PSDB as a center party along with PMDB\". In its 2009 report about Freedom in the World, Freedom House defined the opposition coalition (formed by PSDB, PPS and Democrats) as a \"center-right coalition\". However,", "-38.36761285481043" ], [ "are usually different types of authoritarians is based on research done by Sam McFarland. Right and left The phrase \"right-wing\" in right-wing authoritarianism does not necessarily refer to someone's politics, but to psychological preferences and personality. It means that the person tends to follow the established conventions and authorities in society. In theory, the authorities could have either right-wing or left-wing political views.\nMilton Rokeach's dogmatism scale was an early attempt to measure pure authoritarianism, whether left or right. The scale was carefully designed to measure closed-mindedness without regard to ideology. Nevertheless, researchers found that it correlated with British political conservativism.", "-38.34727901616134" ], [ "the right-wing of Awami League led by Suhrawardy. The divisions became solidified between the right and left wing of Awami League. The Bhasani left the Awami League soon after and formed the left-wing National Awami Party.", "-38.22056130040437" ], [ "concerns that converts to Islam are more susceptible to violent radicalization than individuals born into the faith. Dr. Abdul Haqq Baker developed the Convert's Cognitive Development Framework that describes how new converts conceptualize Islam and the stages where they are most vulnerable to radicalization. Right-wing Radical right-wing terrorism is motivated by a variety of different right-wing/far-right ideologies, most prominently neo-fascism, neo-Nazism, white nationalism and to a lesser extant \"Patriot\"/Sovereign citizen beliefs and anti-abortion sentiment. Modern radical right-wing terrorism appeared in Western Europe, Central Europe and the United States in the 1970s, and Eastern Europe following the dissolution of the Soviet", "-37.97596482839435" ], [ "right-wing party, and the Indian National Congress, commonly called the INC or Congress, which is the leading left-wing party. These two parties currently dominate national politics, both adhering their policies loosely to their places on the left–right political spectrum. At present, there are seven national parties and many more state parties. Party proliferation Since 1984, when a strict anti-defection law was passed, there has been a tendency amongst the Indian politicians to float their own parties rather than join a broad based party such as the Congress or the BJP. For example, between the 1984 and 1989 elections, the number", "-37.93111137060623" ], [ "value; as he noted, far-right groups typically present \"front stage\" messages for public consumption which conceal the more aggressive views expressed in private. Anti-Islamism and Islamophobia EDL members regularly refer to Islam as an \"ideology\" or a \"cult\" rather than a \"religion\", and perceive it as a threat to Western culture. Evoking Samuel P. Huntington's notion of the Clash of Civilizations, the group's discourse constructs a binary division between Western and Islamic culture, the former presented as tolerant and progressive and the latter as intolerant and backward. EDL rhetoric explicitly distinguishes Muslims from the English national group: for the EDL,", "-37.750307964510284" ], [ "proposes a subdivision of the far-right nebula into moderate and radical leanings, according to their degree of exclusionism and essentialism.\nFar-right politics includes but is not limited to aspects of authoritarianism, anti-communism and nativism. Claims that superior people should have greater rights than inferior people are often associated with the far-right, as they have historically favored an elitist society based on its belief in the legitimacy of the rule of a supposed superior minority over the inferior masses. Modern debates According to Jean-Yves Camus and Nicolas Lebourg, the modern ambiguities in the definition of the \"far-right\" lies in the fact that", "-37.7296263356111" ], [ "will not be a religious organisation and could include Muslims, both Sunni and Shi'ite, Christians, Jews and other people.\"\nWhile having an avowedly anti-sectarian agenda, Arab nationalism has traditionally been popular among Sunni Muslims. The party's nationalist stance allows the party to attack the pan-Islamism of Sunni Islamist parties, Asalah and Al-Menbar Islamic Society, while giving it a strong position against Shia Islamists, Al Wefaq. Mr Hashim has said: \"National unity is our main goal and regardless of our beliefs, we can work together for the benefit of the country\".\nIn what some regard as an unusual position for an Arab", "-37.64338461421994" ], [ "Straight Left Straight Left was a left-wing newspaper published from 1979. The phrase was also the generic name given to a political faction of the Communist Party of Great Britain who disagreed with the leadership's emerging Eurocommunist politics, and were responsible for the production of the newspaper. The origins of this faction within the CPGB go back earlier, but it emerged under this name in 1977. Organisation and ideology The leading ideological force in the Straight Left faction was Fergus Nicholson, who had previously worked as the CPGB's student organiser. According to Michael Mosbacher in Standpoint magazine, the faction was", "-37.616449193883454" ], [ "In a similar line of research, Philip Tetlock found that right wing beliefs are associated with less integrative complexity than left wing beliefs. People with moderate liberal attitudes had the highest integrative complexity in their cognitions.\nThere have been a number of other attempts to identify \"left-wing authoritarians\" in the United States and Canada. These would be people who submit to leftist authorities, are highly conventional to liberal viewpoints and are aggressive to people who oppose left-wing ideology. These attempts have failed because measures of authoritarianism always correlate at least slightly with the right. However, left-wing authoritarians were found in Eastern", "-37.60648126085289" ], [ "rejected the term 'far-right', and instead labeled itself as 'radical right-wing'. It has also criticised media companies for labelling them as 'far-right' and has threatened to take action towards those who do. In 2014, the Supreme Court of Hungary ruled that Jobbik cannot be labeled \"far-right\" in any domestic radio or television transmissions, as this would constitute an opinion because Jobbik has refused the 'far-right' label.\nSince 2014 the party has not used the \"radical right-wing\" term to define itself, stating that Jobbik aims to represent all Hungarian people, not exclusively the right-wing of the political spectrum.\nAt its beginnings, Jobbik described", "-37.588645586303755" ], [ "less advantaged. Defence and attack have met, under democratic conditions, not in the name of class but in the name of principle; but the opposing principles have broadly corresponded to the interests of the different classes. Ideological groupings across the spectrum Generally, the left-wing is characterized by an emphasis on \"ideas such as Liberty, equality, fraternity, rights, progress, reform and internationalism\", while the right-wing is characterized by an emphasis on \"notions such as authority, hierarchy, order, duty, tradition, reaction and nationalism\".\nPolitical scientists and other analysts regard the left as including anarchists, communists, socialists, democratic socialists, social democrats, left-libertarians, progressives and", "-37.430046647226845" ], [ "and organizations by those who allege them to hold \"repressive policies\" based on their respective religions.\nIn addition, some members of the left in the United States may use it as a criticism of the Republican Party and the Christian Right in their allegations of the radical right wing implementing policies based on Fundamentalist Christianity.\nSometimes, different analogous neologisms are used by the accusers, such as allegations of \"saffronization\" used to describe or critique right-wing policies related to Hindu nationalism or as a slur used by far left and anti-Hindu groups. Radicalized Muslims often exploit the resonance with this term to attack", "-37.42776638455689" ], [ "right includes right-wing populism and various other subtypes. Eatwell argues that the extreme right' has four traits: \"1) anti-democracy; 2) nationalism; 3) racism; and 4) the strong state\". The New Right consists of the liberal conservatives, who stress small government, free markets and individual initiative.\nOther authors make a distinction between the centre-right and the far-right. Parties of the centre-right generally support liberal democracy, capitalism, the market economy (though they may accept government regulation to control monopolies), private property rights and a limited welfare state (for example, government provision of education and medical care). They support conservatism and economic liberalism and", "-37.376123280788306" ], [ "considered a far-right movement on the fringes of right-wing extremism and right-wing populism. He sees ethnonationalist and racist as well as antisemitic strands, authoritarian ideas and the rejection of equality and discrimination of minorities in activities of pro Germany, particularly the campaigning against multiculturalism, building of mosques and minarets.", "-37.311269925907254" ], [ "\"left\" than that of the central Maoist leaders at the height of the GPCR (\"Great Proletarian Cultural Revolution\"). The terms are also used retroactively to describe some early 20th century Chinese anarchist orientations. As a slur, the Communist Party of China (CPC) has used the term \"ultra-left\" more broadly to denounce any orientation it considers further \"left\" than the party line. According to the latter usage, in 1978 the CPC Central Committee denounced as \"ultra-left\" the line of Mao Zedong from 1956 until his death in 1976. Ultra-left refers to those GPCR rebel positions that diverged from the central Maoist", "-37.24224413459888" ], [ "religious right and an attempt to appeal to moderate voters; commentator Charles Krauthammer called it \"an ever so subtle Sister Souljah on Robert Bork.\"\nAlso in the 2000 campaign for the Republican nomination, Arizona Senator John McCain stated, \"Neither party should be defined by pandering to the outer reaches of American politics and the agents of intolerance, whether they be Louis Farrakhan or Al Sharpton on the left or Pat Robertson or Jerry Falwell on the right.\" This was similarly seen as a repudiation of the religious right; columnist Jacob Weisberg called it \"a pungent Sister Souljah moment.\"\nDuring the 2008 United", "-37.211755697382614" ], [ "and the Extreme Left (1876) and Radical Left (1881). The beliefs of the group called the Radical Left were actually closer to the Centre Left than the beliefs of those called the Extreme Left. Beginning in the early twentieth century, the terms \"left\" and \"right\" came to be associated with specific political ideologies and were used to describe citizens' political beliefs, gradually replacing the terms \"reds\" and \"the reaction\". Those on the Left often called themselves \"republicans\", while those on the Right often called themselves \"conservatives\". The words Left and Right were at first used by their opponents as slurs.\n\nBy", "-37.18531784634979" ], [ "the party is strong in the North despite being obscured (especially at the beginning of its history) and badly presented by national media, television and newspapers. According to a number of scholars, Lega Nord is an example of a right-wing populist, radical right, or far-right party while some see significant differences to typical European radical right-wing populist parties, or reject the label of radical right as inadequate to describe the party's ideology.\nAccording to many observers, under Matteo Salvini the party has lurched to the right, but both Salvini, a former communist; and Luca Zaia insist the party is \"neither right", "-37.159718280425295" ], [ "as \"far left\", \"liberal\", \"moderate/middle of the road\", \"conservative\", or \"far right\". Between 1989 and 1998, the survey showed negligible change in the number of professors who described themselves as far left or liberal, approximately 45%. As of 2014, surveying 16,112 professors, the percentage of liberal/far left had increased to 60%. When asked in 2012 about the significance of the findings on political views, the director of HERI, Sylvia Hurtado, said that the numbers on political views attract a lot of attention, but that this attention may be misplaced because there may be trivial reasons for the shifts. North American", "-37.130728118878324" ], [ "centrist parties, Yesh Atid is almost universally considered to be aligned with the left-leaning political bloc, and Kulanu, sometimes considered right-leaning, is a \"swing\" party not aligned with any bloc. Aftermath Yesh Atid won 11 seats in the 20th Knesset, making it the fourth-largest faction. However, it increased in popularity throughout 2017 and the first months of 2018, rivalling Likud as the biggest party in opinion polls. After the Haredim received favorable draft concessions in a negotiated deal among the government coalition, Yair Lapid denounced the arrangements as an \"insult to the IDF\" and a \"fraud\".", "-37.12338431444368" ], [ "subdivisions such as Mizrahi Jews in Israel tend to favor more right-wing parties such as Likud, with the distinction sharpening since 1980. Ashkenazi prominence on the left has historically been associated with socialist ideals that had emerged in Central Europe and the kibbutz and Labor Zionist movements, while Mizrahim, as they rose in society and they developed their political ideals, often rejected ideologies they associated with an \"Ashkenazi elite\", with the flood of Mizrahim into the ranks of Likud beginning as many enthusiastically Menachem Begin who made overtures to the community despite not being a Mizrahi himself. Although these tensions", "-37.055486473516794" ], [ "the political spectrum. Groups are sometimes associated with the political left or right, especially in international circles, according to their stance on issues important to the Arab–Israeli conflict. Political centre The political centre (represented in the Knesset by Yesh Atid and Kulanu, and in the past represented by Kadima and Gil) combines the Israeli right's lack of confidence in the value of negotiations with the Palestinians and the Arab states with the assertion of the Israeli left that Israel should reduce the Israeli presence in the areas of the West Bank. As a result, the political centre supports unilateral actions", "-37.04959334435989" ], [ "often perceived by the media, its members, and supporters to be conservative/right wing, it is worth noting that a few members are affiliated with left-wing politics in Brazil, such as Benedita da Silva, Marina Silva, and Walter Pinheiro. Influence on politics The evangelical front is often seen as part of the rising Evangelical influence in politics in Latin America. The evangelical vote was seen as key in the Impeachment of Dilma Rousseff and the election of Jair Bolsonaro in the 2018 election.", "-37.04852728090191" ], [ "tall el zaatar against the Palestinians. Secular groups Although several Lebanese militias claimed to be secular, most were little more than vehicles for sectarian interests. Still, there existed a number of non-religious groups, primarily but not exclusively of the left and/or Pan-Arab right.\nExamples of this were the Lebanese Communist Party (LCP) and the more radical and independent Communist Action Organization (COA). Another notable example was the pan-Syrian Syrian Social Nationalist Party (SSNP), which promoted the concept of Greater Syria, in contrast to Pan-Arab or Lebanese nationalism. The SSNP was generally aligned with the Syrian government, although it did not ideologically", "-37.037496870209" ], [ "a member of an academic audience a few years ago whether I thought Hamas and Hezbollah belonged to \"the global left\" and I replied with two points. My first point was merely descriptive: those political organizations define themselves as anti-imperialist, and anti-imperialism is one characteristic of the global left, so on that basis one could describe them as part of the global left. My second point was then critical: as with any group on the left, one has to decide whether one is for that group or against that group, and one needs to critically evaluate their stand. Comments on", "-37.00294977865997" ], [ "Michael Freeden has called the \"core concept\" of the right-wing populist ideology, that is the concept shared by all parties generally included in the family. Looking at the primary literature, Mudde concludes that the core concept of right-populism \"is undoubtedly the \"nation\". \"This concept\", he explains, \"also certainly functions as a \"coat-hanger\" for most other ideological features. Consequently, the minimum definition of the party family should be based on the key concept, the nation\". He however rejects the use of \"nationalism\" as a \"core ideology\" of right-wing populism on the ground that there are also purely \"civic\" or \"liberal\" forms", "-36.88375920674298" ], [ "Sinn Fein and others\", while Broad Left \"comprises members of the Socialist Party, the Socialist Workers Party, People Before Profit and others\". Newton Emerson, writing in The Irish News, characterises Unity as \"far left\" and Broad Left as \"even farther left\". Civil Service Group The Civil Service Group's executive control is vested in its Annual Delegate Conference which convenes on the day preceding the NIPSA General Conference. It is here that the Civil Service Group Executive is elected from an electoral college made up of attending branches. Despite what is often perceived as a Civil Service bias with NIPSA, it", "-36.77951209321327" ], [ "Zionist youth movement and has been supported by several Israeli politicians on the political right throughout its history. La Familia has similarly been labeled far-right and is openly against those they view as being on the left. The club has publicly condemned the group and has gone as far as barring it from a match. Some Beitar fans have expressed embarrassment over the organization and openly oppose their ideals. Incidents During a December 2007 Toto Cup semi-final game between Beitar Jerusalem and the Israeli-Arab team Bnei Sakhnin, La Familia sang provocative chants insulting the Islamic prophet Muhammad. The Israel Football", "-36.69904010836035" ], [ "were named the \"Southern Branch\". The Southern Branch is considered more moderate, while the Northern Branch is considered more radical. The northern branch was banned by the Israeli government in November 2015 due to close ties with Hamas and the Muslim Brotherhood, although it has been speculated that it may resurface as an underground organization. Before the establishment of the Movement The origins of the Islamic Movement can be traced back to the late years of the Mandatory Palestine. Early organization began in the days of the 1936–39 Arab revolt in Palestine, however, it only began gaining momentum after World", "-36.68233758211136" ], [ "On the other hand, the right-wing populist tendency of the localist movements was condemned as \"xenophobic\" and \"nativist\" by mainstream activists and the government. The conflict between the left and the right wings of the movement resulted in great disunity of the whole democratic cause.\nIn the 2012 Legislative Council election, some pan-democrat candidates, including Claudia Mo of the Civic Party and Gary Fan of the Neo Democrats, both claiming to be moderates, expressed some localist ideas and raised concerns on tourist and immigration policies. For that, they set up a parliamentary group called HK First. Legislator Wong Yuk-man, a strong", "-36.6445523154689" ], [ "sentiment and the rise of populist commentary. The general population of the right in these countries tends to hold onto these more aggressive stances and pulls the parties further to the right. These stances include populist messages with Islamophobic, isolationist, and anti-LGBTQ language. Much of the polarization in these nations leads to either a more socialist left wing party, or more nationalist right wing party. These more polarized parties grow from the discontent of more moderate parties inability to provide progressive changes in either direction. Critiques There have long been numerous scholarly debates that argue over the concept of political", "-36.55590189341456" ], [ "the Centre, and the Canadian Centre for Policy Alternatives, the Broadbent Institute, and the Parkland Institute on the left. Clark who wrote the article, noted that the think tanks may not agree with these classifications and that the \"left, right and centre paradigms\" have become \"an increasingly vague and even problematic way to view politics.\"", "-36.54573018645169" ], [ "issues like everyday conduct and dress, acceptance of diversity (including foreigners) and innovation and attitudes towards people with specific controversial lifestyles such as homosexuality and vegetarianism, as well as willingness to engage in political activism. See for Inglehart's national chart. Greenberg and Jonas: left–right, ideological rigidity In a 2003 Psychological Bulletin paper, Jeff Greenberg and Eva Jonas posit a model comprising the standard left–right axis and an axis representing ideological rigidity. For Greenberg and Jonas, ideological rigidity has \"much in common with the related concepts of dogmatism and authoritarianism\" and is characterized by \"believing in strong leaders and submission, preferring", "-36.53362911392469" ], [ "of which are ruled by the centre-left.", "-36.53011545888148" ], [ "left, but in some ways the green movement is difficult to definitively categorize as left or right. Political parties in the political spectrum Political scientists have observed that the ideologies of political parties can be mapped along a single left–right axis. Klaus von Beyme categorized European parties into nine families, which described most parties. Beyme was able to arrange seven of them from left to right: communist, socialist, green, liberal, Christian democratic, conservative and right-wing extremist. The position of agrarian and regional/ethnic parties varied. A study conducted in the late 1980s on two bases, positions on ownership of the means", "-36.51726912515005" ], [ "with left-leaning parties are more familiar with the location of the West Bank and the Gaza Strip, can sketch them more accurately and are also more aware of the nature of borders.\"", "-36.50958429049933" ], [ "moved millions of dollars between 1993 and 2003. Ideology Although the PSDB declares itself as a centrist party, some people in the left rejects this definition, especially after Fernando Henrique Cardoso embraced Third Way politics as President. According to many critics, the party is seen as neoliberal from its beginnings. Luiz Carlos Bresser-Pereira, one of the founders of the PSDB, left the party for ideological reasons, claiming \"that the party had taken a hard turn to the right\".\nIn an article titled \"The left-right confusion in the post-Berlin Wall world\", political analyst Angelo Segrillo says that \"most analysts defined PSDB as", "-36.43483867806208" ], [ "found that \"Levels of antisemitism among those on the left-wing of the political spectrum, including the far-left, are indistinguishable from those found in the general population. Yet, all parts of those on the left of the political spectrum – including the 'slightly left-of-centre,' the 'fairly left-wing' and the 'very left-wing' – exhibit higher levels of anti Israelism than average.\" It went on, \"The most antisemitic group on the political spectrum consists of those who identify as very right-wing: the presence of antisemitic attitudes in this group is 2 to 4 times higher compared to the general population.\" It continued: \"However, in relation", "-36.42631466628518" ], [ "forbids the existence of confessional parties) and is a member of the Juntos Haremos Historia coalition that endorsed leftist Andrés Manuel López Obrador, a move that brought out criticism as it was a coalition with two left-wing parties. With agnostics, atheist and nonreligious Atheist, agnostics and non-religious people are the third largest group of Latin America behind Catholics and Protestants. Coincidences with the conservative neo-Pentecostal are scarce. Although exceptions exist, non-religious in Latin America tend to be strongly culturally liberal, generally more than the average Latin American, being much more likely to support such things like secularism, abortion, same-sex marriage", "-36.41759839147562" ], [ "Ideology of the National Front (UK) The Ideology of the National Front comprises the beliefs held by the National Front, a far-right political party in the United Kingdom. These beliefs, including nationalism, racism, and opposition to Marxism, have been compared to fascism, although the party rejected the term as a description of its political stance. Far-right politics, fascism, and neo-Nazism A far right or extreme right party, the National Front had both commonalities and differences with older far-right groups. Political scientists and historians characterise it as fascist, or neo-fascist. The political psychologist Michael Billig noted that the NF displayed many", "-36.380590843677055" ], [ "believed it was intended to increase the election chances of Defence Minister Ehud Barak and Foreign Minister Tzipi Livni in the planned February elections.\nGush Shalom in one of numerous Israeli organizations pertaining to the radical left. It has been described as left-wing in the Israeli and US media.\nAvnery wrote: \nEvery left-wing body fears with terror the one who is on its left. The right-wing of the Avoda party is afraid of its left-wing. The left wing is afraid of Meretz. Meretz is afraid of Yossi Beilin, who was pushed out of the Avoda by Amram Mitzna and his leftist friends", "-36.24520724004833" ], [ "\"Uncle Sam\" political foundation is based on white supremacy, relegating nonwhites to second-class citizenship. It goes without saying that the social philosophy is strictly white supremacist. And the educational system perpetuates white supremacy.\nAfter Malcolm X made his pilgrimage to Mecca, he stated that seeing Muslims of \"all colors, from blue-eyed blonds to black-skinned Africans\", interacting as equals led him to see Islam as a means by which racial problems could be overcome. He credits his evolving views on Islam and race as a reason for leaving the Nation of Islam and his decision to convert to Sunni Islam.\n\nThe Nation", "-36.220321465007146" ], [ "described as far-right, both by the left parties and by Spanish or international press, promotes characteristic policies of the populist right, such as the expulsion of all illegal immigrants from the country -even of legal immigrants who commit crimes-, a generalized criminal tightening, combined with traditional claims of right-wing conservatives, such as the centralization of the State and the suppression of the Autonomous Communities, and has harshly criticized the laws against gender violence, approved by the socialist government of José Luis Rodríguez Zapatero, but later maintained by the PP executive of Mariano Rajoy, accusing the people and institutions that defend", "-36.21187069921871" ], [ "Institute for Jewish Policy Research (JPR) in September 2017 found that \"Levels of antisemitism among those on the left-wing of the political spectrum, including the far-left, are indistinguishable from those found in the general population. Yet, all parts of those on the left of the political spectrum – including the 'slightly left-of-centre,' the 'fairly left-wing' and the 'very left-wing' – exhibit higher levels of anti Israelism than average.\" It went on, \"The most antisemitic group on the political spectrum consists of those who identify as very right-wing: the presence of antisemitic attitudes in this group is 2 to 4 times higher compared", "-36.20233186229598" ], [ "others on the left, view nationalism, racism (including anti-Semitism) and religion as divide and conquer tactics used by the ruling classes to prevent the working class from uniting against them. Left-wing movements therefore have often taken up anti-imperialist positions. Anarchism has developed a critique of nationalism that focuses on nationalism's role in justifying and consolidating state power and domination. Through its unifying goal, nationalism strives for centralization, both in specific territories and in a ruling elite of individuals, while it prepares a population for capitalist exploitation. Within anarchism, this subject has been treated extensively by Rudolf Rocker in Nationalism and", "-36.18122896156274" ], [ "is commonly described as far-right by observers and in the international press, some media now consider that it's more difficult to classify Jobbik as it currently stands on the far-right, because of its de-demonization and Fidesz's ever-increasing right-wingisation rhetoric, or even that Jobbik is currently a right-wing party.\nThe Jobbik's strategy, moving away from its far-right roots and staking out a more centrist position, has also resulted in the emergence of more radical dissident formations, like the new party Force and Determination and Our Homeland Movement.\nDue to the disillusioning of young people because no-perspectives, decreasing living conditions and frustrating level of", "-36.1435823359061" ], [ "of church and state); and government intervention on behalf of racial, ethnic and sexual minorities and the working class. Discussion of whether the terms are useful or meaningful Libertarian writer David Boaz argued that terms left and right are used to spin a particular point of view rather than as simple descriptors, with those on the \"left\" typically emphasizing their support for working people and accusing the right of supporting the interests of the upper class; and those on the \"right\" usually emphasizing their support for individualism and accusing the Left of supporting collectivism. Boaz asserts that arguments about the", "-36.13274853990879" ], [ "of freedom and democracy.\nSome organizations have embraced Americanism but have taken its ideals further, i.e., the Ku Klux Klan believes that Americanism includes aspects of race (purity of white American) and of American Protestantism.\n\nProfessor of political science at Clemson University C. Bradley Thompson stated that, \nThe meaning of Americanism today, however, is very different. To the extent that the term is even still used, its meaning has been hijacked by both the Left and the Right. The Left most often identifies Americanism with multiculturalism, relativism, environmentalism, regulation, and welfarism — in other words, with progressivism. The Right typically identifies", "-36.072210462298244" ], [ "itself.\"\nHilary Clark of TVO's Inside Agenda blog places the IRPP in the political \"centre\" while a report prepared by George Fetherling for the Sheldon Chumir Foundation for Ethics in Leadership describes the Institute as \"centre-right.\"\nAcademic Evert Lindquist describes the IRPP as \"Canada's equivalent to the Brookings Institution.\"According to Lindquist, the Institute is generally perceived as a moderate supporter of the market system, free trade and limited government. However, the IRPP is often considered to be slightly to the left because of its links to prominent Liberals and the reformist views expressed in some of its publications.\nRegarding the IRPP's plurality, Maclean’s", "-36.0713760710787" ], [ "Right-wing terrorism Economy German economist Armin Falk et al. wrote in a 2011 article that Right-Wing Extremist Crime (REC), which includes anti-foreigner and racist motivations, is associated with unemployment rates; as unemployment rates increase, REC also increases. Right-wing populist politics In 2016 Thomas Greven suggested that right-wing populism is a cause of right-wing terrorism. More simply put, populism supports the advancement of \"the average citizen\", not the agendas of the privileged elite. Greven defines right-wing populists as those who support ethnocentrism, and oppose immigration. Because right-wing populism creates a climate of \"us versus them\", terrorism is more likely to", "-36.06360026402399" ], [ "ideas. CNN exit polls have found moderates to be rather evenly divided between the country's two main parties.\nEven though liberals as a whole tend to be the most educated ideological demographic (as indicated by the Pew Research Center), moderates tend to become increasingly conservative with increased economic prosperity, causing the professional class to be split between Republicans and Democrats. Among those who do identify as either liberal or conservative, few identify as \"far left\" or \"far right\". Most Americans either identify as \"moderate\" or as \"somewhat\" liberal or conservative.\nWhile often not mentioned in major polls and less organized than liberal", "-36.05770408990793" ], [ "politics\", the centre-left Liberal Party of Canada and the centre-right Conservative Party of Canada (or its predecessors). The historically predominant Liberal Party position themselves at the centre of the Canadian political spectrum, with the Conservative Party positioned on the right and the New Democratic Party occupying the left. Far-right and far-left politics have never been a prominent force in Canadian society. Five parties had representatives elected to the federal parliament in the 2015 election—the Liberal Party, who currently form the government; the Conservative Party, who are the official opposition; the New Democratic Party; the Bloc Québécois; and the Green", "-36.052076435182244" ], [ "Korean right or conservative side for being too positive on North Korean topics, and for \"liberal, left-leaning\" bias. On the other hand, the left, also described as liberals and progressives, represented among others by The Hankyoreh newspaper, are critical of the changes such as removing any mentions of the Geochang massacre and excluding photos of the first North–South summit, which they have described as biased towards a conservative view of history and the state that lends legitimacy to the pre-democratic, authoritarian, conservative governments. In particular, the regime of Park Chung-hee, the father of the then current Korean president, Park Geun-hye,", "-36.03255231643561" ], [ "its splinter groups adopted increasingly extreme views.\nEDL members usually reject the description of them being \"far-right\", or \"racist\". They often place great importance on being working-class and display clear bonds with their local communities. Many cite coming from families who were Labour voters and sometimes trade unionists, but also express anger at Labour, regarding it as the party of multiculturalism, political correctness, and mass immigration. Among EDL members, there is much talk of \"stupid lefties\" who were believed to hate the white working class. Casual factors Meadowcroft and Morrow suggested that the EDL overcame the collective action problem by offering", "-36.01506720256293" ], [ "my name and I was shocked.\" Thio was quoted as saying in the interview.\nShe added, \"I don't know what right wing is. This is funny because I was always considered a political leftie and now I'm a rightie.\"", "-36.002170352614485" ], [ "alternating anti-clericalism with a pro-Catholic Church stance and Europeanism with a marked Euroscepticism and ultimately abandoning much of its original pacifism and uncompromising environmentalism. Lega Nord is now often regarded as a right-wing populist party. Party leaders generally reject the \"right-wing\" label, though not the \"populist\" label. In 2008, Umberto Bossi explained in an interview that Lega Nord is \"libertarian, but also socialist\" and that the right-wing ideology he prefers is an anti-statist one with a \"libertarian idea of a state which does not weigh on citizens\". When asked to tell his most preferred politician of the 20th century, he", "-35.96093840821413" ], [ "Sunni Muslim community, forging alliances with other anti-establishment leftist parties such as the Progressive Socialist Party (PSP) led by Kamal Jumblatt and the Lebanese Communist Party (LCP). In 1969 the INM became a member of the \"Front for Progressive Parties and National Forces\" (FPPNF), later reorganized in 1972 as the Lebanese National Movement (LNM). Consistent with its Pan-Arab ideals, the radical INM was a staunch advocate of the Palestinian cause in Lebanon since the late 1960s, cultivating close political and military ties with the Palestine Liberation Organization (PLO) in the immediate pre-war years. 1975–76 civil war When the Lebanese", "-35.94671486626612" ], [ "nor left\" while Roberto Maroni, another former leftist, stated that \"we are a big political movement which has in its platform issues and people of right and left\". Platform and policies The party usually takes a socially conservative stance on social issues, such as abortion, euthanasia, medical embryonic stem cell research, artificial insemination, same-sex marriage (although there is an association called Los Padania, where \"Los\" stands for \"free sexual orientation\", linked to the party and Lega Nord was once in favour of same-sex marriage) and drug use (although it did once support the legalization of marijuana along with Marco Pannella's", "-35.93325701545109" ], [ "except those on the hard left. According to Kassab, \"We are neither a right-wing party nor a left-wing nor a centrist party\". \nIn many Brazilian states, the PSD took a classic liberal stance on economics and had good election results. The party has good relationships with major political parties such as the centre-left Brazilian Socialist Party, the conservative liberal Progressive Party, the centrist PTB, the evangelical Brazilian Republican Party and the social democratic Popular Socialist Party. Since its inception, the party has been associated with fusions with other parties, primarily the PP and PSB. It has endured on the Brazilian", "-35.912288438528776" ], [ "the electorate of the party has been very diverse on a left-right scale. At the 1992 general election, for instance, 25.4% of the party supporters were former Christian Democratic voters, 18.5% Communists, 12.5% Socialists and 6.6% former voters of the post-fascist Italian Social Movement. According to a 1996 Abacus poll, 28.7% of LN voters identified as centrist, 26.3% as right-wingers and 22.1% as left-wingers.\nIt is quite difficult to define it in the left-right spectrum because it is variously conservative, centrist and left-wing with regard to different issues. For example, the party supports both liberal ideas such as deregulation and social", "-35.864321845176164" ], [ "branch of the Arab Nationalist Movement (ANM), a radical pan-Arab movement. During the 1960s Ibrahim was a leading figure in the leftist tendency with the ANM. This tendency, led by Naif Hawatmeh, argued that the ANM ought to adopt a Marxist outlook. This was opposed by the top ANM leader George Habash who, although being open to introducing Marxist concepts like anti-imperialism into the discourse of the ANM, wanted to retain the anti-communist character of the organization.\nAs the central leadership of ANM had shifted to Damascus, the Lebanese branch began to function more autonomously. The official ANM organ al-Hurriya ('Freedom'),", "-35.82127863180358" ], [ "conservative and right-wing members. A similar group, the Republican Independents also existed, uniting most of the far-right.", "-35.815873054554686" ], [ "instead of the left or the right\".", "-35.78474204367376" ], [ "meant to refer to the same thing, the understanding of them as different groups derives from the fact that the movement had a right and left wing, with the Magic Realists on the right — many later supporting fascism or accommodating to it— and the verists we associate as the Neue Sachlichkeit on the left — fighting against fascism. The two groups in addition to having different political philosophies likewise had different artistic philosophies.\nThe third movement that is important to include in post-expressionism, and which Roh excluded, is the reaction to Flemish Expressionism, as opposed to strains of German expressionism", "-35.782990255363984" ], [ "Right-wing populism Definition Classification of right-wing populism into a single political family has proved difficult and it is not certain whether a meaningful category exists, or merely a cluster of categories since the parties differ in ideology, organization and leadership rhetoric. Unlike traditional parties, they also do not belong to international organizations of like-minded parties, and they do not use similar terms to describe themselves.\nCas Mudde argues that two definitions can be given of the \"populist radical right\": a maximum and a minimum one, with the \"maximum\" group being a subgroup of the \"minimum\" group. The minimum definition describes what", "-35.768497118813684" ], [ "the U.S. government and American politicians, and the general attitude of Muslims toward Israel.\nMuslims For America has consistently expressed a zero tolerance policy for any kind of terrorism, \"in following the example left by Prophet Muhammad.\"\nIn 2010, co-founder Muhammad Ali Hasan announced that he would be leaving the Republican Party citing the party's bigotry against Muslims, undocumented immigrants, and gays. His mother Seeme has also criticized the party for its opposition to the Park51 Muslim community center, claiming that \"The past few years in the Republican party has been constant humiliation for Muslims.\"", "-35.760684648994356" ], [ "Left–right paradigm The left–right paradigm as political criticism Used in another context, the phrase refers to a political theory that alleges that members of opposing major political parties such as the Republican and Democratic parties in the United States share common interests and goals, as well as a covertly unified ruling authority over the political issues of the masses. The two major political entities act in concert to create divisiveness among the population while keeping control of the political spectrum.\nThis \"left–right paradigm\" concept theorizes that the two opposing political parties utilize their tremendous hold over mainstream media to dramatize political", "-35.74909253185615" ], [ "(based on hatred of particular religious, racial or ethnic groups), and those that are mainly anti-government, rejecting federal authority in favor of state or local authority, or rejecting government authority entirely. It may include groups and individuals that are dedicated to a single issue, such as opposition to abortion or immigration.\" Social stratification Right-wing politics involves in varying degrees the rejection of some egalitarian objectives of left-wing politics, claiming either that social or economic inequality is natural and inevitable or that it is beneficial to society. Right-wing ideologies and movements support social order. The original French right-wing was called \"the", "-35.74303196603432" ], [ "Left United Front The Left United Front is a coalition of political parties in Kerala, India. The Left United Front was launched in March 2014, by the RMP, the SUCI-C and the MCPI(U). According to RMP state chairman T.L. Santhosh, the goal of the Left United Front is to fight \"[...] against anti-people policies, corruption, communalism and murder politics of the existing fronts\".\nThe front fielded M. Shajarkhan in the Thiruvananthapuram seat.", "-35.72403879871126" ], [ "IDW tend to skew toward the left on most political issues, despite also including a number of prominent conservatives who do not.\nSources disagree on what, if any unifying factors exist throughout the IDW. Psychology Today characterized it as \"generally concerned about political tribalism and free speech\", or as a rejection of \"mainstream assumptions about what is true\". Salon dubbed it a politically conservative movement united more over a rejection of American liberalism than over any mutually shared beliefs. Alternatively, the National Review posited that, despite comprising \"all political persuasions\", IDW was united in a particular conservative leaning conceptualization of injustice", "-35.69764298503287" ], [ "Political ideologies in the United States Prominent ideologies Beyond the simple left–right analysis, liberalism, conservatism, libertarianism and populism are the four most common ideologies in the United States, apart from those who identify as moderate. Individuals embrace each ideology to widely varying extents. Liberals and progressives traditionally advocate strong civil liberties, social progressivism, cultural pluralism and a mixed economy featuring more government intervention in the economy and social life (such as education and health care.) than supported by most other Americans. Conservatives commonly defend the notional status quo of some point in the past, believing that the United States has", "-35.69158899929607" ], [ "national party that defends itself as a centrist party is Citizens, whose platform is been increasingly perceived as right-wing by the Spanish citizens as the Centro de Investigaciones Sociológicas surveys show. In April 2018 Ciudadanos obtained a 6,77, when ranging political parties from 1 to 10, where 1 was farthest left and 10 its equivalent in the right. It first entered the Cortes Generales in 2015.\nIn Catalonia, where the party was born, many people even consider it as an extreme right-wing party, considering its fierce \"opposition to nationalism\". Not even the media agree on its place and several newspapers from", "-35.67501325227704" ], [ "(including Umberto Bossi, Roberto Maroni and Marco Formentini) has tended to be the left-wing of the party while that from the province of Bergamo (notably Roberto Calderoli) has tended to be more conservative. In fact, both Bossi and Maroni hailed from the far-left of the political spectrum, having been active in the Italian Communist Party, il manifesto movement, the Party of Proletarian Unity, Proletarian Democracy and the Greens before starting Lega Lombarda; and conceived Lega Nord as a centre-left (and to some extent social-democratic) political force. From the left came also Marco Formentini, a long-time member of the left-wing of", "-35.67153318814235" ], [ "Slovenian National Party Ideology Although the party usually refuses to position itself within a left–right political spectrum, its president Zmago Jelinčič Plemeniti defined himself as leftist in a 2000 interview for the magazine Mladina. However, the descriptions others have given the party range from left-wing to far-right, including right-wing. According to researchers at the University of Ljubljana, the SNS combines elements of right-wing and left-wing ideology and is not strictly a left-wing, nor a right-wing party, but nevertheless leans closer to the left. The party has been seen espousing more leftist economic policies (such as opposing privatization of key national", "-35.664132618752774" ], [ "mediatory priesthood and an historic episcopate, which are often the only constants amid diversity that ranges from extreme traditionalism to radical experimentation. Julie Byrne comments: \"Independents vary widely, ranging from right to left in the political spectrum. On the right traditionalist churches practice versions of Catholicism more conservative than Rome. These include the Society of St. Pius X, founded by Marcel Lefebvre, as well as the Mount St. Michael's community in Spokane, Washington, and actor Mel Gibson's church in Malibu, California, which made headlines when he directed the movie, The Passion of the Christ in 2004. On the left stand", "-35.65696308249608" ], [ "for a number of paleoconservative outlets. The Alt-right was influenced by paleoconservatism, the Dark Enlightenment, and the Nouvelle Droite. Unlike paleoconservatism, it is an explicitly white supremacist movement.", "-35.64489516650792" ], [ "as \"extreme right\" and \"radical right-wing populist\", reflecting a spectrum of ideologies present among its members. In its far-right wing, it includes members such as Ulrich Schlüer, Pascal Junod, who heads a New Right study group and has been linked to Holocaust denial and neo-Nazism.\nIn Switzerland, radical right populist parties held close to 10% of the popular vote in 1971, were reduced to below 2% by 1979 and again grew to more than 10% in 1991. Since 1991, these parties (the Swiss Democrats and the Swiss Freedom Party) have been absorbed by the SVP. During the 1990s, the SVP grew", "-35.638142150550266" ], [ "balkanization of American Catholics into so-called right wing and left wing, or progressive and traditionalist, factions, who point fingers at each other\". Speaking at a meeting of the College Theology Society he said that: \"In my opinion, finger pointing does a great harm to religious life because it makes us defensive ... [and] we feel constantly compelled to defend ourselves against other parties in the church.\"\nIn May 2016, Tobin was named to oversee the Sodalitium Christianae Vitae, a religious community that a Vatican review had found in need of thorough-going reform. Cardinal On October 9, 2016, Pope Francis announced that", "-35.629466510697966" ] ]
2stzdx
How do people create these amazingly looking space/Milky Way photos? I can barely see a few stars in the nights sky.
[ "Long exposure is one way to do it, yes, but astrophotographers also use a technique called \"stacking\", where they stack multiple layers of shorter exposure pictures over one another. Some people prefer to use this method over taking a single long exposure because it's usually easier to fine tune your picture. For example, if your camera runs out of battery, or something moves in shot that shouldn't be there, or you accidentally bump the camera, it's a lot easier to edit that in post processing and simply remove those frames rather than have your whole long exposure ruined. Also, this method might cut your shooting time in half. But stacking isn't better than long exposure or vice versa and it's really all up to the person taking the picture to decide.", "One of the biggest factors in seeing stars is being far from light pollution. Here is a page with maps of which areas are best for stargazing. URL_0 ", "Long exposures are one way. The stars are faint so a camera is made to keep its shutter open for a long time to pick up more light. Due to the movement of the Earth there may also need to be a way to stay pointed the same direction.", "It's not until you get well away from habitation that you realise how much \"Light Pollution\" exists. The long exposure shots from the middle of the desert do \"over exaggerate\" the effect, but get far enough away from the city and suburbs, and you will be astounded at how many stars you can see. And to go one better , even a modest pair of binoculars will make a huge difference in terms of the fainter stars.", "You should see the sky from where I live. I live in Lake County, CA. The least populous county in CA and we are in the mountains. The night sky is spectacular up here." ]
[ [ "\"star field plate\". Each globe was illuminated using a 1,500-watt lamp that was located in its center. A number of aspherical condenser lenses were placed within each globe to focus the light onto the plates. Twenty-three of the most prominent stars had their own projectors, designed to project a small disk instead of pinpoint of light, and were also colored: Betelgeuse and Antares would appear reddish, Rigel and Spica would each have a blue tinge. An image of the Milky Way was created by using drum-type projectors that were studded with unfocused pinprick-sized holes based on photographic images of our", "-36.82565523051744" ], [ "used rarely (in the 2000s) to take sky photos on 4x5 inch flat plastic film plates. Its guiding telescopes are used mostly to watch stars and planets - e.g. a Pluto-hunt every spring, for which the guider is barely big enough to allow the human eye to see it under good seeing conditions.", "-36.64453010587022" ], [ "by visual observation (rather than by examining photographic plates or other recorded images).\nIn 1895 he joined the University of Chicago as professor of astronomy. There he was able to use the 40-inch (1,000 mm) telescope at Yerkes Observatory. Much of his work during this period was taking photographs of the Milky Way. Together with Max Wolf, he discovered that certain dark regions of the galaxy were actually clouds of gas and dust that obscured the more distant stars in the background. From 1905, his niece Mary R. Calvert worked as his assistant and computer.\nThe faint Barnard's Star is", "-35.90231089831286" ], [ "Full-sky Astrometric Mapping Explorer Full-sky Astrometric Mapping Explorer (or FAME) was a proposed astrometric satellite designed to determine with unprecedented accuracy the positions, distances, and motions of 40 million stars within our galactic neighborhood (distances by stellar parallax possible). This database was to allow astronomers to accurately determine the distance to all of the stars on this side of the Milky Way galaxy, detect large planets and planetary systems around stars within 1,000 light years of the Sun, and measure the amount of dark matter in the galaxy from its influence on stellar motions. It was to be a", "-35.790337935395655" ], [ "of photographs and picked what was best for the film. Lubezki said that they based the visuals on descriptions from astronauts, with some artistic license in depicting how the stars looked during the daytime in space. He wanted to incorporate the stars as much as possible to feel as deep as possible and avoid plain darkness and two dimensional feeling.\nCuarón asked Lubezki to start the film with a brightly lit Earth. This scene was challenging for the team to shoot because the light was constantly changing from one frame to the other with the earth and ISS moving, and the", "-34.9341088141955" ], [ "The picture on the right is a wide-field view of the Orion Nebula (Messier 42), lying about 1350 light-years from Earth, taken with the VISTA infrared survey telescope at ESO's Paranal Observatory in Chile. The telescope's huge field of view allows the whole nebula and its surroundings to be imaged in a single picture and its infrared vision also means that it can peer deep into the normally hidden dusty regions and reveal the curious antics of the very active young stars buried there. An image of the \"Blue Lagoon\" is seen on the left (below the Flame Nebula picture)", "-34.71370846935315" ], [ "is a popular hobby among photographers and amateur astronomers. Images of the night sky can be obtained with the most basic film and digital cameras. For simple star trails, no additional equipment may be necessary other than common tripods. There is a wide range of commercial equipment geared toward basic and advanced astrophotography. Amateur astronomers and amateur telescope makers also use homemade equipment and modified devices. Media Images are recorded on many types of media and imaging devices including single-lens reflex cameras, 35 mm film, digital single-lens reflex cameras, simple amateur-level and professional-level commercially manufactured astronomical CCD cameras, video cameras,", "-34.6249181643534" ], [ "— it is an infrared image taken as part of the VVV survey. It shows the stellar nursery called the Lagoon Nebula (also known as Messier 8), which lies about 4000–5000 light-years away in the constellation of Sagittarius (the Archer).\nVISTA can also stare far beyond our galaxy. In the example on the left (below the image of the Orion Nebula) the telescope took a family photograph of a cluster of galaxies in the constellation of Fornax (the Chemical Furnace). The wide field allows many galaxies to be captured in a single image including the striking barred-spiral NGC 1365 and the", "-34.592877842864254" ], [ "and the Orion Nebula (M42). This is a spectacular object that can be clearly identified with the naked eye as something other than a star. Using binoculars, its clouds of nascent stars, luminous gas, and dust can be observed. The Trapezium cluster has many newborn stars, including several brown dwarfs, all of which are at an approximate distance of 1,500 light-years. Named for the four bright stars that form a trapezoid, it is largely illuminated by the brightest stars, which are only a few hundred thousand years old. Observations by the Chandra X-ray Observatory show both the extreme temperatures of", "-34.541332779648656" ], [ "itself is 王良四 (Wáng Liáng sì, English: the Fourth Star of Wang Liang). Visibility With a declination of 56° 32' North, α Cassiopeiae is principally visible in the northern hemisphere. The star is detectable to most observers across the globe reaching as far south as Perth, Australia, Santiago, Chile and other settlements north ± 33° South latitude, albeit close to the horizon. α Cassiopeiae is located in line-of-sight of the Milky Way galaxy, so there are other notable celestial objects one can view close to this star—the Pacman Nebula, NGC 436 and NGC 457 being a few.\nAlpha Cas reaches", "-34.465146974624076" ], [ "above human height. See top-down perspective.\nRecent technological and networking developments have made satellite images more accessible. Microsoft Bing Maps offers direct overhead satellite photos of the entire planet but also offers a feature named Bird's eye view in some locations. The Bird's Eye photos are angled at 40 degrees rather than being straight down. Satellite imaging programs and photos have been described as offering a viewer the opportunity to \"fly over\" and observe the world from this specific angle.\nIn filmmaking and video production, a bird's-eye shot refers to a shot looking directly down on the subject. The perspective is very", "-34.40899966577854" ], [ "northern skies for there are few other bright stars in its vicinity. Observational history Astrophotography, the photography of celestial objects, began in 1840 when John William Draper took an image of the Moon using the daguerreotype process. On July 17, 1850, Vega became the first star (other than the Sun) to be photographed, when it was imaged by William Bond and John Adams Whipple at the Harvard College Observatory, also with a daguerreotype. Henry Draper took the first photograph of a star's spectrum in August 1872 when he took an image of Vega, and he also became the first person", "-34.31076225556535" ], [ "images and compare them to star catalogs containing up to a billion or so star positions to see if one of the \"stars\" is actually a precovery image of the newly discovered object. This technique has been used since the mid-1990s to determine the orbits of an enormous number of minor planets. Examples In an extreme case of precovery, an object was discovered on December 31, 2000, designated 2000 YK66, and a near-Earth orbit was calculated. Precovery revealed that it had previously been discovered on February 23, 1950 and given the provisional designation 1950 DA, and then been lost for", "-34.29057433723574" ], [ "to show that stars were disks of a certain size. This would imply that the stars were many times larger than our sun (they were not aware of supergiant or hypergiant stars, but some were calculated to be even larger than the size of the whole universe estimated at the time). However, the disk appearances of the stars were spurious: they were not actually seeing stellar images, but Airy disks. In reality, the actual images of almost all stars, even using the best telescopes with the largest apertures, look like mere points of light. Astronomer Royal In June 1835", "-34.26591931012808" ], [ "images in spectral bands ranging from radio to gamma-rays There are also thousands of individual study images of various astronomical objects from space telescopes such as the Hubble Space Telescope, the Spitzer Space Telescope in infrared, the Chandra X-ray Observatory, COBE, WMAP, ROSAT, IRAS, GALEX as well as many other space and ground-based telescopes. Sky mode also shows the Sun, Moon, planets, and their moons in their current positions.\nUsers can add their own image data from FITS files or can convert them to standard image formats such as JPEG, PNG, TIFF. These images can be formatted with the astronomical", "-33.89089319312836" ], [ "Japan. Time exposure photographs The photographs produced were time exposures in which a satellite's track appeared as a long, usually slightly curved, line seen against a background of stars. If the camera were stationary, the tracks of the much more slowly moving stars appeared as much shorter lines, which were portions of arcs about the pole. If the volunteer had a motor-driven polar-axis camera mount that countered the earth's rotation, the stars were represented by dots whose sizes depended on the resolution of the camera lens and the magnitude of the star.\nWith knowledge of the camera's latitude/longitude position and its", "-33.82238254310505" ], [ "shows a triplet of bright galaxies in the constellation of Leo (The Lion), together with a multitude of fainter objects: distant background galaxies and much closer Milky Way stars. The image hints at the power of the VST and OmegaCAM for surveying the extragalactic Universe and for mapping the low brightness objects of the galactic halo. The image on the left is a composite created by combining exposures taken through three different filters. Light that passed through a near-infrared filter was coloured red, red light is coloured green, and green light is coloured magenta.", "-33.8174776644737" ], [ "light-years away, and at magnitude 5.8 it is bright enough to be seen by the naked eye under dark skies. Being a diffuse object, it is challenging to see under light-polluted skies, even with a small telescope or binoculars, and low power is required to view it. It is a spiral galaxy with a diameter of 46,000 light-years and is thus smaller than both the Andromeda Galaxy and the Milky Way. A distance of less than 300 kiloparsecs between it and Andromeda supports the hypothesis that it is a satellite of the larger galaxy. Within the constellation, it lies near", "-33.68913951439754" ], [ "to 60 minutes with a 36 in (91 cm) reflecting telescope that he constructed in the backyard of his home in Ealing, outside London. These images for the first time showed stars too faint to be seen by the human eye.\nThe first all-sky photographic astrometry project, Astrographic Catalogue and Carte du Ciel, was started in 1887. It was conducted by 20 observatories all using special photographic telescopes with a uniform design called normal astrographs, all with an aperture of around 13 in (330 mm) and a focal length of 11 ft (3.4 m), designed to create images with a uniform scale on the photographic plate of", "-33.53906944980372" ], [ "revolving around light and its properties (optical illusions, the appearance and quality of color, etc.) and integrate patterns that are directly inspired from the \" Star Crossings \". Photography The photographs she made of her transparent sculpture in 1969 opened up a new field of experimentation. Photographing the sky at night, she experimented with the movements of stars which are recorded : multicolored curved lines of different lengths and thicknesses. The next set of photographs recorded the sky with two long exposures at varying degrees: the artist intervened only to move the camera and obtained the « Star Crossings ». The poetical nature", "-33.340282910612586" ], [ "include some of the brightest stars in the Milky Way galaxy.\nCalculating its distance is difficult due to the proximity of the Coalsack Nebula, which obscures some of its light. Observation The Jewel Box cluster is regarded as one of the finest objects in the southern sky.\nIt is visible to the naked eye as a hazy object of the fourth magnitude. It can be easily located using the star Beta Crucis as a guide, and appears as a fourth magnitude object. It is impressive when viewed with binoculars or a small or large telescopes. Three members along the crossbar of the", "-33.330616682738764" ], [ "foreground stars in the Milky Way lie within it; thus, almost all of the 3,000 objects in the image are galaxies, some of which are among the youngest and most distant known. By revealing such large numbers of very young galaxies, the HDF has become a landmark image in the study of the early universe.\nThree years after the HDF observations were taken, a region in the south celestial hemisphere was imaged in a similar way and named the Hubble Deep Field South. The similarities between the two regions strengthened the belief that the universe is uniform over large scales and", "-33.29899246219429" ], [ "Digital Sky Survey. Both of these stars being cool red giants, they are extremely bright which is one of the key factors in their discovery. Their distance was estimated with a number of different techniques, which all pointed towards 900,000 light years away. Distance ULAS J0015+01 is, at the current time, 900,000 light years away from the Milky Way galaxy. The Milky Way's disk is 180,000 light years in diameter, putting it far beyond the Milky Way stellar disk, or only 3 times closer than the Andromeda galaxy. In comparison, in distance to the Milky Way's satellite galaxy, the Large", "-33.25643672639853" ], [ "single small region of the sky but next-generation planet-hunting space telescopes, such as TESS and CHEOPS, will examine nearby stars throughout the sky.\nNearby stars with planets can then be studied by the upcoming James Webb Space Telescope and future large ground-based telescopes to analyze atmospheres, determine masses and infer compositions. Additionally the Square Kilometer Array would significantly improve radio observations over the Arecibo Observatory and Green Bank Telescope.", "-33.25326084275508" ], [ "since that time his pictures have been introduced in various other periodicals, including the NASA web page Astronomy Picture of the Day. In 2006 he published some of his astronomy photographs in his book Light in the Sky: Photographs of the Universe.\nSteve Mandel has also cooperated with the Kitt Peak National Observatory Visitor Center, presenting educational Nightly Observer Program and Advanced Observer Program to the public. In 2004 he founded the Advanced Imaging Conference in San Jose, California, where about 250 amateur astronomers and manufacturers of astronomical equipment and software meet annually to discuss technology, imaging techniques and possibilities of", "-33.16356169847131" ], [ "country so in 2014, he bought Working holiday visa and travelled to New Zealand. Working on fruit orchards for 4 months, he was able to earn enough money for his only goal: to travel to the Cook Islands and to capture (probably) historically the first nightscape photograph with the Milky Way over the popular Aitutaki Island. ESO Photo Ambassador In January 2015, Petr Horálek became the 22nd Photo Ambassador of the European Southern Observatory. He focuses mostly on Ultra-hd fulldome and panoramatic images of the night sky over ESO observatories, which can be freely used in digital planetariums. With this", "-33.1297701827134" ], [ "Baade's Window Baade's Window is an area of the sky with relatively low amounts of interstellar \"dust\" along the line of sight from the Earth. This area is considered an observational \"window\" as the normally obscured Galactic Center of the Milky Way is visible in this direction. It is named for astronomer Walter Baade who first recognized its significance. This area corresponds to one of the brightest visible patches of the Milky Way. History Walter Baade observed the stars in this area in the mid-1940s using the 100-inch (2.5 m) Hooker telescope at Mount Wilson Observatory in California while searching", "-33.091698303222074" ], [ "Hidden Universe 3D Description This documentary takes audiences on a journey deep into space through real images captured by the world’s most powerful telescopes. High-resolution images of space allow moviegoers to explore the earliest galaxies, watch stars being born in vivid clouds of gas and dust, tour the surface of Mars and witness images of distant celestial structures including stunning views of the Sun. These new images offer fresh insight into the origins and evolution of the universe.\nThe movie is produced by December Cinema Productions in association with Film Victoria, Swinburne University of Technology, and the European Southern Observatory (ESO).", "-33.08401276531367" ], [ "century), one had to be able to discern these two stars with the naked eye.\nFrom a historic point of view, this excellent knowledge of the sky goes back to Ulug Beg (AD1394-1449; Taraghay by his real name), astronomer, mathematician and viceroy in Samarkand whose empire spread as far as Central Asia. Turning away from his royal obligations, he examined celestial bodies and astronomical questions of his time. He is the first to precisely measure Saturn's revolution period (Sanchir) with a sextant of 40 meters radius. Myths and legends Mongolians are particularly attached to the Great Bear. This constellation is", "-33.06257626553645" ], [ "Tycho-2 Catalogue Catalogue The astrometric reference catalogue contain positions, proper motions, and two-color photometric data for 2,539,913 of the brightest stars in the Milky Way, of which about 9000 are visible to the naked eye. Components of double stars with separations down to 0.8 arcseconds are included. The catalogue is 99% complete to magnitudes of V~11.0 and 90% complete to V~11.5. (, Table 1)\nThe Tycho-2 positions and magnitudes are based on the observations collected by the star mapper of the European Space Agency's Hipparcos satellite. They are the same observations used to compile the Tycho-1 Catalogue (ESA SP-1200, 1997). However,", "-33.01228775232448" ], [ "used by professional astronomers to measure the quality of observing locations for major telescopes. Capturing star trail images Star trail photographs are captured by placing a camera on a tripod, pointing the lens toward the night sky, and allowing the shutter to stay open for a long period of time. Star trails are considered relatively easy for amateur astrophotographers to create. Photographers generally make these images by using an SLR camera with its lens focus set to infinity. A cable release allows the photographer to hold the shutter open for the desired amount of time. Typical exposure times range from", "-32.96145771593001" ], [ "landmark stars, and \"hopping\" between them, often with the aid of a finderscope. Because of its simplicity, star hopping is a very common method for finding objects that are close to naked-eye stars.\nMore advanced methods of locating objects in the sky include telescope mounts with setting circles, which assist with pointing telescopes to positions in the sky that are known to contain objects of interest, and GOTO telescopes, which are fully automated telescopes that are capable of locating objects on demand (having first been calibrated). Mobile apps The advent of mobile applications for use in smartphones has led to", "-32.949787840552744" ], [ "Andrew Rogers (artist) Satellite Imagery Rogers' works are of such proportions that they have been captured in photographs taken by satellite from distances between 440 and 770 km (273–480 miles) above the earth's surface. They can be easily observed in Google Earth’s satellite imagery which has been used to create a tour of the 'Rhythms of Life' Land art project.", "-32.841737591064884" ], [ "object, with 29-inch (740 mm)-diameter spheres attached at each end representing the night sky for the northern and southern hemispheres. Connecting the two spheres was a framework that held nearly 150 individual projectors, including those dedicated to the planets, the Sun, and specific stars.\nEach globe held representations of almost 4,500 stars per hemisphere. The \"stars\" were created by tiny holes that were punched into copper foil, ranging from 0.023 to 0.452 mm in size, the larger holes letting more light get through and thereby creating brighter star images. Two glass plates held this foil between them to create what was called a", "-32.83054255539173" ], [ "clouds. In addition to the Arabian Peninsula and Madagascar, almost the entire coastline of Africa is clearly visible. The Asian mainland is on the horizon.\nNASA has also applied the name to a 2012 series of images which cover the entire globe at relatively high resolution. These were created by looking through satellite pictures taken over time in order to find as many cloudless photographs as possible to use in the final images. The photograph The photograph, taken on December 7, 1972, at 05:39 a.m. EST (10:39 UTC), is one of the most widely distributed photographic images in existence. The image is", "-32.737575840903446" ], [ "Makemake was only a few degrees from the ecliptic near the border of Taurus and Auriga at an apparent magnitude of 16. This position was also very near the galactic equator, making it almost impossible to find such an object within the dense concentration of background stars of the Milky Way. In the fourteen years of looking for planets, Tombaugh looked for motion in 90 million star images. Interest in UFOs Tombaugh was probably the most eminent astronomer to have reported seeing unidentified flying objects. On August 20, 1949, Tombaugh saw several unidentified objects near Las Cruces, New Mexico.", "-32.72918531132018" ], [ "galaxy. Specific projectors could imitate the light changes of such variable stars as Algol or Omicron Ceti, and other projectors could produce images of the constellations, of specific historical comets, compass points and other astronomical phenomena. When a particular star or planet dipped below the artificial horizon, a gravity-based mercury-filled shutter would be activated, blocking out the light. Recent developments in planetarium projector technology Since the release of the Evans & Sutherland Digistar in 1983 a single projector with a fish eye lens was able to for the first time show stars from points of view or than Earth's surface,", "-32.7233999421951" ], [ "stars; the central solid is animated by chameleons climbing through the frame as it whirls in space. Escher possessed a 6 cm refracting telescope and was a keen-enough amateur astronomer to have recorded observations of binary stars. Levels of reality Escher's artistic expression was created from images in his mind, rather than directly from observations and travels to other countries. His interest in the multiple levels of reality in art is seen in works such as Drawing Hands (1948), where two hands are shown, each drawing the other. The critic Steven Poole commented that\nIt is a neat depiction of one of", "-32.70265083757113" ], [ "large as the Hubble Space Telescope) that had taken the photograph, and when it was taken. Spotting satellites Satellite watching is generally done with the naked eye or with the aid of binoculars since most low Earth orbit satellites move too quickly to be tracked easily by telescope. It is this movement, as the satellite tracks across the night sky, that makes them relatively easy to see. As with any sky-watching pastime, the darker the sky the better, so hobbyists will meet with better success further away from light-polluted urban areas. Because geosynchronous satellites do not move relative", "-32.69705347232775" ], [ "Oort constants Historical significance and background By the 1920s, a large fraction of the astronomical community had recognized that some of the diffuse, cloud-like objects, or nebulae, seen in the night sky were collections of stars located beyond our own, local collection of star clusters. These galaxies had diverse morphologies, ranging from ellipsoids to disks. The concentrated band of starlight that is the visible signature of the Milky Way was indicative of a disk structure for our galaxy; however, our location within our galaxy made structural determinations from observations difficult.\nClassical mechanics predicted that a collection of stars could be supported", "-32.69232343402837" ], [ "Sagittarius Window Eclipsing Extrasolar Planet Search Area examined The stars that were monitored in this astronomical survey were all located in the Sagittarius-I Window. The Sagittarius Window is a rare view to the Milky Way's central bulge stars: our view to most of the galaxy's central stars is generally blocked by lanes of dust. These stars in the galaxy's central bulge region are approximately 27,000 light years from Earth.", "-32.69008725298045" ], [ "be spotted by these surveys, and near the plane of the Milky Way, where it would be difficult to distinguish from the numerous stars. This search included the archival data from the Catalina Sky Survey to magnitude c. 19, Pan-STARRS to magnitude 21.5, and infrared data from the Wide-field Infrared Survey Explorer (WISE) satellite. They have more recently also searched the first year data release from the Zwicky Transient Facility without identifying Planet Nine.\nOther researchers have been conducting searches of existing data. David Gerdes, who helped develop the camera used in the Dark Energy Survey, claims that software designed to", "-32.672662062745076" ], [ "of 1.3·10¹⁵. Maccone suggests that this should be enough to obtain detailed images of the surfaces of extrasolar planets. Other uses of the mission Even without using the Sun as the lens, FOCAL could perform various, otherwise impossible measurements: a telescope could be used to measure stellar distances by parallax, which would, using the baseline of 550 AU, measure the precise position of every star in the Milky Way, enabling various further scientific discoveries. It could also study the interstellar medium, the heliosphere, observe gravitational waves, check for the possible variation of the gravitational constant, observe the cosmic infrared background,", "-32.662757090050945" ], [ "fitted with an infrared detector purchased from a military contractor was used by Eric Becklin in 1966 to determine the center of the Milky Way for the first time.\nIn 1968, the first large-area near-IR (2.2 µm) survey of the sky was conducted by Gerry Neugebauer and Robert B. Leighton using a 157 cm reflecting dish they had built in the early 1960s. Known as the Caltech Infrared Telescope, it operated in an unguided drift scanning mode using a lead(II) sulfide (PbS) photomultiplier read out on paper charts. The telescope is now on display at the Udvar-Hazy Center, part of the Smithsonian Air", "-32.637367642288154" ], [ "viewing of user data. Virtually all of the data types and visualizations in WorldWide Telescope can be run using supplied user data either locally or over the network. Any of the above viewing modes allow the user to browse and load equirectangular, fisheye, or dome master images to be viewed as planet surfaces, sky images or panoramas. Images with Astronomy Visualization Metadata (AVM) can be loaded and registered to their location in the sky. Images without AVM can be shown on the sky but the user must align the images in the sky by moving, scaling and rotating the images", "-32.61764663329086" ], [ "long models of satellites and the Aries translunar shuttle up to a 55-foot long Discovery One spacecraft. \"In-camera\" techniques were again used as much as possible to combine models and background shots together to prevent degradation of the image through continual duplicating.\nIn shots where there was no perspective change, still shots of the models were photographed and positive paper prints were made. The image of the model was cut out of the photographic print and mounted on glass and filmed on an animation stand. The undeveloped film was re-wound to film the star background with the silhouette of the model", "-32.57941451680017" ], [ "objects in the southern sky.\nVISTA observations will support research in many astronomical areas. Within our galaxy, VISTA is expected to find many new brown dwarf stars and be able to test ideas about the nature of dark matter. One VISTA survey is designed to find and study huge numbers of variable stars in our galaxy by taking images of the same areas of sky at different times. Using VISTA data astronomers will be able to map the structure of our galaxy in much more detail than ever before. Another VISTA survey will study our neighbouring small galaxies, the Magellanic Clouds,", "-32.51556399523906" ], [ "UDFy-38135539 Detection Its first known imaging was in Hubble telescope's Hubble Ultra Deep Field, the most detailed deep space picture at that time. The galaxy was observed in August and September 2009. The image data was released to the scientific community, which led to the galaxy's detection by the teams of Bouwens, Bunker and McLure, and subsequent spectroscopic campaign by the team of Lehnert and colleagues.\nJust on Hubble data, the galaxy could be an object intrinsically red and relatively close to Earth, therefore, confirmation using suitably sensitive spectroscopic equipment was needed. This was attempted using the European Southern Observatory's SINFONI-equipped", "-32.44953987476765" ], [ "to that obtained by ground-based interferometers—the first conventional-telescope image (or \"direct-image\" in NASA terminology) of the disk of another star. Because ultraviolet light is absorbed by the Earth's atmosphere, observations at these wavelengths are best performed by space telescopes. Like earlier pictures, this image contained a bright patch indicating a region in the southwestern quadrant 2000 K hotter than the stellar surface. Subsequent ultraviolet spectra taken with the Goddard High Resolution Spectrograph suggested that the hot spot was one of Betelgeuse's poles of rotation. This would give the rotational axis an inclination of about 20° to the direction of Earth, and", "-32.43171234889451" ], [ "or UGC 5470) lies approximately 820,000 light years away in the constellation Leo. It is one of the most distant satellite galaxy of our Milky Way. The dwarf spheroidal galaxy is located only 12 arcminutes from Regulus (α Leonis), and the light from Regulus makes the visibility of DDO 74 becomes poor, so it is difficult to be observed. DDO 75 DDO 75 (also known as Sextans A, PGC 29653 or UGCA 205) is an irregular galaxy located in the constellation Sextans, same as its neighbour DDO 70 (Sextans B). When it is observed from Earth, it appears as a", "-32.35397097685927" ], [ "Telescope's infrared data. There are about 6000 images to look through. The CSIRO press release states that Radio Galaxy Zoo is a new citizen science project that lets anyone become a cosmic explorer. It continues that by matching galaxy images with radio images from CSIRO's Australia Telescope, a participant can work out if a galaxy has a supermassive black hole. Other ongoing projects Another project that uses data from volunteer classifications is Galaxy Zoo Quench, which studies the interactions between galaxies and the effect it has on starbursts (among others). This has yet to be completed. Complete list of projects", "-32.344657270470634" ], [ "from the NASA exoplanet archive, Eyes on the Exoplanet enables uses to zoom in on more than 1000 planets orbiting distant stars. Exoplanets can be filtered by relevant criteria such as Earth-sized, large rocky planets, gas giants, etc. Distances to these planets are expressed in travel time by car, plane, etc. Eyes on the Earth Eyes on the Earth visualizes a number of NASA's Earth orbiting spacecraft in-situ and the data they collect on the Earth itself. Originally released as a Unityweb player interactive, it has undergone a number of iterations including the mobile app \"Earth Now\".\nThe application displays", "-32.31396317353938" ], [ "in astronomy began when he was 11 years old. He built his first telescope, a 6\" reflector, at his home in Los Angeles. His interest in astrophotography grew in the 1970s and 1980s and been worked as a photographic stringer for Newsweek magazine. Later, his wide-field images became recognized by professional astronomers. In 2005, he took pictures of high latitude areas of the sky and experimented with different wavelengths using various photographic filters and managed to take pictures of very faint unexplored nebulae above the plane of the Milky Way. The pictures were investigated by Adolf Witt, an", "-32.30876453963265" ], [ "color.\"\nProof of the Milky Way consisting of many stars came in 1610 when Galileo Galilei used a telescope to study the Milky Way and discovered that it is composed of a huge number of faint stars. In a treatise in 1755, Immanuel Kant, drawing on earlier work by Thomas Wright, speculated (correctly) that the Milky Way might be a rotating body of a huge number of stars, held together by gravitational forces akin to the Solar System but on much larger scales. The resulting disk of stars would be seen as a band on the sky from our perspective inside", "-32.28233994112816" ], [ "would be visible. Clouds of gas and dust would block the vision in many directions along the Milky Way.\nSpace-based solar observatories such as SDO and SOHO use ultraviolet telescopes (called AIA and EIT, respectively) to view activity on the Sun and its corona. Weather satellites such as the GOES-R series also carry telescopes for observing the Sun in ultraviolet.\nThe Hubble Space Telescope and FUSE have been the most recent major space telescopes to view the near and far UV spectrum of the sky, though other UV instruments have flown on smaller observatories such as GALEX, as well as sounding rockets", "-32.254013297981146" ], [ "Kids You Don’t Want to Miss.\nKit Eaton of the New York Times spoke of \"the beautiful imagery it uses to show constellations and detail on the planets.\"\nMel Martin of TUAW called Star Walk \"one of the great demos of Apple technology.\"\nEarlier, Bob Tedeschi described it as the application that \"will awaken your inner astronomer.\"\nLonnie Lazar of Cult of Mac offered to use the application \"for stargazing as well as to show off some of my iPhone's capabilities to friends and curious strangers.\"\nSoggy Astronomer wrote that \"this app brings the old paper star chart into the smartphone age, and makes exploring", "-32.2329313499049" ], [ "the ability to collect images at 0.41-meter panchromatic (black and white) and 1.65-meter multispectral (color) resolution. GeoEye-1 can precisely locate an object to within three meters of its true location on the Earth's surface. The satellite will also be able to collect up to 700,000 square kilometers of panchromatic imagery per day.", "-32.2134292071205" ], [ "2014, Peter Yeung wrote: \"Henner takes these satellite images and then transforms them by altering and artistically-enhancing the colours, lending them an unexpected, lyrical beauty; without ever altering the specific physical details of images. He explains that projects such as these exploit 'loopholes in the vast archives of data, connecting the dots to reveal things that surround us but which we rarely see.' It is a role reversal, citizens rather than governments doing it, that exposes the ease with which any sort of information can be obtained.\"\nA portfolio of the series was acquired by the New York Public Library in", "-32.20361246561515" ], [ "naked eye) in the night sky, not just those around the ecliptic. A star catalogue is featured in one of the chapters of the late 2nd-century-BC history work Records of the Grand Historian by Sima Qian (145–86 BC) and contains the \"schools\" of Shi Shen and Gan De's work (i.e. the different constellations they allegedly focused on for astrological purposes). Sima's catalogue—the Book of Celestial Offices (天官書 Tianguan shu)—includes some 90 constellations, the stars therein named after temples, ideas in philosophy, locations such as markets and shops, and different people such as farmers and soldiers. For his Spiritual Constitution of", "-32.19361671963998" ], [ "coronagraph in 2004 and 2006 . The dark area hidden by the coronagraph mask can be seen on the images, though a bright dot has been added to show where the star would have been.\nUp until the year 2010, telescopes could only directly image exoplanets under exceptional circumstances. Specifically, it is easier to obtain images when the planet is especially large (considerably larger than Jupiter), widely separated from its parent star, and hot so that it emits intense infrared radiation. However, in 2010 a team from NASAs Jet Propulsion Laboratory demonstrated that a vector vortex coronagraph could enable small", "-32.1465243059356" ], [ "she uses the Hubble Space Telescope to obtain spectra of star-forming galaxies. In the optical, she uses the Gemini and Keck observatories on Mauna Kea and the Las Campanas Observatories in Chile to study red supergiants in the Milky Way and in the Magellanic Clouds. She has discovered many new red supergiants, as well as the first candidate for a Thorne-Zytkow object.\nLevesque and Jamie Lomax also sparked a jumping spider Twitter arachnoastronomy phenomenon with the help of Nathan Morehouse who studies spider eyesight at the University of Cincinnati.", "-32.14308582153899" ], [ "Observatory.\nThe presenter once again appears with the glowing \"star\" and delivers an epilogue, summarizing that of all the things we have learned about the Universe, one of the most amazing discoveries is that Earth and everything on it, including its inhabitants, are made from the clouds of dust and gas that lace the Milky Way Galaxy; that we are, in fact, made of stardust, which would possibly explain humanity's fascination with the night sky. Technical challenges According to Andrew Hofman, Visual Effects Supervisor, \"Centered in the Universe\" presented unique challenges. \"Some long-established practices in conventional film making are simply not", "-32.134393699823704" ], [ "Satellite imagery Satellite imagery (also Earth observation imagery or spaceborne photography) are images of Earth or other planets collected by imaging satellites operated by governments and businesses around the world. Satellite imaging companies sell images by licensing them to governments and businesses such as Apple Maps and Google Maps. History The first images from space were taken on sub-orbital flights. The U.S-launched V-2 flight on October 24, 1946 took one image every 1.5 seconds. With an apogee of 65 miles (105 km), these photos were from five times higher than the previous record, the 13.7 miles (22 km) by the Explorer II", "-32.11178654774267" ], [ "Google Sky which features images from the Hubble Space Telescope, Slooh can take new images of the sky with its telescopes.", "-32.11012593657506" ], [ "flight, the popular image of Earth was of a green world. Science fiction artist Frank R. Paul provided perhaps the first image of a cloudless blue planet (with sharply defined land masses) on the back cover of the July 1940 issue of Amazing Stories, a common depiction for several decades thereafter.\nEarth was first photographed from space by Explorer 6 in 1959. Yuri Gagarin became the first human to view Earth from space in 1961. The crew of the Apollo 8 was the first to view an Earth-rise from lunar orbit in 1968, and astronaut William Anders's photograph of it, Earthrise,", "-32.10022087155812" ], [ "its lighter areas (pink to peach colour) to an angelfish. In the infrared its ionized boundaries are that which appears, instead. Observations λ Orionis (also known as Meissa or Heka) at about 1,100 light-years is the star representing the head of Orion and can be found to the north of the quadrangle defined by the stars Betelgeuse, Bellatrix, Rigel and Saiph. This star can be found at the centre of open cluster Collinder 69 composed of fourth and fifth-magnitude young hot stars, visible to the naked eye. It can be resolved with a pair of binoculars. The rest of the", "-32.085831033029535" ], [ "Ralf Vandebergh Ralf Vandebergh (born 1976) is a Dutch astronomer, professional photographer and veteran satellite spotter from Nijswiller. He is known for photographing the Sun, Moon, planets, satellites, NASA Space Shuttles, and the International Space Station from Earth using a telescope-mounted camera. His work is widely published in the media.\nOn 10 April 2009, NASA featured one of his images as its \"Astronomy Picture of the Day\". An October 2011 image he took of the 2.6-short-ton (2.4 t) defunct German telescope ROSAT was published by various media outlets, including the Washington Post, The New York Times and Fox News. In 2011, Vandebergh", "-32.06626805794076" ], [ "the right) shows the spectacular star-forming region Messier 17, also known as the Omega Nebula or the Swan Nebula, as it has never been seen before. This vast region of gas, dust and hot young stars lies in the heart of the Milky Way in the constellation of Sagittarius (The Archer). The VST field of view is so large that the entire nebula, including its fainter outer parts, is captured — and retains its superb sharpness across the entire image. The data were processed using the Astro-WISE software system developed by E.A. Valentijn and collaborators at Groningen and elsewhere.\nThe second", "-32.05182672512092" ], [ "novae, allowing him to determine their distance by using the stars as standard candles. The distance he found was far greater than the size of the Milky Way, which led him to the conclusion that many similar objects were \"island universes\" on their own. Hubble originally estimated that the Andromeda Galaxy was 900,000 light-years away, but Ernst Öpik's estimate in 1925 put the distance closer to 1.5 million light-years.\nThe Andromeda Galaxy's two main companions, M32 and M110 (also known as NGC 221 and NGC 205, respectively) are faint elliptical galaxies that lie near it. M32, visible with a far smaller", "-32.02615890198649" ], [ "viewed from rural areas when the Moon is below the horizon. Maps of artificial night sky brightness show that more than one-third of Earth's population cannot see the Milky Way from their homes due to light pollution.\nAs viewed from Earth, the visible region of the Milky Way's galactic plane occupies an area of the sky that includes 30 constellations. The Galactic Center lies in the direction of Sagittarius, where the Milky Way is brightest. From Sagittarius, the hazy band of white light appears to pass around to the galactic anticenter in Auriga. The band then continues the rest of the", "-32.0220781849639" ], [ "it needed to be bright enough to be usable for sightings. Then it was close to the ideal positions near at the celestial equator of the sky coordinates. Also important was its well understood motion in the sky, which was helped by the fact that this star emits relatively strong radio signals. In preparation for the setup of this mission, astronomers analyzed the radio-based position measurements with respect to far distant quasars taken over several years to understand its motion as precisely as needed. History The conceptual design for this mission was first proposed by an MIT professor, George Pugh,", "-32.019030048832064" ], [ "images display all the human and natural matter that glows and can be detected from space. The data was acquired by the Suomi NPP satellite in April and October 2012 and then mapped over existing Blue Marble imagery of Earth to provide a realistic view of the planet. The Suomi NPP satellite completed 312 orbits and gathered 2.5 terabytes of data to get a clear shot of every parcel of the Earth's land surface. Named for satellite meteorology pioneer Verner Suomi, the satellite flies over any given point on Earth's surface twice each day and flies 512 miles (824 km) above", "-31.96064238330291" ], [ "Milky Way Appearance The Milky Way is visible from Earth as a hazy band of white light, some 30° wide, arching across the night sky. In night sky observing, although all the individual naked-eye stars in the entire sky are part of the Milky Way, the term \"Milky Way\" is limited to this band of light. The light originates from the accumulation of unresolved stars and other material located in the direction of the galactic plane. Dark regions within the band, such as the Great Rift and the Coalsack, are areas where interstellar dust blocks light from distant stars. The", "-31.953543265795815" ], [ "as the SN 1054, is an example of a guest star observed by Chinese astronomers, recorded also by the Arab astronomers, although it was not recorded by their European contemporaries. Ancient astronomical records of phenomena like comets and supernovae are sometimes used in modern astronomical studies. Constellations The divisions of the sky began with the Northern Dipper and the 28 mansions.\nIn 1977, a lacquer box was excavated from the tomb of Yi, the marquis of Zeng, in Suixian, Hubei Province. Names of the 28 lunar mansions were found on the cover of the box, proving that the use of this", "-31.92450140456367" ], [ "planets around very distant stars. When enough background stars can be observed with enough accuracy, then the method should eventually reveal how common Earth-like planets are in the galaxy.\nObservations are usually performed using networks of robotic telescopes. In addition to the European Research Council-funded OGLE, the Microlensing Observations in Astrophysics (MOA) group is working to perfect this approach.\nThe PLANET (Probing Lensing Anomalies NETwork)/RoboNet project is even more ambitious. It allows nearly continuous round-the-clock coverage by a world-spanning telescope network, providing the opportunity to pick up microlensing contributions from planets with masses as low as Earth's. This strategy was successful", "-31.909627764849574" ], [ "into the cosmos to see a hypothetical view of the entire known universe. Other bodies, spacecraft and orbital reference frames can be added and visualized in the Solar System Mode using the layer manager.\nUsers can query the Minor Planet Center for the orbits of minor bodies in the solar system, such as\nSandbox\nThe Sandbox mode allows users to view arbitrary 3d models (OBJ or 3DS formats) in an empty universe. For instance, this is useful to explore 3D objects such as molecular data. Local user content WorldWide Telescope was designed as a professional research environment and as such it facilitates", "-31.8678553458667" ], [ "Satellite galaxies of the Milky Way The Milky Way has several smaller galaxies gravitationally bound to it, as part of the Milky Way subgroup, which is part of the local galaxy cluster, the Local Group.\nThere are 59 small galaxies confirmed to be within 420 kiloparsecs (1.4 million light-years) of the Milky Way, but not all of them are necessarily in orbit, and some may themselves be in orbit of other satellite galaxies. The only ones visible to the naked eye are the Large and Small Magellanic Clouds, which have been observed since prehistory. Measurements with the Hubble Space Telescope in 2006", "-31.865507924507256" ], [ "the unaided eye on a very clear night.\nM13, visible to both the naked eye and binoculars, is a globular cluster of the 6th magnitude that contains more than 300,000 stars and is 25,200 light-years from Earth. It is also very large, with an apparent diameter of over 0.25 degrees, half the size of the full moon; its physical diameter is more than 100 light-years. Individual stars in M13 are resolvable in a small amateur telescope.\nM92 is a globular cluster of magnitude 6.4, 26,000 light-years from earth. It is a Shapley class IV cluster, indicating that it is quite concentrated at", "-31.8421107483955" ], [ "the picture and shows the galactic disc. The zoom then reveals a series of 4 extra rings, increasingly thinner and closer to the black hole shadow. They are multiple images of the galactic disk. The first and third correspond to points which are behind the black hole (from the observer's position) and correspond here to the bright yellow region of the galactic disc (close to the galactic center), whereas the second and fourth correspond to images of objects which are behind the observer, which appear bluer since the corresponding part of the galactic disc is thinner and hence dimmer here.", "-31.82466462845332" ], [ "as twinkling from an orbiting satellite a million miles away, were found to be reflected light from ice crystals in the atmosphere. The technology used to determine this may be useful in studying the atmospheres of distant worlds, including those of exoplanets. From the Large Magellanic Cloud From a viewpoint in the LMC, the Milky Way's total apparent magnitude would be −2.0—over 14 times brighter than the LMC appears to us on Earth—and it would span about 36° across the sky, the width of over 70 full moons. Furthermore, because of the LMC's high galactic latitude, an observer there would", "-31.800400872336468" ], [ "objects and 1 arc-second-per-pixel imagery allow an astrophotographer to select and plan a photograph and find a suitable guide star using the multi-chip FOV indicator. Tours WorldWide Telescope contains a multimedia authoring environment that allows users or educators to create tours with a simple slide-based paradigm. The slides can have a begin and end camera position allowing for easy Ken Burns Effects. Pictures, objects, and text can be added to the slides, and tours can have both background music and voice-overs with separate volume control. The layer manager can be used in conjunction with a tour to publish user data", "-31.788891309915925" ], [ "and to venerate them.\nOn April 30, 2002 the Hubble Space Science Institute released new photographs of the Cone Nebula, also known as the Space Mountain, to showcase a new extremely high resolution camera. Shortly afterwards some began to call it the \"Jesus Nebula\", believing they could see Jesus's face in it. The new camera was installed on Hubble by astronauts during a space shuttle mission in March 2002. The Cone Nebula, located in the constellation Monoceros, is a region that contains cones, pillars, and majestic flowing shapes that abound in stellar nurseries where natal clouds of gas and dust are", "-31.766146595073224" ], [ "other operating spacecraft, to conduct photometric observations of stars with an apparent magnitude brighter than 4.0 as seen from Earth. Lem was one of two Polish BRITE satellites launched, along with the Heweliusz spacecraft. Four more satellites—two Austrian and two Canadian—were launched at different dates. Mission Lem observes the stars in the blue color range, whereas Heweliusz does it in red. Due to the multicolour option, geometrical and thermal effects in the analysis of the observed phenomena are separated. None of the much larger satellites, such as MOST and CoRoT, has this colour option; this is crucial in the diagnosis", "-31.752824023729772" ], [ "photograph of the Great Comet of 1882, and one of the early proponents of the Carte du Ciel project.\nThe invention of dry plate photography by Richard Leach Maddox made Gill realise that the process could be used to create images of the stars and to more easily determine their relative positions and brightness. This led to a massive project in collaboration with the Dutch astronomer J.C. Kapteyn, and the compiling of an index of brightness and position for some half a million southern stars. The work was published as Cape Photographic Durchmusterung in 3 volumes between 1896 and 1900. Gill", "-31.750467595731607" ], [ "space telescope WFIRST. The New Worlds Mission proposes a large occulter in space designed to block the light of nearby stars in order to observe their orbiting planets. This could be used with existing, already planned or new, purpose-built telescopes.\nIn 2010, a team from NASA's Jet Propulsion Laboratory demonstrated that a vortex coronagraph could enable small scopes to directly image planets. They did this by imaging the previously imaged HR 8799 planets, using just a 1.5 meter-wide portion of the Hale Telescope.\nAnother promising approach is nulling interferometry.\nIt has also been proposed that space-telescopes that focus light using zone plates instead", "-31.719870183384046" ], [ "degree in 1939. During World War II, he worked on radar bombing systems at Bell Labs. Galactic center The center of the Milky Way had long puzzled astronomers, and thick dust obscures the view of it in visible light. During the mid to late 1970s, Townes together with Eric Wollman, John Lacy, Thomas Geballe and Fred Baas studied Sagittarius A, the H II region at the galactic center, at infrared wavelengths. They observed ionized neon gas swirling around the center at such velocities that the mass at the very center must be approximately equal to that of 3 million suns.", "-31.680250117264222" ], [ "and blues and blacks. Toward the top of the frame, small in the distance and drifting slowly in front of the stars, is the white circular Wernher von Braun-inspired space station that is at the heart of the story. It is at once spinning and orbiting the earth, whose blue disk fills the bottom quarter of the screen. Also in the distance but somewhat to the left and closer to the camera is a white spaceship with broad wings and globular fuel tanks. As these images appear, Nathan van Cleave’s score becomes quiet and eerie with the music gently rising", "-31.65287198587248" ], [ "1603 Johann Bayer gave three of these clusters designations as if they were single stars.\nThe first person to use a telescope to observe the night sky and record his observations was the Italian scientist Galileo Galilei in 1609. When he turned the telescope toward some of the nebulous patches recorded by Ptolemy, he found they were not a single star, but groupings of many stars. For Praesepe, he found more than 40 stars. Where previously observers had noted only 6–7 stars in the Pleiades, he found almost 50. In his 1610 treatise Sidereus Nuncius, Galileo Galilei wrote, \"the galaxy is", "-31.651677985348215" ], [ "deep sky objects.\nWith very low light capability, a few specific models of webcams are popular for Solar, Lunar and Planetary imaging. Mostly, these are manually focused cameras containing a CCD sensor instead of the more common CMOS. The lenses of these cameras are removed and then these are attached to telescopes to record images, video or both. In newer techniques, videos of very faint objects are taken and the sharpest frames of the video are 'stacked' together to obtain a still image of respectable contrast. The Philips PCVC 740K and SPC 900 are among the few webcams liked by astrophotographers.", "-31.643441616830387" ], [ "representation of the sky not just as seen from the Earth but from space. The planetarium can project images of Earth as it would be seen from space. rs see Earth as never before, watching the changes on its surface from yesterday or from billions of years ago. This immersive imagery is projected into a GeoDome Theater using an OmniFocus fish-eye-lens, a system developed by The Elumenati. The Uniview software allows visualization from any point in time or space to put projected onto the dome. \nThe Minnesota Planetarium Society was the first organization to purchase the package. It named", "-31.63427078210225" ], [ "to be in this area of the sky. Once he had established that the object was moving relative to the background stars, he emailed the Central Bureau for Astronomical Telegrams, the clearing house for astronomical discoveries.\nBopp did not own a telescope. He was out with friends near Stanfield, Arizona, observing star clusters and galaxies when he chanced across the comet while at the eyepiece of his friend's telescope. He realized he might have spotted something new when, like Hale, he checked his star maps to determine if any other deep-sky objects were known to be near M70, and found that", "-31.62646625828347" ], [ "as squiggles on a strip-chart recorder. This began a new area of infrared astronomy. The resulting Two-Micron Sky Survey, published in 1969, contained 5,612 infrared sources, the vast majority of which had been previously uncataloged. Some of these have been found to be new stars still surrounded by their dusty pre-stellar shells, while others are supergiant stars in the last stages of their evolution, embedded in expanding dusty shells of matter ejected by the stars themselves.\nLeighton's development of photographic equipment during the mid-1950s had allowed him to obtain the best pictures of the planets ever attained anywhere to that time,", "-31.605308890430024" ], [ "stargazing and Milky Way astrophotography.", "-31.589035590899584" ], [ "NGC 2516 Description This bright cluster itself is easily visible with the naked eye as a hazy patch, but is resolvable into stars using binoculars. It contains two 5th magnitude red giant stars and three main visual double stars: HJ 4027, HJ 4031 and I 29. A small telescope would be required to split the double stars, which are all pairs of 8-9 magnitude and 1-10 arcseconds separation.\nNGC 2516 and the recently discovered nearby star cluster Mamajek 2 in Ophiuchus have similar age and metallicity. Recently, kinematic evidence was presented by E. Jilinski and coauthors that suggests that these two stellar", "-31.57415876651794" ], [ "200 images published on the popular Spaceweather website as well as having numerous Astronomy Picture of the Day entries published. All of his current work have been published under the name Pete Lawrence.\nLawrence is probably best known for innovative approaches to imaging, which show astronomical events and phenomena in unusual ways. Examples of this include the Lunar Parallax Demonstration Project (Lunar Parallax Demonstration Project – 2004 update) and the Search for the Shadow of Venus (Search for the Venusian Shadow – part 2).\nIn recent years Lawrence joined the team of co-presenters on the BBC's The Sky at Night, he has", "-31.572627570778423" ], [ "is best seen in a long exposure photograph, which is obtained by locking the shutter open for most of the intensely dark part of a moonless night. The resulting photograph reveals a multitude of concentric arcs (portions of perfect circles) from which the exact center can be readily derived, and which corresponds to the Celestial pole, which lies directly above the position of the true pole (North or South) on the horizon.\nA published photograph exposed for nearly 8 hours demonstrates this effect.\nThe Northern Celestial pole is currently (but not permanently) within a fraction of 1 degree of the bright star", "-31.570761690745712" ], [ "is identified simply by centering it in the device's zero-power optical finder and pressing a button. The LCD screen displays the name of the object (star, planet, deep sky object, etc.) and other relevant data. An audio presentation is available via earphones on 200 of the most popular celestial objects.\nThe SkyScout will also locate an object; the user selects the desired object from the database and red arrows in the viewfinder direct the user to point the viewfinder to the object. The SkyScout also features a \"Tonight's Highlights\" mode, leading the user through the night's best objects. Expandability The database", "-31.55319412099925" ], [ "and their surroundings. VISTA data will also be used to create a 3D map of about 5% of the entire observable Universe. Further out, VISTA will be a powerful tool for discovering remote quasars and studying the evolution of galaxies and clusters of galaxies. It will help to probe the nature of dark energy by finding very distant galaxy clusters. \nInfrared measurements from the VVV astronomical survey have been employed to bolster the cosmic distance ladder, namely by providing reliable distances to star clusters and Cepheid variable stars. Selection of VISTA Images The first released image (left) shows the", "-31.55208145565848" ], [ "and constellations \"earned\" throughout the game. This information includes astronomy details about the constellations, an explanation on how to find the constellation in the night sky, and the locations, descriptions and images of the most important stars, galaxies and nebulae. Most of these images come from the European Space Agency (ESA) and the European Southern Observatory (ESO) image libraries and depict deep-space objects that can actually be found in the constellations. Links are provided to ESA and ESO websites for more information about these objects.\nKiwaka also presents information about the classical mythology behind each constellation. Users are introduced to classical", "-31.53512670659984" ], [ "popular to photograph the night sky by astronomers and astro photographers. Mostly, these are manual-focus cameras and contain an old CCD array instead of comparatively newer CMOS array. The lenses of the cameras are removed and then these are attached to telescopes to record images, video, still, or both. In newer techniques, videos of very faint objects are taken for a couple of seconds and then all the frames of the video are \"stacked\" together to obtain a still image of respectable contrast. Laser beam profiling A webcam's CCD response is linear proportional to the incoming light. Therefore, webcams are", "-31.53132892253052" ] ]
5idc2d
Why do objects floating in liquid are always attracted to the walls of the container?
[ "Look closely at your cheerios floating on milk. You should be able to see the milk curling up around the cheerio, forming a little skirt of bent milk. [The cheerios cling to both each-other and the wall.]( URL_0 ) It takes force to bend the surface of water. A single cheerio has force from that bent surface pushing all around it evenly. It doesn't move because the force is even. If you put two cheerios near each-other their little skirts of bent milk overlap. The milk doesn't have to bend as much in the area between the two cheerios. That means that area doesn't push on the cheerios as much. So with force all around but weaker in the direction of the other cheerio, the cheerios get pushed together by the milk around them. This is also the case with the side of the bowl.", "It's very very hard to put something into a container of water with absolutely no momentum. And if it has any momentum at all, it will move towards one of the edges, as there are edges in all directions.", "A floating object is attracted to the wall because of surface tension, or more specifically the interaction of cohesion and adhesion. Water likes to stick to itself(cohesion) and to other things (adhesion). If you look at the lip water forms on the inside of a glass this is called a meniscus. The object is attracted to the wall because when it is touching the wall the total length of the meniscus is shorter then when the object is floating freely. This is the minimum energy orientation of the system, hence the movement to the edge.", "I remember reading a puzzle about this before, it's because surface tension makes the water cling to the edges of the container. This means that the level of the water will be slightly higher near the edges, so the floating object will drift to an edge. On the other hand, if you fill up a cup of water right to the brim so that the water is slightly above the edge of the cup, the water will be highest in the centre and so the floating object will stay in the middle.", "So imagine waves randomly going about a pool. the more space behind you, the more space for waves to be coming at you, so you further away. When you get to a side there's basically no water to have waves pushing you away from the side. You're only being pushed from the other direction" ]
[ [ "In the right-hand container, the density of the liquid is 0.999 kg/L (8.34 lb/US gal). Since the object weighs more than the mass of the water it displaces, it sinks. This shows that very small changes in the density of the liquid can easily cause an almost-floating object to sink.\nFigure 4 shows a schematic representation of a Galileo thermometer at two different temperatures.\nIn some models, if there are some bulbs at the top (Figure 4, left) and some at the bottom, but one floating in the gap, then the one floating in the gap (green 76 °F (24 °C)) tells the temperature. If there is", "-33.733827705917065" ], [ "objects are hair particles in shaving cream and fizzy beer bubbles. The effect is not noticeable in boats and other large floating objects because the force of surface tension is relatively small at that scale.", "-33.267927654407686" ], [ "The greater the size or density of the particle relative to the fluid in which it is travelling, the higher the water velocity required to suspend it and transport it.\nDensity-based flow, however, occurs when liquefaction of sediment during transport causes a change to the density of the fluid. This is usually achieved by highly turbulent liquids which have a suspended load of fine grained particles forming a slurry. In this case, larger fragments of rock can be transported at water velocities too low to otherwise do so because of the lower density contrast (that is, the water plus sediment has", "-32.026302787729946" ], [ "surface in the container. If liquid is placed in a bag, it can be squeezed into any shape. Unlike a gas, a liquid is nearly incompressible, meaning that it occupies nearly a constant volume over a wide range of pressures; it does not generally expand to fill available space in a container but forms its own surface, and it may not always mix readily with another liquid. These properties make a liquid suitable for applications such as hydraulics.\nLiquid particles are bound firmly but not rigidly. They are able to move around one another freely, resulting in a limited degree of", "-31.830275422078557" ], [ "soluble liquids, and their solutions if the partial pressure is replaced by the solubility of the solid (or a second liquid) at the given radius, , and by the solubility at a plane surface. Hence small particles (like small droplets) are more soluble than larger ones.\nThese results led to the problem of how new phases can ever arise from old ones. For example, if a container filled with water vapour at slightly below the saturation pressure is suddenly cooled, perhaps by adiabatic expansion, as in a cloud chamber, the vapour may become supersaturated with respect to liquid water.", "-31.65222028318385" ], [ "that directly affect buoyancy.\nFloat-type sensors can be designed so that a shield protects the float itself from turbulence and wave motion. Float sensors operate well in a wide variety of liquids, including corrosives. When used for organic solvents, however, one will need to verify that these liquids are chemically compatible with the materials used to construct the sensor. Float-style sensors should not be used with high viscosity (thick) liquids, sludge or liquids that adhere to the stem or floats, or materials that contain contaminants such as metal chips; other sensing technologies are better suited for these applications.\nA special application of", "-31.156258389906725" ], [ "Upstream contamination Upstream contamination by floating particles is a counterintuitive phenomenon in fluid dynamics. When pouring water from a higher container to a lower one, particles floating in the latter can climb upstream into the upper container. A definitive explanation is still lacking: experimental and computational evidence indicates that the contamination is chiefly driven by surface tension gradients, however the phenomenon is also affected by the dynamics of swirling flows that remain to be fully investigated. Origins The phenomenon was first observed in 2008 by the Argentinian S. Bianchini during mate tea preparation, while studying Physics at the University of", "-31.003173907171004" ], [ "if a container holds water and water vapor, there will be a chemical potential (which is negative) for the liquid, pushing water molecules into the vapor (evaporation) and a chemical potential for the vapor, pushing vapor molecules into the liquid (condensation). Only when these \"forces\" equilibrate is equilibrium obtained.", "-30.97194806719199" ], [ "so an object's buoyancy reduces if it is compressed and increases if it expands.\nIf an object at equilibrium has a compressibility less than that of the surrounding fluid, the object's equilibrium is stable and it remains at rest. If, however, its compressibility is greater, its equilibrium is then unstable, and it rises and expands on the slightest upward perturbation, or falls and compresses on the slightest downward perturbation. Submarines Submarines rise and dive by filling large ballast tanks with seawater. To dive, the tanks are opened to allow air to exhaust out the top of the tanks, while the water", "-30.779419406782836" ], [ "pipe. A liquid in an area of low pressure (vacuum) vaporizes and forms bubbles, which then collapse as they enter high pressure areas. This causes liquid to fill the cavities left by the bubbles with tremendous localized force, eroding any adjacent solid surface. Surfaces Unless the volume of a liquid exactly matches the volume of its container, one or more surfaces are observed. The presence of a surface introduces new phenomena which are not present in a bulk liquid. This is because a molecule at a surface possesses bonds with other liquid molecules only on the inner side of the", "-30.671274591004476" ], [ "with a higher density than the bed will sink, whereas an object with a lower density than the bed will float, thus the bed can be considered to exhibit the fluid behavior expected of Archimedes' principle. As the \"density\", (actually the solid volume fraction of the suspension), of the bed can be altered by changing the fluid fraction, objects with different densities comparative to the bed can, by altering either the fluid or solid fraction, be caused to sink or float.\nIn fluidised beds, the contact of the solid particles with the fluidisation medium (a gas or a liquid) is greatly", "-30.577536632539704" ], [ "density in other directions acts to pull objects away from the underdensity; in other words, the apparent repulsion is not an active force, but due simply to the lack of a force counteracting the attraction.", "-30.560201342035725" ], [ "phenomena as well, including surface waves, capillary action, wetting, and ripples. In liquids under nanoscale confinement, surface effects can play a dominating role since – compared with a macroscopic sample of liquid – a much greater fraction of molecules are located near a surface.\nThe surface tension of a liquid directly affects its wettability. Most common liquids have tensions ranging in the tens of mJ/m², so droplets of oil, water, or glue can easily merge and adhere to other surfaces, whereas liquid metals such as mercury may have tensions ranging in the hundreds of mJ/m², thus droplets do not combine easily", "-30.44017956717289" ], [ "and the liquid would flow in that direction. Thus, on the surface of the Earth, all free surfaces of liquids are horizontal unless disturbed (except near solids dipping into them, where surface tension distorts the surface in a region called the meniscus).\nIn a free liquid that is not affected by outside forces such as a gravitational field, internal attractive forces only play a role (e.g. Van der Waals forces, hydrogen bonds). Its free surface will assume the shape with the least surface area for its volume: a perfect sphere. Such behaviour can be expressed in terms of surface tension. It", "-30.211228084692266" ], [ "to be pulled into a spherical shape by the imbalance in cohesive forces of the surface layer. In the absence of other forces, including gravity, drops of virtually all liquids would be approximately spherical. The spherical shape minimizes the necessary \"wall tension\" of the surface layer according to Laplace's law.\nAnother way to view surface tension is in terms of energy. A molecule in contact with a neighbor is in a higher state of energy than if it were alone (with some contact with a neighbor). The interior molecules have as many neighbors as they can possibly have, but the boundary", "-30.138361156044994" ], [ "rough waters are smashed by cargo and waves, and often sink quickly. Although not all containers sink, they seldom float very high out of the water, making them a shipping hazard that is difficult to detect. Freight from lost containers has provided oceanographers with unexpected opportunities to track global ocean currents, notably a cargo of Friendly Floatees.\nIn 2007 the International Chamber of Shipping and the World Shipping Council began work on a code of practice for container storage, including crew training on parametric rolling, safer stacking, the marking of containers, and security for above-deck cargo in heavy swell.\nIn 2011, the", "-30.090395008686755" ], [ "(especially if they span the full breadth of the ship), or from accidental flooding, such as has occurred in several accidents involving roll-on/roll-off ferries.\nIf a compartment or tank is either empty or full, there is no change in the craft's center of mass as it rolls from side to side (in strong winds, heavy seas, or on sharp motions or turns). However, if the compartment is only partially full, the liquid in the compartment will respond to the vessel's heave, pitch, roll, surge, sway or yaw. For example, as a vessel rolls to port, liquid will displace to the port", "-30.052979111249442" ], [ "the problem rises that the extremely small volumes are difficult to be controlled. The reason is the predominance of surface effects as surface charges, van-der-Waals forces and entropic effects (e.g. dewetting due to rough surfaces: the restriction in degrees of freedom of molecules penetrating such a surface is entropically more expensive than staying in bulk). Furthermore, the microsystem has to be controlled from a macroscopic human scale.", "-29.911590323317796" ], [ "one pixel on the image plane. Drawbacks In some cases the particles will, due to their higher density, not perfectly follow the motion of the fluid (gas/liquid). If experiments are done in water, for instance, it is easily possible to find very cheap particles (e.g. plastic powder with a diameter of ~60 µm) with the same density as water. If the density still does not fit, the density of the fluid can be tuned by increasing/ decreasing its temperature. This leads to slight changes in the Reynolds number, so the fluid velocity or the size of the experimental object has to", "-29.821406827308238" ], [ "diameter. The surface tension of the liquid causes the liquid to hang from the tube, forming a pendant. When the drop exceeds a certain size it is no longer stable and detaches itself. The falling liquid is also a drop held together by surface tension. Viscosity and pitch drop experiments Some substances that appear to be solid, can be shown to instead be extremely viscous liquids, because they form drops and display droplet behavior. In the famous pitch drop experiments, pitch – a substance somewhat like solid bitumen – is shown to be a liquid in this way. Pitch in", "-29.547621204837924" ], [ "the deck with twist-locks, and occasionally reinforce the structures with steel cables. When containers become an issue with the stability of the boat, for example all the containers broke free and are hanging over the side shifting the center of mass, most ships will cut the containers loose and add extra ballast water to compensate. If objects fall around in containers, it isn't a huge deal unless they knock the container free, as container ships carry thousands of containers so having a couple with shifting loads, isn't a big deal. It also makes it easier if loads are shifting inside", "-29.52566777478205" ], [ "density distributions in space. It means that density fluctuations are present in the system. Particle dynamics become very slow because temperature is directly proportional to kinetic energy causing the particles trapped in local regions by each other. Particles are doing rattling motion inside these cages and cooperate with each other. These regions in the glassy polymer are called cages. In the intermediate regime each particle has its own and different relaxation time.\nThe dynamics in all these cases are different, so at a small scale, there are a large number of cages in the system relative to the size of the", "-29.52536118857097" ], [ "because the container itself will contain loads and make it so they can only shift a few feet. Bulk cargo Just like fluids, bulk cargo can and will shift if a ship rolls enough to permit. Shifting loads of bulk cargo can be very dangerous. In order to eliminate this threat, on most ships that carry bulk, they tend to be lower in the water and carry cargo up to the deck and as due to the nature of bulk not a one it. If it becomes a dangerous passage, sometimes a honeycomb like structure will be added to prevent", "-29.516635638690786" ], [ "the molecule will move relative to the surrounding liquid. This relative motion is essentially the same phenomenon that occurs in a centrifuge, or more simply, it is essentially the same phenomenon that occurs when low-density objects float to the top of a glass of water, and high-density particles sink to the bottom (see the equivalence principle, which states that gravity is just like any other acceleration). The amount of relative motion depends on the balance between the molecule's effective mass (which includes both the mass of the molecule itself and any solvent molecules that are so tightly bound to the", "-29.425767774810083" ], [ "material more remote from the sides is less affected. The net result is a slow circulation of particles downward at the sides, and upward in the middle.\nIf the container contains particles of different sizes, the downward-moving region at the sides is often narrower than the largest particles. Thus, larger particles tend to become sorted to the top of such a mixture. This is one possible explanation of the Brazil nut effect. Solid-state convection in ice Ice convection on Pluto is believed to occur in a soft mixture of nitrogen ice and carbon monoxide ice. It has also", "-29.275727979140356" ], [ "be applied when considering why objects float. Proposition 5 of Archimedes' treatise On Floating Bodies states that\nAny floating object displaces its own weight of fluid.\n— Archimedes of Syracuse\nIn other words, for an object floating on a liquid surface (like a boat) or floating submerged in a fluid (like a submarine in water or dirigible in air) the weight of the displaced liquid equals the weight of the object. Thus, only in the special case of floating does the buoyant force acting on an object equal the objects weight. Consider a 1-ton block of solid iron. As iron is nearly eight times", "-29.26583094045054" ], [ "Galileo thermometer Theory of operation The Galilean thermometer works on the principle of buoyancy. Buoyancy determines whether objects float or sink in a liquid, and is responsible for the fact that even boats made of steel float in water while a solid bar of steel sinks.\nThe only factor that determines whether a large object rises or falls in a particular liquid is the object's density relative to the density of the liquid. If the object is denser than the liquid, it sinks to the bottom, as it is heavier than the liquid it displaces. If it is less dense, it", "-29.256957860430703" ], [ "liquid (usually water). In the second case, the object is immersed into a vessel full of liquid (called an overflow can), causing it to overflow. Then the spilled liquid is collected and its volume measured. In the third case, the object is suspended under the surface of the liquid and the increase of weight of the vessel is measured. The increase in weight is equal to the amount of liquid displaced by the object, which is the same as the volume of the suspended object times the density of the liquid.\nThe concept of Archimedes' principle is that an object immersed", "-29.239540381226107" ], [ "when a permanent magnet sealed inside a float rises or falls to the actuation level. With a mechanically actuated float, switching occurs as a result of the movement of a float against a miniature (micro) switch. For both magnetic and mechanical float level sensors, chemical compatibility, temperature, specific gravity (density), buoyancy, and viscosity affect the selection of the stem and the float. For example, larger floats may be used with liquids with specific gravities as low as 0.5 while still maintaining buoyancy. The choice of float material is also influenced by temperature-induced changes in specific gravity and viscosity – changes", "-29.080224425531924" ], [ "silica particles then alter the surface of its host material resulting in a hydrophobic surface.\nAggregated fumed silica can be applied to large surfaces to render them hydrophobic. Micro and nanoscale structures, resembling ball and block like forms, are attributed to the hydrophobic characteristics. Due to the change in the original surface's texture, the roughness of the surface causes its hydrophobicity to increase. This is because when water comes into contact with the rough surface, it only touches the tips of the rough texture and doesn't permeate any deeper through the rest of the air occupied structure. The water can't spread", "-28.97686567137862" ], [ "surface, which implies a net force pulling surface molecules inward. Equivalently, this force can be described in terms of energy: there is a fixed amount of energy associated with forming a surface of a given area. This quantity is a material property called the surface tension, in units of energy per unit area (SI units: J/m²). Liquids with strong intermolecular forces tend to have large surface tensions.\nA practical implication of surface tension is that liquids tend to minimize their surface area, forming spherical drops and bubbles unless other constraints are present. Surface tension is responsible for a range of other", "-28.87782142989454" ], [ "move in the direction of the source of the waves. Hooke saw an analogy to the fact that small objects on a disturbed surface of water move to the center of the disturbance.\nA similar theory was worked out mathematically by James Challis from 1859 to 1876. He calculated that the case of attraction occurs if the wavelength is large in comparison with the distance between the gravitating bodies. If the wavelength is small, the bodies repel each other. By a combination of these effects, he also tried to explain all other forces.\nCriticism: Maxwell objected that this theory requires a steady", "-28.818332489347085" ], [ "molecules are missing neighbors (compared to interior molecules) and therefore have a higher energy. For the liquid to minimize its energy state, the number of higher energy boundary molecules must be minimized. The minimized number of boundary molecules results in a minimal surface area.\nAs a result of surface area minimization, a surface will assume the smoothest shape it can (mathematical proof that \"smooth\" shapes minimize surface area relies on use of the Euler–Lagrange equation). Since any curvature in the surface shape results in greater area, a higher energy will also result. Consequently, the surface will push back against any curvature", "-28.77779661671957" ], [ "scale that is not well adhered to the wall will not be flushed away and air dissolved in the water will form bubbles, producing air pockets. These processes can lead to a number of problems mainly on horizontal tube runs. Particles of scale that do not adhere to the walls and are not washed away tend to fall into the bottom of the tube producing a coarse porous deposit. Air pockets that develop in horizontal runs disrupt the formation of protective scales in two areas: the water lines at the sides, and the air space at the top of the", "-28.76497797918273" ], [ "the diameter of the bubble. This means if the largest bubbles in a container are only a few micrometres in diameter, overcoming the surface tension may require exceeding the boiling point by several degrees Celsius. Once a bubble does begin to grow, the pressure due to the surface tension reduces, so it expands explosively. In practice, most containers have scratches or other imperfections which trap pockets of air that provide starting bubbles. But a container of liquid with only microscopic bubbles can superheat dramatically. Occurrence via microwave oven Superheating can occur when an undisturbed container of water is heated in", "-28.734299141797237" ], [ "was given by J. Willard Gibbs in his work On the Equilibrium of Heterogeneous Substances (1875-8). Mechanism Since a liquid with a high surface tension pulls more strongly on the surrounding liquid than one with a low surface tension, the presence of a gradient in surface tension will naturally cause the liquid to flow away from regions of low surface tension. The surface tension gradient can be caused by concentration gradient or by a temperature gradient (surface tension is a function of temperature).\nAs an example, wine may exhibit a visible effect called \"tears\", as shown in the photograph. The effect", "-28.729822220513597" ], [ "Even at equilibrium molecules are constantly in motion and, once in a while, a molecule in the liquid phase gains enough kinetic energy to break away from the liquid phase and enter the gas phase. Likewise, every once in a while a vapor molecule collides with the liquid surface and condenses into the liquid. At equilibrium, evaporation and condensation processes exactly balance and there is no net change in the volume of either phase.\nAt room temperature and pressure, the water jar reaches equilibrium when the air over the water has a humidity of about 3%. This percentage increases as the", "-28.71774818591075" ], [ "can be demonstrated experimentally by observing a large globule of oil placed below the surface of a mixture of water and alcohol having the same density so the oil has neutral buoyancy. Waves If the free surface of a liquid is disturbed, waves are produced on the surface. These waves are not elastic waves due to any elastic force; they are gravity waves caused by the force of gravity tending to bring the surface of the disturbed liquid back to its horizontal level. Momentum causes the wave to overshoot, thus oscillating and spreading the disturbance to the neighboring portions of", "-28.696647628297796" ], [ "Surface tension Causes Due to the cohesive forces a molecule is pulled equally in every direction by neighbouring liquid molecules, resulting in a net force of zero. The molecules at the surface do not have the same molecules on all sides of them and therefore are pulled inward. This creates some internal pressure and forces liquid surfaces to contract to the minimum area.\nThe forces of attraction acting between the molecules of same type are called cohesive forces while those acting between the molecules of different types are called adhesive forces. The balance between the cohesion of the liquid and its", "-28.60719774806057" ], [ "floating object and is opposite in direction; the object neither rises nor sinks. If the weight of an object is less than that of the displaced fluid, the object rises, as in the case of a block of wood that is released beneath the surface of water or a helium-filled balloon that is let loose in the air. An object heavier than the amount of the fluid it displaces, though it sinks when released, has an apparent weight loss equal to the weight of the fluid displaced. In fact, in some accurate weighing, a correction must be made in order", "-28.589167697704397" ], [ "Buoyancy To simplify the analysis, it is customary to neglect drag and viscosity, and even to assume that the fluid has constant density.\nA small object immersed in a container of fluid subjected to a uniform gravitational field will be subject to a net downward gravitational force, compared with the net downward gravitational force on an equal volume of the fluid. If the object is less dense than the fluid, the difference between these two vectors is an upward pointing vector, the buoyant force, and the object will rise. If things are the other way around, it will sink.", "-28.510446605971083" ], [ "idea that when a surface is in a medium with which binding is favorable, it will be less likely to adhere to another surface, since the medium is taking up the potential sites on the surface that would otherwise be available to adhere to another surface. Naturally this applies very strongly to wetting liquids, but also to gas molecules that could adsorb onto the surface in question, thereby occupying potential adhesion sites. This last point is actually fairly intuitive: Leaving an adhesive exposed to air too long gets it dirty, and its adhesive strength will decrease. This is observed in", "-28.483795629766973" ], [ "a high contact angle but essential for the stability of the water-solid and water-air interfaces (the composite interface). Due to an external perturbation, a standing capillary wave can form at the liquid–air interface. If the amplitude of the capillary wave is greater than the height of the asperity, the liquid can touch the valley between the asperities; and if the angle under which the liquid comes in contact with the solid is greater than h0, it is energetically profitable for the liquid to fill the valley. The effect of capillary waves is more pronounced for small asperities with heights comparable", "-28.439905164850643" ], [ "sample of liquid water, a large portion of the molecules are held together by such bonds.\nWater also has high adhesion properties because of its polar nature. On extremely clean/smooth glass the water may form a thin film because the molecular forces between glass and water molecules (adhesive forces) are stronger than the cohesive forces.\nIn biological cells and organelles, water is in contact with membrane and protein surfaces that are hydrophilic; that is, surfaces that have a strong attraction to water. Irving Langmuir observed a strong repulsive force between hydrophilic surfaces. To dehydrate hydrophilic surfaces—to remove the strongly held layers of", "-28.438760760705918" ], [ "way, in contrast with the thermodynamic definition.\nUnder an optical microscope, the molecules making up a liquid are too small to be visible. However, the jittery motion of pollen grains or dust particles in liquid are visible. Known as Brownian motion, the motion of the pollen or dust results from their collisions with the liquid's molecules. History In approximately 50 BCE, the Roman philosopher Lucretius proposed that apparently static macroscopic bodies were composed on a small scale of rapidly moving atoms all bouncing off each other. This Epicurean atomistic point of view was rarely considered in the subsequent centuries, when Aristotlean", "-28.38974626896379" ], [ "drips back down the vessel's walls. This can also be easily demonstrated by spreading a thin film of water on a smooth surface and then allowing a drop of alcohol to fall on the center of the film. The liquid will rush out of the region where the drop of alcohol fell.\nThe Marangoni number, a dimensionless value, can be used to characterize the relative effects of surface tension and viscous forces.\nA very detailed mathematical treatment of this from the point of view of the Navier–Stokes equations and the equations of thermodynamics can be found in the first third of Subrahmanyan", "-28.3688022508868" ], [ "drop size. Liquids with a high viscosity require a higher minimum pressure to begin spray pattern formation and yield narrower spray angles compared to water. Surface tension The surface tension of a liquid tends to assume the smallest possible size, acting as a membrane under tension. Any portion of the liquid surface exerts a tension upon adjacent portions or upon other objects that it contacts. This force is in the plane of the surface, and its amount per unit of length is surface tension. The value for water is about 0.073 N/m at 21 °C. The main effects of surface tension", "-28.339559598447522" ], [ "applications. However, the sea bottom lacks such features, making it hard to find correspondences in two images.\nIn order to be able to use a camera in the water, a watertight housing is required. However, refraction will happen at the water-glass and glass-air interface due to differences in density of the materials. This has the effect of introducing a non-linear image deformation.\nThe motion of the vehicle presents another special challenge. Underwater vehicles are constantly moving due to currents and other phenomena. This introduces another uncertainty to algorithms, where small motions may appear in all directions. This can be specially important for", "-28.338962728448678" ], [ "water. Water has a density of 1 kilogram per litre (8.3 lb/US gal), which means that the mass of water displaced by any of the above objects when fully submerged, is 1 kg (2.2 lb).\nGalileo discovered that the density of a liquid is a function of its temperature. This is the key to how the Galileo thermometer works: as the temperature of most liquids increases, their density decreases.\nFigure 3 shows a 1 kg (2.2 lb) hollow object made of the green material. In the left-hand container, the density of the liquid is 1.001 kg/L (8.35 lb/US gal). Since the object weighs less than the water it displaces, it floats.", "-28.26811243766315" ], [ "etc.) and molecular structure of most liquids are chiefly responsible for their excellent optical transmission. The ability of liquids to \"heal\" internal defects via viscous flow is one of the reasons why some fibrous materials (e.g., paper or fabric) increase their apparent transparency when wetted. The liquid fills up numerous voids making the material more structurally homogeneous.\nLight scattering in an ideal defect-free crystalline (non-metallic) solid which provides no scattering centers for incoming light will be due primarily to any effects of anharmonicity within the ordered lattice. Light transmission will be highly directional due to the typical anisotropy of crystalline substances,", "-28.192698299419135" ], [ "Floating hinge A floating hinge is a hinge that, while able to behave as a normal hinge, enables one of the objects to move away from the other - hence float. In effect the hinge allows for two parallel axes of rotation, one for each object joined by the hinge, and each axis can be moved relative to the position of the other. Uses Floating hinges are used in flatbed scanners designed to scan thick objects such as books. A sheet of paper is placed on the glass, and the cover is lowered over it; the glass, the paper, and", "-28.01424517238047" ], [ "of the container is proportional to the pressure and radius of the vessel and inversely proportional to the thickness of the walls. Therefore, pressure vessels are designed to have a thickness proportional to the radius of tank and the pressure of the tank and inversely proportional to the maximum allowed normal stress of the particular material used in the walls of the container.\nBecause (for a given pressure) the thickness of the walls scales with the radius of the tank, the mass of a tank (which scales as the length times radius times thickness of the wall for a cylindrical tank)", "-28.002611067844555" ], [ "the density of the fluid. If the weight of the object is less than this displaced quantity, the object floats; if more, it sinks. The amount of fluid displaced is directly related (via Archimedes' principle) to its volume.\nIn the case of an object that sinks (is totally submerged), the volume of the object is displaced. In the case of an object that floats, the amount of fluid displaced will be equal in weight to the displacing object.\nArchimedes' principle, a physical law of buoyancy, states that any body completely or partially submerged in a fluid (gas or liquid) at rest is", "-27.98885804298334" ], [ "This is because of the oscillations caused by the wave reflection of the medium boundary in the vibrating fluidized bed. Bubbling behaviour To assess the bubbling behaviour of the vibrating fluidized bed, factors such as the size of the bubble and its velocity were also taken into account. For various vibration amplitudes and frequencies, numerical simulations of the vibrating fluidized bed was conducted to better understand the behaviour of the bubbles under the vibrating conditions. The results showed that due to the oscillatory displacement of the vibrating fluidized bed causes the mean bubble diameter to increase but lowers the acceleration", "-27.98830932797864" ], [ "inwards in a clockwise rotating system. This is why anything floating, including fresher water tends to move toward the centre of the system. Indeed, there is a slight bulge in the centre of the Beaufort gyre when it is rotating in its predominant clockwise direction. If, as is speculated, as the Arctic Ocean becomes a heat collector resulting in a low pressure, counter clockwise rotating system, the Beaufort Gyre can be expected to follow suit and send the fresher water outward to be captured by the transpolar current. This could well bring up the saltier, slightly", "-27.890685544000007" ], [ "as for other liquids, like of oil on top of water. Oil and water do not mix, but it also happens for fluids that do mix. Any two liquids which have a different density can be floated on top of each other. The buoyancy force prevents the fluids from mixing immediately, although the fluids do mix eventually over time, if they mix at all. To prevent the fluids from mixing through turbulence, it is important to pour them very slowly during layering.\nBarkeepers often do not talk about density, but call fluids 'lighter' and 'heavier' or refer to 'specific gravity', which", "-27.76936267921701" ], [ "a vessel, the vessel expands along with the liquid. Hence the observed increase in volume of the liquid level is not actual increase in its volume. The expansion of the liquid relative to the container is called its apparent expansion, while the actual expansion of the liquid is called real expansion or absolute expansion. The ratio of apparent increase in volume of the liquid per unit rise of temperature to the original volume is called its coefficient of apparent expansion.\nFor small and equal rises in temperature, the increase in volume (real expansion) of a liquid is equal to the sum", "-27.75977882402367" ], [ "container, filled with the substance to be heated, fits inside the outer container filled with the working fluid (usually water), and the whole is heated at, or below, the base, causing the temperature of the materials in both containers to rise as needed. The constant boiling temperature of the water helps to keep contents of the inner pot from boiling or scorching.\nWhen the working fluid is water and the bain-marie is used at sea level, the maximum temperature of the material in the lower container will not exceed 100 degrees Celsius (212 °F), the boiling point of water at sea", "-27.754910429386655" ], [ "Float (oceanographic instrument platform) A float (not to be confused with a drifter) is an oceanographic instrument platform used for making subsurface measurements in the ocean. Common sensors carried by floats include temperature, conductivity, and pressure (from which salinity can be calculated), and, for acoustically tracked floats, a hydrophone, though a wide range of other sensors have been deployed on floats as well. Often, floats are treated as disposable, as the expense of recovering them from remote areas of the ocean is prohibitive; when the batteries fail, a float ceases to function, and drifts at depth until it runs", "-27.65556796718738" ], [ "tension can vary because of inhomogeneous composition of the substances or the temperature-dependence of surface tension forces. In the latter case the effect is known as thermo-capillary convection.\nA well-known phenomenon exhibiting this type of convection is the \"tears of wine\". Weissenberg effect The Weissenberg effect is a phenomenon that occurs when a spinning rod is placed into a solution of liquid polymer. Entanglements cause the polymer chains to be drawn towards the rod instead of being thrown outward as would happen with an ordinary fluid (i.e., water). Combustion In a zero-gravity environment, there can be no buoyancy forces, and", "-27.652614987535344" ], [ "electromagnetic waves change direction at the interface between two mediums with different IR; thus bubbles can be identified from the accompanying refraction and internal reflection even though both the immersed and immersing mediums are transparent.\nThe above explanation only holds for bubbles of one medium submerged in another medium (e.g. bubbles of gas in a soft drink); the volume of a membrane bubble (e.g. soap bubble) will not distort light very much, and one can only see a membrane bubble due to thin-film diffraction and reflection. Applications Nucleation can be intentionally induced, for example to create a bubblegram in a solid.\nIn", "-27.64978970878292" ], [ "a highly gas-permeable material such as palladium (which is a high-capacity hydrogen sponge) create special outgassing problems.\nOutgassing from surfaces is a subtler problem. At extremely low pressures, more gas molecules are adsorbed on the walls than are floating in the chamber, so the total surface area inside a chamber is more important than its volume for reaching UHV. Water is a significant source of outgassing because a thin layer of water vapor rapidly adsorbs to everything whenever the chamber is opened to air. Water evaporates from surfaces too slowly to be fully removed at room temperature, but just fast enough", "-27.636984939221293" ], [ "surface and a liquid drop makes the lateral adhesion in this case, an individual field. Lateral adhesion can be measured using the centrifugal adhesion balance (CAB), which uses a combination of centrifugal and gravitational forces to decouple the normal and lateral forces in the problem.", "-27.59621325833723" ], [ "wall. The more you push, the narrow the pile becomes, and it rises in a ridge. But there is nothing stable in the pile. The individual pieces (ice in the case of shelf ice) are not initially connected; they only float upon the water surface and rest upon each other. Many become jammed together but throughout the structure, there are pockets of air. Since each piece of ice developed independently, each is of a different thickness, creating variations in strength, density, and depth.\nOver time, the 'shelf' extends out from the shore in a long-lasting floating ledge.", "-27.590121516142972" ], [ "large particles causes them to separate from the gas stream lines. The larger particles can be collected and removed from the gas stream after collisions with the walls of the vessel.\nThe two common types of inertial separators are cyclones, which spin the gas stream, causing collisions of the heavier particles with the outside of the cyclone wall, and impactors, where the gas particle stream is directed at a greased metal plate and turned at the last moment, causing the larger particles to stick to the greased plate.\nModern particulate samplers use a volumetric flow control system that pulls air through", "-27.583771800040267" ], [ "reservoir, it will either float, bounce, coalesce with the reservoir, or splash. In the case of floating, a drop will float on the surface for several seconds. Cleanliness of the liquid surface is reportedly very important in the ability of drops to float. Drop bouncing can occur on perturbed liquid surfaces. If the drop is able to rupture a thin film of gas separating it from the liquid reservoir, it can coalesce. Finally, higher Weber number drop impacts (with greater energy) produce splashing. In the splashing regime, the striking drop creates a crater in the fluid surface, followed by a", "-27.514492490969133" ], [ "curved-surface fluid and demonstrated that surface tension is a powerful driving force for fluid motion.\nThe Drop Physics Module (DPM) permitted the study of liquids without the interference of a container. Liquids on Earth take the shape of the container that holds them. Furthermore, the materials that make up the container may chemically contaminate the liquids under study. The DPM uses acoustical (sound) waves to position a drop in the center of a chamber. By studying drops in this manner, scientists have the opportunity to test basic fluid physics theories in the areas of nonlinear dynamics, capillary waves, and surface rheology", "-27.49783976728213" ], [ "means the same. If two identical volumes of fluids are compared, the denser one weighs more than the lighter one. Floating Liqueurs in practice Floating only works if the denser liquor is poured into the glass first. If the lighter one is poured in first, the denser one falls through to the bottom of the glass, which creates a lot of unwanted turbulence. Densities of common cocktail ingredients can be looked up online, or one uses the following rule of thumb. Sweet liqueurs with low proof are the heaviest, and dry liqueurs with high proof the lightest.\nBegin by pouring the", "-27.48165970708942" ], [ "2 °C and the salinity 34.58 parts per thousand. Thus, including the effect of pressure (water is slightly compressible) the density of sea-water is about 1.0369 g/cm³. The change in density divided by the deep density is 0.0109.\nThe float has to match these densities if it is to reach 2000 metres depth and then rise to the surface. Since the density of the float is its mass divided by volume, it needs to change its volume by 0.0109 × 16,600 = 181 cm³ to drive that excursion; a small amount of that volume change is provided by the compressibility of the float", "-27.477801515255123" ], [ "To some extent, how much light reflects for a given amount of particulates is dependent upon properties of the particles like their shape, color, and reflectivity. For this reason (and the reason that heavier particles settle quickly and do not contribute to a turbidity reading), a correlation between turbidity and total suspended solids (TSS) is somewhat unusual for each location or situation.\nTurbidity in lakes, reservoirs, channels, and the ocean can be measured using a Secchi disk. This black and white disk is lowered into the water until it can no longer be seen; the depth (Secchi depth) is then recorded", "-27.40535288664978" ], [ "walls. The static electric field acting on the liquid with gas bubbles results in the deformation of dielectrics and therefore leads to a change in the volumes of the particles. We note that, the electromagnetic waves in the medium propagate with a velocity much greater than the velocity of sound in the same medium. This results to the assumption that the effective pump wave acting on the bubbles does not depend on the spatial coordinates. The pressure of a wave pump in the system leads to both the appearance of a backward wave and a dynamical instability of", "-27.40324649150716" ], [ "container surface. The result (proved below) is that the total charge induced on the inside of the container is equal to the charge on C.\nIn Procedure 5, when C is touched to the container's inner wall, all the charge on C flows out and neutralizes the induced charge, leaving both the inner wall and C uncharged. The container is left with the charge on its outside. The net effect is that all the charge that was previously on C is now on the outside of the container.\nAn important conclusion that can be drawn from this is that", "-27.403167449258035" ], [ "Random close pack Random close packing (RCP) is an empirical parameter used to characterize the maximum volume fraction of solid objects obtained when they are packed randomly. For example, when a solid container is filled with grain, shaking the container will reduce the volume taken up by the objects, thus allowing more grain to be added to the container. In other words, shaking increases the density of packed objects. But shaking cannot increase the density indefinitely, a limit is reached, and if this is reached without obvious packing into a regular crystal lattice, this is the empirical random close-packed density.\nExperiments", "-27.353278997470625" ], [ "from each other and a new interface between the inner surface of the liquid dispersion medium and the surface of the dispersed particles is generated. This process is facilitated by molecular diffusion and convection.\nWith respect to molecular diffusion, dispersion occurs as a result of an unequal concentration of the introduced material throughout the bulk medium. When the dispersed material is first introduced into the bulk medium, the region at which it is introduced then has a higher concentration of that material than any other point in the bulk. This unequal distribution results in a concentration gradient that drives the dispersion", "-27.29954304851708" ], [ "a powder poured into a cylinder will have a particular bulk density; if the cylinder is disturbed, the powder particles will move and usually settle closer together, resulting in a higher bulk density. For this reason, the bulk density of powders is usually reported both as \"freely settled\" (or \"poured\" density) and \"tapped\" density (where the tapped density refers to the bulk density of the powder after a specified compaction process, usually involving vibration of the container.)", "-27.288402107340517" ], [ "proportional to its mass. The tendency of a given particle to move through the liquid because of this force is offset by the resistance the liquid exerts on the particle. The net effect of \"spinning\" the sample in a centrifuge is that massive, small, and dense particles move outward faster than less massive particles or particles with more \"drag\" in the liquid. When suspensions of particles are \"spun\" in a centrifuge, a \"pellet\" may form at the bottom of the vessel that is enriched for the most massive particles with low drag in the liquid.\nNon-compacted particles remain mostly in the", "-27.27884162167902" ], [ "shore. As the ratio of wave amplitude to water depth becomes such that the wave “feels the bottom,” water at the base of the wave slows down due to friction with the sea floor. This causes the wave to become asymmetrical and the face of the wave to steepen, and finally the wave will break, propagating forward as an internal bore. Internal waves are often formed as tides pass over a shelf break. The largest of these waves are generated during springtides and those of sufficient magnitude break and progress across the shelf as bores. These bores are evidenced by", "-27.276176397455856" ], [ "in their gas-like state are highly reactive and will rapidly interact with ions of opposite charge to give neutral molecules or ionic salts. Ions are also produced in the liquid or solid state when salts interact with solvents (for example, water) to produce solvated ions, which are more stable, for reasons involving a combination of energy and entropy changes as the ions move away from each other to interact with the liquid. These stabilized species are more commonly found in the environment at low temperatures. A common example is the ions present in seawater, which are derived from dissolved", "-27.225905400293414" ], [ "adhesion to the material of the container determines the degree of wetting, the contact angle and the shape of meniscus. When cohesion dominates (specifically, adhesion energy is less than half of cohesion energy) the wetting is low and the meniscus is convex at a vertical wall (as for mercury in a glass container). On the other hand, when adhesion dominates (adhesion energy more than half of cohesion energy) the wetting is high and the similar meniscus is concave (as in water in a glass).\nSurface tension is responsible for the shape of liquid droplets. Although easily deformed, droplets of water tend", "-27.208278944017366" ], [ "If a small amount of water is able to bridge the gaps between particles, electrostatic attraction of the water to mineral surfaces will increase the angle of repose, and related quantities such as the soil strength.\nWhen bulk granular materials are poured onto a horizontal surface, a conical pile will form. The internal angle between the surface of the pile and the horizontal surface is known as the angle of repose and is related to the density, surface area and shapes of the particles, and the coefficient of friction of the material. Material with a low angle of repose forms flatter", "-27.1732238541299" ], [ "strongly than fine matter. Due to centrifugal force, matter tends towards the outer edges of the vortex, which causes a condensation of this matter there. The rough matter cannot follow this movement due to its greater inertia—so due to the pressure of the condensed outer matter those parts will be pushed into the center of the vortex. According to Descartes, this inward pressure is nothing other than gravity. He compared this mechanism with the fact that if a rotating, liquid filled vessel is stopped, the liquid goes on to rotate. Now, if one drops small pieces of light matter (e.g.", "-27.143500759731978" ], [ "forming ice causes it to sink towards the bottom. On a large scale, the process of brine rejection and sinking cold salty water results in ocean currents forming to transport such water away from the Poles, leading to a global system of currents called the thermohaline circulation. Miscibility and condensation Water is miscible with many liquids, including ethanol in all proportions. Water and most oils are immiscible usually forming layers according to increasing density from the top. This can be predicted by comparing the polarity. Water being a relatively polar compound will tend to be miscible with liquids of high", "-27.13097456842661" ], [ "the liquid to form vapor bubbles inside the bulk of the substance. Bubble formation deeper in the liquid requires a higher temperature due to the higher fluid pressure, because fluid pressure increases above the atmospheric pressure as the depth increases. More important at shallow depths is the higher temperature required to start bubble formation. The surface tension of the bubble wall leads to an overpressure in the very small, initial bubbles. Thus, thermometer calibration should not rely on the temperature in boiling water.\nThe vapor pressure that a single component in a mixture contributes to the total pressure in the system", "-27.127385510859312" ], [ "the surface. The velocity of the surface waves varies as the square root of the wavelength if the liquid is deep; therefore long waves on the sea go faster than short ones. Very minute waves or ripples are not due to gravity but to capillary action, and have properties different from those of the longer ocean surface waves,\nbecause the surface is increased in area by the ripples and the capillary forces are in this case large compared with the gravitational forces.\nCapillary ripples are damped both by sub-surface viscosity and by surface rheology. Rotation If a liquid is contained in a", "-27.08462107012747" ], [ "in moving containers, where liquid oscillations due to the container motion impose substantial magnitudes of forces and moments to the container structure that affect the stability of the container transport system in a highly adverse manner. Another prominent example is the start up of a rocket engine, e.g. Space Shuttle main engine (SSME), where FSI can lead to considerable unsteady side loads on the nozzle structure. Numerical simulation The Newton–Raphson method or a different fixed-point iteration can be used to solve FSI problems. Methods based on Newton–Raphson iteration are used in both the monolithic \n and the partitioned approach.", "-27.081286998756696" ], [ "gravity and other factors that affect buoyancy. These sensors work well for liquid level measurements in marine, chemical processing, pharmaceuticals, food processing, waste treatment, and other applications. With the proper choice of two floats, resistive chain level sensors can also be used to monitor for the presence of an interface between two immiscible liquids whose specific gravities are more than 0.6, but differ by as little as 0.1 unit. Magnetoresistive Magnetoresistance float level sensors are similar to float level sensors however a permanent magnet pair is sealed inside the float arm pivot. As the float moves up the motion and", "-27.06013128743507" ], [ "Floater Causes There are various causes for the appearance of floaters, of which the most common are described here.\nFloaters can occur when eyes age; in rare cases, floaters may be a sign of retinal detachment or a retinal tear. Vitreous syneresis The most common cause of floaters is shrinkage of the vitreous humour. This gel-like substance consists of 99% water and 1% solid elements. The solid portion consists of a network of collagen and hyaluronic acid, with the latter retaining water molecules. Depolymerization of this network makes the hyaluronic acid release its trapped water, thereby liquefying the gel. The collagen", "-27.050150563241914" ], [ "If the liquid and vapor are not evenly distributed across the superficial tower area as it enters the packed bed, the liquid to vapor ratio will not be correct and the required separation will not be achieved. The packing will appear to not be working properly. The height equivalent to a theoretical plate (HETP) will be greater than expected. The problem is not the packing itself but the mal-distribution of the fluids entering the packed bed. These columns can contain liquid distributors and redistributors which help to distribute the liquid evenly over a section of packing, increasing the efficiency of", "-27.02849348579184" ], [ "surface tension, viscosity, and also upon the surface roughness and the contact angle between the drop and the surface. Small drop deformation On superhydrophobic surfaces, liquid drops are observed to bounce off of the solid surface. Richard and Quéré showed that a small liquid drop was able to bounce off of a solid surface over 20 times before coming to rest. Of particular interest is the length of time that the drop remains in contact with the solid surface. This is important in applications such as heat transfer and aircraft icing. To find a relationship between drop size and contact", "-26.994435851607705" ], [ "between tissue and circulation bubbles, and between multiple bubbles, for dissolved gas for bubble growth. Bubble mechanics Equilibrium of forces on the surface is required for a bubble to exist. The sum of the Ambient pressure and pressure due to tissue distortion, exerted on the outside of the surface, with surface tension of the liquid at the interface between the bubble and the surroundings must be balanced by the pressure on the inside of the bubble. This is the sum of the partial pressures of the gases inside due to the net diffusion of gas to and from the bubble.", "-26.96600190616664" ], [ "by pressure, the viscosity remains the same.\nThe local tendency to orientation of molecules in small groups lends the liquid (as referred to previously) a certain degree of association. This association results in a considerable \"internal pressure\" within a liquid, which is due almost entirely to those molecules which, on account of their temporary low velocities (following the Maxwell distribution) have coalesced with other molecules. The internal pressure between several such molecules might correspond to that between a group of molecules in the solid form.", "-26.964351595874177" ], [ "tube walls, such as grease or air bubbles, or other minor influences such as turbulence or vibration, can cause the liquid to detach from the walls and lose all tensile strength.\nIn more detail, one can look at how the hydrostatic pressure varies through a static siphon, considering in turn the vertical tube from the top reservoir, the vertical tube from the bottom reservoir, and the horizontal tube connecting them (assuming a U-shape). At liquid level in the top reservoir, the liquid is under atmospheric pressure, and as one goes up the siphon, the hydrostatic pressure decreases (under vertical pressure variation),", "-26.95512625686024" ], [ "in a vessel. George Hayward Joyce, SJ, explained that, \"where the light of the candle is dependent on the candle's continued existence, not only does a candle produce light in a room in the first instance, but its continued presence is necessary if the illumination is to continue. If it is removed, the light ceases. Again, a liquid receives its shape from the vessel in which it is contained; but were the pressure of the containing sides withdrawn, it would not retain its form for an instant.\" This form of the argument is far more difficult to separate from a", "-26.9464531034464" ], [ "interference behavior. They used a square shaped vibrating fluid bath with a constant depth (aside from the walls). The “walls” were regions of much lower depth, where the droplets would be stopped or reflected away. When the droplets were placed in the same initial location, they would pass through the slits and be scattered, seemingly randomly. However, by plotting a histogram of the droplets based on scattering angle, the researchers found that the scattering angle was not random, but droplets had preferred directions that followed the same pattern as light or electrons. In this way, the droplet may mimic the", "-26.94541824566113" ], [ "layer interactions, solvation forces, hydration and hydrophobic forces. Water meniscus Water meniscus forces are highly interesting for AFM measurements in air. Due to the ambient humidity, a thin layer of water is formed between the tip and the sample during air measumements. The resulting capillary force gives rise to a strong attractive force that pulls the tip onto the surface. In fact, the adhesion force measured between tip and sample in ambient air of finite humidity is usually dominated by capillary forces. As a consequence, it is difficult to pull the tip away from the surface. For soft samples including", "-26.915176561567932" ], [ "characteristics for a system in thermodynamic equilibrium), but in contrast display structures similar to self-organisation, which can be described by non-equilibrium thermodynamics. This is the reason why some liquid dispersions turn to become gels or even solid at a concentration of a dispersed phase above a critical concentration (which is dependent on particle size and interfacial tension). Also, the sudden appearance of conductivity in a system of a dispersed conductive phase in an insulating matrix has been explained. Process of dispersion Dispersion is a process by which (in the case of solid dispersing in a liquid) agglomerated particles are separated", "-26.881555227566423" ], [ "released when an appropriate interaction of ions and ion exchange groups occur. The area and length of the drug release and number of cross-link polymers dictate the rate at which the drug is released, determining the SR effect. Floating systems A floating system is a system where it floats on gastric fluids due to low-density. The density of the gastric fluids is about 1 g/mL; thus, the drug/tablet administered must have a smaller density. The buoyancy will allow the system to float to the top of the stomach and release at a slower rate without worry of excreting it. ", "-26.873701053962577" ], [ "Confined liquid In condensed matter physics, a confined liquid is a liquid that is subject to geometric constraints on a nanoscopic scale so that most molecules are close enough to an interface to sense some difference from standard bulk conditions. Typical examples are liquids in porous media or liquids in solvation shells.\nConfinement regularly prevents crystallization, which enables liquids to be supercooled below their homegenous nucleation temperature even if this is impossible in the bulk state. This holds in particular for water, which is by far the most studied confined liquid.", "-26.83271012955811" ], [ "and distribution of the substance desired to be filtered. Ideally if the medium is too large, filtrate will be of a poor quality as it will fail to collect particulates within its matrix. Conversely if the medium is very small, solids will accumulate on the surface of the cartridge causing close to immediate blockages. In regards to the shape using grains that are round in shape have the tendency to erode due to the pressure the inlet stream may possess on the system, whereas grains that are flat (may increase surface area) however may float out of the system during", "-26.826103114173748" ], [ "to hydration on the sample surface. This force is due to the ability of the water to contact the tip, thus creating an undesirable attractive force. Capillary force, along with several other sources of tip contamination, are key factors in the decreased resolution observed while sampling\nThere are considerations which need to be taken into account when determining which mode is optimal for sampling for a given application. It has been shown that sampling in contact mode with very soft samples can damage the sample and render it useless for further studies. Sampling in non-contact mode is less destructive to the", "-26.825342179683503" ] ]
5ezowd
Why is it that some pregancies are described as the best overall feeling a woman has ever, and for other women, the worst they have ever felt? Why is it great for some and terrible for others?
[ "Obnoxious hormones. It was novel to me to see such drastic changes. I liked that I became curvy, but just standing made me short of breath, and sleeping was a struggle. Depending on the hormones, I felt one way or another. It's similar to drinking in that you have happy drunks and angry drunks, and it's usually based on how they felt before they started drinking.", "Person A is lying in order to get others to think being pregnant is awesome in order to further the species. Person B is honest.", "Not an expert, but I have some experience here. My wife has been pregnant twice. The first time she felt really good, the second time was hell for 9 months. The biggest difference for her was her lifestyle before getting pregnant. Before pregnancy 1, we were living in a warm climate; hiking, biking, and camping often. She was in great shape and handled the pregnancy well. After the first baby we moved to the city so I could get a better job. That change plus the addition of a child meant we were much less active. When she got pregnant again 2 years later, she wasn't in as good a shape as she was before, and she had a harder time with the pregnancy. Not sure if this info is relevant to your situation/question, but my wife and I felt it played a big part in her experience.", "I've never been a pregnant woman, but I've been around two with very different pregnancies. Based on this ridiculous small sample size: Emotions seem to get ratcheted up. If you're in a good place while pregnant, like you're stable and have few worries and have good support, then everything feels great. If you are worried about things, or lack support, etc then you'll feel it more. Of course, even if you have all those things or don't, your biology may make you more inclined to be happy or sad as well so it's not strictly external factors. So for some, pregnancy is a time of enhanced optimism, getting ready for the baby, looking forward to having the baby, etc. For others, it's a time of increased stress.", "One thing I've noticed as a labor nurse is that women who have gone to classes or educated themselves about the process tend to have more enjoyable pregancies. If nothing else, it seems like the less-prepared moms find everything stressful or scary (any twinge or ache or pain or symptom in general), whereas prepared moms understand what are normal things to feel during a pregnancy. Then of course you have things like HG (intractable nausea and vomiting, aka the Princess Kate disease) or PUPPs (ridiculous itching) which would make any happy, prepared pregnancy miserable.", "I would say a lot of it has to do with your state of mind. Last year was my first pregnancy, and i carried twins. I never had morning sickness, never had bad cramps until 4 weeks before delivery when they were just too big to flip around proper. Honestly the only time i felt like i had an issue was when i was not comfortable with the obgyn. He just didn't have the bed side manner i expected of the person to deliver my babies. I had 2 appointments with him, then switched. I was much happier and more comfortable with the woman i got, and any discomfort i felt went away. I also refused to let people tell me about their negative pregnancy. I stopped them in their tracks and said i only wanted to hear it if it was positive, that their horrible pregnancy experience is not mine.", "I think it depends on a number of factors: genetics, weight, pre existing conditions, mental Illness, etc- and of course, how your body reacts to hormones. Every person and every baby is different and thus some people have fantastic pregnancies and others have challenging ones- this is coming from a woman who is at 34 weeks of her first pregnancy; I have had a lot of difficulties despite being generally healthy, so I have tried to research this extensively." ]
[ [ "chaste for the longest time, receive the greatest commendation among their people; they think that by this the growth is promoted, by this the physical powers are increased and the sinews are strengthened. And to have had knowledge of a woman before the twentieth year they reckon among the most disgraceful acts; of which matter there is no concealment, because they bathe promiscuously in the rivers and [only] use skins or small cloaks of deer's hides, a large portion of the body being in consequence naked.\nThey do not pay much attention to agriculture, and a large portion of their food", "-30.98204510138021" ], [ "individuals may find comforting. Social and cultural norms may encourage benevolently sexist beliefs among women and men. A classic illustration of this is the endorsement of modern-day chivalry in interactions between women and men. It can be considered traditional and polite for a man to insist that he holds a door open or carries a heavy object for a woman. However, this tradition is founded in historical representations of women as weaker than men. In these types of circumstances, people may find it difficult to distinguish between kindness, tradition, and benevolent sexism. Men and women often disagree on whether or", "-30.393545594182797" ], [ "Linda finds herself at once popular with every man in the pueblo (because she is open to all sexual advances) and also reviled for the same reason, seen as a whore by the wives of the men who visit her and by the men themselves (who come to her nonetheless). Her only comforts there are mescal brought by Popé as well as peyotl. Linda is desperate to return to the World State and to soma, wanting nothing more from her remaining life than comfort until death.\nThe Arch-Community-Songster, The secular equivalent of the Archbishop of Canterbury in the World State society.", "-30.294372985663358" ], [ "with the pleasing sensations they were created to inspire. Thus confining truth, fortitude, and humanity, within the rigid pale of manly morals, they might justly argue, that to be loved, woman's high end and great distinction! they should 'learn to lisp, to totter in their walk, and nick-name God's creatures.' Never, they might repeat after you, was any man, much less a woman, rendered amiable by the force of those exalted qualities, fortitude, justice, wisdom, and truth; and thus forewarned of the sacrifice they must make to those austere, unnatural virtues, they would be authorised to turn all their attention", "-30.250748333346564" ], [ "as marriage makes many people happy, so it has made her happy. Similarly, religion has made her a better person; so it is best for her to continue to be a religious person. \"It is sweet to you to imagine beside you and above your head a great and powerful being, who sees you walking the earth; the idea steadies your footsteps. Continue, madame, to enjoy this august guarantor of your thoughts, this spectator, this sublime model for your actions,\" says Crudely-Diderot. The lady then says: \"You seem to have no mania for proselytism.\" \"Absolutely not,\" is Crudeli-Diderot's reply. Reception", "-29.96820697192743" ], [ "those who are favoured with the gifts of nature grow up exceedingly handsome, those from whom she withholds them are frightfully ugly. No wonder if among an adulterous and incestuous people, in which both births and marriages are illegitimate, a nation out of the pale of the laws, nature herself should be foully corrupted by perverse habits. It should seem that by the just judgements of God, nature sometimes produces such objects, contrary to her own laws, in order that those who will not regard Him duly by the light of their own consciences, should often have to", "-29.956754678991274" ], [ "enough and their beauty comes from the man's opinion and his praise. These thoughts become subconscious to women, as they internalize them so much that they don't notice them anymore. Most women wouldn't even be able to recognize that they feel the need to look nice for men or view their bodies as an object for men. It is something that is being planted in women's minds by objectification, and then cultivated into self-objectification.", "-29.206129679078003" ], [ "while simultaneously making them powerless.\nFor example, Sleeping Beauty who is born in guilt, suffers the sin of curiosity, is punished with a century of sleep as penance before being allowed to return to live in the world. After her return, she is subordinate to the prince who wakens her. Women who suffer the sin of pride are punished and some women, such as Sleeping Beauty's mother, are depicted as evil, who, described as an ogre and jealous of her son's wife and children, orders them to be cooked and served for dinner. In the end, Sleeping Beauty survives, while the", "-29.193277485552244" ], [ "her husband. Women who had orgasms were often told to go to church and confess this as a sin.\nComplutense University of Madrid rector José Botella Llusiá said, \"There are many women, mothers of numerous children, who confess they have not noticed more than very rarely, and some have never noticed anything, sexual pleasure, and this however, does not frustrate them, because women, although they say otherwise , what she looks for in a man is motherhood ... I have come to think that the woman is physiologically frigid, and even the excitement of the libido in the woman is a", "-29.117740868299734" ], [ "all of them negative.\" Among those reasons was how women were dehumanizingly treated then compared to the Goryeo Dynasty. \"The plot is moved mostly by the Pale Bride, the modern girl who can't understand what's going on…but the crux of it, really, was trying to get into the heads of everyone else[:] the men and women who have internalized all these awful misogynist ideals and take them completely for granted as the way things are. So the story really just formed itself around that question: what would it be like to be a woman in that society? History didn't care", "-28.965767793357372" ], [ "me are always strong women who also have moments of weakness; therefore, I never try to make heroines out of them. Instead I show how they fought to find their own way, how they put themselves out there, and how much they had to swallow in order to find themselves. I am fascinated by how they overcome obstacles in order to achieve their goals. Hildegard von Bingen had a dream of founding her own abbey, and she suffered a lot of setbacks in the process. The moments of her greatest weakness are when the nun Richardis is to be taken", "-28.935741617373424" ], [ "sickness are not values to be celebrated in order to spite those who are rich and healthy, but they simply provide the opportunity for a person to express his love. Rich people are harder to love because they are less in need of your generosity. Fear of death is a sign of a declining, sick, and broken life (Ressent 60). St. Francis' love and care for the lepers would have mortified the Greek mind, but for St. Francis, the threats to well-being are inconsequential because at the core of his being there is the awareness that his", "-28.8467111994687" ], [ "about only because people want to be honoured for doing good things.\nThe possession of the beautiful and the good has a correspondent in Latin: mens sana in corpore sano (\"a healthy soul in a healthy body\"). It is also seen as a target in balanced education of body and spirit.", "-28.77751829128829" ], [ "be) devoted and to guard what God has (willed to be) guarded even though out of sight (of the husband). As for those (women) on whose part you fear ill-will and nasty conduct, admonish them (first), (next) leave them alone in beds (and last) beat or separate them (from you). But if they obey you, then seek nothing against them. Behold, God is most high and great.\nMuhsin Khan, at Quran.com:\nMen are the protectors and maintainers of women, because Allah has made one of them to excel the other, and because they spend (to support them) from their means. Therefore the", "-28.719517952529714" ], [ " What is all this due to? They could not have done any deeds while they were in their mother's womb. Then, why then should such oddities exist? We have then to infer that these disparities must be the result of their deeds in their past births though they are born together at one time. There are many oddities in this world and it will have to be admitted that behind all this some powerful force is at work whereby the world appears to be full of oddities. This force is called 'karma'. We are unable to", "-28.579551878472557" ], [ "three guests who asked such a strange favour are not normal people since they are trying to place her in a tricky situation. Anasuya prayed to her husband in her mind and said that she doesn't have any fear serving them without clothes as she is not affected by lust. Since the guests asked for alms saying \"Bhavati Bhiksham Dehi\" (Oh Mother! Give us some food) and indirectly called her a mother. She decided that she will consider them as her children and serve them as requested. Because of her greatness and as per her thinking by the time she", "-28.573656446809764" ], [ "about women, \"Fierce is the dragon and cunning the asp; But women have the malice of both.\"\nAccording to the theologian Origen, women are worse than animals because they are continuously full of lust. Origen does not approve of the sexual act even in marriage and taught that although widowers can remarry, they are by no means crowned for this. He also argued in his commentary on 1 Corinthians 14:34-35 that female prophets never spoke publicly in the assembly.\nSt. Clement of Alexandria had such a contempt for women that he believed such a feeling must be universal. He wrote, in his", "-28.513466129545122" ], [ "as Anthony Ludovici, insist that he is only an anti-feminist, not a misogynist. Other writings include:\n\"Woman's love involves injustice and blindness against everything that she does not love... Woman is not yet capable of friendship: women are still cats and birds. Or at best cows... (Thus Spoke Zarathustra, On the Friend)\n\"Woman! One-half of mankind is weak, typically sick, changeable, inconstant... she needs a religion of weakness that glorifies being weak, loving, and being humble as divine: or better, she makes the strong weak--she rules when she succeeds in overcoming the strong... Woman has always conspired with the types of decadence,", "-28.509850666501734" ], [ "come when each man, doing what seems right in his own eyes, would also be doing what is in fact best for the community, because all will be guided by principles of pure reason.\nSuch optimism was combined with a strong empiricism to support Godwin's belief that the evil actions of men are solely reliant on the corrupting influence of social conditions, and that changing these conditions could remove the evil in man. This is similar to the ideas of his wife, Mary Wollstonecraft, concerning the shortcomings of women as due to discouragement during their upbringing.\nPeter Kropotkin remarked of Godwin that", "-28.458802494369593" ], [ "the source of her strength. Religion belonged to woman by divine right, a gift of God and nature. This \"peculiar susceptibility\" to religion was given her for a reason: \"the vestal flame of piety, lighted tip by Heaven in the breast of woman\" would throw its beams into the naughty world of men (Welter, 152).\nAccording to Nancy Woloch, \"Female converts outnumbered male converts three to two in the Second Great Awakening in New England. ... By 1814, for instance, women outnumbered men in the churches and religious societies in rural Utica, and they could be relied upon to urge the", "-28.400126994063612" ], [ "and women must surely be. Unfortunately, they prove to be more real than wonderful.", "-28.381796092056902" ], [ "very interested in women (or other men), and Arthur's relations with his various mistresses is more a comic device than a matter of emotion. Guenièvre, for a reason left mysterious in the first 5 seasons, remains a virgin, and this too is a source of comedy as she tries to figure out, for example, why she can't get pregnant. As the characters become familiar, dramatic or emotional situations can arise from this kind of comedy.\nThe series occasionally gives humorous (but always possible) explanations for historical facts. For instance, Kaamelott explains the creation of the national attire of Scotland, the", "-28.29584095790051" ], [ "Wicked Women Reception The collection was well-received by critics. According to the Publishers Weekly review, \"These 20 saucy tales prove that the worst varieties of human pretension and evil are often the most entertaining, especially in the hands of an expert vivisectionist like Weldon.\" The Kirkus review stated that, \"Both sexes and all ages come in for some merry tweaking by this master of sexual satire--making this outing a familiar pleasure for old fans and a thoroughly satisfying introduction for newcomers.\" New York Times reviewer Deborah Mason writes, \"Weldon's wrap-ups are eloquent and absolute. They are born of her belief", "-28.22799343528459" ], [ "and bad sides; an object for someone else's viewing pleasure.\nIn her book Beauty Myth, Naomi Wolf talks about how beauty has become a negative, hurtful thing instead of a positive thing. Instead of women having natural beauty, beauty is what men give them. A woman is only beautiful if a man tells her she is beautiful, and women slave away to make themselves beautiful in the eyes of men. That could look like working out before a wedding day or getting up early and putting on make-up before he wakes up. These are examples of women thinking they're not good", "-28.19946995083592" ], [ "elderly married people become strangely like one another, although probably Science with its measuring instruments would \"prove\" the exact opposite. It is impossible to exaggerate the formative power of this living pulse, this strong inward feeling for the perfection of one's own type. The feeling for race-beauty—so opposite to the conscious taste of ripe urbans for intellectual-individual traits of beauty—is immensely strong in primitive men, and for that very reason never emerges into their consciousness. But such a feeling is race-forming. It undoubtedly molded the warrior- and hero-type of a nomad tribe more and definitely on one bodily ideal, so", "-28.194064956274815" ], [ "with more caring types\" – the \"bad boys\" tending to exhibit the dark triad, i.e., \"the self-obsession of narcissism, the impulsive, thrill-seeking and callous behaviour of the psychopath and the deceitful and exploitative nature of Machiavellianism\". It is a possibility that women leave to escape their circumstances of abuse, disease or pregnancy to seek a chance with the nice guy (they rejected previously), afterwards.\nHerold and Milhausen claim: \"While 'nice guys' may not be competitive in terms of numbers of sexual partners, they tend to be more successful with respect to longer-term, committed relationships.\"\nAnother study indicates that \"for brief affairs, women", "-28.17228517474723" ], [ "holiness of all the founders of the nation, because they, with souls emancipated from the body, exhibiting a genuine and sincere obedience to the Ruler of all things, are not accustomed to offer up ineffectual prayers on behalf of their sons and daughters, since the Father has given to them, as a reward, that they shall be heard in their prayers.\"\nPhilo - On Rewards And Punishments (166) Jewish feminism Feminist views in Judaism often retain the traditional view that God does not have any sex but does have a gender which is male, but experiment with the use of feminine", "-28.10759637420415" ], [ "are understood by adherents to be the anointing of the holy spirit and evidence of God 'doing a new work'. One of the most controversial and strange examples is that of spiritual birthing - a practice during which women, and at times even men, claim to be having actual contractions of the womb while they moan and retch as though experiencing childbirth. It is said to be a prophetic action bringing spiritual blessings from God into the world. Many believe spiritual birthing to be highly demonic in nature and more occult-like than Christian. Religious ecstasy", "-28.10671761748381" ], [ "indecent. They have likewise disposed of all life, carrying on a great farce of pretended devotion in barns, & woods, where they lodge and lye all together, & hold likewise a community of women, as it is another of their tenets that they can commit no moral sin. [...] This My Dear Sir, is one of the many instances of the folly in leaving the guidance of sound reason, & common sense in matters of Religion.\"", "-28.10444785672007" ], [ "steadfastly non-religious man, a self-described humanist\".\nNevertheless, she wrote, \"I've remained deeply attracted to the tale of suffering and resurrection at the heart of the Christian narrative. Endlessly fascinated by accounts of religion, belief, myth, legend and fairytales... I'm one of those pathetic non-believers philosopher Alain de Botton bangs on about. The sad, godless orphans who can't pass a church or temple without entering to light a candle or offer a flower.\"\nIn an essay in Destroying The Joint: Why Women Have To Change The World edited by Jane Caro, Harmer wrote that her two children have been confirmed into the Catholic", "-28.07991149328882" ], [ "bad become worse. One woman's husband metamorphosized into a tree. Another person was chased down streets by statues that came to life. But facing the brilliance is also a rite of passage if you must develop as a being inclined towards acts of goodness, or a being inclined towards acts of evil. It is during those two weeks that the good are pitted against the bad, and it is also a time when their living god must face his successor.\nTo help in the conversion effort, Catholic missionaries have been sent to the planet to help reconcile", "-28.075451488650288" ], [ "in praise and contempt of women at one time or another. For instance, in the following passage: \"What inspires respect for woman, and often enough even fear, is her nature, which is more “natural” than man’s, the genuine, cunning suppleness of a beast of prey, the tiger’s claw under the glove, the naiveté of her egoism, her uneducability and inner wildness, the incomprehensibility, scope, and movement of her desires and virtues.\" (Beyond Good and Evil, section 239.)\nHis attitude can sometimes be entirely disparaging: \"From the beginning, nothing has been more alien, repugnant, and hostile to woman than truth—her great art", "-28.06571090950456" ], [ "to reality. Which was the case with me, as it is with everyone. I had been told that this life was easy and largely open to intelligent, vagarious people, and experience showed me that only cynics and lackeys can get a good seat at the banquet.\nI had been told that society’s institutions were founded on justice and equality, and all around me I could see nothing but lies and treachery. Everyday I was disabused further. Everywhere I went, I witnessed the same pain in some, the same delights in others. It did not take me long to realize that the", "-28.058124355447944" ], [ "a woman has been and still is especially terrifying - not only to the woman who experiences self-revulsion and anger, invisibility and abandonment, but also to the men who find her presence so unbearable they must - quite literally - disavow and divorce her\". Sobchack further points out the additional complexity of the \"double standard\" of the aging man and woman, naming it as a \"standard that elicits a complex of engendered emotions from both the women and the men who bear it: fear, humiliation, abjection, shame, power, rage, and guilt\". Legacy On television, The Leech Woman was shown on", "-28.05257930521475" ], [ "surface, these beliefs are extremely caustic to gender equity and restrict women's personal, professional, political, and social opportunities. This is because these seemingly positive evaluations imply that (a) women are weak and need to be protected, (b) women should not deviate from traditional gender roles as mothers and caretakers, and (c) women should be idolized by men for their sexual purity and availability.\nBecause benevolently sexist attitudes appear positive, people often do not identify these beliefs as a form of gender-based prejudice. Furthermore, benevolent sexism may be seen by both men and women as reinforcing of the status quo, which some", "-27.985046539844916" ], [ "(such as masseurs, hairdressers, flower-sellers, domestic servants, etc.) and were generally attributed a semi-divine status. Their participation in religious ceremonies, especially as crossdressing dancers and devotees of certain temple gods/goddesses, is considered auspicious in traditional Hinduism. Some Hindus believe that third-sex people have special powers allowing them to bless or curse others. However, these beliefs are not upheld in all divisions of Hinduism. In Hinduism, the universal creation is honored as unlimitedly diverse and the recognition of a third sex is simply one more aspect of this understanding. Transgender people in contemporary Indian society In October 2013, \"India's Supreme court", "-27.955308079486713" ], [ "for speaking out, invited Waldman onto her television show, to discuss her views on love, marriage, and motherhood. Bad Mother After Waldman complained about the response to her essay, a friend suggested she write a book about it. In 2009, Waldman published a collection of her personal essays, Bad Mother: A Chronicle of Maternal Crimes, Minor Calamities, and Occasional Moments of Grace. The book argues that no woman can be a perfect mother, that, in fact, competitive, neurotic parenting and having unrealistic expectations may be damaging to children. Waldman contends that society (particularly women, in what she calls the \"Bad", "-27.950380257389043" ], [ "like an art the rules of which never fail; the simplest man with enthusiasm persuades better than the most eloquent with none.\nXIV. Men are not only subject to losing all recollection of kindnesses and injuries done them, they even hate those to whom they are obliged and cease to hate those who have harmed them. The effort of repaying the kindness and avenging the evil seem to them a servitude to which they are unwilling to submit.\nXXX. If we had no faults, we would not take so much pleasure in noticing those of others.\nCCLXI. Flirtatiousness is fundamental to a woman's", "-27.897619664290687" ], [ "mastery over one's passions, reason, will, and desire can harmoniously work together to do what is good.\nIn The Church of Jesus Christ of Latter-day Saints (LDS, not evangelical church), chastity is very important, quoting:\n\"Physical intimacy between husband and wife is a beautiful and sacred part of God's plan for His children. It is an expression of love within marriage and allows husband and wife to participate in the creation of life. God has commanded that this sacred power be expressed only between a man and a woman who are legally married. The law of chastity applies to both men and", "-27.85178162176453" ], [ "preserve my beauty, and, finally this last year he told me his true reason... that he had imagined women were quite different to what he saw I was, and that the reason he did not make me his Wife was because he was disgusted with my person the first evening.\"\nRuskin confirmed this in his statement to his lawyer during the annulment proceedings: \"It may be thought strange that I could abstain from a woman who to most people was so attractive. But though her face was beautiful, her person was not formed to excite passion. On the contrary, there", "-27.84424463288451" ], [ "Buddhist community. Hinduism In Hinduism, women are portrayed as equal or even greater than men. For instance, Kali Ma (Dark Mother) \"is the Hindu goddess of creation, preservation, and goddess of destruction.\" Her power included the origin of all creation's life, as well as the end of life. Due to her control over life and death, Kali was seen as a goddess who should be loved as well as feared. This leads to a higher status for the woman than the man, because everyone has to respect her in order to have a smooth life and live longer. Another", "-27.81176495552063" ], [ "beautiful and captivates, and that is enough ... Laborious learning or painful pondering, even if a woman should greatly succeed in it, destroys the merits that are proper to her sex.\"\nWomen's mental ability and understanding, then, refer to the beautiful. Men's deep, noble understanding is not suitable for women. Women have beautiful virtues such as kindness and benevolence. Men's virtue is noble and has to do with principles and duty. Because a woman is concerned with the beautiful, the worst that can be said against her is that she is disgusting. A man's greatest defect, however, would be that he", "-27.804458842503664" ], [ "and pleasure, fail to be either intrinsically good or good without qualification. Pleasure, for example, appears to not be good without qualification, because when people take pleasure in watching someone suffer, they make the situation ethically worse. He concludes that there is only one thing that is truly good:\nNothing in the world—indeed nothing even beyond the world—can possibly be conceived which could be called good without qualification except a good will. Divine command theory Although not all deontologists are religious, some believe in the 'divine command theory', which is actually a cluster of related theories which essentially state that an", "-27.79051039447222" ], [ "static, beelike society in imitation of some presumed primitive matriarchy. These stories are written by men. Why women who have been alone for generations should \"instinctively\" turn their sexual desires toward persons of whom they have only intellectual knowledge, or why female people are presumed to have an innate preference for Byzantine rigidity, I don't know.\nRuss also mentions Ursula K. Le Guin's novel The Left Hand of Darkness as an influence on the story.", "-27.77285165374633" ], [ "women, talk nicely about him. The reason why others talk ill of Esthappan is that either he does things that they are not capable of (for which they are jealous) or because they basically are immoral to accept someone’s good deeds. He can be seen doing a deathlike act which he himself clears as a sleep-act (Like Christ’s death on the cross) that might be to suggest that Christ was made to sleep by the same people for which He came and that He is not dead but still lives even on the cross.The inability of Esthappan in completely representing", "-27.66273125715088" ], [ "thought of herself as womanly because \"I always play and look and act 10 years younger than I am.\" However, she said, \"Something magical happened when I turned 25—I looked in the mirror and was like, 'You might not get carded for an R-rated movie anymore.' Like I didn't have a little stick figure anymore.\" Bell has said that many of her characters are tomboys because she was \"not homely enough to play the nerdy girl and not nearly pretty enough to play the pretty girl\".\nBell has been associated with the idea that \"nerdy is the new cool\", and she", "-27.64348876400618" ], [ "more susceptible to nervous disorders and to develop faulty reproductive tracts. One American physician expressed pleasure in the fact that the country was \"catching up\" to Europe in the prevalence of hysteria.\nAccording to Pierre Roussel and Jean-Jacques Rousseau, femininity is a natural and essential desire for women, \"Femininity is for both authors an essential nature, with defined functions, and the disease is explained by the non-fulfillment of natural desire.\" It is during this era of industrial revolution and the major development of cities and modern life, that this natural tendency is thought to be disrupted causing lethargy or melancholy", "-27.63803522454691" ], [ "beauty was made more appealing because of her repentance, which had a special attraction for a period so passionately interested in problems of mysticism, quietism and asceticism. The theme of the repentance of sinners and trials sent by God is illustrated in subjects such as the Repentance of St. Peter, Mary Magdalene, and Job. A number of written works give evidence to the cult of Magdalene and this cult became widespread since Provence contained two great sanctuaries dedicated to her: the grotto of La Sainte-Baume, and the Saintes-Maries-de-la-Mer.\nAfter being introduced to Jesus Christ, and along with her sister Martha, Mary", "-27.63115517795086" ], [ "the souls of thy redeemed ones, through thy spiritual absence; and it is Thou who must heal them with thy glorious presence\" (13.12). Why? Because that's the way divine love and free grace work. In heavenly affairs, points do not win prizes. Merit is merely worldly. The seed of the serpent and the seed of the woman Spiritual conflict is not, as so often appears, between the ways of God and the ways of this world, but between the seed of the serpent and the seed of the woman (38.13). The woman is Eve, the first woman. The serpent is", "-27.623943492711987" ], [ "and female viewers; The Guardian wrote, \"Men love her because they want to be with her. Women love her because they want to be her\". Chef Gary Rhodes said that viewers were attracted to her smile rather than her cooking. Despite often being labelled as a \"domestic goddess\", she insists that she exhibits very few of the qualities associated with the title. Relationships and children Lawson met journalist John Diamond in 1986, when they were both writing for The Sunday Times. They married in Venice in 1992, and have a daughter, Cosima, and a son, Bruno. Diamond was diagnosed with", "-27.614947605296038" ], [ "God often works through women and also that his actions are not always in keeping with standard mores. Feminist scholars such as Amy-Jill Levine support the idea that the addition of women to the male dominated genealogy demonstrates that women have an important role and serves to undermine the patriarchal message of the long list of male begat male.\nJerome is the first to have noted the sinful nature of the women. Bathsheba was an adulteress and Rahab was a harlot. There were many greater, more notable, and more virtuous women in Jewish history that are not mentioned. Jerome felt Matthew", "-27.614150110661285" ], [ "class of dishonesty, dishonesty magnificent in its proportions, and climbing into high places, has become at the same time so rampant and so splendid that there seems to be reason for fearing that men and women will be taught to feel that dishonesty, if it can become splendid, will cease to be abominable. If dishonesty can live in a gorgeous palace with pictures on all its walls, and gems in all its cupboards, with marble and ivory in all its corners, and can give Apician dinners, and get into Parliament, and deal in millions, then dishonesty is not disgraceful, and", "-27.613693988125306" ], [ "a loving mother, is ever trying to keep land and sea, mountain and valley, each in its place, to hush the angry winds and waves, balance the extremes of heat and cold, of rain and drought, that peace, harmony, and beauty may reign supreme. There is a striking analogy between matter and mind, and the present disorganization of society warns us that in the dethronement of woman we have let loose the elements of violence and ruin that she only has the power to curb. If the civilization of the age calls for an extension of the suffrage, surely a", "-27.61234708212396" ], [ " Another god had fetched the cure six days earlier. Despite such, she usually means well and will do anything to protect her loved ones. Because of her being the oldest, she believes it's also her duty to look after Belldandy and Skuld.\nUrd's impulsiveness often makes her act first without fully considering the consequences. She is also a constant meddler, seemingly unable to leave well enough alone. She is also quite short tempered for a goddess, and is rather easy to irritate and anger. Urd is also notable for her tendency to lie, something a goddess supposedly can't do (or,", "-27.609070041103223" ], [ "to make people happy. Noor Ul Ain of Youlin Magazine noted, \"All in all, the good, bad, ugly, entertaining are all parts played by men, while the women in Mohsin Ali's world are either silenced or sidelined, if not entirely excluded.\"", "-27.60629949963186" ], [ "have a heart filled with emotion, for a tender nature is a misfortune as well as a blessing, and no human can resist the power of love, even though friendship must at times be the comfort for the wise one, yes, nothing is more true than the inscription who were once placed upon the image of God of Love: 'Eho you are, her is your true master, he has been, he is and always will be.' You have to admit, my dear friend, that woman is truly an unhappy creature: while men have their complete freedom, she is always burdened", "-27.579732820951904" ], [ "witnessing the terrible things occurring to people they love as well as the country they love, they react differently. The character Guy in \"A Wall of Fire Rising,\" tries to defy hopelessness by stealing a brief moment of glory despite the fact that he knows it will end in death. The mother in \"New York Day Women\" begins a new life in the U.S., but she still can’t face the suffering she left behind. Although the people all experience the same types of hardships, they still remain individuals.", "-27.57459179662692" ], [ "numerous menstrual traditions \"bespeak quite different, even opposite, purposes and meanings.\" In some traditional societies, menstrual rituals are experienced by women as protective and empowering, offering women a space set apart from the male gaze and from unwanted sexual or domestic pressures and demands.\nAn instructive example is provided by the anthropologist Wynne Maggi, who describes the communal bashali (large menstrual house) of women in the Kalasha Valley (northwestern Pakistan) as their 'most holy place', respected by men, and serving as women's all-female organizing centre for establishing and maintaining gender solidarity and power. According to one body of cultural evolutionary scholarship,", "-27.573553447495215" ], [ "bestow on all people, cause me to love thy exalted lordship. Create in my heart, the worship of your divinity, and grant whatever is pleasing to thee because thou hast my life; By thy command, merciful Marduk, may the temple I have built endure for all time and may I be satisfied with its splendour; in its midst may I attain old age, may I be sated with offspring; therein may I receive the heavy tribute of all mankind; from the horizon of heaven to the zenith, may I have no enemies; may my descendants live therein forever and rule", "-27.566777223182726" ], [ "and allows herself to be seen by men. 'Oh, how regrettable! Why does she have such a weird mind'. When an incipient love affair comes to an end along with the tale it is of little surprise to any of the observers. Interpretation Donald Keene has suggested that, while the reader may be attracted by her independence of mind, the author was probably trying to satirize those with eccentric behaviour and unconventional tastes. Robert Backus argues that the modern reader may prefer her independence and naturalness to the \"excessive artificiality of the Heian conception of feminine beauty\". He also draws", "-27.564917952753603" ], [ "into the wild chaos of battle and die. Why didn't I turn out to be a man! I have no feeling for feminine virtues, for a woman's happiness. Only that which is wild, great, shining appeals to me. There is an unfortunate but unalterable imbalance in my soul; and it will and must remain so, since I am a woman and have desires like a man without a man's strength. That's why I'm so vacillating and so out of harmony with myself….\" Karoline suffered from a nervously induced melancholy and had an unpredictable temperament that alienated some.\nWhile attending a social", "-27.56239668111084" ], [ "states that in each previous world, the people, though originally happy, became disobedient and lived contrary to Tawa's plan. They engaged in sexual promiscuity, fought one another, and would not live in harmony. The most obedient were delivered (usually by Spider Woman) to the next higher world, with physical changes occurring both in the people in the course of their journey, and in the environment of the next world. In some stories, the former world was then destroyed along with their wicked inhabitants, whereas in others the good people were simply led away from the chaos which had been created", "-27.558031672553625" ], [ "like men, women have three core desires also, but a man cannot answer her question. Eldredge moves beyond the notion that the Beauty equals a woman. Beauty can be found in nature, music, story, art, and ultimately in relationship with God. According to Eldredge, a man must become a \"poet\" in this regard--enjoying beauty outside of a woman--before he pursues a woman. \nAlong the way, Eldredge constantly reminds his readers that only God can ultimately fulfill these three desires and the only reason a man has these three desires is because they are a reflection of the heart of God.", "-27.495052284830308" ], [ "idea of woman's being \"the last gift of God to man,\" however pretty it may sound to the ears of those who love to discourse upon. \" The poetry of romantic gallantry, and the generous promptings of chivalry,\" has nevertheless been the means of sinking her from an end into a mere means – of turning her into an appendage to man, instead of recognizing her as a part of man – of destroying her individuality, and rights, and responsibilities, and merging her moral being in that of man. Instead of Jehovah being her king, her lawgiver, her judge, she", "-27.486920700959672" ], [ "Such persons were not considered fully male or female in traditional Hinduism, being a combination of both. They are mentioned as third sex by nature (birth) and were not expected to behave like ordinary men and women. Hijras identify themselves as incomplete men, that they do not have the desires (for women) that other men do. This lack of desire they attribute to a \"defective organ.\" If a Hijra is not born with a \"defective\" organ (and most are not), he must make it so by emasculation. They often kept their own societies or town quarters, performed specific occupations", "-27.477689202904003" ], [ "of their 'restlessness and screams.' Those who 'failed' were, he thought, 'themselves responsible because they harbored doubts or had not practiced sufficiently,' and, rather predictably, 'intellectual' women who 'asked too many questions' were considered by Lamaze to be the most 'certain to fail.'\"", "-27.46250849532953" ], [ "they say is divine abiding here.\n\nHe will surely not come again to any womb (rebirth in the sense-desire realm).\n— Metta Sutta, Khp 8-9, Translated by Peter Harvey\nMetta or lovingkindness here, states Harvey, is a heartfelt aspiration for the happiness of all beings. It is different than \"lack of ill-will\", and more an antidote to it, fear and hatred. It is the precept to conquer anger by kindness, conquer the liar by truth, conquer stingy by giving, conquer evil by good, states Harvey. Maitrī and Mettā Metta is found in pre-Buddhist Vedic Sanskrit texts as Maitrī, Maitra and Mitra, which are derived", "-27.447288771072635" ], [ "world if all the women were her sort down on bathingsuits and lownecks of course nobody wanted her to wear them I suppose she was pious because no man would look at her twice I hope Ill never be like her a wonder she didnt want us to cover our faces but she was a welleducated woman certainly and her gabby talk about Mr Riordan here and Mr Riordan there I suppose he was glad to get shut of her. Spiritual approaches To most philosophers, the word \"consciousness\" connotes the relationship between the mind and the world. To writers on", "-27.44703542321804" ], [ "men are just too complicated and then again, men can find women complicated. But it all depends on the individual, because not all women think love is complicated and not all men think that, but there are some women and some men who strongly believe that love is just too complicated. Women, they're the first to say, 'It's your fault,' but most of the time it is [the man's] fault. But men are also great at turning that [shit] around on us and making us believe that we're wrong for something that we didn't even do. At the end of", "-27.444525189421256" ], [ "in both of them.\". However, \"whatever diminishes woman, in essence, also diminishes man, thus both are affected negatively.\"\nIt cites the recent Marian year (1987), the Church as bride of Christ, and the role of women in the Bible as the first witnesses to the Resurrection as proof that Christianity values women, men, and all members of the community. It also mentions the importance of traditional roles of women, such as mother, teacher, and daughter in contemporary society.\nThe document refers to several female saints, including Monica, Macrina, Olga of Kiev, Matilda of Tuscany, Hedwig of Silesia, Jadwiga of Poland, Elizabeth of", "-27.435682035196805" ], [ "have no right to feel superior to mortals who fall from virtue more readily because they have been more often tempted. The fairies Lutin, Ethais and Phyllon have brought great news. Their king has decided to bestow on the fairies the gift of mortal love! Selene's final speech, rejecting this gift, prefers the fairies' life of placid tranquillity to the interesting but tempestuous life the mortals enjoy. \"No, Ethais – we will not have this love!\"", "-27.425876021494332" ], [ "than half-persuaded that I am a man's soul put by some freak of nature into a woman's body. … because I have fallen in love with so many pretty girls and never once the least bit with any man.” However, Alcott's romance while in Europe with the young Polish man Ladislas \"Laddie\" Wisniewski was detailed in her journals but then deleted by Alcott herself before her death. Alcott identified Laddie as the model for Laurie in Little Women. Likewise, every character seems to be paralleled to some extent, from Beth's death mirroring Lizzie's to Jo's rivalry with the youngest, Amy,", "-27.408202981032446" ], [ "a good job. So I wrote Good Stories for Good Children,\"\n he said during the ceremony.\nAzar Yazdi never married. Once, he was asked the reason for this and he joked, \n\"I could not live with a crazy woman, and if she was a wise woman, she could never live with me!\"\n\nHe believed that life owes him something, saying, \n\"I have frequently been only at someone else's service. I have always economized and have had a hard time of it.\"\n \n\"I never eat well, except at parties or here (at his adopted son's home in Karaj). I am never well-dressed. Some", "-27.40526586519627" ], [ "what kind of divinity is it, which cannot make a mere mortal swoon and charmed enough to forget and give up the world and its luxuries? The beauty of the divine couple was so much that lesser mortals, like you and me, won't be able to bear such a heavenly beauty. Sensing this Swami Haridasji requested both of them to take a single form, as the world won't be able to bear their image. He requested them to take a single form like Ghan (cloud) and Damini (lightning), thus giving a perfect metaphor to the combined beauty of dark Lord", "-27.382820629423804" ], [ "man, let's fight the brutal pretention of the male who thinks he owns the female, let's fight religious, social and sexual prejudice, let's expand education and then we will be happy with reason if there are no more evils than love. In any case, the ones with bad luck in love will procur themselves other pleasures, since it will not happen like today, when love and alcohol are the only consolations of the majority of humanity.\" Anarcha-feminism Anarcha-feminism was inspired by late 19th and early 20th century authors and theorists such as anarchist feminists Emma Goldman, Voltairine de Cleyre and", "-27.375517040685736" ], [ "men then he can just as well bestow the same gift upon women. The following passage illustrates how Teresa viewed her relationship with God and the authorship of her writing:\nPeople marvel at what I wrote in the treatise and I marvel at what, in fact, I kept quiet, but I do not marvel doubting nor do I insist on my wonder. For my experience makes me sure, and the God of Truth knows that I had no other master nor consulted with any other learned authority nor translated from other books, as some people with malicious wonder are wont to", "-27.35991125696455" ], [ "required.\nA possible reason why it is men who were obligated to form a congregation in order to convene the Divine Presence is that women were individually considered sufficiently holy and did not require the combination of a group and special prayers to achieve added holiness deficient in men. Due to the righteousness of the women in the wilderness, they did not suffer the same deadly fate as their male counterparts, and despite the spies’ negative report about the holy land, wished to enter it.\nOthers point to the sociological reality that women were traditionally expected to care for the house and", "-27.358220860030997" ], [ "why society should not look down on her or any other female who has wed to multiple men throughout their life. The tale confronts the double standard and the social belief in the inherent inferiority of women, and attempts to establish a defence of secular women's sovereignty that opposes the conventions available to her. The Wife of Bath's tale argues that women are morally identical to men who have also had more than one spouse. Double standards for men and women were common and deeply rooted in culture. Feminist critique The Wife of Bath's Prologue simultaneously enumerates and critiques the", "-27.34250895586956" ], [ "new series has been uniformly negative. Hitfix responded to the show: \"OK, Lifetime, you win. Somehow you've found women more vile, more petulant, and possibly dumber than most of the women in The Real Housewives franchise. Congratulations. I think Pretty Wicked Moms may be a sign of the coming Rapture, or maybe just confirmation that at least some of the mean girls we all remember from high school didn't change or mature in any way.\"\nDennis Perkins at The A.V. Club rated the show an 'F', saying that \"If it were discovered that this depiction of the petty, insipid catfighting amongst", "-27.325482786167413" ], [ "Consualia, the Equiria, the Bacchanalia, etc.). This means that the events derive from idolatry. Of key concern was that the \"show always leads to spiritual agitation\". By attending and partaking in the event, man is subject to strong excitements, which are aroused due to natural lapses, which create passionate desire. Additionally, Tertullian writes that that which is not permissible to say or do should not be permissible to see or hear.\nFriedrich Nietzsche, in On the Genealogy of Morality (Essay 1, Section 15), uses Tertullian's words to highlight the resemblance of Christian worship to circus-going: \"In place of athletes, we", "-27.324018563711434" ], [ "womanhood, they must reconcile their expectations about love and sex with their own experiences of disillusionment, confusion and anguish. Esperanza describes her \"sexual initiation\"—an assault by a group of Anglo-American boys while awaiting her friend Sally at the fairground. She feels stricken and powerless after this, but above all betrayed; not only by Sally, who was not there for her, but \"by all the women who ever failed to contradict the romantic mythology of love and sex\". Cisneros illustrates how this romantic mythology, fueled by popular culture, is often at odds with reality in Woman Hollering Creek and Other Stories,", "-27.321079202811234" ], [ "turns into disastrous consequences. Chaste within this text is symbolic because the female body is seen as an idol and being unfaithful outside of the marriage would be a big deal. For the male characters in the text such as the Tyrant having sex with multiple people wasn’t a problem because he had a lot of power. If a woman did this there could be varying consequences though because of their husbands. Another thing that is interesting is the disconnection between body and spirit. When the Lady died it was clear that her corpse was without spirit since her spirit", "-27.320077724347357" ], [ "cultic and ritual nature, although some prayers express a positive psychological relationship, or a sort of conversion experience in regard to a god. Generally the reward to mankind is described as success and long life.\nEvery man also had duties to his fellow man which had some religious character, particularly the king's duties to his subjects. It was thought that one of the reasons the gods gave power to the king was to exercise justice and righteousness, described as mēšaru and kettu, literally \"straightness, rightness, firmness, truth\". Examples of this include not alienating and causing dissension between friends and relatives, setting", "-27.312850200942194" ], [ "him and less like herself (\"Sally Simpson's Question\"). He is confused, and insists that there is no reason for anyone to be like him, when everyone else already possesses the amazing gifts that he was deprived of most of his life. He suddenly realises that he had thought his fame came from his miraculous recovery, when it in fact arose due to his fans desire for a spiritual leader, hoping he could communicate wisdom from his experience of not being able to hear, see, or talk for so long. Now, disenchanted with their hero for failing to provide the answers", "-27.311641837091884" ], [ "cutting off of limbs, and burnings, and pricking and digging out of eyes, and mutilations of the entire body, and besides these, hunger and mines and bonds. In all they showed patience in behalf of religion rather than transfer to idols the reverence due to God.\n\nAnd the women were not less manly than the men in behalf of the teaching of the Divine Word, as they endured conflicts with the men, and bore away equal prizes of virtue. And when they were dragged away for corrupt purposes, they surrendered their lives to death rather than their bodies to impurity.\nHe refers", "-27.300286189729377" ], [ "virtue of men and virtue of women are the same thing, since God bestowed on them the same creation and the same honor\".\n\"Happy are you, reader, if you do not belong to this sex to which all good is forbidden\"\nIn The Equality of Men and Women Gournay structured her argument similarly to Christine de Pizan, and started by profiling great women of the past to demonstrate the ability of women to learn. She avoided the discussion on superiority of one sex over the other by stressing the equality of men and women. But she attacked the notion that great women", "-27.289332655913313" ], [ "it's hard to get there, intellectually, when none of the three leads feels like a semblance of a real person. Instead, Why Women Kill comes off as an ungainly fantasy of women's emotional lives, where the threat of infidelity could be the only fuel of marital unhappiness.\" Vulture reviewer Angelica Jade Bastién agreed with the focus on aesthetics more than plot, stating, \"Why Women Kill is akin to an overly complicated craft cocktail, boasting an intriguing brightness, namely in the form of Goodwin's performance, but lacking balance in its competing flavors. It's full of baffling tonal and narrative decisions that", "-27.280666683225718" ], [ "kept because of social concepts of deities, cleanliness, and sin. Essentially, cultural and spiritual traditions say the household deity will get angry if it takes place in the home because periods of menstruation and childbirth are considered to be polluted days. If it is does not take place in the animal shed but in the home instead, the woman must perform rituals to ask for forgiveness from the deity. Regardless, health problems may result by not following the rules of the house. Families also prefer the animal shed because it is easier to clean the shed before and after the", "-27.24792812106898" ], [ "looking for a bad time in life? Is she a big martyr? Perhaps convinced that her parents had no affection for her, she can't understand anyone else doing so. She's a very insecure woman — furiously jealous and possessive and always accusing her husband of being unfaithful. She is always putting herself in the position of being the victim. Sometimes she nearly goads her husband into hitting her ... A gigantic, self-imposed, chip on her shoulder... She needs dramas — it's something she is good at. She is a poisonous bitch, but it is important that we understand why.\n \nHolland", "-27.24517085320258" ], [ "for the materialistic mentality because of which they remained occupied in seeking increase in worldly benefits, pleasures, comforts and position, and in vying with one another for abundance of everything until death overtook them. Then, warning them of the evil consequences of their heedlessness, they were told that the world was not an open table of food for then to pick and choose whatever they pleased, but for every single blessing that they were enjoying in the world, they would have to render an account to their Lord and Sustainer as to how they obtained it and how they used", "-27.243508422427112" ], [ "Men-only societies are much less common; one example is Athos in Ethan of Athos (1986) by Lois McMaster Bujold. Joanna Russ suggests men-only societies are not commonly imagined, because men do not feel oppressed, and therefore imagining a world free of women does not imply an increase in freedom and is not as attractive.\nUtopias have been used to explore the ramification of gender being either a societal construct, or a hard-wired imperative. In Mary Gentle's Golden Witchbreed, gender is not chosen until maturity, and gender has no bearing on social roles. In contrast, Doris Lessing's The Marriages Between Zones Three,", "-27.2424868146054" ], [ "between men and women:\nThe objector meets us with the oft repeated cry, \"would you unsex woman and render her the same selfish being that you find in man, when immersed in the strife and chicanery attendant upon political relations? Once and for all, let the answer be an emphatic NO!! But since, because men here have had no appropriate balance, all this evil has occurred, we feel that the moral harmony of the world demands woman's interest and influence. We ask to use it, not that we may become like men in our moral natures, but because that we are", "-27.24117999243026" ], [ "says that they must be. Both of them, however, consider women to be inferior. Plato in Timaeus (90e) claims that men who were cowards and were lazy throughout their life shall be reborn as women and in the Laws (781b), he offers his reasons why women should be educated: \"Because you neglected this sex, you gradually lost control of a great many things which would be in a far better state today if they had been regulated by law. A woman's natural potential for virtue is inferior to a man's, so she's proportionately a greater danger, perhaps even twice as", "-27.223859303132485" ], [ "\"It's too complicated for a child.\" Indie stands up angrily. \"So my body is all that you see as woman?!\" \"I have all the mistresses I could want in Hell, but I want none of them. I had never seen a creature as elegant and pure as you, and nothing else will do.\" \"Negotiate for my freedom.\" \"God does not negotiate with me. Haven't you learned that he is watching us now? He'll never give me anything I want.\" \"But once I do my job, he'll have to send me to Hell.\" \"But he won't. You won't go to Heaven,", "-27.216364444146166" ], [ "old I’ve always found it so confusing with all the sexual hypocrisy we have in society, and religious hypocrisy and political hypocrisy, so I’m an anti-hypocrisy fanatic – that’s the only thing I’m fanatic about, being against hypocrisy – so that makes it great fun to joke around with double standards and the over-romantization of society, which means that young people hardly have a chance to make it, with all this propaganda we have for romance.“\nAgain in 2000 he appeared as the director of Wild Side Story on Channel 3 in four segments of a popular TV series by Strix", "-27.215286365884822" ], [ "that she used to be transfixed by this \"temperamental diva bitch\", due to the contrast with the ideal of womanhood that she had been presented to as a child: \"Mary, this silent mother; and here was the witch queen who has this weird dialogue in the mirror and it didn't have to be charitable and it didn't have to be nice. I thought she was fabulous.\" Likewise, Lana Parrilla, who later herself played the Evil Queen in Once Upon A Time, said that whenever she watched Disney's Snow White as a young girl she rooted for and \"loved the evil", "-27.209678623461514" ], [ "be cheerfully unsympathetic. Revered, great people always eventually decay. This realization might remind the psychologist of his own decadence and may contribute to his own corruption. The great human's work, not his own person, should be venerated. 2. Great artists and other higher humans create works in order to forget their own decadent flaws. Revering higher people with feminine sympathy is detrimental to them. 3. When a higher human knows deep, heart–breaking suffering, there develops immunity to receiving sympathy from lower humans. Noble, profound sufferers feign cheerfulness in order to ward off unwanted pity. Epilogue 1. From a universal perspective,", "-27.207788856874686" ], [ "she seldom refrain from doing, and this makes her unreliable and heartless. She is regarded as quite much disposed for love adventures, although she has a great ability to conceal them; at present, however, she has not managed to do so, because her lover has the same sense of humor as she does, and their common weakness has exposed them. People hungry for scandals wish to claim that it is not so much inclination that attaches her to her lovers as it is the presents they give her. I admit that I do not believe such a vile accusation, and", "-27.199944588258404" ], [ "and because they spend of their wealth. So the ones who are in accord with morality are the ones who are morally obligated, the ones who guard the unseen of what God has kept safe. But those whose resistance you fear, then admonish them and abandon them in their sleeping place, then go away from them; and if they obey you, surely look not for any way against them; truly God is Lofty, Great.\nMaulvi Sher Ali on behalf of the Ahmadiyya religion:\nMen are guardians over women because Allah has made some of them excel others, and because they (men) spend", "-27.194411695440067" ], [ "was no word like NO in her dictionary of life. In the days of old it was not the IN thing for women to go to rich or powerful men's houses or see them personally on their own so I being a very young teenaged son used to accompany her on these missions of gathering funds for the cause from powerful bankers, heads of companies, directors etc. As the occasion demanded her charisma and powers of persuasion at convincing the great and the good were like magic and they were like putty in her hands and it was extraordinary to", "-27.19364673952805" ] ]
4wqqey
Why does a new pair of glasses temporarily distort your depth perception? What causes this?
[ "Glasses have two effects: focus, and magnification. The focus is what you want to change. The reason you need glasses is that your eyes are miscalibrated, and they need a focus adjustment. The magnification is a side effect and generally not wanted. It's the reason that people with powerful lenses look like their eyes are either way too small (nearsighted) or way too big (farsighted) - the lens is changing the apparent size of their eyes. The reverse happens, too: your new glasses are putting objects in focus, but they're also distorting their apparent size. If you're nearsighted and you just got a more powerful prescription, objects look slightly smaller than they used to. That messes with your depth perception, because your brain thinks everything is slightly farther away than it is. The depth perception distortion will go away as your brain adjusts to the new relationship between how big something looks and how far away it is.", "Well the eye and brain are used to working in a certain way autofocussing and interpreting that information. But when glasses distort preception and the eye has to change its lense to focus again the brain interprets that in the old way. As in that certain position of the lense used to correspond with certain distance, so the brain tells you the object is further away or closer until it becomes used to that setting again. Fun fact: You could wear glasses with mirrors that turn everything upside down and after a few days your brain would tell you everything is the right way up even though you are still wearing those glasses and technichally seeing everything upsidedown. And when you take them off afterwards your brain will tell you everything is upsidedown even though you're technically seeing everything correctly.", "It was crazy, when I got my first pair of glasses (about 8-10 years ago), everything looked like a 3D movie, it was absolutely weird but cool at the same time. After a few days my eyes corrected themselves and I haven't seen that type of difference ever since. But seriously, it was a weird visual.", "your eyes adjust focal length constantly when you focus on further or closer objects. Putting on glasses makes your eyes have to switch from \"muscle memory\" and what it's used to to have to judge distance again and refocus from preset positions to a new set of focusing positions to compensate for the glasses. Our brains are lazy and we have every shortcut we can come up with.", "This is just from my own experience, but when I first got new glasses, they were perfect. When it came time to get my second pair (I can't remember if it was because I broke my first pair and/or because my eyesight had gotten worse), they used a device to measure my pupillary distance (or at least that's what I think that thing was) and I was looking at the wrong thing (I can't remember if you were supposed to look at the green dot or at the picture). Either way, I ended up having to adjust to these new glasses and it wasn't distorted as much as they felt not centered.", "Ive worn glasses since i was about 11. Each time ive gotten a new prescription, like everyone else, my depth perception was all messed up at first. This happened each time until like 8 years ago. For whatever reason, my lenses were cut diffrently. As soon as i put my glasses on, i had no issues with the new prescription. I found out a year later when i had my eyes checked again and got new glasses that again, my perception was screwy but after going back the guy cutting the lenses noticed that mybold prescription was cut from a less concave/convex portion of the lense to fit my frame. So if you look through your glasses through the edges, it gets distorted because of the curve. Mine werent like that. I have perfect vision on close to 100% of the lense without distortion. Idk if this is normal and my previous lens makers were garbage or if it was just a coincidence that mine were made this way. I havent had a new prescription in like 6 years. Ive had new lenses but not a new prescription. Noe i have to make sure to tell the optometrist to make the lenses as flat as possible." ]
[ [ "coming from the same object (but each passing through a different hole) are diffracted back toward the eye and onto different places on the retina. This leads to double vision (objects having doubled edges) around the rim of each hole the eye is not focussing on, which can make the overall image disturbing and tiring to look at for prolonged periods of time.\nUnlike conventional prescription glasses, pinhole glasses produce an image without the pincushion effect around the edges (which makes straight lines appear curved). While pinhole glasses are claimed to be useful for people who are both near- and far-sighted,", "-34.54921322260634" ], [ "achieved by using a stationary camera and continuously rotating an otherwise stationary object. If the movement stops, the eye looking through the dark lens (which could be either eye depending on the direction the camera is moving) will \"catch up\" and the effect will disappear. One advantage of this system is that people not wearing the glasses will see a perfectly normal picture. Explanation The widely accepted explanation of the apparent depth is that a reduction in retinal illumination (relative to the fellow eye) yields a corresponding delay in signal transmission, imparting instantaneous spatial disparity in moving objects. This seems", "-33.179757323727245" ], [ "Pinhole glasses Pinhole glasses, also known as stenopeic glasses, are eyeglasses with a series of pinhole-sized perforations filling an opaque sheet of plastic in place of each lens. Similar to the workings of a pinhole camera, each perforation allows only a very narrow beam of light to enter the eye which reduces the size of the circle of confusion on the retina and increases depth of field. In eyes with refractive error, the result is often a sharper image. However, a second effect may appear at the common bridge between each two adjacent holes, whereby two different rays of light", "-32.36921712055482" ], [ "distorted, but is perceived as distorted when viewed from a normal viewing distance.\nNote that if the center of the image is closer than the edges (for example, a straight-on shot of a face), then barrel distortion and wide-angle distortion (taking the shot from close) both increase the size of the center, while pincushion distortion and telephoto distortion (taking the shot from far) both decrease the size of the center. However, radial distortion bends straight lines (out or in), while perspective distortion does not bend lines, and these are distinct phenomena. Fisheye lenses are wide-angle lenses with heavy barrel distortion and", "-31.889432136231335" ], [ "diffraction), and on the performance of the lens.\nOptically, as a lens is stopped down, the defocus blur at the Depth of Field (DOF) limits decreases but diffraction blur increases. The presence of these two opposing factors implies a point at which the combined blur spot is minimized (Gibson 1975, 64); at that point, the f-number is optimal for image sharpness, for this given depth of field – a wider aperture (lower f-number) causes more defocus, while a narrower aperture (higher f-number) causes more diffraction.\nAs a matter of performance, lenses often do not perform optimally when fully opened, and thus generally have", "-31.576299608306726" ], [ "vision. The reason for improved depth of focus in conventional lenses is linked to residual spherical aberration. The small improvement in depth of focus with the conventional IOLs enhances uncorrected near vision and contribute to reading ability.\nWavefront customized lenses can be used in eyeglasses. Based on Wavefront map of the eye and with the use of laser a lens is shaped to compensate for the aberrations of the eye and then put in the eyeglasses. Ultraviolet Laser can alter the refractive index of curtain lens materials such as epoxy polymer on a point by point basis in order to generate", "-31.485112554219086" ], [ "and simulate aperture changes by using an automatic ND filter. Unlike a real diaphragm, this has no effect on depth of field. A real diaphragm when more-closed will cause the depth of field to increase (i.e., cause the background and the subject to both appear more in-focus at the same time) and if the diaphragm is opened up again the depth of field will decrease (i.e., the background and foreground will share less and less of the same focal plane).", "-31.351773521484574" ], [ "lenses magnify the subject more, apparently compressing distance and (when focused on the foreground) blurring the background because of their shallower depth of field. Wider lenses tend to magnify distance between objects while allowing greater depth of field.\nAnother result of using a wide-angle lens is a greater apparent perspective distortion when the camera is not aligned perpendicularly to the subject: parallel lines converge at the same rate as with a normal lens, but converge more due to the wider total field. For example, buildings appear to be falling backwards much more severely when the camera is pointed upward from ground", "-31.34035724192654" ], [ "lenses, I think I choose them because it makes me feel like I'm in the space of the film, I'm surrounded. My prevalent vision is full of detail, and that's what I like about it. It's actually harder to do, it's harder to light. The other thing I like about wide-angle lenses is that I'm not forcing the audience to look at just the one thing that is important. It's there, but there's other things to occupy, and some people don't like that because I'm not pointing things out as precisely as I could if I was to use a", "-31.324665814172477" ], [ "eye, this image becomes clear. The refractive power mainly resides in the cornea, but the overall refractive power is achieved by the actual lens changing its shape.\nIn order to fixate on a near object, the ciliary muscle contracts around the lens to decrease its size. The suspensory zonules of Zinn relax and the radial tension around the lens is released. This causes the lens to form a more spherical shape achieving a higher level of refractive power. Focus on distant objects When the eye focuses on distant objects, the lens holds itself in a flattened shape due to traction from", "-31.111691072874237" ], [ "depth is large (See UVA Report). The more depth in the scene, the more parallax scanning enhances its perception by a viewer on a standard television screen without the aid of special glasses.", "-30.730686823255382" ], [ "have optics, they don't affect the optical quality of a lens. Because of their function, there are other effects: decrease of light; shallower depth of field; and loss of ability to focus at infinity. The longer the extension tube, the closer the lens can focus. The amount of light and depth of field will be equally reduced. On modern cameras using auto exposure this is all corrected for by the camera, but when not using auto exposure this has to be calculated and taken into account when setting exposure.\nThe precise reduction of the amount of light reaching the imaging plane", "-30.705813517066417" ], [ "refractive or prismatic variations between the left and right eye. For total correction of the individual's sight, glasses complying to a recent ophthalmic prescription are required.\nAdjustable-focus eyeglasses might be used to replace bifocals or trifocals, or might be used to produce cheaper single-vision glasses (since they don't have to be custom-manufactured for every person).\nPinhole glasses are a type of corrective glasses that do not use a lens. Pinhole glasses do not actually refract the light or change focal length. Instead, they create a diffraction limited system, which has an increased depth of field, similar to using a small aperture in", "-30.561588622746058" ], [ "deep side of the glass, they would become scared and they would tense up and be afraid to move. However, when they were moved to the shallow side they would relax and jump onto the visually shallow surface. This showed that visual sense, instead of the ability of the animal to feel the stableness of the glass, was in control. Criticisms One of the criticisms of the visual cliff study was whether the research in the study really supported the hypothesis that depth perception was innate in humans. One issue was about the glass over the deep part of the", "-30.51091096410528" ], [ "subject more, apparently compressing distance and (when focused on the foreground) blurring the background because of their shallower depth of field. Wider lenses tend to magnify distance between objects while allowing greater depth of field.\nAnother result of using a wide-angle lens is a greater apparent perspective distortion when the camera is not aligned perpendicularly to the subject: parallel lines converge at the same rate as with a normal lens, but converge more due to the wider total field. For example, buildings appear to be falling backwards much more severely when the camera is pointed upward from ground level than they", "-30.475707410631003" ], [ "on the retina, they now focus them far behind the retina, resulting in an extremely blurred image from hypermetropia.\nBy wearing a flat diving mask, humans can see clearly under water. The scuba mask's flat window separates the eyes from the surrounding water by a layer of air. Light rays entering from water into the flat parallel window change their direction minimally within the window material itself. But when these rays exit the window into the air space between the flat window and the eye, the refraction is quite noticeable. The view paths refract (bend) in a manner similar to viewing", "-30.44852564955363" ], [ "Diving mask Function Light rays bend when they travel from one medium to another; the amount of bending is determined by the refractive indices of the two media. If one medium has a particular curved shape, it functions as a lens. The cornea, humours, and crystalline lens of the eye together form a lens that focuses images on the retina. Our eyes are adapted for viewing in air. Water, however, has approximately the same refractive index as the cornea (both about 1.33), so immersion effectively eliminates the cornea's focusing properties. When our eyes are in water, instead of focusing images", "-30.445315392746124" ], [ "fit the shape of the frame that will hold them. Frame styles vary and fashion trends change over time, resulting in a multitude of lens shapes. For lower power lenses, there are few restrictions which allow for many trendy and fashionable shapes. Higher power lenses can cause distortion of peripheral vision and may become thick and heavy if a large lens shape is used. However, if the lens becomes too small, the field of view can be drastically reduced.\nBifocal, trifocal, and progressive lenses generally require a taller lens shape to leave room for the different segments", "-30.399592916597612" ], [ "the prescription and cosmetic consideration. Selecting a smaller lens will mean less of this sphere surface is represented by the lens surface, meaning the lens will have a thinner edge (myopia) or center (hyperopia). A thinner edge reduces light entering into the edge, reducing an additional source of internal reflections.\nExtremely thick lenses for myopia can be beveled to reduce flaring out of the very thick edge. Thick myopic lenses are not usually mounted in wire frames, because the thin wire contrasts against the thick lens, to make its thickness much more obvious to others.\nIndex can improve the lens thinness, but", "-30.392511518730316" ], [ "lens was \"sharp pretty much all across the frame and free of chromatic aberrations.\" However, it was noted that \"as the light gets dimmer and in [sic] the ISO starts to increase\", the device began to suffer from \"very heavy-handed noise reduction which results in visible softness\", and further noted that \"[its] detail starts to suffer as soon as you go higher than base ISO and by ISO 400 most low-contrast detail is gone.\" However, in a December 2013 comparison against other recent phones such as the One, Galaxy S4 Zoom, Xperia Z1, iPhone 5S, and Lumia 1020 by TechRadar,", "-30.326568632139242" ], [ "deforming glass. Since a lens can only be held in place by its edge, the center of a large lens sags due to gravity, distorting the images it produces. The largest practical lens size in a refracting telescope is around 1 meter (39 in).\nThere is a further problem of glass defects, striae or small air bubbles trapped within the glass. In addition, glass is opaque to certain wavelengths, and even visible light is dimmed by reflection and absorption when it crosses the air-glass interfaces and passes through the glass itself. Most of these problems are avoided or diminished in reflecting telescopes,", "-30.29577097145375" ], [ "curvature continuously varying as the transition is made from one surface to the other. This shift in curvature results in different powers being delivered from different locations on the lens. Vertex distance Vertex distance is the space between the front of the eye and the back surface of the lens. In glasses with powers beyond ±4.00D, the vertex distance can affect the effective power of the glasses. A shorter vertex distance can expand the field of view, but if the vertex distance is too small, the eyelashes will come into contact with the back of the lens, smudging the", "-30.125471852719784" ], [ "by unusually high irritation upon insertion.\nMake sure the soft lens is not inserted inside-out. Edge of a lens turned inside out has a different appearance, especially when the lens is slightly folded. Insertion of an inside-out lens for a brief time (less than one minute) should not cause any damage to the eye. Some brands of lenses have markings (e.g. numbers) on the rim that make it easier to tell the front of the lens from the back.\nThe technique for removing or inserting a contact lens varies depending upon whether the lens is soft or rigid. There are many subtle", "-29.95425046677701" ], [ "Circle being placed here, stopp'd much of the erroneous Light, which other wise would have disturbed the Vision. By comparing it with a pretty good Perspective of four Feet in length, made with a concave Eye-glass, I could read at a greater distance with my own Instrument than with the Glass. Yet Objects appeared much darker in it than in the Glass, and that partly because more Light was lost by Reflexion in the Metal, than by Refraction in the Glass, and partly because my Instrument was overcharged. Had it magnified but 30 or 25 times, it would have made", "-29.74741356476443" ], [ "increased from the center of the lens. If the glass were completely flat, this would cause a corresponding pattern of circles of light, so Fresnel lenses are usually stippled on the flat side. This pattern of small bumps helps to break up the light passing through the lens and gives Fresnels their characteristic soft beam. This means that the intensity of the light is consistent across the spread of the beam of light, as opposed to being less intense around the edges as in an ERS. The stepped lens design causes less heat buildup than a plano-convex lens of the", "-29.670817351892765" ], [ "colour. Low dispersion glass may also be used to reduce chromatic aberration.\nLongitudinal chromatic aberration is a pronounced effect of optical telescope objectives, because the focal lengths are so long. Microscopes, whose focal lengths are generally shorter, do not tend to suffer from this effect. Location of focal plane In some eyepiece types, such as Ramsden eyepieces (described in more detail below), the eyepiece behaves as a magnifier, and its focal plane is located outside of the eyepiece in front of the field lens. This plane is therefore accessible as a location for a graticule or micrometer crosswires. In the Huygenian", "-29.66602052770031" ], [ "exhibiting different distortion. Compression distortion is most familiar in looking through binoculars or telescopes, as in telescopic sights, while a similar effect is seen in fixed-slit strip photography, notably a photo finish, where all capture is parallel to the capture, completely eliminating perspective (a side view). Optics Consider an idealised Gaussian optical system, with the image and the object in the same medium. Thus, for an object in focus, the distance between the lens and image plane , the distance between lens and the object , and the focal length are related by the thin lens equation:\nThe transverse magnification", "-29.61830349973752" ], [ "narrowing the angle of view of the presentation, reduces the effect. In both cases, at some critical distance, the apparent distortion disappears completely. Technical background Although perspective distortion is often annoying when unintended, it is also intentionally used for artistic purposes. Extension (wide angle) distortion is often implemented to emphasize some element of the scene by making it appear larger and spatially removed from the other elements. Compression (telephoto) distortion is often used to give the appearance of compressed distance between distant objects, such as buildings or automobiles in order to convey a feeling of congestion. Longer lenses magnify the", "-29.610512448762165" ], [ "it near impossible to focus above the 125× limit.\nIt also utilizes achromat glass lenses in the objective-lens – the large 51 mm (2 in) one in front – as well as in the eyepiece (4 lenses of two types of high quality plastic, known as a Plossl configuration) to prevent chromatic aberration, producing a clearer image. This is because single lenses, as are often used in cheap scopes, refract light of different colors in different angles (chromatic aberration). In practice this means all images will have blueish blurred edges on one side, reddish on the other, making the image very unclear. By", "-29.497494330862537" ], [ "lens, especially one with a strong correction whose base curve is not in the best spherical form, such increases can significantly impact the clarity of vision in the periphery. Minimizing power error and lens induced astigmatism As corrective power increases, even optimally designed lenses will have distortion that can be noticed by a user. This particularly affects individuals that use the off-axis areas of their lenses for visually demanding tasks. For individuals sensitive to lens errors, the best way to eliminate lens induced aberrations is to use contact lenses. Contacts eliminate all these aberrations since the lens then moves with", "-29.459008027566597" ], [ "adjustable diaphragm to control light transmission. This means the lens's F-number value is fixed to the overall designed focal ratio of the optical system (the diameter of the primary mirror divided into the focal length). The inability to stop down the lens results in the catadioptric lens having a short depth of field. Exposure is usually adjusted by the placement of neutral density filters on the front or rear of the lens. Their modulation transfer function shows low contrast at low spatial frequencies. Finally, their most salient characteristic is the annular shape of defocused areas of the image, giving", "-29.448584506149928" ], [ "a compensating differential diopter power (a spherical correction) to balance the red filter focus shift relative to the cyan, which reduces the innate softness and diffraction of red filtered light. Low-power reading glasses worn along with the paper glasses also sharpen the image noticeably.\nThe correction is only about 1/2 + diopter on the red lens. However, some people with corrective glasses are bothered by difference in lens diopters, as one image is a slightly larger magnification than the other. Though endorsed by many 3D websites, the diopter \"fix\" effect is still somewhat controversial. Some, especially the nearsighted, find it uncomfortable.", "-29.432444431557087" ], [ "region, depth of focus increases with longer focal length or closer subject distance, while depth of field decreases. Determining factors In small-format cameras, the smaller circle of confusion limit yields a proportionately smaller depth of focus. In motion-picture cameras, different lens mount and camera gate combinations have exact flange focal distance measurements to which lenses are calibrated.\nThe choice to place gels or other filters behind the lens becomes a much more critical decision when dealing with smaller formats. Placement of items behind the lens will alter the optics pathway, shifting the focal plane. Therefore, often this insertion must be done", "-29.42191185837146" ], [ "(> 6 log-units) range of luminance. The effect is also seen with bright targets on a black background and exhibits the same luminance-to-latency relationship. Use in stereoscopy The Pulfrich effect has been utilized to enable a type of stereoscopy, or 3-D visual effect, in visual media such as film and TV. As in other kinds of stereoscopy, glasses are used to create the illusion of a three-dimensional image. By placing a neutral filter (e.g., the darkened lens from a pair of sunglasses) over one eye, an image, as it moves right to left (or left to right, but not", "-29.399874612339772" ], [ "about the same size as the eye's aperture. With the addition of a lens this incoming light is concentrated on a smaller surface area, without reducing the overall intensity of the stimulus. The focal length of an early lobopod with lens-containing simple eyes focused the image behind the retina, so while no part of the image could be brought into focus, the intensity of light allowed the organism to see in deeper (and therefore darker) waters. A subsequent increase of the lens's refractive index probably resulted in an in-focus image being formed.\nThe development of the lens in camera-type eyes", "-29.373652835725807" ], [ "darkens the sky, will often give uneven results when used on an ultra-wide angle lens. Development The oldest \"lenses\", pinholes, used in pinhole cameras, keep perspective accurately. In images made using this technique, there is little or no distortion due to the rectilinear propagation of light. For a long time it was thought that only symmetrical optical diagrams could ensure the geometrically precise transfer of light without distortion becoming apparent near the edge of images (as the viewing angle increases). However, with modern technology and understanding of optics, ultra wide-angle lenses can these days eliminate distortion almost completely. Characteristics Longer", "-29.303999512572773" ], [ "distortion are not corrected. Astigmatic, distorted surfaces potentially introduce serious degradations in optical system performance.\nSurface distortion due to grinding or polishing increases with the aspect ratio of the part (diameter to thickness ratio). To a first order, glass strength increases as the cube of the thickness. Thick lenses at 4:1 to 6:1 aspect ratios will flex much less than high aspect ratio parts, such as optical windows, which can have aspect ratios of 15:1 or higher. The combination of surface or wavefront error precision requirements and part aspect ratio drives the degree of back support uniformity", "-29.30327673505235" ], [ "3 m, the lens exhibits its lowest refractive power. When the eye focuses on a close object, the lens is most strongly refractive.", "-29.3000876531587" ], [ "Refraction Light Refraction of light can be seen in many places in our everyday life. It makes objects under a water surface appear closer than they really are. It is what optical lenses are based on, allowing for instruments such as glasses, cameras, binoculars, microscopes, and the human eye. Refraction is also responsible for some natural optical phenomena including rainbows and mirages. Refraction in a water surface Refraction occurs when light goes through a water surface since water has a refractive index of 1.33 and air has a refractive index of about 1. Looking at a straight object, such as", "-29.248653063055826" ], [ "distinguish differences in depth only up to a short distance, beyond which all is in focus. Depth of field Depth of field is an effect that permits bringing objects into focus at varying distances from the camera, and at varying depth between each other, into the field of view. A short lens, as explained above, will bring objects into focus that are relatively close to the camera, but it will also keep focus at greater distances between objects. A telephoto lens will be very shallow in its gamut of focus.\nReducing the size of the aperture of the lens deepens the", "-29.237538122572005" ], [ "an outside observer looks into the surface of the partially reflective mirror, the lights appear to recede into infinity, creating the appearance of a tunnel of lights of great depth.\nIf the mirrors are not precisely parallel, but instead are canted at a slight angle, the \"visual tunnel\" will be perceived to be curved (off to one side) as it recedes into infinity.\nAlternatively, this effect can also be seen when an observer stands between two parallel fully reflective mirrors, as in some dressing rooms, some elevators, or a house of mirrors. A weaker version of this effect can be seen by", "-29.22882874982315" ], [ "aberration Lateral or transverse chromatic aberration is caused because the refraction at glass surfaces differs for light of different wavelengths. Blue light, seen through an eyepiece element, will not focus to the same point but along the same axis as red light. The effect can create a ring of false colour around point sources of light and results in a general blurriness to the image.\nOne solution is to reduce the aberration by using multiple elements of different types of glass. Achromats are lens groups that bring two different wavelengths of light to the same focus and exhibit greatly reduced false", "-29.203196493093856" ], [ "the same coverage will yield the same perspective distortion – the nose will look the same in all three. Conversely, if all three lenses are used from distances such that the face fills the field, the wide-angle will be used from closer, making the nose larger compared to the rest of the photo, and the telephoto will be used from farther, making the nose smaller compared to the rest of the photo.\nOutside photography, extension distortion is familiar to many through side-view mirrors (see \"objects in mirror are closer than they appear\") and peepholes, though these often use a fisheye lens,", "-29.20156537729781" ], [ "most lens aberrations (spherical aberration, coma and astigmatism) are decreased, but lens diffraction increases. The effect is that for most lenses, the balance between the decreasing aberrations and the increasing diffraction effects of stopping down the lens means that lenses have an optimum aperture for best results, often about three stops closed down from maximum aperture, so for a lens with a maximum aperture of ƒ/2.8, ƒ/8 would be the optimum aperture.", "-29.18723510856762" ], [ "better sharpness when stopped down some – note that this is sharpness in the plane of critical focus, setting aside issues of depth of field. Beyond a certain point, there is no further sharpness benefit to stopping down, and the diffraction begins to become significant. There is accordingly a sweet spot, generally in the f/4 – f/8 range, depending on lens, where sharpness is optimal, though some lenses are designed to perform optimally when wide open. How significant this varies between lenses, and opinions differ on how much practical impact this has.\nWhile optimal aperture can be determined mechanically, how much sharpness is", "-29.00691962862038" ], [ "refractive indices of the oil and of the glass in the first lens element are nearly the same, which means that the refraction of light will be small upon entering the lens (the oil and glass are optically very similar). The correct immersion oil for an objective lens has to be used to ensure that the refractive indices match closely. Use of an oil immersion lens with the incorrect immersion oil, or without immersion oil altogether, will suffer from spherical aberration. The strength of this effect depends on the size of the refractive index mismatch.\nOil immersion can generally only be", "-28.96299585478846" ], [ "to the improved image quality. Today, engineers assisted by computer-aided drafting software have designed eyepieces with seven or eight elements that deliver exceptionally large, sharp views. Internal reflection and scatter It is possible for some light passing through the optics of an eyepiece to exit the eyepiece following an unintended path. This may be due to specular reflections from optical surfaces or to scattering from other parts of the eyepiece assembly. The net effect, also known as lens flare, is a reduction of image contrast and/or so-called \"ghost images\" seen in the visual field. For many years, simple eyepiece designs", "-28.82839040408726" ], [ "lens and causing annoyance for the wearer. A skilled frame stylist will help the wearer select a good balance of fashionable frame size with good vertex distance in order to achieve ideal aesthetics and field of view. The average vertex distance in a pair of glasses is 12-14mm. A contact lens is placed directly on the eye and thus has a vertex distance of zero. Power error Power error is the change in the optical power of a lens as the eye looks through various points on the area of the lens. Generally, it is least present", "-28.824754943780135" ], [ "Distortion (optics) Occurrence In photography, distortion is particularly associated with zoom lenses, particularly large-range zooms, but may also be found in prime lenses, and depends on focal distance – for example, the Canon EF 50mm f/1.4 exhibits barrel distortion at extremely short focal distances. Barrel distortion may be found in wide-angle lenses, and is often seen at the wide-angle end of zoom lenses, while pincushion distortion is often seen in older or low-end telephoto lenses. Mustache distortion is observed particularly on the wide end of zooms, with certain retrofocus lenses, and more recently on large-range zooms such as the Nikon", "-28.787228077912005" ], [ "back; it is often used to avoid convergence of parallel lines, such as when photographing a tall building. Tilting the lens relies on the Scheimpflug principle to rotate the plane of focus away from parallel to the image plane; this can be used either to have all parts of an inclined subject sharply rendered, or to restrict sharpness to a small part of a scene. Tilting the lens results in a wedge-shaped depth of field that may be a better fit to some scenes than the depth of field between two parallel planes that results without tilt.\nUnlike most view", "-28.697425807476975" ], [ "shutter glasses\"). Each eye's glass contains a liquid crystal layer which has the property of becoming opaque when voltage is applied, being otherwise transparent. The glasses are controlled by a timing signal that allows the glasses to alternately block one eye, and then the other, in synchronization with the refresh rate of the screen. The timing synchronization to the video equipment may be achieved via a wired signal, or wirelessly by either an infrared or radio frequency (e.g. Bluetooth, DLP link) transmitter. Historic systems also used spinning discs, for example the Teleview system.\nActive shutter 3D systems are used to present", "-28.684607744798996" ], [ "The most serious effect among these was \"Kerr lensing\", where, because the beam is so intense, that during its passage through either air or glass the electric field of the light actually alters the index of refraction of the material and causes the beam at the most intense points to \"self focus\" down to filament like structures of extremely high intensity. When a beam collapses into extremely high intensity filaments like this, it can easily exceed the optical damage threshold of laser glass and other optics, severely damaging them by creating pits, cracks and grey tracks through the glass. These", "-28.679904276214074" ], [ "To focus its eyes, a lamprey flattens the cornea using muscles outside of the eye and pushes the lens backwards. Accommodation The lens is flexible and its curvature is controlled by ciliary muscles through the zonules. By changing the curvature of the lens, one can focus the eye on objects at different distances from it. This process is called accommodation. At short focal distance the ciliary muscle contracts, zonule fibers loosen, and the lens thickens, resulting in a rounder shape and thus high refractive power. Changing focus to an object at a greater distance requires the relaxation of the \nlens", "-28.602387680322863" ], [ "avoid undercuts and sharp edges. For the lens design it should be considered that the lens has to be mountable in measurement systems. Index drop Due to the fast cooling after moulding, the part retains a small amount of residual stress. Consequently, the glass exhibits a small change in the refractive index which has to be considered in the optical design. A higher cooling rate corresponds to a larger decrease of the refractive index. A lower cooling rate could circumvent the index drop, but would be less cost-efficient Substrate materials The mould material must have sufficient strength, hardness and accuracy", "-28.59623521825415" ], [ "that there is another limitation to vision beyond the correction of refractive error. The blur disk Optical defocus can result from incorrect corrective lenses or insufficient accommodation, as, e.g., in presbyopia from the aging eye. As said above, light rays from a point source are then not focused to a single point on the retina but are distributed in a little disk of light, called the blur disk. Its size depends on pupil size and amount of defocus, and is calculated by the equation \n(d = diameter in degrees visual angle, p = pupil size in mm, D =", "-28.53279420209583" ], [ "easy, but in a zoom there is always a compromise.\nThe lens usually is focused by adjusting the distance from the lens assembly to the image plane, or by moving elements of the lens assembly. To improve performance, some lenses have a cam system that adjusts the distance between the groups as the lens is focused. Manufacturers call this different things: Nikon calls it CRC (close range correction); Canon calls it a floating system; and Hasselblad and Mamiya call it FLE (floating lens element).\nGlass is the most common material used to construct lens elements, due to its good optical properties and", "-28.512169705776614" ], [ "illusion of deep focus with optical tricks (split-focus diopter) or by compositing two or more images together. It is the aperture of a camera lens that determines the depth of field.\nThe opposite of deep focus is shallow focus, in which the plane of the image that is in focus is very shallow. Deep focus and different formats The choice of shooting format affects how easy it would be to achieve a deep focus look. This is because the size of the sensor or film gauge dictates what particular lens focal length would be used in order to achieve a", "-28.21876903154771" ], [ "area of attentional focus to be expanded (but due to a fixed limit on available attentional resources, only at the expense of processing efficiency).\nAccording to Pylyshyn, the spotlight/zoom-lens model cannot tell the complete story of visual perception. He argues that a pre-attentive mechanism is needed to individuate objects upon which a spotlight of attention could be directed in the first place. Furthermore, results of multiple object tracking studies (discussed below) are \"incompatible with the proposal that items are accessed by moving around a single spotlight of attention.\" Visual indexing theory addresses these limitations. Descriptive view of visual representation According to", "-28.196269808977377" ], [ "not so close that the eyelashes smear the lenses. To protect against \"stray light\" from the sides, the lenses should fit close enough to the temples and/or merge into broad temple arms or leather blinders.\nIt is not possible to \"see\" the protection that sunglasses offer. Dark lenses do not automatically filter out more harmful UV radiation and blue light than light lenses. Inadequate dark lenses are even more harmful than inadequate light lenses (or wearing no sunglasses at all) because they provoke the pupil to open wider. As a result, more unfiltered radiation enters the eye. Depending on the manufacturing", "-28.161260837339796" ], [ "changing the camera angle; it is often used to avoid convergence of parallel lines, such as when photographing a tall building. Tilting the lens relies on the Scheimpflug principle to rotate the plane of focus away from parallel to the image plane; this can be used either to have all parts of an inclined subject sharply rendered, or to restrict sharpness to a small part of a scene. Tilting the lens results in a wedge-shaped depth of field that may be a better fit to some scenes than the depth of field between two parallel planes that results without tilt.\nUnlike", "-28.155821622291114" ], [ "is similar to the blurring effect of our eyes when viewing a halftone image. In any case, it is important to pick a proper bandwidth. A too-limited bandwidth blurs edges out, while a high bandwidth produces a noisy image because it does not remove the pattern completely. Due to this trade-off, it is not able to reconstruct reasonable edge information.\nFurther improvements can be achieved with edge enhancement. Decomposing the halftone image into its wavelet representation allows to pick information from different frequency bands. Edges are usually consisting of highpass energy. By using the extracted highpass information, it is possible to", "-28.149633548338898" ], [ "with another pair of lenses (optional), that are connected by four-bar linkage. For example, sunlenses could be easily lifted up and down while mixed with myopia lenses that always stay on. Presbyopia lenses could be also combined and easily removed from the field of view if needed without taking off glasses. 3D glasses The illusion of three dimensions on a two-dimensional surface can be created by providing each eye with different visual information. 3D glasses create the illusion of three dimensions by filtering a signal containing information for both eyes. The signal, often light reflected off a movie screen", "-28.13834774598945" ], [ "visual acuities than eyeglasses. If the astigmatism is caused by a problem such as deformation of the eyeball due to a chalazion, treating the underlying cause will resolve the astigmatism. Misaligned or malformed lenses and mirrors Grinding and polishing of precision optical parts, either by hand or machine, typically employs significant downward pressure, which in turn creates significant frictional side pressures during polishing strokes that can combine to locally flex and distort the parts. These distortions generally do not possess figure-of-revolution symmetry and are thus astigmatic, and slowly become permanently polished into the surface if the problems causing the", "-28.13070149649684" ], [ "new glasses, the optician will ask him whether he prefers his spectacles close to the eyes or at some distance. This distance is referred to as the Back Vertex Distance, or BVD on a prescription. Since this property affects the available eye relief of any binocular or other optics used, (telescopes, microscopes, etc.) it should be borne in mind at the eye testing stage. The matter should be discussed with the optician, though the only realistic way of testing the comfort is to try the optical device while wearing the usual spectacles. ", "-28.121764116338454" ], [ "image is formed with significant coma, field curvature, and other optical aberrations inherent to spherical lenses. The refractive index of typical materials used for crystal balls (quartz: 1.46, window glass: 1.52), produces a central focal point just outside the surface of the sphere, on the side diametrically opposite to where the rays entered.\nFor materials with refractive index greater than 2, the focus will be located inside the sphere. In this case the image is not directly accessible, while the closest accessible point is on its surface directly opposite the source of light. However, few materials have a refractive index", "-28.11042759148404" ], [ "is sometimes applied to the inside to help cut down on glare. The slits are made narrow not only to reduce the amount of light entering but also to improve the visual acuity. The greater the width of the slits the larger the field of view. Terminology Like other Inuit language words, such as inukhuk/inuksuk, a different word may be used in different dialects. In the Kivalliq dialect, ilgaak (ᐃᓪᒑᒃ) is used, while the North Baffin dialect uses iggaak (ᐃᒡᒑᒃ). Both words are also used to refer to sunglasses.\nIn Central Yup'ik, snow goggles are called nigaugek, while in Cup'ig they", "-28.109923412208445" ], [ "see well in the dark, without reflections to give its location away to predators. The structure consists of a hexagonal pattern of bumps, each roughly 200 nm high and spaced on 300 nm centers. This kind of antireflective coating works because the bumps are smaller than the wavelength of visible light, so the light sees the surface as having a continuous refractive index gradient between the air and the medium, which decreases reflection by effectively removing the air-lens interface. Practical anti-reflective films have been made by humans using this effect; this is a form of biomimicry. Canon uses the moth-eye technique in", "-28.108990636421368" ], [ "up and down) will appear to move in depth, either toward or away from the viewer.\nBecause the Pulfrich effect depends on motion in a particular direction to instigate the illusion of depth, it is not useful as a general stereoscopic technique. For example, it cannot be used to show a stationary object apparently extending into or out of the screen; similarly, objects moving vertically will not be seen as moving in depth. Incidental movement of objects will create spurious artifacts, and these incidental effects will be seen as artificial depth not related to actual depth in the scene. Many", "-28.08530230211909" ], [ "of gravity's effect on the lens. Since a lens can only be held in place by its edge, the center of a large lens will sag due to gravity, distorting the image it produces. Large reflecting telescopes In 1856–57, Karl August von Steinheil and Léon Foucault introduced a process of depositing a layer of silver on glass telescope mirrors. The silver layer was not only much more reflective and longer lasting than the finish on speculum mirrors, it had the advantage of being able to be removed and re-deposited without changing the shape of the glass substrate. Towards the end", "-28.029068582807668" ], [ "using lenses with much longer focal lengths for portraits results in more extreme flattening of facial features, which also may be objectionable to the viewer. Photograph viewing distance Photographs are ordinarily viewed at a distance approximately equal to their diagonal. When viewed at this distance, the distortion effects created by the angle of view of the capture are apparent. However, theoretically, if one views pictures exhibiting extension (wide angle) distortion at a closer distance, thus widening the angle of view of the presentation, then the phenomenon abates. Similarly, viewing pictures exhibiting compression (telephoto) distortion from a greater distance, thus", "-28.020782326871995" ], [ "both eyes, but depicted from slightly different perspectives. Since no head tracking is involved, the entire audience can view the stereoscopic images at the same time. Additionally, since both lenses have the same color, people with one dominant eye (amblyopia), where one eye is used more, are able to see the 3D effect, previously negated by the separation of the two colors.\nCircular polarization has an advantage over linear polarization, in that the viewer does not need to have their head upright and aligned with the screen for the polarization to work properly. With linear polarization, turning the glasses sideways causes", "-28.02004967533867" ], [ "and everything within its beam is attended and processed preferentially, while information outside the beam is unattended. This suggests that the focus of visual attention is limited in spatial size and moves to process other areas in the visual field. Zoom-lens metaphor Research has suggested that the attentional focus is variable in size. Eriksen and St James proposed the ‘zoom-lens’ metaphor, which is an alternative to the spotlight metaphor and takes into account the variable nature of attention. This account likens the distribution of attention to a zoom-lens that can narrow or widen the focus of attention. This supports findings", "-28.003109441371635" ], [ "is decreased when illumination is lowered. At lower illumination, the dilation of pupil increases the pupillary peripheral region and therefore increases the magnitude of the Stiles-Crawford effect. Chromatic aberration Stereoptic depth perception obtained from two dimensional red and blue or red and green images is believed to be caused primarily by optical chromatic aberrations. Chromatic aberrations are defined as types of optical distortions that occur as a consequence of refracting properties of the eye. However, other [optical] factors, image characteristics, and perceptual factors also play a role in color depth effects under natural viewing conditions. Additionally, texture properties of the", "-27.973064414036344" ], [ "with no zoom and a 2.5-inch base.\nNote that when using this technique it is necessary to avoid objects that are significantly closer or more distant than the main subject so as to avoid excessive deviation that could cause the image to be uncomfortable or even impossible to view. Baseline tailored to viewing method When images are viewed on a small screen from a short distance, differences in parallax are smaller and the stereo effect is muted. For this reason, stereo images are sometimes \"optimized\" for this situation, by using a larger baseline.\nHowever, images optimized for a small screen viewed from", "-27.938903122150805" ], [ "displays, freeing the user from the need to put on special glasses or goggles. Stereopsis tests In stereopsis tests (short: stereotests), slightly different images are shown to each eye, such that a 3D image is perceived in case stereovision is present. This can be achieved by means of vectographs (visible with polarized glasses), anaglyphs (visible with red-green glasses), lenticular lenses (visible with the naked eye), or head-mounted display technology. The type of changes from one eye to the other may differ depending on which level of stereoacuity is to be detected. A series of stereotests for selected levels thus constitutes", "-27.934854781255126" ], [ "Anisometropia Contact lenses The usual recommendation for those needing iseikonic correction is to wear contact lenses. The effect of vertex distance is removed and the effect of center thickness is also almost removed, meaning there is minimal and likely unnoticeable image size difference. This is a good solution for those who can tolerate contact lenses.\nGLasses\nGlasses can also be worn in very small cases of anisometropia. But the thing in glasses (in large cases) is that one eye will see things bigger than the other eye. Refractive surgery Refractive surgery causes only minimal size differences, similar to contact lenses. In a", "-27.89587961800862" ], [ "confers not only optical resolution, but aperture and low-light ability, as resolution is now decoupled from hole size – which slowly increases again, free from the circulatory constraints.\nIndependently, a transparent layer and a nontransparent layer may split forward from the lens: a separate cornea and iris. (These may happen before or after crystal deposition, or not at all.) Separation of the forward layer again forms a humour, the aqueous humour. This increases refractive power and again eases circulatory problems. Formation of a nontransparent ring allows more blood vessels, more circulation, and larger eye sizes. This flap around the perimeter of", "-27.87067452937481" ], [ "the structure of the glass. Stage Three As higher amounts of alkali leach from the glass cracks are likely to become deeper. Crizzling is a distinctive network of fine cracks in the glass which is visible to the naked eye.\nIn some cases, the crazing can gain a more uniform appearance. However, crizzling may not be uniform due to the creation of micro-climates on the glass. Stage Four Distinct cracks may appear on the surface of the glass, and surface material may flake or chip, a process referred to as spalling. Stage Five In the most severe stage of deterioration,", "-27.84407894150354" ], [ "of aperture on depth of field in photography). Constricting the aperture may be achieved by forming a tiny hole with one's index finger and peering through it.\nThe onset of correction for presbyopia varies among those with certain professions and those with miotic pupils. In particular, farmers and homemakers seek correction later, whereas service workers and construction workers seek eyesight correction earlier. Scuba divers with interest in underwater photography may notice presbyopic changes while diving before they recognize the symptoms in their normal routines due to the near focus in low light conditions. Interaction with myopia Many people with near-sightedness can", "-27.80935786862392" ], [ "lens beyond further use.\nLenses should be replaced once a year, as their strength is adversely affected by exposure to sunlight. Paint to barrel matching Paintballs generally change shape or size due to differing temperature or humidity, or even due to varying manufacturing processes. If a paintball is larger than the barrel bore, it will at a minimum cause reduced efficiency due to increased friction. Oversized paintballs can also break inside the barrel and coat the inside with paint, causing shot inaccuracy until it is cleaned out. If the paintball is too small for the barrel, air will escape around the", "-27.805848526157206" ], [ "that light entering the pupil off-axis is less efficient in creating an image (the Stiles-Crawford effect), which has the effect of substantially reducing these unwanted side lobes. Also, the effects of diffraction limits can, with care, be used to partially compensate for the aberrations.\nThe retinal receptors are physically situated behind a neural layer carrying the post-retinal processing elements. Light cannot pass through this layer undistorted. In fact, measurements on the Modulation Transfer Function (MTF) suggest that the MTF degradations due to the diffusion through that neural layer are of a similar order as those due to the", "-27.799124650318845" ], [ "viewing. The chromostereoptic effect is generally attributed to the interocular difference in TCA. Color-induced depth effects due to TCA can only be perceived in images containing achromatic information and a single non-achromatic color. The amplitude of the perceived depth in an image due to the stereoptic effect can be predicted from the amount of induced TCA. In other words, as the pupillary distance from the foveal achromatic axis is increased, perceived depth also increases. Implications of chromatic aberrations Longitudinal and transverse chromatic aberrations work together to affect retinal image quality. Additionally, pupil displacement from the visual axis is critical for", "-27.79067926708376" ], [ "in each eye. The bifocal asymmetric lens allows for two images to be formed within the eye – each focusing on one of the retinas. The unfocused image is also shifted due to the asymmetry – causing only the focused image to be displayed on one retina – further enhancing resolution.", "-27.769991019682493" ], [ "the eye.\nBarring contacts, a good lens designer doesn’t have many parameters which can be traded off to improve vision. Index has little effect on error. Note that, although chromatic aberration is often perceived as \"blurry vision\" in the lens periphery and gives the impression of power error, this is actually due to color shifting. Chromatic aberration can be improved by using a material with improved ABBE. The best way to combat lens induced power error is to limit the choice of corrective lens to one that is in the best spherical form. A lens designer determines the best-form spherical curve", "-27.752317142083484" ], [ "Eye relief The eye relief of an optical instrument (such as a telescope, a microscope, or binoculars) is the distance from the last surface of an eyepiece within which the user's eye can obtain the full viewing angle. If a viewer's eye is outside this distance, a reduced field of view will be obtained. The calculation of eye relief is complex, though generally, the higher the magnification and the larger the intended field-of-view, the shorter the eye relief. Eye relief and exit pupil The eye relief property should not be confused with the exit pupil width", "-27.738857216521865" ], [ "the eyepiece generally has a longer focal length. This has the effect of producing magnified images of close objects. Generally, an additional source of illumination is used since magnified images are dimmer due to the conservation of energy and the spreading of light rays over a larger surface area. Modern microscopes, known as compound microscopes have many lenses in them (typically four) to optimize the functionality and enhance image stability. A slightly different variety of microscope, the comparison microscope, looks at side-by-side images to produce a stereoscopic binocular view that appears three dimensional when used by humans.\nThe first telescopes, called", "-27.72668233665172" ], [ "outside stray light, but by lowering the hinged magnifying glass into the finder for critical focusing, it also becomes a direct vision frame finder. By looking into the rectangular opening at the back of the hood, it provides the field of view of a 50mm lens, a useful feature since the focusing screen image is laterally reversed, which makes it less useful as an action finder. Pushing a small notch to the side at the lover right on the rear finder hood panel, flips the lowered magnifying glass up and away. The finder panels are stowed away one by one,", "-27.70781209868437" ], [ "seventh decade. Refraction The optical component is concerned with producing a reduced inverted image on the retina. The eye's optical system consists of not only two but four surfaces—two on the cornea, two on the lens. Rays are refracted toward the midline. Distant rays, due to their parallel nature, converge to a point on the retina. The cornea admits light at the greatest angle. The aqueous and vitreous humors both have a refractive index of 1.336-1.339, whereas the cornea has a refractive index of 1.376. Because the change in refractive index between cornea and aqueous humor is relatively small compared", "-27.683710477955174" ], [ "the lens is over-filled with a sterile saline or other prescribed solution mixture. Some fluid is allowed to drip from the lens as it is inserted in order to ensure no bubbles become trapped under the lens after it is seated on the eye. The lens can then be rotated to the correct orientation, often denoted by a mark at the \"top\" of the lens, with a finger. A \"left\" scleral lens is often marked with two dots, and a \"right\" is marked with one dot. Removal and storage Scleral lenses are removed using the fingers, or", "-27.673233628011076" ], [ "opaque zones. The zones can be spaced so that the diffracted light constructively interferes at the desired focus, creating an image there. Physics There are many wavelengths of light outside of the visible area of the electromagnetic spectrum where traditional lens materials like glass are not transparent, and so lenses are more difficult to manufacture. Likewise, there are many wavelengths for which there are no materials with a refractive index significantly larger than one. X-rays, for example, are only weakly refracted by glass or other materials, and so require a different technique for focusing. Zone plates eliminate", "-27.672235124744475" ], [ "lenses of lower quality construction and materials. Compound lenses are built to correct this \"spherical aberration\" or \"curvature of field\". Tilting the plane of focus Varying the distance between the lens and sensor or film plane across the field of view permits focussing on objects at varying distances from the camera. One means of achieving this is to tilt the lens and/or the sensor or film plane in relation to each other. This will mean that individual points in the picture plane will focus on different points of depth, with the effect that the plane of sharp focus will tilt.\nThis", "-27.65585942675898" ], [ "fringes from the two slits (Fig. 2). In contrast, the Lloyd's mirror experiment does not use slits and displays two-source interference without the complications of an overlaid single-slit diffraction pattern.\nIn Young's experiment, the central fringe representing equal path length is bright because of constructive interference. In contrast, in Lloyd's mirror, the fringe nearest the mirror representing equal path length is dark rather than bright. This is because the light reflecting off the mirror undergoes a 180° phase shift, and so causes destructive interference when the path lengths are equal or when they differ by an integer number of wavelengths. Interference lithography", "-27.64407098328229" ], [ "than the radius of its posterior surface. The shape of the lens is controlled by tension in the fibers of the ciliary body. To focus on distant objects, the controlling muscles cause the lens to be relatively flattened. Similarly, these muscles allow the lens to become thicker in order to focus on objects near the eye.\nThe distance between the center of the lens and the retina (focal length) varies from approximately 17 mm to about 14 mm, as the refractive power of the lens increases from its minimum to its maximum. When the eye focuses on an object farther away than about", "-27.637794053414837" ], [ "have similarly experienced, which is believed to be due to confusion caused by a lack of visual cues that humans use to perceive depth in their everyday environment.\nNintendo of America president Reggie Fils-Aimé partially cited these concerns as one of the influences of the Nintendo 2DS, an entry-level version of the Nintendo 3DS systems lacking 3D functionality. Legal issues In 2011, 58-year-old former Sony employee Seijiro Tomita sued Nintendo for infringing a patent on the 3D screen that obviates the need for 3D glasses. On March 13, 2013, a United States federal jury ordered Nintendo to pay him US$30.2 million", "-27.629635382680135" ], [ "The grey background is more ambiguous than the high contrast background. Lotto and Purves (2001) demonstrated that the Chubb illusion can be explained \"by the degree to which imperfect transmittance is likely to have affected the light that reaches the eye.\" Indeed, these observations suggest a wholly empirical explanation of the Chubb illusion.\nChubb effect estimates that when an object is viewed through an imperfectly transmitting medium, it increases or decreases the apparent brightness or dullness of the target patch, even when luminance ratios and spatial frequencies remain the same. Lotto and Purves (2001) doubted that illusory perceptions of brightness were", "-27.627718487306993" ], [ "Keystone effect Keystone effect in stereo imaging In stereo imaging, two lenses are used to view the same subject image, each from a slightly different perspective, allowing a three-dimensional view of the subject. If the two images are not exactly parallel, this causes a keystone effect. This is particularly noticeable when the lenses are close to the subject, as with a stereo microscope, but is also a common problem with many 3d stereo camera lenses. Correction Keystone correction, colloquially also called keystoning, is a function that allows multimedia projectors that are not placed perpendicular to the horizontal centerline of", "-27.609976624022238" ], [ "standing between any two parallel reflective surfaces, such as the glass walls of a small entry lobby into some buildings. The partially reflective glass produces this sensation, diluted by the visual noise of the views through the glass into the surrounding environment. Explanation of effect The 3D illusion mirror effect is produced whenever there are two parallel reflective surfaces which can bounce a beam of light back and forth an indefinite (theoretically infinite) number of times. The reflections appear to recede into the distance because the light actually is traversing the distance it appears to be travelling. \nFor", "-27.573557699332014" ], [ "apparent sharpness is increased because of the greater acutance.\nArtificially increased acutance has drawbacks. In this somewhat overdone example most viewers will also be able to see the borders separately from the line, which create two halos around the line, one dark and one shimmering bright. Tools Several image processing techniques, such as unsharp masking, can increase the acutance in real images. Resampling Low-pass filtering and resampling often cause overshoot, which increases acutance, but can also reduce absolute gradient, which reduces acutance. Filtering and resampling can also cause clipping and ringing artifacts. An example is bicubic interpolation, widely used in", "-27.572092587739462" ], [ "P from an inner point S in the source will be redirected towards an inner point of the receiver. This lens then guarantees that all light from the source crossing it will be redirected towards the receiver. However, no image of the source is formed on the target. Imposing the condition of image formation on the receiver would imply using more optical surfaces, making the optic more complicated, but would not improve light transfer between source and target (since all light is already transferred). For that reason nonimaging optics are simpler and more efficient than imaging optics in transferring radiation", "-27.56948026304599" ], [ "objectives with a high numerical aperture.\nHowever, blurring is not caused by random processes, such as light scattering, but can be well defined by the optical properties of the image formation in the microscope imaging system. If one considers a small fluorescent light source (essentially a bright spot), light coming from this spot spreads out further from our perspective as the spot becomes more out of focus. Under ideal conditions, this produces an \"hourglass\" shape of this point source in the third (axial) dimension. This shape is called the point spread function (PSF) of the microscope imaging system. Since any fluorescence", "-27.556921894662082" ] ]
62svwj
Why did Titanic become famous? Isn't it just a shipwreck like the many others?
[ "She was billed as invincible, she was the biggest passenger liner built at the time and they had one of the most experienced crews of White Star Line at the helm. Unfortunately a chain of completely avoidable errors caused the accident, including the ship having the absolute legal minimum of life boats which was the start of the problem. A last minute reshuffle of senior crew meant that the holder of the key to the cupboard that contained the binoculars ended up not going with the ship, and he simply forgot to hand the key back over. Numerous warnings from ships nearby (notably the Californian which was close by and had stopped surrounded by icebergs) were pushed aside by overworked radio operators who were busy sending and receiving passenger messages. The iceberg was spotted very late due to a moonless night and eerily calm waters, meaning there were no waves crashing against the bottom of the icebergs. Once it was apparent the iceberg was there, First Officer Murdoch attempted a manoeuvre to swing the front of the ship round to the left, and then push the rear of the ship outwards using the propellers in a move called a port-about. However the delay involved in switching the engines to reverse caused the ship to adopt a slow sideways drift towards the berg. Many experts believe that if Murdoch had simply turned the ship at its current speed, it would avoided the collision by some feet. Once the collision had taken place, the Captain was roused and almost immediately told by the ships designer that sinking within 2 hours was a 'mathematical certainty'. The Captain became paralysed with indecision and gave no orders other than to rouse the passengers and put their life jackets on. Prompted by other officers onboard, he ordered the lifeboats to be loaded and lowered saying \"women and children first\". However the officer in charge of one side of the ships evacuation took it as \"women and children ONLY\" and therefore dramatically reduced the amount of passengers to be saved. It is believed the Captain never officially ordered to abandon ship, or even evacuate, with many officers and staff working on their own initiative. The Californian had shut its radios down for the night, and even though both radio operators on the Titanic worked tirelessly sending distress messages (even the yet to be introduced SOS signal), the closest ship was 4 hours away. The Carpathia made full steam through the minefield of icebergs towards the ship that had given its position as 15 nautical miles from where it actually was. The Captain of this ship was later credited with saving nearly every possible survivor. The Titanic shot rockets from the deck which was seen by the Californian, however the Captain elected to ignore them. The sinking of the Titanic was a major wake up call for the authorities to start tightening procedures and regulation, as well as the media attention it received. Imagine the inaugural flight of the Airbus A380 crashing - it would hit news big time. I'm probably missing out a few details as well as having forgotten the vast majority of the crew members' names, but I've given the just of what happened and hopefully it helps. I'm sure there are some redditors that are considerably more knowledgeable than I on the subject that can point out any mistakes.", "It was one of the biggest disasters in naval history with 1500 deaths, a large amount of that could have been prevented if the owners didn't skimp out on lifeboats, communications, and life jackets. The boat only had enough safety equipment to save 50% of the people on board, and somehow they fucked that up and lost 68% of the people. Also after its sinking after supposedly being \"unsinkable\" it became something of a tragic tale of human arrogance. After the sinking there was a major push in ocean liner's safety regulations and procedures so that you wouldn't have more people than you have the capacity to save them.", "The Titanic was sold as unskinkable and reports in Irish papers quickly got the myth going. The ship then sinks on its maiden voyage so I imagine the irony adds to its fame.", "Hyped up to be unsinkable. Biggest and most glamorous ship of its time. Sunk on maiden voyage.", "She's famous because she was the biggest and best ocean liner ever built at the time, and because she sank on her maiden voyage despite being billed and designed as “unsinkable.” Also, that was predicted in a way in [a book from 1898]( URL_0 )." ]
[ [ "RMS Titanic in popular culture The RMS Titanic has played a prominent role in popular culture since her sinking in 1912, with the loss of over 1,500 of the 2,200 lives on board. The disaster and the Titanic herself have been objects of public fascination for many years. They have inspired numerous books, plays, films, songs, poems, and works of art. The story has been interpreted in many overlapping ways, including as a symbol of technological hubris, as basis for fail-safe improvements, as a classic disaster tale, as an indictment of the class divisions of the time, and as romantic", "-37.48923993004064" ], [ "Sinking of the RMS Titanic Background At the time of her entry into service on 2 April 1912, Royal Mail Ship (RMS) Titanic was the second of three Olympic-class ocean liner sister ships, and was the largest ship in the world. She and her sister, RMS Olympic, were almost one and a half times the gross register tonnage of Cunard's RMS Lusitania and RMS Mauretania, the previous record holders, and were nearly 100 feet (30 m) longer. Titanic could carry 3,547 people in speed and comfort, and was built on an unprecedented scale. Her reciprocating engines were the largest that had ever been built,", "-35.43166067992843" ], [ "Titanic′s set made it impossible for the show to have traditional out of town tryouts. Titanic′s previews began at Broadway's Lunt-Fontanne Theatre in 1997 with various technical troubles which were overcome by opening night, initially receiving mixed to positive reviews. The New Yorker′s was the first of numerous later unqualified raves: \"It seemed a foregone conclusion that the show would be a failure; a musical about history's most tragic maiden voyage, in which fifteen hundred people lost their lives, was obviously preposterous.... Astonishingly, Titanic manages to be grave and entertaining, somber and joyful; little by little you", "-35.33809189929161" ], [ "Titanic would continue to be a popular disaster with filmmakers and audiences alike. Werner Klingler and Herbert Selpin released the epic film, Titanic (1943 film). The film was soon banned in Germany and its director, Selpin, was allegedly executed. The film was a staple for all Titanic films, and scenes became stock footage for the British version. Clifton Webb and Barbara Stanwyck starred in the 1953 20th Century Fox production Titanic, followed by the highly regarded British film A Night to Remember in 1958. The British action-adventure film The Last Voyage (1960), while not about the Titanic disaster but", "-34.42177963812719" ], [ "rest of the ship sank (the ship's length is greater than the depth of the water). She has been, after the discovery, regularly seen as part of many other expeditions. In contrast to Titanic, which lies at the very bottom of the North Atlantic and is being fed on by iron-eating bacteria, the Britannic is in remarkably good condition, and is much more accessible than her infamous sister. Many external structural features are still intact, including her propellers, and a great deal of her superstructure and hull. Cultural heritage Museums and exhibitions pay tribute to the ships, and the two", "-33.88299001441919" ], [ "RMS Titanic Background The name Titanic derives from the Titan of Greek mythology. Built in Belfast, Ireland, in the United Kingdom of Great Britain and Ireland (as it was then known), the RMS Titanic was the second of the three Olympic-class ocean liners—the first was the RMS Olympic and the third was the HMHS Britannic. Britannic was originally to be called Gigantic and was to be over 1,000 feet long. They were by far the largest vessels of the British shipping company White Star Line's fleet, which comprised 29 steamers and tenders in 1912. The three ships had their genesis in", "-33.61108350176073" ], [ "with its episodes of heroism, comedy, irony, sentimentality and ultimately tragedy. In short, the fact that the story can so easily be seen as fitting an established dramatic template has made it hard not to interpret it that way.\nDescribing the disaster as \"one of the most fascinating single events in human history,\" Stephanie Barczewski identifies a number of factors behind the continuing popularity of the Titanic's story. The creation and destruction of the ship are symbols of \"what human ingenuity can achieve and how easily that same ingenuity can fail in a brief, random encounter with the forces of nature.\"", "-33.56426627608016" ], [ "the Titanic appear to have a shimmer to them, reflecting their demise in the sea. The Titanic upon docking has a gaping hole (though too far forward on her hull) of where the iceberg punched her, and the top near the bridge appears to be split apart. Seeing the Titanic finally appear at its destination over half a century late, the dock supervisor quips \"Well, better late than never!\"\nJames Cameron's Titanic is the most commercially successful film about the ship's sinking. Titanic became the highest-grossing film in history nine weeks after opening on 19 December 1997, and a week later", "-33.4003995328967" ], [ "in the Irish Sea. Wrecks and expeditions When Titanic sank in 1912 and Britannic sank in 1916, their sinkings did not receive the same attention, due to the death toll (1,517 on Titanic and 30 on Britannic). Because the exact position of the sinking of the Britannic is known and the location is shallow, the wreck was discovered relatively easily in 1975. Titanic, however, drew everyone's attention in 1912. After several attempts, the wreck was finally located by Jean-Louis Michel of Ifremer and Robert Ballard following a top secret mission for the US Navy to investigate the wreckage of two", "-33.30795688054059" ], [ "Legends and myths regarding RMS Titanic There have been several legends and myths surrounding the RMS Titanic over the years. These have ranged from the myth about the ship being unsinkable, to the myth concerning the final song played by the ship's orchestra. Unsinkable Contrary to popular mythology, Titanic was never described as \"unsinkable\", without qualification, until after she sank. Three trade publications (one of which was probably never published) described Titanic as practically unsinkable prior to her sinking. Many survivors recalled in video interviews as well as in testimony that they had considered the ship \"unsinkable.\" Shipbuilder Harland", "-33.278542394400574" ], [ "Elder & Co. of Glasgow, Scotland, in 1884. They were record breakers by the standards of the time, and were the largest liners then in service, plying the Liverpool to New York route.\nRMS Titanic was the largest steamship in the world when she sank in 1912; a subsequent major sinking of a steamer was that of the RMS Lusitania, as an act of World War I.\nLaunched in 1938, RMS Queen Elizabeth was the largest passenger steamship ever built. Launched in 1969, RMS Queen Elizabeth 2 (QE2) was the last passenger steamship to cross the Atlantic Ocean on a scheduled liner voyage before she was converted", "-33.070449800514325" ], [ "Romandisea Titanic Background In 1912, the original Titanic set out on its maiden and only voyage from Southampton in the United Kingdom to New York City. Five days into the voyage, the ship hit an iceberg and sank, killing approximately 1,500 of the 2,224 aboard. Titanic was the largest ship of its time.\nSouth African businessman mogul Sarel Gous proposed building Titanic II in 1998. Gous said he had acquired the original drawings for the famous ship and now wanted to fulfill his dream. If the ship had been completed, it would have had a length of 290 metres (950 ft) and", "-32.99606241413858" ], [ "the hull and structure of Titanic would eventually collapse entirely, leaving only the more durable interior fittings of the ship intermingled with a pile of rust on the sea floor.\nMany artefacts from Titanic have been recovered from the sea bed by RMS Titanic Inc., which exhibits them in touring exhibitions around the world and in a permanent exhibition at the Luxor Las Vegas hotel and casino in Las Vegas, Nevada. A number of other museums exhibit artefacts either donated by survivors or retrieved from the floating bodies of victims of the disaster.\nOn 16 April 2012, the day after the 100th", "-32.99061879480723" ], [ "in sheer scale and tragedy\" and that \"when you consider that [the film] tops a bum-numbing three-hour running time, then you have a truly impressive feat of entertainment achieved by Cameron\". Joseph McBride of Boxoffice Magazine concluded, \"To describe Titanic as the greatest disaster movie ever made is to sell it short. James Cameron's recreation of the 1912 sinking of the 'unsinkable' liner is one of the most magnificent pieces of serious popular entertainment ever to emanate from Hollywood.\"\nThe romantic and emotionally charged aspects of the film were equally praised. Andrew L. Urban of Urban Cinefile said, \"You will walk", "-32.65354382552323" ], [ "out of Titanic not talking about budget or running time, but of its enormous emotive power, big as the engines of the ship itself, determined as its giant propellers to gouge into your heart, and as lasting as the love story that propels it.\" Owen Gleiberman of Entertainment Weekly described the film as, \"A lush and terrifying spectacle of romantic doom. Writer-director James Cameron has restaged the defining catastrophe of the early 20th century on a human scale of such purified yearning and dread that he touches the deepest levels of popular moviemaking.\" Janet Maslin of The New York Times", "-32.65105937968474" ], [ "most controversial and complex theories was put forward by Robin Gardiner in his book, Titanic: The Ship That Never Sank?. In it, Gardiner draws on several events and coincidences that occurred in the months, days, and hours leading up to the sinking of the Titanic, and concludes that the ship that sank was in fact Titanic's sister ship Olympic, disguised as Titanic, as an insurance scam by her owners, the International Mercantile Marine Group, controlled by American financier J.P. Morgan that had acquired the White Star Line in 1902.\nOlympic was the slightly older sister of Titanic, built alongside the more", "-32.324976940173656" ], [ "were consumed by sea creatures and bacteria, leaving pairs of shoes and boots—which have proved to be inedible—as the only sign that bodies once lay there.\nSince its initial discovery, the wreck of Titanic has been revisited on numerous occasions by explorers, scientists, filmmakers, tourists and salvagers, who have recovered thousands of items from the debris field for conservation and public display. The ship's condition has deteriorated significantly over the years, particularly from accidental damage by submersibles but mostly because of an accelerating rate of growth of iron-eating bacteria on the hull. In 2006, it was estimated that within 50 years", "-32.313355085090734" ], [ "2009, she was sold to Bill Schlagel of California who intended to convert her into a luxury motor yacht, and renamed her Titanic. On 16 August 2009, Titanic visited St Helena where it was discovered that she was not displaying her name. The vessel's name was not on shipping registers either. It was established that the vessel was bona fide. She departed the next day.\nTitanic is now owned by White Star Line Ltd. On 31 March 2010, Titanic developed a leak while on a voyage from Grenada to Puerto Rico where she was to undergo a refit. A skeleton crew", "-32.21199812386476" ], [ "society was originally called the Titanic Enthusiasts of America, but Kamuda changed its name after a widow of a Titanic passenger questioned their \"enthusiasm\" for the disaster which killed 1,517 people, including her husband. Kamuda, who served as the president of the Titanic Historical Society, saw the society's membership grow to thousands during his lifetime. Under his leadership, the Titanic Historical Society became one of the world's leading centers for the research of the RMS Titanic, as well as its passengers and crew.\nKamuda and other members of the society served as consultants for the 1997 film, Titanic, directed by James", "-32.09970969198912" ], [ "– was published.\nThe first film about the disaster, Saved from the Titanic, was released only 29 days after the ship sank and had an actual survivor as its star—the silent film actress Dorothy Gibson. The British film A Night to Remember (1958) is still widely regarded as the most historically accurate movie portrayal of the sinking. The most financially successful by far has been James Cameron's Titanic (1997), which became the highest-grossing film in history up to that time, as well as the winner of 11 Oscars at the 70th Academy Awards, including Best Picture and Best Director for Cameron.\nThe", "-31.95008293315186" ], [ "fall in love aboard RMS Titanic during its ill-fated maiden voyage. DiCaprio initially refused to play the character, but was eventually encouraged to pursue the role by Cameron, who strongly believed in his acting ability. With a production budget of more than $200 million, the film was the most expensive ever made and was filmed at Rosarito Beach where a replica of the ship was created. Against expectations, Titanic went on to become the highest-grossing film to that point, eventually grossing more than $2.1 billion in box-office receipts worldwide, and transformed DiCaprio into a superstar, resulting in intense adoration among", "-31.92013638006756" ], [ "coincidence, Morgan Robertson authored a novel called Futility in 1898 about a fictional British passenger liner with the plot bearing a number of similarities to the Titanic disaster. In the novel the ship is the SS Titan, a four-stacked liner, the largest in the world and considered unsinkable. And like the Titanic, she sinks after hitting an iceberg and does not have enough lifeboats. In Northern Ireland Only recently has the significance of Titanic most notably been given by Northern Ireland where it was built by Harland and Wolff in the capital city, Belfast. While the rest of the world", "-31.810584903345443" ], [ "Merchant Shipping Act 1894 and were modified subsequently, but by 1912 they had a fatal flaw – they had been intended to regulate vessels of up to 10,000 tons, a limit that had long since been exceeded by shipbuilders. By comparison, Titanic had a gross register tonnage of 46,328 tons. Other ships were in a similar situation; 33 of the 39 British liners over 10,000 tons did not have enough lifeboats for all aboard (the six that did were marginally over 10,000 tons). RMS Carmania was perhaps the worst of them, with only enough lifeboats for 29% of her occupants. Foreign ships,", "-31.807028884417377" ], [ "was initially some confusion in both the United States and the UK over the extent of the disaster, with some newspapers at first reporting that the ship and the passengers and crew were safe. By the time Carpathia reached New York, it had become clear that Titanic, reputed to be unsinkable, had sunk and many had died. Official inquiries were set up in both countries to investigate the circumstances of the disaster. Formation When news of the disaster reached the UK government the responsibility for initiating an inquiry lay with the Board of Trade, the organisation responsible for British maritime", "-31.682914315446396" ], [ "of the White Star Line, J. Bruce Ismay, occupied the port-side \"Deluxe\" Suite on the Titanic, while the starboard suite was occupied by the American millionairess Mrs. Charlotte Drake Cardeza, her son, and entourage. Condition in the Wreck There has been relatively little exploration of the First-Class staterooms on Titanic since her discovery. Only the staterooms in the bow section forward of the Grand Staircase survive in an appreciable condition. Because the cabins were all framed in pine and teak, many of the walls between staterooms have deteriorated, leaving a warren of tangled electrical wiring, deep silt and wreckage treacherous", "-31.667843314126912" ], [ "waters of the Baltic Sea. Under the orders of King Gustavus II Adolphus, the immense vessel was built to support Swedish military campaigns during the Thirty Years' War, yet was toppled by swift winds at sea. The Vasa remained peacefully underwater until a team of archaeologists raised the wreck in 1961. Fortunately, the wreck and all of its belongings were salvaged, despite its lengthily time spent on the ocean floor. Today, the Swedish Vasa museum in Stockholm is an emblem of cultural heritage, dedicated to educating public citizens worldwide.\nIn 1985, a team of scientists discovered the RMS Titanic in the", "-31.601840617295238" ], [ "blitz for Titanic kicked off...  From that point on, the deluge of publicity never stopped.\" On December 17, 1997, Stuart was nominated for a Golden Globe Award for Best Supporting Actress for her performance in the film. She was also nominated for an Academy Award for Best Supporting Actress. She was one of the few Golden Age stars to attend the ceremony, with contemporaries Fay Wray, Bob Hope, and Milton Berle also attending. As of 2019, she remains the oldest nominee in the category.\nOn March 8, 1998, the Screen Actors Guild awarded Stuart its Founders Award. Then for Best Performance", "-31.497954844264314" ], [ "American folklorist D.K. Wilgus, Titanic inspired \"what seems to be the largest number of songs concerning any disaster, perhaps any event in American history.\" In 1912–3 alone, over a hundred songs are known to have been produced in the US; the earliest known commercial song about Titanic was copyrighted just ten days after the disaster. Numerous pieces of sheet music and gramophone records were subsequently produced. In many cases they were not simply mere commercial exploitation of a tragedy (though that certainly did exist) but were a genuine and deeply felt popular response to an event that evoked many contemporary", "-31.475625281964312" ], [ "Crew of the RMS Titanic The crew of the RMS Titanic were among the estimated 2,208 people who sailed on the maiden voyage of the second of the White Star Line's Olympic class ocean sea liners, from Southampton, England to New York City in the US. Halfway through the voyage, the ship struck an iceberg and sank in the early morning of 15 April 1912, resulting in the deaths of over 1,500 people, including approximately 688 crew members.", "-31.47090109098599" ], [ "Titanic sank some 37 years later in 1912, that it was made compulsory for all British registered ships to carry sufficient lifeboats for everyone on board. Present day Today, only parts of the deteriorated iron hull and the coal fired square boilers of Gothenburg remain. The wreck lies between 9 and approximately 16 metres (52 ft) of water on the western side of Old Reef, 130 kilometres (81 mi) southeast of Townsville. The Gothenburg shipwreck is registered on the Queensland National Estate (place ID #8923) as a Heritage site, and is protected under Section 7 of the (Commonwealth) Historic Shipwrecks Act 1976,", "-31.407474329520483" ], [ "269 m long and weight 46,000 tons. She was described as a luxury hotel at sea and as \"unsinkable\". She was fitted with a double bottom and 16 watertight compartments so that even if two were flooded she would not sink. Titanic departed from Southampton on 10 April 1912 on her maiden voyage to America. She called at Cherbourg and then Queenstown (now Cobh) before heading for New York City. Despite warnings of icebergs, she continued at 20 knots (37 km/h) on the night of 14 April. About midnight she hit an iceberg and five compartments started to flood. Two hours", "-31.369259962579235" ], [ "study of the lives of the passengers on the Titanic, historian Richard Davenport-Hines said, \"Cameron's film diabolized rich Americans and educated English, anathematizing their emotional restraint, good tailoring, punctilious manners and grammatical training, while it made romantic heroes of the poor Irish and the unlettered\".\nTitanic suffered backlash in addition to its success. In 2003, the film topped a poll of \"Best Film Endings\", and yet it also topped a poll by Film 2003 as \"the worst movie of all time\". The British film magazine Empire reduced their rating of the film from the maximum five stars and an enthusiastic review,", "-31.364893729391042" ], [ "Titanic (restaurant) History The restaurant was located within the Regent Palace Hotel, in central London. The Regent Palace was located directly off Piccadilly Circus The hotel was owned by Forte Group, and already had a restaurant called the Atlantic Bar and Grill which was owned by restaurateur Oliver Peyton. The Titanic was located directly above the Atlantic within the hotel, and Peyton was irritated by diners attempting to book at the Titanic prior to opening by calling his restaurant. Marco Pierre White was the managing partner of the restaurant, being backed by hotel owners Forte. It was named Titanic because", "-31.362674434669316" ], [ "Titanic (the 1953 movie). He wrote that \"'The Poseidon Adventure' puts the Ark Movie back where God intended it to be, in the water. Not flying around in the air on one engine or with a hole in its side.\" The movie was enormously successful, part of a decade of disaster films, and remains a cult classic.\nIn his New York Times obituary, Molly Ivins said that \"to say that Mr. Gallico was prolific hardly begins to describe his output.\" He wrote 41 books and numerous short stories, twenty theatrical movies, twelve TV movies, and had a TV series based on", "-31.349884435127024" ], [ "which features a British ocean liner Titan that hits an iceberg and sinks in the North Atlantic with great loss of lives. The similarities between the plot of the novel and the sinking of the RMS Titanic 14 years later led to the assertion of conspiracy theories regarding Titanic. Films Ocean liners were often a setting of a love story in films, such as the 1939's Love Affair Liners were also used as a setting of disaster films. The 1960 film The Last Voyage was filmed on board the Íle de France, which was used as a floating prop and was", "-31.340399060834898" ], [ "puts it, \"for the second time in his life, Beesley left the Titanic just before it was due to go down\".\nAlthough it won numerous awards including a Golden Globe Award for Best English-Language Foreign Film and received high praise from reviewers on both sides of the Atlantic, it was at best only a modest commercial success due to its original huge budget and a relatively poor impact in America. It has nonetheless aged well; the film has considerable artistic merit and, according to Professor Paul Heyer, it helped to spark the wave of disaster films that included The Poseidon Adventure", "-31.247414168563637" ], [ "huge ocean liner, the Titan, which sinks in the North Atlantic on her maiden voyage after colliding with an iceberg. The Titan is depicted as only slightly larger than Titanic, both ships have three propellers and carry 3,000 passengers, both have watertight compartments, both are described as \"unsinkable\" and both have too few lifeboats \"as required by law\". The collision is described within the novel's first twenty pages; the rest of the book deals with the aftermath. The similarities between art and life were recognised immediately in 1912 and the book was republished soon after the sinking of Titanic, with", "-31.184100172977196" ], [ "the claim. White Star's flagship would also be out of action during the extensive repairs, and the Titanic's completion date, which was already behind schedule due to Olympic's return to the yard after her loss of a propeller blade, would have to be delayed. All this would amount to a serious financial loss for the company. Gardiner proposes that, to make sure at least one vessel would be earning money, the badly damaged Olympic was patched up and then converted to become the Titanic. The real Titanic when complete would then quietly enter service as the Olympic.\nThe Titanic indeed had", "-31.174870812596055" ], [ "plentiful quantities of good food, providing her passengers with better conditions than many of them had experienced at home.\nTitanic's maiden voyage began shortly after noon on 10 April 1912 when she left Southampton on the first leg of her journey to New York. A few hours later she called at Cherbourg in northern France, a journey of 80 nautical miles (148 km; 92 mi), where she took on passengers. Her next port of call was Queenstown (now Cobh) in Ireland, which she reached around midday on 11 April. She left in the afternoon after taking on more passengers and stores.\nBy the time", "-31.157303118801792" ], [ "dive to shipwrecks because they are interesting to explore, provide large habitats for many types of marine life, and have an interesting history.\nWell known shipwrecks include the catastrophic Titanic, Britannic, Lusitania, Estonia, Empress of Ireland, Andrea Doria, or Costa Concordia. There are also thousands of wrecks that were not lost at sea but have been abandoned or sunk. These abandoned, or derelict ships are typically smaller craft, such as fishing vessels. They may pose a hazard to navigation and may be removed by port authorities. Causes Poor design, improperly stowed cargo, navigation and other human errors leading to collisions (with", "-31.1400088876253" ], [ "famous vessel but launched in October 1910. Her exterior profile was nearly identical to Titanic, save for minor details such as the number of portholes on the forward C decks of the ships, the spacing of the windows on the B decks, and the forward section of the A deck promenade on Titanic that had been enclosed only a few weeks before she set sail on her ill-fated maiden voyage. Both ships were built with linoleum floors, but shortly before she was due to set sail J. Bruce Ismay, managing director of the White Star Line, inexplicably ordered the floors", "-31.13537760474719" ], [ "perished. In Belfast, churches were packed, and shipyard workers wept in the streets. The ship had been a symbol of Belfast's industrial achievements, and there was not only a sense of grief but also one of guilt, as those who had built Titanic came to feel they had been responsible in some way for her loss. Public inquiries and legislation In the aftermath of the sinking, public inquiries were set up in Britain and the United States. The US inquiry began on 19 April under the chairmanship of Senator William Alden Smith, and the British inquiry commenced in London under", "-31.115957056113984" ], [ "along with a freighter, three tugs and five railway car barges. Popular with tourists, the Princess ships were famous in their own right especially Princess Marguerite (II) which operated from 1949 until 1985 and was the last coastal liner in operation. The best known of the princess ships, however, is Princess Sophia, which sank with no survivors in October 1918 after striking the Vanderbilt Reef in Alaska's Lynn Canal, constituting the largest maritime disaster in the history of the Pacific Northwest. These services continued for many years until changing conditions in the late 1950s brought about their decline and eventual", "-31.088555888884002" ], [ "1912, Titanic struck an iceberg. Hays helped the women in his party into one of the ship's 20 lifeboats, but he, his son-in-law, and his secretary remained and perished when the ship sank, along with 1,500 other Titanic passengers and crew. Hays was reported to have made a prophetic remark on the evening of the disaster; deploring the way the steamship lines were competing to win passengers with ever-faster vessels, he is said to have commented, \"The time will come soon when this trend will be checked by some appalling disaster.\"\nOne source, Hacking, names the daughter with Hays on the", "-31.006875906983623" ], [ "Memorial to the Engine Room Heroes of the Titanic The Memorial to the Engine Room Heroes of the Titanic is a granite monument located on St. Nicholas Place, at the Pier Head, in Liverpool, England. The city of Liverpool is strongly associated with the ill-fated liner that sank on 15 April 1912, after striking an iceberg in the North Atlantic with the loss of some 1,517 lives. The RMS Titanic was owned by White Star Line which was founded in Liverpool in 1840. Liverpool was also the port of registry of the liner with the words 'Titanic, Liverpool' visible on", "-31.00494883194915" ], [ "the massive Superliners which included the RMS Titanic. The event with the Titanic lead to the Maritime Distress Safety System. Maritime events of World War I At the start of the war, the German Empire had cruisers scattered across the globe. Some of them were subsequently used to attack Allied merchant shipping. The British Royal Navy systematically hunted them down, though not without some embarrassment from its inability to protect allied shipping. For example, the detached light cruiser SMS Emden, part of the East-Asia squadron stationed at Tsingtao, seized or destroyed 15 merchantmen, as well as sinking a Russian cruiser and a", "-30.983900217252085" ], [ "Perfect Storm and Titanic. Carla Meyer of the San Francisco Chronicle praised the performance of Isaiah Washington, but deemed the film \"a stupid, derivative horror film that substitutes extreme gore for suspense. Granted, there are only so many ways to kill people in these pictures, but lingering on a woman on a meat hook doesn't make a movie scary. It makes it gross.\"\nManohla Dargis of the Los Angeles Times was critical of the script's lack of character development, writing: \"With its minor shivers and modest Grand Guignol showmanship, Ghost Ship is the sort of flimflam that would have filled eight", "-30.975970043218695" ], [ "a nearby vessel providing assistance. While Titanic was under construction, an incident involving the White Star liner RMS Republic appeared to confirm this approach. Republic was involved in a collision with the Lloyd Italiano liner SS Florida in January 1909 and sank. Even though she did not have enough lifeboats for all passengers, they were all saved because the ship was able to stay afloat long enough for them to be ferried to ships coming to assist. This fact is what led to the harsh condemnation of Captain Stanley Lord of Californian, who both American and British inquiries into the disaster felt", "-30.951429901178926" ], [ "the largest passenger liner of her time displacing 45,000 tons and capable of sustained speed in excess of 22 knots (41 km/h). The loss of Titanic gripped the world with a sobering awareness of an iceberg's potential for tragedy. The sheer dimensions of the Titanic disaster created sufficient public reaction on both sides of the Atlantic to prod reluctant governments into action, producing the first Safety of Life at Sea (SOLAS) convention in 1914. \nAfter the Titanic disaster, the U.S. Navy assigned the cruisers USS Chester and USS Birmingham to patrol the Grand Banks of Newfoundland for the remainder of 1912. In 1913,", "-30.938109464754234" ], [ "visit her, and the girl who begs for him. Similarities to the Titanic Although the novel was written before the RMS Titanic was even conceptualized, there are some uncanny similarities between both the fictional and real-life versions. Like the Titanic, the fictional ship sank in April in the North Atlantic, and there were not enough lifeboats for all the passengers. There are also similarities between the size (800 ft (244 m) long for Titan versus 882 ft 9 in (269 m) long for the Titanic, speed and life-saving equipment. After the Titanic's sinking, some people credited Robertson with precognition and clairvoyance. Robertson denied this, and", "-30.92112685785105" ], [ "prompted the mayor of Memphis, Tennessee to ban \"any moving picture reels portraying the Titanic disaster or any phase thereof\". The mayors of Philadelphia and Boston soon followed suit. However, the Titanic newsreel bubble soon burst, and by August 1912 trade newspapers were reporting that compilations of stock footage of Titanic intercut with pictures of icebergs \"don't attract audiences any more.\" Drama films There have so far been eight English-language drama films (not counting TV films) about the Titanic disaster: four American, two British and two German, produced between 1912 and 1997. 1912–43 The first drama film about the disaster,", "-30.89549477220862" ], [ "Star Line would never have permitted their current flagship to stand as a set piece depicting the worst disaster in their company's history. Atlantic was instead partly filmed on board a P&O ship, the Mooltan Indeed, the film was originally made as Titanic but after lawsuits it was renamed Atlantic. These lawsuits were initiated by the White Star Line, which owned the RMS Titanic, and which was still in operation at the time. (White Star had in fact also owned a liner called RMS Atlantic which was lost in 1873, but at the distance of half a century it", "-30.84906695425161" ], [ "the old concepts of the nuclear family and traditional gender roles, reflected in the behaviour of Titanic's passengers, resonate with a mid-1950s audience.\nThe gradual nature of the disaster was also more comforting, in some respects, compared with the nature of modern technological failures such as air crashes. Time's reviewer made this point explicitly: \"This air age, when death comes too swiftly for heroism or with no survivors to record it, can still turn with wonder to an age before yesterday when a thousand deaths at sea seemed the very worst the world must suffer.\" It was, as Steven Biel comments,", "-30.805825408373494" ], [ "the film – and the synopsis suggests that there was plenty – Saved from the Titanic is an irreplaceable piece of Titanic lore.\nIt was also Dorothy Gibson's last film, as the effort of making it appears to have brought on an existential crisis for her. According to a report in the Harrisburg Leader, \"she had practically lost her reason, by virtue of the terrible strain she had been under to graphically portray her part.\"", "-30.781110710522626" ], [ "reissues, Titanic earned $659.4 million in North America and $1.528 billion in other countries, for a worldwide total of $2.187 billion. It became the highest-grossing film of all time worldwide in 1998, and remained so for twelve years, until Avatar (2009), also written and directed by Cameron, surpassed it in 2010. On March 1, 1998, it became the first film to earn more than $1 billion worldwide and on the weekend April 13–15, 2012—a century after the original vessel's foundering, Titanic became the second film to cross the $2 billion threshold during its 3D re-release. Box Office Mojo estimates that Titanic is", "-30.760295755149855" ], [ "earnest but hopelessly mediocre show\", which was not so much hit-and-miss as \"almost all miss.\" People magazine was much more complimentary, saying that it took \"guts to write a musical about the century's most infamous disaster, yet Broadway's Titanic unflinchingly sails forth with its cargo of epic themes\". The lavish production incorporated a tilting stage to simulate the sinking. It was a major box-office success; the musical won five Tony Awards and played on Broadway for two years, with performances also held in Germany, Japan, Canada and Australia.\nIn 2012, Robin Gibb's Titanic Requiem was performed and recorded by the Royal", "-30.736120061701513" ], [ "which the RMS Titanic ship sunk, attended in international film and video dance festivals in Greece, Spain & Russia.", "-30.674822419008706" ], [ "close\", and later claimed that the only reason that the film won Oscars was because of its box office total. Barbara Shulgasser of The San Francisco Examiner gave Titanic one star out of four, citing a friend as saying, \"The number of times in this unbelievably badly written script that the two [lead characters] refer to each other by name was an indication of just how dramatically the script lacked anything more interesting for the actors to say.\" Also, filmmaker Robert Altman called it \"the most dreadful piece of work I've ever seen in my entire life\". In his 2012", "-30.6481153643399" ], [ "Passengers of the RMS Titanic A total of 2,224 people sailed on the maiden voyage of the RMS Titanic, the second of the White Star Line's Olympic-class ocean liners, from Southampton, England, to New York City. Partway through the voyage, the ship struck an iceberg and sank in the early morning of 15 April 1912, resulting in the deaths of over 1,500 people, including about 815 of the passengers.\nThe Titanic's passengers were divided into three separate classes determined by the price of their ticket: those travelling in first class, most of them the wealthiest passengers on board, included prominent members", "-30.628996533181635" ], [ "ship's watertight compartments were breached. It soon became clear that the ship was doomed, as she could not survive more than four compartments being flooded. Titanic began sinking bow-first, with water spilling from compartment to compartment as her angle in the water became steeper.\nThose aboard Titanic were ill-prepared for such an emergency. In accordance with accepted practices of the time, where ships were seen as largely unsinkable and lifeboats were intended to transfer passengers to nearby rescue vessels, Titanic only had enough lifeboats to carry about half of those on board; if the ship had carried her full complement of", "-30.594509306072723" ], [ "Titanic, in order to ensure that they were in optimal working order. Andrews's suggestions that the ship have 46 lifeboats (instead of the 20 it ended up with) as well as a double hull and watertight bulkheads that went up to B deck, were overruled.\nAndrews headed a group of Harland and Wolff workers who went on the maiden voyages of the ships built by the company (the guarantee group), to observe ship operations and spot any necessary improvements. The Titanic was no exception, so Andrews and the rest of his Harland and Wolff group travelled from Belfast to Southampton on", "-30.583908796135802" ], [ "company the \"Titanic\" (a reference to Titan Enterprises, as WWF's parent company was then known, as the \"sinking ship\"). An hour later on Raw (which had been taped six days earlier), Rude then appeared with the full beard he had been sporting during his last few weeks in the WWF. Of the Hart family, only Owen continued to work with the company, being unable to terminate his contract.\nAt the next night's Raw in Ottawa, Michaels appeared carrying the WWF title belt and performing a segment where he boasted before the audience of how he beat Hart with his own trademark", "-30.57022383628646" ], [ "helped to spark the wave of disaster films that included The Poseidon Adventure (1972) and The Towering Inferno (1974). Heyer comments that it \"still stands as the definitive cinematic telling of the story and the prototype and finest example of the disaster-film genre.\" On Rotten Tomatoes the film has a \"certified fresh\" score of 100% based on 20 reviews with an average score of 8.71/10. It is considered \"the best Titanic film before Titanic (1997)\" and \"the most accurate of all Titanic films\" and \"the definitive Titanic tale\", especially for its social realism, reflecting, in the words of one", "-30.568344619707204" ], [ "directed by Jerry Jameson, cost at least $40 million. It was the most expensive movie made up to that time but made only $10 million at the box office. Lew Grade, the producer, later remarked that it would have been \"cheaper to lower the Atlantic\".\nThe Titanic makes a morbid cameo appearance in Ghostbusters II. The negatively charged ectoplasm apparently reached the sunken remains of the ship and joined it together. Upon arriving in New York Harbor, the dock supervisor at Pier 34 was in shock to see the ghostly ocean liner finally reach its destination. The ghosts that depart from", "-30.516858301973116" ], [ "A Deck promenade was enclosed by a steel screen with sliding windows, to provide additional shelter, whereas Olympic's promenade deck remained open along its whole length. This was a major contributor to Titanic's' increased gross tonnage of 46,328 tons over Olympic's 45,324 tons, which allowed Titanic to claim the title of largest ship in the world.\nAdditionally, the B-Deck First-Class promenade decks installed on Olympic had proven to be scarcely used because of the already ample promenade space on A-Deck. Accordingly, Thomas Andrews eliminated this feature on Titanic and built additional, enlarged staterooms with en-suite bathrooms. It also allowed a Café", "-30.50083222615649" ], [ "highlighting their high social status and wealth and conflating it with their self-sacrifice and perceived moral worth. A popular song of the time proclaimed:\nThere were millionaires from New York,\n\nAnd some from London Town.\n\nThey were all brave, there were men and women to save\n\nWhen the great Titanic went down.\nJohn Jacob Astor's death was highlighted as a particular example of noblesse oblige regarding his reputed refusal to leave the ship while there were still spaces in the lifeboats for women and children. The song \"A Hero Went Down with the Monarch of the Sea\" described Astor as \"a handsome prince of wealth,", "-30.50037054209315" ], [ "eponymous film became the first movie ever to take $1 billion at the box office, and the film's soundtrack became the best selling soundtrack recording of all time.\nThe wreck is steadily decaying, turning to oxide at a rate of 0.5–1 ton per day (assuming one ten-thousandth of an inch per day on all surfaces). Eventually Titanic's structure will collapse, and she will be reduced to a patch of rust on the seabed, with any remaining scraps of the ship's hull mingled with her more durable fittings, like the propellers, bronze capstans, compasses and the telemotor.", "-30.461434532218846" ], [ "marine disasters of all time to arouse public demand for international cooperative action to deal with this marine hazard. This disaster, the sinking of RMS Titanic on 15 April 1912, was the prime impetus for the establishment of the International Ice Patrol.\nOn her maiden voyage from Southampton, England bound for New York, Titanic collided with an iceberg just south of the tail of the Grand Banks and sank in less than three hours. The loss of life was enormous with more than 1,500 of the 2,224 passengers and crew perishing. Titanic, the brand new ship of the White Star Line, was", "-30.449021596476086" ], [ "sinking. She not only starred in the one-reel drama but also wrote the scenario. She even appeared in the same clothing she had worn aboard the Titanic that night—a white silk evening dress topped with a cardigan and polo coat.\nAlthough Saved From the Titanic was a tremendous success in America, Britain, and France the only known prints were destroyed in a 1914 fire at the Eclair Studios in New Jersey. The loss of the motion picture is considered by film historians to be one of the greatest of the silent era. Dorothy Gibson's other accomplishments in early cinema included starring", "-30.444963828427717" ], [ "Titanic and Other Ships. Lightoller speculated that pirates used the island and their treasure could be buried in its caves.\nIn 1892, the crew of the French sloop Bourdonnais, followed by the ship L'Eure in 1893, again took possession of Saint-Paul and Amsterdam Island in the name of the French government. 20th century In 1928, the Compagnie Générale des Íles Kerguelen recruited René Bossière and several Bretons and Madagascans to establish a spiny lobster cannery on Saint-Paul, \"La Langouste Française\". In March 1930, at the end of the second season, most of the employees left, but seven of them stayed on", "-30.402303190494422" ], [ "wife of Prime Minister H. H. Asquith; the Russian Ambassador to London, Count Aleksandr Beckendorf; several Members of Parliament, and various aristocrats.\nTestimony was given relating to the fire which had begun in Titanic's coal stores approximately 10 days prior to the ship's departure, and continued to burn for several days into its maiden voyage out of Southampton. Little note was taken of it. It has been theorised by modern-day historians (2016) that the fire damaged the structural integrity of two bulkheads and the hull; this combined with the speed of the vessel have been given as contributing reasons for the", "-30.36554555775365" ], [ "Titanic but was prevented by poor health.\nFor her contribution on television, Marguerite Chapman has a star on the Hollywood Walk of Fame at 6284 Hollywood Boulevard.\nMarguerite Chapman died August 31, 1999, aged 81, and was interred in Holy Cross Cemetery, in Culver City, California. Her funeral was held on September 4, 1999, at St. Charles Borromeo Catholic Church in North Hollywood, California, where she was a member.", "-30.3344317286801" ], [ "several editions being published since then.\nThriller author Clive Cussler wrote the successful Raise the Titanic! in 1976, which was made into a hugely expensive flop of a movie four years later. The same theme was reflected in The Ghost from the Grand Banks (1990) by Arthur C. Clarke, which tells the story of two competing expeditions seeking to raise both halves of the wreck in time for the centenary of the sinking in 2012. An earlier Clarke novel Imperial Earth, (1976, but set in the late 23rd century AD) mentions that the Titanic has been raised and is now a", "-30.32592059118906" ], [ "many admirers during their careers, and their retirement and scrapping caused certain sadness. The same was true of Île de France, whose scrapping aroused strong emotion from her admirers. Similarly, Queen Mary was very popular with the British people. Maritime disasters and incidents Some ocean liners are infamous today because of their sinking with great loss of lives. In 1873, RMS Atlantic struck an underwater rock and sank off the coast of Nova Scotia, Canada, killing at least 535 people. In 1912, the sinking of the RMS Titanic, which took approximately 1,500 lives, highlighted the overconfidence of the shipping companies in", "-30.322663948958507" ], [ "the ship and increasing her list to one side.\nThe sinking of Titanic revealed serious faults in the design of the Olympic-class liners, necessitating a major refit for Olympic in late 1912 and major changes to Britannic, still in the early phases of construction. Titanic had sunk because her six forward compartments had been breached, above the keel but below the waterline, bypassing the double-bottom completely. The low height of the bulkheads had also failed the ship, allowing for uncontrolled flooding once the water in the breached compartments had reached E Deck. The refit on Olympic raised the middle five bulkheads", "-30.28185665278943" ], [ "disaster, while the disaster lends the love story a mythic aspect. Cameron's film cost $200 million, making it the most expensive film ever made up to that time; much of it was shot on a vast, nearly full-scale replica of Titanic's starboard side built in Baja California, Mexico. The film was converted into 3D and re-released on 4 April 2012 to coincide with the centenary of the sinking. Cameron's film is the only Titanic drama to have been partially filmed aboard the vessel, which the Canadian director visited in two Russian submersibles in the summer of 1995. Radio In", "-30.24344847552129" ], [ "ship would be destroyed by the British.\nThe scenes with the lifeboats were also filmed on the Baltic Sea; some of the interior scenes were shot in Tobis Studios.\nTitanic endured many production difficulties, including a clash of egos, massive creative differences and general war-time frustrations. As filming progressed, more extravagant sets were demanded by Selpin, as well as additional resources from the German Navy – these demands were all approved by Goebbels, despite the mounting costs and the drain on the wartime German economy.\nAfter one week of troubled shooting on Cap Arcona, with the Allies bombing not far away, Herbert Selpin", "-30.243111934047192" ], [ "R. Poole, and every endeavour made to convey a true pictorial idea of the whole history of the disaster ... Unique Mechanical and Electric Effects, special music and the story described in a thrilling manner.\" The \"Immortal Tale of Simple Heroism\" was performed through eight tableaux, starting with \"A splendid marine effect of the Gigantic Vessel gliding from the Quayside at Southampton\" and ending with praise for \"the simple courage which remains for ever a proud heritage of the Anglo-Saxon race.\" According to contemporary reports, the show \"often reduced audiences to tears.\"\nNewsreels on the Titanic disaster were hampered by the", "-30.241074106947053" ], [ "(1972) and The Towering Inferno (1974). Heyer comments that it \"still stands as the definitive cinematic telling of the story and the prototype and finest example of the disaster-film genre\".\nIn 1979 EMI Television produced S.O.S. Titanic, a TV movie that tells the story of the disaster as a personal drama. Survivor Lawrence Beesley (played by David Warner) is presented as a romantic hero and Thomas Andrews (played by Geoffrey Whitehead) is also seen as a significant character for the first time. Ian Holm's J. Bruce Ismay is presented as the villain. Warner went on to play Caledon Hockley's manservant, Spicer", "-30.236859961529262" ], [ "record for any film. The film stayed in theaters in North America for almost 10 months before finally closing on Thursday, October 1, 1998 with a final domestic gross of $600,788,188. (equivalent to $937.7  million in 2018) Outside North America, the film made double its North American gross, generating $1,242,413,080 and accumulating a grand total of $1,843,201,268 worldwide from its initial theatrical run. Critical reception Titanic garnered mainly positive reviews from film critics, and was positively reviewed by audiences and scholars, who commented on the film's cultural, historical and political impacts. On review aggregator website Rotten Tomatoes, the film has", "-30.21018155303318" ], [ "microbiologist Dr Lori Johnston, who placed samples on Britannic to look at the colonies of iron-eating bacteria on the wreck, which are responsible for the rusticles growing on Titanic. The results showed that even after 87 years on the bottom of the Kea Channel, Britannic is in much better condition than Titanic because the bacteria on her hull have too much competition and are actually helping protect the wreck by turning it into a man-made reef.\nIn 2006, an expedition, funded and filmed by the History Channel, brought together fourteen skilled divers to help determine what caused the quick sinking of", "-30.196655064530205" ], [ "free entirely. She was not normally open to tourists, although entrance was gained during the annual RMS Titanic celebrations.\nUpon Caroline's decommissioning in 2011, her future was uncertain. Proposals were made to return the ship to her First World War appearance, which among other things would have involved sourcing and installing 6-inch (152.4 mm) and 4-inch (102 mm) guns of that era and removing the large deckhouse from her midships deck. One proposal considered was to remain in Belfast as a museum ship within the Titanic Quarter development alongside SS Nomadic. Another was a move to Portsmouth, with many of her original fittings", "-30.156218466116115" ], [ "to the disaster was a \"Myriorama\" (a neologism meaning \"many scenes\") titled The Loss of the Titanic performed by Charles William and John R. Poole, whose family had been staging such shows since the 1840s. It involved the use of a series of scenes painted on fine gauze sheets, manipulated in such a way that they would appear to dissolve from one scene to the next while music was played and a dramatic and emotive recital was performed in the foreground. According to the publicity material for the Titanic Myriorama, it featured \"the spectacle staged in its entirety by John", "-30.131786901358282" ], [ "interpreted as a metaphor for hell and purgatory, the Christian Abyss. One particular aspect of the sinking became iconic as a symbol of piety – the reputed playing by the ship's band of the hymn Nearer, My God, To Thee as she went down. The same hymn and slogan was repeated on many items of memorabilia issued to memorialise the disaster. Bamforth & Company issued a hugely popular postcard series in England, showing verses from the hymn alongside a mourning woman and Titanic sinking in the background.\nThere was only a limited number of surviving photographs of Titanic, so some unscrupulous postcard", "-30.114375339522667" ], [ "other vessels in the White Star fleet. While all other White Star Line Ships had their names engraved into their hulls, the Titanic alone had her name riveted over the top.\nThe plan, Gardiner suggests, was to dispose of the Olympic, which had allegedly been damaged beyond economic repair, in a way that would allow White Star to collect the full insured value of a brand new ship. He supposes that the seacocks were to be opened at sea to slowly flood the ship. If numerous ships were stationed nearby to take off the passengers, the shortage of lifeboats would not", "-30.091945383988786" ], [ "the Titanic sunk. I still drowned.\"\nDespite the negative reviews, Roger Ebert gave the film a mildly positive review, awarding 2.5 stars out of 4 and writing, \"It's impossible not to feel affection for At Long Last Love Peter Bogdanovich's much-maligned evocation of the classical 1930s musical. It's a light, silly, impeccably stylish entertainment...The movie's no masterpiece, but I can't account for the viciousness of some of the critical attacks against it. It's almost as if Bogdanovich is being accused of the sin of pride for daring to make a musical in the classical Hollywood style...Bogdanovich has too much taste, too", "-30.090306158253952" ], [ "film received \"two thumbs up\" and was praised for its accuracy in recreating the ship's sinking; Ebert described the film as \"a glorious Hollywood epic\" and \"well worth the wait,\" and Gene Siskel found Leonardo DiCaprio \"captivating\". James Berardinelli stated, \"Meticulous in detail, yet vast in scope and intent, Titanic is the kind of epic motion picture event that has become a rarity. You don't just watch Titanic, you experience it.\" It was named his second best film of 1997. Almar Haflidason of BBC wrote that \"the sinking of the great ship is no secret, yet for many exceeded expectations", "-30.087241481000092" ], [ "The Titanics with drummer, Thompson, also on guitar. Joining them were McCormack's then-wife, Emma Tom, on bass and Tina Havelock-Stevens on drums. The Titanics did not last long, releasing two albums, Size Isn't Everything and Love is the Devil, before the group disbanded.\nMcCormack released a series of solo albums with The Polaroids, featuring his brother Dylan (Gentle Ben and his Sensitive Side) on bass, Shane Melder (ex-Sidewinder) on drums and Cameron Bruce (Paul Kelly). Releases include \"Candy\" (2002), \"Save Dave\" DVD (2003), \"The Truth About Love\" (2004) and \"Little Murders\" (2009).\nIn 2004, Strong joined The Lost Gospel, alongside Phil Jamieson", "-30.083818833176338" ], [ "Titanic (band) Career The group formed in Norway in 1969. Its members were Kenny Aas, Kjell Asperud, John Lorck, Janne Løseth and Roy Robinson and, for a time, John Williamson. Guitarist Janne Løseth was the band's primary songwriter and lead singer Roy Robinson its main lyricist.\nIn October 1971, Titanic reached Number 5 in the UK Singles Chart, with their instrumental track, \"Sultana\" in the style of Santana.\nThe band relocated to France and released Macumba in 1974 with Helge Groslie on keyboards. It reached number one in Spain. Sliding Down Again was released in 1974 and Buckshee Woman the following year.\nThe", "-30.071586588030186" ], [ "soon it became a symbol of national and company status to build the largest, fastest, and most luxurious ocean liner for transatlantic crossings. The United States, United Kingdom, France, Germany and Italy built the most famous ocean liners. Examples of some famous transatlantic liners are RMS Titanic (had only made one voyage that was unsuccessful due to striking an iceberg), RMS Lusitania, RMS Mauretania, RMS Olympic, SS Rex, SS America, SS United States, RMS Queen Mary, SS Île de France, SS Normandie, RMS Queen Elizabeth, SS France, Queen Elizabeth 2, and RMS Queen Mary 2.\nThe Blue Riband is awarded for the record fastest crossing by transatlantic liner. The current", "-30.060779016363085" ], [ "benefits for victims of the disaster by giving special concerts in which versions of \"Autumn\" and \"Nearer My God To Thee\" were part of the programme. In Britain, relief funds were organised for the families of Titanic's lost crew members, raising nearly £450,000 (£44,000,000 today). One such fund was still in operation as late as the 1960s.\nIn the United States and Britain, more than 60 survivors combined to sue the White Star Line for damages connected to loss of life and baggage. The claims totalled $16,804,112 (appr. $419 million in 2018 USD), which was far in excess of what White", "-30.055912464058565" ], [ "MY Titanic Description Originally built in 1971, Titanic is a former research/fishing boat. She is 78.64 metres (258 ft 0 in) long, with a beam of 11.00 metres (36 ft 1 in) and a depth of 8.01 metres (26 ft 3 in). She is powered by four Niigata 6MQG31EZ diesel engines. The vessel is currently being reconfigured to accept 4 HS Turbochargers 4800 series turbochargers. She displaces 1,900 tonnes. Her IMO Number is 7338561. History The ship was built in 1971 by Hayashikane Shipbuilding & Engineering Co Ltd, Nagasaki as Toko Maru. In 1996, she was sold to Premier Fishing, South Africa and renamed Kelso. In", "-30.0301523169328" ], [ "scenes of the family and a still of Dorothy standing in front of a map of the North Atlantic pointing to the location of the Titanic. Frank Thompson highlights the film as one of a number of \"important movies that disappeared\", noting that it was unique for having \"an actual survivor of the Titanic playing herself in a film\" while wearing \"the very clothes ... in which she abandoned ship\":\n[T]hat all this was committed to film within days of the disaster is enough to make any Titanic enthusiast sigh with frustration. No matter what melodramatic hocum found its way into", "-30.0275443791179" ], [ "twin funnels, after which she returned to the Liverpool-New York run. Smith left as captain in 1904 to take on the new Baltic, then the largest ship in the world. In 1905, Majestic suffered a fire in her bunker, but the damage was not significant. In 1907, White Star's main terminal was moved from Liverpool to Southampton and, on 26 June, Majestic sailed from these new facilities for the first time.\nWhen the Olympic entered service in 1911, Teutonic was removed from the New York run and put on Canadian service with the Dominion Line. Likewise when Titanic came on the", "-30.023021421395242" ], [ "As one Denver columnist put it, \"the disease-bitten [immigrant] child, whose life at best is less than worthless, goes to safety with the rest of the steerage riff-raff, while the handler[s] of great affairs, ... whose energies have uplifted humanity, stand unprotestingly aside.\"\nThe Titanic disaster became a popular theme for balladeers, blues, bluegrass and country singers in the Southern United States. Bluesman Ernest Stoneman scored one of his biggest hits with his song \"The Titanic\" in 1924, which was said to have sold over a million copies and became one of the best-selling songs of the 1920s. The story of", "-30.021330505358492" ], [ "DSV Turtle In fiction In fiction, she was featured in the 1980 film Raise the Titanic; she was one of several submersibles in the salvage fleet, and one of two (along with the fictional NUMA submersible Deep Quest) that actually discovered the wreck.", "-30.017458887479734" ], [ "Titanic disaster films, with the exception of not featuring the ship breaking in half. (There was still doubt about the fact she split in two when the book and film were produced. The accepted view at the time and the result of the inquires was that she sank intact; it was only confirmed that she split after the wreck was found in 1985.) Lightoller's widow Sylvia Lightoller praised the film's historical accuracy in an interview with The Guardian, stating \"The film is really the truth and has not been embroidered\".\nHowever, although some events are based on true history, the", "-29.995510084205307" ], [ "was made only seventeen years after the actual Titanic sinking and the public, especially survivors and their families, felt uncomfortable with a direct reference to Titanic. The producers of the film decided to release the movie under the title Atlantic, apparently unaware of the previous White Star Line disaster.\nP.G. Wodehouse wrote a story in 1921 called \"The Girl On The Boat\" in which six chapters of the romance take place on a White Star liner he named \"Atlantic\", crossing from New York to Southampton. As the real \"Atlantic\" disaster had occurred 48 years before the story and 8 years before", "-29.991730268775427" ], [ "their ships, such as the failure to put enough lifeboats on board. Safety measures at sea were reexamined following the incident. Two years later, in 1914, RMS Empress of Ireland sank in the Saint Lawrence River after colliding with another ship. 1,012 people died.\nAmong the other famous sinkings are that of RMS Lusitania in 1915, which resulted in the loss of 1,198 lives and provoked an international outcry, and that of MS Georges Philippar, which caught fire and sank in the Gulf of Aden in 1932, killing 54 people. In 1956, the sinking of SS Andrea Doria, with the loss of 46 lives,", "-29.98064385138059" ], [ "Titanic had been expected to visit on her return voyage. It was an error made by Walter Lord in his research which he acknowledged in the documentary \"The Making of A Night to Remember\". \nThe first scene of A Night to Remember depicts the christening of the ship at its launch. However, the Titanic was never christened, as it was not the practice of the White Star Line to stand on this sort of ceremony. This has come down in popular lore as one of the many contributing factors to the ship's \"bad luck\".\nThe crew, including Captain Smith is depicted", "-29.949284578149673" ] ]
780x48
Why do towels that feel so rough on the skin dry you so much better, but towels that feel soft don t dry well at all?
[ "Fabric softeners that make towels nice and fluffy also make them slightly more water proof so they tend to absorb less efficiently.", "Part of roughness means there's more highs & lows in the towel fibers. That increased surface area allows more area for absorption and therefore allows for better drying. You could try to make a towel soft by increasing the density of fibers/yarns but then if you increase it too much you just approach a solid surface meaning there's less surface area for absorption again. I'd say in reality there's a balance in the type of fibers/cloth a towel has which determines its softness/absorption capabilities and your actual fiber/yarn count. There are very soft towels (supima cotton) which can be [extremely good at drying]( URL_0 ). You don't necessarily need to sand your skin to get a good towel. I personally use the Pottery Barn towels that Sweet Home recommended a few years ago, and they've spoiled me. I end up hating most towels at hotels unless I stay at a nice place. Even the JW I stayed at a few months ago had towels that felt like sandpaper.", "Fabric softeners coat the towel fibres with a film that isn't very water absorbent, which makes the towel feel softer, but it won't absorb (dry you) as well. Generally, towels should be washed with just detergent at a relatively high temperature (60 degrees celsius+), and tumble dried to fluff up the fibres/threads to ensure maximum surface area. The drying in a machine is important, as towels which are air dried will tend to have the threads clump together which creates that rough feeling too. Lots of hotel towels that feel rough are just using dense cotton designed to last longer, or they are overly worn and the threads are short. Like with bed sheets, towels are one item where it's worth investing a few extra bucks to ensure good quality and they will last way longer than a cheaper product using poor materials. Egyptian cotton is considered one of the best.", "In most cases, it probably has to do with fabric content. 100% cotton towels are very \"thirsty\" and dry well, but towels that are part polyester (or another synthetic material) and woven with thinner fibers will feel softer to the touch, but not soak up water the way cotton does. The quality and length of the particular cotton, as well as the way it's woven, also factor in.", "It partly depends on how the towel is made. Terry cloth towels have loops that will wick away moisture on contact. Sheared towels or microfiber type towels are cut and it's harder for the strands to absorb moisture when you rub it on your skin.", "Also while we are at it, can someone please tell me which of the two are better for your skin?", "Ugh so many bad and wrong answers here. The real answer has to do with the materials the towels are made out of. 100% cotton towels become crunchy after a while. They lose a lot of the finer fibers which frees up more space for water to be absorbed thanks to the fact that water likes to stick to itself and cotton allows this to happen easily. Those super soft plush towels are made with either a cotton blend or are made with fully synthetic fibers which do not absorb water anywhere near as well as the fibers actually repel water for the same reasons plastic water bottles exist.", "Don't know the exact science behind towels, but general rougher surfaces have more pores, or more holes for things to fit into, compared to smoother surfaces. That is one explanation I suppose." ]
[ [ "small bathroom.\nDryers come in a variety of appearances, including: ladder types, turnable types, and others. Advantages The first advantage of this radiator is the aesthetic value that can help to enrich rooms with a touch of style. Another advantage is obviously the possibility of drying towels more quickly because they are put in direct contact with the radiant body. The towel warmer uses less water than a classic plate radiator or a cast iron radiator, so it is considered a little more ecological and more economical in terms of consumption. Its shapes are very different from each other and this", "-35.57607919431757" ], [ "the water. Dry hands and arms with a clean towel, disposable or not, and use a paper towel to open the door.\nMoisturizing lotion is often recommended to keep the hands from drying out; Dry skin can lead to skin damage which can increase the risk for the transmission of infection. Low-cost options when water is scarce Various low-cost options can be made to facilitate hand washing where tap-water and/or soap is not available e.g. pouring water from a hanging jerrycan or gourd with suitable holes and/or using ash if needed in developing countries (see Substance section too).\nIn situations with limited", "-34.060490321338875" ], [ "that feels softer.\nIn the US and UK laundry is mostly dried in mechanical dryers, and the tumbling of the laundry in the dryer has its own softening effect. Therefore, fabric softeners in the US and UK are used rather to impart antistatic properties and a pleasant smell to the laundry. Fabric softeners are usually either in the form of a liquid, which is added to the washing machine during the rinse cycle (either by the machine itself or through use of a dispensing ball); or as a dryer sheet which is added to the moist laundry at the beginning of", "-32.613096533561475" ], [ "dry is lubricating the skin with petroleum jelly or other lubricants in order to reduce the friction and allow the body parts to glide without forming a rash. In many cases, however, especially those involving the upper thighs, clothing is the biggest culprit. Cotton clothes should be avoided as should anything with large seams. Sports focused underwear and clothing made from polyester, nylon or spandex can largely reduce or entirely solve the issue in some cases. Problems caused by salt residue from evaporated sweat can be solved by using wet wipes to clean problem areas before resuming exercise.", "-32.51539240110287" ], [ "consumption only to toilet paper (36% vs. 45% in the U.S.), the proliferation of the mostly non-recyclable paper towels has the same globally adverse effects on the environment as indicated in the tissue article. However, paper towels made from recycled paper do exist, and are sold at many outlets.\nOther better alternatives are conventional towels or, for hand drying, hand dryers. Paper towels are quicker than hand dryers: after only ten seconds, paper towels achieve 90% dryness. Hot air dryers, on the other hand, take 40 seconds to achieve a similar dryness.", "-32.29051074862946" ], [ "size is used to improve the wet strength. Paper towels are packed individually and sold as stacks, or are held on a continuous roll, and come in two distinct classes: domestic and institutional. Many companies produce paper towels. Some of which include, but are not limited to: Charmin, Bounty, Seventh Generation, Scott, and Viva, among many others. Market Tissue products in North American, including paper towels, can be divided into \"consumer\" and \"commercial\" markets, with household consumer usage accounting for approximately two thirds of total North American consumption. Commercial usage, or otherwise any use outside of the North American household,", "-32.22140990869957" ], [ "towels to guests for their use.\nOne concern with the provision of towels is theft. Towel theft has proven costly to hotels, though hotels have been reported to do little to combat the problem. In 2003, Holiday Inn offered amnesty to those who returned stolen towels.\nHotels have begun to outfit their towels with RFID technology to reduce the frequency of theft. Dining Various forms of dining are offered in various places of lodging. Some hotels offer a continental breakfast that is often complimentary to guests. Items often served include cereal, pastries, waffles, sausage, fruits, and beverages.\nSome hotels have on-site restaurants. In", "-32.17440250207437" ], [ "moderate temperatures of around 59-95 °F. Within this temperature range typical adhesives maintain their balance in viscous and elastic behavior where optimal surface wetting can be achieved. At extremely high temperatures the tape may be able to stretch more than it could initially. This could cause problems after application to the surface because if the temperature drops the tape may experience additional stress. This may lead to the tape losing some of its contact area, lowering its shear adhesion or holding power. At lower temperatures the adhesive polymers become harder and stiffer which lowers the overall", "-32.08318639174104" ], [ "hand washing protects people poorly or not at all from droplet and airborne diseases, such as measles, chickenpox, influenza, and tuberculosis. Soap and detergents Removal of microorganisms from skin is enhanced by the addition of soaps or detergents to water. The main action of soaps and detergents is to reduce barriers to solution, and increase solubility. Water is an inefficient skin cleanser because fats and proteins, which are components of organic soil, are not readily dissolved in water. Cleansing is, however, aided by a reasonable flow of water. Solid soap Solid soap, because of its reusable nature, may hold bacteria", "-32.041304579004645" ], [ "can allow us to structure radiator, adapting it perfectly to rooms. There are towel warmers of different sizes, from the smallest (even of 27 in × 20 in - 70 cm × 50 cm) to larger ones that can even reach 79 in (2 meters) in height. Disadvantages The first disadvantage is directly linked to one of its advantages, namely the possibility of drying our towels faster. The problem is that covering part of the pipes and the radiant body, the energy, consumption and time required to bring the room to temperature will be bigger than a radiator free of", "-31.84710676362738" ], [ "introduced either. Wet shampoos were once formulated from coconut oil soaps; wet shampoo residues can be foamy or sticky, and steam cleaning often reveals dirt unextracted by shampoos. Since no rinse is performed, the powerful residue can continue to collect dirt after cleaning, leading to the misconception that carpet cleaning can lead to the carpet getting \"dirtier faster\" after the cleaning. The best method is truckmounted hot water extraction.\nWhen wet-shampoo chemistry standards converted from coconut oil soaps to synthetic detergents as a base, the shampoos dried to a powder, and loosened dirt would attach to the powder components, requiring vacuuming", "-31.403469584765844" ], [ "by the salt and residue left behind after sweat evaporates. If sweat is allowed to dry, and exercise is resumed, the salt may intensify the friction and cause further irritation. Other contributing factors include hot weather, sensitive skin, sand from the beach getting into problem areas, and prior skin irritation. Prevention and treatment Staying dry may keep the skin from the developing further chafing, although this can be next to impossible in hot weather and requires avoiding exercise. Certain products such as baby powder, potato flour or antiperspirant may help with keeping the problem areas dry. An alternative to staying", "-31.348268665140495" ], [ "because the skin under the bandage becomes wet due to perspiration, urine or other bodily fluids. The excess moisture is sometimes called hyperhydration.\nWrinkles are the first sign that the skin is over-hydrated. In addition, macerated skin becomes extremely soft and takes on a whitish appearance. However, this white skin should not be confused with the pale, whitish appearance of the new epithelial tissue in a healing wound.\nAlthough most maceration clears up quickly once the skin is exposed to fresh air and allowed to dry, sometimes skin that experiences long periods of maceration is vulnerable to fungal and bacterial infection. As", "-31.293693538522348" ], [ "Heated towel rail Composition and functioning Towel dryers can be made from different metals such as steel, stainless steel, or aluminum. In some types, brass or copper is used. The finish can be in chrome plating, polished steel, or lacquer.\nDryers can be heated electrically (heating cartridge or heating cable), or by circulating hot water (connected to the central heating). Often, a combination of the methods is used. In these cases, the dryer is heated by hot water in wintertime, and by electricity in the summer. A towel dryer, with high output, can also serve as a radiator in a", "-31.189713315223344" ], [ "does, thus making it a good option for sensitive skin as finer hairs are more easily removed because the hard wax encapsulates the hair as it hardens. The stripless waxing method can also be less painful.", "-31.147714912338415" ], [ "of sound at a distance of 10 ft (3.0 m) while in operation. It is much louder for the user and may exceed safety limits for children whose ears are at the height of the device. Some units, however, are designed to be quieter at the cost of drying speed. Reception Research conducted in 2008 indicated that European consumers much prefer hand towels over hand dryers in public washrooms. 63% of respondents said paper towels were their preferred drying method, while just 28% preferred a hand dryer. Respondents overwhelmingly considered paper towels to offer faster hand drying than electric hand dryers", "-30.80263506619667" ], [ "to use, or wet as required. Because they don't contain chemicals or artificial fragrances like most disposable wipes, they are gentle on the skin. They are often reported to be more effective at removing solids from the skin because of their textured nature. Personal hygiene Wet wipes are often included as part of a standard sealed cutlery package offered in restaurants or along with airline meals.\nWet wipes began to be marketed as a luxury alternative to toilet paper by 2005 by companies such as Kimberly-Clark and Procter & Gamble. They are dispensed in the toilets of restaurants, service stations, doctors'", "-30.727695127105108" ], [ "if available. As wet wipes are produced from plastic textiles made of polyester or polypropylene, they are notoriously bad for sewage systems as they do not decompose, although the wet wipe industry maintains they are biodegradable but not \"flushable\". \nA moisturizing gel can be applied to toilet paper for personal hygiene or to reduce skin irritation from diarrhea. This product is called gel wipe. Special foams, sprays and gels can be combined with dry toilet paper as an alternatives to wet wipes. Cloths Rags or washcloths are sometimes used. They are then washed similarly to cloth diapers and used again.", "-30.7152924843831" ], [ "variety of problems.\nHard water leads to the buildup of limescale, which can foul plumbing, and promote galvanic corrosion. In industrial scale water softening plants, the effluent flow from the re-generation process can precipitate scale that can interfere with sewage systems.\nThe slippery feeling experienced when using soap with soft water occurs because soaps bind to fats in the surface layers of skin and remove those fats leaving clean hydrated skin which has a typical slippery feel. In contrast, in hard-water areas, the rinse water contains calcium or magnesium ions that form insoluble salts, potentially leaving a coating of insoluble stearates on", "-30.674389553430956" ], [ "first washed in hot water with laundry detergent then placed in the dryer, and then after the items are completely dry, continue drying for at least 20 minutes longer at high heat. However, this does not eliminate bed bugs in the mattress, bed frame and surrounding environment. Sterilized fabrics from the dryer are thus easily re-infested. Continually treating materials in this fashion is labour-intensive, and in itself does not eliminate the infestation. Hot boxes Placing belongings in a hot box, a device that provides sustained heat at temperatures that kills bedbugs, larvae, and eggs, but that does not damage", "-30.562201694163377" ], [ "is rated at 0.24 kW. Effect on environment Due to the reduction in litter and waste in comparison with paper towels, which cannot be recycled, hand dryers are claimed to be better for the environment. Another study shows that whereas the majority of the environmental impact of a hand dryer occurs during its use, the environmental impact of paper towels is predominantly in the material production and manufacturing stages. It is estimated that hand dryers use 5% less energy than paper towels in the first year, and 20% less over five years. A World Dryer study of 102 hand dryers installed", "-30.542606334085576" ], [ "from the body to the fabric's outer surface where it can evaporate. These fabrics typically are soft, lightweight, and stretchy—in other words, they are perfectly suited for making activewear. Moisture-wicking means that the fabric is absorbent and this can leave a barrier of wet fabric on your skin. Drywicking is the newest variation of moisture wicking. It is a smart two tier fabric that breaks the surface tension of sweat and propels it through the hydrophobic layer into a natural wicking outer layer like cotton where it is assisted by evaporative cooling leaving your skin absolutely dry. Besides the fact", "-30.53173977791448" ], [ "waterproof material barrier while still completely clothed. Underneath this protective barrier is a system of various water jets that utilize different pressure, temperature, and speed settings to massage the body in a noninvasive manner. Dry Water Massage is often utilized with goals of increasing blood circulation, decreasing pain and reducing inflammation by combining the various effects of hydrotherapy, massage therapy, acupressure, thermotherapy, soft tissue massage, and trigger point therapy. \nBefore using any form of Hydro Massage, especially Dry water Hydro Massage, it is important to consult a physician to ensure that no health risks are involved for you.", "-30.383447322034044" ], [ "of modern surfactant mixtures, allows the water to run off the dishes in a dish rack very quickly. However, most people also rinse the dishes with pure water to make sure to get rid of any soap residue that could affect the taste of the food.\nDishwashing liquid can be a skin irritant and cause hand eczema. Those with \"sensitive skin\" are advised amongst other things to persuade someone else to do the washing up. Automatic dishwashing Automatic dishwashing involves the use of a dishwashing machine or other apparatus. It is generally chosen through convenience, sanitation, or personal preference. The cleaning", "-30.313546767865773" ], [ "equipment.\nWashing hands with soap and water eliminates microorganisms from the skin and hands. This provides some protection against transmission of VHF and other diseases. This requires at least cake soap cut into small pieces, soap dishes with openings that allow water to drain away, running water or a bucket kept full with clean water, a bucket for collecting rinse water and a ladle for dipping, if running water is not available, and one-use towels.\nThe handwashing technique that is recommended is to place a piece of soap in the palm of one hand, wash the opposite hand and forearm, rub the", "-30.300459680729546" ], [ "by the University of Westminster Trade Group, London and sponsored by the paper towel industry the European Tissue Symposium, which suggests that use increases the amount of bacteria on the fingertips by about 42%; paper towels reduced the number of bacteria by 50 to 75%, while warm air dryers increased bacteria by 194%. The report found that \"the manufacturer’s claim that the tested JAD [Airblade] is 'the most hygienic hand dryer' is confirmed ... assuming that the term 'hand dryer' refers to electric devices only because its performance in terms of", "-30.261938711293624" ], [ "sweating, will condense against the inside of the dry suit, and the way this condensate is handled by the underwear material will influence the comfort of the diver. If the underwear soaks up this moisture it will feel cold and clammy, particularly if this layer is against the skin. Materials which wick the moisture away from the skin and do not soak up the condensate will be more comfortable. Early thermal undersuits for drysuits were commonly made from wool, as it retains its insulating properties better when wet than most other natural fibres.\nThe fit of the underwear should allow the", "-30.261452219972853" ], [ "Clothes line Comparison with clothes dryer Both clothes lines and clothes dryers serve the same purpose: drying clothes that have been recently washed, or that are wet in general. Here are some advantages and disadvantages of using a clothes line instead of a mechanical dryer: Drying laundry in freezing conditions Laundry may be dried outdoors when the temperature is well below the freezing point. First, the moisture in the laundry items will freeze and the clothing will become stiff. Then the frost on the clothes will sublimate into the air, leaving the items dry. It takes a long time and", "-30.248830581840593" ], [ "accounts for one third of North American consumption. The growth in commercial use of paper towels can be attributed to the migration from folded towels (in public bathrooms, for example) to roll towel dispensers, which reduces the amount of paper towels used by each patron.\nWithin the forest products industry, paper towels are a major part of the \"tissue market\", second only to toilet paper.\nAmericans are, by far, the highest users of paper towels in the home, compared to the people in any other country. Consumption of paper towels and other tissue products is highest in the United States", "-30.220075738587184" ], [ "perception of discomfort. This is usually localized in different parts of the body, and local thermal comfort limits for skin wettedness differ by locations of the body. The extremities are much more sensitive to thermal discomfort from wetness than the trunk of the body. Although local thermal discomfort can be caused from wetness, the thermal comfort of the whole body will not be affected by the wetness of certain parts. Interplay of temperature and humidity Various types of apparent temperature have been developed to combine air temperature and air humidity. \nFor higher temperatures, there are quantitative scales,", "-30.152514112371136" ], [ "an ecologically responsible textile and building material. Wet felting In the wet felting process, hot water is applied to layers of animal hairs, while repeated agitation and compression causes the fibers to hook together or weave together into a single piece of fabric. Wrapping the properly arranged fiber in a sturdy, textured material, such as a bamboo mat or burlap, will speed up the felting process. The felted material may be finished by fulling.\nOnly certain types of fiber can be wet felted successfully. Most types of fleece, such as those taken from the alpaca or the Merino sheep, can be", "-30.074940945312846" ], [ "a fabric drysuit is more adaptable to varying water temperatures because different garments can be layered underneath. However, they are quite bulky and this causes increased drag and swimming effort. Additionally, if a fabric drysuit malfunctions and floods, it loses nearly all of its insulating properties. Neoprene drysuits are comparatively streamlined like wetsuits, but in some cases do not allow garments to be layered underneath and are thus less adaptable to varying temperatures. An advantage of this construction is that even it if floods completely, it essentially becomes a wetsuit and will still provide a degree of insulation.\nSpecial dry suits", "-30.069896128436085" ], [ "going to the restaurant area and at the end of the day. Sitting or lying in a dry sauna or on another dry surface without a towel under oneself is considered a faux-pas. When using the steam room or stone resting beds one will not put a towel under oneself but will clean the surface before and after use with water. \nThere is a strong emphasis on hygiene, showers are expected when entering the facility, before using a relax room, bar or restaurant and any sweating or steam room, pool or bath, and after the use of the restroom.\nThe towels,", "-30.064190141652944" ], [ "Italy towel The Italy towel, also known as the Korean exfoliating mitt, is a mass-produced bath product used to scrub and peel the outermost layer of skin; it was invented in Busan by Kim Pil-gon in 1962. Since then, the Italy towel has become a household item in Korean homes and a staple item in Korean saunas. The Korean exfoliating mitt was named the Italy towel because the viscose fabric used to make it was imported from Italy at the time.", "-29.978394236939494" ], [ "that your body can perform better, it will chemically free prevent odors because a bacteria microclimate cannot grow on dry skin. This broad category of fabrics is used to make garments like T-shirts, sports bras, running and cycling jerseys, socks, tracksuits, and polo-style shirts for any physical activity where the goal is to keep your skin as cool and dry as possible. Moisture-wicking fabrics are used to make apparel for outdoor activities such as hiking, fishing, mountain biking, snow skiing, and mountain climbing. Due to the popularity of garments made from these fabrics, more variations are being introduced to the", "-29.94738581753336" ], [ "the floor or on a solid surface – slats or a box spring provide space for airflow, while solid wood or plywood (as in cheap bunkie boards) does not. Additional ventilation is recommended for natural materials, in which case leaving the mattress \"naked\" after stripping sheets (for example while laundering) is recommended. If a mattress is allowed to become damp, for example by wet cleaning, mildew may develop inside the upholstery; cleaning with a vacuum cleaner or mild surface cleanser and a slightly damp cloth avoids this.\nMattresses absorb fluids and stains readily, notably from nightly sweating (which results in a", "-29.702272872440517" ], [ "Other fabrics are stretched by mechanical forces during production, and can shrink slightly when heated (though to a lesser degree than wool). Some clothes are \"pre-shrunk\" to avoid this problem.\nAnother common problem is color bleeding. For example, washing a red shirt with white underwear can result in pink underwear. Often only similar colors are washed together to avoid this problem, which is lessened by cold water and repeated washings. Sometimes this blending of colors is seen as a selling point, as with madras cloth.\nLaundry symbols are included on many clothes to help consumers avoid these problems.\nSynthetic fibers in laundry can", "-29.670874521838414" ], [ "thermally-insulating material, called \"foamed neoprene\", \"foam-neoprene\" or \"expanded neoprene\". Wetsuits are made from this material as it is a good insulator, waterproof, and is flexible enough for comfortable wear. The neoprene alone is very flexible, but not very resistant to tearing, so it is skinned with a layer of knit fabric bonded to each side for strength and abrasion resistance. Foamed neoprene may be used for the shell of a drysuit, providing some insulation due to the gas within the material, as in a standard wetsuit. If torn or punctured, leading to flooding, a foam-neoprene suit retains the insulation and", "-29.60033270425629" ], [ "be beneficial for constipation and hemorrhoids. The most advanced washlets can mix the water jet with soap for an improved cleaning process.\nThe washlet can replace toilet paper completely, but many users opt to use both wash and paper in combination—although use of paper may be omitted for cleaning of the vulva. Some wipe before washing, some wash before wiping, some wash only, and some wipe only—each according to his/her preference. Another frequent feature is a blow dryer, often adjustable between 40 °C and 60 °C, used to dry the washed areas. Advanced features Other features may include a heated seat, which may", "-29.56313002097886" ], [ "cycle.\nThis allows warm air to contact more surface area on the wet item. Tersano’s Dryer Jack offers its users a new and innovative way to lift and separate fabrics, reduce lint and wrinkles and reduce drying time from 10 to 40%.\n*The Pro3Gram - Ozone Laundry Technology & Detergent Program\nThe Pro3Gram by Tersano delivers cleaner, brighter, fresher and softer laundry for less.\nBy combining our powerful cold water ozone laundry system with our special cold water ozone boosting detergent, you get better results with less or no hot water.", "-29.458573542302474" ], [ "made out of soft muslin.\nHere is an extract from 'The Modern Home Doctor' written by physicians in the UK in 1935.\nNice old, soft bits of good Turkish towelling, properly washed, will make the softest of diaper coverings, inside which specially absorbent napkins (diapers), see below at 1A, soft, light, and easily washed, are contained. These should rarely be soiled once regular habits have been inculcated, especially during the night period in which it is most important to prevent habit formation\n\n1A -(squares of butter muslin or Harrington's packed rolls of \"mutton cloth\" in packets, sold for polishing motor-cars, would do equally", "-29.436290085781366" ], [ "allows more delicate materials like wool and silk that are easily affected when placed into a high-temperature environment. Moreover, lower temperature also avoids fading jeans and denim which are usually dyed with dark colors. Thus there will be less color transfer. Better laundry process for leather manufacture There is another evidence that emphasizes the merits of using laundry enzyme in the leather industry. The traditional procedure was complex. First, animal hides with a mixture of urine and lime were soaked altogether to get rid of unwanted hairs, flesh, and fat. Then, the skins were softened by kneading them in dogs", "-29.428828168311156" ], [ "give them a bath, they must make sure to dry them. Some in shorter clips can blot and air dry, but most will need to be blown dry. Owners can also comb their hair out after bathing so as not to dry in mats. Use high air but low heat to protect their sensitive skin.\nHair that grows on the bottom of their feet between the paw-pads needs trimming to allow traction on smooth floors. If they go out in the snow, ice clumps will stick between their paw pads; just rinse off in warm water or buy booties. \nSome develop", "-29.354407955193892" ], [ "by the body for comfortable warmth while the moisture produced, most likely sweat, is supposed to evaporate. It retains its insulating properties when wet.\nThe thermal resistance R-value provided by Thinsulate products varies by the specific thickness and construction of the fabric. Values (US units) range from 1.6 for 80-gram fabric to 2.9 for 200-gram fabric. Thinsulate is considered \"the warmest thin apparel insulation\" available. In fact, when equal thicknesses are compared, it provides about 1½ times the warmth of down and about twice the warmth of other high-loft insulation materials.\nMaterial safety data sheets from the manufacturer show that different", "-29.331084424171422" ], [ "a hot or cold towel or a plastic-wrapped wet napkin (o-shibori). This is for cleaning hands before eating (and not after). It is rude to use them to wash the face or any part of the body other than the hands, though some Japanese men use their o-shibori to wipe their faces in less formal places. Accept o-shibori with both hands when handed the towel by a server. When finished, fold or roll up the oshibori and place it on the table. It is impolite to use o-shibori towels to wipe any spills on the table. Bowls The rice or", "-29.187500911793904" ], [ "is often left with a \"wet\" look that can be \"crunchy\" feeling, but unlike hair gel, hair mousse combs out easily for a softer look. When hair mousse is applied to wet hair that is dried with a hair dryer, it provides additional volume and hold. Ingredients Typically, the first ingredient in a canister of hair mousse is water, which is the top substance used to blend the varying chemical substances together. iAlcohol, which helps dissolve the ingredients already added to the water as well as help produce a quick breaking foam, as well as a polymer or resin", "-29.137866212724475" ], [ "a hot or cold towel is served depending on the season. As for the dining etiquette, use the provided Oshibori to clean both hands, before starting a meal. It is only used to wipe out hands and therefore it should not be used to wipe face or used for other purposes, as it is considered impolite. Drinking When it comes to drinking alcoholic beverages in Japan, there are several points to keep in mind. The person who first pours the alcoholic drink in the glasses of others, the person should be holding the bottle of the alcoholic drink with both", "-29.052104508853517" ], [ "Fabric softener A fabric softener (or conditioner) is a conditioner that is typically applied to laundry during the rinse cycle in a washing machine. In contrast to laundry detergents, fabric softeners may be regarded as a kind of after-treatment laundry aid. Mechanism of action Machine washing puts great mechanical stress on textiles, particularly natural fibers such as cotton and wool. The fibers at the fabric surface are squashed and frayed, and this condition hardens while drying the laundry in air, giving the laundry a harsh feel. Adding a liquid fabric softener to the final rinse (rinse-cycle softener) results in laundry", "-29.049766973068472" ], [ "most washer-dryer combos get poorer reviews than full-size washers and dryers.\nAnother major drawback of old washer dryers combos was that they took significantly longer to dry a batch of clothes in comparison to stand-alone dryers. Stand-alone dryers make use of hot air or other heating elements to dry the clothes in a fraction of the time that it took the condensation-based drying system in combination units. This was a drawback that was inherent to the washer dryer combo design, since the dryer had to work longer to dry the drum and its enclosure as well as the clothes inside the", "-29.024669299493326" ], [ "that reacts to body heat and weight by 'molding' to the sleeper's body, helping relieve pressure points, preventing pressure sores, etc. Most memory foam has the same basic chemical composition, however the density and layer thickness of the foam makes different mattresses feel very different. A high-density mattress will have better compression ratings over the life of the bedding. A lower-density one will have slightly shorter life due to the compression that takes place after repeated use.\nMemory foam mattresses retain body heat, so can be excessively warm in hot weather. Hazards Emissions from memory foam mattresses may directly cause more", "-28.99442996829748" ], [ "Terrycloth Terrycloth, terry cloth, terry cotton, terry towelling, terry, terry towel or simply towelling is a fabric with loops that can absorb large amounts of water. It can be manufactured by weaving or knitting. Towelling is woven on special looms that have two beams of longitudinal warp through which the filler or weft is fired laterally. The first industrial production of terrycloth towels was initiated by the English manufacturer Christy in 1850. According to the Oxford English Dictionary, the word may derive from French tiré 'drawn', past participle of tirer 'draw out'.", "-28.93679902376607" ], [ "Entering the onsen while still dirty or with traces of soap on the body is socially unacceptable. Swimsuits Bathers are not normally allowed to wear swimsuits in the baths. However, some modern onsen with a water park atmosphere require their guests to wear a swimming suit in their mixed baths. Towels Onsen guests generally bring a small towel with them to use as a wash cloth. The towel can also provide a modicum of modesty when walking between the washing area and the baths. Some onsen allow one to wear the towel into the baths, while others have posted signs", "-28.838634115727473" ], [ "Towel animal A towel animal is a depiction of an animal created by folding small towels. It is conceptually similar to origami, but uses towels rather than paper. Some common towel animals are elephants, snakes, rabbits and swans.\nThe exact originator of towel animals is unknown, but their popularity is often attributed to Carnival Cruise Lines. The ancestors of the towel animals are perhaps handkerchief animals or napkin folds.\nCarnival, Norwegian Cruise Lines, Disney Cruise Line, Royal Caribbean, Disney Hotels and Holland America Line cruises will often place towel animals on a patron's bed as part of their nightly turndown service. Towel", "-28.82759790221462" ], [ "readily and easily cleaned. The use of ceramic or glass, as well as smooth plastic materials, is common in bathrooms for their ease of cleaning. Such surfaces are often cold to the touch, however, and so water-resistant bath mats or even bathroom carpets may be used on the floor to make the room more comfortable. Alternatively, the floor may be heated, possibly by strategically placing resistive electric mats under floor tile or radiant hot water tubing close to the underside of the floor surface. Electricity Electrical appliances, such as lights, heaters, and heated towel rails, generally need to be", "-28.794349396252073" ], [ "showered and received a soap massage. After the massage, the bathers swam in a pool heated approximately to body temperature. After the swim, the bathers rested for 15 to 20 minutes in the warm \"Sprudel\" room pool . This shallow pool's bottom contained an 8-inch (200 mm) layer of sand through with naturally carbonated water bubbled up. This was followed by a series of gradually cooler showers and pools. After that, the attendants rubbed down the bathers with warm towels and then wrapped them in sheets and covered them with blankets to rest for 20 minutes. This ended the bathing portion", "-28.780172656839568" ], [ "wall mount hardware, a suction cup, or non-skid feet). Depositing or retrieving a slippery bar of soap is facilitated by an open (or semi-open) sided design or by a shallow lip. Ventilation A bar of wet soap relies on ventilation to dry. A number of design elements may be used to increase ambient airflow around the soap, including vented surfaces or surfaces interspersed with bumps, ridges, or slats. Mechanical ventilation has not yet become a widespread design element in soap dishes. Cleanliness Because of their association with hand washing and hygiene, soap dishes themselves are often the focus of cleanliness.", "-28.728403726709075" ], [ "used for mixing and thinning paints before application. Non-porous materials, such as a plain ceramic tile, avoid sucking the solvent out of the paint. A wet palette is especially useful with acrylics that dry quickly on a dry palette. A wet palette is a sealable container with a layer of absorbent material (such as tissue paper) that can be soaked with water and a semi-permeable membrane (such as greaseproof paper or baking paper (silicone paper)) over that. The paint sits on the membrane and is kept wet by osmosis. Wet palettes can be bought, but are easily made. Competition Some", "-28.681112580612535" ], [ "is then quickly removed with a metal sieve and set to cool. Many other foods are fried with hot sand, even in common households because it is a healthy, oil-free, cheap way to cook without needing any fancy household appliances such as an air cooker.", "-28.613280793768354" ], [ "its surfactants - compounds known to lower the surface tension between substances, which helps in the emulsification and the washing away of oily dirt. The surfactants of shower gels do not come from saponification, that is by reacting a type of oil or fat with lye. Instead, it uses synthetic detergents for surfactants derived from either plant-based sources or petroleum. This gives the product a lower pH value than soap and might also feel less drying to the skin. Some people have likened the effect to feeling less squeaky clean, however. \nSurfactants can make up as much as 50 percent", "-28.572265877679456" ], [ "hands and the cleaning of spectacles.\nThe importance of the paper tissue on minimising the spread of an infection has been highlighted in light of fears over a swine flu epidemic. In the UK, for example, the Government ran a campaign called \"Catch it, bin it, kill it\", which encouraged people to cover their mouth with a paper tissue when coughing or sneezing. Paper towels Paper towels are the second largest application for tissue paper in the consumer sector. This type of paper has usually a basis weight of 20 to 24 g/m². Normally such paper towels are two-ply. This kind", "-28.56701527409075" ], [ "Paper towel History In 1907, the Scott Paper Company of Philadelphia, Pennsylvania, introduced paper tissues to help prevent the spread of colds from cloth towels in restrooms. Popular belief is that this was partly accidental and was the solution to a railroad car full of long paper rolls meant for toilet paper that were unsuitable to cut into rolls of toilet paper. In 1919, William E. Corbin, Henry Chase, and Harold Titus began experimenting with paper towels in the Research and Development building of the Brown Company in Berlin, New Hampshire. By 1922, Corbin perfected their product and began mass-producing", "-28.560969597368967" ], [ "heat will dissolve more spots and stains, and more vacuum suction power will reduce drying times.\nA common process of hot water extraction begins with preconditioning. Alkaline agents such as ammonia solution for synthetic carpets, or acidic solution (such as vinegar solution) for woollen carpets, are sprayed into the carpet, then agitated with a grooming brush or an automatic scrubbing machine. Next, a pressurized manual or automatic cleaning tool (known as a wand) passes over the surface to rinse out all pre-conditioner, residue, and particulates. If an alkaline detergent is used on a woollen carpet, use of a mild acetic acid", "-28.513776908628643" ], [ "should be washed in the cubicle and dried outside to eliminate contamination from paper or cloth towels. In addition, antiseptic hand-cream, dispensed from a foot-operated wall container would also serve as an additional precaution.", "-28.47734676732216" ], [ "may increase the spread of disease rather than decrease it. Like soap, ash is also a disinfecting agent (alkaline). WHO recommended ash or sand as alternative to soap when soap is not available. Soap and water One must use soap and warm running water if possible and wash all the skin and nails thoroughly. However, ash can substitute for soap (see substances above) and cold water can also be used.\nFirst one should rinse hands with warm water, keeping hands below wrists and forearms, to prevent contaminated water from moving from the hands to the wrists and arms. The warm water", "-28.464010313196923" ], [ "of the shower gel content, with the remaining proportion being made up of a combination of water and ingredients to thicken, preserve, emulsify, add fragrance, and color. Multiple surfactants are often used to achieve desired product qualities. A primary surfactant can provide good foaming ability and cleaning effectiveness, while a secondary surfactant can add qualities of mildness to prevent irritation or over-drying of the skin. To prevent shower gel ingredients from separating, emulsifiers such as diethanolamine are added. Conditioning agents may also be added to moisturize the skin during and after product use. They are also available in different colours", "-28.406234686204698" ], [ "only need to be dried under the sun twice a year to maintain their freshness. If more thorough cleaning is required, a silk comforter should be dry-cleaned, since the silk floss layers are damaged by contact with water.\nThey may have a fairly strong smell to them, attributed to the remaining pupa. There is some difference of opinion about how easy it is to get rid of the smell. Cost in China In November 2017, at a large government silk products store in Shanghai, the cost for a 100% silk queen-sized 2 kg silk quilt (duvet, comforter) had the 'fixed", "-28.402621271059616" ], [ "the latter, the ability to be washed.\nWaterproof mattress protectors keep the mattress clean by securing it from absorbing body excretions (such as sweat) or other liquids resulting from spills. These can take the form of flat rubberized flannel pads (commonly used under a bedsheet for infants) or special breathable fitted covers. The plastic pads are hot to sleep on and change the feel of the mattress. A urethane laminate on cotton that has good wicking properties is an alternative to a rubberized flannel pad. A protector with a thin laminate that is not pulled too tightly across the bed", "-28.380343106742657" ], [ "Wet strength The wet strength of paper and paperboard is a measure of how well the web of fibers holding the paper together can resist a force of rupture when the paper is wet. Wet strength is routinely expressed as the ratio of wet to dry tensile force at break. \nWith combined board such as corrugated fiberboard or with laminations, wet strength also includes the ability to stay intact under humid or wet conditions. Wet strength adhesives are often needed. Mechanism The cellulose fibreweb of paper is mainly held together by hydrogen bonds. These are dependent on", "-28.379394570016302" ], [ "wet room are becoming very popular, especially due to improvements in waterproofing systems and prefabricated components. Places such as a swimming pool, a locker room, or a military facility have multiple showers. There may be communal shower rooms without divisions, or shower stalls (typically open at the top). Many types of showers are available, including complete shower units which are all encompassing showers that include the pan, walls, and often the shower head, as well as pieced together units in which the pan, shower head, and doors are purchased separately. Each type of shower poses different installation issues. Installation Though", "-28.331446834941744" ], [ "usually operate from household current and must have protection against overheating.\nA moist heating pad is used dry on the user's skin. These pads register temperatures from 76 to 82 °C (169 to 180 °F) and are intended for deep tissue treatment and can be dangerous if left on unattended. Moist heating pads are used mainly by physical therapists but can be found for home use. A moist cloth can be added with a stupe cover to add more moisture to the treatment.\nAn electric heating pouch is similar in form to an electric heating pad, but is curved to wrap around a joint.", "-28.314004463321908" ], [ "cover the genitals with a modesty towel when using oil since the towel can absorb the protective oil, lessening its effectiveness. Application of egg oil for a few days post waxing can help moisturise the skin and reduce inflammation, pain or growth of bacteria.\nSugaring is an alternative to waxing. It is claimed to be less painful during application and less irritating to sensitive areas such as the scrotum. The application technique differs from waxing in that hair is pulled out in the same direction as the hair's growth. Benefits There are benefits to waxing compared to other forms of hair", "-28.293547394598136" ], [ "(68% vs 14%). On the whole they also considered paper towels to be the most hygienic form of hand drying in public washrooms (53% vs 44%). History The earliest hand dryer was patented in 1921 by R.B. Hibbard, D. J. Watrous and J.G. Bassett for the Airdry Corporation of Groton New York. This machine was sold as a built in model or freestanding floor unit that consisted of an inverted blower (much like a handheld blow dryer) that was controlled by a floor pedal. Known as \"Airdry The Electric Towel\", these units were used in restrooms, barbershops and factories.", "-28.29048901909846" ], [ "sizing and soaps; further, wool can absorb three times its volume in water and requires a bit of humidity to remain viable.\nSilk, another protein-rich fiber, is the most problematic of textiles. Often “weighted” with metallic salts to produce a nicer drape in clothing, silks (especially black silks and silks used in trimmings) rarely hold up to washing and repeated handling. Unlike other proteins, silk is not flame retardant. It quickly becomes brittle when kept in hot, dry conditions, and is highly susceptible to rot when in warm, humid climes. Compound textiles Cellulose fibers, like", "-28.251034061715472" ], [ "allow for the rapid transport of moisture from the skin surface to outer layers to minimize conductive heat loss.", "-28.24648928726674" ], [ "are responsible for most of the cleaning performance in laundry detergent. They provide this by absorption and emulsification of soil into the water and also by reducing the water's surface tension to improve wetting.\nLaundry detergents contain mostly anionic and non-ionic surfactants. Cationic surfactants are normally incompatible with anionic detergents and have poor cleaning efficiency; they are employed only for certain special effects, as fabric softeners, antistatic agents, and biocides. Zwitterionic surfactants are rarely employed in laundry detergents mainly for cost reasons. Most detergents use a combination of various surfactants to balance their performance.\nUntil the 1950s, soap was the predominant surfactant", "-28.15648672034149" ], [ "Environmental protection Protection from heat loss in cold water is usually provided by wetsuits or dry suits. These also provide protection from sunburn, abrasion and stings from some marine organisms. Where thermal insulation is not important, lycra suits/diving skins may be sufficient.\nA wetsuit is a garment, usually made of foamed neoprene, which provides thermal insulation, abrasion resistance and buoyancy. The insulation properties depend on bubbles of gas enclosed within the material, which reduce its ability to conduct heat. The bubbles also give the wetsuit a low density, providing buoyancy in water. Suits range from a thin (2 mm or less) \"shortie\",", "-28.115987619094085" ], [ "or keep joints flexed.\nTo stay warm in a membrane suit, the wearer must wear an insulating undersuit, today typically made with polyester or other synthetic fiber batting. Polyester and other synthetics are preferred over natural materials, since synthetic materials have better insulating properties when damp or wet from sweat, seepage, or a leak.\nReasonable care must be taken not to puncture or tear membrane dry suits, because buoyancy and insulation depend entirely on the air space in the undersuit, (whereas a wetsuit normally allows water to enter, and retains its insulation despite it). The dry suit material offers essentially no buoyancy", "-28.111631708510686" ], [ "produced \"sticky\" yoga mats were made from PVC; they have a smooth surface, and tend to be cheaper. More recently, some supposedly \"eco-friendly\" mats are being made from natural jute, organic cotton, and rubber. PVC mats are the spongiest, resulting in more \"give\" when stepped on; fibre mats such as cotton and jute are the firmest. Jute mats are the roughest; \"sticky\" PVC mats give good grip, but some of the modern textured mats in other materials also grip well.\nYoga Journal asked five yoga professionals for their views on yoga mats. They varied widely in their brand preferences, some choosing", "-28.106229438853916" ], [ "Dryrobe History dryrobe was first released in 2010. The product was the brainchild of Gideon Bright, who had frequently struggled to keep warm while changing into surfing gear in the United Kingdom. He decided to develop outdoor changing robes that would keep amateur and professional athletes warm in cold conditions.\nAs a young surfer, Bright's mother used to use a towelling robe for changing on the beach. However, he and his mother noticed that when it rained or when it was cold, the robe didn't really serve much of a purpose. His mother then created an additional layer made of a", "-28.10020978061948" ], [ "Currently available washer-dryers are able to wash 11 kilograms (24 lb) and dry 7 kilograms (15 lb) (nominal rating); they are fully comparable to standard washing machines and tumble dryers. Since washing 11 kg of clothes is quite uncommon for ordinary customers, one can wash&dry even large loads with satisfactory performances. Nevertheless, many users say they take out some wet laundry and dry their clothes in two batches to speed drying time. User review sites such as Epinions.com are full of owners who say drying times are long (even if comparable to standard heat pump tumble dryers), and this is one reason why", "-28.07176655359217" ], [ "the body and the negative pressure \"sucks\" the skin up. Massage oil may be applied to create a better seal as well as allow the cups to glide over muscle groups (e.g. trapezius, erectors, latissimus dorsi, etc.) in an act called \"gliding cupping\" or \"sliding cupping\". Dark circles may appear where the cups were placed because of capillary rupture just under the skin. There are documented cases of burns caused by fire cupping. Wet cupping Wet cupping is also known as Hijama (Arabic: حجامة‎ lit. \"sucking\") or medicinal bleeding, where blood is drawn by local suction from a small", "-28.026477903244086" ], [ "occasions of social interactions, such as in public, Turkish, banya, sauna or whirlpool baths. Sponge bath When water is in short supply or a person is not fit to have a standing bath, a wet cloth or sponge can be used, or the person can wash by splashing water over their body. A sponge bath is usually conducted in hospitals, which involves one person washing another with a sponge, while the person being washed remains lying in bed. Ladling water from a container This method involves using a small container to scoop water out of a large container and pour", "-28.017212444881807" ], [ "more powder than is necessary, and that these powders contain unnecessary fillers or fragrances. Given that Americans tend to use excessive amounts of laundry detergent, using a ball and less laundry detergent could result in cleaner clothing.\nThe effect of the laundry balls may be explained by simple mechanical action and by the usage of hotter water. Some manufacturers claim that their products reduce energy consumption, but their pamphlets recommend using hot water. Hot water will clean some types of spots better than cold water, leading some people to conclude that the balls worked. The mechanical action of the laundry", "-28.008021904061025" ], [ "A washed textile no longer has coating or ink residues and will, therefore, have a better feel. Moreover, it will be less prone to stains and it will last longer. However, digital textile printing fabric will fade out with repeated washings, so it should be labeled as dry cleaning only, and the best way is washing by hand with cold water or using washing machine with gentle cycle and use mild detergent.\nAn alternative which does not require expensive equipment and dyes is Inkjet Fabric Printing which uses a standard inkjet printer (e.g. HP, Epson, Canon, Lexmark) and specially treated, paper-backed", "-27.988723370886873" ], [ "prevent the build-up of electrostatic charges on synthetic fibers, which in turn eliminates fabric cling during handling and wearing, crackling noises, and dust attraction. Also, fabric softeners make fabrics easier to iron and help reduce wrinkles in garments. In addition, they reduce drying times so that energy is saved when softened laundry is tumble-dried. Last but not least, they can also impart a pleasant fragrance to the laundry. Fabric softeners Early cotton softeners were typically based on a water emulsion of soap and olive oil, corn oil, or tallow oil. Softening compounds differ in affinity to various fabrics. Some ", "-27.951828358272905" ], [ "ions.\nBecause soft water has few calcium ions, there is no inhibition of the lathering action of soaps and no soap scum is formed in normal washing. Similarly, soft water produces no calcium deposits in water heating systems. Water that isn't soft is referred to as hard water.\nIn the UK, water is regarded as soft if the hardness is less than 50 mg/l of calcium carbonate. Water containing more than 50 mg/l of calcium carbonate is termed hard water. In the United States soft water is classified as having less than 60 mg/l of calcium carbonate.\nIn the USA, due to ancient", "-27.950686620897613" ], [ "situations, sportswear should help the wearer to stay warm.\nSportswear should also be able to transfer sweat away from the skin, using, for example, moisture transferring fabric. Spandex is a popular material used as base layers to soak up sweat. For example, in activities such as skiing and mountain climbing this is achieved by using layering: moisture transferring (wicking) materials are worn next to the skin, followed by an insulating layer, and then wind and water resistant shell garments. Moisture-wicking fabrics Moisture-wicking fabrics are a class of hi-tech fabrics that provide moisture control for an athlete's skin. They move perspiration away", "-27.945582125452347" ], [ "reducing effectiveness at depth, and the insulating neoprene can only be made to a certain thickness before it becomes impractical to don and wear. The thickest commercially available wetsuits are usually 10 mm thick. Other common thicknesses are 7 mm, 5 mm, 3 mm, and 1 mm. A 1 mm suit provides very little warmth and is usually considered a dive skin, rather than a wetsuit. Wetsuits can be made using more than one thickness of neoprene, to put the most thickness where it will be most effective in keeping the diver warm. A similar effect can be achieved by layering wetsuits of different coverage. Some", "-27.931888329796493" ], [ "Wrapping tissue Wrapping tissue is a translucent, thin tissue paper used for wrapping and cushioning items.\nWrapping tissue is usually found in single sheets or sheet collections of 25, 40, or 50. White tissue is also sold specifically for bulk wrapping in reams of 480 sheets.\nSome shops wrap delicate merchandise in folded or crumpled layers of tissue paper to protect it before placing it in bags or boxes for the purchaser. \nColored wrapping tissue can be used for an assortment of visually creative purposes. For example, when wet, the color bleeds a watercolor-like layer of tissue paper that stays when", "-27.93041903717676" ], [ "of waste generated from paper towels. Hand dryers and taps are sometimes installed with motion-sensors as an additional resource-saving measure. Cultural aspects In Japan, cleanliness is very important, and some Japanese words for 'clean' can be used to describe beauty. The word kirei (きれい, 綺麗) can be defined as \"pretty, beautiful; clean; pure; orderly.\" This may explain the success of the high-tech toilet with a built-in bidet. There is also a large market for deodorants and air fresheners that add a pleasant scent to the area.\nIn the often crowded living conditions of Japanese cities and with the lack of rooms", "-27.913051722513046" ], [ "that the color and texture of the original material can be matched as closely as possible. In some cases, shells or pebbles were used in the stucco covering. Regionally sourced sand, for example, may have been used in the original application, but may no longer be readily available. In this way, stucco tended to be tinted directly, although sometimes it was painted after being applied. Additionally, the use of ingredients such as animal hair was popular in some regions. Care should be taken that repairs made include similar ingredients that are clean and free of oils. This is another reason", "-27.829656801986857" ], [ "Wet-on-wet Technique Traditionally, a new layer of oil-based paint is applied to most parts of a painting only after allowing a previous layer to dry completely; this drying process can take from several days to several weeks, depending on the thickness of the paint. In contrast, work performed using \"alla prima\" can be carried out in one or more sessions (depending on the types of paint used and their respective drying times), and it is common for such a work to be finished in only one session or \"sitting\".\nIn the medium of watercolors, wet-on-wet painting requires a certain finesse in", "-27.828995349482284" ], [ "conditioning (moisturizing) product that will restore the natural oils back into the leather. Saddle soap is used with only a minimal amount of water and suds or lather kept low, as getting the leather too wet may lead to a number of problems. In a dry climate, wet leather may dehydrate and crack, particularly if subjected to repeated wet-dry stresses. In a humid climate, excess water for cleaning creates an environment for rot and mold.\nOnce a saddle is clean, a conditioner is used to restore moisture removed by the cleaning process. While glycerine-based saddle soaps have", "-27.825878834715695" ], [ "demand for fresh clean water as well as the wastewater subsystems by reducing the amount of wastewater required to be conveyed and treated. Treated greywater has many uses, for example toilet flushing or irrigation. Quality Greywater usually contains some traces of excreta and is therefore not free of pathogens. The excreta comes from washing a person's anal area in the bath and shower, or from the laundry (washing underwear and nappies). The quality of greywater can deteriorate rapidly during storage because it often is warm and contains some nutrients and organic matter (e.g. dead skin cells), as well as pathogens.", "-27.75696242309641" ], [ "hair is washed as part of a shower or bathing with shampoo, a specialized surfactant. Shampoos work by applying water and shampoo to the hair. The shampoo breaks the surface tension of the water, allowing the hair to become soaked. This is known as the wetting action. The wetting action is caused by the head of the shampoo molecule attracting the water to the hair shaft. Conversely, the tail of the shampoo molecule is attracted to the grease, dirt and oil on the hair shaft. The physical action of shampooing makes the grease and dirt become an", "-27.746202920592623" ], [ "straight into the wash. After washing it is recommended that the pads are dried in a hygienic area under direct sunlight. Sunlight acts as a disinfectant and prevents microbial growth, which may happen if the pads are not completely dry. \nWhen changing cloth menstrual pads away from home, some women place the soiled pads into a waterproof or Ziploc bag to keep them from drying out and to contain or prevent odor and then wash the pads when convenient.\nStains sometimes occur. Some women prefer darker colored fabrics which do not show stains as much as light colored fabrics do. Causes", "-27.74063095904421" ], [ "paper (e.g. tea- and coffee-bags). Care procedures Avoid dry cleaning Olefin as many dry-cleaning solvents can swell the fibers. Since Olefin dries quickly, line drying and low tumble drying with little or no heat is the recommended method of drying. Since Olefin is not absorbent, waterborne stains do not present a problem. However, oily stains are difficult to remove. Most such stains can be removed with lukewarm water and detergent, but bleach can also be used. Olefin fiber has a low melting point (around 225 to 335 °F, depending on the polymer's grade) so items should be ironed at a very", "-27.717744201538153" ], [ "when the skin is completely wet. The body continuously loses water by evaporation but the most significant amount of heat loss occurs during periods of increased physical activity. Evaporative cooling Evaporative cooling happens when water vapor is added to the surrounding air. The energy needed to evaporate the water is taken from the air in the form of sensible heat and converted into latent heat, while the air remains at a constant enthalpy. Latent heat describes the amount of heat that is needed to evaporate the liquid; this heat comes from the liquid itself and the surrounding gas and surfaces.", "-27.708396241621813" ], [ "prevent localised ischemia or frostbite to the skin, it is recommended that the ice be placed within a towel or other insulating material before wrapping around the area.\nExceeding the recommended time for ice application may be detrimental, as it has been shown to delay healing. Compression Compression aims to reduce the edematous swelling that results from the inflammatory process. Although some swelling is inevitable, too much swelling results in significant loss of function, excessive pain and eventual slowing of blood flow through vessel restriction.\nAn elastic bandage, rather than a firm plastic bandage (such as zinc-oxide tape) is required. Usage of", "-27.664060702139977" ], [ "Laundry Modern homes in Japan will have a small washing machine, but most will not have a clothes dryer as most Japanese hang dry clothes in the balcony or in the bathroom that is heated. Laundromats are found throughout Japan. Many small apartments don't have room to place a washing machine and/or dryer. Likewise, even for homes with washing machines, only a small percentage have dryers. As such, during rainy season, or on days when it rains and they wash clothes, many people take their clothes to the laundromat to wash and/or dry their clothes. Washitsu Many homes include", "-27.66076264405274" ] ]
69kf00
How much do we sweat during and after taking a hot shower/bath? How clean are we really once we step out?
[ "This isn't really a good ELI5 type question because the answer depends on a lot of different stuff. How clean you are completely depends on what kinds of dirt were on you before you got in the shower, what you used for cleansers, and how well you rinsed off. You do sweat some in the shower but it's just slightly saltier water that gets washed away with everything else. But if you had a really hot and long shower that raised your body temperature and you're stepping out into a hot room, you'll continue to sweat some as you exit the shower, at least until your body cools down.", "Sweat is actually pretty clean you know, it's the bacteria that makes it icky and stinky. You're probably pretty clean assuming you used soap and water.", "provided you wash yourself in said bath, perfectly clean. sweat does not filth make." ]
[ [ "for the active secretion of sweat. Whole-body sweat losses in men can exceed 2 L/h during competitive sport, with rates of 3–4 L/h observed during short-duration, high-intensity exercise in the heat. When such large amounts of water are being lost through perspiration, electrolytes, especially sodium, are also being lost.\nIn most athletes, exercising and sweating for 4–5 hours with a sweat sodium concentration of less than 50 mmol/L, the total sodium lost is less than 10% of total body stores (total stores are approximately 2,500 mmol, or 58 g for a 70-kg person). These losses appear to be well tolerated by most people.", "-26.569781186961336" ], [ "73% lower). People doing heavy exercise may lose two and half times as much fluid in sweat as urine. This can have profound physiological effects. Cycling for 2 hours in the heat (35 °C) with minimal fluid intake causes body mass decline by 3 to 5%, blood volume likewise by 3 to 6%, body temperature to rise constantly, and in comparison with proper fluid intake, higher heart rates, lower stroke volumes and cardiac outputs, reduced skin blood flow, and higher systemic vascular resistance. These effects are largely eliminated by replacing 50 to 80% of the fluid lost in sweat. Brain At", "-26.335736024091602" ], [ "skin after water contact. Paradoxically, hot baths or showers help many patients, possibly because heat causes mast cells in the skin to release their supply of histamine and to remain depleted for up to 24 hours afterward.\nH1 and H2 blockers, such as loratadine, doxepin, or cimetidine, have historically been the first line of pharmacological treatment, but not all sufferers find relief with these medications. When antihistamines do work, loratadine seems to be the most effective for mild cases and doxepin most effective for more severe cases.\nNaltrexone, hydrocortisone, or propranolol may relieve itching for some people.\nSertraline or other Selective serotonin reuptake", "-26.186959672777448" ], [ "Sweat Sweat glands are used to regulate temperature and remove waste by secreting water, sodium salts, and nitrogenous waste (such as urea) onto the skin surface. The main electrolytes of sweat are sodium and chloride, though the amount is small enough to make sweat hypotonic at the skin surface. Eccrine sweat is clear, odorless, and is composed of 98–99% water; it also contains NaCl, fatty acids, lactic acid, citric acid, ascorbic acid, urea, and uric acid. Its pH ranges from 4 to 6.8. On the other hand, the apocrine sweat has a pH of 6 to 7.5; it contains water,", "-26.16534359427169" ], [ "wash can bring relief as can keeping the skin chilled such as through a cold shower or iced cloths. \nIn the majority of cases, PUPPP resolves spontaneously within a week of delivery. However, a few women continue to experience symptoms long into the postpartum period.", "-25.949393638642505" ], [ "the environment\". Some of the underlying medical conditions and infections that cause these severe night sweats can be life-threatening and should promptly be investigated by a medical practitioner. Mechanism Sweating allows the body to regulate its temperature. Sweating is controlled from a center in the preoptic and anterior regions of the brain's hypothalamus, where thermosensitive neurons are located. The heat-regulatory function of the hypothalamus is also affected by inputs from temperature receptors in the skin. High skin temperature reduces the hypothalamic set point for sweating and increases the gain of the hypothalamic feedback system in response to variations in core", "-25.50998195837019" ], [ "eccrine sweat glands, the sweat is originally produced in the gland's coil, where it is isotonic with the blood plasma there. When the rate of sweating is low, salt is conserved and reabsorbed by the gland's duct; high sweat rates, on the other hand, lead to less salt reabsorption and allow more water to evaporate on the skin (via osmosis) to increase evaporative cooling.\nSecretion of sweat occurs when the myoepithelial cell cells surrounding the secretory glands contract. Eccrine sweat increases the rate of bacterial growth and volatilizes the odor compounds of apocrine sweat, strengthening the latter's acrid smell.\nNormally, only a", "-25.47561234474415" ], [ "(104 °F) is a life-threatening medical emergency that requires immediate treatment. Common symptoms include headache, confusion, and fatigue. If sweating has resulted in dehydration, then the affected person may have dry, red skin.\nIn a medical setting, mild hyperthermia is commonly called heat exhaustion or heat prostration; severe hyperthermia is called heat stroke. Heat stroke may come on suddenly, but it usually follows the untreated milder stages. Treatment involves cooling and rehydrating the body; fever-reducing drugs are useless for this condition. This may be done through moving out of direct sunlight to a cooler and shaded environment,", "-25.454386255820282" ], [ "induced sweating is restricted to palms, soles, armpits, and sometimes the forehead, while physical heat-induced sweating occurs throughout the body.\nPeople have an average of two to four million sweat glands. But how much sweat is released by each gland is determined by many factors, including gender, genetics, environmental conditions, age or fitness level. Two of the major contributors to sweat rate are an individual's fitness level and weight. If an individual weighs more, sweat rate is likely to increase because the body must exert more energy to function and there is more body mass to cool down. On the", "-25.26478983531706" ], [ "ranging from 100 to 8,000 mL/day. The solute loss can be as much as 350 mmol/d (or 90 mmol/d acclimatised) of sodium under the most extreme conditions. During average intensity exercise, sweat losses can average up to 2 litres of water/hour. In a cool climate and in the absence of exercise, sodium loss can be very low (less than 5 mmol/d). Sodium concentration in sweat is 30-65 mmol/l, depending on the degree of acclimatisation. Composition Sweat is mostly water. A microfluidic model of the eccrine sweat gland provides details on what solutes partition into sweat, their mechanisms of partitioning, and their fluidic", "-25.064060963472002" ], [ "the body's primary mechanism for healing damaged tissue.\nOne study showed that fluctuations in intramuscular temperature were lower than those caused by a hot bath alone.\nOther studies indicate that thermal stress seems to positively influence the immune system.\nA pair of studies published in 1994 and 1997 by William Myer and colleagues at Brigham Young University investigated this claim using needle-mounted thermometers placed just under the skin and 1 cm deep into the calf muscle. In both studies the subjects underwent a 20-minute contrast routine, starting with heat and alternating with cold every four minutes. The 1994 study used two whirlpool baths,", "-24.588976504041057" ], [ "increases histamine degradation and removal.\nRefraining from taking hot baths or showers may help if the condition is generalized (i.e. all over), as well as possibly for localized cases (i.e. in a specific area). If taking hot showers helps, it may be a condition called shower eczema. If it affects mainly the head, it may be psoriasis. In rare cases, allergy tests may uncover substances the patient is allergic to.\nWhile cromoglycate, which prevents histamine from being released from mast cells, is used topically in rhinitis and asthma, it is not effective orally for treating chronic urticaria.", "-24.509496295824647" ], [ "along with showering. Hyperhidrosis In some people, the body's mechanism for cooling itself is overactive—so overactive that they may sweat four or five times more than is typical. Millions of people are affected by this condition, but more than half never receive treatment due to embarrassment or lack of awareness. While it most commonly affects the armpits, feet, and hands, it is possible for someone to experience this condition over their whole body. The face is another common area for hyperhidrosis to be an issue. Sweating uncontrollably is not always expected and may be embarrassing to sufferers of the condition.", "-24.169925810827408" ], [ "sweat from reaching the surface of the skin. The blockage of a large number of sweat glands reduces the amount of sweat produced in the underarms, though this may vary from person to person. Methenamine in the form of cream and spray is successfully used for treatment of excessive sweating and related to it odour. Antiperspirants are usually better applied before bed. Formats Deodorants and antiperspirants come in many forms. What is commonly used varies in different countries. In Europe, aerosol sprays are popular, as are cream and roll-on forms. In North America, solid or gel forms are dominant. Health", "-23.715912757004844" ], [ "can confirm the diagnosis, but this is rarely needed.\nSome patients with excessive sweating present the so-called corynebacterial triad, that is, the simultaneous presence of trichobacteriosis axillaris, erythrasma, and pitted keratolysis. Treatment No specific therapeutic studies on trichobacteriosis are available.\nMany authors consider that the most effective treatment consist in shaving of the affected area for a period of 2-3 weeks. The use of a concomitant treatment, such as sulfur soaps or benzoyl peroxide is also recommended. Rubbing whilst washing may help to disrupt the biofilm, hence increasing the accessibility of antiseptics to the bacteria.\nPatients who shave the affected area only once", "-23.621191409241874" ], [ "had to work very much and very hard\n\nThe sweat was running down my skin\n\nI'd like to escape death nonetheless\n\nBut here I won't have any luck", "-23.595206518424675" ], [ "extended-release dosage forms are used. The long-term use of niacin at high doses (2 grams/day) also significantly increases the risk of cerebral hemorrhage, ischemic stroke, gastrointestinal ulceration and bleeding, diabetes, dyspepsia, and diarrhea. Facial flushing Flushing usually lasts for about 15 to 30 minutes, though it can sometimes last up to two hours. It is sometimes accompanied by a prickly or itching sensation, in particular, in areas covered by clothing. Flushing can be blocked by taking 300 mg of aspirin half an hour before taking niacin, by taking one tablet of ibuprofen per day or by co-administering the prostaglandin receptor antagonist laropiprant.", "-23.553939038014505" ], [ "article that cause severe salt-wasting nephropathy. Skin Fluid loss also can occur from the skin. In a hot and dry climate, skin fluid losses can be as high as 1 to 2 liters/hour. Patients with a skin barrier interrupted by burns or other skin lesions also can experience large fluid losses that lead to hypovolemic shock. Third-spaceing Sequestration of fluid into a third-space also can lead to volume loss and hypovolemic shock. Third-spacing of fluid can occur in intestinal obstruction, pancreatitis, obstruction of a major venous system, vascular endothelium or any other pathological condition that results in a massive inflammatory", "-23.545052255503833" ], [ "Hypohidrotic ectodermal dysplasia Presentation Most people with hypohidrotic ectodermal dysplasia have a reduced ability to sweat (hypohidrosis) because they have fewer sweat glands than normal or their sweat glands do not function properly. Sweating is a major way that the body controls its temperature; as sweat evaporates from the skin, it cools the body. An inability to sweat can lead to a dangerously high body temperature (hyperthermia) particularly in hot weather. In some cases, hyperthermia can cause life-threatening medical problems.\nAffected individuals tend to have sparse scalp and body hair (hypotrichosis). The hair is often light-coloured, brittle, and slow-growing. This condition", "-23.50090348138474" ], [ "Sweating sickness Signs and symptoms John Caius was a practicing physician in Shrewsbury in 1551, when an outbreak occurred, and he described the symptoms and signs of the disease in A Boke or Counseill Against the Disease Commonly Called the Sweate, or Sweatyng Sicknesse (1552), which is the main historical source of knowledge of the disease. It began very suddenly with a sense of apprehension, followed by cold shivers (sometimes very violent), giddiness, headache, and severe pains in the neck, shoulders, and limbs, with great exhaustion. The cold stage might last from half an hour to three hours, after which", "-23.34443068035762" ], [ "Sweating is induced by pilocarpine iontophoresis. At the test site, an electrode is placed over gauze containing pilocarpine and electrolyte solution that will not interfere with the sodium and chloride measurement. A second electrode (without pilocarpine) will be placed at another site and a mild electric current will draw the pilocarpine into the skin where it stimulates the sweat glands.\nThe test site is carefully cleaned and dried, then a piece of preweighed filter paper is placed over the test site and covered with parafilm to prevent evaporation. Specialized collection devices may also be used. Sweat is collected for 30 minutes.", "-23.201939227437833" ], [ "bath treatments.\nA 2013 study with 18 children (6 months of age and older), showed positive responses using a sodium hypochlorite-formulated body wash called CLn BodyWash to treat atopic dermatitis. The study used an Investigator Global Assessment (IGA) score and measured the body surface area affected by the dermatitis. Patients saw an overall IGA improvement with a mean reduction of 14.8% in affected body surface area. A 2014 study led by Dr. Adelaide Herbert showed a decrease in severity scores of 23-35% within 2 weeks and 35-45% reduction in severity scores after 6 weeks using this same wash.", "-23.174467802629806" ], [ "$4.00 to $8.00 each were often bought (or traded for equivalent valued items) from Indians encountered on the way. A thin fold-up mattress, blankets, buffalo robes, pillows, canvas or rubber gutta percha ground covers were used for sleeping (usually on the ground) at night. About 25 pounds (11 kg) of soap was recommended for a party of four for washing, bathing and washing clothes. A washboard and tub was also usually included to aid in washing clothes. Wash days typically occurred once or twice a month or less, depending on availability of good grass, water, fuel and time. Shaving was usually", "-23.129858073734795" ], [ "certain number of sweat glands are actively producing sweat. When stimuli call for more sweating, more sweat glands are activated, with each then producing more sweat. Thermal Both eccrine and apocrine sweat glands participate in thermal (thermoregulatory) sweating, which is directly controlled by the hypothalamus. Thermal sweating is stimulated by a combination of internal body temperature and mean skin temperature. In eccrine sweat glands, stimulation occurs via activation by acetylcholine, which binds to the gland's muscarinic receptors. Emotional Emotional sweating is stimulated by stress, anxiety, fear, and pain; it is independent of ambient temperature. Acetylcholine acts on the eccrine glands", "-23.089609284710605" ], [ "during this period varied greatly. By the 16th century, physicians at Karlsbad, Bohemia, prescribed that the mineral water be taken internally as well as externally. Patients periodically bathed in warm water for up to 10 or 11 hours while drinking glasses of mineral water. The first bath session occurred in the morning, the second in the afternoon. This treatment lasted several days until skin pustules formed and broke resulting in the draining of \"poisons\" considered to be the source of the disease. Then followed another series of shorter, hotter baths to wash the infection away and close the eruptions.\nIn the", "-23.073618370573968" ], [ "Perspiration Signs and symptoms Sweat contributes to body odor when it is metabolized by bacteria on the skin. Medications that are used for other treatments and diet also affect odor. Some medical conditions, such as kidney failure and diabetic ketoacidosis, can also affect sweat odor. Areas that produce excessive sweat usually appear pink or white, but, in severe cases, may appear cracked, scaly, and soft. Pathological sweating Diaphoresis may be associated with some abnormal conditions, such as hyperthyroidism and shock. If it is accompanied by unexplained weight loss or fever or by palpitations, shortness of breath, or chest discomfort, it", "-23.002397260977887" ], [ "evaporation of the sweat. Sunlight, water and air play an important role in keeping the skin healthy. Oily skin Oily skin is caused by over-active sebaceous glands, that produce a substance called sebum, a naturally healthy skin lubricant. A high glycemic-index diet and dairy products (except for cheese) consumption increase IGF-1 generation which in turn increases sebum production. Overwashing the skin does not cause sebum overproduction but may cause dryness.\nWhen the skin produces excessive sebum, it becomes heavy and thick in texture. Oily skin is typified by shininess, blemishes and pimples. The oily-skin type is not necessarily bad,", "-22.932262101850938" ], [ "testing are provided by PharmChem and AlcoPro, respectively.\nMore recently, several startup companies such as Xsensio or Eccrine Systems have begun developing products targeted towards the consumer, healthcare and athletics market for sweat diagnostics. Ultimately, it is the hope that these devices will have the ability to detect changes in human physiology within minutes without the need for repeated sample collection and analysis. Temporary tattoos Temporary tattoo-based sweat diagnostic tools have been demonstrated by Dr. Joseph Wang's group from University of California, San Diego. Their work includes sweat diagnostics for sodium, lactate, ammonium, pH and biofuel opportunities.", "-22.84035816823598" ], [ "sweat glands and prolong the duration of illness. Other agents have been investigated including supplemental vitamin A and C and vitamin A based medications, but it is worth noting that there is little scientific evidence supporting any of the above treatments in reducing the duration of symptoms or frequency of complications.\nIn most tropical areas the local dispensaries sell prickly heat powder, a talc admixture containing drying milk proteins (Labilin) and Triclosan to fight the infection. These include cooling menthol to help alleviate difficulty getting to sleep. This is an effective treatment—the powder stays on the skin longer and treats bacteria", "-22.83049761154689" ], [ "Hypohidrosis Diagnosis Sweat is readily visualized by a topical indicator such as iodinated starch (Minor test) or sodium alizarin sulphonate, both of which undergo a dramatic colour change when moistened by sweat. A thermoregulatory sweat test can evaluate the body’s response to a thermal stimulus by inducing sweating through a hot box ⁄ room, thermal blanket or exercise. Failure of the topical indicator to undergo a colour change during thermoregulatory sweat testing indicates hypohidrosis, and further tests may be required to localize the lesion.\nMagnetic resonance imaging of the brain and ⁄ or spinal cord is the best modality for evaluation", "-22.822948123633978" ], [ "mouth during this stage, and patients may develop a fear of eating. Weight loss and dehydration due to decreased oral intake and vomiting are possible. Compensatory exposure to hot water, even for hours at a time, may be attempted for symptomatic relief, resulting in compulsive bathing/showering. People have described the hot water relief as \"temperature-dependent,\" meaning that hotter temperatures provide greater relief. It is during this phase that people with cannabinoid hyperemesis syndrome are likely to present to the emergency department of the hospital for treatment.\nThe recovery phase begins after the patient abstains from cannabinoids, and can last days to", "-22.813975465775002" ], [ "thermal baths. The water contains sulfur at a concentration of 4.7%, which may have a therapeutic effect on skin diseases, asthma, rheumatism and wrist pain, as well as renew skin cells.", "-22.802648740063887" ], [ "washings in customer-treated items and up to 70 washings for factory-treated items. Permethrin should not be used on human skin, underwear or cats.\nThe EPA recommends several tick repellents for use on exposed skin, including DEET, picaridin, IR3535 (a derivative of amino acid beta-alanine), oil of lemon eucalyptus (OLE, a natural compound) and OLE's active ingredient para-menthane-diol (PMD). Unlike permethrin, repellents repel but do not kill ticks, protect for only several hours after application, and may be washed off by sweat or water. The most popular repellent is DEET in the U.S. and picaridin in Europe. Unlike DEET, picaridin is odorless", "-22.763057377964287" ], [ "a chronic itch. Over time, the skin becomes red and often oozes.\nPerspiration is also a chronic type of irritation which can be very annoying. Besides being socially unacceptable, sweat stain the clothes and can present with a foul odor. In some individuals, the warm moist areas often become easily infected. The best way to treat excess sweating is good hygiene, frequent change of clothes and use of deodorants/antiperspirants. Vaginal irritation One of the most common areas of the body associated with irritation is the vagina. Many women complain of an itch, dryness, or discharge in the perineum at some point", "-22.735564944101498" ], [ "not generally dangerous and the pain will ease considerably within a few hours even if untreated. Complete recovery may take a week or more; in a few cases, victims have reported swelling and/or stiffness persisting for months after envenomation.\nFirst aid treatment consists of immersing the affected area in hot water (as hot as the victim can tolerate without being scalded), which will accelerate denaturation of the protein-based venom. The use of hot water will reduce the pain felt by the victim after a few minutes. Usual experience is that the pain then fades within 10 to 20 minutes, as the", "-22.688164286431856" ], [ "laundry and dishwashing detergents, cosmetics, food processing, skin care ointments, contact lens cleaners, and for research in synthetic organic chemistry. Occupational safety and health People can be exposed to subtilisin in the workplace by breathing it in, swallowing it, skin contact, and eye contact. The National Institute for Occupational Safety and Health (NIOSH) has set a recommended exposure limit (REL) of 0.00006 mg/m³ over a 60-minute period.", "-22.594256651122123" ], [ "Sweat allergy A sweat allergy is the exacerbation of atopic dermatitis associated with an elevated body temperature and resulting increases in the production of sweat. It appers as small reddish wheals that become visible in response to increased temperature and resulting production of sweat. It can affect all ages. Sweating can trigger intense itching or cholinergic urticaria. The protein MGL_1304 secreted by mycobiota present on the skin such as Malassezia globosa acts as a histamine or antigen. People can be desensitized using their own samples of sweat that have been purified that contains small amounts of the allergen. The allergy", "-22.57430249231402" ], [ "transport to the skin surface.\nDissolved in the water are trace amounts of minerals, lactic acid, and urea. Although the mineral content varies, some measured concentrations are: sodium (0.9 gram/liter), potassium (0.2 g/L), calcium (0.015 g/L), and magnesium (0.0013 g/L).\nRelative to the plasma and extracellular fluid, the concentration of Na⁺ ions is much lower in sweat (~40 mM in sweat versus ~150 mM in plasma and extracellular fluid). Initially, within eccrine glands sweat has a high concentration of Na⁺ ions. In the sweat ducts, the Na⁺ ions are re-absorbed into tissue by epithelial sodium channels (ENaC) that are located on the", "-22.448468861868605" ], [ "sweat is hypoosmotic relative to plasma (i.e. less concentrated). Sweat is found at moderately acidic to neutral pH levels, typically between 4.5 and 7.0. Artificial perspiration Artificial skin capable of sweating similar to natural sweat rates and with the surface texture and wetting properties of regular skin has been developed for research purposes. Artificial perspiration is also available for in-vitro testing, and contains 19 amino acids and the most abundant minerals and metabolites in sweat. Diagnostics There is interest in its use in wearable technology. Sweat can be sampled and sensed non-invasively and continuously using electronic tattoos, bands, or patches.", "-22.43041461807661" ], [ "apocrine glands also play an important thermoregulatory role. In hot conditions, the secretions emulsify the sweat produced by the eccrine glands and this produces a sheet of sweat that is not readily lost in drops of sweat. This is of importance in delaying dehydration. In colder conditions, the nature of sebum becomes more lipid and in coating the hair and skin, rain is effectively repelled.\nSebum is produced in a holocrine process, in which cells within the sebaceous gland rupture and disintegrate as they release the sebum and the cell remnants are secreted together with the sebum. The cells are constantly", "-22.42675353458617" ], [ "hand and then rubbed on the face.\nAfter coming indoors, clothes, gear and pets should be checked for ticks. Clothes can be put into a hot dryer for 10 minutes to kill ticks (just washing or warm dryer are not enough). Showering as soon as possible, looking for ticks over the entire body, and removing them reduce risk of infection. Unfed tick nymphs are the size of a poppy seed, but a day or two after biting and attaching themselves to a person, they look like a small blood blister. The following areas should be checked especially carefully: armpits, between legs,", "-22.392194181564264" ], [ "in apparently safe situations where normal sweating keeps others safe and comfortable. Adverse effects of elevated body temperature are more likely for the elderly and for those with health issues, especially multiple sclerosis.\nN-Desethyloxybutynin is an active metabolite of oxybutynin that is thought responsible for much of the adverse effects associated with the use of oxybutynin. N-Desethyloxybutynin plasma levels may reach as much as six times that of the parent drug after administration of the immediate-release oral formulation. Alternative dosage forms have been developed in an effort to reduce blood levels of N-desethyloxybutynin and achieve a steadier concentration of oxybutynin than", "-22.381376949142577" ], [ "carefully and according to the prescribed directions because when overused over longer periods of time they can cause thinning of the skin. Also, in some instances such as poison ivy dermatitis calamine lotion and cool oatmeal baths may relieve itching.\nUsually, severe cases are treated with systemic corticosteroids which may be tapered gradually, with various dosing schedules ranging from a total of 12 – 20 days to prevent the recurrence of the rash (while the chemical allergen is still in the skin, up to 3 weeks, as well as a topical corticosteroid. Tacrolimus ointment or pimecrolimus cream can also be used", "-22.331654124776833" ], [ "such as eczema, atopic dermatitis, folliculitis and other skin conditions. The first cleansers using sodium hypochlorite for the treatment of skin conditions were developed by Dr. Azam Anwar, Founder and Chairman of TopMD Skin Care Inc. (Dallas, TX) and Clay J. Cockerell, a dermatopathologist and clinical professor of dermatology and dermatopathology at the University of Texas Southwestern Medical Center. The idea for cleansers came from bleach baths which were used to kill bacteria to prevent infections and treat infections after they occurred. Cleansers were formulated into body washes for a gentle, convenient use in the shower as opposed to having", "-22.321687472402118" ], [ "Desquamation Skin Normal, nonpathologic desquamation of the skin occurs when keratinocytes, after moving typically over about 14 days, are individually shed unnoticeably. Obvious but nonpathologic visible desquamation can be observed after immersion of the skin in warm or hot water, encouraging the topmost layer of dead skin cells to shed and, as such, is a common result from the use of a hot shower or bath. In pathologic desquamation, such as that seen in X-linked ichthyosis, the stratum corneum becomes thicker (hyperkeratosis), imparting a \"dry\" or scaly appearance to the skin, and instead of detaching as single cells, corneocytes are", "-22.209834597539157" ], [ "Mud wrap Mud wraps are spa treatments where the skin is covered in mud for a shorter or longer period. The mud causes sweating, and proponents claim that mud baths can slim and tone the body, hydrate or firm the skin, or relax and soothe the muscles. It is alleged that some mud baths are able to relieve tired and aching joints, ease inflammation, or help to \"flush out toxins\" through sweating. Process A layer of mud is applied to the skin, and bandages are wrapped over the mud that has been applied. Sometimes a pvc sauna suit is additionally", "-22.169905524351634" ], [ "wounds that would kill a human. Humans seeing them for the first time often assume they are trained in the martial arts, due to their extreme coordination and sense of being at ease with their bodies. Temperature extremes do not affect them, and they do not sweat when hot (the author originally had them sweating in the 1985 short story The Shadow of the Starlight, but changed it for the book series). They view all activities they engage in as smaller parts of the greater pattern of things, and because of this and their long life span, they attain a", "-22.144597972393967" ], [ "However, sweat as a diagnostic fluid presents numerous challenges as well, such as very small sample volumes and filtration (dilution) of larger-sized hydrophilic analytes. Currently the only major commercial application for sweat diagnostics is for infant cystic fibrosis testing based on sweat chloride concentrations.", "-22.13012716465164" ], [ "Thalaikoothal Thalaikoothal (Tamil: தலைக்கூத்தல், lit. showering) is the traditional practice of senicide (killing of the elderly) or involuntary euthanasia, by their own family members, observed in some parts of southern districts of Tamil Nadu state of India. Methods Typically, the elderly person is given an extensive oil-bath early in the morning and subsequently made to drink glasses of tender coconut water which results in renal failure, high fever, fits, and death within a day or two. This technique may also involve a head massage with cold water, which may lower body temperature sufficiently to cause heart failure. Alternative", "-22.128431568533415" ], [ "the hot and sweating stage began. The characteristic sweat broke out suddenly without any obvious cause. A sense of heat, headache, delirium, rapid pulse, and intense thirst accompanied the sweat. Palpitation and pain in the heart were frequent symptoms, as well. No skin eruptions were noted by observers, including Caius. In the final stages, there was either general exhaustion and collapse, or an irresistible urge to sleep, which Caius thought was fatal if the patient were permitted to give way to it. One attack did not produce immunity, and some people suffered several bouts before dying. The disease tended", "-22.032526707771467" ], [ "begin excreting less oil after menopause thus is very hard to keep the skin moist. The layer of subcutaneous fat also decreases thus reducing the insulation and padding capability of the skin.This can make the individual be at risk of having an injury and also finds it very hard to maintain body temperature. The sweat glands also cut down on the amount of sweat they produce thus making the individual's body harder to cool. Intake too much sugar The intake of too much sugar can lead to negative impacts to the body which include the damage of collagen. The excess", "-22.022838805336505" ], [ "It can cause both physiological and emotional problems in patients. It is generally an inherited problem that is found in each ethnic group. It is not life-threatening, but it is threatening to a person's quality of life.\nA treatment modality is clipping of the sympathetic nerve at the level of T4 by thoracoscopic means. Night sweats Night sweats, also known as nocturnal hyperhidrosis, is the occurrence of excessive sweating during sleep. The person may or may not also perspire excessively while awake.\nOne of the most common causes of night sweats in women over 40 is the hormonal changes related to menopause", "-21.97938674496254" ], [ "at 8 pm, take two bisacodyl 5 mg tablets; continue drinking/hydrating into the evening until bedtime with clear permitted fluids. The procedure may be scheduled early in the day so the patient need not go without food and only limited fluids until later.\nThe goal of the preparation is to clear the colon of solid matter, and the patient may be advised to spend the day at home with ready access to toilet facilities. The patient may also want to have at hand moist towelettes or a bidet for cleaning the anus. A soothing salve such as petroleum jelly applied", "-21.88395020388998" ], [ "a few weeks to disappear. A skin tag may remain after healing. If hemorrhoids are large and cause issues with hygiene, they may produce irritation of the surrounding skin, and thus itchiness around the anus. Internal Internal hemorrhoids usually present with painless, bright red rectal bleeding during or following a bowel movement. The blood typically covers the stool (a condition known as hematochezia), is on the toilet paper, or drips into the toilet bowl. The stool itself is usually normally coloured. Other symptoms may include mucous discharge, a perianal mass if they prolapse through the anus, itchiness, and fecal incontinence.", "-21.746749156503938" ], [ "is also useful in cases of chronic rheumatism, muscle spasm, back pain, blood vessels, varicose veins, skin diseases, and overall body activation of nervous and psychological exhaustion, endocrine secretion and chronic sinusitis.\nIn addition to immersing the body in the springs, as in a shower, bubble bath, jacuzzi bath or waterbed, foot baths and steam treatments are available. The steam treatment helps to cure chronic respiratory diseases especially among smokers.", "-21.578201044816524" ], [ "bacterium that occurs on the skin which is also associated with acne.\nThe trapped sweat leads to irritation (prickling), itching and to a rash of very small blisters, usually in a localized area of the skin. Prevention Prickly heat can be prevented by avoiding activities that induce sweating, using air conditioning to cool the environment, wearing light clothing and in general, avoiding hot and humid weather. Frequent cool showers or cool baths with mild soap can help to prevent heat rash. Treatment The primary remedy for prickly heat or rash is to wear lighter clothing, or otherwise avoid overheating one's", "-21.572957666241564" ], [ "effects are uncomfortable but mild and decrease markedly after the first 2–4 weeks of use except for increased sensitivity to sunlight.\nFor best results dermatologists recommend applying the cream or gel once daily before bedtime after washing the face with a mild cleanser. Dermatologists recommend using a moisturizer so that skin will not be as dry and flaky. Uses Tazarotene is most commonly used topically to treat acne, psoriasis (a skin disease in which red, scaly patches form on some areas of the body), and to reduce skin wrinkling and liver spots.\nTazarotene is rated pregnancy category X, and should not be", "-21.56916698405621" ], [ "a form of evaporative cooling, hominins rely on sweating, allowing evaporation to occur on a much larger surface area. In this way, sweating results in better thermoregulation that allows the hominin to outlast the prey during the chase. This is one potential explanation for the loss of most body hair in humans. Those individuals with less body hair would be able to better thermoregulate while running to avoid overheating. For this species to exist under the endurance running hypothesis, running most likely did not result in the frequency of injuries that it does today, because such an injury to early", "-21.532417814596556" ], [ "or anal leakage (particularly during sleep).\nCleaning the area with warm water, avoiding all soaps and even baby wipes, then drying the area, ideally with a hair dryer to avoid irritation or failing that simply patting gently with a clean, dry, towel. If persons with pruritus ani do not need to scratch after these steps they are instructed to do nothing else. If the urge to scratch is still present they are instructed to apply a topical steroid cream which has antibiotic and antifungal properties. This will address a skin condition which may have become infected. Apply such a cream as", "-21.516439340426587" ], [ "skin.\" A program headed by the director of the Johns Hopkins graduate program, Dr. Soumyadipta Acharya, uses \"shorter-lived\" compounds that can \"comfortably reside in [the] skin,\" such as permethrin, in its soap.", "-21.450800826016348" ], [ "Minor test Method Tincture of iodine is applied to the skin and allowed to air-dry. After drying, the area is dusted with cornstarch or potato flour. Sweating is then encouraged by increased room temperature, exercise, use of a sauna, or pilocarpine.\nWhen sweat reaches the surface of the skin, the starch and iodine combine, causing a dramatic color change (yellow → dark blue), allowing sweat production to be easily visualized.\nSome have reported higher sensitivity and fewer drawbacks marking dry skin with water-erasable ink and observing fading. Uses The Minor test can be used as a diagnostic tool to evaluate underactive (hypohidrosis)", "-21.42863257456338" ], [ "residual soap from the skin but potentially leaving a coating of insoluble stearates on tub and shower surfaces, commonly called soap scum.\nFor people on a low sodium diet, the increase in sodium levels in the drinking water can be significant in case of high SAR index water. The American Heart Association (AHA) suggests that the 3 percent of the population who must follow a severe, salt-restricted diet should not consume more than 400 mg of sodium a day. AHA suggests that no more than 10 percent of this sodium intake should come from water. The EPA's draft guideline of 20 mg/L sodium", "-21.39199290284887" ], [ "as 30 minutes but most often takes 2 to 6 hours. Pain is usually strongest 6 to 48 hours after exposure. The burn continues to develop for 1 to 3 days, occasionally followed by peeling skin in 3 to 8 days. Some peeling and itching may continue for several weeks. Skin cancer Ultraviolet radiation causes sunburns and increases the risk of three types of skin cancer: melanoma, basal-cell carcinoma and squamous-cell carcinoma. Of greatest concern is that the melanoma risk increases in a dose-dependent manner with the number of a person's lifetime cumulative episodes of sunburn. It has been estimated", "-21.358894160366617" ], [ "Limiting time in the shower and using gentle exfoliation to unplug pores can help. Many products are available that apply abrasive materials to and alpha or beta hydroxy acids to assist with exfoliation.\nSome cases of keratosis pilaris have been successfully treated with laser therapy, which involves passing intense bursts of light into targeted areas of the skin. Depending on the body's response to the treatment, multiple sessions over the course of a few months may be necessary. Epidemiology Worldwide, KP affects an estimated 30-50% of the adult population and approximately 50-80% of all adolescents. It is more common in women", "-21.3586643395829" ], [ "definitive evidence on methods for cleansing contaminated skin of the hairs or the irritant they carry. It is not known whether washing with soap and water is effective, and there is better reason to believe that organic solvents such as acetone would be effective. If clothes are contaminated, they should not be washed along with uncontaminated clothing. It is possible that the irritant can be removed from clothing by soaking overnight in a solution of sodium carbonate, which can be prepared by heating baking soda in an oven for an hour at 100 °C (212 °F).\nTopical anaesthetics should be chosen carefully", "-21.355169962145737" ], [ "their quality of life decreased as a result of compensatory sweating.\" Total body perspiration in response to heat has been reported to increase after sympathectomy. The original sweating problem may recur due to nerve regeneration, sometimes as early as 6 months after the procedure.\nOther possible side-effects include Horner's Syndrome (about 1%), gustatory sweating (less than 25%) and excessive dryness of the palms (sandpaper hands). Some patients have experienced cardiac sympathetic denervation, which can result in a 10% decrease in heart rate both at rest and during exercise, resulting in decreased exercise tolerance.\nPercutaneous sympathectomy is a minimally invasive procedure similar to", "-21.271984667459037" ], [ "wet areas prohibit the use of clothing for safety reasons. With the extreme heat of the baths and steam rooms, it is believed that toxic chemicals can leach out of apparel and into the body. It is also believed that if you wear a swimsuit or cover up you may be trying to hide a disease.\nRecently, the hygienic quality and healthiness of some jjimjilbangs were questioned, especially the proper washing of clothing provided by the jjimjilbangs. Concerns about the clothes increasing atopy symptoms in patients, or even of accidentally hosting parasites, were voiced, although the evidence was inconclusive. Safety Theft,", "-21.242259954975452" ], [ "if accomplished within 30 minutes of the injury. The pain or inflammation can then be effectively treated using acetaminophen (paracetamol), or ibuprofen. Ice, butter, cream and ointment cannot be used since they can worsen the burn.\nSevere burn patients are often treated through trauma resuscitation, airway management, fluid resuscitation, blood transfusion, wound management, and skin grafting, as well as the use of antibiotics. Epidemiology In the United States, over two million people required medical attention for thermal burns every year. About 1 in 30 of those victims (75,000) are hospitalized for thermal burns every year, with a third of those patients", "-21.20988744526403" ], [ "must treat their fragile skin carefully. Most have learned that taking regular extended baths allows patients to care for their fragile skin and keep it manageable. Baths that include sea salt seem to improve the process of softening and removing the thickened skin.\nOintments like Petroleum Jelly, Aveeno, and other barrier type ointment help hold the moisture in the skin after a bath.", "-21.169324012938887" ], [ "the vagina produces secretions which are not a form of sweat but may be undesired and also masked with deodorants.\nHuman perspiration of all types is largely odorless until its organic components are fermented by bacteria that thrive in hot, humid environments. The human underarm is among the most consistently warm areas on the surface of the human body, and sweat glands readily provide moisture containing a fraction of organic matter, which when excreted, has a vital cooling effect. When adult armpits are washed with alkaline pH soap, the skin loses its protective acid mantle (pH 4.5 - 6), raising the", "-21.16009987273719" ], [ "of lactate in sweat for on-body applications.", "-21.125017987913452" ], [ "hospital with a warm bath with povidone iodine or chlorhexidine antiseptic. Active rewarming seeks to warm the injured tissue as quickly as possible without burning. The faster tissue is thawed, the less tissue damage occurs. According to Handford and colleagues, \"The Wilderness Medical Society and State of Alaska Cold Injury Guidelines recommend a temperature of 37–39 °C, which decreases the pain experienced by the patient whilst only slightly slowing rewarming time.\" Warming takes 15 minutes to 1 hour. Rewarming can be very painful, so pain management is important. Medications People with potential for large amputations and who present within 24", "-21.031977639591787" ], [ "Sweat diagnostics History Some of the earliest, published studies on sweat composition date back to the 19th century. Further studies in the 20th century began to solidify understanding of the physiology and pharmacology of the eccrine sweat gland. In-vivo and in-vitro studies from this time period, and even those continuing today, have identified numerous structural nuances and new molecules present within sweat. The first commercially adopted use for sweat diagnostics included testing of sodium and chloride levels in children for the diagnosis of cystic fibrosis. Today, one of the most popular devices for this testing is", "-21.020082347647985" ], [ "for up to 24 hours. Very rarely, pain can be propagated to the tributary lymph nodes, i.e. those in the groin (when the sting is on the sole of the foot), or those in the armpit (if the sting is on the hands).\nThe best first aid is to wash the wound, and then to immerse it in very hot water for at least an hour, to ease the pain and help destroy the protein-based venom. Water temperature for immersion should be 40 °C (104 °F) or as hot as the patient can tolerate. Also, reassure the patient of the relative harmlessness", "-20.960390612890478" ], [ "this is usually due to excessive exposure to cold air or water, but it can be deliberately induced as a medical treatment. Symptoms usually appear when the body's core temperature drops by 1–2 °C (1.8–3.6 °F) below normal temperature. Basal body temperature Basal body temperature is the lowest temperature attained by the body during rest (usually during sleep). It is generally measured immediately after awakening and before any physical activity has been undertaken, although the temperature measured at that time is somewhat higher than the true basal body temperature. In women, temperature differs at various points in the menstrual cycle,", "-20.93092007486848" ], [ "the Macroduct Sweat Collection System from ELITechGroup. General evidence More recently, numerous studies have identified the plausibility of sweat as an alternative to blood analysis. The potential substitution for sweat versus blood analysis has many potential benefits. For example, sweat can be: extracted in a non-invasive manner via iontophoresis; extracted with little-to-no pain; and monitored continuously. There are downfalls to the technology, however. For example, demonstration of successful and reliable sweat extraction and analysis on a cohesive device has yet to be demonstrated. Furthermore, although some biomarker partitioning mechanisms are well understood and well studied,", "-20.909312980482355" ], [ "radioactive particles are stored in body fat, which are released through the exchange of fats (thus the oil consumption) and exercise, and then finally released via perspiration and other normal mechanisms such as body waste. Independent scientific evaluations report that the concentration of toxins or drugs in the sweat is negligible, as they are primarily removed from the body through the liver, the kidneys and the lungs. The notion that toxins from fatty tissue can be sweated out is categorically denied by toxicology experts. Evidence offered for the Rundown has not demonstrated that detoxification is actually taking place.\nA 1995 review", "-20.899663077776495" ], [ "the recovery phase.\nThe prodromal phase is characterized by subsyndromal symptoms of cannabinoid hyperemesis syndrome, including mild discomfort and nausea upon waking. Prior to the use of compensatory exposure to hot water to treat symptoms, people sometimes increase their intake of cannabinoids in an effort to treat the persistent nausea they experience. This phase can last for months or even years.\nThe hyperemetic phase is characterized by the full syndromal symptoms of cannabinoid hyperemesis syndrome, including persistent nausea, vomiting, abdominal pain, and retching. Retching can occur up to 5 times per hour. It is very difficult to take food or medicine by", "-20.872360496781766" ], [ "physical exercise. The increase in body heat from wearing a sauna suit gives the impression of getting \"a good workout\". Body wrapping Sauna suits are also worn for body wrapping in some health spas. The wearer is first wrapped in bandages saturated with mineral and/or herbal preparations and then covered with a sauna suit. The objective of this process is to enable the wearer to \"sweat out toxins\", however there is little scientific evidence to support the effectiveness of this practice. Sauna suits are often worn specifically for such sweat excretion rather for exercise or weight", "-20.822517008695286" ], [ "causing an increase in body temperature (hyperthermia), it was proposed that TRPV1 is tonically active in vivo and regulates body temperature by telling the body to \"cool itself down\". Without these signals, the body overheats. Likewise, this explains the propensity of capsaicin (a TRPV1 agonist) to cause sweating (i.e.: a signal to reduce body temperature). In a recent report, it was found that tonically active TRPV1 channels are present in the viscera and keep an ongoing suppressive effect on body temperature. Recently, it was proposed that predominant function of TRPV1 is body temperature maintenance Experiments have shown that TRPV1", "-20.80756458209362" ], [ "actually did survive several attacks of sweating sickness. Henry VIII's illegitimate son Henry FitzRoy, 1st Duke of Richmond and Somerset dies of the sweat as a young child several episodes prior. A physician treats a mortally afflicted Compton by puncturing his back and bleeding him, on the rumor that it has worked for some by releasing \"the toxin\". The real Henry FitzRoy died about one month after his 17th birthday, probably of tuberculosis, and the real William Compton died of sweating sickness at age 46.\nIn Hilary Mantel's historical novel Wolf Hall (2009), a small outbreak in 1527 kills Liz, the", "-20.750718410417903" ], [ "home; accounting for 17% of the average indoor use. The average size family washes 5.4 loads of laundry each week. Each load uses on average 29.3 gallons (111 liters) of water. According to EPA, a full-sized Energy Star certified clothes washer (CW) (with \"water factor\" - WF ≤ 8.0 gal/cycle/ft^3) should use on average 15 gallons (57 liters) of water per load, compared to at least two times that volume used by a standard machine. Currently, about one fourth of American homes use less than 20 gallons (76 liters) per load with the average volume of 15 gallons", "-20.68607912477455" ], [ "Sweat test Background Cystic fibrosis is caused by defects in a protein found in many tissues, including the airways and the sweat glands. As a result, these tissues do not work properly. Sweat testing makes use of the fact that cystic fibrosis patients have defective sweat glands.\nSweat glands produce sweat through a well understood process of secretion and reabsorption of sodium chloride (salt). Secretion entails the movement of salt and water from sweat gland cells into the sweat duct. Reabsorption occurs in the duct with the movement of salt from the sweat back into sweat duct cells. What remains is", "-20.678405741229653" ], [ "sweat glands. Treatment Treatment is based on the underlying cause, if any. Where the likely underlying condition is known, treatment of this condition is indicated treated to reduce progression of the disease and symptoms. For cases without those conditions, there is only symptomatic treatment.", "-20.625439839674073" ], [ "bathroom is needed, no laboratory is required for analysis, and the tests themselves are difficult to manipulate and relatively tamper-resistant. The detection window is long and can detect recent drug use within several hours.\nThere are also some disadvantages to spray or sweat testing. There is not much variety in these drug tests, only a limited number of drugs can be detected, prices tend to be higher, and inconclusive results can be produced by variations in sweat production rates in donors. They also have a relatively long specimen collection period and are more vulnerable to contamination than other common forms", "-20.59358248882927" ], [ "of sweat glands in the skin. Sweating is controlled by the sympathetic nervous system, and skin conductance is an indication of psychological or physiological arousal. If the sympathetic branch of the autonomic nervous system is highly aroused, then sweat gland activity also increases, which in turn increases skin conductance. In this way, skin conductance can be a measure of emotional and sympathetic responses. More recent research and additional phenomena (resistance, potential, impedance, and admittance, sometimes responsive and sometimes apparently spontaneous) suggest that EDA is more complex than it seems, and research continues into the source and significance of EDA. History", "-20.59010498333373" ], [ "process. To protect against infection, antibacterial soap is the best way to keep clean. Make sure to not only clean the pierced area itself, but cleaning your hands before touching the piercing is equally important. The most convenient way to wash the piercing is in the shower so the water can run on it, however, never use a loofah or washcloth as those tend to harbor bacteria. Sea salt is recommended by some, but not others. Contact the person who did your piercing to hear their suggestions based on their choice of jewelry. Things to be avoided during the healing", "-20.584195523289964" ], [ "relief. Pain from the sores may be eased with the use of analgesic medications. Infection in older children, adolescents, and adults is typically mild and lasts approximately 1 week, but may occasionally run a longer course. Fever reducers and lukewarm baths can help decrease body temperature.\nA minority of individuals with hand, foot and mouth disease may require hospital admission due to complications such as inflammation of the brain, inflammation of the meninges, or acute flaccid paralysis. Non-neurologic complications such as inflammation of the heart, fluid in the lungs, or bleeding into the lungs may also occur. Complications Complications from", "-20.581914270442212" ], [ "protein substance (collagen) from bacterial growth during the time lag from procuring the hide to when it is processed. Curing removes water from the hides and skins using a difference in osmotic pressure. The moisture content of hides and skins is greatly reduced, and osmotic pressure increased, to the point that bacteria are unable to grow. In wet-salting, the hides are heavily salted, then pressed into packs for about 30 days. In brine-curing, the hides are agitated in a saltwater bath for about 16 hours. Curing can also be accomplished by preserving the hides and skins at very low temperatures.", "-20.56788402001257" ], [ "located on the apical membrane of the cells that form the eccrine gland ducts (see Fig. 9 and Fig. 10 of the reference). This re-uptake of Na⁺ ions reduces the loss of Na⁺ during the process of perspiration. Patients with the systemic pseudohypoaldosteronism syndrome who carry mutations in the ENaC subunit genes have salty sweat as they cannot reabsorb the salt in sweat. \nIn these patients, Na⁺ ion concentrations can greatly increase (up to 180 mmol/L).\nIn people who have hyperhidrosis, the sweat glands (eccrine glands in particular) overreact to stimuli and are just generally overactive, producing more sweat than normal. Similarly,", "-20.552033327287063" ], [ "outside the body generally has a life expectancy which is considered to depend on pH, temperature, presence of air and other factors, and is unpredictable but smaller than the life expectancy inside the human body. For instance, sperm donors who collect the sample outside the clinic are advised to have handed in the sample no more than one hour from collection, and to keep it, if not at body temperature, then at least at room temperature.\nIn a non-harmful environment outside the body, such as in a sterile glass container the number of motile sperm decreases by approximately 5-10% per hour.", "-20.52432076074183" ], [ "skin pH and disrupting the skin barrier. Many bacteria are adapted to the slightly alkali environment within the human body, so they can thrive within this elevated pH environment. This makes the skin more than usually susceptible to bacterial colonization. Bacteria on the skin feed on the waste proteins and fatty acids in the sweat from the apocrine glands and on dead skin and hair cells, releasing trans-3-methyl-2-hexenoic acid in their waste, which is the primary cause of body odor.\nUnderarm hair wicks the moisture away from the skin and aids in keeping the skin dry enough to prevent or diminish", "-20.508266201009974" ], [ "coating that keeps skin supple and moist. The sebum builds overly, between every 2–3 days for the average adult. Those with delicate skin such as children may experience a longer interval. Sebum also imparts a protective coating to hair strands. For babies, the sebaceous gland production is not at peak, thus daily washing is not typically needed. Common ingredients Most contain sodium trideceth sulfate, which is formulated to act as a low-irritation cleansing agent.\nAlternatively, baby shampoo may be formulated using other classes of surfactants, most notably non-ionics which are much milder than any charged anionics used.", "-20.477554503944702" ], [ "tumors, gout, menopause, certain drugs, or mercury poisoning.\nOne classification scheme uses the amount of skin affected. In this scheme, excessive sweating in an area of 100 square centimeters (16 square inches) or more is differentiated from sweating that affects only a small area.\nAnother classification scheme is based on possible causes of hyperhidrosis. Causes The cause of primary hyperhidrosis is unknown, although some physicians claim it is caused by over-activity of the sympathetic nervous system. Anxiety or excitement can exacerbate the condition for many sufferers. A common complaint of patients is they get nervous because they sweat, then sweat more", "-20.46707465185318" ], [ "had two baths per day, then he had one bath per day for two months. For the first five days he was treated with the calcium complex of DTPA and then after that for four years he was treated with a total of 583 grams of the zinc complex of DTPA. The treatment reduced the systemic deposition to 500 kBq instead of the 19 MBq which he would otherwise retained inside his body.\nBecause of risk of exposure to other individuals, he was placed in isolation in the Hanford Emergency Decontamination Facility for five months and underwent chelation therapy using DTPA", "-20.45536882452734" ], [ "blood vessels within the body to conserve heat. The body detects an increase in the blood pressure and inhibits the release of vasopressin (also known as antidiuretic hormone (ADH)), causing an increase in the production of urine. The pressure component is caused by the hydrostatic pressure of the water directly increasing blood pressure. Its significance is indicated by the fact that the temperature of the water does not substantially affect the rate of diuresis. Partial immersion of only the limbs does not cause increased urination. Thus, the hand in warm water trick (immersing the hand of a sleeping person in", "-20.439645344300516" ], [ "warning that large doses of niacin could cause liver damage, gout, gastritis, and other serious side-effects. Dr. David Hogg of Toronto said that the program may be detrimental to participants' health. Dr. C. Mark Palmer of Ponca City, Oklahoma rebutted the theory that sweating would clear out drugs, stating that \"No matter how much a patient were made to sweat, it could not significantly increase his clearing of most drugs.\"\nAfter reviewing materials published by Narconon, University of Oklahoma biochemistry professor Bruce Roe described the program as \"a scam\" based on \"half-truths and pseudo-science.\" In a 1988 report, Dr. Ronald E.", "-20.410133105819114" ], [ "possible, three washings are performed: first with water infused with plum leaves, then with water infused with camphor, and lastly with purified water.\nThe washing is usually performed by others of the same gender, although Islamic Hausa people permit spouses to wash each other's bodies. In West Africa Funerary bathing is performed in traditional funerals in some countries in West Africa. The ritual washing of the dead is believed to be one of the factors which resulted in the rapid spread of Ebola virus in Guinea, Liberia and Sierra Leone in 2014. Cultural references Antigone speaks of washing the dead in", "-20.405774686834775" ], [ "abdominal pain and heaviness, back pain, breast tenderness, and mittelschmerz (ovulation pains). Basal body temperature This usually refers to a temperature reading collected when a person first wakes up in the morning (or after their longest sleep period of the day). The true BBT can only be obtained by continuous temperature monitoring through internally worn temperature sensors. In women, ovulation will trigger a rise in BBT between 0.2º and 0.5 °C. (0.5 and 1.°F) that lasts approximately until the next menstruation. This temperature shift may be used to determine the onset of post-ovulatory infertility. (See ref. 30) Cervical mucus The appearance", "-20.365936448448338" ], [ "odor\" to the baby's sweat and urine (due to phenylacetate, a carboxylic acid produced by the oxidation of phenylketone). In most cases, a repeat test should be done at approximately two weeks of age to verify the initial test and uncover any phenylketonuria that was initially missed.\nUntreated children often fail to attain early developmental milestones, develop microcephaly, and demonstrate progressive impairment of cerebral function. Hyperactivity, EEG abnormalities, and seizures, and severe learning disabilities are major clinical problems later in life. A characteristic \"musty or mousy\" odor on the skin, as well as a predisposition for eczema, persist throughout life in", "-20.34121484158095" ] ]
3p9cau
Why do babies and toddlers love other babies (including dolls) so much?
[ "They are imitating their parents as it's one of the only things they've experienced in their lives", "Play. Babies/children love play. They are hardwired to want to play, because through play they learn. Baby lions play fight and hunt, baby deer play hide and run. When a baby sees an adult, an adult can represent food, cleaning, time to sleep, time to wake, time to cuddle etc. But when a baby/child sees another baby/child it means its time for one thing: play!", "We are born hard wired to be social, it starts from the moment they are born with children's preference for seeking out faces. As they grow they observe social interactions, hugging laughing, smiling etc these pleasant exchanges strengthen the bonds of the family unit around them. Being caring towards others creates affection and includes them in a safe supportive environment. As they grow they begin to practice these social niceties and mimic caring behaviour they have witnessed. Their primary caregivers make sure their needs are met by feeding them, paying attention to them and changing their nappies so they practice this with their toys. For example I pat my daughter on the back when she's having a hug, she now pats my back and says \"Aww Mummy.\" It's nurturing behaviour in order to successfully integrate into society. Edit - spelling....", "Well it's a combination of things really. Human beings are incredibly empathetic and are hardwired to be care takers in many respects. It is programmed in every human being to be stressed at the sound of a crying baby, and recognition of various baby sounds. We're very good at taking care of babies because babies aren't very good at taking care of themselves. If you enjoy caring for your child you are likely to have \"complete\" families, and healthy young from an evolutionary perspective. Put these pressures on the human species and eventually you have brains that are programmed to enjoy caring for their young. This is strictly from the perspective of evolutionary psychology. From a behavioral standpoint they are likely mimicking what their parents are doing because that is what children are the best at and they also highly prize personal possessions. She is likely very attached to her doll because that is what children her age do.", "Nobody's suggested this yet, so here's my opinion: babies and small children have almost no control over their environment or physical being at all. Other more powerful people determine when they eat, where they go, what they do, their physical comfort etc. It's often frustrating for them. So when a child has a doll, pet or even smaller child, it's a chance for them to role-play that powerful person and determine what happens in someone else's life for a change.", "It's pretend play/imitative play. They observe adults around them and imitate what they see. It helps babies and toddlers figure out social roles and make sense of the weird weird world of adults." ]
[ [ "doll-like appearances show more affection, play more often with, and spend more time engaged with their baby than mothers of less attractive babies, despite the common belief that parents will treat their child the same, regardless of appearance. Psychologists compared the mother-infant interactions of three-month-old babies with craniofacial abnormalities and normal infants and observed that the mothers of the infants with abnormalities engaged their baby with smiles less often than the mothers of normal babies, spoke to their infants less, and were less responsive to their infants than were the mothers of the normal infants. The results of this study", "-34.839291235985" ], [ " Children “show less involvement with toys stereotypically associated with the opposite sex, and they reject such toys more than ones stereotypically associated with their own sex or neutral ones”. Toys are a medium for children to form gender stereotypes. Some toys, like stuffed animals, have proven to be gender-neutral and are usually marketed to both boys and girls. Parents also play a large role in building their children's gender socialization, as they are the ones buying the toys for their children. The popularity of making toy advertising gender neutral has been increasing through media such as ads showing boys playing", "-34.79155383887701" ], [ "old but have been found to be more popular in recent years with girls around 3 years old. The packaging for the dolls labels them appropriate for ages 3 and up. Boys, in contrast, apparently enjoy toys and games over a longer timespan, gravitating towards toys that meet their interest in assembling and disassembling mechanical toys, and toys that \"move fast and things that fight\". An industry executive points out that girls have entered the \"tween\" phase by the time they are 8 years old and want non-traditional toys, whereas boys have been maintaining an interest in traditional toys until", "-34.5801888036076" ], [ "parents, or close family members that joined the child in believing toys are living creatures. They may also have encouraged the child who believed they had imaginary companions, read fairytales all through childhood and re-enacted the things they had read. People who, at a young age, were involved in creative fantasy activities like piano, ballet, and drawing are more likely to obtain a fantasy prone personality. Acting is also a way for children to identify as different people and characters which can make the child prone to fantasy-like dreams as they grow up. This can cause the person to grow", "-34.16577473648067" ], [ "for females to play with toys designed \"for boys\", an activity which has also become more common in recent years. Fathers are also more likely to reinforce typical play and discourage atypical play than mothers are. A study done by researcher Susan Witt suggests that stereotypes are oftentimes only strengthened by the environment, which perpetuates them to linger in older life.\nThis stereotypical attribution of sex-typical toys for girls and boys is gradually changing, with toys companies creating more gender neutral toys, as the benefits associated with allowing children to play with toys that appeal to them far outweighs controlling their", "-34.046945597889135" ], [ "are likely to grow up into. This allows the child to imagine and create a personal interpretation of how they view the adult world.\nHowever, in other cultures, toys are used to expand the development of a child's cognition in an idealistic fashion. In these communities, adults place the value of play with toys to be on the aspirations they set forth for their child. In the Western culture, the Barbie and Action-Man represent lifelike figures but in an imaginative state out of reach from the society of these children and adults. These toys give way to a unique world in", "-33.743403415996" ], [ "great with little children. They are very playful and have a strong bond with their family. Thanks to their adaptability they are happy to live in an apartment as well.", "-33.67929502367042" ], [ "toys like marbles, jackstones, and balls serve similar functions in child development, allowing children to use their minds and bodies to learn about spatial relationships, cause and effect, and a wide range of other skills.\nOne example of the dramatic ways that toys can influence child development involves clay sculpting toys such as Play-Doh and Silly Putty and their home-made counterparts. Mary Ucci, Educational Director of the Child Study Center of Wellesley College, has demonstrated how such toys positively impact the physical development, cognitive development, emotional development, and social development of children.\nToys for infants often make use of distinctive sounds, bright", "-33.47658495337237" ], [ "Boys' toys and games Background Research suggests that there may be some biological predispositions at play that drive toy preferences. Kim Wallen, a psychologist at Yerkes National Primate Research Center, found in her study that male rhesus monkeys played with model dump trucks and other wheeled toys, over plush dolls.\nInfant boys and girls as young as 9 months old have been found to display stereotypical toy preferences, suggesting that there are biological and environmental factors which appear very early in development. A City, University of London study found that in children aged 9 to 32 months, boys preferred balls", "-33.46701431652764" ], [ "children; products like the Kick Start Gym, Step Start Walk 'n Ride, and the Tummy Time line are aimed at developing the motor skills of babies. Several toys, like Playskool's Pipeworks, Go Go Gears, and Busy Basics lines, were created to allow children to express creativity. Playskool also produces several dolls and action figures, including Dolly Surprise and Kota the Triceratops.", "-33.348304901854135" ], [ "children observe on a daily basis. Child development Toys, like play itself, serve multiple purposes in both humans and animals. They provide entertainment while fulfilling an educational role. Toys enhance cognitive behavior and stimulate creativity. They aid in the development of physical and mental skills which are necessary in later life.\nOne of the simplest toys, a set of simple wooden blocks is also one of the best toys for developing minds. Andrew Witkin, director of marketing for Mega Brands told Investor's Business Daily that, \"They help develop hand-eye coordination, math and science skills and also let kids be creative.\" Other", "-33.29890761245042" ], [ "though they promote their toys as being for both genders, there is no section for boys and girls combined on their website. Those which are generally deemed for both genders more closely resemble what many would label \"boy toys,\" as they relate closer to the stereotype of masculinity within play.\nTraditions within various cultures promote the passing down of certain toys to their children based on the child's gender. In South American Indian communities, boys receive a toy bow and arrow from their father while young girls receive a toy basket from their mother. In North African and Saharan cultural communities,", "-33.28526368155144" ], [ "including doll playing and engaging in housekeeping activities for girls and playing with trucks and engaging in sports activities for boys.\nResearcher Susan Witt said that parents are the primary influencer on the gender roles of their children. Parents, siblings, peers, and even teachers have been shown to react more positively to children engaging in sex-typical behavior and playing with sex-typical toys. This is often done through encouragement or discouragement, as well as suggestions and imitation. Additionally, sons are more likely to be reinforced for sex-typical play and discouraged from atypical play. However, it is generally not as looked down upon", "-33.10353061255228" ], [ "the selection of toys has been observed and studied. Action figures that represent traditional masculine traits are popular with boys, who are more likely to choose toys that have some link to tools, transportation, garages, machines and military equipment. Dolls for girls tend to represent feminine traits and come with such accessories as clothing, kitchen appliances, utensils, furniture and jewelry.\nPediophobia is a fear of dolls or similar objects. Psychologist Ernst Jentsch theorized that uncanny feelings arise when there is an intellectual uncertainty about whether an object is alive or not. Sigmund Freud further developed on these theories. Japanese roboticist Masahiro", "-32.95395017847295" ], [ "of an infant can influence the adult's interaction with the infant\", and gave evidence that in this way \"basic cuteness effects may occasionally be obscured in particular infants\". Koyama (2006) said that an adult caregiver's perception of an infant's cuteness can motivate the amount of care and protection the caregiver provides, and the admiration demonstrated toward the infant, and concluded that \"the adults' protective feeling for children appeared to be a more important criterion for the judgment of a boy's cuteness.\"\nMelanie Glocker (2009) provided experimental evidence that infants' cuteness motivates caretaking in adults, even if they are not related to", "-32.82752121878002" ], [ "both boys and girls preferred dolls to cars at age 12 months. A study of preschool-aged children found that the cultural labeling of toys as \"gender-appropriate\" impacted toy preferences. In partial contrast to this view, certain animal studies have lent support for biologically determined gendered toy preferences. In a study of juvenile rhesus monkeys, when given the option between plush or wheeled toys, female monkeys gravitated toward both toys, while male monkeys mainly preferred toys with wheels. These findings suggest that gendered preferences for toys can occur without the complex socialization processes that we find in humans. ", "-32.76187061460223" ], [ "Alley did not discuss how a cute and attractive infant would be treated relative to an unattractive infant that does not have Kewpie doll characteristics. Implications for caregiver attachment Several studies have shown that cuter, more attractive babies receive more attention from caregivers than unattractive babies. However, infant attractiveness has not been found to be a factor in the development of secure caregiver-child relationships, as most unattractive children and children with cranial and facial deformities establish secure, positive, loving relationships with their caregivers. Mother's behavior toward attractive and unattractive infants Research has shown that mothers of infants who have Kewpie", "-32.76001804014959" ], [ "others, and therefore be more likely to thrive in their environment. Perception of infant cuteness Thomas Alley sought to confirm Lorenz's research in 1981. He hoped to establish a link between what Lorenz described as \"Kewpie doll\" appearance and perceived cuteness. Alley defined cuteness as whether an infant was pleasant to look at. Alley demonstrated that perceived cuteness decreases as the shape of the child's head changes due to aging, meaning that a child with an elongated forehead and rounded features will be perceived as more cute and adorable than children of ages two, three, or four years old. However,", "-32.687303534534294" ], [ "as well as social and cultural reasons for boys' and girls' different toy preferences.\nLike other consumer products, toys may also be offered as sets. While each one may be affordable, it may be an investment to \"collect them all\".\nIntentions\nThe natural credulity of young children means that advertising to children is almost always a sensitive issue. The average child is exposed to approximately 40,000 commercials a year. These messages are channelled through television, the internet, bill board campaigns and print media. Toy marketers are also known for more direct approaches, targeting schools. Doing so by producing toys that are advertised with", "-32.67043908141204" ], [ "drawn to music intended for older children and teens, companies are having to rethink how they develop and market their products. Girls also demonstrate a longer loyalty to characters in toys and games marketed towards them. A variety of global toy companies have marketed themselves to this aspect of girls' development, for example, the Hello Kitty brand, and the Disney Princess franchise. Boys have shown an interest in computer games at an ever-younger age in recent years. Gender Certain toys, such as Barbie dolls and toy soldiers, are often perceived as being more acceptable for one gender than the", "-32.66049211396603" ], [ "which children's play is isolated and independent of the social constraints placed on society leaving the children free to delve into the imaginary and idealized version of what their development in life could be.\nIn addition, children from differing communities may treat their toys in different ways based on their cultural practices. Children in more affluent communities may tend to be possessive of their toys, while children from poorer communities may be more willing to share and interact more with other children. The importance the child places on possession is dictated by the values in place within the community that the", "-32.536440005278564" ], [ "girls develop the ability to attach emotional feelings to dolls, and pretend that their toys live. Little boys learn how to pretend to hunt and fight and attach emotions to them. We learn feelings of desire, fear, and wonder by wandering to the limits of our play. Imagination allows us to create technology, mathematics, and art, but with it can also come terrifying thoughts that could cause harm to us. We grow to learn the difference between most of our thoughts and what they represent, but most of us get fooled into believing the reality of some things that don't", "-32.50278246664675" ], [ "to play more with male-typical toys and less with female-typical ones. However, some have argued that the characteristics of the condition itself could also result in those girls preferring different types of toys.\nOne study also claimed that one-day-old girls gaze longer at a face, whereas suspended mechanical mobiles, rather than a face, keep boys' attention for longer, though this study has been criticized as having methodological flaws. \nResearch has shown that when male-typical toys are labeled as female-appropriate, young girls become significantly more likely to play with them. Certain studies have concluded that many end up treating infants and toddlers", "-32.35693039523903" ], [ "Hong Kong Kids phenomenon Description They are typically born during the 1990s to 2000s, are middle-class families, and are pampered and spoiled by domestic helpers.\nKong Kids typically have several common characteristics. For young children, they often lack life skills, such as bathing, cooking, and tying shoelaces. They are used to relying on their parents and foreign domestic helpers.\nAccording to a survey by People's Daily Online, almost half of the parents who responded said that their children cannot eat, bathe or dress themselves independently and 15% of the respondents even said their children could not use the toilet independently. When faced", "-32.23671702068532" ], [ "[…] There's nothing wrong with giving a girl a doll for Christmas, or a boy a car – but children need a variety of play. Why would we want to tell them that only certain types of play are allowed for them? That sounds like the opposite of fun!” Response from retailers Amongst early responses from retailers were decisions by Boots UK and The Entertainer to remove all ’boys’ and ‘girls’ toys signage in their stores, and a promise from Marks and Spencer to make all their toy ranges inclusive. By December 2013, one year after the launch of Let", "-32.08353124448331" ], [ "the adults of their specific community, but through the lens of the child's perspective. Within cultural societies, toys are a medium to enhance a child's cognitive, social, and linguistic learning.\nIn some cultures, societies utilize toys as a way to enhance a child's skillset within the traditional boundaries of their future roles in the community. In Saharan and North African cultures, play is facilitated by children through the use of toys to enact scenes recognizable in their community such as hunting and herding. The value is placed in a realistic version of development in preparing a child for the future they", "-32.026943765813485" ], [ "giving toys to their parents, without promoting or being reinforced by praise. Levels of prosocial behavior increased with sympathy in children with low moral motivation, as it reflects the link between innate abilities and honing them with the guidance of parents and teachers.", "-32.01578034914564" ], [ "in village). Because of Mela, many relatives from nearby villages visit. This is very popular for kids and younger people as well as females of the village. Kids go to this fair for buying toys that can't usually be bought because of the unavailability. On the other hand, females seem interested in shopping cosmetics and some household items. The elder males feel happy in taking their grandkids to the fair and shop for them. Usually elders are not seen shopping other than sweets and Paan. In past, there used to have some cultural nights program but recently villagers opted to", "-31.942537495226134" ], [ "Konrad Lorenz and infant physical appearance In 1943, Konrad Lorenz proposed that an infant's plump, round facial features (i.e. cheeks, ears, and nose) and large forehead prompted caregivers to exhibit increased feelings of attachment to the infant because of the child's adorable appearance. Lorenz believed that the innately cute features of the infant are a preadapted characteristic that increases the individual's chance of survival and the likelihood that their genes will be passed on to further generations, similar to the innate imprinting newborn waterfowl exhibit. Lorenz believed that infants with a Kewpie doll-like appearance would receive more favorable attention from", "-31.860210494836792" ], [ "they are 12 years old, meaning the traditional toy industry holds onto their boy customers for 50% longer than their girl customers.\nGirls gravitate towards \"music, clothes, make-up, television talent shows and celebrities\". As young children are more exposed to and drawn to music intended for older children and teens, companies are having to rethink how they develop and market their products. Girls also demonstrate a longer loyalty to characters in toys and games marketed towards them. A variety of global toy companies have marketed themselves to this aspect of girls' development, for example, the Hello Kitty brand, and the", "-31.82912985252915" ], [ "in their children, fathers tend to encourage these roles more frequently than mothers. Parents choose activities that they believe their children will enjoy and value. By choosing their children's activities, parents are directly influencing their gender role views and preferences onto their children and shaping expectations. \nHines & Kaufman (1994) examined the toy preferences and behavior in girls with congenital adrenal hyperplasia (CAH), a condition characterized by exposure to high levels of androgens in utero. The results suggested that CAH girls exhibited more masculine-typed behavior observable through toy choice as well as drawings and rough-and-tumble play. While a compelling result,", "-31.81040764367208" ], [ "baby schema (Kindchenschema) may motivate (\"release\") caretaking behavior. Furthermore, cute infants were more likely to be adopted and rated as more \"likeable, friendly, healthy and competent\" than infants who were less cute. There is an implication that baby schema response is crucial to human development because it lays the foundation for care giving and the relationship between child and caretaker.\nSherman, Haidt, & Coan (2009), in two experiments, found that exposure to high cuteness stimuli increased performance when playing the Operation game, a task that requires extreme carefulness. The study said that the shift in behavior toward greater carefulness is consistent", "-31.73780224719667" ], [ "were better able to learn from their characters than were children who had received non-personalized toys. Children also nurtured personalized toys more than non-personalized toys. It seems that perceived similarities increase children's interest and investment in the characters, which motivates the development of parasocial relationships and helps improve later screen-based learning. Negative consequences in childhood In the past two decades, people have become increasingly interested in the potential negative impacts media has on people's' behavior and cognition. Many researchers have begun to look more closely at how people's relationships with various media outlets affect behavior, self-perception and attachment styles, and", "-31.73605675986073" ], [ "world, and these schemas form a larger network of associations and beliefs about gender and gender roles. Toy preference studies Toys for girls tend to be round and pink, while toys for boy tend to be angular and blue. The subtle characteristics of toys may differentially appeal to the developing brains of female and male children. In a study of toy preferences of twelve- to 24-month-old infants, males spent more time looking at cars than females and females spent more time looking at dolls than males. No preference for color was found, and within each sex,", "-31.703483888006303" ], [ "the way of children's imaginations, and too much rigidity would cause frustration. The toy he came up with, at 7.5 cm tall, fit in a child's hand and its facial design was based on children's drawings - a large head, a big smile, and no nose. \"I would put the little figures in their hands without saying anything about what they were,\" Beck remarked. \"They accepted them right away ... They invented little scenarios for them. They never grew tired of playing with them.\".\nThe 1973 oil crisis made it possible for Playmobil to be considered a viable product. The rising oil prices", "-31.62301836325787" ], [ "unisex toys include Let Toys Be Toys. Teenage pregnancy Teenage pregnancy is pregnancy in an adolescent girl. A female can become pregnant from sexual intercourse after she has begun to ovulate. Pregnant teenagers face many of the same pregnancy related issues as other women. There are, however, additional concerns for young adolescents as they are less likely to be physically developed enough to sustain a healthy pregnancy or to give birth.\nIn developed countries, teenage pregnancy is usually associated with social issues, including lower educational levels, poverty, and other negative life outcomes ; and often carries a social stigma. By contrast,", "-31.612264190625865" ], [ "on several occasions that human babies of all societies are without discrimination, that they will play as much in their own filth as with the toys around them. Children become progressively discriminating as they grow older and learn the culturally specific attachments and aversions of their parents. Children become increasingly aware of their mortality as they bump their heads and fall to the ground. They come to fear their mortality and then palliate this fear by finding ways to deny it altogether.\nIn this sense, the Aghora sādhanā is a process of unlearning deeply internalized cultural models. When this sādhanā takes", "-31.60250736643502" ], [ "well-known children being “popular” and the rest “unpopular.” To maintain their own status, popular girls will avoid the overtures of less-popular children, which actually makes them disliked. Many children stop attempting to gain entry into the popular crowd and make friends with other children instead, giving rise to new crowds.\nThe stereotypes on which crowd definitions are based change over time as adolescents shift from grouping people by abstract characteristics rather than activities (“geeks” rather than “the kids who read a lot”). With age, adolescents become more conscious of crowd divisions and the social hierarchy. Distinctions between crowds also become", "-31.570010343391914" ], [ "\"cute\". However a study by Thomas Alley found no such correlation and pointed out faulty procedures in that study. Alley's study found that cephalic head shape of an infant did induce a positive response from adults, and these children were considered to be more \"cute\". In his study, Alley had 25 undergraduate students rate line drawings of an infant's face. The same drawing was used each time, however the cephalic head shape was changed using a cardioidal transformation (a transformation that models cephalic growth in relation to ageing process) to adjust the perceived age; other features of the face were", "-31.567393654862826" ], [ "these sorts of toys allows children to exercise, building strong bones and muscles and aiding in physical fitness. Throwing and catching balls and frisbees can improve hand–eye coordination. Jumping rope, (also known as skipping) and playing with foot bags can improve balance. Safety regulations Many countries have passed safety standards limiting the types of toys that can be sold. Most of these seek to limit potential hazards, such as choking or fire hazards that could cause injury. Children, especially very small ones, often put toys into their mouths, so the materials used to make a toy are regulated to prevent", "-31.54052431085438" ], [ "within a child's toy has been criticized for the negative effects is may have on young girls minds as they are developing.\nIn 2007, Concerns over the body image and lifestyle the Bratz dolls allegedly promote were raised by the American Psychological Association after they established their \"Task Force on the Sexualization of Girls.\" In their published report, they cited concern over the adult-like sexuality the Bratz dolls allegedly portray. The report has been criticized for an apparent lack of supporting evidence and data.\nBratz were not the only dolls to be criticized in this report, which highlighted not only toys but", "-31.520933191059157" ], [ "colors, and unique textures. Through play with toys infants begin to recognize shapes and colors. Repetition reinforces memory. Play-Doh, Silly Putty and other hands-on materials allow the child to make toys of their own.\nEducational toys for school age children of often contain a puzzle, problem-solving technique, or mathematical proposition. Often toys designed for older audiences, such as teenagers or adults, demonstrate advanced concepts. Newton's cradle, a desk toy designed by Simon Prebble, demonstrates the conservation of momentum and energy.\nNot all toys are appropriate for all ages of children. Even some toys which are marketed for a specific age range can", "-31.487283581889642" ], [ "interests. When Christopher Noxon appeared on The Colbert Report on June 29, 2006, he remarked that \"There's a big difference between childish and childlike\".\nKaren Brooks explores what she calls the \"commodification of youth\": entertainers sell \"the teen spirit\" to adults who in the past were called \"young at heart\".\nIn South Korea, the buzzword \"kideolteu\" was used in 2015, highlighting the market trend of increasing toy sales (such as drones and \"electric wheels\") to kidults.\nThe term was first used in 1982 by Jim Ward-Nichols on the campus of Stevens Institute of Technology in Hoboken, NJ in its campus humor magazine DUCKLIPS.", "-31.463914328749524" ], [ "children's characters. Collections of Kinder Surprise toys have included Asterix, Fantasmini, Smurfs, and Minions. Ferrero and Kinder have also partnered with various companies, institutions, and people to promote Kinder Surprise, including The Walt Disney Company, Universal, and Smart. United Kingdom In 2000, three families who had lost children to choking on toys inside edible eggs campaigned for the products to be withdrawn from the European Union. Ten children worldwide have died from choking on parts of the Kinder toy surprises after they had eaten the chocolate egg; another was attributed to another manufacturer’s product.\nDefenders of the chocolates said that these", "-31.419242264364584" ], [ "the child's attention they could become so entertaining that parents may be tempted to turn over some of the child-rearing to the smart toys. Thus, children will be deprived of needed parental attention. In other words, because of their strong multimedia capabilities children may watch presentations provided by the smart toys and be entertained, but will not really play with the devices nor be otherwise engaged by them.\nJudy Shackelford, a toy industry veteran, has a more positive view regarding smart toys. She cautions that children may even be deprived should they be not exposed to them. She sees smart", "-31.419154859744594" ], [ "to help give toys to underprivileged children. He works with the Boy Scouts, Papa Johns, and Chick-Fil-A to collect toys. He usually lets his children come with him to deliver toys.", "-31.404513093080823" ], [ "respect others’ opinions. They lack basic manners and come into conflicts easily.\nMost of the parents are over-protective of their children and shield them from difficulties and injuries. They are often referred to as “monster parents”. Parents usually hire foreign domestic helpers to take care of their children, spoil them excessively and satisfy most of their requests. Indulging by parents may lead children to narcissism.\nKong Kids often love chasing new trends and pursuing well-known brands. Most of them own brand name goods and electronic gadgets such as mobile phones, IPads, IPods, digital cameras, etc. They do not treasure what they", "-31.2894769202685" ], [ "of Mr. Children supposedly came about during a talk in a dinner, in which the group thought the word \"children\" had a nice ring to it, but because they were no longer children themselves, they decided to add Mr. in front of it. They credit this change as a new way they started to look at the group.\nAfter changing their name and overall sound, Mr. Children auditioned at a music club called La Mama, failing to pass the first time, but passing a second audition to play at the club. After playing in the club, they were asked to try", "-31.285512807546183" ], [ "the little people love children and would take them away from bad or abusive parents or if the child was without parents and left in the woods to fend for themselves.\nOther legends say the little people if seen by an adult human would beg them not to say anything of their existence and would reward those who kept their word by helping them and their family out in times of need. From tribe to tribe there are variations of what the little people's mannerisms were like, and whether they were good or evil may be different. \nOne of the common", "-31.262707904767012" ], [ "much like their elders. These activities are similar to other forms of play worldwide. For instance, children can be seen comforting their toy dolls or animals, anything that they have modeled from adults in their communities.\nIn Brazil, we can find children playing with balls, kites, marbles, pretend houses or mud kitchens, like in many other countries. In smaller communities they use mud balls, little stones or cashews to replace marbles.\nAt an indigenous community of Sierra Nevada de Santa Marta in Colombia, children's play is highly valued and encouraged by leaders and parents. They interact with the children of different ages", "-31.25066433212487" ], [ "they are and who they will become is predetermined. Children learn at a very young age what it means to be a boy or girl in our society. Individuals are either given masculine or feminine names based on their sex, are assigned colors that are deemed appropriate only when utilized by a particular sex and are even given toys that will aid them in recognizing their proper places in society. According to Barbara Kerr and Karen Multon, many parents would be puzzled to know \"the tendency of little children to think that it is their clothing or toys that make", "-31.242610148503445" ], [ "were promoting toys; this was then used to decide which should be targeted by the campaign. The organisers set out their objectives, saying:\n“Toys are for fun, for learning, for stoking imagination and encouraging creativity. Children should feel free to play with the toys that most interest them. Isn’t it time that shops stopped limiting our children’s imagination by telling them what they ought to play with? The answer is simple – we’re asking retailers and manufacturers to sort and label toys by theme or function, rather than by gender, and let the children decide which toys they enjoy best. Let", "-31.219759009552945" ], [ "who choose not to have children for environmental reasons.\nSome marketers have proposed \"yappie\" (young affluent parent; modelled on yuppie) as a term to describe similar couples who do have children.", "-31.15999367558834" ], [ "as children, such as playing with female peers, playing female characters during role play, dressing up in female clothes, and playing with female gender-typical toys. This is in contrast to women who stated that they merely \"liked\" engaging in those activities as children. Some fa'afafine recall believing they were girls in childhood, but knew better as adults. In Samoa, there is very seldom ridicule or displeasure towards a biologically male child who states that they are a girl. For instance, one study showed only a minority of parents (20 per cent) tried to stop their fa'afafine children from engaging in", "-31.104733873944497" ], [ "each toy based on factors such as learning, problem solving, curiosity, creativity, imagination, and peer interaction. The results revealed that boys generally received higher scores for overall play quality than girls, and the toys with the best play quality were those identified as the most gender neutral, such as building blocks and bricks along with pieces modeling people. Trawick-Smith then concluded that the study encourages a focus on toys which are beneficial to both genders in order to create a better balance.\nWhile some parents promote gender neutral play, many parents encourage their sons and daughters to participate in sex-typed activities,", "-31.10407550475793" ], [ "Sometimes his children wonder if it's because he no longer loves them, and when they ask him if that is true he begins to cry and cuddles them close. \nGran – Em, Vita and Maxie's grandmother and Julie's mother who tends to get very stroppy at times. However, she really wants the very best for her family, and seeing her beloved daughter and grandchildren feeling so sad and hopeless is purely heartbreaking for her. She holds a strong grudge against Frankie (their Dad), but she also wishes she could wave a magic wand and make everything alright.\nDancer – Vita's reindeer", "-31.053121581091546" ], [ "Though the youngest of the babies, Tommy is brave and adventurous and it comes natural for him to serve as their leader, and, in stark contrast to Angelica, who frequently serves as an antagonist, he has a strong sense of justice and is unafraid to stand up for what he believes is right. Because of his goodhearted nature, he is sometimes easily manipulated or lied to. He is closest to Chuckie, as Phil and Lil, being twins, spend most of their time with one another and a strong familial bond. His catchphrase is \"A baby's gotta do what a baby's", "-30.96901690296363" ], [ "kid shows regard young viewers as babies. I wanted to treat them as their parents might if they were on TV.\"", "-30.91845386557179" ], [ "are electronic toys made for children that make noises and demand for care. These toys caused children to form a companionship with robots instead of human beings. Paro is a robotic baby seal that was created in Japan to perform therapeutic functions. Paro had positive psychological results for those in nursing homes. A woman constantly argued with her son and turned to the Paro for comfort and confided in the Paro instead of fixing things with her son. Society has turned to demanding more intimacy from sociable robots then from each other. People that use the robots for comfort feel", "-30.90275308082346" ], [ "all-time favourite American cereal slogan reads \"Silly rabbit, Trix are for kids.\" Promoting the impression of exclusion and importance. For toy company’s exclusion is established through gender. Toys are specially designed for boys and girls and are exclusively showcased in separate aisles. Children begin to develop stereotypical, gender based knowledge during preschool and by the age of seven they have strong, established views on toy gender. Research found that when children aged seven to eleven were asked to choose a toy, most selected traditional gendered based occupational toys, reflecting role play. Children throughout this age group were also more", "-30.886344854487106" ], [ "store because it brought her so much joy as a child; looking at the beautiful displays made her want to create them when she grew up so she could bring the same amount of joy to other poor children. Her over-protective sister, who always reminds Kaori of her habit of trusting people to easily, scolds Kaori often. Kaori falls deeply in love with Harashima, as he does with her but they find it hard to be accepted by their friends and families as they belong to different classes in society. She's twenty-three-years old and lives with her elder sister, Misao.", "-30.823748330876697" ], [ "even harm the development of children in that range. Age compression Age compression is the modern trend of children moving through play stages faster than was the case in the past. Children have a desire to progress to more complex toys at a faster pace, girls in particular. Barbie dolls, for example, were once marketed to girls around 8 years old but have been found to be more popular in recent years with girls around 3 years old. The packaging for the dolls labels them appropriate for ages 3 and up. Boys, in contrast, apparently enjoy toys and games over", "-30.820888222393478" ], [ "Room, where the toddlers are too young to know how to play with the toys, only to discover that they were deliberately assigned to that room and that moving to the Butterfly Room (where the preschoolers are older and more civilised) is a privilege that has to be earned. Buzz had earlier suspected that something was not right when he noticed the other Caterpillar Room toys going into hiding just before the toddlers came in. After Buzz turns down Lotso's offer to transfer him but not his friends, Lotso makes Buzz one of his henchmen, by switching him back to", "-30.816209033189807" ], [ "Bratty Babies Plot Two babies who are able to telepathically communicate with each other try to set their parents together.", "-30.80106742368298" ], [ "infants display more than male infants; whereas research by Karraker (1990) demonstrates that a caregiver's attention and involvement in the male infant's protection could be solely based on the perception of happiness and attractiveness of the child.\nThe gender of an observer can determine their perception of the difference in cuteness. In a study by Sprengelmeyer et al. (2009) it was suggested that women were more sensitive to small differences in cuteness than the same aged men. This suggests that reproductive hormones in women are important for determining cuteness.\nThis finding has also been demonstrated in a study conducted by T.R. Alley", "-30.78018212656025" ], [ " As they have gained acceptance in the marketplace, controversy has been brewing. One of the chief criticisms has been that despite often being technical marvels, many smart toys have only limited play value. In short, these toys neither involve the child in play activity nor do they stimulate his or her imagination. Consequently, regardless of store-shelf attractiveness, the child tires quickly of them after only one or two play sessions, and the parents' investment is largely wasted. Stevanne Auerbach, in her book Smart Play—Smart Toys introduces the notion of Play Quotient or simply PQ.\nAuerbach criticizes", "-30.747541448261472" ], [ "or modeling a new action to another stranger.\nIt was once believed that babies could not imitate actions until the latter half of the first year. However a number of studies now report that infants as young as seven days can imitate simple facial expressions. By the latter half of their first year, 9-month-old babies can imitate actions hours after they first see them. As they continue to develop, toddlers around age two can acquire important personal and social skills by imitating a social model.\nDeferred imitation is an important developmental milestone in a two-year-old, in which children not only construct symbolic", "-30.72735476514208" ], [ "companion, but is conflicted due to her desire to not abandon her family whom she loves and is thus unable to give a true answer. As she makes a statement of growing up in a real world, dolls start to turn back into inanimate toys, because her childhood imagination slowly goes away. Drosselmeier's warning of the time proves true, and the severely wounded Mouse King suddenly arrives for one last chance at revenge while mentally unstable due to his agony. The Nutcracker being the last doll still alive, tries to save Clara, but slowly turns back into a toy himself.", "-30.705926440976327" ], [ "a positive emotional attitude toward adults is crucial for infants' development, as it leads to a vital interest in what the adult presents to the infant and does in their presence, such as using language and manipulating cultural objects, such as toys (as opposed to mere \"natural\" objects, such as rocks). As Yuri Karpov (2003: 142) put it, \"Figuratively speaking, infants become interested in the external world because it has been presented to them by loved adults.\" Infants accept adults as mediators of their relations with the world, and show increasing interest in the actions they can perform with cultural", "-30.66586372378515" ], [ "are susceptible by Environmental factors like media, strangers, parents, and much more. A study by Ruble, Balaban, and Cooper, researchers examining gender development, expressed gender stereotypes in media and observed that children younger than four years old are likely to choose gender-typed toys if they have seen them on television being used by the same-sex models. This explains the factor of children becoming closed minded, researchers explain, at a very young age due to how certain genders are portrayed in media and television. Female Roles The gender-related content in advertising in the past as well as today portray females with", "-30.651377242989838" ], [ "if they were watching \"child pornography.\"With popularity of similar child beauty pageant television shows like Toddlers and Tiarra's, the public are concerned that young contestants are being displayed as \"sex objects on stage.\"\nChildren develop a sense of sexual identity during the ages of adolescence and sexualization makes this task more difficult for youth. When parents enter their child into beauty competitions they are encouraging their children to engage behaviors and practices that are socially associated with sexiness.\nAs Vernon R. Wiehe, professor in the University of Kentucky College of Social Work, states, \"sexualization occurs through little girls wearing adult women's clothing", "-30.594422120251693" ], [ "to see why puppies are being loved more than infants. He has infiltrated Tim's residence because his parents work for Puppy Co., which will unleash a new puppy on pet convention in Las Vegas. The Boss Baby stays intelligent by drinking a \"Secret Baby Formula\" that enables a baby to act like an adult. However, if a baby does not drink it after a period of time, he or she becomes a regular baby. When they overhear Boss Baby's boss threaten to fire him for not bringing in information, which would strip him of his formula and strand him at", "-30.533094930113293" ], [ "see in children’s art. There’s something childlike, too, in the feeling of inventiveness and unselfconsciousness, with scenes that feature fantastic amalgams of monsters, robots, and other magical elements. Yet for all that, there’s also a sense of sophistication, as well as carnivalesque and absurdist humour – from in-jokes about cubism to his fetishistic obsession with women’s buttocks, which become weirdly transformed into all sorts of freaky faces and patterns.", "-30.53146691834263" ], [ "of characters were available as toys since at least the early-2000s. Many likened the line to previous series like Muppet Babies. Controversy and criticism The production of DVDs and other screen-based media for children under the age of two is extremely controversial. The American Academy of Pediatrics recommends that children under two be kept away from screen media and Sesame Beginnings has been criticized by a number of early childhood development experts who point to research suggesting that television viewing by babies can harm language development and sleep patterns. An April 23, 2006 article in The Washington Post quoted Harvard", "-30.46083378250478" ], [ "of \"high infantile\" faces of dogs, cats and humans as opposed to \"low infantile\" faces of those three species. Hormones and cuteness variation There are suggestions that hormone levels can affect a person's perception of cuteness. Konrad Lorenz suggests that \"caretaking behaviour and affective orientation\" towards infants as an innate mechanism, and this is triggered by cute characteristics such as \"chubby cheeks\" and large eyes. The Sprengelmeyer et al. (2009) study expands on this claim by manipulating baby pictures to test groups on their ability to detect differences in cuteness. The studies show that premenopausal women detected cuteness better than", "-30.438916883431375" ], [ "walks in strollers and take them shopping. Reborn hobbyists refer to the emotional response to holding their dolls as cuddle therapy. Studies suggest cuddling a baby causes a release of hormones which produce a sense of emotional well-being, and some psychologists believe that this may happen with realistic dolls as well. Consultant psychiatrist Raj Persaud explains that mothering a real newborn baby releases the hormone oxytocin in the mother, and hypothesizes that this may explain why \"reborn mothers\" become emotionally attached to the reborn baby doll.\nFor grieving parents who form emotional bonds with reborn dolls, some child bereavement counselors advise", "-30.415127646454494" ], [ "and gender-neutral toys as more desirable for their children than cross-gender-typed toys. This indicates that most traditional parents limit their child interests and behaviors than egalitarian parents.\nWhen it comes to education, parents’ attitudes towards their child gender reflects on their expectation for the child. Although Parents are still unwilling to send their daughters to the schools, there is a low participation rate of female education compared to male, a case study showcased. Parents tend to treat their sons and daughters differently, making the sons preferred over the daughters due to the gender roles society has placed due to them considered", "-30.40676398994401" ], [ "grow older, meaning the toys can never be outgrown. She tries to persuade Woody to join the others in beginning their lives anew at the daycare, but Woody reluctantly calls her and the other toys selfish and leaves to return to Andy alone, leaving Jessie hurt and saddened. Shortly after, she and the other toys discover they have been placed in a room with very young children, who roughly yet innocently abuse them. Jessie gets her ponytail used as a paintbrush and is covered in green paint in the process, much to her disgust.\nAfterward, Mrs. Potato Head sees Andy searching", "-30.403728511417285" ], [ "of males. An additional study found that a gendered divide in regards to toys may express itself as early as nine-months of age. Despite these apparent differences, a study of toddlers showed that both boys and girls were equally active when playing, and both sexes preferred toys that allowed them to express this.\nThe specific cause of this sex difference has also been investigated. A study with 112 boys and 100 girls found that the difference in play behavior appeared to be semi-correlated with fetal testosterone. Girls with congenital adrenal hyperplasia and thus exposed to high androgen levels during pregnancy tend", "-30.370126220281236" ], [ "children toys and candy (\"caramelle\") or fruit, while the bad children get coal (\"carbone\"), onions or garlic.\nAnother Christian legend takes a slightly darker tone as La Befana was an ordinary woman with a child whom she greatly loved. However, her child died, and her resulting grief maddened her. Upon hearing news of Jesus being born, she set out to see him, delusional that he was her son. She eventually met Jesus and presented him with gifts to make him happy. The infant Jesus was delighted, and he gave La Befana a gift in return; she would", "-30.321848328458145" ], [ "However, they discover the terrible truth that the toys are old, worn and already broken when they completely fall apart when played with. The children are traumatized and burst into tears over losing them and having no other Christmas presents.\nMeanwhile, Professor Grampy is out riding through the snow in his outboard motor-driven sleigh, singing the title song to himself. He soon hears crying as he's passing the orphanage, so he parks the sleigh, runs to the door and peeps through the window to see the orphans wailing and tearfully heading back to their bedroom. Grampy feels distressed for them and", "-30.320400589262135" ], [ "a passive observer.\" She continues: \"...you want the child to engage with the world. If the toy does everything if it sings and beeps and shows pictures, what does the child have to do?\"\nSmart toys should have very clean, easy-to-understand and navigate user interfaces. Claire Lerner, a child-development specialist, says that pretend play can be inhibited by highly structured toys: \"They superimpose someone else's story on the kids. So kids don't develop their imaginations.\" In her view, simpler toys are preferable, because they are more flexible.\nFrom a designer of smart toy's viewpoint, this means that in order to achieve", "-30.263208936994488" ], [ "they quite frequently have no relation to the person's full name and are often humorous and/or nonsense words. Babies may be given a nickname of a relative or named for a characteristic of birth, e.g., \"little\". Traditionally, nicknames would relate to things of low value, e.g., \"dirt\", which was to convince evil spirits lurking in the vicinity that the child was not worthy their attention. Today this folk custom is on the decline.\nSome common nicknames translate into English as \"small\", \"fatty\", \"pig\", \"little\", \"frog\", \"banana\", \"green\", or \"girl/boy\". Though rare, sometimes Thai children are given nicknames in the order they", "-30.2531912359118" ], [ "kids” are a product of our failures, and not their own.\"", "-30.24731023889035" ], [ "girls tend to gravitate towards dolls, but these preferences are not absolutes. A study by Alexander, Wilcox, and Woods showed that female infants showed more visual interest in a doll over a toy truck while male infants showed more visual interest in a toy truck over a doll, but these differences were more pronounced in the females. This study suggests that preferences for feminine or masculine toys precede any sex differences in the perceptual features of such toys, leading to the assumption that gender-based toy preference is innate.\nOne of the most compelling theories in regards to biologically determined gender", "-30.207952326280065" ], [ "a way for their children to interact with others and not feel as if they were different.\nThere are many parents who believe that beauty pageants teach their children to always perform their very best and boost their self-esteem. One mother of a two-year-old participant on Toddlers & Tiaras claimed “‘It’s just building that confidence early so she doesn’t have to hide away and she can achieve things she wants to achieve without being shy.\" She believes that gaining this self-confidence at a young age will benefit her child in the long run by helping her open up to people more", "-30.174966501333984" ], [ "scream and stiffen her body. Later this reaction is applied to different situations. Children get angry when they are forced to take a bath or clean their room. These situations provoke rage because they are associated with physical restraint.\nLove: Watson said that love was an automatic response from infants when they were stroked lightly, tickled or patted. The infant then responds with smiles and laughs and other affectionate responses. According to Watson, infants do not love specific people but they are conditioned to do so. Because the mother's face is progressively associated with the patting and stroking it becomes the", "-30.147144437069073" ], [ "has become even more unusual and striking. They dress impeccably, always walk as a group, speak in an adult manner, and behave maturely, but they show no conscience or love, and demonstrate a coldness to others, causing the villagers to fear and be repulsed by them.\nThe children begin to exhibit the power to read minds and to force people to do things against their will. There have been a number of villagers' deaths since the children were born, many of which are considered unusual, and some citizens believe the children are responsible. This is confirmed when the children are seen", "-30.107598045527993" ], [ "infancy, a baby signals desire for food, contact, and comfort by crying. This behavior should be viewed as a distress signal indicating that some biological need is not being met. Although parents sometimes worry about spoiling their children by giving them too much attention, specialists in child development maintain that babies cannot be spoiled in the first six months of life. During the first year, children are developing a sense of basic trust and attachment. In general, the more attention and care they receive from their parents, the better. Only children Alfred Adler (1870–1937) believed that \"only children\" were likely", "-30.095665052249387" ], [ "and toy cars, and that the preference increased with age.\nIn a 2018 study done by developmental psychologist Lauren Spinner, the effects of images of children playing with stereotypic or counter-stereotypic toys was analyzed on kids age 4 to 7 years old. After the subjects were shown one of the images, they were asked to pick whether a boy or girl would play with a selection of toys such as a baby doll, jet fighter, tool kit, tea set, etc. Children who were shown the counter-stereotypic photos were more open to the idea of boys and girls possibly liking toys usually", "-30.073481875464495" ], [ "toys are used in therapy rooms to introduce children to the language of emotion. They include 2.5 inch vinyl figures and 10\" plush dolls.", "-30.048853840904485" ], [ "quoted Dr. Brian Young of Exeter University as saying \"parents may feel awkward but I don't think children see the dolls as sexy. They just think they're pretty.\" Isaac Larian, in comments given to the BBC, voiced the opinion that the report was a \"bunch of garbage\" and that the people who wrote it were acting irresponsibly. Legal actions The Bratz range of dolls have affected the sale of Mattel's leading fashion doll, Barbie. In 2004, sales figures showed that Bratz dolls outsold Barbie dolls in the United Kingdom, although Mattel maintained that in terms of the number of dolls,", "-30.043754908721894" ], [ "to lack of human contact, babies developed without stimulation, which led to self stimulation such as hand flapping or rocking back and forth. With these characteristics, children were often misdiagnosed to have mental disabilities and forced to move to another institution. They were also given psychiatric medication to treat their behaviors, or they were tied to their beds to prevent self-harm.\nEven after being adopted, children had problems forming attachments to their new parents. When testing the children's responses in comparison to other children, scientists monitored their brain responses to seeing their adoptive mothers or an unfamiliar woman. The results, according", "-30.024227056768723" ], [ "as visualized imaginary friends, in the lifetimes of sociable people with many real friends. Promote respectful interaction Toys have greater play value that promote respectful, non-violent and non-stereotyped interaction \namong children. For example, Barbie is an example of a toy that reinforces gender stereotypes for girls\ndespite its status as a classic toy. Useful for further learning Play value from a child development perspective is enhanced by toys and games that help children develop skills useful\nfor further learning and mastery such as Scrabble and The Game of Life In playwork terms - play value is the individual child's subjective", "-30.0144302098779" ], [ "children are also taught at a young age that they are different from each other. When playing, if a girl is too rough she’ll be more likely to get scolded than if she were a boy. Common sayings like “boys will be boys” and “you should be more ladylike” train children that girls are not allowed to do the same things boys can do. The division only becomes more apparent as kids grow up. Even as fully grown adults, women are looked upon negatively in numerous male-dominated positions. The same is for men who work in female-dominated jobs. In a", "-30.011634902388323" ], [ "a supplement, not a replacement, for traditional play activities.\nStevanne Auerbach emphasizes smart toys which have strong play value for the child, and are the \"right toy at the right time.\" She does not favor those toys which fail to encourage discovery and exploration. Auerbach quips that \"a toy playing with a child, as opposed to a child playing with a toy, is not beneficial for the child.\nThose toys that give the child control over interaction are best according to some child development researchers. Kiely Gouley argues that \"...some of these toys are very entertaining and they make the child", "-29.910453801741824" ], [ "given DoDo toys to play with, their ability to learn from that character increased. In a later study, this effect was found to be greatest when children showed stronger parasocial relationships: Children's success on the seriation task, and therefore their ability to learn from a less familiar character, was greatest for children who exhibited more emotional nurturing behaviors toward the DoDo toy during play (Gola, Richards, Lauricella, & Calvert, 2013).\nPersonalization of a character makes a child more likely to nurture the character, and thus more likely to form a parasocial relationship that would improve learning from videos featuring the character", "-29.894103973929305" ], [ "or sadness), what they mean, and what kinds of situations typically elicit them. Children develop these skills at very early stages in life and continue to improve facial recognition, discrimination, and imitation between the ages of 3 and 10. One study showed that toddler's spontaneous facial expressions reflect the emotions shown by other toddlers, this is called \"decoding\". This indicates that facial expressions are affected by the social environment, and are an important aspect in creating relationships with others in our social groups.\nIn one study, researchers found that facial expressions of sadness may be more beneficial for toddlers than other", "-29.881990274298005" ], [ "customize the same toy for each gender, which ultimately doubles their revenue. For example, Legos added more colors to certain sets of toys in the 1990s, including colors commonly attributed to girls such as lavender.\nIt has been noted by researchers that, \"Children as young as 18 months display sex-stereotyped toy choices\". When eye movement is tracked in young infants, infant girls show a visual preference for a doll over a toy truck (d > 1.0). Boys showed no preference for the truck over the doll. However, they did fixate on the truck more than the girls (d = .78). This", "-29.87675143445813" ], [ "mother-daughter, and the care and love associated with it). As adults help toddlers to discover the social roles behind the object actions they engage in (e.g. \"You're feeding the baby just like a mommy would\"), toddlers gain an increasing interest in adult social relations, which motivates them to take up the next leading activity (Karpov 2005). Early childhood: sociodramatic play From approximately age three to six years, sociodramatic play (or role play) is proposed to be children's leading developmental activity. It is essential to note that sociodramatic play is the exact opposite of what is normally thought of as \"free", "-29.860516520304373" ] ]
313glp
Why are really fucked up hateful subreddits allowed to exist?
[ "The point of freedom of speech is that it's not up to you to decide what is \"awful filth\". You think it is, which is fine, but the people who post there (not me) don't. To ban their stuff would be to say that your opinion was more important than theirs. Also, it's easy enough to not be subscribed and never have that stuff show up.", "Better the devil you know than the devil you don't. Prohibition never works, it just pushes behavior into a darker corner of society.", "It is not the role of reddit, twitter, comcast, Verizon, or any other information medium to regulate content. That's all.", "You're going to get a lot of answers from privileged folks about the absoluteness of free speech, and essentially that's the philosophy Reddit embraces. What it omits is that moderating a site so as not to provide a platform for violent or hateful rhetoric is not a violation of free speech as Reddit is not a governmental entity (a certain cop-out of a post by a certain ex-CEO notwithstanding), and it's questionable in many cases as to whether hate speech is protected even if it were.", "I'm going to dispute your premise (and the premise of many responders here). Reddit does not promote free speech. It allows certain kinds of speech in a private forum. It already regulates speech beyond what we would see as \"free\" (as in unregulated). Hate speech is a good example. Prohibited on many subreddits, but not even government can arrest you for it. Furthermore, the entire upvote-downvote system has been abused to the point of censoring minority opinions. (I call this the Downvote Disease, btw). When you get enough downvotes, your comment is hidden, and you start needing to wait in order to reply. How does this tie into your question? See what happens to people with unpopular opinions. Your example of r/rapingwomen works, but it's the same in a lot of subreddits like having a pro-gun opinion in /r/GunsAreCool or an anti-gun position in /r/progun. The minority opinion is driven out of subs into their own little subs, and removing them without them violating the site's terms of service is a lawsuit waiting to happen.", "Banning the subreddit doesn't make people stop thinking that way, it just sends them underground. At least now we know who they are and we know where they are and if they cross the line between hate speech and hate crime, they'll be caught. And by giving them a playground, it keeps them from spewing their hate all over the other subreddits...", "Because there have been no news organizations pushing to close them. Creepshots was only banned because of the news finding out about it. It has nothing to do with free speech and everything to do with getting more users. If a subreddit gets in the news about something bad it will be banned, even if said subreddit has been doing it for years.", "I am not sure why subreddits devoted to Christianity, Islam, Republicans and many others are allowed to exist. (Your answer is that it is all subjective. Once you close down r/deathtofags, you need to close down r/christianity for similar reasons.) Too much censorship is slavery.", "Like you said, its free speech. That's the dark side of freedom you do have the right to be a total racist, misogynist douchebag.", "It's a good way to monitor my potential haters." ]
[ [ "pamphlets. In contrast, the Internet allows hate group members from all over the world to engage in real-time conversations. The Internet has been a boon for hate groups in terms of promotion, recruitment and expansion of their base to include younger audiences. An Internet hate group does not have to be part of a traditional faction such as the Ku Klux Klan.\nWhile many hate sites are explicitly antagonistic or violent, others may appear patriotic or benign, and this façade may contribute to the appeal of the groups. Hate group websites work towards the following goals: to educate group members and", "-30.400661960593425" ], [ "written that she \"fears being cast suddenly as one of the 'bad guys' for being insufficiently radical, too nuanced or too forgiving, or for simply writing whose offensive dimensions would be unknown to me at the time of publication\". While it is important to point out misogyny and other forms of discrimination in the realm of the Internet, facing and educating those who may not understand that some of their actions are offensive, it is also important to give others respect and acknowledge others education or lack of. While the internet is a great place for communication, \"Online harassment and", "-29.59840045666897" ], [ "that \"Although some of the sites make an attempt at civility and try to back their arguments with facts, they are almost all thick with misogynistic attacks that can be astounding for the guttural hatred they express\".\nMore specific claims were made about r/MensRights in particular, saying that it showed anger \"toward any program designed to help women\", and that the subreddit \"trafficks in various conspiracy theories\", using a moderator's statements as an example of this behavior. Outlets such as The Huffington Post interpreted the report as saying the subreddit was a hate group.\nIn late March 2012, Mark Potok (the Intelligence", "-29.524633695487864" ], [ "was reported that Facebook classified the page as ‘controversial humour’. Hate speech Article 20 of the ICCPR states “Any advocacy of national, racial or religious hatred that constitutes incitement to discrimination, hostility or violence shall be prohibited by law.” Hate speech is intended to disturb violence or prejudicial actions against a group of people based on their ethnicity, race, nationality or sexual orientation. Cyberspace has also been used in this way as a medium for destruction. \nThe danger to human rights becomes apparent when terrorists form together to scheme and agitate people to commit violence towards a common good. “Al-Qaeda”", "-28.802509719040245" ], [ "deeply contested as they hit at the right to privacy and its intersection with free expression. The majority of online trolling and hate speech attacks come from pseudonymous accounts, which are not necessarily anonymous to everyone. Genuinely anonymous online communications are rare, as they require the user to employ highly technical measures to ensure that he or she cannot be easily identifiable.\nA further complication is the transnational reach of the Internet, raising issues of cross jurisdictional co-operation in regard to legal mechanisms for combating hate speech. While there are Mutual Legal Assistance treaties in place among many countries, these are", "-28.765051799413868" ], [ "are not known to people and they may have a greater impact than the generally known reasons. Many studies have been done in order to help and better identify what the main reasons were and who the main affected groups of people were. Political protests have been done to try and crack down on more of these attacks with a greater penalty.\nA hate crime is defined as the victimization of individuals because of their actual or perceived race, ethnicity or national origin, sexual orientation, religion, gender, gender identity or disability. Hate crimes against LGBTQIA people often occur because the perpetrators", "-28.665524676209316" ], [ "list of aggravating factors that are commonly referred to by the media as “hate crimes”. Aggravating factors in criminal sentencing currently include hostility to a victim due to characteristics such as sexuality, race or disability.\nIn 2016, Nottinghamshire Police began a pilot project to record misogynistic behaviour as either hate crime or hate incidents, depending on whether the action was a criminal offence. Over two years (April 2016-March 2018) there were 174 reports made, of which 73 were classified as crimes and 101 as incidents.\nIn September 2018 it was announced that the Law Commission would conduct a review into whether misogynistic", "-28.512366919836495" ], [ "the conditions in which the prisoners are treated. Hate crimes Hate crimes are a social problem in the United States because they directly marginalize and target specific groups of people or specific communities based on their identities. Hate crimes can be committed as the result of hate-motivated behavior, prejudice, and intolerance due to sexual orientation, gender expression, biological sex, ethnicity, race, religion, disability, or any other identity. Hate crimes are a growing issue especially in school settings because of the young populations that exist. The majority of victims and perpetrators are teenagers and young adults, the population that exists within", "-28.507538127945736" ], [ "conduct, as well as hostility due to ageism, misandry or towards groups such as goths, should be treated as a hate crime.\nIn October 2018, two senior police officers, Sara Thornton, chair of the National Police Chiefs' Council, and Cressida Dick, Commissioner of the Metropolitan Police, stated that police forces should focus on more serious crimes such as burglary and violent offences, and not on recording incidents which are not crimes. Thornton said that \"treating misogyny as a hate crime is a concern for some well-organised campaigning organisations\", but that police forces \"do not have the resources to do everything\". Criticism", "-28.501026528072543" ], [ "\"doing something that looks useful\", and that Gab's removal from the internet was \"digital censorship\". Monster subsequently became an active user and defender of the network. Monster has received media attention for publicly defending violent neo-Nazi Gab users, maligning people who criticize the site and call for stricter moderation, and making unevidenced claims that racist users are fake accounts created to hurt the site's reputation.\nMonster has also defended the idea of hosting 8chan, a far-right imageboard known for its hateful content, connections to multiple mass shootings, and hosting of child pornography. Epik briefly hosted 8chan after Cloudflare terminated services", "-28.309660838684067" ], [ "\"hate crimes\" causes groups to feel persecuted by one another, and that this impression of persecution can incite a backlash and thus lead to an actual increase in crime. Jacobs and Potter also argued that hate crime legislation can end up only covering the victimization of some groups rather than all, which is a form of discrimination itself and that attempts to remedy this by making all identifiable groups covered by hate crime protection thus make hate crimes co-terminus with generic criminal law. The authors also suggest that arguments which attempt to portray hate crimes as worse than normal crimes", "-28.283204833976924" ], [ "on violence in recent years. This has been attributed to various factors, including influence from overlapping online hate groups and the rise of the alt-right and white supremacist groups. The misogynistic and sometimes violent rhetoric of some members of incel communities has led to numerous bans from websites and webhosts. Incel communities continue to exist on more lenient platforms, such as Reddit, 4chan, and Voat. There are also incel forums that disapprove of hatred, and a dating website that caters to incels. Ideology Many incel communities are characterized by resentment, self-pity, racism, misogyny, misanthropy, and narcissism. Discussions often revolve around", "-28.206260900071356" ], [ "a major platform by Anonymous for parody and other purposes. The not safe for work site celebrates a subversive \"trolling culture\", and documents Internet memes, culture, and events, such as mass pranks, trolling events, \"raids\", large-scale failures of Internet security, and criticism of Internet communities that are accused of self-censorship in order to gain prestige or positive coverage from traditional and established media outlets. Journalist Julian Dibbell described Encyclopædia Dramatica as the site \"where the vast parallel universe of Anonymous in-jokes, catchphrases, and obsessions is lovingly annotated, and you will discover an elaborate trolling culture: Flamingly racist and misogynist content", "-28.15912036242662" ], [ "to a subreddit as clearly awful as r/niggers that we go into the decision to ban subreddits with a lot of scrutiny\". Following the ban of r/niggers, the subreddit r/Coontown grew to become the most popular \"Chimpire\" site, with over 15,000 members at its peak. Many of the posters on these subreddits were formerly involved with r/niggers. It was created by a troll known as \"EugeneNix\" as a method of exposing a perceived left-wing bias on Reddit.\nOne of these subreddits, r/shitniggerssay, was banned in June 2015 at the same time as fatpeoplehate. In the midst of changes to Reddit's content", "-28.144273402984254" ], [ "out potential terrorists. Kabir echoed Reem Bakker's sentiments, an interviewee in Kabir's study, that the failed attempt further ostracized the Muslim community. Hate crimes In general, the definition of a hate crime involves two elements that distinguish it from other illegal acts. Namely, that the crime must be a criminal offense that is backed by a biased motivation. This biased motivation is usually revealed when an individual targets an attack on an individual because of some immutable personal characteristic that is protected by law. Hate crimes vary from assault, murder, damage to property, work place discrimination and housing discrimination.\nIn 2000,", "-28.030991806881502" ], [ "because they spread fear in a community are unsatisfactory, as normal criminal acts can also spread fear yet only hate crimes are singled out. Indeed it has been argued that victims have varied reactions to hate crimes, so it is not necessarily true that hate crimes are regarded as more harmful than other crimes. Heidi Hurd argues that hate crime represents an effort by the state to encourage a certain moral character in its citizen and thus represents the view that the instillation of virtue and the elimination of vice are legitimate state goals, which she argues is a contradiction", "-27.99650169792585" ], [ "Some reports show that extreme right-wing groups take advantage of the freedom of speech guaranteed by many countries’ legislations, to post hateful comments that however do not represent full hate-speech or illegal acts. Furthermore, these groups seem to mobilize efforts on Internet and social media to convey a more acceptable public image and recruit new members who would otherwise be offended by blatantly racist or hate-based discourse.\nFor example, the discourse found on Stormfront is particularly noteworthy because it clearly shows the transition towards a more \"acceptable\" form of racist discourse. The discourses seem to be less aggressive, even condemning violence", "-27.92102344741579" ], [ "supremacist groups and anti-Semitic, anti-government or extremist groups that have committed hate crimes. The SPLC's definition of a \"hate group\" includes any group with beliefs or practices that attack or malign an entire class of people—particularly when the characteristics being maligned are immutable. However, at least for the SPLC, inclusion of a group in the list \"does not imply a group advocates or engages in violence or other criminal activity.\" According to USA Today, their list ranges from \"white supremacists to black nationalists, neo-Nazis to neo-Confederates.\"\nAccording to the SPLC, from 2000 to 2008, hate group activity saw a 50", "-27.898273156257346" ], [ "Controversial Reddit communities The social news site Reddit has occasionally been the topic of controversy due to the presence of communities on the site (known as \"subreddits\") devoted to explicit or controversial material. In 2012, Yishan Wong, the site's then-CEO, stated, \"We stand for free speech. This means we are not going to ban distasteful subreddits. We will not ban legal content even if we find it odious or if we personally condemn it.\"\nThe subreddit r/jailbait, devoted to suggestive or revealing photos of underage girls, was one of the most prominent subreddits on the site before it was closed down", "-27.88599698935286" ], [ "hate speech has been raised. In both the Christchurch and El Paso shootings, the perpetrator posted hate speech manifestos to 8chan, a moderated imageboard known to be favorable for the posting of extreme views. Concerned politicians and citizens raised calls at large tech companies for the need for hate speech to be removed from the Internet; however, hate speech is generally protected speech under the First Amendment, and Section 230 removes the liability for these tech companies to moderate such content as long as it is not illegal. This has given the appearance that tech companies do not need to", "-27.79213370080106" ], [ "hate them, it is because this psychological maneuver helps to \"decrease the dissonance of killing\". Such a phenomenon might also \"explain long-standing grudges like Hatfield vs. McCoy\" or vendetta situations in various cultures: \"Once we start, we may not be able to stop and engage in behavior we would normally never allow.\" As one commentator has put it, \"Jailers come to look down on inmates; camp guards come to dehumanize their captives; soldiers create derogatory terms for their enemies. It's difficult to hurt someone you admire. It's even more difficult to kill a fellow human being. Seeing the casualties you", "-27.787989138509147" ], [ "comic strip and Krahulik and Holkins, made claims of receiving verbal abuse through social media and death threats. \"Greater Internet Fuckwad Theory\" \"John Gabriel's Greater Internet Fuckwad Theory\" was posted in the Penny Arcade strip published March 19, 2004. It regards the online disinhibition effect, in which Internet users exhibit unsociable tendencies while interacting with other Internet users. Krahulik and Holkins suggest that, given both anonymity and an audience, an otherwise regular person becomes aggressively antisocial. In 2013, Holkins gave the corollary that \"Normal Person - Consequences + Audience = Total Fuckwad\".\nClay Shirky, an adjunct professor at New York University", "-27.736751380143687" ], [ "Certain politicians, including Member of Parliament and the leader of the Finns Party Jussi Halla-aho, consider the term \"hate speech\" problematic because of the disagreement over its definition. France France's penal code and press laws prohibit public and private communication that is defamatory or insulting, or that incites discrimination, hatred, or violence against a person or group on account of place of origin, ethnicity or lack thereof, nationality, race, specific religion, sex, sexual orientation, or handicap. The law prohibits declarations that justify or deny crimes against humanity—for example, the Holocaust (Gayssot Act). Germany In Germany, Volksverhetzung (\"incitement to hatred\") is", "-27.72593611339107" ], [ "otherwise limit political violence and tyranny of the majority. Hate speech (which refers to the advocacy and incitement of genocide or violence against a particular defined racial, ethnic, gender, sexual, religious or other identifiable group), and obscenity (a broad term referring to literature that is unreasonable, dangerous or intensely inappropriate to society at large, such as child pornography or fraudulent medication intended to promote sexual virility), are two examples that gain significant attention from the media and in public discourse. Canadian libel and defamation law Limits on speech were incorporated in the criminal code in relation to treason, sedition, blasphemous", "-27.689257582387654" ], [ "offline, there are peculiar challenges unique to online content and its regulation. Those challenges related to its permanence, itinerancy, anonymity and cross-jurisdictional character are among the most complex to address.\nHate speech can stay online for a long time in different formats across multiple platforms, which can be linked repeatedly. As Andre Oboler, the CEO of the Online Hate Prevention Institute, has noted, \"The longer the content stays available, the more damage it can inflict on the victims and empower the perpetrators. If you remove the content at an early stage you can limit the exposure. This is just like cleaning", "-27.669938176113646" ], [ "White Nationalist, Nazi, anti-semitic, Islamic extremist websites and at least one fundamentalist Christian website. Under French and German law, hate speech and Holocaust denial are illegal. In the case of Germany, violent or sex-related sites such as YouPorn and BME that the Bundesprüfstelle für jugendgefährdende Medien deems harmful to youth are also censored.\nGoogle has complied with these laws by not including sites containing such material in its search results. However, Google does list the number of excluded results at the bottom of the search result page and links to Lumen (formerly known as Chilling Effects) for explanation. Sweden In March", "-27.655703332085977" ], [ "for incitement to \"hate speech.\" The law defines hate speech as speech that instigates hatred, discrimination, or violence based on race, ethnicity, nationality, religion, sexual orientation, marital or social status, or disability. Internet social networks have become increasingly popular with anti-Semitic groups. Web site administrators were deleting anti-Semitic comments under online media articles, but gradually stopped the practice.\nThe constitution and law prohibit arbitrary interference with privacy, family, home, or correspondence, and the government generally respects these provisions in practice. The security services can access electronic data with judicial permission when investigating cyber and serious crimes. However, NGOs criticize gaps in", "-27.631823061208706" ], [ "of its non-criminal connotations. Members of the media sometimes seem unaware of the distinction, grouping legitimate \"hackers\" such as Linus Torvalds and Steve Wozniak along with criminal \"crackers\".\nAs a result, the definition is still the subject of heated controversy. The wider dominance of the pejorative connotation is resented by many who object to the term being taken from their cultural jargon and used negatively, including those who have historically preferred to self-identify as hackers. Many advocate using the more recent and nuanced alternate terms when describing criminals and others who negatively take advantage of security flaws in software and hardware.", "-27.62823250933434" ], [ "is a mistake to underestimate the strength of the hate-violence movement, its apologists and its silent partners.\nIn the US, crimes that \"manifest evidence of prejudice based on race, religion, sexual orientation, or ethnicity, including the crimes of murder and nonnegligent manslaughter; forcible rape; robbery; aggravated assault; burglary; larceny-theft; motor vehicle theft; arson; simple assault; intimidation; and destruction, damage or vandalism of property\", \ndirected at the government, an individual, a business, or institution, involving hate groups and hate crimes, may be investigated as acts of domestic terrorism. Hate speech Counter-terrorism expert Ehud Sprinzak argues that verbal violence is \"the use of", "-27.595033610705286" ], [ "\"networked misogyny\", and urged the posts in such forums be taken seriously not only in the context of hate speech but also as a form of grooming that could radicalize \"impressionable and vulnerable disillusioned young men\". Sociological research on incel communities has analyzed them as a hybrid masculinity, in which privileged men distance themselves from hegemonic masculinity while simultaneously reproducing it.\nCriticism has also been directed against platforms that host or have hosted incel content, including Reddit (who banned the /r/incels community in 2017, and banned most of the remaining incel communities in September 2019) and Twitter. Cloudflare, which provides services", "-27.578313915990293" ], [ "victim. It called for the revision of Section 246* of title 18 of the United States Code as well as the addition of a subsection outlining the punishment for anyone found guilty of a hate crime. Statistics show that minority groups are the main victims of hate crimes. Crimes against gay men and lesbians are said, by researches in Los Angeles County, to be the most severe form of hate crimes. In summary, the bill's intention was to make illegal the willful harm or attempt to harm a person based on their actual or perceived gender or sexual orientation Legal", "-27.538216849439777" ], [ "through cyberbullying. An individual who expresses hatred for another person or criticizes them in a negative way is using bdelygmia to bully them. Lynette Hunter implies that individuals who do not wish to resort to physical violence use a rhetorical device such as bdelygmia to try to attack someone through the delivery of words. Politics When people disagree with one another, they often try to associate their opposition with negative connotations. Lynette Hunter describes rhetorical violence in politics as a way to persuade people through the negative criticism of another rather than through physical force – when, for example, one party,", "-27.537210182330455" ], [ "r/transfags, and r/shitniggerssay. A Reddit admin said, \"We will ban subreddits that allow their communities to use the subreddit as a platform to harass individuals when moderators don’t take action\".\nBecause of the ban, Reddit users flooded the site with pictures of overweight people and Reddit's interim CEO Ellen Pao. Due to the decision to ban these subreddits, some users moved to Voat, a social aggregation website similar to Reddit. Gore Related to the Christchurch mosque shootings, r/gore was banned for \"glorifying or encouraging violence\" at approximately 17:35 UTC on 15 March 2019. Greatawakening The subreddit r/greatawakening was a subreddit for", "-27.523941375227878" ], [ "hateful, threatening, or abusive, and targets a person on account of disability, ethnic or national origin, nationality (including citizenship), race, religion, sexual orientation, or skin colour. The penalties for hate speech include fines, imprisonment, or both. Legislation against Sectarian hate in Scotland, which is aimed principally at football matches, does not criminalise jokes about people's beliefs, nor outlaw \"harsh\" comment about their religious faith. United States The United States does not have hate speech laws, since American courts have repeatedly ruled that laws criminalizing hate speech violate the guarantee to freedom of speech contained in the First Amendment to the", "-27.50683141220361" ], [ "misogynistic. His inclusion on the list was reported by several publications, some of which mocked the inclusion for being extreme. In response to criticism, the SPLC later clarified that it was not labeling the sites as members of a hate movement, but wished to draw attention to \"specific examples of misogyny and the threat, overt or implicit, of violence\".\nIn 2014, The Washington Post columnist Caitlin Dewey stated that Valizadeh was one of a number of internet writers considered misogynist, writing: \"Valizadeh owns the website ReturnofKings.com, which bans 'women and homosexuals' from commenting.\" Dewey commented that recent articles on ReturnofKings.com included", "-27.31650996301323" ], [ "their own definitions of hate speech and measures to respond to it. For a user who violates the terms of service, the content he or she has posted may be removed from the platform, or its access may be restricted to be viewed only by a certain category of users (e.g. users living outside a specific country).\nThe principles that inspire terms of service agreements and the mechanisms that each company develops to ensure their implementation have significant repercussions on the ability that people have to express themselves online as well as to be protected from hate speech. Most intermediaries have", "-27.285359752422664" ], [ "as follows: \"There are two main features to Hatebase. The first is a Wikipedia-like interface which allows users to identify hate speech terms by region and the group they refer to. This could have some value for researchers, but Hatebase's developers are especially excited by the second main feature, which allows users to identify instances when they've heard these terms used.\" The example of the Rwandan Genocide was cited in that article and also in an article about Hatebase on Maclean's: in the months leading up to the genocide, radio stations attempted to dehumanize Tutsis to Hutus by repeatedly referring", "-27.26116775162518" ], [ "threats directed at different women tend to be very similar. Sady Doyle who has been the target of online threats noted the \"overwhelmingly impersonal, repetitive, stereotyped quality\" of the abuse, the fact that \"all of us are being called the same things, in the same tone\". Internalized misogyny Internalized sexism is when an individual enacts sexist actions and attitudes towards themselves and people of their own sex. On a larger scale, internalized sexism falls under the broad topic of internalized oppression, which \"consists of oppressive practices that continue to make the rounds even when members of the oppressor group", "-27.240263383544516" ], [ "of Speech.\nUnlike the dissemination of hate speech through conventional channels, hate speech dissemination online often involves multiple actors, whether knowingly or not. When perpetrators makes use of an online social platform to disseminate their hateful message they do not only hurt their victims, but may also violate terms of service in that platform and at times even state law, depending on their location. The victims, on their part, may feel helpless in the face of online harassment, not knowing to whom they should turn to for help. In the types of responses mapped throughout the study, it appears that collective", "-27.219293197616935" ], [ "Survey, \"A hate crime is a criminal offence. In the United States, federal prosecution is possible for hate crimes committed on the basis of a person's race, religion, or nation origin when engaging in a federally protected activity.\" In 2009, the Matthew Shepard Act added actual or perceived gender, gender identity, sexual orientation, and disability to the federal definition, and dropped the prerequisite that the victim be engaging in a federally protected activity.\nForty-five states and the District of Columbia have statutes criminalizing various types of hate crimes. Thirty-one states and the District of Columbia have statutes creating a civil cause", "-27.200185850728303" ], [ "and \"It should be mentioned that the SPLC did not label MRAs as members of a hate movement; nor did our article claim that the grievances they air on their websites – false rape accusations, ruinous divorce settlements and the like – are all without merit. But we did call out specific examples of misogyny and the threat, overt or implicit, of violence.\" Doxing incident In April 2013, the subreddit was threatened with a shutdown by Reddit admins after r/MensRights subscribers gathered personal information on a supposed blogger of feminist issues, and the subreddit's moderators advised members of the subreddit", "-27.195617423858494" ], [ "and moderated many controversial Reddit communities that were racist in nature, including being a moderator for the \"r/CoonTown\" subreddit.\nThe subreddit's creator, who went by \"EugeneNix\", a co-troll of Goldberg, has briefly spoken to Taki's Magazine about Goldberg and his impressions of him, before and after \"EugeneNix\" learned about his former cohort's ISIL-related endeavors after the latter was arrested.\nMany subreddits he created or moderated, including \"r/CoonTown\", were banned during a period when Reddit's content policy was revised in August 2015. \"Michael Slay\" Goldberg posted on the neo-Nazi website The Daily Stormer as \"Michael Slay\".\nOne well-known article by this persona regarding how", "-27.1489219883224" ], [ "is a hate crime committed for the purpose of converting a gay person to heterosexuality. The term was first used in the early 2000s when an influx of these attacks were noted by charity workers in South Africa. This homophobic phenomenon and other ignorances perpetuate rape culture and put lesbian women at greater risk of rape. \nIntersectionality as a tool of analysis identifies that black lesbians face homophobia, sexism, racism and classism. University On 17 April 2016, a list of the names of 11 men and titled 'Reference List' was posted anonymously on Facebook. The post gave no descriptions or", "-27.097560590642388" ], [ "hates blacks and Muslims.' Niels van Tameren, the present day director of MDI would like the judge to decide whether this is a case of 'free speech or racism'. Discriminatory cartoons The office of the public prosecutor has seen to the removal of the eight allegedly discriminatory cartoons from the internet. It has not informed the public which cartoons it considered discriminatory and why. This lack of information has led to speculation in all media as to which cartoons were the 'forbidden' ones. There was no clear understanding among the public or press what constituted a crime in a cartoon.", "-27.04339196451474" ], [ "entirely.\nExperts attribute the destructive nature of anonymous online mobs to group dynamics, saying that groups with homogeneous views tend to become more extreme. As members reinforce each others' beliefs, they fail to see themselves as individuals and lose a sense of personal responsibility for their destructive acts. In doing so they dehumanize their victims, becoming more aggressive when they believe they are supported by authority figures. Internet service providers and website owners are sometimes blamed for not speaking out against this type of harassment.\nA notable example of online mob harassment was the experience of American software developer and blogger Kathy", "-27.019196934386855" ], [ "or not hate speech falls under the protection of freedom of speech in some countries.\nBoth of these classifications have sparked debate, with counter-arguments such as, but not limited to, a difficulty in distinguishing motive and intent for crimes, as well as philosophical debate on the validity of valuing targeted hatred as a greater crime than general misanthropy and contempt for humanity being a potentially equal crime in and of itself. Neurological research The neural correlates of hate have been investigated with an fMRI procedure. In this experiment, people had their brains scanned while viewing pictures of people they hated. The", "-26.997885320568457" ], [ "parties. The Employment Equity Act, 1998 and the Rental Housing Act, 1999 specifically forbid discrimination in employment and housing, respectively.\nThe PEPUDA also prohibits hate speech and harassment based on any of the prohibited grounds of discrimination. South Africa does not have any statutory law requiring increased penalties for hate crimes, but hatred motivated by homophobia has been treated by courts as an aggravating factor in sentencing. Prevention and Combating of Hate Crimes and Hate Speech Bill The Prevention and Combating of Hate Crimes and Hate Speech Bill, which is pending within the South African Parliament, would outlaw hate crimes and", "-26.9618408405222" ], [ "for \"threats of violence against police and public officials\". TheRedPill r/TheRedPill is a misogynistic subreddit which promotes male supremacy. It was profiled by the Southern Poverty Law Center. It has been associated with several right-wing movements and the alt-right because of its attacks on feminism and mockery of rape.\nIt was discovered that a New Hampshire legislator created the subreddit and posted demeaning comments about women. After this discovery, he resigned from office. The New Statesman has described this subreddit as one of the most misogynistic subreddits on Reddit, which aims to radicalize men. Currently, the subreddit is quarantined.", "-26.953111937036738" ], [ "about the people he routinely dehumanizes and degrades online?\" Powers also wrote on Twitter that \"people do not have a 'right' to stay anonymous so they can spew their racist, misogynist, homophobic garbage\".", "-26.936538811627543" ], [ "the public, to encourage participation, to claim a divine calling and privilege, and to accuse out-groups (e.g. the government or the media). Groups that work effectively towards these goals via an online presence tend to strengthen their sense of identity, decrease the threat levels from out-groups, and recruit more new members.\nThe Simon Wiesenthal Center (SWC), in its 2009 iReport, identified more than 10,000 problematic hate and terrorist websites and other Internet postings. The report includes hate websites, social networks, blogs, newsgroups, YouTube and other video sites. The findings illustrate that as the Internet continues to grow, extremists find new", "-26.88909156457521" ], [ "spinoff of r/cringe, it later shifted to the far-right, with anti-transgender and anti-\"SJW\" content taking over. The subreddit was quarantined in September 2018, at which point it had over 400,000 subscribers.\nFollowing the Christchurch mosque shootings (15 March 2019), more anti-Muslim posts were made on the subreddit. The subreddit was banned on 25 April 2019 for violating Reddit's content policy regarding violent content. DarkNetMarkets The subreddit r/DarkNetMarkets, a darknet market discussion forum, featured participation from their owners, causing US authorities to request personal information behind several accounts. This subreddit was banned on 21 March 2018. Deepfakes Deepfakes was a controversial subreddit", "-26.820329289650545" ], [ "is legal. During the years 2000–2013 there were 21 successful court cases regarding hate speech. The expressions ruled illegal include stating that some groups are trash, a group is a racial monster that needs to be destroyed, and comparing asylum seekers to animals and saying that violence against foreigners is acceptable.\nA Finnish member of EU parliament Jussi Halla-aho was sentenced for both blasphemy and hate speech in 2012 by the Supreme Court after saying that \"Islam is a paedophilia religion\" and \"it's a national and possibly even genetic special characteristic of the Somali people to rob passers-by and to be", "-26.80401605766383" ], [ "Whosoever aids, abets or instigates any offence under articles 82A to 82C, both inclusive, shall be guilty of an offence and shall be liable on conviction to the punishment laid down for the offence aided, abetted or instigated. New Zealand New Zealand prohibits hate speech under the Human Rights Act 1993. Section 61 (Racial Disharmony) makes it unlawful to publish or distribute \"threatening, abusive, or insulting ... matter or words likely to excite hostility against or bring into contempt any group of persons ... on the ground of the colour, race, or ethnic or national origins of that group of", "-26.80348531762138" ], [ "hate groups. I refer instead to a political, economic and cultural system in which whites overwhelmingly control power and material resources, conscious and unconscious ideas of white superiority and entitlement are widespread, and relations of white dominance and non-white subordination are daily reenacted across a broad array of institutions and social settings.\nThis and similar definitions have been adopted or proposed by Charles Mills, bell hooks, David Gillborn, Jessie Daniels, and Neely Fuller Jr, and they are widely used in critical race theory and intersectional feminism. Some anti-racist educators, such as Betita Martinez and the Challenging White Supremacy workshop, also use", "-26.797321771096904" ], [ "or practices that attack or malign an entire class of people, typically for their immutable characteristics\". It says that hate group activities may include speeches, marches, rallies, meetings, publishing, leafleting, and criminal acts such as violence. (Not all groups so listed by the SPLC engage in criminal activity.) The process for determining which groups are included involves \"talking through\" cases that are not clear-cut.\nIn 2018, the SPLC added a number of self-described men's rights groups to their list of hate groups, including A Voice for Men and Return of Kings, describing them as \"male supremacist\"; the organizations rejected the SPLC's", "-26.75029972451739" ], [ "of abuse by the group \"Anonymous\", along with \"misinformation\" and \"misrepresentation\" in the media. In September 2009 it asked the Australian Human Rights Commission's Freedom of Religion and Belief to restrict access to web sites it believes incites \"religious vilification.\" Interests Splintering of the Internet community can occur when members of specific interest groups use the Internet to exclude or avoid views that contradict their own cherished beliefs and theories. Called Cyberbalkanization (or sometimes cyber-balkanization), it refers to the division of the Internet or the world wide web into sub-groups with specific interests (digital tribes), where the sub-group's members almost", "-26.739407558576204" ], [ "not being proactive in taking down hate speech. Terrorism-related content In the aftermath of the Backpage trial and subsequent passage of FOSTA-SESTA, others have found that Section 230 appears to protect tech companies from content that is otherwise illegal under United States law. Professor Danielle Citron and journalist Benjamin Wittes found that as late as 2018, several groups deemed as terrorist organizations by the United States had been able to maintain social media accounts on services run by American companies, despite federal laws that make providing material support to terrorist groups subject to civil and criminal charges. However, case law", "-26.72352287452668" ], [ "citizens, or to deny genocide, crimes against humanity, or war crimes. In the first 11 months of 2012 authorities initiated investigations into 259 allegations of incitement of hatred and six of incitement of discrimination, most of them over the Internet. Authorities forwarded 69 of those allegations to the courts for trial, closed 68, and suspended 113 for lack of evidence; the others remained under investigation. Most allegations of incitement of hatred involved racist or anti-Semitic expression, or hostility based on sexual orientation, gender identity, or nationality.\nIt is a crime to disseminate information that is both untrue and damaging to an", "-26.649147337244358" ], [ "about \"anyone\" but about \"anyone among women,\" so it is not too much to be seen as a misogyny case. Hong said, \"Now that the subject of the crime was a matter of \"anyone\" versus \"anyone of women,\" I think it's safe to see the case as a misogyny crime. The problem of these crimes should be taken seriously. Based on unjustified anger, crimes are often brutal. The members of the group are terrified to target all groups. If it is \"don't ask questions\" targeting unspecified people, the scope of potential victims will be broadened, which is unlikely to be", "-26.613155911967624" ], [ "religious affiliation. Romania Article 369 of the Criminal Code, titled 'Incitement to hatred or discrimination', prohibits hate speech directed against a group of persons. The offense carries a punishment of 6 months to 3 years' imprisonment, or a fine. Russia According to Article 282 of the Criminal Code, 'Raising hates or hostility, or equally humiliation of human dignity':\nActions aimed at the incitement of hatred or enmity, as well as the humiliation of a person or group of persons on grounds of sex, race, nationality, language, origin, attitude to religion, as well as affiliation to any social group, committed publicly or", "-26.544558957451954" ], [ "hate speech are complex, they typically consider public speech targeting ethnic minorities to be the most offensive.\nHistorian Daniel Goldhagen, discussing antisemitic hate groups, argues that we should view verbal violence as \"an assault in its own right, having been intended to produce profound damage—emotional, psychological, and social—to the dignity and honor of the Jews. The wounds that people suffer by ... such vituperation ... can be as bad as ... [a] beating.\"\nIn the mid-1990s, the popularity of the Internet brought new international exposure to many organizations, including groups with beliefs such as white supremacy, neo-Nazism, homophobia, Holocaust denial and Islamophobia.", "-26.542559371329844" ], [ "for what they are. It is to hate them just because they belong to a certain ethnic group. Foxman is right to suggest that you can be an anti-Semite without expressing any racist sentiments: Many anti-Semites confine themselves to expounding false claims about Jewish control. But you can also, without harboring anti-Semitic hate, criticize Israel and even the Jewish community for its failures.'\nIn his essay 'What is antisemitism?' he argues that, given the earlier distinction he made, one should treat lightly accusations of antisemitism in the specific context of the Israeli-Palestinian conflict:\n'We should almost never take antisemitism seriously, and maybe", "-26.524912897963077" ], [ "wicked for some people (ER: by up to 90,000 people), it is like a huge family party.\nThey are all sorts of awful things going on in the world you look at the moment. Newspapers, you see it on the TV. All this bullshit, people going around killing people, murdering people in the name of religion or what ever the fucking is.I don't give a shit, quite frankly. Because the one thing all of us stand for; this is family! This is not one nation. This is not one race. This is not one religion. These are all religions. Every race.", "-26.496664550795685" ], [ "trying to live a double life in a world that makes secrets all too easy to access\", it relies on the feeling of shame. The episode asks: \"How far would you go to keep your shame safely hidden?\"\nJosh Dzieza of The Verge commented that the anonymous hackers mark \"a bit of a departure\" for the programme, which usually does not feature \"overt villains\". Mullane analysed that the hackers' identities do not need to be revealed as they are \"effectively a stand-in for The Internet: all-seeing, all-knowing, and extremely dangerous\". The supposed malware remover that Kenny downloads is called \"shrive\", a", "-26.4912100238289" ], [ "\"Born to hate\". The duo became interested in this, because they discovered that the psychological state of the person described there was very similar to their own, and it seemed that they would be able to solve all their problems this way. In fact, this is precisely what caused the misanthropy in them. Meanwhile, Alexander Kostrov, an associate professor at the department of Modern National History of the Irkutsk State University, support the claim in court that their actions fit into the misanthropy category.\nAnother motive, confirmed by both Anoufriev and Lytkin, was the desire to imitate other well-known serial killers.", "-26.486853587790392" ], [ "are homophobic or transphobic. Violence targeted at people because of their perceived sexuality can be psychological and physical up to and including murder. These actions may be caused by cultural, religious, or political mores and biases.\nThe United States had passed the Hate Crime Statistics Act (P.L. 101-275) in hopes to develop a systematic approach for documenting and understanding these hate crimes against LGBT in the United States. The Federal Bureau of Investigation (FBI) had also implemented a data collection program and integrated the system under their Uniform Crime Reporting (UCR) program and National Incident-Based Reporting System(NIBRS). Federal hate crime", "-26.485614280216396" ], [ "say I am not anti-Semitic. I pray that God will kill my enemy and take him off the face of the planet.\") Rather, they claim they are teaching \"truth\" and advocating the love of their own people, as though love of self and hatred of others are mutually exclusive positions. On the contrary, RBNs preach love of self and hatred of their enemies. (Indeed, it often seems that these groups are motivated more by hatred of their enemies than love of their people.)\nTunde Adeleke, Nigerian-born professor of History and Director of the African American Studies program at the University of", "-26.450299534015357" ], [ "amended the Criminal Code adding a new aggravating circumstance of criminal responsibility, as follows: \"Committing or participating in a crime motivated by ideology, political opinion, religion or beliefs of the victim; nation, race, ethnic or social group; sex, sexual orientation, gender identity, age, affiliation, personal appearance or suffering from illness or disability.\" Middle East Israel is the only country in the Middle East that has hate crime laws. Hate crime, as passed by the Israeli Knesset (Parliament), is defined as crime for reason of race, religion, gender and sexual orientation. Opposition The U.S. Supreme Court unanimously found the St. Paul", "-26.444976181257516" ], [ "Her analysis of hate crimes identified four main motives: ideology, thrill seeking, peer dynamics and perceived self-defense; she elaborated that \"offenders perceive that they have societal permission to engage in violence against homosexuals.\" She presented her paper Psychosocial Motivations of Hate Crimes Perpetrators to a congressional hearing in 1998. She asserted that laws to punish people who commit hate crimes may not be the best way to prevent such crimes; she argued that many criminals don't curtail their violence based on their estimate of possible future punishment. She argued in 2015 that the objectification of women can desensitize viewers to", "-26.441907678032294" ], [ "of inciting hate according to article 137d of the Dutch Penal Code. Anonymity In several reports the cartoonist's fear of losing his anonymity and becoming a target of physical attack have been mentioned. The editors of HP/De Tijd have reported that the cartoonist experienced that one police officer made fun of him losing his anonymity because of his arrest. Prosecution The public prosecutor in the case has been named as Paul Velleman. In an article in de Volkskrant Henny Sackers, from the law school of Radboud University in Nijmegen, is quoted to suggest that the prosecutor may use Nekschot as", "-26.423725809087045" ], [ "social media websites may restrict hate speech to a larger degree than is required by US law (see also hate speech on Facebook), and may restrict harassment and verbal abuse.\nRestriction of hate speech and harassment on social media is the subject of debate in the US. For example, two perspectives include that online hate speech should be removed because it causes serious intimidation and harm, and that it shouldn't be removed because it's \"better to know that there are bigots among us\" than to have an inaccurate picture of the world.\nThe National Religious Broadcasters, an organization that represents American Christian", "-26.411409267806448" ], [ "2006 annual report, released on November 19, 2007, also said that hate crimes based on sexual orientation are the third most common type, behind race and religion. \nIn 2008, 17.6% of hate crimes were based on the victim's perceived sexual orientation. Of those crimes, 72.23% were violent in nature. 4,704 crimes were committed due to racial bias and 1,617 were committed due to sexual orientation. Of these, only one murder and one forcible rape were committed due to racial bias, whereas five murders and six rapes were committed based on sexual orientation.\nSanta Clara County Deputy District Attorney (DDA) Jay Boyarsky", "-26.405148247024044" ], [ "that emerged were categorized into three groups: A) manipulative - typically a child molester; B) Opportunist - typically a rapist and C) Coercive being a mixture of both rapists and child molesters. Obscene/offensive content Various websites on the internet contain material that some deem offensive, distasteful or explicit, which may often be not of the user's liking. Such websites may include internet, shock sites, hate speech or otherwise inflammatory content. Such content may manifest in many ways, such as pop-up ads and unsuspecting links. Sextortion Sextortion, especially via the use of webcams, is a concern, especially for those who use", "-26.40435229754803" ], [ "Several white supremacist groups have founded websites dedicated to attacking their perceived enemies. In 1996, the Simon Wiesenthal Center of Los Angeles asked Internet access providers to adopt a code of ethics that would prevent extremists from publishing their ideas online. In 1996, the European Commission formed the Consultative Commission on Racism and Xenophobia (CRAX), a pan-European group which was tasked to \"investigate and, using legal means, stamp out the current wave of racism on the Internet.\" Religious hate groups The Southern Poverty Law Center (SPLC) has designated several Christian groups as hate groups, including the American Family Association, the", "-26.39520857518073" ], [ "not use Reddit to solicit or facilitate any transaction or gift involving certain goods and services, including: ... Stolen goods\" The \"Chimpire\" The term \"Chimpire\" refers to a collection of subreddits and affiliated websites that promote anti-black racism, including frequent use of racial slurs. In June 2013, the subreddit r/niggers was banned from Reddit for engaging in vote manipulation, incitements of violence and using racist content to disrupt other communities. Reddit general manager Erik Martin noted that the subforum was given multiple chances to comply with site rules, noting that \"users can tell from the amount of warnings we extended", "-26.382966357225087" ], [ "in turn may make it possible for the patient to acknowledge and contain their previously concealed hate for the analyst.\nAdam Phillips went so far as to suggest that true kindness is impossible in a relationship without hating and being hated, so that an unsentimental acknowledgement of interpersonal frustrations and their associated hostilities can allow real fellow-feeling to emerge. Legal issues In the English language, a hate crime (also known as a \"bias-motivated crime\") generally refers to criminal acts which are seen to have been motivated by hate. Those who commit hate crimes target victims because of their perceived membership in", "-26.358237310429104" ], [ "boards and has a sexist owner.\"\nIn June 2015, a Reddit sub-community devoted towards mocking NeoGAF became one of five communities shut down by the site. Reddit argued the ban hit groups \"that allow their communities to use the subreddit as a platform to harass individuals when moderators don’t take action.\"\nVice News noted the site was one of the largest drivers of traffic to Hillary Clinton's website during the 2016 U.S. presidential election.", "-26.299152065766975" ], [ "for the protection of the reputation or rights of others, for preventing the disclosure of information received in confidence, or for maintaining the authority and impartiality of the judiciary\".\nThe European Court of Human Rights is careful to distinguish between hate speech and the right of individuals to express their views freely, even if others take offence. There are regional instances relevant specifically to online hate speech. The Council of Europe (CoE) in 2000 issued a General Policy Recommendation on Combating the Dissemination of Racist, Xenophobic and Anti-Semitic Material via the Internet. The creation of the CoE Convention on Cybercrime in", "-26.26541087264195" ], [ "expression considered to be hate speech and prohibits threats or expressions of contempt for a group or member of a group based on race, color, national or ethnic origin, religious belief, or sexual orientation. Penalties for hate speech range from fines to a maximum of four years in prison.\nThe constitution and law prohibit arbitrary interference with privacy, family, home, or correspondence, and the government generally respects these prohibitions in practice. The law permits the signals intelligence agency, National Defense Radio Establishment, to monitor the content of all cross-border cable-based Internet traffic to combat \"external threats\" such as terrorism and organized", "-26.257097590249032" ], [ "in these situations, such as an individual restroom. Hate crimes legislation Federal hate crimes legislation include limited protections for gender identity. The Matthew Shepard and James Byrd, Jr. Hate Crimes Prevention Act of 2009 criminalized \"willfully causing bodily injury (or attempting to do so with fire, firearm, or other dangerous weapon)\" on the basis of an \"actual or perceived\" identity. However, protections for hate crimes motivated on the basis of a victim's gender identity or sexual orientation is limited to \"crime affect[ing] interstate or foreign commerce or occur[ring] within federal special maritime and territorial jurisdiction.\" This limitation only", "-26.235060259932652" ], [ "Klux Klan.\nDavid Duke, a former Grand Wizard of the Ku Klux Klan, believed that the Internet was going to create a \"chain reaction of racial enlightenment that will shake the world.\" Jessie Daniels also said that racist groups see the Internet as a way to spread their ideologies, influence others and gain supporters. Legal scholar Richard Hasen describes a \"dark side\" of social media:\nThere certainly were hate groups before the Internet and social media. [But with social media] it just becomes easier to organize, to spread the word, for people to know where to go. It could be to raise", "-26.187110119848512" ], [ "In November 2008, Moon released his report in which he recommended that section 13 should be repealed so that online hate speech is a purely criminal matter. Moon wrote that \"The use of censorship by the government should be confined to a narrow category of extreme expression -- that which threatens, advocates or justifies violence against the members of an identifiable group.\" Moon argued that \"it's not practical to deal with what one might generously describe as group defamation or stereotyping through censorship. It's just not a viable option. There's too much of it, and it's so pervasive within our", "-26.17435630451655" ], [ "Year in Hate and Extremism\") of the Southern Poverty Law Center's (SPLC) Intelligence Report in a section called \"Misogyny: The Sites\". The issue outlined the \"manosphere\", describing it as \"hundreds of websites, blogs and forums dedicated to savaging feminists in particular and women...in general\". The report credited some sites as making an attempt at civility and trying \"to back their arguments with facts\" but condemned almost all of them for being \"thick with misogynistic attacks that can be astounding for the guttural hatred they express\" and ultimately described them as \"women-hating\".\nA prominent example used of AVFM inciting violence against women", "-26.14037532400107" ], [ "good or evil. Perceptions of good and evil can also change (see moral panic); for example, if anonymous peer-to-peer networks had existed in the 1950s or 1960s, they might have been targeted for carrying information about civil rights or anarchism.\nEasily accessible anonymous P2P networks are seen by some as a democratization of encryption technology, giving the general populace access to secure communications channels already used by governments. Supporters of this view, such as Phil Zimmermann, argue that anti-surveillance technologies help to equalize power between governments and their people, which is the actual reason for banning them. John Pilger opines that", "-26.128971850092057" ], [ "of the mentality of a racist to just hate another person because of the color of their skin or ethnicity. We don't do that. That's not the goal objective. The goal objective is human liberation. The goal objective is the greater community cooperation of humanism. The goal objective is to get rid of institutionalized racism.\nReacting to a video of two NBPP members positioned outside of a polling place on Election Day in 2008 in Philadelphia, Seale agreed with CNN Newsroom anchor Kyra Phillips \"to some degree\" that the incident was voter intimidation. He also described what he saw as significant", "-26.12717524744221" ], [ "regarded as a legitimate branch of Islam by mainstream Muslims.\nThe white supremacist Creativity Movement (formerly the World Church of the Creator), led by Matthew F. Hale, is associated with violence and bigotry. Aryan Nations is another religiously-based white supremacist hate group.\nWestboro Baptist Church is considered a hate group because of its provocative stance against homosexuality and the United States, and it has been condemned by many mainstream gay rights opponents as well as by gay rights supporters. Internet hate groups Traditionally, hate groups recruited members and spread extremist messages by word of mouth, or through the distribution of flyers and", "-26.11387048708275" ], [ "characteristically slow to work. The transnational reach of many private-sector Internet intermediaries may provide a more effective channel for resolving issues in some cases, although these bodies are also often impacted upon by cross-jurisdictional appeals for data (such as revealing the identity of the author of a particular content). State prosecution of online hate speech can be difficult when the countries involved have different commitments and understanding what hate speech is. This is particularly apparent in the context of the US, who both host a large portion of internet servers, as well as having a deep-rooted constitutional commitment to Freedom", "-26.066427509584173" ], [ "vengeance or why hatred and bias are uniquely responsive to criminal sanction compared to other motivations. Hurd argues that whether or not a disposition is worse than another is case sensitive and thus it is difficult to argue that some motivations are categorically worse than others.\nIn their book Hate Crimes: Criminal Law and Identity Politics, James B. Jacobs and Kimberly Potter criticize hate crime legislation for exacerbating conflicts between groups. They assert that by defining crimes as being committed by one group against another, rather than as being committed by individuals against their society, the labeling of crimes as", "-26.0460895934375" ], [ "in her view, laws to punish people who commit hate crimes may not be the best remedy for preventing them because the threat of future punishment does not usually deter such criminal acts. Some on the political left have been critical of hate crime laws for expanding the criminal justice system and dealing with violence against minority groups through punitive measures.", "-26.031139358412474" ], [ "original post may technically adhere to hate speech policy, the ideas the post conveys prompts readers to use the comment section to spread overt hate speech. These sections are not monitored as heavily as main posts. Commentary Nadine Strossen says that while efforts to censor hate speech have the goal of protecting the most vulnerable, these efforts are ineffective and may have the opposite effect. Disadvantaged and ethnic minorities are sometimes the ones charged with violating laws against hate speech.", "-26.02123059236328" ], [ "a misogynist is \"Men and Women,\" where he describes two people, a man and a woman, whom he does not know but to whom he takes a violent dislike. The first part, subtitled \"In the Backs\" (The Backs is a riverside area of Cambridge), concludes\n...I do not want to see that girl again:\n\nI did not like her: and I should not mind\n\nIf she were done away with, killed, or ploughed.\n\nShe did not seem to serve a useful end:\n\nAnd certainly she was not beautiful. Death The year of his publishing debut, Stephen was committed to St Andrew's Hospital, a mental asylum", "-25.985617708298378" ], [ "had, Robinson founded Create Not Hate in 2007. Aimed at kids affected by gang-related violence, the purpose of Create Not Hate is to give those who might never otherwise be exposed to the creative industries an opportunity to demonstrate their own creative solutions to the issue of gun and knife crime. Create Not Hate generated A Mother's Tear, a short film written by two 15-year-old boys from Lambeth Academy, which was shown nationwide in cinemas, on the Community Channel TV station and on MTV. It also received extensive global press (from Sky News to news channels in Japan and Germany).\nIn", "-25.98234442204921" ], [ "situations where they have little or no choice, and although they might see things through, they do not necessarily come out any further ahead than they previously were. These anti-heroes—\"criminals, outcasts, visionaries, dissenters and misfits\"—call to mind the private eye of detective fiction. This emphasis on the misfits and the malcontents is the \"punk\" component of cyberpunk. Society and government Cyberpunk can be intended to disquiet readers and call them to action. It often expresses a sense of rebellion, suggesting that one could describe it as a type of cultural revolution in science fiction. In the words of author and", "-25.97098206728697" ], [ "applies to gender identity and sexual orientation, and not to race, color, religion or national origin. Therefore, hate crimes which occur outside these jurisdictions are not protected by federal law.\n22 states plus Washington D.C. have hate crimes legislation which include gender identity or expression as a protected group. They are Vermont, Massachusetts, Connecticut, New Jersey, Delaware, Illinois, Maryland, Missouri, Minnesota, Colorado, New Mexico, Nevada, Rhode Island, Washington, Oregon, California, Hawaii, Maine, Tennessee, Puerto Rico, Utah and New York. The District of Columbia also has a trans-inclusive hate crimes law. Twenty-seven states have hate-crimes legislation which exclude transgender", "-25.952851435460616" ], [ "blasphemy law applies to all religions. The hate speech law protects people of different sexual orientations, races, skin colors, places of birth, national or ethnic origins, religions or beliefs and disabled people. The sentence for committing these crimes could theoretically be imprisonment, but during the modern juridical history the sentence has always been a fine.\nThe hate speech law is relatively lax. It prohibits only threatening, insulting and defaming the aforementioned groups, while criticism and expression of opinions against these groups of people are not per se forbidden. For instance, unlike in 16 other European countries and Canada, denying the Holocaust", "-25.893748344911728" ], [ "been targeted by its opponents. Misk frequently receives hate mail and threats online. Some of its opponents allege that the site was funded by Israel, the US, or France. In June 2012, the site was hacked and the page changed to show the Moroccan royal emblem and national motto \"god, the country and the king\". The hacking occurred after Qandisha published a letter about homosexuality written by a gay man. The site was subsequently hacked for a second time.", "-25.878509996216053" ], [ "Antisemitism and racism The NOP is stated to be an antisemitic organisation by a number of government bodies, nongovernmental organizations, academic institutions and individual experts worldwide, such as the United States Department of State, and the European Commission against Racism and Intolerance (ECRI). According to The Stephen Roth Institute for the Study of Contemporary Antisemitism and Racism, the NOP is promoting violent forms of neo-fascism and antisemitism, including Holocaust denial.\nAccording to the British historian, Dr John Pollard, neo-Nazi elements in the NOP and their racism and homophobia continue to give rise to concern in other member countries of the European", "-25.87279637285974" ], [ "in relation to controversial offline behavior, if it is widely made known. The nature of this backlash can range widely from counter-arguments and public mockery, through insults and hate speech, to, in extreme cases, rape and death threats. The online disinhibition effect describes the tendency of many individuals to behave more stridently or offensively online than they would in person. A significant number of feminist women have been the target of various forms of harassment in response to posts they have made on social media, and Twitter in particular has been criticised in the past for not doing enough to", "-25.856318755220855" ], [ "known for accepting the registration of websites that host far-right content. Video classification The site allows a video classification tag of not safe for work (NSFW) where content would generally be considered inappropriate for a family or workplace setting; and a not safe for life (NSFL) setting for extreme or strongly questionable content that may cause psychological trauma if viewed. Content BitChute has been accused of accommodating far-right groups and individuals, with the Southern Poverty Law Center claiming it hosts \"hate-fueled material\". There has been conflict between YouTube and right-wing video creators over the inclusion of hate speech and misinformation", "-25.854365943821904" ], [ "allegedly connected to this conspiracy. Physical_Removal r/Physical_Removal was banned on 15 August 2017, for inciting violence. The subreddit's name stems from a quote by right-wing libertarian philosopher Hans-Hermann Hoppe, who wrote: \"There can be no tolerance toward democrats and communists in a libertarian social order. They will have to be physically separated and removed from society\", and, by extension, their advocacy for forced deportation or physical removal of political leftists from the United States. It was controversial for its promotion of violence against leftists and other groups. For instance, users would make reference to throwing people from helicopters, an execution", "-25.853471179812914" ] ]
2rnwsg
why are most calico cats female?
[ "Because that kind of colour pattern is often linked to the X chromosome. As you know, females have two X chromosomes, so they're most likely to have calico coats.", "The gene for fur coloration is found on the portion of the X chromosome not present on the Y. In order to get calico or tortoise shell, you need two different genes...that's possible if you are XX, but not if you are XY. The male cats that are calico usually have the abnormal XXY configuration.", "As others have said, it depends on some of the fur-color genes being on the X chromosome. But there's more to it than that: For a lot of our genes the amount/strength of a gene's usage matters a lot—having an extra copy of a whole chromosome can be a serious problem; [an extra chromosome 21 causes Down Syndrome in humans]( URL_1 ). So how can females get away with having two copies of the X chromosome if males only have one? The answer is that in females, one of the X chromosomes is chosen at random to be inactivated and turned into a [Barr Body]( URL_0 ). In female calico cats, each patch of their skin is the descendants of an original embryo cell that ended up inactivating an X chromosome with the “be colored not white” gene on it, or a “be black not brown” gene, or whatever. In male cats, all cells only have the one X chromosome so they can't have a pattern of random inactivation. That is, unless they're an XXY male which is rare but possible.", "Females have 2 X chromosomes (1 from each parent) and males have 1 X (from mom) and 1 Y (from dad). If both X's in females were active there would be way too many proteins being made from the genes on the X chromosome so 1 of the X's needs to be inactivated. In regular female cats, both alleles of the fur color gene give the cat the same color fur so it doesn't matter which is inactivated, the fur will all be the same color. In calico cats, the alleles are different so for example: the brown spots would occur where the mom's X was inactivated and the yellow spots would occur where the dad's X was inactivated." ]
[ [ "Calico cat A calico cat is a domestic cat with a coat that is typically 25% to 75% white with large orange and black patches (or sometimes cream and grey patches). They are exclusively female except under rare genetic conditions. A calico is not to be confused with a tortoiseshell, which has a mostly mottled coat of black/orange or grey/cream with relatively few to no white markings. However, outside North America, the calico pattern is more usually called tortoiseshell and white. In the province of Quebec, Canada, they are sometimes called chatte d'Espagne (French for '(female) cat of Spain').", "-33.84514033247251" ], [ "may chase. Reproduction Female cats called queens are polyestrous with several estrus cycles during a year, lasting usually 21 days. They are usually ready to mate between early February and August.\nSeveral males called tomcat are attracted to a female in heat. They fight over her, and the victor wins the right to mate. At first, the female rejects the male, but eventually the female allows the male to mate. The female utters a loud yowl as the male pulls out of her because a male cat's penis has a band of about 120–150 backwards-pointing penile spines, which are about 1 mm", "-32.91006052866578" ], [ "their worldwide population exceeds 500 million as of 2007. Although cat guardianship has commonly been associated with women, a 2007 Gallup poll reported that men and women in the United States of America were equally likely to own a cat.\nAs well as being kept as pets, cats are also used in the international fur and leather industries for making coats, hats, blankets, and stuffed toys; and shoes, gloves, and musical instruments respectively (about 24 cats are needed to make a cat-fur coat). This use has been outlawed in the United States, Australia, and the European Union in 2007. Cat pelts have", "-32.44805265690957" ], [ "Mongolia, and in South Asia into the Thar Desert and arid regions in India. Behaviour and ecology Both wildcat species are largely nocturnal and solitary, except during the breeding period and when females have young. The size of home ranges of females and males varies according to terrain, the availability of food, habitat quality, and the age structure of the population. Male and female home ranges overlap, though core areas within territories are avoided by other cats. Females tend to be more sedentary than males, as they require an exclusive hunting area when raising kittens. Wildcats usually spend the day", "-31.856545526185073" ], [ "and the Pampas Cat were seen most frequently during moonless nights; the second most sightings of these cats were during full moons. These two cats both hunt the same prey, making it more difficult for them to find food, essentially creating a race to find the prey before the other does. Reproduction By using the residents' observations of Andean cats in coupled pairs with their litters, it is theorized that the mating season for the Andean cat is within the months of July and August. Because kittens have been seen in the months of April and October, this could mean", "-31.491992642942932" ], [ "the exception of the Iberian lynx) are kept as exotic pets. Unlike other small cat species, they are not known to hybridize with the domestic cat. Ocelots Ocelots were popular as an exotic pet in the 50s and 60s. The passage of the Endangered Species Act in the United States effectively ended their keeping outside of zoological facilities due to interstate animal movement restrictions. Their popularity is also limited by their comparatively high aggression. No hybrids with domestic cats are known. Pumas While being considered small cats taxonomically, pumas are comparable in size to some of the big cats. They", "-31.486911282598157" ], [ "what the background color will be. But no one really knows until the cat matures. Behavior Because breeders outcrossed the foundation jungle cats to mostly intelligent, outgoing breeds such as the Abyssinian and Oriental Shorthair, Chausies are intelligent, active, athletic cats. They are often very \"busy\" as kittens. As adults, they are quieter, but they still retain a playfulness and lifelong curiosity. Chausies do not like to be alone; they need to have other cats as companions or have human company most of the time. Chausies get along well with dogs, too, and will do fine if raised with a", "-31.47220516001107" ], [ "has also been suggested that catbirds eat small, soft-shelled snails. Mating The Ailuroedus genus of the bowerbird family consists of monogamous pairs that do not build a bower. The males and females both defend an all-purpose territory. Spotted catbirds form pair bonds, some which are known to last for more than one breeding season and it is believed that this monogamy results from the need for two parents to raise the brood successfully. During courtship the pair excitedly hop around perches in trees and the male makes sharp tic notes until the female sits still. The male then hops around", "-31.464046326218522" ], [ "They have also been known to eat fishes, algal material, and various polychaetes. Redspotted catsharks are an important predator within their ecosystem. They have a large influence on commercially fished benthic organisms that dwell in the rocky near-shore areas. Reproduction Redspotted catsharks are oviparous. Breeding occurs in individuals in an annual cycle. However, they mate seasonally, typically in spring and winter, though females have occasionally been shown to have egg capsules in the summer. They are polygynandrous and while the male fertilizes the female's eggs he typically performs what is called a \"courtship ritual\" that consists of the male biting", "-31.447198839159682" ], [ "the Manx cat is the result of a cross-mating between a cat and a rabbit.\"\nOccasionally the flap of loose skin from the belly to the haunches is absent, enhancing the visual similarity to a rabbit.\nCats with radial hypoplasia (abnormal short forelegs) may also adopt a rabbit-like gait.", "-31.322943767765537" ], [ "Cats in New Zealand Cats are a popular pet in New Zealand. Cat ownership is occasionally raised as a controversial conservation issue due to the predation of endangered species, such as birds and lizards, by feral cats. Domesticated cats The domestic cat (Felis catus) first arrived at New Zealand on Captain James Cook's ship HMS Endeavour in the mid-18th century, but were established by European settlers a century later. As of 2011, there are an estimated 1.419 million domestic cats in New Zealand, with almost half of all households owning at least one and an average of 1.8 cats per", "-31.246680551907048" ], [ "Exotic felines as pets Definition and differentiations Hybrids of the domestic cat with non-domestic species (e. g. the Bengal cat or the Savannah cat) are not normally considered wild cats. While this distinction is often overlooked in the media and in the public eye, such cat breeds (especially the F5 and subsequent generations) are much closer to the domestic cat in terms of housing and husbandry requirements, behavior, and legality.\nUnlike many other exotic pet species, wild cats usually cannot be kept indoors and require a large outdoor enclosure. This blurs the distinction between a wild cat being kept as an", "-31.216206868062727" ], [ "birds, the male green catbird does not build a bower, however the male will clear an area from which he will perform and display to other females. Similar to other male bower birds, he will attempt to attract females by displaying colourful fruits, flowers and leaves in his beak.\nGreen catbirds are monogamous breeders. Once a female accepts a male they will mate for life. The pair bonding is maintained by the male feeding the female throughout the year, as well as by calls in duet.\nThe breeding season is usually from October to January, although can be as early", "-31.05427092453465" ], [ "is indicative of a female cat may be due to the feminine proper name Tabby as a shortened form of Tabitha. Patterns The four known distinct patterns, each having a sound genetic explanation, are the mackerel, classic, ticked and spotted tabby patterns.\nA fifth pattern is formed by any of the four basic patterns when part of a patched pattern—a patched tabby, then, is a calico or tortoiseshell cat with patches of tabby coat (such cats are called caliby and torbie, respectively, in cat fancy).\nAll five patterns have been observed in random-bred populations. Several additional patterns are found in specific breeds", "-30.893829075444955" ], [ "cannot be a calico cat.\nIt is currently impossible to reproduce the fur patterns of calico cats by cloning. Penelope Tsernoglou wrote \"This is due to an effect called x-linked inactivation which involves the random inactivation of one of the X chromosomes. Since all female mammals have two X chromosomes, one might wonder if this phenomenon could have a more widespread impact on cloning in the future.\"\nCalico cats may have already provided findings relating to physiological differences between male and female mammals. Folklore Cats of this coloration are believed to bring good luck in the folklore of many cultures. In the", "-30.88876350154169" ], [ "females in the related genus Panthera, such as ligers and tigons, have successfully mated, producing tiligers and litigons.\nThe first modern, formal breeds of long-haired cats were the Persian and the Angora (after Ankara, Turkey) and were said to have come from those two areas. In popular culture In scientific illustrator Jenny Parks' 2017 book Star Trek Cats, Leonard McCoy is depicted as a gray-and-white longhair cat.", "-30.88409123721067" ], [ "with the availability of game and space, and do not overlap. The territory of a male can contain those of several females. The jaguar uses scrape marks, urine, and feces to mark its territory.\nLike the other big cats, the jaguar is capable of roaring and does so to warn territorial and mating competitors away; intensive bouts of counter-calling between individuals have been observed in the wild. Their roar often resembles a repetitive cough, and they may also vocalize mews and grunts. Mating fights between males occur, but are rare, and aggression avoidance behavior has been observed in the wild. When", "-30.65393602347467" ], [ "behaviour The Pantanal cat is diurnal and solitary. It feeds on small mammals such as cavies, ground-dwelling birds, small lizards, and snakes. Home ranges are between 3 and 37 km² (1.2 and 14.3 sq mi).\nHybrids between the Pantanal cat and oncilla are known from Brazil. Taxonomic history In 1994, it was suggested that its distinct pelage colour, pattern and cranial measurements warrant a specific status. But results of phylogeographic analysis did not support this. The validity of the genetic work has been questioned.\nOthers regarded it as \"likely [a] distinct species\". It is considered a subspecies of the Pampas cat by IUCN assessors.", "-30.643231129273772" ], [ "very timid and aggressive even when they are raised starting as kittens around a human population. This group was also very territorial and showed aggressive behavior within their own species as well. Hybrids between domesticated cats and silvestris showed less aggressive behavior and more docile temperament leading the scientist to believe that the behavioral difference was genetic and most likely due to a difference in species. This evidence suggest F.s. lybica is thought to be the common ancestor of all domesticated cats today. Domestic cat breed differentiation Different from many other domesticated animals who were bred for food, hunting, security", "-30.627953657181934" ], [ "nape bite typical of cats. They also pluck birds larger than pigeons before beginning to feed. Their vocalizations include hissing, spitting, meowing, purring, growling, and gurgling. Other methods of communication observed in captive Asian golden cats include scent marking, urine spraying, raking trees and logs with claws, and rubbing of the head against various objects – much like a domestic cat. Reproduction Not much is known about the reproductive behavior of this rather elusive cat in the wild. Most of what is known has been learned from cats in captivity. Female Asian golden cats are sexually mature between 18 and", "-30.615764037996996" ], [ "tortoiseshell or calico markings in the male, in the same way as XX chromosomes produce them in the female.\nAll but about one in three thousand of the rare calico or tortoiseshell male cats are sterile because of the chromosome abnormality, and breeders reject any exceptions for stud purposes because they generally are of poor physical quality and fertility. In any event, because the genetic conditions for calico coloring are X linked, a fertile male calico's coloring would not have any determination in the coloring of any male offspring (who would receive the Y, not the X chromosome from their father).\n\nAs", "-30.556306324346224" ], [ "male calicos are often sterile.\nCalico cats can also be lighter in color—dilute calicos. Fairly common among calicos, dilutes are distinguished by having grey (known as blue), cream and gold colors instead of the traditional black, red and brown patches along with their white. Dilute calicos are also called light calicos because they have no dark colors in their coats. History The coat pattern of calico cats does not define any breed, but occurs incidentally in cats that express a range of color patterns; accordingly the effect has no definitive historical background. However, the existence of patches in calico cats was", "-30.545813125092536" ], [ "cats along the East Coast of North America (in the United States and Canada) and in South West England, Wales and Kingston-upon-Hull. Polydactyl cats have been extremely popular as ship's cats. Although there is some controversy over whether the most common variant of the trait originated as a mutation in New England or was brought there from Britain, there seems to be agreement that it spread widely as a result of cats carried on ships originating in Boston, Massachusetts, and the prevalence of polydactyly among the cat population of various ports correlates with the dates when they first established trade", "-30.478618544526398" ], [ "Venus (cat) Venus, known as Venus the Two-Faced Cat (born 2008 or 2009) is an American tortoiseshell cat whose face is half black and half red tabby. In addition, her eyes are different colors too, her left eye is green, her right, blue. Her social media accounts use the tagline \"0% photoshopped, 100% born this way!\".\nVenus was adopted as a stray in September 2009 by a couple in North Carolina who have four other pets, cats Tater Tot, Roo and Ginger, and dog Halo. She became famous after a Reddit post in August 2012. As of September 2012 she", "-30.463119944528444" ], [ "female's range was 0.76–1.84 km² (0.29–0.71 sq mi).\nIriomote cats are territorial. Home ranges of males and females overlap, and one to two females live within a male's home range. Typically, home ranges of same gender cats will not overlap, but partial overlaps are seen. Often, these small overlaps are hunting grounds. It is thought that they patrol their territories during three to four days, marking and hunting as they go.\nYoung male Iriomote cats and some adult cats are transient, i. e. wandering over the island and waiting for an open home range slot that they can occupy by marking this area. Female cats", "-30.412219048885163" ], [ "Sphynx cat Behaviour Sphynxes are known for their extroverted behavior. They display a high level of energy, intelligence, curiosity, and affection for their owners. They are one of the more dog-like breeds of cats, frequently greeting their owners at the door and friendly when meeting strangers. Toronto The Canadian Sphynx breed was started in 1966 in Toronto when a hairless kitten named Prune was born to a black and white domestic shorthair queen (Elizabeth). The kitten was mated with its mother (something called backcrossing), which produced one more naked kitten. Together with a few naked kittens found later, the cat", "-30.410522503283573" ], [ "Tabby cat A tabby is any domestic cat (Felis catus) with an 'M' on its forehead, stripes by its eyes and across its cheeks, along its back, and around its legs and tail, and, differing by tabby type, characteristic striped, dotted, lined, flecked, banded or swirled patterns on the body—neck, shoulders, sides, flanks, chest and tummy. Tabby is not a breed of cat but a coat type seen in almost all genetic lines of domestic cats, regardless of status. The tabby pattern is found in many official\ncat breeds and is a hallmark of the landrace extremely common among the general", "-30.39739335028571" ], [ "Puma (genus) Description Pumas are large, secretive cats. They are also commonly known as cougars and mountain lions, and are able to reach larger sizes than some other \"big\" cat individuals. Despite their large size, they are thought to be more closely related to smaller feline species. The seven subspecies of pumas all have similar characteristics, but tend to vary in color and size. Pumas are thought to be one of the most adaptable of felines on the American continents, because they are found in a variety of different habitats, unlike other various cat species. Distribution and habitat Members", "-30.31345397926634" ], [ "species. Several tests showed that leopards, cougars, servals, and lynxes often reacted strongly to catnip in a manner similar to domestic cats; while lions and tigers can react strongly as well, they do not react as consistently.\nWith domestic cats, N. cataria is used as a recreational substance for pet cats' enjoyment, and catnip and catnip-laced products designed for use with domesticated cats are available to consumers. Common behaviors cats display when they sense the bruised leaves or stems of catnip are rubbing on the plant, rolling on the ground, pawing at it, licking it, and chewing it. Consuming much of", "-30.307431130320765" ], [ "kangaroo and are colloquially known as squittens. In some RH cats, the forelegs are twisted with the long bones either severely shortened or absent. All polydactyl cats are banned from German cat shows, possibly because of confusion with the impairing form of polydactyly associated with RH.\nPolydactyl cats are relatively common in southwest Britain, Norway, Sweden, and the eastern coast of the United States and Canada, and some parts of Asia. Sailors thought they were lucky. Various folktales and dubious assumptions about polydactyl cats include that they are superior rodent hunters, that they have better balance on ships in stormy weather,", "-30.273450518841855" ], [ "cheton. Juvenile big cats are called \"cubs\" rather than kittens; either term (but usually more commonly \"kitten\") may be used for the young of smaller wild felids, such as ocelots, caracals, and lynxes.\nA feline litter usually consists of two to five kittens born after a gestation lasting between 64 and 67 days, with an average length of 66 days, but from one to more than ten are known. Kittens emerge in a sac called the amnion, which is bitten off and eaten by the mother cat.\nFor the first several weeks, kittens cannot urinate or defecate without being stimulated by their", "-30.240404170646798" ], [ "catbirds typically socialize in pairs but can be seen in groups of 3-5 at the end of breeding season when their young are still somewhat dependent on their parents. Green catbirds do not flock but outside of breeding seasons it is not uncommon to see them in groups of around 20 birds all feeding in mutual territories, this is most common during winter fruiting seasons. Amongst these groups of green catbirds other species that can be found during these communal feeds are satin bowerbirds, regent bowerbirds and fig birds\nGreen catbirds will constantly spend their time seeking out food sources both", "-30.221142267459072" ], [ "to help organize their territory by marking prominent objects. If these objects or scents are removed it upsets the cat's perception of its environment. Importance of space for domestic and feral cats The domestic cat has become more sociable through contact of its own species through domestication. The domestic cat is more juvenile than the African wildcat; this promotes greater tolerance of other cats and domestic animals.\nIt has been documented that feral cat colonies have a social structure where the females of the group live together and help with each other's kittens whereas the males do not. There are also", "-30.2102363526501" ], [ "Tortoiseshell cat Tortoiseshell is a cat coat coloring named for its similarity to tortoiseshell material. Like calicos, tortoiseshell cats are almost exclusively female. Male tortoiseshells are rare and are usually sterile.\nAlso called torties for short, tortoiseshell cats combine two colors other than white, either closely mixed or in larger patches. The colors are often described as red and black, but the \"red\" patches can instead be orange, yellow, or cream, and the \"black\" can instead be chocolate, grey, tabby, or blue. Tortoiseshell cats with the tabby pattern as one of their colors are sometimes referred to as a torbie.\n\"Tortoiseshell\" is", "-30.155092866159976" ], [ "domestic cat is a distinct taxon Felis catus.\nIt was considered F. silvestris catus, a subspecies of the European wildcat in 2007, following results of phylogenetic research.\nIn 2017, the IUCN Cat Classification Taskforce followed the recommendation of the ICZN in regarding the domestic cat as a distinct species. Evolution The domestic cat is a member of the Felidae, a family that had a common ancestor about 10–15 million years ago.\nThe genus Felis diverged from the Felidae around 6–7 million years ago.\nResults of phylogenetic research confirm that the wild Felis species evolved through sympatric or parapatric speciation, whereas the domestic cat evolved", "-30.12392662453931" ], [ "province of Pe-chily, in China, there are cats with long hair and drooping ears, which are in great favour with the Chinese ladies; others say this is not a cat but an animal called 'Samxces'.\nIn 1885, the writer Gaston Percheron suggested the lop-eared cat might be a hybrid between the cat and a marten. In 1926, cat fancier Lilian J. Veley wrote in the magazine Cat Gossip that the Siamese cat (described in early breed standards as sable and dun in colour) was linked to the marten (described as sable and yellow in colour). Percheron's description changed the lop-eared", "-30.117772809171584" ], [ "cats in Europe, 7 million in Japan and 3 million in Australia. A 2007 report stated that about 37 million US households owned cats, with an average of 2.2 cats per household giving a total population of around 82 million; in contrast, there are about 72 million pet dogs in that country. Cats exceeded dogs in number as pets in the United States in 1985 for the first time, in part because the development of kitty litter in the mid-20th century eliminated the unpleasantly powerful smell of cat urine.\nAlthough cat ownership has commonly been associated with women, a 2007 Gallup poll reported that", "-30.07501290156506" ], [ "They can also be very sensitive with nervous temperaments, which do not adapt well to changes of environment or to strangers. Like Siamese, they can be extremely vocal and attention-demanding, feeling a need for human companionship. They have over 100 vocal sounds, much more than regular cats, making very unusual meows.\nMales are sometimes found to be overly aggressive towards other animals, will fight with other cats whenever they feel their territory has been invaded or just to express dominance. Point colors The Colorpoint Shorthair comes in a variety of point colors. They include: Red Point (also called Flame Point),", "-30.03500419447664" ], [ "so than males while hunting adult gamebirds, due to the larger size and more developed defenses of males (such as leg spurs present for defense and innerspecies conflicts in male of most pheasant species). Some authors have claimed this of male ring-necked pheasant (Phasianus cochilus), but these trends are not reported everywhere, as in southern Sweden equal numbers of adult male and female ring-necked pheasants, both sexes averaging 1,135 g (2.502 lb), were taken. While male goshawks can take black and hazel grouse of any age and thence deliver them to nests, they can only take capercaillie of up to adult hen", "-29.82016965173534" ], [ "Van, Turkish Angora and Norwegian Forest Cat.\nBecause genetic determination of coat colors in calico cats is linked to the X chromosome, calicos are nearly always female, with one color linked to the maternal X chromosome and a second color linked to the paternal X chromosome. In most cases, males are only one color (for instance, black) as they have only one X chromosome. Hence, they cannot be calico, unless they are affected by a rare genetic condition called Klinefelter syndrome, which gives them two X chromosomes and one Y chromosome. In addition to other symptoms caused by the condition, these", "-29.817921193200164" ], [ "1, 2013. Chausies are now being bred in both North America and Europe. The breed has begun the new breed recognition process in the World Cat Federation (WCF). Characteristics Currently, most authentic Chausies produced are late generation cats with fully domestic temperaments. Their TICA registration certificates will usually indicate that they are \"C\" generation or \"SBT,\" which nearly always means they are four generations or more beyond the jungle cat (F. chaus). In cases where they are \"A\" or \"B\" generation, it is usually because they have been recently outcrossed to another domestic breed to improve specific cosmetic traits, but", "-29.81403314723866" ], [ "female cat.", "-29.731567525624996" ], [ "or many other functional reasons, modern cat breeds originated from breeding for physical characteristics. Most of these breeds arose within the last 150 years, and, unlike other domesticated animals who have different physical traits that help them achieve different tasks, cat breeds have no differentiation in functionality; just aesthetic differences. Also different from domesticated mammals, domesticated cat breeds have very few genetic differences from their wild ancestors. Physical characteristics like hair color and pattern and the few genes that control these traits are what differentiate the wildcat ancestors from modern domesticated cats. Domesticated cat breeds are also unique in the", "-29.713398532941937" ], [ "four. The cat probably mates throughout the year in the wild, with births increasing when prey is plentiful. Research on captive male jaguars supports the year-round mating hypothesis, with no seasonal variation in semen traits and ejaculatory quality; low reproductive success has also been observed in captivity.\nGeneration length of the jaguar is 9.8 years.\nFemale estrus is 6–17 days out of a full 37-day cycle, and females will advertise fertility with urinary scent marks and increased vocalization. Females range more widely than usual during courtship. Pairs separate after mating, and females provide all parenting. The gestation period lasts 93–105 days; females", "-29.686433286289684" ], [ "Catfolk Publication history The catfolk first appeared in the third edition in the Miniatures Handbook (2003), and were further explored in Races of the Wild (2005). Physical description Catfolk resemble a cross between a large predatory cat and a human, with a sleekly muscled humanoid body and the head and mane of a feline. Most male catfolk wear their thick hair in braids, while females keep theirs short and sleek. The most common catfolk have feline characteristics reminiscent of lions, including thick manes for the males. Other groups have the characteristic markings and appearance of leopards, tigers, or cheetahs. Catfolk", "-29.638666431128513" ], [ "people. Personality California Spangled Cats are said to be affectionate, social, curious, and extremely devoted to their owners. They are big on eye contact and being in on the action; they love to perch on places that are at shoulder or eye level so that they can see exactly what is going on. They are known for their well-honed intelligence, athletic abilities, high energy level, and accidental acrobatics. California Spangled Cats love to pounce and have very sharp hunting skills, they also enjoy games that involve a large participation part by their owner.", "-29.60624221283979" ], [ "ground, approximately 9500 years old, of an adult human with a feline skeleton. Cats are not native to this area which means the tribe must have brought them with them when they established residence on the island. This finding suggest that people from the Middle Eastern region of the Old World began keeping cats many years prior to the Egyptians. Behavioral evidence Behavioral analysis of F.s. silvestris, which was thought to also be a common ancestor to domesticated cats, showed that there were significant differences between the two. F.s. silvestris which is the European wildcat, has a tendency to be", "-29.600031750946073" ], [ "Show cat Health A common conception is that all pedigreed cats are less healthy than random-bred cats due to inbreeding. The Ascent of Cat Breeds: Genetic Evaluations of Breeds and Worldwide Random-bred Populations by Lipinski et al. showed that pedigreed cats are more inbred than random bred cats. For some breeds such as Singapura and Burmese the genetic diversity is very low and should be addressed. Some breeders take great care to select for the healthiest animals, and this has the potential to reduce the incidence of health issues. An example of this is blindness in the Abyssinian caused by", "-29.595768079627305" ], [ "areas. It seems to be common in central South American regions. In Bolivia, it is the second most common cat after the ocelot. Ecology and behaviour The Geoffroy's cat is nocturnal and a solitary hunter that contacts conspecifics only during the mating season. Geoffroy's cats have been observed to stand up on their hind legs to scan the surrounding landscape and use their tail as a support, an unusual behaviour among cats. It is able to climb trees but rarely does, except to leave faeces to scent mark its territory.\nIt is at the top of the food chain in its", "-29.584301417926326" ], [ "reproductive function such as seen in wrens. Reciprocal preening initiated by either males or females can aid in mating. Additionally, this comfort behaviour has a hygienic purpose as seen in red howlers and cats. In red howlers, the animals bodies, (including their necks, heads, shoulders and arms) to remove ectoparasites. In domestic cats, mothers lick and rub their kittens heads to keep them clean. This maternal function soon evolves into a social function as the kittens begin to groom their mothers as well. This reciprocal grooming is a sign of affiliation and is necessary for group cohesion. Allopreening is seen", "-29.572304463828914" ], [ "Evolution of the domesticated cat The family Felidae, to which all living feline species belong, arose about ten to eleven million years ago. This family is divided into eight major phylogenetic lineages. The domestic cat is a member of the Felis lineage. A number of investigations have shown that all domestic varieties of cats come from a single species of the Felis lineage, Felis silvestris (the wildcat). Variations of this lineage are found all over the world and up until recently scientists have had a hard time pinning down exactly which region gave rise to modern domestic cat breeds. Scientists", "-29.54031619629677" ], [ "of females than males are of males, leading to greater overlap in female home ranges. Males are more likely to engage in agonistic behaviors, such as slowly circling each other, chasing, or actual fighting. Circling anteaters may cry a drawn-out \"harrr\". In combat, they slash at each other with their claws and wrestle each other to the ground. Fighting anteaters may emit roars or bellows. Males are possibly territorial. Foraging and predation This animal is an insectivore, feeding mostly on ants or termites. In areas that experience seasonal flooding, like the grassy plains of the Venezuelan llanos, anteaters mainly feed", "-29.52975626674015" ], [ "Chausie History The first hybrids of the jungle cat (Felis chaus) and the domestic cat (Felis silvestris catus) may have been born in Egypt several thousand years ago. The jungle cat is native to a vast region spanning Southeast Asia, India, and the Middle East (Sunquist, 2002). For the most part, it is an Asian species of wild cat that lives by rivers and lakes. But the species is found in one small area of North Africa: the Nile Delta. It is well known that the ancient Egyptians kept domestic cats as pets. Many domestic cat mummies have been found", "-29.528984446718823" ], [ "also found in boas and pythons. These pits allow the snakes to sense the body heat of birds and mammals, enabling pit vipers to hunt rodents in the dark. Reproduction Reptiles generally reproduce sexually, though some are capable of asexual reproduction. All reproductive activity occurs through the cloaca, the single exit/entrance at the base of the tail where waste is also eliminated. Most reptiles have copulatory organs, which are usually retracted or inverted and stored inside the body. In turtles and crocodilians, the male has a single median penis, while squamates, including snakes and lizards, possess a pair of hemipenes,", "-29.521585195936495" ], [ "Singapura cat Foundation In 1975, after working in Singapore, Tommy and Hal Meadow returned to the US with what they say were three local brown-ticked cats. These three cats, a pair of male and female kittens from the same litter and another young female, were the foundation used to establish the Singapura. The breed takes its name from the Malay name for Singapore. In 1981 a breeder visited Singapore and chanced upon a cat fitting the profile of the Singapura (with the exception of the tail) in the local Society for the Prevention of Cruelty to Animals. The cat was", "-29.50198286981322" ], [ "Human interaction with cats Hundreds of millions of cats are kept as pets around the world. Cats have either a mutualistic or commensal relationship with humans.\nCats and humans evolutionarily diverged from a common ancestor (boreoeutherian ancestor) approximately 80 million years ago, accumulating only 10–12 chromosomal translocations. The order of several genes in chromosomes X and Y in cats closely resembles that in humans. Pet Cats are common pets in all continents of the world (excluding Antarctica), and their global population is difficult to ascertain, with estimates ranging from anywhere between 200 million to 600 million.\nIn 1998 there were around 76 million", "-29.499566946702544" ], [ "English Sheepdog, American Pit Bull Terrier, West Highland White Terrier, Rat Terrier, Yorkshire Terrier, Dachshund, and Pug. Cats There are two types of demodectic mange in cats. Demodex cati causes follicular mange, similar to that seen in dogs, though it is much less common. Demodex gatoi is a more superficial form of mange, causes an itchy skin condition, and is contagious amongst cats. Other Demodectic mange also occurs in other domestic and wild animals, including captive pandas. Diagnosis For demodectic mange, properly performed deep skin scrapings generally allow the veterinarian to identify the microscopic mites. Acetate tape impression with squeezing", "-29.49924029657268" ], [ "of female groups and their offspring, a few adult males, known as \"resident males\", and a separate group of males, known as \"nonresident males\". In hairy-legged vampire bats, the hierarchical segregation of nonresident males appears less strict than in common vampire bats. Nonresident males are accepted into the harems when the ambient temperature lowers. This behavior suggests social thermoregulation.\nResident males mate with the females in their harems, and it is less common for outside males to copulate with the females. Female offspring often remain in their natal groups. Several matrilines can be found in a group, as unrelated females regularly", "-29.496861738851294" ], [ "inside and outside their territories and fiercely defend food sources within their territory from other males and females. Patrolling their territory also makes up a large portion of their daily activity. They will be heard regularly calling but this is most common during breeding season, when predators are in the vicinity of nests and when engaging other birds in territorial battles. Diet Green catbirds are classified as omnivorous but are mainly frugivorous (native, introduced or cultivated), feeding on figs and a variety of vegetable matter such as buds, shoots, flowers and seeds. Catbirds will also be seen in cultivated fruit", "-29.493297038134187" ], [ "different colors. Regardless of breed, cats with this trait are known as odd-eyed cats. In this breed, one iris is blue (\"silver\" in Japanese breeding terms) while the other is yellow (\"gold\"). This trait is more common in this breed than in most others, with the notable exception of the Turkish Van. Behavior Generally speaking, members of the breed are active, intelligent cats, with a strongly human-oriented nature, are easier to train to perform tricks than most breeds, and are more likely to enjoy learning human-mediated activities like walking on a harness and leash, and playing fetch. They are very", "-29.476518738549203" ], [ "Cat People like themselves had been rendered inoperative, they created a process combining science, sorcery, and focused mental power that could transform a human female into a \"Tigra,\" a humanoid tiger-like being with abilities that far surpassed those of either race.\nThis unnamed first Tigra defended the Cat People with great effectiveness, and allowed a new community to establish themselves on Earth, separate from the group that had been banished. This new population continued to live amongst humanity in secrecy through the present day, relying on enchantments that cast the illusion of a human appearance.\nNothing is known about the other Tigras", "-29.47091301192995" ], [ "mountain cat, catamount or panther, depending on the region, is a mammal of the family Felidae, native to the Americas. This large, solitary cat has the greatest range of any large wild terrestrial mammal in the Western Hemisphere, extending from Yukon in Canada to the southern Andes of South America. An adaptable, generalist species, the cougar is found in every major American habitat type. It is the second heaviest cat in the American continents after the jaguar. Although large, the cougar is most closely related to smaller felines. Coyote Order: Carnivora, Family: Canidae\nOccurrence: Forests, grasslands - C\nThe coyote (/kaɪˈoʊtiː/ or", "-29.435663748998195" ], [ "cats were grandchildren of four local cats he sent back to the US during a previous sensitive business trip to Singapore in 1971, contradicting the Meadows' earlier claim of the foundation cats' origin. Apparently Tommy Meadow lied about it to conceal the secret trip. The CFA found no wrongdoing and kept the Singapura's status as a natural breed. CFA's Joan Miller said that \"Whether they mated on the streets of Singapore or whether they mated in Michigan, it doesn't really matter.\" Referring to the cat picked up from the SPCA in 1981, she said that \"In addition, there is at", "-29.41712946171174" ], [ "population of cats across the world. The tabby pattern is naturally occurring and is connected to the coat of the domestic cat's direct ancestor and close relatives, the African wildcat (Felis lybica lybica), the European wildcat (Felis silvestris silvestris) and the Asiatic wildcat (Felis lybica ornata), all who have similar coats, both by pattern and coloration. A genetic study of tabbies found five genetic clusters to be ancestral to cats of various parts of the world. Etymology The English term tabby originates from the translation of the French phrase \"striped silk taffeta,\" the root of which is tabis, meaning \"a", "-29.38995044082185" ], [ "of the genus Puma are primarily found in the mountains of North and South America, where a majority of individuals can be found in rocky crags and pastures lower than the slopes grazing herbivores inhabit. Though they choose to inhabit those areas, they are highly adaptive and can be found in a large variety of habitats, including forests, tropical jungle, grasslands, and even arid desert regions. Unfortunately, with the expansion of human settlements and land clearance, the cats are being pushed into smaller, more hostile areas. However, their high adaptability will likely allow them to avoid disappearing from the", "-29.332455646712333" ], [ "gland secretions and domestic cat allergens may account for anaphylaxis in susceptible individuals.\nVocalizations of the pygmy slow loris include a short whistle, mother-infant contact calls, and a whistling sound produced during estrus. Reproduction The female is mildly aggressive to her suitors during estrus, and will often lunge at males, usually after a long period of being approached and followed. Vocalizations during mating include a whistling sound, most commonly by the female, usually during June and August, coinciding with female estrus. Other vocalizations recorded during estrus include chittering and growling. The testosterone levels of the males are seasonal, with peaks coinciding", "-29.331874547266125" ], [ "reproductive organs. Mammals Mammals mate by vaginal copulation. To achieve this, the male usually mounts the female from behind. The female may exhibit lordosis in which she arches her back ventrally to facilitate entry of the penis. Amongst the land mammals, other than humans, only bonobos mate in a face-to-face position, as the females' anatomy seems to reflect, although ventro-ventral copulation has also been observed in Rhabdomys. Some sea mammals copulate in a belly-to-belly position. Some camelids mate in a lying-down position. In most mammals ejaculation occurs after multiple intromissions, but in most primates, copulation consists of one brief intromission.\nIn", "-29.303163652075455" ], [ "2005. The standard of points describes the cat as being medium-sized and muscular, with large ears, almond shaped eyes and distinctive long, webbed toes. They require frequent grooming, in spite of their lack of coat. Over-bathing can cause the skin to become very oily.\nThe Peterbald breed was originally created by crossing Donskoy with Oriental Shorthair cats to create a hairless cat of Oriental-type. Matings between the Donskoy and the Peterbald are no longer permitted since 2000, and outcrossing is not permitted, except with the domestic shorthair, due to the effect of the Donskoy's dominant hairless mutation. Health Not all cat", "-29.29836548282765" ], [ "Compared to other cats, including small wild cats, the Iriomote cat is lacking one pair of premolars on the top jaw behind the canines. In addition to this, unlike most other subtropical mammals, Iriomote cats' teeth give details about their year-to-year history. It is expected that these details will help determine the age and behavior of the cats.\nThe anal scent glands of the Iriomote cat surround the anus; this contrasts with other cat species', where they are inside the anus. Distribution The Iriomote cat is indigenous to the Japanese island of Iriomote, which spans about 290 km² (110 sq mi). Iriomote consists predominantly", "-29.274858982127625" ], [ "a single report of a wild melanistic individual from Brazil, although this coat pattern has also been observed in some captive specimens. Distribution and habitat Pantanal cats are found from sea level to 2,000 metres (6,600 ft) in east-central Brazil, Uruguay, and neighbouring regions of central South America (Bolivia, Paraguay and Argentina). Within this region, they inhabit a range of habitats from open grassland to dense forest, although they are specifically named for the Pantanal wetlands of Brazil, Bolivia and Paraguay. It has also been reported from agricultural land, and therefore must have some limited tolerance for human disturbance. Ecology and", "-29.211431763658766" ], [ "The sexes are separate. The love dart of the male is considerable, without an exterior furrow at its base.\nAll animals are carnivores and scavengers, feeding on dead or damaged marine animals. They are provided with a cylindrical trunk, susceptible of being much elongated or of being concealed entirely within the body. This trunk is armed at its extremity with beaks, which enable the animal to pierce the shell of other molluscs and crustaceans, upon which it preys.\nThe sexes are separate. The shells of the males are generally smaller, and less inflated than those of the females. The males are provided", "-29.19736088992795" ], [ "men and women in the United States of America were equally likely to own a cat. The ratio of pedigree/purebred cats to random-bred cats varies from country to country. However, generally speaking, purebreds are less than 10% of the total population. Fur According to the Humane Society of the United States, as well as being kept as pets, cats are also used in the international fur trade. Cat fur is used in coats, gloves, hats, shoes, blankets and stuffed toys. About 24 cats are needed to make a cat fur coat. This use has now been outlawed in several countries,", "-29.187260910315672" ], [ "time, they brought with them felines descended from the Felis Iberia to protect food from rodents. Those cats represent the founding lineage of the beautiful, loving, healthy Brazilian Shorthair purebred cat. History The breed had developed without rules or special cares; until, in the 1980s, Brazilian-born engineer Paulo Samuel Ruschi, a cat breeder currently living in New York City, started to settle the rules for the breed after deciding to study genetic and morphological aspects of the cats running in parks, gardens and streets of several cities in Brazil. He noticed that the country had unique cats, and yet, that", "-29.17231975388131" ], [ "males at the F5 and F6 generations. Presumably, this is due to the higher serval percentage in C and SBT cats. The problem may also be compounded by the secondary nondomestic genes coming from the Asian leopard cat in the Bengal outcrosses that were used heavily in the foundation of the breed.\nFemales of the F1-F3 generations are usually held back for breeding, with only the males being offered as pets. The reverse occurs in the F5-F7 generations, but to a lesser degree, with the males being held as breeding cats, and females primarily offered as pets. Health considerations Hypertrophic cardiomyopathy", "-29.16971141072281" ], [ "African wildcat (Felis lybica) is the most common cat followed by the jungle cat (Felis chaus).\nIn view of the huge number of cat mummies found in Egypt, the cat cult was certainly important for the country's economy, as it required breeding of cats and a trading network for the supply of food, oils and resins for embalming them.", "-29.150221528601833" ], [ "cats of the genus Felis could purr. However, felids of the genus Panthera (tigers, lions, jaguars and leopards) also produce sounds similar to purring, but only when exhaling. The subdivision of the Felidae into \"purring cats\" on the one hand and 'roaring cats' (i.e. non-purring) on the other, originally goes back to Owen (1834/1835) and was definitely introduced by Pocock (1916), based on a difference in hyoid anatomy. The \"roaring cats\" (lion, Panthera leo; tiger, P. tigris; jaguar, P. onca; leopard, P. pardus) have an incompletely ossified hyoid, which according to this theory, enables them to roar but not to", "-29.14474595786305" ], [ "characteristics of the vocal folds and an elongated vocal tract, the latter rendered possible by an incompletely ossified hyoid. Cats may purr for a variety of reasons, including when they're hungry, happy, or anxious. Meow The most familiar vocalisation of adult cats is a \"meow\" or \"miaow\" sound (pronounced /miˈaʊ/). The meow can be assertive, plaintive, friendly, bold, welcoming, attention-soliciting, demanding, or complaining. It can even be silent, where the cat opens its mouth but does not vocalize. Just like humans who talk a lot when they're happy, cats can too. According to The Purrington Post, a chatty cat", "-29.137729708803818" ], [ "is more likely in companion animals and swine than ruminants. The cause of this condition can vary from a combination of genetics, environment, and epigenetics. Cats Cryptorchidism is rarer in cats than it is in dogs. In one study, 1.9% of intact male cats were cryptorchid. Persians are predisposed. Normally, the testicles are in the scrotum by the age of six to eight weeks. Male cats with one cryptorchid testicle may still be fertile; however, male cats with two cryptorchid testicles are most likely to be sterile. Urine spraying is one indication that a cat with no observable", "-29.1373601356172" ], [ "the recent American Bobtail breed, but Manx, Japanese Bobtails and other short-tailed cats are not used in its breeding program, and the mutation seems to have appeared in the breed spontaneously. Possible relation to the Pixie-bob breed, which also ranges from rumpy to fully tailed, is unknown. Recognition as a breed Manx cats have been exhibited in cat shows, as a named, distinct breed (and with the modern spelling \"Manx\"), since the late 1800s. In that era, few shows provided a Manx division, and exhibited specimens were usually entered under the \"Any Other Variety\" class, where they often could not", "-29.1364771919325" ], [ "as is the case in other catsharks. Adult females have a single functional ovary and two functional oviducts; apparently a single egg matures in each oviduct at a time. The eggs are enclosed in capsules measuring 6.8–7.4 cm (2.7–2.9 in) long, 1.9–2.0 cm (0.75–0.79 in) across, and 8–9 cm (3.1–3.5 in) thick. Males and females attain sexual maturity at roughly 40 cm (16 in) and 40–43 cm (16–17 in) long respectively. Human interactions The Australian sawtail catshark is a frequent incidental catch of bottom trawl commercial fisheries operating throughout its range, including the Western Australian Deep Water Trawl Fishery, the South East Trawl Fishery, and the Queensland East Coast Trawl", "-29.13549444664386" ], [ "as a quiet cat. Typically placid in nature, it adapts quite well to apartment life. Himalayans tend to be more active due to the influence of Siamese traits. In a study comparing cat owner perceptions of their cats, Persians rated higher than non-pedigree cats on closeness and affection to owners, friendliness towards strangers, cleanliness, predictability, vocalization, and fussiness over food. Coloration The permissible colors in the breed, in most organizations' breed standards, encompass the entire range of cat coat-pattern variations.\n\nThe Cat Fanciers' Association (CFA), of the United States, groups the breed into four coat-pattern divisions, but differently: solid, silver and", "-29.132131739635952" ], [ "males typically have longer teeth with fewer cusps. This is believed to aid in courtship biting. Behavior Redspotted catsharks are solitary, nocturnal creatures. They stay in caves and crevices during the day and emerge at night to feed. They are migratory. However, they live most of the year near the edge of the continental shelf.\nCommunication specific to the redspotted catshark is unknown. However, as with most other sharks, including other members of the family Scyliorhinidae, it is believed that they have a well-developed sense of smell, and that they are electroreceptive, which allows them to detect electricity emitted by other", "-29.131893969635712" ], [ "Bowerbird Behaviour and ecology The Ailuroedus catbirds are monogamous, with males raising chicks with their partner, but all other bowerbirds are polygynous, with the female building the nest and raising the young alone. These latter species are commonly dimorphic, with the female being more drab in color. Female bowerbirds build a nest by laying soft materials, such as leaves, ferns, and vine tendrils, on top of a loose foundation of sticks.\nAll Papuan bowerbirds lay one egg, while Australian species lay one to three with laying intervals of two days. Bowerbird eggs are around twice the weight of those of most", "-29.131765128462575" ], [ "use larger mammals and chose cats, since they already had a significant amount of neurological data on them. Selection and training In 1963, Centre d'Enseignement et de Recherches de Médecine Aéronautique (CERMA) purchased 14 cats from a pet dealer for the testing, with the individual animals selected based on their temperament; all of the cats were female, for their calmer demeanor. The cats were unnamed prior to the launch to reduce the likelihood that the scientists would become attached to them. All of the cats had permanent electrodes surgically implanted into their brain to assess neurological activity. Some of the", "-29.11533210336347" ], [ "were favourable toward the breed; in The Cat: Its Points and Management in Health and Disease, Frank Townend Barton wrote in 1908: \"There is nothing whatever to recommend the breed, whilst the loss of the tail in no way enhances its beauty.\"\nThe Manx was one of the first breeds recognised by the Cat Fanciers' Association (CFA) (the predominant United States-based pedigreed cat registry, founded in 1908), which has records on the breed in North America going back to the 1920s. Body and legs Manx are medium-sized cats, broad-chested with sloping shoulders and flat sides, and in show condition are firmly", "-29.091068203473696" ], [ "of cats in the United States are Type A, but the percentage of Type B cats increases in other countries, such as Australia. In a study conducted in England, 87.1% of non-pedigree cats were type A, while only 54.6% of pedigree cats were type A. Type A and B cats have naturally occurring alloantibodies to the opposite blood type, although the reaction of Type B cats to Type A blood is more severe than vice versa. Based on this, all cats should have a simple blood typing test done to determine their blood type prior to a transfusion or breeding", "-29.065615829022136" ], [ "Tortoiseshells are also known as calimanco or clouded tiger cats, and by the abbreviation \"tortie\". Tortoiseshells have patches of orange fur (pheomelanin based) and black or brown (eumelanin based) fur, caused by X-inactivation. Because this requires two X chromosomes, the vast majority of tortoiseshells are female, with approximately 1 in 3,000 being male. Male tortoiseshells can occur as a result of chromosomal abnormalities such as Klinefelter syndrome, by mosaicism, or by a phenomenon known as chimerism, where two early stage embryos are merged into a single kitten.\nTortoiseshells with a relatively small amount of white spotting are known as \"tortoiseshell and", "-29.007947150152177" ], [ "behaviour occurs it could also lead to the dominant cat preventing subordinate cats from eating and using the litter box. This can cause the subordinate cat to defecate somewhere else and create problems with human interaction. Social conflicts Social conflicts among cats depend solely on the behaviour of the cats. Some research has shown that cats rarely pick fights, but when they do its usually for protecting food and/or litters, and defending territory.\nThe first sign of an imminent tomcat duel is when both cats draw themselves up high on their legs, all hair along the middle of their backs is", "-29.002089742280077" ], [ "Pinanga kuhlii and P. zavana palms at Gunung Gede Pangrango National Park. They also feed on palm flower sap, which when fermented becomes toddy, a sweet liquor. Because of this habit, they are called the toddy cat. Reproduction Due to their solitary and nocturnal habits, little is known about the reproductive processes and behaviour of civets. In March 2010, a pair of palm civets was observed when attempting to mate. The pair copulated on the tree branch for about five minutes. During that period, the male mounted the female 4–5 times. After each mounting, the pair separated for a few", "-28.95588177407626" ], [ "males to be included as permanent members of their harems.\nIn Grévy's zebras and the wild ass species, adults have more fluid associations and adult males establish large territories and monopolize the females that enter them. These species live in habitats with sparser resources and standing water, and grazing areas may be separated. Groups of lactating females are able to remain in groups with nonlactating ones and usually gather at foraging areas. The most dominant males establish territories near watering holes, where more sexually receptive females gather. Subdominants have territories farther away, near foraging areas. Mares may wander through several territories,", "-28.940357017097995" ], [ "of The Cat (Volume 4 of Histoire Naturelle, as translated into English by William Smellie in 1781):\nOur domestic cats, though they differ in colour, form no distinct races. The climates of Spain and Syria have alone produced permanent varieties: To these may be added the climate of Pe-chi-ly in China, where the cats have long hair and pendulous ears, and are the favourites of the ladies. These domestic cats with pendulous ears, of which we have full descriptions, are still farther removed from the wild and primitive race, than those whose ears are erect....\nI formerly remarked, that, in China, there", "-28.935652182859485" ], [ "Felis margarita margarita Characteristics The Saharan sand cat is the smallest of all the four subspecies. It has a bright fur colour, pronounced markings and 2–6 rings on the tail. Distribution and habitat The Saharan sand cat is patchily distributed in desert areas of Morocco, Algeria, Niger and Egypt. Ecology and behaviour Sand cats prey on small rodents, birds and reptiles. They drink water if available, but satisfy most of their moisture need from prey, which they can dig out of the sand quickly. They have also been observed to hunt and consume horned and sand vipers. Reproduction In the", "-28.923319495283067" ], [ "and American kestrels (Collins, 1980). Depredation by domestic cats has been observed in at least one colony (California Wildlife, 1990). Relation to other least terns The California least tern is a subspecies of the least tern (Sternula antillarum) that breeds on the United States Atlantic coast from Maine to Florida and Texas. Sternula antillarum is also found in breeding grounds along rivers in the midwest and Great Plains of the United States. Both the Californian subspecies and the nominate race of least tern are approximately 23 centimeters in length. Both have conspicuous black markings on their outermost primaries and fly", "-28.88838615664281" ], [ "Felid hybrid Caracal × serval hybrids: caraval and servical A caraval is a cross between a male caracal (Caracal caracal) and a female serval (Leptailurus serval)), while a male serval's and female caracal's offspring are called servicals. The first servicals were bred accidentally when the two animals were housed together in the Los Angeles Zoo. The offspring were tawny with pale spots. If a female servical is crossed to a male caracal, the result is a car-servical; if she is crossed to a male serval, the result is a ser-servical, etc. Bobcat × jungle cat: jungle lynx", "-28.87625825491341" ], [ "A jungle lynx is a hybrid between the bobcat and the wild jungle cat species (F. chaus, not to be confused with the Jungle Cat breed, detailed below), bred as an exotic pet. Later generations can include domestic genes, as they may be crossed to Savannah, Egyptian Mau, Serengeti, and Pixie Bob domestic breeds, and have also been crossbred with the wild caracal. European wildcat × jungle cat: Euro-chaus The Euro-chaus is a man-made hybrid between the European wildcat (Felis silvestris) and the jungle cat species. It should not be confused with the Euro-chausie, which is a cross between", "-28.874006738653407" ], [ "on its back that glow yellow under a blue light. Biology and ecology The blotched catshark preys on cephalopods, shrimp, and bony fishes of surprisingly large size. Its internal anatomy suggests that it lays encapsulated eggs like the other members of its family, though these egg cases have not been observed. The sizes of the known immature specimens suggest that the adults are relatively large. Human interactions Harmless to humans and rarely caught by fisheries, the blotched catshark is of no economic importance. It has been assessed as Data Deficient by the International Union for Conservation of Nature (IUCN).", "-28.869999291957356" ], [ "calico or tortoiseshell markings in male cats is an indicator of the relevant abnormal karyotype. As such, male cats with calico or tortoiseshell markings are a model organism for KS, because a color gene involved in cat tabby coloration is on the X chromosome. Diagnosis About 10% of KS cases are found by prenatal diagnosis. The first clinical features may appear in early childhood, or more frequently, during puberty, such as lack of secondary sexual characteristics and aspermatogenesis. Despite the presence of small testes, only a quarter of the affected males are recognized as having KS at puberty. Another", "-28.86797808764095" ], [ "may measure several square km, and females a rather smaller territory. Ecology The Arabian wildcat is nocturnal; it is a solitary animal and has several dens, rock crevices, hollow trees or empty fox burrows, into which it can retreat in different parts of its territory. It feeds on jerboas, jirds and other small rodents, small birds, reptiles and large insects, obtaining most of its fluid needs from its food. It is fierce and agile. Breeding takes place at most times of year. The male is drawn to the female by the pheromones she produces when she is sexually receptive. The", "-28.863750040298328" ], [ "is bright red in direct sun with a partial white eye-ring.\nMale and female birds share similar plumage, making it very difficult to distinguish between the sexes. Juvenile birds also have similar plumage, although it is duller. Very young birds have fluffy grey down on their heads (Donaghey. R. 1996). Call The green catbird's call varies from a short, recognisable \"heer-I-aar\" to a long, drawn-out, quavering version: \"heeeir-Ieee-aaa-aarr\". Distribution and habitat According to The Field Guide to Australian Birds (Michael Morcombe, 2003) (2nd edition), green catbirds are found along the length of the east coast of NSW (in areas", "-28.849599595414475" ], [ "not be impregnated by the first male with which they mate. Furthermore, cats are superfecund; that is, a female may mate with more than one male when she is in heat, with the result that different kittens in a litter may have different fathers.\nThe morula forms 124 hours after conception. At 148 hours, early blastocysts form. At 10–12 days, implantation occurs.\nThe gestation of queens lasts between 64 and 67 days, with an average of 65 days.\nData on reproductive capacity of more than 2,300 free-ranging queens were collected during a study between May 1998 and October 2000. They had one to", "-28.847831777646206" ] ]
nyulb
Why Does Nothing Seem to Change in Africa?
[ "There is a big misconception that things aren't changing in Africa. In reality countries like Nigeria are developing at quite a fast rate. The issue affecting their development is partly do do with structural issues. Political systems are pretty weak in comparison to western standards as there are lots of interests and the way in which they developed differs from the west. At the same time there are lots of internal issues to do with different ethnicities being lumped together in states (Like in Nigeria, there is a Christian south and Muslim North). So in terms of internal development, quite a lot of African states are making progress. At the same time, sending aid such as food can undercut the local produce in terms of cost. So nowadays other rising powers have alternatives such as investing in infrastructure in return for natural resources. An example is China, who will build Hydropower dams in return for resources, the benefit being that China doesn't demand a lot from them. Some African countries are more exposed to disasters such as famine due to the weather and other things like climate change and desertification. This makes developing a stable economy quite difficult. It is still important to give to these charities, as charities such as Save the Children invest in medicine for countries which lack the support for there. If an economy is to develop, it needs to make sure its workforce is sustainable and the government needs to be able to invest in growth at the same time as protecting its citizens. So sending money to them can help these countries develop faster in the long term. A good thing to get a copy of if you want to find out how diverse, developed and modern their systems are is the Africa Report. URL_0 *to be honest, Africa is such a massive continent with a huge number of people, it causes depend on what country you are looking at.*", "Many cultures in Africa have values that differ wildly from Western culture that don't put a primary emphasis on increasing education, technology and money. Also many of the cultures in Africa are at odds, much like in the middle east, and the conflict frequently prevents progress. Also many of the governments are corrupt and steal the foreign aid to give to government officials and not the citizens it is intended for. Keep in mind that Africa is a very large, diverse place and some places in Africa have become more stable, while other places have become less stable as a result of civil wars and intracontinental conflict.", "The actual problems that lead to starving African children are structural. Throwing money at the problem doesn't fix the structure, so it isn't going to lead to lasting change; what it *does* do is make children in Africa starve less. That's a good thing to do regardless of whether or not you're really changing things.", " > this help immensely in understanding the underlying problems that plague the country uh. Africa is a continent, not a country.", "One of the problems with sending tons of free food is that it takes all the local farmers out of the market. Obviously no one is going to buy food when they can just wait a day and get more for free. As a result, farmer's family is now also waiting in line for free food.", "Because what poor countries need is Capitalism and Commerce, not aid. Fortunately, this is starting to happen in some places, though not others.", "Lots of the money that is given to charities is take up in the administration of the distribution, so actually only a fraction of the money you give will end up in Africa. I also remember reading a quote from somewhere where someone asked an african child if they had new stuff because of the all the donations. The African child said no, but pointed out that the soldiers had new guns.", "I've had four people in my immediate family work in Africa - two in the Peace Corps and two for other organizations. Several other of my family members, myself included, have lived abroad in other developing regions. So my answer is based on those experiences. > I just assumed they fixed one place up and moved on to the next and the place they had recently helped would just crumble and fall apart again. I think this has a lot of truth to it. In contrast to places like South America, many Africans don't make much of an effort to maintain development projects. \"Why\" this happens is a little more complicated. First off, people know that if they just don't fix anything, eventually more aid workers will come by and do it for them. What aid does come by is usually delayed by officials looking for a cut of the money, and when it actually starts it's very common for people to steal from aid programs. For example, my brother was in Cameroon auditing for a charity, and one of the biggest problems they had was when they tried to build a school or a mill, the construction materials would all get stolen. That this is allowed to happen is the result of a corrupt or nonexistant law enforcement. Then think about the kinds of people that would be likely to solve these problems - the brightest, most motivated, etc. Many of them leave their homes for good to move to America or Europe, and of course you can't blame them, because it's impossible to work in theoretical physics in Tanzania. Lastly, even when progress *is* made, it is often destroyed in war or by natural disaster. I think it's hard for most of us to imagine what that's like, because even the wars that devastated Europe in the last 100 years were, with one notable exception, political conflicts rather than targeted genocides, \"total wars,\" and that kind of thing.", "[Extremely relevant and insightful visual representation of statistical change in Africa]( URL_0 ) In short, disease, and enough political strife to prevent proper handling of these diseases. It seems to me the reason Africa doesn't seem to change is an issue of relativity. When you compare Africa to the first world, it has always been behind since recent history. And when one region is consistently wealthier than another, the perception in America will be that Africa is forever impoverished. edit: sorry linked wrong video, i fixed it : < ", "Just giving money actually makes the problem worse. Imagine giving a homeless man some change... He'll use it to survive, not acquiring any skills to make the money himself. If you gave a homeless man an education, that'll be way more valuable...", "I went to Africa last summer, and my sister picked up this really interesting book with stories from all over the continent. One talked about a man who was visiting Nigeria (I can't recall if he was a tourist, or a local visiting family) and everywhere he went he kept hearing of tragedy, loss, famine, war... and he asked the people, \"why do you put up with this? why do you not do something?\" and they always replied \"it is the way it is because God made it so, you cannot change it.\" or \"its always been this way, so why bother to change?\". For instance he was told a story of a group of kids on a field trip who took off on a plane that crashed almost as soon as it was in the air - everyone died. The mothers of the kids wailed and cried - and he asked why no one had bothered to fix the plane (because mechanical failure and crappy repair jobs caused the plane to crash), they replied that \"why bother...God made the plane crash it was meant to be, no foresight on humans could have changed that - or that planes crash all the time, its normal why change it?\" But of course a little foresight would have changed the outcome of that plane crash, if the mechanics had taken their time it would have been avoided - if the cabby had fixed that back seatbelt his passengers wouldn't have died in the car crash...and so on. I guess where I am going with this is that logic, reasoning and cultural norms are very different in Africa and from country to country - going in there many aid groups do their best but their goals may go against the cultural grain... Sometimes the people of the country don't think of long term consequences to actions because they justify them using other means, or they simply say its the way its always been. Lack of education plays a role in this justification, and so does religion, as well as culture and local history. I am not saying that they don't want change - of course those mothers would want their kids back if given a choice, but its as if they don't understand it could have been prevented. It just is.", "You said \"plague the country\" I really hope you don't think Africa is a country." ]
[ [ "we can change governments every year, but without a change of mind-set, Africa will remain poor and under-developed.\nHe conclude that a government is as rich as its citizens and if the citizens are poor, the country will be poor. View on world resources Resources abound in the world and many are those not yet discovered, when their needs will arise, new discoveries will be made. Those who argue that the world will run out of resources are wrong. As long as human beings remain on earth, there will always find new ways to meet their needs.\nHistory tells us that", "-28.886164324299898" ], [ "origin of its own norms, develops as self-image, and integrates this image into the set of signifiers asserting what it supposed to be its identity.” This has resulted in a distortion of discourse about Africa because the continent is evoked primarily for the purpose of meditation on the West rather than for its own reasons and own purposes. It is this handicapped mode of analysis which Mbembe analyzes and from which he departs in the subsequent essays about the history and present of the postcolonial African subject. Of Commandement The first chapter takes an economic approach to analyzing the African", "-28.058084934426006" ], [ "because of the depleted soil. Recently, more countries have initiated programs to change to traditional, sustainable forms of agriculture such as shifting cultivation and bush fallow in order to grow enough food to support the population while maintaining soil fertility which allows agriculture to continue in future generations. (Gyasi) Modern era Most African economies, especially sub-Saharan Africa stagnated during this time and the period ended with many of Africa's national economies in ruins partly due to lop-sided trade with the rest of the world. Some have argued that economic decline has been caused by the meddling in the internal affairs", "-27.53741580744827" ], [ "using their as a blueprint for other cultures—ultimately causing one to pass judgment on the other culture. These judgments are often negative and detrimental.\nCritics of foreign humanitarian efforts in Africa argue that Western society’s obsession with “saving” Africa bear traces of ethnocentrism. Western ethnocentric perception of Africa results in it being viewed as less civilized and developed. Thus, these views perpetuate Africa’s appearance as a continent composed of inferior countries. As a result, the continent Africa is painted as helpless without foreign intervention. Names of organizations, which call for Westerners to “save the children,” reflect this notion\nWhile Western efforts have", "-27.098690742859617" ], [ "of the nineteenth century, scholars have argued that European colonization in Africa has led to the elimination of many various cultures, worldviews, and epistemologies, particularly through neocolonization of public education. This, arguably has led to uneven development, and further informal forms of social control having to do with culture and imperialism. A variety of factors, scholars argue, lead to the elimination of cultures, worldviews, and epistemologies, such as \"de-linguicization\" (replacing native African languages with European ones), devaluing ontologies that are not explicitly individualistic, and at times going as far as to not only define Western culture itself as science, but", "-27.033875731227454" ], [ "Africa as countries residing within this region have fertility levels that are declining at a much slower rate than before and have one of the highest projected population growths compared to other areas of the world. Individuals inhabiting sub-Saharan Africa have slowly rejected Coale's second precondition for fertility decline which, as stated before, is willingness. They are resistant and unwilling to accept the integration of modern forms of contraception. This can be attributed to the influence of religion and the values it imposes on culture even in individuals who don't practice any religion. To add on, the society they live", "-26.40572874021018" ], [ "words, Africans were not simply removed from Africa to the Americas, but Africans were separated from philosophies, languages, religions, myths, and cultures. Separations are violent and are often accompanied with numerous changes in individuals and groups. Finding a way to relocate or to reorient our thinking was essential to the presentation of African cultural reality. In fact, without such a reorientation, Africans have nothing to bring to the table of humanity but the experiences of Europeans, those who initially moved Africans off of social, cultural, and psychological terms.", "-26.3183895389717" ], [ "that Africa cannot change or develop if their respective governments don’t change their current education system. The current education system in every African country is not relevant to their situation, context and needs, therefore not suitable for Africans. Africans according to Michel Ngue-Awane will remain servants, living on \"borrowed-self\" as long as they continue with the colonial education system. True education should be geared toward identifying one’s potentials and needs, and developing programmes that will help to meet those needs. He believe that Africa can lead the world if Africans discover their true identity and follow it. View on", "-25.81898372240539" ], [ "head than one dollar to expand output.\"\nSince the majority of African countries have high fertility rates relative to the rest of the world, it is clear that most African countries have not undergone a demographic transition. In other parts of the world, there is evidence that economic growth increases after a country undergoes demographic transition. This is due to more women working, greater parental investment in children in terms of education and attention, and longer, more productive working life due to health improvements. Although other improvements in public health are necessary to fully undergo a demographic transition, it can not", "-25.700340135348597" ], [ "is likely to have been negative. Modernisation theory emphasises that colonial powers built infrastructure to integrate Africa into the world economy, however, this was built mainly for extraction purposes. African economies were structured to benefit the coloniser and any surplus was likely to be ‘drained’, thereby stifling capital accumulation. Dependency theory suggests that most African economies continued to occupy a subordinate position in the world economy after independence with a reliance on primary commodities such as copper in Zambia and tea in Kenya. Despite this continued reliance and unfair trading terms, a meta-analysis of 18 African countries found that a", "-25.655211311619496" ], [ "to think of Africa as one big place. In reality, it’s composed of hundreds of different cultures, languages and peoples. By Western standards, much of it is poor. But we can’t apply the same standards to African life. The people we met had such vitality and love of life. I’ve never been to a place where the people are so quick to smile and welcome you. Nor have I been to a place where the kids are so eager to learn. We were constantly approached and asked for pens or paper. We learned that kids throughout Africa often can’t attend", "-25.619607512868242" ], [ "negative growth in the fourth quarter of 2008, with GDP returning to positive in the first quarter of 2009.\nThe financial crisis did not affect developing countries to a great extent. Experts see several reasons: Africa was not affected because it is not fully integrated in the world market. Latin America and Asia seemed better prepared, since they have experienced crises before. In Latin America, for example, banking laws and regulations are very stringent. Bruno Wenn of the German DEG suggests that Western countries could learn from these countries when it comes to regulations of financial markets. Country specific details about", "-25.556366884142335" ], [ "liberalisation, high indebtedness and political instability of the former African colonies have reduced their political and economic attractiveness, leading France to adopt a more pragmatic and hard-nose approach to its African relations. Furthermore, many of the dense web of informal networks that have bound France to Africa has declined.\nThe pre-1990 aid regime of the old Françafrique, which has made the sub-Saharan African countries economically dependent on France has now given way to a new regime that is supposed to promote self-sufficiency as well as political and economic liberalism. France has also adopted the Abidjan doctrine, which has internationalised the economic", "-25.329583767990698" ], [ "Sub-Saharan Africa.” In 1981, when the report was published, an important external factor was the instability of the global economy, particularly the stagflation of the 1970s, and the 1979 energy crisis.", "-25.23706240473507" ], [ "as quickly or as precisely as you may be accustomed to\". Due to the cultural influence of \"Caribbean time\" or \"island time\", locals do not have the sense of time pressure that is part of Western culture. Self-criticism and commentary The concept of African time has become a key topic of self-criticism in modern Africa. According to one Ghanaian writer,\nOne of the main reasons for the continuing underdevelopment of our country is our nonchalant attitude to time and the need for punctuality in all aspects of life. The problem of punctuality has become so endemic that lateness to any function", "-25.22338627408317" ], [ "not been prioritized, makes it challenging to have a recognized impact on the African population. In 1988 and 1990, two original resolutions were implemented by the World Health Organization’s Member States in Africa. AFR/RC39/R1 and AFR/RC40/R9 attempted to improve the status of mental health care in specific African regions to combat its growing effects on the African people. However, it was found that these new policies had little impact on the status of mental health in Africa, ultimately resulting in an incline in psychological disorders instead of the desired decline, and causing this to seem like an impossible problem to", "-25.074000672335387" ], [ "in Modern times its ability to promote development, specifically in Africa, has been less than so. Modernisation that has taken place in Africa can be described as something that has yet to benefit most of the African countries.\nModernisation through development has led to problems in Nigeria by bringing in private, foreign owned oil companies that have been exploiting the natural resource wealth of the country. Because the oil companies are generally owned by a different nation, the profits are mostly being exported from Nigeria with only one fifteenth of the wealth produced in the region returning to it.", "-25.04907459806782" ], [ "introduction, translated by A.M. Berrett, Mbembe locates the subsequent essays in the modern context in which, he argues, discourse about Africa – by both Westerners and Africans – has become largely trapped in Western tropes and fantasies in which Africa is rarely “seen as possessing things and attributes properly part of ‘human nature’” and when so, these are considered “of lesser value, little importance, and poor quality.” In this view, Africa is the “absolute Other” or anti-West, and it is analyzed in terms of lack and void rather than presence: “one of the metaphors through which the West represents the", "-25.00551682684454" ], [ "As countries get richer, they experience a demographic transition. Africa's people are its biggest asset; one day, its workforce could be as robust and dynamic as Asia's. But there is nothing inevitable about the ability to cash in the demographic dividend. For that to happen, Africa will have to choose the right policies and overcome its many problems. Global population aging The traditional United Nations definition of retirees is defined as age 65. The population aging that is presently occurring is unprecedented. Over the next decade, the number of people aged 60 years and over is expected to rise substantially,", "-25.005229821865214" ], [ "or creolized forms worldwide. Since there was no reason for the people of the African continent to have considered themselves African until that identity was imposed upon them through conquest and colonization in the modern era... this area of thought also refers to the unique set of questions raised by the emergence of \"Africans\" and their diaspora here designated by the term \"Africana\"... Africana philosophy refers to the philosophical dimensions of this area of thought. Branches Branches include African philosophy, black existentialism, double consciousness, black theology, and womanism.", "-24.88248453705455" ], [ "and investment, partly because of low disposable income; an inadequate education system results in an acute shortage of skilled manpower; a strong and volatile currency deters investors and makes its exports less competitive; the infrastructure, though far better than in the rest of Africa, suffers from severe bottlenecks, including scheduled power shortages, and urgently needs upgrading.\nIn 2011, after a year of observer status, South Africa officially joined the BRICS group of now-five emerging-market nations at the summit held in Sanya, Hainan, China.", "-24.87685359857278" ], [ "for Africa, where undernourishment has steadily increased. However, the rates of decrease are not sufficient to meet the first Millennium Development Goal of halving hunger between 1990 and 2015. The global financial, economic, and food price crisis in 2008 drove many people to hunger, especially women and children. The spike in food prices prevented many people from escaping poverty, because the poor spend a larger proportion of their income on food and farmers are net consumers of food. High food prices cause consumers to have less purchasing power and to substitute more-nutritious foods with low-cost alternatives. Adult overweight and obesity", "-24.82544837327987" ], [ "African cultures have become less practised in recent years as a result of neglect and suppression by colonial and post-colonial regimes. For example, African customs were discouraged, and African languages were prohibited in mission schools. Leopold II of Belgium attempted to \"civilize\" Africans by discouraging polygamy and witchcraft.\nObidoh Freeborn posits that colonialism is one element that has created the character of modern African art. According to authors Douglas Fraser and Herbert M. Cole, \"The precipitous alterations in the power structure wrought by colonialism were quickly followed by drastic iconographic changes in the art.\" Fraser and Cole assert that, in", "-24.79746736420202" ], [ "themselves. This is common in parts of the world where poverty and hunger affect millions of people.\nUnconsciously, we are deciding on what we should be. Unconsciously, we are creating our condition. Our mind is like a camera. What we focus on will appear. What we let sink into our subconscious will appear outwardly and define our physical appearance and behaviour View on Democracy and Development A country cannot claim to be developed when it is unable to feed its population. In Africa, there is almost everything African people need to meet their needs. Rivers and streams abound, but Africans still", "-24.68281716897036" ], [ "criticisms. It found that some European researchers had earlier tried to make Africans seem a special case, somehow different from the rest of the world's population flow and mix. This seemed to apply in matters both of evolution and gene pool makeup. The reviewers found that some researchers seemed to have shifted their categories and methods to maintain this \"special case\" outlook. Egypt within the African context Diop's arguments to place Egypt in the cultural and genetic context of Africa met a wide range of condemnation and rejection. He did not publish his work in subject-specific journals with an independent", "-24.622830845211865" ], [ "that I am very ignorant about it. It's a vast continent with huge differences between even neighbouring countries. Like anywhere, it's full of ordinary people just getting on with their personal, complicated lives. Anyone who claims to be an 'expert' on Africa - as if it were a homogeneous region where simple rules apply - is either arrogant or just plain silly.\"", "-24.57578929061856" ], [ "therefore is disadvantaged. Health and Wellness Western media often portrays Africa as being very impoverished. Global educational inequalities pose major issues for a number of African countries. For example, Hungary's literacy rate of 99% starkly contrasts with Mali's rate of 26%. High rates of malnutrition and disease are a concern for many African nations. Significance This topic is significant to our world today because Africa is part of our world. Rich in natural resources such as diamonds and oil, Africa stands as a major contributor to the world economy. If promoting stability and human rights for economic benefits is not", "-24.52411464227771" ], [ "one dollar a day, and AIDS is threatening the social fabric of the continent. The studies conducted by various organizations (including the African Development Bank and the World Bank) show that, with the exception of northern and southern Africa, the United Nations Millennium Development Goals (reducing by half the number of persons living in poverty and without access to potable water by 2015) will in most cases not be attained. Nevertheless, these same studies indicate that the majority of the African countries can make notable progress to these ends. African Development Bank annual conferences African Development Bank's(AfDB) 4th annual conference", "-24.50944656660431" ], [ "Africa Rising Africa Rising is a term coined to explain the rapid economic growth in Sub-Saharan Africa after 2000 and the inevitability of its continuation. The Financial Times defines Africa Rising as a \"narrative that improved governance means the continent is almost predestined to enjoy a long period of mid-to-high single-digit economic growth, rising incomes and an emerging middle class.\" It has been particularly associated with the democratisation of African states since the end of the Cold War, comparative peace, greater availability of mobile phones and the Internet, and increase in African consumer spending as well as a growth in", "-24.394044315937208" ], [ "variation occurs between large groups living on different continents. The recent African origin theory for humans would predict that in Africa there exists a great deal more diversity than elsewhere and that diversity should decrease the further from Africa a population is sampled. Hence, the 85% average figure is misleading: Long and Kittles find that rather than 85% of human genetic diversity existing in all human populations, about 100% of human diversity exists in a single African population, whereas only about 60% of human genetic diversity exists in the least diverse population they analyzed (the Surui, a population derived from", "-24.366085464222124" ], [ "is having a period of high growth and low inflation unseen since the 1960s, and a solid growth in the economy could be expected in the following year. He added that the global growth cycle may turn and the best hope for good performance lies in further increase in international trade. The three risks to world economic prospects include rising oil prices, disorderly unwinding of global payments imbalances, and the prevention of trade. World Bank president Paul Wolfowitz told donor countries to increase aid to poor nations, and wealthy nations to put Africa as the top of the priority list", "-24.325483999091375" ], [ "evidence from Africa and the Middle East, a variety of hypotheses have been put forth to describe an earlier, gradual transition from simple to more complex human behavior. Some authors have pushed back the appearance of fully modern behavior to around 80,000 years ago in order to incorporate the South African data.\nOthers focus on the slow accumulation of different technologies and behaviors across time. These researchers describe how anatomically modern humans could have been cognitively the same and what we define as behavioral modernity is just the result of thousands of years of cultural adaptation and learning. D'Errico and others", "-24.262273351487238" ], [ "prevent the loss of the experts, Africa has observed the \"friends and relatives effect\", which identifies professional, societal and personal factors as the three imperatives underlying the decision of African students in the United States to return home. In addition, the most widespread instrument used by African countries to combat the brain drain is bonding, which obligates a graduate to return home for a required period of time before s/he can emigrate or to also have bilateral agreements with developed countries, which will require them to return home immediately upon graduation. These approaches are influenced from the policies that exist", "-24.257331137079746" ], [ "suggest that, on balance, foreign assistance, especially foreign capitalism, has been somewhat deleterious to African development. It must be admitted, however, that the pattern of development is complex and the effect upon it of foreign assistance is still not clearly determined. But the limited evidence available suggests that the forms in which foreign resources have been extended to Africa over the past twenty-five years, insofar as they are concerned with economic development, are, to a great extent, counterproductive.\nPeter Singer argues that over the last three decades, \"aid has added around one percentage point to the annual growth rate of the", "-24.246712134183326" ], [ "Africa's production could be reversed because of the expected completion of the Moab Khotsong mine in 2006, the Dominion Mine in 2007, the Tshepong Decline project in 2008, the Phakisa Shaft in 2009, and the planned expansion of the Masimong Mine in 2010. By 2011, these projects could more than offset the shutdown of the Ergo and the North West Mines in 2005, the planned closure of the Crown Mine in 2009, and lower production from the Great Noligwa, the Kopanang, and the Tau Lekoa Mines.\nIn Ghana, the outlook is for a substantial increase in output because of the expected", "-24.23880894809554" ], [ "Africa among 11 Global Growth Generators countries.\nPreviously, economic development had been hindered by years of military rule, corruption, and mismanagement. The restoration of democracy and subsequent economic reforms have successfully put Nigeria back on track towards achieving its full economic potential. As of 2014 it is the largest economy in Africa, having overtaken South Africa.\nDuring the oil boom of the 1970s, Nigeria accumulated a significant foreign debt to finance major infrastructural investments. With the fall of oil prices during the 1980s oil glut Nigeria struggled to keep up with its loan payments and eventually defaulted on its principal debt repayments,", "-24.191993463085964" ], [ "gradual decline from 2002 to 2010,which coincides with the period of sustained GDP growth in most African countries. In spite of this decline, agriculture is expected to create eight million stable jobs by 2020 based on the trends from the McKinsey Global Institute analysis. If the continent accelerates agricultural development by expanding large scale commercial farming on uncultivated land and shifts production from low-value grain production to more labour-intensive and higher value-added horticultural and bio fuel crops (a good example is Ethiopia), as many as six million additional jobs could be created continent-wide by 2020. However, such estimates do not", "-24.175051562669978" ], [ "and flexibility will be needed to keep the Eurozone together. Chapter 10 Chapter 10 is about Africa, which Brown says was much harder hit by the crises than was Asia or Latin America. Brown says the continent has enormous potential and can become a new engine of growth for the whole world. He advises that help from G20 countries will be needed, both to boost investment in infrastructure and to make sure African countries have access to the markets of developed nations to help boost trade. Chapter 11 Chapter 11 sums up Brown's thoughts on the need for coordinated", "-24.129762299126014" ], [ "particularly in Sub-Saharan Africa, economic growth regressed and inflation worsened. The alleviation of poverty was not a goal of structural adjustment loans, and the circumstances of the poor often worsened, due to a reduction in social spending and an increase in the price of food, as subsidies were lifted.\nBy the late 1980s, international organizations began to admit that structural adjustment policies were worsening life for the world's poor. The World Bank changed structural adjustment loans, allowing for social spending to be maintained, and encouraging a slower change to policies such as transfer of subsidies and price rises. In 1999, the", "-24.116234469402116" ], [ "al. (2007) found more evidence of adaptive evolution in European and Asian populations than African American populations. Assuming African Americans are representative of Africans, these results makes sense intuitively, because humans spread out of Africa approximately 50,000 years ago (according to the consensus Out-of-Africa hypothesis of human origins (Klein 2009)), and these humans would have adapted to the new environments they encountered. By contrast, African populations remained in a similar environment for the following tens of thousands of years, and were therefore probably nearer their adaptive peak for the environment. However, Voight et al. (2006) found evidence of more", "-24.10514448849426" ], [ "Africa is by then projected to contribute seven out of the ten fastest growing economies in the world. According to the World Bank, the economic growth rate in the region had risen to 4.7% in 2013, with a rate of 5.2% forecasted for 2014. This continued rise was attributed to increasing investment in infrastructure and resources as well as steady expenditure per household. Media Radio is the major source of information in Sub-Saharan Africa. Average coverage stands at more than a third of the population. Countries such as Gabon, Seychelles, and South Africa boast almost 100% penetration. Only five countries –", "-24.067292737592652" ], [ "countries, because the markets are [currently] fragmented.\nOn June 29, 2019, the leaders of the Economic Community of West African States (ECOWAS) formally adopted the name of \"Eco\" for their project of the single currency and planned to introduce the currency from 2020.\nIn October 2019, according to the International Monetary Fund, the success of the project to replace the CFA franc in West Africa with a common currency - the eco - will depend on taking into account certain factors both political and economic. economic. It is also worried about the slowdown in growth south of the Sahara.", "-24.015206672884233" ], [ "“African” styles”. It can be argued that Zambia is losing a piece of its culture by wearing only western styles or even that people in Senegal and Nigeria are not open minded enough to try to incorporate western styles into their fashion. These differences in beliefs in used clothing help make African fashion a diverse topic. Fashion in South Africa South Africa, with an estimate of more than 57 million people from countless backgrounds, ethnicities and religions, holds in it an immense cultural diversity that is expressed through the vast array of topics ranging from cuisine, music, languages to celebrations.", "-23.98986157643958" ], [ "2015 period The World Bank reported that extreme poverty fell from 11% to 10%, however they also noted that the rate of decline had slowed by nearly half from the 25 year average with parts of sub-saharan Africa returning to early 2000 levels. The World Bank attributed this to increasing violence following the Arab Spring, population increases in Sub-Saharan Africa, and general African inflationary pressures and economic malaise were the primary drivers for this slow down.\nThere is disagreement among experts as to what would be considered a realistic poverty rate with one considering it \"an inaccurately measured and arbitrary cut", "-23.937648306426127" ], [ "is not appropriate as a political system in Africa because it causes misery and can only be applicable in wealthy economies. He observes that there is need to advance a political system that accord with Africa’s material and intellectual poverty.", "-23.90820181305753" ], [ "patterns and increased climate variability. These conditions have a bearing on energy production and consumption. The recent drought in many African countries, which has been linked to climate change, adversely affected both energy security and economic growth across the continent. Agriculture and food security Agriculture is inherently sensitive to climate conditions and is one of the most vulnerable sectors to the risks and impacts of global climate change. Agriculture in most  African countries is mainly small-scale and rain-fed, making it particularly vulnerable to climate variability and change. Observed and projected disruptions in precipitation patterns due to climate change are likely", "-23.900828729732893" ], [ "around the continent and elements of human modernity appeared in different places, and so different parts of Africa contributed to the emergence of what we call modern humans today.\" Early humans may have comprised a large, interbreeding population dispersed across Africa whose spread was facilitated by a wetter climate that created a \"green Sahara\", around 330,000 to 300,000 years ago. The rise of modern humans may thus have taken place on a continental scale rather than being confined to a particular corner of Africa. The migration route of the \"Out of Africa\" theory probably occurred in East Africa however through", "-23.884910001041135" ], [ "for textile and apparel trade in January 2005 reversed some of the gains made in the African textile industry due to increased competition from developing nations outside of Africa, particularly China. Some factories shut down in Lesotho, where most of the growth occurred. Orders from African manufacturers stabilised somewhat after the imposition of certain safeguard measures by U.S. authorities, but Africa's share of the U.S. market was still reduced after the phaseout.\nAGOA has resulted in limited successes in some countries. In addition to growth in the textile and apparel industry, some AGOA countries have begun to export new products to", "-23.874664529241272" ], [ "entrepreneurship. In the decade between 2005 and 2015, the economy of Africa as a whole increased by 50 per cent in contrast with a world average of 23 per cent.\nThe term is widely used (including by the BBC) and was the title of a 2014 conference held in Mozambique by the International Monetary Fund. Both The Economist and Time have devoted front-pages to the Africa Rising narrative. The term has been criticised by some as being a \"stereotype\" of Africa as a continent \"brimming with mobile phones and energetic businesses\". Critics have also argued that the narrative has been undermined", "-23.855562017735792" ], [ "diseases. Kyoto protocol includes the agreement to prevent deforestation but not the actions to fulfill it. Africa As of 2008, Africa is suffering deforestation at twice the world rate, according to the United Nations Environment Programme (UNEP). Some sources claim that deforestation has already wiped out roughly 90% of West Africa's original forests. Deforestation is accelerating in Central Africa. According to the FAO, Africa lost the highest percentage of tropical forests of any continent during the 1980s, 1990s, and early 2000s. According to the figures from the FAO (1997), only 22.8% of West Africa's moist forests remain, much of this", "-23.812850271584466" ], [ "the technological superiority of European nations and the decentralization of the African continent with no nation being a clear power in the region, as well as a perception of Africans as racially inferior. Another factor was the lack of an established body of collective African history created in the continent, there being instead a multitude of different dialects, cultural groups and fluctuating nations as well as a diverse set of mediums that document history other than written word. This led to a perception by Europeans that Africa and its people had no recorded history and had little desire to create", "-23.763842087925696" ], [ "of the Earth, volcanic activity, ocean circulation, and man-made population decline. Africa During the Postclassical Era, Africa was both culturally and politically affected by the introduction of Islam and the Arabic empires. This was especially true in the north, the Sudan region, and the east coast. However, this conversion was not complete nor uniform among different areas, and the low-level classes hardly changed their beliefs at all. Prior to the migration and conquest of Muslims into Africa, much of the continent was dominated by diverse societies of varying sizes and complexities. These were ruled by kings or councils of elders", "-23.7055248573306" ], [ "Energy in Africa Energy in Africa describes energy production, consumption, and import in Africa.\nEnergy use and development varies widely across the continent, with some African countries exporting energy to neighbors or the global market, while others lack even basic infrastructures or systems to acquire energy. The World Bank has declared 32 of the 48 nations on the continent to be in an energy crisis. Energy development has not kept pace with rising demand in developing regions, placing a large strain on the continent's existing resources over the first decade of the new century. From 2001 to 2005, GDP for over", "-23.68610885830276" ], [ "manage.\nIn Africa, there are many sociocultural and biological factors that have lead to heightened psychological struggles, while also masking their immediate level of importance to the African eye. Increasing rates of unemployment, violence, crime, rape, and disease are often linked to substance abuse, which can cause mental illness rates to inflate. Additionally, physical disease like HIV/AIDS, the Ebola epidemic, and malaria often have lasting psychological effects on victims that go unrecognized in African communities because of their inherent cultural beliefs. Traditional African beliefs have lead to the perception of mental illness as being caused by supernatural forces, preventing helpful or", "-23.685855276620714" ], [ "Criticisms of globalization Limitations on growth The founder of Local Futures (formerly the International Society for Ecology and Culture), Helena Norberg-Hodge, has suggested that globalization does not work for all the economies that it affects and that it does not always deliver the economic growth that is expected of it.\nGlobalization has been described as an \"uneven process\" in Africa due to the global integration of some groups happening alongside the marginalization or exclusion of others. Therefore, the worldwide trade will have the restrictions on the growth of economy. Global Economic Crisis The Global Economic Crisis, the worst financial crisis since", "-23.668284734596455" ], [ "and one of the leading theorists on underdevelopment Walter Rodney contends in reference to Africa's underdevelopment, \"The decisiveness of the short period of colonialism and its negative consequences for Africa spring mainly from the fact that Africa lost power. Power is the ultimate determinant in human society, being basic to the relations within any group and between groups. It implies the ability to defend one's interests and if necessary to impose one's will by any means available. In relations between peoples, the question of power determines maneuverability in bargaining, the extent to which a people survive as a physical and", "-23.64168974842687" ], [ "in Africa Although aid has had some negative effects on the growth and development of most African countries, research shows that development aid, in particular, actually does have a strong and favorable effect on economic growth and development. Development aid has a positive effect on growth because it may actually promote long term economic growth and development through promoting investments in infrastructure and human capital. More evidence suggests that aid had indeed, had a positive effect on economic growth and development in most African countries. According to a study conducted among 36 sub-saharan African countries in 2013, 27 out of", "-23.636635537484835" ], [ "in Africa have improved and honoured themselves, can they collectively rise above all prejudices and stereotypes ensuring freedom, peace and prosperity for future generations. Views on education Michel Ngue-Awane thinks that education plays a key role in the fabric of the society and argues that individuals will never discover their true purpose in life if they fail to understand their inner self. Education should therefore help individuals to know who they truly are so that they can pursuit their own agenda in life, but when they fail to understand this, they end up studying and living other people’s life.\nHe conclude", "-23.600811196702125" ], [ "region of Huancavelica, where indigenous communities make a marginal living herding. Land degradation Intensive farming often leads to a vicious cycle of exhaustion of soil fertility and decline of agricultural yields. Approximately 40 percent of the world's agricultural land is seriously degraded. According to UNU's Ghana-based Institute for Natural Resources in Africa, if current trends of soil degradation continue, Africa might be able to feed just 25 percent of its population by 2025. Climate change Climate change and related extreme climate events are key drivers behind the recent rises in global hunger and one of the leading causes of severe", "-23.534266456612386" ], [ "more rural parts of Africa. People may believe that they are being insulted by being given something that they believe to be old, tattered and dirty. Generally, it seems that most countries have adapted to the use of secondhand clothing and have used it to their advantage.\nImpacts of Secondhand Clothes\nThe second hand clothing industry has left both positive and negative impacts within African society. An impact that one would commonly not think of is the resale of imported western clothing. South Africa, among other nations, has created a legislation of imported/donated good in order to curb the resale of the", "-23.50710160410381" ], [ "lead to widespread hunger. On the contrary, Lomborg claims that food is widespread, and humanity's daily intake of calories is increasing, and will continue to rise until hunger's eradication, thanks to technological improvements in agriculture. However, Lomborg notes that Africa in particular still produces too little sustenance, an effect he attributes to the continent's dismal economic and political systems. Concerning prosperity, Lomborg argues that wealth, as measured by per capita GDP, should not be the only judging criterion. He points to improvements in education, safety, leisure, and ever more widespread access to consumer goods as signs that prosperity is increasing", "-23.505352485965886" ], [ "than hoped for in some of the former socialist economies). Success stories in Sub-Saharan Africa during the 1990s were relatively few and far in between, and market-oriented reforms by themselves offered no formula to deal with the growing public health emergency in which the continent became embroiled. The critics, meanwhile, argue that the disappointing outcomes have vindicated their concerns about the inappropriateness of the standard reform agenda.\nBesides the excessive belief in market fundamentalism and international economic institutions in attributing the failure of the Washington consensus, Stiglitz provided a further explanation about why it failed. In his article \"The Post Washington", "-23.443209030367143" ], [ "Eurocentrism in colonial societies, as European ideas of religion often did not match African ones. Unfortunately, there is a lack of documents written from the African point of view, so almost all information from this time period in these colonial societies is subject to cross-cultural misinterpretation, omission of facts, or other such changes that could affect the quality of description of African spiritual practices. Maintaining the integrity of cultural practices was difficult due to disagreement with European propriety and European tendency to generalize the African demographic makeup to merely “Central African,” rather than acknowledging individual cultures. Eventually, most African traditions", "-23.442384364956524" ], [ "reforming trade policies to ensure that global food security needs are met\" said C. Bellmann, ICTSD Programmes Director. A 2009 ICTSD-IPC study by Jodie Keane suggests that climate change could cause farm output in sub-Saharan Africa to decrease by 12% by 2080 - although in some African countries this figure could be as much as 60%, with agricultural exports declining by up to one fifth in others. Adapting to climate change could cost the agriculture sector $14bn globally a year, the study finds. Africa Agriculture is a particularly important sector in Africa, contributing towards livelihoods and economies across the", "-23.407960911012196" ], [ "Gulf to seek a better life; in the case of some nations like South Africa, many Caucasians have fled due to employment bias.\nCatastrophes cause deadly periods of great shortages. The most damaging are the famines that have regularly hit the continent, especially the Horn of Africa. These have been caused by disruptions due to warfare, years of drought, and plagues of locusts.\nAn average African faced annual inflation of over 60% from 1990 until 2002 in those few countries that account for inflation. At the high end, Angola and the Democratic Republic of the Congo both saw triple-digit inflation throughout the", "-23.39426717772585" ], [ "only on growth without considering distribution limit poverty reduction in two ways. Economists theorize that for this reason sub-Saharan Africa and other less developed countries will not be able to meet poverty goals like the Millennium Development Goals through growth alone. Controversy Critics argue that the Poverty-Growth-Inequality Triangle looks at aggregate concepts in a way that ignores the processes behind those concepts. Critics say terms like \"poverty,\" \"inequality,\" and \"growth\" are too broad. Instead, critics suggest that poverty should be traced back to individual behavior. Developmental economists Abhijit Banerjee and Esther Duflo argue that cross-country data", "-23.20062054572918" ], [ "change) or spatial (placing organisms into a new environment, e.g. a population migrating). Since environmental change occurs naturally and constantly, there will certainly be examples of evolutionary mismatch over time. However, because large-scale natural environmental change – like a natural disaster – is often rare, it is less often observed. Another more prevalent kind of environmental change is anthropogenic (human-caused). In recent times, humans have had a large, rapid, and trackable impact on our environment, thus creating scenarios where it is easier to observe evolutionary mismatch.\nBecause of the mechanism of evolution by natural selection, the environment (\"nature\") determines (\"selects\") which", "-23.014578418820747" ], [ "of African states by the IMF and World Bank. Africa also experienced major governance deficiencies, mismanagement and corruption, and this accelerated poverty further.\nThe wealthy elite in Africa in the late 20th century was characterized by civil servants functioning as \"gatekeepers\", holding positions with authority to approve foreign aid, humanitarian assistance, and private investment (typically foreign). Bribery and corruption became entrenched in some countries. Environmental and political catastrophe combined in several famines during the 1970s and 1980s in Ethiopia, Mali, Mauritania and Mozambique. The impact of drought and desertification of a large part of the continent came to widespread public attention", "-23.013517850020435" ], [ "capital flight has begun to reverse itself due to rapid growth and development in many African nations, and the emergence of an African middle class. Between 2001 and 2010, six of the world's ten fastest-growing economies were in Africa, and between 2011 and 2015, Africa's economic growth is expected to outpace Asia's. This, together with increased development, introduction of technologies such as fast Internet and mobile phones, a better-educated population, and the environment for business driven by new tech start-up companies, has resulted in many expatriates from Africa returning to their home countries, and more Africans staying at home to", "-23.00374942808412" ], [ "all familiar to energy policy, such as institutional support, capacity development, support for national and local energy plans, and strong links to utility/public sector leadership. Africa has all the human and material resources to end poverty but is poor in using those resources for the benefit of its people. This includes national and international institutions as well as the ability to deploy technologies, absorb and disseminate financing, provide transparent regulation, introduce systems of peer review, and share and monitor relevant information and data.” European Union There is an increasing focus on energy poverty in the European Union, where in 2013", "-22.993267718902644" ], [ "successful in developed countries, it doesn't have the same positive impact in many of the underdeveloped African countries. Though Western practices can make an impact in health care practices, in certain areas such as in the spread of various diseases, it cannot integrate wholly into the culture and society. This makes the traditional African practitioners a vital part of their health care system. There are many reasons why the Western medical system has not been as effective in Africa as it has in more developed parts of the world. Hospitals and medical facilities are difficult for many Africans to get", "-22.988854747272853" ], [ "be a benefit to the land and make it more productive than it is in its natural state. Land degradation is an important factor of internal displacement in many African and Asian countries.\nSevere land degradation affects a significant portion of the Earth's arable lands, decreasing the wealth and economic development of nations. As the land resource base becomes less productive, food security is compromised and competition for dwindling resources increases, the seeds of famine and potential conflict are sown. Sensitivity and resilience Sensitivity and resilience are measures of the vulnerability of a landscape to degradation. These two factors combine to", "-22.96666790832387" ], [ "socio-cultural and demographic factors, as well as skewed development, such as rapid and unplanned urbanisation.\nThe level of poverty is a key determinant of disaster risk. Poverty increases propensity and severity of disasters and reduces peoples' capacity to recover and reconstruct. However, vulnerability is not just shaped to poverty, but linked to wider social, political and institutional factors, that govern entitlements and capabilities. Effects of poverty Africa's economic malaise is self-perpetuating, as it engenders more of the disease, warfare, misgovernment, and corruption that created it in the first place. Other effects of poverty have similar consequences. ", "-22.96069298821385" ], [ "problems, a consequence that a number of observers have attributed to Iceland's extensive deregulation. South Africa South Africa’s GDP has grown since the beginning of the new government system in 1994, which ended the rule of apartheid in South Africa. While some see the implementation of neoliberal policies inside South Africa as having spurred the country's growth rate, others cite policies such as maintaining high interests rates to quell inflation as actually hurting economic growth. Meanwhile, the implementation of GEAR (Growth Employment and Redistribution Strategy) policies have caused a decline in employment that started after the new government", "-22.951618904866336" ], [ "him pessimistic about the quality of statistics for other countries.\nOn October 6, 2011, Shanta Devarajan, World Bank economist, penned a blog post titled Africa's statistical tragedy, a wordplay on Easterly and Levine's classic Africa's Growth Tragedy. In the post , Devarajan noted that the absence of high-quality statistical data hampered Africa, development economists and international institutions, and donors, but that the problem could be rectified.\nIn August 2012, Revising GDP estimates in Sub-Saharan Africa: Lessons from Ghana by Morten Jerven and Magnus Ebo Ducan was published in The African Statistical Journal. Jerven also wrote about the issue in The Guardian in", "-22.916727676143637" ], [ "taken with a grain of cultural relativism, as the span of culture in Africa is incredibly vast, with patriarchies, matriarchies, monotheists and traditional religionists among the population, and as such the attitudes of groups of the Niger Delta cannot be construed to the whole of Africa.\nAnother more controversial application of this approach is embodied in the concept of Negritude. Leopold Senghor, a proponent of Negritude, argued that the distinctly African approach to reality is based on emotion rather than logic, works itself out in participation rather than analysis, and manifests itself through the arts rather than the sciences. Cheikh Anta", "-22.867354857065948" ], [ "genetic variation clusters along racial and ethnic lines and that extensive evolution has continued ever since the exodus from Africa, are based on the genotype, and no one has any scientific reason to doubt their validity. And yet, as of 2014, true believers in the orthodoxy still dominate the social science departments of the nation's universities. I expect that their resistance to \"A Troublesome Inheritance\" will be fanatical, because accepting its account will be seen, correctly, as a cataclysmic surrender on some core premises of political correctness. Response In an open letter to the New York Times, the book was", "-22.82794023648603" ], [ "the history of every human alive today. Brooks and McBrearty explain what it means to have modern human behavior, and they review the evidence found in Africa dating back to the Middle Stone Age. They argue that the evolution of humans was not a European revolution that suddenly overtook the world and replaced everything else, but rather a gradual shift from Africa and out. Their article in the Journal of Human Evolution (2000), \"The Revolution That Wasn't: A New Interpretation of the Origin of Modern Human Behavior,\" has been cited nearly 2000 times (as of December 2016), making it the", "-22.824442149780225" ], [ "Climate Change, Agriculture and Food Security (CCAFS) have identified that crop pests already account for approximately 1/6th of farm productivity losses. Similarly, climate change will accelerate the prevalence of pests and diseases and increase the occurrence of highly impactful events . The impacts of climate change on agricultural production in Africa will have serious implications for food security and livelihoods. Between 2014 and 2018, Africa had the highest levels of food insecurity in the world. \nEast Africa \nIn East Africa, climate change is anticipated to intensify the frequency and intensity of drought and flooding, which can have an adverse impact", "-22.765363224913017" ], [ "incomes, less secure livelihoods, and an increased threat of chronic hunger for the poorest people in sub-Saharan Africa. Overall this means that water stress caused by changing amounts of precipitation is particularly damaging to Africa and thus climate change is one of the major obstacles the continent must face when trying to secure reliable and clean sources of water. Physical and economic scarcity Water scarcity is both a natural and human-made phenomenon. It is thus essential to break it down into two general types: Economic scarcity and physical scarcity. Economic scarcity refers to the fact that finding a reliable source", "-22.712128218321595" ], [ "the national borders.\nOlivier argues that \"There is no obvious reason why it should be unhealthy or abnormal for different literatures to co-exist in one country, each possessing its own infrastructure and allowing theoreticians to develop impressive theories about polysystems\". Yet political idealism proposing a unified \"South Africa\" (a remnant of the colonial British approach) has seeped into literary discourse and demands a unified national literature, which does not exist and has to be fabricated. It is unrealistic to ever think of South Africa and South African literature as homogenous, now or in the near or distant future, since the only", "-22.675525084596302" ], [ "Underdevelopment Rodney explicitly refers to African countries as 'underdeveloped' and not 'developing' because it is from the continent's history and present of exploitation that created their socio-economic position. Underdevelopment is not defined by a lack of resources but an uneven, and he would argue, unjust distribution of the wealth of those resources.", "-22.65107094947598" ], [ "change, perhaps one enabling complex language, such as FOXP2, caused this revolutionary change in our species. Alternative models Contrasted with this view of a spontaneous leap in cognition among ancient humans, some authors like Alison S. Brooks, primarily working in African archaeology, point to the gradual accumulation of \"modern\" behaviors, starting well before the 50,000 year benchmark of the Upper Paleolithic Revolution models. Howiesons Poort, Blombos, and other South African archaeological sites, for example, show evidence of marine resource acquisition, trade, the making of bone tools, blade and microlith technology, and abstract ornamentation at least by 80,000 years ago. Given", "-22.56811221777025" ], [ "For instance, the civil war in Angola came to an end in 2002 after nearly 30 years. This coincided with many countries abandoning communist-style command economies and opening up for market reforms. The improved stability and economic reforms have led to a great increase in foreign investment into many African nations, mainly from China, which has spurred quick economic growth in many countries, seemingly ending decades of stagnation and decline. Several African economies are among the world's fastest growing as of 2016. A significant part of this growth, which is sometimes referred to as Africa Rising, can also be attributed", "-22.56769788771635" ], [ "Humans everywhere have changed their environment and for better or for worse, taking a step back to the previous state of things would be a long arduous process. So how can people erase the mistakes of the past? How can they bring old, outdated things new life through innovation? These questions can provide insight into the development of a subfield of anthropology called environmental anthropology.\nEnvironmental anthropology is a subfield of anthropology with roots in activism. The main focus of this particular perspective focuses on a discourse of activism. Agents operating within this sphere of thought have noticed aversive effects from", "-22.565760968223913" ], [ "where this money went. Following this, a major Chinese-backed oil refinery project was scrapped by Angolan officials, with unclear reasons, causing problems for Sino-Angolan relations.\nAs raw material prices fall through the global recession, the negotiating position of African countries is sharply weakened, while expected profits intended to repay Chinese loans are collapsing. As a consequence, tensions have increased: China is more worried about the risk of default, while African countries fear servicing their debt over the long term of their loans.\nAt the dawn of the twenty-first century, while Africa suffered from China's withdrawal, it is less dependent of external powers", "-22.537057840556372" ], [ "clothing is imported from the United States. However, there are concerns that trade in secondhand clothing in African countries decreases development of local industries even as it creates employment in these countries. And the authors of Recycling of Low Grade Clothing Waste warn that in the long run, as prices and quality of new clothing continue to decline, the demand for used clothing will also diminish. Marketing controversies The increase in western consumers’ environmental interest is motivating companies to use sustainable and environmental arguments solely to increase sales. Because environmental and sustainability issues are complex, it is also easy to", "-22.534995966365386" ], [ "reason it is a country at all is the interference of European colonial powers. This is not a racial issue, but rather has to do with culture, heritage and tradition (and indeed the constitution celebrates diversity). Rather, it seems more sensible to discuss South African literature as literature produced within the national borders by the different cultures and language groups inhabiting these borders. Otherwise the danger is emphasising one literary system at the expense of another, and more often than not, the beneficiary is English, with the African languages being ignored. The distinction \"black\" and \"white\" literature is further a", "-22.526651167718228" ], [ "English is not entirely untrue.\nSouth Africa under apartheid is an excellent example of how an adverse situation can further degrade. The largely black population earlier wished to learn English (black South Africans saw it as a way to unite themselves as they speak several different native languages). Disease The greatest mortality in Africa arises from preventable water-borne diseases, which affect infants and young children greater than any other group. The principal cause of these diseases is the regional water crisis, or lack of safe drinking water primarily stemming from mixing sewage and drinking water supplies.\nMuch attention has been given", "-22.51615521592612" ], [ "The most direct consequence of low GDP is Africa's low standard of living and quality of life. Except for a wealthy elite and the more prosperous peoples of South Africa and the Maghreb, Africans have very few consumer goods. Quality of life does not correlate exactly with a nation's wealth. Angola, for instance, reaps large sums annually from its diamond mines, but after years of civil war, conditions there remain poor. Radios, televisions, and automobiles are rare luxuries. Most Africans are on the far side of the digital divide and are cut off from communications", "-22.498666192928795" ], [ "studies. East and North African indigenous populations, for example, are never selected to represent Africa because they do not fit the profile of \"black\" Africa. The sampled indigenous populations of the HGDP are assumed to be \"pure\"; the law professor Roberts claims that \"their unusual purity is all the more reason they cannot stand in for all the other populations of the world that marked by intermixture from migration, commerce, and conquest.\"\nKing and Motulsky, in a 2002 Science article, state that \"While the computer-generated findings from all of these studies offer greater insight into the genetic unity and diversity of", "-22.498412289627595" ], [ "the Third World, as its risk factors are much more common in Western and Westernized countries; it could, therefore, be termed a disease of affluence. The adoption of a rich, Westernized diet and subsequent increase of smoking, obesity, and other risk factors has led to an increase in angina and related diseases in countries such as China History The condition was named \"hritshoola\" in ancient India and was described by Sushruta (6th century BC).\nThere is disagreement as to how to pronounce angina. It could either be pronounced “an-JAHY-nuh” or “AN-juh-nuh”.", "-22.43880277965218" ], [ "in the contemporary international system is in a state of \"dramatic decline\", and states that \"dramatic declines in freedom have been observed in every region of the world\". Only eleven African states are listed as 'free' under the Freedom Index; Botswana, Mauritius, Cape Verde, Senegal, Tunisia, Ghana, Nigeria, Sao Tome and Principe, Namibia, South Africa, and Benin.\nThe NGO's website discusses that the world faces a \"crisis of democracy\", with 37 per cent of the global population living in circumstances that it finds to be categorically not free. Freedom House marked 2017 as the year that saw the most rapid decline,", "-22.429424245281098" ], [ "the past with only 10.2% of trade in the continent being done in Africa in 2010. The Chairperson of the African Union and President of Rwanda, Paul Kagame, writes, \"Increasing intra-African trade does not mean doing less business with the rest of the world.On the contrary, as we trade more among ourselves, African firms will become bigger, more specialized, and more competitive internationally.From now on, the clear wish of everyone is that consultation between business and political leadership, at all levels, becomes a continuous feature of continental deliberations.\" Evidence shows that liberalizing trade helps to bring sustained economic growth", "-22.366019072156632" ], [ "rational responses to abnormal behavior. For example, Ebola received loads of media attention when it became rampant in Africa and eventually spread to the US, however, researchers never really paid attention to its psychological effects on the African brain. Extreme anxiety, struggles with grief, feelings of rejection and incompetence, depression leading to suicide, PTSD, and much more are only some of the noted affects of diseases like Ebola. These epidemics come and go, but their lasting effects on mental health are remaining for years to come, and even ending lives because of the lack of action. There has been some", "-22.338263305602595" ], [ "fixed investment.\" Africa According to Kevin O'Marah of Forbes magazine, Africa's consumer economies remained \"buoyant\" despite the worldwide collapse in the commodity industry, despite the fact that commodity extraction industries have long dominated the region. China Some analysts, including an anonymous columnist at The Economist stated in 2014 and early 2015 that China was likely to become a consumer economy. They regarded it as the second biggest consumer. Philippines The GDP in the country grew 6.3% in 2015. Their inflation rate was about 1.4%, and the service sector had grown, becoming a large part of GDP. The economy did not", "-22.321859270421555" ], [ "by romanticism, fetishism, and nostalgia. Black Americans have often perpetuated an uncomplicated view of Africa as a vestigial homeland awaiting the return of its lost souls. While this view has tended to be more charitable toward Africa than the more generalized American view, it is not necessarily less problematic” . He argues that while African American views of Africa were definitely more positive than the general American view, they, similar to the general American view, differed greatly from the African reality. This difference heavily affected African Americans’ experiences in Ghana and their views of it following their migration to the", "-22.297628278029606" ], [ "because the colonial division of labor kept Africa from developing its own industries. Africa and other developing countries received low prices for their exported commodities such as cocoa, which caused poverty to abound. Fair trade seeks to establish a system of direct trade from developing countries to counteract this unfair system. Most cocoa comes from small family-run farms in West Africa. These farms have little market access and thus rely on middlemen to bring their products to market. Sometimes middlemen are unfair to farmers. Farmers do not get a fair price for their product despite relying on cocoa sales for", "-22.28390126793238" ], [ "expands elsewhere across the globe, it just leads Africa to swelling debt and fear of losing of local jobs if China chooses to relocate. The rising debt of developing nations in the world from China has become a part of the economic growth history. The far-reaching approach of China in promoting its lending history is said to be dramatic. Studies of economic experts in the practices of China found that the patterns of China's bank lending are purposefully done to trap governments and gather strategic opportunities for China. Indian strategist Brahma Chellaney explains that “It’s clearly part of China’s geostrategic", "-22.279060411150567" ], [ "form of jobs, and natural resources. In economic theory and practice, any country can borrow from another country to finance its economic development.  However, it is not always easy to find someone who will lend money even for logical reasons. The global competition on which country is best to invest money in is in fact, a country's sign of financial strength, which is why Africa does not consider the relationship as a debt-trap. Unemployment In the past decade, China has increased its investment relationship with African countries. In 2014, China created a program known as African Human Resources Development Fund", "-22.27149013853341" ] ]
89rmq6
Why do computer applications sometimes freeze up to the point where you can't even click within or exit the application?
[ "Usually this happens when the application runs into an error (stack overflow, access a file that doesn't exist). Imagine the computer is a person who just dropped their stuff on the ground, and the computer freezing is them picking it up. They're so concentrated on fixing the problem, they put all their resources to fix it, including the processing power needed to move your cursor. Hope this helps", "Many code operations in an application will cause the application to stop listening to click or keypress events. Usually these operations complete quick enough that you don't notice it. In some cases, they take some time, but the developer puts up a visual indicator that the app is busy (such as a progress bar). A more advanced technique (that's not always possible, due to design constraints) is to execute code asynchronously from the interface, so when a user causes some code to run, they can still do other things in the application. With that information, the answer to your question is that an app \"freezes\" and stops accepting user input when it's running some code that causes the app to stop listening for user input and a bug in that code causes it to never complete (or crash, but usually crashes will crash and close the whole app). **Edit:** typo", "Hey! Finally one I *can* answer: Your computer is finite and has a finite amount of resources. You (as a person) can only multitask and do a few things without slowing down and losing quality of what your trying to do. Don’t believe me? Try writing two different sentences on paper with each hand. Now, instead of trying to do both at the same time, write one word or one sentence after the other. You get it done a lot faster and better. This is what computers do, though they’re a lot faster, they actually do one thing at a time. It just happens to go so fast it looks like they’re doing it at the same time. Now, continuing with our human example, when you’re writing your sentences, what if you don’t know how to spell a word, or your pencil breaks? You have to stop and figure out what went wrong, and try to fix it. If you can’t figure out how to spell it, or don’t own another pencil, you’re stuck. What makes us different than computers is that when something goes wrong for us, we always have alternate solutions. For example, we can grab a pen or look up a word in a dictionary. We can see alternatives. When a computer has these kinds of errors it depends on how well the programmer made the program. If it’s a good program, it has pre-built alternatives that don’t stop it from accomplishing its task. If it’s a poorly written program, or something goes extremely wrong, the program, or the computer entirely will stop because it doesn’t know what to do. This is what causes computers or programs to freeze, or crash.", "Various reasons, but two common examples are that the OS is waiting for something that isn't happening (yet, possibly ever) or that it's simply found itself in a state it should never be in and has no idea what to do next, so does nothing.", "To explain like you're five: There's a traffic jam in your computer because drivers aren't sure who's turn is next." ]
[ [ "problem was that of the single input queue: a non-responsive application could block the processing of user-interface messages, thus freezing the graphical interface. This problem has been solved in Windows NT, where such an application would just become a dead rectangle on the screen; in later versions it became possible to move or hide it. In OS/2 it was solved in a FixPack, using a timer to determine when an application was not responding to events.", "-29.274287642299896" ], [ "that all or part of the application has entered an unrecoverable state or an infinite loop. During this time the user may be prevented from closing, resizing, or even minimizing the windows of the affected application (although moving the window is still possible in OS X, as well as previously hidden parts of the window being usually redrawn, even when the application is otherwise unresponsive). While one application is unresponsive, typically other applications are usable. File system and network delays are another common cause.", "-27.839518713910365" ], [ "unresponsive to user input, or just indicate that response may temporarily be slower than usual due to disk access. This changed in multitasking operating systems such as System Software 5, where it is usually possible to switch to another application and continue to work there. Individual applications could also choose to display the wait cursor during long operations (and these were often able to be cancelled with a keyboard command).\nAfter the transition to Mac OS X (macOS), Apple narrowed the wait cursor meaning. The display of the wait cursor is now controlled only by the operating system, not by the", "-26.86227906405111" ], [ "line drawing mode or color.\nThese limitations meant that supporting the multitasking of more than one program at a time would be difficult, without rewriting all of this operating system and application code. Yet doing so would mean the system would run unacceptably slow on existing hardware. Instead, Apple adopted a system known as MultiFinder in 1987, which keeps the running application in control of the computer, as before, but allows an application to be rapidly switched to another, normally simply by clicking on its window. Programs that are not in the foreground are periodically given short bits of time to", "-26.7254852722981" ], [ "the location of the Setup files (if these locations are different), otherwise they will not be able to install the Application.\n.ZAP Files cannot be Assigned to Computers and must be published to Users. Therefore when a User moves to another computer (even only temporarily) they can install this application on that machine whether the program should be there or not.\nFinally, .ZAP Files do not automatically uninstall when a User no longer requires the software. Instead, the software remains installed on the machine permanently, unlike a .MSI installation which can be set to uninstall when the Computer is removed from the", "-26.637351228448097" ], [ "the newly focused window. On slow computers, users are sometimes not even alerted to this behavior in time, because the associated window is only actually displayed several seconds after the actual focus change happened. Security issues Focus stealing can cause damage, as users may, while typing when their attention is away from the screen, inadvertently agree to a program doing something that causes damage. For example, when Microsoft Windows pops up the Disk Cleanup wizard, the user may \"agree\" to deleting files without realizing that the wizard was waiting for input. Focus stealing can also occasion security breaches, for example,", "-26.57411762760603" ], [ "device with a GUI interface).\nTasks waiting on user input or file reads would not normally be listed as waiting entries for operator attention. Another reason for a task to be waiting is waiting on a file. When a process opens a file, and the file is not present, the task is placed in the waiting entries, noting that it is waiting on a certain file. An operator (or the user that owns the process) has the opportunity either to copy the file to the expected place, or to redirect the task to read the file from another place, or the", "-26.34119742328039" ], [ "background may also automatically suspend, if the user has not opened it for a long duration of time.\nThe user can close applications by opening the multitasking view and pressing the \"X\" button in the right-hand corner of each application window, a feature that was added in Update 3. Kids Corner Windows Phone 8 adds Kids Corner, which operates as a kind of \"guest mode\". The user chooses which applications and games appear on the Kids Corner. When Kids Corner is activated, apps and games installed on the device can be played or accessed without touching the data of the main", "-26.326775553025072" ], [ "used to activate the software. Some products allow licenses to be transferred from one machine to another using online tools, without having to call technical support to deactivate the copy on the old machine before reactivating it on the new machine.\nSoftware verifies activation every time it starts up, and sometimes while it is running. Some software even \"phones home\", checking a central database (across the Internet or other means) to check whether the specific activation has been revoked. Some software might stop working or reduce functionality if it cannot connect to the central database.", "-26.325882692064624" ], [ "Product activation Blocking Software that has been installed but not activated does not perform its full functions, and/or imposes limits on file size or session time. Some software allows full functionality for a limited \"trial\" time before requiring activation. Unactivated software typically reminds the user to activate, at program startup or at intervals, and when the imposed size or time limits are reached. (Some unactivated software has taken disruptive actions such as crashing or vandalism, but this is rare.)\nSome 'unactivated' products act as a time-limited trial until a product key—a number encoded as a sequence of alphanumeric characters—is purchased and", "-26.190875341373612" ], [ "NOT work (due to certain optimizations in the implementation). Instead there was a button on the console called Modify which when pressed together with the Check Reset button, when the computer was in Manual mode, would set the computer in a mode that would clear all of memory in a tenth of one second regardless of how much memory you had; when you pressed Start. It also stopped automatically when memory was cleared, instead of requiring the operator to stop it.\nOther than typing machine code at the console, a program could be loaded via either the paper tape reader, the", "-26.161483347066678" ], [ "click than those in static text, depending on the speed and length of the scrolling. Users only get one chance every time it scrolls past. Also, scrolling text too fast can make it unreadable to some people, particularly those with visual impairments. This can easily frustrate users. To combat this, most client-side scripting allows marquees to be programmed to stop when the mouse is over them. Compliance The marquee element was first invented for Microsoft's Internet Explorer and is still supported by it. Firefox, Chrome and Safari web browsers support it for compatibility with legacy pages. The element is non-compliant", "-26.070646003761794" ], [ "application. This could indicate that the application was in an infinite loop, or just performing a lengthy operation and ignoring events. Each application has an event queue that receives events from the operating system (for example, key presses and mouse button clicks); and if an application takes longer than 2 seconds to process the events in its event queue (regardless of the cause), the operating system displays the wait cursor whenever the cursor hovers over that application's windows.\nThis is meant to indicate that the application is temporarily unresponsive, a state from which the application should recover. It also may indicate", "-26.063638683845056" ], [ "of the application switcher, it appears rightmost. In iOS 11, the application switcher receives a major redesign. In the iPad, the Control Center and app switcher are combined. The app switcher in the iPad can also be accessed by swiping up from the bottom. In the iPhone, the app switcher cannot be accessed if there are no apps in the RAM. Ending tasks In iOS 4.0 to iOS 6.x, briefly holding the icons in the application switcher makes them \"jiggle\" (similarly to the homescreen) and allows the user to force quit the applications by tapping the red minus circle that", "-25.982667433621828" ], [ "or turning off the monitor when not in use.\nImage persistence can be reversed by allowing the liquid crystals to return to their relaxed state. In other words, turning off the monitor for a sufficiently long period of time (a few hours or maybe days) will relax the crystals and eliminate image retention. For most minor cases, simply continuing to use the computer as usual (and thus allowing other colours to \"cover\" the affected regions) or turning off the monitor for the night is more than enough.\nIdeally, you want to vary your computer activities to avoid static colours and hide elements", "-25.929781396909675" ], [ "appears at the corner of the app's icon. Clearing applications from multitasking stayed the same from iOS 4.0 through 6.1.6, the last version of iOS 6.\nAs of iOS 7, the process has become faster and easier. In iOS 7, instead of holding the icons to close them, they are closed by simply swiping them upwards off the screen. Up to three apps can be cleared at a time compared to one in versions up to iOS 6.1.6. Task completion Task completion allows apps to continue a certain task after the app has been suspended. As of iOS 4.0, apps can", "-25.85530463163741" ], [ "not a problem, but while the machine is booting up it will attempt to detect its keyboard and mouse and either fail to boot or boot with an unwanted (e.g. mouseless) configuration. Likewise, a failure to detect the monitor may result in the computer falling back to a low resolution such as (typically) 640x480. Thus, mechanical KVM switches may be unsuitable for controlling machines which can reboot automatically (e.g. after a power failure).\nAnother problem encountered with mechanical devices is the failure of one or more switch contacts to make firm, low resistance electrical connections, often necessitating some wiggling or adjustment", "-25.848685299715726" ], [ "keep looking down at the bar instead of looking at the images I was actually trying to edit.\" She also pointed out that after learning the Touch Bar one cannot work as efficiently on any other computer. Developers have their share of headaches because they cannot rely on the Touch Bar being present on every machine that runs their software. Even if Apple makes the Touch Bar an integral part of macOS, it will take \"many years\" for it to become ubiquitous, in the meantime anything in the Bar needs to be available through another part of the interface.\nOther items", "-25.80143843742553" ], [ "a \"flaw allowed anyone within range of an AirDrop user to install malware on a target device and tweak iOS settings so the exploit would still work if the victim rejected an incoming AirDrop file\". Settings The Settings app in iOS 9 has a search bar that makes it easier to find settings and options. The user also has options to have notifications be grouped by which app they came from, and the ability to turn on or off Shake to Undo. Other changes On iPad, a two-finger drag on the keyboard moves the cursor freely like a traditional trackpad,", "-25.799937215662794" ], [ "SpringBoard History In 2008, with Apple's release of iPhone OS 1.1.3 and the January App Pack, the SpringBoard underwent some substantial changes. Holding a finger on any application for a few seconds causes all of the icons to wiggle. From this view, you can rearrange your icons, delete web apps and web clips, and create multiple pages by dragging an application to the side of the screen. If the Home button is pressed, the icons will stop wiggling and apps can be opened again.\nIn July 2008, third-party applications were introduced with iPhone OS 2.0. These applications are installed through the", "-25.719212994015834" ], [ "first introduced, many computers did not have mice, so this alternative was necessary. This feature makes it easier for people that have a hard time using a mouse to use the user interface. In certain circumstances, the arrow keys can also be used to move focus. Window focus The behaviour of focus on one's desktop can be governed by policies in window management. Click to focus On most mainstream user-interfaces, such as ones made by Microsoft and Apple, it is common to find a \"focus follows click\" policy (or \"click to focus\"), where one must click the mouse inside of", "-25.6712201529881" ], [ "A pull-down menu that has been clicked may smoothly radiate outward from the menu bar, making it easier to determine its origin and purpose.\nGradual and natural transitions may be especially helpful for elderly or visually impaired users who notice changes to the screen more slowly and with less clarity. For example, an inexperienced user may impulsively click on a menu that was activated by accident, causing him or her to lose work. The short delay necessary to display a visual transition may give the user enough time to make a conscious decision, and avoid such mistakes. User Interface Façades Metisse", "-25.666589029973693" ], [ "Any key Computer programmers historically used \"Press any key to continue\" (or a similar text) as a prompt to the user when it was necessary to pause processing. The system would resume after the user pressed any keyboard button. Cultural significance A 1982 Apple Computer manual for developers warned:\nDo not tell the user to \"press any key.\" ... On the Apple II series computers, you cannot read every key by itself: RESET, SHIFT, CONTROL. We have also found in testing that new users, in particular, panic when asked to press any key. Over 80% of them will turn around and", "-25.633887215459254" ], [ "user's knowledge, such as clicking on a button that appears to perform another function.\nClickjacking is an instance of the confused deputy problem, wherein a computer is innocently fooled into misusing its authority. History In 2002, it had been noted that it was possible to load a transparent layer over a web page and have the user's input affect the transparent layer without the user noticing. However, this was mainly ignored as a major issue until 2008.\nIn 2008, Jeremiah Grossman and Robert Hansen had discovered that Adobe Flash Player was able to be clickjacked, allowing an attacker to gain access of", "-25.5913064040069" ], [ "has only one corresponding command for each application window.\nHolding down buttons while moving the mouse can be awkward and requires some practice, since the downwards action increases friction for the horizontal motion. An optical mouse would be less susceptible to changes in behavior than a ball mouse with increased friction because the sensor does not rely on mechanical contact to sense movement; a touchpad provides no added friction with all its buttons held down with a thumb. However, it was also argued that muscular tension resulting from holding down buttons could be exploited in user interface design as it gives", "-25.425799472010112" ], [ "in maximized status. The users must then to switch between maximized applications using the Alt+Tab keyboard shortcut; no alternative with the mouse except for de-maximize. When none of the running application windows are maximized, switching can be done by clicking on a partially visible window, as is the common way in other GUIs.\nIn 1988, Apple sued Microsoft for copyright infringement of the Lisa and Apple Macintosh GUI. The court case lasted 4 years before almost all of Apple's claims were denied on a contractual technicality. Subsequent appeals by Apple were also denied. Microsoft and Apple apparently entered a final, private", "-25.332849222933874" ], [ "(keyboard shortcuts Ctrl++ and Ctrl+- respectively). Clicking these buttons overwrites the image file (changing its date and Exif data) without warning and without an option to \"undo\" the action.\nIn the viewing interface, the buttons for moving left or right between photos disappear if the mouse is off of it for a set time. Moving the mouse back on the app causes it to reappear.\nPhotos has been criticized for lacking some features that other popular photo editors have, but it has received several updates to add features and stability.", "-25.324775380020583" ], [ "button will always be present. Selecting this will exit a game or a Wii Menu channel and return the player to the Wii Menu, where users can choose another channel. When playing certain Virtual Console titles, with the exception of the Nintendo 64 and Neo Geo, this will also create a suspend point.\nReset: In applications and games (both retail and downloadable), the Reset button is available. This performs a soft reset of that particular application, for example returning a game to its title screen or the loading screen of a Wii Menu channel, the same as what would happen if", "-25.238295050061424" ], [ "a second switch, with a higher triggering temperature, usually turns off even the cache and forces the computer to reboot). This mitigates the impact of programs resembling power viruses on the processor's longevity, while still accommodating their possible legitimate uses; it can also make overclocking possible with less risk. Manual reset Some thermal switches must be reset manually after they have been tripped. This design is used when an automatic and unattended restart would create a hazardous condition, such as sudden startup of a powerful motor without warning. These types of thermal cutouts are usually reset by pressing a push-button", "-25.214711446828005" ], [ "computers. These devices had a 3D sensor, and moving the device caused the contents to move as if the contents were fixed in place. This interaction could be referred to as “moving to scroll.” Also, if the user moved the device away from their body, they would zoom in; conversely, the device would zoom out if the user pulled the device closer to them. Smartphone cameras and “optical flow” image analysis utilize this technique nowadays.\nA 1996 research paper by Jun Rekimoto analyzed tilting operations as scrolling techniques on small screen interfaces. Users could not only tilt to scroll, but also", "-25.111530610040063" ], [ "Users can delete Web Clips and third-party applications at any time, and may select only certain applications for transfer from iTunes. Apple's default programs, however, may not be removed.\nAlmost all input is given through the touch screen, which understands complex gestures using multi-touch. The iPad's interaction techniques enable the user to move the content up or down by a touch-drag motion of the finger. For example, zooming in and out of web pages and photos is done by placing two fingers on the screen and spreading them farther apart or bringing them closer together, a gesture known as \"pinching\".\nScrolling through", "-25.104309367539827" ], [ "Explorer, Programs and Features, Run, Search, Power Options and Task Manager. In Windows 8.1, the Quick Link menu includes options to shut down or restart a device.\nWindows 8.1 Update introduced changes that facilitate mouse-oriented means of switching between and closing Metro-style apps, patterned upon the mechanics used by desktop programs in the Windows user interlace. In lieu of the recent apps sidebar, computer icons for opened apps can be displayed on the taskbar; as with desktop programs, shortcuts to apps can also be pinned to the taskbar. When a mouse is connected, an auto-hiding titlebar with minimize and close buttons", "-25.071783721061365" ], [ "be re-entered once the machine resumes from a low power state.\nAlthough limiting the boot device options in the BIOS may make it slightly less easy to boot another operating system, firmware in modern chipsets tends to allow the user to override the boot device during POST by pressing a specified hot key. Limiting the boot device options will not prevent the memory module from being removed from the system and read back on an alternative system either. In addition, most chipsets provide a recovery mechanism that allows the BIOS settings to be reset to default even if they are protected", "-25.065264511853456" ], [ "cause system operational issues if something goes wrong. In contrast, most user-level software on modern operating systems can be stopped without greatly affecting the rest of the system. Even drivers executing in user mode can crash a system if the device is erroneously programmed. These factors make it more difficult and dangerous to diagnose problems.\nThe task of writing drivers thus usually falls to software engineers or computer engineers who work for hardware-development companies. This is because they have better information than most outsiders about the design of their hardware. Moreover, it was traditionally considered in the hardware manufacturer's interest to", "-24.98638930728339" ], [ "stickers \"Any key\" to the reset buttons of their office computers, causing their less experienced colleagues to misinterpret the message – to considering it just as being a sarcasm about software-related difficulties solving skills of novice users (seeing a message you didn't expect? ahh, panic! don't even try to read it and understand!! just press reset!!!), or a Murphy's law-similar pessimism about actual resolvability of some types of work-flow problems caused by bugs in software.", "-24.9850074146525" ], [ "demonstrates how their software works in their demos by showing someone scrolling down a web page by just staring at the screen. It exemplifies how the device can be hands-free when needed, making it easy and quick to read and browse the web. An example would be when you are watching a how-to video, you can pause it or rewind with your eyes, because your hands are too busy.\nAnother example of eye tracking is security. Users can set a gaze-operated password, where they would have to look at certain parts of the screen in order to unlock the device. Some", "-24.951290141107165" ], [ "and typing characters somewhere else in the focus window can cause a keylogger to record more information than they need to, although this could easily be filtered out by an attacker. Similarly, a user can move their cursor using the mouse during typing, causing the logged keystrokes to be in the wrong order e.g., by typing a password beginning with the last letter and then using the mouse to move the cursor for each subsequent letter. Lastly, someone can also use context menus to remove, cut, copy, and paste parts of the typed text without using the keyboard. An", "-24.913134767470183" ], [ "has many options, a lot of clicks are needed to switch to the desired one. This is why some GUI environments have the ability to display the same element as a cycle button or a drop-down list, depending on the number of options.", "-24.8804270226683" ], [ "from active connections, but does not disable the respective chips in the device. The report further states that \"it's a feature, not a bug\", referencing documentation pages by Apple confirming the new toggle behaviors as a means to disconnect from connections but remain active for AirDrop transfers, AirPlay streaming, Apple Pencil input, handoff and other features. Security researcher Andrea Barisani told Motherboard that the new user interface was \"not obvious at all\", making the user experience \"more uncomfortable\". In October 2017, the Electronic Frontier Foundation published an article, calling the interface \"misleading\" and \"bad for user security\", due to a", "-24.866639858330018" ], [ "cold restart is triggered by pressing Ctrl+Break. If a filing system is installed, ⇧ Shift+Break will cause the computer to search for and load or run a file called !Boot on the filing system's default device (e.g. floppy disk 0, network user BOOT). The latter two behaviours were inherited by the successor to Acorn MOS, RISC OS. These behaviours could be changed or exchanged in software, and were often used in rudimentary anti-piracy techniques.\nBecause of the BBC Micro's near universal usage in British schools, later versions of the machine incorporated a physical lock on the Break key to stop children", "-24.80891140748281" ], [ "clicks - pop-up menus can be pruned and/or altered, or a web search can focus results based on previous searches.\nAt higher levels of implementation context sensitive actions require either larger amounts of meta-data, extensive case analysis based programming, or other artificial intelligence algorithms. In computer and video games Context sensitivity is important in video games – especially those controlled by a gamepad, joystick or computer mouse in which the number of buttons available is limited. It is primarily applied when the player is in a certain place and is used to interact with a person or object. For example, if", "-24.753506585140713" ], [ "drive before restarting the machine. In the latter case, many times it switches off the system instead of restarting it (the reset button is actually also the on/off button, but under normal circumstances, the button needs to be held for 2–4 seconds to turn the system off). However older systems would turn off with a single press or flick of the button/switch.\nOn certain games (especially those that use autosave), one can gain an advantage by using the reset button. If a mistake is made, such as getting a character killed, the reset button can be pressed instead of saving, and", "-24.742344001002493" ], [ "of the IFileIsInUse interface, Windows Explorer, upon encountering a locked file, allows the user to close the file or switch to the application from the dialog box itself. Default Programs A common issue in previous Windows versions was that competing applications doing common tasks each tried to associate themselves as the default for a certain file type using their own custom user interface. The default application information for a particular file type was stored in the registry on a per-machine basis, resulting in applications changing another user's default program when one user's defaults were changed and each application querying several", "-24.735550802666694" ], [ "or take a screenshot every time a keystroke or mouse click occurs. They may, however, be effective against some hardware keyloggers.", "-24.73169599321409" ], [ "if held down for a few seconds. When the OS hangs, the reset button is no longer \"integrated with the power button\".\nMany early microcomputers sported a reset button or key, such as the Apple II, TRS-80, and Atari 8-bit. Commodore did not include one on their computers until the CBM-II line.\nThe original IBM PC had no hardware reset button and IBM did not include one on any of their personal computers until the early 1990s, however many clones began sporting them early on. All PC compatibles can be rebooted by pressing Ctrl+Alt+Del, which triggers the BIOS startup routines and re-initializes", "-24.6948376672226" ], [ "the memory, and were stored in \"suitcases\" when not installed in the system file. If installed within a separate application, such as MacWrite, their functionality would be accessible only when that application was running. That is, a desk accessory installed as a resource within an application would appear on the Apple menu as a desk accessory only when that application was active. It could then be activated while the application was run and would then disappear when the application was terminated through the Quit function. (Similarly, the FKEY resources could be installed either within the System so as to be", "-24.689648713479983" ], [ "games that lock, restrict or alter mouse interactions for the purpose of the game. Starting with Windows Vista, Windows Desktop is included in the list and can be activated this way.\nWindows 7 introduced Aero Flip (renamed Windows Flip in Windows 8). When the user holds down the Alt key, Aero Flip causes only the contents of the selected window to be displayed. The remaining windows are replaced with transparent glass-like sheets that give an impression where the inactive window is located.\nWindows 8 introduced Metro-style apps, which did not appear when Alt+Tab ↹ was pressed. (They have to be switched with", "-24.611923178832512" ], [ "research study conducted by Forrester Research, online shoppers expected the web pages they visited to download content instantly. When a page fails to load at the expected speed, many of them simply click out. A study found that even a one-second delay could lead to \"11% fewer page views, a 16% decrease in customer satisfaction, and 7% loss in conversions\". This delay can cause a server problem to small innovators who have created new technology. If a website is slow by default, the general public will lose interest and favor a website that runs faster. This helps large corporate companies", "-24.572549360367702" ], [ "mouse cursor in a certain area, then a toolbar or function option will become visible. In general, because of the smaller screen of mobile devices, controls are often not placed right in the centre of the screen, because that is where the user views content or text.\nSome organizations try to increase the discoverability of a certain feature by adding animation, such as a moving \"click here\" icon. As of 2017, the addition of motion sensors and geotracking to mobile devices has made webpage design for discoverability more complex, because smartphones and tablets are typically capable of having many more inputs", "-24.51166675495915" ], [ "prevent capturing what is sent to the sound system. Users unable to modify software A user who wanted to switch to a competing program might find that it would be impossible for that new program to read old data, as the information would be \"locked in\" to the old program. It could also make it impossible for the user to read or modify their data except as specifically permitted by the software.\nRemote attestation could cause other problems. Currently, web sites can be visited using a number of web browsers, though certain websites may be formatted such that some browsers cannot", "-24.501076737069525" ], [ "and the OS displays a second cursor in software at the original position. Pressing COPY copies one character from the hardware cursor to the software cursor and advances both, so that holding the key down copies a section of the text, the cursors wrapping around the vertical edges of the screen as necessary. If the screen scrolls during editing, the hardware cursor's position is adjusted to follow the text. The user can make changes to the text during the copy, and user-defined characters are recognised in graphics modes. Screen editing is terminated when RETURN or ESCAPE", "-24.444136411242653" ], [ "the system will not switch on. There are several ways to check for this. First the laptop can be partially disassembled and the mouse assembly can be unplugged from the system board and the system switched on. If the system boots with the mouse unplugged then it is the switch. Another way to check for the problem is by running a magnet over the reed switch, there should be a faint click when the magnet triggers the switch. This does not require disassembly but the magnet must be in the correct position and be strong enough. Some people have modified", "-24.44023731741254" ], [ "planting. Criticism There have been complaints that UAC notifications slow down various tasks on the computer such as the initial installation of software onto Windows Vista. It is possible to turn off UAC while installing software, and re-enable it at a later time. However, this is not recommended since, as File & Registry Virtualization is only active when UAC is turned on, user settings and configuration files may be installed to a different place (a system directory rather than a user-specific directory) if UAC is switched off than they would be otherwise. Also Internet Explorer 7's \"Protected", "-24.391373852617107" ], [ "or more of the Sticky Keys (Ctrl, Alt, Shift, Windows Button) at the same time.\nTo enable under Linux, BSD, and other Unix operating systems, run X server with the «+accessx» command line option and the XKB extension enabled, then press the ⇧ Shift key five times. Issues Over the years, this feature has posed difficulties for users who use the Shift key heavily, such as gamers, because an activation popup will be placed above all other applications, disturbing their gameplay. This can be fixed by going into the control panel and going into the accessibility option and then disabling the", "-24.360256333078723" ], [ "is a boot process in which the computer starts from a powerless state. All except Tulloch (2002) also mention that in cold boot, the system performs a power-on self-test (POST). In addition to the power switch, Cooper (2002) and Soper (2004) also state that the reset button, if present, may commence a cold reboot. Jones, Landes, and Tittel (2002) contradicts this assertion and states that a reset button may commence either a cold or warm reboot, depending on the system. Microsoft Support article 102228 also confers that although the reset button is designed to perform a cold reboot, it may", "-24.339474465858075" ], [ "Other devices may require a complete re-installation of the software. The following section lists a few common electronic devices and how they can be reset to factory settings.\nComputer factory resets will restore the computer to the computer's original operating system and delete all of the user data stored on the computer. Microsoft's Windows 8 and Windows 10, and Apple's macOS have options for this.\nOn Android devices, there is a factory data reset option in Settings that will appear to erase all of the device's data and reset all of its settings. This method is typically used when the device has", "-24.333028370703687" ], [ "user by refusing to operate, for example just crashing. There are some solutions, such as XPrivacy, which instead of providing access to the requested data instead of throwing an exception and crashing an app returning disinformation to make an app operate as if the permission was granted. It is also possible to use static analysis to analyze the requested permissions.", "-24.316527020004287" ], [ "will make the window flip head over heels. The effect would continue until the main window is closed and reopened.\nFurthermore, scans are no longer scheduled through the Windows Task Scheduler, but through the Symantec's proprietary one, which performs tasks while the computer is idle (i.e., when the user is away from the computer). Version 20.x (2013) Version 20 (2013) began a \"Version-less\" approach by dropping the 20xx naming convention, and will automatically update itself as new releases become available. Notable changes include a new user interface better suited for touchscreen devices, \"Social Networking Protection,\" which intends to protect against threats", "-24.315717845223844" ], [ "glass touchpad. Conversely when tracking is set to slow, larger movements of the thumb on the touchpad will tune down the distance that is traversed on the screen. This can help people with disabilities.\nApple's Remote app on iOS devices allows control of the Apple TV from an iPhone, iPad or iPod Touch. The iOS remote app increases the accessibility of the Apple TV by enabling Switch Control. Switch Control is a unique Apple technology that enables navigation sequentially through onscreen items and perform specific actions such as selecting, tapping, dragging, typing using third party Bluetooth-enabled switch hardware made for those", "-24.314734239073005" ], [ "Motion that controls these changes by simulating natural forces without requiring the more rigid but precise keyframing method. Yet another method involves the use of formulas or scripts, such as the expressions function in Adobe After Effects or the creation of ActionScripts within Adobe Flash. Computers are capable of calculating and randomizing changes in imagery to create the illusion of motion and transformation. Computer animations can use less information space (computer memory) by automatically tweening, a process of rendering the key changes of an image at a specified or calculated time. These key poses or frames are commonly referred to", "-24.309581732399238" ], [ "iPads running iOS 12. Keyboard In iOS 12, the trackpad mode (which allows the user to freely move the cursor) is enabled by long-pressing the space bar on devices without 3D Touch. App Switcher For devices with gesture navigation and no home button (iPhone X and later), users can now force quit applications by swiping up from the bottom of the screen (without having to press and hold on them when in the app switcher). Messages Messages in iOS 12 introduces a new type of customizable Animoji called \"Memoji\" which allows a user to create a 3D character of themselves.", "-24.29380895482609" ], [ "where a file is not immediately deleted when the user requests that action. Instead, the file is moved to a holding area, making it easy for the user to undo a mistake. Similarly, many software products automatically create backup copies of files that are being edited, to allow the user to restore the original version, or to recover from a possible crash (autosave feature).\nEven when an explicit deleted file retention facility is not provided or when the user does not use it, operating systems do not actually remove the contents of a file when it is deleted unless", "-24.28046411886953" ], [ "soon as the state of the application changes (\"active\") or only when the menu is invoked (\"passive\").\nAnother example is update a visual display as soon as the underlying data change as opposed to clicking the \"redraw\" button. In this situation active update may create a problem to deal with: an abrupt change of some part of the display may coincide in time with the saccadic movement of the eye, and the change may go unnoticed by a human observer.", "-24.27232410965371" ], [ "we are usually in a hurry and there are no real consequences for choosing the incorrect option (i.e. clicking the wrong link) as the back button is only a click away to solve the issue. Similarly, there is no penalty for guessing, thus weighing the options of which button to click and if it will yield the desired results is a waste of time and though.\nBecause of that we don't care enough to understand what we are doing as long as we can use the functions.\nThe effect of that is that users may develop unexpected thinking patterns and ways of", "-24.26040630474745" ], [ "more difficult, especially since the unpredictable nature of the Internet made the amount of delay vary from moment to moment. Players would experience jerky, laggy motion that sometimes felt like ice skating, where they would slide around with seemingly no ability to stop, due to a build-up of previously-sent movement requests. John Carmack has admitted that this was a serious problem which should have been fixed before release, but it was not caught because he and other developers had high-speed Internet access at home.\nWith the help of client-side prediction, which allowed players to see their own movement immediately without waiting", "-24.24248077662196" ], [ "are subject to a problem called metastability, which can happen when two inputs, such as data and clock or clock and reset, are changing at about the same time. When the order is not clear, within appropriate timing constraints, the result is that the output may behave unpredictably, taking many times longer than normal to settle to one state or the other, or even oscillating several times before settling. Theoretically, the time to settle down is not bounded. In a computer system, this metastability can cause corruption of data or a program crash if the state is not stable", "-24.235413964328473" ], [ "screen and white or black Apple logo (depending on the user's device) that looks identical to the boot screen. The phenomenon was later narrowed down to it only happening when the message was shown via the notification drop-down or the lock screen; it can be fixed by disabling this. If the message is unread and the victim opens the iMessage app or any other app that received the message it can crash the iOS device again. Further problems can include the device resetting to its factory settings, the device no longer receiving text messages or calls and the device frequently", "-24.223236330843065" ], [ "it is new or because its member data has been changed since it was last loaded). Business objects can also be marked for deletion so they can later be deleted (for example when a user has pressed a button confirming his or her intention to delete the rows.) n-Level undo This feature makes it possible for an object or collection of objects to maintain a collection of states. This allows the object to easily revert to previous states. This can be useful when a user wants to undo previous edits multiple times in an application. The feature", "-24.218370144517394" ], [ "key, and various key combinations involving a modifier key such as the Control key. The position of the cursor also may be changed by moving the mouse pointer to a different location in the document and clicking.\nThe blinking of the text cursor is usually temporarily suspended when it is being moved; otherwise, the cursor may change position when it is not visible, making its location difficult to follow.\nSome interfaces use an underscore or thin vertical bar to indicate that the user is in insert mode, a mode where text will be inserted in the middle of the existing text, and", "-24.20620529404914" ], [ "access to it, lets the ICE do anything that the processor can do, but under the control of a software developer.\nICEs attach a computer terminal or personal computer (PC) to the embedded system. The terminal or PC provides an interactive user interface for the programmer to investigate and control the embedded system. For example, it is routine to have a source code level debugger with a graphical windowing interface that communicates through a JTAG adapter (emulator) to an embedded target system which has no graphical user interface.\nNotably, when their program fails, most embedded systems simply become inert lumps of nonfunctioning", "-24.198277199291624" ], [ "due to the user not looking at the screen. There is also the disadvantage that because fewer fingers are used, those that are used are forced to move a much greater distance. Hybrid There are many idiosyncratic typing styles in between novice-style \"hunt and peck\" and touch typing. For example, many \"hunt and peck\" typists have the keyboard layout memorized and are able to type while focusing their gaze on the screen. Some use just two fingers, while others use 3–6 fingers. Some use their fingers very consistently, with the same finger being used to type the same character every", "-24.174364287682693" ], [ "information are barrier-free, empowering individuals with disabilities to achieve their goals\". Switching applications In iOS 4.0 to iOS 6.x, double-clicking the home button activates the application switcher. A scrollable dock-like interface appears from the bottom, moving the contents of the screen up. Choosing an icon switches to an application. To the far left are icons which function as music controls, a rotation lock, and on iOS 4.2 and above, a volume controller.\nWith the introduction of iOS 7, double clicking the home button also activates the application switcher. However, unlike previous versions it displays screenshots of open applications on top of", "-24.167075622070115" ], [ "can also allow a user to redo multiple edits that were previously undone.\nThis feature can provide rich functionality for desktop application and web applications. One note of caution would be to consider the overhead for high-transaction web-based applications. n-Level undo capability will require storing the previous state of an application generally accessed by reflection. This is common practice in desktop applications where changes must be \"Applied\". In web based designs, the added storage may pose unnecessary overhead as changes are generally submitted in batch and do not require the same level of \"undo\" capability. Business rule", "-24.156131362367887" ], [ "it prevents the user from changing to a different task when needed.", "-24.124420146108605" ], [ "or the document's body. This enables catching all mouse click events that were not consumed by other click event handlers, and calling window.open without being blocked. For example, when the user selects a text, the mouse click triggers the mouse click handler attached to the document and a pop-under opens using the above code. Notice that there are more techniques to bypass the window.open call restriction by \"hijacking\" mouse clicks. Patent controversy ExitExchange.com filed for a patent in 2000 on a subset of pop-under advertising called an exit pop. After years of controversy and numerous articles on the pop-under patent,", "-24.10693057433673" ], [ "many programs are not designed to do this. A common technique for such programs is the use of a launcher program to copy necessary settings and files to the host computer when the application starts and move them back to the application's directory when it closes.\nAn alternative strategy for achieving application portability within Windows, without requiring application source code changes, is application virtualization: An application is \"sequenced\" or \"packaged\" against a runtime layer that transparently intercepts its file system and registry calls, then redirects these to other persistent storage without the application's knowledge. This approach leaves the application itself unchanged,", "-24.104941439116374" ], [ "application has \"focus\", the menu will belong to that application instead, requiring the user to check and see which menu is active before \"throwing\" the mouse, and often perform an extra step of focusing the desired application before using the menu, which is completely separate from the application it controls. The effectiveness of this technique is also reduced on larger screens or with low mouse acceleration curves, especially due to the time required to travel back to a target in the window after using the menu. On systems with multiple displays, the menu bar may either be displayed on", "-24.10453918154235" ], [ "also reported random reboot issues, which Microsoft tried to address with a software update on 19 March 2014 to no avail but were able to resolve with an update on 19 June 2015.\nOne contentious issue was a supposed design flaw on the device's screen wherein the touch interface digitizer receives signals without user interaction on the touchscreen, resulting in \"phantom touches\".", "-24.081733391787566" ], [ "a deadlock). If the processes are uninterruptible they will hang and have to be shut down. If at least one of the processes is a critical kernel process the whole system may hang and have to be restarted.\nA computer may seem to hang when in fact it is simply processing very slowly. This can be caused by too many programs running at once, not enough memory (RAM), or memory fragmentation, slow hardware access (especially to remote devices), slow system APIs, etc. It can also be caused by hidden programs which were installed surreptitiously, such as spyware. Solutions In many cases", "-24.067109248273482" ], [ "programmer can easily fall into. For example, a plugin that is running inside another application is expected to handle all errors and exceptions in such a way as to not crash the application in which it is embedded. Blanket catching of errors and exceptions is a pattern that is easy to fall into when attempting to prevent crashes at all costs, and when you combine that with poor logging tools, error swallowing can happen. Hiding complexity from users When showing errors to users, it's important to turn cryptic technical errors into messages that explain what happened and what actions the", "-24.051282954693306" ], [ "subsequent versions of Windows. It allows a user to cycle through existing application windows by holding down the Alt key and tapping the Tab ↹ key. Starting with Windows 95, as long as the Alt key is pressed, a list of active windows is displayed, allowing the user to cycle through the list by tapping the Tab ↹ key. An alternative to this form of switching is using the mouse to click on a visible portion of an inactive window. However, Alt+Tab ↹ may be used to switch out of a full screen window. This is particularly useful in video", "-23.96272665383549" ], [ "to continue using the operating system. If the user's computer system ever changes — for example, if two or more relevant components of the computer itself are upgraded — Windows will return to the unactivated state and will need to be activated again within a defined grace period. If a user tried to reactivate too frequently, the system will refuse to activate online. The user must then contact Microsoft by telephone to obtain a new activation code.\nHowever, activation only applied to retail and \"system builder\" (intended for use by small local PC builders) copies of Windows. \"Royalty OEM\" (used by large PC", "-23.962645779392915" ], [ "mask (disable) interrupts, because the user program could control the CPU for as long as it wishes. Some modern CPUs do not allow user mode code to disable interrupts as such control is considered a key operating system resource. Many embedded systems and RTOSs, however, allow the application itself to run in kernel mode for greater system call efficiency and also to permit the application to have greater control of the operating environment without requiring OS intervention.\nOn single-processor systems, an application running in kernel mode and masking interrupts is the lowest overhead method to prevent simultaneous access to a shared", "-23.94582160725031" ], [ "the computer may not consume an activation, if the Product Activation servers successfully detect it as a re-installation on the same set of hardware. The activation limit may be increased, on a case-by-case basis, if the user is shown to have reached this limit due to several hardware-triggered re-activations on the same PC. BioShock Purchasers of BioShock were required to activate the game online, and users who exceeded their permitted two activations would have to call to get their limit raised. The limit was raised to five activations because an incorrect phone number had been printed on the manual, and", "-23.922671449894096" ], [ "existing file or folder and opens the file name text field for the next file for renaming. Shift+Tab allow renaming in the same manner upwards.\nIn case a file is in use or \"locked\" by another application, Windows Explorer informs users to close the application and retry the file operation. Also, a new interface IFileIsInUse is introduced into the API which developers can use to let other applications switch to the main window of the application that has the file open or simply close the file from the \"File In Use\" dialog. If the running application exposes these operations by means", "-23.915617017890327" ], [ "Exit Intent Popup Exit intent technology on mobile devices The exit-intent technology works differently on mobile devices than on a desktop. There is no mouse movement to track, so advanced exit intent popup software will show a popup once a visitor tries to click \"back\" or close the mobile browser tab.", "-23.890509798777202" ], [ "by clicking on it, it will jump until the software is finished loading. Additionally, when an application requires attention from a user, it will jump even higher until its icon is clicked and the user attends to its demands. Design The original version of the dock, found in Mac OS X Public Beta to 10.0, presents a flat white translucent interface with the Aqua styled pinstripes. The dock found in Mac OS X 10.1 to Tiger removes the pinstripes, but otherwise is identical. Mac OS X Leopard to Lion presents the applications on a three-dimensional glassy surface from a perspective", "-23.864965612317974" ], [ "to the active application window. Such programs might come in the form of macros or dedicated programs which involve more or less scripting. Alternatively, applications supporting simultaneous editing may be used to copy or move collections of items. Additional differences between moving and copying In a spreadsheet, moving (cut and paste) need not equate to copying (copy and paste) and then deleting the original: when moving, references to the moved cells may move accordingly.\nWindows Explorer also differentiates moving from merely copy-and-delete: a \"cut\" file will not actually disappear until pasted elsewhere and cannot be pasted more than once. The icon", "-23.863415266561788" ], [ "GNOME Terminal window when multiple tabs are used. Similar to the profile feature, each tab can be assigned a name. Safe quit In recent versions, when the user attempts to quit the entire graphical application, GNOME Terminal will prompt the user with a dialog box to confirm if the user truly wants to exit GNOME Terminal. This feature is intended to reduce the risk of accidentally closing a terminal window (e.g., by clicking the window's close button) with a job still running. If a job is running and the user closes the window, the job will quit and the user", "-23.860666827114983" ], [ "to left). Notifications may be selected by the user, which redirects the user to the application where the notification was initially created, and marking that alert as read. Once a notification is read, it is removed from the panel. Users may also remove notifications without reading them by deleting individual alerts, or dismissing all of an application's alerts from within the application that is generating them. When an iOS device is locked, new notifications appear on the lock screen, and users may access the application generating an alert by swiping the application's icon with their finger from left to right", "-23.823251327092294" ], [ "features, such as red eye removal, sharpness adjustments, zoom features and automatic cropping. These are called automatic because generally they happen without user interaction or are offered with one click of a button or mouse button or by selecting an option from a menu. Additionally, some automatic editing features offer a combination of editing actions with little or no user interaction. Digital data compression Many image file formats use data compression to reduce file size and save storage space. Digital compression of images may take place in the camera, or can be done in the computer with the image editor.", "-23.80790584650822" ], [ "Apple Menu or by pressing the power key to bring up the power management dialog box and selecting button \"Shut down\". An administrator may also use the Unix shutdown command as well. It can also be shut down by pressing [Alt]+[Command]+[Eject optical disc on optical drive] but this will not prompt the user anything at all. Unix and Linux In Unix and Linux, the shutdown command can be used to turn off or reboot a computer. Only the superuser can shut the system down.\nOne commonly issued form of this command is shutdown -h now, which will shut down a system", "-23.781766598985996" ], [ "sliders and the hinged desktop automatically pushed the sliders out at the same time as the user pulled on the closed desktop to put it in its horizontal position. When the user closed it afterwards, the sliders would then retract automatically. In such a case, the secretary is also known as a mechanical desk like many other desk forms which have some sort of mechanism pushing out elements of the desk and then pulling them back in automatically.\nA secretary desk is, despite its name, generally not used by a person with the title of secretary, since this kind of", "-23.7802258097945" ], [ "Scroll Lock is pressed again, the screen is unfrozen and all text generated during the freeze is displayed at once. This allows the user to pause the display and read long messages that scroll through the screen too quickly to read, such as for example when the system is booting up (provided the keyboard driver has already been loaded). If not configured otherwise, Ctrl+S and Ctrl+Q can be used instead of Scroll Lock in any terminal in Linux to freeze and unfreeze the terminal output respectively.\nThis behaviour emulates the Hold Screen key or similar flow control mechanisms on computer terminals.\nThe", "-23.76869830468786" ], [ "pressing a key or moving the mouse.\nSignal sent from the keyboard is incompatible with other infrared keyboard receivers however. Despite the red LED only blinking when the keyboard is being used, the keyboard constantly transmits a signal (apparently remaining battery strength) unless it is left unused for a few minutes, in which then it would automatically shut itself off. It can be turned back on by just pressing any of the keys on the keyboard or pressing the mouse button. The mouse can be replaced in the event of the cord or the mouse breaking down. The back of the", "-23.7603036995788" ], [ "a remote server; obtaining a file from such a filesystem can be significantly slower than getting the file locally. For this reason, it can be desirable to cache data from these filesystems on a local disk, thus potentially speeding up future accesses to that data by avoiding the need to go to the network and fetch it again. The software has to check that the remote file has not changed since it was cached, but this is much faster than reading the whole file again. Prior Art Sprite (operating system) used large disk block caches. These were located in", "-23.7406683299414" ], [ "the integration of their code changes as early as possible. Feature branches introduce a bypass to this process. Feature toggles are an important technique used for the implementation of continuous delivery.\nThe technique allows developers to release a version of a product that has unfinished features. These unfinished features are hidden (toggled) so they do not appear in the user interface. This allows many small incremental versions of software to be delivered without the cost of constant branching and merging. Feature toggles may allow shorter software integration cycles. A team working on a project can use feature toggle to speed up", "-23.739446152816527" ], [ "Freeze (software engineering) Implementations In development environments using version control, the use of branching can alleviate delays in development caused by freezes. For example, a project may have a \"stable\" branch from which new versions of the software are released, and a separate \"development\" branch in which the developers add new code. The effect of a freeze is then to prevent promotion of some or all changes from the development branch to the stable branch. In other words, the freeze applies only to the stable branch, and developers can continue their work on the development branch.", "-23.70208650166751" ], [ "the user quits an application that is started from it, although the startup application can be changed by the user.\nSoftware companies complained that Apple did not provide technical information and development tools to create IIGS-specific software. In 1988 Compute! reported that both Cinemaware and Intergalactic Development had to write their own tools to maximize their use of IIGS audio, with the latter stating that \"these sorts of problems … are becoming well-known throughout the industry\". Extensibility The IIGS System Software can be extended through various mechanisms. New Desk Accessories are small programs ranging from a calculator to simple word processors", "-23.694223518308718" ], [ "is powered down, unplugged, or if the keyboard is unplugged or moved to a different computer. \nThe keyboard can be programmed to call up and execute software programs in the computer, but must compensate for the time it takes the computer to execute the program via inserting a delay of 1–5 seconds before entering a subsequent series of commands.\nThe controller board inside the Anykey contains six integrated circuit packages (“chips”) in addition to various signal regulation hardware including 15 diodes, 11 capacitors, and nine resistors of unknown specific function in addition to four green LED's for signalling purposes of (left", "-23.680784426804166" ] ]
2jv66u
When the wifi is super slow why does restarting router magically fix it?
[ "There are lots of good reasons restarting your router might fix the speed, lets list them: * Your neighbors suck: Are lots of people stealing WiFi from you? Rebooting your router probably forced them to connect to a different network thus freeing up bandwidth for you. This can also be true of all the online devices in your house. * Your ISP sucks: Some internet service providers like to slow down the traffic of users that they catch using specific protocols (like bit torrents and encryption) which is technically illegal if they do it before killing net neutrality, but there is lots of evidence they have been doing it anyways. By restarting your router you are effectively requesting a new IP address from your ISP and that may also reset any bad things they have done to your connection. * Your router sucks: Routers are little computers. They have memory and processors and they run software just like your computer but cheaper. It is possible that simply running for a long time makes your router slow down from internal memory leaks due to bad design/firmware. * Your computer sucks: When you restart the router every service using the internet on your computer is forced to briefly accept the fact that there is no internet anymore. If one of those services was causing horrible connection issues (like some background update service), then there is a chance restarting the router will force it to end early, thus freeing your computer once the router comes back online. * You suck: There are lots of reasons that something on the internet may seem slow for a while and then seem fast later. If your evidence is \"it seems faster after restarting\" I might ask to see your data.", "Just wanted to say as Long time lurker / Network Engineer. That most of the points hear are correct however one thing I want to point out is that your Router is like a Computer. It has a processor, storage and RAM. If your computer was on for 6 months at a time I am sure something would start to slow down. They fill up with logs and the services in the background start slowing down and then it runs out of space / RAM everything slowly starts going to a crawl. What I recommend doing is getting a Good Wireless Access point / Letting the Router just be a router with DHCP. Trying to offload these services to multiple devices rather than letting your all-in-one combo router do everything. (Jack of all trades, master of none) Last but not least is that if you use your router from your ISP. Chances are is probably junk! (They bulk buy these suckers and they normally are not very good)", "Restarting can sometimes improve a router's performance. It is after all a computer prone to errors. Here's how I troubleshoot slow internet: 1) Ping my router. If the ping is double/triple digits, the problem might be there. 2) Ping Google. If the ping is triple/quadruple digits, the problem might be somewhere between my router and Google. 3) Ping the gateway. There are three \"gateways\". The 1st is your router. We've already covered that. The 2nd is the modem. The modem has 2 ip addresses. The first is the IP address between your router and the external IP address of the modem. The second is the external IP address of the modem. Ping the external IP. If the ping is high, double/triple digits, it's the modem. The 3rd gateway is outside your home network entirely and is a router belonging to the ISP. You can find its ip address by looking at your router's WAN page, if it has one. Ping it. If it's triple/quadruple digits the problem isn't yours, it's the ISP's. If none of this gives you poor ping results then the problem is farther out. Time to use another tool. 4) Tracert google. This will show you the hops and their ping times between you and Google. Hops are the routers between you and a destination on the internet that your traffic travels through. This will demonstrate where the slow down is between you and Google and generally if it's your ISP or someone else. Assuming the problem is with your router there are some things you can do. Without getting into more technical aspects, the most effective means of dealing with poor connections between the router and devices is to move the router's antenna as high as possible and centrally locate it, if possible. Change the channel. Wifi routers have about 11 channels to choose from. Defaults for routers are usually channel 6, depending on manufacturer. Moving your router off manufacturer default channels may improve things for you. Change your antennas. You can buy or make more sensitive antennas. [You can also make easily and cheaply using paper, glue & tinfoil a sort of directional attachment for existing antennas.]( URL_0 ) Now, if you want to get more technical, try upgrading to a 3rd party firmware like DD-Wrt. Doing so will enable additional metrics & features not available in stock manufacturer firmware. 3rd party firmwares often include the ability to adjust transmission power. You can literally spend weeks playing with this feature getting it just right. You can also purchase repeaters that are simple to use. Or, if you have older wifi routers sitting around, using 3rd party firmware will also enable repeater functions if not already available in stock firmware. I've done this and it works extremely well. If you're sharing your router with roommates and/or family, they might be hogging your bandwidth. 3rd party firmware literally turns a $40 router into a $10,000 router by adding features such a QoS (quality of service) allowing you to meter bandwidth based on criteria such as type of traffic and/or devices. This will allow you to give higher priority to traffic such as video streaming and/or VoIP or by allowing your roommates a maximum bandwidth so as to preserve your own or banning certain traffic such as P2P. Sometimes there's nothing you can do given the environment. Steal/concrete constructed buildings will always pose a problem for Wifi. In these environments a mix of technologies might solve certain problems. If you don't want to install networking cable, or can't, then Ethernet over Powerlines might be an option. These devices are fairly cheap turning your average power outlet into a network jack. As with everything, there are limitations and problems to be aware of and overcome.", "Imagine an 8 lane highway that's full of cars and everyone is doing the limit. How long would it take for traffic to slow down if people start changing lanes and entering/exiting the highway. You can fix this by kicking everyone off and restarting the flow of traffic. The cars are the data that's going through your router. Errors build up, your rebooting clears them and allows a faster connection. EDIT: your ISP sets the top speed, it is extremely unlikely they will throttle your bandwidth. There are lots of other more likely things that will slow you down especially if rebooting your router is fixing it.", "I listen to a podcast hosted by Leo Laporte and Steve Gibson; an Internet security specialist. (The podcast is called Security Now on the TWIT network for anyone curious -- highly recommended for IT professionals and enthusiasts). Anyway; there is an issue known as \"bufferbloat\" which is caused by new routers not only at the household level, but all along the Internet network. As these new routers are designed with more local RAM, their \"short term memory\" is greater. This sounds like a good thing in theory, but in reality it isn't. It is actually better for these units to have less memory. Since there is more kept locally on each unit, they slowly become \"bloated\" with unnecessary information left over in the unit. This effect is exponential over the entire network. When you reboot your local router, it clears the memory of that unit and reduces your local bufferbloat. It does not make a tremendous difference but it is a factor. Be it a very technical one. The longer your unit has been operating continuously, the greater the effect. Here are a few links: URL_0 URL_1 ", "Your router contains something called a NAT (network address translation) table. Anytime your PC or any internet-enabled device on your home network makes a connection to the internet, the router has to remember which device made the request so when the response comes back it knows which device to deliver the information to. This info is stored in this NAT table. When you use bittorrent, or another program that requests multiple connections to the internet, this NAT table can get filled up. When it does, everything will grind to a halt. Rebooting the router clears this table thus speeding everything up again.", "Related question: why does my SNR get progressively worse until I restart my router? It doesn't happen every time, either, so assuming it's something external causing it, why does restarting alleviate the problem?", "I see a lot of people talking about WiFi Security which is good but the other reason the restart is helping you is it forces your wireless router to change channels. In areas where nearly everyone has WiFi and the Standard being 2.4gHz you only have 12 channels. If multiple users in your area are on the same signal channel you will have a lot of issues with WiFi going in and out or being really slow. The best option is to upgrade to a router that supports the 5gHz bandwidth which many people don't have. You can also use the Android App WiFi Analyzer to see what channels the other networks around you are on and adjust your channel to one that is free of interference.", "This was happening to me every night for months. Constantly reaching for the reset button on the back of the router. Phoned my ISP. They told me other routers nearby might be using the same channel, and resetting the router means it'll settle on a less busy channel. They suggested setting it to a certain specific channel instead of leaving the channel on \"Auto\" (if you don't know how to change your wifi channel it's an easy Google). There are a lot of answers above, but for what it's worth, this fixed the problem for me. It's been 4 weeks and I haven't had to reset once.", "I worked for an ISP. The actual reason is it resets the connection to your port. If you call your ISP the first thing they will do is reset your port. Essentially doing the same thing as you but on the ISP end. Your basically breaking the sync between the port and modem and then reastablishing the connection.", "In my personal experience, it is due to the low memory in my Netgear router. Things like running utorrent and certain server browsers cause my router to slow down, I believe due to the memory getting filled.", "I found it incredibly ironic that when I first tried to click on this post I got a \"could not connect to server\" message and had to restart my router.", "It's also similar to \"shaking the blanket\" per-say. You're shaking off the ghost connections of things that WERE connected to the router, but went out of range." ]
[ [ "down systems worldwide. The slowdown was caused by the collapse of numerous routers under the burden of extremely high bombardment traffic from infected servers. Normally, when traffic is too high for routers to handle, the routers are supposed to delay or temporarily stop network traffic. Instead, some routers crashed (became unusable), and the \"neighbour\" routers would notice that these routers had stopped and should not be contacted (aka \"removed from the routing table\"). Routers started sending notices to this effect to other routers they knew about. The flood of routing table update notices caused some additional routers to fail, compounding", "-33.14685198034931" ], [ "re-sending packets as required. This effectively eliminates acknowledgment latency when there are no errors, leaving only the latency of data transmission and error detection.\nZMODEM's performance was so improved over previous common protocols that it generally replaced even special protocols such as YMODEM-g, which included no error correction at all and instead relied on error-free links maintained by the modems. Although YMODEM-g was noticeably faster, the lack of other features such as restartable transfers made it less appealing.\nAuto-starting simplified management by allowing the sending machine to start the transfer. Previously the user had to first request the file from the sender,", "-32.52094835360185" ], [ "router is misconfigured or mismanaged then it may get into a rapid cycle between down and up states. This pattern of repeated withdrawal and re-announcement known as route flapping can cause excessive activity in all the other routers that know about the broken link, as the same route is continually injected and withdrawn from the routing tables. The BGP design is such that delivery of traffic may not function while routes are being updated. On the Internet, a BGP routing change may cause outages for several minutes.\nA feature known as route flap damping (RFC 2439) is built into many BGP", "-31.701159397198353" ], [ "during reset, called chirping, to negotiate the high bandwidth mode with the host/hub. A device that is USB 2.0 High Speed capable first connects as a Full Speed device (D+ pulled high), but upon receiving a USB RESET (both D+ and D− driven LOW by host for 10 to 20 ms) it pulls the D− line high, known as chirp K. This indicates to the host that the device is high bandwidth. If the host/hub is also HS capable, it chirps (returns alternating J and K states on D− and D+ lines) letting the device know that the hub operates at high", "-31.490954942826647" ], [ "start mode, which slowed response times.\nTo avoid this problem, modern browsers either open multiple connections simultaneously or reuse one connection for all files requested from a particular server. Initial performance can be poor, and many connections never get out of the slow-start regime, significantly increasing latency. Admission control Admission control requires devices to receive permission before establishing new network connections. If the new connection risks creating congestion, permission can be denied. One example of this is the use of Contention-Free Transmission Opportunities (CFTXOPs) in the ITU-T G.hn standard, which provides high-speed (up to 1 Gbit/s) local area networking over varying", "-31.429706697701477" ], [ "same pace, until one or several link capacity limits are hit. The rates for the sources that use these links are not increased any more, and you continue increasing the rates for other sources. All the sources that are stopped have a bottleneck link. This is because they use a saturated link, and all other sources using the saturated link are stopped at the same time, or were stopped before, thus have a smaller or equal rate. The algorithm continues until it is not possible to increase. Lastly, when the algorithm terminates, all sources have been stopped at some time", "-31.288828858276247" ], [ "peer to transmit as fast as it can when the connection quality is good. The algorithm also makes good effort to more accurately identify the real packet losses from other abnormal situations in order to avoid triggering unnecessary fast recoveries.\nThe Reverse-Controlled inbound acceleration is heuristic in that the inbound speed is really controlled by the sender, i.e., the peer. It can only hint the peer to send faster. Some TCP stacks take the hint and others don't. Also, quite often the sender side (content server for instance) has rate limiting mechanism so that the acceleration effect is capped.\nIn addition to", "-31.05525498976931" ], [ "stream. As the frame propagated through each repeater the preamble would get shorter and shorter. Too many bits lost meant that an end node may not have enough preamble bits to lock on and the entire frame would be missed.\nVarious repeaters (hubs) may use slightly different implementations and operate differently. Each repeater would lose more or less bits while locking on, some could lose as many as 5 or 6 bits. You could create a network with more repeaters if you made sure the total number of lost preamble bits wouldn't exceed the requirements of the receiving", "-30.93997570731881" ], [ "The high latency and packet loss is caused by the nodes that fail to operate due to congestion collapse, which causes them to still be present in the network but without much or any useful communication going through them. As a result, routes can still be considered valid, without them actually providing communication.\nIf enough routes go down because of a cascade failure, a complete section of the network or internet can become unreachable. Although undesired, this can help speed up the recovery from this failure as connections will time out, and other nodes will give up trying to establish connections", "-30.905465948279016" ], [ "will halt when started before the network connection is made, displaying an error message and requiring a keypress), loss of control of the machine due to software problems (machine hang, termination of remote control or networking software, etc.), and virus infection or hard disk corruption. Therefore, the use of a reliable server-class machine with RAID drives, redundant power supplies, etc., will help to maximize availability. Additionally, a device which can switch the machine off and on again, controlled perhaps by a remote signal, can force a reboot which will clear problems due to misbehaving software.\nFor a machine not in constant", "-30.817397756909486" ], [ "usually implemented with timers. If the router detects that a network is unreachable, the timer is started. The router will then wait a preset number of seconds until the network is stable. When the timer expires, the router will then receive its routing updates from other routers. For example, in RIP the default holddown timer is set to 180 seconds.", "-30.78887384900281" ], [ "two switches, or an end system and a switch. The last failure scenario (i.e., end system and switch failure) means that Time-Triggered Ethernet network tolerates an inconsistent communication path between end systems. This failure mode is one of the most difficult to overcome.\nTime-Triggered Ethernet networks are intended to tolerate transient synchronization disturbances, even in the presence of permanent failures. Under both single- and dual-failure hypothesis, Time-Triggered Ethernet provides self-stabilization properties. Self-stabilization means that synchronization can reestablish itself, even after a transient upset in a multitude of devices in the distributed computer network. Time-Triggered Traffic Time-triggered traffic is scheduled periodically, and", "-30.713365578309777" ], [ "would re-flood all the multicast traffic every 3 minutes. This is fine for low volume multicast, but not higher bandwidth multicast packet streams. More recent Cisco IOS versions support a new feature called PIM Dense Mode State Refresh, since 12.1(5)T. This feature uses a PIM state refresh messages to refresh the Prune state on outgoing interfaces. Another benefit is that topology changes are recognized more quickly. By default, the PIM state refresh messages are sent every 60 seconds.\nAdditionally, the routers will use reverse-path forwarding to ensure that there are no loops for packet forwarding among routers that wish to receive", "-30.645925441429426" ], [ "Fast Reroute Fast Reroute is a MPLS (Multiprotocol Label Switching) and IP resiliency technology to provide fast traffic recovery upon link or router failures for mission critical services.\nUpon any single link or node failures, it could be able to recover impacted traffic flows in the level of 50 ms. Industrial implementations can be seen in vendors such as Cisco, Juniper, Brocade, Alcatel-Lucent etc.\nIn the IP domain Loop-Free Alternates (LFAs) and not-via technology have been used to immediately recover data packet upon the failure of a default next-hop. Methods of backup Backup path can be configured for:\n1. Link protection\n2. Node", "-30.599370875497698" ], [ "changes back to bypass-off mode and the appliance resumes receiving traffic....\nWhenever the bypass switch transitions to bypass mode for any reason, the link may be temporarily dropped. A good bypass switch reconnects the link in under 1 second, but the network may take several seconds to re-establish communications on link. Device management Bypass switches may be managed through any of several interfaces: a command-line interface (CLI), a Web browser-based interface, or a platform-based SNMP tool. Management functions may include configuring an IP address for SNMP traps, retrieving RMON statistics, and setting parameters for the heartbeat packet such as packet contents,", "-30.397027844635886" ], [ "the remote machine. This allows the packets to be sent continually, greatly improving channel efficiency. However, this also requires the link between the two systems to be error free, as the modem has already ACKed the packets even before they have been sent. This was normally addressed by using a modem-level error correction protocol, like Microcom Networking Protocols.\nProtocol spoofing was also wide used with another feature of earlier high-speed modems. Before the introduction of echo cancellation in v.32 and later protocols, high-speed modems typically had a very slow \"backchannel\" for sending things like these ACKs back to the sender. On", "-30.37589795938402" ], [ "seconds. The RIPv1 protocol adds a small random time variable to the update time, to avoid routing tables synchronising across a LAN. It was thought, as a result of random initialization, the routing updates would spread out in time, but this was not true in practice. Sally Floyd and Van Jacobson showed in 1994 that, without slight randomization of the update timer, the timers synchronized over time.\nRIPv1 can be configured into silent mode, so that a router requests and processes neighbouring routing tables, and keeps its routing table and hop count for reachable networks up to date, but does not", "-30.305381759819284" ], [ "where digital logic is involved, because devices might change state if power is interrupted even for a moment.\nWith relatively large relays, hot switching may be necessary to ensure good contact closure. The connection may not be reliable without the “wetting” action of the current through the contacts.", "-30.097282762173563" ], [ "retransmitted packets, the round trip estimate will never be updated, and TCP will continue retransmitting every segment, never adjusting to the increased delay.\nA solution to this problem is to incorporate transmission timeouts with a timer backoff strategy. The timer backoff strategy computes an initial timeout. If the timer expires and causes a retransmission, TCP increases the timeout generally by a factor of two. This algorithm has proven to be extremely effective in balancing performance and efficiency in networks with high packet loss. Ideally, Karn's algorithm would not be needed. Networks that have high round-trip time and retransmission timeouts should be", "-29.97336724298202" ], [ "be if the protocol used many separate packets. In modern networking, where most or all of the links are likely to be over the Internet, the latency of this approach makes it unworkable. Even with \"fairly local\" players, the delay between machines is likely to be a few tens of milliseconds, and a round trip would typically be well over a second.", "-29.828411207228783" ], [ "the bit errors that would result from those subcarriers in the faded part of the bandwidth are spread out in the bit-stream rather than being concentrated. Similarly, time interleaving ensures that bits that are originally close together in the bit-stream are transmitted far apart in time, thus mitigating against severe fading as would happen when travelling at high speed.\nHowever, time interleaving is of little benefit in slowly fading channels, such as for stationary reception, and frequency interleaving offers little to no benefit for narrowband channels that suffer from flat-fading (where the whole channel bandwidth fades at the same time).\nThe reason", "-29.742066693106608" ], [ "but also restores the router to all original settings. If the router has remote management enabled, a factory reset will often disable this (the default setting of many routers). Remote management is thought to be one possible vector for the initial attack.\nBefore connecting the factory-reset router to the internet again, the device's default passwords should be changed to prevent reinfection. Epidemiology VPNFilter is described by Cisco Talos as having infected as many as 500,000 devices worldwide, in perhaps 54 different countries, though proportionately the focus has been on Ukraine. FBI investigation The FBI has taken a high-profile role", "-29.645593250723323" ], [ "not presented to the user interface, can rapidly consume gigabytes of transfer especially on a faster 4G connection. Even fixed connections are often subject to usage limits, especially the faster connections (100Mbit/s and up) which can quickly saturate a network if filled by streaming media. \nIt is a known problem with most web browsers, including Firefox, that restoring sessions often plays multiple embedded ads at once. However, this annoyance can easily be averted simply by setting the web browser to clear all cookies and browsing-history information each time the browser software is closed. Another preventive option is to use", "-29.62664440230583" ], [ "network that functions much more slowly than its nominal speed. Duplex mismatch may be inadvertently caused when an administrator configures an interface to a fixed mode (e.g. 100 Mbit/s full duplex) and fails to configure the remote interface, leaving it set to autonegotiate. Then, when the autonegotiation process fails, half duplex is assumed by the autonegotiating side of the link.", "-29.626389558459778" ], [ "period of time before re-accessing the link. However, a user will wait (\"back off\") for a random amount of time proportional to the number of times it has successively tried to access the link. The channel capture effect happens when one user continues to \"win\" the link.\nFor example, user A and user B both try to access a quiet link at the same time. Since they detect a collision, user A waits for a random time between 0 and 1 time units and so does user B. Let's say user A chooses a lower back-off time. User A then begins", "-29.53881194859423" ], [ "Retransmission (data networks) Retransmission, essentially identical with Automatic repeat request (ARQ), is the resending of packets which have been either damaged or lost. Retransmission is one of the basic mechanisms used by protocols operating over a packet switched computer network to provide reliable communication (such as that provided by a reliable byte stream, for example TCP).\nSuch networks are usually 'unreliable', meaning they offer no guarantees that they will not delay, damage, or lose packets, or deliver them out of order. Protocols which provide reliable communication over such networks use a combination of acknowledgments (i.e. an explicit receipt from the destination", "-29.50527881603921" ], [ "to send data on these networks. In Ethernet networks, the algorithm is commonly used to schedule retransmissions after collisions. The retransmission is delayed by an amount of time derived from the slot time (for example, the time it takes to send 512 bits; i.e., 512 bit-times) and the number of attempts to retransmit.\nAfter c collisions, a random number of slot times between 0 and 2ᶜ − 1 is chosen. After the first collision, each sender will wait 0 or 1 slot times. After the second collision, the senders will wait anywhere from 0 to 3 slot times (inclusive).", "-29.46146815102111" ], [ "segment, as appropriate. This obviated the need for an all-or-nothing migration to Fast Ethernet networks. These devices are considered hubs because the traffic between devices connected at the same speed is not switched. Gigabit Ethernet hub Repeater hubs have been defined for Gigabit Ethernet but commercial products have failed to appear due to the industry's transition to switching.", "-29.367631116772827" ], [ "random (when they are turned on and off), AOCE has a 15-minute timeout in which it repeatedly tries to deliver pending messages. If the user is using a dialup connection on a modem, AOCE keeps the line open for a full 15 minutes before giving up on disconnected user, driving up long distance bills to deliver a potentially tiny message.\nMany of these problems were intended to be solved with the PowerShare server, which acts as an always-on, always responsive super-peer. The basic AOCE protocol notices these machines when attempting delivery, and sends to them first, thereby eliminating the delays and", "-29.331297977849317" ], [ "converge in a matter of seconds.\nCertain configuration and hardware conditions will prevent a network from ever converging. For instance, a \"flapping\" interface (an interface that frequently changes its state between \"up\" and \"down\") might cause conflicting information to propagate throughout the network so the routers never agree on its current state. Under certain circumstances it might be desirable to withhold detailed routing information from parts of the network via route aggregation, thereby speeding up convergence of the topological information shared by all routers.", "-29.29979517578613" ], [ "metric.\nEach time a router receives a packet, it modifies the packet, decrementing the time to live (TTL). The router discards any packets received with a zero TTL value. This prevents packets from endlessly bouncing around the network in the event of routing errors. Routers are capable of managing hop counts, but other types of network devices (e.g. Ethernet hubs and bridges) are not. Hop limit Known as time to live (TTL) in IPv4, and hop limit in IPv6, this field specifies a limit on the number of hops a packet is allowed before being discarded. Routers modify IP packets as", "-29.297399887931533" ], [ "access point is used, low or unstable wireless signal quality can also cause reduction or fluctuation of actual speed.\nIn fixed-rate mode, the sync rate is predefined by the operator and the DSL modem chooses a bits-per-bin allocation that yields an approximately equal error rate in each bin. In variable-rate mode, the bits-per-bin are chosen to maximize the sync rate, subject to a tolerable error risk. These choices can either be conservative, where the modem chooses to allocate fewer bits per bin than it possibly could, a choice which makes for a slower connection, or less conservative in which more bits", "-29.239819958922453" ], [ "stylus did not start to move until about 3 ms after the end was released. Evidently, the retraction process travels as a wave, starting at the free end.\nAt high extensions some of the energy stored in the stretched network chain is due to a change in its entropy, but most of the energy is stored in bond distortions (regime II, above) which do not involve an entropy change. If one assumes that all of the stored energy is converted to kinetic energy, the retraction velocity may be calculated directly from the familiar conservation equation E= ½ mv². Numerical simulations,", "-29.200888962688623" ], [ "addition, insufficient bandwidth and congestion, even if not severe enough to cause losses, may cause additional delays regardless of distance. As with the hardware issues, packets that arrive slowly or not at all will make both the client and server unable to update the game state in a timely manner.\nOnline game systems utilizing a wireless network may be subject to significant lag, depending on the architecture of the wireless network and local electromagnetic interference impacting that network. Electromagnetic interference (e.g. from a microwave oven) can cause transmitted packets to be lost, requiring a retransmission which incurs latency. Although radio propagation", "-29.025456863892032" ], [ "a heartbeat message to the hub on a regular basis (typically 5 minutes). When disconnecting, they also can send a special heartbeat end message for the hub to radiate them out of his list.\nThe hub forwards all messages to every device in its list. There is no filtering of messages: a blind redistribution of all messages is carried out. Bridge It is assumed that your network protocol is UDP/IP but this is by no means a requirement. If you wish for your XPL message to cross from one transport medium to another (UDP/IP to RS232 for example) then you will", "-28.953267994802445" ], [ "no packets are dropped so TCP does not slow down. Under these conditions, TCP may even decide that the path of the connection has changed and repeat the search for a new equilibrium.\nHaving a big and constantly full buffer which causes increased transmission delays and reduced interactivity, especially when looking at two or more simultaneous transmissions over the same channel, is called bufferbloat. Available channel bandwidth can also end up being unused, as some fast destinations may not be reached due to buffers being clogged with data awaiting delivery to slow destinations. Description The algorithm is independently computed", "-28.930623580061365" ], [ "lost, and even causing other switches to incorrectly associate the sender's address with a wrong port as well. Multiple frame transmissions In a redundant switched network it is possible for an end device to receive the same frame multiple times. Misinterpretations It is not true that within a switching loop packets will circulate the network until their time to live (TTL) value expires, as no TTL concept exists at Layer 2. In practice, the packet will circulate until it is dropped, e.g. due to resource exhaustion.", "-28.917958455043845" ], [ "Ethernet packets between the computers, whatever the protocols being used, introduce latency too. All modern network switches use the \"store and forward\" technology, in which packets are stored in the switch before they are sent to the next switch. However, the switching times are most often negligible. For example, a 64-byte packet on 100Mbit/s network takes around 5.1 microseconds to be forwarded by each network switch. A complex network with 10 switches on a given path introduces then a latency of 51 microseconds.\nThe latency is however directly related to the network load itself, since the switches will delay a packet", "-28.85603334900952" ], [ "to spend time writing tickets. Whether they slow down because their friend told them to slow down (by using Trapster) or a ticket, the net effect is the same: They've slowed down.\"\nPete Tenereillo sold Trapster to the NAVTEQ division of Nokia in 2010 and is no longer involved with the company.\nIn January, 2011, Trapster's servers were apparently hacked, and the user database of more than 10 million email passwords were possibly revealed.\nOn December 1, 2014, Trapster announced that it is shutting down its services at the end of 2014. When checked on December 21, 2014, it was discovered the Trapster", "-28.794998511613812" ], [ "not change. If the runs are too long, clock recovery is difficult; if they are too short, the high frequencies might be attenuated by the communications channel. By modulating the data, RLL reduces the timing uncertainty in decoding the stored data, which would lead to the possible erroneous insertion or removal of bits when reading the data back. This mechanism ensures that the boundaries between bits can always be accurately found (preventing bit slip), while efficiently using the media to reliably store the maximal amount of data in a given space.\nEarly disk drives used very simple encoding schemes,", "-28.75327515276149" ], [ "overcurrent is nearby then automatically that current is interrupted immediately. But if the cause of the overcurrent is outside the local area then a backup provision automatically disconnects all affected circuits after a suitable time delay.\nNote that disconnection can, unfortunately, have a cascade effect, leading to overcurrent in other circuits that then also must therefore disconnect automatically.\nAlso note that generators that suddenly have lost their load because of such a protection operation will have to shut down automatically immediately, and it may take many hours to restore a proper balance between demand and supply in the system, partly because there", "-28.74540223472286" ], [ "unchanged. dial-on-demand WAN links in IPX networks therefore never become idle and won't disconnect. A spoofing router or modem will intercept the SAP and RIP broadcasts, and re-broadcast the advertisements from its own routing/service table that it only updates when the link is active for other reasons.", "-28.638193553488236" ], [ "basis of the acknowledgments received by it. The acceleration node splits the feedback loop between the sender and the receiver and thus guarantees a shorter round trip time (RTT) per packet. A shorter RTT is beneficial as it ensures a quicker response time to any changes in the network and a faster adaptation by the sender to combat these changes.\nDisadvantages of the method include the fact that the TCP session has to be directed through the accelerator; this means that if routing changes, so that the accelerator is no longer in the path, the connection will be broken. It also", "-28.624706016256823" ], [ "of fast re-route is called Link Protection. In this protection, an LSP tunnel is set up through the network to provide a backup for a vulnerable physical link. The LSP provides a parallel virtual link. When the physical link fails, the upstream node switches traffic to the virtual link so that data continues to flow with a minimal disruption.\nThe capacity of the backup LSP should be sufficient to carry the protected LSPs. Depending on the LSPs, the capacity needs to be configured. For instance, if all the LSPs are to be protected, then the net capacity should equal the bandwidth", "-28.610071364440955" ], [ "modem or router directly to the main phone line socket and check to see whether the internet speed increases or disconnects reduce. If this works, one or more microfilter(s) used with the analog devices need to be replaced.", "-28.533512882568175" ], [ "by congestion. This is true in nearly all cases; errors during transmission are rare. However, this causes WiFi, 3G or other networks with a radio layer to have poor throughput in some cases since wireless networks are susceptible to data loss due to interference. The TCP connections running over a radio based physical layer see the data loss and tend to erroneously believe that congestion is occurring. Short-lived connections The slow-start protocol performs badly for short connections. Older web browsers created many short-lived connections and opened and closed the connection for each file. This kept most connections in the slow", "-28.52772709709825" ], [ "later additions, the modems on either end of the link had to spend an increasing amount of time negotiating a common standard. For instance, a v.32bis modem would first send tones into the line to try to get a 14.4 link; if that failed after a time, it would try 9600, 2400 and finally 1200 bit/s. Since each of these standards defined a minimum period of time to \"try\" for a link, the delay grew over 10 seconds.\nULN avoided this delay by always negotiating the link at 2400 bit/s with no error-correction turned on. Although this eliminated compatibility with older", "-28.527063306275522" ], [ "are planned - e.g. lunchtime breaks – enabling devices to be routinely switched off. Safety-related functions are protected. On restart, the system restarts devices in a switch-on sequence and checks that they all have started up correctly. The production process is then restarted.\nLonger pauses (typically hours or days) – These are similar to the above but additional devices can be put into standby or switched off completely, or deeper ‘sleep’ modes can be initiated.\nUnscheduled pauses (typically breakdowns) – These are also similar, but the user does not know when they will happen or the duration. Initially, devices are put into", "-28.41631318662985" ], [ "routing can be used for networks with probabilistic channel errors, including networks that exploit the wireless broadcast advantage via multi-receiver diversity. Improving delay The backpressure algorithm does not use any pre-specified paths. Paths are learned\ndynamically, and may be different for different packets. Delay can be very large, particularly when the system is lightly\nloaded so that there is not enough pressure to push data towards the destination. As an example, suppose one packet\nenters the network, and nothing else ever enters. This packet may take a loopy walk through the network and never arrive\nat its destination because no", "-28.310375986329746" ], [ "follow similar principles. The use of the term backhaul to describe this type of connectivity may be controversial technically. They invert the business definition, as it is the customer who is providing the connectivity to the open Internet while the vendor is providing authentication and management services. Transition from wireless to wired backhaul Wireless backhaul is easy to deploy, and allows moving points of presence, however, these wireless connections are slower, occupy spectrum that could be used by user devices (especially as 5.8 GHz devices proliferate), require more truck rolls (typically three times as many) as wired backhaul, and", "-28.193780331785092" ], [ "the driving current is interrupted. Most ordinary diodes, even \"slow\" power silicon diodes, are able to turn on very quickly, in contrast to their slow reverse recovery time. These are sufficient for snubbing electromechanical devices such as relays and motors.\nIn high-speed cases, where the switching is faster than 10 nanoseconds, such as in certain switching power regulators, \"fast\", \"ultrafast\", or Schottky diodes may be required. RCD snubbers More sophisticated designs use a diode with an RC network. More sophisticated solid-state snubbers In some DC circuits, a varistor or two inverse-series Zener diodes (collectively called a Transil or Transorb) may be", "-28.162863385281526" ], [ "bypass TAPs/switches still send traffic to the appliance during bypass mode. When the link comes back up again, the bypass switch returns to bypass-off normal.\nSome bypass switches send a heartbeat packet through the monitoring appliance in order to ensure that the appliance is passing traffic. If the heartbeat packet does not return to the bypass switch, the appliance is assumed to be down, and the switch goes into bypass-on mode, excluding the appliance from the traffic path. The bypass switch continues to transmit heartbeat packets to the appliance, and when they are again returned by the appliance, the bypass switch", "-28.159103548328858" ], [ "forwarder the onward connection can be made to the destination while the source connection is still open.\nThis permits data-time rejection (due, for example, to content-scanning) by the target MTA to be notified to the source MTA within the SMTP connection,\nrather than the traditional bounce message necessitated by the more usual store-and-forward operation. Use in Bitcoin Cut-through switching has been applied to make block-relay lower latency in Bitcoin. Low latency is critical for Bitcoin miners to reduce the rate at which their blocks are orphaned.", "-28.15438470132358" ], [ "regarded as unproblematic. Only in the case of a too weakly designed network, it is possible for illuminating installations which are connected to the same network to have undesired luminance fluctuations (flicker effect).\nSome operating conditions require switching in each half-wave and thus very fast operation. Examples are control sections with very fast behavior or a required current limitation with low element resistance in the cold state. In this operating mode, the controller changes the phase angle α of the thyristor ignition timing. A half wave corresponds to 180 ° el. (electrical degree). The actuator can adjust the phase angle of", "-28.124318835674785" ], [ "factors such as security, reliability, verifiability, and other areas of research that are well understood in traditional computer networking. Routing The ability to transport, or route, data from a source to a destination is a fundamental ability all communication networks must have. Delay and disruption-tolerant networks (DTNs), are characterized by their lack of connectivity, resulting in a lack of instantaneous end-to-end paths. In these challenging environments, popular ad hoc routing protocols such as AODV and DSR fail to establish routes. This is due to these protocols trying to first establish a complete route and then, after the route", "-28.10271433228627" ], [ "may decrease to around 1 Mbit/s before it drops out altogether. The reason is that wireless devices dynamically negotiate the top speed at which they can communicate without dropping too many data packets.", "-28.090171914809616" ], [ "to activate stop valves to close. Because the contact with the lever occurs over a relatively limited angle there is a maximum trip response time of 15 mS (i.e. 0.015 sec). More so the issue with these devices has less to do with response time as it does with response latency and variability in the trip point due to systems sticking. Some systems add two trip bolts for redundancy, and ensures response latency be reduced by half. Electrical Electrical overspeed systems on turbines rely on a multitude of probes that sense the passages of the teeth of a spur gear", "-28.084826740203425" ], [ "Stop Procrastinating Features The software allows users to set a time from one minute to 24 hours and then chose one of three options to block the internet for the time period they have selected. One option allows users to block the internet connection completely but reconnect to the internet by restarting the computer before the time is completed, while a second option prevents users getting back online until the time is up, even if they restart. The software offers a third option called a blacklist, where users can list websites they wish to block, thus still having access to", "-28.045295420532057" ], [ "this drive and reissue it to all other drives on the network. Disadvantages to this method are that delays are induced due to the multiple cycles required, and the master’s processing load is increased as it must actively participate in the function, although it contributes nothing. Since no data is destroyed in a Sercos III telegram, data to and from any slave can be accessed by another node on the network without any additional cycle delay or master intervention. Additionally, as telegrams pass each node twice in a cycle (for both topology types), a node can even have", "-28.016594098400674" ], [ "Time Slotted Channel Hopping Description Wireless communications are often referred as unreliable due to the unpredictability of the wireless medium. While wireless communications bring many advantages (e.g no wires maintenance, costs reduction ...), the lack of reliability slows down the adoption of wireless networks technologies.\nTSCH aims at reducing the impact of the wireless medium unpredictability to enable the use of reliable low-power wireless networks. It is very good at saving the nodes' energy because each node shares a schedule, allowing it to know in advance when to turn on or off its radio.\nThe IEEE 802.15.4 standard uses different frequency bands,", "-28.014302970659628" ], [ "exhaust the egress capacity of the links, the switch begins dropping frames, and communication across the switch becomes unreliable or even impossible. MAC database instability Switching loops can cause misleading entries in a switch's media access control (MAC) database and can cause endless unicast frames to be broadcast throughout the network. A loop can make a switch receive the same broadcast frames on two different ports, and alternatingly associate the sending MAC address with the one or the other port. It may then incorrectly direct traffic for that MAC address to the wrong port, effectively causing this traffic to be", "-28.002190242543293" ], [ "even wreak havoc on stateful network devices.\nNmap provides five templates for adjusting speed and also adapts itself. The -T0 option makes it wait for 5 minutes before the next packet is sent, the -T1 option makes it wait for 15 seconds, -T2 inserts 0.4 seconds, -T3 is the default (which leaves timing settings unchanged), -T4 reduces time-outs and retransmissions to speed things up slightly, and -T5 reduces time-outs and retransmissions even more to speed things up significantly. Modern IDS/IPS devices can detect scans that use the -T1 option. The user can also define a new template of settings and use", "-27.937538103287807" ], [ "such as CTRL-ALT-F8 is pressed. A separate login window will now appear and the second user can log in (or even the first user again). Alternatively, in the default install, new X sessions can be started at will by using different display parameters to have them run in different virtual terminals (e.g. \"startx -- :1\" or \"X :1 -query localhost\"). Again, hot key sequences allow the user switching to take place.\nFast user switching may potentially introduce various security-related complications, and is handled differently among operating systems, each having its advantages and disadvantages. One possibility, simple and secure, is that only the first", "-27.925742847153742" ], [ "does not solve the larger problem. Most consumers will never update their router's firmware, particularly if the device seems to be operating properly. The University of Wisconsin–Madison NTP server continues to receive high levels of traffic from Netgear routers, with occasional floods of up to 100,000 packets-per-second. Netgear has donated $375,000 to the University of Wisconsin–Madison's Division of Information Technology for their help in identifying the flaw. SMC and CSIRO Also in 2003, another case forced the NTP servers of the Australian Commonwealth Scientific and Industrial Research Organisation's (CSIRO) National Measurement Laboratory to close to the public. The traffic was", "-27.89221419709793" ], [ "low. This causes huge overloads that trip local breakers delaying full system recovery. The dynamic controller could have these loads \"wait their turn\", as it were, until full power had been restored.\nAnother vital balancing service is ‘fast reserve’ which is the use of standby plant to replace possible lost generation (e.g. due to a failed power generator or lost power line). By shedding load quickly while the running generators spin up, then switching back in to bring the frequency back to standard, dynamic controllers could spare the high cost of fast reserve generators. Also the fast response speed of this", "-27.868574144556987" ], [ "or the fail-inconsistent-omission failure of a switch. The switches in Time-Triggered Ethernet network can be configured to execute a central bus guardian function. The central bus guardian function ensures that even if a set of end systems becomes arbitrarily faulty, it masks the system-wide impact of these faulty end systems by transforming the fail-arbitrary failure mode into an inconsistent-omission failure mode. The arbitrarily faulty failure mode also includes so called \"babbling-idiot\" behavior. Time-Triggered Ethernet switches therefore establish fault-containment boundaries.\nUnder the dual-failure hypothesis, Time-Triggered Ethernet networks are intended to tolerate two fail-inconsistent-omission faulty devices. These devices may be two end systems,", "-27.844166744256654" ], [ "a second switch, with a higher triggering temperature, usually turns off even the cache and forces the computer to reboot). This mitigates the impact of programs resembling power viruses on the processor's longevity, while still accommodating their possible legitimate uses; it can also make overclocking possible with less risk. Manual reset Some thermal switches must be reset manually after they have been tripped. This design is used when an automatic and unattended restart would create a hazardous condition, such as sudden startup of a powerful motor without warning. These types of thermal cutouts are usually reset by pressing a push-button", "-27.824481581221335" ], [ "sent until another transfer can be initiated. This reduces bus occupancy, meaning that nothing is sent for considerable fractions of bus time. A gap every 23 frames is not noticeable, but a gap every three frames can be very costly to throughput.\nAs USB has become faster, devices have also become hungrier for data and so there is now demand for sending large amounts of data - either to be stored on the device, or be relayed over wireless links (see 3GPP Long Term Evolution).\nSince the new devices, although faster than before, are still much lower in power than desktop PCs,", "-27.80579387920443" ], [ "slowly become a relatively common term for this kind of large-scale failure. Example Network failures typically start when a single network node fails. Initially, the traffic that would normally go through the node is stopped. Systems and users get errors about not being able to reach hosts. Usually, the redundant systems of an ISP respond very quickly, choosing another path through a different backbone. The routing path through this alternative route is longer, with more hops and subsequently going through more systems that normally do not process the amount of traffic suddenly offered.\nThis can cause one or more systems along", "-27.788779518086812" ], [ "but the router presents the key to the user as a 40-bit key. This method is 2^19 times faster to brute force than a 40-bit key would be, allowing modern processors to break the encryption rapidly.\nIn 2008, Newsham was awarded a Lifetime Achievement Pwnie award.", "-27.770346937832073" ], [ "no effect on guide number. After the flash has extinguished, longer shutter speeds will only increase the contribution from continuous ambient light, which can lead to ghosting with moving subjects. See also Flash synchronization.", "-27.769708753097802" ], [ "Assuming a sufficiently reliable network, this happens within a few seconds.\nNewer distance-vector routing protocols (BGP, EIGRP, DSDV, Babel) have built-in loop prevention: they use algorithms that assure that routing loops can never happen, not even transiently. Older routing protocols (RIP) do not implement the newest forms of loop prevention and only implement mitigations such as split horizon, route poisoning, holddown timer, Trigger Update and Define maximum hops.", "-27.749554258713033" ], [ "network, includes timeouts. After sending a packet, it expects a reply, so it starts a timer. If the timer expires with no reply received, it takes some action; typically re-sending the original packet. Solution The fix to SAS involved modifying the TFTP specification to break the loop. Only the first instance of a received acknowledgment should cause the next data block to be sent; further copies of the acknowledgment for a particular data block would be ignored, thus breaking the retransmission loop. In the new version of the protocol, a block would only be retransmitted on timeout.\nThis change also makes", "-27.717435578655568" ], [ "used by the Internet's routers to prefer the leaked routes. This was then exacerbated by other problems that prevented the routes from disappearing from other networks' routing tables, even after the original router that had sent them had been disconnected. The combination of these factors resulted in an extended disruption of operations throughout the Internet.\nAnalysis of this event led to major changes in Internet Service Providers' BGP operations intended to mitigate the effects of any subsequent similar events.", "-27.680476047500633" ], [ "they are designed to have an unplanned failure about once per thirty years). Relay-based computers were too slow to implement the algorithm. However, the entire system could be designed so that when computers were reliable enough, they could be retrofitted to existing switching systems.\nIt's not difficult to make composite switches fault-tolerant. When a subswitch fails, the callers simply redial. So, on each new connection, the software tries the next free connection in each subswitch rather than reusing the most recently released one. The new connection is more likely to work because it uses different circuitry.\nTherefore, in", "-27.678900623002846" ], [ "has been established, forward the actual data. However, when instantaneous end-to-end paths are difficult or impossible to establish, routing protocols must take to a \"store and forward\" approach, where data is incrementally moved and stored throughout the network in hopes that it will eventually reach its destination. A common technique used to maximize the probability of a message being successfully transferred is to replicate many copies of the message in the hope that one will succeed in reaching its destination. This is feasible only on networks with large amounts of local storage and internode bandwidth relative to the", "-27.67688721693412" ], [ "a speedrun that was optimal on one playback might not even complete it on a second playback. This loss of synchronization, or \"desync\", occurs when the state of the emulated machine at a particular time index no longer corresponds with that which existed at the same point in the movie's production. Desyncs can also be caused by incomplete savestates, which cause the emulated machine to be restored in a state different from that which existed when it was saved. Desyncs can also occur when a user attempts to match inputs from an input file downloaded from TASVideos and fail to", "-27.66520510817645" ], [ "on a line, effectively making the reach of the ADSL signal infinite. That is, it is possible to reach any subscriber with any ADSL speed if one uses multiple loop extenders.\nA repeater can either be an amplifier or a re-generator. Amplifiers increase the signal level of the analog transmission signal; re-generators demodulate the signal to binary, then re-modulate it into the original transmission frequency. Because regeneration restores the signal to binary, an indefinite number of re-generators can be placed on a line and is the preferred choice for services like T1 (Digital Signal 1) that have no distance", "-27.643050374514132" ], [ "because Offline Files were synchronized at log off and Fast User Switching does not completely log off users. In Windows Vista, this restriction no longer applies as Offline Files runs as a Windows service that performs synchronization for the user at opportune times such as logon and offline to online transitions. Synchronization does not occur continuously in the background, nor does it occur at log off. Transactional NTFS Transactional NTFS (abbreviated TxF) brings the concept of atomic transactions to the NTFS file system, allowing Windows application developers to write file output routines that are guaranteed to either completely succeed or", "-27.636249704519287" ], [ "8 frame interleaving adds 5 ms round-trip-time, while 64 deep interleaving adds 25 ms. Other possible depths are 16 and 32.\n\"Fastpath\" connections have an interleaving depth of 1, that is one packet is sent at a time. This has a low latency, usually around 10 ms (interleaving adds to it, this is not greater than interleaved) but it is extremely prone to errors, as any burst of noise can take out the entire packet and so require it all to be retransmitted. Such a burst on a large interleaved packet only blanks part of the packet, it can be recovered", "-27.613703102775617" ], [ "exceeding 50% of one minor time frame plus the duration of the longest message. Time Triggered Bus Scheduling reduces the effect of message priority due to the fact that the nodes on the network are required to meter their message transmissions.\nLocal oscillator tolerances and lack of time synchronization between the nodes will result in minor time frames drifting away from each other. This does not adversely affect message latencies as long as the duration of the minor time frame in all nodes matches closely. To ensure predictability, all aperiodic messages must be included in the bandwidth management calculations.\nTime Triggered Bus", "-27.589028268797847" ], [ "breaking CRTC policy by not \"indicat[ing] that there are circumstances whereby the Rogers ITMP will also affect download speeds available to subscribers.\"\n Despite the letter from the CRTC, Rogers still had not updated their policy pages as of February 4, 2011, and continued throttling all non-whitelisted internet traffic (no longer just P2P) for up to 15 minutes after P2P had been disabled. Several games had been caught up in this more restrictive throttling as Rogers was incorrectly detecting them as P2P, and had also been slow to fix it despite offers of assistance from customers, and game manufacturers.\nOn", "-27.55972856151493" ], [ "to Timestamp and Deltatime fields in the RTP-MIDI protocol.\nThe session initiator finishes this sequence by sending a last message called CK2, containing the local time when it received the CK1 message. This technique makes it possible to compute the average latency of the network, and also to compensate for a potential delay introduced by a slow starting thread, which can occur with non-realtime operating systems like Linux, Windows or OS X.\nApple recommends repeating this sequence a few times just after opening the session, in order to get better synchronization accuracy, in case one of them has been delayed accidentally because", "-27.543637321419737" ], [ "information from other router's routing tables by changing its hop count to be unreachable (higher than the maximum number of hops allowed) and sending a routing update. In the case of RIP, the maximum hop count is 15, so to perform route poisoning on a route its hop count is changed to 16, deeming it unreachable, and a routing update is sent.\nIf these updates are lost, some nodes in the network would not be informed that a route is invalid, so they could attempt to send packets over the bad route and cause a problem known as a routing loop.", "-27.533960706750804" ], [ "after 5 minutes of inactivity when the device is typically purged from the forwarding table.\nA switch that has no room left in its address cache will flood the frame out to all ports. This is a common problem on networks with many hosts. Less common is the artificial flooding of address tables—this is termed MAC flooding.\nAnother common cause are hosts with ARP timers longer than the address cache timeout on switches—the switch forgets which port connects to the host.\nDevices other than switches may create unicast floods as well. A router which has a bridge interface but", "-27.503117529617157" ], [ "and configuring the link's speed and duplex mode, but it is possible that older PHY devices might have been designed against obsolete versions of the standard, and may therefore use proprietary methods to set speed and duplex.\nThe lack of the RX_ER signal which is not connected on some MACs (such as multiport switches) is dealt with by data replacement on some PHYs to invalidate the CRC. The missing COL signal is derived from AND-ing together the TX_EN and the decoded CRS signal from the CRS_DV line in half duplex mode. This means a slight modification of the definition of CRS:", "-27.499104168760823" ], [ "is out of sync with other devices (e.g., camcorders) and has to be stretched in order to achieve synchronization.", "-27.48396678190329" ], [ "set a limit on connection durations to allow sharing of resources, and will disconnect the user—requiring reconnection and the costs and delays associated with it. Technically inclined users often find a way to disable the auto-disconnect program such that they can remain connected for more days than one.\nA 2008 Pew Research Center study stated that only 10% of US adults still used dial-up Internet access. The study found that the most common reason for retaining dial-up access was high broadband prices. Users cited lack of infrastructure as a reason less often than stating that they would never upgrade to broadband.", "-27.48122268525185" ], [ "it possible to simplify the implementation of the receiving end (often, a bootstrap program written in a low-level language) by omitting the retransmission timer, as any lost packet would cause retransmission of the last packet sent by the sender. However, keeping the timer has its benefits, such as dealing with lost ACKs more efficiently.", "-27.46053532292717" ], [ "that are controlled by them are effective in one way grids where it is often possible to coordinate the signals to the posted speed limit. They are however disadvantageous when the signal timing of an intersection would benefit from being adapted to the dominant flows changing over the time of the day.", "-27.452983365103137" ], [ "is then followed by a fast busy signal instead of the off-hook tone. Variations and enhancements In almost any case, a telephone switch may be programmed to return a slow or fast busy signal instead of an intercept message. Intercept messages also often end with a coded identifier signifying which switch the message is being played by; this can be useful for diagnosing network problems.\nIn some parts of the United States when a line is busy an intercept message plays over a busy signal, then when the message finishes only the busy signal continues. This was done ever since automatic", "-27.44770174752921" ], [ "rails. This capacitance will slow the output transition of the previous gate and hence increase its propagation delay. As a result, rather than a fixed fan-out the designer is faced with a trade off between fan-out and propagation delay (which affects the maximum speed of the overall system). This effect is less marked for TTL systems, which is one reason why TTL maintained a speed advantage over CMOS for many years.\nOften a single signal (as an extreme example, the clock signal) needs to drive far more than 10 things on a chip. Rather than simply wiring the output", "-27.444278068840504" ], [ "common access points, no modification is required to the STAs (or minor modifications to improve synchronization performance) and a very small overhead is added to the wireless channel (typically a message every 1 second). Moreover, it allows an easily synchronization with an external time source, because it is a master/slave protocol. Its major drawback is that it does not compensate the propagation delay. This fact limits the achievable synchronization quality to a couple of microsecond, which is typically enough for the very majority of the applications, especially for home automation. An example is the connection of wireless speakers to a", "-27.417889240925433" ], [ "reordered by the time they are delivered to the output. Although reordering is legal, it is typically undesirable because TCP does not perform well with reordered packets.\nBy adding yet more latency and buffering, the load-balanced switch can maintain packet order within flows using only local information. One such algorithm is FOFF (Fully Ordered Frames First). FOFF has the additional benefits of removing any vulnerability to pathological traffic patterns, and providing a mechanism for implementing priorities. Single chip crossbar plus load-balancing arbiter The Stanford University Tiny Tera project (see Abrizio) introduced a switch architecture that required at least", "-27.411074655079574" ], [ "switch, or more commonly a wireless router/switch, it will interfere with UPnP/DLNA device discovery (SSDP) if incorrectly or incompletely configured (e.g. without an active querier or IGMP proxy), making UPnP appear unreliable.\nTypical scenarios observed include a server or client (e.g. smart TV) appearing after power on, and then disappearing after a few minutes (often 30 by default configuration) due to IGMP group membership expiring.", "-27.404065634676954" ], [ "of master routers A failure to receive a multicast packet from the master router for a period longer than three times the advertisement timer causes the backup routers to assume that the master router is dead. The virtual router then transitions into an unsteady state and an election process is initiated to select the next master router from the backup routers. This is fulfilled through the use of multicast packets.\nBackup router(s) are only supposed to send multicast packets during an election process. One exception to this rule is when a physical router is configured with a higher priority than the", "-27.348765299189836" ], [ "implementations in an attempt to mitigate the effects of route flapping. Without damping, the excessive activity can cause a heavy processing load on routers, which may in turn delay updates on other routes, and so affect overall routing stability. With damping, a route's flapping is exponentially decayed. At the first instance when a route becomes unavailable and quickly reappears, damping does not take effect, so as to maintain the normal fail-over times of BGP. At the second occurrence, BGP shuns that prefix for a certain length of time; subsequent occurrences are timed out exponentially. After the abnormalities have ceased and", "-27.346154617727734" ], [ "updates for some affected products. However, it was shortly found that the updates merely hid the backdoor but did not remove it.\nA backdoor also existed on the DG834 series. Any person who can access the router using a web browser, can enable \"debug\" mode using [IP_ADDR]/setup.cgi?todo=debug and then connect via Telnet directly to the router's embedded Linux system as 'root', which gives unfettered access to the router's operating system via its Busybox functionality. Additionally, a 'hidden' URL [IP_ADDR]/setup.cgi?todo=ping_test also allows unfettered access (on a v5 model a username and password are requested). There is no user option provided to disable", "-27.31861667703197" ], [ "grows in relative terms as the speed of the modem increases; the latency of the phone line is a constant, but the amount of data that could be sent in that time grows as the speed increases. To address this problem, newer protocols use a system known as \"sliding windows\", allowing the sender to begin transmitting the next packet without receiving an ACK message; only if the ACK does not arrive for some time will it resend the packet. MNP handshaking MNP connections were set up after the modems had successfully connected. The originating system (the modem that placed the", "-27.300174993026303" ], [ "precise timing; the clock may have to be re-adjusted for pauses as the user stops typing (for instance).\nUnfortunately this sort of clock decoding does not work unless there are at least some transitions between 1 and 0 in the data; a long stream of 0s or 1s has no transitions in it, making it impossible to know where the data for any particular byte starts. In order to avoid this problem, additional framing bits are added to either end of every byte, typically one bit on either side known as the \"start and stop bits\". This guarantees at least one", "-27.297023386956425" ] ]
24l24j
What are surveyors doing when I see them looking through that tripod?
[ "First year surveyor here. The tripods which surveyors use are just devices for holding instruments level. There's many instruments which surveyors use, but the most common would be the total station. This has a telescope on it which is used to sight a target or point, from which the angle and distance to that point can be calculated. Other instruments include; levels which are used for calculating heights, gps systems for positioning and prisms which are used as targets for total stations. Basically surveyors are using various instruments to find the spatial position of different points on the earth.", "And to answer the \"how do they use that to figure out what to build\". Surveyors measure a project site before, during, and after they build. The first survey is to measure the existing site conditions (topography and locations for existing built stuff). After everything is measured and located, they draw up a site plan. Then architects and engineers use that site plan to design the project (building, road, etc), and they pit their design on \"blueprints\" with dimensions, etc. Once construction begins, a surveyor is back at the site to measure from the design drawings (blueprints) and locate or \"stake out\" the project on the site. Foundation walls go here, columns go here, etc. Then, as construction continues, the surveyor double checks that the work is being built correctly - correct location and height for each floor level, etc. Finally, the after-construction survey is the \"as built\" measuring exactly what's been built, so if things were in a different place than the blueprints, the actual \"as built\" location is now measured, drawn, and documented for posterity.", "They use it to measure the angle. If you look, it's normally looking at either another tripod, or someone holding a stick, there is a sensor that measure to angle of the ground between them.", "Surveyors seem mystical to me. I have a general idea of what they do, but I have not idea how they do it!", "Surveyors use levels to find level, theodolites for relative angle and tape for distance. Laser range finders have been incorporated in the last twenty years to make total stations that combine all three capabilities. There are also laser levels that draw a standard height or line. Sort of common uses are to stake out the positions of the centreline of curve in a road. In that case they calculate the entry into the curve, then through the curve the radius is steady. For laying out a curve in a road the station can be set at the beginning of the curve then regular distances marked off along the curve with regular increases in angular divergence. So the first mark at 100m might be 2.5 degrees, 2nd mark at 200m is at 5 degrees etc. With computers there's no longer any need to setup in a simple way like that. The station can be put more or less anywhere nearby. The location of the station is only constrained by the error in the relative measurements. Elevation, transit angle and distance all have errors involved. There are standard methods of determining positions and levels that seek to correct for, minimize and check for errors. A simple one is to 'tie back in' when running a transit level. So if our survey is measuring heights of roadways near a benchmark we don't just go out with a rod and level to determine the heights through 8 setups, we also have to setup a return route to come back after our survey and tie in our height to the original benchmark to show we haven't gone too far off level during our survey. A level survey is done by setting up the tripod near a hard point that is at a known height. That is called a benchmark. The rod is set on the benchmark. The level can measure the relative height of the eyepiece, let's say the eyepiece is 2'3\" above the benchmark. Then the first shot is taken maybe 45 m away. The level has stayed in its spot and now measures its height at the eyepiece relative to its height above the spot the rod was placed as 8'4\". That's recorded. It indicates that the rodman has the rod resting on an object that is 2'3\"-8'4\" or 6'1\" below the height of the benchmark. The level moves, the rodman stays at their spot and the level sets up to take a shot at the same spot the rodman was at before. Let's say the shot shows 4'2\" as the height the eyepeice is above the spot the rod is set. That shows that the height of the eyepiece is now -6'1\"+4'2\" or 1'11\" below the height of the benchmark. My guess is that surveying will start using image recognition to automatically map topography and locations. It would speed things up a lot.", "I've worked as an engineer in metrology (science of measurements). Leica produces such devices : URL_0 They are very expensive (100k$ and up). Basically they are very precise laser range finders. Sometimes they operate on similar principles than those you can find at home hardware, but some others have more complex inner working such as variable laser phase and what not. Most use corner cubes as target, which are fantastic little devices which reflect light exactly where it comes from without regard from where it comes from. URL_1 ", "Measuring, angle from reference points, and elevation. They set the transit (instrument they look through) perfectly level and look for a measuring stick, being held by a person. These days they would use laser and GPS to do much of that measuring." ]
[ [ "only be found on the topographic map.\nBy noting the corresponding compass vector, walking along the contour one can line up a hand held compass aligning the expected direction, and eye-balling the line of contour's estimated level, move up or down along the bearing faster— to closely locate a desired point (planned point) along the hillside. Pragmatically, this can be 'good enough' for rough project landscaping, such as timber clear cutting the work site of a structure like a bridge abutment or connecting ramps. The approximation can then be refined by transit and other surveyor tools to construct on target.", "-29.581820246564178" ], [ "object is to split the overall route into sections that can be readily undertaken in conditions of poor visibility such as in cloud, fog or at night.\nIn addition to the compass bearing, for each leg the total distance will be measured as well as the height gained or lost and the steepness of the ground. Using this information an estimated time to complete the leg will be calculated usually using Naismith's Rule or one of its variations. These times are then added to estimate the total time needed for the expedition.\nFor each leg note may also be taken of potential", "-26.602977524388734" ], [ "be used to indicate a path across stony or barren terrain, even across glaciers. Such cairns are often placed at junctions or in places where the trail direction is not obvious. They may also be used to indicate an obscured danger such as a sudden drop, or a noteworthy point such as the summit of a mountain. Most trail cairns are small, usually being a foot or less in height. However, they may be built taller so as to protrude through a layer of snow. Hikers passing by often add a stone, as a small bit of maintenance to", "-25.808655620709942" ], [ "the field, resulting a more informed archaeological survey process. Visible above-ground structures and Subsurface Testing Fieldwalking involves picking up scattered artefacts in ploughed fields. In heavily wooded areas such as Scandinavia or the North American Northeast, or deeply alluviated areas as in the Netherlands, fieldwalking is not always a practical method. Humus and fallen leaves in forested areas, silt on alluvial fans, or turf in built-up neighbourhoods may render near-surface artifacts and sites invisible even at short distances. In such instances, archaeological surveyors may concentrate on above-ground structures such as burial cairns, collapsed field walls and rock art panels, look", "-25.267431613232475" ], [ "the finding of the site, archaeologists can come back and visit the site for further digging to find out the extent of the site. Archaeologist can also sample randomly within a given area of land as another form of conducting surveys. Surveys are very useful, according to Jess Beck, “it can tell you where people were living at different points in the past.” Geophysics is a branch of survey becoming more and more popular in archaeology, because it uses different types of instruments to investigate features below the ground surface. It is not as reliable, because although they can see", "-25.102481077874472" ], [ "mountains (rock, rubble, glaciers, etc.). The contour interval is a maximum of 20 metres. The mountaineer should therefore be able to orient himself well using Alpine Club maps, both on the marked trails or in open terrain, i.e. away from the marked routes. In addition, the map sheets are divided in a way suitable for climbers and hikers with overlapping map sheets and a focus on the high mountain regions. Map names and height information (spot heights) are more densely printed than in other comparable maps.", "-24.98887988790375" ], [ "follow a planned search pattern in much the same way that a compass is used, but are better in currents, as they give an absolute position and directions. Current drift search Divers are spaced out across the direction of current flow and search as they are carried over the bottom by the current. They would usually be monitored from the surface using marker buoys so that the effectiveness of coverage can be assessed, and the search is likely to be most effective in good visibility and in areas where the current velocity is reasonably consistent. This is very similar in", "-24.843004310804872" ], [ "(see above) to measure the height of the instrument platform above the surface. By independently knowing the height of the platform with respect to the mean Earth's surface, the topography of the underlying surface can be determined. Field survey The archaeological project then continues (or alternatively, begins) with a field survey. Regional survey is the attempt to systematically locate previously unknown sites in a region. Site survey is the attempt to systematically locate features of interest, such as houses and middens, within a site. Each of these two goals may be accomplished with largely the same methods.\nSurvey was not widely", "-24.615452090480176" ], [ "arbitrary point on a map; that bagging reduces climbing to the status of stamp collecting or train spotting; or that is seen as obsessive and beside the point. For example, in explaining why he chose to remove some minor peaks from his guidebook, climber Steve Roper wrote:\nMost of the peaks had as their first ascenders those who in a former day would have been called explorers but now could only be thought of as peakbaggers, interested primarily in trudging endlessly over heaps of stones, building cairns, and inserting their business cards into specifically designed canisters especially carried for this purpose.", "-24.551677637753528" ], [ "image of the terrain as it would appear looking down at an angle. In these oblique visualizations, elevations are sometimes scaled using \"vertical exaggeration\" in order to make subtle elevation differences more noticeable. Some scientists, however, object to vertical exaggeration as misleading the viewer about the true landscape. Production Mappers may prepare digital elevation models in a number of ways, but they frequently use remote sensing rather than direct survey data.\nOlder methods of generating DEMs often involve interpolating digital contour maps that may have been produced by direct survey of the land surface. This method is still used in mountain", "-24.3288582477403" ], [ "AutoCAD or with the help of plane table survey. Results In Survey camp, students obtain extensive hands-on experience in the use of land surveying instruments and in the essentials of survey practice. Measurements of distances and angles, calculation and correction of errors are introduced. Concepts of higher order surveys and satellite navigation are reviewed and illustrated. Thus students learn surveying practically, this gives them confidence to work (with good precision and accuracy) in Industrial fields in the future.", "-24.249478529231055" ], [ "+ longest cross-spread)/2 The surveyor locates the point on the ground immediately below the branch tip on one end of the measurements and marks that position. He then moves to opposite side of the crown and locates the point under that branch tip. The spread along that line is the horizontal distance between those two positions. On steeply sloping ground (over 15 degrees) the taped distance between the two points can be corrected to a true horizontal by using basic trigonometry. Horizontal distance = cos (inclination) × slope distance. The help of an assistant or the use of a", "-24.20874834449569" ], [ "and botanists for decades. Geocachers from all over the world come to find no fewer than 40 geocaches hidden on the hill and in its immediate vicinity. Paths on the hill range from relatively easy rambles to more strenuous hikes. In the Winter paths can get slippery and muddy so it's best to come prepared with stout boots and a walking stick. Among the most popular walks are the Quarry Walk, the Lake Walk, the Tree Tour and the Public Trail that leads west through Murray's Wood to the Bannock Burn.\nIn addition to these trails, are sheer rock faces popular", "-24.182578889995057" ], [ "progress in moist sand. He continued on as he had seen a cluster of rocky mountains in the distance (Mount Lindsay), which would be useful as a survey trig point. The mountains reminded him of Ayers Rock by the smooth rounded shape of the formation.\nAfter scaling the highest point he noticed water in a creek below, which he later explored from the Land Rover. The vehicle sank into soft sand and it took him until the next day to extricate himself, as the rear wheels only were driving. He decided that the new road would pass", "-24.145871532735782" ], [ "and human habitat. Geographers are historically known for making maps, the subdiscipline of geography known as cartography. They study the physical details of the environment and also its effect on human and wildlife ecologies, weather and climate patterns, economics, and culture. Geographers focus on the spatial relationships between these elements.", "-24.089000845286137" ], [ "on a context sheet and perhaps being drawn on a plan and/or a section. Depending on time constraints and importance contexts may also be photographed, but in this case a grouping of contexts and their associations are the purpose of the photography. Finds from each context are bagged and labeled with their context number and site code for later cross reference work carried out post-excavation. The height above sea level of pertinent points on a context, such as the top and bottom of a wall are taken and added to plans sections and context sheets. Heights are recorded with a", "-24.045288315342987" ], [ "windward side. GPS signal reception When using GPS receivers in street canyons with tall buildings, the shadowing and multipath effects may contribute to poor GPS signal reception.", "-24.010252239488636" ], [ "first measured in 1917 by an officer of the British Army leading a light car patrol into the region. The officer took readings of the height of the terrain with an aneroid barometer on behalf of John Ball, who later would also publish on the region. He discovered that the spring Ain EI Qattara lay about 60 metres (200 ft) below sea level. Because the barometer got lost and the readings were so unexpected, this find had to be verified. During 1924-25, Ball again organised a survey party, this time with the sole purpose to triangulate the elevation on a westerly", "-23.96488737612799" ], [ "Direction Finding, known worldwide by its acronym, ARDF. It is an amateur sport that combines the skills of orienteering and radio direction finding. ARDF is a timed race in which individual competitors use a topographic map and a magnetic compass to navigate through diverse, wooded terrain while searching for hidden radio transmitters. ARDF is the most popular form of transmitter hunting outside North America. Fixed location transmitter hunts Some transmitter hunts feature a \"mail-in\" competition, in which teams in fixed locations work together to locate hidden transmitters, then secretly give the coordinates to the organizers without actually", "-23.942146988644993" ], [ "Rob Kitchin Robert Michael Kitchin, MRIA, is a British geographer and academic. Since 2005, he has been Professor of Human Geography at the National University of Ireland, Maynooth. Education and career Kitchin graduated from Lancaster University in 1991 with a geography BSc. The following year, he completed an MSc in geographical information systems at the University of Leicester and in 1995 was awarded a PhD by the University of Wales, Swansea, for his thesis \"Issues of validity and integrity in cognitive mapping research: investigating configurational knowledge\". From 1995 to 1996, he was a lecturer at Swansea, and was then a", "-23.88231794783769" ], [ "Geophysical survey (archaeology) In archaeology, geophysical survey is ground-based physical sensing techniques used for archaeological imaging or mapping. Remote sensing and marine surveys are also used in archaeology, but are generally considered separate disciplines. Other terms, such as \"geophysical prospection\" and \"archaeological geophysics\" are generally synonymous. Overview Geophysical survey is used to create maps of subsurface archaeological features. Features are the non-portable part of the archaeological record, whether standing structures or traces of human activities left in the soil. Geophysical instruments can detect buried features when their physical properties contrast measurably with their surroundings. In some cases individual artifacts, especially", "-23.813605584924517" ], [ "an archaeologist.\nIn 2008, Garrett moved to the United Kingdom where he completed a PhD in social and cultural geography at Royal Holloway, University of London, with a thesis entitled Tales of Urban Exploration. He was supervised by the human geographer Tim Cresswell. Career Upon completion of his PhD, Garrett took up a two-year postdoctoral research post at School of Geography and the Environment, University of Oxford from 2012-2014, where he was a fellow of Wolfson College, Oxford. He then worked for two years at the University of Southampton before moving to the University of Sydney where he is now based.", "-23.78656613250496" ], [ "is a walking track to the \"summit\" of the head. However, this point lacks a clear vantage point over surrounding scrub, and is simply marked by a trig point.", "-23.779938755146986" ], [ "such as sunlight, water movement, bottom composition (for example, sand ripples run parallel to the direction of the wave front, which tends to run parallel to the shore), bottom contour and noise. Although natural navigation is taught on courses, developing the skills is generally more a matter of experience.\nOrienteering, or compass navigation, is a matter of training, practice and familiarity with the use of underwater compasses, combined with various techniques for reckoning distance underwater, including kick cycles (one complete upward and downward sweep of a kick), time, air consumption and occasionally by actual measurement. Kick cycles depend on the", "-23.73996542786108" ], [ "most conductivity surveys. Note they do experience significant changes with soil moisture content, a difficulty in most site investigations with heterogeneous ground and differing vegetation distributions. Applications Milsom & Eriksen (2011) provide a useful field book for Field Geophysics. Archaeology Geophysical methods can be used to find or map an archaeological site remotely, avoiding unnecessary digging. They can also be used to date artifacts.\nIn surveys of a potential archaeological site, features cut into the ground (such as ditches, pits and postholes) may be detected, even after filled in, by electrical resistivity and magnetic methods. The infill may also be detectable", "-23.613235747129238" ], [ "No Trace ethic. This ethic of outdoor practice advocates for leaving the outdoors undisturbed and in its natural condition.\nCoastal cairns, or \"sea marks\", are also common in the northern latitudes, especially in the island-strewn waters of Scandinavia and eastern Canada. Often indicated on navigation charts, they may be painted white or lit as beacons for greater visibility offshore.\nModern cairns may also be erected for historical or memorial commemoration or simply for decorative or artistic reasons. One example is a series of many cairns marking British soldiers' mass graves at the site of the Battle of Isandlwana, South Africa. Another is", "-23.592461356188096" ], [ "to the trailhead, a concise description of each hike, distance of the trail, approximate length in time of the hike, elevation gain, exposure, level of difficulty, whether dogs are allowed, reference to pertinent USGS maps, and specific interlinking maps. Each book contains a well-organized Table of Contents and a comprehensive Index. Stone's writing style is simple and direct. His descriptions are clear and precise, so as not to confuse the reader. He aims to get hikers on the trail and keep them from getting lost. Recognition Stone is a Los Angeles Times Best Selling Author. Various professional outdoor writers groups", "-23.58811157690343" ], [ "starting point is to follow Pasture Beck up to the head of the valley at Threshthwaite Mouth and then contour round onto Gray Crag. Alfred Wainwright gave this as his preferred route. Most walkers will continue their walk along the ridge south to Thornthwaite Crag which is two kilometres away and return to Hartsop over Caudale Moor and Hartsop Dodd. View The view from the top gives a good aspect of the Helvellyn range, with other views obtained by walking to the edges of the ridge and looking down into the valleys on either side.", "-23.49413411078808" ], [ "be consulted when compasses were used when traveling in those locations.\nMariners are concerned about very accurate measurements; however, casual users need not be concerned with differences between magnetic and true North. Except in areas of extreme magnetic declination variance (20 degrees or more), this is enough to protect from walking in a substantially different direction than expected over short distances, provided the terrain is fairly flat and visibility is not impaired. By carefully recording distances (time or paces) and magnetic bearings traveled, one can plot a course and return to one's starting point using the compass alone.\nCompass navigation in conjunction", "-23.454901944291578" ], [ "announced a Draft Conservation and Management Plan for consultation, including protection from further damage by motorbike scrambling, and integration into coastal walking paths. The purchase has raised hopes that the site will finally receive proper archaeological investigation, which will answer many of the questions that have been the subject of speculation for decades. Description The area consists of a small peninsula of about 40 acres, defended across the neck of the headland by three parallel earth banks running some 350 metres, north-south and fairly straight, with ditches in front of them. With the cliffs around the other sides", "-23.431351267670436" ], [ "Chris Jesty Chris Jesty (born 1942) is a British author and cartographer who revised Alfred Wainwright's Pictorial Guide to the Lakeland Fells to produce the second edition (2005-2009) of the books, which were originally published in 1955-1966. He used GPS to survey all the routes and the work involved 3,000 hand-drawn changes in the first volume alone, reflecting changes such as walls having fallen down or a quarry being opened on the line of a footpath, and adding information such as car parking.\nJesty had earlier lived in Dolgellau, north Wales, and in the 1970s produced and published a panorama of", "-23.409335720859644" ], [ "and most often observed of these refraction phenomena. It is an abnormally large refraction of the object that increases the apparent elevation of the distant objects and sometimes allows an observer to see objects that are located below the horizon under normal conditions. One of the most famous looming observations was made by William Latham in 1798, who wrote:\nI could very plainly see the cliffs on the opposite coast; which, at the nearest part, are between forty and fifty miles distant, and are not to be discerned, from that low situation, by the aid of the best glasses.", "-23.38858386080028" ], [ "used to identify individuals or reverse geocoded to obtain a street address of the individual. This has potential implications to determine locations for patients or study participants from maps published in medical literature as well as potentially sensitive information published in other journalistic sources.\nIn one study a map of Hurricane Katrina mortality locations published in a Baton Rouge, Louisiana, paper was examined. Using GPS locations obtained from houses where fatalities occurred, the authors were able to determine the relative error between the true house locations and the location determined by georeferencing the published map. The authors found that approximately 45%", "-23.386982343254203" ], [ "Starting at Dalsetta the trail passes through open grassland before it climbs to Eliza Saddle. After taking a short break at the picnic table here continue up the steep climb through rugged bushland to the Gibraltar Peak viewpoint.\nAs visitors ascend the boulders of the viewpoint they are able to take in 360 degree views of Tidbinbilla Nature Reserve, Canberra and Black Mountain Tower.", "-23.375924512665733" ], [ "to measure the land-surface elevation beneath the vegetation canopy, to better resolve spatial derivatives of elevation, and to detect elevation changes between repeat surveys have enabled many novel studies of the physical and chemical processes that shape landscapes.\nIn 2005 the Tour Ronde in the Mont Blanc massif became the first high alpine mountain on which lidar was employed to monitor the increasing occurrence of severe rock-fall over large rock faces allegedly caused by climate change and degradation of permafrost at high altitude.\nLidar is also used in structural geology and geophysics as a combination between airborne lidar and GPS for the", "-23.35316254863119" ], [ "measure the beach profile. (more information can be found at http://frf.usace.army.mil/vehicles2.stm) Emory beach profile measurement In order to determine what the profile of a beach looks like, one method for determination is the Emory Beach Profiling Method. Initiating a benchmark, the researcher establishes a control point to start the surveys at. Typically this is far enough away from the swash zone that large changes in elevation will not occur during the sampling time. Once the initial benchmark is established, the researcher will take the Emory sampling device and measure the change in elevation over the distance the device is covering.", "-23.320418739942397" ], [ "searches In 2010, a team informally dubbed the Andrew Irvine Search Committee led by American Everest historian Tom Holzel conducted a new photographic search for Irvine using a computer-assembled montage of aerial photographs taken in 1984 by Brad Washburn and the National Geographic Society. This search led to the identification of a possible object at about 8,425 metres, less than 100 m from the ice-axe location, consistent with a body lying in a slot of rock, feet pointing toward the summit, just as Xu described his sighting.\nA new expedition organised by Tom Holzel was due to explore the upper slopes", "-23.23479362996568" ], [ "be visible in the distance is withdrawn from the view of the traveller. A plain often appears to be covered with a row of médanos, and some days afterwards it is again restored to its level and uniform aspect. Persons who have the greatest experience of the coast are apt to mistake their way, when they encounter these sandhills.\"", "-23.20560165447091" ], [ "reference systems, commonly referred to mean sea level. The traditional spirit level produces these practically most useful heights above sea level directly; the more economical use of GPS instruments for height determination requires precise knowledge of the figure of the geoid, as GPS only gives heights above the GRS80 reference ellipsoid. As geoid knowledge accumulates, one may expect the use of GPS heighting to spread.\nThe theodolite is used to measure horizontal and vertical angles to target points. These angles are referred to the local vertical. The tacheometer additionally determines, electronically or electro-optically, the distance to target, and is highly automated", "-23.2017128386924" ], [ "estimate travel distances from surveys (Rogerson 1990) or to locate traffic counters, travel survey stations, or traffic monitoring systems (Kirby 1997). From the same perspective, Theobald (2001; retrieved from BESR 2002) argued that measures of urban sprawl should consider interdependences and interactions with nearby rural areas.\nIn spatial analysis, the boundary problem has been discussed along with the modifiable areal unit problem (MAUP) inasmuch as MAUP is associated with the arbitrary geographic unit and the unit is defined by the boundary (Rogerson 2006). For administrative purposes, data for policy indicators are usually aggregated within larger units (or enumeration units) such as", "-23.177957948056246" ], [ "a great variety of bouldering routes to choose from, ranging from easy to hard, based on the Yosemite Decimal System for rock climbing, and the Hueco scale for bouldering. Beginners and advanced climbers will find something for them from among more than 150 routes. Boulders Boulder 1 area- featuring famous bouldering climbs such as \"leaping lizards\", \"Yabo's Mantle\" and \"three pigs\"\nPile Ups- offers a traverse up the arete of the boulder.\nTurlock - highball bouldering with an anchor on top for the top ropers. Features famous climbs such as the \"Crowd Pleaser\" and \"Crystal Ball\"\nB1 Boulder - High difficulty climbs such", "-23.158152211661218" ], [ "member of the RGS-IBG. Young Geographer People aged between 14 and 24 currently studying, a recent graduate of geography or a related subject. Postgraduate Fellow of the Society This status is available by application to postgraduate students who are pursuing Geography or an allied subject at a UK university and are recommended by their relevant university head of department or main research supervisor. Fellowship Fellows of the Society must either be proposed and seconded by an existing fellow or an individual may submit evidence of his or her own work and academic publications in the field of geography and closely", "-23.139738701689566" ], [ "a board.” \nBourne’s ‘old salt’ is talking about a traverse board, a wooden board with a compass rose drawn on it linked by pegs and cords to a series of peg holes beneath it. It allowed a helmsman to keep a rough check of the time sailed on each rhumb of the wind. Description The traverse board is a wooden board with peg-holes and attached pegs. It is divided into two parts, upper and lower.\nThe top part is for recording direction sailed. It has a representation of the compass rose with its 32 compass points, just as", "-23.134533918644593" ], [ "Observation Hill (McMurdo Station) Observation Hill is a steep 754-foot (230 m) hill adjacent to McMurdo Station in Antarctica and commonly called \"Ob Hill.\" It is frequently climbed to get good viewing points across the continent. Regular clear skies give excellent visibility.\nObservation Hill is a lava dome and one of many volcanoes comprising the Hut Point Peninsula. Memorial Cross After their deaths in early 1912, the last members of Robert Falcon Scott's party were found by a search party led by the surgeon Edward L. Atkinson. The relief party took their photographic film, scientific specimens, and other materials. They had to", "-23.129511025228794" ], [ "carried out in a sensitive manner. Douglas Path Douglas Path is a path that connects a series of military installations at the top of the Rock of Gibraltar. It leads from the top of Charles V Wall to Mount Misery, one of the peaks of the Rock, before proceeding southwards to end at Douglas Cave. The first section of the path climbs a steep set of steps before running along a knife-edge ridge. It has views over both sides of the Rock of Gibraltar. The sheer east face of the Rock and the Great Gibraltar Sand Dune, which covers a", "-23.076838037806297" ], [ "sea. He also walked across the Empty Quarter desert with Leon McCarron and undertook an expedition in Greenland.\nIn 2013, Humphreys released his first documentary film, Into the Empty Quarter, documenting his walk through the Empty Quarter desert with Leon McCarron The film premiered at the Royal Geographical Society, London, in November 2013.", "-23.050184549541882" ], [ "at Beacon Howes or Ravenscar. A summary description of the classic route with photographs is described by Richard Gilbert in his book, The Big Walks and a guidebook is available. A detailed illustrated description of the western half of the walk is given in Alfred Wainwright's A Coast to Coast Walk.\nMost crossings are done west to east. The original challenge, crossing towards the sea in an easterly direction is thought to be easier because the prevailing wind comes from the west making it easier to walk with the wind on one's back and with the heather lying away from", "-23.04315961419161" ], [ "as to determine the air quality or noise health effects on people at different elevations, for example, living on different floor levels of an urban apartment. In actuality, both plan and profile view contour maps are used in air pollution and noise pollution studies. Labeling contour maps Labels are a critical component of elevation maps. A properly labeled contour map helps the reader to quickly interpret the shape of the terrain. If numbers are placed close to each other, it means that the terrain is steep. Labels should be placed along a slightly curved line \"pointing\" to the summit", "-23.019859115827785" ], [ "over the Earth and cut open the soil behind her forming the path of the Kalgan river. Luke Pen Walk The Luke Pen Walk is a track that follows the Kalgan River; it was constructed in 1997. The walk is described as easy with the terrain being generally flat and even. With a total length of 9 kilometres (6 mi) it can take about 4 hours to complete the round trip. \nThe Luke Pen Walk was named after Dr Luke Pen, a local scientist, who made significant contributions to the local community with his preservation work. The walk was named in", "-22.994120031933562" ], [ "the \"postman's path\" along the coast from Achiltibuie to Strathcanaird. The maps and signposts imply that the relevant stretch is about six miles long, but the warnings under the signposts do not do justice to its dangers. Even a fit walker may struggle to complete this leg in less than four hours, and most walkers should allow considerably more time, depending on fitness and the weather. There is no path along much of this route, there is only an incomplete and inadequate series of cairns and arrowed posts. It is hard to avoid straying from the route. Scrambling is required", "-22.99265477013614" ], [ "surveys, but it still forms a valuable set of information for large-scale analysis.\nThe original American topographic surveys (or the British \"Ordnance\" surveys) involved not only recording of relief, but identification of landmark features and vegetative land cover. Remote sensing Remote sensing is a general term for geodata collection at a distance from the subject area. Passive sensor methodologies Besides their role in photogrammetry, aerial and satellite imagery can be used to identify and delineate terrain features and more general land-cover features. Certainly they have become more and more a part of geovisualization, whether maps or GIS systems. False-color and non-visible", "-22.981082496219642" ], [ "on the spoor in the trails\" means to investigate what is actually going on in a sensitive situation.", "-22.959769045435678" ], [ "to the increasing altitude. The camps consisted of temporary huts, or rock shelters, one of which was in a lava tube. In areas where the trail was hard to discern, rock cairns marked the way, placed to be visible along the skyline as travelers moved upwards.\nIn 1794, Archibald Menzies, a naturalist on the Vancouver Expedition, used the trail and about 100 Hawaiian porters to reach the summit and measure its elevation with a barometer.\nLieutenant Charles Wilkes of the 1840 United States Exploring Expedition first attempted to use a shorter route, but resorted to the Ainapo trail after making much", "-22.951853783307342" ], [ "have been found during a field walk, but there are strong indications from geophysical survey and local stories that there is a building underneath a field. In such a case, the only way to decide if an excavation is worth the cost is to carefully analyze the evidence to determine which part to trust. On the one hand, the geophysics might just show an old and forgotten water-pipe, but it might also show the wall of just the building the archaeologists were looking for.\nThe analysis therefore includes careful examination of all the evidence collected. A method often used to determine", "-22.93353464563552" ], [ "Path, a small approach path above the precipice to facilitate access. A visitor described the perilous journey to get there a few years after it was discovered:\nThe path which we are obliged to traverse in order to get to it, is one of considerable difficulty and danger. We left our horses in charge of a servant half a mile from the cave, and proceeded along a narrow ledge, formed by art and with much labor, about three feet wide, until we reached the desired spot ... The south end and all the eastern side of Gibraltar is – or rather", "-22.927996681794866" ], [ "Sense of direction Santa Barbara Sense-of-Direction Scale Sense of direction can be measured with the Santa Barbara Sense-of-Direction Scale, a self-assessed psychometric test designed in 2002. This scale has been used to study sense of direction in many contexts, such as driving.", "-22.921456334504455" ], [ "well-marked) OR turn left and proceed around the mountain, past one of the easily spotted plane wrecks. As the path curves to the right, you will eventually encounter a 5-foot-high (1.5 m) cairn in the middle of the path marking the south end of the Twilight Park Trail. A combination of smaller cairns, surveyor's tape flags and old blue paint blazes have been used by various stealth maintainers over the years to keep this wet and sometimes hard-to-spot route marked. While not seriously steep, it is almost constantly ascending, responsible for the last 450 vertical feet up the mountain", "-22.908804182939207" ], [ "While this leads to good view, the best are the ones that require a bit of trekking. Again here, local people would be the best guides. If not, then head towards the nearest peak, park the vehicle by the road and climb up indiscriminately. It should not take long to find a sheep trail among the shrubs from where a 20-minute walk leads up to the crest of the hill. During winter, the two-foot green grass dries up and shines golden against the setting sun. The flat surface is perfect to spread a mat and establish a picnic there. The", "-22.897719898033756" ], [ "landscapes. Geomorphologists may rely on geochronology, using dating methods to measure the rate of changes to the surface. Terrain measurement techniques are vital to quantitatively describe the form of the Earth's surface, and include differential GPS, remotely sensed digital terrain models and laser scanning, to quantify, study, and to generate illustrations and maps.\nPractical applications of geomorphology include hazard assessment (such as landslide prediction and mitigation), river control and stream restoration, and coastal protection. Planetary geomorphology studies landforms on other terrestrial planets such as Mars. Indications of effects of wind, fluvial, glacial, mass wasting, meteor impact, tectonics", "-22.897076892064433" ], [ "with kilometre posts marking both the distance to the next campsite or section as well as the total length of the walk to go. There is a published leaflet that details the requirements and attractions of completing each of the twelve sections and notice boards at the transition of each section. These notice boards also show elevation graphs of the walk and alert walkers to potential dangers.\nThere is a reasonable amount of water along the track, both naturally found and trucked in. There are only one or two places in which water cannot be obtained throughout the day,", "-22.8906715768735" ], [ "the south-east, and carpeted with dry turf. There is an Ordnance Survey trig point (number S. 5619) at the highest point, near the western corner. Just to the north is a well-built windshelter (cross-shaped to provide shelter whichever way the wind is blowing) with a view indicator or toposcope built into its centre. Between them is a large cairn. At the point where the Ingleton path reaches the summit rim is an even larger cairn; this, remarkably, is the remains of a battlemented round tower (a hospice), built in 1830. The celebrations on the day of its opening ceremony became", "-22.88386848083428" ], [ "the hedge. From the gap in the hedge you should be able to see the first and last waymarker posts. The first is to your left as you look up the hill (near the adventure playground). As you walk up the hill towards this marker you will see the next post directing you through another gap in the hedge, behind the tower slide, taking you into the meadow. From here you will be able to follow the red waymarker posts which will guide you through the two meadows taking in all of the best spots for wild flowers. Woodland Walk", "-22.87574951930037" ], [ "movement which saw him crossing the Empty Quarter (Rub’ Al Khali). This walk was in support of Dubai's Senses Centre, which treats children with disabilities. This tough walk spanned over 20 days averaging up to 60km per day, enduring the vast expanse of sand between Oman and the UAE. His journey began from the Senses Centre in Jumeirah on December 26 at 8:30 am. From Dubai to Abu Dhabi along Sheikh Zayed Road, before heading down the long Hameem road to Liwa, trekking through the harsh terrain of the Empty Quarter to the Aradah Fort Umm Hism in the Empty Quarter.", "-22.87275410501752" ], [ "joined McArthur and the two began to survey using a double chain of triangles, a more efficient approach.\nIn 1892 they worked west to Field, British Columbia, having surveyed 2,000 square miles (5,200 km²).\nMcArthur and Drewry were able to draw topographical maps from the photographs showing mountain elevations, although they could not add contour lines.\nWhile surveying the CPR route McArthur was the first European to climb Mount Stephen (9 September 1887 with T. Riley), Mount Field and Mount Andromache (1887 with T. Riley), Mount Odaray (1887), Mount Rundle (1888), Mount Aylmer (1889), Mount Bourgeau (1890), Mount King (1892), Mount Owen (1892) and", "-22.854749959020637" ], [ "on top of the ascent engine cover and put his head outside. Looking around, Scott was familiar with the territory having spent months studying maps of the area. He could easily recognize Mons Hadley, Mons Hadley Delta, the Swan Range, the Silver Spur, Bennett Hill, Hill 305, and the North Complex.\nScott's first task was to take a 22-picture stereo panorama of the area using a 60 mm lens. Then he photographed targets of interest with the telephoto lens, and then a color panorama of the area with the 60 mm lens.\nHe was able to put to bed any further concerns about", "-22.835259482804986" ], [ "experience. For instance, Interferometric synthetic-aperture radar and aerial photo interpretation is the tool used in history for detecting surface deformation and updating landslide inventory respectively. GIS is also used to overlay layers of terrain (elevation and slope angle), lithology with rainfall data to generate landslide hazard maps. With the different weightings in respective parameters, the hazard could be zoned to get the risk controlled. Urban environmental applications Remote sensing has much potential in environmental applications. To name a few, the land use planning (for instance nuclear power plant location & dumping sites), monitoring of soil erosion and atmospheric pollution, vegetation", "-22.835184636945087" ], [ "slope instability. The rock and debris fall downward and outward from slope rapidly. Apart from site characterization through geological mapping, many of the remote sensing tools mentioned could be employed. For example, the use of aerial photos to update landslide inventory is popular in Hong Kong landslide studies. The LiDAR technique to create a High Resolution Digital Elevation Model (HRDEM) and Digital Terrain Model (DTM) with vegetation cover is crucial to the quantification of slope, slope aspect, stream power, drainage density and many more parameters for landslide hazard models. Microwave radar can also take part in landslide recognition in synthetic", "-22.812864449425433" ], [ "the current will set the divers off their planned paths. Ladder search This pattern is a version of the grid search where the length of the leg is relatively short. It is more limited, but works well in narrow passages, like a river or canal. The search pattern is swimming back and forth on reciprocal headings with an equal offset in the same direction at the end of each leg. Direction of the legs is usually determined by some geographical feature, and the bezel of the compass can be set to those directions. If the direction of the channel changes", "-22.812058369973784" ], [ "Andrew Goudie (geographer) Emeritus Professor Andrew Shaw Goudie (born 21 August 1945 in Cheltenham) is a geographer at the University of Oxford specialising in desert geomorphology, dust storms, weathering, and climatic change in the tropics. He is also known for his teaching and best-selling textbooks on human impacts on the environment. He is the author, co-author, editor, or co-editor of forty-one books (many of which have appeared in numerous editions) and more than two hundred papers published in learned journals. He combines research and some teaching with administrative roles. Career Andrew Goudie was at the School of Geography and the", "-22.790376344875767" ], [ "Survey's Principal Triangulation. The surveyors, which included Thomas Drummond, camped on the summit and built a wall to shield themselves from the weather. Drummond's team shone a limelight from Slieve Snaght towards Thomas Colby's team on Divis 67 miles (108 km) away, the first time a limelight was used for surveying.", "-22.788240036205025" ], [ "places the player on a series of five algorithmically determined semi-random locations around the world. The locations are limited to roads and other paths that have been photographed by Google Street View cameras for paying members, which excludes the majority of Asia and Africa, most of the Amazon basin in South America, most of Central, and Outback Australia and most of the far north in Canada and Russia.\nThe Street View window of GeoGuessr does not provide any information beyond the street view images and a compass; things such as road signs, vegetation, businesses, climate, and landmarks have been suggested as", "-22.783969753907513" ], [ "Tufts Pass Tufts Pass (69°25′S 70°35′W) is a pass extending in an east-west direction between the Rouen Mountains and the Elgar Uplands in the north part of Alexander Island, Antarctica. The mountain pass was probably first sighted from the air and roughly mapped by the British Graham Land Expedition in 1937. Remapped from air photos taken by the Ronne Antarctic Research Expedition in 1947–48, by Searle of the Falkland Islands Dependencies Survey in 1960. Named by the RARE for Tufts University, Medford, Massachusetts, United States, where Dr. Robert Nichols was head of the geology department before joining the RARE.", "-22.770718540699818" ], [ "Spot height A spot height is an exact point on a map with an elevation recorded beside it that represents its height above a given datum. In the UK this is the Ordnance Datum. Unlike a bench-mark, which is marked by a disc or plate, there is no official indication of a spot height on the ground although, in open country, spot heights may sometimes be marked by cairns. In geoscience, it can be used for showing elevations on a map, alongside contours, bench marks, etc.", "-22.76341029670948" ], [ "and the return to the trailhead. Each checkpoint includes a marked color photo of the terrain ahead, azimuth, latitude, longitude, UTM, northing, and easting. Visitors are well advised to closely study the guide sheet before starting their hike.\nWhile not required, the Bureau of Land Management provides a list of authorized guides for those hikers who may be uncomfortable in a wilderness situation.", "-22.75748645622278" ], [ "really focus on touring, that’s where the compass pointed.” - Templeton Thompson", "-22.72732138358151" ], [ "Alan MacEachren Alan M. MacEachren (born 1952) is an American geographer, Professor of Geography and Director, GeoVISTA Center, Department of Geography, The Pennsylvania State University. He is known for his cross-disciplinary work in the fields of human-centered geographic visualization, scientific and information visualization, and in statistics. Biography Alan MacEachren received a B.A. in geography in 1974 at the Ohio University, an M.A. in geography in 1976 from the University of Kansas and a Ph.D. in geography 1979 from University of Kansas.\nFrom 1979 to 1983, he was Assistant Professor of Geography at the Virginia Polytechnic Institute and State University and Director", "-22.70996998675946" ], [ "particularly useful if the visibility is sufficient to see the next landmark on the route before leaving the last. Landmarks are ordinarily considered permanent or semi-permanent features, such as ridges, boulders, wrecks or clumps of weed, but use can also be made of temporary marks such as anchor cables, shot lines, jackstays and guide lines. Depth and depth variation The slope of the bottom is often a reliable indicator of the direction toward the shore, particularly when the bottom is of soft or loose material, and is not broken up greatly by rocky outcrops. This information can be checked for", "-22.655201450407503" ], [ "recent work of Alfred Wainwright. The hand drawn sketches of views and rough maps of walks together with the descriptive nature of the walks are like those of the Wainwright guides to the Lake District (see Lakeland Guides).", "-22.6501712589652" ], [ "turn of the century and confirmed by later official surveys. The issue of reliability of GPS elevation readings possibly plays a role in the recent deviating measurements. Elevation error in GPS use is, as a rule, considerably worse than the horizontal position error. In the end, regardless of climate change and pending further official investigation, Cima Tosa might still be considered Brenta's highest and a genuine European ultra prominent peak. Climbing history The first men to undertake the ascent were Giuseppe Loss, a botanist and alpinism pioneer from Primiero, together with six companions. On July 18, 1865 they departed from", "-22.63987215876068" ], [ "rover is exploring; and \"Murray Buttes\", an entryway the Curiosity rover will traverse on its way to Mount Sharp.", "-22.637895616823698" ], [ "of \"Beach Hill\" athletes continue straight off of the road and on to the trails along the shoreline until the Harris Creek campgrounds. After this, follow the paved road as it turns right past the launch ramp for a short climb up the hill. At mile 3 turn left onto the back country trails. The trail follows the creek to Long Valley with two steep hills to climb out the other side at 5.7 miles (9.2 km). Triathletes proceed back into the park alongside the road on trails and fire roads through Redondo Vista Campgrounds, the TNT camp site area, and", "-22.634221343411355" ], [ "trend was launched by Ian Hodder in 1976 is a archaeological trend as for example etnoarchaeology, cognitive archaeology and other archaeological approaches. Spatial Archaeology it was defined by David L. Clarke in 1977, he pointed out three analysis levels: macro, micro y semimicro (Clarke 1977: 11-15) . Spatial Archaeology is also called landscape archaeology. This trend analyzes interaction between nature and culture.\nHuman geography uses locational analysis to define models for the understanding of territorial organization. The archaeologists Higgs and Vita-Finzi began to apply Site Catchment Analysis (SCA) in 1970. They proposed a new approach to know how lived people settled", "-22.616345341892156" ], [ "eastward, care must be taken to keep clear of Sannak Reefs and Anderson and Lenard rocks. If very clear, the mountains of Unimak Island may be made out and the course for Unimak Pass shaped accordingly; but under ordinary conditions the hills back of Cape Khituk, or Ugamok Island, will be the first land sighted. If the weather is thick, soundings on Davidson Bank will be of use in feeling the way in to the land. In the vicinity of Cape Khituk the coast is bold and free from outlying dangers. \nA reef of rocks was formerly shown on the", "-22.5946247852564" ], [ "most elevation with the shortest possible path. Map reading The line of greatest slope has practical significance in map reading. On the terrain it is often far more discernible, even intuitively obvious, rather than accurately picking out the consistent height level on what is likely the undulating uneven ground along the ground represented on the contour line. But knowing that a greatest slope vector is orthogonal to the contour line, one can readily deduce the direction of the contour lines from the line of greatest slope. The extent and overall direction of the contour line to a map scale can", "-22.59120719873067" ], [ "lookouts where good views south and west can be seen, the summit offering views northeast to southeast. Lyrebirds are often seen as well as pigeons and occasional wild turkeys.\nA former bridle track, the now somewhat overgrown after a while track that starts on the west side of the Cordeaux Road carpark at the Kembla Lookout is known as the Bridle Track on most maps. It goes along the escarpment, just below the edge, and can be quite slippery in moist conditions, several stages requiring jumping from rock to rock, however for the most part it is accessible if careful. The", "-22.569916348148354" ], [ "(as can be seen written on the sign in the photo), a measurement that has been confirmed by several groups of hikers using personal GPS consoles (the most recent verified one in January 2005). Despite this, SRTM data indicates that the professional survey is probably more accurate. It is only a few meters taller than La Pelona, its twin which stands at 3,084, and from which it is separated by a col between summits that is approximately 1.5 km wide, and is officially named Valle del Baíto, but unofficially called Valle de Lilís. The col's mean elevation is 2,950 meters. Ecology", "-22.568298814743684" ], [ "plover, sighted here in 2013 were reported for the first time in Kerala. Long, broad shore and rocky formations on the either side of the beach provide a safe place for migration.", "-22.561311712139286" ], [ "Stepping Stones (islands) The Stepping Stones are three prominent rocks lying 0.8 km (0.5 mi) north of Limitrophe Island, off the southwest coast of Anvers Island, Antarctica. The Stepping Stones are located at 64°47′S 64°00′W. The Stepping Stones form one of a series of small boat refuges for parties working between nearby Palmer Station and Biscoe Bay, and therefore form \"stepping stones\" for coastal trips. Named by Palmer Station personnel in 1972.", "-22.55780080308159" ], [ "\"Survey\" is a formal survey by Robert Schultz A.S.C.E and Phillip Costaggini's 1981 Oregon State thesis \"Survey of Artifacts at Neahkahnie Mountain Oregon (1976-1981\" of the coastal area two to four miles north of Nehalem Bay encompassing the area up to one mile over the countryside of Neahkahnie Mountain. The incised rocks and carins are explained as recordings of a land survey and latitude showing angles and bearings in \"The Treasure Rocks of Neah-kah-nie Mountain (2012), the \"W\" rock which has components that \"represent a combination of sun and star sighting points to determine the longitude, date and time and", "-22.492094315689428" ], [ "engineer named Juries was employed to conduct the initial survey, due to his experience in mountainous country. Fred Parkes, the Main Roads engineer and Tom Peters who represented the Nerang Shire, were grateful for his expertise. The terrain was so rough and steep that it was necessary to dig toeholds into the sheer hillsides, to enable the men to safely carry the delicate survey instruments to the next position.\nTenders were called for each 1.5 miles (2.4 km) of surveyed section and C.J. Hicks, a road contractor from northern New South Wales, tendered successfully for the construction of the new road. He", "-22.478410963361966" ], [ "memoir of the experience; his book, Walking With Spring (ISBN 0-917953-84-3), reflects the experience of most AT hikers, that the project of making the whole trip in the northward direction (the most common choice), is furthered by a start timed to the weather in the Georgia mountains, and by continually taking advantage of the northward progress of milder weather.\nIn 1965 Shaffer hiked in 99 days from Maine to Springer Mountain, which had recently replaced Oglethorpe as the Trail's Georgia end, becoming the first person to claim a complete trip in each direction. \nIn 1982, the Appalachian Trail Conference published Shaffer's", "-22.47611854324441" ], [ "corner of the park. The boulder field can be reached by car on Boulder Field Road or by hiking the 3.5-mile (5.6 km) long Boulder Field Trail from the trailhead on SR 534. The field comprises about 720,000 square feet (67,000 m²) (16.5 acres (6.7 ha) or 0.026 square miles (0.067 km²)) in area (1,800 feet (550 m) east-west by 400 feet (120 m) north-south). The top of the boulder layer is virtually level with the approaching path. This boulder field, known as the Hickory Run boulder field, is the largest of its kind in the Appalachian region. It consists of a very gently sloping expanse", "-22.450156185403102" ], [ "of the Association of American Geographers, with an annual field trip by The Geological Society of America, and the University of Utah Department of Geography established a scholarship in his name.", "-22.44975335367235" ], [ "from south to north (bottom to top on a map), contrary to normal reading order, the map and commentary start at the bottom of the last page and work upwards and backwards towards the front of the book. The guide was prepared with the aid of four helpers (Harry Appleyard, Len Chadwick, Cyril Moore and Lawrence Smith) and its preparation was affected by the major outbreaks of foot and mouth disease in 1966 and 1967, which closed access to many of the moors.\nIn 1972 Wainwright devised the east-west Coast to Coast Walk, as an alternative to the north-south Pennine Way.", "-22.447523705326603" ], [ "Peter), the noted urban geographer, was one of his contemporaries. Haggett graduated in 1954, obtaining a \"Double First\" (First-Class Honours in parts I and II of the Tripos).\nIn an academic career spanning half a century, Professor Haggett is noted for his significant research contributions to the field of human geography, and is the author or editor of over 30 books on geographical practice, theory and individual research topics. He has held numerous teaching posts and visiting professorships at institutions around the world, but is most particularly associated with the University of Bristol where he has been a lecturer and professor", "-22.431347226282014" ], [ "2016, the John Muir Trust cleared a number of smaller informal cairns which had recently been erected by visitors, many near the top of gullies, which were seen as dangerous as they could confuse walkers using them for navigation. As of 2019, a series of solidly-constructed cairns, each several feet high, marks the upper reaches of the Pony Track and the path across the summit plateau. Climbing on Ben Nevis The north face of Ben Nevis is riven with buttresses, ridges, towers and pinnacles, and contains many classic scrambles and rock climbs. It is of major importance for British winter", "-22.409096952090295" ], [ "panel of the Ryan NYP \"The Spirit of St. Louis\"—in 1927 Charles Lindbergh chose the lightweight Rieker Inc P-1057 Degree Inclinometer to give him climb and descent angle information. Uses Hand-held clinometers are used for a variety of surveying and measurement tasks. In land surveying and mapping, a clinometer can provide a rapid measurement of the slope of a geographic feature, or used for cave survey. In prospecting for minerals, clinometers are used to measure the strike and dip of geologic formations. In forestry, tree height measurement can be done with a clinometer using standardized methods. Major artillery guns", "-22.396369203283314" ], [ "Mount Bumstead Mount Bumstead (85°39′S 174°10′E) is a large, isolated mountain, 3,200 metres (10,500 ft) high, standing 10 nautical miles (19 km) southeast of Otway Massif in the Grosvenor Mountains in Antarctica. It was discovered by R. Admiral Byrd on the Byrd Antarctic Expedition flight to the South Pole in November 1929 and named by him for Albert H. Bumstead, chief cartographer of the National Geographic Society at that time, and inventor of the sun compass, a device utilizing shadows of the sun to determine directions in areas where magnetic compasses are unreliable.", "-22.384581413271007" ], [ "used in unpopulated countries as emergency location points. In North America and Northern Europe any type of cairn can be used to mark mountain bike and hiking trails and other cross-country trail blazing, especially in mountain regions at or above the tree line. For example, the extensive trail network maintained by the DNT, the Norwegian Trekking Association, extensively uses cairns in conjunction with T-painted rock faces to mark trails. Other examples of these can be seen in the lava fields of Volcanoes National Park to mark several hikes. Placed at regular intervals, a series of cairns can", "-22.377869102461318" ], [ "proceedings.\nWalkers have a view overlooking a gypsy caravan site at Rover Way in Cardiff. During the development of the footpath, the occupants expressed concerns over privacy.", "-22.37730826518373" ] ]
32gawc
Why isn't the horror genre as respected as other film genres?
[ "Many horror films lack any kind of impactful storytelling. They often rely on gruesome visuals, jump-scares, and patently absurd plots. This cheapens the whole genre, and makes it harder for people to take them seriously. As you said, there are exceptions.", "On top of other good reasons, I think it's because a large percentage of the population simply won't ever go watch one. I know lots of people who wouldn't go watch a horror movie if you paid them, mostly because they don't enjoy spending two hours having a movie scare the crap out of them.", "Firstly, the premise is flawed - a list of horror films is going to include many of the greatest films ever made (Nosferatu, Jaws, Psycho, The Thing, The Shining, Deliverance, Alien, The Fly, Terminator I, Poltergeist) and with a list of venerable directors (Ridley Scott, Steven Spielberg, Stanley Kubrick, Alfred Hitchcock, Guillermo Del Toro, Roman Polanski, Francis Ford Coppola). Horror has also launched, revived, defined, or propelled a lot of careers - Bela Lugosi, Sigourney Weaver, Anthony Hopkins, Jeff Goldblum, Mia Farrow, etc). Here are a few reasons why you don't think of many horror films as prestigious: 1) Horror typically works best with unknown casts. This allows the cast to be picked off, piece by piece, without the star power exerting influence or giving the order of deaths away (Psycho subverts this by murdering the star early in the picture). 2) You don't think of a lot of great horror films as horror films, because they often overlap with other genres. Alien, Terminator, and The Thing overlap with sci-fi; Rebecca overlaps with Romance, others overlap with psychological thrillers. 3) Your preconceptions about the genre don't match the reality of that genre. Again, look at that list of films - holy shit, those are great films! I'm guessing when you think \"horror\" you think \"b-grade slasher flick\" or \"monster attack\". You could do this to any genre, though - the romantic comedy is either The Apartment, or it's a Heigl disaster; the movie musical can be West Side Story or Mamma Mia. 4) Horror films are very cheap. Done right, they usually need very little budget, small casts, few names, and thus are a great proving ground for new filmmakers. This results in way more shitty, low-grade horror films in distribution than shitty, low-grade historical epics.", "Because it's usually a budget flick, uncompelling story, and cheap scare tactics instead of an actual dark story. I don't like it because it's very predictable and nothing memorable. The characters all act stupid and make the worst decisions just to keep the movie going for 2 hours. The only scary thing about the movie is the sound going from dead silent to stupid loud. That pretty much described most horror movies.", "Horror movies and action movies are both seen in similar ways - they're not made to be an engrossing or beautiful story with complex characters and deep themes. They're just built to thrill you. Action movies usually do this in a more expensive way with explosions and car chases, and horror movies tend to be a bit more low-budget, thrilling you with jump scares and gore. Neither of those really lends itself to good storytelling, but every once in a while, there's an exception and you end up with a real classic. For horror, that would be movies like Nightmare on Elm Street or the original Saw, both of were unique and interesting stories even without the splatter, and which influenced dozens of films after.", "Because, by virtue of being included in the genre, it's kind of assumed that they are just leveraging one emotion for the entire film: Fear. There are plenty of other movies that have parts that can be plenty scary, but that also have more going on in the plot. Take, for example, *Silence of the Lambs*, or *Frailty*, or *Alien*, or *Terminator*. None of those movies are considered \"horror\" movies, but there's plenty of *killing for the sake of killing* going on, as well as constant mortal threat to the protagonists. But in films like those, there is also, generally, a question greater than \"am I going to live or die.\" Once the plot becomes any more complicated than, \"sorority girl tries to escape,\" people don't really call it a \"horror film\" anymore...", "A Youtube reviewer, Chris Stuckman, made a great 12:33 video about the problem with modern horror movies that [seems to nail it on the head.]( URL_0 )", "You've heard of Troll 2 and the Scarecrow series, yes?", "While I think that the current top comment by /u/o0joshua0o is the closet to summing things up (others have added a few solid points as well), there is still something missing. I'll try to best explain my point in a way fitting to ELI5, though this might lead to a fairly long post. The short of it is this: scaring people is easy. It isn't that the story is lacking impact or that it relies on gruesome visuals or jump-scares. If the goal of a story (a book, a movie, etc.) is to scare and it manages to do just that, then it has made a solid impact. This can be anything from the many kid-friendly campfire stories about men with hooks for hands to various urban legends or creepypastas about sleep experiments to novels about a father and husband who struggles to be a good man while dealing with his personal demons (that also happens to have a popular film adaptation that completely misses the point). Storytelling is all about the manipulation of the audience. It is like a magic act. But rather than having an audience who wants to believe an elephant can really disappear then reappear, a storyteller has an audience that wants their emotions manipulated for the purpose of entertainment. Whether it involves making them laugh, cry, or fear for their own well-being is not entirely irrelevant though it is most important that they at least feel *something* during the performance. And a good storyteller will manage to illicit at least one or more of even the most basic emotional responses all without the audience being actively aware that they are being manipulated. An audience wants to believe in the illusion. They know the story you're telling them isn't real, or at the very least isn't actually taking place at that very moment. It involves words on a page, or a man sitting at a campfire, or actors on a stage. A bad storyteller will rely heavily on familiarity to get their point across. A reused joke. A familiar plot and twist. Cliches that are meant to act as emotional shorthand, like putting a mother and child inside a burning building. The whole \"showing, not telling\" thing you often hear in writing courses or in threads like those in /r/books. The audience is, at that point, doing all the emotional work. They have to make all those connections. That music means something exciting is happening. The fat guy fell down so I need to laugh at his being fat and clumsy. Or, back to my previous example, that mother and child are in danger so I should feel concern for their safety. Shorthand is fine. And reusing old material is as well. But it's all in the execution. Anyone can reference an old Simpson's gag or quote Airplane (just look at all the reposts on reddit or anywhere else for proof of that). But not everyone can make people actually laugh at it the same way they had the first time they saw or heard it. If any laughter happens at all, it's more because they fondly recall that original moment. And this is getting to what I mean by \"scaring people is easy\". Comedy, generally speaking, is really hard. Getting a genuine laugh from people is a lot of work. Timing, delivery. To take a very basic observation and present it in such a way that gets a crowd to snort and chuckle is a quest unto itself. A bad joke or weak delivery can stink up the house real quick. Drama is the same way. A combination of a solid performance of at least passable material is required to illicit a positive response from the audience. Stilted line delivery can suck any and all emotion out of a romantic scene between lovers. Cringe-worthy dialog can lead even the most tense moment into melodrama and result in laughs from an audience. Even action requires a strong understanding of framing, editing, pacing in addition to solid choreography. An action scene is a story unto itself. The fight. The chase, be it toward a goal or away from an antagonist. It's a story within a story. And a poorly shot action sequence will not keep an audience on the edge of their seats. Weak stunt work will not get them to cheer. A poorly framed or edited punch will look fake and break the illusion. But scaring people is easy. We're all afraid of something. We all are hardwired to feel things like anxiety and stress. And to trigger such things isn't hard because it involves primitive responses to stimuli that have kept us alive generation after generation. This is why a jump scare will work on many if not most people. A video with a sudden, disturbing image and a loud audio cue is no different to the human brain than a wolf jumping out of the bushes. Horror doesn't necessarily require an emotional response so much as it does a physical and chemical response. Empathy with any of Freddy's victim isn't required to enjoy A Nightmare on Elm Street. Stilted delivery won't necessarily detract from the gore or jump scare. So long as your nervous system is lighting up and your body is flooded with things like adrenaline, the scene or story works just fine. This is why a lot of storytellers, a lot of filmmakers can cut their teeth with horror and transition to something else. All the basic ingredients are there for a good movie. Lighting. Music. Framing. It's an entry level attempt at all the emotional manipulation required in dramas and comedy. But the bar is set so low for an effective horror movie that even a weak effort can be seen as a success. Low-budgets also help convince studios to take risks on inexperienced talent. A lot of directors and actors started off in horror. Dementia 13 was one of Francis Ford Coppola's first directing jobs. Spielberg made a name for himself with Jaws. That [guy]( URL_5 ) who helped bring one of the most successful superhero franchises of all time to the big screen started off making a no-budget horror flick with his brother and big-chinned friend where a tree rapes a girl. And the dude with the two highest grossing films of [all time]( URL_3 ) started off making a sequel to a movie about killer fish, then did a movie about a killer robot, and then did a sequel about killer aliens before doing a movie about a killer robot fighting another killer robot. Not to mention the likes of actors like [Johnny Depp]( URL_1 ), [Jennifer Connelly]( URL_11 ), [Kevin Bacon]( URL_12 ), and [Crispin Glover]( URL_6 ) who all got early breaks in horror. Or even established talent that find themselves diving into (or even returning to) horror like [Gary Oldman]( URL_7 ), [Frank Langella]( URL_10 ), [Willem Dafoe]( URL_8 ), and [Sir Ian McKellen]( URL_2 ). Scaring people is easy. And even the most [mundane]( URL_4 ), [uneventful] ( URL_0 ), [low-reaching]( URL_9 ) horror films can become runaway successes. It isn't the talent involved. It isn't the story failing to make an impact. It's that anyone with a camera and a few friends can make it happen and garner some attention. Of course, like all other genres it takes a lot of work and effort and talent to master the horror genre. So few names have managed to do it compared to others. When everyone can be scared, when we all share so many of the same fears, it takes a real creative mind to present something so daringly unsettling that it not only perseveres for years to come but also illicit the same emotional response. King, Barker, Lovecraft, Poe, Romero, Craven, Hooper, Carpenter, and so many others have mastered the genre. Some stick around and love to play in the same sandbox time and again. Others move on to the next challenge, maybe returning now and then when the mood strikes them. It isn't that horror isn't respected. It's that scaring people isn't hard. Keeping people afraid is. And so few manage to do it just right.", "There's a bit of a problem with the horror genre, and this problem is the writing. How many horror movies do you know that are genuinely scary purely because of the writing? There are a few, but not many. All the other movies depend on gruesome visuals, \"scary\" music and maybe a jumpscare here and there to keep you on the edge of your seat, but these are all easily picked apart gimmicks. I think there's a movie called mama or mother or something which I saw a while ago with friends of mine, despite being drunk and an easily frightened baby it just didn't do anything for me. The premise was stupid at best in my opinion, the scares were easily predictable, the music was cliché. It was a decent movie by all means but it was just so standard and come on: Do we trust hollywood to make a movie that is unconventional and doesn't follow a predetermined checklist? These are the movies that make the best horror but they are a risk and Hollywood doesn't take risks.", "Honestly, I think it's because fear is a deeply personal, uncomfortable feeling for a lot of people. When a film attempts to frighten you and it fails, it's easy to feel insulted. When a film attempts to frighten people and succeeds, they don't always enjoy it. People often compare sense of fear to sense of humor, inasmuch as there's a certain amount of compulsion to it. You don't choose to laugh and you don't choose to be afraid. You just respond to the stimulus you're taking in, and the reaction is involuntary. Beyond that, even among horror fans, there's a lot of variance. Some people like torture porn, some people are all about jump scares, some people just want to see badass monsters, and then you've got guys like me who prefer to be scared long after the movie is over, when the plot or characters linger in the back of your mind.", "I thought the premise of The Purge was incredibly wasted. It's interesting, brings out the worst in people, and just bleeds suspense. But then they go and lock the family in the house and then it's a simple home invasion horror story. If they had done something such as a family going camping far away and losing track of time before the Purge, realize the date, and then have them flee terrible people while trying to get back home to safety - that would have been something worth watching.", "For an example, look at the horror movie \"You're Next\". Mild spoilers will follow, but nothing significant. So, this family is getting attacked while they're eating dinner, from outside the house, and their plan is to let their daughter sprint barefoot out of the house in hopes of like... I dunno, running and getting help or something? And no character in that movie stops and says \"Hey, this is fucking stupid. Seriously.\" She sprints out the door and garrotes herself on a wire in the door frame, and everyone is like \"Oh man, who would've thought her running unarmed into the area where our assailants are, with no foot protection in the woods would've ended tragically!?\" Some can absolutely argue that You're Next is a healthy dose of tongue in cheek, but like Shawn of the Dead, it's poking fun at it's brethren. It's hard for critics and stuff to accept horror movies as legitimate story telling devices when you have movies like The Strangers, wherein the bad guys do things that the protagonists never actually notice that immediately reminds your brain that you're watching a movie. Horror films are typically pretty cheap to produce, and ever since the Blair Witch Project, they've gotten cheaper, to the point where we can all enjoy \"Skype, the horror movie\" this weekend.. BWP made absolute bank because it was full of no names. Paranormal activity, Saw, all of them lack pretty significant names, in order to save more on money. And finally, horror movies are polarizing. Myself and my wife love to watch them, but none of my friends do. They hate horror movies, they hate how the movies make them feel, even when the movie is blatantly not scary (this is subjective, but for me it's movies such as the aforementioned You're Next and The Strangers). Why spend a lot of money and effort when you have giant swathes of people who write it off instantly because they don't like horror?", "Because the bulk of horror has more in common with pornography than with regular cinema. What I mean is, there is a tendency in the genre to set up a scenario *just* enough to get the horror going and then it coasts on cheap scares and senseless gore until the end. It relies on a loose plot whose only purpose is to get the audience some standard-issue thrills. That's not to say that there aren't great horror films, because by god there really are some amazing ones, but that the pornographic aspect of horror tends to not only taint the perception of the genre, but also bleed into the rest of the genre itself. People become so accustomed with *that* being horror that they feel ripped off when they go to the theater and that's not what they see. Think the \"that wasn't even scary\" crowd. As a result you either get amazing movies that fall under the radar or movies that, because they are so \"good\" are not considered horror. As an example of this I would use \"Black Swan\". One could make a solid argument for it being a horror movie in the purest sense. But few consider it as such. Because it's \"good\", and horror is \"bad\". And because horror has jump scares and dim lighting. So my answer I guess is that the genre is a vicious cycle turned on itself.", "It can be argued that Horror is a genre which doesn't need to be respected in order to be successful, so horror movies don't always go for that. They are usually cheap to make and have a niche audience that they don't have to really try new things with to entertain. Lack of originality and creativity also seem to be an issue. Creativity generally arises in new methods of being gory (which seems to be heavily looked down upon) and many horror films carry a negative mark of exploitation. Horror movies which are considered respected either try new things and play with a formula (like Cabin in the Woods or Scream) or are layered with other genre's (like how Silence of the Lambs is a \"thriller\" despite following the slasher film formula very closely). There's also just a general public and critical misunderstanding and prejudice which I actually think is a big issue. When Psycho and Peeping Tom were first released they were ostracized for exploiting violence, but later reviews and rewatching over the years people start saying that they are masterpieces of film making. Film critics often struggle to tell the difference between exploitation and art I guess? Turning up big money ties back to my point of it being niche. Horror is successful because its cheap, big budget includes big risks which studios don't generally want to go for. A lot of fans would love a big budget movie, especially if its a crossover work, like an Avengers for Horror movies.", "I'd say it has something to do with the fact that it's the hardest genre to do well (and that's not hyperbole, I assert that horror is the *most* difficult genre). It's incredibly difficult to make a scary film, and the nuances that make it possible can also be prohibitive towards other aspects of good film making. It's hard to tell a story, and maintain good suspenseful pacing, and foster a tone that speaks to the fears of your audience all at the same time. As a result: a lot of B-movies are horrors/ thrillers, which may have degraded respect for the genre over the years. It's too bad really, B-movies are one of my favorite categories of film, and deserver more respect in my opinion. More people should give them the appreciation they deserve (I am of course talking about *good* B-movies: the Room, anything directed by Peter Jackson, Shrooms, etc).", "Because horror cliches with rare exceptions are just plain stupid. Like why does the bad stuff always happen in the dark?... are you telling me angry ghosts can't haunt during the day? There's that movie Fear Dot Com that was dark EVERYWHERE, even inside the police station... so many other cliches as well, like the old open up the mirror to take something out of the medicine cabinet, close it to find a murderer standing behind you in the reflection... There's only a few movies that come to mind as horror done well. Alien, The Shining, The Blair Witch Project, The Ring... probably a couple more I can't think of at the moment.", "There was a time when high caliber actors did films like that. Jack Nicholson was 22 years past his first real movie credit when he told Wendy he wouldn't hurt her if she'd just give him the bat. Those exceptions aside, as someone pointed out, horror films generally depend on either fear or women in skimpy clothing who make stupid decisions, often while babysitting someone else's kids in someone else's home. That sort of discourages actors with pride from taking those roles.", "I've learned to read between the lines of rating scores. Sites like Rotten Tomatoes are never going to give a horror film much above a 7. So realistically, anything over 5 might be worth looking into. With regular movies it's more like anything above a 7 might be worth seeing.", "Silence of the Lambs was respected. It just takes a film with good writing, and most horror films don't put much effort into the plot/dialogue.", "Recent exception... The Conjuring. Really slick cinematography, real scares and an insane climax. Also, has anyone checked out Housebound?", "Show me a horror movie with a deep subplot beyond \"run away and die a bunch\".", "Because most of the horror films are absurdly overdone cliches.", "It's easy to make a horror film but difficult to make a good one. Many horrors tend to stick very tight to their foundations and often stick to their respective audiences, in recent years I've found myself looking for foreign horrors such as french extremism to get a good one. But i'd say the main reason is too few horrors try to break conventions or they purposefully do it and make sure you know about it. A cabin in the woods is a good horror for me as it explains this very by just being as it shows everything that is good and bad about horror. Quite often if i watch one with the misses it's all about the one with the brutal kills and the messed up stuff, i try to watch a proper horror and she finds it boring which leads on to the next point. Many film critics just don't know how to review it, horror critics will do it as a horror whilst film critics try to place it as an action or comedy, failing that they will attempt to extract deeper meaning from a horror when one may just not exist; Sometimes all a good horror needs is a psycho with an axe, no we do not care about why, no we do not want a trilogy that explains their motivations, we just want to see some nudity and teens getting killed. So in summary I'd place it to convention overtaking the story, a deeper story means drifting from the horror elements too much which the audience may find boring. therefore story often gets put aside for the horror elements which means classical reviewers may struggle to fit the film to their method of marking; it's like giving an expert on fine wines a bottle of exclusive locally produced ale and expecting a review, yes it's alcohol but not quite a fine Bordeaux", "The same traits of horror movies that are used in EVERYTHING (ex. jump scares is the main one, excess blood, running from stuff, etc.) have been used time and time again for decades. It's no wonder that these movies have burnt out so quickly; so few of them are actually memorable or good anymore, and a lot of them end up being super cheesy and weird (I remember when I watched Cabin in the Woods, it was good to start but then by the end I was like . . . what?). I'm a fan of psychological thrillers myself. These tend to be a lot more horrifying than actual \"horror\" movies, as they play with your thoughts and really make you think about stuff. Some of my favorite darker psychological films are those of Darren Aronofsky (Requiem for a Dream, Pi). I also really liked the Cube films (kinda obscure trilogy, but pretty good films). Last House on the Left is also a good thriller. Everything else these days, in the pure sense of \"horror\", without bringing thriller into it, tends to just be \"social media is evil!\" and \"oh no there's a murderer in town!\" Kinda depressing to see that horror movies haven't changed much since the 20th century.", "It's true that there haven't been many good high budget horror movies recently, but there are LOTS of low budget/indie or foreign productions that are actually very clever, with great storytelling, acting and effects. Martyrs is an excellent example of a film that can be extremely brutal, terrifying and gruesome, but it's also incredibly smart in its social commentary. Lake Mungo is another unknown gem that explores and analyzes the concept of grief through a pretty scary ghost story. A Tale of Two Sisters is another amazing \"horror\" movie with similar themes... And I could go on. As for why the horror genre in general isn't more respected, I'd say it's pretty obvious. Most people who watch horror movies just want to be scared or grossed out. They want to see stupid people get their well deserved gruesome deaths, they want to see scary ghosts jump at them, get their adrenaline rush and leave. They don't want to feel bad, to actually *think* about death, grief, and all those other heavy themes that a clever horror movie would include. It's just much easier to produce and sell a movie that's basically 100% blood/jumpscares.", "Horror as a genre is respected. Hitchcock is brilliant, as well as most other classic film makers. However, the horror genre today is less about plot and more about blood and guts or just how crazy the bad guy is because he's probably killing for no reason. It's not just the horror genre. Comedy has gone so far downhill, it's all dick and fart jokes followed by nutshots. Don't believe me? What was the last action film you so that wasn't totally ridiculous? Drama just gets respect for not seeming so juvenile and musicals get respect for being able to tell a story with song. What's really gripping about horror and comedy is that it hits us on such a basic level. The beauty in the cinematic art form though is to still touch upon those essential emotions while still making us feel more. Taking us on a journey. Too many movies just cash in on the lowest form of entertainment they can without trying for anything greater, and that's sad.", "Why don't studios ever invest big money into horror films? --- Because, in large part, horror films these days tend to be made on gore and shock value, not on writing. Very rarely does a horror film both play to your visceral fears AND feature good writing. When it does, it's a unicorn. (Paranormal Activity had me sleeping with the lights on for months but was SO BRILLIANT.) Why don't high caliber actors/directors/writers get involved in horror films that often? -- Because most horror films in the industry suck, and horror tends to equal pulp, which isn't always that good, though I fondly do love pulp stuff.", "different movies genres are trying to evoke different emotions(reactions from viewers) so horror movies try to make you scared action movies display adrenaline junkies pornographic movies want to evoke your lust Big movies use a mix of different genres. so you might need to combine a love scene with an action scene and there will probably be a lot of drama too. the more complex the emotions displayed in movies the more difficult they are to make and the more acclaimed they are. hope that makes sense for you.", "It's the genre that's possibly saturated with cliches that we've seen in horror movies. Very few directors go beyond their boundaries and the ones you've mentioned were all pioneering films in the horror genre. A side note, if you haven't seen It Follows yet, be sure to check it out.", "It really does come down to less originality and more non-intelligent motifs in most cases. On an opinion note, where's all the love for Saw? Probably one of the best horror movies I ever saw, especially since it was on that low of a budget.", "Those movies are more like thrillers than actual horror movies. Thrillers typically do better than horror movies because they don't so much focus on people dying. Horror movies are more about gore than anything. The only exception that I know of is the original Exorcist.", "A lot of my friends ask me \"why the fuck would you show me this movie\" that's why. I'd like to think horror buffs are just as unique and weird as me.... and because of that unpopular.", "I'm curious, is there a genre that is more respected than others? Documentaries maybe? Or are you lumping all genres together and saying that horror is generally less respected than all others together?", "Newer horror films that I found are the exception to the 'stupid plotline, stupid decisions, stupid everything' (if sometimes ironically) complaints: You're Next Housebound The House of the Devil", "In general, people seem to enjoy being sad more than scared. To me, that mindset is counterproductive and disgusting - much like how they probably view mine.", "Because horror is incompatible with polite society, and thus is looked down upon as inferior or unworthy compared to \"serious\" works." ]
[ [ "one genre of film, the influence it presents to the international community is large. Horror movies tend to be a vessel for showing eras of audiences issues across the globe visually and in the most effective manner. Jeanne Hall, a film theorist, agrees with the use of horror films in easing the process of understanding issues by making use of their optical elements. The use of horror films to help audiences understand international prior historical events occurs, for example, to depict the horrors of the Vietnam War, the Holocaust and the worldwide AIDS epidemic. However, horror movies do not always", "-36.15309976876597" ], [ "Supernatural horror film Supernatural horror film is a film genre that combines aspects of horror film and supernatural film. Supernatural occurrences in such films often include ghosts and demons, and many supernatural horror films have elements of religion. Common themes in the genre are the afterlife, the Devil, and demonic possession. Not all supernatural horror films focus on religion, and they can have \"more vivid and gruesome violence\". Comparisons For such films and other media, critics distinguish supernatural horror from psychological horror. Mathias Clasen writes in Why Horror Seduces, \"Supernatural horror involves some kind of suspension or breach of physical", "-34.74343864905859" ], [ "consistent with the larger social body's assumptions about white superiority\".\nThe horror genre seems to be the genre within cinema that has the most space to comment on issues of race and gender due to its extremist nature and access to allegorical imagery. Ariel Smith states that \"by forcing the subconscious fears of audiences to the surface, horror cinema evokes reactions, psychologically and physically: this is the genre's power.\" The genre holds a great amount of potential to not only explore violence against women and minorities, but also inform the public and show the extents of that violence in a powerful", "-33.91867277486017" ], [ "more complex modern works such as Mark Z. Danielewski's House of Leaves (2000), a finalist for the National Book Award. There are many horror novels for teens, such as The Monstrumologist by Rick Yancey (2009). Additionally, many movies, particularly animated ones, use a horror aesthetic. These are what can be collectively referred to as \"children's horror\". Although it's unknown for sure why children enjoy these movies (as it seems counter-intuitive), it is theorized that it is the grotesque monsters that fascinate kids. Tangential to this, the internalized impact of horror television programs and films on children is rather under-researched, especially", "-33.659667149651796" ], [ "The Fly. However, body horror tropes existed within film prior to official recognition of the genre. Early examples of the body horror genre arose out of 1950s American horror cinema including The Blob and The Fly, both of which set the standard for the genre due to the films primary focus on bodily mutilation and visceral special effects. Many contemporary films of the horror genre (those produced after 1968), including body horror, are considered to be postmodern in contrast to classical horror. Because of this, delineations between the genres are difficult to define, since postmodernism is concerned with blurring boundaries", "-33.13552335690474" ], [ "the tension (horror movies almost always play as comedies). With Survive! though, the audience tends to be a little more sober, a little more thoughtful. Maybe that's because we realize that underlying this rather dumb, uninspired, even crude film is a true story of such compelling power that we're forced to think and respond.\"", "-33.13415243307827" ], [ "the most multifaceted horror films ever made\", arguing that by \"simultaneously exploiting the contemporary fear of infiltration by undesirable elements as well as a burgeoning concern over homeland totalitarianism in the wake of Senator Joseph McCarthy's notorious communist witch hunt, it may be the clearest window into the American psyche that horror cinema has ever provided\".\nIn An Illustrated History of the Horror Film, Carlos Clarens saw a trend manifesting itself in science fiction films, dealing with dehumanization and fear of the loss of individual identity, being historically connected to the end of \"the Korean War and the well publicized reports", "-33.10026899742661" ], [ "certain notions of value and limits the variety of films produced domestically. Despite their low-culture status, horror films have been well suited to the Australian film industry's financial limitations, they are a growth strategy for producers, and a training ground for emerging filmmakers\".", "-33.097381643077824" ], [ "it a \"very satisfying horror movie. The film works to a large extent because there is a level of acting here that's rarely seen in films in this genre. Simple filmmaking techniques like camera angles, keen concepts and fantastic sequencing to create a truly terrifying horror experience that is mostly free of blood and gore, makes it an edge-of-the-seat thriller\". silverscreen.in wrote, \"The director's fascination for everything morbid is what drives the script. He's one of those artistes that paints penury in flattering colours, glorifies everything that is bare and poor, and gets lyrical with the dark and the dismal.", "-33.00754260091344" ], [ "horror as a source of the sublime, though they all agree that terror is a very high one; and where lies the great difference between horror and terror, but in uncertainty and obscurity, that accompany the first, respecting the dreader evil.\"\nAccording to Devendra Varma in The Gothic Flame (1966):\nThe difference between Terror and Horror is the difference between awful apprehension and sickening realization: between the smell of death and stumbling against a corpse. Horror fiction Horror is also a genre of film and fiction that relies on horrifying images or situations to tell stories and prompt reactions or jump scares", "-32.95265284134075" ], [ "in typical action-horror films include gore, demons, vicious animals, vampires and most commonly zombies. This category can also take elements from the fantasy genre. Examples include Aliens, Army of Darkness, Resident Evil, Ghost Rider, They Live, Planet Terror, Predator, Undead, I Saw the Devil, Train to Busan, Doomsday, Underworld, Constantine, Swamp Thing, Priest, The Crow, Dawn of the Dead, Deep Rising, From Dusk till Dawn, Blade, Legion, and End of Days. Action thriller Featuring guns, cool explosions and amazing set pieces, this movie type first developed in the 1970s in such films as Dirty Harry and The French Connection,", "-32.90193073335104" ], [ "film was pointed out for its horror elements as well.", "-32.8303691741221" ], [ "psychopaths, and monsters) with the tension buildup of the thriller genre. Examples include The Invitation, Wolf Creek, Don't Breathe, Joy Ride, Julia's Eyes, A Quiet Place, Get Out, and Ready or Not. Gothic horror Gothic horror is a type of story that contains elements of goth and horror. At times it may have romance that unfolds in the setting of a horror tale, usually suspenseful. Some of the earliest horror movies were of this subgenre. Examples include: Dracula, Sleepy Hollow, The Others, The Phantom of the Opera, Interview with the Vampire, Kill, Baby, Kill, Nosferatu, and Crimson Peak. Natural horror", "-32.77859196640202" ], [ "horror, and various hybrids of the two were now of central economic importance to the low-budget end of the business. Most down-market films of the type—like many of those produced by William Alland at Universal (e.g., Creature from the Black Lagoon [1954]) and Sam Katzman at Columbia (e.g., It Came from Beneath the Sea [1955])—provided little more than simple diversion. But these were genres whose fantastic nature could also be used as cover for mordant cultural observations often difficult to make in mainstream movies. \nTwo well-financed films of 1951, The Thing from Another World and The Day the Earth Stood", "-32.74777279277623" ], [ "present positive endings. In fact, in many occurrences the manipulation of horror presents cultural definitions that are not accurate, yet set an example to which a person relates to that specific cultural from then on in their life.\nThe visual interpretations of films can be lost in the translation of their elements from one culture to another, like in the adaptation of the Japanese film Ju on into the American film The Grudge. The cultural components from Japan were slowly \"siphoned away\" to make the film more relatable to a western audience. This deterioration that can occur in an international remake", "-32.436363548680674" ], [ "Natural horror is a subgenre of horror films \"featuring nature running amok in the form of mutated beasts, carnivorous insects, and normally harmless animals or plants turned into cold-blooded killers.\" This genre may sometimes overlap with the science fiction and action and adventure genres. Examples include: The Birds, Jaws, Piranha, Bats, Lake Placid, Rogue, Alligator, Black Water, and more recently Crawl Zombie films Zombie films feature creatures who are usually portrayed as either reanimated corpses or mindless human beings. Distinct subgenres have evolved, such as the zombie comedy, which may or may not retain a significant horror theme, and often", "-32.43023068859475" ], [ "has proven groundbreaking, wildly successful and will prove to be trendsetting.\"\nAt the 2013 PaleyFest, Falchuk compared the series to horror films: \"It does demand a little bit of compassion at the end because you fall in love with these characters in a different way than you would in a movie,\" he said. \"If you want to kill everybody in a movie except one person, you can kind of get away with that, but if you're looking to do a horror TV show, you have a different responsibility to the characters because the audience has a different affection for them.\"\nMurphy then", "-32.42527241012431" ], [ "Place, saying, \"'elevated horror' (or even 'social horror', for that matter) doesn’t exist. It never did, and it never will. Filmmakers have been attempting to distance themselves from the 'horror' label for decades, as it’s a genre that’s been ghettoized for most of its existence.\" In an opinion piece for SYFY Wire Emma Fraser wrote that \"social thriller\" refers to a specific kind of horror but that \"by dressing this genre up, it actually does it a disservice.\" Fraser goes on to say that filmmakers like George Romero, David Cronenberg and John Carpenter have used the horror genre to address", "-32.37185929561383" ], [ "the House \"is one of those rare films that works really well despite the fact that rips off better known movies\" and \"it's a bitter, ugly, and nasty little horror movie that doesn't pull any punches and is just as seedy today as it was when it was made. It's effective in that it gets under your skin despite its low budget origins and obvious flaws\". Hysteria Lives! gave the film a similar rating, writing, \"Grim is the only word for Joseph Ellison's psychological terror movie\" and \"It's easy to forget just how nihilistic much of American genre cinema was", "-32.280850083130645" ], [ "get within horror films is through the use of their culture as plot devices and structures to scare or guilt the white protagonists. References to such things as the \"Indian burial ground\" or the \"medicine man\" are commonly used in the horror genre, to create a stereotype of \"the other\" and frighten its white audience. Many of the themes and plots relate to the brutal colonisation of land, and genocide of Aboriginal peoples by white people: \nHorror films often rely on Cultures of Colour and their signifiers, being reduced to a mythical standpoint. The films do not portray these", "-32.143628406425705" ], [ "the main protagonists of contemporary horror films. Movie makers have also begun to integrate topics more broadly associated with other genres into their films in order to grow audience appeal.\nMany early horror films created great social and legal controversy. In the U.S., the Motion Picture Production Code which was implemented in 1930, set moral guidelines for film content, restraining movies containing controversial themes, graphic violence, explicit sexuality and/or nudity. The gradual abandonment of the Code, and its eventual formal repeal in 1968 (when it was replaced by the MPAA film rating system) offered more freedom to the movie industry. Nevertheless,", "-32.13938342720212" ], [ "break taboos of good taste and aesthetic norms. Violence, gore, sexual perversity, and even the music can be pushed to stylistic excess far beyond that allowed by mainstream cinema. Film censorship can make these films obscure and difficult to find, common criteria used to define cult films. Despite this, these films remain well-known and prized among collectors. Fans will occasionally express frustration with dismissive critics and conventional analysis, which they believe marginalizes and misinterprets paracinema. In marketing these films, young men are predominantly targeted. Horror films in particular can draw fans who seek the", "-31.914577213596203" ], [ "its monsters. The A.V. Club noted that while the film was very similar to other movies in the same genre, this worked in Blood Glacier's favor as it was \"a movie viewers have seen dozens of times before, and will see again, with slight variations, because it embodies a fundamental quality of B-horror entertainment.\"", "-31.90969789569499" ], [ "to make the creatures of the night that populated these films into harmless chimeras comfortably ensconced in the faraway past.\" In the early 1940s, supernatural horror films had more contemporary settings, but the genre was ultimately superseded by psychological horror films. By the end of World War II, the supernatural horror genre \"met its demise\", being overshadowed by the atrocities of the war. By the 1950s, science fiction horror films had replaced supernatural horror films, and psychological horror films also became more popular in the same decade, ultimately eclipsing supernatural horror. The few supernatural horror films that were produced in", "-31.835324582643807" ], [ "violence in a film\". Movies such as the popular action film Die Hard 2 are very violent, but they do \"not fall into the category of aestheticized violence because it is not stylistically excessive in a significant and sustained way\".\nBut Bruder classifies films as using \"stylized [e.g. aestheticized] violence if they \"revel in guns, gore and explosions, exploiting mise-en-scene not so much to provide narrative environment as to create the appearance of a 'movie' atmosphere against which specifically cinematic spectacle can unfold\". In movies with aestheticized violence, she argues that the \"standard realist modes of editing and cinematography are violated", "-31.81873214931693" ], [ "most would classify them as altogether separate movie genres. Fantasy movies and the film industry As a cinematic genre, fantasy has traditionally not been regarded as highly as the related genre of science fiction film. Undoubtedly, the fact that until recently fantasy films often suffered from the \"Sword and Sandal\" afflictions of inferior production values, over-the-top acting, and decidedly poor special effects was a significant factor in fantasy film's low regard.\nSince the early 2000s, however, the genre has gained new respectability in a way, driven principally by the successful adaptations of J.R.R. Tolkien's The Lord of the Rings and J.K.", "-31.707947280199733" ], [ "and frenetic chases of the action genre. Themes or elements often prevalent in typical action-horror films include gore, demons, aliens, vicious animals, vampires, and, most commonly, zombies. This category also fuses the fantasy genre. Examples include: Aliens, Predator, Dog Soldiers, Blade, From Dusk till Dawn, I Saw the Devil, Resident Evil, Feast, Train to Busan, The Purge series, and Upgrade. Body horror In Body horror, the horror is principally derived from the graphic destruction or degeneration of the body. Other types of body horror include unnatural movements, or the anatomically incorrect placement of limbs to create 'monsters' out of human", "-31.70536010118667" ], [ "release, and is one of the few films of the genre to garner mainstream attention. In recent years, the genre has experienced a cult following and revival, as new productions influenced by the original wave of films have been released.\nDue to their graphic content, the films of this subgenre are often the center of controversy, and many have been censored or banned in countries around the world. The animal cruelty featured in many of the films is often the focal point of the controversy, and these scenes have been targeted by certain countries' film boards. Several cannibal films also appeared", "-31.69693495053798" ], [ "of other horror films, notably Motel Hell (1980) and Mountaintop Motel Massacre (1986). More recently, the genre has been revived with such films as Mayhem Motel (2001), Murder Inn (2005), Vacancy (2007), and its direct-to-video prequel, Vacancy 2: The First Cut (2009).\nSeveral of these horror films also incorporate the sub-theme of voyeurism, whereby the motel owner spies on (or even films) the sexual exploits of the guests. This plays on the long-established connotations of motels and illicit sexual activity, which has itself formed the basis for numerous other films, variously representing the thriller, comedy, teen film, and sexploitation genres. Stephen", "-31.66892422075034" ], [ "much more subtle and don't parody horror, such as An American Werewolf in London. Another style of comedy horror can also rely on over the top violence and gore such as in The Evil Dead (1981), Re-Animator (1985), Braindead (1992), and Club Dread (2004) – such films are sometimes known as splatstick, a portmanteau of the words splatter and slapstick. It would be reasonable to put Ghostbusters in this category. Comedy thriller Comedy thriller is a genre that combines elements of comedy and thrillers, a combination of humor and suspense. Films such as Silver Streak, Charade, Kiss Kiss Bang Bang,", "-31.658428965398343" ], [ "and one of \"the few true classics of supernatural cinema.\" And Dennis Schwartz of Ozus' World Movie Reviews called it \"A masterfully filmed surreal atmospheric supernatural tale\". 1950s With advances in technology, the tone of horror films shifted from the Gothic towards contemporary concerns. A popular horror subgenre began to emerge: the Doomsday film. Low-budget productions featured humanity overcoming threats such as alien invasions and deadly mutations to people, plants, and insects. Popular films of this genre include Creature from the Black Lagoon (1954) and The Blob (1958).\n1956's science fiction/horror film Invasion of the Body Snatchers concerns an extraterrestrial invasion", "-31.626866645441623" ], [ "popularity of J-Horror (Japanese Horror films), spurred on in part by the success of the US remake of Ring. Modern films Modern Khmer producers have catered to the young public's taste for movies within the horror genre but domestic production companies typically have low budgets and employ weak special effects. Nonetheless, these horror movies, after decades of absence, have been very successful with local audiences, especially among the younger demographic groups. Korm Chanthy, the manager of FCI Productions, which made the popular 2004 Nieng Arp, said \"We make movies to suit the domestic market and the demand of our youths", "-31.613005388411693" ], [ "wave of modern horror film, but it's not true. It's still hell. My country produces almost 200 films a year and there are like 2 or 3 horror films. It's not even an industry, French horror cinema is very low budget, it's kinda prototype. I think that a genre really exists when it's industrially produced like the Italians did 600 spaghetti westerns. So we can't really say that there is a wave of horror in French Cinema, I don't believe it.\n— \nLaugier does, however, acknowledge the existence of a broader wave of new European horror. He notes Spain, France and England", "-31.604217354979482" ], [ "Extreme cinema Extreme cinema is a genre of film distinguished by its use of excessive violence, torture, and sex of extreme nature. The rising popularity of Asian films in the 21st century has contributed to the growth of extreme cinema, although extreme cinema is still considered to be a cult-based genre. Being a relatively new genre, extreme cinema is controversial and widely unaccepted by the mainstream media. Extreme cinema films target a specific and small audience group. History The prehistory of extreme cinema can be traced back to censorship of art films and advertising tactics for classical exploitation films to", "-31.40346131066326" ], [ "would be harmful for the person’s mental health. Influences on society Horror films' evolution throughout the years has given society a new approach to resourcefully utilize their benefits. The horror film style has changed over time, but, in 1996, Scream set off a \"chain of copycats\", leading to a new variety of teenage, horror movies. This new approach to horror films began to gradually earn more and more revenue as seen in the progress of Scream movies; the first movie earned $6 million and the third movie earned $101 million. The importance that horror films have gained in the public", "-31.38919692428317" ], [ "producers believing the horror genre is serving to keep Cambodian cinema alive.\nAccording to Heng Tola, the current popularity of horror movies is waning in favor of \"a more serious\" emerging trend, both fueled by and feeding into the bitterness many Cambodians still hold on to regarding their country's recent history, specifically the humiliation of colonialism and losing territory, respect and political, economic and military prestige to powerful neighbors, Thailand and Vietnam. Themes Cambodian horror films, like those of Thailand, are heavily influenced by popular Japanese and Korean horror films but also display elements from Western (American) horror as well. The", "-31.37876438940657" ], [ "series while digging deeper into the Lovecraftian roots of horror in an attempt to reveal what makes the genre work... It's an exercise in metafiction that, while providing grisly fun, never distances viewers. And it's entertaining, while asking the same question of viewers and characters alike: Why come to a place you knew all along was going to be so dark and dangerous?\"\nIn a more mixed review Lisa Schwarzbaum of Entertainment Weekly, calling herself \"a wised-up viewer,\" gave the film a \"B−\" grade and said, \"The movie's biggest surprise may be that the story we think we know from modern", "-31.34095305984374" ], [ "horror films focus on their characters' suffering and (unlike Korean horror or Japanese horror) feature extreme gory violence. Popular horror films such as The Weird Villa and Secret Well emphasize psychological terror. Heart Talk is another psychological thriller.\nFilms about revenge, such as Villa Horror, Annoyed and Moheagita, often feature the dead returning to life to exact revence on the living.\nFilms about monsters include The Forest, Queen of Cobra and People eating Lizard. Cambodian monster films, like those from Hollywood, focus on teenagers. Some are similar to slasher films, involving a creature or a killer who stalks and graphically murders a", "-31.340466232271865" ], [ "society's taboos and testing one's fears. Horror films have appropriated the holiday, and many horror films debut on Halloween. Mathijs criticizes the over-cultified, commercialized nature of Halloween and horror films, which feed into each other so much that Halloween has turned into an image or product with no real community. Mathijs states that Halloween horror conventions can provide the missing community aspect.\nDespite their oppositional nature, cult films can produce celebrities. Like cult films themselves, authenticity is an important aspect of their popularity. Actors can become typecast as they become strongly associated with such iconic roles.", "-31.281794557435205" ], [ "body parts. David Cronenberg is one of the notable directors of the genre. Body horror films include: Starry Eyes, Videodrome, Dead Ringers, Contracted, The Thing, The Fly, and American Mary. Comedy horror Comedy horror Combines elements of comedy and horror fiction. The comedy horror genre often crosses over with the black comedy genre and are occasionally also horror films with a lower rating aimed at a family audience. The short story The Legend of Sleepy Hollow by Washington Irving is cited as \"the first great comedy-horror story\". Examples of comedy horror films include: An American Werewolf in London, Beetlejuice, Jennifer's", "-31.27473752406513" ], [ "less melodramatic and more explicit. Horror is often mixed with other genres. Critical appraisal and controversy Although frequently ignored or ridiculed by literary critics, genre fiction has achieved a measure of acceptance among some modern critics, with Stephen King being awarded the Medal for Distinguished Contribution to American Letters; but this polarized opinions and led to debate on genre fiction's literary merit. Negative comments about genre fiction have sparked responses from Time, Salon, the Atlantic, and the Los Angeles Review of Books. Nobel laureate Doris Lessing described science fiction as \"some of the best social fiction of", "-31.24815337068867" ], [ "horror film, gallows humor is a common element. While comedy horror films provide scares for audiences, they also provide something that dramatic horror films do not: \"the permission to laugh at your fears, to whistle past the cinematic graveyard and feel secure in the knowledge that the monsters can't get you\".\nIn the era of silent film, the source material for early comedy horror films came from stage performances instead of literature. One example, The Ghost Breaker (1914), was based on a 1909 play, though the film's horror elements were more interesting to the audience than the comedy elements. In the", "-31.14498714911315" ], [ "lamented that cinemas outside major cities are \"booked by computer from Hollywood with no regard for local tastes\", making high-quality independent and foreign films virtually unavailable to most American moviegoers.\nSome horror movie fans accused Ebert of elitism and prejudice against the horror genre, especially because of his dismissive comments about \"Dead Teenager Movies\". In 2007 Ebert responded to a question from a horror movie reviewer by saying that he did not disparage horror movies as a whole. He wrote that he drew a distinction between films like Nosferatu and The Silence of the Lambs, which he regarded as \"masterpieces\", and", "-31.120785505587264" ], [ "all been made into cinematic versions. Novel-length tales have been difficult to adapt to cinema, although that of The Haunting of Hill House to The Haunting in 1963 is an exception.\nSentimental depictions during this period were more popular in cinema than horror, and include the 1947 film The Ghost and Mrs. Muir, which was later adapted to television with a successful 1968–70 TV series. Genuine psychological horror films from this period include 1944's The Uninvited, and 1945's Dead of Night. Post-modern (1970–present) The 1970s saw screen depictions of ghosts diverge into distinct genres of the romantic and horror. A common", "-31.119935840310063" ], [ "were popularized in the United States by the Hong Kong–produced movies of Bruce Lee and marketed to the same audience targeted by AIP and New World. Horror continued to attract young, independent American directors. As Roger Ebert explained in one 1974 review, \"Horror and exploitation films almost always turn a profit if they're brought in at the right price. So they provide a good starting place for ambitious would-be filmmakers who can't get more conventional projects off the ground.\" The movie under consideration was The Texas Chain Saw Massacre. Made by Tobe Hooper for less than $300,000, it became one", "-31.092361372662708" ], [ "the cinemas by Edgar G. Ulmer's film Beyond the Time Barrier. As a result, many major studios, producers, and stars keep their projects secret. Subgenres Exploitation films may adopt the subject matter and styling of regular film genres, particularly horror films and documentary films, and their themes are sometimes influenced by other so-called exploitative media, such as pulp magazines. They often blur the distinctions between genres by containing elements of two or more genres at a time. Their subgenres are identifiable by the characteristics they use. For example, Doris Wishman's Let Me Die A Woman contains elements of both shock", "-31.060766531561967" ], [ "film paved the way for horror to be used as a vehicle for social commentary. Describing it as \"cheap, grubby and out of control\", Mark Olsen of the Los Angeles Times declared that it \"both defines and entirely supersedes the very notion of the exploitation picture\". In his book Dark Romance: Sexuality in the Horror Film, David Hogan called it \"the most affecting gore thriller of all and, in a broader view, among the most effective horror films ever made ... the driving force of The Texas Chainsaw Massacre is something far more horrible than aberrant sexuality: total insanity.\" According", "-31.053117814736652" ], [ "have also received the film as a comedy horror in a more classic Raimi vein. Vic Holtreman of Screenrant claims the film is a long-awaited movie that combines both genres as Army of Darkness had done. A reviewer at UGO Networks says that the film is very much more a comedy than horror and that this is in keeping with Raimi not having produced a \"true horror\" film since he began directing. Accolades The film was nominated for \"Choice Movie: Horror/Thriller\" at the 2009 Teen Choice Awards, which the film lost to Friday the 13th (2009). At the 2009 Scream", "-31.010128650988918" ], [ "films have used a plethora of genres such as horror (Blade), thriller (Unbreakable), period drama (Captain America: The First Avenger), space opera (Guardians of the Galaxy), family film (The Incredibles), teen film (Spider-Man: Homecoming), heist film (Ant-Man), fantasy (Doctor Strange), neo-noir (The Dark Knight), political drama (Captain America: The Winter Soldier), and Western (Logan).\nMany sequels and spin-offs were also released throughout the decade, including Blade II (2002), X2: X-Men United (2003), Spider-Man 2 (2004), Blade: Trinity (2004), Elektra (2005), X-Men: The Last Stand (2006), TMNT (2007), Spider-Man 3 (2007), Fantastic Four: Rise of the Silver Surfer (2007), Hellboy II:", "-30.933151544126304" ], [ "style can still be seen in science fiction and action films today, as well as in the various James Bond films. \nOther elements of science fiction were carried into the burgeoning horror genre, driven by the massive success of the Universal Studios' Frankenstein and its sequel Bride of Frankenstein. Many Universal Horror films, such as The Invisible Man and Dr. Jekyll and Mr. Hyde prominently featured mad scientists and experiments gone wrong, as did other monster movies like The Vampire Bat, Doctor X, and Dr. Cyclops.\nSequels to successful horror films continued into World War II, and the 1940s also saw", "-30.905382096592803" ], [ "cites titles such as The Guardian (1990), The Crush (1993), The Temp (1993), Hideaway (1995), and Scream (1996). He believes this trend was a result of the studio desire for generic, wide-appeal films.\nMuir believes the film itself was part of another trend of the time. Horror films which were both postmodernist films and self-reflective. Popcorn took inspiration from the history of the horror films, from the 1950s onwards. While Wes Craven's New Nightmare (1994) and In the Mouth of Madness (1995) used metafiction as one of their themes.\nMuir found the films-within-a-film to be more interesting than the frame story. He", "-30.905091022141278" ], [ "so on are non-genre-based film categories.\nLinda Williams argues that horror, melodrama, and pornography all fall into the category of \"body genres\" since they are each designed to elicit physical reactions on the part of viewers. Horror is designed to elicit spine-chilling, white-knuckled, eye-bulging terror; melodramas are designed to make viewers cry after seeing the misfortunes of the onscreen characters; and pornography is designed to elicit sexual arousal. This approach can be extended: comedies make people laugh, tear-jerkers make people cry, feel-good films lift people's spirits and inspiration films provide hope for viewers.\nA genre movie is a film that follows some", "-30.904388166265562" ], [ "films such as Paranormal Activity, The Blair Witch Project, and Ring. Review websites Flickering Myth and Nerdly commented upon these comparisons, as both felt that The Entity suffered from being too overly familiar to pre-existing works. Twitch Film was more positive, writing \"Seasoned horror fans will find nothing new here, being able to guess most of the plot beats; but then again, Peruvian directors are just starting to try their hand at a genre which has been around for a long while. As more of them attempt to scare audiences, they'll hopefully improve on what came before. With its effective", "-30.90177999495063" ], [ "were considered dark melodramas because of their stock characters and emotion-heavy plots that focused on romance, violence, suspense, and sentimentality.\nIn 1923, Universal Pictures started producing films with horror and mostly gothic elements. This would retroactively become the first phase of the studio's Universal Classic Monsters series that would continue for three more decades. Universal Pictures' classic monsters of the 1920s featured hideously deformed characters like Quasimodo, The Phantom, and Gwynplaine.\nThe first film of the series was The Hunchback of Notre Dame (1923) starring Lon Chaney as the hunchback Quasimodo. The film was adapted from the classic French gothic novel of", "-30.86962618457619" ], [ "but with a strong horror content, all starting out from a realistic basis”. The decision to move towards psychological horror came about partly because of the difficulties involved in finding suitable science fiction scripts, partly because the production team felt that their budget could not compete with the glossy fare offered by the likes of 2001: A Space Odyssey and Star Trek (the latter had just begun to be broadcast in the UK at this time), and partly because it was felt that science fiction could not compete with the real-life drama of the Apollo moon landings then occurring.\nAnother major", "-30.853853183434694" ], [ "Sense, and Audition. Psychological horror Psychological horror relies on characters' fears, guilt, beliefs, eerie sound effects, atmosphere, relevant music, emotional instability and at times, the supernatural and ghosts, to build tension, scare and further the plot. Notable psychological horror films include: Repulsion, Rosemary's Baby, The Shining, May, The Silence of the Lambs, Credo, Hide and Seek, Audition, Black Swan, The Changeling, A Tale of Two Sisters, Silent Hill, and The Uninvited. Science fiction horror Science fiction horror revolves around subjects that include but are not limited to killer aliens, mad scientists, and/or experiments gone wrong. Examples include: Frankenstein, Species, Mimic,", "-30.851809649262577" ], [ "containing \"the loopy delights of a cut-rate, over-the-top horror movie\", but questioned their intended tone due to the actors' serious portrayals of their characters. James felt that the show should have embraced \"its silliest, campiest instincts\".", "-30.73253881319397" ], [ "the public.\nOn the other hand, some critics claim that watching violent media content can be cathartic, providings \"acceptable outlets for anti-social impulses.\" Film Graphic violence is used frequently in horror, action, and crime films. Several of these films were banned from certain countries for their violence. The snuff film takes horror to its furthest extreme as torture and murder are not simulated.\nViolence in films is not an old topic, recently a study presented in an annual American Academy of Pediatrics conference showed that the \"good guys\" in superhero movies were on average more violent than the villains, potentially sending a", "-30.692847092985176" ], [ "genre fans long after they have been forgotten by the original audiences. This can be done for authenticity, such as horror fans who seek out now-obscure titles from the 1950s instead of the modern, well-known remakes. Authenticity may also drive fans to deny genre categorization to films perceived as too mainstream or accessible. Authenticity in performance and expertise can drive fan acclaim. Authenticity can also drive fans to decry the mainstream in the form of hostile critics and censors. Especially when promoted by enthusiastic and knowledgeable programmers, choice of venue can be an important part", "-30.64845134934876" ], [ "the film, as he believed that they \"cannot turn the audience fearful\" in what he termed as a \"hardcore horror film\". Ravish Desai has commented that the movie will be the first in a franchise and that planning for further films has already begun.\nBhatt had earlier made films in the same genre, namely - 1920, 1920: Evil Returns and Haunted. In an interview, he had commented, \"While [my] Raaz 3 and 1920 were romantic sagas with songs and full-on drama, this one is more of a Hollywood kind of drama. The horror lies in the story.\" Marketing The promo of", "-30.63691691274289" ], [ "(Fred Astaire and Ginger Rogers films) or budget-based (blockbusters, low budget film), while others are based on artistic status (the art film), racial identity (Race films), location (the Western), or sexual orientation (Queer cinema). Audience expectations Many genres have built-in audiences and corresponding publications that support them, such as magazines and websites. For example, horror films have a well-established fanbase that reads horror magazines such as Fangoria. Films that are difficult to categorize into a genre are often less successful. As such, film genres are also useful in the areas of marketing, film criticism and the analysis of consumption. Hollywood", "-30.635605964809656" ], [ "by such films as JFK (1991), Murder at 1600 (1997), Enemy of the State (1998), State of Play (2009), and Madras Cafe (2013). Horror and thriller In the 1990s and early 2000s, many horror films and thrillers started to blend mystery and suspense into stories centered around clever, sociopathic serial killers or various mysterious supernatural occurrences. The Hannibal Lecter novels by Thomas Harris have inspired four films, Manhunter (1986), the Academy Award-winning The Silence of the Lambs (1991), Hannibal (2001), and Red Dragon (2002).\nOther films in which this blend occurs include When the Bough Breaks (1994), Seven (1995), Kiss the", "-30.520731107062602" ], [ "the series might not be getting the critical attention it deserved because of an \"old elite snobbishness toward lowbrow genres.\" In 2011, he published the non-fiction book Shock Value, which describes how horror films changed in the late 1960s to become more brutal, realistic, and auteur-driven, as opposed to the older, campier films based on Gothic melodrama. The book was an outgrowth of an article he had written for Vanity Fair. He has spoken further about horror films as an interviewee in the 2013 documentary film Birth of the Living Dead, which tracks the legacy of Night of", "-30.483611674571875" ], [ "through 1983. Like the science fiction volume, all known theatrically released films, including those from the silent era, have entries. More than either of the two previous books, the horror volume is international in scope, providing coverage of all films from all countries that have ever produced a horror-related title. The contributors to this volume were Tom Milne, Paul Willemen, Julian Petley, and Tim Pulleine. The writers' specific contributions are not possible to determine, as none of the film reviews are signed. Sixteen pages of color stills are featured in a center insert.\nTim Lucas has acclaimed", "-30.426128439154127" ], [ "and \"New Horror\". These are borrowed from a 1979 Harper's Magazine article written by Ron Rosenbaum. Zinoman defines Old Horror as being campy films focused on stars, while New Horror is more politically aware, realistic, and focused on directors. New Horror also has what Zinoman describes as a \"postmodern sensibility of evil\", where antagonists have no discernible motive. Zinoman says that films like Targets offer commentary on this change-over. Reception Cynthia C. Scott of Bright Lights Film Journal wrote that the book \"lacks the epic scope\" of other New Hollywood histories, but it offers compelling arguments", "-30.420554986176285" ], [ "it.\" Times of India wrote \"The film is a horror comedy, a genre that is very much the trend today, and going by the director's previous film, you expect at least a competently made film that keeps us entertained. But the only thing that we have in store is disappointment.\" Top10cinema wrote \"Definitely, a different horror tale, but lacks engagement.\"", "-30.4167474325659" ], [ "films. In 1960s and 1970s America, exploitation and art films shared audiences and marketing, especially in New York City's grindhouse cinemas. B and genre films Mathijs and Sexton state that genre is an important part of cult films; cult films will often mix, mock, or exaggerate the tropes associated with traditional genres. Science fiction, fantasy, and horror are known for their large and dedicated cult followings; as science fiction films become more popular, fans emphasize non-mainstream and less commercial aspects of it. B films, which are often conflated with exploitation, are as important to cult films as exploitation.", "-30.415868789519664" ], [ "March 2007 in the UK. The film received a nomination for \"Best Feature Film\" at the 2008 Swansea Film Festival. Reception Don Sumner of Best Horror Movies wrote that one can see the \"influences of several other popular movies in the way the film’s story progresses and how the scenes are shot\", making note of influences from Blade, where the protagonist is skilled in martial arts and, Underworld where vampires and werewolves have an eternal malice toward each other. He summarized by writing \"The story is great and engrossing, the characters are interesting and the acting is very good –", "-30.37963264094651" ], [ "horror. Smart, scary, and undeniably beautiful, it will no doubt be considered one of the pinnacles of its genre.\" Chris Alexander from ComingSoon.net wrote: \"There hasn’t been a more effective, disturbing and sensorially pleasing film of this kind since Alejandro Amenabar’s The Others and, like that masterpiece, O’Malley’s artful, lurid and meticulously orchestrated exercise in atmosphere, pretty misery and dread seeps deep under your skin. And it stays there. For keeps.\" Justin Lowe from The Hollywood Reporter wrote: \"finely attuned, atmospheric filmmaking more likely to catch the attention of art house aficionados than dedicated horror fans.\"\nNoel Murray from Los Angeles", "-30.37855991689139" ], [ "\"Bad Movies We Love\". Critical response While the film is technically a drama, many consider it to be an unintentional comedy, with critics skewering the script and performances. Others consider it most likely to be a burlesque, given the stature of the actors involved (ironically, one of the few things critics liked about the film was Berle, a classic comedian in a dramatic role).\nBosley Crowther of The New York Times panned the film, writing, \"Not only is this screen translation of a novel by Richard Sale about a cheapskate Hollywood actor who tries to bludgeon his way to an Academy", "-30.33274758257903" ], [ "Smith argues, on the contrary, that the war film lacks the formal boundaries of a genre like the Western, but that in practice, \"successful and influential\" war films are about modern wars, in particular World War II, with the combination of mobile forces and mass killing. The film scholar Kathryn Kane points out some similarities between the war film genre and the Western. Both genres use opposing concepts like war and peace, civilization and savagery. War films usually frame World War II as a conflict between \"good\" and \"evil\" as represented by the Allied forces and Nazi Germany whereas the", "-30.322882134947577" ], [ "age\" that transformed the genre by having it \"grow up\" while showing that horror can be artistic.\nThe 1970s was an era dominated by American horror films. Unlike the past, which was influenced heavily by European film-makers, Americans breathed a new life into the genre. Modern horror films took the expected roles of characters in the films and changed them.\nThis era changed the usual setting for horror films, using every-day settings. Along with this came a change from focusing on defeating evil every time to having some instances where good fails before succeeding. The critical and popular success of Rosemary's Baby,", "-30.317970980366226" ], [ "lack of substance and a \"one-dimensional\" supporting cast. Bloody Disgusting awarded the film four-and-a-half stars out of five, with the reviewer writing, \"[REC] has it all and is probably one of the best Spanish horror films in recent memory.\" Bloody Disgusting later ranked the film eleventh in their list of the 'Top 20 Horror Films of the Decade', with the article stating: \"Out of all the 'shaky-cam' films... this one is arguably the best.\" In the early 2010s, Time Out conducted a poll with several authors, directors, actors, and critics who have worked within the horror genre to vote for", "-30.31711864002864" ], [ "idea \"of those two things together in one place, people suddenly get very dumb\". \"The horror-comedy genre is the toughest sell in Hollywood\", he said. He noted films Tremors, Slither, Shaun of the Dead, Eight Legged Freaks and The Evil Dead series, and said that while many of those are considered critical and business successes, \"none of them have brought in the megabucks that a simple horror or comedy can.\" In addition, he labeled the Scream franchise as more \"straight-up horror\" than comedy and stated Zombieland's box office performance would determine the horror-comedy genre's current viability.\nDespite other R-rated horror films", "-30.301894257427193" ], [ "stated that it \"provides a more intelligent tale than the genre usually offers\" when comparing it with other horror videos.", "-30.25005471520126" ], [ "horror genre. He dislikes his work being categorized as \"suspense\" or \"supernatural thriller\", preferring the more straightforward genre label. His work has been championed by Stephen King, leading to increased recognition. Adaptations In 2007 Little's short story \"The Washingtonians\" was adapted for the TV show Masters of Horror, becoming the twelfth episode of its second season. Directed by Peter Medak, it significantly lightened the tone of the author's original work, aiming for camp over the short story's dark humour. It was negatively received by critics.\nThat same year The Hollywood Reporter announced that a film adaptation of the novel The Store", "-30.21773544313328" ], [ "the film as an attempt to revitalize the horror genre. He called it a \"loving hate letter\" to the genre, continuing:\n... it's a serious critique of what we love and what we don't about horror movies. I love being scared. I love that mixture of thrill, of horror, that objectification/identification thing of wanting definitely for the people to be all right but at the same time hoping they'll go somewhere dark and face something awful. The things that I don't like are kids acting like idiots, the devolution of the horror movie into torture porn and into a long series", "-30.205877030442934" ], [ "depending on your point of view) into outright softcore pornography. In Creature Feature, a review of the first six movies found much the same, with the third movie being the best of the first six TV Guide states \"It's hard to fathom why this cheap-looking, uninspired series has run so long; perhaps video store buyers and their customers figure that any franchise with this many installments has to have something going for it. But they'd be wrong.\"\nThe series claims to be the longest-running horror movie series. The Amityville Horror (film series) is longer having 18 films, but none", "-30.184390663460363" ], [ "better than with others. For example, crime, sci-fi and romance allow more scope for suspense than screwball comedies or musicals do.\nRomantic thriller in discussion of genres, is more a metagenre that merges two or more genres together. It is different from established and historically specific cinema movements like Gothic horror or Golden Age detective. (thrillers pp. 260 261) A genre works on two levels. First a specific theme exists. Then general relationships, patterns and structural elements are interwoven to the specific theme. This is why there can be a large variety of visual styles and", "-30.131007413408952" ], [ "horror remakes and I am very appreciative that someone took the time to make a movie like this\".\nWildside Cinema found The Remake mildly entertaining, even if it did \"serve up a few tired clichés as well as giving in to some of the very stereotypes this film was attempting to dispel (i.e. horror is all about T&A)\".", "-30.123721277690493" ], [ "United States following the trauma of World War I, film audiences sought to see horror on screen but tempered with humor. The \"pioneering\" comedy horror film was One Exciting Night (1922), written, directed, and produced by D. W. Griffith, who noticed the stage success of the genre and foresaw a cinematic translation. While the film included blackface performances, Griffith also included footage of a hurricane for a climactic storm. As an early experiment, the various genres were not well-balanced with horror and comedy, and later films improved the balance and took more sophisticated approaches. Charles Bramesco of Vulture.com identifies Abbott", "-30.11454682413023" ], [ "The Hollywood Reporter called Us \"a fiercely scary movie whose meaning is up for grabs\".\nRichard Brody of The New Yorker called the film a \"colossal achievement,\" writing that, \"Us is a horror film—though saying so is like offering a reminder that The Godfather is a gangster film or that 2001: A Space Odyssey is science fiction. Genre is irrelevant to the merits of a film, whether its conventions are followed or defied; what matters is that Peele cites the tropes and precedents of horror in order to deeply root his film in the terrain of pop culture—and then to pull", "-30.11176370299654" ], [ "unusual among horror films, such as the sight of a corpse draped over a tombstone in the opening sequence. Mike Emery of The Austin Chronicle praised the film's \"subtle touches\"—such as radio broadcasts heard in the background describing grisly murders around Texas—and said that what made it so dreadful was that it never strayed too far from potential reality.\nIt has often been described as one of the scariest films of all time. Rex Reed called it the most terrifying film he had ever seen. Empire described it as \"the most purely horrifying horror movie ever made\" and called it \"never", "-30.107512370566837" ], [ "Rue Morgue Digital criticized the film's look and story, saying that \"the horror content consists largely of poorly shot action that is sometimes so underlit that you can’t tell what’s going on\" and \"Death House’s only value is as a game of Spot-the-Celebrity - which at least provides a distraction from the tackiness of the plotting and filmmaking.\" In contrast, Michelle Swope of Dread Central rated the film 4.5 out of 5 stars, admitting \"Not all of the performances are standout, but the bloody pandemonium and creative writing make this a damn good movie worthy of becoming a cult favorite.\"", "-30.105201117461547" ], [ "but the treatment (especially the performances) is serious to the point of solemnity.\"\nHeilman praises the film, describing it as a \"solid B-movie effort\", \"slyly humorous\" and \"disturbing\". He argues that – partly by necessity, due to its low budget – Prey is more \"character-driven\" than most other science-fiction horror films, and praises the sustained tension and \"distinctive\" dynamics of the plot. His one major criticism is the cinematography and editing, which he considers \"less than expertly done\"; the drowning scene, for example, is prolonged \"to the point of unintentional hilarity\". Newman and James Marriott, authors of Horror! The Definitive Companion", "-30.10135528392857" ], [ "films (the Nightmare on Elm Street or Evil Dead films in particular) tend to be broadly comic.\" Newman noted that the film \"suffers from a few minor compromises: notably a decision made fairly late in shooting to change the specifically English setting for an ambiguous (and unbelievable) mid-Atlantic one.\" Newman also noted that the Cenobites were \"well used suggestive figures\" but \"their monster companion is a more blunderingly obvious concession to the gross-out tastes of the teenage drive-in audience\". Newman concluded that the film was \"a return to the cutting edge of horror cinema\" and that in more gruesome moments", "-30.101293556916062" ], [ "sci-fi horror picture is tailor-made for people who hate video games.\" Beyond Hollywood wrote that the film's budget limitations and technological ignorance make it \"at best silly, and at worst pure crap\". Adam Tyner of DVD Talk rated it 2/5 stars and concluded, \"It's not an awful movie, after all...just a decidedly lackluster one.\"", "-30.082850290229544" ], [ "stated, \"I have a macabre sense of humor. A lot of the things in the movie that are horrifying are funny to me.\" Feeling that \"comedy films and horror films are kind of similar\" due to being films where you can significantly gauge intense reactions from the audience, Cody stated, \"They're laughing, they're screaming, it's not a passive experience. So, I actually think comedy and horror are kind of similar in that way.\" Design and effects Handling the film's special effects were KNB EFX GROUP and the Moving Picture Company (MPC). For Jennifer's demonic form, the creators used different techniques.", "-30.066191191683174" ], [ "average in terms of the horror films released during that time, while also stating that the film was \"not that great in the bigger picture\". Will Brownridge from The Film Reel commended the film's villain as being \"creepy\", characters, and gore. However, Brownridge criticized the film's storyline, and plot twist, which he felt was \"stupid\". Ian Jane from Rock! Shock! Pop! stated that the film was \"not particularly original, and at times, it’s border line dumb\".", "-30.061800874092114" ], [ "and they like to watch horror movies because they make them feel excited, thrilled and terrified\".\nBetween 2004 and 2006, the domestic producers made nearly 20 horror films per year. Since 2004, almost 50% of Khmer films were of the horror genre. The most prolific producers of these horror films were FCI Production and Campro Production, a company founded in 2003 by young producer and computer entrepreneur Heng Tola and several friends. Although Campro Production closed in 2007, these two companies provided the Cambodian market over 15 horror films as of 2011. Budgets were typically very small and special effects were", "-30.018397177569568" ], [ "in particular of horror films, Japanese cinema, and Chinese cinema.", "-29.985184019169537" ], [ "Dark House (2014 film) Reception Critical reception for Dark House has been predominantly negative and the film holds a rating of 11% on review aggregate Rotten Tomatoes, with an average rating of 2.8/10, based on 11 reviews. The New York Times and The Hollywood Reporter both panned the film, with the latter stating that \"The generic title is not even the most unimaginative element of this overstuffed, cliche-ridden horror film.\" Nerdist News also criticized the film, as they felt that it contained too many elements that \"merely clutters up a film that might find more power in being simple.\" As", "-29.979685061698547" ], [ "'r Treat, Krampus, and All Through the House. Horror adventure Horror adventure blends expeditions, exploration, exotic places and other adventure elements in a horror setting. Examples include: King Kong, The Descent, Silent Hill, Jaws, Cannibal Holocaust, and Anaconda. Horror drama Horror drama focuses on imperiled characters dealing with realistic emotional struggles, often involving dysfunctional family relations, in a horror setting. The film's horror elements often serve as a backdrop to an unraveling dramatic plot. Examples include: Dark Water, The Exorcism of Emily Rose, Lights Out, The Babadook, The Fly, It, Let the Right One In, Antichrist, Excision, Mama, The Sixth", "-29.956196387822274" ], [ "and producers’ eyes is one obvious effect on our society.\nHorror films' income expansion is only the first sign of the influences of horror flicks. The role of women and how women see themselves in the movie industry has been altered by the horror genre. Early horror films such as My Bloody Valentine (1981), Halloween (1978), and Friday the 13th (1980) were produced mostly for male audiences in order to \"feed the fantasies of young men\". This idea is no longer prevalent in horror films, as women have become not only the main audience and fans of horror films but also", "-29.92619376987568" ], [ "horror films whose implications are not so much ideological as psychological and existential: Shivers (1975), Rabid (1977), and The Brood (1979) all involve a degree of self-reflexiveness that, as William Paul points out, \"makes Cronenberg's status as a genre director somewhat odd.... His works foreground their meaningfulness in a way that is unusual for the horror film.\" An Easy Rider with conceptual rigor, the movie that most clearly presaged the way in which exploitation content and artistic treatment would be combined in modestly budgeted films of later years was the biker-themed Electra Glide in Blue (1973), a United Artists release", "-29.887547837395687" ], [ "a world of lively lowlifes to reflect how dull other movies had become. And that, I predict, will be the ultimate honor for Pulp Fiction. Like all great films, it criticizes other movies.\nKen Dancyger writes that its \"imitative and innovative style\" – like that of its predecessor, Reservoir Dogs – represents\na new phenomenon, the movie whose style is created from the context of movie life rather than real life. The consequence is twofold – the presumption of deep knowledge on the part of the audience of those forms such as the gangster films or Westerns, horror films or adventure films. And that the", "-29.877454438072164" ], [ "horror,\" and while it in some parts is so, it actually comes off as \"a thoughtful dramatic meditation on the seamier side of exploitation horror production, and the people who are involved in it.\" They expanded that the dual themes presented in this manner \"don't mesh very well, and leave us with two disparate halves that don't work as well as they should.\" They also noted that there is genuine humor within the film, and a \"lot of good performances.\" In their being able to draw from personal experiences, filmmakers Byron Thames, Larry Thomas and James Vallo were \"quite", "-29.86171998316422" ], [ "bad it's good\" films have a future now that people have such diverse options in both availability and catalog, though fans eager to experience the worst films ever made can lead to lucrative showings for local theaters and merchandisers. Camp and guilty pleasures Chuck Kleinhans states that the difference between a guilty pleasure and a cult film can be as simple as the number of fans; David Church raises the question of how many people it takes to form a cult following, especially now that home video makes fans difficult to count. As these cult films become more popular,", "-29.842806452215882" ], [ "situations (which, in general, they did not cause but are responsible for exacerbating), striving against random, uncaring fate, and frequently doomed. The films are seen as depicting a world that is inherently corrupt. Classic film noir has been associated by many critics with the American social landscape of the era—in particular, with a sense of heightened anxiety and alienation that is said to have followed World War II. In author Nicholas Christopher's opinion, \"it is as if the war, and the social eruptions in its aftermath, unleashed demons that had been bottled up in the national psyche.\" Film noirs, especially", "-29.83407980314223" ], [ "noted that while \"[there] is plenty of humour and monster fun, [the] horrific elements are remarkably potent for a family film, with gory violence, chills and suspense.\" Reviewer Chris Sims downplayed the violent aspects of the film, however, stating that \"[as] strange as the movie and its weird monsters might seem, when you get right down to it it’s no more bizarre than the fairy tales we’re all used to on this side of the Pacific, right down to our stories of cursed spinning wheels and hair-accessible towers, and really, the themes are just as universal.\" Influence and legacy", "-29.832244877616176" ] ]
51tgax
Why does using data on phones cost so much money?
[ "One reason is because they can - they control your ability to connect to the internet from almost wherever you want, so they can charge more for it than you would pay for home internet. Another reason is that it costs them a fair bit of money to build and maintain that network, so the cost gets passed on to you, the customer.", "It all boils down to supply and demand. If you're out of the house and need to connect to the internet you have two options: Connect to a random WiFi network (which takes time and there might not be one available) or use mobile data. Therefore the added value of the mobile data is efficiency. People will be able to pay more for there internet access as it is convenient and can be used anywhere. (High demand and low supply due to lack of WiFi networks)", "Two reasons: (1). It's what the market will bear. (2). There's actually a physical limit to the amount of data which can be transmitted at any given time, which creates a finite supply over the course of a week or month, which is apportioned (albeit less than efficiently) via data plans and the expense of them. So, this gets a bit technical, so if you're actually interested let me know and I'll go more into detail (including a suit by a company trying to use an unused part of of the electromagnetic spectrum against GPS manufacturers over the issues I'm going to try to explain). So, all phone data relies on transmission using electromagnetic waves. The simplest analogy would be to FM radio. Notice how the stations are separated on your dial (if you have a station on 99.5 you would put another at 99.7 or 99.8 not at 99.6)? If you ever tune to the frequency between you might notice that you hear part of the nearby station, but it's weak and often garbled. This is because of what's called \"out of band emissions.\" Basically, because electromagnetic waves are waves, the actual station (99.5 in our example) is the crest. But it flows out in both directions, with part of the wave going into 99.4 and part in 99.6. 99.5 would be the station's \"band\", and the spill-over would be OBE. So what would happen if you put another station at 99.6? Well it wouldn't be a good signal, it would be interfered with by the station at 99.5. There are ways to compensate for this (a lot of research is going into limiting out of hand emissions and making phones more sensitive to picking up data from a smaller band), but fundamentally that means that within a given part of the \"spectrum\" (basically all of the wavelengths for electromagnetic waves) there are a maximum number of stations which can effectively be used. So if I sold you the rights to use all of the spectrum between 99.0 and 100.1, how many stations could you effectively use? About 5. So now you have to decide how to apportion time on those stations for various broadcasts. Those broadcasts are the data your customers are using, and given that you have a finite amount to sell, you're going to sell it for a lot.", "Because that is how much you will pay. The price of something often has little to do with the cost.", "Just to confirm, you're asking about US? Data doesn't cost much at all in most countries afaik.", "In the US, the primary cause is scarcity, and the one limiting factor for wireless carriers is access to the wireless spectrum. (Source: I've deployed GSM networks) In much the same way your ISP provides you with a limited amount of bandwidth, the throughput of a wireless connection is also limited, and the total area being served by a cellular broadcast tower needs to be divided up between all the people who wish to use it. Compared to voice calls and many other wireless users, cellular data is bandwidth-intensive, and require large portions of spectrum to transmit data at high speeds. The highest-capacity towers are serving up at most a few hundred MB of total capacity. For many of us, this capacity isn't much greater than our home WIFI. When cellular communication hit the market, the FCC had already reserved the rights to the best parts of the wireless spectrum for radio, television, government, industrial, or medical use (which could be best utilized by cheap, reliable hardware). So, wireless companies bid on whatever portions of the spectrum they can get their hands on (which also drives up the prices). Some of these portions of the spectrum required new or specialized (and more expensive equipment) to operate. For example, in 2008, the rights to use the 700mhz spectrum was auctioned for about $12B US. I believe the networks who were able to secure the largest portions of usage rights in this deal, at best, doubled their capacity in some areas. Also, there is effectively an upper-limit to the portion of the spectrum that can be used for mobile communication devices. In order to maximize battery life, cell phones need to transmit at very low power. And, at lower wattages, lower-frequency signals will have an advantage, attenuating at a much slower rate, and traveling much farther. The only real option available now to combat the high cost of the wireless spectrum is to deploy smaller cell towers more densely, which each cover a much smaller area. If the area was reduced significantly, new portions of the spectrum would be available at higher frequencies, and low-power broadcast would still be feasible, since the total broadcast distance is reduced. Prices are not likely to come down any time soon. However, advances in battery technology or the mass deployment of very small (pico) cell towers could one day dramatically reduce costs. TLDR; Not all portions of the wireless spectrum are “created” equally, and demand is very high for the best parts of it. This is driving up prices, and activities which utilize it the heaviest (such as wireless data), are forced to pay a premium for it." ]
[ [ "for unused data is credited back to the user's account, while overuse of data results in a charge of $10 per gigabyte. When outside the United States, cellular phone calls cost $0.20 per minute, data costs the same $10 per gigabyte (i.e. there are no extra data charges outside of the US), and texting is free. Data is free at full speeds between 6GB to 15GB for the duration of the billing cycle with Bill Protection. After 15GB, data continues to be free but will be throttled to unspecified speeds. A data-only SIM card can be used on", "-31.750522519290826" ], [ "boost the amount of data which you can use on your mobile phone. The rate at which you use your data can also be monitored, so you know how much data you have left. Mobile data is a service which provides a similar service to Wi-Fi and allows you to connect to the Internet. So the purpose of a data pack is to increase the amount of data that your mobile has access to. An example of a mobile data pack can be found on the references.", "-28.83698721757537" ], [ "the data acquisition through mobile phones holds more difficulties. On one hand there are high costs for Incentives and an intensive recruitment by the institutes. On the other hand, the participants of the survey have to pay the costs for the internet usage via mobile phone. However, more and more respondents do not pay the internet access based on the time spent on Internet and more and more places proposes free Wi-Fi, making this issue less and less relevant for respondents. Additionally, there are also technical difficulties that may occur. The high number of different and not-compatible software or the", "-28.68827691246406" ], [ "a comparison, a one-minute phone call uses up the same amount of network capacity as 600 text messages, meaning that if the same cost-per-traffic formula were applied to phone calls, cell phone calls would cost $120 per minute. With service providers gaining more customers and expanding their capacity, their overhead costs should be decreasing, not increasing. In 2005, text messaging generated nearly 70 billion dollars in revenue, as reported by Gartner, industry analysts, three times as much as Hollywood box office sales in 2005. World figures showed that over a trillion text messages were sent in 2005.\nAlthough major", "-28.62494715221692" ], [ " not utilizing a mobile phone) in order to reduce their data footprint. Despite this, such tactics would only minimize and not eliminate their collectable data.\nPrivacy concerns are raised where the data collected may be capable of linking to or identifying an individual, particularly when collated from multiple information sources. The storage of data by governments remains opaque, while the potential for cross-sharing data across government services often means that data is accessible by parties that the provider did not intend to share the data with. By mere participation as a member of an urban community, particularly through the use", "-28.168425986388684" ], [ "personal data via smartphones have received a large amount of attention from different stakeholders. A large body of computer science research aims to efficiently and accurately analyze how sensitive personal data (e.g. geolocation, user accounts) flows across the app and when it flows out of the phone.\nContextual integrity has been widely referred to when trying to understand the privacy concerns of the objective data flow traces. For example, Primal et al. argued that smartphone permissions would be more efficient if it only prompts the user \"when an application’s access to sensitive data is likely to defy expectations\", and they examined", "-27.748727397745824" ], [ "communication applications including email, instant messaging and social media platforms.\nTelecommunications service providers have responded to the increasing use of these devices and applications with new business practices, selling their services to customers on the basis of monthly data volumes. Consequently, they no longer need to store information surrounding individual communications to accurately bill customers. Some providers only retain the details of the amount of data sent for their billing purposes.\nPrior to the Act, the retention period for IP-based data is volatile; data is typically stored for only a number of weeks or months. As technology evolves, all historical telecommunications data", "-27.339141115255188" ], [ "ever be published. Access to data is limited to the academic research team who are required to sign strict non-disclosure agreements. Background Mobile phones have been in widespread use for a relatively short period of time. There are currently more than six billion users of mobile phones worldwide and in the UK there are over 70 million mobile phone devices in use. It is important for current users, and for future generations, to find out whether there are any possible long-term health effects from this new and widespread technology.\nMany reviews have concluded that there is no convincing evidence to date", "-27.299177935288753" ], [ "information equivalent of 6 newspapers per person per day). In the 1990s, the spread of the Internet caused a sudden leap in access to and ability to share information in businesses and homes globally. Technology was developing so quickly that a computer costing $3000 in 1997 would cost $2000 two years later and $1000 the following year. Computation The world's technological capacity to compute information with humanly guided general-purpose computers grew from 3.0 × 10⁸ MIPS in 1986, to 4.4 × 10⁹ MIPS in 1993, 2.9 × 10¹¹ MIPS in 2000 to 6.4 × 10¹² MIPS in 2007. An", "-26.899311628854775" ], [ "service). Once that data limit is reached, the customer has to recharge the service using a prepaid card at a rate of approximately US$10/Gbyte. There is an alternative monthly billing plan that offers 2 Mbit/s down and 512 Mbit/s up with a 5 Gbyte data cap for US$15, plus US$10 for each additional Gbyte (up to 5 Gbyte). There is no unlimited data plan, which limits this technology's ability to compete in the non-residential fixed wireless space against vendors like Dedicado. Mobile wireless Internet access via cell phone networks is probably the most vibrant and competitive Internet marketplace in Uruguay.", "-26.858421427285066" ], [ "which they would pay US$48,000,000 for failing to disclose restrictions on their unlimited data plans. Justification U.S. internet service providers have most recently asserted that data caps are needed in order to provide \"fair\", tiered services at different price points based on speed and usage.\nIn 2016, Sonic.net CEO Dane Jasper criticized the historical assertions that data caps are meant to conserve network capacity, arguing that the cost of actually delivering service had \"declined much faster than the increase in data traffic\". When Sonic was first established in 2008, its infrastructure costs were equivalent to 20% of its revenue, but these", "-26.78152661643162" ], [ "service providers are transparently converting the signals to digital signals for transmission. The advantage of this is that digitized voice data can travel side-by-side with data from the Internet and can be perfectly reproduced in long distance communication (as opposed to analog signals that are inevitably impacted by noise).\nMobile phones have had a significant impact on telephone networks. Mobile phone subscriptions now outnumber fixed-line subscriptions in many markets. Sales of mobile phones in 2005 totalled 816.6 million with that figure being almost equally shared amongst the markets of Asia/Pacific (204 m), Western Europe (164 m), CEMEA (Central Europe, the Middle East", "-26.680688743159408" ], [ "the phones can be denied, and the monitoring data locked away. However, phones are expensive; are vulnerable to damage and technical issues; necessitate additional training - not least due to rapid technological change; phone charging can be a challenge (especially under thick forest canopies); and uploading data for analysis is difficult in areas without network connections.", "-26.4721207129478" ], [ "available as well. Data Plans In December 2007 the BBC reported a customer with a $7/month unlimited mobile browser plan received a $85,000 bill. The customer had used his phone as a wireless modem for his computer, and so data transferred was not included under the customer's unlimited mobile browser plan. Bell Mobility now releases in detail acceptable data usage in the terms of service. The BBC reported \"Canadians complain that their mobile phone charges are much higher for comparable service in the United States\". Text Messaging In July 2008, along with Telus Mobility Bell introduced charges of 15¢", "-26.338238620519405" ], [ "speed of access to data, slowing down the user's internet use. By region As of October 2015, there were 58 wired broadband providers in the US that used data caps, among them major wireless cell phone providers such as Verizon Wireless and AT&T.\nBefore 2010 there was a trend of providing unlimited data without bandwidth throttling. In the United States the Federal Communications Commission has fined service providers for offering unlimited data in a way that misled consumers. In June 2015, the FCC fined AT&T Mobility US$100,000,000 for misleading consumers. In October 2016 the FCC reached a settlement with T-Mobile in", "-26.14817791225505" ], [ "data users On August 31, 2015, T-Mobile announced it will ask users who abuse its unlimited on-smartphone data plan by violating T-Mobile's Terms & Conditions regarding tethering (which like unlimited on-smartphone data, remains unlimited, but offers a 14 GB high speed allotment before throttling takes effect), by permanently removing user access to unlimited plans and migrating users to a tiered data plan. By doing so, all plans after a select amount of inclusive high-speed data, result in automatic throttled speeds, preventing unlimited high-speed tethering use and abuse of the network. T-Mobile stated that there are a small handful of users", "-26.0552952876169" ], [ "to more commonly access a data pool online with a trove of information. This information is now easily accessible from a Smartphone which can connect people from anywhere at any time. In the 21st century Digital technology plays an important role in 21st century life. In the United States, nearly two-thirds of people own smartphones. Using social networking services and online forums, people are able to communicate with other users, regardless of geographic region or time constraints. The rise of this type of interaction partly explains the significant increase in phone use in younger people, and mobile technology is mainly", "-25.978720500541385" ], [ "is used for pattern-of-life analysis. U.S. persons are not exempt because metadata are not considered data under US law (section 702 of the FISA Amendments Act). Its equivalent for phone records is MAINWAY. The NSA records SMS and similar text messages worldwide through DISHFIRE. Leveraging commercial data retention Various United States agencies leverage the (voluntary) data retention practised by many U.S. commercial organizations through programs such as PRISM and MUSCULAR.\nAmazon is known to retain extensive data on customer transactions. Google is also known to retain data on searches, and other transactions. If a company is based in the United States", "-25.923409642651677" ], [ "program, the NSA paid telecommunications companies between 9 and 95 million dollars in order to collect data from them. While companies such as Google and Yahoo! claim that they do not provide \"direct access\" from their servers to the NSA unless under a court order, the NSA had access to emails, phone calls and cellular data users. Under this new ruling, telecommunications companies maintain bulk user metadata on their servers for at least 18 months, to be provided upon request to the NSA. This ruling made the mass storage of specific phone records at NSA datacenters illegal, but it did", "-25.86295664599311" ], [ "users carry over unused high-speed data usage for up to one year. The feature applies to customers of eligible post-paid plans who purchase qualifying amounts of additional high-speed data. On March 16, 2015, T-Mobile announced that Data Stash would be extended to Simple Choice prepaid customers. Un-Carrier for Business (Un-carrier 9.0) On March 18, 2015, T-Mobile announced their Uncarrier 9.0 initiative. Called Un-carrier for Business, it brings a simple pricing structure to business customers where \"every line comes with unlimited talk and text, as well as 1GB of data and depending on how many lines you get, the price you", "-25.75044211831846" ], [ "the latter providing access for 19 percent of users in 2007). The rate of ownership of computers is low (2.4 units per 100 inhabitants), and Internet usage in homes is moderate, accounting for 41.6 percent of the total usage for 2007, up from 36.4 percent in 2006. For connectivity, some individual subscribers rely on mobile telephony, though access remains expensive, with most using dial-up services as their primary means. Official survey results for 2007 indicate that economic and educational barriers are the main contributing factors for these low figures, with 31.4 percent blaming the high cost of computer equipment and", "-25.38613677622925" ], [ "Mobile database Mobile computing devices (e.g., smartphones and PDAs) store and share data over a mobile network, or a database which is actually stored by the mobile device. This could be a list of contacts, price information, distance travelled, or any other information.\nMany applications require the ability to download information from an information repository and operate on this information even when out of range or disconnected. An example of this is your contacts and calendar on the phone. In this scenario, a user would require access to update information from files in the home directories on a server or", "-25.315626248178887" ], [ "low transmission rate of data are just a few to name. In order to improve the respondents' experience in answering the web surveys on mobile devices, optimizing the layout of the survey for smaller screen is crucial: non-optimized layouts lead to lower data quality.\nRestrictions concerning the reveal and passing on of mobile phone numbers (because of data protection and the lack of Anonymity) are setting limits to the research in this field of study, too. Advantages and possibilities of mobile market research Statistical methods in the mobile market research profit from the fact that they do not depend on place", "-25.294967026529775" ], [ "rubles, which is projected to cause 30–40% drop in online number of purchases. Cell service operators will need 2.2 trillion rubles to comply, which will cause a two- or threefold rise in the cost of mobile services for the consumer. Edward Snowden estimated the combined cost of implementation to be 33 billion dollars and predicted that the overall security levels will be unaffected, despite giant affiliated costs.\nAfter Putin signed the law, it turned out that equipment that is needed to store all the data is non-existent not only in Russia, but in the world. Because of that Putin has issued", "-25.2935760841101" ], [ "[telephone] calls each year\". International Data Corporation estimates that approximately 160 exabytes of digital information were created, captured, and replicated worldwide in 2006. Research from the University of Southern California estimates that the amount of data stored in the world by 2007 was 295 exabytes and the amount of information shared on two-way communications technology, such as cell phones, in 2007 as 65 exabytes. Library of Congress The content of the Library of Congress is commonly estimated to hold 10 terabytes of data in all printed material. Recent estimates of the size including audio, video, and digital materials start at 3 petabytes", "-25.18135181767866" ], [ "Mobility, along with most other service providers, charges texters 20 cents per message if they do not have a messaging plan or if they have exceeded their allotted number of texts. Given that an SMS message is at most 160 bytes in size, this cost scales to a cost of $1,310 per megabyte sent via text message. This is in sharp contrast with the price of unlimited data plans offered by the same carriers, which allow the transmission of hundreds of megabytes of data for monthly prices of about $15 to $45 in addition to a voice plan. As", "-25.143226029245852" ], [ "bill protection which caps the charge for data at $60. If the data used is greater than 15 GB, then Fi may slow the data speed to 256 kbps. The user can avoid the slowdown by paying full price for the data used at $10 per GB. Bill protection also works with group plans, with a maximum charge of $85 for two people, $120 for three people, and $140 for four people. The rate for unlimited calls and texting is not affected by bill protection. Features Google Fi automatically switches between networks depending on signal strength and speed. It can automatically connect", "-25.127687893545954" ], [ "for data collection has advantages over paper-based systems. The advantages include that very little equipment need be carried on a survey, a large amount and variety of data can be stored (geographical locations, photos and audio, as well as data entered onto monitoring forms) and data can be shared rapidly for analysis without transcription errors. The use of smartphones can incentivise young people to get involved in monitoring, sparking an interest in conservation. Some apps are especially designed to be usable by illiterate monitors. If local people risk threats or violence by monitoring illegal activities, the true purpose of", "-25.083565647393698" ], [ "predictions based on trends. Real-time data gives value because you can act instantaneously.\nHow much are tech services such as a search engine, a communications channel and a digital map actually worth, for example in dollars? The difference in value between the services facilitated by tech companies and the equity value of these tech companies is the difference in the exchange rate offered to the citizen and the 'market rate' of the value of their data. Scientifically there are many holes to be picked in this rudimentary calculation: the financial figures of tax evading companies are unreliable, would revenue or profit", "-25.07631739331555" ], [ "most consumers are eager to enjoy their latest computers, televisions, cellular phones, iPods, and electronic games, few relate the declining prices of these and other electronic technologies to the labor of Third World women, who are paid pennies a day. Fewer still realize that the amazingly powerful microprocessors and superminiaturized, high-capacity memory devices harm the workers who produce them and pollute the surrounding communities' air and water\". Comments on the book Sandra Steingraber calls this book \"essential reading for anyone who owns a cell phone or a computer\" and says \"our digital possessions connect us not only to global information", "-25.075178003462497" ], [ "modem, or smartphone.\nUnlimited mobile Internet access is only available on feature phones. It is no longer possible to pay per month for such access, as only daily and weekly Internet add-ons are unlimited. Smartphone add-ons, except for those BlackBerry-related, can be used on a feature phone.\nSmartphones can browse the Internet with a tiered add-on. This includes 100 MB for $10 and 2 GB for $25. If this allowance is exceeded, usage-based billing begins, costing $5 for an amount equivalent to that initially included with the add-on.\nUnique BlackBerry Internet Service options are available for BlackBerry smartphones. ", "-25.065169531910215" ], [ "increasing concerns that personal data is being collected even if users are not logged in or not using the services. The data is collected to target users with tailored advertising services. Concerns over unauthorized data collection and use has resulted in many users stopping using Facebook or moving to other social media platforms, with increasing call for broad privacy regulation from the government, including the ability for users opt out of data collection completely.", "-25.05960731234518" ], [ "how applications were accessing personal data and the gap between the current practice and users' expectations. Lin et al. demonstrated multiple problematic personal data use cases due to the violation of users' expectations. Among them, using personal data for mobile advertising purposes became the most problematic one. Most users were unaware of the implicit data collection behavior and found it unpleasantly surprising when researchers informed them of this behavior.\nThe idea of contextual integrity has also infiltrated the design of the system. Both iOS and Android are using a permission system to help developers manage their access to sensitive resources (e.g.", "-24.959881971066352" ], [ "when some of the profitable datasets were not included - withheld for the counter-argument that if licensees do not pay for OS data collection then the government would have to be willing to foot a £30m p.a. bill, to obtain the future economic benefit of sharing the highly detailed mapping produced by the UK's national agency.\nThe files have been cached on the MySociety website for convenient download. They can also be found on the OS website alongside their commercial data.\nJune 2010 saw Transport for London release a substantial amount of its data for free reuse, even in commercial settings. This", "-24.698038771544816" ], [ "of $1.50/MB (equal to $1536/GB) apply. Such charges also apply for unintended Internet usage, whether the user accidentally accesses the Internet or whether an application accesses the Internet without asking permission. Most (but not all) phones let the owner completely disable mobile Internet access on the phone by making a small settings change.\nCustomers using mobile Internet on Mobilicity must follow the operator's Fair Use Policy, which prohibits \"causing network instability\", as well as illegal \"copyright-protected or patent-protected material\" transferred without the owner's permission. Those who breach the Fair Use Policy may face consequences, such as throttled Internet", "-24.58592093110201" ], [ "be more appropriate, how do you define an active user, you need a large number of individuals for the data to be valuable, would there be a tiered price for different people in different countries, not all Google revenue is from Gmail, etc. Although these calculations are undeniably crude, the exercise serves to make the monetary value of data more tangible. Another approach is to find the data trading rates in the black market. RSA publishes a yearly cybersecurity shopping list that takes this approach.\nThe examples given only cover specific cases, but if we extend profits from data sales to", "-24.582291481783614" ], [ "used for voice calls, texting, email, Global Positioning System (GPS) and mobile TV almost instantly via MediaFLO (which is an extra $15 per month with or without the Verizon Wireless \"VPak\"). A data plan for V-Cast enabled phones without VPak charges for any data are $1.99 per MB. The camera can record videos up to 30 seconds to be sent in an MMS, or the setting can be altered to record videos up to the limit of available memory, which cannot be sent through messaging via the phone.\nThe Voyager has been subsequently removed from Verizon stores and online store and", "-24.57427187518624" ], [ "areas this distance might well be in region of a few kilometers. Therefore, there is varying degree of accuracy when it comes to locating a person using cell phone data. These datasets are anonymized by the phone companies so as to hide and protect the identity of actual users. As example of its usage, researchers used the trajectory of 100,000 cell phone users within a period of six months, while in much larger scale trajectories of three million cell phone users were analyzed.\nGPS data are usually much more accurate even though they usually are, because of privacy concerns,", "-24.54511454553358" ], [ "not free of charge, however, payment for the information occurs only after downloading / reading this information. The main reason for this approach is to overcome the natural block that has any user who should pay for the information / content without the detail knowledge of this information upfront. The author (Radomir Adamek) of this principle assumed that this model will become usual for most applications working with paid content.", "-24.499566458558547" ], [ "effective capacity to exchange information through telecommunication networks was 281 petabytes in 1986, 471 petabytes in 1993, 2.2 exabytes in 2000, 65 exabytes in 2007 and predictions put the amount of internet traffic at 667 exabytes annually by 2014. According to one estimate, one-third of the globally stored information is in the form of alphanumeric text and still image data, which is the format most useful for most big data applications. This also shows the potential of yet unused data (i.e. in the form of video and audio content).\nWhile many vendors offer off-the-shelf solutions for big data, experts recommend the", "-24.499477156670764" ], [ "it is possible to obtain used handsets for the Thuraya, Iridium, and Globalstar networks for approximately US$200, the newest handsets are quite expensive. The Iridium 9505A, released in 2001, sold in March 2010 for over US$1,000. Satellite phones are purpose-built for one particular network and cannot be switched to other networks. The price of handsets varies with network performance. If a satellite phone provider encounters trouble with its network, handset prices will fall, then increase once new satellites are launched. Similarly, handset prices will increase when calling rates are reduced.\nAmong the most expensive satellite phones are BGAN terminals, often costing", "-24.483479161877767" ], [ "users are projected to access online video content via mobile device. Mobile video revenue consists of pay-per-view downloads, advertising and subscriptions. As of 2013, worldwide mobile phone Internet user penetration was 73.4%. In 2017, figures suggest that more than 90% of Internet users will access online content through their phones. Strategies There are two basic strategies for engaging the social media as marketing tools: Passive approach Social media can be a useful source of market information and a way to hear customer perspectives. Blogs, content communities, and forums are platforms where individuals share their reviews and recommendations of brands, products,", "-24.479940974269994" ], [ "than any other mobile handset. According to Deutsche Telekom CEO René Obermann, \"The average Internet usage for an iPhone customer is more than 100 megabytes. This is 30 times the use for our average contract-based consumer customers.\" Nielsen found that 98% of iPhone users use data services, and 88% use the internet. In China, the iPhone 3G and iPhone 3GS were built and distributed without Wi-Fi.\nWith the introduction of the Verizon iPhone in January 2011, the issue of using internet while on the phone was brought to the public's attention. Under the two U.S. carriers, internet and phone could be used", "-24.386037271611713" ], [ "because of this quality, the U.S. court systems consider machine-generated data as highly reliable.\nMachine-generated data is the lifeblood of the Internet of Things (IoT). Growth In 2009, Gartner published that data will grow by 650% over the following five years. Most of the growth in data is the byproduct of machine-generated data. IDC estimated that in 2020, there will be 26 times more connected things than people. Wikibon issued a forecast of $514 billion to be spent on the Industrial Internet in 2020. Processing Given the fairly static yet voluminous nature of machine-generated data, data owners rely on highly", "-24.35594444002345" ], [ "the exchange rate and can only enter one currency at a time, something which is very basic in comparison to today's mobile devices. Finally, the Nokia 8810 has a calendar which allows the user to store notes as well as make appointments for meetings and birthdays. The user can also use the infrared technology within the phone to send and exchange information between a computer or even another Nokia device. Other features The Nokia 8810 weighs 118 g with the standard battery and 98 g with the lithium battery. Its dimensions are 107×46×18 mm. The phone contains a few extra features:", "-24.350928861415014" ], [ "may still collect your information to do things other than serve you targeted ads, like build databases about you to send you marketing or to sell to third parties\". Abnormal data usage Many users reported a higher-than-normal data usage after upgrading to iOS 6, causing some to be heavily billed for data largely exceeding their data plan. Steve Rosenbaum of The Huffington Post wrote that \"The bug is the result of an iOS 6 problem that connects the phone to the cellular data network whenever the phone is connected to a WiFi signal\", and also stated that Apple had released", "-24.350870864996978" ], [ "in its programmes. Since October 2007 telecommunication companies have been required to keep records of phone calls and text messages for twelve months under the European Union's Data Retention Directive. Though all telecoms firms already keep data for a period, the regulations are designed to ensure a uniform approach across the industry. This has enabled the Government and other selected authorities within the UK such as Police and Councils amongst others to monitor all phone calls made from a UK landline or Mobile upon request.\nIn April 2014, the European Court of Justice ruled that the European Union's Data Retention Directive", "-24.348693581327097" ], [ "the number of requests have increased by 12 to 16 percent annually. Data retention policies According to T-Mobile's privacy policy highlights, \"Retention and Disposal\", information is retained for as long as there is business or tax need or as applicable laws, regulations, or government orders require. T-Mobile notes that it disposes of Personal Information, uses reasonable procedures designed to erase or render it unreadable (for example, shredding documents and wiping electronic media).\nIn 2010, the Department of Justice (DOJ) released a document entitled, \"Retention Periods of Major Cellular Providers,\" to advise law enforcement agents seeking to obtain cell phone records.", "-24.3120034977037" ], [ "suppress their telephones numbers from telemarketing. Advances While the idea of storing customer data in electronic formats to use them for database-marketing purposes has been around for decades, the computer systems available today make it possible to gain a comprehensive history of client behavior on-screen while the business is transacting with each individual, producing thus real-time business intelligence for the company. This ability enables what is called one-to-one marketing or personalization.\nToday's Customer Relationship Management (CRM) systems use the stored data not only for direct marketing purposes but to manage the complete relationship with individual customer contacts and to develop more", "-24.246832635253668" ], [ "smartphone sales increased by 42% from 2010.\nMobile operators are facing an explosion in wireless data use, which is projected to grow 18-fold from 2011 to 2016 per the latest Cisco VNI forecast.\nWith the use of mobile devices increasing so rapidly, and almost half of the traffic on mobile internet networks being accounted for by video sessions, mobile service providers have begun to recognize the need to provide higher quality video access while using the lowest possible bandwidth.\nWith the release of the iPhone 5 in September 2012, it has been predicted that LTE networks might experience decreased data speeds as streaming", "-24.227518743307883" ], [ "ruling by the European Court of Human Rights which found that a Finnish hospital failed to safeguard personal data. Companies With the rapid growth and development of Internet and mobile technologies, private companies are able to collect personal data more quickly and effectively than before. Companies gather PII by storing of profile information when users register a new account, tracking user's location, tracking user's local storage, and using cookies and other anonymous identifiers.\nData brokers, also known as information brokers, are the major dealers of gathering, transforming, packaging, and selling of personal data. They gather PII from these resources: 1)", "-24.193394652153074" ], [ "estimated to be worth INR 1,79,000 crore (US$28 billion), INR 1,95,900 crore (US$31 billion) and INR 2,25,600 crore (US$37 billion) respectively. The importation of phones has increased sharply from $665.47 million in 2003-04 to $10.9 billion in 2013-14, according to the commerce ministry data. Import of phones from China has grown from a $64.61 million to $7 billion during the same period. In 2013-14, India's electronics trade deficit was valued at US$23.5 billion, of which China accounted for 67℅. \nFrom around $28 billion in FY11, the importation of electronics could reach $40 billion in FY16. As of 2016, local manufacturing of electronics", "-24.19266310328385" ], [ "is a growing problem with increasing data rates in the next 10 years. Smart phones and laptop dongles will continue to increase traffic by 100% per year - a trend observed already in the last 5 years. The traditional approach to oversize capacity in order to carry all traffic will become harder as 4G, 5G and beyond can never keep up with demand at this rate of increase. Energy consumption and going green is also becoming more important in the future. Whatever increase of capacity technology will provide, will soon be eaten up by even faster increasing traffic. New approaches", "-24.18755469964526" ], [ "wireless carrier charged $1.99 for \"bogus data downloads\" every time an internet connection was established, even if the user did not intend to use the connection. The practice was validated by a reader who claimed to work for Verizon. The charge resulted whenever a Verizon customer touched the up-arrow key on some Verizon phones. The key is easy to hit accidentally and is preprogrammed by Verizon to launch the mobile Web, causing the consumer to incur a $1.99 data charge each time the key is pressed. As a result of Pogue’s reportage, the Federal Communications Commission (FCC) asked Verizon", "-24.183575353876222" ], [ "had reached half the planet, when the ITU reported that the subscriber number was to reach 4.6 billion user which means 3.8 billion activated mobile phones in use, and 3.4 billion unique users of mobile phones. The Mobile Internet data connections are following the growth of mobile phone connections albeit at a lower rate. In 2009 Yankee Group reported that 29% of all mobile phone users globally were accessing browser-based internet content on their phones. According to the BBC, there are now (2010) over 5 billion mobile phone users in the world.\nAccording to Statista there were 1.57 billion smartphone", "-24.181908903236035" ], [ "only as long as the statute of limitations allows the payment to be lawfully pursued. Data may be retained upon a user's consent for marketing and value-added services. For both previous uses, the data subject must be informed why and for how long the data is being processed.\nSubscribers have the right to non-itemised billing. Likewise, the users must be able to opt out of calling-line identification.\nWhere data relating to location of users or other traffic can be processed, Article 9 provides that this will only be permitted if such data is anonymised, where users have given consent, or for provision", "-24.151019471726613" ], [ "charge and a lower price-per-segment than VCs, making them cheaper only where large volumes of data are passed.", "-24.07381801179872" ], [ "to video and audio streaming applications. In addition to smart phones, laptops with 3G access capabilities are also seen as a major source of mobile data traffic. Additionally, Wi-Fi is typically much less costly to build than cellular networks. It has been estimated that the total Internet traffic would pass the 500 exabytes/year milestone in 2013. Annual growth rate of 50% is expected to continue and it will keep out phasing the respected revenue growth. Alternatives Wi-Fi and femtocell technologies are the primary offload technologies used by the industry. In addition, WiMax and terrestrial networks (LAN) are also candidates for", "-24.039862697783974" ], [ "sites can also be accessed from mobile phones by typing the URL or through the use of QR code (a barcode).\nAn i-mode user pays for both sent and received data. There are services to avoid unsolicited e-mails. The basic monthly charge is typically on the order of JPY ¥200 - ¥300 for i-mode not including the data transfer charges, with additional charges on a monthly subscription basis for premium services. A variety of discount plans exist, for example family discount and flat packet plans for unlimited transfer of data at a fixed monthly charge (on the order of ¥4,000/month). History", "-24.01537662584451" ], [ "be misleading and recommended that legal safeguards on the collection of and access to telecommunications data should at least be as strong as those applying to communications content.\nThe Law Council of Australia (LCA) was also concerned that there was uncertainty about whether some types of telecommunications data would be considered ‘content’ (and thus excluded from collection), including whether meta-tags would be captured. Further, while the Memorandum to the Bill recognised that ‘text messages and e-mails stored on a phone or other communications device are more akin to content than data’, the LCA claims it did not adequately explain how this", "-23.994439482310554" ], [ "on products that would usually be paid by a checking or savings account. Mobile banking addresses the problem of the heavy regulation and costly maintenance of saving accounts. Mobile financial services in the developing world, ahead of the developed world in this respect, could be worth $5 billion by 2012. Safaricom’s M-Pesa launched one of the first systems where a network of agents of mostly shopkeepers, instead of bank branches, would take deposits in cash and translate these onto a virtual account on customers' phones. Cash transfers can be done between phones and issued back in cash with a small", "-23.931660759437364" ], [ "phone is limited to 2 MB of applications regardless the size of the Multimedia Card or the internal memory.", "-23.900866901880363" ], [ "best quarterly earnings ever, with 53% of its revenue coming from the sale of 37 million iPhones, at an average selling price of nearly $660. The average selling price has remained fairly constant for most of the phone's lifespan, hovering between $622 and $660.\nFor the eight largest phone manufacturers in Q1 2012, according to Horace Dediu at Asymco, Apple and Samsung combined to take 99% of industry profits (HTC took the remaining 1%, while RIM, LG, Sony Ericsson, Motorola, and Nokia all suffered losses), with Apple earning 73 cents out of every dollar earned by the phone makers. As the industry", "-23.887645132024772" ], [ "mining companies such as Datalogix and BlueKai to use customer information for targeted advertising. Ethical questions of the extent to which a company should be able to utilize a user's information have been called \"big data\". Users tend to click through Terms of Use agreements when signing up on social media platforms, and they do not know how their information will be used by companies. This leads to questions of privacy and surveillance when user data is recorded. Some social media outlets have added capture time and Geotagging that helps provide information about the context of the data as well", "-23.88246594044176" ], [ "mobile operators, as is the unified price of data add-ons; 1 GB of data is priced the same, regardless of whether it is purchased in advance as part of a customer's monthly rolling plan, or whether it is purchased as an add-on which is consumed only when a customer's monthly allowance is used up. In this respect, SMARTY's offerings are functionally equivalent to standard pay-as-you-go (PAYG) tariffs offered by other providers, such as Three's own PAYG offering. In February 2019, an unlimited data plan was launched at a cost of £25 a month, which is not subject to throttling or slow-down,", "-23.86722728989116" ], [ "or legal entity would like to use personal data, one needs informed and explicitly expressed consent of what personal data moves to whom, when, and for what purpose from the owner of the data. The owner of the information has the right to know how their data has been used.\nThe data transaction cannot be used as a bargaining chip for an unrelated or superfluous issue of consent, for example, improve marketing recommendations while you are trying to ring your mother. While there are services where you need to share data, these transactions should not be exaggerated and should be held", "-23.845184974066797" ], [ "a program on the SIM card that selects the lowest cost IMSI ( or 'profile' ) to use in a specific country.\nIncreasingly, data services are being added to roaming SIM cards to reduce the cost of roaming data charges. Mobile users are increasingly using data services and it can be very difficult to predict the cost of using data because it is invoiced based on volume. Machine to machine This technology is also used in a number of machine to machine applications where devices communicate with one another, such as vehicle tracking systems. By switching between multiple networks, more complete", "-23.829243601023336" ], [ "in countries which assign shorter area codes and longer local numbers in areas with high population densities. The rapid growth in popularity of electronic devices (first pagers, then mobile phones), in addition to regular landline growth, increased demand for new phone numbers even more. Although landline growth has sharply dropped and even decreased, largely due to the elimination of residential landlines (in favor of personal mobile phones), it has been replaced by the even-worse problem of data-only devices (hotspots, modems, netbooks, and especially popular tablets), which still require a telephone number for use on cellular networks despite being", "-23.81502354244003" ], [ "similar conditions previously outlined in the Children's Online Privacy Protection Act. Data Microtransactions have become increasingly common in many types of video games. Smartphone, console, and PC games all have conformed to the use of microtransactions due to its high profitability. Many companies and games, especially smartphone games, have taken on a business model that offer their games for free and then relying purely on the success of microtransactions to turn a profit. Ethics The collection of this data on consumers, although technically legal in the United States, or outside the EU, can be considered unethical. Companies can sell data", "-23.779610965022584" ], [ "to be the total amount of currency in circulation plus the total value of checking and savings deposits in the commercial banks in the country. In modern economies, relatively little of the money supply is in physical currency. For example, in December 2010 in the U.S., of the $8853.4 billion in broad money supply (M2), only $915.7 billion (about 10%) consisted of physical coins and paper money. Digital or electronic The development of computer technology in the second part of the twentieth century allowed money to be represented digitally. By 1990, in the United States all money transferred between its", "-23.754560797242448" ], [ "to a special rate structure.\nThe argument was made that since telephone numbers are needed to connect your calls that this information cannot be considered private as telephone companies would have access to this information in order to connect your call.\nTelephone users, in sum, typically know that they must convey numerical information to the phone company; that the phone company has facilities for recording this information; and that the phone company does in fact record this information for a variety of legitimate business purposes. Although subjective expectations cannot be scientifically gauged, it is too much to believe that telephone subscribers, under", "-23.749979697546223" ], [ "personal computers that provide the service of calculations per second. Since the 1970s computers doubled their capacity of calculations per second every two years for the same amount of constant dollars. The fall in price is so rapid, that it has been necessary to invent new words because of the immense growth in the capacity of computers. First they were measured in bytes, then, kilobytes, megabytes, terabytes, yotabytes, etc ... Today's harvesters harvest many more hectares per hour than they did half a century ago, but they also have a geo-satellite system, combined with a chip that allows to improve", "-23.73155715869143" ], [ "by freely harvested personal data?\nWhile initially it is realistic to assume that data would be traded for money, it is possible to imagine a future where data would be traded for data. The ‘I’ll show you yours if you show my mine’ scenario could replace money altogether. Importantly, this is a future scenario and the first step is to focus on exchanging personal data for existing monetary currency. Openness The idea of open data is centred around the argument that data should be freely available and should not have restrictions that would prohibit its use, such as copyright laws. Many", "-23.715651737249573" ], [ "carriers in the provision of fixed broadband service, mobile virtual network operators (MVNO) also exist which use incumbent infrastructure to provide mobile services in an attempt to make the market more competitive. Data caps Many high speed internet packages offered in Canada have data caps, or online data consumption limits that when surpassed will result in additional charges being applied to a user's monthly bill. Data caps in Canada can be as low as 20GB, which is over six times lower than the lowest data cap in the United States of 150GB. Data caps contribute to the digital divide by", "-23.676461791539623" ], [ "Communications Data Bill 2008 The Communications Data Bill was intended to create powers to collect data concerning people's phone, e-mail and web-browsing habits for mass surveillance in the United Kingdom. The government database would have included telephone numbers dialed, the websites visited and addresses to which e-mails are sent but not the text of e-mails or recorded telephone conversations.\nSince October 2007 telecommunication companies have been required to keep records of phone calls and text messages for twelve months. The bill would have extended the coverage to Internet website visited, email messages, and VOIP data.\nChris Huhne, Liberal Democrat Home affairs spokesman", "-23.599853637162596" ], [ "to broaden the description of bioethical reasoning (Adell & Luppicini, 2009). User data In a digital world, much of users' personal lives are stored on devices such as computers and smartphones, and we trust the companies we store our lives on to take care of our data. A topic of discussion regarding the ethics of technology is just exactly how much data these companies really need and what they are doing with it. Another major cause for concern is the security of our personal data and privacy, whether it is leaked intentionally or not.\nLarge companies share their users' data constantly.", "-23.57725551824842" ], [ "prices higher than normal are charged.\nMobile payments is a new and rapidly adopted alternative payment method – especially in Asia and Europe. Instead of paying with cash, check or credit cards, a consumer can use a mobile phone to pay for wide range of services and goods. The charges are then added to their phone bill.\nA check or cheque is a negotiable instrument instructing a financial institution to pay a specific amount of a specific currency from a specified demand account held in the maker/depositor's name with that institution. Both the maker and payee may be natural persons or legal", "-23.576226277917158" ], [ "customer is known to a business, the business can make offer based on the location, however if this data is not processed immediately, it may be irrelevant in the future. According to IBM, about 60 percent of data loses its value immediately. Not analysing data immediately and letting it go 'dark' can lead to significant losses for an organisation in terms of not identifying fraud, for example, fast enough and then only addressing the issue when it is too late. Storage According to the New York Times, 90% of energy used by data centres is wasted. If data was not", "-23.572781504539307" ], [ "cameras accelerated due to the increasing use of smartphones with rapidly improving camera technology for casual photography, easier image manipulation, and abilities to directly share photos through the use of apps and web-based services. By 2011, cell phones with integrated cameras were selling hundreds of millions per year. In 2015, digital camera sales were 35.395 million units or only less than a third of digital camera sales numbers at their peak and also slightly less than film camera sold number at their peak.\nIn 2007 the Nokia N95 was notable as a smartphone that had a 5.0 Megapixel (MP) camera, when", "-23.527733051843825" ], [ "request data from databases. Starting in the late 1990s, BI systems offered alternatives for receiving data, including email and mobile devices. Static data push Initially, mobile devices such as pagers and mobile phones received pushed data using a short message service (SMS) or text messages. These applications were designed for specific mobile devices, contained minimal amounts of information, and provided no data interactivity. As a result, the early mobile BI applications were expensive to design and maintain while providing limited informational value, and garnered little interest. Data access via a mobile browser The mobile browser on a smartphone, a", "-23.52286198006732" ], [ "reports can be rapidly generated. In contrast to traffic cameras, number plate recognition systems, and induction loops embedded in the roadway, no additional hardware on the road network is necessary. Floating cellular data Floating cellular data is one of the methods to collect floating car data. This method uses cellular network data (CDMA, GSM, UMTS, GPRS). No special devices/hardware are necessary: every switched-on mobile phone becomes a traffic probe and is as such an anonymous source of information. The location of the mobile phone is determined using (1) triangulation or (2) the hand-over data stored by the network operator. As", "-23.50957799637399" ], [ "mobile phones, and the improved representativity that comes along with it, does still continue: from 2007 to 2008, Nielsen Mobile noticed an increase of the mobile internet usage.\nWith decreasing costs and an improving technology, a further upward tendency can be expected. In addition, the mobile internet usage increases with the rapidly developing distribution of smart phones. According to IM (Mediawork Initiative), already in 2013 more people will log in with their smart phone, than with a PC. Mobile statistics show a high and very fast response rate. As a result of the independency from time and place, answers can be", "-23.508297974301968" ], [ "data, and $20 of international talk credit. Plans with unlimited data get throttled to 128 kbit/s when usage exceeds the 4G allowance for the given plan. h2o Wireless also offers both a monthly and multi-month pay-as-you-go plans. For the monthly pay-as-you-go plan, the cost is $25 and it provides 30 days of service. Calls are credited at 2.5¢ per minute, text are credited at 2.5¢ per text, and data is credited at 10¢ per MB. For the multi-month pay-as-you-go plan, calls are credited at 5¢ per minute, texts are credited as 5¢ per text, and data is credited as 10¢", "-23.475844794593286" ], [ "transfers, for example with the OBEX profile or with a USB cable. Restrictions also include increasing the GPS lock time (2–10 minutes) and resolution (1-2.5 km) of third-party applications while maintaining the speed (10-15 s) and accuracy (10–25 m) of the branded GPS Nav program. GPS Nav service costs $10/month or $3.50/day in addition to the cost of a data plan. The phones affected include the BlackBerry 8830 World Edition, BlackBerry 8130 Pearl, and BlackBerry 8330 Curve.\nSome clients claim that Bell Mobility purposely restricts these features in order to force them to use the data services and as a result pay", "-23.45755227704649" ], [ "Phone surveillance Prevalence According to a 1998 American Management Association report, 43% of companies actually tap phone conversations and review computer files and emails of employees. No newer data is available on the number of phone surveillance carried out currently. Phone surveillance software Phone surveillance in now more commonly carried out on cell phones. This has become increasingly easy with the availability of cell phone monitoring software. These types of software are easily purchased over the internet and can be quickly installed in phones. There have been questions as to whether this software is illegal; software makers may show a", "-23.441014805459417" ], [ "In 2014 it was estimated that in the U.S. alone there were roughly 3 million data centers, ranging from small centers located in office buildings to large complexes of their own. Increasingly, data centers are storing more data than end-user devices. By 2020 it is predicted that 61% of total data will be stored via cloud applications (data centers) in contrast to 2010 when 62% of data storage was on end-user devices. An increase in data centers for data storage coincides with an increase in energy consumption by data centers.\nIn 2014, data centers in the U.S. accounted for roughly 1.8%", "-23.43904480780475" ], [ "cost for it to be made available to the public.\nThe opening of data requires current and advance technologies as well as the employment of users who are skilled enough to complete such work. When data is collected it cannot be presented to the public in its raw form and may be inaccessible due to the program is uses or how the data is presented may be unusable. Time and funding is required to be reallocated by those who create the original dataset in order to make the data more accessible and usable for citizens to understand and engage with. When", "-23.427565830541425" ], [ "mobile phones, portable audio players, and video players into a single device is increasing the purchase and delivery of full-length music tracks and video. The download speeds available with 4G networks make it possible to buy a movie on a mobile device in a couple of seconds. Mobile banking Banks and other financial institutions use mobile commerce to allow their customers to access account information and make transactions, such as purchasing stocks, remitting money. This service is often referred to as mobile banking, or m-banking. Mobile brokerage Stock market services offered via mobile devices have also become more popular", "-23.42336918484216" ], [ "4 billion data records were stolen by hackers. However, when people sign up for accounts with Google, Amazon, Facebook, Microsoft etc. they have no idea of what their personal data (trillions of records) are going to be used for. People often don't even know how to protect their own data or their own privacy, other than not to use their computer. Corporations can legally \"scrape\" gigantic amounts of personal information, and do with it what they like - people will probably never know what happened, and they cannot find out what happened, even if they tried. Organizational instability The management", "-23.412067894561915" ], [ "technology and by the constant need for the newest and most high-tech products we are contributing to a mass amount of e-waste. Since the invention of the iPhone, cell phones have become the top source of e-waste products because they are not made to last more than two years. Electrical waste contains hazardous but also valuable and scarce materials. Up to 60 elements can be found in complex electronics. As of 2013, Apple has sold over 796 million iDevices (iPod, iPhone, iPad). Cell phone companies make cell phones that are not made to last so that the consumer will purchase", "-23.3869226353288" ], [ "mobile phones. Equally important is to also know the number of people who use the SMS service and how many of these people own a web-enabled phone. Only if all these aspects are being noticed, a final conclusion regarding the sampling can be drawn. For these reasons a mobile survey does not meet the standards of the statistical representativity.\nAs mentioned in the beginning, the restricted possibilities to access WAP-Surveys are another problem. The number of those who use the internet via their mobile phone is rather small: According to IFCom only 19% of all mobile phone users do so. But", "-23.365609981236048" ], [ "is reported that all four companies were paid to provide the information to the NSA. Usage Although such a database of phone records would not be useful on its own as a tool for national security, it could be used as an element of broader national security analytical efforts and data mining. These efforts could involve analysts using the data to connect phone numbers with names and links to persons of interest. Such efforts have been the focus of the NSA's recent attempts to acquire key technologies from high tech firms in Silicon Valley and elsewhere. Link analysis software, such", "-23.3616412008123" ], [ "this data, Elsevier cannot make such a large corpus of data, to which it has added significant value, available for free.", "-23.35777642107132" ], [ "telephone, 15.2 percentage used computer with no internet connection and 45.5 percentage used computer with internet connection.\n\nAs of 2018 there were 182.615 people aged 6 years and older, of which 22.2 percentage used computer, 38.9 percentage used internet and 81.3 percentage used mobile phone.", "-23.346358485752717" ], [ "a company that holds secure data, such as banks, law firms, pharmaceuticals, and credit corporations is also at risk. If a company's public image is hurt, it could cause consumers to not use their services and could cost millions in business losses and positive public relation campaigns. The cost of data breaches \"varies widely, ranging from $90 to $50,000 (under HIPAA's new HITECH amendment, that came about through the American Recovery and Revitalization act of 2009), as per customer record, depending on whether the breach is “low-profile” or “high-profile” and the company is in a non-regulated or highly regulated area,", "-23.30918949272018" ], [ "data at rest Because of its nature data at rest is of increasing concern to businesses, government agencies and other institutions. Mobile devices are often subject to specific security protocols to protect data at rest from unauthorised access when lost or stolen and there is an increasing recognition that database management systems and file servers should also be considered as at risk; the longer data is left unused in storage, the more likely it might be retrieved by unauthorized individuals outside the network. Encryption Data encryption, which prevents data visibility in the event of its unauthorized access or theft, is", "-23.302719255094416" ], [ "Paid content Paid content is content on the Internet – such as text, graphics, video and downloads – which is paid for. Paid content is usually copyrighted. \nSome internet content has always historically been paid for — until recently there has been little discussion about paying for scientific, technical and medical (STM) content as well as certain trade information. News media Printed newspaper circulation has fallen steadily since the advent of the internet – in 2008 in the USA alone newspapers lost $64.5 billion in market value. As newspapers' online readership has increased, the newspaper industry has been forced to", "-23.301567978982348" ], [ "a monthly fee for the post-paid plans. In turn, users get a monthly quota of minutes. When a user goes over the minutes allowed under the particular post-paid cell phone plan, they are charged separately for the extra minutes. In North America, this fee for the extra minutes is called overage fees or overage charges.\nFor example, suppose that a mobile phone user signs up for a post-paid cell phone plan that costs $40 per month and is allowed a quota of 700 minutes under that plan. If this user were to end up using 750 minutes in a month, then", "-23.28789639814204" ], [ "quantity to the socially optimal quantity (Q*).\nThe negative consumption externalities caused by mobile phone use while driving, as shown, has economic costs. Not only does mobile phone use while driving jeopardize safety for the driver, anyone in the car, or others on the road but it also produces economic costs to all parties involved. As shown, these costs are best managed with government intervention through policy or legislation changes. Ticketing is often the best choice as it affects only those who are caught performing the illegal act. Ticketing is another cost induced from mobile phone use and driving because ticketing", "-23.280663719051518" ], [ "margin on a computer unit was around $1,000. The total value of personal computer purchases in the US in 1983 was about $4 billion, comparable to total sales of pet food. By late 1998, the average selling price of personal computer systems in the United States had dropped below $1,000.\nFor Microsoft Windows systems, the average selling price (ASP) showed a decline in 2008/2009, possibly due to low-cost netbooks, drawing $569 for desktop computers and $689 for laptops at U.S. retail in August 2008. In 2009, ASP had further fallen to $533 for desktops and to $602 for notebooks by January and", "-23.276359007839346" ] ]
33hlh2
When we say that solar power is not (yet) efficient, what exactly do we mean?
[ "Typically when using the word \"efficiency\" in a comparative fashion for energy production the measurement refers to the source-energy relative to the converted usable energy. E.G. if gasoline has X amount of energy in it, the combustion engine can only create about X*.3 of that to its usable energy (movement, in this case). A solar panel converts about 20ish percent of the suns energy. If we compare that to other forms of _electricity_ production (the most reasonable analogue for your not-well-defined statement) then we'd be saying that \"compared to the efficiency of capture of energy from coal and conversion to electricity, solar panels are significantly less efficient\". The REASON we might emphasize this statement however is that increasing efficiency of the panel in this dimension is correlated with requiring less physical space, likely high return on investment of actual purchase of the panels and so on. Its perceived that improved efficiency - amongst other things - is the path towards more economic viability for widespread solar.", "At least colloquially, speaking as someone who studies the economics of climate change, efficiency in this context is usually referring to cost-efficiency. That is, how much money does it cost to make, install, and maintain enough solar panels to create [X] watts of power capacity. Right now, solar is still being developed, and it cannot yet compete economically with more established conventional electricity generation, mostly coal and natural gas, with nontrivial amounts coming from hydroelectricity and nuclear. (Wind and biomass are pretty small compared with the other four I listed, but are most of the remainder.) Consumers demand electricity, and rational economic agents would seek to get it at the lowest possible price, so in the absence of regulatory action, they would get their electricity from coal and natural gas, which are cheaper per watt-hour (i.e. energy/Joules). However, coal and natural gas both have pollution externalities - the pollution produced by burning coal is really nasty (not just carbon pollution, which contributes to climate change, but also sulfur, NOx, and heavy metal contaminates, which are ugly stuff), and consumers aren't paying for the harm caused by this pollution. Therefore, we want to steer policy in the direction toward cleaner fuels, of which solar is a part. The problem is just what your title asks - solar isn't yet cost-effective enough to compete with natural gas and coal (though it probably will be in five years). This is because we are still making great advancements in developing solar technology (it's a relatively new and highly technical field). So, in order to stimulate investment into the solar industry, we have to subsidize it somehow, generally either through adoption credits (giving tax rebates to people who install solar panels), feed-in tariffs (mandating that your utility company compensates the supplier for the electricity that household/business generates), or carbon taxes (not exactly a subsidy, but a tax on coal acts in a similar manner to a subsidy on coal). The hope is that with a temporary subsidy, we can get enough investment in the industry to make solar cheaper than natural gas and coal, after which point we permanently move into a clean-energy world. If there is enough demand for solar (because of government subsidies), this encourages innovation into the solar industry, which should lower the cost of adoption (either by making the photovoltaic cells themselves more efficient, cheaper to produce, lowering installation costs, economies of scale, etc.) to the point where solar can compete as a cost effective alternative to conventional electricity generation. But we're not quite to the point where solar can directly compete on the basis of costs alone. (Storage capacity is a big part of this.) I'd be glad to elaborate further on any part of this.", "At the most basic level, it's possible to measure the efficiency with which a solar panel takes the energy from the sunlight hitting it and turns it into electricity. There's only so much sunlight striking a particular solar panel, and there's only so much space on a roof or wherever to put a solar panel, so you want the panel to be as efficient as possible. If a solar panel only converts 1% of the energy hitting it into useful electricity, then even if I spent tens of thousands of dollars to cover 100% of my roof with them, I won't get enough electricity to run my air conditioner, even on a bright sunny day. So that's not a very appealing option to me. But if your solar panels are 15% efficient, then I can spend significantly less money only covering half of my roof with panels, and still get way more electricity than my entire roof would've made with 1% efficient panels. Especially because efficiency gains tend to outpace the cost increases. A 15% efficient panel probably isn't going to cost 15x what a 1% efficient panel would cost, despite providing much better performance.", "When people talk about the [efficiency]( URL_0 ) of solar panels, they're referring to the amount of electricity it creates compared to the amount of solar energy it recieves from the sun. Most solar panels only convert 15-20% of the sunlight they're exposed to into electricity, so they are 15-20% efficient. The theoretical maximum efficiency (a \"perfect\" solar cell) is thought to be around 86%." ]
[ [ "be integrated with solar PV for better synergy. Efficiency The efficiency of a concentrating solar power system will depend on the technology used to convert the solar power to electrical energy, the operating temperature of the receiver and the heat rejection, thermal losses in the system, and the presence or absence of other system losses; in addition to the conversion efficiency, the optical system which concentrates the sunlight will also add additional losses.\nReal-world systems claim a maximum conversion efficiency of 23-35% for \"power tower\" type systems, operating at temperatures from 250-565 °C, with the higher efficiency number assuming a combined cycle", "-33.61601772442373" ], [ "energy from the Sun could play a key role in de-carbonizing the global economy alongside improvements in energy efficiency and imposing costs on greenhouse gas emitters. \"The strength of solar is the incredible variety and flexibility of applications, from small scale to big scale\".\nWe have proved ... that after our stores of oil and coal are exhausted the human race can receive unlimited power from the rays of the sun.\n— Frank Shuman, New York Times, 2 July 1916 ISO standards The International Organization for Standardization has established several standards relating to solar energy equipment. For example, ISO 9050 relates to glass", "-31.78476117408718" ], [ "the efficiency of computer power supplies. Climate Savers Computing Initiative promotes energy saving and reduction of greenhouse gas emissions by encouraging development and use of more efficient power supplies. 80 Plus certifies a variety of efficiency levels for power supplies and encourages their use via financial incentives. Efficient power supplies also save money by wasting less power; as a result they use less electricity to power the same computer, and they emit less waste heat which results significant energy savings on central air conditioning in the summer. The gains of using an efficient power supply are more substantial in computers", "-31.39693279320636" ], [ "more energy efficient: think of the positive impact on CO\n2 emissions of telecommuting and ecommerce for example. Computers are helping us design more energy efficient products. But there is little doubt that, while other industries strive to become more energy efficient, computers and networks themselves risk becoming the “energy hogs” of the future, unless something is done.\nPowering the over 1 billion personal computers, the millions of corporate data centers, the over 4 billion fixed and mobile telephones and telecommunications networks around the world requires approximately 1.4 Petawatt-hr a year (1.4×10¹⁵ W-hr) of electricity, approximately 8% of the global electrical energy", "-31.346794104436412" ], [ "enjoying the same comfort level with less energy. Consequently, energy efficiency can be considered part of your state's energy resource base – a demand side resource. Unlike energy conservation, which is rooted in behavior, energy efficiency is technology-based. This means the savings may be predicted by engineering calculations, and they are sustained over time. Examples of energy efficiency measures and equipment include compact fluorescent light bulbs (CFLs), and high efficiency air conditioners, refrigerators, boilers, and chillers.\nSaving energy through efficiency is less expensive than building new power plants. Utilities can plan for, invest in, and add up technology-based energy efficiency measures and,", "-31.06411169486819" ], [ "that use a lot of power.\nAlthough a power supply with a larger than needed power rating will have an extra margin of safety against overloading, such a unit is often less efficient and wastes more electricity at lower loads than a more appropriately sized unit. For example, a 900-watt power supply with the 80 Plus Silver efficiency rating (which means that such a power supply is designed to be at least 85% efficient for loads above 180 W) may only be 73% efficient when the load is lower than 100 W, which is a typical idle power for a desktop computer. Thus,", "-31.05229994576075" ], [ "reductions in residential electricity consumption. Although solar electricity is still expensive, its potential scale of application is huge and its prospects for further substantial cost reductions are excellent. Energy efficiency The most important energy saving options include improved thermal insulation and building design, super efficient electrical machines and drives, and a reduction in energy consumption by vehicles used for goods and passenger traffic. Industrialized countries such as Australia, which currently use energy in the least efficient way, can reduce their consumption drastically without the loss of either housing comfort or amenity. Increased energy efficiency of buildings had the support of", "-31.041072195090237" ], [ "technologies. The Energy Star 4.0 standard for desktops, laptops, and workstations, which took effect in July 2007, requires power supplies to be at least 80 percent efficient for most of their load range. In addition, it puts limits on the energy used by devices when inactive and requires systems to be shipped with power management features enabled. Relationship with The Green Grid On July 19, 2012 Climate Savers Computing Initiative and The Green Grid announced a joining of the two organizations resulting in Climate Savers Computing Initiative's programs and membership being moved under The Green Grid brand to build on", "-30.723888743537827" ], [ "non-solar power sources, a move which its executives say will require the company to reduce manufacturing costs and optimize efficiency. Grid parity In November 2012, First Solar announced that its manufacturing cost had fallen to 67 cents per watt, a 6-cent decrease from February 2012. By 2015, it expects to drive down cost per watt to make solar modules to between 52 and 54 cents. The biggest driver of the lower costs is better efficiency.\nIn a December 2012 RenewEconomy interview with First Solar CEO James Hughes, he made the following comments regarding Grid parity:\nEveryone wants to talk about \"grid parity\"", "-30.6987895630009" ], [ "electric space heating is almost 100% because almost all purchased energy is converted to building heat (the only exception being fan noise and indication lights which demand very little electricity and virtually none at all when compared to the extremely large energy draw of the heating itself). However, if a power plant supplying electricity is included, the overall efficiency drops drastically. For example, a fossil-fuel power station may only deliver 3 units of electrical energy for every 10 units of fuel energy released. Even though the electric heater is 100% efficient, the amount of fuel needed to produce the heat", "-30.610848463780712" ], [ "from solar energy to electrical energy Of all of these technologies the solar dish/Stirling engine has the highest energy efficiency. A single solar dish-Stirling engine installed at Sandia National Laboratories National Solar Thermal Test Facility (NSTTF) produces as much as 25 kW of electricity, with a conversion efficiency of 31.25%.\nSolar parabolic trough plants have been built with efficiencies of about 20%. Fresnel reflectors have an efficiency that is slightly lower (but this is compensated by the denser packing).\nThe gross conversion efficiencies (taking into account that the solar dishes or troughs occupy only a fraction of the total area of the power", "-30.559622054082865" ], [ "but offers clean energy throughout the lifespan of the solar cell.\nLarge scale electricity generation using photovoltaic power requires a large amount of land, due to the low power density of photovoltaic power. Land use can be reduced by installing on buildings and other built up areas, though this reduces efficiency. Concentrated solar power Also known as solar thermal, this technology uses various types of mirrors to concentrate sunlight and produce heat. This heat is used to generate electricity in a standard Rankine cycle turbine. Like most thermoelectric power generation, this consumes water. This can be a problem, as solar powerplants", "-30.396175835165195" ], [ "efficiency of any type of power generation system is never reached in practice, and it does not consider other steps in power generation, such as production, transportation and storage of fuel and conversion of the electricity into mechanical power. However, this calculation allows the comparison of different types of power generation. The maximum theoretical energy efficiency of a fuel cell is 83%, operating at low power density and using pure hydrogen and oxygen as reactants (assuming no heat recapture) According to the World Energy Council, this compares with a maximum theoretical efficiency of 58% for internal combustion engines. In practice", "-30.36940560961375" ], [ "than energy efficiency in that it encompasses using less energy to achieve a lesser energy demanding service, for example through behavioral change, as well as encompassing energy efficiency. Examples of conservation without efficiency improvements would be heating a room less in winter, driving less, or working in a less brightly lit room. As with other definitions, the boundary between efficient energy use and energy conservation can be fuzzy, but both are important in environmental and economic terms. This is especially the case when actions are directed at the saving of fossil fuels.\nReducing energy use is seen as a key solution", "-30.33098703014548" ], [ "energy use, sometimes simply called \"energy efficiency\", is the goal of efforts to reduce the amount of energy required to provide products and services. For example, insulating a home allows a building to use less heating and cooling energy to achieve and maintain a comfortable temperature. Installing LED lighting, fluorescent lighting, or natural skylight windows reduces the amount of energy required to attain the same level of illumination compared to using traditional incandescent light bulbs. Compact fluorescent lamps use only 33% of the energy and may last 6 to 10 times longer than incandescent lights. LED lamps use only about", "-30.261102555436082" ], [ "in his congressional Global Warming Testimony on March 21, 2007.\nElectranet advocates predict that just like data on the internet, energy itself, including what is necessary for electric cars, will continue to be more economical as more people get onto the smart grid and supply power, and as more and more efficient technologies are developed for gathering the abundant energy around us. It is reasonable to imagine a day when there is no actual cost for driving, per mile, for energy, because of the abundance of energy coming from the Electranet.", "-30.225442697672406" ], [ "power input and time (of that segment of power input): where is the power input and is the efficiency during time If efficiency is low at very low power, then this low efficiency has a low weighting due to the low power (and the low amount of energy thus consumed). Conversely, high efficiencies (presumably at high power) get high weighting and thus count for more. This may result in a higher average efficiency than would be obtained by simply averaging efficiency over time. Another consideration is that the efficiency curves", "-30.2251471926902" ], [ "has been fierce competition in the supply chain, and further improvements in the levelised cost of energy for solar lie ahead, posing a growing threat to the dominance of fossil fuel generation sources in the next few years. As time progresses, renewable energy technologies generally get cheaper, while fossil fuels generally get more expensive:\nThe less solar power costs, the more favorably it compares to conventional power, and the more attractive it becomes to utilities and energy users around the globe. Utility-scale solar power [could in 2011] be delivered in California at prices well below $100/MWh ($0.10/kWh) less than most other", "-30.177202645427315" ], [ "and the One Watt Initiative.\nBut others have argued that these inefficient devices are low-powered, e.g., devices that are used for small battery chargers, so even if they have a low efficiency, the amount of energy they waste is less than 1% of household consumption of electric energy.\nConsidering the total efficiency of power supplies for small electronic equipment, the older mains-frequency linear transformer-based power supply was found in a 2002 report to have efficiencies from 20–75%, and have considerable energy loss even when powered up but not supplying power. Switched-mode power supplies (SMPSs) are much more efficient; a good design can", "-30.1325701506139" ], [ "cannot be produced. They must be available to society to enable the production of energy carriers.\nConversion efficiency varies. For thermal energy, electricity and mechanical energy production is limited by Carnot's theorem, and generates a lot of waste heat. Other non-thermal conversions can be more efficient. For example, while wind turbines do not capture all of the wind's energy, they have a high conversion efficiency and generate very little waste heat since wind energy is low entropy. In principle solar photovoltaic conversions could be very efficient, but current conversion can only be done well for narrow ranges of wavelength, whereas solar", "-30.116551822051406" ], [ "provide a lucrative option due to the low cost and sustainable economic and environmental nature. As an example, the energy cost of solar PV decreased from $4/W to $0.55–$0.65/W between 2007 and 2016. Energy Storage Because of the intermittent nature of renewable energy sources, generators, fuel cells, or batteries are required to ensure the reliability of Mini-grid Renewable Energy Systems (MRES). Otherwise, communities relying on real-time generation experience power outages when renewable generation is not possible. Due to fluctuation in load demand, the energy storage system must be able to meet the peak demand, which can entail large and expensive", "-30.103045193536673" ], [ "Energy Outlook market forecasts. The solar power installed in 2016 is 4,813% more than what was predicted by IEA in 2006. In 2016 itself, the solar PV addition was 16 times more than what was predicted by IEA a year earlier. However, the IEA's current forecasts for solar power does not seem to catch up with the exponential growth in the sector. The misleading projections has perpetuated the false impression that the growth of solar power requires huge subsidies, and has the potential to discourage investment in solar energy market and consequently, hold back even faster growth. Bioenergy IEA Bioenergy", "-29.810130642283184" ], [ "photosynthesis is involved in the process. Advantages The greatest advantage the biohybrid solar cell has is the way it converts solar energy to electricity with almost 100% percent efficiency. This means that little to no power is lost through the conversion of chemical to electrical power. These numbers are great compared to only a 40% efficiency for traditional solar cells. Cost is also a lot less for producing biohybrids because extracting the protein from spinach and other plants is cheaper compared to the cost of metals needed to produce other solar cells. Disadvantages While the efficiency of the biohybrid cells", "-29.80733827047038" ], [ "less efficient at 60 watts (a typical idle power for a desktop computer). Thus it is still important to select a supply with capacity appropriate to the device being powered.\nIt is easier to achieve the higher efficiency levels for higher wattage supplies, so gold and platinum supplies may be less available in consumer level supplies of reasonable capacity for typical desktop machines.\nTypical computer power supplies may have power factors as low as 0.5 to 0.6. The higher power factor reduces the peak current draw, reducing load on the circuit or on an uninterruptible power supply.\nReducing the heat output of the", "-29.73699950581795" ], [ "be powered by an array of solar panels plus batteries. The batteries enable the RTU to continue to function when the sun is below the horizon or is obscured by heavy cloud cover. These RTUs also must be extremely rugged and energy efficient, i.e., must function to −35 °C. Energy efficient RTUs vastly reduce the cost of the solar battery system especially at higher latitudes.", "-29.635105285589816" ], [ "heat.\nFor a given power supply, efficiency varies depending on how much power is being delivered. Supplies are typically most efficient at between half and three quarters load, much less efficient at low load, and somewhat less efficient at maximum load. Older ATX power supplies were typically 60% to 75% efficient. To qualify for 80 Plus, a power supply must achieve at least 80% efficiency at three specified loads (20%, 50% and 100% of maximum rated power). However, 80 Plus supplies may still be less than 80% efficient at lower loads. For instance, an 80 Plus, 520 watt supply could still be 70% or", "-29.613740090542706" ], [ "Rapid uptake Photovoltaics are now starting to compete in some places without subsidies. Shi Zhengrong has said that, as of 2012, unsubsidised solar power is already competitive with fossil fuels in India, Hawaii, Italy and Spain. As PV system prices decline it is inevitable that subsidies will end. \"Solar power will be able to compete without subsidies against conventional power sources in half the world by 2015\". In fact, recent evidence suggest that photovoltaic grid parity has already been reached in countries of the Mediterranean basin (Cyprus).\nPredictions that a power source becomes self-supporting when parity is reached appear to be", "-29.600087522791" ], [ "on a global scale to satisfy the search for sources of renewable energy.\nWECs have gone under heavy examination through research, especially relating to their efficiencies and the transport of the energy they generate. NREL has shown that these WECs can have efficiencies near 50%. This is a phenomenal efficiency rating among renewable energy production. For comparison, efficiencies above 10% in solar panels are considered viable for sustainable energy production. Thus, a value of 50% efficiency for a renewable energy source is extremely viable for the future development of renewable energy sources to be implemented across the world. Additionally, research has", "-29.524506840782124" ], [ "48.7 million MMBtu of fossil fuel, and the release of 10.3 million short tons of carbon dioxide.\nEnergy efficiency represents a large portion of RGGI investments. Ultimately, all electricity consumers, not only those who make upgrades, benefit from energy efficiency programs. For example, investing in efficiency programs - such as weatherizing houses - reduces the amount of electricity used. The decrease in electricity demand actually reduces the overall price of electricity. That means the costs go down for everyone, not just someone who installed new, efficient windows. History In 2003, governors from Connecticut, Delaware, Maine, Massachusetts, New Hampshire, New Jersey, New", "-29.467455881022033" ], [ "the natural rate of evaporation. The concentrated solar still is capable of large-scale water production in areas with plentiful solar energy. Performance The concentrated solar still can produce as much as 20x more water than the theoretical maximum of a standard solar still and in practice, can produce as much as 30x the volume. For instance, with a solar collection area of 10 acres, a standard solar still operating at a typical 25% efficiency may produce as much as 27.8acre-ft/yr in a region with an average daily solar irradiation value of 21.6MJ/m². A concentrated solar still can produce", "-29.456997005210724" ], [ "of a low cost of production even with reduced efficiency. Higher efficiency devices yield modules that occupy less space and are more compact; however, the 5–10% efficiency of typical CSG devices still makes them attractive for installation in large central-service stations, such as a power station. The issue of efficiency versus cost is a value decision of whether one requires an “energy dense” solar cell or sufficient area is available for the installation of less expensive alternatives. For instance, a solar cell used for power generation in a remote location might require a more highly efficient solar cell than one", "-29.425022048567826" ], [ "using energy more efficiently. Examples of conservation without efficiency improvements are heating a room less in winter, using the car less, air-drying your clothes instead of using the dryer, or enabling energy saving modes on a computer. As with other definitions, the boundary between efficient energy use and energy conservation can be fuzzy, but both are important in environmental and economic terms. This is especially the case when actions are directed at the saving of fossil fuels. Energy conservation is a challenge requiring policy programmes, technological development and behavior change to go hand in hand. Many energy intermediary organisations, for", "-29.31982898642309" ], [ "efficiency. As Ohta wrote, \"the turbine generator and the electric motor have nearly the same efficiency, therefore we cannot say which has the higher quality\" (1994, p. 90). Ohta therefore also included, 'abundance in nature' as another criterion for the determination energy quality rank. For example, Ohta said that, \"the only electrical energy which exists in natural circumstances is lightning, while many mechanical energies exist.\" (Ibid.). (See also table 1. in Wall's article for another example ranking of energy quality). Transformity as an energy measure of hierarchical rank Like Ohta, H.T.Odum also sought to order energy form conversions according to their", "-29.314905075822026" ], [ "consumed more energy than any other home device. In the early 1990s a competition was held among the major manufacturers to encourage energy efficiency. Current US models that are Energy Star qualified use 50% less energy than the average models made in 1974. The most energy-efficient unit made in the US consumes about half a kilowatt-hour per day (equivalent to 20 W continuously). But even ordinary units are quite efficient; some smaller units use less than 0.2 kWh per day (equivalent to 8 W continuously).\nLarger units, especially those with large freezers and icemakers, may use as much as", "-29.26650938662715" ], [ "energy, more attention is being paid to the electrical efficiency of devices (fraction of power consumed that achieves functionality, rather than waste heat); this affects all aspects of equipment, including standby power. Standby power use can be decreased both by attention to circuit design and by improved technology. Programs directed at consumer electronics have stimulated manufacturers to cut standby power use in many products. It is probably technically feasible to reduce standby power by 75% overall; most savings will be less than a watt, but other cases will be as large as 10 watts.\nFor example, a commercially available computer in", "-29.216313532626373" ], [ "fuel prices continue to increase, while renewable energy sources continue to reduce in up-front costs. As a result, widespread grid parity for wind and solar are generally predicted for the time between 2015 and 2020. Pricing solar Grid parity is most commonly used in the field of solar power, and most specifically when referring to solar photovoltaics (PV). As PV systems do not use fuel and are largely maintenance-free, the levelized cost of electricity (LCOE) is dominated almost entirely by the capital cost of the system. With the assumption that the discount rate will be similar to the inflation rate", "-29.150397992270882" ], [ "costs in space-based solar power (InGaP/(In)GaAs/Ge cells). They are also used in concentrator photovoltaics, an emerging technology best suited for locations that receive much sunlight, using lenses to focus sunlight on a much smaller, thus less expensive GaAs concentrator solar cell. Efficiencies Incremental improvements in efficiency began with the invention of the first modern silicon solar cell in 1954. By 2010 these steady improvements had resulted in modules capable of converting 12 to 18 percent of solar radiation into electricity. The improvements to efficiency have continued to accelerate in the years since 2010, as shown in the accompanying chart.\nCells made", "-29.062150171463145" ], [ "reduces the amount of energy required to provide products and services. For example, insulating a home allows a building to use less heating and cooling energy to maintain a comfortable temperature. Installing fluorescent lamps or natural skylights reduces the amount of energy required for illumination compared to incandescent light bulbs. Compact fluorescent lights use two-thirds less energy and may last 6 to 10 times longer than incandescent lights. Improvements in energy efficiency are most often achieved by adopting an efficient technology or production process.\nReducing energy use may save consumers money, if the energy savings offsets the cost of", "-29.06093204260833" ], [ "the solar cells is such that the solar cells give maximum power, so also at the top of the green line in the graph. This is called a Maximum power point tracker (MPPT). Here too, the goal is to have this conversion achieve maximum efficiency (>97%). Motor The motor is totally encased in the rear wheel to minimise loss through mechanical transmission from motor to wheel (such as in a normal car in the gear box and cardan). The motor is an improved version of the original 1993 Motor of the Spirit of Biel III by the Engineering School of", "-28.95947359324782" ], [ "convert around 24% of the sunlight that hits them into electricity. At this rate, solar energy still holds many challenges for widespread implementation, but steady progress has been made in reducing manufacturing cost and increasing photovoltaic efficiency. In 2008, researchers at Massachusetts Institute of Technology (MIT) developed a method to store solar energy by using it to produce hydrogen fuel from water. Such research is targeted at addressing the obstacle that solar development faces of storing energy for use during nighttime hours when the sun is not shining.\nIn February 2012, North Carolina-based Semprius Inc., announced that they had developed the", "-28.92553597097867" ], [ "2016. According to some estimates total investment in renewables for 2011 exceeded investment in carbon-based electricity generation.\nIn the case of self consumption, payback time is calculated based on how much electricity is not brought from the grid. Additionally, using PV solar power to charge DC batteries, as used in Plug-in Hybrid Electric Vehicles and Electric Vehicles, leads to greater efficiencies, but higher costs. Traditionally, DC generated electricity from solar PV must be converted to AC for buildings, at an average 10% loss during the conversion. Inverter technology is rapidly improving and current equipment has reached 99% efficiency for small scale", "-28.908108716539573" ], [ "energy. In the case of fuel cells, useful output energy is measured in electrical energy produced by the system. Input energy is the energy stored in the fuel. According to the U.S. Department of Energy, fuel cells are generally between 40–60% energy efficient. This is higher than some other systems for energy generation. For example, the typical internal combustion engine of a car is about 25% energy efficient. In combined heat and power (CHP) systems, the heat produced by the fuel cell is captured and put to use, increasing the efficiency of the system to up to 85–90%.\nThe theoretical maximum", "-28.88130276126867" ], [ " alternate energy generation systems such as wind turbine and solar panels run in parallel with data center so their energy endowment should not be considered to PUE, because it hides true data center performance). Some devices that consume power and associated with data center may shared with other uses, It can lead a huge error on PUE. Benefits and limitation PUE was introduced in 2006 and promoted by the Green Grid (a non-profit organization of IT professionals) in 2007, and has become the most commonly used metric for reporting the energy efficiency of data centres. Although it is", "-28.74176558799809" ], [ "more efficient data centers. One outgrowth of more efficient light emitters, solar cells and batteries, is the impact on those without access to electricity because it is cheaper and far healthier to generate light for reading by using solar power reading lights than to burn candles, kerosene or wood. Bowers formed a nonprofit, Unite to Light, to make this technology accessible to the third world.", "-28.71729171546758" ], [ "said vehicle and the energy wasted in the charging process. For mains electricity the emission intensity varies significantly per country and within a particular country, and on the demand, the availability of renewable sources and the efficiency of the fossil fuel-based generation used at a given time.\nCharging a vehicle using renewable energy (e.g., wind power or solar panels) yields very low carbon footprint-only that to produce and install the generation system (see Energy Returned On Energy Invested.) Even on a fossil-fueled grid, it's quite feasible for a household with a solar panel to produce enough energy to account for their", "-28.697240524466906" ], [ "on a bright day, a good array can produce over 2 kilowatts (2.6 hp). A 6 m² array of 20% cells will produce roughly 6 kW·h (22 kJ) of energy during a typical day on the WSC.\nSome cars have employed free-standing or integrated sails to harness wind energy. Races including the WSC and ASC, consider wind energy to be solar energy, so their race regulations allow this practice. Aerodynamics Aerodynamic drag is the main source of losses on a solar race car. The aerodynamic drag of a vehicle is the product of the frontal area and its Cd. For most solar cars", "-28.68568302309359" ], [ "by some to exceed the energy savings (energy required for raw materials, manufacture and transport to point of sale versus running costs). For instance they argue that the capital cost of buying a new energy efficient car will not be recouped unless the car runs for more than ten years. However increased energy efficiency leads to less usage and longer life.", "-28.683494084951235" ], [ "pursuing, but that they are unlikely to satisfy the world's thirst for energy to the extent their advocates assume. Expense of efficiency Saving energy by the negawatt and creating a negawatt market can present several drawbacks for manufacturers and electricity providers. Manufacturers are less inclined to make energy-efficient devices which meet a specific standard, such as Energy star's standard, because of increased time and cost, while receiving minimal profit. Overall, electricity providers may not want customers to use less energy due to the loss of profit. Some even argue that producing energy-efficient products, such as light bulbs, actually simulate more", "-28.678441788069904" ], [ "light directly to electricity. However, this differs from, and should not be confused with concentrated solar power, the other large-scale solar generation technology, which uses heat to drive a variety of conventional generator systems. Both approaches have their own advantages and disadvantages, but to date, for a variety of reasons, photovoltaic technology has seen much wider use in the field. As of 2013, PV systems outnumber concentrators by about 40 to 1.\nIn some countries, the nameplate capacity of a photovoltaic power stations is rated in megawatt-peak (MWₚ), which refers to the theoretical maximum solar array's DC power output. In other", "-28.590932213206543" ], [ "Power usage effectiveness Issues and problems with the power usage effectiveness The PUE metric is the most popular method of calculating energy efficiency. Although it is the most effective in comparison to other metrics, the Power Usage Effectiveness comes with its share of flaws. This is the most frequently used metric for operators, facility technicians, and building architects to determine how energy efficient their data center buildings are. Some professionals even brag about their Power Usage Effectiveness being lower than others. Naturally, it is not a surprise that in some cases an operator may “accidentally” not count the energy used", "-28.570508583798073" ], [ "an energy efficient technology. Reducing energy use reduces emissions. According to the International Energy Agency, improved energy efficiency in buildings, industrial processes and transportation could reduce the world's energy needs in 2050 by one third, and help control global emissions of greenhouse gases.\nEnergy efficiency and renewable energy are said to be the twin pillars of sustainable energy policy. In many countries energy efficiency is also seen to have a national security benefit because it can be used to reduce the level of energy imports from foreign countries and may slow down the rate at which domestic energy resources", "-28.55891176778823" ], [ "there is some technical superiority of electric propulsion compared with conventional technology that in many countries the effect of electrification of vehicles' fleet emissions will predominantly be due to regulation rather than technology. Indeed, electricity production is submitted to emission quotas, while vehicles' fuel propulsion is not, thus electrification shifts demand from a non-capped sector to a capped sector. This means that the emissions of electrical grids can be expected to improve over time as more wind and solar generation is deployed and the efficiency of photovoltaic solar panels improves over time (most solar panels are not over 20% efficient", "-28.557934193493566" ], [ "can be over 80% efficient; as a result, energy-efficient PSUs waste less energy in heat and require less airflow to cool, resulting in quieter operation.\nAs of 2012 some high-end consumer PSUs can exceed 90% efficiency at optimal load levels, though will fall to 87-89% efficiency during heavy or light loads. Google's server power supplies are more than 90% efficient. HP's server power supplies have reached 94% efficiency. Standard PSUs sold for server workstations have around 90% efficiency, as of 2010.\nThe energy efficiency of a power supply drops significantly at low loads. Therefore, it is important to match the capacity of", "-28.53739872349979" ], [ "kilowatt of peak power\". Similarly outside the SI, the peak power is sometimes written as \"P = 1 kWₚ\" as opposed to \"Pₚₑₐₖ = 1 kW\". In the context of domestic PV installations, the kilowatt (kW) is the most common unit for peak power, sometimes stated as kWₚ. Power output in real conditions The output of photovoltaic systems varies with the intensity of sunshine and other conditions. The more sun, the more power the PV module will generate. Losses, compared to performance in optimal conditions, will occur due to non-ideal alignment of the module in tilt and/or azimuth, higher temperature, module", "-28.52181375863438" ], [ "yearly consumption of energy rather than device efficiency, especially for systems where the use can be accurately projected, such as street lighting.", "-28.48373967615771" ], [ "will only begin to reduce total carbon emissions; a reduction in the carbon content of energy sources is also needed. A sustainable energy economy thus requires major commitments to both efficiency and renewables. Rebound effect If the demand for energy services remains constant, improving energy efficiency will reduce energy consumption and carbon emissions. However, many efficiency improvements do not reduce energy consumption by the amount predicted by simple engineering models. This is because they make energy services cheaper, and so consumption of those services increases. For example, since fuel efficient vehicles make travel cheaper, consumers may choose to drive farther,", "-28.471976377586543" ], [ "residential, while commercial scale three-phase equipment can reach well above 98% efficiency. However, an additional efficiency loss occurs in the transition back to DC for battery driven devices and vehicles, and using various interest rates and energy price changes were calculated to find present values that range from $2,057.13 to $8,213.64 (analysis from 2009).\nIt is also possible to combine solar PV with other technologies to make hybrid systems, which enable more stand alone systems. The calculation of LCOEs becomes more complex, but can be done by aggregating the costs and the energy produced by each component. As for example, PV", "-28.465298934126622" ], [ "power takes advantage of the most desirable energy sources. Smart grids can also coordinate the production of power from large numbers of small power producers such as owners of rooftop solar panels — an arrangement that would otherwise prove problematic for power systems operators at local utilities.\nOne important question is whether consumers will act in response to market signals. The U.S. Department of Energy (DOE) as part of the American Recovery and Reinvestment Act Smart Grid Investment Grant and Demonstrations Program funded special consumer behavior studies to examine the acceptance, retention, and response of consumers subscribed to time-based utility rate programs", "-28.45954181164052" ], [ "Green Power Usage Effectiveness Green Power Usage Effectiveness (GPUE) is a proposed measurement of both how much sustainable energy a computer data center uses, its carbon footprint per usable kilowatt hour (kWh) and how efficiently it uses its power; specifically, how much of the power is actually used by the computing equipment (in contrast to cooling and other overhead). It is an addition to the power usage effectiveness (PUE) definition and was first proposed by Greenqloud.\nThe Green Grid has developed the Power Usage Effectiveness metric or PUE to measure a data centers' effectiveness of getting power to IT equipment.", "-28.435847539745737" ], [ "solar energy would have a great effect on satisfying global energy needs.\nThere is also research into energy production for devices that would operate in vivo, called bio-nano generators. A bio-nano generator is a nanoscale electrochemical device, like a fuel cell or galvanic cell, but drawing power from blood glucose in a living body, much the same as how the body generates energy from food. To achieve the effect, an enzyme is used that is capable of stripping glucose of its electrons, freeing them for use in electrical devices. The average person's body could, theoretically, generate 100 watts of electricity (about", "-28.408424222969188" ], [ "lower-capacity model. The Energy Star program's savings calculator has also been criticized for unrealistic assumptions in its model that tend to magnify savings benefits to the average consumer.\nAnother factor yet to be considered by the EPA and DOE is the overall effect of energy-saving requirements on the durability and expected service life of a mass-market appliance built to a consumer-level cost standard. For example, a refrigerator may be made more efficient by the use of more insulative spacing and a smaller-capacity compressor using electronics to control operation and temperature. However, this may come at the cost of reduced interior storage", "-28.36036474313005" ], [ "insulation for buildings; or improved energy efficiency by cogeneration of heat and power. Smart meters are able to charge higher prices at the time consumption peaks during the day, thereby causing electricity demand to drop slightly when the price increases.\nIssues exist that currently prevent a shift over to a 100% renewable technologies. There is debate over the environmental impact of solar power, and the environmental impact of wind power. Some argue that the pollution produced and requirement of rare earth elements offsets many of the benefits compared to other alternative power sources such as hydroelectric, geothermal, and nuclear power. According", "-28.337928732915316" ], [ "injected into the power grid. Since solar panels generate peak power only for few hours each year, and DC to AC converters are expensive, the converters are usually sized to be smaller than the peak DC power of the panels. This means that for few hours each year the peaks are \"clipped\" and the extra energy is lost. This has very little impact on the total energy generated throughout a year, but saves considerable amount of balance of system (BOS) costs. \nDue to under-sizing of converters, AC ratings of solar plants are generally significantly lower than DC ratings, as much", "-28.288721617049305" ], [ "alternative energy. Shifting dependence on fossil fuels with specific interest within just one of the above-mentioned factors easily benefits at least one other. For instance, photo voltaic (or solar) panels have a 15% efficiency when absorbing the sun's energy, but its construction demand has increased 120% within both commercial and residential properties. Additionally, this construction has led to a roughly 30% increase in work demands (Chen).\nThe potential for the substitution of man-made capital for natural capital is an important debate in ecological economics and the economics of sustainability.\nThere is a continuum of views among economists between the strongly neoclassical positions", "-28.245757795200916" ], [ "fuel efficient vehicles, supports carpools, mass transportation or walks or rides bicycles, will have a far lower energy intensity than a nation that is economically unproductive, with extreme weather conditions requiring heating or cooling, long commutes, and extensive use of generally poor fuel economy vehicles. Paradoxically, some activities that may seem to promote high energy intensities, such as long commutes, could in fact result in lower energy intensities by causing a disproportionate increase in GDP output.\nFigures of energy consumption used in statistics are energy sources marketed through major energy industries. Therefore, some small scale but frequent consumption of energy source", "-28.231907374443836" ], [ "case of the U.S., its power grid simply will not be able to keep up with the growth and demand for additional power using conventional means. In the U.S., it's estimated that reduction in peak demand by a mere 5% would yield savings of about $66 billion over 20 years --- to say nothing of the resulting reduction in green house gas emissions that would accompany a 5% peak demand reduction.\nMany U.S. utility companies have developed energy rebate programs to provide IT companies incentives to use energy efficient equipment and help lower the power demand for data centers. The energy", "-28.21597065293463" ], [ "Concentrated solar still A concentrated solar still is a system that uses the same quantity of solar heat input (same solar collection area) as a simple solar still but can produce a volume of freshwater that is many times greater. While a simple solar still is a way of distilling water by using the heat of the sun to drive evaporation from a water source and ambient air to cool a condenser film, a concentrated solar still uses a concentrated solar thermal collector to concentrate solar heat and deliver it to a multi-effect evaporation process for distillation, thus increasing", "-28.215773863531695" ], [ "than primary generation systems. Open electrochemical systems, known as fuel cells, can be used to extract power either from natural fuels or from synthesized fuels. Osmotic power is a possibility at places where salt and fresh water merge. Photovoltaic effect The photovoltaic effect is the transformation of light into electrical energy, as in solar cells. Photovoltaic panels convert sunlight directly to electricity. Although sunlight is free and abundant, solar power electricity is still usually more expensive to produce than large-scale mechanically generated power due to the cost of the panels. Low-efficiency silicon solar cells have been decreasing in cost and", "-28.180962618469493" ], [ "less energy is wasted as heat (70% thermal efficiency) and the need for an external cooling unit to cool down the supercharger is eliminated. External cooling, as many other supercharger units would require, would mean a decrease in pressure and an increase in the weight of the car causing it to be slower, the antithesis of what superchargers are meant to do. However, the TVS supercharger is not only efficient in cycling power but also in maintaining fuel efficiency as well. Fuel Efficiency The TVS Supercharger also provides a higher fuel efficiency in comparison to any other mechanically driven supercharger", "-28.17491545737721" ], [ "for which the correlation between temperature and fan speed is more complex than linear), more effective heat sinks, and designs that allow air to flow through with less resistance. For a given power supply size, more efficient supplies such as those certified 80 plus generate less heat.\nA power supply of appropriate wattage for the computer is important for high efficiency and minimizing heat. Power supplies are typically less efficient when lightly or heavily loaded. High wattage power supplies will typically be less efficient when lightly loaded, for instance when the computer is idle or sleeping. Most desktop computers spend most", "-28.14608997774485" ], [ "dependent on orientation, efficiency, latitude, and climate—solar gain varies even at the same latitude. Typical efficiencies for commercially available PV panels range from 4% to 28%. The low efficiency of certain photovoltaic panels can significantly affect the payback period of their installation. This low efficiency does not mean that solar panels are not a viable energy alternative. In Germany for example, Solar Panels are commonly installed in residential home construction.\nRoofs are often angled toward the sun to allow photovoltaic panels to collect at maximum efficiency. In the northern hemisphere, a true-south facing orientation maximizes yield for solar panels. If true-south", "-28.131929508681424" ], [ "and year. The power generation of such a hybrid system is more constant and fluctuates less than each of the two component subsystems.\nThe intermittent / non-dispatchable solar PV at the prevailing low tariffs clubbed with Pumped-heat electricity storage can offer cheapest dispatchable power round the clock on demand. Solar thermal hybrid systems Though Solar PV generates cheaper intermittent power during the day light time, it needs the support of sustainable power generation sources to provide round the clock power. Solar thermal plants with thermal storage are clean sustainable power generation to supply electricity round the clock. They can cater the", "-28.115577254255186" ], [ "fossil fuel technologies.\nThe International Solar Energy Society has stated that \"historical incentives for the conventional energy resources continue even today to bias markets by burying many of the real societal costs of their use\".\nFossil-fuel energy systems have different production, transmission, and end-use costs and characteristics than do renewable energy systems, and new promotional policies are needed to ensure that renewable systems develop as quickly and broadly as is socially desirable.\nLester Brown states that the market \"does not incorporate the indirect costs of providing goods or services into prices, it does not value nature's services adequately, and it does not respect", "-28.091194262409772" ], [ "amounts of renewable electricity on the grid for this reason. Market-enabling The smart grid allows for systematic communication between suppliers (their energy price) and consumers (their willingness-to-pay), and permits both the suppliers and the consumers to be more flexible and sophisticated in their operational strategies. Only the critical loads will need to pay the peak energy prices, and consumers will be able to be more strategic in when they use energy. Generators with greater flexibility will be able to sell energy strategically for maximum profit, whereas inflexible generators such as base-load steam turbines and wind turbines will receive a varying", "-28.0537983711547" ], [ "are meant to reduce any vulnerability of available technologies and the need for adaptation at all with scientific technologies including energy efficiency improvements, and production of renewable energy (RE), nuclear power/energy (NE), and carbon capture storage (CCS). Energy Efficiency Improvements Energy efficiency is a concept used to define the focus of tackling climate change by creating energy efficient technologies and products (they are meant to use less energy to provide the same service). Energy efficiency is an important tool for climate adaptation because it preserves and extends resources in the long-run. It also minimizes the costs for the state in", "-27.99813781400735" ], [ "to near net zero. Energy efficiency should always be the primary design strategy of a low-energy house. Passive solar design and landscaping Passive solar building design and energy-efficient landscaping support the low-energy house in conservation and can integrate it into a neighborhood and environment. Following passive solar building techniques, where buildings are compact in shape to reduce surface area and principal windows oriented towards the equator (south in the Northern Hemisphere and north in the Southern Hemisphere) maximizes passive solar gain. However, solar gain (especially in temperate climates) is secondary to minimizing the overall house-energy requirements. In hot temperatures, excess", "-27.9928521985712" ], [ "from either reducing the amount of energy required to produce something, or from increasing the quantity or quality of goods and services from the same amount of energy.\nThe Vienna Climate Change Talks 2007 Report, under the auspices of the United Nations Framework Convention on Climate Change (UNFCCC), clearly shows \"that energy efficiency can achieve real emission reductions at low cost.\"\nInternational standards ISO 17743 and ISO 17742 provide a documented methodology for calculating and reporting on energy savings and energy efficiency for countries and cities. Benefits From the point of view of an energy consumer, the main motivation of energy efficiency is often", "-27.991688045294723" ], [ "as firms try to restore profitability, strong growth seems likely to continue for the rest of the decade. Already, by one estimate, total investment in renewables for 2011 exceeded investment in carbon-based electricity generation.\nThe dramatic price reductions in the PV industry have been causing a number of other power sources to become less interesting. Nevertheless, there remains the widespread belief that concentrating solar power (CSP) will be even less expensive than PV, although this is suitable for industrial-scale projects only, and thus has to compete at wholesale pricing. One company stated in 2011 that CSP costs $0.12/kWh to produce in", "-27.98403762752423" ], [ "in the works to use the system developed at MIT as a window de-icing system in automobiles. It also has the ability to be scaled up and heat larger homes or buildings or even heat bodies of water. A solar thermal fuel would ideally be able to cycle indefinitely without degradation, making it ideal for larger scale implementations that generally would need more replacements of other forms of storage.", "-27.966884763212875" ], [ "when the fuel cell's waste heat is used to heat a building in a cogeneration system this efficiency can increase to 85%. This is significantly more efficient than traditional coal power plants, which are only about one third energy efficient. Assuming production at scale, fuel cells could save 20–40% on energy costs when used in cogeneration systems. Fuel cells are also much cleaner than traditional power generation; a fuel cell power plant using natural gas as a hydrogen source would create less than one ounce of pollution (other than CO\n2) for every 1,000 kW·h produced, compared to 25 pounds of pollutants", "-27.94967410521349" ], [ "through reliance on an indigenous, inexhaustible and mostly import-independent resource, enhance sustainability, reduce pollution, lower the costs of mitigating climate change, and keep fossil fuel prices lower than otherwise. These advantages are global. Hence the additional costs of the incentives for early deployment should be considered learning investments; they must be wisely spent and need to be widely shared.\nIn 2011, a report by the International Energy Agency found that solar energy technologies such as photovoltaics, solar hot water and concentrated solar power could provide a third of the world's energy by 2060 if politicians commit to limiting climate change. The", "-27.937090766135952" ], [ "and produce more energy per acre than any other solar technology. CPV technology uses optics to focus large amounts of sunlight onto small photovoltaic surfaces to generate electricity. CPV systems are the most efficient solar energy systems and produce the most energy in dry, sunny climates, where the solar radiation averages 6 kilowatt-hours per square meter per day (6 kW-hr/m2/day) or more. According to the research firm, Global Data, the average cell, module and system efficiencies for CPV systems are expected to reach 50.37 percent, 39.48 percent and 34.03 percent, respectively.\nOriginally used for space-based applications, the CPV technology was adapted to", "-27.902607571566477" ], [ "credit that rooftop solar owners receive when they send electricity back to the grid by as much as 65 percent.\nHB 227 is moving across the legislature. Tyler White, the president of the Kentucky Coal Association, who supports the bill, has said that net metering is paramount to a renewable energy subsidy. The reason is because only some people (those without solar) pay to maintain the electric grid, while others (those with solar power systems) do not, despite the fact that everyone uses the grid. According to White, \"Germany has spent hundreds of billions of dollars on solar and wind, yet", "-27.89740539464401" ], [ "downside to these design changes is cost; both the materials and construction methods are more expensive and thereby drive up the price of the panels. However, the price of the panel is not the only input to a solar power system's total cost, and in recent years it accounts for much less than half of the total. In this case, using a more expensive panel can actually produce a lower overall system cost if savings can be found in installation time or there are artificial limits on system size. These are both true in the case of residential installs, where", "-27.875657320590108" ], [ "the Sun along two axes. The working fluid in the receiver is heated to 250–700 °C (482–1,292 °F) and then used by a Stirling engine to generate power. Parabolic-dish systems provide high solar-to-electric efficiency (between 31% and 32%), and their modular nature provides scalability. The Stirling Energy Systems (SES), United Sun Systems (USS) and Science Applications International Corporation (SAIC) dishes at UNLV, and Australian National University's Big Dish in Canberra, Australia are representative of this technology. A world record for solar to electric efficiency was set at 31.25% by SES dishes at the National Solar Thermal Test Facility (NSTTF) in New Mexico", "-27.866267870973388" ], [ "handle peaks in the load. UltraBattery also reduces the fuel consumption of the gen-set, because the generators can run at their highest efficiency, regardless of variations in the load on the system.\nRenewables power systems combine UltraBattery technology with the renewable generation source to deliver local power. They can use either photovoltaic, wind or solar thermal energy, and commonly incorporate a back-up diesel generator. Hybrid microgrids integrate renewable generation sources with UltraBattery energy storage and fossil-fuel gen-sets to maximize the efficiency of base-load generation. This can greatly reduce the cost of energy compared with diesel-only powered microgrids. They also substantially decrease", "-27.86179564543272" ], [ "Concentrated solar power plants are typically used on more of a community scale rather than an individual household scale, because of the amount of energy they are able to harness but can be done on an individual scale with a parabolic reflector.\nSolar thermal energy is harnessed by collecting direct heat from the sun. One of the most common ways that this method is used by households is through solar water heating. In a broad perspective, these systems involve well insulated tanks for storage and collectors, are either passive or active systems (active systems have pumps that continuously circulate water through", "-27.86172658034775" ], [ "to looking at just the energy that is used for heating and cooling. Due to this, there could be other factors that change the energy consumption of a house, and it might be incorrect to state that the thermostat is responsible for all energy savings in a house. For example, it is possible that other new energy efficient practices/appliances are partially responsible for the savings in addition to the thermostat.\nAnother discrepancy to consider is the population of people involved in the study. Some studies, such as the MyEnergy study, involve people who signed up for an energy analysis program. These", "-27.846335273832665" ], [ "home settings. The US Department of Energy has stated that there is potential for energy saving in the magnitude of 90 Billion kWh by increasing home energy efficiency.\nOther studies have emphasized this. A report published in 2006 by the McKinsey Global Institute, asserted that \"there are sufficient economically viable opportunities for energy-productivity improvements that could keep global energy-demand growth at less than 1 percent per annum\"—less than half of the 2.2 percent average growth anticipated through 2020 in a business-as-usual scenario. Energy productivity, which measures the output and quality of goods and services per unit of energy input, can come", "-27.84071691799909" ], [ "electricity flow from the car to the power lines and back. Other rechargeable batteries used for distributed PV systems include, sodium–sulfur and vanadium redox batteries, two prominent types of a molten salt and a flow battery, respectively.\nThe combination of wind and solar PV has the advantage that the two sources complement each other because the peak operating times for each system occur at different times of the day and year. The power generation of such solar hybrid power systems is therefore more constant and fluctuates less than each of the two component subsystems. Solar power is seasonal, particularly in northern/southern", "-27.83587225768133" ], [ "affordable and competitive in the global market, particularly when combined with a phasing out of fossil fuel subsidies. Renewable energy and energy efficiency Recent advances in technology and policy will allow renewable energy and energy efficiency to play major roles in displacing fossil fuels, meeting global energy demand while reducing carbon dioxide emissions. Renewable energy technologies are being rapidly commercialized and, in conjunction with efficiency gains, can achieve far greater emissions reductions than either could independently.\nRenewable energy is energy that comes from natural resources such as sunlight, wind, rain, tides, and geothermal heat, which are renewable (naturally replenished). In 2015,", "-27.812776623904938" ], [ "will consume less power, but give less heat. Thermostatically controlled space or water heaters will consume less power while running, but will have to run for longer in each hour to produce the required output, resulting in no saving. Switched mode power supplies Switched mode power supplies will use the same power as before, but will draw a slightly greater current to achieve this, with slightly increased cable losses, and slight risk of the increased current tripping MCBs. Energy savings The energy savings achieved by Voltage Optimization are an aggregation of the improved efficiency of all equipment across a site", "-27.799896941054612" ], [ "way energy is supplied, but in the way it is used, and reducing the amount of energy required to deliver various goods or services is essential. Opportunities for improvement on the demand side of the energy equation are as rich and diverse as those on the supply side, and often offer significant economic benefits.\nEfficiency slows down energy demand growth so that rising clean energy supplies can make deep cuts in fossil fuel use. A recent historical analysis has demonstrated that the rate of energy efficiency improvements has generally been outpaced by the rate of growth in energy demand, which is", "-27.791868341088048" ], [ "Power-added efficiency Power-added efficiency (PAE) is a metric for rating the efficiency of a power amplifier that takes into account the effect of the gain of the amplifier. It is calculated (in percent) as:\nIt differs from most power efficiency descriptions calculated (in percent) as:\nPAE will be very similar to efficiency when the gain of the amplifier is sufficiently high. But if the amplifier gain is relatively low the amount of power that is needed to drive the input of the amplifier should be considered in a metric that measures the efficiency of said amplifier.", "-27.784486582251702" ], [ "large enough to power both the house itself and one or two electric cars. Moreover, not only is there room for a larger array, so that the car can be charged more or faster, but power companies will also pay more for your electricity during the day than you’ll pay them to charge your electric car off the grid at night. Additionally, there is no risk of damage that random road debris might do to the cells on a car.\nOn the other hand, solar-powered cars could potentially be of use in regions where sunlight and space are abundant, and without", "-27.780337240110384" ], [ "a handful of countries export oil and gas). Renewable energy offers lower financial and economic risk for businesses through a more stable and predictable cost base for energy supply.\nEnergy efficiency gains in recent decades have been significant, but there is still much more that can be achieved. With a concerted effort and strong policies in place, future energy efficiency improvements are likely to be very large. Heat is one of many forms of \"energy wastage\" that could be captured to significantly increase useful energy without burning more fossil fuels. Sustainable biofuels Biofuels, in the form of liquid fuels derived from", "-27.743304239033023" ], [ "Energy efficiency implementation Effects The results of energy efficiency implementation are all beneficial for the energy consumer. It reduces operational costs, reduces carbon footprint, and it can even improve quality of life. Energy efficiency implementation can also play a role in increased revenue when consumers choose a “greener” product over another that is not.\nEnergy efficiency implementation can be extremely beneficial to large market segments like small businesses, schools, cement processing plants; basically any area that uses large amounts of energy. Small changes here add up to large savings.\nImplementing energy efficiency measures in a home or business can also lead to", "-27.73829640468466" ], [ "increasing of the thermal efficiency of the solar panel but a decreasing in the performance of the heat pump, with a decreasing in the COP. The target for the optimization is normally the minimization of the electrical consumption of the heat pump, or primary energy required by an auxiliary boiler which supplies the load not covered by renewable source. Comparison Generally speaking the use of this integrated system is an efficient way to employ the heat produced by the thermal panels in winter period, something that normally wouldn't be exploited because its temperature is too low. Separated production systems In", "-27.715650261496194" ], [ "to be more energy efficient. It is also critical because one can use the available resources accordingly. Simulators are only good during design but their estimation also needs to be verified. Simulators in general have high errors due to manufacturing of hardware components. Power meters measure power consumption for the whole system but does not give detailed breakdowns about dissipated power so designers can optimize their application or hardware. This paper analyzed different methods that researchers have discovered in recent years to resolve some of the issues above.", "-27.703300316556124" ], [ "to stabilize solar-electric power generation Heat storage allows a solar thermal plant to produce electricity at night and on overcast days. This allows the use of solar power for baseload generation as well as peak power generation, with the potential of displacing both coal- and natural gas-fired power plants. Additionally, the utilization of the generator is higher which reduces cost. Even short term storage can help by smoothing out the \"duck curve\" of rapid change in generation requirements at sunset when a grid includes large amounts of solar capacity.\nHeat is transferred to a thermal storage medium in an", "-27.700339576927945" ] ]
5tleoa
Why was domestic violence decriminalized in Russia ?
[ "Domestic violence was not really decriminalized, they decriminalized the first offence. You still get a punishment for it, but if you and your wife had a big fight and it escalated to a physical one that ended *without injury* and that was the only time it's happened then you won't get in huge trouble but you still lose more than five hundred USD, 15 days jail time, or 120 days community service. You will get in bigger trouble if it happens again.", "The prior regulation was (subjectively) harsh in comparison to even regulations in the US. Take NY Penal Law 240.26 which essentially proscribes the same type of conduct and calls it \"Harassment.\" If you don't injure another party but you make contact, it can be punishable by up to 15 days and a $250 fine. The new Russian statute has the same sentence except a higher fine and NY is just pass a whole mess of new family regulations punishing repeat domestic violence offenders, so it isn't that the State is lax. The outrage is just a media misunderstanding and geared at making the public hate Russia.", "Domestic violence was reclassified based on the nature of the incident. If it was physical and a party was injured you will head to court on relevant assault criteria. If you called her a drunken whore (im assuming youre an adult eli5) then you will not be criminally considered. The previous law allowed too much freedom to judges. The current law is less abstract and enforces minimum CRIMINAL charges." ]
[ [ "former Soviet Union, sexual assault is rarely taken seriously, especially in Russia under Vladimir Putin. Even the most egregious rape cases, which at one time would have been universally condemned, often result in no punishment for the perpetrators. Decriminalization In February 2017, with the support of the Russian Orthodox Church, Russia decriminalized domestic violence in cases where it does not cause \"substantial bodily harm\" (such as broken bones or a concussion) and does not happen more than once a year. As a result, domestic violence increased while reporting declined sharply, and police began to refuse to investigate domestic violence cases.", "-30.118247762373358" ], [ "UN's first ruling on domestic violence in Russia, the UN Committee for the Elimination of Discrimination Against Women (CEDAW) ruled in Timagova's favor and ordered Russia to pay her \"adequate financial compensation.\" CEDAW further stated that Russia must amend its laws to criminalize gender-based violence and properly investigate allegations of violence against women. Russia was given six months to submit a written response detailing the steps taken with regard to the case.\nAlso in April 2019, the National Hockey League suspended defenseman Slava Voynov for the 2019-2020 season and 2020 playoffs, citing \"unacceptable off-ice conduct\" after he was arrested and charged", "-29.193186554475687" ], [ "\nMarina Pisklakova-Parker, director of the Anna Centre, an organization that helps domestic violence victims, said decriminalization has proven \"very dangerous to the safety of thousands of Russian women.\" In December 2018, Russia's top human rights official, Tatyana Moskalkova, called decriminalization a \"mistake\" and said new legislation was needed to combat domestic violence.\nNGOs filed a complaint with the United Nations in 2013 on behalf of Shema Timagova, a Chechen woman whose husband attempted to murder her with an axe. A Chechen court effectively cleared the husband, finding that the woman had \"provoked\" him into attacking her. In April 2019, in the", "-28.8992523435154" ], [ "Domestic violence in Russia 2000s In 2008 a representative of the Ministry of Internal Affairs Lt. Gen Mikhail Artamoshkin expressed his concerns over the country's crime rate, that had doubled in a mere five years between 2002 and 2006. He emphasized that also domestic violence had increased so that up to 40 percent of all serious violent crimes were committed within families. Every year about 14,000 women died in the hands of partners or other relatives, and 3,000 women killed their partners. In 90 percent of cases, a woman had first experienced systematic beating and violence.\nAbout two-thirds of premeditated murders", "-28.17226509854663" ], [ "publicly stated her opinion that the present laws against domestic violence, in which the convicted are subject to fines and a two-year prison sentence, are \"absurd\" suggesting that such a punishment is excessive for \"just a slap.\"\nOn 11 January 2017, during the first reading of the law, 368 Russian lawmakers voted in favour of the law, one deputy voted against and another abstained. Criticism The Russian political scientist Mark Urnov has described the laws instigated by Yelena Mizulina as \"diverse, but having a single common quality – their capacity to spread intolerance. They are simply a legal expression of the", "-27.009780313353986" ], [ "medical scientific society whose works had a resounding influence in Russia, started the discussion on decriminalization of abortion. Others followed: in 1911 the Fourth Congress of the Society of Russian Midwives, in 1913 the Pirogov Society's Twelfth Congress, and in 1914 the Russian group of the International Society of Criminologists came forward supporting decriminalization. 1920-1936 The Soviet government was the first government to legalize abortion. In October 1920 the Bolsheviks made abortion legal within the Russian Soviet Federative Socialist Republic with their “Decree on Women’s Healthcare.” After the RSFSR the law was introduced in Ukraine (5 July 1921) and then", "-26.5885823481658" ], [ "the Second Marriage Law of 1980, and the Law on the Protection of Women's Rights and Interests all contain provisions that prohibit the abuse of women and family members in general. Even though domestic violence had been implicitly and then officially illegal, in reality there were no mechanisms through which abused women could seek legal reparations in the 20th century. Legal Services and Governmental Entities According to the report published in 2017 on the implementation of the Domestic Violence Law of 2015, there are more than 2,000 shelter locations provided for victims of domestic violence across the country. However, most", "-26.467222880775807" ], [ "the remainder of the Soviet Union.\nThe Soviet Union's revolutionary leadership saw women's access to safe legal abortion both as an essential component for women's liberation and as a means to end the tragic consequences of unsafe illegal abortions. Before legalization in Russia, as can be seen elsewhere when abortion is illegal, those providing abortions lacked necessary medical qualifications. As a result, women were butchered, causing injury and death. Delivery of legal abortion was imperfect due to the drastic resource limitations imposed on the USSR through U.S. and European siege warfare. It was also the desperation of that starvation blockade and", "-26.43099994561635" ], [ "this has not led to increased gender equality in Russian society overall. A 2016 study argues that it is because female politicians in Russia are \"boxed in by informal rules and by parallel institutions and posts, with virtually no opportunities to advocate for women’s interests. Putin’s regime has promoted women to be “stand ins” during times of crisis or change, “loyalists” and “showgirls” when the regime needs to showcase elections and representation, and “cleaners” when the appearance of corruption threatens the regime.\" Decriminalization of domestic violence In January 2017, the lower house of the Russian legislature decriminalized first time domestic", "-26.40532795735635" ], [ "law was passed for the first time in Mexico City in 2008 and held constitutional by the Supreme Court, which in 2015 established that any state law requiring to prove the case for a divorce was unconstitutional. Russia No-fault divorce was introduced by the Bolsheviks following the Russian Revolution of 1917. Before the Revolution, religious institutions tended to define family life. It was the ecclesiastical law of the various denominations that controlled the family, marriage, and divorce. For example, the official registration of birth, death, marriage, and divorce was the responsibility of the parish church. Under these non-secular laws, divorce", "-26.259498390500084" ], [ "Although order was established, the issues that sparked the violence remained and fueled the peasants' desire for revenge. A tense atmosphere gripped the country. There was the constant presence of the strongly emerging left-wing movement which was bent on purging the decadence of Tsarist Russia. This was, of course, the infant Bolshevik movement, but despite this business was booming again. After the revolution, a small suffragette movement swelled across Russia. The emancipation of women brought a shift in Russian society, billowing Victorian gowns were thrown aside and replaced by fashionable unimpeding svelte dresses designed by designer Lamanova. Divorce laws were", "-26.10951968334848" ], [ "with the implementation of the Law on Police on June 5. This saw the restructuring of police forces into separate State, Security and Local Government levels. The Law on Police 1991 reiterated ethical requirements, whereby police officers were prohibited from performing or supporting acts relating to \"torture or other cruel, inhuman or demeaning treatment or punishment\". However, despite these reforms, issues regarding police brutality arose in light of the Russian population remaining in Latvia. In 1998, police forces were accused of dispersing a rally of predominately Russian pensioners through the use of excessive force and brutality. This hostility towards Russians", "-26.03022724785842" ], [ "the violence remained and fueled the peasants' desire for revenge. A tense atmosphere gripped the country. There was the constant presence of the strongly emerging left-wing movement which was bent on purging the decadence of Tsarist Russia. This was, of course, the infant Bolshevik movement, but despite this, the business was booming again. After the revolution, a small suffragette movement swelled across Russia. The emancipation of women brought a shift in Russian society; billowing Victorian gowns were thrown aside and replaced by fashionable unimpeded svelte dresses designed by designer Nadezhda Lamanova. Divorce laws were eased in response to women's demands", "-25.989848642842844" ], [ "from individuals or groups within its jurisdiction. Rape is illegal in Azerbaijan and carries a maximum 15-year prison sentence. A new domestic violence law come into force in 2010, which criminalized spousal abuse, including marital rape. Central Asia During the Russian Empire, the participation of women in public office was not possible in Muslim territories. The Communist Party of the Soviet Union ruled after the Russian Empire, and the first women were elected to local and central governing bodies because of its new policies. This representation was low, however, until the end of the 1930s. In Turkestan,", "-25.75363253397518" ], [ "harmful traditional practices. In addition, the Council of Europe adopted a convention which addresses domestic violence and violence against women, and calls for the states which ratify it to create and fully adjudicate laws against acts of violence previously condoned by traditional, culture, custom, in the name of honor, or to correct what is deemed unacceptable behavior. The United Nations created the Handbook on effective police responses to violence against women to provide guidelines to address and manage violence through the creation of effective laws, law enforcement policies and practices and community activities to break down societal norms that condone", "-25.700487278882974" ], [ "Russian war crimes Russian war crimes are the violations of the law of war, including the Hague Conventions of 1899 and 1907 and the Geneva Conventions, consisting out of war crimes and crimes against humanity, of which the official armed and paramilitary forces of the Russian Federation are accused of committing since the dissolution of the Soviet Union in 1991. This also extends to include aiding and abetting crimes of proto-states or client states armed and financed by Russia, including Luhansk People's Republic and Donetsk People's Republic. These have included the summary execution of captured enemy combatants, the mistreatment of", "-25.68735061516054" ], [ "the \"Domestic Violence (Crime and Punishment)\" bill introduced in 2002 is at a standstill. Complaints by women’s rights activists are directed towards the lackadaisical efforts of the law enforcement agencies in which disputes are settled without any charges pressed against the perpetrators. This is reflected in a statement by activist and former National Women Commission (NWC) chairperson Bandana Rana, \"Often, police and local people try to settle the domestic dispute by pressing the women into accepting their ‘fate’ as the society is still dominated by Hindu patriarchy with its own set of strict codes—many of which are in conflict with", "-25.62401900664554" ], [ "of a historic reversal of patriarchy, and of the need to avoid further victimizing the victims (women).\nThere was virtually no support for the commission's recommendations in the ensuing consultation process, most commentators opposing any criminalization. Bills from women parliamentarians criminalizing clients continued to be presented, and the Government was criticized for inaction. The Kvinnofrid law (1999) The resulting government bill (5 February 1998) packaged both commission reports together as a Violence Against Women Act (Kvinnofrid), including criminalization of purchase in the prostitution provisions and measures to combat sexual harassment in the workplace. It was sponsored by both the Prime Minister,", "-25.556350489961915" ], [ "against women and domestic violence, also known as the Istanbul Convention, is the first legally binding instrument in Europe in the field of domestic violence and violence against women, and came into force in 2014.\nCountries which ratify it must ensure that the forms of violence defined in its text are outlawed. In its Preamble, the Convention states that \"the realisation of de jure and de facto equality between women and men is a key element in the prevention of violence against women\". The Convention also provides a definition of domestic violence as \"all acts of physical, sexual, psychological or economic", "-25.510367338953074" ], [ "code (e.g. assault), but in practice cases of domestic violence turn into criminal cases only when they involve severe injuries, or the victim has died. For more details see Domestic violence in Russia.\nIn Turkey 42% of women over 15 have suffered physical or sexual violence.\nFighting the prevalence of domestic violence in Kashmir has brought Hindu and Muslim activists together. According to some Islamic clerics and women's advocates, women from Muslim-majority cultures often face extra pressure to submit to domestic violence, as their husbands may manipulate Islamic law to exert their control.\nOne study found that half of Palestinian women have been", "-25.47575743624475" ], [ "further series of persecutions during the Simele massacre in 1933, with the death of approximately 3000 Assyrian civilians at the hands of the Iraqi Army. Soviet Union and Warsaw Pact Countries After the Russian Revolution of 1917, the Bolsheviks undertook a massive program to remove the influence of the Russian Orthodox Church from the government while outlawing antisemitism in Russian society, and promoting atheism. Tens of thousands of churches were destroyed or converted to other uses, and many members of the clergy were murdered, publicly executed and imprisoned for what the government termed \"anti-government activities.\" An extensive educational and propaganda", "-25.454770708514843" ], [ "By 1998 still two in three abortions had some kind of health complication. Among the most common of these complications is unintentional secondary sterilization, which happens to one in ten Russian women who seeks an abortion in her lifetime. Among minors getting abortions, this rate is twice as high. Illegal abortions, performed without license by doctors or babki, have higher rates of mortality and sterilization even than legal abortions, but remain relatively popular because of their confidentiality. Current law During the 2000s, Russia's steadily falling population (due to both low birthrates and life expectancy) became a major", "-25.419261838076636" ], [ "prison sentence. A new domestic violence law come into force in 2010, which criminalized spousal abuse, including marital rape. Nevertheless, others highlight that in reality many in Azerbaijan do not consider this as a crime and the prevailing culture does not encourage complaints about marital rape.\nDuring 2011 female members of parliament and the head of the State Committee on Women and Children increased their activities against domestic violence. Media coverage of domestic violence issues also began to raise awareness of the problem. A 2010 law establishes a framework for investigation of domestic violence complaints, defines a process to issue", "-25.416362491087057" ], [ "Violence against women in Ukraine Violence against women is an entrenched social problem in Ukrainian culture engendered by traditional male and female stereotypes. It was not recognized during Soviet era, but in recent decades the issue became an important topic of discussion in Ukrainian society and among academic scholars. Current situation Nuzhat Ehsan, UN Population Fund representative in Ukraine, stated in February 2013 “Ukraine really has an unacceptable level of violence, mainly by men and mainly due to high level of alcohol consumption”. He also blamed loopholes in the legislation contribute to the problem of domestic violence, “You can violate", "-25.354823309346102" ], [ "and support for Russian expansion into Crimea and Eastern Ukraine has been largely criticised as the church under Patriarch Kirill of Moscow have halted social progressivism in Russia and developed the violation of human rights in Russia for homosexuals. History The traditions of autocracy and patrimonialism developed in Russia in the 17th and 18th century, as Ivan lll built upon Byzantine traditions of autocracy, allowing for the development of Tsarism and the monarchy of the Romanov dynasty in the 19th and 20th centuries. This payed the groundwork for the development of totalitarianism in the Soviet Union after the Russian revolution,", "-25.34866522217635" ], [ "the world's worst violators of freedom of religion, a \"country of particular concern\" under the International Religious Freedom Act.\nAntisemitism is present in Russian society, with a number of violent incidents occurring in the 21st century. The prominence of antisemitism in Russia has decreased since its peak in the early 2000s. San Marino The laws of San Marino prohibit religious discrimination, prevent restrictions on religious freedom, and include provisions for prosecuting religious hate crimes. A code of conduct for media professionals prohibits the spreading of information that may discriminate against someone by religion.\nCatholic religious instruction is offered in all public schools,", "-25.331665502744727" ], [ "often stems from cultural ideas about women in Hungarian society and the idea that some amount of violence is inevitable. Until new legislation was introduced in 2013, Domestic Violence was not categorized as a separate offence from other assaults. This means that victims of domestic violence in Hungary were accosted the same rights as victims from a range of circumstances. According to Human Rights Watch, \"authorities [often] told victims that extreme physical violence…should be considered light, and not sufficiently serious to trigger an investigation’’. However, in other cases when women reported the abuse to the police, the alleged", "-25.2260859432281" ], [ "euthanasia, the Party of the Democratic Revolution (PRD) and the Institutional Revolutionary Party (PRI) have introduced bills to decriminalize it in both the Senate (2007) and the Legislative Assembly of the Federal District (2009), but have failed to change the Article 166 bis 21 of the General Health Law, which still defines euthanasia as mercy homicide. In addition, as of December 2010, 18 out of 31 states have modified their constitution under pressure from the dominant Catholic Church to protect the right to life \"from the moment of conception until natural death\", effectively discarding any initiative contemplating active euthanasia within", "-25.196990782627836" ], [ "the procedure of forced abortion and sterilization of disabled women and the need for court decision to perform them. The order was repealed by the head of Ministry of Health and Social Development of the Russian Federation Tatyana Golikova in 2009. Therefore, now women can be subjected to compulsory sterilization without court decision, according to the Perm Krai ombudswoman Tatyana Margolina. In 2008, Tatyana Margolina reported that 14 women with disabilities were subjected to compulsory medical sterilization in Ozyorskiy psychoneurological nursing home whose director was Grigori Bannikov. The sterilizations were performed not on the basis mandatory court decision appropriate for", "-25.189068598556332" ], [ "cases of domestic violence in the United States, but arrests remained rare. Wife beating was made illegal in all states of the United States by 1920.\nModern attention to domestic violence began in the women's movement of the 1970s, particularly within feminism and women's rights, as concern about wives being beaten by their husbands gained attention. The first known use of the expression \"domestic violence\" in a modern context, meaning \"spouse abuse, violence in the home\" was in 1973. With the rise of the men's movement of the 1990s, the problem of domestic violence against men has also gained significant attention.\nAttention", "-25.166145836325086" ], [ "1990s, Japan passed the Prevention of Spousal Violence and the Protection of Victims act in 2001. The law referred to domestic violence as \"a violation of the constitutional principle of equal rights between sexes\". This law established protection orders from abusive spouses and created support centers in every prefecture, but women are still reluctant to report abuse to doctors out of shame or fear that the report would be shared with the abuser. A 2001 survey showed that many health professionals were not trained to handle domestic abuse and blamed women who sought treatment.\nIn 2013, 100,000 women reported domestic violence", "-25.105250489563332" ], [ "of them are women. From the historical point of view the problem of violence against women in Ukraine was always surrounded by silence. There are not too many sources of official statistics to estimate how deep the problem is. This fact also brings understanding that the mass media is unsure how to approach the issue, the authorities do not know how to deal with the manifestations of the violence and the nation doesn't know how to mobilize the public to end the violence. As a result all national anti-violence efforts rely on considerable support from Western donors A few available", "-25.07477325263062" ], [ "Other legislation and official measures In November 1917, within weeks of the revolution, the People's Commissariat for Enlightenment was established, which a month later created the All-Russian Union of Teachers-Internationalists for the purpose of removing religious instruction from school curricula. In order to intensify the anti-religious propaganda in the school system, the Chief Administration for Political Enlightenment (Glavpolitprosvet) was established in November 1920.\nAfter the registration of marriage was secularized, local governments began to force the clergy to remarry those who had had their marriages annulled by civil divorce. The church was only willing to remarry those who conformed to church", "-25.02741479697579" ], [ "and amend it as necessary. The dissemination of information about gender equality and education in the field has been defined by the law as essential. Prevention of domestic violence A law to prevent domestic violence was adopted on 22 June 2010. The law focuses on domestic violence between close relatives to mitigate its negative legal, medical and social outcomes and provide legal and social assistance for victims. Although it does not state that its aim is to protect women, women are the victims in most cases of domestic violence. The law accepts the prohibition of discrimination against women as a", "-24.950463581015356" ], [ "violence in the country, however anecdotal evidence does indicate it to be widespread, but largely going unreported The Crimes Act 1969, while providing for major sexual offences, does not include the full range of acts usually involved in domestic violence cases.\nThere exists a “no-drop” policy response to domestic violence arrests, meaning that police must proceed with the case notwithstanding the wishes of the victim. Victims who wish to have their case withdrawn must make their request to the court. Progress has been made through the Non-Governmental Organisation Women's Counselling Centre, Te Punanga Tauturu Incorporated, which delivers educational awareness", "-24.9447353653959" ], [ "at the abortionist's doorstep after being unable to find employment.\" 1936-1955 In 1936 the Soviet Union made abortion illegal again, stemming largely from concerns about population growth. The law that outlawed abortion did not only do just that, but rather contained several different decrees. The official title of the law was, “Decree on the Prohibition of Abortions, the Improvement of Material Aid to Women in Childbirth, the Establishment of State Assistance to Parents of Large Families, and the Extension of the Network of Lying-in Homes, Nursery schools and Kindergartens, the Tightening-up of Criminal Punishment for the Non-payment of Alimony, and", "-24.874628303339705" ], [ "action. Domestic violence Domestic violence in Chile is a serious issue affecting a large percentage of the population, especially among lower income demographics. The Intrafamily Violence Law passed in 1994 was the first political measure to address violence in the home, but because the law would not pass without being accepted by both sides, the law was weak in the way it addressed victim protection and punishment for abusers. The law was later reformed in 2005. A 2004 SERNAM study reported that 50 percent of married women in Chile had suffered spousal abuse, 34 percent reported having suffered physical violence,", "-24.874161292042118" ], [ "of the Beijing Declaration and Platform for Action in 2000. Egypt, for instance, abolished a law that exempted men from rape charges when marrying their victims. However, the goal of antiviolence legislation is often to keep the families together, regardless of the best interests of women, which perpetuate domestic violence.\nInnovative measures have been pioneered in a number of countries to end violence against women. In Brazil and Jordan, women's police stations have been introduced, and one-stop women's shelters were created in Malaysia and Nicaragua.\nMarital rape has been illegal in every American state and the District of Columbia since 1993, but", "-24.86139794747578" ], [ "the registration of religious groups. Some religious groups have reported difficulties in legally acquiring property (including property previously confiscated by the government of the Soviet Union) due to discriminatory treatment by local government bodies.\nThere are ongoing disputes of jurisdiction between the Ukrainian Orthodox Church – Kiev Patriarchate and the Ukrainian Orthodox Church Moscow Patriarchate, which split as a consequence of the Russian military intervention. Far-right Ukrainian nationalist groups such as Freedom have assaulted members of the Moscow Patriarchate and otherwise harassed them. \nThere have been several instances of violence against Jews in Ukraine since 2013.\nVandalism against religious buildings and monuments", "-24.855365545779932" ], [ "the land as long as the government remained autocratic.\nOne response to this repression was the formation of Russia's first organized revolutionary party, Narodnaya Volya (\"People's Will\"), in June 1879. It favored the use secret society-led terrorism as an attempt to violently destabilize the Russian Empire and provide a focus for popular discontent against it for an insurrection, justified “as a means of exerting pressure on the government for reform, as the spark that would ignite a vast peasant uprising, and as the inevitable response to the regime's use of violence against the revolutionaries”. The group developed ideas—such as targeted killing", "-24.83336842036806" ], [ "out of a population of 143 million people. Abortion in the Russian Empire Abortion was illegal in the Russian Empire. The practice is not directly referenced in the Domostroi, though child rearing is a common topic. During Tsar Alexis Romanov's reign the punishment for abortion was death, only later removed by Peter the Great. Abortion continued to be a serious crime until 1917. Through articles 1462 and 1463 of the Russian Penal Code individuals \"guilty of the crime could be deprived of civil rights and exiled or sentenced to hard labor.\" Despite its illegality, \"black market\" abortions existed. Obstetric", "-24.8316955017508" ], [ "women sought and obtained sterilizations. This is a factor in the declining rates of unintended pregnancy in Russia. 2003 was the first time in fifty years that laws regarding access to abortion were made stricter; every other piece of legislation on the topic in both the Soviet Union and the Russian Federation was to grant women easier access.\nIn 1991, the year of the fall of the Soviet Union a record of about 3,608,000 abortions were performed in Russia. This number declined steadily over the years and by 2002 Russian doctors were performing 1,802,000 abortions annually. ", "-24.822971426066943" ], [ "Law Against Rehabilitation of Nazism Law Against Rehabilitation of Nazism is a Russian memory law of 2014. It also known as Yarovaya Law, after a Russian politician (Irina Yarovaya) who was instrumental in passing it.\nThe law was originally proposed in 2009. It was approved by the Russian parliament in April 2014, and signed into law by President of Russia Vladimir Putin in May that year. Contents The law introduced Article 354.1 to the Criminal Code of the Russian Federation, making it a criminal offense \"to deny facts recognized by the international military tribunal that judged and punished the major war", "-24.809130645546247" ], [ "the outcry, Fidesz lawmakers decided that parliament should decide about incorporating domestic violence into the country's new Penal Code as a separate offence, a demand signed by 105,000 people in an initiative.", "-24.7856024724897" ], [ "rule have been persecuted, Russian law restricting freedom of speech has been imposed, and the new pro-Russian authorities \"liquidated\" the Kiev Patriarchate Orthodox church on the peninsula. The Crimean Tatar television station was also shut down by the Russian authorities.\nAfter the annexation, on 16 May the new Russian authorities of Crimea issued a ban on the annual commemorations of the anniversary of the Deportation of the Crimean Tatars by Stalin in 1944, citing \"possibility of provocation by extremists\" as a reason. Previously, when Crimea was controlled by Ukraine, these commemorations had taken place every year. The pro-Russian Crimean authorities also", "-24.761849256930873" ], [ "of incidents, i.e. cut-offs, take-overs, coercive price policy, blackmail or threats, is over fifty in total (of which about forty are cut-offs). Incidents appear to be equally divided between the Yeltsin and Putin eras, but the number of cut-offs has decreased by half during Putin. The immediate reasons for Russia's coercive policy appear to be political concession in ongoing negotiations, infrastructure take-over, and execution of economically favorable deals or to make political statements. There are economic underpinnings in the majority of the cases and Russian demands for payments of debts are legitimate. However, there are also political underpinnings in more", "-24.70349894912215" ], [ "sterilization has occurred throughout much of the world, both at the hands of the state and from intimate partners. Studies show forced sterilizations often target socially and politically disadvantaged groups such as racial and ethnic minorities, the poor, and indigenous populations. According to the Convention on the Elimination of all forms of Discrimination Against Women, all \"women are guaranteed the right to decide freely and responsibly on the number of and spacing of their children, and to have access to information, education, and means to enable them to exercise these rights.\"\nIn the United States, much of the history of forced", "-24.68688677623868" ], [ "human rights in Russia.\nSimilar acts are being considered in the UK parliament and Irish Dáil.\nIn December 2012, the Russian parliament passed a bill which was widely regarded by mass media, including Russia's media, as retaliation for the Magnitsky bill. Russia's bill signed into law by Putin on 28 December 2012, banned, among other things, Americans from adopting Russian children.\nIn the 2013 meetings of the World Economic Forum, the issue surfaced at the highest level, with Reuters reporting that before Medvedev gave his opening speech, some 78 percent of respondents voting in an audience packed with hundreds of Western executives and", "-24.684775832574815" ], [ "in the governmental efforts to improve gender equality in South Korea, by protecting women's rights in employment, health, and education, and reducing violence against women. \nIn 2009, the Korean government spent 27.1 billion Korean Won out of the national budget in the punishment and prevention of domestic and sexual violence. Definition According to the government of the Republic of Korea, domestic violence crimes are defined as acts of assault, injury, abandonment, abuse, arrest, confinement, intimidation and so on between family members which inflict physical, mental or property damage . Domestic violence cases are treated as special cases in the investigation", "-24.662164142013353" ], [ "orgies taking place in the desecrated churches.\nThe pretexts for these killings was usually alleged support for the enemy, criticism of the Bolsheviks and/or their ideology, or for liberal and/or bourgeois sympathies. Telling people to follow God's laws above what the state directed was also used as a pretext for their killing. The uncertainty of the revolution's success in the early years may also have triggered some paranoia among the Bolsheviks towards groups that they considered threatening.\nThe orthodox church must have thought that the Bolsheviks would lose power, because after Tikhon's election it declared that the Russian Orthodox Church was the", "-24.64822988540982" ], [ "prosecutions, convictions, and sentences for domestic violence were available. In 2010, the Association of Female Heads of Families (AFCF) provided legal assistance to 1,753 domestic violence victims. Police and the judiciary occasionally intervened in domestic abuse cases, but women rarely sought legal redress, relying instead on family, NGOs, and community leaders to resolve domestic disputes. Many domestic violence cases are handled by a traditional judge under Shari'a outside the secular system. NGOs reported that in certain cases they had turned directly to police for help to protect victims of domestic violence, but police declined to investigate.\nTraditional forms of mistreatment of", "-24.605628675199114" ], [ "animal rights activist campaigns and the European Council directive of September 24, 2009, the Polish government passed an animal protection law that had the effect of banning kosher slaughter. This was condemned by Jewish groups in Poland and around the world. Poland is the second member state of the European Union to pass a relevant bill, after Sweden. In the parliamentary vote, although 178 members voted for re-legalizing ritual slaughter, 222 members opposed it. The new law is causing concerns for some Polish meat processing plants. The Shechita ritual requires cutting the throat of an animal without stunning it first.", "-24.595451708999462" ], [ "government was responsible for the massacre, some Russian historians and journalists responded by alleging mass executions of Soviets in post-World War I Polish internment camps. The early Soviet deaths became the subject of, according to the Polish government, \"various propagandist campaigns\" purporting that the massacre of the Poles was \"justified\" in the eyes of Stalin.\nProfessor Aleksandr Guryanov, of the Memorial Society, named Mikhail Gorbachev as one of the instigators of \"anti-Katyn\" when Gorbachev demanded an investigation into the deaths of the Soviet citizens in Polish custody and other damages to the Soviet Union from the side of Poland, with results", "-24.58674760069698" ], [ "violence in Russia, directed in a great part against the people from Caucasus. The Russian authorities were unlikely to label random attacks on people of non-Russian ethnicity as racist, preferring calling it \"hooliganism\". The number of murders officially classified as racist more than doubled in Russia between 2003 and 2004. The violence included acts of terrorism such as the 2006 Moscow market bombing which killed 13 people. In 2007, 18-year-old Artur Ryno claimed responsibility for 37 racially motivated murders in the course of one year, saying that \"since school [he] hated people from the Caucasus.\" On 5 June 2007, an", "-24.576840483074193" ], [ "Violence Against Women Act The Violence Against Women Act of 1994 (VAWA) was a United States federal law (Title IV, sec. 40001-40703 of the Violent Crime Control and Law Enforcement Act, H.R. 3355) signed as Pub.L. 103–322 by President Bill Clinton on September 13, 1994 (codified in part at 42 U.S.C. sections 13701 through 14040). The Act provided $1.6 billion toward investigation and prosecution of violent crimes against women, imposed automatic and mandatory restitution on those convicted, and allowed civil redress in cases prosecutors chose to leave un-prosecuted. The Act also established the Office on Violence Against Women within the Department", "-24.55787365065771" ], [ "debated issue was \"expropriations\". To support their political activities, the RSDLP and other revolutionary groups in Russia (such as the Socialist Revolutionary Party and various anarchist factions) used \"expropriations\", a euphemism for armed robberies of government offices or private businesses. Lenin and the most militant Bolsheviks supported continued \"expropriations\", while the Mensheviks advocated a non-violent approach to revolution. The 5th Congress passed a resolution which condemned participation in or assistance to all violent activity, including \"expropriations\", as \"disorganising and demoralizing\", and called for all party militias to be disbanded. This resolution passed with 65 % supporting and 6 % opposing (others abstained", "-24.55112361848296" ], [ "killing of women). In response to violence against women, the government has passed laws and created agencies in order to stunt the high rates of gendered violence in Guatemala in the 1990s: in 1996 it enacted Ley para prevenir, sancionar y erradicar la violencia intrafamiliar (Law on the Prevention, Punishment and Eradication of Domestic Violence). In 2008, it enacted Ley contra el Femicidio y otras Formas de Violencia Contra la Mujer (Law against Femicide and Other Forms of Violence Against Women), and in 2009 it enacted Ley contra la violencia sexual, explotación y trata de personas (Law against", "-24.510942967346637" ], [ "Mass Media Law in the late 2000s have been aimed at limiting the spread of \"extremism, terrorism, violence and pornography\" as well as the coverage of anti-terrorism operations. The broad definition of extremism in Russia legislation and its use to silence government critics have fostered self-censorship among journalists to prevent harassment. Amendments to the Mass Media Law in the late 2000s have been aimed at limiting the spread of \"extremism, terrorism, violence and pornography\" as well as the coverage of anti-terrorism operations. However, the 2006 Federal Law on Combating the Terrorism and the 2006 Law on Counteracting the Extremist Activity,", "-24.492795514583122" ], [ "for victims of gender-based violence. One of the more groundbreaking achievements the organization has reached was the Domestic Violence Act of 1994. The act of 1994 made it illegal and punishable by law to commit violence against a victim regardless of relation or age. The All Women's Action Society also does outreach work to provide training courses in areas of gender inequality and violence. In addition, they help provide counseling services to victims of gender-based abuse. The organization founded a crisis line in 1997 under the name of Telenita. Since the founding of the organization, the mission took a more", "-24.45573228509238" ], [ "offered legal remedies, which include the criminal law, as well as obtaining a protection order. The remedies offered can be both of a civil nature (civil orders of protection and other protective services) and of a criminal nature (charging the perpetrator with a criminal offense). People perpetrating DV are subject to criminal prosecution, most often under assault and battery laws. Asia In Russia, according to a representative of the Russian Ministry of Internal Affairs one in four families experiences domestic violence. Domestic violence is not a specific criminal offense, but it can be charged under various crimes of the criminal", "-24.44867025059648" ], [ "Violence against women, for example, is frequently legitimised by arguments from culture, and yet is prohibited in IHL and other international law. In such cases, it is important to ensure that IHL is not negatively affected.", "-24.42658760444465" ], [ "Bibiana Aído Criticism The “Organic Act of Integrated Protection Measures against Gender Violence” resulted in an epidemic of false allegations against innocent men.\nJudge Maria Sanahuja said: “The gender violence law is a disgusting violation of human rights in Spain. It is a madness that creates abuse and destroys the burden of proof. We are abusing of thousands of children, thousands of fathers, thousands of men, thousands of grandfathers”. Judge Francisco Serrano Castro said “a penal code with different laws for different categories of persons existed in 20th century Europe only under Nazism and Stalinism. [...] Illegal detentions, suicides of", "-24.420426762546413" ], [ "continuing abuse. The collaboration process between representatives of the Department of Justice, Safety and Security, Health Education, Welfare, Correctional Services and the National Directorate for Public Prosecution was a delaying factor that slowed down the process of changing the policies. Within the first year of the Domestic Violence Act being created, 1,696 applications were submitted for protective orders. In a report done by the United Nations Division of the Advancement of Women, they discovered about the protective orders that women were able to fill out, that the forms were only available in two out of the eleven languages that are", "-24.403812226082664" ], [ "The legal response of Paraguay to domestic violence has been very weak, even by The Latin American standards. Although Paraguay enacted in 2000 Law No. 1,600 Against Domestic Violence (Ley No 1.600 contra la Violencia Doméstica), this law - while having a broad definition of domestic violence (including physical, psychological and sexual abuse \"lesiones, maltratos físicos, psíquicos o sexuales\" ) - is civil in nature, and as such does not provide for any sanctions against the perpetrators. While the Criminal Code provides for a crime of domestic violence, this crime has a very narrow definition,", "-24.40071833985394" ], [ "reform and protect women against family violence. After much lobbying and protesting, people within these NGOs succeeded in pushing the draft law to the parliament where it sat in arrest. Over time, while it was stuck at Parliament, this law was amended continuously due to objections of religious conservatives. The biggest disagreement regarding this law was one of the most prevalent issues for women: marital rape. Suggestions to amend the law included removal of the segment outlining marital rape as a crime. Although passing that law may lead to the decrease of many violent situations within the household, its proposed", "-24.39152767736232" ], [ "for Women's Equal Rights was the most important feminist organization in Russia. Like the Russian Women's Mutual Philanthropic Society, it was focused on education and social welfare, but it also pushed for equal rights for women, including suffrage, equal inheritance, and an end to passport restrictions. The 1917 Revolution, catalyzed in part by women workers' demonstrations, generated a surge of membership in the organization. In the same year, because of the society's continued lobbying, Russia became the first major world power to grant women the right to vote. Feminism in Soviet society Vladimir Lenin, who led the Bolsheviks to power", "-24.38063130219234" ], [ "LGBT community had no choice. It was either Europe, or a return to Russian anti-gay legislation. In fact, a law similar to Russia’s was already being proposed under the Yanukovich regime. And yet, Ukraine had been the first of the post-Soviet countries to decriminalize homosexuality. These activists wanted to keep things that way but they want much, much more.\" .As a result of the illegal occupation of Crimea and", "-24.338430110015906" ], [ "Involuntary euthanasia United States Euthanasia became a subject of public discussion in the United States at the turn of the 20th century. Felix Adler, a prominent educator and scholar, issued the first authoritative call in 1891 for the provision of lethal drugs to terminally ill patients who requested to die. In 1906, Ohio considered a law to legalize such a form of euthanasia, but it did not make it out of committee. While much of the debate focused on voluntary euthanasia, other calls for involuntary euthanasia were vocalized as well. In 1900, W. Duncan McKim, a New York physician and", "-24.320755071559688" ], [ "century led to changes in both popular opinion and legislation regarding domestic violence within the United Kingdom and the United States. In 1850, Tennessee became the first state in the United States to explicitly outlaw wife beating. Other states soon followed suit.\nIn 1878, the Matrimonial Causes Act made it possible for women in the UK to seek separations from abusive husbands. By the end of the 1870s, most courts in the United States were uniformly opposed to the right of husbands to physically discipline their wives. By the early 20th century, it was common for the police to intervene in", "-24.30917562142713" ], [ "several factors. Since the Russian Revolution of 1905, the Kresy Wschodnie and other borderlands had experienced a political culture of violence. The period of Soviet rule had been profoundly traumatic for residents of the Baltic states and areas that had been part of Poland until 1939; the population was brutalised and terrorised by the imposed Soviet rule, and the existing familiar structures of society were destroyed.\nHistorian Erich Haberer notes that many survived and made sense of the \"totalitarian atomization\" of society by seeking conformity with communism. As a result, by the time of the German invasion in 1941, many had", "-24.309107697277796" ], [ "Other major changes included granting women the right to vote, bans prohibiting forced marriage, banning child marriage and bride price. All of which were components of ending the involuntary enslavement, sale, rape, and pedophilia hurting women and girls under Tsarist rule. The revolution also greatly weakened restrictions that the Tsarist state used to interfere with and prevent divorce. Women's access to education, healthcare, leadership positions of authority, and the employment of women were all greatly improved. The Russian Revolution also achieved a separation of church and state, weakening the church's patriarchal influence. Female and male genital mutilation practices were performed", "-24.308273416536395" ], [ "Bitch Wars Background The Russian word suka (\"сука\", literally \"bitch\") has a different negative connotation than its English equivalent. In Russian criminal argot, it specifically refers to a person from the criminal world who had \"made one's self a bitch\" (Russian: ссучился, romanized: ssuchilsya) by cooperating in any way with law enforcement or with the government. Within the Soviet prison-system a historical social structure had existed since the Russian Tsarist era. One of the important tenets of the system decreed that members would not serve or collaborate with the Tsarist (or later with the Soviet) government. This rule encompassed any", "-24.298501196259167" ], [ "law from attaining the respect required in a modern society. \nReflecting on the distressing character of revolutionary processes in Russia, he laid the blame on both the Slavophiles and the Westernizers for representatives of both currents displayed negligence with regard to law and even found certain merits in the weakness of the lawful state in Russia. Kistyakovsky pointed out that Alexander Herzen, the key-figure of the early Westernizer movement, saw in that a way to a quicker and easier overthrow of the regime in power, but Konstantin Aksakov considered it to be another manifestation of Russia’s uniqueness: abstaining from law,", "-24.29393048491329" ], [ "Merkel's spokesman said that the law was an attempt to further isolate and discredit members of civil society who were critical of the government.\nBritain's Minister for Europe, David Lidington, said it was \"yet another example of the Russian authorities' harassment of NGOs and those who work with them in Russia\".\nThe US State Department stated it was \"deeply troubled\" by the law and expressed concern that it \"will further restrict the work of civil society in Russia and is a further example of the Russian government's growing crackdown on independent voices and intentional steps to isolate the Russian people from the", "-24.219928046921268" ], [ "providing them with sufficient information about the investigation and described the massacre as a \"war crime\". But it also refused to judge the effectiveness of the Soviet Russian investigation because the related events took place before Russia ratified the Human Rights Convention in 1998. The plaintiffs filed an appeal but 21 October 2013 ruling essentially reaffirmed the prior one, noting Russian courts failed to substantiate adequately why some critical information remained classified. Polish–Russian relations Russia and Poland remained divided on the legal description of the Katyn crime. The Poles considered it a case of genocide and demanded further investigations, as", "-24.20053861476481" ], [ "of vodka. Soviet Russia and the Soviet Union Prohibition continued through the turmoil of the Russian Revolution of 1917 and the Russian Civil War, into the period of Soviet Russia and the Soviet Union until 1925.\nIn the Soviet Union, there were three major anti-alcohol campaigns: started in 1958, 1972, and 1985. Gorbachev's anti-alcohol campaign During 1985–87, Mikhail Gorbachev carried out an anti-alcohol campaign with partial prohibition, colloquially known as the \"dry law\". Prices of vodka, wine and beer were raised, and their sales were restricted in amount and time of day. People who were caught drunk at work or in", "-24.16711575249792" ], [ "Political repression in the Soviet Union Red Terror Red Terror in Soviet Russia was the campaign of mass arrests and executions conducted by the Bolshevik government. The Red Terror was officially announced on September 2, 1918 by Yakov Sverdlov and ended in about October 1918. However Sergei Melgunov applies this term to repressions for the whole period of the Russian Civil War, 1918–1922. Estimates for the total number of people executed during the initial phase Red Terror are at least 10,000, with roughly 28,000 executed per year between December 1917 and February 1922. Estimates for the total number of lives", "-24.1589342248526" ], [ "by a faction of the Russian Orthodox Church, their highly disfigured genitalia regarded as an achievement of purity according to the logic of their Christian anti-sex \"morality\". \nIn 1924, the year of Lenin's death, strong temporary restrictions were placed on access to abortions that were once again lifted in 1926. The 1924 restrictions basically outlawed abortion. The procedure's legality was restricted only to medical emergencies where the continuation of her pregnancy endangered the woman's life or her fetus. Those restrictions were, however, lifted once again in 1926. \nThe Soviet Union encouraged pronatal policies. Soviet officials argued that women would", "-24.157621572667267" ], [ "(November 2/15, 1917) removed special privileges based on faith or nationality. This was soon followed by a decision by Sovnarkom to confiscate all the ROC's monasteries and educational establishments. When the Bolsheviks seized the Holy Synod's printing house, relations between them and the ROC became further strained. One issue was removing Orthodox Christian symbolism from state buildings. However, the Bolsheviks did not prioritise anti-religious campaigning, because they were concerned about how this would affect the popularity of the new regime. Persecution of the Church during the Civil War During the Russian Civil War, the Red Army massacred large numbers of", "-24.145022707554745" ], [ "prevents the public from seeing the key differences between honor killings and domestic violence and also prevents any policies limiting and ultimately, putting an end, to the honor killings.\nAlthough a law in 2004 made honor killings illegal in Pakistan, honor killings still occur in Pakistan largely because of the lack of strict enforcement and the tendency of the legal system following the religious law. By creating laws that aligned legal laws with Islamic law, the Hudood Ordinance of Pakistan, enacted in 1979, created obstacles for women victimized of gender-based crimes. Women were required to provide four male witnesses, but if", "-24.109999025822617" ], [ "Domestic violence in the United Kingdom Domestic violence in the United Kingdom is a criminal offence; the law says that domestic violence or abuse can be physical, psychological, sexual, financial or emotional. Definition The first known use of the term domestic violence in a modern context, meaning violence in the home, was in an address to the Parliament of the United Kingdom by Jack Ashley in 1973. The term previously referred primarily to civil unrest, violence from within a country as opposed to violence perpetrated by a foreign power. Prevalence According to the Office of National Statistics (ONS) about 4.2%", "-24.085350837092847" ], [ "\"calling for illegal meetings\", \"inciting hatred\" and \"violating the established order\".\nThe law allowed for flexible interpretation and inclusion of a wide array of content which was frequently abused by the law enforcement and administration for blanket blocking of publications criticizing state policy or describing daily problems of life in Russia.\nPopular opposition websites encouraging protests against the court rulings in Bolotnaya Square case were for example blocked for \"calling for illegal action\"; Dumb Ways to Die, a public transport safety video, was blocked as \"suicide propaganda\"; websites discussing federalization of Siberia—as \"attack on the foundations of the constitution\"; an article on", "-24.07944287461578" ], [ "kosher practices incompatible with animal rights legislation, specifically the Animal Protection Law of 1997. In December 2014, the Constitutional Tribunal ruled the ban unconstitutional on the grounds that it violated freedom of religion guaranteed by the Polish laws and constitution. Both ways of slaughtering animals were illegal in the country between January 1, 2013 and December, 2014, almost two years, and still is a controversial topic because of the concern of animal cruelty by those foreign practices.\nIn May, 2016, shortly before the World Youth Day 2016, police in Kraków asked foreigners, mainly among the Muslim community, in the city if", "-24.0754451577086" ], [ "On Protecting Children from Information Harmful to Their Health and Development Introduction An amending law was enacted in July 2012. That law contained changes to other laws, introducing a \"child-protecting\" Internet blacklist not related to this law, so Russian Wikipedia protested the bill with a blackout.\nThe law prohibits the distribution of \"harmful\" material among minors, including material which \"may elicit fear, horror, or panic in children\", or depicts violence, unlawful activities, substance abuse, or self-harm. It has been amended twice; an amendment in 2012 instituted a mandatory content rating system for material distributed through an \"information and telecommunication network\" (covering", "-24.075436438259203" ], [ "these prohibitions are often meant, in law or in practice, to control women's and not men's behavior; and are used to rationalize acts of violence against women. According to High Commissioner for Human Rights Navi Pillay: \"Some have argued, and continue to argue, that family violence is placed outside the conceptual framework of international human rights. However, under international laws and standards, there is a clear State responsibility to uphold women's rights and ensure freedom from discrimination, which includes the responsibility to prevent, protect and provide redress – regardless of sex, and regardless of a person's status in the family.\"", "-24.072728888131678" ], [ "restrictions in Russia up to the present day, although that may change. Citing demographic, economic, and moral concerns, the pro-life parties of Russia, with some measured sympathy from president Vladimir Putin, have been pressuring the government to ban abortion outright, or at least restrict its availability. In particular, the Russian Duma has been debating a bill since 2015 to remove financial coverage for abortion from the national healthcare system.\nIn terms of the total number, in 2009 China reported that it had over 13 million abortions, out of a population of 1.3 billion, compared to the 1.2 million abortions in Russia,", "-24.066496106563136" ], [ "to marriage. Modern usage Following the collapse of the Soviet Union, the propiska system was officially abolished. The Russian Supreme Court has ruled the propiska to be unconstitutional on several occasions since the fall of communism and it is considered by human rights organizations to be in direct violation of the Russian constitution, which guarantees freedom of movement. Several former Soviet republics, such as Belarus, Ukraine, Kyrgyzstan, and Russia, chose to keep their propiska systems, or at least a scaled-down version of them.\nRussia changed propiska to registration, though the word propiska is still widely used to refer to it colloquially.", "-24.065202915517148" ], [ "Spousal abuse is a crime, but police were reluctant to enforce laws against or intervene in cases of domestic violence. Assault is punishable by prison terms of one to five years and fines of up to $1,000 (465,000 CFA francs) or, if premeditated, up to 10 years' imprisonment. Many women were reluctant to file complaints against their husbands because they were unable to support themselves financially.\nThe Ministry for the Promotion of Women, Children, and the Family produced a guide on violence against women for use by health care providers, police, lawyers, and judges. The guide provides definitions of the types", "-24.05525563123001" ], [ "Act of 1994 The Violence Against Women Act of 1994 was signed into law by President Clinton in September 13, 1994. The goal of this act, through Section 1154, was to allow battered immigrant women and their children, as well as parents of abused children, the right to “self-petition” for permanent legal residency status, which eliminated the need of the citizen spouse to file such petition. For the next few years the VAWA of 1994 was one way in which the Unites States government aimed to protect immigrant women, but it was not until 2000 when improvements were made to", "-24.029683177024708" ], [ "State Duma, Lyubov Sliska, when asked in Kiev when Russia would apologize for its part in repressions and famines in Ukraine, replied, \"why always insist that Russia apologize for everything? The people whose policies brought suffering not only to Ukraine, but to Russia, Belarus, peoples of the Caucasus, and Crimean Tatars, remain only in history textbooks, secret documents and minutes of meetings.\" Ukrainian mass media censured Evgeny Guzeev, the Consul-General of the Russian Federation in Lviv, who stated that \"the leaders of the period were sensible people, and it is impossible to imagine that this was planned.\" Kyiv Post believes", "-24.02487753308378" ], [ "lessened thresholds and penalties pertaining to abortion. However, its attempt failed to pass the Conservative-controlled National Assembly.\nThe Korean Criminal Code was first introduced in 1953, the year when the Korean War ended. The post-war conditions included a drastic population decline and general social instability. Many explanations tracing the history and legislative purpose of Article 269 and 270 propose that the two provisions were designed to address post-Korean War conditions by promoting the sanctity of lives and population growth. The Korean Medical Service Act (revisions in 1987 and 1994) The revision of the Korean Medical Service Act in 1987 prohibits medical", "-24.016766733537224" ], [ "UK to seek legal separation from an abusive husband. By the end of the 1870s, most courts in the United States had rejected a claimed right of husbands to physically discipline their wives. By the early 20th century, it was common for police to intervene in cases of domestic violence in the United States, but arrests remained rare.\nIn most legal systems around the world, domestic violence has been addressed only from the 1990s onwards; indeed, before the late-20th century, in most countries there was very little protection, in law or in practice, against DV. In 1993, the UN published Strategies", "-24.00588133497513" ], [ "Against Women Act in 1994 was the beginning of a historic commitment to women and children victimized by domestic violence and sexual assault. Our nation has been rewarded for this commitment. Since the Act's passage in 1994, domestic violence has dropped by almost 50%.\" He has also said that the Act \"empower[s] women to make changes in their lives, and by training police and prosecutors to arrest and convict abusive husbands instead of telling them to take a walk around the block\".\nThere has been controversy regarding then-Senator Biden's actions during the Anita Hill hearings of 1991. At the time Biden", "-23.999099645152455" ], [ "has traditionally been very weak on family violence, due to structural problems, resulting from the failure to label domestic violence as a crime and the failure to prosecute domestic violence under general assault statutes. A study conducted in 1990 in Chile showed that 83.3% of battered women’s injuries were classified as ‘light injuries’ and were only punishable as a misdemeanor. Acts of violence that would otherwise be severe crimes under the law, when occurring within the home were passed as ‘light injuries’ and minimal punishment was pursued. Chilean National Ministry for Women (SERNAM) The Chilean National Ministry for", "-23.99703412881354" ], [ "purges in some of the national areas, the policy of korenizatsiya took a new turn, and by the end of the 1930s the policy of promoting local languages began to be balanced by greater Russianization, though perhaps not overt Russification or attempts to assimilate the minorities. By this time, non-Russians found their appetite whetted rather than satiated by korenizatsiya and there was indication it was encouraging inter-ethnic violence to the extent that the territorial integrity of the USSR would be in danger. In addition, ethnic Russians resented the institutionalized and artificial \"reverse discrimination\" that benefited non-Russians and regarded them as", "-23.994697656955395" ], [ "150 years. Persecution of the Churches But with time, a persecution of the Churches, including the Catholic Church, began and intensified. All religion, \"the opiate of the masses\" was considered hostile to communism, but most of the revolutionary violence was oriented against the Russian Orthodox Church. The new regime began to interfere in spheres, so far reserved for the Church, by legalizing divorce, and issuing civil marriage certificates. Bloody repression of civilians, carried out under the auspices of the Polish Comrade Felix Edmundovich Dzerzhinsky, head of the Cheka, led to public protest. Arrest of the Russian Patriarch The Patriarch", "-23.99159516050713" ], [ "and family life) had been abused by Hungarian authorities. After the changes in 2013 however, harsher penalties were introduced for perpetrators of domestic violence. At this time as well, the onus was placed upon the prosecution and not the victim to pursue legal action. This increased the rights of the victims within Hungary in relation to domestic abuse. In spite of these changes however, an instance of domestic violence will only be considered if there have been two separate instances of abuse. Furthermore, the amendments only protected partners who were living together and neglected to protect those", "-23.977058560587466" ], [ "the first ten years of the Russian Federation, the population of Russia declined by 3 million. Concerns about population decline in Russia are widespread and very important to the dialogue on abortion. Attempts to mitigate population decline started with increased financial support for young children in Russia and eventually lead to restricted access to abortion.\nOther factors in the decline of abortion in Russia include the legalization of sterilization. Regulations of contraceptive sterilization had been in place since the 1930s but were lifted in 1993. In the first seven years that the practice was legal, almost 100,000", "-23.974091351687093" ], [ "1906 Russian legislative election History The State Duma was created in a wave of violent attacks against imperial officials and public upheaval, which culminated in a national strike in October 1905 known as Russian Revolution of 1905, paving the way for Russia's first parliament. With the nation's infrastructure all but paralyzed, Tsar Nicholas II signed a historic manifesto of 17 October 1905, promising civil rights to the population and creating Russia's first parliament. Electoral legislation The electoral laws were promulgated in December 1905 and introduced franchise to male citizens over 25 years of age, and electing through four electoral colleges.", "-23.96454854408512" ], [ "Antisemitism in the Russian Empire Pale of Settlement More active discriminatory policies began when the partition of Poland in the 18th century which resulted, for the first time in Russian history, in the possession of land with a large population of Jews. This land was designated as the Pale of Settlement from which Jews were forbidden to migrate into the interior of Russia. In 1772, Catherine II forced the Jews of the Pale of Settlement to stay in their shtetls and forbade them from returning to the towns that they occupied before the partition of Poland. The Pale of Settlement", "-23.945063872262836" ] ]
7yb429
How did a small country like Japan occupy a vast country like China, while still projecting power elsewhere, during the buildup to WW2?
[ "1: They didn't occupy all of China, only parts of the coastline. 2: China was in the middle of a Civil War between the communists and the nationalists, they weren't prepared for an invasion. The two factions did band together to repel the Japanese, but it was an uneasy alliance, and by 1938 it was breaking down. 3: China wasn't exactly the most technologically advanced nation at the time of the Second Sino-Japanese war. For example, they still used biplanes while the Japanese Air Force had actual fighters. 4: Not only were the Chinese technologically inferior, they also had less of everything except manpower. Take a look at the chart [here]( URL_0 ). In 1939 Japan had almost 5 times the aircraft, 4 times the tanks, and 1.5 times field artillery. By 1941, the ratios got even worse. 5: Japanese soldiers were fanatics during battle. Officers often stressed the importance of no retreat, of death over dishonor. This led to Japanese troops achieving victories from the brink of defeat. 6: Japan had the resources to control major cities, but lacked the manpower to lock down the vast countryside, where the Chinese would often launch guerrilla strikes. And by 1941, when the USA joined the war, Japan had to reallocate resources to another front.", "From around 1600 to the mid-1800s, during the Edo period, Japan was a [closed]( URL_0 ), isolationist society. Foreigners were not welcome, and Japanese were not allowed to travel. This ended in 1853 when an American navy fleet led by Commodore Perry [sailed in]( URL_4 ) and said \"Hi, you're going to be trading with us now.... or else.\" The Japanese leadership was still stuck with 200-year-old technology -- literally bows and arrows and swords -- and had nothing to fight back against modern steam warships. So they had no choice but to agree to Perry's demands. Over the next few years, other world powers including Russia also used their navy to push Japan around. Japan was humiliated, and decided to do something about it. They engaged in a crash program of modernization. During the [Meiji]( URL_3 ) era, they hired westerners to teach science and engineering, built railroads, factories, modern schools and hospitals, and most importantly, conscripted a powerful modern army and navy. Within 30 years, Japan had become a modern industrial nation, powerful enough to defend itself against western powers. But that meant it was also powerful enough to go up against its neighbors. As a small island nation, Japan had limited food and mineral resources, and was worried about attack from foreign powers. And hey, if you've got a modern army and navy, there's a huge temptation to use it. To keep its new modern society running, Japan decided to [attack Korea]( URL_1 ), which was very weak militarily, and under the control of China, which had a much less modern military and was dealing with a major revolt on the other side of China at the time. Japan won handily, taking over Korea. Several more conflicts followed against [Russia]( URL_2 ) and China, centered around Japan being worried that they might try to take Korea away, and Russia and China being worried that Japan might not stop with Korea. Japan won all of them, eventually leaving them with control of all of Manchuria (what's now northern China). Not just the coastline, as /u/Dueling7 describes, but up to 700 miles inland to the modern border of Mongolia and Russia. This gave Japan control over the resources of a huge region, and the (unwilling) labor of about 45 million people. This, plus their technological superiority, made them the most powerful empire in the region. So the main answer to the question is that Japan engaged in a crash modernization program after being bullied by Western powers, but it's worth mentioning that things in China were not going nearly as well at the time. The ruling Qing dynasty were ethnic Manchurians, and not popular among the majority Han Chinese. Several popular uprisings against the emperor occurred during this time. In addition, Western powers were working hard to get the entire country hooked on opium so they could profit off it, and several failed revolts against Western trade occurred as a result. China tried to carry out the same modernization program the Japanese were pursuing, but civil unrest and foreign meddling made it impossible.", "The population difference was not as large as you would guess. China had a population of ~517 million and Japan had 73 million in what is Japan today. Add to that 30 million in Korea and Taiwan that Japan had controlled since. 1910 , 1895 So the population difference is only 5:1. China was not a united country but split and there had been a civil war since 1927 between the communist and the Republic of China- Republic of China had formally control on all parts of china expect the communist controlled since 1928 but the former warlords had huge influence and control of their former areas. The Republic of China and communist had a temporary and of the civil war to unite against Japan in 1936 So a country ravaged by civile war was against a united and undamaged country. It is no surprise that better equipped and trained Japanese troops had success in the war. Japan did not occupied all of China Look at the maps [here]( URL_0 ). A estimation is that is they only occupy 1/3. Manchuria was already a Japanese puppet state since 1905. Xinjiang and Tibet that is today controlled by China is not included in the estimation. As they are separated on the maps when they was semindependent/independent at the time." ]
[ [ "Central Asia. Japan Before World War I, Japan had gained several substantial colonial possessions in East Asia such as Taiwan (1895) and Korea (1910). Japan joined the allies in World War I, and after the war acquired the South Pacific Mandate, the former German colony in Micronesia, as a League of Nations Mandate. Pursuing a colonial policy comparable to those of European powers, Japan settled significant populations of ethnic Japanese in its colonies while simultaneously suppressing indigenous ethnic populations by enforcing the learning and use of the Japanese language in schools. Other methods such as public interaction, and attempts to", "-34.99980815150775" ], [ "before Japan's defeat in the Second World War. Japan was probably the first country in East Asia that industrialised successfully. It quickly became one of the imperialist and colonial powers. Japan defeated the Qing dynasty of China in 1894, and subsequently defeated Russia in 1905. Korea and Taiwan were annexed by the Japanese Empire later. When Japan invaded China in 1931, it had already finished its industrialising process and had enough industrial power to wage a war itself. Japan's navy was among one of the world's most advanced navies, with almost no challenger in the Pacific Ocean.\nThe performance of", "-34.84225305658765" ], [ "China) During the Second Sino-Japanese War, Japan advanced from its bases in Manchuria to occupy much of East and Central China. Several Japanese puppet states were organized in areas occupied by the Japanese Army, including the Provisional Government of the Republic of China at Beijing, which was formed in 1937, and the Reformed Government of the Republic of China at Nanjing, which was formed in 1938. These governments were merged into the Reorganized National Government of China at Nanjing on 29 March 1940. Wang Jingwei became head of state. The government was to be run along the same lines as", "-34.769525474635884" ], [ "of agriculture. Transportation and communications developed to sustain heavy industrial development.\nFrom 1894, Japan built an extensive empire that included Taiwan, Korea, Manchuria, and parts of northern China. The Japanese regarded this sphere of influence as a political and economic necessity, which prevented foreign states from strangling Japan by blocking its access to raw materials and crucial sea-lanes. Japan's large military force was regarded as essential to the empire's defense and prosperity by obtaining natural resources that the Japanese islands lacked. First Sino-Japanese War The First Sino-Japanese War, fought in 1894 and 1895, revolved around the issue of control and influence", "-34.57296921708621" ], [ "raw materials and pressed by a growing population, Japan initiated the seizure of Manchuria on 18 September 1931 and established ex-Qing emperor Puyi as head of the puppet state of Manchukuo in 1932. The loss of Manchuria, and its vast potential for industrial development and war industries, was a blow to the Kuomintang economy. The League of Nations, established at the end of World War I, was unable to act in the face of the Japanese defiance.\nThe Japanese began to push from south of the Great Wall into northern China and the coastal provinces. Chinese fury against Japan was predictable,", "-34.46294668818882" ], [ "empire. In the 1930s, Japan gained significant influence in Inner Mongolia and Manchuria after it invaded Manchuria. It established Manchukuo, a puppet state in Manchuria and eastern Inner Mongolia. This was essentially the model Japan followed as it invaded other areas in Asia and established the Greater East Asia Co-Prosperity Sphere. Japan went to considerable trouble to argue that Manchukuo was justified by the principle of self-determination, claiming that people of Manchuria wanted to break away from China and asked the Kwantung Army to intervene on their behalf. However, the Lytton commission which had been appointed by the", "-34.37975002732128" ], [ "Soviet Volunteer Group Background In the aftermath of the Wall Street Crash of 1929 and the subsequent worldwide economic crisis, the Empire of Japan pursued an expansionist policy against its weakened neighbors in the Far East. On 18 September 1931, Japan staged the Mukden Incident using it as a pretext for its invasion of Chinese Manchuria. Japan went on to transform the north–east of China into a puppet state under the name of Manchukuo. In the plans of the Japanese general staff, Manchukuo was to serve as a stepping stone for the future conquest of the rest of China. Facing", "-34.24305545480456" ], [ "with Russia in 1904–1905. The war with China made Japan the world's first Eastern, modern imperial power, and the war with Russia proved that a Western power could be defeated by an Eastern state. The aftermath of these two wars left Japan the dominant power in the Far East with a sphere of influence extending over southern Manchuria and Korea, which was formally annexed as part of the Japanese Empire in 1910. Okinawa Okinawa island is the largest of the Ryukyu Islands, and paid tribute to China from the late 14th century. Japan took control of the entire Ryukyu island", "-34.20908057666384" ], [ "Actions Japan’s first action of invasion was conquering Ryukyu in 1879. Then, Japan won the First Sino-Japanese war and annexed Formosa and Penghu in 1895. Following that, Japan was built up a puppet state in Korea with the excuse of pacifying the Donghak Peasant Revolution. Japan finally occupied Korea in 1910.\nIn 1932, Japan captured Manchuria and built the puppet state of Manchukuo. Japan attacked China in 1937 and tried to finish the Continental Policy. But Japan failed to conquer China and lost in World War II, costing Japan all of her overseas land. This also symbolized the end of Japan’s", "-34.095166346407495" ], [ "to the directions of the Minister of War (later Prime Minister) Hideki Tōjō. It assumed that the already established puppet governments of Manchukuo, Mengjiang, and the Wang Jingwei regime in Japanese-occupied China would continue to function in these areas. Beyond these contemporary parts of Japan's sphere of influence it also envisaged the conquest of a vast range of territories covering virtually all of East Asia, the Pacific Ocean, and even sizable portions of the Western Hemisphere, including in locations as far removed from Japan as South America and the eastern Caribbean.\nAlthough the projected extension of the Co-Prosperity Sphere was extremely", "-33.98861056449823" ], [ "power of the domains progressively eliminated, and the domains themselves were soon transformed into prefectures, whose governors were appointed by the Emperor. In 1895, Japan defeated Qing China in the First Sino-Japanese War, shifting regional dominance in East Asia from China to Japan. The Treaty of Shimonoseki granted Japan sovereignty over the Chinese islands of Formosa (Taiwan) and Penghu (Pescadores), the lease for the Kwantung Leased Territory, and brought Korea into the Japanese sphere of influence. Events By the turn of the 1900s, Japan's economy struggled to match the rapid territorial growth of the empire since the late 1800s. \nIn", "-33.83904281456489" ], [ "rapidly modernized along Western lines, adding industry, bureaucracy, institutions and military capabilities that provided the base for imperial expansion into Korea, China, Taiwan and islands to the south. It saw itself vulnerable to aggressive Western imperialism unless it took control of neighboring areas. It took control of Okinawa and Formosa. Japan's desire to control Taiwan, Korea and Manchuria, led to the first Sino-Japanese War with China in 1894–1895 and the Russo-Japanese War with Russia in 1904–1905. The war with China made Japan the world's first Eastern, modern imperial power, and the war with Russia proved that a Western power", "-33.771711220848374" ], [ "the end of World War II, there were over 850,000 Japanese in Korea and more than 2 million in China, most of them farmers in Manchukuo (the Japanese had a plan to bring in 5 million Japanese settlers into Manchukuo).\nIn the census of December 1939, the total population of the South Pacific Mandate was 129,104, of which 77,257 were Japanese. By December 1941, Saipan had a population of more than 30,000 people, including 25,000 Japanese. Over 400,000 people lived on Karafuto (southern Sakhalin) when the Soviet offensive began in early August 1945. Most were of Japanese or Korean descent. When", "-33.605417447921354" ], [ "Japanese investment and being rich in natural resources, Manchuria became an important industrial domain for Japan. Under Japanese control Manchuria was one of the most brutally run regions in the world, with a systematic campaign of terror and intimidation against the local Russian and Chinese populations including arrests, organized riots, and other forms of subjugation. The Japanese also began a campaign of emigration to Manchukuo, the name the Japanese government gave to its puppet state in Manchuria. The Japanese population there rose from 240,000 in 1931 to 837,000 in 1939, and the Japanese had a plan to bring in 5", "-33.585394351393916" ], [ "led to Japan withdrawing from the League of Nations.\nJapan's expansionist vision grew increasingly bold. Many of Japan's political elite aspired to have Japan acquire new territory for resource extraction and settlement of surplus population. These ambitions led to the outbreak of the Second Sino-Japanese War in 1937. After their victory in the Chinese capital, the Japanese military committed the infamous Nanking Massacre. The Japanese military failed to destroy the Chinese government led by Chiang Kai-shek, which retreated to remote areas. The conflict was a stalemate that lasted until 1945. Japan's war aim was to establish the Greater East Asia", "-33.47655352705624" ], [ "punish the aggression of Japan, they covet no gain for themselves and won't involve themselves in territorial expansion wars after the conflict, \"Japan be stripped of all the islands in the Pacific which she has seized or occupied since the beginning of the First World War in 1914\", \"all the territories Japan has stolen from the Chinese, including Manchuria, Formosa, and the Pescadores, shall be restored to the Republic of China\", Japan will also be expelled from all other territories which she has taken by violence and greed and that \"in due course Korea shall become free and independent\".", "-33.44917566564982" ], [ "mentioned that Japan should begin conquering the world and become the world's strongest nation to be their ultimate aim. For this, he suggested they occupy Manchuria, Sakhalin, and Kamchatka Peninsula first, and follow the lead of Europe in setting up overseas colonies. Nobuhiro Sato also suggested that the procedure for ruling Asia is to capture Manchuria first, then East Asia, then South Asia. This became the strategy used by Japan in World War II. Continental Policy after the Meiji Restoration In the mid-19th century, Japan had been strengthened by the Meiji Restoration and had built a modernized and centralized Japanese", "-33.405166110314894" ], [ "Japanese economy. It was out of range of American bombers, so its factories were expanded and continued their output to the end. Manchukuo was returned to China in 1945. When Japan seized control of China proper in 1937–38, the Japanese Central China Expeditionary Army set up the Reorganized National Government of China, a puppet state, under the nominal leadership of Wang Ching-wei (1883–1944). It was based in Nanjing. The Japanese were in full control; the puppet state declared war on the Allies in 1943. Wang was allowed to administer the International Settlement in Shanghai.", "-33.38004562151036" ], [ "for influence, trade, and territory in East Asia, and Japan sought to join these modern colonial powers. The newly modernized Meiji government of Japan turned to Korea, then in the sphere of influence of China's Qing dynasty. The Japanese government initially sought to separate Korea from Qing and make Korea a Japanese satellite in order to further their security and national interests.\nIn January 1876, following the Meiji Restoration, Japan employed gunboat diplomacy to pressure Korea, under the Joseon Dynasty, to sign the Japan–Korea Treaty of 1876, which granted extraterritorial rights to Japanese citizens and opened three Korean ports to Japanese", "-33.30515352729708" ], [ "way for a small country like Japan to avoid being attacked by these empires was to make continuous attempts to absorb foreign cultures for study and, while establishing friendly relations with the larger nations, preserve its own identity. This receptivity is the aspect that allowed Japan to grow from a farming island into an imperial nation, first using Chinese political systems and Chinese advancement, then Western techniques and knowledge. Japan eventually surpassed China and stumbled upon itself during World War II. After the war, Japan, using this same perspective absorbed American culture and technology.\nKurokawa's architecture follows the string of receptivity", "-33.291866652376484" ], [ "could be defeated by an Eastern state. The aftermath of these two wars left Japan the dominant power in the Far East with a sphere of influence extending over southern Manchuria and Korea, which was formally annexed as part of the Japanese Empire in 1910. Okinawa Okinawa island is the largest of the Ryukyu Islands, and paid tribute to China from the late 14th century. Japan took control of the entire Ryukyu island chain in 1609 and formally incorporated it into Japan in 1879. War with China Friction between China and Japan arose from the 1870s from Japan's control over", "-33.275487390579656" ], [ "of the Second Sino-Japanese War. During World War II, Japanese forces initially occupied only the Chinese areas, leaving the foreign concessions alone. Residents of the Chinese areas moved into the French Concession in large numbers, reaching 825,342.", "-33.106635828269646" ], [ "the territory was conquered by a joint Anglo-Japanese task force during the 1914 Siege of Tsingtao and the victorious Allies of World War I awarded the continuation of the lease to the Empire of Japan over the objections of the Republic of China. The territory reverted to Chinese control in 1922. World War II and subsequent civil war The Japanese reoccupied Qingdao in January 1938 after the start of the Second Sino-Japanese War. On August 15, 1945, Japan surrendered to Allied forces, officially ending World War II, and forces of the Kuomintang entered the city in September, restoring the government", "-33.098415082422434" ], [ "is an example of Japanese propagandists portraying Japan as the protector of Asia, as in the name of the Japanese Empire's colonial holdings, the Greater East Asia Co-Prosperity Sphere. This wartime narrative portrayed Japan fighting against Western Colonialists and Chinese Communists primarily, overlooking the primacy of resource rich areas of Asia in Japan's annexing of lands. Japanese historian Saburō Ienaga writes that a key aspect of the Greater East Asian Co-Prosperity Sphere as propaganda was \"liberating Asians from American and British imperialism\". Political background Japan in the early 1930s pursued an expansionist foreign policy, starting with the Manchurian Incident in", "-33.09646319987951" ], [ "deposits, and a small oil field on Sakhalin Island, Japan lacked strategic mineral resources. At the start of the 20th century in the Russo-Japanese War, Japan had succeeded in pushing back the East Asian expansion of the Russian Empire in competition for Korea and Manchuria.\nJapan's goal after 1931 was economic dominance of most of East Asia, often expressed in Pan-Asian terms of \"Asia for the Asians.\". Japan was determined to dominate the China market, which the U.S. and other European powers had been dominating. On October 19, 1939, the American Ambassador to Japan, Joseph C. Grew, in a", "-33.05799313657917" ], [ "First Sino-Japanese War Background After two centuries, the Japanese policy of seclusion under the shōguns of the Edo period came to an end when the country was opened to trade by the Convention of Kanagawa in 1854. In the years following the Meiji Restoration of 1868 and the fall of the shogunate, the newly formed Meiji government embarked on reforms to centralize and modernize Japan. The Japanese had sent delegations and students around the world to learn and assimilate Western arts and sciences, with the intention of making Japan an equal to the Western powers. These reforms transformed Japan from", "-33.044478758980404" ], [ "of Manchukuo in 1932. The loss of Manchuria, and its potential for industrial development and war industries, was a blow to the Kuomintang economy. The League of Nations, established at the end of World War I, was unable to act in the face of Japanese defiance.\nThe Japanese began to push south of the Great Wall into northern China and the coastal provinces. Chinese fury against Japan was predictable, but anger was also directed against Chiang and the Nanking government, which at the time was more preoccupied with anti-Communist extermination campaigns than with resisting the Japanese invaders. The importance of \"internal", "-33.039463962908485" ], [ "that defeated the stagnant Chinese Qing Dynasty during the First Sino-Japanese War as well as vanquishing imperial rival Russia in 1905, the first major military victory in the modern era of an East Asian power over a European one. In 1910, Japan made territorial acquisitions by annexing Korea and parts of Manchuria establishing itself as a maritime colonial power in East Asia. Advanced modern high-technology was introduced from the West, thus bringing about improvement to Japan's agriculture and handicrafts. The industrial revolution in Japan first appeared in textiles, including cotton and especially silk, which was based in home workshops in", "-33.03252068877919" ], [ "was an area of northeast China, which encompassed the provinces of Jilin, Liaoning and Heilongjiang. Nearly six whole years later, in July 1937, the Second Sino-Japanese War had begun. As yet, the French colonial authorities were hoping that the Japanese would not be brazen enough to take on the might of a European power. However, it became increasingly likely after the German invasion of Poland in September 1939, since Japan was part of the Axis alliance and thus Germany's ally.\nOn September 26, 1940, Japanese troops landed in Haiphong, violating a cease-fire which had been signed only the previous day. From", "-33.00639797805343" ], [ "War in 1914, and that all the territories Japan has stolen from the Chinese, such as Manchuria, Formosa, and The Pescadores, shall be restored to the Republic of China. Japan will also be expelled from all other territories which she has taken by violence and greed. The aforesaid three great powers, mindful of the enslavement of the people of Korea, are determined that in due course Korea shall become free and independent.\nWith these objects in view the three Allies, in harmony with those of the United Nations at war with Japan, will continue to persevere in the serious and prolonged", "-32.898490249644965" ], [ "inflow of people is managed via the seaports, airports and spaceports. Thus Japan is fairly insulated from continental issues.\nThroughout history, Japan was never fully invaded nor colonized by foreigners. Such as when the Mongols conquered China, Central Asia and East Europe they established the Mongol Empire from 1206 to 1294 CE. The Mongols tried to invade Japan twice and failed in 1274 and 1281. Japan capitulated only once after nuclear attacks in World War II. At the time Japan didn't have nuclear technology. The insular geography is a major factor for the isolationist, semi-open and expansionist periods of Japanese history.", "-32.83681888796855" ], [ "of 1931, radical army officers conquered Manchuria from local officials and set up the puppet government of Manchukuo there without permission from the Japanese government. International criticism of Japan following the invasion led to Japan withdrawing from the League of Nations.\nJapan's expansionist vision grew increasingly bold. Many of Japan's political elite aspired to have Japan acquire new territory for resource extraction and settlement of surplus population. These ambitions led to the outbreak of the Second Sino-Japanese War in 1937. After their victory in the Chinese capital, the Japanese military committed the infamous Nanking Massacre. The Japanese military failed to destroy", "-32.78196336547262" ], [ "sterling zones, Japanese economic planners called for a \"yen bloc\".\nJapan's experiment with such financial imperialism encompassed both official and semi-official colonies. In the period between 1895 (when Japan annexed Taiwan) and 1937 (the outbreak of the Second Sino-Japanese War), monetary specialists in Tokyo directed and managed programs of coordinated monetary reforms in Taiwan, Korea, Manchuria, and the peripheral Japanese-controlled islands in the Pacific. These reforms aimed to foster a network of linked political and economic relationships. These efforts foundered in the eventual debacle of the Greater East-Asia Co-Prosperity Sphere. History The concept of a unified East Asia took form based", "-32.72431163769943" ], [ "the war. Japanese The Empire of Japan created a number of client states in the areas occupied by its military, beginning with the creation of Manchukuo in 1932. These puppet states achieved varying degrees of international recognition. Burma (Ba Maw regime) The Japanese Army and Burma nationalists, led by Aung San, seized control of Burma from the United Kingdom during 1942. A State of Burma was formed on 1 August under the Burmese nationalist leader Ba Maw. The Ba Maw regime established the Burma Defence Army (later renamed the Burma National Army), which was commanded by Aung San. Cambodia The", "-32.71203330397111" ], [ "Japan.\nJapan expected far more benefits from the occupation of Taiwan than they actually received. Japan realized that its home islands could only support a limited resource base, and it hoped that Taiwan, with its fertile farmlands, would make up the shortage. By 1905, Taiwan was producing rice and sugar and paying for itself with a small surplus. Perhaps more important, Japan gained enormous prestige by being the first nonwhite country to operate a modern colony. It learned how to adjust its German-based bureaucratic standards to actual conditions, and how to deal with frequent insurrections. The ultimate goal was", "-32.710709658626" ], [ "a strong economy and military, the smaller country grew in power. Friction between China and Japan arose from the 1870s from Japan's control over the Ryukyu Islands, rivalry for political influence in Korea and trade issues. Japan, having built up a stable political and economic system with a small but well-trained army and navy, surprised the world with its easy victory over China in the First Sino-Japanese War of 1894–95. Japanese soldiers massacred the Chinese after capturing Port Arthur on the Liaotung Peninsula. In the harsh Treaty of Shimonoseki of April 1895, China recognized the independence of Korea, and", "-32.708418779307976" ], [ "Japanese colonial empire Pre-1895 The first overseas territories that Japan acquired were the islands of the surrounding seas. In the 1870s and 1880s, Japan established control over the Nanpō, Ryukyu, and Kurile islands as well as strengthening its hold on the home islands. But this effort was less the initial step toward colonial expansion than it was a reassertion of national authority over territories traditionally within the Japanese cultural sphere. This was similar to nation building in nineteenth and twentieth century Europe. Acquisition of Colonies \"The Nation, Volume 74\", published in 1902, described the conditions leading to Japanese colonialism :", "-32.654368527029874" ], [ "same level of brutal exploitation as in Manchukuo. By the 1930s, Manchukuo's industrial system was among the most advanced making it one of the industrial powerhouses in the region. Manchukuo's steel production exceeded Japan's in the late 1930s. Many Manchurian cities were modernised during the Manchukuo era. However, much of the country's economy was often subordinated to Japanese interests and, during the war, raw material flowed into Japan to support the war effort. Traditional lands were taken and redistributed to Japanese farmers with local farmers relocated and forced into collective farming units over smaller areas of land. Transport The Japanese", "-32.65060971949424" ], [ "(as in the case of Manchukuo). These factors helped make the formation of the sphere, while lacking any real authority or joint power, come together without much difficulty.\nAs part of its war drive, Japanese propaganda included phrases like \"Asia for the Asiatics!\" and talked about the perceived need to liberate Asian countries from imperialist powers. The failure to win the Second Sino-Japanese War 1937–1941 (–1945) was blamed on British and American exploitation of Southeast Asian colonies, even though the Chinese received far more assistance from the Soviet Union. In some cases local people welcomed Japanese troops when they invaded, driving", "-32.64507730868354" ], [ "South Pacific Mandate Origin Japan has few natural resources, and the shortage of raw materials during industrialisation in the Meiji Restoration period (1868–1912) meant that the development of the Japanese colonial empire was considered a political and economic necessity. By the outbreak of WWI the empire included Taiwan, Korea, the Ryukyu Islands the southern half of Sakhalin island (Karafuto Prefecture), the Kuril Islands, and Port Arthur (Kwantung Leased Territory). The policy of Nanshin-ron (\"Southern Expansion Doctrine\"), popular with the Imperial Japanese Navy, held that Southeast Asia and the Pacific Islands were the area of greatest potential value to the Japanese", "-32.62734584073769" ], [ "individuals, confiscation of properties, eviction, demand for cessation of business, assault and battery, and the oppression of Korean residents\".\nAfter five months of fighting, Japan established the puppet state of Manchukuo in 1932, and installed the last Emperor of China, Puyi, as its puppet ruler. Militarily too weak to challenge Japan directly, China appealed to the League of Nations for help. The League's investigation led to the publication of the Lytton Report, condemning Japan for its incursion into Manchuria, causing Japan to withdraw from the League of Nations. No country took action against Japan beyond tepid censure.\nIncessant fighting followed the Mukden", "-32.589722399483435" ], [ "Mengjiang Background Following Japan's occupation of Manchuria in 1931 and the establishment of the puppet state of Manchukuo, Japan sought to expand its influence in Mongolia and North China. In a series of actions, starting in 1933, the armies of Manchukuo and Japan occupied Chahar and in 1936 proclaimed itself the independent Mongol Military Government, allied with Japan under Prince Demchugdongrub. \nIn 1936 and 1937, similar operations in Suiyuan saw the occupation and absorption of that province also. History Formed on May 12, 1936, the Mongol Military Government (蒙古軍政府) had Prince Yondonwangchug of Ulanqab as its first chairman. It was", "-32.519074338059" ], [ "Japan had captured major coastal cities like Shanghai early in the war, cutting the rest of China off from its chief sources of finance and industry. Millions of Chinese moved to remote regions to avoid invasion. Cities like Kunming ballooned with new arrivals. Entire factories and universities were relocated to safe areas so society could still function. Japan replied with hundreds of air raids on the new capital of Chongqing.\nAlthough China received much aid from the United States, China did not have sufficient infrastructure to properly arm or even feed its military forces, let alone its civilians.\nChina was divided into", "-32.51509333390277" ], [ "the Japanese colonised Manchukuo. With Japanese investment and rich natural resources, the economy of Manchukuo experienced rapid economic growth. Manchukuo's industrial system became one of the most advanced, making it one of the industrial powerhouses in the region. Manchukuo's steel production exceeded Japan's in the late 1930s. The Japanese Army initially sponsored a policy of forced industrialization modeled after the Five Year Plan in the Soviet Union but subsequently private capital was used in a very strongly state-directed economy. There was progress in the area's social systems and many Manchurian cities were modernised. Manchukuo issued its own notes and postal", "-32.46017913259857" ], [ "beleaguered CCP, despite Japan's steady territorial gains in northern China, the coastal regions and the rich Yangtze River Valley in central China. After 1940, conflicts between the Kuomintang and Communists became more frequent in the areas not under Japanese control. The Communists expanded their influence wherever opportunities presented themselves through mass organizations, administrative reforms and the land- and tax-reform measures favoring the peasants and, the spread of their organizational network, while the Kuomintang attempted to neutralize the spread of Communist influence. Meanwhile, northern China was infiltrated politically by Japanese politicians in Manchukuo using facilities such as the Wei Huang Gong.\nAfter", "-32.335879283520626" ], [ "War (1904–5), Japan defeated tsarist Russia and won possession of southern Sakhalin as well as a position of paramount influence in Korea and southern Manchuria. By this time, Japan had been able to negotiate revisions of the unequal treaties with the Western powers and had in 1902 formed an alliance with the world's leading power, Britain. Ryūkyū Islands In 1879, Japan formally annexed the Ryukyuan kingdom, which had been under the control of the Shimazu clan of Satsuma since 1609. Taiwan The island of Formosa (Taiwan) had an indigenous population when Dutch traders in need of an Asian base to", "-32.334759108605795" ], [ "its fertile farmlands, would make up the shortage. By 1905, Taiwan was producing rice and sugar and paying for itself with a small surplus. Perhaps more important, Japan gained Asia-wide prestige by being the first non-European country to operate a modern colony. It learned how to adjust its German-based bureaucratic standards to actual conditions, and how to deal with frequent insurrections. The ultimate goal was to promote Japanese language and culture, but the administrators realized they first had to adjust to the Chinese culture of the people. Japan had a civilizing mission, and it opened schools so", "-32.33004129919573" ], [ "Like many Western powers during the era of imperialism, Japan negotiated treaties that often resulted in the annexation of land from China towards the end of the Qing Dynasty. Dissatisfaction with Japanese settlements and the Twenty-One Demands by the Japanese government led to a serious boycott of Japanese products in China.\nToday, bitterness in China persists over the atrocities of the Second Sino-Japanese War and Japan's post-war actions, particularly the perceived lack of a straightforward acknowledgment of such atrocities, Japanese government employment of known past war criminals, and Japanese historic revisionism in textbooks. From elementary school, children are taught about Japanese", "-32.30550272134133" ], [ "Japanese-aligned governments existed throughout China aside from the more-major puppet states of Manchukuo and Mengjiang. Some of these then-newly created administratively autonomous Japanese puppet states included the East Hebei Autonomous Government, the Shanghai Great Way Government, the South Chahar Autonomous Government, and of course, the North Shanxi Autonomous Government. Creation On the morning of September 13, 1937, the city center of Datong was captured by Japanese army forces, and was placed under military control for the time being. Soon after, however, a group of influential figures from the city including Wang Yongkui, the president of the Datong City Chamber of", "-32.29720498493407" ], [ "in 1946). World War II In the 1930's, the Empire of Japan undertook several aggressive actions against China. This included the invasion of Manchuria and creation of the puppet state Manchukuo, and culminated in full-scale war against China in 1937. The Tuvan government undertook measures to strengthen their army and the 11th Congress of the TPRP, held in November 1939, instructed the Central Committee to fully equip the Tuvan People's Revolutionary Army in the next 2–3 years and to further raise combat readiness. The Ministry of Military Affairs was created in late February 1940 and immediately started equipping the", "-32.25285768258618" ], [ "Sino-Japanese War During the Second Sino-Japanese War, the Imperial Japanese Army had a scorched-earth policy, known as \"Three Alls Policy\". Due to the Japanese scorched-earth policy, immense environmental and infrastructure damage have been recorded. Additionally, it contributed to the complete destruction of entire villages and partial destruction of entire cities like Chongqing or Nanjing.\nThe Chinese National Revolutionary Army destroyed dams and levees in an attempt to flood the land to slow down the advancement of Japanese soldiers, further adding to the environmental impact. This policy resulted in the 1938 Huang He flood. World War II At the start of the", "-32.218714247937896" ], [ "to see Korea as a strategic foothold leading into northern China, just as Macau and Hong Kong had been Portuguese and English trade enclaves, respectively, in southern China. Colonial rule (1910–1945) In a complicated series of manoeuvres and counter-manoeuvres, Japan pushed back the Russian fleet in 1905 (see Russo-Japanese War). Both the fleets of China and Russia had given Korea sufficient protection to prevent a direct invasion, but this ambuscade of the Russian fleet gave Japan free rein over north China, and Korea was left at the mercy of the new regional naval power Japan.\nKorea became a protectorate of Japan", "-32.206260406412184" ], [ "as an occupying force to exploit the raw material resources of the region.\nManchuria was only the first \"stepping stone\" in Japan's plans, with the conquest of China leading to future aspirations on Burma and India. By 1937, plans were in place for a rapid three-month campaign that would collapse any Chinese resistance. Initially, the Japanese scored major victories, such as the Battle of Shanghai, and overrunning the Chinese capital of Nanking.\nSlowly, China began to react to the Japanese invasion with individuals rallying behind the Communist and Nationalist groups that had once been vying for power. In political rallies, at schools,", "-32.18626350979321" ], [ "made their investments on government orders later served as the model for Japan's post-1945 development, albeit not with same level of brutal exploitation as in Manchukuo. Later on, Kishi's etatist model for economic development was adopted in South Korea and China, albeit not executed with anywhere near the same brutality as in Manchuria.\nIn 1936, Kishi was one of the drafters of a proposed 3.13 billion yen Five Year Plan, which was intended to drastically increase industrial production both within Manchukuo and Japan itself to the point that Japan could fight a total war by 1941. Kishi's \"communistic\" Five Year Plan", "-32.09579274151474" ], [ "the First Sino-Japanese War, having defeated the Qing in northern China, Japan sought to ensure that it obtained Penghu and Taiwan in the final settlement. In March 1895, the Japanese defeated the Chinese garrison on the islands and occupied Makung. The Japanese occupation of Penghu, with its fine harbor, gave the Imperial Japanese Navy an advanced base from which their short-range coal-burning ships could control the Taiwan Straits and thus prevent more Chinese troops from being sent to Taiwan. This action persuaded the Chinese negotiators at Shimonoseki that Japan was determined to annex Taiwan, and, after Penghu, Taiwan and", "-32.09471133025363" ], [ "Japanese military yen Currencies in territories occupied by Japan The territories controlled or occupied by Japan had many different currencies. Taiwan maintained its own banking system and bank notes after it came under Japanese sovereignty in 1895. The same is true for Korea post 1910. Between 1931 and 1945, large parts of China and South East Asia were occupied by Japan. Several types of currencies were put into circulation there during the occupation. In China, several puppet governments were created (e.g. Manchukuo), each issuing their own currency. In South East Asia, the Japanese military arranged for bank notes to be", "-32.04581361684541" ], [ "a mighty empire based in Manchuria and northern China. The Navy, while smaller and less influential, was also factionalized. Large-scale warfare, known as the Second Sino-Japanese War, began in August 1937, with naval and infantry attacks focused on Shanghai, which quickly spread to other major cities. There were numerous large-scale atrocities against Chinese civilians, such as the Nanking Massacre in December 1937, with mass murder and mass rape. By 1939 military lines had stabilized, with Japan in control of the almost all of the major Chinese cities and industrial areas. A puppet government was set up. In the", "-32.037842134421226" ], [ "million Japanese settlers into Manchukuo. Hundreds of Manchu farmers were evicted and their farms given to Japanese immigrant families. Manchukuo was used as a base to invade the rest of China in 1937-40. At the end of the 1930s, Manchuria was a trouble spot with Japan, clashing twice with the Soviet Union. These clashes - at Lake Khasan in 1938 and at Khalkhin Gol one year later - resulted in many Japanese casualties. The Soviet Union won these two battles and a peace agreement was signed.\nAdding to being born in a harsh environment, Betsuyaku also experienced severe deprivation during World", "-32.0154827942024" ], [ "East Asia, specifically Manchuria with its many resources; Japan needed these resources to continue its economic development and maintain national integrity. Manchuria In 1931, Japan invaded and conquered Northeast China (Manchuria) with little resistance. Japan claimed that this invasion was a liberation of the local Manchus from the Chinese, although the majority of the population were Han Chinese as a result of the large scale settlement of Chinese in Manchuria in the 19th century. Japan then established a puppet regime called Manchukuo (Chinese: 滿洲國), and installed the last Manchu Emperor of China, Puyi, as the official head of state. Jehol,", "-31.965091524121817" ], [ "defeated the stagnant Qing dynasty during the First Sino-Japanese War, thereafter annexing Korea and Taiwan from China.\nIn 1905 Japan also vanquished its imperial rival Russia in the Russo-Japanese War. It was the first major military victory in the modern era of an East Asian power over a European one and shocked the West.\nIn prelude to WW2, Japan launched an invasion of mainland China in the Second Sino-Japanese War. It annexed Manchuria and absorbed more and more of the eastern coast, committing atrocities like Unit 731 and Nanjing Massacre along the way.\nJapan's ultimate imperial dream was the Greater East Asia Co-Prosperity", "-31.869325142586604" ], [ "In fact, the only western country that was allowed to trade with Japan was the Dutch Republic. This was the beginning of \"sakoku\", where Japan was essentially closed to the western world until 1854. Disputed territories Japan has several territorial disputes with its neighbors concerning the control of certain outlying islands.\nJapan contests Russia's control of the Southern Kuril Islands (including Etorofu, Kunashiri, Shikotan, and the Habomai group) which were occupied by the Soviet Union in 1945. South Korea's assertions concerning Liancourt Rocks (Japanese: \"Takeshima\", Korean: \"Dokdo\") are acknowledged, but not accepted by Japan. Japan has strained relations with the People's", "-31.824265358882258" ], [ "chain in 1609 and formally incorporated it into Japan in 1879. War with China Friction between China and Japan arose from the 1870s from Japan's control over the Ryukyu Islands, rivalry for political influence in Korea and trade issues. Japan, having built up a stable political and economic system with a small but well-trained army and navy, easily defeated China in the First Sino-Japanese War of 1894. Japanese soldiers massacred the Chinese after capturing Port Arthur on the Liaotung Peninsula. In the harsh Treaty of Shimonoseki of April 1895, China recognize the independence of Korea, and ceded to Japan", "-31.796660667430842" ], [ "War (1937–1945), (a precursor to World War II, 1939–1945) with its plans of territorial expansion into China's coast. Nationalist (Kuomintang) ROC forces returned after the Japanese surrender in September 1945. On June 2, 1949, shortly before the founding of the communist People’s Republic of China on October 1, 1949 the city was taken by Chairman Mao Zedong and his troops. 1891–1914 The development of the Tsingtao urban space during the German-occupation (1891–1914) originated from the port. Mass urban construction began in 1898 with the relocation of Chinese dwellers along the coast. With the completion of such series of projects as", "-31.789039252755174" ], [ "domination. Under Japanese control Manchuria was one of the most brutally run regions in the world, with a systematic campaign of terror and intimidation against the local Russian and Chinese populations including arrests, organised riots and other forms of subjugation. The Japanese also began a campaign of emigration to Manchukuo; the Japanese population there rose from 240,000 in 1931 to 837,000 in 1939 (the Japanese had a plan to bring in 5 million Japanese settlers into\nManchukuo). Hundreds of Manchu farmers were evicted and their farms given to Japanese immigrant families. Manchukuo was used as a base to invade the", "-31.730504330131225" ], [ "all unequal treaties with it. Japan stood alongside the European powers as part of the Eight-Nation Alliance during the infamous fifty five-day siege of the foreign embassy compound in Peking. Japan entered the 20th century as a rising world power, and with its unequal treaties with the European powers now abrogated, it actually joined in, obtaining an unequal treaty with China granting extraterritorial rights under the Treaty of Shimonoseki signed in 1895.\nIn 1915, during the First World War, Japan overtook Britain as the country with the largest number of foreign residents in Shanghai. In 1914 they sided with", "-31.721822587540373" ], [ "Chinese: 辽东半岛; traditional Chinese: 遼東半島; pinyin: Liáodōng Bàndǎo) was administratively part of Liaoning Province. In 1882, the Beiyang Fleet established a naval base and coaling station at Lüshunkou near the southern end of the peninsula.\nThe Empire of Japan occupied the region during the First Sino-Japanese War (1894–1895), and under the terms of the Treaty of Shimonoseki signed by Japan and China ending the war in April 1895, Japan gained full sovereignty of the area. However, within weeks, Germany, France and Russia pressured Japan to cede the territory back to China, in what was called the Triple Intervention.\n \nIn December 1897,", "-31.707978058839217" ], [ "Japan seized control of China proper in 1937–38, the Japanese Central China Expeditionary Army set up the Reorganized National Government of China, a puppet state, under the nominal leadership of Wang Ching-wei (1883–1944). It was based in Nanjing. The Japanese were in full control; the puppet state declared war on the Allies in 1943. Wang was allowed to administer the International Settlement in Shanghai. The puppet state had an army of 900,000 soldiers, and was positioned against the Nationalist army under Chiang Kai-shek. It did little fighting. Military defeats The attack on Pearl Harbor initially appeared", "-31.702128080942202" ], [ "seizure of Manchuria in September 1931 and established ex-Qing emperor Puyi as head of the puppet state of Manchukuo in 1932. During the Sino-Japanese War (1937–1945), the loss of Manchuria, and its vast potential for industrial development and war industries, was a blow to the Kuomintang economy. The League of Nations, established at the end of World War I, was unable to act in the face of the Japanese defiance. After 1940, conflicts between the Kuomintang and Communists became more frequent in the areas not under Japanese control. The Communists expanded their influence wherever opportunities presented themselves through mass organizations,", "-31.679448015987873" ], [ "important technical and administrative roles.\nJapanese investment (private and central government) ran at ¥1,715,000,000 (£171,580.000 sterling) in 1938. In 1941, ¥5,000,000,000 was reinvested—the equivalent of $2 for every person in China. For local and foreign commerce, Japan organized a centralized economic structure, a national central bank and a local currency, the yuan of Manchukuo.\nDuring the early years of Japanese control, Manchukuo represented 14.3% of total industrial production in China, including 12% of its industrial work force. From 1913 to 1930, farm production grew by 70%; its railways represented 30% of all Chinese railways.\nDuring 1937 the Japanese Government with the Japanese Army", "-31.64728566805934" ], [ "environment of extreme scarcity. In recent centuries, Japan lacked the natural resources and space to accommodate its population comfortably. With the exception of Hokkaidō and colonial territories in Asia between 1895 and 1945, there was no \"frontier\" to absorb excess people. One solution was to ignore the welfare of large sectors of the population (peasants and workers) and to use force when they expressed their discontent. Such coercive measures, common during both the Tokugawa and the World War II periods, largely, although not entirely, disappeared in the postwar \"welfare state\" (for example, farmers were evicted from their land to construct", "-31.646502303890884" ], [ "Britain and France in the war and conquered all German possessions in China. By the beginning of the 1930s, Japan was swiftly becoming the most powerful national group in Shanghai and accounted for some 80% of all extraterritorial foreigners in China. Much of Hongkew, which had become an unofficial Japanese settlement, was known as Little Tokyo.\nIn 1931, supposed \"protection of Japanese colonists from Chinese aggression\" in Hongkew was used as a pretext for the Shanghai Incident, when Japanese troops invaded Shanghai. From then until the Second Sino-Japanese War (1937–1945) Hongkew was almost entirely outside of the SMC's hands, with law", "-31.631791713647544" ], [ "and in alphabetic order. Asia Historically, China was the dominant power in East Asia. But, at the beginning of the early 20th century, the Empire of Japan became the dominant force of Asia in World War I as one of the Allied powers. With economic turmoil, Japan's expulsion from the League of Nations, and its interest in expansion on the mainland, Japan became one of the three main Axis powers in World War II.\nSince the late 20th century, regional alliances, economic progress, and contrasting military power have changed the strategic and regional power balance in Asia. In recent years, a", "-31.542305195733206" ], [ "World War II.\nWhen the Lytton Commission issued a report on the invasion, despite its statements that China had to a certain extent provoked Japan, and China's sovereignty over Manchuria was not absolute, Japan took it as an unacceptable rebuke and withdrew from the already declining League of Nations, which also helped create international isolation.\nThe Manchurian Crisis had a significant negative effect on the moral strength and influence of the League of Nations. As critics had predicted, the League was powerless if a strong nation decided to pursue an aggressive policy against other countries, allowing a country such as Japan to", "-31.526211594504275" ], [ "negotiations with the Republic of China under the Twenty-One Demands, the terms of the lease of the Kwantung Leased Territory were extended to 99 years.\nAfter the foundation of Japanese-controlled Manchukuo in 1932, Japan regarded the sovereignty of the leased territory as transferred from China to Manchukuo. A new lease agreement was contracted between Japan and the government of Manchukuo, and Japan transferred the South Manchurian Railway Zone to Manchukuo. However, Japan retained the Kwantung Leased Territory as a territory apart from the nominally-independent Manchukuo until its surrender at the end of World War II in 1945.\nAfter World War II, the", "-31.494973428547382" ], [ "1905.\nThe Treaty of Portsmouth ceded Port Arthur to Japan, which set up the Kwantung Leased Territory or Guandongzhou (關東州), on roughly the southern half (Jinzhou District and south) of present-day Dalian. Japanese invested heavily in the region, which became the main trading port between Manchuria and Japan. Japan leased the area from Manchukuo after establishing the puppet state in 1932. In 1937, as the Second Sino-Japanese War began, Japan enlarged and modernized the trade zone as two cities: the northern Dairen (Dalian) and the southern Ryojun (Lüshun or Port Arthur). Post-World War II With the unconditional surrender of Japan in", "-31.481199412344722" ], [ "Gyeongbu Line History The Gyeongbu Line was originally constructed as a vehicle of colonialism. In 1894-1895, Imperial Japan and Qing Dynasty China fought the First Sino-Japanese War for influence over Korea. Following the war, in competition with Russia's rail expansion across China, Japan sought the right from the Korean Empire to build a railway from Busan to Seoul, the Gyeonbu Line. Surveying began in 1896, and in spite of local protests, the Korean Empire gave Japan the right to build the line in 1898. Construction of the Gyeongbu Line started on August 20, 1901, with a ceremony at Yeongdeungpo, Seoul.", "-31.450441119843163" ], [ "to their support for the Kuomintang and contributions to the China Relief Fund and British war efforts. The elites in major towns bore the heaviest burden and those with lesser resources went bankrupt. The military government strictly controlled Chinese businesses, those who were unwilling were forcibly encouraged. Japanese policy in this area was summarised in Principles Governing the Implementation of Measures Relative to the Chinese [Kakyō Kōsaku Jisshi Yōryō] issued by the Japanese headquarters in Singapore in April 1942.\nBefore the invasion, the Japanese government had printed unnumbered military yen notes for use in all occupied territories in Southeast Asia. Increasing", "-31.430460897565354" ], [ "Korean War Imperial Japanese rule (1910–1945) Imperial Japan destroyed the influence of China over Korea in the First Sino-Japanese War (1894–95), ushering in the short-lived Korean Empire. A decade later, after defeating Imperial Russia in the Russo-Japanese War (1904–05), Japan made Korea its protectorate with the Eulsa Treaty in 1905, then annexed it with the Japan–Korea Annexation Treaty in 1910.\nMany Korean nationalists fled the country. The Provisional Government of the Republic of Korea was founded in 1919 in Nationalist China. It failed to achieve international recognition, failed to unite nationalist groups, and had a fractious relationship with its US-based founding", "-31.41999210175709" ], [ "the region. In the Tsushima incident of 1861 Russia had directly assaulted Japanese territory. Sino-Japanese War (1894–95) Between the Meiji Restoration and its participation in World War I, the Empire of Japan fought in two significant wars. The first war Japan fought was the First Sino-Japanese War, fought in 1894 and 1895. The war revolved around the issue of control and influence over Korea under the rule of the Joseon dynasty. From the 1880s onward, there had been vigorous competition for influence in Korea between China and Japan. The Korean court was prone to factionalism, and was badly divided by", "-31.40541315908922" ], [ "limitless supply of raw materials, a market for its manufactured goods (now excluded from the markets of many Western countries as a result of Depression-era tariffs), and a protective buffer state against the Soviet Union in Siberia. Japan invaded Manchuria outright after the Mukden Incident in September 1931. Japan charged that its rights in Manchuria, which had been established as a result of its victory at the end of the Russo-Japanese War, had been systematically violated and there were \"more than 120 cases of infringement of rights and interests, interference with business, boycott of Japanese goods, unreasonable taxation, detention of", "-31.39383920065302" ], [ "Japanese invasion of Taiwan (1895) Japanese occupation of the Pescadores In 1894 China and Japan went to war. In a few short months the Japanese defeated China's Beiyang fleet, routed the Chinese armies in Manchuria, and captured Port Arthur and Weihaiwei. Although nearly all the fighting took place in northern China, Japan had important territorial ambitions in southern China. As the war approached its end, the Japanese took steps to ensure that Taiwan would be ceded to Japan under the eventual peace treaty and that they were well placed militarily to occupy the island. In March", "-31.38799192564329" ], [ "House of Yi History In the 19th century tensions mounted between China and Japan, culminating in the First Sino-Japanese War. Much of this war was fought on the Korean Peninsula. Japan, after the Meiji Restoration, acquired Western military technology, and forced Joseon to sign the Japan–Korea Treaty of 1876 after the Ganghwa Island incident. It established a strong economic presence on the peninsula, heralding the beginning of Japanese imperial expansion in East Asia.\nThe Chinese defeat in the 1894 war led to the Treaty of Shimonoseki, which officially guaranteed Korea's independence from China. The treaty effectively granted Japan direct control", "-31.378356614208315" ], [ "had been placed in charge of labor and manpower to support Japan's war interests, even outside Japan proper. These projects in Manchukuo would be quite successful, creating an example of how war prisoners, as well as native Chinese and other ethnicities' populations could be forced into labor while simultaneously allowing more ethnically Japanese manpower for the Imperial Japanese Army itself.\nCiting acute labor shortages and lackluster profits from coal production, a group of 8,000 Chinese laborers were pressed into coal mining operations by mid-1939. The 8,000 Chinese laborers were put into groups of 1,000, with each group working a three-month shift.", "-31.362769757397473" ], [ "warlords and nominally unified China in the mid-1920s, but was soon embroiled in a civil war against its former Chinese Communist Party allies and new regional warlords. In 1931, an increasingly militaristic Empire of Japan, which had long sought influence in China as the first step of what its government saw as the country's right to rule Asia, staged the Mukden Incident as a pretext to launch an invasion of Manchuria and establish the puppet state of Manchukuo.\nChina appealed to the League of Nations to stop the Japanese invasion of Manchuria. Japan withdrew from the League of Nations after being", "-31.330452912399778" ], [ "Century, the Joseon Dynasty was unable to keep up with the rapid industrialization of the Western World and Japan as it was eventually absorbed into the Chinese Qing Dynasty's tributary system. In 1910, Japan annexed Korea due to the decline of the Qing Dynasty, and remained under Japanese control until its defeat by the Allied Powers during World War II. Taiwan The recordkeeping and development of the economic history of Taiwan started during the Age of Discovery. In the 17th century, European colonialists realized that the island nation Taiwan was located on the strategic cusp between the East and Southeast", "-31.301763315255812" ], [ "200,000 arrived in Manchukuo; joining this group after 1936 were 20,000 complete families. In Shinkyō Japanese made up 25% of the population. By 1940, the total population of Manchukuo was estimated at 36,933,000, which included approximately 1 million Japanese civilian and 500,000 Japanese military personnel. These figures exclude that of the Kwantung Leased Territory and Dalian, which were included within that of the Japanese overseas territories.", "-31.292359777347883" ], [ "to promote Japanese language and culture, but the administrators realize they first had to adjust to the Chinese culture of the people. Japan had a civilizing mission, and it opened schools so that the peasants could become productive and patriotic manual workers. Medical facilities were modernized, and the death rate plunged. To maintain order, Japan installed a police state that closely monitored everyone. In 1945, Japan was stripped of its overseas empire and Taiwan was returned to China. Korea The Korean Peninsula, a strategically located feature critical to the defense of the Japanese archipelago, greatly occupied Japan's", "-31.285007982427487" ], [ "interior with a provisional capital set up at Chungking while the Chinese communists remained in control of base areas in Shaanxi. In addition, Japanese control of northern and central China was somewhat tenuous, in that Japan was usually able to control railroads and the major cities (\"points and lines\"), but did not have a major military or administrative presence in the vast Chinese countryside. The Japanese found its aggression against the retreating and regrouping Chinese army was stalled by the mountainous terrain in southwestern China while the Communists organised widespread guerrilla and saboteur activities in northern and eastern China behind", "-31.249041950009996" ], [ "Japanese tended to stick to certain enclaves, but mostly to prevent the Japanese from imposing any sort of ordered government in parts of China they had occupied. Japan had occupied vast sections of China inhabited by millions of people requiring hundreds of thousands of civil servants to administer while the number of Japanese who were fluent in Mandarin or Cantonese was limited, and to a very large extent the Japanese depended upon Chinese collaborators to administer China for them. Zhang Xiaolin, a leading member of the Green Gang who went over to the Japanese in 1937 was gunned down by", "-31.21945257851621" ], [ "up a puppet state of Manchukuo in 1932 for the 34,000,000 inhabitants. Other areas were added, and over 800,000 Japanese moved in as administrators. The nominal ruler was Puyi, who as a small child had been the last Emperor of China. He was deposed during the revolution of 1911, and now the Japanese brought him back in a powerless role. Only Axis countries recognized Manchukuo. The United States in 1932 announced the Stimson Doctrine stating that it would never recognize Japanese sovereignty. Japan modernized the economy and operated it as a satellite to the", "-31.209835847403156" ], [ "formed, Araki, as War Minister, was the real power in Japan. A puppet state was formed in Northeast China and Inner Mongolia. It was named Manchukuo and governed under a form of constitutional monarchy. Factionalism within the military Hokushin-ron was largely supported by the Imperial Japanese Army. General Kenkichi Ueda was a strong believer in the Hokushin-ron policy, believing that Japan's main enemy was communism and that Japan's destiny lay in conquest of the natural resources of the sparely populated north Asian mainland. General Yukio Kasahara was also a major proponent of the Hokushin-ron philosophy, feeling strongly that the Soviet", "-31.203347965609282" ], [ "and joined the newly formed Manchukuo government as governor of Heilongjiang province and Minister of War.\nOn 27 February 1932, Ting offered to cease hostilities, ending official Chinese resistance in Manchuria, although combat by guerrilla and irregular forces continued as Japan spent many years in their campaign to pacify Manchukuo. Homefront, Japan The conquest of Manchuria, a land rich in natural resources, was widely seen as an economic \"lifeline\" to save Japan from the effects of the Great Depression, generating much public support. The American historian Louise Young described Japan from September 1931 to the spring of 1933 as gripped by", "-31.200419773347676" ], [ "China–Japan football rivalry Background China and Japan shared a relatively long and complicated history. Japan used to be under heavy Chinese influence throughout history, and is part of Sinosphere world. However, Japan often had desires to conquer China and to become new Asian leader. The Japanese tried to invade China via. Korea during the Japanese invasion to Korea, but no avail. In 19th century, Japan transformed from a feudal state into an empire with modern industries, defeating China in the First Sino-Japanese War. This made Japan the dominant Asian power.\nJapan and China's tensions escalated into the Second Sino-Japanese War, which", "-31.187674762448296" ], [ "did not have sufficient troops to garrison the territory formerly occupied by the Japanese--nor the means to get them there even if they had enough--they allowed the Japanese to keep their weapons and, in fact, \"police\" the areas they formerly occupied, to keep them from falling into the hands of the Communists. This resulted in further alienation from and resentment against the Nationalist government by the local population, which had already blamed the Nationalists for losing large chunks of the country to the Japanese invaders during the war. Half a decade later, when the Nationalists were driven from mainland China,", "-31.18711891373823" ], [ "Tateyama to protect the capital of the Japanese Empire from attack. In the 1930s the north and central areas of the prefecture became a center of large-scale military production, and military bases and fortifications were constructed in most coastal areas of the prefecture. After the United States took control of Saipan the northern part of the prefecture, most notably the city of Chiba and Chōshi, were firebombed. Much of the industrialized north of the prefecture was destroyed. Operation Coronet, one of two parts of Operation Downfall, was the planned land invasion of Tokyo in March 1946 by the United States.", "-31.176576103811385" ], [ "subsequent local Chinese governments insisted on its territorial sovereignty over the region.\nAfter the Mukden Incident of 1931, the Japanese military (the Kwantung Army) invaded Manchuria. Between 1931 and 1945, Manchuria was under the control of Manchukuo, a Japanese puppet state. From 1934 the area formed a new Jiandao Province of Manchukuo after the old Jilin Province was split into Binjiang, Jiandao and a rump Jilin. This period initiated a new wave of Korean immigration, as the Japanese government actively encouraged (or forced) Korean settlement in order to colonize and develop the region. The Japanese also moved to suppress resistance", "-31.15684208890889" ], [ "result of the First Sino-Japanese War. The office was abolished on 2 September 1897.\nThe Japanese government continued to provide sporadic encouragement of overseas emigration to help relieve overpopulation of the Japanese archipelago and to help spread Japanese influence overseas. During the late Meiji period and early Taishō period, large numbers of Japanese emigrated to Hawaii, California and the Philippines, and lesser numbers to China, South America and Southeast Asia. However, the emigration of Japanese to foreign countries did nothing to help secure the peripheral areas of the Japanese Empire itself.\nJapan acquired Korea, Karafuto (South Sakhalin), and the Kwantung Leased Territory", "-31.13207739725476" ], [ "8 August 1945, the Soviet Union declared war on the Empire of Japan. The Soviet Red Army invaded Manchuria from the north. By 20 August 1945 the Red Army had overrun almost all of Manchukuo. The Japanese Empire surrendered unconditionally ending World War II and simultaneously Manchukuo ceased to exist. Puyi fled the palace, attempting to reach Japan by plane, but was captured by the Soviets. The palace and surrounding city were looted.\nIn 1962 the structures were preserved and opened as the Museum of the Imperial Palace of Manchukuo (simplified Chinese: 伪满皇宫博物院; traditional Chinese: 偽滿皇宮博物院). The exhibits were expanded with", "-31.125522459391505" ], [ "Japan in 1295.\nThe Mongols and the Ashikaga shogunate of Japan made peace in the late 14th century during the reign of Toghon Temür, the last Yuan emperor in Khanbaliq. Long before the peace agreement, there was stable trade in East Asia under the dominance of the Mongols and Japan.\nAs a consequence of the destruction of the Mongol fleets, Japan's independence was guaranteed. Simultaneously, a power struggle within Japan led to the dominance of military governments and diminishing Imperial power. Technological significance The Mongol invasions are an early example of gunpowder warfare. One of the most notable technological innovations during the", "-31.123399854404852" ], [ "the defeat of World War II (in 1945) when the island nation rose to become the world's second largest economy. First contacts with Europe (16th century) Japan was considered as a country rich in precious metals, mainly owing to Marco Polo's accounts of gilded temples and palaces, but also due to the relative abundance of surface ores characteristic of a massive huge volcanic country, before large-scale deep-mining became possible in Industrial times. Japan was to become a major exporter of silver, copper, and gold during the period until exports for those minerals were banned.\nRenaissance Japan was also perceived as a", "-31.078406111133518" ] ]
49krdg
How did Ireland export food during a famine without the people revolting?
[ "The British were in control and didn't care at all about the Irish population. They made the Irish grow wheat to export and forced them to grow potatoes to eat. When the potato failed, there was nothing left, and the British were not about to give up their profits for humanitarian concerns, especially not for Catholics. If there had been a revolt, the British would have slaughtered thousands with their superior weaponry and organization. They'd done it many times before. If you ever wonder why groups like the IRA and Sinn Fein exist, centuries of behavior like this is it. Not saying terrorism is justified, but being angry at the British over this history absolutely is.", "Ireland had existed in an on again off again state of rebellion for the previous three centuries. The UK usually had something akin to martial law in place, so rebellion was more difficult than it might seem. After that is was just money and power. During a previous famine, ports were closed to prevent food exports. Merchants protested because they had to sell their food at low local prices, which cost them dearly. This time around, the merchants prevailed and were allowed to export their cash crops, and the locals had neither the money nor the power to stop them.", "You would be surprised at how common this is; same happened in both Russia and China under communism. Remember that the people with guns and/or power are the ones who get fed, and if a people are not very strong compared to their government, people generally see their odds of survival better if they just try to wait it out. More likely to survive a famine than a bullet in the head.", "The fact that they were literally starving probably had something to do with it. And there was significant resistance in Ireland to the British export policy, including armed rebellion. None of it was successful, obviously.", "Revolutions almost never occur when things are bad and getting worse. When people don't know how they will feed their children, they focus on that and solely that. Almost all revolutions have occurred as circumstances got better. Once you know you can feed your kids, then and only then can you focus on tomorrow." ]
[ [ "1854, some 50,000 families were evicted. Irish food exports during Famine Records show that Irish lands exported food even during the worst years of the Famine. When Ireland had experienced a famine in 1782–83, ports were closed to keep Irish-grown food in Ireland to feed the Irish. Local food prices promptly dropped. Merchants lobbied against the export ban, but government in the 1780s overrode their protests. No such export ban happened in the 1840s.\nThroughout the entire period of the Famine, Ireland was exporting enormous quantities of food. In the magazine History Ireland (1997, issue 5, pp. 32–36), Christine Kinealy, a Great", "-34.45380834401294" ], [ "The Great Hunger: Ireland 1845–1849 that no issue has provoked so much anger and embittered relations between England and Ireland \"as the indisputable fact that huge quantities of food were exported from Ireland to England throughout the period when the people of Ireland were dying of starvation\". John Ranelagh writes that Ireland remained a net exporter of food throughout most of the five-year famine. However, both Woodham-Smith and Cormac Ó Gráda write that, in addition to the maize imports, four times as much wheat was imported into Ireland at the height of the famine as exported primarily to be used", "-32.849244842946064" ], [ "Hunger scholar, lecturer, and Drew University professor, relates her findings: Almost 4,000 vessels carried food from Ireland to the ports of Bristol, Glasgow, Liverpool, and London during 1847, when 400,000 Irish men, women, and children died of starvation and related diseases. She also writes that Irish exports of calves, livestock (except pigs), bacon, and ham actually increased during the Famine. This food was shipped from the most famine-stricken parts of Ireland: Ballina, Ballyshannon, Bantry, Dingle, Killala, Kilrush, Limerick, Sligo, Tralee, and Westport. A wide variety of commodities left Ireland during 1847, including peas, beans, onions, rabbits, salmon, oysters, herring, lard,", "-32.075016561507596" ], [ "to protect cereal grain producers in Britain against foreign competition. These laws were only removed in 1846 after the onset of the Irish Potato Famine in which potato late blight ruined most of the Irish potato crop and brought famine to the Irish people in 1846–50. Though the blight also struck Scotland, Wales, England, and much of Europe, its effect there was far less severe since potatoes constituted a much smaller percentage of the diet than in Ireland. Despite this, Ireland still produced agricultural surpluses during the famine- most of the food was exported to English cities and British", "-31.539083475712687" ], [ "was a contributing factor in the population explosion that occurred in Ireland at that time. However, due to the political rule of the time, the majority of Irish produce (root crops, cereals and animal produce) was exported to Britain, leaving few strains of potato as the sole food source for the Irish. This, along with the spread of potato blight led to shortages and famines, the most notable instance being the Great Irish Famine (1845–1849). The causes are attributed by some to potato blight, others to an adherence to laissez-faire economic policies of the Liberal government, which kept food", "-31.110655964745092" ], [ "the first time purchase a variety food items to diversify their diet.\nThe over reliance on potatoes as a staple crop meant that the people of Ireland were vulnerable to poor potato harvests. The first Great Famine of 1739 was the result of extreme cold weather, but the famine of 1845–1849 (see Great Irish Famine) was caused by potato blight which spread throughout the Irish crop which consisted largely of a single variety, the Lumper. During the famine approximately one million people died and a million more emigrated.\nTea was introduced during Ireland's time as part of the United Kingdom and became", "-31.047747905482538" ], [ "parts of Ireland between 1845 and 1849 was a catastrophic failure in the food supply that led to approximately a million deaths from famine and (especially) diseases that attacked weakened bodies, and to massive emigration to Britain, the U.S., Canada and elsewhere. During the famine years roughly one million Irish emigrated; this tide was not turned until the 20th century, when Ireland's population stood at less than half of the pre-famine level of 8 million. Africa It is generally believed that potatoes entered Africa with colonists, who consumed them as a vegetable rather than as a staple starch. Shipping records", "-30.679966166382656" ], [ "from and with limited access to markets, delivering sacks of grain and tins of oil may be the most appropriate way to help. Fred Cuny further pointed out \"Studies of every recent famine have shown that food was available in-country – though not always in the immediate food deficit area. Usually, merchants begin hoarding food as a crisis develops – in conflicts, to keep it from being stolen, in famines, to get higher prices. Even though by local standards the prices are too high for the poor to purchase it, it would usually be cheaper for a donor to buy", "-30.237415105686523" ], [ "and whatever else could be had, usually cheese and a few vegetables, so when the staple food supply was scarce or too expensive to buy then just surviving was made even harder.\nIn 1846 the potato crop failed and there was a bad harvest, resulting in the price of bread going up steeply and causing 'a great distress among the poor', especially in Ireland where famine followed. But while affluent Torquinians collected over £4,000 for the relief of the Irish, many Devonians were less than happy about their own situation and decided to do something about it. Rumours of disturbances had", "-30.147886523685884" ], [ "from the autumn of 1846, when the first deaths from starvation were recorded. Seed potatoes were scarce in 1847. Few had been sown, so, despite average yields, hunger continued. 1848 yields were only two-thirds of normal. Since over three million Irish people were totally dependent on potatoes for food, hunger and famine were inevitable. Reaction in Ireland The Corporation of Dublin sent a memorial to the Queen, \"praying her\" to call Parliament together early (Parliament was at this time prorogued), and to recommend the requisition of some public money for public works, especially railways in Ireland. The Town Council of", "-29.960833384888247" ], [ "Irish Famine (1740–41) Background In 1740, Ireland had a population of 2.4 million people, most of whom depended on grains (oats, wheat, barley and rye) and potatoes as their staple foods. Half their expenses for food went for grain, 35% for animal products and the remainder for potatoes. Some survived only on oatmeal, buttermilk and potatoes. Over a year, daily consumption of potatoes was estimated at 2.7 to 3.2 kg (6 to 7 lb) per person. Diets varied according to village locations and individual income, with many people supplementing these staples with river, lake or sea fish, especially herring, and small game", "-29.824793701583985" ], [ "rest of the 19th century. Ireland in particular, because of the extreme dependence of the poor, especially western Ireland, on this single staple crop, was devastated by the blight's arrival in 1845.\nThe Lumper potato, widely cultivated in western and southern Ireland before and during the Great Famine, was bland, wet and poorly resistant to the potato blight, but yielded large crops and usually provided adequate calories for peasants and labourers. Heavy dependence on this potato led to disaster when the blight quickly turned harvest-ready and newly harvested potatoes into a putrid mush. The Irish Famine in the western and southern", "-29.21302046738856" ], [ "not have any conception that there might be soon \"millions of human beings in Ireland having nothing to eat\".\nMitchel later wrote one of the first widely circulated tracts on the famine, The Last Conquest of Ireland (Perhaps), published in 1861. It established the widespread view that British actions during the famine and their treatment of the Irish was a deliberate effort to murder the Irish. It contained a sentence that has since become famous: \"The Almighty, indeed, sent the potato blight, but the English created the Famine.\" Mitchel was charged with sedition because of his writings, but this charge was", "-29.155962535034632" ], [ "Irish potato, to try to improve food production for subsistence farmers. This was especially important in the face of two droughts and subsequent famines in 1928–29 and in 1943–44. In the second, known as the Ruzagayura famine, one-fifth to one-third of the population died. In addition, many Rwandans migrated to neighboring Congo, adding to later instability there.\nThe Belgians intended the colony to be profitable. They introduced coffee as a commodity crop and used a system of forced labor to have it cultivated. Each peasant was required to devote a certain percentage of their fields to coffee and this was enforced", "-28.957986725421506" ], [ "markets, as any surplus grain not stored would be bartered for livestock or passed to dependents. If drought coincided with warfare, famine could be catastrophic, as in the great 1861-63 famine in southern Malawi, when 90% of the population of some villages died of starvation or disease, or through war. However, seasonal shortages occurred in most years and droughts ever six years on average. The imposition of colonial rule itself caused local food shortages, sometimes amounting to famine, where villages were burned and cattle killed. There were several significant famine in the first half of the 20th century, including one", "-28.7213039673843" ], [ "Irish Famine and the Great Potato Famine:\nThe Celtic grazing lands of ... Ireland had been used to pasture cows for centuries. The British colonized ... the Irish, transforming much of their countryside into an extended grazing land to raise cattle for a hungry consumer market at home ... The British taste for beef had a devastating impact on the impoverished and disenfranchised people of ... Ireland. Pushed off the best pasture land and forced to farm smaller plots of marginal land, the Irish turned to the potato, a crop that could be grown abundantly in less favorable soil. Eventually, cows", "-28.71556080773007" ], [ "the south.\nBy the end of April, it destroyed much of the tillage crops (wheat and barley) sown the previous autumn, and grains were more important in the diet than were potatoes. The important corn crop also failed, which resulted in greater mortality in Ireland than in Britain or the Continent.\nGrains were so scarce that the Irish hierarchy of the Catholic Church allowed Catholics to eat meat four days each week during Lent, but not everyone could afford meat, either. The potato crisis caused an increase in grain prices, resulting in smaller and smaller loaves of bread for the old price.", "-28.572249195887707" ], [ "History of Ireland (1691–1800) Economic situation In the wake of the wars of conquest of the 17th century, completely deforested of timber for export (usually for the Royal Navy) and for a temporary iron industry in the course of the 17th century, Irish estates turned to the export of salt beef, pork, butter, and hard cheese through the slaughterhouse and port city of Cork, which supplied England, the British navy and the sugar islands of the West Indies. George Berkeley, Bishop of Cloyne wondered \"how a foreigner could possibly conceive that half the inhabitants are dying of hunger in", "-28.42327204812318" ], [ "times, whereas Indians would receive subsistence only when entire populations were endangered. Similarities between the Irish famine of 1846–49 and the later Indian famines of the last part of the 19th century were seen. In both countries, there were no impediments to the export of food during times of famines. Lessons learnt from the Irish famine were not seen in the correspondence on policy-making during the 1870s in India. Famine Codes The Famine Commission of 1880 observed that each province in British India, including Burma, had a surplus of food grains, and that the annual surplus amounted to 5.16 million", "-28.406118063488975" ], [ "could be grown abundantly in less favorable soil. Eventually, cows took over much of Ireland, leaving the native population virtually dependent on the potato for survival.\nThe potato was also used extensively as a fodder crop for livestock immediately prior to the famine. Approximately 33% of production, amounting to 5,000,000 short tons (4,500,000 t), was normally used in this way. Blight in Ireland Prior to the arrival in Ireland of the disease Phytophthora infestans, commonly known as \"blight\", only two main potato plant diseases had been identified. One was called \"dry rot\" or \"taint\", and the other was a virus known popularly", "-28.30151179304812" ], [ "earlier when serious food riots erupted and four people died.\nIn Celbridge, County Kildare, Katherine, the widow of William Conolly, commissioned construction of the Conolly Folly in 1740 to give employment to local workers. In 1743, she had The Wonderful Barn built nearby as a food store in case of further famines. Potatoes deteriorate The Great Frost affected the potato, which was one of the two main staples (the other was oatmeal) in rural Ireland. Potatoes typically were left in storage in gardens and in special storage in fields. The crops from the autumn of 1739 were frozen, destroyed, and inedible.", "-28.171058640116826" ], [ "will have died.\" U.S. law, which requires buying food at home rather than where the hungry live, is inefficient because approximately half of what is spent goes for transport. Cuny further pointed out \"studies of every recent famine have shown that food was available in-country—though not always in the immediate food deficit area\" and \"even though by local standards the prices are too high for the poor to purchase it, it would usually be cheaper for a donor to buy the hoarded food at the inflated price than to import it from abroad.\"\nFood banks and soup kitchens address malnutrition in", "-28.15558124335803" ], [ "by the economic situation of Ireland in the 18th century. Some absentee landlords managed their estates inefficiently, and food tended to be produced for export rather than for domestic consumption. Two very cold winters near the end of the Little Ice Age led directly to a famine between 1740 and 1741, which killed about 400,000 people and caused over 150,000 Irish to leave the island. In addition, Irish exports were reduced by the Navigation Acts from the 1660s, which placed tariffs on Irish products entering England, but exempted English goods from tariffs on entering Ireland. Despite this most of the", "-28.116663487744518" ], [ "laissez faire in the trade of grain. For example, two of the worst famine-afflicted areas in the Madras Presidency, the districts of Ganjam and Vizagapatam, continued to export grains throughout the famine. These famines were typically followed by various infectious diseases such as bubonic plague and influenza, which attacked and killed a population already weakened by starvation. British response The first major famine that took place under British rule was the Bengal Famine of 1770. About a quarter to a third of the population of Bengal starved to death in about a ten-month period. East India Company's raising of taxes", "-28.071331199607812" ], [ "little success in 1847, and failed once again in 1848. The starving Irish tried eating the potatoes, and would get extremely sick from eating them. Irish people began eating a diet of eggs, birds, and plants like nettles and chickweeds. Many Farmers would bleed their cattle out and fry the blood, rather than eat their meat. If the cattle were as malnourished as the people, then the resulting meat wouldn't be fit for consumption, so they resorted to using the blood mixed with herbs, garlic, oats and butter, it could be used as good emergency meal. The extremely desperate and", "-27.916016272851266" ], [ "following the Green Revolution, the impacts of such diseases threaten agricultural production worldwide. Irish Potato Famine In Ireland, exclusive use of one variety of potato, the \"lumper\", led to the Great Famine of 1845-1849. Lumpers provided inexpensive food to feed the Irish masses. Potatoes were propagated vegetatively with little to no genetic variation. \nWhen Phytophthora infestans arrived in Ireland from the Americas in 1845, the lumper had no resistance to the disease, leading to the nearly complete failure of the potato crop across Ireland. Bananas Until the 1950s, the Gros Michel cultivar of banana represented almost all bananas consumed in", "-27.808531355462037" ], [ "new crops had not yet arrived. In spring 1775, famine arose in this new context: before Turgot's edict, every region faced its own shortages, so that some would have suffered a genuine famine while others would have been totally spared and supplied through stable prices; a royal intervention would have been requested, and without a doubt obtained, to assure the supply of the regions most affected. With liberalization, owners of grain started to speculate by storing grain. They also tend to buy en masse in areas of good harvests to sell in areas of bad harvests where profits could be", "-27.734768790047383" ], [ "and 50 million deaths.\nThe regular export of grain by the colonial government continued; during the famine the viceroy, Lord Lytton, oversaw the export to England of a record 6.4 million hundredweight (320,000 tons) of wheat, which made the region more vulnerable. The cultivation of alternate cash crops, in addition to the commodification of grain, played a significant role in the events.\nThe famine occurred at a time when the colonial government was attempting to reduce expenses on welfare. Earlier, in the Bihar famine of 1873–74, severe mortality had been avoided by importing rice from Burma. The Government of Bengal and", "-27.630743258872826" ], [ "rural areas. Exportation of grain continued despite the famine and the government attempted to conceal it. While the famine is attributed to unintended consequences, it is believed that the government refused to acknowledge the problem, thereby further contributing to the deaths. In many instances, peasants were persecuted. Between 20 and 45 million people perished in this famine, making it one of the deadliest famines to date.\nMalawi ended its famine by subsidizing farmers despite the strictures imposed by the World Bank. During the 1973 Wollo Famine in Ethiopia, food was shipped out of Wollo to the capital city of Addis Ababa,", "-27.600683294258488" ], [ "Irish peasants subsisted on potatoes. This was to lead to the Great Famine of the 1840s. Portugal Alentejo is considered the breadbasket of Portugal. Romania In the 19th century, Romania was considered part of Europe's breadbasket. Ukraine During Tsarist times, the Ukrainian provinces of the Russian Empire were referred to as the Empire's breadbasket. During the Soviet era, the mantle passed to the Ukrainian SSR.\nThere is also the Central Black Earth Region within Russia proper. Serbia Vojvodina was considered the breadbasket of Serbia. About 70% of its agricultural products are corn, 20% industrial herbs, and 10% other agricultural cultures. Spain", "-27.544170567180117" ], [ "foreign markets, stockpiling, rationing, regulation of production and charity. The Great Famine of 1845 in Ireland was one of the first famines to feature such intervention, although the government response was often lacklustre. The initial response of the British government to the early phase of the famine was \"prompt and relatively successful,\" according to F. S. L. Lyons. Confronted by widespread crop failure in the autumn of 1845, Prime Minister Sir Robert Peel purchased £100,000 worth of maize and cornmeal secretly from America. Baring Brothers & Co initially acted as purchasing agents for the Prime Minister. The government hoped that", "-27.480499577708542" ], [ "took over much of Ireland, leaving the native population virtually dependent on the potato for survival.\n— Jeremy Rifkin, Beyond Beef\nDespite being a major producer of beef, most of the people of Ireland during this period consumed little of the meat produced, in either fresh or salted form, due to its prohibitive cost. This was because most of the farms and its produce were owned by wealthy Anglo-Irish who were absentee landlords and that most of the population were from families of poor tenant farmers, and that most of the corned beef was exported.\nThe lack of beef or corned beef in the", "-27.2519577254061" ], [ "but the price of it, which was beyond the reach of the poor.\nWriting in 1849, English poet and social reformer Ebenezer Jones wrote that \"In the year A.D. 1846, there were exported from Ireland, 3,266,193 quarters of wheat, barley and oats, besides flour, beans, peas, and rye; 186,483 cattle, 6,363 calves, 259,257 sheep, 180,827 swine; (food, that is, in the shape of meat and bread, for about one half of the Irish population), and yet this very year of A.D. 1846 was pre-eminently, owing to a land monopoly, the famine year for the Irish people.\"\nThe historian Cecil Woodham-Smith wrote in", "-27.24192873116408" ], [ "of the country depended almost exclusively on potato, the potato blight, a fungus that rotted the edible tubers of the potato plant while still in the ground, caused a massive famine that killed over a million people and forced another two million to emigrate. In regions of Europe such as Scotland, Scandinavia, and northern Russia, the climate and soil types were less suited for wheat cultivation, and rye and barley were far more important. Rye was used to bake the dense, dark bread that is still common in countries like Sweden, Russia, and Finland. Barley was more common in the north,", "-26.894936647382565" ], [ "yield.\"\nIn the 1840s, infestations of Phytophthora infestans devastated a series of potato harvests, leading to widespread famine and emigration. The cumulative effects of both catastrophes lowered Ireland's total population by approximately 2 million, of which approximately 1 million were fatalities.\nAfter almost disappearing from cultivation, the 'Irish Lumper' was regrown, starting in 2008, by Michael McKillop of County Antrim for harvest sale as an heirloom variety. Culinary use The 'Irish Lumper' has been characterized as a \"wet, nasty, knobbly old potato\". Its texture upon boiling is described as more \"waxy\" than \"floury\", indicating a starch content on the lower side", "-26.800210230314406" ], [ "Irish Potato Famine of the 19th century, potatoes were considered a Giffen good. Potatoes were the largest staple in the Irish diet, so as the price rose it had a large impact on income. People responded by cutting out on luxury goods such as meat and vegetables, and instead bought more potatoes. Therefore, as the price of potatoes increased, so did the quantity demanded. Expectation of change in the price of commodity If an increase in the price of a commodity causes households to expect the price of a commodity to increase further, they may start purchasing a greater amount", "-26.635930294403806" ], [ "made it a time for little margin for error in food production. Great Famine In the spring of 1315, unusually heavy rain began in much of Europe. Throughout the spring and the summer, it continued to rain, and the temperature remained cool. Under such conditions, grain could not ripen, leading to widespread crop failures. Grain was brought indoors in urns and pots to keep dry. The straw and hay for the animals could not be cured, so there was no fodder for the livestock. The price of food began to rise; prices in England doubled between spring and midsummer. Salt,", "-26.58522944431752" ], [ "land. They often survived by casual work such as beer-brewing or food-for-work labour, both of which ended during the famine. Unless their relatives helped them, these women and their families were very vulnerable. On the other hand, many households of migrant workers received cash from absent husbands throughout the famine. A slow start In the early months of 1949, when it was clear that most of the maize crop planted in late 1948 would be lost because of drought, the Nyasaland government asked the Rhodesian Maize Control Board, which had been set-up in the 1930s and maintained buffer stocks and", "-26.58139097475214" ], [ "vessels to break anchor.\nThe strange autumn of 1740 pushed food prices back up, e.g., Dublin wheat prices on 20 December were at an all-time high. The widening wars in mid-December 1740 encouraged people with stored food to hold onto it. The populace needed food, and riots erupted again in various cities throughout the country. By December 1740, signs were growing that full-blown famine and epidemic were upon the citizens of Ireland. Relief schemes The Lord Mayor of Dublin, Samuel Cooke, consulted with the Lords Justices – Archbishop Boulter, Henry Boyle, Speaker of the Commons and the Lord Chancellor of Ireland,", "-26.516279214061797" ], [ "capital.\nThe Great Famine of 1845–1851 devastated Ireland, as in those years Ireland's population fell by one-third. More than one million people died from starvation and disease, while an additional two million people emigrated, mostly to the United States and Canada. By the end of the decade, half of all immigration to the United States was from Ireland. The period of civil unrest that followed until the end of the 19th century is referred to as the Land War. Mass emigration became deeply entrenched and the population continued to decline until the mid-20th century. Immediately prior to the famine the population", "-26.39153685583733" ], [ "where famine was endemic. The colonial authorities also provided some famine relief by moving maize from districts with surpluses to those with shortages and making free issues to children, the old and destitute, but they were reluctant to issue free relief to the able-bodied. After the great famine ended in 1863, despite regular seasonal hunger and high levels of chronic malnutrition, as well as acute episodes of food shortage and famine, there was no \"famine that kills\" until 1949.\nMarkets where food was exchangeable for cash were established during the colonial era, although, as long Malawi as was largely agricultural, its", "-26.340293431218015" ], [ "every recent famine have shown that food was available in-country—though not always in the immediate food deficit area\" and \"even though by local standards the prices are too high for the poor to purchase it, it would usually be cheaper for a donor to buy the hoarded food at the inflated price than to import it from abroad.\"\nDeficient micronutrients can be provided through fortifying foods. Fortifying foods such as peanut butter sachets (see Plumpy'Nut) have revolutionized emergency feeding in humanitarian emergencies because they can be eaten directly from the packet, do not require refrigeration or mixing with scarce clean water,", "-26.33642327657435" ], [ "of the grain producers because of crop failures from shortage of labour. Any grain that could be shipped was eventually taken by pirates or looters to be sold on the black market.\nMeanwhile, many of the largest countries, most notably England and Scotland, had been at war, using up much of their treasury and exacerbating inflation. In 1337, on the eve of the first wave of the Black Death, England and France went to war in what became known as the Hundred Years' War. This situation was worsened when landowners and monarchs such as Edward III of England (r. 1327–1377) and", "-26.324452393389947" ], [ "dishes and were eaten both by the Anglo-Irish gentry and the mass of the people. This was unusual as the potato was shunned in most of Europe for centuries after its introduction, particularly by the elites. The potato was first introduced into Ireland in the second half of the 16th century, initially as a garden crop. It eventually came to be the main food crop of the poor. As a food source, the potato is extremely valuable in terms of the amount of energy produced per unit area of crop. The potato is also a good source of many vitamins", "-26.314807113085408" ], [ "longer functional. Food Despite the famine, few communities requested foodstuffs or named food as a primary need. Some specific requests were made on behalf of the sick, including rice, cocoa, sugar, tea, and fat. Nonetheless, a large number of the donations and supplies that the AVRS delivered to famine-struck regions included foodstuffs. The group distributed these goods, along with wheat, rye, potatoes, yeast, meat, and millet. The grains were particularly important given the failure and confiscation of wheat crops. In many cases, food supplies ran low, and occasionally the sickest or \"most in need\" individuals (rather than entire families) would", "-26.299984219367616" ], [ "social upheavals of the previous year had combined with a harsh winter to ruin the harvest. By this time at war with all her neighbours, France had nowhere to turn for overland imports of fresh provisions. Eventually a solution to the food crisis was agreed by the National Convention: food produced in France's overseas colonies would be concentrated on board a fleet of merchant ships gathered in Chesapeake Bay, and augmented with food and goods purchased from the United States. During April and May 1794, the merchantmen would convoy the supplies across the Atlantic to Brest, protected by elements of", "-26.296793573419563" ], [ "Irish land from arable to pastoral farming, new sources of grain were needed. It began to be imported in large quantities, particularly from the Baltic ports, through Berwick and Ayr. There was a growing desire among the court, lords, upper clergy and wealthier merchants for luxury goods, that largely had to be imported, including fine cloth from Flanders and Italy, wine, pottery, armour and military equipment. This led to a chronic shortage of bullion. This, and perennial problems in royal finance, led to several debasements of the coinage, with the amount of silver in a penny being cut to almost", "-26.295653100023628" ], [ "and 1924, and significant food shortages in other years. The government took little action until the situation was critical when relief supplies were expensive and their distribution delayed and was also reluctant to issue free relief to the able-bodied. It did, however, import around 2,000 tons of maize for famine relief in 1922 and 1923 and buy grain in less-affected areas. Although these events were on a smaller scale than in 1949, the authorities did not react by making adequate preparations to counteract later famines.\nIn November and December 1949, the rains stopped several months early and food shortages rapidly developed", "-26.28895453189034" ], [ "(340 ha) of wooded land, 417 Morgen (106 ha) of scrub and wild land and 4 Morgen (1 ha) of other lands.\nTo prevent famine, in 1915, the miller had to grind 82% of the grain. Bread was made from rye meal and potatoes. On 1 February, all cereal and meal stocks were seized, as were all the oats, for the army administration. Beginning at this time, everybody received a bread ticket entitling him or her to 200 g or half a Pfund (250 g) of bread each day. On 1 April everybody got a flour ticket. There was a bumper potato harvest. The winter was", "-26.23295757971937" ], [ "appealing vegetables known to man, the humble turnip.” During this time, the black market became a prominent means of obtaining otherwise scarce foodstuffs. Historian Avner Offer suggests that approximately “one-fifth to one-third of food could only be obtained through illegal channels.” Social unrest Driven by starvation, children would break into barns and loot orchards in search of food. Such disregard for authority effectively doubled the youth crime rate in Germany. Historian G.J. Meyer noted that, according to a report from a prominent Berlin physician, “eighty thousand children had died of starvation in 1916.” Worker strikes were also", "-26.20849363497109" ], [ "Afghanistan. In 1845, the Great Famine began to cause mass starvation, disease and death in Ireland, sparking large-scale emigration; To allow more cheap food into Ireland, the Peel government repealed the Corn Laws. Peel was replaced by the Whig ministry of Lord John Russell.\nIn 1853, Britain fought alongside France in the Crimean War against Russia. The goal was to ensure that Russia could not benefit from the declining status of the Ottoman Empire, a strategic consideration known as the Eastern Question. The conflict marked a rare breach in the Pax Britannica, the period of relative peace (1815–1914) that existed among", "-26.11868068133481" ], [ "The potato would appear to have been introduced into Ireland in the second half of the 16th century, as a result of the European colonisation of the Americas, initially as a garden crop. It eventually came to be the main food field crop of the tenant and labouring classes. As a food source, the potato is extremely efficient in terms of energy yielded per unit area of land. The potato is also a good source of many vitamins and minerals, particularly vitamin C (especially when fresh). As a result, the typical 18th- and 19th-century Irish diet of potatoes and buttermilk", "-26.08533574969624" ], [ "to improve conditions for wheat crops (a crop which thrives in the nitrogen-rich soils left over by a previous crop of pulses or legumes).\nQuickly-perishable foods, and those not grown at a commercial scale, such as fruits, nuts, and vegetables are underrepresented in historical records, but archeological evidence suggests such foods were nonetheless important seasonal supplements to the Irish diet. As evidence suggests most urban dwellings were furnished with gardens, the growth and harvest of a variety of fresh fruits, herbs, and vegetables would have provided variety of the diets of urban dwellers. As well, as fragile plant life erodes and", "-26.04619339882629" ], [ "of seasonal fruits were grown. Fruits not eaten in season were often preserved as jam, wet sweetmeats, dried, or cooked into pies that could be frozen during the winter months. Some vegetables originating in the New World, including beans, squashes, and corn, were readily adopted and grown by the European colonists. Pumpkins and gourds grew well in the northern colonies and were often used for fodder for animals in addition to human consumption. Alcohol Hard apple cider was by far the most common alcoholic beverage available to colonists. This is because apple trees could be grown locally throughout the colonies,", "-26.005915582791204" ], [ "quarter-acre clause was \"indirectly a death-dealing instrument\". Emigration While the famine was responsible for a significant increase in emigration from Ireland, of anywhere from 45% to nearly 85% depending on the year and the county, it was not the sole cause. The beginning of mass emigration from Ireland can be traced to the mid-18th century, when some 250,000 people left Ireland over a period of 50 years to settle in the New World. Irish economist Cormac Ó Gráda estimates that between 1 million and 1.5 million people emigrated during the 30 years between 1815 (when Napoleon was defeated in Waterloo)", "-25.966249287454048" ], [ "its legitimacy throughout the world. Pre-colonial and colonial periods Seasonal hunger was common in pre-colonial and early colonial times, and gave rise to several coping strategies such as growing secondary crops like millet or sweet potatoes in case the maize crop failed, gathering wild food or relying on support from family or friends. In a purely peasant economy, farmers grow food primarily for their families’ needs. They normally have only small surpluses to store or for sale and little money to buy food in a time of shortage, even if it was available in any market. There were no significant", "-25.924278561302344" ], [ "had become widespread as a supplementary rather than a principal food; the main diet was still based on butter, milk, and grain products. By 1800 to 1820, the potato became a staple of the poor, especially in winter. Furthermore, a disproportionate share of the potatoes grown in Ireland were of a single variety, the Irish Lumper.\nWith the expansion of the economy between 1760 and 1815, the potato was increasingly adopted by the people and became a staple food year round for farmers. The widespread dependency on this single crop, and the lack of genetic variability among the potato plants in", "-25.869314586401742" ], [ "crops to maturity, but corn and other grain prices rose dramatically. The price of oats, for example, rose from 12¢ per bushel ($3.40/m³) in 1815 (equal to $1.64 today) to 92¢ per bushel ($26/m³) in 1816 ($13.58 today). Crop failures were aggravated by an inadequate transportation network: with few roads or navigable inland waterways and no railroads, it was expensive to import food. Europe Low temperatures and heavy rains resulted in failed harvests in Britain and Ireland. Families in Wales traveled long distances begging for food. Famine was prevalent in north and southwest Ireland, following the failure of wheat, oat,", "-25.78548711311305" ], [ "elsewhere who were unable to grow their own food. However, it was underfunded, it paid very low prices for crops and it was reluctant to promote higher maize production for the home market or for export on the grounds of the cost of purchasing and storing it.\nThe Maize Control Board aimed to handle only around 5% of the national crop and to set up a small grain reserve. However, as its first two years of operation coincided with poor harvests, it only managed to buy around 2% of the crop in 1947 and in 1948 and could not establish any", "-25.784755018656142" ], [ "of Alberta, was critical of Tauger's claims, stating: \"Dr. Tauger and other scholars fail to distinguish between shortages, droughts and outright famine. There is no such thing as a 'natural' famine, no matter the size of the harvest. A famine requires some form of state or human input.\" Steven Rosefielde Professor Steven Rosefielde argues in his 2009 book Red Holocaust that \"Grain supplies were sufficient enough to sustain everyone if properly distributed. People died mostly from terror-starvation (excess grain exports, seizure of edibles from the starving, state refusal to provide emergency relief, bans on outmigration, and forced deportation to food-deficit", "-25.737807353027165" ], [ "famine food utilizing the edible inner bark of trees and part of Scandinavian history during the Little Ice Age, mention is similarly given to increased fungiculture or mushrooms such as the honey fungi that grow directly on moist wood without sunlight, and variations of wood or cellulosic biofuel production, which typically already creates edible sugars/xylitol from inedible cellulose, as an intermediate product before the final step of alcohol generation. Large-scale food stockpiling The minimum annual global wheat storage is approximately 2 months. To feed everyone despite nuclear winter, years of food storage prior to the event has been proposed.", "-25.5335949476721" ], [ "recipe for this sustaining food to Canada. One such journey was HMS Elizabeth, which brought immigrants to Prince Edward Island in 1775. Caught in a storm just off the coast of the island, the settlers and crew all survived and made it to the island in life boats, where they waited for three days for the storm to die down. When they returned to their ship to retrieve their possessions and provisions, they discovered that several barrels of oats were among the few foodstuffs that remained. The oats were full of sand and salt water, but that didn't stop them", "-25.487611919117626" ], [ "famine, and the remainder by war-related disease. Modern estimates put the toll at closer to 20%.\nIn addition, some fifty thousand Irish people, including prisoners of war, were sold as indentured labourers under the English Commonwealth regime. They were often sent to the English colonies in North America and the Caribbean where they subsequently comprised a substantial portion of certain Caribbean colony populations in the late 17th century. In Barbados, some of their descendants are known as Redlegs.\nEventually, the guerrilla war was ended when the Parliamentarians published surrender terms in 1652 allowing Irish troops to go abroad to serve in", "-25.47344016347779" ], [ "after a good harvest, but continued in 2001: some maize was exported at low prices. Failure to prevent food shortages is shown by estimated deaths from hunger and related diseases', for which there was a credible report of over 1,000 deaths, compared to the 100 to 200 estimated for 1949. Although 1992 famine deaths were not fully reported, they were probably far less than in 2002. The IMF identified four main areas for improving food security: improving transparency by external audit, removing price distortions and reducing costs. However, the biggest threat to food security was Malawi's reliance on maize, not", "-25.372759627818596" ], [ "eggs and fish were also eaten, depending on availability.\nMost food was eaten fresh and in season. Fruits and vegetables had to be eaten as they ripened and before they spoiled. People had to contend with periodic episodes of hunger and famine; producing enough food required hard and well-timed labor, and the climatic conditions resulted in unpredictable harvests and the need to store as much food as possible. Thus, grapes were made into raisins and wine; olives were made into oil; figs, beans and lentils were dried; and grains were stored for use throughout the year. The diet was essentially vegetarian.", "-25.359299512696452" ], [ "worst effects. In order to mitigate rising levels of starvation and assuage peasant discontent, grain was speedily imported from Sicily through Talamone, 60,000 gold florins were taken from the city purse by the Florentine commune to aid the relief effort, and all the city's bakers had their ovens requisitioned by the government so that loaves of bread could be sold at affordable prices to the riotous and starving poor.\nVillani was sent on another diplomatic mission in 1329, this time to Bologna to meet Cardinal Bertrand de Pouget. From 1330 to 1331 he superintended the making of Andrea Pisano's bronze doors", "-25.35907638981007" ], [ "were able to adapt to smaller plots and to increase the production of maize and other food crops substantially, by benefiting from improved seeds and fertilizer. Between 1950 and 1979 the annual maize crop exceeded consumption except in 1963, 1970, 1975 and 1976 and shortfalls were made good from reserves. However, after 1980 food insecurity became an increasing problem in the country, leading to a perennial Malawian food crisis.\nBad weather in 1980, 1990, 1997 and 1998 significantly reduced maize harvests, but famines were avoided. In 1997 and 1998, famine was avoided by the release of government grain reserves and overseas", "-25.204534515622072" ], [ "cure and preserve meat, was difficult to obtain because it could not be extracted through evaporation in the wet weather; it peaked in price in the period 1310–20, reaching double the price from the decade before. In the spring of 1316 it continued to rain on a European population deprived of energy and reserves to sustain itself. All segments of society from nobles to peasants were affected, but especially the peasants who were the overwhelming majority of the population and who had no reserve food supplies. The height of the famine was reached in 1317 as the wet weather continued.", "-25.16761029555346" ], [ "other goods fluctuated widely. Flour could be unsellable because it was too cheap, but four months later there could be no supply and a large demand. During the winter of 1863–1864, heavy snows caused a flour famine which resulted in the \"Bread Riot\" in Virginia City. Regardless, because of transportation and delivery costs, food was still very expensive. Bad weather and other transportation problems sometimes caused food shortages, and early snows cut off food supplies. Tolls Prices were also driven up by the costs of tolls. Tolls were required at many ferries, bridges and roads, but none", "-25.14379016344901" ], [ "The relief committees raised money by subscription from local landowners, gentry and members of the clergy and were matched by funds from Dublin. With these monies food was bought and distributed to the ever-increasing numbers of starving people at soup kitchens. In an attempt to provide employment and thereby give the destitute the means to buy food, Lord Lurgan devised a scheme of land- drainage on his estate.\nThe so-called 'famine roads' were not built in Lurgan to the same extent as the rest of Ireland, although land owners also provided outdoor relief by employing labourers to lower hills and repair", "-25.113621595548466" ], [ "disrupted the distribution of foodstuffs and other goods throughout the country – with disastrous consequences. During the war, it often cost more to transport grain than to grow it, in many parts of Iran. All this made the living conditions of the poor even more dreadful. Mohammad Gholi Majd's Research According to the Mohammad Gholi Majd's research American diplomatic records show that at least 8-10 million Iranians out of a population of 18-20 million died of starvation and disease during the famine of 1917-1919. Iran's population in 1900 was reported at 12 million by the American Minister in Tehran. In", "-25.08099580265116" ], [ "the Irish famine of 1846-1851 caused the starvation and death of about a million people, and drove another million to leave the country. Emigration to Australia By contrast with the deprivations of a famine-ravaged Ireland, Australia was enjoying the luxury of numerous Australian gold rushes. One of Flanagan's older brothers, John, set off for Australia in 1858, arriving in Melbourne on the Marco Polo in July. Flanagan followed, docking in Melbourne on the William Kirk in July 1860.\nMargaret O’Halloran, also from Ennis, had arrived in Geelong in 1850, on the Lady Kennaway. She was recorded in the ship's passenger", "-25.079266068540164" ], [ "They could not even serve as seed for the next growing season. \"Richard Purcell, one of the best rural witnesses of the unfolding crisis, reported in late February [1740] that had the Frost not occurred, there would have been enough potatoes in his district to have kept the country [Ireland] fed until August [1740], indicating a rare local abundance of the crop. 'But both root and branch…is destroyed every where', except for 'a few which happen'd to be housed', and 'in a very few deep…and turfy moulded gardens where some, perhaps enough for seed for the same ground, are sound.'\"\nAt", "-25.074275416089222" ], [ "armed forces and cities. Consequently, the potato, after its widespread adoption in the 18th century, became just about the only food the poor could afford (which was the vast majority of the population).\nBy the 21st century, much of Irish cuisine was being revived. Representative traditional Irish dishes include Irish stew (made with lamb, mutton, or beef), bacon and cabbage (with potatoes), boxty (potato pancake), coddle (sausage, bacon, and potato), colcannon (mashed potato, kale or cabbage, and butter), and, in Ulster, the soda farl. Modern Irish Food still uses these traditional ingredients but they are now being cooked by chefs with", "-25.06254337192513" ], [ "built thirty ovens to bake bread for the poor of Paris. The bread was sold for two sous a loaf at the Louvre, the Place des Tuileries, the Bastille, the Luxembourg Palace, and on rue d'Enfer. Crowds pushed and fought for a chance to buy bread. The terrible conditions were repeated in the winter of 1693-94. One diarist, Robert Challes, wrote that, at the height of the famine, between fourteen and fifteen hundred people of both sexes and all ages were dying daily of hunger and disease at the Hôtel de Dieu hospital and on the", "-25.005798384634545" ], [ "consumed at all.\nDue to Ireland's geography and the locations of Mesolithic settlements, the variety of food sources available to the Mesolithic Irish was consequently unique. Outside of boar, large predators including the wolf, the brown bear, and lynx, are scarce in archeological assemblages, and understood to have been generally avoided as a source of food, as they were in most contemporary Mesolithic Europe. Likewise, while cereals were unlikely to have been yet consumed due to the processing required to make them digestible, fungi, roots, leaves, stems, flowers, nuts, seeds, berries and fruits were all otherwise simple to harvest and eat,", "-24.93933581066085" ], [ "the wheat was mainly produced and used by locals. During this time, the British stated that the people of Bitlis were unable to use all of the wheat they produced, and most was \"left to rot in the underground storehouses.\"", "-24.910341800889" ], [ "famines, especially in the years 1816/17, 1847 and 1879/80, and an 1853 memorandum records that \"Many Eifel inhabitants know no food other than potatoes and bread that consists of a mixture of oatmeal and potato. It can be said without exaggeration that two thirds of the entire population only enjoy meat once a year.\" The consequences of the terrible food situation were only too obvious: \"In 1852, only 10% of all those liable to enlistment were fit for military service.\".“\nDue to its barren soils and the harsh climate, which led time and again to poor harvests, many farmers were in", "-24.886974377754086" ], [ "and import from rural farms made the need for accessible and consistent sources of food vital. Uniquely to Ireland, the emergence of Norse towns in the 9th and 10th centuries and their subsequent growth during the arrival of the Anglo-Normans in the 12th and 13th centuries ushered a population boom that brought with it new foods born of foreign trade and new methods of production. The Anglo-Normans in particular propagated a commercial economy that encouraged urban settlement and the steady trade of local and foreign commodities by holding festive market fairs and attracting settlers with offers of burgage plots", "-24.880647107056575" ], [ "estates in Sweden exported their harvests, mostly oats, to Great Britain, where it was used for horse drawn buses in London.\nThe great famine of 1867-68, and the distrust and discontent over the way the authorities handled the relief help to the needy, is estimated to have contributed greatly to Swedish emigration to the United States, which skyrocketed around this time.", "-24.853411822696216" ], [ "and, subsequent to this, most grains such as barley and rye were imported. The scarcity of grain was overcome in different ways in different parts of the country. In some areas, grain was made to go further using dulse (Palmaria palmata; in Icelandic, söl), Iceland moss (Cetraria islandica; in Icelandic, fjallagrös) or Irish moss (Chondrus crispus; in Icelandic, fjörugrös) in compotes and breads. It was not until the 18th century that it became common practice to make leavened rye breads; sourdough was mostly used. Rye breads baked in hot springs are a popular item today, and are served for local", "-24.846880686905934" ], [ "some farmers were unable to replant their maize for lack of rain and because few had any saved seed to plant after the poor harvests of the previous two years. Those with land near riverbanks that retained moisture could harvest some crops, others had relatives in less severely affected areas or received food rations from their employers, but the majority were dependent on what their own land could grow. Initial reaction The initial government response was hampered by a lack of maize available to distribute. In January, the District Commissioner in Blantyre District became concerned about a growing black market", "-24.78550115574035" ], [ "pay taxes and buy some new goods for the household, with the general production being geared towards their own food production. In Tambov Province, in the central agricultural zone, a survey conducted by zemstvo authorities in the 1880s found that two out of three peasant households could not feed themselves without also simultaneously going into debt; this was made worse by the fact that peasant farmers had to sell off grain in autumn, when prices were low due to high supply, and buy grain in the spring at double the prices – often to the same kulaks, usurers who could", "-24.717630167724565" ], [ "Grain trade History The grain trade is probably nearly as old as grain growing, going back the Neolithic Revolution (around 11,500 BCE). Wherever there is a scarcity of land (e.g. cities), people must bring in food from outside to sustain themselves, either by force or by trade. However, many farmers throughout history (and today) have operated at the subsistence level, meaning they produce for household needs and have little leftover to trade. The goal for such farmers in not to specialize in one crop and grow a surplus of it, but rather to produce everything his family needs", "-24.705389152048156" ], [ "a key year where food security was extremely low, and that food production since the initial famine was on a continual decline throughout various political regimes. The strategy was to improve their agricultural sector and attempt to improve livestock and working conditions, though more negative practices were adopted such as begging, stealing, as well as having a smaller diet. Food aid and food for work programs were effective methods of intervention at the time though they were not sustainable practices A recent study analyzed the relationship between crop choice and household poverty in Ethiopia. The study showed that households who", "-24.703658706974238" ], [ "as reliably as before. At times and places when and where most other crops failed, potatoes could still typically be relied upon to contribute adequately to food supplies during colder years.\nIn France, at the end of the 16th century, the potato had been introduced to the Franche-Comté, the Vosges of Lorraine and Alsace. By the end of the 18th century it was written in the 1785 edition of Bon Jardinier: \"There is no vegetable about which so much has been written and so much enthusiasm has been shown ... The poor should be quite content with this foodstuff.\" It had", "-24.685423185524996" ], [ "were employed in agriculture, famines were common, and food consumption per capita declined in every decade. In London, the late 19th century British parliament debated the repeated incidence of famines in India, and the impoverishment of Indians due to this diversion of agriculture land from growing food staples to growing poppy for opium export under orders of the colonial British empire.\nThese colonial policies moved unemployed artisans into farming, and transformed India into a region increasingly abundant in land, unskilled labour, and low productivity. This consequently made India scarce in skilled labour, capital and knowledge. On an inflation adjusted 1973 rupee", "-24.66878992447164" ], [ "until April 5, making it impossible to deliver grain to the city by boat. During the summer of 1709, the government announced the creation of workshops for the poor and unemployed, who would receive 1.5 pounds of bread and two sous for each day of work. Six thousand persons lined up before dawn near the Porte Saint-Martin for two thousand available jobs. Riots followed, the crowds attacked Les Halles, and Musketeers had to occupy the main streets and squares to restore order. Placards criticizing the King and his government began to appear on the city gates, the churches and the", "-24.60513550660835" ], [ "dishes, the poor continued to eat the piada, which during famines was often made with bran or even poorer ingredients. \nIn 1371 the piada appeared for the first time in a historic document: the Description of the Province of Romagna, Descriptio Romandiolae compiled by Cardinal Anglico, who for the first time gave the recipe of the bread of the people of Romagna; \"It is made with wheat flour moistened with water and flavoured with salt. It is then kneaded with milk as well, and also a little lard.\"", "-24.597857803688385" ], [ "to create a coarse bread. By the time the Romans invaded, Celtic skills with bread had progressed to the point that white or brown breads could be produced. The Roman invasion led to many Welsh people moving to the less hospitable uplands, where the only cereal crops which could be grown were oats, barley and rye. Oat and barley breads were the main breads eaten in Wales up until the 19th century, with rye bread created for medicinal purposes. Oats were used to bulk out meat or meat and vegetable stews, also known as pottage.\nThe Welsh also created a dish", "-24.58569845101738" ], [ "reasoning that these mounds were places for special occasions where people chose to spend long periods of time eating and communing together. Customs and equipment Hospitality was compulsory on all householders under Irish law and those entitled could sue on refusal. Much evidence for early Irish food exists in the law texts and poetry which were written down from the 7th and 8th century AD onwards. The arrival of Christianity also brought new influences from the Middle east and Roman culture.\nThe main meal was eaten in the afternoon or evening. A daytime meal was termed díthat. A meal at night,", "-24.554440120235085" ], [ "probably Canada's first Farmers' Cooperative. The Storehouse expedited the sale of farmer's wheat to Montreal, and provided them with cheaper consumer goods. Wheat and grains Upper Canada was in the unenviable position of having few exports with which to pay for all its imported manufactured needs. For the vast majority of those who settled in rural areas, debt could be paid off only through the sale of wheat and flour; yet, throughout much of the 1820s, the price of wheat went through periodic cycles of boom and bust depending upon the British markets that ultimately provided the credit upon which", "-24.54801111057168" ], [ "by then put the nation's economy into a state of collapse.\nThe primary government response to the drought and famine was the decision to uproot large numbers of peasants who lived in the affected areas in the north and to resettle them in the southern part of the country. In 1985 and 1986, about 600,000 people were moved, many forcibly, from their home villages and farms by the military and transported to various regions in the south. Many peasants fled rather than allow themselves to be resettled; many of those who were resettled sought later to return to their native regions. Several", "-24.541309802181786" ], [ "and Samaritan's Purse are also working in the area. Famine Famine has been an occasional but serious problem in West Africa.\nIn 1680s, famine extended across the entire Sahel, and in 1738 half the population of Timbuktu died of famine. Some colonial \"pacification\" efforts often caused severe famine. The introduction of cash crops such as cotton, and forcible measures to impel farmers to grow these crops, sometimes impoverished the peasantry in many areas, such as northern Nigeria, contributing to greater vulnerability to famine when severe drought struck in 1913.\nFor the middle part of the 20th century, agriculturalists, economists and geographers did", "-24.52723098284332" ], [ "Indians to supply them with enough food between the arrival of periodic supply ships from England, upon which they also relied. This period of extreme hardship for the colonists began in 1609 with a drought which caused their already limited farming activities to produce even fewer crops than usual. Then, there were problems with both of their other sources for food.\nAn unexpected delay occurred during the Virginia Company of London's Third Supply mission from England due to a major hurricane in the Atlantic Ocean. A large portion of the food and supplies had been aboard the new flagship of the", "-24.5232998522697" ], [ "eating unleavened barley bread for seven days when the winter's barley crop had reached maturity and was ready for harvest. Farmers observed this Festival with a trip to a local sanctuary (as in Exodus 23:17 and 34:23). Modern scholars believe that the absence of yeast in the bread indicated purity (as in Leviticus 2:11). The listing of Festivals in Exodus 23:14–17 and 34:18–23 appear to provide evidence for the independent existence of the Festival of Unleavened Bread. Modern scholars suggest that the farmers’ Festival of Unleavened Bread and the shepherds’ Passover later merged into a single festival, Passover moved from", "-24.451102961946162" ], [ "the length of the famine, and with suggestions that the government might introduce an \"able-bodied\" Poor Law, so formalising the cost of famine relief for landowners, a long-term solution was needed. It was cheaper for a landlord to pay the fare for a tenant to emigrate than have an open-ended commitment to provide food. Almost 11,000 people were provided with \"assisted passages\" by their landlords between 1846 and 1856, with the greatest number travelling in 1851. A further 5,000 emigrated to Australia, through the Highland and Island Emigration Society. To this should be added an unknown, but significant number, who", "-24.423865353805013" ], [ "reduce imports of animal feed grains. Although the wheat crop was subject to wide fluctuations because of variable weather conditions, it generally provided about one-fourth of Spain's total grain production, which exceeded the country's needs. Rice and oats constituted the rest of the national total. Some rice and wheat were exported with the help of subsidies, and analysts expected the surplus of wheat and the deficit of corn to continue into the 1990s.\nTo make up for the shortage of domestic feed grains, Spain became one of the world's largest importers of soybeans, and it developed a modern oilseed-crushing industry of", "-24.413699926976733" ], [ "up as the drought continued, and many men deserted the wives and families that they could not feed.\nSmall amounts of sweet potatoes and cassava planted by some farmers were available from May to September, but only in September 1949 did the government open food distribution centres. These sold maize at three pence a pound and allowed families to purchase 20 pounds for five shillings each week. Those people without cash, even women deserted by their husbands, had to work for food, as only small numbers of the very elderly and destitute were given minimal free rations. Initially, these centres issued", "-24.381382465944625" ], [ "of the crop, a process that began during and after World War II, when American occupying troops supplied the islands with imported foods and many pits were no longer maintained. Imported foods are often high in sugar, leading also to an increase in the need for dental care and diabetes.", "-24.3392233367922" ] ]
8wbppf
Why are user names not case sensitive?
[ "In situations where the username is used as a displayed name, case sensitive usernames would enable someone to attempt to impersonate someone else just by registering a new account with a different permutation of capital/lowercase letters. The same applies for web domains. For emails, case sensitive addresses would result in a lot of undelivered emails from someone forgetting which letters were capitalized or not. Etc. Also worth noting that some companies, like Wells Fargo, do not use case sensitive passwords as an added convenience to the user. For passwords, passwords are supposed to be arbitrary, are not stored in plain text or ever displayed, and allowing case sensitive passwords enables a massively wider range of possible passwords to discourage guessing.", "I'm probably going to get corrected on this, but there's nothing universal to either. You can have a password system that isn't case sensitive and you can have a username/email system that is. It's usually implemented this way because case sensitive passwords are substantially more secure.", "Its a design choice. You could make a system that allows casesensitive names. Other awnsers have discribed why that is not a good idea." ]
[ [ "file systems, filenames are not case sensitive (i.e., the names MYFILE and myfile refer to the same file); in others, filenames are case sensitive (i.e., the names MYFILE, MyFile, and myfile refer to three separate files).\nMost modern file systems allow filenames to contain a wide range of characters from the Unicode character set. However, they may have restrictions on the use of certain special characters, disallowing them within filenames; those characters might be used to indicate a device, device type, directory prefix, file path separator, or file type. Directories File systems typically have directories (also called folders) which allow the", "-28.000606792338658" ], [ "inaccessible.\nAnother common type of file identification is the filename. Implementing a file naming protocol is essential to maintaining consistency and efficient discovery and retrieval of objects in a collection, and is especially applicable during digitization of analog media. Using a file naming convention, such as the 8.3 filename or the Warez standard naming, will ensure compatibility with other systems and facilitate migration of data, and deciding between descriptive (containing descriptive words and numbers) and non-descriptive (often randomly generated numbers) file names is generally determined by the size and scope of a given collection. However, filenames are not good for semantic", "-27.372233679663623" ], [ "of bounds or an invalid pointer has been dereferenced when the invalid memory location referenced is a privileged location, such as one controlling device input/output. This is particularly more likely to occur in programming languages such as C, which use pointer arithmetic or do not check array bounds automatically. Nomenclature The names used in the Windows source code end in either \"Privilege\" or \"LogonRight\". This has led to some confusion about what the full set of all these \"Rights\" and \"Privileges\" should be called.\nMicrosoft currently uses the term \"User Rights\".\nIn the past some other terms have also been used by", "-27.24384093566914" ], [ "so. Second, the trademarked keywords are used\ninternally and hence are akin to private thoughts. Specifically, courts prior to Playboy v. Netscape (e.g., 1-800-CONTACTS v. WhenU Inc.) have deemed private thoughts to be outside the scope of the Lanham Act. Court's decision The Court concluded that Google's use of American Blind's trademarks was a use per the Lanham Act, for two reasons. First it was bound by the precedent set in Playboy v. Netscape, in which Netscape's practice of keying searches to trademarked terms was deemed a use of Playboy's marks. The court notes that although use was", "-27.22026611401816" ], [ "unique filenames allow dupecheck to work properly. There's a defined character set which can be used in naming of the folders. The selected character set is chosen to minimize problems due to the many platforms a release may encounter during its distribution. Since FTP servers, operating systems or file systems may not allow special characters in file or directory names, only a small set of characters is allowed. Substitutions are made where special characters would normally be used (e.g. ç replaced by c) or these characters are omitted, such as an apostrophe. This can happen automatically by site scripts. As", "-26.979380765085807" ], [ "because its system of records generally does not contain personal information and so is not indexed or queried by the names of individual persons. A PIA for the first version is also available from 2004.\nDHS is seeking approval for an Einstein 2 retention schedule in which flow records, alerts, and specific network traffic related to an alert may be maintained for up to three years, and if, for example in the case of a false alert, data is deemed unrelated or potentially collected in error, it can be deleted.\nAccording to the DHS privacy assessment for US-CERT's 24x7 Incident Handling and", "-26.64905792073114" ], [ "A, grave combining). Letter case preservation Some filesystems, such as FAT, store filenames as upper-case regardless of the letter case used to create them. For example, a file created with the name \"MyName.Txt\" or \"myname.txt\" would be stored with the filename \"MYNAME.TXT\". Any variation of upper and lower case can be used to refer to the same file. These kinds of file systems are called case-insensitive and are not case-preserving. Some filesystems prohibit the use of lower case letters in filenames altogether.\nSome file systems store filenames in the form that they were originally created; these are referred to as case-retentive", "-26.588056161075656" ], [ "easier for computers to process their names, they have to obey some rules. For example, the use of spaces is not allowed so 'Cash and Cash Equivalents' would be named 'CashAndCashEquivalents' . Additionally, big taxonomies such as IFRS obey specific rules of naming and labelling to ensure consistency within the schema. For example, there could be a list of words that are excluded from the names, e.g., :and:, \"of\" ..., or words that appear only in a particular order (i.e., 'Net' or 'Total' at the end of the label after a comma).\nIn the label linkbase, elements are connected to human readable", "-26.53405286029738" ], [ "or case-preserving. Such a file system can be case-sensitive or case-insensitive. If case-sensitive, then \"MyName.Txt\" and \"myname.txt\" may refer to two different files in the same directory, and each file must be referenced by the exact capitalization by which it is named. On a case-insensitive, case-preserving file system, on the other hand, only one of \"MyName.Txt\", \"myname.txt\" and \"Myname.TXT\" can be the name of a file in a given directory at a given time, and a file with one of these names can be referenced by any capitalization of the name.\nFrom its original inception, Unix and its derivative systems were", "-26.413314424979035" ], [ "Russia. Many ISPs offer customers vanity numbers. United Kingdom Until about 1966 UK phones used a different scheme than currently used for relating letter to number keys. While generally similar, the scheme did not include the letters \"O\" and \"Q\" on the \"6\" and \"7\" keys to avoid confusion between the digit \"0\" and the letters; the zero key was used for \"O\" and \"Q\". \"Z\" was not included, and no symbols were associated with the \"1\" key. In earlier times exchange names were used and spoken to the operator; with the introduction of dialling, exchange names were used starting", "-26.390935875853756" ], [ "X and Jane works for company Y, then it is not a problem for each of them to be employee #123. In this analogy, the ID number is the identifier, and the company serves as the namespace. It does not cause problems for the same identifier to identify a different person in each namespace.\nIn large computer programs or documents it is common to have hundreds or thousands of identifiers. Namespaces (or a similar technique, see Emulating namespaces) provide a mechanism for hiding local identifiers. They provide a means of grouping logically related identifiers into corresponding namespaces, thereby making the system", "-26.35952351812739" ], [ "values, each key can contain subkeys which in turn may contain subkeys, and so on.\nA Registry value consists of a name-data pair. Microsoft documentation commonly uses the term \"entry\" as an equivalent term. It also uses \"value\" for \"data\" when it is obvious what is meant. To avoid confusion, this article always uses the term \"entry\" when referring to the name-data pair.\nTwo Registry keys that are very commonly referred to are HKEY_LOCAL_MACHINE which contains per-machine settings, and HKEY_CURRENT_USER which contains settings for the currently logged-on user. These are almost always abbreviated as HKLM and HKCU respectively. There may be many", "-26.309585669398075" ], [ "by $Calc)PASSWORD (obsolete, removed, allowed changes to public files \n before true shared file access was available) File-name patterns Several MTS commands that use file names or lists of file names allow the use of file-name patterns: COPY, DESTROY, DUPLICATE, EMPTY, EDIT, FILESTATUS, FILEMENU, LIST, LOCKSTATUS, PERMIT, RENAME, RENUMBER, and TRUNCATE. A question-mark (?) is the pattern match character. A single question-mark used in a file-name will match zero or more characters. \"?\" matches all files for the current signon ID, \"?.S\" matches all files that end with \".S\",", "-26.175862246931047" ], [ "one's password does not clear it. It has been reported as occurring on both iPhone and iPod Touch devices as well as in iTunes. One can get this issue resolved by contacting iTunes Store support at www.apple.com/support/itunes. Multiple Apple IDs Users can use different Apple IDs for their store purchases and for their iCloud storage and other uses. This includes many MobileMe users who have always had difficulties as they were forced to use more than one Apple ID, because on signing-up to the MobileMe service a new Apple ID was automatically created using the me.com email address being", "-25.923103942826856" ], [ "= '' OR '1'='1' -- ';\nIf this code were to be used in an authentication procedure then this example could be used to force the selection of every data field (*) from all users rather than from one specific user name as the coder intended, because the evaluation of '1'='1' is always true.\nThe following value of \"userName\" in the statement below would cause the deletion of the \"users\" table as well as the selection of all data from the \"userinfo\" table (in essence revealing the information of every user), using an API that allows multiple statements:\na';DROP TABLE users; SELECT", "-25.871685769059695" ], [ "for filename extensions to not be displayed. Malicious users have tried to spread computer viruses and computer worms by using file names formed like LOVE-LETTER-FOR-YOU.TXT.vbs. The hope is that this will appear as LOVE-LETTER-FOR-YOU.TXT, a harmless text file, without alerting the user to the fact that it is a harmful computer program, in this case, written in VBScript. Default behavior for ReactOS is to display filename extensions in ReactOS Explorer.\nLater Windows versions (starting with Windows XP Service Pack 2 and Windows Server 2003) included customizable lists of filename extensions that should be considered \"dangerous\" in certain \"zones\" of", "-25.8497093294136" ], [ "Building 2, and was the 243rd package off the line in that shift, and was inspected by Inspector Number 45.\nArbitrary identifiers might lack metadata. For example, if a food package just says 100054678214, its ID may not tell anything except identity—no date, manufacturer name, production sequence rank, or inspector number. In some cases, arbitrary identifiers such as sequential serial numbers leak information (i.e. the German tank problem). Opaque identifiers—identifiers designed to avoid leaking even that small amount of information—include \"really opaque pointers\" and Version 4 UUIDs. In computer science In computer science, identifiers (IDs) are lexical tokens that name entities.", "-25.803511230755248" ], [ "et al.\nSoft 404s are problematic for automated methods of discovering whether a link is broken. Some search engines, like Yahoo and Google, use automated processes to detect soft 404s. Soft 404s can occur as a result of configuration errors when using certain HTTP server software, for example with the Apache software, when an Error Document 404 (specified in a .htaccess file) is specified as an absolute path (e.g. http://example.com/error.html) rather than a relative path (/error.html). This can also be done on purpose to force some browsers (like Internet Explorer) to display a customized 404 error message rather than replacing what", "-25.79401568407775" ], [ "to the same partition; however, for file and directory names, this is filesystem-dependent, and some filesystems allow case sensitivity as a flag upon formatting. An example of such a file system is Smart File System. This is very convenient when dealing with software ported over from the mostly case-sensitive Un*x world, but causes much confusion for native Amiga applications, which assume case insensitivity. Advanced users will hence typically only use the case sensitivity flag for file systems used for software originating from Un*x.\nNote also that re-casing of file, directory and volume names is allowed using ordinary methods; the commands \"rename", "-25.73930872225901" ], [ "engines in order to ensure that the public key that a user just downloaded can be seen by third party search engines. If the search engine returns hits referencing the fingerprint linked to the proper site(s), one can feel more confident that the key is not being injected by an attacker, such as a Man-in-the-middle attack.\nPGP developed the PGP word list to facilitate the exchange of public key fingerprints over voice channels. Public key fingerprints in practice In systems such as SSH, users can exchange and check fingerprints manually to perform key authentication. Once a user has accepted", "-25.715348897967488" ], [ "name on their government issued ID card. However, the username that shows on their homepage doesn’t have to be their real legal name. The Real Name Policy would assist the government in controlling speech and communication on the Internet, and would facilitate Internet censorship.\nAlthough the regulation was supposed to take effect on March 16, 2012, the policy was not implemented. Many weibo users complained about this policy, and Sina Weibo started to censor posts that contain the phrase \"real name registration\" or any related terms on its services from March 19, 2012.\nA \"Big V\" is a microblogger with a substantial", "-25.666691915984302" ], [ "from its table of users. However, if the \"userName\" variable is crafted in a specific way by a malicious user, the SQL statement may do more than the code author intended. For example, setting the \"userName\" variable as:\n' OR '1'='1\nor using comments to even block the rest of the query (there are three types of SQL comments). All three lines have a space at the end:\n' OR '1'='1' --\n' OR '1'='1' {\n' OR '1'='1' /* \nrenders one of the following SQL statements by the parent language:\nSELECT * FROM users WHERE name = '' OR '1'='1';\nSELECT * FROM users WHERE name", "-25.660185243556043" ], [ "called \"textonyms\"; also \"txtonyms\"; or \"T9onyms\" (pronounced \"tynonyms\"), though they are not specific to T9. Selecting the wrong textonym can occur with no misspelling or typo, if the wrong textonym is selected by default or user error. As mentioned above, the key sequence 4663 on a telephone keypad, provided with a linguistic database in English, will generally be disambiguated as the word good. However, the same key sequence also corresponds to other words, such as home, gone, hoof, hood and so on. For example, \"Are you home?\" could be rendered as \"Are you good?\" if the user neglects to", "-25.658678543099086" ], [ "you had sufficient legal justification) to re-link the IP address to the account holder, can their identity be \"reasonably ascertained\"? If such linking used to be expensive, slow and difficult, but becomes easier, does this change the answer at some point?\nIt appears that this definition is significantly broader than the Californian example given above, and thus that Australian privacy law, while in some respects weakly enforced, may cover a broader category of data and information than in some US law.\nIn particular, online behavioral advertising businesses based in the US but surreptitiously collecting information from people in other countries in the", "-25.653840365994256" ], [ "In Mac OS X, the names of aliases are no longer italicized, but the arrow badge remains. Additionally, an alias retains its dynamic reference to an object and does not have to be specified even when calling files on remote servers. History To execute an application or render a file in early graphical user interfaces, the user had to click on the representation of the actual file or executable in the location where the application or file was. The concept of disassociating the executable from the icon representing an instruction to perform a task associated with that file or executable", "-25.584832773718517" ], [ "a password NOT to contain any word in an online dictionary, or list of names, or any license plate pattern from any state (in the US) or country (as in the EU). If patterned choices are required, humans are likely to use them in predictable ways, such a capitalizing a letter, adding one or two numbers, and a special character. This predictability means that the increase in password strength is minor when compared to random passwords. Usability and implementation considerations Because national keyboard implementations vary, not all 94 ASCII printable characters can be used everywhere. This can present a problem", "-25.57819811741865" ], [ "names because they are frequently modified from the vendors' original format in order to associate some additional information meaningful to a particular processing pipeline, and this caused name format violations that resulted in a high number of rejected submissions. Without a clear schema for read names, their function remains that of an unique read id, conveying the same amount of information as a read serial number.\nAlso note that fastq-dump converts this FASTQ data from the original Solexa/Illumina encoding to the Sanger standard (see encodings below). This is because the SRA serves as a repository for NGS information, rather than format.", "-25.56018811656395" ], [ "which has the special name of @. This can't cause a name clash with an actual \"@\" tag, because @ is not allowed as a tag name in XML. This is a common pattern in SXML: anytime a tag is used to indicate a special status or something that is not possible in XML, a name is used that does not constitute a valid XML identifier.\nWe can also see that there's no need to \"escape\" otherwise meaningful characters like & and > as &amp; and &gt; entities. All string content is automatically escaped because it is considered to be pure", "-25.486682914677658" ], [ "from a controlled vocabulary), the resulting metadata can include homonyms (the same tags used with different meanings) and synonyms (multiple tags for the same concept), which may lead to inappropriate connections between items and inefficient searches for information about a subject. For example, the tag \"orange\" may refer to the fruit or the color, and items related to a version of the Linux kernel may be tagged \"Linux\", \"kernel\", \"Penguin\", \"software\", or a variety of other terms. Users can also choose tags that are different inflections of words (such as singular and plural), which can contribute to navigation difficulties if", "-25.454540463513695" ], [ "by the software author — it merely ensures that the software has not been modified by anyone other than the author. Sometimes, sandbox systems do not accept certificates, because of a false time-stamp or because of an excess usage of RAM. Implementations IBM's Lotus Notes has had PKI signing of code from Release 1, and both client and server software have execution control lists to control what levels of access to data, environment and file system are permitted for given users. Individual design elements, including active items such as scripts, actions and agents, are always signed using the editor's ID", "-25.400983193860156" ], [ "resolution protocol into XRDS documents that expose various services for accessing the digital identity they represent. These services, such as OpenID, OAuth, or XDI can expose any other type of data under the control of this identity. Privacy is protected because the identity owner controls access. For example, the registrant of =Mary.Jones would not receive spam from this i-name because it is not an email address. To resolve =Mary.Jones into an email address would first require Mary's permission, and such requests can be verified by i-brokers to make sure they are legitimate.\nIn addition to =names for people and @names for", "-25.371890420487034" ], [ "number allocation, this may not be the case (e.g. on FreeBSD 5 and up).\nAs with other special file types, the computer system accesses device nodes using standard system calls and treats them like regular computer files. Two standard types of device files exist; unfortunately their names are rather counter-intuitive for historical reasons, and explanations of the difference between the two are often incorrect as a result. Character devices Character special files or character devices provide unbuffered, direct access to the hardware device. They do not necessarily allow programs to read or write single characters at a time; that is up", "-25.338898224857985" ], [ "of the system, certainly from a security viewpoint. This is partly because users are more willing to tell another person (who may not be authorized) a shared password than one exclusively for their use. Single passwords are also much less convenient to change because many people need to be told at the same time, and they make removal of a particular user's access more difficult, as for instance on graduation or resignation. Separate logins are also often used for accountability, for example to know who changed a piece of data. Password reuse It is common practice amongst computer users", "-25.317381704458967" ], [ "using the word \"listserv\" to describe a different product or as a generic term for any email-based mailing list of that kind is a trademark misuse. The standard generic terms are electronic mailing list, elist, or email list for the list itself, and email list manager or email list software for the software product that manages the list. Nevertheless, the generic use of the term has been common at times. Security Through version 15.0, individual user passwords were stored in the clear, and available to users who are listed as Site Managers or \"Postmasters\" in the application configuration, thus", "-25.3107803594321" ], [ "an attempted man-in-the-middle attack. However, some applications allow the user to bypass the warning to proceed with the connection, with the user taking on the responsibility of trusting the certificate and, by extension, the connection.\nHowever it may be difficult — or even impossible, due to lack of a full list of all names in advance — to obtain a single certificate that covers all names a server will be responsible for. A server that is responsible for multiple hostnames is likely to need to present a different certificate for each name (or small group of names). Since 2005, CAcert has", "-25.268526280066" ], [ "practice of using numbers, obscure characters and capital letters and updating regularly. In a 2017 Wall Street Journal article, Burr reported he regrets these proposals and made a mistake when he recommended them.\nAccording to a 2017 rewrite of this NIST report, many websites have rules that actually have the opposite effect on the security of their users. This includes complex composition rules as well as forced password changes after certain periods of time. While these rules have long been widespread, they have also long been seen as annoying and ineffective by both users and cyber-security experts. The NIST recommends people", "-25.263499941341706" ], [ "Each user then digitally signs the information with their private key, so when the recipient verifies it against the users own public key, they can confirm that it is the user in question. Doing this will ensure that the information came from the specific user and has not been tampered with, and only the intended recipient can read the information (because only they know their private key). Contrast with typical PKI In contrast, a typical X.509 PKI permits each certificate to be signed only by a single party: a certificate authority (CA). The CA's certificate may itself be signed by", "-25.259985449141823" ], [ "or caps lock keys. In other words, it does not matter whether the key would have produced an upper-case or a lower-case letter. The interpretation of the control key with the space, graphics character, and digit keys (ASCII codes 32 to 63) vary between systems. Some will produce the same character code as if the control key were not held down. Other systems translate these keys into control characters when the control key is held down. The interpretation of the control key with non-ASCII (\"foreign\") keys also varies between systems.\nControl characters are often rendered into", "-25.239240916947892" ], [ "that correlate with personal information such as names or nicknames are more at risk than ones that are cryptic or anonymous, particularly on social and recreational sites. Password Strength A password is a mandatory security measure that accompanies usernames. The use of personal data to construct passwords i.e. family members’ names, pet’s names or birth dates increases the risk to confidential information and are easier to crack than long complicated passwords so password strength is a key strategy for protecting personal information. A password can be weak or strong:a weak password is cutekittens, a strong password is ?lACpAs56IKMs.\nAccording to Microsoft", "-25.23607896406611" ], [ "private use characters have a unique and immutable name by which they may be identified. This immutability has been guaranteed since Unicode version 2.0 by the Name Stability policy. In cases where the name is seriously defective and misleading, or has a serious typographical error, a formal alias may be defined, and applications are encouraged to use the formal alias in place of the official character name. For example, U+A015 ꀕ YI SYLLABLE WU has the formal alias YI SYLLABLE ITERATION MARK, and U+FE18 ︘ PRESENTATION FORM FOR VERTICAL RIGHT WHITE LENTICULAR BRAKCET (sic) has the formal alias PRESENTATION FORM", "-25.21186855470296" ], [ "right to do so, referring to the Freedom of Information Act §552(b)(7)(C) which exempts records if their disclosure might lead to “an unwarranted invasion of personal privacy”. AT&T filed a case in the U.S. Court of Appeals for the Third Circuit. On September 22, 2009, the Third Circuit released its decision favoring AT&T. The court agreed that the use of word “personal” derives from a word “person”, which legally includes corporations. Corporate Personhood The case revived the debates over the corporate personhood. The question whether corporations should be treated as persons has been presented to the Supreme Court", "-25.204651489882963" ], [ "it can become very difficult to tell what symbol refers to what actual object. If a name is changed, the code where it is used must carefully be examined.\nBy contrast, in an IP system, all definitions not only assign symbolic names, but also unique private identifiers to objects. This means that in the IP development environment, every reference to a variable or procedure is not just a name – it is a link to the original entity.\nThe major advantage of this is that if an entity is renamed, all of the references to it in the program remain valid (known as", "-25.19192522118101" ], [ "of this is that a file name that begins with the system name refers to files on other computers and can be opened without the need for any special networking. The same is true for devices. Other system entities, such as processes, are referenced using module names which are written %system#module. The VOS system and module names have no defined relationship with IP addresses or domain names—The VOS API was developed in late 1980—before the Internet was widely adopted and long before URLs were even invented.\nHistorically, StrataLINK was a proprietary 10Mb CSMA/CD ring network which allowed high performance", "-25.123952851543436" ], [ "(\"5\"), \"V\" (\"U\" or \"W\"), and \"Z\" (\"2\").\nThe code contains a check digit, simple errors such as a single mistyped letter, or the permutation of two successive letters does not lead to a wrong address but an error message. Moreover, neighbouring addresses get strongly different codes which shall prevent\nmistakes.\nThe sedamo address code describes the address, not a receiver (person or company). The only exception is the code AA-AA-AA-AA which directs to the address of the sedamo division of the Cross-Cultural Communication Club.\nTo mark sender's and receiver's address codes, a double arrow should be used: AA-AA-AA-AA >> CT-QP-ED-TP. For automation purposes,", "-25.107842592624365" ], [ "the English language, non-English words familiar to Americans, and first names and family names commonly found in the United States. It improves encoding for proper names in particular to a considerable extent. The author claims that in general it improves accuracy for all words from the approximately 89% of Double Metaphone to 98%. Developers can also now set switches in code to cause the algorithm to encode Metaphone keys 1) taking non-initial vowels into account, as well as 2) encoding voiced and unvoiced consonants differently. This allows the result set to be more closely focused if the developer finds that", "-25.10598095097521" ], [ "that the use of a single TLD like .xxx would also make it easier for search engines to block all of their content.\nCritics of the idea argue that because there is no requirement for providers of explicit content to use the TLD, sexually explicit material will still be commonplace in other domains, making it ineffectual at restricting access, and simply creating a new \"landrush\" as registrants of .com domains hosting explicit material attempt to duplicate their registrations in the .xxx domain, competing with operators who hope to register desirable names unavailable in other TLDs. There is also concern that the", "-25.101882642920827" ], [ "1990s, the two companies have maintained the list of assigned code page numbers independently from each other, resulting in some conflicting assignments. At least one third-party vendor (Oracle) also has its own different list of numeric assignments. IBM's current assignments are listed in their CCSID repository, while Microsoft's assignments are documented within the MSDN. Additionally, a list of the names and approximate IANA (Internet Assigned Numbers Authority) abbreviations for the installed code pages on any given Windows machine can be found in the Registry on that machine (this information is used by Microsoft programs such as Internet Explorer).\nMost well-known code", "-25.081308548571542" ], [ "names, be transferred or reassigned to another resource by their owners. For example, a company that changes its corporate name could sell its old i-name to another company, while both companies could retain their original i-numbers. What most differentiates i-names from domain names is that in practice they will have a synonymous (equivalent) persistent i-number (below). I-numbers I-numbers are machine readable identifiers (similar to IP addresses) that are assigned to a resource (for instance, a person, organization, application or file) and never reassigned. This means an i-number can always be used to address a network representation of the resource as", "-25.05528567073634" ], [ "usage is similar to multiword file names written for operating systems and applications that are confused by embedded space codes—such file names instead use an underscore (_) as a word separator, as_in_this_phrase.\nAnother such symbol was U+2422 ␢ BLANK SYMBOL. This was used in the early years of computer programming when writing on coding forms. Keypunch operators immediately recognized the symbol as an \"explicit space\". It was used in BCDIC, EBCDIC, and ASCII-1963.", "-25.038651637834846" ], [ "warranties as to quality and the licensor has rights to inspection and monitoring. Domain names The advent of the domain name system has led to attempts by trademark holders to enforce their rights over domain names that are similar or identical to their existing trademarks, particularly by seeking control over the domain names at issue. As with dilution protection, enforcing trademark rights over domain name owners involves protecting a trademark outside the obvious context of its consumer market, because domain names are global and not limited by goods or service.\nThis conflict is easily resolved when the domain name owner actually", "-25.027160204423126" ], [ "of the keywords, contacting the node with an ID closest to that keyword hash, and retrieving the list of filenames that contain the keyword. Since every filename in the list has its hash attached, the chosen file can then be obtained in the normal way.", "-24.998201762558892" ], [ "limitation exists to use any character in domain name labels which are representable by an octet, hostnames use a preferred format and character set. The characters allowed in labels are a subset of the ASCII character set, consisting of characters a through z, A through Z, digits 0 through 9, and hyphen. This rule is known as the LDH rule (letters, digits, hyphen). Domain names are interpreted in case-independent manner. Labels may not start or end with a hyphen. An additional rule requires that top-level domain names should not be all-numeric.\nThe limited set of ASCII characters permitted in the DNS", "-24.989589161741605" ], [ "using a pen register because it did not qualify as a \"search\".\nBoth the United States v. Miller and the Smith v. Maryland cases have been used to prevent users from the privacy protections offered under the Fourth Amendment from the records that internet service providers (ISPs) keep. This is also articulated in the Sixth Circuit Guest v. Leis case as well as the United States v. Kennedy case where the courts ruled that Fourth Amendment protections did not apply to ISP customer data since they willingly provided ISPs with their information just by using the services of ISPs. Similarly, the", "-24.984777086057875" ], [ "used for these purposes with a spelling variation that did not change the generic significance for the buyer, such as “MATTRES.”\nThe court then noted that a second comer may be enjoined from passing itself off as the first user and may be required to take steps to distinguish itself from the first user.\nGetting to the crux of the matter, the court stated that telephone numbers may be protected as trademarks, and a competitor's use of a confusingly similar telephone number may be enjoined as both trademark infringement and unfair competition, especially when companies doing significant business through telephone orders frequently", "-24.949892772943713" ], [ "number of users, after all users have been issued with keys the third party's secret can be destroyed. This can take place because this system assumes that, once issued, keys are always valid (as this basic system lacks a method of key revocation). The majority of derivatives of this system which have key revocation lose this advantage.\nMoreover, as public keys are derived from identifiers, IBE eliminates the need for a public key distribution infrastructure. The authenticity of the public keys is guaranteed implicitly as long as the transport of the private keys to the corresponding user is kept secure", "-24.938315790059278" ], [ "text mentions, but does not mandate, the possibility of simply using the ASCII encoded value of a character string: \"Finally, the key argument is a secret encryption key, which can be a user-chosen password of up to 56 bytes (including a terminating zero byte when the key is an ASCII string).\"\nNote that the quote above mentions passwords \"up to 56 bytes\" even though the algorithm itself makes use of a 72 byte initial value. Although Provos and Mazières do not state the reason for the shorter restriction, they may have been motivated by the following statement from Bruce Schneier's original", "-24.912669667915907" ], [ "positives (legitimate users getting banned), and some false negatives (undesirables getting through, and legitimate users managing to come up with a DEA pattern getting around limitations imposed by site administrators). This is because the email address may be partly or fully defined by the user, made to appear as \"permanent\"-looking as needed, or made to avoid a particular pattern, defeating any filtering because for all intents and purposes it is not different from a permanent one, despite being limited to one purpose.\nCaught in the crossfire between Internet undesirables and administrative and user attempts to deal with them, DEA providers have", "-24.91061878798064" ], [ "name in the address bar is the correct place to send the password. For example, for Google's single sign-on system (used on e.g. youtube.com), the user should always check that the address bar says \"https://accounts.google.com\" before inputting their password.\nAn un-compromised browser guarantees that the address bar is correct. This guarantee is one reason why browsers will generally display a warning when entering fullscreen mode, on top of where the address bar would normally be, so that a fullscreen website cannot make a fake browser user interface with a fake address bar. Hardware browser There have been attempts to market hardware-based", "-24.893433994206134" ], [ "allowing unethical managers, or attackers who compromise the site, to easily try to reuse the username and password on other sites. Passwords are hashed to protect against this since version 15.5, which was released in 2007. Editions LISTSERV is available in several licensing options: LISTSERV Lite Free Edition for non-commercial hobby use; LISTSERV Lite for smaller workloads; LISTSERV, the standard, full-featured version; LISTSERV HPO (High Performance Option); and LISTSERV Maestro (for customized and targeted email publishing and reporting). Supported operating systems A list of currently-supported operating systems can be found at http://lsoft.com/products/listserv_os.asp", "-24.884158176428173" ], [ "characters, which are rarely used today; for 8-bit content, the character code 255, commonly defined as a nonbreaking space character, can be used instead of DEL.\nMany file systems do not allow control characters in the filenames, as they may have reserved functions.", "-24.87233259784989" ], [ "Filename References: absolute vs relative An absolute reference includes all directory levels. In some systems, a filename reference that does not include the complete directory path defaults to the current working directory. This is a relative reference. One advantage of using a relative reference in program configuration files or scripts is that different instances of the script or program can use different files.\nThis makes an absolute or relative path composed of a sequence of filenames. Number of names per file Unix-like file systems allow a file to have more than one name; in traditional Unix-style file systems, the names are", "-24.869532260097913" ], [ "names are often passed as command-line parameters, sent via sockets, and stored on disk. These references are not capabilities, and must be validated before they can be used. In these systems, a central question is \"on whose authority is a given reference to be evaluated?\" This becomes a critical issue especially for processes which must act on behalf of two different authority-bearing entities. They become susceptible to a programming error known as the confused deputy problem, very frequently resulting in a security hole.\nIn a capability-based system, the capabilities themselves are passed between processes and storage using a mechanism that is", "-24.85147003021848" ], [ "number. This process reduces the number in complexity, and the additional information removed by this process is used to verify the authenticity of the serial number. If the user mistypes a single character in what is sometimes a very long code, the software will refuse to install and require the number to be retyped until it is correct.\nThis activation code is generated during the packaging phase of manufacture, so that every user is receiving the same software but a different activation code. If a user performs a \"casual copy\" of the software for a friend, that friend", "-24.850141809904017" ], [ "values passed in), but by default, the aliases are constant so they cannot be modified. They may be declared explicitly as read-write aliases for the original value or as copies using the is rw or is copy directives should the programmer require them to be modified locally. Blocks and closures Parameters can also be passed to arbitrary blocks, which act as closures. This is how, for example, for and while loop iterators are named. In the following example, a list is traversed, 3 elements at a time, and passed to the loop's block as the variables, $a, $b, $c.\n for", "-24.843617167090997" ], [ "between the two is somewhat unclear; warranties are viewed as primarily contract-based legal action while negligent or fraudulent misrepresentations are tort-based, but there is a confusing mix of case law in the United States. In modern English law, sellers often avoid using the term 'represents' in order to avoid claims under the Misrepresentation Act 1967 (although English law will look to the substance rather than the form of the representation to decide what it is), while in America 'warrants and represents' is relatively common. Some modern commentators suggest avoiding the words and substituting 'state' or 'agree', and some model forms", "-24.823983798036352" ], [ "Keysigning Keysigning refers to digitally signing someone else's public key using your own. A more correct term would be certificate signing, since the actual key material is not changed by the process of signing. However, in the PGP community it is customary not to distinguish in speaking between someone's key and certificate, and the term keysigning is used. (The term PGP refers here to all implementations of the OpenPGP standard, such as GnuPG.)\nUsers of PGP sign one another's keys to indicate to any third party that the signer trusts the signee. This enables someone who trusts the signer to extend", "-24.818670791137265" ], [ "rate and 77% precision rate. This is likely explained because of the use of complex legal terms by the legal professionals. Manual classification In order to overcome the limits of basic boolean searches, information systems have attempted to classify case laws and statutes into more computer friendly structures. Usually, this results in the creation of an ontology to classify the texts, based on the way a legal professional might think about them. These attempt to link texts on the basis of their type, their value, and/or their topic areas. Most major legal search providers now implement some sort of classification", "-24.735389725654386" ], [ "so that what is called the \"key ID\" is equal to the lower 32 or 64 bits respectively of a key fingerprint. PGP uses key IDs to refer to public keys for a variety of purposes. These are not, properly speaking, fingerprints, since their short length prevents them from being able to securely authenticate a public key. 32bit key ids should not be used as current hardware can generate 32bit key id in just 4 seconds. Security of public key fingerprints The primary threat to the security of a fingerprint is a preimage attack, where an attacker constructs a", "-24.733119373209774" ], [ "cryptographically so that any tampering (or accidental garble) is readily detectable. However, merely making a certificate which is impossible to modify without being detected is insufficient; this can prevent corruption only after the certificate has been created, not before. Users must also ensure by some means that the public key in a certificate actually does belong to the person or entity claiming it. A given public key (or more specifically, information binding a user name to a key) may be digitally signed by a third party user to attest to the association between someone (actually a user name) and the", "-24.7272569584311" ], [ "OSTypes. Microsoft and Windows developers refer to their four-byte identifiers as FourCCs or Four-Character Codes. FourCC codes were also adopted by Microsoft to identify data formats used in DirectX, specifically within DirectShow and DirectX Graphics. Common uses One of the most well-known uses of FourCCs is to identify the video codec or video coding format in AVI files. Common identifiers include DIVX, XVID, and H264. For audio coding formats, AVI and WAV files use a two-byte identifier, usually written in hexadecimal (such as 0055 for MP3). In QuickTime files, these two-byte identifiers are prefixed with the letters \"ms\" to form", "-24.718124547420302" ], [ "known names. Lately, LOP variants have been using random English words strung together in a phrase as their executable names and have been placing these executables in the user's application data directory. For example, there are LOP variants which call their file \"meal dog house bone.exe\".", "-24.71763976210059" ], [ "names that hash to the same offset. For example: file_1a, file_24 and file_5u have the same hash value.\nFilename characters can be lowercase and uppercase, but are not case sensitive when accessed. That is to say, \"MyFile\" and \"myfile\" in the same directory refer to the same file.\nFiles are composed of a file header block, which contains information about the file (size, last access time, data block pointers, etc.), and the data blocks, which contain the actual data. The file header block contains up to BSIZE/4-56 data block pointers (which amounts to 72 entries with the usual 512 byte blocks). If", "-24.71067864773795" ], [ "Bad command or file name \"Bad command or file name\" is a common and confusing error message in MS-DOS and some other operating systems.\nCOMMAND.COM, the primary user interface of MS-DOS, produces this error message when the first word of a command could not be interpreted. For MS-DOS, this word must be the name of an internal command, executable file or batch file, so the error message provided an accurate description of the problem but easily confused novices. Though the source of the error was often a mistyped command, the wording gave the impression that files named in later words were", "-24.69001738159568" ], [ "question, such as by providing the relevant identifier, is not. In practice however providing such identifiers can be challenging, such as in the case of Apple's Siri, where voice and transcript data is stored with a personal identifier which the manufacturer restricts access to, or in online behavioural targeting, which relies heavily on device fingerprints that can be challenging to capture, send and verify.\nBoth data being 'provided' by the data subject and data being 'observed', such as about behaviour, are included. In addition, the data must be provided by the controller in a structured and commonly used standard electronic format.", "-24.67973465193063" ], [ "Normal usage is identical to Unix-like operating systems:\n rmdir name_of_directory\nThe equivalent command in MS-DOS and earlier (non-NT-based) versions of Microsoft Windows for deleting non-empty directories is deltree.\nIn later version of Windows:\n rd /s directory_name\nWindows based on the NT kernel (XP, Vista, 7, 8, Server 2003/2008) are case insensitive, just like their earlier predecessors, unless two files of the same name and different case exist. Then case sensitivity applies when selecting which file to use, or if the case does not match either file, one may be chosen by Windows.\nHaving two files named the same with different case sensitivity is", "-24.67070277768653" ], [ "This is because the local user's password hashes, stored in the SAM file, are encrypted with the Syskey, and the Syskey value is not available to an offline attacker who does not possess the Syskey passphrase/floppy. Accessing private key via password reset In Windows 2000, the user's RSA private key is not only stored in a truly encrypted form, but there is also a backup of the user's RSA private key that is more weakly protected. If an attacker gains physical access to the Windows 2000 computer and resets a local user account's password, the attacker can log in as", "-24.657180051981413" ], [ "sensibly. This problem can also be easily avoided by the use of \"designated revokers\", which were introduced in the early 1990s. A key owner may designate a third party that has permission to revoke the key owner's key (in case the key owner loses their own private key and thus loses the ability to revoke their own public key).\nA non-technical, social difficulty with a Web of Trust like the one built into PGP/OpenPGP type systems is that every web of trust without a central controller (e.g., a CA) depends on other users for trust. Those with new certificates", "-24.652009112331143" ], [ "did not register the domain names in bad faith because it had used a proprietary software tool that, through both manual and automatic means, \"scrubbed\" its registered domains for registered trademarks. It claimed that it was merely \"reserving\" the domain names by taking advantage of Basic Fusion's Add Grace Period. Basic Fusion attempted to argue that it was not the same legal entity as Navigation Catalyst Systems, but the court stated that they were the same for the purposes of a preliminary injunction motion. \nNavigation further asserted an unclean hands defense, arguing that Verizon used a similar", "-24.646740958094597" ], [ "an ideal password should be at least 14 characters in length and have letters, punctuation, symbols, and numbers, where complexity is added by the inclusion of uppercase letters. Managing Personal Information Using Privacy Options Social networking sites offer greater security risks to personal electronic information because sensitive, private or confidential information such as personal identifiers are routinely used to create public profiles. Many websites give options to suppress the amount of personal information revealed through the customisation of privacy settings. However privacy settings can reset if changes to the website occur.", "-24.64433072792599" ], [ "to store actual foreign values along with the model's data. For example, each blog comment might include the username in addition to a user id, thus providing easy access to the username without requiring another lookup. When a username changes however, this will now need to be changed in many places in the database. Thus this approach works better when reads are much more common than writes. Nesting data With document databases like MongoDB it is common to put more data in a smaller number of collections. For example, in a blogging application, one might choose to store comments within", "-24.63632943300763" ], [ "their cell phone (e.g. to obtain a PIN), there is a limited opportunity to use a duress code. Because conversations are often being monitored by a captor, they must be subtle and short. Ideally, the use of a duress code has been confirmed before the current situation, so the family member or friend has verifiable evidence that something is wrong, and when the authorities are notified aren't just limited to speculation. Examples would include asking about someone (or something) who does not exist. For example, a person might use \"What is Cindy barking at?\" if she knows that either the", "-24.633941333624534" ], [ "of passwords points to an approximate even split between linguistic and numeric passwords with about a quarter using mix of linguistic/numeric information. Names (proper, nicknames) are the most common information used for passwords, with dates second.\nResearch is also being done on the effect of policies that force users to create more secure and effective passwords. The results of this study show that a password composition policy reduces the similarity of passwords to dictionary words. However, such policy did not reduce the use of meaningful information in passwords such as names and birth dates, nor did it reduce password recycling. Memorization", "-24.626958151260624" ], [ "number zero) if the peer name is \"unsecured\". The qualifier is a string, allowing an authority to have different peer names for different services.\nIf a peer name is secure, the PNRP name records are signed by the publishing authority, and can be verified using its public key. Unsecured peer names can be published by anybody, without possible verification. Multiple entities can publish the same peer name. For example, if a peer name is associated with a group, any group member can publish addresses for the peer name. Peer names are published and resolved within a specified scope. The scope can", "-24.618420199898537" ], [ "the correct private key can update the URL or take it down. Control over online tracking Anonymous P2P also has value in normal daily communication. When communication is anonymous, the decision to reveal the identities of the communicating parties is left up to the parties involved and is not available to a third party. Often there is no need or desire by the communicating parties to reveal their identities. As a matter of personal freedom, many people do not want processes in place by default which supply unnecessary data. In some cases, such data could be compiled into histories of", "-24.604272809148824" ], [ "its users to choose usernames \"based on [their] real name or initials\", and users that have usernames deemed \"frivolous\" by the admins are blocked; one of the site's criticisms of Wikipedia is \"silly administrator names\", which is claimed to reflect Wikipedia's \"substantial anti-intellectual element\". Because of Schlafly's claim that Wikipedia's allowance of both Common Era and Anno Domini notation is anti-Christian bias, the commandments disallow use of Common Era notation as well. Conflict with scientific views Various Conservapedia articles contradict established fields of science. On March 19, 2007, the British free newspaper Metro ran the article \"Weird, wild wiki on", "-24.603499529504916" ], [ "clear that the ID is false; either the number on the ID is not registered for the holder, or no ID has the number at all. Online verification also has the advantage that it allows easy revocation of lost or stolen documents.\nMany modern credentials now contain some kind of barcode. For example, many U.S. driving licences include a 2-dimensional code in PDF417 format, which contains the same information as on the front of the license. Barcodes allow rapid checking of credentials for low-security applications, and may potentially contain extra information which can be used to verify other information on the", "-24.546536852954887" ], [ "Smith v. Maryland Background In Katz v. United States (1967), the United States Supreme Court established its \"reasonable expectation of privacy\" test. It overturned Olmstead v. United States and held that a bugging was a constitutionally-protected search, because there was a reasonable expectation that the communication would be private. The government was then required to get a warrant to execute a search using a bug.\nIn Smith v. Maryland, the Supreme Court held that a pen register is not a search because the \"petitioner voluntarily conveyed numerical information to the telephone company.\" Since the defendant had disclosed the dialed numbers to", "-24.537011661333963" ], [ "the expression \"closed captions\" the word \"caption\" has in recent years come to mean a subtitle intended for the deaf or hard of hearing, be it \"open\" or \"closed\". In British English \"subtitles\" usually refers to subtitles for the deaf or hard of hearing (SDH); however, the term \"SDH\" is sometimes used when there is a need to make a distinction between the two. Real time Programs such as news bulletins, current affairs programs, sport, some talk shows and political and special events utilize real time or online captioning. Live captioning is increasingly common, especially in the United Kingdom", "-24.536554814199917" ], [ "considered high in warranting value. They are more likely to be accepted as truth. An example of this is information added to your profile by others because the owner cannot easily change it (Others-generated warrants). Partial warranting is another example. It is information that, though provided by the user, contains easily verifiable facts. The numerical information, such as height, weight, age, or address constitutes as partial warranting, as these figures are easily checked and provide little room for gray area. Low warrant information is easily manipulated and therefore less believable. It is much more questionable in terms of accuracy (Walther", "-24.530695107008796" ], [ "Uniqueness Within a single directory, filenames must be unique. Since the filename syntax also applies for directories, it is not possible to create a file and directory entries with the same name in a single directory. Multiple files in different directories may have the same name.\nUniqueness approach may differ both on the case sensitivity and on the Unicode normalization form such as NFC, NFD.\nThis means two separate files might be created with the same text filename and a different byte implementation of the filename, such as L\"\\x00C0.txt\" (UTF-16, NFC) (Latin capital A with grave) and L\"\\x0041\\x0300.txt\" (UTF-16, NFD) (Latin capital", "-24.502793600782752" ], [ "pronounced as individual letters, the worldwide use of the program led to the more common single-word pronunciation, sounding like the English word nod. Additionally, the \"32\" portion of the name is an anachronism with the release of a 64-bit version in the Windows 7 era. The company reached its 10000th update to virus definitions on June 25, 2014. Mail Security for Microsoft Exchange Server On March 10, 2010 ESET released ESET Mail Security for Microsoft Exchange Server, which contains both antimalware and antispam modules. It supports Microsoft Exchange 5.5, 2000, 2003, 2007 and 2010. Mobile Security ESET Mobile Security", "-24.477268848990207" ], [ "mere list of names: the profile not only held contact information that was not readily available to the public but also served as a means to notify and promote directly to the DJs. As a result, the court held that because the MySpace profile had been properly password protected to a select few of Christou's personnel, took great cost to develop, and provided a means of contact instead of just a simple customer list of names, the profile could be held as a trade secret.\nMoreover, because Roulier was aware of the password protection of the profile and did not reconstruct", "-24.46723848185502" ], [ "not named until they've done something outstanding, unusual, or stupid enough to warrant a name. In other chapters the process is more mechanical and hashers are named after completing a certain number of events (5–10 being the most common).\nSome chapters focus on \"family-friendly\" names (for example: Lost My Way); others focus on names filled with innuendo (for example: Purple Vein); and some go out of their way to make the name as bawdy, offensive, or politically incorrect as possible.\nThose hashers who have not been named are generally referred to as \"Just (Name)\", \"No Name (Name)\" (e.g., \"No Name John\") or", "-24.44682499220653" ], [ "Because a Trusted Computing equipped computer is able to uniquely attest to its own identity, it will be possible for vendors and others who possess the ability to use the attestation feature to zero in on the identity of the user of TC-enabled software with a high degree of certainty.\nSuch a capability is contingent on the reasonable chance that the user at some time provides user-identifying information, whether voluntarily, indirectly, or simply through inference of many seemingly benign pieces of data. (e.g. search records, as shown through simple study of the AOL search records leak). One common way that information", "-24.445283425418893" ], [ "are not locators and are not necessarily resolvable within the bounds of the systems where they are found. These URIs may serve as names or identifiers of resources. Since resources can move, opaque identifiers which are not locators and are not bound to particular locations are arguably more likely than identifiers which are locators to remain unique and persistent over time. But whether a URI is resolvable depends on many operational and practical details, irrespective of whether it is called a \"name\" or a \"locator\". In the contemporary view, there is no bright line between \"names\" and", "-24.39744743995834" ], [ "also links to partner companies.\nAccording to the standard form contract, users are responsible for information, data, texts, images, and links to other websites posted on the communication platform. Grounded accusations against a user or breaches of the agreement lead to the expulsion of the user from the platform or limiting of his or her participation. Protection of Privacy The users themselves determine their name, birthday, contacts, and address, and can choose who may see this information: everyone, registered users, only their contacts, or nobody. The username (first name and nickname) is for everyone, contacts or nobody visible. Each user is", "-24.391887008969206" ], [ "files on the computer system have been previously identified as known to be good and therefore do not need to be examined.\nWhere those values match known to be bad files, the examiner can say with substantial certainty that the corresponding files on the system being examined that the files are bad and therefore require further scrutiny. A hash match on known to be bad files does not relieve the examiner of the responsibility of verifying that the file or files are, in fact, of a criminal nature. History Created by the National Drug Intelligence Center (NDIC)—a component of the United", "-24.385521378295948" ], [ "middle initial, last name\" (Western order) or the reverse (Eastern order) fail for common family names like Li (李), Smith or Garcia. Workarounds include adding a digit to the end of the username. Alternatives include creating a separate ID system of unique employee/student id numbers to use as account names in place of actual user's names, and allowing users to nominate their preferred word sequence within an acceptable use policy.\nBecause duplicate usernames cannot exist within a domain, account name generation poses a significant challenge for large organizations that cannot be easily subdivided into separate domains, such as students in a", "-24.36837316531455" ], [ "(or semantics) such as relationships and attributes, they constitute an ontology.\nMetadata tags as described in this article should not be confused with the use of the word \"tag\" in some software to refer to an automatically generated cross-reference; examples of the latter are tags tables in Emacs and smart tags in Microsoft Office. History The use of keywords as part of an identification and classification system long predates computers. Paper data storage devices, notably edge-notched cards, that permitted classification and sorting by multiple criteria were already in use prior to the twentieth century, and faceted classification has been used by", "-24.36431991106656" ], [ "treats them differently when processing the character string as an identifier. Thus, the user's assumption of a one-to-one correspondence between the visual appearance of a name and the named entity breaks down.\nInternationalized domain names provide a backward-compatible way for domain names to use the full Unicode character set, and this standard is already widely supported. However this system expanded the character repertoire from a few dozen characters in a single alphabet to many thousands of characters in many scripts; this greatly increased the scope for homograph attacks.\nThis opens a rich vein of opportunities for phishing and other varieties of fraud.", "-24.360098963952623" ] ]
1arhed
Why is there any controversy involving drones?
[ "The controversy over the drones is not really about the drones themselves. The controversy is that Obama used a drone to kill a US citizen. US citizens should be provided due process (a trial, the opportunity to offer a defense, etc.). This drone strike violates that principle, even in the most narrow readings of the law.", "It comes down to questions of whether they are, or will be, used ethically. Military drones are often used in counter-insurgency/counter-terror operations, where the enemy is out of uniform and surrounded by non-combatants. People claim that drones have injured or killed civilians during these missions. Collateral damage is always bad press, not to mention that these are essentially assassination missions. Domestic use of drones for surveillance and pursuit is controversial as well, which seems to be mostly based on a lack of trust in police using them ethically. There is also the possibility of using them to expose and persecute people for \"morality\" crimes, such as homosexuality or failure to uphold religious mandates. tldr; People are pissed about drones because they don't trust the people using them.", "A few other things that haven't been mentioned: 1. Surveillance. Unweaponized drones can engage in espionage, and that's difficult territory to work out (especially in the framework of Geneva). 2. Some guy can drop his kids off at school, drive to work, press a button that kills a person on the other side of the world, and come home for dinner. It skews the psychological balance of warfare to an arguably unfair degree. 3. [Double tapping]( URL_0 ) and other tactics that are at best legally and ethically questionable.", "Because in general international law and human custom goes like this 1) Killing people you're at war with is okay 2) killing people you're not at war with is not okay 3) sending your army into someone else's country is an act of war 4) using a neutral third party as a battlefield in a war your fighting with somebody else is very much not okay So, are we at war or not, and who with? We declared war on Afghanistan and Iraq, so nobody much minds if we try and kill people there. We also say we're in a \"war on terror.\" What the fuck that means, nobody really knows. You can't be at war with an idea. You can be at war with a defined group of people, and Congress also passed a bill after September 11th saying that the president could take any steps necessary to kill or capture the people behind the September 11th attack, or in other words, Al Qaeda. We have, for the most part. Is Congress' declaration still good to let us go around killing whoever the fuck we want as long as somebody, somewhere, is still using the name \"Al Qaeda\"? Nobody knows. If you take the view that it is not --- that is, the view that has held for pretty much all of civilization, which is that just going around and killing anyone who might pose a threat to you someday is fucked up and should be illegal --- then drone attacks are a problem. As a general rule, crossing other country's borders with your military and killing people is regarded as an act of war. The reason we're getting away with it is that we have this vague \"war on terror\" fig leaf and also we're the richest country in the world and have the biggest military, so no matter how much other countries don't like it, there's really very little they can do to stop it. 2, terrorists aren't the only casualties of drone attacks. Civilians are often killed. Sure, you might argue that they're often somehow connected to the terrorist --- their wives and children and cousins, people sheltering them. Sometimes though, it's just someone who was in the wrong place at the wrong time, or the intelligence was wrong in the first place. If we're at war, then this is maybe legal. If we're not, this is murder.", "The issue isn't necessarily drones themselves, but extra-judicial killings without oversight or even disclosing the legal framework behind the killings. Flying killer robots just puts a face on the issue." ]
[ [ "official from the police department stated that the drones would only be used in limited cases such as hostage situations and that they would not be used to spy on law-abiding citizens. However, this did not stop criticism from the American Civil Liberties Union, which questioned whether the marginal benefits of the drones justified their serious threat to privacy. On October 31, 2014, Los Angeles City Council instructed Los Angeles Police Department to create a drone policy in order to move forth with using their Draganflyer X6.\nIn February 2014, the Federal Aviation Administration allowed the Grand Forks, North Dakota police", "-29.26606610379531" ], [ "argued that it greatly reduces the likelihood. Although drones enable advance tactical surveillance and up-to-the-minute data, flaws can become apparent. The U.S. drone program in Pakistan has killed several dozen civilians accidentally. An example is the operation in 2010 Feb near Khod, in Uruzgan Province, Afghanistan. Over ten civilians in a three-vehicle convoy travelling from Daykundi Province were accidentally killed after a drone crew misidentified the civilians as hostile threats. A force of Bell OH-58 Kiowa helicopters, who were attempting to protect ground troops fighting several kilometers away, fired AGM-114 Hellfire missiles at the vehicles.\nIn 2009, the Brookings Institution reported", "-27.925753247247485" ], [ "of aerial drones operating in Afghanistan, Iraq, Syria, Pakistan and elsewhere urging them to refuse to fly and indicated that their missions \"profoundly violate domestic and international laws.\" They noted that these drone attacks also undermine principles of human rights.\nSome leaders worry about the effect drone warfare will have on soldiers' psychology. Keith Shurtleff, an army chaplain at Fort Jackson, South Carolina, worries \"that as war becomes safer and easier, as soldiers are removed from the horrors of war and see the enemy not as humans but as blips on a screen, there is very real danger of losing the", "-27.922716256172862" ], [ "safest way to protect themselves from drones is to form a neighborhood watch program with drones of their own. Kyle confronts Cartman and Kenny about their use of the drone to spy, but Cartman accuses Kyle of spying in the bathroom. Stephen attempts to return his drone to the hobby store, telling the clerk that he believes the drone was flying itself, being unable to accept the possibility that his son used the drone without supervision.\nThomas and Laura go to the police to demand that all drones be made illegal. Cartman tells Butters that no one's private parts are safe", "-27.399415614141617" ], [ "drone strikes is that they result in excessive collateral damage. David Kilcullen and Andrew Exum wrote in the New York Times that drone strikes \"have killed about 14 terrorist leaders\". It has also killed an unknown number of militants. But, according to Pakistani sources, they have also killed some 700 civilians. Grégoire Chamayou's analysis, of one three hour long surveillance and attack operation on a convoy of three SUVs that killed civilians in Afghanistan in February 2010, shows a typical, if notorious, case. Throughout the operation there is a sense of the drone controllers’ desperation to destroy the people", "-26.9546247725375" ], [ "Rogers stated in an interview to A&T \"There is a big debate out there at the moment about what the best way is to counter these small UAVs, whether they are used by hobbyists causing a bit of a nuisance or in a more sinister manner by a terrorist actor.”\nBy 2017, drones were being used to drop contraband into prisons. Drones caused significant disruption at Gatwick Airport during December 2018, needing the deployment of the British Army. Counter unmanned air system The malicious use of UAVs has led to the development of counter unmanned air system (C-UAS) technologies such as", "-26.877557145060564" ], [ "to confirm that the strike was executed properly.\nOne of the leading critics of drones in the US Congress is Senator Rand Paul. In 2013, he performed a thirteen-hour filibuster to try to achieve a public admission from U.S. President Obama that he could not kill an American citizen with a drone on American soil, who was not actively engaged in combat. Attorney General Eric Holder responded soon after, confirming that the president had no authority to use drones for this purpose.\nEric M. Blanchard, assistant professor of Political Science at Columbia University, notes that, \"the use of drones reflects several on-going", "-26.80953942227643" ], [ "avoid.\" Though Byman recognizes the problems inherent in using armed UAVs, he believes that they are very effective. \"U.S. drones have killed an estimated 3,000 al Qaeda, Taliban, and other jihadist operatives in Pakistan and Yemen. That number includes over 50 senior leaders of al Qaeda and the Taliban--top figures who are not easily replaced.\" Drones have also undercut terrorists' ability to effectively communicate with its target audiences, ultimately straining their recruitment pools. To avoid attracting drones, al Qaeda operates have avoided gathering in large numbers and mitigated use of electronic devices. Byman argues that al Qaeda leaders \"cannot give", "-26.522322816010274" ], [ "albeit by a smaller margin. A 2015 poll showed Republicans and men are more likely to support U.S. drone strikes, while Democrats and Independents, women, young people, and minorities are less supportive.\nOutside America there is widespread opposition to US drone killings. A July 2014 report found a majority or plurality of respondents in 39 of 44 countries surveyed opposed U.S. drone strikes in countries such as Pakistan, Yemen, and Somalia. The U.S., Kenya, and Israel were the only countries where at least half the public supported drone strikes. Venezuela was found to be the most anti-drone country, where 92% of", "-26.213649718121815" ], [ "Drone strikes in Pakistan Overview Pakistan's government publicly condemns these attacks. However, it also allegedly allowed the drones to operate from Shamsi Airfield in Pakistan until 21 April 2011. According to secret diplomatic cables leaked by WikiLeaks, Pakistan's Army Chief Ashfaq Parvez Kayani not only tacitly agreed to the drone flights, but in 2008 requested that Americans increase them. However, Pakistan's Interior Minister Rehman Malik said, \"drone missiles cause collateral damage. A few militants are killed, but the majority of victims are innocent citizens.\" The strikes are often linked to anti-American sentiment in Pakistan and the growing questionability of the", "-26.15705944749061" ], [ "advocacy-driven research.\" Shah's study found that there was \"little or no evidence [in the data] that drone strikes have a significant impact on militant Islamist recruitment either locally or nationally. Rather, the data reveals the importance of factors such as political and economic grievances, the Pakistani state's selective counterterrorism policies, its indiscriminate repression of the local population, and forced recruitment of youth by militant groups.\" The study also extended to trial testimony and accounts of domestic Islamic terrorists in the United States and Europe. In their case, there was \"scant evidence that drone strikes are the main cause of militant", "-26.025058762403205" ], [ "the same disease.\" Drone strikes Morris has repeatedly expressed his view that drone strikes are counterproductive. Speaking on Iran's Press TV Morris stated: \"If people resent America in countries like Pakistan it is because of these drone strikes. The same applies in Yemen. There should be some judicial process rather than using these assassins in the sky. They increase terrorism. It must be terrifying even to think that these things would be flying above your nation. This policy was fostered by Obama and was one of Obama’s major failings. Drone strikes are grossly counterproductive.\" On crime Morris expressed sympathy with", "-26.01223094566376" ], [ "Civilian casualties from U.S. drone strikes Since the September 11 attacks, the United States government has carried out drone strikes in Pakistan (see drone strikes in Pakistan), Yemen (see drone strikes in Yemen), Somalia (see drone strikes in Somalia), Afghanistan, and Libya (see drone strikes in Libya).\nDrone strikes are part of a targeted killing campaign against jihadist militants; however, non-combatant civilians have also been killed in drone strikes. Determining precise counts of the total number killed, as well as the number of non-combatant civilians killed, is impossible; and tracking of strikes and estimates of casualties are compiled by a number", "-25.950760034495033" ], [ "that \"drone strikes are associated with decreases in the incidence and lethality of terrorist attacks, as well as decreases in selective targeting of tribal elders\" based on \"detailed data on US drone strikes and terrorism in Pakistan from 2007–2011.\"\nThe impact of drone strikes on local attitudes has also been studied. Political scientist and Carnegie Endowment fellow Aquil Shah conducted one such study in 2018 for the journal International Security, based on interview and survey data from Pakistan (n=167), which Shah claims provides a more complete and accurate view than opposing points \"based primarily on anecdotal evidence, unreliable media reports, and", "-25.90917143182014" ], [ "attention to the effects of drone warfare, participating in demonstrations at United States bases where drones are piloted and at headquarters of drone manufacturers. On April 28, 2012 in Washington, D.C., she was responsible for organizing the first ever International Drone Summit with lawyers, scientists, academics, and activists to kick off an international campaign to rein in the use of drones in the U.S. and abroad.\nOn April 30, 2012, Benjamin bemoaned the \"innocent civilians murdered\" by drone strikes in Pakistan, Somalia, and Yemen, by interrupting a speech on United States counterterrorism strategy given by John Brennan at the Woodrow Wilson", "-25.850705347780604" ], [ "camouflage, and other techniques related to war tricks.\"\nParanoia over being targeted by drone strikes has led to wide-scale executions of suspected spies by Taliban agents in the FATA area, including the creation of a special task force Lashkar al Khorasan for this purpose in North Waziristan. This has extended to the Pakistani Taliban publicly executing dozens of local car mechanics whom they accused of bugging their trucks and cars. Vehicles are particularly preferred as targets by the CIA because the drones could see who entered the vehicles and target them when they were driving in isolated areas. Civilian casualties According", "-25.810907521867193" ], [ "the airspace in the areas where US drones are operating. According to an unnamed Pakistani government official, the Pakistan government believes that the US sends the faxes primarily to support legal justification for the drone attacks.\nIn May 2013, a Pakistani court ruled that CIA drone strikes in Pakistan were illegal. A Peshawar High Court judge said the Pakistani government must end drone strikes, using force if needed. Also at that time, an International Crisis Group report concluded that drone strikes were an \"ineffective\" way of combating militants in Pakistan. A week later, the Pakistani Taliban withdrew an offer of peace", "-25.735586875351146" ], [ "Drone strike Drone strikes by the United States Ben Emmerson, special investigator for the United Nations Human Rights Council, said that U.S. drone strikes may have violated international humanitarian law. The Intercept reported, \"Between January 2012 and February 2013, U.S. special operations airstrikes [in northeastern Afghanistan] killed more than 200 people. Of those, only 35 were the intended targets. During one five-month period of the operation, according to the documents, nearly 90 percent of the people killed in airstrikes were not the intended targets.\" In the United States drone strikes are used to lessen the number of casualties since there", "-25.605090524361003" ], [ "case study for this analysis is Yemen, where drone strikes seem to be increasing resentment against the Yemeni government as well as against the U.S. Psychological impact on operators Controllers can also experience psychological stress from the combat they are involved in. A few may even experience posttraumatic stress disorder (PTSD). There are some reports of drone pilots struggling with post traumatic stress disorder after they have killed civilians, especially children. Unlike bomber pilots, moreover, drone operators linger long after the explosives strike and see its effects on human bodies in stark detail. The intense training that US drone operators", "-25.331820514285937" ], [ "of Pakistan. Emmerson said government officials from the country clearly stated Pakistan does not agree to the drone attacks, which is contradicted by U.S. officials. In October 2013, Amnesty International brought out a detailed study of the impact of drone strikes that strongly condemned the strikes. The report stated that the number of arbitrary civilian deaths, the tactics used (such as follow-up attacks targeting individuals helping the wounded) and the violation of Pakistani sovereignty meant that some of the strikes could be considered as unlawful executions and war crimes.\nIn May 2014, the targeted killing program was described as \"basically over,\"", "-25.31755385202632" ], [ "police attempted to prevent the drones from leaving, but were unsuccessful. Polish police confiscated the drones and the personal iPads of the drones' pilots. Portugal In 2004, the ship Borndiep, carrying the A-Portable, was physically blocked by a naval warship as it attempted to enter Portuguese waters. In 2009, the European Court of Human Rights rendered a decision in favor of the plaintiffs in Women on Waves and Others v. Portugal. The court determined that although Portugal had a right to enforce its laws prohibiting abortion, the nation could have enforced the law in less harmful ways, e.g. by sequestering", "-25.212196751890588" ], [ "human-rights groups who say they kill innocent civilians, and that the U.S. military and CIA drone strikes lack sufficient congressional oversight, including the choice of human targets suspected of being threats to America. Controversy over U.S. policy for drone attacks mushroomed after a September 2011 drone strike in Yemen killed Anwar al-Awlaki and Samir Khan, both U.S. citizens. Another drone strike in October 2011 killed Anwar's teenaged son, Abdulrahman al-Awlaki.\nIn 2010, the Obama administration policy allowed targeting of people whose names are not known. The U.S. government increased military aid to $140 million in 2010. U.S. drone strikes continued after the", "-25.172767547424883" ], [ "world. Alston, however, acknowledged that the drone attacks may be justified under the right to self-defense. He called on the US to be more open about the program. Alston's report was submitted to the United Nations Commission on Human Rights the following day.\nOn 7 June 2012, after a four-day visit to Pakistan, UN High Commissioner for Human Rights Navi Pillay called for a new investigation into US drone strikes in Pakistan, repeatedly referring to the attacks as \"indiscriminate,\" and said that the attacks constitute human rights violations. In a report issued on 18 June 2012, Christof Heyns, U.N. special rapporteur", "-25.113558071672742" ], [ "Embassy explanation, adding that at no time was the aerial target drone launched nor did it fly or crash within the Philippine territory. Human rights groups and even left-wing inclined groups/organizations have either condemned, criticized or called for an investigation regarding the incident, saying that drones can be used for surveillance and they can be used for actual combat operations, as well as suggesting it is used on spying on activities of the communist New People's Army as part of counterinsurgency efforts. However, Maj. Harold Cabunoc, spokesperson of the Philippine Army, denied that drones were taking part in the", "-24.94751537666889" ], [ "orders when they are incommunicado, and training on a large scale is nearly impossible when a drone strike could wipe out an entire coupe of new recruits. Drones have turned al Qaeda's command and training structures into a liability, forcing the group to choose between having no leaders and risking dead leaders.\"\nAudrey Kurth Cronin of George Mason University argues that while drones are tactically savvy, they have failed to advance the strategic goals of U.S. counter-terrorism policy. Terrorism itself is a tactic, Cronin notes, but it succeeds on a strategic plane when a shocking event is successfully leveraged for political", "-24.90105193085037" ], [ "sensor that is implanted directly into the rhino’s horn. The sensor gives park rangers the ability to accurately monitor the whereabouts and activities of the endangered black rhinos and keep them safe from poachers. The LoRa-equipped tracking sensor is part of a comprehensive LoRaWAN™-based IoT security solution that is deployed throughout Mkomazi National Park. Controversy There has been some controversy in the media surrounding the use of UAV or \"drones\" in the countryside of the UK with the Countryside Alliance suggesting the use of drones might be dangerous to people and animals ShadowView respond to the controversy of using drones,", "-24.72575402831717" ], [ "included the groom's adult son and the bride received superficial face wounds. The local governor and military commander called the casualties a “mistake” and gave money and assault rifles to the families of those killed and wounded – a traditional gesture of apology in Yemen. A few days after the incident, Yemeni MPs voted for a ban against the use of drones in Yemen, though it is unclear what effect this will have on drone usage. Criticism There are a number of vocal critics of the use of UAVs to track and kill terrorists and militants. A major criticism of", "-24.699700965720695" ], [ "on four principles: military necessity, distinction between military and civilian objects, prohibition of unnecessary suffering, and proportionality. Public opinion In 2013 a Fairleigh Dickinson University poll asked registered voters whether they \"approve or disapprove of the U.S. Military using drones to carry out attacks abroad on people and other targets deemed a threat to the U.S.?\" The results showed that three in every four (75%) of voters approved of the U.S. Military using drones to carry out attacks, while (13%) disapproved. A poll conducted by the Huffington Post in 2013 also showed a majority supporting targeted killings using drones,", "-24.688865230302326" ], [ "radicalize at the local, national or transnational level.\nAccording to a 2016 study in International Studies Quarterly, drone strikes are an effective counterterrorist tool in Pakistan. The study found that \"drone strikes are associated with decreases in the incidence and lethality of terrorist attacks, as well as decreases in selective targeting of tribal elders.\" In popular culture Two Pakistani novels have been written about U.S. drone attacks on Pakistan, Bullets and Train and The Scriptwriter. Bullets and Train specifically deals with the drone attacks and their aftermath. In The Scriptwriter, drone attacks are a part of the central plot.", "-24.666141224675812" ], [ "In that case, the US defended itself claiming the killing was not an assassination but an act of \"National Self Defense\".\nThere had been just under 2,500 assassinations by targeted drone strike by 2015, and these too have questioned as being extrajudicial killings.\nConcerns about targeted and sanctioned killings of non-Americans and American citizens in overseas counter-terrorism activities have been raised by lawyers, news firms and private citizens. On September 30, 2011 a drone strike in Yemen killed American citizens Anwar al-Awlaki and Samir Khan. Both individuals resided in Yemen at the time of their deaths. The executive order approving Al-Awlaki's", "-24.647747905226424" ], [ "in Miramshah. He said that most of those who were killed by the drone strikes were Al-qaeda and Taliban terrorists. Military's official paper on the attacks till 7 March 2011 said that between 2007 and 2011 about 164 predator strikes had been carried out and over 964 terrorists had been killed. Those killed included 793 locals and 171 foreigners. The foreigners included Arabs, Uzbeks, Tajiks, Chechens, Filipinos and Moroccans.\nOn 9 December 2011, Pakistan's Army Chief Ashfaq Parvez Kayani issued a directive to shoot down US drones. A senior Pakistani military official said, \"Any object entering into our air space, including", "-24.545341473363806" ], [ "drone strikes have continued, targeting suspected leaders of Al Qaeda in the Arabian Peninsula. Ibrahim al-Rubeish and Nasser bin Ali al-Ansi, two leading AQAP figures, were killed by U.S. drone strikes in the vicinity of Mukalla in 2015. Approximately 240 suspected AQAP militants have been killed by American drone strikes since the civil war began.\nIn 2013, Radhya Al-Mutawakel and Abdelrasheed Al-Faqih, Directors of Mwatana, published a joint report with Open Society Foundations titled 'Death by Drone', detailing evidence of civilian casualties and damage to civilian objects in nine US drone strikes. Islamic State presence and operations The Islamic State (IS)", "-24.53579530265415" ], [ "is no-one that has to physically fight in combat. Being able to send drones to fight reduces the number of American lives lost substantially. The U.S had increased the use of drone strikes significantly during Obama's presidency compared to Bush's.With the help from joint defense facility at Pine Gap, which locates targets by intercepting radio signals, the U.S. is double-tap drone striking.\nIn August 2018, Al Jazeera reported that a Saudi Arabian-led coalition \"battling Houthi rebels [in Yemen] secured secret deals with al-Qaeda in Yemen and recruited hundreds of the group's fighters. ... Key figures in the deal-making said the United", "-24.37758725567255" ], [ "Bureau also claimed that since Obama took office at least 50 civilians were killed in follow-up strikes when they had gone to help victims and more than 20 civilians have also been attacked in strikes on funerals and mourners, a practice condemned by legal experts.\nBarbara Elias-Sanborn has also claimed that, \"as much of the literature on drones suggests, such killings usually harden militants' determination to fight, stalling any potential negotiations and settlement.\" However, analysis by the RAND Corporation suggests that \"drone strikes are associated with decreases in the incidence and lethality of terrorist attacks\" in Pakistan.\nA motive that the 2010", "-24.31850804638816" ], [ "and Other Irritating States (Globe Pequot, 2008), among others. Her current book project is Lashkar-e-Taiba: In its Own Words. Views Fair has published several articles defending the use of drone strikes in Pakistan and has been critical of analyses by Human Rights Watch, Amnesty International and other humanitarian organizations, arguing that drone strikes are accurate, have reduced casualties, have targeted Taliban leadership and are popular among some Pakistanis. Academic controversies Fair's work and viewpoints have been the subject of prominent criticism. Her pro-drone stance has been denounced, and called \"surprisingly weak\" by Brookings Institution senior fellow Shadi Hamid. Journalist Glenn Greenwald dismissed", "-24.257685338612646" ], [ "made”. Myanmar In November 2017, Myanmar sentenced three journalists and their driver to two months’ imprisonment for operating a drone near parliament while shooting a documentary. While Myanmar has no specific law on drones, individual authorities have tried to restrict the use of such equipment over their premises. Republic of Ireland In 2012, the Irish Aviation Authority published a document setting out safety requirements for any unmanned aerial system. The IAA policy is that unmanned aerial systems may not be flown without the operator receiving a specific permission from the IAA. New regulations, including a registry of UAVs over", "-24.149469599382428" ], [ "use of drone strikes against targets in foreign countries and elsewhere as part of the War on Terror. In January 2014, it was estimated that 2,400 people have died from U.S. drone strikes in five years. In June 2015 the total death toll of U.S. drone strikes was estimated to exceed 6,000. BAE Taranis Taranis is a British demonstrator program for unmanned combat air vehicle (UCAV) technology. It is part of the UK's Strategic Unmanned Air Vehicle (Experimental) programme (SUAV[E]). BAE describes Taranis's role in this context as following: \"This £124m four year programme is part of the UK Government's", "-24.090339415357448" ], [ "found that the next friend of Yemenis killed in a U.S. drone strike could not sue under the Torture Victims Protection Act nor the Alien Tort Statute because the attack raised a political question. Personal life Huvelle is married to labor lawyer Jeffrey Huvelle.", "-24.07412148558069" ], [ "an \"incident\" involving a truck which did not disrupt flights or cause any delays. Two other alleged claims on a drone attack on the airport were reported by the Houthis, as well as two attacks on Dubai International Airport, all which were denied and unverified. An investigation by Bellingcat concluded \"it is highly likely that a Houthi-led drone attack did not take place in Abu Dhabi and Dubai...Propaganda usage in the form of infographics, pictures and statements by Houthi leaders were pronounced following each claim, following a propaganda pattern.\" According to Reuters, the UAE has an advanced air defense system", "-24.06624490476679" ], [ "to MPs why the Government has failed to bring this legislation forward.\nOn 24 December, security minister Ben Wallace announced that \"The huge proliferation of such devices, coupled with the challenges of deploying military counter measures into a civilian environment, means there are no easy solutions... However, I can say that we are able to now deploy detection systems throughout the UK to combat this threat.\" Other drone incidents There were previous drone incidents at Gatwick Airport on 3 July 2017 and 9 July 2017. The latter was not made public until 15 October 2017.\nOn the evening of 28 April 2019,", "-24.06518925295677" ], [ "and destroy the vehicles — whatever the evidence of their clearly civilian nature. The transcript is full of statements like “that truck would make a beautiful target”; “Oh, sweet target!”; “the men appear to be moving tactically”; and “They’re going to do something nefarious”.\nIt is difficult to reconcile these figures because the drone strikes are often in areas that are inaccessible to independent observers and the data includes reports by local officials and local media, neither of whom are reliable sources. Critics also fear that by making killing seem clean and safe, so-called surgical UAV strikes will allow the United", "-24.041590691369493" ], [ "been questioned, as the United States still has the ability to conduct drone attacks from nearby bases in Afghanistan, and according to the Pakistani military, the base was used mainly for refuelling and maintenance of drones, as well as for emergency landings and logistical support, and not for conducting actual drone operations which had in fact ceased in April 2011. Following the incident, Pakistan stated its intention to shoot down any future US drones intruding on its airspace, and the US suspended drone operations to avoid antagonising Pakistan. One report said that American drone attacks in Pakistan dropped by as", "-24.013719050912187" ], [ "perhaps it is true of some more than others. Drone use Kilcullen argues that targeted killings with drone strikes in Afghanistan and Pakistan is a mistake. in 2009 he said: \"These strikes are totally counter-productive. It is a strategic error to personalize the conflict in this way, it’ll strengthen the enemy and weaken our friends. How can one expect the civilian population to support us if we kill their families and destroy their homes.\"", "-23.924156393040903" ], [ "from numerous drones attacking at the same time.\nFBI Director Christopher Wray stated at a Senate hearing that \"We do know that terrorist organizations have an interest in using drones...We have seen that overseas already with some frequency. I think that the expectation is that it is coming here, imminently.\"", "-23.886210790195037" ], [ "as of August 2011, the drone campaign had killed over 2,000 militants and approximately 50 non-combatants.\nAn independent research site Pakistan Body Count run by Dr. Zeeshan-ul-hassan, a Fulbright scholar keeping track of all the drone attacks, claims that 2179 civilians were among the dead, and 12.4% children and women. A report by the Bureau of Investigative Journalism, released 4 February 2012, stated that under the Obama administration (2008–2011) drone strikes killed between 282 and 535 civilians, including 60 children.\nThe British human rights group Reprieve filed a case with the United Nations Human Rights Council, based on affidavits by 18 family", "-23.87695260893088" ], [ "disguised as sea gulls or other birds to mask themselves.\nBy 2020, about 30,000 unmanned drones are expected to be deployed in the United States for the purpose of surveillance and law enforcement. Infiltration of activist groups In 2003, consent decrees against surveillance around the country were lifted, with the assistance of the Justice Department.\nThe New York City Police Department infiltrated and compiled dossiers on protest groups before the 2004 Republican National Convention, leading to over 1,800 arrests and subsequent fingerprinting.\nIn 2008, Maryland State Police infiltrated local peace groups.\nIn 2013, a Washington, D.C. undercover cop infiltrated peace groups. Uses of intercepted", "-23.83834678767016" ], [ "saying they fly within CAA flight regulations for missions across the UK. In December 2013 International NGO 'Free the Slaves' announced it would partner with ShadowView and use UAV to identify illegal slavery, the reception in India was mixed with some of the public supporting the concept and some voicing concern of the use of drones.", "-23.66539495541656" ], [ "launched from Yemen, counter to the claims of the Houthis. However, al-Malki said the coalition was still trying to determine the origin for the drones. At a press conference on 18 September, al-Malki showed alleged debris of the drones, stating there were 18 drones and 7 missiles used in the attack (25 weapons in total), with the drones being delta wing-style craft of Iranian manufacture. Al-Malki showed surveillance footage that had, according to him, caught the drones travelling southward towards the facilities before the strike. He stated that this ruled out Yemen as a point of origin due to the", "-23.654969952069223" ], [ "published by Reprieve in 2014 suggested that U.S. drone strikes in Yemen and Pakistan have had an unknown person to target casualty ratio of 28:1 with one attack in the study having a ratio of 128:1 with 13 children being killed.\nUS hostage Warren Weinstein and Italian hostage Giovanni Lo Porto were killed in a January 2015 US-led drone strike on the Afghanistan-Pakistan border, as announced by U.S. President Barack Obama at a White House press conference on April 23, 2015. Impact According to a 2018 study in the journal International Security, there is scant evidence that drone strikes in Pakistan", "-23.6423905146803" ], [ "drone strike in Pakistan on January 19, 2015. President Barack Obama announced that, in the same series of drone strikes, hostage aid workers Giovanni Lo Porto and Warren Weinstein were killed as collateral damage.", "-23.586956794228172" ], [ "to drone strikes in his country. Not long after, a US strike killed another nine people, an act that prompted Sharif to summon the US chargé d'affaires in protest and to demand, again, an \"immediate halt\" to the Anglo-American drone program. At the beginning of July 2013 — as a drone strike killed another 17 people in Waziristan — the findings of a Center for Naval Analyses study, based on classified US military documents, were reported: American drones strikes were 10 times more likely to cause innocent casualties than bombs or missiles launched from planes.\nIn July 2013, it was reported", "-23.534695508496952" ], [ "conflict, this makes them \"unlawful combatants\" and possibly subject to prosecution.\nUS military reports asserted that al Qaeda is being slowly but systematically routed because of these attacks, and that they have served to sow the seeds of uncertainty and discord among their ranks. They also claimed that the drone attacks have addled and confused the Taliban, and have led them to turn against each other. In July 2009 it was reported that (according to US officials) Osama Bin Laden's son Saad bin Laden was believed to have been killed in a drone attack earlier in the year.\nDuring a protest against", "-23.526766420633066" ], [ "framework.\" Zenko thinks current drone policy might share the same fate of the Bush-era enhanced interrogation techniques and warrantless wiretapping, both of which were unpopular, illegal and ultimately ended.\nHarvard Law School Professors Gabriella Blum and Philip Heymann cite six potential hazards of targeted killings: First, the so-called Hydra effect, or the rise of more—and more resolute—leaders to replace those who were recently \"decapitated.\" Second, drones can drive terrorist leaders into hiding, making the monitoring of their movements, and subsequent intelligence gathering, extremely difficult. Third, \"the political message flowing from the use of targeted killings may be harmful to the attacking", "-23.480744873464573" ], [ "4, 2001, Tenet warned of the dangers of a controversial or mistaken strike with an under-tested armed drone. After the meeting, the CIA resumed reconnaissance flights, the drones now being weapons-capable but as yet unarmed. 2002 Starting on September 11, the strategy was no longer steady escalation, but multiple attacks on multiple fronts. On November 5, 2002, newspapers reported that al-Qaeda operatives in a car travelling through Yemen had been killed by a missile launched from a CIA-controlled Predator drone (a medium-altitude, remote-controlled aircraft).\nIn 2004, the Australian Broadcasting Corporation's (ABC-TV) international affairs program \"Foreign Correspondent\" investigated this targeted killing and", "-23.419926718910574" ], [ "drone policy, while opposition by non-host partners could impose additional restrictions on the use of drones. Reforming U.S. drone strike policies can do much to allay concerns internationally by ensuring that targeted killings are defensible under international legal regimes that the United States itself helped establish and by allowing U.S. officials to openly address concerns and counter misinformation.\" Micah Zenko at the Council on Foreign Relations believes the United States should \"end so-called signature strikes, which target unidentified militants based on their behavior patterns and personal networks, and limit targeted killings to a small number of specific terrorists with transnational", "-23.41727552827797" ], [ "reserved for itself the right to resume spy plane overflights.\n“We emphasized [at the UN Security Council meeting] that one thing is clear is that flight of drone is violation and provocation that triggered the incident.”\nAccording to Churkin, during the Security Council meeting he had pointed out “technical inconsistencies” in the Fact-Finding Team's findings, noting that nothing in the report indicated that the fighter jet had crossed into Abkhazia from the Russian Federation.\n“There also was no conversation between the pilot and ground control. Experts tell me that it is virtually impossible to shoot down a drone from a fighter jet without", "-23.40131446529267" ], [ "The range of the drones supposedly can reach distant areas in Saudi Arabia and the United Arab Emirates. The Houthis had often used Samad 1 to attack Saudi Arabia. Later, the Houthis used the Quds 1, which is a small ground launched cruise missile that was possibly used in the 12 June 2019 Abha International Airport attack, which occurred in southwestern Saudi Arabia. A Houthi leader, Mohammed al-Bukhaiti, said that they have \"exploited vulnerabilities in the Saudi defense system\" and they \"built their drones in order to avoid these systems, therefore, the Saudi and the Emirati airspace became open to", "-23.286940273363143" ], [ "39,900 were combatants, resulting in a civilian casualty rate of 77%. US drone strikes in Pakistan The civilian casualty ratio for U.S. drone strikes in Pakistan is notoriously difficult to quantify. The U.S. itself puts the number of civilians killed from drone strikes in the last two years at no more than 20 to 30, a total that is far too low according to a spokesman for the NGO CIVIC. At the other extreme, Daniel L. Byman of the Brookings Institution suggests that drone strikes may kill \"10 or so civilians\" for every militant killed, which would represent a civilian", "-23.241578495217254" ], [ "and that, as of 2012, 15% of the total people killed by drone strikes were either known civilians or unknown. The Foundation also states that in 2012 the rate of known civilian and unknown casualties was 2 percent, whereas the Bureau of Investigative Journalism say the rate of civilian casualties for 2012 is 9 percent. The Bureau, based on extensive research in mid-2011, claims that at least 385 civilians were among the dead, including more than 160 children.\nIt has been reported that 160 children have died from UAV-launched attacks in Pakistan and that over 1,000 civilians have been injured. Moreover,", "-23.193686329759657" ], [ "In 2017, DJI announced Local Data Mode for drones, under which the aerial platform transfer any flight data over the Internet. Brendan Schulman of DJI’s Vice President of Policy and Legal Affairs denies the report from Ars Technica, saying “DJI is committed to protecting the privacy of its customers’ photos, videos and flight logs.\" DJI also emphasized that its drone was never marketed for military applications.\nOn August 4, 2018, two Matrice 600 drones detonated explosives near Avenida Bolívar, Caracas, where Nicolás Maduro, the President of Venezuela, was addressing the Bolivarian National Guard in front of the Centro Simón Bolívar Towers", "-23.13152886214084" ], [ "casualties and any legal inquests regarding them. Any such information held by the U.S. military is allegedly inaccessible to the public due to the high level of secrecy surrounding the drone attacks program. The US representative at UNHRC has argued that the UN investigator for extrajudicial, summary or arbitrary executions does not have jurisdiction over US military actions, while another US diplomat claimed that the US military is investigating any wrongdoing and doing all it can to furnish information about the deaths.\nOn 27 October 2009 UNHRC investigator Philip Alston called on the US to demonstrate that it was not randomly", "-23.125853874604218" ], [ "all) of the casualties were civilians, not the intended regional Al-Qaeda targets. The organization demanded US and Yemeni investigations into the attack. In its research, HRW \"found no evidence that the individuals taking part in the wedding procession posed an imminent threat to life. In the absence of an armed conflict, killing them would be a violation of international human rights law.\" Political effects As a new weapon, drones are having unforeseen political effects. Some scholars have argued that the extensive use of drones will undermine the popular legitimacy of local governments, which are blamed for permitting the strikes. The", "-23.123878069764032" ], [ "militant chief reportedly behind the 2007 assassination of Benazir Bhutto, as priority targets.\nThe U.S. drone attacks in Pakistan, that were begun by President George W. Bush, have increased substantially since an expansion of the attacks was authorized by President Barack Obama in 2009. Drones have resulted in civilian casualties, and intentionally targeted rescuers, funerals, and one U.S. citizen. UN reports have described the U.S. drone wars as extrajudicial killing and summary executions.\nThere was also tension between India and Pakistan who had both come into possession of nuclear weapons. This conflict had been ongoing since August 1947 after the Partition of", "-23.1147403732175" ], [ "and implement its interpretation of Sharia. U.S. drone strikes A CIA targeted killing drone strike killed Kamal Derwish, an American citizen, and a group of al-Qaida operatives (including Qaed Salim Sinan al-Harethi) in Yemen in November 2002. Drones became shorthand in Yemen for a weak government allowing foreign forces to have their way.\nOn September 30, 2011, a US drone attack in Yemen resulted in the death of Anwar al-Awlaki, one of the group's leaders, and Samir Khan, the editor of Inspire, its English-language magazine. Both were US citizens.\nThe pace of US drone attacks quickened significantly in 2012, with over 20", "-23.01256661489606" ], [ "Gülablı Drone shootdown On September 12, 2011, an UAV was reportedly shot down by the air defense arm of the Nagorno-Karabakh Defense Army (NKDA) over the airspace of the Nagorno-Karabakh Republic, near Vazgenashen, previously known as Gulably. Preliminary investigations carried out by the NKDA have determined the model to be a Hermes 450 type. \nThe Azerbaijani Ministry of Defense initially denied losing any drones. But several days later the state news agency APA, citing a Turkish tabloid newspaper, came out with an elaborate explanation that the UAV was supposedly operated by Israel and making reconnaissance flights from Armenia to spy", "-22.980121942673577" ], [ "operations after a series of botched drone strikes by JSOC, the last of which was a December 2013 drone strike that killed numerous civilians at a wedding ceremony. Despite a ban on military drone operations the Yemen government allowed CIA drone operations to continue.\nIn April 2014, a JSOC Lieutenant Colonel and a senior CIA SAD officer were off-duty and having a haircut in the expatriate area of Sanaa, when a group of gunmen attempted to kidnap them, the two officers responded with their sidearms, shooting dead two of their attackers and sending others fleeing. During the 2014 hostage rescue operations", "-22.890167202727753" ], [ "the United States' reliance on drones \"increasingly common\" and \"deeply troubling\", and called on the U.S. to justify its use of targeted assassinations rather than attempting to capture al Qaeda or Taliban suspects. In 2013, Obama appointed John Brennan as the new CIA Director and announced a new policy that required CIA operatives to determine with a \"near-certainty\" that no civilians would be hurt in a drone strike. The number of drone strikes fell substantially after the announcement of the new policy,\nAs of 2015, US drone strikes had killed eight American citizens, one of whom, Anwar al-Aulaqi, was specifically targeted.", "-22.86543973076914" ], [ "2011, law enforcement authorities found messages on al Qaeda-linked websites calling for attacks against executives of drone aircraft manufacturer AeroVironment. Law enforcement believed that the messages were in response to calls for action against Americans by Adam Yahiye Gadahn. United Nations human rights concerns On 3 June 2009, the United Nations Human Rights Council (UNHRC) delivered a report sharply critical of US tactics. The report asserted that the US government has failed to keep track of civilian casualties of its military operations, including the drone attacks, and to provide means for citizens of affected nations to obtain information about the", "-22.75648161006393" ], [ "UAS like Predator, Reaper, and Global Hawk as Remotely Piloted Aircraft (RPA) to highlight the fact that these systems are always controlled by a human operator at some location.\nCIA-ordered drone strikes were ended by President Obama, who transferred control entirely to the U.S. military, under a separate legal authority. President Trump reversed this decision in 2017. Armed attacks by U.S. UAVs MQ-1 Predator UAVs armed with Hellfire missiles have been used by the U.S. as platforms for hitting ground targets. Armed Predators were first used in late 2001 from bases in Pakistan and Uzbekistan, mostly aimed at assassinating high-profile individuals", "-22.747270164982183" ], [ "them by the American Civil Liberties Union over the CIA's use of unmanned drones in warfare by claiming that the program was a state secret, even though it had been acknowledged and even defended multiple times by the Obama administration.\nIn February 2019, Virginia governor Ralph Northam was accused of using the Shaggy defense after photographs from his medical school yearbook page surfaced showing a man in blackface next to a man wearing Ku Klux Klan robes. When the story first came out, Northam stated that he apologized for being in the image. However, a day later, Northam changed his story,", "-22.730744163374766" ], [ "survivors, and others in Pakistan provided by a Pakistani human rights organization, Foundation for Fundamental Rights, concluded that only 2% of drone strike victims are \"high-level\" militant leaders. The report's authors did not estimate the numbers of total civilian casualties, but suggested that the February 2012 Bureau of Investigative Journalism report was more accurate than the Long War Journal report (both detailed above) on civilian casualties. The report also opined that the drone attacks were violations of international law, because the US government had not shown that the targets were direct threats to the US. The report further noted the", "-22.70009230612777" ], [ "only two of the much-heavier Hellfires. Public opinion in the US (military use) In 2013, a Fairleigh Dickinson University poll found that 48% of American voters believe it is \"illegal for the U.S. government to target its own citizens living abroad with drone attacks.\" In the same poll, however, a majority of voters approved of the U.S. military and the CIA using UAVs to carry out attacks abroad “on people and other targets deemed a threat to the U.S.”.\nThere are a number of critics of the use of UAVs to track and kill terrorists and militants. A major criticism", "-22.618070235243067" ], [ "the Creech Air Force Base in Nevada and Holloman Air Force Base in New Mexico. Operations The US and Seychellois governments claimed that the main purpose of the base was to track pirates in the region, but as late as 2011, a senior official said the US had not yet used the drones for that purpose. Another stated goal was to have surveillance missions over Somalia.\nWhile officially the drones were supposed to be unarmed, there were secret discussions with the Seychelles to arm them, revealed by the United States diplomatic cables leak (of WikiLeaks) in 2011.\nIn April 2011, the operations", "-22.606808728101896" ], [ "abolition of formal legal systems altogether.\nIn 2001, Ibrahim Nafie criticized the U.S. for agreeing with \"the Israeli spin that calls ... its official policy of assassinating Palestinian leaders 'targeted killing'.\"\nIn 2013, United Nations Special Rapporteur on human rights and counter terrorism, Ben Emmerson, stated that U.S. drone strikes may have violated international humanitarian law. Additional concerns For drone strikes to be effective, the United States must obtain consent from the host country they are operating in. The growing chorus of objections from host countries, most notably emanating from Pakistan, seriously inhibits drones’ effectiveness. \"Host states have grown frustrated with U.S.", "-22.604628736207815" ], [ "use of Predator drone warfare. In September 2009 he was arrested at Creech Air Force Base in a civil disobedience protest over recent drone attacks in Pakistan. Stoltzfus died on March 10, 2010 of heart failure while riding his motor-assisted bicycle near his home.", "-22.56813917067484" ], [ "Open Society Foundations to produce a joint report entitled \"Death by Drones\" which included research and monitoring of the damage and civilian deaths caused by nine US drone strikes in five Yemeni governorates - Sana'a, Marib, Dhamar, Hadramout, and al-Baidha - between May 2012 and April 2014.\nIn 2017, Al-Mutawakel undertook an advocacy tour which included visits to the US, UK, Switzerland, and other European countries, to speak about the conflict in Yemen and the human rights violations committed by all parties to the conflict, and to seek to engage different nations to bring an end to the conflict. During the", "-22.559046357811894" ], [ "no one is allowed there.\"\nTop US officials confirmed to Fox News Channel that Shamsi Airfield had been used by the CIA to launch the drones since 2002. Al Qaeda response Messages recovered from Osama bin Laden's home after his death in 2011, including one from then al Qaeda No. 3, Atiyah Abd al-Rahman reportedly, according to the Agence France-Presse and The Washington Post, expressed frustration with the drone strikes in Pakistan. According to an unnamed U.S. government official, in his message al-Rahman complained that drone-launched missiles were killing al Qaeda operatives faster than they could be replaced.\nIn June and July", "-22.524006472085603" ], [ "surveillance cameras in cities and towns as part of its efforts to combat terrorism. In February 2009, Cambridge, MA rejected the cameras due to privacy concerns. Surveillance drones On 19 June 2013, FBI Director Robert Mueller told the United States Senate Committee on the Judiciary that the federal government had been employing surveillance drones on U.S. soil in \"particular incidents\". According to Mueller, the FBI is currently in the initial stage of developing drone policies.\nEarlier in 2012, Congress passed a US$63 billion bill that will grant four years of additional funding to the Federal Aviation Administration (FAA). Under the bill,", "-22.516604235919658" ], [ "drone attacks, in an event sponsored by Nevada Desert Experience, Father Louie Vitale, Kathy Kelly, Stephen Kelly (SJ), Eve Tetaz, John Dear, and others were arrested outside Creech Air Force Base on Wednesday 9 April 2009.\nIn May 2009 it was reported that the US was sharing drone intelligence with Pakistan. Leon Panetta reiterated on 19 May 2009 that the US intended to continue the drone attacks.\nIn December 2009 expansion of the drone attacks was authorized by Barack Obama to parallel the decision to send 30,000 more American troops to Afghanistan. Senior US officials are reportedly pushing for extending the strikes", "-22.472952528280075" ], [ "film, Ali Khamenei, Supreme leader of Iran, states that Iranian drones and missiles are used just for defense against our enemies. Content Iranian advancement in the field of drone production is discussed. In particular, (Mohajer, Mohajer 4, Ababil 1, Ababil 2, Karrar) are shown to be developed by Iranian scientist.\nSet to background music, the video begins with Ayatollah Ali Khamenei giving a speech to military graduates. Iran's drones are shown to evade Israel's Iron Dome systems of Tel Aviv and Haifa and Iranian missiles fall on the square Kikar Hamedina square, the Azrieli Towers, the Kirya (Israeli military control", "-22.453796125482768" ], [ "on extrajudicial, summary or arbitrary executions, called on the Obama administration to justify its use of targeted assassinations rather than attempting to capture al Qaeda or Taliban suspects. Reactions from people in Pakistan According to a report by researchers at Stanford and New York University law schools in 2012, civilians in Waziristan interviewed for the report believed \"that the US actively seeks to kill them simply for being Muslims, viewing the drone campaign as a part of a religious crusade against Islam.\" Many professionals working in Waziristan believe that drone strikes encourage terrorism. The report notes similar conclusions reached by", "-22.425827458733693" ], [ "targeted killing as legitimate within the context of self-defense, when employed against terrorists or combatants engaged in asymmetrical warfare. They argue that drones are more humane and more accurate than manned vehicles, and that targeted or \"named killings\" do not occur in any context other than a declared state of war.\nSome twenty-six members of Congress, with academics such as Gregory Johnsen and Charles Schmitz, media figures (Jeremy Scahill, Glenn Greenwald, James Traub), civil rights groups (i.e. the American Civil Liberties Union) and ex-CIA station chief in Islamabad, Robert Grenier, have criticized targeted killings as a form of extrajudicial killings, which", "-22.42350220074877" ], [ "leading to intensive reactions such as those that followed the 2015 Paris attacks.\nGerman politician Sahra Wagenknecht, the deputy leader of the party Die Linke in the German Parliament, has compared the US drone attacks in Afghanistan, Pakistan or Yemen with the terrorist attacks in Paris. ″If a drone controlled by the West extinguishes an innocent Arab or Afghan family, which is just a despicable crime as the attacks in Paris, and it should fill us with the same sadness and the same horror\". We should not operate a double standard. Through the drone attacks had been \"murdered thousands of innocent", "-22.406632410245948" ], [ "it seemed that ten civilians had died in the drone attacks for every militant killed. Byman argues that civilian killings constitute a humanitarian tragedy and create dangerous political problems, including damage to the legitimacy of the Pakistani government and alienation of the Pakistani populace from America. He suggested that the real answer to halting al-Qaeda's activity in Pakistan will be long-term support of Pakistan's counterinsurgency efforts.\nUnited States officials claim that interviews with locals do not provide accurate numbers of civilian casualties because relatives or acquaintances of the dead refuse to state that the victims were involved in militant activities.\nThe CIA", "-22.39169632756966" ], [ "innocent civilians have been killed in these attacks ... This would have been unthinkable in previous times.\" Pakistan In October 2013, the Pakistani government revealed that since 2008, civilian casualties made up 3 percent of deaths from drone strikes. Since 2008, it alleges there have been 317 drone strikes that killed 2,160 Islamic militants and 67 civilians. This is less than previous government and independent organization calculations of collateral damage from these attacks. S. Azmat Hassan, a former ambassador of Pakistan, said in July 2009 that American UAV attacks were turning Pakistani opinion against the United States and that 35 or", "-22.332560791051947" ], [ "prominently, Pakistan. Though the drone strikes killed high-ranking terrorists, they were also criticized for resulting in civilian casualties. A 2013 Pew research poll showed that the strikes were broadly unpopular in Pakistan, and some former members of the Obama administration have criticized the strikes for causing a backlash against the United States. However, based on 147 interviews conducted in 2015, professor Aqil Shah argued that the strikes were popular in North Waziristan, the area in which most of the strikes take place, and that little blowback occurred. In 2009, the UN special investigator on extrajudicial, summary, or arbitrary executions called", "-22.33210547803901" ], [ "also revealed that British drone pilots had been embedded, almost continuously, with American forces at Creech Air Force Base since 2008. These drone operators, who were \"a gift of services\", meaning the UK still paid their salaries and covered their expenses, had been carrying out operations that included reconnaissance in Syria to assist American strikes against IS.\nFallon said that it was \"illogical\" for the UK not to bomb ISIL in Syria, for the organisation does not \"differentiate between Syria and Iraq\" and is \"organised and directed and administered from Syria\". Following the terrorist attacks on Paris in November 2015, for", "-22.328916329395724" ], [ "drone, to no avail. Responsibility for the drone was immediately claimed by the Shvercerat, a fan group of the Macedonian club FK Shkupi, a club operated by Albanians, although no evidence has surfaced to support their claim.\nThe following match between the two teams, played in Elbasan on 7 October 2015, the Serbian fans were not allowed to travel to Albania for security reasons; on that same day the Albanian police arrested a man suspected to be the pilot of the drone of the Belgrade match. Reactions After arriving from Belgrade, the national team of Albania was applauded and celebrated by", "-22.30298643372953" ], [ "close range, for hours or days at a time. One former U.S. official who worked with micro-UAVs said that they can be almost impossible to detect at night. \"It can be outside your window and you won't hear a whisper,\" the official said. The drone operators also have changed to trying to target insurgents in vehicles rather than residences to reduce the chances of civilian casualties.\nAn oft-quoted 2010 study by Peter Bergen and Katherine Tiedemann at the New America Foundation went as follows: \"Our study shows that the 265 reported drone strikes in Northwest Pakistan, including 52 in 2011, from", "-22.296906854200643" ], [ "the concerns about the number of killings, Jeh C. Johnson stated, \"We have to be vigilant to avoid a no-quarter, or take-no-prisoners policy.\"\nA study called \"The Year of the Drone\" published in February 2010 by the New America Foundation found that from a total of 114 drone strikes in Pakistan between 2004 and early 2010, between 834 and 1,216 individuals had been killed. About two thirds of these were thought to be militants and one third were civilians.\nOn 28 April 2011, U.S. President Barack Obama appointed General David Petraeus as director of the CIA overseeing the drone attacks. According to", "-22.240367999882437" ], [ "itself against it, killing seven people aboard including the heads of two rural communities within the NKR. It is believed to be the first ever combat use of the drone anywhere. An Israeli-made ThunderB surveillance drone was shot down on 2 April according to the NK defense force. Armenian officials later protested Israel's supply of weaponry to Azerbaijan. Some Azerbaijani sources claimed that Mataghis was under Azerbaijani control, citing Azerbaijan Ministry of Defense but Armenian side says this is not true because they repelled an Azerbaijani offensive allegedly backed by Turkey. Later Armenian side published video to prove that Mataghis", "-22.164755993464496" ], [ "stated that 95% of those killed in 2010 were militants and that, as of 2012, 15% of the total people killed by drone strikes were either civilians or unknown. The foundation also states that in 2012 the rate of civilian and unknown casualties was 2 percent, whereas the Bureau of Investigative Journalism say the rate of civilian casualties for 2012 is 9 percent.\nThe Bureau of Investigative Journalism, based on extensive research in mid-2011, claims that \"credible reports\" indicate 392 civilians were among the dead, including 175 children, out of the 2,347 people reported killed in US attacks since 2004. In", "-22.14640375826275" ], [ "of his drone policy forced Obama to announce stricter conditions on executing drone strikes abroad, including an unspoken plan to partly shift the program from the CIA to the ostensibly more accountable Pentagon, In anticipation of his speech, Obama instructed Attorney General Eric Holder to divulge that four U.S. citizens had been killed by drones since 2009, and that only one of those men had been intentionally targeted. Following Obama's announcement, the United Nations' drone investigator, British lawyer Ben Emmerson, made clear his expectation of a \"significant reduction\" in the number of strikes over the 18 months to follow, although", "-22.135589963101665" ], [ "drone crashed about 60 miles northeast of Baghdad, 12 miles inside Iraqi territory near the town of Balad Ruz in Diyala Governorate. Officials at Iraq's Defence and Interior ministries suggested that the drone might have been scouting for routes to smuggle Iranian weapons into the country. The New York Times, however, speculated that the drone was monitoring Iranian dissidents in Iraq, such as those at Camp Ashraf, which is located near where the drone crashed. Abdul Aziz Mohammed Jassim, head of military operations at the Iraqi defence ministry stated that since the drone, \"crossed 10 km into Iraq, it's most likely", "-22.11487216524256" ], [ "US policy of considering all military-age males in a strike zone as militants following the air strike unless exonerating evidence proves otherwise. Media outlets were also urged to cease using the term \"militant\" when reporting on drone attacks without further explanation.\nIn an interview in October 2013, one former drone operator described events suggesting that child casualties may go unrecognized in some mission assessments. A week later, Pakistan's Ministry of Defense stated that 67 civilians had been among the 2,227 people killed in 317 drone strikes since 2008. The Ministry said that the remainder of those killed were Islamic militants. Research", "-22.112720544217154" ], [ "provided photographic evidence from firsthand sources that the munitions used were identical to those used by the Russian military.\nIn February 2017, Bellingcat published an article detailing how rudimentary drones were being used by ISIS to drop explosives onto opposition targets. Analysing footage from Twitter and other social media platforms, it was discovered that the drones were dropping modified 40mm grenades.\nBellingcat also does extensive reporting into attacks that are not openly claimed by combatants.\nIn September 2016, Bellingcat released a fact-checking article in response to Russia denying the bombing of hospitals in Syria. The article analysed footage from YouTube and images from", "-22.11256777055678" ], [ "also presented in the Citizenfour video documentary.\nThe revelation of US drone activities from Ramstein were leading to nationwide anti-drone protests under the banner of \"Stop Ramstein Air Base\".\nIn 2019 three Yemenis, who have lost their relatives in a 2012 US drone strike, have taken legal action against the German government for aiding the international law breaks of the United States by tolerating these operations from Ramstein. The German Higher Administrative Court in Münster ruled that the German government must take appropriate measures to control whether the US army follows international law at Ramstein Air Base.\nBut the possibilites of Germany to", "-22.098161386942593" ], [ "The Nightmare of the Vultures The Nightmare of the Vultures (Persian: کابوس کرکس ها‎) is a documentary of drones and a simulated drone attack that was shown Iranian state TV on 7 February 2014. The film gives a short history of the Iranian drone program, and depicts a simulated military counterattack against Israeli targets and American installations in the Persian Gulf. Iranian drones and missiles are shown bombarding Tel Aviv’s Kikar Hamedina square, Azrieli Towers skyscrapers, IDF’s The Kirya central command complex, Ben Gurion International Airport, Haifa’s Technion, nuclear reactor in Dimona, and several air force bases. In the", "-22.084612460463177" ], [ "reportedly passed up three chances to kill militant leaders, including Sirajuddin Haqqani, with drone missiles in 2010 because women and children were nearby. The New America Foundation believes that between zero and 18 civilians have been killed in drone strikes since 23 August 2010 and that overall civilian casualties have decreased from 25% of the total in prior years to an estimated of 6% in 2010. The Foundation estimates that between 277 and 435 non-combatants have died since 2004, out of 1,374 to 2,189 total deaths.\nAccording to a report of the Islamabad-based Conflict Monitoring Center (CMC), as of 2011 more", "-22.069299233466154" ], [ "missing drone had not been recovered. Later that day, CBS reported that the US officials had confirmed in private the authenticity of the drone shown by the Iranians.\nOn 6 December 2011, U.S. officials acknowledged that a drone crashed in or near Iranian airspace and that this belonged to the CIA and not to ISAF as was earlier stated. U.S. officials did not state that the drone shown on Iranian television was actually a real RQ-170 (which has been public knowledge since 2009), although a former U.S. official confirmed that the drone shown on the Iranian state media was a U.S.", "-22.021304941677954" ] ]